InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan,...

90
ISSN : 2277 - 3878 Website: www.ijrte.org Technology and Engineering Technology and Engineering International Journal of Recent International Journal of Recent Volume-9 Issue-3, SEPTEMBER 2020 Blue Eyes Intelligence Engineering and Sciences Publication Published by: d E n a n g y i n g e o e l r o i n n h g c e T t n e c e R I n f t o e l r n a n a r t i u o o n J l a IJRTE Exploring Innovation www.ijrte.org E X P L O R I N G I N N O V A T ION N G I & R E S E C N I I E G N N C E E S E C P N U E B G L I I L C L A E T T I N O I N S E Y E E U L B N G I & R E S E C N I I E G N N C E E S E C P N U E B G L I I L C L A E T T I N O I N S E Y E E U L B N G I & R E S E C N I I E G N N C E E S E C P N U E B G L I I L C L A E T T I N O I N S E Y E E U L B N G I & R E S E C N I I E G N N C E E S E C P N U E B G L I I L C L A E T T I N O I N S E Y E E U L B N G I & R E S E C N I I E G N N C E E S E C P N U E B G L I I L C L A E T T I N O I N S E Y E E U L B N G I & R E S E C N I I E G N N C E E S E C P N U E B G L I I L C L A E T T I N O I N S E Y E E U L B

Transcript of InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan,...

Page 1: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

ISSN : 2277 - 3878Website: www.ijrte.org

Technology and EngineeringTechnology and EngineeringInternational Journal of Recent International Journal of Recent

Volume-9 Issue-3, SEPTEMBER 2020

Blue Eyes Intelligence Engineering and Sciences Publication

Published by:

d E na n g y i n g e o e l r o i n n h g c e T t n e c e R I n f to e l r n a n a r t i u o o n J l a

IJRTE

Exploring Innovation

www.ijrte.org

EXPLORING INNO

VATION

NGI &R

E

SE

C

N

I

I

E

G

N

N

C

E

E

S

E

C

P

N

U

E

B

G

L

I

I

L

C

L

A

E

T

T

I

N

O

I

N

S

EY E E

ULB

NGI &R

E

SE

C

N

I

I

E

G

N

N

C

E

E

S

E

C

P

N

U

E

B

G

L

I

I

L

C

L

A

E

T

T

I

N

O

I

N

S

EY E E

ULB

NGI &R

E

SE

C

N

I

I

E

G

N

N

C

E

E

S

E

C

P

N

U

E

B

G

L

I

I

L

C

L

A

E

T

T

I

N

O

I

N

S

EY E E

ULB

NGI &R

E

SE

C

N

I

I

E

G

N

N

C

E

E

S

E

C

P

N

U

E

B

G

L

I

I

L

C

L

A

E

T

T

I

N

O

I

N

S

EY E E

ULB

NGI &R

E

SE

C

N

I

I

E

G

N

N

C

E

E

S

E

C

P

N

U

E

B

G

L

I

I

L

C

L

A

E

T

T

I

N

O

I

N

S

EY E E

ULB

NGI &R

E

SE

C

N

I

I

E

G

N

N

C

E

E

S

E

C

P

N

U

E

B

G

L

I

I

L

C

L

A

E

T

T

I

N

O

I

N

S

EY E E

ULB

Page 2: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

Editor-In-Chief Dr. Shiv Kumar

Ph.D. (CSE), M.Tech. (IT, Honors), B.Tech. (IT), Senior Member of IEEE, Member of the Elsevier Advisory Panel

CEO, Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP), Bhopal (MP), India

Associate Editor-In-Chief Dr. Takialddin Al Smadi

Professor, Department of Communication and Electronics, Jerash Universtiy, Jerash, Jordan

Dr. Vo Quang Minh

Senior Lecturer and Head, Department of Land Resources, College of Environment and Natural Resources (CENRes), Can Tho City,

Vietnam.

Dr. Stamatis Papadakis

Lecturer, Department of Preschool Education, University of Crete, Greece.

Dr. Ali OTHMAN Al Janaby

Lecturer, Department of Communications Engineering, College of Electronics Engineering University of Ninevah, Iraq.

Dr. Rabiul Ahasan

Professor, Department of Industrial Engineering, King Saud University, Saudi Arabia.

Dr. Hakimjon Zaynidinov

Professor and Head, Department of Computer Science, Tashkent University of Information Technologies, Uzbekistan.

Prof. MPS Chawla

Ex-Chairman, IEEE MP Sub-Section, India, Professor-Incharge (head)-Library, Associate Professor in Electrical Engineering, G.S.

Institute of Technology & Science Indore, Madhya Pradesh, India.

Associate Editor-In-Chief Members Dr. Anil Kumar Yadav

Ph.D(ME), ME(ME), BE(ME)

Professor, Department of Mechanical Engineering, LNCT Group of Colleges, Bhopal (M.P.), India

Dr. Gamal Abd El-Nasser Ahmed Mohamed Said

Ph.D(CSE), MS(CSE), BSc(EE)

Department of Computer and Information Technology , Port Training Institute, Arab Academy for Science, Technology and Maritime

Transport, Egypt.

Dr. Ahmed Daabo

Lecturer and Researcher, Department of Mining Engineering, University of Mosul, Iraq

Dr. Carlo H. Godoy Jr

Professor, Department of Support, Human Edge Software Philippines, Philippines

Dr. Morteza Pakdaman

Assistant Professor, Department of CRI, Climatology of Atmospheric Disasters Research Group, Climatological Research Institute

(CRI), Mashhad, Iran.

Scientific Editors Dr. Fadiya Samson Oluwaseun

Assistant Professor, Girne American University, as a Lecturer & International Admission Officer (African Region) Girne, Northern

Cyprus, Turkey.

Dr. Robert Brian Smith

International Development Assistance Consultant, Department of AEC Consultants Pty Ltd, AEC Consultants Pty Ltd, Macquarie

Centre, North Ryde, New South Wales, Australia

Dr. Durgesh Mishra

Professor (CSE) and Director, Microsoft Innovation Centre, Sri Aurobindo Institute of Technology, Indore, Madhya Pradesh India

Dr. Vinod Kumar Singh

Associate Professor and Head, Department of Electrical Engineering, S.R.Group of Institutions, Jhansi (U.P.), India

Dr. Rachana Dubey

Ph.D.(CSE), MTech(CSE), B.E(CSE)

Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence (LNCTE), Bhopal

(M.P.), India

Page 3: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

Executive Editor Chair Dr. Deepak Garg

Professor, Department of Computer Science And Engineering, Bennett University, Times Group, Greater Noida (UP), India

Members of Executive Editor Chair Dr. Vahid Nourani

Professor, Faculty of Civil Engineering, University of Tabriz, Iran.

Dr. Saber Mohamed Abd-Allah

Associate Professor, Department of Biochemistry, Shanghai Institute of Biochemistry and Cell Biology, Shanghai, China.

Dr. Xiaoguang Yue

Associate Professor, Department of Computer and Information, Southwest Forestry University, Kunming (Yunnan), China.

Dr. Sunandan Bhunia

Associate Professor & Head, Department of Electronics & Communication Engineering, Haldia Institute of Technology, Haldia

(Bengal), India.

Dr. Awatif Mohammed Ali Elsiddieg

Assistant Professor, Department of Mathematics, Faculty of Science and Humatarian Studies, Elnielain University, Khartoum Sudan,

Saudi Arabia.

Technical Program Committee Dr. Mohd. Nazri Ismail

Associate Professor, Department of System and Networking, University of Kuala (UniKL), Kuala Lumpur, Malaysia.

Technical Program Committee Members Dr. Wilson Udo Udofia

Associate Professor, Department of Technical Education, State College of Education, Afaha Nsit, Akwa Ibom, Nigeria.

Dr. Ch. Ravi Kumar

Dean and Professor, Department of Electronics and Communication Engineering, Prakasam Engineering College, Kandukur (Andhra

Pradesh), India.

Dr. Sanjay Pande MB

FIE Dip. CSE., B.E, CSE., M.Tech.(BMI), Ph.D.,MBA (HR)

Professor, Department of Computer Science and Engineering, G M Institute of Technology, Visvesvaraya Technological University

Belgaum (Karnataka), India.

Dr. Hany Elazab

Assistant Professor and Program Director, Faculty of Engineering, Department of Chemical Engineering, British University, Egypt.

Dr. M.Varatha Vijayan

Principal, Department of Mechanical Engineering, Mother Terasa College of Engineering and Technology, Pudukkottai (Tamil Nadu)

India.

Dr. S. Balamurugan

Director, Research and Development, Intelligent Research Consultancy Services (IRCS), Coimbatore (Tamil Nadu), India.

Dr. Rajalakshmi Rahul

FIE Dip. CSE., B.E, CSE., M.Tech.(BMI), Ph.D.,MBA (HR)

Founder and CEO Talaash Research Consultants, Chennai (Tamil Nadu), India.

Reviewer Chair Dr. Arun Murlidhar Ingle

Director, Padmashree Dr. Vithalrao Vikhe Patil Foundation’s Institute of Business Management and Rural Development, Ahmednagar

(Maharashtra) India.

Members of Reviewer Chair Dr. S. A. Mohan Krishna

Associate Professor, Department of Information Science and Engineering, Vidyavardhaka College of Engineering, Mysuru

(Karnataka), India

Dr. Ashok Koujalagi

Assistant Professor & Postdoctoral Researcher, Department of Computer Science, Basaveshwar Science College, Bagalkot

(Karnataka), India

Dr. A. Baradeswaran

Principal, Department of Electronics & Communication Engineering, Madha Engineering College, Chennai (Tamil Nadu), India

Page 4: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

Dr. R. Padma Priya

Professor, Department of Electronics & Communication Engineering, Madha Engineering College, Chennai (Tamil Nadu), India

Dr. Raghunath Satpathy

Assistant Professor, Department of Biotechnology, Majhighariani Institute of Technology and Science, Odisha, India

Dr. Hema Chandran K.

Professor & HOD, Department of Electronics & Communication Engineering, Ashoka Institute of Engineering and Technology,

Hyderabad (Telangana), India

Dr. M. Rakesh

Assistant Professor, Department of Electronics and Communication Engineering, Vignan’s Institute of Management and Technology

for Women, Ghatkeser (Hyderabad), India

Dr. Parul Mishra

Assistant Professor, Department of English, GD Goenka University Gurugram, Gurgaon (Haryana), India

Dr. Sunil Kumar Mishra

Associate Professor, Department of Communication Skills (English), Amity University, Gurgaon (Haryana), India

Dr. Kaushik Mukherjee

Faculty of Management Studies, Assistant Professor, AKS University, Satna(MP), India

Dr. Siva Reddy Sheri

Associate Professor, Department of Mathematics, School of Technology Hyderabad Campus, GITAM University, Visakhapatnam

(Andhra Pradesh), India.

Dr. Nitasha Soni

Assistant Professor, Department of Computer Science, Manav Rachna International Institute of Research and Studies, Faridabad

(Haryana), India.

Dr. Pushpender Sarao

Professor, Department of Computer Science & Engineering, Hyderabad Institute of Technology and Management, Hyderabad

(Telangana), India.

Dr. K. Priya

Professor & Head, Department of Commerce, Vivekanandha College of Arts & Sciences for Women (Autonomous, Elayampalayam,

Namakkal (Tamil Nadu), India.

Dr. Sunil Tekale

Professor, Dean Academics, Department of Computer Science & Engineering, Malla Reddy College of Engineering, Secunderabad

(Telangana), India.

Dr. Brijesh Singh

Senior Yoga Expert and Head, Department of Yoga, Samutakarsha Academy of Yoga, Music & Holistic Living, Prahladnagar,

Ahmedabad (Gujarat), India.

Dr. Vinita Kumar

Department of Physics, Dr. D. Ram D A V Public School, Danapur, Patna(Bihar), India

Dr. Rama Shanker

Professor & Head, Department of Statistics, Eritrea Institute of Technology, Asmara, Eritrea

Dr. Subhash Laxman Gadhave

Professor, Department of Mechanical Engineering, Shri Jagdishprasad Jhabarmal Tibrewala University, (Rajasthan) India.

Dr. Raja Mohammad Latif

Professor, Department of Mathematics and Natural Sciences, University of Alberta Edmonton, Canada.

Dr. S.N. Ramaswamy

Professor, Department of Civil Engineering, Kalasalingam University, (Krishnankoil) India.

Page 5: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

S. No

Volume-9 Issue-3, September 2020, ISSN: 2277–3878 (Online)

Published By: Lattice Science Publication

Page No.

1.

Authors: Dattatray Kisan Rajmane, Milind Laxman Waikar

Paper Title: Projection of Temperature and Precipitation using Multiple Linear Regression and Artificial Neural

Network as a Downscaling Methodology for Upper Bhima Basin

Abstract: Study of Climate change effect on water resources is very important for its effective management.

Projection of temperature and precipitation can be performed by using General Circulation Model (GCM)

outputs. GCM can make the projections of climate parameters with different emission scenarios at coarser scale.

However hydrological models require climate parameters at smaller scale Downscaling technique is used for

obtaining small scale climate variables from large scale variables of GCM outputs. In this study downscaling has

been carried out by using Multiple Linear Regression (MLR) and Artificial Neural Network (ANN) techniques.

Performance of MLR and ANN models has been evaluated considering Coefficient of determination value (R2).

It has been observed that ANN performs better against MLR Model, showed the results that rainfall distribution

pattern is varied, in monsoon season rainfall decreases while it increases in post monsoon period. Due to its good

evaluation performance such techniques can be applicable for downscaling purpose

Keywords: Artificial neural network, General Circulation model, Multiple linear regression, Upper Bhima

Basin

References:

1. Climate Change 2007: Synthesis Report (IPCC)

2. IPCC Report 2014.

3. B. C. Hewitson and R.G. Crane, ―Climate downscaling: techniques and application‖, Clim. Res., vol.7, (1996), 85–95. 4. R.L. Wilby, M.L. Wigley, D. Conway, P.D. Jones, B.C. Hewitson, J. Main and D.S. Wilks, ―Statistical downscaling of general

circulation model output: a comparison of methods‖, Water Resour. Res., 34,(1998), 2995–3008.

5. A. J. Askew, ―The influence of climate change and climate variability on the hydrologic regime and water resources‖, IAHS Publication,Vol.168, (1987), pp. 421-430.

6. E.P. Salathe, Jr., P.W. Mote and M.W. Wiley, ―Review of scenario selection and downscaling methods for the assessment of climate

change impacts on hydrology in the United States Pacific Northwest‖, Int. J. Climatol., Vol. 27, (2007), 1611–1621. 7. Rao S. Govindaraju, ―Artificial neural network in hydrology I: Preliminary concepts‖, Journal of Hydrologic Engineering, Vol. 5,

April 2000, 115-123

8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation neuralnetwork in modelling porosity from Geophysical well logs‖, Journal of Petroleum exploration and production Technology,

Vol.5, (2015), 157-166.

9. David E. Rumelhart, Geoffrey E. Hintont & Ronald J. WilliamsJ. Wang, ―Learning representations by back-propagating errors‖, Nature Publishing Group, Vol.323 (9), 1986, pp 533-536.

10. Government of Maharashtra Hydrology Project II, Water Resources Department, ―Real Time Streamflow Forecasting and Reservoir Operation System for Krishna and Bhima River Basins in Maharashtra‖ (RTSF & ROS), Inception Report, December 2011,

11. Subimal Ghosh, P.P. Mujumdar, ―Statistical Downscaling of GCM simulations to streamflow using relevance vector machine‖,

Advances in Water Resources, Vol 31, July 2007, pp. 132-146 12. K. Pearson, ―Mathematical contributions to the theory of evolution III regression heredity and panmixia. Philos‖. Trans. R Soc. Lond.

Ser., 187, (1896), 253–318.

1-8

2.

Authors: Anicia Coleen S. Reyes, Gem Ryan C. Milan, James Marvin M. Quilaton, Bryant Exel G. Sigue,

Steven Valentino E. Arellano, Kenneth C. Karamihan

Paper Title: SBC-Based Diabetic Retinopathy and Diabetic Macular Edema Classification System using Deep

Convolutional Neural Network

Abstract: This Raspberry Pi Single-Board Computer-Based Diabetic Retinopathy (DR) and Diabetic Macular

Edema (DME) Classification System using Deep Convolutional Neural Network through Inception v3 Transfer

Learning and MATLAB digital image processing paradigm based on International Clinical DR and DME

Disease Severity Scale with Python application, which would capture the image of the retina of diabetic patients

to classify the grade, severity, and types of DR; and the grade of DME without using dilating drops. It would

also display, save, search and print the partial diagnosis that can be done to the patients. Diabetic patients,

endocrinologists and ophthalmologists of one of the medical centers in City of San Pedro, Laguna, Philippines

tested the system. Obtained results indicated that the classification of DR and DME, and its characteristics using

the system were accurate and reliable, which could be an assistive device for endocrinologists and

ophthalmologists.

Keywords: Diabetic retinopathy, diabetic macular edema, deep convolutional neural network, digital image

processing, transfer learning

References:

1. Z. Punthakee, R. Goldenberg, and P. Katz. (2018). Definition, Classification and Diagnosis of Diabetes, Prediabetes and Metabolic

Syndrome. Canadian Journal of Diabetes [Online]. 42(1), pp. S10-S15. Available: https://guidelines.diabetes.ca/docs/cpg/Ch3-Definition-Classification-and-Diagnosis-of-Diabetes-Prediabetes-and-Metabolic-Syndrome.pdf

2. World Health Organization (2016). Diabetes Country Profiles- Philippines [Online]. Available: https://www.who.int/diabetes/country -

profiles/phl_en.pdf?ua=1 3. R. Cheloni, S. A. Gandolfi, C. Signorelli, and A. Odone. (2019). Global prevalence of diabetic retinopathy: protocol for a systematic

review and meta-analysis. BMJ Open [Online]. 9(3), e022188. Available: http://dx.doi.org/10.1136/bmjopen-2018-022188

4. Mayo Clinic (2018). Diabetic Retinopathy [Online]. Available: https://www.mayoclinic.org/diseases-conditions/diabetic-retinopathy/diagnosis-treatment/drc-20371617

5. B. Curry. (2018, July 27). An Introduction to Transfer Learning in Machine Learning [Online]. Available: https://medium.com/kansas-

city -machine-learning-artificial-intelligen/an-introduction-to-transfer-learning-in-machine-learning-7efd104b6026

9-16

Page 6: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

6. Mindfire Solutions. (2017, October 3). Python: 7 important Reason Why You Should Use Python [Online]. Available:

https://medium.com/@mindfiresolutions.usa/python-7-important-reasons-why-you-should-use-python-5801a98a0d0b 7. A. M. Azab, J. Toth, L. S. Mihaylova, and M. Arvaneh, ―Signal Processing and Machine Learning for Brain-Machine Interfaces‖, 1st

ed. vol. 114, The Institution of Engineering and Technology, London, United Kingdom, 2018, pp. 81-101.

8. M. D. Abràmoff, Y. Lou, A. Erginay, W. Clarida, R. Amelon, J. C. Folk, and M. Niemeijer. (2016). Improved Automated Detection of

Diabetic Retinopathy on a Publicly Available Dataset Through Integration of Deep Learning. Investigative Ophthalmology & Visual

Science [Online]. 57(13), pp. 5200-5206. Available: https://doi.org/10.1167/iovs.16-19964

9. R. Gargeya, and T. Leng. (2017). Automated Identification of Diabetic Retinopathy Using Deep Learning. Ophthalmology [Online]. 124(7), pp. 962-969. Available: https://doi.org/10.1016/j.ophtha.2017.02.008

10. D. K. Prasad, L. Vibha, and K. P. Venugopal. (2015, December). Early detection of diabetic retinopathy from digital retinal fundus

images. Recent Advances in Intelligent Computational Systems (RAICS) IIEE [Online]. 1(1) pp. 240-245. Available: https://doi.org/10.1109/RAICS.2015.7488421

11. R. Pires, S. Avila, J. Wainer, E. Valle, M. D. Abramoff, and A. Rocha. (2019). A data-driven approach to referable diabetic retinopathy

detection. Artificial Intelligence in Medicine [Online]. 96(1), pp. 93-106. Available: https://doi.org/10.1016/j.artmed.2019.03.009 12. S. Wan, Y. Liang, and Y. Zhang. (2018). Deep convolutional neural networks for diabetic retinopathy detection by image classification.

Computers & Electrical Engineering [Online]. 72(1), pp. 274-282. Available: https://doi.org/10.1016/j.compeleceng.2018.07.042

3.

Authors: Sunay Dharwadkar, Sarvesh Harmalkar, Chinmay Nagzarkar, Vivkanand Tendulkar

Paper Title: Surveillance FPV Drone with Obstacle Avoidance System

Abstract: The unmanned air vehicle (UAV) is mostly used in inspection and surveillance operations recent.

The UAV is also termed as vertical take-off landing (VTOL), since it is capable of vertical take-off and landing

without need of a runway. The big tunnels, infrastructure and large bridges are inserted using UAV by

photographic inspection. UAVs are also used for surveillance purposes by the military and by the security

guards. Since this is a new technology of the last decade, deep research has to be done.

UAVS have the cross structure arrangement to which the rotor blades are attached at the end points of cross

beams. These rotors are driven by the DC brush motors and motors are powered by the lithium ion rechargeable

battery. The working principle of quad- rotors is the same as the chopper by controlling the rpm of each rotor

blade, due to which the gyroscopic torque will act and the vehicle will move in the desired direction. To hold the

quad- rotor at a stationary position at some height constant rpm of all rotors has to be maintained. This signal is

given by the controller from some distance, which is received by the, and then it processes the signal and drives

the motor via the flight controller and drives the rotors. A quad- rotor is equipped with a high quality camera for

photography and video shooting during surveillance. Since a quad rotor is manoeuvring in air, the wind may

exert a drag force and take it along with it and the quad rotor may hit any obstacle or inspection objects. To

avoid this, it is equipped with the ultrasonic sensors which is capable of sensing the obstacle and realize collision

avoidance between wall or any object.

Keywords: About four key words or phrases in alphabetical order, separated by commas.

References:

1. Prathamesh Salaskar , Saee Paranjpe , Jagdish Reddy , Arish Shah, ―Quadcopter – Obstacle Detection and Collision Avoidance,‖ in

International Journal of Engineering Trends and Technology (IJETT) – Volume 17 Number 2 – Nov 2014 2. Joseph Azeta1, , Christian Bolu1 , Daniel Hinvi1 and Abiodun A Abioye1, ―Obstacle detection using ultrasonic sensor for a mob ile

robot,‖ in IOP Conf. Series: Materials Science and Engineering 707 (2019) 012012 IOP Publishing doi:10.1088/1757-

899X/707/1/0120124. 3. Muhammad Fazlur Rahman, Rianto Adhy Sasongko, ―Obstacle Avoidance for Quadcopter using Ultrasonic Sensor,‖ in IOP Conf.

Series: Journal of Physics: Conf. Series 1005 (2018) 012037 doi :10.1088/1742-6596/1005/1/012037

4. Marco Claudio De Simone * ID , Zandra Betzabe Rivera and Domenico Guida ―Obstacle Avoidance System for Unmanned Ground Vehicles by Using Ultrasonic Sensors in machines.

5. Kenjiro Niwa, Keigo Watanabe, and Isaku Nagai ―A Detection Method Using Ultrasonic Sensors for Avoiding a Wall Collision of

Quadrotors,‖ in International conference of mechatronics and Aotpmation August 6-9, Takamatsu, japan.

17-20

4.

Authors: Swetharani K, Vara Prasad

Paper Title: Design and Implementation of an Efficient Rose Leaf Disease Detection using K-Nearest Neighbours

Abstract: Plants are prone to different diseases caused by multiple reasons like environmental conditions, light,

bacteria, and fungus. These diseases always have some physical characteristics on the leaves, stems, and fruit,

such as changes in natural appearance, spot, size, etc. Due to similar patterns, distinguishing and identifying

category of plant disease is the most challenging task. Therefore, efficient and flawless mechanisms should be

discovered earlier so that accurate identification and prevention can be performed to avoid several losses of the

entire plant. Therefore, an automated identification system can be a key factor in preventing loss in the

cultivation and maintaining high quality of agriculture products. This paper introduces modeling of rose plant

leaf disease classification technique using feature extraction process and supervised learning mechanism. The

outcome of the proposed study justifies the scope of the proposed system in terms of accuracy towards the

classification of different kind of rose plant disease.

Keywords: Plant Disease, Rose, Machine Learning, KNN, Classification.

References:

1. DeLind, Laura B. "Are local food and the local food movement taking us where we want to go? Or are we hitching our wagons to the wrong stars?." Agriculture and human values, 28, no. 2 (2011): 273-283.

2. Arora, Naveen Kumar. "Agricultural sustainability and food security." (2018): 217-219.

3. Pingali, Prabhu, Anaka Aiyar, Mathew Abraham, and Andaleeb Rahman. "Economic Growth, Agriculture, and Food Systems: Explaining Regional Diversity." In Transforming Food Systems for a Rising India, pp. 15-45. Palgrave Macmillan, Cham, 2019.

21-27

Page 7: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

4. Rey, Dolores, Ian P. Holman, and Jerry W. Knox. "Developing drought resilience in irrigated agriculture in the face of increasing water

scarcity." Regional Environmental Change 17, no. 5 (2017): 1527-1540. 5. J. K. Kamble, "Plant Disease Detector," 2018 International Conference On Advances in Communication and Computing Technology

(ICACCT), Sangamner, 2018, pp. 97-101.

6. Rishabh Sinha ―Study on Rose Diseases: Identification, Detection and Cure‖ International Journal of Engineering Development and

Research, 2017

7. Minaee, Saeed & Jafari, Mehrnoosh&Safaie, Naser. (2018). Design and development of a rose plant disease-detection and site-specific

spraying system based on a combination of infrared and visible images. Journal of Agricultural Science and Technology. 20. 23-36. 8. Song, Chorong, Miho Igarashi, Harumi Ikei, and Yoshifumi Miyazaki. "Physiological effects of viewing fresh red

roses." Complementary therapies in medicine 35 (2017): 78-84.

9. https://www.apsnet.org/edcenter/apsnetfeatures/Pages/Roses.aspx 10. Gavhale, Ms& Gawande, Ujwalla. (2014). An Overview of the Research on Plant Leaves Disease detection using Image Processing

Techniques. IOSR Journal of Computer Engineering. 16. 10-16. 10.9790/0661-16151016.

11. Sandhu, Gurleen Kaur, and Rajbir Kaur. "Plant Disease Detection Techniques: A Review." In 2019 International Conference on Automation, Computational and Technology Management (ICACTM), pp. 34-38. IEEE, 2019.

12. Patel, Arpita & Joshi, Barkha. (2017). A Survey on the Plant Leaf Disease Detection Techniques. IJARCCE. 6. 229-231.

10.17148/IJARCCE.2017.6143. 13. Wheeler, Bryan Edward John. "An introduction to plant diseases." An introduction to plant diseases. (1969).

14. Akhtar, Asma, Aasia Khanum, Shoab A. Khan, and Arslan Shaukat. "Automated plant disease analysis (APDA): performance

comparison of machine learning techniques." In 2013 11th International Conference on Frontiers of Information Technology, pp. 60-65. IEEE, 2013.

15. C. G. Dhaware and K. H. Wanjale, "A modern approach for plant leaf disease classification which depends on leaf image processing,"

2017 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, 2017, pp. 1-4. 16. J. N. Reddy, K. Vinod and A. S. RemyaAjai, "Analysis of Classification Algorithms for Plant Leaf Disease Detection," 2019 IEEE

International Conference on Electrical, Computer and Communication Technologies (ICECCT), Coimbatore, India, 2019, pp. 1-6.

17. U. Shruthi, V. Nagaveni and B. K. Raghavendra, "A Review on Machine Learning Classification Techniques for Plant Disease Detection," 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS), Coimbatore, India,

2019, pp. 281-284.

18. Kaur, Manpreet, and Rekha Bhatia. "Leaf Disease Detection and Classification: A Comprehensive Survey." In Proceedings of International Conference on IoT Inclusive Life (ICIIL 2019), NITTTR Chandigarh, India, pp. 291-304. Springer, Singapore, 2020.

19. Lu, Yang, Shujuan Yi, Nianyin Zeng, Yurong Liu, and Yong Zhang. "Identification of rice diseases using deep convolutional neural

networks." Neurocomputing 267 (2017): 378-384. 20. R. M. Prakash, G. Saraswathy, G. Ramalakshmi, K. Mangaleswari, and T. Kaviya, ―Detection of leaf diseases and classification using

digital image processing,‖ in Innovations in Information, Embedded and Communication Systems (ICIIECS), 2017 International

Conference on. IEEE, 2017, pp. 1–4. 21. Dhingra, Gittaly, Vinay Kumar, and Hem Dutt Joshi. "A novel computer vision based neutrosophic approach for leaf disease

identification and classification." Measurement 135 (2019): 782-794.

22. V. Pooja, R. Das, and V. Kanchana, ―Identification of plant leaf diseases using image processing techniques,‖ in Technological Innovations in ICT for Agriculture and Rural Development (TIAR), 2017 IEEE. IEEE, 2017, pp. 130–133.

23. Nidhis, A. D., Chandrapati Naga Venkata Pardhu, K. Charishma Reddy, and K. Deepa. "Cluster Based Paddy Leaf Disease Detection, Classification and Diagnosis in Crop Health Monitoring Unit." In Computer Aided Intervention and Diagnostics in Clinical and

Medical Images, pp. 281-291. Springer, Cham, 2019.

24. P. B. Padol and A. A. Yadav, ―Svm classifier based grape leaf disease detection,‖ in Advances in Signal Processing (CASP), Conference on. IEEE, 2016, pp. 175–179.

25. Pooja Kulinavar, Vidya I. Hadimani, ―Classification of leaf diseases based on multiclass SVM classifier,‖ International Journal of

Advance Research, Ideas and Innovations in Technology, Vol.3, Issue.4, pp321-325, 2017 26. Islam, Taohidul, Manish Sah, SudiptoBaral, and Rudra RoyChoudhury. "A Faster Technique on Rice Disease Detectionusing Image

Processing of Affected Area in Agro-Field." In 2018 Second International Conference on Inventive Communication and

Computational Technologies (ICICCT), pp. 62-66. IEEE, 2018. 27. Santos Ferreira, Alessandro, Daniel Matte Freitas, Gercina Gonçalves da Silva, HemersonPistori, and Marcelo TheophiloFolhes.

"Weed detection in soybean crops using ConvNets." Computers and Electronics in Agriculture 143 (2017): 314-324.

28. Prashar, K., Dr. Rajneesh Talwar, Dr.Chander Kant, ―Robust Automatic Cotton Crop Disease Recognition (ACDR) Method using the Hybrid Feature Descriptor with SVM‖. 4th International Conference on Computing on sustainable Global Development, March, 2017.

5.

Authors: Wageda Alsobky, Hala Saeed, Ali N.Elwakeil

Paper Title: Different Types of Attacks on Block Ciphers

Abstract: Cryptanalysis is a very important challenge that faces cryptographers. It has several types that should

be well studied by cryptographers to be able to design cryptosystem more secure and able to resist any type of

attacks. This paper introduces six types of attacks: Linear, Differential , Linear-Differential, Truncated

differential Impossible differential attack and Algebraic attacks. In this paper, algebraic attack is used to

formulate the substitution box(S-box) of a block cipher to system of nonlinear equations and solve this system

by using a classical method called Bases . By Solving these equations, we made algebraic attack on S-box.

Keywords: Linear attack; Differential attack; Algebraic attack; S-box; Bases

References:

1. Christof Paar · Jan Pelzl2009Understanding Cryptography: A Textbook for Students and PractitionersSpringer Heidelberg Dordrecht

London New York.

2. William Stallings2011Cryptography and network security : principles and practiceFifth edition. Boston Prentice Hall.

3. Blondeau, C., & Gérard, B. (2009, May). On the data complexity of statistical attacks against block ciphers. In Workshop on coding

and cryptography-wcc (Vol. 2009, pp. 469-488).

4. Weinmann, R. P. (2009). Algebraic methods in block cipher cryptanalysis (Doctoral dissertation, Technische Universität). 5. The Laws of Cryptography with Java Code2003Available online at Neal Wagner's home page1-334

6. Analysis of Development of Dynamic S-Box Generation2017Computer Science and Information Technology154-163

7. Cryptographic analysis of all 4 × 4-bit S-boxes2012Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)118-133

8. Abomhara, M. (2015). Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. Journal of Cyber

Security and Mobility, 4(1), 65-88. 9. Lai, X., Massey, J. L., & Murphy, S. (1991, April). Markov ciphers and differential cryptanalysis. In Workshop on the Theory and

Application of of Cryptographic Techniques (pp. 17-38). Springer, Berlin, Heidelberg.

28-31

Page 8: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

10. Matsui, M. (1993, May). Linear cryptanalysis method for DES cipher. In Workshop on the Theory and Application of Cryptographic

Techniques (pp. 386-397). Springer, Berlin, Heidelberg. 11. Langford, S. K., & Hellman, M. E. (1994, August). Differential-linear cryptanalysis. In Annual International Cryptology

Conference (pp. 17-25). Springer, Berlin, Heidelberg.

12. Lee, S., Hong, S., Lee, S., Lim, J., & Yoon, S. (2001, December). Truncated differential cryptanalysis of Camellia. In International

Conference on Information Security and Cryptology (pp. 32-38). Springer, Berlin, Heidelberg.

13. Kim, J., Hong, S., Sung, J., Lee, S., Lim, J., & Sung, S. (2003, December). Impossible differential cryptanalysis for block cipher

structures. In International Conference on Cryptology in India (pp. 82-96). Springer, Berlin, Heidelberg. 14. Bard, G. (2009). Algebraic cryptanalysis. Springer Science & Business Media.

15. Improved rijndael-like S-box and its transform domain analysis2006Lecture Notes in Computer Science including subseries Lecture

Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)153-167 16. Evaluating algebraic attacks on the AES2003Diplom thesis, Technische

17. Generating S-Box Multivariate Quadratic Equation Systems And Estimating Algebraic Attack Resistance Aided By SageMath20151-

21 18. Resistance of S-boxes against algebraic attacks2004Lecture Notes in Computer Science (including subseries Lecture Notes in

Artificial Intelligence and Lecture Notes in Bioinformatics)83-93

19. Gröbner bases, Gaussian elimination and resolution of systems of algebraic equations1983Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)146-156

20. An introduction to Gröbner bases1994American Mathematical Soc.

21. ―Algebraic Construction of Powerful Substitution‖ International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277 3878, Volume-8 Issue-6, March 2020.

22. -―Performance Analysis of Advanced Encryption Standard (AES) S-boxes ―International Journal of Recent Technology and

Engineering (IJRTE) ISSN: 2277-3878, Volume-9 Issue-1, May 2020. 23. ‖A Review of Advanced Encryption Standard (AES) Performance‖ Benha Journal of Engineering Science and Technology (BJEST)

ISSN: 2357-0105, Volume-1 Issue-1, July 2018

6.

Authors: Mukhitdinova Firyuza Abdurashidovna, Mukhamedov Хaidarali Mеlievich

Paper Title: Improving the Legal Framework and Social Policy in the Context of a Pandemic

Abstract: The article examines the essence of social policy in the field of support in the context of a

pandemic. The analysis of the situation in the social sphere and its structural components in the Republic of

Uzbekistan in the context of the pandemic is given. It is proposed to improve the legislative framework for

improving social protection and living standards of the country's population, as well as to modernize the system

of state guarantees in the social sphere.

Keywords: law. the right to the protection of social sphere, social policy, situation, employment, strategy,

development)

References:

1. Constitution Of The Republic Of Uzbekistan. T. 2018, Uzbekistan, C 2. 2. European Convention for the protection of rights and fundamental freedoms (1950)\

3. 3. Decree of the President of the Republic of Uzbekistan no. PP-3839 dated July 5, 2018 "on measures to further improve labor

migration abroad» 4. 4. Decree of the President of the Republic of Uzbekistan dated December 10, 2018 no. PP-4056 "on improving the activities of the

National center for human rights of the Republic of Uzbekistan".

5. 5. Decree of the President of the Republic of Uzbekistan on January 9, 2019 "on radical improvement of the system of raising legal awareness and legal culture in society»

6. 6. Resolution of the President of the Republic of Uzbekistan" on additional measures to strengthen the social protection of orphans and

children left without parental care " dated February 11, 2019 7. 7. Decree of the President of the Republic of Uzbekistan dated April 23, 2019 "on additional measures to further strengthen guarantees

of the rights of the child»

8. 8. Labor Code of Uzbekistan. Leх. UzM. Young, The Techincal Writers Handbook. Mill Valley, CA: University Science, 1989.

32-35

7.

Authors: Jolan Baccay Sy, Marlon Gan Rojo, Eunelfa Regie Calibara, Alain Vincent Comendador, Wubishet

Degife

Paper Title: Multi-Station Automated Hand Washing System (MSAHWS)

Abstract: The paper presents a design and development of a multi-station automated hand-washing system

(MSAHWS) that could be integrated into overall solution strategies for combating the threat of SARS-Cov-2

infections and minimizing the health and economic devastation the virus spread can inflict. The researchers seek

to create a system that uses a single micro-controller and caters to several users, each of them being served

independently of each other. The MSAHWS development follows a four-part methodology: formulation of the

sanitary, operational, manufacturing and economic requirements; design, modeling, and simulation of the micro-

controller-based control system; MSAHWS hardware prototype development; and system test and data

collection. The MSAHWS design and development focuses on a double-station system that uses a single

Arduino Uno, an ultrasonic sensor for each station, 4 FET‘s, 4 liquid pumps, a water tank, a soap reservoir, a

power supply and a frame to house the system. The non-contact system eliminates possible viral

transmission from one person to another via the hand washing machine yet ensures the required cleanliness of

the hands. The system is first simulated in PROTEUS to test its functionality and responses based on the

demanded or required criteria. A prototype is then built to test and verify the system‘s actual operation and

responses and thence to make the necessary adjustment of parameters to realize an acceptable performance level.

Tests show that all the requirements are met. Photos of the built and tested prototype, a diagram of the initial

system design concept, a screen capture of the control system software model, a schematic diagram of the

control system, a sketch with dimensions of the hand washing machine frame or housing, and the flowchart on

which the Arduino script is developed. The operation and user-interaction of the actual system is also described.

The control system program is written such that the resulting hand washing activity complies with the WHO

36-43

Page 9: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

standard on hand washing duration and makes entirely possible a complete and hygienic hand washing activity

with soap and water. The system is envisioned for strategic deployment in public and private areas like public

markets, banks, hospitals, schools, offices, residences, and many others. The paper has shown that it is possible

to control multiple hand washing stations, each acting independently of each other, using a single micro-

controller and a proper control system programming.

Keywords: Arduino Automated System, Covid19, Handwashing, Hygiene, Proteus.

References:

1. worldometer 2020, COVID-19 CORONAVIRUS PANDEMIC, worldometer, 22 July 2020, <https://www.worldometers.info/coronavirus/ >

2. 2.worldometer 2020, WORLD / COUNTRIES / ETHIOPIA, worldometer, 22 July 2020, <https://www.worldometers.info/coronavirus/country/ethiopia/ >

3. 3.OECD 2020, COVID-19 and Africa: Socio-economic implications and policy responses, OECD, 22 July2020,

<https://www.oecd.org/coronavirus/policy-responses/covid-19-and-africa-socio-economic-implications-and-policy-responses-96e1b282/#section-d1e1646 >

4. Wikipedia 2020, COVID-19 vaccine, Wikipedia, 22 July2020,<https://en.wikipedia.org/wiki/COVID -

19_vaccine#Compressed_timelines > 5. 5.Wikipedia 2020, Hand washing, Wikipedia, 22 July2020, <https://en.wikipedia.org/wiki/Hand_ washing >

6. 6.WHO 2020, Clean Care is Safer Care, WHO, 22 July2020, <https://www.who.int/gpsc/clean_hands_ protection/en/ >

7. Hurriyatul fitriyah,Edita Rosana Widasari,Eko Setiawan, and Brian Angga kusuma ―Interaction Design of Automatic Faucet for Standard Hand-Wash‖ renew. Energy, matec web of conferences 154, 03003 (2018) icet4sd 2017

8. Swayam pragyan parida1, vikas bhatia2 "handwashing: a household social vaccine against covid 19 and multiple communicable

diseases" international journal of research in medical sciences parida sp et al. Int j res med sci. 2020 jul;8(7): www.msjonline.org pissn 2320-6071 | eissn 2320-6012

9. Michael brauer1,2, jeff t zhao1 , fiona b bennitt1 , jeffrey d stanaway1 global access to handwashing: implications for covid-19 control

in low-income countries"https://doi.org/10.1101/2020.04.07.20057117. 10. Sadru walji, shazia tanvir,marc aucoin, william a. Anderson" testing the effect of faucet flowrate on handwashing efficacy"

t:https://www.researchgate.net/publication/338921497

11. Thi sin , tran thi thu ngoc vo2,3, tran thi bich chau vo4. id" handwashing in against of coronavirus disease 2019 infection" j res clin med, 2020, 8: 19 doi: 10.34172/jrcm.2020.019 https://jrcm.tbzmed.ac.ir

12. Marta mazzotta 1, luna girolamini 1, maria rosaria pascale 1, jessica lizzadro 1, silvano salaris 1, ada dormi 2 and sandra cristino 1,"

the role of sensor‐activated faucets in surgical handwashing environment as a reservoir of legionella" pathogens 2020, 9, 446

8.

Authors: Ajendra Kumar, Preet Pal Singh, Dipa Sharma, Pawan Joshi

Paper Title: Utilization of Grid Neural Network Model and RT-PCR test to detect the COVID-19 Patients and to

avoid the Spreading of SARS-CoV-2

Abstract: In December 2019, a new virus, also named a novel coronavirus, started as an emerging pathogen

for humans and resulted in a pandemic. World Health Organization (WHO) called this novel coronavirus as

COVID-19 on 11 February 2020, and the virus responsible for causing COVID-19 is SARS-CoV-2 (severe acute

respiratory syndrome coronavirus 2), which is a positive-stranded RNA virus. This paper proposed an artificial

neural network model in a grid computing system to identify COVID-19 patients. It can help us to identify the

suspected patients and shortlist those patients who need to check by the RT-PCR test kit. The purpose of this

research is to increase the time efficiency to test those patients, which has a higher chance of getting affected by

COVID-19. Increasing the time efficiency in this type of pandemic situation can make a huge impact on

reducing the fatality rate. This is because, according to ICMR, 1,191,946 samples have been tested as of 5 May,

and 46,433 individuals have been confirmed positive. It means that only 3.85% of persons get positive results

and 96.15% persons with a negative result. It implies that the time to test this 96.15% of cases is wasted. Hence

we aim to detect the COVID-19 patients in less time and utilize this large amount of time to test those at higher

risk of being affected by this epidemic (COVID-19). This model will also help those countries to overcome the

problem of the shortage of this type of test kits such as - RT-PCR.

Keywords: Artificial Neural Network (ANN), Grid Computing, SARS-CoV-2, Reverse Transcription

Polymerase Chain Reaction (RT-PCR) test.

References:

1. Bansal, M.: Cardiovascular disease and COVID-19. Diabetes & Metabolic Syndrome: Clinical Research & Reviews, 14(3), pp.247-

250. (2020). https://doi.org/10.1016/j.dsx.2020.03.013.

2. Chan, K., Zheng, J., Mok, Y., LI, Y., Liu, Y., Chu, C. and Ip, M.: SARS: prognosis, outcome and sequelae. Respirology, 8(s1), pp.S36-S40. (2003). https://doi.org/10.1046/j.1440-1843.2003.00522.x

3. Choi, B., Madusanka, N., et.al: Convolutional Neural Network-based MR Image Analysis for Alzheimer‘s Disease

Classification. Current Medical Imaging Formerly Current Medical Imaging Reviews, 16(1), pp.27-35. (2020). DOI: 10.2174/1573405615666191021123854.

4. Czajkowski, K., Fitzgerald, S., Foster, I. and Kesselman, C., n.d. Grid information services for distributed resource

sharing. Proceedings 10th IEEE International Symposium on High Performance Distributed Computing.

5. Das, A., Rad, P., Choo, K., Nouhi, B., Lish, J. and Martel, J.: Distributed machine learning cloud teleophthalmology IoT for predicting

AMD disease progression. Future Generation Computer Systems, 93, pp.486-498, (2019).

6. Driggin, E., Madhavan, M., Bikdeli, B., et.al: Cardiovascular Considerations for Patients, Health Care Workers, and Health Systems During the COVID-19 Pandemic. Journal of the American College of Cardiology, 75(18), pp.2352-2371, (2020).

7. Gentile, S., Strollo, F. and Ceriello, A.: COVID-19 infection in Italian people with diabetes: Lessons learned for our future (an

experience to be used). Diabetes Research and Clinical Practice, 162, (2020). https://doi.org/10.1016/j.diabres.2020.108137. 8. Guan, W., Liang, W., Zhao, Y., et.al: Comorbidity and its impact on 1590 patients with COVID-19 in China: a nationwide

analysis. European Respiratory Journal, 55(5), (2020). https://doi.org/10.1183/13993003.00547-2020. 9. Guan, W., Ni, Z., Hu, Y., et.al: Clinical characteristics of 2019 novel coronavirus infection in China. The New England Journal of

Medicine. (2020). https://doi.org/10.1101/2020.02.06.20020974.

10. Han, C., Youn, C. and Jung, W.: Web-Based System for Advanced Heart Disease Identification Using Grid Computing Technology. 2008 21st IEEE International Symposium on Computer-Based Medical Systems. (2008).

44-50

Page 10: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

11. Huang, C. and Wang, Y., et.al: Clinical Features of Patients Infected with 2019 Novel Coronavirus in Wuhan, China. (2020). [online]

Available at: https://doi.org/10.1016/ S0140-6736(20)30183-5. Accessed 27 May 2020. 12. Indian Council of Medical Research, New Delhi (2020). [online] Icmr.gov.in. Available at: https://www.icmr.gov.in/. Accessed 27

May 2020.

13. Landman, A., Feetham, L. and Stuckey, D., (2020). Cancer patients in SARS-CoV-2 infection: a nationwide analysis in China. The

Lancet Oncology, [online] 21(3). Available at: https://doi.org/10.1016/ S1470-2045(20)30096-6. Accessed 27 May 2020.

14. Li, B., Yang, J., Zhao, F. et al: Prevalence and impact of cardiovascular metabolic diseases on COVID-19 in China. Clinical Research

in Cardiology, 109, 531–538. (2020). https://doi.org/10.1007/s00392-020-01626-9. 15. Liu K., fang Y.Y., et.al: Clinical characteristics of novel coronavirus cases in tertiary hospitals in Hubei Province. Chinese Medical

Journal. (2020). https://doi.org/10.1097/CM9.0000000000000744.

16. Meng J., Guohui X., et.al: Renin-angiotensin system inhibitors improve the clinical outcomes of COVID 19 patients with hypertension. Emerging Microbes and Infections, 9(1), 757-760. (2020).

17. Nasser I.M., Al-Shawwa M.O, Abu-Naser S.S: Artificial Neural Network for Diagnose Autism Spectrum Disorder. International

Journal of Academic Information Systems Research (IJAISR), 3(2), 27-32. (2019). 18. National Foundation for Infectious Diseases. 2020. Coronaviruses. [online] Available at: https://www.nfid.org/infectious-

diseases/coronaviruses/. Accessed 27 May 2020.

19. Park S.C., Tan J., et.al: Computer-aided detection of early interstitial lung diseases using low-dose CT images. Physics in Medicine and Biology, 56(4), 1139–1153. (2011).

20. Shah D., Dixit R., Shah A., Shah P., Shah M.: A Comprehensive Analysis Regarding Several Breakthroughs Based on Computer

Intelligence Targeting Various syndromes. Augmented Human Research, 5(14), (2020). https://doi.org/10.1007/s41133-020-00033-z. 21. Singh. A. K., Gupta. R., Misra. A.: Co-morbidities in Covid-19: Outcomes in hypertensive cohort and controversies with angiotensin

system blockers. Diabetes & Metabolic Syndrome: Clinical Research & Review, 14(4), 283-287. (2020).

https://doi.org/10.1016/j.dsx.2020.03.016 22. Sirois S., Wei D.Q., Du Q., Chou K.C.: Virtual Screening for SARS-CoV Protease Based on KZ7088 Pharmacophore points.

J.Chem.Inf.Comput.Sci, 44, 1111-1122. (2004). https://doi.org/10.1021/ci034270n.

23. South. A. M., Diz. D. I., Chappell. M. C.: COVID-19, ACE2, and the cardiovascular consequences. American journal of Physiology, 318(5). H1084-H1090. (2020). https://doi.org/10.1152/ajpheart.00217.2020.

24. Wang D., Hu B., et.al: Clinical Characteristics of 138 Hospitalized patients With 2019 Novel Coronavirus-Infected Pneumonia in

Wuhan, China. JAMA, 323(11). (2020). 1061-1069. doi:10.1001/jama.2020.1585. 25. Zhang P., Zhu L., et.al: Association of Inpatients Use of Angiotensin Converting Enzyme Inhibitors and Angiotensin II Receptor

Blockers with Mortality among Patients with Hypertension Hospitalized with COVID-19. Circulation Research. (2020).

https://doi.org/10.1161/CIRCRESAHA.120.317134. 26. Zhu. N., Zhang. D., Wang. W., et.al: A Novel Coronavirus from Patients with Pneumonia in China, 2019. The New England Journal of

Medicine, (2020). DOI: 10.1056/NEJMoa2001017.

9.

Authors: Ajijur Rahman, Shanowaj Choudury

Paper Title: Abstraction, the Big Idea, and it’s Significance in Science and Technology Education

Abstract: this paper discusses the role of abstraction in science and technology education. It starts with a

humble introduction of abstraction in general, while discussing the first few encounters of a learner with this

idea. Significance of abstraction and the required motivation level of learner are also discussed. An expected

change in the attitude of a learner at transition to higher studies is proposed. Thereafter the contribution of

abstraction in the evolution of Computer Science and Engineering is discussed in some detail. Moreover a

deduction of the Computer Science Curriculum is also shown along the same line as its evolution. Finally the

paper concludes with emphasizing the importance of understanding links between different layers of

abstractions.

Keywords: abstraction, computer science, learner, link

References:

1. B. P. Lathi, ―Signal Processing and Linear System,‖ 2nd Ed, Oxford university Press.

2. H. S. Hall, S. R. Knight, ―Elementary Algebra for Schools‖, Cambridge University Press.

3. P. J. Nahin, ―An Imaginary Tale: The story of i,‖ Princeton University Press. 4. Harry R. Lewis, Christos H. Papadimitriou, ―Elements of the Theory of Computation‖, Second Edition, Prentice Hall.

5. Morris Mano, ―Digital Design‖, PHI.

6. R. C Gonzalez & Woods, ―Digital Image Processing‖, Prentice Hall. 7. Davis Martin, ―Engines of Logic-mathematicians and origin of computers‖.

8. Anant Agarwal, Jeffrey H. Lang, ―Foundation of Analog and Digital Electronics,‖ Elsevier.

9. H. S. Hornby, ―Oxford Advanced learner Dictionary‖.

51-54

10.

Authors: P. Ramakrishna, T. Vamshika, M. Swathi

Paper Title: Fpga Implementation of Memory Bists using Single Interface

Abstract: The development of IC integration technologies leads to an extensive use of memories and buffers

in different memory intensive applications. Therefore, probability of occurrence of fault in every single read and

writes operation is increased in Memory BIST (MBIST). There were many testing approaches that were

developed for efficient testing and diagnosis of fault. However, all algorithms are not strengthened enough to

detect all possible faults that may be present due to fabrication errors or environmental disturbance. Keeping this

in mind and taking the possibility of development of efficient algorithm a hybrid memory testing algorithm is

presented. To overcome those drawbacks, pipelining based MBIST designed to detect the all the types of

memory faults by utilizing March-C testing algorithm. By introducing the Pipelining approach, majorly path

delays are reducing. The proposed architecture designed and verified using Xilinx ISE environment under

various testing methods with respect to the different category of memories. The simulation and synthesis results

shows that the proposed method shows the enhanced performance with the hardware resource utilization and

delay consumption compared to the conventional approaches.

55-58

Page 11: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

Keywords: DFT, MBIST, PRPG, RAM, SOC, VLSI

References:

1. Ogasahara, Yasuhiro, et al. "Implementation of pseudo-linear feedback shift register-based physical unclonable functions on silicon

and sufficient Challenge–Response pair acquisition using Built-In Self-Test before shipping." Integration 71 (2020): 144-153.

2. LIANG, Huaguo, et al. "A novel BIST scheme for circuit aging measurement of aerospace chips." Chinese Journal of Aeronautics 31.7

(2018): 1594-1601. 3. DeMara, R. F., N. Imran, and R. A. Ashraf. "Emerging Resilience Techniques for Embedded Devices." Rugged Embedded Systems:

Computing in Harsh Environments, Elsevier Publishing.

4. Jamal, K., K. Manjunatha Chari, and P. Srihari. "Test pattern generation using thermometer code counter in TPC technique for BIST implementation." Microprocessors and Microsystems 71 (2019): 102890.

5. Kumar, Mahesh. "An Efficient Fault Detection of FPGA and Memory Using Built-in Self Test [BIST]." American Journal of Electrical

and Computer Engineering 3.1 (2019): 38-45. 6. Harutyunyan, Gurgen, Samvel Shoukourian, and Yervant Zorian. "Fault Awareness for Memory BIST Architecture Shaped by

Multidimensional Prediction Mechanism." IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 38.3 (2018): 562-575.

7. Lee, Kuen-Jong, Bo-Ren Chen, and Michael Andreas Kochte. "On-chip self-test methodology with all deterministic compressed test

patterns recorded in scan chains." IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 38.2 (2018): 309-321.

8. Lee, Sanghoon, et al. "A built-in self-test andin situanalog circuit optimization platform." IEEE Transactions on Circuits and Systems I:

Regular Papers 65.10 (2018): 3445-3458. 9. Moghaddam, Elham, et al. "Logic BIST with capture-per-clock hybrid test points." IEEE Transactions on Computer-Aided Design of

Integrated Circuits and Systems 38.6 (2018): 1028-1041.

10. Efanov, Dmitry V., et al. "Synthesis of Built-in Self-Test Control Circuits Based on the Method of Boolean Complement to Constant-Weight 1-out-of-n Codes." Automatic Control and Computer Sciences 53.6 (2019): 481-491.

11. Balaji, G. Naveen, and S. Chenthur Pandian. "Design of test pattern generator (TPG) by an optimized low power design for testability

(DFT) for scan BIST circuits using transmission gates." Cluster Computing 22.6 (2019): 15231-15244. 12. Moghaddam, Elham, et al. "Logic BIST with capture-per-clock hybrid test points." IEEE Transactions on Computer-Aided Design of

Integrated Circuits and Systems 38.6 (2018): 1028-1041.

13. Cui, Xiaole, et al. "Design and Test of the In-Array Build-In Self-Test Scheme for the Embedded RRAM Array." IEEE Journal of the Electron Devices Society 7 (2019): 1007-1012.

14. Silveira, Reinaldo, Qadeer Qureshi, and Rodrigo Zeli. "Flexible architecture of memory BISTs." 2018 IEE 19th Latin-American Test

Symposium. IEEE, 2018.

11.

Authors: V. V. Mandhare, D. R Pede, P. S. Vikhe

Paper Title: Network Intrusion Detection using a Deep Learning Approach

Abstract: At present situation network communication is at high risk for external and internal attacks due to

large number of applications in various fields. The network traffic can be monitored to determine abnormality

for software or hardware security mechanism in the network using Intrusion Detection System (IDS). As

attackers always change their techniques of attack and find alternative attack methods, IDS must also evolve in

response by adopting more sophisticated methods of detection .The huge growth in the data and the significant

advances in computer hardware technologies resulted in the new studies existence in the deep learning field,

including ID. Deep Learning (DL) is a subgroup of Machine Learning (ML) which is hinged on data description.

The new model based on deep learning is presented in this research work to activate operation of IDS from

modern networks. Model depicts combination of deep learning and machine learning, having capacity of wide

range accurate analysis of traffic network. The new approach proposes non-symmetric deep auto encoder

(NDAE) for learning the features in unsupervised manner. Furthermore, classification model is constructed

using stacked NDAEs for classification. The performance is evaluated using a network intrusion detection

analysis dataset, particularly the WSN Trace dataset. The contribution work is to implement advanced deep

learning algorithm consists IDS use, which are efficient in taking instant measures in order to stop or minimize

the malicious actions.

Keywords: Intrusion Detection System (IDS), Non- Symmetric Deep Auto-Encoder (NDAE), Deep Learning

(DL), WSN Trace, Machine Learning (ML).

References:

1. R. Bace and P. Mell, ―NIST special publication on intrusion detection systems,‖ BOOZ-ALLEN AND HAMILTON INC MCLEAN VA, 2001.

2. A. Lazarevic, V. Kumar, and J. Srivastava, ―Intrusion detection: A survey,‖ in Managing Cyber Threats, Springer, 2005, pp. 19–78.

3. W. Stallings, ―Cryptography and network security principles and practices,‖ USA: Prentice Hall, 2006. 4. M. H. Aghdam and P. Kabiri, ―Feature Selection for Intrusion Detection System Using Ant Colony Optimization,‖ IJ Netw. Secur, vol.

18, no. 3, pp. 420–432, 2016.

5. C.-F. Tsai, Y.-F. Hsu, C.-Y. Lin, and W.-Y. Lin, ―Intrusion detection by machine learning: A review,‖ Expert Syst. Appl., vol. 36, no. 10, pp. 11994–12000, 2009.

6. B. Dong and X. Wang, ―Comparison deep learning method to traditional methods using for network intrusion detection,‖ in Proc. 8th

IEEE Int. Conf. Commun. Softw. Netw. Beijing, China, Jun. 2016, pp. 581–585.

7. R. Zhao, R. Yan, Z. Chen, K. Mao, P. Wang, and R. X. Gao, ―Deep learning and its applications to machine health monitoring: A

survey,‖ Submitted to IEEE Trans. Neural Netw. Learn. Syst., 2016. [Online]. Available: http://arxiv.org/abs/1612.07640.

8. S. Pouyanfar et al., ―A Survey on Deep Learning: Algorithms, Techniques, and Applications,‖ ACM Comput. Surv. vol. 51, no. 5, p. 92, 2018.

9. Y. LeCun, Y. Bengio, and G. Hinton, ―Deep learning. nature 521 (7553): 436,‖ Google Sch., 2015.

10. N. Shone, T. N. Ngoc, V. D. Phai and Q. Shi, "A Deep Learning Approach to Network Intrusion Detection," in IEEE Transactions on Emerging Topics in Computational Intelligence, vol. 2, no. 1, pp. 41-50, Feb. 2018.

11. F. Farahnakian and J. Heikkonen, ―A deep auto-encoder based approach for intrusion detection system,‖ in Advanced Communication

Technology (ICACT), 2018 20th International Conference on, 2018, pp. 178–183. 12. N. Gao, L. Gao, Q. Gao, and H. Wang, ―An intrusion detection model based on deep belief networks,‖ in Advanced Cloud and Big

Data (CBD), 2014 Second International Conference on, 2014, pp. 247– 252.

59-64

Page 12: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

13. S. Seo, S. Park, and J. Kim, ―Improvement of Network Intrusion Detection Accuracy by Using Restricted Boltzmann Machine,‖ in

Computational Intelligence and Communication Networks (CICN), 2016 8th International Conference on, 2016, pp. 413–417 14. M. A. Salama, H. F. Eid, R. A. Ramadan, A. Darwish, and A.E. Hassanien, ―Hybrid intelligent intrusion detection scheme,‖ in Soft

computing in industrial applications, Springer, 2011, pp. 293–303.

15. Y. Li, R. Ma, and R. Jiao, ―A hybrid malicious code detection method based on deep learning,‖ methods, vol. 9, no. 5, 2015.

16. K. Alrawashdeh and C. Purdy, ―Toward an online anomaly intrusion detection system based on deep learning,‖ in Machine Learning

and Applications (ICMLA), 2016 15th IEEE International Conference on, 2016, pp. 195–200.

17. J. Kim, J. Kim, H. L. T. Thu, and H. Kim, ―Long short term memory recurrent neural network classifier for intrusion detection,‖ in Platform Technology and Service (PlatCon), 2016 International Conference on, 2016, pp. 1–5.

18. C. Yin, Y. Zhu, J. Fei, and X. He, ―A deep learning approach for intrusion detection using recurrent neural networks,‖ IEEE Access,

vol. 5, pp. 21954–21961, 2017. 19. S. Althubiti, W. Nick, J. Mason, X. Yuan, and A. Esterline, ―Applying Long Short-Term Memory Recurrent Neural Network for

Intrusion Detection,‖ in SoutheastCon 2018, 2018, pp. 1–5.

20. T. A. Tang, S. Ali, R. Zaidi, D. Mclernon, L. Mhamdi, and M. Ghogho, ―Deep Recurrent Neural Network for Intrusion Detection in SDN-based Networks,‖ in 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft), 2018, pp. 25–29.

21. Y. Yao, Y. Wei, F. Gao, and G. Yu, ―Anomaly intrusion detection approach using hybrid MLP/CNN neural network,‖ in Intelligent

Systems Design and Applications, 2006. ISDA‘06. Sixth International Conference on, 2006, vol. 2, pp. 1095–1102. 22. K. Wu, Z. Chen, and W. Li, ―A Novel Intrusion Detection Model for a Massive Network Using Convolutional Neural Networks,‖

IEEE Access, vol. 6, pp. 50850–50859, 2018.

23. J. Kim, N. Shin, S. Y. Jo, and S. H. Kim, ―Method of intrusion detection using deep neural network,‖ in Big Data and Smart Computing (BigComp), 2017 IEEE International Conference on, 2017, pp. 313–316.

24. T. A. Tang, L. Mhamdi, D. McLernon, S. A. R. Zaidi, and M. Ghogho, ―Deep learning approach for network intrusion detection in

software defined networking,‖ in Wireless Networks and Mobile Communications (WINCOM), 2016 International Conference on, 2016, pp. 258–263.

25. Revathi, S & Malathi, A. (2013). A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for

Intrusion Detection. International Journal of Engineering Research & Technology (IJERT). 2. 1848-1853. 26. Claude Turner*, Rolston Jeremiah, Dwight Richards, Anthony Joseph, ―A Rule Status Monitoring Algorithm for Rule-Based Intrusion

Detection and Detection Systems‖, Procedia Computer Science, ISSN: 1877-0509, Vol: 95, Page: 361-368, 2016

12.

Authors: Anjani K. Upadhyay, Debasmita Chatterjee, Madhuri Swain, Lopamudra Ray

Paper Title: Evaluation of a Potential Antibacterial, Produced by Streptomyces Cinereoruber Sp. Isolated from

Chlika lake.

Abstract: Streptomyces, isolated from marine and estuarine habitat have been widely recognized as a

potential source of antifungal, anti-tumour, anti-bacterial compounds. In the present study, the antimicrobial

agent production potential of a Streptomyces cinereoruber sp was evaluated. The selective isolation of the strain

was carried out on starch casein agar. The primary screening of the Streptomyces isolate was done by cross

streak method against pathogenic test strains Escherichia.coli MTCC 82, Staphylococcus aureus MTCC 96,

Bacillus cereus IP406 and Salmonella typhi MTCC 734 and Micrococcus leuteus and the antimicrobial property

against Micrococcus leuteus was confirmed. The secondary screening was carried out by using the culture

supernatant against the test strain by agar well diffusion method. The growth and antimicrobial production

ability of the strain against Micrococcus leuteus was studied. The antimicrobial agent production was also

observed till pH 11 and NaCl concentration 3% (w/v). The partially purified compound showed a peak similar to

streptomycin in HPLC. The culture condition for the production of the compound was optimised.

Keywords: Streptomyces, Antibacterial, Optimization

References:

1. Andrews, J. M. 2001. Determination of minimum inhibitory concentrations. J. Antimicrob. Chemother. 48(Suppl. 1):5–16

2. Betina V.1983. The chemistry and biology of antibiotics. Amsterdam: Elsevier Scientific Pub. Co; p. 190.

3. Costanza R, Kemp WM, Boynton WR.1993. Predictability, scale, and biodiversity in coastal and estuarine ecosystems: implications for management. Ambio.1:88-96.

4. de lima procopio, R. E; da silva, I. R; Martins, M.K; de azevedo, J.L & de Araujo, J. M. (2012) Antibitics produced by Streptomyces.

Braz J Infect Dis. 16: 466-471.

5. Goodfellow, M. (1989). The Actinomycetes I. Supragenericclassifcation of actinomycetes. In Bergey's Manual of

SystematicBacteriology, vol. 4, pp. 2333±2339. Edited by S. T. Williams, M. E. Sharpe & J. G. Holt. Baltimore: Williams &Wilkins. 6. Goodfellow, M., Kumar, Y., Labeda, D. P. & Sembiring, L. 2007. The Streptomyces violaceusniger clade: a home for streptomycetes

with rugose ornamented spores. Antonie Van Leeuwenhoek 92,173-99.

7. Gordon, R. E., Barnett, D. A., Handerhan, J. E. and Pang, C. H.N. 1974. Nocardia coeliaca, Nocardia autotrophica, and the nocardin strain. Int J Bacteriol 24, 54-63.

8. Holder, I.A., and Boyce, S. T. 1994. Agar well diffusion assay testing of bacteriak susceptibilitu to various antimicrobials in

concentration non-toxic for human cell in culture. Burns, 20 426-429. 9. Jayapal KP, Lian W, Glod F, Sherman DH, Hu WS. 2007. Comparative genomic hybridizations reveal absence of large Streptomyces

coelicolor genomic islands in Streptomyces lividans. BMC Genomics, 8:229.

10. Kagan IA, Flythe MD. 2014. Thin-layer chromatographic (TLC) separations and bioassays of plant extracts to identify antimicrobial compounds. JoVE. (85).

11. Kampfer, P. & Labeda, D. P. 2006. International Committee on Systematics of Prokaryotes; Subcommittee on the taxonomy of the

Streptomycetaceae: Minutes of the meeting, 25 July 2005, San Francisco, CA, USA. Int J Syst Evol Microbiol 56, 495.

12. Kelly, K.I. 1964. Inter-society color council-national bureau of standard color-name charts illustrated with centroid colors. US

Government Printing Office, Washington. 13. Shirling, E. B. & Gottlieb, D. 1966. Methods for characterization of Str8eptomyces species. Int J Syst Bacteriol 16, 313–340.

14. Srinivas TN, Kumar PA, Sucharitha K, Sasikala C, Ramana CV.2009. Allochromatium phaeobacterium sp. nov. Int J Syst Evol Microbiol. 59:750-3.

15. Sucharita K, Sasikala C, Park SC, Baik KS, Seong CN, Ramana CV.2009. Shewanella chilikensis sp. nov., a moderately alkaliphilic

gammaproteobacterium isolated from a lagoon. International journal of systematic and evolutionary microbiology.59:3111-5. 16. Taddi, A; Rodriguez, H. J.; Marquez-Vilchez; Castelli, C. 2006. Isolation and identification of streptomyces sp. From venezuelan site:

Morphological and biochemical studies. Microbiological Research 161:222-231.

17. Tindall, B. J., Sikorski, J., Smibert, R. M. & Kreig, N. R. 2007. Phenotypic characterization and the principles of comparative systematics. In Methods for General and Molecular Microbiology, 3rd edn, pp. 330–393. Edited by C. A. Reddy, T. J. Beveridge, J. A.

Breznak, G. A. Marzluf, T. M. Schmidt & L. R. Snyder. Washington, DC: American Society for Microbiology.

18. Williams, S.T., Goodfellow, M., Alderson, G., Wellington, E. M. H., Sneath, P. H. A., Sackin, M. J. 1983. Numerical classification of

65-69

Page 13: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

Streptomyces and related genera. J. Gen Microbiol 129, 1743-1813.

19. Williams, S.T., Goodfellow, M., & Alderson, G. 1989. Genus Streptomyces Waksman and Henrici 1943. 339 AL. In Bergey’s manual of Sytematic Bacteriology, vol. 4, pp. 2452-2492. Edited by S.T. Williams, M. E. Sharpe & J. G. Holt. Baltimore: Williama &Wikins.

13.

Authors: P.Pitchaipandi, C.Baskaran

Paper Title: Use of Web 2.0 Social Networking Sites for Collaborative Sharing Research Information by the

Social Science Research Scholars at Alagappa University, Karaikudi.

Abstract: This study attempts to the Web 2.0 Social Networking Sites for Collaborative Sharing Research

Information by the Social Science Research Scholars at Alagappa University, Karaikudi. A sample size 97

Scholars was selected by random sampling method. The data required for the study were collected through a

questionnaire. The findings of the study: 30.9% of the respondents using Facebook/ WhatsApp along with most

highly used in the popular web browser used for Google chrome 72.2% Google chrome. 48.5% of respondents‘

preference of ―Very Strongly Agree‖ Collaborate with Research projects and Teams. Whereas 46.4% ―Research

Collaboration ―Strongly agree‖ of the respondents respectively. 30.9% purpose of Web 2.0 for Collaborations of

Research Communication while 19.6% Opportunities and Learning for Web 2.0 tools support social interaction

in the learning process of the respondents respectively.

Keywords: Web 2.0 tools, Collaborative learning, Sharing Research Information, Web 2.0 Opportunities,

Blog/Wiki articles.

References:

1. Seema Sood, S. K. (2015). Web 2.0 Technology, Social Online Networking And Its Implications For Academic Libraries. International

Journal of Digital Library Services , 5 (1), 38-47. 2. Gopal, K. (2001). Intellectual freedom in Digital Libraries , Scholarly Books, 1-287.

3. Baskaran, C. (2018). Use of Social Networks (SNs) and Medias on Dissemination of Scholarly information among the Research Scholars in Alagappa University, Karaikudi, Tamil Nadu. Journal of Advances in Library and Information Science, 7(3), 257-261.

4. Baskaran, C. (2014). Information Resources Access Pattern at Alagappa University Library, Karaikudi, and Tamilnadu,

India. International Journal of Library and Information Studies, 4(1), 19-23. 5. Baskaran, C. (2019). Scholarly Information Share through Social Networks (SNs) and Medias among Social Science Scholars in

selected State Universities in Tamilnadu. International Journal of Library and Information Studies, 9(3), 83-92.

6. Baskaran, C., & Prasad, M. (2019). Research Quantify with faculty member's perception and expectations in e-context at the academic sphere. Library Philosophy and Practice, 1-16.

7. Baskaran, C., & Binu, P. C. (2019). Information acceleration into access on acquiring skill under consortium based resources in the

selected Universities of Kerala, India. Library Philosophy and Practice, 1-17. 8. Tautkevičienė, G., & Dubosas, M. (2014). The Purposes of Students‘ Use of Web 2.0 Tools for Learning at the University. Journal of

Emerging Trends in Computing and Information Sciences, 5(12).

9. Williams, J. B., & Jacobs, J. (2004). Exploring the use of blogs as learning spaces in the higher education sector. Australasian journal of educational technology, 20(2).

10. Chang, A. (2011). Web 2.0 Social Network Sites And Facebook Marketing. Binus Business Review, 2(2), 708-717.

70-74

14.

Authors: Pankaj Agarwal, Sapna Yadav, Juhi Chaudhary

Paper Title: How India and its Neighbors are doing during Covid-19 Pandemics- a Critical Analysis

Abstract: The prime objective of this work is to understand how India & its neighbors are doing during the

ongoing period of Covid-19 pandemics. We have used the web crawlers to find specific data of India from

official website www.mohfw.gov.in. We also referred to a dataset of global cases from Gitub for our work. We

have analyzed the covid19 cases from 22/1/2020 till 1/5/2020. We applied a time series prediction model to

forecast the possible deaths for next five days. We have taken into account six of our neighbors excluding China

to understand how India is doing in comparison to our neighbors. We observed that considering the size of India

population India has done fairly well. However the number of increasing cases in India particularly in the month

of May needs a serious call from Indian Govt. We have presented the outcomes of our work through different

kinds of comparisons & analysis. He have presented the prediction of next ten days for India & its neighbors for

the duration 4/5/2020 to 13/5/2020

Keywords: Covid-19, SARIMA model, Prediction Analysis, Time Series, Indian Neighbors

References:

1. www.mohfw.gov.in

2. World Health Organization (WHO): https://www.who.int/

3. Johns Hopkins CSSE: https://github.com/CSSEGISandData/COVID-19 4. WorldoMeters: https://www.worldometers.info/coronavirus/

75-79

15.

Authors: Carlos I. Poclin Meza, Kevin L. Monteza Corrales, Lenis R. Wong Portillo

Paper Title: Techniques for Malignant Melanoma Diagnosis: A Systematic Literature Review

Abstract: Malignant melanoma is the deadliest type of skin cancer. If melanoma detection and diagnosis is

performed in its early stages, the probabilities of recovery and survival are higher. Dermoscopy is a manual

method which is applied by doctors to diagnose this disease, but it strongly depends on the experience of the

specialist who performs this skin assessment. Although, many proposals have been made for automated

detection and diagnosis of malignant melanoma based on images processing, there are still improvement

opportunities for melanoma diagnosis. This paper aims to identify the current status of the latest researches

related to techniques for malignant melanoma diagnosis based on images analysis, considering the three research

questions that have been elaborated for the systematic literature review: Q1) Which are the latest methods for

80-86

Page 14: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

malignant melanoma detection? Q2) Which systems for malignant melanoma diagnosis have been implemented

in the last 5 years? And Q3) Which CAD systems for malignant melanoma detection have been developed?

Furthermore, a cross-analysis of the outcome was performed. The results propose the implementation of systems

using Inception V3 and the classifier Support Vector Machine, which achieved high accuracies in malignant

melanoma diagnosis based on images processing.

Keywords: CAD Systems for Melanoma Diagnosis, CNN for Melanoma Detection, Dermoscopic Images

Processing, Melanoma Detection, Support Vector Machine.

References:

1. I. Márquez Rodas, J. A. Avilés, E. Mercader, J. L. Escat, V. Parra, and A. Álvarez. 2020. ―Melanoma‖. In Sociedad Española de

Oncología Médica. Available: https://seom.org/info-sobre-el-cancer/melanoma?showall=1.

2. N. E. Herrera Gonzáles and A. Y. Aco Flores, ―El melanoma en México‖, Revista de Especialidades Medico-Quirurgicas, vol. 15, no. 3, pp. 161-164, julio–septiembre 2010.

3. World Health Organization (WHO). 2005. ―La Organización Mundial de la Salud desaconseja el uso de camas solares a las personas

menores de 18 años‖. Available: https://www.who.int/mediacentre/news/notes/2005/np07/es/. 4. L. Wong, D. Mauricio, and G. Rodriguez. ―A Systematic Literature Review About Software Requirements Elicitation‖. In Journal of

Engineering Science and Technology (JESTEC), pp. 296 – 317, Feb. 2017.

5. B. A. Kitchenham and S. Charters. ―Guidelines for performing systematic literature reviews in software engineering version 2.3‖. Retrieved January 9, 2014. Available: http://www.elsevier.com/__data/promis_misc/ 525444systematicreviewsguide.pdf.

6. L. Rosado, M. João, M. Vasconcelos, and M. Ferreira. 2015. ―Pigmented skin lesion computerized analysis via mobile devices‖. In

Proceedings of the 31st Spring Conference on Computer Graphics (SCCG ‘15). Association for Computing Machinery, New York, NY, USA, 105–108. DOI: https://doi.org/10.1145/2788539.2788553.

7. A. Sáez, J. Sánchez-Monedero, P. A. Gutiérrez, and C. Hervás-Martínez, "Machine Learning Methods for Binary and Multiclass

Classification of Melanoma Thickness From Dermoscopic Images," in IEEE Transactions on Medical Imaging, vol. 35, no. 4, pp. 1036-1045, April 2016, doi: 10.1109/TMI.2015.2506270.

8. Z. Waheed, A. Waheed, M. Zafar, and F. Riaz, "An efficient machine learning approach for the detection of melanoma using

dermoscopic images," 2017 International Conference on Communication, Computing and Digital Systems (C-CODE), Islamabad, 2017, pp. 316-319, doi: 10.1109/C-CODE.2017.7918949.

9. A. A. A. Al-abayechi, H. A. Jalab, and R. W. Ibrahim. 2017. ―A classification of skin lesion using fractional poisson for texture feature

extraction‖. In Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing (ICC ‘17). Association for Computing Machinery, New York, NY, USA, Article 136, 1–7. DOI: https://doi.org/10.1145/3018896.3036379.

10. L. Yu, H. Chen, Q. Dou, J. Qin, and P. Heng, "Automated Melanoma Recognition in Dermoscopy Images via Very Deep Residual

Networks," in IEEE Transactions on Medical Imaging, vol. 36, no. 4, pp. 994-1004, April 2017, doi: 10.1109/TMI.2016.2642839. 11. A. H. Shahin, A. Kamal, and M. A. Elattar, "Deep Ensemble Learning for Skin Lesion Classification from Dermoscopic Images," 2018

9th Cairo International Biomedical Engineering Conference (CIBEC), Cairo, Egypt, 2018, pp. 150-153, doi:

10.1109/CIBEC.2018.8641815.

12. L. B. Maia, A. Lima, R. M. Pinheiro Pereira, G. B. Junior, J. Dallyson Sousa de Almeida, and A. C. de Paiva, "Evaluation of

Melanoma Diagnosis using Deep Features," 2018 25th International Conference on Systems, Signals and Image Processing (IWSSIP), Maribor, 2018, pp. 1-4, doi: 10.1109/IWSSIP.2018.8439373.

13. A. Gupta, M. Bhatnagar, A. Issac, M. K. Dutta, and C. M. Travieso. 2019. ―Imaging method for noise removal and segmentation of

skin lesions from dermoscopic images‖. In Proceedings of the 2nd International Conference on Applications of Intelligent Systems (APPIS ‘19). Association for Computing Machinery, New York, NY, USA, Article 16, 1–5. DOI:

https://doi.org/10.1145/3309772.3309788.

