Volume-2 Issue-2

Download 32
Total Views 796
File Size 4.00 KB
File Type unknown
Create Date September 5, 2017
Last Updated September 5, 2017

 Download Abstract Book

S. No

Volume-2 Issue-2, January 2013, ISSN:  2278-3075 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.



Oguejiofor O.S., Okorogu V.N., Adewale Abe, Osuesu B.O

Paper Title:

Outdoor Localization System Using RSSI Measurement of Wireless Sensor Network

Abstract:   This paper present a system that utilizes RSSI based trilateration approach to locate the position of blind nodes (nodes that are not aware of there positioning in the network) amongst other nodes in the network. The system automatically estimates the distance between sensor nodes by measuring the RSSI (received signal strength indicator) at an appropriate number of sensor nodes. Through experiments, we clarified the validity of our data collection and position estimation techniques. The results show that when the anchor nodes were increased from three to four, the localization error decreases from 0.74m to 0.56m.

 localization, nodes, Trilateration, RSSI


1.        “21 ideas for the 21st century”, Business week, Aug. 30 1999, PP. 78-        167
2.        C.Y. chony et al,(2003), “sensor networks, Evolution opportunities and challenges”, proc. IEEE, vol. 91, no 8, pp.1247-1256

3.        I.F. Akyildiz and E. cayirci,(2002), “IEEE communication magazine, vol 40, no 8, pp. 102-114

4.        Jun Zheng and Abbas jamalipour, (2009), “Wireless sensor networks: A networking perspective”, IEEE communication Magazine

5.        N. patawari and A.O. Hero III, (2003), “Using proximity and quantized RSS for sensors”, proc. 2nd ACM international conference on wireless sensor Networks and Application

6.        E.Elnahrawy, X. Li, and R.P. Martin, (2004), “The Limits of Localization using signal Strength: A comparative study”, proc. IEEE SECON 2004

7.        K.Langendoen and N.Reijers, (2003), “Distributed localization in wireless sensor networks: a quantitative comparison”, computer Networks, 43, 2003, 499-518

8.        Dixon, John C,(2009), “Suspension Analysis and computational geometry: John wiley and sons limited.

9.        Rappaport, Theodore S,(1996), “ Wireless communications: Principle and Practice”. New Jersey, prentice –hall Inc

10.     Vijay k Garg, (2007), “wireless communication Networking” san Francisco: Morgan Kauffman publishers






Trupti D. Shingare, R. T. Patil

Paper Title:

SPI Implementation on FPGA

Abstract:   The SPI is a full-duplex, synchronous, serial data link that enables communication between a host processor and peripherals. Based upon Motorola’s SPI-bus specifications, version V03.06, release February 2003, the designs are general purpose solutions offering viable ways to controlling SPI-bus, and highly flexible to suit any particular needs. However, Field programmable gate array devices offer a quicker and more customizable solution. This paper provides a full description of an up to- date SPI Master/Slave FPGA implementations, In conformity with design-reuse methodology.

 Serial Peripheral Interface (SPI), Field Programmable Gate Array (FPGA), System on Chip (SOC).


1.        F. Leens, “An Introduction to I2C and SPI Protocols,” IEEE Instrumentation & Measurement Magazine, pp. 8-13, February 2009.
2.        “Design and Implementation of a Reused Interface” CHEN Run1,2, HUANG Shi-zhen1, LIN Wei1, LI Lei2 ,The 1st International Conference on Information Science and Engineering (ICISE2009)

3.        “Realising the SPI communication in a multiprocessor system “Akos Szekacs, Tibor Szakaill and Zoltan Hegyk6zi SISY 2007 . 5th International Symposium on Intelligent Systems and Informatics 24-25 August, 2007 Subotica, Serbia

4.        “Design and Test of General-Purpos SPI Master/Slave IPs on OPB Bus”A.K. Oudjida, M.L. Berrandjia, A. Liacha, R. Tiar, K. Tahraoui & Y.N. Alhoumays Microelectronics and Nanotechnology Division Centre de Développement  Technologies  Avancées, CDTA, 2010 7th international multi conference  Systems,signal and devices .

5.        “FPGA Implementation of I2C & SPI Protocols: a Comparative Study “ A.K. Oudjida, M.L. Berrandjia, R. Tiar, A. Liacha, K. Tahraoui  Microelectronics and
Nanotechnology Division Centre de Développement des Technologies Avancées CDTA 978-1-4244-5091-6/09©2009 IEEE

6.        Motorola Inc., “SPI Block Guide V03.06,” February 2003.  






Okorogu V.N, Nwalozie G.C, Okoli K.C, Okoye E.D

Paper Title:

Design and Simulation of a Low Cost Digital Beamforming (DBF) Receiver for Wireless Communication

Abstract:   Digital beam forming consists of the spatial filtering of a signal where the phase shifting, amplitude scaling and adding are implemented digitally. The idea is to use a computational and programmable environment which processes a signal in the digital domain to control the progressive phase shift between antenna elements in the array. Digital beamforming allows several attractive features in the performances of communication systems. The main advantage to be gained from digital beamforming is greatly added flexibility without any attendant degradation in signal-to-noise ratio (SNR).This research presents the design and simulation of a low cost Digital Beamforming (DBF) antenna. This DBF antenna can form part of the antenna structure in the receiver of the base station of a wireless communication system. The uniform amplitude weighting function is the beam pattern synthesis considered for the beam formation. The simulation is done in MATLAB.

 Beamforming, Antenna array, phased arra

1.        Alliot S., “The Adaptive Weight Estimation, implemented on a DSP”, Tech. Report, ASTRON, Dwingeloo, March 2000
2.        Alliot S., Cazamier W., “Beamforming Interpolation for THEA”, Research Report- THEA-00024, Astron, October 2000

3.        Armstrong R.P., Kristian Zarb Adami, and Mike E. Jones, A Wideband, Four-Element, All-Digital Beam-forming        System for Dense Aperture Arrays in      Radio Astronomy, University of Oxford Astrophysics, , Oxford Jan. 2010

4.        Nagpal V, Filiba T. “Beam-forming for Antenna Arrays BEE2 vs DSP Processors” May 11, 2007

COMMUNICATION Progress In              Electromagnetic Research, PIER 97, 177-195

6.        Michal VAVRDA, “DIGITAL BEAMFORMING IN WIRELESS COMMUNICATIONS, Institute of   Radio Electronics, Faculty of Electrical Engineering and Communication, BrnoUniversity of Technology,

7.        Miura R, Tanaka T, Chiba I, Horie, A, Karasawa Y, “Beamforming Experiment with a DBF Multi-beam       Antenna in a Mobile Satellite Environment”, Antennas and Propagation, IEEE Transactions on , Volume: 45, Issue: 4, Pages:707 – 714,April 1997             

8.        Mucci R., “A Comparison of Efficient Beam-forming Algorithms”, Acoustics, Speech, and Signal Processing IEEE Transactions Volume 32, Issue 3, (s):548 – 558 Jun 1984,

9.        Pozar D. M., Microwave Engineering, Second Edition. John Wiley & Sons, New York, 1998.

10.     Simonangeli L. J., Agrawal A., “A C-Band Digital Beam-forming Array”, Antennas and Propagation Society International Symposium, 1988. AP-S.   Digest 6-10 Page(s):1385 - 1388 vol.3 June 1988

11.     Steyskal, H, “Digital Beamforming – An Emerging Approach”; Military, Communications Conference, MILCOM 88, Conference record. '21st Century Military Communications - What's   Possible?’ 1988 IEEE, 23-26; Pages:       399 - 403 vol.2.

12.     Torres-Rosario J. A., Rodríguez-Solís R., Hunt S., Popovic Z., “Adaptive Discrete Lens Antenna Array for  Direction of Arrival Detection”, Antennas and Propagation Society International Symposium, AP-S, Digest; 6-10, June 2005,

13.     Van Trees, Harry L., Optimum Array Processing: Detection, Estimation, and Modulation Theory, Part IV. Wiley Inter-science, New York, 2002,     

14.     Dreher, A.; Niklasch, N.; Klefenz, F.;             Schroth,A., “Antenna and Receiver System with Digital Beamforming for    Satellite Navigation and Communication”, Microwave Theory and Techniques, IEEE Transactions on , Volume: 51 , Issue: 7 ,; Pages:1815 – 1821 July 2003

15.     Juan A. Torres-Rosario, “Implementation Of A Phased Array Antenna Using Digital Beamforming”, Master Of Sciences,In Electrical Engineering, University Of Puerto Rico, Mayagüez Campus, 2005.






B.Azhagusundari, Antony Selvadoss Thanamani

Paper Title:

Feature Selection based on Information Gain

Abstract:   The attribute reduction is one of the key processes for knowledge acquisition. Some data set is multidimensional and larger in size. If that data set is used for classification it may end with wrong results and it may also occupy more resources especially in terms of time. Most of the features present are redundant and inconsistent and affect the classification.  In order to improve the efficiency of classification these redundancy and inconsistency features must be eliminated. This paper discusses an algorithm based on discernibility matrix and Information gain to reduce attributes.

 Attribute Reduction, Discernibility matrix, Information Gain


1.        Wa'el M. Mahmud, Hamdy N.Agiza, and Elsayed Radwan (October 2009) ,Intrusion Detection Using Rough Sets based Parallel Genetic Algorithm Hybrid Model, Proceedings of the World Congress on Engineering and Computer Science 2009 Vol II WCECS 2009, San Francisco, USA
2.        Thangavel, K., & Pethalakshmi, A. Elseviewer (2009).,   Dimensionality reduction based on rough set theory 9, 1-12. doi: 10.1016/j.asoc.2008.05.006.

3.        Kun-Ming Yu, Ming-Feng Wu, and Wai-Tak Wong (April,2008), Protocol-Based Classification for Intrusion Detection,  APPLIED COMPUTER & APPLIED COMPUTATIONAL SCIENCE (ACACOS '08), Hangzhou, China.

4.        Shaik Akbar, Dr.K.Nageswara Rao , Dr.J.A.Chandulal (August 2010),Intrusion Detection System Methodologies Based on Data Analysis, International Journal of Computer Applications (0975 – 8887) Volume 5– No.2.

5.        Chuzhou University, China, Guangshun Yao,Chuanjian Yang,1Lisheng Ma, Qian Ren (June 2011) An New Algorithm of Modifying Hu’s Discernibility Matrix and its Attribute Reduction, International Journal of Advancements in Computing Technology Volume 3, Number 5.

6.        T. Subbulakshmi,A. Ramamoorthi, and Dr. S. Mercy Shalinie9August 2009), Ensemble design for intrusion detection systems, International Journal of Computer
science & Information Technology (IJCSIT), Vol 1, No 1.

7.        Y.Y.Yao and Y. Zhao (2009), Discernibility matrix simplication for constructing attribute reducts, Information Sciences, Vol. 179, No. 5, 867-882.






Shabnam S.Mahat, K.M. Nalawade

Paper Title:

Teachers awareness about SAKSHAT: a ‘One Stop Education Portal’

Abstract:   The ICT in education was launched few years before, The use of Information and Communications Technologies (ICT) in education is taken very seriously by governments and education systems around the world. The Ministry of HRD, under a Centrally Sponsored Plan Scheme, namely, National Mission on Education through Information and Communication Technology (NME-ICT) plans to leverage the potential of ICT to provide high quality, personalized and interactive knowledge modules over the internet/intranet for all the learners in Higher Education Institutions in an any time any where mode. Technology is developed to solve problems associated with human and technical need. Although standalone computers have been in most schools and colleges for more than two decades now, networked ICT is comparatively new for many schools and colleges as they continue to tackle with how to use ICT to boost teaching and learning environments. Moderately college teachers in sangli city have become very uneducated through attending courses and developing their personal interests in ICT. The current study focus on teacher’s awareness and literacy about Sakshat portal lunched by MHRD for lifelong education.

