Sie sind auf Seite 1von 136

International Journal of Recent

Technology and Engineering


ISSN : 2277 - 3878
Website: www.ijrte.org
Volume-8 Issue-1S4, JUNE 2019
Published by:
Blue Eyes Intelligence Engineering and Sciences Publication

d En g
y an ine
log e
o
rin
hn

g
ent Tec

Ijrte
Rec
EX

N
O
In t
P

TI
of

OR
L

ING VA
INNO l er
na na
nal Jour tio
www.ijrte.org
Exploring Innovation
Editor-In-Chief
Dr. Shiv Kumar
Ph.D. (CSE), M.Tech. (IT, Honors), B.Tech. (IT), Senior Member of IEEE
International Journal of Recent Technology and Engineering (IJRTE)

Associated Editor-In-Chief Chair


Prof. MPS Chawla
Member of IEEE, Professor-Incharge (head)-Library, Associate Professor in Electrical Engineering, G.S. Institute of Technology &
Science Indore, Madhya Pradesh, India, Chairman, IEEE MP Sub-Section, India

Dr. Vinod Kumar Singh


Associate Professor and Head, Department of Electrical Engineering, S.R.Group of Institutions, Jhansi (U.P.), India

Dr. Rachana Dubey


Ph.D.(CSE), MTech(CSE), B.E(CSE)
Professor & Head, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence (LNCTE),
Bhopal (M.P.), India

Associated Editor-In-Chief Members


Dr. Hai Shanker Hota
Ph.D. (CSE), MCA, MSc (Mathematics)
Professor & Head, Department of CS, Bilaspur University, Bilaspur (C.G.), India

Dr. Gamal Abd El-Nasser Ahmed Mohamed Said


Ph.D(CSE), MS(CSE), BSc(EE)
Department of Computer and Information Technology, Port Training Institute, Arab Academy for Science ,Technology and Maritime
Transport, Egypt

Dr. Mayank Singh


PDF (Purs), Ph.D(CSE), ME(Software Engineering), BE(CSE), SMACM, MIEEE, LMCSI, SMIACSIT
Department of Electrical, Electronic and Computer Engineering, School of Engineering, Howard College, University of KwaZulu-
Natal, Durban, South Africa.

Scientific Editors
Prof. (Dr.) Hamid Saremi
Vice Chancellor of Islamic Azad University of Iran, Quchan Branch, Quchan-Iran

Dr. Moinuddin Sarker


Vice President of Research & Development, Head of Science Team, Natural State Research, Inc., 37 Brown House Road (2nd Floor)
Stamford, USA.

Prof. (Dr.) Nishakant Ojha


Principal Advisor (Information &Technology) His Excellency Ambassador Republic of Sudan& Head of Mission in New Delhi, India

Dr. Shanmugha Priya. Pon


Principal, Department of Commerce and Management, St. Joseph College of Management and Finance, Makambako, Tanzania, East
Africa, Tanzania

Dr. Veronica Mc Gowan


Associate Professor, Department of Computer and Business Information Systems,Delaware Valley College, Doylestown, PA, Allman,
China.

Dr. Fadiya Samson Oluwaseun


Assistant Professor, Girne American University, as a Lecturer & International Admission Officer (African Region) Girne, Northern
Cyprus, Turkey.

Dr. Robert Brian Smith


International Development Assistance Consultant, Department of AEC Consultants Pty Ltd, AEC Consultants Pty Ltd, Macquarie
Centre, North Ryde, New South Wales, Australia

Dr. Durgesh Mishra


Professor & Dean (R&D), Acropolis Institute of Technology, Indore (M.P.), India

Executive Editor Chair


Dr. Deepak Garg
Professor & Head, Department Of Computer Science And Engineering, Bennett University, Times Group, Greater Noida (UP), India
Executive Editor Members
Dr. Vahid Nourani
Professor, Faculty of Civil Engineering, University of Tabriz, Iran.

Dr. Saber Mohamed Abd-Allah


Associate Professor, Department of Biochemistry, Shanghai Institute of Biochemistry and Cell Biology, Shanghai, China.

Dr. Xiaoguang Yue


Associate Professor, Department of Computer and Information, Southwest Forestry University, Kunming (Yunnan), China.

Dr. Labib Francis Gergis Rofaiel


Associate Professor, Department of Digital Communications and Electronics, Misr Academy for Engineering and Technology,
Mansoura, Egypt.

Dr. Hugo A.F.A. Santos


ICES, Institute for Computational Engineering and Sciences, The University of Texas, Austin, USA.

Dr. Sunandan Bhunia


Associate Professor & Head, Department of Electronics & Communication Engineering, Haldia Institute of Technology, Haldia
(Bengal), India.

Dr. Awatif Mohammed Ali Elsiddieg


Assistant Professor, Department of Mathematics, Faculty of Science and Humatarian Studies, Elnielain University, Khartoum Sudan,
Saudi Arabia.

Technical Program Committee Chair


Dr. Mohd. Nazri Ismail
Associate Professor, Department of System and Networking, University of Kuala (UniKL), Kuala Lumpur, Malaysia.

Technical Program Committee Members


Dr. Haw Su Cheng
Faculty of Information Technology, Multimedia University (MMU), Jalan Multimedia (Cyberjaya), Malaysia.

Dr. Hasan. A. M Al Dabbas


Chairperson, Vice Dean Faculty of Engineering, Department of Mechanical Engineering, Philadelphia University, Amman, Jordan.

Dr. Gabil Adilov


Professor, Department of Mathematics, Akdeniz University, Konyaaltı/Antalya, Turkey.

Dr.Ch.V. Raghavendran
Professor, Department of Computer Science & Engineering, Ideal College of Arts and Sciences Kakinada (Andhra Pradesh), India.

Dr. Thanhtrung Dang


Associate Professor & Vice-Dean, Department of Vehicle and Energy Engineeering, HCMC University of Technology and Education,
Hochiminh, Vietnam.

Dr. Wilson Udo Udofia


Associate Professor, Department of Technical Education, State College of Education, Afaha Nsit, Akwa Ibom, Nigeria.

Dr. Ch. Ravi Kumar


Dean and Professor, Department of Electronics and Communication Engineering, Prakasam Engineering College, Kandukur (Andhra
Pradesh), India.

Dr. Sanjay Pande MB


FIE Dip. CSE., B.E, CSE., M.Tech.(BMI), Ph.D.,MBA (HR)
Professor, Department of Computer Science and Engineering, G M Institute of Technology, Visvesvaraya Technological University
Belgaum (Karnataka), India.

Manager Chair
Mr. Jitendra Kumar Sen
Blue Eyes Intelligence Engineering & Sciences Publication, Bhopal (M.P.), India

Editorial Chair
Prof. (Dr.) Rahul Malhotra
Director – Principal, Department of Electronics & Communication, Swami Devi Dyal Institute of Engineering and Technology,
Barwala (Haryana), India.
Editorial Members
Dr. Wameedh Riyadh Abdul-Adheem
Academic Lecturer, Almamoon University College/Engineering of Electrical Power Techniques, Baghdad, Iraq

Dr. T. Sheela
Associate Professor, Department of Electronics and Communication Engineering, Vinayaka Mission’s Kirupananda Variyar
Engineering College, Periyaseeragapadi (Tamil Nadu), India

Dr. Manavalan Ilakkuvan


Veteran in Engineering Industry & Academics, Influence & Educator, Tamil University, Thanjavur, India

Dr. Shivanna S.
Associate Professor, Department of Civil Engineering, Sir M.Visvesvaraya Institute of Technology, Bengaluru (Karnataka), India

Dr. H. Ravi Kumar


Associate Professor, Department of Civil Engineering, Sir M.Visvesvaraya Institute of Technology, Bengaluru (Karnataka), India

Dr. Pratik Gite


Assistant Professor, Department of Computer Science and Engineering, Institute of Engineering and Science (IES-IPS), Indore (M.P),
India

Dr. S. Murugan
Professor, Department of Computer Science and Engineering, Alagappa University, Karaikudi (Tamil Nadu), India

Dr. S. Brilly Sangeetha


Associate Professor & Principal, Department of Computer Science and Engineering, IES College of Engineering, Thrissur (Kerala),
India

Dr. P. Malyadri
Professor, ICSSR Senior Fellow Centre for Economic and Social Studies (CESS) Begumpet, Hyderabad (Telangana), India

Dr. K. Prabha
Assistant Professor, Department of English, Kongu Arts and Science College, Coimbatore (Tamil Nadu), India

Dr. Liladhar R. Rewatkar


Assistant Professor, Department of Computer Science, Prerna College of Commerce, Nagpur (Maharashtra), India

Dr. Raja Praveen.N


Assistant Professor, Department of Computer Science and Engineering, Jain University, Bengaluru (Karnataka), India

Dr. Issa Atoum


Assistant Professor, Chairman of Software Engineering, Faculty of Information Technology, The World Islamic Sciences & Education
University, Amman- Jordan

Dr. Balachander K
Assistant Professor, Department of Electrical and Electronics Engineering, Karpagam Academy of Higher Education, Pollachi
(Coimbatore), India

Dr. Sudhan M.B


Associate Professor & HOD, Department of Electronics and Communication Engineering, Vins Christian College of Engineering,
Anna University, (Tamilnadu), India

Dr. T. Velumani
Assistant Professor, Department of Computer Science, Kongu Arts and Science College, Erode (Tamilnadu), India

Dr. Subramanya.G.Bhagwath
Professor and Coordinator, Department of Computer Science & Engineering, Anjuman Institute of Technology & Management
Bhatkal (Karnataka), India

Dr. Mohan P. Thakre


Assistant Professor, Department of Electrical Engineering, K. K. Wagh Institute of Engineering Education & Research Hirabai
Haridas Vidyanagari, Amrutdham, Panchavati, Nashik (Maharashtra), India

Dr. Umar Lawal Aliyu


Lecturer, Department of Management, Texila American University Guyana USA.

Dr. K. Kannan
Professor & Head, Department of IT, Adhiparasakthi College of Engineering, Kalavai, Vellore, (Tamilnadu), India
S.
Volume-8 Issue-1S4, June 2019, ISSN: 2277-3878 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Page No.
No

Authors: Gaurav Bathla, Varinder Singh Rana, Amrik Singh, Kusum


Assessing the Skills Required by Hospitality Management Graduates from the Viewpoints of Educators in
Paper Title:
Punjab
Abstract: This study evaluated the important skills required by hospitality management graduates of Punjab from the
viewpoints of educators. Questionnaire as the main tool was used to gather the data from the hospitality educators of
Punjab which are included in the study population, first Part of the questionnaire targeted to collect the information
relates to the demographic profile of respondents and the statements in the second part contains statements based on 4-
point Likert scale stretching from 1 -Not Important to 4 - very important to rate the importance of each skill by the
educators. Results of the study divides sixteen skills into three new domains as Efficiency & Leadership, Computational
& Management, and Self-Development & Applied. Further it is also recommended to benchmark hospitality management
curricula with the top rated universities of the world in order to produce more employable graduates and hospitality
teaching should be more practical oriented to inculcate skills among students.

Keywords: hospitality management curricula, skills, benchmark, hospitality educators, efficiency & leadership,
computational & management, self-development & applied

References:
1. Agut, S., Grau, R., & Peiró, J. M. (2003). Competency needs among managers from Spanish hotel and restaurants and their training demands.
1. International Journal of Hospitality Management, 22(3), 281-295.
2. Connolly, P., & McGing, G. (2006). Graduate education and hospitality management in Ireland. International Journal of Contemporary Hospitality 1-4
Management, 18(1), 50-59.
3. Huang, Y. L., & Lin, C. T. (2010). Management trainee core competencies in the hospitality industry: Differences between managers and scholars.
Journal of Human Resources in Hospitality & Tourism, 10(1), 1-13.
4. HVS Global Hospitality Services. (2011). Hotel room supply, capital investment and manpower requirement by 2021 India. Retrieved from
http://rss.hsyndicate.com/file/152004848.pdf
5. HVS Global Hospitality Services. (2012). Indian hotel industry survey, 2010-2011. Retrieved from http://www.hvs.com/Content/3216.pdf
6. Ineson, E. M., & Alexieva, R. (2011). Success in hotel management: Implications for M-level course design in Bulgaria. Journal of Hospitality,
Leisure, Sport and Tourism Education, 10(2), 30-49.
7. Jauhari, V. (2006). Competencies for a career in the hospitality industry: An Indian perspective. International Journal of Contemporary Hospitality
Management, 18(2), 123-134.
8. Johanson, M., Ghiselli, R., Shea, L. J., & Roberts, C. (2011). Changing competencies of hospitality leaders: A 25-year review. Journal of
Hospitality & Tourism Education, 23(3), 43-47.
9. Li-Ting (Grace) Yang PhD, Charles G. Partlow PhD, Jaisree Anand PhD & Vimal Shukla MS (2014) Assessing the Competencies Needed by
Hospitality Management Graduates in India, Journal of Hospitality & Tourism Education, 26:4, 153-165, DOI: 10.1080/10963758.2014.959963
10. Partlow, C. G., & Simon, K. V. (2009, October). Challenges and recommendations for redefining hospitality education in India. Paper presented at
the Euro CHRIE Conference, Helsinki, Finland.
11. Sarkodie, N. . & K. (2015). Bridging the Gap between Hospitality/Tourism Education and Hospitality/Tourism Industry in Ghana. International
Journal of Research in Humanities and Social Studies, 2(7), 114-120. Retrieved from http://www.ijrhss.org/pdf/v2-i7/13.pdf
12. Tesone, D.V., & Ricci, P. (2006). Toward a definition of entry-level job competencies: Hospitality manager perspectives. International Journal of
Hospitality and Tourism Administration, 7(4), 71-86.
Authors: Vu Thi Lan, Gao Lei Fu, Sobia Naseem, Muhammad Mohsin
Paper Title: An Empirical Analysis between Macroeconomic Variables and Gold Prices
Abstract: This study based on the relationship between a specific set of macroeconomic variables (stock market, crude
oil & exchange rate) and gold prices. This study contains 18 years secondary data (annually) from 2001 to 2018.
Regression equation implemented to check the relationship of the gold price return with particular set of macroeconomic
variables and correlation matrix, Breusch-Godfrey serial correlation and heteroskedasticity test utilize to check the
accuracy as well as normality of series data. This research concluded that gold price return with crude oil prices positively
as well as with KSE-100 index negatively significant at 1% & 10% level respectively. The gold prices and exchange rate
negative but insignificantly related to each other. This study will important and valuable for policy makers, investors and
researchers.

Keywords: Gold prices, Crude oil, Stock Returns and Exchange rate.

References:
2. 1. B.Ahmet. (2010). The Effects of Macroeconomics Variables on Stock Returns: Evidence from Turkey . European Journal of Social Sciences, 14(3),
pp.404-415.
2. Choong, P. K. (2012). Determinants of Gold Price: Using Simple and Multiple Linear Regression . Universiti Tunku Abdul Rahman, 1-99. 5-9
3. Choudhri, E. U. (2002). The exchange rate and consumer prices in Pakistan: Is rupee devaluation inflationary? . Pakistan Development Review,
41(2), 107-120.
4. Dooley, M. I. (1995). Exchange Rates, Country-Specific Shocks and Gold . Applied Financial Economics, 5, 121-129.
5. Diewert W. E. (1999). "The consumer price index and index number purpose", Journal of Economic and Social Measurement, available online at:
http://www.unece.org/ fileadmin/DAM/stats/documents/ces/ac.49/1999/crp.1.e.pdf.
6. Dubey P., Geanakoplos J. and Shubik M. (2003). "Is gold an efficient store of value", Economic Theory, Vol. 21, No. 4, pp. 767-782.
7. Fortune, J. (1987). The Inflation Rate of the Price of Gold, Expected Prices and Interest Rates. Journal of Macroeconomics , 9, 71-82.
8. Gillingham R. (1974). "A conceptual framework for the revised consumer price index", available online at:
http://www.bls.gov/opub/hom/pdf/homch17.pdf.
9. Harmston S. (1998). "Gold as a store of value", World Gold Council, available online at: http://www.gold.org/ investment/research/
10. Haque, N. &. (2006). Inflation everywhere is a monetary phenomenon: An introductory note. . Pakistan Development Review, 45(2), 179-183.
11. Hashim, S. L., Ramlan, H., Razali, N. A., & Nordin, N. M. (2017). MACROECONOMIC VARIABLES AFFECTING THE VOLATILITY OF
GOLD PRICE . Journal of Global Business and Social Entrepreneurship (GBSE) , 97-106 .
12. Hyder, Z. &. (2004). Exchange rate pass-through to domestic prices in Pakistan (Working Paper No. 5). Karachi, Pakistan: State Bank of Pakistan.
13. Jeffe J. F. (1989). "Gold and gold stocks as investments for institutional portfolios", Financial Analysts Journal, Vol. 45, No. 2, pp. 53-59
14. Kemal, M. A. (2006). Is inflation in Pakistan a monetary phenomenon? Pakistan Development Review, 45(2), 213-220.
15. Khalid, A. M. (2005). Economic growth, inflation, and monetary policy in Pakistan: Preliminary empirical estimates . Pakistan Development
Review , 44(4), 961-974.
16. Khan, H. u. ( October 2015 ). The Impact of Oil and Gold Prices on the GDP Growth: Empirical Evidence from a Developing Country.
International Journal of Management Science and Business Administration, pp. 34-46.
17. Khan, M. &. (2010). Threshold effects in the relationship between inflation and growth. Asian Pacific Development Journal, 32(4), 130-182.
18. Khan, M. S. (2006). Inflation in Pakistan: Money or wheat? (Working Paper No. 06/60). . Washington, DC: International Monetary Fund.
19. Le, T. H. (2011). Oil and Gold: Correlation or Causation? . Depocen Working Paper Series No. 2011 (22).
20. Nadeem, W., Zakaria, M., & Kayani, F. N. (2014). Impact of Macroeconomic Factors upon Gold Prices in Pakistan . Pakistan Journal of Social
Sciences (PJSS) , 383-395.
21. Ouma , W. N., & Muriu , P. (July 2014). THE IMPACT OF MACROECONOMIC VARIABLES ON STOCK MARKET RETURNS IN KENYA.
International Journal of Business and Commerce , Vol. 3, No.11, 01-31.
22. Pervaiz, J., Masih, J., & Jian-Zhou, T. (2018). Impact of Macroeconomic Variables on Karachi Stock Market Returns. International Journal of
Economics and Finance, Vol. 10, No. 2, pp-28-34.
23. Pollak R. A. (1980). "Group cost of living indixes", American Economic Review, Vol. 70, No. 2, pp. 273-278
24. Ranson D. (2005a). "Inflation protection: Why gold works better than other linkers", World Gold Council, available online at:
http://www.gold.org/download/rs_archive/ inflation_linkers.pdf.
25. Ranson D. (2005b). "Why gold, not oil, is the superior predictor of inflation", World Gold Council, available online at:
http://www.gold.org/download/rs_archive/gold_not_oil_ inflation.pdf.
26. Saidi N. and Scacciavillani F. (2010). "The case for gold as a reserve asset: Gold, the GCC and the Khaliji", World Gold Council, available online
at: http://www.gold.org
27. Samanta, S. &. (2012). Co-Movements of Oil, Gold, the US Dollar, and Stocks. Modern Economy, 3, 111-117.
28. Sharpe W. F. (1964). "Capital asset prices: A theory of market equilibrium under conditions of risk", Journal of Finance, Vol. 19, No. 3, pp. 425-
442
29. Shafana , M. (2012). Macroeconomic Variables Effect on Financial Sector Performance in Emerging Sri Lankan Stock Market . International
Journal of Science and Research (IJSR), 227-231.
30. Sherman, E. (1983). A Gold Pricing Model. Journal of Portfolio Management , 9, 68-70.
31. Sjaastad, L. (2004). "The Price of Gold and the Exchange Rates: Once Again", . Economic Research Centre of the University of Western Australia,
, 1-14.
32. Sukri, M. K., Zain, N. H., & Abidin , N. S. (2015). THE RELATIONSHIP BETWEEN SELECTED MACROECONOMIC FACTORS AND
GOLD PRICE IN MALAYSIA. International Journal of Business, Economics and Law, 88-96.
33. Tufail , S., & Batool, S. (18 : 2 (Winter 2013)). An Analysis of the Relationship between Inflation and Gold Prices: Evidence from Pakistan. The
Lahore Journal of Economics, pp. 1-35.
34. Wang, K. a. (2011). "The Yen for Gold" . Resources Policy, 36 (1): 39-48 .
35. Zakaria, H. A. (2015). Factors Affecting the Price of Gold in Malaysia. Journal of Basic and Applied Scientific Research, 41-46.
Authors: Jaydip Kumar
Paper Title: Cloud Computing Security Issues and Its Challenges: A Comprehensive Research
Abstract: Cloud computing is used by many of the organizations for storing the huge amount of data on the clouds.
Therefore, there is need to secure the data which may in the form of text, audio, video, etc. There are numerous
algorithms designed by the researchers for securing the data on the cloud. The present paper by Jaydip Kumar is an
attempt to elaborate some of the important algorithms for the security of data for this purpose, exhaustive literature has
been conducted.

