Volume-1 Issue-5

 Download Abstract Book

S. No

Volume-1 Issue-5, November 2012, ISSN:  2277-3878 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

Kareemullah Shaik, Mohammad Mohiddin, Md. Zabirullah

Paper Title:

A Reduced Latency Architecture for Obtaining High System Performance

Abstract: Microprocessor performance has improved rapidly these years. In contrast, memory latencies and bandwidths have improved little. The result is that the memory access time has been a bottleneck which limits the system performance. As the speed of fetching data from memories is not able to match up with speed of processors. So there is the need for a fast memory controller. The responsibility of the controller is to match the speeds of the processor on one side and memory on the other so that the communication can take place seamlessly. Here we have built a memory controller which is specifically targeted for SDRAM. Certain features were included in the design which could increase the overall efficiency of the controller, such as, searching the internal memory of the controller for the requested data for the most recently used data, instead of going to the Memory to fetch it. The memory controller is designed which compatible with Advanced High-performance Bus (AHB) which is a new generation of AMBA bus. The AHB is for high-performance, high clock frequency system modules. The AHB acts as the high-performance system backbone bus. AHB supports the efficient connection of processors, on-chip memories and off-chip external memory interfaces with low-power peripherals.

Keywords:
   SDRAM, Memory controller, AMBA, FPGA, Xilinx, Modelsim.


References:

1.        Ching – SDRAM Controller Applications”.IEEE J. Solid-State Circuits, Vol.39, Nov. 2004.Che Chung, Pao-Lung Chen, and Chen-Yi Lee “Delay-Locked Loop for DDR
2.        Micron Technology Inc.Synchronous DRAM Data Sheet,2001.

3.        ARM, AMBA Specification Rev.2.0, 1999.

4.        “Memory Controllers for Real-Time Embedded systems” Benny Akesson Kees Goossens vol. 3, no. 3, pp. 75–77, Mar1999.

5.        Hynix Semiconductor Inc., SDRAM Device operationRev.1.1, Sep. 2003.

6.        Samir Palnitkar, Pearson 2nd edition “Verilog HDL, A Guide to Digital Design and Synthesis.

 

1-5

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.

Authors:

N. Prabhakar Reddy, K.Sasidha

Paper Title:

Design and Development of Can Sniffer

Abstract:  Controller Area Network (CAN) is used extensively in automotive applications, with in excess of 400 million CAN enabled microcontrollers manufactured each year. CAN messages could be calculated and hence guarantees provided that message response times would not exceed their deadlines. This seminal research has been cited in over 200 subsequent papers and transferred to industry in the form of commercial CAN schedulability analysis tools. These tools have been used by a large number of major automotive manufacturers in the design of in-vehicle networks for a wide range of cars, millions of which have been manufactured over the last 8 years. This paper shows that the original schedulability analysis given for CAN messages is flawed. It may provide guarantees for messages that will in fact miss their deadlines in the worst-case. This paper provides revised analysis resolving the problems with the original approach. Further, it highlights that the priority assignment policy, previously claimed to be optimal for CAN, is not in fact optimal and cites a method of obtaining an optimal priority ordering that is applicable to CAN. The paper discusses the possible impact on commercial CAN systems designed and developed using flawed schedulability analysis and makes recommendations for the revision of CAN schedulability analysis tools. The CAN Sniffer Tool is a simple to use low cost CAN bus monitor which can be used to develop and debug a high speed CAN network. The tool supports CAN 2.0b and ISO11898-2 and a broad range of functions which allow it to be used across various market segments including automotive, industrial, medical and marine. The toolkit comes with all the hardware and software required to connect a CAN network to a PC. In CAN bus, the two CAN channels can send/receive CAN messages either with extended or standard ID.  All messages received by the CAN interface are sent via UART to the serial port of PC. On the PC the CAN-messages get collected and ordered by CAN-ID.  In CAN the communication is done in two-wire, the CAN sniffer can receives the messages based on arbitration process.

Keywords:
     CAN, UART, CAN-ID, PC.


References:

1.        N.C. Audsley, “Optimal priority assignment and feasibility of static priority tasks with arbitrary start times”, Technical Report YCS 164, Dept. Computer Science, University of York, UK, December 1991.
2.        R.J. Bril. “Existing worst-case response time analysis of real-time tasks under fixed-priority scheduling with deferred pre-emption is too optimistic”. CS-Report 06-05, Technische Universiteit Eindhoven (TU/e) The Netherlands, February 2006.

3.        L. George, N. Rivierre, and M. Spuri. “Pre-emptive and non- pre- emptive real-time uni-processor scheduling. Technical Report 2966, Institut National de Recherche et Informatique et en Automatique (INRIA), France, September 1996

4.        S. Punnekkat, H. Hansson, C. Norstrom. “Response time analysis under errors for CAN”. In Proceedings 6th Real-Time Technology and Applications Symposium, pp. 258-265, IEEE Computer Society Press May/June 2000.

5.        J. Lehoczky. “Fixed priority scheduling of periodic task sets with arbitrary deadlines”. In Proceedings 11th IEEE Real-Time Systems Symposium, pp. 201–209, IEEE Computer Society Press, December 1990.

6.        K.W. Tindell and A. Burns. “Guaranteeing message latencies on Controller Area Network (CAN)”, In Proceedings of 1st International CAN Conference, pp. 1-11, September 1994.

 

6-9

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

Leman Dewangan, Mangal Singh, Neelam Dewangan

Paper Title:

A Survey of PAPR Reduction Techniques in LTE-OFDM System

Abstract:  Orthogonal Frequency Division Multiplexing (OFDM) is one of the most promising technique for today’s wireless broadband communication systems.3GPP’s LTE was the first to adopt OFDM as its downlink technique. One of the major disadvantageisitshighpeak-to- averagepowerratio(PAPR). In this paper various PAPR Reduction Techniques are discussed along with their advantages, disadvantages and improvements done so far. Techniques like clipping, Companding, Selective Mapping (SLM), Interleaving, Tone Reservation (TR), Tone Injection (TI), Partial Transmit Sequence (PTS), etc.

Keywords:
  OFDM, LTE, PAPR


References:

1.        SeungHee Han, Jae Hong Lee, “An overview of peak-to-average power ratio reduction techniques for multicarrier transmission”, Wireless Communications, IEEE, Vol.12, Issue 2, pp.56–65, April, 2005
2.        RashidaAkter, Mohammad Rakibul Islam and Ju Bin Song , “PAPR in 3rd Generation Partnership Project Long Term Evolution : An Overview to find the Impact” IETE Technical Review , vol 27 ,issue 6  , Nov-Dec 2010

3.        Suma M N, Kanmani.B, “Developments in Orthogonal Frequency Division Mutiplexing (OFDM) system – A Survey”, IEEE, 2011

4.        Hyung G. Myung, Junsung Lim, and David J. Goodman, “Single Carrier FDMA for Uplink Wireless Transmission”; IEEE Vehicular Technology Magazine, September 2006, pp. 30-38

5.        Ramjee Prasad, “OFDM for Wireless Communication System”, Arctech House, 2004

6.        Satoshi Kimura, Takashi Nakamura, Masato Saito and Minoru Okada, “PAR Reduction for OFDM signals based on Deep Clipping” ISCCSP 2008, Malta, 12-14 March
2008

7.        Jean Armstrong, “New Peak to Average Power Reduction Technique,” Proc IEEE VTC 2001 .Spring , Rhodes Greece,2001

8.        Jean Armstrong, “New Peak to Average Power Reduction Technique,”  IEEE Electronic Letters vol .38 No.5 , February 2008

9.        M. M. Rana, Md. Saiful Islam and Abbas Z. Kouzani, “Peak to Average Power Ratio Analysis for LTESystems” EEESecond International Conference on Communication Software and Networks, 2010

10.     Josef Urbaf, Roman Marsalek, “PAPR Reduction by Combination of Interleaving with Repeated Clipping and Filtering in OFDM” IEEE Explore, 2007

11.     Deng Qing, ZhongHongsheng, “An Improved Algorithm to Reduce PAPR BasedClipping-and-Filtering” IEEE Explore, 2008

12.     Tao Jiang, Member, IEEE, and YiyanWu, Fellow, IEEE, “An Overview: Peak-to-Average Power RatioReduction Techniques for OFDM Signals”IEEE Transactions on
Broadcasting, vol. 54, no. 2, June 2008

13.     Dae-Woon Lim, Seok-JoongHeo, and Jong-Seon , “An Overview of Peak-to-Average Power Ratio Reduction Schemes for OFDM Signals”, Journal of Communications and Networks, vol. 11, no. 3, June 2009 229

14.     YasirRahmatallah, NidhalBouaynaya and Seshadri Mohan, “On The Performance Of Linear And Nonlinear Companding Transforms In Ofdm Systems” IEEE 2011

15.     Shiann-ShiunJeng, Member, IEEE, and Jia-Ming Chen, Student Member, IEEE, “Efficient PAPR Reduction in OFDM Systems Based on a Companding TechniqueWith Trapezium Distribution”, IEEE Transactions on Broadcasting, vol. 57, no. 2, June 2011

16.     Zhongpeng Wang, “Combined DCT and Companding for PAPR Reduction in OFDM Signals”, Journal of Signal and Information Processing, 2011, 2, 100-104

17.     Sulaiman A. Aburakhia, Ehab F. Badran, and Darwish A. E. Mohamed, Member, IEEE, “Linear Companding Transform for the Reduction ofPeak-to-Average Power
Ratio of OFDM Signals”IEEE Transactions on Broadcasting, vol. 55, no. 1, March 2009

18.     Yuan Jiang, “New Companding Transform for PAPR Reduction in OFDM”, IEEE Communications Letters, vol. 14, no. 4, April 2010

19.     Jun Hou, JianhuaGe, DeweiZhai, and Jing Li, “Peak-to-Average Power Ratio Reduction of OFDM SignalsWith Nonlinear Companding Scheme”, IEEE Transactions on Broadcasting, vol. 56, no. 2, June 2010

20.     Tao Jiang, Yang Yang, Member, IEEE, and Yong-Hua Song, Senior Member, IEEE, “Exponential Companding Technique for PAPR Reduction in OFDM Systems”, IEEE Transactions on Broadcasting, vol. 51, no. 2, June 2005

21.     Bauml, R., Fischer, R., and Huber, J., “Reducing the peak-to-average power ratioof multicarrier modulation by selected mapping,” IEE Electronics Letters, vol. 32, pp. 2056 -2057, Oct. 1996.

22.     Robert F. H. Fischer, Member, IEEE, and Christian Siegl, Student Member, IEEE, “Reed–Solomon and Simplex Codes for Peak-to-Average Power Ratio Reduction in OFDM”, IEEE Transactions on Information Theory, vol. 55, no. 4, April 2009

23.     Zhongpeng Wang, Shaozhongzhang, binqingqiu, “PAPR Reduction of OFDM Signal by UsingHadamard Transform in Companding Techniques” IEEE Explore, 2010

24.     Kee-Hoon Kim, Hyun-BaeJeon, Jong-Seon No, and Dong-Joon Shin, “A New Low-Complexity Selected Mapping Scheme Using Cyclic Shifted IFFT for PAPR Reduction in OFDM Systems” IEICE International Symposium on Information Theory and its Applications, March 2012

25.     Ehab F. Badran and Amr. M. El-Helw, “A Novel Semi-Blind Selected Mapping TechniqueforPAPRReductioninOFDM” IEEE Signal Processing letters, vol. 18, no. 9, September 2011

26.     N.V. Irukulapati, V.K. Chakka and A. Jain, “SLM based PAPR reduction of OFDM signal using new phase sequence”, Electronics letters 19th November 2009 vol. 45 no. 24

27.     Stephane Y. Le Goff, Samer S. Al-Samahi, Boon KienKhoo, charalampos C. Tsimenidis, and Bayan S. Shari, “Selected mapping without side information for PAPR reduction in OFDM”, IEEE Transactions on Wireless Communications, vol. 8, no. 7, July 2009

28.     Mahmoud FerdosizadehNaeiny and FarokhMarvasti, Senior Member, IEEE, “Selected Mapping Algorithm for PAPR Reductionof Space-Frequency Coded OFDM SystemsWithout Side Information”IEEE Explore, 2008

29.     Yuh-Ren Tsai, Member, IEEE, Chi-Hung Lin and Yen-Chen Chen, Student Member, IEEE, “A Low-Complexity SLM Approach Based on Time-domainSub-block Conversion Matrices for OFDM PAPR Reduction”IEEE Explore, 2011

30.     Hyun-BaeJeon, Jong-Seon No, Senior Member, IEEE, and Dong-Joon Shin, Senior Member, IEEE, “A Low-Complexity SLM Scheme UsingAdditive Mapping Sequences for PAPRReduction of OFDM Signals”, IEEE Transactions on Broadcasting, vol. 57, no. 4, December 2011

31.     ThitaphaChanpokapaiboon, PotcharaPuttawanchai, and PrapunSuksompong, “Enhancing PAPR Performance of MIMO-OFDMSystems Using SLM Technique with CenteringPhase Sequence Matrix”, Communication Systems Wireless Mobile Communications & Technologies

32.     Y. Wu, IEEE member, K. L. Man, IEEE member, Y. Wang, IEEE student member, “Optimum Selective Mapping for PAPRReduction” IEEE Explore, 2011

33.     Jingru Zhou, XiaodongXu, and Xuchu Dai, “A Constellation Extension Based SLM Scheme forPAPR Reduction of OFDM Signals” IEEE Explore, 2011

34.     Sang -Woo Kim, Jin-Kwan Kim and Heung-GyoonRyu, “A Computational Complexity Reduction Scheme UsingWalsh Hadamard Sequence in SLM Method” IEEE Explore, 2006

35.     Athinarayanan Vallavaraj1, Brian G Stewart2, David K Harrison2, Francis G McIntosh1, “Reducing the PAPR of OFDM Using a Simplified Scrambling SLM
Techniquewith No Explicit Side Information”, 14th IEEE International Conference on Parallel and Distributed Systems, 2008S. Mohammady, R. M. Sidek, P. Varahram, M. N. Hamidon, and N. Sulaiman, “A new DSI-SLM method for PA_P R reduction in OFDM systems”, IEEE International Conference on Consumer Electronics (ICCE), 2011

36.     Amr M El-Helw, Ehab F. Badran  andHesham Y. Al-Kafrawy, “A New Sequence for Embedding Side Informationin SLM for PAPR Reduction in OFDM” Japan-Egypt Conference on Electronics, Communications and Computers, 2012

37.     HimanshuBhusanMishra,Madhusmita Mishra, Sarat Kumar Patra, “Selected Mapping Based PAPR Reduction inWiMAX Without Sending the Side Information” 1st Int’l Conf. on Recent Advances in Information Technology ,RAIT-2012

38.     Jamal Mountassir, AlexandruIsar, “Precoding Techniques in OFDM systemsFor PAPR Reduction”IEEE Explore, 2012

39.     Robert J. Baxley, “Analyzing Selected Mapping for Peak-to-Average PowerReduction in OFDM”, School of Electrical and Computer Engineering Georgia Institute of
Technology,May 2005

40.     KitaekBae, Student Member, IEEE, Jeffrey G. Andrews, Senior Member, IEEE,and Edward J. Powers, Life Fellow, IEEE, “Adaptive Active Constellation Extension Algorithm forPeak-to-Average Ratio Reduction in OFDM”, IEEE Communications letters, vol. 14, no. 1, January 2010

41.     B. S. Krongold and D. L. Jones, “PAR reduction in OFDM via active constellation extension,” IEEE Trans. Broadcast., vol. 49, no. 3, pp. 258–268, Sep. 2003.

42.     Kamal Singh, ManoranjanRaiBharti, SudhanshuJamwal, “A modified PAPR reduction scheme based on SLM and PTS Techniques” IEEE Explore 2012.

43.     Di-xiao Wu, “Selected Mapping and Partial Transmit Sequence Schemes to Reduce PAPRin OFDM Systems” IEEE Explore 2011.

44.     Alok Joshi, Davinder S. Saini, “PAPR Analysis of Coded- OFDM System andMitigating its Effect with Clipping, SLM and PTS” Proceedings of the 5th International Conference onIT & Multimedia at UNITEN (ICIMU 2011) Malaysia

45.     Stefan H. Muller and Johannes B. Huber, “A Comparison of Peak Power Reduction Schemes For Ofdm” IEEE Explore 1997.

46.     Josef URBAN, Roman MARSALEK, “OFDM PAPR Reduction by Partial Transmit Sequences and Simplified Clipping with Bounded Distortion”IEEE Explore 2008

47.     ByungMooLee ,RuiJ.P.deFigueiredo, YoungokKim, “A computationally Efficient Tree-PTS Technique for PAPR Reduction of OFDM Signals” Wireless PersCommun (2012) 62:431–442

48.     Robert J. Baxley and G. Tong Zhou, “Comparing Selected Mapping and Partial Transmit Sequence for PAR Reduction”, IEEE Transactions on Broadcasting, vol. 53,no. 4, December 2007 797

49.     G. Lu, P. Wu and C. Carlemalm-Logothetis, “Peak-to-average power ratio reduction in OFDM based on transformation of partial transmit sequences” Electronics Letters 19th January 2006 Vol. 42 No. 2

50.     Bader HamadAlhasson, and Mohammad A. Matin, Senior Member, IEEE, “PAPR Distribution Analysis of OFDM signals with Partial Transmit Sequence”, Proceedings of 14th International Conference on Computer and Information Technology (ICCIT 2011) 22-24 December, 2011, Dhaka, Bangladesh

51.     LingyinWang and Ju Liu, Senior Member, IEEE, “PAPR Reduction of OFDM Signals by PTS With Grouping and Recursive Phase Weighting Methods”, IEEE Transactions on Broadcasting, vol. 57, no. 2, June 2011

52.     UmerIjaz Butt, “A Study On The Tone-Reservation Technique For Peak-To-Average Power Ratio Reduction In Ofdm Systems”, Univeraal Publication, 2008

53.     Yong Soo Cho, JaekwonKim , Won Young Yang , Chung Gu Kang, “MIMO-OFDM WIrelessCOmmunication s with MAtlab”Jhon Wiley and Sons, 2010

54.     SaeedGazor and RuhallahAliHemmati, “Tone Reservation for OFDM Systems byMaximizing Signal-to-Distortion Ratio” IEEE Transactions on Wireless Communications, vol. 11, no. 2, February 2012

 

10-13

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

4.

Authors:

S. Ramya, T. Manokaran

Paper Title:

Analysis and Design of Multi Input Dc–Dc Converter for Integrated Wind PV Cell Renewable Energy Generated System

Abstract: The objective of this paper is to propose a multi-input power converter for the hybrid system in order to simplify the power system and reduce the cost. The proposed converter interfaces two unidirectional input ports and a bidirectional port for storage element in a unified structure. It   also utilizes four power switches that are controlled independently with four different duty ratios. The renewable power system hybridizes PV and Wind as main source & Battery Power for backup energy source. Three different power operation modes are defined for the converter based on utilization state of the battery as follows: 1) An operation type wherein power is delivered to load from hybrid renewable energy sources; 2)A single type wherein only one renewable energy source supplies power to the load with battery discharging; 3) An operation  type wherein power is delivered to load  from renewable sources along with battery charging. A simple and cost effective control with DC-DC converter is used for maximum power point tracking (MPPT) and hence maximum power is extracted from the source .The integration of the hybrid renewable power system is implemented and simulated using MATLAB/SIMULINK.

Keywords:
Photovoltaic (PV)/Wind/Battery sources, hybrid power system, State Of Charge(SOC), Multi input  power  converter, Maximum Power Point Tracking (MPPT).


References:

1.        J. L. Duarte, M. Hendrix, and M. G. Simoes, “Three-port bidirectional converter for hybrid fuel cell systems,” IEEE Trans. Power Electron., vol. 22, No. 2, Mar. 2007.
2.        Y-C. Kuo, T-J. Liang, and J-F. Chen: Novel Maximum-Power-Point- Tracking Controller for Photovoltaic Energy Conversion System, IEEE Transactions On Industrial Electronics, Vol. 48, No. 3, June 2001

3.        F. Valencaga, P. F. Puleston, and P. E. Battaiotto, “Power control of a solar/wind generation system without wind measurement: A passivity/ sliding mode approach,” IEEE Trans. Energy Convers., vol. 18, No. 4,  Dec. 2003.

4.        X. Huang, X. Wang, T. Nergaard, J. S. Lai, X. Xu, and L. Zhu, “Parasitic ringing and design issues of digitally controlled high power interleaved boost converters,” IEEE Trans. Power Electron., vol. 19, No. 5, pp. 1341–1352, Sep. 2004.

5.        K. Rajashekara, “Hybrid fuel-cell strategies for clean power generation,” IEEE Trans. Ind. Appl., vol. 41, No. 3,June 2005.

6.        F. Valenciaga and P. F. Puleston, “Supervisor control for a stand-alone hybrid generation system using wind and photovoltaic energy,” IEEE Trans. Energy Conversion, vol. 20, June 2005.

7.        J. M. Carrasco, L. G. Franquelo, J. T. Bialasiewicz, E. Galvan, R. C. PortilloGuisado, M. A. M. Prats, J. I. Leon, and N.Moreno-Alfonso, “Power-electronic systems for the grid integration of renewable energy sources: A survey,”  IEEE Trans. Ind. Electron., vol. 53, No. 4, June . 2006.

8.        K. N. Reddy and V. Agrawal, “Utility-interactive hybrid distributed generation scheme with compensation feature,” IEEE Trans. Energy Convers., vol. 22, No. 3, Sep. 2007.

9.        H. Tao, J. L. Duarte, andM. A.M. Hendrix, “Three-port triple-half-bridge bidirectional converter with zero-voltage switching,” IEEE Trans. Power Electron., vol. 23, No. 2, Mar. 2008.

10.     O. C. Onara,M. Uzunoglu, andM. S. Alam, “Modeling, control and simulation of an autonomous wind turbine/photovoltaic/fuel cell/ultra capacitor hybrid power system,” J. Power Sources., vol. 185, No. 2, Apr.2008.

11.     Khaligh, J. Cao, and Y. J. Lee, “A multiple-input DC–DC converter topology,” IEEE Trans. Power Electron., vol. 24, no. 3, Mar. 2009.

12.     S. H. Hosseini, S. Danyali, F. Nejabatkhah, and S. A. K. Mozafari Niapour, “Multi-input DC boost converter for grid connected hybrid PV/FC/battery power system,” in Proc. IEEE Elect. Power Energy Conf., 2010

13.     R. J. Wai, Ch. Y. Lin, J. J. Liaw, and Y. R. Chang, “Newly designed ZVS multi-input converter,” IEEE Trans. Ind. Electron., vol. 58, No. 2, Feb. 2011

14.     Farzam Nejabatkhah, Saeed Danyali, Seyed Hossein Hosseini,Mehran Sabahi, and Seyedabdolkhalegh Mozaffari Niapour, “Modeling and Control of a New Three-Input DC–DC Boost Converter for Hybrid PV/FC/Battery Power System” IEEE Trans . Power Electron., vol .27, NO. 5, May    2012.

 

14-19

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

5.

Authors:

Senthil Ragavan Valayapalayam Kittusamy, Venkatesh Chakrapani

Paper Title:

Extraction of Expressions from Face Images using Neuro Fuzzy Approach

Abstract:  Body language is a form of communication between human beings. Facial expressions are a form of nonverbal communication. Facial expressions can often communicate a person’s mood than a word. Here, the authors extract the facial features from facial points. Extracted feature points are tracked using a cross-correlation based optical flow to extract feature vectors. These vectors are used to categorize expressions, using RBF neural networks and Fuzzy Inference System. Recognition results from two classifiers are compared with each other.

Keywords:
 Facial Expression, FIS, Neuro Fuzzy, RBF


References:

1.        P. Ekman and W.V. Friesen, Facial Action Coding System (FACS) (Consulting Psychologists Press, Inc., 1978).
2.        M. Yoneyama, Y. Iwano, A. Ohtake, and K. Shirai, “Facial Expression Recognition using Discrete Hopfield  Neural Networks” (Proc. Int’l Conf. Information Processing, Vol. 3, 1997), pp. 117-120.

3.        M. J. Black and Y. Yacoob, “Recognizing Facial Expression in Image Sequences using Local Parameterized Models of Image Motion” (Int’l J. Computer Vision, Vol. 25, No.1, 1997), pp.23-48. 

4.        H. Kobayashi and F. Hara, “Facial Interaction between Animated 3D Face Robot and Human Being” (Proc. Int’l Conf.  Systems, Man, Cybernetics, 1997), pp. 3732-3737. 

5.        J. F. Cohn, A.J. Zlochower, J.J. Lien, and T. Kanade, “Feature-Point Tracking by Optical Flow Discriminates subtle Difference in Facial Expression” (Proc. Int’l Conf. Automatic Face and Gesture Recognition).

6.        Senthil Ragavan V K and Venkatesh C, “Facial Expressions Recognition using Eigenspaces”, (Journal of Computer Science, Vol 8, No. 10, 2012), pp.1674-1679.

7.        Senthil Ragavan V K and Venkatesh C, “Emotion Classification from the Analysis of Facial Expressions based on Gabor Wavelets Using Radial Basis Function Neural Network”, (European Journal of Scientific Research, Vol. 84, No. 4, 2012), pp.609-615

8.        T. Kanade, J. Cohn and  Y. Tian. Comprehensive database for facial expression analysis, 2000. 

9.        J. Moody and C. Darken, “Learning with Localized receptive fields” (Proc. 1988 Connectionist Models Summer School. San Matco. CA: Morgan-Kaufmann 1988).

10.     H. Seyedarabi, A. Aghagolzadeh and S. Khanmohammadi, “Facial Expression Recognition from Static Images using RBF Neural Networks and Fuzzy Logic” (2 nd
Iranian conf. on Machine Vision and Image Processing (MVIP 2003) ,Tehran, 2003).

20-23

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

6.

Authors:

Devendra Thakore, Torana Kamble

Paper Title:

Application of Genetic Algorithm in Software Security

Abstract:   Assigning access specifier is not an easy task as it decides over all security of any software .Though there are many metrics tools available in a market to measure the security at early stage. But in this case assignment of access specifier is totally based on the human judgment and understanding .Objective of proposed tool is  to generate all possible solutions by applying Genetic Algorithm (GA). Our Secure Coupling Measurement Tool (SCMT) uses coupling, feature of OO design to determine the security at design level. It Takes input as a UML class diagram with basic constraints and generates alternate solutions i.e. combinations. Tool also provides metrics at code level to compute the security at code level. Result of both the metrics give proof of secure design with the help of spider chart as well as scope to change the design

Keywords:
   Coupling, Genetic Algorithm, Quality, Security, Software Metrics.


References:

1.        j. Bansiya and C. G. Davis, “A hierarchical model for object-oriented design quality assessment,” IEEE Transactions on Software Engineering, vol. 28, pp. 4–17, 2002 ..
2.        P K. Manadhata, K. M. C. Tan, R. A. Maxion, and J. M. Wing, “An approach to measuring a system’s attack surface,” Tech. Rep. CMU-CS- 07-146, Carnegie Mellon
3.        B. Alshammari, C. J. Fidge, and D. Corney, “Security metrics for object-oriented class designs,” in Proceedings of the Ninth International Conference on Quality Software (QSIC 2009), (Jeju, Korea), pp. 11–20, IEEE, 2009
4.        Chowdhury, B. Chan, and M. Zulkernine, “Security metrics for sourcecode structures,” in Proceedings of the Fourth International Workshop onSoftware Engineering for Secure Systems, (Leipzig, Germany),  ACM, 2008..

5.        Smriti Jain, “A Review of Security Metrics in Software Development Process” et al / (IJCSIT) International Journal of Computer Science and Information Technologies, 2011.

6.        IstehadChowdhury, Mohammad Zulkernine “Can Complexity, Coupling, and Cohesion Metrics be Used as Early Indicators of Vulnerabilities?” ACM 2010.

7.        S. Chidamber and C. Kemerer, “A metrics suite for object oriented design,” IEEE Transactions on Software Engineering, vol. 20, pp. 476–493, 1994.,

8.        M. Fowler, Refactoring: Improving The Design of Existing Code. Reading, MA: Addison-Wesley, 1999     

9.        Payal Khurana&Puneet Jai Kaur DYNAMIC METRICS AT DESIGN LEVEL ,International Journal of Information Technology and Knowledge Management July-December 2009, Volume 2, No. 2, pp. 449-454

10.     AmjanShaik,C. R. K. Reddy, BalaManda, Prakashini. C, Deepthi. K, “An Empirical Validation of Object Oriented Design Metrics in Object Oriented Systems” Journal of Emerging Trends in Engineering and Applied Sciences (JETEAS) ,(ISSN: 2141-7016).

11.     John Lloyd1 and Jan Jürjens2,‘Security Analysis of a Biometric Authentication System ‘Using UMLsec and JML*, A. Schürr and B. Selic (Eds.): MODELS 2009, LNCS 5795, pp. 77–91, 2009.,© Springer-Verlag Berlin Heidelberg 2009

12.     M. Y. Liu and I. Traore, “Empirical relation between coupling and attackability in software systems: a case study on DOS,” in Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security Ottawa. Ontario, Canada: ACM, 2006, pp. 57–64

13.     Rüdiger Lincke, Jonas Lundberg and Welf Löwe,“Comparing Software Metric Tools”, 2008 ACM 978-1-59593-904-3/08/07.

14.     Lionel C. Briand Jie Feng Yvan Labiche,” Using Genetic Algorithms and Coupling Measures to Devise Optimal Integration Test Orders” SEKE ’02, July 15-19, 2002, Ischia, Italy. ACM 1-58113-556-4/02/0700.

24-28

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

7.

Authors:

Snehal S. Shinde, P. R. Devale

Paper Title:

Automated Entity Alias Evocation from Web

Abstract:    Identifying the correct reference to an entity among a list of references is required in lots of works such as information retrieval, sentiment analysis, person name disambiguation as well as in biomedical fields. More previous work had been done on solving lexical ambiguity here we proposed a method that is based on referential ambiguity. In this paper we proposed a method which is based on referential ambiguity to extract correct alias for a given name. Given a person name and/or with context data such as location, organization retrieves top K snippets and depth up to level two from a web search engine. With the help of Lexical pattern extract candidate aliases. As to find correct alias from a list of aliases we used n-depth crowling method. This method is useful to improve the precision and minimize the recall than the previous baseline method.

Keywords:
    Web mining, web text analysis, text mining, n-depth crawling.


References:

1.              Danushka Bollegala, YutakaMatsuo and IitsuruIshizuka, Member , IEEE, Automatic Discovery of Personal Name Aliases from the Web, IEEE Transaction on knowledge and data engineering, vol. 23, no. 6, June 2011.
2.              Dmitri V. Kalashnikov Zhaoqu Chen Rabia Nuray – Turan Sharad Mehrotra Zheng Zhang, Web People Search via connection Analysis, IEEE International Conference on Data Engineering, 2009.

3.              Bagga and B. Baldwin, Entity-Based Cross-Document Coreferencing using the vector space model, Proc. Int’s Conf. Computational linguistics (COLING ’98), pp. 79-85, 1998.

4.              T. Hokama and H. Kitagawa, Extracting Mnemonic Names of People from the Web, Proc. Ninth Int’l Conf. Asian Digital Libraries (ICADL ‘ 06), pp. 121-130, 2006.

5.              C. Galvez and Fg. Moya-Anegon, Approximate Personal Name Matching through Finite State Graphs, J. Am. Soc. Fro Information Science and Technology, vol. 58, pp. 1-17, 2007.

6.              Christian Borgelt, Graph Mining: An Overview, Proc, 19th GMA/GI Workshop Computational Intelligence, Germany, 2009.

 

29-30

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

8.

Authors:

G. Pydiraju, M. Daivaasirvadam

Paper Title:

Sensorless Speed Control of Induction Motor Using MRAS

Abstract: In order to implement the vector control technique, the motor speed information is required. Tachogenerators, resolvers or incremental encoders are used to detect the speed. These sensors require careful mounting and alignment and special attention is required with electrical noises. Speed sensor needs additional space for mounting and maintenance and hence increases the cost and the size of the drive system .These problems are eliminated by speed sensorless vector control by using model reference adaptive system. Model reference adaptive system is a speed estimation method having two models namely reference and adaptive model .The error between two models estimates induction motor speed. This project proposes a Model Reference Adaptive System (MRAS) for estimation of speed of induction motor. An Induction motor is developed in stationary reference frame and Space Vector Pulse Width Modulation (SVPWM) is used for inverter design. PI controllers are designed controlling purpose. It has good tracking and attains steady state response very quickly which is shown in simulation results by using MATLAB/SIMULINK.

Keywords:
Sensorless vector control, Model Reference Adaptive System (MRAS), Induction motor, stationary reference frame, Speed estimation


References:

1.        Abbondanti, A. and Brennen, M.B. (1975). “Variable speed induction motor drives use electronic slip calculator based on motor voltages and currents”. IEEE Transactions on Industrial Applications, vol. IA-11, no. 5: pp. 483-488.
2.        Nabae, A. (1982). “Inverter fed induction motor drive system with and instantaneous slip estimation circuit”. Int. Power Electronics Conf., pp. 322-327.

3.        Jotten, R. and Maeder, G. (1983). “Control methods for good dynamic performance induction motor drives based on current and voltages as measured quantities”. IEEE Transactions on Industrial Applications, vol. IA-19, no. 3: pp. 356-363.

4.        Amstrong, G. J., Atkinson, D. J. and Acarnley, P. P. (1997). “A comparison of estimation techniques for sensorless vector controller induction motor drives”. Proc. Of IEEE-PEDS.

5.        Wang yaonan,lu jintao,haung shoudao(2007).”speed sensorless vector control of induction motor based on MRAS theory”.

6.        Dao hung anh; pham dinhtruc(2005) .”Model reference adaptive system based sensorless control of induction motor”.

7.        “Modern power electronics and ac drives” by BIMAL K.BOSE

8.        “Electric motor drives modeling, analysis and control” by  R.KRISHNAN.

 

31-35

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

9.

Authors:

Satish R. Billewar, D. Henry Babu

Paper Title:

Approach to Improve Quality of E-Commerce

Abstract:  E-Commerce is the purpose of Internet and the web to conduct business. E-Commerce is the future of the businesses of 21st Century. But E-Commerce companies are facing big problems at the time of providing products to customers online. The problem is not about the quality of the products, but the information is not reaching to the customers easily and whatever information is available on the web sites of the companies that are not satisfying the traditional product purchase habit of the customer. Now the need arise to redefine the quality in the applications of the web sites as well as the implementation issues that become hurdle in E-Commerce business activities. The global and Indian E-Commerce sales statistics shows the internet penetration worldwide and E-Commerce Users World Statistics to address the reasons why the people have not accepted E-Commerce in India. The study addresses to various quality issues of the web sites which are neglected to fulfill the requirements of thee customers, and propose Total Quality Management (TQM) implementation as the best solution to sort out the issues.

Keywords:
 Commerce; E-Commerce Applications; Total Quality Management (TQM); Quality issues


References:

1.        Besterfield, Carol Besterfield-Michna, “Total Quality Management, Third Edition”, Professor Emeritus, Southern Illinois University, Pearson Education
2.        Gary P. Schneder , “Electronic Commerce – Fourth Annual Edition”, Thomson Course Technology

3.        IMRGWorld“, B2C Global e-Commerce Overview ,April 2011

4.        US Census Bureau Satistics, US Department of Commerce, Economic and Statistics Administration, May 2012

5.        Econsultancy Newyork “B2B Internet Statistics Compendium” Aug 2011

6.        J.J.Oschman, E.C.Stroh, “A Conceptual Analysis of Total Quality Management(TQM)”, Department of Public Administration and Management, University of South Africa.

