International Journal of Recent Technology and Engineering(TM)
Exploring Innovation| ISSN:2277-3878(Online)| Reg. No: 97794/BPL/S/2012| Published by BEIESP| Impact Factor:4.46
Author Guidelines
Publication Fee
Privacy Policy
Associated Journals
Frequently Asked Questions
Contact Us
Volume-2 Issue-6: Published on January 30, 2014
Volume-2 Issue-6: Published on January 30, 2014

 Download Abstract Book

S. No

Volume-2 Issue-6, January 2014, ISSN:  2277-3878 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.



Er. Parminder Singh

Paper Title:

An Efficient Concept-Based Mining Model for Analysis Partitioning Clustering

Abstract: Data clustering is an important task in the area of data mining. Clustering is the unsupervised classification of data items into homogeneous groups called clusters. Clustering methods partition a set of data items into clusters, such that items in the same cluster are more similar to each other than items in different clusters according to some defined criteria. Clustering algorithms are computationally intensive, particularly when they are used to analyze large amounts of data.With the development of information technology and computer science, high-capacity data appear in our lives. In order to help people analyzing and digging out useful information, the generation and application of data mining technology seem so significance. Clustering is the mostly used method of data mining. Clustering can be used for describing and analyzing of data.  In this paper, the approach of Kohonen SOM and K-Means and HAC are discussed. After comparing these three methods effectively and reflect data characters and potential rules syllabify. This work will present new and improved results from large-scale datasets



1.     Rakesh Agrawal , Ramakrishnan Srikant, Fast Algorithms for Mining Association Rules in Large Databases, Proceedings of the 20th International Conference on Very Large Data Bases, p.487-499, September 12-15, 1994
2.     Baskurt, F. Blum, M. Daoudi, J.L. Dugelay, F. Dupont, A. Dutartre, T. Filali Ansary, F. Fratani, E. Garcia, G. Lavoué, D. Lichau, F. Preteux, J. Ricard, B. Savage, J.P. Vandeborre, T. Zaharia. SEMANTIC-3D : COMPRESSION, INDEXATION ET TATOUAGE DE DONNÉES 3D Réseau National de Recherche en Télécommunications (RNRT) (2002)

3.     T.Zaharia F.Prêteux, Descripteurs de forme : Etude comparée des approches 3D et 2D/3D 3D versus 2D/3D Shape Descriptors: A Comparative study

4.     T.F.Ansary J.P.Vandeborre M.Daoudi, Recherche de modèles 3D de pièces mécaniques basée sur les moments de Zernike

5.     Khothanzad, Y. H. Hong, Invariant image recognition by Zernike moments, IEEE Trans. Pattern Anal. Match. Intell.,12 (5), 489-497, 1990.

6.     Agrawal R., Imielinski T., Swani A. (1993) Mining Association rules between sets of items in large databases. In : Proceedings of the ACMSIGMOD Conference on Management of Data, Washington DC, USA.

7.     Agrawal R., Srikant R., Fast algorithms for mining association rules in larges databases. In Proceeding of the 20th international conference on Very Large Dada Bases (VLDB’94),pages 478-499. Morgan Kaufmann, September 1994.

8.     U. Fayyad, G.Piatetsky-Shapiro, and Padhraic Smyth, From Data Mining toKnowledge Discovery in Databases, American Association for Artificial Intelligence. All rights reserved. 0738-4602-1996

9.     S.Lallich, O.Teytaud, Évaluation et validation de l'intérêt des règles d'association

10.  Osada, R., Funkhouser, T., Chazelle, B. et Dobkin, D. ((   Matching 3D Models with Shape Distributions )). Dans Proceedings of the International Conference on Shape Modeling & Applications (SMI ’01), pages 154–168. IEEE Computer Society,Washington, DC, Etat-Unis. 2001.

11.  W.Y. Kim et Y.S. Kim. A region-based shape descriptor using Zernike moments. Signal Processing  Image Communication, 16 :95–100, 2000.

12.  Khotanzad et Y.H. Hong. Invariant image recognition by Zernike moments. IEEE Transactions on Pattern Analysis and Machine Intelligence, 12(5), May 90.

13.  N Pasquier, Y Bastide, R Taouil, L Lakhal - Database  Theory ICDT'99, 1999 – Springer
14.  Ji Dan, Qiu Jianlin et Gu Xiang, Chen Li, He Peng. (2010) A Synthesized Data Mining Algorithm based on  Clustering and Decision tree. 10th IEEE International Conference on Computer and Information Technology (CIT 2010)
15.  Timothy C. Havens et James C. Bezdek. Fuzzy c-Means Algorithms for Very Large Data




Abdul Hamid M. Ragab, Osama S. Farag Allah, Amin Y. Noaman, Khalid W. Magld

Paper Title:

Encryption Quality Evaluation of Robust Chaotic Block Cipher for Digital Imaging

Abstract:  The visual inspection is an important factor in examining encrypted images, where the highly disappeared features of the image, the better the encryption algorithm used. However, depending on the visual inspection only is not enough in judging the quality of complete hiding of the content of the data image. In this paper, we estimate the degree of image encryption quality not only practically using visual inspection, but also quantitatively using quality evaluation metrics. The efficient robust chaotic block cipher (RCBC) encryption quality algorithm for digital imaging is investigated. Comparative analysis regarding encryption quality (EQ) of the RCBC with algorithms such as RC6, and RC5 is performed. Ciphers design parameters are analyzed for their optimal values, as function of different ciphers operation modes, including ECB, CBC, CFB, and OFB. Thorough experimental tests are carried out with detailed analysis demonstrating the better performance of the RCBC block cipher.

Keywords:   Symmetric block ciphers, images encryption quality, and encryption algorithms analysis.


1.     The Data Encryption Standard (DES), Chapter2, ~sourav/ DES.pdf‎.
2.     Data Encryption Standard, Data_Encryption_Standard.

3.     Encryption at the Speed of Light? Towards a cryptanalysis of an optical CDMA encryption scheme, scws4/scws4_6821.pdf‎.

4.     Y. Frauel, A. Castro, T. J. Naughton, B. Javidi, ”Security analysis of optical encryption”, Proc. of SPIE Vol. 5986 598603-1, 2005.

5.     H.S. Chang, “IDEA International Data Encryption Algorithm”,

6.     S. Basu,” International Data Encryption Algorithm (IDEA) a Typical Illustration”, Journal of Global Research in Computer Science, Vol. 2, No. 7, July 2011.

7.     RSA Cryptology and security,

8.     T. Morkel, J.H.P. Eloff ,” Encryption Techniques: a Timeline Approach”, Information and Computer Security Architecture (ICSA) Research Group, 2004/ Proceedings/ Research/062.pdf

9.     K. Wright, John A. Kinast, and Joe McCarty,” Low-Latency Cryptographic Protection for SCADA Communications”, Proc. Applied Cryptography and Network Security,

10.  Canteaut,” Similarities Between Encryption and Decryption: how far can we go?” ,SAC 2013,

11.  J. Borgho, et al,” PRINCE A Low-Latency Block Cipher for Pervasive Computing Applications”, www.

12.  Agrawal, H. Agrawal,” Implementation of AES and RSA Using Chaos System”, International Journal of Scientific & Engineering Research, Vol.4, Issue 5, May-2013.

13.  Agrawal, H. Agrawal, M. Mishra,” Implementation of Various Cryptosystem Using Chaos”, IOSR Journal of Computer Engineering (IOSR-JCE), Vol. 13, Issue 4, PP 77-84, Jul.-Aug. 2013.

14.  H. M. Ragab, Osama S. Farag Allah, Khalid W. Magld and Amin Y. Noaman,” Security Evaluation of Robust Chaotic Block Cipher”, International Journal of Soft Computing and Engineering (IJSCE), Vol.3, Issue-6, January 05, 2014.

15.  Jolfaei, A. Mirghadri,” Image Encryption Using Chaos and Block Cipher”, Computer and Information Science, Vol. 4, No. 1; January 2011.

16.  R. Amirtharajan, P. Archana and J.B. Rayappan,” Why Image Encryption for Better Steganography”, Research Journal of Information Technology, Vol. 5, Issue: 3, pp 341-351,2013.

17.  Massoudi, F. Lefebvre, C. D. Vleeschouwer, B. Macq, and J. Quisquater, “Overview on Selective Encryption of Image and Video: Challenges and Perspectives”, Hindawi Publishing Corporation, EURASIP Journal on Information Security, Vol. 2008.

18.  N. El-Fishawy and O. M. AbuZaid,” Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms”, International Journal of Network Security, Vol.5, No.3, PP.241–251, Nov. 2007. 

19.  U. Pandey,  M. Manoria,   J. Jain,”  A Novel Approach for Image Encryption by New M Box  Encryption Algorithm using Block based Transformation  along with Shuffle Operation”, International Journal of Computer Applications, Vol. 42, No.1, March 2012.

20.  H. E. Ahmed, H. M. Kalash, and O. S. Farag Allah,” Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images”, International Journal of Computer and Information Engineering, 2007.

21.  H. E. H. Ahmed, H. M. Kalash, and O. S. Farag Allah, “Encryption Quality Analysis of RC5 Block Cipher Algorithm for Digital Images”, Journal of Optical Engineering, vol. 45, 2006.

22.  G. N. Krishnamurthy, V. Ramaswamy,” Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images”, International Journal of Network Security & Its Applications (IJNSA), Vol.1, No 1, April 2009.

23.  Jolfaei, A. Mirghadri,” A New Approach to Measure Quality of Image Encryption”, International Journal of Computer and Network Security, Vol.2, No.8, PP 38-44,

24.  A. Jolfaei, A. Mirghadri, “Image Encryption Using Chaos and Block Cipher”, Computer and Information Science Vol. 4, No. 1, January 2011.




M A Sattar, M Mozibur Rahman, M K R Khan, M G M Choudhury

Paper Title:

Optical Characterization of Spray Deposited CoS Thin Films

Abstract:   Cobalt sulfide thin films have been prepared by spray pyrolysis method on a glass substrate at constant substrate temperature 300°C.Structural, electrical and optical properties have been investigated. From XRD spectrogram, it is clear that the films are crystalline in nature with hexagonal structure having lattice constants, a=b=3.314 Å and c=4.604 Å. Scanning electron microscope (SEM) shows that Cobalt sulfide film exhibited more or less uniform and smooth surface morphology. The optical transmission spectra of the films show a two step transitions. For first step, energy gap varies from 1.35 eV to 1.4 eV and for second step 1.96 eV to 2.11 eV, respectively. The value of the absorption coefficient is >104 cm-1.For cobalt sulfide thin films of different thickness (118 nm and 195 nm) the direct band gap energy varies from 1.35 to 1.4 eV for first step of transition and from 1.96 to 2.11 for second step of transition. The indirect band gap energy varies from 1.25 to 1.3 for first step and from 1.78 to 1.89 for second step of transition. From the nature of graph it may be predicted that our deposited cobalt sulfide thin films are direct band gap semiconductor.

  Spray pyrolysis; CoS; XRD; SEM, Optical Properties and Optical Band gap


1.     Zhenrui Yu, Jinhui Du, Shuhua Guo, Jiayon Zhang, Yasuhico MatsumotoThin Solid Films, vol.415 (2002).P.173
2.     K.L.Chopra and Major D.K. Sand Payday, Thin Solid Films, 102,187(1983).

3.     R. Ortega Borges, D. Lincot, J. Electrochem.Sol.140 (1994)3464

4.     P.K Basu, P.Pramanik,Mater,Sci. Lett.5(1986)1216

5.     P.K.Nair,M.T.S  Nair.O.Gomezdaza, R.A Zingaro. J Electrochem.Sol

6.     Mott N.F and Davis E A. Electronic process in noncrystalline materials.Clarendon press, Oxford (1979).

7.     Damodara Das V and Balmlayan C .Jpn J Appi phys ,34.534 (1995).

8.     M.K.R. Khan, M.Mozibur Rahman, Y. Zaman, M.G.M. Choudhury and M.O. Hakim. Vol.31 (2003),ISSN 1681-07

9.     Ramasamy, K. , Malik, M.A. and O’ Brien, P. “Single-molecule precursor approaches to cobalt sulfide nanostructures”,Phil.Trans.R.Soc. A (2010) 368, 4249-4260 (dol:10.1098/rsta.2010.0125)

10.  Rao, C.N.R and Pishardy, K.P.R.1976 Transition metel sulfides.Prog. solid state chem.10, 207-270.(dol:10.1016/0076-6786(76) 90009-1)

11.  Peng-Fei Yin,Li-Li Sun,You-Lu Gao and Sheng-Yue wang “preparation and Characterization of Co9S8 nanocrystalline and nanorods”Bull.mater.Sci.Vol.31,No.4, August 2008, pp 593-596.(indian Academi of sciences)




N. Swarna Latha, J. Amarnath

Paper Title:

Determination of Radial Movement of Particle in Gas Insulated Substation

Abstract SF6 is generally found to be very sensitive to field perturbations such as those caused by conductor surface imperfections and by conducting particle contaminants. A study of CIGRE group suggests that 20% of failure in GIS is due to the existence of various metallic contaminations in the form of loose particles. The presence of contamination can therefore be a problem with gas insulated substations operating at high fields. If the effects of these particles could be eliminated, then this would improve the reliability of compressed gas insulated substation. It would also offer the possibility of operating at higher fields to affect a potential reduction in the GIS size with subsequent savings in the cost of manufacture and installation. The purpose of this paper is to develop techniques, which will formulate the basic equations that will govern the movement of metallic particles like aluminum, copper in a coated as well as uncoated busduct. However, the configuration at the tip of the particle is generally not sufficiently smooth enough to enable the movement unidirectional. This decides the movement of the particle in axial direction. The randomness of movement can be adequately simulated by Monte-Carlo Method. This method has been applied for coated as well as uncoated enclosure. The results have been presented for the above cases.

