Post on 22-Aug-2021
International Journal of Engineering and Advanced Technology
International Journal of Engineering and Advanced Technology
International Journal of Engineering and Advanced Technology
International Journal of Engineering and Advanced Technology
ISSN : 2249 - 8958Website: www.ijeat.org
edc Ten ca hv nd oA l od gn ya g
nire
eni Ing tn eE r nf ao l tioan nr auoJ l
IJEatIJEat
Exploring Innovation
www.ijeat.org
Volume-8 Issue-2, DECEMBER 2018Volume-8 Issue-2, DECEMBER 2018
Published by: Blue Eyes Intelligence Engineering and Sciences Publication
Published by: Blue Eyes Intelligence Engineering and Sciences Publication
EXPLORING INNOVA
TION
Editor-In-Chief Chair Dr. Shiv Kumar
Ph.D. (CSE), M.Tech. (IT, Honors), B.Tech. (IT), Senior Member of IEEE
Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence (LNCTE), Bhopal
(M.P.), India
Associated Editor-In-Chief Chair Dr. Dinesh Varshney
Professor, School of Physics, Devi Ahilya University, Indore (M.P.), India
Associated Editor-In-Chief Members Dr. Hai Shanker Hota
Ph.D. (CSE), MCA, MSc (Mathematics)
Professor & Head, Department of CS, Bilaspur University, Bilaspur (C.G.), India
Dr. Gamal Abd El-Nasser Ahmed Mohamed Said
Ph.D(CSE), MS(CSE), BSc(EE)
Department of Computer and Information Technology , Port Training Institute, Arab Academy for Science ,Technology and Maritime
Transport, Egypt
Dr. Mayank Singh
PDF (Purs), Ph.D(CSE), ME(Software Engineering), BE(CSE), SMACM, MIEEE, LMCSI, SMIACSIT
Department of Electrical, Electronic and Computer Engineering, School of Engineering, Howard College, University of KwaZulu-
Natal, Durban, South Africa.
Scientific Editors Prof. (Dr.) Hamid Saremi
Vice Chancellor of Islamic Azad University of Iran, Quchan Branch, Quchan-Iran
Dr. Moinuddin Sarker
Vice President of Research & Development, Head of Science Team, Natural State Research, Inc., 37 Brown House Road (2nd Floor)
Stamford, USA.
Dr. Shanmugha Priya. Pon
Principal, Department of Commerce and Management, St. Joseph College of Management and Finance, Makambako, Tanzania, East
Africa, Tanzania
Dr. Veronica Mc Gowan
Associate Professor, Department of Computer and Business Information Systems,Delaware Valley College, Doylestown, PA, Allman,
China.
Dr. Fadiya Samson Oluwaseun
Assistant Professor, Girne American University, as a Lecturer & International Admission Officer (African Region) Girne, Northern
Cyprus, Turkey.
Dr. Robert Brian Smith
International Development Assistance Consultant, Department of AEC Consultants Pty Ltd, AEC Consultants Pty Ltd, Macquarie
Centre, North Ryde, New South Wales, Australia
Dr. Durgesh Mishra
Professor & Dean (R&D), Acropolis Institute of Technology, Indore (M.P.), India
Executive Editor Chair Dr. Deepak Garg
Professor & Head, Department Of Computer Science And Engineering, Bennett University, Times Group, Greater Noida (UP), India
Executive Editor Members Dr. Vahid Nourani
Professor, Faculty of Civil Engineering, University of Tabriz, Iran.
Dr. Saber Mohamed Abd-Allah
Associate Professor, Department of Biochemistry, Shanghai Institute of Biochemistry and Cell Biology, Shanghai, China.
Dr. Xiaoguang Yue
Associate Professor, Department of Computer and Information, Southwest Forestry University, Kunming (Yunnan), China.
Dr. Labib Francis Gergis Rofaiel
Associate Professor, Department of Digital Communications and Electronics, Misr Academy for Engineering and Technology,
Mansoura, Egypt.
Dr. Hugo A.F.A. Santos
ICES, Institute for Computational Engineering and Sciences, The University of Texas, Austin, USA.
Dr. Sunandan Bhunia
Associate Professor & Head, Department of Electronics & Communication Engineering, Haldia Institute of Technology, Haldia
(Bengal), India.
Dr. Awatif Mohammed Ali Elsiddieg
Assistant Professor, Department of Mathematics, Faculty of Science and Humatarian Studies, Elnielain University, Khartoum Sudan,
Saudi Arabia.
Technical Program Committee Chair Dr. Mohd. Nazri Ismail
Associate Professor, Department of System and Networking, University of Kuala (UniKL), Kuala Lumpur, Malaysia.
Technical Program Committee Members Dr. Haw Su Cheng
Faculty of Information Technology, Multimedia University (MMU), Jalan Multimedia (Cyberjaya), Malaysia.
Dr. Hasan. A. M Al Dabbas
Chairperson, Vice Dean Faculty of Engineering, Department of Mechanical Engineering, Philadelphia University, Amman, Jordan.
Dr. Gabil Adilov
Professor, Department of Mathematics, Akdeniz University, Konyaaltı/Antalya, Turkey.
Dr. Ch.V. Raghavendran
Professor, Department of Computer Science & Engineering, Ideal College of Arts and Sciences Kakinada (Andhra Pradesh), India.
Dr. Thanhtrung Dang
Associate Professor & Vice-Dean, Department of Vehicle and Energy Engineeering, HCMC University of Technology and Education,
Hochiminh, Vietnam.
Dr. Wilson Udo Udofia
Associate Professor, Department of Technical Education, State College of Education, Afaha Nsit, Akwa Ibom, Nigeria.
Convener Chair Mr. Jitendra Kumar Sen
Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd., Bhopal(M.P.), India
Editorial Chair Dr. Sameh Ghanem Salem Zaghloul
Department of Radar, Military Technical College, Cairo Governorate, Egypt.
Editorial Members Dr. J. Gladson Maria Britto
Professor, Department of Computer Science & Engineering, Malla Reddy College of Engineering, Secunderabad (Telangana), India.
Dr. Sunil Tekale
Professor, Dean Academics, Department of Computer Science & Engineering, Malla Reddy College of Engineering, Secunderabad
(Telangana), India.
Dr. K. Priya
Professor & Head, Department of Commerce, Vivekanandha College of Arts & Sciences for Women (Autonomous, Elayampalayam,
Namakkal (Tamil Nadu), India.
Dr. Pushpender Sarao
Professor, Department of Computer Science & Engineering, Hyderabad Institute of Technology and Management, Hyderabad
(Telangana), India.
Dr. Nitasha Soni
Assistant Professor, Department of Computer Science, Manav Rachna International Institute of Research and Studies, Faridabad
(Haryana), India.
S.
No
Volume-8 Issue-2, December 2018, ISSN: 2249-8958 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication
Page
No.
1.
Authors: Dina M. Ibrahim
Paper Title: Protocol Converter between Mobile IP and WATM Wireless Networks
Abstract: This paper is concerned with the problem of designing and verifying internetworking protocol converters on
the basis of timed Petri nets. The Petri net protocol conversion designated between the Mobile Internetworking Protocol
(Mobile IP) and the Wireless Asynchronous Transfer Mode (WATM) protocol is investigated. Due to protocol
complexity in this case, we propose a routing arrangement scheme for either protocol and for the intended protocol
converter, in order to facilitate the derivation of the various traces involved. Petri net-based converter between Mobile
IP and WATM protocols is constructed and verified. The converter is verified by simulation to guarantee liveness,
safety, and responsiveness.
Keywords: Mobile IP, Petri Nets, Protocol Converters, Wireless Network Protocols.
References: 1. Lee, Y. M., and Park, K, H., A Protocol Converter for Nonblocking Protocols, INTEGRATION, The VLSI Journal, vol.33, pp. 71-88,
2002…..27
2. Saleh, K., and Jaragh, M., Synthesis of Communications Protocol Converters Using The Timed Petri Net Model, The Journal of Systems and
Software, vol. 47, pp. 53-69, 1999. ….37
3. Green, P. E., Protocol Conversion, IEEE Trans. on Communications, vol. 34, pp. 257-268, 1986. …19 4. R. Sinha, "Conversing at Many Layers: Multi-layer System-on-Chip Protocol Conversion," 2015 20th International Conference on Engineering
of Complex Computer Systems (ICECCS), Gold Coast, QLD, , pp. 170-173, 2015. doi: 10.1109/ICECCS.2015.25
5. R. Narayanan and C. S. R. Murthy, "A Probabilistic Framework for Protocol Conversions in IIoT Networks With Heterogeneous Gateways," in IEEE Communications Letters, vol. 21, no. 11, pp. 2456-2459, Nov. 2017. doi: 10.1109/LCOMM.2017.2730859
6. Siddiqui, F., and Zeadally, S., Mobility Management Across Hybrid Wireless Networks: Trends and Challenges, Computer Communications
Journal, pp. 1-23, 2005…..39 7. Andrews, J. G., Ghosh, A., and Muhamed R., 'Fundamentals of WiMAX: Understanding Broadband Wireless Networking,' Prentice Hall, 2007.
8. Eom, D. S., Lee, H., Sugano, M., Murata, M., and Miyahara, H., Improving TCP Handoff Performance in Mobile IP Based Networks, Computer
Communications Journal, vol. 25, pp. 635-646, 2002. ….13 9. S. N. Mane, N. V. Mane and D. G. Khairnar, "Performance of mobile node between different MANET with Mobile IP," 2015 International
Conference on Industrial Instrumentation and Control (ICIC), Pune, pp. 1662-1664, 2015. doi: 10.1109/IIC.2015.7151017
10. O. Arafat, M. A. Gregory and M. M. A. Khan, "Interworking architecture between 3GPP IMS, Mobile IP and WiMAX in OPNET," 2014 2nd International Conference on Electrical, Electronics and System Engineering (ICEESE), Kuala Lumpur, pp. 48-53, 2014.
doi: 10.1109/ICEESE.2014.7154602
11. M. Alnas, I. Awan and D. R. Holton, "Handoff mechanism in Mobile IP," 2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, Zhangijajie, pp. 176-179, 2009.
doi: 10.1109/CYBERC.2009.5342167
12. Anschuetz, H., HPSim, Petri Net Simulator, Version 1.1, available on: http://www.winpesim.de/default.html, 2011. 13. S. V. Vambase and S. R. Mangalwede, "ATM based WMN architecture for Distributed Generation systems in electrical networks," 2015
International Conference on Green Computing and Internet of Things (ICGCIoT), Noida, pp. 119-123, 2015. doi:
10.1109/ICGCIoT.2015.7380441 14. Kim, D., and Cho, Y., A Lossy Handover Scheme in The Wireless ATM Networks, Proceedings of IEEE, pp. 52-57, 2000.
15. Crazzolara, F. and Winskel, G., Petri Nets with Persistence, Electronic Notes in Theoretical Computer Science (Journal), vol.121, pp. 143-155,
2005.
1-6
2.
Authors: Steven Valentino E. Arellano, Kierven R. de Mesa, Lawrence Alexis P. Desuasido
Paper Title: Child Detector Android Application using Bluetooth Low Energy (BLE) Beacon Technology
Abstract: The Child Detector Android Application through Smartphone Using Bluetooth Low Energy (BLE) Beacon
Technology was developed to prevent the child from getting lost. The researcher mainly utilized beacon and Android
application in developing the system. Smartphone with installed application will detect and display the distance of the
child, and it will also alert whether the child is going far from the user. The beacon is detected through smartphone’s
Bluetooth within 30-meter range proximity, while it is attached to the child. The objective of this study was to
determine the effectiveness of the system and satisfaction level of the users. This was tested to Grade One students of
one of the private schools in the Philippines were the parents, teachers, and school administrators served as respondents
to the conducted survey. Obtained results indicated that the Android application were effective for child detection.
Overall, this would be a new security Android application for children.
Keywords: Android Application, Bluetooth Low Energy, Beacon
References: 1. Bluetooth. (2016, August 21), Bluetooth Low Energy [Online]. Available: https://www.bluetooth.com/what-is-bluetooth-technology/
2. Bluetooth-technology-basics/low-energy. 3. F. Stroud. (2016, August 21), Beacon [Online]. Available: http://www.webopedia.com/TERM/B/beacon.html.
4. M. Scheuerman. (2016). “7 Reasons To Use Beacon Technology On Campuses” [Online]. Available: https://elearningindustry.com/beacon
5. -Technology-on-campuses-7-reasons-to-use. 6. C. L. G. Cabanban. (2013). “Development of Mobile Learning Using Android Platform” [Online]. Available:
http://ijitcs.com/volume%209_No_1/Sadaaki.pdf.
7. S. Aseniero, A. Buena, D. Carreon, J. De Luna, M. Simangan, and M. B. Apsay, “E-Learning for Programming Languages on Android Devices”, International Journal of Scientific & Technology Research, vol. 2 (9), 2013, pp. 253-255.
8. Kontakt. (2016). “Eddystone: 5 key facts about the new open beacon format from Google” [Online]. Available: https://kontakt.io/blog/what-is-
eddystone/. 9. Google. (2016). Eddystone Google Beacon [Online]. Available: https://developers.google.com/beacons/.
10. Google. (2016, August 24), Android Database SQLite [Online]. Available: https://developer.android/reference/android/database/sqlite
11. /package-summary.html.
7-12
3.
Authors: S. Gopinath, N. A. Natraj, N. Suresh Kumar
Paper Title: An Effective Reliable Secure Data Gathering and Intrusion Detection Scheme for WSN
Abstract: Wireless Sensor Network is a indivisible part of network where it has no infrastructure. In the past, Intrusion
detection systems were used to detect intrusions in network effectively. Most of the systems are able to detect intrusions
with high false alarm rate. In this paper, we propose a Effective Trust based Intrusion Detection System (ETIDS) for
detecting malicious activities and providing authentication as well as data integrity. To achieve this, Cluster based
routing is established based on trust vector of neighbor nodes in random topology. Trust based Recommendation and
key based authentication protocol is integrated with clock based verification method to identify malicious nodes.
Simulation results shows that the ETIDS provides better detection efficiency, packet delivery ratio, low end to end
delay, successful certification rate and low overhead than existing schemes.
Keywords: WSN, Intrusion Detection System, Data Gathering, Malicious, Mobility, packet delivery ratio, Detection
efficiency and delay.
References: 1. T G. Kannan and T. Sree Renga Raja, “Energy efficient distributed cluster head scheduling scheme for two tiered wireless sensor network”,
Egyptian Informatics Journal, Vol.16, 2015, pp.167–174.
2. Shivkumar S. Jawaligi, G. S. Biradar, “ Single Mobile Sink Based Energy Efficiency and Fast Data Gathering Protocol for Wireless Sensor
Networks”, Wireless Sensor Network, 2017, Vol.9, pp.117-144. 3. Sarmad Rashed and Mujdat Soyturk, “Analyzing the Effects of UAV Mobility Patterns on Data Collection in Wireless Sensor Networks”,
Sensors, Vol.413,2017, pp.1-21.
4. Wenjun Liu, Jianxi Fan, Shukui Zhang, Xi Wang, “Relay Hop Constrained Rendezvous Algorithm for Mobile Data Gathering in Wireless Sensor Networks”, Springer, Lecture Notes in Computer Science, LNCS-8147, pp.332-343, 2013,
5. Ching-Hsien Hsu; Xiaoming Li; Xuanhua Shi; Ran Zheng. 10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China.
6. Alhasanat, K. Alhasanat and M. Ahmed, “Range based data gathering algorithm with a mobile sink in Wireless Sensor Networks”, International
Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 6, December 2015, pp.1-13. 7. Shilpa Mahajan , Jyoteesh Malhotra , Sandeep Sharma, “An energy balanced QoS based cluster head selection strategy for WSN”, Egyptian
Informatics Journal, Vol.14, 2014, pp.189-199.
8. Mohamed Benaddy*, Brhim El Habil, Othmane El Meslouhi, Salah-ddine. Krit, “A Mutlipath Routing Algorithm for Wireless Sensor Networks Under Distance and Energy Consumption Constraints for Reliable Data Transmission”, International Journal of Sensors and Sensor Networks,
2017, Vol.5, No.5-1, pp.32-35.
9. Gopi Saminathan Arumugam and Thirumurugan Ponnuchamy, “EE-LEACH: development of energy-efficient LEACH Protocol for data gathering in WSN”, EURASIP Journal on Wireless Communications and Networking, 2015, Vol.76, pp.1-9.
10. Vinotha and Senthil Kumar, “ An Effectual Data Gathering Approach Using Sink Repositioning For WSN”, SSRG International Journal of
Electronics and Communication Engineering, 2017, pp.146-153. 11. Saliha Büyükçoraky, Günes Karabulut Kurt, Abbas Yongaçoglu, “An Empirical Study on Gamma Shadow Fading Based Localization”,
European Signal Processing Conference, 2017, pp.2778-2782.
12. C.Dhatchayani and S.Kannan, “Agent Based Efficient Data Gathering Scheme for Wireless Sensor Networks with a Mobile Sink”, International
Journal of Emerging Technology in Computer Science & Electronics, Vol.24, Issue 4, 2017, pp.10-15.
13. Ez-Zaidi Asmaa and RAKRAK Said, “Mobility for an Optimal Data Collection in Wireless Sensor Networks”, International Journal of
Advanced Computer Science and Applications, Vol. 8, No.7, 2017, pp.353-360. 14. Mariam Alnuaimi, Khaled Shuaib, Klaithem Alnuaimi and Mohammed Abdel-Hafez, “Ferry-Based Data Gathering in Wireless Sensor
Networks with Path Selection”, The 6th International Conference on Ambient Systems, Networks and Technologies, 2015, Vol.52, pp.286-293.
15. Rumpa Dasgupta and Seokhoon Yoon, “Energy-Efficient Deadline-Aware Data-Gathering Scheme Using Multiple Mobile Data Collectors”, Sensors, 2017, pp.1-23.
16. Chao Wu, Yuan'an Liu, Fan Wu, Wenhao Fan and Bihua Tang, “Graph-Based Data Gathering Scheme in WSNs With a Mobility-Constrained
Mobile Sink”, Special Section on Emerging Trends, Issues, and Challenges in Energy-Efficient Cloud Computing, IEEE Access, Vol.5, 2017, pp.19463-19477.
13-17
4.
Authors: M. Karthik, Nikhil Singh, Eshan Sinha, Bharani S. Anand, Gowreesh S. S.
Paper Title: Design and Development of Unmanned Chemical Spraying Rover for Agriculture Application
Abstract: There is an increase in usage of Unmanned Ground Vehicle (UGV) in the field of agriculture, specifically
for the purpose of spraying fertilizers and pesticides. However despite existing technologies, no such platform has been
created so far which aims to provide rover chemical spraying that can be used in a high risk areas at a low cost for
extended periods of time. The principal objective of the present work is to Design and Develop a Unmanned Chemical
Spraying Rover, to be able to overcome any kind of obstacle on the agricultural field, and a simple yet indigenous low
cost mechanism for precise spraying agricultural enhancers such as fertilizers, pesticides, and insecticides. These
primary objectives must be realized in a platform costing lower than similar alternatives in the market. The user can
achieve controllable motion and variable flow of the enhancer by a suitable tethered, ground based remote control
interface. Objective of the present work also aims to develop a multi-purpose rover machine, which can be used in
tortuous terrain, crops and plantations of diverged heights. The Rover is maneuvered with the help of six geared motors
each attached to one wheel. The rover’s movement will be controlled using Bluetooth remote control, where the
transmitter will be a smart phone.
Keywords: Bluetooth Controlled Rover, Fertilizer Spraying Rover, Geared and Servo Motor, Mini-Hydraulic Pump,
Rocker Bogie Mechanism, Solid works.
References: 1. Mifune, H., Saitoh, S., Kaneda, T., Tomokiyo, S., Adachi, T., Tanaka, T. and Furudate, T., Tomokiyo White Ant Co Ltd, 1995. Intellectual
working robot of self controlling and running. U.S. Patent 5,465,525.
2. Jindal, H., Stair Climbing Robot. coordinates, 1, p.2
3. Raval, M., Dhandhukia, A. and Mohile, S., Development and Automation of Robot with Spraying Mechanism for Agricultural Applications.
4. Siegwart, R., Lamon, P., Estier, T., Lauria, M. and Piguet, R., 2002. Innovative design for wheeled locomotion in rough terrain. Robotics and
Autonomous systems, 40(2-3), pp.151-162.
18-21
5. Falcone, E., Gockley, R., Porter, E. and Nourbakhsh, I., 2003. The Personal Rover Project: The comprehensive design of a domestic personal
robot. Robotics and Autonomous Systems, 42(3-4), pp.245-258
5.
Authors: Mohammed Nazeer, Garimella Rama Murthy
Paper Title: Cognitive Cross-Layer, Energy Efficient MAC Protocol in Mobile Wireless Sensor Networks
Abstract: In the region of mobile wireless sensor network, getting least energy consumption is a very important
research problem. A number of energy proficient protocols have been implemented for static wsn, generally built on a
layered design approach, i.e. they are motivated on designing ideal strategies for “single” layer by considering the
sensor nodes as static. In proposed paper, we consider a cross-layer design. A new MAC protocol termed MAC-
SWITCH is proposed. In this new approach, the communication between MAC and routing layers are fully exploited to
achieve energy efficiency for various paradigms of mobile wireless sensor networks. More surely, in the proposed
MAC-SWITCH algorithm, routing and data information at the network layer is used by the MAC layer such that it can
reduces number of contention for channel and perform protocol switching based upon type of data. The performance of
the proposed MAC-SWITCH is evaluated by quantification and simulation. The quantification is done by using gauss
lattice point theorem and simulation by using the NS-2 simulator. It has been evident that the proposed MAC-SWITCH
outperforms the existing aloha and SMAC protocols in terms of energy efficiency, number of contention, packet
transmission and network lifetime.
Keywords: MAC, Energy Efficiency, Routing, Wireless Sensor Networks.
References: 1. Changsu Suh, Young-BaeKo, and Dong-Min Son “An Energy Efficient Cross-Layer MAC Protocol for Wireless Sensor Networks”.
2. Mohammed Nazeer, G.Rama Murthy, RPratapsingh, Leveling and Sectoring Algorithm: Lattice Point Problem(Quantification of Energy
Savings).ACM IML conference, United Kingdom 2017, (2017) 3. George E Andrews. 1994. Number theory. Courier Corporation.
4. Mohammed Nazeer, Garimella Rama Murthy “Protocols in mobile cognitive wireless sensor networks” International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 12 (2018) pp. 10268-10275 © Research India Publications.
http://www.ripublication.com
5. Demirkol, C. Ersoy, and F. Alagoz, “MAC Protocols for Wireless Sensor Networks: a Survey,” in IEEE Communications Magazine, 2005. 6. Xin Yang, Ling Wang, and JianXie “Energy Efficient Cross-Layer Transmission Model for Mobile Wireless Sensor Networks” Mobile
Information Systems Volume 2017, Article ID 1346416, 8 pages Publication: Hindawihttps://doi.org/10.1155/2017/1346416
7. Sanjeev,C. Keshavamurthy “A Cross Layered Network Condition Aware Mobile WSN Routing Protocol for Vehicular Communication Systems” international Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 9, September 2016
8. Marwan Al-Jemeli; Fawnizu A. Hussin “An Energy Efficient Cross-Layer Network Operation Model for IEEE 802.15.4-Based Mobile Wireless
Sensor” IEEE Sensors Journal ( Volume: 15 , Issue: 2 , Feb. 2015 ) 9. Md. Imran HossainJony, Mohammad Rakibul Islam“Energy Efficient Cross-Layer Approach for Wireless Sensor Networks” International
Journal of Computer Applications Volume 127 - Number 10 Year of Publication: 2015 10.5120/ijca2015906519
10. Anurag Patro, Suchismita Chinara, Manu Elapila, ” A Dynamic Contention MAC Protocol for Wireless Sensor Networks” Proceedings of the International Conference on High Performance Compilation, Computing and Communications Pages 97-101Kuala Lumpur, Malaysia — March
22 - 24, 2017 ACM New York, NY, USA©2017 ISBN: 978-1-4503-4868-3 doi>10.1145/3069593.3069604.