7.        Dr. Japhet E. Lawrence, Dr. Usman A. Tar, “Barriers to E-Commerce in Developing Countries” January,2010

8.        Md. Mahbubur Rahim,  “A Qualitative Evaluation of an Instrument for Measuring the Influence of Factors Affecting Use of Business-to-Employee (B2E) Portals” Feb, 2008

9.        Mukesh Purohit and Vishnu Kant Purohit, “E-Commerce on Economic Development” Foundation for Public Economics and Policy Research.

10.     QIN Denzi, ZOU Lifang, “Discussion of Information Asymmetry in B2C E-Commerce”, School of Business and Tourism Management, Yunnan University

11.     IAMAI Report,  “India e-commerce market to cross Rs 46,000 crore in 2011: Study”, March 2011

12.     Zoltan Veres and Erzsebet Hetesi, “Bottlenecks in B2B Quality Management and Their Impact on Marketing Research”, Regional Development in Hungary, JATEPress, Szeged: 130-142

13.     Osama Mohammed Ahmad Rababah and Fawaz Ahmad Masoud, “ Key Factors for Developing a Successful E-commerce Website”,The University of Jordan, Amman, Jordan, 2010

14.     Ankita Pahuja, “E-Commerce in India and the potential competition issues”, TERI University

15.     IMRB Report, “Consumer E-Commerce in India “, May 2007

16.     Sami I. Makelinen, “From B2C to C2C E-Commerce”, Department of Computer Science, University of Helsinki, May 2006

17.     Aashit Shah and Parveen Nagree, “Legal Issues of E-Commerce”, Nishith Desai Associates.

18.     Rhetta L. Standifer, James A. Wall, Jr.,  “Managing conflict in B2B e-commerce” , MU Distinguished Professor of Management, University, March-April 2003

19.     YANG Hongbin, CAO Jingjing, “B2E Portal Integration Conceptual Architecture Framework”, Economics and Management School, North University of China.

20.     Ariadi Nugroho, Michael R.V.Chaudron, “ Managing the Quality of UML Models in Prctice”, Leiden University, The Netherlands

21.     Sarah Spiekermann, Jens Grosslags, Bettina Berendt(), “E-privacy in 2nd Generation E-Commerce: Privacy Preferences versus actual Behavior”, The School of Business and Economics, Hamboldt Univerity, Germany

22.     Osama Mohammed Ahmad Rababah and Fawaz Ahmad Masoud(), “Key Factors for Developing a Successful E-commerce Website”, Journal of International Business Information Management Association (IBIMA), Vol. 2010 (2010), Article ID 763461, pp 1-9

23.     Iren Gyoker and Henrietta Finna(2010), “Social Domain”, International Cross-Industry Journal, Vol. 5 (2), pp 55-58

24.     J.J.Oschman(2004), “A Framework for The Implementation of Total Quality Management in The South African Air Force”, A Thesis submitted to University of South Africa.

25.     Hendrik Voiht, Baris Guldali and Gregor Engels(2008)“Quality Plans for Measuring Testability of Models”, 11th International Conference on Quality Engineering in Software Technology, Vol. 15, pp 353-370.

 

36-39

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

10.

Authors:

G.Satheesh, T. Bramhananda Reddy, Ch. Sai Babu

Paper Title:

SVPWM based DTC of Three Level Voltage fed Open End Winding Induction Motor

Abstract:  A Space Vector Pulse Width Modulation (SVPWM) based Direct Torque Control (DTC) of Dual Inverter Fed Open End Winding Induction Motor is analyzed in this paper. A SVPWM based, 3 level phase voltages are generated with two individual two level inverters. In this method, first inverter pulses are generated normally and second inverter pulses are generated with 180 degrees phase shift. But at a particular state of switching first inverter is switched in all states and second inverter is clamped to that active state. In the next state of switching the second inverter is switched in all states and first inverter is clamped to corresponding active state. One inverter output is superimposed on the other inverter, resulting a 3-level line voltage waveform for the induction motor. The imaginary switching time concept is used in the proposed method. It does not require any procedures for calculation of regions in space voltage vector and angle calculations sector identification. The imaginary switching time greatly reduces the complexity of the algorithm. Simulation studies have been carried out for the proposed scheme and results are presented.

Keywords:
   DTC, Dual Inverter, NSHC Algorithm, OEWIM, SVPWM.


References:

1.        EG Shivakumar, K Gopakumar, SK Sinha, VT Rangnathan, “Space Vector PWM Control of Dual Inverter Fed Open-End Winding Induction Motor Drive,” IEEE-APEC, Vol.1, 2001, pp 399-405.
2.        I Takahashi and T Noguchi, “A New Quick- Response and High-Efficiency Control of an Induction Motor,” IEEE Trans. Industry Applications, Vol. IA-22, No.5, 1986, pp 820-827.

3.        I Takahashi and Youchi Ohmori, “High- Performance Direct Torque Control of an Induction Motor,” IEEE Trans. Industry Applications, Vol. IA-25, No.2, 1989, pp 257-264.

4.        Janssen, M.  Steimel, A.  “Direct Self Control With Minimum Torque Ripple and High Dynamics for Double three-level GTO Inverter Drive,” IEEE Trans. On Industrial Electronics, Vol.49, No.5, 2002, pp 1065-1071.

5.        Brain A Welchko and James M Nagashima, “A Comparative Evaluation of Motor Drive Topologies for Low-Voltage, High-Power EV/HEV Propulsion Systems,” IEEE International Symposium on Industrial Electronics, ISIE’03, Brazil, 2003, pp 1-6.

6.        Arbind Kumar, BG Fernandes, K Chatterjee, “DTC of Open-End Winding Induction Motor Drive Using Space Vector Modulation With Reduced Switching Frequency,” IEEE-PESC, 2004, pp 1214-1219.

7.        Arbind Kumar, BG Fernandes, K Chatterjee,“SVPWM-DTC OF Open-End Winding Induction Motor Drive With Complete Elimination of Common Mode Voltage”, Second India International Conference on Power Electronics, IICPE04, 2004,

8.        G.Satheesh, T. Bramhananda Reddy  and  Ch. Sai Babu, “Novel SVPWM Algorithm for Open end Winding Induction Motor Drive Using the Concept of Imaginary  switching Times” IJAST, Vol. 2, No.4, 2011, pp 44- 92.

9.        G.Satheesh, T. Bramhananda Reddy  and  Ch. Sai Babu.” Three Level Voltage Generation for Dual Inverter Fed Open End Winding Induction Motor drive. ” IJEST, Vol. 3 No. 5 May 2011, pp 3982-3991.

10.     Nabae, A., Takahashi, I., and Akagi, H.: ‘A neutral-point clamped PWM inverter’, IEEE- Trans. Ind. Appl., 1981, 17, (5), pp. 518–523

11.     D. W. Chung, J. S. Kim and S. K. Sul, “Unified Voltage Modulation Technique for Real-Time Three-Phase Power Conversion”, IEEE-Trans. on Ind.Appl, Vol.34, No.2, pp.374-380 (1998).

12.     S.Srinivas and V.T.Somasekhar, “Space Vector Based PWM switching strategies for a 3 level dual inverter fed open end winding induction m otor drive and their comparative evaluation” IET-Electr. Power Appl., VOl2, No.1, January 2008, PP19-31.

13.     V.T. Somasekhar, MR.Baiju, KK Mohapatra and K gopakumar, “A multi level Inverter System for an Induction Motor with Open End Windings” Proc. IEEE-2002, PP 973-978

14.     J.S.Kim, S.Kltage Modulation technique of the space vector PWM”, IPEC Yokohama-95, pp742-747.

 

40-46

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

11.

Authors:

Hadi Alipour, Mohammad Reza Noorbakhsh, Zahra Mansourian

Paper Title:

A Study on Modeling of MIMO Channel by Using Different Neural Network Structures

Abstract: Recognition of Radio Channel (channel Parameters) is one of Main Challenges in Signal Transformation, and has important role in cognitive radio approach. Goal of this paper is “Channel modeling” to estimate coefficients of transmission functions affected on data being transformed in the channel. We use Multilayer perceptron(MLP) Neural Network with Back-propagation learning algorithm, block-structured Neural Network with Least Squares(LS) method(cost function) and a multilayer neural network with multiple back-propagation(MBP) learning algorithm for error estimation. These networks will be trained with received signals to be compatible with channel, then give us an estimation of these coefficients. Simulation will show that this MBP method is better than the other two method in error estimation. It has good performance and also consume less execution time. Then, we will use this network for estimating coefficients of non-linear transmission functions of actual radio channel.

Keywords:
Cognitive Radio, Channel Recognition, Channel Modeling, Least Squares, Multiple Back-propagation (MBP), Neural Network, Transmission function.

References:
1.        E. Hossain, D. Niyato, and Z. HAN, Dynamic Spectrum Access and Management in Cognitive Radio Networks, Cambridge University Press, 2009,USA.
2.        M. Ibnkahla, Adaptive Signal Processing in Wireless Communications, CRC Press, Talor & Francis Group, LLC, 2009, USA.

3.        M. Biguesh, and Alex. B. Gershman, “Training-Based MIMO Channel Estimation: A Study of Estimator Tradeoffs and Optimal Training Signals”, IEEE Transactions on Signal Processing, Vol.54, No.3, pp 1-5, March 2006.

4.        H. Minn, and N. G. Al-Dhahir, “Optimal Training Signals for MIMO OFDM Channel Estimation”, IEEE, pp 2-3, 2004.

5.        Omri, and R. Bouallegue, R. Hamila, and M. Hasna, “Channel Estimation for LTE Uplink System by Perceptron Neural Network”, International Journal of Wireless & Mobile Networks(IJWMN), Vol 2., No 3., pp 2-7, August 2010.

6.        S. Theodorodis, and K. Koutroumbas, Pattern Recognition, Second Edition, Elsevier Academic Press, 2003, USA.

 

47-50

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

12.

Authors:

Bhawana Agarwal

Paper Title:

Some Rules to Transform Activity Diagrams into Colored Petri Nets

Abstract:  This paper presents a set of rules that allows software engineers to transform the behavior described by a UML 2.0 Activity Diagram (AD) into a Colored Petri Net (CPN). ADs in UML 2.0 are much richer than in UML 1.x, namely by allowing several traces to be combined in a unique diagram, using high-level operators over interactions. The main purpose of the transformation to Petri nets is to use the theoretical results in the Petri nets domain to analyze the equivalent Petri nets and infer properties of the original workflow. Thus, non-technical stakeholders are able to discuss and validate the captured requirements. The usage of this model is an important topic , since it permits the user to discuss the system behavior using the problem domain language. A small control application from industry is used to show the applicability of the suggested rules.

Keywords:
 Activity Diagram, Petri Nets, Colored Petri Nets, Verification and Validation.


References:

1.        , K.: Coloured Petri Nets. Basic Concepts, Analysis Methods and Practical Use. Brauer, W. and Gozenberg, G. and Salomaa edn. Volume Volume 1, Basic Concepts of Monographs in Theoretical Computer Science. Springer-Verlag (1997) ISBN: 3-540-60943-1.
2.        Fowler, M.: UML Distilled: A Brief Guide to the Standard Object Modelling Language. Addisson-Wesley (2003)

3.        Billington et al., The Petri Net Markup Language: Concepts,Technology, and Tools [Online]. Available:

4.        http://www.informatik.huberlin.de/top/pnml/download/about/P NML_CTT.pdf

5.        Harald Storrle, Semantics of UML 2.0 Activities Workflow management coalition [Online].

6.        http://www.wfmc.org/standards/docs/TC-1011_term_glossary_v3.pdf

7.        Machado, R.J., Lassen, K.B., Oliveira, S., Couto, M., Pinto, P.:  Execution of UML Models with CPN Tools for Workflow Requirements Validation. In: Sixth Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools.(2005).

8.        Zhou CH,The modeling of UML diagrams based on the Petri Net[M], Shandong University of Science and Technology. 2004: 19-31.

9.        Adamski, M.: Direct Implementation of Petri Net Specification. In:7th International Conference on Control Systems and Computer Science. (1987) 74–85.

10.     Carl Adam Petri and Wolfgang Reisig (2008) Petri net. Scholarpedia, 3(4):6477.

11.     P. Küngas. Petri Net Reachability Checking Is Polynomial with Optimal Abstraction Hierarchies. In: Proceedings of the 6th International Symposium on Abstraction, Reformulation and Approximation, SARA 2005, Airth Castle, Scotland, UK, July 26–29, 2005.

12.     G. Rozenburg, J. Engelfriet, Elementary Net Systems, in: W. Reisig, G. Rozenberg (Eds.), Lectures on Petri Nets I: Basic Models – Advances in Petri Nets, volume 1491 of Lecture Notes in Computer Science, Springer,1998, pp. 12-121

13.     J.L. Peterson. Petri net theory and the modeling of systems. Prentice Hall, Englewood Clis, 1981.

14.     R.E. Barlow and F. Proschan. Statistical Theory of Reliability and Life Testing. Holt, Rinehart and Winston, New York, 1975

 

51-56

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

13.

Authors:

N.K. Nakum, A.M.Kothari

Paper Title:

A Review paper on Implementation &Comparative Analysis of Motion Estimation Algorithm in Video Compression

Abstract:   This paper is a review of the block matching algorithms. The motion estimation algorithm is one of the most important issues in the video coding standards. To achieve a high compression ratio in coding video data, a method known as Motion Estimation (ME) is often applied to reduce the temporal redundancy between successive frames of a video sequence. This paper shows implementations and comparison of  different types of block matching algorithms that range from the very basic Exhaustive Search to the recent fast adaptive algorithms.

Keywords:
   Block matching, motion estimation, video compression, H.261. .


References:

1.        Aroh Barjatya, Student Member, IEEE “Block Matching Algorithms For Motion Estimation”,DIP 6620 Spring 2004 Final Project Paper 2.
2.        T. Koga, K. Iinuma, A. Hirano, Y. Iijima, and T. Ishiguro, “Motion compensated interframe coding for video conferencing,” in Proc. NTC 81, pp. C9.6.1-9.6.5, New Orleans, LA, Nov./Dec. 1981.

3.        Amish Tankariya , Prof. Mukesh Tiwari and Prof. Jaikaran Singh Department of Electronics & Communication Engineering, SSSIST- Sehore, Bhopal,, (M.P), “International Journal on Emerging Technologies” (IJET)(0975-8364).

4.        S. Zhu and K.-K. Ma, “A New Diamond Search Algorithm. for Fast Block-Matching Motion Estimation,” IEEE. Transactions on Image Processing, vol. 9, no. 2, pp.287-290, Feb. 2000.

5.        K. H.-K. Chow and M. L. Liou, “Genetic motion search algorithm for video compression,” IEEE Trans. Circuits Syst. Video Technol., vol. 3, pp. 440–445, Dec. 1993.

6.        Liang-Wei Lee, Jhing-Fa Wang, Jau-Yien Lee, andJung-Dar Shie,” Dynamic Search-Window Adjustment and Interlaced Search for Block-Matching Algorithm” IEEE Transactions on Circuits and Systems for video  Technology. VOL. 3. NO I . FEBRUARY 1093.

 

57-60

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

14.

Authors:

V. B. Katariya, Y. N. Makwana, P. A. Goswami

Paper Title:

A Review on Implementation of Automatic Movement Controlled Using Gesture Recognition

Abstract: Nowadays, computer interaction is mostly done using dedicated devices. Abundant amount of input devices are used to interact with the computer world or more precisely saying to digital world and very less through gestures made by body movements. Concepts of assistive technology are one of them used for controlling the input from mouse movements, like by detecting the eye, hand, face etc movements of a user with the help of eye tracking system, hand gestures through wearable devices, etc. Our focus is in moving mouse cursor on the screen without using any hardware which is used very often now-a-days i.e. mouse. We use the newly born technology for this purpose. We implement computer mouse movement through finger by image processing using latest Technology which gets processed in MATLAB without and with using gesture recognition.

Keywords:
    Color Recognition, camera, Image Processing, Keyboard, MATLAB, Mouse


References:

1.          Sushmita Mitra and Tinku Acharya, “Gesture Recognition: A Survey”, IEEE Transactions on Systems, Man and Cybernetics-Part C: Applications and Reviews, Vol.n 37(3), pp. 56-68, May 2007.
2.          Akhil Gupta, Akash Rathi, Dr. Y. Radhika, “Hands-free pc control, controlling of mouse cursor using eye movement”, International Journal of Scientific and Research Publications, vol. 2, issue 4, ISSN 2250-3153. pp. 1-5, April 2012.

3.          Prof. R. W. Jasutkar, Ms. Shubhangi J. Moon, “ A Real Time Hand Gesture Recognition Technique by using Embedded device”. International Journal Of Advanced Engineering Sciences And Technologies, vol. 2, issue no.1, pp. 043–046 may 2005.

4.          Zhi-gang XuHong-lei Zhu,“Vision-based Detection of Dynamic Gesture”, International Conference on Test and Measurement, vol. no. 6 issue no.8 pp. 89-90, may 2010.

5.          Michal Lech, Bozena Kostek,“Gesture-based Computer Control System applied to the Interactive Whiteboard” Proceedings of the 2nd International Conference on Information Technology, vol. no.06  pp. 28-30, June 2010.

6.          Prateek Agrawal,  Kunal Gupta. “Mouse Movement Through Finger By Image Grabbing Using Sixth Sense Technology”, International Journal Of Engineering Science & Advanced Technology vol-2, Issue-2, pp.245 – 249, march-april 2012.

7.          Hae Jong Seo, Peyman Milanfar “A Review on Action Recognition from One Example”, IEEE Transactions on Pattern Analysis And Machine Intelligence, vol. 33(5), may 2011.

8.          M. A. MONI and A B M Shawkat Ali., “HMM based Hand Gesture Recognition: A Review on Techniques and Approaches”.

9.          S.B. Wang et al. “Hidden Conditional Random Fields for Gesture Recognition”. IEEE Computer Society Conference on Computer Vision and Pattern Recognition, volume 2, 2006.

10.       Denis Amelynck, Maarten Grachten, Leon Van Noorden, and Marc Leman. “Toward E-Motion-Based Music Retrieval a Study of Affective Gesture Recognition”, IEEE transactions on affective computing, vol. 3, no. 2, april-june 2012.

11.       http://www.youtube.com/watch?v=k-rSWM6h3Aw

12.       http://www.youtube.com/watch?v=1GhNXHCQGsM

13.       https://github.com/zk00006/OpenTLD

14.       http://touchless.codeplex.com/releases/view/17986

15.       http:// Wikipedia, the free encyclopedia gesture recognition based on matlab simulation

 

61-64

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

15.

Authors:

Uma Shankar Modani, Gajanand Jagrawal

Paper Title:

A survey on Application of Ferroelectric Materials for Fabrication of Microstrip Patch Antennas

Abstract:  Ferroelectric materials (FEM’s) are very attractive because their dielectric constant can be modulated under the effect of an externally applied electric field perpendicular to the direction of propagation of a  signal. In this paper, classification, properties and application of ferroelectric material for the fabrication of microstrip patch antennas is discussed.

Keywords:
     Ferroelectric materials and Microstrip patch antenna.


References:

1.        J. Valasek, “Piezoelectric and Allied phenomena in rochelle salt,” Phys.Rev., 17, 475–81 (1921).
2.        L. E. Cross and R. E. Newnham, “History of ferroelectrics”; pp. 289–305 in Ceramics and Civilization, Vol. III, High-technology ceramics—past, present,and future. American Ceramic Society, Westerville, OH, 1987.

3.        J. Fousek, “Ferroelectricity: Remarks on historical aspects and present trends,” ferroelectrics, 113, 3–20 (1991).

4.        N. Settera and D. Damjanovic, “Ferroelectric thin films: Review of materials, properties, and applications” Journal of applied physics 100, 051606 _2006_

5.        Gene H. Haertling, “Ferroelectric ceramics: history and technology” manuscript no. 189612. received january 20, 1999; approved march 1, 1999.

6.        Z.P. Cao, A.L. Ding, X.Y. He Zhang and X. Zeng, “new lead- free ferroelectric materials for high-temperature applications: Nb-doped Bi3.5Nd0.5Ti3O12” key\Engineering Materials Vols.280-283(2005) pp247-250.

7.        Kanareykin, E.Nenasheva, V.Yakovlev and A.Dedyk, “Fast switching ferroelectric materials for accelerator applications” aipconf.proc.877:311-319, 2006.

8.        Nahum Masó and Anthony R. West, “A new family of ferroelectric materials: me2nb4o11 (me = na and ag)” supplementary material (esi) for journal of materials chemistry 2010.

9.        Yan Sui, Dong-Sheng Liu and Rong-Hua Hu, “A new type of organic ferroelectric material based on maleopimaric acid anhydride” advanced material research vols. 239-242(2011) pp 1180-1183.

10.     Sachio Horiuchi and Yoshinori Tokura, “Organic ferroelectrics,” nature materials, vol 7, may 2008, 357-360.

11.     Daigo Miyajima, Fumito Araoka, Hideo Takezoe, Jungeun Kim, Kenichi Kato, Masaki Takata and Takuzo Aida,“Ferroelectric columnar liquid crystal featuring confined polar groups within core-shell architecture”, Science, april 13,2012, vol 336 no. 6078 pp. 209-213.

12.     M.E. Lines and A.M. Glass, “Principles and applications of ferroelectric and related materials”, clarendon press, oxford, 1977.

13.     B. Ravel, N. Sicron, Y. Yacoby, E.A. Steru, F. Dogan and J.J. Rehr, “Order-disorder behavior in the phase transition of pbtio3,” may 11,1995.

14.     Gaurav Kumar Aggarwal, Ashok Kumar and UC Naithani, “Electric field dependent specific heat of SrTiO3, BaTiO3 and KTaO3 ferroelectric perovskites,” International Journal of Modern Engineering Research (IJMER) Vol.2, Issue.4, July-Aug. 2012 pp-2438-2444.

15.     K.A. Muller, Y. Luspin, J.L. Servoin and F. Gervais, “Displacive-order-disorder crossover at ferroelectric-paraelectric phase transitions of BaTiO3 and LiTiO3,” J. physique letters 43(1982),L-537- L-542.

16.     Dalibor Merunka and Boris Rakvin, “Displacive and order–disorder behavior of KDP-type ferroelectrics on the local scale,” solid state communications 129 (2004) 375–377.

17.     Young-Han Shin, Jong-Yeog Son, Byeong-Joo Lee, Ilya Grinberg and Andrew M Rappe “Order–disorder character of PbTiO3,” J. Phys.: Condens. Matter 20 (2008) 015224 (5pp) .

18.     Mirosław Maczka, Jerzy Hanuza, Andrzej Majchrowski and Seiji Kojima, “Direct evidence of an order-disorder nature of ferroelectric phase transitions in K2MgWO2(PO4)2,” applied physics letters 90, 122903 (2007).

19.     von. Hippel, Rev. Modern Phys., 22, 221 (1950).

20.     Fabio Bernardini and Vincenzo Fiorentini, “Spontaneous polarization and piezoelectric constants of III-V nitrides,” The American Physical Society, volume 56, number 16,10024(4), 15 october 1997.

21.     W. J. Merz, Phys. Rev., 76, 1221 (1949).

22.     Bruno Andò, Pietro Giannone, Salvatore Graziani and Nicola Pitrone, “Characterization of the dielectric and pyroelectric properties of ferroelectric material,” IEEE transactions on instrumentation and measurement, vol. 57, no. 9, september 2008, 1939-1948.

23.     Shen Ming-Rong, Yao Dong-Lai and Cao Wen-Wu, “Pyroelectricty and spontaneous polarization in [111] oriented 0.955Pb (Zn1/3Nb2/3)O3- 0.045PbTiO3 single crystals,” Chinese physical society, vol. 22,no 9 (2005) 22390. 

24.     Hui Chen, Tianquan Lu, Chuanwen Chen and Wenwu Cao, “Theoretical studies on the pyroelectric properties of two component composite ferroelectric thin film,” Physics Letters A 360 (2006) 357–361.

25.     Sidney B. Lang, “Pyroelectricity: from ancient curiosity to modern imaging tool,” American Institute of Physics, August 2005(31-36).

26.     Sharma, Z.-G. Ban, S. P. Alpay and J. V. Mantese, “Pyroelectric response of ferroelectric thin films,” Journal of applied physics volume 95, number7, 1April 2004, 3618-3625.

27.     Y. C. Shu and K. Bhattacharya, “Domain patterns and macroscopic behaviour of ferroelectric materials,” Philosophical magazine b, 2001, VOL. 81, NO. 12, 2021-2054.

28.     Jiri Erhart and Wenwu Cao, “Effective material properties in twinned ferroelectric crystals,” Journal of applied physics, volume 86, number 2, 15 july 1999, 1073-1081.

29.     G. Rosenman, A. Skliar, I. Lareah, N. Angert, M. Tseitlin and M. Roth, “Observation of ferroelectric domain structures by secondary-electron microscopy in as-grown KTiOPO4 crystals,” Physical review b, volume 54, number 9, 1 september 1996,6222-6226.

30.     WENWU CA0 and CLIVE A. RANDALL, “Grain size and domain size relations in bulk ceramic ferroelectric materials,” J. Phys. Chem Solie Vol57, No. 10, pp. 149-1505, 1996.

31.     B. Andò, P. Giannone, S. Graziani, and N. Pitrone, “Characterization of hysteresis in ferroelectric devices,” in Proc. IEEE IMTC, Como, Italy, 2004, vol. 1, pp. 558–563.

32.     Y. Xu, “Ferroelectric Materials and their Applications” (North Holland, Amsterdam, 1991).

33.     John Bechhoefer, Yi Deng, Joel Zylberberg, Chao Lei and Zuo-Guang Ye, “Temperature dependence of the capacitance of a ferroelectric material,” Am. J. Phys. 75, 1038–1046 -2007.

34.     Jens Kreisel, Beatriz Noheda and Brahim Dkhil, “Phase transitions and ferroelectrics: revival and the future in the field,” Phase Transitions Vol. 82, No. 9, September 2009, 633–661.

35.     Q. Jiang, X.F. Cui and M. Zhao, “Size effects on Curie temperature of ferroelectric particles,” Appl. Phys. A (2002).

36.     Biao Wang and C. H. Woo, “Curie temperature and critical thickness of ferroelectric thin films,” Journal of applied physics 97, 084109 (2005).

37.     X.Y. Lang and Q. Jiang, “Size and interface effects on Curie temperature of perovskite ferroelectric nanosolids,” Journal of nanoparticle research (2007) 9,595
603.

38.     T. Yu, Z. X. Shen, W. S. Toh, J. M. Xue, and J. Wang, “Size effect on the ferroelectric phase transition in SrBi2Ta2O9 nanoparticles,” Journal of applied physics volume 94, number 1 1 JULY 2003, 618-620.

39.     F. M. Pontes, S. H. Leal, E. R. Leite, E. Longo, P. S. Pizani, A. J. Chiquito and J. A. Varela, “Investigation of phase transition in ferroelectric Pb0.70Sr0.30TiO3 thin films,” Journal of applied physics volume 96, number 2 15 JULY 2004,1192-1196.

40.     Jozef Modelski and Yevhen Yashchyshyn, “New type of microstrip antenna with ferroelectric layer,” journal of telecommunications and information technology,2001,37-40.

41.     J. B. L. Rao, D. P. Patel, and V. Krichevsky, “Voltage-controlled ferroelectric lens phased arras”, IEEE Trans. Anten. Propagat., vol. 47, no. 3, pp. 458–468, 1999.

42.     T. Zhao, D. R. Jackson, J. T. Williams, and A. A. Oliner, “General formulas for 2D leaky-wave antennas,” IEEE Trans. Antennas Propag., vol. 53, no. 11, pp. 3525–3533, Nov. 2005.

43.     Giampiero Lovat, Paolo Burghignoli and Salvatore Celozzi, “A tunable ferroelectric antenna for fixed-frequency scanning applications,” IEEE antennas and wireless propagation letters, vol. 5, 2006,353-356.

44.     G. Subramanyam, K. Leedy, C. Varanasi, R. Neidhard, K. Stamper, and M. Calcatera, “A low voltage tunable analog phase shifter utilizing ferroelectric varactors,” Integrated Ferroelectrics, vol. 100, no. 1, pp. 156– 164, 2008.

45.     G Subramanyam, F. Ahamed, and R. Biggers, “A Si MMIC compatible ferroelectric varactor shunt switch for microwave application,” IEEE Antennas Wireless Propagat. Lett., vol. 15, no. 11, pp. 739–741, 2005.

46.     Hai Jiang, Mark Patterson, Chenhao Zhang, and Guru Subramanyam, “Frequency tunable microstrip patch antenna using ferroelectric thin film varactor,” IEEE trans. Antenna propagate.,vol 978, no. 1,pp 248-250,2009.
47.     B. Su, J.E. Holmes, C. Meggs and T.W. Button, “Dielectric and microwave properties of barium strontium titanate (BST) thick films on alumina substrates,” Journal of the European Ceramic Society 23 (2003) 2699–2703.

48.     F.H.Wee and F. Malek, “Design and Development of Ferroelectric Material for Microstrip Patch Array Antenna” World Academy of Science, Engineering and Technology 62 2012, pp 290-293

 

65-72

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

Volume-1 Issue-1

 Download Abstract Book

S. No

Volume-1 Issue-1, April 2012, ISSN:  2277-3878 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

Parveen Dabur, Gurdeepinder Singh, Naresh Kumar Yadav

Paper Title:

Electricity Demand Side Management: Various Concept and Prospects

Abstract: Since electrical energy is the form of energy that cannot be effectively stored in bulk, it must be generated, distributed and consumed immediately. But load on the power plant is variable in nature. The power plants are designed to meet the maximum demand. However, there is large difference between peak demand and average demand which results in high generation cost per unit. Since peak demand is increasing sharply that demand large installed capacity. It is not possible for developing countries to meet the targeted capacity by installing new power plants. Since electricity is an essential input in all the sectors of any country, hence we need to focus on alternating means by which electricity can be saved and effectively utilized.  The effective solution to above said problem is DSM strategies that lower the peak demand and bring immediate benefit to utilities and customers. This paper deals with the basic concept of Demand Side Management (DSM), objective, problems, types of DSM measures and theoretical and practical approach by which electricity demand could be reduced at consumer end through effectively control and manage loads from utility side, and to use unsustainable energy practices into more efficient.

Keywords:
Demand Side Management, Energy Conservation, Energy Efficient, Load Curve, Load Scheduling


References:

1.        Padmanaban, S., Sarkar, Ashok,” Electricity demand side management (DSM) in India – A Strategic and policy perspective”, Office of Environment, Energy and Enterprise US Agency for International Development, New Delhi, India.
2.        Rajan, C.C.A,” Demand side management using expert system”, IEEE Conference on Convergent Technologies for Asia-Pacific Region TENCON 2003.

3.          www.upm.ro/proiecte/EEE/Conferences /papers/s335.pdf.

4.        Mukhopadhyay,S.,Rajput, A. K,Demand side management and load control. An Indian Experience”, IEEE trans, on power and Energy Society General Meeting, 2010.

5.        Boshell, F., Veloza, O.P.,”Review of developed demand side management programs including different concepts and their results”, IEEE/PES trans. On Transmission and Distribution conference and Exposition, Latin America, 2008 .

6.        Yun, Lim, Taylor, Philip,” Innovative Application of Demand Side Management to Power Systems”, First International Conference on Industrial and Information Systems, ICIIS, Sri Lanka, 8 – 11 August 2006.

7.        Yang, Zhirong,” Demand side management and its application”, Beijing:China electric power press, pp 60-90, 2007.

8.        Gupta, B.R.,”Generation of electrical energy”, 2nd edition, Ch: 21, S. Chand, 2007.

9.        Zhong, Jin, Kang, Chongqing, Liu Kai,” Demand side management in China”, IEEE General  Meeting on Power and Energy Society, 2010

10.     Sui, Huibin, Sun, Ying, Lee, Wei-Jen,”A demand side management model based on advanced metering infrastructure”, IEEE 4th international Conference on Electric Utility Deregulation and Restructuring and Power Technologies (DRPT), July 2011.

11.     Qureshi, J.A., Gul, M. Qureshi, W.A,” Demand Side Management through innovative load control”, IEEE Region 10 Conference, 2010.

12.     http:// en.wikipedia.org/ wiki/  Energy_  demand _ management

13.     Xiao-Hong Zhu,” Electricity Demand Side Management and its Different Promotion Measures.  Electr. Power Tech. Coll.”,Wuhan  IEEE Conference on Power and Energy Engineering,. Asia-Pacific, APPEEC 2009.

14.     Seng, Lim Yun  Taylor, Philip,” Innovative Application of Demand Side Management to Power Systems”, First International Conference on Industrial and Information Systems,   2006.

15.     Deng, Fang.,”Application of the power load control system for large customers in demand side management”, Distribution & Utilization, vol. 8, pp. 66-68, 2007.

 

1-6

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.

Authors:

Gite S.N, Dharmadhikari D.D, Ram Kumar

Paper Title:

Educational Decision Making Based On GIS

Abstract: This paper introduces the system which is the combination of GIS information along with Educational information. This system will make Educational decisions very much easier. It provides several functionalities like browsing the educational information to make educational decisions. By using thematic map it shows suitable region to apply new educational scheme and also shows in which region which scheme is active.

Keywords:
Decision support system, Geographic information system, Quad tree, Spatial data, Education based decisions.


References:

1.     Wang Aihua, Guo Wenge, Xu Guoxiong, Jia      Jiyou, Wen Dongmao Educational Decision Making System in 2009.
2.     Oregon State Board of Education GIS Decision Support Pilot Project.  http://www.oregon.gov

3.     Tegegn Nuresu Wako. Education Management Information System an Overview.

 

7-10

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

Himanshu Mazumdar, Agnel Amodia

Paper Title:

A Pattern Recognition Framework for Embedded Sensor Electronics

Abstract: The  recent  developments in the area of high speed micro-electronics and computational intelligence has opened new opportunities in smart sensor design. In this paper a generic pattern recognition framework is presented for integrated sensor based system design. Two case studies are described for Rock-Image Classification and Pulse Shape Identification. Both applications use same framework that consist of pre-processing of sensor data, wavelet based data compression, feature extraction and neural net based feature classification. The rock identification combines multi-parameter analysis to improve the accuracy. The proposed system is tested using above two case studies for real time application. The average accuracy observed for pulse shape and rock type identification is 96% and 95% respectively. The system is applicable for similar sensor based embedded systems. The application is developed under a Planetary Exploration Technology Research project.

Keywords:
feature extraction, neural net based classification, Pulse Shape Identification, Rock-Image Classification, wavelet based data compression.


References:

1.     Himanshu S. Mazumdar., “Hand Written Character Recognition using Neural Network ” CSI Communication, p.16-18 (Feb. 1998)
2.     A Multistage Handwritten Marathi Compound Character Recognition Scheme using Neural Networks and Wavelet Features in International Journal of Signal Processing, Image Processing and Pattern Recognition International Recognition Vol. 4, No. 1, March 2011

3.     Discrete Wavelet Transforms and Artificial Neural Networks for Speech Emotion Recognition International Journal of Computer Theory and Engineering, Vol. 2, No. 3, June, 2010 1793-8201

4.     Himashu Mazumdar, Agnel Amodia, Pratik Patel “Rock Image Classification” in Conference on Planetary Science and Exploration, physical research laboratory, December 2011, pp. 61-62 .

5.     Himashu Mazumdar, Agnel Amodia, Himanshu Purohit “Pulse Shape Recognition using Wavelet and Neural Network” in Conference on Planetary Science and Exploration, physical research laboratory, December 2011, pp. 63-64.

6.     Himanshu S. Mazumdar  & Leena P. Rawal,  “A Neural Network Tool Box using C++”, in CSI Communications, April, pp. 22-25, 1995.