14. J. Jaworek-Korjakowska, P. Kleczek, and M. Gorgon, "Melanoma Thickness Prediction Based on Convolutional Neural Network With VGG-19 Model Transfer Learning," 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW),

Long Beach, CA, USA, 2019, pp. 2748-2756, doi: 10.1109/CVPRW.2019.00333.

15. R. Ali, R. C. Hardie, B. Narayanan Narayanan, and S. De Silva, "Deep Learning Ensemble Methods for Skin Lesion Analysis towards Melanoma Detection," 2019 IEEE National Aerospace and Electronics Conference (NAECON), Dayton, OH, USA, 2019, pp. 311-316,

doi: 10.1109/NAECON46414.2019.9058245.

16. O. Abuzaghleh, B. D. Barkana, and M. Faezipour, "Noninvasive Real-Time Automated Skin Lesion Analysis System for Melanoma Early Detection and Prevention," in IEEE Journal of Translational Engineering in Health and Medicine, vol. 3, pp. 1-12, 2015, Art no.

4300212, doi: 10.1109/JTEHM.2015.2419612.

17. N. C. F. Codella, Q.-B. Nguyen, S. Pankanti, D. A. Gutman, B. Helba, A. C. Halpern, and J. R. Smith. 2017. ―Deep learning ensembles

for melanoma recognition in dermoscopy images‖. IBM J. Res. Dev. 61, 4–5 (July/September 2017), 5:1–5:15. DOI:

https://doi.org/10.1147/JRD.2017.2708299.

18. Y. Hasija, N. Garg, and S. Sourav, "Automated detection of dermatological disorders through image-processing and machine learning," 2017 International Conference on Intelligent Sustainable Systems (ICISS), Palladam, 2017, pp. 1047-1051, doi:

10.1109/ISS1.2017.8389340.

19. S. Mustafa and A. Kimura, "A SVM-based diagnosis of melanoma using only useful image features," 2018 International Workshop on Advanced Image Technology (IWAIT), Chiang Mai, 2018, pp. 1-4, doi: 10.1109/IWAIT.2018.8369646.

20. S. M. Alizadeh and A. Mahloojifar, "A Mobile Application for Early Detection of Melanoma by Image Processing Algorithms," 2018

25th National and 3rd International Iranian Conference on Biomedical Engineering (ICBME), Qom, Iran, 2018, pp. 1-5, doi: 10.1109/ICBME.2018.8703575.

21. R. Moussa, F. Gerges, C. Salem, R. Akiki, O. Falou, and D. Azar, "Computer-aided detection of Melanoma using geometric features,"

2016 3rd Middle East Conference on Biomedical Engineering (MECBME), Beirut, 2016, pp. 125-128, doi: 10.1109/MECBME.2016.7745423.

22. Y. Ge, B. Li, Y. Zhao, E. Guan, and W. Yan. 2018. ―Melanoma Segmentation and Classification in Clinical Images Using Deep

Learning‖. In Proceedings of the 2018 10th International Conference on Machine Learning and Computing (ICMLC 2018). Association for Computing Machinery, New York, NY, USA, 252–256. DOI: https://doi.org/10.1145/3195106.3195164.

23. N. Hameed, A. Shabut, and M. A. Hossain, "A Computer-aided diagnosis system for classifying prominent skin lesions using machine

learning," 2018 10th Computer Science and Electronic Engineering (CEEC), Colchester, United Kingdom, 2018, pp. 186-191, doi: 10.1109/CEEC.2018.8674183.

24. Z. Yu et al., "Melanoma Recognition in Dermoscopy Images via Aggregated Deep Convolutional Features," in IEEE Transactions on

Biomedical Engineering, vol. 66, no. 4, pp. 1006-1016, April 2019, doi: 10.1109/TBME.2018.2866166. 25. L. Rosado and M. J. Vasconcelos. ―Automatic segmentation methodology for dermatological images acquired via mobile devices‖, in

8th International Conference on Health Informatics, 2015, pp. 246-250.

26. M. J. M. Vasconcelos, L. Rosado, and M. Ferreira. ―Border abruptness assessment methodology for skin lesion image analysis‖, in 20th Edition of the Portuguese Conference on Pattern Recognition, 2014.

27. M. J. M. Vasconcelos, L. Rosado, and M. Ferreira. ―Principal axes-based asymmetry assessment methodology for skin lesion image

analysis‖, in Advances in Visual Computing-Springer, 2014, pp. 21-31. 28. M. J. M. Vasconcelos, L. Rosado, and M. Ferreira. ―A new color assessment methodology using cluster-based features for skin lesion

Page 15: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

analysis‖, in 38th International ICT Convention MIPRO, 2015.

29. M. A. Hall and G. Holmes. ―Benchmarking attribute selection techniques for discrete class data mining‖, Knowledge and Data Engineering IEEE Transactions on 15, 2003, pp. 1437-1447.

30. H. Liu and L. Yu. ―Toward integrating feature selection algorithms for classification and clustering‖, Knowledge and Data Engineering

IEEE Transactions on 17, 2005, pp. 491-502.

31. R. B. Oliveira, A. S. Pereira, and J. M. R. S. Tavares. 2018. ―Computational diagnosis of skin lesions from dermoscopic images using

combined features‖. Neural Computing and Applications, 8.

32. N. Otsu, ―Threshold selection method from gray-level histograms.‖ IEEE Trans Syst Man Cybern, vol. SMC-9, no. 1, pp. 62–66, 1979. 33. M. Celebi, H. Kingravi, B. Uddin, H. Iyatomi, Y. Aslandogan, W. Stoecker, and R. Moss, ―A methodological approach to the

classification of dermoscopy images,‖ Computerized Medical Imaging and Graphics, vol. 31, no. 6, pp. 362–373, 2007.

34. A. Sáez, C. Serrano, and B. Acha, ―Model-based classification methods of global patterns in dermoscopic images,‖ IEEE Transactions on Medical Imaging, vol. 33, no. 5, pp. 1137–1147, 2014.

35. T. Ojala, M. Pietikinen, and T. Menp, ―Multiresolution gray-scale and rotation invariant texture classification with local binary

patterns,‖ IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 24, no. 7, pp. 971–987, 2002. 36. C. Hervás-Martínez and F. Martínez-Estudillo, ―Logistic regression using covariates obtained by product-unit neural network models,‖

Pattern Recognition, vol. 40, no. 1, pp. 52–64, 2007.

37. C. Hervás-Martínez, F. J. Martínez-Estudillo, and M. Carbonero-Ruz, ―Multilogistic regression by means of evolutionary product-unit neural networks,‖ Neural Networks, vol. 21, no. 7, pp. 951–961, 2008.

38. A. A. Abbas and W.-H. Tan. 2013. ―An improved Automatic Segmentation Skin Lesion from Dermoscopic Images Using Optimal

RGB Channel‖. In Conference on Computer Science & Computational Mathematics (ICCSCM 2013), 39. 39. A. A. A. Al-Abayechi, R. Logeswaran, X. Guo, and W.-H. Tan. 2013. ―Lesion border detection in dermoscopy images using bilateral

filter‖. In Signal and Image Processing Applications (ICSIPA), 2013 IEEE International Conference on IEEE, 365-368.

40. K. Sikka, N. Sinha, P. K. Singh, and A. K. Mishra. 2009. ―A fully automated algorithm under modified FCM framework for improved brain MR image segmentation‖. Magnetic Resonance Imaging 27, 7, 994-1004.

41. N. Otsu. 1975. ―A threshold selection method from gray-level histograms‖. Automatica 11, 285-296, 23-27.

42. N. Laskin. 2003. ―Fractional poisson process‖. Communications in Nonlinear Science and Numerical Simulation 8, 3, 201-213. 43. N. Razmjooy, B. S. Mousavi, F. Soleymani, and M. H. Khotbesara. 2013. ―A computer-aided diagnosis system for malignant

melanomas‖. Neural Computing and Applications 23, 7-8, 2059-2071.

44. T. G. Dietterich. 2000. ―Ensemble methods in machine learning‖. In International workshop on multiple classifier systems Springer, 1-15.

45. J. M. D. C. Viana. 2009. ―Classification of skin tumours through the analysis of unconstrained images‖.

46. P. Li, Gennady. Samorodnitsk, and John. Hopcroft, "Sign cauchy projections and chi-square kernel," presented at the Proc. Adv. Neural Inform. Process. Syst., 2013.

47. K. He, X. Zhang, S. Ren, and J. Sun, ―Deep Residual Learning for Image Recognition,‖ in 2016 IEEE Conference on Computer Vision

and Pattern Recognition (CVPR), 2016, pp. 770–778. 48. A. Vedaldi and A. Zisserman, "Efficient Additive Kernels via Explicit Feature Maps". In IEEE Trans. Pattern Anal. Mach. Intell., vol.

34, pp. 480-492, 2012.

49. M. Faraki, M. Harandi, A. Wiliem, and B. Lovell, "Fisher tensors for classifying human epithelial cells". In Pattern Recognit., vol. 47, pp. 2348-2359, 2014.

50. C. Szegedy, V. Vanhoucke, S. Ioffe, J. Shlens, and Z. Wojna, ―Rethinking the Inception Architecture for Computer Vision‖. In 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2016, pp. 2818–2826

51. B. Lei, W. Li, Y. Yao, X. Jiang, E. Tan, J. Qin, et al., "Multi-modal and multi-layout discriminative learning for placental maturity

staging," in Pattern Recognit., ed, 2016. 52. K. Simonyan and A. Zisserman, ―Very deep convolutional networks for large-scale image recognition‖, 2014.

53. C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov, D. Erhan, V. Vanhoucke, and A. Rabinovich, ―Going deeper with

convolutions‖, in Proceedings of the IEEE conference on computer vision and pattern recognition, 2015, pp. 1–9. 54. B. Efron, ―The efficiency of logistic regression compared to normal discriminant analysis,‖ Journal of the American Statistical

Association, vol. 70, no. 352, pp. 892–898, 1975.

55. M. A. Hearst, S. T. Dumais, E. Osuna, J. Platt, and B. Scholkopf, ―Support vector machines,‖ IEEE Intelligent Systems and their applications, vol. 13, no. 4, pp. 18–28, 1998.

56. H. Zhang, ―The optimality of naive bayes,‖ AA, vol. 1, no. 2, p. 3, 2004.

57. Y. Freund and R. E. Schapire, ―A decision-theoretic generalization of on-line learning and an application to boosting,‖ Journal of computer and system sciences, vol. 55, no. 1, pp. 119–139, 1997.

58. T. K. Ho, ―Random decision forests,‖ in Document analysis and recognition, 1995., proceedings of the third international conference

on, vol. 1. IEEE, 1995, pp. 278–282. 59. N. V. Chawla, K. W. Bowyer, L. O. Hall, and W. Philip Kegelmeyer. ―Smote: Synthetic minority oversampling technique‖. J. Artif.

Intell. Res., 16:321–357, 2002.

60. G. Huang, Z. Liu, L. van der Maaten, and K. Q. Weinberger. ―Densely connected convolutional networks‖. In 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pages 2261–2269, 2017.

61. G. D. Finlayson, and E. Trezzi. 2004. ―Shades of gray and colour constancy‖. In Color and Imaging Conference (Vol. 2004, No. 1, pp.

37-41). Society for Imaging Science and Technology. 62. D. Whiteman and A. Green, ―Melanoma and sunburn‖, Cancer Causes Control, vol. 5, no. 6, pp. 564-572, 1994.

63. C. Cortes and V. Vapnik, ―Support-vector networks‖, Mach. Learn., vol. 20, no. 3, pp. 273-297, 1995.

64. G. H. John and P. Langley, "Estimating continuous distributions in Bayesian classifiers," in Proceedings of the Eleventh conference on Uncertainty in artificial intelligence, 1995, pp. 338-345: Morgan Kaufmann Publishers Inc.

65. J. Long, E. Shelhamer, and T. Darrell, ―Fully convolutional networks for semantic segmentation‖, 2015. [Online]. Available:

https://arxiv.org/abs/1411.4038. 66. A. Krizhevsky, I. Sutskever, and G. E. Hinton, ―ImageNet classification with deep convolutional neural networks,‖ in Proc. Adv.

Neural Inf. Process. Syst., 2012, pp. 1106–1114. [Online]. Available: https://papers.nips.cc/paper/4824-imagenetclassification-with-

deep-convolutional-neural-networks.pdf. 67. O. Ronneberger, P. Fischer, and T. Brox, ―U-net: Convolutional networks for biomedical image segmentation,‖ in Medical Image

Computing and Computer-Assisted Intervention (MICCAI) (Lecture Notes in Computer Science, vol. 9351). New York, NY, USA:

Springer, 2015, pp. 234–241. [Online]. Available: http://arxiv.org/abs/1505.04597. 68. R. Carsten, K. Vladimir, and B. Andrew, "Grabcut: Interactive foreground extraction using iterated graph cuts.," ACM Transactions on

Graphics (SIGGRAPH), vol. 23, no. 3, pp. 309-314, 2004.

69. American Academy of Dermatology, "What to look for: ABCDEs of melanoma," October 2017. [Online]. Available: https:/Iwww.aad.org/public/spot-skin-cancer/learn-about-skin-cancer/detect/what-to-look-for.

70. C. Hsu and C. Chang, ―A practical guide to support vector classification‖, Department of Computer Science, National Taiwan

University, Tech. Rep., 2003. 71. S. Jain, N. Pise, and others, ―Computer aided Melanoma skin cancer detection using Image Processing,‖ Procedia Comput. Sci., vol.

48, pp. 735–740, 2015.

16. Authors: Isaac Ñuflo, Franco Mecca, Lenis Wong

Page 16: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

Paper Title: Machine Learning and Deep Learning Techniques, Features and Obstacles in the Cataract

Diagnosis

Abstract: Cataract is a degenerative condition that, according to estimations, will rise globally. Even though

there are various proposals about its diagnosis, there are remaining problems to be solved. This paper aims to

identify the current situation of the recent investigations on cataract diagnosis using a framework to conduct the

literature review with the intention of answering the following research questions: RQ1) Which are the existing

methods for cataract diagnosis? RQ2) Which are the features considered for the diagnosis of cataracts? RQ3)

Which is the existing classification when diagnosing cataracts? RQ4) And Which obstacles arise when

diagnosing cataracts? Additionally, a cross-analysis of the results was made. The results showed that new

research is required in: (1) the classification of ―congenital cataract‖ and, (2) portable solutions, which are

necessary to make cataract diagnoses easily and at a low cost.

Keywords: Cataract Diagnosis, Image Processing, Ophthalmology, Machine Learning Techniques, Deep

Learning Techniques.

References:

1. J. Jamison, cataracts, clinical guide to nutrition & dietary supplements in disease management, 2003, pp. 259-264.

2. W. Sodeman and t. Sodeman, cataracts: patient and caregiver‘s guide, instructions for geriatic patients, 2005, pp. 70.

3. R. Abel, cataracts, integrative medicine, vol. 4, 2018, pp. 830-837. 4. L. Wong, d. Mauricio and g. Rodriguez, a systematic literature review about software requirements elicitation, journal of engineering

science and technology, v. 12, n. 2, 2017, pp. 296-317.

5. B.a. Kitchenham and s. Charters, guidelines for performing systematic literature reviews in software engineering version 2.3, 2007 6. M. Kugamourthy and o. Goonetileke, ―eophthalmologist -- intelligent eye disease diagnosis system‖, 5th conference on intelligent

systems, modelling and simulation, 2014, pp. 339-344.

7. J. Zheng, l. Guo and l. Peng, ―fundus image based cataract classification‖, ieee international conference on imaging systems and techniques (ist) proceedings, 2014, pp. 1-6.

8. X. Gao, s. Lin and t. Y. Wong, ―automatic feature learning to grade nuclear cataracts based on deep learning‖, ieee transactions on

biomedical engineering, vol. 62, 2015, pp. 2693-2701. 9. S. Patange and a. Jagadale, ―framework for detection of cataract and gradation according to its severity‖, international conference on

pervasive computing (icpc), 2015, pp. 1-3.

10. M. Kaur, j. Kaur and r. Kaur, ―low cost cataract detection system using smart phone‖, international conference on green computing and internet of things (icgciot), 2015, pp. 1607-1609.

11. Y. N. Fuadah, a. W. Setiawan, t. L. R. Mengko and budiman, ―mobile cataract detection using optimal combination of statistical

texture analysis‖, 4th international conference on instrumentation, communications, information technology, and biomedical engineering (icici-bme), 2015, pp. 232-236.

12. L. Guo, j. Yang, l. Peng, j. Li and q. Liang, ―a computer-aided healthcare system for cataract classification and grading based on

fundus image analysis‖, computers in industry, vol. 69, 2015, pp. 72-80. 13. V. Harini and v. Bhanumathi, ―automatic cataract classification system‖, international conference on communication and signal

processing (iccsp), 2016, pp. 0815-0819.

14. D. Patil, a. Nair, n. Bhat, r. Chavan and d. Jadhav, ―analysis and study of cataract detection techniques‖, international conference on global trends in signal processing, information computing and communication (icgtspicc), 2016, pp. 516-519.

15. i. Shaheen and m. U. Akram, ―an integrated framework for clinical grading of cataract‖, 1st international conference on next

generation computing applications (nextcomp), 2017, pp. 92-97. 16. Z. Qiao, q. Zhang, y. Dong and j. Yang, ―application of svm based on genetic algorithm in classification of cataract fundus images‖,

ieee international conference on imaging systems and techniques (ist), 2017, pp. 1-5.

17. J. Rana and s. M. Galib, ―cataract detection using smartphone‖, 3rd international conference on electrical information and communication technology (eict), 2017, pp. 1-4.

18. J. Li, q. Hu, a. Imran, l. Zhang, j. Yang and q. Wang, ―vessel recognition of retinal fundus images based on fully convolutional

network‖, ieee 42nd annual computer software and applications conference (compsac), 2018, pp. 413-418. 19. J. Cheng, ―sparse range-constrained learning and its application for medical image grading‖, ieee transactions on medical imaging, vol.

37, 2018, pp. 2729-2738.

20. A. Dixit, s. Pathak, r. Raj, c. Naveen and v. R. Satpute, ―an efficient fuzzy based edge estimation for iris localization and pupil

detection in human eye for automated cataract detection system‖, international conference on computing, communication and

networking technologies (icccnt), 2018, pp. 1-6.

21. Y. Xiong, z. He, k. Niu, h. Zhang and h. Song, ―automatic cataract classification based on multi-feature fusion and svm‖, ieee 4th international conference on computer and communications (iccc), 2018, pp. 1557-1561.

22. T. Pratap and p. Kokil, ―computer-aided diagnosis of cataract using deep transfer learning, biomedical signal processing and control‖,

vol. 53, 2019. 23. W. Song, y. Cao, x. Qiao, q. Wang and j. Yang, ―an improved semi-supervised learning method on cataract fundus image

classification‖, ieee 43rd annual computer software and applications conference (compsac), 2019, pp. 362-367.

24. H. I. Morales lopez, j. C. Sanchez garcia and j. A. Diaz mendez, ―cataract detection techniques: a review‖, ieee latin america transactions, vol. 14, 2016, pp. 3074-3079.

25. H. Lin, r. Li, z. Liu, j. Chen, y. Yang, h. Chen, z. Lin, w. Lai, e, long, x. Wu, d. Lin, y. Zhu, c. Chen, d. Wu, t. Yu, q. Cao, x. Li, j. Li, w. Li, j. Wang, m. Yang, h. Hu, l. Zhang, y. Yu, x. Chen, j. Hu, k. Zhu, s. Jian, y. Huang, g. Tan, j. Huang, x. Lin, x. Zhang, l. Luo ,

x. Liu, b. Cheng, d. Zheng, m. Wu, w. Chen and y. Liu, ―diagnostic efficacy and therapeutic decision-making capacity of an artificial

intelligence platform for childhood cataracts‖, eye clinics: a multicentre randomized controlled trial, vol. 9, 2019, pp. 1-8. 26. M. Yusuf, s. Theophilous, j. Adejoke, a. Hassan, ―web-based cataract detection system using deep convolutional neural network‖, ieee

2nd international conference of the ieee nigeria computer chapter (nigeriacomputconf), 2019, pp. 1-7.

27. R. Sigit, m. Kom, m. Bayu, d. Kurnia. And s. Si, ―classification of cataract slit-lamp image based on machine learning‖, international

seminar on application for technology of information and communication, 2018, pp 1-6.

28. J. Erichsen, a. Mensah and l. Kessel, ―non-invasive tryptophan fluorescence measurements as a novel method of grading cataract‖,

experimental eye research, vol. 165, 2017, pp. 1-6. 29. Y. Zhou, g. Li and h. Li, ―automatic cataract classification using deep neural network with discrete state transition‖, ieee transactions

on medical imaging, vol. 39, 2019, pp. 1-11.

30. J. Li, x. Xu and y. Guan, ―automatic cataract diagnosis by image-based interpretability‖, ieee international conference on systems, man, and cybernetics, 2018, pp. 1-6.

31. H. Zhang and he, ―automatic cataract grading methods based on deep learning‖, computer methods and programs in biomedicine, vol.

182, 2019, pp. 1-19. 32. C. Palomo and m. Puell, ―capacity of straylight and disk halo size to diagnose cataract‖, journal of cataract & refractive surgery, vol.

41, 2015, pp. 2069-2074

33. J. Yang, j. Li, r. Shen and y. Zeng, ―exploiting ensemble learning for automatic cataract detection and grading‖, computer methods and

87-93

Page 17: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

programs in biomedicine, vol. 124, 2016, pp. 1-24.

34. P. Chen, p. Tsai, c. Lee and c. Chang, ―congenital cataracts diagnosed by prenatal ultrasound‖, taiwanese journal of obstetrics and gynecology, vol. 54, 2015, pp. 1-2.

17.

Authors: Ahmad Farhad Farahmand, Bhartesh, Sayed Shuaib Qammer

Paper Title: Displacement Analysis of RC Frames and Its Seismic Performance Appraisal

Abstract: In India when structure engineer‘s analysis and design a structure like buildings, they are checking

it for displacement because of safety and control of damages; so in this paper a set of frames with different

height of reinforced moment resisting frames were analyzed by two popular methods of performance-based

plastic design method and direct displacement-based design method. For calculation of base shear, the IS code

has been used in both methods and ETABS software used for seismic performance evaluation by nonlinear static

pushover analysis. The results of analysis with different methods compared by suitable parameters and graphs,

such as: (a) story lateral force, (b) beam seismic moment, (c) displacement profile and (d) capacity curve.

Results shows acceptable performance in 2 methods in terms of capacity and deformation.

Keywords: Performance-based plastic design, displacement profile, Seismic performance, Direct displacement-

based design, beam seismic moment, capacity curve.

References:

1. Subhash C. Goel and Shih-Ho Chao, (2008), Performance based plastic design: Earthquake Resistant Steel Structure, ICC publication, USA.

2. Shibata A, sozen m. (1976), ―Substitute structure method for seismic design in reinforced concrete ―. J struct Div, ASCE, Vol .102, No.

1, PP 1-18. 3. Moechle JP. (1996), ―displacement-based seismic design criteria‖, In: proceedings of 11th world conference on Earthquake

Engineering, Acapulco, Mexico. Paper no. 2125. Oxford: pergamon.

4. SEAOC. (Vision 200), ―performance based seismic design of buildings‖, vol. I and II: conceptual framework Sacramento (CA): Structure Engineering Association of California.

5. ATC 40(1996), ―Seismic evaluation and retrofit of existing concrete buildings‖, Redwood city (CA): Applied Technology Council.

6. FEMA 273 (1996),‖ NEHRP guidelines for the seismic rehabilitation building‖ FEMA 274 commentary. Washington (DC): Federal Emergency management Agency.

7. R> O> Hamburger, C. Rojahn and J. A. Heintz , and m. G. Mahoney, (2012) ― FEMA p58: Next-Generation Building Seismic

performance Assessment Methodology‖, WCEE. 8. GULKAN, P. and Sozen, M.A, (1974). Inelastic response of reinforced concrete structures to earthquake motions. ACI journal.

71(12): p. 604-610

9. Shibata, A. and Sozen, M.A, (1976). Substitute-structure method for seismic design in R/C journal structure division. 102(1): P. 1-18 10. Moehli, J.P, (1992). Displacement-based design of building structures subjected to earthquakes. Earthquake spectra. 8(3): P

11. Kowalsky, M.J, Preistly, M.J.N, and MacRae, G.A, (1995). Displacement-Based Design of RC Bridge columns in seismic Rejoins.

Earthquake Engineering and Structural Dynamics. 24(12): P. 1623-1643. 12. Calvi, G.M. and kingsly, G.R, (1995). Displacement-based seismic Design of Multi-Degree-of-freedom, Bridge Structurea. Earthquake

Engineering and Structure Dynamics. 24(9): p. 1247-1266.

13. Chopra, A.K. and Goel, R.K, (2001). Direct Displacement-based Design: Use of Inelastic Design Spectra Versus Elastic Design Spectra. Earthquake Spectra. EERI 17(1): p. 47-64.

14. Prestley M.J.N., Calvi, M.C., and Kowalsky, M.J. 2007., Direct Displacement-Based Seismic Design of concrete building. Bulletin of

the New Zealand Society for Earthquake Engineering. 33(4), 421-444. 15. Sullivan, T.J., Priestley, M.J.N., and Calvi, G.M., (2006). Direct Displacement-Based design of Frame-Wall Structures. Journal of

Earthquake Engineering. 10(sup001): p. 91-124.

16. Priestley, M.J.N., and Calvi, M.C., and Kowalsy, (2007). Direct Displacement-Based design of Structures, NZSEE Conference. 17. Sullivan, T.J. and Lago, A., (2012). Towards a simplified Direct DBD Procedure for the seismic design of moment resisting frames

with viscous dampers. Engineering Structures, 35: P. 140-148.

18. Malekpour, S., GHaffarzadeh, H., and Dashti, F., (2013). Direct displacement-based design of steel-braced reinforced concrete frames. Structural Design Tall and Special Buildings. 22(18): P. 1422-1438.

19. Chao, S.-H, Goel, S. C., and Lee, S.-S. (2007)., ―A seismic design of lateral force distribution based on inelastic state of structures,‖ Earthquake Spectra, Earthquake Engineering Research Institute, Vol. 23, NO. 3, pp. 547-569.

20. Leelataviwat, S. 1999 ―Drift and Yield Mechanism based Seismic Design and Upgrading of Steel Moment Frames.‖ Ph.D. Thesis,

Department of Civ. & Env. Engrg., University Michigan, Ann Arbor, MI, USA, 21. Lee, Soon-Sik and Goel, S. C. 2001, ―Performance-Based Design of Steel Moment Frames Using Target Drift and Yield Mechanism‖

Report No. UMCEE 01-17, Department of Civ, & Env. Engrg., University of Michigan, Ann Arbor, MI, USA.

22. Goel, S. C. and Chao, S.-H. (2009)., Performance-Based Plastic Design: Earthquake-resistant Steel Structures, ICC, USA. 23. Wen-Cheng Liaol and Subbash C. Goel. (2012)., ―Performance-Based Plastic Design and Evaluation of Seismic Resistant RC Moment

Frame‖, Journal of Marine Science and Technology.

24. Priestley, M.J.N., and Calvi, G.M., and Kowalsy, M.J., ―Displacement-Based design of Structures‖, IUSS Press, Press, pavia, Italy, 2007.

25. Alok Madan, Arshad K. Hashmi., ―Performance based design of masonry infilled reinforced concrete frames for near-field earthquakes

Using energy methods‖ International Journal of Civil, Environmental, Structural, construction and Architectural Engineering Vol:8, No:6, 2014.

26. IS 1893 (part 1): 2002, ―Criteria for Earthquake Resistant Design of structures‖, Part-1 General Provisions and Buildings (Fifth

Revision), Bureau of Indian Standard, New Delhi. 27. IS 456:2000, ―Plain and Reinforced code of Practice (fourth Revision)‖, bureau of Indian standard, New Delhi.

28. IS 13920:1993, ―Ductile Detailing of Reinforced Concrete Structures Subjected to Seismic Forces‖, bureau of Indian standard, New

Delhi.

94-101

18.

Authors: Anshu Parashar, Anand Kumar Pandey, Ritesh Kumar Rai

Paper Title: Placement of PV Units Considering Uncertainties of Generation and Load in Distribution Systems

Abstract: In conventional power system the transmission and distribution (T&D) losses is a major concern.

Renewable energy resources placed at load centers can reduce the T&D losses. For power system planners and

researchers it is essential to find the optimal size and position of renewable energy resources to be place in

distribution networks. Renewable energy source such as solar energy is abundantly present in the environment.

102-106

Page 18: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

With the help of solar photovoltaic (SPV) system solar energy can be converted to electrical energy. Placement

of SPV in distribution system is an interesting area for researchers and planners, the random placement of SPV

in distribution system leads to more power losses and poor voltage profile. In this article mathematical

modelling of time varying nature of SPV and variable load has been explained and particle swarm optimization

(PSO) method is proposed to find the best size and location of the SPV system. This method is tested on IEEE

33 bus system. For the validation of result existing technique based on analytical expression is selected. It is

found that PSO gives better result in compare to analytical method.

Keywords: Solar photovoltaic system, Multi-objective index, Time varying solar irradiance, Power system

optimization, Particle swarm optimization.

References:

1. Duong Quoc Hung, N.M., and and K.Y. Lee, Determining PV penetration for Distribution systems with Time-Varying load Models.

IEEE TRANSACTIONS ON POWER SYSTEMS, 2014. 29 NO. 6. 2. Niknam T, Taheri SI, Aghaei J, Tabatabaei S, Nayeripour M. A modified honey bee mating optimization algorithm for multiobjective

placement of renewable energy resources. Appl Energy 2011;88(12):4817–30.

3. Taher N. A new HBMO algorithm for multiobjective daily Volt/Var control in distribution systems considering distributed generators. Appl Energy 2011;88(3):778–88.

4. Martinez-Rojas M, Sumper A, Gomis-Bellmunt O, Sudrià-Andreu A. Reactive power dispatch in wind farms using particle swarm

optimization technique and feasible solutions search. Appl Energy 2011;88(12):4678–86. 5. Anand Kumar Pandey and Sheeraz Kirmani. "Multi-objective optimal location and sizing of hybrid system using analytical crow

search optimization algorithm.‖ International Transactions on Electrical Energy Systems 30, no. 5(2020), e12327.

6. L. F. Ochoa, A. Padilha-Feltrin, and G. P. Harrison, ―Evaluating distributed generation impacts with a multiobjective index,‖ IEEE Trans Power Del., vol. 21, no. 3, pp. 1452–1458, Jul. 2006.

7. D. Singh and K. S. Verma, ―Multiobjective optimization for DG planning with load models,‖ IEEE Trans. Power Syst., vol. 24, no. 1,

pp. 427–436, Jan. 2009. 8. A.M. El-Zonkoly, ―Optimal placement of multi-distributed generation units including different load models using particle swarm

optimisation,‖ IETGener. Transm. Distrib., vol. 5, no. 7, pp. 760–771, Jul. 2011.

9. Bakos GC. Distributed power generation: a case study of small scale PV power plant in Greece. Appl Energy 2009; 86(9):1757–66. 10. Wang C, Nehrir MH. Analytical approaches for optimal placement of distributed generation sources in power systems. IEEE Trans

Power Syst 2004;19(4):2068–76. Acharya N, Mahat P, Mithulananthan N. An analytical approach for DG allocation in primary

distribution network. Int J Elect Power Energy Syst 2006;28(10):669–78. 11. Hung DQ, Mithulananthan N, Bansal RC. Analytical expressions for DG allocation in primary distribution networks. IEEE Trans

Energy Convers 2010;25(3):814–20.

12. Singh D, Verma KS. Multiobjective optimization for DG planning with load models. IEEE Trans Power Syst 2009;24(1):427–36. 13. Khatod DK, Pant V, Sharma J. Evolutionary programming based optimal placement of renewable distributed generators.

14. IEEE Trans Power Syst 2013;28(2):683–95. Ochoa LF, Harrison GP. Minimizing energy losses: optimal accommodation and smart operation of renewable distributed generation. IEEE Trans Power Syst 2011;26(1):198–205.

15. Hung DQ, Mithulananthan N, Bansal RC. Analytical strategies for renewable distributed generation integration considering energy

loss minimization. Appl Energy 2013; 105:75–85. 16. Anand Kumar Pandey and Sheeraz Kirmani. "Multi-Objective Optimal Location and Sizing of Hybrid Photovoltaic System in

Distribution Systems Using Crow Search Algorithm." International Journal of Renewable Energy Research (IJRER) 9.4 (2019): 1681-

1693. 17. C. T. Ioan, ―The particle swarm optimization algorithm: Convergence analysis and parameter selection,‖ Inf. Process. Lett. vol. 85, pp.

317–325, 2003.

18. Lee S-H, Park J-W. Selection of optimal location and size of multiple distributed generations by using kalman filter algorithm. Power Syst IEEE Trans 2009; 24:1393–400.

19. Singh D, Singh D, Verma K. GA based optimal sizing and placement of distributed generation for loss minimization. Int J Electr

Comput Eng 2007; 2:556–62. 20. Nara K, Hayashi Y, Ikeda K, Ashizawa T. Application of tabu search to optimal placement of distributed generators. in: IEEE Power

Engineering Society Winter Meeting, vol. 2; 2001, p. 918–923.

19.

Authors: P.Sivasankaran B.Radjaram, K.Karthigayan

Paper Title: Maximizing Machine Capacity by Improving Efficiency using Linear Programming Model

Abstract: In the global manufacturing system, machine performance is considered to be one of the vital role

in organization wellbeing. In specific analysing the capacity utilization of machines in each shift is a big

challenging job in industrial organization. The primary importance is keeping the machines in uptime condition

at the same time loading the jobs in machines decides the capacity usage of machines to do the useful jobs. In

this paper focus is made on the capacity planning of machines in production shift. capacity utilization measures

the actual capacity of machine with respect to the potential output within a specific period. In real situations if

the demand for the product increases the production capacity also increases but at the same time if the demand

falls capacity will also become very low. Hence in this work attempt has been made to develop a mathematical

model for machine capacity planning using linear programming model solved by using LINDO software.

Keywords: Capacity utilization,uptime,LINDO, Linear Programming

References:

1. Arabacı, Ö. ve Arabacı, R. (2008). Kapasite Kullanım Oranları ve Enflasyon İlişkisi:Türkiye Örneği. Uludağ Üniversitesi. İktisadi ve

İdari Bilimler Fakültesi Dergisi. Cilt:27,Sayı:2, 93-109.

2. Bircan, H. ve Kartal, Z. (2003). Doğrusal Programlama Tekniği ile Kapasite PlanlamasıYaklaşımı ve Çimento İşletmesinde Bir Uygulaması. Cumhuriyet Üniversitesi. İktisadi veİdari Bilimler Dergisi. Cilt:5, Sayı:1, 131-149.

3. Bulut, Z.A. (2004). İşletmeler Açısından Kapasite Planlaması ve Kapasite PlanlamasınaEtki Eden Faktörler. Mevzuat Dergisi. Yıl:7,

Sayı:80. Erişim Tarihi: 14 Aralık 2013,http://www.mevzuatdergisi.com/2004/08a/06.htm 4. Büyükkeklik, M. (2007). Üretim Planlama Problemlerinde Doğrusal Programlama

5. Modellerinin Kullanımı: Bir Üretim şletmesinde Uygulama. Yüksek Lisans Tezi, NÜ Sosyal

6. Bilimler Enstitüsü, Niğde. 7. Candes, E. J., & Tao, T. (2005). Decoding by linear programming. Information Theory,IEEE Transactions on, 51(12), 4203-4215.

107-114

Page 19: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

8. Charnes, A., & Cooper, W. W. (1961). Management models and industrial applications oflinear programming [by] A. Charnes [and]

WW Cooper (Vol. 1). John Wiley & Sons. 9. Dantzig, G. B. (1965). Linear programming and extensions. Princeton university press.

10. Ekodialog.com.(2009). Erişim Tarihi: 25 Aralık 2013.

http://www.ekodialog.com/isletme_ekonomisi/isletme_kapasite_planlamasi_2.html

11. Ergülen, A., & Kazan, H. (2012). Taşımacılık Sektörünün İşleyiş Süreci, Bulanık DağıtımProbleminin Tamsayılı Doğrusal

Programlama Model Denemesi. Uluslararası Yönetimİktisat ve İşletme Dergisi, 3(6), 109-126.

12. Esin, A. (1998). Yöneylem Araştırmasında Yararlanılan Kantitatif Yöntemler. Ankara:Gazi Üniversitesi. Yayın Nu:128, S.24-298. 13. Ferrier, G. D., & Lovell, C. K. (1990). Measuring cost efficiency in banking:econometric and linear programming evidence. Journal of

econometrics, 46(1), 229-245.

20.

Authors: Jahidul Haque Chaudhuri, Rohan Deb, Jhinuk De

Paper Title: Innovative Way to Decrease the Water Consumption of Direct Evaporative Air-Cooler

Abstract: In the present study the existing direct evaporative coolers (DEC) is modified in such a way that

DEC consume less amount of water and provide better cooling effect. In desert area, water consumption by air

cooler is a serious problem. Therefore, the present study addressed this issue and primary objective of the study

is to minimize the consumption of water. For this purpose, the property of the endothermic reaction is utilized.

There are few salts that produce endothermic reaction if it is diluted in water. Those salt crystals absorb heat

from the surrounding environment (water) and ultimately the temperature of the overall solution gets reduced.

This cold solution is then passed through honeycomb cooling pad, as a result more amount of air can be cooled

using the same volume of water as compared to the traditional air-cooler. Ammonium Chloride (NH4Cl),

Ammonium Nitrite (NH4NO3) salts satisfy the basic criteria for the endothermic reaction but NH4Cl will be

more useful to use in the air-coolers, as Ammonium Nitrite is costlier and also hazardous. A salt water separator

arrangement also attached with modified air-cooler which will help to regenerate Ammonium Chloride crystal

from solution with the help of solar energy. In this study, firstly discussed about proposed design of an air-cooler

system, which is able to nicely handle chemical solution. Then compared the study with experimental outcome

which have been carried out with and without using salt. From the result it has been observed that modified

design of air cooler has great potential to improve the traditional air cooler in terms of cooling effect and water

consumption.

Keywords: direct evaporative cooler; NH4Cl; honeycomb cooling pad; modified air-cooler design.

References:

1. Bishoyi, D., & Sudhakar, K. (2017). Experimental performance of a direct evaporative cooler in composite climate of India. Energy and

Buildings, 153, 190-200. 2. Kovačević, I., & Sourbron, M. (2017). The numerical model for direct evaporative cooler. Applied Thermal Engineering, 113, 8-19.

3. Franco, A., Valera, D. L., & Peña, A. (2014). Energy efficiency in greenhouse evaporative cooling techniques: cooling boxes versus

cellulose pads. Energies, 7(3), 1427-1447. 4. Sellami, K., Feddaoui, M., Labsi, N., Najim, M., Oubella, M., & Benkahla, Y. K. (2019). Direct evaporative cooling performance of

ambient air using a ceramic wet porous layer. Chemical Engineering Research and Design, 142, 225-236.

5. Heidarinejad, G., & Bozorgmehr, M. (2008). Heat and mass transfer modeling of two stage indirect/direct evaporative air coolers. ASHRAE journal Thailand.

6. Dai, Y. J., & Sumathy, K. (2002). Theoretical study on a cross-flow direct evaporative cooler using honeycomb paper as packing

material. Applied thermal engineering, 22(13), 1417-1430. 7. Al-Badri, A. R., & Al-Waaly, A. A. (2017). The influence of chilled water on the performance of direct evaporative cooling. Energy and

Buildings, 155, 143-150.

8. Dhamneya, A. K., Rajput, S. P. S., & Singh, A. (2018). Thermodynamic performance analysis of direct evaporative cooling system for increased heat and mass transfer area. Ain Shams Engineering Journal, 9(4), 2951-2960.

9. Guan, L., Bennett, M., & Bell, J. (2015). Evaluating the potential use of direct evaporative cooling in Australia. Energy and Buildings,

108, 185-194. 10. Kavaklioglu, K., Koseoglu, M. F., & Caliskan, O. (2018). Experimental investigation and radial basis function network modeling of

direct evaporative cooling systems. International Journal of Heat and Mass Transfer, 126, 139-150.

11. Kim, M. H., & Jeong, J. W. (2013). Cooling performance of a 100% outdoor air system integrated with indirect and direct evaporative coolers. Energy, 52, 245-257.

12. Wu, J. M., Huang, X., & Zhang, H. (2009). Theoretical analysis on heat and mass transfer in a direct evaporative cooler. Applied

Thermal Engineering, 29(5-6), 980-984. 13. Roux, A., Musbally, G. M., Perron, G., Desnoyers, J. E., Singh, P. P., Woolley, E. M., & Hepler, L. G. (1978). Apparent molal heat

capacities and volumes of aqueous electrolytes at 25° C: NaClO3, NaClO4, NaNO3, NaBrO3, NaIO3, KClO3, KBrO3, KIO3,

NH4NO3, NH4Cl, and NH4ClO4. Canadian Journal of Chemistry, 56(1), 24-28. 14. Kabeel, A. E., & Bassuoni, M. M. (2017). A simplified experimentally tested theoretical model to reduce water consumption of a direct

evaporative cooler for dry climates. International Journal of Refrigeration, 82, 487-494.

115-121

21.

Authors: Mohan Rawat, R N Singh

Paper Title: Thermal Performance of Composite Roof Structures with Insulating Layers in Non-Conditioned

Buildings for Hot-Dry Climate

Abstract: The roof configurations with an insulating layer and their impact on hourly floating temperature

analyzed in a hot-dry climate context. A predefined computer program using a modified Fourier admittance

method utilized as the primary research. The thermal performance of ten composite roof structures evaluated to

obtain optimal roof structure for hot-dry climate, Jodhpur. Nine composite roof structures with an insulation

layer and one without insulation layer as the base case were analyzed for the summer months (April-September).

The utilization of roof thermal insulation showed a significant influence on the overall thermal performance of

roofs. It also revealed that minimum temperature variation found about 8.8 0C for the composite roof structure

of Reinforced Cement Concrete (RCC) with foam concrete insulation (i.e., RF-5) with thicknesses 150 mm and

140 mm respectively. The analysis assessed that composite roof structure with an insulating layer is a useful

122-127

Page 20: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

technique to reduced indoor temperature in non-conditioned buildings of hot-dry climate.

Keywords: Fourier admittance method, Heat Gain, Hot-dry climate, Thermal comfort, Simulation.

References:

1. Lee, S. W., Lim, C. H., Chan, S. A., & Von, K. L. ―Techno-economic evaluation of roof thermal insulation for a hypermarket in

equatorial climate‖: Malaysia. Sustainable cities and society,2017, 35, 209-223.

2. Al-Homoud, M. S. ―The effectiveness of thermal insulation in different types of buildings in hot climates‖. Journal of Thermal Envelope and Building Science, 2004, 27(3), 235-247.

3. Schiavoni, S., Bianchi, F., & Asdrubali, F. ―Insulation materials for the building sector: A review and comparative

analysis‖. Renewable and Sustainable Energy Reviews,2016, 62, 988-1011. 4. Yew, M. C., Sulong, N. R., Chong, W. T., Poh, S. C., Ang, B. C., & Tan, K. H. ―Integration of thermal insulation coating and moving-

air-cavity in a cool roof system for attic temperature reduction‖. Energy Conversion and Management, 2013,75, 241-248. 5. Sansaniwal, S. K., Mathur, J., Garg, V., & Gupta, R. ―Review of studies on thermal comfort in Indian residential buildings‖. Science

and Technology for the Built Environment, 2020 1-22.

6. Arumugam, R. S., Garg, V., Ram, V. V., & Bhatia, A. ―Optimizing roof insulation for roofs with high albedo coating and radiant barriers in India‖. Journal of Building Engineering, 2015, 2, 52-58.

7. Kaynakli, O. ―A review of the economical and optimum thermal insulation thickness for building applications‖. Renewable and

Sustainable Energy Reviews, 2012, 16(1), 415-425. 8. Sodha, M. S., Kaur, B., Kumar, A., & Bansal, N. K.‖Comparison of the admittance and Fourier methods for predicting heating/cooling

loads‖. Solar energy, 36(2), 1986, 125-128.

9. Bansal, N. K., Garg, S. N., & Kothari, S. ―Effect of exterior surface colour on the thermal performance of buildings‖. Building and environment, 1992, 27(1), 31-37.

10. Sodha, M. S., Singh, S. P., & Sawhney, R. L. ―Evaluation of discomfort in a room with desert cooler‖. International Journal of Energy

Research, 1990, 14(7), 745-756. 11. Kumar, A., & Suman, B. M. ―Experimental evaluation of insulation materials for walls and roofs and their impact on indoor thermal

comfort under composite climate‖. Building and Environment, 2013, 59, 635-643.

12. Yumrutaş, R., Kaşka, Ö.,& Yıldırım, E. ―Estimation of total equivalent temperature difference values for multilayer walls and flat roofs by using periodic solution‖. Building and Environment, 2007, 42(5), 1878-1885.

13. Shi, D., Zhuang, C., Lin, C., Zhao, X., Chen, D., Gao, Y., & Levinson, R. ―Effects of natural soiling and weathering on cool roof

energy savings for dormitory buildings in Chinese cities with hot summers‖. Solar Energy Materials and Solar Cells,2019, 200, 110016

22.

Authors: Alfonso Alexander Ruesta Sedano, Jeanette Giuliana Gamarra Herrera, Lenis Rossi Wong Portillo

Paper Title: Techniques for Images Processing, Factors and Results of Colposcopy to Diagnose Cervical Cancer

Abstract: The colposcopy is a test that is performed if you have relationed symptoms with cancer or if the

result of Pap smears test gives an abnormal cells; however, it has a continue problem because there are few

doctors who know about colposcopy and it leads to misinterpretation. Therefore, in the last years various

proposals have emerged to solve this problem. The present study aims to identify the current state of the latest

research related to the detection of cervical cancer during the colposcopy test using the image evaluation. A

framework is proposed based on 3 research questions: (1) What techniques are used for image processing with

colposcopy to diagnose cervical cancer? (2) What are the factors that help diagnose cervical cancer during

colposcopy? And (3) What results corroborate or provide the diagnosis produced by the colposcopy test in the

detection of cervical cancer? One of the results proposes that the use of Convolution Neural Network (CNN)

improves the sensitivity of the diagnosis of cervical cancer, since it achieved greater precision in colposcopy

image processing. Furthermore, the diagnosis can be corroborated with the ―results‖ of the ―Biopsy‖ and ―Expert

Judgment‖.

Keywords: Colposcopy, Colposcopy techniques, Colposcopy image, Convolutional Neuronal Network.

References:

1. National Cancer Institute, ―Cervical Cancer Treatment (PDQ®)–Patient Version‖ 27 september 2019. [Online]. Available:

https://www.cancer.gov/types/cervical/patient/cervical-treatment-pdq

2. American Cancer Society, ―Test for Cevical Cancer‖ 5 december 2016. [Online]. Available: https://www.cancer.org/cancer/cervical-cancer/detection-diagnosis-staging/how-diagnosed.html#written_by [Last access: october 2019].

3. J. Ruiz, ―Pasado, presente y futuro de la colposcopia‖, Medigraphic, vol. 2, nº 2, april 2010.

4. E. Alvarez, ―Manual de la Clinica de Detección Temprana Colposcopia‖ 27 november 2010. [Online]. Available: https://www.paho.org/gut/index.php?option=com_docman&view=download&alias=225-manual-de-la-clinica-de-deteccion-temprana-

colposcopia&category_slug=temas-de-salud&Itemid=518

5. International Agency for Research on Cancer, ―Cancer Today‖ 2019. [Online]. Available: https://gco.iarc.fr/today/online-analysis-multi-

bars?v=2018&mode=cancer&mode_population=countries&population=900&populations=900&key=total&sex=2&cancer=39&type=0

&statistic=5&prevalence=0&population_group=0&ages_group%5B%5D=0&ages_group%5B%5D=17&nb_items=10&group_cancer=1&include_nmsc=1&include_nmsc_other=1&type_multiple=%257B%2522inc%2522%253Atrue%252C%2522mort%2522%253Afals

e%252C%2522prev%2522%253Afalse%257D&orientation=horizontal&type_sort=0&type_nb_items=%257B%2522top%2522%253

Atrue%252C%2522bottom%2522%253Afalse%257D&population_group_globocan_id= [Last access: october 2019]. 6. International Agency for Research on Cancer, ―Cancer Today‖ 2019. [Online]. Available: https://gco.iarc.fr/today/online-analysis-

multi-

bars?v=2018&mode=cancer&mode_population=countries&population=900&populations=604&key=total&sex=2&cancer=39&type=0&statistic=5&prevalence=0&population_group=0&ages_group%5B%5D=0&ages_group%5B%5D=17&nb_items=1&group_cancer=1

&include_nmsc=1&include_nmsc_other=1&type_multiple=%257B%2522inc%2522%253Atrue%252C%2522mort%2522%253Afalse

%252C%2522prev%2522%253Afalse%257D&orientation=horizontal&type_sort=0&type_nb_items=%257B%2522top%2522%253Atrue%252C%2522bottom%2522%253Afalse%257D&population_group_globocan_id= [Last access: octubre 2019].

7. L. Wong, D. Mauricio y G. Rodriguez, ―A systematic literature review about software requirements elicitation‖, Journal of

Engineering Science and Technology, vol. 12, nº 2, february 2017. 8. S. Boonlikit, ―Performance of the abbreviated Reid colposcopic index in prediction of high-grade lesions‖, International Journal of

Gynecology & Obstetrics, vol. 134, 2016.

9. S. Kushwah y B. Kushwah, ―Correlation of two colposcopic indices for predicting premalignant lesions of cervix‖, Journal of Mid-Life Health, vol. 8, 2017.

128-133

Page 21: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

10. J. Louwers, A. Zaal, M. Kocken, J. Berkhof, E. Papagiannakis, P. Snijders, C. Meijer y R. Verheijen, ―The performance of dynamic

spectral imaging colposcopy depends on indication for referrals‖, Gynecologic Oncology, vol. 139, 2015. 11. H. Aydoğmuş y S. Aydoğmuş, ―Comparison of colposcopic biopsy results of patients who have cytomorphological normal but HPV

16-18 or other high-risk HPV subtypes positive‖, Asian Pacific Journal of Cancer Prevention, vol. 20, 2019.

12. P. J. Coronado y M. Fasero, ―Colposcopy combined with dynamic spectral imaging. A prospective clinical study‖, European Journal of Obstetrics & Gynecology and Reproductive Biology, vol. 196, 2016.

13. A. Kaufmann, C. Founta, E. Papagiannakis, R. Naik y A. Fisher, ―Standardized digital colposcopy with dynamic spectral imaging for

conservative patient management‖, Case Rep Obstet Gynecol, 2017. 14. M. T. Roensbo, A. Hammer y J. Blaakær, ―Can dynamic spectral imaging system colposcopy replace conventional colposcopy in the

detection of high‐grade cervical lesions?‖, Acta Obstetricia et Gynecologica Scandinavica, vol. 94, 2015.

15. S. G. Parra, A. M. Rodriguez, K. D. Cherry, R. A. Schwarz, R. M. Gowen, L. B. Guerra, A. M. Milbourne, P. A. Toscano, S. P. Fisher-Hoch, K. M. Schemeler y R. R. Richards-Kortum, ―Low-cost, high-resolution imaging for detecting cervical precancer in medically-

underserved areas of Texas‖, Gynecologic Oncology, vol. 154, 2019.

16. E. De Castro Hillmann, O. Moreira Bacha, M. Roy, G. Paris, D. Berbiche, V. Nizard y J. G. Lopes Ramos, ―Cervical digital photography: An alternative method to colposcopy‖ Gynecologic Oncology, vol. 14, nº 8, agosto 2019.

17. Y. Tanaka, Y. Ueda, A. Okazawa, M. Kakuda, S. Matsuzaki, E. Kobayashi, K. Yoshino y T. Kimura, ―'Smartscopy' as an alternative

device for cervical cancer screening: a pilot study‖, BMJ Innov, vol. 3, 2017. 18. Y. Tanaka, Y. Ueda, R. Kakubare, M. Kakuda, S. Kubota, S. Matsuzaki, A. Okazawa, T. Egawa-Takata, S. Matsuzaki, E. Kobayashi y

T. Kimura, ―Histologic correlation between smartphone and coloposcopic findings in patients with abnormal cervical cytology:

experiences in a tertiary referral hospital‖, American Journal of Obstetrics and Gynecology, vol. 221, 2019. 19. C. Gallay, A. Girardet, M. Viviano, R. Catarino, A. C. Benski, P. L. Tran, C. Ecabert, J. P. Thiran, P. Vassilakos y P. Petignat,

―Cervical cancer screening in low-resource settings: a smartphone image application as an alternative to colposcopy‖, Int J Womens

Health, vol. 9, 2017. 20. S. K. Saini, V. Bansal, R. Kaur y M. Juneja, ―ColpoNet for automated cervical cancer screening using colposcopy images‖ Machine

Vision and Applications, vol. 31, nº 15, 25 march 2020.

21. C. Buiu, V.-R. Dânâilâ y C. N. Râdutâ, ―MobileNetV2 ensemble for cervical precancerous lesions classification‖ Processes, vol. 8, 16 may 2020.

22. Z. Yue, D. Shuai, Z. Weidong, W. Hao, M. Jie, Y. Zhang y Y. Zhang, ―Automatic CIN grades prediction of sequential cervigram image

using LSTM with multistate CNN features‖ IEEE Journal of Biomedical and Health Informatics, vol. PP, pp. 1-1, 13 june 2019. 23. T. Zhang, Y.-m. Luo, P. Li, Y.-z. Du, P. Sun, B. Dong y H. Xue, ―Cervical precancerous lesions classification using pre-trained densely

connected convolutional networks with colposcopy images‖ Biomedical Signal Processing and Control, vol. 55, january 2020.

24. M. A. Godfrey, M. Nikilopoulos, N. Povolotskaya, R. Chenoy y R. Wuntakal, ―Post-coital bleeding: What is the incidence of significant gynaecological pathology in women referred for colposcopy?‖, Sexual and Reproductive Healthcare, vol. 22, 2019.

25. A. T. Marujo, L. Correia, M. Brito, T. Paula y J. Borrego, ―ASC-H cytological result: clinical relevance and accuracy of colposcopy in

predicting high-grade histological lesions—a 7-year experience of a single institution in Portugal‖, Journal of the American Society of Cytopathology, vol. 6, 2017.

26. X. Zhang, Y. Dou, M. Wang, Y. Li, F. Wang, X. Xie y X. Wang, ―A retrospective analysis on 1901 women with high grade cervical

intraepithelial neoplasia by colposcopic biopsy‖, vol. 217, 2017. 27. V. J. M. Pop, T. Wouters, R. L. M. Bekkers, V. R. M. Spek y J. M. J. Piek, ―Development of the patient‘s experience and attitude

colposcopy eindhoven 1uestionnaire (PEACE-q)‖, BMC Health Serv Res, vol. 19, 2019. 28. D. Beyer, A. Rody, C. Cirkel, N. Schmidt y K. Neumann, ―Mandatory colposcopic findings of severe cervical dysplasia. Are there key-

signs that need our special attention?‖, Journal of Gynecology Obstetrics and Human Reproduction, vol. 46, 2017.

29. A. Ciavattini, M. Serri, J. Di Giuseppe, C. A. Liverani, M. G. Fallani, D. Tsiroglou, M. Papiccio, G. Delli Carpini, A. Pieralli, N. Clemente y F. Sopracordevole, ―Reliability of colposcopy during pregnancy‖, European Journal of Obsterics & Gynecology and

Reproductive Biology, vol. 229, 2018.

30. I. Baasland, B. Haguen, C. Vogt, M. Valla y P. R. Romundstad, ―Colposcopy and additive diagnostic value of biopsies from colposcopy‐negative areas to detect cervical dysplasia‖, Acta Obstetricia et Gynecologica Scandinavica, vol. 95, 2016.

31. B. Abolafia-Cañe, J. Á. Monserrat-Jordán, J. Cuevas-Cruces y J. E. Arjona-Berral, ―Diagnóstico precoz del cáncer de cérvix:

correlación entre citología, colposcopia y biopsia‖ Revista Española de Patología, vol. 51, nº 3, july - september 2018.

23.

Authors: Mohanapria M K, Rajambal K

Paper Title: Switched-Capacitor based Quadruple Boost 9-Level Inverter Topology with Multicarrier PWM

Technique

Abstract: This paper presents Switched-Capacitor based Quadruple Boost 9-Level Inverter topology which

possesses several advantages over conventional MLI types, SCMLI topologies. The self-voltage balancing

capability of switched capacitors which reduces complexity in control is compared with existing SCMLI

topology. The simulation study of the SCQB9LI topology is carried out. Switched capacitors are designed for

self-voltage balancing nature. The MLS-PWM strategy is employed for generating gate pulses. The performance

of the chosen inverter topology is investigated for different modulation indices and its results are presented. A

comparative study with conventional SCMLI topologies proves the effectiveness of SCQB9LI topology.

Keywords: Multicarrier Level Shifted Pulse Width Modulation (MLS-PWM) technique, Quadruple Boost,

Self-Voltage balance, Switched-Capacitor based Quadruple Boost 9-Level Inverter (SCQB9LI).

References:

1. L. Tolbert, F.-Z. Peng, and T. Habetler, ―Multilevel converters for large electric drives,‖ IEEE Trans. Ind. Applicat., vol. 35, pp. 36–44, Jan./Feb. 1999.

2. J. S. Lai and F. Z. Peng, ―Multilevel converters–A new breed of power converters,‖ IEEE Trans. Ind. Applicat., vol. 32, pp. 509–517,

May/June 1996.

3. Rodriguez, J.; Bernet, S.; Wu, B.; Pontt, J.O.; Kouro, S.; "Multilevel Voltage-Source-Converter Topologies for Industrial Medium-

Voltage Drives," Industrial Electronics, IEEE Transactions on, vol.54, no.6, pp.2930-2945, Dec. 2007.

4. P. P. Rodriguez, M. M. D. Bellar, R. R. S. Munoz-Aguilar, S. S. Busquets- ˜ Monge, and F. F. Blaabjerg, ―Multilevel clamped multilevel converters (MLC),‖ IEEE Trans. Power Electron., vol. 27, no. 3, pp. 1055–1060, Mar. 2012.

5. K. Ilves, A. Antonopoulos, S. Norrga, and H.-.P. Nee, ―A new modulation method for the modular multilevel converter allowing

fundamental switching frequency,‖ IEEE Trans. Power Electron., vol. 27, no. 8, pp. 3482–3494, Aug. 2012. 6. M. F. Kangarlu and E. Babaei, "A generalized cascaded multilevel inverter using the series connection of sub multilevel inverters,"

IEEE Trans. Power Electron., vol. 28, no. 2, pp. 625–636, Feb. 2013. 7. Y. Hinago and H. Koizumi, "A switched-capacitor inverter using series/parallel conversion with an inductive load," IEEE Trans. Ind.

Electron., vol. 59, no. 2, pp. 878–887, 2012.

8. J. Liu, K. Cheng, and Y. Ye, "A cascaded multilevel inverter based on switched-capacitor for high-frequency ac power distribution system," IEEE Tran. Power Electron., vol. 29, no. 8, pp. 4219–4230, 2014.

134-139

Page 22: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

9. J. Liu, W. Lin, J. Wu, and J. Zeng, ―A novel nine-level quadruple boost inverter with inductive-load ability,‖ IEEE Tran. Power

Electron., pp. 1–1, 2018. 10. N. Sandeep, Jagabar Sathik Mohammed Ali, Udaykumar R. Yaragatti, and Krishnasamy Vijayakumar, "Switched-Capacitor Based

Quadruple Boost Nine-Level Inverter", IEEE Trans. Power Electron., Volume: 34, Issue: 8, Aug. 2019.

11. Taghvaie, J. Adabi, and M. Rezanejad, ―A self-balanced step-up multilevel inverter based on switched-capacitor structure,‖ IEEE Trans.

Power Electron., vol. 33, no. 1, pp. 199–209, 2018.

12. J. Zeng, J. Wu, J. Liu, and H. Guo, "A quasi-resonant switched-capacitor multilevel inverter with self-voltage balancing for single-phase

high-frequency ac microgrids," IEEE Trans. Ind. Inform., vol. 13, no. 5, pp. 2669–2679, 2017. 13. Z. Zheng, K. Wang, L. Xu, and Y. Li, ―A Hybrid Cascaded Multilevel Converter for Battery Energy Management Applied in Electric

Vehicles,‖ IEEE Trans. Power Electron., vol. 29, no. 7, pp. 3537–3546, 2014.

14. J. S. M. Ali and V. Kumar, ―Compact switched capacitor multilevel inverter (cscmli) with self voltage balancing and boosting ability,‖ IEEE Trans. Power Electron., pp. 1–1, 2018.

15. S. S. Lee, M. Sidorov, C. S. Lim, N. R. N. Idris, and Y. E. Heng, ―Hybrid cascaded multilevel inverter (hcmli) with improved

symmetrical 4-level submodule,‖ IEEE Trans. Power Electron., vol. 33, no. 2, pp. 932–935,2018.

24.

Authors: Veena Malik, S. C. Dharmadhikari

Paper Title: Enriching E-Commerce Fraud Detection by using Machine Learning

Abstract: As there has been a proliferation of the internet platform, it has been increasingly getting affordable

for a lot of individuals. The rise has been instrumental in achieving several services including the E-commerce

platform. This has led to an unprecedented increase in the amount of fraud that is being committed on this

platform. The fraud that is being committed on the E-commerce platforms is very different from the frauds

committed on other platforms online. Numerous researches have been performed to combat the evils of credit

card frauds and money laundering rings. But there is a severe lack of research on the fraud that is committed on

the E-commerce platform. Therefore, this research paper defines an innovative approach for the identification of

fraud on E-commerce platforms through the implementation of machine learning approaches. The presented

technique utilizes Linear Clustering, Entropy Estimation and Frequent itemset mining in addition to the

inclusion of Artificial Neural Networks, Hypergraph formation and Fuzzy classification. The implementation of

this system will give more security for E-commerce platform-based transactions by identifying fraudulent

activities with better efficiency. The methodology has been tested extensively through rigorous experimentation

to evaluate the performance metrics which yielded significantly positive results.

Keywords: Linear Clustering, Entropy Estimation, Frequent Itemset, Hyper graph, Artificial Neural Network,

Fuzzy Classification.

References:

1. Elina Bumbiere, ―The basic of Ecommerce Fraud-What it is and how to manage,‖ [Online] Available:http//www.printful.com/blog/the-

basic-of- ecommerce-fraud-what-is-it-and-how-to-manage-it/. 2. V. Malik and Dr. S. C. Dharmadhikari, ―Analysis of fraudulent Transaction Detection Techniques based on Customers Behavioural

Patterns,‖ CIIT International Journal of Artificial Intelligent System and Machine Learning, Vol. 11, No. 12, pp. 219-224,

December2019. 3. W.H. Ju and Y. Vardi, ―A hybrid high-order Markov chain model for computer intrusion detection,‖ Journal of Computational and

Graphical Statistics, vol.10, pp.277-295, 2004.

4. T. Guo, and G. Li, ―Neural data mining for credit card fraud detection‖, International Conference on Machine Learning and Cybernetics, pp.3630-3634, July 2008.

5. R. Chen, S. Luo, X. Liang and V.C.S. Lee, ―Personalized Approach Based on SVM and ANN for Detection Credit Card Fraud‖,

International Conference on Neural Networks and brain, pp. 810-815, April 2006. 6. G. Mota, J. Fernandes and O. Belo, ―Usage signature and applications analysis an alternative method for preventing fraud in

ecommerce applications,‖ Proc. IEEE International Conference on data science and Advance Analytics, pp.203-208, October 2014.

7. N. Kimoto and Y. Endo, ―On Linear Clustering with Constraints on Cluster Size,‖ Joint International Conference on Soft Computing and Intelligent Systems and International Symposium on Advanced Intelligent Systems, pp. 832-836, December 2018.

8. G. Ciuperca, V. Girardin and L. Lhote, ―Computation and Estimation of Generalized Entropy rates for Denumerable Markov Chains,‖

IEEE Transactions on Information theory vol. 57, July 2011. 9. T. Murata and H. Ishibuchi, ―Adjusting Membership Functions of Fuzzy Classification Rules by Genetics Algorithms,‖ Proc. of IEEE

International Conference on Fuzzy Systems, 1995.

10. S. Surbhi and Sanjeev Kumar, ―Fraud Detection during Money Transaction and Prevention,‖ International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT 2019).

11. R. Rambola, P. Varshney and P. Vishwakarma, ―Data Mining Techniques for Fraud Detection in Banking Sector,‖ International

Conference on Computing Communication and Automation (ICCCA 2018). 12. J. Kingston, ―Representing, Reasoning and Predicting Fraud using Fraud Plans,‖ International Conference on Research Challenges in

Information Science (RCIS 2017).

13. O. Elrajubi, A. Elshawesh and M. Abuzaraida, ―Detection of Bypass Fraud based on Speaker Recognition‖, International Conference on Information Technology (ICIT 2017).

14. V. Mareeswari and G. Gunasekaran, ―Prevention of Credit Card Fraud Detection based on HSVM,‖ International Conference on

Information Communication and Embedded System (ICICES 2016). 15. E. Tarmazakov and D. Silnov, ―Modern Approaches to Prevent Fraud in Mobile Communications Networks,‖ IEEE Conference of

Russian Young Researchers in Electrical and Electronic Engineering (EIConRus 2018).

16. X. Min and R Lin, ―K-Means Algorithm: Fraud Detection Based on Signaling Data,‖ IEEE World Congress on Service, 2018.

17. S. Delecourt and Li Guo, ―Building a robust mobile payment fraud detection system with adversarial examples,‖ IEEE Second

International Conference on Artificial Intelligence and Knowledge Engineering (AIKE 2019).

18. A. Kasgari, M. Taghavifard, and S. Kharazi ―Price manipulation fraud detection by Intelligent Visual Fraud surveillance system,‖ International Conference on Control, Decision and Information Technologies, 2019.

19. M. Zamini and G Montazer, ―Credit Card Fraud Detection using autoencoder based clustering,‖ International Symposium on

Telecommunications, IST, 2018. 20. K. Yang, ―A Memory-Enhanced Framework for Financial Fraud Detection,‖ IEEE International Conference on Machine Learning and

21. Applications, 2018.

22. B. Omair and A. Alturki, ―Taxonomy of Fraud Detection Metrics for Business Processes,‖ IEEE Access, 2020. 23. N. Malini and M. Pushpa, ―Analysis on Credit Card Fraud Identification Techniques based on KNN and Outlier Detection,‖

International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEEICB 2017).

140-146

Page 23: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

24. I. Benchaji, S. Douzi and B. Ouahidi, ―Using Genetic Algorithm to Improve Classification of Imbalanced Datasets for credit card fraud

detection,‖ Cyber Security in Networking Conference (CSNet), 2018. 25. Y. Chen and C. Wu, ―On Big Data-based Fraud Detection Method for Financial Statements of Business Groups,‖ IIAI International

Congress on Advanced Applied Informatics, 2017.

26. H. Weng, Z. Li, S. Ji, C. Chu, H. Lu, T. Du, and Q. He, ―Online E-Commerce Fraud:A Large-scale Detection and Analysis,‖

International Conference on Data Engineering, IEEE ,2018.

25.

Authors:

Suspended Paper Title:

Abstract:

Keywords:

References:

147-152

26.

Authors: S.Rajeswari, S.A.Arunmozhi, Y.Venkataramani

Paper Title: Q- Learning Algorithm with Network Coding in Multi-Path Transfer Protocol for Wireless Mesh

Network

Abstract: In a wireless mesh network, the network coding algorithm used to improve network efficiency. In

this paper, we have implemented the Q-learning algorithm with CSMA/CA as in distributed co-ordination

function along with multi-path transfer protocol (MPTP). The functioning of CSMA/CA is based on physical

carrier sensing. Q-learning algorithm, along with network coding, is implemented to achieve better throughput.

Our proposed method has used to reduce the packet loss and to minimize the end to end delay of the network

communication. Also, it will improve the possibility of receiver buffer blocking.

Keywords: Network Coding, Q-Learning Algorithm, Mptp, Ieee802.11 Dcf.

References:

1. Amerimehr.M and Ashtiani.F, ―Delay and Throughput Analysis of a Two-Way Opportunistic Network Coding-Based Relay

Network,‖ IEEE Transactions on Wireless Communications, vol. 13, no. 5, (2014), pp. 2863–2873

2. Ahlswede.R, Cai.N and Yeung.R, ―Network Information Flow,‖ IEEE Transactions on Information Theory, vol. 46, no. 4,

(2014),pp. 1204–1216.

3. Ashtiani.F, Amerimehr.M.H and Iraj.M.B, ―An Analytical Approach for Throughput Evaluation of Wireless Network Coding,‖ in

Proceedings of the IEEE International Conference on Communications (ICC‘09), (2009) pp. 1696–1700.

4. Chiu.M Le.J and Lui.J , ―On the Performance Bounds of Practical Wireless Network Coding,‖ IEEE Transactions on Mobile

Computing, vol. 9, no. 8, (2010), pp. 1134–1146

5. Denno.S, Morikura.M, Hirano.T, Sugiyama.T, and Umehara.D, ―Wireless Network Coding in Slotted ALOHA with Two-hop

Unbalanced Traffic,‖ IEEE Journal on Selected Areas in Communications, vol. 27, no. 5 (2013), pp. 647–661.

6. Denno.S, Morikura.M, Sugiyama.T, and Umehara.D, ―Performance Analysis of Slotted ALOHA and Network Coding for Single-

Relay Multi-User Wireless Networks,‖ Ad Hoc Networks, vol. 9, no. 2, (2011), pp. 164 – 179.

7. Ephremides.A and Sagduyu.Y, ―On Broadcast Stability Region in Random Access through Network Coding,‖ in Proceedings of the

44th Annual Allerton Conference on Communication, Control, and Computing, vol. 15, no. 1, (2006),pp. 298–313.

8. Fu.L, Lin.S, Wang.X and Xie.J, ―Hybrid Network Coding for Unbalanced Slotted ALOHA Relay Networks,‖ IEEE Transactions

on Wireless Communications, vol. 15, no. 1, (2016), pp. 298–313.

9. Fu.L and Lin.S,―Unsaturated Throughput Analysis of Physical Layer Network Coding Based on IEEE 802.11 Distributed Coordination

Function,‖ IEEE Transactions on Wireless Communications, vol. 12, no. 11, (2013),pp. 5544–5556.

10. Fragiadakis.C, Georgiadis.L, Paschos.G and Tassiulas.L, ―Wireless Network Coding with Partial Overhearing Information,‖ in

Proceedings of IEEE INFOCOM, (2013), pp. 2337–2345.

11. Geordiadis.L and Xiang.Y, ―A New Wireless Multicast Queuing Design Using Network Coding and Data-Flow Model,‖ IEEE

Communications Letters, vol. 20, no. 8, (2016), pp. 1603–1606.

12. Guo.S, Ji.H, Xiang.Y and Zeng.D, ―On the Throughput of Two Way Relay Networks Using Network Coding,‖ IEEE Transactions on

Parallel and Distributed Systems, vol. 25, no. 1, (2014), pp. 191–199.

13. Jamali.V, Schober.R and Zlatanov.N, ―Bidirectional Buffer-Aided Relay Networks With Fixed Rate Transmission-Part II: Delay

Constrained Case,‖ IEEE Transactions on Wireless Communications, vol. 14, no. 3, (2015), pp. 1339–1355.

14. Li.H and Moghadam.N, ―Queue Stability Analysis in Network Coded Wireless Multicast Network,‖ IEEE Communications Letters,

vol. 20, no. 5, (2016), pp. 950–953.

15. Sagduyu.Y and Ephremides.A, ―Cross-Layer Optimization of MAC and Network Coding in Wireless Queueing Tandem Networks,‖

IEEE Transactions on Information Theory, vol. 54, no. 2, (2008), pp. 554–571

153-157

27.

Authors: Elmer Diaz, Andres Ccopa, Lenis Wong

Paper Title: Cervical Cancer: Machine Learning Techniques for Detection, Risk Factors and Prevention

Measures

Abstract: Cervical Cancer is considered the fourth most common female malignancy worldwide and represents

a major global health challenge. As a result, in recent years, various proposals and researches have been

conducted. This study aims to analyze the data presented in current researches regarding cervical cancer and

contribute to future research, all through the framework of literature review, based on 3 research questions: Q1:

What are the risk factors that cause cervical cancer? Q2: What preventive measures are currently established for

cervical cancer? and, Q3: What are the techniques to detect cervical cancer? Findings show that detection

techniques are complementary since they are categorized under machine learning. Therefore, we recommend

that further study be promoted in these techniques as they are helpful in the detection process. In addition, risk

factors can be considered for a greater scope in detection, such as HPV infection, since it is the most relevant

factor for the development of cervical cancer. Finally, we suggest to conduct further research on preventive

158-163

Page 24: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

measures for cervical cancer.

Keywords: Cervical cancer, Cervical cancer diagnosis, Machine learning.

References:

1. Zur Hausen, H, (2002), ―Papillomaviruses and cancer: from basic studies to clinical application‖. Nature Reviews Cancer, 2(5), 342–

350. doi:10.1038/nrc798.

2. MINSA, (2016) ―Guía de práctica clínica para la prevención y manejo del cancer de cuello uterino‖. Available: ftp://ftp2.minsa.gob.pe/descargas/Prevencion_salud/guia_tecnica_cancer_cuello_utero.pdf

3. P. Cohen et al., ―Cervical Cancer‖ in The Lancent, vol. 393, no. 10167, pp. 169-182, Jan 2019, doi: 10.1016/S0140-6736(18)32470-X.

4. L. Wong, D. Mauricio and G. Rodriguez, ―A systematic literature review about software requirements elicitation‖ in Journal of Engineering Science and Technology, vol. 12, no 2, pp. 296-317, Feb. 2017.

5. B.A Kitchenham and S. Charters, ―Guidelines for performing systematic literature reviews in software engineering version 2.3‖, 2014, from http://www.elsevier.com/__data/promis_misc/ 525444sy stematicreviewsguide.pdf

6. T. Stewart, J. Moodley and F. Walter, ―Population risk factors for late-stage presentation of cervical cancer in sub-Saharan Africa‖, in

Cancer Epidemiology, vol. 53, pp. 81-92, 2018, doi: 10.17863/CAM.17958. 7. M. Fani et al., ―Correlation of human papillomavirus 16 and 18 with cervical cancer and their diagnosis methods in Iranian women: A

systematic review and meta-analysis‖ Current Problems in Cancer, vol. 44, no. 1, 2019, doi: 10.1016/j.currproblcancer.2019.06.008.

8. P. Sharma and S. Pattanshetty ―A study on risk factors of cervical cancer among patients attending a tertiary care hospital: A case-control study‖, Clinical Epidemiology and Global Health, vol. 6, no. 2, pp. 83–87, 2017, doi. 10.1016/j.cegh.2017.10.001.

9. H. Xu et al., ―Hormonal contraceptive use and smoking as risk factors for high-grade cervical intraepithelial neoplasia in unvaccinated

women aged 30–44 years: A case-control study in New South Wales, Australia‖, in Cancer Epidemiology, vol. 55, pp. 162–169, 2018, doi: 10.1016/j.canep.2018.05.013.

10. D. Zahras and Z. Rustam, "Cervical Cancer Risk Classification Based on Deep Convolutional Neural Network," 2018 International

Conference on Applied Information Technology and Innovation (ICAITI), Padang, Indonesia, 2018, pp. 149-153, doi: 10.1109/ICAITI.2018.8686767.

11. K. Okunade et al., ―Comparative analysis of serum trace element levels in women with invasive cervical cancer in Lagos, Nigeria‖ in

Pan African Medical Journal, vol. 31, no 194, 2018, doi: 10.11604/pamj.2018.31.194.14425. 12. M. Smith et al., ―Potential for HPV vaccination and primary HPV screening to reduce cervical cancer disparities: Example from New

Zealand‖ in Vaccine, vol. 36, no. 42, pp. 6314-6324, 2018, doi: 10.1016/j.vaccine.2018.08.063.

13. S. Almazrou, B. Saddik and H. Jradi, ―Knowledge, attitudes, and practices of Saudi physicians regarding cervical cancer and the human papilloma virus vaccine‖ in Journal of Infection and Public Health, vol. 13, no. 4, pp. 584-590, 2019, doi: 10.1016/j.jiph.2019.09.002.

14. R. Sankaranarayanan, ―HPV vaccination: The most pragmatic cervical cancer primary prevention strategy‖, in International Journal of

Gynecology & Obstetrics, vol. 131, pp. 33–35, 2015, doi: 10.1016/j.ijgo.2015.02.014. 15. J. Firmino-Machado et al., ―A 3-step intervention to improve adherence to cervical cancer screening: The SCAN randomized controlled

trial‖ in Preventive Medicine, vol. 123, pp. 250-261, 2019, doi: 10.1016/j.ypmed.2019.03.025.

16. S. Mustafa, S. Adeshina, M. Dauda and W. Soboyejo, "Classification of cervical cancer tissues using a novel low cost methodology for effective screening in rural settings," 2014 11th International Conference on Electronics, Computer and Computation (ICECCO),

Abuja, 2014, pp. 1-4, doi: 10.1109/ICECCO.2014.6997552.

17. S. Kaaviya, V. Saranyadevi and M. Nirmala, "PAP smear image analysis for cervical cancer detection," 2015 IEEE International Conference on Engineering and Technology (ICETECH), Coimbatore, 2015, pp. 1-4, doi: 10.1109/ICETECH.2015.7275029.

18. M. Kuko and M. Pourhomayoun, "An Ensemble Machine Learning Method for Single and Clustered Cervical Cell Classification,"

2019 IEEE 20th International Conference on Information Reuse and Integration for Data Science (IRI), Los Angeles, CA, USA, 2019, pp. 216-222, doi: 10.1109/IRI.2019.00043.