11. Saptarshi Debroy,Swades De, Mainak Chatterjee “Contention based Multi-channel MAC Protocol for Distributed Cognitive Radio Networks” Published : 2013 IEEE Global Communications Conference (GLOBECOM)Date of Conference:9-13 Dec. 2013 Publisher: IEEE Conference
Location: Atlanta, GA, USA
12. Mohammed Nazeer, Garimella Rama Murthy” Energy Efficient, Data Centric Routing Algorithm in Mobile Wireless Sensor Nodes (Energy Savings Quantification)”International Journal of Computer Sciences and Engineering, page 127-135, Vol.-6, Issue-10, Oct. 2018.
22-28
6.
Authors: Mahmoud Maher El-Sayed Mohammed, M. Elgazzar
Paper Title: Hardware Threat Effect on Parallel CORDIC in IoT Devices
Abstract: Internet of Things (IoT) devices starts to spread all over the world. IoT revolution makes the devices smarter
and improves the performance of the devices. The devices can now exchange information between each other and
distribute data analysis effort between each other or send it to data analysis center. As a prediction from Cisco, the
number of IoT devices will be 50 billion IoT device connected together in 2020. This enormous number will make us
think about immunity of these IoT devices against the Hardware attacks. We propose in this paper the effect of inserting
Hardware Threat in Coordinate Rotation Digital Computer (CORDIC). Methods are presented in this paper to identify
Hardware Trojan and its effect on the CORDIC performance.
Keywords: Internet-of-Things (IoT), Denial of Service, Side-Channel Analysis,Hardware Attack, CORDIC.
References: 1. J. Dofe, J. Frey, and Q. Yu, “Hardware security assurance in emerging iot applications,” in Proc. IEEE Int. Symp. Circuits Syst. (ISCAS), May
2016, pp. 2050–2053.
2. P. Kocher, J. Jaffe, and B. Jun, “Differential Power Analysis,” in Proc. Crypto’99, pp.388-397, 1999. . 3. E. Brier, C. Clavier, and F. Olivier, “Correlation power analysis with a leakage model,” in Proc. Lecture Notes in Computer
Science, vol. 3156, pp. 16–29. Springer, Berlin, 2004.
4. G. T. Becker, F. Regazzoni, C. Paar, and W. P. Burleson, “Stealthy dopant-level hardware Trojans,” Proceedings of the 15th Internatinal Conference on Cryptographic Hardware and Embedded Systems (CHES) 2013, pp. 197-214.
5. Rajendran, J., Gavas, E., Jimenez, J., Padman, V. & Karri, R. (2010) Towards a comprehensive and systematic classification of
hardware Trojans, in Circuits and Systems (ISCAS), Proceedings of 2010 IEEE International Symposium on, pp. 1871 –1874. 6. Dave Evans, “The Internet of Things How the Next Evolution of the Internet Is Changing Everything,” Cisco White Paper, April
2011.
7. Soumya, V., et al. "Design and Implementation of a Generic CORDIC 8. Processor and its Application as a Waveform Generator." Indian Journal of Science and Technology 8.19 (2015).
9. Beaumont, Mark, Bradley Hopkins, and Tristan Newby. HardwareTrojans-prevention, detection, countermeasures (a literature review). No.
DSTO-TN-1012. Defence Science and Technology Organisation Edinburgh (Australia) Command Control Communications and Intelligence Div., 2011.
10. VOLDER, J. E. (2000). The Birth of CORDIC. Journal of VLSI Signal Processing , 101-105.
29-33
7.
Authors: Alaa M. Ali
Paper Title: Effect of Type and Percentage of Unconventional Mineral Fillers on the Performance of Hot Mixed
Asphalt
Abstract: There were several studies, analysis and research projects concerning the performance, practicability and
environmental suitableness of using recycled products in highway construction. There are plenty of local waste
materials that might be utilized effectively as mineral filler in hot mix asphalt concrete (HMA) rather than traditional
limestone dust. The main objective of this study is to explore through an experiment the effect of amount and quality
of appending three different unconventional types of mineral filler include waste glass beads (WGB), local loam
redbrick dust (LRD) and coal fly ash (CFA) as proposed alternative materials instead of the traditional limestone
powder (LSP). for this purpose, a comprehensive laboratory-testing program was performed to determine the effect of
different sorts and amounts of those fillers on the engineering and mechanical properties of HMA, and then verify the
consequents on design properties and performance of the surface layer of flexible pavement. Based on this
investigational program, it is verified that fillers comprise important influence on the properties of HMA mixtures. In
addition, inclusion of theses non-conventional fillers could be utilized efficiently in asphalt-concrete mixture as a
replacement in terms of stability, deformation and voids characteristics.
Keywords: Mineral Filler, Waste Materials, Hot Mixed Asphalt, Flexible Pavement.
References: 1. Puzinauskas VP (1999), Filler in asphalt mixtures.The Asphalt Institute Research Report 69-2, Lexington, Kentucky.
2. Tunniclif, D. G. (1992). “A Review of Mineral Filler” Proceedings of Asphalt Association of Paving Technologists. v. 31, pp. 118 – 150. 3. Kim, Little and Song, “Mechanistic evaluation of mineral fillers on fatigue resistance and fundamental material characteristics,” TRB
Annual Meeting, Paper no. 03-3454, 2003.
4. "Glasphalt utilization dependent upon availability" Roads & Bridges, February 1993. 5. D. Whiteoak, The Shell Bitumen Handbook, Thomas Telford, London, UK, 1991.
6. Moghadas F, Azarhoosh AR, Hamedi GH. Influence of using nonmaterial to reduce the moisture susceptibility of hot mix asphalt. Constr Build
Mater 2012;31:384–8. 7. Kok BV, Yilmaz M. The effects of using lime and styrene–butadiene–styrene on moisture sensitivity resistance of hot mix asphalt. Constr. Build
Mater 2009; 23:1999–2006.
34-38
8.
Authors: Ritu Maheshwari, Anil Rajput, Anil K. Gupta
Paper Title: “VCPHCF-RTT” Estimation in Private Virtual Cloud Infrastructure
Abstract: For the security of proposed model of Private Virtual Cloud Infrastructure model, Security Agent
technique has been designed to fight against IP-Spoofing based DDoS Attacks. Virtualization Enhancement has been
done in Cloud using proposed and designed Security Agent VCPHCF-RTT. Performance Parameters have been
analysed after introspection to existing cloud security mechanisms and tried to resolve focussed Research Problem,
Issues and Challenges. VCPHCF-RTT improves the efficiency of the probabilistic HCF technique using HCF for virtual
intermediate nodes between the Virtual Machines of Client VM and Server VM along with RTT. It helps in reducing
the probability of guessing the RTT and VCHCF parameter values at the intermediate virtual routers by the attackers.
VCPHCF-RTT technique has been examined to lessen down the probability of random IP spoofed packets correctly,
efficiently and effectively. Through this, detection rate of the malicious packets have been improved up to 99% which is
80-85% improved for probabilistic Hop Count Filtering approach and 90% improved for conventional i.e. CHCF
approach. It prevents the VM server from the IP spoofed DDoS attacks and it also eradicates the CPU cycles wastage.
VCPHCF-RTT focuses on lessening down IP spoofing based attacks. The computation time has been reduced
comparatively. Detection rate of malicious packets has been improved tremendously up to 99.7%.
Keywords: Distributed Denial of Service (DDoS), Clouds, Virtual Machines (VM), Filter, Hop Count Filtering (HCF),
Time-to-live (TTL), Virtual Cloud PHCF with RT Time (VCPHCF-RTT)
References: 1. L. Chi-Chun, H. Chun-Chieh, K. Joy, “A Cooperative Intrusion Detection System Framework for Cloud Computing Networks,” IEEE 39th
International Conference on Parallel Processing Workshops, pp. 280-284, 2010.
2. K. Kourai, T.Azumi, S. Chiba, “A Self-Protection mechanism against Stepping Stone Attacks for IaaS Clouds,” IEEE 9th International
Conference on Ubiquitous Intelligence and Computing, pp. 539-546, 2012. 3. R. Shrivastava, R. Sharma, A. Verma, “MAS based Framework to protect Cloud Computing against DDoS Attack,” International Journal of
Research in Engineering and Technology, IJRET, vol. 2(12), pp. 36-40, December, 2013.
4. L. Sheng-Wei, Y. Fang, “Securing KVM – based Cloud Systems via Virtualization Introspection,” IEEE 47th Hawaii International Conference on System Science, pp. 5028-5037, 2014.
5. A. Kumara M.A., C.D. Jaidhar, “Hypervisor and Virtual Machine Dependent Intrusion Detection and Prevention System for Virtualized Cloud
Environment,” 1st International Conference on Telematics and Future Generation Networks, pp. 1-6, 2015. 6. B.R. Swain, Bibhudatta Sahoo, “Mitigating DDoS attack and Saving Computational Time using a Probabilistic approach and HCF method,”
IEEE International Conference on Advance Computing, NIT, Rourkela, India, pp. 1170-1172, 6-7, March 2009
7. R. Maheshwari, C. Rama Krishna, M. Sridhar Brahma “Defending Network System against IP Spoofing based Distributed DoS attacks using DPHCF-RTT Packet Filtering Technique,” IEEE International Conference on Issues and Challenges in Intelligent Computing Techniques,
KIET, Ghaziabad, India, pp. 211-214, 8th February 2014.
8. P. Jayashree, K.S. Easwarakumar, V. Anandharaman, K. Aswin, S. Raja Vijay, “A Proactive Statistical Defense Solution for DDOS Attacks in Active Networks,” 1st IEEE International Conference on Emerging Trends in Engineering & Technology, Anna University, Chennai, India, pp.
878-881, 16-18, July, 2008.
9. J. Sen, “A Robust mechanism for defending distributed denial of service attacks on web servers,” International Journal of Network Security and its Applications, vol. 3 (2), pp. 162-179, March 2011.
10. Q. Wu, R. Zheng, J. Pu, Shibao Sun, “An Adaptive Control Mechanism for Mitigating DDoS Attacks,” IEEE International Conference on
Automation and Logistics, Henan University of Science and Technology, Luoyang, China, pp. 1760-1764, 5-7, August, 2009.
11. H. Wang, C.Jin and K. Shang, “Defense Against Spoofed IP Traffic Using Hop-Count Filtering,” IEEE Transaction on Networking, vol. 15 (1),
pp. 40-53, February, 2007.
39-45
12. F. Zhang, J. eng, Z. Qin, M. Zhou, “Detecting the DDoS Attacks Based on SYN proxy and Hop-Count Filter,” IEEE International Conference on Communications, Circuits and Systems, University of Electronic Science and Technology, China, pp. 457-461, 11-13, July, 2007.
13. I. B. Mopari, S.G. Pukale, M.L. Dhore, "Detection and defense against DDoS attack with IP spoofing," IEEE International Conference on
Computing, Communication and Networking, Vishwakarma Institute of Technology, Pune, India, pp. 1-5, 18-20, December, 2008. 14. C. Jin, H. Wang, K. G. Shin, “Hop-count filtering: an effective defense against spoofed traffic,” 2003, [Online]. Available:
http://www.citeseerx.ist.psu.edu
15. A. Mukaddam, I. H. Elhajj, “Hop count variability,” 6th IEEE International Conference on Internet Technology and Secured Transactions, American University of Beirut, Lebanon, pp. 240-244, 11-14, December , 2011.
16. B. Krishna Kumar, P.K. Kumar, R. Sukanesh, "Hop Count Based Packet Processing Approach to Counter DDoS Attacks," International
Conference on Recent Trends in Information, Telecommunication and Computing, PET Engineering College, Thirunelvelli, India, pp. 271-273, 12-13, March, 2010.
17. [17] A Wang, Xia, Li Ming, Li Muhai, "A scheme of distributed hop-count filtering of traffic," International Communication Conference on
Wireless Mobile and Computing, pp. 516-521, 7-9 Dec.2009. 18. [18] B. Krishna Kumar, P.K. Kumar, R. Sukanesh, "Hop Count Based Packet Processing Approach to Counter DDoS Attacks," International
Conference on Recent Trends in Information, Telecommunication and Computing, PET Engineering College, Thirunelvelli, India, pp. 271-273,
12-13, March, 2010.
9.
Authors: Khin Zezawar Aung, Nyein Nyein Myo
Paper Title: Lexicon Based Sentiment Analysis of Open-Ended Students’ Feedback
Abstract: Sentiment analysis is helpful in finding the opinion of writer’s feeling towards a specific topic. Teaching
evaluation is a useful tool of assessment for teaching and courses at many universities, colleges and schools. Mostly
close-ended questions and open- ended questions are used in teaching evaluation process. This paper used open-ended
questions to provide the opinion result for teachers’ effectiveness of teaching and over all course condition. In this
paper, teaching sentiment lexicon, Afinn lexicon and Opinion lexicon are used to get the scores of opinion words in
feedback comments. The students’ feedback comments are analyzed by using three methods and display the opinion
result as positive, negative and neutral class. According to the experimental results, the intensifier words are needed to
consider in some feedbacks to get the correct opinion result. The accuracy of Method 1 using teaching sentiment
lexicon is better than other two methods.
Keywords: Lexicon Based, Opinion Mining, Sentiment Analysis, Students’ Feedback.
References: 1. AFINN word database an affective lexicon by Finn Årup Nielsen,
http://www2.imm.dtu.dk/pubdb/views/edoc_download.php/6010/zip/imm6010.zip.
2. B. Liu “Sentiment analysis and opinion mining”. Synthesis Lectures on Human Language Technologies, May 2012, pp. 1–167. 3. C. Pong-inwong and W. Songpan (Rungworawut), “TeachingSenti- Lexicon for Automated Sentiment Polarity Definition in Teaching
Evaluation”. 10th International Conference on Semantics, Knowledge and Grids (SKG), Beijing: IEEE, 2014, pp. 84 – 91.
4. Finn Arup Nielsen, "A new ANEW: Evaluation of a word list for sentiment analysis in microblogs", ESWC2011 Workshop on Making Sense of Micro posts: March 2011, pp. 93-98.
5. G. G. Esparza, Alejandro de-Luna, Alberto Ochoa Zezzatti, Alberto Hernandez, Julio Ponce, Marco Alvarez, Edgar Cossio and Jose de Jesus
Nava, “A Sentiment Analysis Model to Analyze Students Reviews of Teacher Performance Using Support Vector Machines”, 14th International Conference on Distributed Computing and Artificial Intelligence (DCAI 2017, June, 2017, ), pp. 157-164.
6. http://www.cs.uic.edu/~liub/FBS/opinion-lexicon-English.rar
7. K. Z. Aung and N. N. Myo, “Sentiment Analysis of Students’ Comment Using Lexicon Based Approach”, 16th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2017), May, 2017, pp. 149-154.
8. L. V. Avanco, M.G.V.Nunes, “Lexicon-based Sentiment Analysis for Reviews of Products in Brazillian Portugues”, 2014 IEEE Brazillian
Conference on Intelligent Systems, pp. 277-281, 2014. 9. M. El-Masri, N. Altrabsheh, H. Mansour, A. Ramsay, “A web-based tool for Arabic sentiment analysis”, 3rd International Conference on Arabic
Computational Linguistics, ACLing 2017, November, 2017.
10. M. Hu and B. Liu, “Mining and summarizing customer reviews,” ACM SIGKDD international conference on Knowledge discovery and data mining, ACM, 2004, pp. 168-177.
11. M. Taboada, J. Brooke, M. Tofiloski, K. Voll and M. Stede, “Lexicon-based methods for sentiment analysis”, Association for Computational Linguistics, 37(2), 2011, pp. 267-307.
12. M. Wen, D. Yan and C. P. Rose, “Sentiment Analysis in MOOC Discussion Forums: What does it tell us?”, Proceedings of Educational Data
Mining, 2014, pp. 1-8. 13. N. Altrabsheh, M. Cocea and S. Fallahkhair, “Sentiment analysis: towards a tool for analyzing real-time students feedback”, 2014 IEEE 26th
Internationaal Conference on Tools with Artificial Intelligence, 2014, pp.419-423.
14. P. Kaewyong, A. Sukprasert, N. Salim and F.A. Phang, “The possibility of students’ comments automatic interpret using Lexicon based sentiment analysis to teacher evaluation”, 3rd International Conference on Artificial Intelligence and Computer Science (AICS2015), 2015, pp.
179-189.
15. Q. Rajput, S. Haider and S. Ghani, “Lexicon-Based Sentiment Analysis of Teacher’s Evaluation”, Applied Computational Intelligence and Soft Computing, Hindawi Publishing Corporation, vol. 2016, September 2016.
19. Z. Nasim, Q. Rajput and S. Haider , “Sentiment analysis of student feedback using machine learning and lexicon based approaches”,
International Conference on Research and Innovation in Information Systems (ICRIIS), Langkawi, Malaysia, July, 2017.
46-51
10.
Authors: Tushar Kaushik, Sarthak Singhal, Jayant Mandan, Kamlesh Sharma
Paper Title: Social Networking Analysis: A case study in Tools
Abstract: Social network sites like Twitter, fb, and Google Hangouts appear like the highest visited sites at the net.
They contain a large volume of dependent, semi-dependent and unstructured information about the users and
additionally the relationships amongst them. The analysis of such great amount of knowledge could be a difficult issue.
huge information forms an easy/straightforward means through that it becomes easy to scale, diversify, and
interactively analyze this vast quantity of knowledge that has many billions of rows and columns among the tables. To
perform cost-efficient method of such sizable quantity of information, special graph based tools for mining are required
so one can definitely shape the social web. A lot of such tools for analysisare accessible with their own alternatives and
advantages. Selecting associate degree applicable tool for a selected task is tough to make your mind up. This paper
focuses on numerous graphics tools which could be used to extract/analyze a great amount of knowledge.
46-51
Keywords: Component; Formatting; Style; Styling; Insert (Key Words)
References: 1. Mislove Alan, MarconMassimiliano,P.GummadiKrishna,”Measurement and Analysis of Online Social Networks“, Max Planck Institute for
Software Systems
2. For a historical overview of the development of social network analysis, see: Carrington, Peter J. & Scott, John "Introduction". The Sage Handbook of Social Network Analysis. SAGE.p. 1. ISBN 978-1-84787-395-8.(2011)
3. CombeDavid, LargeronChristine, Egyed-ZsigmondEl˝od and GeryMathias, “A comparative study of social network analysis tools”,
International Workshop on Web Intelligence and Virtual Enterprises 2 (2010). 4. Huisman, Mark; van Duijn, M.A.J. / Software for social network analysis. Models and methods in social network analysis. ed. / P J Carrington;
J Scott; S Wasserman. New York : Cambridge University Press, pg. 270 – 316,2005.
5. Graph and Network Analysis Dr. Derek Greene Clique Research Cluster, University College Dublin, Web Science Doctoral Summer School 2011.
6. Monclar, Rafael Studart, et al. "Using social networks analysis for collaboration and team formation identification." Computer Supported Cooperative Work in Design (CSCWD), 2011 15th International Conference on. IEEE, 2011.
7. AkhtarNadeem, JavedHira, SengarGitanjali, "Analysis of Facebook Social Network", IEEE International Conference on Computational
Intelligence and Computer Networks (CICN), Mathura, India, 27-29 September, 2013. 8. Zelenkauskaite, Asta, et al. "Interconnectedness of complex systems of internet of things through social network analysis for disaster
management." Intelligent Networking and Collaborative Systems (INCoS), 2012 4th International Conference on. IEEE, 2012.
9. Social Networks Overview: Current Trends and Research Challenges “November 2010 Coordinated by the ―NextMEDIA CSA. 10. Li, Jianfeng, Chen Yan, and Lin Yan. "Research on traffic layout based on social network analysis." Education Technology and Computer
(ICETC), 2010 2nd International Conference on.Vol.1, IEEE, 2010.
11.
Authors: Rakshita R, Daniel C*, Vincent Sam Jebadurai S, Sarala L, Arun Raj E, Hemalatha G
Paper Title: Influence of Stiffness and Mass Parameters on Seismic Damping of Structures
Abstract: The fundamental objective of this paper is to determine the dynamic response of the structure by the
influence of stiffness and mass parameters. In this paper, we are presenting time stepping methods to obtain solutions
for nonlinear dynamic problems in structural engineering using numerical evaluation. A benchmark structure having
three degrees of freedom is considered and analyzed using Newmark’s method for nonlinear system by implementing
the El Centro Ground acceleration and time values. The results of the study detail the reduction in displacement of the
structure for the arbitrary increase in percentage of the mass and stiffness of the system to obtain the optimum mass and
stiffness that can be additional to the damping devices.
Keywords: Damper, Displacement, Earthquake, Newmark’s.
References: 1. Fajfar, P. (2000). A nonlinear analysis method for performance-based seismic design. Earthquake spectra, 16(3), 573-592. 2. Deierlein, G. G., Reinhorn, A. M., & Willford, M. R. (2010). Nonlinear structural analysis for seismic design. NEHRP seismic design technical
brief, 4, 1-36.
3. Vamvatsikos, D., & Cornell, C. A. (2002). Incremental dynamic analysis. Earthquake Engineering & Structural Dynamics, 31(3), 491-514. 4. Neuenhofer, A., & Filippou, F. C. (1997). Evaluation of nonlinear frame finite-element models. Journal of structural engineering, 123(7), 958-
966.
5. Ramlan, R., Brennan, M. J., Mace, B. R., & Kovacic, I. (2010). Potential benefits of a non-linear stiffness in an energy harvesting device. Nonlinear dynamics, 59(4), 545-558.
6. Zhang, N. (1995). Dynamic condensation of mass and stiffness matrices. Journal of Sound and Vibration, 188(4), 601-615.
7. Vamvatsikos, D., & Fragiadakis, M. (2010). Incremental dynamic analysis for estimating seismic performance sensitivity and uncertainty. Earthquake engineering & structural dynamics, 39(2), 141-163.
8. Richardson, M. H. (1977). Derivation of mass, stiffness and damping parameters from experimental modal data. Hewlett Packard Company,
Santa Clara Division, 1, 1-6. 9. Flanigan, C. C. (1998, February). Model reduction using Guyan, IRS, and dynamic methods. In proceedings-spie the international society for
optical engineering (Vol. 1, pp. 172-176).
10. Bao, Y., & Kunnath, S. K. (2010). Simplified progressive collapse simulation of RC frame–wall structures. Engineering Structures, 32(10), 3153-3162.
11. Kidder, R. L. (1973). Reduction of structural frequency equations. AIAA journal, 11(6), 892-892.
12. Aschheim, M. (2002). Seismic design based on the yield displacement. Earthquake spectra, 18(4), 581-600. 13. Ramsey, K. A. (1975). Effective measurements for structural dynamics testing. Sound and Vibration, 9(11), 24-34.
14. Aschheim, M., Tjhin, T., Comartin, C., Hamburger, R., & Inel, M. (2004). The scaled nonlinear dynamic procedure. In Structures 2004:
Building on the Past, Securing the Future (pp. 1-8).
15. Kalkan, E., & Kunnath, S. K. (2007). Assessment of current nonlinear static procedures for seismic evaluation of buildings. Engineering
Structures, 29(3), 305-316.
16. Yoshida, O., & Dyke, S. J. (2004). Seismic control of a nonlinear benchmark building using smart dampers. Journal of engineering mechanics, 130(4), 386-392.
52-62
12.