 Axial movement, Particle movement, GIB, Busduct


1.     H Cookson, PC Bolin, HC Doepken, RE Wootton, CM Cooke, JG Trump; “Recent Research in the United States on the Effect of Particle Contamination Reducing the Breakdown Voltage in Compressed Gas Insulated System”; Int. Conf. On Large High Voltage System; Paris, 1976.
2.     H.Anis, KD Srivastava; “Breakdown Characteristics  of Dielectric Coated Electrodes in Sulphur Hexafluoride Gas with Particle Contamination”, Sixth International Symposium on High Voltage Engineering No. 32.06, New Orleans, LA, USA. 1989.

3.     M.M. Morcos, S. Zhang, K.D. Srivastava, and S.M. Gubanski “Dynamics of Metallic particle contamination in GIS with dielectric coating electrodes”, IEEE Transactions on Power Delivery Vol. 15, No. 2, April 2000 p.p. 455-460.

4.     J. Amarnath, B. P. Singh, C. Radhakrishna, S. Kamakshiah “Determination of particle trajectory in a Gas Insulated Busduct predicted by Monte-Carlo technique”, CEIDP, 1999 during 17-21st October 1999, Texas, Austin, USA.

5.     J. Amarnath et al., “Influence of Power Frequency and Switching Impulse Voltage on Particle Movement in GIS – Predicted by Monte-Carlo Technique” International IEEE, High Voltage Workshop, during April 18-21, 2001, Calfornia, USA.

6.     J. Amarnath et al., “Influence of Power Frequency and Impulse Voltage on Motion of Metallic particle in a coated GIS – predicted by Monte-Carlo Technique” 6th International Seminar on Electrical and Electronics Insulating Materials and Systems (IEEMA) during November 23-24, 2000, Hyderabad, INDIA

7.     J. Amarnath et al., “Movement of Metallic Particles in Gas Insulated Substations under the influence of various types of voltages” 11th National Power System Conference (NPSC-2000) during December 20-22, 2000, IISc, Bangalore, INDIA.

8.     J. Amarnath et al., “Effect of Various Parameters of Movement of Metallic Particles in GIS” at International Seminar on Compact Substations and Gas Insulated Switch Gears (CBIP) during January 19-21, 2001, New Delhi, INDIA.

9.     J. Amarnath et al., “Particle Trajectory in a Common Enclosure Three phase SF6 Busduct” 12th International Symposium on High Voltage Engineering during August 20-24, 2001, IISc, Bangalore, INDIA.




R. Prabhu, B. Harish babu, M. Selvamuthukumar, N. Poiyyamozhi

Paper Title:

Nanocomposites in Food Packaging

Abstract: In this project work we report that extending the shelf life of paneer by blending the LDPE/Nanocomposites using twin screw extruder to increasing the mechanical properties as tensile strength, burst strength and barrier properties as oxygen transmission rate, water vapor transmission rate using montmorillonite and organic montmorillonite nanocomposites. The antimicrobial agent as Nisin is coated over the nano film to increase the anti-microbial properties. The XRD which indicated the different levels of intercalated structures for the nanocomposites. SEM analysis indicates the degree of dispersion of nanocomposites over the LDPE film. The results indicated that organic MMT/LDPE material which gives more tensile, mechanical properties and barrier properties and it increases the shelf life of paneer.

 Nanocomposites, Mechanical properties, Polyethylene, Coating, Polymer blends


1.     Aaron L. Brody, (2006),“Nano and Food Packaging Technology Converge”, Food Technology Magazine, Pg no.92-94
2.     Professor J.N. Hay and S.J. Shaw (2004) “A Review of Nanocomposites” Food Technology magazine.

3.     Hamed Amini Ranjbara, Abdolreza Aroujaliana.B, Ahmad Ramezanic (2000) “ Morphological properties of LDPE/LLDPE/Clay nanocomposites with a PE-G-MA Compatibilizer ”.

4.     Guo Cunyue, MA Zhi, ZHANG Mingge, HE Aihua1, KE Yucai1 & HU Youliang (2002) “Preparation of PE/MMT nanocomposite by monomer intercalation and in situ
copolymerization” Vol 47 No. 15

5.     B. Baghaei,E.S. H. Jafari, E.H. A. Khonakdar E.I. Rezaeian (2009) “Interfacially compatibilized LDPE/POE blends reinforced with nanoclay: investigation of morphology, rheology and dynamic mechanical properties” Polym. Bull. 62:255–270

6.     J.Morawiec, A.Pawlak, M.Slouf, A.Galeski, E.Piorkowska and N.Krasnikowa (2004) “Preparation and properties of compatibilized LDPE/organo-modified montmorillonite nanocomposites” University of Science and Technology Beijingdoi:10.1016/S1005-8850(08)60060-2

7.     Sherry Hildebrandt “Nanocomposites Improve Package Properties” (2004) PG Student, Packaging Engineering

8.     G. Mauriello, E. De Luca, A. La Storia, F. Villani and D. Ercolini (2001) “Antimicrobial activity of a nisin-activated plastic film for food packaging” Letters in Applied microbiology Vol. 41, 464-469

9.     Giulio Malucelli (2010) “Nanocomposite thermo-mechanical and barrier-property enchancements”[10]Aaron L. brody, Betty bugusu, Jung H. han, Claire Koelsch sand and tara H. Mchugh  (2008) “Innovative Food Packaging Solutions” Journal of food science  Vol. 73, Nr. 8.




Baha Ali Nasir

Paper Title:

Efficient Programmable Finite Impulse Response Filter Using Xilinx MAC FIR Filter for Software Defined Radio

Abstract:   This paper presents a development of FIR filter using polyphase multiply accumulate (MAC) block in system generator to decrease the multiplication process and hence power consumption to provide the SDR requirements. The entrenched system generator offers a very attractive solution that balance high flexibility and performance of FIR filter to minimize the multiplication process. This paper focuses on efficient design of digital FIR filter for software defined radio on an FPGA target device. The simulation results shows an important development in minimization of FIR filter multiplication to utilize the look up table (LUPs) and Slices in FPGA area which decrease the power consumption compared with conventional design.



1.     Xilinx Inc. “ MAC FIR v 5.1 Product specifications”,2007, Available at: pp.1-19
2.     Chen, “Design of Equiripple Linear-Phase FIR Filters Using MATLAB”, IEEE transaction, 2011 available at:

3.     Sven, “Applied Signal Processing ETB006 FIR Filter Design” Chapter-1 pp.1-5, 2004$file/Assignment_grade4.pdf

4.     Xilinx, Inc., Xilinx ISE 9.2i Software Manuals: Constraints Guide, and Development System Reference Guide”. San Jose, California, USA, pp. 1-844, 2007

5.     Avnet Memec, Inc.,“Virtex-4 MB Development Board User’s Guide”,Ver. 3.0, Phoenix, Arizona, USA, pp1-42,2005. Citing Internet sources URL:  

6.     Xilinx, Inc.,“System Generator for DSP User Guide”, Release 9.2.01, San Jose, California, USA, pp. 1-346, 2007

7.     Xilinx, Inc.,“DSP Design Flows in FPGA Tutorial Slides”. San Jose, California, USA, pp. 1-82, 2003.

8.     Xilinx Inc., “System Generator for DSP”: User Guide, Release 10.1,Snn Jose, Clifornia, USA, PP.1-40:, 2008

9.     Xilinx, Inc., “Xilinx ISE 9.2i Software Manuals: Constraints Guide, and Development System Reference Guide”. San Jose, California, USA, pp. 1-844. 2007.

10.  Xilinx, Inc., “Virtex-II Pro and Virtex-II Pro X FPGA User Guide”, Ver. 4.2, San Jose, California, USA, pp. 1-559. 2003. Citing Internet sources URL:

11.  Xilinx, Inc., “Spartan-3 FPGA Family Data Sheet”, Ver. 2.5, San Jose, California, USA, pp. 1-217.2006. Citing Internet sources URL:

12.  Xilinx, Inc., “Timing constraints User Guide”,  Ver. 11.1.1, san Jose California, USA, pp. 1-137, 2009. Citing Internet sources URL: 

13.  Rajesh and Swapna, “Efficient Hardware Co-Simulation of down Convertor for Wireless communication Systems”, International journal of VLSI design & Communication Systems, Vol.1, No.2, pp. 13-21, 2010

14.  Changrui, Kong, Xie Shige and Huizhi1, “Design and FPGA Implementation of Flexible and Efficiency Digital Down Converter”, 978-1-4244-5900- IEEE, PP.438-441, 2010.




Saleim Hachem Farhan

Paper Title:

Design and Implementation of Programmable Transceivers Based Software Defined Radio Using FPGA

Abstract:    In this paper, an efficient programmable transceivers based software defined radio (SDR) technology is proposed.  In the most wireless and mobile system and even digital communication, the modem scheme and pulse shaping filter play vital role to optimize the information size and security. Therefore, the digital modem is used to provide these issues in SDR technology. To implement this type of modem in FPGA device, many software should be used like MATLAB, system generator, ModelSim, and ISE produced by Xilinx company to generate the HDL code and bit stream. The HDL code of activation system (ADC/DAC/FPGA Synthesizer) and Netlist design has been integrated together to become the HDL code of integrated design. The implementation results shows that the real time results is quit close to the simulation results due to accurate adjustments of design process and timing constraint were low FPGA area in term of Slices and LUTs is produced.

  Programmable Transceiver, SDR, FPGA


1.     Mitola, “The software radio architecture” , IEEE Communications Magazine, 33/5, PP.26-38, 1995
2.     Pal, “FPGA-based (Xilinx) Embedded System Design,” Workshop on Microcontroller and FPGA-based Embedded System Design,Department of Computer Science & Engineering, IIT Kharagpur, India, July 2007.    

3.     The MathWorks, Inc. Digital Signal Processing & Communications.[Online].Available 2009

4.     Xilinx, Inc., DSP Design Flows in FPGA Tutorial Slides, 2003.

5.     J. G. Prokis, Digital Communications, 4th ed., New York: McGraw-  Hill, 2001.

6.     D. Haessig, J. Hwang, S. Gallagher, and M. Uhm, “Case-Study of a  Xilinx System Generator Design Flow for Rapid Development of   SDR Waveforms,” in Proc. SDR 05 Forum Tech. Conf. and Product   Exposition, Orange County, California, 2005.      

7.     C. Dick, F. Harris, and M. Rice, “Synchronization in Software Radios Carrier and Timing Recovery Using FPGAs,” IEEE Symp. Field-Programmable Custom Computing Machine, pp. 195- 204. 2000

8.     System Generator for DSP User Guide, Release 9.2.01, Xilinx, Inc.,  2007.

9.     Xilinx ISE 9.2i Software Manuals: Constraints Guide, and Development System Reference Guide, Xilinx, Inc., 2007.

10.  P240 Analog Module User Guide, Rev 1.0, Avnet, Inc,. [Online]. Available:,   May 2009

11.  Virtex-4 MB Development Board User’s Guide, Ver. 3.0, Avnet Memec,. [Online].Available: , 2008

12.  “ADS5500: 14-bit, 125 Msps, Analog-to-Digital Converter Data Sheet,” Texas Instrument,Inc.,Feb.2007.[Online]Available:

13.  “DAC5687: 16-bit, 500 Msps, 2x-8x, Interpolation Dual-Channel Digital-to-Analog Converter (DAC) Data Sheet,” Texas Instrument, Inc., June 2005. [Online].

14.  Synplicity FPGA Synthesis Reference Manual, Synplicity, Inc., 2007.

15.  Chan, et al,“ Design and Complexity Optimization of a New Digital IF for Software Radio Receivers With Prescribed Output Accuracy” IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS—I: REGULAR PAPERS, VOL. 54, NO. 2, pp 351-366, 2007.

16.  Durke, et al,  “Field Programmable Gate Array Based SDR Design” phd. Thesis, Naval postgraduate school, Department of Electrical and Computer Engineering,California:http, 2009.

17.  Giannini, “Baseband Analog Circuits For Software Defined Radio”, Springer,, ISBN 978-1-4020-6538-5 (e-book), PP. xi, 2008.