 ICT, SAKSHAT a ‘One Stop Education Portal, ‘Aakash’, Virtual Class


1.        http://mhrd.gov.in/sakshat_hindi
2.        www.cbse.nic.in/prosak1.doc

3.        http://www.sakshat.ac.in

4.        http://sakshat.ignou.ac.in/sakshat/index.aspx

5.        http://sakshat.gov.in






A. Anitha, M. Anoop, S. SherinLiba

Paper Title:

Determination of Positional Accuracy and Error Modeling for moving Objects Tracking

Abstract:   Position refers to the spatial location of an entity. That is the determination of the site or place of any process localization. A positioning system is a mechanism for determining the location of an object in space. Technologies for this task exist ranging from worldwide coverage with meter accuracy to workspace coverage with sub-millimeter accuracy. The statistical positional accuracy of a moving object being tracked any2D positioning system. This paper describes the measurement technique based on determining 1D cross-track errors from a nominal path, and then using this data set to determine the overall 2D positional error statistics. This method evaluates vehicle tracking in a city and people tracking in a city using Radio triangulation principle. Rayleigh-Gamma model is proposed to describe the radial positional errors used to perform error modeling. It is shown that this model has a good match with outdoor field measurements.

 cross-track, radio triangulation, positioning system.


1.        Y. Qi, H. Kobayashi, and H. Suda, (Sept. 2006)“On Time-of-Arrival Positioning in a Multipath Environment,” IEEE Trans. Vehicular Technology, vol. 55, pp. 1516-1526(http://www.ece.ucsb.edu).
2.        N. Patwari, A.O. Hero III, M. Perkins, N.S. Correal, and R.J.O’Dea,(Aug. 2003) “Relative Location Estimation in Wireless Sensor Networks,” IEEE Trans. Signal Processing, vol. 51, no. 8, pp. 2137-2148 (http://web.eecs.umich.edu).

3.        X. Meng, L. Yang, J. Aponte, C. Hill, T. Moore, and A.H. Dodson, (Oct. 2008)“Development of Satellite Based Positioning and Navigation Facilities for Precise ITS Applications,” Proc. IEEE 11th Int’l Conf. Intelligent Transportation Systems (ITSC), pp. 962-967 (http://www.nottingham.ac.uk).

4.        I. Sharp, K. Yu, and Y.J. Guo,(Sept. 2009) “GDOP Analysis for Positioning System Design,” IEEE Trans. Vehicular Technology, vol. 58, no. 7, pp. 3371-3382 (http://www.m-hikari.com).

5.        M. Modsching, R. Kramer, and K.T. Hagen, (2006)“Field Trial on GPSAccuracy in a Medium Size City: The Influence of Built-Up,” Proc.Workshop Positioning,
avigation and Communication (WPNC),pp. 209-218 (http://www.wpnc.net).

6.        T. Sathyan, D. Humphrey, and M. Hedley,(Mar. 2011) “WASP—A System and Algorithms for Accurate Localization Using Low-Cost Hardware,” IEEE Trans. Systems, Man and Cybernetics, vol. 41, no. 2, pp. 211-222 (http://link.springer.com).

7.        R. Schubert, E. Richter, and G. Wanielik,(2008) “Comparison andEvaluation of Advanced Motion Models for Vehicle Tracking,”Proc. 11th Int’l Conf. Information Fusion, pp. 1-6 (http://www.isif.org).

8.        G.H. Elkaim, M. Lizarraga, and L. Pedersen,(2008) “Comparison of Low-Cost GPS/INS Sensors for Autonomous Vehicle Applications,” Proc. IEEE/ION Position, Location, and Navigation Symp.,pp. 1133-1144 (http://users.soe.ucsc.edu).

9.        A. El-Rabbany,(2002) Introduction to GPS: The Global Positioning System. Artech House (http://www.cs.mnsu.edu).

10.     K. Yu, I. Sharp, and Y.J. Guo,(2009) Ground-Based Wireless Positioning. Wiley-IEEE Press (http://www.scis.ulster.ac.uk).






R.Uday Kumar

Paper Title:

Analysis of Fukui’s Conical Cup Test

Abstract:      Fukui’s conical cup test is the one of the formability characteristics evaluation for various sheet metals. The formability characteristics such as diametrical ratio, maximum drawing load, depth of cup up to fracture are to be evaluated. This test is related to drawing test. This test can be performed by using parameters such as friction, process parameters and without blank holder.  In fukui’s conical cup drawing test a single specimen with dimensions drawn into conical cup until the fracture is occurred at the bottom of cup by help of flat cylindrical punch and without using the blank holder. The base diameter of fracture conical cup is used to determination of diametrical Ratio. The diametrical ratio is the ratio between base diameter of fracture of conical cup with respect to outer edges of cup to original blank diameter. This indicates formability of sheet metals through this test. So formability can be represented as formability index. Hence the formability index expressed as diametrical ratio.The smaller the value of diametrical ratio the better is the formability of sheet metal as per fukui’s test. In this test the formability characteristics of sheet metals such as alloys of aluminum alloy, mild steel alloy and cartridge brass are studied through finite element analysis.

 formability, drawing, diametrical ratio, maximum drawing load.


1.        Formability testing of sheet metals. Trans. Indian Institute of MetalsVol.no.49. No.5 Oct ’96 - Narsimhan K.  And Nandedkar.V.M.
2.        Under standing sheet metal formability, Vol.2 – S.P. Keeler

3.        K. Lange, Handbook of Metal Forming, McGraw-Hill, New York, 1995, pp. 40 -80.

4.        M.J. Hillier, The mechanics of some new processes of cup drawing, J. Appl. Mech. 36 (1969) 108-120.

5.        J. TIROSH and E. KOVHAVl, on suppression of plastic buckling in deep drawing processes. Int. J.Mech. Sci. 26, 389-402 (1984).

6.        M.G. EI-Sebaie, Plastic instability conditions when deep-drawing into a high pressure medium, Int. J. Mech. Sci. 15 (1973) 605–615.

7.        S. Yossifon, K. Sweeney, T. Altan, on the acceptable blank holder force range in the deep drawing process, J. Mater. Process.Technol.     67 (2000) 175–194.

8.        J. TmOSH, Rupture instability in deep drawing process. Int. J. Mech. Sci. 27-35 [1997]

9.        D.Y. Yang, J.B. Kim, D.W. Lee, Investigation into manufacturing of very long cups by deep drawing and ironing, Ann. CIRP 57 (1999) 346–354.

10.     I. F. COLLXNS, The upper bound theorem for rigid plastic solids generalized to include Coulomb friction.J. Mech. Phys. Solids 17,   323-338 (1969).






A.S.N.Saiteja, C.H.Pavan Kumar

Paper Title:

Determining Hysteresis Damping in a Steam Turbine Blade using a Finite Element Tool

Abstract:   Damping is a phenomenon by which mechanical energy is dissipated, usually converted as a thermal energy in dynamic systems. The damping caused by friction between the internal planes that slip or slide as the material deforms is called hysteresis damping or material damping. This paper deals with determining hysteresis damping of a typical turbine blade. The damping is quantified as a function of strain amplitude. ANSYS and Hyper Mesh are adopted for necessary calculations. First the natural frequencies and orthonormal mode shapes are obtained at the desired speed. Lazan’s damping law is used to determine the specific damping energy in each element of the blade. Total damping energy and strain energy are calculated by integrating them over the entire volume. With the help of these the loss factor is obtained. From the loss factor, the equivalent viscous damping ratio is determined. Procedure for one mode shape is shown.

 Damping, Hysteresis, Lazan’s Law, Mode Shapes.


1.        Rao.J.S “Turbomachine Blade Damping”.USA, 2001.
2.        Mechanical Vibrations by S.S.Rao.

3.        ANSYS13, Ansys Inc...

4.        Hyper Mesh 11 Help.

5.        Harris, C.M. and Crede, C.E. “Shock and Vibration Handbook”, McGraw Hill, New York, 1976.

6.        Rowet, F.E., “Elastic Hysteresis in Steel”, Proc.Roy.Soc., vol.89, 1914.






Kulwant Singh, Atul Kumar, Nitin Sharma

Paper Title:

The Mathematical Aspects in Art to Create Decorative Effect in Design Patterns

Abstract:   Mathematics is not just about formulas and logic; instead it can be used to express beauty and shapes through patterns, symmetry and arrangements. With the assistance of mathematics, artists can achieve new heights in the field of designing. The linkage between design art and Mathematics provides the background to this work.  The work involves the art and style shaped in the handicraft sector, in which the designs are originated in the geometric aesthetic.   This work pivots on how the mathematics, algorithms and technology have been applied to produce traditional design patterns in the sense of artist.

 Art, Motif, Pattern, Symmetry.


1.        van der Zee, B. de Vries, “Design by Computation” GA2008, 11th Generative Art Conference, pp 35-52
2.        Chee Kai Chua, Robert Gay and Wolfgang Hoheisel , “A Method of Generating Motifs Aligned Along a Circular Arc”, Computer & Graphics, Vol. 18, No. 3, pp. 353-362, 1994.

3.        Kaplan C. S. “Computer Graphics and Geometric Ornamental Design”, Ph.D., University of Washington, Seattle, 2002.

4.        Wang, C. -S., Chang, T. -R., Hsiao, C. -Y. and Teng, C. -K.'Product development for Chinese calligraphy using reverse engineering and rapid prototyping', Virtual and Physical Prototyping, Vol. 1, No. 4, 259 — 269

5.        Ronald Strebelow, Mirco Tribastoney, Christian Prehofer “Performance Modeling of Design Patterns for Distributed Computation”

6.        Vishal Gulati, Puneet Tandon, Hari Singh, “A CAD Paradigm to Produce Zillij Style of Geometrical Patterns for Wooden Carvings”, International Journal of Computer Applications Vol. No.3, 2010.

7.        Trivedi S., Tiwari A., Chatterjee A., Pathak V., Dhande S. G. and Chauhan D. S., “Application of CAD, Rapid Prototyping and Reverse Engineering in Handicrafts Sector – A Success Story”, 9th International Conference on Engineering Education, July 2006.

8.        Michael T. Wong, Douglas E. Zongker and David H. Salesin, “Computer-Generated Floral Ornament”, University of Washington.

9.        Kedar S. P.,” Geometric Modeling of Patterns”, Master’s thesis, Department of Computer Science and Engineering, Indian Institute of Technology, Kanpur, India, 2009.

10.     Dustin Robert Anderson, “Two-dimensional Computer-generated Ornamentation Using a User-driven global planning strategy”, Master of Science in ComputerScience, Thesis, California Polytechnic State University, San Luis Obispo, 2007

11.     Vishal Gulati and Puneet Katyal,” A Hierarchic Representation Scheme For Generating Decorative Pattern”s, International Journal of Current Research Vol. 3, Issue, 11, pp.186-189, October, 2011






P. Ajith, M.S.S.Sai, B. Tejaswi

Paper Title:

Evaluation of Student Performance: An Outlier Detection Perspective

Abstract:   Educational data mining is current growing research area and the main essence of data mining concepts are used in the educational field for extracting useful information of the students based on their  behavior in the learning process. Prior approaches used decision tree classifications optimized with ID3 algorithms to obtain such patterns but discovering the implicative tendencies is valuable information for the decision-maker which is absent in tree based classifications. So we propose to use outlier detection for mining and evaluating educational data of students. In this paper, outlier detection mechanisms are used for identifying outliers which improve the quality of decision making. We used outlier analysis to detect outliers in the student data.  In proposed system, clustering mechanism along with univariant analysis is implemented. Clustering is finding groups of objects such that the objects in one group will be similar to one another and different from the objects in another group. While clustering, the large data set is divide into clusters which consists of outliers. After Clustering, the data points which are present outside the clusters are identified and treated as outliers. Identification is done by using univariate analysis which is the simplest form of quantitative (statistical) analysis. A basic way of presenting univariate data is to create a frequency distribution of the individual cases Here, we analyze the performance of UG students of our college and present the results using outlier detection mechanism. The analyzed results are represented using histograms which are based on univariate analysis.