Authors: Metaga Jeremi SOGOBA, Badié DIOURTÉ, Lamissa DIABATÉ
Paper Title: Vibration Analysis-Based Diagnosis of High-Power Diesel Generator Turbocharger
Abstract: The diesel engine of a high-power generator is equipped with two turbochargers. These are mounted on the
gas exhaust above the diesel engine. Most investigative studies on vibration analysis of diesel power generators
typically focused on the main bearing line in the diesel engine, on alternator rotor [1]. Turbochargers, however, play a
very important role in the working of diesel engine. This article reports a study on the turbochargers of high-power
diesel generator. A diesel engine and its turbochargers do not bear the same mechanic loads. While the diesel engine is
the seat of violent shocks brought about by explosions in cylinders, the turbochargers are driven by the action of
exhaust gas from explosions, without being affected by explosion shocks. Despite its limitations in diesel engine
diagnosis, FFT method is adequate for a correct diagnosis of turbochargers. As a result, following several campaigns of
measurements we experimentally defined minimal admissible vibration values for turbochargers, and we detected a
defect in bearing among the turbochargers tested.
63-66
Keywords: Diesel generator, FFT method, high-power, turbocharger, vibration.
References: 1. Williams, J. (1996). An overview of misfiring cylinder engine diagnostic techniques based on crankshaft angular velocity measurements. SAE
paper n°960039.
2. D. CARREAU. « Surveillance des roulements par l’analyse des vibrations » - CETIM Information N° 115 3. Cours CETIM « Vibrations »
4. S.BRAUN, “Mechanical Signature Analysis” – Academic Press
5. M.SIDAHMED, Y.GRENIER, « Le traitement du signal en mécanique » - Recueil de conférences, CETIM 6. JC. LECOUFLE, « Objectif Zéro panne » - CETIM Informations N° 109
7. A. BOULENGER, « Vers le Zéro panne avec la maintenance conditionnelle » - Ed. AFNOR
8. norme ISO 95 9. BELLANGER M. (1987) : Traitement numérique du signal, Masson Paris, 643
10. CASTANIE F. (1997) : Traitement Numérique du Signal. 2. Méthodes Avancées, Édition ENSEEIHT, 546 11. Metaga Jeremi S. (2016) : Diagnostic de groupes électrogènes diesels de forte puissance par analyse des vibrations, thèse de doctorat, 161
13.
Authors: Anurag Tamrakar, V. B. Reddy
Paper Title: An Associative Binary Particle Swarm Optimization for the Diagnosis of Transformer Failure
Abstract: In this paper an associative binary particle swarms optimization (BPSO) for the diagnosis of transformer
failure. In this approach transformer oil gas have been considered for the fault diagnosis so that proper functionality of
transformer can be enhanced and the efficiency of transformer can be improved. For this dissolve gas analysis (DGA)
and IEC standards have been used for weight assignment of different gas ratios. Rule mining have been applied where
these standards fails in the weight assignments. Finally based on the rules associates with different gas ratios have been
analyzed separately for each clusters. Finally based on BPSO faults have been diagnosed in several iterations. The
results clearly indicate that our approach has better fault diagnosis and individual gas associations.
Keywords: BPSO, Associations Rules, DGA and IEC Standards.
References: 1. DiGiorgio JB. Dissolved gas analysis of mineral oil insulating fluids. DGA Expert System: A Leader in Quality, Value and Experience. 2005;
1:1-7. 2. Netam G, Yadav A. Fault detection, classification and section identification on distribution network with D-STATCOM using ANN.
International Journal of Advanced Technology and Engineering Exploration. 2016 Oct 1; 3(23):150.
3. Sarma DS, Kalyani GN. ANN approach for condition monitoring of power transformers using DGA. In TENCON 2004. 2004 IEEE Region 10 Conference 2004 Nov 21 (Vol. 100, pp. 444-447). IEEE.
4. Mansour AM. Decision tree-based expert system for adverse drug reaction detection using fuzzy logic and genetic algorithm. International
Journal of Advanced Computer Research. 2018 May 1; 8(36):110-28. 5. Mohamed MH, Waguih HM. A proposed academic advisor model based on data mining classification techniques. International Journal of
Advanced Computer Research. 2018 May 1; 8(36):129-36.
6. Khinchi A, Prasad MP. Control of electronic throttle valve using model predictive control. International Journal of Advanced Technology and Engineering Exploration. 2016 Sep 1; 3(22):118.
7. Quach XH, Hoang TL. Dealing with fuzzy ontology integration problem by using constraint satisfaction problem. International Journal of
Advanced Computer Research. 2017 May 1; 7(30):81. 8. Wu S. A PID controller parameter tuning method based on improved PSO. International Journal of Advanced Computer Research.
2018;8(34):41-6.
9. Bhaskar SV. A study on exhaust gas temperature and emission characteristics of a compression ignition engine fueled with transesterified rice bran oil. International Journal of Advanced Technology and Engineering Exploration. 2018; 5(44): 195-200.
10. Elkader SA, Elmogy M, El-Sappagh S, Zaied AN. A framework for chronic kidney disease diagnosis based on case based reasoning.
International Journal of Advanced Computer Research. 2018 Mar 1; 8(35):59-71. 11. Lin CH, Wu CH, Huang PZ. Grey clustering analysis for incipient fault diagnosis in oil-immersed transformers. Expert Systems with
Applications. 2009 Mar 1; 36(2):1371-9.
12. Da Silva AC, Castro AR, Miranda V. Transformer failure diagnosis by means of fuzzy rules extracted from Kohonen Self-Organizing Map. International Journal of Electrical Power & Energy Systems. 2012 Dec 1; 43(1):1034-42.
13. Sun HC, Huang YC, Huang CM. Fault diagnosis of power transformers using computational intelligence: A review. Energy Procedia. 2012 Jan
1; 14:1226-31. 14. Yu S, Zhao D, Chen W, Hou H. Oil-immersed power transformer internal fault diagnosis research based on probabilistic neural network.
Procedia Computer Science. 2016; 83:1327-31.
15. Doostan M, Chowdhury BH. Power distribution system fault cause analysis by using association rule mining. Electric Power Systems Research.
2017; 152:140-7.
16. Bandara DU, Kumara JR, Fernando MA, Kalpage CS. Possibility of blending sesame oil with field aged mineral oil for transformer
applications. InIndustrial and Information Systems (ICIIS), 2017 IEEE International Conference on 2017 (pp. 1-4). IEEE. 17. Kalathiripi H, Karmakar S. Fault analysis of oil-filled power transformers using spectroscopy techniques. InDielectric Liquids (ICDL), 2017
IEEE 19th International Conference on 2017 Jun 25 (pp. 1-5). IEEE.
18. Sekar K, Mohanty NK. Data mining-based high impedance fault detection using mathematical morphology. Computers & Electrical Engineering. 2018 Jul 31; 69:129-41.
19. Ayalew Z, Kobayashi K, Matsumoto S, Kato M. Dissolved Gas Analysis (DGA) of Arc Discharge Fault in Transformer Insulation Oils (Ester
and Mineral Oils). In 2018 IEEE Electrical Insulation Conference (EIC) 2018 Jun 17 (pp. 150-153). IEEE.
67-71
14.
Authors: V. Kakulapati
Paper Title: Prioritization of Key Objectives During Floods
Abstract: Now a day social networks generates large volume of data per sec and one of such network is Twitter.
Twitter is one of the popular public platforms with an extract of openly express user’s opinion. Our work aims focus on
tweets generated in regard to floods and especially the tweets posed by those affected by floods so that we may
prioritize objectives in order to facilitate aid and relief to those affected people. This task is accomplish by identifying
the needs and requirements of the survivors of these calamities using responses via twitter analysis, these needs and
requirements are certain objectives such as provisioning of food, tents for people, etc., all of these objectives can be
prioritize based on certain words used by the survivors and transforming into tokens. These token are called as lexical
72-75
normalization. In this work we analyze the lexical normalization of data generated by twitter by applying various
techniques and visualize the investigations as the techniques are applied to process raw data from Twitter.
Keywords: Priority, Lexical, Tweets, Floods, Token, Opinion.
References: 1. Brooks, Nick, and W. Neil Adger. "Country level risk measures of climate-related natural disasters and implications for adaptation to climate
change Nick Brooks and W. Neil Adger Tyndall Centre for Climate Change." (2013).
2. Datar, Ashlesha, Jenny Liu, Sebastian Linnemayr, and Chad Stecher. "The impact of natural disasters on child health and investments in rural
India." Social Science & Medicine 76 (2013): 83-91. 3. Chung, D.S., Nah, S.: Media credibility and journalistic role conceptions: views on citizen and professional journalists among citizen
contributors. J. Mass Media Ethics 28(4), 271–288 (2013)
4. Li, R., Lei, K.H., Khadiwala, R., Chang, K.-C.: TEDAS: a Twitter-based event detection and analysis system. In: Proceedings of 28th International Conference on Data Engineering, pp. 1273–1276 (2012)
5. Lingad, J., Karimi, S., Yin, J.: Location extraction from disaster-related microblogs. In: Proceedings of the 22nd International World Wide Web
Conference Companion, pp. 1017–1020 (2013). 6. Unankard, S., Li, X., Sharaf, M., Zhong, J., Li, X.: Predicting elections from social networks based on sub-event detection and sentiment
analysis. In: Benatallah, B., Bestavros, A., Manolopoulos, Y., Vakali, A., Zhang, Y. (eds.) WISE 2014. LNCS, vol. 8787, pp. 1–16. Springer,
Heidelberg (2014). doi:10.1007/978-3-319-11746-1 1. 7. M. Hu and B. Liu, “Mining and Summarizing Customer Reviews,” in Proceedings of the Tenth ACM SIGKDD International Conference on
Knowledge Discovery and Data Mining, 2004, pp. 168–177.
8. Sakaki, T., Okazaki, M., Matsuo, Y.: Tweet analysis for real-time event detection and earthquake reporting system development. IEEE Trans. Knowl. Data Eng. 25(4), 919–931 (2013).
9. X. Ding, B. Liu, and P. S. Yu, “A Holistic Lexicon-based Approach to Opinion Mining,” in Proceedings of the 2008 International Conference on
Web Search and Data Mining, 2008, pp. 231–240. 10. M. Taboada, J. Brooke, M. Tofiloski, K. Voll, and M. Stede, “Lexicon-Based Methods for Sentiment Analysis,” Computational Linguistics, vol.
37, no. 2, pp. 267–307, 2011.
11. M. Z. Asghar, A. Khan, S. Ahmad, M. Qasim, and I. A. Khan, “Lexicon-enhanced sentiment analysis framework using rule-based classification scheme,” PLOS ONE, vol. 12, no. 2, pp. 1–22, 2017.
12. Z. Jin, Y. Yang, X. Bao and B. Huang, "Combining user-based and global lexicon features for sentiment analysis in twitter," 2016 International
Joint Conference on Neural Networks (IJCNN), Vancouver, BC, 2016, pp. 4525-4532. 13. Turney, P.D., Littman, and M.L.: Measuring Praise and Criticism: Inference of Se-mantic Orientation from Association. ACM Transactions on
Information Systems (2003) 315–346
14. Kamps J., Marx, M., Mokken, R.J.,: Using WordNet to Measure Semantic Orientation of Adjectives. LREC vol. IV (2004) 1115–1118. 15. https://x.company/loon/
16. http://www.southoxon.gov.uk/services-and-advice/environment/ severe-weather/flooding/flood-plans-0”
15.
Authors: K. Lakshmi Prasanna, Jangala. Sasi Kiran, K Sreerama Murthy
Paper Title: Significance of Metadata and Data Modeling of Metadata by using Mark Logic
Abstract: Metadata means data about data which illustrates, traces, and is simple to locate a resource. Metadata has
been impacting almost every firm. It has become mandatory for organizations to know the data flow across business
processes to take strategic decisions. But, collecting metadata across departments/business processes and putting into a
commonality is very difficult by using conventional databases. We need to concentrate on the metadata managing
technologies. There are data models that are designed which work on NOSQL database. Envelope pattern in Marklogic
provide commonality for the metadata across processes. The data that is gathered across different processes need to be
managed in a consistent way. We want to verify metadata management in banking domain. In this paper, we have
ingested metadata across multiple departments in banking domain and verified the performance of search results.
Keywords: Metadata; Data modeling; Mark logic; envelope pattern.
References: 1. Alink, W. "XIRAF: An XML-IR Approach to Digital Forensics." Master's Thesis,UOT, 2005.
2. Alink, W., et.al. "XIRAF – XML-Based Indexing and Querying for Digital Forensics." Digital Investigation (2006): S50-S58. 3. Pete et.al. “A Final ‘Word’: Part 6 in a series on MarkLogic Server and Office 2007.” Mark Logic TechBlog. January 22, 2008.
http://xqzone.marklogic.com/columns/smallchanges/”
4. Pete. et.al. “Running (a.k.a. -ing) with Word: Part 4 in a series on MarkLogic Server and Office 2007.” Mark Logic TechBlog. December 18, 2007. http://developer.marklogic.com/smallchanges/2007-12-18.xqy.
5. Simon et.al. "Information Leakage Caused by Hidden Data in Published Documents." IEEE Security and Privacy 2, no. 2 (2004): 23-27.
6. Menoti, David. “Segmentation of Postal Envelopes for Address Block Location: an approach based on feature selection in wavelet space”. January 10, 2003. IEEE 10.1109/ICDAR.
7. S, Decker.”The Semantic Web: the roles of XML and RDF”, IEEE Internet Computing Volume: 4, Issue: 5, Sep/Oct 2000.
8. Aven, Pete. “Excel-ing with XQuery: Part 2 in a series on MarkLogic Server and Office 2007.” Mark Logic TechBlog. December 4, 2007. http://xqzone.marklogic.com/columns/smallchanges/2007-12-04.xqy.
9. Ding, Ying. “The Research on data semantic description framework using RDF/XML”. 2005 First International Conference on Seman tics,
Knowledge and Grid, 10.1109/SKG.2005.127. 10. Aven, Pete. “A Final ‘Word’: Part 6 in a series on MarkLogic Server and Office 2007.”
11. Chauha, Hitesh.” Error Handling Framework for Data Lakes”.
12. Caloyannides, Michael A. "Digital 'Evidence' Is Often Evidence of Nothing." In Digital Crime and Forensic Science in Cyberspace, edited by Panagiotis Kanellis, 334-39. Hershey, PA: Idea Group, 2006.
13. Caloyannides, Michael A., Michael A. Caloyannides. Privacy Protection and Computer
14. Forensics. 2nd ed, Artech House Computer Security Series. Boston: Artech House, 2004. [Seeespecially: 8-22, 32-44.] 15. Carrier, Brian. File System Forensic Analysis. Boston, MA: Addison-Wesley, 2005. [Seeespecially: "Computer Foundations" (17-45), "Hard
Disk Data Acquisition" (47-66), and "FileSystem Analysis (173-210).]
16. Casey, Eoghan. "Error, Uncertainty, and Loss in Digital Evidence." International Journal of Digital Evidence 1, no. 2 (2002). [See especially the discussions of clock offsets and log files.]
17. Chaski, Carole. "The Keyboard Dilemma and Authorship Identification." In Advances in Digital Forensics III: IFIP International Conference on
Digital Forensics, National Center for Forensic Science, Orlando, Florida, January 28-January 31, 2007, edited by Philip Craiger and Sujeet Shenoi. New York, NY: Springer, 2007.
72-75
16. Authors: M. Sugunadevi, S. P. Jeyapriya
Paper Title: Experimental Study on Piles with Pile Cap at Varying Position under Different Loading Conditions
Abstract: High rise buildings and offshore structures are usually constructed over foundation which comprises of
several number of piles connected together using pile cap. These piles and pile caps frequently are subjected to a
mixture of lateral, vertical as well as twisting forces. Conventional method tends to emphasis predominantly on
foundation resistance under vertical loading. The piles are essential subjected to horizontal loads along with vertical
loads. Resistance to the vertical and the lateral loading is generally provided by base and side friction, pile-soil-pile cap
interaction between pile and surrounding soil, position of the pile cap, number of piles and piles arrangement with
respect to the loading direction. In this study, the piles are placed in the sand with pile cap i) above the soil surface at a
height of 35mm ii) pile cap bottom resting on surface of soil medium iii) pile cap top placed at the surface of soil and
iv) pile cap placed below soil surface to a depth of about 35mm. Experimental analysis were carried out for all the
above cases under vertical, lateral and combined loading conditions. Parameters like position of the pile cap, quantity of
piles and their arrangements were varied and analysed. The test results reveal that the pile cap placed below the soil
surface increases lateral resistance capacity of the piles in the range of 56% to 66% compared with pile cap placed
above the soil surface under both independent and combined loading conditions in cohesionless soil.
Keywords: Cohesion less Soil, Lateral Resistance Capacity, Pile Foundations, Pile cap, Pile - Soil - Pile Cap
Interaction
References: 1. Y. K. Chow and C. I. Teh “Pile-Cap-Pile-Group Interaction in Nonhomogeneous Soil”, Journal of Geotechnical Engineering, Vol. 117, No. 11,
1991, pp. 1655-1668.
2. P. J. Hararika and U.K. Nath, “Finite Element Analysis of Pile-Soil-Cap Interaction under Lateral Load”, Indian Geotechnical Conference, GEOtrendz, 2010, pp. 809-812.
3. B. Jegatheeswaran and K. Muthukkumaran, “Behavior of Pile due to Combined Loading with Lateral Soil Movement”, International Journal of
Geo-Engineering, 2016, pp. 1-10. 4. S. Karthigeyan, V. V. G. S. T. Ramakrishna and K. Rajagopal, “Numerical Investigation of the Effect of Vertical Load on the Lateral Response
of Piles”, Journal of Geotechnical and Geoenvironmental Engineering, Vol. 133, 2007, pp. 512-521.
5. J. B. Kim, R. J. Brungraber and L. P. Lai, “Pile Cap Soil Interaction from Full-Scale Lateral Load Tests”, Journal of Geotechnical Engineering, ASCE, Vol. 105, No. 5, 1979, pp.643-653.
6. Michael C. McVay, Limin Zhang, Sangjoon Han and Peter Lai, “Experimental and Numerical Study of Laterally Loaded Pile Groups with Pile
Caps at Variable Elevations”, Transportation Research Record, 2003, pp. 12-18. 7. R. L. Mokwa and J. M. Duncan, “Experimental Evaluation of Lateral-Load Resistance of Pile Caps”, International Journal of Geotechnical
Engineering, Vol. 27, No. 2, 2001, pp.185-192.
8. R. L. Mokwa,” Investigation of the Resistance of Pile Caps to Lateral Loading”, Ph. D thesis, Virginia Polytechnic Institute and State University, Blacksburg, USA,1999.
9. U. K. Nath and P. J. Hazarika, “Lateral Resistance of Pile Cap-An Experimental Investigation”, International Journal of Geotechnical
Engineering, Vol. 7, No. 3, 2013, pp. 266-272. 10. S. Narashimha Rao, V. G. S. T. Ramakrishna and M. Babu Rao, “Influence of Rigidity on Laterally Loaded Piles Groups in Marine Clay”,
Journal of Geotechnical and Geoenvironmental Engineering, Vol. 124, 1998, pp.5 42-549.
11. H. G. Polous and E. H. Davis, “Pile foundation analysis and design”, John Wiley & Sons, Inc. New York, 1971. 12. K. M. Rollins and E. Stenlund, “Laterally loaded pile cap connections”, Revised Final Report, Brigham Young University, Provo, UT, USA.
13. Utpal K. Nath and Palash J. Hazarika, “Study of Pile Cap Lateral Resistance Using Artificial Neural Networks”, International Journal of
Computer Applications, Vol. 21, No. 1, 2011, pp. 20-25. 14. Varun Maru and M. G. Vanza, “Lateral Behaviour of Pile Under the Effect of Vertical Load”, Journal of Information, Knowledge and
Research in Civil Engineering, Vol. 4, No. 2, 2017, pp. 482-485.
79-83
17.
Authors: Arun Solomon.A, Hemalatha.G
Paper Title: Experimental Investigation of Insulated Concrete Form (ICF) Wall Panels under Quasi Static Cyclic
Load
Abstract: Insulated Concrete Form (ICF) is a promising construction technique that provides fast construction, energy
efficient, cost effective, sound proof and disaster resistant building. ICF is made from expanded polystyrene (EPS) and
reinforced concrete. EPS occupies permanent position on the surface of concrete wall that offers insulation and
structural benefits to the building. In this study, quasi-static cyclic load behavior of ICF wall panels were examined and
test results were reported. ICF wall panels were made with 60 mm thick core concrete and 100 mm thick of 12, 20
kg/m3 density EPS provided as a facesheet. The specimens were tested in 100 T capacity loading frame under
horizontal quasi-static cyclic load. The experimental results were analyzed with hysteresis loops and load-deflection
curves. From the study of cyclic load behavior and literature, ICF wall panel is recommended for the construction of
seismic resistant buildings.
Keywords: Energy Dissipation, EPS, ICF, Hysteresis Loops, Load-deflection Curve
References: 1. I. Ricci, M. Palermo, G. Gasparini, S. Silvestri, and T. Trombetti, “Results of pseudo-static tests with cyclic horizontal load on cast in situ
sandwich squat concrete walls,” Eng. Struct., vol. 54, pp. 131–149, 2013. 2. J. S. Joseph, H. Gladston, and V. Vellapandi, “Development of Link Column Frame System for Seismic Resistance of Reinforced Concrete
Structures,” Adv. Civ. Eng. Mater., vol. 7, no. 3, p. 20170106, 2018.
3. S. A. Mousavi, S. M. Zahrai, and A. Bahrami-Rad, “Quasi-static cyclic tests on super-lightweight EPS concrete shear walls,” Eng. Struct., vol. 65, pp. 62–75, 2014.
4. P. Dusicka and T. Kay, “Seismic Evaluation of a Green Building Structural System:ICF Grid Walls,” Proc. 2009 Struct. Congr. - Don’t Mess
with Struct. Eng. Expand. Our Role, pp. 2475–2481, 2009. 5. P. Dusicka and T. Kay, “In-Plane Lateral Cyclic Behavior of Insulated Concrete Form Grid Walls,” J. Struct. Eng., vol. 137, no. 10, pp. 1075–
1084, 2011. 6. A. Arun Solomon and G. Hemalatha, “Inspection of properties of Expanded Polystyrene (EPS), Compressive behaviour, bond and analytical
examination of Insulated Concrete Form (ICF) blocks using different densities of EPS,” Int. J. Civ. Eng. Technol., vol. 8, no. 1, pp. 209–221,
2017. 7. T.N.Salonikios, A.J.Kappos, I.A.Tegos and G.G.Penelis, "Cyclic Load Behavior of Low-Slenderness Reinforced Concrete Walls: Design Basis
84-88
and Test Results" ACI structural Journal, pp. 649-660
18.
Authors: Arunraj E, Hemalatha G, Ramya M, Arun Solomon A, Elizabeth Amudhini Stephen
Paper Title: Optimization of Regular Lattice Structure for Maximum Shear Capacity
Abstract: The present study was undertaken to optimize the shear strength of the regular hexagonal, triangle and
square lattice structure which can be used in the exterior beam column joint. Here, shear strength and shear stress values
are compared to the normal exterior beam column joint which is detailed as per IS13920:2016 and IS456:2000.
Optimization of the shape of the unit cell was carried out to obtain maximum shear stress. The optimum shear stress of
lattice unit cell is found by varying the thickness and length of lower limit and upper limit. The unit cell of 10mm is
taken as a maximum length and the thickness is varied for various shapes. Genetic Algorithm which is a non –
traditional optimization is used for optimizing the shear stress.
Keywords: Regular lattice; Genetic algorithm; Shear strength
References: 1. Gibson, L.J, Ashby.M.F, “Cellular Solids: Structure and properties”, second ed., Cambridge University Press, Cambridge, 1997.
2. Evans, A.G, “Lightweight materials and structures”, Materials Research Bulletin 26(2001), 790–797.
3. Pan, Shi-Dong, Lin-Zhi Wu, and Yu-Guo Sun. "Transverse shear modulus and strength of honeycomb cores." Composite Structures 84.4 (2008), 369-374.
