Volume-1 Issue-2

Download 36
Total Views 802
File Size 4.00 KB
File Type unknown
Create Date September 5, 2017
Last Updated September 5, 2017

 Download Abstract Book

S. No

Volume-1 Issue-2, July 2012, ISSN:  2278-3075 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.



Ahmad Parvaresh, Seyed Mohammad Ali Mohammadi, Ali Parvaresh

Paper Title:

A new mathematical dynamic model for HVAC system components based on Matlab/Simulink

Abstract:   In this paper, a new and complete mathematical dynamic model of HVAC (Heating, Ventilating, and Air Conditioning) components such as heating/cooling coil, humidifier, mixing box, ducts and sensors is described. All of these components are proposed and simulated in Matlab/Simulink platform. The proposed model is presented in terms of energy mass balance equations for each HVAC component. We have considered two control loop for this model, namely, temperature control loop and humidity ratio control loop. The proposed model is a full dynamic model of HVAC system that includes least approximations and assumes.

 HVAC system, HVAC components, Matlab/Simulink, HVAC model


1.       Wang, Y., Cai,W, Li, S., Xie, L., Soh, Y., 2012 “Development of cooling coil model for system control and optimization,” IEEE CCA, China.
2.       Clarke, J. A., 2011, “Energy Simulation in Building Design”. 2nd Edition, Butterworth Heinemann.

3.       W.F. Stoecker, Procedures for Simulating the Performance of Components and Systems for Energy Calculations, ASHRAE, New York, 1975.

4.       J.E. Braun, Methodologies for design and control of central cooling plants, Ph.D. Thesis, Department of Mechanical Engineering, University of Wisconsin, Madison, 1988.

5.       R.J. Rabehl, J.W. Mitchell, W.A. Beckman, Parameter estimation and the use of catalog data in modeling heat exchangers and coils, HVAC&R Research 5 (1) (1999) 3–17.

6.       Underwood DM, Crawford RR. Dynamic nonlinear modeling of a hot-water-to-air heat exchanger for control applications. ASHRAE Trans 1990;96:149–55.

7.       Nassif, N., Kajl, S., Sabourin, R., 2010. “Modélisation des composants d’un système CVCA existent”. Vie Col. Interuniversitaire Franco-Québécois, Canada.

8.       J. A. Orosa, A. C. Oliveira, “Software tools for HVAC research,” Advances in Engineering Software, Advances in Engineering Software, 2011, pp 846–851

9.       Lebrun, J., 2011.”Simulation of HVAC system with the help of an engineering equation solver”, 7th IBPSA Conference, Brazil.

10.     Riederer P., Vaezi-Nejad H., Husaunndee A., Bruyat F. (2010). Development and quality improvement of HVAC control systems in virtual laboratories, Proceedings of the 7th IBPSA (International Building Performance Simulation Association) Conference, pp.881-887, Rio de Janeiro, Brazil.

11.     Mendes N., Oliveira R.C.L.F. and Santos G.H. (2003),DOMUS 2.0: A whole-building hygrothermal Simulationn  program, Eighth International Conference on Building Performance Simulation (IBPSA´2003), Eindhoven, Netherlands.

12.     Dion J.M., Dugard L., Franco A., Nguyen M. T. and Rey D. (1991). MIMO Adaptive constrains predictive control case study: an environment test chamber, Automatica, Vol. 27, pp. 611-626, Great Britain.

13.     Huang, W.; Lam, H. N. (1997). Using genetic algorithms to optimize controller parameters for HVAC systems, Energy and Buildings, vol. 26, pp. 277-282.

14.     Ghoumari, M.Y., Megias, D. Montero, J. I. Serrano, J. (2001). Model predictive control of a greenhouse climatic processes using on-line linearisation. Proc. Of the European Control Conference, , pp 3452-3457, Porto, Portugal.

15.     Oliveira, G. H. C., Coelho, L.S., Araújo, H. X., Mendes, N. (2009). Using fuzzy logic in heating control systems. In: Proceedings of 6-TH ASME-JSME Thermal Engineering Joint Conference (AJTEC'03), Hawaii, H.I., USA
16.     Jean Lebrun, J. ,P.,Bourdouxhe. & M. Grodent.(1998). Reference Guide for Dynamic Models of HVAC Equipment, American Sodiety of Heating, Refrigeration and
Air-Conditioning Engineers, Inc. Atlanta, Georga 30329, (ISBN 1-883413-60-5).

17.     Z.J. Wang, G. Krauss, Dynamic models of heating and cooling coils with one-dimensional air distribution, Journal of Thermal Science 2 (2) (1993) 126–134.

18.     J.P. Bourdouxhe, J. Lebrun, Reference guide for dynamic models of HVAC equipment, American Society of Heating, Refrigerating and Air-Conditioning Engineers, Atlanta, Georgia (1996).

19.     Kasahara M, Kuzuu Y, Matsuba T, Hashimoto Y, Kamimura K, Kurosu S. Physical model of an air-conditioned space for control analysis. ASHREA Trans 2000;106 Part 2:307–17.

20.     B.Tashtoush, M. Molhim, M. Al-Rousan, “Dynamic model of an HVAC system for control analysis”, journal of Energy, 2005, pp. 1729–1745






Sachin Kumar, Sandhya Sharma, Naveen Hemrajani

Paper Title:

Optical Time Division Multiplexing System Performance and Analysis Using MZI Switching

Abstract:   First a simple all-optical logic device, called Mach Zhender Inferometer is composed by using a Semiconductor Optical Amplifier (SOA) and an optical coupler. This device is used for generating the logical functions (AND, XOR) and a multiplexer and an Encoder are obtained using this device in Optical Tree Architecture. A fiber communication system is employed using Giga Ethernet Passive Optical Network (GE-PON) architecture. In this architecture an optical fiber is employed directly from a central office to the home. 1: 8 splitters are used as a PON element which establishes communication between central offices to different users. In this chapter GEPON architecture has investigated for different lengths from a central office to the PON in the terms of BER. For 10 Gbit/s systems the plots between the BER and transmission distance is plotted and it is seen that as the distance increases beyond the 15 Km the BER is increased very sharply.

 All optical switch, Mach-Zehnder interferometer (MZI), Semiconductor optical amplifiers (SOA), Switching schemes, Spectrum analysis.


1.       Jitendra Nath Roy, “Mach-Zehnder interferometer based  tree architecture for all-optical logic and arithmetic operations”, Optik Int Light Electron Opt. (2009).
2.       Koji Igarashi and Kazuro Kikuchi,“Optical Signal Processing by Phase Modulation and Subsequent Spectral Filtering Aiming at Applications to Ultrafast Optical Communication Systems”, IEEE journal of selected topics in quantum electronics, Vol. 14, No. 3, May/June.

3.       K. Uchiyama, H. Takara, K. Mori, T. Morioka, “160 Gbit/s all-optical time-division demultiplexing  utilizing  modified  multiple-output  OTDM demultiplexer (MOXIC)”, Electron. Lett. 38 (2002) 1190–1191
4.       I. Shake, H. Takara, I. Ogawa, T. Kitoh, M. Okamoto, K. Magari, T. Ohara, S. Kawanishi,”160-Gbit/s full channel optical time-division de-multiplexer based on SOA- array integrated PLC and its application to OTDM transmission experiment”, IEICE Trans. Commun. 53 (1) (2005) 20–2096.

5.       H. Le-Minh, Z. Ghassemlooy, W.P. Ng, “Crosstalk suppression in an all-optical symmetric Mach–Zehnder (SMZ) switch by using  control pulses with unequal powers, Proceedings of the International Symposium on Telecommunication 2005 (IST 2005)”, Vol. 1, Shiraz, Iran, 2005, pp. 265–268.

6.       M. Heid, S. Spalter, G. Mohs, A. Farbert, W. Vogt, H. Melchior, “160-Gbit/s demultiplexing  based  on a monolithically integrated  Mach–Zehnder interferometer, Proceedings of the European Conference on Optical Communication (ECOC 2001)",Amsterdam,The Netherlands, September 30–October 4, 2001.

7.       Haijiang Zhang, Pengyue Wen, and Sadik Esener,”Cascadable all-optical inverter based on a nonlinear vertical-cavity semiconductor optical amplifier”, Opt. Lett. 32, 1884-1886 (2007).

8.       Yanming Feng, Xiaofan Zhao, Li Wang, and Caiyun Lou, “High-performance all- optical OR/NOR logic gate in a single semiconductor optical amplifier with delay interference filtering, Appl.”, Opt. 48, 2638-2641 (2009).

9.       Jitendra Nath Roy and Dilip Kumar Gayen,“Integrated all-optical logic and arithmeticoperations with the help of a TOAD-based                interferometer device--alternative approach  M. F. Lane, D. Z. Chen, and D. Kokkinos, Managing Fiber Connections in NGN and  Applications, in National Fiber Optic Conference”, OSA Technical
Digest Series (CD) (Optical Society of America, 2007), paper  NThA1.

10.     Petrantonakis, P. Zakynthinos, D.Apostolopoulos, A.Poustie, G. Maxwell, and H. Avramopoulos,” All-Optical Four-Wavelength Burst Mode Regeneration Using Integrated Quad SOA-MZI Arrays”, IEEE PHOTONICS TECHNOLOGY LETTERS, VOL. 20, NO. 23, DECEMBER 1, 2008.

11.     Colja Schubert, Jörn Berger, Stefan Diez, Hans  Jürgen Ehrke, Reinhold Ludwig, Uwe Feiste, Carsten Schmidt, Hans G. Weber, Gueorgui Toptchiyski, Sebastian Randel, and Klaus Petermann, “comparison of Interferometric All-Optical Switches for Demultiplexing Applications in High-Speed OTDM Systems”, JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 20, NO. 4, APRIL 2002.

12.     K. Kitayama, T. Kuri, J. J. Vegas Olmos, and H. Toda, “Fiber-Wireless Networks and Radio-over-Fiber Techniques, in Conference on Lasers and Electro-Optics/Quantum Electronics and Laser Science Conference and Photonic Applications Systems Technologies”, OSA Technical Digest (CD) (Optical Society of America, 2008), paper CThR4.

13.     R. Llorente, T. Alves, M. Morant, M. Beltran, J. Perez, A. Cartaxo, and J. Marti,”Optical Distribution of OFDM and Impulse-Radio UWB in FTTH Networks”, in National 74 Fiber Optic Engineers Conference, OSA Technical Digest (CD) (Optical Society of America, 2008), paper JWA109.

14.     Kuniharu Himeno, Shoichiro Matsuo, Ning Guan, and Akira Wada, Low-Bending-Loss Single-Mode “Fibers for Fiber-to-the-Home”, J. Light wave Technol. 23, 3494- (2005)

15.     D. Iazikov, C. Greiner, and T. W. Mossberg, “Apodizable Integrated Filters for Coarse WDM and FTTH-Type Applications”, J. Light wave Technol. 22, 1402- (2004)

16.     M. F. Lane, D. Z. Chen, and D. Kokkinos,”Managing Fiber Connections in NGN and Applications”, in National Fiber Optic Engineers Conference, OSA Technical Digest Series (CD) (Optical Society of America, 2007), paper NThA1.






Hassan Rangriz, Khosro Manteghi, Ashkan Hamedi, Mohammadreza Goli

Paper Title:

Impact of Decision Support Systems on Evaluating and Selecting Information System Projects (Case Study: National Iranian Gas Company)

Abstract:   The purpose of this research was to define and examine the various variables that affect Decision Support Systems (DSS) usage in evaluating and selecting information system (IS) projects and defined the most severe problems that could face decision-makers when they use DSS. The unit of analysis for this research was the senior experts, head of offices, deputies, and top, middle and lower level managers in National Iranian Gas Company headquarter staff. Questionnaire developed to generate a representative sample of items and achieve content validity. After the internal consistency examined, a multiple regression analysis undertook to examine the relationship between DSS usage in evaluating or selecting the IS projects as a dependent variable and affecting variables in DSS usage as independent variables. Results showed that the variables together explained 32.8 percent of DSS usage in evaluating and selecting of IS projects and just variable “Ease of use” having a significant impact on DSS usage.

 Decision support systems, Information systems, IS projects evaluation, IS projects selection


1.       Deng, H. and S. Wibowo, Fuzzy multicriteria analysis for selecting information systems projects. 2009. IEEE.
2.       Yeh, C. H., Deng, H. P., Wibowo, S., & Xu, Y., Multicriteria Group Decision Support for Information Systems Project Selection, in Next-Generation Applied Intelligence, Proceedings, B.C. Chien, et al., Editors. 2009, Springer-Verlag Berlin: Berlin. p. 152-161.

3.       Moreau, É.M.F., The impact of intelligent decision support systems on intellectual task success: An empirical investigation. Decision Support Systems, 2006. 42(2): p. 593-607.

4.       Deng, H.P. and S. Wibowo, A rule-based decision support system for evaluating and selecting IS projects. IMECS 2008: International Multiconference of Engineers and Computer Scientists. Vol. 2. 2008, Hong Kong.

5.       Fasanghari, M., Dastmardi, M., Azadnia, M., & Mohammadi, S. Information and Communication Technology Project Selection Based on Fuzzy Agent. 2007. IEEE.

6.       Yeh, C. H., Deng, H. P., Wibowo, S., & Xu, Y., Fuzzy Multicriteria Decision Support for Information Systems Project Selection. International Journal of Fuzzy Systems, 2010. 12(2): p. 170-179.

7.       Shim, J., Warkentin, M., Courtney, J. F., Power, D. J., Sharda, R., & Carlsson, C., Past, present, and future of decision support technology. Decision Support Systems, 2002. 33(2): p. 111-126.

8.       Eom, S. and E. Kim, A survey of decision support system applications (1995–2001). Journal of the Operational Research Society, 2005. 57(11): p. 1264-1278.

9.       Ghasemzadeh, F. and N.P. Archer, Project portfolio selection through decision support. Decision Support Systems, 2000. 29(1): p. 73-88.

10.     Lin, C.H. and P.J. Hsieh, A fuzzy decision support system for strategic portfolio management. Decision Support Systems, 2004. 38(3): p. 383-398.

11.     Mikhailov, L. and A. Masizana. Decision support for information systems selection. 2004. IEEE.

12.     Blackwell, P., E.M. Shehab, and J.M. Kay, An effective decision-support framework for implementing enterprise information systems within SMEs. International Journal of Production Research, 2006. 44(17): p. 3533-3552.

13.     Lee, Z., C. Wagner, and H.K. Shin, The effect of decision support system expertise on system use behavior and performance. Information & Management, 2008. 45(6): p. 349-358.

14.     Deng, H. and S. Wibowo, Intelligent decision support for evaluating and selecting information systems projects. Engineering Letters, 2008. 16(3): p. 412-418.

15.     Deng, H.P. and S. Wibowo, A Decision Support System for Evaluating and Selecting Information Systems Projects, in Iaeng Transactions on Engineering Technologies Vol 1, S.L. Ao, et al., Editors. 2009, Amer Inst Physics: Melville. p. 212-223.

16.     16. Oztekin, A., A decision support system for usability evaluation of web-based information systems. Expert Systems with Applications, 2011. 38(3): p. 2110-2118.

17.     Elbeltagi, I., N. McBride, and G. Hardaker, Evaluating the factors affecting DSS usage by senior managers in local authorities in Egypt. Journal of Global Information Management (JGIM), 2005. 13(2): p. 42-65.

18.     Venkatesh, V. and H. Bala, Technology acceptance model 3 and a research agenda on interventions. Decision Sciences, 2008. 39(2): p. 273-315.

19.     El-Beltagi, I., Evaluating the Factors Affecting DSS Usage in Strategic Decisions in Local Authorities in Egypt Using a Structural Equation Modelling Approach. Issues & trends of information technology management in contemporary organizations, 2002. 2(62): p. 143.

20.     Veiga, J.F., S. Floyd, and K. Dechant, Towards modelling the effects of national culture on IT implementation and acceptance. Journal of Information Technology, 2001. 16(3): p. 145-158.

21.     Hofstede, G. and G. Hofstede, Cultures and Organizations: Software of the Mind. Third Millennium Edition2005: McGraw-Hill, New York.

22.     Elbeltagi, I.M., The use of decision support systems in making strategic decisions in local authorities : a comparative study of Egypt and the UK, in The Business School2002, University of Huddersfield. p. 389.

23.     Guimaraes, T., M. Igbaria, and M. Lu, The Determinants of DSS Success: An Integrated Model*. Decision Sciences, 1992. 23(2): p. 409-430.
24.     Fraiha, S., The Impact of Human Capital and Organizational Characteristics on the Business Value of Information Technology, 2011, The University of Western Ontario.
25.     Raymond, L., Organizational characteristics and MIS success in the context of small business. Mis Quarterly, 1985: p. 37-52.

26.     Hung, S. Y., Ku, Y. C., Liang, T. P., & Lee, C. J., Regret avoidance as a measure of DSS success: An exploratory study. Decision Support Systems, 2007. 42(4): p. 2093-2106.

27.     Jarupathirun, S. and F. Zahedi, Exploring the influence of perceptual factors in the success of web-based spatial DSS. Decision Support Systems, 2007. 43(3): p. 933-951.

28.     Hwang, M.I., C.T. Lin, and J.W. Lin, Organizational Factors for Successful Implementation of Information Systems: Disentangling the Effect of Top Management Support and Training. 2012.

29.     Eom, H.B. and S.M. Lee, Decision support systems applications research: A bibliography (1971–1988). European Journal of Operational Research, 1990. 46(3): p. 333-342.

30.     Benbasat, I. and B.R. Nault, An evaluation of empirical research in managerial support systems. Decision Support Systems, 1990. 6(3): p. 203-226.

31.     Arnott, D. and G. Pervan, A critical analysis of decision support systems research. Journal of Information Technology, 2005. 20(2): p. 67-87.

32.     Gliem, J.A. and R.R. Gliem. Calculating, interpreting, and reporting Cronbach’s alpha reliability coefficient for Likert-type scales. 2003.

33.     George, D. and P. Mallery, SPSS for Windows Step by Step: A Simple Guide and Reference 11.0 Update, 2003, Boston: Pearson Education, Inc.

