Volume-5 Issue-5

 Download Abstract Book

S. No

Volume-5 Issue-5, November 2016, ISSN:  2277-3878 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

Archana Singh, K. G. Upadhyay

Paper Title:

Impact of Electricity Trading through Power Exchange of India

Abstract: There is dependency on voluntary agreements for electricity trading in India as well as in various other developed countries. In developed countries, private initiatives are taken to standardize the commodities contracts which play an important role in increasing the trading volume to improve efficiency in overall. For electricity trading, workable spot market is necessary to develop competitive financial contract and so establishment of a viable National Power Exchange under the decentralized trading arrangement concept is formalized to obtain the least impact on existing procedures and practices for the regional system operators and states. In the paper materializing short-term trading in the spot market year wise with power exchange has been elaborated.

Keywords:
Electricity Act2003, Power trading, Herfindahl-Hirschman index, Indian Energy Exchange.


References:

1.       Daniel S. Kirschen and Goran Strbac, 2004,Fundamentals of Power System Economics ,USA, May 2004, Wiley-IEEE Press.
2.       S Stoft, Power system economics: Designing markets for electricity, Wiley Inter-science and IEEE press, 2002.

3.       Wolak F. A., 2004, reforming the Indian electric supply industry, May 2004, available: http://www.stanford.edu/~wolak..

4.       Balachandra P.,2006,Implications of private sector participation in power generation-A case study from India, Energy Policy,vol.34,no.16,november2006,pp.2491-2497.

5.       Upadhyay K.G., .Singh S.N, Chauhan D.S. and Srivastava G.S, 2001, Electricity utility restructuring model for Indian power systems, 5th International Power Engineering Conference (IPEC2001) Singapore, 17-19 May 2001, pp.575-580.

6.       Anoop Singh, 2006,Power sector reform in India: current issues and prospects, Energy Policy ,vol.34,no.16,November 2006.

7.       http://www.iitk.ac.in.ime/anoops.

8.       Bhushan B., 2006, A market design for developing countries, CIGRE Session, No.C5-208, pp.1-8.

9.       Balachandra P., 2006, Implications of private sector participation in power generation –A case study from India, Energy Policy , November 2006,vol.34, no.16, pp.2466-2479.

10.    Srivastava A. and Shahidepour M., 2002, restructuring choices for the Indian power sector, IEEE Power Engineering Review, vol.22, no.11, Nov.2002, pp.25-29.

11.    Singh S.N. and Srivastava S.C., 2004, Electric power industry restructuring in india: present scenario and future prospect, Proc. of IEEE International Conference on Electric Utility Deregulation, Restructuring and Power Technologies (DRPT), April 2004, vol.1, pp.20-23.

12.    http://www.powermin.nic.in.

13.    Sarkar P.K.,2009 “Developing power markets- Developments of market place for meeting the demand –Case India ,in transition from regulated to competitive market.”World energy council.

14.    World Bank, “Governance and Regulation of Power Pools and System Operators, “Technical Paper382.

15.    Shah H.,2000.Electricity in India. Financial Times Energy.

16.    International Energy Agency.2002.Electricity in India, Paris: OECD/IEA.

17.    Staff paper on developing a common platform for electricity trading, CERC, Jul.2006.

18.    United Kingdom power exchange, UK, [Online], Available: http://www.ukpx.com.

19.    Nord pool [Online. Available: http://www.nordpoolspot.com/

20.    California ISO,http://caiso.com.

21.    Powernext, France, [Online].Available:http://www.powernext.fr/

22.    Amsterdam power exchange, Netherlands, [Online], Available: http://www.apx.nl

23.    Wadhwa, S2009.electricity market development: draft CERC regulations. Ingrained Energy Thought Leadership Series, Round table Discussion Delhi.

24.    ”Open Access in Inter-State Transmission”, Central Electricity Regulatory Commission, New Delhi, India, Nov.2003.

25.    Power Trading Corporation of India Limited, http://www.ptcindia.com.

26.    http:// www.cea.in.

27.    P.Bajpai and S.N.Singh ,”An Electric Power Trading Model for Indian Electricity Market,” IEEE PES General Meeting, Canada, June 2006.

28.    Archana Singh, P.K. Kalra, D.S.Chauhan, K.G.Upadhyay, ”Effect of Power Exchange in India: An Overview and Key issues”, Journal of Institution of Engineers (India):Series B,vol.94,issue 3,pp207-214,September-2013.

29.    Indian energy exchange, India [Online], Available: http://www.iexindia.com/

30.    Power exchange India limited, India, [Online], Available: http://www.powerexindia.com/

 

1-4

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.

Authors:

Madhuri M. Deshpande, Sharad D. Gore

Paper Title:

Chunking Marathi Text using Marathi Grammar Rules and Conceptual Dependency Representation

Abstract: The paper aims at using a rule based chunker to create chunks, such as noun phrase (NP) and verb phrase (VP), for a given Marathi sentence. Chunking is the process that labels segments of a sentence with syntactic constituents such as noun/verb/adjective phrases (NP, VP, AP). Chunking is an important task in Natural Language Processing (NLP).  We have used a modified YASS POS tagger to tag the input Marathi sentence. We have applied Marathi grammar rules, in the form of regular expressions, and used the Conceptual Dependency (CD) theory representation to represent the dependency of words in Marathi sentence, which ultimately would depict the meaning of words in the sentence with respect to the context in which a bag-of-words are used. A rule-based chunker create chunks in Marathi sentence. Conceptual Dependency Theory focuses on concepts and understanding about a concept instead of syntax and structure.

Keywords:
 Chunking, Conceptual Dependency, Dependency Parser, Natural Language Processing.


References:

1.       Abney, S., “Parsing by Chunks.” In Principle-Based Parsing, eds. B. Berwick, S. Abney, and C. Tenny, 257-278. Dordrecht: Kluwer Academic Publishers.
2.       Bellaris H. S. K and  Askhedkar L. Y, A Grammar of the Marathi Language, 1868, Obtained in digital format digitized by the Internet Archive in 2007 with funding from Microsoft Corporation.

3.       Bharati, A., Chaitanya V., Sangal R, “Natural Language Processing: A Paninian Perspective.” New Delhi: Prentice-Hall of India, 1995.

4.       Chakrabarti, D., Mandalia H., Priya R., Sarma V. and Bhattacharyya P., “Hindi Compound Verbs and their Automatic Extraction”, In Proc. of Computational Linguistics Conference (COLING), Manchester, UK, 2008.

5.       Chakrabarty, D., Sarma V., Bhattacharyya P., “Complex Predicates in Indian Language Wordnets”, Lexical Resources and Evaluation Journal, 40 (3-4), 2007.

6.       Dalal, A., Nagaraj K., Sawant U., Shelke S., “Hindi Part-of-Speech Tagging and Chunking: A Maximum Entropy Approach.” In the Proceedings of the NLPAI Machine Learning Workshop on Part Of Speech and Chunking for Indian Languages. Mumbai, India, 2006.

7.       Deshpande Madhuri, Gore Sharad, “Using Conceptual Dependency Theory to represent Marathi text”, International Journal of Computer Technology & Applications, Vol 6 (6), pp. 911-914, 2015.

8.       Elaine Rich, Kevin Knight, Shivashankar Nair. Artificial Intelligence, 2009, Third Edition, Tata-McGraw Hill Education Private Ltd, ISBN 978-0-07-008770-5,  ch. 10.

9.       Gune H., Bapat M., Khapra M., Bhattacharyya P., “Verbs are where all the Action Lies: Experiences of Shallow Parsing of a Morphologically Rich Language”, Computational Linguistics Conference (COLING), Beijing, China, 2010.

10.    Singh, A., Bendre S. M., Sangal R., “HMM Based Chunker for Hindi.” In the Proceedings of International Joint Conference on NLP, 2005.

11.    Singh, S., Gupta K., Shrivastava M. and Bhattacharyya P. (2006). “Morphological Richness Offsets Resource Demand – Experiences in Constructing a POS Tagger for Hindi.” In the Proceedings of the COLING/ACL-2006, 779-786. Sydney, Australia, July.

12.    Smriti Singh, Om P. Damani, Vaijayanthi M. Sarma, “Noun Group and Verb Group Identification for Hindi”, COLING, December, 2012.

13.    Steven Lytinen, “Conceptual Dependency and its Descendents.”, Computer Math. Applic, 23(2-5): 51-73, 1992. 

14.    R. Schank, “Conceptual dependency: A theory of natural language understanding”, Cognitive  Psychology 3, 552-631, 1972.

15.    R. Schank and R. Abelson, Scripts, Plans, Goals, and Understanding, Lawrence Erlbaum Associates, Hilladale, NJ, 1977.

16.    Ray, P. R., Harish V., Basu A., Sarkar S., “Part of Speech Tagging and Local Word Grouping Techniques for Natural Language Parsing in Hindi.” In the Proceedings of (ICON). Mysore, India, 2003.

17.    Ramshaw, L. A., Mitchell, P. M., “Text Chunking Using Transformation-Based Learning.” In the Proceedings of the Third ACL Workshop on Very Large Corpora, 82-94. Cambridge, MA, USA, 1995.

18.    Roger C. Shank, Larry Tesler, “A Conceptual Dependency Parser For Natural Language”, International Conference on Computational Linguistics (COLING), Sweden, September 1969.

19.    Walimbe M. R., Sugam Marathi Vykarana Lekhan, Nitin Prakashana, Pune. ISBN 81-86169-80-6, 2012.

20.    Wlodek Zadrozny, Karen Jensew, “Semantics of Paragraphs”, Computational Linguistics, Volume 17, Number 2 Pg 171-209, 1991.

21.    http://www.tdil-dc.in

 

5-11

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

Vikram Phulari

Paper Title:

Role of the Internal Audit in ERP Implementation

Abstract:  The aim of this study is to investigate how internal audit can contribute to the successful implementation of projects (ERP Enterprise Resource Planning). ERP projects are well documented for the high dropout rate and the negative impact on the beneficiaries. Although there is little literature on the role of internal audit in ERP implementations, there are many available in ERP implementations risks, challenges and critical success factors associated with these projects complex and strategic document. The results of the literature shows that there is no general agreement on which a number of factors are the key to success in ERP implementations, which in turn puts more emphasis on the ability of management to their agreed requirements differ from company to deliver to company. Internal audit is typically a central function operating within the governance and control system of an organization and is recognized as having expertise in reviewing control which includes ensuring that adequate governance structures are in place and effective risk management processes are activated that can mitigate the problems that occur. According to the evolutionary nature of the internal audit, auditors are constantly increasing their skill levels to enable them to independently review the ERP projects and report issues in time for the action of the management of business. It is the depth of investigation that is part of an internal audit that achieves most of the benefits and this became evident in the most success factors, risks and issues identified by respondents compared to documented items ERP in the related documentation. The interviews of the population of ERP experienced auditors show that the benefits of using them to examine the ERP projects have been positively recognized within their companies. In many cases the audit reviews are now included in the project planning process.

Keywords:
ERP Audit, Risk Assessment, Challenges, System Implementation.


References:

1.    Haider H. Madani, “Re-engineering the Role of the Internal Auditor in ERP Solutions”.
2.    Bae, B. & Ashcroft, P. (2004).Implementation of ERP Systems: Accounting and auditing implications http://www.cwu.edu/~baeb/ERP%20Implementation%20&%20Implications.doc.pd

3.    Ratliff, Richard L.; Wanda A. Wallace; Glenn E. Sumners; William. McFarland; and James K. Loebbecke (1996), “Internal Auditing: Principles and Techniques,” 2nd Ed., The Institute of Internal Auditors.

4.    Debreceny, R. S., Gray, G. L., Ng, J. J., Lee, K. S., & Yau., W. (2005). “Embedded audit modules in enterprise resource planning systems: implementation and functionality. Journal of Information Systems”, 19 (2), 7-27.

5.    Ratliff, Richard L.; Wanda A. Wallace; Glenn E. Sumners; William G. McFarland; and James K. Loebbecke (1996), “Internal Auditing: Principles and Techniques,” 2nd Ed, The Institute of Internal Auditors.

6.    Musaji, Y.F. (2002), “Integrated Auditing of ERP Systems”, New York, NY: Wiley.

7.    Glover, Steven M.; Douglas F. Prawitt; and Marshall B. Romney (1999), “Implementing ERP,” Internal Auditor, Aug., 47-53.

8.    Altinkemer, A., Chaturvedi, A. and Kondareddy, S., 1998, Business process reengineering and organizational performance: an exploration of issues. International Journal of Information Management, 18(6), 381-392.

9.    Davenport, T.H. (July/August 1998): “Putting the Enterprise into the Enterprise System”, Harvard Business Review, vol.76, n.4: 121-133.

 

12-16

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

4.

Authors:

Bouchra Gourja, Malika Tridane, Abdelhamid Daoudi, Said Belaaouad

Paper Title:

Crystallochemistry of New Isotypes of Sr3 (PO4)2

Abstract: Several authors have considered the possibilities of substitution within structures B3(XO4)2 of type Sr3(PO4)2. Since substitutions within the phosphate of lead have never been made to our knowledge, we have proposed to do so. This allowed us to synthesize the new solid solutions Pb3-2xKxNdx(PO4)2, the average ionic radius of K + and Nd3+ being close to that of Pb2 +.  The new phases Pb3-2xKxNdx(PO4)2 for x = 0.05; 0.10 and 0.15 are isotypes of β Pb3(PO4)2, those for x = 0.20; 0.25; 0.50 and 0.75 are isotypes of Sr3(PO4)2. Substitution of Pb2 + with K + and Nd3 + results in a slight decrease in volume; Which is consistent with the mean value of the ionic radii of potassium and neodymium which is slightly less than the ionic radius of the lead.

Keywords:
Substitution within structures B3(XO4)2 of type Sr3(PO4)2, synthesize the new solid solutions,Pb3-2xKxNdx(PO4)2.


References:

1.    Parent, P. Bochu, A. Daoudi et G. Le Flem. Journal of Solid State Chemistry, 43 (1982) , p. 190.
2.    K.A. Shuvalov. J. Phys. Soc. Jap.,28 , (1970) p.38.

3.    K. Aizu. Phys. Rev., B2, (1970) p754.

4.    W.H.Zachariasen. Acta Cryst.1, (1948), 293.

5.    G. Le Flem. Thèse de doctorat ès-Sciences, Bordeaux-I, (1967)

6.    H. Schwarz. Z. Anorg. Allg. Chem., 334, (1965) p. 262.

7.    R.F. Hodenberg. Ber.Deutsh.Keram.Ges., 39, (1962) , p. 69.

8.    U. Keppler. Z. Kristallogr., 132, (1970), p. 228.

9.    R.D. Shanonet C. T. Prewitt. ActaCryst., B25, (1969), p. 925.

 

17-22

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

Volume-5 Issue-6

 Download Abstract Book

S. No

Volume-5 Issue-6, January 2017, ISSN:  2277-3878 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

Bhagwat P. Dwivedi, Shiv Kumar, Babita Pathik

Paper Title:

A Survey on Intrusion Detection Technique over the Web Data

Abstract: The intrusion detection systems (IDSs) generate large number of alarms most of which are false positives. Fortunately, there are reasons for triggering alarms where most of these reasons are not attacks. In this work, a new data mining technique has been developed to group alarms and to produce clusters. we have monitored a paper IDS over web mining – up approach which is efficient and determined to visualized the intrusion data and optimize according to the user requirement and monitored the data efficiently, here we would like to further enhance research work on analyzing and using the entropy data as input and to use them in  technique to visualize and to optimize according to the user requirement in the web entropy visualization.

Keywords:
 Network intrusion, web mining scenario, web intrusion data, Data Mining Algorithms

References:

1.       Zhan Jiuhua Intrusion Detection System Based on Data Mining Knowledge Discovery and Data Mining, 2008. WKDD 2008.
2.       Bane Raman Raghunath Network Intrusion Detection System (NIDS)Emerging Trends in Engineering and Technology, 2008. ICETET ’08.

3.       Changxin Song Design of Intrusion Detection System Based on Data Mining Algorithm 2009 International Conference on Signal Processing Systems.

4.       Wang Pu Intrusion detection system with the data mining technologies Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference.

5.       Gaikwad, D.P. Sonali Jagtap, Kunal Thakare, Vaishali Budhawant Anomaly Based Intrusion Detection System Using Artificial Neural Network and fuzzy clustering International Journal of Engineering Research & Technology (IJERT), ISSN: 2278-0181, 1 (9.) (2012 November).

6.       Goyal, C. Kumar GA-NIDS: A Genetic Algorithm based Network Intrusion Detection System, Electrical Engineering and Computer Science, North West University Technical Report (2008).

7.       Gu, P. Porras, V. Yegneswaran, M. Fong, W. Lee BotHunter: detecting malware infection through IDS-driven ialog correlation Proc. of 16th USENIX Security Symp. (SS’07) (2007 Aug), pp. 12:1–12:16.

8.       G. Gu, J. Zhang, W. Lee BotSniffer: detecting botnet command and control channels in network traffic Proc. of 15th Ann. Network and Distributed Sytem Security Symp. (NDSS’08) (2008 Feb).

9.       V. Jaiganesh, P. Sumathi, S. Mangayarkarasi   An Analysis of Intrusion Detection System using back propagation neural network IEEE Computer Society Publication (2013).

10.    Buccafurri, G. Lax, D. Rosaci and D. Ursino, ‗Dealing with Semantic Heterogeneity for Improving Web Usage‘. Data Knowledge Eng. Vol. 58, Issue 3, pp. 436–465,2006.