4. Kelsey, S, R. A. Gellatly, B. W. Clark, “The shear modulus of foil honeycomb cores: A theoretical and experimental investigation on cores used
in sandwich construction”, Aircraft Engineering and Aerospace Technology 30.10 (1958): 294-302.
5. Masters, I. G., and K. E. Evans. "Models for the elastic deformation of honeycombs." Composite structures 35.4 (1996), 403-422.
6. Sorohan, Ştefan, et al, “Estimation of Out of Plane Shear Moduli For Honeycomb Cores With Modal Finite Element Analyses”, Ro.J.Techn
Sci,Appl Mechanics, Vol. 61(2016), 71-88. 7. Ingle, R. K., and Sudhir K. Jain. "Explanatory examples for ductile detailing of RC buildings." IITK-GSDMA Project Report on Building Codes,
I IT, Kanpur, India, 2005. 8. Young, Warren Clarence, and Richard Gordon Budynas. Roark's formulas for stress and strain. Vol. 7, McGraw-Hill, New York, 2002.
9. Wang, A-J, and D. L. McDowell, “In-plane stiffness and yield strength of periodic metal honeycombs”, Journal of engineering materials and
technology 126.2 (2004): 137-156. 10. Cote, François, Vikram Deshpande, and Norman Fleck, “The shear response of metallic square honeycombs." Journal of Mechanics of Materials
and Structures 1.7 (2006), 1281-1299.
11. Xie, H., et al, “Study on the out of plane shear properties of super alloy honeycomb core”, 18th Int. Conf. on Composite Materials. 12. Andrews, E.W, et al, “Size effects in ductile cellular solids. Part II: experimental results”, International Journal of Mechanical Sciences 43.3
(2001), 701-713.
13. Ashby, Michael F, and RF Mehl Medalist. “The mechanical properties of cellular solids”, Metallurgical Transactions 14.9 (1983), 1755-1769. 14. R. Akbari Alashti, S. A. Latifi Rostami and G. H. Rahimi, “Buckling Analysis of Composite Lattice Cylindrical Shells With Ribs Defects”, IJE
Transactions A: Basics Vol. 26, No. 4 (April 2013) 411-420.
15. Indian Standard, IS 456: 2000, Plain and Reinforced Concrete Code of Practice (2000). 16. IS 13920: 2016, Ductile Design and detailing of reinforced concrete structures subjected to seismic forces Code of practice.
17. Amiri GG, Massah SR, Boostan A. “Seismic response of 4-legged self-supporting telecommunication towers”. International Journal of
Engineering. 2007 Aug;20(2). 18. J.Zhang and M.F.Ashby, “The out-of-plane properties of honeycombs”, International Journal of Mechanical Sciences, 34.6(1992), 475-489.
19. S.D.Pan, L.Z.Wu, Y.G.Sun. “Transverse shear modulus and strength of honeycomb cores”, Composites Structures, 84.4(2008): 369-374.
20. S.D.Pan, L.Z.Wu, Y.G.Sun, Z.G.Zhou and J.L.Qu, “Longitudinal shear strength and failure process of honeycomb cores”, Composites Structures, 72.1(2006): 42-46.
21. Rastgar, M., and H. Showkati. "Field Study and Evaluation of Buckling Behavior of Cylindrical Steel Tanks with Geometric Imperfections under
Uniform External Pressure." International Journal Of Engineering 30, no. 9 (2017): 1309-1318.
89-94
19.
Authors: M. Sivaram, D. Yuvaraj, Amin Salih Mohammed, V. Porkodi, V. Manikandan
Paper Title: The Real Problem Through a Selection Making an Algorithm that Minimizes the Computational
Complexity
Abstract: Computational complexity issues are gaining increasing attention as information search, retrieval and
extraction techniques and methodologies mature. This paper presents the theoretical approach of computational
complexity reduction which supports information related operations in an effective and efficient manner. Three-step
approach to design paradigm will have different costs (time), will consume different amount of resource (space) and
will have some inherent risk or uncertainty. To capture these aspects, we need economic models of software that
take into account costs, space, uncertainty and schedule implications. To address this need for economic decision
making, we have proposed a method of economic modeling of information-related operations centered on an
analysis of their architecture. Although we consider that the computation problem belongs to the class of np-
complete. In this paper, our objective is to solve the real problem by an decision making algorithm that minimizes
the computational complexity.
Keywords: Hierarchical Modeling Methodology, Partitioning,
References: 1. DouglasC.Schmidt, “An overview of IP Multicasting” ,Unix Network Programming. 2. Ian Ferrel, Adrian Mettler, Edward Miller, and Ran Libeskind-Hadas, Virtual Topologies for Multicasting With Multiple Originators in
WDM Networks, IEEE/ACM Transactions on Networking, Vol. 14, NO. 1, February 2006
3. Padmini Vellore,Paul Gillard, Ramachandran,Venkatesan, Delivery Analysis of Multicasting in BitTorrent Enabled AdHoc Network (MBEAN) Routing, IWCMC’06, July 3–6, 2006, Vancouver, British Columbia, Canada.
4. K.Batri, M. Sivaram “Testing the Impact of Odd and Even Point Crossover of Genetic Algorithm Over the Data Fusion in Information
Retrieval” Volume 74, Issue Number 4, Pages643-649,European Journal of Scientific Research,2012. 5. Dhivakar B, Saravanan SV, Sivaram M, Krishnan RA. Statistical Score Calculation of Information Retrieval Systems using Data Fusion
Technique. Computer Science and Engineering. 2012;2(5):43-5.
95-100
20.
Authors: Harikrishna Bommala, S. Kiran, K. Mani Deep, Vadde Sunil Babu
Paper Title: Client Authentication as a Service in Microsoft Azure
Abstract: In today's Technological World, Information Security is an essential aspect for the internet applications.
Cloud computing is an increasing current class of services for any type of users of the internet. In every modern
technology like Cloud, authentication is very serious problem. So, many researchers apply various cryptography
techniques to protect the sensitive data in the cloud systems. In this research work proposed on Client-
Authentication-Verification Algorithm, Client–One- Time-Password-Authentication Algorithm, and Client -
Authentication-Storage Algorithm for security and authentication in the cloud Model. These proposed algorithms
have to provide strongest authentication mechanism to a cloud client. These techniques easily fit into any type of
service in the cloud system.
Keywords: Security, Authentication, Cryptography, Microsoft Azure Cloud.
References: 1. BH Krishna, S Kiran, G Murali, RPK Reddy “Security issues in service model of cloud computing environment” Procedia Computer
Science, 2016, published Elsevier page no: 246-251, volume no 87.
2. https://azure.microsoft.com/en-in/tools/ 3. Yu J, Wang G, Mu Y, Gao W. “An efficient generic framework for three-factor authentication with provably secure instantiation” IEEE
Transactions on Information Forensics and Security. 2014; 9(12):1–12.
4. Harikrishna Bommala, Dr.S.kiran, RPK Reddy, K.Mani Deep, “Network as a Service Model in Cloud Authentication by HMAC Algorithm” Int. J. Advanced Networking and Applications Volume: 09 Issue: 06 Pages: 3623-3631 (2018) ISSN: 0975-0290.
5. B. Harikrishna, S. Kiran, R. Pradeep Kumar Reddy, “Protection on sensitive information in cloud Cryptography algorithms”, IEEE digital
Library 10.1109/CESYS.2016.7889894. 6. Lee S, Kim TY, Lee HJ. “Mutual authentication scheme for cloud computing” Future Information Communication Technology and
Applications. 2013; 235:149–57.
7. Jiang R. “Advanced secure user authentication framework for cloud computing” International Journal of Smart Sensing and Intelligent Systems. 2013 Sep; 6(4):1700–24.
8. https://visualstudio.microsoft.com/vs/features/azure/
9. Harikrishna Bommala, “https://www. scholars- press.com/catalog/details/store/gb/book /978- 620 - 2-30024-7/computer-programming-in-c?search=978-6202300247”published date 2017/8/4.
10. Kataria S, Syal R. “Secure mutual authentication for cloud environment”, International Journal of Computer Science Engineering and
Technology. 2015 Jul; 5(7):214–18. 11. Jiang R. “Advanced secure user authentication framework for cloud computing” International Journal of Smart Sensing and Intelligent
Systems. 2013 Sep; 6(4):1700–24.
12. Soni P, Sahoo M. Multi-factor authentication security framework in cloud computing. International Journal of Advanced Research in Computer Science and Software Engineering. 2015 Jan; 5(1):1065–71.
13. Kumar DG, Rajasekaran S, Prabu R. PB verification and authentication for server using multi communication. Indian Journal of Science
and Technology. 2016 Feb; 9(5):1–6. DOI: 10.17485/ijst/2016/v9i5/87154.
101-105
21.
Authors: Aman Dubey, Sandhya Tarar
Paper Title: Evaluation of Approximate Rank-Order Clustering using Matthews Correlation Coefficient
Abstract: In this postulation, we proposed a technical review of different strategies that are generally used to
evaluate the accuracy of calculations, accuracy and F measure. We briefly discussed the points of interest and
detriments of each approach. For grouping errands, we firstly made neighbors of each picture in dataset utilizing
KD Tree and afterward bunching them utilizing Approximate Rank Order Clustering. Algorithm and watched and
demonstrate a few outcomes relating accuracy, sensitivity, specificity, F-measure and after that used Matthews
Correlation Coefficient (MCC). Since MCC is based on the four components formed in confusion matrix it is more
accurate to get the overall understanding of any algorithm over some dataset.
Keywords: Face Recognition, Face Clustering, Deep Learning, Scalability, Cluster Validity.
References: 1. C. Otto, D. Wang, and A. K. Jain, “Clustering Millions of Faces by Identity” in IEEE Transactions on Pattern Analysis and Machine
Intelligence, Volume 40, Issue 2, 2018. 2. Zhu, F. Wen, and J. Sun, “A rank-order distance based clustering algorithm for face tagging,” in IEEE Computer Vision and Pattern
Recognition, 2011, pp. 481–488.
3. Xiang Wu, Ran He, Zhenan Sun, Tieniu Tan, “A Light CNN for Deep Face Representation with Noisy Labels”, in IEEE Transactions on Information Forensics and Security, Volume 13, Issue 11, 2018. 28–28.
4. B. W. Matthews, "Comparison of the predicted and observed secondary structure of T4 phage lysozyme". Biochimica et Biophysica Acta
(BBA) - Protein Structure, 1975, pp. 442–451. 5. D. M. W. Powers, "Evaluation: From Precision, Recall and F-Measure to ROC, Informedness, Markedness & Correlation", Journal of
Machine Learning Technologies, 2011 ,pp 37–63.
6. S. Boughorbel, F. Jarray, M. El-Anbari,"Optimal classifier for imbalanced data using Matthews Correlation Coefficient metric." PLoS ONE, 2017
7. D. Chicco, "Ten quick tips for machine learning in computational biology". BioData Mining, December 2017, pp 1–17.
8. G.B.Huang, M.Ramesh, T.Berg, and E.Learned-Miller, “Labeled faces in the wild: A database for studying face recognition in unconstrained environments,” University of Massachusetts, Amherst, October 2007, Tech. Rep. 07-49.
9. A.K. Jain, “Data clustering: 50 years beyond k-means,” Pattern Recognition Letters, vol. 31, no. 8, 2010, pp. 651–666.
10. J. Wang, J. Wang, G. Zeng, Z. Tu, R. Gan, and S. Li, “Scalable k-NN graph construction for visual descriptors,” in IEEE Computer Vision and Pattern Recognition. IEEE, 2012, pp. 1106–1113.
11. ] F. Schroff, D. Kalenichenko, and J. Philbin, “Facenet: A unified embedding for face recognition and clustering,” in IEEE Computer
Vision and Pattern Recognition, 2015. 12. ] T. Liu, C. Rosenberg, and H. A. Rowley, “Clustering billions of images with large scale nearest neighbor search,” in Proc. IEEE Winter
Conference on Applications of Computer Vision, 2007, pp. 28–28.
13. J. J. Foo, J. Zobel, and R. Sinha, “Clustering near-duplicate images in large collections,” in Proc. of the International Workshop on Multimedia Information Retrieval. ACM, 2007, pp. 21 -30.
14. [14] J. Chen, H. Fang, and Y. Saad, “Fast approximate k-NN graph construction for high dimensional data via recursive lanczos bisection,”
The Journal of Machine Learning Research, vol. 10, pp. 1989–2012, 2009. 15. C. Silpa-Anan and R. Hartley, “Optimised kd-trees for fast image descriptor matching,” in IEEE Conference on Computer Vision and
Pattern Recognition, 2008, pp. 1–8.
16. D. Yi, Z. Lei, S. Liao, and S. Z. Li, “Learning face representation from scratch,” arXiv preprint arXiv:1411.7923, 2014.
106-113
17. K. Simonyan and A. Zisserman, “Very deep convolutional networks for large-scale image recognition,” arXiv preprint arXiv:1409.1556, 2014.
18. K. C. Gowda and G. Krishna, “Agglomerative clustering using the concept of mutual nearest neighbourhood,” Pattern Recognition, vol. 10,
no. 2, pp. 105–112, 1978 19. C. Muja and D. G. Lowe, “Scalable nearest neighbor algorithms for high dimensional data,” IEEE Transactions on Pattern Analysis and
Machine Intelligence, vol. 36, 2014.
20. Mythili S , Madhiya E, “An Analysis on Clustering Algorithms in Data Mining”, International Journal of Computer Science and Mobile Computing, Vol. 3, Issue. 1, January 2014, pg.334 – 340.
21. A.K. Jain and R. C. Dubes,"Algorithms for Clustering Data.". Prentice Hall, 1988.
22. Z. Cao, Q. Yin, X. Tang, and J. Sun, “Face recognition with learning based descriptor,” in Proc. Computer Vision and Pattern Recognition. IEEE, 2010, pp. 2707–2714.
23. V. Kazemi and J. Sullivan, “One millisecond face alignment with an ensemble of regression trees,” in IEEE Computer Vision and Pattern
Recognition, 2014, pp. 1867– 1874.
22.
Authors: Nazar Imam, Sandhya Tarar
Paper Title: Cluster Optimization using Appropriate Nearest Neighbour
Abstract: In this postulation, presents the clustering of facial images using machine learning algorithm such as
nearest neighbor and approximate rank order clustering. Clustering is a technique for classifying similar kind of
object based on their trait. Clustering of images is challenging problems and there is still a considerable measure of
work that needs to be done in this area. Problems in clustering large dataset is to choose the quantity of clusters and
evaluating the obtained clusters. Clustering regard as the most important unsupervised learning as it manages
finding a structure in an accumulation of unlabeled information. A loose meaning of clustering could be "the way
toward sorting out articles into clusters whose people are nearby one means or another. A cluster in this manner is
an accumulation of items which are "comparable" amongst them and are "divergent" to the articles which are place
with different cluster. This thesis presents a work to improve clustering method to decrease the number of clusters
in a LFW (Labeled face in wild) dataset. Previous work uses kd tree a nearest neighbor method and approximate
rank order clustering method to find cluster on LFW dataset. our proposed method implement ball tree a better
nearest neighbor algorithm to reduce the number of clusters created by previous method.
Keywords: Face Recognition, Face Clustering, Deep Learning, Scalability, Cluster Validity.
References: 1. Charles Otto, Dayong Wang, and Anil K. Jain. Clustering millions of faces by identity. arXiv preprint arXiv:1604.00989 , 2016.
2. Dayong Wang, Charles Otto, and Anil K Jain. Face search at scale. IEEE Trans. on PAMI , 2016.
3. Timo Ahonen, Abdenour Hadid, and Matti Pietikainen. Face description with local binary patterns: Application to face recognition. IEEE Trans. on PAMI , 28(12), 2006.
4. David Arthur and Sergei Vassilvitskii. k-means++: The advantages of careful seeding. In Proc. of the Eighteenth Annual ACM-SIAM
Symposium on Discrete Algorithms , 2007 5. Ting Liu, Charles Rosenberg, and Henry A Rowley. Clustering billions of images with large scale nearest neighbor search. In Proc.
WACV, 2007.
6. Duane M. Blackburn, Mike Bone, and Jonathon P. Phillips. Face recognition vendor test 2000: evaluation report. Technical report, DTIC Document http://www.dtic.mil/ dtic/tr/fulltext/u2/a415962.pdf, 2001.
7. Jie Chen, Hawren Fang, and Yousef Saad. Fast approximate k-NN graph construction for high dimensional data via recursive lanczos
bisection. The Journal of Machine Learning Research , 10, 2009. 8. Charles Otto, Brendan Klare, and Anil Jain. An efficient approach for clustering face images. In Proc. ICB , 2015.
9. Chanop Silpa-Anan and Richard Hartley. Optimised kd-trees for fast image descriptor matching. In Proc. CVPR , 2008.
10. K. He, X. Zhang, S. Ren, and J. Sun. Delving deep into rectifiers: Surpassing humanlevel performance on Imagenet classification. arXiv preprint arXiv:1502.01852 , 2015.
11. Vinod Nair and Geoffrey E Hinton. Rectified linear units improve restricted boltzmann machines. In Proc. International Conference on
Machine Learning , 2010. 12. J. Wan, D. Wang, S. Hoi, P. Wu, J. Zhu, Y. Zhang, and J. Li. Deep learning for contentbased image retrieval: A comprehensive study.
ACM Multimedia , 2014. 13. Dong Yi, Zhen Lei, Shengcai Liao, and Stan Z Li. Learning face representation from scratch. arXiv preprint arXiv:1411.7923 , 2014.1.
Charles Otto, Dayong Wang, and Anil K. Jain. Clustering millions of faces by identity. arXiv preprint arXiv:1604.00989 , 2016.
14. Karen Simonyan and Andrew Zisserman. Very deep convolutional networks for largescale image recognition. arXiv preprint arXiv:1409.1556 , 2014.
15. Vahdat Kazemi and Josephine Sullivan. One millisecond face alignment with an ensemble of regression trees. In Proc. CVPR , 2014.
16. Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. Imagenet classification with deep convolutional neural networks. In Advances in
Neural Information Processing Systems , 2012.
17. Nitish Srivastava, Geoffrey Hinton, Alex Krizhevsky, Ilya Sutskever, and Ruslan Salakhutdinov. Dropout: A simple way to prevent neural
networks from overfitting. The Journal of Machine Learning Research, 15(1), 2014. 18. Gary B. Huang, Manu Ramesh, Tamara Berg, and Erik Learned-Miller. Labeled faces in the wild: A database for studying face recognition
in unconstrained environments. Technical Report 07-49, University of Massachusetts, Amherst, October 2007.
19. Paul Viola and Michael J Jones. Robust real-time face detection. International Journal of Computer Vision , 57(2), 2004. 20. Anil K Jain. Data clustering: 50 years beyond k-means. Pattern Recognition Letters , 31(8), 2010.
21. C. Zhu, F. Wen, and J. Sun. A rank-order distance based clustering algorithm for face tagging. In Proc. CVPR , 2011.
22. C. Zhu, F. Wen, and J. Sun. A rank-order distance based clustering algorithm for face tagging. In Proc. CVPR , 2011. 23. Marius Muja and David G. Lowe. Scalable nearest neighbor algorithms for high dimensional data. IEEE Trans. on PAMI , 36, 2014.
24. P. Grother and M. Ngan. Face recognition vendor test (FRVT): Performance of face identification algorithms. NIST Interagency Report
8009 , 2014. 25. Cheng Cheng, Junliang Xing, Youji Feng, Deling Li, and Xiang-Dong Zhou. Bootstrapping joint bayesian model for robust face
verification. In Proc. ICB, 2016.
114-121
23.
Authors: Rahul. K. Bhoyar, Sandeep.M. Pimpalgaonkar, Swapnil.J. Bhadang
Paper Title: Adjustable Height Belt Conveyor for Small-Scale Food Processing Unit
Abstract: In Small-scale Food processing units, material handling is taken by manually due to high capital
required for an advanced material handling system. These small units are looking a conveyor system which will
reduce manpower, space, money, and time for production. In many materials handling equipment’s, belt conveyors
122-130
are popular. This paper describes a new design and development of adjustable height belt conveyorsystem which
works satisfactorily to meet design point of view. It is reliable, compact, adjustable, saves working man-hours and
increasing profitability of small units engaged in material handling. These transports are versatile and it tends to be
adjusted by the activity and its needA legitimate structuring of the adjustable height belt conveyor will influence its
productivity, working, and life expectancyOur current attempt is towards fabricating an economical adjustable belt
conveyor material unloaded by adopting the existing simple design procedure.
Keywords: Adjustable height, belt conveyor, food processing, Funnel shape hopper.
References: 1. R.K. Bhoyar, Dr. C.C. Handa,” Design Consideration of Adjustable Height and Radial Belt Conveyor System”, International Journal of
Engineering Trends and Technology, Vol. 4, pp.4377-4382, October 2013.
2. R K Bhoyar and C C Handa,” Design Consideration for radial adjustable belt conveyor system”,International. Journal of Mechanical
Engineering & Robotics. Research, Vol. 2, pp.342-347, October 2013. 3. A.M. Guthrie and J.R. Pilcher,” The design of belt conveyors for bulk sugar handling”proceedings of the south African sugar
technologists’, Moreland Technical and Engineering Consultants Ltd, pp.81-90,April 1968.
4. A.W. Roberts,” Design and application of feeders for the controlled loading of bulk solids onto conveyor belts”,The South African Institute of Materials Handling.
5. G. M. Mir, Sheikh Idrees and Nadeem Bashir, “Expanding Pitch Type Conveyor Belt for Grading, an Alternative for Walnut Processing
Industries”, An International Journal of Research & Innovation,Vol. 2, pp.177-181, June 2015. 6. M El-Gindy. M. A Baiomy, M. M Abdelhamed, and Sahar, A Mosa,” Design and fabrication of a simplified mechanical handling system of
rice straw baling operation to reduce environment pollution, Misr Journal of Agricultural Engineering, Vol 26, pp. 667- 685, April 2009.
7. Martin Bohner, Isabel Barfuss, Albert Heindl, Joachim Muller,” Improving the airflow distribution in a multi-belt conveyor dryer for spice
plants by modifications based on computational fluid dynamics” biosystems Engineering, Vol. 115, pp.339 -345, May 2013.
8. A. Daniyan *, A. O. Adeodu and O. M. Dada,” Design of a Material Handling Equipment: Belt Conveyor System for Crushed Limestone
Using 3 roll Idlers”, Journal of advancement in engineering and technology, Vol,01, pp.1-7, January 2014. 9. Lu Hong-sheng, “Shell strength of conveyor belt pulleys: theory and design” International Journal of Mechanical Science. Pergamon Press
plc,Vol. 30, No. 5, pp. 333-345, 1988.
10. Tobias Heidrich, Aria Alimi, Leon Grothues, Jens Hesselbach, Olaf Wünsch,” Cross-flowing displacement ventilation system for conveyor belts in the food industry”,Energy & Buildings, in press, September 2018.
11. S. S. Vanamane, P.A. Mane, K. H. Inamdar,” Design and its Verification of Belt Conveyor System used for Cooling of Mould using Belt
Comp Software”, International Journal of Applied Research in Mechanical Engineering, Vol.1, 2011. 12. Ramesh, P. Karunaker and L. Ramesh,” Design and Analysis of Discharging of Dust in Pneumatic Conveying System by a Screw
Conveyor Shafts “, Advance Research and Innovations in Mechanical, Material Science, Industrial Engineering and Management ,2014.
24.
Authors: K. Amarnath, G. Sanjeev, P. Surendernath, V. Kumar
Paper Title: Modelling and Scheduling of Flexible Manufacturing System
Abstract: Production scheduling of an FMS is formulated as a multi-level integer program. The structure
proposed includes machine loading, part input sequence and operation scheduling. Flexible manufacturing system is
the better option to meet the effective utilization of resources, for which scheduling is the only solution. A simple
numerical problem approach is proposed, and some computational results of simulation are analyzed and an attempt
is made in arriving general conclusions.