34.     Groves, R.M., Survey errors and survey costs. Vol. 536. 2004: LibreDigital.

35.     Taylor, S. and P. Todd, Assessing IT usage: The role of prior experience. Mis Quarterly, 1995: p. 561-570.






Deepa.R, K. John Peter

Paper Title:

Discovering Application Level Semantics for Data Compression Using HCT

Abstract:   Natural phenomena show that many creatures form large social groups and move in regular patterns. However, previous works focus on finding the movement patterns of each single object or all objects. I propose an efficient distributed mining algorithm to jointly identify a group of moving objects and discover their movement patterns in wireless sensor networks. This algorithm consists of the local mining phase and the cluster ensembling phase. The local mining phase adopts the VMM model together with Probabilistic Suffix Tree to find the moving patterns, as well as Highly Connected Component to partition the moving objects. The cluster ensembling phase utilizes Jaccard Similarity Coefficient and Normalized Mutual Information to combine and improve the local grouping results. The distributed mining algorithm achieves good grouping quality and robustness. In this paper, I extend it further, and propose a technique called hybrid compression technique based on the location information of nodes in the sensor network. A hybrid compression technique problem is formulated to reduce the amount of energy consumption and increases the lifetime of network. The experimental result shows that the technique have good ability of approximation to manage the sensor network and have high data compression efficiency and leverages the group movement patterns to reduce the amount of delivered data effectively and efficiently.

 clustering, hybrid, patterns, similarity


1.        S.S. Pradhan, J. Kusuma, and K. Ramchandran, “Distributed Compression in a Dense Micro sensor Network,” IEEE Signal Processing Magazine, vol. 19, no. 2, pp. 51-60, Mar. 2002.
2.        A. Scaglione and S.D. Servetto, “On the Interdependence of Routing and Data Compression in Multi-Hop Sensor Networks,”Proc. Eighth Ann. Int’l Conf. Mobile Computing and Networking, pp. 140-147, 2002.

3.        N. Meratnia and R.A. de by, “A New Perspective on Trajectory Compression Techniques,” Proc. ISPRS Commission II and IV, WG II/5, II/6, IV/1 and IV/2 Joint Workshop Spatial, Temporal and Multi- Dimensional Data Modeling and Analysis, Oct. 2003.

4.        S. Baek, G. de Veciana, and X. Su, “Minimizing Energy Consumption in Large-Scale Sensor Networks through Distributed Data Compression and Hierarchical Aggregation,” IEEE J. Selected Areas in Comm., vol. 22, no. 6, pp. 1130-1140, Aug. 2004.
5.        C.M. Sadler and M. Martonosi, “Data Compression Algorithms for Energy-Constrained Devices in Delay Tolerant Networks,” Proc. ACM Conf. Embedded Networked Sensor Systems, Nov. 2006.
6.        I.F. Akyldiz, W. Su, Y. Sankarasubermanian, and E. Cayirici, “A survey on sensor networks,” IEEE Communications Magazine, vol. 40, no. 8, pp. 102–114, August

7.        A.J. Goldsmith and S.B Wicker, “Design challenges for energy constrained ad hoc wireless networks,” IEEE Wireless Communications, vol. 9, no. 4, 2002.

8.        S. S. Pradhan, J. Kusuma, and K. Ramachandran, “Distributed compression in a dense mircosensor network,” IEEE Signal Processing Magazine, pp. 51–60, March 2002.

9.        S. Scaglione and S. D. Servetto, “On the interdependence of routing and data compression in multi-hop sensor networks,” in Proc. ACM Mobicom, 2002.

10.     J. Chou, D. Petrovic, and K. Ramchandran, “A distributed and adaptive signal processing approach to reducing energy consumption in sensor networks,” in Proc. IEEE Infocom, 2003.

11.     W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy  efficient communication protocol for wireless micro sensor networks,” in Hawaii International Conference on System Sciences, 2000.

12.     S.S. Pradhan and K. Ramchandran, “Distributed source coding: Symmetric rates and applications to sensor networks,” in Proc. IEEE Data Compression Conf., Snowbird, UT, Mar. 2000, pp. 363-372.

13.     T. M. Cover and J. Thomas. Elements of Information Theory. John Wiley and Sons, Inc., 1991.

14.     A. Gersho and R. M. Gray. Vector Quantization and Signal Compression. Kluwer Academic Publishers, 1992.

15.     Q. Zhao and M. Effros. Optimal Code Design for Lossless and Near Lossless Source Coding in Multiple Access Networks. In Proc. Data Compression Conf., Snowbird, UT, 2001







Paper Title:

Strategies for using e-Tools in Teaching, Learning and Supporting of e-Learning Courses: A Selective Study

Abstract:   e-Learning, of late, has been witnessing an unprecedented expansion as an opportunity for higher education. This expanding alternative mode calls for ensuring and imparting a sound and qualitative education. It is not sufficient to use online learning and teaching technologies (lecture notes, printed material, PowerPoint, websites, animation) simply for the delivery of content to students in e-learning courses. The present study made an attempt to provide the strategies for using the new set of e-tools such as Blogs, Podcasting, Wikis and YouTube, in teaching, learning and supporting of e-learning courses within the education. The findings of the study further demonstrate that if the concept of using new set of tools in e-learning is imparted with a better approach and perspective, the reach will be phenomenal. This study reiterates the relevance of imparting new tools for qualitative education through e- learning.

 e-learning, e-tools, Blogs, Podcasting, Wiki, YouTube


1.       Alsunbul, A. “Issues relating to distance education in the Arab world” Convergence, Vol. 35(1), pp. 59-80, 2002.
2.       Altbach, Philip G., “Knowledge and education as international commodities: The collapse of the common good”, International Journal of Higher Education, Vol. 28, pp 2–5, 2002.

3.       Arreguin, C. (2004) Wikis. In B. Hoffman (Ed.), Encyclopedia of Educational Technology. [Online], Available http://coe.sdsu.edu/eet/Articles/ wikis/ start.htm.

4.       Bisson, S., Putting computers in context. SIGS Application Development Advisor, 6, 4, pp. 14–18, 2002.

5.       Clark, R.C. and Mayer, R.E., E-Learning and the Science of Instruction: Proven Guidelines for Consumers and Designers of Multimedia Learning. San Francisco: Jossey-Bass Pfeiffer, 2002.

6.       Coffman James, “Current Issues in Higher Education in the Arab World”, International Higher Education, Spring, 1996.

7.       ExamplesWikiUse. (2006) [online],  Available: http://www.malts.ed.ac.uk/idel/assignment/wiki/000022.html

8.       Lenhard, A., & Madden, M., (2005, November 2). Pew Internet & American Life Project. Reports. Family, friends & community. Teen content creators and consumers. Retrieved December 10th, 2006,
9.       Marzano, R. J. (2006). A Different Kind of Classroom: Teaching with Dimensions of Learning. Retrieved December 4th, 2006,  Available: http://pdonline.ascd.org/pd_online/ dol02/1992marzano_chapter1.html

10.     Oblinger, D., Boomers, Gen-Xers, and Millennials: Understanding the "New Students”. EDUCAUSE Review, Vol.38, No. 4, pp36-40., 2003

11.     Olsen, S. (2005) The 'millennials' usher in a new era. [online] Available: http://news.com.com/2009-1025_3-5944666.html
12.     Paquet, S. (2003) Personal knowledge publishing and its uses in research, Knowledge Board, Available: http://www.knowledgeboard.com/.

13.     Pearce, J. (2006) Using wiki in education. The Science of Spectroscopy. [Online], Available: http://www.scienceofspectroscopy.info/edit/index.php?title=Using_wiki_in_education.

14.     Prensky, M., Digital GameBased Learning. McGraw-Hill, New York, 2004.

15.     Richardson, W., Blogs, Wikis, Podcasts, and Other Powerful Web Tools for Classrooms. Thousand Oaks, California: Corwin Press, 2006.

16.     Tapscott, D., Growing Up Digital: The Rise of the Net Generation. McGraw-Hill, New York, 1997.

17.     Wikis in Education and Other Tools for Collaborative Writing. (2006) Teaching Effectiveness Program, University of Oregon. [online], Available:http://tep.uoregon.edu/shared/blogswikispodcasts/WikisBiblio.pdf






J Samanta, A Patra, D Mishra, R Rashmi, I Kundu, R Koley

Paper Title:

Performance Analysis of Different Topologies of 1-Bit Full Adder in UDSM Technology

Abstract:   Adders are key components in digital design, performing not only addition operations, but also many other functions such as subtraction, multiplication and division. Adders of various bit widths are frequently required in Very Large-Scale Integrated circuits (VLSI) from processors to Application Specific Integrated Circuits (ASICs). In this work, we have compared the performance of recently proposed topologies of 1-bit full adders in 150nm technology. We have compared ten different full adder topologies like Standard CMOS, CPL, Leap, LP, Mirror, TGdrivecap, 16Transistor, Conventional, Transmission Gate and 14Transistor full adder. The investigation has been carried out with EDA Tanner SPICE simulation tool. Performance has been also compared for variation of different supply voltage. The analysis has been done on the basis of propagation delay, power consumption and power delay product. The design guidelines have been derived to select the most suitable topology for the design features required.

 CMOS full adder, Propagation delay, PDP, Topology, UDSM


1.       Massimo Alioto and Gaetano Palumbo, “Analysis and Comparison on Full adder Block in Submicron Technology,” IEEE transactions on VLSI Systems, vol. 10, no. 6, p.p.802-823, December  2002.
2.       A. Chandrakasan and R. Brodersen, “Minimizing power consumption in digital CMOS circuits,” Proc. IEEE, vol. 83, pp. 498–523, Apr. 1995.

3.       Y.S Gavaskar Reddy, V.V.G.S.R Prasad , “Comparison of CMOS and Adiabatic Full Adder Circuits” International Journal of Scientific & Engineering Research Volume 2, Issue 9, pp:1-5, September-2011

4.       Mark Vesterbacka, a 14-transistor CMOS full adder with full voltage-swing nodes, International conference of IEEE, 713-722, 1999

5.       J. Rabaey, Digital Integrated Circuits (A Design Perspective). Englewood Cliffs, NJ: Prentice-Hall, 1996.

6.       N. Zhuang and H. Wu, “A new design of the CMOS full adder,” IEEE J. Solid-State Circuits, vol. 27, pp. 840–844, May 1992.

7.       A. Shams and M. Bayoumi, “A novel high-performance CMOS 1-Bit full-adder cell,” IEEE Trans. Circuits System—Part II, vol. 47, pp.78–481, May 2000.

8.       A. Shams and M. Bayoumi, “Performance evaluation of 1-bit CMOS adder cells,” in Proc. ISCAS’99, Orlando, FL, June 1999.

9.       N. Weste and K. Eshraghian, Principles of CMOS VLSI Design (A Systems Perspective), 2nd ed. Reading, MA: Addison Wesley, 1993.

10.     N. Zhuang and H. Wu, “A new design of the CMOS full adder,” IEEEJ. Solid-State Circuits, vol. 27, pp. 840–844, May 1992.

11.     K. Martin, Digital Integrated Circuit Design. Oxford, U.K.: Oxford University Press, 2000.

12.     A. Shams and M. Bayoumi, “Performance evaluation of 1-bit CMOS adder cells,” in Proc. ISCAS’99, Orlando, FL, June 1999.

13.     J Samanta and B P De, “Comprehensive analysis of delay in UDSM CMOS circuits”, Proceeding of IEEE explore, ICECCT’11, Villupuram, Tamil Nadu, India, 978-1-4577-1894-6/11, pp:29-32, Nov-2011.






Isha Garg, Mohd. Ilyas

Paper Title:

Study of Two Area Load Frequency Control in Deregulated Power System

Abstract:   In power system, any sudden load perturbations cause the deviation of tie- line exchanges and the frequency fluctuations. So, load frequency control (LFC) or automatic generation control (AGC) is a very important issue in power system operation and control for supplying sufficient and reliable electric power with good quality. In this paper, automatic generation control scheme is adopted in multi area deregulated power system.

 Automatic generation control, deregulated power system, load frequency control, multi area control.


1.       Javad Sadeh and Elyas Rakshani, “ Multi area load frequency control on deregulated power system using optimal output feedback method,” IEEE Transaction, 978-1-4244-1744-5/08.
2.       O. I. Elgerd, C. Fosha, “Optimum Megawatt-Frequency control of multiarea Electric Energy Systems”, IEEE Transaction  on Power Apparatus & Systems, Vol. PAS-89, No. 4, April 1970.

3.       R. Christie, A. Bose, “Load-Frequency control Issues in Power Systems Operations AfterDeregulation”, IEEE Transactions on Power Systems, Vol 11, Aug 1996, Pages. 1191-1200.

4.       V. Donde, M. A. Pai, I. A. Hiskens ,“ Simulation of Bilateral Contracts in an AGC System After Restructuring” IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 16, NO. 3, AUGUST.

5.       C. Fosha, O. I. Elgerd, “The Megawatt-Frequency control Problem: A New approach via Optimal control Theory”, IEEE Transactions on Power Apparatus & Systems, Vol. PAS-89, No. 4, April 1970.

6.       E. Rakhshani, and J. Sadeh. “Load Frequency Control of Multi area Restructured Power system” IEEE  978-1-4244-1762-9/08.

7.       B. Venkata Prasanth, S. V. Jayaram Kumar, “Load Frequency Control For A Two  Area aInterconnected Power System ssUsing Robust Genetic Algorithm Controller” Journal of Theoretical and Applied Information Technology, pp 1204-1212.

8.       Richard D. Christie, Anjan Bose, “Load Frequency Control Issues In Power System Operations After Deregulation” IEEE 0-7803-2663-619.

9.       E. Rakhshani, and J. Sadeh, “A Reduced-Order Estimator with Prescribed Degree of Stability for Two-Area LFC System in a Deregulated Environment” IEEE 978-1-4244-3811-2/09.

10.     IEEE Recommended Definitions of Terms for Automatic Generation Control   on Electric Power Systems, Approved September 26,1991 Standard Board.

11.     S.N. Singh, S.C. Srivastava, “Electric Power Industry Restructuring in India:Present Scenario and Future Prospect” IEEE Intemational Conference on Electric Utility Deregulation, Restructuring and Power Technologies (DRPT2004) April 2004, pp 20-23

12.     F. Liu, Y.H. Song, J. Ma, S. Mei and Q. Lu, “Optimal load-frequency control in restructured power systems” IEE Proc.-Gmer. Transm. Distrib &. Vol. 150, No.1 January 2003, pp 87-95.

13.     A. P. Sakis Meliopoulos, George J. Cokkinides, A. G. Bakirtzis, “Load-Frequency Control Service in a Deregulated Environment” IEEE 1060-3425/98






S.Subha, N.Kumaresan

Paper Title:

Energy-Aware Fault Tolerance in Hard Real-Time Embedded Systems

Abstract:   Energy consumption of electronic devices has become a serious concern in recent years. Energy efficiency is necessary to lengthen the battery lifetime in portable systems, as well as to reduce the operational costs and the environmental impact of stationary systems. Dynamic power management (DPM) algorithms aim to reduce the energy consumption at the system level by selectively placing components into low-power states. Dynamic voltage scaling (DVS) algorithms reduce energy consumption by changing processor speed and voltage at run-time depending on the needs of the applications running. The proposed method is extended by integrating the DPM model DVS algorithm, thus enabling larger energy savings. The proposed methods are i) Postponement method and  ii) Hybrid method. fault tolerance are also achieved  by  increasing transistor density and decreasing supply voltage.

 Energy efficient; Real-time systems, DVS, DPM, Reliability.


1.        S. Poledna, Fault-Tolerant Real-Time Systems: The Problem of Replica Determinism. Kluwer Academic Publishers, 1996
2.        A. Ejlali, B.M. Al-Hashimi, M.T. Schmitz, P. Rosinger, and S.G. Miremadi, “Combined Time and Information Redundancy for SEU-Tolerance in Energy-Efficient Real-Time Systems,” IEEE Trans. Very Large Scale Integration Systems, vol. 14, no. 4, pp. 323- 335, Apr. 2006.

3.        D. Zhu, R. Melhem, and D. Moose, “The Effects of Energy Management on Reliability in Real-Time Embedded Systems,” Proc. Int’l Conf. Computer Aided Design (ICCAD ’04), pp. 35-40, Nov. 2004

4.        R. Melhem, D. Mosse, and E. Elmootazbella, “The Interplay of Power Management and Fault Recovery in Real-Time Systems,” IEEE Trans. Computers, vol. 53, no. 2, pp. 217-231, Feb. 2004

5.        Y. Zhang and K. Chakrabarty, “Dynamic Adaptation for Fault Tolerance and Power Management in Embedded Real-Time Systems,” ACM Trans. Embedded Computing Systems, vol. 3, no. 2, pp. 336-360, May 2004

6.        A. Ejlali, B.M. Al-Hashimi, M.T. Schmitz, P. Rosinger, and S.G. Miremadi, “Combined Time and Information Redundancy for SEU-Tolerance in Energy-Efficient Real-Time Systems,” IEEE Trans. Very Large Scale Integration Systems, vol. 14, no. 4, pp. 323- 335, Apr. 2006

7.        P. Pop, K.H. Harbo, V. Izasimov, and P. Eles, “Scheduling and Voltage Scaling for Energy/Reliability Trade-Offs in Fault- Tolerant Time-Triggered Embedded Systems,” Proc. Fifth IEEE/ ACM Int’l Conf. Hardware/Software Codesign and System Synthesis (CODES+ISSS ’07), pp. 233-238, 2007






Sathiya Bharathi K, Kumaresan N

Paper Title:

Performance Evaluation of SDS Algorithm with Fault Tolerance for Distributed System

Abstract:   In the recent past,  Security-sensitive applications, such as electronic transaction processing systems, stock quote update systems, which require high quality of security to guarantee authentication, integrity, and confidentiality of information, have adopted Heterogeneous Distributed System (HDS) as their platforms.We systematically design a security-driven scheduling architecture that can dynamically measure the trust level of each node in the system by using differential equations and  introduce SRank to estimate security overhead of critical tasks using SDS algorithm.Furthermore,we can achieve high quality of security for applications by using security-driven scheduling algorithm for DAGs in terms of minimizing the makespan, risk probability, and speedup. In addition to that the fault tolerant is included using Security Driven Fault Tolerant Scheduling Algorithm (SDFT) to tolerate N processors failure at one time, and it introduced a new global scheduler to improve efficiency of scheduling process.Moreover, the SDFT supported flexible security policy applied on real time tasks according to its security requirement and considered the effect of security overhead during scheduling. We also observe that the improvement obtained by our algorithm increases as the security-sensitive data of applications increases.

 Directed acyclic graphs, scheduling algorithm, security overheads, heterogeneous distributed systems, security-driven, fault tolerance, precedence-constrained tasks.


1.        Bharadwaj Veeravalli, Kenli.Li, Xiaoyong Tang, and Zeng Zeng, (2011),“A Novel Security-Driven Scheduling Algorithm for Precedence-Constrained Tasks in Heterogeneous Distributed Systems”, IEEE Trans.on Computers,Vol. 60, No. 7.
2.        Xia Ping, and Zhou Xingshe, “Security-Driven Fault Tolerant Scheduling Algorithm for High Dependable Distributed Real-Time System”Fourth International Symposium on Parallel Architectures, Algorithms and Programming,2011.

3.        J. Sarangapani, Wireless Ad Hoc and Sensor Networks: Protocols, Performance, and Control. CRC Press, Apr. 2007.

4.        T. Xie, X. Qin, A. Sung, M. Lin, and L.T. Yang, “Real-Time Scheduling with Quality of Security Constraints,” Int’l J. High Performance Computing and Networking, vol. 4, nos. 3/4, pp. 188- 197, 2006.