11.    Singh A., Juneja D. and Sharma A.K., ‗Design of Ontology-Driven Agent based Focused Crawlers‘. In proceedings of 3rd International Conference on Intelligent Systems & Networks (IISN-2009),Organized by Institute of Science and Technology, Klawad, 14 -16 Feb 2009, pp. 178-Available online in ECONOMICS OF NETWORKS ABSTRACTS, Volume 2, No. 8: Jan 25, 2010.

 

1-3

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.

Authors:

M. Jansirani, P. Sumitra

Paper Title:

A Novel Method for Vehicle Detection using Edge Detection and Fuzzy Logic Based Algorithm

Abstract:  Vehicles moving on road are of importance because problems like traffic congestion, economic waste, jamming on the underpasses and over-bridges (if the vehicle passing through is not of the permissible size) are associated with them. These problems can be dealt with by using various morphological processes based image processing techniques to detect the vehicles. In this thesis, the images of moving and still vehicles have been taken and an algorithm is used for vehicle detection which is based on image processing techniques and classification of vehicles in the form of natural description based on fuzzy logic such as classification based on area and circumference using Fuzzy Logic. To perform classification, fuzzification of area and circumference is done and each vehicle type (e.g. small, medium and big) is assigned a measurement range of values by designing fuzzy rules and finally defuzzification is done.  Edge detection is considered to be fundamental step in the field of image processing and computer vision. There are 3 types of discontinuities in a digital image: point, line, edge. The most common way is to use spatial masks which have properties to detect these discontinuities. More than isolated points and lines detecting edges are important because they form an important part of image segmentation. Edge detection is basically a method of segmenting an image into regions based on discontinuity, enhancing the presence of these discontinuities in the image allows us to improve the perceived image quality under certain conditions. Edge detection makes use of differential operators to detect changes in the gradients of the grey or color levels in the image. Edge detection is divided into two main categories: first-order edge detection, example for first order edge detection are Sobel, Robert, Perwitt and second-order edge detection, example for second order edge detection are Laplacian and Canny. Image edge is often buried by noise, so it‘s necessary to research edge detection algorithm. Since traditional edge detection like Sobel, Perwitt, Robert operator are sensitive noise, to overcome that problem, some new algorithm is applied in edge detection such as Canny, Morphology, Neural network and Fuzzy logic. This is to be implemented in MATLAB.  Fuzzy logic is one of the new methods and it was based on set theory.  Fuzzy logic based algorithm is very efficient and flexible to detect the edges of vehicle in an input image by scanning it through the 2*2 mask. The main benefit of fuzzy set theory is able to model the ambiguity and the uncertainty. In the proposed method trapezoidal and triangular membership function of mamdani type FIS is used for four inputs containing two fuzzy set and one output containing one fuzzy set. The 2*2 masks is slide over entire vehicle image, and then pixels values of masks are examined through various ten rules which are defined in FIS rule editor. Based on these set of rules the output of fuzzy is decided that particular pixel is edge or not. For getting better results Gaussian filtering is used. Experimental result shows the ability of the proposed method in finding the thin edges of vehicle image.

Keywords:
Fuzzy Logic, Neural Network, Canny, Morphology.


References:

1.    Gupte, S.; Masoud, O.; Martin, R.F.K.; Papanikolopoulos, N.P, “Detection and Classification of Vehicles”, IEEE Transactions on Intelligent Transportation Systems, 3, No.1, Mar 2002.
2.    Hossain M. Julius, Dewan M. Ali Akber and CHAE Oksam, “Moving Object Detection for Real Time Video Surveillance: An Edge Based Approach”, IEICE Transactions on Communications, 90, No. 12.

3.    Gonzales C. Rafael, Woods E. Richard, “Digital Image Processing”, 1998, Second Edition, Prentice Hall Publications pp. 567–634.

4.    Weihua Wang, “Reach on Sobel Operator for Vehicle Recognition”, in proc. IEEE International Joint Conference on Artificial Intelligence 2009, July 2009, California, USA.

5.    Alper PAHSA, Ankara University, Computer Eng. Dept.,” Morphological Image Processing with Fuzzy Logic “.

6.    Nedeljkovic, “Image Classification based on Fuzzy Logic“, Map Soft Ltd, Zahumska 26 11000 Belgrade, Serbia and Montenegro.

 

4-6

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

Jyoti Pawar, G.P. Chakote

Paper Title:

User-Defined Privacy Grid System for Continuous Location-Based Services

Abstract: Location-based services (LBS) require users to continually report their location to a potentially unreliable server to obtain services based on location, which may expose them to confidentiality risks. Unfortunately, existing privacy techniques have several limitations, such as the requirement of a fully reliable third party offering limited privacy and high communication overhead. In this paper, we propose a user-defined privacy grid system called a dynamic grid system (DGS); The first holistic system that meets four essential requirements for the preservation of instant and continuous privacy LBS. (1) The system requires only a trusted third party responsible for the proper execution of the matching operations. This semi-reliable third party has no information about a user’s location. (2) Secure confidentiality and continued site confidentiality are warranted in our defined opponent models. (3) The cost of communication for the user does not depend on the level of confidentiality desired by the user, it depends only on the number of relevant points of interest near the user. (4) Although we only focus on range and k-neighbor-neighbor queries in this work, our system can be extended to support spatial queries without modifying the algorithms executed by the semi-reliable third party and The database server, the search area required for a spatial query can be extracted into spatial regions. The experimental results show that our DGS is more efficient than the state-of-the-art privacy technology for continuous LBS.

Keywords:
 Location Based Service (LBS), Dynamic Grid System (DGS), Confidentiality, Privacy Technologys.

References:

1.       B. Bamba, L. Liu, P. Pesti, and T.Wang, “Supporting anonymous location queries in mobile environments with PrivacyGrid,” in WWW, 2008.
2.       C.-Y. Chow and M. F. Mokbel, “Enabling private continuous queries for revealed user locations,” in SSTD, 2007.

3.       B. Gedik and L. Liu, “Protecting location privacy with personalized kanonymity: Architecture and algorithms,” IEEE TMC, vol. 7, no. 1, pp.1–18, 2008.

4.       M. Gruteser and D. Grunwald, “Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking,” in ACM MobiSys, 2003.

5.       P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, “Preventing location-based identity inference in anonymous spatial queries,” IEEE TKDE, vol. 19, no. 12, pp. 1719–1733, 2007.

6.       M. F. Mokbel, C.-Y. Chow, and W. G. Aref, “The new casper: Query processing for location services without compromising privacy,” in VLDB,2006.

7.       T. Xu and Y. Cai, “Location anonymity in continuous location-based services,” in ACM GIS, 2007.

8.       “Exploring historical location data for anonymity preservation in location-based services,” in IEEE INFOCOM, 2008.

9.       G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan, “Private queries in location based services: Anonymizers are not necessary,” in ACM SIGMOD, 2008.

10.    M. Kohlweiss, S. Faust, L. Fritsch, B. Gedrojc, and B. Preneel, “Efficient oblivious augmented maps: Location-based services with a payment broker,” in PET, 2007.

11.    R. Vishwanathan and Y. Huang, “A two-level protocol to answer private location-based queries,” in ISI, 2009.

12.    J.M. Kang,M. F.Mokbel, S. Shekhar, T. Xia, and D. Zhang, “Continuous evaluation of monochromatic and bichromatic reverse nearest neighbors,” in IEEE ICDE, 2007.

13.    S. Jensen, D. Lin, B. C. Ooi, and R. Zhang, “Effective density queries of continuously moving objects,” in IEEE ICDE, 2006.

14.    S. Wang and X. S. Wang, “AnonTwist: Nearest neighbor querying with both location privacy and k-anonymity for mobile users,” in MDM, 2009.

15.    W. B. Allshouse,W. B. Allshousea,M. K. Fitchb, K. H. Hamptonb, D. C. Gesinkc, I. A. Dohertyd, P. A. Leonebd, M. L. Serrea, andW. C. Millerb,“Geomasking sensitive health data and privacy protection: an evaluation using an E911 database,” Geocarto International, vol. 25, pp. 443–452, October 2010.

16.    Gkoulalas-Divanis, P. Kalnis, and V. S. Verykios, “Providing kanonymity in location based services,” SIGKDD Explor. Newsl., vol. 12, pp. 3–10, November 2010.

17.    Boneh and M. K. Franklin, “Identity-based encryption from the weil pairing,” in CRYPTO, 2001.

18.    Menezes, M. Qu, and S. Vanstone, “Some new key agreement protocols providing mutual implicit authentication,” in SAC, 1995.

19.    S. Yau and H. An, “Anonymous service usage and payment in servicebased systems,” in IEEE HPCC, 2011, pp. 714–720.

20.    M. Balakrishnan, I. Mohomed, and V. Ramasubramanian, “Where’s that phone?: Geolocating ip addresses on 3G networks,” in ACM SIGCOMM IMC, 2009.

21.    R. Dingledine, N. Mathewson, and P. Syverson, “Tor: the secondgeneration onion router,” in USENIX Security, 2004.

22.    Bissias, M. Liberatore, D. Jensen, and B. Levine, “Privacy vulnerabilities in encrypted HTTP streams,” in PET, 2006.

23.    P. Golle and K. Partridge, “On the anonymity of home/work location pairs,” in Pervasive Computing, 2009.

24.    IEEE, P1363-2000: Standard Specifications for Public-Key Cryptography, 2000.

25.    B. Lewko and B. Waters, “Efficient pseudorandom functions from the decisional linear assumption and weaker variants,” in ACM CCS, 2009.

7-10

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

4.

Authors:

G. Ganesan Subramanian, V. Mohan, S. Sivamani, G. Sundaravadivel

Paper Title:

Solar Powered Street Sweeping Mechanism for Clean India

Abstract: Cleanliness is next to Godliness”- A proverb which points the most aspect of cleanliness in every proper civilization. For the last two decades, an increase in awareness towards environmental degradation due to pollution in various forms through dust particles, runoff  water, improper sanitation , waste products such as plastic products etc., In order to enhance the cleanliness of surroundings , a design of electric vehicle that can both maintain operational efficiency and stick to its task. A multi operational task of sweeping mechanism, vacuum cleaning mechanism, pick and place mechanism is being adopted to ensure the work conventionally done with different a novel method which harnessing renewable energy sources, a sweeper machine which operates in solar that could be used for Industrial sectors and for public.  A prototype setup is being arranged to do the specified task and corresponding time periods are noted down for each module which ensures the environment clean.

Keywords:
Brushless DC motor (BLDC), Motor Circuit  (MC), Sweeper circuit(SC), Vacuum circuit(VC), Pick and Place Mechanism (PPM)


References:

1.       Allison, R.A. and Chiew, F.H.S. (1995). Monitoring of Stormwater Pollution for Various Land-uses in an Urban Catchment, Proc. 2nd Int. Sym. On Urban
2.       Allison, R.A., Chiew, F.H.S. and McMahon, T.A. (1997a). Stormwater Gross Pollutants, Industry Report 97/11, Cooperative Research Centre for Catchment Hydrology, December 1997.

3.       Allison, R.A., Rooney, G., Chiew, F.H.S. and McMahon, T.A. (1997b). Field Trials of Side Entry Pit Traps for Urban Stormwater Pollution Control, Proceedings of the 9th National Local Government Engineering Conference, I.E. Aust., Melbourne, Australia.

4.       Allison, R.A., Walker, T.A., Chiew, F.H.S., O’Neill, I.C. and McMahon, T.A. (1998). From Roads to Rivers, – Gross Pollutant Removal from Urban Waterways, Cooperative Research Centre for Catchment Hydrology.

5.       Alter, W. (1995). The Changing Emphasis of Municipal Sweeping Tandem., American Sweeper, Volume 4, Number 1, pp.6.

6.       Baker R.A. (1980). Contaminants and Sediment, Ann Arbor Science, Publishers inc/the Butterworth Group, Michigan.

7.       Ball, J.E. and Abustan, I. (1995). An Investigation of Particle Size Distribution during Storm Events from an Urban Catchment, Proceedings of the Second

8.       Bannerrnan, R., Baun, K. and Bohn, vf. (1983). Evaluation of Urban Non-Point Source Pollution Management in Milwaukee County Wisconsin. Vol 1. Urban Stormwater Characteristics, Sources and Pollutant Management by Street Sweeping. Prepared for Environmental Protection agency, Chicago, IL.

9.       Bender, G.M. and Terstriep, M.L. (1984). Effectiveness of Street Sweeping in Urban Runoff Pollution Control, Sci. Total Environ, 33: 185-192.

10.    CH2M-HILL, Pitt, R., Cooper and Associates, Inc., and Consulting Engineering Services, Inc, (1982). Street Particulate Data Collection and Analyses, Prepared for
WASHOE Council of Governments, August, 1982, Vol. Control. EPA Publication, PB85-102507.

11.    Colwill, G.M., Peters, C.J. and Perry, R. (1984). Water Quality of Motorway Runoff, TRRL Supp, Rpt 823, Crowthorne, Berkshire, England.

12.    Dempsey, B.A., Tai, Y.L., Harrison, S.G. (1993). Mobilisation and Removal of Contaminants Associated with Urban Dust and Dirt, Wat. Sci. Tech. Vol. 28, No.3-5, pp. 225-230.

13.    Ellis, J.B., Revitt, D.M., Harrop, H.O. and Beckwith P.R. (1986). The Contribution of Highway Surfaces to Urban Stormwater Sediments and Metal Loadings, Sci. Total Environ, Vol. 59. Pp 339-349.

14.    Essery, C.I. (1994). Gross Pollutant Water Quality – Its measurement and the performance of remediation technologies/ management practices, Stormwater Industry Association, Best Stormwater Management Practice, NSW.

15.    Fergusson J.E and Ryan D.E. (1984). The Elemental Composition of Street Dust from Large and Small Urban Areas Related to City Type, Source and Particle Size, Sci. Total Environment, Vol.34 pp.101- 116, Elsevier Science Publishers B.V., Amsterdam – Printed in the Netherlands.

 

11-15

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

Volume-6 Issue-1

 Download Abstract Book

S. No

Volume-6 Issue-1, March 2017, ISSN:  2277-3878 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

P. Rajasekhar, G. Ganesan, C. Senthilkumar 

Paper Title:

Wear Behavior of Coconut Fiber Reinforced Polyamide Matrix Composites

Abstract:  Nowadays, the polymer matrix fiber reinforced composites have greater attention of many important manufacturing sectors particularly construction, automotive and packaging industries due to its low density, good mechanical and better tribological properties. Recently, the coconut fiber reinforced composites have replaced the most widely used synthetic fiber (Glass, Kevlar) reinforced polymer composites in many applications. In the present study, the polymer matrix composites were prepared and developed through hand layup process with treated short coconut fiber. Composite specimens were prepared according to the ASTM Standard G-99 and the wear tests were conducted on the Pin-On-Disk wear testing machine. The experiments were carried out according to the central composite second order rotatable design. Optimization has been carried out using Response surface methodology (RSM). The morphology of worn surfaces was examined through scanning electron microscope (SEM) and various wear mechanisms were discussed.

Keywords:
Friction coefficient, Wear Rate, Polyamide, Coconut fiber, Pin On Disc.


References:

1.       K. G. Satyanarayana, G.G.C. Arizaga, F. Wypych, ‘’Biodegradable composites based on lingo cellulosic fibers an overview’’, Progress in Polymer Science, 34, 2009, pp 982–1021.
2.       S. Mukhopadhyaya, R. Srikanta, “Effect of ageing of sisal fibres on properties of sisal Polypropylene composites”, Polymer Degradation and Stability, 93, 2008, pp 2048–2051.
3.       H. Larbig, H. Scherzer, B. Dahlke, R. Pol-trock, “Natural fiber reinforced foams based on renewable resources for automotive interior applications”, J. Cell. Plast, 34, 1998, pp 361–379.

4.       A.M. Eleiche, G.M.Amin, “The effect of unidirectional cotton fibre reinforcement on the friction and wear characteristics of polyester”, Wear, 112, 1986, pp 67-78.

5.       U. Nirmala, B.F. Yousif, D.Rilling, P.V. Brevern, “Effect of betelnutfibres treatment and contact conditions on adhesive wear and frictional performance of polyester composites”, Wear. 268, 2010, pp 1354–1370.

6.       N.S.M. El-Tayeb, “A study on the potential of sugarcane fibers/polyester composite for tribological applications”, Wear. 265, 2008, pp 223–235.

7.       R. Gujjala, S.Ojha, SK Acharya, SK Pal, “’Mechanical properties of woven Jute glass hybrid reinforced epoxy composite”, Journal of Composite Materials, 20, 2013, pp 1–11.

8.       H. U. Zaman, A. H. Khan, M. A. Hossain, M. A. Khan, R. A. Khan, “Mechanical and Electrical Properties of Jute Fabrics Reinforced Polyethylene Polypropylene Composites: Role of Gamma Radiation”, Polymer Plastics Technology and Engineering, 48, 2009, pp 760–766.

9.       G.Fang, Z.Zhaozhu, Z. Huijuan, W.Kun, J.Wei, “Tribological behavior of spun Kevlar fabric composites filled with fluorinated Compounds”, Tribology International, 43, 2010, pp 1466–1471.

10.    J. Sanes, F.J. Carri´on, A.E. Jim´enez, M.D. Bermudez, “Influence of temperature on PA 6–steel contacts in the presence of an ionic liquid lubricant”, Wear, 98, 2011, pp 01-05.

11.    P. K. Bajpai, I. Singh, J.Madaan, “Tribological behavior of natural fiber reinforced PLA composites”, Wear, 297, 2013, pp 829–840.

12.    J. Wu, X.H. Cheng, “The tribological properties of Kevlar pulp reinforced epoxy composites under dry sliding and water lubricated condition”, Wear, 261, 2006, 1293–1297.

13.    P. L. Menezes, P. K. Rohatgi, M.R. Lovell, “Studies on the tribological behavior of natural fiber reinforced polymer composites”, Green Tribology,Green Energy and Technology, 124, 2010, pp 231-238.