 Outlier, Clustering, Univariate analysis, and Histograms.


1.        Al-Radaideh, Q., Al-Shawakfa, E. and Al-Najjar, M. (2006) ‘Mining Student Data Using Decision Trees’, The 2006 International Arab Conference on Information Technology (ACIT'2006) – Conference Proceedings.
2.        Ayesha, S. , Mustafa, T. , Sattar, A. and Khan, I. (2010) ‘Data Mining Model for Higher Education System’, European Journal of Scientific Research, vol. 43, no. 1, pp. 24-29.

3.        Baradwaj, B. and Pal, S. (2011) ‘Mining Educational Data to Analyze Student s’ Performance’, International Journal of Advanced Computer Science and Applications, vol. 2, no. 6, pp. 63-69.

4.        Chandra, E. and Nandhini, K. (2010) ‘Knowledge Mining from Student Data’, European Journal of Scientific Research, vol. 47, no. 1, pp. 156-163.

5.        Cesar V., Javier B., liela S., and Alvaro O., Recommendation in Higher Education Using Data Mining Techniques, In Proceedings of the Educational Data Mining Conference, 2009.

6.        Pathom P., Anongnart S., and Prasong P., Comparisons of Classifier Algorithms: Bayesian Network, C4.5, Decision Forest and NBTree for Course Registration
Planning Model of Undergraduate Students, Sripatum University Chonburi Campus, Office of Computer Service, Chonburi Thailand, IEEE, 2008.

7.        Ramaswami M., and Bhaskaran R., CHAID Based Performance Prediction Model in Educational Data Mining, IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 1, No. 1, 2010.

8.        M. Bray, The Shadow Education System: Private Tutoring And Its Implications For Planners, (2nd ed.), UNESCO, PARIS, France, 2007.

9.        Moreira, M. Y. Santos and S. Carneiro, Density-based clustering algorithms-DBSCAN and SNN, July 2005

10.     M. Ankerst, M. M. Breunig, H. P. Kriegel and J. Sander, OPTICS: Ordering Points To Identify Clustering Structure, at International Conference on Management of Data, Philadelphia, ACM 1999





Sonal Dubey, R.K. Pandey, S.S. Gautam

Paper Title:

Web Based Multimedia Bilingual Expert System for Chickpea Cultivation

Abstract:   Expert Systems are widely used in various areas of agriculture. This paper describes the possibility of the production of chickpea with the use of expert systems. Among the Rabi crops, chickpea is a very important. The expert system is divided into two parts the information system and the other the diagnostic block. The first one is the information system which gives information about all the aspects of chickpea cultivation like varieties, sowing, land preparation, pest and disease management, nutritional disorder, post harvest technology .The second part i.e the diagnostic block in which the expert system asks the user to answer few questions and accordingly decides the insect or disease attacking the plant and suggests control and remedial measures. The main feature of this expert system is that it is bilingual i.e. in English and hindi language (which can be easily understood by the Indian farmers).

 multimedia, expert system, hindi language, chickpea cultivation technology.


1.        Shikhar Kr. Sarma, Kh. Robindro Singh & Abhijeet Singh “An Expert System for diagnosis of diseases in Rice Plant” International Journal of Artificial Intelligence, Volume(1): Issue(1) PP 26-31
2.        Rafea, A (1995) “Expert System as a tool for information technology in agriculture.” The International Informatics Access 95 Singapore.

3.        Khan, F.S., Razzaq, S., Irfan, K., Maqbool, F., Farid, A., Illahi, I. &, Ul Amin, T. (2008). Dr. Wheat: a web-based expert system for diagnosis of diseases and pests in Pakistani wheat. World Congress on Engineering, London, July 2 - 4, 2008. Proceedings of World Congress on Engineering I: 549-554.

4.        P. Mercy Nesa Rani1, T. Rajesh2 and R. Saravanan3 Expert Systems in Agriculture: A Review Journal of Computer Science and Applications. Volume 3, Number 1 (2011), pp. 59-71.

5.        Ahmed Rafea Expert System Applications: Agriculture Central Laboratory for Agricultural Expert www.arc.sci.eg

6.        Extension bulletin, krishi vishwa published by JNKVV, Jabalpur.






Kamlesh Kumar Singh, Geetika Srivastava, Ravi Shankar Mishra, Deepak Tiwari

Paper Title:

Current Conveyor: A Novel Active Building Block Prevailing Op-Amp Limitations

Abstract:   There has been significant development in the circuit implementation of current conveyors as a key element because of its low voltage low power characteristics and wide dynamic operating range.The current conveyor agreements numerous benefits over the conventional Op-Amp. Unambiguously the current conveyor circuit can arrange for a higher voltage gain over a larger signal bandwidth under small or large signal conditions. In contemporaneous consequence current conveyors are substituting the conformist Op-amp in numerous applications such as analog signal processing, active filters, and converters.

 Current Conveyor (CC I), Differential voltage current conveyor, Current Mirror (CM), Operational Amplifiers (OA). 


1.        K.C Smith, and A. Sedra, “The current conveyor—a new circuit  building block,” Proc. IEEE, Vol. 56, pp.  1368- 1369, Aug, 1968.
2.        A. Sedra, and K. Smith, “A second-generation current- conveyor and its applications,” IEEE Trans., vol. CT- 17, pp 132-134, 1970.

3.        Fabre, (1995) “Third generation current conveyor: a new helpful active element,” Electron Lett 31:338-339.

4.        A.S. Sedra, G.W. Roberts, and F. Gohh, “The current conveyor: history, progress and new results,” IEE Proc. of ISCAS1990, Vol. 137, pp 78-87.

5.        Toumazou, F.J. Lidgey, and D.G. Haigh, (ed)., “Analogue IC design: the current mode approach,” London,  Peter Peregnirus Ltd, 1990, 646p.

6.        A. Fabre and J. L. Houle, “Voltage-mode and current-mode Sallen-Key implementations based on translinear conveyors,” IEE Proc. Pt. G, vol 139, pp. 491497, Aug. 1992.

7.        G. Ferri, and N.C. Guerrini, “Low voltage Low power CMOS Current Conveyors,” Kluwar Academic Publications, pp. 67-69.

8.        L.N. Alves, R.L. Aguiar, and D.M. Santos, “Bandwidth Aspects in Second Generation Current Conveyors,” Analog Integrated Circuits and Signal Processing, 33, 127–136, 2002 ©2002 Kluwer Academic Publishers.

9.        A. Fabre and M. Alami, “A versatile translinear cell-library to implement high performance analog ASICS,” in IEEE Conf  Proc. EUROASIC’90, Paris, May 29-31, 1990, pp. 89-94.

10.     B. Wilson, “Recent developments in current conveyors and current mode circuits,” IEE Proc., Pt. G, vol. 137, pp. 63-77, Apr. 1990.

11.     G. Normand, “Translinear current conveyor,” Int. J. Electron., vol. 59, pp. 771-777, Dec. 1985.

12.     A. Fabre, H. Barthelemy, “Composite second-generation current conveyor with reduced parasitic resistance,” Electronic Letters, vol. 30, pp. 377-378, March1994.






Nikhil Kumar Jain, V Aravind, Eranki V S Krishna Prasad, Y Kalyan Chakravarthy

Paper Title:

Virtual Prototype of Mechanical Hand Crank Mobile Charger

Abstract:   Mobile phone is our means to remain connected. While the phones have progressively got more powerful processors and large touch screen interfaces, their power requirement has increased correspondingly. Unfortunately, battery technology has not been growing at a comparable pace. Hence, there is a need to frequently charge the batteries. While travelling, people face a common problem of charging electronic appliances. Our solution to this problem is Mechanical Hand Crank Mobile Charger. Mechanical hand crank mobile charger is a device that utilizes mechanical energy, converts it into electrical energy and charges the mobile. It doesn’t require any electrical source. Also by going for this alternative source of energy we can reduce the human footprint on Earth as we are using human effort instead of conventional electricity. We have used a compound gear train and 6 intermediate gears for transformation of mechanical energy from hand crank to generator. Pro-engineer software for designing the gear train, NI Multisim software for simulation of the circuit and Reverse engineering technique to achieve this solution for the problem.

 Compound gear train, NI Multisim, Reverse engineering, Simulation.


1.        Amitabha Ghosh and Ashok Kumar Malik, Theory of Mechanisms and      Machines. ch. 9
2.        J. S. Brar and Dr. R. K. Bansal, Theory of Machines. ch. 10 pg. 450 - 460

3.        Thomas Bevan, Theory of Machines ch. 10, 11

4.        William Hayt, Jack Kemmerly, and Steven Durbin, Engineering Circuit Analysis.

5.        Ben Zeines, Electric Circuit Analysis.

6.        QU Bao-zhon, ZHANG Ji-tao, LIU Yi-zhu; “Simulation analysis and design of circuits based on Multisim”; Journal Of Henan Polytechnic University; Vol. 28 No. 2, Apr.
2009 pp221 – 225.

7.        Li Linqiang; “A manual mobile phone charger”; International Conference on Electrical and Control Engineering; Jun. 25-27, 2010 pp79-82.

8.        http://www.engineersedge.com/gear_menu.shtml.

9.        http://www.circuitconnections.com/

10.     http://www.apexgarage.com/tech/gear_ratios.shtml  






D.Nagarjuna, Junaid Mohammed Farooq, A.S.N.Saiteja, P.Siddhartha Sri Teja

Paper Title:

Optimization of Chassis of an All Terrain Vehicle

Abstract:   In the case of vehicles, the term chassis means the frame plus the running gear like engine, transmission, driveshaft, differential, and suspension. An all-terrain vehicle (ATV), also known as a quad, quad bike, three-wheeler, or four-wheeler, is defined by the American National Standards Institute (ANSI) as a vehicle that travels on low pressure tires, with a seat that is straddled by the operator, along with handlebars for steering control. As the name implies, it is designed to handle a wider variety of terrain than most other vehicles. This paper deals with design of chassis frame for an All Terrain Vehicle and its Optimization. Various loading tests like Front Impact, Rear Impact, Side Impact, Roll over test etc have been conducted on the chassis and the design has been optimized by reducing the weight of the chassis.

 Differential, Driveshaft, ATV, Transmission, Quad Bike.


1.        SAE Rule Book, 2011.
2.        Auto Expo Magazine, 2010.

3.        “Consolidated Rules for Mini Baja East, Midwest and Mini Baja 100”, Society of Automotive Engineers, September 2004.

4.        http://www.saeindia.org//

5.        http://www.wikipedia.org//

6.        ANSYS 11 Help.






K.RaviRaju, B.MadhavaVarma, N.Ravi Kumar

Paper Title:

Condition Based Maintenance (CBM) Through Vibration Spectrum Analysis for Improving the Reliability of B-1 Conveyor (DIVE542) Diagnosis of Fault through Vibration Spectrum Analysis Technique

Abstract:   The success of a company often depends on the continued, safe and productive operation of rotating machinery. An effective maintenance program is vital to this kind of success. The quality of company’s maintenance program determines how long the machines will run, how safe they are for the people working around them, and how productive the machine will be. Berar these things in mind while you consider the following benefits of a CBM program in greater detail. The operation and maintenance of high valuable machines is very important in increasingly stiff global market and requires that it provides maximum return on investment with minimum maintenance costs. Improving plant efficiency by implementation of latest techniques in maintenance can lead to significant savings with improvement in overall operating efficiency of plants. This project brings outs the importance of vibration analyzing in maintaining the machines. The vibration analysis can be simplified and make time saving by analyzing the FFT (Fast Fourier transform) or amplitude vs. frequency spectrum. By analyzing the spectrum we can estimate the cause of vibrations in the machine.