Keywords: The Structure Proposed Includes Machine Loading,
References: 1. Ulusoy G, and Bilge U, “Simultaneous Scheduling of machines and automated guided vehicles”, International Journal of Production
Research, Vol.31, No.12, 1993, pp 2857-2873. 2. Ilkyeong M, and Lee J, “Genetic Algorithm Application to the Job Shop Scheduling Problem with Alternative Routings”, BK21 Logistics
Team, Industrial Engineering, Pusan National University, 2000, pp 1-19. 3. Nasr N. and Elsayed E A, "Job Shop Scheduling with Alternative Machines", International Journal of Production Research, Vol. 28, No. 9,
1990, pp 1595-1609.
4. Raman N, Talbolt F B, Rachamadugu R V, “Simultaneous scheduling machines and material handling devices in automated manufacturing”, Proceedings of the second ORSA/TIMS Conference on Flexible Manufacturing Systems, 1986, pp 455-466.
131-134
25.
Authors: Liji R F, M. Sasikumar
Paper Title: An Exploration of Digital Image Inpainting Techniques
Abstract: This paper gives an overview of different digital Image Inpainting techniques used contemporarily for
image restoration and enhancement process. Inpainting, dis-occlusion, image completion, retouching and filling-in
are different terms for the same task: if an image is given with a missing section, the values in the missing area has
to be restored by its values in an undetectable way. The patches are filled in from the neighbouring pixels.
Inpainting can be used for removal of objects from an image also. Inapainting techniques are made more
sophisticated by applying Neural Network and Fuzzy logic for fast and accurate filling of patches.
Keywords: Image Inpainting, Partial Differential Equation, Curvature Driven Diffusion, Examplar- Based,
MAP, SOM.
References: 1. M. Bertalmio, G. Sapiro, C. Ballester ,V. Caselles, “Image Inpainting”. Proceedings of Siggraph, 2000,pp 417- 424.
2. T. Chan, J. Shen, “Mathematical Models For Local Deterministic Inpaintings”, Technical Report, Cam00-11, IPRG, Ucla, 2000. 3. Zhongyu Xu, Xiaoli Lian, Lili Feng, “Image Inpainting Algorithm Based on Partial Differential Equation”, ISECS, 2008.
4. M. Bertalmio, A. L. Bertozzi, G. Sapiro, Navier-Stokes, “Fluid Dynamics and Image and Video Inpainting”, IEEE, pp 355 – 362, 2001.
5. D J Florinabel, S E Juliet, Dr. V Sadasivam, “Multi Echelon Gabor Orientation Driven Morphological Inpainting based Recovery of
Digitized paintings”, IE(I) Journal – CP, Volume 90, 2009.
6. M.J. Fadili, J. L. Starck and F. Murtagh, “Inpainting And Zooming Using Sparse Representations”, The Computer Journal Advance Access
, 2007.
135-138
7. George Papandreou, Petros Maragos, Anil Kokaram, “Image inpainting with a Wavelet Domain Hidden Markov Tree Model”, IEEE,2008, pp 773-776.
8. Marcelo Bertalmio, Stanley Osher, Luminita Vese, Guillermo Sapiro, “Simultaneous Structure and Texture Image Inpainting”, IEEE
Transactions on IP, Volume 12, No.8, 2003,pp 0882- 0889. 9. Eftychios, A. Pnevmatikakis and Petros Maragos, “An Inpainting System For Automatic Image Structure – Texture Restoration with Text
Removal”. ICIP,2008, pp. 2616 -2619.
10. Xiaowei Shao, Zhengkai Liu, Houqiang Li, “An Image Inpainting Approach Based on the Poisson Equation”, Computer Society IEEE, 2006.
11. Huanfeng Shen and Liangpei Zhang, “A MAP based algorithm for destriping and Inpainting of remotely sensed images”. IEEE
Transactions On Geoscience And Remote Sensing, Volume. 47, No. 5, 2009, pp 01492- 01502. 12. Timothy K Shih., Rong Chi Chang, Liang Chen Lu, Wen Chieh Ko, Chun Chia, “Adaptive Digital Image Inpainting”, Computer Society
IEEE, 2004.
13. A. Efros and T. Leung, “Texture Synthesis by non-parametric sampling”, ICCV,1997 , pp 1033-1038. 14. Alexander Wong And Jeff Orchard, “A Nonlocal Means Approach To Exemplar-Based Inpainting”, IEEE ICIP, 2008.
15. Zongben Xu and Jian Sun, “Image Inpainting by Patch propagation Using Patch Sparsity.” Transaction on IP IEEE, Volume 19, Issue
5,2010, pp 1153 – 1165. 16. Julien Mairal, Michael Elad, and Guillermo Sapiro, “Sparse representation for color image restoration”, IEEE 2008.
17. Jason C. Hung, “Exemplar-Based Image Inpainting Based On Structure Construction”, Journal Of Software, Volume 3, 2008, pp 57-63.
18. Elad, M., Starck, J.-L., Querre, P. and Donoho, D. “Simultaneous cartoon and texture image Inpainting”. ACHA, 2005,pp 340–358. 19. Dong Liu, Xiaoyan Sun, Feng Wu, Shipeng Li, and Ya-Qin Zhang, “Image Compression With Edge-Based Inpainting”, IEEE Trans. On
Cir. And Syst For Video Tech., Volume 17, Issue 10,2007, pp. 1273 – 1288.
20. Chen Bo, Wang Zhaoxia, Bai Ming, Wang Quan, Sun Zhen, “A Structure first Image Inpainting Approach Based on Self Organizing Map (SOM)”, IEEE 2010.
21. Q Wang, Z Wang, C S Chang, T Yang, “Multilayer Image Inpainting Approach Based on Neural Networks”, 5th ICNC, 2009,pp 459 – 462.
22. Rong –Chi Chang, Nick C Tang, Chia Cheng Chao, “Application of Inpainting Technology to Video Restoration”, IEEE,2008, pp 359 –
364.
23. Haomian Wang, Houquiang Li, Baoxin Li, “Video Inpainting for largely occluded moving Human”, ICME , IEEE, 2007,pp 1719 – 1722.
24. Li and Zheng, “Patch-Based Video Processing: A Variational Bayesian Approach”, IEEE Trans. Circ. Sys. Vid. Tech., Volume 19, Issue 1, 2009.
25. Dongwook Cho and Tien D.Bui, “Image Inpainting using Wavelet-based Inter and Intra Scale Dependency”, IEEE, 2008.
26. Zhaozhong Wang and Y F Li, “Watershed-Guided Inpainting for image Magnification”, IEEE, 2008.
26.
Authors: Ashish Bansal, Neha Gupta
Paper Title: Adaptive Watermarking using PSO and Fuzzy Logic Approach
Abstract: Digital Watermarking with PSO and Fuzzy Logic is an attempt to find suitable locations for inserting
watermark bits using PSO and Fuzzy Logic, by looking at the surrounding pixels and adaptively adjusting the pixel
intensity values to encode the watermark bits. The result obtained in this technique indicate that following adaptive
insertion on the pixels after finding location by PSO is even more effective to obtain better fidelity and robustness.
The inverse tradeoff between robustness and fidelity is also demising.
Keywords: Digital Watermarking, Fuzzy Logic, PSO, Robustness, Fidelity, Digital Security.
References: 1. R.Schyndel, A.Tirkel and C.Osborne, “A Digital Watermark” in Proc. IEEE International conference on Image Processing, 1994, vol.2,
pp.86-92.
2. Xia-Mu Niu and Sheng-He Sun, “Multiresolution Digital Watermarking for Still Image” in Proc. IEEE Neural Networks for Signal Processing, 2000, vol.2,
3. Ping Dong, Jovan G.Brankov, Nilolas Palastsanos, Yongyi Yang, Franck Davoine, “Signal Compression Digital Watermarking Robust
Geometric Distortions”, IEEE Transaction on image processing, December 2005, vol.14(12). 4. Charkari N.M. and Chahooki M.A.Z., “A Robust High Capacity Watermarking Based on DCT and Spread Spectrum” in IEEE International
Symposium of Signal Processing and Information Technology, 2007, pp.194-197.
5. Chu-Hsing Lin, Jung-Chun Liu, Chih-Hsiong ShihandYan- Wei Lee, “A Robust Watermark Scheme for Copyright Protection” in MUE International Conference on Multimedia and Ubiquitous Engineering, 200 pp 132-137.
6. Larijani H.H.and Rad G.R., “A New Spatial Domain Algorithm for Gray Scale Images Watermarking” “ICCCE International conference
on computer and communication engineering”, 2008, pp. 157-161. 7. Fredric M.Ham and Ivica Kostanic, “Principles of Neurocomputing for Science & Engineering”, Mc.GrawHill, Singapore, 2001, pp. 136-
140.
8. Yu,P.T., Tsai H.H., and Lin J.S., “Digital Watermarking based on Neural Networks for Color Images, Signal processing, vol.81, pp.663-671.
9. J.R.Hernandez, F.Perez Gonzalez and J.M.Rodriguez, “Data Hiding for Copyright Protection of Still Images”, National conference in
image processing, Faislabad,2001. 10. Hwang M.S., Chang C.C. and Hwang K.F.,” Digital Watermarking of Images using Neural Networks”, Journal of electronic imaging,
2000, vol. 9,pp.548-555.
11. CharrierM., Cruz,D.S. and Larsson M., “JPEG 2000 , the Next Millennium Compression Standard for Still Images” in Proc. IEEE International Conference.
12. Zhang Zhi Ming, Li Rong-Yan and Wang Lei, “Adaptive Watermark Scheme with RBF Neural Networks” in Proc. 2003 of International
Conf. Neural Networks and Signal Processing,2003,vol 2. pp. 1517-1520 13. J.R.Hernandez, F.Perez Gonzalez and J.M.Rodriguez, “Data Hiding for Copyright Protection of Still Images”, National conference in
image processing, Faislabad, 2017.
139-142
27.
Authors: Sunita Panda, Padma Charan Sahu
Paper Title: Equalization of Supervised Data Trained RBFNN using MSFLA
Abstract: In order to avoid the channel distortion in signal processing recently, RBFNN based equalizers is
mentioned. Hit and trail method is the main provocation problem for design of RBFNN Equalizer. Here the
initiation is start with use of the population based optimization algorithm trained RBFNN equalizer, such as
Shuffled Frog-Leaping Algorithm as well as its modified forms. The observation is made on the basis of its
performance as compared to the other equalizers.
Keywords: RBFNN, Equalization Technique, SFLA.
143-145
References: 1. Burse K., Yadav R. N., and Shrivastava S. C., 2010, Channel Equalization Using Neural Networks: A Review, IEEE Trans. On Systems,
man and cybernetics-Part C: Applications and Reviews, Vol. 40, No. 3, pp.352-357.
2. Subramanian K, Savitha R, Suresh M, 2014, A complex-valued neuro-fuzzy inference system and its learning mechanism, Neurocomputing, Vol. 123, pp. 110-120.
3. Ruan X, Zhang Y, 2014, Blind sequence estimation of MPSK signals using dynamically driven recurrent Neural Networks,
Neurocomputing, Vol. 129, pp. 421-427 4. Cui M, Liu H, Li Z, Tang Y and Guan X, 2014, Identification of Hammerstein model using functional link artificial Neural Networks,
Neurocomputing, Vol. 142, pp. 419-428
5. Chen S, Mulgrew B, Grant P. M, 1993, A Clustering Technique for Digital Communications Channel Equalization Using Radial Basis
Function Networks, IEEE Transactions on Neural Networks, Vol 4, pp, 570-579 6. Gan, M., Peng, H. and Chen, L. 2012, Global–local Optimization Approach to Parameter Estimation of RBF-type Models. Information
Sciences. Vol.197, pp.144-160
7. Çivicioğlu P., Alç M and Beṣdok E, 2005, Using an Exact Radial Basis Function Artificial Neural Network for Impulsive Noise Suppression
from Highly Distorted Image Databases, Lecture Notes in Computer Science, Vol. 3261, pp 383-391 8. Schilling RJ, Carroll JJ Jr and Al-Ajlouni AF, 2001, Approximation of Nonlinear Systems with Radial Basis Function Neural Networks,
IEEE Transactions on Neural Network, Vol. 12, No. 1, pp.1-15.
9. Yavuz, O. and Yildirim, T., 2008, Design of digital filters with bilinear transform using neural networks," 16th IEEE Conference on Signal Processing, Communication and Applications, pp.1-4.
28.
Authors: Albert Eddy Husin, Bernadette Detty Kussumardianadewi
Paper Title: Cost Performance Review on Value Engineering Optimized Floor Cover Finishing Work of High Rise
Office Building
Abstract: The need for office space in urban areas could be considered really high because of the economic
activities involved and because of its role in global economic growth. While Jakarta may seem to already possess a
lot of office buildings, it turns out that they are not enough to compensate the growing demand for office spaces,
with the demand reaching 6,928,500 m2 of rental office space at the end of 2013. Floor cover finishing is a
generalized term for the permanent cover of the floor and the works involved. Floor cover itself is a term used to
illustrate every finishing materials that would be applied on the floor structure to provide walking surfaces. The goal
of this research is to acquire any work items that are viable to be value engineered. The floor cover finishing work
is considered as the limitation of this research by the consideration of the said work to be the highest cost
contribution to the interior architecture and could be the key factor in defining the image of the company that uses
the office building. After the implementation of value engineering, the cost saving reached 12%, reducing the cost
contribution of the floor cover finishing work to 4.7% from the initial 5.4%.
Keywords: Floor cover finishing, High rise office building, Value Engineering.
References: 1. Warszawski, A., & Asce, F. (2003). “Analysis of Costs and Benefits of Tall Buildings”,
2. Miraj, Perdana, Yusuf Abdurachman, Erwin Tobing, and Antonius Ivan (2015). Developing Conceptual Design of High-Speed Railway Using Value Engineering Method: Creating Optimum Project Benefits
3. Berawi, M.A1, Miraj, P2, Gunawan3 & Husin ( 2014). Conceptual Design of Sunda Strait Bridge Using Value Engineering Approach
4. Si Hwa Bae, Sung Moon Jung (2004). A Study on the Satisfaction with Work Space in High rise Office Building. 5. Rahman, Herawati Zetha. 2013. Integrating Quality Management and Value Management Methods: Creating Value Added for Building
Projects. 6. Simanjuntak, M. R. A. (2017). The Analysis of Important Variables of The Value Engineering Model On Residential High Rise Buildings
In DKI Jakarta, Indonesia.
7. Min Seok Kim, Seung Kyu Yoo, Ju Hyung Kim, and Jae Jun Kim 2014). Study on The Major Delay Factors in Finishing Works Before Completion of Construction
8. Husin, A. E., Berawi, M. A., Dikun, S., Ilyas, T., & Berawi, A. R. B. (2015). Forecasting demand on mega infrastructure projects:
Increasing financial feasibility International Journal of Technology, 6(1), 73–83 9. Zuhaili Mohamad Ramly, Geoffrey Qiping Shen, and Ann T. W. Yu (2015). Critical Success Factors for Value Management Workshops in
Malaysia
10. Shen, Q., & Liu, G. (2003). Critical Success Factors for Value Management Studies in Construction. 11. Rajgor, M., Paresh, C., Dhruv, P., Chirag, P., & Dhrmesh, B. (2016). RII & IMPI: Effective Techniques for Finding Delay in Construction
Project. International Research Journal of Engineering and Technology (IRJET),
12. Mohammed Ali Berawi1, Teuku Yuri M. Zagloel1, Abdur Rohim Boy Berawi1, Yusuf Abdurachman (2015). Feasibility Analysis of
Trans-Sumatera Toll Road Using Value Engineering Method.
13. Francisco Loforte Ribeiro(2015). Appraisal of Value Engineering in Design Portugal
14. Amanda Cooper and Keith Potts (2015) Implementing Innovation Through Value Engineering Observations on U.K Civil Engineering Constructors.
15. Akoud, H. (1998). Value Engineering For The Practice of Architecture. New Jersey Institute of Technology.
16. SAVE International Value Society (2007). Value Standard and Body of Knowledge. 17. Ning, L. (2015). Cost Control Application Research of Value Engineering in the Design Phase of Construction Project
18. Yaman, H., & Taş, E. (2007). A building cost estimation model based on functional elements,
19. Akoud, H. (1998). Value Engineering For The Practice of Architecture. New Jersey Institute of Technology. 20. Mohammed Ali Berawi, Bambang Susantono, Perdana Miraj, Abdur Rohim Boy Berawi, Herawati Zetha Rahman, Gunawan, Albert Husin
(2014). Enhancing Value for Money of mega Infrastructure Projects Development Using Value Engineering Metho
21. Borza, J. (2011). FAST Diagrams : The Foundation for Creating Effective Function Models. Trizcon 2011, 1–10. 22. Mohammerd Ali Berawi, Bambang Susantono, Perdana Miraj, Gunawan, Abdur Rohim Boy Berawi, & Albert Husin (2015). Financial
Feasibility of The Sunda Strait Bridge Conceptual Design Using The Value Engineering Method
146-154
29.
Authors: Agil Lukose, AVN Krishna
Paper Title: Performance Evaluation of Diesel Engine using Genetic Algorithm
Abstract: Engine analysis and optimization is not a new approach to the field of automobiles. It has always been a
keen focus in the research of experts domestically as well as internationally, the control of Air-Fuel Ratio (AFR) in
transient operating conditions of engine. For the last few decades, the industry and economic expansion of
155-158
developed countries has showed a clean increase in the vehicle production as well as transport volume. Global
warming, acid rain, greenhouse effect and air pollution problems related to emission of CO2, NOx, PM, CO and
unburned HC, together with the consumption of fossil fuels, unite to create serious problems at a global level.
Therefore it is a research study considering all these current issues and taking it to a new level of optimization for
the output of a better efficiency, better economy and less pollution. Performance of Diesel Engine is evaluated by
parameters like Power, Torque and Specific Fuel Consumption.
Keywords: Diesel Engine, Exhaust Gas, Genetic Algorithm,. Performance Evaluation
References: 1. T.K.Chan, C.S.Chin, ”Data Analysis to Predictive Modeling of Marine Engine Performance using Ma-chine Learning”, 2016 IEEE Region
10 Conference (TENCON)-Proceedings of the International Confer-ence, pp. 2076-2080, 2016.
2. Tayarani-N, Mohammad-H and Bennett, Adam Prugel¨ and Xu, Hongming and Yao, Xin, ”Improving the performance of evolutionary
engine calibration algo-rithms with principal component analysis”, 2016 IEEE Congress on Evolutionary Computation (CEC), pp. 5128-5137, 2016.
3. Yang, Yong and Xu, Man and Zhao, Kegang and Zhou, Sijia, ”An identification method of characteristic pa-rameters for single-cylinder
engine fuel film based on genetic algorithm”, Proceedings of the 35th Chinese Control Conference, July 27-29, 2016, Chengdu, China 4. Fangxiao, Cheng and Xudong, Liu and Xiaomei, Lin, ”Simulation Study of Optimization of GA for Vehicle Power Train”, 2011
International Conference on Internet Computing & Information Services (ICICIS), pp. 330-333, 2011.
5. Shatnawi, Yousef and Al-Khassaweneh, Mahmood, ”Fault diagnosis in internal combustion engines using extension neural network”, IEEE Transactions on Indus-trial Electronics, vol. 61, no. 3, pp. 1434-1443, 2014.
30.
Authors: Aniu Wang, Jianqiang Xu, Xingya Rui, Liufen Li
Paper Title: Study on Heat Insulation Clothing Based on Parabolic Differential Model
Abstract: With the development of industry, high temperature operation becomes a necessary work. To ensure the
safety of the work, the need for thermal insulation of clothing. In this paper, a parabolic differential model is
established to analyze the thermal insulation of professional clothing. The optimal thickness of the heat insulation
clothing is obtained under different conditions by establishing the finite difference model to solve the differential
equation. Hereby” there are some ways to design the performance of heat protective clothing to make sure that the
cost is the lowest as possible in the case of effective heat insulation.
Keywords: Parabolic differential model, Heat conduction, Simulation model.
References: 1. Artamonov, Vladimir S., Denis M. Gordienko, and Anatoly S. Melikhov. "Fire safety of ground-based space facilities on the spaceport
“Vostochny”.", Acta Astronautica, 135 (2017): 83-91. 2. Ilott, Sarah. "“We are here to speak the unspeakable”: voicing abjection in Raj Kamal Jha’s Fireproof.", Journal of Postcolonial Writing,
50.6 (2014): 664-674.
3. Todorova, Bogdana. "The new challenges on the Silk Road.", Journal of Literature and Art Studies, 5.10 (2015): 911-916. 4. Zhu, Yun Pei, et al. "Surface and interface engineering of noble-metal-free electrocatalysts for efficient energy conversion processes.",
Accounts of chemical research 50.4 (2017): 915-923.
5. Vojvodic, Aleksandra, et al. "Exploring the limits: A low-pressure, low-temperature Haber–Bosch process.", Chemical Physics Letters, 598 (2014): 108-112.
6. Binder, Maximilian, et al. "Automated Manufacturing of Sensor‐Monitored Parts: Enhancement of the laser beam melting process by a
completely automated sensor integration.", Laser Technik Journal, 15.3 (2018): 36-39.
7. Nakata, Shogo, et al. "Wearable, flexible, and multifunctional healthcare device with an ISFET chemical sensor for simultaneous sweat pH
and skin temperature monitoring.", ACS sensors, 2.3 (2017): 443-448.
159-162
31.
Authors: S. Vaishnavi Devi, D. Vignesh D. M.
Paper Title: Public Transportation Management Strategy for Temple City
Abstract: The bus Transport industry has a lion’s share in India’s economic development. Due to easy accessibility,
flexibility of operations, door to door service, the bus transportation is a boon to the public. In fact, the progress of a
nation and progress of its transport industry is complementary to each other. India has the world's fastest growing
economies today, which increased thrust on development of infrastructure in the country to reduce the traffic
congestion due to increased traffic demand. Nowadays, various mode of transportation is being used in metro cities
such as Chennai, Mumbai, Delhi, etc [2]. Comparing other modes of transportations bus transportation in India
supports for the poor and the lower middle class as an easy and affordable mode of transport. The contribution of
bus transport in GDP to the nation is of about 1.2% which is 25% of contribution of all the transportation sectors in
India [1]. Hence, to use the bus transportation effectively, bus management and depot management is necessary.
Madurai is a lotus shaped city built around the Meenakshi temple with the city streets in concentric circles. Madurai
is well versed with air transport, rail transport and bus transport network but most of the people use two wheelers
and buses for transportation. The city’s bus transportation is contributed by 16 depots totally with five depots in
zone I, two depots in zone II, three depots in zone III and six depots in zone IV to spread the bus service throughout
the city. This paper, in prior concentrates only on bus transportation, though 70% of Madurai population uses bus
transport to migrate. A study of category analysis among the depot in Madurai has described in this paper.
Keywords: Bus; Category analysis; Depot; Madurai .
References: 1. Dirk D.L. Van Oudheusden et al.,(2015), “Reducing depot-related costs of large bus operators a case study in Bangkok’’ , European
Journal of Operational Research 96 (1996) pp 45-53.
2. M.A. Forbes, J.N. Holt and A.M. Watts (2016), “An exact algorithm for multiple depot bus scheduling’’, European Journal of Operational
Research 72 (1994) pp 115-124. 3. Minzhong Xiang and Shaun Hardcastle (2013) “Bus Priority Option Tests in Microsimulation with SCATS”, Journal of traffic and
163-167
transportation studies, pp 540-552. 4. OP Agarwal, (2015) “Public bus transport management systems: some international examples”, Journal of quarterly review of Regulatory
developments, pp 120-124
5. Prof.D.Srividya, Dr.R.Velkennedy, G.Sathya (2015), “Prioritization of Urban Transport system for Madurai City”, International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Issue 1, Volume 2.