19. K. V. Bhuvaneshwari, and B. Poornima ―Cervical Cancer Cell Identification & Detection Using Fuzzy C Mean and K nearest Neighbor

Techniques‖ in International Journal of Innovative Technology and Exploring Engineering (IJITEE), vol. 8, no. 10, pp. 1080-1084, 2019, doi: 10.35940/ijitee.I7892.0881019.

20. S. Nehra, J. L. Raheja, K. Butte and A. Zope, "Detection of Cervical Cancer using GLCM and Support Vector Machines," 2018 6th

Edition of International Conference on Wireless Networks & Embedded Systems (WECON), Rajpura (near Chandigarh), India, 2018, pp. 49-53, doi: 10.1109/WECON.2018.8782065.

21. D. Kashyap et al., "Cervical cancer detection and classification using Independent Level sets and multi SVMs," 2016 39th International

Conference on Telecommunications and Signal Processing (TSP), Vienna, 2016, pp. 523-528, doi: 10.1109/TSP.2016.7760935. 22. Han Yeong Oh, Seong Hyun Kim and Dong Wook Kim, "A study on the development of diagnosis algorithm and application program

for early diagnosis of cervical cancer using cervix cell," Fourth edition of the International Conference on the Innovative Computing

Technology (INTECH 2014), Luton, 2014, pp. 37-40, doi: 10.1109/INTECH.2014.6927749.

23. M. Rohmatillah, S. H. Pramono, Rahmadwati, H. Suyono and S. A. Sena, "Automatic Cervical Cell Classification Using Features

Extracted by Convolutional Neural Network," 2018 Electrical Power, Electronics, Communications, Controls and Informatics Seminar

(EECCIS), Batu, East Java, Indonesia, 2018, pp. 382-386, doi: 10.1109/EECCIS.2018.8692888. 24. D. Sharma, A. Bhan and A. Goyal, "Cervical Cancer Screening in Pap Smear Images Using Improved Distance Regularized Level

Sets," 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI), Tirunelveli, 2018, pp. 1445-1448, doi:

10.1109/ICOEI.2018.8553943. 25. A. Ghoneim, G. Muhammad and M. S. Hossain, ―Cervical cancer classification using convolutional neural networks and extreme

learning machines‖ in Future Generation Computer Systems, vol. 102, pp. 643-649, 2019, doi: 10.1016/j.future.2019.09.015. 26. M. Devi et al., ―Classification of Cervical Cancer Using Artificial Neural Networks‖, in Procedia Computer Science, vol. 89, pp. 465-

472, 2016, doi: 10.1016/j.procs.2016.06.105.

27. P. Makkonen et al., ―Impact of organized and opportunistic Pap testing on the risk of cervical cancer in young women – A case-control study from Finland‖ in Gynecologic Oncology, vol. 147, no. 3, pp. 601–606, 2017, doi: 10.1016/j.ygyno.2017.09.010.

28. N. Wentzensen et al., ―A prospective study of risk-based colposcopy demonstrates improved detection of cervical precancers‖, in

American Journal of Obstetrics and Gynecology, vol. 218, no. 6, pp. 604.e1–604.e8, 2018, doi: 10.1016/j.ajog.2018.02.009. 29. J. Jagtap et al., "Effective Screening and Classification of Cervical Precancer Biopsy Imagery," in IEEE Transactions on

NanoBioscience, vol. 16, no. 8, pp. 687-693, Dec. 2017, doi: 10.1109/TNB.2017.2728321.

30. Y. Song et al., ―Random biopsy in colposcopy-negative quadrant is not effective in women with positive colposcopy in practice‖ in

Cancer Epidemiology, vol. 39, no. 2, pp. 237–241, 2015, doi: 10.1016/j.canep.2015.01.008.

28.

Authors: Rasheed Saleem Abed

Paper Title: Al-Hadba Minaret in the Last 100 Years

Abstract: Al-Hadba minaret is located in a central location on the right side of the river Tigris within the city of

Mosul North of Iraq. It is one of the important heritage landmarks in Iraq, Mostly characterized by its curvature

and height. It was built before more than 800 years. Later, It was destroyed due to military actions in the summer

of 2017. Recently plans for reconstruction are going on. Accordingly, many different data has to be collected

164-166

Page 25: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

and organized to help form a model closer to the original shape. Prior to its destruction, careful surveying was

performed to record the shape and movement of the minaret. This research provides a description of the results

of this work. For a century, the minaret leaning has been slowly growing closer to the danger point. Modern

construction techniques can be used to rebuild a more stable structure and avoid that movement.

Keywords: AlHadba minaret, Mosul heritage, leaning, deformation surveying.

References:

1. https://en.wikipedia.org/wiki/Great_Mosque_of_al-Nuri_(Mosul) retrieved on 20/7/2020. 2. M. T. H. Al-Layla, "Al-Hadbaa Minaret-problems and solutions," (Proceedings of symposium, 2011). in Arabic.

3. Al-Omari, A., Khalil, A. A., & Khattab, S. (2020). From in situ investigation to FEM analysis: Application of Al-Hadba minaret

foundation. In AIP Conference Proceedings (Vol. 2213 4. Al-Shaikh K.,(1979). Leaning Minarets of Mosul. J. Summer. No.31.

5. Lizzi, F., and G. Carnervale,(1981). The Static Restoration of the Leaning AL-Hadba Minaret in Mosul (Iraq), 3rd International

Symposium on Babylon, Ashor, and Haditha, Baghdad, Iraq. 6. Mahmood, M. N., and Sarsam, H.H., (1989). Leaning of Old Minarets in MOSUL City, International Conference on Case Histories in

Structural Failures, CHSF89, Singapore, pp G28-G39.

7. Abed, Rasheed. S. and Ghassan N. (2013). Measurements in Alhadba Minaret using Robotic Total Station. Eng.& Tech Journal, Vol.31, Part (A), No,5.

29.

Authors: R.Sravani, P.Deepak Reddy

Paper Title: V/C Digital Controlled DC-DC Converter

Abstract: In this paper, the switching of dc-dc converter using voltage/current digital control is proposed. It is

the combination of existed digital average voltage and digital average current controls. The stability analysis of

V/C digital controlled dc-dc converter is derived by using sampled data model. The transient analysis of V/C

digital controlled dc-dc converter is also derived by using z-domain small signal model. The proposed V/C

digital controlled dc-dc converter has over current protection, fast load transient response, no sub-harmonic

oscillations at any value of duty cycle, and wider stability range. The proposed system is analysed with a simple

buck converter. The output voltage and inductor current weighting factors influence the stability boundary and

transient performances of V/C digital controlled dc-dc converter. The stability analysis and transient analysis is

investigated and verified by circuit simulations.

Keywords: sampled data modelling, stability analysis, transfer function, transient analysis, z-domain small

signal modelling.

References:

1. K.-H. Cheng, C.-W. Su, and H.-H. Ko, ―A high-accuracy and highefficiency on-chip current sensing for current-mode control CMOS

DCDC buck converter,‖ in Proc. IEEE 15th Int. Conf. Electron. Circuits Syst., Aug./Sep. 2008, pp. 458–461.

2. Y.-C. Lin, C.-J. Chen, D. Chen, and B. Wang, ―A ripple-based constant on-time control with virtual inductor current and offset cancellation for DC power converters,‖ IEEE Trans. Power Electron., vol. 27, no. 10, pp. 4301–4310, Oct. 2012.

3. K. Yao, Y. Ren, and F. C. Lee, ―Critical bandwidth for the load transient response of voltage regulator modules,‖ IEEE Trans. Power

Electron., vol. 19, no. 6, pp. 1454–1461, Nov. 2004. 4. Y. Chi, X.-Q. Lai, and H.-X. Du, ―Fast transient response high-accuracy current-sensing technique for step-up DC–DC converter,‖

Electron. Lett., vol. 51, no. 7, pp. 577–579, Apr. 2015.

5. G. Zhou, J. Xu, and J. Wang, ―Constant-frequency peak-ripple-based control of buck converter in CCM: Review, unification, and duality,‖ IEEE Trans. Ind. Electron., vol. 61, no. 3, pp. 1280–1291, Mar. 2013.

6. R. Mammano, ―Switching power supply topology voltage mode vs. current mode,‖ Unitrode Corp., Merrimack, NH, USA, Unitrode

Design Note DN-62, 1994. 7. C.-S. Huang, C.-Y. Wang, J.-H. Wang, and C.-H. Tsai, ―A fast-transient quasi-V2 switching buck regulator using AOT control,‖ in

Proc. IEEE Asian Solid-State Circuits Conf., Nov. 2011, pp. 53–56.

8. C.-C. Fang and C.-J. Chen, ―Subharmonic instability limits for V2controlled buck converter with outer loop closed/open,‖ IEEE Trans. Power Electron., vol. 31, no. 2, pp. 1657–1664, Feb. 2016.

9. G. Zhou, S. He, X. Zhang, and S. Zhong, ―Critical output-capacitor ESR for stability of V2 controlled buck converter in CCM and

DCM,‖ Electron. Lett., vol. 50, no. 12, pp. 884–886, Jun. 2014. 10. D. M. Mitchell, ―An analytical investigation of current-injected control for constant-frequency switching regulators,‖ IEEE Trans.

Power Electron., vol. PE-1, no. 3, pp. 167–174, Jul. 1986.

11. W. Tang, F. C. Lee, and R. B. Ridley, ―Small-signal modeling of average current-mode control,‖ IEEE Trans. Power Electron., vol. 8, no. 2, pp. 112–119, Apr. 1993.

12. C. Restrepo, J. Calvente, A. Romero, E. Vidal-Idiarte, and R. Giral, ―Current-mode control of a coupled-inductor buck–boost DC–DC

switching converter,‖ IEEE Trans. Power Electron., vol. 27, no. 5, pp. 2536–2549, May 2012. 13. F. Wang, J. Xu, and B. Wang, ―Comparison study of switching DC-DC converter control techniques,‖ in Proc. IEEE Int. Conf.

Commun. Circuits Syst., Jun. 2006, pp. 2713–2717.

14. C. Mi, J. Xu, G. Zhou, and Y. Jin, ―On the stability of V2C controlled boost converter in continuous conduction mode,‖ in Proc. IEEE 6th Int. Power Electron. Motion Control Conf., May 2009, pp. 1300–1304.

15. W. Huang, ―A new control for multi-phase buck converter with fast transient response,‖ in Proc. IEEE 16th Annu. Appl. Power

Electron. Conf. Expo., Mar. 2001, pp. 273–279.

16. P. Cortés, M. P. Kazmierkowski, R. M. Kennel, D. E. Quevedo, and J. Rodríguez, ―Predictive control in power electronics and drives,‖

IEEE Trans. Ind. Electron., vol. 55, no. 12, pp. 4312–4324, Dec. 2008.

17. Z. Zhang et al., ―Predictive control with novel virtual-flux estimation for back-to-back power converters,‖ IEEE Trans. Ind. Electron., vol. 62, no. 5, pp. 2823–2834, May 2015.

18. J. Chen, A. Prodic, R. W. Erickson, and D. Maksimovic, ―Predictive digital current programmed control,‖ IEEE Trans. Power Electron.,

vol. 18, no. 1, pp. 411–419, Jan. 2003. 19. G. Zhou, J. P. Xu, and Y. Y. Jin, ―Improved digital peak voltage predictive control for switching DC–DC converters,‖ IET Power

Electron., vol. 4, no. 2, pp. 227–234, Feb. 2011.

20. G. Zhou, J. Xu, and Y. Jin, ―Elimination of subharmonic oscillation of digital-average-current-controlled switching DC–DC converters,‖ IEEE Trans. Ind. Electron., vol. 57, no. 8, pp. 2904–2907, Aug. 2010.

21. X. Liu, G. Zhou, M. Leng, and S. Zhou, ―Digital average voltage control for switching DC-DC converters,‖ in Proc. IEEE8th Int. Power

167-175

Page 26: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

Electron. Motion Control Conf., May 2016, pp. 1156–1160.

22. J. Xu, G. Zhou, and M. He, ―Improved digital peak voltage predictive control for switching DC–DC converters,‖ IEEE Trans. Ind. Electron., vol. 56, no. 8, pp. 3222–3229, Aug. 2009.

23. G. Zhou, J. Xu, J. Wang, and Y. Jin, ―Comparison study on digital peak current, digital peak voltage, and digital peak voltage/peak

current controlled buck converter,‖ in Proc. IEEE 4th Conf. Ind. Electron. Appl., May 2009, pp. 799–804.

24. G. Feng, E. Meyer, and Y.-F. Liu, ―A new digital control algorithm to achieve optimal dynamic performance in DC-to-DC converters,‖

IEEE Trans. Power Electron., vol. 22, no. 4, pp. 1489–1498, Jul. 2007.

25. P. Karamanakos, T. Geyer, and S. Manias, ―Direct voltage control of DC-DC boost converters using model predictive control based on enumeration,‖ in Proc. IEEE 15th Int. Power Electron. Motion Control Conf., Sep. 2013, pp. DS2c.10-1–DS2c.10-8.

26. L. Cheng, P. Acuna, R. P. Aguilera, M. Ciobotaru, and J. Jiang, ―Model predictive control for DC-DC boost converters with constant

switching frequency,‖ in Proc. IEEE 2nd Annu. Southern Power Electron. Conf., Auckland, New Zealand, Dec. 2016, pp. 1–6. 27. R. Redl and J. Sun, ―Ripple-based control of switching regulators— An overview,‖ IEEE Trans. Power Electron., vol. 24, no. 12, pp.

2669–2680, Dec. 2009.

28. G. F. Franklin, J. D. Powell, and M. L. Workman, Digital Control of Dynamic Systems, 3rd ed. Reading, MA, USA: Addison-Wesley, 1998.

29. K.-H. Cheng, C.-W. Su, and H.-H. Ko, ―A high-accuracy and highefficiency on-chip current sensing for current-mode control CMOS

DCDC buck converter,‖ in Proc. IEEE 15th Int. Conf. Electron. Circuits Syst., Aug./Sep. 2008, pp. 458–461. 30. Guohua Zhou, hongbo zhao, W.Z, S.Xu ―Digital average voltage/ digital average current predictive control for switching dc-dc

converters,‖ IEEE Journal of emerging and selected topics in power electronics, vol.6, no.4, December 2018.

30.

Authors: Ponraj A, Aswin Kumar M, Balasubramaniam AS, Giridhar K

Paper Title: Smart Warehouse Governance using AI and Raspberry Pi

Abstract: Sorting is the process of systematic selection and arrangement. Sorting involves intense labor work.

The use of Artificial Intelligence in recognizing the objects by their color makes the process of sorting

completely autonomous. Modern Industries require modern solutions for the problems encountered during the

process of sorting. With the advent of Artificial Intelligence, the machines that can recognize an object by their

color proves to be a primary solution that can completely automate the process of sorting. This paper presents a

five-axis arm mounted on a robotic model that makes use of a color sorting technique. It performs pick and place

operations in real-time. The color sorting technique detects the color of the object in the frame captured by the

camera. The frame size is used to detect the position of the object in the real world. The robot model moves

according to the frame size of the object. Raspberry Pi microcontroller drives the servo motor and dc motor to

move the five-axis arm and the robotic model to sort and perform pick and place operation based on their color.

The color sorting algorithm is based on the Hue-Saturation-Value model. This model finds its application in

places where sorting is done based on color and not the object itself. For example, it is used to sort objects like

different colored clothes, food items, etc. It also finds its application in very large scale warehouses such as

Amazon, Flipkart, etc which focusses on smart automated warehouses that reduce the labor requirements.

Keywords: Microcontroller, Gripper, Servo motors, Webcam, DC motors, Robotic arm, Image processing

References:

1. Goldy Katal, Saahil Gupta, Shitij Kakkar, ―Design and Operation of Synchronized Robotic Arm‖, IJRET: International Journal of

Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308, Volume: 02 Issue: 08 | Aug-2013.

2. Minu Mariya Thomas, Resmi Jose, Sumeesh V.R, Tony George,‖ Objecto-Sortometer‖ International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 p-ISSN: 2395-0072 Volume: 03 Issue: 03 | Mar-2016

3. Lim jie shen*, Irda hassan ‖Design and Development of Color Sorting Robot‖ EURECA 2014 Special Issue January (2015).

4. Peng An, (2016), ―Obstacle avoidance strategy of mobile robot based on wireless sensor networks‖, International Journal of Online and Biomedical Engineering, Vol 12, No11.

5. Rodica Holonec, (2008), ―An Automated Sorting System Based on Virtual Instrumentation Techniques‖, International Journal of

Online and Biomedical Engineering, Vol 4.

176-179

31.

Authors: José Luis Hernández Corona, Ernesto Mendoza Vázquez, Alejandra Ortiz Castro, Amador Arroyo

López, Moisés Martínez Aguirre

Paper Title: Implementation of an Automated System in the Measurement of Temperature in Broken Dynamic

Equipment

Abstract: This article presents a titration project describing the implementation in the rotodynamic equipment

of an economical automated temperature module, as a preventive solution for future failures caused by the lack

of analysis in the increase or decrease in temperature. The project is currently contextualized in the area of

industry, first, providing background to frame the importance of temperature control and measurement and also

know what its evolution has been like. Immediately focuses on explaining the theoretical basis for giving context

to the reader. For the purpose of detecting the increase or decrease of heat in machinery by implementing a

monitoring system. The development of the project is based on the use of an LM35 transistor that connected to

an Arduino Uno through various cables, will display the temperature measurement and make interface of the

obtained results that will be reflected in a 2x16 LCD screen. The project is applied in a prototype bench in three

key parts of the pulley, and in the two bearings to make the simulations, then perform corresponding tests and

check that theory. A simple and lower cost system, but above all efficient that meets the expectations of the

problem presented.

Keywords: Control, automation, electromechanical failures, Signals, Simulation.

References:

1. Albañil, HH, & Espejo Mora, E. (2002). Fracture Mechanics And Failure Analysis. Bogotá: National University of Colombia.

2. Coltters, R. (August 20, 2013). Thermal fatigue - effect of temperature. Obtained from

Metfsusion:https://metfusion.wordpress.com/2013/08/20/fatiga-termica/ .Consult Friday, June 12. 3. Granda, G. (April 24, 2020). The reason. Main Models of Thermal graphic cameras.

180-183

Page 27: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

4. How to prevent overheating in heavy machinery? (January 10, 2018). Obtained from Bardhal,

industry:https://www.bardahlindustria.com/blog/page/57/ .Retrieved Friday, June 12. 5. "Protection systems and safety devices in machinery and equipment used in workplaces" Official Mexican Standard, NOM-004-STPS-

199, Official Gazette of the Federation, May 31, 1999.

6. Enriquez Harper G. [Ed.1]. (2004). Fundamentals of electric motor control in industry. Mexico City. Mexico: Limusa p. (125,150).

7. Villena, R. The protector of Tools. Extremadura The Newspaper obtained

fromhttps://www.elperiodicoextremadura.com/noticias/almendralejo/protector-herTools_1236008.html, accessed June 5, 2020.

8. CDMX Electronics, (2020). LM35 temperature sensor obtained from:https://www.cdmxelectronica.com/producto/sensor-de-temperatura-lm35/

9. Montero, Á. G. (2015). Electronics I An innovative, simple, easy-to-use system that can revolutionize data acquisition and process

control: fast, simple, intuitive, easy. Research and Science. obtained from:https://www.investigacionyciencia.es/blogs/fisica-y-quimica/9/posts/electrnica-libre-i-12878

10. Educate for change. (2020). Schematic of the complete assembly of the Prototype. Obtained

from:https://educarparaelcambio.com/arduino/reto-4-liquid-crystal-display-pantalla-lcd/

32.

Authors: Alex R Mathew

Paper Title: Threats and Protection on E-Sim

Abstract: Threats involve various risks and threats are associated with the embedded SIM technology, for

instance, the Internet of things (IoT) identity. IoT refers to the working capabilities enabling the allocation of

unique identifiers (UID) to effectively connect with the related devices thus enhancing communication. An e-

SIM application cannot produce reliable and actual data used to obtain the subscriber‘s anticipated outcome. The

SIM technology does not provide some reliable data that can be employed by the user to formulate some serious

productive outcomes. Failure by the technology to process and automatically provide the user with the

notification suppose of any infringement or hacking. SIM-jacking is the other notable threats facing the

embedded universal integrated connectivity card (e-UICC). Incompetent Log Rhythm Al Engine influences the

fraudster hacking experience due to failure protections within the operational surrounding. The e-SIM

technology system lacks timely threat, risk, and other various vital operations predictability to react to the

experienced unbearable operations challenges induced by the fraudsters. Similarly, the embedded SIM incurs the

insider threats whereby the service providers fail to secure the much-needed privacy concerning an individual‘s

vital information. The situations of personal data leakage are witnessed within the system operations.The e-SIM

hijacking enables the fraudsters to secretly obtain the victim‘s vital data of the subscriber, hijack, and receive the

information intended to the individual to his/her personal phone. The process results to complete mobile account

operations by the hacker resulting to further access to the victim‘s bank information and transfer of cash. The

other threat experienced by e-SIM users is the provision of false information. The SIM subscribers normally fall

into traps of the fraudsters by receiving short messages (SMS) citing assistance kind of news from the service

providers, thus drawing the victim‘s bank amount. Identity fraud and device poisoning are other additional

threats encountered in the application of e-SIM. Generally, the entire process of fraud invasion and victimization

influence the victim‘s business decisions of the affected individuals. Protections focuses on the embedded SIM

provides greater security in addition to a re-programmable technological system, unlike the physical SIM card.

The subscriber's personal information is not contained within the e-SIM but with the service providers, thus

enhancing its effectiveness. An e-SIM enables the consumers to effectively shift carriers between the T-Mobile

and Sprint without physical movement, thus supportive of security systems. Despite the security measures put

into place, e-SIM like any other SIM card experiences information theft. Therefore, the service providers should

encounter the emerging fraudster effects by proper monitoring of the network system to enable security

restrictions. The system should induce strict conditions that enable the evaluation and differentiation between the

IoT and the non-IoT devices during their operation.

Keywords: Cellular network, Charging, IoT and non-IoT devices, and Security.

References:

1. M. M. Danziger, L. M. Shekhtman, A. Bashan, Y. Berezin, and S. Havlin, 2016.

Vulnerability of interdependent networks and networks of networks. In Interconnected

networks (pp. 79-99). Springer, Cham. 2. J. Franklin, C. Brown, S. Dog, N. McNab, S. Voss-Northrop, M. Peck, and B. Stidham, 2016. Assessing Threats to Mobile Devices &

Infrastructure: the Mobile Threat Catalogue (No. NIST Internal or Interagency Report (NISTIR) 8144 (Draft)). National Institute of

Standards and Technology. 3. J. M. Heikkilä, 2017. Information security risk analysis and mitigation methods for industrial internet in industrial vendor

segment (Master's thesis).

4. Y. Huang, and P. Mishra, 2020, March. Vulnerability-aware Dynamic Reconfiguration of Partially Protected Caches. In 2020 21st International Symposium on Quality Electronic Design (ISQED) (pp. 255-260). IEEE.

5. S. R. Hussain, M. Echeverria, A. Singla, O. Chowdhury, and E. Bertino, 2019, May. Insecure connection bootstrapping in cellular

networks: the root of all evil. In Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks (pp. 1-11).

6. M. Jakobsson, 2020. Social Engineering Resistant 2FA. arXiv preprint arXiv:2001.06075.

7. Y. S. Jang, 2020. Detection of SQL Injection Vulnerability in Embedded SQL. IEICE Transactions on Information and Systems, 103(5), pp.1173-1176.

8. M. Khan, P. Ginzboorg, K. Järvinen, and V. Niemi, 2018, November. Defeating the downgrade attack on identity privacy in 5G.

In International Conference on Research in Security Standardisation (pp. 95-119). Springer, Cham. 9. P. Pathak, N. Vyas, and S. Joshi, 2017. Security Challenges for Communications on IOT & Big Data. International Journal of

Advanced Research in Computer Science, 8(3).

10. K. Sung, B. Levine, and M. Zheleva, 2020, July. Protecting location privacy from untrusted wireless service providers. In Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (pp. 266-277).

11. Y. Wang, J. Shen, J. Lin, and R. Lou, 2019. Staged method of code similarity analysis for firmware vulnerability detection. IEEE

Access, 7, pp.14171-14185. 12. T. Xie, G. H. Tu, C. Y. Li, and C. Peng, 2020. How Can IoT Services Pose New Security Threats In Operational Cellular

184-186

Page 28: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

Networks? IEEE Transactions on Mobile Computing.

33.

Authors: Anjani K. Upadhyay, Debasmita Chatterjee, Madhuri Swain, Lopamudra Ray

Paper Title: Evaluation of a Potential Antibacterial, Produced by Streptomyces Cinereoruber Sp. Isolated from

Chlika lake.

Abstract: Streptomyces, isolated from marine and estuarine habitat have been widely recognized as a potential

source of antifungal, anti-tumour, anti-bacterial compounds. In the present study, the antimicrobial agent

production potential of a Streptomyces cinereoruber sp was evaluated. The selective isolation of the strain was

carried out on starch casein agar. The primary screening of the Streptomyces isolate was done by cross streak

method against pathogenic test strains Escherichia.coli MTCC 82, Staphylococcus aureus MTCC 96, Bacillus

cereus IP406 and Salmonella typhi MTCC 734 and Micrococcus leuteus and the antimicrobial property against

Micrococcus leuteus was confirmed. The secondary screening was carried out by using the culture supernatant

against the test strain by agar well diffusion method. The growth and antimicrobial production ability of the

strain against Micrococcus leuteus was studied. The antimicrobial agent production was also observed till pH 11

and NaCl concentration 3% (w/v). The partially purified compound showed a peak similar to streptomycin in

HPLC. The culture condition for the production of the compound was optimised.

Keywords: Streptomyces, Antibacterial, Optimization

References:

1. Andrews, J. M. 2001. Determination of minimum inhibitory concentrations. J. Antimicrob. Chemother. 48(Suppl. 1):5–16

2. Betina V.1983. The chemistry and biology of antibiotics. Amsterdam: Elsevier Scientific Pub. Co; p. 190.

3. Costanza R, Kemp WM, Boynton WR.1993. Predictability, scale, and biodiversity in coastal and estuarine ecosystems: implications for management. Ambio.1:88-96.

4. de lima procopio, R. E; da silva, I. R; Martins, M.K; de azevedo, J.L & de Araujo, J. M. (2012) Antibitics produced by Streptomyces.

Braz J Infect Dis. 16: 466-471. 5. Goodfellow, M. (1989). The Actinomycetes I. Supragenericclassifcation of actinomycetes. In Bergey's Manual of

SystematicBacteriology, vol. 4, pp. 2333±2339. Edited by S. T. Williams, M. E. Sharpe & J. G. Holt. Baltimore: Williams &Wilkins.

6. Goodfellow, M., Kumar, Y., Labeda, D. P. & Sembiring, L. 2007. The Streptomyces violaceusniger clade: a home for streptomycetes with rugose ornamented spores. Antonie Van Leeuwenhoek 92,173-99.

7. Gordon, R. E., Barnett, D. A., Handerhan, J. E. and Pang, C. H.N. 1974. Nocardia coeliaca, Nocardia autotrophica, and the nocardin

strain. Int J Bacteriol 24, 54-63. 8. Holder, I.A., and Boyce, S. T. 1994. Agar well diffusion assay testing of bacteriak susceptibilitu to various antimicrobials in

concentration non-toxic for human cell in culture. Burns, 20 426-429.

9. Jayapal KP, Lian W, Glod F, Sherman DH, Hu WS. 2007. Comparative genomic hybridizations reveal absence of large Streptomyces

coelicolor genomic islands in Streptomyces lividans. BMC Genomics, 8:229.

10. Kagan IA, Flythe MD. 2014. Thin-layer chromatographic (TLC) separations and bioassays of plant extracts to identify antimicrobial

compounds. JoVE. (85). 11. Kampfer, P. & Labeda, D. P. 2006. International Committee on Systematics of Prokaryotes; Subcommittee on the taxonomy of the

Streptomycetaceae: Minutes of the meeting, 25 July 2005, San Francisco, CA, USA. Int J Syst Evol Microbiol 56, 495.

12. Kelly, K.I. 1964. Inter-society color council-national bureau of standard color-name charts illustrated with centroid colors. US Government Printing Office, Washington.

13. Shirling, E. B. & Gottlieb, D. 1966. Methods for characterization of Str8eptomyces species. Int J Syst Bacteriol 16, 313–340.

14. Srinivas TN, Kumar PA, Sucharitha K, Sasikala C, Ramana CV.2009. Allochromatium phaeobacterium sp. nov. Int J Syst Evol Microbiol. 59:750-3.

15. Sucharita K, Sasikala C, Park SC, Baik KS, Seong CN, Ramana CV.2009. Shewanella chilikensis sp. nov., a moderately alkaliphilic

gammaproteobacterium isolated from a lagoon. International journal of systematic and evolutionary microbiology.59:3111-5. 16. Taddi, A; Rodriguez, H. J.; Marquez-Vilchez; Castelli, C. 2006. Isolation and identification of streptomyces sp. From venezuelan site:

Morphological and biochemical studies. Microbiological Research 161:222-231.

17. Tindall, B. J., Sikorski, J., Smibert, R. M. & Kreig, N. R. 2007. Phenotypic characterization and the principles of comparative systematics. In Methods for General and Molecular Microbiology, 3rd edn, pp. 330–393. Edited by C. A. Reddy, T. J. Beveridge, J. A.

Breznak, G. A. Marzluf, T. M. Schmidt & L. R. Snyder. Washington, DC: American Society for Microbiology.

18. Williams, S.T., Goodfellow, M., Alderson, G., Wellington, E. M. H., Sneath, P. H. A., Sackin, M. J. 1983. Numerical classification of Streptomyces and related genera. J. Gen Microbiol 129, 1743-1813.

19. Williams, S.T., Goodfellow, M., & Alderson, G. 1989. Genus Streptomyces Waksman and Henrici 1943. 339 AL. In Bergey’s manual of

Sytematic Bacteriology, vol. 4, pp. 2452-2492. Edited by S.T. Williams, M. E. Sharpe & J. G. Holt. Baltimore: Williama &Wikins.

187-197

34.

Authors: Nurul Syahira Binti Nordin, Woo Ying Yee, Md Saeed Hasan Joarder, Badrul Hisham Bin Ahmad.

Paper Title: Compression Studies on LoRa Antenna Design for IoT Applications

Abstract: In this paper, a review on the LoRa antenna design for IoT application is studied. The expansion of

the Internet of Things ( IoT) has led the industry to develop new communication solutions, as current protocols

are inadequate in terms of scope and energy efficiency to satisfy IoT requirements. Before studying antenna

design, some background LoRa and IoT were discussed at beginning of the paper. LoRaWAN is an open

LPWAN standard developed by LoRa Alliance and has main characteristics such as low energy consumption,

long-range communication, builtin protection and GPS-free positioning. Besides, a comparison according to the

method, resonance frequency, material, size of the antenna and the output is shown in the form of table. In

addition, the strength and the weakness of each of the antenna design were discussed before the end of the paper.

Keywords: LoRa, IoT, antenna design, resonance frequency.

References:

1. H. Karjaluoto, ―An Investigation of Third Generation ( 3G ) Mobile Technologies and Services", May, 2014.

2. V. T. Conference, 2000 IEEE 51 st Vehicular Technology Conference. 2000. 3. N. Todtenberg and R. Kraemer, ―Ad Hoc Networks A survey on Bluetooth multi-hop networks‖, Ad Hoc Networks, vol. 93, 2019.

4. B. Hammi, R. Khatoun, A. Fayad, and L. Khoukhi, ―Internet of Things (IoT) Technologies for Smart Cities Internet of Things (IoT)

198-201

Page 29: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

Technologies for Smart Cities‖, 2017.

5. R. G. P. V. K, ―Agriculture Monitoring with Lora Based Wireless Sensor Networks‖, vol. 7, no. 02, 2019, pp. 650–655. 6. M. Usmonov and F. Gregoretti, ―Design and implementation of a LoRa based wireless control for drip irrigation systems Design and

Implementation of a LoRa Based Wireless Control for Drip Irrigation Systems‖, 2019.

7. D. Bankov, E. Khorov, and A. Lyakhov, ―On the Limits of LoRaWAN Channel Access‖, November, 2016.

8. J. Buckley et al., ―Compact 433 MHz antenna for wireless smart system applications Compact 433 MHz antenna for wireless smart

system applications,‖ April, 2014, pp. 2013–2015.

9. L. H. Trinh et al., ―Miniature Antenna for IoT Devices Using LoRa Technology‖, 2017, pp. 170–173. 10. F. Ferrero and S. Antipolis, ―Dual-band LoRa Antenna : Design and Experiments‖, pp. 243–246.

11. Q. Zhang and Y. Gao, ―Embedded Antenna Design on LoRa Radio for IoT Applications‖, pp. 2–4.

12. L. H. Trinh, T. Q. K. Nguyen, H. L. Tran, P. C. Nguyen, N. V Truong, and F. Ferrero, ―Low-profile horizontal omni-directional antenna for LoRa wearable devices‖, 2017, pp. 136–139.

13. H. T. Chattha, M. K. Ishfaq, Y. Saleem, Y. Huang, and S. J. Boyes, ―Band-Notched Ultrawide Band Planar Inverted-F Antenna‖, 2012.

35.

Authors: Susamma Mathew, Garima Saini, S.S Gill

Paper Title: Design of Compact MIMO Antenna for 5G Mobile Terminal

Abstract: This report gives the research work carried out for design and analysis of MIMO antenna using two

identical Microstrip slot radiators having enhanced isolation. The slot radiators offer compact size in order to

accommodate other electronic components for reduction of volume of the wireless communication system. The

defected ground structure is formed on the ground plane in between the antenna elements and feed lines to

improve the isolation between them. The substrate used for constructing the antenna is FR-4 having the

measurements of 26mm x 22mm x 0.8mm and it has the relative permittivity of 4.4. The printed microfilm strip

etched on the opposite side of the substratum is used to couple the signal to each antenna. The HFSS software is

used in this paper for designing the antenna and for checking the performance of the antenna. The -10dB

bandwidth is 1.1GHz in the frequency range of 3.1 GHZ to 4.2GHz. The maximum isolation obtained after

simulation is -23.1dB at 3.13GHz. The maximum gain of 2.26dB is obtained. Simulated radiation diagram of the

designed antenna indicates that it is a good radiator for 5G applications in the sub 6GHz frequency band.

Keywords: MIMO, Microstrip Slot radiators, Reflection coefficient, Isolation, 5G

References:

1. S.Sharawi, Muhammad Ikram and Atif Shamim, ―A Two Concentric Slot Loop Based Connected Array MIMO Antenna System for 4G/5G Terminals‖, IEEE Transactions on Antennas and Propagation, Vol. 65, Issue: 12, Page(s): 6679 – 6686, December 2017

2. Haitham Alsaif, Muhammad Usman, Muhammad T. Chughtai, and Jamal Nasir, ―Cross Polarized 2×2 UWB-MIMO Antenna System

for 5G Wireless Applications‖, Progress In Electromagnetics Research , Vol. 76, pp.157–166,2018(Received 11 October 2018, Accepted 21 November 2018, Scheduled 7 December 2018)

3. Mujeeb Abdullah, Yong-Ling Ban, Kai Kang, Ming-Yang Li, and Muhammad Amin, ―Eight-Element Antenna Array at 3.5GHz for

MIMO Wireless Application‖, Progress In Electromagnetics Research , Vol. 78, pp:209–216, 2017(Received 23 August 2017, Accepted 29 September 2017, Scheduled 17 October 2017)

4. He Huang, Xiaoping Li and Yanming Liu ―A Low Profile, Dual-polarized Patch Antenna for 5G MIMO Application‖, IEEE

Transactions on Antennas and Propagation, Volume: 67, Issue: 2, pp.1275-1279, Feb. 2019 5. Huiqing Zhai, Lei Xi, Yiping Zang and Long Li ―A Low Profile Dual-polarized High Isolation MIMO Antenna Arrays for Wideband

Base Station Applications‖, IEEE Transactions on Antennas and Propagation, Volume: 66,Issue:1,pp:191-202, Jan. 2018

6. Ming-Yang Li, Yong-Ling Ban, Zi-Qiang Xu and Gang Wu, ―Eight-Port Orthogonally Dual- Polarized Antenna Array for 5G Smartphone Applications‖, IEEE Transactions on Antennas and Propagation, Volume: 64, Issue: 9, pp.3820-3830, September 2016

7. Muhammad Ikram, Rifaqat Hussain and Mohammad S. Sharawi, ―4G/5G antenna system with dual function planar connected array‖,

IET Microwaves, Antennas & Propagation, Vol.11,Issue 12, pp. 1760-1764, October 2017 8. Manish Kumar Soni and Garima Saini, ―A Compact Dual Element PIFA Array for Wireless MIMO Advanced TDD LTE

Applications‖, International Journal of Advancement in Engineering Technology, Management and Applied Science, Volume: 04,

Issue: 09, PP. 85-93, September 2017

9. R. Anita, P. V. Vinesh, K. C. Prakash, P. Mohanan, and K. Vasudevan, ―A Compact Quad Element Slotted Ground Wideband Antenna

for MIMO Applications‖, IEEE Transactions on Antennas and Propagation,Vol:64,Issue:10,pp:4550-4553,October2016, 10. Vincent Tseng and Cheng‐Yuan Chang ―Linear Tapered Slot Antenna for Ultra‐Wideband Radar Sensor: Design Consideration and

Recommendation‖, MDPI Sensors, pp: 1-24, Received: 6 January 2019;; Accepted:5 March 2019;Published 9 March 2019 5 March

2019; www.mdpi.com/journal/sensors. 11. Nurhayati, Eko Setijadi, and Gamantyo Hendrantoro, ―Radiation Pattern Analysis and Modeling of Coplanar Vivaldi Antenna Element

for Linear Array Pattern Evaluation‖, Progress In Electromagnetics Research B, Vol. 84, pp: 79-96, 2019, Received 5 April 2019,

Accepted 22 May 2019, Scheduled 14 June 2019

202-206

36.

Authors: Aditi

Paper Title: Health and Housing for Urban Poor in India Post Covid-19

Abstract: The COVID-19 pandemic has built a troublesome new standard for everybody through shelter-in-

place systems and physical and social distancing guidelines. Yet for billions of urban underprivileged, certain

guidelines aren‘t merely troublesome; they‘re radically impracticable. Social and physical distancing is a

severely significant acknowledgement to the pandemic COVID-19 however, it additionally implies that

occupants must have sufficient space, services and social security nets to sustain such an order. It is candidly not

the fact over cities in Asia, Latin America and Africa. Health facilities and services are deficient in terms of the

transition from state to local level causing negligence of slum areas at global to micro-level. These dwellers of

slums area accustomed to unhygienic and un-sanitized environment much on a regular basis. Majority of slums

are vastly located near urban centers i.e. in and around in economically less developed countries, experiencing

urbanization at a greater rate compared to more developed countries. Many countries often lack the ability to

provide infrastructure like roads, affordable housing, basic services like water, sanitation etc., sufficiently for in-

fluxing people in the cities due to urbanization creating a big concern for the country. Health policies need to

208-216

Page 30: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

consider equity and social justice for urban poor in order to equally uplift them in the society. The paper deals

with the issues faced by the urban poor in India and the programs and policies that had been issued over time

during the past which could not suffice to positively impact the downfalls of these people. The paper also

highlights the health conditions of these urban poor and the areas where it has been lacking behind. The

pandemic has caused the nation to come to a halt but the urban poor having no such privilege to comply with the

situation are forced to thrive in degrading conditions. The research paper will help figure out trigger areas for

downfall of these inhabitants of the nation and formulate strategies to counteract the same in post COVID-19

situation.

Keywords: Health conditions, Housing, Slums, Urban and rural India urbanization, Urban poor

References:

1. Agarwal S, Sangar K. Need for dedicated focus on urban health within national rural health mission. Indian J Public Health.

2005;49(3):141-51. 2. Challenges of Slums-Global Report on Human Settlements 2003 available on www.unchs.org

3. Govt. of India, Ministry of Housing and Urban Poverty Alleviation.2001.Draft National Slum Policy:2001. Nirman Bhawan, New

Delhi 4. Ramachandran R. Urbanization and urban system in India. New Delhi: Oxford University Press. 2001.

5. Report of the committee on slum statistics/census, Government of India, 2001, pp. 6-7.

6. Report of the 11th Five Year Plan(2007-2012).Working Group on Urban Housing with Focus on Urban Slums. Ministry of Housing and Urban Poverty Alleviation, Govt. of India

7. Women‘s medical service. Summary of the findings of investigations into the causes of maternal mortality in India. New Delhi, 1947.

8. Urban Health Resource Centre, ―Health of the urban poor in India; key results from the NFHS, 2005–2006‖. 2007. 9. http://pdf.usaid.gov/pdf_docs/Pnadk385.pdf

10. http://nbo.nic.in/images/pdf/report_of_slum_committee.pdf

11. https://shodhganga.inflibnet.ac.in/bitstream/10603/115771/15/15_chapter%208.pdf

37.

Authors: Sachchidanand Shukla, Pratima Soni, Naresh Kumar Chaudhary, Geetika Srivastava

Paper Title: Development of Low Frequency Small Signal Amplifier using BJT-JFET in Sziklai Pair Topology

Abstract: A new PSpice Model of BJT and JFET is proposed and its hybrid combination is used in Sziklai pair

topology to design small signal amplifier. The proposed amplifier with maximum voltage gain 30.41, maximum

current gain 43.05 and THD 2.44% is capable of amplifying low magnitude signals in a frequency range

distributed from 3.035Hz to 93.808Hz. This feature explores the possibility to use proposed amplifier circuit in

EEG, seismographs and underwater communication circuits. Three different circuit/device combinations are also

exposed during the exploration of proposed amplifier and therefore mentioned with primary details. Qualitative

behaviour, e.g. temperature dependency, noise behaviour, effect of the variation of biasing resistances and

capacitors, small signal AC analysis etc., of the proposed circuit, is also studied to observe its performance under

different environment

Keywords: Sziklai pair, Circuit Simulation, Small signal Amplifier.

References:

1. Rod Elliott, ―Compound pair Vs Darlington pair‖, http://sound.westhost.com/articles/cmpd-vs-darl.htm, January 6, 2011

2. David A. Hodges, ―Darlington‘s Contribution to Transistor Circuit Design‖, IEEE Transactions on Circuits and Systems-I, Vol.46, No.-1, January 1999, pp 102-104

3. George C. Sziklai, ―Push-pull complementary type transistor amplifier‖, U.S. Patent 2,762,870, September 11, 1956

4. B. Pandey, S. Srivastava, S. N. Tiwari, J. Singh and S. N. Shukla, ―Qualitative Analysis of Small Signal Modified Sziklai Pair Amplifier‖, Indian Journal of Pure and Applied Physics, 50, 2012, pp 272-276

5. S.N.Shukla and S.Srivastrava, ―A New Circuit Model of Small-signal Sziklai pair amplifier‖, International Journal of Applied Physics and Mathematics, Vol.3, No.4, 2013, pp 231-236

6. S.N. Shukla, G. Srivastava, P. Soni, R. Mishra, ―Development of a Small Signal Amplifier with Modelling of BJT-JFET Unit in Sziklai

Pair Topology‖, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol.8, Issue 5, 2019, pp 1530-1538

7. M. H. Rashid, ―Introduction to PSpice Using OrCAD for Circuits and Electronics‖, Pearson Education, 3rd Ed., 2004, pp 255-256

8. R. Green, G. R. Nicol, ―An amplifier and recording system for seismic crustal refraction work‖, New Zealand Journal of Geology and Geophysics, Vol.12, 1969, pp 771-783

9. R.S. Khandpur, ―Hand Book of Bio-medical Instrumentation‖, Tata McGraw Hill, 2nd ed. (Sixth reprint), 2005, pp 170-175

10. Y.Q. Tan, F. Ibrahim and M. Moghavvemi, ―Two Electrodes Low Voltage Input EEG Amplifier for Brain Computer Interface‖, IEEE International Conference on Intelligent and Advanced Systems, 2007, pp 315-320

11. M. H. Sayed ElAhl, M. M. E. Fahmi, S. N. Mohammad, ―Qualitative analysis of high frequency performance of modified Darlington

pair‖, Solid State Electronics, Vol. 46, 2002, pp 593-595 12. M.H. Ali, Aliyu Sisa Aminu, ―Analysis of Darlington pair in Distributed Amplifier Circuit‖, IOSR Journal of Electrical and

Electronics Engineering, Vol.10, Issue 2, Ver.I, 2015, pp 77-80

13. S. N. Shukla, ―Small-signal amplifier with JFETs in triple Darlington topology‖, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol.3, Issue 9, 2014, pp 18812-18819

14. A. Mottershead, ―Electronic Devices and Circuits‖, Printice-Hall of India, 16th reprint, 1993, pp 360

15. Bridget Benson, Ying Li, Brian Faunce, Kenneth Domond, Don Kimball, Curt Schurgers, Ryan Kastner, ―Design of a Low-Cost Underwater Acoustic Modem‖, IEEE Embedded Systems Letters, VOL. 2, NO. 3, 2010, pp 58-61

16. R. Zimmerman, G. L. D'Spain and C. D. Chadwell, "Decreasing the radiated acoustic and vibration noise of a mid-size AUV," in IEEE

Journal of Oceanic Engineering, vol. 30, no. 1, 2005, pp. 179-187

217-223

38.

Authors: T. Tritva Jyothi Kiran

Paper Title: Deep Transform Learning Vision Accuracy Analysis on GPU using Tensor Flow

Abstract: Transfer learning is one of the most amazing concepts in machine learning and A.I. Transfer learning 224-227

Page 31: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

is completely unsupervised model. Transfer learning is a machine learning technique in which a network that has

been trained to perform a specific task is being reused or repurposed as a starting point to perform another

similar task. For this work I used ImageNet Dataset and MobileNet model to analyse Accuracy performance of

my Deep Transform learning model on GPU of Intel® Core™ i3-7100U CPU using TensorFlow 2.0 Hub and

Keras. ImageNet is an open source Large-Scale dataset of images consisting of 1000 classes and over 1.5 million

images. And my overall idea is to analyse accuracy of Vision performance on the very poor network

configuration. This work reached an Accuracy almost near to 100% on GPU of Intel® Core™ i3-7100U CPU

which is great result with datasets used in this work are not easy to deal and having a lot of classes. That‘s why

it‘s impacting the performance of the network. To classify and predict from tons of images from more classes on

low configured network is really challenging one, it‘s a great thing the computer vision accuracy showed an

excellent vision nearly 100% on GPU in my work.

Keywords: Accuracy, Vision, TensorFlow, Transform Learning, Deep Learning, GPU, Dense layer, ImageNet

Database.

References:

1. Jyothi Maggu, Emilie Chouzenoux, Giovanni Chiercha and Angshul Majumdar, Convolutional Transform learning, ICONIP,

pp.162-174, 2018.

2. Shruti Nagpal, Maneet Singh, Richa Singh, Mayank Vatsa, Face Sketch Matching via Coupled Deep Transform Learning, ICCV, 2017. 3. Olga Russakovsky, Jia Deng, Hao Su, Jonathan Krause, ImageNet Large Scale Visual Recognition Challenge, cs.CV, 2015.

4. Mark Sandler, Andrew Howard, Menglong Zhu, Andey Zhmoginov, MobileNetV2: Inverted Residuals and Linear Bottlenecks, arXiv,

2019. 5. T. Chugh, M. Singh, S. Nagpal, Transfer Learning based evolutionary algorithm for composite face sketch recognition. In IEEE

Conference, 2017.

6. Emilio Soria Olivas, Jose David Martin Guerreo, Marcelino Martinez Sober, Hand Book of Research on Machine Learning Applications and Trends.

7. Mobilenetv2 source code. Available from

8. https://github.com/tensorflow/models/tree/master/research/slim/ 9. nets/mobilenet.

10. ImageNet dataset open source available from: http://www.image-net.org/

39.

Authors: Md. K.M.Farooqui, K.V.L Somasekhar, D.V.Seshagirirao, P. Nagavsrinivas, S. Durga prasad

Paper Title: Reducing Defects on Cam Shaft by Six Sigma Methodology

Abstract: The efficiency of an IC engine is mainly depends on opening and closing of inlet and outlet valves.

The valves are operated by cam shaft. So cam shaft must be free from defects to maintain proper combustion of

a internal combustion engine. Thus we are focusing to reduce the defects and improving quality in the

manufacturing process and operations of a cam shaft in manufacturing industry for different automotives. In

camshaft manufacturing the considerable defects are material selection, changing their mechanical properties

while machining, temperature defects, casting defects, tolerances and surface roughness. So manufactured cam

shaft has to overcome above defects for safe operating of valves. Six Sigma is a business technique and a

methodical philosophy utilization of which prompts achievement in benefit through quantum gain in item

quality, consumer loyalty and efficiency. The goal was to diminish the quantity of deformities to as low as 3.4

parts per million chances. Methodology used: DMAIC is one of the tool of six sigma used to improve the

process and also to find root causes for any problem to reduce the defects occuring in any industry. we are using

DMAIC tool to reduce defects and improve quality. DMAIC stands for define, measure, analyze, improve,

control.

Keywords: Six sigma, DMAIC, defects per million opportunities, control charts, xbar chart.

References:

1. Hsiang-Chin Hung and Ming-Hsien Sung, (2011), ―Applying Six Sigma to Manufacturing Processes in the Food Industry to

Reduce Quality‖ Scientific Research.

2. S.Pimsakul,N.Somsuk,W.Junboon,T.Laosirihongthong,(2013),- Production Process Improvement Using the Six Sigma DMAIC Methodology: A Case Study of a Laser Computer Mouse Production Process‖ The 19th International Conference on Industrial

Engineering and Engineering Management.

3. Mohit Taneja1, Arpan Manchanda,(2013), ―Six Sigma an Approach to Improve Productivity in Manufacturing Industry‖ International Journal of Engineering Trends and Technology (IJETT).

4. Adan Valles et. Al (2009), ―Implementation of Six Sigma in a Manufacturing Process: A case study‖, International Journal of

Industrial Engineering. 5. Nilesh V Fursule Dr Satish V Bansode Swati N Fursule (2012), Understanding the Benefits and Limitations of Six Sigma

Methodology‖, International Journal Of Scientific And Research Publications.

6. Shewhart, W. A. (1931, 1980). Economic Control of Quality of Manufacturing, Milwaukee, WI: ASQ Quality Press.

228-235

40.

Authors: Roopa KV, Sanjeev Kumar K.M

Paper Title: “One Tap Shopping”: Impulsive Fashion And Apparel Buying Behaviour

Abstract: Digitalization has transformed brick and motor fashion-oriented business to one tap convenient

business through smart phones via mobile applications. The digital age is more inclined towards fashion and

apparel due to ample exposure of current trends in fashion industry through internet, social media, travelling,

cultural exchange and others. The study emphasized on discovering the online fashion and apparel buying

behavior, satisfaction level, and exploring the most influential factors towards the digital consumers for online

fashion and apparel shopping by analyzing 256 respondents through convenient and judgmental sampling. Data

236-242

Page 32: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

is analyzed through Factor analysis and multiple regression. The study reveals that Price sensitivity factors has

significant weightage towards online fashion and apparel shopping like flash sales, loyalty programs and points,

spike sales- exciting offers on all categories for limited period, cashback offers, Discounts and offers.

Keywords: Spike sales, ―YAMI‖- young – aspirational- mobile native - impulsive action, social engagement,

website artistry.

References:

1. Internet usage in India, statistics and facts. July 7 2020. Statista from https://www.statista.com/topics/2157/internet-usage-in-india/ 2. Global E-commerce sales to reach nearly $ 3.46 trillion in 2019. Nov13, 2019. Digital commerce 360 from

https://www.digitalcommerce360.com/article/global-ecommerce-sales/

3. E-commerce sales by country in 2019, Oberlo from https://www.oberlo.com/statistics/ecommerce-sales-by-country. 4. E-commerce in India- statistics and facts, Aug 4, 2020, Statista from https://www.statista.com/topics/2454/e-commerce-in-india/.

5. The Era of the connected consumers, Jan 22,2020. Economic times, Brand Equity from

https://brandequity.economictimes.indiatimes.com/news/digital/the-era-of-the-connected-consumer/73478274 6. Online fashion market in India, Nov, 2019.Redseers from https://redseer.com/newsletters/online-fashion-market-in-india/

7. Amazon and flip kart are taking fashion beyond metros, Sep 30, 2019. Financial express from

https://www.financialexpress.com/industry/amazon-and-flipkart-are-making-fashion-sense-beyond-metros/1721343/. 8. Pani, A., & Sharma, M. (2012). Emerging trends in fashion marketing: a case study of apparel retailing in

41.

Authors: Rubina Jahangir Khan, Raj Kulkarni , Jagannath Jadhav

Paper Title: A Machine Learning Approach for Ecg Analysis for Emotions

Abstract: Emotions are feelings which one can feel and are hard to be put in a form by a person .However they

reflect the mental state of a person. Emotions like joy and sadness can be somehow detected from the facial

expressions or through the body language. But these emotions do have an impact upon our system. An

individual‘s electrocardiogram is a way through which one can know the impact of different parameters such as

stress, joy, sadness, anger on the mechanism of our body. The emotions such as anger, sadness have an adverse

effect on the cardio system and is seen in the form of abnormal ECG which can be a good pointer to a counselor

when finding out the reasons and diagnosis. The decomposition technique along with the Hilbert transform can

be used for feature retrieval. The different emotions are detected through the binary classification technique

Keywords: denoised, mean frequency, fission, fusion, decomposition, classifier

References:

1. A.N PAithane,Dr. Bormane,Sneha Dinde ,‖Human Emotion Recognition using Electrocardiogram Signals.‖,International Journal on Recent and Innovation Trends in Computing and Communication

2. Volume: 2 Issue: 2 194 – 197

3. 1Amjad M.R. AlzeerAlhouseini,Imad Fakhri Al-Shaikhli,Abdul Wahab bin Abdul Rahman, International Journal of Advancements in Computing Technology(IJACT) Volume8, Number3, June 2016

4. WANG Bin ,LIU Guang-Yuan, An Experimental Study on Electrocardiography toward Emotion Recognition in 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery.

5. I. S. Jacobs and C. P. Bean, ―Fine particles, thin films and exchange anisotropy,‖ in Magnetism, vol. III, G. T. Rado and H. Suhl, Eds. New York: Academic, 1963, pp. 271–350.

6. Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, ―Electron spectroscopy studies on magneto-optical media and plastic substrate interface,‖ IEEE Transl. J. Magn. Japan, vol. 2, pp. 740–741, August 1987 [Digests 9th Annual Conf. Magnetics Japan, p. 301, 1982].

7. M. Young, The Technical Writer‘s Handbook. Mill Valley, CA: University Science, 1989.

8. Foteini Agrafioti, Adam K.Anderson―ECG Pattern Analysis for Emotion Detection‖, IEEE Transactions on Affectiv Computing, 2012, Vol. 3, No.1, pp.102-115.

9. N.E. Huang, Z. Shen, R.R. Long, M.L. Wu, Q. Zheng, N.C. Yen, and C.C. Tung, ―The Empirical Mode Decomposition and Hilbert Spectrum for Nonlinear and Nonstationary Time Series Analysis,‖ Proc. Royal Soc. London, vol. 454, pp. 903-995, 1998.

10. S.M.A. Bhuiyan, R.R. Adhami, and J.F. Khan, ―A Novel Approachof Fast and Adaptive Bidimensional Empirical Mode Decomposition,‖

243-246

42.

Authors: G Chandhini, B Chithra, P Kiruthikadevi, Bhagya sasi, V. Kamal Kumar

Paper Title: IoT Based Underground Drainage Monitoring System

Abstract: Underground drainage monitoring system plays an important role in keeping the cities clean and

healthy. Compared to other countries, India consists of highest number of sewage workers. Exposure of sewage

workers to poisonous gases like hydrogen sulphide, sulphur dioxide, carbon monoxide, methane, ammonia,

nitrogen oxide increases the death of the sewage workers. The main aim of this project is to design a network

system which helps in monitoring poisonous gases present in sewage. Whenever the gas level crosses the

threshold value, the information with different gas ppm values is displayed in the smart phone through the app. It

also indicates whether it is safe for the manual scavengers to work in the environment or not.

Keywords: Smart phone, IOT, Alarm, Threshold value, Sensors, Application, LED, Sewage system.

References:

1. Prof S. A. Shaikhl, Suvarna A. Sonawane2, ―Monitoring Smart City Application Using Node MCU on IOT‖ International Journal of

Innovative science, Engineering and Technology, Vol 5Issue VIL,July 2017. 2. Prof Muragesh SK1, Santhosha Rao2,‖Automated Internet of Things for Underground Drainage and Manhole Monitoring systems for

Metropolitan Cities.‖International Journal of Innovative Science, Engineering & Technology, Vol. 2 june 4, june 2015.

3. Lazarescu, M. T., ―Design of a WSN Platform for Long-Term Environment Monitoring for IoT Applications, ―Emerging and Selected

247-249

Page 33: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

Topics in Circuits and system, IEEE journal on, vol 3, no.1,pp.45,54, March 2013.

4. T.Leppanen, Harjula, E., Ylianttila, M., Ojala, T.,,,and Yang, L. T. (2013).‖Cloud things: A common architecture for integrating the internet of things with cloud computing.‖ Proceeding of the 2013 IEEE 17th

International conference on computer supported cooperative work in design (CSCWD), 651-657(june).

5. Manna, s., Bhunia, S. S., and Mukherjee, N. (2014).‖Vehicular pollution monitoring using iot‖ International Conference on Recent

Advances and Innovation in Engineering(ICRAIE-2014), 1-5(May).

43.

Authors: Jenifer Mahilraj

Paper Title: Trajectory Based Location Prediction and Enriched Ontological User Profiles for Efficient

Website Recommendation

Abstract: The spread over of huge amount of information in the vast area of internet makes difficult for the

users to obtain the search items that are relevant to them. The adoption of web usage mining helps to discover

the accurate search results that satisfy their requirements. To fulfill their need, it is necessary to know their

preferences of search at various contexts. In general, the user profiles are used to determine the taste of the

users. The traditional method of user profiling does not provide a complete detail regarding their search. In

addition, the search preference of the individuals varies in accordance with time and

location. The user profiles do not update the dynamic location changes of the users. The traditional location

based recommendation systems suggest the search results based on their location to compensate the dynamic

preferences of the users. The drawbacks of the conventional systems are resolved by the Location and User

Profile (LUP) based recommendation system. To attain a higher user satisfaction by providing accurate search

results, a trajectory based location prediction and enriched ontological user profiles to recommend the

appropriate websites to the users is proposed in this paper. In this article, we suggest a novel method for

predicting the location of a user's profile using Semantic Trajectory Pattern (STP), based on both the place and

semantic features of user trajectories. Our prediction model 's central concept is based on a novel cluster-based

prediction approach that evaluates the location of user search data based on the regular activities of related users

in the same cluster, calculated by evaluating the typical behavior of users in semantic trajectories. The

combination of location information along with enriched ontological user profiles improves the efficiency of

the proposed web recommendation system. The experimental results are evaluated using recall, precision and F-

measure metrics.

Keywords: Geographic mining , Ontological user profiles, semantic mining, Trajectory pattern mining,

Web usage mining.

References:

1. Bao, J., Zheng, Y., Wilkie, D., & Mokbel, M.‖Recommendations in location- based social networks: a survey‖,Geoinformatica,2015,

vol 19, pp 525-565. 2. Cheng, C., Yang, H., King, I., & Lyu, M. R. ―Fused Matrix Factorization with Geographical and Social Influence in Location-

Based Social Networks‖, Paper presented at the Aaai conference,2012.

3. Eyharabide, V., & Amandi, A. (2012). ―Ontology-based user profile learning‖ AppliedIntelligence, vol 36, page 857-869. 4. Gao, H., Tang, J., & Liu, H. ―Mobile location prediction in spatio-temporal context‖. Paper presented at the Nokia mobile data

challenge workshop,2012.

5. Jagan, S., & Rajagopalan, S.‖ A Survey on Web Personalization of Web UsageMining‖. International Research Journal of Engineering and Technology,2015,vol 2 issue 1, pp 6-12.

6. Levandoski, J. J., Sarwat, M., Eldawy, A., & Mokbel, M. F.‖ LARS: A Location-Aware Recommender System‖,Paper presented at

the 2012 IEEE 28th International Conference on Data Engineering, 1-5 April 2012. 7. Liu, X., & Aberer, K. ―SoCo: a social network aided context-aware recommender system‖. Paper presented at the

Proceedings of the 22nd international conference on World Wide Web,2013.

8. Liu, Y., Zhao, Y., Chen, L., Pei, J., & Han, J. ―Mining frequent trajectory patterns for activity monitoring using radio frequency tag arrays‖, IEEE Transactions on Parallel and Distributed Systems, 2012,vol 23, pp2138-2149.

9. Majid, A., Chen, L., Chen, G., Mirza, H. T., Hussain, I., & Woodward, J. ―A context-aware personalized travel recommendation

system based on geotagged social media data mining‖. International Journal of Geographical Information Science,2013,vol 27,pp 662-684.

10. Makvana, K., Shah, P., & Shah, P. ,‖A novel approach to personalize web search through user profiling and query

reformulation‖, paper presented at the International Conference on Data Mining and Intelligent Computing (ICDMIC), 2014 11. Mathew, W., Raposo, R., & Martins, B.‖Predicting future locations with hidden Markov models‖,paper presented at the

Proceedings of the 2012 ACM Conference on Ubiquitous Computing.

12. Meehan, K., Lunney, T., Curran, K., & McCaughey, A.‖Context-aware intelligent recommendation system for tourism‖ paper presented at the 2013 IEEE International Conference on PervasiveComputing and Communications Workshops (PERCOM

Workshops).

13. Mehtaa, P., Parekh, B., Modi, K., & Solanki, P,‖Web personalization using web mining: concept and research issue‖, International Journal of Information and Education Technology, 2012,vol 2, pp 510.

14. Noulas, A., Scellato, S., Lathia, N., & Mascolo, C,‖A random walk around the city: New venue recommendation in location-based

social networks‖,Paper presented at the International Conference on Privacy, Security, Risk and Trust (PASSAT), 2012 and International Confernece on Social Computing (SocialCom),2012

15. Savage, N. S., Baranski, M., Chavez, N. E., & Höllerer, T. (2012).‖loco: A location based context aware recommendation system

Advances in Location-Based Services ―Springer,2012,pp 37-54.

16. Wang, X., Rosenblum, D., & Wang, Y. ―Context-aware mobile music recommendation for daily activities.‖,paper presented

at the Proceedings of the 20th ACM international conference on Multimedia,2012.

17. Yin, H., Sun, Y., Cui, B., Hu, Z., & Chen, L‖LCARS: a location-content- aware recommender system‖,paper presented at the Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining,2013.

18. Ying, J.-C., Chen, H.-S., Lin, K. W., Lu, E. H.-C., Tseng, V. S., Tsai, H.-W., . . . Lin,S.-C..‖Semantic trajectory-based high utility

item recommendation system. Expert Systems with Applications‖, 2014 ,vol 41, pp 4762-4776. 19. M.jenifer,Dr.Thabasu kannan‖ LACFAC-Location-Aware Collaborative Filtering and Association-based Clustering Approach for Web

Service Recommendation‖ Int. J. Web Engineering and Technology, Vol. 13, No. 3, 2018,pp 203-222. 20. David Martin et.al,‖OWL-S: Semantic Markup for Web Services‖, W3C Member Submission 22 November 2004.

21. Josh Jia-Ching Ying et al.,‖ Semantic trajectory mining for location prediction‖, Proceedings of the 19th ACM SIGSPATIAL

International Conference on Advances in Geographic Information SystemsNovember 2011,Pages 34–43.

250-257

Page 34: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

44.

Authors: Shreerang J. More, Pranav S. Patil, Jitendra M. More, Prayag S. Patil, Satish S. Marathe

Paper Title: IoT based Patient Health Care for COVID 19 Centre

Abstract: In this paper, COVID 19 centre monitoring and management system has been proposed and

integration of different sensor network with Internet of Things (IoT). The sensors implemented can

communicate with data collection and processing unit. The data collection done by that unit can directly

transferred to cloud using internet connectivity at COVID 19 centre. Therefore work aimed to propose COVID

19 centre management with IoT based approach to handle medical services and patient monitoring and treatment

work flow. In the experimented model, Node MCU ESP8266 controller and temperature sensor (DHT11) are

integrated. A system has capability to monitor and control COVID 19 centre services and patient monitoring via

remote connection. It is evaluated with three temperature sensors connected to measure temperature of patients.

Mobile based blynk has been utilized for the cloud based IoT implementation. Sensor sends data over blynk

server and then can be seen anywhere using smart phone application. In addition, when patient get fever more

than regular value, an alert was sent to authority in a quick time. After results, it is indicated that the developed

system has effective potential to work in pandemic situation and has technological feasibility. The benefits of

implemented research methods are useful in digital health management in pandemic scenario. Even hospitals,

COVID centers, intensive care unit (ICU) can be operated effectively and patient diagnosis application based on

online database has wide scope in the area of internet of things and patient health management.

Keywords: Blynk , COVID 19, Health Care, IoT, Node MCU, Sensor Network.

References:

1. Singh, Ravi Pratap, et al. "Internet of things (IoT) applications to fight against COVID-19 pandemic." Diabetes & Metabolic Syndrome: Clinical Research & Reviews (2020).

2. Durani, Homera, et al. "Smart automated home application using IoT with Blynk app." 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT). IEEE, 2018.

3. Krishnan, D. Shiva Rama, Subhash Chand Gupta, and Tanupriya Choudhury. "An IoT based patient health monitoring system." 2018

International Conference on Advances in Computing and Communication Engineering (ICACCE). IEEE, 2018. 4. Serikul, Peerasak, Nuttapun Nakpong, and Nitigan Nakjuatong. "Smart farm monitoring via the Blynk IoT platform: case study:

humidity monitoring and data recording." 2018 16th International Conference on ICT and Knowledge Engineering (ICT&KE). IEEE,

2018. 5. Chamola, Vinay, et al. "A Comprehensive Review of the COVID-19 Pandemic and the Role of IoT, Drones, AI, Blockchain, and 5G in

Managing its Impact." IEEE Access 8 (2020): 90225-90265.

6. Cacovean, Dan, Irina Ioana, and Gabriela Nitulescu. "IoT System in Diagnosis of Covid-19 Patients." Informatica Economica 24.2 (2020): 75-89.

7. Senthamilarasi, C., et al. "A smart patient health monitoring system using IoT." International Journal of Pure and Applied

Mathematics 119.6 (2018): 59-70. 8. Rahman, Ruhani Ab, et al. "IoT-based personal health care monitoring device for diabetic patients." 2017 IEEE Symposium on

Computer Applications & Industrial Electronics (ISCAIE). IEEE, 2017.

9. https://docs.blynk.cc/

258-263

45.

Authors: Chaarumathi P, Divya S.R, Divyajothi R, Mehareethaa K.V, Kamalkumar V

Paper Title: Voice Controlled Fire Fighting Robot

Abstract: Even though there are a lot of advancements in technology, there have been an increased number of

devastating losses in the field of fire-fighting. Fire accidents that occur in industries like atomic power plants,

petroleum refineries, chemical factories and other large-scale fire industries end in quite serious consequences

which can cause injuries or even death of individuals. Therefore, this paper is enhanced to develop an automated

fire extinguishing robotic vehicle that saves the lives of firefighters and other persons in those areas. The

proposed robotic vehicle is controlled using specified speech commands. The language input is more familiar

which makes interaction with the robotic vehicle much easier. The advantages of voice-controlled robots are

hands-free and rapid data input operations. The speech recognition process is done in such a way that it

recognizes specified commands from the user and the designed robot navigates based on the instructions via the

speech commands. The fire can be extinguished using a water tank that is fitted along with the robotic vehicle.

Consequently, the site of fire is live monitored using ESP 32 and the status of the fire zone is updated to the user

through message.

Keywords: Arduino, ESP32, Fire extinguishing, Live monitoring.

References:

1. Ratnesh Malik, ―Fire Fighting Robot: An Approach‖, Indian Streams Research Journal Vol.2, Issue.II/March; 12pp.1-4

2. Swati A. Deshmukh, Karishma A. Matte and Rashmi A. Pandhare, ―Wireless Fire Fighting Robot‖, International Journal For Research In Emerging Science and Technology.

3. Lakshay Arora, Prof.Amol Joglekar, ―Cell Phone Controlled Robot with Fire Detection Sensors‖, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (3), 2015, 2954-2958.

4. Arpit Sharma, Reetesh Verma, Saurabh Gupta and Sukhdeep Kaur Bhatia, ―Android Phone Controlled Robot Using Bluetooth‖,

International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 5 (2014), pp. 443-448

5. Saravanan P, ―Design and Development of Integrated Semi- Autonomous Fire Fighting Mobile Robot‖, International Journal of

Engineering Science and Innovative Technology (IJESIT) Volume 4, Issue 2, March 2015. 6. Guiseppe Riccardi (2015), ‗Active Learning: Theory and Applications to Automatic Speech Recognition‘, IEEE Transaction of Speech

and Audio Processing, Vol. 13, No. 4, pp 1-8.

7. Shantanu Chakrabarthy ―Robust Speech Feature Extraction by Growth Transformation in reproducing kernel Hillber space‖, IEEE

264-267

Page 35: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

Transactions on Audio Speech and Language Processing, Vol.15, No 6, June2007.

8. T. Aprille and T. Trick, ―Steady-State Analysis of Nonlinear Circuits with Periodic Inputs‖, Proceedings of the IEEE, vol. 60, no.1, pp.108-114, January 2015.

9. Rakib, T. and Sarkar, M.R., ―Design and fabrication of an autonomous fire fighting robot with multisensor fire detection using PID controller‖, 2016 5th IEEE International Conference on Informatics, Electronics and Vision (ICIEV), May 13-14, 2016, Bangladesh,

pp. 909-914.

10. Suresh, J., ―Fire-fighting robot‖, 2017 IEEE International Conference on Computational Intelligence in Data Science (ICCIDS), June 2-3, 2017, India, pp. 1-4.

46.

Authors: Aidy Ali, M. F. Abdullah, M. K. Faidzi, Kannan Rassiah

Paper Title: Fatigue Lifetime Prediction of Laminated Composites, A Review

Abstract: It is evident that laminated reinforced composite are successfully prolonging the life of composites

compared to particle and fiber type of reinforced composites method. The question on how this laminated

composites take up the fatigue loading is crucial in order to give sound confident to industry replacing their

design from metal to composites based. The lack of confident and uncertainties‘ life of composites components

become an issue to designer to shift from metal based to composites based especially when the design required

to be done in short time. This review gives a clear picture the state of fatigue life modelling and the life

prediction of laminated composites structures. The types of model are favorable when it is accurate, simple and

required less input parameters. In the end, this review gives clear pictures on mechanism that involve and the

fundamental of formula that available at present.

Keywords: Fatigue of Composite, Laminated Composites, Modelling of Fatigue Composite, Life Prediction.

References:

1. R.G. Budynas, and J.K. Nisbett, Shigley's Mechanical Engineering Design, 10th Edition New York. McGraw-Hill, 2015. 2. S. Kalpakjian, S.R. Schmid, and K.S. Sekar, Manufacturing engineering and technology, Pearson Education South Asia Pte Ltd, 2014.

3. W.D. Callister, and D.G. Rethwisch, Materials science and engineer an introduction, New York: John Wiley & Sons, 2007.

4. J.F. Shackelford, Y.H. Han, S. Kim, and S.H. Kwon, CRC materialsscience and engineering handbook. CRC press, 2016. 5. K. Rassiah, and M. M. H. Megat Ahmad, ―A review on mechanicalproperties of bamboo fiber reinforced polymer composite‖

Australian Journal of Basic and Applied Sciences 7, 2013, pp. 247-253.

6. M.R. Sanjay, G.R. Arpitha, and B. Yogesha, ―Study on mechanicalproperties of natural-glass fibre reinforced polymer hybrid composites: A review‖, Materials today: proceedings, 2(4-5), 2015, pp. 2959-2967.

7. K.G. Satish, B. Siddeswarappa, and K.M. Kaleemulla, ―Characterization of in-plane mechanical properties of laminated

hybridcomposites‖, Journal of Minerals and Materials Characterization and Engineering, Vol. 9 (2), 2010, pp. 105-114.

8. R. Agarwal, N.S. Saxena, K.B. Sharma, S. Thomas, and L.A. Pothan, ―Thermal conduction and diffusion through glass-banana fibe

polyester composites‖, Ind. J. Pure Appl. Phys., Vol.41 (6), 2003, pp 448-452.

9. P.N.B. Reis, J.A.M Ferreira, F.V. Antunes, and J.D.M. Costa, ―Flexural 10. behaviour of hybrid laminated composites‖, Composites Part A: Applied Science and Manufacturing, Vol. 38, Issue 6, 2007, pp. 1612-

1620.

11. Y. Liu, M. Farnsworth, and A. Tiwari, A review of optimisation 12. techniques used in the composite recycling area: State-of-the-art and steps towards a research agenda. DOI :

10.1016/j.jclepro.2016.08.038

13. J.N. Reddy, Mechanics of laminated composite plates and shells: theoryand analysis. CRC press, 2004. 14. S.S. Morye and R. P. Wool, ―Mechanical properties of glass/flax hybrid

15. composites based on a novel modified soybean oil matrix material‖, Polymer Composites Vol 26, no. 4, 2005, pp. 407 - 416. DOI:

10.1002/pc.20099 16. S. Suresh, Fatigue of Materials, 2nd edition Massachusetts Institute of

17. Technology, Cambridge University Press, 1998. Online ISBN:9780511806575 https://doi.org/10.1017/CBO9780511806575

18. Aidy Ali, Mike W. Brown, and C. A Rodopoulous, ―Modelling of crack 19. coalescence in 2024-T351 Al alloy friction stir welded joints‖, International Journal of Fatigue, Vol 30, 2008, pp. 2030-2043.

20. Aidy Ali, X. An, C. A. Rodopoulos, M. W. Brown, P. O'Hara, A. Levers

21. d and S. Gardiner, ―The Effect of Controlled Shot Peening on the Fatigue Behaviour of 2024-T3 Aluminium Friction Stir Welds‖, International Journal of Fatigue, Vol 29, 2007, pp. 1531-1545.

22. Laird Nan M and James H. Ware, ―Random-Eff ects Models for Longitudinal Data‖, Biometrics Vol 38, 1982, pp. 963-974. 23. Aidy Ali, Ng Wei Kuan, Faiz Arifin, Kannan Rassiah, Faiz Othman, Shauqi Hazin, and Megat Hamdan Megat Ahmad, "Fracture

properties of hybrid woven bamboo/woven e-glass fiber composites", International Journal of Structural Integrity, Emerald, Vol 9, No

4, 2018, pp. 491-519. https://doi.org/10.1108/IJSI-09-2017-0051 24. Aidy Ali, Rabiatun Adawiyah, Kannan Rassiah, Wei. Kuan Ng, Faiz Arifin, Faiz Othman, Muhammad Shauqi Hazin, M.K Faidzi, M.

Abdullah, and M.M.H. Megat Ahmad, "Ballistic Impact Properties of Woven Bamboo-Woven E Glass- Unsaturated Polyester Hybrid

Composites", Defense Technology. Vol 9 No 4, pp. 491-519, 2018. https://doi.org/10.1108/IJSI-09-017-0051 25. M. Kaminski, F. Laurin, J.F. Maire, C. Rakotoarisoa, and E. Hémon. Fatigue damage modeling of composite structures: the onera

viewpoint. AerospaceLab, 2015, pp. 1-12. Available: https://hal.archives-ouvertes.fr/hal-01193150

26. W. Huang, J. Zhao, A. Xing, G. Wang, and H, Tao. ―Influence of tool path strategies on fatigue performance of high-speed ball-end-milled AISI H13 steel‖, The International Journal of Advanced Manufacturing Technology, Vol. 94, no. 1-4, 2018, pp. 371-380.

27. J.W. Weeton, K.L. Thomas, and D.M. Peter, Engineer‘ guide to composited material: American Society for Metal International, 1987.

28. Clemence Rubiella, Cyrus A. Hessabi, and Arash Soleiman Fallah, ―State of the art in fatigue modelling of composite wind turbine blades‖, International Journal of Fatigue 117, 2018, pp. 230-245.

29. F.H. Bhuiyan, and R.S Fertig III, ―Predicting matrix and delamination fatigue in fiber-reinforced polymer composites using kinetic

theory of fracture‖, International Journal of Fatigue, 117, 2018, pp. 327-339. 30. T. Suzuki, H. Mahfuz, and M. Takanashi, ―A new stiffness degradation model for fatigue life prediction of GFRPs under random

loading‖, International Journal of Fatigue, 119, 2019, pp. 220-228.

31. C. Ganesan, P.S. Joanna, and G. Srilochan, ―Modeling the damage of composite materials subjected to fatigue loading‖, In IOP Conference Series: Materials Science and Engineering, Vol. 377, No. 1, 2018, (p. 012093), IOP Publishing, DOI: 10.1088/1757-

899X/377/1/012093.

32. A. Tabiei, and W. Zhang, ―Composite laminate delamination simulation and experiment: a review of recent development‖, Applied Mechanics Reviews, 70(3), 2018, 030801. DOI: 10.1115/1.4040448.

33. J. Llobet, P. Maimí, Y. Essa, andF.M. de la Escalera, ―Progressive matrix cracking in carbon/epoxy cross-ply laminates under static and

fatigue loading‖, International Journal of Fatigue, 119, 2019, pp. 330-337. 34. C. Tao, S. Mukhopadhyay, B. Zhang, L.F. Kawashita, J. Qiu, and S.R. Hallett, ―An improved delamination fatigue cohesive interface

268-278

Page 36: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

model for complex three-dimensional multi-interface cases‖, Composites Part A: Applied Science and Manufacturing, 107, 2018 pp.