Index Terms: Cloud Security, Genetic Algorithm, Data Encryption, Intrusion Detection System, Security Techniques.

References:
1. R. Choubey, R. Dubey, and J. Bhattacharjee, "A survey on cloud computing security, challenges and threats," Int. J. Comput. Sci. Eng., vol. 3, no.
3, pp. 1227-1231, 2011.
2. R. P. Padhy, M. R. Patra, and S. C. Satapathy, "X-as-a-Service: Cloud Computing with Google App Engine, Amazon Web Services, Microsoft
Azure and Force.com," Int. J. Comput. Sci. Telecommun., vol. 2, no. 9, pp. 8-16, 2011.
3. G.K. Ravikumar "Design of Data Masking Architecture and Analysis of Data Masking Techniques for Testing", International journal of
engineering science and Technology, vol. 3, no. 6, pp. 5150-5159, 2011.
4. A. Behl , K. Behl, "An Analysis of Cloud Computing security issues," 2012 World Congr. Inf. Commun. Technol., pp. 109-114, 2012.
5. D Chopra, D Khurana, K Govinda, "CLOUD COMPUTING SECURITY CHALLENGES AND SOLUTION," International Journal of Advances in
Engineering Research, vol. 3, no. 2, 2012.
6. G. R. Vijay, "An Efficient Security Model in Cloud Computing based on Soft computing Techniques," vol. 60, no. 14, pp. 18-23, 2012.
7. H. Tsai, N. Chiao, R. Steinmetz, and T. U. Darmstadt, "Threat as a Service?: Virtualization's Impact on Cloud Security," no. February, pp. 32-37,
3. 2012.
8. K. Kumar, V. Rao, S. Rao, and G.S. Rao, "Cloud Computing?: An Analysis of Its Challenges & Security Issues," IJCSN,vol. 1, no. 5, 2012.
9. K. D. Kadam, S. K. Gajre, and R. L. Paikrao, "Security Issues in Cloud Computing," Proceedings published by International Journal of Computer 10-14
Applications,pp. 22-26, 2012.
10. M. Shrawankar, A. Kr. Shrivastava "Comparative Study of Security Mechanisms in Multi- cloud Environment," vol. 77, no. 6, pp. 9-13, 2013.
11. N. Aggarwal, P. Tyagi, B. P. Dubey, and E. S. Pilli, "Cloud Computing?: Data Storage Security Analysis and its Challenges," vol. 70, no. 24, pp.
33-37, 2013.
12. P. Aggarwal, M. M. Chaturvedi, "Application of Data Mining Techniques for Information Security in a Cloud: A Survey," Int. J. Comput. Appl.,
vol. 80, no. 13, pp. 11-17, 2013.
13. A. Botta, W. De Donato, V. Persico, and A. Pescape, "On the integration of cloud computing and internet of things," Proc. - 2014 Int. Conf. Futur.
Internet Things Cloud, FiCloud 2014, pp. 23-30, 2014.
14. D. Panth, D. Mehta, R. Shelgaonkar "A Survey on Security Mechanisms of Leading Cloud Service Providers," Int. J. Comput. Appl. , vol. 98, no. 1,
pp. 24-34, 2014.
15. D. Porwal, P. Mohmood Khan and D. Shankar Ray, "Cloud Computing Security Threats and Countermeasures", International journal for
innovations in Engineering Science and Management, vol. 2, no. 4, pp. 1-4, 2014.
16. D. Parwani, A. Dutta, P. Kumar Shulka, and M. Tahilyani, "Various Techniques of DDoS Attacks Detection and Prevention at Cloud: A Survey,"
Orient. J. Comput. Sci. Technol., vol. 8, no. 2, pp. 110-120, 2015.
17. G. Al, "Cloud Computing Architecture and Forensic Investigation Challenges," Int. J. Comput. Appl., vol. 124, no. 7, pp. 20-25, 2015.
18. M. U. Shankarwar and A. V. Pawar, "Security and Privacy in Cloud Computing: A Survey," Adv. Intell. Syst. Comput., vol. 328, pp. 1-11, 2015.
19. A. F. A. Rahman, M. Daud, and M. Z. Mohamad, "Securing Sensor to Cloud Ecosystem using Internet of Things (IoT) Security Framework," Proc.
Int. Conf. Internet things Cloud Comput. - ICC '16, pp. 1-5, 2016.
20. B. Pathankot, "Review Paper on Enhancing Data Security for Cloud Environment Cryptography and Steganography," International Journal of
Engineering Applied Sciences and Technology, vol. 2, no. 1, pp. 44-48, 2016.
21. D. H. Sharma, C. A. Dhote, and M. M. Potey, "Intelligent Transparent Encryption-Decryption as Security-as-a-Service from clouds," 2016 Int.
Conf. Comput. Syst. Inf. Technol. Sustain. Solut. CSITSS 2016, pp. 359-362, 2016.
22. B. Mahesh, "Data Security and security controls in cloud computing", International journal of advances in Electronics and Computer Sciecne, pp.
11-13, 2016.
23. T. Singh, S. Verma, V. Kulshrestha and S. Katiyar, "intrusion Detection System Using Genetic Algorithm for Cloud", International journal of
Advances in Electronics and Computer Science, pp. 1-6, 2016
24. S. Sharma, "Data Integrity Challenges in Cloud Computing", 4th international conference on recent innovations in science engineering and
management, pp. 736-7436, 2016.
25. G. L. Masala, P Ruiu, E Grosso, "Biometric Authentication and Data Security in Cloud Computing," Comput. Netw. Secur. Essentials, pp. 337-353,
2017.
26. K. Subramanian and F. L. John, "Secure and Reliable Unstructured Data Sharing in Multi-Cloud Storage using the Hybrid Crypto System,"
IJCSNS, vol. 17, no. 6, pp. 196-206, 2017.
27. A. Hussain, C. Xu, and M. Ali, "Security of Cloud Storage System using Various Cryptographic Techniques," International Journal of Mathematics
Trends and Technology ( IJMTT ), vol. 60, no. 1, pp. 45-51, 2018.
28. A. Venkatesh and M. S. Eastaff, "A Study of Data Storage Security Issues in Cloud Computing," IJSRCSEIT, vol. 3, no. 1, pp. 1741-1745, 2018.
29. G. Jain and A. Jaiswal, "Security Issues and their Solution in Cloud Computing", Concepts journal of applied research(CJAR), vol. 02,no. 03, pp. 1-
6, 2018.
30. Y. Guo and B.Wang et.al., "Feature Selection Based on Rough Set and Modified Genetic Algorithm for intrusion Detection" , The 5th International
conference on Computer science & Education Hefei, China, pp. 1441-1446, 2018.
31. Data clustering algorithms[online] https://sites.google.com/site/dataclusteringalgorithms/k-means-clustering-algorithm (Accessed 08 March 2019).
32. CloudCodes [online] https://www.cloudcodes.com/blog/ data-protection-controls-techniques.html (Accessed 20 December 2019).
33. DIGITAL GUARDIAN [online] https://digitalguardian.com/blog/what-cloud-encryption (Accessed 25 December 2019).
Authors: Pallavi Mathur, S. S. Bhakar
Paper Title: Psychological antecedents and impulsive buying in online shopping
Abstract: Impulse buying or also called unplanned purchase is the behavior of the person in which the person is not
planning something in shopping. Consumers who do impulse buying do not think to buy a particular brand or product.
Online shopping or online retailing is a form of electronic commerce allowing consumers to directly buy goods or
services from a seller over the Internet without an intermediary service. The main objective of this study is to determine
the relationship between website design, promotional approaches, and usage of credit and debit cards to do impulse
buying while shopping online. Non probability technique was used to select the sample. The study was causal and effect
in nature with survey method used as a tool for data collection.The overall sample size for the current study was 200
respondents.This study provides insights for customer impulse buying behavior in online shopping. The result of study
shows there is positive relation between psychological antecedents and impulse buying.

Keywords: Impulse Buying, Online Shopping, Psychological Antecedents, Website Usage.

4. References:
1. Chen-Yu, J.H. &Seock, Y.-K. (2002). Adolescents' clothing purchase motivations, information sources, and store selection criteria: A comparison
of male/female and impulse//non impulse shoppers. Family and Consumer Sciences Research Journal. Vol. 31. No. 1, 50-77. 15-18
2. Dawson, S., & M. Kim (2009). External and internal trigger cues of impulse buying online. Direct Marketing: An International Journal, Vol. 3(1),
20-34.
3. Dharmesti and Nugroho (2012). The Antecedents of Online Customer Satisfaction and Customer Loyalty. International Trade & Academic
Research Conference (ITARC), 7 - 8th November, London.UK.
4. Dittmar, H. & Drury, J. (2000). Self-image - is it in the bag? A qualitative comparison between "ordinary" and "excessive" consumers. Journal of
Economic Psychology. Vol. 21, No. 2, 109-142.
5. G. Muruganantham1 & Ravi Shankar Bhakat (2013). A Review of Impulse Buying Behavior. International Journal of Marketing Studies; Vol. 5,
No. 3, PP. 149-160.
6. Huang, L. Y., & Hsieh, Y. J. (2011). What drives consumer impulse buying? Evidence from a retail setting in Taiwan. Journal of International
Management Studies, 6(1), 1-8.
7. J. Kim and J. Park (2005). A consumer shopping channel extension model: Attitude shift toward the online store. Journal of Fashion Marketing and
Management, 19(1), p106-121.
8. Liu, X.; He, M.; Gao, F.; & P. Xie (2008). An empirical study of online shopping customer satisfaction in China: a holistic perspective.
International Journal of Retail & Distribution Management, Vol. 35(11), 919-940.
9. Tirmizi, M. A., Rehman, K. U., &Saif, M. I. (2009). An empirical study of consumer impulse buying behavior in local markets. European Journal
of Scientific Research, 28(4), 522-532.
10. Youn, S., & Faber, R. J. (2000). Impulse buying: its relation to personality traits and cues. ACR North American Advances, 27, 179-185
Authors: Khan Mubeen Ahmed, Bandhu Kailash Chandra
Paper Title: Analysis of WiMAX Networks with Bandwidth Allocation Algorithms (Round Robin and Strict Priority)
Abstract: IEEE 802.16 is today playing a promising and challenging role in wireless network and thus it is considered
to be a substitute solution to agitated technologies. Availability of network in all the way is an important challenge for
WiMAX networks. Lesser availability of network in rural, hilly, lakes and sea shores is a major issue today. Various
algorithms in wireless networks are available for allocation of data and services today. This paper focuses on evaluating
the performance of WiMAX networks with increasing number of nodes and distances. This paper proposes two important
algorithms Round Robin for Relay and Strict Priority in WiMAX Networks. By analyzing it in WiMAX networks, in
terms of throughput and Goodput, could play a supportive role for industries and researcher for implementing it in real
scenarios. Implementing these algorithms in WiMAX networks at base stations could be efficient for sustaining
maximum number of users in terms of data usage and calls.
5.
Index Terms: 802.16, Light WiMAX Simulator (LWX), Broadband Wireless Access (BWA), Round Robin (RR), Strict 19-22
Priority (SP)

References:
1. ns2, http://www.isi.edu/nsnam/ns/
2. The WiMAX Handbook by Taylor and Francis Groupp127.www.taylor and francis.com IEEE 802.16 Working Group, "DRAFT Standard for Local
and Metropolitan Area Networks Para 16: Air Interface for Broadband Wireless access Systems"IEEE P802.16Rev2/D1.Oct.2007
3. IEEE 802.16-2004, IEEE standard for local and Metropolitan area networks Part 16: Air interface for Broadband wireless Access
Systems,http://standards.ieee.org/getieee.802/download/802-2004.pdf,October 1, 2004
4. Weighted round robin CPU Scheduling algorithm.pdf
5. William Stallings, PhD. "Operating Systems / Internal and Design Principals" ,pages 75-76, 406-408,Prantice Hall, 2001
6. Silbershatz, Galvin, and Gagane, "Operating System Concepts" ,pages 157-166, John Wiley and Sons, Inc.,2002
7. Harry Katzan, Jr., "Operating Systems / A Pragmatic Approach", pages 113,157,350-353, Van Nostrand Reinhold Company, 1973.
8. "Multiuser Communications, in IEEE conference on communications", vol. 1 p.331, IEEE Washington, DC 1995
9. A. Sayenko, O. Alanen, and T. Hamalainen, "Scheduling solution for the IEEE 802.16 base station," Int. J. Comp. and Telecommun. Netw., vol. 52,
pp. 96 -115, Jan. 2008.
10. Pandey M, Litoriya R and Pandey P (2018) An ISM approach for modeling the issues and factors of mobile app development. International Journal
of Software Engineering and Knowledge Engineering 28 (7): 937-953
11. Pandey, M., Litoriya, R., Pandey, P.: Perception-Based Classification of Mobile Apps: A Critical Review. In: Smart Computational Strategies:
Theoretical and Practical Aspects. Springer, Singapore (2019)121-133.https://doi.org/10.1007/978-981-13-6295-8_11

Authors: Mriganka Sekhar Mukhopadhyay, Vijay K. Dwivedi, Sudit S. Mukhopadhyay, Soumya Bhattacharyya
Identification of Dominant Role of Bacillus sp. in Potential Aerobic Biological Treatment of Bulk Drug
Paper Title:
Industrial Effluent
Abstract: A year-long study has been carried out on aerobic biological treatment of bulk drug industrial effluent which
is highly acidic in nature and shows high value of BOD5 (≈ 36000 mg/l), COD (≈ 84000 mg/l), and volatile solids (≈ 1,
70,000 mg/l). Chemical treatment conducted for neutralizing the pH followed by biological treatment using a lab-scale
reactor with acclimatized bacterial consortia isolated from natural soil has confirmed its biological treatability. About
99% removal of COD from starting value of around 8000 mg/l has been achieved. The COD value in different hydraulic
retention time (HRT) has been brought down to less than 100 mg/l in treated effluent, showing high removal of dissolved
organics by aerobic biological treatment. The biochemical and genetic analysis has confirmed the Bacillus sp. playing an
omnipotent role in treating the chemically treated and diluted bulk drug industrial effluent and in bringing down the COD
value to a level which conform the effluent standard for discharge to surface water.

Keywords: Keywords: Bulk Drug Effluent, Aerobic Biological Treatment, COD, Bio-kinetic Constants, Bacillus Sp.