 Fault diagnosis, CBM, FFT, vibration amplitude, Spectrum analysis, phase, and coast down


1.        R. B. Randall 1987 Frequency Analysis. Copenhagen: Bruel & Kjaer.
2.        Braun, S, J.1986, mechanical signature analysis. Academic press, London.

3.        Collacot R., A. 1979, vibration monitoring and diagnostic. Wiley, New York.

4.        Mitchell, j., S. 1981, Machinery Analysis and monitoring. Penn well books, Tulsa.

5.        Natke, H. G., Campel, C. 1977, Model-aided diagnosis of mechanical systems: fundamental detection,     Localization, Assessment. Springer Verlag, Berlin.

6.        Dalpiaz, G., Rivola A., Rubin, R. 2000. Effectiveness and sensitivity of vibration processing Techniques for local fault detection in gears. Mechanical systems and signal processing 14(3) 387-412.

7.        Rubbini, R., Meneghetti, U. 2001. Application of the envelope a Wavelet transforms analyses for the diagnosis of incipient faults in ball bearings. Mechanical systems and signal processing, 15(2), 287-302.

8.        Requiang, Y., Robert G. 2007.Approximately Entropy as a diagnostic tool for machine health monitoring. Mechanical system and signal processing,, 21, 824-894.

9.        Shibata, K., Takahashi, A., Shirai, T.2000. Fault diagnosis of rotating machinery through visualization of sound signal. Mechanical systems and signal processing, 14(2)229-241.

10.     Rehorn, A. G., Sejdic, E., Jiangh, J.2006 Fault diagnosis in machine tools using selective regional correction. Mechanical systems and signal processing, 20, 1221-1238.

11.     IRD Mechanalysis manual for training.

12.     CSI manual for vibration analysis.

13.     Vibxpert manual for fault diagnosis





Balachandra Pattanaik, S.Chandrasekaran

Paper Title:

Safety Reliability Enhancement in Fault tolerant Automotive Embedded System

Abstract:  Reliability is control and prevention of failures to reduce failure and improve operations by enhancing performance with system-level analysis and modelling are needed not only for predictability and comparability when partitioning end-to-end functions at design time levels of reliability. Reliability numbers by themselves will not motivate improvements, performance of two fault tolerant mechanisms dealing with repairable and non-repairable components that have failed. The improvement in the reliability and safety of a system with repairable components with respect to the fault tolerant systems under study correspond to a flexible arrangement of fault tolerant units (FTU’s). SFAS (Safety Fault tolerant Automotive Systems) and ECU are being compared to achieve effective results. Reliability principles are discussed which assist system improvement for reducing the high unreliability. CAN Controllers are used in automotive for fault tolerant embedded system. The existing reliability enhancement models are emphasizing various redundancy techniques both in hardware and software without focusing a formal way of recovery time minimization from the affected or degraded states in the automotive systems.

Automotive Embedded Systems, SFAS, FT CAN


1.        R. Bosch, CAN Specification 2.0. Postfach, Stuttgart, Germany:Robert Bosch GmbH, 1991.
2.        M. Farsi and M. Barbosa, CANopen Implementation: Applications to Industrial Networks. U.K.: Research Studies Press Ltd., 2000.

3.        L. B. Fredriksson, “Controller area networks and the protocol CAN for machine control systems,” Mechatronics, vol. 4, no. 2, pp.159–   192, 1994.

4.        K. Etschberger, Controller Area Network: Basics, Protocols, Chips andApplications. : IXXAT Automation GmbH, 2001.
5.        K. Pazul, Controller Area Network (CAN) Basics, Microchip Technology Inc., 1999, Preliminary DS00713A, Page 1 AN713.

6.        Philips, P8_592 8-bit Microcontroller with on-Chip CAN Datasheet,Philips Semiconductor, 1996.

7.        N. Navet, F. Simonot-Lion, “A Review of Embedded Automotive Protocols”, Technical Report, Nancy Université, 2008.

8.        H. Aysan, A. Thekkilakattil, R. Dobrin, S. Punnekkat, “Fault Tolerant Scheduling on Controller Area Network(CAN)”, Proc. of  Emerging Technologies and Factory Automation Conference, pp. 1-8, 2010.

9.        T. Nolte, H. Hansson, L.L. Bello, “Automotive Communications - Past, Current and Future”, Proc. Of 10th IEEE Conference on Emerging TeFactory Automation, Vol. 1, pp. 985-992,2005.

10.     N. Navet, Y. Song, F. Simonot-Lion, C. Wilwert, Trends in automotive communication systems”, Proc.of IEEE, Vol. 93, Issue 6,pp.1204-1223, 2005.

11.     FlexRay Consortium. (2004, June) Flex Ray Communication System, Protocol Specification, Version 2.0. [Online].Available:http://www.flexray.com

12.     C. Temple, “Networking the FlexRay Way – An Overview of the Flex Ray Communications System”,Technical Report, Free scale Semiconductor.

13.     Billiton R., and Allan R. N., Reliability Evaluation of Engineering Systems, Concepts and Techniques, 2nd Ed., Plenum Press, New York, 1992.

14.     Zhang Wenfan, Liao Hui, “Design and research of performance of automated test system of electro-hydraulic proportional valve”,International Conference on Eletronics, Communication and Control (ICECC) 2011, pp 1989-1991, Septmeber 2011.

15.     Jianguang Jia, Jingming Kuang, Zunwen He, Jun Fang, “Design of automated test system based on GPIB”,ICEMI ’09th InternationalConference on Electronic Measurement & Instruments 2009, pp 1-943 – 1-948, August 2009.

16.     International Standard, Road Vehicles – Controller Area Network Part II: High-speed access unit, ISOCD 11898-2

17.     Internationl Standard, Road vehicles – Controller Area Network Part V, ISO11898-5

18.     Michale short and Michael J.point, Member IEEE, Fault-Tolerant Time-Triggered Communication Using CAN, Industrial Informatics,vol,3 No.2,may 2007.                       

19.     Adithya Hrudhayan Krishnamurthy, Ramkumar Ravikumar, Fault Tolerance in Automotive Systems, 2010






Devajit Mahanta, Majidul Ahmed, Utpal Jyoti Bora

Paper Title:

A study of Bandwidth Management in Computer Networks

Abstract:   Bandwidth management is one of the most widely misunderstood subjects in modern networking. Bandwidth Management is a lot like economics, because the complexities of how it works are beyond simple logic. Internet "bandwidth" is not a spectrum; traffic streams are one bit at a time. Bandwidth on the internet can only be conceptualized over time, and the amount of time that you talk about can greatly change the user experience. For reliable data transmission within  computer  network  and  internet  forms  the  basis  for management  and  control  of  bandwidth.  Without bandwidth management, an user will not be able to handle all available bandwidth on the networks. It will be impossible to differentiate between various network traffics, and it will also be difficult to control which user or application has priority on the network.  Applications  which  require  specific  quantity  and  quality  of  service may not be predicted in terms of available bandwidth,  thus making some applications run poorly due to improper bandwidth allocation. This work focus on the development of an application to combat the challenges facing easy flow of data transmission   problems   in   network   design as   organization network evolves. Here PHP Script, Apache Server and MySQL are the development tools used

Keywords:  Bandwidth management, internet, data transmission, computer networks


1.        Tommy K Paul (1994) “Building Network Bandwidth” Network News - The Network Professional Association monthly publication. http://www.sju.edu/%7Ejhodgson/netw/tp_asg4.html
2.        http://en.wikipedia.org/wiki/Computer_network

3.        Introduction to bandwidth. http://www.google.com

4.        Rodger Jamieson, Greg Stephens and Santosh Kumar (2005), Firewalls and bandwidth management (IT journal)

5.        Douglas Comer (2008), Computer Networks and Internets , p. 99 Prentice Hall 2008

6.        Fred Halsall(1985), Introduction to Data Communications and Computer Networks, p. 108, Addison-Wesley.

7.        Behrouz A. Forouzan, Data communications and networking, McGraw-Hill, 2007

8.        Douglas E. Comer. (1995) Internetworking with TCP/IP Vol.1: Principles, Protocols, and Architecture. 4th ed. Upper Saddle River: Prentice Hall.

9.        Bandwidth overview: benefits of bandwidth management http://info@3factor.com/bandwidth/overview_benefits.htm

10.     The Internet Services Company (2002) “Active Bandwidth Management Device” Networking http://www.interchannel.net/product/networking/band width.htm

11.     Catherine Allen (1992) “Bandwidth control, The Global Journal of Advanced Management Technology, Robin Townsend (London: Global projects Group, 1995). Pp. 193-194 Vol. 2

12.     http://www.ianswer4u.com/2012/05/hybrid-topology-advantages-and.html#axzz2CDC4UC67

13.     http://ninjacraze.hubpages.com/hub/Data-Communication

14.     http://surelyitsme.blogspot.in/2012/05/unbounded-unguided-media-or-wireless.html






Nitish Puri, Brijesh Kumar, Himanshu Tyagi

Paper Title:

Utilization of Recycled Wastes as Ingredients in Concrete Mix

Abstract:   Laboratory experimentation was carried out to analyze the performance of M25 concrete made by partially replacing aggregates with waste materials like construction debris, PVC scrap and leather waste. The resultant concrete was tested for parameters like weight, compressive strength, slump and workability and compared with conventional plain cement concrete. It has been observed that the use of waste materials results in the formation of light weight concrete. There is a considerable increase in the compressive strength of concrete when the coarse aggregates are fully or partially replaced with construction debris. However a minor reduction in workability of the concrete mix was observed. When the coarse aggregates were replaced with PVC scrap in small percentage by weight, the resultant concrete shows fair value of compressive strength and the workability. But with the partial introduction of leather waste in place of sand in concrete, the concrete passed workability test but it failed completely in compressive strength test and gave almost zero strength. Hence, except leather waste other materials like construction debris and PVC scrap   performed well as full or partial replacement for concrete aggregates and can find suitable application in construction industry as alternative to conventional materials. Uses of such waste materials will not only cut down the cost of construction, but will also contribute in safe disposal of waste materials. Apart from the environmental benefits, the addition of such wastes, also improves certain properties of resultant concrete.  

 M25 Concrete, compressive strength, flexural strength and workability.


1.        Gambhir, M.L. (1986), Concrete Technology, Tata McGraw-Hill Publishing Company Limited, New Delhi.
2.        Gambhir, M.L. (1992) Concrete Manual, 4th ed., Dhanpat Rai & Sons, Delhi.

3.        IS: 456 (2000), “Plain and Reinforced Concrete Code of Practice”, Bureau of Indian Standards.

4.        IS: 8112 (1989), “Specifications for 43-Grade Portland Cement”, Bureau of Indian Standards.

5.        IS: 10262 (1982), “Recommended Guidelines for Concrete Mix Design”, Bureau of Indian Standards.

6.        IS: 383 (1970), “Specifications for Coarse and Fine Aggregates from Natural Sources for Concrete”, Bureau of Indian Standards.

7.        IS: 516 (1959), “Indian Standard Code of Practice - Methods of Test for Strength of Concrete,” Bureau of Indian Standards.

8.        IS: 1199 (1959), “Indian Standard Methods of Sampling and Analysis of Concrete”, Bureau of Indian Standards, New Delhi, India.

9.        Saha, Nabanita, Mukhopadhya, Satyanarayan , Siddique, Imran and Saha, Petr  (2005), “Waste leather in India – An integrated business with value creation opportunities”, 7th World Congress on Recovery, Recycling and Re-integration (R’05) in Beijing, China.

10.     www.cpcb.nic.in & www.urbanindia.nic.in (Government of India).






K.S. Prasanna Kumar

Paper Title:

Algorithm to Identify Kannada Vowels using Minimum Features Extraction method

Abstract:   This paper introduces a novel way of feature extraction for Optical Character Recognition (OCR) customized for Kannada characters. The algorithm described here relies on breaking the character into four equal parts and using one of the quarters for extraction. The algorithm is deliberately kept away from all the complexities and the number of features to be extracted is also minimized so as to increase the efficiency and speed of recognition. The algorithm also describes a conflict resolution technique helpful in effectively utilizing the algorithm.