6. Ugur Eliiyi, Efendi Nasibov (2012), “Minimization of fuel consumption in city bus transportation: A case study for Izmir”, Procedia-Social
and Behaviour Sciences 54 (2012) 231 – 239. 7. Makrand Wagal,Ajit Pratab Singh and Srinivas Arkatkar (2013), “Real –Time Optimal Bus for a City using a DTR Model”, Procedia-
Social and Behaviour Sciences 104 (2013)845-854.
8. Mohamed Hamdouni, Francois Soumis, Guy Desaulniers (2007), “ Parking buses in a depot with stochastic arrival times”, European Journal of Operational Research 183 (2007) 502-515.
9. Senthilkumar K., (2007) “A study on risk in traffic flow and effective safety management”, Management sciences.
10. Alagappan V.,(2008) “A study on TNSTC Madurai(DIV-II). 11. TNSTC website.
32.
Authors: Arti M. Sorte, A. N. Burile, K. V. Madurwar
Paper Title: Study of Performance of Steel and Polypropylene Fiber Reinforced Concrete
Abstract: In this paper, we studied the performance of fiber reinforced concrete (FRC) with steel and
polypropylene fibers. Here M 40 grade of concrete reinforced with different percentage of steel and polypropylene
fibers was experimentally investigated for the compressive strength and tensile strength of FRC. The percentage
variation of steel fiber is taken as 0.5%, 1.0% and 1.5% by volume of concrete for steel fiber reinforced concrete
(SFRC). The percentage variation of polypropylene fiber is taken as 0.1%, 0.2% and 0.3% by volume of concrete
for polypropylene fiber reinforced concrete (PPFRC).The practical results obtained has been studied and analyzed
by comparing it with a control sample specimen (0% fiber). The relationship of compressive strength, tensile
strength vs. percentage of fiber, has been represented graphically. Observations clearly shows the significant
improvement in 28 and 45 days compressive strength and tensile strength for M 40 grade of concrete on addition of
fibers along with enhanced properties of fiber reinforced concrete.
Keywords: Compressive Strength, Polypropylene Fibers, Reinforced Concrete, Steel Fibers, Split Tensile
Strength.
References: 1. Hamid Pesaran Behbahani, Behzad Nematollahi, Majid Farasatpour, “Steel Fiber Reinforced Concrete: A Review” Conference:
Proceedings of the International Conference on Structural Engineering Construction and Management , At Kandy, Sri Lanka, 2011. 2. Milind V. Mohod , “Performance of Steel Fiber Reinforced Concrete” , Journal of Mechanical and Civil Engineering, Vol. 12, Iss.1, PP 28-
36, 2015, DOI: 10.9790/1684-12112836.
3. Reeta, Manoj, Karandeep, Mr. Amit Singhal, “Fiber Reinforced Concrete”, Int. Journal of All Research Education and Scientific Methods (IJARESM), Volume 4, Issue 7,pp155-160, 2016.
4. Ragavendra S., Praveen Reddy, Dr. Archanaa Dongre “fiber reinforced concrete- a case studys”. 33rd national Convention of Architectural
Engineers and National Seminar on ‘Architectural Engineering Aspect for sustainable building envelopes’ ArchEn-BuildEn-2017, by Institution of Engineers India in Association with Indian Association of structural Engineers, At Institution of Engineers, Khairatabad,
Hyderabad.
5. Project synopsis on "Effect of blast furnace slag on strength of gi fiber reinforced polymer concrete”, Posted 19th February 2013 by kumar mayank. (http://itskumar-mayank.blogspot.com/)
6. Muhammad Akram Akhund, Abdullah Sannd, Uroosa Memon, Shamotra Jai Oad, “Utilization of Soft Drink Tins as Fiber Reinforcement
in concrete”, Engineering science and technology international research journal, vol.1, issu. 2, pp 47-52, 2017. 7. https://www.quora.com/What-is-fiber-reinforced-concrete.
8. Nitin Kumar, Sangeeta “A Review study on use of Steel Fiber as Reinforcement Material with Concrete”, Journal of Mechanical and Civil
Engineering, Volume 12, Issue 4, PP 95-98, 2015, DOI: 10.9790/1684-12439598. 9. A.R.Pradeep , M.I.Basava, lingana Gowda “A Case Study on Strength Properties of Partially Replaced Recycled Aggregate and Steel
Fibers to A Nominal Concrete” Journal of Mechanical and Civil Engineering,Volume 13, Issue 3, PP 52-58, 2016, DOI: 10.9790/1684-
1303075258. 10. Hamid Reza Chaboki, Mansour Ghalehnovi, Arash Karimipour, Jorgede Brito,“Experimental study on the flexural behaviour and ductility
ratio of steel fibers coarse recycled aggregate concrete beams”, Construction and Building Materials,Volume 186, Pages 400-422, 2018,
https://doi.org/10.1016/j.conbuildmat.2018.07.132. 11. F.B.Varona, F.J.Baeza, D.Bru, S.Ivorra,“Evolution of the bond strength between reinforcing steel and fiber reinforced concrete after high
temperature exposure” J. of Construction and Building Materials,Volume 176, 10 July 2018, Pages 359-370,
https://doi.org/10.1016/j.conbuildmat.2018.05.065.
12. F. B. Varona, F. J. Baeza, D.Bru, S. Ivorra, “Influence of high temperature on the mechanical properties of hybrid fiber reinforced normal
and high strength concrete”, Construction and Building Materials, Volume 159, Pages 73-82, 20 January 2018.
https://doi.org/10.1016/j.conbuildmat.2017.10.129. 13. Prof. Priti A. Patel “Improvement of Shear Strength using Triangular Shape fiber in Concrete” , NBM&CW, a civil engg magzine, Aug
2010.
14. Joshua A.McMahon, Anna C. Birely, “Service performance of steel fiber reinforced concrete (SFRC) slabs” Engineering Structures, Volume 168, Pages 58-68, 2018. https://doi.org/10.1016/j.engstruct.2018.04.067.
15. ChandraSekhar Das, Tanish Dey, Ramkrishna Dandapat, Bibhuti Bhusan Mukharjee, Jitendrakumar, “Performance evaluation of
polypropylene fiber reinforced recycled aggregate concrete”, Construction and Building Materials, Volume 189, Pages 649-659, 2018, https://doi.org/10.1016/j.conbuildmat.2018.09.036.
16. Ali Mardani Aghabaglou, Suleyman Ozen, and Muhammet Gokhan Altun, “Durability performance and dimensional stability of
polypropylene fiber reinforced concrete”, Journal of Green Building, Vol. 13, No. 2, pp. 20-41, 2018. https://doi.org/10.3992/1943-4618.13.2.20.
17. Mohammed S. Imbabi, Collette Carrigan, Sean McKenna, “Trends and developments in green cement and concrete technology”,
International Journal of Sustainable Built Environment, vol. 1, pp- 194–216, 2012, DOI: 10.1016/j.ijsbe.2013.05.001. 18. Abdul Ahad, Zishan Raza Khan, Shumank Deep Srivastava, “Application of Steel Fiber in Increasing the Strength, Life-Period and
Reducing Overall Cost of Road Construction by Minimizing the Thickness of Pavement” World Journal of Engineering and
Technology,vol 3, 240-250, 2015, http://dx.doi.org/10.4236/wjet.2015.34025. 19. Rui D. Neves and Joao C. O. Fernandes de Almeida, “Compressive behaviour of steel fiber reinforced concrete”, structural concrete, pp
1464-4177, 2005. 20. BOOK-fiber Reinforced Cementitious Composites, Second Edition By Arnon Bentur, Sidney Mindess, ch steel fibers, pp 273.
21. Sharath M. Y., Sanjith J., Manjunath H. R. “Experimental Investigation on Steel Fiber Reinforced Concrete” International Journal of
168-174
Scientific Development and Research,Volume 2, Issue 6, pp-204-210, 2017. 22. BiaoLi,LihuaXu,YuchuanShi,YinChi,QiLiu, ChangingLi , “Effects of fiber type, volume fraction and aspect ratio on the flexural and
acoustic emission behaviors of steel fiber reinforced concrete”,Construction and Building Materials, Volume 181, Pages 474-486, 2018.
https://doi.org/10.1016/j.conbuildmat.2018.06.065. 23. https://www.seminarsonly.com/Civil_Engineering/Polymer_Modified_Steel_fiber_Reinforced_Concrete.php, Published on Feb 14, 2016.
24. IS 8112:2013, 43 Grade Ordinary Portland Cement – Specification (First Revision), Bureau of Indian Standards, New Delhi, India, 1989.
25. IS 383:1970, Specification for coarse and fine aggregates from natural sources for concrete (second revision), Bureau of Indian standards, New Delhi, India, 1970.
26. IS 456-2000, Code of Practice for Plain and Reinforced Concrete, Bureau of Indian Standards, New Delhi, India, 2000.
27. IS 10262-2009, Recommended Guidelines for Concrete Mix Design, Bureau of Indian Standards, New Delhi, India, 2009.
28. IS: 516-1959, Indian standard methods of tests for strength of concrete, Bureau of Indian Standards, New Delhi, India, 1959. 29. IS 5816-1999, Method of Test for Splitting Tensile Strength of Concrete., Bureau of Indian Standards, New Delhi, India, 1999.
33.
Authors: Vishavdeep Jindal, Jashandeep Singh
Paper Title: A Chemically Customized Ester Fluid- A More Effective Liquid for Insulation
Abstract: Mineral transformer liquids are used as dielectric liquids from a long time and preferred by power
utilities worldwide because of its good physical, mechanical & dielectric properties, ease of accessibility and low
cost. But due to environmental constraints, non-biodegradability nature and less fire resistive nature of it proves to
be destructive for surroundings as well as to the manpower dealing with it. Number of alternatives were suggested
by researchers have been implemented in distribution and power transformers. In current research work,
biodegradable modified synthetic ester fluid is proposed as an alternative to mineral transformer oil because of its
electrochemical properties such as; dielectric strength, resistivity, flash and fire point, acidity and water content
which have been practically analyzed in laboratory. Analysis reveals that ester oil has astounded fire resistive
properties and moisture tolerant liquid over mineral oil.
Keywords: Oil Insulation, Synthetic Ester (SE), Mineral Oil (MO), Fire Point, Pour Point, Breakdown Voltage
(BDV), Water Content.
References: 1. Fofana, I, Wasserberg, V., Borsi, H., and Gockenbach, E., “Challenge of mixed insulating liquids for use in high-voltage
transformers. Part 2: Investigations of mixed liquids impregnated paper insulation”, IEEE Electr. Insul. Mag.18 (04) 2002, pp. 5-16. 2. Fernandez, I., Ortiz, A., Delgado, F., Renedo, C. and Perez, S., “Comparative evaluation of alternative fluids for power transformers”,
Elect. Power Syst. Res., vol. 98, 2013, pp.58-69.
3. Aggarwal, T., Jindal, V. and Singh, J., “A review of conditioning monitoring assessment of power transformers insulation”, Int. J. Adv. Res, 4 (10), 2016, pp.1664-1674.
4. Kraweic, S., “Review of recent changes to mineral insulating oil specifications” Proc. IEEE Electr. Insul. Conf., 2009, pp. 363-367.
5. Fofana, I., Wasserberg, V., Borsi, H. and Gockenbach, E., “Challenge of mixed insulating liquids for use in high voltage transformers. Part 1: Investigation of mixed liquids”, IEEE Electr. Insul. Mag., 18 (3), 2002, pp. 18–31.
6. Liu, R., Törnkvist, C., Chandramouli, V., Girlanda, O., and Pettersson, L.A.A., “Ester fluids as alternative for mineral oil: the
difference in streamer velocity and LI breakdown voltage”, Proc. IEEE Electr. Insul. and Dielectr. Pheno. Conf., 2009, pp. 543–548.
7. Eberhardt, R., Muhr, H.M., Lick, W., Wieser, B., Schwarz, R. and Pukel, G., “Partial discharge behaviour of an alternative insulating
liquid compared to mineral oil”, Proc. IEEE Int. Electr. Insul. Symp., 2010, pp. 1–4.
8. Pukel, G.J., Eberhardt, R., Muhr, H.M., Baumann, F. and Lick, W., “Large power transformers for alternative insulating fluids”, Proc. 16th Int. High Voltage Engineering Symp, 2009, pp.1–4.
9. Oommen, T.V., Claiborne, C.C. and Walsh E.J., “Introduction of a new fully biodegradable dielectric fluid”, Proc. IEEE Tech. Annu.
Textile, Fiber and Film Industry Conf., 1998, pp.3/1–3/4. 10. Oommen T.V., “Vegetable oils for liquid-filled transformers”, IEEE Electr. Insul. Mag., 18 (1), 2002, pp. 6–11.
11. Martin, R., Athanassatou, V, et al., “New experiences in service with new insulating liquids”, CIGRE publication. CIGRE WG A2-35.
Brochure No. 436. 12. Abeysundara, D.C., Weerakoon, C., Lucas, J.R., Gunatunga, K.A.I. and Obadage, K.C., “Coconut oil as an alternative to transformer oil”,
Engg. Res. Unit. Symp., 2001, pp. 1–8.
13. Borsi, H., “Dielectric behaviour of silicone and ester fluids for use in distribution transformer”, IEEE Trans. Dielectr. Electr. Insul., 26 (4), 1991, pp.755–762.
14. Kuwahara, H., Tsuruha, K., Munemura, H. and Ishii, T., “Partial discharge characteristics of silicone liquids, IEEE Trans. Dielectr. Electr.
Insul., vol. 11, 1975, pp. 86–91. 15. McShane, C.P, Gauger, G. and Luksich, J., “Fire resistant natural ester dielectric fluid and novel insulation system for its use”, In
IEEE/PES Transmission & Distribution Conference, 1999, pp. 1–5.
16. IS: 6792: 1992 Reaffirmed 2003, “Indian standard, Method of determination of Electric Strength of insulating fluids”, First revision,
second reprint February 1998, UDC 621.315.615.2:621.17.333.6, BIS 1992.
17. Mehta, D.M., Kundu, P., Chowdhury, A., Lakhiani, V.K. and Jhala, A.S., “A review on critical evaluation of natural ester vis-à-vis mineral
oil insulating liquid for use in transformers: Part-1”, IEEE Trans. Dielectr. Electr. Insul., 23 (2), 2016, pp. 873–880. 18. Martin, R., “Esters–Their Structure and Their Properties”, CPRI National Conf. on environmental friendly insulating Liquids (EFIL), 2013,
pp. 1-16.
19. Rao, U. M., Sood, Y. R. and Jarial, R. K., “Performance analysis of alternate liquid dielectrics for power transformers”, IEEE Trans. Dielectr. Electr. Insul., 23 (4), 2016, pp.2475–2483.
20. IEEE Guide for Acceptance and Maintenance of Insulating Oil in Equipment, IEEE STD. C57.106 – 2006.
21. Cooper Power Systems, Bulletin 00092 – Product Information – Envirotemp TM FR3TM Fluid – Description, 2001. 22. Rao, U. M., Sood, Y. R. and Jarial, R. K., “Oxidation stability enhancement of a blend of mineral oil and synthetic ester”, IEEE Electr.
Insul. Mag., 32 (2), 2016, pp. 43-47.
23. Fluids for Electro-technical Applications - Unused Mineral Insulating Oils for Transformers and Switchgear, IEC 60296 - Edition 4.0 - 2012-02.
24. IS: 6792: 1992 Reaffirmed 2003, “Indian standard, Method of determination of Electric Strength of insulating fluids”, First revision,
second reprint February 1998, UDC 621.315.615.2:621.17.333.6, BIS 1992. 25. IS: 6103: 1971 Reaffirmed 2001, “Indian standard, Method of test for specific resistance (resistivity) of electrical insulating liquids”, Fifth
reprint august 1996, UDC 621.315.615:621.317.332.3, BIS 1972.
26. Mehta, D.M., Kundu, P., Chowdhury, A., Lakhiani, V.K. and Jhala, A.S., “A review on critical evaluation of natural ester vis-à-vis mineral oil insulating liquid for use in transformers: Part 1”, IEEE Trans. Dielectr. Electr. Insul. 23 (2), 2016, pp. 873–880.
27. IS: 1448 [P:21]: 2012 ISO 2719:2002, “Indian standard, Methods of test for petroleum and its products, Determination of flash point- Pensky- Martens closed cup method”, Third revision, ICS 75.080, BIS 2012.
28. Moore, S. P., Wangard, W., Rapp, K. J., Woods, D. L. and Vecchio, R. M. D., “Cold Start of a 240-MVA Generator Step-Up Transformer
filled with Natural Ester Fluid”, IEEE Trans. Power Del., 2014, pp. 256- 263.
175-181
29. IS: 1448 [P:10]- 1970 Reaffirmed 2003, “Indian standard, Method of test for petroleum and its products, Cloud point and Pour point”, First revision, sixth reprint December 1998, UDC 665.6/.7:536.421.2, BIS 1971.
30. IS: 1448 [P:2] 2007 ISO 6619:1988, “Indian standard, Methods of test for petroleum and its products, Petroleum products and lubricants-
neutralization number- Potentiometric Titration Method”, Second revision, ICS 75.160.30, BIS 2007. 31. IS 13567:1992 Reaffirmed 2003, “Indian standard, Determination of water in insulating liquids and in oil- impregnated paperand
pressboard by automatic coulometric Karl Fischer titration- method of test”, UDC 621.315.615/ 621.315.64/65: 543.812, BIS 1992.
32. IS: 335: 1993 Reaffirmed 2005, “Indian standard, New Insulating Oils- specification”, Fourth revision, third reprint September 1998, UDC 621.315.615.2, BIS 1993.
33. Darwin, A., Perrier, C. and Folliot, P., “The use of natural ester fluids in transformers”, MatPost, III Europian Conf. on HV & MV
substation equipment.
34.
Authors: S. Karthik, M. Sudha
Paper Title: A Survey on Machine Learning Approaches in Gene Expression Classification in Modelling
Computational Diagnostic System for Complex Diseases
Abstract: In recent days, the survivability of people around the world has increased in a higher rate. The notable
reason is the impact of the evolution of new technologies in medical systems that are invented to provide and
improve healthcare for peoples. But still, there are some diseases, which may be identified also can be controlled.
But there isn’t any permanent solution for them such as cancer, psychiatric disorders etc. For those diseases,
medical practitioners finds some way to discover medicine by analyzing the patient’s genetic information such as
DNA. Microarray technology is helpful in capturing biological genetic information to computer data.
Computational techniques can be applied on those large set of genetic data of every individuals with or without
disease, so that the genes that are responsible for the disease occurrence can be pointed out. Differentially Expressed
Genes (DEG) are identified using many techniques. Machine Learning (ML) algorithms plays a significant role in
identifying the distinction between normal genes and unhealthy genes, extracted from human genome. This paper is
focusing on providing an in depth overview on different techniques on ML that are used to analyze and classifies
the gene expression profiles of various diseases are discussed
Keywords: Gene Expression, Healthcare Systems, Machine Learning, Microarray data, Pattern Recognition..
References: 1. Alshamlan, H.M., Badr, G.H. and Alohali, Y.A., 2015. Genetic Bee Colony (GBC) algorithm: A new gene selection method for microarray
cancer classification. Computational biology and chemistry, 56, pp.49-60.
2. Alzubi, R., Ramzan, N. and Alzoubi, H., 2017, August. Hybrid feature selection method for autism spectrum disorder SNPs. In Computational Intelligence in Bioinformatics and Computational Biology (CIBCB), 2017 IEEE Conference on(pp. 1-7). IEEE.
3. Ansel, A., Rosenzweig, J.P., Zisman, P.D., Melamed, M. and Gesundheit, B., 2017. Variation in gene expression in autism spectrum
disorders: an extensive review of transcriptomic studies. Frontiers in neuroscience, 10, p.601. 4. Aragona, M. and Blanpain, C., 2017. Gene therapy: Transgenic stem cells replace skin. Nature, 551(7680), p.306.
5. Aruna, d. And nandakishore, d., 2013. Hybrid ensemble gene selection algorithm for identifying biomarkers from breast cancer gene expression profiles.
6. Begum, S., Chakraborty, D. and Sarkar, R., 2015, December. Cancer classification from gene expression based microarray data using SVM
ensemble. In Condition Assessment Techniques in Electrical Systems (CATCON), 2015 International Conference on (pp. 13-16). IEEE. 7. Bennet, J., Ganaprakasam, C. and Kumar, N., 2015. A Hybrid Approach for Gene Selection and Classification using Support Vector
Machine. International Arab Journal of Information Technology (IAJIT), 12.
8. Bharathi, A. and Natarajan, A.M., 2010, December. Microarray gene expression cancer diagnosis using Machine Learning algorithms. In Signal and Image Processing (ICSIP), 2010 International Conference on (pp. 275-280). IEEE.
9. Bolón-Canedo, V., Sánchez-Marono, N., Alonso-Betanzos, A., Benítez, J.M. and Herrera, F., 2014. A review of microarray datasets and
applied feature selection methods. Information Sciences, 282, pp.111-135. 10. Bouazza, S.H., Hamdi, N., Zeroual, A. and Auhmani, K., 2015, March. Gene-expression-based cancer classification through feature
selection with KNN and SVM classifiers. In Intelligent Systems and Computer Vision (ISCV), 2015 (pp. 1-6). IEEE.
11. Brazma, A., Parkinson, H., Sarkans, U., Shojatalab, M., Vilo, J., Abeygunawardena, N., Holloway, E., Kapushesky, M., Kemmeren, P., Lara, G.G. and Oezcimen, A., 2003. ArrayExpress—a public repository for microarray gene expression data at the EBI. Nucleic acids
research, 31(1), pp.68-71.
12. Chen, H., Zhao, H., Shen, J., Zhou, R. and Zhou, Q., 2015, June. Supervised machine learning model for high dimensional gene data in colon cancer detection. In Big Data (BigData Congress), 2015 IEEE International Congress on(pp. 134-141). IEEE.
13. Chuang, L.C. and Kuo, P.H., 2017. Building a genetic risk model for bipolar disorder from genome-wide association data with random forest
algorithm. Scientific Reports, 7, p.39943. 14. Cross, A.J., Lampe, J.W., Rock, C.L. and Boushey, C.J., 2017. Biomarkers and their use in nutrition intervention. In Nutrition in the
Prevention and Treatment of Disease (Fourth Edition)(pp. 217-234).
15. Cutler, A., Cutler, D.R. and Stevens, J.R., 2012. Random forests. In Ensemble machine learning (pp. 157-175). Springer, Boston, MA.
16. Dashtban, M., Balafar, M. and Suravajhala, P., 2018. Gene selection for tumor classification using a novel bio-inspired multi-objective
approach. Genomics, 110(1), pp.10-17.
17. Dayan, P., Sahani, M. and Deback, G., 1999. Unsupervised learning. The MIT encyclopedia of the cognitive sciences. 18. de Freitas, R.C.C., Bortolin, R.H., Lopes, M.B., Hirata, M.H., Hirata, R.D.C., Silbiger, V.N. and Luchessi, A.D., 2016. Integrated analysis of
miRNA and mRNA gene expression microarrays: Influence on platelet reactivity, clopidogrel response and drug-induced
toxicity. Gene, 593(1), pp.172-178. 19. Dipnall, J.F., Pasco, J.A., Berk, M., Williams, L.J., Dodd, S., Jacka, F.N. and Meyer, D., 2016. Fusing data mining, machine learning and
traditional statistics to detect biomarkers associated with depression. PloS one, 11(2), p.e0148195.
20. Dong, K., Zhang, F., Zhu, W., Wang, Z. and Wang, G., 2014. Partial least squares based gene expression analysis in posttraumatic stress disorder. Eur Rev Med Pharmacol Sci, 18(16), pp.2306-2310.