633-646. 35. H. Ijaz, W. Saleem, M. Zain-ul-Abdein, A.A. Taimoor, and A.S.B. Mahfouz, ―Fatigue Delamination Crack Growth in GFRP

Composite Laminates: Mathematical Modelling and FE Simulation‖, International Journal of Aerospace Engineering, vol. 2018, Article

ID 2081785, 8 pages, 2018. https://doi.org/10.1155/2018/2081785.

36. G. Allegri, ―Modelling fatigue delamination growth in fibre-reinforced composites: Power-law equations or artificial neural networks‖,

Materials & Design, 155, 2018, pp. 59-70.

37. N. Jagannathan, S. Gururaja, and C.M. Manjunatha, ―Probabilistic strength based matrix crack evolution model in multi-directional composite laminates under fatigue loading‖, International Journal of Fatigue, 117, 2018, pp. 135-147.

38. M. K. Faidzi, A. K. Hamizi, M. F Abdullah, M. A Aliimran, K. Z Ku

39. Ahmad, Raja Nor Othman, Aidy Ali, ―Fatigue Crack Growth Behaviour of Sandwiched Metal Panel of Aluminium and Mild Steel under Constant Amplitude Loading‖, International Journal of Engineering and Technology, 7 (4.33), 2018, pp. 362-366.

40. Mohd Khairul Faidzi Muhamad Paudzi, Mohamad Faizal Abdullah,

41. Aidy Ali. Fatigue Analysis of Hybrid Composites of Kenaf/Kevlar Fibre Reinforced Epoxy Composites, Jurnal Kejuruteraan (Journal of Engineering), Online First http://dx.doi.org/10.17576/jkukm-2018-SI-1(7),2018, ISSN:0128-0198, E-ISSN:2289-7526

47.

Authors: Durga Pathrikar, V. N. Jirafe

Paper Title: Implementation of Iterative bilateral filtering for removal of Rician noise in MR images using FPGA

Abstract: Magnetic resonance image noise reduction is important to process further and visual analysis.

Bilateral filter is denoises image and also preserves edge. It proposes Iterative bilateral filter which reduces

Rician noise in the magnitude magnetic resonance images and retains the fine structures, edges and it also

reduces the bias caused by Rician noise. The visual and diagnostic quality of the image is retained. The

quantitative analysis is based on analysis of standard quality metrics parameters like peak signal-to-noise ratio

and mean structural similarity index matrix reveals that these methods yields better results than the other

proposed denoising methods for MRI. Problem associated with the method is that it is computationally complex

hence time consuming. It is not recommended for real time applications. To use in real time application a

parallel implantation of the same using FPGA is proposed.

Keywords: Iterative Bilateral Filtering, MRI, Rician Noise, FPGA

References:

1. Wright, G.: Magnetic resonance imaging. IEEE Signal Process. Mag. 1, 56–66 (1997) 2. Nishimura, D.G.: Principles of Magnetic Resonance Imaging. Stanford University, Stanford, CA (2010)

3. Manjón, J.V., Carbonell-Caballero, J., Lull, J.J., Garciá-Martí, G., Martí-Bonmatí, L., Robles, M.: MRI denoising using non-local

means. Med. Image Anal. 12, 514–523 (2008) 4. Wiest-Daesslé, N., Prima, S., Coupé, P., Morrissey, S. P., Barillo, C.: Rician noise removal by non-local means filtering for low signal-

to-noise ratio MRI: applications to DT-MRI. In: Proceedings of MICCAI, pp. 171-179 (2008)

5. Manjón, J.V., Coupé, P., Martí-Bonmatí, L., Collins, D.L., Robles, M.: Adaptive non local means denoising of MR images with spatially varying noise levels. J. Magn. Reson. Imaging 31, 192–203(2010)

6. R. Riji, Jeny Rajan, Jan Sijbers, Madhu S. Nair. "Iterative bilateral filter for Rician noise reduction in MR images", Signal, Image and

Video Processing, 2014

279-284

48.

Authors: Baratov Mirodilzhon, Tukhtashev Khikmatilla

Paper Title: Trends in Development Private Ownership of land and land Parcels in Uzbekistan: Scientific and

Theoretical Analysis

Abstract: the article analyzes the stages of privatization of non-agricultural land and the stages of their

development. It also analyzed the theoretical aspects and studied the peculiarities of developed countries Peru,

Poland, France and the United States in the area of land privatization. In the article recommendations and

conclusions on the development of existing legislation were developed based on foreign and domestic

experience in land privatization.

Keywords: land plots, privatization of land plots, land of industrial, commercial and service points, auction

sale, sale of private property.

References:

1. G. O. Young, ―Synthetic structure of industrial plastics (Book style with paper title and editor),‖ in Plastics, 2nd ed. vol. 3, J. Peters, Ed. New York: McGraw-Hill, 1964, pp. 15–64.

2. W.-K. Chen, Linear Networks and Systems (Book style). Belmont, CA: Wadsworth, 1993, pp. 123–135.

3. H. Poor, An Introduction to Signal Detection and Estimation. New York: Springer-Verlag, 1985, ch. 4. 4. B. Smith, ―An approach to graphs of linear forms (Unpublished work style),‖ unpublished.

5. E. H. Miller, ―A note on reflector arrays (Periodical style—Accepted for publication),‖ IEEE Trans. Antennas Propagat., to be

published. 6. J. Wang, ―Fundamentals of erbium-doped fiber amplifiers arrays (Periodical style—Submitted for publication),‖ IEEE J. Quantum

Electron., submitted for publication.

7. C. J. Kaufman, Rocky Mountain Research Lab., Boulder, CO, private communication, May 1995.

8. Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, ―Electron spectroscopy studies on magneto-optical media and plastic substrate

interfaces(Translation Journals style),‖ IEEE Transl. J. Magn.Jpn., vol. 2, Aug. 1987, pp. 740–741 [Dig. 9th Annu. Conf. Magnetics

Japan, 1982, p. 301]. 9. M. Young, The Techincal Writers Handbook. Mill Valley, CA: University Science, 1989.

10. (Basic Book/Monograph Online Sources) J. K. Author. (year, month, day). Title (edition) [Type of medium]. Volume(issue).

Available: http://www.(URL) 11. J. Jones. (1991, May 10). Networks (2nd ed.) [Online]. Available: http://www.atm.com

12. Shagayda N.I. The turnover of agricultural land in Russia: the transformation of institutions and practice // Scientific works № 142 p. –

M., In-t. Gaidara, 2010. – 332 P .; Sitkova O.N. Private property right to agricultural land plots and problems of its protection: dissertation ofcand. legal sciences. –Krasnodar: 2007. – 28 p.

13. Issues of development and improvement of land legislation of the Republic of Uzbekistan: a set of issues of the Republican scientific-

285-289

Page 37: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

practical conference. –Tashkent: Tashkent State University of Law, 2019. – 373 p.

14. Amelina N.E. Free privatization of land plots from the lands of settlements and problems of recognition of ownership of them by citizens: Abstract diss. ... cand. legal sciences. –Krasnodar: 2007. – 27 P.; Tyapkina E.A. Legal problems of privatization of state

enterprises: Author. diss. ... cand. legal sciences. –M., 2003. – 27 p.

15. Bezbach V.V. Private land ownership in Latin America (legal regulation): Doctor of Law dissertation 12.00.03. –M., 1997. –17 p.

16. Kholmuminov J.T. Natural resource law in foreign countries: comparative analysis and improvement of legislation. Monograph. –

Tashkent: Tashkent State University of Law, 2012 –P.44-45.

17. Kresnikova N. Regulation of land use in foreign countries and Russia // International Agricultural Journal. 2005. –№2. –P.43-46. 18. National Database of Legislation (LexUZ), dated 13.08.2019, № 03/19/552/3541.

19. Usmonov M.B. Renting in agriculture. –Tashkent: Tashkent State University of Law 2005. – 76 p.

20. Jalilov I.D. The emergence and development of Soviet land law in Uzbekistan. –Tashkent: Sci., 1970. – 29 p. 21. According to Article 17 of the Land Code, legal entities must have land plots on the basis of permanent possession, permanent use,

term (temporary) use, lease and property rights, and individuals (citizens) must have the right for land plots to inherit, lifelong

possession, permanent use, temporary (temporary) use, lease and ownership. 22. Usmonov M.B., Jo'raev Y.O., Rustamboev M.X. and others. Land law. –Tashkent: Tashkent State University of Law, 2002. – 58 p.

(The author of this chapter is U.Bozorov).

23. Collection of Legislation of the Republic of Uzbekistan, 2005, № 28-29, Article 204. 24. National Database of Legislation (LexUz), 04.05.2018, № 06/18/5428/1158.

25. http://lex.uz/docs/767394.

26. This resolution repealed according to the Resolution of the Cabinet of Ministers of the Republic of Uzbekistan from April 11, 1995 of № 126 "About the procedure for sale of objects of commercial and service pointss with the lands where they are located and on private

property // Collection of Resolutions of the Government of the Republic of Uzbekistan, 1995, № 4, Article 15.

27. Bulletin of the Supreme Council of the Republic of Uzbekistan, 1994, № 11-12, Article 301. 28. Collection of Resolutions of the Government of the Republic of Uzbekistan, 1995, № 4, Article 15.

29. National Database of Legislation, 05.01.2018, № 03/18/456/0512.

30. Collection of Legislation of the Republic of Uzbekistan, 2006, № 30, Article 288. 31. Collection of Legislation of the Republic of Uzbekistan, 2012, № 39, Article 446.

49.

Authors: Aditya Kaduskar, Omkar Vengurlekar, Varunraj Shinde

Paper Title: RSSI Filtering Methods Applied to Localization using Bluetooth Low Energy

Abstract: Bluetooth Low Energy or BLE is a technology targeting mostly small-scale IoT applications

including wearables and broadcasting beacons that require devices to send small amounts of data using minimal

power. This paper focuses on our implementation, which is a system, designed to filter RSSI (Received Signal

Strength Indicator), calculate the co-ordinates of a BLE device that is programmed as a Beacon and display the

coordinates. Since RSSI is susceptible to noise and a downgrade in its reliability is unavoidable, several filtration

methods have been used. The ‗Kalman – Histogram‘ method, which incorporates the usage of a histogram of the

RSSI readings along with the Kalman filter, is our own approach to tackle issues regarding noisy RSSI readings.

The localization of stationary ‗Assets‘, has been evaluated using the Trilateration algorithm: a result in

mathematics which is used to locate a single point using its distance from three or more other points. The

purpose of this research work is to provide a comparative result analysis of the results obtained using the

aforementioned filters, indicating the effect of these filters on our localization system. As our research suggests,

the ‗Kalman – Histogram‘ filter performs better as compared to other filters and can be used in localization

applications for better accuracy.

Keywords: Bluetooth Low Energy (BLE), Raspberry Pi, Localization

References:

1. O. Silver, ―An Indoor Localization System Based on BLE Mesh Network‖, 2016.

2. R. Heydon, ―Detailed Bluetooth Low Energy: The Developer's Handbook‖, 2013.

3. F. Zafari, A. Gkelias, and K. K. Leung, A Survey of Indoor Localization Systems and Technologies,‖ IEEE Communications Surveys

& Tutorials, vol. 21, no. 3, pp. 2568-2599, 2019.

4. A. Pal, ―Localization Algorithms in Wireless Sensor Networks: Current Approaches and Future Challenges.‖, Network Protocols &

Algorithms, vol. 2, no. 1, pp. 45-73, 2010.

5. P. Kriz, F. Maly, and T. Kozel, ―Improving Indoor Localization Using Bluetooth Low Energy Beacons‖, Mobile

Information Systems, vol. 2016, 2016.

6. C. M. El Amine, O. Mohamed, and B. Boualam, ―The Implementation of Indoor Localization Based On An Experimental Study of

RSSI Using a Wireless Sensor Network‖, Peer-to-Peer Networking and Applications, vol. 9, no. 4, pp. 795-808, 2016.

7. J. Du, J.-F. Diouris, and Y. Wang, ―A RSSI-Based Parameter Tracking Strategy for Constrained Position Localization‖, EURASIP

Journal on Advances in Signal Processing,‖ vol. 2017, no. 1, pp. 1-10, 2017.

8. P. Askari and F. Barekat, ―Trilateration and Bilateration in 3D and 2D Space Using Active Tags,‖ 10 2017.

9. V. Canton Paterna, A. Calveras Auge, J. Paradells Aspas, and M. A. Perez Bullones, ―A Bluetooth Low Energy Indoor Positioning

System With Channel Diversity, Weighted Trilateration And Kalman Filtering,‖ Sensors, vol. 17, no. 12, p. 2927, 2017.

10. S. Subedi, G.-R. Kwon, S. Shin, S.-s. Hwang, and J.-Y. Pyun, ―Beacon Based Indoor Posi-tioning System Using Weighted

Centroid Localization Approach‖, in 2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN),

pp. 1016-1019, IEEE, 2016.

11. K. Curran, E. Furey, T. Lunney, J. Santos, D. Woods, and A. McCaughey, ―An Evaluation of Indoor Location Determination

Technologies‖, Journal of Location Based Services, vol. 5, no. 2, pp. 61-78, 2011.

12. J. Talvitie, M. Renfors, and E. S. Lohan, ―A Comparison Of Received Signal Strength Statistics Between 2.4 GHz and 5 GHz

Bands For Wl-Based Indoor Positioning‖, in 2015 IEEE globecom workshops (GC Wkshps), pp. 1-6, IEEE, 2015.

13. R. Faragher and R. Harle, ―Location Fingerprinting With Bluetooth Low Energy Beacons‖, IEEE journal on Selected Areas in

Communications, vol. 33, no. 11, pp. 2418-2428, 2015.

14. H. Park, J. Noh, and S. Cho, ―Three-Dimensional Positioning System Using Bluetooth Low-Energy Beacons‖, International Journal

of Distributed Sensor Networks, vol. 12, no. 10, p. 1550147716671720, 2016.

15. M. WENGER, J. CARRERA, and Z. ZHAO, Indoor Positioning Using Raspberry Pi With uwb‖, Bachelor Thesis, University of Bern,

Institute of Computer Science, 2019.

16. X. Zhu, Y. Feng, et al., ―RSSI-Based Algorithm For Indoor Localization‖, Communications and Network, vol. 5, no. 02, p. 37, 2013.

17. Google, Bluetooth SIG, ―https://www.bluetooth.com/blog/proximity-and-rssi/‖,

290-299

Page 38: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

18. (accessed September 21, 2015).

19. Google, Bluetooth SIG, ―https://www.bluetooth.com/blog/introducing-bluetooth-mesh-networ king/‖, (accessed July 18, 2017).

50.

Authors: Palwinder Kaur Mangat, Kamaljit Singh Saini

Paper Title: Predictive Analytics for Students’ Performance Prediction

Abstract: Personalized learning is being popular due to digitizations that enable a large number of

technologies to support it. To predict students‘ learning abilities, it is necessary to estimate their behavior to

know about their weaknesses and strengths. If it is possible for teachers to predict in advance at-risk and dropout

students, they can plan more effectively to handle them. We are describing in this paper various intelligent

tutoring systems with Educational Data Mining, Predictive Learning Analytics, prediction of at-risk students at

an earlier basis, how this prediction task is done. We are describing various prediction models that can be used

to predict students‘ behavior and how portable these predictive models are and the various risk prediction

systems that are being used.

Keywords: Predictive Learning Analytics, Intelligent Tutoring Systems, Student Risk Prediction, Risk

Prediction Systems, EDM, Early Warning Systems (EWS).

References:

1. R. Conijn, C. Snijders, A. Kleingeld, and U. Matzat, ―Predicting Student Performance from LMS Data : A Comparison of 17 Blended Courses Using Moodle LMS,‖ vol. 10, no. 1, pp. 17–29, 2017.

2. U. States, ―On early prediction of risks in academic performance for students,‖ vol. 59, no. 6, pp. 1–14, 2015.

3. D. Baneres, M. E. Rodríguez, and M. Serra, ―An Early Feedback Prediction System for Learners At-risk within a First-year Higher Education Course,‖ vol. 1382, no. c, 2019.

4. W. Chen, C. G. Brinton, D. Cao, A. Mason-singh, C. Lu, and M. Chiang, ―Early Detection Prediction of Learning Outcomes in Online

Short-Courses via Learning Behaviors,‖ vol. 1382, no. c, pp. 1–14, 2018. 5. C. Ramos, C. Frasson, S. Ramachandran, and C. Ramos, ―Introduction to the Special Issue on Real World Applications of Intelligent

Tutoring Systems,‖ IEEE Trans. Learn. Technol., vol. 2, no. 2, pp. 62–63, 2009.

6. S. U. N. Yu and X. U. Tianwei, ―Intelligent Search Agents for Web-based Intelligent Tutoring Systems,‖ pp. 1148–1151, 2008. 7. D. Riofr, J. Ram, and M. Berrocal-lobo, ―Predicting Student Actions in a Procedural Training Environment,‖ vol. X, no. c, pp. 1–13,

2017.

8. [8] L. I. U. L. Wu, M. W. Hua, I. E. College, and I. Technology, ―Design an Applied Student Model for Intelligent Tutoring System,‖ pp. 2–6.

9. B. I. Mohammad, S. I. Shaheen, and S. A. Mokhtar, ―Novel Online Tutor Modeling For Intelligent Tutoring Systems,‖ 2001.

10. G. Gutjahr, K. Menon, and P. Nedungadi, ―Using an intelligent tutoring system to predict mathematics and English assessments,‖ Proc.

- 5th IEEE Int. Conf. MOOCs, Innov. Technol. Educ. MITE 2017, pp. 135–140, 2018.

11. S. Ke and X. Lu, ―Study on intelligent tutoring system based on multi-agents,‖ Proc. - 2010 6th Int. Conf. Nat. Comput. ICNC 2010,

vol. 6, no. Icnc, pp. 2948–2952, 2010. 12. S. U. N. Yu, ―A Multi-Agent Intelligent Tutoring System,‖ pp. 1724–1728, 2009.

13. R. Rollande and J. Grundspenkis, ―Representation of study program as a part of graph based framework for tutoring module of

intelligent tutoring system,‖ 2012 2nd Int. Conf. Digit. Inf. Process. Commun. ICDIPC 2012, pp. 108–113, 2012. 14. T. A. O. Ren and J. Xiao, ―The Influence of Student Abilities and High School on Student Growth : A Case Study of Chinese National

College Entrance Exam,‖ vol. 7, 2019.

15. S. P. M. Choi et al., ―International Forum of Educational Technology & Society Learning Analytics at Low Cost : At-risk Student Prediction with Clicker Data and Systematic Proactive Interventions Published by : International Forum of Educational Technology &

Society Linked refe,‖ vol. 21, no. 2, 2018.

16. R. M. M. F. Luis, M. Llamas-Nistal, and M. J. F. Iglesias, ―Enhancing learners‘ experience in e-learning based scenarios using Intelligent tutoring systems and learning analytics: First results from a perception survey,‖ Iber. Conf. Inf. Syst. Technol. Cist., pp. 1–4,

2017.

17. M. Srilekshmi, ―Learning Analytics to Identify Students at-risk in MOOCs,‖ pp. 194–199, 2016. 18. R. Umer, T. Susnjak, A. Mathrani, and S. Suriadi, ―A learning analytics approach : Using online weekly student engagement data to

make predictions on student performance .,‖ 2018 Int. Conf. Comput. Electron. Electr. Eng. (ICE Cube), pp. 1–5, 2018.

19. J. Jonathan, S. Sohail, F. Kotob, and G. Salter, ―The Role of Learning Analytics in Performance Measurement in a Higher Education

Institution,‖ 2018 IEEE Int. Conf. Teaching, Assessment, Learn. Eng., no. December, pp. 1201–1203, 2018.

20. E. Seidel, ―Using predictive analytics to target and improve first year student attrition,‖ no. 2011, 2017. 21. L. W. Santoso, ―Early Warning System for Academic using Data Mining,‖ 2018 Fourth Int. Conf. Adv. Comput. Commun. Autom.,

pp. 1–4, 2018.

22. S. Milinkovi and V. Vujovi, ―Students ‘ Success Predictive Models Based on Selected Input Parameters Set,‖ 2019 18th Int. Symp. INFOTEH-JAHORINA, no. March, pp. 1–6, 2019.

23. A. Wolff, Z. Zdrahal, and M. Pantucek, ―Improving retention : predicting at-risk students by analysing clicking behaviour in a virtual

learning environment,‖ pp. 145–149, 2013.

300-305

51.

Authors: Aboli V. Chavhan, Arif Khan

Paper Title: Water Pollution – Sources, Effects and Control

Abstract: Water could be a basic asset inside the lives of people World Health Organization each enjoys its

utilization and World Health Organization square measure harmed by its abuse and flightiness (flooding, dry

spells, saltiness, causticity, and debased quality). Water could be a limited and weak asset. Thus, utilization of

polluted water places lives and jobs in peril because of water have no substitute. There square measure numerous

ways during which water implied for human utilization will get debased. These grasp squanders from businesses

like mining and development, food process, hot squanders from power creating enterprises, household and

agrarian squanders and by shifted microbiological operators. These days, water is being refined by differed ways

anyway examination is being led to appear for a great deal of dependable and less expensive ways that may

cleanse water at a sensible worth.

Keywords: water contamination, impact, spillover, control measures, composts

306-310

Page 39: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

References:

1. Adetunde, L.A. what's more, Glover, R.L.K. (2010). Bacteriological Quality of Borehole Water utilized by Students' of University for Development Studies, Navrongo Campus in Upper-East Region of

2. Ghana. Ebb and flow Research Journal of Biological Sciences. 2(6):361-364. Akio, M. (1992). Severe Sea: The Human Cost of

Minamata sickness. First Edition. Kosei Publishing, Japan. 3. 3.Baig, J.A., Kazi, T. G., Arain,M. B., Afridi, H. I., Kandhro, G.A., Sarfraz, R. A., Jamali, M. K. What's more, Shah, A. Q. (2009)?

Assessment of arsenic and other physico-compound boundaries of surface and spring water of Jamshoro, Pakistan. Diary of Hazardous

Materials. 166, 662–669. 4. Bu, H., Tan, X., Li, S. What's more, Zhang, Q. (2010)? Water quality appraisal of the Jinshui River (China) utilizing multivariate

measurable procedures. Environ Earth Sci. 60, 1631–1639.

5. Craftsman, S.R., Caraco, N.F., Correll, D.L., Howarth, R.W., Sharpley, A.N. what's more, Smith, V.H. (1998). Non point contamination of surface waters with phosphorus and nitrogen. Natural Applications. 8: 559-568.

6. CPCB Report. (2013). Status of Water Quality in India 2011. Observing of Indian National Aquatic Resources, Series:

MINARS/35/2013-14. Pp. 1-212. 7. Friberg, L., Piscator, M., Nordberg, G.F and Kjellstrom, T. (1974). Cadmium inside nature, second version, Chemical Rubber

Company Press, Cleveland, Ohio, 248 pp.

8. Goolsby, D.A. what's more, Battaglin, W.A. (2001). Long haul changes in focuses and transition of nitrogen inside the Mississippi Basin, U.S.A. Hydrological Processes. 15: 1209-1226.

9. 9.Howarth, R. W., Billen,G., Swaney, D., Townsend, A., Jaworski, N., Lajtha, K., Downing, J.A., Elmgren, R.,

10. Murdoch, P. Also, Zhu, Z. (1996). Local nitrogen financial plans and riverine N and P motions for the wastes toward the North Atlantic Ocean: Natural and human impacts. Biogeochemistry.35:181–226.

11. Kumar, R., Singh, R.D. also, Sharma, K.D. (2005). Water assets of India. Current Science. 85(5): 794-811.

12. Larry, W. (2006). World Water Day. A Billion people Worldwide Lack Safe Drinking http://environment.about.com/od/environmentalevents/a/waterdayqa.htm, March 22nd, 2006.

13. Mian, I. A., Begum, S., Riaz, M., Ridealgh, M., mcclean, C. J. Also, Cresser, M. S. (2010).

52.

Authors: Ankush S, Vinayprasad M S

Paper Title: Enhance Security for Authentication

Abstract: An enhanced security for authentication is defined because it is vital that authentication is an

extremely important crucial robust process for each user to access any of the applications. Magnificent growth

and usage of the internet raise agitate about the way to communicate, protect data and sensitive information

safely. In today's world hackers use differing types of attacks in order to acquire valuable information. Many of

the attacks are primarily used to get into an application to steal the credentials followed by internal information

of the users. The first thing of security is defined in three terms. i.e., confidentiality, integrity and availability.

Confidentiality can protect information from unauthorized access and exploiting of sensitive data. Integrity

measures protect information from unauthorized alteration. Whereas availability so as for a data system to be

useful it must be available to authorized users. The most objective of this paper is to supply information about

confidentiality in terms of multifactor authentication. Confidentiality plays a serious role in terms of

authentication. Authentication is the process of proving or showing to be true. This includes confidentiality and

integrity. The improved security for authentication is additionally known for multifactor authentication for the

users. This multifactor authentication is implemented for an android application using a visual-picture login

technique to access the an application.

Keywords: Multifactor authentication (MFA), One-time-password(OTP), Visual-picture login, Confidentiality,

Integrity, Click-points, Coordinates.

References:

1. ABBAS ACAR, ―A PRIVACY-PRESERVING MFA‖, IEEE INTERNATIONAL JOURNAL, 2019.

2. XINYI HUANG, YANG XIANG, ―ROBUST MULTI-FACTOR AUTHENTICATION FOR FRAGILE COMMUNICATIONS‖, IEEE INTERNATIONAL

JOURNAL, 2014.

3. NAPA SAE-BAE, ―BIOMETRIC-RICH GESTURE: BASED ON MULTI-TOUCH‖, INTERNATIONAL JOURNAL, 2012.K. ELISSA, ―TITLE OF PAPER

IF KNOWN,‖ UNPUBLISHED. 4. ALIREZA PIRAYESH, ANGELOS STAVROU, ―UNIVERSAL MULTI-FACTOR AUTHENTICATION USING GRAPHICAL PASSWORDS‖, IEEE

INTERNATIONAL JOURNAL 2008.

5. ABBAS ACAR, WENYI LIU, ―A PRIVACY-PRESERVING MULTIFACTOR AUTHENTICATION SYSTEM‖, WILEY JOURNAL, 2019M. YOUNG, THE TECHNICAL WRITER‘S HANDBOOK. MILL VALLEY, CA: UNIVERSITY SCIENCE, 1989.

6. B. MADHURAVANI, DR. P. BHASKARA REDDY, ―A COMPREHENSIVE STUDY ON DIFFERENT AUTHENTICATION FACTORS‖, IJERT 2013.

7. ALZAHRAA J. MOHAMMED AND ALI A. YASSIN, ―EFFICIENT AND FLEXIBLE MULTI-FACTOR AUTHENTICATION PROTOCOL BASED ON

FUZZY EXTRACTOR OF ADMINISTRATOR‘S FINGERPRINT AND SMART MOBILE DEVICE‖, MDPI ARTICLE, 2019.

8. NEENU ANN SHAJI, SUMITHA SOMAN, ―MULTI-FACTOR AUTHENTICATION FOR NET BANKING‖, INTERNATIONAL JOURNAL OF SYSTEM

AND SOFTWARE ENGINEERING, VOL 5, 2017. 9. DIVYA JAMES, MINTU PHILIP, ―A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY‖, IEEE 2012

10. SUGATA SANYAL, AYU TIWARI, AND SUDIP SANYAL, ―A MULTIFACTOR SECURE AUTHENTICATION SYSTEM FOR WIRELESS

PAYMENT‖, SPRINGER-VERLAG, 2010 11. https://www.loginradius.com/blog/2019/06/what-is-multi-factor-authentication/ https://developer.android.com/docs

311-315

53.

Authors: Klodian Gumeni

Paper Title: Analyzing and Solving Stability Problems during the Commissioning of the Steam Turbine

Abstract: The commissioning of the steam turbine in the CCPP of Vlore (Albania) was carried out after a

shutdown of about one year. During previous operation of the unit, in particular in a couple of shutdowns, were

observed high vibration at bearing MAD 21. Before the restart, the oil deflector of the MAD21 bearing (the

bearing located in the front standard, on the inlet side of the steam turbine and adjacent to the clutch) was

modified increasing the radial clearance on the part of the oil deflector acting as a thermal shield with the aim of

316-320

Page 40: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

eliminating / preventing the risk of rubbings. Rubs at the location of the above mention oil deflector were

considered as the very likely cause of high vibration at bearing MAD 21. A lot of tests were carried out during

the recommissioning phase and the data received were analyzed. This paper details the discovery of the

problems, initial attempts to address them and the use of the rotor dynamics tools to find a solution of the

problem by the optimization of the bearings.

The bearings were not optimized as per rotordynamics analysis (RDA) findings, because it was a too expensive

solution. The solution was found making some modification on control system of the ST, without affecting the

mechanical integrity of the machine.

Keywords: bearing vibration, critical speed, shut down and start up trends, trip limit.

References:

1. J.S.Rao, ―Vibratory Condition Monitoring of Machines‖, Narosa Publishing House, 2000.

2. Ansaldo Energia, ST – Start UP Curves, pp 2 – 3, 5 – 6. 3. Ansaldo Energia, Steam Turbine General Description, pp. 2 – 3, 5 – 7.

4. Ansaldo Energia, ST – Start UP Procedures, pp. 9 – 10.

5. ISO 7919-2, Mechanical Vibration – Evaluation of machine vibration by measurements on rotating shafts, pp.8. 6. Ansaldo Energia, ST Commissioning Procedure, pp. 80 – 85.

7. C.Scheffer, P.Girdhar, ―Practical Machinery Vibration Analysis and Predictive Maintenance‖, Newnes, An Imprint of Elsevier, 2004,

pp. 134 – 145. 8. Maurice L. Adams, Jr. ―Rotating Machinery Vibration‖, Marcel Dekker, 2000.

54.

Authors: J.Karpagam, P.Bavithra, I.Infranta Merlin, J.Kousalya

Paper Title: IoT Based Smart Farming

Abstract: Agriculture is the key factor to satisfy the economy of our country and it is one of the basic needs of

the human resources. Watering the plants is very important in agriculture. By using recent and current

technologies irrigation system can be upgraded with the help of sensors and Microcontrollers. Thus, this

irrigation system can be groomed and upgraded into an automated process.

Keywords: Irrigation, Water level sensor, GSM Module, Arduino-UNO.

References:

1. Aman Bafna, Anish Jain, Nisrag Shah and Rishab Parekh, ―IoT Based Irrigation using Arduino and Android on the bases of Weather

Prediction‖, International Research Journal of Engineering and Technology, Vol 05 Issue 05, 2018, pp. 433-437

2. Kim. Y, Evans. R. G, Iversen. W.M, 2008 ‗Remote Sensing and Control of an Irrigation System using a Distributed Wireless Sensor Network‘, IEEE Transactions on Instrumentation and Measurement, Vol. 57, No.:8, pp 1-6.

3. Dhivya A, Infanta J, Chakrapani K, 2012 ‗Automated Agricultural Process using PLC and Zigbee‘, Journal of Artificial Intelligence,

Vol.5, No.:4, pp 123-130. 4. Satyanarayana G. V, Mazaruddin S. D, 2013 ‗Wireless Sensor Based Remote Monitoring System for Agriculture using Zigbee and

GPS‘, in Proceedings of Conference on Advances in Communication and Control Systems, pp. 110-114.

5. DewesgvreeRane, ‗Review Paper based on Automatic Irrigation System based on RF Module‘, International Journal of AICT, Vol.1, No. 9, January 2015.

6. A Goap, D Sharma, AK Shukla, CR Krishna ,2018, ‗Smart Irrigation System‘, Computers and Electronics in agriculture 155, 41-49,

2018

321-324

55.

Authors: Kehdinga George Fomunyam

Paper Title: Theory or Practice? the Search for Value for Money in Engineering Education

Abstract: Engineering education was predicated on two sources. One on trade apprenticeship where people that

are trained locally under the tutelage of someone are engaged in further studies to broaden their theoretical and

practical knowledge. The other source of engineering education was within the four walls of the educational

institution which has in its core natural sciences and it emphasizes specialization in a specific aspect of

engineering. This study seeks to understand if value for money in engineering education is in theory or practice.

Value for money is one of the measures of quality of education. Value for money as a concept that has been

defined by various authors and the World Bank defined value for money as the effective, efficient, and economic

use of resources, which requires the evaluation of relevant costs and benefits with the assessment of risks and of

non-priced items and/or cost of life cycle. The objective of this research is to determine if the search for value

for money in engineering education is a theory or practice. Findings from the study revealed that engineering

education is one of foundation for the development of the society. By engineering education, the dynamics of

life has been influenced and also human culture giving more substance to civilization and politics. It was also

found out that value for money is not only a financial marker but it has with it various economic, social, physical

dimension. In engineering education costs are expended and this this necessitates the drive for value for money.

This study recommends that there is a need for better measures of value for money in engineering education and

there is a need to advance knowledge on the theories of engineering to ensure relevance in this changing era.

Keywords: engineering, engineering education, value for money, search for value for money, theory, practice.

References:

1. Barnett C, Barr J, Christie A, et al. 2010. Measuring the impact and value for money of governance and conflict programmes. ITAD: Hive, East Sussex, http://assets.publishing.service.gov.uk/media/57a08b1eed915d3cfd000b44/60797_ITAD-VFM-Report-Dec10.pdf

2. Blandin, B. 2012. ―The Competence of an Engineer and How It Is Built Through an Apprenticeship Program: A Tentative Model.‖

International Journal of Engineering Education 28 (1): 57–71. doi:0949-149X/91.

325-330

Page 41: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

3. Booth, S. (2004). Engineering Education and the Pedagogy of Awareness. In Brown, S.(Ed) Effective Learning and Teaching in Higher

Education (PP 9-23). London: Taylor & Francis E-Library. 4. Booth, S. (2004). Engineering Education and the Pedagogy of Awareness. In Brown, S.(Ed) Effective Learning and Teaching in Higher

Education (PP 9-23). London: Taylor & Francis E-Library.

5. Continental AG. ―In Search of Global Engineering Excellence: Educating the Next Generation of Engineers for the Global

Workplace‖. Hanover, Germany, Continental AG, 2006. (Available at http://www.conti-online.com).

6. Davidson A, Miskelly J, Kelly A. (2008). Audit commission: Value for money in Schools-Literature and Data Review final report.

7. Department for international development (DFID)DFIDs approach to value for money(VFM)London. 2011. http://www.gov.uk/government/uploads/system/uploads/attachment_data/file/67479/DFID-approach-value-money.pdf

8. Erlendsson J. 2002. Value for money studies in higher education. http://hi.is/~joner/eaps/wh_vfmhe.htm

9. Fomunyam, K. G. (2016a). Student teachers negotiating teachers‘ professional identity. Journal of Educational Science, 13(2), 186-193.

10. Fomunyam, K. G. (2017a). Education as politics in the context of Operation Ghost Town in Southern Cameroon. Knowledge for

Transformation, 1(1), 1-4. 11. Grasso, Dominico; Burkins, Melody B. (Eds); Holistic Engineering Education, Beyond Technology, Springer Verlag, New York, 2010.

12. Harvey L. 2006. Understanding quality. Section B 4 1-1 of ―Introducing Bologna objectives and tools in Purser, L(Ed) EUA Bologna

Handbook: Making Bologna Work, Brussels European University Association and Berlin, Raabe 13. Holz-Clause, M., Guntuku, D., Koundinya, V., Clause, R., & Singh, K. (2015). Current and Future Trends in Higher Education

Learning: Implications for Curriculum. In N. Ololube, P. Kpolovie, & L. Makewa (Eds.), Handbook of Research on Enhancing

Teacher Education with Advanced Instructional Technologies (pp. 277-292). Hershey, PA: IGI Global. 14. http://www.whitehouse.gov/issues/education/educate-innovate (accessed on 26 June 2011).

15. https://www.raeng.org.uk/international/activities/pdf/RAEng_

16. Itabashi-Campbell, R., and J. Gluesing. 2013. ―Engineering Problem-Solving in Social Contexts: ‗Collective Wisdom‘ and ‗Ba‘.‖ In Engineering Practice in a Global Context: Understanding the Technical and the Social, edited by B. Williams, J. D. Figueiredo, and J.

P. Trevelyan, 129–158. Leiden, Netherlands: CRC/ Balkema

17. Jackson, P. 2012. Value for money and international development.: deconstructing myths to promote a more constructive discussion. Paris: OECD. http://oecd.org/development/effectiveness/49652541.pdf

18. Obama‘s Campaign to Improve the Participation and Performance of America‘s Students in Science, Technology, Engineering, and

Mathematics (STEM). ―Educate to Innovate‖. 2009. Available online: http://www.whitehouse.gov/issues/education/educate-innovate (accessed on 26 June 2011).

19. Royal Academy of Engineering. (2012). Engineers for Africa: Identifying Engineering Capacity Needs in Sub-Saharan Africa.

Summary Report. Retrieved on December 13, 2013, from https://www.raeng.org.uk/international/activities/pdf/RAEng_Africa_Summary_Report.pdf

20. Treasury HM. 2004. Regularity, propriety and value for money:London:HM Treasury.

http://webarchive.nationalarchives.gov.uk/20130129110402/ http://www.hm-treasury.gov.uk/d/reg_prop_and_VfM-November04.pdf 21. World Bank (2016). Value for money: Achieving VFM in investments projects financed by the World Bank.

http://www.worldbank.org.

56.

Authors: Kehdinga George Fomunyam

Paper Title: Social Capital in the Context of Fitness for Purpose: Do Engineering Students in Africa Possesses the

Right Capital?

Abstract: Social capital is important as it becomes an imperative as key indices for development and growth of

students who opt for engineering education. Engineering educators have important role to play in motivating

engineering students with untapped potentials to possess the right capital by creating productive teaching

platforms. This paper explored the relationship of social capital on engineering education in addition to students

possessing the right capital in their respective course of study. This paper argued that engineering educators

should develop students‘ social capital within the context of social networks and norms by promoting

knowledge-based social capital and its productivity among engineering students. This paper was guided by

Social Capital Theory, which lay emphases on the views that student learning should be centred on education

invested on human capital and social capital. Specifically, we explore engineering students having the right

capital in their study and social capital is a quality criterion that enhances students in possessing the right capital

towards EE in Africa. Thus, to address the social capital gaps in engineering education, it suggested that

engineering educational curriculum as well as staff development and capacity building should be designed in

developing engineering student to possess the right capital in their field of study. A number of educational-

oriented recommendations for social capital in engineering education investment were made.

Keywords: Africa, Curriculum, Development, Engineering students, Social capital

References:

1. Abdullah I., Malek A., Manaf A. (2019). Formulating Strategic Management in Social Capital within Gated and Guarded Community to Achieve Social Well-Being. Academy of Strategic Management Journal; 18(3).

2. Ahlborg M.G., Svedberg P., Nyholm M., Morgan A., Nygren J.M. (2019). Into the realm of social capital for adolescents: A latent

profile analysis. PLOS ONE; 14(2): e0212564. 3. Akintimehin O.O., Eniola A.A., Alabi O.J., Eluyela D.F., Okere W., Ozordi E. (2019). Social capital and its effect on business

performance in the Nigeria informal sector. Heliyon; 5 (7).

4. Almohamed A., Vyas D. (2019). Rebuilding Social Capital in Refugees and Asylum Seekers. ACM Transactions on Computer-Human Interaction; 26 (6): 1–30.

5. Amaewhule, C. E., Abraham, N. M. (2019). Social Capital Investment as Determinant of Teachers Emotional Intelligence in Public

Secondary Schools in Rivers State. International Journal of Innovative Social & Science Education Research, 7(2), 133–142. 6. Babalola O.K., Ahmed S., Onuh U.A.L. (2020). Engineering education (EE): a veritable tool for job creation and sustainable

development in Nigeria. International Journal of Electrical and Electronics Engineering (IJEEE); 9 (1): 1–8.

7. Batistic S., Tymon A. (2017). Networking Behaviour, Graduate Employability: A Social Capital Perspective. Education + Training; 59 (4): 374–388.

8. Benbow R.J., Lee C. (2019). Teaching-focused social networks among college faculty: exploring conditions for the development of social capital. Higher Education; 78 (1): 67–89.

9. Berthelsen H., Westerlund H., Pejtersen J.H., Hadzibajramovic E. (2019). Construct validity of a global scale for Workplace Social

Capital based on COPSOQ III. PLoS ONE; 14 (8). 10. Bosbach M., Maietta O.W. (2019). The Implicit Price for Fair Trade Coffee: Does Social Capital Matter? Ecological Economics; 158:

34–41.

331-338

Page 42: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

11. Bourdieu P. (1986). The Forms of Capital. In J. G. Richardson (Ed.), Handbook of theory and research for the sociology of education;

New York: Greenwood Press. Pp. 241–258. 12. Bourdieu P., Wacquant L.P.D. (1992). An invitation to Reflexive sociology. Chicago: University of Chicago Press.

13. Brown S., Flick L., Williamson K. (2005). Social Capital in Engineering Education. 35th ASEE/IEEE Frontiers in Education

Conference, S3D-10, October 19-22, 2005, Indianapolis, IN.

14. Buck-Mcfadyen E., Isaacs S., Strachan P., Akhtar-Danesh N., Valaitis R. (2019). How the Rural Context Influences Social Capital:

Experiences in Two Ontario Communities. Journal of Rural and Community Development; 14 (1): 1–18.

15. Carreras M., Bowler S. (2019). Community Size, Social Capital, and Political Participation in Latin America. Political Behavior; 41(3): 723–745.

16. Ceryn E, Rees G, Taylor C, Wright C. (2017). Widening Access‘ to Higher Education: the Reproduction of University Hierarchies

Through Policy Enactment. Journal of Education Policy; 34 (1): 101–116. 17. Chen Y., Starobin S.S. (2019). Formation of Social Capital for Community College Students: A Second-Order Confirmatory Factor

Analysis. Community College Review; 47 (1): 3–30.

18. Coleman J.S. (1988). Social Capital in the Creation of Human Capital. American Journal of Sociology, 94 (supplement): S95–S120. 19. Coleman J.S. (1990). Foundations of social theory. Cambridge: Harvard University Press.

20. Coleman J.S. (1993). Rational reconstruction of society. American Sociological Review, 58(1), 1–15.

21. Coleman J.S. (2000). Social capital in the creation of human capital. In Knowledge and social capital; Elsevier: Pp. 17–41. 22. Cooke P., Clifton N., Oleaga M. (2005). Social capital, firm embeddedness and regional development. Regional Studies; 39 (8): 1065–

1077.

23. Danko A. I (2016), The Role of Engineering Education in National Development Entrepreneurship Education for Vocational and Technical Students (2nd Edition) Abuja Benchmark Publishers Ltd.Ch.3, pp 23-27.

24. Erinne J.N. (2015). Engineering Education for 21st Century Africa: The Chemical Engineering and Nigerian Perspectives, the Nigeria

Institution of Mechanical Engineering Annual Symposium. 25. Gilani D. (2019): Creating connections: the role of universities in enhancing graduates‘ social capital and challenging nepotism,

Perspectives: Policy and Practice in Higher Education. Pp. 1-6.

26. Harris C.M., Wright P.M., McMahan G.C. (2019). The emergence of human capital: Roles of social capital and coordination that drive unit performance. Human Resource Management Journal; 29 (2); 162–180.

27. Juma, C.O. (2015) ―Unleash the Power of Universities‖, New African Magazine. Accessed on June 30th, 2020 from

http://newafricanmagazine.com/calestous-juma-unleash-the-power-of-universities. 28. Kang, D.S., Gold J., Kim J., Kim I. (2019). Social capital and career growth. International Journal of Manpower.

29. Magana A.J., Falk M.L., Vieira C., Reese M.J. (2016). A case study of undergraduate engineering students‘ computational literacy and

self-beliefs about computing in the context of authentic practices. Computers in Human Behavior; 61: 427– 442. 30. Magana A.J., Ortega-Alvarez J.D., Lovan R., Gomez D., Marulanda J., Dyke S. (2017). Virtual, local and remote laboratories for

conceptual understanding of dynamic systems. International Journal of Engineering Education; 33(1–A): 91–105.

31. Magana A.J., Fennell H., Vieira C., Falk M.L. (2019). Characterizing the interplay of cognitive and metacognitive knowledge in computational modeling and Simulation practices. Journal of Engineering Education; 7(2).

32. Marilyn C. (2018). Rethinking Graduate Employability: The Role of Capital, Individual Attributes and Context. Studies in Higher

Education; 43 (11): 1923–1937. 33. Martin J.P., Simmons D.R., Yu S.L. (2013). The Role of Social Capital in the Experiences of Hispanic Women Engineering Majors.

Journal of Engineering Education; 102 (2): 227–243. 34. Mejia J.A., Revelo R.A., Villanueva I., Mejia J. (2018). Critical Theoretical Frameworks in Engineering Education: An Anti-Deficit

and Liberative Approach. Educ. Sci.; 8, 158.

35. Putnam, R.D. (2001). Social Capital: Measurement and Consequences. Isuma: Canadian Journal of Policy Research 2 (Spring 2001). 36. Rogošić S., Baranovic B. (2016). Social Capital and Educational Achievements: Coleman vs. Bourdieu. CEPS Journal; 6 (2): Pp. 81-

100.

37. Saukani N., Ismail N.A. (2019). Identifying the Components of Social Capital by Categorical Principal Component Analysis (CATPCA). Soc Indic Res; 141:631–655.

38. Skvoretz J., Kersaint G., Campbell-Montalvo R., Ware J.D., Smith C.A.S., Puccia E., Martin J.P., Lee R., MacDonald G., Wao H.

(2019). Pursuing an engineering major: social capital of women and underrepresented minorities, Studies in Higher Education; Pp. 1-17.

39. Thompson JJ, Jensen-Ryan D. (2018). Becoming a ―Science Person‖: Faculty Recognition and the Development of Cultural Capital in

the Context of Undergraduate Biology Research. CBE—Life Sciences Education, Winter ; 17:ar62: 1–17. 40. World Economic Forum, (2016a). Africa Skills Initiative: Stakeholders Consultation Workshop, 20 July 2016, Johannesburg, South

Africa.

41. World Economic Forum, (2016b). The Future of Jobs: Employment, Skills and Workforce Strategy for the Fourth Industrial Revolution. Executive Briefing, World Economic Forum: Geneva Switzerland. Pp. 1-68.

42. World Economic Forum (2016c). The Human Capital Report 2016. Executive Briefing, World Economic Forum: Geneva Switzerland.

Pp. 1-10. 43. World Economic Forum, (2017a). Realizing Human Potential in the Fourth Industrial Revolution: An Agenda for Leaders to Shape the

Future of Education, Gender and Work. Executive Briefing, World Economic Forum: Geneva Switzerland. Pp. 1-53.

44. World Economic Forum (2017b). The Future of Jobs and Skills in Africa: Preparing the Region for the Fourth Industrial Revolution. Executive Briefing, World Economic Forum: Geneva Switzerland. Pp. 1-28.

57.

Authors: Kehdinga George Fomunyam

Paper Title: Engineering Education and soft skills in the Era of the Fourth Industrial Revolution in Africa

Abstract: The Fourth Industrial Revolution (4IR) is impacting engineering education (EE) in diverse with

several changes from the effects of the previous three industrial revolutions. Remarkable industrialization has

been recorded in the fourth industrial revolution. However, certain skill gaps has been identified missing in

engineering courses and curriculum as employers seek skills development aligned with the fourth industrial

revolution (4IR). This paper was guided by Lifelong Learning Theory which explain that the paradigm shift

from the first three industrial revolutions to 4IR has led to EE transformation of acquiring not only technical

skills but also soft skills. This has led to critical EE curriculum review to extrapolate its impacts of soft skills on

4IR emerging workforce. This paper takes a broad look at the EE and soft skills in the era of 4IR in Africa, while

examining the EE in previous revolutions and, exploring the impacts and implications of soft skills on EE. The

possibilities of adequate investments in EE and soft skills programmes becomes an imperative to address skill

gaps and prepare engineering graduate students for future work. The importance of soft skills, values, and

improvement of soft skills in engineering education in 4IR era are discussed among others. Thus, to address soft

skills gaps in EE, industrial cooperation and educational partnership is significant to centre on EE curriculum

future-oriented skills development to consolidate with 4IR workforce demands. A number of policy

339-345

Page 43: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

recommendations for 4IR compatibility with EE polices are made.

Keywords: Africa, Curriculum, Engineering education, Soft skills, Lifelong

References:

1. Akokuwebe M.E. & Okunola R.A. (2015). Demographic transition and rural development in Nigeria. Journal of Developing Country

Studies (USA), 5 (6), 1-13.

2. Akokuwebe M.E. (2017). Youth unemployment and electoral malpractices in Nigeria. The Nigerian Journal of Sociology and Anthropology (Nigeria) 2017; 15(3):35-52.

3. Akokuwebe M.E., Ukpabi D., Ejeh S.O. (2017). Mass media and effective socialization amongst in-school adolescents: a perceptive

study. Centrepoint Journal (Humanities Edition), University of Ilorin (Ilorin: Nigeria), 20 (2), 1-18. 4. Andrews, J. & Higson, H (2008). Graduate employability. ‖soft skill ‖verses hard‖ business knowledge: A European study. Higher

Education in Europe, 33: 411-422. 5. Atman C.J., Sheppard S.D., Turns J., Adams R.S., Fleming L.N., Stevens R., Streveler R.A., Smith K.A., Miller R.L., Leifer L.J.,

Yasuhara K., Lund D. (2010). Enabling Engineering Student Success: The Final Report for the Center for the Advancement of

Engineering Education. San Rafael, CA: Morgan & Claypool Publishers. 6. Brunhaver S. (2015). Early career outcomes of engineering alumni: Exploring their connection to the undergraduate experience

(dissertation). Stanford, CA: Stanford University.

7. Brunhaver S., Korte R., Lande M., Sheppard S. (2010). Supports and barriers that recent engineering graduates experience in the workplace. Proceedings of the American Society for Engineering Education Annual Conference and Exposition, June 20–23,

Louisville, KY.

8. Business-Higher Education Forum (BHEF). 2011. Creating the Workforce of the Future: The STEM Interest and Proficiency Challenge. Washington.

9. Carnevale AP, Smith N, Melton M. 2011. STEM. Washington: Georgetown University Center on Education and the Workforce.

10. Carrico C.A., Winters K.E., Brunhaver S., Matusovich H.M. (2012). The pathways taken by early career professionals and the factors that contribute to pathway choices. Proceedings of the American Society for Engineering Education Annual Conference and

Exposition, June 10–13, San Antonio.

11. Dameron S. & Durand T. (2013). Strategies for business school in a multi-polar word. Education and training 55,323-335. 12. Fomunyam KG (2019). Education and the Fourth Industrial Revolution: Challenges and Possibilities for Engineering Education.

International Journal of Mechanical Engineering and Technology (IJMET), 10 (8), 271-284.

13. Forbes MH, Bielefeldt AR, Sullivan JF. 2015. The choice opportunity disparity: Exploring curricular choice opportunities for engineering vs. non-engineering majors. Proceedings of the ASEE Annual Conference and Exposition, June 14–17, Seattle.

14. Gibb S. (2014). Soft skills assessment: theory development and the research agenda. International Journal of Lifelong Learning

Education, 33 (4), 455-471. 15. Gray A. (2016). The 10 skills you need to thrive in the Fourth Industrial Revolution. Accessed on 27th May, 2020 from

https://www.weforum.org/agenda/2016/01/the-10-skills-you-need-to-thrive-in-the-fourth-industrial-revolution/.

16. Hoit R., Sawicki S. & Sloan J. (2010). A theoretical review of skill shortages and skill need: Evidence report 20. Accessed on 26th of May, 2020 from http://www.ukces.org.uk/asset/bispartn ers/docs/publication/evidence.report.20.a.theoretical-review-of-skill-

shortageand.skill-need.pdf.

17. Illeris, K.(2011). The fundament of workplace learning. Understanding how people learn in working life. London: Routledge. 18. Illeris, K.(2011). The fundamentals of workplace learning: understand how people learn in working life. London: Routledge.

19. Julia Gross, 2012. Lifelong learning and your career, in Building Your Library Career with Web 2.0, 2012.

20. Kechagias, K. (ED.) (2011). Teaching and assessing soft skills MASS project report school Thessaloniki, Neapoli. 21. Kirk D. (2010). Causes of unemployment in South Africa. Accessed on May 29th, 2020 from

https://twentythirdfloor.co.za/2010/12/01/causes-of-unemployment-in-south-africa/.

22. Knobbs C.G. & Grayson D.J. (2012). An approach to developing independent learning and non-technical skills amongst final year mining engineering students. European Journal of Engineering Education, 37 (3), 5-10.

23. Litchfield K., Javernick-Will A., Maul A. (2016). Technical and professional skills of engineers involved and not involved in

engineering service. Journal of Engineering Education, 105 (1), 70–92.

24. Marco Kalz, 2015. Lifelong Learning and Its Support with New Technologies in International Encyclopaedia of the Social &

Behavioural Sciences (Second Edition).

25. Martins J., Duarte M., Cunha S., Almada-Lobo B., Marques A.T., Magalhaes B. (2007). The role of hard and soft skills on engineering education. International Conference on Engineering Education ─ ICEE 2007, Coimbra, Portugal, September 3-7, 2007, 1-6.

26. Mejia JA, Revelo RA, Villanueva I, Mejia J (2018). Critical Theoretical Frameworks in Engineering Education: An Anti-Deficit and

Liberative Approach. Educ. Sci., 8 (158), 1-13.

27. Mourtos NJ (2015). Preparing Engineers for the 21st Century: How to teach engineering students process skills. International Journal

of Quality Assurance in Engineering and Technology Education, 4 (4), 1-26.

28. Naji K.K., Ebead U., Al-Ali A.K., Du X. (2020). Comparing Models of Problem and Project-Based Learning (PBL) Courses and Student Engagement in Civil Engineering in Qatar. Eurasia Journal of Mathematics, Science and Technology Education, 16 (8), 1867.

29. National Academy of Engineering (NAE) (2004). The Engineer of 2020: Visions of Engineering in the New Century, Washington.

D.C.: The National Academies Press. 30. Ongbali SO, Afolalu SA, Udo MO. (2019). Factors causing youth unemployment problem in Nigeria: A review. International Journal

of Mechanical Engineering and Technology, 10 (1), 1874-1879. 31. Peters MA (2017). Technological unemployment: educating for the fourth industrial revolution. Educational Philosophy and Theory,

49 (1), 1-6.

32. Peters, Michael A. (2017). Technological unemployment: educating for the Fourth Industrial Revolution. Journal of Self-governance and Management economics 5, No. 1, 25-33.

33. Pradhan A., Agwa-Ejon J. (2018). Opportunities and challenges of embracing smart factory in South Africa. In 2018 Portland

International Conference on Management of Engineering and Technology (PICMET). Honolulu, HI, USA, IEEE. 34. Ra S., Shrestha U., Khatiwada S., Yoon S.W. & Kwon K. (2019). The rise of technology and impact on skills. International Journal of

Training Research, 17 (1), 26-40.

35. Reaves J. (2019). 21st-Century Skills and the Fourth Industrial Revolution: A Critical Future Role for Online Education. International

Journal on Innovations in Online Education, 3 (1), 1-21.

36. Sackey SM, Bester A. (2016). Industrial engineering curriculum in Industry 4.0 in a South African context. South African Journal of

Industrial Engineering, 27 (4), 101-114. 37. Schwab K. (2016). The Fourth industrial Revolution: What it means, how to respond. Accessed on 22nd May, 2020 from

https://www.weforum.org/agenda/2016/01/the-fourth-industrial-revolution-what-it-means-and-how-to-respond/

38. Shvetsova OA, Kuzmina AD. (2018). Development of engineering personnel in the era of the Fourth Industrial Revolution. In 2018 Third International Conference on Human Factors in Complex Technical Systems and Environment (ERGO) and Environments

(ERGO). St. Petersburg, Russia, IEEE, 45-48.

39. Tonso K.L. (2014). Engineering identity. In: Cambridge Handbook of Engineering Education Research, eds Johri A, Olds BM. New York: Cambridge University Press.

40. Tracey TJG, Sodano SM. 2013. Structure of interests and competence perceptions. In: Handbook of Vocational Psychology, 4th ed.,

eds Walsh WB, Savickas ML, Hartung PJ. New York: Taylor & Francis.

Page 44: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

41. World Economic Forum (WEF) (2015a). The Human Capital Report 2015. World Economic Forum Global Agenda Council White

Paper, Geneva: World Economic Forum, 2015 42. World Economic Forum (WEF) (2015b). Global Agenda Council on the Future of Software and Society, Deep Shift: Technology

Tipping Points and Societal Impact, World Economic Forum Global Agenda Council White Paper, 2015.

43. World Economic Forum (WEF) (2016). The Future of Jobs: Employment, Skills and Workforce Strategy for the Fourth Industrial

Revolution. Geneva: World Economic Forum, 2016. Accessed on 23rd May, 2020 from

http://www3.weforum.org/dos/WEF_Future_of_Jobs.pdf.

44. World Economic Forum (WEF) (2017a). Realizing human potential in the Fourth Industrial Revolution. An Agenda for Leaders to Shape the Future of Education, Gender and Work. Paper Presented at World Economic Forum, Geneva, 2017.

45. World Economic Forum (WEF) (2017b). Accelerating Workforce Reskilling for the Fourth Industrial Revolution an agenda for leaders

to shape the future of education, gender and work. Paper Presented at World Economic Forum, Geneva, 2017.

58.

Authors: Kehdinga George Fomunyam

Paper Title: Engineering for Survival in Rural Africa in the Era of Covid-19

Abstract: Engineering has been reputed as a discipline that makes things work better. By the ingenuity of

engineering, there is the potential to deploy creativity to solve some of the problems of the world and help in

shaping the future. Shortly after the novel coronavirus, SARS-COV-2 (2019-NCov) was initially identified in

the Chinese city of Wuhan in a group of patients diagnosed with pneumonia on December 31, 2019, it resulted

to fast paced human to human transmission which has generated lots of media stirs and hype concerning issues

of public health globally. Corona virus disease 2019 (COVID-19) is a ribonucleic acid virus (RNA) which has

the physical appearance of a crown when viewed under the microscope which is as a result of glycoprotein

spikes on its envelope. Findings from the study revealed that engineering has great impact on health conditions

in rural Africa and the era of COVID-19 brought with it various consequences on the health systems of people.

Understanding that there is no known cure for COVID-19 is key and various countries of the world depended on

their knowledge and expertise to deal with the disease. This study therefore recommends that there is a need for

intensified effort on engineering in rural Africa.

Keywords: engineering, survival, COVID-19, corona virus, rural Africa

References:

1. African Union: Impact of the Coronavirus COVID-19 on the African Economy. African Union. 2020; Accessed on April 22, 2020.

2. Corman VM, Landt O, Kaiser M, et al. Detection of 2019 novel coronavirus (2019- nCoV) by real-time RT-PCR. Euro Surveill

2020;25(January (3)), doi:http://dx. doi.org/10.2807/1560-7917.ES.2020.25.3.2000045.

3. Haider N, Yavlinsky A, Simons D, Osman AY, Ntoumi F, Zumla A, et al. Passengers‘ destinations from China: low risk of novel

coronavirus (2019-nCoV) transmis-sion into Africa and South America. Epidemiol Infect 2020a;148:e41, doi:http://

dx.doi.org/10.1017/S0950268820000424 Published 2020 Feburary 26. 4. Hoffman SJ, Silverberg SL. Delays in global disease outbreak responses: lessons from H1N1, Ebola, and Zika. Am J Public Health

2018;108(3):329–33, doi:http://dx. doi.org/10.2105/AJPH.2017.304245.

5. http://www.africacdc.org/Africa centers for disease control and prevention. . [Accessed 17 February 2020]. 6. http://www.merriam-webster.com/dictionary/survival#h1

7. http://www.raeng.org.uk/publications/reports/assessing-the-economic-returns-ofengineering-rese

8. Huang, C.; Wang, Y.; Li, Z.; Ren, L.; Zhao, J.; Hu, Y.; Zhang, L.; Fan, G.; Xu, J.; Gu, X.; et al. Clinical features of patients infected with 2019 novel coronavirus in Wuhan, China. Lancet 2020, 395, 497–506.

9. Ippolito G, Hui DS, Ntoumi F, MAeurer M, Zumla A. 2020. Toning down the 2019-nCov hype-and restoring hope. Lancet Resp Med.

8(3):230-1, doi: http//dx.doi.org/10.1016/S2213-2600(20)30070-9 10. Largent EA. EBOLA and FDA: reviewing the response to the 2014 outbreak, to find lessons for the future. J Law Biosci

2016;3(3)489–537, doi:http://dx.doi.org/ 10.1093/jlb/lsw046 [published 2016 September 16].

11. Li Q, Guan X, Wu P, et al. 2020. Early transmission dynamics in Wuhan, China, of novel coronavirus-infected pneumonia. N Engl J Med. Doi:http//dx.doi.org/10.1056/NEJMoa2001316

12. Lu, H.; Stratton, C.W.; Tang, Y.W. Outbreak of pneumonia of unknown etiology in Wuhan, China: The mystery and the miracle. J.

Med. Virol. 2020, 92, 401–402. 13. Lu, R.; Zhao, X.; Li, J.; Niu, P.; Yang, B.; Wu, H.; Wang, W.; Song, H.; Huang, B.; Zhu, N.; et al. Genomic characterization and

epidemiology of 2019 novel coronavirus: Implications for virus origins and receptor binding. Lancet 2020, 395, 565–574.

14. Matthews, P., Ryan-Collins, L., Wells, J., Sillem, H. and Wright, H. (2012). Engineers for Africa: Identifying engineering capacity needs in sub-Saharan Africa. Royal Academy of Engineering, Africa-United Kingdom Engineering for Development Partnership.

15. ncov.pdf (accessed on 25 March 2020).

16. Nduka Orjinmo. 2020. Coronavirus: Nigeria's mega churches adjust to empty auditoriums https://www.bbc.com/news/world-africa-52189785

17. Nigeria CDC 2020. https://ncdc.gov.ng/ncdc. [Accessed 18 February 2020].

18. Perlman, S.; Netland, J. Coronaviruses post-SARS: Update on replication and pathogenesis. Nat. Rev. Microbiol. 2009, 7, 439–450. 19. Phan, T. Novel coronavirus: From discovery to clinical diagnostics. Infect. Genet. Evol. 2020, 79.

20. Respirology 2018,23, 130–137

21. Royal Academy of Engineering. 2020. Project CARE (COVID-19 AFRICAN Rapid Entrepreneurs) https://www.raeng.org.uk/policy/engineering-response-COVID-19-coronavirus/project-care

22. Talisuna AO, Okiro EA, Yahaya AA, et al. Spatial and temporal distribution of infectious disease epidemics, disasters and other

potential public health emergencies in the World Health Organisation Africa region, 2016-2018. Global Health 2020;16(1)9, doi:http://dx.doi.org/10.1186/s12992-019-0540-4 [published 2020 January 15

23. WHO. Ebola virus disease. 2020. https://www.afro.who.int/health-topics/ebola- virus-disease.

24. WHO. WHO African Region: JEE mission reports. 2020. https://www.who.int/ihr/ procedures/mission-reports-africa/en/. 25. World Bank. 2020. How countries are using edtech (including online learning, radio, television, texting) to support access to remote

learning during the COVID-19 pandemic. https://www.worldbank.org/en/topic/edutech/brief/how-countries-are-using-edtech-to-

support-remote-learning-during-the-COVID-19-pandemic 26. World Economic Forum. 2020. Here‘s how Africans are using tech to combat the coronavirus pandemic.

https://www.weforum.org/agenda/2020/04/africa-technology-coronavirus-covid19-innovation-mobile-tech-pandemic

27. World Health Organization Director-General‘s Opening Remarks at the Media Briefing on COVID-19–11 March 2020. Available online: https://www.who.int/dg/speeches/detail/who-director-general-s-openingremarks-

28. at-the-media-briefing-on-COVID-19---11-march-2020 29. World Health Organization Novel Coronavirus (2019-nCoV), Situation Report 1. 21 January 2020. Available online:

https://www.who.int/docs/default-source/coronaviruse/situation-reports/20200121-sitrep-1-2019-

346-350

Page 45: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

30. Yin, Y.;Wunderink, R.G. MERS, SARS and other coronaviruses as causes of pneumonia.

59.

Authors: Anushree H R, Sowmya B P

Paper Title: Ensembled Machine Learning Model for Aviation Incident Risk Prediction

Abstract: With the fabulous development of air traffic request expected throughout the following two decades,

the security of the air transportation framework is of expanding concern. In this paper, we encourage the

"proactive security" worldview to expand framework wellbeing with an emphasis on anticipating the seriousness

of strange flight occasions as far as their hazard levels. To achieve this objective, a prescient model should be

created to look at a wide assortment of potential cases and measure the hazard related with the conceivable

result. By using the episode reports accessible in the Aviation Safety Reporting System (ASRS), we construct a

half breed model comprising of help vector machine and K-closest neighbor calculation to evaluate the hazard

related with the result of each perilous reason. The proposed system is created in four stages. Initially, we

classify all the occasions, in view of the degree of hazard related with the occasion result, into five gatherings:

high hazard, decently high hazard, medium hazard, respectably medium hazard, and okay. Furthermore, a help

vector machine model is utilized to find the connections between the occasion outline in text configuration and

occasion result. In this application K-closest neighbors (KNN) and bolster vector machines (SVM) are applied to

group the everyday nearby climate types In equal, knn calculation is utilized to highlights and occasion results

subsequently improving the forecast. At long last, the forecast on hazard level order is stretched out to occasion

level results through a probabilistic choice tree.

Keywords: ASRS, KNN, SVM, Decision Tree.

References:

1. Choubin, B., et al., Snow avalanche hazard prediction using machine learning methods. Journal of Hydrology,2019. 577.

2. Dehghani, M., et al., Prediction of hydropower generation using Grey wolf optimization adaptive neuro-fuzzyinference system.

Energies, 2019. 12(2). 3. Mosavi, A., Y. Bathla, and A. Varkonyi-Koczy, Predicting the future using web knowledge:,D. Luca, L. Sirghi, and C. Costin, Editors.

2018, Springer Verlag. p. 341-349.

4. Maxwell, A.E., T.A. Warner, and F. Fang, Implementation of machine-learning classification in remote sensing: International Journal of Remote Sensing, 2018. 39(9): p. 2784-2817.

351-353

60.

Authors: Abdul Awwal, Aarish Khan

Paper Title: Performance Analysis of a Roundabout and a 3-leg Intersection Under Heterogeneous Traffic

Abstract: This paper addresses the analysis of the operational performance of a roundabout and a 3-legged

intersection located in quite a busy area of the Aligarh city. The city has an urban population of around 0.9

million people. The roundabout and 3-legged intersection are located in the close proximity of busy commercial

areas and schools. Roundabout that has been taken under consideration is un-signalized and 3-legged

intersection is priority controlled. The Current study has been undertaken analyze the operational execution of

the two intersections and to pave the way for forthcoming investigations related to improvement of the

intersections in the Aligarh District region. Traffic data was accumulated on weekdays during peak periods (5:30

pm to 6:30 pm). Video recording was taken in consideration to accomplish this task. The traffic was categorized

in 3 classes; light vehicles, heavy vehicles and bicycles. To execute the evaluation of functioning performance of

both intersections, SIDRA INTERSECTION software has been used. Results have shown that both the

roundabout and 3-legged intersection are operating nearly at their maximum capacities and Level of Service

(LOS) is not adequate for such amount of traffic influx into both the intersections. Volume to capacity (v/c) ratio

has revealed that both the roundabout and 3-legged intersection are in an unstable state and roundabout condition

is worse than the 3-legged intersection as the heavy vehicle volume influx is quite higher for the roundabout.

Keywords: Capacity, Level of Service, SIDRA Intersection, Heterogenous Traffic

References:

1. Falcocchio, John C., and Herbert S. Levinson. Road traffic congestion: a concise guide. Vol. 7. Cham: Springer, 2015. 2. Olagunju, K. (2015, March). Evaluating traffic congestion in developing countries–a case study of Nigeria. In A paper presented at the. 3. Jain, V., Sharma, A., & Subramanian, L. (2012, March). Road traffic congestion in the developing world. In Proceedings of the 2nd

ACM Symposium on Computing for Development (pp. 1-10). 4. Acharjee, A., Sarkar, P. P., & Pal, J. (2018). Effect of socioeconomic and latent variables in vehicle ownership: A case study of

Agartala city, India. International Journal of Engineering & Technology, 7(1.1), 472-476. 5. Surbakti, M., & Iswahyudi, F. (2018, February). Roundabout performance analysis in the city of Medan. In IOP Conference Series:

Materials Science and Engineering (Vol. 309, No. 1, p. 012115). IOP Publishing. 6. Dargay, J., Gately, D., & Sommer, M. (2007). Vehicle ownership and income growth, worldwide: 1960-2030. The energy

journal, 28(4). 7. Rao, B. S., Rambabu, T., & Rao, G. V. (2017). ANALYSIS OF CAPACIT SERVICE AT UNC INTERSECTIONS UNDER

TRAFFIC CON. International Journal of Civil Engineering, 8(8). 8. Ranjitkar, P., Shahin, A., & Shirwali, F. (2014). Evaluating operational performance of intersections using SIDRA. The Open

Transportation Journal, 8(1). 9. Mukhtyarali, S. S., Zala, L. B., & Amin, A. A. (2017). Capacities and LOS Measures of Intersections. Kalpa Publications in Civil

Engineering, 1, 209-218. 10. Naik, M. R., Umapathi, M., & Vishwas, R. K. M. J. (2017). A STUDY ON DESIRABLE IMPROVEMENTS AT SELECTED 11. UNSIGNALISED INTERSECTION ON NH-206 AND NH-13. International Journal of Advance Engineering and Research

Development, 4(5). 12. Marfani, S., Shihora, D., Kanthariya, C., & Kansara, H. (2018). Traffic Improvement for Urban Road Intersection, Surat. International

Research Journal of Engineering and Technology, 5(03).

354-359

Page 46: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

13. Chandramouli, C., & General, R. (2011). Census of india 2011. Provisional Population Totals. New Delhi: Government of India, 409-

413. 14. Zawawa, G., & Naghawi, H. (2017). Evaluation of the Operational Performance of Continuous Green T-Intersection under Different

Levels of Congestion. Periodica Polytechnica Transportation Engineering. 15. Naghawi, H., Jadaan, K., Al-Louzi, R., & Hadidi, T. (2018). Analysis of the Operational Performance of Three Unconventional

Arterial Intersection Designs: Median U-Turn, Superstreet and Single Quadrant. International Journal of Architectural, Civil and

Construction Sciences, 12(3), 387-395. 16. Ragab, M., & El-Naga, I. A. (2019). MEASURES TO IMPROVE TRAFFIC OPERATIONS AT SIGNALIZED INTERSECTIONS IN

URBAN AREAS. International Journal for Traffic and Transport Engineering, 9(4). 17. Mukhtyarali, S. S., Zala, L. B., & Amin, A. A. (2017). Capacities and LOS Measures of Intersections. Kalpa Publications in Civil

Engineering, 1, 209-218. 18. Zainuddin, N. I., Shah, S. M. R., Hashim, M. Z., Roslam, M. S., & Tey, L. S. (2018, October). Comparison of operational performance

before and after improvement: Case study at Pengkalan Weld, Pulau Pinang. In AIP Conference Proceedings (Vol. 2020, No. 1, p.

020027). AIP Publishing LLC. 19. Ragab, M., & El-Naga, I. A. (2019). MEASURES TO IMPROVE TRAFFIC OPERATIONS AT SIGNALIZED INTERSECTIONS IN

URBAN AREAS. International Journal for Traffic and Transport Engineering, 9(4). 20. Nguyen, Q. V. (2017). Operational performance of roundabout intersection at Sheldon and Waterman Road. 21. Zainuddin, N. I., Shah, S. M. R., Hashim, M. Z., Roslam, M. S., & Tey, L. S. (2018, October). Comparison of operational performance

before and after improvement: Case study at Pengkalan Weld, Pulau Pinang. In AIP Conference Proceedings (Vol. 2020, No. 1, p.

020027). AIP Publishing LLC. 22. Manual, H. C. (2000). Highway capacity manual. Washington, DC, 2. 23. Muley, D., & Al-Mandhari, H. S. (2014). Performance evaluation of Al Jame‘Roundabout using SIDRA. World Academy of Science,

Engineering and Technology, International Journal of Civil, Environmental, Structural, Construction and Architectural Engineering, 8(12), 1296-1301.

24. Said, M. S. Determination of Peak Hours And Level Of Service At An Unsignalised Intersection Using aa SIDRA 2.0. 25. Kang, N., & Nakamura, H. (2016). An analysis of heavy vehicle impact on roundabout entry capacity in Japan. Transportation

research procedia, 15, 308-318. 26. Li, J., Yue, Z. Q., & Wong, S. C. (2004). Performance evaluation of signalized urban intersections under mixed traffic conditions by

gray system theory. Journal of Transportation Engineering, 130(1), 113-121. 27. Akçelik, R., & Troutbeck, R. (1991, July). Implementation of the Australian roundabout analysis method in SIDRA. In Highway

Capacity and Level of Service-Proceddings of the International Symposium on Highway Capacity (pp. 17-34). U. Brannolte). AA

Balkema, Rotterdam.

61.

Authors: Kenneth Gitonga Ntonja, Geoffrey Muchiri Muketha, Gabriel Ndungu Kamau

Paper Title: Cloud Data Privacy Preserving Model for Health Information Systems Based on Multi Factor

Authentication

Abstract: With cloud computing (CC) becoming popular in recent years, variety of institutions, organizations,

businesses and individual users are creating interest. They are adopting the technology in order to take advantage

of shared web applications, low infrastructure cost, utility and distributed computing, cluster computing as well

as reliable IT architecture. In the area of health, Cloud Health Information Systems (CHIS) play a key role not

only on the healthcare businesses but patients as well. On the patient side, CHIS aid in sharing of medical data

and health information, timely access of critical patient information and coordination of clinical services.

Patients, who continue to demand for instantaneous and quality healthcare services are now able to access the

services from experts even when they are not necessarily in the same physical location. This is being aided by

proliferation of telemedicine through hosted cloud architecture. From the business perspective, CC has helped to

cut down operational expenses by way of cost-effective clinical information system infrastructure through the

implementation of a distributed platform. The platform has therefore saved businesses millions of dollars that

would have gone to infrastructural and human resource investment. Even with these immense opportunities,

cloud computing uptake has been serious inhibited by the privacy and security concerns. Due to the sensitivity of

personal health information, businesses and individuals are apprehensive when it comes to adopting the

technology or releasing the data to the cloud. This study is a results discussion of an enhanced model for

attainment of data privacy on the cloud through use of multi factor authentication.

Keywords: Cloud Computing, Health Management Systems, Multi-factor Authentication, One Time

Password.

References:

1. Bajwa, M. S., Himani, & Sandeep, S. K. H. (2015). An Enhanced Data OwnerCentric Model for Ensuring Data Security in Cloud. 2015

Second InternationalConference on Advances in Computing and Communication Engineering 2. Avizienis, J. Laprie, B. Randell, and C. Landwehr, ―Basic concepts and taxonomy of dependable and secure computing,‖ IEEE

Transactions on Dependable and Secure Computing, vol. 1,no. 1, pp. 11–33, 2004.

3. Hyokyung Chang and Euiin Choi, ―User Authentication in Cloud Computing‖, Springer-Verlag Berlin Heidelberg 2011, UCMA 2011, Part II, CCIS 151, pp. 338–342.

4. Baliga, P. Kamat, and L. Iftode, ―Lurking in the Shadows: Identifying Systemic Threats to Kernel Data (Short Paper),‖ in 2007 IEEE

Symposium on Security and Privacy, May 2007. 5. Jiangshan Yu, Guilin Wang, Yi Mu, and Wei Gao, "An Efficient Generic Framework for Three-Factor Authentication with Provably

Secure Instantiation", IEEE, 2013

6. Behl, ―Emerging security challenges in cloud computing: an insight to cloud security challenges and their mitigation,‖ in Proceedings of the World Congress on Information and Communication Technologies (WICT ‘11), pp. 217–222, IEEE, December 2011.

7. Pandey, R. M. Tugnayat, and A. K. Tiwari, ―Data Security Framework for Cloud Computing Networks,‖ International Journal of

Computer Engineering & Technology, vol. 4, no. 1, pp. 178–181, 2013. 8. A.Ibrahim, B.Mahmood and M.Singhal, A secure framework for sharing electronic health records over clouds, in Proc. of IEEE

International Conference on Serious Games and Applications for Health (SeGAH), pp. 1-8, 2016.

9. Amir, M. T., Rodziah, T., Rusli, A. & Masrah, A. A. M. (2012). Security Frameworkof Cloud Data Storage Based on Multi Agent System Architecture – A Pilot Study.

10. Shirly Lee, Tae Yong Kim and Hoon-Jae Lee, "Mutual Authentication Scheme for Cloud Computing", Future Information

Communication Technology and Applications, Springer, chapter 17, 2013, pp 149-157. 11. PrachiSoni and MonaliSahoo, "Multi-factor Authentication Security Framework in Cloud Computing", International Journal of

Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 1, ISSN: 2277 128X, January 2015

360-367

Page 47: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

12. Arockiam L. and Monikandan S., Data security and privacy in cloud storage using hybrid symmetric encryption algorithm. International

Journal of Advanced Research in Computer and Communication Engineering, 2(8), pp.3064-3070, 2013. 13. Bartock, M. et al. (2015). Trusted Geolocation in the Cloud: Proof of ConceptImplementation.National Institute of Standards and

Technology.Beal, V. (2015).Data. http://www.webopedia.com/TERM/D/data.html. Accessed 20.09.2018.

14. E. Keller, J. Szefer, J. Rexford, and R. B. Lee, ―NoHype: virtualized cloud infrastructure without the virtualization,‖ in Proc. 37th annual

international symposium on Computer architecture, New York, NY, USA, 2010, pp. 350-361.