 Kannada OCR, Minimal Feature Extraction, Character recognition Algorithm, Conflict resolution.


1.        R. M. Brown, T. H. Fay, and C. L. Walker, Handprinted Symbol Recognition System, Pattern Recognition, Vol. 21, No. 2, 1988, pp. 91-118
2.        L. Stringa, A New Set of Constraint-Free Character Recognition Grammars, IEEE, Transactions on PAMI, Vol. 12, No. 12, 1990, pp. 1210-1217.

3.        C. Y. Suen, C. Nadal, R. Legault, T. A. Mai, and L. Lam, Computer Recognition of Unconstrained Handwritten Numerals, Proceedings of the IEEE, Vol. 80, No. 70, July 1992, pp.1162-1180

4.        B. T. Mittchell and A. M. Gillies, A Model-Based Computer Vision System for Recognizing Handwritten ZIP Codes, Machine Vision and Applications, Vol. 21, No. 4,1989, pp.231-243.

5.        L. Cun, L. Bottou, Y. Bengio, and P. Haffner, Gradient-Based Learning Applied to Document Recognition, Proceedings of the IEEE, Vol. 86, No. 11, November 1998, pp.2278-2324.

6.        M. Shi, Y. Fujisawa, T. Wakbayashi, and F. Kimura, Handwritten Numeral Recognition Using Gradient and Curvature of Gray Scale Image, Patter Recognition, Vol. 35, No. 10, 2002, pp. 2051-2059.

7.        L.N. Teow and K. F. Loe, Robust Vision-Based Feature and Classification Schemes for Off-Line Handwritten Digit Recognition, Pattern Recognition, Vol. 35, No.1, 2002,pp. 2355-2364.

8.        D. Decoste and B. Scholkopf, Training Invariant Support Vector Machines, Machine Learning, Vol. 46, No. 1-3, 2002, pp. 160-190.

9.        L. Xu, A. Krzyzak, and C. Y. Suen, Methods of Combining Multiple Classifiers and their Applications to Handwritten Recognition, IEEE Transactions on Systems, Man, Cybernetics, Vol. 22, No. 3, 1992, pp. 418-435.

10.     C. H. Lee and D. A. Langdgrebe, Feature Extraction Based on Decision Boundaries, IEEE Transaction on PAMI, Vol. 15,  No. 4, April 1993, pp. 388-400.

11.     S. W. Lee, Off-Line Recognition of Totally Unconstrained Handwritten Numerals Using Multilayer Cluster Neural Network, IEEE Transactions on PAMI, Vol. 18, No. 6, June 1996, pp. 648-652.

12.     P. D. Gader and M. A. Khabou, Automatic Feature Generation for Handwritten Digit Recognition, IEEE Transactions on PAMI, Vol. 18, No. 12, pp. 1256-1261.

13.     W. E. Weideman, M. T. Manry, H. C. Yau, and W. Gong, Comparisons of a Neural Network and a Nearest-Neighbor Classifier Via the Numeric Handprint Recognition.

14.     II-Seok Oh and C. Y. Suen, Distance Features for Neural Network-Based Recognition of Handwritten Characters, International Journal on Document Analysis and Recognition, Vol. 1, No. 1, 1998, pp. 73-88.

15.     L. H. Yang, C. Y. Suen, T. D. Bui, and P. Zhang, Discrimination of Similar Handwritten Numerals Based on Invariant Curvature Features, Pattern Recognition, Vol.
38, No. 7, July 2005, pp. 947-963.

16.     J. Gao and X. Q. Ding, On Improvement of Feature Extraction Algorithms for Discriminative Pattern Classification, 15th International Conference on PatternRecognition, 2000, pp. 2101-2104.

17.     L. S. Oliveira, R. Sabourin, F. Bortolozzi, and C. Y. Suen, Impacts of Verification on a Numeral String Recognition System, Pattern Recognition Letters, Vol. 24, No. 7, July 2002, pp. 1023-1031.

18.     G. Y. Chen, T. D. Bui, and A. Krzyzak, Contour-Based Handwritten Numeral Recognition Using Multiwavelets and Neural Networks, Pattern Recognition, Vol. 36, No. 7, 2003, pp. 1997-1604

19.     Worapoj Peerawit and Asanee Kawtrakul, Marginal Noise Removal from Document Images Using Edge Density, ICEP2004, Phuket, Thailand, 2004.

20.     F. Shafait, J. van Beusekom, D. Keysers, and T. M. Breuel. Page frame detection for marginal noise removal from scanned documents. In SCIA 2007, Image Analysis, Proceedings, volume 4522 of Lecture Notes in Computer Science, pages 651–660, Aalborg, Denmark, June 2007.

21.     F. Shafait, J. van Beusekom, D. Keysers, and T. M. Breuel. Document cleanup using page frame detection. Int. Jour. on Document Analysis and Recognition, 11(2):81–96, 2008.

22.     Jalal Uddin Mahmud, Mohammed Feroz Raihan & Chowdhury Mofizur Rahman (2003). A Complete OCR System For Continuous Bangali Characters, IEEE,PP. 1372-1376.

23.     Md. Abul Hasnat, S.M. Murtoza Habib, Mumit Khan (2007). A High Performance Domain Specific OCR for Bangla Script.

24.     Tinku Acharya and Ajoy K. Ray (2005). “Image Processing Principles and Applications, John Wiley & Sons, Inc., Hoboken, New Jersey.

25.     K.S. Prasanna Kumar, Optical Character Recognition (OCR) for Kannada numerals using Left Bottom 1/4th segment minimum features extraction, Int.J.Computer Techology & Applications,Vol 3 (1), 221-225

26.     R.Narasimhacharya “History of Kannada Literature: readership lectures” 1988.

27.     "Kannada script Evolution". Official website of CIIL, India. Classicalkannada.org. Retrieved 12 May 2008.

28.     http://www.water.rutgers.edu/Senior_Design/Final%20Documents%20(Part%201)/Appendix%20E%20-%20Image%20Processing.pdf





Nitin Adhav, Shilpa Agarwal

Paper Title:

Comparison and Implementation of Different PWM Schemes of Inverter in Wind Turbine

Abstract:   As the conventional sources are limited, world has to move towards new sources of energy and they are renewable sources like wind, solar etc. Wind technology has been started many years ago, as it is clean and free energy source worldwide. In this paper the variable wind turbine, how they interface with power electronics and with interface and different control techniques of wind able to reduce fluctuations in variable speed wind turbine, sinusoidal electrical energy to be penetrated in to the load/grid. This paper discuss the most emerging renewable energy source, wind energy, which by means of power electronics is changing from being a minor energy source to be acting as an important power source in the energy system. By that wind power is also getting an added value in the power system operation [2].

 Wind Generator, SPWM, HCC, SVPWM Power Quality, PSIM


1.        Nitin Adhav “ A concept of Smart grid and  control   Schemes in variable power source wind turbine   International journal of engineering and research Application “ Vol. 2, Issue 4, July-August 2012, pp.579-  584
2.        F. Blaabjerg, Z. Chen, R. Teodorescu, F. Iov Aalborg University institute of Energy Technology    “Power Electronics in Wind Turbine Systems” 1-4244-0449-5/06/$20.00 ©2006 IEEE

3.        Juan Manuel Carrasco, Jan T. Bialasiewicz,, Ramón   C. Portillo Guisado, José Ignacio León, “Power-Electronic Systems for the Grid Integration of Renewable Energy Sources: A Survey” IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 53, NO. 4, AUGUST 2006

4.        S. M. Barakati, M. Kazerani, Senior Member, IEEE, and X. Chen “A new wind turbine system based on matrix converter”0-7803-9156-X$20.00@2005 IEEE

5.        Inside Wind turbine fixed Vs. Variable james and james Science publishers ltd.

6.        Voltage Source-PWM inverter

7.        A.M.Gole 2000 “power electronics” Sinusoidal Pulse Width Modulation
8.        Power Electronics and Drives (Version 2): Dr. Zainal Salam, 2002 4.4.1 SPWM

9.        D.Dujic, E.Levi, M.Jones Liverpool John Moores University School of Engineering G.Grandi, G.Serra, A.Tani University of Bologna Department of Electrical Engineering 40136 - Bologna, Italy Liverpool L3 3AF, UK “Continuous PWM Techniques for Sinusoidal Voltage Generation with Seven-Phase Voltage Source Inverters” 1-4244-0655-2/07/$20.00©2007 IEEE

10.     Tariq MASOOD.CH Qatar Petroleum Dukhan Qatar, Dr. Abdel-Aty Edris (Manager Power Delivery R & D) EPRI USA, Prof. Dr. RK Aggarwal University of Bath Bath _ UK, Prof. Dr. Suhail A. Qureshi University of Engineering & TechnologyLahore Pakistan, Prof. Dr. Abdul Jabber Khan Rachna College of Engineering &Technology Gujranwala Pakistan, Yacob Y. Al-Mulla IEEE Chair Doha Qatar” Space Vector (PWM) Digital Control and Sine (PWM) Pulse Width Modulation modelling, simulations Techniques & Analysis by MATLAB and PSIM (Powersys)”

11.     K. Vinoth Kumar, Prawin Angel Michael, Joseph P. John and Dr. S. Suresh Kumar School of Electrical Sciences, Karunya University, Coimbatore, Tamilnadu, India “SIMULATION AND COMPARISON OF SPWM AND SVPWM CONTROL FOR THREE PHASE INVERTER” ARPN Journal of Engineering and Applied Sciences VOL. 5, NO. 7, JULY 2010

12.     M.B.B. Sharifian, R. Rahnavard, Y. Ebrahimi “Variable Hysteresis Band Current Controller of Shunt Active Filter Based Fuzzy logic Theory under Constant Switching Frequency” International Journal of Computer and Electrical Engineering, Vol. 1, No. 2, June 2009 1793-8163

13.     B.Chitti Babu , K.B.Mohanty“Doubly-Fed Induction Generator for Variable Speed Wind Energy Conversion Systems- Modeling & Simulation” International Journal of Computer and Electrical Engineering, Vol. 2, No. 1, February, 2010 1793-8163

14.     Mansour Mohseni, Student Member, IEEE, and Syed M. Islam, Senior Member, IEEE “A New Vector-Based Hysteresis Current Control Scheme for Three-Phase PWM Voltage-Source Inverters” IEEE TRANSACTIONS ON POWER ELECTRONICS, VOL. 25, NO. 9, SEPTEMBER 2010

15.     Seung-Ho Song, Shin-il Kang Div. of Electronics & Information Engineering Chonbuk National University, Nyeon-Kun Hahm* Intech-FA Co Ltd* Youngin , Gyungi, Korea “Implementation and Control of Grid Connected AC-DC-AC Power Converter for Variable Speed Wind Energy Conversion System” 0-7803-7768-0/03/$17.00 (C) 2003 IEEE

16.     S. Seman, Student Member, IEEE, J. Niiranen, S. Kanerva, and A. Arkkio “Analysis of a 1.7 MVA Doubly Fed Wind-Power Induction Generator during Power Systems Disturbances “

17.     Nikolay N. Lopatkin, Maria I. Kraskova Biysk Teacher-Training State University after S.M. Shukshin (BTTSU),Biysk, Russia” Simple PSIM-model of Vector Formation of the Phase-to-Phase Voltage of a Multilevel Inverter” 9th INTERNATIONAL WORKSHOP AND TUTORIALS EDM’2008, SESSION IV, JULY 1-5, ERLAGOL

18.     Mohamayee Mohapatra, B.Chitti Babu, Member IEEE Department of Electrical Engineering, National Institute of Technology, Rourkela, INDIA “Fixed and Sinusoidal-Band Hysteresis Current Controller for PWM Voltage Source Inverter with LC Filter IEEE students’ Technology symposium,IIT kharagpur,03.