5.        G. Donoho, “Building a Web Service to Provide Real-Time Stock Quotes,” MCAD.Net, Feb. 2004.

6.        S. Song, Y.-K. Kwok, and K. Hwang, “Trusted Job Scheduling in Open Computational Grids: Security-Driven Heuristics and A Fast Genetic Algorithms,” Proc. Int’l Symp. Parallel and Distributed Processing, 2005.

7.        Alan A.B, Luigi V.M., and Federico R., “Fault-Tolerant Rate-Monotonic First-Fit Scheduling in Hard-Real-Time Systems”, IEEE Transactions on Parallel and Distributed Systems, Vol.10, No.9, 1999, pp.934-945.

8.        M.H. Klein, J.P. Lehoczky, and R.Rajkumar, "Rate- Monotonic Analysis for Real-Time Industrial Computing", Computer, pp.24-33, Jan.1994.






Rajendra Prasad P, B. Abdul Rahim

Paper Title:

Fast Self Switching type Frequency Agile RADAR Processing unit Implemented on Xilinx FPGA

Abstract:   RADARs with fixed carrier frequency profile are vulnerable to jamming. Changing the carrier frequency of the RADAR by sensing the channel condition dynamically. Frequency agility is one of the best techniques used for anti jamming. Self adaptive frequency agility analyze jamming spectrum real time so that to control the radar transmission frequency. Frequency agility refers to the radar's ability to rapidly change its operating frequency in a pseudo-random fashion to maintain a narrow instantaneous bandwidth over a wide operating bandwidth. The total architecture was implemented on FPGA board with hardware description language and the results are seen in Chip Scope pro analyzer.

 RADAR, frequency agility, Self adaptive frequency, bandwidth, FPGA,


1.        Y. Chen, “Analysis of Anti-jamming Technique of Search Radar,” Radio Engineering, vol. 37, No.7, pp. 44–46, 2007 (in Chinese).
2.        X. Y. Ma, J. B. Xiang, Y. S. Zhu and J. M. Qing, Radar Signal Processing, 1st ed., Changsha, Hunan, China: Hunan Science

3.        C. S. Li, J. Li, and C. G. Sun, “Anti-jamming Scheme Design of Ground-wave Over-the-horizon Radar to Radio Station,” Shipboard Electronic Countermeasure, Vol.31, No.4, pp.45-46, Aug. 2008 (in Chinese).

4.        Y. Jiang and S. H. Huang, “Evaluation of Searching Radar ECCM Capability,” Ship Electronic Engineering, No.3, pp. 113– 116, 2005 (in Chinese).

5.        Self Adaptive Frequency Agility Realized with FPGA – IEEE 2009,Hongping Zhou, Li Guo

6.        Http://www.scribd.com/radar-Complex-signal-generation/d/19397707

7.        S. C. Yu, X. Li, H. Jiang and X. D. Liu, “Design of Controller for Frequency Agility Radar,” Journal of Naval Aeronautical and Astronautical University, Vol.23, No.4, pp: 424–426, Jul. 2008. (in Chinese)

8.        H. X. Huang and H. Xu, “Analysis and Evaluation on Radar Frequency Agility Capability,” Aerospace Electronic Warfare, No.1, pp: 21–24, 2001. (in Chinese)





Anshul Singh, Devesh Narayan

Paper Title:

Augmentation of Travelling Salesman Problem using Bee Colony Optimization

Abstract:   Animals with social behaviors often uncover optimal solutions to a range of problems when compared to other techniques. This advantage is extensively used nowadays for a variety of applications. The bee colony optimization (BCO) is inspired by bees foraging behavior that includes colonies of artificial bees capable of solving combinatorial optimization problems e.g. Travelling Salesman Problem. K-opt local search for the value of k as 3 repeatedly reconnects random three edges of the graph after disconnecting so as to obtain refined path. In this article BCO and k-opt local search, the two heuristic techniques for optimization, are combined together to acquire sophisticated results. Comparisons of the proposed method with nearest neighborhood approach is performed and shown with presented system proved to be superior to the rest.

 Bee Colony optimization, k-opt local search, waggle dance, Travelling Salesman Problem.


1.        S. Nakrani and C. Tovey, "On honey bees and dynamic server allocation in Internet hosting centers," Adaptive Behavior, vol. 12, no. 3-4, pp. 223-240, 2004.
2.        G. Laporte, "The traveling salesman problem: An overview of exact and approximate algorithms," European Journal of Operational Research, vol. 59, no. 2, pp. 231-247, 1992.

3.        R. E. S. D. J. Rosenkrantz and P. M. Lewis, "An analysis of several heuristics for the traveling salesman problem," SIAM Journal on Computing, vol. 6, no. 3, pp. 563-581, 1977.

4.        R. M. Frieze, "An extension of Christofides heuristic to the kperson travelling salesman problem," Discrete Applied Mathematics, vol. 6, no. 1, pp. 79-83, 1983.

5.        H. K. B. Chandra and C. Tovey, "New results on the old k-opt algorithm for the traveling salesman problem," SIAM journal of computing, vol. 28, no. 6, pp. 1998-2029, 1999.

6.        S. Lin and B. W. Kerninghan, "An effective heuristic algorithm for the traveling salesman problem," Operations Research, vol. 21, no. 2, pp. 498-516, 1973.

7.        K. Helsgaun, "An effective implementation of the Lin-Kernighan traveling salesman heuristic," European Journal of Operational Research, vol. 126, no. 1, pp. 106-130, 2000.

8.        J. H. M. K. E. H. L. Aarts and P. J. M. Vanlaarhoven, "A quantitative analysis of the simulated annealing algorithm- A case study for the traveling salesman problem," Journal of Statistical Physics, vol. 50, no. 1-2, pp. 187-206, 1988.

9.        J. Knox, "Tabu search performance on the symmetric traveling salesman problem," Computers & Operations Research, vol. 21, no. 8, pp. 867-876, 1994.

10.     B. F. a. P. Merz, "A genetic local search algorithm for solving symmetric and asymmetric traveling salesman problem," in in Proceedings of Internotional Conference on Evolutionary Computation, 1996.

11.     P. M. a. B. Freisleben, "Genetic local search for the TSP: New results," in in Proceedings of the 1997 IEEE InternationalConference on Evolutionary Computation, 1997.

12.     C. M. White and G. G. Yen, "A hybrid evolutionary algorithm for traveling salesman problem," in in Proceedings of Congress on Evolutionary Computation, 2004.

13.     L. M. Gambardella and M. Dorigo, "Solving symmetric and asymmetric TSPs by ant colonies," in in Proceedings of IEEE International Conference on Evolutionary Computation, 1996.

14.     T. S. a. H. Hoos, "MAX-MIN ant system and local search for the traveling salesman problem," in in Proceedings of ICEC'97 - 1997 IEEE 4th International Conference on evolutionary Computation, 1997.

15.     P. L. a. D. Teodorovic, "Computing with Bees: Attacking Complex Transportation Engineering Problems," International Journal on Artificial Intelligence Tools, vol. 12, no. 3, pp. 375- 394, 2003.

16.     K. v. Frisch, "Decoding the language of the bee," Science, vol. 185, no. 4152, pp. 663-668, 1974.

17.     F. C. Dyer, "The biology of the dance language," Annual Review of Entomology, vol. 47, pp. 917-949, 2002.

18.     J. C. Biesmeijer and T. D. Seeley, "The use of waggle dance information by honey bees throughout their foraging careers," Behavioral Ecology and Sociobiology, vol. 59, no. 1, pp. 133-142, 2005.

19.     D. Karaboga and B. Basturk, "A powerful and efficient algorithm for numerical function optimization: artificial bee colony (ABC) algorithm," Journal of Global Optimization, vol. 39, no. 3, pp. 459-471, 2007.

20.     J. V. Rijswijck, "Are bees better than fruitflies? Experiments with a hex playing program," in in Proceeding of 13th Biennial Conference of the Canadian Society for Computational Studies of Intelligence, 2000.

21.     Y. H. M. L. A. I. S. C. S. Chong and K. L. Gay, "A bee colony optimization algorithm to job shop scheduling," in in Proceedings of the 2006 Winter Simulation Conference, 2006.

22.     Y. H. M. L. A. I. S. C. S. Chong and K. L.Gay, "Using a bee colony Algorithm for neighborhood search in job shop scheduling problems," in in Proceeding of 21st European Conference on Modeling and Simulation (ECMS 2007), 2007.

23.     K. Helsgaun, "An effective implementation of the Lin- Kernighan traveling salesman heuristic," in Roskilde University, 1998.  






Sonika Chaudhary, Deepak Sharma, Rakhi Tanwar, Rayma Singh

Paper Title:

Involvement of Mobile Adhoc Network (MANET) Technology in Pervasive Computing

Abstract:   In future a pervasive computing environment can be expected based on the recent progresses and advances in computing and communication technologies. Next generation of mobile communications will include both prestigious infrastructured wireless networks and novel infrastructureless mobile ad hoc networks (MANETs). A MANET is a collection of wireless nodes that can dynamically set up anywhere and anytime to exchange information without using any pre-existing fixed network infrastructure. This paper describes the fundamental problems of ad hoc networking by giving its related research background including the concept, characterstics, existence, and applications of MANET. Some of the technical challenges MANET poses are also presented, based on which the paper points out some of the key research issues for ad hoc networking technology that are expected to promote the development and accelerate the commercial applications of the MANET technology. Special attention is paid on network layer routing strategy of MANET and key research issues include new X-cast routing algorithms, security & reliability schemes, QoS model, and mechanisms for interworking with outside IP networks.

 Mobile Communications, Wireless Networks, Ad hoc Networking, Pervasive Computing, Routing Algorithm.


1.        M. Frodigh, P. Johansson, and P. Larsson. “Wireless ad hoc networking: the art of networking without a network,” Ericsson Review, No.4, 2000, pp. 248-263.
2.        IETF Working Group: Mobile Adhoc Networks (manet). http://www.ietf.org/html.charters/manet-charter.html.

3.        Ad Hoc Networking Extended Research Project. Online Project. http://triton.cc.gatech.edu/ubicomp/505.

4.        IEEE 802.11 Working Group. http://www.manta.ieee.org/groups/802/11/.

5.        E.M. Royer and C.K. Toh, “A review of current routing protocols for ad hoc mobile wireless networks,” IEEE Personal Communications, 1999, 6(2), pp. 46-55.

6.        S.R. Das, R. Castaneda, and J. Yan, “Simulation-based performance evaluation of routing protocols for mobile ad hoc networks,” Mobile Networks and Applications, 2000, 5, pp. 179-189.

7.        S.-J. Lee, M. Gerla, and C.-K. Toh, “A simulation study of table-driven and on-demand routing protocols for mobile ad-hoc networks,” IEEE Network, 1999, 13(4), pp. 48-54.

8.        M. Joa-Ng and I.-T. Lu, “A peer-to-peer zone-based two-level link state routing for mobile ad hoc networks,” IEEE Journal on Selected Areas in Communications,
1999, 17(8), pp. 1415-1425.

9.        L. Ji, M. Ishibashi, and M.S. Corson, “An approach to mobile ad hoc network protocol kernel design,” In Proceedings of IEEE WCNC’99, New Orleans, LA, Sep. 1999, pp. 1303-1307.

10.     Y.-B. Ko and N. H. Vaidya, “Geocasting in mobile ad hoc networks: Location-based multicast algorithms,”. Technical Report TR-98-018, Texas A&M University, Sep. 1998.

11.     M. Gerla, C.-C. Chiang, and L. Zhang, “Tree multicast strategies in mobile, multihop wireless networks,” ACM/Baltzer Mobile Networks and Applications, speical issue on Mobile Ad Hoc Networking, 1999, 4(3), pp. 193-207.

12.     S. Chakrabarti and A. Mishra, “QoS issues in ad hoc wireless networks,” IEEE Communications Magazine, 2001, 39(2), pp. 142–148.

13.     L. Zhou and Z. J. Haas, “Securing ad hoc networks,” IEEE Network Journal, 1999, 13(6), pp. 24-30.






Gundeep Singh, Dr. R.M. Belokar

Paper Title:

Lean Manufacturing Implementation in the Assembly shop of Tractor Manufacturing Company

Abstract:   Lean manufacturing has received a great deal of attention in its application to manufacturing companies. It is a set of tools and methodologies that aims for increased productivity; cycle time reduction and continuous elimination of all waste in the production process. The Lean manufacturing technique - Kaizen is internationally acknowledged as a method of continuous improvement, through small steps, of the economical results of companies. In this paper a case study is presented in which bottlenecks are identified in the assembly shop of the tractor manufacturing automobile company due to which the productivity was low. Thus, the implementation of lean manufacturing kaizen technique results in the removal of bottlenecks by reducing cycle time, increasing the productivity and eliminating all kinds of waste.

 Bottleneck, cycle time, gear box, lean manufacturing, productivity, waste.


1.       James A. Jordan, Jr. and Frederick J. Michel, 1999, “Valuing Lean Manufacturing Initiatives”, Computer Technology Solutions conference, September 1416, 1999, Detroit, Michigan.
2.       Farzad Behrouzi and Kuan Yew Wong, “Lean Performance evaluation of manufacturing systems: A dynamic and innovative approach”, Procedia Computer Science 3 (2011) 388395, Malaysia.

3.       Abdul Talib Bon and Norhayati Abdul Rahman, “Quality Measurement in Lean Manufacturing”, University Tun Hussein Onn, Malaysia.

4.       Mary S. Spann, Mel Adams, Maruf Rahman, Hank Czarnecki and Bernard J. Schroer, “Transferring Lean Manufacturing to Small Manufacturers: The Role of NIST-MEP”, University of Alabama in Huntsville, Huntsville, Alabama 35899.    

5.       “Lean Manufacturing and the Environment: Research on Advanced Manufacturing Systems and the Environment and Recommendations for Leveraging Better Environmental Performance”, Ross & Associates Environmental Consulting, Ltd. USA.

6.       J.P. Womack, D.T. Jones and D. Roos, “The Machine That Changed the World”, Rawson Associates, New York, NY, 1990.

7.       Ohno, Taiichi. 1988, “Toyota Production System”, New York: Productivity Press..

8.       Russell, R.S. and Taylor, B.W., “Operations management”, 2nd edition, Uppre Saddle River, NJ: Prentice Hall, 1999.

9.       Haque, B., & James-Moore, M. (2004), “Applying Lean thinking to new product introduction”, Journal of Engineering design, 15(1), 1-31.

10.     Sachpreet Singh Aulakh and Janpreet Singh Gill, “Lean Manufacturing a Practitioner’s Pespective”, Department of Mechanical Engineering, RIMTInstitute of Engineering & Technology, Mandi Gobindgarh, India.

11.     James P. Womack and Daniel T. Jones, “Lean Thinking: Banish Waste and Create Wealth in Your Corporation”, Simon & Schuster, Inc., 1996, Second Edition, 2003.  






Annapurna D, K B Raja, Venugopal K R, L M Patnaik

Paper Title:

Analysis of On Demand and Table Driven Routing Protocol for Fire Fighter Application 

Abstract:   In an Ad hoc communication, the nodes are randomly distributed in a region are moving arbitrarily. We propose Analysis of On demand and Table driven routing protocols for Fire Fighter Applications (AOTFF) in this paper. The performance analysis on reactive protocols viz., AODV and AOMDV as well as proactive protocol DSDV are compared with Packet Delivery Fraction (PDF) and Simulation time. The model of fire fighter is developed using routing protocol to cover maximum area by knowing the path that is already been used . It is observed that the performance of reactive protocols are better than compared to proactive protocols..

 AODV, AOMDV, DSDV, Firefighter, Lifeline, Routing Protocol


1.        C. SivaRam murthy and B.S. Manoj: “Adhoc wireless networks:Blueprint for a  Architectures and protocols,” published by Pearson Education and Dorling Kindersley in South Asia, 1st edition 2004.
2.        Pawel Kulakowski, Eusebi Calle and Jose L Marzo “Sensors-Actuators Cooperation in WSANs for Fire Fighting Applications," IEEE International Workshop on Selected Topics in Mobile and Wireless Computing,  pp. 726 – 732, May 2010.

3.        A Oliveira, C Gehin, G Delhomme A Dittmar and E McAdams “Thermal Parameters Measurement on Fire Fighter During Intense Fire Exposition,” Thirty First Annual International Conference of the IEEE EMBS, pp. 4128 – 4131, September 2009.

4.        Luigi Vallozzi, Patrick Van Torre and Carla Hertleer “Wireless Communication for Fire Fighters Using Dual-Polarised Textile Antennas Integrated in Their Garment,” IEEE  Transactions on Antennas and Propagation, Vol. 58, No. 4, pp.1357 – 1368, April 2010.

5.        Sudip Dogra, Samrat Manna and Somnath Maiti “A Novel Approach for RFID Based Fire Protection,”  International Conference on Emerging Trends in Electronic and Photonic Devices and Systems, pp. 198 – 201,   2009.

6.        Giovanni Magnenes, Davide Curone, Lura Caldani and Emanuele Lindo Secco “Fire Fighters and Rescurers Monitoring Through Wearable Sensors: The ProeTEX Project,” Thirty Second Annual International Conference of the  IEEE Engineering In Medicine And Biology Society, pp. 3594 – 3597, September 2010.

7.        Hady Abdel Salam, Syed R Rizvi, and Scott Ainsworth and Stephen Olariu “ A Durable Sensor Enabled  Lifeline Support for Firefighters,”  IEEE Autonomus Networked Sensor Systems, 2008.

8.        Jaya Jacob and V.Seethalakshmi “Performance Evaluation of Various Routing Protocols in MANET,”   Research Cell: An International Journal of Engineering Sciences ISSN: 2229-6913 Vol. 5, Issue Dec. 2011

9.        Markus Klann, Till Riedel, Hans Gellersen, Carl Fischer “LifeNet: An Ad-hoc Sensor Network and Wearable System to Provide Firefighters with  Navigation Support,” Ubicomp, Innsbruck, Austria, pp. 124 – 127, 2007.

10.     Er. Deepinder Singh Wadhwa and  Er. Tripatjot Singh Panag “Performance  Comparison of Single and Multipath Routing Protocols in Adhoc Networks,” An International Journal of Computer and Technical Applications, IJCTA,  ISSN:2229-6093, Vol 2 (5), Sept-Oct 2011.

11.     Smita Singh, Shradha Singh,Soniya jain,S.R.Biradar “Comparison and Study of AOMDV and DSDV Routing Protocols in MANET Using NS-2,”  International Journal on Computer Science and Engineering ISSN : 0975-3397 Vol. 4 No. 03 March 2012.

12.     Ramprasad Kumawat, Vinay Somani  “Comparative Study of On-demand Routing Protocols for Mobile Ad-hoc Network,” International Journal of Computer Applications (0975 – 8887), Volume 27. No.10, August 2011.