15. F. Monrose, P. Wycko, and A. D. Rubin, ―Distributed execution with remote audit,‖ In NDSS, 1999.

16. Keramidas, A. Antonopoulos, D. N. Serpanos, and S. Kaxiras, ―Non deterministic caches: A simple and effective defense against side channel attacks,‖ Design Automation for Embedded Systems, 12(3):221-230, 2008.

17. G. Kumaresan, N. Veeraragavan, Dr. L. Arockiam, "A Study of User Authentication Techniques in Cloud Computing", Journal of

Emerging Technologies and Innovative Research (JETIR) (ISSN-2349-5162), Volume 2, Issue 8, August 2015, pp. 3309-3314. 18. HyosikAhn, Hyokyung Chang, Changbok Jang, and Euiin Choi, ―User Authentication Platform Using Provisioning in Cloud Computing

Environment‖, Springer-Verlag Berlin Heidelberg 2011, ACN 2011, CCIS 199, pp. 132–138.

19. Kong, O. Aciicmez, J.-P. Seifert, and H. Zhou, ―Deconstructing new cache designs for thwarting software cache-based side channel attacks, In 2nd ACM Workshop on Computer Security Architectures, pages 25-34, October 2008.

20. Szefer, E. Keller, R. B. Lee, and J. Rexford, ―Eliminating the hypervisor attack surface for a more secure cloud,‖ in Proc. 18th ACM

conference on Computer and communications security, New York, NY, USA, 2011, pp. 401-412.. 21. Benson, R. Dowsley, and H. Shacham, ―Do you know where your cloud files are?,‖ in Proc. 3rd ACM workshop on Cloud computing

security workshop, New York, NY, USA, 2011, pp. 73-82.

22. Suzaki, K. Iijima, T. Yagi, and C. Artho, ―Memory deduplication as a threat to the guest OS,‖ in Proc. Fourth European Workshop on System Security, New York, NY, USA, 2011, p. 1:1-1:6.

23. Blanton, Y. Zhang, and K. B. Frikken, ―Secure and Verifiable Outsourcing of Large-Scale Biometric Computations,‖ in Privacy,

Security, Risk and Trust (PASSAT), IEEE Third International Conference on Social Computing (SocialCom), 2011, pp. 1185-1191. 24. J. Atallah and K. B. Frikken, ―Securely outsourcing linear algebra computations,‖ In ASIACCS, 2010.

25. M. Y. A. Younis and K. Kifayat, ―Secure cloud computing for critical infrastructure: a survey,‖ Tech. Rep., Liverpool John Moores

University, Liverpool, UK, 2013. 26. Michael E.Whitman In defense of the realm: Understanding the threats to information security International Journal of Information

Management, 24, 2004, pp.43-57.

27. Nan Chen and Rui Jiang, "Security Analysis and Improvement of User Authentication Framework for Cloud Computing", Journal of Networks, Vol. 9, No. 1, January 2014, Pp 198-203.

28. Rohitash Kumar Banyal, Pragya Jain and Vijendra Kumar Jain, "Multi-factor Authentication Framework for Cloud Computing", IEEE

Computer Society, Fifth International Conference on Computational Intelligence, Modelling and Simulation, pp 105-110.

62.

Authors: Abdulrazag Y. Zekri, Li Yang, Gamal Alusta, Mamdouh Ghannam

Paper Title: Sequential Injection of Carbonated Water: A Possible Process for Coupling CO2 Enhanced Oil

Recovery and Storage

Abstract: Low salinity and carbonated water flooding have been investigated as possible techniques of

improved/enhanced oil recovery. Carbonated water injection consists of dissolving carbon dioxide CO2 in water

prior to injection and could be considered as a way to store greenhouse gas safely. Low salinity water flooding is

a process of diluting high salinity injection water to a very low level of salinity. In this project, the effect of

combining the two techniques in a sequential flooding was studied. The primary aim of this study is to optimize

the oil recovery and evaluate CO2 storage during this process, employing low permeability carbonate cores and

different sequential carbonated and non-carbonated brines flooding. Formation brine, seawater, low salinity

carbonated and non-carbonated were used in this work. Core samples grouped as composite cores with similar

over all reservoir permeability. Different sequences of brines were employed to determine the optimum system.

The experiment's result showed that carbonated water performs better than the noncarbonated brines. A new

technique for estimate CO2 retention based on the displacement efficiency of the carbonated water flooding

system is presented. The interfacial tension, contact angle measurements results indicated that wettability is the

dominant mechanism of the studied systems. A sequential composite core flooding consists of carbonated low

salinity followed by low salinity and seawater injection (CLSW- LSW-SW) is the optimum flooding system

among the studied systems. Technically, CLSW flooding displayed an excellent incremental displacement

efficiency ∆DE of 21.4% and CSW exhibited the best CO2 retention per incremental ∆Np.

Keywords: CO2 storage, Sequential Flooding, Carbonated Water, CO2-EOR, Low Salinity, Low Permeability.

References:

1. Ahmed, T., 2018. Reservoir Engineering Handbook. Gulf Professional Publishing, 5th Edition, 1282-1283.

2. Alizadeh A, Ioannidis M and Piri M (eds), 2011. CO2-saturated brine flooding: An effective process for mobilization and recovery of water flood residual oil. Proceeding of International Symposium of the Society of Core Analysts, Austin, TX, USA, 19–21.

3. Bisweswar, G., Al‑Hamairi, A., Jin, S., 2019. Carbonated water injection: an efficient EOR approach. A review of fundamentals and

prospects. Journal of Petroleum Exploration and Production Technology (2020) 10:673–685. https://doi.org/10.1007/s13202-019-0738-2.

4. Burton, M., Bryant, SL, (2009). Eliminating buoyant migration of sequestered CO2 through surface dissolution: implementation costs

and technical challenges. SPE Reservoir Eval. Eng. 12(03):399–407. 5. Chang, Y.B., Coats, B.K., Nolen, J.S., 1998. A compositional model for CO2 floods including CO2 solubility in water. SPE Reservoir

Evaluation. Eng. 1 (2) (1998) 155–160.

6. Chung, F. H., Jones, R.A., Nguyen, H.T., 1988. Measurements and correlations of the physical properties of properties of CO2/heavy

crude oil mixtures. SPE Reservoir Eng. 3 (3) (1988) 822–828.

7. Dong, Y., Dindoruk, B., Ishizawa, C., and Lewis, E.J., 2011. An experimental investigation of carbonated water flooding. SPE Annual

Technical Conference and Exhibition; 2011: Society of Petroleum Engineers. Denver, Colorado, USA, 30 October–2 November (2011). https://doi.org/10.2118/145380-MS.

8. Enick, R.M., Klara, S.M., 1990. CO2 solubility in water and brine under reservoir conditions. Chem. Eng. Commun. 90(1):23–33.

9. Herzog, H., 2000. The economics of CO2 separation and capture. Open source. 10. Kechut, N. I., Sohrabi, M., Jamiolahmady, M., 2011. Experimental and numerical evaluation of carbonated water injection (CWI) for

improved oil recovery and CO2 storage. SPE-143005. 10. 11. McGlade, C., 2019). Can CO2-EOR really provide carbon-negative oil? https://www.iea.org/commentaries/can-CO2-eor-really-

provide-carbon-negative-oil

12. Metz, B., 2007. Special report on carbon dioxide capture and storage https://www.ipcc.ch/pub/repor%20ts.htm 13. Mohammadkhania, S., Shahverdia, H., Nielsenb, S., Esfahanya, M., Shapiroc, A., 2019. Bicarbonate flooding of homogeneous and

368-376

Page 48: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

heterogeneous cores from a carbonaceous petroleum reservoir, Journal of Petroleum Science and Engineering, 178, 251-26.

14. Riazi, M., 2011. Pore Scale Mechanisms of Carbonated Water Injection in Oil Reservoirs. Heriot-Watt University, Edinburgh, Scotland. http://hdl.handle.net/10399/2454.

15. Mosavat, N., and Torabi, F., 2016. Micro-optical analysis of carbonated water injection in irregular and heterogeneous pore geometry.

Fuel 175:191–201.

16. Ruidiaz, E. M., Winter, A., Trevisan, O. V., 2018. Oil recovery and wettability alteration in carbonates due to carbonate water

injection. Journal of Petroleum Exploration and Production Technology volume 8, 249–258B.

17. Shu, G., Dong, M., Chen, S., Hassanzadeh, H., 2016. Mass transfer of CO2 in a carbonated water–oil system at high pressures. Indus Eng Chem Res 56(1):404–416.

18. Seyyedi, M., Mahzari, P., Sohrabi, M., 2017. An integrated study of the dominant Mechanism leading to improved oil recovery by

carbonated water injection. J Indus Eng. Chem. 45:22–32. 19. Sohrabi, M., Riazi, M., Jamiolahmady, M., Ireland, S., Brown, C., 2008. Carbonated water injection for oil recovery and CO2 storage.

Symposium of the Sustainable energy UK conference: Meeting the Science and Engineering challenge, Oxford, UK.

20. Sohrabi, M., Emadi, A., Farzaneh, S.A., Ireland, S., 2015. A thorough investigation of mechanisms of enhanced oil recovery by carbonated water injection. Proceedings of the SPE Annual Technical Conference and Exhibition; Houston, Texas, USA, 28–30.

21. Soleimania, P., Shadizadehb, S., Kharratc, R., 2020. Experimental assessment of hybrid smart carbonated water flooding for carbonate

reservoirs, Petroleum, in press https://doi.org/10.1016/j.petlm.2020.03.006 22. Steffens, A., 2010. Modeling and laboratory study of carbonated water flooding. Delft University of Technology, Delft.

http://resolver.tudelft.nl/uuid:ff0d9ac4-b77d-4546-b18a-194e69919475

23. Welker, J.R., Dunlop, D.D., 1963. Physical properties of carbonated oils, J. Petrol. Technol. 15 (1963) 873–876 08. 24. Zekri, A., Al-Attar, H., Al-Farisi, O., Almehaideb , R., Lwisa, E., 2015. Experimental investigation of the effect of injection water

salinity on the displacement efficiency of miscible carbon dioxide WAG flooding in a selected carbonate reservoir. Journal of

Petroleum Exploration and Production Technology, 2015, DOI 10.1007/s13202-015-0155-0.

63.

Authors: G Ajay Bhaskar Naidu, Y Avinash Reddy, CH Naveen Chowdary

Paper Title: Design of 5g Mimo Antenna with Enhanced Isolation

Abstract: In this paper, MIMO 2-port, 2-element antenna for 5G applications is presented. This is monopole

antenna structure consists of two-rectangular patch of same shapes. Each antenna has a feeding plate connect at

the centre of the patch antenna for enhancing isolation the etching of rectangular slots on the ground plane in

between the two patches along with thick and sheet of the substrate just below at the centre of the patch.

Maximum isolation achieved among the ports is less than -30db. envelope correlation coefficient is below 0.10

in bands of interest. The minimum frequency range covered by the four ports of this antenna is from around 3.0

to 4.0 GHz, thus covering expected future 5G band (3300–3700 MHz).

Keywords: Maximum isolation achieved among the ports is less than -30db.

References:

1. J.G. Andrews, S. Buzzi, W. Choi, S.V. Hanley, A. Lozano, A.C.K. Soong, and J.C. Zhang, ‗‗Whatwill5Gbe?‘‘IEEEJ.Sel. Areas

Common., vol.32, no. 6, pp. 1065–1082, Jun. 2014.

2. G. J. Foschini and M. J. Gans, ‗‗On limits of wireless communications in a fading environment when using multiple antennas,‘‘ Wireless Pers. Commun., vol. 6, no. 3, pp. 311–335, Mar. 1998.

3. P.-S. Kildal and K. Rosengren, ‗‗Correlation and capacity of MIMO systems and mutual coupling, radiation efficiency, and diversity

gain of their antennas: Simulations and measurements in a reverberation chamber,‘‘ IEEE Commun. Mag., vol. 42, no. 12, pp. 104–112, Dec. 2004.

4. R. G. Vaughan and J. B. Andersen, ‗‗Antenna diversity in mobile communications,‘‘ IEEE Trans. Veh. Technol., vol. VT-36, no. 4, pp.

147–172, Nov. 1987. 5. Mattheijssen, M.H.A.J. Herben, G. Dolmans, and L.Leyten, ‗‗Antennapatterndiversityversusspacediversityforuseathandhelds,‘‘IEEE

Trans. Veh. Technol., vol. 53, no. 4, pp. 1035–1042, Jul. 2004.

6. S. D. Targonski, R. B. Waterhouse, and D. M. Pozar. v "Wideband aperture coupled stacked patch antenna using thick substrates," Electronics Letters, vol. 32, no. 21, pp. 1941–1942, 1996.

7. J. A. Ansari and R. B. Ram, "Broadband stacked U-slot micro strip patch antenna," Progress in Electromagnetics Research Letters, vol.

4, pp. 17–24, 2008.

8. D. Uzer, S. S. Gultekin, and O. Dundar, "Estimation and design of U-slot physical patch parameters with artificial neural networks," in

Proceedings of Progress in Electro-Magnetic Research Symposium, Kuala Lumpur, Malaysia, 2012, pp. 27– 30. 9. Michael D. Foegelle ―MIMO device performance measurements in a wireless environment simulator‖ IEEE Electromagnetic

Compatibility Magazine (Volume: 1, 123 - 130, Fourth Quarter 2012).

10. S. Zhang, Z. Ying, J. Xiong, and S. He, ―Ultrawideband MIMO/Diversity Antennas With a Tree-Like Structure to Enhance WidebandIsolation‖, IEEE Antennas Wireless Propag Lett 8 (2009),1279–1282.

11. A. Diallo, C. Luxey, P. L. Thuc, R. Staraj, and G. Kossiavas, ‗‗Study and reduction of the mutual coupling between two mobile phone

PIFAs operating in the DCS 1800 and UMTS bands,‘‘ IEEE Trans. Antennas Propag., vol. 54, no. 11, pp. 3063–3074, Nov. 2006. 12. H. Li, J. Xiong, and S. L. He, ‗‗Extremely compact dual-band PIFAs for MIMO application,‘‘ Electron. Lett., vol. 45, no. 17, pp. 869–

870, Aug. 2009.

13. M. K. Meshram, R. K. Animeh, A. T. Pimpale, and N. K. Nikolova, ‗‗A novel quad-band diversity antenna for LTE and Wi-Fi applications with high isolation,‘‘ IEEE Trans. Antennas Propag., vol. 60, no. 9, pp. 4360–4371, Sep. 2012.

14. A. Ramachandran, S. V. Pushpakaran, M. Pezholil, and V. Kesavath, ‗‗A four-port MIMO antenna using concentric square-ring

patches loaded with CSRR for high isolation,‘‘ IEEE Antennas Wireless Propag. Lett., vol. 15, pp. 1196–1199, 2016. 15. C.-Y. Chiu and R. D. Murch, ‗‗Compact four-port antenna suitable for portable MIMO devices,‘‘ IEEE Antennas Wireless Propag.

Lett., vol. 7, pp. 142–144, 2008.

16. Arun, H., A. K. Sarma, M. Kanagasabai, S. Velan, C. Raviteja, and M. Alsath, ―Deployment of modified serpentine structure for

mutual coupling reduction in MIMO antennas,‖ IEEE Antennas Wireless Propag. Lett., Vol. 13, 277–280, 2014.

17. Tang, T. C. and K. H. Lin, ―An ultrawideband MIMO antenna with dua lband-notched function,‖ IEEE Antennas Wireless Propag.

Lett., Vol. 13, 1076–1079, 2014 18. T. Taga, ‗‗Analysis for mean effective gain of mobile antennas in land mobile radio environments,‘‘ IEEE Trans. Veh. Technol., vol.

39, no. 2, pp. 117–131, May 1990.

19. J. Yang, S. Pivnenko, T. Laitinen, J. Carlsson, and X. Chen, ‗‗Measurements of diversity gain and radiation efficiency of the Eleven antenna by using different measurement techniques,‘‘inProc. 4thEur.Conf. Antennas Propag., Apr. 2010, pp. 1–5.

377-380

64. Authors: Deepti Varshney, Mamta Bansal, Birendra Kumar Sharma

Page 49: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

Paper Title: Robust Watermarking Technique for Sharing Family Photos on Social Media using Aadhar Number

and DCT

Abstract: The mind setup of persons has been changed in today‘s environment due to the easily available of

internet and smart phone on very low-price cost. Smart phone and internet are two main resources which are

being used by persons most of the time in his/her daily routine specially in lockdown due to COVID-19. In this

lockdown, persons are doing some creative activity, making fun, etc and recording all his/her this personal

information in the form of multimedia contents like text, images, audio and video. This created multimedia

content is shared by persons frequently on globe through internet in the daily routine life and some other

persons are watching this daily routine activity and making huge business with these data by sometimes with

original content or sometimes with modified content without concerns/information/permission of the originator.

In this process if everything is going in right way then no issues but if something going wrong then require legal

issues and for this, we need to protect our data legally through some methodology. So this paper proposed secure

watermarking technique for protecting multimedia content like images using Aadhar number and Discrete

Cosine Transform (DCT) technique. In this proposed methodology individual can share the information‘s with

watermarked information which is hidden in shared images and on demand at the time of legal issue originator

will show the actuality and its ownership. This paper explained details concepts of the embedding and reverse of

embedding ( i.e. extracting) process for authentication of the images and its protection from the misuse or fraud.

The experimental result of the proposed methodology is shown on different family photos shared on globe and

found robust results.

Keywords: Discrete Cosine Transform (DCT), Document Based (DB), Working Domain Based (WDB),

Human Perception Based (HPB) and Application Based (AB), Discrete Wavelet Transform (DWT), Intellectual

Property Right (IPR), Similarity Ratio (SR)

References:

1. Himanshu Rastogi and B. K. Sharma, ―A Study on Intellectual Property Right and Digital Watermarking‖, International Journal of

Advanced Research in Computer Science, Volume 8, No. 7, July – August 2017, ISSN ISSN No. 0976-5697 2. Nishith Desai Associates, Intellectual Property Law in India, July (2015)

3. http://eprints.uthm.edu.my/6936/1/MOHAMED_ABDISALAN_SAID.pdf

4. http://eprints.rclis.org/28939/1/Intellectual%20Property%20Rights%20in%20Digital%20Environment_ISI.pdf 5. Arathi Chitla, M. Chandra Mohan, ―Authentication of Images through Lossless Watermarking (LWM) Technique with the aid of

Elliptic Curve Cryptography‖, International Journal of Computer Applications (0975 – 8887) Volume 57– No.6, November 2012

6. Peyman Rahmati, and Andy Adler, and Thomas Tran. ―Watermarking in E-commerce‖, International Journal of Advanced Computer

Science and Applications,Vol. 4, No. 6, 2013

7. Rania A. Ghazy, Alaa M. Abbas ―Block-based SVD image watermarking in spatial and transform domains‖ , International Journal of Electronics, 2015 Vol. 102, No. 7, 1091–1113

8. Malli B, Lagishetty Mounica, Nandhitha.N.M ,Balamurugan.V, ―Development of efficient Quality Preserving Invisible Watermarking

Technique to embed both Images and Data in an Image‖ IEEE Online International Conference on Green Engineering and Technologies (IC-GET), 2016,

9. https://www.wipo.int/edocs/pubdocs/en/intproperty/450/wipo_pub_450.pdf

10. https://gss.bsa.org/wp-content/uploads/2018/05/2018_BSA_GSS_Report_en.pdf 11. Lalit Kumar Saini & Vishal Shrivastava, ―A Survey of Digital Watermarking Techniques and its Applications‖, International Journal

of Computer Science Trends and Technology (IJCST), Volume 2 Issue 3, PP- 70-73, May-Jun 2014.

12. Prabhishek Singh, R S Chadha ,―A Survey of Digital Watermarking Techniques, Applications and Attacks‖,International Journal of Engineering and Innovative Technology (IJEIT), Volume 2, Issue 9, March 2013

13. Monika Patel,Priti Srinivas Sajja and Ravi K. Sheth, ―Analysis and Survey of Digital Watermarking Techniques‖, International Journal

of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 10, PP 203-210, October 2013 14. M.Hariharalakshmi, Dr. M.Sivajothi, Dr.M.Mohamed SathikInternational ―Survey of Digital Watermarking techniques for Data

security‖ Journal of Innovative Research in Computer and Communication Engineering, Vol. 5, Issue 3, March 2017

15. B.K.Sharma ―Watermarking for copyright protection of software codes‖ A Ph.D. Thesis, 2012

16. Sunil Kumar Vishwakarma, B. K. Sharma, Syed Qamar Abbas, ―Digital Watermarking for Image authentication using Spatial-Scale

Domain based Techniques‖ IJRTE, ISSN: 2277-3878, Volume-8 Issue-4, November 2019

17. Himanshu Rastogi and Birendra Kumar Sharma, ―Methodology implementation for IPR protection of Mobile Application Code using Digital Watermarking‖, International Journal of Scientific & Technology Research (IJSTR), Volume.-8, Issue- 10, October, 2019, ,

ISSN ISSN No. 2277-8616

18. Himanshu Rastogi and Birendra Kumar Sharma, ―Implementation of Digital Watermarking Technique to secure IPR of Web Application code‖, International Journal of Innovative Technology and Exploring Engineering (IJITEE),Volume.-8, Issue-11,

September 2019 , ISSN ISSN No. 2278- 3075

19. Deepti Varshney, Mamta Bansal, Birendra Kumar Sharma ―Watermarking for Images using Alphanumeric Technique‖, International Journal of Recent Technology and Engineering (IJRTE), Volume.-8, Issue-6, March 2020, ISSN ISSN No. 2277-3878

20. www.csitweb.com

381-387

65.

Authors: Kittimeth Wattananaphakasem, Ubolrat Wangrakdiskul, Jakawat Deeying

Paper Title: The Effect of Laser Energy and Nitrogen Flow in Solder Joints Properties of Head Gimbal Assembly

Abstract: The objective of this research is to study the effect of laser energy and Nitrogen flow on the solder

joints of the Head Gimbal Assembly (HGA). The soldering of the HGA components isn't the same as general

semiconductors. Since the soldering figure perpendicular to each other so that, it was used the laser solder jet

bonding system. The solder jet bonding system uses a solder ball consisting of Sn-2.0Ag-0.7Cu (SAC207) is

used for connection of the HGA pad made from a Cu trace coated with Au. The growth of intermetallic

compounds (IMCs) and shear strength will be analyzed to investigate the effects of laser energy and Nitrogen

flow on solder joint reliability. In this research, laser energy levels since 2, 2.5, 3, 3.5, 4, and 4.5 mJ and keep the

Nitrogen flow value at 90 mbar. As for the Nitrogen flow effect analysis, the Nitrogen flow level was used at 80,

100, 120, and 140 mbar and keep the laser energy value 3.5 mJ. The results of the study show that the increased

levels of laser energy can inhibit the growth of intermetallic compounds as well as the AuSn4 phase that can

388-394

Page 50: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

present benefit to solder joints with results showing within the shear strength to increase significantly. The

increase in Nitrogen flow levels has the same effect as the increase in laser energy levels, which can decreases

the growth of intermetallic compounds and AuSn4 phase also including increased shear strength. The difference

between laser energy and Nitrogen flow increasing shows the level of laser energy can clearly distinct the effect

on each level. But the increase in Nitrogen flow level is statistically insignificant from each level.

Keywords: Intermetallic compound, Laser solder jet bonding, SAC solder, solder joints

References:

1. Wood, E. P., and K. L. Nimmo, ―In search of new lead-free electronic solders,‖ Journal of Electronic Materials, vol. 23.8, pp. 709-713, 1994.

2. Hu, Yu-hua, et al, ―Reliability studies of Sn–9Zn/Cu and Sn–9Zn–0.06 Nd/Cu joints with aging treatment,‖ Materials & Design, vol. 34, pp. 768-775, 2012.

3. Jiang, Hongjin, Kyoung-sik Moon, and C. P. Wong, ―Recent advances of nanolead-free solder material for low processing temperature

interconnect applications,‖ Microelectronics Reliability, vol. 53.12, pp. 1968-1978, 2013. 4. Canyook, Rungsinee, and Kittichai Fakpan, ―Effect of Cu and Ni Addition on Microstructure and Wettability of Sn-Zn Solders,‖ Key

Engineering Materials, vol. 728, pp. 9-14, 2017.

5. Sona, Mrunali, and K. Narayan Prabhu, ―Wetting kinetics and joint strength of Sn-0.3 Ag-0.7 Cu lead-free solder alloy on copper substrate as a function of reflow time,‖ Materials Science Forum, vol. 830, pp. 286-289, 2015.

6. Liu, Xiaoying, et al, ―The adsorption of Ag3Sn nano-particles on Cu–Sn intermetallic compounds of Sn–3Ag–0.5 Cu/Cu during

soldering,‖ Journal of alloys and compounds, vol. 492.1-2, pp. 433-438, 2010. 7. Li, Xiao Yan, et al, ―Isothermal aging effects on the microstructure, IMC and strength of SnAgCu/Cu solder joint,‖ Key Engineering

Materials, vol. 353, pp. 2928-2931, 2007.

8. Mayappan, Ramani, and Zainal Arifin Ahmad, ―Effect of Bi addition on the activation energy for the growth of Cu5Zn8 intermetallic in the Sn–Zn lead-free solder,‖ Intermetallics, vol. 18.4, pp. 730-735, 2010.

9. Luo, Z-B., et al, ―Revisiting mechanisms to inhibit Ag3Sn plates in Sn–Ag–Cu solders with 1 wt.% Zn addition,‖ Journal of alloys and

compounds, vol. 500.1, pp. 39-45, 2010. 10. Kamarudin, Maslinda, Abu Seman Anasyida, and Nurulakmal Mohd Sharif, ―Effect of Aluminium and Silicon to IMC Formation in

Low Ag-SAC Solder,‖ Materials Science Forum, vol. 819, pp. 63-67, 2015.

11. Yahya, Iziana, et al, ―Intermetallic evolution of Sn-3.5 Ag-1.0 Cu-0.1 Zn/Cu interface under thermal aging,‖ Advanced Materials Research, vol. 620, pp. 142-146, 2013.

12. Tsao, L. C., et al, ―Effects of nano-Al2O3 particles on microstructure and mechanical properties of Sn3. 5Ag0. 5Cu composite solder

ball grid array joints on Sn/Cu pads,‖ Materials & Design, vol. 50, pp. 774-781, 2013. 13. Hanim, Azmah, et al, ―Interfacial Reaction Analysis of Sn-Ag-Cu Solder Reinforced with 0.01 wt% CNTs with Isothermal Aging,‖

Materials Science Forum, vol. 864, pp. 175-179, 2016.

14. Chellvarajoo, Srivalli, M. Z. Abdullah, and C. Y. Khor, ―Effects of diamond nanoparticles reinforcement into lead-free Sn–3.0 Ag–0.5 Cu solder pastes on microstructure and mechanical properties after reflow soldering process,‖ Materials & Design, vol. 82, pp. 206-215,

2015.

15. Li, Hui, ―Effects of small amount addition of rare earth Y on microstructure and property of Sn3. 0Ag0. 5Cu solder,‖ Key Engineering Materials, vol. 584. Pp. 3-8, 2014.

16. Fakpan, Kittichai, and Rungsinee Canyook, ―Effects of Sb and Zn Addition on Mechanical Properties and Corrosion Resistance of Sn–

Ag–Cu Solders,‖ Key Engineering Materials, vol. 728, pp. 129-134, 2017. 17. Fu, Shen Li, et al, ―Reliability and Bondability Study on Interfacial Behavior between SnAgCu Solder and Cu-Ni-Au OSP Pads,‖ Key

Engineering Materials, vol. 573, pp. 1-7, 2014.

18. Sungkhaphaitoon, Phairote, and Thawatchai Plookphol, ―Effect of Cooling Rate on the Microstructure and Mechanical Properties of Sn-0.7 wt.% Cu Solder Alloy,‖ Key Engineering Materials, vol. 675, pp. 513-516, 2016.

19. Tian, Yanhong, et al, ―Intermetallic compounds formation at interface between PBGA solder ball and Au/Ni/Cu/BT PCB substrate after

laser reflow processes,‖ Materials Science and Engineering: B, vol. 95.3, pp. 254-262, 2002. 20. WANG, Jian-xin, et al, ―Effect of diode-laser parameters on shear force of micro-joints soldered with Sn-Ag-Cu lead-free solder on

Au/Ni/Cu pad,‖ Transactions of nonferrous metals society of China, vol. 16.6, pp. 1374-1379, 2006.

21. Park, Yong-Sung, et al, ―Effects of fine size lead-free solder ball on the interfacial reactions and joint reliability,‖ 2010 Proceedings 60th Electronic Components and Technology Conference (ECTC). IEEE, Las Vegas, NV, USA, June 1-4, 2010, pp. 1436-1441.

22. Pan, Jianbiao, et al, ―Effect of gold content on the reliability of SnAgCu solder joints,‖ IEEE Transactions on Components, Packaging

and Manufacturing Technology, vol. 1.10, pp. 1662-1669 2011.

23. Ji, Hongjun, Jiao Wang, and Mingyu Li, ―Microstructure and reliability of hybrid interconnects by Au stud bump with Sn-0.7 Cu solder

for flip chip power device packaging.‖ Microelectronics Reliability, vol. 66, pp. 134-142, 2016.

24. Huang, M. L., Yuemei Liu, and J. X. Gao, ―Interfacial reaction between Au and Sn films electroplated for LED bumps,‖ Journal of Materials Science: Materials in Electronics, vol. 22.2, 2011.

66.

Authors: Pollypriya Buragohain

Paper Title: Use of Information and Communication Technology and Product Promotion

Abstract: E-agriculture, i.e., Information and communication technology (ICT) in agriculture enriches the

agriculture and brings rural development. Due to this upbringing of information and communication technology,

agricultural production has increased and also enhancing the market which indicates a complete change of

makeover. Indian farming is revolutionized and all farmers including small landholders are benefited through the

use of ICT in agriculture. ICT helps a lot to increase the demand for new perspectives in agricultural field. The

present study was basically conducted in Jorhat district of Assam during the time of 2018 and data was collected

from 40 farmers through a well structured questionnaire. The main mathematical or statistical tools that have

been used in this study are percentages, Likert Scale and measurement of central tendency. The present study

tries to analyse the socio-economic characteristics of the farmers which consider or use the information and

communication technology in agriculture. This study also focuses on the farmer‘s attitude towards using ICT in

agriculture and also the frequency of using ICT in agriculture. In this study, it is obtained that there are highest

37.50 percent of farmers are small farmers with a land holding of 1-2 ha and highest 40 percent of farmers have

16 to 20 years of farming experience. From the analysis, it is also noticed that majority(4.68) of farmers strongly

agree with the statement that ICT helps in community based planning by providing timely information regarding

agricultural field which is followed by the concept of ICTs helpful for reducing the distance in Digital Divide or

Technological gap(4.63). With some statements the farmers are strongly disagree or disagree such as ICT helps

395-398

Page 51: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

to exchange the opinion, knowledge, experience and also the assets(2.94) and by improving rural livelihoods

ICT fill up the social segregation gap(2.15). Again it is observed that to gaining knowledge and information all

40 farmers are using mobile phones as ICT very frequently.

Keywords: ICT, Agriculture, Development, Digital Divide, Farmer.

References:

1. Kafura, A. R. (2016), Use of ICT as Extension Tool by The Farmers of Gazipur District in Bangladesh, M.S. Thesis, Department of

Agricultural Extension and Rural Development, Bangabandhu Sheikh Mujibur Rahman Agricultural University, Gazipur-1706, Bangladesh.

2. Lokeswari K. (2016), A Study of the use of ICT among rural farmers, International Journal of Communication Research, Vol. 6(3):

232-238. 3. Mittal, S.(2012), Modern ICT for Agricultural Development and Risk Management in Small holder Agriculture in India, Socio-

Economic Working paper 3. 4. Raghuprasad K.P., Devaraja S.C. and Gopala Y.M. (2013), An analysis of knowledge level of farmers on utilization of ICT tools for

farm communication, Journal of rural development Nird, Hyderabad, Vol. 32, no. (3) pp. 301-310.

5. Syiem R., Saravann R. (2015), Access and Usage of ICTs for Agriculture and Rural Development by the tribal farmers in Meghalaya State of North-East India. Journal of Agricultural Informatics. Vol. 6(3): 24-41.

67.

Authors: P. Oliver jayaprakash, A K.Gunasekaran

Paper Title: Theoretical Framework for the Freight Movements Through a Multicommodity Port

Abstract: Port based freight movement planning is a complicated task that could be carried out efficiently to

handle the cargo, optimally utilize the infrastructure and plan the future infrastructure requirements. The nature

of activities at the port is dynamic with uncertainties,since the operationsare time bound, scholastic and

probabilistic.As the huge capital is involved in port infrastructure, the inter-relationship between port activities

need to be understood and a system model enveloping the relationship among the variables is much needed for

optimal utilization of existing facilities and to predict the future infrastructure requirements. The conventional

four step model approach for modeling the person trips would not effectively reflect the commercial scheduling

constraintsand requirements of freight trips. This research workattemptsto model the port operations, to assess

the level of service of roads and gate operations as subsystems to understand the interdependencies between the

variables and the impact on the port operations as a whole.

Keywords: System, Modeling, Multicommodity port, dynamic commodity flow, Turnaround time, Vessel

arrival.

References:

1. Kek, C.C. ―Port performance indicators:transportation, water and urban development department‖, World Bank, Transport Report No.

PS-6, 1993.

2. Wadhwa, L. C. ―Capacity and performance of bulk handling ports‖, Proceeding of Australian transportation research forum. Vol. 15, Part I, 1990.

3. Wadhwa, L.C., Whelan, G. A., Morel, D.L. and Schneider, M. ―Establishing relationships between port capacity, throughput and

performance by simulation studies‖, International congress on modelling and simulation proceedings, IMACS, 1997. 4. Peter Marlow, B. and Ana Paixão, C.―Measuring lean ports performance‖, International journal of transport management, Vol. 1, No.

4, pp. 189-202, 2003.

5. Jose Tongzon, L. ―Determinants of port performance and efficiency‖, Transportation Research Part A: Policy and Practice, Vol. 29, No. 3, pp. 245-252, 1995.

6. Ng Siew,M. and Muhammad, Z.―Petroleum Terminal‘s operation processes on vessel turnaround time‖, Proceedings of EASTS-

International Symposium on Sustainable Transportation incorporating Malaysian Universities, Transport Research Forum Conference, 2008.

7. Asperen Van, E., Borgman, B., and Dekker, R. ―Evaluating container stacking rules using simulation‖, International journal of

Hugan& E. Yücesan (Eds.),proceedings of the 2010 Winter Simulation Conference Proceedings of the Winter Simulation Conference, Baltimore.pp. 1924-1933, 2010

8. Daniela, A., and Elena, T. ―A discrete event simulation model for the analysis of critical factors in the expansion plan of a marine

container terminal‖, Proceedings 23rd European conference on Modelling and Simulation, 2009 . 9. Borgman, B., Asperen Van, E., and Dekker, R. ―Evaluating container stacking rules using simulation‖, International journal of

Hugan& E. Yücesan (Eds.),proceedings of the 2010 Winter Simulation Conference Proceedings of the Winter Simulation

Conference, Baltimore.pp. 1924-1933, 2010. 10. Petering, M. E. H."Decision support for yard capacity, fleet composition, truck substitutability, and scalability issues at seaport

container terminals via discrete event simulation, "Transportation Research E, 47, pp.85-103,2011.

11. Su Min, J., Kap Hwan, K., Herbert, K.―Routing automated guided vehicles in container terminals through the Q-learning technique‖, Journal of Logistics Research , Vol. 3, No. 1, pp. 19-27, 2011.

12. YounJu, W., Kap Hwan, K.― Estimating the space requirement for outbound container inventories in port container terminals‖,

International Journal of Production Economics, Vol. 133, No. 1, pp. 293-301, 2011. 13. Byung Kwon, L. and Kap Hwan, K. ―Comparison and evaluation of various cycle-time models for yard cranes in container terminals‖,

International Journal of Production Economics, Vol. 126, No. 2, pp. 350-360, 2010.

14. Dhingra, S.L., Mujumdar, P. and Gajjar R. ―Time Series Modelling of Urban Attracted Truck Movements‖, Journal of Advanced

Transportation, Vol.27-3 (Special issue), Winter, 1993.

15. Haitham Al-Deek, M. ―Which method is better for developing freight planning models at seaports-neural networks or multiple

regressions?‖, TRR,TRB, Washington, D.C., pp. 90-97, 2007. 16. Nathan, H., Michael, W. and Jeff, D.―Finding the number of yard cranes needed to achieve desired truck turn time at marine container

terminals‖, TRR,TRB,Washington,D.C. pp.98-108, 2007.

17. Rodrigo G. and Felipe A.―Modeling the internal transport system in a container port‖, TRR,TRB,No.1782,Washington, D.C., pp. 84-91, 2002.

18. Khalid Bichou, ―Review of port performance approaches and a supply chain framework to port performance benchmarking‖, Research

in Transportation Economics, Vol. 17, No. 6, pp. 567-598, 2006. 19. Wisinee, W. ―Commodity Distribution Model Incorporating Spatial Interactions for Urban Freight Movement‖, 85th Annual Meeting

of the TRB, Washington D.C., 2006.

399-410

Page 52: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

20. Amelia Regan, C., and Rodrigo Corido, A. ―Modelling freight demand and shippers behaviours State of the art future directions‖, ITE,

USA, Pergamon press, 2002. 21. Daniel, P.―Forecasting growth with time series models‖, Journal of Forecasting, Vol. 14, No. 2, pp. 97-105, 1995.

22. Amaury, L., Michel, V., Eric de Bodt, Marie, C. and Philippe, G.―Forecasting time-series by kohonen classification‖, ESANN'

Proceedings, pp. 221-226, 1998.

23. Siem Jan, K. and Marius, O.―Forecasting daily time series using periodic unobserved components time series models‖, Computational

Statistics & Data Analysis, Vol. 51, No. 2, pp.885-903, 2006.

24. Vedat,Y.―The analysis of forecasting performance by using time series data for two mediterranean islands‖, Review of Social, Economic and Business Studies, Vol. 2, pp. 175-196, 2003.

25. Kalekar and Prajakta, S. ―Time series forecasting using Holt-Winters Exponential Smoothing‖, Kanwalrekhi school of information

technology, 2004. 26. Nghiep, N. and Cripps,Al. ―Predicting housing value: a comparison of multiple regression analysis and artificial neural networks‖,

Journal of Real Estate Research, Vol. 22, No. 3, pp. 313-336, 2001.

27. Ram Pandyala, M., ―Urban highway freight modeling including intermodal connectors for florida‖, BC208,Research Center. Florida Department of Transportation, Final Report DOT-T-97-10, 2002.

28. Roselina, S., Siti, M., Shamsuddin, H., Siti, Z.,Mohammed, H., and Ajith, A. ―Forecasting time series data using hybrid grey Relational

artificial neural network and Auto regressive integrated Moving average model‖, Neural Network World, Vol. 6, pp. 573-605, 2007 29. Taylor,A.J. ―System dynamics in shipping‖, Operational research quarterly, Pergamon press, Vol. 27, No. 1, pp .41-56, 1976.

30. Krishnamurthy. ―Data mining- statistics applications: a key to managerial decision making‖, Socio-economic Voices, pp. 1-11, 2010.

31. Kia, M., Shayan, E. and Ghotb, F.―Investigation of port capacity under the new approach by computer simulation‖, Journal of Computers and Industrial Engineering, Vol. 42, pp. 533-540, 2002.

32. Dimitris P., and Anne Kremidjian, S.―Ship traffic modeling methodology for ports‖, Vol. 129, Vol. 5, pp. 163-202, 2003.

33. Hanne-Lovise, S., Katherine, G., and MagnhildViste, ―Visualized system dynamics models as information and planning tools‖, Proceedings of Informing Science Conference, pp.1113-1123, 2003.

34. Dahal, K., Galloway, Stuart, Burt, Graeme, McDonald, Jim,Hopkins, and Ian, ―A port system simulation facility with an optimisation

capability‖, International Journal of Computational Intelligence and Applications, Vol. 3, No. 4. pp. 395-410, 2003. 35. Sampsa, R. ―National sea transport demand and capacity forecasting with system dynamics‖, Master‘s thesis, Systems analysis

laboratory, Helsinki University of Technology, Helsinki, 2008.

36. Carlucci, F., and Cira, A.―Modeling a plan for seaport investments‖, Pomorstvo‖, GOD, Vol. 23, pp.405-425, 2009. 37. Shabayek, A. A., and Yeung, W. W. ―A simulation model for the kwaichung container terminals in Hong Kong‖, European Journal of

Operational Research, Vol. 140, pp. 1-11, 2002.

38. Naggar, El. ―Application of queuing theory to the container terminal at Alexandria seaport‖, Journal of Soil Science and Environmental Management, Vol. 1, No. 4, pp. 77-85, 2010.

68.

Authors: Swamy H.C.M, G. Prince Arul Raj

Paper Title: Rheological Behavior of Ordinary Concrete, SCC with and without Glass and Steel Fibers

Abstract: Rheology indicates its flowability and deformation. These two parameters indicate directly

workability. It measures the normal and shearing forces in fresh concrete state. In this article the flowability and

its measurement are discussed for ordinary and SCC with Glass and steel fibers are demonstrated. The strength

parameter for a particular concrete mix is demonstrated with sampling and acceptance criteria. The new draft

code on design of concrete mix (IS-10262) verified by compliance with specifications. The different parameters

like percentage of Glass and Steel fibers, different percentages of silica fume, and different dosages of

superplasticizer are tested and reported. A comparative analysis for, with and without glass fibers on ordinary

and SCC predicted.

Keywords: Rheology of ordinary concrete, Flowability of SCC, Workability of SCC with Glass fibers,

Rheology of SCC with steel fibers, Sampling and acceptance criteria for SCC, Compliance with specification for

SCC.

References:

1. L.D‘Aloia Schwartzentruber, etl .(2006) ―Rehological behavior of fresh cement paste formulated from a SCC‖ ,Cement and concrete

research361203-1213

2. Mette R. Geiker, etl.(2002) ―The effect of measuring procedure on the apparent rheological properties of SCC , Cement and concrete research32(2002)1791-1795

3. Tomasz Ponikiewski, etl. ―The Rheological and Mechanical Properties of SCC with High Calcium Fly Ash ―,

http://www.claisse.info/Proceedings.html 4. Oladipupo.S , etl.(2015) ―Evaluation of Fresh and Hardened Properties of SCC, open journal of CE,2015,5-7

5. M. Benacha ,etl.(2013) ―Rehological Charactrization of SCC: V-Funnal and Horizontal Plexiglass Channal, IJESIT, ISSN:2319-5967

Vol2, Issu1, January 2013 6. A Vennila, etl.(2016) ―Study on Mechanical Properties of SCC with mineral admixture and Glass fibers‖ Journal of Advances in CE.

Vol 2( 1) 2016. Pp.13-20

7. A.M. Neville,etl.‖Concrete technology‖ ELBS 8. M.L.Gambhir, ―Concrete technology‖ Fourth EditionMc Graw-Hill Higher Education.

411-417

69.

Authors: Usmanova Muborak Akmalzhanovna, Burkhanhadzhaeva Khurshida Vahdatovna

Paper Title: Social Assistance and Social Services for Citizens during the Quarantine Period from a Pandemic

(On the Example of Uzbekistan and International Experience

Abstract: The article considers the state policy of social protection of the population in the Republic of

Uzbekistan. Methods of legal regulation of social security law. The system of social security law is analyzed.

The history of formation and development of social security in the Republic of Uzbekistan is studied. Attention

is paid to the rights of social security during the period of quarantine from a pandemic, and international

legislation and experience are comparatively analyzed . The article deals with themain characteristics of the legal

regulation of remote workers ' labor; theconcept and features of remote laboras a subject of labor law. The

authors analyzed therelationship of an employment contract with a remote employee with other labor contracts.

Legal acts in the field of regulating the work of remote workersin the context of a pandemic have been studied.

Features of concluding an employment contract with a remote employee. Electronic interaction during the

418-424

Page 53: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

pandemic period, whichis under the control of the employer; - interaction between the employer and the

employee is carried outusing public information and telecommunications networks.

Keywords: principle. law, social security, citizens, law, experience, quarantine, need, conditions, law, labor,

remotely, law, pandemic, Internet

References:

1. Constitution Of The Republic Of Uzbekistan (1992). Tashkent.Uzbekistan. 2019. - from 40

2. Regulatory legal acts, international documents 3. The universal Declaration of human rights (1948).

4. The international Covenant on civil and political rights (1966).

5. The international Covenant on economic, social and cultural rights (1966). 6. . European Convention for the protection of human rights and fundamental freedoms (1950).

7. European social Charter (1988). 8. ILO Convention No. 48 establishing a system of international co-operation for the maintenance of rights arising from disability, old

age and survivors ' insurance (1935).

9. ILO social security minimum standards Convention No. 102 (1952). 10. ILO Convention No. 117 on basic aims and standards of social policy (1962).

11. ILO Convention No. 128 on disability, old age and survivors ' benefits (1967).

12. ILO Convention No. 130 on medical assistance and sickness benefits (1969). 13. the Law of the Republic of Uzbekistan ―on state pension provision for citizens". www.lex.uz

14. Law of the Republic of Uzbekistan no. ZRK-272 of 22.12.2011 "On amendments and additions to the Labor code of the Republic of

Uzbekistan and the law of the Republic of Uzbekistan "on state pension provision for citizens"". www.lex.uz Law of the Republic of Uzbekistan dated December 23, 2010 № ZRU-272 "on amendments and additions to the Labor code of the

Republic of Uzbekistan and the law of the Republic of Uzbekistan "on state pension carefor citizens" " www.lex.uz

15. Law of the Republic of Uzbekistan from 02.12.2004 N 702-II "on accumulative pension provision of citizens" "Collection of legislation of the Republic of Uzbekistan", 2004, N 51, article 512

16. .DecreeOf the President of the Republic of Uzbekistan "on the state program for implementing the strategy of action on five priority

areas of development of the Republic of Uzbekistan in 2017-2021 in the" year of active investment and social development» dated January 17, 2019 no. up-5635

17. Tursunov Y., Usmanova M., Sattarova G. the Law of social security. Textbook for Universities. Vol.: Aloqachi, 2008. 498c.

18. Machulskaya E. E. Pravo sotsial'nogo obepecheniya [the Law of social welfare]. Moscow: yurait, 2011, 315 p

70.

Authors: W.F.Tang, S.L.Mak, C.H.Li

Paper Title: Additive Manufacturing Technology in Orthodontic Devices Development

Abstract: Traditional wires and brackets has been widely used as orthodontic devices for long time. The metal

wires and brackets help to correct the position of teeth as well as fix the cavity. However, metal brace wires have

quite a lot limitations. Patients wearing metal brace have many food restrictions and feel not comfortable.

Brushing and flossing are required to remove the food debris frequently. Hence, clear plastic aligners have

popped up recently. Since the metal brace fabrication process has associated with prolonged process time as a

result of a long workflow process starting from brace mold presentation to the prosthesis execution. The growing

of additive manufacturing technology make it possible to develop complex structures and shapes of dental brace.

By combining 3D oral scanning, it is possible to shorten the lead time of orthodontic treatment process. This

review, therefore, investigates the use of Digital Light Processing (DLP) Additive Manufacturing Technology

for plastic dental brace development as a remedy to the problems associated with the traditional methods. The

study reveals that it is feasible to fabricate these plastic braces utilising the DLP technology. DLP technology is

affordable and arguably able to produce dental models with high levels of assurance and accuracy.

Keywords: dental brace, clear aligners, orthodontic device, additive manufacturing, stereolithography, fused

deposition modelling

References:

1. , A., 2020. Safe braces. British Dental Journal, 228(10), pp.739-739.

2. Bártolo, P.J. ed., 2011. Stereolithography: materials, processes and applications. Springer Science & Business Media.

3. Benson, P.E., Da'as, T., Johal, A., Mandall, N.A., Williams, A.C., Baker, SR and Marshman, Z., 2015. Relationships between dental appearance, self-esteem, socio-economic status, and oral health-related quality of life in U.K schoolchildren: A 3-year cohort study.

European journal of orthodontics, 37(5), pp.481-490.

4. Bowman, S.J., 2017, March. Improving the predictability of clear aligners. In Seminars in orthodontics (Vol. 23, No. 1, pp. 65-75). WB Saunders.

5. Castiaux, A.D., Pinger, C.W., Hayter, E.A., Bunn, M.E., Martin, R.S. and Spence, D.M., 2019. PolyJet 3D-printed enclosed

microfluidic channels without photocurable supports. Analytical Chemistry, 91(10), pp.6910-6917. 6. Charalambis, A., Davoudinejad, A., Tosello, G. and Pedersen, D.B., 2017. Cost estimation of a specially designed direct light

processing (DLP) additive manufacturing machine for precision printing. In euspen’s 17th International Conference & Exhibition. The

European Society for Precision Engineering and Nanotechnology. 7. Choi, J.W., Kim, H.C. and Wicker, R., 2011. Multi-material stereolithography. Journal of Materials Processing Technology, 211(3),

pp.318-328.

8. Comba, B., Parrini, SIMONE, Rossini, G.A.B.R.I.E.L.E., Castroflorio, T. and Deregibus, A., 2017. Three-dimensional finite element analysis of upper-canine destabilisation with clear aligners, composite attachments, and class II elastics. J Clin Orthod, 51(1), pp.24-8.

9. Davoudnejad, A., Pedersen, D.B. and Tosello, G., 2017. Characterization of additive manufacturing processes for polymer micro parts

productions using direct light processing (DLP) method. In the 33rd International Conference of the Polymer Processing Society (PPS-33).

10. Dawood, A., Marti, B.M., Sauret-Jackson, V. and Darwood, A., 2015. 3D printing in dentistry. British dental journal, 219(11), pp.521-

529. 11. Dul, S., Fambri, L. and Pegoretti, A., 2016. Fused deposition modelling with ABS–graphene nanocomposites. Composites Part A:

Applied Science and Manufacturing, 85, pp.181-191. 12. Francois, M.M., Sun, A., King, W.E., Henson, N.J., Tourret, D., Bronkhorst, C.A., Carlson, N.N., Newman, C.K., Haut, T.S., Bakosi,

J. and Gibbs, J.W., 2017. Modelling of additive manufacturing processes for metals: Challenges and opportunities. Current Opinion in

425-432

Page 54: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

Solid State and Materials Science, 21(LA-UR-16-24513; SAND-2017-6832J).

13. Garino, F., Castroflorio, T., Daher, S., Ravera, S., Rossini, G., Cugliari, G. and Deregibus, A., 2016. Effectiveness of composite attachments in controlling upper-molar movement with aligners. J Clin Orthod, 50(6), pp.341-7.

14. Gomez, J.P., Peña, F.M., Martínez, V., Giraldo, D.C. and Cardona, C.I., 2015. Initial force systems during bodily tooth movement with

plastic aligners and composite attachments: A three-dimensional finite element analysis. The Angle Orthodontist, 85(3), pp.454-460.

15. Gokuldoss, P.K., Kolla, S. and Eckert, J., 2017. Additive manufacturing processes: Selective laser melting, electron beam melting and

binder jetting—Selection guidelines. Materials, 10(6), p.672.

16. Harun, W.S.W., Kamariah, MSIN, Muhamad, N., Ghani, S.A.C., Ahmad, F. and Mohamed, Z., 2018. A review of powder additive manufacturing processes for metallic biomaterials. Powder Technology, 327, pp.128-151

17. Hilliard, J.K., 2008. System and method for fabricating orthodontic aligners. U.S. Patent Application 11/842,411.

18. Javaid, M. and Haleem, A., 2019. Current applications and status of additive manufacturing in dentistry: A literature-based review. Journal of craniofacial and oral biology research, 9(3), pp.179-185.

19. Jasiuk, I., Abueidda, D.W., Kozuch, C., Pang, S., Su, F.Y. and McKittrick, J., 2018. An overview of additive manufacturing of

polymers. Jom, 70(3), pp.275-283. 20. Jesson, J., Matheson, L. and Lacey, F.M., 2011. Doing your literature review: Traditional and systematic techniques. Sage.

21. Jindal, P., Juneja, M., Bajaj, D., Siena, F.L. and Breedon, P., 2020. Effects of post-curing conditions on mechanical properties of 3D

printed clear dental aligners. Rapid Prototyping Journal. 22. Jiang, J., 2019. Support Optimisation for Additive Manufacturing.

23. Kaluđerović, M.R., Schreckenbach, J.P. and Graf, H.L., 2016. Titanium dental implant surfaces obtained by anodic spark deposition–

from the past to the future. Materials Science and Engineering: C, 69, pp.1429-1441. 24. Kazemi, M. and Rahimi, A., 2019. Improving the efficiency of fabrication of AM parts by segmentation design in the DLP process.

Rapid Prototyping Journal.

25. Kiviat, J. and Fleming, Y., 2018. Orthodontic Appliance Intolerance Due to Dental Adhesive Allergy. Dermatitis, 29(6), pp.349-350. 26. Lee, H., Lim, C.H.J., Low, M.J., Tham, N., Murukeshan, V.M. and Kim, Y.J., 2017. Lasers in additive manufacturing: A review.

International Journal of Precision Engineering and Manufacturing-Green Technology, 4(3), pp.307-322.

27. Marotti, J., Heger, S., Tinschert, J., Tortamano, P., Chuembou, F., Radermacher, K. and Wolfart, S., 2013. Recent advances of ultrasound imaging in dentistry–a review of the literature. Oral surgery, oral medicine, oral pathology and oral radiology, 115(6),

pp.819-832.

28. Melchels, F.P., Feijen, J. and Grijpma, D.W., 2010. A review on stereolithography and its applications in biomedical engineering. Biomaterials, 31(24), pp.6121-6130.

29. Millett, D.T., Mandall, N.A., Mattick, R.C., Hickman, J. and Glenny, A.M., 2017. Adhesives for bonded molar tubes during fixed

brace treatment. Cochrane Database of Systematic Reviews, (2). 30. Moser, N., Santander, P. and Quast, A., 2018. From 3D imaging to 3D printing in the dentistry-a practical guide. International journal

of computerised dentistry, 21(4), pp.345-356.

31. Mu, Q., Wang, L., Dunn, C.K., Kuang, X., Duan, F., Zhang, Z., Qi, HJ and Wang, T., 2017. Digital light processing 3D printing of complex conductive structures. Additive Manufacturing, 18, pp.74-83.

32. Nayar, S.K. and Boult, T.E., Columbia University of New York, 2014. Adaptive imaging using digital light processing. US Patent

8,675,119. 33. Oliveira, G., 2019. Accuracy And Precision Of 3-dimensional Printed Dental Models Produced By Different Additive Manufacturing

Technologies. 34. Resnik, D.B., 2015. What is ethics in research & why is it essential—National Institute of Environmental health sciences?

35. Sherman, S.L., Kadioglu, O., Currier, G.F., Kierl, J.P. and Li, J., 2020. Accuracy of digital light processing printing of 3-dimensional

dental models. American Journal of Orthodontics and Dentofacial Orthopedics, 157(3), pp.422-428. 36. Shivapuja, P.K., Shah, D., Shah, N. and Shah, S., Real 3d Polymers Group LLC, 2019. Direct 3D-printed orthodontic aligners with

torque, rotation, and full control anchors. U.S. Patent 10,179,035.

37. Shkarin, V.V., Davydov, B.N., Domenyuk, D.A. and Dmitrienko, S.V., 2018. Non-removable arch orthodontic appliances for treating children with congenital maxillofacial pathologies–efficiency evaluation. Archiv EuroMedica, 8(1), pp.97-98.

38. Singh, R., 2011. Process capability study of polyjet printing for plastic components. Journal of mechanical science and technology,

25(4), pp.1011-1015. 39. Singamneni, S., Diegel, O., Huang, B., Gibson, I. and Chowdhury, R., 2010. Curved-layer fused deposition modelling. Journal for New

Generation Sciences, 8(2), pp.95-107.

40. Sood, A.K., Ohdar, R.K. and Mahapatra, SS, 2010. Parametric appraisal of mechanical property of fused deposition modelling processed parts. Materials & Design, 31(1), pp.287-295.

41. Szuhanek, C., Grigore, A., Schiller, E., Bratu, D.C., Onisei, D. and Onisei, D., 2015. The role of digital setup in the orthodontic

treatment with plastic aligners. Mat. Plast, 52, p.522. 42. Szuhanek, C., Fleser, T. and Grigore, A., 2015. Applications of Thermoplastic Materials in the Fabrication of Orthodontic Aligners.

Mat. Plast, 52, p.385.

43. Sorooshian, S. and Kamarozaman, A.A., 2018. Fashion braces: an alarming trend. Sao Paulo Medical Journal, 136(5), pp.497-498. 44. Thrasher, C.J., Schwartz, J.J. and Boydston, A.J., 2017. Modular elastomer photo resins for digital light processing additive

manufacturing. ACS applied materials & interfaces, 9(45), pp.39708-39716.

45. Uno, M., Yokokawa, Y., Kawaki, H., Oka, T., Tamaki, Y. and Ishigami, H., 2019. Investigating the effectiveness of ceramic materials, particularly zirconium oxide, and the advantages the white metal holds over traditional materials used in dentistry: impact, 2019(2),

pp.68-70.

46. Vandenberghe, B., 2018. The digital patient–Imaging science in dentistry. Journal of dentistry, 74, pp.S21-S26. 47. Wang, X., Gao, W.Y., Luan, J., Wojtas, L. and Ma, S., 2016. A most effective strategy to boost the robustness of metal-organic

frameworks via the introduction of size-matching ligand braces. Chemical Communications, 52(9), pp.1971-1974.

48. Weir, T., 2017. Clear aligners in orthodontic treatment. Australian dental journal, 62, pp.58-62. 49. Ziemian, C., Sharma, M. and Ziemian, S., 2012. Anisotropic mechanical properties of ABS parts fabricated by fused deposition

modelling. Mechanical engineering, 23.

50. Zuzak, K.J., Cadeddu, J.A., Ufret-vincenty, R., Francis, R.P. and Livingston, E., University of Texas System, 2013. Digital light processing hyperspectral imaging apparatus. US Patent Application 13/776,105.

71.

Authors: Preeti Tripathi, Imran Khan

Paper Title: Computational Simulation - Design & Analysis Functionality of Grid Connected (GC) Photo-Voltaic

(PV) System

Abstract: The electrical power produced via photo-voltaic (PV) array relies largely on weather conditions. In

this paper, we presented a continuous state functionality of the PV grid-connected (GC) unit at distinct solar

irradiances. The presented model is developed on MATLAB environment, which includes the PV

array using an improved perturb and observe (MP&O) tracking system interconnected to DC to DC boosting

conversion application, the 3-phase 3 level electric power inverter which usually associated to the utility grid

using low pass filter, coupled transformer and synchronous control mechanism of PV inverter. The presented

model is lab-created within day-by- day climatic conditions to estimate its working mechanism. The simulation

433-438

Page 55: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

results of the proposed system satisfy requirements grid performance with high power quality. In the proposed

work number of cell modules used 90, number of parallel strings 60, maximum PV output

voltage1000wb/m2 at 274 V, minimum voltage at 600 wb/m2 at 250V, maximum power at 1000 wb/m2-100

kw, and minimum power at 600 wb/m2-57 kw.

Keywords: PV, MP&O, boost converter, UG

References:

1. Physical Progress (Achievements), Ministry of New andRenewable Energy, Govt. of India. 31 January 2014. Retrieved 21February 2014.

2. State wise installed solar power capacity (PDF), Ministry of New andRenewable Energy, Govt. of India. 1 March 2016. Retrieved24

March 2016. 3. D. M. Tobnaghi, ―A Review on Impacts of Grid-Connected PV System on Distribution Network,‖ International Journal of

Electrical, Computer, Energetic, Electronic and Communication Engg. , Vol. 10, No.1, 2016.

4. ―Grid Integration of Distributed Solar Photovoltaics (PV) in India,‖A Prayas (Energy Group) Report, July 2014. 5. IEEE Standard 519-1992 – Recommended Practices and Requirements for Harmonic Control in Electrical Power Systems. Revision

to IEEE 519-2014.

6. B. K. Perera, P. Ciufo, S. Perera, ―Point of Common Coupling (PCC) voltage control of a grid-connected solar Photovoltaic (PV) system,‖ 39th Annual Conference of the IEEE Industrial Electronics Society (IECON 2013), 2013, pp.7475-7480.

7. H. Ko, S. R. Lee, H. Dehbonei, and C. V. Nayar, "Applicationof Voltage-and Current-Controlled Voltage Source Inverters

forDistributed Generation Systems," IEEE Transactions on EnergyConversion, vol. 21, pp. 782-792, 2006. 8. M. P. Kazmierkowski and L. Malesani, "Current ControlTechniques for Three-Phase Voltage-Source PWM Converters:A

Survey," IEEE Transactions on Industrial Electronics, vol. 45, no. 5, pp. 691-703, 1998.E.

9. Adel A. Elbaset, Hamdi Ali and Montaser Abd-El Sattar ―NovelSeven-Parameter Model for Photovoltaic Modules‖ Solar Energy Materials & Solar Cells, vol. 130, pp. 442-455, 2014.Polycarpou, M.M.: Stable Adaptive Neural Control Scheme for Nonlinear

Systems. IEEE Trans. Automat. Contr., 41 (1996) 447-450.

10. Brigitte Hauke–―Basic Calculation of a Boost Converter's Power Stage‖ Application Report SLVA372B – November 2009 – Revised July 2010-Texas Instrument.Ge, S.S., et al.: A Direct Method for Robust Adaptive Nonlinear Control with Guaranteed

Transient Performance. System Control Lett., 37 (1999) 275-284

11. SoerenBaekhoejKjaer et al ―A Review of Single-Phase Grid- Connected Inverters for Photovoltaic Modules‖ IEEE Transactions on Industry Applications, vol. 41, no. 5, September/October 2005.

12. M. Prodanović and T. C. Green, "Control and filter design of three- phase inverters for high power quality grid connection," IEEE

Transactions on Power Electronics, vol. 18, no. 1, pp. 373-380, January 2003. 13. T. C. Wang, Z. Ye, G. Sinha, and X. Yuan, "Output FilterDesign for a Grid-Interconnected Three-Phase Inverter," in IEEE 34th

Annual Power Electronics Specialist Conference (PESC'03), pp. 779-784, Acapulco, Mexico, June 15-19,2003.

14. Gabriel OoiHeo Peng, ―Investigation and Implementation of Multilevel Power Converters for Low/Medium/High Power Applications‖, Ph.D Thesis, School of Electrical and Electronic Engineering, Nanyang Technological University, 2015.

15. J. Rodriguez, J.-S. Lai, and F. Z. Peng, "Multilevel Inverters: A Survey of Topologies, Controls, and Applications," IEEE Transactions on Industrial Electronics, vol. 49, no. 4, pp. 724- 738, August 2002.

16. J. S. Lai and F. Z. Peng, "Multilevel Converters-A New Breed of Power Converters," IEEE Transactions on Industry Applications, vol.

32, no. 3, pp. 509-517, May/June 1996. 17. C. Hochgraf, R. Lasseter, D. Divan, and T. Lipo"Comparison of multilevel inverters for static var compensation," in IEEE Conference

Record of Industry Applications Society Annual Meeting, pp. 921-928, Denver, Colorado, October 2-6, 1994.

18. E.D. Mehleri, H. Sarimveis, N.C. Markatos, and L.G.Papageorgiou, ―Optimal Design and Operation of DistributedEnergy Systems: Application to Greek Residential Sector,‖Renewable Energy, vol. 51, pp. 331-342, March 2013.

72.

Authors: Gowtham Kishor Kumar B, P. Palson,

Paper Title: Factors Influencing Cost Overrun and Delay with Their Risks in Construction Management.

Abstract: Cost overrun and delay are the most important factors which affect the rate of progress in

construction industries. There are numerous Risks are involved in cost and schedule overrun which leads to

unprofitable situation or dropping the project. Previous literature studies are mainly focused only on cost overrun

and delay but they do not deal with their risks which is important to study. This study is to assess the factors

influencing time and cost overruns on construction projects and their risks also. The objectives of the study were

achieved through valid questionnaire. The questionnaires are collected over 40 construction companies. From

this survey, identify and ranking the various elements which are responsible for the inflation of cost and

schedule overrun using analytical software like SPSS. And discuss about the significant values obtained from the

collecting data and recommendation and mitigation ideas from the ranking of overrun factors. The significant

value should be more than 0.05 and from our analysis most of the factors are above that value. The study

clarified that incorrect estimates and low productivity level of labors highly contributes to overrun in

construction management. It will leads to unprofitable situation, so proper scheduling and better management

will rectify these problems.

Keywords: Elements, Cost overrun, Schedule overrun, Construction projects.

References:

1. Emmanuel Bentil and Edward Nana and Alfred Fokuo, 2016, Existence and Impact of Overruns in construction projects in GHANA.

2. Adam Abderisak, per-Erik Josephson and Goran Lindal,2015, Implication of Overruns in Major Public construction projects 3. Fouzi A. HOSSEN (2010), ―Project cost risk assessment: an application of project risk management process in Libyan construction

projects‖ Faculty of Engineering, University of Omar Elmukhtar, Libya

4. Sai Murali Krishna Reddy. Raya and S.S Bhanu Prakash (2016), ―Cost and Time Overrun in Indian Construction Industry‖ Industrial Science Research Journal,2(4),1-9.

5. Paul Terna Gbahabo and Oluseye Samuel Ajuwon, Effects of cost overrun and schedule delay in Sub Saharan Africa, efficient and

effective monitoring and evaluation performance. 6. Aftab Hameed Memon, et al (2014), ―Significant Factors Causing Time Overrun in Construction Projects of Peninsular Malaysia‖

Modern Applied Science;8(4), 16-28

7. Alirezarezaei and saeedjalal,2016 Investigation on Causes of Delay and Cost overrun in Construction Industry

8. N.Hamezah, et al (2011) ―Causes of construction Delay Theoretical framework‖

439-443

Page 56: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

9. Raj kapur shah,2016, Exploration of Causes for Delay and Cost Overruns in Construction Projects: Case Study of Australia, Malaysia

&Ghana, 10. Adriana Gomez and Jose Luiz poniz tienda (2017), INTI journal.

73.

Authors: Veena Devi Shastrimath V., Ashwini, Andrea Olivero, Deepa Bhat

Paper Title: Railway Access Control System using Face Recognition

Abstract: Nowadays booking tickets and getting inside a railway station is adifficult task. Manual checking

becomes a burden and time consuming. Also as everything is getting digitized in this modern world introduce

face recognition and Quick Response (QR) code system for entry helps in passenger convenience.Face

recognition is a method of identifying or verifying the identity of an individual using their face. Face recognition

systems can be used to identify people in photos, video, or in real-time.So this system focuses on passengers‘

convenience through allowing them to book tickets online and by introducing face recognition system and QR

code system for entry to a railway station.This system helps inidentifying people who try to travel without

buying tickets and also helps toapprehend the blacklisted person which increases security in the railway station.

Online booking is one of the convenient ways tobook the ticket. This system also provides the convenience to

passenger by issuing the digital ticket in the form of QR code thus avoiding any fuss due to the loss of the

physical ticket.

Keywords: Entry Control System, Face Detection, Face Recognition, User Interface.

References:

1. M. Nakada, H. Wang, and D. Terzopoulos, ―Acfr: Active facerecognition using convolutional neural networks,‖ in 2017 IEEE

Conference on Computer Visionand Pattern Recognition Workshops (CVPRW), 2017, pp. 35–40.

2. W.-K. CF. Guzzi, L. D. Bortoli, S. Marsi, S. Carrato, and G. Ramponi, ―Distillation of a cnn for a high accuracy mobile face recognition system,‖ in 2019 42nd International Convention on Information and Communication Technology, Electronics

andMicroelectronics (MIPRO), 2019, pp. 989–994..

3. Q. Li, ―An improved face detection method based on face recognition application,‖in 2019 4th Asia-Pacific Conference on Intelligent Robot Systems (ACIRS),2019, pp. 260–264E.

4. X. Zhang, M. Peng, and T. Chen, ―Face recognition from near-infrared images with convolutional neural network,‖ in 2016 8th

International Conference onWireless Communications Signal Processing (WCSP), 2016, pp. 1–5. 5. C. Ding and D. Tao, ―Trunk-branch ensemble convolutional neural networks for video-based face recognition,‖ IEEE Transactions on

Pattern Analysis and Machine Intelligence, vol. 40, no. 4, pp. 1002–1014, 2018.C.

6. Hou A-Lin, Feng Yuan, and Geng Ying, ―Qr code image detection using runlength coding,‖ in Proceedings of 2011 International Conference on Computer Science and Network Technology, vol. 4, 2011, pp. 2130–2134.

7. Lihong Wan, Na Liu, Hong Huo, and Tao Fang, ―Face recognition with convolutional neural networks and subspace learning,‖ in

2017 2nd InternationalConference on Image, Vision and Computing (ICIVC), 2017, pp. 228–233 8. A. Jamnik, M. Shahare, S. Kamble, N. Kale, M. Bhadade, and S. V. Sonekar, ―Digital ticket booking and checking using aadhaar card

or fingerprint and android application,‖ in 2019 3rd International Conference on Recent Developments in Control, Automation Power

Engineering (RDCAPE), 2019, pp. 503–507., 9. K. He, X. Zhang, S. Ren, and J. Sun, ―Deep residual learning for image recognition,‖ in 2016 IEEE Conference on Computer Vision

and Pattern Recognition (CVPR), 2016, pp. 770–778.

444-448

74.

Authors: G.Sundari, J.Shanmugapriyan

Paper Title: Design and Implementation of PID, GA and Fuzzy logic Controllers for an Electrical Drive with

Various Noise Disturbances

Abstract: It is a great challenge for human being to keep up the constant speed in drive when external Noise

disturbances occur due to fluctuations of power supply. In order to avoid these issues, PID controllers are

intended using predictable method such as Ziegler Nichols method. But finest level is not obtained in transient

and steady state. During the MATLAB Simulation, the error is present transient and steady state behavior in

conventional PID controllers. Hence it is necessary to design a PID controller with Novel intelligent technique

for speed control of drive like fuzzy and Genetic Algorithm. It considers error as fitness function which is to be

minimized using various GA operators such as mutation etc. The Drive will be operated with different external

noises like sinusoidal noise, Saw tooth noise and Ramp noise and comparison between PID, GA and Fuzzy PID

will be presented and their performances are studied.

Keywords: Noise disturbances PID controller, Genetic controller, fuzzy controller.

References:

1. Younis S. Dawood , Ali K. Mahmood and Muhammed ―Comparison of PID, GA and Fuzzy Logic Controllers for Cruise Control System ―, A. International Journal of Computing and Digital Systems ISSN (2210-142X) Int. J. Com. Dig. Sys. 7, No.5 (Sep-2018)

2. Ramesh Chandra Chourasia, Mukesh Kumar ,―Speed Control of S.E.D.C. Motor by Using Pi and Fuzzy Logic Controller‖,

International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-3, Issue-2, May 2013 3. Umesh Kumar Bansal and Rakesh Narvey, ―Speed Control of DC Motor Using Fuzzy PID Controller‖. ISSN 2231-1297,Volume 3,

Number 9 (2013), pp. 1209-1220 © Research India Publications 4. Sharad Chandra Rajpoot1, Prashant Singh, Rajpoot2, Premlata3, Durga Sharma4―Design and Simulation of Neuro Fuzzy Controller for

Speed Control of a Separately Excited dc Motor‖, IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-ISSN:

2278-1676,p-ISSN: 2320-3331, Volume 11, Issue 6 Ver. IV (Nov. – Dec. 2016), PP 56-67 5. Hybrid control technique for minimizing the torque ripple of brushless direct current motor‖Measurement and Control 2018, Vol. 51(7-

8) 321–335 © The Author(s) 2018 Article reuse guidelines: sagepub.com/journals-permission

6. Akbarzadeh M.R , Kim T, Y.T. &B.Feerouzbakhah, ‗Evolutionary Fuzzy speed regulation for a DC motor‘],‖ ‗ NASA Center for Autonomous control Engineering,

7. Chin- Hung wang, Tzung- Pei Hong, and Shian- Shyong Teng‖ Integrating Fuzzy knowledge by Genetic Algorithms‖, (1998),

,IEEE Transactions on Evolutionary computation, VOL.2, No.4. 8. Abdulla Ismail and Sharaf A.M (2002),‖An Efficient Neuro Fuzzy speed controller for Large Industrial Motor Drives,‖ IEEE

International conference on Control Applications, September 18-20,2002,Glasgow, Scotland,U.K.

449-453

Page 57: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

9. Chin- Hung wang, Tzung- Pei Hong, and Shian- Shyong Teng (1998)]‗Evolutionary Fuzzy speed regulation for a DC motor‘, NASA

Center for Autonomous control Engineering,

75.

Authors: Putta. Rama Krishna Veni, C Aruna Bala

Paper Title: The Multi Stage U-net Design for Brain Tumor Segmentation using Deep Learning Architecture.

Abstract: Now a day‘s diagnosis and accurate segmentation of brain tumors are critical conditions for

successful treatment. The manual segmentation takes time consuming process, more cost and inaccurate. In this

paper implementation of cascaded U-net segmentation Architecture are divided into substructures of brain tumor

segmentation. The neural network is competent of end to end multi modal brain tumor segmentations.The Brain

tumor segments are divided three categories. The tumor core (TC),the enhancing tumor(ET),the whole tumor

(WT).The distinct data enhancement steps are better achievement. The proposed method can test result

conclude average counter scores of 0.83268, 0.88797 and 0.83698, as well as Hausdorff distances 95%) of

2.65056, 4.61809 and 4.13071, for the enhancing tumor(ET), whole tumor (WT) and tumor core (TC)

respectively. In this method validating with BraTS 2019 dataset and identify the test time enhancement improves

the Brain tumor segmentation accurate images.

Keywords: Deep learning • Brain tumor segmentation • U-Net

References:

1. Ronneberger, O., Fischer, P., Brox, T.: U-Net: convolutional networks for biomedical image segmentation. In: Navab, N., Hornegger,

J., Wells, W.M., Frangi, A.F. (eds.) MICCAI 2015. LNCS, vol. 9351, pp. 234–241. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-24574-4 28

2. Roth, H.R., et al.: A multi-scale pyramid of 3D fully convolutional networks for abdominal multi-organ segmentation. In: Frangi,

A.F., Schnabel, J.A., Davatzikos, 3. C., Alberola-L´opez, C., Fichtinger, G. (eds.) MICCAI 2018. LNCS, vol. 11073, pp. 417–425. Springer, Cham (2018).

https://doi.org/10.1007/978-3-030-00937-3 48 20. Shen, H., Wang, R., Zhang, J., McKenna, S.J.: Boundary-aware fully convolutional network for brain tumor segmentation. In: Descoteaux, M., Maier-Hein, L.,

4. Franz, A., Jannin, P., Collins, D.L., Duchesne, S. (eds.) MICCAI 2017. LNCS, vol. 10434, pp. 433–441. Springer, Cham (2017).

https://doi.org/10.1007/978-3-319- 66185-8 49 5. Siskind, J.M., Pearlmutter, B.A.: Divide-and-conquer checkpointing for arbitrary programs with no user annotation. Optim. Methods

Softw. 33(4–6), 1288–1330 (2018)

6. Tu, Z., Bai, X.: Auto-context and its application to high-level vision tasks and 3D brain image segmentation. IEEE Trans. Pattern Anal. Mach. Intell. 32(10), 1744–1757 (2009)

7. Wu, Y., He, K.: Group normalization. In: Ferrari, V., Hebert, M., Sminchisescu, C.,

Weiss, Y. (eds.) ECCV 2018. LNCS, vol. 11217, pp. 3–19. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-01261-8 1

8. Zhao, X., Wu, Y., Song, G., Li, Z., Zhang, Y., Fan, Y.: A deep learning model integrating FCNNS and CRFS for brain tumor

segmentation. Med. Image Anal. 43, 98–111 (2018) 9. Zhou, C., Chen, S., Ding, C., Tao, D.: Learning contextual and attentive information for brain tumor segmentation. In: Crimi, A.,

Bakas, S., Kuijf, H., Keyvan, F.,

10. Reyes, M., van Walsum, T. (eds.) BrainLes 2018. LNCS, vol. 11384, pp. 497–507. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-11726-9 44

11. Zhou, C., Ding, C., Lu, Z., Wang, X., Tao, D.: One-pass multi-task convolutional neural networks for efficient brain tumor

segmentation. In: Frangi, A.F., Schnabel, 12. J.A., Davatzikos, C., Alberola-L´opez, C., Fichtinger, G. (eds.) MICCAI 2018. LNCS, vol. 11072, pp. 637–645. Springer, Cham

(2018). https://doi.org/10.1007/ 978-3-030-00931-1 73

13. Zhou, C., Ding, C., Wang, X., Lu, Z., Tao, D.: One-pass multi-task networks with cross-task guided attention for brain tumor segmentation. arXiv preprint arXiv:1906.01796 (2019)

454-460

76.

Authors: Divya Sathya Sree.I, Pangedaiah.B

Paper Title: A New Islanding Detection Technique using Ensemble Empirical Mode Decomposition

Abstract: Penetration of distributed generation (DG) is rapidly increasing but their main issue is islanding.

Advanced signal processing methods needs a renewed focus in detecting islanding. The proposed scheme is

based on Ensemble Empirical Mode Decomposition (EEMD) in which Gaussian white noise is added to original

signal which solves the mode mixing problem of Empirical mode decomposition (EMD) and Hilbert transform

is applied to obtained Intrinsic mode functions(IMF). The proposed method reliably and accurately detects

disturbances at different events.

Keywords: Distributed Generation (DG), Empirical Mode Decomposition (EMD), Ensemble Empirical Mode

Decomposition (EEMD), Intrinsic Mode Function (IMF).