14.    M.Punyapriya,”Statistical analysis for the abrasive wear behavior of bagasse fiber reinforced polymer composite”, International Journal of Applied Research in Mechanical Engineering,  2, 2012, pp 2231 –2239.

15.    B.Witold, K.Vera, V.Domagoj, W.Jenna, “Tribology of polymers and polymer-based composites”, Journal of Materials Education, 32, 2010, pp 273 – 290.

16.    S.Bahadur., “The development of transfer layers and their role in polymer tribology”, J. Wear, 245, 2000, pp 92–99.

17.    S.Bahadur, and V.K.Polineni, “Tribological studies of glass fabric reinforced polyamide composites filled with CuO and PTFE”, J. Wear 200, 1996, pp 95–104.

18.    A.A.Cenna, P. Dastoor, and A. Beehag, “Effects of graphite particle addition upon the abrasive wear of polymer surfaces”, J. Material Science 36, 2001, pp  891–900.     

19.    D.Hayrettin, “PA 66 spur gear durability improvement with tooth width modification”, J. Material Design 30, 2009, pp 1060–1067.

20.    D.C.Montgomery., “Design and analysis of experiments”, 4th ed. (John Wiley Sons, New York,  1997.

21.    R. Jyoti, N. Sankar, C. and Harish,  ‘’Effect of Fiber Content on Abrasive Wear Behavior of Date Palm Leaf Reinforced Polyvinyl Pyrrolidone Composite’’, International
Journal of Tribology, 56, 2014, pp 01-10

22.    S. Supreeth, B. Vinod, J. SudevLi, and Z. N Liang,  “Influence of Fiber Length on the Tribological Behaviour of Short PALF Reinforced Bisphenol-A Composite”, International Journal of Engineering Research and General Science,  2, 2014, pp 825-830. 

23.    Vivek Mishra, and Sandhyarani Biswas, “Physical, mechanical and abrasive wear behavior of jute fiber reinforced polymer composites”, National Institute of Technology, Rourkela, India, 2014,  pp 120-135.

24.    Vivek Mishra, and Sandhyarani Biswas, “Physical, mechanical and abrasive wear behavior of jute fiber reinforced polymer composites”, National Institute of Technology, Rourkela, India, 2014,  pp 120-135.

25.    Narish Singh, Yousif, and Dirk, “Tribological characteristics of sustainable fiber-Rerinforced thermoplastic composites under wet adhesive wear”, Tribology Transactions,
54, 2011, pp 736-748. 

26.    K. Pramendra, Inderdeep Singh, and Jitendra Madaan,  “Frictional and adhesive wear performance of natural fibre reinforced polypropylene composites”, Engineering Tribology,  227, 2012, pp 385-392.

27.    P. K. Bajpai, I. Singh, and J. Madaan, “Frictional and Adhesive Wear Performance of Natural Fibre Reinforced Polypropylene Composites’’. Proceedings of the Institution of Mechanical Engineers, Part J: Journal of Engineering Tribology, 227, 2012, pp 385-392.

28.    S. R. Chauhan, B. Gaur, and K. Dass, “Effect of Microsize Particulates on Tribological Characteristics of Vinylester Composites Under Dry and Lubricated Conditions”, Journal of Material Science and Engineering, 2:117, 2013, pp 4172-4184.

29.    B. Aldousiri, A. Shalwan, and C. W. Chin, “A Review on Tribological Behaviour of Polymeric Composites and Future Reinforcements’’, Advances in Materials Science and Engineering, 475, 2013,  pp 1-8.

30.    H. Dhieb, J. Buijnsters, and J. P. Celis, “Degradation of Carbon Fiber Reinforced Epoxy Composites Under Sliding in Ambient Air’’, Sustainable Construction and Design, 2, 2011, pp 53-58.

31.    R. Ibrahem, ‘’Friction and Wear Behaviour of Fibre / Particles Reinforced Polyester Composites”, International Journal of Advanced Materials Research,  2, 2006, pp. 22-26.

32.    K. H. Z. Gahr, “Microstructure and Wear of Materials”, Tribology Elsevier Science Publishers, 10, 1987, pp 436-448.

33.    P. K. Bajpai, L. Singh, J. Madaan, “Frictional and Adhesive Wear Performance of Natural Fibre Reinforced Polypropylene Composites”. Proceedings of the Institution of Mechanical Engineers, Part J: Journal of Engineering Tribology,  227, 2012, pp 385-392.

34.    Y. Z. Wan, G. C. Chen, “Friction and wear behavior of three-dimensional braided carbon fiber/epoxy composites under dry sliding conditions”, Wear, 260, 2006, pp 933-941.

 

1-7

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.

Authors:

Meryl Lopes, Amita Dessai

Paper Title:

Design of Frequency Reconfigurable Microstrip Patch Antenna for Wireless Applications

Abstract: Modern telecommunication systems require miniature antennas with multiband characteristics that support multiple wireless applications. This paper presents a pentagon shaped microstrip patch antenna that works at 7.5GHz with a return loss of -43.48dB. The antenna has been designed on 1.59 mm FR-4 substrate with dielectric constant of 4.4 and loss tangent of 0.02. The pentagon shaped microstrip patch antenna has been modified into a dual band and a triple band antenna by applying fractal shape and frequency reconfiguring the antenna geometry. Proposed antenna finds applications for defense and secure communication, C band (4 GHz to 8 GHz) and X band (8 GHz to 12 GHz) applications where antenna can be used for satellite communication and RADAR applications. Proposed antenna has been designed using IE3D and results are analyzed in terms of gain, return loss, directivity and bandwidth.

Keywords:
 Fractal antenna, Microstrip, Multiband, Reconfigurable antenna


References:

1.    Jacob Abraham, Aju John K, Dr. Thomaskutty   Mathew ,“Microstrip antenna based on Durer pentagon fractal patch for multiband wireless applications ”,IEEE Trans. 2014 ICICES2014 – S.A.Engineering College, Chennai, Tamil Nadu, India.
2.    Saurabh Kohli, Sukhwinder Singh Dhillon, Anupama Marwaha, “ Design and Optimization of Multiband Fractal Microstrip Patch Antenna for Wireless Applications,” IEEE Trans.2013, 5th International Conference on Computational Intelligence and Communication Networks.

3.    Jagtar Singh Sivia and Sumeet Singh Bhatia, ’’ Design of Fractal Based Microstrip Rectangular Patch Antenna for Multiband Applications ’’, IEEE  Trans. 2015.

4.    Sonam Srivastava , Dr. Pooja Mishra,Dr. Rajat Kumar Singh , “Design of a Reconfigurable Antenna with Fractal Geometry”, 2015 IEEE Trans.,UP Section Conference on Electrical Computer and Electronics (UPCON).

5.    Liping Han, Caixia Wang, Xinwei Chen, and Wenmei Zhang, “Compact Frequency Reconfigurable Slot Antenna for Wireless Applications”, IEEE  Trans. 2015, Antenna and wireless propagation letters.

6.    Shahzeb Hayat, Izaz Ali Shah, Ihtesham Khan, Imtiaz Alam, Sadiq Ullah, Abdul Basir , “Design of Tetra-Band Frequency Reconfigurable Antenna for Portable Wireless Applications”, IEEE 2016 Trans.

7.    Sunandan Bhunia, Avisankar Roy, Partha Pratim Sarkar,“Compact Wideband dual frequency (dual band) microstrip patch antenna for wireless communication,” IEEE Trans. 2016, URSI Asia-Pacific Radio Science Conference.

8.    J.Satya sainath, K. V .Karthikeyan, “Design and Analysis of Multiband Hybrid Coupler Pentagon Micro strip Antenna for L-Band Applications,” IEEE Sponsored 9th International Conference on Intelligent Systems and Control {lSCO)2015.

 

8-12

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

Siddhi Vinod Parodkar, Amita Dessai

Paper Title:

Application of Neuro Fuzzy-Rule Based Classifier in Thyroid Disease Diagnosis

Abstract:  Thyroid diseases are rising at an alarming rate worldwide across several age groups. Current practice for thyroid disease diagnosis is doctor’s examination and a number of blood tests which requires lots of experience and knowledge. Because of the difficulty in considering large number of interrelated measurements and non-specific nature of symptoms of a disease, experts often have imprecise knowledge which causes uncertainty in diagnosis procedure. Thyroid disease detection via proper interpretation of the thyroid data is an important classification problem. The main objective of this project is to design an intelligent system that can diagnose the thyroid diseases with minimum diagnosis time and enhanced diagnosis accuracy.

Keywords:
Feature Selection (FS), Linguistic Hedge (LH), Neuro-Fuzzy Classifier (NFC), Scaled Conjugate Gradient algorithm (SCG), Thyroid Disorders.


References:

1.       Jamil Ahmed, and M. Abdul Rehman Soomrani, “TDTD: Thyroid Disease Type Diagnostics.” 2016 International Conference on Intelligent Systems Engineering (ICISE), pp. 44-50, IEEE, 2016, DOI: 10.1109/INTELSE.2016.7475160.
2.       Prerana, Parveen Sehgal, and Khushboo Taneja, “Predictive Data Mining for Diagnosis of Thyroid Disease using Neural Network.” International Journal of Research in Management, Science & Technology (E-ISSN: 2321-3264) Vol 3, No. 2, April 2015.

3.       I Md. Dendi Maysanjaya, Hanung Adi Nugroho and Noor Akhmad Setiawan, “A Comparison of Classification Methods on Diagnosis of Thyroid Diseases.”, International Seminar on Intelligent Technology and Its Applications (ISITIA), pp. 89-92 IEEE, 2015, DOI: 10.1109/ISITIA.2015.7219959.

4.       Shanu Shroff, Siddhi Pise, Pratiksha Chalekar and Suja S. Panicker, “Thyroid Disease Diagnosis: A survey.”, IEEE Sponsored 9th International Conference on Intelligent Systems and Control (ISCO), pp. 1-6, 2015, DOI: 10.1109/ISCO.2015.7282384.

5.       Gurmeet Kaur and Er. Brahmaleen Kaur Sidhu, “Proposing Efficient Neural Network Training Model for Thyroid Disease Diagnosis.”, International Journal For Technological Research In Engineering Volume 1, Issue 11, ISSN (Online): 2347 – 4718, pp. 1383-1386, July-2014.

6.       Jasdeep Singh Bhalla and Anmol Aggarwal, “A Novel Method for Medical Disease Diagnosis Using Artificial Neural Networks Based on Backpropagation Algorithm.”, Conuence 2013: The Next Generation Information Technology Summit (4th International Conference). IET, pp. 55-61, September 26, 2013, IEEE, June,2014, DOI: 10.1049/cp.2013.2293.

7.       J. Jacqulin Margret, B. Lakshmipathi and S. Aswani Kumar, “Diagnosis of Thyroid Disorders Using Decision Tree Splitting Rules.”, International Journal of Computer Applications, Volume 44, No.8, pp. 43-46, April 2012, DOI:10.5120/6287-8474.

8.       Modjtaba Rouhani and Kamran Mansouri,\Comparison of several ANN architectures on the Thyroid diseases grades diagnosis.”, International Association of Computer Science and Information Technology – Spring Conference, 2009, IACSITSC’09, pp. 526-528, IEEE, April 17, 2009, DOI: 10.1109/IACSIT-SC.2009.24.

9.       Fatemeh Saiti, Afsaneh Alavi Naini, Mahdi Aliyari shoorehdeli and Mohammad Teshnehlab, “Thyroid Disease Diagnosis Based on Genetic Algorithms using PNN and SVM.”, 3rd International Conference on Bioinformatics and Biomedical Engineering, pp. 1-4, IEEE, June 11, 2009, DOI: 10.1109/ICBBE.2009.5163689.

10.    Anupam Shukla, Prabhdeep Kaur, Ritu Tiwari and R.R.Janghel, “Diagnosis of Thyroid Disorders using Artificial Neural Networks”, IEEE International Advance Computing Conference (IACC), pp. 1016-1020, March 6, 2009, DOI: 10.1109/IADCC.2009.4809154.

11.    Ahmad Taher Azar and Shaimaa Ahmed El-Said, “Superior neuro-fuzzy classification systems.”, Neural Computing and Applications (2012), 23.1 : pp. 55-72, November 2012, DOI: 10.1007/s00521-012-1231-8.

12.    Bayram Cetili and Atalay Barkana, “Speeding up the scaled conjugate gradient algorithm and its application in neuro-fuzzy classifier training.”, Soft computing (2010), 14.4 : pp. 365-378, DOI: 10.1007/s00500-009-0410-8.

13.    Bayram Cetisli, “Development of an adaptive neuro-fuzzy classifier using linguistic hedges: Part 1.”, Expert Systems with Applications (2010), 37.8 : pp. 6093-6101, DOI: 10.1016/j.eswa.2010.02.108.

14.    Bayram Cetisli, “The effect of linguistic hedges on feature selection: Part 2.”, Expert Systems with Applications (2010), 37.8 : pp. 6102-6108, DOI: 10.1016/j.eswa.2010.02.115.

15.    Ahmad Taher Azar and Aboul Ella Hassanien, “Dimensionality reduction of medical big data using neural-fuzzy classier.”, Soft Computing (2014), DOI: 10.1007/s00500-014-1327-4.

16.    Thyroid Data Set from UCI Repository [Online] Available: http://sci2s.ugr.es/keel/dataset.php?cod=67

 

13-19

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

4.

Authors:

S. Lalithkumar, A. Priyadharshni, M. Manoj Kumar, N. Sekar Pandian

Paper Title:

Experimental Study on Low Density Brick (Cenosphere Bricks)

Abstract: A flyash bricks can be extensively used in all types of building construction activities. Our project was based on low density brick, using cenosphere material. The cenosphere bricks may be comparatively lighter in weight and stronger than common flyash bricks. Since cenosphere is being accumulated as waste material in large quantity in thermal power plants and creating serious environmental pollution problems. Flyash is replacing to cenosphere of flyash bricks  with proportion  as using specimen size 230mm x 100mm x 75mm were cast for  mix percentage of cenosphere(60%), OPC(10%) and Quarry dust (30%). The results shows the variation of compressive strength and water absorption for mix proportions of materials mentioned earlier at curing ages. Then we may consider the specimen size 230mm x 100mm x 100mm to casting the bricks of different mix proportions to the percentage of cenosphere (15 to 50%), OPC (5 to 35%) and Quarry dust (20 to 55%).We had tested various specimen as per proportion considered for casting. After this, we compared the weight, compressive strength and water absorption of cenosphere with different proportion of flyash bricks.

Keywords: Cenosphere, OPC (Ordinary Portland Cement), Quarry dust, weight, Compressive strength and Water absorption

References:

1.    Tahmina Banu, Md. Muktadir Billah, et. al, Experimental Studies on Fly Ash-Sand-Lime Bricks with Gypsum Addition: American Journal of Materials Engineering and Technology, 2013, Vol. 1, No. 3, 3540
2.    Prabir Kumar Chaulia and Reeta Das, Process Parameter Optimization for Fly Ash Brick by  Taguchi Method: Material Research; 2008.11. 159-164.

3.    Tutunlu Faith, and Atalay Umit.Utilization of Fly ash in Manufacturing of Building Brick: International Ash utilization Symposium, Center for applied Engineering Research; 2001 paper 13.

4.    Wang, J., Zhang, M., Li, W., Chia, k., and, Liew, R. (2012). Stability of cenospheres in lightweight cement composites in terms of alkali–silica reaction. Cement and Concrete Research, 42, 721–727.

5.    Y, X., Shen, Z., Xu, Z., and, Wang, S. (2007).Fabrication and structural characterization of metal films coated on cenosphere particle by magnetron sputtering deposition. Applied Surface Science, 253, 7082-7088.

6.    Cao, X., and, Zhang, H. (2013).Investigation into conductivity of silver-coated cenosphere composites prepared by a modified electroless process. Applied Surface Science, 264, 756- 760.

 

20-27

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

5.

Authors:

Nitish Premanand Wadker, Amita Dessai

Paper Title:

Bone Fracture Detection using X-ray Images

Abstract: Diagnosing minute fractures in the cases of pelvis bone injuries is critical for speedy and successful patient treatment. Minute fracture detection using x-ray images can be challenging and time consuming to examine due to their low resolution and dissimilar visual characteristics of fractures by their position. The pelvis bone is most dense due to which visual detection of the fracture is very difficult. This paper presents a fracture detection technique for the pelvis bone as well as pubic ring using Distance Regularized Level Set Evolution (DRLSE) technique for segmentation and detection of fracture using Canny Edge detector and gradient technique. Also inspection of displacement of the pelvic bone is done using Gray Level Co-occurrence Matrix (GLCM). Results so far have been encouraging and will be helpful in guiding the physicians and for better treatment of the patients.

Keywords:
Biomedical image processing, Distance regularized level set evolution, Image processing, Pelvis bone fracture.


References:

1.       M. J. Heetveld, I. Harris, G. Schlaphoff, and M. Sugrue, “Guidelines for the management of haemodynamically unstable pelvic fracture patients,” ANZ Journal of Surgery, vol 74, no 7, pp. 520-529, 2004.
2.       Abubacker, Nirase Fathima, Azreen Azman, Masrah Azrifah and Shyamala Doraisamy, “An approach for an automatic fracture detection of skull dicom images based on neighboring pixels.” Intelligent Systems Design and Applications (ISDA), 2013 13th International Conference on. IEEE, 2013.

3.       Anu T C, Mallikarjunaswamy M. S. and Rajesh Raman, “Detection of bone fracture using image processing methods”, International Journal of Computer Applications (0975-8887), National Conference on Power Systems & Industrial Automation (NCPSIA 2015).