7.     Inan Gulera, Elif Derya Ubeylib. “ECG beat classifier designed by combined neural network model”, Pattern Recognition 38 (2005) 199 – 208

8.     Shahshahani “Data compression by Wavelet Transform”.

9.     J. Brailean, R. Kleihorst, S. Efstratiadis, A. Katsaggelos, and A. Lagendijk, “Noise reduction filters for dynamic image sequences: A review,” Proceedings of the IEEE
83(9), pp. 1272–1292, 1995.

10.  B.Lerner, H.Guterman, M.Aladjem and I.Dinstein, (1996) “Feature extraction by neural network nonlinear mapping for pattern classification”, Proc. of the 13th Int. Conf. on Pattern Recognition, Vienna, August, 25-30, Vol.IV, IEEE Computer Society Press, 320-324.

11.  Amara Graps “An Introduction to Wavelets”  p. 5-6

11-14

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

4.

Authors:

S. C. Sahoo, Amitava Sil, P. K. Khatua, C. N. Pandey

Paper Title:

Utilization of Non -oven Jute felt – A natural Fiber as a Substitution of Wood Veneer for Manufacture of Plywood

Abstract: In this study the suitability of using core veneer made from renewable natural fiber i.e. Non-oven jute felt, which is the second most widely used natural fiber for manufacturing of plywood was investigated to minimize the gap between demand and supply of wood veneer. The renewable natural hard jute fibre was impregnated with phenolic resin and was used for the manufacture of plywood. Plywood of 4 mm, 6 mm, 12 mm and 18 mm thick were manufactured by using phenolic resin impregnated jute felt having thickness 16mm of 1850 GSM (approx.) as a core in place of the natural wood veneer. From the study, it can be inferred that PF Resin impregnated Non oven jute felt as a natural fibre can suitably replace the wooden glue core veneer to manufacture ply board up to 80% as an alternative substitute of wood. The physico-mechanical properties such as surface roughness, moisture content, density, water absorption, swelling, compressive strength, tensile strength, static bending strength, glue shear strength, of the plywood manufactured by using jute felt as core veneer with different resin dilution have been studied. Data revels that most of the physico-mechanical properties of the plywood showed satisfactory results meeting the requirement of different grades of plywood tested as per IS: 1734 – 1983. The accelerated study of the  glued core after impregnation with jute felt have been carried out for three months before plywood manufacture after storing it in proper temperature and humidity. The data revealed that there is no appreciable change in bond quality and mechanical properties of the plyboard manufactured after storing the veneer up to 30 days. The study concluded that wood substituted jute composites could be an ideal solution with ever depleting forest reserves where utilization of renewable resources will be beneficiary for plywood industries to meet the challenges during scarcity of veneer by reducing the cost of imported veneer.

Keywords:
 Indigenous technology Non-oven jute felt, physico-mechanical properties, wood substituted.


References:
1.          T. M. Maloney, “Modern particle board & dry process fiber board manufacturing, (Book style with paper title and editor),” Miller Freeman Publications, San Francisco, CA, USA
2.          M. F. Sefain, N. A. Naim, M. Rakha, “Effect of thermal treatment onthe properties of sugar cane bagasse hardboard” J Appl Chem Biotechn, 1978, 28(2), pp. 79.

3.          F. Mobarak, Y. Fahmy, H. Augustin, “Binderless lignocellulose composite from bagasse and mechanism of self-bonding”, Holzforschung, 1982, vol. 36, pp. 131–135.

4.          Pizzi, . Smith, “Advanced wood adhesives technology (Book style),” Marcel Dekker Inc, New York,1994, pp 58–60

5.          W. C. Lee, X. Bai, A. P. Bangi, “Flexural properties of bamboo reinforced southern pine OSB beams (Journal style),” FPJ, 1997, 47(6), pp. 74–78.

6.          M. N. M. Yusoff, A. A. Kadir, A. H. Mohamed, “Utilization of bamboo for pulp and paper and medium density fiber board” (Proceedings style)” National Bamboo Seminar, Kuala Lumpur, Malaysia.

A.         M. Sulastiningsih, S. M. Nurwati, S. Kawai, “The effects of bamboo cement ratio and magnesium chloride (MgCl2) content on the properties of bamboo–cement boards (Proceedings style),” ACIAR., Canberra, Australia, 2002, No. 2.

7.          U. C. Jindal. Poor, “Development and testing of bamboo-fiber reinforced plastic composites”, J Composite Mater, 1986, vol. 20, pp. 19–29

8.          M. D. Hill, J. B. Wilson, “Particleboard strength as affected by unequal resin distribution on different particle fractions (Journal style),” Forest Prod Journal, 1978, 28(11), pp. 44–48.

9.          P. Naha, S. Sen, J. Nag, “Development of jute overlays for panel products (Report style)”, IPIRTI Research Report, 2004, No. 131

10.       IS: 1734 -1983 (Part 1 to 20), “Method of test for plywood”, Bureau of Indian Standards, New Delhi.

11.       L. G. Esteban, P. D. Palacios, F. G. Fernandez, J. Ovies, “Mechanical properties of wood from the relict abuies pinsapo (Journal style)”, FPJ, 2009, vol. 59 (10), pp. 72-78.

12.       Pavithran, P. S. Mukherjee, M. Brahmakumar,  A. D. Damodaran, “Impact properties of natural fiber composites (Journal style)”, JMS Fillers, 1987, vol. 6, pp. 882-884.

13.       M. K. Sridhar, G. Basavarappa, S. G. Kasturi, N. Balasubramanian, “Mechanical properties of jute/polyester composites”, Indian Journal of Technology, 1984, vol. 22, pp. 213-215.

14.       S. Nangia, S. Biswas, “Jute Composite: Technology & Business Opportunities (Report style)” TIFAC.

 

15-21

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

5.

Authors:

Yuan-kai Jian, Jia-jia Mao, Xiang-yu Ji, Guang-jun Xie

Paper Title:

A Novel V-I Converter Used in the Slope Compensation of a Boost Converter

Abstract:   A novel voltage to current circuit used in the slope compensation of a boost DC-DC converter is proposed. Compared with the normal V-I converter, it has a better linear relation and a larger input voltage range. It can implement slope compensation of the power converter, eliminate the sub-harmonic oscillation and decrease the noise infection effectively.

Keywords:
Boost converter, Voltage-current converter, Slope compensation.


References:

1.     Zhao P. Design of Current control mode in single-chip switch. Chengdu: University of Electronic Science and Technology. 2005, pp. 234-245.
2.     Gao Y, Qiu X Y, Wang J. Reaearch of the peak current control of switch on the slope compensation. Instrumentation Journal. 2003, 8: pp. 200-201.

3.     Abraham I. Pressman. The device of power converter, second edition. Electronics Industry Publishing House. 2005, pp. 101-103.

4.     Chen G M, Cao J L, Wang X C. Design of the slope generator of boost DC-DC converter with peak current control mode. Shanghai University Journal. 2004, 10(1): pp. 357-358.

5.     Cheung F. Lee and Philip K. T. Mok. A Monolithic Current-Mode CMOS DC-DC Converter with On-Chip Current-Sensing Technique. IEEE Journal of Solid-State Circuits, 2004, 39(1): pp. 3-14.

6.     Zhang W P. Model and Control of Switch Converter, The first edition. Chinese power Publishing House. 2006, pp. 191-195.

7.     Behzad razavi. Design of analog CMOS integrated circuits, the front page. Xi’an Jiaotong University Press. 2003, pp. 17-18.

8.     Yang R. Design of slope compensation circuit with Peak current control mode. Power Electronics Technology. 2001, 35(3): pp. 35-38.

 

22-24

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

6.

Authors:

Arvind Vishnubhatla, P.G.Krishna mohan

Paper Title:

Ground Station design

Abstract: The design of a ground station  for an unmanned vehicle is envisaged.information.Image data from the unmanned vehicle is logged int the ground station which contains an  Observation The Ground –Air Data Link This link needs to carry a large volume of   information which has to be delivered with high  reliability and with redundancy.

Keywords:
The Ground –Air Data Link This link needs to carry a large volume of   information which has to be delivered with high  reliability and with redundancy.


References:

1.        Ahuja93] Network Flows, Ravindra K. Ahuja, Thomas L. Magnanti, and James B. Orlin, Prentice Hall, February 18, 1993, 864, 013617549X. [Bemporad04] Mixed Integer
2.        Quadratic Program (MIQP) solver for Matlab, Alberto Bemporad andDomenico Mignone, Automatic Control Laboratory, ETH Zentrum, Zurich, Switzerland,2004.

3.         [Berkelaar05] lp solve (Open source (Mixed-Integer) Linear Programming system)

4.        Michel Berkelaar, Kjell Eikland, and Peter Notebaert, 2005. [Bru76] Sequencing unit-time jobs with treelike precedence on m processors to minimize
maximumlateness, P.J. Brucker, Proc. IX International Symposium on Mathematical Programming, Budapest, 1976.

5.         [Brucker99] A branch and bound algorithm for a single-machine scheduling problem with positive and negative time-lags, P. Brucker, T. Hilbig, and J. Hurink, Discrete Applied Mathematics,1999.

6.         [Butazo97] Hard Real-Time Computing Systems, G. C. Butazo, Kluwer Academic Publishers, 1997,0-7923-9994-3.

7.         [B la˙zewicz01] Scheduling Computer and Manufacturing Process, J. B la˙zewicz, K. H. Ecker, E. Pesch,

8.        G. Schmidt, and J. W¸eglarz, Springer, 2001, 3-540-41931-4 sdk.asp, 2005, (Accessed April 2005).

9.        http://rtime.felk.cvut.cz/scheduling-toolbox/manual/algorith

10.     scheduling.php

11.     J. A. Kamalakar. “Lunar ranging instrument for Chandrayaan-1”, Journal of Earth System Science,      12/2005

 

25-28

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

7.

Authors:

K. Soni Priya, T. Durgabhavani, K. Mounika, M.Nageswari, P.Poluraju

Paper Title:

Non-Linear Pushover Analysis of Flatslab Building by using SAP2000 

Abstract: Recent earthquakes in which many concrete structures have been severely damaged or collapsed, have indicated the need for evaluating the seismic adequacy of existing buildings. About 60% of the land area of our country is susceptible to damaging levels of seismic hazard. We can’t avoid future earthquakes, but preparedness and safe building construction practices can certainly reduce the extent of damage and loss. In order to strengthen and resist the buildings for future earthquakes, some procedures have to be adopted. One of the procedures is the static pushover analysis which is becoming a popular tool for seismic performance evaluation of existing and new structures. By conducting this push over analysis, we can know the weak zones in the structure and then we will decide whether the particular part is retrofitted or rehabilitated according to the requirement. In this paper we are performing the push over analysis on flat slabs by using most common software SAP2000.Many existing flat slab buildings may not have been designed for seismic forces. Hence it is important to study their response under seismic conditions and to evaluate seismic retrofit schemes. But when compared to beam-column connections, flat slabs are becoming popular and gaining importance as they are economical.

Keywords:
Pushoveranalysis, Retrofitting, Rehabilitation, Columnjacketing, Response Spectrum, Demand curve, Capacity curve, Plastic hinge.


References:

1.     Push over analysis on shear critical frames, Serhan Guner and Frank J. Vecchio
2.     Seismic retrofit of columns in buildings for flexure using concrete jacket.Gnanasekaran Kaliyaperumal and Amlan Kumar Sengupta
3.     Pushover analysis of reinforced concrete frame structures. A. kadid and A. boumrkik department of civil engineering, university of Batna, Algeria

4.     ISET Journal of Earthquake Technology, Paper No. 505, Vol. 46, No. 2, June 2009, pp. 77–107

5.     Asian Journal of civil engineering(Building and Housing)Vol. 9, No. 1 (2008) Pages 75-83

6.     CI Structural Journal/January-February 2010 by Serhan Guner and Frank J. Vecchio

29-33

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

8.

Authors:

K.Vinoth Kumar, S.Suresh Kumar, Ashish Sam Geo, Jomon Yohannan, Toji Thomas, Sreekanth P.G

Paper Title:

Fault Diagnosis in Induction Machines for Internal Fault Identification Scheme

Abstract:  In this paper, a mathematical model of the three-phase induction motor drives in abc reference frame is described. A computer simulation of the motor drive is provided which utilized Lab VIEW software. This simulation can be conveniently used to study the level of the ‘Fault  Tolerant System’ parameters like current, voltage, torque,  speed and also simulate the three phase Induction Motor for diagnosis of the short circuit and normal case using Laboratory virtual Instrumentation Engineering Workbench (LabVIEW).

Keywords:
Three Phase Induction Motor, Fault Diagnosis System.


References:

1.        G.B. Kliman, W.J. Premerlani, R.A. Koegl, D. Hoeweler, A  New Approach to On-Line Turn Fault Detection in AC Motors, in: IAS Annual Meeting, October 1996, 1996, pp. 687–693.
2.        J F Bangura and N A Demerdash: “Comparison between  Characterization and Diagnosis of Broken BarslEnd-Ring Connectors and Airgap Eccentricities of Induction Motors in ASDs using a Coupled Finite Element-State Space Method, IEEE Transactions on Energy Conversion, Vol. 15, No. 1, March, 2000, pp 48-56

3.        William.T.Thomson and Mark fenger: “Current signature analysis to detect induction motor faults ’’ – IEEE Transaction. On IAS Magazine, Vol , 7 , No .4 , pp , 26-34 , july / August 2001.

4.        S. Williamson, K. Mirzoian, Analysis of cage induction motors with stator winding faults, IEEE Trans. Power Apparatus Syst. PAS-104 (7) (1985) 1838–1842.

5.        William.T.Thomson and Ronald J. Gilmore :  “ Motor Current signature analysis to detect induction faults in Induction motor Drives – Fundamentals , Data Interpretation and Industrial case Histories ’’ – proceedings of Thirty second turbo machinery symposium – 2003.

6.        M. Arkan, D. Kostic-Perovic, P.J. Unsworth, Online stator fault diagnosis in induction motors, IEE Proceedings: Electric Power Applications 148 (6) (2001) 537–547.

7.        YE Zhongming and WU Bin, “A Review on Induction Motor Online Fault Diagnosis” Ryerson Polytechnic   University, Canada, IEEE, 2000

8.        Tom Bishop “ Squirrel cage Rotor Testing”, EASA Convention 2003,  Moscone convention Centre , San  Francisco, CA June 30, 2003

9.        Tavner. P. and Penman .J.,Condition Monitoring of     Electrical Machines, Research Studies Ltd., London, England  John Wiley & Sons.

10.     [Peter Vas, “Parameter estimation, condition monitoring and diagnosis of electrical machines”, 1995. vol. 2, Aug. 1987, pp. 740–741 [Dig. 9th Annu. Conf. Magnetics Japan, 1982, p. 301].

11.     Mr.K. Vinoth Kumar received his B.E. degree in Electrical and Electronics Engineering from AnnaUniversity, Chennai, Tamil Nadu, India.

 

34-37

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

9.

Authors:

H S Manohar,  N Chikkanna, B Uma Maheshwar Gowd, M Krishna

Paper Title:

Effect of Heat Treatment on Damping Properties of Nanoclay Particulate Reinforced MMCs

Abstract: The thermo-mechanical behaviour of Aluminium alloy reinforced with nanoclay particulate was investigated by resonant-bar method. The aging response was detected in specimens, damping and DSC observation. The damping capacity of composite increased with increasing reinforcement of nanoclay and showed a peak in damping capacity during aging. These results indicate that the aging and precipitation kinetics in the matrix alloy are significantly accelerated due to the presence of reinforcement. The damping mechanisms, intrinsic damping, interface damping, dislocation damping and grain boundary damping are discussed.  

Keywords:
  Nanoclay, damping properties, heat treatment


References:

1.        R.J.Perz, J.Zhang, E.J.Lavernia, “Strain amplitude dependence of 6061Al/graphite MMC damping”, Computational Materials Science,vol.27, pp.1111-14, (1992).
2.        S.C.Sharma, A.Ramesh, Effect of heat treatment on Mechanical properties of particulate reinforced Al6061 composites, Journal of Materials Engineering and Performance, vol.9(3) (2000) pp.344-349.

3.        S.C.Sharma, B.M.Girish, R.Kamath, & B.M.Satish, “Fractogrphy, Fluidity, and Tensile Properties of aluminum/Hematite Particle composite”, Jour. of Mat. Engg. & Perf., vol.8(3), 1999,  pp.309-314.

4.        J Zhang, R J Perz, E J Lavernia, Acta Metall. Mater, vol.42, (1994) pp.335.

5.        Joseph E.Bishop and Vikram K.Kinra, “ Analysis of Elastothermodynamic Damping in Particle-reinforced Metal-matrix composites  ” Metall. Trans. vol. 26A(1995) pp.2773-2782.

6.        G.J.C.Carpenter and SHJ Lo; “ Characterization of graphite-aluminium composites using analytical electron microscopy”, Jour.Mater. Sci. vol. 27,(1992) pp. 1827-1841

7.        I.A.Ibrahim, F.A.Mohamed and E.J. Lavernia,  “Particulate reinforced metal matrix composites-A review” Jour. of Mater. Sci., vol. 26(1991) pp. 137.

8.        A.Wolfenden and J.M.Wolla in Metal Matrix Composites Mechanisms and Properties” R.K.Everett &R.J.Arsenault, edn. Academic press, Boston, MA., 1991, pp. 287-328.

9.        H C Lin, S K Wu, and M T Yeh, Damping Characteristics of TiNI Shpae Memory Alloys, Metallurgical Transactions, vol. 24 A (1993), pp. 2189-2782.

10.     E. Carreno-morelli, N. Chawla, R.Schaller, Thermo-mechanical characterization of 2080 Al/SiCp composites by mechanical spectroscopy technique, Journal of Materials Science Letter, (2001), vol.20, pp.163-165.

11.     N V Ravi Kumar, E S Dwarakadas, Effect of matrix strength on the mechanical properties of Al-ZN-Mg/SiCp composites” Composites Part A 31, (2000) pp.1139-1145

12.     N Srikanath, d. Saravanaranganathan, M.Gupta, L.Lu, and M O Lai, “Modelling and determination of dynamic elastic modulus of magnesium based metal matrix composites” Material Science and Technology, March 2000, vol.16, pp.309-314.

13.     S C Sharma, The effect of ageing duration on the mechanical properties of Al alloy 6061-garnet composites, Proc. Instn. Mech. Engrs., vol.215 part L, (2001) pp.113-119

14.     J B Shamul, C Hammond, and R F Cochrane, “Comparative characterisation of damping behaviour of aluminium alloy composites produced by different fabrication techniques” , Material Science and Technology.

15.     Hsu-Shen Chu, Kuo-Shung Liu, and Jien-Wei Yeh, “Damping behavior of in situ Al-(graphite, Al4C3) composites produced by reciprocating extrusion, Journal Material Research, vol.16, no.5 (2001) pp.1372-1380..

16.     Hus-Shen Chu, Kuo-Shung Liu, and Jien-Wei Yeh, Damping behavior of in situ Al-(Graphite, Al4C3) composites produced by reciprocating extrusion “ Journal of Material Research, vol.16, no.5, (2001) pp.1372-1380. 

17.     G Snoek; Phys. Status Solidi., 1969, vol.32, pp.651-658.

18.     K K Chawla, A H Esmaeli, A K Datye and A K vasudevan, scr. Metall. Mater., 1991, 25, 1315-1319.

38-42

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

10.

Authors:

Sneha Radadia, Ved Vyas Dwivedi, Rachana Jani

Paper Title:

Theoretical Investigation on Metamaterial Coupler: A Comparative Study

Abstract: Two novel edge-coupler-line composite right/left-handed metamaterial couplers are presented in this paper, a symmetric “impedance coupler” and an asymmetric “phase coupler”, explained by a even/odd mode analysis. These two couplers are based on fundamentally different principles but exhibit the advantage of providing arbitrary coupling levels(up to quasi-complete coupling), where as conventional edge-coupled couplers are typically limited to less than 10-dB maximum coupling, while conserving the broad-bandwidth Benefit of their convention counterparts. The coupler is shown to exhibit broad bandwidth and tight coupling.    

Keywords:
Composite right-/left-handed (CRLH) transmissionlines (TLs), coupled lines, metamaterials.


References:

1.     V. Veselago, “The electrodynamics of substances with simultaneously  negative values of “and _,” Sov. Phys. Uspekhi, vol. 10, no. 4, pp. 509–514, Jan.–Feb. 1968.
2.     R.Mongia, I. bahl,and P.bhartia, RF and microwave coupled-line circuits, artech house, narwood, MA.1999.

3.     D. M. Pozar, Microwave Engineering, 2nd ed. New    York:Wiley, 1998.

4.     C.caloz, A sanada and T.itoh,”A novel composite right/left handed coupled line directional coupler with arbitrary coupling level and broad bandwidth”,IEEE trans. Microwave theory tech. val 52,no.3,pp.980-992,mar.2004.

5.     C.caloz and T.itoh “A novel mixed conventional microstrip and composite right/left handed backward-wave directional coupler with broadband and tight coupling characteristics,”IEEE microwave wireless components left.vol-14 no.1,pp .31-33 ,jan-2004”

 

43-47

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

11.

Authors:

Deshmukh Shruti H, Sarman Hadia K

Paper Title:

Performance Evaluation of Resource Allocation Technique for OFDMA WiMAX System

Abstract: Orthogonal frequency division multiple access (OFDMA) has recently attracted vast research attention from both academia and industry and has become part of new standards for broadband wireless communication. In this paper, I addressed the radio resource allocation in the downlink of an OFDMA system and K&H and MPF scheduler algorithm for resource allocation. By comparing the output parameter of both the algorithm get the performance characteristics of OFDMA system. Both scheduling algorithm are based on the quality of service (QoS) requirements of each service flow in terms of BER and data rate. The results show that the algorithms give way fairness among real-time and non real-time service flows as well as guaranteeing their constraint in term of QoS and spectrum efficiency.

Keywords:
Layer, IEEE802.16e, OFDMA, QoS, Scheduling, WiMAX


References:

1.     http://www.wimaxforum.org
2.     Ronak Farhadi, Vahid Tabataba Vakili, Shahriar Shirvani Moghaddam,”A Novel Cross-Layer Scheduling Algorithm for OFDMA-Based WiMAX Networks”, Int. J. Communications, Network and System Sciences, 2011, 4, 98-103.

3.     X. N. Zhu, J. H. Huo, S. Zhao, Z. M. Zeng and W. Ding,  “An    Adaptive Resource Allocation Scheme in OFDMA Based Multiservice WiMAX Systems,” Proceedings of 10th International Conferenece on Advanced Communication Technology, Phoenix Park, 17-20  February 2008, Vol. 1, pp. 593-597.

4.     T.Ali-Yahiya, A.-L. Beylot and G. Pujolle, “Radio  Resource Allocation in Mobile WiMAX Networks Using Service Flows,” Proceedings of IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Com- munications, Athens, 3-7 September 2007, pp. 1-5.

5.     M  Morelli, C.-C., JayKuo,and M.O. Pun, “Synchronization techniques for orthogonal frequency division multiple access (OFDMA): a tutorial review,” Proceedings of the IEEE  Vol. 95, No. 7, July 2007.

6.     Lu Yanhui, Wang Chunming, Yin Changchuan, and Yue Guangxin,”Downlink Scheduling and Radio Resource Allocation in Adaptive OFDMA Wireless Communication Systems for User-Individual QoS”, International Journal of Electrical and Electronics Engineering 3:2 2009.

 

48-53

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

12.

Authors:

Patel Henalkumari D, Rachna Jani, Jaymin Bhalani

Paper Title:

A Comparative Study of Different Low Power Techniques for SRAM

Abstract: There is three type of low power technique discussed here for Static random access memory. One is Quiet Bit line architecture in which the voltage of bit line stay as low as possible. To prevent the excessive full-swing charging on the bitline one-side driving scheme for write operation is used and for read precharge free-pulling scheme is used to keep all bit lines at low voltages at all times.  Second is Body bias technique which decreases the process variation on the SRAM cell and it can operate at 0.3 and write margin is not degraded. Third is half –swing Pulse-mode techniques in which Half-swing Pulse-mode gate family is used that uses reduced input signal swing without sacrificing performance and  to save the power, bit lines are operated from   instead of .

Keywords:
  Low power, SRAM, Body biasing, quiet bit line, Half-Swing Pulse-Mode, Low voltage.


References:

1.        M.yoshimoto, K. Anami, H.hinohara, T.Yoshihara, H. Takagi, S. nagao, S. Kayano and T.nakano, “”A divided word-line structure in the static RAM and its application to a 64 K full CMOS RAM”,” IEEE J. Solid-State Circuits, vol. 18, pp. 479-484, oct. 1983.
2.        T.Chappell, B. chappell, S. Schuster, J.Allan, S.Klepner, R.Joshi and R. Franch, “A 2- ns cycle, 3.8-ns access 512 kb CMOS ECL SRAM with fully piplined architecure,” IEEE J. od Solid State Circuits, vol. 29, no. November, pp. 1577-1584, 1991.

3.        K.Mai, T.Mori, B.Amrutur, R. ho, B.wilburn, M. Horowitz, I. Fukushi, T. Izawa and S. Mitarai, “Low-Power SRAm Design Using Half-Swing Pulse-Mode Technique,” IEEE J. of Solid State circuits, vol. 33, no. November, pp. 1659-1671, 1998.

4.        S.-P. Cheng and S.-Y. Huang, “A Low-power SRAM Design using Quiet-bitline Architecture,” in IEEE International Workshop On memory technology, Design and testing, 2005.

5.        F.Moradi, D. Wisland, H.Mahmoodi, Y.berg and T.Cao, “New SRAM Design Using Body Bias technique for ultra low power application,” 11th Int’l Symposium on
Quality Electronic Design, pp. 468-471, 2010. \

6.        S.Mutoh, T.Douseki, Y.Matsuya, T.Aoki, S.Shigematsu and J.Yamada, “1-V power supply high-speed digital circuit technology with multithreshold-voltage CMOS,” IEEE J. of Solid State Circuits, vol. 30, pp. 847-845, 1995.

7.        T.Kuroda, T.Fujita, S.Mita, T.Nagamatsu, S.Yoshioka, K.Suzuki, F.Sano, M.Murota, M.Kako, M. kinugawa, M.kakumu and T.Sakurai, “A 0.9V, 150-MHz, 10mW, 2-D discrete cosine transform core processor with variable threshold sceme,” IEEE J. of Solid-State Circuits, vol. 31, no. November, pp. 1770-1777, 1996.

8.        H. a. K.Roy, “Ultra low-power digital subthreshold logic circuits,” IEEE ISLPED, no. 1999, pp. 94-96, 1999.

9.        B. C. a. A.Chandrakasan, “A 256kb Sub-threshold SRAM in  

10.     65nm CMOS,” IEEE ISSCC, pp. 628-629, Feb 2006

 

54-58

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

13.

Authors:

S.Ramsankar,S.Paul sathiyan

Paper Title:

Optimized Control Technique for Power Window in Smart Car using H Filter

Abstract: A practical pinch torque estimator based on the H∞ filter is proposed for low-cost anti-pinch window control systems. To obtain the acceptable angular velocity measurements, the angular velocity calculation algorithm was proposed with the measurement noise reduction logics in previous method. Apart from the previous works based on the angular velocity or torque estimates for detecting the pinched condition, the proposed pinch detection algorithm makes use of the torque rate information integrated with state flow chart. To do this, the torque rate is augmented to the system model and the torque rate estimator is derived by applying the steady-state H∞ filter recursion to the model. The motivation of this approach comes from the idea that the torque rate is less sensitive to the motor parameter uncertainties. Moreover, the statistics of modeling errors and angular velocity measurement noises are actually unknown. Hence, the proposed scheme minimizes the anti-pinch window control system’s exposure to the false alarm. To detect the pinched condition, a systematic way to determine the threshold level of the torque rate estimates is also suggested via the deterministic estimation error analysis. Experimental results certify the pinch detection performance of the proposed algorithm and its robustness against the motor parameter uncertainties.

Keywords:
Torque Estimation; Pinch Detection; Anti-PinchWindow Control Systems;  steady-state H∞ Filter; State flow chart.


References:

1.       H. W. Kim and S. K. Sul, “A New Motor Speed Estimator using Kalman Filter in Low-Speed Range”, IEEE Trans. Industrial Electronics, vol. 43,pp.498-504, 1996
2.       Robert P. Gerbetz, “Method of Compensating for Abrupt Load Changes in an Anti-Pinch Window Control System”, US Patent, US2002/0190680 A1, 2002..

3.       X.de Frutos,”Anti-Pinch Window Control Drive Circuit”, US Patent, US2003/0137265 Al, 2003.

4.       G. S. Buja, R. Menis and M. I. Valla, “Disturbance Torque Estimation in a Sensorless DC Drive”, IEEE Trans. Industrial Electronics, vol. 42, pp. 351-357, 1995.

5.       N. Syed-Ahmad and F M. Wells, “Torque Estimation and Compensation for Speed Control of a DC Motor using an Adaptive Approach”, 36th Midwest Symposium on Circuits and Systems, Detroit, MI, pp. 68-71, 1993.

6.       Won-Sang Ra, Hye-Jin Lee, Jin Bae Park, Senior Member, IEEE, and Tae-Sung Yoon, Member, IEEE “Practical Pinch Detection Algorithm for Smart Automotive Power Window Control Systems” IEEE Trans. Industrial . 55, no. 3, March 2008

7.       T. Mimuro, Y. Miichi, T. Maemura, and K. Hayafune, “Functions and devices of Mitsubishi active safety ASV,” in Proc. Intell. Veh. Symp., pp. 248–253,1996
8.       W. S. Ra, S. H. Jin and J. B. Park, “Set-Valued Estimation Approach to Recursive Robust H,, Filtering”, IEE Proc., Control Theory Appl., vol. 151, pp. 773-782, 2004.
9.       L. Salvatore and S. Stasi, “LKF Based Robust Control of Electrical Servodrives”, IEE Proceedings of Electric Power Applications, vol. 142,  pp. 161-168, 1995.

59-64

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

14.

Authors:

M.Saranya , D.Pamela

Paper Title:

A Real Time IMC Tuned PID Controller for  DC Motor

Abstract: This paper presents a Internal Model Control(IMC) tuned PID controller method for the DC motor for robust operation.IMC is a process model approach to design the PID controller parameter to obtain the optimal setpoint tracking and load disturbance rejection.This method of control which is based on the accurate model of the process,leads to the design of a control system that is stable and robust.The results of the IMC tuning method when compared with the Ziegler Nichols (ZN) closed loop tuning provides a commendable improvement in the overshoot,rise time and settling time of the system.Simulated results in LabVIEW and Matlab using the PID and IMC are presented and also the same has been implemented and tested for a 12volt DC motor.

Keywords:
Controller; DC motor speed control system; Internal Model Control; Z-N Tuning


References:

1.        Wang, J. B, Control of Electric Machinery. Gau Lih Book co., Ltd, Taipei Taiwan, 2001.
2.        G. Haung and S. Lee, “PC based PID speed control in DC motor,” IEEE Conf. SALIP-2008, pp. 400-408, 2008.

3.        P. Kundur, Power system stability and control, McGraw-Hill, 1994.

4.        D. E. Seborg, T. F. Edgar, and D. A. Mellichamp, Process dynamics and control, John Wiley & Sons, Second edition, New York, 2004.

5.        J. G. Ziegler and N. B. Nichols, “Optimum settings for automatic controller”, Transactions ASME, vol. 64, pp. 759-766, 1942.

6.        O. Montiel, R. Sepúlveda, P. Melin and O. Castillo, “ Performance of a simple tuned Fuzzy controller and a PID controller on a DC motor,” Procee. of IEEE (FOCI 2007), pp. 531-538, 2007.

7.        I. L. Chien, and Fruehauf, “Consider IMC tuning to improve controller  performance”, Chemical Engineering Program, vol. 86, pp. 33-38, 1990.

8.        O. Aidan and Dwyer, Handbook of PI and PID controller tuning rule, Imperial College Press, London, 2003.

9.        I. G. Horn, J. R. Arulandu, J. G. Christopher, J.G. VanAntwerp, and R. D. Braatz, “Improved filter design in internal model control” Industrial Engineering Chemical Research, vol. 35, pp. 33-37, 1996.

10.     Y. Lee, S. Park, and M. Lee, “Consider the generalized IMC-PID method for PID controller tuning of time-delay processes” ,Hydrocarbon Processing, 2006, pp. 87-91.

11.     Y. Lee, S. Park, M. Lee, and C. Brosilow, “PID controller tuning for desired closed-loop responses for SISO systems” AICHE Journal, vol 44, pp. 106-115, 1998.

12.     M. Morari and E.Zafiriou, Robust Process Control, Prentice Hall, Englewood Cliffs, NJ, 1989.

13.     D. E. Rivera, M. Morari, and S. Skogestad, “Internal model control, 4. PID controller design” ,Industrial Engineering Proceeding Design Deu. vol. 25, pp. 252-258, 1986.

 

65-70

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

15.

Authors:

S.Vijay

Paper Title:

A Comparison of Different Measures to Evaluate the Semantic Relatedness of Text and its Application

Abstract: This paper presents a knowledge-based and experiment-based method for measuring the semantic similarity of texts. While there is a large body of previous work focused on finding the semantic similarity of concepts and words, the application of these word oriented methods to text similarity has not been yet explored. Five different proposed measures of similarity or semantic distance in WordNet were experimentally compared by examining their performance in a real-word spelling correction system.

Keywords:
Dictionary-based, Information-based, Lexical-based, WordNet.


References:

1.          Eneko Agirre and German Rigau. 1996. Word sense disambiguation  using conceptual density. In Proceedings of the 16th International Conference on Computational  Linguistics, pp. 16–22, Copenhagen.
2.          Alan Agresti and Barbara Finlay. 1997. Statistical Methods for the Social Sciences (third edition). Prentice-Hall. 

3.          Alexander Budanitsky. 1999. Lexical Semantic Relatedness and its  Application in Natural Language Processing,  technical report

4.          CSRG-390, Department of Computer  Science, University of Toronto, August 1999.         

5.          Alexander Budanitsky and Graeme Hirst. In preparation. Semantic relatedness between lexicalized concepts.

6.          Christiane Fellbaum, editor. 1998. Word Net: An Electronic Lexical Database. The  MIT  Press.

7.          Victoria A. Fromkin. 1980. Errors in linguistic  performance: Slips of the tongue, ear, pen, and hand.  Academic Press.

8.          M.A.K. Halliday and Ruqaiya Hasan. 1976. Cohesion in English. Longman.
9.          Graeme Hirst and David St-Onge. 1998. Lexical chains as representations of context for the detection and correction of malapropisms. In Fellbaum 1998, pp. 305–332.
10.       Michael Hoey. 1991. Patterns of Lexis in Text. Oxford  University Press.

11.       Jay J. Jiang and David W. Conrath. 1997. Semantic  similarity based on corpus statistics and lexical taxonomy. In Proceedings of International Conference on Research  in Computational Linguistics, Taiwan.

12.       Claudia Leacock and Martin Chodorow. 1998. Combining  local context and WordNet similarity for word sense identification. In Fellbaum 1998, pp. 265–283.

13.       Dekang Lin. 1998. An information-theoretic definition of   similarity. In Proceedings of the 15th International  Conference on Machine Learning, Madison, WI.
14.       George A. Miller and Walter G. Charles. 1991. Contextual  correlates of semantic similarity. Language and Cognitive  Processes,  6(1): 1–28.
15.       Jane Morris and Graeme Hirst. 1991. Lexical cohesion computed by thesaural relations as an indicator of the structure of text. Computational Linguistics, 17(1): 21–48.