References:

1. P. Mahat, Z. Chen, and B. Jensen, ―Review of islanding detection methods for distributed generation,‖ in Proc. 3rd Int. Conf. Electric

Utility Deregulation Restructuring Power Technol., Nanjing, China, 2008, pp. 2743– 2748. 2. H. H. Zeineldin and S. Kennedy, ―Sandia frequency-shift parameter selection to eliminate nondetection zones,‖ IEEE Trans. Power

Del., vol. 24, no. 1, pp. 486–487, Jan. 2009.

3. H. H. Zeineldin and M. M. A. Salama, ―Impact of load frequency dependence on the NDZ and performance of the SFS islanding detection method,‖ IEEE Trans. Ind. Electron., vol. 58, no. 1, pp. 139–146, Jan. 2011.

4. A. Samui and S. R. Samantaray, ―Assessment of ROCPAD relay for islanding detection in distributed generation,‖ IEEE Trans. Smart

Grid, vol. 2, no. 2, pp. 391–398, Jun. 2011. 5. S. Jang and K. Kim, ―An islanding detection method for distributed generation algorithm using voltage unbalance and total harmonic

distortion of current,‖ IEEE Trans. Power Del., vol. 19, no. 2, pp. 745–752, Apr. 2004.

6. V. Menon and M. H. Nehrir, ―A hybrid islanding detection technique using voltage unbalance and frequency set point,‖ IEEE Trans. Power Syst., vol. 22, no. 1, pp. 442–448, Feb. 2007.

7. Y. H. Gu and M. H. J. Bollen, ―Time-frequency and time-scale domain analysis of voltage disturbances,‖ IEEE Trans. Power Del., vol.

461-466

Page 58: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

15, no. 4, pp. 1279–1284, Oct. 2000.

8. S. R. Samantaray, A. Samui, and B. C. Babu, ―Time-frequency transform based islanding detection in distributed generation,‖ IET Renew. Power Gener., vol. 5, no. 6, pp. 431–438, Nov. 2011.

9. A. Khamis and H. Shareef, ―Pattern recognition of islanding detection using TT-transform,‖ J. Asian Sci. Res., vol. 2, pp. 607–613,

Nov. 2012.

10. S. Santoso, W. M. Grady, E. J. Powers, J. Lamoree, and S. C. Bhatt, ―Characterization of distribution power quality events with Fourier

and wavelet transforms,‖ IEEE Trans. Power Del., vol. 15, no. 1, pp. 247–254, Jan. 2000.

11. P. K. Ray, N. Kishor, and S. R. Mohanty, ―Islanding and power quality disturbance detection in grid-connected hybrid power system using wavelet and S-transform,‖ IEEE Trans. Smart Grid, vol. 3, no. 3, pp. 1082–1094, Sep. 2012.

12. C. Tao Hsieh, J. Min Lin, and S. J Huang, ―Enhancement of islandingdetection of distributed generation systems via wavelet

transform-based approaches,‖ Electr. Power Energy Syst., vol. 30, no. 10, pp. 575–580, 2008. 13. O. Poisson, P. Rioual, and M. Meunier, ―Detection and measurement of power quality disturbances using wavelet transform,‖ IEEE

Trans. Power Del., vol. 15, no. 3, pp. 1039–1044, Jul. 2000.

14. K. T. Sweeney, S. F. McLoone, and T. E. Ward, ―The use of ensemble empirical mode decomposition with canonical correlation analysis as a novel artifact removal technique,‖ IEEE Trans. Biomed. Eng., vol. 60, no. 1, pp. 97–105, 2013.

15. Dan Chen, Duan Li, Muzhou Xiong, Hong Bao, and Xiaoli Li, ―GPGPU-Aided Ensemble Empirical-Mode Decomposition for EEG

Analysis During Anesthesia,‖ IEEE Trans. Inf. Technol. Biomed., vol. 14, no. 6, pp. 1417–1427, 2010. 16. S.Biswal, M.Biswal, and O.P.Malik, ―Hilbert Huang Transform Based Online Differential Relay Algorithm for Shunt Compensated

Transmission Line,‖ IEEE Trans.Power Deliv., vol. 33, no. 6, pp. 2803–2811, 2018.

77.

Authors: Arpita Dey, Buddhadeb Sau

Paper Title: Locating Targets in RFID System in a Sensing Covered Anchor-Free Network

Abstract: In an RFID system, the RFID readers consume huge energy and are considerably expensive in

practical applications. To minimize the total number of readers with guaranteed surveillance such that the

position of each tag can be uniquely determined is a challenge. This paper considers a simple but practically

useful model of anchor-free network of RFID readers where each tag falls within the sensing zone of at least two

readers. To maintain the quality of service in the real applications, a practical condition, the communication

range is at least twice its sensing range, is considered. Under this condition, a characterization of a network is

proved. An efficient algorithm for recognizing such a network is then developed without any initial position

information of the readers. Using these readers as the references, an algorithm is designed for finding the exact

positions of the tags in distributed manner. Unlike the existing techniques, it requires no external references for

tag tracking. The proposed technique finds at most two possible positions (in some cases, unique position), out

of which one is correct, for each tag.

Keywords: Targets tracking, exact positions of RFID read-ers, 2-sensing covered network, locating targets with

no anchors, locating RFID tags with RFID readers.

References:

1. Zoe¨ Abrams, Ashish Goel, and Serge Plotkin. Set k-cover algorithms for energy efficient monitoring in wireless sensor networks. In Information Processing in Sensor Networks, 2004. IPSN 2004. Third International Symposium on, pages 424–432. IEEE, 2004

2. A. Bekkali, H. Sanson, and M. Matsumoto. Rfid indoor positioning based on probabilistic rfid map and kalman filtering. In Wireless

and Mobile Computing, Networking and Communications, 2007. WiMOB 2007. Third IEEE International Conference on, pages 21–21,

Oct 2007.

3. Pratik Biswas, Kim-Chuan Toh, and Yinyu Ye. A distributed sdp approach for large-scale noisy anchor-free graph realization with applications to molecular conformation. SIAM Journal on Scientific Computing, 30(3):1251–1277, 2008.

4. Mathieu Bouet and Aldri L Dos Santos. Rfid tags: Positioning principles and localization techniques. In Wireless Days, 2008.

WD‘08.1st IFIP, pages 1–5. IEEE, 2008. 5. K. Chawla, G. Robins, and Liuyi Zhang. Object localization using rfid.In Wireless Pervasive Computing (ISWPC), 2010 5th IEEE

International Symposium on, pages 301–306, May 2010.

6. A. Dey and B. Sau. Tracking of rfid tags in a sensing covered anchorfree network of rfid readers. In 2016 IEEE 6th International Conference on Advanced Computing (IACC), pages 689–694, 2016.

7. Lance Doherty, Kristofer SJ Pister, and Laurent El Ghaoui. Convex position estimation in wireless sensor networks. In INFOCOM

2001. Twentieth Annual Joint Conference of the IEEE Computer and Com munications Societies. Proceedings. IEEE, volume 3, pages 1655 1663.EEE, 2001.

8. Robert C Francis, James P McGee, Robert A Sainati, Richard L Sheehan Jr, and Sai-Kit K Tong. Object tracking and management

system and method using radio-frequency identification tags, jul 29 2003. US Patent 6,600,418. 9. Daniel Hahnel, Wolfram Burgard, Dieter Fox, Ken Fishkin, and MatthaiPhilipose. Mapping and localization with rfid technology. In

Roboticsand Automation, 2004. Proceedings. ICRA‘04. 2004 IEEE InternationalConference on, volume 1, pages 1015–1020. IEEE,

2004. 10. C. Hekimian-Williams, B. Grant, Xiuwen Liu, Zhenghao Zhang, and P. Kumar. Accurate localization of rfid tags using phase

difference. In RFID, 2010 IEEE International Conference on, pages 89–96, April 2010.

11. Bruce Hendrickson. Conditions for unique graph realizations. 21(1):65– 84, 1992. 12. Bill Jackson and Tibor Jordan´. Connected rigidity matroids and unique realizations of graphs. Journal of Combinatorial Theory, Series

B, 94(1):1–29, 2005.

13. Hai Liu, Miodrag Bolic, Amiya Nayak, and Ivan Stojmenovic´. Tax-onomy and challenges of the integration of rfid and wireless sensor networks. Network, IEEE, 22(6):26–35, 2008.

14. R. Olfati-Saber. Distributed kalman filtering for sensor networks. In 2007 46th IEEE Conference on Decision and Control, pages

5492–5498, Dec 2007. 15. Himani S Parekh, Darshak G Thakore, and Udesang K Jaliya. A survey on object detection and tracking methods. International Journal

of Innovative Research in Computer and Communication Engineering, 2(2):2970–2979, 2014.

16. A. Ribeiro, I. D. Schizas, S. I. Roumeliotis, and G. Giannakis. Kalman filtering in wireless sensor networks. IEEE Control Systems, 30(2):66– 86, April 2010.

17. B. Sau and K. Mukhopadhyaya. Length-based anchor-free distributed localization in a covered sensor network. pages 77–82, Dec

2008. 18. Buddhadeb Sau and Krishnendu Mukhopadhyaya. Length-based anchor-free localization in a fully covered sensor network. In

Communication Systems and Networks and Workshops, 2009. COMSNETS 2009. First International, pages 1–10. IEEE, 2009. 19. Buddhadeb Sau and Krishnendu Mukhopadhyaya. Localizability of wireless sensor networks: Beyond wheel extension. In

Stabilization, Safety, and Security of Distributed Systems, pages 326–340. Springer, 2013.

467-475

Page 59: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

20. Anthony Man-Cho So and Yinyu Ye. Theory of semidefinite pro-gramming for sensor network localization. Mathematical

Programming,109(2-3):367–384, 2007. 21. Dong-Liang Wu, W.W.Y. Ng, D.S. Yeung, and Hai-Lan Ding. A brief survey on current rfid applications. In Machine Learning and

Cybernetics, 2009 International Conference on, volume 4, pages 2330– 2335, July 2009.

22. Alper Yilmaz, Omar Javed, and Mubarak Shah. Object tracking: A survey. Acm computing surveys (CSUR), 38(4):13, 2006.

23. Yimin Zhang and Moeness G Amin. Localization and tracking of passive rfid tags. In Defense and Security Symposium, pages

624809–624809. International Society for Optics and Photonics, 2006.

24. Yimin Zhang, Moeness G Amin, and Shashank Kaushik. Localization and tracking of passive rfid tags based on direction estimation. Interna-tional Journal of Antennas and Propagation, 2007, 2007.

78.

Authors: A.Asyraf, S. Syafiie, M. Halim Shah Ismail

Paper Title: Type 1 Diabetes Mellitus Mobile Application with Blood Glucose Simulation

Abstract: There are many mobile applications for diabetes currently in the market which try to help people with

diabetes better manage their condition. Common features are the ability to log in user meal intake, amount of

carbohydrates, insulin, physical activity and etc. and present the data back to them in a more organize manner

such as in charts so that they can learn their blood glucose trend. However, few are trying to simulate their blood

glucose level which might help them understand better the effect of these input to their blood glucose. In this

paper, a mobile application is presented which can predict the trend of glucose from the meal and insulin intake

of diabetes patient. The application used a glucose-insulin dynamics mathematical model to simulate the

changes of blood glucose level over time for the user. Data of a clinical patient was used as input to the

developed application to study its performance. It was found out that the accuracy of the application made the

application to not be 100% reliable as predictor of blood glucose but a good educational tool for diabetes patient

as it can simulate the glucose response from carbohydrate and insulin intake. A more accurate and complex

mathematical model needs to be use for future development as the current linear and relatively simple model

may not be accurate enough for the application.

Keywords: Application, Diabetes, Glucose, Insulin, Mobile, Simulation, T1DM,

References:

1. C. for D. C. and Prevention, ―National diabetes fact sheet: national estimates and general information on diabetes and prediabetes in the

United States, 2011,‖ Atlanta, GA US Dep. Heal. Hum. Serv. centers Dis. Control Prev., vol. 201, no. 1, pp. 2568–2569, 2011. 2. A. D. Association, ―Diagnosis and classification of diabetes mellitus,‖ Diabetes Care, vol. 37, no. Supplement 1, pp. S81–S90, 2014.

3. WebMD, ―What Are Autoimmune Disorders?,‖ WebMD, 2018. https://www.webmd.com/a-to-z-guides/autoimmune-diseases.

4. World Health Organization, ―Diabetes,‖ 2019. https://www.who.int/en/news-room/fact-sheets/detail/diabetes. 5. O. El-Gayar, P. Timsina, N. Nawar, and W. Eid, ―Mobile applications for diabetes self-management: Status and potential,‖ J. Diabetes

Sci. Technol., vol. 7, no. 1, pp. 247–262, 2013, doi: 10.1177/193229681300700130.

6. M. Arnhold, M. Quade, and W. Kirch, ―Mobile applications for diabetics: a systematic review and expert-based usability evaluation considering the special requirements of diabetes patients age 50 years or older,‖ J. Med. Internet Res., vol. 16, no. 4, p. e104, 2014.

7. T. Chomutare, N. Tatara, E. Årsand, and G. Hartvigsen, ―Designing a diabetes mobile application with social network support.,‖ in

HIC, 2013, pp. 58–64. 8. C. Hou, B. Carter, J. Hewitt, T. Francisa, and S. Mayor, ―Do mobile phone applications improve glycemic control (HbA1c) in the self-

management of diabetes? A systematic review, meta-analysis, and GRADE of 14 randomized trials,‖ Diabetes Care, vol. 39, no. 11,

pp. 2089–2095, 2016. 9. S. Kumar, H. Moseson, J. Uppal, and J. L. Juusola, ―A diabetes mobile app with in-app coaching from a certified diabetes educator

reduces A1C for individuals with type 2 diabetes,‖ Diabetes Educ., vol. 44, no. 3, pp. 226–236, 2018.

10. S. G. Mougiakakou, I. Kouris, D. Iliopoulou, A. Vazeou, and D. Koutsouris, ―Mobile technology to empower people with Diabetes Mellitus: Design and development of a mobile application,‖ in 2009 9th International Conference on Information Technology and

Applications in Biomedicine, 2009, pp. 1–4.

11. E. Årsand, N. Tatara, G. Østengen, and G. Hartvigsen, ―Mobile phone-based self-management tools for type 2 diabetes: the few touch application,‖ J. Diabetes Sci. Technol., vol. 4, no. 2, pp. 328–336, 2010.

12. L. T. Harris et al., ―Designing mobile support for glycemic control in patients with diabetes,‖ J. Biomed. Inform., vol. 43, no. 5, pp. S37–S40, 2010.

13. E. D. Lehmann and T. Deutsch, ―A physiological model of glucose-insulin interaction in type 1 diabetes mellitus,‖ J. Biomed. Eng.,

vol. 14, no. 3, pp. 235–242, 1992, doi: 10.1016/0141-5425(92)90058-S. 14. M. Berger and D. Rodbard, ―Computer simulation of plasma insulin and glucose dynamics after subcutaneous insulin injection,‖

Diabetes Care, vol. 12, no. 10, pp. 725–736, 1989, doi: 10.2337/diacare.12.10.725.

15. J. D. Lambert, Numerical methods for ordinary differential systems: the initial value problem. John Wiley & Sons, Inc., 1991. 16. Y. A. Çengel, Differential Equations for Engineers and Scientists. McGraw Hill, 2013.

17. G. Krishnan, ―Using the power of familiarity in design,‖ UX Collective, 2019. https://uxdesign.cc/familiarity-in-design-70df1979f80.

18. I. B. Hirsch, ―Type 1 diabetes mellitus and the use of flexible insulin regimens,‖ Am. Fam. Physician, vol. 60, no. 8, p. 2343, 1999. 19. Am Fam Physician, ―Diabetes: How to Use Insulin,‖ American Academy of Family Physicians, 1999.

https://www.aafp.org/afp/1999/0801/p649.html (accessed Jul. 13, 2020).

476-480

79.

Authors: Anusha Nellutla, Gnana Sai Ganesh Chittajallu, Shaik Feroz

Paper Title: Leaf Disease Detection using Labview Imaq Vision

Abstract: The intension of our project is to design a system which can identify the good leaves from the

diseased ones. Image processing is a powerful tool capable of many applications. Image processing combined

with Machine Vision can simulate and execute real time projects. In this project we have used LabVIEW along

with IMAQ Vision to acquire real time images and process them. LabVIEW IMAQ Vision is potentially useful

for agricultural products since it combines the merits of both LabVIEW and IMAQ Vision, which have graphical

programming environment and rich image processing functions. The project aims to provide a brief introduction

into the IMAQ vision components like Image Acquisition, Calibration, Defect detection. Major leaf diseases‘

symptoms include spots or discolouration of leaves. The presence or absence of macro and micro nutrients, bug

481-492

Page 60: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

infestation and other diseases can be identified through leaves. In this project we have obtained the images

through LabVIEW IMAQ vision pallet. Further on two procedures were followed – one based on colour of the

leaves and other is based on spots and patterns present on the leaves. For the discolouration we first split the

image into its constituent planes- RGB and CMYK, here we used Green, Cyan and Yellow planes. Then on we

decided a threshold based on sample data using Linear Regression based prediction model of Machine Learning

to classify the data into three states – safe, risk and high risk.The second method was detecting spots. First, we

split the images into its constituent planes to convert the RGB image to Greyscale and increase the contrast using

the Colour Plane Extraction tool then use the Look up table tool to further enhance the contrast. Then on locate

the bright objects and then using dilation from the Morphology tool box we increase the size of the spots to

increase detection rate. Using Advanced Morphology tool box we removed the boundary objects to isolate the

spots. Then using the shape detection or circle detection algorithm we can detect the spots. Several samples

were obtained and are successfully classified. Finally, current limitations and likely future development trends

are discussed. Combining LabVIEW along with different programming algorithms can help in raising the

accuracy of the system.

Keywords: Image acquisition, colour plane extraction, Gray morphological operation, Edge detection, Real

time Colour matching.

References:

1. Malti K. Singh, Subrat Chetia2, ―Detection and Classification of Plant Leaf Diseases in Image Processing using MATLAB‖, International Journal of Life Sciences Research, Vol. 5, Issue 4, pp: (120-124), Month: October - December 2017.

2. Z. Husin, A.Y.M. Shakaff, A.H.A. Aziz, R.S.M. Farook, ―Plant Chili Disease Detection using the RGB Color Model‖,

3. https://www.google.com/search?q=diseased+leaves&rlz=1C1CHBF_enIN883IN883&oq=diseased+leaves&aqs=chrome..69i57j0l7.9136j1j7&sourceid=chrome&ie=UTF-8

4. Sandesh Raut, Kartik Ingole, ―Review On Leaf Disease Detection Using Image Processing Techniques‖, International Research Journal

of Engineering and Technology, Volume: 04 Issue: 04 | Apr -2017. 5. https://www.ni.com/pdf/manuals/320999c.pdf

6. https://www.ni.com/pdf/manuals/371077a.pdf

7. https://www.geeksforgeeks.org/linear-regression-python-implementation/ 8. https://knowledge.ni.com/KnowledgeArticleDetails?id=kA00Z0000019UFmSAM&l=en-IN

80.

Authors: Ankit Balvanshi, H.L. Tiwari, Mayank Gupta, Akhilesh Sharma

Paper Title: Statistical Downscaling of Maximum Temperature in Hoshangabad District of India

Abstract: The Global Climate ModelsCanESM2 and CGCM3 were utilised to downscale the maximum

temperature for Hoshangabad district of Madhya Pradesh, India. The area of study comprises to be of 6704 km2.

The predictors employed for CanESM2 were ncepmslpgl, ncepp500gl, ncepp850gl and ncepmslpas, ncepp500gl,

ncepp850gl were the predictors fixed for CGCM3. The total duration of the study was from the years 1979 –

2001. The two GCMs, CGCM3 and CanESM2 were checked for their capability in downscaling the maximum

temperature climatic parameter. The GCM outputs were evaluated on Nash Sutcliffe Efficiency (NSE) and

coefficient of determination (r2) criterias. The period of calibration was taken to be 1979-1995 and 1996-2001

was chosen as the period of validation. GCM CanESM2 obtained NSE of 0.77, 0.75 and r2 of 0.79, 0.79 during

the periods of calibration and validation respectively. It was concluded that CanESM2 model is found

comparatively more suitable for downscaling of maximum temperature for Hoshangabad region. The GCM can

be further employed to generate the future scenario of maximum temperature in the region.

Keywords: Global Climate Model, CGCM3, CanESM2, NSE, r2.

References:

1. IPCC (2007), Summary for Policymakers. In: Climate Change 2007: The Physical Science Basis, Contribution of Working Group I to

the Fourth Assessment Report of the Intergovernmental Panel on Climate Change, Cambridge University Press, Cambridge, United

Kingdom and New York, NY, USA. 2. Parekh, F. and Prajapati, K.P. (2013), Climate Change Impacts on Crop Water Requirement for Sukhi Reservoir Project, International

Journal of Innovative Research in Science, Engineering and Technology, 2(9), 4285-4292.

3. Shukla, R., Khare, D. and Deo, R. (2015), Statistical Downscaling of Climate Change Scenarios of Rainfall and Temperature over Indira Sagar Canal Command area in Madhya Pradesh, India, IEEE 14th International Conference on Machine Learning and

Applications, 313-317.

4. Kundu, S., Khare, D., and Mondal, A. (2017), Future Changes in Rainfall, Temperature and Reference Evapotranspiration in the Central India by Least Square Support Vector Machine, Geoscience Frontiers, 8(3),583-596.

5. Jaiswal, R.K., Tiwari, H.L., Lohani, A.K. and Yadava, R.N. (2018), Statistical Downscaling of Minimum Temperature of Raipur

(C.G.) India, Climate Change Impacts. Water Science and Technology Library, 82, 35-45. 6. STARDEX, (2005), Downscaling climate extremes, Final Report: 1-21.

7. Fowler, H. J., Blenkinsop, S., and Tebaldi, C. (2007), Linking Climate Change Modelling to Impacts Studies: Recent Advances in

Downscaling Techniques for Hydrological Modelling, International Journal of Climatology 27(12), 1547-1578.

8. Wilby, R. L., Troni, J., Biot, Y., Tedd, L., Hewitson, B. C., Smith, D. M., and Sutton, R. T. (2009), A Review of Climate Risk

Information for Adaptation and Development Planning, International Journal of Climatology, 29(9), 1193-1215.

9. Daniels, A. E., Morrison, J. F., Joyce, L. A., Crookston, N. L., Chen, S. C., and McNully, S. G. (2012), Climate Projections General Technical Report, Fort Collins, CO, U.S. Department of Agriculture, Forest Service, Rocky Mountain Research Station: 1-32.

10. Wilby, R.L. and Dawson, C.W. (2007), A Decision Support Tool for the Assessment of Regional Climate Change Impacts, User

Manual, UK.

493-496

81.

Authors: Raamesh. ASP, Balasundaram. N., Karthik. V.

Paper Title: An Investigation on the Impact of Industrial Wastes as A Replacement for Sand In Fiber-Reinforced

M20 Grade Concrete

Page 61: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

Abstract: Waste disposal in environment due to rapid urbanization and industrialization is increasing day by

day. Disposal of wastes in the environment is more difficult in the construction industry. Marble powder and

quarry dust are the waste materials obtained from the dressing and processing unit of marble production and

quarries respectively. These waste materials are dumped in the environment as a landfill, and they can be used as

a viable substitute material to the ingredients of concrete to a great extent. This will result in the production of

economically green concrete; this happens because of less usage of river sand, leading to reduction in damage to

to the environment. In this paper, natural sand used in the fiber-reinforced concrete (FRC) of grade 20 was

replaced by varying proportions (0%, 25%, and 50%) and combinations of quarry dust (QD) and marble powder

(MP) with 0.5% of basalt fiber added to the mix in order to explore the impact of QD and MP on the mechanical

properties of concrete. The strength properties were assessed at 3rd, 7th, 14th and 28th day and the obtained

results are tabulated. It is observed that a particular proportion of QD and MP enhances the strength of FRC.

Keywords: Marble powder, Quarry Dust, Fiber Reinforced Concrete, Basalt Fiber.

References:

1. P. Sivakumar, Dr. N. Balasundaram, K. Vivek, ―Study on the performance of White Crystal Stone with Fine Aggregate Flyash based

SCC of Grade M30‖, International Journal of Civil Engineering and Technology (IJCIET), Volume 9, Issue 7, July 2018, pp. 1678–

1684, ISSN Print: 0976-6308 and ISSN Online: 0976-6316. 2. K. Tamilselvan, N. Balasundaram, V. Karthik, S. Suryarakash, ―An Experimental Investigation on the Strength Characteristics of

Hybrid Fiber Reinforced Self Compacting Concrete‖, Pakistan Journal of Biotechnology, Vol 15 (4) 957-960 (2018).

3. Karthik V, G.Baskar., ―Investigation on strength properties of self compacting concrete with copper slag as fine aggregate‖, International Journal of Civil Engineering Research and Development (IJCERD), ISSN 2248- 9428, Volume 5, Number 1, January -

April (2015) Volume 10, pg: 18-25

4. V.Karthik, G. Baskar., ―Study on durability properties of self-compacting concrete with copper slag partially replaced for fine aggregate‖, International Journal of Civil Engineering and Technology (IJCIET), ISSN 0976-6308 and 0976-6316 Volume 6, Issue 9,

Sep 2015, pp. 20-30.

5. Sounthararajan V. M. and Sivakumar A. (2013), Effect of the lime content in marble Powder for producing high strength concrete, ARPN Journal of Engineering and Applied Sciences Vol. 8, No. 4.

6. Sakalkale A. D., Dhawale G.D., Kedar R. S. (2014), Experimental Study on Use of Waste Marble Dust in Concrete, International

Journal of Engineering Research and Applications, Vol. 4, No. 10 , pp. 44-50. 7. Pathan V. G. and Pathan M. G. (2014) Feasibility and Need of use of Waste Marble Powder in Concrete Production. IOSR Journal of

Mechanical and Civil Engineering (IOSR-JMCE) e-ISSN: 2278-1684, p-ISSN: 2320-334X PP 23-26

8. laidi A.S.E. , Azzouz L , Kadri E. and Kenai S.( 2012), Effect of natural pozzolana and marble powder on the properties of self-compacting concrete, Construction and Building Materials, Vol. 31, pp. 251–257.

9. Rai B., Khan N. H., Kr A., Tabin R. S. and Duggal S.K. (2011), Influence of Marble powder/granules in Concrete mix, International

Journal of Civil and Structural Engineering, Vol. 1, No. 4.

10. Aruntas H.Y.,Gürü M., Dayı M and Tekin I. (2010), Utilization of waste marble dust as an additive in cement production, Materials

and Design, Vol. 31, pp. 4039–4042.

11. Ilangovan R, Mahendran N and Nagamani K (2008), "Strength and durability properties of concrete containing quarry rock dust as fine aggregates", ARPN Journal of Engineering and Applied Science, Vol.3(5), pp.20-26.

12. Ilangovan R. and Nagamani K. 2006. Application of quarry Rock dust as fine aggregate in concrete construction. National Journal on

construction Management: NICMR. Pune. December. pp. 5-13. 13. M. Sahul Hameed and A.S.S. Sekar 2009. Properties of Green concrete containing Quarry dust and Marble sludge Powder as a

aggregate. APRN Journal pp. 83-89.

14. Tumadhir M , ―Thermal and Mechanical Properties of Basalt Fiber Reinforced Concrete‖ , World Academy of Science, Engineering and Technology ,Vol:7 2013-04-26.

15. Kunal Singha, “A Short Review on Basalt Fiber”, International Journal of Textile Science 2012, 1(4): 19-28

DOI:10.5923/j.textile.20120104.02.

497-501

82.

Authors: Himanshi Koli, M.P.S. Chawla

Paper Title: Design Analysis of PV-Wind Energy System with Pumped Hydro Storage using HOMER Pro

Abstract: Renewable energy in the recent era world-widely has proven to be a major shift for clean energy

generation. It is a great opportunity or solutions to address increasing clean energy demand especially in a

developing country such as India. As wind energy and solar energy are most commonly used renewable

resources, gives their abundance in the region. Focusing aim of the analysis is to present the reliability of

pumped hydro storage (PHS) system with respect to battery banks on the basis of operation and maintenance

(O&M) cost with minimum loss. Thus, this system will have feasibility and practical capability to provide

persistent supply operation to remote areas. The Hybrid Optimization Model for Electric Renewable (HOMER)

software also known as HOMER Prois used to conduct simulation of the system.

Keywords: Renewable energy system, PV-wind energy system, PHS, HOMER Pro.

References:

1. https://las493energy.wordpress.com/2018/10/01/an-exploration-of-hybrid-pumped-hydro-storage-systems/

2. A. K. Raji and D. N. Luta, ―Modeling and Optimization of a Community Microgrid Components,‖Energy Procedia, vol. 156, pp. 406–

411, Jan. 2019.

3. Shashikant Golande and Manohar Kalgunde, ―Utilization Of Solar Energy With Pumped Hydro Storage Based On Standalone

Photovoltaic Power Generation,‖ 2017 International Conference on Computer Electrical & Communication Engineering(ICCECE), Kolkata,pp. 1-4.

4. Afshin Izadin, Arash Pourtaherian and Sarasadat Motahari, ― Basic Model and Governing Equation of Solar Cells used in Power and

Control Applications,‖ Sept 2011 5. D.P.Kothari, K.C.Singhal, ―Renewable energy sources and emerging technologies‖, PHI Learning Private limited, second edition,

August 2017

6. Motupalli Priyanka, Niranchana R, S Selvakumar, Nithya Venkatesan, ―Feasibility Study of Replacement of Hybrid Renewable Energy – A Case Study,‖IJITEE Trans BEIESP, Volume-8, Issue-6S3, April 2019.

7. S.P. Koko, K. Kusakana, and H.J. Vermaak, ―Grid-interactive micro-hydrokinetic with pumped-hydro storage: The case study of three

502-505

Page 62: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

South African demand sectors,‖2017 International Conference on the Domestic Use of Energy(DUE)

8. Bruno P. Pougoue Tchintchui, Atanda K. Raji, ―Techno-economic analysis of a renewable energy solution for an off-grid residence,‖ Cape Peninsula University of Technology, Cape Town, South Africa, 2019 Proceedings of the 27th Domestic use of Energy

Conference.

83.

Authors: Arun Kumar Chaudhary, Vijay Kumar

Paper Title: Half Logistic Exponential Extension Distribution with Properties and Applications

Abstract: In this article, we have introduced a new distribution based on type I half logistic-G family and

exponential extension as a base distribution known as Half Logistic Exponential Extension (HLEE) distribution.

The statistical properties of this model are also explored, such as the behavior of probability density, hazard rate,

and quantile functions are investigated. The Maximum likelihood estimation (MLE) method is used to estimate

model parameters. For the potentiality of the proposed model we have compared the goodness of fit with some

others models. We have proven the importance and flexibility of the new distribution in modeling with real data

applications empirically.

Keywords: Estimation, Exponential extension, Half-logistic exponential extension distribution, MLE.

References:

1. Abdulkabir, M., & Ipinyomi, R. A. (2020). Type II half logistic exponentiated exponential distribution: properties and applications. Pakistan Journal of Statistics, 36(1).

2. Afify, A.Z., Cordeiro, G.M., Yousof, H.M., Alzaatreh, A. & Nofal, Z.M. (2016). The Kumaraswamy transmuted-G family of

distributions: Properties and applications. Journal of Data Science, 14(2), 245-270. 3. Almarashi, A. M., Elgarhy, M., Elsehetry, M. M., Kibria, B. G., & Algarni, A. (2019). A new extension of exponential distribution

with statistical properties and applications. Journal of Nonlinear Sciences and Applications, 12, 135-145.

4. Ashour, S. K., & Eltehiwy, M. A. (2015). Exponentiated Power Lindley distribution. Journal of advanced research, 6(6), 895-905. 5. Balakrishnan, N. (1985). Order statistics from the half logistic distribution. Journal of Statistical Computation and Simulation, 20(4),

287-309.

6. Barreto-Souza, W., Santos, A.H.S. & Cordeiro, G.M. (2010). The beta generalized exponential distribution. Journal of Statistical Computation and Simulation, 80(2), 159-172.

7. Cordeiro, G.M. & de Castro, M. (2011). A new family of generalized distributions. Journal of Statistical Computation and Simulation,

81, 883-898. 8. Cordeiro, G.M., Alizadeh, M. & Diniz Marinho, P.R. (2015). The type I half-logistic family of distributions, Journal of Statistical

Computation and Simulation, 86(4), 707-728.

9. Ghitany, M.E.,Atieh, B. & ,Nadarajah, S. (2008). Lindley distribution and its application. Mathematics and Computers in Simulation,

78, 493-506.

10. Gomez, Y.M., Bolfarine, H. & Gomez, H.W. (2014). A new extension of the exponential distribution. Revista Colombiana de

Estadistica, 37(1), 25-34. 11. Gupta, R.D. & Kundu, D. (2001). Exponentiated exponential family; an alternative to gamma and Weibull. Biometrical Journal, 43,

117-130.

12. Hassan, A. S., Mohamd, R. E., Elgarhy, M., & Fayomi, A. (2018). Alpha power transformed extended exponential distribution: properties and applications. Journal of Nonlinear Sciences and Applications, 12(4), 62-67.

13. Kumar, V. (2010). Bayesian analysis of exponential extension model. J. Nat. Acad. Math, 24, 109-128.

14. Kumar, V. & Ligges, U. (2011). reliaR : A package for some probability distributions. http://cran.r-project.org/web/packages/reliaR/index.html

15. Kundu, D., & Raqab, M.Z. (2005). Generalized Rayleigh Distribution: Different Methods of Estimation, Computational Statistics and

Data Analysis, 49, 187-200. 16. Lemonte, A. J. (2013). A new exponential-type distribution with constant, decreasing, increasing, upside-down bathtub and bathtub-

shaped failure rate function. Computational Statistics & Data Analysis, 62, 149-170.

17. Louzada, F., Marchi, V. & Roman, M. (2014). The exponentiated exponential geometric distribution: a distribution with decreasing, increasing and unimodal failure rate. Statistics: A Journal of Theoretical and Applied Statistics, 48(1), 167-181.

18. Merovci, F. (2013). Transmuted exponentiated exponential distribution. Mathematical Sciences And Applications E-Notes, 1(2), 112-

122.

19. Moors, J. J. A. (1988). A quantile alternative for kurtosis. Journal of the Royal Statistical Society: Series D (The Statistician), 37(1),

25-32.

20. Murthy, D.N.P., Xie, M. & Jiang, R. (2003). Weibull Models, Wiley, New York 21. Nadarajah, S., & Haghighi, F. (2011). An extension of the exponential distribution. Statistics, 45(6), 543-558.

22. Nadarajah, S. & Kotz, S. (2006), The beta exponential distribution. Reliability Engineering and System Safety, 91(6), 689-697.

23. Ristic, M.M. & Balakrishnan, N. (2012), The gamma-exponentiated exponential distribution. Journal of Statistical Computation and Simulation, 82(8), 1191-1206.

24. Schmuller, J. (2017). Statistical Analysis with R For Dummies, John Wiley & Sons, Inc., New Jerse

25. Venables, W. N., Smith, D. M. & R Development Core Team (2020). An Introduction to R, R Foundation for Statistical Computing, Vienna,Austria. ISBN 3-900051-12-7. URL http://www.r-project.org.

506-512

84.

Authors: Kenji Sakoma, Makoto Sakamoto

Paper Title: A Consideration on "Sweetness" by 3D CG with Fruits as an Example

Abstract: Today, there are a lot of images and videos drawn by 3D computer graphics (hereinafter referred to as

3DCG) around us, and 3DCG is permeating our lives [1]. Recently, research and development of 3DCG-related

technologies such as 3D printers, AR, and VR have been actively carried out, and further progress in 3DCG can

be expected in the future. 3DCG is a technology that creates images and videos by creating objects in a virtual

three-dimensional space. CAD, VR, AR, simulators, 3D printers, etc. have been developed as technologies that

apply this. One of the reasons why it was applied to such technology is the high expressiveness of 3DCG. It is

possible to express various substances such as wood, metal, plastic, and glass, and it is becoming possible to

reproduce things that do not have a specific shape, such as flames, smoke, and fluids. One of the researches on

such 3DCG technology is digital food, and research is being conducted with the aim of putting it into practical

use in the future. Digital food is expected to solve problems related to food freshness management, disposal, new

513-516

Page 63: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

product development simulation, etc., but even with the expressive power of 3DCG, meat and fish are still

difficult. I am not good at expressing fresh foods such as vegetables and fruits, and "freshness" and "organic

coloring" such as "fresh flowers". This is one of the issues that cannot be avoided even in the research and

development of digital foods and must be solved. In this technology, while understanding the principle of

3DCG, I learned using some software in order to explore what technology is necessary to create a digital food.

Also, in learning, we set the goal of "expressing fresh fruits", which is one of the challenges of digital food, and

the gloss of the skin peculiar to fruits, the slight unevenness of the surface, especially the freshness of the cut

surface of fruits we focused on reproducing the expression of freshness.

Keywords: Computer graphics, Ambient light, Specular reflection light, Diffuse reflected light, Subsurface

scattering, Fresnel formula

References:

1. Haruka Tsuboi. ―Fundamental Study on Tourism Support Using 3DCG‖, Proceedings of the International Conference on Artificial

Life and Robotics, OS1-4(D-ROM) pp.272-275(2018).

2. Hdeki Komuro, ―POV-Ray de manabu jisshu konpyu-ta gurafikkusu‖ [Practical computer graphics to learn with POV-Ray], ASCII

MEDIA WORKS Inc., (2000). 3. Japan Sensor Corporation, Unavailable: https://www.japansensor.co.jp/faq/968/index.html, Ltd., (2020-01-29).

4. Hiroshi Harada, ―Blender nyumon‖ [Introduction to Blender], Available: https://www.blender3d.biz.html. (2020 -01-29).

5. Noriko Kurachi, ―CG Magic: rendaring‖ [CG Magic: Render], Available: https://www.mext.go.jp/content/1407196_21_1_1_2.pdf. 6. Max Born and Emil Wolf, Principles of Optics,Cambridge University Press, Cambridge, (1997).

7. H. W. Jensen et all.‖ Rendering of Wet Materials,‖Proceedings of the Seventh Eurographics Workshop on Rendering, pp. 273-282,

(1999). 8. Warren J. Smith. Modern Optical Engineering.McGraw-Hill. pp. 228-256.3).

85.

Authors: Kenji Sakoma, Makoto Sakamoto

Paper Title: For Colorization using Template Matching Basic Research on

Abstract: Colorization, also known as colorization, is a term introduced by Wilson Markle in 1970, and is a

method of coloring black-and-white images and videos using a computer. Coloring is important. Imagine

coloring a picture as an example. The painting before painting only gives information of existence, such as trees,

flowers, and clouds. Some things can be identified by color. This does not give us enough information from the

picture. But what about coloring? If you paint the sky red, it will be a sunset, and if you paint the ground green,

it will be a meadow. In other words, it is possible to express not only the background but also the background.

This makes it possible to read information that cannot be understood only in black and white. With the

development of digital devices such as smartphones these days, the chances of seeing black-and-white images

are decreasing, but in modern times, black-and-white images are used for X-ray images, MRI images, aerial

photographs, fixed-point observations, etc. There are many opportunities to be lost. The development of color

photography began in the world in the 1800s, and the development of color photography began in Japan in 1940.

In other words, the photographs before that were black and white, and colorization was used to colorize them.

Currently, many researchers are studying colorization methods and processes, and the processing time and the

burden on users are being reduced. However, software that can perform highly complete colorization is

expensive, and some are complicated to operate. Therefore, in this research, as basic research for the

development of a fully automatic colorization program for free software, color images (template images) lacking

information by template matching using ZNCC and black-and-white images with similar brightness patterns are

colored. We made a prototype of a colorization program that restores images.

Keywords: Computer graphics, Colorization, Zero-means Normalized Cross-Correlation, BMP image, HSV

color space, Color Propagation

References:

1. Hiroaki Kinumatsu, ―Kararize-shon ni kansuru kisokenkyu‖ [Basic research on colorization], Master Thesis, University of Miyazaki (2012).

2. ―Bitmappu gazo‖ [Bitmap image], Available: http://ja.wikipedia.org/wiki/.

3. RGB, Available: http://ja.wikipedia.org/wiki/RGB. 4. ―HSV kukan‖ [HSV space], Available: http://ja.wikipedia.org/wiki/.

5. ―Tenpure-to macchingu ni tuite rikaisuru‖ [Understand template matching], Available: https://www.yukisako.xyz/entry/template-

matching. 6. Seiki Inoue, Nobuyuki Yagi, Masaki Hayashi, Eisuke Nakasu, Koji Mitani, Makoto Okui, ―C gengo de manabu jissen gazo shori‖

[Practical image processing to learn in C language], Ohmsha, Ltd., (1999).

7. Uruma Kazunori, Seiichiro Hangai, ―Kararize-shon: shiro kuro gazo / eizo wo jido de kara-ka suru‖ [Colorization: Automatic colorization of black and white images/videos], IEICE Fundamentls Review Vol.11 No.3 2017.

517-519

86.

Authors: Hamdy Amin Morsy

Paper Title: Developing a New CCN Technique for Arabic Handwritten Digits Recognition

Abstract: Convolutional Neural Networks (CNN) have many applications in object recognition such as

character and digit recognition. Few researches are performed on Arabic handwritten digits recognition. In this

research, we will develop a new algorithm to utilize the convolutional neural networks with sigmoid function (ζ-

CNN) to recognize Arabic handwritten digits recognition. The performance of this method provides minimum

cost functions with maximum testing accuracy results in compared to other existing techniques.

520-524

Page 64: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

Keywords: Machine Learning, Neural Networks, Image Processing, Natural Language Processing

References:

1. A.Charu, "Neural Networks and Deep Learning: A Textbook", Springer, 1st ed. 2018 Edition.

2. Oludare I. Abiodun et al, "Comprehensive Review of Artificial Neural Network Applications to Pattern Recognition", DOI

10.1109/ACCESS.2019.2945545, IEEE Access.

3. S. Al-Ma‘adeed, D. Elliman, C. A. Higgins, "A data base for Arabic handwritten text recognition research", In Proceedings eighth international workshop on frontiers in handwriting recognition, IEEE 2002, pp 485–489.

4. H. A. Morsy, "Comparison of Commonly Used Non-Adaptive Image Scaling Techniques",CiiT Digital Image Processing 10 (9), 177-

180. 5. H. A. Morsy, H, "Performance Analysis of the Effects of Non-Adaptive Image Scaling on Image Edges", IJRTE 7 (6), 1692 – 1696.

6. D. C. Ciresan, U. Meier, L. M. Gambardella, J. Schmidhuber, "Convolutional neural network committees for handwritten character

classification", In 2011 International conference on document analysis and recognition, pp 1135–1139. IEEE. 7. A. El-Sawy, M. Loey, E. Hazem, "Convolutional neural network for Arabic handwritten characters dataset classification" ,

https://www.kaggle.com/mloey1/cnn-for-arabic-handwritten-characters/comments. Accessed: 30 May 2019. 8. I. Goodfellow, Y. Bengio, A. Courville,"Deep learning. MIT Press", 2016,http://www.deeplearningbook.org.

9. S. Impedovo, F. M. Mangini, D. Barbuzzi, "A novel prototype generation technique for handwriting digit recognition", Pattern

Recognit, 2014, 47(3):1002–1010. 10. G. Latif, J. Alghazo, L. Alzubaidi, M. M. Naseer, Y. Alghazo, "Deep convolutional neural network for recognition of unified multi-

language handwritten numerals" In 2018 IEEE 2nd International workshop on Arabic and derived script analysis and recognition

(ASAR), pp 90–95. 11. Y. LeCun, L. Bottou, Y. Bengio, P. Haffner, et al, "Gradient based learning applied to document recognition", Proc IEEE, 1998, 86

(11):2278–2324.

12. A. Mars, G. Antoniadis, "Arabic online handwriting recognition using neural network", Int J ArtifIntell Appl(IJAIA), 2016,7(5). 13. M. A. Mudhsh, Almodfer R, "Arabic handwritten alphanumeric character recognition using very deep neural network", 2017,

Information 8(3).

14. M. Ramzan, H. U. Khan, S. M. Awan, W. Akhtar, M. Ilyas, A. Mahmood, A. Zamir, "A survey on using neural network based algorithms for hand written digit recognition", 2018, Int J Adv Comput Sci Appl. https://doi.org/10.14569/IJACSA.2018.090965.

15. N. Srivastava, G. Hinton, A. Krizhevsky, I. Sutskever, R. Salakhutdinov, "Dropout: a simple way to prevent neural networks from

overfitting", 2005, J Mach Learn Res 15(1):1929–1958. 16. J. Wu, "Introduction to convolutional neural networks. National Key Lab for Novel Software Technology", 2017, vol 5, Nanjing

University, China, p 23.

17. K. Younis, "Arabic handwritten characters recognition based on deep convolutional neural networks", 2018, Jordan J Comput Inform Technol (JJCIT) 3.

18. U. R. Babu, Y. Venkateswarlu, A. K. Chintha, "Handwritten digit recognition using k-nearest neighbor classifier", In Proceedings of

the 2014 World Congress on Computing and Communication Technologies, (WCCCT 2014), Trichirappalli, India, 27 February–1 March 2014; pp. 60–65.

19. X. X. Niu, C. Y. Suen, "A novel hybrid CNN-SVM classifier for recognizing handwritten digits", Pattern Recognit. 2012, 45, 1318–

1325. [CrossRef].

20. F. A. Al-omari, O. Al-jarrah, "Handwritten Indian numerals recognition system using probabilistic neural networks", Adv. Eng.

Inform. 2004, 18, 9–16.

21. M. Takruri, R. Al-Hmouz, A. Al-Hmouz, "A three-level classifier: fuzzy C means, support vector machine and unique pixels for Arabic handwritten digits", In: World Symposium on Proceedings of Computer Applications & Research (WSCAR), pp. 1—5 (2014).

22. J. H. Alkhateeb, M. Alseid, "DBN – based learning for Arabic handwritten digit recognition using DCT features", In: 2014

6thInternational Conference on Computer Science and Information Technology (CSIT), pp. 222—226 (2014). 23. M. Salameh, "Arabic digits recognition using statistical analysis for end/conjunction points and fuzzy logic for pattern recognition

techniques", World Comput. Sci. Inf. Technol. J. 4(4), 50—56 (2014).

24. O. E. Melhaoui, M. E. Hitmy, F. Lekhal, "Arabic numerals recognition based on an improved version of the loci characteristic", Int. J. Comput. Appl. 24(1), 36—41 (2011).

25. P. P. Selvi, T. Meyyappan, "Recognition of Arabic numerals with grouping and ungrouping using back propagation neural network",

In: International Conference on Proceedings of Pattern Recognition, Informatics and Mobile Engineering (PRIME), pp. 322—327 (2013).

26. S. A. Mahmoud, "Arabic (Indian) handwritten digits recognition using Gabor-based features", In: International Conference on

Proceedings of Innovations in Information Technology, IIT 2008, pp. 683—687 (2008). 27. A. El-Sawy, H. El-Bakery, M. Loey, "CNN for Handwritten Arabic digits recognition based on LeNet-5", Springer International

Publishing AG 2017.

87.

Authors: Mahima Chandane, Ankita Chavan, Renuka Kamath, Dipali Madane, Madhuri Badole

Paper Title: Intelligent Music Player Based on Emotions

Abstract: This project presents a system to automatically detect emotional dichotomy and mixed emotional

experience using a Linux based system. Facial expressions, head movements and facial gestures were captured

from pictorial input in order to create attributes such as distance, coordinates and movement of tracked points.

Web camera is used to extract spectral attributes. Features are calculated using Fisherface algorithm. Emotion

detected by cascade classifier and feature level fusion was used to create a combined feature vector. Live

actions of user are to be used for recording emotions. As per calculated result system will play songs and display

books list.

Keywords: Smart Emotion, Face Detection, Face Recognition, Emotion Prediction, OpenCV.

References:

1. Amol S Patwardhan. "Multimodal mixed emotion detection", 2017 2nd International Conference on Communication and Electronics Systems (ICCES), 2017

2. Eman Alajrami, Hani Tabash, Yassir Singer, M.T. El Astal. "On using AI-Based Human Identification in Improving Surveillance

System Efficiency", 2019 International Conference on Promising Electronic Technologies (ICPET), 2019 3. A. M. Jagtap, Vrushabh Kangake, Kushal Unune, Prathmesh Gosavi. "A Study of LBPH, Eigenface, Fisherface and Haar-like attributes

for Face recognition using OpenCV", 2019 International Conference on Intelligent Sustainable Systems (ICISS), 2019

4. van der Zwaag, Marjolein D., Joris H. Janssen, and Joyce HDM Westerink. "Directing Physiology and Mood through Music: Validation of an Affective Music Player", IEEE Transactions on Affective Computing, 2012.

5. "Machine Learning Based Malware Detection: a Boosting Methodology", International Journal of Innovative Technology and

525-528

Page 65: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

Exploring Engineering, 2020

6. Marjolein D. van der Zwaag, Joris H. Janssen, Joyce H.D.M. Westerink. "Directing Physiology and Mood through Music: Validation of an Affective Music Player", IEEE Transactions on Affective Computing, 2013.

88.

Authors: Shruti Bhavsar, Sanjana Khairnar, Pauravi Nagarkar, Sonali Raina, Amol Dumbare

Paper Title: On Time Document Retrieval using Speech Conversation and Diverse Keyword Clustering During

Presentations

Abstract: In this paper we present the idea of extracting keywords from discussions, with the point of using

these words to recuperate, for each small piece of conversation and generating reports to individuals. Regardless,

even a smaller piece contains a blend of words, which can be effortlessly interrelated to a couple of subjects;

additionally, using a customized talk affirmation (ASR) system presents slips among them. Thus it is hard to

sum up effectively the data needs of the conversation individuals. We initially propose a count to kill significant

words from the yield of an ASR system which makes usage of topic showing strategies and of a sub particular

prize limit which supports varying characteristics in the word set, to organize the potential contrasting

characteristics of subjects and diminish ASR disturbance. By then, we set forward a strategy to surmise different

topically detached requests from this definitive word set, remembering the ultimate objective is to build the

potential outcomes of making at any rate one appropriate proposition while using these inquiries to investigate

the English Wikipedia. The readings depict that our pronouncement continue ahead over past procedures that

watch simply word recurrence or idea commonality, and states the good response for a report recommended

framework to be used as a piece of conversations.

Keywords: Document Recommendation, Information retrieval keyword extraction, Meeting analysis, Local

database, Extraction, Keyword, Clustering

References:

1. A. Csomai and R. Mihalcea, ―Linking educational materials to encyclopedic knowledge,‖ in Proc. Conf. Artif. Intell.Educat.:

BuildingTechnol. Rich Learn. Contexts That Work, 2007, pp. 557–559. 2. Habibi, M., Popescu-Belis, A. (2015), Keyword Extraction and Clustering for Document Recommendation in Conversations,

IEEE/ACM Transactions on Audio, Speech, and Language Processing, 23(4), 746–759. doi:10.1109/taslp.2015.2405482

3. Hunyadi, L. - Keyword extraction: aims and ways today and tomorrow. - In: Proceedings of the Keyword Project: Unlocking Content through Computational Linguistics. 2001.

4. Pere R. Comas and Jordi Turmo ― Spoken Document Retrieval Based on Approximated Sequence Alignment‖

5. Scott Deerwester ,Susan T. Dumais , ―Indexing by latent semantic analysis‖ 6. Melville and Vikas Sindhwani, IBM T.J. Watson Research Center,Yorktown Heights, NY 105, Recommender System Prem

hw}@us.ibm.com

7. Christopher D. Manning, Prabhakar Raghavan, and Hinrich Schütze, An Introduction to Information Retrieval. Cambridge University Press, 2008

8. Khalid Al-Kofahi, Peter Jackson, Mike Dahn*, Charles Elberti, William Keenan, John Duprey.A "Document Recommendation

System Blending Retrieval and Categorization Technologies". 9. Michael J. Pazzani and "Daniel Billsus, Content-based Recommendation Systems ―.

10. Sangeetha. J 1, Kavitha R ," An Improved Privacy Policy Inference over the Socially Shared Images with Automated Annotation

Process ", / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (3) , 2015, 3166-3169. 11. Aishwarya Singh, Bhavesh Mandalkar, Sushmita Singh , Prof. yogesh Pawar, "A Survey on User-Uploaded Images Privacy Policy

Prediction Using Classification and Policy Mining",International Journal of Innovative Research in Computer and Communication

Engineering .Vol. 3, Issue 9, September 2015. 12. X. Liu, X. Zhou, Z. Fu, F. Wei, and M. Zhou, ―Exacting social events for tweets using a factor graph,‖ in Proc. AAAI Conf. Artif.

Intell., 2012, pp. 1692–1698.

13. A. Cui, M. Zhang, Y. Liu, S. Ma, and K. Zhang, ―Discover breaking events with popular hashtags in twitter,‖ in Proc. 21st ACM Int. Conf. Inf. Knowl. Manage., 2012, pp. 1794–1798.

14. A. Ritter, Mausam, O. Etzioni, and S. Clark, ―Open domain event extraction from twitter,‖ in Proc. 18th ACM SIGKDD Int. Conf.

Knowledge Discovery Data Mining, 2012, pp. 1104–1112.

529-532

89.

Authors: Abarna M, Jane Lourde Teresha A, Devisri R, Maithreyini M, V. Kumar Chinnaiyan

Paper Title: Helping Hand for Unsighted People-Acousticsight

Abstract: Technology is best when it brings people together. Today technology plays a vital role in humanity.

Also applied science can make the impossible possible. The proposed project aims to show equality in the safe

navigation of visually impaired people just like a normal person. The project aims to help the secure guidance of

humans with bad eyesight. This system support the sole in attaining the landing place, leading them across the

way and alert them about the barrier that are expected in their path through the vibration and generate simulated

speech output through headset. Therefore, this technology hold back them from striking the barrier. It add on

value to conventional canes with barrier predicting, preventing human from accident and reducing difficulties in

navigation. An ultrasonic sensor is execute to determine the distant of obstacles from the person. It is a

Raspberry Pi based platform that is used to alert the person of impending obstacles. Also can create the place for

all other components and it has functioning code. Here, a vibration motor is used to warn the person from the

collision. Combined with the role of guiding, it also has aid preventing plan in case of emergency. The GPS is

included to find the location of person and the location is sent to the person‘s family through the notification by

means of Blynk app. Accordingly, The project convince the visually impaired people can travel alone without

getting fear or accidents at the moment.

Keywords: Visually impaired, sensing, vibration motor, barrier prediction.

References:

1. Alessio Carulllo and Marco Parvis (2001) ‗An Ultrasonic Sensor for Distane Measurement in Automotive Applications‘, IEEE Sensor

534-536

Page 66: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

Journal, Vol. 1.

2. K.Gopala Krishnan, C.M.Porkodi, and K.kanimozhi (2013) ‗Image Recognition for Visually Impaired people By Sound‘, International conference on Communication and Signal Processing, Vol. 39, pp. 943-946.

3. Shashank Chaurasis and K.V.N.Kavitha (2014) ‗An Electronic Walking Stick for Blinds‘, International Conference on Information

Communication and Embedded Systems(ICICES).

4. Sung Jae Kang, Young Ho, Kim, In Hyuk Moon (2001) ‗Development of an Intelligent Guide-stick for the Blind, Seoul of Korea,

IEEE International Conference on Robotics & Automation Vol. 4.

5. N.Mahumad, R.K. Saha, R.B. Zafar , M.B.H. Bhuian and S.S.Sarwar (2014) ‗Vibration and Voice Operated System for Visually Impaired Person‘, International Conference on Informatics Electronics & Vision (ICIEV) IEEE,pp. 1-5.

90.

Authors: Kurshid Madina, Saksham Mansotra

Paper Title: Genderpredictions using Convolution Neural Networks

Abstract: Nowadays Deep learning was advanced so much in our daily life. From 2014, there is massive growth

in this technology as there is a vast amount of data present. We are even getting better results from whatever we

may do. In my work, I have used Convolution Neural Networks as my project depends on image classification.

So what I‘m trying to do is I‘m using two classes in which one class is male and one class is female. I‘m

classifying both the classes and trying to predict who is male and who is female. For this, I have been using

layers like Sequential, Convolution2D, Max-pooling, Flattening, and finally Dense. So, I connect all of these

layers. I have been using two more extra layers which are Convolution2D and max-pooling connected as one

layer for better classifications. In my model, I‘m using Adam optimizer as I‘m having only two classes and in

my experiments, I found Adam as a good optimizer and I use binary cross entropy as my loss function as I‘m

using only two classes if we have more than two classes we can use categorical loss function and the images

which I use for predictions will be converted into 64*64 matrix form. In the end, I will be getting predictions as

1 for male and 0 for female.

Keywords: Computer Vision, Gender Classification, Human-computer interaction, Convolution Neural

Network (CNN).

References:

1. M. K. Bhuyan., et al. ―A novel set of features for continuous hand gesture recognition,‖ Journal on Multimodal User Interfaces., vol.

8, no. 4, pp. 333–343, 2014. 2. Kasthurirangan Gopalakrishnan, et al. – Deep Convolution Neural Networks with transfer learning for computer vision-based data-

driven pavement distress detection,|| Journal on Elsevier, vol 157, pp 322-330,2017.

3. Deegan J Atha, et al. – Evaluation of deep learning approaches based on convolution neural networks for corrosion detection, || Journal on sage, 2017.

4. Gil Levi, Taj Hassner. – Age and Gender Classification using Convolution Neural Networks.|| predeedings of IEEE Conference on

Computer vision and pattern recognition (CVPR) Workshops, pp.34-42 ,2015. 5. Yann LeCun, et al. – Gradient-Based Learning Applied to Document Recognition.|| Proc. Of the IEEE, 1998.

6. Jianxin Wu – Introduction to Convolution Neural Networks, 2017.

7. C.-C. Jay Kuo – Understanding Convolution Neural Networks with a Mathematical Model, arXiv, 2016. 8. Dominik Scherer et al. – Evaluation of pooling Operations in Convolution Architectures for Object Recognition, ICANN,pp 92-

101,2010.

9. JonghoonJin, et al. – Flattened Convolution Neural Networks for FeedForward Acceleration, arXiv, 2015. 10. Zixian Zeng, et al. – CNN Model Design of Gesture Recognition Based on Tensorflow Framework, IEEE, 2019.

537-540

91.

Authors: Najihah Mohd Noor, Yumi Zuhanis Has-Yun Hashim, Muhammad Shirwan Abdullah Sani, Wan

Wardatul Amani Wan Salim

Paper Title: Characterization, Antibacterial and Anti-Inflammatory Activities of Electrospun poly (vinyl alcohol)

(PVA) Containing Aquilaria Malaccencis Leaf Extract (ALEX) Nanofibers

Abstract: Plant-based electrospun nanofibers are widely fabricated as wound dressing in recent years primarily

due to the presence of bioactive compounds which can facilitate the wound healing effects. In this study,

poly(vinyl alcohol) (PVA) fibre mats containing Aquilaria malaccensis leaf extract (ALEX) [5, 10 and 15

%(w/w)] were fabricated by electrospinning method as potential wound dressing material. The nanofibers were

uniform, beadless and randomly oriented with average diameters ranged between 195.27 – 281.20 nm. The

presence of ALEX in the PVA nanofibers were evaluated by Attenuated total reflectance-Fourier transform

infrared spectroscopy (ATR-FTIR) and differential scanning calorimetry (DSC). The mechanical properties,

swelling degree and weight loss of nanofiber mats were also determined. ALEX was rapidly released from the

ALEX-loaded PVA nanofibers in the first 12 hours and increased gradually afterwards. The released rate of

ALEX was dependent on the ALEX content in the PVA nanofibers. This result is also contributed by the

swelling degree and porosity of the nanofibers where the results were found to be between 241.66 – 305.86%

and 64.53 – 30.81%, respectively. Meanwhile, the tensile stress and maximum elongation at break for all

electrospun nanofiber mats were in the range of 8.56 – 2.68 MPa and 205.94 – 166.31%, respectively. The

nanofiber mats inhibited growth of Escherichia coli, Vibrio vulnificus, Bacillus subtilis and Staphylococcus

aureus with zone of inhibition of 7.5 - 15.0 mm for gram positive bacteria and 6.1 - 11.7 mm for gram negative

bacteria. ALEX-loaded PVA nanofibers also showed potent anti-inflammatory activity against lipoxygenase

with percentage of inhibition between 80.887 – 86.977%. Taken together, the results of this study suggest that

ALEX-loaded PVA nanofibers have the desired properties of bioactive wound dressing.

Keywords: Electrospinning, agarwood, polyvinyl alcohol, wound dressing

References:

1. Pilehvar-Soltanahmadi, Y., Dadashpour, M., Mohajeri, A., Fattahi, A., Sheervalilou, R., & Zarghami, N. (2017). An Overview on Application of Natural Substances Incorporated with Electrospun Nanofibrous Scaffolds to Development of Innovative Wound

541-549

Page 67: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

Dressings. Mini-Reviews in Medicinal Chemistry, 18(5), 414–427. https://doi.org/10.2174/1389557517666170308112147

2. Yousefi, I., Pakravan, M., Rahimi, H., Bahador, A., Farshadzadeh, Z., & Haririan, I. (2017). An investigation of electrospun Henna leaves extract-loaded chitosan based nanofibrous mats for skin tissue engineering. Materials Science and Engineering C, 75, 433–444.

https://doi.org/10.1016/j.msec.2017.02.076

3. Liu, Y., Wei, J., Gao, Z., Zhang, Z., & Lyu, J. (2017). A Review of Quality Assessment and Grading for Agarwood. Chinese Herbal Medicines, 9(1), 22–30. https://doi.org/10.1016/S1674-6384(17)60072-8

4. Elias, M. F., Ibrahim, H., & Mahamod, W. R. W. (2017). A Review on the Malaysian Aquilaria species in Karas Plantation and

Agarwood Production. International Journal of Academic Research in Business and Social Sciences, 7(4), 1021–1029. https://doi.org/10.6007/ijarbss/v7-i4/2911

5. Eissa, M., Hashim, Y. Z. H. Y., & Zainurin, N. A. A. (2018). Aquilaria malaccensis Leaf as an Alternative Source of Anti-inflammatory

Compounds. International Journal on Advanced Science, Engineering and Information Technology, 8(4–2), 1625. https://doi.org/10.18517/ijaseit.8.4-2.7054

6. Komakech, R., Matsabisa, M. G., & Kang, Y. (2019). The Wound Healing Potential of Aspilia africana (Pers.) C. D. Adams

(Asteraceae) . Evidence-Based Complementary and Alternative Medicine, 2019, 1–12. https://doi.org/10.1155/2019/7957860 7. Dev, S. K., Choudhury, P. K., Srivastava, R., & Sharma, M. (2019). Antimicrobial, anti-inflammatory and wound healing activity of

polyherbal formulation. Biomedicine and Pharmacotherapy, 111(September 2018), 555–567.

https://doi.org/10.1016/j.biopha.2018.12.075 8. Zainurin, N. A. A., Hashim, Y. Z. H. Y., Mohamed Azmin, N. F., & Al-Khatib, M. F. R. (2020). Understanding the effects of different

parameters of soxhlet extraction on bioactive compounds from aquilaria malaccensis leaf through GCMS-based profiling. Food

Research, 4, 63–73. https://doi.org/10.26656/fr.2017.4(S1).S09 9. Vatankhah, E. (2018). Rosmarinic acid-loaded electrospun nanofibers: In vitro release kinetic study and bioactivity assessment.

Engineering in Life Sciences, 18(10), 732–742. https://doi.org/10.1002/elsc.201800046

10. Suwantong, O., Pankongadisak, P., Deachathai, S., & Supaphol, P. (2013). The potential of electrospun poly(L-lactic acid) fiber mats containing a crude garcinia dulcis extract for use as wound dressings. Chiang Mai Journal of Science, 40(3), 517–533.

https://doi.org/10.1007/s00289-014-1102-9

11. Li, C. W., Fu, R. Q., Yu, C. P., Li, Z. H., Guan, H. Y., Hu, D. Q., … Lu, L. C. (2013). Silver nanoparticle/chitosan oligosaccharide/poly(vinyl alcohol) nanofibers as wound dressings: A preclinical study. International Journal of Nanomedicine, 8,

4131–4145. https://doi.org/10.2147/IJN.S51679

12. Shalaby, T., Hamad, H., Ibrahim, E., Mahmoud, O., & Al-Oufy, A. (2018). Electrospun nanofibers hybrid composites membranes for highly efficient antibacterial activity. Ecotoxicology and Environmental Safety, 162(July), 354–364.

https://doi.org/10.1016/j.ecoenv.2018.07.016

13. Azhar, U. haq, Malik, A., Anis, I., Khan, S. B., Ahmed, E., Ahmed, Z., Nawaz, S. A., & Choudhary, M. I. (2004). Enzymes Inhibiting Lignans from Vitex negundo. Chem. Pharm. Bull, 52(11), 1269–1272.

14. Tort, S., Acartürk, F., & Beşikci, A. (2017). Evaluation of three-layered doxycycline-collagen loaded nanofiber wound dressing. In

International Journal of Pharmaceutics (Vol. 529). https://doi.org/10.1016/j.ijpharm.2017.07.027 15. Adeli, H., Khorasani, M. T., & Parvazinia, M. (2018). Wound dressing based on electrospun PVA/chitosan/starch nanofibrous mats:

Fabrication, antibacterial and cytocompatibility evaluation and in vitro healing assay. International Journal of Biological

Macromolecules, 122, 238–254. https://doi.org/10.1016/j.ijbiomac.2018.10.115 16. Tobin, D. J. (2017). Introduction to skin aging. Journal of Tissue Viability, 26(1), 37–46. https://doi.org/10.1016/j.jtv.2016.03.002

17. Ramalingam, R., Dhand, C., Leung, C. M., Ezhilarasu, H., Prasannan, P., Ong, S. T., … Arunachalam, K. D. (2019). Poly-ε-caprolactone/gelatin hybrid electrospun composite nanofibrous mats containing ultrasound assisted herbal extract: Antimicrobial and

cell proliferation study. Nanomaterials, 9(3). https://doi.org/10.3390/nano9030462

18. Bayat, S., Amiri, N., Pishavar, E., Kalalinia, F., Movaffagh, J., & Hahsemi, M. (2019). Bromelain-loaded chitosan nanofibers prepared by electrospinning method for burn wound healing in animal models. Life Sciences, 229, 57–66.

https://doi.org/10.1016/j.lfs.2019.05.028

19. Vakilian, S., Norouzi, M., Soufi-Zomorrod, M., Shabani, I., Hosseinzadeh, S., & Soleimani, M. (2018). L. inermis-loaded nanofibrous scaffolds for wound dressing applications. Tissue and Cell, 51(February), 32–38. https://doi.org/10.1016/j.tice.2018.02.004

20. Garcia-Orue, I., Gainza, G., Gutierrez, F. B., Aguirre, J. J., Evora, C., Pedraz, J. L., … Igartua, M. (2017). Novel nanofibrous dressings

containing rhEGF and Aloe vera for wound healing applications. International Journal of Pharmaceutics, 523(2), 556–566. https://doi.org/10.1016/j.ijpharm.2016.11.006

21. Ramalingam, R., Dhand, C., Leung, C. M., Ong, S. T., Annamalai, S. K., Kamruddin, M., … Arunachalam, K. D. (2019). Antimicrobial

properties and biocompatibility of electrospun poly-ε-caprolactone fibrous mats containing Gymnema sylvestre leaf extract. Materials Science and Engineering C, 98(August 2018), 503–514. https://doi.org/10.1016/j.msec.2018.12.135

22. Manotham, S., Pengpat, K., Eitssayeam, S., Rujijanagul, G., Sweatman, D. R., & Tunkasiri, T. (2015). Fabrication of

Polycaprolactone/Centella asiatica Extract Biopolymer Nanofiber by Electrospinning. Applied Mechanics and Materials, 804, 151–154. https://doi.org/10.4028/www.scientific.net/amm.804.151

23. Suganya, S., Senthil Ram, T., Lakshmi, B. S., & Giridev, V. R. (2011). Herbal Drug Incorporated Antibacterial Nanofibrous Mat

Fabricated by Electrospinning: An Excellent Matrix For Wound Dressings. Journal of Applied Polymer Science, 121(5), 2893–2899. https://doi.org/10.1002/app.33915

24. Wisastra, R., Ghizzoni, M., Boltjes, A., Haisma, H. J., & Dekker, F. J. (2012). Anacardic acid derived salicylates are inhibitors or

activators of lipoxygenases. Bioorganic and Medicinal Chemistry, 20(16), 5027–5032. https://doi.org/10.1016/j.bmc.2012.06.019 25. Whitman, S., Gezginci, M., Timmermann, B. N., & Holman, T. R. (2002). Structure-activity relationship studies of nordihydroguaiaretic

acid inhibitors toward soybean, 12-human, and 15-human lipoxygenase. Journal of Medicinal Chemistry, 45(12), 2659–2661.

https://doi.org/10.1021/jm0201262 26. Leelaprakash, G., & Mohan Dass, S. (2011). Invitro anti-inflammatory activity of methanol extract of enicostemma axillare.

International Journal of Drug Development and Research, 3(3), 189–196.

92.

Authors: Pallavi S Biradar, Anand Jatti

Paper Title: Face and Thumb Based Multimodal Bio-Metric Authentication using Harris Feature Extraction and

Stenography

Abstract: In the past recent, identification of a person in an effective manner is a foremost concern for any

security authentication in numerous applications such as, banking, e-commerce, communications etc. One of the

best identification technology for person identification and authentication compared with the existing password

based authentication is the multimodal biometric technology. Multimodal can be defined as, a system which uses

two or more biometrics for identification of person. In the paper we propose a multimodal bio-metric system

with a unique methodology and features extraction method incorporated in system for a secure authentication.

The two modalities used in the system are face and thumb. We use Harris based image feature extraction for

both and choose the best unique features from both and fused using concatenation. The extracted unique features

are embedded in a cover image using modulo operator based steganography technique. This encrypted data is

shared as an image file to the receiver for authentication. At the receiver end the hidden features are decrypted

and separated into face and thumb features. These decrypted features are compared with the pre-trained

550-555

Page 68: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

authorized person feature, based on the multi-svm classifier result the person is decided as authorized or

unauthorized. The accuracy of the system is been calculated and was resulted in a good accuracy. The system

can be made much more secure by adding an additional secret key for encryption and decryption.

Keywords: Bio-metric, Harris, modulo operator, multi-modal, multi-svm. Stenography.

References:

1. X. Zhang, D. Cheng, P. Jia, Y. Dai and X. Xu, "An Efficient Android-Based Multimodal Biometric Authentication System With Face

and Voice," in IEEE Access, vol. 8, pp. 102757-102772, 2020, doi: 10.1109/ACCESS.2020.2999115. 2. A. Herbadji, N. Guermat, L. Ziet and M. Cheniti, "Multimodal Biometric Verification using the Iris and Major Finger Knuckles," 2019

International Conference on Advanced Electrical Engineering (ICAEE), Algiers, Algeria, 2019, pp. 1-5, doi:

10.1109/ICAEE47123.2019.9014704. 3. B. Ammour, T. Bouden and L. Boubchir, "Face-Iris Multimodal Biometric System Based on Hybrid Level Fusion," 2018 41st

International Conference on Telecommunications and Signal Processing (TSP), Athens, 2018, pp. 1-5, doi: 10.1109/TSP.2018.8441279.

4. K. Meng, Z. Huang, X. Wang and K. Wang, "Multimodal Biometric Verification Using Sparse Representation Based Classification,"

2018 IEEE 3rd International Conference on Image, Vision and Computing (ICIVC), Chongqing, 2018, pp. 26-31, doi: 10.1109/ICIVC.2018.8492886.

5. P. Jayapriya and R. Manimegalai, "Finger Knuckle Biometric Authentication using Texture-Based Statistical Approach," 2018

International Conference on Intelligent Computing and Communication for Smart World (I2C2SW), Erode, India, 2018, pp. 170-174, doi: 10.1109/I2C2SW45816.2018.8997143.

6. M. G. Gurubasavanna, S. Ulla Shariff, R. Mamatha and N. Sathisha, "Multimode authentication based Electronic voting Kiosk using

Raspberry Pi," 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018 2nd International Conference on, Palladam, India, 2018, pp. 528-535, doi:

10.1109/I-SMAC.2018.8653726.

7. K. Ramesh, M. V. Prasad and K. Hemachandran, "Design and implementation of advanced ARM7 based biometric security system using wireless communication," 2018 2nd International Conference on Inventive Systems and Control (ICISC), Coimbatore, 2018, pp.

543-546, doi: 10.1109/ICISC.2018.8398859.

8. M. Hammad, Y. Liu, and K. Wang, ―Multimodal Biometric Authentication Systems Using Convolution Neural Network based on Different Level Fusion of ECG and Fingerprint,‖ IEEE Access, vol. 7, pp. 26527-26542, 2018.

9. S. Nakagawa, L. Wang, and S. Ohtsuka, ―Speaker identification and verification by combining MFCC and phase information,‖ IEEE

Trans. Audio Spe., vol. 20, no. 4, pp.1085-1095, 2012. 10. W. Yang, Z. Wang, and B. Zhang, ―Face recognition using adaptive local ternary patterns method,‖ Neurocomputing, vol. 213, pp.183-

190, 2016.

93.

Authors: Shrugal Varde, M.S.Panse

Paper Title: Stereo Vision-based Path Finder for Visually Impaired

Abstract: This paper introduces a novel electronic mobility aid for visually impaired users that helps them

navigate in any given environment and avoid knee level to head height obstacles. The mobility aid uses stereo

imaging system to capture the images of the area in front of the user. The processing unit generates a disparity

map and a segmentation algorithm extracts information about the relative distance of obstacles from the user.

This information is relayed to the user in simplified vibration pattern feedback to inform the user of the path to

be taken to avoid collision with the obstacle. Special hardware was designed to make the system portable and

cost effective.The mobility aid was validated on 55 visually impaired users. The subjects walked in a controlled

test environment with a varying number of obstacles placed in their path. The accuracy of the device to help the

user avoid obstacles and the average speed of walking of the user were determined. The results obtained were

satisfactory and the device has the potential for use in standalone mode as well as in conjunction with a white

cane and thus help visually impaired people counter mobility problems.

Keywords: visually impaired, stereo, mobility, disparity, navigation

References:

1. Global data on visually impairement. World Health Organization, 2010.

2. C. Jackson, ―Correspondence with Carroll L. Jackson, Executive Director of the Upshaw Institute for the Blind,‖, Available ftp.eecs.umich.edu/people/johannb/Carroll_Jackson_Letter.pdf, Aug.1995

3. I. Ulrich and J. Borenstein, "The GuideCane-applying mobile robot technologies to assist the visually impaired," in IEEE Transactions

on Systems, Man, and Cybernetics - Part A: Systems and Humans, vol. 31, no. 2, pp. 131-136, March 2001. 4. K. Ito, M. Okamoto, J. Akita, T. Ono, I. Gyobu, T. Tagaki, T. Hoshi, and Y. Mishima, ―CyARM: An alternative aid device for blind

persons,‖ CHI '05 Extended Abstracts on Human Factors in Computing Systems, Portland, OR, Apr. 2–7, 2005, pp. 1483–1488.

5. S. Shoval, J. Borenstein and Y. Koren, "Mobile robot obstacle avoidance in a computerized travel aid for the blind," Proceedings of the 1994 IEEE International Conference on Robotics and Automation, San Diego, CA, USA, 1994, pp. 2023-2028 vol.3.

6. D. Aguerrevere, M. Choudhury, and A. Barreto, ―Portable 3D sound / sonar navigation system for blind individuals,‖ presented at the

2nd LACCEI Int. Latin Amer. Caribbean Conf. Eng. Technol. Miami, FL, Jun. 2–4 2004. 7. S. Meers and K. Ward, ―A substitute vision system for providing 3D perception and GPS navigation via electro-tactile stimulation,‖

presented at the 1st Int. Conf. Senor. Technology, Palmerston North, New Zealand, Nov. 21–23, 2005

8. L. A. Johnson and C. M. Higgins, "A Navigation Aid for the Blind Using Tactile-Visual Sensory Substitution," 2006 International Conference of the IEEE Engineering in Medicine and Biology Society, New York, NY, 2006, pp. 6289-6292.

9. P. B. L. Meijer, "An experimental system for auditory image representations," in IEEE Transactions on Biomedical Engineering, vol.

39, no. 2, pp. 112-121, Feb. 1992. 10. J. L. Gonzalez-Mora, A. F. Rodriguez-Hernaindez, E. Burunat, F. Martin and M. A. Castellano, "Seeing the world by hearing: Virtual

Acoustic Space (VAS) a new space perception system for blind people.," 2006 2nd International Conference on Information &

Communication Technologies, Damascus, 2006, pp. 837-842. 11. S. Kammoun, G. Parseihian, O. Gutierrez, A. Brilhault, A. Serpa, M. Raynal, B. Oriola, M.J.-M. Macé, M. Auvray, M. Denis, S.J.

Thorpe, P. Truillet, B.F.G. Katz, C. Jouffrais, Navigation and space perception assistance for the visually impaired: The NAVIG

project,IRBM,Volume 33, Issue 2,2012,Pages 182-189.

556-561

94. Authors: Rohit B Kaliwal, Santosh L Deshpande

Page 69: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

Paper Title: Efficiency of Probabilistic Network Model for Assessment in E-Learning System

Abstract: The knowledge acquirement by the learner is a major assignment of an E-Learning framework.

Evaluation is required in order to adapt knowledge resources and task to learner ability. Assessment provides

learner‘s an approach to evaluate the skills gained through the e-learning domain they are accessing. A

dissimilar method can be used to assess the information acquirement, such as probabilistic Bayesian Network

model. A Bayesian Network is a graphical representation of the probabilistic relationships of a complex system.