4.       Kalyn, Michael R., and Francis M. Bui. “A curvature-based edge detector for x-ray radiographs.” Computing and Communication (IEMCON), 2015 International Conference and Workshop on. IEEE, 2015.

5.       Prasad, PM K., G. Sasi Bhushana Rao, and M. N. V. S. S. Kumar. “Analysis of X-ray images using MRA based biorthogonal wavelets for detection of minute fractures.” Science Engineering and Management Research (ICSEMR), 2014 International Conference on. IEEE, 2014.

6.       Madheswaran, M., and R. Vijayakumar. “Estimation of various parameters of fractured femur with different load conditions using Finite element analysis.” Computing, Communication and Networking Technologies (ICCCNT), 2014 International Conference on. IEEE, 2014.

7.       Cao, Yu, Hongzhi Wang, Mehdi Moeadi, Prasanth Prasanna, Tanveer F. Syeda-Mahmood, “Fracture detection in x-ray images through stacked random forests feature fusion.” Biomedical Imaging (ISBI), 2015 IEEE 12th International Symposium on. IEEE, 2015.

8.       Vijayakumar, R., and G. Gireesh. “Quantitative analysis and fracture detection of pelvic bone X-ray images.” Computing, Communications and Networking Technologies (ICCCNT), 2013 Fourth International Conference on. IEEE, 2013.

9.       Chowdhury, Ananda S., Joseph E. Burns, Arka Mukherjee, Bhaskar Sen, Jianhua Yao and Ronald M. Summers, “Automated detection of pelvic fractures from volumetric CT images.” Biomedical Imaging (ISBI), 2012 9th IEEE International Symposium on. IEEE, 2012.

10.    Smith, Rebecca, Kevin Ward, Charles Cockrell, Jonathan Ha and Kayvan Najarian, “Detection of fracture and quantitative assessment of displacement measures in pelvic X-RAY images.” Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE International Conference on. IEEE, 2010.

11.    Unde, Amit Satish, V. A. Premprakash, and Praveen Sankaran. “A novel edge detection approach on active contour for tumor segmentation.” Engineering and Systems (SCES), 2012 Students Conference on. IEEE, 2012.

12.    Li, Chunming, Chenyang Xu, Senior Member, IEEE, Changfeng Gui and Martin D. Fox, “Distance regularized level set evolution and its application to image segmentation.” IEEE Transactions on image processing 19.12 (2010): 3243-3254.

13.    Prof. Jasjit S. Suri and Prof. Aly A. Farag, “Deformable models,” Springer Science and Business Media, 10 –Aug- 2007.

 

28-32

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

6.

Authors:

Kashmeera Keshav Kale, Sangam Borkar

Paper Title:

Image Restoration based on Blur Identification 

Abstract: It is challenging to take satisfactory photographs in poorly-lit environment using a hand-held camera. With the long exposure time, the image is blurred due to camera shake. Whereas, with short exposure time, the image is dark and noisy. In this project paper we will present a method to improve the quality of given pictures. In particular blind deconvolution will be applied to deblur the images. Blind deconvolution is an indistinct problem and needs to be solved using regularization techniques. The steps involved are: first, an image blur identification index is calculated to evaluate the sharpness of the image. The said index is used in determining whether the following procedure needs to be performed or not. Second, a normalized sparse regularization blind deconvolution technique is used to recover the image. And lastly, we check for quality using various quality assessment algorithms to evaluate the result of recovered image. Experiment result show that the proposed blur identification algorithm and the quality assessment methods are effective in upgrading the efficiency of recovering the image while guarantying a true output.

Keywords:
Blur identification metric, Blind restoration, Image quality assessment, Sparse Regularization


References:

1.        Wang X, Tian B, Liang C, “Blind image quality assessment for measuring image blur”. Proceedings of Conference on Image and Signal Processing, 2008: 467-470.
2.        Wang, Xin, et al. “Blind image quality assessment for measuring image blur.” Image and Signal Processing, 2008. CISP’08. Congress on. Vol. 1. IEEE, 2008.

3.        Batten, Christopher F. Autofocusing and astigmatism correction in the scanning electron microscope. Diss. Faculty of the Department of Engineering, University of Cambridge, 2000.

4.        Marziliano, Pina, et al. “A no-reference perceptual blur metric.” Image Processing. 2002. Proceedings. 2002 International Conference on. Vol. 3. IEEE, 2002.

5.        Wang Z, Sheikh H R, Bovik A C. No-reference perceptual quality assessment of JPEG compressed images. in Proceedings of International Conference on Image Processing, 2002: 477-48Wang, Zhou, et al. “Image quality assessment: from error visibility to structural similarity.” IEEE transactions on image processing 13.4
(2004): 600-612.

6.        Krishnan, Dilip, Terence Tay, and Rob Fergus. “Blind deconvolution using a normalized sparsity measure.” Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on. IEEE, 2011.

7.        Chen, Xiaogang, et al. “An effective document image deblurring algorithm.” Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on. IEEE, 2011.

8.        Crete, Frederique, et al. “The blur effect: perception and estimation with a new no-reference perceptual blur metric.” Electronic Imaging 2007. International Society for Optics and Photonics, 2007.

9.        Krishnan, Dilip, Terence Tay, and Rob Fergus. “Blind deconvolution using a normalized sparsity measure.” Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on. IEEE, 2011.

10.     Whyte, Oliver, et al. “Non-Uniform Deblurring for shake images”. International journal of computer vision 98.2(2012):168-186.

11.     Wang, Zhou, et al. “Image quality assessment: from error visibility to structural similarity.” IEEE transactions on image processing 13.4 (2004): 600-612.

12.     Lei, Yin, et al. “Image blind restoration based on blur identification and quality assessment of restored image.” Control Conference (CCC), 2015 34th Chinese. IEEE, 2015.

33-38

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

7.

Authors:

Ashish Chaudhari, Hemant Isai, Sumit Jha, Abhijeet Shetake, Mitesh Thakkar

Paper Title:

Design and Fabrication of 0.5mm KLICK Pencil Assembly Machine

Abstract: This work aims at design and development of Special Purpose Mechanism for assembly of 0.5mm klick lead pencil for KOKUYO CAMLIN LTD. The important assembly stations consists of feeding the lead on the assembled pencil with barrel and chuck with the help of special fixture and pneumatic circuit followed by mounting cylindrical eraser over the pencil barrel and at last pencil cap for feeding the lead forward during working. All the three operations are simultaneously carried out over the turn table which rotates in forward step and dwell period with use of special Geneva Mechanism. The design of jigs, fixtures and pneumatic circuits will be done on Solid Works and simulated using ANSYS if necessary. The designed component will be then manufactured and fabricated at KOKUYO CAMLIN CAMPUS at Vasai Road and will be tested for the product. The results expected will be less assembly time and faster work production which saves human errors, electricity and time of production.

Keywords:
 SPM, Chuck, Jig & Fixtures, Geneva Mechanism.


References:

1.    Alsterman, H. (2010)” Operations Management:MG2205” [Lecture Notes] Stockholm, Sweden: KungligaTekniskahögskolan, Department of Production Engineering
2.    REDDAM A., Emre O. “A case study brought out at Electrolux”
3.    GrooverMikell P. “Automation, Production systems and Computer integrated Manufacturing”

4.    Kenneth Waldron, Gary Kinzel “Kinematics, Dynamics and Design of Machinery”  2nd ed., , Wiley India Edition

5.    Bhandari V. B. “Design of machine elements” Tata McGraw Hill Pub.

39-42

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

8.

Authors:

M. Kamesh, T. Karthik, M. Ramakrishnan, S. Sanjay Kumar, P. Suresh Kumar

Paper Title:

Experimental Project on Concrete – Partial Replacement of Cement by Prosopis Juliflora Ash

Abstract: In order to save the environment and to save the resources we have come up with using the Prosopis juliflora (Semai Karuvelam in Tamil) ash as the partial replacement of cement. Cement will produce equal amount of greenhouse gas (co2) which increase the global warming. As the amount of cement is reduced greenhouse gases also reduced. Utilization of Juliflora ash as a partial substitution for cement is one of the promising method to increase the strength and thermal insulation for cement blocks. The strength parameters (compressive strength, split tensile strength and flexural strength) of concrete with blended Prosopis juliflora cement are evaluated.

Keywords:
Environment, Prosopis Juliflora, Partial Replacement of Cement, Strength Parameter


References:

1.    Calistus Ayegba., Strength Characteristics Of Concrete Made With Rice Husk Ash As Partial Replacement Of Cement Using Periwinkle Shell As Coarse Aggregate, International Journal of Engineering Research & Technology (IJERT),2013,2, 266-276
2.    Aditya Verma, Abhishek Kumar, Ashish Mishra, Arjit Verma, Pond ash as partial replacement of cement, International Research Journal of Engineering and Technology, 2016,03, 511-515

3.    Vikas R Nadig, Sanjith J, Ranjith A, Kiran B M.,Bottom ash as partial sand replacement in concrete, IOSR Journal of Mechanical and Civil Engineering ,2015,12, 148-151

4.    J.O. Akinyele, A.A. Adekunle And O. Ogundaini., The effect of partial replacement of cement with bone ash and Juliflora ash in concrete, International Journal of Engineering ,2016,199-204

5.    Vignesh Kumar Nagarajan, S. Aruna Devi, S. P. Manohari, M. Maria Santha., Experimental Study on Partial Replacement of Cement with Coconut Shell Ash in Concrete, International Journal of Science and Research (IJSR), 651-661

6.    A. Raheem, B.S. Olasunkanmi, C.S. Folorunso.,Saw dust ash as partial replacement for cement in concrete, Research paper,2012, 474-480

7.    IS 456 : 2000 Plain and reinforced concrete-Code of practice (Fourth revision)

8.    IS 10262 : 2009 Concrete mix proportioning- Guidelines (first revision)

9.    M.S.SHETTY., concrete technology, sixth edition, 2005

 

43-46

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

Volume-6 Issue-2

 Download Abstract Book

S. No

Volume-6 Issue-2, May 2017, ISSN:  2277-3878 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

Gurpreet Singh, Sonia Jassi

Paper Title:

A Review Paper: A Comparative Analysis on Association Rule Mining Algorithms

Abstract: Data mining is a process which finds useful patterns from large amount of data. The development of Information Technology has generated large amount of databases and huge data in various areas. The research in databases and information technology has given rise to an approach to store and manipulate this precious data for further decision making. Data mining is a process of extraction of useful information and patterns from huge data. It is also called as knowledge discovery process, knowledge mining from data, knowledge extraction or data /pattern analysis. [1] Various algorithms and techniques like Classification, Clustering, Regression, Artificial Intelligence, Neural Networks, Association Rules, Decision Trees, Genetic Algorithm, Nearest Neighbor method etc., are used for knowledge discovery from databases. But here we are going to discuss Association rules mining.

Keywords:
Data, Classification, Clustering, Regression, Artificial Intelligence, Neural Networks, Association Rules, Decision Trees, Genetic Algorithm,


References:

1.       Bharati M. Ramageri, “DATA MINING TECHNIQUES AND APPLICATIONS,” Indian Journal of Computer Science and Engineering Vol. 1 No. 4 301-305
2.       YanxiLiu, “Study on Application of Apriori Algorithm in Data Mining”, IEEE Second International Conference on Computer Modeling and Simulation, 978-0-7695-3941-6/10, 2010

3.       Wangjie Sun, ZhigaoZheng “An Advanced Design of Data Mining Algorithms”, IEEE 978-1-4244-6943-7/10, 2010

4.       S.P.Latha“Algorithm for Efficient Data Mining”, IEEEInternational Conference on Computational Intelligence and Multimedia Applications, 7695-3050-8/07, 2007

5.       XU Chi, ZHANG Wen Fang “Review of Association Rule Mining Algorithm in Data Mining”978-1-61284-486-2/11/2011 IEEE.
6.       AmolGhoting, Gregory Buehrer  “Knowledge and Cache Conscious Algorithm Design and Systems Support for Data Mining Algorithms”, 1-4244-0910-1/07/2007 IEEE.
7.       Wan Muhammad Zulhafizsyam Wan Ahmad, ShahidaSulaiman, UmiKalsomYusof “Data Mining Technique for Expertise Search in a Special Interest Group Knowledge Portal”, 2011 3rd Conference on Data Mining and Optimization (DMO), 28-29 June 2011

8.       Mining Association Rules Based on Cloud Model and Application in Credit Card Marketing, Yan-Li Zhu, Yu-Fen Wang, Shun-Ping Wang, Xiao-juanGuo, and 2010 Asia-Pacific Conference on Wearable.

9.       Richard Lackes, Chris B6rgermann, Erik Frank, “Determining Factors of Online Auction Prices Analysis with Data Mining Algorithms on the basis of Decision Trees”, 978-1-4244-8845-2/10/ 2010 IEEE

10.    Chyouhwa Chen, Shi-Jinn Horng, Chin-Pin Huang, “Locality sensitive hashing for sampling-based algorithms in association rule mining”, 2011 Elsevier Ltd.

 

1-3

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.

Authors:

Vandana Bali, Vandhana Thevar, Samit Shivadekar

Paper Title:

Automatic Answer Checking Software

Abstract: An automatic answer checker application that checks and marks written answers similar to a human being. This software application is built to check subjective answers in an online/offline examination and allocate marks to the user after verifying the answer. The admin may insert questions and respective subjective answers in the system. These answers are stored as notepad files. When a user takes the test he is provided with questions and area to type his answers. Once the user enters his/her answers the system then compares this answer to original answer written in database and allocates marks accordingly. Both the answers need not be exactly same word to word. The system consists of in built artificial intelligence sensors that verify answers and allocate marks accordingly as good as a human being.

Keywords:
Semantic Analysis, Subjective answer checking


References:

1.    Assessment of Answers: Online Subjective Examination, <http:// aclweb.org/anthology/W/W12/W12-6005.pdf>
2.    Assessment of Answers: Online Subjective Examination, <http:// aclweb.org/anthology/W/W12/W12-6005.pdf>

3.    Assessment of Answers: Online Subjective Examination, <http:// aclweb.org/anthology/W/W12/W12-6005.pdf>

4.    The Design and Implementation of Subjective Questions Automatic Scor-ing Algorithm in Intelligent Tutoring System, <www.atlantis-press.
com/php/download_paper.php?id=5832>

5.    The Design and Implementation of Subjective Questions Automatic Scor-ing Algorithm in Intelligent Tutoring System, <www.atlantis-press. com/php/download_paper.php?id=5832>

6.    Introduction to Semantic Analysis

 

4-6

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

Sathish Kumar V, R. Rathish, N. Balakrishnan, Arun Deva S , Devaraj S. , Gokulraj E, Govindarasu C

Paper Title:

Design and Fabrication of Hydraulic Escalator

Abstract:  AN escalator is a mechanics moving stair way common in place with a lot of foot traffic or where a convention al staircase would be a very long  and tiring to climb. it can be seen malls shopping  complex parking escalator are often installed in pair with an up escalator and adown  escalator adjacent to each other  while single escalator may be changed to go up and down according to the direction of  heavier traffic at different time and day. escalator is similar that of conveyor but can be move  inclined to move from one end of an escalator also include a handrail that moves in conjunction with the stairs. These gears have  chain that loop \around  the gear and run down each side of the escalator. The handrail that rider use for balance and safety on their ride up or down  escalator are powered by the same system that power the faster the shaft revolves the metal ball swung out by centrifugal force a should  the lift speed exceed a predetermined figure the governor  actuates a brake.

Keywords:
 AN escalator, mechanics moving, common, escalator, handrail, centrifugal


References:

1.    Strakosch, George R. Vertical Transportation, Elevators and Escalators, New York: John Wiley & Sons, 1983.
2.    “Mitsubishi Electric Escalators Series Z” (PDF). Mitsubishi Elevator Asia Co., Ltd. Retrieved 2014-04-17.

3.    “Archived copy”. Archived from the original on April 6, 2010. Retrieved 2010-04-10.

4.    “ABC7 News – KGO Bay Area and San Francisco News”. Abclocal.go.com. Archived from the original on December 2, 2013. Retrieved 2016-10-30.

5.    “Kids Hurt While Wearing Crocs on Escalators – ABC News”. Abcnews.go.com. 2008-04-21. Retrieved 2016-10-30.

6.    “Experts recommend caution when wearing Crocs – WMC Action News 5 – Memphis, Tennessee”. Wmctv.com. Retrieved 2016-10-30.
7.    Moodie, K. “The King’s Cross Fire: Damage Assessment and Overview of the Technical Investigation.” ‘’Fire Safety Journal’’, Vol. 18, 1992: 13–33.
8.    ”Building Design Editorial: the King’s Cross Inquiry,” ‘’Building Design’’, November 19, 1988: 9.

7-10

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

4.

Authors:

C. Thiruvasagam, R. Rathish, N. Balakrishnan, K. Karuthapandi, R. Kaviyathevan, S. Kalishwaran, P. Ashok

Paper Title:

Design and Fabrication of Water Jet Machining

Abstract: The engineering and manufacturing departments are constantly on the look of edge. The water jet machining process provides many unique capabilities and advantages that can prove very effective cost. Learning more about water jet technologies will give us an opportunity to put these cost cutting capabilities to work. The water jet washes away the materials that “ERODES” from the surface of the work piece. The crack caused by the water jet impact is exposed to water jet. The extreme pressure and impact of particles in the following stream cause the small crack to propagate until the material cut. Water Jet Machining (WJM) is the process of material removal from a work piece by the application of a high speed stream of abrasive particles carried in a gas medium from a nozzle. The material removal process is mainly by erosion. The WJM will chiefly be used to cut shapes in hard and brittle materials like glass, ceramics etc. Care has been taken to use less fabricated components rather than directly procuring them, because, the lack of accuracy in fabricated components would lead to a diminished performance of the machine.