16.       Roy Rada, Hafedh Mili, Ellen Bicknell, and Maria Blettner. 1989. Development and application of a metric on semantic nets. IEEE Transactions on Systems,Man, and Cybernetics, 19(1): 17–30.

17.       Philip Resnik. 1995. Using information content to evaluate semantic  similarity. In Proceedings of the 14th International Joint Conference on Artificial Intelligence,  pages 448–453, Montreal.

18.       Herbert Rubenstein and John B. Goodenough. 1965.Contextual correlates of synonymy.Communications of  the ACM, 8(10): 627–633.

19.       Michael Sussna. 1993. Word sense disambiguation for free-text indexing using a massive semantic network. In Proceedings of the Second International Conference on Information and Knowledge Management (CIKM-93),  pages 67–74, Arlington, VA. Agresti, Alan and Barbara Finlay. 1997. Statistical Methods for the  Social Sciences. Prentice Hall, Upper Saddle River, NJ, 3rd edition.

20.       Banerjee, Satanjeev and Ted Pedersen. 2003. Extended gloss overlaps as a measure of semantic relatedness. In Proceedings of the Eighteenth International Joint Conference on Artificial Intelligence, Acapulco, Mexico, pages 805–810, August.

21.       Barsalou, LawrenceW. 1983. Ad hoc categories. Memory and Cognition, 11:211–227.

22.       Barsalou, LawrenceW. 1989. Intra-concept similarity and its implications for interconcept similarity. In Stella Vosniadou and Andrew Ortony, editors, Similarity and Analogical Reasoning.  Cambridge University Press, pages 76–121.

 

17-77

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

16.

Authors:

Rohit Maheshwari, Sunil Pathak

Paper Title:

A Proposed Secure Framework for Safe Data Transmission in Private Cloud

Abstract: Cloud security is the current discussion in the IT world. In the cloud, the data is transferred among the server and client. This research paper helps in protecting the data from unauthorized entries into the server, the data is secured in server, based on users’ choice of security method, so that data is given high secure priority without affecting the lower layer

Keywords:
Cloud, data Transmission, Secure framework, Security.


References:

1.        Lombardi F, Di Pietro R. Secure virtualization for cloud computing. Journal of Network Computer Applications (2010), doi:10.1016/j.jnca.2010.06.008.
2.        Subashini S, Kavitha V., “A survey on security issues in service     delivery models of  cloud computing,” Journal of Network and Computer Applications (2011) vol. 34 Issue 1, January 2011 pp. 1-11.

3.        Sudha.M, Bandaru Rama Krishna rao, M.Monica, “A Comprehensive approach to ensure secure data communication in cloud environment” International Jornal Of computer Applications, vol. 12. Issue 8, pp. 19-23.

4.        Balachander R.K, Ramakrishna P, A. Rakshit, “Cloud Security Issues, IEEE International Conference on Services Computing (2010),” pp. 517-520.

5.        Cong Wang, Qian Wang, Kui Ren, and Wenjing Lou, “Ensuring Data Storage Security in Cloud Computing” proceeding of International workshop on Quality of service 2009”, pp.1-9.

6.        Gary Anthes, “Security in the cloud,” In ACM Communications (2010), vol.53, Issue11, pp. 16-18.

7.        Kresimir Popovic, Željko Hocenski, “Cloud computing security issues and challenges,” MIPRO 2010, pp. 344-349.

8.        Kikuko Kamiasaka, Saneyasu Yamaguchi, Masato Oguchi, “Implementation and Evaluation of secure and optimized IP-SAN Mechanism,” Proceedings of the IEEE
International Conference on Telecommunications, May 2007, pp. 272-277.

9.        Luis M. Vaquero, Luis Rodero-Merino, Juan   Caceres1, Maik Lindner, “A Break in Clouds: Towards a cloud Definition,” ACM SIGCOMM Computer Communication Review, vol. 39, Number 1, January 2009, pp. 50-55.

10.     Patrick McDaniel, Sean W. Smith, “Outlook:    Cloudy with a chance of security challenges and improvements,” IEEE Computer and reliability societies (2010), pp. 77-80.

11.     Sameera Abdulrahman Almulla, Chan Yeob Yeun, “Cloud Computing Security Management,” Engineering systems management and its applications (2010), pp. 1-7.

12.     Steve Mansfield-Devine, “Danger in Clouds”, Network Security (2008), 12, pp. 9-11.

13.     Anthony T. Velte, Toby J.Velte, Robert Elsenpeter, Cloud Computing: A Practical Approach, Tata Mc GrawHill 2010.

14.     Siva Rama Krishnan Somayaji, Ch.A.S Murty, “Securing IP Storage: A case study,”   International Journal of Next Generation Network (2010), vol. 2, Issue 1. Pp. 19-28.

 

78-82

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

17.

Authors:

Ritu Khatri, Kanwalvir Singh Dhindsa, Vishal Khatri

Paper Title:

Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines

Abstract:  As we know that www is allowing peoples to share the huge information globally from the big database repositories. The amount of information grows billions of databases. Hence to search particular information from these huge databases we need the specialized mechanism which helps to retrieve that information efficiently. Now days various types of search engines are available which makes information retrieving is difficult. But to provide the better solution to this problem, semantic web search engines are playing vital role. Basically main aim of this kind of search engines is to providing the required information is small time with maximum accuracy. But the problem with semantic search engines is that those are vulnerable while answering the intelligent queries. These kinds of search engines don’t have much efficiency as per expectations by end users, as most of time they are providing the inaccurate information’s. Thus in this paper we are presenting the new approach for semantic search engines which will answer the intelligent queries also more efficiently and accurately. With the keywords based searches they usually provide results from blogs or other discussion boards. The user cannot have a satisfaction with these results due to lack of trusts on blogs etc. To get the trusted results search engines require searching for pages that maintain such information at some place. Here propose the intelligent semantic web based search engine. We use the power of xml meta-tags deployed on the web page to search the queried information. The xml page will be consisted of built-in and user defined tags. The metadata information of the pages is extracted from this xml into rdf. Our practical results showing that proposed approach taking very less time to answer the queries while providing more accurate information. 

Keywords:
Information retrieval, Intelligent Search, Search Engine, Semantic web, XML, RDF. 


References:

1.     Berners-Lee, T., Hendler, J. and Lassila, O. “The Semantic Web”, Scientific American, May 2001.
2.     Deborah L. McGuinness. “Ontologies Come of Age”. In Dieter Fensel, J im Hendler, Henry Lieberman, and Wolfgang Wahlster, editors. Spinning the Semantic Web: Bringing the World Wide Web to Its Full Potential. MIT Press, 2002.

3.     Ramprakash et al “Role of Search Engines in Intelligent Information Retrieval on Web”, Proceedings of the 2nd National Conference; INDIACom-2008.

4.     R. Bekkerman and A. McCallum, “Disambiguating Web Appearances of People in a Social Network,” Proc. Int’l World Wide Web Conf. (WWW ’05), pp. 463-470, 2005.

5.     G. Salton and M. McGill, Introduction to Modern Information Retreival. McGraw-Hill Inc., 1986.

6.     M. Mitra, A. Singhal, and C. Buckley, “Improving Automatic Query Expansion,” Proc. SIGIR ’98, pp. 206-214, 1998.

7.     P. Cimano, S. Handschuh, and S. Staab, “Towards the Self-Annotating Web,” Proc. Int’l World Wide Web Conf. (WWW ’04),2004.

8.     G. Antoniou and F. van Harmelen, A Semantic Web Primer, (Cooperative Information Systems). 2nd ed. 2008: The MIT Press.

9.     F. Manola, E. Miller, and B. McBride, RDF primer. W3C recommendation, Vol. 10, No., 2004.

10.  “World Wide Web Consortium (W3C)”.http://www.W3C.org

11.  “Google Search Engine”.http://www.google.com

12.  “Yahoo Search Engine”.http://www.yahoo.com

13.   “SWISE: Semantic Web based Intelligent Search Engine” Faizan Shaikh, Usman A. Siddiqui, Iram Shahzadi Department of Computer Science, National University of Computer & Emerging Sciences Karachi, Pakistan,2010,IEEE.

14.   “Automatic Discovery of Personal Name Aliases from the Web”, Danushka Bollegala, Yutaka Matsuo, and Mitsuru Ishizuka, Member, IEEE, June 2011.

15.  Dan Meng, Xu Huang “An Interactive Intelligent Search Engine Model Research Based on User Information Preference”, 9th International Conference on Computer Science and Informatics, 2006 Proceedings, ISBN 978-90-78677-01-7.

16.  Xiajiong Shen Yan Xu Junyang Yu Ke Zhang “Intelligent Search Engine Based on Formal Concept Analysis” IEEE International Conference on Granular Computing, pp 669, 2-4 Nov, 2007.

83-87

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

18.

Authors:

Rashmi Bohra, Vijay Singh Rathore

Paper Title:

Collaboration between SOA and Cloud Computing at a Glance

Abstract: SOA (Service Oriented Architecture) is an architectural style which is about orchestration of services whereas cloud computing is an autonomic computing which delivers computing as a service rather than product. People may consider SOA and Cloud as competitors but they complement each other. Cloud computing embraces the notion of “everything as a service” and covers three categories of service: infrastructure, platform and software as a service. SOA’s approach of managing and governing processes is well-defined and has a potential for being applied to everything as a service in cloud. Since SOA is a relatively mature field, than Cloud, there is a good scope for cloud computing to judiciously inherit from best practice in SOA governance.

Keywords:
agility, governance, scalability, services. 


References:

1.        Cloud governance: Learning from SOA : Alan Earls
2.        http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf : National Institute of Science and Technology. Retrieved 24 July 2011.

3.        http://www.webopedia.com

4.        Voorsluys, William; Broberg, James; Buyya, Rajkumar (February 2011). “Introduction to Cloud Computing”. In R. Buyya, J. Broberg, A.Goscinski. Cloud Computing: Principles and Paradigms. New York, USA: Wiley Press. pp. 1-44.ISBN 978-0470887998.

5.        Chou, Timothy : searchcloudcomputing.techtarget.com

6.        SOA fundamentals in a nutshell: Prepare to become an IBM Certified SOA Associate: Mohamed I. Mabrouk

7.        An Implementor’s Guide to Service Oriented Architecture, Getting It Right www.SOAguidebook.com             

8.        ISBN-13: 978-0-9799304-0-9 , ISBN-10: 0-9799304-0-5,2008 }

9.        www.ibm.com/developerworks/mydeveloperworks/

10.     www.devcentral.f5.com/weblogs/macvittie/archive/2010/07/21/paas-is-just-soa-for-platforms-without-the-baggage.aspx

11.     Forrester’s John Rymer: cloud computing changes software architecture Date: Oct 18, 2011

88-91

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

19.

Authors:

A.Priyadharshini,  N.Devarajan, AR.Uma saranya, R.Anitt

Paper Title:

Survey of Harmonics in Non Linear Loads

Abstract: The use of non linear loads is increasing day by day. This increasing use of non linear loads has created more distortions in current and voltage waveforms. This increased power quality disturbances has lead to various optimizations techniques and filter designs. Harmonic distortions are the major cause for power quality problems. For this analyzing the harmonics present in non linear loads is significant. Here a survey is made to show details of harmonics present in various non linear loads.

Keywords:
Non linear loads, Harmonics, Power quality. 


References:

1.           J. Arillaga, et al, “Power System Harmonics” ISBN 0-471-90640-9.
2.           Copyright Hawaiian Electric Company, Inc. 2004 “A Harmonics primer”.

3.           IEEE Std 519-1992, IEEE Recommended Practices and Requirements for Harmonic Control in Electrical Power Systems.

4.           IEEE Electrical Insulation Magazine,” The Effect of Voltage Distortion on Ageing Acceleration of Insulation Systems under Partial Discharge Activity”

5.           J.L.Hernandez , MA. Castro, J. Carpio  and A. Colmenar, “Harmonics in power systems” in International Conference on Renewable Energies and Power Quality (ICREPQ’09).

6.           EC & M magazine, edition 2012.

7.           Square D “Product data bulletin” Power System Harmonics Causes and Effects of Variable Frequency Drives Relative to the IEEE 519-1992 Standard. Bulletin No. 8803PD9402 August, 1994 Raleigh, NC, U.S.A.

8.           Allen-Bradley “Power system harmonics- A Reference Guide to Causes, Effects and Corrective Measures” in Rock well automation, A Reference Guide to Causes, Effects and Corrective Measures.

9.           Lorenzo Cividino-Power products development manager “Power Factor, Harmonic Distortion Causes, Effects and Considerations”, Telecommunications Energy Conference, 1992.INTELEC ‘92.14th  International , 1992 , Page(s): 506 – 513.

10.        Joseph.S, Sunbjak.JR,John s.Mcquililkin-Members IEEE,” Harmonics – Causes, Effects, Measurements, and Analysis: An Update” IEEE transactions on applications, vol. 26. NO.6 November/December 1990.

11.        M.I.Abu Bakar”Assessments for the Impact of Harmonic Current Distortion of Non Linear Load In Power System Harmonics”, Transmission and Distribution Conference and Exposition: Latin America, 2008 IEEE/PES, 2008 , Page(s): 1 – 6.

12.        David Kreiss “Increasing levels of non linear loads adds to harmonic woes” Vol. 1 No. 2 Summer 1995 A Quarterly publication of Dranetz Technologies,INC. Powercet corporation and Kreiss-Johnson Technologies.

13.        Dr. R.K. Tripathi, Member, IEEE & Mr. Chandreshver Pratap Singh” Power Quality Control of Unregulated Non-linear Loads 978-1-4244-8542-0/10/$26.00 ©2010 IEEE

14.        Gonzalo Sandoval,ARTECHE / INELAP S.A. de C.V.” Power Factor in Electrical Power Systems with Non-Linear Loads”

15.        Hossein Mokhtari Sharif University of Tech Tehran, “Nonlinear Loads Effect on Harmonic Distortion and Losses of Distribution Networks” Mohammad Jawad Ghorbani, Salar Atashpar, Arash Mehrafrooz Iran Energy Efficiency Organization (IEEO) Tehran, Iran

16.        Anne Ko,Wunna Swe,Aung Zeya,”Analysis of Harmonic Distortion in Non-linear Loads”- The First International Conference on Interdisciplinary Research and Development, 31 May – 1 June 2011, Thailand

17.        Dranetz”Power line harmonic problems-causes and cures” 1994

18.        S.Kim,P.Enjeti,D.Rendusara,I.J. Pitel “A new method to improve THD and reduce harmonics generated by a three phase diode rectifier type utility interface”, Industry Applications Society Annual Meeting, 1994., Conference Record of the 1994 IEEE, 1994 , Page(s): 1071 – 1077 vol.2.

19.        Sangsun Kim, Member, IEEE, Maja Harfman Todorovic, Student Member, IEEE, and Prasad N. Enjeti, Fellow, IEEE” Three-Phase Active Harmonic Rectifier (AHR) to Improve Utility Input Current THD in Telecommunication Power Distribution System” IEEE transactions on industry applications , vol .39 , No5,September/October 2003.

20.        Hussain S. Athab, IEEE Member, P. K. Shadhu Khan, senior IEEE Member” A Cost Effective Method of Reducing Total Harmonic Distortion (THD) in Single-Phase Boost Rectifier”,Power Electronics and Drive Systems, 2007. PEDS’07. 7th International Conference, Page(s): 669 – 674, 2007.

21.        Predrag Pejovic´ and ˇ Zarko Janda”An Improved Current Injection Network for Three-Phase High-Power-Factor Rectifiers that Apply the Third Harmonic Current Injection” IEEE transactions on industrial electronics,vol.47,no.2, April 2000.”
22.        V. Cuk, J.F.G. Cobben, W.L. Kling, and R.B. Timens” An Analysis of Diversity Factors applied to Harmonic Emission Limits for Energy Saving Lamps”, Harmonics and Quality of Power (ICHQP), 2010 14th International Conference, 2010, Pages:1-6.
23.        ] M.C. Falvo, Member, IEEE, U. Grasselli, Member, IEEE, R. Lamedica, Member, IEEE, and   A.Prudenzi, Member, IEEE” Harmonics monitoring survey on office LV Appliances” 2000.

24.        ] H. Sharma, Member, IEEE, W. G. Sunderman, Member, IEEE, and A. Gaikwad, Member, IEEE Harmonic Impacts of Widespread Use of CFL Lamps on Distribution Systems”1991.

25.        Khodijah Mohamed, Hussain Shareef , Azah Mohamed, “Analysis of Harmonic Emmision from Dimmable Compact Fluorescent Lamps” 2011 International Conference on Electrical Engineering and Informatics 17-19 July 2011, Bandung, Indonesia.

26.        I. F. Gonos, M. B. Kostic, M. B. Kostic,” Harmonic Distortion in Electric Power Systems Introduced by Compact Fluorescent Lamps”,Electric Power Engineering, 1999. PowerTech Budapest 99.International Conference   1999.

27.        Gluskin, E Emanuel Gluskin,Department of Electrical and Computer Engineerhg Ben-Gurion University of the Negev”High harmonic currents in flouescent lamp circuits”, Industry Applications Society Annual Meeting, 1988., Conference Record of the 1988 IEEE , 1988 , Page(s): 1852 – 1854 vol.

28.        Ashok D. Pateliya, Manish N. Sinha”Simulation of Harmonics Producing Loads in Power System Network” in National Conference on Recent Trends in Engineering & Technology. 13-14 May 2011.

29.        J. Sousa, M.T. Correia de Barros,M. Covas ,A.Simões” Harmonics and Flicker Analysis in Arc Furnace Power Systems”.

30.        Rahmat Allah Hooshmand* and Mahdi Torabian Esfahani”Optimal Design of TCR/FC in Electric Arc Furnaces for Power Quality Improvement in Power Systems” in Leonardo Electronic Journal of Practices and Technologies,ISSN 1583-1078 Issue 15, July-December 2009 p. 31-50.

31.        Dr. W. Z. Gandhare and D. D. Lulekar, Govt. College of Engineering, Aurangabad (Maharashtra), India” Analyzing Electric Power Quality in Arc Furnaces”, International Conference of Renewable Energy and Power Quality, March 2007.

32.        Wang Yongning, Li Heming, Xu Boqiang, Member, IEEE, Sun Lilhg, Student Member, IEEE” in2004 International Conference on Power System Technology – Powercon 2004 Singapore, 21-24 November 2004.

33.        N. Browne, Member, IEEE, S. Perera, Member, IEEE, P.F Ribeiro, Fellow, IEEE.”Harmonic Levels and Television Events”,Power Engineering Society General Meeting, 2007. IEEE,  2007, Page(s): 1 – 6.

34.        Grady, W.M.; Mansoor, A.; Fuchs, E.F.; Verde, P.; Doyle M,  Harmonic Levels and Television Events “Estimating the Net Harmonic Currents Produced by Selected Distributed Single-Phase Loads: Computers, Televisions, and Incandescent Light Dimmers”, Power Engineering Society Winter Meeting, 2002. IEEE Volume: 2, Year:
2002, Page(s): 1090 – 1094 vol.2 Cited by: 5.

35.        T. Inouye, D.Eng., and T. Tarui, D.Eng.” Detailed analysis of 3rd-harmonic tuning of television horizontal-deflection circuit”, Electrical Engineers, Proceedings of the Institution of Vol: 118, Issue:6, 1971, Pages: 756-757.

36.        E.F.Fuchs, D.J.Joesler, K.P.Kovacs” Sensitivity of electrical appliances to harmonics and fractional harmonics of the power system’s voltage.part ii: television sets, induction watthour meters and universal machines” in IEEE transactions on power delivery, vol. pwrd-2, no. 2, April 1987.

37.        Rana A. Jabbar, Muhammad Junaid, M. Ali Masood and Khalid Saeed Akhtar Rachna College of Engineering & Technology, Gujranwala, Pakistan” Impacts of Harmonics caused by Personal Computers on Distribution Transformers,Electrical Engineering, 2009. ICEE ’09. Third International Conference on 2009, pages 1-6.

38.        V.Tipsuwanporn, Member, IEEE, W.Thueksathit, and W.Sawaengsinkasikit”Harmonics, reduction system using active filter based on computer unit” in 2005 IEEE/PES transmission and distribution conference and exhibition: Asia, Pacific Dalian, China.

39.        Philip J. Moore, Senior Member, IEEE, and Iliana E. Portugués” The Influence of Personal Computer Processing Modes on Line Current Harmonics” in IEEE transactions on power delivery, vol. 18, no. 4, october 2003.

40.        A. Mansoor, W. M. Grady, P. T. Staats, R. S. Thallam, M. T. Doyle, M. J. Samotyj “Predicting the Net Harmonic Currents Produced by Large Numbers of Distributed Single-phase Computer Loads” in IEEE Transactions on Power Delivery, Vol. 10, No. 4, October 1995.

41.        H.O.Aintablian and H.W.Hil1, Jr” Harmonic Currents Generated by Personal Computers and their Effects on the Distribution System Neutral Current”, Industry Applications Society Annual Meeting, 1993, Conference Record IEEE, oct 1993, 1483 – 1489 vol.2.

42.        Dalil Paraiso, Éloi Ngandui, Martin de Montigny, Pierre Sicard” Characterization of Neutral and Line Current Harmonics in Three-Phase Computer Power Systems” Industrial Electronics Society, 2005.IECON 2005. 31st Annual Conference of IEEE, 2005

 

92-97

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

20.

Authors:

S.Gunasekaran, H.Abdulrauf, M.A.Harish, S.Premkumar, T.V.PriyaJ.Priyadarshini.

Paper Title:

A Single-Phase AC/AC Converter using Switch Reduction Technique

Abstract: This paper deals with the design of a single phase six switch AC/AC converter for UPS application. Reduced switch-count topology is used here. This converter is designed for calculating the optimal operating point of the converter based on the design specifications in order to maximize dc bus voltage utilization. It is designed in such a way that output voltage has less THD with unity power factor. This also enhances battery charging applications and also increases the input power. There by the proposed converter has Less THD of input current and output voltage and unity power factor. The strategies have been confirmed by both simulation and experimental results obtained from the converter which used for UPS applications.

Keywords
: UPS, AC/AC converter, PWM control, Switch reduction,THD. 


References:

1.        A. Fatemi1, M. Azizi, M. Shahparasti, M. Mohamadian, A. Yazdian” A Novel Single-Phase Six-Switch AC/AC Converter for UPS Applications” in 2011 2nd Power Electronics, Drive Systems and Technologies Conference.
2.        Chia-Chou Yehand MadhavD.Manjrekar,“A Reconfigurable Uninterruptible Power Supply System for Multiple Power Quality Applications” in IEEE transactions on power electronics, vol. 22, No. 4, July 2007.

3.        Congwei Liu, BinWu, Fellow, Navid R. Zargari,Dewei (David) Xu, and Jiacheng Wang,” A Novel Three-Phase Three-Leg AC/AC ConverterUsing Nine IGBTs” in IEEE transactions on power electronics, vol. 24, no. 5, May 2009.

4.        Gui-Jia Su and TetuhikoOhno” A New Topology for Single Phase UPS Systems” in 1997 IEEE

5.        Congwei Liu, Bin Wu, NavidZargariand David Xu”A Novel Nine-Switch PWM Rectifier-Inverter Topology For Three-Phase UPS Applications” in 2000 IEEE

6.        FengGao, Lei Zhang, Ding Li, Poh Chiang Loh, ,Yi Tang, and HouleiGao, Member, IEEE” Optimal Pulsewidth Modulation ofNine-Switch Converter” in IEEE transactions on power electronics, vol. 25, no. 9, September 2010”.

7.        M. Tarafdar. Haque” Single-phase PQ theory” in 2002 IEEE

 

98-102

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

21.

Authors:

Pankita A Mehta, Vivek Pandya

Paper Title:

Definitions and benefits of Distributed Generation Technologies

Abstract: The application of deregulation in the electric power sector and as a result of that, a new identity appeared in the electric power system map known as “distributed generation” (DG). Consistent with new technology, the electric power generation trend uses disbursed generator sized from kW to MW at load sits in preference to using traditional centralized generation units sized from 100MW to GW and situated far from the loads where the natural recourses are accessible. This paper introduces an appraisal of this revolutionary approach of DGs, which will change the way of electric power systems operate along with their types and operating technologies. Some important definitions of DGs and their operational constraints are discussed to help in understanding the concepts and regulations related to DGs. Furthermore, we will review the operational and economical benefits of implementing DGs in the distribution network. Most DG literatures are based on studying the definitions, constructions or benefits of DGs separately. Conversely, in our paper we aim to give a comprehensive review by adding new classifications to relate the DG types, technologies and applications to each other.

Keywords:
Distributed generation (DG), Fuel cell (FC), Micro-turbine (MT), Photovoltaic (PV), Wind turbine (WT)


References:

1.        J.L. Del Monaco, The role of distributed generation in the critical electric power infrastructure, in: Proceedings of the Power Engineering Society Winter Meeting IEEE, vol. 1, 2001, 144–145.
2.        A. Thomas, A. Göran, S. Lennart, Distributed generation: a definition, Electric Power Syst. Res. 57 (3) (2001) 195–204.

3.        P.P. Barker, R.W. De Mello, Determining the impact of distributed generation on power systems. I. Radial distribution systems, in: Proceedings of the Power Engineering Society Summer Meeting IEEE, vol. 3, 2000, pp. 1645–1656.

4.        S. Gilbert, The nations largest fuel cell project, a 1MW fuel cell power plant deployed as a distributed generation resource, Anchorage, Alaska project dedication 9 August 2000, in: Proceedings of the Rural Electric Power Conference, 2001, pp. A4/1–A4/8.

5.        M. Suter, Active filter for a microturbine, in: Proceedings of the Telecommunications Energy Conference, INTELEC 2001, Twenty-Third International, 2001, pp. 162–165.

6.        B. Lasseter, Microgrids [distributed power generation], in: Proceedings of the Power Engineering Society Winter Meeting IEEE, vol. 1, 2001, pp. 146–149.

7.        Willam, E. Liss, Natural gas power systems for the distributed generation market, in: Proceedings of the Power-Gen International’99 Conference, New Orleans, LA, 1999.

8.        M.W. Ellis, M.R. Von Spakovsky, D.J. Nelson, Fuel cell systems: efficient, flexible energy conversion for the 21st century, in: Proceedings of the IEEE, vol. 89, issue 12, December 2001, pp. 1808– 1818.

9.        M. Farooque, H.C. Maru, Fuel cells—the clean and efficient power generators, in: Proceedings of the IEEE, vol. 89, issue 12, 2001, pp. 1819–1829.

10.     Wm.L. Hughes, Comments on the hydrogen fuel cell as a competitive energy source, in: Proceedings of the Power Engineering Society Summer Meeting IEEE, vol. 1, 2001, 726–730.
11.     S. Rahman, Fuel gm as a distributed generation technology, in: Proceedings of the Power Engineering Society Summer Meeting IEEE, vol. 1, 2001, pp. 551–552.
12.     D. Xu, A.A. Girgis, Optimal load shedding strategy in power systems with distributed generation, in: Proceedings of the Power Engineering Society Winter Meeting IEEE, vol. 2, 2001, pp. 788–793.

13.     F.L. Alvarado, Locational aspects of distributed generation, in: Proceedings of the Power Engineering Society Winter Meeting IEEE, vol. 1, 2001, p. 140.

14.     M. Ilic, The information technology (IT) role in future energy generation, in: Proceedings of the Power Engineering Society Winter Meeting IEEE, vol. 1, 2001, pp. 196–198.

15.     L. Coles, R.W. Beck, Distributed generation can provide an appropriate customer price response to help fix wholesale price volatility, in: Proceedings of the Power Engineering Society Winter Meeting IEEE, vol. 1, 2001, pp. 141–143.

16.     A. Silvestri, A. Berizzi, S. Buonanno, Distributed generation planning using genetic algorithms, in: Proceedings of the Electric Power Engineering International Conference Power Tech,  Budapest, 1999, p. 257

17.     N. Hadjsaid, J.-F. Canard, F. Dumas, Dispersed generation impact on distribution networks, IEEE Computer Applications in Power, 12 (2) (1999).

 

103-111

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

22.

Authors:

Jani Nidhi R, S.K. Hadia, Jani Preetida V.

Paper Title:

Clustering Approach  For Distributed Cooperative Detection in Cognitive Radio Networks

Abstract: There have been significant advancements towards realizations of cognitive radios, as well as towards the development of the various enabling technologies needed for the diverse potential application scenarios of CRs. Nevertheless, we have also seen that a lot of further research and development work is definitely needed before general cognitive wireless networks can be realized. Cognitive radios (CRs) can exploit vacancies in licensed frequency bands to self-organize in opportunistic spectrum networks. Such networks, henceforth referred to as Cognitive Radio Networks (CRNs), operate over a dynamic bandwidth in both time and space. This inherently leads to the partition of the network into clusters depending on the spatial variation of the Primary Radio Network (PRN) activity. Many of the solutions mentioned earlier have been designed only for limited-size CRN, for example due to the presence of centralized controllers. However, we would ideally like to be able to extend such a paradigm to virtually infinite CRNs.  In this work, Weighted Clustering Algorithm designed for basic cluster formation for CRNs is proposed, which explicitly can take into account the spatial variations of spectrum opportunities in future.

Keywords:
  Cognitive Radio, Cooperative sensing, Weighted Clustering Algorithm. .


References:

1.    J. Mitola, “Software radios: Survey, critical evaluation and future directions,” IEEE Aerosp. Electron. Syst. Mag., vol. 8, pp. 25–31, Apr. 1993.
2.    Huiheng Liu, Wei Chen, “Cooperative Spectrum Sensing and Weighted-Clustering Algorithm for Cognitive Radio Network,”  I.J. Information Engineering and Electronic Business, 2011, 2, 20-27

3.    D. Cabric, S. M. Mishra, and R. Brodersen, “Implementation Issues in Spectrum Sensing for Cognitive Radios,” in Proc. 38th Asilomar Conf. Signals, Systems and Computers, Pacific Grove,CA, pp. 772-776, November 2004.

4.    Yi-bing Li, Xing Liu, Wei Meng, “Multi-node Spectrum Detection Based on the Credibility in Cognitive Radio System,” 5th International Conference on Wireless Communication, Networking and Mobile Computing, pp. 1-4, 2009

5.    Ayman Bassam Nassuora, Abdel-Rahman H. Hussein, “CBPMD: A New Weighted Distributed Clustering Algorithm for Mobile Ad hoc Networks (MANETs),” American Journal of Scientific Research ISSN 1450-223X Issue 22(2011), pp.43-56

6.    Alfred Asterjadhi, Nicola Baldo, Michele Zorzi, “A Cluster Formation Protocol for Cognitive Radio Adhoc Networks

 

112-116

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

23.

Authors:

Mohini Ratna Chaurasia, Nitin Naiyar

Paper Title:

A  Research  of  a New  Technique of  Open  Loop  Control  Algorithm  For Stepper  Motor  Using  CPLD 

Abstract: With  the  21st century  if  the  Stepper  Motor  and other  motors  operates  remotely  by the mobile phone it is obviously advantageous for the Industry. A Wireless remote reduces the difficulty for controlling the Stepper motor. But remote still offers limitations because it is limited in a particular range. If it is interfaced with the mobile phone as a remote control then the project will get higher usability and scope. Previously Stepper Motor movements were controlled through various types of devices such as microprocessor, microcontroller and PLC (programmable logic device) but all these have certain limitations that’s why in this research, another hardware solution is incorporated. Complex programmable logic device (CPLD) is suitable for fast implementation and quick hardware verification. CPLD based systems are flexible and can be reconfigured unlimited number of times. In this research Hardware Description Languages (VHDL) is used.

Keywords:
Stepper Motor, CPLD, Mobile phone, VHDL.


References:

1.        Zoonubiya     Ali          and          R.V. Kshirsagar “Development  of  a  CPLD  based  novel  open  loop  Stepper  motor  controller  for  high  performances  using  VHDL’’, 978-1-4244-7652-7/10/$26.00©2010 IEEE.
2.        Zoonubiya  Ali  and  R.V.Kshirsagar  “An open  loop stepper  motor  controller  based on CPLD” International Journal of Electronic Engineering Research  ISSN 0975 – 6450 Volume 2 Number 2 (2010) pp. 219–228.

3.        Suman Khakurel, Ajay Kumar Ojha, Sumeet Shrestha, Rasika N. Dhavse “Mobile Controlled Robots for Regulating DC Motors and their Domestic Applications” International Journal of Scientific & Engineering Research, Volume 1, Issue 3, December-2010 1 ISSN 2229-5518

4.        LingXi Pei, Chen Peng, Jing Guo, LiYan Wen “Pipelining Design Controlled by Stepper Motor Based on SCM” 978-1-4244-5182-1/10/$26.00 c_2010 IEEE

5.        Yang Mengda and  Zhu Min “A Research of A New Technique on Hardware Implementation of Control Algorithm of High-Subdivision for Stepper Motor”  978-1
4244-5046-6/10/$26.00 c_2010 IEEE

6.        Z. L. Kang and S. F. QU“ A New Methodology For Using  Single Microprocessor To Control DC Stepper Motors”

7.        Ming-Fa Tsai, Member, IEEE, and Hsien-Chang Chen “Design and Implementation of a CPLD-Based SVPWM ASIC for Variable-Speed Control of AC Motor Drives”

8.        Ming-Fa Tsai and Chien-Pang Chen “Design of a Quadrature Decoder/Counter Interface IC for Motor Control Using CPLD”  0-7803-7474-6/02/$17.00 82002 IEEE.

9.        Xiaohua Zhang1, Bingji Xu2 “Research on Stepper Motor Control Based on Single Chip and Serial Communication” 978-1-4244-671 9/10/$26.00 ©2010 IEEE

 

117-119

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

24.

Authors:

A.Ramya, G.Dhivya, P.Dhivya Bharathi, R.Dhyaneswaran, P.Ramakrishnan

Paper Title:

Comparative Study of Speed Control of 8/6 Switched Reluctance Motor Using Pi and Fuzzy Logic Controller

Abstract: This paper deals with the comparative study of speed control of 8/6 Switched Reluctance Motor using PI and Fuzzy Logic Controller. Nowadays the Switched Reluctance Motor has gained more and more attraction in industries. The speed of the Switched Reluctance Motor is controlled using both PI and Fuzzy Logic speed Controller in MATLAB/Simulink environment. The simulation result shows that Fuzzy Logic Controller is superior to PI controller.

Keywords:
  Switched Reluctance Motor (SRM), Fuzzy Logic Controller (FLC), PI Controller, and Speed Control .


References:

1.    S. Vijayan, S. Paramasivam, R. Arumugam, S. S. Dash, K. J. Poornaselvan, “A Practical approach to  the Design and Implementation of Speed Controller for Switched Reluctance Motor Drive using Fuzzy Logic Controller”, Journal of Electrical Engineering, vol.58, No.1, 2007, pp. 39-46.
2.    T. J. E. Miller, “Switched Reluctance Motors and their Control”, Magna Physics Publishing and Clarendon Press-Oxford, 1993.

3.    R. Krishnan, “Switched Reluctance Motor Drives: Modelling, Simulation, Analysis, Design and Applications”, CRC Press, 2001.

4.    Vikas S. Wadnerkar, Dr.G.TulasiRam Das, Dr.A.D.Rajkumar, “Performance Analysis Of Switched Reluctance Motor; Design,Modeling And Simulation Of  8/6 Switched Reluctance Motor” Journal of Therotical And Applied Information Technology, 2005-2008.

5.    M. G. Rodrigues, W. I. Suemitsu, P. Branco, J. A. Dente, L. G. B. Rolim, “Fuzzy Logic Control of a Switched Reluctance Motor”, Proceedings of the IEEE International Symposium, vol.2, 1997, pp.527-531

6.    Gamal M. Hashem Hany, M. HasanienSpeed , “Control of Switched Reluctance Motor  Based on Fuzzy Logic Controller”, Proceedings of the 14th International Middle East Power Systems Conference (MEPCON’10), Cairo University, Egypt, December 19-, 2010, Paper ID 166.