18.  Pedro and Nuno, “Multi-Mode Receiver for Software Defined Radio”, Institute of Telecommunication – University of Aveiro – Portugal, 2008.

19.  Proakis, and Salehi, “Digital Communications”, 5th ed., New York, NY: McGraw-Hill, Ch. 3, pp. 95-148, 2008.




Jay Verma, Yogesh Tiwari, Anup Mishra, Nirbhay Singh

Paper Title:

Performance, Analysis and Simulation of Wind Energy Conversion System Connected With Grid

Abstract:   This paper deals with permanent magnet synchronous generator (PMSG) based wind energy conversion system (WECS) integrated with grid with two back to back connected converters with a common DC link. The machine side converter is used to extract maximum power from the wind. In this paper a study of WECS is done by using a constant speed wind turbine and 2 mass drive train in Matlab.   Moreover, by maintaining the dc link voltage at its reference value, the output ac voltage of the inverter can be kept constant irrespective of variations in the wind speed and load. An effective control technique for the inverter, based on the pulse width modulation (PWM) has been developed to make the line voltages at the point of common coupling.

Permanent magnet synchronous generator (PMSG), Wind energy conversion system (WECS) ,DC link capacitor ,variable speed wind turbine, Pulse width modulation (PWM), Insulated gate bipolar transistor (IGBT) Voltage and frequency control.


1.     The Modeling and Simulation of Wind Energy Based Power System using MATLAB. International journal of power system Operation and Energy Management, ISSN (PRINT): 2231-4407, Volume -1, Issue-2, 2011.
2.     H.Polinder, F .F .A. van der pijl, G.J. de Vilder, and P.J. Tavner, “Comparison of Direct Drive and geared generator concepts for wind turbines,”IEEE Trans.Energy Convers., vol.21, no3, pp.725-733,sep 2006.

3.     K. Premalatha, T. Brindha vector modulated voltage source converter for standalone wind energy conversion system “ space International Journal of Modern Engineering Research (IJMER) Vol.2, Issue.2, Mar-Apr 2012 pp-447-453

4.     M. De Broe, S. Drouilhet, and V. Gevorgian, “A peak power tracker for small wind turbines in battery charging applications,” IEEE Trans. Energy Convers., vol. 14, no. 4, pp. 1630–1635, Dec. 1999.

5.     M. E. Haque, M. Negnevitsky, and K. M. Muttaqi, “A novel control strategy for a variable-speed wind turbine with a permanent-magnet synchronous generator,” IEEE Trans. Ind. Appl., vol. 46, no. 1, pp. 331–339, Jan./Feb. 2010.

6.     N. Mohan, T. M. Undeland, and W. P. Robbins, Power Electronics: Converters, Applications, and Design. Hoboken, NJ: Wiley, 2002

7.     M. Chinchilla, S. Arnaltes, and J. C. Burgos, “Control of permanent magnet generators applied to variable-speed wind-energy systems Connected to the grid,” IEEE Trans. Energy Convers., vol. 21, no. 1, pp. 130–135, Mar. 2006.

8.     C. N. Bhende, S. Mishra, Senior Member, IEEE, and Siva Ganesh Malla “Permanent Magnet Synchronous Generator-Based Standalone Wind Energy Supply System “IEEE TRANSACTIONS ON SUSTAINABLE ENERGY, VOL. 2, NO. 4, OCTOBER 2011

9.     IEEE Transactions on Energy Conversion, Vol. 14, No. 3, September 1999 Use of an LC Filter to Achieve a Motor-friendly Performance of the PWM Voltage Source Inverter Juergen K Steinke, Member, IEEE ABB Industries AG

10.  F. Mei and B. Pal, “Modal analysis of grid-connected doubly fed in-duction generators,” IEEE Trans. Energy Convers., vol. 22, no. 3, pp.728–736, Sep. 2007

11.  IEEE Transactions on Energy Conversion, Vol. 14, No. 3, September 1999 649  Use of an LC Filter to Achieve a Motor-friendly Performance of the PWM Voltage Source Inverter Juergen K Steinke, Member, IEEE ABB Industries AG Department IU (Drive Products) CH-5300 Turgi, Switzerland




S.D.Apte, L.Y.Raut

Paper Title:

Digital Watermarking of Text Image

Abstract:    Security Techniques are required due to the illegal access of data without permission. It is necessary to provide secured and robust technology to protect data. We have used various security techniques. Digital watermarking has been proposed for the protection of digital Medias. In this paper we are presenting and investigating the watermarking algorithms for binary images. The algorithms involve a blurring preprocessing and a biased binarization. The algorithm embeds a watermark by directly biasing the binarization threshold of the blurred image. It is controlled by a loop. Experimental results show the imperceptibility and robustness aspects of algorithms.  In this paper  algorithm is based on  binarization  method (in spatial domain) only BER performance has estimated for this technique, however there are two other major parameters those are helpful for defining the efficiency of watermarking method. In this project we are doing the proposed method analysis using the three parameters named BER (Bit Error Ratio), PSNR (Peak Signal to Noise Ratio) and MSE (Mean Square Error).

  Digital watermarking Technique, binary image, binarization, watermarks bit.


1.     H. Lu, X. Shi, Y. Q. Shi, A. C. Kot, and L. Chen, “Watermark embedding in DC components of DCT for binary images,” in Proc. IEEE Int. Workshop on Multimedia Signal Processing ,US Virgin Islands, Dec. 2002.
2.     M. Chen, E. K. Wong, N. Memon , and S. Adams, “Recent developments in document image watermarking and data hiding, ”in Proc. SPIE Conf. 4518: Multimedia Systems and  , Aug. 2001, pp. 166–176.

3.     M. Wu, E. Tang, and B. Liu, “Data hiding in digital binary image,” in Proc. of IEEE Int. Conf. on Multimedia and Expo, New York City, July 31 to August 2, 2000, pp. 393–396.

4.     Q. G. Mei, E. K. Wong, and N. D. Memon, “Data hiding in binary text documents,” in Proc. of SPIE Security and Watermarking of Multimedia Contents III, Aug. 2001, vol. 4314, pp.369–375.

5.     Y. C. Tseng, Y. Y. Chen, and H. K. Pan, “A secure data hiding scheme for binary images,” IEEE Transactions on Communications, vol. 50, no. 8, pp. 1227–

6.     ] J. Zhao and E. Koch, “Embedding robust labels into images for copyright protection,” in Proc. Int. Congress on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies, Vienna, Aug. 1995, pp. 242–251.

7.     B. Sklar, Digital communications  fundamentals and applications, Prentice Hall, Upper Saddle River, NJ, 2001.

8.     ] H. Lu, J. Wang, A. C. Kot, and Y. Q. Shi, “An objective distortion measure for binary document images based on human visual perception,” in Proc. Int. Conf. Pattern Recognition ,Quebec, Canada, Aug. 2002, vol. 4, pp. 239–242.

9.     Y. Liu, J. Mant, E. Wong, and S. Low, “Marking and detectionof text documents using transform-domain techniques,”in Proc. SPIE Conf. on Security and Watermarking of MultimediaContents, Jan. 1999, pp. 317–328.




Kiran Kumar GR, Shivakumar LN, Marulasiddappa HB

Paper Title:

Precision Motion Control with Variable Speed AC Drives Using PLC

Abstract:     A new scheme for precision motion control of AC motor driving a load is proposed. Traditionally, DC motors had been preferred in applications requiring control of speed and position at close tolerance. The high torque bandwidth over the complete speed range available with a separately excited DC machine was ideal for such applications. However, the cost of manufacturing and maintaining a DC motor and the associated control gear is high. The recent developments of technology to control speed of AC motors with almost constant torque over the entire speed range from zero-speed to rated speed, has made the option of using AC drives in place of DC motor drives cheaper and virtually maintenance free. The DC motor, for precise control of speed, typically uses analog or digital tacho-generator for speed feedback. In the proposed scheme, the drive system based on PWM AC drive, direct speed feedback has been eliminated adopting “Open-Loop Vector Control”. This is achieved by a combination of a programmable logic controller (PLC) and variable speed AC drive systems along with encoders.

  Programmable Logic Controller (PLC), AC Drive, Encoders, Ethernet. 20-COMM-E, DPI, TCP/ IP.Proximity sensors.HMI,SCADA


1.    T.M.Jahns., P.P.Acarnley, “Motion control of torch cutting machine with controller system,” IEEE Trans on industry applications, Vol.82, issue 3, PP.441-450, may-June 1996.
2.    Hofheim wallau, “Torch cutting machine for smooth cutting,” IEEE, Vol.84, STR.3, D-65719.

3.    R.L.lin, M.T.Hu, “Auto torch cutting system using PLC and variable speed AC drives for high speed application,” IEEE conference on steel plant application, Vol.1, PP.637-642, 2001.

4.    Patrick A. Brady, “Application of AC motors with variable speed drive,”IEEE, Vol.89, 978-1-4245, 2009.

5.    H.Zeroug. “Encoder application over Ethernet networking in machine automation,”IEEE, Vol.68, PP464, Jun 1996.

6.    Barton suer, “Ethernet networks,” technical description manual, Vol.5.

7.    Allen-Bradley, “Powerflex-70 adjustable frequency AC drives,” user manual, Rockwell automation.

8.    “Encoder application overview,” Hengstler operator manual.

9.    Allen-Bradley “1756-controllogix,” Allen-Bradley publication may 1989.

10. Allen-Bradley “20-COMM-E adapter”, user manual, Allen-Bradley publication, may 1996.




Suman Kumar Laha, Moumita Mukherjee

Paper Title:

Physics Based Modeling of Intrinsic Material Parameters of III-V Nitride Semiconductors: Elevated Temperature Effects

Abstract: A physics based model of temperature and field dependent electrical parameters of compound semiconductor materials such as Gallium Nitride (GaN), Aluminum Nitride (AlN) and Indium Nitride (InN) are developed exclusively. A huge number of (MC) Monte Carlo equations and experimental data results are described in this work for this model development. This paper represents the comparison of different material parameters like electron mobility, velocity, intrinsic carrier concentration and energy gap in different III-V materials like GaN, AlN and InN of Wurtzite structure using an iterative method at 300K and elevated temperature. The electron mobility dependence on doping concentration, electron mobility dependence on temperature, velocity dependence on electric field, intrinsic carrier concentration dependence on temperature and energy gap dependence on temperature for the III-V group materials are investigated thoroughly. The results obtained from this newly developed numerical device simulators can be used for RF power transistor development. To the best of authors’ knowledge this is the first comprehensive report on realistic modeling of III-V Nitride family materials.

Elevated temperature, energy gap dependence on doping concentration, nitride semiconductor, temperature dependent mobility, dynamic characteristics.


1.     M.E.Levinshtein, S.L.Rumyantsev, and M.S.Shur, Editors, “Properties of Advanced Semiconductor Materials: GaN, AlN, InN, BN, and SiGe,” John Wiley and Sons, December, 2000.

3.     Matthias Roschke, and Frank Schwierz, ‘Electron mobility models for 4h,6h, and 3c SiC’,IEEE Transactions on electron devices, vol.48,no. 7,July 2001.


5.     S. Selberherr, ‘Analysis and simulations of semiconductor devices’.New York: Springer-Verlag, 1984.


7.     Nsm Archieve,






R.Manikandan, K.R.Priyadharsini, R.Arulmozhiyal

Paper Title:

A Novel Fuzzy Logic Based Sensorless Speed Control of Position Sensorless BLDC Servo Drive

Abstract:  The development of advanced motor drive has been increases rapidly, because of their higher performance and reliability. The Sensorless control of permanent magnet brushless DC motor is presented in this paper.The fuzzy PI controller is developed for controlling the speed of the PMBLDC motor drive. Here the Sensorless control is obtained based on indirect back EMF detection which was justified by the observation that the position sensing is obtained indirectly from zero crossings of terminal voltages. Closed loop speed control is made with estimated speed from the stator voltage, so the drive proposed without any shaft mounted devices like position sensor and speed sensors. The performances of the proposed fuzzy logic controller based PMBLDC motor drive were investigated and the results are compared with conventional PI controller. Also the sensorless result scheme is compared with sensor control. In this Sensorless technique the cost of mechanical components such as sensors and cables are eliminated. The simulated results of conventional and fuzzy controller is compared and results illustrates that the FLC gives better dynamic performance also it is more robust for industrial speed control drive applications.

 Brushless DC motor, fuzzy logic controller, PI controller, MATLAB, Sensor and Sensorless control, Zero cross detection.


1.    Bozotertic and Martin jadric “Design and implementation of extended kalman filter for the speed and rotor position estimation of brushless DC motor” IEEE Dec 2001.
2.    Jianwen shao and Thomas Hopkins “A Novel direct Back EMF detection for Sensorless BLDC motor drives” IEEE 2002.

3.    Kim, T.•H., and Ehsani, M.: 'Sensorless control of brushless dc motors from near zero to high speeds', IEEE Trans. Power Electron., 2004, 19,(6), pp. 1635-1645.