13.     Mark A Finney, Jack D Cohen, Isaac C Grenfell and Kara M Yedinak, “An Examination of Fire Spread Thresholds in Discontinuous Fuel Beds,” International Journal of Wildland Fire,  pp. 163 – 170, 2010.

14.     P.Periyasamy, Dr.E.Karthikeyan, “Impact of Variation in Pause Time and Network Load in AODV and AOMDV Protocols,”  I.J. Information Technology and Computer Science, Vol.3, 38-44 Published Online April 2012 in Modern Education and Computer Science (MECS).

15.     A. Rajeswari, P. T. Kalaivaani, “A Novel Energy Efficient Routing Protocols for Wireless Sensor Networks Using Spatial Correlation Based Collaborative Medium Access Control Combined with Hybrid MAC,” Network Protocols and Algorithms, ISSN 1943-3581, Vol. 3, No. 4, Dec 2011.

16.     D.D.Chaudhary, Pranav Pawar, “Comparison and Performance Evaluation of Wireless Sensor Network with different Routing Protocols,” International Conference on Information and Electronics Engineering IPCSIT vol.6 2011 IACSIT Press, Singapore.

17.     V. Seethalakshmi , Jaya Jacob, “Efficiency Enhancement Of Routing Protocol In Manet,” IJAET International Journal of Advances in Engineering & Technology,” ISSN: 2231-1963, Vol. 3, Issue 2, pp. 314-323, May 2012.

18.     V Ramesh P Subbaiah N Koteswar Rao and M Janardhana Raju “Performance Comparison and Analysis of DSDV and AODV for MANET,” International Journal on Computer Science and Engineering, Vol. 02, No. 02,  pp 183-188,  2010.

19.     S A Ade  and P A Tijare “Performance Comparison of AODV, DSDV, OLSR and DSR Routing Protocols in Mobile Ad Hoc Networks,” International Journal of Information Technology and Knowledge Management, Vol. 2, No. 2, pp 545 – 548, December 2010.

20.     Daniele Miorandi and Eitan Altman, “Connectivity in One-Dimensional Ad Hoc Networks: a Queueing Theoretical Approach,” Institute National De Recherche En Informatique Et En Automatique, 2004.






D.C.Vinod Rathna Kumar, K.Ramudu

Paper Title:

Improvement of call level loss performance using speed-sensitive CAC in hierarchical heterogeneous wireless networks

Abstract:   Call Admission Control (CAC) prevents oversubscription of VoIP networks. It is used in the call set-up phase and applies to real-time media traffic as opposed to data traffic. The basic idea is the blocked calls from fast-speed users are redirected to high-tier large Cells, and the slow speed users are redirected to low-tier cells. A hierarchical overlay structure is an alternative solution that integrates existing and future heterogeneous wireless networks to provide subscribers with better mobile broadband services. Traffic loss performance in such integrated heterogeneous networks is necessary for an operator’s network dimensioning and planning. This paper investigates the computationally efficient loss performance modeling for multiservice in hierarchical heterogeneous wireless networks. An approximation model with guaranteed accuracy and low computational complexity is presented for the loss performance of multiservice traffic.

 Call Admission Control (CAC), Hierarchical overlay wireless  network , Long Term Evaluation (LTE), performance  evaluation, Quality of Service(QOS),


2.        S.-P. Yeh, S. Talwar, S.-C. Lee, and H. Kim, “WiMAX femtocells: A    B    perspective on network architecture, capacity, and coverage,” IEEE     Commun. Mag., vol. 46, no. 10, pp. 58–65, Oct. 2008.

3.        D. Calin, H. Claussen, and H. Uzunalioglu, “On femto employment architectures and macrocell offloading benefits in joint macro-femto deployments,” IEEE Commun. Mag., vol. 48, no. 1, pp. 26–32, Jan. 2010.

4.        R. Y. Kim, J. S. Kwak, and K. Etemad, “WiMAX femtocells: Requirements, challenges, and solutions,” IEEE Commun. Mag., vol. 47, no. 9, pp. 84–91, Sep. 2009.

5.        S. S. Rappaport and L.-R. Hu, “Microcellular communication systems with hierarchical macrocell overlays: Traffic performance models and analysis,” Proc. IEEE, vol. 82, no. 9, pp. 1383–1397, Sep. 1994.

6.        L.-R. Hu and S. S. Rappaport, “Personal communication systems using multiple hierarchical cellular overlays,” IEEE J. Sel. Areas Commun., vol. 13, no. 2, pp. 406–415, Feb. 1995.

7.        C. Yang, C. Tsai, J. Hu, and T. Chung, “On the design of mobility management scheme for 802.16-based network environment,” Comput. Netw., vol. 51, no. 8, pp. 2049–2066, Jun. 2007.

8.        D. J. Lee, B. C. Shin, and D. H. Cho, “Speed estimation of mobile station in additive noise and Rayleigh fading environments,” Wireless Netw., vol. 8, no. 6, pp. 541–548, Nov. 2002.

9.        Y.-R. Haung and J.-M. Ho, “Distributed call admission control for a heterogeneous PCS network,” IEEE Trans. Comput., vol. 51, no. 12, pp. 1400–1409, Dec. 2002.

10.     P. V. Orlik and S. S. Rappaport, “On the handoff arrival process in cellular communications,” Wireless Netw., vol. 7, no. 2, pp. 147–157, Mar./Apr. 2001.






D. Mohammed Elias, P. Lakshmi Devi

Paper Title:

Image Segmentation in the Presence of Intensity in Homogeneities by Using Level Set Method with MRI and Satellite Images

Abstract:   This paper proposes a novel region-based method for image segmentation, which is able to deal with intensity inhomogeneities in the segmentation. Intensity inhomogeneity often occurs in real-world images, which presents a considerable challenge in image segmentation. Here we can take both mri images and also satellite images. First, based on the model of images with intensity inhomogeneities, we derive a local intensity clustering property of the image intensities, and define a local clustering criterion function for the image intensities in a neighborhood of each point. This local clustering criterion function is then integrated with respect to the neighborhood center to give a global criterion of image segmentation. Our method has been validated on synthetic images and real images of various modalities, with desirable performance in the presence of intensity inhomogeneities. Experiments show that our method is more robust to initialization, faster and more accurate than the well-known piecewise smooth model. As an application, our method has been used for segmentation and bias correction of magnetic resonance (MR) images with promising results.

 Bias correction, image segmentation, intensity inhomogeneity,level set, MRI,satellite image.


1.        G. Aubert and P. Kornprobst, Mathematical Problems in Image Processing: Partial Differential Equations and the Calculus of Variations. New York: Springer-Verlag, 2002.
2.        V. Caselles, F. Catte, T. Coll, and F. Dibos, “A geometric model for active contours in image processing,” Numer. Math., vol. 66, no. 1, pp. 1–31, Dec. 1993.

3.        V. Caselles, R. Kimmel, and G. Sapiro, “Geodesic active contours,” Int. J. Comput. Vis., vol. 22, no. 1, pp. 61–79, Feb. 1997.

4.        T. Chan and L. Vese, “Active contours without edges,” IEEE Trans. Image. Process., vol. 10, no. 2, pp. 266–277, Feb. 2001.

5.        D. Cremers, “A multiphase levelset framework for variational motion segmentation,” in Proc. Scale Space Meth. Comput. Vis., Isle of Skye, U.K., Jun. 2003, pp. 599–614.

6.        L. Evans, Partial Differential Equations. Providence, RI: Amer. Math. Soc., 1998.





Kishore M, Ashwini V.R. Holla, H .M. Guruprasad

Paper Title:

Simulation of Reduced Complexity Beamforming Algorithms for Mobile Communication

Abstract:   Interference reduction is vital for being able to effectively communicate with mobile users. In order to provide line of sight communications and continual coverage to the remote users. one approach to increasing capacity and coverage zones for the servicing wireless station is to use smart antennas. Sophisticated adaptive beam forming techniques can be applied to point the array’s beam in the desired look direction while simultaneously nulling out the interfering signal. This paper explains the approaches for beam formation that reduce the computational complexity of conventional Least Mean Square algorithm.

 Smartantenna, Beam  Forming, Interference, Least Mean Square Algorithm


1.       L. C. Godara, “Application of antenna arrays to mobile communication. II. Beam-forming and direction-of-arrival considerations”, Proceedings of IEEE, August 1997, Vol-85, Issue 8, pp 1195- 1245.
2.       ].M. Mouhamadou and P. Vaudon, “Smart Antenna Array Patterns Synthesis: Null Steering and multi-user Beamforming”, Progress in Electromagnetic research, June 2006, PIER-60, pp 95-106.

3.       J.M. Samhan, R.M. Shubair and M.A.Al-qutayriz , “Design and implementation of an adaptive smart antenna array system”, Innovations in information technology, November 2006,  pp 1-4.

4.       C.S. Nemai, C. Karmakar, “Direction of Arrival Estimation based on a Single-Port Smart Antenna using MUSIC Algorithm with periodic signals”, International Journal of  Signal Processing,  March 2005, Vol-1, No 2, pp153-162.

5.       C.S. Nemai, C. Karmakar, “Direction of Arrival Estimation with a Novel single port smart antenna”, EURASIP Journal on applied Signal Processing, Sept 2004, Vol-2004, pp 1364-1375.

6.       T. K. Sarkar, S. Park, J. Koh,  R.A. Schneible, “A Deterministic Least Squares Approach to Adaptive Antennas”, Digital Signal Processing, A Review Journal-6, March
1996, Vol- 49 , pp 185-194.

7.       S. Choi, H. M. Son, T. K. Sarkar, “Implementation of a Smart Antenna System on a General-Purpose Digital Signal Processor Utilizing a Linearized CGM”, Digital Signal Processing Journal-7, March 1997,Vol- 7, Issue-8,pp 105-119.






Lohith Raj S N, Shanthi M B, Jitendranath Mungara

Paper Title:

Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks

Abstract:   Protecting data from the intruders on internet or on the host systems is a very tedious task. The Intrusion Detection System is a technology for detecting suspicious actions or malicious behavior in a system from the unauthorized users or so called intruders. Alerts are produced during the intrusion activity, but when more number of alerts is produced then handling of these alerts becomes difficult on IDS. In this paper, we propose a layered approach for IDS where the alert information is represented dynamically in the form of layers and we propose an alert aggregation algorithm where an attack instance is created for similar type of alerts produced and this is clustered to form a meta-alert which can reduce the number of alerts produced without losing any information. This technique has approaches like generative modeling, in this case the beginning as well as the completion of attack properties and details can be detected and it is a data stream approach, where duplicate or the alerts which are observed many number of times are processed only a few times. By applying these techniques and alert aggregation we can reduce the number of false alert rate and number of alerts. The goal of the project is to generate meta-alerts from the proposed alert aggregation algorithm and represent all the alert information or the intruder activity on a dynamically representing model. The alert produced and the details of the alert and the action taken are represented in the form of layers on a distinctive layered model. The details of the alert are represented using these layers and further to form a meta-alert. Meta-alerts contain all the relevant information but the amount of data can be reduced progressively. Using the data sets, it is possible to reduce the number of alerts produced while number of missing meta-alerts is extremely low and represent all the alert information in the form of layers on a model.

 Network Security, Intrusion Detection, Alert Aggregation, Data-Stream Approach.


1.        Alexander Hofmann, Bernhard Sick “Online Intrusion alert aggregation with generative Data Modeling” IEEE transactions on dependable and secure computing, VOL.8, No.2 March- April 2011               
2.        Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks. R. Nakkeeran, T. Aruldoss Albert and R.Ezumalai.

3.        Intrusion and Detection of Homogenous and Heterogeneous Wireless Sensor Networks. Yun Wang, Student Member, IEEE, Xiaodong Wang, Member, IEEE.

4.        S. Axelsson, “Intrusion detection systems: A survey and taxonomy,” Chalmers University of Technology, Department of Computer Engineering, Tech. Rep. 99-15, 2000.

5.        M. R. Endsley, “Theoretical underpinnings of situation awareness: A critical review,” in Situation Awareness Analysis and Measurement, M. R. Endsley and D. J. Garland, Eds. Mahwah, NJ: Lawrence Erlbaum Associates, 2000, ch. 1, pp. 3–32.

6.        C. M. Bishop, Pattern Recognition and Machine Learning. New York, NY: Springer, 2006.

7.        M. R. Henzinger, P. Raghavan, and S. Rajagopalan, Computing on data streams. Boston, MA: American Mathematical Society, 1999.

8.        A. Allen, “Intrusion detection systems: Perspective,” Gartner Inc., London, UK, Tech. Rep. DPRO-95367, 2003.

9.        F. Valeur, G. Vigna, C. Kr¨ ugel, and R. A. Kemmerer, “A comprehensive approach to intrusion detection alert correlation,” in IEEE Transactions on Dependable and Secure Computing, vol. 1, no. 3, 2004, pp. 146–169.

10.     H. Debar and A. Wespi, “Aggregation and correlation of intrusion-detection alerts,” in Recent Advances in Intrusion Detection, ser. LNCS, W. Lee, L. Me, and A. Wespi, Eds., vol. 2212. Berlin, Germany: Springer, 2001, pp. 85–103.

11.     D. Li, Z. Li, and J. Ma, “Processing intrusion detection alerts in large-scale network,” in International Symposium on Electronic Commerce and Security.





Mohammed Mujeeb, Sudhakar K N, Jitendranath Mungara

Paper Title:

Reputation-Based Security Protocol for MANETs

Abstract:   Mobile Ad-hoc Network is huge area for research with practical applications. It is a infrastructureless and self-organized network, vulnerable because of its characteristics such as open medium, distributed cooperation and it is difficult to predict the topology. In general, Routing security in MANETs appears to be a challenging task. In this article we study the routing security issues of MANETs, and analyze in detail — the “Blackhole” attack. We come with distributed reputation mechanism that improves security in MANETS. Some optimization to the current reputation scheme used in MANETs are one is Selective Deviation tests and second is Adaptive expiration timer that aims to deal with congestion and quick reputation convergence. Cryptographic mechanisms such as Digital signature and hashing technique are used for the authentication of the packets in network. We design and build our proposed protocol over existing AODV and test in Network Simulator-2 in the presence of variable active Black hole attack. By using proposed Secure AODV (RSAODV) protocol we achieve increased throughput by decreasing packet delivery delay and packet drop.

 MANET, RSAODV, Black hole, Routing, Digital Signature, Hashing


1.        J. Ruiz, et al, "Black Hole Attack Injection in Ad hoc Networks," DSN2008, International Conference on Dependable Systems and Networks. Anchorage, Alaska, June 24-27 2008, pp. G34-G35.
2.        Sonja Buchegger and Jean-Yves Le Boudec. Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes — Fairness In Dynamic Adhoc NeTworks. In Proc. of IEEE/ACM MobiHOC, 2002. IEEE.

3.        A. Dadhich, "A Distributed Cooperative Approach To Improve Detection And Removal Of Misbehaving MANET Nodes", COMSWARE, 2008, pp728 – 735

4.        P. Michiardi and R. Molva, "CORE: A Collaborative Reputation Mechanism to enforce node cooperation in Mobile Ad hoc Networks", Proc. IFIP CMS, 2002.

5.        S. Buchegger, and J.-Y. Le Boudec,“A Robust Reputation System for P2P and Mobile Ad-hoc Networks,” Proc. 2nd Workshop Economics of Peer-to- Peer Systems, 2004

6.        H. Deng, W. Li, and D. P, "Routing Security in Wireless Ad Hoc Network", IEEE Communications Magzine, vol 40, 2002.

7.        M.T. Schlosser, "The EigenTrust Algorithm for Reputation Management in P2P Networks," ReCALL, 2003.

8.        S. Ramaswamy et al., "Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks", ICWN’03, USA 2003.

9.        S. Ramaswamy et al, "Simulation Study of Multiple Black Holes Attack on Mobile Ad Hoc Networks," ICWN'05, 2005, pp. 595-604.

10.     F. Li, J. Wu, and B. Raton, "Mobility Reduces Uncertainty in MANETs", Proc. of IEEE INFOCOM, May 2007.

11.     C.W. Yu, et al, Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism for Ad Hoc Networks, Springer 2009.

12.     E. Daly and M. Haahr, "Social Network Analysis for Routing in Disconnected Delay-Tolerant MANETs" Source, 2007, pp. 32-40.

13.     D. Feng and Y. Zhu, "Cooperative Incentive Mechanism Based on Game Theory in MANET" Simulation, 2009, pp. 201-204.

14.     “Security enhancement over ad-hoc aodv routing protocol” By Zongwei Zhou,Department of Computer Science and Technology, Tsinghua University, Beijing, China.






Ravi J, K B Raja

Paper Title:

Concatenation of Spatial and Transformation Features for Off-Line signature Identification

Abstract:   Off- Line signature is a behavioral biometric trait and is widely accepted for personal and document authentication. In this paper we propose Concatenation of Spatial and Transformation Features for Off-Line signature Identification (CSTSI) method to distinguish genuine signature form skilled forgery signatures. The Discrete Wavelet Transform (DWT) is applied on signature to derive transform domain features from all the four sub bands. The signature is preprocessed and global features are extracted leads to spatial domain features. The transform domain and spatial domain features are concatenated to obtain final set of features. The test signature features are compared with data base signature features vector using correlation technique. It is observed that the values of FAR and EER are low in the case of proposed algorithm compare to existing algorithm. As FAR value is less, that indicates skilled forgery is successfully rejects.

 Signature. Global Features, DWT, Correlation, Fusion


1.       Guangyu Zhu, Yefeng Zheng, David Doermann and Stefan Jaeger, “Signature Detection and Matching for Document Image Retrieval,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 31, pp. 2015-2031, 2009.
2.       Luana Batista, Eric Granger and Robert Sabourin, “Dynamic Selection of Generative–Discriminative Ensembles for Off-Line Signature Verification,” The Journal of Pattern Recognition, vol. 45, pp.1326–1340, 2012.

3.       Kai Huang and Hong Yan, “Off-Line Signature Verification using Structural Feature Correspondence,” The Journal of the Pattern Recognition Society, vol. 35, pp. 2467–2477, 2002.

4.       Madasu Hanmandlu, Mohd Hafizuddin, Mohd Yusof and Vamsi Krishna Madasu, “Off-Line Signature Verification and Forgery Detection using Fuzzy Modeling,” The Journal of Pattern Recognition Society, vol. 38, pp. 341-356, 2005.

5.       M.N. Eshwarappa and Mrityunjaya V Latte, “Bimodal Biometric Person Authentication System Using Speech and Signature Features,” International Journal of Biometrics and Bioinformatics, vol. 4 pp. 147-160, 2010

6.       Vahid Kiani, Reza Pourreza and Hamid Reza Pourreza, “Offline Signature Verification using Local Radon Transform and Support Vector Machines,” International Journal of Image Processing, vol. 3, pp. 184-194, 2009.