7.    X.Felix Joseph, Dr.S.Pushpa Kumar, “Design and Simulation of a PI Controlled Soft Switched Front End Converter for Switched Reluctance Motor”, International Journal of Computer Applications (0975 – 8887) Volume 34– No.10, November 2011

120-125

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

25.

Authors:

S.Vimala, K.Kowsalya Devi , G.S.Abinaya

Paper Title:

A Novel Idea for Further Bit Rate Reduction in BTC based Techniques for Image Compression

Abstract: Block Truncation Coding (BTC) is a simple and fast lossy image compression technique for digitized gray scale images. In this paper, a novel idea for further reducing the bit rate is introduced. The BTC and its two other variants, one being the Absolute Moment Block Truncation Coding (AMBTC) are discussed and the proposed idea is incorporated in all the three methods. A bitrate of 2 bpp is achieved in the existing techniques. With the proposed method, a further reduction of .25 bpp is achieved. The results of the proposed method are compared with that of the normal Block Truncation Coding methods. The proposed idea works better in terms of both the PSNR and the bpp.

Keywords:
  Block Truncation Coding, PSNR, bit-rate, compression, storage, transmission.


References:

1.     E.J.Delp and 0.R.Mitchell, “Image Compression Using Block Truncation Coding,” IEEE Transactions on Communication, Vol. COM-27, pp. 1335-1342, Sept. 1979.
2.     A.M.Eskicioglu and P.S.Fisher,  “Image Quality Measures And Their Performance”, IEEE Transactiona on Communications, Vol.34, pp. 2959-2965, Dec. 1995.

3.     Doaa Mohammed, Fatma Abou-Chadi, ”Image Compression Using Block Truncation Coding”,  Journal of  Selected Areas in Telecommunications (JSAT), Feb. 2011.

4.     N.M. Nasrabadi, R.B.King,  “Image  Coding  Using Vector Quantization: A Review”, IEEE Transactions on Communications COM-36 (1998), pp. 957-971.

5.     M.Rabbani and R.Joshi, “An Overview Of The JPEG 2000 Still Image Compression Standard”, signal process. Image commun. 17, pp. 3-48, 2002.

6.     G.Arce and N.C.Jr.Gallagher, “BTC Image Coding Using Median Filter Roots”, IEEE Transactions On Communication, Vol.31, No.6, pp. 784-793, 1983.

7.     Yung-Chen Wu, “Block Truncation Image Bitplane Coding”, SPOIE, Optical Engineering, Vol. 41, No. 10, pp. 2476-2478, 2002.

8.     Yu-Chen Hu, “Predictive Moment Preserving Block Truncation Coding  For Gray Level Image Compression”, Journal of Electronic Imaging, vol. 13, No.4, pp. 871-877, 2004.

9.     Pasi Franti, Olli Nevalainen and Timo Kaukoranta, “Compression Of Digital Images By Block Truncation Coding: A Survey”, The Computer Journal, Vol. 37, No. 4, 1994.

10.  Lucas Hui, “An Adaptive  Block Truncation  Coding Algorithm For Image  Compression”, IEEE Trans. on ASSP, Vol. 4, pp. 2233-2236, Aril 1990.

11.  O.R.Mitchell and E.J.Delp, “Multilevel Graphics Representation Using Block Truncation Coding”, IEEE Transactions on Communications, 868-873.

 

126-130

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

26.

Authors:

R.Mohan, N.Partheeban

Paper Title:

Secure Multimodal Mobile Authentication Using One Time Password

Abstract: Security concerns are on the rise in all areas such as banks, governmental applications, healthcare industry, military organization, educational institutions. Government organizations are setting standards, passing laws and forcing organizations and agencies to comply with these standards with non-compliance being met with wide-ranging consequences. There are several issues when it comes to security concerns in these numerous and varying industries with one common weak link being passwords. Most systems today rely on static passwords to verify the user’s identity. However, such passwords come with major management security concerns. Users tend to use easy-to-guess passwords, use the same password in multiple accounts, write the passwords or store them on their machines. Further more, hackers have the option of using many techniques to steal passwords such as shoulder surfing, snooping, sniffing, guessing. Several ‘proper’ strategies for using passwords have been proposed. Some of which are very difficult to use and others might not meet the company’s security concerns. Two factor authentication using devices such as tokens and ATM cards has been proposed to solve the password problem and have shown to be difficult to hack. Two-factor authentication (T-FA) or (2FA) is a system wherein two different factors are used in conjunction to authenticate.  The proposed method guarantees that authenticating to services, such as online Shopping, is done in a very secure manner. The system involves using a OTP (One Time Password) Algorithm generation of Dynamic password for second way of authentication.  One time password uses information sent as an SMS to the user as part of the login process.

Keywords:
Mobile Authentication, Secure Multimodal, Two Factor Authentication, One Time Password


References:

1.     S. Milne et al., “Are Guidelines Enough? An Introduction to Designing Web Sites Accessible to Older People,” IBM Systems J., vol. 44, no. 3, 2005, pp. 557–571.
2.     ISO 9241-11:1998, Ergonomic Requirements for Office Work with Visual Display Terminals (VDTs)—Part 11: Guidance on Usability, Int’l Organization for Standards, 1998.

3.     Z. Obrenovic, J. Abascal, and D. Starcevic, “Universal Accessibility as a Multimodal Design Issue,” Comm. ACM, vol. 50, no. 5, 2007, pp. 83–88.

4.     T. Rønning, “Hverdagsteknologi for Alle—eller Nesten Alle” (“Everyday Technology for All—or Nearly All), Norges Blinde (The Blind in Norway), no. 6, 2004.

5.     I. Klironomos et al., “White Paper: Promoting Design for All and e-Accessibility in Europe,” Universal Access in the Information Society, vol. 5, no. 1, 2006, pp. 105–119.

6.     K.S. Fuglerud al., Universal Design of IT-Based Solutions for Registration and Authentication, tech. report DART/02/09. Norwegian Computing Center, 2009.

7.     L. von Ahn, M. Blum, and J. Langford, “Telling Humans and Computers Apart automatically,” Comm. ACM, vol. 47, no. 2, 2004, pp. 56–60.

8.     H. Jameel et al., “Human Identification through ImageEvaluation Using Secret Predicates,” Topics in CryptologyCT-RSA 2007, LNCS 4377, Springer, 2006, pp.67
84.

9.     M. May, Inaccessibility of CAPTCHA: Alternatives toVisual Turing Tests on the Web, vol. 2008, W3C WorkingGroup Note, 23 Nov. 2005; www.w3.org/TR/turingtest.

10.  M.E. Zurko and K. Johar, “Standards, Usable Security, and Accessibility: Can We Constrain the Problem Any Further?” Proc. 4th Symp. Usable PrivacyandSecurity(SOUPS08),2008;http://cups.cs.cmu.edu/soups/2008/SOAPS/zurko.pdf.

11.  P. Wintlev-Jensen, “Ambient Assisted Living Joint Programme Objectives and Participation Rules,” presentation at ICT 2008, 2008; http://www.alpsbiocluster.eu/call-for-projects/aal/AAL_Nakita_Vodjdani.pdf.

12.  P.T. Jaeger, “Beyond Section 508: The Spectrum of Legal Requirements for Accessible e-Government Web Sites in the United States,” J. Government Information, vol. 30, no. 4, 2004, pp. 518–533.

13.  H. Hochheiser, J. Feng, and J. Lazar, “Challenges in Universally Usable Privacy and Security,” Proc. Symp. Usable Privacy and Security (SOUPS 08), 2008; cups. cs.cmu.edu/soups/2008/SOAPS/hochheiser.pdf.

14.  A. Jameson, “Usability Issues and Methods for Mo¬bile Multimodal Systems,” Proc. ISCA Tutorial and Research Workshop on Multi-Modal Dialogue in Mobile En¬vironments, 2002; http://citeseerx.ist.psu.edu/viewdoc/ summary? doi=10.1.1.10.6704

 

131-136

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

27.

Authors:

Roopali Goel, Vinay Rishiwal

Paper Title:

Cloud Computing and Service Oriented Architecture

Abstract: Cloud Computing is used to allow efficient sharing of equipment and services. It facilitates to run the applications of an organization on a central data center rather than running them at themselves. This goal is achieved using an architectural approach of offered services on a network of consumers. Cloud is emerging as a phenomenon and it is happening at the confluence of several trends in the software industry. Service oriented architectures; virtualization and internet based application delivery have grown up to meet out the expectations of the end customers. Cloud is a major next step in this area. Cloud computing allows various tasks to be executed over a network using various services. Different types of services including infrastructure as a service, platform as a service, software as service have been proposed for cloud computing. Some of the benefits of cloud computing include reduced cost, scalability, better performance, service oriented and availability of easily and quickly movable application development. There are many types of cloud computing services available from various vendors. Computational cloud services provide on demand commuting resources that are scalable, inexpensive and can run any type of application. Storage cloud services allow all clients to store their large datasets on provider’s storage banks. Application cloud allows access too many services that a developer can integrate to build their application. The goal of this paper is to provide detailed understanding of cloud computing framework and its relation to service oriented architecture. The Paper also highlights the idea of virtualization, cloud computing services, some advantages and the challenges.

Keywords:
The Paper also highlights the idea of virtualization, cloud computing services, some advantages and the challenges.


References:

1.        Raines, Geoffrey (2009), Cloud computing and SOA.Washington: D C Metro area.
2.        Armbrust, Michael (2009), A Berkley View of Cloud Computing. United State of America: California.

3.        WIKIPEDIA, “Cloud Computing”, http://en.wikipedia.org/wiki/Cloud computing, May 2008.

4.        Leavitt, Neal (2009), “Is Cloud Computing Really Ready for Prime Time,” Journal of IEEE Computer Society, pp. 292-312. 

5.        Ditto, Appendix A (http://www.nsf.gov/od/oci/reports/APXA.pdf).

6.        The Grid: Blueprint for a New Computing Infrastructure, 2nd Edition, Morgan Kaufmann, 2004. ISBN: 1-55860-933-4.

7.        GLOBUS: http://www.globus.org/, accessed May 2008.

8.        HADOOP: http://hadoop.apache.org/core/, accessed May 2008.

9.        M. Vouk et al., “Powered by VCL’ – Using Virtual Computing Laboratory (VCL) Technology to Power Cloud Computing”. Proceedings of the 2nd International Conference on Virtual Computing (ICVCI), pp 1–10, 2008.
10.     Michael Bell, “Introduction to Service-oriented Modeling”, Service-oriented Modeling: Service Analysis, Design, and Architecture. Wiley & Sons, ISBN 978-0-470-14111-3, 2008.

11.     Thomas ERL, “Service-oriented Architecture: Concepts, Technology, and Design”, Upper Saddle River: Prentice Hall PTR. ISBN 0-13-185858-0, 2005.

12.       D. Kyriazis et al., “A Real-time Service Oriented Infrastructure”, International Conference on Real-Time and Embedded Systems (RTES 2010), Singapore, November 2010.

 

137-139

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

Volume-1 Issue-2

 Download Abstract Book

S. No

Volume-1 Issue-2, June 2012, ISSN:  2277-3878 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

M.S. Pavithraa, C.Balakrishnan

Paper Title:

Fake Data Termination in Wireless Sensor Networks

Abstract: Wireless sensor networks are specified ad-hoc networks. They are characterized by their limited computing power and energy constraints because they are generally limited in memory, power and computational ability. Thus they can only transmit data to a limited distance. The major challenges of wireless sensor networks are security. This paper proposes a study of security in this kind of network. Here a list of attacks with their specificities and vulnerabilities are presented. Based on the location information presence of fake data can be identified. Here a solution to terminate this fake information is discussed.

Keywords:
 Ad-hoc networks, sensor networks, attacks, security.


References:

1.        J.-Y.L. Boudec and M. Vojnovi_c, “Perfect Simulation and Stationary of a Class of Mobility Models,” Proc. IEEE INFOCOM, pp. 2743-2754, Mar. 2005
2.        S. _Capkun and J.P. Hubaux, “Secure Positioning in Wireless Networks,” IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 221- 232, Feb. 2006.

3.        M. Conti, R.D. Pietro, L.V. Mancini, and A. Mei, “A Randomized,Efficient, and Distributed Protocol for  the Detection of NodeReplication Attacks in  Wireless Sensor Networks,” Proc. ACM MobiHoc, pp. 80-89, Sept. 2007.

4.        K. Dantu,      M. Rahimi,    H. Shah, S. Babel, A.Dhariwal, and G.S.Sukhatme, “Robomote: nabling Mobility in Sensor Networks,”Proc. Fourth IEEE Int’l Symp. Information Processing in Sensor Networks (IPSN), pp. 404-409, Apr. 2005.

5.        J. Ho, M. Wright, and S.K. Das, “Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis,” Proc. IEEE INFOCOM, pp. 1773-1781, Apr. 2009.

6.        J. Ho, D. Liu, M. Wright, and S.K. Das, “Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks,” Ad Hoc Networks, vol. 7, no. 8, pp. 1476-1488, Nov. 2009.

7.        L. Hu and D. Evans, “Localization for Mobile Sensor Networks,” Proc. ACM MobiCom, pp. 45-57, Sept. 2004.

8.        J. Jung, V. Paxon, A.W. Berger, and H. Balakrishnan, “Fast Portscan Detection Using Sequential Hypothesis Testing,” Proc. IEEE Symp. Security and Privacy, pp. 211-225, May 2004.

9.        A. Liu and P. Ning, “TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks,” Proc. Seventh IEEE Int’l Symp. Information Processing in Sensor Networks (IPSN),

10.     pp. 245-256, Apr. 2008.

11.     S. PalChaudhuri, J.-Y.L. Boudec, and M. Vojnovi_c, “Perfect Simulations for Random Trip Mobility Models,” Proc. 38th Ann.Simulation Symp., Apr. 2005.

12.     B. Parno, A. Perrig, and V.D. Gligor,Distributed Detection of Node Replication Attacks  in  Sensor Networks,” Proc. IEEE Symp. Security and Privacy, pp. 49-63, May 2005.

13.     H. Song, S. Zhu, and G. Cao, “Attack-Resilient Time Synchronization for Wireless Sensor etworks,” Ad Hoc Networks, vol. 5, no. 1, pp. 112-125, Jan. 2007.

14.     K. Sun, P. Ning, C. Wang, A. Liu, and Y. Zhou, “TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks,” Proc. 13th ACM Conf. Computer and Comm. Security (CCS), pp. 264-271, Oct. 2006.

 

1-4

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.

Authors:

G. Umarani Srikanth, M. Akilandeshwari

Paper Title:

Computational Intelligence Routing For Lifetime Maximization in Heterogeneous Wireless Sensor Networks

Abstract:  In wireless sensor networks, sensor nodes are typically power-constrained with limited lifetime, and thus it is necessary to know how long the network sustains its networking operations. Heterogeneous WSNs consists of different sensor devices with different capabilities.  One of major issue in WSNs is finding the coverage distance and connectivity between sensors and sink. To increase the network lifetime, this paper proposed Swarm Intelligence, routing technique called Ant Colony Optimization (ACO). Ant colony optimization algorithm provides a natural and intrinsic way of exploration of search space of coverage area. Ants communicate with their nest-mates using chemical scents known as pheromones, Based on Pheromone trail between sensor devices the shortest path is found. By finding the coverage distance and sensing range, the network lifetime maximized and reduces the energy usage. Extensive Java Agent Framework (JADE) multi agent simulator result clearly provides more approximate, effective and efficient way for maximizing the lifetime of heterogeneous WSNs.

Keywords:
   wireless sensor networks (WSNs), Ant colony optimization (ACO), connectivity, coverage, network lifetime, JADE.


References:

1.        ] C.Y. Chong and S.P. Kumar, “Sensor Networks: Evolution, Opportunities, and Challenges,” Proc. IEEE, vol. 91, no. 8, pp. 1247-1256, Aug. 2003.
2.        M. Cardei, M.T. Thai, Y. Li, and W. Wu, “Energy-Efficient Target Coverage in Wireless Sensor Networks,” Proc. IEEE INFOCOM, vol. 3, pp. 1976-1984, 2005.

3.        Carle, J. and Simplot, D. (2004) “Energy Efficient Area Monitoring by Sensor Networks”, IEEE Computer, Vol. 37, No. 2, pp. 40-46.

4.        Tian, D. and Georganas, N. D. (2002) “A Coverage Preserving Node Scheduling Scheme for Large Wireless Sensor Networks”, ACM Workshop on Wireless Sensor Networks and Applications.
5.        I. F. Akyildiz, T. Melodia, and K. R. Chowdury, “Wireless multimediasensor network: A survey,” IEEE Wireless Commun., vol. 14, no. 6,   pp. 32–39, Dec. 2007.
6.        I. Dietrich and F. Dressler, “On the lifetime of wireless sensor networks,”ACM Trans. Sensor Networks, vol. 5, no. 1, Feb. 2009.

7.        C.-Y. Chang, J.-P. Sheu, Y.-C. Chen, and S.-W. Chang, “An obstacle-free and power-efficient deployment algorithm for wireless sensor networks,”  IEEE Trans. Syst., Man, Cybern., Part A, vol. 39, no. 4, pp. 795–806, Jul   2009.

8.        Al-Karaki, J.N.; Kamal, A.E. Routing Techniques in Wireless Sensor Networks: a Survey. IEEEWirel. Commun. 2004, 11, 6-28.

9.        Bonabeau, E.; Dorigo, M.; G.T. Swarm Intelligence. In Natural to Artificial Systems; Oxford Univ. Press: London, U.K., 1999; pp. 1-278.

10.    Q. Zhao and M. Gurusamy, “Lifetime maximization for connected target coverage in wireless sensor networks,” IEEE/ACM Trans. Networking, vol. 16, no. 6, pp. 1378–1391, Dec. 2008.

11.     Liu, Z.; Kwiatkowska, M.Z; Constantinou, C. A Biologically Inspired QOS Routing Algorithm for Mobile Ad Hoc Networks. In 19th International Conference on Advanced Information Networking and Applications, 2005; pp. 426–431.

12.     Schoonderwoerd, R.; Holland, O.; Bruten, J.; Rothkrantz, L. Ant-based Load Balancing in Telecommunications Networks. Adapt. Behavior 1996, 5, 169–207.

 

5-10

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

G.V Krishna Reddy, N.Chikkanna, B.Uma Maheswar Gowd

Paper Title:

A Novel Method to Reduce the Thermal Contact Resistance

Abstract: In this research work, a novel method is designed to reduce the thermal contact resistance at the interface between the heat sink and the computer processor. One of the major problems in using high conducting materials or greases as the thermal interfacial materials is, the circuitry inside the processor which is lying near the interfacial wall will get shorted and the some of the transistor may not function as intended thus leading to the failure of the processors. Hence low electrically conducting interfacial materials are preferred. Usually for most of the materials, the electrical and thermal conductivities are proportional to each other. However, the drawback in using the low electrically or thermally conducting materials is, it cannot remove the heat generated from the high speed processors fast enough thus increasing the temperature of the processor. With the raise in temperature, the performance of the processor drops down. To avoid this, low conducting grease is applied to the processor first in the order of 5 microns and highly conducting grease is applied between the processor (over the low conducting grease) and the heat sink. The performance of the two layers of the grease is measured in this work and compared with a single layer of the grease.

Keywords:
Thermal interfacial materials, grease, aluminum foils, thermal contact resistance, thermal conductivity, electronics cooling.


References:

1.        R. Hopkins, A. Faghri, D. Krustalev, Flat miniature heat pipes with micro capillary grooves, J. Heat Transfer 121 (1999) 102-109.
2.        L.S., Fletcher, A review of thermal enhancement techniques for electronic systems, Intersociety Conference on Thermal Phenomena (1990) 136-148.

3.        J.P. Bardon, Introduction aÁ l’eÂtude des reÂsistances thermiques de contact, Rev. GeÂn. Therm. 125 (1972) 429-446.
4.        L.S. Fletcher, Recent developments in contact conductance heat transfer, J. Heat Transfer 110 (1988) 1059-1070.
5.        M.J. Edmonds, A.M. Jones, S.D. Probert, Thermal contact resistances for hard machined surfaces pressed against relatively soft-optical ¯ats, Applied Energy 6 (1980) 405-427.

6.        R.R. Somers, J.W. Miller, L.S. Fletcher, An experimental investigation of the thermal conductance of dissimilar metal contacts, in: 4th Intersociety Conference on
Thermal Phenomena in Electronic Systems, Washington, May, 1994, pp. 280-299.

7.        D.V. Lewis, H.C. Perkins, Heat transfer at the interface of stainless steel and aluminum. The influence of surface conditions on the directional e€ect, Int. J. Heat Mass Transfer 11 (1968) 1371-1383.

8.        M.M. Yovanovich, Overall constriction resistance between contacting rough, wavy surfaces, Int. J. Heat Mass Transfer 12 (1969) 1517-1520.

9.        M.R. Sridhar, M.M. Yovanovich, Thermal contact conductance of tool steel and comparison with model, Int. J. Heat Mass Transfer 39 (4) (1996) 831-839.

10.     M.R. Sridhar, M.M. Yovanovich, Elastoplastic contact conductance model for isotropic conforming rough surfaces and comparison with experiments, J. Heat Transfer 118 (1996) 3-9.

11.     B.B. Mikic, Thermal contact conductance; theoretical considerations, Int. J. Heat Mass Transfer 17 (1974) 205-214.

12.     M. Mittelbach, C. Vogd, L.S. Fletcher, G.P. Peterson, The interfacial pressure distribution and thermal conductance of bolted joints, J. Heat Transfer 116 (1994) 823-829.

13.     L.S. Fletcher, G.P. Peterson, C.V. Madhusudana, E. Groll, Constriction resistance through bolted and riveted joints, J. Heat Transfer 112 (1990) 857-863.

14.     L.R. Jeevanashankara, C.V. Madhusudhana, M.V. Kulkarni, Thermal contact conductances of metallic contacts at low loads, Applied Energy 35 (1990) 151-164.

15.     L.G. Hays, Thermal conductance of alumina±nickel interfaces at elevated temperatures, Int. J. Heat Mass Transfer 13 (1970) 1293-1297.

16.     B. Snaith, P.W. O’Callaghan, S.D. Probert, Interstitial materials for controlling thermal conductances across pressed metallic contacts, Applied Energy 16 (1984) 175-191.

17.     L.J. Salerno, P. Kittel, A.L. Spivak, Thermal conductance of pressed metallic contacts augmented with indium foil or Apiezon grease at liquid helium temperatures, Cryogenics 34 (8) (1994) 649-654.

18.     A.L. Peterson, Silicones with improved thermal conductivity for thermal management in electronic packaging, in: 40th Electronic Components and Technology Conf., Las Vegas, May, 1990, pp. 613-618.

19.     W. Jamison, G. Sears, G. Larsen, R. Hunadi, Thermally conductive, water cleanable greases, in: Proc. Technical Conference, Int. Electronic Packaging Conf., 1991, pp. 190-203.

20.     T. McWaid, T.E. Marschall, Thermal contact resistance across pressed metal contacts in a vacuum environment, Int. J. Heat Mass Transfer 35 (11) (1992) 2911-2920.

21.     B.B. Mikic, G. Carnasciali, The e€ect of thermal conductivity of plating material on thermal contact resistance, J. Heat Transfer (1970) 475-482.

22.     T.K. Kang, G.P. Peterson, L.S. Fletcher, Effect of metallic coatings on the thermal contact conductance of turned surfaces, J. Heat Transfer 112 (1990) 864-871.

23.     A.H. Howard, J.M. Ochterbeck, G.P. Peterson, Effects of metallic vapor deposition process and the overall coating thickness on thermal contact conductance, J. Heat Transfer 117 (1995) 828-834.

24.     C.R. Hicks, K.V. Turner, in: Fundamental Concepts in the Design of Experiments, 5th Ed., Oxford University Press, Oxford, 1999, p. 576.

25.     C.V. Madhusudana, Thermal contact conductance and recti®cation at low joint pressures, Int. Comm. Heat Mass Transfer 20 (1993) 123-132.

 

11-15

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

4.

Authors:

G.V.Krishna Reddy, Chikkanna, B.Uma Maheswar Gowd

Paper Title:

Experimental Evaluation of Thermal Resistance of Composites

Abstract: In this paper thermal contact resistance is measured for different kinds of composite materials. The gaps at contact surface between two highly conducting materials are filled with the interstitial material. The interfacial gap is maintained by applying pressure on the surface by using shim, until certain thickness has been obtained. Shims of multiple sizes are used obtain different sizes of the gaps. Samples of the interface materials like Silicone grease, Eupec grease, Unial grease, graphite foil, silicone foil, aluminum foils, etc were tested.  Also these samples with different material compositions were experimented. The measured thermal resistance values are compared with the theoretical values of thermal resistance for all the materials tested. In other words, the thermal conductivities published by their respective manufacturers are validated. It is found that thermal resistance is least for foils compared to grease or grease filled with powder. Also of all the foils tested, aluminum yielded the best results as far as the thermal resistance is concerned.

Keywords:
Thermal interfacial materials, grease, aluminum foils, thermal contact resistance, thermal conductivity, electronics cooling..


References:

1.           R. Hopkins, A. Faghri, D. Krustalev, Flat miniature heat pipes with micro capillary grooves, J. Heat Transfer 121 (1999) 102-109.
2.           L.S., Fletcher, A review of thermal enhancement techniques for electronic systems, Intersociety Conference on Thermal Phenomena (1990) 136-148.

3.           J.P. Bardon, Introduction aÁ l’eÂtude des reÂsistances thermiques de contact, Rev. GeÂn. Therm. 125 (1972) 429-446.

4.           L.S. Fletcher, Recent developments in contact conductance heat transfer, J. Heat Transfer 110 (1988) 1059-1070.

5.           M.J. Edmonds, A.M. Jones, S.D. Probert, Thermal contact resistances for hard machined surfaces pressed against relatively soft-optical ¯ats, Applied Energy 6 (1980) 405-427.

6.           R.R. Somers, J.W. Miller, L.S. Fletcher, An experimental investigation of the thermal conductance of dissimilar metal contacts, in: 4th Intersociety Conference on Thermal Phenomena in Electronic Systems, Washington, May, 1994, pp. 280-299.

7.           D.V. Lewis, H.C. Perkins, Heat transfer at the interface of stainless steel and aluminum. The influence of surface conditions on the directional e€ect, Int. J. Heat Mass Transfer 11 (1968) 1371-1383.

8.           M.M. Yovanovich, Overall constriction resistance between contacting rough, wavy surfaces, Int. J. Heat Mass Transfer 12 (1969) 1517-1520.

9.           M.R. Sridhar, M.M. Yovanovich, Thermal contact conductance of tool steel and comparison with model, Int. J. Heat Mass Transfer 39 (4) (1996) 831-839.

10.        M.R. Sridhar, M.M. Yovanovich, Elastoplastic contact conductance model for isotropic conforming rough surfaces and comparison with experiments, J. Heat Transfer 118 (1996) 3-9.

11.        B.B. Mikic, Thermal contact conductance; theoretical considerations, Int. J. Heat Mass Transfer 17 (1974) 205-214.

12.         M. Mittelbach, C. Vogd, L.S. Fletcher, G.P. Peterson, The interfacial pressure distribution and thermal conductance of bolted joints, J. Heat Transfer 116 (1994) 823-829.

13.        L.S. Fletcher, G.P. Peterson, C.V. Madhusudana, E. Groll, Constriction resistance through bolted and riveted joints, J. Heat Transfer 112 (1990) 857-863.

14.        L.R. Jeevanashankara, C.V. Madhusudhana, M.V. Kulkarni, Thermal contact conductances of metallic contacts at low loads, Applied Energy 35 (1990) 151-164.

15.        L.G. Hays, Thermal conductance of alumina±nickel interfaces at elevated temperatures, Int. J. Heat Mass Transfer 13 (1970) 1293-1297.

16.        B. Snaith, P.W. O’Callaghan, S.D. Probert, Interstitial materials for controlling thermal conductances across pressed metallic contacts, Applied Energy 16 (1984) 175-191.

17.        L.J. Salerno, P. Kittel, A.L. Spivak, Thermal conductance of pressed metallic contacts augmented with indium foil or Apiezon grease at liquid helium temperatures, Cryogenics 34 (8) (1994) 649-654.

18.        A.L. Peterson, Silicones with improved thermal conductivity for thermal management in electronic packaging, in: 40th Electronic Components and Technology Conf., Las Vegas, May, 1990, pp. 613-618.

19.        W. Jamison, G. Sears, G. Larsen, R. Hunadi, Thermally conductive, water cleanable greases, in: Proc. Technical Conference, Int. Electronic Packaging Conf., 1991, pp. 190-203.

20.        T. McWaid, T.E. Marschall, Thermal contact resistance across pressed metal contacts in a vacuum environment, Int. J. Heat Mass Transfer 35 (11) (1992) 2911-2920.

21.        B.B. Mikic, G. Carnasciali, The e€ect of thermal conductivity of plating material on thermal contact resistance, J. Heat Transfer (1970) 475-482.

22.        T.K. Kang, G.P. Peterson, L.S. Fletcher, Effect of metallic coatings on the thermal contact conductance of turned surfaces, J. Heat Transfer 112 (1990) 864-871.

23.        A.H. Howard, J.M. Ochterbeck, G.P. Peterson, Effects of metallic vapor deposition process and the overall coating thickness on thermal contact conductance, J. Heat Transfer 117 (1995) 828-834.

24.        C.R. Hicks, K.V. Turner, in: Fundamental Concepts in the Design of Experiments, 5th Ed., Oxford University Press, Oxford, 1999, p. 576.

25.        C.V. Madhusudana, Thermal contact conductance and recti®cation at low joint pressures, Int. Comm. Heat Mass Transfer 20 (1993) 123-132.

 

16-21

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

5.

Authors:

K. Karthika, C. Arunachal Aperumal

Paper Title:

Mining in Navigation-Pattern using Content-Based Image Retrieval

Abstract: Research has been devoted in the past few years to relevance Feedback as an effective solution to improve performance of Content-based image retrieval (CBIR). In this paper, we propose a color image pattern for further use, which reduce the iteration og image. To achieve the high efficiency and effectiveness of CBIR we are using two type of methods for feature extraction like SVM (support vector machine) and NPRF (navigation-pattern based relevance feedback).By using svm classifier as a category predictor of query and database images, they are exploited at first to filter out irrelevant images by its different low-level, concept and key point-based features. Thus we may reduce the size of query search in the db and enhanced by using texture based in which we combine GLCM and CCM.

Keywords:
  GLCM, CCM, SVM, content based image retrieval.


References:

1.        A. Pentalnd, R.W. Picard, and S. Sclaroff, “Photobook: Content- Based Manipulation of Image Databases,” Int’l J. Computer Vision (IJCV), vol. 18, no. 3, pp. 233-254, June 1996.
2.        T. Qin, X.D. Zhang, T.Y. Liu, D.S. Wang, W.Y. Ma, and H.J. Zhang, “An Active Feedback Framework for Image Retrieval,” Pattern Recognition Letters, vol. 29, pp. 637-646, Apr. 2008.

3.        J.J. Rocchio, “Relevance Feedback in Information Retrieval,” The SMART Retrieval System—Experiments in Automatic Document Processing, pp. 313-323, Prentice Hall, 1971.

4.        Y. Rui, T. Huang, and S. Mehrotra, “Content-Based Image Retrieval with Relevance Feedback in MARS,” Proc. IEEE Int’l

5.        Conf. Image Processing, pp. 815-818, Oct. 1997.

6.        Y. Rui, T. Huang, M. Ortega, and S. Mehrotra, “Relevance Feedback: A Power Tool for Interactive Content-Based Image Retrieval,” IEEE Trans. Circuits and Systems for Video Technology, vol. 8, no. 5, pp. 644-655, Sept. 1998.

7.        J.R. Smith and S.F. Chang, “VisualSEEK: A Fully Automated Content-Based Image Query System,” Proc. ACM Multimedia Conf., Nov. 1996.

8.        G. Salton and C. Buckley, “Improving Retrieval Performance by Relevance Feedback,” J. Am. Soc. Information Science, vol. 41, no. 4, pp. 288-297, 1990.

9.        H.T. Shen, S. Jiang, K.L. Tan, Z. Huang, and X. Zhou, “Speed up Interactive Image Retrieval,” VLDB J., vol. 18, no. 1, pp. 329-343, Jan. 2009.

 

16-21

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

6.

Authors:

Maruthi B H, K M Narayanappa, M Krishna,Venkatarama Reddy

Paper Title:

Modified Disc Model for Over-Speed Burst Margin with Thermal Load and Disc Speed Corrections and Compared with FE Model 

Abstract: The present work was focused on modification of the disc model for over speed burst margin with thermal load and disc speed correction and verify the same with FE model. Hoop stress, radial stress and burst margin were carried out at different speed and thermal loading conditions using both finite element and mathematical model. Investigations are performed based on non-linear problem employing linear analysis tool ANSYS 12.0. A non-linear finite element method was utilized to determine the stress state of the disc / blade segment under operating conditions.  In both cases (FE and mathematical model)  the numerical burst rotation rate, associated with the loss of stability of the structure, is found to be in good agreement with the  each other.

Keywords:
 Modified Model, Gas Turbine, Over-speed, thermal load.


References:

1.        R A Claudio, C M Branco, E C Gomes and J Byrne, Life prediction of a gas turbine disc using the finite element method, 8AS Journadas De Fractura-2002, pp. 131-144
2.        G C Fraccone, M Ruzzene, V Volvoi, P Cento and C Vining, Assessment of uncertainity in response estimation  for turbine engine bladed disks, Journal of Sound and vibration, vol. 317 (2008), pp. 625-645.

3.        Walls DP, Delaneuville RE, Cunningham SE. Damage tolerance based life prediction in gas turbine engine blades under vibratory high cycle fatigue. Journal of Engineering for Gas Turbines and Power 1997;119:143–6

4.        Burns J. Gas turbine engine blade life prediction for high cycle fatigue. The Technical Cooperation Program (TTCP), P-TP1, 1998.

5.        Benallal A, Berstad T, Clausen A, and Hopperstad O. Dynamic strain aging and related instabilities: experimental, theoretical and numerical aspects, Eur, J Mech., vol. 25, (2006), pp.357-424

6.        Ahmet N Eraslan, Elastic-plastic deformations of rotating variable thickness annular disks with free, pressurized and radially constrined boundary conditions, International Journal of Mechanical Sciences, vol. 45, (2003), pp.643-667.

7.        Mohammad Shanobghzani, Vahid Heidarpour and Iraj Mirzee, Computer Aidied Analyis of flow in a rotating single disc, World Academy of Science, Engineering and Technology, vol. 58, (2009), pp.161-163.

8.        G J Nie, R C  Batra, Stress analysis and material tailoring in isotropic linear thermoelastic incompressible functionally graded rotating disk of variable thickness, Composite Structure, vol. 92, (2010), pp.720-729.

9.        Franceso Vivio, Vincenzo Vullo, Elastic stress analysis of rotating converging conical disks subjected to thermal load and having variable density along the radius, International Journal of Solids and Structures, vol. 44, (2007), pp.7767-7784.

10.     Walz, G., Riesch-Oppermann, H., Probabilistic fracture mechanics assessment of flaws in turbine disks including quality assurance procedures. Structural Safety, vol.28, (2006), pp. 273–288.

11.     Bayat M, Saleem M, Sahari BB, et al. Mechanical and thermal stresses in a functionally graded rotating disk with variable thickness due to radially symmetry loads. Int J Press Vessels Pip 2009;86:357–72.