References:
1. L. D. Benefield; C.W. Randall; "Activated Sludge And Its Process Modification. Biological Process Design For Wastewater Treatment"; 1980;
Eagle-wood Cliffs, New Jersey, USA: Environmental Series; Prentice-Hall.
2. F. A. El-Gohary; S. I. Abou-Elela; H. I. Aly; "Evaluation of Biological Technologies For Wastewater Treatment In The Pharmaceutical Industry"
1995; Water Science & Technology, Volume 32; 13-20.
3. E. J. Feil; E. C. Holmes; D. E. Bessen; N. P. J. Man-Suen-Chan; M. C. Dayi Enright; R. Goldstein; D. W. Hood; A. Kaliai; C. E. Moore; J. Zhou
and B. G. Spratt, "Recombination Within Natural Populations of Pathogenic Bacteria: Short-Term Empirical Estimates And Long-Term
Phylogenetic Consequences"; 2001; Proceedings of the National Academy of Sciences of the United States of America; Volume 98; No. 1; 182-
187.
4. Dos Freitas; L. M. Santos; Lo G Biundo; "Treatment of Pharmaceutical Industry Process Wastewater Using The Extractive Membrane Bioreactor"
http://www3.interscience. wiley.com
5. Masters M. Gilbert; "Introduction To Environmental Engineering And Scince"; 2004; Second Edition; Prentice-Hall of India Private Limited; New
Delhi-110001.
6. J. D. Gillece; J. M. Schupp; S. A. Balajee; J. Harris; T. Pearson; Y. Yan; P. Keim; E. DeBess; N. Marsden-Haug; R. Wohrle; D. M. Engelthaler; S.
R. Lockhart; "Whole Genome Sequence Analysis of Cryptococcus gattii from the Pacific Northwest Reveals Unexpected Diversity" 2011;
journals.plos.org/ plosone/article/journal.pone. 0028550; Volume 6; Issue 12.
7. N. F. Gray; "Wastewater treatment biological. Encyclopedia of environmental biology"; 1995; volume 3; London; Academic Press.
8. A. Hamza; "Evaluation of Treatability of the Pharmaceutical Wastewater by Biological Methods, Current Practices in Environmental Engineering";
6. 1984.
9. E. Jeremy Koenig; Ayme Spor; Nicholas Scalfone; D. Ashwana Fricker; Jesse Stombaugh; Rob Knight; T. Largus Angenent; E. Ruth Ley and R.
Todd Klaenhammer; "Succession of Microbial Consortia In The Developing Infant Gut Microbiome"; 2011; Proceedings of the National Academy
23-29
of Sciences of the United States of America; Volume 108; Supplement 1: Microbes and Health; 4578-4585.
10. I. Kabdasli; M. Gurel; O. Tunay; "Pollution Prevention And Waste Treatment In Chemical Synthesis Processes For Pharmaceutical Industry" 1999;
Water Science and Technology; Volume 39; Number 10; 265-271(7).
11. I.B. Kasapgil; A. Selcuk; O. Ince; "Effect of Chemical Synthesis Based Pharmaceutical Wastewater on Performance, Acetoclastic Methanogenic
Activity And Microbial Population In An Up Flow Anaerobic Filter"; 2002; Journal of Chem. Technol. Biotechnol.; Volume 77; 711-719.
12. S. P. Mayabhate; S. K. Gupta; and S. G. Joshi; "Biological Treatment of Pharmaceutical Wastewater" 1988; Water, Air, and Soil Pollution; Kluwer
Academic Publishers; Volume 38; 189-197.
13. D. D. Medici; L. Croci; E. Delibato; S. D. Pasquale; E. Filetici; L.Toti; "Evaluation of DNA Extraction Methods for Use in Combination with
SYBR Green I Real-Time PCR To Detect Salmonella enterica Serotype Enteritidis in Poultry"; 2003; Applied and Environmental Microbiology;
Vol-69, No. -6, 3456 - 3461.
14. Metcalf and Eddy. "Wastewater Engineering".1995; Third Edition; New Delhi: Tata McGraw-Hill.
15. Gangagni A Rao; Venkata G Naidu; Krishna Prasad; Chandrasekhar N. K. Rao; "Anaerobic Treatment of Wastewater with High Suspended Solids
from a Bulk Drug Industry Using Fixed Film Reactor (AFFR)"; 2005; Bioresource Technology; Volume 96; 87-93.
16. M. Rebhun; N. Galil; N. Narkins; "Kinetic Studies of Chemical and Biological Studies Treatment For Renovation"; 1985; Journal of Water
Pollution and Control Federation; Volume 57; 324-31
17. Raj Suman; D. Samuel; Y. Anjaneyulu; "Evaluation of Biokinetic Parameters for Pharmaceutical Wastewaters Using Aerobic Oxidation Integrated
with Chemical Treatment" 2005; Journal of Process Biochemistry; Volume 40, 165-175.
18. M. C. Sharma; A. K. Chaturvedi; "Simulation of biological treatment of effluents by activated sludge process at laboratory bench scale"; 1995;
Indian Journal of Environ Protection; Volume 10(2); 10-14.
19. P. A. Sincero; C. A. Sincero; "Environmental Engineering - A Design Approach"; 1996; Prentice-Hall India.
20. B. Slabbinck; W. Waegeman; P. Dawyndt; P. De Vos; B. De Baets; "From Learning Taxonomies To Phylogenetic Learning: Integration of 16S
rRNA Gene Data Into FAME-Based Bacterial Classification"; 2010; BMC Bioinformatics; 11:69.
21. "Standard Methods for the Examination of Water and Wastewater"; 1975; 21st edition; APHA; Washington; D.C.
22. T. Sundararaj; S. Anthoniraj; N. Kannan; S. M. Muthukaruppan; "Microbiology"; 2004; Tamil Nadu Text Book Corporation, College Road,
Chennai-600 006; First Edition.
23. "THE ENVIRONMENT (PROTECTION) RULES, 1986" [The Principal rules were published in the Gazette of India vide number S.O. 844(E),
dated 19.11.1986]
24. R. Vaidyanathan; "Treatability of Predigested Distillery Wastewater Diluted With Domestic Sewage". 1995; Indian Journal of Environment
Protection; Volume 15(4); 241-243.
25. P. R. Vasicek; "Use of kinetic study to optimize the activated sludge process";1982; Journal of Water Pollution and Control Federation; Volume 54;
1176-1184.
26. Jakoby B. William And Bhat J. V.; "Microbial Metabolism of Oxalic Acid", 1958; www.ncbi.nlm.nih.gov/Journal List/ Bacteriol Rev; Volume
22(2).
27. Yalcin Askin Oktem, Orhan Ince, Paul Sallis, Tom Donnelly, Bahar Kasapgil Ince "Anaerobic Treatment of a Chemical Synthesis-Based
Pharmaceutical Wastewater in a Hybrid Upflow Anaerobic Sludge Blanket Reactor" 2007; Bioresource Technology; Volume 99; 1089-1096.

7. Authors: Nehal Ahmad, Saif Said, Naved Ahsan


Paper Title: Land Use Change Detection of Yamuna River Flood Plain Using Geospatial Technique
Abstract: The present study intends to quantify the changes and transformations in features classes of Yamuna River
Flood Plain in Delhi. ERDAS imagine 9.2 and Terrset geospatial software were used for image processing and
quantitative assessment, transformation, gain and loss, contribution o net change and spatial trend analysis. The Landsat 8
(2018), TM (2000) and MSS (1989) images were acquired for assessing LULC change detection using Maximum
Likelihood Classifier. LULC classification was achieved with kappa coefficient and overall accuracy for Satellite images
of MSS (1989), TM (2000) and Landsat 8 (2018) as 0.781, 0.892 and 0.804and 86.00%, 92.31%, 86.00% respectively.
Analysis reveals the addition of built up area up to 25% from year 2000 onwards and loss in dense forest from 40% to
30%. Vegetation areas recorded a reduction of 15% from 1989 to 2000. Spatial trend reveals the qualitative vulnerability
of vegetation classes during the study period. During 1989-2000, dense forest, vegetation and water classes contributed
maximum to settlement class and during 2000-2018 an interchange of dense forest and vegetation was witnessed. The
study provides an insight to the sustainable planning and management of the river ecosystem that is affected by
population expansion.

Keywords: Land use land cover, Change detection, MLC algorithm, geospatial techniques, Terrset, Yamuna River.

References:
1. Afify, H.A., 2011. Evaluation of change detection techniques for monitoring land-covers changes: a case study in new Burg El-Arab area.
Alexandria Eng. J. 50, 187-195
2. Ahmad, A., and Quegan, S., 2012. Analysis of maximum likelihood classification on multispectral data. Applied Mathematical Sciences, 6(129),
pp. 6425-6436.
3. Beuchle, R., Grecchi, R.C., Shimabukuro, Y.E., Seliger, R., Eva, H.D., Sano, E., Achard, F., 2015. Land cover changes in the Brazilian Cerrado
and Caatinga biomes from 1990 to 2010 based on a systematic remote sensing sampling approach. Appl. Geogr. 58, 116-127.
http://dx.doi.org/10.1016/j.apgeog.2015.01.017. 30-38
4. Butt, A., Shabbir, R., Ahmad, S.S., Aziz, N., 2015a. Land use change mapping and analysis using Remote Sensing and GIS: a case study of Simly
watershed, Islamabad, Pakistan. Egypt. J. Rem. Sens. Space Sci. 18, 251-259.
5. Butt, A., Shabbir, R., Ahmad, S.S., Aziz, N., Nawaz, M., Shah, M.T.A., 2015b. Land cover classification and change detection analysis of Rawal
watershed using remote sensing data. J. Biol. Environ. Sci. 6 (1), 236-248.
6. Ghebrezgabher, M.G., Yang, T., Yang, X., Wang, X., Khan, M., 2016. Extracting and analyzing forest and woodland cover change in Eritrea based
on landsat data using supervised classification. Egypt. J. Remote Sens. Space Sci. 19, 37-47. http://dx.doi.org/10.1016/j.ejrs.2015.09.002.
7. Gurgel, R.S., Farias, P.R.S., & Oliveira, S.N. (2017). Land use and land cover mapping and identification of misuse in the permanent preservation
areas in the Tailândia Municipality - PA. Semina Ciências Agrárias, Londrina, 38(3), 1145-1160.
8. Kamrul Islam et al., 2018 Land use classification and change detection by using multi-temporal remotely sensed imagery: The case of Chunati
wildlife sanctuary,Bangladesh The Egyptian Journal of Remote Sensing and Space Sciences 21 (2018) 37-47
9. Krishna Rajan, D. Understanding the Drivers Affecting Land Use Change in Ecuador: An Application of the Land Change Modeler Software.
Available online: https://www.era.lib.ed.ac.uk/handle/1842/3740 (accessed on 17 September 2018).
10. López-Serrano, P.M., Corral-Rivas, J.J., Díaz-Varela, R.A., Álvarez-González, J.G., López-Sánchez, C.A., 2016. Evaluation of radiometric and
atmospheric correction algorithms for aboveground forest biomass estimation using landsat 5 TM data. Remote Sens. 8, 1-19.
http://dx.doi.org/10.3390/rs8050369.
11. Lv, Z.; Shi, W.; Zhou, X.; Benediktsson, J.A. Semi-automatic system for land cover change detection using Bi-temporal remote sensing images.
Remote Sens. 2017, 9, 1112.
12. Mishra, V.N.; Rai, P.K.; Mohan, K. 2014. Prediction of land use changes based on land change modeler (LCM) using remote sensing: A case study
of Muzaffarpur (Bihar), India. J. Geogr. Inst. Jovan Cvijic SASA 2014, 64, 111-127.
13. Mosammam, H.M., Nia, J.T., Khani, H., Teymouri, A., Kazemi, M., 2017. Monitoring land use change and measuring urban sprawl based on its
spatial forms: the case of Qom city. Egypt. J. Remote Sens. Space Sci. 20 (1), 103-116. http://dx. doi.org/10.1016/j.ejrs.2016.08.002.
14. Wu, T.; Luo, J.; Fang, J.; Ma, J.; Song, X. Unsupervised object-based change detection via a Weibull mixture model-based binarization for high-
resolution remote sensing images. IEEEGeosci. Remote Sens. Lett. 2017, 15, 63-67. DOI:10.1109/LGRS.2017.2773118
15. Zanetti, M.; Bruzzone, L. A theoretical framework for change detection based on a compound multiclass statistical model of the difference image.
IEEE Trans. Geosci. Remote Sens. 2018, 56, 1129-1143

Authors: Paritosh C Kulkarni, Satya Deepika Neelapala, Hari Prasad Uppara, Harshini Dasari, Nico Van Esch
Paper Title: SmFe1-yCoyO3 Perovskite-Type Oxides For Soot Oxidation
Abstract: In the current study, a series of cobalt doped SmFeO3 perovskites (SmFe1-yCoyO3, y=0.1 to 0.35) were
synthesized via EDTA-citrate method and used for soot removal applications. All the fabricated catalysts were
characterized using XRD, SEM, BET surface area analysis and XPS analysis. It was found that the doping of Co into
SmFeO3 perovskites considerable influences on morphology and soot oxidation reactions. The phase of the samples was
investigated using XRD technique and examined the formation of orthorhombic phase till 30 mole% of Co-doped
samples. All the samples exhibited low BET surface areas which are in the range of 2-6 m2/gm. From SEM analysis, the
samples showed surface morphological changes with spherical shaped crystals. Sm existed in +3 oxidation states; Fe as
+3 and Co as +3 in all the samples as evidenced from XPS results. Soot oxidation activity tests, investigated using TGA
instrument and showed that SmFe0.7Co0.3O3-δ exhibited better catalytic performance (T50%- 496oC) when compared
to un-doped SmFeO3 (T50% -560oC).
8.
Keywords: Perovskites, SmFe1-yCoyO3, Doping, Soot Oxidation, Adsorbed oxygen species. 39-43

References:
1. Mingjiao Tian, Chi He, Yanke Yu, Hua Pan, Louise Smith, Zeyu Jiang, Ningbo Gao, Yanfei Jian, Zhengping Hao, Qing Zhu. "Catalytic oxidation
of 1,2-dichloroethane over threedimensional ordered meso-macroporous Co3O4 /La0.7Sr0.3Fe0.5Co0.5O3 : Destruction route and mechanism",
Applied Catalysis A: General, 2018
2. Matti Maricq M (2007) Chemical characterization of particulate emissions from diesel engines: A review. J Aerosol Sci 38:1079–1118.
https://doi.org/10.1016/j.jaerosci.2007.08.001
3. Adler J (2005) Ceramic diesel particulate filters. Int J Appl Ceram Technol 2:429–439. https://doi.org/10.1111/j.1744-7402.2005.02044.x
4. Niessner R (2014) The many faces of soot: Characterization of soot nanoparticles produced by engines. Angew Chemie - Int Ed 53:12366–12379.
https://doi.org/10.1002/anie.201402812
5. Mendoza-Villafuerte P, Suarez-Bertoa R, Giechaskiel B, et al (2017) NOx, NH3, N2O and PN real driving emissions from a Euro VI heavy-duty
vehicle. Impact of regulatory on-road test conditions on emissions. Sci Total Environ 609:546–555. https://doi.org/10.1016/j.scitotenv.2017.07.168
6. Chi He, Jie Cheng, Xin Zhang, Mark Douthwaite, Samuel Pattisson, Zhengping Hao. "Recent Advances in the Catalytic Oxidation of Volatile
Organic Compounds: A Review Based on Pollutant Sorts and Sources", Chemical Reviews, 2019
7. Di Sarli V, Landi G, Lisi L, et al (2016) Catalytic diesel particulate filters with highly dispersed ceria: Effect of the soot-catalyst contact on the
regeneration performance. Appl Catal B Environ 197:116–124. https://doi.org/10.1016/j.apcatb.2016.01.073
8. Royer S, Duprez D, Can F, et al (2014) Perovskites as substitutes of noble metals for heterogeneous catalysis: Dream or reality. Chem Rev
114:10292–10368. https://doi.org/10.1021/cr500032a
9. Marchetti L, Forni L (1998) Catalytic combustion of methane over perovskites. 15:179–187
10. Liu S, Wu X, Weng D, Ran R (2015) Ceria-based catalysts for soot oxidation: A review. J Rare Earths. https://doi.org/10.1016/S1002-
0721(14)60457-9
11. Huang X, Zhao G, Wang G, Irvine JTS (2018) Synthesis and applications of nanoporous perovskite metal oxides. Chem Sci 9:3623–3637.
https://doi.org/10.1039/c7sc03920d
12. Zhao M, Peng H, Hu J, Han Z (2008) Effect of Cobalt doping on the microstructure, electrical and ethanol-sensing properties of SmFe1-xCoxO3.
Sensors Actuators, B Chem 129:953–957. https://doi.org/10.1016/j.snb.2007.10.012
13. Satya Deepika Neelapala, Harsh Patnaik, Harshini Dasari. " Enhancement of soot oxidation activity of manganese oxide (Mn O ) through doping by
the formation of Mn M O (M = Co, Cu, and Ni) ", Asia-Pacific Journal of Chemical Engineering, 2018
14. Bukhari SM, Giorgi JB (2010) Effect of cobalt substitution on thermal stability and electrical conductivity of Sm0.95Ce0.05FeO3 - δin oxidizing
and reducing conditions. Solid State Ionics 181:. https://doi.org/10.1016/j.ssi.2010.01.017
15. Bukhari SM, Giorgi JB (2011) Gases. 158:159–164
16. Anantharaman AP, Dasari HP, Dasari H, Babu GUB (2018) Surface morphology and phase stability effect of Ceria-Hafnia (CHx) binary metal
oxides on soot oxidation activity. Appl Catal A Gen 566:181–189. https://doi.org/10.1016/j.apcata.2018.08.019
17. Shao Z (2000) Investigation of the permeation behavior and stability of a Ba0.5Sr0.5Co0.8Fe0.2O3−δ oxygen membrane. J Memb Sci 172:177–
188. https://doi.org/10.1016/S0376-7388(00)00337-9
18. Asamoto M, Harada N, Iwamoto Y, et al (2009) Catalytic activity of multi-metallic perovskite-type oxide prepared by the thermal decomposition of
heteronuclear cyano complex, Sm[FexCo1-x(CN)6] . nH2O. Top Catal 52:823–827. https://doi.org/10.1007/s11244-009-9233-1
19. Bukhari SM, Giorgi JB (2009) Tuneability of Sm(1 - x)CexFeO3 ± λperovskites: Thermal stability and electrical conductivity. Solid State Ionics.
https://doi.org/10.1016/j.ssi.2008.12.002
20. Levasseur B, Kaliaguine S (2009) Effects of iron and cerium in La1-yCeyCo1-xFexO3perovskites as catalysts for VOC oxidation. Appl Catal B
Environ 88:305–314. https://doi.org/10.1016/j.apcatb.2008.11.007
21. Twagirashema I, Engelmann-Pirez M, Frere M, et al (2007) An in situ study of the NO + H2+ O2reaction on Pd/LaCoO3based catalysts. Catal
Today 119:100–105. https://doi.org/10.1016/j.cattod.2006.08.013
22. Itagaki Y, Mori M, Hosoya Y, et al (2007) O3and NO2sensing properties of SmFe1-xCoxO3perovskite oxides. Sensors Actuators, B Chem
122:315–320. https://doi.org/10.1016/j.snb.2006.06.001

Authors: Shahanwaz Khan, Rajsekhar Panua, Probir Kumar Bose


Influence of piston bowl shape and number of holes in injector on spray, combustion and emissions of a
Paper Title:
diesel engine: A numerical Research
Abstract: Present study considers numerical simulation to explore the combine influence of piston bowl shape and
number of holes on spray, fuel combustion and pollutant emissions of a diesel engine. The fluid flow behavior in
combustor is extensively depends on piston bowl shape that affects the air fuel mixing, combustion and emissions. The
number of holes in injector nozzle is a crucial constraint that influences the distribution of the fuel inside the combustor.
To study the effect of piston bowl profile, three combustion chambers have been chosen for the same bowl volume and
compression ratio of 17.5. The injector used for the study varied number of holes from 3 to 6 and the size of holes varied
to maintain total area of nozzle holes constant. The investigation has been done on a compression ignition engine using
the commercial CFD code AVL FIRE. The predicted results disclose that increasing number of holes considerably
enhances combustion and improve emissions from piston bowls and the TRCC piston bowl predicts better performance.

Keywords: Combustion, Spray, Swirl, Turbulence.