4.    R.A.Gupta and Rajesh Kumar “Fuzzy estimator for BLDC drives under speed reversal” IEEE 2011.

5.    TJE Miller, “Brushless Permanent Magnet and Reluctance Motor Drives”, Clarendon Pres, Oxford, 1989.

6.    P. Damodharan and Krishna Vasudevan , “Sensorless brushless dc motor drive based on the zero -crossing detection of back EMF from the line voltage difference”,
IEEE Transactions On Energy Conversion,Vol.25,No. 3,September 2010.

7.    V. S. Pola, and K. P. Vittal, “Simulation of four quadrant operation& speed control of BLDC motor on MATLAB/SIMULINK,” in Proc.IEEE Region 10 Conference, 2008, pp. 1–6

8.    P. P. Acarnley and J. F Watson, “Review of position-sensorless operation of brushless permanent-magnet machines,” IEEE Trans. Ind. Electron.,vol. 53, no. 2, pp.
352–362, Apr. 2006.

9.    Chen Wei and Xia Changliang, “Sensorless Control of Brushless DC Control and Automation, 2006 (WCICA 2006), vol. 2, 21-23 June 2006,pp. 6298 – 6302 (2006).

10. Tan Chee Siong, Baharuddin Ismail(2010) “Fuzzy Logic Controller for BLDC Permanent Magnet Motor Drives”, International Journal of Electrical & Computer Sciences IJECS-IJENS (Vol: 11 No: 02)

11. P.Pillay and R. Krishnan, ‘‘Application characteristics of permanent magnet synchronous and brushless dc motors for servo drives,’’ IEEE Trans.on Ind. Appl., vol. 27, no. 5, pp.986--996, Sep./Oct. 1991.

12. Narmadha T.V, Thyagarajan T “Fuzzy Logic Based Position-Sensorless Speed Control of Multi Level Inverter Fed PMBLDC Drive”, Journal of advances in information
technology, vol. 1, no. 1, February 2010.

13. Albert Rajan, R. Daniel Raj and Dr. S. Vasantharathna “Fuzzy Based Reconfigurable Controller for BLDC Motor” 2010 Second International journal on Computing, Communication and Networking Technologies.

14. B. Mahesh Kumar, G. Ravi, and R. Chakrabarti “Sensorless Speed Control of Brushless DC Motor with Fuzzy Based Estimation” Iranian journal of electrical and computer engineering, vol. 8, no. 2, summer-fall 2009.   




Anuranjan Misra

Paper Title:

Mutation Based Test Case Generation

Abstract:   Testing of aspect oriented programs is a new programming paradigm. Many researchers had contributed their research in the field of testing AOP. Mutation testing has been shown to be one of the strongest testing criteria for the evaluation of both programs and test suites. Comprehensive sets of mutants require strong test sets to achieve acceptable testing coverage. Moreover, mutation operators are valuable for the evaluation of other testing approaches. The effectiveness of mutation testing depends on finding fault types and designing of mutation operators on the basis of faults identified. Therefore the effectiveness of testing depends upon the quality of these mutation operators. We already have the mutation operators for procedural and object oriented languages, but for aspect oriented language only a few researchers have contributed. In this paper we will study in detail about the fault types and related mutation operators for AspectJ language. This paper also proposes the implementation framework to implement these mutation operators automatically.

   Mutation Testing, Aspect oriented testing, test case generation.


1.    AOSD -Europe Project Home Page, 2007. (accessed 05/12/2010).
2.    JBoss AOP Reference Documentation, 2007. http://labs. (accessed 05/12/2010).

3.    The AspectJ Project, 2007. 021/11/2010).

4.    R. Agrawal et al. Design of mutant operators for the C programming language. Report SERC-TR41-P, S.E. ResearchCenter, Purdue University, West Lafayette-USA, 1989.

5.    F.C. Ferrari, J.C. Maldonado, and A. Rashid. Mutation testing for aspect oriented programs. In ICST’08, pages 52-61. IEEE Computer Scociety 2008.

6.    AspectJ in Action: Practical Aspect-Oriented Programming, Manning Publications (July 1, 2003).

7.    Mastering AspectJ: Aspect-Oriented Programming in Java, Wiley; 1st edition (March 7, 2003).

8.    Eclipse AspectJ: Aspect-Oriented Programming with AspectJ and the Eclipse AspectJ Development Tools, Addison-Wesley Professional (December 24, 2004)

9.    Aspectj Cookbook, O'Reilly Media; 1 edition (December 20, 2004)
10. Prasanth Anbalagan, Automated Testing of Pointcuts in AspectJ Programs, in OOPSLA’06, October 22–26, 2006, Portland, Oregon, USA.
11. Fadi Wedyan, Sudipto Ghosh, A Joinpoint Coverage Measurement Tool for Evaluating the Effectiveness of Test Inputs for AspectJ Programs, IEEE Computer Society, 2008.

12. Michael Mortensen and Roger T. Alexander, Adequate Testing of Aspect-Oriented Programs, Technical report CS 04-110, December 2004, Colorado State University, Fort Collins, Colorado, USA.

13. R. T. Alexander, J. M. Bieman, and A. A. Andrews. Towards the systematic testing of aspect-oriented programs. Report CS-04-105, Dept. of Computer Science, Colorado State Uni-versity, Fort Collins-USA, 2004.

14. Hierons, R., Harman, M. & Danicic. S. “Using Program Slicing to Assist in the Detection of Equivalent Mutants”. Journal of Software Testing, Verification and
Reliability, 9(4), 233-262, 1999..ISSN : 0976-5166 413 Mayank Singh et. al. / Indian Journal of Computer Science and EngineeringVol 1 No 4 409-415

15. Offutt, J. & Pan, J. “Automatically Detecting Equivalent Mutants and Infeasible Paths”. The Journal of Software Testing, Verification, and Reliability, Vol 7, No. 3, pages 165--192, September 1997.

16. King, K. N. & Offutt, J. “A Fortran Language System for Mutation-Based Software Testing”. Software Practice and Experience, 21(7):686- -718, July 1991.

17. Ma, Y. S., Offutt, J. & Kwon, Y. R. “MuJava: An Automated Class Mutation System”. Journal of Software Testing, Verification and Reliability, 15(2):97-133, June 2005..

18. Ma, Y. S., Kwon, Y. R. & Offutt, J. “Inter-Class Mutation Operators for Java”. Proceedings of the 13th International Symposium on Software Reliability Engineering, IEEE Computer Society Press, Annapolis MD, November 2002, pp. 352-363.

19. Ma, Y. S. & Offutt, J. “Description of Method-level Mutation Operators for Java”. November 2005.

20. Ma, Y. S. & Offutt, J. “Description of Class-level Mutation Operators for Java”. November 2005.

21. AjMutator: A Tool For The Mutation Analysis Of AspectJ Pointcut Descriptors: Romain Delamare, Benoit Baudry and Yves Le Traon, IEEE International Conference
on Software Testing Verification and Validation Workshops 2009.

22. An Analysis and Survey of the Development of Mutation Testing: Yue Jia and Mark Harman, Technical Report- CREST CENTRE, KING’S COLLEGE LONDON. TR-9-06

23. P. Anbalagan and T. Xie. Efficient mutant generation for mutation testing of pointcuts in aspect-oriented programs. In Mutation’2006, pages 51–56. Kluwer, 2006.

24. J. S. Bækken. A fault model for pointcuts and advice in AspectJ programs. Master’s thesis, School of Electrical Engineering and Computer Science, Washington State
University, Pullman-USA, 2006.

25. E. F. Barbosa, J. C. Maldonado, and A. M. R. Vincenzi. Toward the determination of sufficient mutant operators for C. Soft. Testing, Verif. and Reliability, 11(2):113–136, 2001.

26. M. Ceccato, P. Tonella, and F. Ricca. Is AOP code easier or harder to test than OOP code? In WTAOP’2005, 2005.

27. R. Chitchyan, A. Rashid, P. Rayson, and R. Waters. Semantics-based composition for aspect-oriented require- ments engineering. In AOSD’2007, pages 36–48. ACM Press, 2007.

28. D. S. Dantas, D. Walker, G. Washburn, and S. Weirich. PolyAML: A polymorphic aspect-oriented functional programming language. In ICFP’2005, pages 306–319. ACM Press, 2005.

29. M. E. Delamaro, J. C. Maldonado, and A. P. Mathur. Interface Mutation: An approach for integration testing. IEEE Transactions on Soft. Eng., 27(3):228–247, 2001.

30. M. Gong, V. Muthusamy, and H. Jacobsen. Aspect-Oriented C tutorial, 2006. Tutorial (accessed 23/08/2007).

31. R. A. DeMillo. Hints on test data selection: Help for the practicing programmer. IEEE Computer, 11(4):34–43, 1978.

32. M. Eaddy, A. Aho, W. Hu, P. McDonald, and J. Burger.Debugging aspect-enabled programs. In Software Composition’2007, 2007.

33. R. A. DeMillo and A. J. Offutt. Constraint-based automatic test data generation. IEEE Transactions on Soft. Eng., 17(9):900–910, 1991.

34. W. Harrison, H. Ossher, and P. L. Tarr. General composition of software artifacts. In Software Composition’2005, pages 194–210 (LNCS v.4089). Springer-Verlag, 2006.

35. O. A. L. Lemos, F. C. Ferrari, P. C. Masiero, and C. V. Lopes. Testing aspect-oriented programming pointcut descriptors. In WTAOP’2006, pages 33–38. ACM Press, 2006.

36. P. Mathur and W. E. Wong. An empirical comparison of data flow and mutation based test adequacy criteria. Soft. Testing, Verif. And Reliability, 4(1):9–31, 1994.

37. M. Mezini and K. Ostermann. Conquering aspects with Caesar. In AOSD’2003, pages 90–99. ACM Press, 2003.

38. S. Zhang and J. Zhao. On identifying bug patterns in aspect-oriented programs. In COMPSAC’2007, pages 431–438. IEEE Computer

39. G. Kiczales et al. Aspect-oriented programming. In ECOOP’1997, pages 220–242 (LNCS v.1241). Springer Verlag, 1997.

40. M. Stoerzer and J. Graf. Using pointcut delta analysis to support evolution of aspect-oriented software. In ICSM’2005,pages 653–656. IEEE Computer Society, 2005.

41. D. Xu andW. Xu. State-based incremental testing of aspect-oriented programs. In AOSD’2006, pages 180–189. ACM Press, 2006. Society, 2007.

42. J. Offutt, J. Voas, and J. Payne. Mutation operators for Ada. Report ISSE-TR-96-06, Dept. Inf. and Soft. Systems Eng., George Mason Universit, Fairfax-USA, 1996.

43. O. A. L. Lemos, A. M. R. Vincenzi, J. C. Maldonado, and P. C. Masiero. Control and data flow structural testing criteria for aspect-oriented programs. Journal of
Systems and Software, 80(6):862–882, 2007.

44. S. Soares, P. Borba, and E. Laureano. Distribution and persistence as aspects. Software - Practice & Experience,36(7):711–759, 2006.

45. van Deursen, M. Marin, and L. Moonen. A systematic aspect-oriented refactoring and testing strategy, and its application to JHotDraw. Report SEN-R0507, Stichting Centrum voor Wiskundeen Informatica, Netherlands, 2005.

46. R. Johnson et al. Spring - Java/J2EE application framework. Reference Manual Version 2.0.6, Interface21 Ltd., 2007.

47. M. Mortensen and R. T. Alexander. An approach for adequate testing of AspectJ programs. In WTAOP’2005, 2005. ISSN : 0976-5166 414 Mayank Singh et. al. / Indian Journal of Computer Science and Engineering Vol 1 No 4 409-415

48. W. E.Wong. On Mutation and Data Flow. PhD thesis, Dept.of Computer Science, Purdue University, USA, 1993.

49. Tao Xie and Jianjun Zhao, A Framework and Tool Supports for Generating Test Inputs of AspectJ Programs, AOSD 06, March 20–24, 2006, Bonn, Germany. [50] Romain Delamare, Benoit Baudry and Sudipto Ghosh, A Test-Driven Approach to Developing Pointcut Descriptors in AspectJ, Proceeding, ICST '09 Proceedings of the
2009 International Conference on Software Testing Verification and Validation.

50. Freddy Munoz, Benoit Baudry, Romain Delamare, Yves Le Traon, Inquiring the Usage of Aspect-Oriented Programming: An Empirical Study, European project DiVA (EU FP7 STREP), Software Maintenance, 2009. ICSM 2009. ISSN : 0976-5166 415




Lovenish Kumar, Sunita Rani

Paper Title:

Implementation and Performance Comparison of AODV and IAODV on the Basis of Energy, Utilization, and Hop Count in WiMax on NS2

Abstract:    Wireless Bandwidth allocation and routing mechanisms are two it is big challenges to develop routing protocol that can must different application needs and optimize routing paths according to the topology change in mobile ad hoc networks (MANET). Inaccurate local topology knowledge and the outdated destination position information can lead to inefficient geographic forwarding and enter routing failure. [2] In this paper improve the AODV protocol (IAODV) by creating a Cycle on a node where the congestion probability is high i.e. at near sink node to find all those nearer nodes where buffer occupancy is high and proposed to minimize the energy, decrease the hop count and increase the utilization as compared to AODV protocol.