7.       Farhad Shamsfakhr, “System Analysis of Intersections Paths  for Signature Recognition,” International Journal of Image Processing, vol. 5, pp. 610-622, 2011.

8.       J.F. Vargas, M A Ferrer, C M Travieso and J B Alonso, “Off-Line Signature Verification based on Grey Level Information using Texture Features,” The Journal of Pattern Recognition society, vol. 44, pp. 375–385, 2011.

9.       Mohamad Hoseyn Sigari, Muhammad Reza Pourshahabi and Hamid Reza Pourreza, “Offline Handwritten Signature Identification and Verification Using Multi-Resolution Gabor Wavelet,” International Journal of Biometrics and Bioinformatics, vol. 5, pp. 234-248, 2011.

10.     Hemanta Saikia and Kanak Chandra Sarma, “Approaches and Issues in Offline Signature Verification System,” International Journal of Computer Applications, vol. 4, pp. 45-52, 2012.

11.     A. Piyush Shanker and A.N. Rajagopalan, “Off-line signature verification using DTW,” The Journal of Pattern Recognition Letters, vol. 28, pp. 1407–1414, 2007.

12.     Ashwini Pansare and Shalini Bhatia, “Handwritten Signature Verification using Neural Network,” International Journal of Applied Information Systems, vol. 1, pp.
44-49, 2012.

13.     Miguel A Ferrer, J Francisco Vargas, Aythami Morales and   Aaron Ordonez, “Robustness of Offline Signature Verification Based on Gray Level Features,” IEEE Transactions on Information Forensics and Security, vol. 7, pp. 966-977, 2012.

14.     Mehmet Sabih Aksoy and Hassan Mathkour, “Signature Verification using Rules 3-ext Inductive Learning System,” International Journal of the Physical Sciences vol. 6, pp. 4428-4434, 2011.

15.     Meenakshi S Arya and Vandana S Inamdar, “A Preliminary Study on Various Off-line Hand Written Signature Verification Approaches,” International Journal of Computer Applications, vol.1, pp. 55-60, 2010.

16.     Jon Almazan, Alicia Fornes and Ernest Valveny, “A Non-Rigid Feature Extraction Method for Shape Recognition,” IEEE International Conference on Document Analysis and Recognition, pp. 987-991, 2009. 






Rupali Sawant, Mukeshkumar Baghel

Paper Title:

A routing metric for wireless mesh networks with optimal cost and optimal power

Abstract:   As while transmitting packets or data in the network, multiple number of traversal can occur because of the number of links in the data transfer route of source and destination and also the links in the relative position of the link are not accurate. But with some previous efforts it is able to calculate the optimal cost with required number of links in layer transmission but again there occurs the problem of power conjunction means it is more and more difficult to compute the optimal cost along with optimal power. To overcome this problem this paper synthesizes on existing methodology related to optimal path selection through which it exactly finds out the number of links layer which are essential for source to destination packet delivery  and highlight towards how to compute the path with optimal cost along with optimal power.  

 Wireless ad-hoc network, Routing metric, Throughput.


1.        Hongkun Li, Yu Cheng, Chi Zhou AND Weihua Zhuang 2009“Minimizing End-to-End Delay A Novel Routing Metric for Multi-Radio Wireless Mesh Networks”
2.        Gentian Jakllari, Stephan Eidenbenz, Nicolas Hengartner, Srikanth V. Krishnamurthy, Michalis Faloutsos 2012“Link Positions Matter: A Noncommutative Routing Metric for Wireless Mesh Networks”

3.        U.Raghavendra, S.Vasundra”DynamicTransmissin Power Assignment for Energy Conservation Routing in MANETs”

4.        Suman Banerjee and Archan Misra“Energy Efficient Reliable Communication for Multi-hop Wireless Networks”

5.        Suman Banerjee 2002 “Minimum Energy Paths for Reliable Communication in Multi-hop Wireless Networks”

6.        Kurose, J. F.; Ross, K. W. (2010). Computer Networking: A Top-Down Approach (5th ed.).Boston, MA: Pearson Education. ISBN 978-0-13-136548-3.

7.        "The impact of UDP on Data Applications". Networkperformancedaily.com. Retrieved 17 August 2011.





Gaurav Sharma, Shefali Pruthi

Paper Title:

A Review on Various Identity Management Systems

Abstract:   In this era there is a significant growth in identity management solution because of their potential importance as what and how properly they handle the sensitive data. The paper present the review on digital identities which is to be handled by various Identity Management System (IDMs). The paper first provide the definition of Digital Identities and their management. Then these digital identities are embedded in a particular model which is called conceptual model of identity management. Then there is a brief review on various Identity Management system and their advantages and disadvantages as proposed by different authors but our focus is on emerging technology i.e. Microsoft Cardspace and the solution for improving its security vulnerabilities.

 Digital Identities, Identity Management System,  Microsoft  Cardspace, Sensitive Data.


1.        Gail-Joon Ahn, Moonam Ko, and Mohamed Shehab. Portable user-centric identity management. In Proceedings of the IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, Milano, Italy, pages 573{587. Springer-Verlag, 2008.] 
2.        Dieter Gollmann. Computer Security.  John Wiley and Sons, 2004

3.        Identity Management Forum , The Open Group, “White Paper: Identity Management, “Mar2004, http://www.opengroup.org/idm/

4.        Bharat Bhargava1, Noopur Singh2, Asher Sinclair3 “ Privacy in Cloud Computing Through Identity Management” proceeded at International Conference on Advances in Computing and Communication (ICACC April 2011)

5.        (2010) PRIME Framework V3, https://www.primeproject.eu

6.        K. Cameron, M.B. Jones. Design Rationale behind the Identity Metasystem Architecture, http://research.microsoft.com

7.        Privacy And Practicality of Identity Management Systems ,Waleed A. Alrodhan, Technical Report 17 Mar 2010, pges-96

8.        Addressing privacy issues in CardSpace Waleed A. Alrodhan and Chris J. Mitchell Royal Holloway, University of London, Third International Symposium on Information Assurance and Security. Pages 285-291.

9.        A. Bhargav-Spantzel, A. C. Squicciarini, and E. Bertino. Establishing and protecting digital identity in federation systems. In Proceedings of the 2005 ACM Workshop on Digital Identity Management, Fairfax, Virginia, USA, pages 11–19. ACM, November 2005.

10.     U. Fiege, A . Fiat and A. Shamir . Zero Knowledge Proofs of identity. In STOC:  Proceedings of the nineteenth annual ACM conference on Theory of Computing , New York, NY, USA, pages 210-217.ACM, 1987

11.     C. P. Schnorr. Efficient identification and signatures for smart cards. In G. Brassard, editor, Advances in Cryptology– CRYPTO 89: Proceedings of the ninth Annual International Cryptology Conference, Santa Barbara, California, USA, volume 435 of Lecture Notes in Computer Science, pages 239–252. Springer, 1990






Vyankatesh B.Emche , M. D. Pasarkar

Paper Title:

Tool Design for Oval Punching

Abstract:   As method for punching in oval shapes is not readily available, press tool for punching in oval shapes is required in various industries according to their applications. There are press tools for punching in circular shape, but when shapes other than circular shape are desired, they have to design according to dimensions required by industry. As application for oval shape punching differs from industry to industry because dimensions required by industries differ from each other. As some industries require more than one oval shaped holes that is to be done in single stroke for reducing the time required for production, there is need to design such press tool which can perform such operation. Hence to have fast production of required oval size holes, there is need to develop a press tool assembly which can make accurate oval holes on metal sheets. For designing such assembly, it is very necessary to study every aspect of existing design of press tool so that changes required can be easily define. Comparison of existing design with the proposed enables us to find correct way of design.

 Punching Tool, Oval Punching,  sheet metal, sheet metal manufacturing, sheet metal features, selection of material.


1.        ‘’Investigate the effect of shear angle of high speed steel punching tool in punching process’’ mohd khairul mizan bin nasir Faculty of Mechanical Engineering UNIVERSITI MALAYSIA PAHANG
2.        ‘’Design study of the geometry of a punching/ blanking tool’’ U.P. Singh Department of Mechanical and Industrial Engineering, University of Ulster, Jordanstown, UK A.H. Streppel and H.J.J. Kals Department of Mechanical Engineering, Twente University, Enschede, Netherlands

3.        ‘’The optimal clearance design of micro-punching die ‘’J.Ch. Lin a, W.S. Lin b*, K.S. Lee c, J.L. Tong a  a Department of Mechanical Design Engineering, National Formosa University, 64 Wunhua St., Huwei, Yunlin ,Taiwan b Department of Mechanical and Computer-Aided Engineering, National Formosa University, 64 Wunhua St., Huwei, Yunlin ,Taiwan c Department of Mechanical Engineering, Chien Kuo Technology University,  Changhua, Taiwan.

4.        ‘’Manufacturing Features In Cutting Shapes And Punching Holes In Sheet Metal’’ M.Lohtander, J. Varis. Department of mechanical engineering, Lappeenranta University of Technology, P.O.Box 20 53851, Lappeenranta, Finland.

5.        ‘’An Intelligent System For Selection Of Materials For Press Tool Components’’ Kumar Shailendra Department of Mechanical Engineering, S. V. National Institute of Technology, Surat, India.

6.        “Fundamental of Tool Design” by American Society of Tool and manufacturing engineers

7.        “Tool design” by Cyril Donaldson Tata mcgraw hill third edition.






H S Manjunatha Reddy, K B Raja

Paper Title:

Wavelet based Secure Steganography with Scrambled Payload

Abstract:   The Steganography is used for secure communication of information by embedding information in a cover object. In this paper we propose Wavelet based Secure Steganography with Scrambled Payload (WSSSP). The Daubechies Lifting Wavelet Transform (LWT) is applied on cover image. The XD band is decomposed into upper and lower bands for payload embedding. The payload is segmented into four equal blocks. The Harr LWT is applied on alternate blocks of payload to generate F1 and F2 wavelet transform bands. The remaining blocks of payload are retained in spatial domain say S1 and S2. The bit reversal is applied on each coefficient of payload blocks to scramble payload. The cube root is applied on scrambled values to scale down the number of coefficient bits. The payload the embedded into XD band of cover image to generate step object. The decision Factor Based Manipulation (DFBM) is used to scrambled stego object. The Daubechies ILWT2 is applied on stego object to obtain stego image in spatial domain. It is observed that PSNR and capacity of the proposed algorithm is better compared to existing algorithm.

 Steganography, wavelets, Stego image, Payload, Cover Image.

1.       Guangjie Liu, Yuewei Dai, and Zhiquan Wang, “Breaking Predictive-Coding-Based Steganography and Modification for Enhanced Security,” International Journal of
Computer Science and Network Security, pp.144-149, vol.6, no.3B, March 2006.

2.       Yuan-Hui Yu, Chin-Chen Chang and Iuon-Chang Lin, “A new steganographic method for color and grayscale image hiding”,  Elsevier journal Computer Vision and Image Understanding 107, pp- 183–194, 2007.

3.       Shashikala Channalli and andAjay Jadhav, “Steganography An Art of Hiding Data,” Journal of Computer science and Engineering, pp.137-141, vol.1 (3), 2009.

4.       K. Munivara Prasad, V.Jyothsna, S.H.K. Raju and S.Indraneel, “ High Secure Image Steganography in BCBS Using DCT and Fractal Compression,” International Journal of Computer Science and Network Security, pp.162-170, vol.10 no.4, April 2010.

5.       Weiqi Luo;  Fangjun Huang;   Jiwu Huang “Edge Adaptive Image Steganography Based on LSB Matching Revisited,” IEEE transactions on Information Forensics and Security, vol.5, issue.2, pp.201-214, June 2010.

6.       Der-Chyuan Lou, Nan-I Wu, Chung-Ming Wang, Zong-Han Lin and Chwei-Shyong Tsai, “A novel adaptive steganography based on local complexity and human vision sensitivity”, The Journal of Systems and Software 83 (Elsevier), pp. 1236–1248, 2010.

7.       A. A. Zaidan, B. B. Zaidan, Y. Alaa Taqa, M. Kanar Sami, Gazi Mahabubul Alam and A. Hamid Jalab, “ Novel multi-cover steganography using remote sensing image and general recursion neural cryptosystem”, International Journal of the Physical Sciences, vol. 5(11), pp. 1776-1786, September 2010.

8.       Pei-Yu Lin and Chi-Shiang Chan, “Invertible secret image sharing with steganography”, Elsevier Pattern Recognition Letters 31, pp.1887–1893, 2010.

9.       Marghny Mohamed, Fadwa A-Afari  and Mohamed Bamatraf,” Data Hiding by LSB Substitution Using Genetic Optimal Key-Permutation”, International Arab Journal of e-Technology, Vol. 2, No. 1, January 2011.

10.     Lokeswara Reddy, A. Subramanyam and P. Chenna Reddy, “Implementation of LSB Steganography and its Evaluation for Various File Formats,” International journal of Advanced Networking and Applications, pp.868-872, vol.2 (5), 2011.

11.     Amitava Nag, Sushanta Biswas, Debasree Sarkar and Partha Pratim Sarkar, “A Novel Technique for Image Steganography Based on DWT and Huffman Encoding, International Journal of Computer Science and Security, pp.561-570, vol. 4, issue. 6, 2011.

12.     Chia-Chun Wu, Shang-Juh Kao and Min-Shiang Hwang, “A high quality image sharing with steganography and adaptive authentication scheme” The Journal of Systems and Software 84(Elsevier), pp.2196-2207,2011.

13.     Yuting Su,ChengqianZhang N and ChuntianZhang,” A video steganalytic algorithm against motion-vector-based steganography”, Elsevier Signal Processing 91, pp. 1901–1909, 2011.

14.     Zhili Chen, Liusheng Huang, Haibo Miao, Wei Yang and Peng Meng, “Steganalysis against substitution-based linguistic steganography based on context clusters”, Elsevier Computers and Electrical Engineering 37, pp.1071-1081, 2011.

15.     J K Mandal and madhumita Sengupta,   “Authentication/ Secret Message Transformation through Wavelet Transform based Subband Image Coding (WTSIC)” International Symposium on Electronic System Design, pp. 225 – 229, 2010.





Kavitha.M , S.Radha Krishna Reddy,  S. Md. Mazhar-Ul-Haq, JBV Subrahmanyam, R.V Amarnath

Paper Title:

A Novel Concept of Simultaneous Voltage Sag/Swell and Load Reactive Power Compensations Utilizing Series Inverter of UPQC

Abstract:   This paper introduces a new concept of optimal uti- lization of a unified power quality conditioner (UPQC). The series inverter of UPQC is controlled to perform simultaneous 1) volt- age sag/swell compensation and 2) load reactive power sharing with the shunt inverter. The active power control approach is used to compensate voltage sag/swell and is integrated with theory of power angle control (PAC) of UPQC to coordinate the load re- active power between the two inverters. Since the series inverter simultaneously delivers active and reactive powers, this concept is named as UPQC-S (S for complex power). A detailed mathemati- cal analysis, to extend the PAC approach for UPQC-S, is presented in this paper. MATLAB/SIMULINK-based simulation results are discussed to support the developed concept. Finally, the proposed concept is validated with a digital signal processor-based experi- mental study.

 Active power filter (APF), power angle  control (PAC), power quality, reactive power compensation, unified power quality conditioner (UPQC), voltage sag and swell compensation.


1.        R. C. Dugan, M. F. McGranaghan, and H. W. Beaty, Electrical   Power  Systems Quality..    New York: McGraw-Hill, 1996, p. 265.
2.        C. Sankaran,Power Quality.Boca Raton, FL: CRCPress, 2002, p. 202

3.        R. A. Walling, R. Saint, R. C. Dugan, J. Burke, and L. A. Kojovic, “Sum- mary of distributed resources impact on power delivery systems,”  IEEE Trans. Power Del., vol. 23, no. 3, pp. 1636–1644, Jul. 2008

4.        L. Gyugyi, “Unified power-flow control concept for flexible AC transmis- sion systems,” IEE – C Gene. Trans. Distr., vol. 139, no. 4, pp. 323–331, Jul. 1992

5.        N. G. Hingorani and L. Gyugyi, Understanding FACTS: Concepts and Technology of Flexible AC Transmission Systems.New  York: IEEE Press, 2000, p. 432

6.        V. K. Sood, HVDC and FACTS Controllers – Applications of `Static Con- verters in Power Systems.    Boston, MA: Kluwer, 2004, p. 295.

7.        A. Ghosh and G. Ledwich, Power Quality Enhancement Using CustomPower Devices. Boston, MA: Kluwer, 2002, p. 460

8.        B. Singh, K. Al-Haddad, and A. Chandra, “A review of                 active power filters for power quality improvement,” IEEE Trans. Ind. Electron., vol. 45,    no. 5, pp. 960–971, Oct. 1999.

9.        M. El-Habrouk, M. K. Darwish, and P. Mehta, “Active power filters: A review,” IEE Electr. Power Appl., vol. 147, no. 5, pp. 403–413, Sep. 2000

10.     Doncker, C. Meyer, R. W. De, W. L. Yun, and F. Blaabjerg,  “Optimized control strategy for a medium-voltage DVR—Theoretical investigations and experimental results,”  IEEE Trans. Power Electron., vol. 23, no. 6, pp. 2746–2754, Nov. 2008

11.     C. N. Ho and H. S. Chung, “Implementation and performance evaluation of a fast dynamic control scheme for capacitor- supported interline DVR,” IEEE Trans. Power Electron., vol. 25,  no. 8, pp. 1975–1988, Aug. 2010.

12.     Y. Chen, C. Lin, J. Chen, and P. Cheng, “An inrush mitigation technique of load transformers for the series voltage sag  compensator,” IEEE Trans. Power Electron., vol. 25, no. 8, pp. 2211–2221, Aug. 2010

13.     S. Subramanian and M. K. Mishra, “Interphase AC–AC topology for voltage sag supporter,” IEEE Trans.Power Electron., vol 25, no. 2, pp. 514–518, Feb. 2010.

14.     H. Fujita and H. Akagi IEEE Trans. Power Electron.,  vol. 13, no. 2, pp. 315–322, Mar. 1998.

15.     V. Khadkikar and A. Chandra, “A new control  philosophy for a uniified power quality conditioner (UPQC) to coordinate load- reactive power demand between shunt and series inverters,” IEEE Trans. Power Del., vol. 23, no. 4, pp. 2522–2534, Oct. 2008.






K.Gowthami, N.Kumaresan

Paper Title:

Runtime Scheduling Of Dynamic Task Graphs Communication with Embedded Multiprocessors

Abstract:   Multiprocessor mapping and scheduling algorithms have been extensively studied over the past few decades and havebeen tackled from different perspectives.Task scheduling is an essential aspect of parallel programming. Most heuristics for this NP-hard problem are based on asimple system model that assumes fully connected processors and concurrent interprocessor communication. Hence, contention for communication resources is not considered in task scheduling, yet it has a strong influence on the execution time of a parallel program. This paper investigates the incorporation of contention awareness into task scheduling. The proposed methodology is runtime scheduling which is designed to reduce the wastage of time during static scheduling. We have assumed heterogeneous processors with broadcast and point-to-point communication models and have presented online algorithms for them. Experimental results shows that dynamic scheduling provides better performance than static scheduling.