19.     Dalessandro, U. Drofenik, S. D. Round and J. W. Kolar  Swiss Federal Institute of Technology (ETH) Zurich  Power Electronic Systems Laboratory” A Novel Hysteresis Current Control for Three-Phase Three-Level PWM Rectifiers”

20.     Lecture 25 prof.Ali Keyhani Department of Electrical And Computer Engineering The Ohio State University“Pulse Width Modulation Techniques”  

21.     Dorin O. Neacsu” SPACE VECTOR MODULATION–An Introduction Tutorial at IECON2001” IECON'01: The 27th Annual           Conference of the IEEE Industrial Electronics Society

22.     Dr.Rafael K.Jardan”Supporting text for the E-learning Material chapter 3.4.Control in Power Electronics Part B:-Space Vector Theory

23.     Dong-Choon Lee, Member, IEEE, and G-Myoung  Lee “A novel modulation technique for Space Vector PWM inverter” IEEE TRANSACTIONS ON  POWER ELECTRONICS, VOL. 13, NO. 6, NOVEMBER 1998


25.     Abdul Rahiman Beig G.Narayanan Lab Department of Electrical Enginner Indian Institute of Science Bangalore, V.T. Ranganathan “Space Vector Based
Synchronized PWM Algorithm for Three Level Voltag Source Inverters: Principles and Application to VlfDrives Chapter 2 Wind Turbine Modelling

26.     J. Marques, H. Pinheiro, H. A. Gründling, J. R. Pinheiro and H. L. Hey Federal University of Santa Maria – UFSM Group of Power Electronics and Control – GEPOC UFSM/CT/NUPEDEE, Campus Universitário, Camobi “A survey on variable speed wind turbine”  






Neel Kamal, D.K.P. Singh

Paper Title:

Hybrid Photovoltaic-Thermo Electrical Power Generation for Water Pumps

Abstract:   Water is a basic need of human beings along with food and air. There is a large escalation of demand for fresh water because of the rapid industrial growth and explosion of population all over the world. Thus, it has become pertinent to do further research in this field to improve the sea water desalination process. The separation of salts from seawater requires significant amounts of energy. When the energy is produced from fossil fuels, this approach can harm the environment, and as desalination requires significant energy, this in turn is costly. Therefore, there is a need to employ environmentally-friendly and affordable energy sources, specifically renewable energy, in order to desalinate seawater. Renewable energy comes from natural resources such as sunlight, wind, rain, tides, and geothermal heat, which are naturally replenished. Renewable energy can be used for seawater desalination. Photovoltaic water pumping  applications  are  one  of  the  most  common  uses  of  PV  power throughout  the world,  with  thousands  of  solar-powered  water  pumps  installed  both  in  industrialized  and developing nations. Hybridization of PV with Thermoelectric modules can increase the overall efficiency of the solar energy conversion system by keeping the temperature constant within limits. For enhanced  control  of  water  pumps  vector  control  of  motor/pump  is  used  which  can  work satisfactorily with non-constant power output of Photovoltaic-TE Hybrids with super capacitors or energy storage support. This paper is an attempt to explore the efficient mean of water pumping through augmentation of thermoelectric conversion to increase overall efficiency of PV array for pump operation of sea water desalination. The study of thermoelectric is done to illustrate its usefulness in hybrid model of PV and thermoelectric modules. Model of hybrid combination of Thermoelectric – PV array have been developed and simulation results are also presented in this paper.

 Hybridization, PV array, TE Generator, Sea water desalination.


1.        M. J. Case, E. E. Denny “A Novel Approach to Photovoltaic Powered Water Pumping Design”Power electronics and motion control conference 2008, EPE-PEMC 2008, 13th 1-3 Sept. 2008 Page(s):1798 – 1802
2.        http://zone.ni.com/devzone/cda/tut/p/id/7230

3.        Yuan. Li1, Taewon Lee, Fang. Z. Peng, and Dichen Liu “A Hybrid Control Strategy for Photovoltaic Simulator”.Applied Power Electronics Conference and Exposition 2009.  Twenty-Fourth Annual IEEE , 15-19 Feb. 2009 Page(s):899 – 903

4.        Frank Dimroth and the team`a press release from Fraunhofer Institute for Solar Energy Systems ISE Heidenhofstr. 279110 Freiburg Germany, Jan 14, 2009.pages:1-3

5.        N. Hamrouni, M. Jraidi, A. Cherif, A. Dhouib , “Measurements and Simulation of a PV Pumping Systems Parameters Using MPPT and PWM Control Strategies ”  IEEE MELECON 2006. May 16- 19, Benalmádena (Málaga), Spain Page(s):885-888.

6.        S. P. Wenham, S. Bowden, M Dickinson, R Largent , Djordon and M Green "Prototype photovoltaic roof tiles" 13th European photovoltaic solar energy conference , Nice  France 1995 pp 254-257.

7.        M Yamaguch, T Takamato , K Arak " Super high efficiency multi junction and concentrator solar cells" Solar energy materials and solar cells, vol 90, 2006  pp 3068

8.        H. Xiao, X. Gou and C. Yang  “Simulation Analysis on Thermoelectric   Generator System Performance” System Simulation and Scientific Computing, 2008.  Asia Simulation Conference - 7th International Conference on 10-12 Oct. 2008 Page(s):1183 – 1187. IEEE 2008.

9.        M. Chen, L A. Rosendahl, T. J. Condra, J. K. Pedersen “Numerical Modeling of Thermoelectric Generators With Varying Material Properties in a Circuit Simulator” IEEE Transactions on Energy Conversion , VOL. 24, No. 1, March 2009. Page(s):112-124

10.     H. P. Garg , R.S. Adhikari " performance analysis of a hybrid photovoltaic/ thermal(PV/T)  collector with integrated CPC troughs" Int J Energy Res  vol 23 ,1999, pp 1295-1304.

11.     M. J. O’Leary, L.D. Clements “Thermal –electrical performance analysis for actively cooled concentrating photovoltaic system “solar energy, vol 25, 1980, pp 401-406.

12.     M. Y. Othman , B. Yatim, " Performance analysis of a double pass photovoltaic/ thermal (PV/T) Solar collector with CPC and fins" Renewable Energy, vol 30, 2005,  pp. 2005-2017.






Poonam Sengar, Bhagyshri Lachhwani, Mehul Barot

Paper Title:

Discovering Frequent Patterns Mining Procedures

Abstract:   Efficient algorithm to discover frequent pattern are crucial in data mining research. Finding frequent itemsets is computationally the most expensive step in association rule discovery .To address these issues we discuss popular techniques for finding frequent itemsets in efficient way. In this paper we provide the survey list of existing frequent itemsets mining techniques and its analysis.

 Association rules, data mining, frequent itemsets, FPM, minimum support.


1.        Agrawal, R. Imielinski, T. and Swami. Mining Association Rules between Sets of Items in Large Databases, Proc. of ACM SIGMOD, Washington DC, 22:207-216, ACM Press
2.        Agrawal, R. and Srikant, R. Fast Algorithms for Mining Association Rules in Large Databases, Proc. 20th Intl Conf. Very Large Data Bases, pp. 478-499, Sept. 1944.

3.        Park, J.S. Chan, M. and Yu, P.S. An Effective Hash-based Algorithm                for Mining Association Rules, In Proc. of ACM SIGMOD, pp. 175-186. ACM, May 1995.

4.        Brin, S. Motwani, R. Ullman, J. and Tsur, S. Dynamic itemset counting and implication rules for market basket data, In Proc. of  ACM SIGMO, pp.225-264, 1997.

5.        Han, J. Pei, J. and Yin, Y. Mining Frequent Patterns without Candidate Generation, Proc. of ACM SIGMOD Conf., Dallas, TX, 2000

6.        C.Borgelt; , “Efficient Implementations of Apriori  and Eclat,” In Proc. 1st IEEE ICDM Workshop on Frequent Item Set Mining Implementations, CEUR Workshop Proceedings 90, Aachen, Germany, 2003

7.        Kumar, A.V.S.; Wahidabanu, R.S.D.; , "A Frequent Item Graph Approach for Discovering Frequent Itemsets," Advanced Computer Theory and Engineering, 2008. ICACTE '08. International Conference on , vol., no., pp.952-956, 20-22 Dec. 2008

8.        Hai – Tao He; Hai - Yan Cao; Rui-Xia Yao; Jia-Dong Ren; Chang-Zhen   Hu; , "Mining frequent itemsets based on projection array," Machine  Learning and Cybernetics (ICMLC), 2010 International Conference on , vol.1, no., pp.454-459, 6-14 July 2010






P.Samundiswary, Ravi Ranjan Prasad

Paper Title:

Performance Analysis of MIMO-Mobile WiMAX System using Space Time Block Codes under Different Channels

Abstract:   The mobile Worldwide Interoperability for Microwave Access (WiMAX) is based on IEEE 802.16e standard used for wireless Metropolitan Area Network (MAN). The IEEE 802.16e standard supports high data rate and high capacity in mobile Broadband Wireless Access (BWA). The inclusion  of Multiple Input Multiple Output (MIMO) in mobile WiMAX system provides a robust platform for space, time and frequency selective fading conditions and increases both data rate and system performance. In this paper, the MIMO-mobile WiMAX using Space Time Block Codes (STBC) technique is developed for both adaptive modulation and constant modulation schemes (BPSK,QPSK,QAM) with the consideration of 1/2, 3/4 code rate to determine and analyse Bit Error Rate (BER) performance under  AWGN, Rayleigh and Rician channels. The simulation of MIMO-mobile WiMAX model is done by using MATLAB.

 BER, MIMO, STBC, WiMAX Systems.


1.        IEEE Std 802.16TM-2004, “Part 16: Air interface for fixed broadband wireless access systems”, October 2004
2.        J. El-Najjar, B. Jaumard, C. Assi, “Minimizing Interference in WiMax/802.16 based Mesh Networks with Centralized Scheduling,” Global Telecommunications Conference, NewOrleans, LA, USA,      pp.1-6,  30 Nov. – 4 Dec., 2008.

3.        Pravin Kumar Barmashe and Rof.Rajesh Nema, “Performance Evaluation of V-Blast MIMO System using BPSK”, International Journal of Computer Technology and Electronics Engineering, Vol. 1,No.3, pp.64-67, 2011. 

4.        D.W. Bliss, K.W. Forsythe and  A.M. Chan, “MIMO Wireless Communication,” Lincoln Laboratory Journal, Vol. 15, No. 1, pp. 97–126, 2005.

5.        Mai Tran, Dravid Halls, Andrew Nix, Angela Doufexi and Mark Beach, “Mobile WiMAX: Downlink Performance Analysis with Adaptive MIMO Switching”, Proceedings of IEEE Mobile WiMAX Symposium, California ,USA, pp. 147-151, 2009.

6.        G. J. Foschini and M. J. Gans, “On limits of wireless communications in a fading environment when using multiple antennas,” Wireless Personal Communications, vol. 6, no. 3, pp.311–335, 1998.

7.        K. Lee and D. Williams, “A space-time coded transmitter diversity technique for frequency selective fading channels,” Proceedings of IEEE Sensor Array and Multichannel Signal Processing Workshop, Cambridge, USA, pp.149–152, March 2000.

8.        S. Alamouti, “A Simple Transmit Diversity Technique for Wireless Communications,” IEEE Journal on Selected Areas in Communication, Vol. 16, pp. 1451–1458, Oct. 1998.

9.        Muhammad Sana Ullah, Mohammed Jashim Uddin, “ Performance Analysis of Wireless MIMO System by Using Alamouti’s Scheme and Maximum Ratio  Combining Technique” , International Journal of  Advanced Engineering Sciences and Technologies, Vol. 8,  No. 1,pp. 019 – 024, 2011.

10.     E. Biglieri, R. Calderbank, T. Constantinides, A. Goldsmith, A. Paulraj, and H. V. Poor, “MIMO Wireless Communications”, Cambridge University Press, 2006.