21. Edgar, R., Domrachev, M. and Lash, A.E., 2002. Gene Expression Omnibus: NCBI gene expression and hybridization array data
repository. Nucleic acids research, 30(1), pp.207-210. 22. Elyasigomari, V., Mirjafari, M.S., Screen, H.R. and Shaheed, M.H., 2015. Cancer classification using a novel gene selection approach by
means of shuffling based on data clustering with optimization. Applied Soft Computing, 35, pp.43-51.
23. Gentleman, R., Carey, V., Huber, W., Irizarry, R. and Dudoit, S. eds., 2006. Bioinformatics and computational biology solutions using R and Bioconductor. Springer Science & Business Media.
24. Gour, D.K., Jain, Y.K. and Pandey, G.S., 2011. The Classification of Cancer Gene using Hybrid Method of Machine Learning. International
Journal of Advanced Research in Computer Science, 2(2).
25. Gunavathi, C. and Premalatha, K., 2015. Cuckoo search optimisation for feature selection in cancer classification: a new
approach. International journal of data mining and bioinformatics, 13(3), pp.248-265.
26. Hameed, S.S., Hassan, R. and Muhammad, F.F., 2017. Selection and classification of gene expression in autism disorder: Use of a combination of statistical filters and a GBPSO-SVM algorithm. PloS one, 12(11), p.e0187371.
182-191
27. Hartigan, J.A. and Wong, M.A., 1979. Algorithm AS 136: A k-means clustering algorithm. Journal of the Royal Statistical Society. Series C (Applied Statistics), 28(1), pp.100-108.
28. Hijazi, H. and Chan, C., 2013. A classification framework applied to cancer gene expression profiles. Journal of healthcare engineering, 4(2),
pp.255-283. 29. Hinton, G.E. and Salakhutdinov, R.R., 2006. Reducing the dimensionality of data with neural networks. science, 313(5786), pp.504-507.
30. Hira, Z.M. and Gillies, D.F., 2015. A review of feature selection and feature extraction methods applied on microarray data. Advances in
bioinformatics, 2015. 31. Hu, H.P., Niu, Z.J., Bai, Y.P. and Tan, X.H., 2015. Cancer classification based on gene expression using neural networks. Genetics and
Molecular Research, 14(4), pp.17605-17611.
32. Huynh, P.H., Nguyen, V.H. and Do, T.N., 2018. A Coupling Support Vector Machines with the Feature Learning of Deep Convolutional Neural Networks for Classifying Microarray Gene Expression Data. In Modern Approaches for Intelligent Information and Database
Systems (pp. 233-243). Springer, Cham.
33. Jain, A.K., Mao, J. and Mohiuddin, K.M., 1996. Artificial neural networks: A tutorial. Computer, 29(3), pp.31-44. 34. Kalaiselvi, N. and Inbarani, H.H., 2013. Fuzzy soft set based classification for gene expression data. arXiv preprint arXiv:1301.1502.
35. Kar, S., Sharma, K.D. and Maitra, M., 2015. Gene selection from microarray gene expression data for classification of cancer subgroups
employing PSO and adaptive K-nearest neighborhood technique. Expert Systems with Applications, 42(1), pp.612-627. 36. Karabulut, E.M. and Ibrikci, T., 2017. Discriminative deep belief networks for microarray based cancer classification. Biomedical
Research, 28(3).
37. Karthik, S., Perumal, R.S. and Mouli, P.C., 2018. Breast Cancer Classification Using Deep Neural Networks. In Knowledge Computing and Its Applications (pp. 227-241). Springer, Singapore.
38. Kelleher, J.D., Mac Namee, B. and D'Arcy, A., 2015. Fundamentals of machine learning for predictive data analytics: algorithms, worked
examples, and case studies. MIT Press. 39. King, B.F., 2018. Artificial Intelligence and Radiology: What Will the Future Hold?. Journal of the American College of Radiology.
40. Kotsiantis, S.B., Zaharakis, I. and Pintelas, P., 2007. Supervised machine learning: A review of classification techniques. Emerging artificial
intelligence applications in computer engineering, 160, pp.3-24.
41. KR, S., 2011. Microarray data classification using support vector machine. International Journal of Biometrics and Bioinformatics
(IJBB), 5(1), p.10.
42. Kumar, G. and Bhatia, P.K., 2014, February. A detailed review of feature extraction in image processing systems. In Advanced Computing & Communication Technologies (ACCT), 2014 Fourth International Conference on (pp. 5-12). IEEE.
43. Leska, V., Bei, E.S., Petrakis, E. and Zervakis, M., 2016. Gene Expression Data Analysis for Classification of Bipolar Disorders. In XIV
Mediterranean Conference on Medical and Biological Engineering and Computing 2016 (pp. 500-506). Springer, Cham. 44. Littman, M.L., 2015. Reinforcement learning improves behaviour from evaluative feedback. Nature, 521(7553), p.445.
45. Liu, Y.X., Zhang, N.N., He, Y. and Lun, L.J., 2015. Prediction of core cancer genes using a hybrid of feature selection and machine learning
methods. Genetics and Molecular Research, 14(3), pp.8871-8882. 46. Loganathan, C. and Girija, K.V., Investigations on Hybrid Learning in Anfis in Microarray Gene Expression Classification.
47. Logotheti, M., Pilalis, E., Venizelos, N., Kolisis, F. and Chatziioannou, A., 2016. Studying Microarray Gene Expression Data of
Schizophrenic Patients for Derivation of a Diagnostic Signature through the Aid of Machine Learning. Biom Biostat Int J, 4(5), p.00106. 48. Mehridehnavi A, Ziaei L. Minimal gene selection for classification and diagnosis prediction based on gene expression profile. Advanced
Biomedical Research. 2013;2:26. doi:10.4103/2277-9175.107999. 49. Montgomery, D.C., Peck, E.A. and Vining, G.G., 2012. Introduction to linear regression analysis (Vol. 821). John Wiley & Sons.
50. Motieghader, H., Najafi, A., Sadeghi, B. and Masoudi-Nejad, A., 2017. A hybrid gene selection algorithm for microarray cancer
classification using genetic algorithm and learning automata. Informatics in Medicine Unlocked, 9, pp.246-254. 51. Nath, A., Kumari, P. and Chaube, R., 2018. Prediction of Human Drug Targets and Their Interactions Using Machine Learning Methods:
Current and Future Perspectives. In Computational Drug Discovery and Design (pp. 21-30). Humana Press, New York, NY.
52. Nie, Y., Chen, V., Shannon, C.P., Andiappan, A.K., Lee, B., Rotzschke, O., Castaldi, P.J., Hersh, C.P., Fishbane, N., Ng, R.T. and McManus, B., 2017. Network-based analysis reveals novel gene signatures in peripheral blood of patients with chronic obstructive
pulmonary disease. Respiratory research, 18(1), p.72.
53. Nilashi, M., bin Ibrahim, O., Ithnin, N. and Sarmin, N.H., 2015. A multi-criteria collaborative filtering recommender system for the tourism domain using Expectation Maximization (EM) and PCA–ANFIS. Electronic Commerce Research and Applications, 14(6), pp.542-562.
54. Oh, D.H., Kim, I.B., Kim, S.H. and Ahn, D.H., 2017. Predicting Autism Spectrum Disorder Using Blood-based Gene Expression Signatures
and Machine Learning. Clinical Psychopharmacology and Neuroscience, 15(1), p.47. 55. Piao, Y., Piao, M., Park, K. and Ryu, K.H., 2012. An ensemble correlation-based gene selection algorithm for cancer classification with gene
expression data. Bioinformatics, 28(24), pp.3306-3315.
56. Quinlan, J.R., 1986. Induction of decision trees. Machine learning, 1(1), pp.81-106. 57. Rajeswari, P. and Reena, G.S., 2011. Human liver cancer classification using microarray gene expression data. International Journal of
Computer Applications, 34(6), pp.25-37.
58. Ram, M., Najafi, A. and Shakeri, M.T., 2017. Classification and Biomarker Genes Selection for Cancer Gene Expression Data Using Random Forest. Iranian Journal of Pathology, 12(4), pp.339-347.
59. Reich, M., Liefeld, T., Gould, J., Lerner, J., Tamayo, P. and Mesirov, J.P., 2006. GenePattern 2.0. Nature genetics, 38(5), p.500.
60. Ruiz, R., Riquelme, J.C. and Aguilar-Ruiz, J.S., 2006. Incremental wrapper-based gene selection from microarray data for cancer classification. Pattern Recognition, 39(12), pp.2383-2392.
61. Salem, H., Attiya, G. and El-Fishawy, N., 2017. Classification of human cancer diseases by gene expression profiles. Applied Soft
Computing, 50, pp.124-134.
62. Saylan, C.C. and Yılancıoğlu, K., 2016. Classification of Schizophrenia and Bipolar Disorder by Using Machine Learning Algorithms. The
Journal of Neurobehavioral Sciences, 3(3), pp.92-95.
63. Simon, R., Lam, A., Li, M.C., Ngan, M., Menenzes, S. and Zhao, Y., 2007. Analysis of gene expression data using BRB-array tools. Cancer informatics, 3, p.117693510700300022.
64. Smoot, M.E., Ono, K., Ruscheinski, J., Wang, P.L. and Ideker, T., 2010. Cytoscape 2.8: new features for data integration and network
visualization. Bioinformatics, 27(3), pp.431-432. 65. Soe, H.J., Yong, Y.K., Al-Obaidi, M.M.J., Raju, C.S., Gudimella, R., Manikam, R. and Sekaran, S.D., 2018. Identifying protein biomarkers
in predicting disease severity of dengue virus infection using immune-related protein microarray. Medicine, 97(5).
66. Song, N., Wang, K., Xu, M., Xie, X., Chen, G. and Wang, Y., 2015. Design and analysis of ensemble classifier for gene expression data of cancer. Journal of Clinical & Medical Genomics, pp.1-7.
67. Tajari, H. and Beigy, H., 2012. Gene Expression Based Classification using Iterative Transductive Support Vector Machine. International
Journal of Machine Learning and Computing, 2(1), p.76. 68. Tarek, S., Elwahab, R.A. and Shoman, M., 2017. Gene expression based cancer classification. Egyptian Informatics Journal, 18(3), pp.151-
159.
69. Tomasetti, C., Li, L. and Vogelstein, B., 2017. Stem cell divisions, somatic mutations, cancer etiology, and cancer prevention. Science, 355(6331), pp.1330-1334.
70. Vanitha, C.D.A., Devaraj, D. and Venkatesulu, M., 2015. Gene expression data classification using support vector machine and mutual
information-based gene selection. procedia computer science, 47, pp.13-21. 71. Van't Veer, L.J. and Bernards, R., 2008. Enabling personalized cancer medicine through analysis of gene-expression
patterns. Nature, 452(7187), p.564.
72. Vapnik, V., 1998. Statistical learning theory. 1998. Wiley, New York 73. Vergara, J.R. and Estévez, P.A., 2014. A review of feature selection methods based on mutual information. Neural computing and
applications, 24(1), pp.175-186. 74. Ware, B.R., McVay, M., Sunada, W.Y. and Khetani, S.R., 2017. Exploring chronic drug effects on microengineered human liver cultures
using global gene expression profiling. Toxicological Sciences, 157(2), pp.387-398.
75. Weinstein, J.N., Collisson, E.A., Mills, G.B., Shaw, K.R.M., Ozenberger, B.A., Ellrott, K., Shmulevich, I., Sander, C., Stuart, J.M. and Cancer Genome Atlas Research Network, 2013. The cancer genome atlas pan-cancer analysis project. Nature genetics, 45(10), p.1113.
76. Yilancioglu, K. and Konuk, M., 2015. Classification of Schizophrenia Patients by Using Genomic Data: A Data Mining Approach. The
Journal of Neurobehavioral Sciences, 2(3), pp.102-104. 77. Zhang, H., Xie, Z., Yang, Y., Zhao, Y., Zhang, B. and Fang, J., 2017. The correlation-base-selection algorithm for diagnostic schizophrenia
based on blood-based gene expression signatures. BioMed research international, 2017.
78. Zhang, L., Yang, T., Yi, J., Jin, R. and Zhou, Z.H., 2016, February. Stochastic Optimization for Kernel PCA. In AAAI(pp. 2315-2322). 79. Zhao, G. and Wu, Y., 2016. Feature subset selection for cancer classification using weight local modularity. Scientific reports, 6, p.34759.
80. Zhong, W., 2014. Feature selection for cancer classification using microarray gene expression data (Doctoral dissertation, University of
Calgary). 81. Zhou, X. and Belkin, M., 2014. Semi-supervised learning. In Academic Press Library in Signal Processing (Vol. 1, pp. 1239-1269). Elsevier
35.
Authors: Krishna Moorthy V*, Uma, Jaanaki S.M, N. M. Hariharan, S. Kasthurirengan
Paper Title: Simulation and Experimental Studies of Twin Thermoacoustic Prime Mover
Abstract: Thermo acoustic prime mover (TAPM) converts thermal energy to acoustic energy and it is one of the
alternative method to replace traditional compressor which will drive any cryocooler . The advantages of TAPM are
the absence of moving components and they can be driven by solar energy, waste heat etc. In order to develop
TAPMs their design and fabrication should be guided by numerical modeling and this may be done by several
methods such as solving the energy equation, enthalpy flow model CFD, Delta EC etc. We studied the TAPMs
with CFD technique, and Delta EC methods since it provides a better insight into the velocity and temperature
profiles. In this article we discuss the influence of working gas (helium, argon and its mixtures). The theoretical
results and experimental results are compared and they are in reasonably good agreement
Keywords: CFD, Thermoacoustic, Delta EC,
References: 1. Thermoacoustic engines, J Acoust Soc Am 84(4) (1988) 1145-1180. 2. Krishna Moorthy V, Uma Praveen, Jaanaki S.M, N.M.Hariharan, S.Kasthurirengan “Simulation of Standing wave Thermoacoustic prime
mover using DeltaEC”, international journal of research and analytical reviews, volume 5, Issue 3, July– sept 2018, page no: 522-526
3. Kasthurirengan, S; Behera, Upendra; Gangradey, Ranjana; Udgata, Swarup; Krishnamoorthy, V. “Studies of cryocooler based cryosorption pump with activated carbon panels operating at 11K” Journal of Physics: Conference Series vol. 390 issue 1 November 05, 2012. p.
012068-012068.
4. X.H. Hao, Y.L. Ju, Upendra Behera, S. Kasthurirengan. "Influence of working fluid on the performance of a standing-wave thermoacoustic prime mover", Cryogenics, 2011
192-194
36.
Authors: K. S. Meena, M. Rajeswari, Krishnadas J, Soumya Varma, Deepa Devassy
Paper Title: Emerging Trends in Computing: Reliability Design for A VANET with WUGFT Subject To Time and
Cost Constraints
Abstract: Reliable and quick communication is of prime importance in VANETs. Introducing clustering technique
will ensure a robust data exchange in VANET. The emphasis on this work is to select the reliable cluster that make
an appreciable communication in VANET with in a fixed time and cost. Hence this work considers the Cluster Head
(CH) selection using Bully algorithm and Lamport time stamp. Furthermore, the traffic in the network is modelled
using Weighted Universal Generating Function Technique (WUGFT). This will diminish the computation burden in
reliability calculation. Reliability of VANET is defined as the probability of a successful delivery of data from
source to destination. Reliability ratio has been considered to identify the efficient reliable cluster. A Simulation is
carried out in NS – 2 with respect to delay, packet delivery ratio, and throughput and packet drop ratio. Simulation
results indicate that our proposed method produces optimal results on the defined parameters.
Keywords: VANET, RSU, WUGFT, Bully Algorithm, Reliability, Clustering
References: 1. Ahammed, F, Taheri, J & Zomaya, A 2011, ‘LICA: robust localization using cluster analysis to improve GPS coordinates’, In: First ACM
International Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, pp. 39–46.
2. Bali, RS, Kumar, N, & Rodrigues, JPC 2014, ‘Clustering in vehicular ad hoc networks: Taxonomy, challenges and solutions’, Vehicular Communications, vol. 1, no. 3, pp. 134-152.
3. Fan, W, Shi,Y, Chen, S & Zou, L 2011, ‘A mobility metric based dynamic clustering algorithm (DCA) for VANETs’, In: International
Conference on Communication Technology and Application, Beijing, pp. 752–756. 4. Jin-Jia Chang, Yi-HuaLi, WanjiunLiao& Ing-chauchang, 2012, ‘Intersection based routing for urban vehicular communications with traffic
light considerations’, IEEE wireless Communications, vol. 19, no. 1, pp. 82-88.
5. Paramodh Kavisha Dharmawardena and Zhanjie Wang,“Cluster head selection based routing protocol for VANET bully algorithm and Lamport timestamp’,International Journal of Computer Theory and Engineering, Vol. 9, No. 3, June 2017, pp.219-24.
6. Meena KS Vasanthi T’ 2015, ‘ Reliability Design for a MANET with Cluster Head Gateway Routing Protocol’, Communication in
Statistics-Theory and Methods 2015;45(13):3094-3918. DOI: 10.1080/03610926.2014.911908. 7. Meena, KS & Vasanthi, T 2015, 'The Performance Assessment of a MANET using WUGF', Research Journal of Applied Sciences,
Engineering and Technology, vol. 10, no.8 , pp. 942-950.
8. Meena KS Vasanthi T. Reliability Analysis of Mobile Adhoc Networks using Universal Generating Function Quality and Reliability Engineering International 2016; 32(1):111-122.
9. Meena KS Vasanthi T Uma Maheswari P Rajeswari M Reliability Analysis of MANET with RCFP: Reliable Cluster Forming Protocol.
International Journal of Applied Engineering Research 2016; 11(1): 440-447. 10. Meena KS Bhargava EN Vasanthi T. Reliable Cluster Forming Protocol in VANET.World Journal of Engineering research and
Technology 2017; 3(3):390-321. DOI: 10.1080/03610926.2014.911908.
11. Rajeswari M Uma Maheswari Assessing the Reliability of Adhoc Network using UGF: Probabilistic approach. Asian Journal of Information Technology 2016; 15(3):563-566.
12. Rajeswari M Siva Mani C Meena KS. A noval approach to the performability of VANET: VBRCP with UGFT. journal of Web Engineering Technology 2018 Accepted Manuscript.
195-200
13. Santos, RA, Edwards, RM, & Seed, NL 2003,‘Inter vehicular data exchange between fast moving road raffic using an ad-hoc clusterbased location routing algorithm and 802.11b direct sequence spread spectrum radio’, In: Post Graduate Networking Conference.
14. Tian, D, Wang, Y, Lu, G, Yu,G 2010, ‘A VANETs routing algorithm based on Euclidean distance clustering’, In: 2nd IEEE International
Conference on Future Computer and Communication, Wuhan, pp.V1183–V1-187. 15. Uma Maheswari P Rajeswari M Meena KS Vasanthi T. Reliability calculation of VANET with RSU using UGFT. International Journal of
Advance Foundation and Research in Computer 2015; 2(12):7-17.
16. Zhengming li, Congyiliu&Chunxiaochigan 2013, ‘On Secure VANET Based Ad Dissemination with Pragmatic Cost and Effect Control’, IEEE transactions on intelligent transportation systems.
17. Ziahmoud Hashem Eiza& Qiang Ni 2013, ‘An Evolving Graph-Based Reliable Routing Scheme for VANETs’, IEEE Transactions on
Vehicular Technology, vol. 62, no. 5, pp. 1493-1504.
37.
Authors: Burhan Aslam Arain*, Muhammad Farrukh Shaikh, Bharat Lal Harijan, Tayab Din Memon, Imtiaz
Hussain Kalwar
Paper Title: Design of PID Controller Based on PSO Algorithm and Its FPGA Synthesization
Abstract: A Proportional-Integral-Derivative (PID) controller make its appearance in various control mechanism
due to its adaptively, applicability and simple structure. The tuning for parameters KP, KD and KI selection for PID
is a tedious task. A Particle-Swarm-Optimization (PSO) algorithm is an evolutionary method that simulates the
particles to provide best solutions in a given search-space based on fitness value. It provides another design of
optimization for PID controller that provides better gain parameters, fast convergence and quick computation, in
this paper, an efficient designed PSO based PID controller is then synthesized with the help of Xilinx SYSGEN. To
evaluate the effectiveness and usefulness of PSO the DC motor based system response is figured and compared it
with conventional method.
Keywords: PSO algorithm, PID controller, FPGA synthetization, PID optimization, PSO-PID controller
References: 1. G. Rajeshkanna, "Modern Speed Control of Separately Excited Dc Motor by Boost Converter Fed Field Control Method," In International
Conference on Computer Communication and Informatics (ICCCI -2013), Coimbatore, India, 2013.
2. S. Vijay and V.K. Garge, "A Comparative Study On Speed Control Of D.C. Motor Using Intelligence Techniques," International Journal Of
Electronic And Electrical Engineering, Vol. Volume 7, No. Number 4, Pp. 431-436, 2014. 3. T. Yucelen, O. Kaymakci, S. Kurtulan, "Self-Tuning PID Controller Using Ziegler-Nichols Method For Programmable Logic Controllers,"
In IFAC Proceeding Volumes, 2006.
4. N. Kundariya And J. Ohri, "Design Of Intelligent PID Controller Using Particle Swarm," International Journal Of Scientific & Engineering Research, Vol. 4, No. 7, July 2013.
5. S. Banerjee and A. Sinha, "Performance Analysis of Different DSP Algorithms on Advanced Microcontroller and FPGA," In IEEE
International Conference, ACTEA, 2009.
6. S. K. Guman, V. K. Giri, "Speed Control Of Dc Motor Using Optimization Techniques Based PID Controller," In 2nd IEEE International Conference On Engineering And Technology (ICETECH), Coimbatore India, March 2016.
7. A. H. Al-Mter and S. Lu, "A Particle Swarm Optimization Algorithm Based On Uniform Design," International Journal of Data Mining &
Knowledge Management Process (IJDKP), Vol. 6, No. 2, March 2016. 8. Geramipour, Arezou, M. Khazaei, A. Marjaninejad, and M. Khazaei., "Design Of FPGA-Based Digital PID Controller Using Xilinx
SYSGEN For Regulating Blood Glucose Level Of Type-I Diabetic Patients," International Journal Of Mechatronics, Electrical And
Computer Technology, Vol. 3, No. 7, Pp. 56-69, April 2013. 9. B. L. Harijan, M. F. Shaikh, B. A. Arain, T. D. Memon And I. H. Kalwar, "FPGA Based Synthesize Of PSO Algorithm And Its Area-
Performance Analysis," International Journal Of Advanced Computer Science And Applications (IJACSA), Vol. 9, No. 6, 2018.
10. J. Ciganek, M. Kocur And S. Kozak, "Hardware Realization Of Advanced Controller Design Methods Using FPGA," IFAC-Papers Online, Volume, Vol. 49, No. 5, Pp. 163-168, 2016.
11. R. Eberhart and J. Kennedy, "Particle Swarm Optimization," Proceedings of the IEEE Int. Conf. on Neural Networks, Vol. 4, P. 1942–1948,
1995. 12. H. Tim, "Fitness Estimation and the Particle Swarm Optimization Algorithm," In IEEE Congress on Evolutionary Computation, 2007.
13. V. Gupta, K. Khare And R. P. Sigh, “Efficient FPGA Implementation Of 2nd Order Digital
Controllers Using Matlab/Simulink”, ARPN Journal of Engineering And Applied Sciences, Vol. 6, No. 8, August
2011
14. X. Hu, "Http://Www.Swarmintelligence.Org.
15. B. Jena and S. Kumar, “Tuning Of PID Controller by Bioinspired Techniques”, Thesis, Department of ECE NIT, Rourkela, 2011
201-207
38.