12.     Eraslan, A.N., Akis, T., 2006. On the plane strain and plane stress solutions of functionally graded rotating solid shaft and solid disk problems. Acta Mechanica 181 (1-2), 43–63.

13.     Eraslan, A.N., Arges_o, H., 2002. Limit angular velocities of variable thickness rotating disks. International Journal of Solids and Structures 39 (12), 3109–3130.

14.     Orcan, Y., Eraslan, A.N., 2002. Elastic–plastic stresses in linearly hardening rotating solid disks of variable thickness. Mechanics Research Communications 29 (4), 269–281.

15.     Eraslan, A.N., 2005. A class of nonisothermal variable thickness rotating disk problems solved by hypergeometric functions. Turkish Journal of Engineering and Environmental Sciences 29 (4), 241–269.

16.     Eraslan, A.N., Orc¸an, Y., 2004. A parametric analysis of rotating variable thickness elastoplastic annular disks subjected to pressurized and radially constrained boundary conditions. Turkish Journal of Engineering and Environmental Sciences 28 (6), 381–395.

17.     Eraslan, A.N., Apatay, T., 2004. On annular disks of variable thickness subjected to external pressure. Forschungim Ingenieurwesen/ Engineering Research 68 (3), 133–138.

18.     Eraslan, A.N., 2003. Elastic–plastic deformations of rotating variable thickness annular disks with free, pressurized and radially constrained boundary conditions. International Journal of Mechanical Sciences 45 (4) , 643–667.

22-31

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

7.

Authors:

Minal Saxena, Kavita Khare

Paper Title:

A Novel Approach of Frequency offset Estimation for OFDM System

Abstract:  Orthogonal frequency division multiplexing(OFDM)has recently attracted vast research attention from both academia and industry and has become a part of new emerging standards for broadband wireless access. Synchronization at receiver end represents one of the most challenging issues and plays a major role in physical layer design.This paper presents design and implementation of a Channel estimation algorithm which successfully achieves minimization of Timing and Frequency offsets at receiver end. Also it has been synthesized and simulated on Virtex 6 device.

Keywords:
 Cyclic prefix, timing offset, Intersymbol Interference(ISI),Channel estimator.


References:

1.           Channel Estimation for OFDM Systems -Anza Rani James, Revathy S Benjamin, Shilpa John, Treesa Mary Joseph, Vineetha Mathai, and Dr. Sakuntala S. Pillai ,Proceedings -ICSCCN 2011
2.           Superimposed training aided Carrier Frequency Offset Estimation in OFDM systems by Malihe Ahmadi Aryan Saadat Mehr -IEEE EIT 2007 Proceedings

3.           OFDM Baseband Modulation Technology based on VHDL Lin Lin ,Yan-feng Qiao, Wan-xin Su 2010- Proceedings of the IEEE.

4.           Moose P., “A Technique for Orthogonal Frequency Division Multiplexing Frequency Offset Correction”, IEEE Transactions on Communications, Vol. 42, No. 10, pages 2908-2914, October 1994

5.           Jan-Jaap van de Beek, Magnus Sandell, Per Ola Börjesson, “ML Estimation of Time and Fr[3]

6.           and Frequency Offset in OFDM Systems”, IEEE Transactions on Signal Processing, July 1997.

7.           T. M. Schmidl and D. C. Cox, “Robust frequency and timing synchronization for OFDM,” IEEE Trans. Commun., vol. 45, pp. 1613–1621, Dec. 1997.

8.           H. Nogami and T. Nagashima “A frequency and timing period acquisition technique for OFDM system”PIRMC pp1010-1015,Sept 27-29,1995

9.           J J van de beek ,M Sandell,M.Isaksson and P. Borjesson,”Low complex frame synchronization in OFDM systems” ICUPC Nov6-10,1997

10.         “OFDM Transceiver Reference Design”, Lattice Semiconductor OFDM Transceiver design package, 2005.

11.         “Implementation of an OFDM Wireless Transceiver using IP Cores on an FPGA”, Lattice Semiconductor white paper, 2005. Frequency Offset in OFDM Systems”,

 

32-34

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

8.

Authors:

P. M. Chawan, Aniruddha P. Tekade, Pankaj R. Ingle

Paper Title:

Intergroup Conflict Handling Modes in Communication Management

Abstract: The paper aims to analyses the types of conflicts that generally occur during the lifecycle of a project. Particularly if the project belongs to the field of Information Technology where computation plays the indistinguishable part throughout the lifecycle, conflicts are unavoidable; rather they can be resolved with a good mindset and good managerial skills. All people can benefit, both personally and professionally, from learning conflict management skills. Typically we respond to conflict by using one of five modes: Compromising, Collaborating, Competing, Avoiding, Accommodating. The study examined the intergroup conflict between R&D managers and non – managers in four corporate companies, as well as the relationship between each of the five conflict-handling modes: competition, accommodation, sharing, collaboration, and avoidance, with the following variables:
1) Conflict frequency,

2) Job satisfaction, and

3) Job performance


Keywords:
Assertiveness, cooperation, TKI, Nonthreatening confrontation, conflict frequencies.


References:

1.     IEEE transactions engineering management on , vol. 36, NO. 2, May 1989 95 Intergroup Conflicts and Conflict Management in the R&D Divisions of Four Aerospace Companies Marjorie Chan, Associate Member
2.     The Impact of Group Support Systems on Group Conflict and &conflict Management: An Empirical Investigation Sheila M. Miranda Florida Atlantic University

3.     Proceedings of the 33rd Hawaii International Conference on System Sciences – 2000 Group Conflict and Conflict Management in a Decision Conferencing Environment in Singapore

4.     Quaddus, M. A. Tung, Lai Lai, Foo, Wai Mei, Poh, Li-jean and Soon, Chia Minh, Graduate School of Business School of Accountancy and Business Curtin University of Technology Nanyang Technological University GPO Box U 1987, Nanyang Avenue

5.     Conflict Management in an Aerospace IEEE Distributed Human-in-the-loop results by Nathan A. Doble, Titan Corporation, Hampton, VA Richard Barhydt, NASA Langley Research Center, Hampton, VA James M. Hitt II, Booz Allen Hamilton, McLean, VA

6.     IEEE transaction on engineering management, vol. 55, NO. 2, May 2008 Task Conflict, Integrative Potential, and Conflict Management Strategies in Joint Ventures Mark E. Parry, Michael Song, and Robert E. Spekman.

35-39

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

9.

Authors:

V. Nehru Kumar, S. Syed Enayathali

Paper Title:

Performance of Rotating Biological Contactor for Treating Segregated Grey Water for Reuse

Abstract:  The laboratory model of two-stage Rotating Biological Contactor (RBC) which was used in the present study is a modified one, with a provision to vary the speed of rotating blades. Grey wastewater was used to study the performance of the modified rotating biological contactor. The reactor had four rotating blades in each stage, having the size of 300 mm x100 mm x 10 mm, attached perpendicular to the shaft.  The experiment was conducted for different influent COD loads and different speeds of rotating blades. Among the different speeds of rotational blades in treating grey water, the rotational speed of 3 rpm was found to yield better percent removal of COD at 95.07% as maximum, where as against the rotational speeds of 4.5 and 6 rpm, the treatment efficiency is 95.04% and 94.96% respectively.

Keywords:
 RBC, Rotating blades, Grey water, COD, OLR,


References:

1.        Metcalf & Eddy (2007). Wastewater Engineering treatment and reuse, Tata McGraw-Hill, 23th Edition.
2.        APHA, 1995. Standard Methods for the Examination of Water and Wastewater, 17th Edition. American Public Health Association,  

3.        Washington,DC,USA.

4.        Friedler, E.,R.Kovalio and N.I.Galil (2005), On site Grey water Treatment and Reuse in Multi-Storey Buildings, Water science & Technology

5.        vol51 no 10 pp187-194.

6.        Eriksson,E., Auffarth,K., Henze,M., and Lendin ,A.,(2002), Characteristics of Grey water , Urban water , 4, pp85-104.

7.        Jeppersen, B.and Solley, D,(1994) Domestic grey water reuse :overseas practice and its applicability to Australia, Urban water research

8.        association of Australia, Melbourne.

9.        Nehru Kumar, V.,(2005) Effect of speed of rotating discs in the modified RBC for treating sago wastewater , Poll.Res.24(4):823-825(2005).

10.     Trivedy, R.K. and Goel.P.K (1986) Chemical and Biological methods for water pollution studies, environmental publications, Karad..

 

40-41

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

10.

Authors:

R.Vijayarajan, S.Muttan

Paper Title:

Cross Neighbourhood Kernel Filtering for Speckle Noise Removal in Ultrasound Images

Abstract:   Ultrasound imaging is the most popular, non-invasive and inexpensive diagnostic tool in clinical imaging for treatment planning and therapy. Due to noise and artefacts present, pre-processing of these images is difficult which leads to poor image processing and analysis. In this paper, an improved frost filter with kernel of cross neighbourhood is proposed for denoising and performance analysis for different neighbourhood kernels is carried out using peak signal to noise ratio and mean square error.

Keywords:
   Despeckling, frost filter, speckle noise, Ultrasound.


References:

1.     Z. Wang and D.Zhang, “Progressive switching median filter for the removal of impulse noise from highly corrupted images”, IEEE Trans. on circuits and Systems II: Analog and Digital signal processing , Vol. 46, no.1, pp 78-80, 1999.
2.     J. A. Jensen, Estimation of Blood Velocity Using Ultrasound. New York, New York: Cambridge University Press, 1996.

3.     P. N. T. Wells, “Advances in Ultrasound Techniques and Instrumentation”. New York: Churchill Livingstone, 1993.

4.     J. S. Lee, “Digital image enhancement and noise filtering by using local statistics,” IEEE Trans. Pattern Anal. Machine Intell., vol. PAM1-2,1980.

5.     Refined filtering of image noise using local statistics,” Comput.Graph. Image Process., vol. 15, pp. 380–389, 1981.

6.     -, “Speckle suppression and analysis for synthetic aperture radar,”Opt. Eng., vol. 25, no. 5, pp. 636–643, 1986.
7.     V. S. Frost, J. A. Stiles, K. S. Shanmugan, and J. C. Holtzman, “A model for radar images and its application to adaptive digital filtering of multiplicative noise,” IEEE Trans. Pattern Anal. Machine Intell., vol.PAMI-4, pp. 157–165, 1982.
8.     D. T. Kuan, A. A. Sawchuk, T. C. Strand, and P. Chavel, “Adaptive restoration of images with speckle,” IEEE Trans. Acoust., Speech, Signal Processing, vol. ASSP-35, pp. 373–383, 1987.

9.     A. Lopes, R. Touzi, and E. Nezry, “Adaptive speckle filters and scene heterogeneity,” IEEE Trans. Geosci. Remote Sensing, vol. 28, pp. 992–1000, 1990.

10.  Yongjian Yu and Scott T. Acton, “Speckle Reducing Anisotropic Diffusion”, IEEE Transactions on Image Processing, Vol. 11, No. 11, November 2002

11.  Keh-Shih Chuang., et al., 2006. “Fuzzy c-means clustering with spatial information for image segmentation”, Journal on Computerized medical imaging and graphics, no.30, 9-15.

12.  Sadoghi Yazdi and Faranak Homayouni, “Modified Adaptive Center Eighted Median Filter For suppressing impulsive Noise in Images”, International Journal of Research and Reviews in Applied Sciences Volume 1, Issue 3(December 2009). 

 

42-45

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

11.

Authors:

Ruchi Gupta, Pramod Kumar Sethi

Paper Title:

A Reliable And Scalable Multicast Model (RSM2)

Abstract:    Multicasting is the ability of a communication network to accept a single message from an application and to deliver copies of the message to multiple recipients at different location[1]. With the emergence of mobile users, many existing Internet -protocols, including those with multicast support, need to be adapted in order to offer support to this increasingly growing class of users. Our research in multicasting, as to design a Multicast Model, which provides reliability & scalability with best path for data delivery. Reliability means guaranteed Delivery of packets.  Scalability means capability to serve growing needs .In this context , A few concepts of  Proactive routing technique are  used  to make available this model in Infrastructured wireless also. Minimum Spanning path is used to deliver the packets, to reduce the cost & delay.

Keywords:
    Combo-Casting, Minimum Spanning Path, Multicasting, Reliable , Scalable.


References:

1.     Sanjoy Paul, Member, IEEE, Krishan K. Sabnani, Fellow, IEEE, John C.-H. Lin, and Supratik Bhattacharyya “ Reliable Multicast Transport Protocol (RMTP) “.IEEE journal on  Selected  Areas  in  Communications  , Vol. 15, No. 3, April 1997.
2.     Ali Alsaih and Tariq Alahdal. ,”Non-Real Time Reliable Multicast Protocol Using Sub-Sub Casting ,” The International Arab Journal of Information Technology , Vol. 4 , No. 1 , January 2007.

3.     Jim Gemmell, Jorg Liebeherr, Dave Bassett ,“An API for Scalable Reliable Multicast”.

4.     Tie Liao , “Light-weight Reliable Multicast Protocol” ,INRIA , Rocquencourt , BP 105 ,78153 Le Chesnay Cedex, France .

5.     Danyang Zhang , Sibabrata Ray , Rajgopal Kannan , S. Sitharama  Iyengar  “A Recovery Algorithm for Reliable Multicasting in reliable networks.” Proceedings of the 2003 International Conference on Parallel Processing (ICPP’03).  

 

46-52

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

12.

Authors:

Jose Vicente Berna-Martinez, Francisco Macia-Perez

Paper Title:

Multi-agent System for Control of Robots inspired on the Distributed Activity and Hormonal Regulation of Humans

Abstract: Robotics is an emerging field with great activity. Robotics is a field that presents several problems because it depends on a large number of disciplines, technologies, devices and tasks. Its expansion from perfectly controlled industrial environments toward open and dynamic environment presents a many new challenges. New uses are, for example, household robots or professional robots. To facilitate the low cost, rapid development of robotic systems, reusability of code, its medium and long term maintainability and robustness are required novel approaches to provide generic models and software systems who develop paradigms capable of solving these problems. For this purpose, in this paper we propose a model based on multi-agent systems inspired by the human nervous system able to transfer the control characteristics of the biological system and able to take advantage of the best properties of distributed software systems. Specifically, we model the decentralized activity and hormonal variation.

Keywords:
  Multi-agent systems, Bio-inspired system, Human nervous system; Service oriented architectures, Web Services. .


References:

1.        Berná-Martínez, J.V. and Maciá-Pérez, F. ” Model of Integration and Management for Robotic Functional Components Inspired by the Human Neuroregulatory System”. IEEE International Conference on Emerging Technologies and Factory Automation 2010. ISBN 978-1-4244-6849-2.
2.        Pina-Garcia, C.A. and Garcia-Vega, V.A. “A Hybrid Methodology for Robotic Architectures with a Cellular Approach”. E-Learning in Industrial Electronics, 2006 1ST IEEE International Conference. ISBN 1-4244-0324-3, pp.156 – 160.

3.        Tu, X. and Terzopoulos, D. “Artificial fishes: physics, locomotion, perception, behavior”, Computer Graphics Proceedings (SIGGRAPH’94).

4.        Maes, P. “Modelling adaptive autonomous agents”, Artificial Life, Vol. 1 Nos 1/2, pp. 135-62.

5.        Pina, A., Seron, F.J., Cerezo, E. and Gutierrez, D. “ALVW: an alife behaviour modelling systems”. Kybernetes, Vol 35, no. 9. 2006. Pp 1431-1451.

6.        Mataric, M.J. “Behavior-based control: examples from navigation, learning, and group behavior”, Journal of Experimental and Theoretical Artificial Intelligence, special issue on Software Architectures for Physical Agents, H. Hexmoor, I. Horswill, and D. Kortenkamp, (Eds), Vol. 9, Nos 2/3, pp. 323-36.

7.        Charles R. Noback, Norman L. Strominger, Robert J. Demarest, David A. Ruggiero. The Human Nervous System. Structure and Function. 2005. ISBN 1-58829-039-5

8.        John Barton Furness. The Enteric Nervous System. Blackwell Publishing. 2006. ISBN 978-1-4051-3376-0

9.        Jackson, J. H. (1958). Evolution and dissolution of the nervous system. In J. Taylor (Ed.), Selected writings of John Hughlings Jackson (Vol. 2, pp. 45–75). London: Staples Press. (Original work published 1884).

10.     Le Doux, J. “The Emotional Brain”. Emotion: clues from de brain. Annual Review of Psychology, 46, pp. 209-235.

11.     Berntson, G. G., Boysen, S. T. & Cacioppo, J. T. “Neurobehavioral organization and the cardinal principle of evaluative bivalence”. Annals of the New York Academy of Sciences, 702, 75-102. 1993.

12.     Gallistel, C. R. The organization of action: a new synthesis. Hillsdale, NJ: Lawrence Erlbaum. 1980.

13.     Arnold, A. P., Etgen, A.M., Fahrbach, S.E., Rubin, R.T., Pfaff, D.W. “Hormones, Brain and Behavior”. Academic Press; 2 edition (July 6, 2009). ISBN-13: 978-0123743824

14.     Ferber, J. Multi-Agent Systems. An Introduction to Distributed Artificial Intelligence. Addison-Wesley.1999. ISBN-13: 978-0201360486.

15.     Weiss, G. “Multiagent Systems. A Modern Approach to Distributed Modern Approach to Artificial Intelligence”. The MIT Press. 1999. ISBN 0-262-23203-0

16.     Posadas, J.L., Pozaa, J.L., Simóa, J.E., Beneta, G., Blanesa, F. “Agent-based distributed architecture for mobile robot control” Engineering Applications of Artificial Intelligence archive, vol. 21 -6, 2008, pp. 805-823. ISSN:0952-1976.

17.     Maciá-Perez, F., García-Chamizo, J.M. “Mobile Agent System Framework Suitable for Scalable Networks”. Kybernetes. The International Journal of Systems and Cybernetics. ISSN 0368-492X. Emerald. 2006. Vol.: 35. no 5. pp 688-699

18.     Brooks, R. A. y Stein, L. A. “Building Brains for Bodies”. Autonomous Robots, 1, 7-25 (1994). 1994 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands.

19.     Remy, S.L.  Blake, M.B. ” Distributed Service-Oriented Robotics”. IEEE Internet Computing, vol. 15, issue 2, pp 70-74. ISSN: 1089-7801.

53-59

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

13.

Authors:

Kiruthiga M, Prakasam P and L.M.I Leo Joseph

Paper Title:

Proposed Low-Power FPGA Architecture Using an Autonomous Fine-Grain Power Gating

Abstract: FIELD-PROGRAMMABLE gate arrays (FPGAs) are widely used to implement special-purpose processors. FPGAs are economically cheaper for low quantity production because its function can be directly reprogrammed by end users. FPGAs consume high dynamic and standby power compared to custom silicon devices. This paper presents a low power field-programmable gate array (FPGA) based on lookup table (LUT) level fine-grain power gating with small overheads. The activity of each LUT can be easily detected using the proposed power gating technique by exploiting features of asynchronous architectures. In this paper, the novel Logic Block utilizing the LUT with autonomous power gating has been proposed and the developed model has been simulated and synthesized in a selected target device. Also the power analysis has been carried out and it has been found that using the proposed fine-grain power gating method, the FPGA consumes only 34 uW.

Keywords:
   FPGA, Power Gating, Logic Block, Lookup Table


References:

1.        H. Z. V. George and J. Rabaey, “The design of a low energy FPGA,” in Proc. Int. Symp. Low Power Electron. Des., CA, Aug. 1999, pp. 188–193.
2.        Synplicity Inc., Sunnyvale, CA, “Gated clock conversion with Synplicity’s synthesis products,” Jul. 2003.

3.        Xilinx Inc., San Jose, CA, “Synthesis and simulation design guide,” 2008. [Online]. Available: http://www.xilinx.com/itp/xilinx10/books/ docs/sim/sim.pdf

4.        Y. Zhang, J. Roivainen, and A. Mammela, “Clock-gating in FPGAs: A novel and comparative evaluation,” in Proc. EUROMICRO Conf. Digit. Syst. Des., 2006, pp. 584–590.

5.        T. Tuan, S. Kao, A. Rahman, S. Das, and S. Trimberger, “A 90 nm low-power FPGA for battery-powered applications,” in Proc. FPGA, Feb. 2006, pp. 22–24.

6.        Xilinx Inc., San Jose, CA, “Spartan-3 FPGA family datasheet,” 2009. [Online]. Available: http://www.xilinx.com

7.        Xilinx Inc., San Jose, CA, “Virtex-4 FPGA family datasheet,” 2009. [Online]. Available: http://www.xilinx.com

8.        M. Keating, D. Flynn, R. Aitken, A. Gibbons, and K. Shi, Low Power Methodology Manual: For System-on-Chip Design. New York: Springer, 2007.

9.        Rahman, S. Das, T. Tuan, and S. Trimberger, “Determination of power gating granularity for FPGA fabric,” in Proc. IEEE Custom Intergr. Circuits Conf. (CICC), 2006, pp. 9–12.

10.     M. Hariyama, S. Ishihara, and M. Kameyama, “A low-power field- programmable VLSI based on a fine-grained power-gating scheme,” in Proc. IEEE Int. Midw. Symp. Circuits Syst. (MWSCAS), Knoxville, Aug. 2008, pp. 430–433.

11.     S. Ishihara, M. Hariyama, and M. Kameyama, “A low-power FPGA based on autonomous fine-grain power-gating,” in Proc. Asia South Pacific Des. Autom. Conf. (ASP-DAC), Yokohama, Japan, Jan. 2009, pp. 119–120.

 

60-65

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

14.

Authors:

O.Homa Kesav   , B. Abdul Rahim

Paper Title:

Automated Wireless Meter Reading System for Monitoring and Controlling Power Consumption

Abstract:  The use of wireless automation in almost all the fields of power, gas and water generation, distribution and billing has come of age. Here with the inclusion of wireless communication with the automation may lead to paradigm change in the current trend. The design presents a new methodology for avoiding the high construction and maintenance costs in the existing meter reading technology. Apart the use of wireless meter reading with network technologies has become need of the day. The designed system avoids the human intervention in Power Management. The Consumer has to pay the bill in time, if couldn’t, the power connection may be disconnected automatically from the remote server. It displays the corresponding billing information on LCD and data is sent to the server through the GSM Module. The ARM7 based hardware system consists of a processor core board and the peripheral board. The entire programming for microcontroller operation is based on Embedded C Language. This system provides efficient meter reading, avoiding the billing error and reduces the maintenance cost. This paper also addresses advantages of implementing the GSM communication module and design detail and discusses the advanced security of the data communications.

Keywords:
    Wireless meter reading, GSM, ARM7 (LPC 2148) Microcontroller.


References:

1.           Li Xiaoguang Hu, “Design of an ARM-Based Power Meter Having WIFI Wireless Communication Module” IEEE 2009.
2.           B. S. Koay, etc, “Design and implementation of Bluetooth energy meter”, Proceedings of the Joint Conference of the Fourth International Conference on Information, vol. 3, pp.1474-1477, Dec. 2003.

3.           Petri Oksa, Mikael Soini, “Considerations of Using Power Line Communication in the AMR System”, 2006 IEEE International Symposium on 26-29, pp.208-211, Mar. 2006

4.           S. Battermann and H. Garbe, “Influence of PLC transmission on the sensitivity of a short-wave receiving station,” IEEE Power Line Communications and Its Applications, pp.224-227, Apr. 2005.

5.           Chih-Hung Wu, etc, “Design of a Wireless ARM Based Automatic Meter Reading and Control System”, Power Engineering Society General Meeting, 2004. IEEE 6-10, Vol.1, pp.957-962, June 2004

6.           Yu Qin, “The Research and Application of ARM and GPRS Technology in Remote Meter Reading Terminal Equipment”, A Thesis Submitted in Partial Fulfilment of the Requirements for the Degree of Master of Engineering, 2007

7.           Honestar Electronics Co., Ltd, “Single-phase bidirectional Power/Energy IC-CS5460A”, Jan.2003.

8.           L. Shiwei, etc, “Design of an automatic meter reading system,” Proceedings of the 1996 IEEE IECON 22nd International Conference on Industrial Electronics, pp.631-636, Aug. 1996

9.           Liting Cao, Jingwen Tian and Dahang Zhang, “Networked Remote Meter-Reading System Based on Wireless Communication Technology” in International Conference on Information Acquisition, 2006 IEEE.

10.        Liting Cao, Wei Jiang, Zhaoli Zhang “Automatic Meter Reading System Based on Wireless Mesh Networks and SOPC Technology” in International Conference on Intelligent Networks and Intelligent Systems, 2009 IEEE.

11.        P. Zerfos, X. Meng, S. Wong, V. Samanta, and S. Lu, “A study of the short message service of a nationwide cellular network,” in ACM SIGCOMM Internet Measurement Conf., Oct. 2006.

 

66-69

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

15.

Authors:

Indu Hariyale, Vina Gulhane

Paper Title:

Development of an Embedded Web Server System for Controlling and Monitoring of Remote Devices Based on ARM and Win CE

Abstract: The paper presents the design of an embedded Web server system, which is based on ARM920T processor. The server is implemented in VB with ASP. After the successful development of server it is transplanted on ARM processor. WIN CE is installed on ARM processor. This is because Win CE can be reduced and transplanted. The method used to transplant the web server on the embedded WIN CE platform, After the successful development of the embedded web server system it will be used for controlling and monitoring of remote devices. The remote device can be any electrical device. RF module is used for wireless communication between server and remote devices.AVR ATmega324 is used to control the wireless communication. AT each remote device RF module communicates with server via AVR ATmega8.

Keywords:
   Embedded web server; ARM, AVR, VB, ASP.


References:

1.        Srinivas Raja, G. Srinivas Babu, “Design of Web based  Remote Embedded Monitoring system” International Journal  of  Technology and Engineering system(IJTES),Jan-March 2011-Vol.2,No.2.
2.        Fang Hongping, Fang KangLing, “The Design of       Remote Embedded Monitoring System based on   Internet” Internationa Conference on Measuring         Technology and Mechatronics Automation,,2010.

3.        Young-tao ZHOU, Xiao-hu CHEN,XU-ping WANG ,Chun-      jiang YAO, “Design of equipment Remote Monitoring System Based on Embedded Web”, International conference on Embedded software and Symposium(ICESS2008), 2008.

4.        Zhan mei-qiong , Ji chang-peng “Research and   Implementation of Embedded Web Server”,International Conference on MultiMedia and Information Technology,        2008.

5.        Liu Yang, Linying Jiang , Kun Yue ,Heming Pang, “Design  and Implementation of the Lab Remote Monitoring System        Based on Embedded Web Technology” International Forum  on Information Technology and Applications, 2010

6.        Guoling Liu, Xiaozhu Wang, He Jiang, Runian Geng ,“Research on Embedded Remote Communication Mode”,      978-1-4244-6349-7/10, IEEE 2010 .

7.        Wang XinxinChen Yun and Yan Ruzhong,     “Implementation of the Web-based Mechanical and Electrical      Equipment Remote   Monitoring System”, Computer      Engineering, (31):231-233 ,2005 .

8.        Xu Wei, “The Research of Embedded Database of Mass  Storage Technology”, microcomputer Information, (in Chinese). (24):119-120 2008.

9.        Zhang Quan-gui, “Embedded Internet and the application in  the monitoring and control system, Information Technology”, vol. 28 no. 4, pp52-54,2004.

 

70-75

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

16.

Authors:

Reddy Bharath Kumar D, CH.Nagaraju

Paper Title:

A Novel Data Collection Scheme in Wireless Sensor Networks Using MASP

Abstract:  In wireless sensor networks the energy efficiency can be improved with path constrained sink mobility. But collecting data from the nodes deployed randomly by the mobile sink as limited communication time due to constant speed of the mobile sink in the path constrained approach. This affects the amount of data collected and the energy consumption of the network. To overcome this issue, a novel data collection scheme called MASP is proposed. MASP is implemented as a two phase communication protocol base on zone partition. Our results are validated and simulated using OMNET++.  .

Keywords:
    mobile sink, path constrained, STP, wireless sensor network (WSNs).


References:

1.        A.chakrabati, A.Sabharwal. and B.Aazhang”communication power optimization in a sensor Network with a Path-Constrained Mobile Observer” ACM Trans. Sensor Networks, vol.2, no.3, pp.297-324, Aug.2006.
2.        S.Jain, R.C.Shah, W.Brunette,  G.Borriello, and S. Roy, “Exploiting  Mobility  for  Energy Efficient Data Collection in  Sensor networks” mobile networks and applications, vol 11,no.3,pp.327-339,2006.

3.        R.C.Shah, S.Roy, S.Jain, and W.Bruneete, “Data MULESs: Modeling a Three- Tier Architecture for sparse Sensor Networks” Proc.First IEEE int,l Workshop on sensor Network Protocols and Applications ,pp.30-41,2003.

4.        A.Somasundra,A.Kansal, D.Jea,D.ESTIN, and M.Srivastava, ”controllably Mobile Infrastructure for Low energy  embedded networks” IEE Trans. Mobile computing, vol.5, no.8,pp.958-973,aug.2006

5.        J.Luo,J. Panchard, M.Piorkowski,M .Grosglauser, and J.Hubaux, “MobiRoue:Routing towards a Mobile Sink for improving Lifetime in Sensor Networks” Proc. Second IEEE/ACM int’l Conf.Distributed computing in sensor systems (DCOSS).

6.         Al-Karai and A.amal, “Routing Techniques in Wireless Sensor Networks’ Survey,” IEEE Wireless comm. Magazine vol.11, no.6, pp.6-28, Dec.2004. OMNET++3.3,http://www.omnetpp.org,Oct.2006.

7.         M. Marta and M. Cardei, “Using Sink Mobility to Increase Wireless Sensor Networks Lifetime,” Proc. Ninth IEEE Int’l Symp.World of Wireless, Mobile and Multimedia Networks (Wow Mom), pp. 1-10, 2008

8.        S.Gao, H.Zhang, and S.K. Das, “efficient data collection in wireless sensor networks with path-constrained Mobile sinks,”Proc,10thIEEE ,int’l symp, world of wireless, mobile and multimedia(Wow Mom), 2009.

9.        G. Xing, T. Wang, Z. Xie, and W. Jia, “Rendezvous Design Algorithms for Wireless Sensor Networks with a Mobile Base Station,” Proc. ACM Mobi Hoc, pp. 231-240, 2008

10.     A. Kansal, A. Somasundara, D. Jean, M. Srivastava and D. Estrin, “Intelligent Fluid Infrastructure for Embedded Networks”, proc. ACM Mobisys, pp. 111-124, 2004.

11.     M. Marta and M. Cardei, “Using Sink Mobility to Increase Wireless Sensor Networks Lifetime,” Proc. Ninth IEEE Int’l Symp.World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1-10,

76-79

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

17.

Authors:

S.Surekha, C.Rajendra

Paper Title:

Applications of Wireless Sensor Network By Avoiding Congestion

Abstract:   Wireless Sensor Networks (WSNs) have emerged as an important new area in wireless technology. In many real-life environment applications of WSN’s, data is generated continuously and it should reach the sink node without delay and loss. Congestion is the one of the main problem in Wireless sensor networks. Congestion detection and Avoidance in WSN’s is a critical issue, it will not only affect transmission reliability, but also causes transmission delay and will waste valuable energy resources. The data flowing through the WSN have great impact on the link load. The way of handling the data against the congestion is tough task. Queue occupancy is an accurate indicator of congestion. In this paper we propose the scheme that detects efficiently congestion by using queue occupancy parameter of a node. If queue length of any node has reached maximum threshold level then data should not be transmitted through that node for certain time period to avoid congestion. It overcomes the congestion by selecting alternative neighboring node which does not cause congestion and transmit the data reliably and fastly to the destination (sink node) without delay and loss.

Keywords:
Wireless network, Sensor, Congestion detection, Congestion avoidance, Low level, High level, Congestion notification (CN) bit, Alternative node selection and Queue occupancy.


References:

1.        Chieh-Yih  Wan,  Shane  B.  Eisenman  and  Andrew  T. Cambell, “CODA-Congestion Detection and Avoidance in Sensor”, in Proc. Of ACM SenSys “03.
2.        Vivek             Deshpande,              Prachi      Sarode,    Sambhaji  Sarode,”International   journal   of   Computer   Application”,Numbe 18, Article 6, Feb 2010.

3.        Y.Sankarsubramaniam,     Ozgur     B     Akan,     I.F. Akyildiz,”ESRT:Event to sink reliable transport in Wireless Sensor Network”,Proc. of ACM MobiHoc‟03

4.        C.Y. Wan, S. B. Eisenman, A. T. Campbell, “CODA: Congestion detection and avoidance in sensor networks,” In Proc. of the First International Conference on Embedded Networked Sensor Systems (Sensys) 2003 Los Angeles 266-279.

5.        DR.Helonde J B, GNIET ,Nagpur, India , “Early Detection Congestion Avoidance Mechanism for Wireless Sensor Network”,International  journal of computer applications, Sep 2010.

6.        Energy Efficient Congestion Control in Duty-Cycled Wireless Sensor Networks ongho Lee, Nonmember and Kwangsue Chung, Senior Member, IEEE School of Electronics Engineering, University of Kwangwoon, Seoul, Korea 2010.

 

80-82

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

18.

Authors:

Parul Ahuja, Vivek Sharma

Paper Title:

A Review on Mobile Agent Security

Abstract: Mobile agents are enjoying a lot of popularity and are destined to influence research in distributed systems for the years to come. Thus far, technology has been instrumental in disseminating new design paradigms where application components are not permanently bound to the hosts where they execute. Mobile agents are gaining in complexity as they evolve and are now widely used in e-commerce. All phases of a business transaction, such as negotiating and signing contracts can be done using mobile agents. In this paper, we provided a brief introduction to the recent researches & developments associated with the field of mobile agents, highlighting various security threats, also touching the weakest hot-spots of the field which need to be nurtured.

Keywords:
  Intelligent agent, Mobility, Security, Security Threats.


References:

1.     N. Jennings and M. Wooldridge, “Software Agents”, IEE Review, January 1996, pp. 17-20.
2.     O.A. Ojesanmi and A. Crowther, “Security Issues in Mobile Agents”, International Journal of Agent Technologies and Systems, 2(4), pp. 39-55, October-December 2010, University, Nigeria.

3.     D. C. Smith, A. Cypher and J. Spohrer (1994) “Programming Agents   without a programming language” Communications of the ACM 37 (7) pp 55-67.

4.     P. C. Janca (1995) “Pragmatic Application of Information Agents: BIS Strategic Decisions.

5.     T.  Selker (1994) “A Teaching Agent that learns” Communications of the ACM 37 (7) pp 92-99. D. C.

6.     G.P. Picco, “Mobile agents: an introduction”, Microprocessors and Microsystems 25(2001) pp. 65-74, Dipartimento di Elettronica e Informazione, Politecnico di Milano, Milan, Italy.

7.     H.S. Nwana, “Software Agents: An Overview”, Knowledge Engineering Review, 11(3):1- 40, 1996.

8.      M. Woodridge  and N. Jennings, “Intelligent Agents: Theory and Practice”, The Knowledge Engineering Review, 10(2):114-152, June 1995.

9.     S. Franklin, A. Graesser, “Is it an Agent, or just a Program?: A Taxonomy for Autonomous Agents”, University of Memphis, Proceedings of the Third International Workshop on Agent Theories, Architectures, and Languages, Springer-Verlag,1996.

10.  T. Finin, Y. Labrou & J. Mayfield, “KQML as an Agent Communication Language”, J. Bradshaw (Eds), MIT Press, 291-316, 1997.

11.  D. Gavalas, G.E. Tsekouras, C. Anagnostopoulos, “A mobile agent platform for distributed network and systems management”, In Journal of Systems and Software 82 (2), 355-371, 2009.