Keywords:
WJM – Water Jet Machining


References:

1.    Behringer -Plosonka, Catherine A., “Waterjet Cutting – A Technology Afloat on a Sea of Potential”, Manufacturing Engineering, Vol. 99, Nov. 1987, pp. 37-41
2.    Steinhauser, John, “Abrasive Waterjets: on the ‘Cutting Edge’ of Technology”, Flow Systems, Inc. International Journal of Engineering Research and General Science Volume 3, Issue 2, Part 2, March-April, 2015 ISSN 2091-2730 292 www.ijergs.org

3.    Medeot, R., “History, Theory and Practice of Hydro demolition”, 5th American Waterjet Conference, Aug 1989

4.    Peart, John W., “Lead-Pigmented Paints – Their Impact on Bridge Maintenance Strategies and Costs”, Public Roads, Vol. 52 Sept. 1992, pp. 47-51

5.    Ayers, Gary W., “Principles of Waterjet Cutting”, Tappi Journal, Vol. 70, Sept 1993, pp. 91-94

6.    Balakrishnan, N & Mayilsamy, K 2013, ‘A study of cotton coated with intumescents flame retardant: Kinetics and effect of blends of used vegetable oil methyl ester’, Journal of Renewable and Sustainable Energy, vol.5, pp. 0531211-0531218. ISSN: 1941-7012.

7.    Balakrishnan, N, Mayilsamy, K & Nedunchezhian, N 2015, ‘Experimental investigation of evaporation rate and emission studies of diesel engine fueled with blends of used vegetable oil biodiesel and producer gas’ Thermal Science, vol. 19, No. 6, pp. 1967-1975, ISSN: 0354-9836.

 

11-12

https://www.ijrte.org/wp-content/uploads/papers/v6i2/B1671056217.pdf

5.

Authors:

Abhishek Yadav, Rajeswari C

Paper Title:

Data Mining Approach To Find the Interest of People in Purchasing Real Estate

Abstract:  Data mining is extraction of information and consolidates it to helpful data which can be utilized for future calculation and prediction of an event. Subsequently by utilizing data mining methods we are anticipating the interest of individuals in different types of real estate and we are also defining certain pattern can be helpful in purchasing them. In this research we are going to gather individual’s enthusiasm for the kind of properties, and other different kinds of information and transform them into data chains utilizing certain data-mining algorithms by means of which we can predict people’s interest about what type of property they are likely going to buy and at what locations they are most likely to buy property. The data has been collected from websites such as OLX.com. In this research two data mining techniques that have been used to classify the data on the basis of certain attributes are Classification (zero classifier) and clustering (simple k means) and on the basis of results several graphs and bar charts are drawn.

Problem Statement:
Understanding the problems of client in real estate field about what properties to buy, what locations to select and how to utilize those Properties and defining different approaches to resolve it using certain data mining concepts and algorithms.

References:

1.     Vishal Venkat Raman, Swapnil Vijay, Sharmila Banu K Identifying Customer Interest in Real Estate Using Data Mining Techniques.
2.     Swati Singh, Gaurav Dubey Finding interest of people in purchasing real estate by using data mining techniques.

3.     Xian Guang LI, Qi Ming LI The Application of Data Mining Technology in real estate market prediction.

4.     Itedal Sabri Hashim Bahia, Ministry of Higher Education and Scientific Research, Baghdad, Iraq A Data Mining Model by Using ANN for Predicting Real Estate Market: Comparative Study.

5.     Ruben D. Jaen, Florida International University Park, PC236 Miami, Fl 33199Data Mining: An Empirical Application in Real Estate Valuation.

 

13-18

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

6.

Authors:

Iti Naidu, Deepak Xaxa

Paper Title:

Survey on Video Steganography Algorithms

Abstract: Internet is becoming more and more risky for handling the data against the intruders. Internet carry the text/audio/video/image data in digital form which can be easily tempered or stolen in the internet due to open access to the internet. Therefore it is essential to transfer the data in the internet secretly. Steganogrphy is one of the such tool which can be used for this vary purpose and can be used to exchange and share the secret data. Such secret data may be in the form of text , audio, video or even an image. Using steganography we can hide the secret information in the image, audio file or even in the video file. Hiding the secret data in a video file is known as the video steganography. This paper present a verty useful and extensive servey of video steganography their advantages/ disadvantages.

Keywords:
Steganography, Cryptography, payload, Cover image, Spatial domain, frequency domain.

References:

1.       H. Yuh-Ming and J. Pei-Wun, “Two improved data hiding schemes,” in Image and Signal Processing (CISP), 2011 4th International Congress on, 2011, pp. 1784-1787.
2.       C. Chin-Chen, T. D. Kieu, and C. Yung-Chen, “A High Payload Steganographic Scheme Based on (7, 4) Hamming Code for Digital Images,” in Electronic Commerce and Security, 2008 International Symposium on, 2008, pp. 16-21.

3.       L. Guangjie, L. Weiwei, D. Yuewei, and L. Shiguo, “An Adaptive Matrix Embedding for Image Steganography,” in Multimedia Information Networking and Security (MINES), 2011 Third International Conference on, 2011, pp. 642-646.

4.       W. Jyun-Jie, C. Houshou, L. Chi-Yuan, and Y. Ting-Ya, “An embedding strategy for large payload using convolutional embedding codes,” in ITS Telecommunications (ITST), 2012 12th International Conference on, 2012, pp. 365-369.

5.       C.S. Lu: Multimedia security: steganography and digital watermarking techniques for protection of intellectual property. Artech House, Inc (2003).

6.       J.J. Chae and B.S. Manjunath: Data hiding in Video. Proceedings of the 6th IEEE International Conference on Image Processing, Kobe, Japan (1999).

7.       Provos, N., Honeyman, P.: Hide and Seek: An Introduction to Steganography. IEEE Security & Privacy Magazine 1 (2003).

8.       I.J.Cox, J. Kilian, T. Leighton, T.Shamoon: Secure spread spectrum watermarking for multimedia. Proceedings of IEEE Image processing (1997).

9.       J.J. Chae, D. Mukherjee and B.S. Manjunath: A Robust Data Hiding Technique using Multidimensional Lattices. Proceedings of the IEEE Forum on Research and Technology Advances in Digital Libraries, Santa Barbara, USA (1998).

10.    Y. Wang, E. Izquierdo, “High-Capacity Data Hiding in MPEG-2 Compressed Video”, 9th International Workshop on Systems, Signals and Image Processing, UK, 2002.

11.    Hideki Noda, Tomonori Furuta, Michiharu Niimi, Eiji Kawaguchi. Application of BPCS steganography to wavelet compressed video. In Proceedings of ICIP’2004. pp.2147-2150

12.    D.E. Lane “Video-in-Video Data Hiding”, 2007.

13.    R. Kavitha, A. Murugan, “Lossless Steganography on AVI File Using Swapping Algorithm,” Computational Intelligence and Multimedia Applications, International Conference on, vol. 4, pp. 83-88, 2007

14.    Yueyun Shang, “A New Invertible Data Hiding In Compressed Videos or Images,” icnc, vol. 5, pp.576-580, Third International Conference on Natural Computation (ICNC 2007), 2007

15.    Amr A. Hanafy, Gouda I. Salama and Yahya Z. Mohasseb “A Secure Covert Communication Model Based on Video Steganography,” in Military Communications Conference, 2008. MILCOM. IEEE on 16-19 Nov. 2008.

16.    Cheng-Hung Chuang and Guo-Shiang Lin, “An Optical Video Cryptosystem with Adaptive Steganography”, Proceedings of International Association for Pattern Recognition (IAPR) Conference on Machine Vision Applications (MVA’09), pp. 439-442, Keio University, Yokohama, Japan, May 20-22, 2009. (NSC97-2221-E-468-006 International Conference on Computational Intelligence and Multimedia Applications, 2007.

17.    M. E. Eltahir, L. M. Kiah, and B. B. Zaidan, “High Rate Video Streaming Steganography,” in Information Management and Engineering, 2009. ICIME ’09. International Conference on, 2009, pp. 550-553.

18.    Jafar Mansouri, Morteza Khademi,”An Adaptive Scheme for Compressed Video Steganography Using Temporal and Spatial Features of the Video Signal”, 2009 Wiley Periodicals, Inc.

19.    P. Feng, X. Li, Y. Xiao-Yuan, and G. Yao, “Video steganography using motion vector and linear block codes,” in Software Engineering and Service Sciences (ICSESS), 2010 IEEE International Conference on, 2010, pp. 592-595.

20.    Sherly A P and Amritha P P, “A Compressed Video Steganography using TPVD “,International Journal of Database Management Systems ( IJDMS ) Vol.2, No.3, August 2010.

21.    B. Hao, L.-Y. Zhao, and W.-D. Zhong, “A novel steganography algorithm based on motion vector and matrix encoding,” in Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on, 2011, pp. 406-409.

22.    ShengDun Hu, KinTak U,” A Novel Video Steganography based on Non-uniform Rectangular Partition “,IEEE International Conference on Computational Science and Engineering,pp 57-61,Aug.2011.

23.    Z. Rongyue, V. Sachnev, M. B. Botnan, K. Hyoung Joong, and H. Jun,  “An Efficient Embedder for BCH Coding for Steganography,” Information Theory, IEEE Transactions on, vol. 58, pp. 7272-7279, 2012.

24.    Swathi,S.A.K Jilani, ” Video Steganography by LSB Substitution Using Different Polynomial Equations” , International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5,sep 2012.

25.    Lakshmi narayanan K,Prabakaran G,Bhavani R, ” A High Capacity Video Steganography Based on Integer Wavelet Transform”, Journal of Computer Applications ISSN: 0974 – 1925, Volume-5, Issue EICA2012-4, February 10, 2012.

26.    Y. Liu, Z. Li, X. Ma, and J. Liu, “A Robust Data Hiding Algorithm for H. 264/AVC Video Streams,” Journal of Systems and Software, 2013.

27.    Prajna Vasudev,Kumar Saurabh ,” Video Stegnography Using 32 *32 Vector Quantization of Dct”, International Journal of Software & Hardware Research in Engineering Vol. 1 Issue. 3,Nov.2013.

 

19-23

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

7.

Authors:

Patience Nafula Wanjala, Gwaya Abednego, Diang’a Stephen

Paper Title:

Integration of Management Information Systems for Effective Construction Projects Monitoring and Control in Kenya

Abstract:  Although monitoring and control of construction projects is carried out in Kenya, outcomes show that the process is not effective, [1]. The research adopts the contingency theory which argues that there’s no one best way for leadership or organization and that the design of the organization and its subsystems must fit with the environment, [2]. It therefore looks  at the present environment which is an ICT oriented one and tries to use it to bridge the gap between monitoring and control of a construction project and its effectiveness by incorporating MIS. Literature was briefly reviewed on the project based nature of the construction industry, why Monitoring and Control was necessary, the challenges it faced that led to it being ineffective and how MIS could help improve its effectiveness. A survey research design was adopted with the use of questionnaires. A sample size of 70 project managers registered with ICPMK was issued with the questionnaires. Out of the 70, 57 were responsive. The analysis in this article dwells more on assessing the significance of monitoring and control of construction projects in Kenya, objective one. Analysis showed that Monitoring and Control was very significant to Kenyan construction projects and was not dependant on the level of experience neither the value of project nor the construction sector handled. It was therefore recommended that Monitoring and Control be performed for all construction projects in Kenya.

Keywords:
 Control, Effective, Integration, MIS, Monitoring.

References:

1.       W. Mwangu and M. A. Iravo, “How Monitoring and Evaluation Affects the Outcome of Constituency Development Fund Projects in Kenya: A Case Study of Projects in Gatanga Constituency,” Int. J. Acad. Res. Bus. Soc. Sci., vol. 5, no. 3, pp. 13–31, 2015.
2.       F. Fred and Hersey, “Summary of Contingency Theory,” 1987. [Online]. Available: http://www.valuebasedmanagement.net/methods_contingency_theory.html. [Accessed: 25-Sep-2015].

3.       R. Vrijhoef and L. Koskela, “A Critical Review of Construction as a Project-based Industry : Identifying Paths Towards a Project- independent Approach to Construction,” pp. 13–24, 2013.

4.       Chat, “Construction Project Manager Roles & Responsibilities,” 2013. [Online]. Available: http://www.constructionchat.co.uk/articles/project-manager-roles-responsibilities/. [Accessed: 20-Aug-2015].

5.       R. H. Neale and D. E. Neale, Construction Planning. Thomas Telford, 1989.

6.       R. O. Onsare, “CHALLENGES FACING KENYA’S CONSTRUCTION INDUSTRY,” 2011. [Online]. Available: http://robertonsare.blogspot.co.ke/2011/05/challenges-facing-kenyas-construction.html. [Accessed: 26-Aug-2015].

7.       KLR, “The Public Procurement and disposal act,” Revis. Ed., 2010.

8.       M. Nasrun and M. Nawi, “Impact of Fragmentation Issue in Construction Industry : An Overview 3 Discussions : Fragmentation Issue,” vol. 9, pp. 1–8, 2014.

9.       S. a. Assaf and S. Al-Hejji, “Causes of delay in large construction projects,” Int. J. Proj. Manag., vol. 24, no. 4, pp. 349–357, 2006.

10.    Baccarini, “The concept of project complexity a review,” Int. J. Proj. Manag., vol. 14, no. 4, pp. 201–204, 1996.

11.    J. (Professor) Bennett, International construction project management : general theory and practice. Oxford  Angleterre: Butterworth Heinemann, 1991.

12.    G. I. Idoro, “Influence of the Monitoring and Control Strategies of Indigenous and Expatriate Nigerian Contractors on Project Outcome,” J. Constr. Dev. Ctries., vol. 17, no. 1, pp. 49–67, 2012.

13.    B. Dictionary, “Monitoring Definition,” 2015. [Online]. Available: http://www.businessdictionary.com/definition/monitoring.html. [Accessed: 03-Sep-2015].

14.    M&E Studies, “Characteristics of a Good Monitoring &amp; Evaluation System | Attributes | Monitoring and Evaluation Studies,” M&E Studies, 2013. [Online]. Available: http://www.mnestudies.com/monitoring/characteristics-good-monitoring-evaluation-system. [Accessed: 01-Sep-2016].

15.    Solutions, “Deloitte on Africa African Construction Trends Report 2014,” 2015.

16.    M. Geoffrey Otonde and M. Yusuf, “FACTORS INFLUENCING PROJECT PERFORMANCE AMONG KENYAN UNIVERSITIES IN KISUMU COUNTY,” Int. J. Innov. Soc. Sci. Humanit. Res., vol. 3, no. 3, pp. 1–12, 2015.

17.    R. Navon, “AUTOMATED PRODUCTIVITY CONTROL OF LABOR AND ROAD CONSTRUCTION,” in The 25th National Symposium on Automation and Robotics in Construction, 2008, pp. 29–32.
18.    W. Robert, Effective Project Management :: Traditional. Agile. Extreme., 6th ed. 1999.
19.    S. Jack, “How Do You Measure Project Success? Rethinking the Triple Constraint,” Project Management Institute, Inc., 2010. [Online]. Available: http://www.pmi.org/Learning/next-level-up-how-do-you-measure-project-success.aspx. [Accessed: 06-Sep-2015].
20.    O. S. K., “Space Analysis of Control Systems,” Englewood Cliffs, 1967.
21.    S. H. Al-Jibouri, “Monitoring systems and their effectiveness for project cost control in construction,” Int. J. Proj. Manag., vol. 21, no. 2, pp. 145–154, Feb. 2003.

22.    T. Morphy, “Project Monitoring and Control – techniques to control budget, status and planning,” stakeholdermap.com, 2016. [Online]. Available: http://www.stakeholdermap.com/project-management/project-monitoring-and-control.html. [Accessed: 31-Aug-2016].

23.    Sheen Ray, “Project Management Guru,” Product & Process Information .Inc, 2012. .

24.    X. Z. Wang, Data Mining and Knowledge Discovery for Process Monitoring and Control. Springer Science & Business Media, 2012.

25.    J. S. Bohn, “Benefits and Barriers of Construction Project Monitoring using Hi-Resolution Automated Cameras,” Georgia Institute of Technology, 2009.

26.    V. P. Raja, “Monitoring and Controlling the Construction Project by Project Management Information System ( PMIS ),” vol. 2, no. 5, pp. 893–904, 2015.

27.    X. Fuji, “Convergent document technology: an IT manager’s guide,” Media Resour. Cent., no. 218, 2002.

28.    N. Craig and J. Sommerville, “Information management systems on construction projects: case reviews,” Rec. Manag. J., vol. 16, no. 3, pp. 131–148, Sep. 2006.

29.    Y. Srewil and R. J. Scherer, “Effective Construction Process Monitoring and Control through a Collaborative Cyber-Physical Approach,” pp. 172–179, 2013.

30.    B. Vangie, “What is MIS – Management Information System?,” Webopedia, 2015. [Online]. Available: http://www.webopedia.com/TERM/M/MIS.html. [Accessed: 07-Sep-2015].

31.    D. Gupta and V. . Sople, “MIS.pdf,” Int. J. Manag. Pract. Contemp. Thoughts, pp. 89–100, 2010.

32.    D. Scott, M. Cheong, and H. Li, “Web-based Construction Information Management System,” Australas. J. Constr. …, vol. 3, no. 1, 2012.

33.    E. Gibson and L. C. Bell, “Integrated data-base systems,” J. Constr. Eng. Manag. ASCE, vol. 118, no. 1, pp. 50–59, 1992.

34.    C. Breu, N. Meckl, and J. Sametinger, “Project-based Customer Relationship Management in Virtual Enterprises,” Vis. J. Bus. Perspect., vol. 5, no. S1, pp. 38–45, 2001.