 Static, dynamic, edge scheduling, Heterogeneous processors, Communication between tasks


1.        Feldmann,  J. Sgall, M.-Y. Kao,and S.-H. Teng, “Optimal Online Scheduling of Parallel Jobs with Dependencies,” Proc. 25th Ann. ACM Symp. Theory of Computing (STOC ’93) pp. 642-651, 1993.
2.        K. Agrawala, D. Moss, S. Noh, B. Trihn, and .MultipleResource Allocation for Multiprocessor Distributed Real-Time Systems.In Workshop on Parallel and Dist.Real-Time Syst., April 1993.

3.        Hou , J. Yang, X. Ma,  and Z. Yao, “A Static Multiprocessor Scheduling Algorithm for Arbitrary Directed Task Graphs in Uncertain Environments,” Proc. Eighth Int’l Conf. Algorithms and Architectures for Parallel Processing (ICA3PP ’08), pp. 18-29, 2008.

4.        E. A. Lee, G. C. Sig, “Scheduling to Account forInterprocessor Communication Within Interconnection- Constrained Processor Network,” 1990 InternationalConference on Parallel Processing, Vol. 1,pp. 9-17, August 1990.

5.        H. El-Rewini and T. G. Lewis, “Scheduling ParallelProgram Tasks onto Arbitrary Target Machines,” Journalof Parallel and Distributed Computing, Vol. 9, No. 2, pp.138-153, June 1990.

6.        J. Jung,.K. Shin, M. Cha, M. Jang, , W. Yoon, and S. Choi, “TaskScheduling Algorithm Using Minimized Duplications in Homogeneous Systems,” J. Parallel Distributed Computing, vol. 68, no. 8, pp. 1146-1156, 2008.






Rashmi Jagade, Sridevi.K.N, Jitendranath Mungara

Paper Title:

Distributed Computing Solution forHardware-In-LoopSimulation of Indian Satellites

Abstract:   The purpose of Hardware-In-Loop-Simulation (HILS) is to verify the hardware interface of On-Board- Computer (OBC) with flight sensors and actuators and to validate the closed loop performance of attitude and control elements (AOCE) for various control modes in real-time. This document presents distributed computingconfiguration of computing elements that interact mutually to achieve the real-time performance of hardware-in-loop simulation. The system architecture proposed is used successfully toaccomplish the real time closed loop performance for HILS. By distribution of resources, we can achieve thecomplex computationrequirements of spacecraft dynamics simulation, telemetry (TM), telecommand (TC) and star simulation with optimized delay.

 HILS;AOCE;Real-time; Computing elements


1.        Evolution of Hardware in Loop For Saellites, Indian Space Research Organization Bangalore,July 2008.
2.        Jr, Harry Katzen., An introduction to Distributed Data Processing, Petrocelli Book, 1978.

3.        Xue Ming, Zhu Changjun, “The Socket Programming and Software Design for Communication Based on Client/Server,” 2009 Pacific-Asia Conference on Circuits,Communications and systems, p 775-777.

4.        Modifications of HILS Facility , Indian Space Research Organization Bangalore, December 2004.

5.        (2002) The IEEE website. [Online]. Available: http://www.ieee.org.





Sonu Rana, Rakesh Gill

Paper Title:

FPGA based Remote Monitoring System for Food Preservation

Abstract:   Food security is the assured access to adequate food that is nutritious, of good quality, safe and meets cultural needs. In food production industries, performing visits for 24 hours evaluation is a difficult and time consuming process. In order to improve monitoring level for food industries, an intelligent system has been designed. Eight analog parameters Temperature, PH, humidity, water activity, redox potential, pressure, concentration and CO2 are monitored. The data acquisition is done through eight analog potentiometers and the parameters are monitored using FPGA. The developed system has been tested with RTD temperature sensors and information is transmitted through wireless communication to user mobile at remote place if any failures occur in the system. Thus for good food quality, FPGA and GSM based remote monitoring is performed to improve the status of production. The work represents the idea of real time monitoring and control of multi sensors food security application. The system is low cost, flexible, fast and reconfigurable.

 Remote monitoring, wireless, multi sensors


1.       http://en.wikipedia.org/wiki/Food_preservation
2.       Shashikant Sadistap, Satish Bindal, B. A. Botre and KSN Rao. “Wireless multi-sensor embedded system for Agro-industrial monitoring and control” International Journal on Advances in Networks and Services, vol 3 no 1 & 2, 2010.

3.       Liangli Xiao, Yawen Zheng. “The Implementation of remote digital video Monitoring technology in the construction projects”. International Conference on Mechanic Automation and Control Engineering (MACE), IEEE 26-28 June 2010.

4.       Jifeng Ding, Jiyin Zhao ,Biao Ma “Remote monitoring system of temperature and humidity based on GSM” IEEE,2nd  International congress on Image and signal
processing ,17-19 oct 2009, Tianjin, China.

5.       Shashikant Sadistap, Satish Bindal and K. S. N. Rao. “Multi-sensor embedded systems for agro industrial applications Third International Conference on Sensor
Technologies and Applications, SENSOR COMM 2009, June 18-23 2009 –Athens/ Vouliagmeni , Greece.

6.       Jifeng Ding, Jiyin Zhao ,Biao Ma “Remote monitoring system of temperature and humidity based on GSM” IEEE,2nd  International congress on Image and signal processing ,17-19 oct 2009, Tianjin, China.

7.       Andrew Mason, Navid Yazdi and Abhijeet V. Chavan “A generic multielement microsystem for portable wireless applications”.

8.       web.itu.edu.tr/~kilicmer/gid416e/FoodPreservation.ppt

9.       SPARTAN-3E data sheet , ds031.pdf

10.     GSM Board user Manual (Courtesy –Advance Technology, India)






R.M. Belokar, Vikas Kumar, Sandeep Singh Kharb

Paper Title:

An Application of Value Stream Mapping In Automotive Industry:  A Case Study

Abstract:   Studies on applications of lean in a continuous process industry are limited. There is lot of opportunities for improvement in the process industries like automobile industry if lean tools are utilized. This paper addresses the application of Value Stream Mapping as one of the Lean tools to eliminate waste, and improved operational procedures and productivity. Current state map is prepared and analyzed and suggested to improve the operational process. Accordingly the future state map is drawn. The study reveals that there is an improvement in the takt time by implementing the proposed changes if incorporated in the future state map.

 Current state map, future state map, takt time, Value Stream Mapping (VSM)


1.       O. Ram Mohan Rao 1*, Dr. K Venkata Subbaiah 2, Dr. K Narayana Rao 3, T Srinivasa Rao ; Enhancing Productivity of hot metal in Blast furnace -A case study in an Integrated Steel Plant; O. Ram Mohan Rao et al. / International Journal of Engineering Science and Technology (IJEST) ISSN :
2.       Marcello BRAGLIA_, Gionata CARMIGNANI , Francesco ZAMMORI Dipartimento di Ingegneria Meccanica, Nucleare e della Produzione, Università di Pisa, A NEW VALUE STREAM MAPPING APPROACH FOR COMPLEX PRODUCTION SYSTEMS; International Journal of Production Research.

3.       S. P. Vendan *, K. Sakthidhasan; Reduction of Wastages in Motor Manufacturing Industry; Jordan Journal of Mechanical and Industrial Engineering Pages 579 - 590 Volume 4, Number 5, November 2010 ISSN 1995-6665.

4.       D. Rajenthirakumar*, P.V. Mohanram, S.G. Harikarthik, Department of Mechanical Engineering,PSG College of Technology, Coimbatore; Process Cycle Efficiency Improvement Through Lean: A Case Study; Issue 1 (June 2011 International Journal of Lean Thinking Volume 2,

5.       Yang-Hua Lian, Hendrik Van Landeghem Department of Industrial Management Ghent University; an application of simulation and value stream mapping in lean manufacturing; Proceedings 14th European Simulation Symposium A. Verbraeck, W. Krug, eds.  (c) SCS Europe BVBA, 2002. [7] Lixia ChenSchool of Economics and Management, Changchun University of  Science and Technology; The Application of Value Stream Mapping  Based Lean Production System; International Journal of Business  and Management Vol. 5, No. 6; June 2010

6.       William M. Goriwondo*, Samson Mhlanga, Alphonce Marecha National University of Science and Technolog Department of Industrial and Manufacturing Engineering; use of the value stream mapping tool for waste reduction in manufacturing. case study for bread manufacturing in zimbabwe; Proceedings of the 2011
International Conference on Industrial Engineering and Operations Management Kuala Lumpur, Malaysia, January 22 – 24, 2011.

7.       Stephen L. Woehrle, Minnesota State University, Mankato Louay Abou-Shady, Minnesota State University, Mankato; Using Dynamic Value Stream Mapping and Lean Accounting Box Scores to Support Lean Implementation; 2010 EABR & ETLC Conference Proceedings Dublin, Ireland.
8.       Jon H. Marvel1; Charles R. Standridge2 1Gettysburg College (USA); 2Grand Valley State University (USA); A simulation-enhanced lean design process; doi:10.3926/jiem.2009.v2n1.p90-113 ©© JIEM, 2009 – 2(1): 90-113 – ISSN: 2013-0953
9.       Rother, M. & Shook, J. (1999), "Learning to See: Value Stream Mapping to Add Value and Eliminate Muda", Brookline, MA: Lean Enterprise Institute (www.lean.org).






J.Suganthi, N.Kumaresan, K.Anbarasi

Paper Title:

Design of Power Efficient divide by 2/3 Counter using E-TSPC based Flip Flops

Abstract:   High speed and low power are two major challenges for modern communication circuit designs. A frequency divider is a good example that requires balance between the two sides. An extended true-single-phase-clock (E-TSPC) based divide-by-2/3 counter design is proposed in this paper which can be used for low supply voltage and low power consumption applications. By using a wired OR scheme only one transistor is needed to implement both the counting logic and the mode selection control. This can enhance the working frequency of the counter due to a reduced critical path between the E-TSPC flip flops.

 D flip-flop (DFF), frequency divider, frequency synthesizer, Extended TSP

1.        Yin-Tsung ,Hwang and Jin-Fa Lin  Low Voltage and Low Power Divide-By-2/3 Counter Design Using Pass Transistor Logic Circuit Technique IEEE Transactions on Very Large Scale Integration  (VLSI) Systems
2.        M.C.Wong,C.Wong,V.S.L.Cheung, and H.C.Luong,“A1-V 2.5-mW 5.2-GHz frequency divider in a 0.35-um CMOS process,”  IEEE J. Solid-State Circuits, vol. 38, no. 10, pp. 1643–1648, Oct. 2003.

3.        J. Yuan and C. Svensson, “High-speed CMOS circuit techniques,”IEEE J. Solid-State Circuits, vol. 24, no. 1, pp. 62–70, Feb. 1989.

4.        Q. Huang and R. Rogenmoser, “Speed optimization of edge-triggered CMOS circuits for gigahertz single-phase clocks,” IEEE J. Solid-State Circuits, vol. 31, no. 3, pp. 456–465, Mar. 1996.

5.        B.Chang,J.Park,andW.Kim,“A1.2GHzCMOSdual-modulus prescaler using new dynamic D-type flip-flops,” IEEE J. Solid-State Circuits, vol. 31, no. 5, pp. 749–752, May 1996.

6.        N.Soares,JrandW.A.M.VanNoije“A1.6-GHz dual modulus prescaler using the extended true-single-phase-clock CMOS circuit technique (E-TSPC),” IEEE J. Solid-State Circuits,vol.34,no.1,pp. 97–102, Jan. 1999.






Ramachandra A C, K B Raja, Venugopal K R, L M Patnaik

Paper Title:

Non Minitia Fingerprint Recognition based on Segmentation

Abstract:   The biometric identification of a person has an advantage over traditional technique. Widely used biometric is Fingerprint to identify and authenticate a person. In this paper we propose Non Minutia Fingerprint Recognition based on Segmentation (NMFRS) algorithm. The variance of each block is determined by segmenting the finger print into 8*8 blocks. Area of Interest (AOI) is obtained by removing the blocks with minimum variance. Features of Finger Print is obtained by applying Discrete Cosine Transform (DCT) on AOI and converted to major and minor non-overlapping blocks to determine variance. The percentage recognition rate is better in the proposed algorithm compared to the existing algorithms

Keywords:  Biometrics, DCT, Fingerprint, Percentage Recognition Rate, Ridge Spatial Frequency. 


1.       M P Dale, and M A Joshi, “Fingerprint Matching using Transform Features,” Technology, Education and Networking Conference, pp. 1-5, 2008.
2.       Keming Mao, Zhiliang Zhu and Huiyan Jiang, “A Fast Fingerprint Image Enhancement Method,” Third International Joint Conference on Computational Science and Optimization, pp 222- 226, 2010.

3.       Xuejing Jiang, Ye Liu and Xiaolei Wang, “ An Enhanced Location Estimation Approach based on Fingerprinting Technique,” International Conference on Mobile Computing and Communications, pp 424-427, 2010.

4.       Hendrik Lemelson, Sascha Schnaufer and Wolfgang Effelsberg, “Automatic Identification of Fingerprint Regions for Quick and Reliable Location Estimation,” Eighth IEEE International Conference on Pervasive Computing and Communications, pp 540-545, 2010.

5.       Keokanlaya Sihalath, Somsak Choomchuay, Shatoshi Wada and Kazuhiko Hamamoto, “ Fingerprint Image Enhancement with Second Derivative Gaussian Filter and Directional Wavelet Transform, ” Second International Conference on Computer Engineering and Applications, pp 112-115, 2010.

6.       Sanna Pasanen, Keijo Haataja, Niina Päivinen and Pekka Toivanen, “ New Efficient RF Fingerprint-Based Security Solution for Bluetooth Secure Simple Pairing,” Forty Third Hawaii International Conference on System Sciences, pp 1-8, 2010.

7.       Mohammad O. Derawi, Davrondzhon Gafurov, Rasmus Larsen, Christoph Busch and Patrick Bours, “Fusion of Gait and Fingerprint for User Authentication on Mobile Devices,” Second International Workshop on Security and Communication Networks , pp 1-6, 2010.

8.       Yi Wang and Jiankun Hu, “Global Ridge Orientation Modeling for Partial Fingerprint Identification,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol 1, Issue 99, pp 1-18, 2010.

9.       Zhang Yuanyuan and Jing Xiaojun, “Spectral Analysis Based Fingerprint Image Enhancement Algorithm,” International Conference on Image Analysis and Signal Processing, pp 656-659, 2010.

10.     Ashwini R. Patil and  Mukesh A. Zaveri, “ A Novel Approach for Fingerprint Matching using Minutiae,” Fourth Asia International Conference on Mathematical Analytical Modelling and Computer Simulation, pp 317-322, 2010.

11.     Yanan Meng,“An Improved Adaptive Pre-processing Method for Fingerprint Image,” Second International Conference on Computer Engineering and Applications, pp 661-664, 2010.

12.     Haiyun Xu, R N J Veldhuis, A M Bazen, T A M  Kevenaar, A H M Akkermans, and B Gokberk, “ Fingerprint Verification using Spectral Minutiae Representations,” IEEE Transactions on Information Forensics and Security, vol. 4, no.3, pp.397-409, 2009.

13.     Yunye Jin, Wee-Seng Soh, and Wai-Choong Wong, “Error Analysis for Fingerprint-Based Localization,” IEEE Communications Letters, vol 14, no 5, pp 393-395, 2010.

14.     Radu Miron and Tiberiu Leţia, “Fuzzy Logic Decision in Partial Fingerprint Recognition,” IEEE International Conference on Automation Quality and Testing Robotics, pp 1-6, 2010.

15.     Chao Chen, David Zhang, Lei Zhang and Yongqiang Zhao, “Segmentation of Fingerprint Image by Using Polarimetric Feature,”International Conference on Autonomous and Intelligent Systems, pp 1-4, 2010

16.     Yi Hu, Xiaojun Jing, Bo Zhang and Xifu Zhu, “Low Quality Fingerprint Image Enhancement Based on Gabor Filter,”Second International Conference on Advanced Computer Control, Vol 2, pp 195 – 199,2010.

17.     Jiaojiao Hu and Mei Xie, “ Fingerprint Classification Based on Genetic Programming,” Second International Conference on Computer Engineering and Technology, Vol 6, pp 193 -196, 2010.

18.     Raffaele Cappelli, Matteo Ferrara, and Davide Maltoni, “Minutia Cylinder-Code a new Representation and Matching Technique for Fingerprint Recognition,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Issue 99, 2010.

19.     Hengzhen Gao, Mrinal K. Mandal, Gencheng Guo and Jianwei Wan, “Singular Point Detection using Discrete Hodge Helmholtz Decomposition in Fingerprint Images,”IEEE International Conference on Acoustics Speech and Signal Processing, pp 1094 – 1097, 2010.

20.     Jun Ma, Xiao jun Jing, Bo Zhang, and Songlin Sun, “An effective algorithm for fingerprint reference point detection,” Second International Conference on Advanced Computer Control, Vol 2, pp 200 – 203, 2010.





G.R. Rameshkumar, B.V.A. Rao, K.P. Ramachandran

Paper Title:

Use of Radial Basis Function Neural Networks for Analysis of Unbalance in Rotating Machinery

Abstract:   Rotor unbalance is the most common cause of vibration in any rotating machinery. The Coast Down Time is used as a condition monitoring parameter to monitor the rotating machinery. The CDT is the total time taken by the system to dissipate the momentum acquired during sustained operation, which is an indicator of mechanical faults. Experiments were carried out on Forward Curved Centrifugal Blower to record the CDTs at selected blower shaft cut-off speeds of 1000 rpm, 1500 rpm, 2000 rpm and 2500 rpm respectively for various unbalance conditions. These experimental CDT data were used to train the neural network. The paper also discusses the successful incorporation of radial basis function neural network (RBF-NN) for the CDTs prediction for unbalance fault conditions. The results showed that the RBFNN predicted CDT values are very close to the experimental CDT values

Keywords:  Coast down time, Radial basis function neural network, Rotating machinery, Unbalance.


1.       Victor Wowk, “Machinery vibration measurement and analysis,” McGraw-Hill, Inc, 1991, pp. 127-130.
2.       T. L. Daugherty and R. J. Craig, “Coast down Time as a Mechanical Condition Indicator,” DTNSRDC Report, pp. 45-47, 1976. 

3.       R. Edwin Browne, K. P. Ramachandran, A. K. M. De Silva, and D. K Harrison, “An experimental investigation to analyze the effect of unbalance in a horizontal rotor system using coast down factor,” International Journal  of COMADEM, 10(3), pp. 11-18, July 2007. 