Authors: G Ramprabu, T Saravanan, G Saritha
Paper Title: Wireless Audio Signal Communication using Li-Fi Technology
Abstract: As a next generation signal processing method, Visible Light Communication (VLC) is developing for
low distance signal processing applications. Two archetype wireless audio data processing techniques are execute
and describe using VLC. For stream and process data, software design is urbanized and it is linked with a hardware
element, by encouraging free-space VLC canal, over a Universal Serial Bus (USB) to serial interface. An especially
appealing element of our framework is that it utilizes generally accessible, minimal effort elements by empowering
its execution in ordinary purposes. The scheme incorporates both transmission and reception section. The
transmission section comprises of voice playback with a system contribution from which the voice is transmitted by
means of lift transmission and the voice gets got in a lift reception and opened up in audio amplifier.
Keywords: Visible Light Communication, LED, LCD, Wi-Fi and Li-Fi..
References: 1. Ramprabu G, Saranya J & Swathi R, (2017) “Stereo Audio Streaming using Li-Fi Technology”, International Journal of Computer
Application, Vol.7(2), pp.44-48.
2. Kulkarani Shivaji, Amogh Darekar Pavan Joshi Amogh, (2016) “A Survey on Li-Fi Technology”, IEEE International Conference on
WiSPNET. 3. Saini Sunita, Sharma Yogesh Kumar, (2016) “Li-Fi the most recent innovation in Wireless Communication”, International Journal of
208-210
Advanced Research in Computer Science and Software Engineering, Vol.6(2), pp. 347-351. 4. Karthika R, Balakrishnan S, (2015) “Wireless Communication using Li-Fi Technology”, SSRG International Journal of Electronics and
Communication Engineering, Vol.2(3), pp.32-40.
5. Sarkar Anurag, Agarwal Shalabh, Nath Asoke, (2015) “Li-Fi Technology: Data Transmission through Visible Light”, International Journal of Advance Research in Computer Science and Management Studies, Vol.3 (6), pp. 1-10.
6. Singh Jitender, Vikash, (2014) “A New Era in Wireless Technology using light fidelity”, International Journal of Recent Development in
Engineering and Technology, Vol.2 (6), pp-46-49.
39.
Authors: Baili Rachida, Mili Mustafa, Gourja Bouchra, Tridane Malika
Paper Title: A Study of the Impact of Scrap on Ground Water: The Case of Scrap Essaada in Meknes–Morocco
Abstract: The purpose of this research is to investigate a subject that is little approached in environmental circles
in Morocco. It concerns the domain of scrap considered as an informal sector of important economic and industrial
activities. Scrap yards which are generally poorly fitted out and populated spaces are scenes for activities that may
cause risks, often ignored, to the natural environment as well as the human health. Indeed, waste stemming from
activities of the scrap may present harmful effects on grounds, on groundwater, and on flora and fauna. This study is
concerned with the impact of the activities of the Essaâda scrap of Meknes on the groundwater. This site constitutes
a representative sample of scrap yards in Morocco for they all have (more or less) the same characteristics. To
conduct this research, we collected water samples of subterranean waters of wells situated inside and outside of the
scrap yard in December, March and May. The collected samples are studied by determining the existence of the
compounds of hydrocarbons. Hence the need of the implementation of a device of environmental management. The
products used in these environments are hydrocarbons: this includes detergents, antifreeze, liquids for clutches and
brakes, (lubricants) engine oils, greases, polyester putties, diluents cellulosic. The majority of these junkyards are
poorly designed and are part of the informal sector. However, work there remains generally precarious in very bad
sanitary and safety conditions beyond any control of the public authorities: inhuman work and hygiene conditions
along with negative externalities are observed in this sense. These externalities, particularly, those related to the
landscape, public health and the air should be a concern of policy makers to outsource them or limit them
(DJEMACI, 2013). And yet this scrap is neglected: no study, no monitoring and no reaction from the Government
departments concerned. This research aims at studying the impact of the activities of scrap on the environment and
on human health. . (This is how the questions call out to us.)
Keywords: Scrap – Hydrogeology- Hydrocarbons- Water
References: 1. L.C Briand, J. Daly, and J, Wüst., A unified framework for coupling measurement in object oriented systems, IEEE Transactions on
Software Engineering, 25, 1, January 1999, pp. 91-121.
2. J. I .Maletic, M.L, Collard, and A, Marcus, Source Code Files as Structured Documents, in Proceedings 10th IEEE International Workshop
on Program Comprehension (IWPC'02), Paris, France, June 27-29 2002, pp. 289-292.
3. A, Dupot, A, Hydrocarbure urbaine (Paris : EYROLLES, 1986).
4. S. Bouchonnet, La spectrométrie de masse en couplage avec la chromatographie en phase gazeuse, (Paris : TEC& DOC, 2009).
5. C.Bocard, marées noires et sols pollués par des hydrocarbures enjeux environnementaux et traitement des pollutions, (Paris, France:
technip, 2006).
6. J.A, Hertig, J.-A, Etudes d'impact sur l'environnement (éd. 2ème, Vol. 23), (Lausane: Presse polytechnique universitaire romandes, 2006).
7. B. Lemiere, J.Seguin, C.Le Guern, D. Guyonnet, D.Barnger, C. Le Guern, D. Guyonnet, P. Baranger, & A, Saada, Guide sur le
comportement des polluants dans les sols et les nappes, (BRGM, Éd, Orleans Cedex, 2001), in ( http://infoterre.brgm.fr/rapports/RP-50662-FR.pdf), Consulté le 03/02/2015.
8. M.Musy, Une ville verte : Les rôles du végétal en ville, (Amazon France: Quae, 2014).
9. C.NOWAK, & S.Van Der Ham, Rapport d'expertise: Contamination des eaux souterraines par des hydrocarbures à proximité du site
SMCA de PARAY VIEILLE POSTE, (Paray Vieille Poste Essone: Brgm, 2010).
10. WIKI.AUREA, Les hydrocarbures, (in wiki.aurea: https://wiki.aurea.eu/index.php/Les_hydrocarbures, 2006). Consulté le 20 Octobre 2016,
211-214
40.
Authors: Maruthachalam D., Sugunadevi M., Sowmiya A. B., Sushmithaa P.
Paper Title: Investigation of Corrosion Damage and Repair System to Strengthen the Critical Infrastructure
Abstract: This project provides a detailed study on the repair and strengthening of beams made up of concrete by
Carbon Fiber Reinforced Polymer [CFRP] sheets. Mostly, structures fail due to the steel corrosion in the concrete.
Corrosion remains primarily owing to the chloride ion intrusion in aggressive environment. The defected concrete
will affect the strength of the structures. They can be treated with CFRP sheets so that the strength of the structure
could be improved to withstand the design loads. The defects of the structures include - spalling of concrete,
cracking, honey- combing etc., resulting in the reduction of strength. To strengthen the defected structure, we have
implemented an idea of wrapping the corroded concrete with CFRP sheets. Reinforced concrete prisms will be
casted and they will be grouped under four categories. First category of specimens will be kept as control specimens
and another two groups of concrete specimen will be subjected to accelerated corrosion initiation test. The range of
corrosion will be monitored through Half Cell Potential Mapping, after the crack formation on the surface of the
specimens. Third group of prisms will be treated with CFRP sheets in one, two and three layers of the sheets. The
last set of prisms will be treated with the CFRP sheets in one, two and three layers of the sheets without giving any
chloride intrusion. Finally, the comparative study will be made on the strengths of all the three category specimens.
We have selected M30 concrete grade and OPC53 grade of cement. All values are based upon IS 456:2000 and IS
10262:2009.
Keywords: CFRP sheets, Chloride intrusion, Corrosion, Repair, Strengthening, Half Cell Potential Mapping
215-220
References: 1. Kasimzade A. A. and Tuhta S., Analytical, Numerical and Experimental Examination of Reinforced Composites Beams Covered with
Carbon Fiber Reinforced Plastic, Journal of Theoretical and Applied Mechanics, Sofia, 42(1), 2012, 55–70.
2. ACI Committee 440, ACI 440.2R-08. Guide for the design and construction of externally bonded FRP systems for strengthening concrete
structure, 38800 Country Club Dr., Farmington Hills, MI 48331-3439, USA. American Concrete Institute, 2008. 3. Ahmed Shaban Abdel-Hay, Partial Strengthening of R.C Square Columns using CFRP, HBRC Journal, 10, 279–286, 2014.
4. Aitcin P.C., The durability characteristics of high performance concrete: a review, Cement & Concrete Composites, 25, 409–420, 2003.
5. Andrade C, Alonso C, On-site measurements of corrosion rate of reinforcements, Construction and Building Materials, 15, 141-145, 2001. 6. Antonio Bossio, Tullio Monetta, Francesco Bellucci, Gian Piero Lignola, Andrea Protaio Bossio, Modeling of Concrete Cracking due to
Corrosion Process of Reinforcement Bars, Cement and Concrete Research, 71, 78–92, 2015.
7. ASTM C876, Standard Test Method for Corrosion Potentials of Uncoated Reinforcing Steel in Concrete, West Conshohocken, United States; American Society for Testing & Materials, 2009.
8. Dias S.J.E., Barros J.A.O., NSM Shear Strengthening Technique with CFRP Laminates Applied in High-Strength Concrete Beams with or without Pre-Cracking, Composites: Part B 43, 290–301, 2012.
9. Hawileh R.A., Nawaz W., Abdalla J.A., Saqan E.I., Effect of Flexural CFRP Sheets on Shear Resistance of Reinforced Concrete Beams,
Composite Structures, 122, 468–476, 2015. 10. Hui Yu, Xianming Shi, William H. Hartt, Baotong Lu, Laboratory investigation of reinforcement corrosion initiation and chloride threshold
content for self-compacting concrete, Cement and Concrete Research, 40, 1507–1516, 2010.
11. IS: 10262 – 2009, Concrete Mix Proportioning – Guidelines, Manak Bhavan, New Delhi 110002. Bureau of Indian Standards. 12. IS: 456 – 2000, Plain and Reinforced Concrete Code of Practice, Manak Bhavan, New Delhi 110002. Bureau of Indian Standards.
13. IS: 516 – 1959 (Reaffirmed 2004), Methods of Tests for Strength of Concrete, Manak Bhavan, New Delhi 110002. Bureau of Indian
Standards. 14. John P. Broomfield, Kevin Davies, Karel Hladky, The use of permanent corrosion monitoring in new and existing reinforced concrete
structures, Cement & Concrete Composites, 24, 27–34, 2002.
15. Kesavan K., Ravisankar K., Senthil R., Farvaze Ahmed A.K., Experimental Studies on Performance of Reinforced Concrete Beam
Strengthened with CFRP under Cyclic Loading using FBG Array, Measurement, 46, 3855–3862, 2013.
16. Massimiliano Bocciarelli, Christian di Feo, Nicola Nisticò, Marco Andrea Pisani, Carlo Poggi, (2013), Failure of RC Beams Strengthened
in Bending with Unconventionally Arranged CFRP Laminates, Composites: Part B 54, 246–254, 2013. 17. Mohamed H. Mahmoud, Hamdy M. Afefy, Nesreen M. Kassem, Tarek M. Fawzy, Strengthening of Defected Beam–Column Joints using
CFRP, Journal of Advanced Research, 5, 67–77, 2014.
18. Mohammad Ismail, Bala Muhammad, Mohamed El Gelany Ismail, Compressive strength loss and reinforcement degradations of reinforced concrete structure due to long-term exposure, Construction and Building Materials, 24, 898–902, 2010.
19. Murad M. Bhunga, Dr. N. K. Arora, Comparative Study of ER-FRP Laminated Beam Design with ACI-440-2r-08 and IS Method,
International Journal of Advanced Engineering Technology, E-ISSN 0976-3945, 2012. 20. Muralidharan S, Saraswathy V., Madhavamayandi A, Thangavel K, Palaniswamy N, Evaluation of embeddable potential sensor for
corrosion monitoring in concrete structures, Electrochimica Acta, 53,7248–7254, 2008.
21. Muthulingam S., Rao B.N., Non-uniform Corrosion States of Rebar in Concrete under Chloride Environment, Corrosion Science, 93, 267–282, 2015.
22. Norazman Mohamad Nor, Mohd Hanif Ahmad Boestamam, Mohammed Alias Yusof, Carbon Fiber Reinforced Polymer (CFRP) as
Reinforcement for Concrete Beam, International Journal of Emerging Technology and Advanced Engineering, 3(2), 2013. 23. Oral Buyukozturk, Oguz Gunes, Erdem Karaca, Progress on understanding debonding problems in reinforced concrete and steel members
strengthened using FRP composites, Construction and Building Materials, 18, 9–19, 2004.
24. Priyanka Sarker, Mahbuba Begum and Sabreena Nasrin, Fiber reinforced polymers for structural retrofitting: A review, Journal of Civil Engineering (IEB), 39 (1), 49-57, 2011.
25. Ratan Kharatmol, Pankaj Sananse, Rohit Tambe, Ms.Raksha J.Khare, (2014), Strengthening of Beams Using Carbon Fibre Reinforced
Polymer International Journal of Emerging Engineering Research and Technology, 2(3), 119-125, 2014. 26. Shamsad Ahmad, Reinforcement corrosion in concrete structures, its monitoring and service life prediction––a review, Cement & Concrete
Composites, 25, 459–471, 2003.
27. Szweda Zofiaa, Zybura Adam, Theoretical Model and Experimental Tests on Chloride Diffusion and Migration Processes in Concrete, Sciverse Science Direct, Procedia Engineering, 57 1121 – 1130, 2013.
28. Tara Sen, H.N. Jagannatha Reddy, Strengthening of RC Beams in Flexure using Natural Jute Fibre Textile Reinforced Composite System
and its Comparative Study with CFRP and GFRP Strengthening Systems, International Journal of Sustainable Built Environment 2, 41–55, 2013.
29. Van der Zanden A.J.J., Taher A., Arends T., (2015), Modelling of Water and Chloride Transport in Concrete during Yearly Wetting/Drying
Cycles, Construction and Building Materials, 81, 120–129, 2015. 30. Wonga H.S, Zhao Y.X, Karimi A.R, Buenfeld N.R, Jin W.L., On the penetration of corrosion products from reinforcing steel into concrete
due to chloride-induced corrosion, Corrosion Science 52, 2469–2480, 2010.
31. Xianming Shi, Ning Xie, Keith Fortune, Jing Gong, Durability of steel reinforced concrete in chloride environments: An overview, Construction and Building Materials, 30, 125–138, 2012.
32. Yinzhi Zhou, Hualin Fan, Kebin Jiang, Mingkang Gou, Ning Li, Pengcheng Zhu, Yiqiang Tu, Experimental Flexural Behaviors of CFRP
Strengthened Aluminum Beams, Composite Structures, 116, 761–771, 2014.
41.
Authors: Bharat Lal, Sandeep Sagar, Misbah Arain, Burhan Aslam Arain, Farrukh Shaikh
Paper Title: Automation and Monitoring of Reverse Osmosis Water Treatment Plant
Abstract: The world is suffering from an eminent water crisis. Safe and pure drinking water is the necessity and
right of everyone. The use of reverse osmosis-based water treatment plants has become a common method for
providing clean water in many areas as the global demand for water increases. Automation and monitoring is an
important task for such plants at remote distance. A system is needed to prevent difficulties when one needs to
control and monitor important parameters such as Total Dissolved Solids (TDS), Water Level, Flow rate manually.
Manually operated RO plants have failed due to lack of proper monitoring and maintenance. Designed system in
this article is equipped with Arduino microcontroller which controls the operation of system, water level sensors for
water level monitoring in particular tank, water flow sensors to measure the flow rate of water during run, pH sensor
for product water quality monitoring and a wireless connectivity module, which is used to establish communication
between user/operator and the RO system at remote areas. The system not only allows user to monitor the important
parameters of RO plant which influence the performance, but also allow to control the plant at remote distance. The
system gives the measurement report upon a request message and also alerts the user automatically if any critical
situation occurs at plant site. The system can be placed at any location where GSM based wireless connectivity is
available and can be controlled from a single location.
221-225
Keywords: Reverse Osmosis, Water quality, Remote Monitoring, Wireless GSM Control.
References: 1. O. M. Torky, I. Elamvazuthi, and N. H. Hanif, “PC based SCADA System for Reverse Osmosis Desalination Plants,” IEEE Student
Conference on Research and Development, November 2009, Malaysia.
2. A. Abdulrazaqa Jassim, N. Abdulrazaq, and A. S. Kahdim, “Automation of Reverse Osmosis,” Seventh International Water Technology
Conference, April 2003, Egypt. 3. M. Gowri Shankar, R. Nadhiya, A. P. Priya, and R. Selvi, “Automation for Industrial Reverse Osmosis System Using SCADA Controller,”
International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 5, No. 1, March 2016, India.
4. M. Saraswati, E. Kuantama, and P. Mardjoko, “Design and Constructionof Water Level Measurement System Accessible through SMS”, Sixth UKSim/AMSS European Symposium on Computer Modeling and Simulation, November 2012 Malta.
5. A. Zilouchian, and M. Jafar, “Automation and Process Control of Reverse Osmosis Plants using Soft Computing Methodologies,”
International Conference on Seawater Desalination Technologies on the Threshold of the New Millennium, November 2000, Kuwait. 6. M. S. Prajapati, and A. G. Patel, “PLC & SCADA Based Automation of Industrial Reverse Osmosis Desalination Plants,” International
Journal of Engineering Research & Technology, Vol. 3, No. 3, March 2014.
7. Raj Shah, Aditya Vadalkar, Omkar Bengrut, and M.P.Sardey, “Automation of Water Treatment Plant,” International Journal for Technological Research In Engineering, Vol. 1, No. 8, April-2014.
8. Faras Ghani, ‘Tharparkar: Pakistan's ongoing catastrophe’, 2016. [Online]. Available:
https://www.aljazeera.com/indepth/features/2016/06/tharparkar-pakistans-ongoing-catastrophe 160629111410198.html. 9. Hanif Samoon, ‘Several RO plants found 'out of order' in Tharparkar’, 2015. [Online]. Available: https://www.dawn.com/news/1223762.
10. Sofia Khaliq Alvi, Uzma Asghar, Madhia Parve, and Faroque Ahmed Khan, “Ground Water Quality of District Tharparkar, Sindh,
Pakistan,” Center of Environment Studies, PCSIR Laboratories Complex Karachi, Vol. 30, No 3, 2008, Pakistan. 11. A. S. Dil, Ishtiaq A. Qazi, M. A. Baig, E. A. Khan, and A. Tahir, “National Standards for Drinking Water Quality,” Pakistan
Environmental Protection Agency, June, 2008.
12. Rhowel Dellosa, J. Edward Hernandez, Richard Mangay, and Rockie Robles, “Microcontroller Based Wastewater Management System,”
International Journal of Scientific and Technology Research, Vol. 3, No. 10, October 2014.
42.
Authors: Ukwuaba, Samuel Ifeanyi, Agberegha, Orobome Larry, Mohammed, Bello Ahmed
Paper Title: Analysis and Performance Evaluation of Gas Turbine by Incorporating a Wetted Evaporative Media
Cooler
Abstract: Gas turbine shows great inverse effect on ambient air temperature. The efficiency and net power output
of the gas turbine increases with decrease in ambient air temperature. Nigeria with an average ambient air
temperature of 31°C tends to experience a drop in gas turbine efficiency and net power output. It has been proven
that by employing wetted evaporative media cooler to the inlet of the compressor, the gas turbine plant performance
can be maximized; this employed devise reduces the inlet temperature. An open cycle gas turbine Frame 9E in
Ihovbor power plant Benin Edo State, Nigeria generating electricity at a capacity of 450MW was used as a
retrofitted study for the research by using Aspen HYSY V9 simulation one software model. The results, from plots
of graphs, when interpreted, depicts a direct proportionality between ambient air temperature and compressor work;
an inverse proportionality between ambient air temperature and net power output of the turbine; a direct
proportionality between ambient air temperature and specific fuel consumption; an inverse proportionality between
ambient air temperature and plant efficiency. The numerical value for the drop in ambient air temperature
consequent upon the use of evaporative cooler is 11.250C. Since the gas turbine is a thermal engine, its inlet
temperature – ambient temperature – has significant effect on the aforementioned parameters; so that, results from
the study, shows; the evaporative cooler results in a drop in ambient temperature of 11.25°C, showing an increase of
about 3.7% efficiency and 11.56MW net power output of the turbine. Drop in specific fuel consumption is
0.024kg/KWh. From the research, it is deduced that gas turbine plants perform better in temperate regions than
tropical regions. Therefore, to maximize the performance of a gas turbine plants in high temperature climates,
retrofitting it with an air cooler will lower the temperature to a value close to the design temperature before
compression takes place and it will tend to improve gas turbine performance in tropical country like Nigeria.
Keywords: Gas turbine, efficiency, ambient temperature, net power output, simulation
References: 1. Farzaneh-Gord, M., Deymi-Dashtebayaz, M. (2011). The various methods of air conditioning gas inlet turbine performance, energy ,
vol. 36, pp. 1196-1205
2. Society of Heating, Refrigeration and Air Conditioning Engineers of America (2008), "SHARAE Hand book-systems of HVAC and
equipment (SI) CD Rom, Atlanta, GA 3. Zuniga, MO.V, (2005). Admission system for industrial gas turbine "cranfield university, United Kingdom. Vol. 21, pp. 4– 7
4. Johnson RS (1989). The theory and operation of evaporative cooler for industrial gas turbine. Journal of Eng. Gas Turbine Power, 111,
pp.327-334 5. Hosseini, R., Beshkani A. and Soltani M. (2007). Improves the performance of Fars gas turbines. (Iran), combined cycle power plant by air
intake cooling using a media evaporative cooler, Ener. Conver. Manage, vol. 48, pp. 1055-1064
6. Zadpoor A.A., and Golshan A.H. (2006). Improvement of the performance of a gas turbine cycle using a desiccant evaporative cooling system, J. Energy., Vol. 31, p. 2652-2664
7. Alhazmy M.M., and Najjar Y.S.H. (2004). Increase in the performance of the gas turbine using air. Coolers of Applied Thermal
Engineering, 24, pp.415-429. 8. Bhargava R.K., Branchini L., Melino F. and Peretto A. (2001). Gas turbine available and future.Power increase technologies: technical-
economic analysis in selected climatic conditions. J Eng power gas turbine, 134 (10)
9. Ifedi V. (2005). Electrical reform and electrical generation. Pp.12- 12 10. Ibrahim T.K .., Rahman M.M. and Abdalla A.N (2010). Study on the effective gas parameter.turbine model with intercooling compression
process ", Scientific Research and Essays Vol. 5 (23), pp. 3760-3770
11. Shi X., Agnew B., Che D. and Gao J. (2010). Improvement of the performance of conventional combinations. Energy plant cycle by inlet air cooling, partial cooling and cold energy utilization of LNG, Applied thermal engineering 30, pp.2003-2010.
12. Sanjay O., Muku, A. and Rajay, Y. (2009). Energy Analysis and Exergy of the Brayton-Diesel Cycle. Proceedings of the 2009 World
Engineering Congress, London, 2 (1), pp.1-6
13. Global Energy Observation, (2011). History of edits for Ihovbor open circle Gas turbine Power Plant Nigeria
14. Manuel Colera, Ángel Soria, Javier Ballester (2019), A numerical scheme for the thermodynamic analysis of gas turbines, Applied Thermal
Engineering, Volume 147, Pages 521-536
226-232
15. Hyun Min Kwon, Tong Seop Kim, Jeong Lak Sohn, Do Won Kang, Performance (2018), upgrading of the gas turbine combined cycle power plant by dual cooling of the inlet air and turbine coolant using a gas cooler Absorption, Energy, Volume 163, Pages 1050-1061
16. Hiwa Khaledi, Roozbeh Zomorodian, Mohammad, Bagher Ghofrani. "Effect of air cooling of entry by Absorption chiller in gas turbine and
combined cycle performance ", Advanced Energy Systems, 2005 17. Rahim, M. A .. "Analysis of performance and sensitivity of a combined-cycle gas turbine power plant by several input air cooling systems",
Minutes of the Mechanical Engineers' Institution, Part A, Energy Diary and Energy, 2012