35.    C. A. P. and S. S. P., “A web-based system for managing construction information,” Adv. Eng. Softw., vol. 39, no. 11, pp. 865–876, 2008.

36.    Z. M. Deng and H. Li, “An application of the Internet-based project management system,” Autom. Constr., vol. 10, no. 2, pp. 239–246, 2001.

37.    B. C. Bjork, P. Huovila, and S. Hult, “Integrated Construction Project Document Management (Icpdm),” Adv. Technol. – Plan. – Civ. Eng., p. 146, 1993.

38.    Y. Jung and G. E. G. Jr, “Planning for Computer Integrated Construction,” J. Comput. Civ. Eng., no. October, pp. 217–225, 1999.

39.    M. Suchi, “Management Information Systems Tools | eHow,” 2013. [Online]. Available: http://www.ehow.com/list_6772957_management-information-systems-tools.html. [Accessed: 16-Oct-2015].

 

24-31

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

8.

Authors:

Mohini M. Ade, S. S. Asole

Paper Title:

Survey of Routing Protocols Performance with Mobility Models in Wireless Mobile Ad-hoc Networks

Abstract: Mobile Ad hoc Network is a collection of wireless mobile nodes dynamically forming a temporary network without the aid of any established infrastructure or centralized administration. Many routing protocols are proposed in Mobile Ad-hoc Network. There is a necessity to investigate the performance of MANETs under a number of different protocols with various mobility models. In this paper we are considering the performance evaluation of different routing protocols (AODV, DSR, DSDV, ZRP) in the presence of different network loads and differing mobility models.  In this paper we were doing the study of Reactive, Proactive and Hybrid protocols with various mobility models. This paper focuses on the evaluation of performance with respect to various parameters such as packet delivery ratio, average end to end delay, jitter and throughput. In this our finding show that the Influence of Mobility Models on the Performance of Routing Protocols in Wireless Mobile Ad-hoc Networks using NS-2 simulator.

Keywords:
MANET, routing protocols, mobility model, NS-2.


References:

1.       Rahman A, Zukarnian  Z. Performance comparison of AODV, DSDV, I-DSDV routing protocols in mobile ad hoc networks. European Journal of Scientific Research 2009; 31:566–76.
2.       Harminder Kaur, Harsukhpreet Singh, Anurag Sharma, “ Geographic Routing Protocol: A Review”  International Journal of Grid and Distributed Computing Vol. 9, No. 2 (2016), pp.245-254.

3.       Mittal S, Pinki. Performance evaluation of AODV, DSR, DSDV and TORA routing protocols. International Journal of Multidisciplinary Research Vol.2 Issue 2, February 2012, ISSN 2231 5780

4.       Adam Macintosh, Ming FeiSiyau, Mohammed Ghavami,” Simulation study on the impact of the transmission power on the performance of routing protocols under different Mobility Models”, International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.3, No.3, September 2014.

5.       Kumar S, Sharma SC, Suman B, “ Impact of mobility models with different scalability of networks on manet routing protocols. International Journal of Scientific & Engineering Research” Volume 2, Issue 7, July-2011 ISSN 2229-5518.

6.       Said SM, El-Emary IMM, Kadim S, “ Comparative study between the performance of proactive and reactive mobile ad hoc networks (MANET) routing protocols with varying mobility.Scientific Research and Essays” Vol. 6(6), pp. 1256-1274, 18 March, 2011.

7.       Vivek Thapar, Bindiya Jain, Varsha Sahni,”Performance Analysis of Ad hoc Routing Protocols Using Random Waypoint Mobility Model in Wireless Sensor”, Ad Hoc Networks, May 2013.

8.       Gouda BS, Petro D, Shital RK. “ Scenario-based performance evaluation of proactive, reactive and hybrid routing protocols in Manet using random waypoint model”, 978-1-4799-8084-0/14 $31.00 © 2014 IEEE 2014 International Conference on Information Technology.

9.       Apurva Sharma, Dr. Gurpreet, Er.Jaswinder Singh. “ MOBILITY MODELS FOR MANET: MATHEMATICAL PERSPECTIVE”. International Journal of Advanced Research in Engineering and Applied Sciences. Vol. 2 | No. 5 | May 2013.  

10.    Abdul Karim Abed , Gurcu Oz, Isik Aybay. “  Influence of mobility models on the performance of data dissemination and routing in wireless mobile ad hoc networks.” Computers and Electrical Engineering 40 (2014) 319–329.

 

32-35

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

Volume-6 Issue-3

 Download Abstract Book

S. No

Volume-6 Issue-3, July 2017, ISSN:  2277-3878 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

Dhammakar Dhammanand Chandrakant, Arjun. R. Vasatkar

Paper Title:

Investigation for Finding out Difficulties in Construction of High Rise Building & Suggest Remedial Measures to Expedite the Execution Process of Activities

Abstract:  High-rise buildings are designed with all modern & luxuries amenities for giving comfort & happy life style to buyers. The service lines & setup of infrastructure required for providing amenities are normally provided in basements. Such like, parking, CCTV Control room, Drivers room, Society office, Rooms for servants, Toilets for Drivers, Servants & maintenance staffs. Electrical Transformers, UG Tank, Fire fighting tanks, STP etc. Therefore basement of high rise building is very important part of building. Developer, Architects & Engineers are very much conscious about construction activity involved in basement as it is underground structure. In basements activities especial care to be taken because activities involved such like waterproofing, raft, footings & retaining wall includes. Membrane coatings for waterproofing of RCC elements are presently getting used in most of high-rise buildings. To stop entry of water in basements, waterproofing is needed to get done to horizontal & vertical plane that is, to retaining wall in vertical plane & below raft in horizontal plane. Due to rounded section of shore piles in vertical plane level surface to fix waterproofing membrane is not possible to get. So to make level surface plume concrete wall (PCW) is required to construct. It is observed during case study that, construction of plume concrete wall (PCW) required for fixing waterproofing membrane is time consuming activity. The object of this study is to expedite construction activity of plume concrete walls by finding out another option to plume concrete wall. Also to suggest new material of constructing PCW & reduce PCW construction duration & cost. On basses of case study at project site, Second option of “Skin wall” Construction instead of “Plume concrete wall” is suggested.

Keywords:
 Plum concrete wall (PCW), Skin wall (SWC), Waterproofing Membrane, Shore Piles, Basement, Retaining wall.


References:

1.       Saurabh Borle, Ghadge “Comparative Study of Conventional and Modern Waterproofing Techniques “2016, pp.:32-36,Department of Civil Engineering, Sardar Patel College of Engineering, Andheri (W), Mumbai-58, India
2.       Ar. Soma Anil Mishra, Ar. Prakool Soni, Dr.R.K. Pandit

3.       “Waterproofing systems in building construction “pp.: 21-23,

4.       IJCRD PISSN:2321-2241 Volume: 3; Issue: 1; July -2014

5.       Jan Ślusarek,”Surface waterproof protection of concrete structures, Civil Engineering Faculty, Silesian University of Technology, Gliwice, Poland. 2007,Volume 10,Issue ,Topic,CIVIL engineering

6.       Roslan Talib, A Ghafar Ahmad & M Zailan Suleiman, “Practical building defect solutions; construction failures to be avoided Real case studies selected from Malaysian buildings” Volume 3, No.7, July 2015, International Journal of Emerging Trends in Engineering, Research.

7.       Dhiren J Panchal, Nehal H Shah, Chirag R Sindhav, Chaitanya Joshi, Awadhesh Chauhan, Waterproofing Challenges and Suggested Remedial Measures for High Rise Buildings”.pp.:98-103. A Case Study IJSRD – | Vol. 3, Issue 10, 2015.

8.       Navrit Bhandari, Col. Harry Sidhu, Dr. Sanjay K Sharma, “To Determine the Efficacy of Crystalline Waterproofing System in Concrete”, pp.:2129-2134 (IRJET) e-ISSN: 2395 -0056, Volume: 03 Issue: 08 | Aug-2016 www.irjet.net p-ISSN: 2395-0072.

9.       K.K. Tan, M.Y.L. Chew and N.H. Wong , “Effects of plant roots on waterproofing membrane”. International Journal on Architectural Science, Volume 8, Number 3,
pp.:76-88, 2011Department of Building, School of Design and Environment, National University of Singapore.

10.    Tames, Florin-L., Tuns loan, “Modern Method to Waterproofing Rehabilitation for Building Infrastructure pp.:109-114, Journal of Applied Engineering Sciences”Vol. 2(15), Issue 2_2012, ISSN 2247- 3769 Issn-L 2247- 3769 (Print) / E-Issn: 2284-7197.

11.    Abhishekji G H, Lokesh J K “Evaluation of Different Kinds of Integral Water Proofing Compounds as Per IS Codes” PP.:107-112, International journal of innovative research in science, Engineering and Technology (An ISO 3297: 2007 Certified Organization) Vol. 5Special Issue 9May 2016.

12.    Navrit Bhandari, Dr. Sanjay Sharma, Col.Harry Sadhu “Treating Dampness with Crystalline Waterproofing System”PP.119-122, Dept. of Civil Engineering, National
Institute of Technical Teachers Training and Research Chandigarh (U.T) India.

13.    Alim Feizrakhmanovich Kemalov, Ruslan Alimovich Kemalov, Dinar “Structural Dynamic Study of Roof Waterproofing Materials” pp.:115-116, Modern Applied Science; Vol. 8, No. 5.Published by Canadian Centre of Science and Education.

 

1-6

https://www.ijrte.org/wp-content/uploads/papers/v6i3/C1688076317.pdf

2.

Authors:

Saravanan S, Ruban Daniel V, Karuppasamy R

Paper Title:

Effects of Various Slenderness Ratio and Aspect Ratio on FRP Wrapped Axially Loaded RC Capsule Column

Abstract: This paper presents results of experimental investigation on the behaviour of axially loaded capsule shaped columns that have been strengthened with Glass Fibre Reinforced polymer and Carbon Fibre Reinforced Polymer with different wrapping patterns. Twelve capsule shaped columns were casted and tested under axial compression. One set of columns have been made with aspect ratio 2.53and with two different slenderness ratios. The second set of columns has been made with aspect ratio 2.1and with two different slenderness ratios. Eight out of twelve columns were confined with one layer and two layers of GFRP and CFRP wrap patterns. Based on the axial compression testing the columns it can be concluded that the lower the slenderness ratio and higher the no of layers and aspect ratio obtained the more strength and ductility.

Keywords:
CFRP, GFRP, confined, Strengthening, Axial compression.  


References:

1.    M.N.S. Hadi (2007) ‘Behaviour of FRP strengthened concrete columns under eccentric compression loading’, Elsevier-Composite Structures 77, 92–96.
2.    R. Kumutha, R. Vaidyanathan , M.S. Palanichamy (2007) ‘Behaviour of reinforced concrete rectangular columns strengthened using GFRP’, Elsevier- Cement & Concrete Composites 29 609–615.

3.    J L Pan, T Xu, Z J Hu (2007) ‘Experimental investigation of load carrying capacity of the slender reinforced concrete columns wrapped with FRP’, Elsevier-Construction and Building Materials, pp.1991-1996.

4.    Li J, Hadi MNS (2003) ‘Behaviour of externally confined high strength concrete columns under eccentric loading’, Jurnal of Composite Struct 62(2):145–53.

 

7-10

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

Ebenezer Komla Gavua, Seth Okyere-Dankwa, Collinson Colin Agbesi

Paper Title:

A Digital Resource System on HDFS

Abstract: The issue of managing digital resources has become a major concern for educational and research institutions expanding with research laboratories, schools and departments. Some of these institutions have a major challenge as to how to manage huge quantities of educational resources required for research, teaching and learning. It is due to this challenge that this paper sought to design and implement a digital resource management system on the Hadoop Distributed File System (HDFS). The main model implemented in the development of the system was the incremental and iterative model. The development of the application took into consideration the user requirements and what the system sought to achieve after implementation. The system’s architecture is divided into various levels and these are the user, systems management, data storage and infrastructural levels. The development of this application was focused on the systems management level. The system integration was achieved by connecting MYSQL database server with HDFS through the utilization of sqoop. Security features were implemented on the system to protect the system from attack. The system was tested to ensure that all the modules created were communicating perfectly and the system was producing the expected results.

Keywords:
 Digital library; Hadoop distributed file system, cloud storage.


References:

1.       Borthakur, D. (2007) The Hadoop distributed file system: Architecture and design. http://hadoop.apache.org/.
2.       Fisher, W.(2002). The electronic resources librarian position: a public services phenomenon.

3.       Library Collections, Acquisitions, & Technical Services, 27,1, 3-17.

4.       Gantz et al.(2007) “The Expanding Digital Universe: A Forecast of Worldwide Information Growth Through 2010,” An IDC White Paper—sponsored by EMC.

5.       Ghemawat, S.  Gobioff, H. & Leung, S.(2003) The Google filesystem. In ACM Symposium on Operating Systems Principles.

6.       Han, Y.(2010) “On the Clouds: A New Way of Computing,” Information Technology & Libraries 29, no. 2: 87–92;

7.       Ipri,T.(2011) “Where the Cloud Meets the Commons,” Journal of Web Librarianship 5, no. 2 (2011)

8.       Itani,W., Kayssi, A.&  Chehab, A. (2009) “Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures”, Eighth IEEE
International Conference on Dependable.

9.       Jordan, J. (2011)“Climbing Out of the Box and Into the Cloud: Building Web-Scale for

10.    Libraries,”        Journal     of  Library Administration 51, no. 1: 3–17, doi:10.1080/01930826.2011.531637.999

11.    Kroski, E.(2010) Library Cloud Atlas: A Guide to Cloud Computing and Storage | Stacking the Tech. Retrieved November 5, 2010, from Library Journal.com:

12.    Liu, C. & Xiao, H. (2009) The Construction and Operation of Digital Library Service based on Grid Technology Padhy S.C. & Mahapatra,R.K (2012)Cloud Computing : Academic Library in Orissa

13.    Salim, J., Yahya,Y.,  Rashid,N.R.M.,&  Othman,S. (2008) “Diglib: Gateway to Digital Libraries and Searchable Databases,” The International Journal of Learning, vol. 14, pp. 715.

14.    Schatz., M.C.(2009) Cloud Burst:    highly      sensitive  read mapping           with         MapReduce.  Bioinformatics, 25(11):1363–1369.

15.    Shiri, A. (2003). “Digital library research: current developments and trends,” Emerald Group Publishing Limited, vol. 52, pp. 198-202 .

16.    Skibiński, P. & Jakub Swacha, J.(2009) “The Efficient Storage of Text Documents in Digital Libraries,” Information Technology & Libraries 28, no. 3: 143–53.

17.    Turner              , N.(2009)                “Cloud     Computing: A Brief Summary”, Lucid Communications Limited,2009.Vaquero, L.M., Merino, L.R., Caceres, J. & Lindner, M. (2009)”A break in the clouds: towards a cloud definition,” ACM SIGCOMM Computer Communication Review, 39(1).

18.    Wang, C.C., Pai, W.C. & Yen, N.Y. (2011). “A Sharable e-learning Platform Based on Cloud Computing”,3rd International Conference on computer Research and Development (ICCRD),pp.1-5,2011

19.    Wang, Y., Wen, X., Sun ,Y., Zhao, Z., & Yang, T.(2011)  “The Content Delivery Network System based on Cloud Storage”, IEEE.

20.    Wilder, S.J. (2002)   New hires in research libraries demographic trends and hiring priories. ARI, 221, 5.

21.    William Stallings, “Network Security Essentials: Applications and Standards”. Third Edition Yu, S., Gui, X., Huang, R., & Zhuang, W. (2011).  “Improving the storage efficiency of small files in cloud storage,” His-An Chiao Tung Ta Hsueh/Journal of Xi’an Jiaotong University, vol.45, no.6.

22.    Zhang, D., Zhu ,L.,&  Zhen-yu, H.,(2010) “Research of cloud storage technology for mobile terminal based on WEB, “Computer Engineering and Applications, vol. 46, No.36,pp. 66–69.

23.    Zhou, K., Wang, H. & Li C.(2010) “Cloud Storage Technology and Its Application,” ZTE COMMUNICATIONS, vol. 16, No. 04,pp. 24-27

11-15

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

4.

Authors:

Aaron J. Gordon

Paper Title:

The Application of Information Technology Portfolio Management in an Academic Sector 

Abstract:  Portfolio management practices have been integrated into information technology departments as a means to improve project selection and contribute to the achievement of an organization’s strategic mandate. In particular, this discussion focuses on current literature aimed at information technology portfolio management (ITPM) in application to an academic sector. A scholarly perspective provides an overview of ITPM followed by a discussion on issues related to integration. This report recommends the importance of providing additional training on financial management and risk planning to those providing ITPM oversight. In addition is the need to recognize the relationship with change management due to the dynamic environment of technology and the importance of utilizing performance metrics. As ITPM continues to evolve and integrate into the academic sector, educational leaders become more equipped to make sound project decisions that support the organization’s goals and demonstrate fiscal responsibility.

Keywords:
Portfolio management, information technology, academic sector, project management.


References:

1.       Badewi, A. (2015). The impact of project management (PM) and benefits management (BM) practices on project success: Towards developing a project benefits governance framework. International Journal of Project Management, 34(4), 761-778.
2.       Barsh, J., & Capozzi, M. (2008). Managing innovation risk. Strategic Finance, 89(10), 13-16.

3.       Calhoun, V. (2004). IT portfolio management. Armed Forces Comptroller, 49(3), 34-37.

4.       Caruso, D.  (2007). Application portfolio management: a necessity for future IT. Manufacturing Business Technology, 25(10), 48.

5.       Chabrow, E.  (2003). I.T. staffs lack financial chops for project analysis. InformationWeek, (932), 20.

6.       Cooper, R. G. (2013). Where are all the breakthrough new products? Using portfolio management to boost innovation. Research-Technology Management, 56(5), 25-33.