4.       K. P. Ramachandran, M. Z. K. Malik, and A. Abdul Harees, “CDT analysis as a tool for evaluating bearing lubrication and mechanical conditions,” Caledonian Journal of Engineering, pp. 19–24, Dec. 2004.

5.       K. Mehrotra, C.K. Mohan and S. Ranka, “Elements of artificial neural networks,” Mumbai, Penram International, 1997.

6.       R. B. Randall, Ed, “Special issue on gear and bearing diagnostics,” Mechanical Systems and Signal Processing, vol. 15(5), pp. 827-1029, 2001.

7.       B. Samanth and K. R. Al Balushi, “Artificial neural network based fault diagnostics of rolling element nearing using time-domain features,” Mechanical Systems and Signal Processing, vol. 17(5), pp. 317-328, 2003.

8.       A. Baraldi and N. A. Borghese, “Learning from data: general issues and special applications of radial basis function networks,” Tech. Rep. TR-98-028, International Computer Science Institute, Berkeley, California, USA, 1998.
9.       J. Park and I. W. Sandberg, “Universal approximation using radial basis function networks,” Neural Computation, vol. 5, no.2, pp. 305-316, 1993. 
10.     L. B. Jack, A. K. Nandi, and A. C. McCormick, “Diagnosis of rolling element bearing faults using radial basis functions,” EUEASIP Journal on Applied Signal Processing, vol. 6, pp. 25-32, 1999.

11.     L. Govindarajan and P. L. Sabarathinam, “Prediction of vapor-liquid equilibrium data by using radial basis neural networks,” Chem. Biochem. Eng. Q. 20 (3), pp. 319-323, 2006. 

12.     G. R. Rameshkumar, B. V. A. Rao, and K. P. Ramachandran, “An experimental investigation to study the effect of misalignment using CDT as a condition monitoring parameter for rotating machinery,” 22nd International Congress, COMADEM 2009, San Sebastian, Spain, pp. 531-539, June 2009.

13.     F. Li. Min, “Neural networks in computer intelligence,” 1st ed. Singapore: McGraw-Hill, 1994.

14.     L. Govindarajan, “Optimal design of reactors,” Ph.D Thesis, Annamalai University, India, 2005.

15.     Neural Networks Toolbox User’s guide, 1st ed. The Math Work Inc, Mass, 1994.  
16.     G. R. Rameshkumar, B. V. A. Rao, and K. P. Ramachandran, “Condition monitoring of forward curved centrifugal blower using coast down time analysis,” International Journal of Rotating Machinery, vol. 2010, article ID 962804, 12 pages, doi: 10.1155/2010/962804.






C. Bhargava, Imran, P.S.R. Murty

Paper Title:

Reliability cost Assessment for upgrading feeder by using customer surveys

Abstract:   Reliability cost/worth analysis involves an assessment of the costs of providing reliable service and a separate quantification of the worth of having that service. Uninterrupted electric power supply is a desire of a customer, although it is not realistic. For interruption costs assessments to be specific, they should obtain information that is customer specific. The customer survey approach is based on the assumption that the customer is in the best position to estimate the losses resulting from a power interruption. This customer survey approach presents a method to quantify the loss of the customers into monetary terms, due to electric power interruption. the major contribution of this paper, using survey method it is not only possible to obtain absolute power interruption costs for different customers but also shows the variation in interruption costs with the variation in interruption duration for each type of customer. Hence, these cost calculations can be further be used for the evaluation of other cost worth indices which will be useful for the future/reinforcement options for the reliability worth.

 reliability worth assessment, customer surveys, interruption cost assessments


1.       Wacker. G. and Billinton, R...” Customer Cost of Electric Interruptions." IEEE Proceedings, Vol. 77.No. 6. 1989.
2.       R.Billinton, G.Wacker, and E.Wojczynski, “Comprehensive Bibliography on Electric Service Interruption Costs,” IEEE Trans .Power App. And Syst., vol.PAS-102, no.6
,pp.1831 -1837,1983

3.       Shipley. R. B., Patton. A. D. and Denison, J. S., “Power Reliability Cost Vs. Worth," IEEE Transactions on Power Apparatus and System. Vol.PAS-91. No.5. Sept/Oct. 1972. pp 2204-22 12.

4.       Corwin, J. and Miles, W., “Impact Assessment of the 1977 Blackout," New York City U.S. Department of Energy, Washington, D.C., July 1978.

5.       Billinton, R., Wacker, G. and Tollefson, G., "Assessment of Reliability Worth in Electric Power Systems in Canada," Final Report for NSERC Strategic Grant STR0045005, June 1993.

6.       Wojczynski, G.., Billinton,R.,Wacker,G., ‘Interruption costs methodology and results – a Canadian commercial and small industrial survey’, IEEE Trans. Power App.sys., 103(1984),pp.437-43.

7.       IEEE Committee,’ report on reliability survey of industrial plants. part II. Cost of power outage, plant restart time, critical service loss, duration, time and type of loads lost versus time of power outages’, IEEE trans .industry appl.,IA-10,(1976),pp.236-41.

8.       Billinton,R.,Wacker,G.,Wojczynski,E.,Customer Damage Resulting from Electric Service Interruptions ,Canadian Electrical Association R&D Research Project 3409 U 131 Rep.(1982).

9.       Wacker,G.,Billinton, R., Farm Losses Resulting from Electric Service Interruptions, Canadian Electric Association R&D Research project 3409 U 403, May(1987).

10.     Assessment of Interruption Costs for Residential Customer in Korea S.B.Choi, K.Y.Nam, D.K.Kim, S.H.Jeong, J.D.Lee, H.S.Rhoo*Korea Electro technology Research Institute of Korea 28-1 Seong-ju Dong Changwon City KyungNam Province, Korea

11.     Roybillinton, wenyuan li,”reliabilityaement of electrical power systems”, plenim press 1994

12.     Nava Raj Karki,student member,IEEE,’Residential Customer Outage Cost Valuation For Urban Areas in Nepa






Prashanth C R, K B Raja, Venugopal K R, L M Patnaik

Paper Title:

Intra-modal Score level Fusion for Off-line Signature Verification

Abstract:   Signature is widely used as a means of personal verification which emphasizes the need for a signature verification system. Often the single signature feature may produce unacceptable error rates. In this paper, Intra-modal Score level Fusion for Off-line Signature Verification (ISFOSV) is proposed. The scanned signature image is skeletonized and exact signature area is obtained by preprocessing. In the first stage 60 centers of signature are extracted by horizontal and vertical splitting. In the second stage the 168 features are extracted in two phases. The phase one consists of dividing the signature into 128 blocks using the center of signature by counting the number of black pixels and the angular feature in each block is determined to generate 128 angular features. In the second phase the signature is divided into 40 blocks from each of the four corners of the signature to generate 40 angular features. Totally 168 angular features are extracted from phase one and two to verify the signature. The centers of signature are compared using correlation and the distance between the angular features of the genuine and test signatures is computed. The correlation matching score and distance matching score of the signature are fused to verify the authenticity. A mathematical model is proposed to further optimize the results. It is observed that the proposed model has better FAR, FRR and EER values compared to the existing algorithms.

 Biometrics, Off-line Signature Verification, Image Splitting, Center of Signature, Angular Features, Correlation.


1.        Jesus F Vargas, Miguel A Ferrer, Carlos M Travieso, and Jesus B Alonso, “Off-line Signature Verification Based on Psuedo-Cepstral Coefficients,” International Conference on Document Analysis and Recognition, pp. 126-130, 2009.
2.        Ramachandra A C, Pavithra K, Yashasvini K, K B Raja, Venugopal K R and L M Patnaik, “Off-line Signature Verification based on Cross-Validation for Graph Matching,” IEEE International Conference on Electrical and Electronics (INDICON-2008),  pp. 17-22,  2008.

3.        Milena R P Souza, Leandro R Almeida, and George D C Cavalcanti, “Combining Distances Through an Auto-encoder Network to Verify Signatures,” tenth Brazilian Symposium on Neural Networks, pp.63-72, October 2008.

4.        Stephane Armand, Michael Blumenstein and Vallipuram Muthukkumarasamy, “Off-line Signature Verification using the Enhanced Modified Direction Feature and Neural-based Classification,” IEEE International Joint Conference on Neural Networks, pp. 684 -689, July 2006.

5.        Arun Ross and Anil Jain, “Information Fusion in Biometrics,” Pattern recognition Letters, Vol. 24, pp. 2115-2125, 2003.

6.        Manuel R. Freire, Julian Fierrez and Javier Ortega-Garcia, “Dynamic Signature Verification with Template Protection using Helper Data,” IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1713-1716, 2008.

7.        Alonso-Fernandez, MC Fairhurst, J. Fierrez and J. Ortega-Garcia, “Impact of Signature Legibility and Signature Type in Off-line Signature Verification,” IEEE International Biometrics Symposium, pp.1-6, September, 2007.

8.        Lucas Ballard, Daniel Lopresti and Fabian Monrose, “Forgery Quality and its Implications for Behavioral Biometric Security,” IEEE Transactions on System, Man and Cybernetics, Vol. 37, No. 5, pp.1107-1118, October 2007.

9.        Alessendro Zimmer and Lee L Ling, “A Model Based Signature Verification System,” IEEE International Conference on Biometrics: Theory, Applications, and Systems, pp.1-6, September. 2007.

10.     Banshider Majhi, Y Santhosh Reddy and D Prasanna Babu, “Novel Feature for Off-line Signature Verification,” International Journal of Computers, Communication and Control, Vol. 1, No. 1, pp. 17-24, 2006.

11.     Nidal S Kamel, Shohel Sayee and Grant A Ellis, “Glove-based Approach to On-line Signature Verification, “IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 30, No. 6, pp. 1109-1113, June 2008.

12.     Hanno Coetzer and Robert Scbourin, “A Human-Centric Off-line Signature Verification System,” Ninth International Conference on Document Analysis and Recognition, pp. 1-6, August 2007.

13.     Ramachandra A C, Jyothi Srinivasa Rao, K B Raja, K R Venugopal and L M Patnaik, “Robust Off-line Signature Verification Based On Global Features,” IEEE International Advance Computing Conference, pp. 1173-1178, March 2009.

14.     Luiz S Oliveira, Edson Justino, and Robert Sabourin, “Off-line Signature Verification using Writer-Independent Approach,”  International Joint Conference on Neural
Networks, pp. 2539-2544, August 2007.

15.     M Taylan Das and L Canan Dulger, “Off-line Signature Verification with PSO-NN Algorithm,” Seventh International Conference on Intelligent Systems Design and Applications, pp. 843 – 848, 2007.

16.     George Azzopardi and Kenneth P Camilleri, “Off-line Handwritten Signature Verification using Radial Basis Function Neural Networks,” IEEE International Conference on Electrical and Electronics (INDICON-2008), pp. 17-22, 2008.

17.     Samaneh Ghandali and Mohsen Ebrahimi Moghaddam, “Off-line Persian Signature Identification and Verification Based on Image Registration and Fusion,” Journal of Multimedia, Vol. 4, No. 3, pp.137-144, June 2009.

18.     Debasish Jena, Banshidahar Majhi, and Sanjay Kumar  Jena, “Improved Off-line Signature Verification Scheme using Feature Point Extraction Method,” Journal of Computer Science, pp. 111-116, 2008.

19.     H N Prakash and D S Guru, “Relative Orientations of Geometric Centroid for Off-line Signature Verification,” International Conference on Advances in Pattern Recognition, pp. 201-204, 2009.

20.     Wan-Suck Lee, N Mohankrishnan, and Mark J Paulik, “Improved Segmentation through Dynamic Time Warping for signature Verification using a Neural Network Classifier,” International Conference on Image Processing, Vol. 2,  pp. 929-933, 1998.

21.     Prashanth C R,  K B Raja, K R Venugopal, and L M  Patnaik, “Standard Scores Correlation based Off-line Signature Verification System,” International Conference on Advances in Computing, Control, and Telecommunication Technologies, pp. 49- 53, 2009.

22.     V A Bharadi and H B Kekre, “Off-line Signature Recognition Systems,” International Journal of Computer Applications, Vol. 1, No. 27, pp. 61-70, 2010.

23.     Prashanth C R and K B Raja, “Off-line Signature Verification based Angular Features,” International Conference on Computer Modeling and Simulation, pp. 362- 366, 2011.

24.     Tirtharaj Dash, Tanishta Nayak and Subaghata Chattopadhyay, “Offline Handwritten Signature Verification using Associative Memory Net,” International Journal of Advanced Research in Computer Engineering and Technology, Vol. 1, No. 4, pp. 370-374, 2012.






Konda Vijayasree , Siva S Yellampalli

Paper Title:

Design & Implementation of E1 to STM-1 Frame and Deframe

Abstract:  This paper describes the design and implementation of E1 frame and generating STM-1 frame multiplexing 64 E1 Frames, as well as degenerating E1 frame from STM-1 frame. The design of Formatter & Analyzer is implemented in Verilog HDL, functionally validated by simulation, carried out by RTL to GDSII tool and synthesized to get resource utilization and implemented on an FPGA for functionality verification, and the power analysis and area calculation of the  framer is analyzed using Cadence  v6.1.4 and Xilinx 13.2. The designed framer can be used for generation and analysis of E1 frame that has a data rate of 2.048 Mbps and STM-1 frame that has a data rate of 155.52 Mbps

 PRBS, E1 frame, scrambler, descrambler, clock divider.


1.        Data communication & Networking: E and T carrier, Available: http://datacombasic.blogspot.in/2011/03/e-and-t-carrier.html.
2.        Khamer Fathima U B, Nandini, Vijay Ramprasad “Design and Implementation of E1 submultiframe (SMF) Formatter and Analyzer’’ 2011.

3.        ITU-T Recommendation G.702, “Digital Hierarchy bit rates”,1988.

4.        TEKTRONIX, INC. “SDH Telecommunications Standard Primer” http://www.tektronics.com/optical.

5.        E2-E3: Enterprise & Wholesale, “SDH Overview, CPE, Protection schemes” april-2011.

6.        SDH.PG.OPT.TM.AE, Available:     http://www.jdsu.com/ProductLiterature/sdh_pg_opt_tm_ae.pdf.

7.        “Microwave Radio Transmission Design Guide”, Second Edition,Trevor Manning-2009.

8.        ITU-T Recommendation G.704 “Synchronous frame structures used at 1544, 6312, 2048, 8448 and 44736 kbit/s  hierarchical levels”,1998.

9.        ITU-T, Recommendation G.706, “General Aspects of Digital Transmission Systems”,  1991.

10.     ITU-T, Recommendation G.707, “Network Node Interface for Synchronous Digital Hierarchy”, 2003.






Pallavi Dhade, T.J.Parvat

Paper Title:

Frequent Element Pattern Matching To Evade Deep Packet Inspection in NIDS

Abstract:   To detect hostile traffic in network segments or packets , Signature based Network Intrusion Detection Systems (NIDS) uses  a set of rules which are so effective in detecting anomalous behavior like  known attacks that hackers look for new techniques to go unobserved. Some of the techniques involves, in the manipulations of obscurities of network protocol. At the present, the detection techniques are developed against most of these elusive and equivocal techniques by means of identifying and recognizing. The appearance of new elusive forms may possibly effect NIDS to be unsuccessful. This paper presents an innovative functional framework to perform modeling over NIDS. Main, NIDS demonstrated precisely through Apriori algorithm. At this point, the paper consists of watching for circumventions on models are simpler and easier than directly trying to understand the behavior of NIDS. We present a proof of concept showing how to perform deep packet inspection in NIDS using two publicly available datasets. This framework can be used for  analyzing ,Modeling and detecting the commercial NIDS after elusion.

 Apriori Algorithm, Deep packet inspection, Network Intrusion Detection systems, frequent elements matching, High speed network


1.        Xu Kefu, Guo Li, Tan Jianlong, Liu Ping,”Traffic aware frequent element matching algorithm for Deep Packet Inspetion”,International Conference on Network Security,wireless communication & Trusted Computing, 2010 .
2.        Sergio Pastrana Agustin Orfila Arturo Ribagorda,”A functional framework to evade NIDS”, Hawaii International conference on System Sciences , 2011 .

3.        J. R. Koza, ''Genetic Programming: On the Programming of  Computers”, International conference on security sciences,                                           2010.
4.        S. Pastrana, A. Orfila, and A. Ribagorda, “Modeling NIDS evasion with Genetic Programming”, on the  Proceedings of   The 2010 International Conference on  Security and Management, SAM 2010.

5.        L. Juan, C. Kreibich, C.-H. Lin, and V. Paxson, "A Tool for   Offline and Live Testing of Evasion Resilience in     Network Intrusion Detection Systems,",5th international conference on Detection of Intrusions and Malware, and Vulnerability,2008

6.        M. Hall, E. Frank, G. Holmes, B. Pfahringer, P.Reutemann, H. Witten, ''The WEKA Data Mining Software: An Update'', An extensive empirical study of    feature  selection metrics for text classification, 2009.

7.        Po-Ching Lin; Ying-Dar Lin; Tsern-Huei Lee; Yuan-Cheng Lai; , "Using String Matching for Deep Packet Inspection," Computer , vol.41,no.4,pp.23-28,April2008

8.        Kun Huang; Dafang Zhang; , "A Byte-Filtered String Matching Algorithm for Fast Deep Packet Inspection," . The 9th International Conference for  Computer science 2008

9.        Randy Smith, Cristian Estan, Somesh Jha, Shijin Kong. Deflating the  big bang:fast and scalable deep packet inspection with extended finite automata. SIGCOMM 2008, pages:207-218

10.     Anees Shaikh, Jennifer Rexford, and Kang Shin. Load-sensitive   routing of long-lived IP flows. In Proceedings of the ACM SIGCOMM. Aug.1999, pages: 215-226.

11.     Kocak, T.; Kaya, I.; , "Low-power bloom filter architecture for deep packet inspection," Communications Letters, IEEE , vol.10, no.3, pp. 210- 212, Mar 2006 doi: 10.1109/LCOMM.2006.1603387

12.     Po-Ching Lin; Ying-Dar Lin; Tsern-Huei Lee; Yuan-Cheng Lai; , "Using String Matching for Deep Packet Inspection," Computer , vol.41, no.4, pp.23-28, April 2008 doi: 10.1109/MC.2008.138

13.     Kun Huang; Dafang Zhang; , "A Byte-Filtered String Matching Algorithm for Fast Deep Packet Inspection," Young Computer Scientists, 2008. ICYCS 2008. The 9th International Conference for , vol., no., pp.2073-2078, 18-21 Nov. 2008 doi: 10.1109/ICYCS.2008.26

14.     Jieyan Fan; Dapeng Wu; Kejie Lu; Nucci, A.; "NIS04-3: Design of Bloom Filter Array for Network Anomaly Detection," Global Telecommunications Conference, 2006. GLOBECOM '06. IEEE , vol., no., pp.1-5, Nov. 27 2006-Dec. 1 2006 doi: 10.1109/GLOCOM.2006.281

15.     Jia Ni; Chuang Lin; Zhen Chen; Ungsunan, P.; , "A Fast Multi-pattern Matching Algorithm for Deep Packet Inspection on a Network Processor," Parallel Processing, 2007. ICPP 2007. International Conference on , vol., no., pp.16, 10-14 Sept. 2007 doi: 10.1109/ICPP.2007.7

16.     A. Broder and M. Mitzenmacher, “Network applications of bloom filters: a survey,” Internet Mathematics, vol. 1, no. 4, pp. 485-509, July 2003.