11.     E. Telatar, “Capacity of multi-antenna Gaussian channels”, European Transactions on Telecommunications, Vol. 10, No. 6, pp.585–595, 1999.   

12.     D. Shiu, G. Foschini, M. Gans, and J. Kahn, “Fading correlation and its effect on the capacity of multielement antenna systems,” IEEE Transactions on
Communications, volume 48, pp. 502–513, March. 2000.

13.     J. B. Andersen, “Array gain and capacity for known random channels with multiple element arrays at both ends”, IEEE Journal on Selected Areas in communications, Vol. 18, No. 11, pp. 2172-2178, Nov. 2000.






V. Padmavathi, M. Madhavi, N. Nagalakshmi

Paper Title:

An Approach to Secure Authentication Protocol with Group Signature based Quantum Cryptography

Abstract:   This paper proposes a secure authentication protocol in a new direction with group signature based Quantum cryptography for a networked organization. The group signature setting has a group with copious members and one manager. The proposed protocol uses a trusted centre TC generates a large heap of public/private key pairs. Every member of the group has a different list of unique private keys which is distributed by TC to sign a document. The keys are immunable using quantum key distribution protocol which acquires the properties of quantum mechanics.

 Group signature, public/private key, quantum cryptography, quantum key distribution protocol QKDP, Trusted Center TC.


1.        C.H. Bennett and G. Brassard, “Quantum Cryptography: Public Key Distribution and Coin Tossing,” Proc. IEEE Int’l Conf. Computers, Systems, and Signal Processing, pp. 175-179, 1984
2.        W.K. Wootters and W.H. Zurek, “A Single Quantum Cannot Be Cloned,” Nature, vol. 299, pp. 802-803, 1992.

3.        N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum Cryptography,” Rev. of Modern Physics, vol. 74, pp. 145-190, 2002.

4.        S. Imre, F. Balázs: Quantum Computing and Communications – An Engineering Approach, Published by John Wiley and Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex PO19 8SQ, England, 2005, ISBN 0-470-86902-X, 283 pages.

5.        C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, “Experimental quantum cryptography,” Journal of Cryptology, vol. 5, no.1, 3 - 28, 1992.

6.        M. Nielsen and I. Chuang, “Quantum computation and quantum information”, London Cambridge University Press, 2000.

7.        Jan Camenisch, Markus Michels. A group signature scheme with improved efficiency. In Proc. of ASIACRYPT ’98, Springer-Verlag, LNCS 1514, 1998.

8.        Shi Rong-Hua. An Efficient Secure Group Signature Scheme. Proceedhgs of /EEE TENCONOZ

9.        Jan Camenisch and Jens Groth, Group Signatures: Better Efficiency and New Theoretical Aspects. C. Blundo and S. Cimato (Eds.): SCN 2004, LNCS 3352, pp. 120
133, 2005. Springer-Verlag Berlin Heidelberg 2005

10.     J. Camenisch and M. Stadler. Efficient and generalized group signatures. In: Advances in Eurocrypt’97, LNCS 1233, pp. 465–479, Springer-Verlag, 1997.

11.     Bruce Schneier, Applied Cryptography: 2/e. John Wiley & Sons, Inc, 2002.

12.     G. Benenti, G. Casatti, and G. Strini, Principles of Quantum computation, vol. I: Basic Concepts, World Scientific Publishing, New Jersey, 2004.

13.     T. Hwang, K. C. Lee, and C. M. Li, “Provably Secure Three- Party Authenticated Quantum Key Distribution Protocols”, IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 1, pp. 71-80, 2007.






Utpal Bhattacharjeeand Pranab Das

Paper Title:

Performance Evaluation of Wiener Filter and Kalman Filter Combined with Spectral Subtraction in Speaker Verification System

Abstract:   This paper investigates the performance of speaker verification system in mobile environment and the techniques used to improve the robustness of the verification system. The paper demonstrates by corrupting the speech signal with additive white Gaussian noise in simulated environment. A comparative study of the three front-end noise reduction techniques namely spectral subtraction, Wiener filter and Kalman filter have been made  independently as well as combining spectral subtraction with other two methods alternatively and their performances have been evaluated for the clean speech as well as contaminated speech with different level of white Gaussian noise. It has been observed that spectral subtraction plays an important role in reduction low power Gaussian noise whereas Kalman filter is efficient in reduction noise when noise power is high. Wiener filter improves the performance at all level of noise. No considerable performance improvement has been observed when spectral subtraction is combined with other two methods.

 Wiener filter, Kalman filter, Spectral Subtraction, Speaker Verification.


1.        S. Boll, "Suppression of acoustic noise in speech using spectral subtraction," IEEE Transactions on Acoustics Speech and Signal Processing, ASSP-27(2) pp 113-120, 1979.
2.        B. Anderson and J. Moore, Optimal Filtering, Prentice Hall, 1979.

3.        J.S. Lim and A. V. Oppenheim, “Enhancement and band width compression of noisy speech”, Proc. of the IEEE, Vol. 67, No. 12, 1586–1604, Dec. 1979.

4.        H. Sorenson, Kalman Filtering: Theory and Application, IEEE Press, 1985.

5.        M. Fujimoto and Y. Ariki, “Noisy Speech Recognition using Noise Reduction Method based on Kalman filter”, Proc. ICASSP-2000, vol. 3, pp-1727-1730,2000.           

6.        Z. Xiaojia, S. Yang and W. DeLiang, “Robust speaker identification using a CASA front-end”, Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on, pp.5468-5471, 2011.

7.        N.T. Kleynhans and E. Barnard, “Language dependence in multilingual speaker verification”, in Proc. of the 16th Annual Symposium of the Pattern Recognition Association of South Africa, Langebaan, South Africa, pp. 117-122, 2005.

8.        A. Reynolds, "Robust text-independent speaker identification using Gaussian mixture speaker models," Speech Communications, vol. 17, pp. 91-108, 1995.

9.        NIST 2003 Evaluation plan, http://www.itl.nist.gov/iad/mig/tests/sre/2003/2003-spkrec-evalplan-v2.2.






Charulata Ingle

Paper Title:

Performance Analysis of Embedded Linux in Embedded System

Abstract:   Nowadays, embedded systems with Linux OS are commonly applied in automotive industry. This paper represents two features of embedded system namely multithreading and semaphore in embedded linux. The flow charts are used to represent the program written in ‘C’, run on linux operating system .In multithreading the same string is printed continuously till you print ‘stop’ while by using semaphore the string will print only once and asking for another one. By using this we can build our own embedded system using linux as the kernel and freely available open source.

The flow charts are used to represent the program written in ‘C’, run on linux operating system


1.        Tatsuo Nakajima, Masatoshi Iwasaki-IEEE Paper- Issues on linux making predictable Proceedings of the 2002 Symposium on Applications and the Internet (SAINT.02w) (0-7695-1450-2/  $17.00 © 2002 IEEE )
2.        Chun-yue Bi, Yun-peng LiuIEEE Paper-Research of Key Technologies for Embedded Linux Based on ARM -201O International Conference on Computer Application and System Modeling (ICCASM 2010) (978-1-4244-7237-6/10/$26.00 ©201O IEEE)

3.        Uday Shankar Macha- Embedded Linux Operating System

4.        Dr. K.V.K.Prasad-Embedded system/Real Time operating systems 

5.        Christopher Hallinan Embedded Linux Primer

6.        Karim Yaghour -Building Embedded Linux 

7.        http://www.embeddedtux.org/

8.        http://www.embedded-computing.com/ssi/print/print.php






Mayank Patel

Paper Title:

Online Java Compiler Using Cloud Computing

Abstract:   As it is a competitive world and very fast world, everything in the universes is to be internet. In this internet world all the things are on-line. So we created software called On-line java compiler. The main aim of this project we can easily to write a java program and compile it and debug in on-line. The client machine doesn’t having java development kit.The paper aims todescribe an online compiler which helps to reduce the problems of portability and storage space by making use of the concept of cloud computing. The ability to use different compilers allows a programmer to pick up the fastest or the most convenient tool to compile the code and remove the errors. Moreover, a web-based application can be used remotely throughout any network connection and it is platform independent. The errors/outputs of the code are stored in a more convenient way. Also, the trouble of installing the compiler on each computer is avoided.

 Cloud Computing, Compiler, Online Compiler.


1.        Aamir Nizam Ansari, Siddharth Patil, Arundhati Navada, Aditya Peshave, Venkatesh Borole , Online C/C++ Compiler using Cloud Computing, Multimedia Technology (ICMT), July 2011 International Conference, pp. 3591-3594.
2.        Shuai Zhang Shufen Zhang Xuebin Chen XiuzhenHuo, ―Cloud Computing Research and evelopment Trend, Future Networks, 2010.ICFN '10' Second International Conference.

3.        Shufen Zhang Shuai Zhang Xuebin Chen Shangzhuo , ―Analysis and Research of Cloud Computing System Instance, Future Networks, 2010.ICFN '10. Second Internation execute the program and its instructions.Fig 1 - Cloud Computing logical diagram al Conference.

4.        Grobauer, B. Walloschek, T. Stocker, E., “Understanding Cloud Computing Vulnerabilities”, Security & Privacy, IEEE March-April 2011

5.        Chunye Gong Jie Liu Qiang Zhang Haitao Chen Zhenghu Gong, “The Characteristics of Cloud Computing”, Parallel Processing Workshops (ICPPW), 2010 39th International Conference

6.        JunjiePengXuejun Zhang Zhou Lei Bofeng Zhang Wu Zhang Qing Li, “Comparison of Several Cloud Computing Platforms”, Information Science and Engineering (ISISE), 2009 Second International Symposium

7.        Shufen Zhang Shuai Zhang Xuebin Chen Shangzhuo , “Analysis and Research of Cloud Computing System Instance”, Future Networks, 2010. ICFN '10. Second International Conference





Pooja Dewangan,   S. D. Bharti

Paper Title:

Grid Connected Doubly Fed Induction Generator Wind Energy Conversion System Using Fuzzy Controller

Abstract:   This paper presents the simulation and control of a grid connected doubly-fed induction generator driven by a variable speed wind turbine. Fuzzy logic control strategy is applied to doubly fed induction generator (DFIG). The Matlab/Simulink/SimPowerSystems software is used to Simulate all the components of grid connected doubly fed induction generator (DFIG)-based wind power conversion system (WPCS). DFIG consists of a common wound rotor induction generator with slip ring and a back to back voltage source convertor. Fuzzy logic controller is applied to both grid side convertor (GSC) for dc link voltage control and rotor side convertor (RSC) for active and reactive power control. Coordinated control of the grid- and rotor side converters (GSC and RSC, respectively) is presented in the positive synchronous reference. Use of DFIG in wind turbine is widely spreading due to its control over DC voltage and active and reactive power. Conventional dq axis current control using voltage source converters for both the grid side and the rotor side of the DFIG are analyzed and simulated. Simulation results prove the excellent performance of fuzzy control unit as improving power quality and stability of wind turbine.

 Doubly Fed Induction Generator (DFIG), Fuzzy Logic Controller (FLC), Wind Energy Conversion System (WECS)


1.        J. Hu, Y. He, Lie Xu and B. W. Williams, “Improved Control of DFIG Systems    During Network Unbalance Using PI–R Current Regulators” IEEE Trans. Ind. Electron., vol. 56, no. 2, pp. 439-451, Feb. 2009.
2.        Dimitrios, G.Giaourakis, N.Safacas, and Savvas Tsotoulidis, “Dynamic Behaviour of 1.5 M Doubly-Fed Induction Generator based Wind Energy Conversion System”  International Symposium on Power Electronics, Electrical Drives, Automation and Motion, IEEE 2012.

3.        Yu Fang,Liu Qihui1,Hou Guixin Zhang Jianhua, “Study of The Reactive Power Characteristics in the Double Fed Variable Speed Constant Frequency Wind Turbine”  IEEE 2012.