7.       Durbin, P., & Doerscher, T. (2010). Taming change with portfolio management. Austin, TX: Greenleaf Book Group Press.

8.       Jeffrey, M., Leliveld, I. (2004). Best practices in it portfolio management. MIT Sloan     Management Review, 45(3), 41-49.

9.       Kock, A., & Gemünden, H. G. (2016). Antecedents to decision-making quality and agility in innovation portfolio management. The Journal of Product Innovation Management, 33(6), 670-686.

10.    Kramer, L.  (2006). CIO challenge. Wall Street & Technology,42-43

11.    Levin, H. A. (2005). Project portfolio management (5th ed.). San Francisco, CA: Jossey-Bass.

12.    McShea, M.  (2006). IT value management: creating a balanced program. IT Professional Magazine, 8(6), 31-37. Gabris, G. T., & Ihrke, D. M. (2001). Does performance appraisal contribute to heightened levels of employee burnout? Public Personnel Management, 30 (2), 157-172.

13.    Project Management Institute (2008). The standard for program management (2nd ed.). Newton Square, PA.

14.    Project Management Institute (2013). A guide to the project management body of knowledge (5th ed.). Newton Square, PA.

15.    Potts, C.  (2008). Tools for leading business change – enterprise architecture and IT portfolio management provide strategic tools for innovating and executing change. They are not about IT but about people, collaboration and culture. CIO, 21(22), 22.

16.    Teller, J., & Kock, A. (2013). An empirical investigation on how portfolio risk management influences project portfolio success. International Journal of Project Management, 31(6), 817-829.

 

16-19

https://www.ijrte.org/wp-content/uploads/papers/v6i3/C1695076317.pdf

5.

Authors:

Shailesh Kumar Pandey, Pardeep Gahlot, Vikas Rohilla, Manish

Paper Title:

A Review on Friction Stir Welding of Aluminum Alloy (7075)

Abstract: Friction stir welding is a solid state joining process and is extensively used for aluminium alloys. In a given work it was analyzed that how the tensile strength as well as microstructural behavior of AA7075 varies if the process parameter like axial pressure force, welding traverse speed and rpm of the FSW tool varies to butt weld of two pieces having length 100mm, width 50mm and thickness 6mm have been used. It was preferred friction stir welding process to obtain the particular result over traditional welding process because of no melt of piece, no toxic fumes and harmful radiation which is suitable for environment so FSW is eco-friendly welding process. It can be widely used   in aircraft, marine, automotive as well as railways industry because of eco-friendly in nature.

Keywords:
Friction stir welding, Welding speed, microstructure, Tensile strength, Rotational speed


References:

1.       Acerra.F, Buffa.G, Fratini.L and Troiano.G “On the FSW of AA2024- T4 and AA7075-T6 T-joints: an industrial case study”, International Journal of Advanced Manufacturing Technology”, Vol. 48, No. pp.1149–1157, 2010.
2.       Buffa, G., Hua, J., Shivpuri, R. and Fratini, L. “Design of the friction stir welding tool using the continuum based FEM model”, Materials Science and Engineering: A”, Vol. 419, No. 1–2, pp.381-388, 2006b.

3.       Cavaliere, P., Cerri, E. and Squillace, A. “Mechanical response of 2024-7075 aluminium alloys joined by Friction Stir Welding”, Journal of Materials Science”, Vol. 40, No. 14, pp.3669-3676, 2005.

4.       Colegrove, P. A. and Shercliff.H.R “3-Dimensional CFD modelling of flow round a threaded friction stir welding tool profile”, Journal of Materials Processing Technology”, Vol. 169, No. pp.320–327, 2005.

5.       Da Silva, M., A. A., Arruti, E., Janeiro, G., Aldanondo, E., Alvarez, P. and Echeverria, A. “Material flow and mechanical behavior of dissimilar AA2024-T3 and AA7075-T6 aluminium alloys friction stir welds”, Materials & Design”, Vol. 32, No. 4, pp.2021-2027,  2011.

6.       Fratini.L, Buffa.G, Palmeri.D, Hua.J and Shivpuri.R “Material flow in FSW of AA7075–T6 butt joints: numerical simulations and experimental verifications”, Science and Technology of Welding and Joining”, Vol. 11, No. pp.413-421, 2006.

7.       Khodir, S. A. and Shibayanagi, T. “Friction stir welding of dissimilar AA2024 and AA7075 aluminium alloys”, Materials Science and Engineering: B”, Vol. 148, No. 1-3, pp.82-87, 2008.

8.       Mahoney, M., Rhodes, C., Flintoff, J., Bingel, W. and Spurling, R. “Properties of friction-stir-welded 7075 T651 aluminium”, Metallurgical and Materials Transactions A”, Vol. 29, No. 7, pp.1955- 1964, 1998a.

9.       Rajakumar, S. and Balasubramanian, V. “Establishing relationships between mechanical properties of aluminium alloys and optimized friction stir welding process parameters”, Materials &amp; Design”, Vol. 40, No. 10, pp.17-35, 2012.

10.    Rhodes, C. G., Mahoney, M. W., Bingel, W. H., Spurling, R. A. and Bampton, C. C. “Effects of   friction stir welding on microstructure of 7075 aluminium”, Scripta Materialia”, Vol. 36, No. 1, pp.69-75, 1997.

11.    Yan, J. and Reynolds, A. P. “Effect of initial base metal temper on mechanical properties in AA7050 friction stir welds”, Science and Technology of Welding and Joining”, Vol. 14, No. 4, pp.282-287,  2009.

 

20-23

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

6.

Authors:

Vikas Rohilla, Pardeep Gahlot, Adarsh Bhoria, Shailesh Kumar Pandey

Paper Title:

Friction Stir Welding of Aluminum Alloy (6082): A Review

Abstract: This  paper  focused on  the Mechanical and  Microstructural  changes  of aluminum  alloy 6082-T6  welded  joints  formed by Friction  Stir Welding  Technique  by varying process.  Parameters such as tool rotational speed, welding speed, shoulder geometries, tool tilt angleetc. This paper have not any Experimental procedure and values because it is only a Review to gain knowledge about the Mechanical and Microstructural changes and it’s Analysis. The effect of various process parameters on Micro hardness of the joints is also studied. As FSW joining takes place below the melting temperature of the base material Due   to which all the defects related to melting is automatically removed. The review helps   in   selection of important process parameters as the quality of weld joint depends on these welding input parameters and in optimization of these parameters.

Keywords:
Friction stir welding, Mechanical properties, process parameter, Microstructure process parameters.


References:

1.    Debroy, T. Bhadeshia, H.K. D.H. friction stir welding of dissimilar alloys- A perspective Science technical Weld Join 2010, 15, 266-270 [cross ref.]
2.    Mishra RS, Mazy friction Stirs Welding and processing, Material Science and Engineering R. 2005; 50: PP 1-78.

3.    P. Cavaliere, A. Squillace and F. Panella, “Effect of welding parameters on mechanical and microstructure properties of AA6082 joints produced by friction stir welding, “Journal of materials processing technology, vol. 200, pp. 364-372, September  2007.

4.    Sakthivel T, Sengar G.S, Mukhopadhyay J., 2009. Effect of welding speed on micro structure and mechanical properties of friction stir welded aluminum International journals of Advanced Manufacturing Technology 43: 468-473.

5.    Scialpi, L.A.C. De Fillippis and P. Cavaliere, “Influence of shoulder geometry on microstructure and mechanical properties of friction stir welded 6082 aluminum alloy”, Materials and Design, Vol 28, PP. 1124-1129, April 2006.

6.    T. Minton and D.J. Mynors, “Utilisation of engineering workshop equipment for friction stir welding,” Journal of Material Processing Technology, vol. 177, pp. 336-339, 2006.

7.    Magdy M. El-RRayes and Ehab A. El-Danaf, “The influence of multi-pass friction stir processing on the micro structural and mechanical properties f aluminum alloy 6082,” Journal of Materials Processing Technology, vol. 212, pp. 1157-1168, January 2012.

8.    P. Cavaliere, A. De Santis, F. Panella and A. Squillace, “Effect of welding parameters on mechanical and micro structural properties of dissimilar AA6082-AA2024 joints produced by friction stir welding,” Materials and Design, vol. 30, pp. 609-616, July 2008.

 

24-26

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

7.

Authors:

Abhishek Rajan, Akshay Krishnani, Siddharthsingh K. Chauhan

Paper Title:

Analyzing usage of Environmental Noise for Electricity Generation by Piezoelectric Systems

Abstract:  In recent years with increased industrialization as well as population growth, the demand of energy is increasing day by day and as a result of which, the conventional resources are declining. Hence, the need of replacing conventional sources by renewable energy has become an issue of great importance. Due to this, now the focus is to generate electrical energy from renewable sources and piezoelectricity is one of them. This paper projects a state of technology for generation of piezoelectricity from sound using piezoelectric materials.

Keywords:
 Piezoelectricity, sound energy, mechanical vibration, energy harvesting.


References:

1.    Tanvi Dikshit, Dhawal Shrivastava, Abhijeet Gorey, Ashish Gupta, Parag Parandkar and Sumant Katiyal , “Energy Harvesting via Piezoelectricity” in BVICAM’s International Journal of Information Technology, July – December, 2010; Vol. 2 No. 2; ISSN 0973 – 5658.
2.    Davion Hill, Arun Agarwal, Nellie Tong, “Assessment of Piezoelectric Materials for Roadway Energy Harvesting” for California Energy Commission, January 2014, Contract Number: 500-11-029.

3.    Nathan S. Shenck and Joseph A. Paradiso, “Energy Scavenging With Shoe-Mounted Piezoelectrics” in IEEE Micro, May-June 2001, 0272-1732/01/$10.00 © 2001 IEEE.

4.    M. Marzencki, S. Basrour and B. Charlot, “Design, modelling and optimization of integrated piezoelectric micro power generators” in NSTI-Nanotech 2005, www.nsti.org, Vol. 3, 2005, ISBN 0-9767985-2-2.

5.    Federal Agency Review of Selected Airport Noise Analysis Issues, Federal Interagency Committee on Noise (August 1992) and source of the information is attributed to Outdoor Noise and the Metropolitan Environment, M.C. Branch et al., Department of City Planning, City of Los Angeles, 1970.

6.    E. Minazara, D. Vasic and F. Costa, “Piezoelectric Generator Harvesting Bike Vibrations Energy to Supply Portable Devices” in RE&PQJ, Vol. 1, No.6, March 2008.

7.    Haris Fazilah Hassan, Syed Idris Syed Hassan and Rosemizi Abd Rahim, “Acoustic Energy Harvesting Using Piezoelectric Generator for Low Frequency Sound Waves Energy Conversion” in Haris Fazilah Hassan et.al / International Journal of Engineering and Technology (IJET), Vol 5 No 6 Dec 2013-Jan 2014, ISSN : 0975-4024.

8.    Ahmadreza Tabesh, and Luc G. Fréchette, “Ultra Low Power Stand-Alone Circuitry for Harvesting Energy From A Micro-Power Piezoelectric Generator” in Proceedings of PowerMEMS 2008+ microEMS2008, Sendai, Japan, November 9-12, (2008).

27-30

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

Volume-6 Issue-4

 Download Abstract Book

S. No

Volume-6 Issue-4, September 2017, ISSN:  2277-3878 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

Abu Hasan, Showkat Iqbal Maharaj, Md. Golam Kibria, F.M. Mahmud Hasan

Paper Title:

Performance Evaluation of MS Tube Coupler on Axial Load Capacity of Column

Abstract: This paper presents the results of an experimental investigation on the axial load behavior of small scale reinforced concrete square columns with tube coupler, where this material represents a relatively new technology, as a solution to overcome the lapping problems. Therefore, a total of 18 columns (550 mm ×150 mm×150 mm size) were tested under compressive axial static loading. All columns had 4-Φ10 mm rebar as main reinforcement and Φ8 mm as transverse reinforcement at 100 mm center to center spacing along the column. The major parameters included in this research were the joining types of main reinforcement, such as solid rebar, lapping of rebar and coupling of rebar. Test results exhibited that the cracking loads and failure loads of column were higher in the column made with coupling of rebar compared to lapping but slightly lower than the solid rebar. In addition, axial deformations and rate of deformation were almost similar in both types of columns using solid rebar and coupler in rebar. So, it can be stated, on the basis of the test results, that uses of tube coupler in rebar rather than lap splice is more expedient to increase the capacity of column.

Keywords:
tube coupler, lapping, cracking load, failure load, axial deformation


References:

1.       ACI Committee 318, (2008), Building Code Requirements for Structural Concrete (ACI 318-08) and Commentary, American Concrete Institute.
2.       S. P. Rowell, and K. P. Hager, “Investigation of the Dynamic Performance of Large Reinforcement Bar Mechanical Couplers”, ASCE journal, 2012.
https://doi.org/10.1061/41130(369)187

3.       Masterbuilder, Reinforcement Bar Couplers: The Technology for Present & Future, 13 April 2015. https://www.masterbuilder.co.in/reinforcement-bar-couplers-the-technology-for present-future/

4.       V. Jokūbaitis and L. Juknevičius, (2010), “Influence of Reinforcement Couplers on the Cracking of Reinforced Concrete Members”. The 10th International Conference on Modern Building Materials, Structures and Techniques, Faculty of Civil Engineering, Vilnius Gediminas Technical University, Lithuania, pp. 646-650, 2010.

5.       C. Neeladharan, M. T. Rahman, A. Shajahan, S. H. Javaad, K. J. Saquib, “Behaviour of Mechanical Coupler in Reinforcement,” International Journal of Innovative Research in Science, Engineering and Technology, vol. 6, no. 4, pp. 6774-6781, 2017. DOI:10.15680/IJIRSET.2017.0604096

6.       S.N. Harinkhede, G.S. Supekar, S.B. Ingavale, V.V. Wagaralkar, A.S. Narwade, and S.M. Dhomse, “Investigation of New Techniques in Mechanical Coupler as An Alternative Splices”, Imperial Journal of Interdisciplinary Research, vol. 2, no. 6, pp. 1039-1041, 2016.

7.       P. S. Swami, S. B. Javheri, D. L. Mittapalli, and P. N.  Kore,“Use of Mechanical Splices for Reinforcing Steel,” International Journal of Innovation in Engineering, Research and Technology, pp. 1-6, 2016.    [National Conference on Innovative Trends in Engineering & Technology-2016]

8.       R. Singh, S. K. Himanshu, and N. Bhalla, “Reinforcement Couplers as an Alternative to Lap Splices: A Case Study,” International Journal of Engineering Research & Technology, vol. 2, no. 2, pp. 1-6, 2013.

9.       S. B. Jain, N. Naik, M. Andelimath, V. S. Hosagoudar, and H. G., Manasa, “Use of Mechanical Threaded Coupler in Steel Reinforcement”, International Journal of Engineering Science and Computing, vol. 7, no. 5, 11284-11286, 2017.

1-6

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.

Authors:

Anusha Sanga, Shweta Shinde, Suraj Shaha

Paper Title:

Fruit Sorting Robotic Arm Based on Image Processing

Abstract:  This paper present the smart approach of sorting the fruit. This food sorting system is based on image processing and it gives us various information like color, shape, size, defect, etc of fruit. In today’s world image processing grabs exceptionally large attention it possibilities of widen application in many field of higher technology. The system consist of one digital USB camera, personal computer, PIC micro-controller, DC motor. The samples of different fruits are situated in front of camera and are calibrated off line and stored in different storage. A regular USB digital camera was used to acquire the images and all process were in matlab environment. The performance of system strongly depends on the thresholds used, although optimal thresholds tend to vary with images but developed method did not require an adjustment of threshold values for fruit detection from each image because image segmentation was conducted based on classification models generated in accordance with the color, shape, texture and size of the images. The DC motor is used for the movement of the robotic arm. Manual method is slow, costly and also lacks reliability and objectivity required in competitive food industries. In this project embedded system is designed for multi sorting and it is implemented through Matlab. External inspection is done through image processing. The system utilizes image-processing techniques to classify and grade fruits.

Keywords:
 PIC Microcontroller, MATLAB GUI, Robotic system, Camera, Image processing 


References:

1.    “A Fruit Quality Management System Based On Image Processing”, Ms. Rupal, S. Jadhav, PROF. S.S.Patil.
2.    “A Review on Fruit Grading Systems for Quality Inspection” R. Swarna Lakshmi, B. Kanchanadevi

3.    ”Feature extraction methods For color Image similarity”, R. Venkata Ramana hary, Dr. D. Rajya     Lakshmi and Dr. K.V.N Sunitha
4.    “ Object Sorting Robot Using Image Processing” Lekha Bhausaheb Kachare ME (E & TC)in  VLSI & Embedded system G.H. Raisoni COEM, Ahmednagar, India.
5.    Fruits Sorting and Grading Based on Color and Size Unmesh Shashikant Sagare, Assoc. Prof. Sunil N. Kore.

7-10

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

Manish, Rajesh, Adarsh Bhoria, Shailesh Kumar Pandey

Paper Title:

Friction Stir Processing of Aluminum Alloys (6063): A Review

Abstract:  As we know aluminum and its different kinds of alloys are suffering from different kind of confines like high strength, cost, time used in production and also reduction in ductility.Material having fine and homogenous grain structure accompanied high ductility and high strength. That is why there is requirement arises from the development of a new and different technique which is useful to produce a material with a fine grain structure, high wear strength, ductility and fine grain structure. FSP (Friction Stir Processing) is a fresh and new method, but still in the research phase.