This network can be used for reasoning with uncertainty. Bayesian Network is the most challenging task in e-

learning system as learner evaluation model are an element of uncertainty. In this paper the current proposed

scheme is constructed on Bayesian Network to deduce the stage of knowledge possessed by the learner. It also

proposes type of assessment to identify the knowledge whatever the learner identifies. Throughout the

assessment, it can be performed by two approaches namely Sequential and Random. In Sequential approach,

questions can be displayed on the learner machine in sequential order. In Random approach, questions can be

displayed on the learner machine in random order. However, both have their inherent limitations. Questions that

are considered to be answered easily by the learner may also be presented to the learner who is not desirable.

This system determined on the illustration of Bayesian Network model and algorithm for inference about

learner‘s knowledge. The Bayesian Network model was efficiently implemented for three levels of learner called

Higher Learners (HL), Regular Learners (RL) and Irregular Learners (IL) for learner‘s assessment and was

successfully implemented with 81.1% of probabilities for learner‘s assessment.

Keywords: Assessment, Knowledge design, Bayesian Network (BN), Evaluation, E-Learning, Intelligent

Tutoring System (ITS)

References:

1. Carbonell, J.R, ―AI in CAI: an artificial intelligence approach to computer assisted instruction‖, IEEE transaction on Man. Machine System, pp.190–202, 1970.

2. R. Santhi, B. Priya, J.M. Nandhini, ―Review of intelligent tutoring systems using bayesian approach‖, 2013.

3. Radenkovic, B, ―Web portal for adaptive e-learning. Telecommunication in Modern Satellite Cable and Broadcasting Services (TELSIKS)‖, 10th International Conference, pp. 365 – 368, 2011.

4. Joseph Psotka, Sharon A. Mutter, ―Intelligent Tutoring Systems: Lessons Learned‖, Lawrence Erlbaum Associates, ISBN 0-8058-

0192–8, 1988. 5. Ramırez-Noriega, A. Juarez-Ramırez, R. Huertas, C. Martınez-Ramırez, Y, ―A Methodology for building Bayesian Networks for

Knowledge Representation in Intelligent Tutoring Systems‖, In: Congreso Internacional de Investigacion e Innovacion en Ingenierıa de

Software, pp. 124–133, 2015. 6. Millan E, Descal co, L. Castillo, G. Oliveira, P. Diogo S, ―Using Bayesian networks to improve knowledge assessment‖, Computers &

Education, pp.436–447, 2013.

7. Kammerdiner, ―A.: Bayesian networks Bayesian Networks‖, In: Floudas, C.A., Pardalos, P.M. (eds.) Encyclopedia of Optimization SE - 32, pp. 187–196. Springer US 2009.

8. Liu, Z., Wang H, ―A Modeling Method Based on Bayesian Networks in Intelligent Tutoring System Structure‖, pp. 967–972, 2007.

9. Srinivas. R. M, Dr. D.H. Rao, ―Application of Bayesian Networks for Learner Assessment in E-Learning Systems‖, International Journal of Computer Applications Volume 4 – No.4, pp. 0975 – 8887, July 2010.

10. Goguadze, G. Sosnovsky, S. Isotani, S., McLaren, B.M, ―Evaluating a Bayesian Student Model of Decimal Misconceptions‖, In:

Proceedings of the 4th International Conference on Educational Data Mining, 2011. 11. Torabi, R., Moradi, P., Khantaimoori, A.R, ―Predict Student Scores Using Bayesian Networks‖, Procedia - Social and Behavioral

Sciences, pp.4476–4480, 2012.

12. Mahbobe Bani Asad Askari, Mostafa Ghazizadeh Ahsaee, ―Bayesian network structure learning based on cuckoo search algorithm‖, 6th Iranian Joint Congress on Fuzzy and Intelligent Systems, 2018.

13. De Bruyn, E. Mostert, E. Van Schoor, ―Computer-based testing - The ideal tool to assess on the different levels of Bloom‘s taxonomy‖, 2011 14th International Conference on Interactive Collaborative Learning, ICL 2011 - 11th International Conference Virtual

University, VU‘11,September, pp.444–449, 2011.

14. Oktariani Nurul Pratiwi, Yenie Syukriyah, ―Question Classification for e-Learning Using Machine Learning Approach‖, International

Conference on ICT for Smart Society (ICISS), 2020.

15. J Pearl, ―Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference‖, Morgan Kaufmann, 1988. 16. Nazeeh Ghatasheh, ―Knowledge Level Assessment in e-Learning Systems Using Machine Learning and User Activity Analysis‖,

International Journal of Advanced Computer Science and Applications, Vol. 6, No. 4, 2015.

562-566

95.

Authors: Sk. Faruque Ahmed, Mohibul Khan, Nillohit Mukherjee

Paper Title: Synthesis and Optical Characterization of Carbon Nanofibers

Abstract: Radio frequency plasma enhanced chemical vapor deposition technique has been used to synthesized

graphitic carbon nanofibers thin films. Ni catalyst in thin film form used for the synthesis of carbon nanofibers.

The deposition temperature of the substrate has been varied from 500 - 600 0C. The morphology of the CNF

thin films changed with the variation of substrate temperature. The graphitic phase of the synthesized carbon

nanofibers has confirmed by X-ray diffraction patterns analyses. Field emission scanning electron microscopic

studies showed fibrous structure in the films. The length of the carbon nanofibers few micrometers and the

diameter range 300-400 nm. The different vibrational modes of carbon nanofibers analyzed using Fourier

transformed infrared spectroscopy measurements. Photoluminescence of the carbon nanofibers have also been

studied which showed a strong emission peak at 468 nm.

Keywords: Carbon nanofibers; RF-PECVD; XRD; FESEM; FTIR, Photoluminescence.

References:

1. H. W. Kroto, J. R. Heath, S. C. O‘Brien, R.F. Curl, R. E. Smalley, ―C60: Buckminsterfullerene‖ Nature, 354 (1985) 162-163

2. S Ijima, ―Helical microtubules of graphitic carbon‖, Nature, 354 (1991) 56-58.

3. A. G. Rinzler, J.H. Hafner, P. Nikolaev, L. Lou, S. G. Kim, D. Tomanek, P. Nordlander, D. T. Colbert, R. E. Smalley, ―Unraveling

567-570

Page 70: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

Nanotubes: Field Emission from an Atomic Wire‖, Science, 269 (1995) 1550-1553.

4. S. Tatsuura, M. Furuki, Y. Sato, I. Iwasa, M. Tian, H. Mitsu, ―Semiconductor Carbon Nanotubes as Ultrafast Switching Materials for Optical Telecommunications‖, Adv. Mater., 15 (2003) 534-537.

5. K. Liu, Ph Avouris, R. Martel, W.K. Hsu, ―Electrical transport in doped multiwalled carbon nanotubes‖, Phys. Rev. B, 63 (2001)

161404 (R).

6. V. V. Simonyan, J. K. Johnson, ―Hydrogen storage in carbon nanotubes and graphitic nanofibers‖, J. Alloys and Comp., 330-332

(2002) 659-665.

7. Y. Y. Wei, G. Eres, ―Directed assembly of carbon nanotube electronic circuits,‖ Appl. Phys. Lett., 76 (2000) 3759. 8. N. Choi, T. Uchihashi, H. Nishijima, T. Ishida, W. Mizutani, S. Akita, Y. Nakayama, M. Ishikawa, H. Tokumoto, ―Atomic Force

Microscopy of Single-Walled Carbon Nanotubes Using Carbon Nanotube Tip‖, Jpn. J. Appl. Phys., 39 Part1 (2000) 3707.

9. N. Gupta, S. M. Gupta, S. K. Sharma, ―Carbon nanotubes: synthesis, properties and engineering applications‖, Carbon Letters, 29 (2019) 419-447.

10. Y. Ando, X. Zhao, ―Synthesis of Carbon Nanotubes by Arc Discharge method, New Diamond and frontier carbon technology‖, New

Diamond and Frontier Carbon Technology, 16 (2006) 123-137. 11. C. M. Chena, Y. M. Dai, J. G. Huan, J. M. Jehng, ―Intermetallic catalyst for carbon nanotubes (CNTs) growth by thermal chemical

vapor deposition method‖, Carbon, 44 (2006) 1808-1820.

12. Y. Matsumoto, M. T. Oe, M. Nakao, K. Kamimura, Y. Onuma, H. Matsushima, ―Preparation of carbon nanofibers by hot filament-assisted sputtering‖, Mater. Science and Eng. B, 74 (2000) 218-221.

13. S. Hondaa, K. Y. Leea , K. Fujimotoa , K. Tsujia , S. Ohkuraa , M. Katayamaa , T. Hiraob , K. Ouraa, ―Formation of carbon nanofiber

films by RF magnetron sputtering method‖, Physica B, 323 (2002) 347-349. 14. T. Ikunoa, J. T. Ryub, T. Oyamaa, S. Ohkuraa, Y. G. Baeka, S. Hondaa, M. Katayamaa, T. Hiraoc, K. Ouraa, ―Characterization of low

temperature growth carbon nanofibers synthesized by using plasma enhanced chemical vapor deposition‖, Vacuum, 66 (2002) 341-

345. 15. Sk. F. Ahmed, M. Khan, N. Mukherjee, ―Enhancement of Electrical Property of Carbon Nanotube by Silicon Incorporation‖

International Journal of Engineering and Advanced Technology, 10 (2020) 62-65.

16. T. Yanase, T. Miura, T. Shiratori, M. Weng, T. Nagahama, T. Shimada, ―Synthesis of Carbon Nanotubes by Plasma-Enhanced Chemical Vapor Deposition Using Fe1−xMnxO Nanoparticles as Catalysts: How Does the Catalytic Activity of Graphitization Affect the

Yields and Morphology‖, Journal of Carbon Research, 5 (2019) 46.

17. R. Seshadri, A. Govindaraj, N. H. Aiyer, R. Sen, G. N. Subbanna, A. R. Raju and C. N. R. Rao "Investigations of Carbon Nanotubes", Current Science, 66 (1994) 839-847.

18. JCPDS data file no. 00-013-0148.

19. C. Balazsi, Z. Konya, F. Weber, L. P. Biro, P. Arato, ―Preparation and characterization of carbon nanotube reinforced silicon nitride composites‖ Materials Science and Engineering C, 23 (2003) 1133-1167.

20. J. Jang, J. Bae, S. H. Yoon, ―A study on the effect of surface treatment of carbon nanotubes for liquid crystalline epoxide–carbon

nanotube composites‖ J. Mater. Chem. 13 (2003) 676-681. 21. C. Deeney, S. Wang, S. A. Belhout, A. Gowen, B. J. Rodriguez, G. Redmond, S. J. Quinn, ―Templated microwave synthesis of

luminescent carbon nanofibers‖ RSC Adv., 8 (2018) 12907-12917.

22. C. Li, G Shi, ―Carbon nanotube-based fluorescence sensors‖ J. of Photochemistry and Photobiology C: Photochemistry Reviews, 19 (2014) 20-34.

96.

Authors: Victor Alcántara Alza

Paper Title: Cyanide in salt bath Applied to ASTM A-517 Steel: Effects on Hardness, Wear and Microstructure

Abstract: The effects of the cyanide treatment (CN) in a salt bath at elevated temperatures on the hardness;

adhesive and abrasive wear; of ASTM A-517 steel, were investigated. For abrasive wear, 1‖ x 3‖ x 5/16"

samples were prepared according to ASTM G-65 standard. For adhesive wear, specimens wit ring-shaped: φ ext.

= 40 mm, φ int = 20 mm and 10 mm thick, according to ASTM G -77. The CN treatment was carried out, at high

temperatures: 800 – 850 – 900 – 950 °C, immersing the samples in a salt bath: 6% NaCN + 80% BaCl2 + 14%

NaCl before entering the muffle furnace, with soaking time of 3 hr. Hardness tests were performed on a

Rockwell Durometer taking measurements on the HRC scale. The adhesive wear tests were carried out on a

parallel lathe coupling the Amsler device, following the ASTM G-77 standard. The abrasive wear tests were

performed according to the ASTM G65 standard. Microscopy was done at the optical level. A maximum

hardness of 63.5 HRC was found in all samples, representing an increase of 11.3% with respect to the state of

supply (T&R). In abrasive wear, its value increased to 66%, compared to supply samples. The most suitable

microstructure is presented by cyanide samples at 850ºC, with a layer of compounds (hard layer) formed by:

massive cementite; tempered martensite and carbide. It is concluded that when applying cyanide to ASTM A-

517 steel, the hardness and wear properties are increased to optimal values, if the cyanide treatment (CN) is

carried out at 850 °C.

Keywords: Cyanide, adhesive wear, abrasive wear, wear steels, surface hardening

References:

1. M. Ferreira, ―Desgaste de Materiales – Introducción‖ [online]. Available:

2. https://docplayer.es/9344147-Desgaste-de-materiales.html

3. K. Hock, ―Wear Resistance of pernitrided hardcoated steels for tools and machine components‖. Elsevier Science Publishers, Amsterdam, 1996

4. T. Kumar, J. Ambulingam, M. Gopal, A. Rajadurai., ―Surface hardening of AISI 304, 316, 304l and 316l SS using cyanide free sa lt

bath nitriding process‖. International Symposium of Research Students on Materials Science and Engineering. December 2002-04

Chennai India.

5. B. Selcuk, R. Ipek, and B.M. Karami M., ―A study on friction and wear behaviour of carburized, carbonitrided and borided AISI 1020

and 5115 steels‖. Journal of Materials processing Technology. Vol 141, pp 189-196. 6. G.Wahl, ―Effect of carbonitriding schedules and subsequent oxidation on the properties of articles‖. VII International Congress on Heat

Treatment of Materials. Vol

7. 33, No 7, pp 487-490. 8. A. P Guliaev, ―Metalografía‖. 2º Edición. Editorial Mir, Moscú, 1983

9. G. J. Li, Q. Peng, C. Li, Y. Wang, J. Gao, S. Chenc, J. Wang and B. Shen (2008), ―Effect of DC plasma nitriding temperature on

microstructure and dry-sliding wear properties of 316L stainless steel‖. Journal of Surface Coatings. 202(12), pp: 2749-2754. 10. J. Suchanek and V. Kuklik,. (2009), ―Influence of heat and thermochemical on abrasion resistance of structural and tool steels‖. Wear,

vol 267, pp 2100-2108

571-580

Page 71: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

11. S.P Ayodeji, T.E Abioye and S.O Olanrewaju; ―Investigation of Surface Hardness of Steels in Cyanide Salt Bath Heat Treatment

Process" IMECS 2011, March 16-18, 2011, Hong Kong, Vol II, ISBN: 978-988-19251-2-1 12. I. Hilerio, E. López, H. Jiménez, M.A. Barrón. (2006) ―Estudio del comportamiento del acero AISI 8620 en abrasion seca‖ Memorias

del XII congreso internacional anual de la SOMIM, México.

13. C. Bohórquez, (2007), Nitrocarburación austenítica de los aceros AISI/SAE 1020 y 8620 mediante el empleo de alcoholes y nitrurantes

líquidos, Universidad libre, Bogotá, colombia.‖8° congreso iberoamericano de Ing. Mecánica‖.

14. Z. Zhou, M. Dai, Z. Shen, J. Hu; A novel rapid D.C. salt bath nitrocarburizing technology, Vacuum 109 (2014) 144-147

15. DOI: http://dx.doi.org/10.1016/j.vacuum.2014.07.016 16. 13. A.P. García, G. Vargas, J. López; Evolución microestructural de la superficie del acero inoxidable AISI 304 L oxinitrocarburizado

en un baño de sal libre de cianuro y su potencial aplicación en colectores insolares, Surface & coatings Technology 353 (2018) 190-198

17. 14. Propiedades del Acero Antidesgaste CHRONIT T-1, Aceros Bohler del Perú, S.A. (2007). Available: 18. https://dokumen.tips/documents/propiedades-acero-chronit-t-1-400-y-chronit-t-1-500-plancha-antidesgaste.html (URL)

19. 15. Friction, Lubrication, and Wear Technology, ASM Handbook 1992, Vol. 18, International. USA

20. 16. K.H. Zum Gahr., Microstructure and wear of materials, Elsevier, Amsterdam, 80 – 350, 1987. 21. 17. M.A.L. Márquez, Diseño de una máquina tribológica para pruebas de desgaste abrasivo severo, Tesis de Maestría, SEPI ESIME

IPN, México, Febrero de 2002.

22. 18. N. P. Suh, Tribophysics, Edit. Prentice Hall, USA. 1986 23. 19. R. G. Bayer, Mechanical wear prediction and prevention, Edi. Marcel Dekker, 1994. USA

24. 20. I. Hutchings, P. Shipway, Tribology: Friction and wear of engineering materials, Second Edition, 2017. Ed. Elsevier

25. eBook ISBN: 9780081009512

97.

Authors: Edy Budiman, Andi Tejawati, Ummul Hairah

Paper Title: Bioinformatics Database Query Performance and Optimization

Abstract: Borneo bioinformatics portal test is a critical element of SQA and represents a comprehensive review

of specifications, design and coding. The test represents an abnormality in the development of the portal. A

series of tests systematically reveals several different types of errors. This study aims to evaluate the

performance and optimization of Borneo's Bioinformatics portal with a series test activities using the Web

Performance Optimization methodology. Testing query performance with measuring the response time and page

loading timings from the object relationship mapping (ORM) model Laravel PHP framework in offline and

online. For optimization, we set a pre-test and post-test scenario to evaluate the efficiency performance test

results. The results study found that the query relation model, parsing script (javaScript and CSS), service scale

and dimension images in the interaction process to the database are the dominant resources affecting the

performance of the Bioinformatics portal. Performance optimization through determining the appropriate query

relation model, minify and defer parsing script or combine images using CSS sprites to reduce scala image.

Keywords: Bioinformatics, query, database relationship, ORM.

References:

1. J. Y. Chen, J. V. Carlis, and N. Gao, ―A complex biological databases querying method,‖ Proceedings of the ACM Symposium on Applied Computing, vol. 1, no. March 2005, pp. 110–114, 2005, doi: 10.1145/1066677.1066708.

2. A. Messina, A. Fiannaca, L. La Paglia, M. La Rosa, and A. Urso, ―BioGraph: A web application and a graph database for querying and

analyzing bioinformatics resources,‖ BMC Systems Biology, 2018, doi: 10.1186/s12918-018-0616-4. 3. H. Haviluddin, E. Budiman, and N. F. Hidayat, ―A database integrated system based on SOAP web service,‖ TEM Journal, 2019, doi:

10.18421/TEM83-12.

4. A. Kalderimis et al., ―InterMine: Extensive web services for modern biology,‖ Nucleic Acids Research, 2014, doi: 10.1093/nar/gku301. 5. E. Budiman, N. Puspitasari, Haerullah, M. Jamil, M. Wati, and A. Saudek, ―Evaluation of the bioinformatics resource portal,‖ in

Proceedings - 2018 3rd International Conference on Information Technology, Information Systems and Electrical Engineering,

ICITISEE 2018, 2018, pp. 54–59, doi: 10.1109/ICITISEE.2018.8720973. 6. J. Chomicki and D. Toman, ―Temporal Databases,‖ in Foundations of Artificial Intelligence, Volume 1., L. V. M. Fisher, D. Gabbay,

Ed. Elsevier B.V., 2005, pp. 429–467.

7. P. Cybula, H. Kozankiewicz, K. Stencel, and K. Subieta, ―Optimization of distributed queries in grid via caching,‖ 2005, doi:

10.1007/11575863_58.

8. E. Budiman, N. Puspitasari, S. N. Alam, T. M. A. Akbar, Haeruddin, and D. Indra, ―Performance analysis of the resource loading time for borneo biodiversity information system,‖ 2018, doi: 10.1109/IAC.2018.8780515.

9. S. Wu, F. Li, S. Mehrotra, and B. C. Ooi, ―Query optimization for massively parallel data processing,‖ 2011, doi:

10.1145/2038916.2038928. 10. E. Budiman, N. Puspitasari, M. Wati, J. A. Widians, and Haviluddin, ―Web Performance Optimization Techniques for Biodiversity

Resource Portal,‖ Journal of Physics: Conference Series, vol. 1230, no. 1, 2019, doi: 10.1088/1742-6596/1230/1/012011.

11. L. Zamboulis, N. Martin, and A. Poulovassilis, ―Query performance evaluation of an architecture for fine-grained integration of heterogeneous grid data sources,‖ Future Generation Computer Systems, 2010, doi: 10.1016/j.future.2010.05.008.

12. E. Budiman and S. N. Alam, ―Database: Taxonomy of plants Nomenclature for borneo biodiversity information system,‖ 2018, doi:

10.1109/IAC.2017.8280642. 13. L. Caroprese, E. Zumpano, and E. Vocaturo, ―No SQL Database Management Systems for Big Data,‖ International Journal of

Engineering and Advanced Technology, vol. 9, no. 5, pp. 21–26, 2020, doi: 10.35940/ijeat.D9145.069520.

14. N. Puspitasari and E. Budiman, ―Evaluation of Borneo‘s Biodiversity Information System,‖ 2018 Electrical Power, Electronics, Communications, Controls and Informatics Seminar, EECCIS 2018, pp. 434–439, 2019, doi: 10.1109/EECCIS.2018.8692955.

15. N. K. Gundla and Z. Chen, ―Creating NoSQL Biological Databases with Ontologies for Query Relaxation,‖ 2016, doi:

10.1016/j.procs.2016.07.120.

16. N. Dengen, E. Budiman, J. A. Widians, M. Wati, U. Hairah, and M. Ugiarto, ―Biodiversity information system: Tropical rainforest

borneo and traditional knowledge ethnic of dayak,‖ Journal of Telecommunication, Electronic and Computer Engineering, vol. 10, no.

1–9, 2018. 17. E. Budiman, M. Jamil, U. Hairah, H. Jati, and Rosmasari, ―Eloquent object relational mapping models for biodiversity information

system,‖ in 2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT), Aug.

2017, vol. 2018-Janua, pp. 1–5, doi: 10.1109/CAIPT.2017.8320662. 18. U. Hairah, A. Tejawati, E. Budiman, and F. Agus, ―Borneo biodiversity: Exploring endemic tree species and wood characteristics,‖ in

Proceeding - 2017 3rd International Conference on Science in Information Technology: Theory and Application of IT for Education,

Industry and Society in Big Data Era, ICSITech 2017, 2017, vol. 2018-Janua, pp. 435–440, doi: 10.1109/ICSITech.2017.8257152. 19. L. A. Bultet et al., ―The SIB Swiss Institute of bioinformatics‘ resources: Focus on curated databases,‖ Nucleic Acids Research, vol. 44,

no. D1, pp. D27–D37, 2016, doi: 10.1093/nar/gkv1310.

581-588

Page 72: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

20. M. Cannataro and P. Veltri, ―Bioinformatics web portals,‖ in Selected Readings on Database Technologies and Applications, 2008.

21. P. Artimo et al., ―ExPASy: SIB bioinformatics resource portal,‖ Nucleic Acids Research, 2012, doi: 10.1093/nar/gks400. 22. Haeruddin, H. Johan, U. Hairah, and E. Budiman, ―Ethnobotany database: Exploring diversity medicinal plants of Dayak Tribe

Borneo,‖ in International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), 2017, vol. 2017-Decem,

doi: 10.1109/EECSI.2017.8239094.

23. J.-S. Varré, B. Schmidt, S. Janot, and M. Giraud, ―Manycore High-Performance Computing in Bioinformatics,‖ 2011.

24. P. D. Karp et al., ―A comparison of microbial genome web portals,‖ Frontiers in Microbiology. 2019, doi: 10.3389/fmicb.2019.00208.

25. W. W. Li et al., ―Building cyberinfrastructure for bioinformatics using service oriented architecture,‖ 2006, doi: 10.1109/ccgrid.2006.1630932.

26. E. Budiman and S. N. Alam, ―User perceptions of mobile internet services performance in borneo,‖ in 2017 Second International

Conference on Informatics and Computing (ICIC), Nov. 2017, vol. 2018-Janua, pp. 1–6, doi: 10.1109/IAC.2017.8280643. 27. S. Kaur, K. Kaur, and P. Kaur, ―An Empirical Performance Evaluation of Universities Website,‖ International Journal of Computer

Applications, 2016, doi: 10.5120/ijca2016910922.

28. D. E. Luna, L. F. Luna-Reyes, J. R. Gil-Garcia, and R. Sandoval-Almazán, ―Government web portals performance evaluation using data envelopment analysis,‖ 2011, doi: 10.1145/2037556.2037617.

29. D. google, ―About PageSpeed Insights,‖ developers.google.com. https://developers.google.com/speed/docs/insights/v5/.

30. Marcelduran, ―Web Performance Best Practices and Rules,‖ yslow.org. http://yslow.org/. 31. Carbon60, ―Recommendations,‖ gtmetrix.com. https://gtmetrix.com/recommendations.html (accessed Jun. 06, 2020).

32. marcelduran, ―YSlow Ruleset Matrix,‖ yslow.org. http://yslow.org/ruleset-matrix/.

33. Widjaja, Kekinian Keanekaragaman Hayati Indonesia 2014. 2014. 34. E. Budiman, N. Puspitasari, M. Wati, Haviluddin, and R. Rahim, ―Model Framework for Development of Biodiversity Information

Systems,‖ Journal of Physics: Conference Series, vol. 1230, no. 1, 2019, doi: 10.1088/1742-6596/1230/1/012012.

35. D. F. R. A. Cleary and L. DeVantier, ―Indonesia: Threats to the Country‘s Biodiversity,‖ Encyclopedia of Environmental Health, no. November 2017, pp. 622–632, 2011, doi: 10.1016/B978-0-444-52272-6.00504-3.

98.

Authors: D.B.Shanmugam, J.Dhilipan, A.Vignesh, T.Prabhu

Paper Title: Challenges in Data Quality and Complexity of Managing Data Quality Assessment in Big Data

Abstract: High Quality Data are the precondition for examining and making use of enormous facts and for

making sure the estimation of the facts. As of now, far reaching exam and research of price gauges and

satisfactory appraisal strategies for massive records are inadequate. To begin with, this paper abridges audits of

Data excellent studies. Second, this paper examines the records attributes of the enormous records condition,

presents high-quality difficulties appeared by large data, and defines a progressive facts exceptional shape from

the point of view of records clients. This system accommodates of big records best measurements, best

attributes, and best files. At long last, primarily based on this system, this paper builds a dynamic appraisal

technique for records exceptional. This technique has excellent expansibility and versatility and can address the

troubles of enormous facts fine appraisal. A few explores have verified that preserving up the character of

statistics is regularly recognized as hazardous, however at the equal time is considered as simple to effective

basic leadership in building aid the executives. Enormous data sources are exceptionally wide and statistics

structures are thoughts boggling. The facts got may additionally have satisfactory troubles, for example, facts

mistakes, lacking data, irregularities, commotion, and so forth. The motivation behind facts cleansing (facts

scouring) is to pick out and expel mistakes and irregularities from facts so as to decorate their quality.

Information cleansing may be separated into 4 examples dependent on usage techniques and degrees manual

execution, composing of splendid software programs, records cleaning inconsequential to specific software

fields, and taking care of the difficulty of a kind of explicit software area. In these 4 methodologies, the 1/3 has

terrific down to earth esteem and may be connected effectively.

Keywords: Total Data Quality Management, Data Quality Metrics, Data Quality Assessment,

References:

1. Almutiry, O., Wills, G., &Alwabel, A. (2013, June 24–26). Toward a framework for data quality in cloudbased health information system. Paper presented at the International Conference on Information Society (i-Society 2013).

2. Batini, C., &Scannapieco, M. (2016). Data and information quality: Dimensions, principles and techniques. Cham: Springer.

3. Eppler, M. J. (2006). Managing information quality: Increasing the value of information in knowledge intensive products and processes (2nd ed.). Berlin: Springer.

4. Katal, A., Wazid, M., &Goudar, R. (2013) Big Data: Issues, Challenges, Tools and Good Practices. Procedures of the 2013 Sixth

International Conference on Contemporary Computing, Noida: IEEE, pp 404–409. 5. McGilvray, D. (2008) Executing Data Quality Projects: Ten Steps to Quality Data and Trusted Information, California: Morgan

Kaufmann.

6. McGilvray, D. (2010) Executing Data Quality Projects: Ten Steps to Quality Data and Trusted Information, Beijing: Publishing House of Electronics Industry.

7. Meng, X. F., & Ci, X. (2013) Big Data Management: Concepts, Techniques and Challenges. Journal of Computer Research and

Development 50(1), pp 146–169. 8. Nature (2008) Big Data. Retrieved November 5, 2013 from the www.http://www.nature.com/ news/specials/bigdata/index.html.

9. Song, M., & Qin, Z. (2007) Reviews of Foreign Studies on Data Quality Management. Journal of Information2, pp 7–9.

10. Wang, H., & Zhu, W. M. (2007) Quality of Audit Data: A Perspective of Evidence. Journal of Nanjing University(Natural Sciences)

43(1), pp 29–34.

11. Wang, J. L., Li, H., & Wang, Q. (2010) Research on ISO 8000 Series Standards for Data Quality. Standard Science12, pp 44–46.

12. LavanyaBandla,Rajkumar Rajasekaran,JollyMasih,Twitter sentimental Analysis using Hadoop Eco System (2020), Xi'an JianzhuKejiDaxueXuebao/Journal of Xi'an University of Architecture & Technology, 10.37896/JXAT12.08/2747

13. Rajkumar Rajasekaran, Govinda k, Ashrith Reddy, Uday Sai Reddy, Yashwanth Reddy: Visual Analysis of Temperature Time Series

and Rainfall Using Big Data. DOI:10.36872/LEPI/V50I3/201023 14. Rajasekaran Rajkumar, Jolly Masih, K.Govinda: An analysis of mobile pass-codes in case of criminal investigations through social

network data. International Journal of Computers and Applications 09/2019, DOI:10.1080/1206212X.2019.1662169

589-593

99. Authors: Velmurugan. PS, Jyoti Ranjan Sahoo

Page 73: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

Paper Title: Public Debt, Current Account Deficit and Economic Growth: A Study on Indian Context

Abstract: External debt and internal debt form main components of the public debt structure in India. India‘s

debt profile shows increasing external debt and simultaneously increasing the deficit in current account which

have impact on economic growth of India. Our study assesses the impact of India‘s Gross External Debt (GED),

Internal Debt (IND) and Current Account Deficit (CAD) on economic growth (GDP) by using time series data

from 1998-99 to 2018-19. We intend to find long-run as well as short run relationship between the variables with

the help of Eviews software. Stationarity of data is tested by considering Augmented Dickey-Fuller (ADF) test

statistics and used Johansen Co-integration test and Vector Error Correction Model (VECM). The result shows

co-integration among the variables with one equation. The result of VECM shows existence of long-run

relationship among the variables. But the study fails to find the short-run causality among the variables. The

results show external debt (GED), internal debt (IND), and Current Account Deficit (CAD) have negative and

statistically insignificant relationship with GDP. It shows increase in public debt and deficit in current account

results in decrease in GDP growth.

Keywords: External Debt, Internal Debt, GDP, Current Account, CAD, VECM, India

References:

1. Abubakar, A.B., Alagiriswamy, J. and Ahmad, S.I., International Journal of Research in Commerce, Economics and Management. 2. ALOYSIUS, C., 2016. AN EMPIRICAL STUDY OF THE IMPACT OF PUBLIC DEBT ON ECONOMIC GROWTH OF

INDIA (Doctoral dissertation, University of Madras Chennai).

3. Bal, D.P. and Rath, B.N., 2014. Public debt and economic growth in India: A reassessment. Economic Analysis and Policy, 44(3), pp.292-300.

4. Calderon, C.A., Chong, A. and Loayza, N.V., 2002. Determinants of current account deficits in developing countries. The BE Journal

of Macroeconomics, 2(1). 5. Chowdhury, A., 2001. External debt and growth in developing countries: a sensitivity and causal analysis. WIDER-Discussion Papers.

6. Coskun, A., 2010. Current account sustainability: post-2001 application of Turkey. (Unpublished master‘s thesis). Istanbul University,

Turkey. 7. Dhir, Sonia., 2017. Economic Growth, Public Debt and Public Expenditure in India- An Empirical Analysis. Aussie Sino Studies. v(3),

p.104.

8. Edo, S., Osadolor, N.E. and Dading, I.F., 2019. Growing external debt and declining export: The concurrent impediments in economic growth of Sub-Saharan African countries. International Economics.

9. Gomez-Gonzalez, P., 2019. Inflation-linked public debt in emerging economies. Journal of International Money and Finance, 93,

pp.313-334. 10. Ibhagui, O.W., 2018. External debt and current account adjustments: The role of trade openness. Cogent Economics & Finance, 6(1),

p.1446247.

11. Kaur, K., 2014. Time Series Analysis of Indian External Debt. Total Reserves and Economic Growth Rates: In International journal of scientific research, 3(4).

12. Mehta, B.M. and Kayumi, H.F., 2014. Effect of India‘s current account deficit on external debts and foreign exchange rates. IOSR

Journal Of Economics And Finance, 1(7), pp.54-65. 13. Murat, S., Hobikoğlu, E.H. and Dalyancı, L., 2014. Structure and sustainability of current account deficit in Turkish

economy. Procedia-Social and Behavioral Sciences, 150, pp.977-984.

14. Nyoni, T., Musisinyani, B. and Nyoni, M., 2017. The impact of current account deficits on economic growth in Zimbabwe. International journal for innovative research in multidisciplinary field, 3(8).

15. Putunoi, G.K. and Mutuku, C.M., 2013. Domestic debt and economic growth nexus in Kenya. Current Research Journal of Economic

Theory, 5(1), pp.1-10. 16. Qureshi, I. and Liaqat, Z., 2020. The long-term consequences of external debt: Revisiting the evidence and inspecting the mechanism

using panel VARs. Journal of Macroeconomics, 63, p.103184.

17. Rathnayake, A.S.K., 2020. Sustainability of the fiscal imbalance and public debt under fiscal policy asymmetries in Sri Lanka. Journal of Asian Economics, 66, p.101161.

18. Sahin, I.E. and Mucuk, M., 2014, July. The effect of current account deficit on economic growth: The case of Turkey. In Proceedings

of International Academic Conferences (No. 0301828). International Institute of Social and Economic Sciences.

19. Yurdakul, F. and Ucar, B., 2015. The relationship between current deficit and economic growth: An empirical study on

Turkey. Procedia Economics and Finance, 26, pp.101-108.

20. Yusuf, S. and Said, A.O., 2018. Public Debt and Economic Growth: Evidence from Tanzania. Journal of Economics, Management and Trade, pp.1-12.

594-601

100.

Authors: Yendluri Lohith JayaSurya , Yendluri Priya Yasaswini , Somepalli Saranya

Paper Title: Image Steganography

Abstract: Steganography is the practice of concealing a file, message, image, or video within another file,

message, image, or video. The advantage of steganography is that the intended secret message does not attract

attention to itself as an object of scrutiny. Steganography is concerned both with concealing the fact that a secret

message is being sent and its contents. The change is so subtle that someone who is not specially looking for it is

unlikely to notice the change. We intend to perform image steganography by designing a neural network that

prepares the secret jpg image and hides the prepared jpg image in a cover jpg image.

Keywords: steganography , neural network , jpg image

References:

1. Shumeet Baluja,Hiding Images in Plain Sight: Deep Steganography, 31st Conference on Neural Information Processing Systems(NIPS

2017), Long Beach, CA, USA. 2. Jessica Fridrich,Miroslav Goljan,and RuiDu.Detecting lsb steganography in color,and gray-scale images.IEEE multimedia, 8(4):2228,

2001.

3. Yinlong Qian, Jing Dong, Wei Wang, and Tieniu Tan. Deep learning for steganalysis via convolutional neuralnetworks.In SPIE/IST Electronic Imaging ,International Society for Optics and Photonics, 2015H.

4. Sabah Husien and Haitham Badi.Articial neural network for steganography.Neural Computing and Applications, 26(1):111116, 2015.

602-605

Page 74: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

5. Robert Jaruek,Eva Volna,and Martin Kotyrba. Neural network approach to image steganography techniques.In Mendel 2015, pages

317327.Springer, 20 6. Georey E Hinton and Ruslan R Salakhutdinov.Reducing the dimensionality of data with neural networks.Science, 313(5786):504507,

2006.

101.

Authors: C Ankita, Supriya A, Bhagya R

Paper Title: Design and Simulation of millimeter wave Mylar based flexible Antenna for 5G wireless

Applications

Abstract: The millimeter wave (mm-wave) is expected to play a crucial role in providing broad frequency

bandwidth for large data transmission. The restrictions of wave propagation are anticipated to get eliminated in

mm-wave propagation through the assistance of antenna technologies. The higher frequency spectrum

prevalence of the 5G applications are likely to be dependent on a small advanced antenna technology. This paper

presents an antenna design which uses Mylar as substrate for the 5G wireless applications. The structure of the

antenna adopted here is of a T-shaped patch designed with ideal symmetrical slot structures. To increase the

bandwidth the idea of defective ground structure (DGS) is used. The antenna model discussed here shows a high

impedance bandwidth and a fair radiation pattern in the required direction with a maximum gain of 8.35dB at 28

GHz frequency. The proposed antenna is compared with the basic microstrip patch antenna which is designed at

low frequency to prove that the bandwidth is enhanced and so other parameters in the proposed antenna such

that it is suitable for mm-wave 5G wireless applications.

Keywords: Directivity, HFSS, microstrip patch antenna, millimeter waves, radiation pattern, return loss.

References:

1. Y.R.Li, B.Gao, X.Zhang and K.Huang, "Beam Management in Millimeter-Wave Communications for 5G and Beyond," in IEEE

Access, vol. 8, pp. 13282-13293, 2020.

2. M. Faisal, A. Gafur, S. Z. Rashid, M. O. Shawon, K. I. Hasan and M. B. Billah, "Return Loss and Gain Improvement for 5G Wireless Communication Based on Single Band Microstrip Square Patch Antenna," 2019 1st International Conference on Advances in Science,

Engineering and Robotics Technology (ICASERT), Dhaka, Bangladesh, 2019, pp. 1-5.

3. S. F. Jilani and A. Alomainy, "Millimetre-wave T-shaped MIMO antenna with defected ground structures for 5G cellular networks," in IET Microwaves, Antennas & Propagation, vol. 12, no. 5, pp. 672-677, 18 4 2018.

4. F. Al-Ogaili and R. M. Shubair, "Millimeter-wave mobile communications for 5G: Challenges and opportunities," 2016 IEEE

International Symposium on Antennas and Propagation (APSURSI), Fajardo, 2016, pp. 1003-1004. 5. M. M. Amir Faisal, M. Nabil and M. Kamruzzaman, "Design and Simulation of a Single Element High Gain Microstrip Patch Antenna

for 5G Wireless Communication," 2018 International Conference on Innovations in Science, Engineering and Technology (ICISET),

Chittagong, Bangladesh, 2018, pp. 290-293.

6. U.Farooq et al., "Design of a 1×4 CPW Microstrip Antenna Array on PET substrate for Biomedical Applications," 2019 IEEE

International Symposium on Antennas and Propagation and USNC-URSI Radio Science Meeting, Atlanta, GA, USA, 2019, pp. 1345-

1346

606-610

102.

Authors: Joan Hazel V. Tiongson, Marifel Grace C. Kummer

Paper Title: Rural Health Unit Decision Support System with Mapping

Abstract: In this highly challenging and demanding world, presence of data and technology are overwhelming.

But at present, some institutions still engage in manual-type of operations like the Rural Health Unit of the

Municipality of Solano, Nueva Vizcaya. Problems, issues and challenges encountered by the unitin the delivery

of its medical servicesand the extent of compliance in ISO/IEC 25010 Software Quality Standards were

identified. And with the uncontrollable availability of data, these can be handled and treated using data mining

techniques to predict disease occurrences. In this study, the clustering and classification data mining techniques

were utilized in order to predict disease occurrences of every barangay of the municipality at a given time. An

efficient record management system along with a decision support system was developed to meet the challenges

of the unit. It mainly features the disease-occurrence mapping to assist physicians and other health professionals

in the unit in their decision-making tasks particularly in diagnosis, treatment and recommendations.In terms of

ISO/IEC 25010 Software Quality Standards, the system gained a ―very great extent‖ qualitative rating.

Keywords: Challenges, Clinical Decision Support System (CDSS), Data Mining, Electronic Medical Record

(EMR), Health Information Technology (HIT)

References:

1. Aguilar, Remo-tito. (nd). Disruptions in Health: Healthcare information technology in a limited resource community. Retrieved from

http://remomd.com/technology/disruptions-in-health-healthcare-information-technology-in-a-limited-resource-community.html

2. Allianz Care. (nd). Healthcare in the Philippines. Retrieved from https://www.allianzworldwidecare.com/en/support/view/national-healthcare-systems/healthcare-in-philippines/

3. Chapple, Mike. (2020). The Use of Classification in Data Mining. Retrieved from https://www.lifewire.com/classification-1019653

4. Dey, Monali and Siddharth Swarup Rautaray. (2014). Study and Analysis of Data Mining Algorithms for Healthcare Decision Support

System. Retrieved from https://pdfs.semanticscholar.org/d32e/c14e005d9907603d2e46daa1b68a9b63d95b.pdf

5. Estdale, John and Elli Georgiadou. (2018). Applying the ISO/IEC 25010 Quality Models to Software Product. Retrieved from

https://www.researchgate.net/publication/326896024_Applying_the_ISOIEC_25010_Quality_Models_to_Software_Product_25th_European_Conference_EuroSPI_2018_Bilbao_Spain_September_5-7_2018_Proceedings

6. Estinar, Aaron O. et. al. (2018). Pampanga‘s Barangay Health Information System (PBHIS): A Decision Support & Health Information

System for Rural Health Unit 1. Retrieved from https://www.dlsu.edu.ph/wp-content/uploads/pdf/conferences/research-congress-proceedings/2018/fnh-12.pdf

7. Garcia, Gabriel et. al. (2015). DiabeSys. Retrieved on from https://www.dlsu.edu.ph/wp-content/uploads/pdf/conferences/research-

congress-proceedings/2015/FNH/018FNH_Tangkeko_MS.pdf 8. Hicks, Joy. (2018). Benefits of Integrating an Electronic Health Record System. Retrieved on from

https://www.verywellhealth.com/benefits-of-integrating-electronic-health-records-2317142

611-616

Page 75: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

9. Jones, Mila. (2018). HealthCare: How Technology Impacts The Healthcare Industry. Retrieved from

https://healthcareinamerica.us/healthcare-how-technology-impacts-the-healthcare-industry-b2ba6271c4b4 10. Kalyani, P. (2012). Approaches to Partition Medical Data using Clustering Algorithms. Retrieved from

https://pdfs.semanticscholar.org/82e1/22314dcbe9170e3f8fe9863737cc6f2237ec.pdf

11. Manca, Donna P. (2015). Do electronic medical records improve quality of care? Yes. Retrieved from

https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4607324/

12. Manila Times. (2018). At a glance: The Philippine health care system. Retrieved from https://www.manilatimes.net/at-a-glance-the-

philippine-health-care-system/395117/ 13. Ogbuabor and Ugwoke. (2018). Clustering algorithm for a Healthcare dataset Using Silhouette Score Value. Retrieved from

https://aircconline.com/ijcsit/V10N2/10218ijcsit03.pdf

14. Peth, Linda. (2017). Why technology integration is essential in home health care. Retrieved from https://ndocsoftware.com/2017/07/technology-integration-essential-home-health-care/

15. Silitonga, Parasian. (2018). Clustering of Patient Disease Data by Using K-Means Clustering. Retrieved from

https://www.researchgate.net/publication/323772077_Clustering_of_Patient_Disease_Data_by_Using_K-Means_Clustering#fullTextFileContent

16. Triotree.com. (2019). Significance of IT in Healthcare. Retrieved from http://triotree.com/blog/significance-of-it-in-healthcare/

17. Venkatesan, E. and T. Velmurugan. (2015). Role of Classification Algorithms in Medical domain: A Survey. Retrieved from https://www.researchgate.net/publication/280858435_Role_of_Classification_Algorithms_in_Medical_domain_A_Survey

103.

Authors: Telesphore Tiendrebeogo, Cheick Yacouba Rachid Coulibaly, Maliki Badolo

Paper Title: Robust Formal Watermarking Model Based on the Hyperbolic Geometry for Image Security

Abstract: The digital revolution has led to an increase in the production and exchange of valuable digitized

documents across institutions, companies and the general public alike. Ensuring the authenticity, integrity and

ownership of these official or high-value documents is essential if they are to be considered useful. Digital

watermarking is a possible solution to this challenge as it has already been used for copyright protection, source

tracking, and video authentication to name just a few applications of its use. It also enables integrity protection,

which is of value for numerous documents types (e.g., official documents, medical images). In this paper, we

propose a new watermarking solution that is applicable to image watermarking and is based on hyperbolic

geometry. Our new solution builds upon existing work in geometrical watermarking.

Keywords: Watermarking Hyperbolic Geometry, Poincaré Disk Model, Hypercatadioptric Projection,

Cryptography, Image Processing

References:

1. B. Macq, P. R. Alface, M. Montanola, Applicability of watermarking for intellectual property rights protection in a 3d printing scenario, in: Proceedings of the 20th International Conference on 3D Web Technology, 2015, pp. 89–95.

doi:10.1145/2775292.2775313.

2. Y. Z., L. L., Digital image watermarking algorithms based on dual transform domain and self-recovery, International Journal on Smart Sensing and Intelligence Systems 8 (1) (2015) 199–219.

3. D. X., W. F., W. Y., F. Duan, C. L., W. H., Self-calibration of hybrid central catadioptric and perspective cameras, Computer Vision

and Image Understanding 116 (6) (2012) 715–729. 4. T. T., M. D., Virtual and consistent hyperbolic tree: A new structure for distributed database management, in: 3rd International

Conference on Networked Systems, Lecture Notes in Computer Science vol. 9466, 2015.

5. M. M., T. K., A cryptographic method for secure watermark detection, in: Information Hiding, Lecture Notes in Computer Science vol. 4473, 2006, pp. 26–41.

6. K. M., K. V., A survey on digital image watermarking and its techniques, International Journal of Signal Processing, Image Processing

and Pattern Recognition 8 (5) (2015) 145–150. 7. C. G., S. R., Y. K. R., Classification of watermarking based upon various parameters, International Journal of Computer Applications

& Information Technology 1 (2) (2012) 16–19.

8. Y. U., S. J.P., S. D., S. P.K., Different watermarking techniques & its applications: A review, International Journal of Scientific & Engineering Research 5 (4) (2014) 1288–1294.

9. D. P., K. K., A study on spatial and transform domain watermarking techniques, International Journal of Computer Applications 71 (14) (2013) 38–41.

10. N. K.D., D. D.S., Performance comparison of two hybrid techniques for image steganography in frequency domain, International

Journal of Inno- vative Research in Computer and Communication Engineering 3 (6) (2015) 68–74. 11. G. M., H. E.M., M. M., An improved image watermarking method in frequency domain, Journal of Applied Security Research 12 (2)

(2017) 260–275.

12. A. Y.B., T. I., D. N., B. M.S., Euclidean distance distortion based robust and blind mesh watermarking, International Journal of Interactive Multi-media and Artificial Intelligence 4 (2) (2016) 46–51.

13. H. O., S. W.M., Y. B. A. B., A. M.A., Public watermarking scheme for 3d laser scanned archeological models, in: IEEE Symposium

on Computers and Communications, 2012, pp. 382–389. 14. G.-J. L., K.-Y. Y., An improved double image digital watermarking scheme using the position property, Journal Multimedia Tools and

Applications 74 (17) (2015) 7261–7283.

15. S. B., S. L., Efficient descriptor for full and partial shape matching, Journal of Multimedia Tools and Applications 75 (6) (2016) 2989–3011.

16. K. Wang, G. Lavoué, F. Denis, A. Baskurt, Hierarchical watermarking ofsemiregular meshes based on wavelet transform, IEEE

TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 3 (4) (2008) 620–634. 17. S. S.S., Blind wavelet based watermarking technique for image authentication, International Journal of Advanced Research in

Computer Science 6(1) (2015) 127–131.

18. W. Y.H., M. S.D., Data hiding technique using audio watermarking, International Journal Of Engineering And Computer Science 4 (3) (2015) 11109–11112.

19. A. N., T. H., Pde based scheme for multi-modal medical image watermarking, International Journal BioMedical Engineering 14 (2015)

108–126. 20. B. L., S. H.I., A. M.B., Enhanced watermarking scheme for 3d mesh models, in: 7th International Conference on Information

Technology, 2015, pp. 612–619.

21. P. W., X. Hongling, W. L., S. Wenlong, Harris scale invariant corner detection algorithm based on the significant region, International Journal of Signal Processing, Image Processing and Pattern Recognition 9 (3) (2016) 413–420.

22. H.D., ―Foundations of geometry,thesis in mathematics‖, in: The Open Court Publishing Company, Univerty of G¨ottingen, 1950, p.

105. 23. M. P., Premiers principes de la métagéométrie ou géométrie générale, Revue néo-scolastique. 3ème année 1896 (10) (1896) 143–170.

617-627

Page 76: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

24. T. S., Hyperbolic geometry: history, models, and axioms, U.U.D.M. Project Report (2004).

25. B. Y., Hyperbolic geometry tiling (08 2006). 26. T. T., A. D., M. D., Reliable and scalable distributed hash tables harnessing hyperbolic coordinates, in: IFIP International Conference

on New Technologies, Mobility and Security, 2012, pp. 1–6.

27. M. A., Un afficheur générique d‘arbres à l‘aide de la géométrie hyperbolique, Journées francophones des langages applicatifs (JFLA)

(2000).

28. B. A. F., M. D., The hyperbolic metric and geometric function theory, in: International Workshop on Quasiconformal Mappings And

Their Applications, 2006. 29. S. L. A catadioptric sensor withmultiple viewpoints, In Robotics and Autonomous Systems 51 (2005) 667–674.

30. B. S., N. S. K., A theory of single-viewpoint catadioptric image formation, International Journal of Computer Vision 35 (2) (1999) 1–

22. 31. B. D. A., Geometry (06 2002).

32. M. J., Vision stéréoscopique par ordinateur pour la détection et le suivi de cibles pour une application automobile, Ph.D. thesis, Institut

National Polytechnique de Grenoble (2008). 33. T. R., Suivi d‘objet pour la television interactive, Ph.D. thesis, Ecole TELECOM ParisTech (2008).

34. P. P., De l‘importance des points d‘int´erˆet et du maillage 2d, Ph.D. thesis, Institut National Polytechnique de Toulouse (2009).

35. B. J.P., General central projection systems : Modeling, calibration and visual servoing, Ph.D. thesis, University of Coimbra (2003). 36. C. F., D. K. C. C., S. O., étalonnage de caméras catadioptriques hyper-boloïdes, Traitement du signal:Vision omnidirectionnelle 22 (5)

(2005).

37. D. W., H. M.E., New directions in cryptography, IEEE Transactions on Information Theory 26 (6) (1976) 644–654. 38. J. D., P. K., The self-synchronizing stream cipher, Springer Lecture Notes in Computer Science 4986 (2008) 210–223.

39. D. R. L., An introduction to chaotic dynamical systems (04 1989).

40. B. I., V. P., G. J.-P., Continuous wavelet transform on the hyperboloid, Applied and Computational Harmonic Analysis 59 (2) (1975) 375–382.

41. S. L., Analyse: Topologie générale et analyse fonctionnelle, in: Hermann, 1970, p. 432.

42. J. Bahi, C. Guyeux, Hash functions using chaotic iterations, Journal of Algorithms and Computational Technology 4 (2) (2010) 167–181.

104.

Authors: Mohammed Salahuddin, R G Nauman Khan, Mohammed Moiz, Mohammed Tosif Ahmed

Paper Title: Seismic Assessment of R.C.C Frame Building using Pushover Analysis

Abstract: India is a making country with an arrangement of structure practices and social and money related

structure, which needs to build up its own special strategies for seismic danger appraisal. The latest decade has

shown our lack in peril decline programs, during the couple of hurting seismic quakes. In view of this quake

alone in India there was massive loss of life and property. After this troublesome adversity thought is by and by

being given to the appraisal of the adequacy of solidarity in structures to contradict strong ground developments.

After Bhuj seismic quake IS-1893 was revised and appropriated in the year 2002, going before this scene it was

refreshed in 1984. The code was first conveyed in 1962 as 'Recommendations for Earthquake Resistant Design

of Structure'. The central reason behind the loss of life and property was inadequacy of learning of direct of

structures during ground developments. The frailty of the structures against seismic development must be

fundamentally inspected. The most preferred strategy for seismic evaluation is Inelastic static assessment or

Pushover examination in view of its straightforwardness. Inelastic static examination frameworks join Capacity

Spectrum Method, Displacement Coefficient Method and the Secant Method. In this examination we are looking

over seismic execution of G+17 standard RCC structure. The structure has been surveyed using Pushover

Analysis.

Keywords: Pushover Analysis, Nonlinear Static investigation, Performance point, Capacity bend, Displacement,

Drift of stories, seismic zone, Etabs programming

References:

1. FEMA. NEHRP guidelines for the seismic rehabilitation of buildings (FEMA 273).Washington (DC): Building Seismic Safety

Council; 1997.

2. FEMA 356 NEHRP Pre standard and commentary for the seismic rehabilitation of buildings. (2000). 3. Chopra AK. Dynamics of structures: theory and applications to earthquake engineering. Englewood Cliffs, NJ. 1995.

4. R.Hasan (2002), ―Push-over analysis for performance-based seismic design‖ Computers and Structures 80 (2002) 2483-2493.

5. Erolkalkan (2007), ―Assessment of current nonlinear static procedures for seismic evaluation of buildings‖ , Engineering Structures 29 (2007) 305-316.

6. Dynamics of structures – Third edition - Anil k Chopra, Pearson Press. Earthquake resistance design of structure – Second Edition –

S.K Duggal, Oxford University press , New Delhi

628-634

105.

Authors: Najmu Nissa, Sanjay Jamwal, Shahid Mohammad

Paper Title: Early Detection of Cardiovascular Disease using Machine learning Techniques an Experimental

Study

Abstract: Human body prioritizes the heart as the second most important organ after the brain. Any disruption

in the heart ultimately leads to disruption of the entire body. Being the members of modern era, enormous

changes are happening to us on a daily basis that impact our lives in one way or the other. A major disease

among top five fatal diseases includes the heart disease which has been consuming lives worldwide. Therefore,

the prediction of this disease is of prime importance as it will enable one to take a proper and needful approach

at a proper time. Data mining and machine learning are taking out and refining of useful information from a

massive amount of data. It is a basic and primary process in defining and discovering useful information and

hidden patterns from databases. The flexibility and adaptability of optimization algorithms find its use in dealing

with complex non -linear problems. Machine Learning techniques find its use in medical sciences in solving real

health-related issues by early prediction and treatment of various diseases. In this paper, six machine learning

algorithms are used and then compared accordingly based on the evaluation of performance. Among all

classifiers, decision tree outperforms over the other algorithms with a testing accuracy of 97.29%.

635-641

Page 77: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

Keywords: Heart Disease, Machine Learning Models, Python, Spyder.

References:

1. Babu, Sarath, ―Heart disease diagnosing using data mining technique.‖ Electronics Communication and Aerospace Technology

(ICECA),2017 International conference of vol.1.IEEE,2017

2. MissChaitrali S. Dangare, Dr.Mrs. SulabhaS.Apte, A data mining approach for prediction of heart disease using neural networks, international journal of computer engineering and technology, 2012.

3. https://www.statista.com/statistics/1108824/cardiovascular-as-cause-of-death-estimate-and-actual-worldwide/

4. Jayumin Patel, Prof.TejalUpadhyay, Dr.SamirPatel,‖Heart Disease Prediction Using Machine Learning and Data Mining Techniques ‖, IJCSC, vol 7.No 1-sept 2015-Mar 2016.

5. SonamNikahr, A. M.Karandikhar, "Prediction Of Heart Disease Using Machine Learning Algorithms", International Journal Of

Advanced Engineering, Management and Science, vol-2, June-2016. 6. SeyedaminPouriyeh, Sara Vahid, Giovanna Sannino,‖A Comprehensive Investigation and Comparison Of Machine Learning

Techniques In The Domain Of Heart Disease‖, 22nd IEEE symposium on computers and communication(ISCC 2017):workshop-

ICTS4EHealth 2017. 7. YounessKhourdifi, Mohamed Bahaj, ― Heart Disease Prediction and Classification Using Machine Learning Algorithms Optimized By

Particle Swarm Optimization and Ant Colony Optimization‖, international journal of intelligent engineering and systems, vol-12, No-

1,2019. 8. Mamta Alex P and Shaicy P Shaji,‖Prediction and diagnosis of heart disease patients using data mining techniques‖, International

Conference on Communication and Signal Processing, April 4-6,2019.

9. Anaconda Inc., ―Anaconda Distribution,‖ Anaconda, 2019, [Online]. Available: https://www.anaconda.com/distribution/ 10. Mythili T., Dev Mukherji, Nikita Padalia, and Abhiram Naidu,‖ A Heart Disease Prediction Model using SVM-Decision Trees-Logistic

Regression (SDL)‖, International Journal of Computer Applications (0975 – 8887) Volume 68– No.16, April 2013.

11. Larose,D.," Discovering knowledge in data: an introduction to data mining‘‘. New jersey: john wiley&sons, inc,2005. 12. Umair Shafique, Faiz Majeed, Haseeb Qaiser,and Irfan Ul Mustafa,‖Data Mining in Healthcare for Heart Disease‖, internationaljournal

of innovation and applied sciences, vol.10 No.4 Mar,2015,pp.1312-1322

13. https://encryptedtbn0.gstatic.com/images?q=tbn%3AANd9GcRb0oOWXHEXhRAdMH_YVV8nP6_HJEIda-gwYQ&usqp=CAU] 14. Umair Shafique, Faiz Majeed, Haseeb Qaiser, and Irfan Ul Mustafa,‖Data Mining in Healthcare for Heart Disease", internationaljornal

of innovation and applied sciences, vol.10 No.4 Mar 2015,pp.1312-1322.

15. https://www.analyticsvidhya.com/blog/wp-content/uploads/2014/10/ANN.png 16. GeorgeJonh and Pat Langley. ―Estimating continuousdistributions in Bayesian classifiers‖ in proceedings of the Eleventh Conference

On Uncertainty in Artificial Intelligence, Morgan Kaufman, pages 338-345,1995.

17. Umair Shafique, Faiz Majeed, Haseeb Qaiser, and Irfan Ul Mustafa,‖Data Mining in Healthcare for Heart Disease", internationaljornal of innovation and applied sciences, vol.10 No.4 Mar 2015,pp.1312-1322.

18. Sonam Nikhar and A.M. Karandikar,‖Prediction Of Heart Disease Using Machine Learning Algorithms‖, International Journal Of

Advanced Engineering, Management and Science, vol-2,issue-6, June-2016. 19. H.Benjamin Fedrick David and S. Antony Belcy, ―Heart Disease Prediction Using Data Mining Techniques‖

20. https://miro.medium.com/max/1170/1*58f1CZ8M4il0OZYg2oRN4w.png 21. D.K. Srivastava and L. Bhambhu, ―Data classification using support vector machine,‖ J.Theor.Appl.Info.Technol.,2009

22. A. A. Abdillah and Suwarno, ―Diagnosis of diabetes using support vector machines with radial basis function kernels,‖ Int. J. Technol.,

vol. 7, no. 5, pp. 849–858, 2016, DOI: 10.14716/ijtech.v7i5.1370.

106.

Authors: R.Sundaramoorthy, J.Justin Maria Hillary, S.R.Raja Balayanan, K.Kalidas, R.V.Rangarajan

Paper Title: Composite Wear Actions of Glass Fiber Reinforced Titanates Filled Epoxy Resin

Abstract: Glass fibre-reinforced polymer composites find numerous applications in today 's aggressive world

because of their different benefits such as high wear resistance, strength to weight ratio and low cost. Particle

fillers can be further enhanced with the added composite efficiency. Titanates are successfully used as polymer

filler to achieve this. A number of these short-glass epoxy composites and the study of their wear behavior are

included in current work. They are manufactured and characterized. It also outlines a technique for parametric

analysis of the sliding wear behavior, based on Taguchi‘s test-design approach.

Keywords: Polymer composites; Titanates; Epoxy; Wear test; Taguchi.

References:

1. Anisha Christy, Rajesh Purohit, R. S. Rana, (2017) ―Development and Analysis of Epoxy/nano SiO2 Polymer Matrix Composite fabricated by Ultrasonic Vibration assisted Processing‖, Materials Today Proceedings, Volume 4, pp. 2748–275.

2. Enqiu He, Shijie Wang, Yunlong Li, Quan Wang, (2017) ―Enhanced tribological properties of polymer composites by incorporation of

nano-SiO2 particles: A molecular dynamics simulation study‖ Computational Materials Science, Volume 134, pp. 93–99. 3. Prashanthakuamr H D, Bhanuprakash N, (2017) ―Friction and wear behaviour of polymer matrix composites – a review‖ International

Research Journal of Engineering and Technology (IRJET), Volume 04, pp. 988-991.

4. Zhongnan Wang, Derek G. Chetwynd, Ken Mao, (2018) ―Friction characteristics of polymers applicable to small-scale devices‖, Tribology International, S0301-679X (17)30550-9.

5. Yuanliang Zhao, XiaowenQi, YuDong, JianMaa, Qinglong Zhang, Laizhou Song, YulinYang, Qingxiang Yang, (2016) ―Mechanical,

thermal and tribologicl properties of polyimide/nano- SiO2 composites synthesized using an in-situ polymerization‖, Tribology International, Volume 103, pp. 599–608.

6. T.Madhsudhan, M. Senthilkumar, Athith D.(2016) ―Mechanical characteristics and tribological behaviour study on natural - glass fiber

reinforced polymer hybrid composites: a review‖, International Research Journal of Engineering and Technology (IRJET), Volume 03,

Issue 04, pp. 2243-2246.

7. Andrey I. Dmitrieva Anton Yu nikonov, Wener Osterle, (2016) ― Multiscale modeling of low friction sliding behavior of a hybrid

epoxy matrix nanocomposite‖, Procedia Structural Integrity , Volume 2, pp. 2347-2354. 8. S. Basavarajappa , S. Ellangovan , K.V. Arun (2009) ―Study on dry sliding wear behaviour of Graphite filled glass–epoxy composites‖

Materials and Design, Volume30, pp. 2670–2675.

9. Peerapan Dittanet, Raymond A. Pearson (2012) ―Effect of silica nano particle size on toughening mechanisms of filled epoxy‖, Polymer, Volume 53, pp. 1890-1905.

10. M. Conradi, M. Zorko, (2013) ―Mechanical properties of epoxy composites reinforced with a low volume fraction of nanosilica

fillers‖, Materials Chemistry and Physics, Volume 137, pp. 910-915. 11. Sundaramoorthy R., Ravindran R.,(2018), ―Amalgamation of aluminium-Mg2Si alloys in various weight percentage and study of their

tensile and wear behaviors‖. Int. J. Additive and Subtractive Materials Manufacturing, vol.2, No.1,pp.45-60.

642-647

Page 78: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

12. J Justin Maria Hillary , R Ramamoorthi, J Dixon Jim Joseph

and C Samson Jerold Samuel,(2020), ―A study on microstructural effect and mechanical behaviour of Al6061–5%SiC–TiB2 particulates reinforced hybrid metal matrix composites, Vol. 54(17) 2327–2337.

13. Sundaramoorthy R, Ravindran R, (2017), ‗Synthesis of Aluminum-Magnesium Silicide(Al-Mg2Si) Alloys and study of their

mechanical properties‘, Journal of Material Science and Surface Engineering, vol. 5, no. 2, pp. 533-536.

14. Mainak Sen, Pujan Sarkar, Nipu Modak, Prasanta Sahoo (2015) ―Woven E-glass Fiber Reinforced Epoxy Composite – Preparation and

Tribological Characterization‖, International Journal of Materials Chemistry and Physics, Vol. 1, pp. 189-197.

15. Kishore , P. Sampathkumaran , S. Seetharamu , S. Vynatheya , A. Murali , R.K. Kumar (2000),―SEM observations of the effects of velocity and load on the sliding wear characteristics of glass fabric–epoxy composites with different fillers‖ Wear, Volume 237, pp.

20–27.

16. Umanath K, 2011, ‗Friction and Wear Behavior of Al-6061 Alloy (SiCp + Al2O3) Hybrid Composites‘, International Journal of Engineering Science and Technology, vol. 3, pp. 5441-5451.

17. A.P. Harsha, Sanjeev Kumar Jha (2008) ―Erosive wear studies of epoxy-based composites at normal incidence‖ Wear, Volume 265,

pp. 1129–1135. 18. B. Suresha, G. Chandramohan, P. Samapthkumaran, S. Seetharamu and S. Vynatheya (2006), ―Friction and Wear Characteristics of

Carbon-epoxy and Glass-epoxy Woven Roving Fiber Composites‖. Journal of Reinforced Plastics and Composite, Volume 25, pp.

771-782. 19. N.Mohan, C.R.Mahesha, B.M.Rajaprakash (2013) ―Erosive wear behaviour of WC filled glass epoxy composites‖ Procedia

Engineering, Volume 68, pp. 694 – 702.

20. Sundaramoorthy R., Ravindran R.,(2019), ―Tool wear optimization in CNC milling operation of Al-Mg2Si alloys by Taguchi Method‖. SN Applied Sciences, vol.1, No.9, pp.1093.

21. S.S. Mahapatra, and A. Patnaik, (2006), Parametric Analysis and Optimization of Drilling of Metal Matrix Composites based

on the Taguchi Method, The International Journal for Manufacturing Science and Technology, vol. 8(1), pp. 5-12. 22. B. D, Agarwal L. J. Broutman (1990), Analysis and performance of fiber composites: Second Edition. John Wiley and Sons, Inc.

23. S.P. Glen, (1993). Taguchi methods: A hands on approach. Addison Wesley, New York.

107.

Authors: Romy Jun A. Sunico, Elwin S. Argana, Mark Anthony T. Golo, Maribel A. Aniňon

Paper Title: Vulca Loc: A Mobile Application for Finding Vulcanizing Shops embedding GPS

Abstract: This paper discusses the ideas and process of developing a mobile locator application for Vulcanizing

Shops in Siargao Island with Global Positioning System (GPS) and Google Map Application Programming

Interface (API). This mobile application is an innovation tool to show the location, availability and services of

the vehicle services shops available in the island to ease the hassle of the tourists with vehicle errors. It also

provides shortest possible route method that includes relevant information about the services of the shops. The

study adopts the Rapid Application Development model and used ISO 9126 to evaluate the application in terms

of usability (4.37), functionality (4.13) and Maintainability (4.20). Therefore, the application is certain to

provide a significant support to the local and foreign tourists; therefore, providing an accurate and hassle time-

free locating a vulcanizing shops

Keywords: API, GPS, RAD Model, Siargao, Vehicle Services Shop

References:

1. CNN Philippines, Best Asia Islands 2018, Available: http://cnnphilippines.com/lifestyle/2018/10/11/siargao-boracay-palawan-best-

asia-islands-2018.html

2. Beermann, Mattias, et al. "Locating position within enclosure." U.S. Patent No. 9,612,121. 4 Apr. 2017. 3. Leng, Limyen. ATM Locator Mobile Application. Diss. University Malaysia Pahang, 2012.

4. Ramos, Anna Liza A., et al. "E-Vision: A Campus Locator Map Mobile Application using A* Algorithm." International Journal of

Computer Science and Software Engineering 7.1 (2018): 6-11. 5. Basal, Ahmet, et al. "Effectiveness of mobile applications in vocabulary teaching." Contemporary Educational Technology 7.1 (2016):

47-59.

6. Shuib, Liyana, Shahaboddin Shamshirband, and Mohammad Hafiz Ismail. "A review of mobile pervasive learning: Applications and issues." Computers in Human Behavior 46 (2015): 239-244.

7. David G. Go Live! Mobile for the Nation’s Largest Telephone Locator Platform. 2017

648-652

108.

Authors: Anjali Dadhich, Blessy Thankachan

Paper Title: Design of NLP technique fore-customer review

Abstract: With the passage of time and the growth of ecommercea new web world needs to be built their users

can share their ideas and opinions differently domains.There are thousands of websites that sell these various

products. The quick growth in the number of reviews and their availability and the arrival of rich reviews for

rich products for sale online, the right choice for many products has been difficult for users. Consumers will

soon be able to verify the authenticity and quality of the products. What better way is there to ask people who

have already bought the product? That‘s where customer reviews come from. What‘s worse is the popular

products with thousands of updates — we don‘t have the time or the patience to read all of them thousands.

Therefore, our app simplifies this task by analysing and summarizing all the reviews that will help the user

determine what other consumers have experienced in purchasing this product. This function focuses on mining

updates from websites like Amazon, allowing the user to write freely to view. Automatically removes updates

from websites. It also uses algorithms such as the Naïve Bayes classifier, Logistic Regression and SentiWordNet

algorithm to classify reviews as good and bad reviews. Finally, we used quality metric parameters to measure

the performance of each algo.

Keywords: Sentiment Analysis, Naïve Bayes classifier, Logistic Regression, Senti Word Net, Opinion Mining.

References:

1. G.Angulakshmi, Dr.R.ManickaChezian, ―An Analysis on Opinion Mining: Techniques and Tools.‖ International Journal of Advanced

653-655

Page 79: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

Research in Computer and Communication Engineering, Vol. 3, Issue 7, July 2014.

2. Callen Rain, ―Sentiment Analysis in Amazon Reviews Using Probabilistic Machine Learning‖, Swarthmore College Compter Society, November 2013

3. Weishu Hu, Zhiguo Gong, JingzhiGuo, ―Mining Product Features from Online Reviews‖IEEE International Conference on E-Business

Engineering, 2010.

4. PoojaKherwa, ArjitSachdeva, Dhruv Mahajan, ―An approach towards comprehensive sentimental data analysis and opinion mining‖.

IEEE International Advance Computing Conference (IACC), 2014.

5. Toqir Ahmad Rana, Yu-N Cheah, ―Hybrid Rule-Based Approach for Aspect Extraction and Categorization from Customer Reviews‖, 9th International Conference on IT in Asia (CITA'15), At Kuching, Sarawak, Malaysia, August 2015

6. Prashast Kumar, ArjitSachdeva, ―An approach towards feature specific opinion mining and sentimental analysis across e-commerce

websites‖. 5th International Conference- Confluence the Next Generation Information Technology Summit (Confluence), 2014. a. Hui Song, Jianfeng Chu, Yun Hu, Xiaoqiang Liu, ―Semantic Analysis and Implicit Target Extraction of Comments from E-commerce

Websites‖. Fourth World Congress on Software Engineering, 2013.

b. R. Piryani, D. Madhavi, V.K. Singh, ―Analytical mapping of opinion mining and sentiment analysis research during 2000-2015‖, Information Processing and Management, ScienceDirect, Elsevier 2016

c. Vidisha M. Pradhan, Jay Vala, Prem Balani, ―A Survey on Sentiment AnalysisAlgorithms for Opinion Mining‖, International Journal of

Computer Applications, Volume 133, No.9, January 2016 7. G. Sneka, CT. Vidhya, ―Algorithms for Opinion Mining and Sentiment Analysis: An Overview‖, International Journal of Advanced

Research in Computer Scinece and Software Engineering, Volume 6, Issue 2, February 2016

8. Neetu, ―Hierarchical classification of web content using Naïve Bayes approach‖,International Jouranal on Computer Science and Engineering (IJCSE), Vol. 5, No. 05, May 2013

a. Daniel Jurafsky, James H Martin, Chapter on ‖Logistic Regression – Speech and Language Processing‖, Standford University,

November 2016 b. Andrea Esuli, Fabrizio Sebastiani, ―SentiWordNet: A Publicly Available Lexial Resource for Opinion Mining‖, 5th Conference on

Lanuage Resources and Evaluation (LREC 2006), Genova, IT, 2006

c. Stefano Baccianella, Andrea Esuli, Fabrizio Sebastiani, ‖SentiWordNet 3.0: An Enhanced Lexical Resource for Sentiment Analysis and Opinion Mining‖ Proceedings of the 7th Conference on Language Resources and Evaluation (LREC 2010), Valletta, MT, 2010

109.

Authors: Noor Faisal Abas, Omosebi. Taiwo.O

Paper Title: Utilization of Pet Wastes Aggregate in Building Construction - A Review

Abstract: The rapid increase of plastics waste produced worldwide today poses a danger to human health

because of the pollution caused by the unsafe disposal and non-biodegradability of this waste combined with

toxic gas emissions during incineration. Globally, PET (polyethylene terephalate) is commonly used for bottling

water and other plastic containers. Recycling the waste would be an additional benefit. This study focuses some

researchers on the forms, methods of recycling and various literature applications of PET wastes. Recycled PET

can of course be used when combined with the sand aggregate to manufacture of various construction materials,

such as tiles, bricks, paving stones etc. This research focuses on its application as it attracts substantial building

materials such as the manufacture of various PET waste tiles and their unique mechanical , physical and

chemical properties; There are some important studies discussed in relation to PET waste, recycling methods ,

and results from the study. Even various applications are described here. Its usefulness is further defined as

roofing Composite concrete, floor tiling and other applications.

Keywords: polyethylene terephthalate; waste; recycling; aggregate; tile; etc.

References:

1. Suganthy, P., Chandrasekar, D., and Kumar, S.P.K. ―Utilization of pulverized plastic in cement concrete as fine aggregate" in

International Journal of Research in Engineering and Technology, (2013) 2(6), pp. 1015{1018}.

2. Foti, D. ―Use of recycled waste pet bottles fibers for the reinforcement of concrete" in Composite Structures, . (2013) 96, pp. 396{404}.

3. Ruiz-Herrero, J.L., Nieto, D.V., Lopez-Gil, A., Arranz, A., Fernandez, A., Lorenzana, A., and RodrguezPerez, M.A. ―Mechanical and

thermal performance of concrete and mortar cellular materials containing plastic waste" in Construction and Building Materials, (2016)

104, pp. 298{310}.

4. Sadiq, M.M. and Khattak, M.R. ―Literature review on differentplasticwastematerialsuseinconcrete" in Journal of Emerging Technologies and Innovative Research (JETIR), (2015) 2(6), pp. 1800{1803}.

5. Malak, K.R. ―Use of waste plastic in concrete mixture as aggregate replacement" in International Journal of Engineering, Education

and Technology (ARDIJEET), (2015) 3(2), pp. 1{7}. 6. Patil, P.S., Mali, J.R., Tapkire, G.V., and Kumavat, H.R. (2014) ―Innovative techniques of waste plastic used in concrete mixture" in

International Journal of Research in Engineering and Technology, (2014 3(9), pp.29{31}.

7. G. O. Bamigboye, B.U. Ngene, D. Ademola. J. k. Jolayemi ―Experimental Study on the Use of Waste Polyethylene Terephthalate (PET) and River Sand in Roof Tile Production‖ in International Conference on Engineering for Sustainable World, Journal of Physics:

Conference Series (2019) 1378 (042105).

8. T.M. Coelho, R. Castro 1, J.A. Gobbo Jr ―PET containers in Brazil: Opportunities and challenges of a logistics model for post-consumer waste recycling‖ in Resources, Conservation and Recycling (2011) 55, 291–299.

9. Ghernouti, Y., Rabehi, B., Bouziani, T., Ghezraoui, H., and Makhlou, A. ―Fresh and hardened properties of self-compacting concrete

containing plastic bag waste bers (WFSCC)" in Construction and Building Materials, (2015) 82, pp. 89{100}. 10. Virginija JANKAUSKAITĖ, Gintaras MACIJAUSKAS, Ramūnas LYGAITIS―Polyethylene Terephthalate Waste Recycling and

Application Possibilities: a Review in ISSN (2008) 1392–1320 MATERIALS SCIENCE (MEDŽIAGOTYRA). Vol. 14, No. 2.

11. 11. Nikles, D. E., Farahat, M. S.―New Motivation for the Depolymerization Products Derived from Poly(ethylene Terephthalate) (PET)

Waste‖: a Review Macromolecular Materials and Engineering (2005) 290: pp. 13 – 30.

12. FindLaw ―Points to Consider for the Use of Recycled Plastics in Food Packaging: Chemistry Considerations‖: U.S. Food and Drug

Administration, December 1992. Available from http://corporate.findlaw.com/(date of access May 2008). 13. US Patent 5876644. Food Quality Polyester Recycling, 1999.

14. Fisher, M. M.―Plastics Recycling. In: Plastics and Environment. Ed. by A. L. Andrady, John Wiley & Sons, 2003: pp. 563 – 627.

15. Gupta, V. B., Bashir, Z. ―PET Fibres Films, and Bottles‖ Handbook of Thermoplastic Polyesters. Ed. By Fakirov S. Vol. 1, Weinheim, Germany: Wiley-VCH,(2002) pp. 317 – 388.

16. Oldenburg, K. U. ―Changing the way, we think: cleaner production is simply being more efficient‖. Our planet. (1993) 5(3), 8-9.

17. Zhao, R., Torley, P., and Halley, P.J. ―Emerging biodegradable materials: starch-and protein-based bio Nano composites" in Journal of Materials Science, (2008) 43(9), pp. 3058{3071}.

18. 18 .http:/www.plastiseurope.org.

656-663

Page 80: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

19. 19. Ruiz-Herrero, J.L., Nieto, D.V., Lopez-Gil, A., Arranz, A., Fernandez, A., Lorenzana, A., and RodrguezPerez, M.A.―Mechanical

and thermal performance of concrete and mortar cellular materials containing plastic waste" in Construction and Building Materials, (2016) 104, pp. 298{310}.

20. 20. Usman, M., Javaid, A., and Panchal, S. ―Feasibility of waste polythene bags in concrete" in International Journal of Engineering

Trends and Technology (IJETT), (2008) 23(6), pp. 317{319}.

21. 21. Marzouk OY, Dheilly RM, Queneudec M. ―Valorization of post-consumer waste plastic in cementations concrete composites‖ in

Waste Manage; (2007), 27(2):310–8. [15].