References:
1. B. H. Lee, J. H. Song, Y. J. Chang, C. H. Jeon, "Effect of the number of fuel injector holes on characteristics of combustion and emissions in a
diesel engine," International Journal of Automotive Technology, vol.11, pp. 783-79, Dec. 2010.
2. S. P. Venkateswaran, G. Nagarajan, "Effects of the re-entrant bowl geometry on a DI turbocharged diesel engine performance and emissions-a CFD
approach," Journal of Engineering for Gas Turbines and Power, vol. 132, pp. 122803-10, Aug. 2010.
9. 3. L. Lin, D. Shulin, X. Jin, W. Jinxiang, and G. Xiaohong, "Effects of combustion chamber geometry on in-cylinder air motion and performance in
DI diesel engine," SAE Technical Paper 2000-01-0510, 2000.
4. A. R. G. S. Raj, J. M. Mallikarjuna, and V. Ganesan, "Energy efficient piston configuration for effective air motion - A CFD study," Applied 44-51
Energy, vol. 102, pp. 347-354, Feb. 2013.
5. J. Li, W. M. Yang, H. An, A. Maghbouli, S. K. Chou, "Effects of piston bowl geometry on combustion and emission characteristics of biodiesel
fueled diesel engines," Fuel, vol. 120, pp. 66-73, Mar. 2014.
6. S. Khan, R. Panua, P. K. Bose, "Combined effects of piston bowl geometry and spray pattern on mixing, combustion and emissions of a diesel
engine: A numerical approach," Fuel, vol. 225, pp. 203-217, Aug. 2018.
7. S. K. Nayak, P. C. Mishra, "Achieving high performance and low emission in a dual fuel operated engine with varied injection parameters and
combustion chamber shapes," Energy Conversion and Management, vol.180, pp. 1-24, Jan. 2019.
8. S. Khan, R. Panua, P. K. Bose, "The impact of combustion chamber configuration on combustion and emissions of a single cylinder diesel engine
fuelled with soybean methyl ester blends with diesel," Renewable Energy, vol. 143, pp. 335-351, May 2019.
9. S. K. Gugulothu, and K. H. C. Reddy, "CFD Simulation of in-cylinder flow on different piston bowl geometries in a DI diesel engine," Journal of
Applied Fluid Mechanics, vol. 9, pp. 1147-1155, May 2016.
10. S. W. Park, and R. D. Reitz, "Modeling of the effect of injector nozzle-hole layout on diesel engine fuel consumption and emissions," Journal of
Engineering for Gas Turbines and Power, vol. 130, pp. 032805-10, Mar. 2008.
11. V. Kumar, "Experimental investigation of piston bowl geometry effects on performance and emissions characteristics of diesel engine at variable
injection pressure and timings," International Journal of Ambient Energy, vol. 39, pp. 685-693, 2018.
12. B. Kim, W. Yoon, S. Ryu, and J. Ha, "Effect of the injector nozzle hole diameter and number on the spray characteristics and the combustion
performance in medium-speed diesel marine engines," SAE Technical paper 2005-01-3853, 2005.
13. C. P. A. Gafoor, and R. Gupta, "Numerical investigation of piston bowl geometry and swirl ratio on emission from diesel engines," Energy
Conversion and Management, vol. 101, pp. 541-51, Sep. 2015.
14. S. Jaichandar, V. G. E. Prasath, K. Annamalai, "Effects of tangential air passages to piston bowl on the performance of a DI diesel engine,"
International Journal of Ambient Energy, Jan. 2018.

Authors: N. Srilatha, B. Priyanka Rathod, G. Yesuratnam


10. Paper Title: Congestion Management Considering Economic and Efficient Generation Rescheduling
Abstract: Increasing interconnections and usage of power networks makes the system to work at almost full loading
52-57
capacities. Any type of disturbance in such scenario results in congestion of the existing network. This condition, if not
managed within required time may result in system collapse. This paper presents a simple and economic transmission line
overload alleviation method that is very much required in day-to-day operation and control of power systems. This
method of managing the congestion aims primarily at improving the voltage stability of the system while relieving the
overload and does this economically to the possible extent. Relative Electrical Distances (RED) between the loads and
generators is the criterion for relieving the overload in a transmission line, by rescheduling the generation. The process of
rescheduling is done economically by making use of fuzzy logic considering the incremental fuel costs of the generators.
This method is illustrated using IEEE 39-node New England system and a real-life system, 75-node North Indian power
system

Index Terms: Congestion management, Generation rescheduling, Voltage stability, Fuzzy Logic

References:
1. Yong Zheng and N. Chowdhury, "Expansion of Transmission systems in a Deregulated Environment", IEEE Canadian Conference on Electrical
and Computer Engineering, Vol.4, May 2-5, 2004, pp.1943-1947.
2. Lobato, L. Rouco, et al., "Preventive analysis and solution of overloads in the Spanish electricity market", Electric Power Systems Research,
Vol.68, 2004, pp 185-192.
3. J Lei, Y. Deng, R. Zhang, Y. Wu, "Congestion management for generation scheduling in a deregulated Chinese power system", 2001 IEEE Power
Engineering Society Winter Meeting. Jan, 2001.
4. Sinha A.K. et al., "Congestion management using multi objective particle swarm optimization" IEEE Trans. on Power Systems, 2007, Vol. 22(4),
pp. 1726-34.
5. Bansilal D. Thukaram, K. Parthasarathy, "An expert system for alleviation of network overloads," Electric Power Systems Research, Vol.40
(1997), pp. 143-153.
6. A. N. Udupa, G. K. Purushothama, K. Parthasarathy and D.Thukaram "A Fuzzy control for network over load alleviation", Inter National Journal of
Electrical Power and Energy Systems, Vol.23, 2001, pp.119-128.
7. D.P. Kothari, et al. "Congestion Management on Power Systems - A Review", Electrical Power and Energy Research, Vol.70, 2015.
8. Yesuratnam G., Thukaram D., "Congestion management in open access based on relative electrical distances using voltage stability criteria",
Electric Power Systems Research, 2007, Vol. 77, pp. 1608-18.
9. G. Yesuratnam, N. Srilatha, P. Lokender Reddy, "Congestion Management Technique Using Fuzzy Logic Based on Security and Economy
Criteria" AIKED'12 Proceedings of the 11th WSEAS international conference on Artificial Intelligence, knowledge Engineering and Data Bases,
pp. 157- 162, 2012.
10. H. Ghasemi, C. Cañizares, and G. Savage, "Closed-Form Solution to Calculate Generator Contributions to Loads and Line Flows in an Open
Access Market." IEEE PES General Meeting, Vol.2, 2003.

Authors: V. Pravalika, Ch. Rajendra Prasad


Paper Title: Internet of Things Based Home Monitoring and Device Control Using Esp32
Abstract: This paper presents a low cost flexible and reliable home monitoring and control system with additional
security using ESP32, with IP connectivity through local Wi-Fi for accessing and controlling devices by formal user
remotely using android smart phone application. This system is server self-governing and uses internet of things to
control human desired appliances starting from industrialized machine to user goods. Home monitoring and device
control system not only refers to decrease human efforts but also save the energy and time competence. To demonstrate
the effectiveness and feasibility of this system, in this we presents a home monitoring system by using ESP32 module. It
helps the user to monitor various conditions in the home like room temperature, gas leakage, water levels in the tank and
person detection and control various appliances such as light, fan, motor, gas knob and take decision based on the
feedback of sensors remotely.

Keywords: ESP32, Internet of Things (IoT), Wi-Fi network, PIR(passive infrared) sensor.

11. References:
1. M.Tazil, R.Piyare "Bluetooth Based Home Automation System Using Cell phone," in IEEE 15th Int. Symposium on Consumer Electronics,
Singapore 2011, pp. 192 - 195. 58-62
2. Md. Abdullah Al Asad, Md. S. Faruk. Design and Development of SMS Based Wireless Home Appliance Control and Security System. JMST,
Vol.3. No.1. Mar. 2015, Issue. pp.80-87.
3. N.Deepak, Ch. Rajendra Prasad " Patient Health Monitoring using IoT", IJITEE, Volume-8 Issue-2S2 December-2018.pp. 454-457.
4. V. Madan, Reddy S.R.N "GSM-Bluetooth based Remote Monitoring and Control System with Automatic Light Controller", Int. Jr. of Computer
Applications, Vol. 46, No 1, pp. 20-28, May 2012.
5. D. Javale, M. Mohsin, "Home Automation and Security System Using Android ADK", Vol. 3, Issue 2, pp 382-385, Mar. 2013.
6. B.M.O. Al-thobaiti, I.I.M. Abosolaiman "Design and Implementation of a Reliable Wireless Real-Time Home Automation System Based on
Arduino Uno Single-Board Microcontroller", Vol. 3, No. 3, pp 11-15, July 2014.
7. Diptanil Chaudhuri "GSM based home security system" IJETR, Vol.3, Issue-2, Feb. 2015.
8. Safa.H, Sakthi Priyanka," IOT based Theft Premption and Security System", Int. Jr. of Innovative Research in Science, Engg. and Tech., vol 5, pp.
4312-4317, Mar. 2016.
9. Pandav R.P., Dahatonde S.P " Security System And Home Appliances Control Using IoT" IJARIIE Vol-4 Issue-2 2018.
10. O.Anusha, CH. Rajendra Prasad" Experimental Investigation on Road Safety System at Crossings " IJEAT, Volume-8, Issue-2S2, January 2019,
pp.214-218.
11. K. Bharath Reddy and Ch.Rajendra Prasad, "The embedded Web server based Electrical Ethernet Monitoring system using ARM," Int. Jr. of Adv.
Research in Comp. & Comm. Engg. Vol. 2, Issue 5, 2013, pp. 2292-2295.

Authors: K.Vasantha, J. Ravichander


Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face
Paper Title:
Recognition
Abstract: To guarantee the real proximity of actual trait as opposed a faux self-created designed or duplicated look into
12. a significant trouble in biometric test, calls for progression of later and successful security efforts. On this paper, blessing
a singular programming on fake notoriety approach that can be related in numerous biometric systems separate special
63-67
varieties of false encourage segment to efforts. The goal of proposed shape is to improve the safety of biometric
affirmation works, by approach for complete of liveness evaluation in a concise, simple to apply, and non-meddling
approach, the usage of picture quality examination. The suggested approach presentations a little level of multifaceted
nature, which appropriates for progressing programs, utilising 25 in fashion image nice functions detached from one
photo (i.e., the equal secured for confirmation capacities) to realize true and impostor value determinations. Then take a
look at consequences, got on audaciously accessible enlightening accumulations of finger print, iris, and 2nd cross up
against, discovers that the proposed methodology is strikingly targeted differentiated and other decreasing function
structures and that the check of the overall photograph nature of actual biometric exams reveals substantially simple
insights this is most possibly used to element them from faux attributes.

Keywords: Image quality assessment, biometrics, security, attacks, counter measures.

References:
1. S. Prabhakar, S. Pankanti, and A. K. Jain, "Biometric recognition: Security and privacy concerns," IEEE Security Privacy, vol. 1, no. 2, pp. 33-42,
Mar./Apr. 2003.
2. T. Matsumoto, "Artificial irises: Importance of vulnerability analysis," in Proc. AWB, 2004.
3. J. Galbally, C. McCool, J. Fierrez, S. Marcel, and J. Ortega-Garcia, "On the vulnerability of face verification systems to hill-climbing attacks,"
Pattern Recognit., vol. 43, no. 3, pp. 1027-1038, 2010.
4. A. K. Jain, K. Nandakumar, and A. Nagar, "Biometric template security," EURASIP J. Adv. Signal Process., vol. 2008, pp. 113-129, Jan. 2008.
5. J. Galbally, F. Alonso-Fernandez, J. Fierrez, and J. Ortega-Garcia, "A high performance fingerprint liveness detection method based on quality
related features," Future Generat. Comput.Syst., vol. 28, no. 1, pp. 311-321, 2012.

Authors: Sri Laxmi Kuna, A.V. Krishna Prasad


Research Methodologies for Student Performance Evaluation Using Educational Analytics Tools and
Paper Title:
Approaches
Abstract: Educational Data Learning Analytics (EDLA) are about learning and is used to study and analyzing data from
academic databases, Which is focuses on faculty teaching and student learning process, developing new tools and
algorithms for discovering data patterns to improve student success. Recently Educational institutions are also using
Learning analytics for the decision making to improve the student learning process. We can also develop new techniques
from statistics for the analysis of educational data. It is also tests the learning theories and improves the teaching –
learning process. One more important feature of EDLA is that it can focus on university level, institutional level,
classroom level, session level and individual student answer level also. Educational Data Learning Analytics techniques
are used for the benefit of all the stakeholders in the educational system such as student, faculty, engineering institutions
and engineering education universities, which will help study, predict and improve a students’ academic performance. In
this paper we define Educational Data Learning Analytics and discussed about existing tools, how the stack holders can
make use of it for student success.

Keywords: Educational Data Learning Analytics (EDLA), Classification, Clustering, Outlier analysis, Association Rule
Mining, tools and stack holders.

References:
1. Dr. S. Anupam Kumar (2016) "Edifice an Educational Framework using Educational Data Mining and Visual Analytics" I.J. Education and
Management Engineering, 2, 24-30
2. Omer Deperlioglu & Fatma Sibel Birtil (2017) Analysis of Girls Vocational High School Students' Academic Failure Causes with Data Mining
Techniques, The Anthropologist, 23:3, 505-512, DOI: 10.1080/09720073.2014.11891970
3. Usamah Bin Mat, Norlida Buniyamin and Pauziah Mohd Arshad (2016) "Educational Data Mining Classifier for Semester One Performance to
Improve Engineering Students Achievement" Middle-East Journal of Scientific Research 24 (2): 338-346.
4. Tripti Mishra, Dharminder Kumar, Sangeeta Gupta (2016) "Students' Employability Prediction Model through Data Mining" International Journal
of Applied Engineering Research ISSN 0973-4562 Volume 11, Number 4 (2016) pp 2275-2282.
13. 5. Brijesh Kumar Baradwaj, Saurabh Pal (2011) "Mining Educational Data to Analyze Students' Performance"(IJACSA) International Journal of
Advanced Computer Science and Applications, Vol. 2, No. 6, 2011.
6. Edin Osmanbegovic, Mirza Suljic (2012) "Data Mining Approach For Predicting Student Performance" Economic Review - Journal of Economics 68-74
and Business, Vol. X, Issue 1, May 2012
7. DavidJ.Finch, Leah K, Hamilton, Riley Baldwin, Mark Zehner, (2013) "An exploratory study of factors affecting undergraduate employability",
Education + Training, Vol. 55 Issue: 7, pp.681-704, https://doi.org/10.1108/ET-07-2012-0077
8. Bangsuk Jantawan, Cheng-Fa Tsai (2013) "The Application of Data Mining to Build classification Model for Predicting Graduate Employment "
International Journal of Computer Science and Information Security, Vol. 11, No. 10, October 2013
9. Lumbini P. Khobragade, Prof. Pravin Mahadik (2015) "Students' Academic Failure Prediction Using Data Mining "International Journal of
Advanced Research in Computer and Communication Engineering Vol. 4, Issue 11, November 2015.
10. Dr. Emine ÖNDER (2016) -"Cause of School Failure from Teacher and Students perspective" "International Journal on New Trends in Education
and Their Implications April 2016 Volume: 7 Issue: 2 Article: 02 ISSN 1309-6249
11. Griffiths, M.E., & Graham, C.R. (2009). "Patterns of user activity in the different features of the Blackboard CMS across all courses for an
academic year at Brigham Young University". Journal of Online Learning and Teaching, 5(2), 285-292.
12. Nirit Raichel, (2013),"Computerized class management software: teachers' views and assessment", Journal of Organizational Change Management,
Vol. 26 Issue 5 pp. 830 - 852.
13. http://www.usf.edu/ucm/marketing/cms-implementation. aspx
14. C., Ventura, S., & Garcia, E. (2008). Data mining in course management systems: Moodle case study and tutorial. Computers & Education, 51(1),
368-384
15. Purdue Early Warning System (PAWS) Signals Project
16. Griffiths, M.E., & Graham, C.R. (29). Patterns of user activity in the different features of the Blackboard CMS across all courses for an academic
year at Brigham Young University. Journal of Online Learning and Teaching, 5(2), 285-292.
17. Deperlioglu, Omer & Sibel Birtil, Fatma. (2016). Analysis of Girls Vocational High School Students' Academic Failure Causes with Data Mining
Techniques. The Anthropologist.
18. Usamah Bin Mat, Norlida Buniyamin and Pauziah Mohd Arshad (2016) Engineering & Technical Education Research Group (Enter), Faculty of
Electrical Engineering, Universiti Teknologi MARA, Middle-East Journal of Scientific Research 24 (2): 338-346, 2016.
19. Mishra, Tripti & Kumar, Dharminder & Gupta, Sangeeta. (2016). Students' employability prediction model through data mining. 11. 2275-2282.
20. Brijesh Kumar Baradwaj, Saurabh Pal (2011) International Journal of Advanced Computer Science and Applications, (IJACSA) Vol. 2, No. 6
21. Osmanbegovi?, Edin & Suljic, Mirza. (2012). DATA MINING APPROACH FOR PREDICTING STUDENT PERFORMANCE. Journal of
Economics & Business/Economic Review. 10. 3-12.
22. Finch, David & Hamilton, Leah & Baldwin, Riley & Zehner, Mark. (2013). an exploratory study of factors affecting undergraduate employability.
Education + Training. 55. 10.1108/ET-07-2012-0077.
23. Jantawan, Bangsuk & Tsai, Cheng-Fa. (2013) the Application of Data Mining to Build Classification Model for Predicting Graduate Employment."
24. Jantawan, Bangsuk & Tsai, Cheng-Fa. (2013). The Application of Data Mining to Build Classification Model for Predicting Graduate Employment.
25. Lumbini P. Khobragade1, Prof. Pravin Mahadik (2015) International Journal of Advanced Research in Computer and Communication Engineering
Vol. 4, Issue 11, November 2015
26. Dr. Emine ÖNDER (2016) International Journal on New Trends in Education and Their Implications April 2016 Volume: 7 Issue: 2 Article: 02
ISSN 1309-6249.
27. D.Fatima, Dr. Sameen Fatima, Dr.A.V.Krishna Prasad "A Survey on Research work in Educational Data Mining", IOSR Journal of Computer
Engineering (IOSR-JCE), e-ISSN: 2278-0661,p-ISSN: 2278-872, Vol-17, Issue-2, 43-49.
28. D.Fatima, Dr. Sameen Fatima, Dr.A.V.Krishna Prasad "Integrating WEKA into Web Application: Predicting Student's Performance", International
Journal of Engineering Research and Applications, ISSN: 2248-9622, IJERA,Dec 2017.
29. A Chapter entitled "Mining on Social Media" in Web Data Mining and the Development of Knowledge Based Decision Support Systems Editor(s):
G. Sreedhar (Deemed University, India), IGI Global Publications.

Authors: NarsingojuAdithya, Sridevi Chitti


Paper Title: Hand Gesture Controlled Robot
Abstract: The critical reason of this corporation is to increase a passage system to control a robot by using the use of
misuse MEMS in particular based totally absolutely assessing form. MEMS might be a hint Electro Mechanical
discoverer that is a touchy and healthful for police paintings the tilt. This locator unearths the lean and makes use of the
accelerometer to transport the orientation of the robot looking on tilt.This undertaking uses a touch controller, that is
modified, with the assist of delivered C headings. This microcontroller is provided for act with transmitter and beneficiary
modules. The MEMS basically primarily based identifying phase acknowledges the lean and gives the records to the
microcontroller (on board computer) and besides the controller settles on a desire about whether the direction is correct
development or left improvement direction and controls the course severally. The controller is interfaced with dc
14. automobiles to manipulate the path of the robotic.