Keywords:
Friction Stir Processing, Principal, Aluminum alloy, Rotational speed, Microstructure


References:

1.       Kwon, I. Shigematsu and N. Saito. (2003) “Mechanical properties of fine-grained aluminum alloy produced by friction stir process”. Scripta Materialia, 49,pp. 785-789.
2.       Santella, M.L, Engstrom, T, Storjohann, D, Pan, T.Y. (2005) “Effects of friction stir processing on mechanical properties of the cast aluminum alloys.
3.       D. M. Darras, M. K. Khaishesh, F. K abu-Faraha and M. A. Omar (2015) “Friction stir processing of commercial AZ 31 magnesium alloy”.
4.       Thomas, W.M., Nicholas, E.D., Kallee, S.W., “Friction based technologies for joining and Processing”, Friction Stir Welding and Processing, Edited by K.V. Jata, M.W. Mahoney,

5.       R.S. Mishra, S.L. Semiatin, and D.P. Field, TMS, 2001, Pages 3-13

6.       Mishra, R.S and Mahoney, M.W, “Friction Stir Processing: A New Grain Refinement Technique in Commercial Alloys”, Materials Science Forum, 2001, Volumes357-359, Pages 507-514

7.       Y. S. Sato, Y. Kurihara, S. H. C. Park, H. Kokawa and N. Tsuji , “Friction stir welding of Ultrafine grained Al alloy 1100 produced by accumulative roll-bonding”, Scripta Materialia, Volume 50, Issue 1, 2004, Pages 57-60

8.       Thomas, W.M., Nicholas, E.D., Smith, S.D., “Friction stir welding- tool developments”, Aluminum Joining Symposiums, 2001 TMS Annual Meeting, 11-15.

9.       Mishra, R.S., Mahoney, M.W., McFadden, S.X., Mara, N.A., Mukherjee, A.K., 1999.

10.    “High strain superplasticity in a friction stir processed 7075 Al alloy” Scripta Materialia 42

11.    Z. Y. Ma, R. S. Mishra and M. W. Mahoney, “Superplastic deformation behavior of friction Stir processed 7075Al alloy” Acta Materialia, October 2002, Volume 50, Issue 17,

12.    Karthikeyan, L., Senthilkumar, V.S., Balasubramanian, V., Natarajan, S. (2009) “Mechanical property and microstructural changes during friction stir processing of cast aluminum 2285 alloy” Materials and Design,

13.    Sharma, S.R., Ma, Z.Y and Mishra, R.S. (2004) “Effect of friction stirs processing on the fatigue behavior of A356 alloy”, Cavalierea (2006) et al. Elangovan and Balasubramanian (2007) et al.

14.    Magdy, M.L. and Ehab, A.E. (2012) “The influence of multi-pass friction stir processing on the microstructural and mechanical properties of aluminum alloy 6082”,

11-13

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

4.

Authors:

Trupti Ontagodi, G. R. Deeba Lakshmi

Paper Title:

An Energy Efficient Scheme for Secure Data Aggregation in Cluster Based Wireless Sensor Network

Abstract: Wireless sensing networks have obtained responsiveness throughout the world from last many years because of the progress that had been made in wireless communication. WSN devices are laptops, PDAs, mobile phone and simple sensing devices. But now the devices are in constrictions with relations like power, memory, efficiency and communication abilities because of various causes. WSN are used in saleable and manufacturing area like environment checking, habitat nursing, hospital, bank, police department as there is increase use in wireless sensing network in day to day life. In contract to this it face a lot of issues in terms of battery life time. In the proposed system we are using RSA technique for key generation and PAM for the energy Consumption. Using RSA we can authenticate it successfully and using PAM algorithm form the clusters effectively for minimizing energy consumption. In this way proposed system provides the improved performance in terms of Network throughput, energy consumption and delay.

Keywords:
 wireless sensor network (WSN), Energy, PAM (partion around medoid), RSA


References:

1.     Hsueh, Ching-Tsung, Chih-Yu Wen, and Yen Chieh  Ouyang. “A Secure Scheme Against Power Exhausting   Attacks in Hierarchical Wireless Sensing    Networks”, IEEE   Sensing s Journal,  2015.
2.     W. Ye, J. Heidemann, and D. Estrin, “An energy-efficient MAC protocol for wireless sensing  networks,” in Proc. 21st Annu. Joint  Conf. IEEE Comput. Commun.  Soc. (INFOCOM), Los Angeles, CA, USA, 2002, vol. 3, pp. 1567-1576.

3.     Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E.   Culler, “SPINS: Security protocols for sensing  networks,” Wireless Netw., vol. 8, no. 5, pp. 521-534, 2002.

4.     K.-T. Chu, C.-Y. Wen, Y.-C. Ouyang, and W. A. Sethares,  “Adaptive distributed topology control for wireless  ad-hoc sensing  networks,” in Proc. Int. Conf. Sensing  Technol. Appl. (Sensing  Comm), Valencia, Spain,2007, pp. 378–386.

5.     Hsueh, Ching-Tsung, Chih-Yu Wen, and Yen-Chieh Ouyang. “A secure scheme for power exhausting attacks in wireless sensing  networks”, 2011 Third International Conference on Ubiquitous and Future Networks (ICUFN), 2011

14-17

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

5.

Authors:

C. E. Ezendiokwelu, J. C. Onuegbu, B. A. Odufuwa

Paper Title:

Power Generation Investment and Electricity Pricing in Deregulated Energy Markets

Abstract: This paper discusses deregulated electricity markets with a focus on highlighting the factors that have constrained generation investments, kept prices up and possible ways of mitigating them. The pricing structures adopted in electricity markets were ex-rayed and comparisons of generation investment mix were made between case nations to ascertain effectiveness. This study concludes that a wholesale competitive market, cost reflective pricing and right generation mix are essential for improved electricity availability, reliability and sustainability.

Keywords:
  Electricity Market, Deregulation, Generation Capacity, Electricity supply and demand, Wholesale


References:

1.       Crew S., Michael A. and Kleinforder P. (2006), “Peak Load Pricing with Diverse Technology,” Bell Journal of Economics, 7(1): 207-231.
2.       Hattori T, Tsutsui M “Economic impact of regulatory reforms in the electricity supply industry: a panel data analysis for OECD countries”, Energy Policy 32 (2004) 823–832.

3.       Joskow, P.L. (2006), “Competitive Electricity Markets and Investment in New Generating Capacity”, MIT Center for Energy and Environmental Research, June 12, 2006.

4.       Joskow, P.L. (2006), “Markets for Power in the U.S.: An Interim Assessment,” The Energy Journal, 27(1): 1-36.

5.       KPMG Global Energy Institute “Energy Report: Philippines 2013- 2014 Edition”, http://www.kpmg.com/energyaspac .

6.       Latham and Watkins, Client Alert White Paper on “Nigeria Power Sector Opportunities and Challenges for Investment in 2016” Feb 23, 2016, No 1930 Pp. 1-15.

7.       Nigerian Electricity Regulatory Commission (NERC), “Multi-Year Tariff Order 2”, June 1, 2012.

8.       PWC Indonesia “Power in Indonesia: Investment and Taxation Guide”, Third Edition August 2015. http://www.pwc.com/id .

9.       Streimikiene, D., Bruneckiene, J., Cibinskiene, A. (2013), “The Review of Electricity Market Liberalization Impacts on Electricity Prices”, Transformations in Business & Economics, Vol. 12, No 3 (30), pp.40-60.

10.    Steven Stoft “Power System Economics – Designing Market for Electricity” IEEE Press & Wiley-Interscience Publication 2002.

18-21

https://www.ijrte.org/wp-content/uploads/papers/v6i4/B1674056217.pdf

6.

Authors:

Alpyspayeva Gal’ya Aitpaevna, Sayakhimova Sholpan Nazarbekovna

Paper Title:

Cultural Space of Astana: Symbolic Content Peculiarities

Abstract:  The article «CULTURAL SPACE OF ASTANA: SYMBOLIC CONTENT PECULIARITIES» considers the scientific problem of filling the cultural space of the city of Astana, capital of Kazakhstan today, by the symbols of the era. The choice of the subject of the article is not only due to its relevance, but the research experience of the authors as well. As the object of research is the city itself, the subject of this study is the cultural space of the city and its symbolic content. The scientific base of the research consists of written, cartographic, statistical sources from the archives funds of Kazakhstan, as well as field research materials. In the methodological part of the investigation the authors focused on the cultural approach to the study of urban culture.

Keywords:
city, Astana, cultural space, symbols, urban culture, monuments, architecture of the city.


References:

1.       Orlova E.A. Modern urban culture and people. Chief Ed. A.I.Arnoldov. M.: H Science, 1987. 191 p.
2.       Alexander C., Buchli V. Introduction // C. Alexander, V. Buchli, C. Humprey. (eds.). Urban Life in Post-Soviet Asia. L.: UCL Press, 2007. P. 1–39.

3.       Rezun D.Ya. Siberian city of the XVII and the first half of the nineteenth centuries as the phenomenon of Russian culture // Cultural Studies in Siberia. 2003. № 2 (10). – pp. 21-26.

4.       Alisov D.A. Actual problems of cultural city // EIS. 1999.№1.-S. 4-16; Steppe Capital Territory: the socio-cultural aspect of the city of Omsk population in the late XIX – early XX centuries. // Cultural Studies in Siberia. 2003. № 2 (10). – P. 13-19.

5.       Ryzhenko B. Soviet city space: theoretical concepts, regional socio-cultural and historical-cultural characteristics (on the sample of Western Siberia) / V. Nazimova, D. Alisov Omsk, 2004. – 234 p (1920-1950-ies.).

6.       Alisov D.A. The urban culture of the Middle Irtysh region in the XIXth and early XXth centuries/Chief Ed. M.E. Budarin. Monograph. Omsk: Publishing House of the Omsk State Pedagogical University Press, 2000. – 201 p.

7.       Baipakov K.M. The city and the steppe in ancient times: sedentary life and agriculture in Saks and Usuns in Zhetysu // Proceedings of the National Academy of Sciences of the Republic of Kazakhstan. Series of social science. 2008. № 1 (254). – P. 3-25.

8.       Medeuova K.A. Astana: cultural and anthropological horizons of the new capital of Kazakhstan // Eurasia. 2004. № 3. – P. 75-79;

9.       Syrgakbaeva AS Astana as a symbol of Kazakhstan // XX century: the transfer of the capital. Proceedings of the international scientific conference. Astana: Elorda, 2008.- P.260-270;

10.    Zabirova A. Rodionov A. Architecture monuments of Astana as a symbol of the national identity of Kazakhstan // Sayasat. 2007. №7. – P.55-58.

11.    Kosmarskaya N.P. Antropological forum. No 12. P. 74-85.

12.    State archive of Astana. F. 32. Op. 10. D. 1165. Р. 91.

13.    State archive of Astana. F. 170. Op. 1.  D. 44. Р. 16.

14.    Dorr E. Contested Urban Space: Symbolizing Power and Identity in the City of Albuquerque, USA // A. Erdentug, F. Colombijn (eds.). Urban Ethnic Encounters: Spatial Consequences. L.; N.Y.: Routledge, 2002. P. 209–225.

15.    Medeuova K.A. Mass media in the system of political institutes: the theory and practice. Astana, 2010

16.    Graves I.M. History in regional studies// Regional studies. 1926. №4. – P.14-23.

22-27

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

7.

Authors:

 Aditya Nigam, Y. K. Bhateshvar

Paper Title:

 MATLAB Simulation of Impact of Different Vehicle Parameters on Electric Vehicle Range

Abstract: India has been a late market for automobiles; passenger cars were a luxury for the general Indian population until the last two decades. This has caused a rapid increase in the number of automobiles in India is the rise in the amount of pollutants and other harmful gases and the continuous and ever going quest to obtain the fossil fuels required to fulfil the need for the people and their automobiles.  This paper mainly deals with the range simulation using MATLAB which is required for the retrofitting of normal vehicles to reduce their carbon footprint and fossil fuel consumption to hybrid or purely electrical vehicles which would be affordable and familiar in use to an average person and how different parameters can cause a variation in range of the electric vehicle. This paper deals how parameters like battery type, rolling resistance, drag coefficient, frontal area etc. affect the overall driving range of an electric vehicle.

 Index Terms: Range simulation, Weight of vehicle, Frontal area, power consumption, Transmission efficiency, rolling resistance.

REFERENCES

  1. James Larminie and John Lowry (2003) ‘Electric Vehicle Technology Explained‘ 213-239
  2. Stephanie Diaz (2012) ‘Protodrive: Simulation of electric vehicle Powertrains’ NSF Summer Undergraduate Fellowship in Sensor Technologies, pp. 7-16
  3. David McDonald, (2012) ‘Electric Vehicle Drive Simulation with MATLAB/Simulink’, LSSU Sault Ste Marie, pp. 2-15
  4. A. T. Mohd, M. K. Hassan, Ishak Aris, A. Che Soh, B. S. K. K. Ibrahim, and M. K. Hat, (2006), ‘Simulation Based Study Of Electric Vehicle Parameters’ ARPN Journal of Engineering and Applied Sciences, pp. 1-4
  5. TAT Mohd, MK Hassan, W Aziz, (2014), ‘Mathematical Modelling And Simulation Of Electric Vehicle Using Matlab-Simulink’, International Conference on Automotive Innovation and Green Energy Vehicle (AiGEV 2014), pp. 2-5
  6. David Wenzhong Gao, Chris Mi, and Ali Emadi, (2007), ‘Modeling and Simulation of Electric and Hybrid Vehicles’, Proceedings of the IEEE, pp.2-7
  7. Erik Schaltz, (2011),’Electrical Vehicle Design and Modeling’, Aalborg University, pp. 2-15
  8. Jaber, A. Fakhfakh and R. Neji, (2011),’Modeling and Simulation of High Performance Electrical Vehicle Powertrains in VHDL-AMS’, National School of Engineers, pp 2-7
  9. Wawrzyniec Gołębiewski and Tomasz Stoeck, (2016),’ Theoretical Evaluation of Relationships between Tire Energy Efficiency Class and Fuel Consumption of a Passenger Car According to NEDC’, Department of Automotive Engineering, West Pomeranian University of Technology, pp.4,5
  10. Saeid Haghbin, Ali Rabiei and Emma Grunditz, (2013), ‘Switched reluctance motor in electric or hybrid vehicle applications’ Industrial Electronics and Applications (ICIEA), 2013 8th IEEE Conference

28-35

http://blueeyesintelligence.org/2checkout_download.html

8.

Authors:

 B. G. Chhapkhanewala, S. L. Vaikole

Paper Title:

 Automated Fabric Fault Detection System

Abstract: An effective defect detection scheme for textile fabrics is designed in this paper. Interestingly, this approach is particularly useful for patterned fabric. In the proposed method, firstly, Local Derivative Pattern(LDP) is adjusted to match with the texture information of non-defective fabric image via genetic algorithm. Secondly, adjusted optimal Gabor filter is used for detecting defects on defective fabric images and defective fabric images to be detected have the same texture background with corresponding defect-free fabric images. The novel high-order local pattern descriptor, local derivative pattern (LDP), for face recognition. LDP is to encode directional pattern features based on local derivative variations. The (n)th-order LDP is proposed to encode the (n-1)th-order local derivative direction variations, which can be more detailed information than the first-order local pattern used in local binary pattern (LBP). The significance of the proposed approach lies in selecting Gabor filter parameters with an abundance of choices to build the optimal Gabor filter and achieving accurate defect detection on patterned fabric. High success rate and accuracy with little computational time online are obtained in the defect detection on fabrics, which indicate that the suggested method can be put to use in practice.

Index Terms: Fabric Fault Detection, Local Derivative Pattern (LDP), Gabour Filter, Loacl Binary Pattern(LBP).

REFERENCES

  1. Junfeng Jing, Xiaoting Fan, and Pengfei Li, “Automated Fabric Defect Detection Based on Multiple Gabor Filters and KPCA,” International Journal of Multimedia and Ubiquitous Engineering, Vol. 11, No.6 pp. 93-106, 2016.
  2. Junfeng Jing, Panpan Yang, Pengfei Li and Xuejuan Kang, “Supervised defect detection on textile fabrics via optimal Gabor lter,” International Journal of Industrial Textiles, Vol. 44(1), pp. 4057, 2014.
  3. Ben Salem, S. Nasri, “Woven Fabric Defects Detection based on Texture classification Algorithm,” 8th International Multi-Conference on Sysxtems, Signals & Devices, 2011.
  4. Shobarani, Dr. S. Purushothaman, “Segmentation of Textile Textures using Contextual Clustering,” International Journal of Computer Applications (0975 8887), Vol. 35 No.5, December 2011.
  5. Xuejuan Kang, Panpan Yang, Junfeng Jingr, “De-fect Detection on Printed Fabrics Via Gabor Filter and Regular Band,” Journal of Fiber Bioengineering and Informatics 8:1, pp. 195206, 2015.
  6. Parul Parashar, Er. Harish Kundra, “Comparison of Various Image Classification Methods,” International Journal of Advances in Science and Technology (IJAST), Vol. 2, Issue I, March 2014.
  7. Baochang Zhang, Yongsheng Gao, “Local Derivative Pattern Versus Local Binary Pattern: Face Recognition With High-Order Local Pattern Descriptor,” IEEE Transactions on Image Processing, Vol. 19, NO. 2, February 2010.
  8. Kazm Hanbay, Muhammed Fatih Talu, Omer Faruk Ozgven, “Fabric defect detection systems and methods: A systematic literature review,” Op-tik 127, Vol. 17, pp. 1196011973, 2016.
  9. Shweta Loonkar, Dhirendra Mishra, “A Survey-Defect Detection and Classification for Fabric Texture Defects in Textile Industry,” (IJCSIS) International Journal of Computer Science and Information Security, Vol. 13, No. 5, May 2015.

36-40

http://blueeyesintelligence.org/2checkout_download.html