   Wi Max 802.16, AODV, IAODV, MANET


1.  M. Castrucci, I. Marchetti, C. Nardini, N. Ciulli and G. Landi, “AFramework for Resource Control in WiMAX Networks”, In Proc. of the 2007 International Conference on Next Generation Mobile Applications, Services and Technologies, pp. 316-321, 2007.
2.  Xiaojing Xiang, Zehua Zhou & Xin Wang,” Self –Adaptive on Demand Geographic Routing Protocols  for Mobile  Ad Hoc Networks”, IEEE INFOCOM 2007 proceedings, pp. 2296-23011.

3.  Deepak kumar Garg, Balraj Singh, Darshan Singh Sidhu, “Performance Comparison of AODV, WBAODV, DSDV & Hybrid in WSN using Network Simulator 2”, International Journal of Engineering Research and Technology, Vol 2, Isuue: 11, Nov 2013, pp. 2744-2748.

4.  R Myrali Prasad & P. Satish Kumar, “A Joint Routing and Bandwidth Allocation Protocol for IEEE 802.16 WiMax Networks”, Vol 2, Issue: 5, Oct 2010, pp. 442-446.

5.  lovenish kumar & sunita rani” Implementation of Improved AODV Protocol based on WiMax using Network Simulator 2”, Vol. 3,issue 7,:dec,2013,pp. 161-164.

6.  Deepak Kumar Garg, Balraj Singh & Darshan Singh Sidhu,” Implementation & Performance of Various Hybrid Schemes in the Wireless Ad-hoc Network using Network Simulator 2”, International Journal of Engineering Research and Technology, Vol 2, Issue: 12, Dec 2013, pp. 2913-2916.




Debaswapna Mishra

Paper Title:

Data Privacy in Banking and Insurance Sector: A Case Study Approach

Abstract:     Now a Days business and their customer’s alike collect, store and transmit vast amount of information electronically and they want to believe that this information is secure. At the customer level, the concern for data privacy has resulted in a growing number of laws and regulations that address issues including what information can be collected and maintained, how the information should be stored, how and where information can be transmitted, and required actions in the event of security breach. Notwithstanding the proliferation of requirements, reports of identity theft, inadvertent release of customer and proprietary business information, and successful attempts by hackers to penetrate systems and steal information continue to command headlines in media. This is more acute in banking and financial sector where a lot of financial transactions occur on a day-to-day basis. This study aims at providing robust solutions to address various data privacy issues, particularly in Banking and Insurance sector. The current set of algorithms to handle data privacy appears to be inadequate while the need of the hour is to provide a solution that encompasses a host of algorithms and houses a set of business rules. A good privacy solution enables de-identification of confidential data that can be readily used in business software development and testing, maintenance, statistical analysis, marketing research, training and other outsourcing solutions.

   development and testing, maintenance, statistical analysis,


1.    ‘‘Estimates Put T.J. Maxx Security Fiasco At $4.5 Billion,’’ Information Week, May 2, 2007, citing research conducted by IP Locks, a compliance and database security company, and the Ponemon Institute, an independent research company. 277.
2., February 24, 2009.

3.    ‘Fifth Annual U.S. Cost of Data Breach Study,’’ Ponemon Institute, 2010, p. 4.

4.    The President’s Identity Theft Task Force, ‘‘Combating Identity Theft: A Strategic Plan’’ (April 2007), 2–3,

5.    Ibid., 3.

6.    United States General Accounting Office, ‘‘Identity Theft: Prevalence and Cost Appear to be Growing, Report to Congressional Requestors,’’ March 2002, 35.

7.    Byron Acohido and Jon Swartz, ‘‘Meth Addicts’ Other Habit: Online Theft,’’ USA Today, December 15, 2005, 10A.

8.    Cassell Bryan-Low, ‘‘Growing Number of Hackers Attack Web Sites for Cash,’’ Wall Street Journal, November 30, 2004, A1.

9.    Microsoft Corporation, ‘‘Zombies and Botnets: Help Keep Your Computer under Your Control,’’ January 3, 2007, zombies.mspx.
10. Bryan-Low, ‘‘Growing Number of Hackers.’’
11. President’s Identity Theft Task Force, ‘‘Combating Identity Theft,’’ 15.

12. Yochi J. Dreazen, ‘‘Identity Theft as an Inside Job Is Increasing,’’ Wall Street Journal, July 31, 2002, B1.

13. Federal Trade Commission, ‘‘2006 Identity Theft Survey Report’’ (November2007),31–32,

14. Martin T. Biegelman and Joel T. Bartow, Executive Roadmap to Fraud Prevention and Internal Control: Creating a Culture of Compliance, (Hoboken, NJ: John Wiley & Sons, 2006), 219. 




Nermin K. Negied

Paper Title:

Human Biometrics: Moving Towards Thermal Imaging

Abstract: Thermal imaging is simply the technique of using the heat given off by an object to produce an image of it or locate it. New thermal imaging frameworks for detection, segmentation and unique feature extraction and similarity measurements for human physiological biometrics recognition are reviewed. The research investigates specialized algorithms that would extract vasculature information, create a thermal signature that identify the individual. The highly accurate results obtained by the algorithms presented clearly demonstrate the ability of the thermal infrared systems to extend in application to other thermal imaging based systems. 

Keywords:  Thermography, Infrared bands, Near IR imaging, Thermal signature, Pedestrians detection, Face detection, Ear detection, Iris recognition, Thermal spectrum, Hand vein patterns, Eye detection, Fingerprint discrimination.


1.     N. K. Abdel-Wahab, E. Hemayed, and M. Fayek, “Heard: An Automatic Ear detection Technique”, IEEE. In the International Conference of Engineering and Technology (ICET), 2012.
2.     Burge, M. and Burger, W. Ear Biometrics in Computer Vision. In the 15th International Conference of Pattern Recognition, ICPR 2000, pp. 826-830.

3.     Michał Choraś, Ear Biometrics Based on Geometrical Feature Extraction, Lecture Notes in Computer Science, pp. 51-61, 2004.

4.     Ruma Purkait, Ear Biometric: An Aid to Personal Identification, Anthropologist Special volume no. 3, pp. 215-218, 2007.

5.     Breckon, T.; Gaszczak, A., Han, J., (2011). "Real-time People and Vehicle Detection from UAV Imagery". Proc. SPIE Conference Intelligent Robots and Computer Vision XXVIII: Algorithms and Techniques 7878. doi:10.1117/12.876663.

6.     Pinggera, P.; Breckon, T.P.; Bischof, H.; (2012). "On Cross-Spectral Stereo Matching using Dense Gradient Features". In Proc. British Machine Vision Conference:
526.1-526.12. doi:10.5244/C.26.103.

7.     Thermographic images in active volcanoes surveillance system — TIIMNet project Vesuvius and Solfatara INGV Naples Italy.

8.     Thermographic images in active volcanoes surveillance system — TIIMNet project equipment details

9.     Infrared Building Inspections — Resources for Electrical, Mechanical, Residential and Commercial Infrared/Thermal Inspections.

10.  Mrinal Kanti Bhowmik1, Kankan Saha1, Sharmistha Majumder1, Goutam Majumder1, Ashim Saha1, Aniruddha Nath Sarma1, Debotosh Bhattacharjee2, Dipak Kumar Basu2 and Mita Nasipuri2 “Thermal Infrared Face Recognition –a Biometric Identification Technique for Robust Security System”, 1Tripura University (A Central University) 2Jadavpur University 1,2India, Reviews, Refinements and New Ideas in Face Recognition, 2012,

11.  M. Bertozzi, “Pedestrian detection in infrared images,” Proc.IEEE, Intelligent Vehicles Symp, Columbus, OH, June 2003.

12.  Mark A. Keck James W. Davis, “A two-stage template approach to person detection in thermal imagery,” Proc. Wkshp. Applications of Comp. Vis, 2005.

13.  J. Davis and V. Sharma, “Robust background-subtraction for person detection in thermal imagery,” IEEE Int. Wkshp. On Object Tracking and Classification Beyond the Visible Spectrum, 2004.

14.  Mark A. Keck James W. Davis, “A two-stage template approach to person detection in thermal imagery,” Proc. Wkshp. Applications of Comp. Vis, 2005.

15.  Michel Arens Kai Jungling, “Feature based person detection beyond the visible spectrum,” IEEE CVPR Workshops, 2009.

16.  T. Tuytelaars H. Bay and L. V. Gool, “Surf: Speeded up robust features,” In Proc. 9th European Conference on Computer Vision, pages 404417, Graz, Austria, May 2006.

17.  Weihong Wang, Jian Zhang, Chunhua Shen, “Improved human detection and classification in thermal images”, Proceedings of 2010 IEEE 17th International Conference on Image Processing, Hong Kong September 26-29, 2010.

18.  Gyaourova, A., Bebis, G., Pavlidis, I.: Fusion of infrared and visible images for face recognition. Lecture Notes in Computer Science pp. 456-468.

19.  Cho, S.Wang, L., Ong, W. “Thermal imprint feature analysis for face recognition”, IEEE International Symposium on Industrial Electronics (ISIE), 1875-1880.

20.  Pavlidis, I., Tsiamyrtzis, P., Manohar, C., Buddharaju, P.: Biometrics: Face recognition in thermal infrared, chap. 29, pp. 1{15. CRC Press (2006).

21.  Silvio Filipe, Luis A. Alexandre, “Improving Face Segmentation in Thermograms using Image Signatures”, Department of Computer Science IT – Institute, SOCIA - Soft Computing and Image Analysis Group University of Beira Interior, 6200-Covilha, Portugal.

22.  C.-L. Lin and K.-C. Fan, “Biometric verification using thermal images of palm-dorsa vein patterns” IEEE Trans. Circuits & Sys. For Video Technology, vol. 14, pp. 199 – 213, Feb. 2004.

23.  L. Wang and G. Leedham, “A thermal hand-vein pattern verification system,” Pattern Recognition and Image Analysis, S. Singh, M. Singh, C. Apte and P. Perner (Eds), LNCS, vol. 3687, pp. 58-65, Springer, 2005.

24.  J. M. Cross and C. L. Smith, “Thermo graphic imaging of the subcutaneous vascular network of the back of the hand for biometric identification,” Proc. IEEE 29th Annual Int. Carnahan Conf. Security Technology, pp. 20–35, Oct. 1995.

25.  S.-K. Im, H.-M. Park, S.-W. Kim, C.-K. Chung, and H.-S. Choi, “Improved vein pattern extracting algorithm and its implementation,” Proc. Int. Conf. Consumer Electronics, pp. 2-3, Jun. 2000.

26.  S. K. Im, H. M. Park, Y.W. Kim, S. C. Han, S.W. Kim, and C. H. Hang, “An biometric identification system by extracting hand vein patterns,” J. Korean Phys. Soc., vol. 38, pp. 268–272, Mar. 2001.

27.  T. Tanaka and N. Kubo, “Biometric authentication by hand vein patterns”, Proceedings of the SICE Annual Conference, SICE Annual Conference, Yokohama, Japan, pp. 249-253, Aug. 2004.

28.  Ajay Kumar, K. Venkata Prathyusha, “Personal Authentication using Hand Vein Triangulation”, Biometric Technology for Human Identification V, Proc. of SPIE Vol. 6944, 69440E, (2008).

29.  Ayman Abaza and Thirimachos Bourlai ”Human Ear Detection in the Thermal Infrared Spectrum”, on 02/18/2013.

30.  Viola, P. and Jones, M., “Robust real-time face detection,” Journal of Computer Vision 57(2), 137–154 (2004).

31.  Bourlai, T. and Jafri, Z., “Eye Detection in the Middle-Wave Infrared Spectrum: Towards Recognition in the Dark,” in [Proc. on Intl. Workshop on Information Forensics and Security], (November 2011).

32.  Eui Chul Lee , Hyunwoo Jung, and Daeyeoul Kim, “New Finger Biometric Method Using Near Infrared Imaging”, 2011.

33.  Shoude Chang, Kirill V. Larin, Youxin Mao, Costel Flueraru, and Wahab Almuhtadi, “Fingerprint Spoof Detection Using Near Infrared Optical Analysis”,, 2011.




Kiran S. Patil, N.G.Gore, P.J.Salunke

Paper Title:

Minimum Cost Design of Reinforced Concrete Flat Slab

Abstract:   Sequential unconstrained minimization technique (SUMT) is used for the solution of a comprehensive minimum cost design problem formulation. The formulation, based on Indian codes of practice (IS 456-2000), Solutions to the nonlinear programming problem are obtained with an appropriate computer program, This is used for solving a wide range of typical flat slab designs with varying span-to-depth ratios, live and dead loads, different grades of concrete and steel. A related sensitivity study enables the comparison of optimal and standard solutions. The different conditions of flat slabs are analyzed and design by using MATLAB software.