Keywords: Arduino uno, measuring instrument, DC motors, RF Transmitter&Receiver. 75-77

References:
1. International Journal of Advanced Technology in Motorering and Science Volume No.02, IssueNo.05, May2014
2. Electronic Material And elements P.C. Rao & D.V.Satrawe
3. Electronic Circuit & Device Millmen& Halkias
4. https://store.arduino.cc/usa/arduino-uno-rev3
5. https://www.rakeshmondal.info/L293D-Motor-Driver
6. www.ijsr.net Volume four Issue three, March
7. http://www.instructables.com/id/Gesture-controlled-robot-using-Arduino/
8. https://www.elprocus.com/accelerometer-based-gesture-control-robot/

Authors: G. Rathnakar
Paper Title: Blockchain Marketing through Social Media Surges the Economic Growth of India
Abstract: The objective of the study is to magnitude the social media in blockchain marketing, dealing with their
business partners and how they reaches to millions of potential customers, and highlight how blockchain can affect social
media marketing. So, as blockchain impacts the global economy, what effects does it have on social media advertising?
And offer the recommendations to the society while working with the social media.
Change is inevitable; cut throat competition has shrunk the profit margin but the monopoly. To take the product or
services at global level, traditional approach is not enough; we look for innovative and creative idea to reach millions to
register our product or services in their mind and blockchain helps to take a big leap in the world of digital marketing.
Technology companies have come up with novel idea of connecting the people. Users started registering and getting
connected with others having same interest, demography and various professions or hobbies. This networking ultimately
expanded in to a huge circle, a big family with different taste and interest. Now, using such a huge network, to penetrate
the brand and idea of promoting the product/services or feedback or demand or quality or need or want of the people
came in existence. Showing their needs and wants made the supplier to rethink about their product and services and in
turn it has immensely increased the brand value, goodwill and most important the bigger customer base and customer
15. loyalty. This is a platform for any individual or SME or corporate to present new ideas and reach to millions with not
much investment as compare to traditional approach, which is much more expensive affairs.
78-81
Keywords: Social Media, Blockchain Marketing, Growth factor, Social Media Technology, SME, Internet Relay Chat,
Bulletin Board Systems.

References:
1. Brown, N. C., Wei, K. D., and Wermers, R., "Analyst Recommendations, Mutual Fund Herding, and Overreaction in Stock Prices," Management
Science (60:1), pp. 1-20, 2013.
2. Duggan, M., and Brenner, J. "The Demographics of Social Media Users, 2012," Pew Research Center's Internet & American Life Project,
Washington, DC, 2013.
3. Fitzgerald, B. R. 2014. "Data Point: Social Networking Is Moving on from the Desktop." Wall Street Journal. Retrieved on Sep 1, 2015.
4. Kate Williams & Joan C. Durrance, Social Networks and Social Capital: Rethinking Theory in Community Informatics."Losing the Middle but
Keeping the Heart: Blockchain, DAOs and the future decentralisation of charity." Charities Aid Foundation, discussion paper no. 7, May 2017.
5. Luo, X., Zhang, J., and Duan, W. 2013. "Social Media and Firm Equity Value," Information Systems Research (24:1), pp. 146-163.
6. Mayer, A. 2014. "Bitcoin Has a Future, but Maybe Not as a Currency." CBCNews. Retrieved on Sep 14, 2014,
7. Matthew O. Jackson, 2007. The study of Social Networks in economics,
8. Shi, Z., Rui, H., and Whinston, A. B., "Content Sharing in a Social Broadcasting Environment: Evidence from Twitter," MIS Quarterly (38:1), pp.
123-126, December 2014.

Pedrito M. Tenerife Jr., Arvin R. De La Cruz, Alexis Christellene M. Arce, Ma. Arianne N. Pabularcon,
Authors:
16. Kathleen Meriel D. Ortega, Ralph Lorenz R. Rafallo
Paper Title: Design and Development of Banana Fiber Decorticator with Wringer
Abstract: The demand for fiber as raw materials to make various products is increasing. It can be extracted from the
seed, leaves, fruits and stem of a plant. Banana is one of the leading fruits grown in the Philippines. It provides food and
a source of industrial raw materials. Aside from the fruit, banana blossom and its trunk pith that can be eaten, natural
fiber can be extracted in the trunk (pseudo-stem) that is usually thrown as waste after the harvest season. The study aims
to develop a machine that can extract fiber in a pseudo-stem which can be used in handicrafts, ropes, clothing and other
products. A prototype was designed, developed and was tested for banana trunk fiber extraction. During the extraction
process, the stem which is 45.72 cm in length and 1 cm thickness is fed manually in the prototype machine. Fiber is
extracted from the pseudo-stem using a decortication process where a roller with scratched surface is compressed into a
stationary bar that will crushed and scraped the trunk. During the decortication process the banana stem is also
undergoing the wringing process wherein the fiber loses its water content. The extracted fiber is already dried and can be
used in making domestic products. However, to have a good quality fiber, after the process, it should be washed and
dried. Results indicated that the recovery rate of the banana fiber has increase by 2-3% in an average of 35.5 cm pseudo-
stem. The device has a great potential and should be used for the growing fiber industry in the country.

Index Terms: bast fiber, decortication process , pseudo stem, wringing process
82-84
References:
1. Lea A. Fernandez, Marian Joy B. Gray, Alma Marla K. Santos. "Hibla". Philippine Fiber Industry Development Authority vol. 2 No. 1 January to
March 2016.
2. Md. Ferdus Alam(2014). "An Overview of Banana Fiber". https://textilelearner.blogspot.com/2014/01/properties-of-banana-fiber.html.
3. Valeriy Vyatkin (2013), "Software Engineering in Industrial Automation:State of the Art Review". P. 1234 - 1249. IEEE.
10.1109/TII.2013.2258165.
4. Goutham Veerabathini(2012). Production of Banana Fiber and Paper from Waste
5. "Abaca Technoguide". Philippine Fiber Development Authority. Department of Agriculture. 2016 Edition.
6. Vadivel K, Vijayakumar A, Solomon S, Santhoshkumar R. "A Review Paper on Design and Fabrication of Banana Fiber Extraction Machine and
Evaluation of Banana Fiber Properties". International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering vol.
6 Issue 3, March 2017.
7. Mukhopadhyay, S., Fangueiro, R., Yusuf, A. and Senturk, U. 2008. Banana fibresvariability and fracture behaviour. Journal Engineered Fibres and
Fabrics, vol. 3, Issue 2, 2008.
8. Asmanto Subagyo and Achmad Chafidz. "Banana Pseudo- Stem Fiber: Preparation, Characteristics, and Applications" DOI:
http://dx.doi.org/10.5772/intechopen.82204.
9. A. K. M. Mohiuddin*, Manas Kanti Saha, Md. Sanower Hossian and Aysha Ferdoushi. "Usefulness of Banana (Musa paradisiaca) Wastes in
Manufacturing of Bio-products: A Review". The Agriculturists vol. 12, no. 1, pp. 148-158, 2014.

Authors: Ana Leah Arquelada Alconis, Amando Pimentel Singun Jr.


Paper Title: Tourism Infomercial Analyzer for Metro Vigan, Philippines
Abstract: Tourists are attracted to traveling to the historic places of the Philippines such as Vigan, which is the home of
one of the New Seven Wonder Cities of the world. Tourism in Vigan has experienced continued growth and
development. Today it has become a great challenge to meet and satisfy the needs and demands of tourists in getting vital
information on the various tourism industries. When a large number of tourists is arriving at the same time, the Ilocos Sur
Provincial Tourism Office, the forefront of the province, has been experiencing difficulty in catering all the information
needs of such tourists. All of these may cause an adverse impact on tourism. To remedy such a problem, the Tourism
Infomercial Analyzer system is designed and developed with features of an infomercial, travel router, and analyzer. The
system aims to advertise, educate, and promote the province to the world. Likewise, it showcases the hidden beauty of the
place and provides a detailed explanation about the province, its attractions, accommodations, and native commodities.
Moreover, the system is designed to assist tourists with the possible land routes to reach crisscrossing destinations.
Finally, the system is the most prominent product of Expert System suited to advertise and promote all tourist destinations
in Metro Vigan.

Keywords: Tourism, Infomercial, Recommender, Analyzer, Itinerary Planner, Advertisement, Promotion, Marketing,
Content-Based Filtering, Random Forest Algorithm

17. References:
1. Gamage, A. S. (2016). The role of human resource management in developing tourism industry in Sri Lanka: a proposed conceptual framework. Sri
Lankan Journal of Human Resource Management, 6(1). Retrieved from http://journals.sjp.ac.lk/index.php/sljhrm/article/view/2786. 85-89
2. Hasan, M. (2015). Promotional Activities in the Strategic Tourism Development of Lapland: Case Study: Tour Operator's appearance in social
media. Retrieved from https://www.theseus.fi/bitstream/handle/10024/96778/Final%20thesis%20Hasan%202.pdf?sequence=1.

3. Horner, S., & Swarbrooke, J. (2016). Consumer Behaviour in Tourism (3rd Ed.). New York, Routledge. Retrieved from
https://books.google.com.ph/books?hl=en&lr=&id=y9wRDAAAQBAJ&oi=fnd&pg=PP1&dq=tourism&ots=fADp3Cf1Gb&sig=xvl-
D631yTm5Dmlo4nQl3Iu53v4&redir_esc=y#v=onepage&q=tourism&f=false.
4. Libosada, C. (2018). The problem with the Philippine tourism industry. Retrieved from CNN Philippines website:
http://cnnphilippines.com/life/leisure/travel/2018/04/11/problem-with-Philippine-tourism.html.
5. Mathew, B. & Rao S.K. (2016). Tourism Management System. Retrieved from
https://www.researchgate.net/profile/Bennet_Mathew/publication/310122350_Tourism_Management_System/links/5829273008ae5c0137f14fbb/T
ourism-Management-System.pdf.
6. Sergeev, A. (2016). Life Cycle of Extreme Programing. Retireved from Hygger website: https://hygger.io/blog/life-cycle-of-extreme-programming/.
7. Singun A.P. (2018) Heuristics Discovered from Prototyping an Interactive System. In: Auer M., Guralnick D., Simonics I. (eds) Teaching and
Learning in a Digital World. ICL 2017. Advances in Intelligent Systems and Computing, vol 716. Springer, Cham.
8. Son, J., & Kim, S. B. (2017). Content-based filtering for recommendation systems using multiattribute networks. Expert Systems with Applications,
89, 404-412. Retrieved from https://www.sciencedirect.com/science/article/pii/S0957417417305468.
9. Tejero, C. (2015). Why Vigan Won as One of New 7 Wonders Cities. Retrieved from LifeStyle Inquirer Website:
https://lifestyle.inquirer.net/201452/why-vigan-won-as-one-of-new-7-wonders-cities/.
10. Vidad, A. (2016). Resolve the Issue on Overcharging of Tricycle Fares. Retrieved from change.org website: https://www.change.org/p/passengers-
resolve-the-issue-on-overcharging-of-tricycle-fares.
11. Zhang, H. R., Min, F., & He, X. (2014). Aggregated recommendation through random forests. The Scientific World Journal, 2014. Retrieved from
https://www.hindawi.com/journals/tswj/2014/649596/abs/.
Authors: António Curado, João P. Silva, Sérgio I. Lopes
Radon Risk Management in Public Buildings in Northwest Portugal: From Short-Term Characterization to
Paper Title:
the Design of Specific Mitigation Actions
Abstract: Portugal is a country with a considerable risk regarding natural radiation since in a considerable part of the
territory the soil is mainly composed of granitic rocks, containing high uranium levels. Radon gas is currently classified
by the International Agency for Research on Cancer (IARC) as a Group 1 carcinogen. To tackle the problem since the
beginning of 2019 there is new legislation in force to regulate indoor occupational exposure to radon gas. An
experimental study was carried out in a city in the Northwest of Portugal by taking short-term measurements in a set of 15
municipal buildings (schools, museums, galleries, theaters, and municipal bureaus and offices, etc.) differing not only on
its architecture and its construction period, but also on the number of occupants, its habits, and occupancy schedules. The
in situ characterization allowed highlighting radon risk to which buildings’ occupants are subject to, and by results
analysis to propose a radon management strategy aimed at minimizing the risk of occupant exposure.

Index Terms: Radon management strategy, Radon mitigation, Radon risk analysis.

References:
1. S. Darby S, D. Hill and R. Doll, "Radon: a likely carcinogen at all exposures," Annals of Oncology, vol. 12, no. 10, pp. 1341-51, November 2001.
2. National Research Council, "Health Effects of Exposure to Radon: BEIR VI," Washington, DC: The National Academies Press, ISBN 978-0-309-
05645-8, 1999.
3. World Health Organization, "WHO guidelines for indoor air quality: Selected pollutants," Copenhagen: World Health Organization Regional Office
for Europe, 2010.
4. Darby S, Hill D, Auvinen A, Barros-Dios JM, Baysson H, Bochicchio F, Deo H, Falk R, Forastiere F, Hakama M, Heid I, Kreienbrock L, Kreuzer
18. M, Lagarde F, Mäkeläinen I, Muirhead C, Oberaigner W, Pershagen G, Ruano-Ravina A, Ruosteenoja E, Rosario AS, Tirmarche M, Tomásek L,
Whitley E, Wichmann HE, Doll R, "Radon in homes and risk of lung cancer: collaborative analysis of individual data from 13 European case-
control studies," BMJ 2005, vol. 330, no. 7485:223, December 2004.
90-96
5. Curado, A., Lopes, S.I., "Impact of Human Occupation on Indoor Radon Concentration: a Study Based on In-Situ Measurements for a Set of
Households in Alto-Minho, Portugal," Proceedings of Behave 2016 - 4th European Conference on Behavior and Energy Efficiency, Coimbra,
Portugal, September 2016.
6. A. Curado, J.P. Silva, L. Carvalho, S.I. Lopes, "Indoor Radon Concentration Assessment in a Set of Single Family Houses: Case Study held in
Barcelos, North of Portugal," Energy Procedia, vol. 136, pp. 109-114, ISSN 1876-6102, 2017. DOI:https://doi.org/10.1016/j.egypro.2017.10.295.
7. S.I. Lopes, J.P. Silva, A. Antão, A. Curado, "Short-Term Characterization of the Indoor Air Radon Concentration in a XII Century Monastery
converted into a School Building," Energy Procedia, Vol. 153, pp. 303-308, ISSN 1876-6102,
2018.DOI:https://doi.org/10.1016/j.egypro.2018.10.036.
8. S.I. Lopes, A. Cruz, P.M. Moreira, C. Abreu, J.P. Silva, N. Lopes, J. Vieira and A. Curado, "On the design of a Human-in-the-Loop Cyber-Physical
System for online monitoring and active mitigation of indoor Radon gas concentration," 2018 IEEE International Smart Cities Conference (ISC2),
Kansas City,MO,USA,pp.1-8,2018.DOI:10.1109/ISC2.2018.8656777.
9. Francesca R d'Ambrosio Alfano, Laura Bellia, Federation of European Heating and Airconditioning Associations, "Indoor environment and energy
efficiency in schools. Part 1, Principles," REHVA guidebook, no. 13, 2010.
10. ASHRAE - AMERICAN SOCIETY OF HEATING, REFRIGERATING AND AIR CONDITIONING ENGINEERS, "Ansi/Ashrae Standard 62.1-
2004. Ventilation for acceptable indoor air quality, " Atlanta, USA, 2004.
11. European Union, "COUNCIL DIRECTIVE 2013/59/EURATOM. E.U. Official Journal, 5", December 2013.
12. Decreto-Lei no 108/2018 de 3 de dezembro da Presidência de Conselho de Ministros. Diário da República: 1.ª série, N.º 232. Lisboa, Portugal,
2018.
13. Corentium Plus by Airthings, "PROFESSIONAL DIGITAL RADON MONITOR", Airthings AS, Oslo, Norway, 2016.
14. World Health Organization, "The International Radon Project (IRP)," Copenhagen: World Health Organization Regional Office for Europe, 2005.
15. World Health Organization, "WHO handbook on indoor radon - a public health perspective," Copenhagen: World Health Organization Regional
Office for Europe, 2010.
16. Chen, J. "A review of radon doses," Radiation Protection Management, vol. 22, no. 4, pp. 27-31, 2005.
17. Chen J., Moir D. "An updated assessment of radon exposure in Canada," Radiation Protection Dosimetry, vol. 140, no. 2, pp. 166-170, 2010.

Authors: Arpee M. Callejo, Amando P. Singun


Paper Title: Abra iTour: A Semantic Web Recommender Using Hybrid Algorithm
Abstract: Information on the web is increasing at an exponential rate. This has resulted in a myriad of choices that are
available for users on the web giving complex processes of the world’s largest database, the Internet. This has also given
birth to the development of data filtering algorithms used in recommender technologies that help users find their best
decision from the large unstructured database of the World Wide Web (WWW). Recommender systems have been widely
used in e-commerce websites like Lazada, Amazon and other popular websites like YouTube, Spotify, Linkedin,
Facebook, and Instagram. Thus, the researchers came up with a study on the development of a recommender system.
This study is a research and development of a recommender system for the province of Abra, Philippines, titled “Abra
iTour: A Semantic Web Recommender Using Hybrid Algorithm”. The system adopted a hybrid algorithm, a combination
of Collaborative and Content-based filtering algorithms to extract data for the recommendation lists that are offered to the
19. users of the system.
IT experts assessed the extent on the level of efficiency of the hybrid algorithm with a 4.59 rating described as Very Great
97-103
Extent. Thus, the hybrid algorithm used by the system is proven. The recommender system ISO 25010 Software Quality
Standards evaluation acquired an overall weighted mean of 4.52, Very Great Extent. This implies that the recommender
system is ready for deployment and implementation.

Index Terms: hybrid filtering algorithm, machine-learning, recommender systems, web mining.

References:
1. Negre, E. (2015). Information and Recommender Systems. France:John Wiley & Sons.
2. Falk, K. (2019). Practical Recommender Systems. New York Manning Publications Company.
3. Arruejo, R. C. (April 2013). Accessibility Mechanism for Univeristy of Northern Philipppines E-Research. In R. C. Arruejo, Accessibility
Mechanism for Univeristy of Northern Philipppines E-Research. Dagupan City.
4. Department of the Interior and Local Government Cordillera Administrative Region. (2018). Department of the Interior and Local Government
Cordillera Administrative Region. Retrieved March 21, 2018, from GOVPH:http://www.dilgcar.com/index.php/2015-07-10-04-38-51/province-of-
abra.
5. Murati, M., & Agaraj, X. (2009). Tourism an Important Sector of Economy Development. Constantin Brancusi University.
6. Singun, A. J. (2016). Application-Based Test Blueprint For A Summative Classroom Assessment. 10th International Management Conference.
EconPapers.
7. Singun A.P. (2018) Heuristics as Mental Shortcuts in Evaluating Interactive Systems. International Journal of Engineering Pedagogy (iJEP) - ISSN:
2192-4880, DOI: 10.3991/ijep.v8i4.8054, https://doi.org/10.3991/ijep.v8i4.8054.
8. Statistica. (2018). Projected yearly growth in information technology (IT) spending worldwide, from 2016 to 2019, by segment. Retrieved March
19, 2018, from Statistica: https://www.statista.com/statistics/268940/percent-growth-in-it-spending-worldwide-by-segment/.
9. Authority. (2018). Philippine Statistics Authority. Retrieved April 2018, 2018, from Philippine Statistics Authority: http://psa.gov.ph.