17.     XindongWu • Vipin Kumar • J. Ross Quinlan • Joydeep Ghosh • Qiang Yang • Hiroshi Motoda • Geoffrey J. McLachlan • Angus Ng • Bing Liu • Philip S. Yu • Zhi-Hua Zhou • Michael Steinbach • David J. Hand • Dan Steinberg SURVEY PAPER Top 10 algorithms in data mining, Published online: 4 December 2007© Springer-Verlag London Limited 2007





Padmini Sahu, Anurag Singh Tomer

Paper Title:

Implementation of PMBLDC motor using Cuk PFC converter

Abstract:   This paper aims at  an improve speed quality employing Cuk  DC-DC converter is used as a power factor correction (PFC) converter for feeding a voltage source inverter (VSI) based permanent magnet brushless DC motor (PMBLDCM) driven air condition. This PFC converter is front end diode bridge rectifier (DBR) fed from single-phase AC mains and connected to a three phase voltage source (VSI) feeding the permanent magnet brushless DC motor (PMBLDCM). The PMBLDC Motor is used to drive a compressor load of an air conditioner through a three-phase VSI fed from a controlled DC link voltage. The speed of the compressor is controlled to achieve energy conservation using a concept of the voltage control at DC link proportional to the desired speed of the PMBLDC Motor. Therefore the VSI is operated only as an electronic commutator of the PMBLDCM. The stator current of the PMBLDCM during step change of reference speed is controlled by a rate limiter for the reference voltage at DC link. The proposed PMBLDCM drive with voltage control based PFC converter is designed, modeled and its performance is simulated in Matlab-Simulink environment for an air conditioner compressor driven PMBLDC motor.

 Cuk Converter, Air Conditioner, Permanent Magnet Brushless DC Motor, Power Factor Correction, Voltage Control, Voltage Source Inverter.


1.       Kenjo and S. Nagamori, Permanent Magnet Brushless DC Motor,Clarendon Press, oxford, 1985.
2.       M. V. Ramesh1, J. Amarnath2, S. Kamakshaiah and G. S. Rao3. “ Speed control  of  BRUSHLESS  DC  MOTOR  by  using  fuzzy  logic  PI  controller” 2009.

3.       Y.H.  Bharathi1, B.R. Rekha1, P. Bhaskar2, C.S.  Parvathi2 and A.B. Kulkarni1. “Multi-input  Fuzzy  Logic  Controller  for  Brushless  dc  Motor Drives”, 2008.

4.       Deepak Batra1, Sanjay Sharma2 and Rajeev Ratan3.  “Axis  controlled movement  of  robot  using  brushless  DC  motor  drive” ,2009.

5.       T. Kenjo and S. Nagamori, Permanent Magnet Brushless DC Motors,Clarendon Press, oxford, 1985.
6.       M. V. Ramesh1, J. Amarnath2, S. Kamakshaiah and G. S. Rao3. “ Speed control  of  BRUSHLESS  DC  MOTOR  by  using  fuzzy  logic  PI  controller” 2009.

7.       Y.H.  Bharathi1, B.R. Rekha1, P. Bhaskar2, C.S.  Parvathi2 and  A.B. Kulkarni1. “Multi-input  Fuzzy  Logic  Controller  for  Brushless  dc  Motor Drives”, 2008

8.       Deepak Batra1, Sanjay Sharma2 and Rajeev Ratan3.  “Axis  controlled movement  of  robot  using  brushless  DC  motor  drive” ,2009.

9.       Bhim Singh and Sanjeev Singh,” Half Bridge Boost Converter for Power Quality Improvement in PMBLDCM Drive”, ICETET-09.

10.     B. Singh, B. N. Singh, A. Chandra, K. Al-Haddad, A. Pandey and D. P.Kothari, “A review of single-phase improved power quality AC-DC converters,” IEEE Trans. Industrial Electron., vol. 50, no. 5, pp. 962 –981, oct. 2003.

11.     MUHAMMAD H. RASHID,”Power Electronics Handbook” Ph.D.” Copyright # 2001 by Academic Press.

12.     A. Halvaei Niasar', A. Vahedi2, H. Moghbelli3Speed Control of a Brushless DC Motor Drive via Adaptive Neuro-Fuzzy Controller Based on Emotional Learning Algorithm.

13.     T.V.NARMADHA,” Speed control of PMBLDCM with gate control method using conventional and fuzzy controller” Vol. 2(11), 2010, 6663-6674.

14.     Vinatha U, Research Scholar, Swetha Pola, Asst. Software Engg., TCS, Dr K.P.Vittal, Simulation of Four Quadrant Operation & Speed Control of BLDC Motor on MATLAB / SIMULINK.






Sujin S. George, Valsson Varghese

Paper Title:

General Concepts of Capacity Based Design

Abstract:   An earthquake resisting building is one that has been deliberately designed in such a way that the structure remains safe and suffers no appreciable damage during destructive earthquake. However, it has been seen that during past earthquakes many of the buildings were collapsed due to failure of vertical members. Therefore, it is necessary to provide vertical members strong so as to sustain the design earthquake without catastrophic failure. Capacity designing is aiming towards providing vertical members stronger compared to horizontal structural elements. A structure designed with capacity design concept does not develop any suitable failure mechanism or modes of inelastic deformation which cause the failure of the structures. In capacity design of earthquake resisting structures, elements of primary lateral load resisting system are chosen suitably and designed and detailed for energy dissipation under severe inelastic deformation.

Keywords:  Capacity Design, Hinges, Pushover Analysis


1.       Andreas J. Kappos and AlireazaManafpour, “Seismic Design of R/C Buildings with the aid of Advanced Analytical Techniques”, Engineering Structures, Vol. 23, pp. 319-332, 2001.
2.       Earthquake Resistant Design of Structures, PankajAgarwal, Manish Shrikhande,2006.

3.       Euro Code 8, “Design Of Structure for Earthquake Resistance-Part I :General rules, seismic actions and rules for building”  CEN,2002.

4.       Improvement of Nonlinear Static Seismic Analysis Procedure, FEMA – 273, Department of Homeland Security Federal Emergency Management Agency.

5.       IS 456,Rcc design code

6.       Thomas Paulay and M. J. N. Priestley, Seismic Design of Reinforced Concrete and Masonry Building, a Wiley-Interscience Publication.

7.       M. J. N. Priestley, “DISPLACEMENT BASED SEISMIC ASSESSMENT OF REINFORCED CONCRETE BUILDINGS”, Journal of Earthquake Engineering; Vol 1, pp. 157
192,   1997.

8.       MehmetInel and HayriBaytanOzmen, Engineering Structures, Vol. 28,  pp. 1494-1502, 2006.






S.Hemalatha, R.Manickachezian

Paper Title:

Present and Future of Cloud Computing: A Collaborated Survey Report

Abstract: Cloud computing is one of the most discussed IT trends of this decade, and rightly so. This paper provides an executive summary of cloud computing over the past few years and expected ratio of cloud usage in the next five years. The results are collated from responses of several individuals as to their usage and preferences for infrastructure, virtualization, cloud investments and other cloud computing technologies. What differentiates this paper is its focus on analyzing and quantifying the effects of the migration of application workloads to cloud environments. This measurement enables us to estimate better the magnitude and longevity of cloud impacts and to understand the derivative impacts on existing technologies. We introduce the paper with the report showing the deployment of cloud computing in the world.  Then the factors influencing and affecting the adoption of cloud computing are discussed. We also discuss the impact of cloud computing on IT manageability and cloud investments. The purpose of this study is to get firsthand accounts of companies’ use of cloud computing and to quantify the potential, financial and environmental benefits that can be attained from this technology.

 Cloud, Drivers, Hybrid, Infrastructure, Inhibitors, Platform, Private, Public, Security, Virtualization


1.       Morgan Stanley Blue Paper, “Cloud Computing Takes Off”, May 23, 2011
2.       Cloud.com Special Report, “2011 Cloud Computing Outlook”, 2011

3.       CIO Survey Report, 2011 Cloud Computing Survey, November 2010

4.       Carbon Disclosure Project Study 2011, Cloud Computing –The IT Solution for the 21st Century, Paul Dickinson, 2011

5.       Avanade Report, “Global Survey: Has Cloud Computing Matured?” Third Annual Report, 2011

6.       GoGrid Survey Report, “Cloud Survey”, January/February 2011

7.       CA Technologies Study Report, “Security of Cloud Computing Providers Study”, April 2011

8.       World Economic Forum Report, “Exploring the Future of Cloud Computing: Riding the Next Wave of Technology-Driven Transformation”, 2010

9.       CIO Enterprise Research Survey, “Do You Have an Enterprise-wide Cloud Strategy?”, 2011

10.     CIO Gartner Report, “Gartner’s Cloud Computing Outlook 2011”, 2011

11.     North Bridge Survey Report, “Future of Cloud Computing”, 2011

12.     Symantec Survey Report, “State of Cloud Survey”, 2011

13.     The Open Group Survey Report, “The Open Group Cloud Computing Survey”, May 9, 2011

14.     IOUG Survey, “Enterprises Advance into the Cloud: 2011 IOUG Survey on Cloud Computing”, November 2011

15.     Deloitte Cloud Adoption Study, “Cloud Computing is Gaining Momentum”, 2011

16.     Appirio Study, “State of the Public Cloud: The Cloud Adopter’s Perspective”, 2010

17.     Edge Strategies Global Report, “SMB Cloud Adoption Study”, 2010

18.     The Top 100 Cloud Computing Private Companies, http://cloudtimes.org/2011/03/19/the-top-100-cloud-computing-private-companies/

19.     The Top 150 Players in Cloud Computing, http://virtualization.sys-con.com/node/770174

20.     The Cloud Computing Ecosystem: The Top 100 Cloud Players, http://jccavalcanti.wordpress.com/2009/01/14/the-cloud-computing-ecosystem






Mogarkar, Valsson Varghese

Paper Title:

A Concept for Development, Safe Erection and Use of Scaffolding for High Rise Buildings

Abstract:   The objective of the paper is to study different parameters involve in building a Scaffolding system for HighRise Structures for supporting formworks, working platform and passageway for material logistics etc. The study also includes analysis of design guidelines for safe erection of scaffolding system. Scaffolding is the structure used or intended to use for supporting framework, swinging stage, suspended stage or protection of workers engaged in or in connection with construction work, for the purpose of carrying out that work or for the support of material transportation from one level to other or connection with any such work. Scaffolding system is defined as the planning for the design, erection and the inspection of the use and the dismantling of any scaffolding. By law, worker must have safe working environment. And most construction work involves working at heights which cannot be safely or easily reached from the ground or part of the building. The scaffolding design criteria consider the strength; stability; rigidity of the supporting structure and the safety of persons engaged in the erection, alteration and dismantling of the scaffold. When any material is transferred on or to a scaffold it shall be moved or deposited without imposing any violent shock. Scaffold system shall be properly maintained and every part shall be kept so fixed, secured or placed in a position as to prevent, as far as is practicable, accidental displacement. Thus, it must be designed for the most adverse combination of dead loads, live loads, impact loads and environmental loads that can reasonably be expected during the service life of scaffolding. The detail report considers design criteria given by various designing standards.

 Scaffolding, Formwork, Strength, Design, Safety


1.        Yu WK, Chung KF. Prediction on load carrying capacities of multi-storey door-type modular steel scaffolds. Steel & Composite Structures 2004;4(6):471-487.
2.        Godley MHR, Beale RG. Analysis of large proprietary access scaffold structures. Proceedings of the Institution of Civil Engineers: Structures and Buildings, Vol. 146 UK, 2001, pp. 31-39.






Ginni Tonk, S.S. Tyagi

Paper Title:

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

Abstract:   A Mobile Ad-Hoc Network (MANET) is a temporary network that is composed of the mobile devices which communicates through wireless links without any pre-existing infrastructure. Routing is one of the major concerns in the MANET due to its frequent changing topology and the absence of centralized administrator. In this paper, we evaluate the performance of Mobile Ad-Hoc Network Routing Protocols Dynamic Source Routing (DSR), Ad-Hoc On Demand Distance Vector (AODV) and Destination-Sequenced Distance Vector (DSDV) under different performance metrics like  PDF, Average End-to-End delay, NRL, Throughput, Routing Overhead and Packet Loss. The performance evaluation is done in different network sizes using network simulator NS-2. The comparison result shows that AODV gives highest PDF and Throughput, DSR gives lowest packet loss and DSDV gives the lowest NRL, End-to-End Delay and Routing Overhead.


1.        Akshai Aggarwal, Savita Gandhi; “PERFORMANCE ANALYSIS OF  AODV, DSDV AND DSR IN MANETS” International Journal of Distributed and Parallel Systems (IJDPS), November 2011 ,pp: 167-177.
2.        C. E. Perkins and E. M. Royer, “Ad-hoc on demand distance vector routing,” in Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA’99),vol. 3, New Orleans, LA, USA, February 1999, pp. 90–100.

3.        C. E. Perkins, E. M. Royer, I. D. Chakeres, “Ad hoc On-Demand Distance Vector (AODV) Routing Protocol”, draft-perkins-manet-aodvbis-00.txt, October 2003.

4.        Dynamic Source routing in wireless Ad hoc Networks by David B. Johnson, David A. Maltz, computer science department, Carnegie Mellon University, Pittsburgh Mobile computing conference in year 1996, pages 153- 181 volume 353

5.        J. Broch, D. A. Maltz, D. B. Johnson, Y.-C. Hu, and J. Jetcheva, “A performance comparison of multi-hop wireless ad hoc network routing protocols,” in Proceeedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM’98), October 1998, pp. 85–97.

6.        M. Lakshmi, P. E. Sankaranarayanan, Performance Analysis of Three routing protocols in wireless Mobile Ad Hoc Network. Information technology Journal 5 (1), 114-120,2006.

7.        Mohamad Usop, Azizol Abdullah; “Performance Evaluation of AODV, DSDV & DSR Routing Protocol in Grid Environment” IJCSNS International Journal of Computer Science and Network Security, July 2009, pp: 261-268

8.        Nadia Qasim, Fatin Said, Hamid Aghvami ,” Mobile Ad Hoc Networks Simulations Using Routing Protocols for Performance Comparisons”, Proceedings of the World Congress on Engineering 2008 Vol I WCE 2008, July 2 - 4, 2008, London, U.K.

9.        P. Manickam, T. Guru Baskar; “PERFORMANCE COMPARISONS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS” International Journal of Wireless & Mobile Networks (IJWMN), February 2011, pp. 98-106

10.     S. R. Das, R. Castaneda, J. Yan, R. Sengupta,  “Comparative Performance Evaluation of Routing Protocols for Mobile Ad hoc Networks”, Proceedings of the International Conference on Computer Communications and Networks, pp.153-161, 1998.

11.     Santosh Kumar, S C Sharma; “Simulation Based Performance Analysis of Routing Protocols Using Random Waypoint Mobility Model in Mobile Ad Hoc Network” Global Journal of Computer Science and Technology February 2011, pp: 16-22.

12.     Sapna S. Kaushik & P.R. Deshmukh; “COMPARISON OF EFFECTIVENESS OF AODV, DSDV AND DSR ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS” International Journal of Information Technology and Knowledge Management July-December 2009, pp. 499-502

13.     "The network simulator ns-2. http://www.isi.edu/nsnam/ns2...






R.M. Belokar, Sandeep Singh Kharb, Vikas Kumar

Paper Title:

An Application of Value Stream Mapping In Automobile Industry:  A Case Study

Abstract:   Value Stream Mapping has the reputation of uncovering waste in manufacturing, production and business processes by identifying and removing or streamlining non-value-adding steps. A flow diagram showing the process is drawn to reflect the current state of the operation. The non-value actions are identified in each step and between each step by their waste of time and resources. The process is analysed for opportunity to drastically reduce and simplify it to the fewest actions necessary. By reducing wastefulness the proportion of value adding time in the whole process rises and the process throughput speed is increased. This makes the redesigned process more effective (the right things are being done) and more efficient (needing fewer resources). The reengineered process is flow charted in its future state with process steps and information flows redesigned, simplified and made less expensive.

 Current  state map, cycle time, future state map, lead time, takt time, Value Stream Mapping


1.       Stephen L. Woehrle, Louay Abou-Shady [2010], “Using Dynamic Value Stream Mapping and Lean Accounting Box Scores to Support Lean Implementation”. pp 834-842
2.       Y O. Ram Mohan Rao, Dr. K Venkata Subbaiah, Dr. K Narayana Rao, T Srinivasa Rao [2011], “Enhancing Productivity of hot metal in Blast furnace -A case study in an Integrated Steel Plant”.International Journal of Engineering Science and Technology (IJEST). pp 3518-3525

3.       Dimple Khatri, Pardeep Dhull, Rajender Kumar, Vinod Dhull [2011], “Reduce the Work In Progress by using Value Stream Mapping (A Lean Manufacturing Key Tool)” ISSN: 2249 – 6564. International Journal of Mechanical Engineering Applications Research, pp 91-99

4.       Ramesh, K.V. Sreenivasa Prasad, T.R. Srinivas [2008] “ Implementation of a Lean Model for Carrying out Value Stream Mapping in a Manufacturing Industry” Journal of Industrial and Systems Engineering Vol. 2, No. 3, pp 180-196

5.       Lixia Chen, Bo Meng [2010] “The Application of Value Stream Mapping Based Lean Production System” International Journal of Business and Management Vol. 5, No. 6, pp 203-209

6.       D. Rajenthira Kumar, P.V. Mohanram, S.G. Harikarthik [2011] “Process Cycle Efficiency Improvement Through Lean: A Case Study” International Journal of Lean Thinking Volume 2, Issue 1, pp 47-58
7.       S. P. Vendan , K. Sakthidhasan [2010] “Reduction of Wastages in Motor Manufacturing Industry” Jordan Journal of Mechanical and Industrial Engineering Volume 4, Number 5, pp 579-590
8.       Abuthakeer ,P.V. Mohanram, G. Mohan Kumar [2010] “Activity Based Costing Value Stream Mapping”  International Journal of Lean Thinking Volume 1, Issue 2, pp 52-64

9.       V. Ramesh1, K.V. Sreenivasa Prasad, T.R. Srinivas [2010] “Implementation of a Lean Model for Carrying out Value Stream Mapping in a Manufacturing Industry”