12.  A. Singh, D. Juneja, and A.K. Sharma, “Elliptical Curve Cryptography Based Security Engine for Multiagent Systems Operating in Semantic Cyberspace”, In International Journal of Research and Review in Computer Science (IJRRCS), Vol. 2, No. 2,     April 2011.

13.  C. Xiaorong, L. Su, L. Mingxuan, “Research of Network Security Situational Assessment Quantization Based on Mobile Agent”, Volume 25, 2012, Pages 1701–1707, International Conference on Solid State Devices and Materials Science, April 1-2, 2012, Macao.

14.  S. M.. Moussa, G.A.  Agha, “Integrating Encrypted Mobile Agents with Smart Spaces in a Multi-agent Simulator for Resource Management”,  Journal of Software, Vol 5, No 6 (2010), 630-636, Jun 2010.

15.  S. Karnouskos, “Security implications of implementing active network infrastructures using agent technology”, Special Issue on Active Networks and Services, In Computer Networks Journal, Elsevier, Vol. 36, Issue 1, pp. 87-100, June 2001.

16.  W. Jansen and T. Karygiannis, “Mobile Agent Security”, Nist Special Publication 800-19-, 2000. National Institute of Standards and Technology.

17.  [N. Borselius, “Mobile agent security”, Electronics & Communication Engineering Journal, IEEE London 14(5), 211-218(October 2002).

18.  W.A. Jansen, “Countermeasures for Mobile Agent Security”, National Institute of Standards and Technology, Gaithersburg, MD 20899, USA, wjansen@nist.gov.

19.  S.M.S.I. Rizvi, Z. Sultana, B. Sun, and  Md. W. Islam, “Security of Mobile Agent in Ad hoc Network using Threshold Cryptography”, World Academy of Science, Engineering and Technology 70- 2010.

20.  P. Dadhich, Dr. K. Dutta, and Prof.(Dr.) M.C. Govil, “Security Issues in Mobile Agents”, International Journal of Computer Applications(0975-8887), Volume 11-No.4, December 2010.

21.  D.M. Chess, “ Security issues in mobile code systems. In : mobile agents and security”,  Editor Vigna, vol. LNCS1419. Springer-Verlag 1998.

22.  K. Lauter, “The Advantages of Elliptic Curve Cryptography for Wireless Security”, In IEEE Wireless Communications, pp. 62-67. February 2004.

23.  R. Shanmugalakshmi and M. Prabu, “Research Issues on Elliptic Curve Cryptography and its applications”, In International Journal of Computer Science and Network Security, Vol. 9, No.6, pp 19- 22, June 2009.               

24.  A. Singh, D. Juneja, A.K. Sharma, “Introducing Trust Establishment Protocol in Contract Net Protocol”. In Proceedings of IEEE International Conference on Advances in Computer Engineering (ACE’2010), pp. 59-63, June, 2010.

25.  N. Koblitz, “Elliptic Curve Cryptosystems”, Mathematics of Computation, Vol. 48, pp. 203-209, 1987.

26.  V.S. Miller, “Use of Elliptic Curves in Cryptography”, Advances in Cryptology- CRYPTO’85, LNCS, vol. 218, Springer-Verlag, pp. 417-426,1986.

27.  V. Roth & M. Jalali-Sohi, “ Access Control and Key Management for Mobile Agents”, Fraunhofer Institute for Computer Graphics, Rundeturmstr. 6, 64283 Darmstadt, Germany, 8 November, 2001.

28.  G. Knoll, N. Suri, and J.M. Bradshaw, “Path-based Security for Mobile Agents”, Electronic Notes in Theoretical Computer Science, Vol. 58, No. 2 , pp. 16, (2002).

 

83-88

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

19.

Authors:

Rinku Rajankar, R.W. Jasutkar

Paper Title:

Fuzzy Approach to Mobile Cloud Computing

Abstract:  In a world that sees new technological trends bloom and fade on almost a daily basis, one new trend promises more longevity. This trend is called mobile cloud computing, and it will change the way we use computer and the Internet. The increased degree of connectivity and the increasing amount of data has led many providers and in particular data centers to employ larger This raises a bottleneck to efficiently access the data. In this paper we introduce idea of improving accessibility of Cloud using if then concept of Fuzzy. In the developing process of various servers proposed work make use of Microsoft’s latest windows Azure cloud computing platform. 

Keywords:
Mobile Cloud Computing, Azure framework, fuzzy IF-THEN rule.


References:

1.          Pipieter Simoens, Filip De Turck et al, “Remote Display Solutions for Mobile Cloud Computing,” IEEE Computer.
2.          Vijay Sarathy, Purnendu Narayan et al, “Next generation Cloud Computing Architecture,” 2010 Workshops on Enabling Technologies: Infrastructure for  Collaborative Enterprises.

3.          Li Ye-bai and Zhang Bin, Wang Hai-bin, “Study and Design on Data Management Model of SQL Server CE For Mobile Application,” 2010 International Conference on   e-Education, e-Business, e-Management and e-Learning.

4.          Wei Lu, Jared Jackson, Jaliya Ekanayake,et al “Performing Large Science Experiments on Azure: Pitfalls and Solutions” 2nd IEEE International Conference on Cloud Computing Technology and Science

5.          Amel Grissa Touzi and Mohamed Ali Ben Hassine, “New Architecture of Fuzzy  Database Management Systems,” The International Arab Journal of Information  Technology, Vol. 6, No. 3, July 2009

6.          Gwan-Hwan Hwang. “Supporting Cloud Computing in Thin-client/server Computing model ” 2010 IEEE International Symposium on Parallel and Distributed Processing with Applications.

 

89-91

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

20.

Authors:

Ashwini Motghare, Swapnili P. Karmore

Paper Title:

Hardware -in-the-Loop Search –Based Testing Approach to Embedded Systems

Abstract: The complexity of embedded systems is ever increasing while high system quality is being demanded at the same time. With the continuously growing software and system complexity in electronic control units and shortening release cycles, the need for efficient testing grows. In order to perform testing of electronic control units in practice search-based hardware-in-the-loop test environments are used to run the system under test in a simulation environment under real-time conditions.  The potential of applying search-based testing approach to the functional testing has been demonstrated in various test cases. The focus was mainly on simulating the system under test in order to evaluate test cases. However, in many cases only the final hardware unit is available for testing. This paper present an approach in which evolutionary functional testing is performed using an actual electronic control unit for test case evaluation. An extensive case study has been carried out to access its capabilities. We demonstrate the use of evolutionary testing for functional testing in an industrial setting by applying the developed solution to test functioning of serial production of an automation-system electronic control unit.

Keywords:
Evolutionary Algorithm (EA), Functional Testing, Hardware-in-the-loop-Testing (HiL), Automation-System (AS)


References:

1.          Byeongdo Kang, Young-Jik Kwon, Roger Y. Lee, “A Design and Test Technique for Embedded Software”, IEEE, 2005.
2.          Pei Tian, Kai Wang, Kai Qiang, ” Construction of Distributed Embedded Software Testing Environment”, IEEE, 2009.               

3.          Dae-Hyun Kum, Joonwoo Son, Seon-bang Lee, “Automated Testing  for Automotive Embedded Systems”, SICE-ICASE, 2006.

4.          Yongfeng YIN, Bin LIU, Guoliang ZHANG, “On Framework Oriented Embedded Software Testing Development Environment”, IEEE,2009.

5.          Kandl, S.Kirner, R. Puschner, “Development of Framework Automated  Systematic Testing of Safty-Critical Embedded Systems”, IEEE,  Intelligent Solutions in Embedded Systems, 2006.

6.          D. L. kaleita and N. Hartmann, “Test Development Challenges for  Evolving Automotive Electronic Technologies”, SAE, 2004-21-0015,2004.         

7.          Bringmann, E.Kramer, “Model-Based Testing Automotive Systems”, IEEE, Software Testing, Verification, and Validation, 2008.

8.          Lindlar, F. Windisch, “A Search-Based Approach to Functional Hardware-in-the-Loop Testing”, IEEE, 2010.

9.          Siegl, S.Caliebe, “Improving Model-Based Verification of Embedded System by Analyzing Component Dependences”, IEEE, Industrial Embedded Systems (SIES), 2011.

10.       N. H. Lee and S. D. Cha, “Generation Test Sequences from a Set of  MSCs”, The International Journal of Computer and                     Telecommunications Networking, Volume 42, Issue 3, Page 405 – 417, 2003. 

11.       Y. G. Kim, H. S. Hong, D. H. Bae and S.D.Cha,”Test Cases Generation from UML State Diagrams”, IEE proceedings, online no. 199990602, 1999.

12.       R. L. Probert, H. Ural and A.W.Williams, “Rapid Generation of  Functional Tests using MSCs, SDL and TTCN”, Computer Communications, Volume 24, Issues 3-4, Page 374-393, 2001.

13.       Wegener, J.; Baresel, A.; Sthamer, H.; “Evolutionary test environment for automatic structural testing”, Information and Software Technology, 2001.

 

92-95

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

21.

Authors:

Vivekanand P. Thakare, N. A. Chavan

Paper Title:

Performance Evaluation of Parking Guidance and Management  System using Wireless Sensor Network

Abstract: To deal with the parking guidance system issue related to the parking lots, this   paper   proposes   a   vision of improvements in parking   guidance   and information system based on wireless sensor network.  This system consists of parking space monitoring nodes (senor nodes), parking status display unit (PSDU), Micro Control Unit (MCU) and Central Co-ordinator. The guiding nodes transmit the information of vehicle entrance through   wireless   sensor   network. Micro Control Unit sends information to sensor nodes as well as PSDU which shows the parking status and also display the nearest parking lot. All the process can be monitored by the central co-ordinator. The preliminary test results show that the performance of this WSN based system can effectively satisfy the needs and requirements of the existing parking systems. Also it minimizes the time consumed for finding the free parking lot as well as nearest parking lot.

Keywords:
Wireless Sensor Network (WSN), Parking Status Display Unit (PSDU), Micro Control unit (MCU), Advanced Virtual RISC (AVR).


References:

1.        Mingkai Chen, Tainhai Chang, “A Parking guidance & Information system based on Wireless Sensor Networks”, IEEE International Conference on information & Automation Shenzhen, China, June 2011.
2.        Mingkai Chen, Chao Hu and Tianhai Chang. “The Research on Optimal Parking Space Choice Model in Parking Lots”. 2011 3rd International Conference on Computer Research and Development, March 11 – 13, 2011,Shanghai, China,Vol. 2, pp:93-97.

3.        Abhijit Sharma, Rituparna Chaki, Uma Bhattacharya, “Applications of Wireless Sensor Network in intelligent traffic system: A Review”, 978-1-4244-8679-3/11,IEEE 2011.

4.        S. V. Srikanth, Pramod P. J., Dileep K. P., Tapas S., Mahesh U. Patil, Sarat Chandra Babu N, “Design & Implementation of a Prototype Smart PARKing (SPARK) System using Wireless Sensor Networks” International Conference on  Advanced Information Networking & Applications workshops, 978-0-7695-3639-2/09, 2009 IEEE.

5.        Seong-eun Yoo, Poh Kit Chong, Taehong Kim, Jonggu Kang, Daeyoung Kim, Cahngsyb Shin, Kyungbok Sung, Byungtae Jang,“PGS: Parking Guidance System based on Wireless Sensor Networks”, 978-1-42441653-0/08, 2008 IEEE.

6.        Vipin Kumar Verma, Rahul Chaudhari, Siddharth Kumar Singh, Tapas Mishra, Pankaj Srivastava , “Intelligent Transport Management System using Wireless Sensor Networks”, IEEE Intelligent Vehicle Symposium Elndhoven University of technology Elndhoven, Netherlands, June 4-6, 2008.

7.        Fanyu Kong and Jindong Tan, “A Collaboration-based Hybrid Vehicular Sensor Network Architecture” Proc. International Conference on Information and  Automation, June 20 -23, 2008, pp.584-589.

8.        Jatuporn Chinrungrueng, Udomporn Sunantachaikul, Satien Triamlumlerd, “ Smart Parking: An Application of Wireless Sensor Network”, International Symposium on Applications and Internet  Workshops(SAINTW07), 978-0-7695-2757-4/07, 2007 IEEE.

9.        Rakesh Kumar, Naveen K Chilamkurti, Ben Soh, “A Comparative Study of Different Sensors for Smart Car Park Management”, International Conference on Intelligent Pervasive Computing, 2007”, 978-0-7695-3006-0/07, 2007 IEEE.

10.     S. Shaheen, C. Rodier, and A. Eaken, “Smart parking management field test: A bay area rapid transit (bart) district parking demonstration”, Jan 2005. Final Report.

11.     Yaser E. Hawas and Marc Joseph B. Napenas, “Infrastructureless Inter-Vehicular Real-Time Route Guidance”, Proc. 11th International IEEE Conference on Intelligent Transportation Systems, 12-15 Oct 2008, pp. 1213-1219.

12.     IrisNet: Internet -scale Resource-Intensive Sensor Network Service, http://www.intel-iris.net

13.     Seong-eun Yoo, Poh Kit Chong, Taisoo Park, Youngsoo Kim, Daeyoung Kim, Cahngsyb Shin, Kyungbok Sung, Hyunhak Kim,“DGS: Driving Guidance System based on Wireless Sensor Networks”, 978-0-7695-3096-3/08, 2008 IEEE.

14.     Xu Li, Wei Shu, Minglu Li, Hongyu Huang and Min-You Wu, “DTN Routing in Vehicular Sensor Networks”, Proc. Global Telecommunications Conference, GLOBECOM” 2008, pp. 752-756.

15.     Vanessa W.S. Tang, Yuan Zheng, Jiannong Cao,” An Intelligent Car Park Management System based on Wireless Sensor Networks”, 1st International Symposium on Pervasive       Computing and Applications, 2006, pp. No. 65 – 70. IEEE 2006.

 

96-102

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

22.

Authors:

Sweeta A.Kahurke, Bhushion N. Mahajan

Paper Title:

Implementation of Priority Based Scheduling and Congestion Control Protocol in Multipath Multi-Hop WSN

Abstract: :- Congestion Control and data fidelity is the most important goal in wireless sensor network. Wireless sensor network is the event based system. When the event occurred, multiple sensor nodes sense the same event and are active for transmitting the information. Transfer rate could  be varied due to multiple events occurred simultaneously. This increases too much data traffic in the network, load becomes heavy this lead to network congestion.  Congestion causes packet drop, low throughput, increasing queuing delay, retransmission of packets this causes consumption of additional energy and wastage of communication resources . In this paper, we implemented  a priority based scheduling and congestion control protocol (PBSCCP) using multipath multihop routing in wireless sensor network . This new scheme is alleviated congestion in network , increases the throughput and packet delivery ratio and also minimize delay . This scheme is also increased network efficiency based on delivery of packets .

Keywords:
Congestion Control, Packet delivery ratio, priority of packets, network efficiency, priority based scheduling and congestion control protocol , data fidelity


References:

1.           D.F.Jenolin Flora , Dr.V.Kavita , M.Muthuselvi  “A Survey on Congestion Control Techniques in  Wireless Sensor Network” Proceeding of ICETECT    2011. PP . 1146-1149.
2.           Dongho Lee, and Kwangsue Chung, “Adaptive duty-cycle    based congestion control for home automation networks”, IEEE Trans.Consumer Electronics, vol. 56, No. 1, pp. 42-47, Feb. 2010.

3.           C.-Y. Wan, A. T. Campbell, and L. Krishnamurthy, “PSFQ: A reliable transport protocol for wireless sensor networks,” Proc. First ACM Intl. Workshop on Wireless Sensor Networks and Applications (WSNA ’02), Atlanta, GA, 2002.

4.           C. Wang, B. Li, K. Sohraby, M.Daneshmand, and Y. Hu, “Upstream congestion control in wireless sensor networks through cross-layer optimization”, IEEE Journal on Selected Areas in Communications, vol. 25, No. 4, pp. 786-795, May 2007.

5.           R. Anantharangachar , C. Reddy and D.Ranganathan , “A Case study of Survice Oriented Application Integration Framwork”.

6.           Shigang Chen, and Na Yang, “Congestion avoidance based on lightweight buffer management in sensor networks”, IEEE Trans. Parallel and Distributed Systems, vol. 17, No. 9, pp. 934-946, Sep. 2006.

7.           Ozgur B. Akan, and Ian F. Akyildiz, “Event to sink reliable transport in wireless sensor networks”, IEEE Trans. Networking, vol. 13, No. 5, pp.1003-1016, Oct. 2005.

8.           Jenn-Yue Teo, Yajun Ha, and Chen-Khong Than, “Interferenceminimized multipath routing with congestion control in wireless sensor network for high-rate streaming”, IEEE Trans. Mobile Computing, vol.7, No. 9, pp. 1124-1137, Sep. 2008.

9.           C.Y.Wan , S.B. Esenman and A.T. Combell , “CODA : Congestion detection and avoidance in sensor network”, proc . ACM SENSYS 2003, Los Angeles , CA , USA ,
Nov 2003 pp. 266-279.

10.        Guangxue Wang and Kai Liu , “Upstream Hop-by-Hop Congestion Control in wireless sensor networks”. IEEE 2009.

11.        Chonggang Wang , Kazem Sohraby , Victor Lawrence , Bo Li , Yueming Hu , “Priority based congestion control in wireless sensor networks” , proceeding of IEEE International Conference on sensor networks, Ubiquitous and Trustworthy computing (SUTC’06) IEEE 2006.

12.        Zhibin Li , Peter X. Liu , “ Priority based congestion control in multipath and multihop wireless sensor network” , proceeding of 2007 IEEE international conference on robotics and biomimetics.

13.        Joa-Hyoung Lee and In-Bung Jung , “Adaptive- Compression based congestion control Technique for wireless sensor network” , Sensors 2010 , ISSN 1424 – 8220 , WWW.mdpi.com/journal/sensors.

14.        Atif Sharif , Vidyasagar Pothdar , A.J.D.Rathanayaka , “ Priority enabled Transport layer protocol for wireless sensor network” , 2010 IEEE 24th international conference on advanced information networking and application workshop.

15.        Xiaoyan Yin , Xingsche Zhou , Rongscheng Huang , “A Fairness – Aware congestion control scheme in wireless sensor networks” , IEEE Transactions on vehicular technology vol-58 , No-9 , November 2009.

16.        Srikanth Jagabathula , Devavrat Shah, “A Fair Scheduling in Networks through packet election”,IEEE Transactions on information theory vol-57,No. – 3, march 2011.

 

103-108

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

23.

Authors:

Sweeta A.Kahurke, Bhushion N. Mahajan

Paper Title:

Novel Image Compression Technique WithImproved Wavelet Method

Abstract: :-  Image compression is minimizing the size in bytes of a graphics file without degrading the quality of the image to an unacceptable level. The reduction in file size allows more images to be stored in a given amount of disk or memory space. It also reduces the time required for images to be sent over the Internet or downloaded from Web pages. . This would imply the need for a compression scheme that would give a very high compression ratio very high compression ratio usually comes with a price. This refers to the quality of the image. Wavelet method for compression gives better vision and quality. In our case we are taking the Modified Haar wavelet transformation (MFHWT) method with SVD. This research work will not only compress the images but also take care for the loss of information.

Keywords:
Wavelet , Haar, MFHWT, SVD


References:

1.        Kazuhiko HAMAMOTO “Study on Medical Ultrasonic Echo Image  Compression by JPEG2000” – Optimization and the subjective assessment of the quality – Proceedings of the 25 Annual International Conference of the IEEE EMBS Cancun, Mexico September 17-21, pp 833 – 836, 2003.
2.        Y.-G. Wu “GA-based DCT quantisation table design procedure for  medical images” IEEE Proc.-Vis. Image Signal Process, Vol. 151,    No. 5, pp 353 – 359, October 2004.

3.        Guofang Tu, Derong Liu  and  Can Zhang “A New Compression     Algorithm for Medical Images Using Wavelet Transform”  0-7803-88 12-7/05/20.00 pp 84 – 89 ,2005 IEEE.

4.        Gerald Schaefer, Roman Starosolski and Shao Ying Zhu “An evaluation of lossless compression algorithms for medical infrared images” Proceedings of the 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference. Shanghai, China, September 1-4,pp                                  

5.        1673 – 1676, 2005

6.        P. Tsai “Histogram-based reversible data hiding for vector  quantisation-compressed images” IET Image Process., 2009, Vol. 3,      Iss. 2, pp. 100–114 doi: 10.1049/iet-ipr.2007.0220

7.        Piyamas Suapang, Kobchai Dejhan and Surapun Yimmun “A Web-based DICOM-Format Image Archive, Medical Image Compression and DICOM Viewer System for Teleradiology Application” SICE Annual Conference 2010 August 18-21, PR0001/10/0000-3005, pp 3005 – 3011,  2010.

8.        Piyamas Suapang, Kobchai Dejhan and Surapun Yimmun “Medical Image Archiving, Processing, Analysis and  Communication System for Teleradiology” IEEE  TENCON, 978-1-4244-6890-4/10, pp 339 – 345, 2010.

9.        Puja Bharti, Dr. Savita Gupta and Ms. Rajkumari Bhatia “Comparative Analysis of Image Compression Techniques: A Case Study on Medical Images” 2009 International Conference on Advances in Recent Technologies in Communication and Computing, IEEE 978-0-7695-3845-7/09, pp 820 – 822, 2009.

10.     K.V.Sridhar and Prof. K.S.R.Krishna Prasad “MEDICAL IMAGE COMPRESSION USING ADVANCED CODING TECHNIQUE” ICSP2008 Proceedings, IEEE 978-1-4244-2179-4/08, 2008.

11.     Yen-Yu Chen and Shen-Chuan Tai “Embedded Medical Image Compression Using DCT Based Subband Decomposition and Modified SPIHT Data Organization” Proceedings of the Fourth IEEE Symposium on Bioinformatics and Bioengineering (BIBE’04) 0-7695-2173-8/04,2004.

12.     D Campbell, A Maeder and F Tapia-Vergara “Mammogram JPEG Quantisation Matrix Optimisation for PACS” Seventh Australian and New Zealand Intelligent Information Systems Conference, 18-21 November 2001, Perth, Western Australia

13.     Yong-Jie Ni, Chan-Hyun Youn, Hyewon Song, Byoung-Jin   Kim and Youngjoo Han “A PACS-Grid for Advanced Medical Services based on PQRM” ISSNIP IEEE , 1-4244-1502-0/07,2007.

14.     Yung-Gi Wu “Medical Image Compression by Sampling DCT Coefficients” IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, VOL. 6, NO. 1, MARCH 2002.

15.     Seoncheol Hwang, Jeongwhan Lee, Junyoung Lee, Jeonghoon Kim, Inkwee Choi,Gunsoo Shin, Heejoung Kim, M youngho Lee “DEVELOPMENT OF WWW-BASED TELEPACS USING SATELLITE DATA COMMUNICATION SYSTEM” Proceedings of the 20th Annual International Conference of the ZEEE Engineering in Medicine and Biology Society, Vol. 20, No 3,pp 1281 – 1283, 1998.

 

109-111

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

24.

Authors:

A. P. Zurani, B. N. Mahajan

Paper Title:

Clustered Time Synchronization Algorithm for Wireless Sensor Networks

Abstract: A Time Synchronization algorithm based on Cluster for WSN was Proposed for WSN ( Wireless Sensor Network)  -(CTS) Clustered Time Synchronization algorithm for WSN. This algorithm consist of two phases: In the Cluster-Inter Synchronization phase- It adopt pair-wise  packet exchange mechanism to achieve time synchronization  between the Base station and cluster heads through establishing a hierarchical topology structure. In the Cluster-Intra Synchronization phase  – It used reference broadcast mechanism to achieve time synchronization between the cluster heads and cluster members. The purpose of this algorithm is to set the logical clock of the cluster heads and cluster nodes with global time. The simulation result shows that this algorithm has better synchronization accuracy and lower power consumption and better synchronization precision as compared to Reference Broadcast Synchronization (RBS), Timing-Sync Protocol for Sensor Networks (TPSN) algorithms

Keywords:
 Sensor Networks, Time Synchronization, Malicious   nodes, Battery, clustered synchronization, delay , energy, cluster, reference broadcast.


112-116

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

25.

Authors:

Sonia Sharma, Shikha Rai

Paper Title:

Genetic K-Means Algorithm – Implementation and Analysis

Abstract: K-means algorithm is most widely used algorithm for unsupervised clustering problem. Though it is accepted but it has some problems which make it unreliable. Initialization of the random cluster centres, number of clusters and terminating condition play a major role in quality of clustering achieved. This paper empirically analyses a derived form [Krishna &Narasimha, 1999] of K-means using Genetic algorithm approach. The new algorithm prevents algorithm to converge towards local minima by considering a rich population of potential solutions. A tool that implements this algorithm is presented in the paper. The time complexity and execution expectation is also tested over an exhaustive set of data of different dimensions.

Keywords:
   K-Means clustering, Genetic Algorithm, Local Minima, Optimization.


References:

1.     Krishna K, Murty M “ Genetic K-means algorithm” ,IEEE Transactions on Systems, Man and Cybernetics ,Part B: Cybernetics 1999 , 29:433-439.
2.     William A. Greene “Genetic Algorithms For Partitioning Sets” University of New Orleans New Orleans, LA 70148,2000

3.     Monica Chi,” Evolutionary  Hierarchical Clustering Technique”,2001

4.     N. Sujatha,” Refinement Of Web Usage Data Using Clustering From K Means Using GenticAlgorithm”,Research Scholar, Department of Computer Science Madurai Kamaraj University, Madurai,European Journal of Scientific Research , 2010

5.     Hall, L.O. Ozyurt, I.B.  Bezdek, J.C,” Clustering With Genetically Optimized Approach”,1999

6.     R. J. W. Hodgson,”Genetic Algorithm Approach to Particle Identification by Light Scattering”,2000

 

117-120

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

26.

Authors:

Jeff Huang, Ken Nagasaka

Paper Title:

Allocation of Greenhouse Gas (GHG) Emission for Japanese Electric Utility Post Kyoto Protocol

Abstract: In May 2011, the Japanese Government decided not to participate in the new reduction agreement which will take place after the end of Kyoto Protocol. The Japanese Government believes the new reduction agreement is not capable of tackling the global Greenhouse Gas (GHG) emission problem unless all large GHG emitting countries, such U.S and China, participate. Although the Japanese Government has decided not to participate in this new reduction agreement, it still undertook initiatives to set up its new emission reduction targets. From the latest revision of the Strategic Energy Plan in 2010, Japan has committed to reduce its GHG emission level by 25% compared to its 1990 level, conditional on other industrialized countries making similar reduction effort. Although the target has been established, it did not specify the allocation of the GHG emission reduction target to each General Electric Utility (GEUs) in Japan. In this research we began with an analysis of electricity demand forecasting and relate GHG emission of Japanese Electric Utility Post Kyoto Protocol by Artificial Neural Networks (ANN) methodology. Then based on these forecasting results, we allocated the target emission allowance to each Japanese General Electric Utility (GEUs) in 2013-2016 based on two most common allocation approaches, namely the Grandfathering Approach and the Output-based Benchmarking Approach. In the conclusion, we analyzed the trends and necessary actions that the Japanese electric utility need to undertake to achieve its emission target under different allocation approach.

Keywords:
    Allocation, Benchmarking; Forecasting; Greenhouse Gas (GHG) Emission


References:

1.           The Strategic Energy Plan of Japan, Ministry of Economy Trade and Industry Japan (METI), 2010, http://www.meti.go.jp/
2.           Yi, M.M., K.S. Linn and M. Kyaw, “ Implementation of Neural Network Based Electricity Load Forecasting”, World Academy of Science, Engineering and Technology, Singapore. Volume 32. pp: 381- 386. ISSN 2070-3740, 2008

3.           Mamum . M.A., K. Nagasaka and S.M Salim Reza, “ Load Demand Prediction of a Power System by Applying an Intelligent Method”, 3rd International Conference Electrical & Computer Engineering ICECE, Dhaka, Banagladesh. pp: 198-201. ISBN 984-32-1804-4, 2004

4.           R. Betz, W. Eichhammer, J. Schleich. “ Designing National Allocation Plans for EU emissions trading – A Fiest Analysis of the Outocme” Energy & Environment, vol.15,  number3, pp.375-425, 2004

5.           General Guidance to the allocation methodology, European   Commission,, 2011. http://ec.europa.eu/

6.           Position paper on Benchmarking and allocation rules in phase three of the EU Emissions Trading System, CAN Europe, 2010. http://www.ucl.ac.uk/cclp/

7.           Environmental Action Plan by the Japanese Electric Utility Industry, The Federation of Electric Power Companies of Japan (FEPC) , 2010. http://www.fepc.or.jp/

 

121-126

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

27.

Authors:

Yogita L, Pankaj H. Rangaree

Paper Title:

A Biometric ECG Identification using LNF in Wireless Body Area Sensor Network

Abstract:  Wireless body area sensor networks low-power integrated circuits, and wireless communications have enabled the design of low-cost, miniature, lightweight, and intelligent physiological sensor nodes. These nodes, capable of sensing, processing, and communicating one or more vital signs, can be seamlessly integrated into wireless personal or body networks (WPANs or WBANs) for health monitoring. These networks promise to revolutionize health care by allowing inexpensive, non-invasive, continuous, ambulatory health monitoring with almost realtime updates of medical records via the Internet. This paper proposes a power and area efficient electrocardiogram (ECG) acquisition and signal processing application sensor node for wireless body area networks (WBAN). This sensor node can accurately record and detect the QRS peaks of ECG waveform with high-frequency noise suppression. analog front end integrated circuit (IC) and digital application. This ECG sensor node is convenient for long-term monitoring of cardiovascular condition of patients, and is very suitable for on-body WBAN applications.we minimize the other signal such as the ECG signal along with a bunch of noise is in analog form. In we use the Low Noise Filter (LNF) to filter the noise from the ECG Signals.

Keywords:
     Wireless body area sensor network, GSM model, ECG Sensor Node


References:

1.           Honggang Wang, Hua Fang, Liudong Xing, Min Chen,( 2011) ” An Integrated Biometric-based Security Framework Using Wavelet-Domain HMM in Wireless Body Area Networks (WBAN)” IEEE Communications Society subject matter experts for publication in the IEEE ICC proceedings.
2.           Raju Singh(March 2011) “Confidentiality & Authentication Mechanism for Biometric Information Transmitted over Low Bandwidth & Unreliable channel” School of Computer Engineering and IT, Shobhit University, Meerut, India Vol.3, No.2,

3.           Mikael Soini, Jussi Nummela, Petri Oksa, Leena Ukkonen and Lauri Sydänheimo (2009).” Wireless Body Area Network for Hip rehabilitation” Tampere University of Technology, Department of Electronics, Rauma Research Unit pp. 202-206 .

4.           Cory Cornelius(August 2010) “On Usable Authentication for Wireless Body Area Networks” Department of Computer Science Dartmouth College, Presented at HealthSec, .

5.           Jamil Y. Khan, Mehmet R. Yuce, and Farbood Karami “Performance Evaluation of a Wireless Body Area Sensor Network for Remote Patient Monitoring”

6.           A. Soomro, D. Cavalcanti, IEEE (Feb 2007)“Opportunities & Challenges using WPAN  and WLAN Technologies in Medical Environments”, Communications Magazine, vol:45, no:2, page 114-122.

7.           Adnan Saeed, Miad Faezipour IEEE 2009,

8.           ”Plug and Play Sensor Node for Body Area Network”,. Jamil Y. Khan,school of computer science,Australia,IEEE (09,07, 2009,)

9.           ”Wireless Body Area Network for Medical Applications”. Emil Jovanov, Dejan Raskovic, John Price,John Chapman, Anthony Moore, Abhishek Krishnamurthy,IEEE (2008) ,.” Patient Monitoring Using Personal Area Networks of Wireless Intelligent Sensors”.

10.        CHRIS OTTO, ALEKSANDAR MILENKOVIĆ, COREY SANDERS, EMIL JOVANOV, Journal of Mobile Multimedia, Vol. 1, No.4 (2006) 307-326

11.        ” SYSTEM ARCHITECTURE OF A WIRELESS BODY AREA SENSOR NETWORK FOR UBIQUITOUS HEALTH MONITORING”.

12.        Chao Chen and Carlos Pomalaza-Ráez , International Journal of Computer Science and Information Technology, Volume 2, Number 3, 16June 2010.,

13.        ”Implimenting and EvaluatingA wireless body Sensor System for Automated Physiological Data Acquisition At Home”, Frank Agyei-Ntim, Member IEEE, Kimberly Newman, Senior Member IEEE, September 2-6, 2009,

14.        “Lifetime Estimation of Wireless Body Area Sensor Network for Patient Health Monitoring” 31st Annual International Conference of the IEEE EMBS Minneapolis, Minnesota, USA, Adnan Saeed, Mehrdad Nourani, Gil Lee, Gopal Gupta and Lakshman Tamil ,IEEE 2007,

15.        ” A Scalable Wireless Body Area Sensor Network for Health-Care Monitoring “, The University of Texas at Dallas, Richardson, Texas. Adnan Saeed*, Miad Faezipour*, Mehrdad Nourani*, Subhash Banerjee, June 2009 , ” A Scalable Wireless Body Area Network for Bio-Telemetry”, Journal of Information Processing Systems, Vol.5, No.2.

16.        Aleksandar Milenković, Chris Otto, Emil Jovanov, Accessed: July 2005, “Wireless Sensor Networks for Personal Health Monitoring:Issues and an Implementation” .

17.        Mehmet R. Yuce & Steven W. P. Ng & Naung L. Myo &Jamil Y. Khan &Wentai Liu , “Wireless Body Sensor Network Using Medical Implant Band”, Received: 10 July 2007 / Accepted: 25 July 2007.

 

127-130

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

28.

Authors:

Nupur Singh, Pinky Tanwar

Paper Title:

Image Fusion Using Improved Contourlet Transform Technique

Abstract:   Image fusion is the process by which two or more images are combined into a single image retaining the important features from each of the original images. The fusion of images is often required for images acquired from different instrument modalities or capture techniques of the same scene or objects .Several approaches to image fusion can be distinguished, depending on whether the images are fused. The purpose of image fusion is to combine information from several different source images to one image, which becomes reliable and much easier to be comprehended by people (Youcef and Amrane,2003). Image fusion can be broadly defined as the process of combing multiple input images or some of their features into a single image without the introduction of distortion or loss of information. The objective of image fusion is to combine complementary as well as redundant information from multiple images to create a fused image output. Therefore, the new image generated should contain a more accurate description of the scene than any of the individual source image and is more suitable for human visual and machine perception or further image processing and analysis tasks.

Keywords:
   LFS, HFS, ICNT, CNT, ALM


References:

1.     Ali , F.E . Dokany , I. M. El.Saad , A. A.  and  Abd El-Samie , F.E. (2008) , “   Fusion   of MR and CT Images Using The Curvelet Transform”, 25th National  Radio  Science Conference (NRSC 2008).
2.     Burt , P .(1992) “A gradient pyramid basis for pattern selective image fusion.” the Society for Information Displays (SID) International Symposium Digest of Technical Papers,23,pp467-470.

3.     Burt , P. and Adelson , E .(1983), “Laplacian pyramid as a compact image code,” IEEE Transactions on Communications, Vol.31, No. 4.

4.     Burt , P.J .and Kolczynski , R . J .(1993),“Enhanced image Capture through fusion,”IEEE 4th International Conf. on Computer Vision, vol. 4, pp.173-182.

5.     Cao ,W . Li , B .and  Zhang , Y . (2003) “A remote sensing image fusion method based on pca and wavelet packet transform,”IEEE Int. Conf. Neural Networks and
Signal Processing, China , pp.976-981

6.     Chui , C .K. and  Lian , J.(1996)  “A study on orthonormal multiwavelets,” Applied Numerical Mathematics, vol. 20(3) , pp. 273-298.