Authors: Arvin R. De La Cruz, Reginald D. Legaspi, Zildjian L. Mergilla, Marc Oliver P. Otawa
Paper Title: Optical Character Reader of a Braille Unicode System for the Blind
Abstract: This study aspires to innovate braille system by applying the fast coping technological advancement of the
world to it. Braille is a code – a system of dots that represents the letters of the alphabet and that visually impaired
individuals can use to read independently. As Braille Technology is fast growing, more and more people with visual
impairment cannot afford to bought one. Thus, the proponents created a prototype, a portable and a lot cheaper braille
device that will help individuals and institutions for their reading challenges. The proponents created a braille display that
comes up with a scanner that will scan physical text documents then process it to become an output as a braille cell. It
also comes up with a text-to-speech conversion which will become an option for the involved person on what will he or
she chooses as an output. This is made possible by Optical Character Recognition (OCR) technology that the proponents
used in Raspberry Pi. The OCR is responsible for the image processing that will convert the image captured into a text
20. file. The text file will then be processed again to send signal to the servo motor that is responsible for pushing the braille
cells needed. The device also includes motor guide for correct scanning of the physical text documents. The device will
perform the task quickly that will surely help visually impaired individuals to easily read reading materials. This system is 104-107
conducted to provide another solution on problems about reading for blind and visually impaired individuals and to
provide cheaper device for them. It will contribute not only to the community involved but also in the technological
industry in the Philippines.

Index Terms: braille, optical character recognition, raspberry pi, Braille, Unicode System, Optical Character Reader.

References:
1. Bensmaia, Siliman, J., Braille in the Sighted: Teaching Tactile Reading to Sighted Adults (2016)
2. Pojas R., Their Vision is Clearer (2015)
3. Russomanno, A., O'modhrain, S., Gillespie, R.B., Rodger, M.W.M.: Refreshing Refreshable Braille Displays (2015)

Authors: Eileen Rose Cabildo Quilon, Amando Pimentel Singun


Paper Title: Teleconsultation System for Rural Health Units (RHUs) for Metro Vigan, Philippines
Abstract: The inequality in healthcare access remains more serious by the shortage of health workers and providers
resulting to slower and less efficient delivery of healthcare services in the country. In the Province of Ilocos Sur, one of
the main problems is the prolonged waiting time during medical consultation apart from the unavailability of Municipal
Health Officer (MHO) in some of the municipalities in the upland. However, there are Rural Health Midwives who are
assigned in every Rural Health Units (RHUs) and Barangay Health Stations are being established in which Barangay
Health Workers (BHWs) are dynamically working in order to respond to the immediate primary healthcare needs of the
community. To address such aforementioned concerns, Teleconsultation System for Rural Health Units (RHUs) for
21. Metro Vigan, Philippines has been developed. It is an android application that serves as a tool for checking symptoms that
are related to the patient’s health concerns. The system stores information about the various symptoms associated to
particular illnesses. However, the developed system can never be an absolute substitute for medical practitioners’ 108-110
knowledge and expertise. This is only perceived as a helpful tool to support consulting services.

Keywords: Healthcare, Symptoms, Teleconsultation, Mobile Application, Primary Care, Rural Health Units

References:
1. Tumampus J.R., Romero M. J., Espinoza A. P., Cuya-Antonio O., "Factors Influencing the Quality of Health Care Provisions on Local Government
Units," International Journal of Research and Innovation in Social Sciences (IJRISS). Vol II, Issue VII, 2018.
2. Singun A.P. (2018) Heuristics Discovered from Prototyping an Interactive System. In: Auer M., Guralnick D., Simonics I. (eds) Teaching and
Learning in a Digital World. ICL 2017. Advances in Intelligent Systems and Computing, vol 716. Springer, Cham.
Authors: Honer Girl Aninag Avo, Amando Pimentel Singun
Paper Title: Buk CaTrike: A Mobile Application Analyzer for Metro Vigan
Abstract: Gone were the days when the word travelling would be mostly associated to businesspersons and trade.
Nowadays, getting from point A to point B is much convenient with the various modes of transport available to the
public. Way back during the Spanish colonization, the use of calesa was introduced, made available to the upper-class of
the society and it was soon declined in Second World War. During the American occupation, where the advancements
22. arrived, the use of jeeps, cars, bus, and trucks were prevalent and these modes are still popularly to this day. Ilocos Sur’s
Vigan City was enlisted by the United Nations Educational, Scientific and Cultural Organization (UNESCO) as one of
111-115
the best-preserved heritage sites in 1999 and entitled as one of the Seven New Wonder Cities of the World. It is on this
note that the ressearchers have decided to develop Buk CaTrike, a booking application for Vigan calesas and tricycles.
The researchers intend to determine the quality evaluation of the Buk CaTrike application using the ISO 25010:2011
Framework, as perceived by various stakeholders, specifically the kutseros, tricycle drivers, commuters and tourist.
Furthermore, the researchers made use of descriptive and software development design in order to gather information
needed to test the hypothesis or answer the questions concerning in developing the Buk CaTrike: A Mobile Application
Analyzer for Metro Vigan, the Interaction Design Model as Systems Development Life Cycle (SDLC) as a guide in the
development of the application.

Keywords: Booking Application, Mobile Application Analyzer, Transportation

References:
A. Books
1. Canicosa, T., Medina, J., Guzman II, B., Custodio, B., & Portus, A. J. (2018). Usability Evaluation of Ticketing System of Metro Manila Train
Network. In Advances in Usability and User Experience. Los Angeles, USA: Springer International Publishing.
2. Chin, Y. T., Chung, M. Y., & Lam, M. L. (2017). How online-booking system changes aviation. The Hong Kong Polytechnic University.
3. Kortum, P., & Sorber, M. (2015). Measuring the Usability of Mobile Applications for Phones and Tablets. Lawrence Erlbaum Associates.
4. Sakunlertvattana, W. (2016). Factors Influencing Consumer Brand Choice of Top 3 Taxi Booking Mobile Applications in Bangkok: Uber,
GrabTaxi and Easy Taxi. Bangkok University.
B. Articles
5. Feng, F., Liu, Y., & Chen, Y. (2017, July). A computer-aided usability testing tool for in-vehicle infotainment systems. Computers & Industrial
Engineering, Vol 109, pp. 313-324.
6. Hazi, C. (2017, January 26). How to design a booking application that users will love. Webabstract.
7. Knott, D. (2015, June 17). Hand-On Mobile App Testing. InformIT.
8. Lewis, P. (2016, February 1). Transportation is being changed by technology. But what about our transportation policies? Eno Transportaion
Weekly.
9. Lim, A. (2017, February 14). Passengers happier with Uber, Grab than cabs. StraitsTimes.
10. National Express Transit. (2017, August). 5 Transportation Challenges in Urban Areas. Retrieved March 23, 2019 from
https://www.nationalexpresstransit.com/blog/5-transportation-challenges-in-urban-areas/
11. Schneider, B. (2018, February 7). Traffic's Mind-Boggling Economic Toll. citylab.
12. Sharma, M. (2015, November 2). Testing Usability for Mobile Applications. StickyMind A Techwell Community.
13. Stenovec, T. (2016, January 7). More proof that Uber is killing the taxi industry. Business Insider.
14. Stephan, M. (2016, April 25). A Usability Test, with Recommendations for Improvement of Skyscanner's Mobile Flight Search & Booking App:
Part I. A Medium Corporation.
15. Tyler, J. (2018, February). These images shows how traffic is spiraling out of control around the world. Business Inside.
16. Weng, G. S., Zailani, S., Iranmanesh, M., & Hyun, S. S. (2017, December). Mobile taxi booking application service's continuance usage intention
by users. Transportation Research: Part D, Vol. 57., pp. 207-216.
C. Websites
17. Brown, M. (2015). The Trouble with Taxis. Retrieved March 22, 2019 from https://www.rappler.com/views/imho/93480-trouble-with-taxiss
18. Chan, M. (2015). 5 Struggles Every Commuter Faces. Retrieved March 22, 2019 from https://www.travelbook.ph/blog/5-struggles-every-
commuter-faces/
19. Codacy. (2017). ISO 25010 Software Quality Model. Retrieved March 22, 2019 from https://www.codacy.com/blog/iso-25010-software-quality-
model/
20. Francisco, K. (2017). What's the Fuss about the Grab, Uber Regulation Issue?. Retrieved March 21, 2019 from
https://www.rappler.com/newsbreak/iq/176933-you-need-to-know-fuss-grab-uber-ltfrb-regulation-explainer
21. Laurel, D. (2018). We Ask Grab PH Why It's So Hard to Book Rides Lately?. Retrieved March 21, 2019 from
https://www.topgear.com.ph/news/motoring-news/booking-grab-2018-a00013-20180418
22. Mester, T. (2017, April 24). Data36.com. Retrieved March 12, 2018, from Data36: https://data36.com/usability-testing-data-analysts/
23. Mdusm, Prince. (2016). The Importance of Transportation to Tourism Development. Retrieved March 21, 2019 from
https://www.linkedin.com/pulse/importance-transportation-tourism-development-fda-ba-itc-mba-emba/
24. Natividad, C. (2017). Filipino Commuting. Retrieved March 21, 2019 from http://www.theguidon.com/1112/main/2017/11/filipino-commuting/
25. Philips, J. K. (2015, December 1). John K. Philips Group. Retrieved February 21, 2018, from http://www.johnkphilips.co.uk/2015/12/why-is-
transportation-important/
26. Regala, A. M. (2013, June 8). SlideShare. Retrieved March 24, 2018, from SlideShare.net: https://www.slideshare.net/jackomar/descriptive-
research-22678681
27. Valmonte, G. (2016). AdSpark. Retrieved April 18, 2019, from https://adspark.ph/how-to-keep-sms-fresh-in-a-mobile-nation-like-the-philippines/
D. Journals
28. Alonso-Rios, D., Mosqueira-Rey, E., & Moret-Bonillo, V. (2018). A Systematic and Generalizable Approach to the Heuristic Evaluation of User
Interfaces. International Journal of Human-Computer INteraction.
29. Añasco, C., & Lizada, J. (2017). Philippine Tourism: Evolution Towards Sustainability. SHS Web of Conferences.
DOI:10.1051/shsconf/20141201032
30. Atallah, N., Khalifa, M., El Metwally, A., & Househ, M. (2018). The prevalence and usage of mobile health applications among mental health
patients in Saudi Arabia. Computer Methods and Program in Biomedicine, 163-168.
31. Coorey, G. M., Neubeck, L., Mulley, J., & Redfern, J. (2018). Effectiveness, acceptability and usefulness of mobile applications for cardiovascular
disease self-management: Systematic review with meta-synthesis of quantitative and qualitative data. SAGE Journal, 505-521.
32. Dadwal, S., & Hassan, A. (2016). The Augmented Reality Marketing: A Merger of Marketing and Technology in Tourism. Mobile Computing and
Wireless Networks: Concepts, Methodologies, Tools, and Applications. DOI: 10.4018/978-1-4666-8751-6.ch004.
33. Dela Santa, E. (2018). Power and Politics in Tourism Policy and Planning in the Philippines. Managing Asian Destinations. DOI:10.1007/978-981-
10-8426-3_2.
34. El-Kassaas, W., Abdullah, B. A., Yousef, A. H., & Wahba, A. M. (2017). Taxonomy of Cross-Platform Mobile Applications Development
Approaches. Ain Shams Engineering Journal, 163-190.
35. Esmeria, G. J., & Seva, R. R. (2017, June 20-22). Web Usability: A Literature Review. DLSU Research Congress 2017 .
36. Franca, J. and Soares, M. (2015). SOAQM: Quality Model for SOA Applications Based on ISO 25010.
37. Ignas, J. C., & Rebong, C. (2018). Data-Driven Community and Extension Services for Project Decision with Analytics. Asian Journal of
Multidisciplinary Studies , 1 (2).
38. Lausa, S. M., & Algara, R. O. (2018). Mobile-Based Student e-Handbook. Asia Pacific Journal of Multidiciplinary Research , 6 (4).
39. Lumauag, R. G. (2016). SENT SMS: School Event Notification through SMS. Asia PAcific Journal of Multidisciplinary Research , 4 (4), 61-68.
40. Martinez, M., & Lecomte, S. (2017). Towards the Quality Improvement of Cross-Platform Mobile Applications. IEEE/ACM 4th International
Conference on Mobile Software Engineering and Systems.
41. Mckay, F. H., Cheng, C., Wright, A., Shill, J., Stephens, H., & Uccellini, M. (2016). Evaluating mobile phone applications for health behaviour
change: A systematic review. Journal of Telemedicine and Telecare.
42. Natyari, S., & Pradana, M. (2016). Determinants Forming Uber Consumers' Preferences. International Journal of Emerging Technologies in
Engineering Research (IJETER).
43. Pandey, K. (2018). Nature of Tourism Impacts: A Concern for Anthropologists and Tourism Planners. Journal of the Anthropological Survey of
India.
44. Pendergast, F. J., Ridgers, N. D., Worsley, A., & McNaughton, S. A. (2017). Evaluation of a smartphone food diary application using objectively
measured energy expenditure. International Journal of Behavioral Nutrition and Physical Activity.
45. Regidor, J. R., & and Napalang, M. S. (2018). Characteristics of Ridesharing as a Sustainable Transport Tool in Metro Manila. Sustainable
Development Research in the Asian-Pacific Region, 377-390.
46. Sen, S., Das, D., & Ahmed, M. A. (2016, February). A Case Study on On-Street Parking Demand Estimation for 4 wheelers in Urban CBD. Journal
of Basic and Applied Engineering Research.
47. Shawgi, E., & Noureldien, N. A. (2015). Usability Measurement Model (UMM): A New Model for Measuring Websites Usability. International
Journal for Information Science.
48. Singun, A. P. (2017). Usability Metrics for a Web-Based Test Blueprint System. Journal of Engineering and Applied Sciences, 6898-6903.
49. Taentzer, G., Gerlach, R., & Guchert, M. (2018). Model-driven development of mobile applications for Android and iOS supporting role-based app
variability. Software and System Modeling, 35-63.
50. Tupas, A. B. (2015). Design and Development of LPU-B High School Website. Asia Pacific Journal aof Multidisciplinary Research , 3, 94-104.
51. Ventayen, R. J., Estira, K. L., De Guzman, M. J., Cabaluna, C. M., & Espinosa, N. N. (2018). Usability Evaluation of Google Classroom: Basis of
the Adptation of GSuite E-learning Platform. Asia Pacific Journal of Education, Arts and Sciences , 5 (1)
E. Conference Proceedings
52. Hussain, A., Mkpojiogu, E. D., Jamaludin, N. H., & Moh, S. L. (2017). A usability evaluation of Lazada mobile application. AIP Conference
Proceedings
53. Ibrahim, H. E.-D. (2017). Car Parking Problem in Urban Areas, Causes and Solutions. 1st International Conference on Towards a better Quality of
life, 2017.
54. Jabbarvand, R., & Malek, S. (2017). Advancing Energy Testing of Mobile Applications. 2017 IEEE/ACM 39th International Conference on
Software Engineering Companion (ICSE-C). Buenos Aires, Argentina: IEEE.
55. Martinez, M., & Lecomte, S. (2017). Towards the Quality Improvement of Cross-Platform Mobile Applications. 4th International Conference on
Mobile Software Engineering and Systems (MOBILESoft). Buenos Aires, Argentina: IEEE.
56. Paronda, A. G. (2017). An Exploratory Study on Uber, GrabCar, and Conventional Taxis in Metro Manila. Sustainable Build Design 2017.
57. Paz, F., Paz, F. A., Villanueva, D., & Pow-Sang, J. A. (2015). Heuristic Evaluation as a Complement to Usability Testing: A Case Study in Web
Domain. 2015 12th International Conference on Information Technology - New Generations. Las Vegas, NV, USA: IEEE.
58. Shitkova, M., Holler, J., Heide, T., Clever, N., & Becker, J. (2015). "Towards Usability Guidelines for Mobile Websites and. Wirtschaftsinformatik
Proceedings, (p. 107).
Authors: Juliet O. Niega
Paper Title: Sugeno –based Fuzzy Logic Evaluation on the Effect of Weather in Coconut Scale Insect Infestation
Abstract: The purpose of this study is to evaluate the significant influence of weather in Coconut Scale Insect (CSI)
Infestation happened in Batangas using the Fuzzy logic approach. The CSI and weather historical data covering the years
of 2012-2014 were utilized in the study. The weather parameters used are the temperature, relative humidity, and wind
speed. Fuzzy logic applying the Sugeno fuzzy inference system (FIS) in Matlab was used to simulate the effect of each
weather parameters in the infestation. The developed FIS was comprised of the application of triangular membership
function, formulation of 27 If-Then rules, and the center of gravity for defuzzification process. The developed system was
evaluated and tested by generating 100 data samples.

Index Terms: Coconut Scale Insect, weather parameters, fuzzy logic, Sugeno inference system

References:
23. 1. Gamboa, Rey (2014). Cocolisap and other threats to coconut industry Retrieved from:
https://www/philstart.com/business/business/2014/07/29/1351358/
2. Arayata, Ma. Cristina C. (2016, January 5). Science-based treatment for "cocolisap". Retrieved from http:// bayanihan.org/2016/01/05/ feature- 116-119
science-based-treatment- for-cocolisap/
3. Suarez, Danilo (2014). Cocolisap. Manila Standard. Retrived from http://www.manilastandard.net/opinion/columns/over-sight-by-danilo-
suarez/164722/cocolisap.html
4. Villareal, Ruben L. (2014, August 28). The Coconut Scale Insect (CSI) Outbreak in the Philippines.
Retrievedfromhttps://www.phistar.com/science- and technology/2014/08/1362380/
5. Philippine Coconut Authority (2016) Coconut scale insect program report Unpublished report, pp. 1-23. Philippine Coconut Authority, Philippines.
6. Manohar, E.C. & Velasco L.R. (2014). Coconut Scale Infestation in CALABARZON: A Tale of Pest Invasion and Looking Forward to New
Horizon. Retrieved from http://www.pca.da.gov.ph/magnitude.html
7. Narayan Ganesan (2015). A Study of Applications of Fuzzy Lofic in Various Domains of Agricultural Science. Retrieved from
https://www.semanticscholar.org/paper/A-Study-of-Applications-of-Fuzzy-Logic-in-Various-Ganesan/
8. Xing Bai and Dali Wang (2006). Fundamentals of Fuzzy Logic Control- Fuzzy Sets, Fuzzy Rules and Deffuzzification. Retrieved from
https://www.springer.com/cda/content/document/cda.../
9. JM Mendel (1995). Fuzzy logic systems for engineering: a tutorial - IEEE Journals. Retrieved http;//ieeexplore.ieee.org/abstract/
10. Prof. Volmir Wilhelm. Introduction o Fuzzy Inference Systems. Retrived from : https://www.massey.ac.nz/~nhreyes/.../Lec2012-3-159741-
FuzzyLogic-v.2.pdf
Authors: Monish A, B S V S R Krishna
Paper Title: Optimization of Time and Temperature for Thermal Reclamation of Furan Resin Based Sand
Abstract: The moulding sand is an important material in foundries to produce the castings and there is no suitable
substitute for this sand invented so far. The availability of good quality high silica sand suitable for foundry industry is
becoming scarce due to high demand and also strict restriction in mining of sand due to ecological reasons. The
reclamation of used sand is becoming mandatory in order to avoid the scarcity and also disposal of used sand has become
a serious issue due to environment reasons. Hence an attempt has been conducted in detail on furan resin bonded used
sand collected from various foundries in and around Coimbatore area. The furan based used sand properties like loss on
ignition (LOI), total gas evolution, sulphur content & pH were measured. Experiments were conducted in muffle furnace
on collected samples at different time and temperature to identify the suitable and feasible properties of thermally
reclaimed sand with fresh/new sand.
24.
Index Terms: Thermal reclamation, loss on ignition (LOI), total gas evolution, sulphur content, foundry, high silica 120-124
sand.