   Flat slab, Reinforced concrete, Punching shear stress, slab size, drop panel size.


1.     M.G. Sahab, A.F. Ashour, And V.V. Toropov “Cost optimisation of reinforced concrete flat slab buildings”, Engineering Structures.Vol.27 pp.313–322. 2005.
2.     N. Subramanian “Evaluation and enhancing the punching shear resistance of flat slabs using HSC”, The Indian Concrete Journal, Vol. 79(5), pp.31-37. 2005.

3.     Ronaldo B. Gomes and Paul E. Regan,”Punching Resistance of RC Flat Slabs with Shear Reinforcement”, Journal of Structural Engineering, Vol.125 (6), pp- 684-692. 1999.

4.     K.M.A. Hossain, And O. Olufemi “Design optimization of simply supported concrete slabs by finite element modeling”, Struct. Multidisc Optimization.Vol.30, pp.76–88. 2005.

5.     Adeola A Adedeji “Application: simplifying design of RC flat slab using taboo search”, Trends in applied science research (Academic Journals Inc.)Vol.6 (4) pp 375-385.2011.

6.     S.S.F. Mehanny, B.M. Sobhy and M.M. Bakhoum “Strength versus drift limitation effects on code compliant seismic-resistant flat slab buildings”, The Indian Concrete Journal .vol.36 (6) pp.-1-2. 2008.

7.     M.A. Eder, R.L. Vollum, A.Y. Elghazouli, T. Abdel-Fattah “Modelling and experimental assessment of punching shear in flat slabs with spearheads”, Engineering Structures.Vol.32, pp.3911–3924. 2010.

8.     H.S. Kim, And D.G.Lee “Efficient analysis of flat slab structures subjected to lateral loads” Engineering Structures Vol.27 pp.251–263. 2005.

9.     Vikunj k.Tilva Prof. B.A.Vyas and Assit.Prof. Parth Thaker “Cost comparison between flat slabs with drop and without drop in four storey lateral load resisting building”, National Conference on Recent Trends in Engineering & Tech. pp1-5. 2011.

10.  R.C.Gupta and Dr. M.R.Sethia “computer aided design of flat slab-column-footing structure”, The Bridge and Structural Engineering. Vol.23 (1) pp.39-54. 1993.

11.  I.S: 456-2000.

12.  “Engineering Optimization” by S.S. Rao




S.R.Aarthi Avanthiga, V.Balaji

Paper Title:

A Design Prototypic Sarcastic Gadget Technology for Perceptual Disabilities

Abstract:    Although embedded computing technology is widely used today in many safety-critical applications, yet there is a need for future scope and development. So researchers have only begun to explore its potential. As more common items corresponding to embedded systems such as washing machines and ATM machine etc incorporate embedded processing capability, the number of such systems could grow exponentially. However, unlike purely digital technologies, embedded systems are limited by more than our imagination.In 2006, Carnegie Mellon University’s Priya Narasimhan launched a group effort to develop Trinetra  (, a systemthat lets blind persons self-identify items in a grocery store using a “third eye”—a smart phone and inexpensive off-the-shelf embedded devices. In this scenario, they’re also limited by the physical components used to perform its parameter up to the mark—considering theiraccuracy, size, weight, processing speed, and power requirements etc. Nevertheless, current trends favour the widespread deployment of embedded devices in the future. Human’s basic requirement is cultivated eventually. For example Cell phones which permeate society, in  processing and communication platform fast approaching ubiquity. And many different market sectors, which start from game developers to the military application, with adequate motivation, create and refine new cognitive aspects, ensuring the availability of adequate R&D resources. One of the many areas in which embedded systems show great promise is gadget technologies, which address the special needs of those with impairments. Hence its necessary to built a grocery an embedded device. Prototypic sarcastic gadget which is a glove or hand shape material that can recognize basic hand gestures and convert them into speech using low-cost.

    ATM, R&D.


1.        Dr Wald, M., “The role of assistive technologies in supporting  student learning”,  Southern Higher
2.        and Further Education  Collaboration, University of Southampton, Chapter 5,  July 2002.

3.        Antzakas, K. & Woll, B., “Hand Movements and Negation in  Greek Sign Language”,  Gesture Workshop, City University of  London, 2001, 193--196.

4.        Lampropoulou, V., “Meeting the needs of deaf children in Greece.  A systematic approach”, Journal of the British Association of Teachers of the Deaf.

5.        Kubin G. Nonlinear Processing of Speech, in Speech Coding and Synthesis [M]. Elsevier Science B.V., 1995, pp.557-610.

6.        Microchip For PIC Micro controller

7.        N.P.Bhatti, A . Baqui, B.S.Chowdhty,M.A.Unar,”Electronic Hand Glove for Speech Impaired and Paralysed Patients”,EIR Magazine,May 2009,pp.59-63,Karachi,Pakistan

8.        Murry, F. R., & Murry, G. B. (2000). Using a lesson template to integrate general and special education: Teaching lesson template use to educators of students
with special needs. In: Annual Proceedings of the National Convention of the Association for Educational Communications. Information &Technology (1-2).

9.        Reimer-Reiss M, Wacker R 2000 Factors  Associated with Assistive Technology Discontinuance Among Individuals with Disabilities, Journal of Rehabilitation, Jul-Sept 2000

10.     Roland-Mieszkowski, M.Sc., Ph.D., and Andrzej Czyzewski, Ph.D. and Bozena Kostek, " The Digital Speech Aid", Halifax, Nova Scotia, Canada, Proceedings of the Congress, Dec 1993.

11.     Ronald J. Seiler (2007), Assistive Technology for Individuals with Cognitive Impairments, The Idaho Assistive Technology Research, Center on Disabilities and Human Development, University of Idaho, Moscow, December 2007

12.     Schreier, E.M.*, Levanthal, D.D., Uslan, M.M. (1991). Access technology for blind and visually impaired persons. Technology and Disability,1 (1), 19-23.

13.     ‘Accessibility technology’, Wikipedia online encyclopedia, Retrieved on 10th January, 2012 from‘The Microsoft Researchs
on Speech Processing’ Retrieved on 18th February, 2012from roups/srg“Bio MEMS: revolutionizing medicine and healthcare,” In Stat/MDR, Scottsdale, AZ, 2002.

14.     Brewster SA, Raty VP. Kortekangas A.

15.     Enhancing scanning input with non-speech sounds. In ACM conference on Assistive technologies (ASSET’96); 1996, p 10 — 14

16.     Duhaney, L. M., & Duhaney, D. C. (2000). Assistive technology: Meeting the needs of learners with disabilities.  International Journal of Instructional Media, 27(4), 393-402.

17.     Dunn, Michael (2007) Give Applications a Voice, Speech synthesis and recognition in .NET, Tech Brief Articles, Retrived on 14th March, 2012

18. aspx?sc_lang=en

19.     Mirenda, P. (2001). Autism, augmentative communication, and assistive technology: What do we really know? Focus on Autism & Other Developmental disabilities, 16(3), 141-152.

20.     Mukherjee A, Bhattacharya 5, Chakrabozty K, Basu A. Breaking the accessibility barrier: Development of special computer access mechanisms for the neuromotor disabled in India In International Conference on Human Machine Interfaces; 2004 (IC’Hi1fl: p 136—141

21.     Volicer L, Harper D G, Manning B C et al 2001 Sundowning and circadian rhythms in Alzheimer's disease. American Journal of Psychiatry 158(5):704-711




A.Yugandhara Rao, M.Neeraja, G.Sruthi Keerthi, K.Haritha

Paper Title:

Distributed Streaming With Network Diversity

Abstract:  today’s packet networks including the Internet offer an intrinsic diversity for media distribution in terms of available network paths and servers or information sources. Novel communication infrastructures such as ad hoc or wireless mesh networks use network diversity to extend their reach at low cost. Diversity can bring interesting benefits in supporting resource greedy applications such as media streaming services, by aggregation of bandwidth and computing resources. Then, the advantages of server or source peer diversity in collaborative streaming solutions are discussed. Lastly, we present an overview of wireless mesh networks and focus on the typical constraints imposed by these novel communication models on media streaming with network diversity.

 Collaborative media streaming; distributed streaming; media overlay networks; mesh networks; multi path


1.     V. N. Padmanabhan, H. J. Wang, and    P. A. Chou, BResilient peer-to-peer streaming,[ in Proc. IEEE ICNP, Atlanta,    GA, 2003.
2.     C. Yi, L. Baochun, and K. Nahrstedt,    BoStream: Asynchronous streaming multicast    in application-layer overlay networks,[ IEEE J. Sel. Areas Commun., vol. 22, no. 1, pp. 91–106,    2004.

3.     X. Zhang, J. Liu, B. Li, and T. S. P. Yum, B CoolStreaming: A data-driven overlay network for peer-to-peer live media streaming,[ in Proc. IEEE INFOCOM, 2005, vol. 3, pp. 2102–2111.

4.     J. Chakareski and P. Frossard, BAdaptive systems for improved media streaming experience,[ IEEE Commun. Mag., Jan. 2009.

5.     H. Schwarz, D. Marpe, and T. Wiegand, BOverview of the scalable video coding standard,[ IEEE Trans. Circuits Syst. Video Technol., to be published.

6.     C. Jiancong, S. H. G. Chan, and V. O. K. Li, BMultipath routing for video delivery over bandwidth-limited networks,[ IEEE J. Sel. Areas Commun., vol. 22, no. 10,  pp. 1920–1932, 2004.

7.     V. K. Goyal, BMultiple description coding:Compression meets the network,[ IEEE Signal  Process. Mag., vol. 18, pp. 74–93, Sep. 2001.

8.     J. G. Apostolopulous and S. J. Wee, BUnbalanced multiple description video communication using path diversity,[ in Proc. IEEE ICIP, Oct. 2001, pp. 966–969.




Dhirendra Haridas, R. Dhanalakshmi

Paper Title:

Investigation and Implementation of Step-Down Transformerless S S Single Switch AC/DC Converter

Abstract:   A transformerless single-stage single switch AC/DC converter with direct power transfer is presented in this paper. Unlike existing single-stage ac/dc converters with uncontrolled intermediate bus voltage, a new high step-down transformerless single-stage  single switch ac/dc converter  achieving   intermediate bus voltage   regulation  and output voltage regulation is proposed. With the direct power transfer feature, the converter is able to achieve efficient power conversion, low voltage stress on intermediate bus (less than 120V) and low output voltage. The topology integrates a buck-type power-factor correction (PFC) cell with a buck–boost dc/dc cell and part of the input power is coupled to the output directly after the first power processing.  A detailed analysis of the proposed converter for regulated intermediate bus voltage and output voltage with simulation results are presented in this paper a prototype circuit is implemented to verify the performance.

  - AC/DC, (PFC).


1.        IEEE Std 519-992: IEEE Recommended Practices and Requirements for Harmonic Control in Electrical Power Systems," Institute of Electrical and Electronics Engineers, 1992.
2.        Single-Stage Single-Switch Power-Factor-Correction AC/DC Converters with DC-Bus Voltage Feedback for Universal Line Applications Q. Jinrong, Z. Qun, and F. C. Lee, "Single-stage single-switch powerfactor- correction AC/DC converters with DC-bus voltage feedback for universal line applications," IEEE Transactions on Power
Electronics, vol. 13, no.6, pp. 1079-1088, November 1998.

3.        A new family of single-stage isolated power-factor correctors with fast regulation of the output voltage R. Redl, L. Balogh, and N. O. Sokal, "A new family of single-stage isolated power-factor correctors with fast regulation of the output voltage," in Power Electronics Specialists Conference, PESC '94 Record., 25th Annual IEEE, 1994, pp. 1137-1144 vol.2.

4.        Analysis and simulation for a novel single-switch single-stage AC/DC converter  H. Ting-Wei, Y. Chun-Lin, and L. Jiun-Tze, "Analysis and simulation for a novel single-switch single-stage AC/DC converter," in TENCON 2007 - 2007 IEEE Region 10 Conference, 2007, pp. 1-4.

5.        A Single-Stage AC/DC Converter With High Power Factor, Regulated Bus Voltage, and Output VoltageD. D. C. Lu, H. H. C. Iu, and V. Pjevalica, "A Single-Stage AC/DC Converter With High Power Factor, Regulated Bus Voltage, and Output Voltage," IEEE Transactions on Power Electronics, vol. 23, no.1, pp. 218-228, January 2008.

6.        Transformerless AC-DC ConverterSaisundar. S., I Made Darmayuda, Zhou Jun, Krishna Mainali, Simon Ng Sheung Yan, Eran Ofek, “Transformerless AC-DC Converter”, World Academy of Science, Engineering and Technology 69, pp.620-623, 2012

7.        Transformerless Single-Stage AC/DC Converter with Direct Power Transfer Shu-Kong Ki, Dylan Dah-Chuan Lu, “Transformerless Single-Stage AC/DC Converter with Direct Power Transfer”, Australasian Universities Power Engineering Conference (AUPEC'08), paper P-103,pp.1-6, 2008.