4.        Chengyuan Yu, Dongdong Li , “Fuzzy-PI and Feedforward control strategy of DFIG wind turbine” IEEE PES ISGT ASIA 2012 1569537679.

5.        H. K.-Davijani, A. Sheikholeslami, H. Livani and M. K.-Davijani, “ Fuzzy Logic Control of Doubly Fed Induction Generator Wind Turbine,” World Applied Sciences Journal, vol.6, no. 4, pp.499-508, 2009.

6.        Mohamed Hilal, Youssef Errami, Mohamed Benchagra,Mohamed Maaroufi, “Fuzzy Power Control for Doubly Fed Induction Generator based Wind Farm” Journal of Theoretical and Applied Information Technology ,vol. 43 no.2, pp.321-330  September 2012.

7.        Christina N. Papadimitriou and Nicholas A. Vovos, “Fuzzy Control of WT with DFIG for Integration into Micro-grids” Fundamental and Advanced Topics in Wind Power, ISBN 978-953-307-508-2, June 2011.

8.        B. Babypriya, N. Devarajan, “Simulation and Analysis of a DFIG Wind Energy Conversion System with Genetic Fuzzy Controller” International Journal of Soft
Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-2, May 2012.

9.        Furat Abdal Rassul Abbas and Mohammed Abdulla Abdulsada, “Simulation of Wind-Turbine Speed Control by MATLAB” International Journal of Computer and Electrical Engineering, vol. 2, No. 5, October, 2010.

10.     Arash Abedi, Mojtaba Pishvaei, Ali Madadi and Homayoun Meshgin Kelk, “Analyzing Vector Control of a Grid-Connected DFIG under Simultaneous Changes of Two Inputs of Control System” European Journal of Scientific Research, ISSN 1450-216X ,vol.45 No.2, pp.221-231 (2010).






Dibin Chandran, M Lydia

Paper Title:

Vector Control of Wind Turbine Generating System Using PI and Model Predictive Controller

Abstract:   Doubly fed induction generators (DFIG) are widely used in wind turbine generating systems (WTGS). The control of the active and reactive power is done with a rotor current controller. The problem in using a PI controller is the tuning of gain and cross-coupling on DFIG parameters in the whole operating range. A model predictive controller (MPC) is used for power control of DFIG. By using MPC peak over shoot and settling time have been reduced when compared with PI controller. This paper includes simulation of WTGS vector control using PI and MBPC and the performance evaluation of these two systems. And a model of PI controller based WTGS vector control has also been simulated using MATLB Simulink. Simulation results are presented to validate the proposed controllers.

 WTGS, DFIG, Vector control, MPC.


1.        M. G. Simões and F. A. Farret, Renewable Energy Systems with Induction Generators. Boca Raton, FL: CRC Press, 2004.
2.        R. Datta and V. T. Rangathan, “Variable-speed wind power generation using doubly fed wound rotor induction machine—A comparison with alternative schemes,” IEEE Trans. Energy Convers., vol. 17, no. 3, pp. 414–421, Sep. 2002.

3.        B. H. Chowdhury and S. Chellapilla, “Double-fed induction generation control for variable speed wind power generation,” Electric Power Syst. Res., no. 76, pp. 786–800, 2006.

4.        B. Hopfensperger, D. J. Atkinson, and R. Lakin, “Stator-f lux-oriented control of a doubly-fed induction machine with and without position encoder,” Proc. Inst. Elect. Eng., Electr. Power Applications, vol. 147, no. 4, pp. 241–250, Apr. 2000.

5.        I. Takahashi and T. Noguchi, “A new quick-response and high-efficiency control strategy of an induction motor,” IEEE Trans. Ind. Appl., vol. IA-22, no. 5, pp. 820–827, Sep./Oct. 1986.

6.        H. Abu-Rub, J. Guzinski, Z. Krzeminski, and H. A. Toliyat, “Predictive current control of voltage-source inverters,” IEEE Trans. Ind. Electron., vol. 51, no. 3, pp. 585–593, Jun. 2004.

7.        E. S. de Santana, E. Bim, and W. C. do Amaral, “A predictive algorithm for controlling speed and rotor flux of induction motor,” IEEE Trans. Ind. Electron., vol. 55, no. 12, pp. 4398–4407, Dec. 2008.

8.        Srinath Vanukuru & Sateesh Sukhavasi “Active & Reactive Power Control Of A Doubly Fed Induction Generator Driven By A Wind Turbine” International Journal of Power System Operation and Energy Management, ISSN (PRINT): 2231–4407, Volume-1, Issue-2, 2011, pp. 83-90

9.        Andrew Kusiak, Wenyan Li, Zhe Song “Dynamic control of wind turbines” A. Kusiak et al. / Renewable Energy ,2009,Elsevier ,pp. 1-8

10.     M. G. Simões and F. A. Farret, Renewable Energy Systems with Induction Generators. Boca Raton, FL: CRC Press, 2004






Arun Varughese, Prawin Angel Michael

Paper Title:

Electrical Characteristics of Micro-Hydro Power Plant Proposed in Valara Waterfall

Abstract:   The most important problem faced by a country like India is that of rural electrification. This paper proposes a permanent magnet synchronous generator (PMSG) based micro power plant, which is used for a standalone micro hydro power generation. The prime mover of the system is the hydraulic turbine, essentially a pelton wheel turbine in this proposed scheme. The power produced can be directly given to the load Centre, which is within 200 m radius of the generation site.  In this paper we are considering a constant output power from the turbine system which drives the alternator. The detailed economic assessment of the power produced is also analyzed in this paper.

 Hydro power, Permanent magnet synchronous generator, standalone power generation, water turbine.


1.        Renata Archetti,”Micro hydroelectric power:feasibiity of a domestic plant”, Universityof Bologna, Italy, Procedia engineering 21 pp 8-15,Jan 2011 
2.        Okonkwo G.N and Ezeonu S.O,” Design and installation of a mini hydro eletric power plant”,  Federal polytechnic,Bida, Scholarly Journal Of Engineering Research vol.1(1),pp.19-24,April 2012.

3.        Oliver Paish,” Small hydro power: technology and current status”, IT power UK, Renewable and sustainable energy reviews 6, pp 537-556.feb. 2012

4.        T.Sakurai,H.Funato,S.Ogasawara,  “Fundamental characteristics of test facility for micro hydroelectric power generation system”, Utsunomiya University, Tochigi, Japan, IPEMC.Mar. 2009

5.        M.A.Wazed and Shansuddin Ahmed, “Micro hydro energy Resources in Bangladesh: a review”,University of Malaya,Kula Lumpur, Malaysia, Australian Journal of Basic and Applied Sciences 2(4),pp 1209-1222.Aug. 2008

6.        Centre for water resourcesdevelopment and management,” Micro hydel power scheme at Kakkadampoil” , study report.Apr.1992

7.        H.Weber and FF.Prillwitz,”Simulation mmodels of the hydro power plants in Macedoina and Yugoslavia”, Bologna, Italy, IEEE Bologa power tech conference.may.2003






Davison Zimwara, Lameck Mugwagwa, Daniel Maringa, Albert Mnkandla, Lindleen Mugwagwa, Tendai Talent Ngwarati

Paper Title:

Cost of Quality as a Driver for Continuous Improvement - Case Study – Company X

Abstract:   In the manufacturing, metal casting industry is one of the oldest basic principal and most important industries. The casting process is hindered by the occurrence of various defects. High casting reject levels and customer returns have a considerable adverse effect on productivity, delivery performance,  customer satisfaction and employee morale. In addition excessive rejection reduces yield, wastes valuable raw materials and involves management time in problem solving. All foundry processes generate a certain level of rejection that is closely related to the type of casting, the processes used and the equipment available. This paper seeks to establish the extent to which cost of quality can impact on continuous improvement of the products and the relationship with the customers of the organization. To determine the cost of quality (COQ) at casting company X, the researchers used existing company records, publications and historical evidence of the company. The researchers utilized techniques such as, bar charts and tables in presenting and interpreting data. The above techniques have the ability to provide methods for collecting, presenting, and analysis and meaningfully interpret data. The research findings estimated the COQ to be 6.6% of sales revenue.

 Cost of quality; casting; continuous improvement


1.        J. Juran, Quality Control Handbook, 1st ed., McGraw-Hill, New York, NY, 1951
2.        S. Rodchua,Factors, Measures, and Problem of Quality Costs Program Implementation in the Manufacturing Environment,  Journal of Industrial Technology, Volume 22, number 4, October 2006 through to December 2006.

3.        M. Rasamanie,and K. Kanapathy,The Implementation of Cost of Quality (COQ) Reporting System in Malaysian Manufacturing Companies. Difficulties Encountered and Benefits Acquired. International Journal of Business and Social Science Volume 2, Number 6, April 2011

4.        V. Sower, M. Savoie and S. Renick,An Introduction to Quality Management and Engineering, Prentice-Hall, Upper Saddle River, NJ.1999

5.        J. Campanellaand F. Corcon, Principles of Quality Costs, 2nd ed., ASQ Quality Press, Milwaukee,1990

6.        P. Crosby, Quality is Free, McGraw-Hill, New York, NY, 1983

7.        J.T.S San,Applying Cost of Quality to Total Quality Management, Pakistan Institute of Quality Control – ( ICQI'2000)
8.        D. Montgomery, Introduction to Statistical Quality Control, Wiley, New York, NY.(1996),
9.        N.M. Vaxevanidis andG. Petropoulos, A Literature Survey of Cost of Quality Models, Annals of the Faculty of Engineering Hunedoara – Journal of Engineering. Tome VI (year 2008). Fascicule 3 (ISSN 1584 – 2673), 2008, pp 274 – 283

10.     J. Plunkett and B. Dale, “Quality costing: First Edition, Chapman and Hall, New York, NY, 1991






Okezie C.C, Uzoh F.I, Onubogu J.O, Azubogu A.C.O

Paper Title:

Performance Evaluation of OSPF-Based Data Network

Abstract:   The implementation of the Open Shortest Path First (OSPF) Routing Protocol for data network has became imperative as the size of the internet growing at an alarming rate and data network needs to employ Routing Protocol to route data faster so as to prevent network congestion and high IP drop across a data network. The Open-Shortest Path First (OSPF) protocol, due to its use of route cost as its metric provides better scalability than rival protocols and a reasonable convergence time. We investigate the performance of OSPF routing protocol in a WLAN.  This is done with the help of OPNET IT GURU 9.1, in which six scenarios were simulated for the throughput, delay and IP Traffic dropped for both OSPF and RIP. The result showed that network performance was enhanced by a 50-150% range when the OSPF routing protocol was used instead of Routing Information Protocol (RIP).

 Wireless LAN, OSPF, Throughput, Delay, IP Traffic Dropped, RIP


1.        Todd Lammle, “Cisco Certified Network Associate Study Guide, Second Edition”,www.sybex.com, 2000.
2.        W. Ben-Ameur, N. Michel, E. Gourdin, and B. Liau. Routing strategies for IP networks. Telektronikk, 2/3:145–158, 2001.

3.        Cisco Networking Exploration, Cisco Inc. 2007.
4.        D. Awduche, A. Chiu, A. Elwalid, I. Widjaja, and X. Xiaro. A framework for internet traffic engineering. Network Working Group, Internet Draft (work in progress), http://search.ietf.org/internet-drafts/ draft-ietf-tewg-framework-02.txt, 2000.

5.        M. Pioro, A. Szentesi, J. Harmatos, A. Juttner, P. Gajowniczek, and S. Kozdrowski, .On OSPF related network optimisation problems,. in Proc. IFIP ATM IP, July 2000.

6.        R. Callon. Use of OSI IS-IS for routing in TCP/IP and dual environments. NetworkWorking Group, Request for Comments: 1195,
http://search.ietf.org/rfc/rfc1195.txt, December 1990.

7.        Cisco Networking Discovery, 2007