References:
1. M Venkata Ramana "Moulding sand reclamation- A brief review" IJLET vol5 issue1 pp133-136 (2015)
2. R Danko "innovative developments in sand reclamation technologies" volume no 0543-5846 year 20-08-2010
3. M Holtzer,polish journal of environmental studies volume16 pp168-172 (2007)
4. "Foundry technology" peter beeley,2nd edition,0-7506-4567-9
5. P.C will & R.H. Shurmer "A wet method of sand reclamation" 57th Annual Conference of AFS, Chicago,May 6th 1953
6. J Danko, R Danko, M Holtzer "reclamation of wet sand in foundry production" metalurgita pp173-177 (2003)
7. A .Vogel & J.Campbell " the theory and practice of the thermal reclamation of foundry sand " AFS Transactions Vol pp 25 to 28
8. J.R brown & C Tilt "Thermal reclamation of Foundry sands" British foundry plant & equipment manufacture association conference 1981
9. "Foundry technology" peter beeley,2nd edition,0-7506-4567-9
10. M. Ł ucarz , "Thermal reclamation of the used moulding sands" Metalurgija, 54 (2015) 1, 109-112
11. M. Hosadynaa, St. M. Doboszb*, J. Kusi?ski "Quality of the reclamation sand and the casting surface structure" Archives of foundary engineering "
V11, I1, 39-42, 2011.
12. B. Zhang, M Garro, D. Chautard and C Tagliano, "Gas evolution from resin bonded sand cores prepared by various processes" Metallurgical
Science and Technology, 20(2), 27-32. 2002.
Authors: Lagazo, Magil A., Noriesta, Carla Pamela D., Montecalvo, Marlou A., Roselle P. Alviar-Adviser
Exploratory Research Using Bacteria (Bacillus Subtilis) as a Self-Healing Concrete: A Basis for
Paper Title:
Strengthening Infrastructure in the Philippine Setting
Abstract: This study demonstrates that the utilization of microorganisms-Bacillus Subtlis is productive for development
a tough framework and put forth a concentrated effort mending concrete as strategy for break control to upgrade
administration life in solid structure. In this paper, the system Microbiologically Induced Calcite Precipitation (MICP) is
embraced. It is the utilization of Bacillus Subtilis alongside its nutrients which is the Sodium Bicarbonate (NaHCo3),
Ammonium Carbonate (NH4Cl), Calcium Chloride Dehydrate (CaCl2), and nutrient broth. The mixing proporton used is
1:2 ½: 5:0.45 along with 30 ml liquid form of Bacillus Subtilis with the cell concentration of 105 cells/ml. The strength of
concrete mix is evaluated by conducting test on 150mm x 150mm x 150mm cube for compressive strength test, 6in x 12in
cylindrical mold for split tensile strength test, 21in x 6in x 6in rectangular beams for flexural strength text and 3in x 6in
for water absorption test, 3 specimens each test. All specimen utilized for recuperating is 4in x 2in x 2in which is
deliberately broken. The investigation demonstrates that there is a noteworthy increment in the quality of cement added
with bacteria or bacterial concrete contrasted with conventional concrete and in this manner calcium carbonate
25. precipitation is obvious following 3-4 weeks in small scale splits.

Keywords: Microbiologically Induced Calcite Precipitation, Bacillus Subtilis, Conventional concrete, Bacterial 125-129
concrete.

References:
1. Salmabanu Luhar, Suthar Gourav 1. Research Scholar, Malaviya National Institute of Technology, Jaipur 2. U.G. Student, Civil Engineering
Department, Jaipur J. U., 'A Review Paper on Self-Healing Concrete'
2. Gaurav Agarwal, Rahul Kadam Civil, Mumbai University, India-'Bacterial Concrete - A Solution to Crack Formation'
3. P. Arulsivanantham, R. Gokulan, Divyalakshmi.M.V, Karthikeyan.S, Shilpa Achuthan. Lecturer, Department of Civil Engineering, Ambo
University, Ambo- 19, Ethiopia, 'Bacterial Self-Healing Concrete - An Innovative Repair Technique'
4. ASTM C192 - Standard Practice for Making and Curing Concrete Test Specimens in the Laboratory
5. ASTM C143 - Standard Test Method for Slump of Hydraulic-Cement Concrete
6. L.Soundari Associate Professor Department of civil Engineering, IFET college of Engineering, Villupuram, C.S.Maneesh Kumar Senior Assistant
professor Department of civil Engineering, IFET college of Engineering, Villupuram, S.Anthoniraj UG graduate Department of civil Engineering,
IFET college of Engineering, Villupuram, E.Karthikeyan UG graduate Department of civil Engineering, IFET college of Engineering, villupuram,-
"AN EXPERIMENTAL STUDY ON STRENGTHENING OF CONCRETE BY USING BACTERIAL MINERAL PRECIPITATION,
International Journal of Core Engineering & Management (IJCEM) Volume 2, Issue 9, December 2015
Authors: S Mark Kenneth M. Lindo, Dante L. Silva
Returning Green Through Engineering: Utilization of Monte Carlo Simulation in Assessing Potential
Paper Title:
Lifetime Value of Conventional and Sustainable Building
Abstract: Entering into the age of information where you can quickly access almost anything that happens globally has
proven itself beneficial. This study was conducted to assess the performance of conventional buildings and sustainable or
green buildings in terms of their potential lifetime value. By analyzing the standard specification of green buildings,
people can have a better understanding of this innovation. Data gathered through statistics, literature review, and
evaluation from companies, will determine the quantitative information for the creation of the Mathematical Model by the
use of Monte Carlo simulation. The Monte Carlo simulation was executed using a software to provide histograms. In
order to create scenarios to produce various results, a What-If analysis was also conducted. Consequently, evaluation and
analysis of the costs of conventional and green building, gave way for the researcher to make a conclusion with regards to
their efficiency. The validity of the results was determined based on anecdotal information by professionals who practiced
building sustainable infrastructure. Nevertheless, this research serves as a pilot study to identify the breakeven points
between conventional and green buildings. Furthermore, the researcher believes that a deeper enhancement of the data
might yield to more accurate results.
26.
Index Terms: Conventional Building, Green Building, Mathematical Model, Monte Carlo simulation
130-138
References:
1. Kanika, K. Singh, K. Rana, M. Dahiya, "A comparative study on green and conventional buildings" International Journal of Home Science 2016;
2(2): 338-343
2. N. Know, "Green building costs and savings" March 2015. Available from https://www.usgbc.org/articles/green-building-costs-and-savin gs
3. Q. Xin, "Diesel Engine System Design" Chapter 3, pp. 203-296, 2013
4. Teoalida. "Housing in the Philippines". [Online] 2009. Available from https://www.teoalida.com/world/philippines/
5. A.S. Weerasinghe, T. Ramachandra, N. Thurairajah, "Life Cycle Cost Analysis: Green Vs. Conventional Buildings in Sri Lanka" Proceeding of the
33rd Annual ARCOM Conference, September 2017, Cambridge, UK, Association of Researchers in Concstruction Management, 309-318
6. SA (Philippine Statistics Authority)"Philippines Average Construction Cost". [Online] 2019. Available from
https://tradingeconomics.com/philippines/housing-index?fbcli
d=IwAR3OSIVeKRlnRrDNqcniRgBDyw08Nkh9eR6ePGaq1m_N50MQGGEyHFEsArk
7. MWSS (Metropolitan Waterworks and Sewerage System)."Annual report". Philippines, MWSS, 2019
8. MERALCO (Manila Electric Railroad And Light Company). "Rates Archives". [Online] 2018. Available from
https://company.meralco.com.ph/news-and-advisories/rates-archives
9. Wastewater Gardens. "Estimated Water Consumption in the World".[Online] 2015.Available from
https://wastewatergardens.com/pdf/WWG_InfoSheet_InternationalWaterConsump.pdf?
fbclid=IwAR2JvhPH0OwGznyPGQR929RwzzVHuw6sFdSVJT6ErEH5qTX45d9lAkkpDlc
Authors: Paul Gilbert V. Maglaya, Keaton Martin Varlez, Dan Jayson Panergo
27.
Paper Title: Virtual Reality Fear Treatment
Abstract: Virtual Reality (VR) is a simulated computer generated experience taking place within a virtual environment
that incorporates mainly auditory and visual senses, motion, and perception or the ability to grasp something. In this study
and development, VR will be used as a tool to aid psychologists and psychiatrists in assessing and treating the different
fear levels of patients. VR will simulate different fear scenarios to help patients get used to what they are afraid of, aka
“facing your fear” simulator. This study will cover the flooding and gradual exposure method of treating fear and phobia.
The scenarios are composed of 360 videos and animated 3D scenes that can simulate a fearful event. With the help of VR,
different scenarios can be recreated with cheaper costs and safer risks. The experience can be customized based on the
patient’s level of fear and with the supervision of a licenced professional. A prototype with scenarios for phobias such as
acrophobia, arachnophobia, claustrophobia, cynophobia, and entomophobia are used in the demonstration.

References: 139-140
1. Wikipedia, Virtual Reality https://en.wikipedia.org/wiki/Virtual_reality
2. Myers & Davis 2007, pp. 141-2
3. Joseph, J.S.; Gray, M.J. (2008). "Exposure Therapy for Posttraumatic Stress Disorder". Journal of Behavior Analysis of Offender and Victim:
Treatment and Prevention. 1 (4): 69-80. doi:10.1037/h0100457.
4. Huppert; Roth (2003). "Treating Obsessive-Compulsive Disorder with Exposure and Response Prevention" (PDF). The Behavior Analyst Today. 4
(1): 66-70
5. Chambless, D.L.; Ollendick, T.H. (2001). "Empirically supported psychological interventions: Controversies and Evidence". Annual Review of
Psychology. 52 (1): 685-716. doi:10.1146/annurev.psych.52.1.685. PMID 11148322
6. Reger, G.M.; Gahm, G.A. (2008). "Virtual reality exposure therapy for active duty soldiers". Journal of Clinical Psychology: In Session. 64 (8):
940-6. doi:10.1002/jclp.20512. PMID 18612993.
7. Myers & Davis 2007, pp. 141-2
8. Joseph, J.S.; Gray, M.J. (2008). "Exposure Therapy for Posttraumatic Stress Disorder". Journal of Behavior Analysis of Offender and Victim:
Treatment and Prevention. 1 (4): 69-80. doi:10.1037/h0100457
Sonido, Mark Darwin T., Balcueva, Blizelda M., Pinpin III, Juanito Carlo A.,
Authors:
Mosquera, Rizal M.
Paper Title: Portable Solar Powered Flood Water Purifier System
Abstract: During heavy typhoons, an adapted remote community area in Calamba City, Laguna, Philippines suffers
from lack of drinking water, for they only rely on low lying deep well that may be contaminated by flood water during
heavy storm surge as the community were proximate to Laguna Lake. This study aimed to provide an ideal potable water
during heavy drinking water shortage in a calamity scenario at Sitio Runggot, Brgy. Lecheria, Calamba City, Laguna and
to stand for the waste reproduction by converting flood water into a safe drinking water. This research established a Solar
Powered Portable Water Purifier System that its integrated components can convert flood water into clean drinking water.
This water purifier system can purify and eliminate most types of bacteria and microorganisms on a data gathered in a
specific location for water purification. The combination of 5 technologized filtration industrial membranes made up this
study possible as: Industrial Reverse Osmosis, 7 – pore Ultrafiltration, Sediment Filter (Fine), Carbon Filter and
Ultraviolet Sterilizer. The designed portable prototype was modified to its maximum portability state that will allow solar
energy to be harnessed and used all throughout its whole process as the source of power. Several tests from different
locations were collected and settled within 7, 14, 21, 28 and 35 days for the consideration of flood water stagnancy and
possible microbial growth factor within the time span. This allowed the researchers to determine and set a high bar of
28.
standard and category that allows the subject for water purification using the flood water purifier system.
The study resulted with a concrete finding of having an acceptable value in terms of pH, Conductivity, Coliform count, 141-145
Silica and Lead content, Color (Turbidity) and Alkalinity. The physical water quality tests conducted and analyzed by an
accredited water laboratory in the Philippines of a maximum allowable flood water stagnancy of 35 days showed safe
result to drink the water.

Index Terms: Water purification, Water filtration systems, Antibacterial activity, Reverse Osmosis.

References:
1. Botes, Marelize, and Thomas Eugene Cloete. "The potential of nanofibers and nanobiocides in water purification." Critical Reviews in
Microbiology 36, no. 1 (2010): 68-81..
2. Magnusson, Jan H., and Kristofer J. Magnusson. "Personal water purification systems." U.S. Patent No. 5,273,649. 28 Dec. 1993.
3. Shannon, Mark A., et al. "Science and technology for water purification in the coming decades." Nanoscience and technology: a collection of
reviews from nature Journals. 2010. 337-346.
4. Kuhlmann, K., & Andrews, J. E. (2008). U.S. Patent No. 7,390,417. Washington, DC: U.S. Patent and Trademark Office.
5. Loo, S. L., Fane, A. G., Krantz, W. B., & Lim, T. T. (2012). Emergency water supply: a review of potential technologies and selection criteria.
Water research, 46(10), 3125-3151.
6. Diawara, C. K. (2008). Nanofiltration process efficiency in water desalination. Separation & purification reviews, 37(3), 302-324.
Authors: Banda Gururaj, Kolli Sri Gowri
Paper Title: A Comparison on Control Algorithms for a BEV Propulsion Motor with Road load under NEDC
Abstract: In this paper a Comparative analysis is made between Indirect field oriented control and Space Vector
Modulation based Direct torque control (SVM-DTC) methods to regulate the performance of the propulsion motor of a
Battery Electric Vehicle(BEV) with road load under NEDC drive cycle. Owing to the splendid characteristics like rapid
torque control and higher efficiency, the Induction Motor (IM) is adopted as the preeminent for BEV propulsion motor.
29. The most significant techniques used for propulsion motor torque and speed control are Indirect field oriented control
(IFOC) and Space Vector Modulation based direct torque control (SVM-DTC).In IFOC the propulsion motor control is
146-151
achieved by synthesizing stator currents from two quadrature components, corresponding to flux and torque respectively.
In SVM-DTC decoupling and linearization of current vectors through coordinate transformation is eradicated and a
reference stator flux vector originated by the adaptive motor model provides d and q axis reference voltages fed to SVM.
Simulation results are explored to accentuate the performance of the propulsion motor with road load for both methods
under NEDC drive cycle.
Index Terms: Direct torque control, Indirect field oriented control, NEDC drive cycle, Road load, Space Vector
Modulation, Three phase Induction Motor.

References:
1. Electric Vehicle Technology Explained written by James Larminie Oxford Brookes University, Oxford, UK, John Lowry Acenti Designs Ltd., UK,
John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex PO19 8SQ, England, ISBN 0-470-85163-5, 2003.
2. Hybrid Electric Vehicles Principles and Applications with Practical Perspectiveswritten by Chris Mi, M. Abul Masrur, David Wenzhong Gao, John
Wiley & Sons, Ltd, ISBN 978-0-470-74773-5 (cloth), 2011.
3. X. D. Xue, K. W. E. Cheng, and N. C. Cheung, Selection of Electric Motor Drives for Electric Vehicles, Power Engineering Conference, 2008.
AUPEC '08. Australasian Universities, IEEE Conference, 978-0-7334-2715-2, April 2009, pp.170-176
4. Mounir Zeraoulia, Mohamed El Hachemi Benbouzid, and Demba Diallo, "Electric Motor Drive Selection Issues for HEV Propulsion Systems: A
Comparative Study", IEEE Transactions On Vehicular Technology, Vol. 55, No. 6, November 2006, Pp. 1756-1764.
5. P. Vas, Vector control of AC machines, New York: Clarendon, 1990.
6. Krishnan R.: Electronic Motor Drives: Modeling, Analysis and Control, Upper Saddle River, New Jersey, USA: Prentice Hall, Feb. 2001.
7. Casadei D., Serra G., and Tani A.: FOC and DTC: Two Viable Schemes for Induction Motors Torque Control, IEEE Trans. on
8. T. Brahmananda Reddy, J. Amarnath and D. Subba Rayudu, "Direct Torque Control of Induction Motor Based on Hybrid PWM Method for
Reduced Current Ripple: A sliding Mode Control Approach" ACSE Journal, Volume (6), Issue (4), Dec., 2006, Paper nos. 23-30.
9. K. Sri Gowri, T. Brahmanada Reddy, Ch. Sai Babu, "Direct Torque Control of Induction Motor Based on Advanced Discontinuous PWM
Algorithm for Reduced Current Ripple", Electrical Engineering Journal Springer, ISSN 0948-7921, pp. 245-255, Oct 2010.
10. K. Sri Gowri, T. Brahmanada Reddy, Ch. Sai Babu, "High-Performance Generalized ADPWM Algorithm for VSI Fed IM Drives for Reduced
Switching Losses", International Joint Journal Conferences in Computer, Electronics and Electrical 2009 - CEE 2009, IJRTE, Vol. 2, No. 1, Nov
2009, pp. 96-100.
Authors: R.Prashanthi, C.Sreedhar
Paper Title: A Research on Mobile Cloud Computing in Lightweight Secure Data Sharing
Abstract: With the obvious nature of distributed computing, Smart telephones could store/recuperate particular
information from anyplace at any of point. Therefore, those information security issue on adaptable cloud swings out to
an opportunity to be continuously totally serious and hinders support the difference in the versant cloud. There need help
liberal examinations that bring been provoked enhance those cloud security. Make that concerning delineation it might,
those more fantastic and just them are not appropriate for helpful cloud since Mobile telephones simply have bound
figuring property Furthermore control. Plans for low computational overhead are in the incredible essential to versant
cloud arrangements.
In this paper, we suggest a lightweight information offering mastermind (LDSS) for versant scattered enlisting. It grasps
CP-ABE, an entryway control progression utilized Similarly as An and just customary cloud condition yet changes those
structure about right control tree to make it sensible to flexible cloud conditions. LDSS moves a liberal part of
computational raised gets the chance to control the tree change for CP-ABE from mobile phones ought to outside go
between servers. Furthermore, should reducing the client disavowal cost, it familiarizes trademark depiction fields for
completing lethality forswearing, which is a thorny issue done extend constructed CP-ABE structures. The test goes
something like the display that LDSS could viably diminish the overhead on the remote side at clients would give lion's
share of the information in versant cloud conditions.