8.        A High Step-Down Transformerless Single-Stage Single-Switch AC/DC Converter Shu-Kong Ki, and Dylan Dah-Chuan Lu, “A High Step-Down Transformerless Single-Stage Single-Switch AC/DC Converter”, IEEE TRANSACTIONS ON POWER ELECTRONICS, VOL. 28, NO. 1, pp.36-45,JANUARY 2013

9.        Implementation of an Efficient Transformerless Single-Stage Single-Switch AC/DC Converter Shu-Kong Ki,  and Dylan Dah-Chuan Lu, “Implementation of an Efficient Transformerless Single-Stage Single-Switch AC/DC Converter”, IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 57, NO. 12, pp. 4095-4105, DECEMBER 2010




Meysam Shamshiri, Ahmad Farid Sapar, Chin Kim Gan, Revinnath Tengga Daram, Mohd Ruddin AbGhani

Paper Title:

Reactive Power Imbalance Method for Islanding Detection in Micro-Grid Operation

Abstract:    Micro-grids usage among consumers has become a new attraction due their several of advantage. Its major function is to ensure the stable operation during the fault and a variety of utility grid disruption. Since the utilization of micro-grid became common, the correct application and operation of micro-grid is importance and significant. One of the main challenges in micro-grids operation is islanding detection methods. There are several methods that are handles the islanding detection that each one have advantage and some disadvantage. This paper presents and investigates the Reactive Power imbalance Method for islanding detection. The passive algorithm implements in this paper due to the low cost operation, however it got the higher non-detection zone (NDZ) and slower response time compare some active methods. The micro-grid simulation is modeled in Matlab/Simulink program and the results of the monitoring are discussed as well. As the result, the performance of the Reactive Power Imbalance method for the islanding detection state is compared with the simulation model without control algorithm. Finally, the micro-grid model capability with control algorithm is shown in order to meet the load demand.

    Micro-grid, Islanding Detection, Passive method, Distributed Generation.


1.     B. Kroposki, T. Basso, and R. DeBlasio, “Microgrid standards and technologies,” Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century, 2008 IEEE, pp. 1–4.
2.     Khamis, Aziah, Hussain Shareef, Erdal Bizkevelci, and Tamer Khatib. "A review of islanding detection techniques for renewable distributed generation systems." Renewable and Sustainable Energy Reviews 28 (2013): 483-493.

3.     W.Y. Teoh and C.W. Tan, “An Overview of Islanding Detection Methods in Photovoltaic Systems,” World Academy of Science, Engineering and Technology, pp. 674–682, 2011.

4.     M. Shamshiri, C.K. Gan, and C.W. Tan, “A review of recent development in smart grid and micro-grid laboratories”, IEEE International Conferences on Power Engineering and Optimization Conference (PEOCO) Melaka, Malaysia, June 2012, pp. 367–372, 2012.

5.     G. Strbac, N. Jenkins, T. Green, and D. Pudjianto, “Review of Innovative Network Concepts”, Imperial College London and University of Manchester, 2006.

6.     D. Pudjianto, P. Mancarella, C. K.Gan, G. Strbac, “Closed loop price signal based market operation within Microgrids”, European Transactions on Electrical Power, 2011, 21(2), 1310-1326.

7.     G. Bakhshi, M Noroozian, Reza Gharehpetian, “Passive anti-islanding scheme based on reactive power in the smart grids,” Iranian Conference on Smart Grids (ICSG), vol. 5, pp. 1–7, 2012.

8.     IEEE.Standards, “IEEE Standard for Interconnecting Distributed Resources with Electric Power Systems,” The Institute of Electrical and Electronics Engineers, Inc., no. July, 2003.

9.     R. Bakhshi, M. Noroozian, “Reactive Power Based Anti-Islanding Scheme for Synchronous Distributed Generators,” IJTPE Journal,, vol. 4, no. 13, pp. 30–37, 2012.




Manikandan.N, Sumathy.P

Paper Title:

Improving the Real Time Performance of Sensor Networks for Monitoring the Healthcare System Using Wireless Devices

Abstract:     To monitor the health condition of patients and provide a wide range of effective, comprehensive, and convenient health condition services the wireless networks combined with IP techniques. A minimum power embedded wearable sensor network can be used to measures the health parameters effective, and is connected according to the concept of (IP over low-power wireless personal area network). Sensor-network-based home monitoring system for elderly activity behavior involves functional assessment of daily activities. The large amount of biomedical signals can be sent through the extended wireless network combining IP technique and mobile technology for daily lifestyle to users appropriately. A visualization module of the Microcontroller function displays the recording biomedical signals. The opportunity for cardiac patients and child have constantly be monitored their health stage at any place. Patient information stored in the System within help of Wireless devices. Server system will get patient information from Ethernet card via Hub. In Case of emergency, the Ambulance is automatically called with the help of the IP Address and the Patient is also informed about the abnormality prevailing in health condition.

  health condition, healthcare application, sensors, Ethernet, system, wireless devices, emergency condition


1.     Antonella Meduri, claudio De Capua and Rosario morello (Oct.2010), “A smart ECG measurement system based on web-service-oriented architecture for telemedicine applications,” IEEE trans. Instrumentation and measurement, vol. 59, No.10.
2.     Bottazzi. D, Nasser. N, Taleb. T (Mar 2010) , “A novel middleware solution to improve ubiquitous healthcare system aided by affective information,” IEEE Trans. Inf. Technol, Biomed., vol.14, no.2, pp. 335-349.

3.     Chen.Y.T,Hung.I.C,Huang.M.W,Hou.C.J,Cheng(2011),“Physiological signal analysis for patients with depression,” inProc. 4th Int. Conf. Biomed. Eng. Informat., Shanghai, China, pp. 805–808.

4.     Choudhury.T, Lane.N.D, Lu.H,  Miluzzo .E, Peebles. D (Sep.2010) “A Survey of mobile phone sensing,” IEEE Commun. Mag.,Vol. 48, no. 9, pp.140-145.

5.     Chung.W.Y, Lee.Y.D , and Jung.S.J (2008), “A wireless sensor network compatible wearable u-healthcare monitoring system using integrated ECG, accelerometer and SpO2,” inProc. 30th Annual. Int. Conf. Eng. Med. Biol. Soc., Vancouver, BC, Canada, pp. 1529–1532.

6.     Chung.W.Y, Yau.C, Shin.K.S, and Myllyla.R (2007), “A cell phone based health monitoring system with self-analysis processor using wireless sensor network technology,” in Proc. 29th Annu. Int. Conf. Eng. Med. Biol. Soc., Lyon, France, pp. 3705–3708.

7.     Dulleck.U, Ristl.A,Schaffner.M, and  Torgler.B (2011), “Heart rate variabil-ity, the autonomic nervous system, and neuroeconomic experiments,” J. Neurosci. Psychol. Econ., vol. 4, no. 2, pp. 117–124.

8.     Garcia-Gonzalez.M.A, Fernandez-Chimeno.M, and Ramos-Castro.J (Mar. 2007) “Estimation of the uncertainty in time domain Indices of RR time series,” IEEE Trans. Biomed. Eng., vol. 54, no. 3, pp. 556–563.

9.     Ko.J.G, Lu.C.Y, Srivastava.M.B, Stankovic.J.A, Terzis.A, and Welsh.M (Nov.2010),“Wireless sensor networks for healthcare,”Proc. IEEE, vol. 98, no. 11, pp. 1947–1960.

10.  Jung.S.J and Chung.W.Y (Apr.2011), “Flexible and scalable patient’s health monitoring system in 6LoWPAN,”Sensor Lett., vol. 9, no. 2, pp. 778–785.

11.  Jung Wook Park, Yunyoung (Mar. 2013), “Child Activity Recognition Based on cooperative fusion model of a triaxial accelerometer and a barometric pressure  sensor,”  IEEE, Biomedical and Health informatics, vol. 17, no2.

12.  Kim.C, Soong.A, Tseng.M, and Zhixian.X (Mar. 2011), “Global wireless machine-to-machine standardization,” IEEE Internet Comput., vol. 15, no. 2, pp. 64–69.

13.  Lawton.G (Sep. 2004), “Machine-to-machine technology gears up for growth,” Computer, vol. 37, no. 9, pp. 12–15.

14.  Lin.C.W, JWang.J.S, and Chung.P.C (Feb. 2010), “Mining physiological conditions from heart rate variability analysis,” IEEE Comput, vol. 5, no. 1, pp. 50–58.

15.  Malik.M (Mar. 1996), “Heart rate variability: Standards of measurement, physi-ological interpretation, and clinical use,”Circulation, vol. 93, no. 5, pp. 1043–1065.

16.  Massot.B, Baltenneck.N, Gehin.C,  Dittmar.A, and McAdams.E (Mar. 2012), “EmoSense: An ambulatory device for the assessment of ANS activity-application in the objective evaluation of stress with the blind,”IEEE Sensors J., vol. 12, no. 3, pp. 543–551.

17.  Pablo laguna, Raquel Bailon and Leif Sornmo (July 2006) ,”A  robust method for ECG-based estimation of the respiratory frequency during stress testing,” IEEE Biomedical, vol. 53, No. 7

18.  Pandian.P.S, Mohanavelu.K, Safeer.K.P, Kotresh.T.M,  Shakunthala, P. Gopal, and V. C. Padaki (May 2008), “Smart vest: Wearable multi-parameter remote physiological monitoring system,”Med. Eng. Phys., vol. 30, no. 4, pp. 466–477.

19.  Risto Myllya, Sang-Joong jung and wan-young Chung (May 2013), “Wireless Machine-to-Machine Healthcare solution Using Android mobile devices in global networks,”IEEE Sensor, Vol.13.No.5.

20.  Shelby.Z and Bormann.C (2009), 6LoWPAN: The Wireless Embedded Internet. New York: Wileypp. 1–244.

21.  Shen.W, Xu.Y, Xie.D,  Zhang.T, and Johansson.A (2011), “Smart border routers for e-healthcare wireless sensor networks,” in Proc. 7th Int.Conf. Wireless Communication, Netw. Mobile Comput., Wuhan, China ,pp. 1–4.

22.  Toh.S.H,  Lee .S.C, and ChungW.Y (2008), “WSN based personal mobile physiological monitoring and management system for chronic disease,” in Proc. 3rd Int. Conf. Convergence Hybrid Inf. Technol., Busan, Korea, pp. 467–472.

23.  Yang.G.Z (2006), Body Sensor Networks, 1st ed. London: Springer-Verlag,  pp. 1–275.




Subhra Rani Patra R. Jehadeesan, T.V. Santosh, T.Jayanthi, S.Rajeswari, S.A.V. Satyamurty, M. Sai Baba

Paper Title:

Neural Network Model for an Event Detection System in Prototype Fast Breeder Reactor

Abstract:  System failures are identified and quantified by modeling artificial intelligent systems using the required process parameters that cause the failure. In this paper, an artificial neural network (ANN) model has been implemented for detection of various events in Prototype Fast Breeder Reactor (PFBR). Using the conventional, in-house developed thermal-hydraulics model of PFBR operator training simulator, input data has been generated to train the ANN model for various events associated with PFBR subsystems. The subsystems considered here are Primary Sodium Circuit and Neutronics system of PFBR. Operators have to take immediate actions in order to tackle the unsought occurrence of events due to mechanical and electrical failures, thereby ensuring the safe operations of the power plant. In those scenarios, neural network serves as a useful tool in identifying the events at the early stage of their occurrence. The artificial neural network (ANN) models developed here are able to identify the events quickly as compared to the conventional methods. Various learning algorithms based on back propagation network has been successfully applied to the neural network model and the network has been fine tuned towards detecting the events accurately. The resilient back propagation algorithm shows better results compared to other variants.

 Nuclear Power Plant, Event Detection, Prototype Fast Breeder Reactor, Neural Network, Back Propagation Network.