22. 22. Reis JML, Chianelli-Junior R, Cardoso JL, Marinho FJV. ―Effect of recycled PET in the fracture mechanics of polymer mortar‖. In Constr Build Mater; (2011) 25(6):2799–804. [16].

23. 23. Afshoon, I.,Sharif, Y., ―Ground Copper Slag as a supplementary Cementry material and its influence on the fresh properties of

selt-consolidating concrete IESJ.part A Civ. Struct. Eng. (2014) 7(4),229-242. 24. 24. Mohammed Jalaluddin J ―Use of plastic waste in civil constructions and innovative decorative material (eco-friendly)‖ in MOJ

Civil Eng. 2017;3(5):359‒368. DOI: 10.15406/mojce.2017.03.00082.

25. 25. EPA, ―Report on Plastics‖ (2003), USA. 26. 26. T.M. Coelho, R. Castro 1, J.A. Gobbo Jr ―PET containers in Brazil: Opportunities and challenges of a logistics model for post-

consumer waste recycling‖ in Resources Conservation and Recycling (2011) 55; 291–299.

27. 27. Foolmaun RK, Ramjeawon T. ―Life cycle assessment (LCA) of PET bottles and comparative LCA of three disposal options in Mauritius‖ in Journal Environment and Waste Management; (2008) 2(1/2):125–38.

28. 28. Diptikar Behera, Yirgalem Damtew, Aman Mola ―EXPERIMENTAL INVESTIGATION ON RECYCLING OF PLASTIC

WASTES AND BROKEN GLASS IN TO CONSTRUCTION MATERIAL‖ in IJCRT | Volume 6, Issue 1 January 2018 | ISSN: 2320-2882.

29. 29. Hannawi K, Kamali-Bernard S, Prince W. ―Physical and mechanical properties of mortars containing PET and PC waste

aggregates‖ in Waste Manage; 2019; 30(11):2312–20. [17]. 30. 30. Amano, M. ―PET bottle system in Sweden and Japan‖ an integrated analysis from a life-cycle perspective (2004), Lund, Sweden.

31. 31. Albano C, Camacho N, Hernandez M, Matheus A, Gutiérrez A. ―Influence of content and particle size of waste pet bottles on

concrete behavior at different w/c ratios‖ in Waste Manage; 2009: 29:2707–16. 32. 32. E. Rahmani , M. Dehestani , M.H.A. Beygi , H. Allahyari , I.M. Nikbin) ―On the mechanical properties of concrete containing

waste PET particles‖ in Construction and Building Materials (2013) 47: 1302–1308.

33. 33. Ayalon O, Avnimelech Y, Shechter M. ―Application of a comparative multidimensional LCA in solid waste management policy: the case of soft drink containers‖ in Journal of Environmental Science and Policy;(2000) 3(2–3):135–44

34. 34. Boustead I. ―Eco-profiles of the European plastics industry. Report 8: polyethylene terephthalate (PET)‖. Brussels: Association of

Plastic Manufacturers in Europe Technical and environmental Centre (1995). 35. 35. National association for PET container resources ―Report on post-consumer PET container recycling activity‖ 2000.

36. 36. American Society for Testing and Materials (ASTM C128). ―Standard Test Method for Density, Relative Density (Specific

Gravity), and Absorption of Fine Aggregate‖ in West Conshohocken, (2001). PA, USA. 37. 37. British Standard (BS EN ISO 604). Plastics-Determination of compressive properties. (1999), British Standard, United Kingdom.

38. 38. American Society for Testing and Materials (ASTM C29/C29M). Standard Test Method for Bulk Density (―Unit Weight‖) and

Voids in Aggregate. West Conshohocken, (2009) PA, USA. 39. 39. British Standard (BS EN ISO 62). ―Plastics-determination of water absorption‖ (1999) in British Standard, United Kingdom.

40. 40. Dinesh.S, Dinesh.A, Kirubakaran.K (2016) ―UTILISATION OF WASTE PLASTIC IN MANUFACTURING OF BRICKS AND PAVER BLOCKS‖ International Journal of Applied Engineering Research, ISSN 0973-4562 Vol. 11 No.3 © Research India

Publications; http/www.ripublication.com/ijaer.htm

41. 41. Mendes MR, Amaraki T, Hanaki K. ―Comparison of the environmental impact of incineration and landfilling in Sao Paulo city as determined by LCA. Journal Resources, Conservation and Recycling; (2004) 41(4):47–63.

42. 42. V. Mohan, S. Gayathri―Effective Utilization of Plastic Wastes in Tile Manufacturing: A step Towards Sustainability‖ in

International Journal of Science Research and Engineering Development—Volume 2issue 3, May-June 2019. 43. 43. Pagar S. R.,Panchamiya P. B., Bagul. K. P., Kale A. B.,―Effect of Plastic Waste on Tile By Using Thermosetting Method‖ in 6th

International Conference on Recent Trends in Engineering & Technology (ICRTET-2018).

44. 44. Ridham Dhawan, Brij Mohan Singh Bisht, Rajeev Kumar, Saroj Kumar, S.K.Dhawan,―Recycling of Plastic Waste into Tiles with reduced Flammability and Improved Tensile Strength‖ in Process Safety and Environmental Protection 124 (2019) 299-307.

45. 45. R. Saxena, T. Gupta, R.K. Shama, S. Chaudhary, and A. Jain, ―Assessment of mechanical and durability properties of concrete

containing PET waste‖ in Scientra Iranica .2020; 27 (1), 1-9. 46. 46. G. Siva Kumar Reddt, G. Javid Hussain, A. Muni Teja, P. Madhan Kumar, B. Hemanth Kumar, (2019)―Effect of Plastic Waste on

Tile by Using Thermosetting Method‖ in International Journal of Resaerch in Enginering, Science and Management Volume-2,Issue-

11, November-2019. 47. 47. Prof. T.S. VandaLI,Prof. M.R. Ingalagi, Mr Raghavendr Paste, Mr Akansh Patil, Mr. Prajwal G V.‖Design and Fabrication of

Composite Tile Maker Machine by Recycling of Plastics‖ in a Journal of Composition Theory Volume XII Issue VI JUNE 2019.

48. 48. P. O. Awoyera, A. Adesina,―Plastic Waste to c Construction Products: Status, Limitations and Future Perspective‖ in case studies in construction materials 2020; 12 e00330.

49. 49. Agunwamba, J.Waste: engineering and management tools, 2001;Immaculate publications, enugu

50. 50. Williams PT. ―Waste treatment and disposal‖ in Chisterter: (1998) Wiley. 51. 51. Pereira de Oliveira LA, Castro-Gomes JP. ―Physical and mechanical behavior of recycled PET fiber reinforced mortar‖ in Constr

Build Mater;2011; 25(4):1712–7.

52. 52. Frigione M. ‖Recycling of PET bottles as fine aggregate in concrete. Waste Manag;30(6):1101–6. [11] (2010). 53. 53. Choi YW, Moon DJ, Kim YJ, Lachemi M.―Characteristics of mortar and concrete containing fine aggregate manufactured from

recycled waste polyethylene terephthalate bottles‖ in Constr Build Mater; (2009)23(8):2829–35. [12]

54. 54. Choi YW, Moon DJ, Seung CJ, Cho SK. ‖Effects of waste PET bottles aggregate on the properties of concrete‖ in Cem Concr Res 2005;35(4):776–81. [13]

55. 55. Akçaozoglu S, Atis CD, Akçaozoglu K.―An investigation on the use of shredded waste PET bottles as aggregate in lightweight

concrete‖ in Waste Manage;2010; 30(2):285–90. [14] 56. 56. Denison R. A. ―Environmental lifecycle comparisons of recycling, landfilling, and incineration‖ a review of recent studies. Annual

Review of Energy and the Environment;1996; 21:191–237.

57. 57. Grant, T, James, KL, Lundie, S, Sonneveld, K. ―Life cycle assessment for paper and packaging‖ in waste management scenarios in Victoria; (2001) p. 2

58. 58. Grimberg E, Blauth P. Coleta Seletiva reciclando materiais, reciclando valores. São Paulo: Polis; 1998.

59. 59. Manzini E, Vezzoli C. O (2005)―desenvolvimento de produtos sustentáveis‖. São Paulo: Edusp; 2005 60. 60. Molgaard C. Environmental impacts by disposal of plastic from municipal solid waste. Journal Resources, Conservation and

Recycling 1995;15(1):51–63.

61. 61. Person, L, et al. Life cycle assessment of packaging systems for beer and soft drinks. Technical report 6: disposable PET bottles. Ministry of Environment and Energy, Denmark, Danish Environmental Protection Agency, Miljprojekt no. 405; 1998. p. 198.

62. 62. Perugini F, Mastellone ML, Umberto A. Environmental aspects of mechanical recycling of PE and PET: a life cycle assessment

study. Progress in Rubber, Plastics and Recycling Technology 2004;20(1):69–84 63. 63. Molgaard C. Environmental impacts by disposal of plastic from municipal solid waste. Journal Resources, Conservation and

Recycling 1995;15(1):51–63.

64. 64. Perugini F, Mastellone ML, Umberto A. Environmental aspects of mechanical recycling of PE and PET: a life cycle assessment

Page 81: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

study. Progress in Rubber, Plastics and Recycling Technology 2004;20(1):69–84

65. 65. Diptikar Behera, Yirgalem Damtew, Aman Mola ―EXPERIMENTAL INVESTIGATION ON RECYCLING OF PLASTIC WASTES AND BROKEN GLASS IN TO CONSTRUCTION MATERIAL‖ in © 2018 IJCRT | Volume 6, Issue 1 January 2018 |

ISSN: 2320-2882.

66. 66. Prashant Kumar, Ranjit Kumar Yadav , Ravi Kumar , Shivangi Maury, Subodh Chand, Sudhir Yadav, Prof. (Dr.) V.K. Saini

―RECYLING OF WASTE PLASTIC USING EXTRUSION PROCESS‖ in IJARIIE-ISSN(O)-2395-4396

67. 67. Scheirs, J., 1998. Polymer Recycling: Science, Technology, and Applications. Wiley.

68. 68.. Hopewell, J., Dvorak, R., Kosior, E.,. Plastics recycling: challenges and opportunities. Philos. Trans. R. Soc. B-Biol. Sci. 2009; 364, pp 2115–2126.

69. 69. George, N., Kurian, T., Recent developments in the chemical recycling of postconsumer poly(ethylene terephthalate) waste. Ind.

Eng. Chem. Res.2014, 53, 14185–14198. 70. 70. Awaja, F., Pavel, D., 2005. Recycling of PET. Eur. Polymer J. 41, 1453–1477.

71. 71. Aguado, J., S, D.P. ―Feedstock Recycling of Plastic Waste., 1999.

72. 72. Al-Salem, S., Lettieri, P., Baeyens, J.,. Recycling and recovery routes of plastic solid waste (PSW): a review. Waste Manage. 2009a, 29, 2625–2643.

73. 73. Al-Salem, S., Lettieri, P., Baeyens, J.. Thermal treatment of different grades and types of Polyethylene (PE) wasted articles. In:

Proceedings of 8th World Congress of Chemical Engineering Montreal (Quebec), 2009b ,pp. 1–4. 74. 74. Al-Salem, S., Lettieri, P., Baeyens, J., 2010. The valorization of plastic solid waste (PSW) by primary to quaternary routes: from

re-use to energy and chemicals. Prog. Energy Combust. Sci. 36, 103–129.

75. 75. Scheirs, J., Kaminsky, W., 2006. Feedstock Recycling and Pyrolysis into Diesel and Other Fuels. 76. 76. Scheirs, J., Kaminsky, W., 2006b. Feedstock Recycling and Pyrolysis of Waste Plastics. John Wiley & Sons.

77. 77. R. Miandad, M.A. Barakat, Asad S. Aburiazaiza, M. Rehan b , I.M.I. Ismail b , A.S. Nizami ―Effect of plastic waste types on

pyrolysis liquid oil‖ in International Biodeterioration & Biodegradation 119 (2017) 239-252. 78. 78. American Society for Testing and Materials (ASTM C29/C29M). Standard Test Method for Bulk Density (―Unit Weight‖) and

Voids in Aggregate. West Conshohocken, 1997; PA, USA ]

79. 79. Alyamac, K. E, Tugrul, E ―A durable eco friend and aesthetic concrete work; marble concrete, in 11 th International Congress on Advance in Civil Engineering (ACE 2014), Vol. 50 pp 21-25.

80. 80. Afshoon, I.,Sharif, Y., ―Ground Copper Slag as a supplementary Cementry material and its influence on the fresh properties of selt-

consolidating concrete IESJ.part A Civ. Struct. Eng. 2014; 7(4),229-242. 81. 81. Al-jabri, K.S.,Al-Saidu, A.H. Taha, R. ―Effect of Copper Slag as a fine aggregate on the properties of cement mortars and concrete.

Const. Build. Mater. 2011, 25(2), 933-938.

82. 82. Ghafoori, N, Bucholc, J., ―Investigation of lignite based botton ash for structural concrete, J. Mater. Civ. Eng. .1996, 8(3), 128-137. 83. 83. Ghosi, A. Ghosi, A., Neogi, S., ―Reuse of fly ash and bottom ash in mortars with improved thermal conductivity performance for

buildings. Helijon 2018), 4(11), 00934.

84. 84. Gorai, B., Jana, R.K, (2003 ―Characteristic and utilization of copper slag- a review – Resourc. Conserv. Recycl. 2003, 39(4), 299-932.

85. 85. Guney, Y., Sari. Y. D., Yaldin, M., Tuncan, A. Donmez, S., ―Re-usage of waste foundry sand in high-strengh concrete waste

manag. 2010, 30(8-9), 1705-1713. 86. 86. Kurama, H. Kaya. M. ―Usage of coal combustion bottom ash in concrete mixture. Const. Build. Mater. 2008, 22(9: 1650-1663.

87. 87. Kim. H. K., Ha, K.A., Lee, HG.K., ―Internal Curing for high- strength mortar Const. Build. Mater.2016, 126, 1-8. 88. 88. Khanduri, A. Siddique, R. G―Properties of mortar incorporating waste foundry sand. Maters Dissertation, 2010, pp. 1-63.

89. 89. Khyaliya, R.K., Kabeer, K.S.A, Vyas. A.K., ―Evaluation of strength and durability of lean mortar mixes containing marble waste.

Constr. Build. Mater.2017, 147. 598-607. 90. 90. Eren. O., Marar. K.―Effects of limestone crusher dust and steel fibres on concrete. Constr. Build. Mater. 2009, 23(2), 981-988.

91. 91. Madheswaran, C.K. Ambily, P.S., Daratreya, J.K. Rajamane, N.P., ―Studies on use of copper slag as replacement material for river

sand in building constructions. J. Inst. Eng.: Series A 2014, 95(3), 169-177. 92. 92. Mailar. G., Sujay Raghavendra, N. Hiremath, D., Sreedhara, B.M., Manu, D.S., ―Sustainable Utilization of discarded foundry sand

and crushed brick masonry aggregate in the production of lightweight concrete Eng. Struct. Technol.2017, 9(1), 52-61.

93. 93. Mandal. A.K. Paramkusam, B.R. Sinha, O. P.―Fluidized bed combustion bottom ash: a better and alternative geo-material resource for construction waste manag. Res. 2018, 36(4), 351-360.

94. 94. Monosi. S., Sani, D., Tittarelli, F., ―Used foundary sand in cement mortars and concrete production. Open waste Manag. J. 2010,

3(1). 95. 95. Moon. H.Y., Choi. Y.W., Song. Y.K. Jeon. J. K.(2005) ―Fundamental properties of mortar and concrete using waste foundry sand .

J. Korea concr. Inst. 17(1), 141-147.

96. 96. Mu, O., Du, H., Zhoux, He. K., Lin, Z. Yan, F., Guo, R ―Performance of copper slag contained mortars after exposure to elevated temps. Constr. Build. Mater. 2018, 172, 378-386.

97. 97. Mubiayi. M. P., ―Characterisation of sand stones: mineralogy and physical properties in: 2014, proceedings of the world congress

on Engineering. 98. 98. Naik, T.R. Singh S. S., Ramme. B. W ―Performance and leading assessment of foldable slurry: J. Environ. Eng.2001, 127(4), 359-

368

99. 99. Oruji, S. Bake.,N. A. Gudru, R. K. Nalluri, L. Gunay-din- Sen. O., Khard, K. Ingran, E. Mitigation of ASR expansion in concrete using ultra-fine coal bottom ash, Constr. Build. Mater. 2019, 203. 814-824.

100. 100. OZ, D. Koca. S. Koca. H. ―Recycling of coal combustion waste, Watse Mabag. Res. 2009, 27(3), 267-273.

101. 101. Prabhu. G. G. Hyun. J. H. Kim. Y. Y. ―Effects of foundary sand as a fine aggregate in concrete production. Constr. Build. Mater, 2014, 70, 514-521

102. 102. Ratielzonooz, M., Mirza, J., Sahim, M. R. Husin, M.W., Khankhje, E. ―Investigation of coal bottom ash and fly ash in concrete as

replacement for sand and cement. Constr. Build. Mater 2016, 116. 15-24. 103. 103. Rajaasekar, A. Amnachalam. K. Kottaisany. M. ―Assessment of strength and durability characteristics of the fine aggregate in

mansonry mortar. Arabian. J Sci. Eng. 2019, 39 (2), 737-745.

104. 104. Ramzi, N. I.R., Shahidan, S., Maarof. M. Z., Ali. N ―Physical and chemical properties of coal bottom ash (CBA) from Tanjuma Bin Power Plant. In IOD Conference series: Materials Science and Engineering Vol. 160. IOP Publishing p. 2016, 12056.1.

105. 105. Ramodoss . P. Sundrarajar, T., ―Utilization of Ignite based bottom ash as partial replacement of fine aggregate in mansory mortar,

Arabian J. Sci. Eng. 2014, 39 (2), 737-745. 106. 106. Siddique, R. ―Compressive strength, water absorption, sorptivity, abrasion resiustance and permeability of self-compacting

concrete containing coal bottom ash, Constr. Build. Mater. 2013, 47, 1444-1450

107. 107. Singh, G., SI=iddique, R ―Effect of waste foundary sand (wfs) as partial replacement of sand on the strength, ultrasonic pulse velocity and permeability of concrete. Constr. Build. Mater. 2012, 26 (1), 416-422.

108. 108. Zain, M. F.M., Islam, M.N. Raduri. S.S. Yap. S. G. ―Cement- based solidification for the safe disposal of blasted copper slag,

cement Concr. Compos. 2004, 26(7), 845-851. 109. 109. Yoon, J. Y., Lee J. Y. Kim. J. H. ―Use of raw- state bottom ash for aggregates in construction materials. J. Mater. Cycle waste

Manag.2019, 1-12.

110. 110. Jarusiripot. C., ―Removal of reactive dye by absorption over chemical pre-treatment coal based bottom ash . Procedia Chem. 2014, 9. 121-130.

111. 111. Cevik. S. Mutuk. T, Oktay. B. M. Demirbas. A.k. Mechanical and Micro structural characterization of cement mortars prepared by

waste foundry sand (wfs). J. Aust. Ceram. Soc. 2017, 53(2), 829-837.

Page 82: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

112. Mohammed Jalaluddin J ―Use of plastic waste in civil constructions and innovative decorative material (eco-friendly)‖ in MOJ Civil

Eng. 2017;3(5):359‒368. DOI: 10.15406/mojce.2017.03.00082.

110.

Authors: M Laxmidevi Ramanaiah

Paper Title: Multi-Objective Grey Wolf Optimization for Optimal Allocation of Distributed Generators in

Distribution Networks

Abstract: The power loss in the radial distribution network is appreciable as compared to transmission network.

To reduce the power loss in distribution network which is radial in nature, the solution methodology adopted in

this paper is optimal placement of distributed generators (DG). The optimization incorporated is Multi-objective

Grey Wolf Optimization (MOGWO). The optimization is accomplished for three different cases. In each case

two objective functions are simultaneously optimized to obtain non-dominated solutions using Multi-objective

Grey Wolf Optimization. Case (1): To minimize the real power loss and maximize the savings obtained due to

DG installation. Case (2): To minimize real power loss and maximum voltage deviation in the network. Case

(3): To minimize real power loss and rating of DG installed. MOGWO method maintains an archive which

contains pareto-optimal solutions. The archive mimics the behaviour of grey wolves. MOGWO method is

verified on radial distribution networks. The effectiveness of the optimization method is proven by comparing

the results with other optimization methods available in the literature.

Keywords: Distributed Generators, Multi-objective Grey Wolf Optimization, Real Power Loss, Savings,

Voltage deviation.

References:

1. W. L. Theo, J. S. Lim, W. S. Ho, H. Hashim, and C. T. Lee, ―Review of distributed generation (DG) system planning and optimisation

techniques: Comparison of numerical and mathematical modelling methods,‖ Renewable and Sustainable Energy Reviews, vol. 67, pp. 531–573, 2017.

A. M. El-Zonkoly, ―Optimal placement of multi-distributed generation units including different load models using particle swarm optimization,‖ Swarm and Evolutionary Computation, vol. 1, no. 1, pp. 50–59, 2011.

2. F. S. Abu-Mouti and M. E. El-Hawary, ―Optimal distributed generation allocation and sizing in distribution systems via artificial bee

colony algorithm,‖ IEEE Transactions on Power Delivery, vol. 26, no. 4, pp. 2090–2101, 2011. 3. R. Varikuti and D. M. D. Reddy, ―Optimal Placement of DG Units Using Fuzzy and Real Coded Genetic Algorithm,‖ Journal of

Theoretical and Applied Information Technology, pp. 145–151, 2009.

4. D. Q. Hung and N. Mithulananthan, ―Multiple distributed generator placement in primary distribution networks for loss reduction,‖ IEEE Transactions on Industrial Electronics, vol. 60, no. 4, pp. 1700–1708, 2013.

5. B. Mohanty and S. Tripathy, ―A teaching learning based optimization technique for optimal location and size of DG in distribution

network,‖ Journal of Electrical Systems and Information Technology, vol. 3, no. 1, pp. 33–44, 2016. 6. K. Nekooei, M. M. Farsangi, H. Nezamabadi-Pour, and K. Y. Lee, ―An improved multi-objective harmony search for optimal

placement of DGs in distribution systems,‖ IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 557–567, 2013.

7. P. S. Georgilakis and N. D. Hatziargyriou, ―A review of power distribution planning in the modern power systems era: Models, methods and future research,‖ Electric Power Systems Research, vol. 121, pp. 89–100, 2015.

8. D. Rama Prabha and T. Jayabarathi, ―Optimal placement and sizing of multiple distributed generating units in distribution networks by

invasive weed optimization algorithm,‖ Ain Shams Engineering Journal, vol. 7, no. 2, pp. 683–694, 2016. 9. S.Kansal, V. Kumar, and B. Tyagi, ―Hybrid approach for optimal placement of multiple DGs of multiple types in distribution

networks,‖ International Journal of Electrical Power and Energy Systems, vol. 75, no. October, pp. 226–235, 2016.

10. S. Ganguly and D. Samajpati, ―Distributed generation allocation on radial distribution networks under uncertainties of load and generation using genetic algorithm,‖ IEEE Transactions on Sustainable Energy, vol. 6, no. 3, pp. 688–697, 2015.

11. S.Kansal, B. Tyagi, and V. Kumar, ―Cost–benefit analysis for optimal distributed generation placement in distribution systems,‖

International Journal of Ambient Energy, vol. 38, no. 1, pp. 45–54, 2017. 12. M. Laxmidevi Ramanaiah and M. D. Reddy, ―Optimal Unified Power Quality Conditioner Allocation in Distribution Systems for Loss

Minimization using Grey Wolf Optimization,‖ International Journal of Engineering Research and Applications, vol. 7, no. 11, pp. 48–

53, 2017. 13. S. Mirjalili, S. M. Mirjalili, and A. Lewis, ―Grey Wolf Optimizer,‖ Advances in Engineering Software, vol. 69, pp. 46–61, 2014.

14. S. Mirjalili, S. Saremi, S. M. Mirjalili, and L. D. S. Coelho, ―Multi-objective grey wolf optimizer: A novel algorithm for multi-criterion

optimization,‖ Expert Systems with Applications, vol. 47, pp. 106–119, 2016. 15. M. E. Baran and F. F. Wu, ―Network reconfiguration in distribution systems for loss reduction and load balancing,‖ IEEE Transactions

on Power Delivery, vol. 4, no. 2, pp. 1401–1407, 1989.

16. M. E. Baran and F. F. Wu, ―Optimal capacitor placement on radial distribution systems,‖ IEEE Transactions on Power Delivery, vol. 4, no. 1, pp. 725–734, 1989.

17. M.Laxmidevi Ramanaiah and Dr. M. Damodar Reddy, ―Performance of Unified Power Quality Conditioner in radial distribution

networks using Particle Swarm Optimization Method,‖ International Journal of Applied Engineering Research, vol. 12, no. 24, pp. 14718-14726, 2017.

664-670

111.

Authors: Deepthi Chamkur V, C R Byrareddy

Paper Title: Heptagonal Shaped UWB Antenna with DGS for Wireless LTE with Enhanced Bandwidth

Abstract: The paper discusses about the implementation of Heptagonal shaped compact ultra-wideband planar

Microstrip patch antenna with and without defected ground plane structure (DGS) with analysis of various

parameters like return loss, VSWR bandwidth etc. A substrate made up of dielectric constant FR4 epoxy is

utilized and the 2D and 3D radiation pattern are also discussed. DGS has helped to fine tune and increase the

bandwidth & its effects have been studied. A volume of 28x32x1.7 (1523.2 mm^3) is occupied by the size of

antenna with dielectric constant of εr = 4.4, tanδ= 0.02. In order to provide fine tuning in the return loss graph, a

50Ω line with width of W=3mm direct line feeding method has been used for the micro-strip line and slots have

been introduced in the ground plane structure, for achieving the good bandwidth coupling between the slots

plays an important role. The antenna parameters including VSWR, Gain and return losses v/s frequency effects

for the antenna with variation of slots and dimensions has been studied in this paper along with the analysis of

important parameters such as return loss (dB), bandwidth, VSWR (Voltage Standing Wave Ratio) of patch

antenna which has been performed using Ansoft HFSS v15 tool. The proposed design of the heptagonal shaped

671-677

Page 83: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

antenna operates as an ultra-wide band antenna ranging from 3.20 GHz to 10 GHz and beyond covering most of

applications from LTE, Wimax (3.5/5.55GHz), Radio altimeter, RFID and ISM WLAN 5.2/5.8GHz etc.

Keywords: Microstrip Patch, heptagonal, defected ground structure, VSWR, 2D and 3D patterns, HFSS,

Wireless

References:

1. Deepthi Chamkur V, C R Byrareddy, Saleem Ulla Shariff, ―Split-ground Compact Ultra-wide Band Patch Antenna for Wireless

LTE/UMTS Operations", International Journal of Recent Technology and Engineering, 2019. DOI: 10.35940/ijrte.C5497.098319 2. T Kshitija, S Ramakrishna, Suhas B Shirol, Priyatam Kumar. "Micro - Strip Patch Antenna Using Various Types of Feeding

Techniques: An Implementation", 2019 International Conference on Intelligent Sustainable Systems (ICISS), 2019

3. Mst. Dilshad Jahan, Chinmoy Das, Nayan Sarker. "Design & Analysis of a Micro-strip Patch Antenna for RFID, WiMAX and X-band Applications", 2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT),

2019 4. Chen Jing Zhang,Mei Song Tong,"A Multiband LTE Antenna with Resonant Rings"

5. W. T. Li, Y. Q. Hei, W. Feng and X. W. Shi, "Planar Antenna for 3G/Bluetooth/WiMAX and UWB Applications With Dual Band-

Notched Characteristics," in IEEE Antennas and Wireless Propagation Letters, vol. 11, pp. 61-64, 2012. 6. L. Dang, Z. Y. Lei, Y. J. Xie, G. L. Ning and J. Fan, "A Compact Microstrip Slot Triple-Band Antenna for WLAN/WiMAX

Applications," in IEEE Antennas and Wireless Propagation Letters, vol. 9, pp. 1178-1181, 2010.

7. C. A. Balanis, ―Antenna Theory: Analysis and Design‖,1997 by John Wiley & Sons, Inc. 8. R. Garg, P. Bhartia, I. Bahl, A. Ittipiboon, ―Microstrip Antenna Design Handbook‖, ARTECH HOUSE, Boston 2001.

9. Chao-Ming Wu, Yung-Lun Chen, and Wen-Chung Liu, ―A Compact Ultrawideband Slotted Patch Antenna for Wireless USB Dongle

Application‖, IEEE ANTENNAS AND WIRELESS PROPAGATION LETTERS, VOL. 11, 2012. DOI: https://doi.org/10.1109/LAWP.2012.2202366

10. Farnaz Mirza mohammadi, Javad Nourinia and Changiz Ghobadi, "A Novel Dual-Wideband Monopole-Like Microstrip Antenna with

Controllable Frequency Response ", 'IEEE ANTENNAS AND WIRELESS PROPAGATION LETTERS, VOL. 11, 2012 289. DOI: https://doi.org/10.1109/LAWP.2012.2190130

11. Help Share Ideas website, http;//www.helpshareideas.com

12. Intelligent Data Communication Technologies and Internet of Things", Springer Science and Business Media LLC, 2020 13. Ansoft HFSS (High Frequency Structure Simulation) V-15 tool used, HFSS user manual, Ansoft Corporation, USA.

14. Pozar, David M., Microwave Engineering, Second Edition, Wiley, New York 1998.

15. Sigmaplot and Microsoft excel Software. 16. Biao Li, Ying-Zeng Yin, Wei Hu, YangDing and Yang Zhao, ―Wideband Dual-Polarized Patch Antenna With Low Cross Polarization

and High Isolation‖, IEEE ANTENNAS AND WIRELESS PROPAGATION LETTERS, VOL. 11, 2012 427. DOI:

https://doi.org/10.1109/LAWP.2012.2195149

112.

Authors: Heet Savla, Vruddhi Mehta, Ramchandra Mangrulkar

Paper Title: Prediction and Diagnosis of COVID-19 using Machine Learning Algorithms

Abstract: The world is reworking in a digital era. However, the field of medicine was quite repulsive to

technology. Recently, the advent of newer technologies like machine learning has catalyzed its adoption into

healthcare. The blending of technology and medicine is facilitating a wealth of innovation that continues to

improve lives. With the realm of possibility, machine learning is discovering various trends in a dataset and it is

globally practiced in various medical conditions to predict the results, diagnose, analyze, treat, and recover.

Machine Learning is aiding a lot to fight the battle against Covid-19. For instance, a face scanner that uses ML is

used to detect whether a person has a fever or not. Similarly, the data from wearable technology like Apple

Watch and Fitbit can be used to detect the changes in resting heart rate patterns which help in detecting

coronavirus. According to a study by the Hindustan Times, the number of cases is rapidly increasing. Careful

risk assessments should identify hotspots and clusters, and continued efforts should be made to further

strengthen capacities to respond, especially at sub-national levels. The core public health measures for the

Covid-19 response remain, rapidly detect, test, isolate, treat, and trace all contacts. The work presented in this

paper represents the system that predicts the number of coronavirus cases in the upcoming days as well as the

possibility of the infection in a particular person based on the symptoms. The work focuses on Linear Regression

and SVM models for predicting the curve of active cases. SVM is least affected by noisy data, and it is not prone

to overfitting. To diagnose a person our application has a certain question that needs to be answered. Based on

this, the KNN model provides the maximum likelihood result of a person being infected or not. Tracking and

monitoring in the course of such pandemic help us to be prepared.

Keywords: Healthcare, K-Nearest Neighbor, Linear Regression, Machine Learning Support Vector Machine.

References:

1. Krati Saxena, Dr. Zubair Khan, Shefali Singh," Diagnosis of Diabetes Mellitus using K Nearest Neighbor Algorithm," International

Journal of Computer Science Trends and Technology (IJCST) – Volume 2 Issue 4, July-Aug 2014, Page 36, ISSN: 2347-8578.

2. M. Nirmala Devi, S. A. alias Balamurugan and U. V. Swathi, "An amalgam KNN to predict diabetes mellitus," 2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN), Tirunelveli, 2013, pp.

691-695, DOI: 10.1109/ICE-CCN.2013.6528591.

3. V. Chamola, V. Hassija, V. Gupta and M. Guizani, "A Comprehensive Review of the COVID-19 Pandemic and the Role of IoT, Drones, AI, Blockchain, and 5G in Managing its Impact," in IEEE Access, vol. 8, pp. 90225-90265, 2020, doi:

10.1109/ACCESS.2020.2992341.

4. Ramesh, D., Katheria, Y.S. Ensemble method based predictive model for analyzing disease datasets: a predictive analysis approach. Health Techno. 9, 533–545(2019).https://doi.org/10.1007/s12553-019-00299-3

5. S. S. Arun and G. Neelakanta Iyer, "On the Analysis of COVID19 - Novel Corona Viral Disease Pandemic Spread Data Using Machine

Learning Techniques," 2020 4th International Conference on Intelligent Computing and Control Systems (ICICCS), Madurai, India, 2020, pp. 1222-1227, doi: 10.1109/ICICCS48265.2020.9121027.

6. F. Rustam et al., "COVID-19 Future Forecasting Using Supervised Machine Learning Models," in IEEE Access, vol. 8, pp. 101489-

101499, 2020, DOI: 10.1109/ACCESS.2020.2997311. 7. Ahmad S, Hafeez A, Siddqui SA, Ahmad M, Mishra S. A Review of COVID-19 (Coronavirus Disease-2019) Diagnosis, Treatments

678-683

Page 84: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

and Prevention. EJMO 2020;4(2):116–125.

8. M.K., Arti. (2020). Modeling and Predictions for COVID 19 Spread in India. 10.13140/RG.2.2.11427.81444. 9. Ghosal S., Sengupta S., Majumder M., Sinha B. Linear Regression Analysis to predict the number of deaths in India due to SARS-

CoV-2 at 6 weeks from day 0 (100 cases - March 14th 2020) Diabetes Metab Syndr. 2020;14:311–315. doi:

10.1016/j.dsx.2020.03.017.

10. Lixiang Li, Zihang Yang, Zhongkai Dang, Cui Meng, Jingze Huang, Haotian Meng, Deyu Wang, Guanhua Chen Jiaxuan Zhang,

Haipeng Peng, Yiming Shao, Propagation Analysis and Prediction of the COVID-19, Infectious Disease Modelling, Volume 5, 2020,

Pages 282-292.

113.

Authors: Junhwan Moon

Paper Title: Research Method of Clustering of COVID-19 with Text-mining

Abstract: A suspected patient with symptoms similar to coronavirus infection-19 was identified for the first

time on January 8, 2020 in Korea. After that, the world was dominated by COVID-19. People all around the

world must face a new society that will be changed by COVID-19. To prepare for such future, this study

collected related words around the keyword COVID-19 and has predicted what risk factors and opportunity

factors occur. As a result of SNA analysis by collecting news data from January to May, 2020, when COVID-19

was rapidly spreading, the key words "Prevention of epidemics", "Inspection", "Quarantine", "Infection",

"Government", Keywords such as "Patient", "Addition", "Diffusion", "Judgment" and "Prohibition" have had

important influences. Furthermore, COVID-19 has been affecting the daily lives of individual citizens, and their

interest in the government response process increased. Therefore, the response to the new infectious disease

must be quarantine based on science and technology and data, and it is imperative to establish a legal basis for

using social facilities as treatment facilities.

Keywords: Coronavirus, COVID-19, Big data, Social Network Analysis, Cluster Analysis, Future Prediction,

South Korea.

References:

1. C. Batini, C. Cappiello, C. Francalanci, A. Maurino, and G. Viscusi. (2011, August). ―A capacity and value based model for data

architectures adopting integration technologies,‖ In AMCIS.

2. Central Accident Remediation Headquarters. Central Defense Response Headquarters, 2020. [Online]. Available: http://ncov.mohw.go.kr/tcmBoardView.do?brdId=3&brdGubun=31&dataGubun=&ncvContSeq=583&contSeq=583&board_id=311&g

ubun=ALL

3. Central Accident Remediation Headquarters. Central Defense Response Headquarters, 2020. [Online]. Available:

http://ncov.mohw.go.kr/tcmBoardView.do?brdId=3&brdGubun=31&dataGubun=&ncvContSeq=1241&contSeq=1241&board_id=311

&gubun=ALL

4. Central Accident Remediation Headquarters. Central Defense Response Headquarters, 2020. [Online]. Available: http://ncov.mohw.go.kr/tcmBoardView.do?brdId=&brdGubun=&dataGubun=&ncvContSeq=353682&contSeq=353682&board_id=&g

ubun=ALL

5. Ministry of Education, 2020. [Online]. Available: https://www.moe.go.kr/sub/info.do?m=020102&s=moe 6. Ministry of Employment and Labor, 2020. [Online]. Available:

http://www.moel.go.kr/news/enews/report/enewsView.do?news_seq=10754

7. National Trauma Center, 2020. [Online]. Available: https://nct.go.kr/serviceCenter/pressDetail.do?currentPageNo=2&refnceSeq=339&searchKeyword1=

8. Ying Liu, Albert A Gayle, Annelies Wilder-Smith and Joacim Rocklöv, ―The reproductive number of COVID-19 is higher compared to

SARS coronavirus‖, Journal of travel medicine, 2020. 9. Yan Bai, Lingsheng Yao, Tao Wei, Fei Tian, Dong-Yan Jin, Lijuan Chen and Meiyun Wang, ―Presumed asymptomatic carrier

transmission of COVID-19‖, Jama, 323(14), 1406-1407, 2020.

10. Freeman, Linton C. (Ed.)., Research methods in social network analysis. Routledge, 2017. 11. Milgram, Stanley, ―The small world problem‖, Psychology today, Vol. 2, no. 1, pp.60-67, 1967.

12. Freeman, Linton, ―The development of social network analysis‖, A Study in the Sociology of Science, 1, 687, 2004.

13. Marin, Alexandra and Barry Wellman, "Social network analysis: An introduction", The SAGE handbook of social network analysis, 11, 2011.

14. Otte, Evelien, and Ronald Rousseau, ―Social network analysis: a powerful strategy, also for the information sciences‖, Journal of

information Science, Vol. 28, no. 6, pp.441-453, 2002. 15. Kim, Jooho, and Makarand Hastak, ―Social network analysis: Characteristics of online social networks after a disaster‖, International

Journal of Information Management, Vol. 38, no. 1, pp.86-96, 2018.

16. Wasserman, Stanley, and Katherine Faust, Social network analysis: Methods and applications, Vol. 8, Cambridge university press, 1994.

17. Lee, Min-Joong, Sunghee Choi, and Chin-Wan Chung, ―Efficient algorithms for updating betweenness centrality in fully dynamic

graphs‖, Information Sciences, 326, pp.278-296, 2016. 18. Scott, Robert A, The Making of Blind Men, Deviance: A Symbolic Interactionist Approach, 236, 1995.

19. De Nooy, Wouter, Andrej Mrvar, and Vladimir Batagelj, ―Exploratory social network analysis with Pajek: Revised and expanded

edition for updated software‖, Vol. 46, Cambridge University Press, 2018. 20. Rowley, Timothy J, ―Moving beyond dyadic ties: A network theory of stakeholder influences‖, Academy of management Review, Vol.

22, no. 4, pp.887-910, 1997.

21. Ng, Andrew Y., Michael I. Jordan, and Yair Weiss, ―On spectral clustering: Analysis and an algorithm‖, In Advances in neural information processing systems, pp. 849-856, 2002.

22. Xie, Junyuan, Ross Girshick, and Ali Farhadi, ―Unsupervised deep embedding for clustering analysis‖, In International conference on

machine learning, pp. 478-487, 2016. 23. Lee, Jae Yun, Heejung Kim, and Pan Jun Kim, ―Domain analysis with text mining: Analysis of digital library research trends using

profiling methods‖, Journal of Information Science, Vol. 36, no. 2, pp.144-161, 2010.

24. Kim, Heejung, and Jae Lee, ―Archiving research trends in LIS domain using profiling analysis‖, Scientometrics, Vol. 80, no. 1, pp75-90, 2009.

25. Huang, Wei, and Sung-Kwun Oh, ―Optimized polynomial neural network classifier designed with the aid of space search simultaneous

tuning strategy and data preprocessing techniques‖, Journal of Electrical Engineering & Technology, Vol. 12, no. 2, pp.911-917, 2017.

684-690

114. Authors: Islahuddin Jalal, Hashmatullah Rasekh, Qudrattullah Omerkhel, Qamaruddin Shamsi

Page 85: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

Paper Title: Risk Analysis of BYOD in Afghanistan’s Organization

Abstract: Improving ICT management strategies is an ongoing need for almost all organizations. At the same

time, the challenges that BYOD brings to the organization need to be carefully considered. BYOD terminology

can refer to related concepts, technologies, and strategies that enable employees to use organizational resources.

The use of different databases, applications, and personal devices such as smartphones, laptops, tablets, and any

other mobile device such as memory chips and external hard drives can provide examples of these resources.

The implementation of BYOD has brought a clear advantage to the organization. However, the use of BYOD in

organizations can pose some risks and threats. The main purpose of this study was to analyze BYOD risks in

Afghan organizations through cross-sectional quantitative research methods. An online survey of 24 questions

was conducted on various aspects of BYOD risk from various organizations in Afghanistan. Through the use of

raw data, survey results related to BYOD implementation in Afghanistan have been collected. Thus, the

researchers found out that IT staffs have a low level of awareness of the risks and challenges of BYOD security

and the latest technologies used by Afghan organizations. Finally, recommendations have been made.

Keywords: Risk Analysis, Bring Your Own Device (BYOD), Cyber Security, Information Security.

References:

1. G. O. Young, ―Synthetic structure of industrial plastics (Book style with paper title and editor),‖ in Plastics, 2nd ed. vol. 3, J. Peters, Ed. New York: McGraw-Hill, 1964, pp. 15–64.

2. W.-K. Chen, Linear Networks and Systems (Book style). Belmont, CA: Wadsworth, 1993, pp. 123–135.

3. H. Poor, An Introduction to Signal Detection and Estimation. New York: Springer-Verlag, 1985, ch. 4. 4. B. Smith, ―An approach to graphs of linear forms (Unpublished work style),‖ unpublished.

5. E. H. Miller, ―A note on reflector arrays (Periodical style—Accepted for publication),‖ IEEE Trans. Antennas Propagat., to be

published. 6. J. Wang, ―Fundamentals of erbium-doped fiber amplifiers arrays (Periodical style—Submitted for publication),‖ IEEE J. Quantum

Electron., submitted for publication.

7. C. J. Kaufman, Rocky Mountain Research Lab., Boulder, CO, private communication, May 1995. 8. Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, ―Electron spectroscopy studies on magneto-optical media and plastic substrate

interfaces(Translation Journals style),‖ IEEE Transl. J. Magn.Jpn., vol. 2, Aug. 1987, pp. 740–741 [Dig. 9th Annu. Conf. Magnetics

Japan, 1982, p. 301]. 9. M. Young, The Techincal Writers Handbook. Mill Valley, CA: University Science, 1989.

10. (Basic Book/Monograph Online Sources) J. K. Author. (year, month, day). Title (edition) [Type of medium]. Volume(issue).

Available: http://www.(URL) 11. J. Jones. (1991, May 10). Networks (2nd ed.) [Online]. Available: http://www.atm.com

12. (Journal Online Sources style) K. Author. (year, month). Title. Journal [Type of medium]. Volume(issue), paging if given.

Available: http://www.(URL) research work, membership, achievements, with photo that will be maximum 200-400 words.

691-698

115.

Authors: Rohan Yashraj Gupta, Satya Sai Mudigonda, Pallav Kumar Baruah, Phani Krishna Kandala

Paper Title: Implementation of Correlation and Regression Models for Health Insurance Fraud in Covid-19

Environment using Actuarial and Data Science Techniques

Abstract: Fraud acts as a major deterrent to a company‘s growth if uncontrolled. It challenges the fundamental

value of ―Trust‖ in the Insurance business. COVID-19 brought additional challenges of increased potential fraud

to health insurance business. This work describes implementation of existing and enhanced fraud detection

methods in the pre-COVID-19 and COVID-19 environments. For this purpose, we have developed an innovative

enhanced fraud detection framework using actuarial and data science techniques. Triggers specific to COVID-19

are identified in addition to the existing triggers. We have also explored the relationship between insurance fraud

and COVID-19. To determine this we calculated Pearson correlation coefficient and fitted logarithmic regression

model between fraud in health insurance and COVID-19 cases. This work uses two datasets: health insurance

dataset and Kaggle dataset on COVID-19 cases for the same select geographical location in India. Our

experimental results shows Pearson correlation coefficient of 0.86, which implies that the month on month rate

of fraudulent cases is highly correlated with month on month rate of COVID-19 cases. The logarithmic

regression performed on the data gave the r-squared value of 0.91 which indicates that the model is a good fit.

This work aims to provide much needed tools and techniques for health insurance business to counter the fraud.

Keywords: Fraud detection framework, Pearson correlation, Logarithmic regression, COVID-19, actuarial

techniques, data science techniques, fraud detection, fraud prevention, fraud triggers.

References:

1. R. A. Bauder and T. M. Khoshgoftaar, ―Medicare Fraud Detection Using Machine Learning Methods,‖ in 2017 16th IEEE International

Conference on Machine Learning and Applications (ICMLA), 2017, vol. 2018-Janua, pp. 858–865, doi: 10.1109/ICMLA.2017.00-48.

2. L. V. . M. R. M. Ekin Tahir; Fulton, T. Ekin, R. M. Musal, and L. V. Fulton, ―Overpayment models for medical audits: multiple scenarios,‖ J. Appl. Stat., vol. 42, no. 11, pp. 2391–2405, Nov. 2015, doi: 10.1080/02664763.2015.1034659.

3. A. Gangopadhyaya and A. B. Garrett, ―Unemployment, Health Insurance, and the COVID-19 Recession,‖ SSRN Electron. J., Apr.

2020, doi: 10.2139/ssrn.3568489. 4. D. Thornton et al., ―Predicting Healthcare Fraud in Medicaid: A Multidimensional Data Model and Analysis Techniques for Fraud

Detection,‖ Procedia Technol., vol. 9, pp. 1252–1264, 2013, doi: 10.1016/j.protcy.2013.12.140.

5. ―Insurance Fraud in Times of Crisis - FRISS.‖ [Online]. Available: https://www.friss.com/blog/insurance-fraud-in-times-of-crisis/. [Accessed: 05-Jun-2020].

6. ―Coalition Against Insurance Fraud: Rapid National Response Urged To Head Off Coming Wave of COVID-19 Insurance Scams -

InsuranceNewsNet.‖ [Online]. Available: https://insurancenewsnet.com/oarticle/coalition-against-insurance-fraud-rapid-national-response-urged-to-head-off-coming-wave-of-covid-19-insurance-scams#.Xts8DzozbIX. [Accessed: 06-Jun-2020].

7. ―Indian general insurance market grows 14.5% | Insurance Business.‖ [Online]. Available:

https://www.insurancebusinessmag.com/asia/news/breaking-news/indian-general-insurance-market-grows-14-5-213662.aspx. [Accessed: 20-Sep-2020].

699-706

Page 86: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

8. S.-H. Li, D. C. Yen, W.-H. Lu, and C. Wang, ―Identifying the signs of fraudulent accounts using data mining techniques,‖ Comput.

Human Behav., vol. 28, no. 3, pp. 1002–1013, May 2012, doi: 10.1016/j.chb.2012.01.002. 9. N. Pillay, A. P. Engelbrecht, A. Abraham, M. C. Du Plessis, V. Snášel, and A. K. Muda, Advances in Nature and Biologically Inspired

Computing, vol. 419. Cham: Springer International Publishing, 2016.

10. ―How European Insurers Can Manage The Impact Of Covid-19.‖ [Online]. Available: https://www.oliverwyman.com/our-

expertise/insights/2020/mar/covid-19-european-insurance.html. [Accessed: 05-Jun-2020].

11. ―COVID-19 Impact on Global Insurance Fraud Detection Industry 2020: Industry Trends, Size, Share, Growth Applications, SWOT

Analysis by Top Key Players and Forecast Report to 2026 – Jewish Market Reports.‖ [Online]. Available: https://jewishlifenews.com/uncategorized/covid-19-impact-on-global-insurance-fraud-detection-industry-2020-industry-trends-size-

share-growth-applications-swot-analysis-by-top-key-players-and-forecast-report-to-2026/. [Accessed: 05-Jun-2020].

12. ―Impact of COVID-19 on Life And Health Insurance | TCS.‖ [Online]. Available: https://www.tcs.com/blogs/how-technology-can-aid-insurers-combat-covid-19. [Accessed: 27-May-2020].

13. ―COVID-19 Impact on Fraud Detection and Prevention (FDP) Market | Coronavirus Outbreak &amp; FDP Industry |

MarketsandMarkets.‖ [Online]. Available: https://www.marketsandmarkets.com/Market-Reports/covid-19-impact-on-fraud-detection-and-prevention-market-23997778.html. [Accessed: 05-Jun-2020].

14. ―COVID-19 online fraud trends: Industries, schemes and targets - Help Net Security.‖ [Online]. Available:

https://www.helpnetsecurity.com/2020/05/15/covid-19-online-fraud/. [Accessed: 05-Jun-2020]. 15. ―COVID-19 (C-19) and Fraudulent Claims.‖

16. ―COVID-19 – A backdoor to increased fraud risk?‖ [Online]. Available: https://www2.deloitte.com/ch/en/pages/financial-

advisory/articles/covid-19-operating-in-the-new-normal-fraud-risk.html. [Accessed: 05-Jun-2020]. 17. N. Dragano, C. J. Rupprecht, O. Dortmann, M. Scheider, and M. Wahrendorf, ―Higher risk of COVID-19 hospitalization for

unemployed: an analysis of 1,298,416 health insured individuals in Germany,‖ medRxiv, p. 2020.06.17.20133918, Jun. 2020, doi:

10.1101/2020.06.17.20133918. 18. J. W. Goodell, ―COVID-19 and finance: Agendas for future research,‖ Financ. Res. Lett., vol. 35, Jul. 2020, doi:

10.1016/j.frl.2020.101512.

19. ―Evaluating the impact of COVID-19 on insurance sector technology - Omdia.‖ [Online]. Available: https://technology.informa.com/623267/evaluating-the-impact-of-covid-19-on-insurance-sector-technology. [Accessed: 05-Jun-2020].

20. ―How Will COVID-19 Impact Personal Injury Cases?‖ [Online]. Available: https://www.atltriallaw.com/how-will-covid-19-impact-

personal-injury-cases/. [Accessed: 05-Jun-2020]. 21. R. Y. Gupta, S. Sai Mudigonda, P. K. Kandala, and P. K. Baruah, ―Implementation of a Predictive Model for Fraud Detection in Motor

Insurance using Gradient Boosting Method and Validation with Actuarial Models,‖ in 2019 IEEE International Conference on Clean

Energy and Energy Efficient Electronics Circuit for Sustainable Development (INCCES), 2019, pp. 1–6, doi: 10.1109/INCCES47820.2019.9167733.

22. V. Chandola, ―Anomaly Detection : A Survey,‖ 2009.

23. D. Cutler, ―How Will COVID-19 Affect the Health Care Economy?,‖ JAMA - Journal of the American Medical Association, vol. 323, no. 22. American Medical Association, pp. 2237–2238, 09-Jun-2020, doi: 10.1001/jama.2020.7308.

24. ―Insurance sector in India: Overview, IRDAI, Companies, Stats & Trends.‖ [Online]. Available:

https://www.acko.com/articles/general-info/insurance-sector-india/. [Accessed: 08-Jun-2020]. 25. ―Insurance Sector in India: Industry Overview, Market Size & Trends | IBEF.‖ [Online]. Available:

https://www.ibef.org/industry/insurance-sector-india.aspx. [Accessed: 08-Jun-2020]. 26. ―Potential Impact Of COVID-19 On Insurance Fraud Detection Market | Leading Companies Analysis 2027 – Cole Reports.‖ [Online].

Available: https://coleofduty.com/news/2020/05/23/potential-impact-of-covid-19-on-insurance-fraud-detection-market-leading-

companies-analysis-2027/. [Accessed: 05-Jun-2020]. 27. P. Babuna, X. Yang, A. Gyilbag, D. A. Awudi, D. Ngmenbelle, and D. Bian, ―The Impact of COVID-19 on the Insurance Industry,‖

Int. J. Environ. Res. Public Health, vol. 17, no. 16, p. 5766, Aug. 2020, doi: 10.3390/ijerph17165766.

28. E. Summary, T. Nadu, I. A. I. Office, and B. T. Results, ―COVID-19 A Study and Projections for India - An Update.‖ 29. R. Y. Gupta, S. S. Mudigonda, P. K. Kandala, and P. K. Baruah, ―A Framework for Comprehensive Fraud Management using Actuarial

Techniques,‖ vol. 10, no. 3, pp. 780–791, 2019.

30. N. Rai, P. K. Baruah, S. S. Mudigonda, and P. K. Kandala, ―Fraud Detection Supervised Machine Learning Models for an Automobile Insurance,‖ Int. J. Sci. Eng. Res., vol. 9, no. 11, pp. 473–479, 2018.

31. ―Rise in searches for ‗How to set fire‘ a sign insurance fraud beckons as economy crashes.‖ [Online]. Available:

https://www.washingtonexaminer.com/news/rise-in-searches-for-how-to-set-fire-a-sign-insurance-fraud-beckons-as-economy-crashes. [Accessed: 06-Jun-2020].

32. ―COVID-19 in India | Kaggle.‖ [Online]. Available: https://www.kaggle.com/sudalairajkumar/covid19-in-india. [Accessed: 19-Sep-

2020].

116.

Authors: Amena Begum, Md. Zahidur Rahman, Nurunnahar Nancy, Md. Enamul Haq

Paper Title: Comparative Performance Evaluation of Mobile Ad-hoc Network Routing Protocols using NS2

Simulator

Abstract: A Mobile Ad-hoc Network (MANET) is an independent assortment of mobile users that communicate

over moderately bandwidth constrained wireless links. MANET‘s topology is dynamic that can change rapidly

because the nodes move freely and can organize themselves randomly; has the advantage of being quickly

deployable. Although numerous routing protocols have been proposed for mobile ad hoc networks, there is no

universal scheme that works well in scenarios with different network sizes, traffic loads and node mobility

patterns, so mobile ad hoc routing protocol election presents a great challenge. In this paper, an attempt has

been made to compare the performance of three routing protocols in Mobile Ad-hoc Networks – Ad-Hoc On-

demand Distance Vector (AODV), Dynamic Source Routing (DSR) and Destination Sequenced Distance Vector

(DSDV). We have evaluated the performance of these routing protocols with varying the number of mobile

nodes and packet sizes on the basis of four important metrics such as packet delivery ratio, average end to

end delay, normalized routing overhead and throughput. Network Simulator version 2.35 (NS-2.35) is used

as the simulation tool for evaluating these performance metrics. The outcome of this research shows that AODV

protocol outperforms DSDV and DSR protocols.

Keywords: MANET, AODV, DSR, DSDV, NS2, Performance Metrics, Analysis

References:

1. Network Simulator version 2 (NS-2). [Online]. Available at: http://www.isi.edu/nsnam/ns. 2. Magnus Frodigh, Per Johansson and Peter Larsson, ―Wireless ad hoc networking—The art of networking without a network,‖ 2010.

3. Ayush Pandeyand Anuj Srivastava, ―Performance Evaluation of MANET through NS2 Simulation,‖ International Journal of

Electronic and Electrical Engineering, volume 7, issue 1, pp. 25-30, 2014.

707-713

Page 87: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

4. C. Perkins and P. Bhagwat, ―Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV)‖ for Mobile Computers,

ACM SIGCOMM, October 1994. 5. Shree Murthy, J.J. Garcia-Luna-Aveces, ―A Routing Protocol for Packet Radio Networks,‖ ACM International Conference on

Mobile Computing and Networking, pp. 86-95, November, 1995.

6. C.-C. Chiang, ―Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel,‖ IEEE SICON ‘97, pp. 197–

211, 1997.

7. C.E. Perkins, E. Royer, and S.R. Das, ―Ad hoc on demand distance vector (AODV) routing,‖ Internet Draft, March 2000.

8. D B. Johnson, D A. Maltz, and Y. Hu, ―The dynamic source routing protocol for mobile ad hoc network,‖ Internet-Draft, April 2003. 9. Haas Z.J, ―A new routing protocol for the reconfigurable wireless network,‖ IEEE 6th International Conference on Universal Personal

Communications, ICUPC ‗97, San Diego, CA, pp. 562 - 566, 1997.

10. Marc Greis tutorial on ns2. [Online]. Available at: www.isi.edu/nsnam/ns/tutorial. 11. K. Fall and K. Varadhan, ―The NS Manual,‖ The VINT Project, UC Berkeley, January 2002.

117.

Authors: Rutuja Gugale, Pratiksha Sonar, Anagha Mandekar, Sonali Ubale, Vaishali Latke

Paper Title: Brain Tumor Detection using Deep Learning

Abstract: Nowadays the leading techniques for diagnosing and revealing the different diseases are image

processing. And there is an increase in the cases of cancer these days. The unrestricted development of cells

cause‘s lumps which leads to brain tumor also called glioblastoma. There are mainly two types of tumor benign

which has covering over the tumor and malignant is the one which spreads throughout the places. Earlier the

development of unrestricted cells used to be diagnosed by doctors physically through monitoring the image by

which the results were not used to be precise sometimes. But time along boarding of medical fields lead to

different medical facilities by which the results could be precise. The broadly approach method of imaging that

scrutinizes the internal structure of the human race is Magnetic resonance Imaging. This approach of imaging

techniques is also used for detecting brain tumors. The detection of glioblastoma processes has machine vision

methods such as Image pre-processing, Segmentation in Image, Feature extraction and classification. Several

image segmentation and image classification techniques are available for detecting tumor of the brain.

Convolution neural networks (CNN) based classifiers are proposed to prevail the limitations. This CNN is such a

classifier which is used to differentiate between the competent data and the trail data, from which the results

could be obtained.

Keywords: Brain tumor Detection, Watershed Algorithm,Capsule Network, Convolutional Neural Network,

MRI Images, Tumor Boundary.

References:

1. iNilesh Bhaskarrao Bahadur, Arun Kumar Ray and Har Pal Thethi,‖Image Analysis for MRI Based Brain Tumor Detection and Feature Extraction Using Biologically Inspired BWT and SVM‖, Hindawi International Journal of Biomedical Imaging volume 2017

2. iAndras Jakab, Stefan Bauer et al.,―TheMultimodal Brain Tumor ImageSegmentation Benchmark (BRATS) ―IEEE TRANSACTIONS ON MEDICAL IMAGING, VOL. 34, NO. 10, 2015.

3. iIsrael D. Gebru, Xavier Alameda-Pineda, Florence Forbes and RaduHoraud, ―EM Algorithms for WeightedData Clustering with Application to Audio-Visual Scene Analysis ― IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. XX, NO. Y, 2016.

4. Prateek Katiyar, Mathew R. Divine et al., ―A Novel Unsupervised Segmentation Approach Quantifies Tumor Tissue Populations Using Multiparametric MRI: First Results with Histological Validation‖ Mol Imaging Biol 19:391Y397 DOI: 10.1007/s11307-016-1009-y , 2016.

714-717

118.

Authors: Mayu S.Bankar, Vidya P. Kodgirwar

Paper Title: Electrical Pole Climbing Robot for Fault Detection using Wi-Fi

Abstract: This project is to create electrical pole climbing robot which can be used to reduce risk of electrician

to connect the distribution lines for supplying purposes. Pole climbing robot, nowadays, is very common and

interesting idea, which mainly works by connecting the distribution lines according to the directions given to it.

In this modern era robots are being developed for various purposes to accomplish many tasks which seem to be

complex and life endangering for humans. Benefits of using robots have been immense in terms of risk-free,

speed and efficiency of doing required tasks compared to that of humans. The main objective of this work is to

save human lives. Considering on that issue, a pole climbing robot has been designed. However, further

modifications of this work might be able to perform the wiring and repairing tasks instead of an electrician. The

developed robot works on the principle of linear motor, which is partially autonomous. With the installation of

this project, risk of human injuries and death can be minimized while working in the distribution lines which is

the main consideration of this project.

Keywords: Wi-Fi, Microcontroller, Robot Arms, DC motors, Power supply, Gripper.

References:

1. BAKHTIAR KHALID, MD. HASIBULLAH, RAZU AHMED, ZAKIR HASAN CHOUDHURY, IMRULKAISH AND MD. KHALILUR RHAMAN,

“ELECTRICAL POLE CLIMBING ROBOTS FOR WIRING AND REPAIRING DISTRIBUTION LINES”, 18TH INTERNATIONAL

CONFERENCE ON COMPUTER & INFORMATION TECHNOLOGY, 21-23 DECEMBER 2015

2. Salataren, R., Aracil, R., Sabater, J.M., Reinoso, O. and Jimenez,L.M. (1999), ―Modeling, simulation and conception of parallel

climbing robots for construction and service‖, paper presented at the 2nd International Conference on Climbing and Walking Robots, pp. 253-5.

3. J. C., M. Prieto, M. Armada, and P. G. de Santos, ―A six-legged climbing robot for high payloads‖, in IEEE Int. Conf. on Cont. App,

Trieste, Italy, Sept. 1998, pp. 446–450

4. M. NiliAhmadabadi, Senior Member, IEEE , H. Moradi, Member, IEEE , A. Sadeghi, A. Madani, andM. Farahnak, ―The Evolution of

UT Pole Climbing Robots‖

718-722

Page 88: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

5. M. Saidur Rahman, F. Rahman, A. Rahman. B. Kamran, A. Biswas and J. Hossain, ―Burn Injury in Bangladesh: Electrical Injury a

Major Contribution‖, Int J Burns Trauma.2011;(1): 62–67, PMCID: PMC3415945, Published online 2011 Sep 3 6. R. Azizur & U. Kutub, 9-10 January, 2010, ―Ensuring Safety: A Great Challenge for Electricity Distribution System‖, proceeding of

the 2010 International Conference on Industrial Engineering and Operation Management, Dhaka, Bangladesh

7. M. Tavakoli, M.R. Zakerzadeh, G.R. Vossoughi, S. Bagheri, (2005),"A hybrid pole climbing and manipulating robot with minimum

DOFs for construction and service applications", Industrial Robot: An International Journal, Vol. 32 Iss: 2 pp. 171 – 178

8. T. Mahmoud, ―Design, Implementation, Pathplanning, and Control of Pole Climbing Robot‖, University of Coimbra, Faculty of

Science and Technology, Department of Electrical and Computer Engineering, Coimbrca, July 2010

119.

Authors: J.R.Arunkumar, M.Sundar Rajan, Anusuya Ramasamy, Bhupesh Kumar Singh

Paper Title: Efficient Cognitive Skill Based Learning System using Augmented Reality

Abstract: Augmented Reality provides an interactive experience by imposing virtual objects over real world

environment and used in different field in learning, entertainment, or edutainment by developing higher order

cognitive and practical learning skills. With the infusion of digital technology, nowadays all the educational

institutions adapted the online mode learning environment like smart classroom for content delivery, Webcast

Lecture by using AR. AR attracts research attention for its ability to allow students to be immersed in realistic

experiences. AR will allow learners too deep about real time and cognitive skill development experiences.

Recent scenario in education and academic sectors needs emerging technologies for learning system. In that

scenario AR technology will be used to create new type of self-learning and automated application in academic.

This technology is used to enhance the teaching and learning for students in effective way and efficient too.

Even this technology will attract the students to learn fast and improve the cognitive skill also. This is a new

standard, merging features from ubiquitous computing, tangible computing, and social computing. The benefits

of this proposed component include inspiring deep and thoughtful education, in real world problems and

challenges can be refining the creative problem solving abilities while also as long as exposure/ new perception.

This proposed research paper goals to improve present educational system using Augmented Reality.

Keywords: Augmented Reality, Learning, Education, Social Computing.

References:

1. Bujak, K.R.; Radu, I.; Catrambone, R.; MacIntyre, B.; Zheng, R.; Golubski, G. A Psychological Perspective on Augmented Reality in

the Mathematics Classroom. Comput. Educ. 2013, 68, 536–544. 2. Pacheco, D.; Wierenga, S.; Omedas, P.; Oliva, L.S.; Wilbricht, S.; Billib, S.; Knoch, H.; Verschure, P.F.M.J. A Location-Based

Augmented Reality System for the Spatial Interaction with Historical Datasets. In Proceedings of the 2015 Digital Heritage, Granada,

Spain, 28 September–2 October 2015; IEEE: Washington, DC, USA, 2016; pp. 393–396. 3. A High Level Framework for Interacive, Animated 3D Graphics Applications,‖ proceedings of ACM SiGGRAPH 9 4, pp.421-434

(1994) Azuma, 1997; Zhou, Duh, &Billinghurst, 2008.

4. Broll et al., 2008; Johnson et al., 2010b; Liu, 2009 5. Arvinitis et al, 2007; Dunleavy, Dede & Mitchell, 2008

6. AIR-EDUTECH, Lamees Mahmoud Mohd Said Al Qassem, Hessa Al Hawai, M. Jamal Zemerly, 2016M. Billinghurst, ―Augmented

Reality in Education‖, New horizons for learning IX , October 2003. 7. Hsin-Yi Chang, Hsin-Kai Wu and Ying-Shao Hsu; ―Integrating a mobile augmented reality activity to contextualize student learning of

a socioscientific issue, 2013.

8. Kangdon Lee, ―Augmented Reality in Education and Training‖, 2012. 9. Freitas, R., & Campos, P. (2008). SMART: a System of augmented reality for teaching 2nd grade students. Proceedings of the 22nd

British Computer Society Conference on Human-Computer Interaction (HCI 2008), 27-30. Liverpool John Moores University, UK.

10. M.Billinghurst, H. Kato and I. Poupyrev, "The Magicbook: Moving Seamlessly Between Reality and Virtuality", IEEE Computer Graphics and Applications, vol. 21, no. 3, pp. 6-8, May/June 2001.

11. Billinghurst, M. (2002). Augmented Reality in Education. Seattle WA: New Horizons for Learning - Technology in Education.

12. Kiyokawa, K., Billinghurst, M., Hayes, S., Gupta, A., Sannohe, Y., & Kato, H. (2002). Communication Behaviors of Co-Located Users in Collaborative AR Interfaces. IEEE and ACM International Symposium on Mixed and Augmented Reality (ISMAR 2002) (pp. 139-

148). Darmstadt, Germany: IEEE Press.

13. Liarokapis, F., & Anderson, E. F. (2010). Using Augmented Reality as a Medium to Assist Teaching in Higher Education. (October 2016). https://doi.org/10.2312/eged.20101010.

14. Paper,C., &Baldiris, S. (2017). Augmented Reality Applications for Education : Five Directions for Future Augmented Reality

Applications for Education : Five Directions for Future Research. (June). https://doi.org/10.1007/978-3-319-60922-5. 15. Trondsen, E., Member, B., & Vikings, S. (2019). Augmented / Virtual Reality in Nordic / Baltic Education, Learning and Training.

(April), 1–73.

16. Burton, E.P., Frazier, W., Annetta, L., Lamb, R., Cheng, R. and Chmiel, M. 2011. Modeling Augmented Reality Games with Preservice Elementary and Secondary Science Teachers. Journal of Technology and Teacher Education 19, 303-329.

17. Coffin, C., Bostandjiev, S., Ford, J. And Hollerer, T. 2010. Enhancing classroom and distance learning through augmented reality. In

World Conference on Educational Multimedia, Hypermedia and Telecommunications, 1140-1147. 18. Kesim, M. and Ozarslan, Y. 2012. Augmented Reality in Education: Current Technologies and the Potential for Education. Procedia -

Social and Behavioral Sciences 47, 297-302. https://doi.org/10.1016/j.sbspro.2012.06.654

19. Abdullah Mubarak Ghare, Mohammed Akhtar Khan, Mustafa Rangwala, Shadab Kazi ,Prof. Sameer Panwala, Prof. Abdus Salam‖Augmented Reality for Educational Enhancement‖International Journal of Advanced Research in Computer and

Communication Engineering Vol. 6, Issue 3, March 2017.

20. MonaAlkhattabi .‖Augmented Reality as E-learning Tool in Primary Schools‘ Education: Barriers to Teachers‘ Adoption‖ iJET ‒ Vol.

12, No. 2, 2017 https://doi.org/10.3991/ijet.v12i02.6158.

21. AnuroopKatiyar, Karan Kalra and Chetan Garg.‖Marker Based Augmented Reality ―Advances in Computer Science and Information

Technology (ACSIT) Volume 2, Number 5; April-June, 2015 pp. 441-445. 22. MARE: Mobile Augmented Reality Based Experiments in Science, Technology and Engineering C. Onime, J. Uhomoibhi and S.

Radicella, Online Experimentation: Emerging Technologies and IoT,The International journal of analytical and experimental modal

analysis Volume XII, Issue IV, April/2020 ISSN NO:0886-9367 Page No:622. 23. A Review of Augmented Reality Applications for History Education and Heritage Visualisation Jennifer Challenor * and Minhua Ma,

Multimodal Technol. Interact. 2019, 3, 39; doi:10.3390/mti3020039.

723-727

120. Authors: S.R.Pranav Sai*, Ajay Singh Pawar, Satya Sai Mudigonda, Phani Krishna Kandala, Pallav Kumar

Baruah

Page 89: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

Paper Title: Assessing the sustainability of General Insurance Business through Real Time Monitoring of KPIs

using Recurrent Neural Network

Abstract: A company‘s sustainability is driven significantly by its operational efficiency. Operational

efficiency plays a significant role in the growth and the profitability of a company. Thus, operational efficiency

of a company forms the basis for the metrics known as the Key Performance Indicators(KPIs). These KPIs

bridge the concept of performance an operation and a means to measure the same quantitatively. In this work,

we used Recurrent Neural Network (RNN) with the Long Short Term Memory(LSTM) cells for projecting the

public disclosure data of select General Insurance(GI) companies operating in India to the future. We use this

data to calculate the KPIs pertaining to the operations of general insurance companies and calculate how the

operations of the GI company affect its performance at various levels. Since this analysis is done for the

projected data, we get a framework to assess the sustainability of the GI companies by monitoring these KPIs in

real-time. The complex RNN and LSTM algorithms were implemented with the help of the Google Colaboratory

platform by using the GPUs of the Google Hardware with the help of the Cloud Computing framework.

Keywords: Actuarial Analysis, General Insurance, Public Disclosure, RNN, LSTM, Google Colaboratory

References:

1. Sai, Pranav & Kandala, Phani & Mudigonda, Satya & Baruah, Pallav Kumar. (2019). Assessing Sustainability of General Insurance

Business through Real Time KPI using GPUs and Neural Networks.2277-3878.10.35940/ijrte.D1129.1284S219.

2. Pradyumna M, Pranav Sai S.R.- A Framework for assessing performance sensitivity of select KPIs for General Insurance companies in India using Risk Management Dashboard Approach, IJSER, Volume 10, Issue 3, March 2019Edition

3. Shiu, Y. (2004). Determinants of United Kingdom General Insurance Company Performance. British Actuarial Journal.

1010.1017/S1357321700002968. 4. www.irdai.gov.in. (n.d.). Retrieved from

https://www.irdai.gov.in/ADMINCMS/cms/NormalData_Layout.aspx?page=PageNo765&mid=31.2

5. Shiu,Y.,2004.DeterminantsofUnitedKingdomGeneral Insurance Company Performance. British ActuarialJournal. 6. Booth, P., Chadburn, R., Cooper, D., Haberman, S. & James, D., Modern actuarial theory and practice, second edition, September 2004,

ISBN-13: 978-1584883685, Chapman & Hall, U.K.McGraw-Hill,U.K.

7. Browne, Mark J., and Robert E. Hoyt. ―Economic and Market Predictors of Insolvencies in the Property-Liability Insurance Industry.‖ The Journal of Risk and Insurance, vol. 62, no. 2, 1995, pp. 309–327.JSTOR, www.jstor.org/stable/253794.

8. Canadian Institute of Actuaries (1998). Standard of practice on dynamic capital adequacy testing (in effect January 1, 1999). This

document is available at http://www.actuaries.ca/publications/sope.html 9. Blum, Peter, and Michel Dacorogna. "DFA‐Dynamic Financial Analysis." Wiley StatsRef: Statistics Reference Online(2014).

10. Enz, R. & Karl, K. (2001). The profitability of the non-lifeinsuranceindustry:it'sback-to-basicstime.SwissRe. Sigma, 5, 1-37.

11. Greene, William H. Econometric Analysis.2003, ISBN 13: 9780130132970. Pearson EducationIndia

12. Gujarati, Damodar N., Basic econometrics, third edition, 1995, ISBN 0‐07‐025214‐9, New York: McGraw-Hill.

13. Neter, J., Wasserman, W. and Kutner, M.H. (1989) Applied Linear Regression Models. 2nd Edition, RichardD.Irwin, Inc., Homewood

14. Pesaran,H.,Smith,R.&Im,K.(1996).Dynamiclinear models for heterogeneous panels. In the econometrics of panel data. Edited by Ma¨ tya¨ s, L. & Sevestre, P. (second revised edition). Kluwer Academic Publishers, The Netherlands.

15. https://www.irdai.gov.in/ADMINCMS/cms/NormalData_La yout.aspx?page=PageNo129&mid=3.1.9

16. Gonzalez, R. (2018, July). A work in progress. The Actuary, The magazine of the Institute and Faculty of Actuaries, pp.23-25. 17. https://www.irdai.gov.in/ADMINCMS/cms/NormalData_La yout.aspx?page=PageNo264&mid=3.2.10

18. Schmidhuber, Jürgen. "Deep learning in neural networks:Anoverview."Neuralnetworks61(2015):85-117.

19. Glorot, Xavier, and Yoshua Bengio. "Understandingthe difficulty of training deep feedforward neural networks." Proceedings of the thirteenth international conference on artificial intelligence and statistics.2010.

20. Ilya Sutskever, Oriol Vinyals, Quoc V. Le, Sequence to Sequence Learning with Neural Networks, (Submitted on 10 Sep 2014 (v1),

last revised 14 Dec 2014 (this version,v3)) 21. Bergstra,James,etal."Theano:DeeplearningonGPUs with python." NIPS 2011, BigLearning Workshop, Granada, Spain. Vol. 3.

Microtome Publishing.,2011.

22. W. Keckler, Stephen & Dally, William & Khailany, Brucek & Garland, Michael & Glasco, David. (2011). GPUs and the Future of Parallel Computing. Micro, IEEE. 31. 7 - 17. 10.1109/MM.2011.89.

23. Warburton, Kevin. "Deep learning and education for sustainability." International Journal of Sustainability in Higher Education 4.1

(2003):44-56. 24. Seiya Tokui, Kenta Oono, Shohei Hido, Justin Clayton. Chainer: a Next-Generation Open Source Framework for Deep Learning. In

Workshop on Machine Learning Systems at Neural InformationProcessingSystems (NIPS), 2015.

25. Alec Radford & Luke Metz indico Research Boston, MA {alec,luke}@indico.io, Soumith Chintala Facebook AI Research New York, NY [email protected] UNSUPERVISED REPRESENTATION LEARNING WITH DEEP CONVOLUTIONAL GENERATIVE

ADVERSARIALNETWORKS

26. Ade Ibiwoye, O. O. E. A. A. B. S., 2012. Artificial Neural Network Model for Predicting Insurance Insolvency. International Journal of management and business research, pp. 59-68.

27. Akhter Mohiuddin Rather, A. A. V., 2015. Recurrent neural network and a hybrid model for prediction of stock returns. Expert Systems with Applications, 42(6), pp. 3234-3241.

28. AlevDilekAydın,S.Ç.C.,2015.PredictionofFinancial CrisiswithArtificialNeuralNetwork:AnEmpiricalAnalysis onTurkey.

29. Chakraborty, S., 2007. Prediction of corporate financial health by an Artificial Neural Network. International Journal of ElectronicFinance.

30. Constantin, D., 2016. A NEW MODEL FOR ESTIMATING THE RISK OF BANKRUPTCY OF THE INSURANCE COMPANIES

BASED ON THE ARTIFICIAL NEURAL NETWORKS.Romania,International Multidisciplinary Scientific Geo Conference. 31. Isseveroglu Gulsun, G. U., 2010. Early warning model with statistical analysis procedures in Turkish insurance companies.

32. Patrick L. Brockett, L. L. G. J. J. C. Y., 2006. A Comparison of Neural Network, Statistical Methods, and Variable Choice for Life

Insurers' Financial Distress Prediction. The journal of risk andinsurance. 33. SanchoSalcedo-Sanz, 2005. Genetic programming for thepredictionofinsolvencyinnon-lifeinsurancecompanies. In: Computers &

Operations Research. s.l.:s.n., pp.749-765.

34. PeterDEnglandandRichardJVerrall,Stochasticclaims reserving in general insurance, British Actuarial Journal,vol. 8, no. 3, pp. 443–5182002

35. Segovia-Vargas, M. J., 2004. PREDICTION OF INSOLVENCY INNON-LIFE INSURANCE COMPANIES USING SUPPORT

VECTOR MACHINES, GENETIC ALGORITHMS, AND SIMULATED ANNEALING.FuzzyEconomic Review, January, pp. 79-94. 36. Badi H. Baltagi, Econometric Analysis of Panel Data, Fifth Edition, September 2013, ISBN: 978-1-118-67232-7, John Wiley &. Sons,

Ltd Copyright © 2005 John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex P019 8SQ,England

37. TadaakiHosaka, 2019. Bankruptcy prediction using imaged financial ratios and convolutional neural networks. ExpertSystemswithApplications,Volume117,pp.287-299.

728-738

Page 90: InterInternanational Jtional Jourournal ofnal of R Recent ... · 8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation

38. https://www.ibef.org. (n.d.). Retrieved from https://www.ibef.org/industry/insurancesector-india.aspx