7.     Choi , M . Kim, R.Y . Nam, M. Rand  Kim , O.H ,(2005) “Fusion Of Multispectral And Panchromatic Satellite Images Using The Curvelet Transform,” IEEE Geosci. Remote Sens., vol. 2, no. 2, pp. 136–140

8.     Dawei , Z. and Fang ,Z .(2007) ,“A New Improved Hierarchical Model of Image Fusion ,”The Eighth International Conference on Electronic MeasurementandInstruments,pp.25-35.

9.     Gonzalez, R.C.andWoods, R.E. (1994) “Digital Imag Processing, Addison Wesley, Reading”

10.  Hui ,T. and Binbin,W.(2009) , “Discussion and Analyze on Image Fusion Technology”, Second International Conference on Machine Vision , pp.246-250.

11.  He , D.C . Wang , L. and  Amani , M. (2004) ,“A new technique for multiresolution  image fusion ,pp.4901-4904.

12.  Hu , X . Lu , H and  Zhang ,L (2010) , “A New Type of Multi-focus Image Fusion Method Based on Curvelet Transforms”, International Conference on Electrical and Control Engineering,pp  172 -175.

13.  Jun,Y  .Zhong . ming , (2007) ,“Multi-focus image fusion method based on curvelet transform”, Opto-Electronic Engineering, vol.34, no.6, pp.67-71.

14.  Krishnamoorthy , S. and  Soman , K .P. (2010) “Implementation and Comparative Study of Image Fusion Algorithms,” International Journal of Computer Applications , Volume 9–No.2,pp.25-35.

15.  Lajevardi , S.M .and  Hussain , Z.M ,(2009), “Facial Expression Recognition Using Log-Gabor Filters and Local Binary Pattern Operators”, International  Conference  On Communication and  Power (ICCCP ) MUSCAT,pp 349-353.

16.  Li H., Maniunath B. S.. and Mitra ,S. K,(1995),“Multisensor image fusion using the wavelet Transform,”Graphical Models and Image Processing, 57(3),235-245.

17.  Li , Y . Xu,  X , Bai  , B .D. and   Zhang , Y .N .(2008), “Remote Sensing Image Fusion Based On Fast Discrete Curvelet Transform,” IEEE Trans. Geosci. Remote Sens.vol.1,pp.106-109.

18.  Mara , N.S.S . and Fookesb , C  .(2010), “Automatic Solder Joint Defect Classification using the Log-Gabor Filter” Advanced Materials Research, vol. 97-101. pp. 2940-2943.

19.  Mehrotra , H . Majhi , B and  Gupta , P.(2009), “Multi-algorithmic Iris Authentication System”, International Journal of Electrical and Computer Engineering,pp 78—82.

20.  Mallat,S.G .(1989),”A theory of multiresolution signal decomposition: the wavelet representation,” IEEE Trans on Pattern Analysis and Machine Intelligence,vol.11,pp,674-693

21.  Olkkonen ,H .and Pesola ,P. (1996) ,“Gaussian Pyramid Wavelet Transform for Multiresolution Analysis of Images,” Graphical Models and Image Processing,vol.58,pp.394-398

22.  Shu Xia ,Z .and  Xun Zheng ,C .(2009) , “Medical Image Fusion Based on An Improved Wavelet Coefficient Contrast”, School of Computer Science, Shaanxi Normal University ,China,pp.1-4.

23.  Shen ,Y. Ma , J .and Ma , L .(2006) , “An Adaptive Pixel-weighted Image Fusion Algorithm Based on Local Priority for CT and MRI Images” , Instrumentation and Measurement Technology Conference Sorrento, Italy,pp.420-422.

24.  SABARI .BANU,R. (2011) ,“Medical Image Fusion by the analysis of Pixel Level Multi-sensorUsing Discrete Wavelet Transform ,” Proceedings of the National Conference on Emerging Trends in Computing Science, pp.291-297.

25.  Sun , F . Li , S .and  Yang , B. (2008), “A New Color Image Fusion Method for Visible Infrared Images”, Proceedings of  IEEE International Conference on Robotics and Biomimetics  Sanya, China , pp 2043 -2048.

 

131-136

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

29.

Authors:

Vishal Garg, Nisha Raheja

Paper Title:

Image Denoising Using Curvelet Transformation Using Log Gabour Filter 

Abstract In this we propose a new method to reduce noise in digital image. Image corrupted by Gaussian Noise is still a classical problem. In images to reduce the noise or to improve the quality of image peak signal to noise ratio (PSNR) is compared. Higher the PSNR better the quality of the image.In this paper we explain the method curvelet Transformation using log gabor filter Experimental results show that our method gives comparatively higher peak signal to noise ratio (PSNR), are much more efficient and have less visual artifacts compared to other methods.

Keywords:
   Image Denoising, Discrete Wavelets Curvelet, Log Gabor filter.


References:

1.           Buades, B. Coll, and J Morel.  A non-Local Algorithm for image denoising.  IEEE International Conference on Computer Vision  and Pattern Recognition, 2005.
2.           Buades, B. Coll, and J Morel. On image denoising methods.  Technical Report 2004-15, CMLA, 2004.

3.           Mallat,  S.,  A  wavelet  tour  of  signal processing, Second addition,  Academic Press, 1998.

4.           G.Y.Chen, T.D.Bui A.Krzyzak,”image denoising using neighboring wavelet coefficient ,”Proc.of IEEE International conference on acoustics, speech and signal Processing ICASSP,  Montreal, que.,Canada,2004

5.           Unser, P.-G., Thévenaz P. And Aldroubi A., Shift-Orthogonal wavelet bases using splines, IEEE Signal Processing Letters, Vol. 3, No. 3, pp. 85-88,1996     .

6.           Donoho, D.L., Johnstone, I.M., Adapting to Wavelet shrinkage, 1995

7.           Vidakovic, B., Non-linear wavelet shrinkag with Bayes rules and  Bayes factors, J.American Statistical Association, 93, pp. 173-179, 1998 known  smoothness  via
wavelet Shrinkage, 1995.

8.           Ogden, R.T.  “Essential Wavelets for Statistical Applications and Data Analysis”, Birkhauser, Boston, 1997.

9.           Vidakovic, B., Ruggeri, F., BAMS method: theory and simulations, Sankhy, pp. 234–249, 2001

10.        “Feature Adaptive Wavelet Shrinkage for Image Denoising” Karunesh K.Gupta’and Rajiv Gupta2 IEEE – ICSCN 2007, MIT Campus, Anna University, Chennai, India. Feb. 22-24, 2007. pp.81-85.

11.        Fast non local means (NML) computation with probabilistic early termination, Ramanath vignesh, byung Tae Oh, and C.-C jay kuo, IEEE Signal Processing letters, vol. 17, NO. 3, March 2010.

12.        Image denoising based on wavelet shrinkage   using neighbor and level dependency, International Journal of Wavelet, multiresolution and Information processing , Vol. 7, No. 3,(2009) 299- 311,World scientific Publishing company.

13.        Ming Zhang and Bahadir. A new image denoising method based on the bilateral filter.This work was supported in part by the National Science foundation under grant no 05287875.1-4244-1484-9/08/$25.00©2008, ICASSP 2008

14.        Qing Xu, Hailin jiang, Reccardo scopigno, and Mateu Sbert.A new apporch for very dark video denoising and enhancement.Proceeding of 2010 IEEE 17th
international conference on image processing,September 26-29 2010,Hong kong.

15.        R.K.Kulkarni, S.Meher, Mrs.J.M.Nair. An algorithm for image denoising by Robust estimator. European journal of scientific research, ISSN 1450-216X vol.39 No3 (2010) pp.372-380

137-141

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

30.

Authors:

Sonia Sharma, Anjali Dua

Paper Title:

Design and Implementation of an Stegnography Algorithm Using Color Transformation

Abstract: In a computer, images are represented as arrays of values. These values represent the intensities of the three colors R(ed) G (reen) and B (lue), where a value for each of the three colors describes a pixel. Through varying the intensity of the RGB values, a finite set of colors spanning the full visible spectrum can be created. In an 8-bit gif image, therecan be 28 = 256 colors and in a 24-bit bitmap, there can be 224 = 16777216 colors. Large images are most desirable for steganography because they have the most space to hide data in. The best quality hidden image is normally produced using a 24-bit bitmap as a cover image. Each byte corresponding to one of the three colors and each three-byte value fully describes the color and luminance values of one pixel. The cons to large images are that they are cumbersome to both transfer and upload, while running a larger chance of drawing an “attacker’s” attention due to their uncommon size.  Our main focus to introduce the stegnography using color transformation.

Keywords:
Stegnography, Color Transformation, RGB, Data Hiding, Imperceptability.


References:

1.        Lisa M. Marvel, Member, IEEE, Charles G. Boncelet, Jr., Member, IEEE, and Charles T. Retter, Member, IEEE, “Spread Spectrum Image Steganography”, IEEE
TRANSACTIONS ON IMAGE PROCESSING, VOL. 8, NO. 8, AUGUST 1999.

2.        Jessica Fridrich, Miroslav Goljan,Binghamton, Department of Electrical Engineering, Binghamton, NY,” Practical Steganalysis of Digital Images – State of the Art”, Conference , San Jose CA , ETATS-UNIS (21/01/2002).

3.        Kevin Curran, Internet Technologies Research Group, University of  Ulster ,Karen Bailey, Institute of Technology, Letter Kenny , Ireland,” An Evaluation of Image Based Steganography Methods, International Journal of Digital Evidence Fall 2003, Volume 2, Issue 2.

4.        Sabu M Thampi,Assistant Professor,Department of Computer Science & Engineering,LBS College of Engineering, Kasaragod,Kerala- 671542, S.India  ,” Information Hiding Techniques: A Tutorial Review”, ISTE-STTP on Network Security & Cryptography, LBSCE 2004.

5.        Kefa Rabah, Department of Physics, Eastern Mediterranean University, Gazimagusa, North Cyprus, Turkey,” Steganography-The Art of Hiding Data”, Information Technology Journal 3 (3): 245-269, 2004,ISSN 1682-6027.

6.        Mantiuk,R.Myszkowski,Seidel,H.-P.MPI Informatik, Saarbrucken, Germany,“Visible difference predicator for high dynamic range images “, IEEE International Conference on Systems, Man and Cybernetics , Oct. 2004, ISSN: 1062-922X.

7.        C. A. Bouman,” The Visual Perception of Images” Digital Color Imaging    magazine,April, 2005.

8.        H.-C. Wu, N.-I. Wu, C.-S. Tsai and M.-S. Hwang,” Image steganographic scheme based on pixel-value differencing and LSB replacement methods”, IEEE Proc.-Vis. Image Signal Process., Vol. 152, No. 5, October 2005.

9.        Ching-Yu Yang, Department of Computer Science and Information Engineering,National Penghu University Penghu, Taiwan,” Color Image Steganography based on Module Substitutions”, Third International Conference on International Information Hiding and Multimedia Signal Processing Year of Publication: 2007 ISBN:0-7695-2994-1.

10.     S .K. Moon , R.S. Kawitkar,PICT, Pune and SCOE, Pune,INDIA,” Data Security using Data Hiding”, International Conference on Computational Intelligence and Multimedia Applications 2007.

11.     Jae-Gil Yu1, Eun-Joon Yoon2, Sang-Ho Shin1 andKee-Young Yoo, Dept. of Computer Engineering, Kyungpook National University Daegu, Korea,” A New Image Steganography Based on 2k Correction and Edge-Detection”, Fifth International Conference on Information Technology: New Generations 978-0-7695-3099-4/08 © April 2008 IEEE.

12.     Junhui He, Shaohua Tang and TingtingWu,School of Computer Science and Engineering,South China University of Technology,University Town, Guangzhou 510006, China2008,” An Adaptive Image Steganography Based on Depth-varying Embedding”, Congress on Image and Signal Processing, Steganographic technique is a means of covert communication.Volume 5, Issue , 27-30 May 2008 Page(s):660 – 663.

 

142-144

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

31.

Authors:

Shruti Bangre, Alka Jaiswal

Paper Title:

SQL Injection Detection and Prevention Using Input Filter Technique

Abstract:  SQL injection attacks, a class of injection flaw in which specially crafted input strings leads to illegal queries to databases, are one of the topmost threats to web applications. A number of research prototypes and commercial products that maintain the queries structure in web applications have been developed. But these techniques either fail to address the full scope of the problem or have limitations. Based on our observation that the injected string in a SQL injection attack is interpreted differently on different databases, in this paper, we propose a novel and effective solution to solve this problem. It has been proposed to detect various types of SQLIA. This method checks the attribute value for single quote, double dash and space provided by the user through the input fields. When attacker is making SQL injection he should probably use a space, single quotes or double dashes in his input. Depending on the no of space, double dash and single quote the count value of the input field (having default count as1) will get increased by 1 respectively. The fixed count value and the dynamically generated count value of the input parameters are then compared. If both the count values are same, there is no SQLIA and if they vary that means some SQL code has been injected through the input fields. Finally such attempt will be recorded separately and will be blocked to access the database.

Keywords:
  SQLIA, attribute, etc


References:

1.           The Open Web Application Security Project, “OWASP TOP 10 Project” http://www.owasp.org/ .
2.           PHP, magic quotes,     http://www.php.net/magic_quotes/.

3.           Apache Struts project, Struts. http://struts.apache.org/.

4.           C. Gould, Z. Su, P. Devanbu, “  JDBC Checker: A Static       Analysis Tool for SQL/JDBC Applications”  , In Proceedings of the 26th International Conference on Software Engineering (ICSE), pp. 697-698, 2004.

5.           G Wassermann, Z. Su, “  An Analysis Framework for Security in Web Applications”  , In Proceedings of the FSE Workshop on Specification and Verification of Component-Based Systems(SAVCBS), pp. 70-78, 2004.

6.           Thomas. S, Williams. L, “Using Automated Fix Generation ot Secure SQL Statements”, In Proceeding of the 29th international Conference on Software Engineering Workshops (ICSEW. IEEE Computer Society), pp. 54, 2007

7.           Paros. Parosproxy.org, http://www.parosproxy.org/

8.           Kosuga. Y, Kernel. K, Hanaoka. M, Hishiyama. M, Takahama. Yu, “  Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Injection”  , In Proceedings of the Computer Security Applications Conference 2007, pp. 107-117, 2007.

9.           Yonghee Shin, “Improving the Identification of Actual Input Manipulation Vulnerabilities”, 14th ACM SIGSOFT Symposium on Foundations of Software Engineering ACM, 2006.

10.        Z. Su, G. Wassermann, “  The Essence of  Command Injection Attacks in Web Applications”  , In Conference Record of the 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 372-382, 2006.

11.        Halfond W. G, Orso. A, “AMNESIA: Analysis and Monitoring for NEutralizing SQL-Injection Attacks”, In Proceedings of the 20th IEEE/ACM international Conference on Automated Software Engineering, pp. 174-183, 2005.

12.        Buehrer. G, Weide. B. W, Sivilotti. P A, “Using Parse     Tree Validation to Prevent SQL Injection Attacks”, In Proceedings of the 5th international Workshop on Software Engineering and Middleware, pp. 105-113, 2005.

13.        Wei. K, Muthuprasanna. M, Kothari. S, “Preventing SQL injection attacks in stored procedures”, Software Engineering Conference 2006. Australian, pp. 18-21,
2006.

14.        S. Boyd, A. Keromytis, “SQLrand: Preventing SQL injection attacks”, Applied Cryptography and Network Security LNCS, Volume 3089, pp. 292-302, 2004.

15.        Jae-Chul Park, Bong-Nam Noh, “SQL Injection Attack Detection: Profiling of Web Application Parameter Using the Sequence Pairwise Alignment”, Information Security Applications LNCS, Volume 4298, pp. 74-82, 2007.

16.        F. Valeur, D. Mutz, G. Vigna, “A Learning-Based Approach to the Detection of SQL Attacks”, In Proceedings of the Conference on Detection of Intrusions and Malware and Vulnerability Assessment, pp 123-140, 2005.

17.        Huang. Y, Huang. S, Lin. T, Tasi. C, “Web application security assessment by fault injection and behavior monitoring”, In Proceedings of the 12th international Conference on World Wide Web, pp 148-159, 2003.

18.        GotoCode, http://www.gotocode.com/ .

19.        W. G. Halfond, J. Viegas, A. Orso, “A Classification of SQL-Injection Attacks and Countermeasures”, In proceeding on International Symposium on Secure Software Engineering Raleigh, NC, USA, pp. 65-81, 2006.

 

145-150

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

32.

Authors:

Pankita A Mehta, Vivek Pandya

Paper Title:

Impacts of DG on Distribution Losses

Abstract:   This paper shows the results obtained in the analysis of the impact of distributed generation (DG) on distribution losses. The main objective has been to determine if DG whether increments or decrements distribution losses, based on the penetration level and dispersion of DG and on the different DG technologies. Different scenarios with several penetration levels and dispersion of DG have been studied. The special characteristics of different DG technologies have been taken into account. The considered technologies are: combined heat and power (CHP), wind turbines, photovoltaics and some theoretical ones. Real radial distribution feeders have been used.

Keywords:
   Distributed generation (DG), Distribution, Losses.


References:

1.        Power System Operation. Preliminary Report 2001.” Red Eléctrica de España, 2001.
2.        P. P. Barker and R. W. de Mello, “Determining the Impact of Distributed Generation on Power Systems: Part 1 – Radial Distribution Systems”, 2000 IEEE Power Engineering Society Summer Meeting, Seattle, Washington, 2000, pp. 1645 1656.

3.        Embedded Generation. London, UK, The Institution of Electrical Engineers, 2000.

4.        V. H. Méndez, J. Rivier and T. Gómez, “Tratamiento Regulatorio de las Pérdidas en el Mercado Eléctrico Español”, 7as Jornadas Hispano-Lusas de Ingeniería Eléctrica, Madrid, 2001, pp. 91-96.

5.        “Allocation of losses in distribution systems with embedded generation”, J. Mutale, G. Strbac, S. Curcic and N. Jenkins, IEE Proceedings. Generation, Transmission and Distribution, Vol. 147, Nr. 1, January 2000, pp. 7-14.

6.        “Royal Decree 1164/2001, dated October 26th, setting access tariff to transmission and distribution networks”, Ministry of Economy, Oficial State Journal, 2001, pp. 40618-40629.

7.        G. Jóos, B. T. Ooi, D. McGillis, F. D. Galiana and R. Marceau, “The Potential of Distributed Generation to Provide Ancillary Services”, 2000 IEEE Power Engineering Society Summer Meeting, Seattle, Washington, 2000, pp. 1762-1767.

 

151-155

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

33.

Authors:

Nikhil Dalshania, Anand Bora, Aditya Bhongle

Paper Title:

Reversible Watermarking: A comparative Study

Abstract: Considering the age of reversible watermarking which is just a decade to count, it has fetched enormous attention of researchers to boast of. Due to many researches in this field, it has become very difficult to judge an algorithm for a specific application. So a definite need arises to compare these algorithms on some criteria. In this paper, we present a comprehensive and competitive study of three basic algorithms which are reversible watermarking using data compression, Tian’s difference expansion and histogram bin shifting. We have compared these algorithms based on criteria like PSNR, embedding capacity and processing time.

Keywords:
ReversibleWatermarking,Compression, difference expansion, histogram bin shifting, PSNR, embedding capacity, processing time


References:

1.        J. Tian, “Reversible data embedding using a difference expansion,” IEEE Transactions on Circuits Systems and Video Technology, vol. 13, no. 8, pp. 890–896, Aug. 2003.
2.        J. Tian, “Wavelet-based reversible watermarking for authentication,” in Proceedings of SPIE Sec. and Watermarking of Multimedia Cont. IV, vol. 4675, Jan. 2002.

3.        Ni, Z., Y.Q. Shi, N. Ansari and W. Su, “Reversible data hiding”, IEEE Trans. Circ. Syst. Video Technology, 16:354-362, 2006.

4.        Guorong Xuan   Jiang Zhu   Jidong Chen   Shi, Y.Q.   Zhicheng Ni   Wei Su, “Distortionless data hiding based on integer wavelet transform”, Department of Computer Science, Tongji University, Shanghai, Dec 2002.

5.        C. D. Vleeschouwer, J. E. Delaigle, and B. Macq, “Circular interpretation of histogram for reversible watermarking”, in Proceedings of the IEEE 4th Workshop on Multimedia Signal Processing, pp. 345–350, France, Oct. 2001.

 

156-158

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

34.

Authors:

P.Kannan, K.Balamurugan, K.Thirunaavukkarasu

Paper Title:

Reducing the Particle Fracture in Dissimilar Friction Welds by Introducing Silver Interlayer 

Abstract:  The present work discusses about the introduction of silver interlayer in dissimilar friction welding process. The characteristics of silver interlayer influenced friction weld are compared with the silver free dissimilar friction welding process. Particle fracture occurs commonly in welding process. It leads to poor quality of welds and decreases the strength of the weld. The introduction of silver interlayer reduces the particle fracture. Hence, the friction welding process with silver interlayer produces more efficient welds.

Keywords:
  Dissimilar Friction Welding, Particle fracture, Silver interlayer


References:

1.        Alpas, A.T., and Zhang, J., 1992, “Effect of sic particulate  reinforcement on the dry sliding wear of aluminium-silicon alloys (A356)”, wear 155: 83-104.
2.        Zhao, D., Tuler, F.R., and Lloyd, D.J., 1994, “Fracture at elevated temperatures of a particle reinforced composite”, Acta Metallurgica Materialia 42 (7): 2525-2533.

3.        Dunkerton, S.B., 1982, report 201/1982, “The effect of interlayers on dissimilar friction weld properties”, TWI, Abington Hall, Cambridge.

4.        Dunkerton, S.B., 1982, report 229/1982, “The effect of interlayers on dissimilar friction welds properties” TWI, Abington Hall, Cambridge.

5.        Lewis, C.A., and Withers, P.J., 1995, “Weibull modelling of particle cracking in metal matrix composites”, Acta Metallurgica Materialia 43 (10): 3685 – 3699.

 

159-160

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

35.

Authors:

Ravi Prakash Shukla, Mukesh Kumar, A.K. Jaiswal, Rohini Saxena

Paper Title:

Performance Analysis of Dispersion in Optical Communication link Using Different Dispersion Compensation Fiber (DCF) Models

Abstract:   Fiber-optic dispersion   and   its effect   on   optical transmission system are analyzed. The most commonly used dispersion compensation fiber (DCF) technology is studied in this    article. Three schemes (pre-compensation, post­ compensation, mix-compensation of dispersion compensation) of dispersion   compensation   with   DCF   are   proposed.  In  this  study,  we  propose  three  DCF  compensation scheme,  pre-compensation,  under-compensation  and mix compensation  scheme.  Simulation studies show that mix compensation scheme is the best. It can greatly reduce the influences   of   the   fiber   nonlinearity   and   increase   the transmission distance greatly. The simulation model of the WDM based on the Optisystem is presented according to the above principle.  The simulation  results  such  as  Q  factor  and  BER  are  given  and  deeply  analyzed. It is found that mix- compensation performance is the best. And the input fiber power is taken about 16 dB, the corresponding BER performance is better.

Keywords:
   dispersion compensation, optical communication dispersion compensation fiber (DCF) Model,    BER, Q-factor


References:

1.     Mochida Y, Yamaguchi N, Ishikawa G, “Technology-oriented review and vision of 40Gb/s-based optical transport Networks”, Journal of light-wave technology.PP. 2272-228,12002,20(12)
2.     Zhang Hongb in, Q iu Kun, “Emulation of characteristics of optical fiber transmission for a 10Gb/s single channel situation,” acta photonica sinica 2001 vol.30 No.6 715-720

3.     Omae T, “Universal conditions for estimating the nonlinear refractive index n2 of dispersion com- pensating fibers by the CW- 43 SPM method”, IEEE Photon. Technol. Lett., Vol 13. No.6, pp. 571-573, Nov, 2001.

4.     Mohammad. Amin. Dallaali, “Malin Premaratne Power and dispersion constrained optimization of optical links with unequally spaced repeater modules”, Optical Fiber Technology, Vol 13, No 4, pp.309-317, October. 2007.

5.     Zou X Y, Hayee M I, H wang S M, et al. Limitations in 10 GB/s WDM optical-fiber transmission when using a variety of fiber types to manage dispersion and nonlinearities [J]. Light wave Technol., PP: 1144-1152, June, 1996

6.     WuQiang, Yu Chong Xiu, “Analysis on dispersion compensation with DCF”, semiconductor optoelectronics,Vol.24 No.3 pp.186- 196.June 2003

7.     Zhaohuaigang, “study on dispersion compensation in optical transmission system”, study p n optical communications, Vol.3, No.141, 2007

8.     Wangchen, Raomin, “the performance of the DCF Transmission system”, Journal of applied sciences, Vol.21, No.2,pp.177-181,June 2003

9.     BU CHAL IF, LANNES. Fast eye monitor for 10G/bs and its application for optical PMD compensation [Z]. Optical Society of America, 2000.

10.  Killy R I, Thiele H J, Mikhailov v, ea al. Reduction of intrachannel nonlinear distortion in 40-Gb/s based WDM transmission over standard fiber [J]. IEEE Photonics Technology Letters, 2000, 12(12): 1642-1626

11.  Eggleton B 1. Dynamic dispersion, compensation devices for high speed transmission systems. Optical Fiber communication conference and exhibit, 2001(3): WHlII-WH1I3

12.  Djafar K. Mynbaev Lowell L. Scheiner, Fiber-optic communications technology. Beijing: Science publishing company, 2002

13.  Jianjun Yu, Bojun Yang,”Dispersion-allacated soliton technology with long amplifier spacing and long distance,” IEEEphoton technol lett, vol 9, pp. 952-954,No.7, 1997:

14.  ZhouZhiQiang, TangYuLiang, “Optimum schemes of dispersion compensation transmission systems using dispersion compensation fibers”, laser technology, VoI.24, No.5, pp.265-269 Oct.200

161-163

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

36.

Authors:

Vishal B. Langote, D. S. Chaudhari     

Paper Title:

Segmentation Using Outlier Based Adaptive Thresholding

Abstract:    Image segmentation plays an important role in image analysis as a frequent pre-processing step, which divides the image into set of different segments. Thresholding is an easy yet efficient method for image segmentation, while dividing different objects with distinct gray levels. Finding an effective threshold is especially complicated task in the segmentation. In this paper, for efficient threshold selection fuzzy methodology used which produces better segmentation results than other methodologies. It was observed that at different background intensity levels favourable results were obtained.

Keywords:
    Image segmentation, thresholding, fuzzy methodology


References:

1.        Pal N. R. and Pal S. K., ‘A Review on Image Segmentation Techniques’, Pattern      Recognition 26(9), 1277–1294, 1993.
2.        Verma D. and Meila M., ‘A Comparison of Spectral Clustering Algorithms’, Ph. D. Thesis, University of  Washington Technical Report, 2001.

3.        Shi J. and Malik J., ‘Normalized Cuts and Image Segmentation’, IEEE Transactions on Pattern Analysis and Machine Learning, 888-905, 2000.

4.        Ng Y., Jordan M. I. and Weiss Y., ‘On Spectral Clustering: Analysis and An Algorithm’, NIPS, 849-856, 2002.

5.        Kannan R., Vempala S. and Vetta A., ‘On Clustering – Good, Bad and Spectral’, FOCS, 367-37, 2007.

6.        Meila M. and Shi J., ‘Learning Segmentation By Random Walks’, NIPS, 873-879,2000

 

164-167

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

37.

Authors:

Rashmi Mishra, Baibaswata Mohapatra, Nitin Naiyar

Paper Title:

Effect of Cyclic Prefix on OFDM System

Abstract:  Orthogonal Frequency Division Multiplexing (OFDM), because of its resistance to multipath fading, has attracted increasing interest in recent years as a suitable modulation scheme for commercial high-speed broadband wireless communication systems. OFDM can provide large data rates. Orthogonal frequency division multiplexing (OFDM) is one of the Multi-Carrier Modulation (MCM) techniques that transmit signals through multiple carriers. These carriers (subcarriers) have different frequencies and they are orthogonal to each other. There are different parameters which alters the performance of OFDM system. This thesis analyzes OFDM system and the effect of cyclic prefix and length of cyclic prefix on OFDM system. Besides, compare the performance of the system with and without cyclic prefix and with different RSF(Repeated Symbol Fraction).BER performance of the OFDM system is carried out with emphasis on the cyclic prefix and RSF. The simulation results show how a tradeoff is needed between reduction in multi-path effects and Transmission efficiency.

Keywords:
     BER, RSF, ISI


References:

1.        Jianwei  Huang, Vijay  G. Subramanian, Rajeev  Agrawal, and  Randall  Berry,    “Joint  Scheduling  and  Resource  Allocation  in Uplink  OFDM  Systems   for Broadband  Wireless  Access  Networks “ , IEEE  Journal  2009.
2.        Ian C. Wong and Brian L. Evans “Optimal Resource Allocation in the OFDMA  Downlink with Imperfect Channel Knowledge “

3.         “Time-Varying Carrier Offsets in Mobile OFDM “ ,Scott L. Talbot, and Behrouz Farhang-Boroujeny, S.M. Alamouti, “A simple transmit diversity technique for wireless communications,” IEEE Journal on Selected Areas in Communications, Vol. 16, No. 8, Oct. 1998, pp. 1451-1458.

4.        Michele Morelli, Luca Sanguinettiand H. Vincent Poor, “A Robust Ranging Scheme for OFDMA-Based Networks”

5.        Jianghua Wei, Yuan Liu, “Carrier Frequency Offset Estimation Using PN Sequence Iteration in OFDM Systems”

6.        H. Yin and H. Liu, “An efficient multiuser loading algorithm for OFDM based broadband wireless systems,” in Proc. IEEE Globecom, vol. 1, pp.  103–107, Dec. 2000.

7.        Poonam Singh, Saswat Chakrabarti, “A Bandwidth Efficient Multiple Access  Scheme  using MSE-OFDM” , “2010 5th International Symposium on Wireless Pervasive Computing (ISWPC)”

8.        Y.Emre and C. Chakrabarti School of Electrical, “Energy-Aware Adaptive OFDM Systems”, “Acoustics Speech and Signal Processing(ICASSP)” 2010,IEEE Conference on 14-19 march 2010”

9.         F Prianka, M A Matin, A Z Saleh, M A Mohd Ali , “BER Analysis of OFDM with Improved ICI Self- Cancellation Scheme”, “ICMMT 2010 Proceedings”

10.     Jianghua Wei Yuan Liu, “Carrier Frequency Offset Estimation Using PN Sequence  Iteration   in OFDM Systems”, “2010 Second International

 

168-170

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

38.

Authors:

Bhumika, Vivek Sharma

Paper Title:

Use of Honeypots to Increase Awareness regarding Network Security

Abstract: Honeypots are closely monitored decoys that are employed in a network to study the trail of hackers and to alert network administrators of a possible intrusion. Honeypots are a relatively new technique for achieving network security. While other techniques for securing networks e.g. IDS, Firewall etc are made to keep the attackers out, for the first time in the history of network security there is a technique which intends to keep the attackers ‘in’ thus allowing the researchers to gain more insight into the workings of an attacker. With the rapid development of Internet and the advent of the network socialization, network security has been more concerned in the technologies. Among the main network security technologies are firewall, intrusion detection techniques, access control, etc., which are based on the known facts and attack mode and adopt passive defensive approach. The current commonly-used intrusion detection technology of passive defense, based on model matching, needs to update the intrusion detection rule library, otherwise omission of the latest attack will occur in the process. To eliminate the shortcomings of detection system being unable to update feature library, the users should adopt a proactive defense honeypot technology to automatically update its att ack signature to reduce the miss probability of int rusion detection system. Honeypot is a newly-developing area of network security. It lures the intruder to attack it by constructing a system with security vulnerability and then record the intrusion methods, motives, and tools of the intruder in the intruding process. By analyzing the intrusion information, we can get the content of the newest techniques of the intruder and find the system vulnerability. And the virtual honeypot can prevent the host computer from attacking.

Keywords:
   Honeypots, Honeyd, Honeynets, IDS, Network Security


References:

1.        Lance Spitzner, Honeypots: Tracking Hackers. Addison Wesley, September 13,2002
2.        Eric Peter et al., A Practical Guide to Honeypots. http://www.cse.wustl.edu/˜jain/cse571-09/ftp/honey/index.html, Fetched 20/06/2011.

3.        RyanTalabis,Honeypots101:RisksandDisadvantages. http://www.philippinehoneynet.org/index.php?option=com_docman&task=doc_download&gid=4&Itemid=29. 2007, Fetched 21/06/2011

4.        HoneynetProject.KnowYourEnemy:Honeynets.http://www.honeynet.org/papers/honeynet/

5.        Neils Provos, A Virtual Honeypot Framework. SSYM’04 Proceedings of the 13th conference on USENIX Security Symposium, Volume 13, 2004

6.        Neils Provos,Thorsten Holz, Virtual Honeypots: From Botnet Tracking to Intrusion Detection. Addison Wesley Professional, July 16, 2007

7.        RyanTalabis,Honeypots101:What’sinitforme?. http://www.philippinehoneynet.org/index.php?option=com_docman&task=doc_download&gid=3&Itemid=29, 2007, Fetched 21/06/2011

 

171-175

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

39.

Authors:

Pushpa .R. Suri, Mahak

Paper Title:

Image Segmentation With Modified K-Means Clustering Method

Abstract:  Image segmentation is used to recognizing some objects or something that is more meaningful and easier to analyze In this paper we are focus on the the K means clustering  for segmentation of the image. K-means clustering is the most widely used clustering algorithm to position the radial basis function (RBF)  centres. Its simplicity and ability to perform on-line clustering may inspire this choice. However, k-means clustering algorithm can be sensitive to the initial centres and the search for the optimum centre locations may result in poor local minima. Many attempts have been made to minimise these problems In this paper two updating rules were suggested as alternatives or improvements to the standard adaptive k-means clustering algorithm. The updating methods are proposed to give better overall RBF network performance rather than good clustering performance. However, there is a strong correlation between good clustering and the performance of the RBF network. The sensitivity of the RBF network to the centre locations will also be studied.Thus we will test the modified K means different set of images. 

Keywords:
    Image segmentation, anisotropic diffusion, smoothing filters, contrast enchancement.


References:

1.        A.K. Jain,  M. and P.J.Flynn [1999]. Data clustering:  A review, ACM Computing  Survey vol.31(3): 264–323.
2.        Anderberg,  M. [1973]. Cluster  Analysis for Applications,  New York:  Academic Press. Boulton,  D. and  Wallace,  C. [1973]. An information  measure  for hierarchic  classirication The Computer  Journal vol.16(3): 254–261.

3.        C.Hampton, T.Persons, C. W. and Y.Zhang [1998]. Survey of image segmentation, Technical Survey .  http://isgwww.cs.uni-magdeburg.de/ karsten/segmentation.pdf  (Avaliable 7/03).

4.        Davis, D. and D.W.Bouldin [1979]. A cluster  separation measure,  IEEE  Trans. On Patter Analysis and Machine  Inteligence  vol.1(4): 224–227.

5.        Dunn,  J.  [1973]. A fuzzy relative  of the  isodata  process and  its use in detecting  compact well-seperated  clusters,  J. Cybern. vol.3(3): 32–57.

6.        Forgy,  E.  [2000].  Cluster  analysis  of multivariate data:   efficiency vs.  interpretability of classifications,  abstract, Biometrics  vol.21: 768–769.

7.        J.Liu  and  Yang,  Y.-H. [1994]. Multiresoution color image segmentation, IEEE  Trans. On Patter Analysis and Machine  Inteligence  vol.16(7): 689–700.

8.        J.T.Tou [1979]. Dynoc