1.        Attieh I.K., Gribok A.V., Hines J.W., Uhrig R.E., Pattern recognition techniques for    transient detection to enhance nuclear reactor’s operational safety, proceedings of the Maintenance and Reliability Conference (MARCON 2000), Knoxville, TN, May 7-10, 2000.
2.        Varde P.V., Sankar S., Verma A.K., An operator support system for research reactor operations and fault diagnosis through a connectionist framework and PSA based knowledge based systems, Reliability engineering and system safety 60, 53-69, 1998

3.        Hadad K., Pourahmadi M., Majidi-Marahgi H., Fault diagnosis and classification based wavelet transform and neural network, Progress in nuclear energy, 53, 41-47, 2011

4.        Roverso D., Neural ensembles for event identification, Proceedings of safeprocess, IFAC symposium on fault detection, supervision for technical process, 2000

5.        Mo K., Leo S. J., Seong P.H., A dynamic neural network aggregation model for transient diagnosis in nuclear power plants, Progress in nuclear technology, 49, 262-272, 2007

6.        Santosh T.V., Kumar M., Thangamani I., Srivastava A., Dutta A., Verma V., Mukhopadhyay D., Ganju S., Chatterjee B., Rao V.V.S.S., Lele H.G., Ghosh A.K., A diagnostics system for identifying accident conditions in a nuclear reactor, Nuclear engineering and design, 241, 177-184, 2011

7.        Embrechts M.J., Benedek S., Hybrid identification of unlabelled nuclear power plant transients with artificial neural networks, Neural network proceedings, The 1998 IEEE International Joint Conference on IEEE World Congress on Computational Intelligence, 2, 1438 - 1443 

8.        Sorsa T., Koivo H.N., Koivisto H., Neural networks in process fault diagnosis, IEEE transactions on systems, man and cybernetics, 21, 815-824, 1991

9.        Santosh T.V., Vinod G., Babar A.K., Kushwaha H.S. Raj V.V., Symptom based diagnostic system for nuclear power plant operations using artificial neural networks, Reliability engineering & system safety, 83,33-40, 2003

10.     Parlos A.G., Fernandez B., Artificial neural networks based system identification and control of nuclear power plant components, Proceedings of IEEE 29th conference on decision and control, 1703-1706

11.     Ma J., Jiang J., Applications of fault detection and diagnosis methods in nuclear power plants: A review, Progress in nuclear energy, 53, 255-266, 2011

12.     ]  Zio E., Maio F D., Stasi M., A data-driven approach for predicting failure scenarios in nuclear systems, Annals of nuclear energy, 37, 482-491, 2010.

13.     Nabeshima, K., Suzudo, T., Ohno, T., Kudo, K., Nuclear reactor monitoring with the combination of neural network and expert system, Mathematcics and Computers in Simulation, 60, 233-244 (2002)

14.     Kasinathan N., Parthasarathy U., Natesan K., Selvaraj, P Chellapandi, S C Chetal and S B Bhoje, Internal Report on “Analysis of Design Basis Events for Prototype Fast Breeder Reactor”, 1st National Conference on Nuclear Reactor Safety, Mumbai, Nov 2002.

15.     Kumar S., Neural Networks, A classroom approach,Tata McGrawHill Education Pvt. Ltd.,61-69, 2004

16.     Fausett, L., Fundamentals of Neural Networks, Architecture, Algorithms and Applications, 3-4, 1994

17.     Reidmiller M., Braun H., A direct adaptive method for faster backpropagation learning: the RPROP algorithm, IEEE International Conference on Neural Networks, 1, 586 – 591, 1993

18.     Patra S., Jehadeesan R., Rajeswari S., Satyamurthy S.A.V., Artificial Neural Network model for Intermediate Heat Exchanger of Nuclear Reactor, International Journal of Computer Applications, 26, 63–69, 2010




Sachindra K. Chavan, Manoj L. Bangare

Paper Title:

Secure Data Storage in Cloud Service using RC5 Algorithm

Abstract:   Enterprises always used organizational internal storage system for storing data. Mainly in a Customer Relational Management i.e. CRM system, the internal storage will be used for storing all the data of the customer. On the other hand, the main drawbacks in the data storage is there may be intruder’s in the administrator side and they may acquire all the information about a customer. Above threats can happen in same service provider in a cloud computing environment. To overcome with this kind of challenges in cloud computing, there is need of an innovative algorithmic approach for data security in cloud computing.A CRM (Customer Relational Management) system services is represented in this paper using RC5 algorithm. In the proposed system the party that uses cloud storage services must encrypt data before sending it to cloud while the service provider who is responsible for encryption/decryption of the user’s data and then must delete data once encryption/decryption process is completed. In this paper the use of CRM services which demonstrates how the parties involved in secure storage and retrieval when data is saved to the cloud.

  Cloud Computing, CRM Service, Data Retrieval and Storage, Encryption/Decryption, RC5 algorithm, Secure Storage.  


1.        Jing-Jang Hwang, Hung-kaiChung, Yi-Chang Hsu, Chien-Hsing Wu, “A Business Model for Cloud Computing Based on a Separate Encryption and Decryption Service” , IEEE 2011.
2.        National Institute of Standards and Technology - Computer Security Resource Center -

3.        Weiss, “Computing in the clouds”, networker, vol. 11, no. 4, pp. 16-25, December 2007.

4.        S. Yeo, S. Venugopal, X. Chu, and R. Buyya, "Autonomic metered pricing for a utility computing service", Future Generation Computer Systems, vol. 26, issue 8, pp. 1368-1380, October 2010.

5.        M. Baker, R. Buyya, and D. Laforenza, “Grids and grid technologies for wide-area distributed computing,” International Journal of Software:Practice and
Experience, vol.32, pp. 1437-1466, 2002.

6.        B. R. Kandukuri, V, R. Paturi and A. Rakshit, “Cloud security issues,”in Proceedings of the 2009 IEEE International Conference on Services Computing, pp. 517-520, September 2009.

7.        R. Sterritt, “Autonomic computing,” Innovations in Systems and Software Engineering, vol. 1, no. 1, Springer, pp. 79-88. 2005.

8.        R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, “Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility,” Future Generation Computer Systems, vol. 25, issue 6, pp. 599-616, June 2008.

9.        L. M. Vaquero,L. Rodero-Merino,J. Caceres, and M. Lindner, “A break in the clouds: towards a cloud definition,” ACM SIGCOMM Computer Communication Review, vol. 39, no. 1, pp. 50-55, January 2009.

10.     R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public key cryptosystems”, Communications of the ACM, vol. 21, no. 2, pp.120-126, 1978.

11.     V. Miller, “Uses of elliptic curves in cryptography,” Advances in Cryptology - CRYPTO '85, Lecture Notes in Computer Science, pp. 417-426, 1986.

12.     Norman D. Jorstad, Landgrave T. Smith, Jr., “CRYPTOGRAPHIC ALGORITHM METRICS”  Institute for Defense Analyses Science and Technology Division, Jan 1997.

13.     Harsh Kumar Verma, Ravindra Kumar Singh, “Performance Analysis of RC5, Blowfish and DES Block Cipher Algorithms” , in International Journal of Computer Applications (0975 – 8887) Volume 42– No.16, March 2012.




Nilam K.Nakod, M.B.Vaidya

Paper Title:

Implementation of Boolean Matrix Approach for Mining Multidimensional Association Rule with Non-Repetitive Predicate

Abstract:    Implementation of An Algorithm of Mining multidimensional association rules with non repetitive predicate from Relational Database is given. The relational database that we considered here is for Computer Store.we mine the multidimensional Association rule from it.Boolean Matrix based approach has been employed to generate frequent item sets. It adopts Boolean relational calculus to discover frequent predicate sets. When using this algorithm First time, it scans the database once and will generate the association rules. Apriori property is used in algorithm to prune the item sets. It is not necessary to scan the database again; it uses Boolean logical operations to generate the association rules.

   Association rule, Multidimensional association rule with non repetitive predicates, Boolean relational calculus, Relational database


1.        R. Agrawal and R. Srikant.” Fast algorithms for mining association rules”. In proceeding of the VLDB Conference,1994.
2.        D. Burdick, M. Calimlim, and J. Gehrke, “Mafia: A maximal frequent itemset algorithm for transactional databases”, In Proc. of ICDE Conf,pp. 443-452, 2001.

3.        Proc. IEEE ICDM Workshop Frequent Itemset Mining Implementations, B. Goethals and M.J. Zaki, eds., CEUR Workshop Proc., vol. 80, Nov. 2003.

4.        K. Gouda and M. J. Zaki, “Efficiently mining maximal frequent itemsets”, In ICDM, pp. 163–170, 2001.

5.        Hunbing Liu and Baishen wang, “An association Rule Mining Algorithm Based On a Boolean Matrix” , Data Science Journal, Volume 6, Supplement 9, S559-563, September 2007.

6.        Jurgen M. Jams Fakultat fur Wirtschafts- irnd, “An Enhanced Apriori Algorithm for Mining Multidimensional Association Rules, 25th Int.Conf. Information Technology interfaces ITI Cavtat, Croatia (1994).

7.        R.Agrawal, H.Mannila, R.Srikant, H.Toivone and A.I.Verkamo. Fast discovery of association rules. In U.M. Fayyed, G.Piatetsky-Sharpiro,P.Smyth, and R.Uthurusamy, editors, Advances in knowledge Discovery and Data Mining, pages 307-328.AAAI/MIT press, 1996.

8.        H. Mannila, H. Toivonen, and A. Verkamo. “Efficient algorithm for discovering association rules”. AAA1 Workshop on Knowledge Discovery in Databases.

9.        Jiawei Han, Micheline Kamber, “Data Mining Concepts and Techniques”. Higher Education Press (VLDB), Sept. 1995.

10.     Nilam Nakod and M.B.Vaidya, “Survey of mining Multidimensional and Conditional Hybrid Dimensional Association Rule”,IJESE,Volume1,Issue 4,February 2013




S.Kamalsakthi, J.Baskaran

Paper Title:

Soft – Switched PFC Boost Converter with Integrated Flyback Converter

Abstract:   This paper presents a magnetic integration approach that reduces the number of magnetic components in a power supply by integrating magnetic components in two conversion stages.  In this proposed approach a single transformer is used to implement the continuous conduction mode boost power factorcorrected(PFC)converter and the DC/DC fly-back converter.  The power factor is improved due to the presence of the boost converter.  The size of the step-down transformer is reduced due to high frequency operation of fly-back converter.  The AC supply is rectified using uncontrolled rectifier and it is boosted with the help of boost converter.  The output of the boost converter is given to the fly-back converter, which converts DC to high frequency AC. The step-down transformer reduces this voltage and is rectified using half wave rectifier.

    DC/DC, AC, (PFC)


1.        R.Streit and Tollik. “High efficiency telecim rectifier using a novel soft-switched boost-based input current
2.        G Hua, c.slue and f.c.lee- “ novel zero-voltage-transmisson PWM Converters.” In proc. I EEE power electronics specialties.’conf. (PESC), june 1992,pp.55-61.

3.        D.C.Martins, Seixas.J.Abrilhante, andI. Barbi “A family of de-to-de PWM converters using a new anewZVS Communication cell.” In proc. IEEE poer Electronics Specialist’conf (PESC), Jan 1993 pp.524-530.

4.        J.p.Gegener and c.Q.Lee “ Zero-voltage transition converter using a simple magnetic feedback and technique in proc.IEEE Applied Power electronics (APEC) conf., 1994.pp.590-596

5.        www. Powerdesigners. Com

6.        www.




Sanghapal D. Kamble, M.A.Gaikwad

Paper Title:

Design and Simulation of Energy-Efficient 8-Bit Input Buffer for NoC Router

Abstract:    In NoC (Network on chip), the power consumption is major issue while designing. In NoC router, conventional input buffer consume more energy. The paper is focused on the energy-efficient design of 8-bit input buffers, which use the characteristic of transmission of data on NoC that has probability of transmitting a zero signal is more than that of transmitting a signal one. The design of energy efficient 8-bit input buffer reduces the power consumption by 48% and the chip area   29% with calculating the gates count as compared with conventional 8-bit input buffer by using 65 nm cmos technology in simulation.

 Network on chip, NoC Router, Input Buffer.


1.        An Innovative Power-Efficient Architecture for Input Buffer of Network on Chip”Kun Huang Jun Wang Ge Zhang,Key Laboratory of Computer System and Architecture, Institute of Computing Technology, Chinese Academy of Sciences, Beijingss
2.        ”Zero-Efficient Buffer Design for Reliable Network-on-Chipin Tiled Chip-Multi-Processor”Jun Wang1, Hongbo Zeng1, Kun Huang1, Ge Zhang1, Yan Tang21Institute of Computing Technology, Chinese Academy of Sciences; 2The OhioState University3wangjun, hbzeng, kunhuang,;

3.        “Energy-Efficient Input Buffer Design using Data-Transition Oriented Model”Jun Wang, Kun Huang, Ge Zhang, Weiwu Hu, Feng Zhang Key Laboratory of Computer System and Architecture,ICT, CAS, Beijing, 100080, China,{wangjun, huangkun.                 

4.        low Power Nanoscale Buffer Management for Network on Chip Routers Suman K. Mandal Texas A&M University College Station, TXskmandal@cse.tamu.eduRon Denton Texas A&M UniversityCollege Station, TX denton@cse.tamu.eduSaraju P. Mohanty University of North Texas Denton, TX Rabi N. Mahapatra Texas A&M University College Station, TX

5.        Michael Bedford Taylor, Walter Lee, Jason Miller, David Wentzlaff, Ian Bratt, Ben Greenwald, Henry Hoffmann, Paul Johnson, Jason Kim, James Psota, Arvind Saraf, Nathan Shnidman, Volker Strumpen, Matt Frank, Saman Amarasinghe, Anant Agarwal. Evaluation of the Raw Microprocessor: An Exposed-Wire-Delay Architecture for
LP and Streams. In Proceedings of 31st ISCA, June 2004.

6.        Changkyu Kim, Doug Burger, Stephen W. Keckler. An Adaptive, Non- Uniform Cache Structure for Wire-Delay Dominated On-Chip Caches. In ASPLOS X, October 2002, San Jose.