References:
30. 1. Chandni Patel, SameerSingh Chauhan Bhavesh Pate, "A Data Security Framework for Mobile Cloud Computing", International Journal of
Advanced Research in Computer and Communication EngineeringVol. 4, Issue 2, February 2015.
2. Shubham Chandugade, Prachi More. "Survey on Lightweight Secured Data Sharing Scheme for cloud computing", International Research Journal 152-155
of Engineering and Technology (IRJET)-ISSN: 2395-0056 Volume: 04 Issue: 10 Oct 2017
3. H. Hong, Z. Sun. "An efficient and traceable KP-ABS scheme with untrusted attribute authority in cloud computing", JoCCASA, 5(2).pp.I -8,201 6.
4. Yu S., Wang C., Ren K., et al. Attribute based data sharing with an attribute revocation. in: Proceeding of 5th International Symposium on
Information, Computer and Communication Security (ASIACCS), New York, USA: ACM press, 2010.
5. L. Touati and Y. Challal, "Efficient cp-abe attribute/key management for iot applications," in Computer and Information Technology (CIT), IEEE
International Conference on 2015.
6. Jia W, Zhu H, Cao Z, et al. SDSM: a secure data service mechanism in mobile cloud computing. in: Proceedings of 30th IEEE International
Conference on Computer Communications. Shanghai, China: IEEE, pp. 1060- 1065, 2011.
7. Denisow, S. Zickau, F. Beierle, and A. K¨upper, "Dynamic location information in attribute-based encryption schemes," in Proceeding of 9th
International Conference for Next Generation Mobile Application, Services and Technologies (NGMAST 2015). IEEE, 2015.
8. Sahai, H. Seyalioglu, and B. Waters, "Dynamic credentials and ciphertext delegation for attribute-based on encryption," in Advance in the
Cryptology-CRYPTO. Springer, 2012.
9. X. Liang, Z. Cao, H. Lin, and 1. Shao, "Attribute based proxy re-encryption with delegating capa-bilities," in Proc. 4th ACM Int. Symp.
10. Yu S., Wang C., Ren K., Lou W. "Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing". INFOCOM 2010.
11. Yu S., Wang C., Ren K., Lou W. Achieving Scalable, Secure and Fine-grained Data Access Control in Cloud Computing. INFOCOM 2010, pp.
534-542, 2010
12. Priya Dudhale Pise,Dr. Nilesh J Uke,"Efficient Security Protocol for Sensitive Data Sharing on Cloud Platform" in IEEE 2017.
13. Kan Yang, XiaohuaJia, Bo Zhang, RuitaoXie: "DACMACS: Effective Data Access Control for Multiauthority Cloud Storage Systems". IEEE
Transactions on Data Forensics and Security, Vol. 8, No. 11, pp.1790 1801, 2013.
14. Sahai A, Waters B. Fuzzy identity based encryption. in: Proceedings of the Advances in Cryptology. Aarhus, Denmark: Springer-Verlag, pp.457-
473, 2005.
15. Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute IEEE Transactions on Cloud Computing, January 2017 based encryption: Proceeding
of 2007 IEEE Symposium on Security and Privacy (SP). Washington, USA: IEEE Computer Society, pp. 321-334, 2007.
Authors: C. Sreedhar, N. Kasiviswanath
Paper Title: Deep Learning: A Perspective Experiment
Abstract: Deep learning has gained its attractions towards the researchers, academicians and several other organizations
in the research areas of big data, genomics, natural language processing, healthcare and brings several challenges and
31. opportunities for various domains such as cosmology, pharmacy and astrophysics. With the increased growth of the data
produced by our digital world, deep learning becomes inevitable in providing solutions to the complex and real world 156-159
problems. It is not far for the researchers to find the solutions for the complex problems to be solved till date such as birth
of stars, genetic mutations, cosmological and even the birth and extended life of living organisms. Deep learning will
definitely be the active component in finding solutions to such problems. This paper makes an attempt to present the
research studies in deep learning with various perspectives.

Index Terms: deep learning, big data, machine learning, applications, artificial intelligence.

References:
1. Haohan Wang, Aman Gupta, and Ming Xu. Extracting compact representation of knowledge from gene expression data for protein-protein
interaction. International Journal of Data Mining and Bioinformatics, 17(4):279-292, 2017b..
2. I. Goodfellow, Y. Bengio, A. Courville, "Deep Learning", Cambridge, MA: MIT Press, 2017.
3. A. De Mauro, M. Greco, M. Grimaldi, "A formal definition of Big Data based on its essential features", Library Review, Vol. 65 Issue: 3, 2016,
pp.122-135.
4. Haohan Wang, Bhiksha Raj, and Eric P Xing. On the origin of deep learning. arXiv preprint arXiv:1702.07800, 2017d.
5. Tianwei Yue, Haohan Wang, "Deep Learning for Genomics: A Concise Overview", Handbook of Deep Learning Applications, arXiv:1802.00810,
2018.
6. Jian Yang, Noah A Zaitlen, Michael E Goddard, Peter M Visscher, and Alkes L Price. Advantages and pitfalls in the application of mixed-model
association methods. Nature genetics, 46(2):100-106, 2014.
7. Rui Xie, Jia Wen, Andrew Quitadamo, Jianlin Cheng, and Xinghua Shi. A deep autoencoder model for gene expression prediction. BMC genomics,
18(9):845, 2017.
8. P. Dadvand, R. Lopez, and E. O˜nate, "Artificial neural networks for the solution of inverse problems". In Proceedings of the International
Conference on Design Optimisation Methods and Applications ERCOFTAC, 2006.
9. J.J. Hopfield, "Neural networks and physical systems with emergent collective computational abilities". In Proceedings of the National Academy of
Sciences, volume 79, pages 2554-2558, 1982
10. C. Sreedhar, Dr. N. Kasiviswanath "A Survey on Big Data Management", International Journal of Engineering Research And Management
(IJERM), Volume.02, Issue 04, pp. 24-28, ISSN: 2349-2058, April 2015.
11. Sheng Wang, Siqi Sun, Zhen Li, Renyu Zhang, and Jinbo Xu. Accurate de novo prediction of protein contact map by ultra-deep learning model.
PLoS computational biology, 13(1): e1005324, 2017e.
Authors: Nayeemuddin.M, T. Bramhanada Reddy, M.Vijaya Kumar
Performance evaluation of multiple carrier scalar PWM Algorithms for Cascaded Multilevel Inverter fed
Paper Title:
Induction Motor Drive
Abstract: This paper explores and compares about different multiple carrier PWM techniques for three-level three-
phase voltage source Inverter. Several algorithms for CMV decrease have been proposed in the literature. This paper
investigate four various control strategies namely Common Carrier (CC), Inverted Carrier (IC), Phase Shifted (PS) and
Inverted Phase Shift (IPS) for cascaded multilevel inverter fed induction motor drive. In Sinusoidal PWM, variable AC
output voltage of inverter is produced by comparing a sinusoidal reference signal with triangular signal, where as
Conventional SVPWM utilizes complex voltage vector for PWM control. It is seen that SVPWM method makes it
conceivable to the fundamental output voltage to increase 15.5% in comparison with SPWM. More over traditional
SVPWM method requires angle and sector information for calculating sequences for the gate terminal of the inverter, a
simplified SVPWM algorithm is also described, which does not require angle and sector calculation. In this algorithm
with the proposed technique it easy to program for pulse patterns generation of various multi carrier based PWM
algorithms. To verify and validate the proposed research work laboratory experimental tests have been conducted using
dSPACE controller, which proved the reduction in common-mode voltage with fewer harmonics for a motor drive.

Index Terms: Cascaded inverters, multicarrier PWM, SVPWM, common mode voltage (CMV), Total Harmonics
32. Distortion.
160-165
References:
1. G. Narayanan and V.T. Ranganathan, Triangle comparison and space vector approaches to pulse width modulation in inverter fed drive. Journal of
Indian Institute of Science,2000,pp 409-427.
2. Fei Wang, " Sine-Triangle versus space vector modulation for three level PWM voltage sourceinverters",1EEE Trans.lnd Applicat.,vol. 38,no. 2,
March 2002.
3. Dae-Woong Chung, Joohn-Sheok Kim, Seung-Ki Sui, "Unified Voltage Modulation Technique for Real-Time Three-Phase Power Conversion"
IEEE Trans. On Ind. Applications, vol. 34, no.2, pp 374-380. 1998.
4. M. Malinowski, K. Gopakumar, J. Rodriguez, Pe, x, and M. A. rez, "A Survey on Cascaded Multilevel Inverters," Industrial Electronics, IEEE
Transactions on, vol. 57, 2010, pp. 2197-2206.
5. J. Rodriguez, S. Bernet, W. Bin, J. O. Pontt, and S. Kouro, "Multilevel Voltage-Source-Converter Topologies for Industrial Medium-Voltage
Drives," Industrial Electronics, IEEE Transactions on, vol. 54, 2007,pp. 2930-2945.
6. K. Corzine and Y.Familiant.,A new cascaded H-Bridge drive. IEEE Trans. Power Electronics, 17(1), 2002, pp 125-131.
7. A. Nabae, I. Takahashi and H. Akagi. A new neutral point clamped PWM inverter. IEEE Trans. Ind. Appl., 1981, 17(5), pp 518-522.
8. Madhav D. Manjrekar, Thomas A. Lipo, "A Hybrid Multilevel Inverter Topology for Drive Applications", IEEE - APEC - 1998, California, pp.523-
529.
9. A.Rufer, M.Veenstra, K.Gopakumar, "Asymmetric multilevel converter for high resolution voltage phasor Generation", EPE'99, Lausanne, pp. P1-
P10.
10. Bum-Seok Suh, Dong-Seok Hyun, "A New N-level High Voltage Inversion System", IEEE Trans. Ind.Electronics, vol.44, No.1, pp.107-115,
Feb.1997.
Authors: B. Lalitha, T.Ramashri
Paper Title: Brain Tumor MR Image Detection and classification using kernel SVM
Abstract: At Present Day the detection and classification of brain tumor MR Image is more complicated and time
consuming task. Further experts are required for detection of tumor in brain which may lead to misclassification. Tumor
in brain is an growth of unwanted cells which lead to cancer. In this paper k means clustering technique is used for
Segmentation of tumor region from brain MRI . Features are extracted such as mean, median, skweness etc.. This
33. Extracted feature will give more information content of tumor which helps in classification of tumor as Normal or
Abnormal using Kernel SVM Classifier. 166-169

Key Words: MRI Image, GLCM, K Means clustering, Kernel Support vector machine.

References:
1. Nidhi, P. Kumari, "Brain Tumor and Edema Detection Using Matlab", International Journal of Computer Engineering and Technology
(IJCET), ISSN 0976 -6375(Online), Issue 3,Volume 5, , March (2014), pp.122-131.
2. L. Guo, L. Zhao, Y. Wu, Y. Li, G. Xu, and Q. Yan, "Tumor detection in MR images using one-class immune feature weighted SVMs," IEEE
Transactions on Magnetics, 3849-3852, 2011,vol. 47, no. 10, pp.
3. R.Kumari, "SVM classification an approach on detecting abnormality in brain MRI images, ISSN 1686-1690, 2013."International Journal of
Engineering Research and Applications, vol. 3, pp.
4. S. Damodharan and D. Raghavan, "Combining tissue segmentation and neural network for brain tumor detection," International Arab Journal of
Information Technology, , pp.42-52, 2015, vol. 12, no. 1.
5. Q. Ain, M. A. Jaffar, and T.-S. Choi, "Fuzzy anisotropic diffusion based segmentation and texture based ensemble classification of brain tumor,"
vol. 21, pp. 330-340, 2014.Applied Soft Computing Journal.
6. E. A. Zanaty, vol. 45,pp. 16-22, 2012. "Determination of gray matter (GM) and white matter (WM) volume in brain magnetic resonance images
(MRI)," International Journal of Computer Applications,
7. Y. Kong, Y. Deng, and Q. Dai, "Discriminative clustering and feature selection for brain MRI segmentation," vol. 22, no. 5, pp. 573-577,
2015,IEEE Signal Processing Letters.
8. A. Demirhan, I. Guler and M. Toru,, "Segmentation of tumor and edema along with healthy tissues of brain using wavelets and neural networks,"
IEEE Journal of Biomedical and Health Informatics, pp. 1451-1458, 2015, vol. 19, no. 4.
9. W. Cui, Y. Wang, Y. Fan, Y. Feng, and T. Lei, "Localized FCM clustering with spatial information for medical image segmentation and bias field
estimation," International Journal of Biomedical Imaging, vol. 2013, 8 pages, 2013, Article ID 930301.
10. V. K. Dehariya, S. K. Shrivastava, R. C. Jain,"Clustering of Image Data Set Using K-Means and Fuzzy K-Means Algorithms", , pp. 386-391, 2010,
International conference on CICN.
11. D. L. Pham, C. Y. Xu, J. L. Prince, A Survey of Current Methods in Medical Image Segmentation, In Annual Review of Biomedical Engineer,
12. Chen W, Smith R, Nabizadeh N, Ward K, Cockrell C, Ha J, et al. Texture analysis of brain CT scans for ICP prediction, in image and signal
processing. p. 568-75.(2000),Berlin Heidelberg: Springer-Verlag; 2010.
Authors: Nayeemuddin, S.Zahoor-ul-Huq, K.V.Rameswara Reddy, P.Penchala Prasad
Paper Title: IoT based Real Time Health Care Monitoring System using LabVIEW
Abstract: In the latest decade the human administrations checking systems have drawn huge contemplations of the
analysts. This work presents, an IoT based remote medical administrations checking structure that can give continuous
data on the web information about physiological conditions of a patient. The proposed system is expected to measure and
screen basic physiological data of a patient remembering the ultimate objective to exactly depict the status of her/his
prosperity and health. In like manner the proposed structure can give the patient prosperity status on the web. By using
that information the social protection master can give crucial therapeutic admonishing. The system fundamentally
contains sensors, the data verifying unit, microcontroller (i.e., myDAQ), and programming (i.e., LabVIEW). The patient's
temperature, heart beat rate, circulatory strain and ECG data are checked, appeared, and put away by the structure. The
put away data can be used to envision the probability of patient getting heart ambush. To ensure reliability and accuracy
the proposed structure has been attempted field test. The test results exhibit that the proposed structure can check the
34. patient's physiological data with a high precision.
170-174
Keywords: Health Care, Internet of Things, patient monitoring, LabVIEW.

References:
1. Bourouis, A. , Feham, M., And Bouchachia, A,(2011), "Ubiquitous Mobile Health Monitoring System For Elderly (UMHMSE)", International
Journal Of Computer Science And Information Technology, Vol.2, No.3, June,Pp.74-82 .
2. Orlando R. E. P., Caldeira, M. L. P. Lei S., And Rodrigues, J. P. C (2014), "An Efficient And Low Cost Windows Mobile BSN Monitoring
Systembased On Tinyos", Journal Of Telecommunication Systems, Vol.54, No.1,Pp.1-9.
3. Lei Clidton, David A. Clifton, Marco A. F. Pimentel, Peter J. Watkinson, And Lionel Tarassenko (2014),"Predictive Monitoring Of Mobile
Patients By Combining Clinical Observations With Data From Wearable Sensors",IEEE Journal Of Biomedical And Health Informatics,
Vol.18,No.3,May,Pp. 722-730
4. Parane,K.A., Patil, N.C. ; S.R. ; Kamble, T.S(2014) "Cloud Based Intelligent Healthcare Monitoring System", In The Proceedings Of
International Conference On Issues And Challenges In Intelligent Computing Techniques (ICICT),February 7-8, India,pp.697-701
5. Tello,J.P. ; Manjanes, O. ; Quijano, M.; Blanco,A.Et AL(2013), "Remote Monitoring System Of ECG And Human Body Temperature Signals",
IEEE Latin American Transaction, No.1, February,Pp.314-318.
Authors: S.Subbalakshmi, K.Madhavi
Paper Title: A Research on Bigdata Privacy Preservation Methods
Abstract: Big data is massive collection of big and complex data sets that cannot be stored and processed using
traditional data processing systems. Hence big data requires high computational power and storage and big data uses
distributed system. Big data Analytics means analyzing invisible data patterns from the larger data sets. The data sets are
gathered from various sources i.e. social media, Business sector, healthcare, data governance, various institutions, etc. So,
privacy and security is main concern in big data. This paper mainly focuses on l anonymity techniques preserve the
privacy of data. This research aims to highlight three main Anonymization techniques used in a medical field namely, k-
anonymity, l-diversity, and t-closeness.

Key words: Big data, Privacy, security, Data Anonymization-anonymity, l-diversity, t-closeness.
35.
References:
1. Big Data Management and Analysis, December 2014? 175-177
2. A Cloud Securty Alliance Collaborative research, "Expanded Top Ten Big Data Security andPrivacy challenges" , April 2013.
3. A Survey on Big Data & Privacy Preserving Publishing Techniques2017.
4. Xiao Z, Xiao Y. Security and privacy in cloud computing. In: IEEE Trans on communications surveys and tutorials, vol 15, no. 2, 2013. p. 843-59
5. Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage Kaitai Liang, Willy Susilo, Senior Member, IEEE, and Joseph K. Liu
2015.
6. Privacy Preservation in the Age of BigData :A SurveyJohn S. Davis II, Osonde A. Osoba
7. Protection of Big Data Privacy IEEE access January 2016
8. Privacy Preservation in Big DataAugust 2014
9. L. Sweeney, "k-anonymity: A model for protecting privacy," International Journal on Uncertainty, Fuzziness and Knowledge-Based Systems, pp.
557-570, 2002.
10. B. C. M. Fung, K. Wang, R. Chen, and P. S. Yu, ``Privacy-preservingdata publishing: A survey of recent developments,'' ACM Comput. Surv.,vol.
42, no. 4, Jun. 2010, Art. no. 14.
11. Big Data Privacy Methods , 2017 IJEDR | Volume 5, Issue 2 | ISSN: 2321-9939.
12. J. Sedayao, "Enhancing cloud security using data anonymization", White Paper, Intel Coporation.
13. Machanavajjhala, A., Kifer, D., Gehrke, J.and Venkitasubramaniam, M., 2007. l-diversity:Privacy beyond k-anonymity.ACM Transactions
onKnowledge Discovery from Data (TKDD), 1(1), p. 3.
14. Li, Ninghui, Tiancheng Li, and Suresh Venkatasubramanian. "t-closeness: Privacy beyond k-anonymity and l-diversity." Data Engineering, 2007.
ICDE 2007. IEEE 23rd International Conference on.IEEE, 2007.
15. Truta, T. M., Campan, A. and Meyer, P., 2007.Generating microdata with p-sensitive k-anonymity property(pp. 124-141). Springer Berlin
Heidelberg.
16. ℓ-Diversity: Privacy Beyond k-Anonymity Ashwin Machanavajjhala Johannes Gehrke Daniel Kifer
17. A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. ℓ-diversity: Privacy beyond k-anonymity.Availableat
http://www.cs.cornell.edu/?mvnak, 2005.
18. Li, N., Li, T., and Venkatasubramanian, S., "t-closeness: Privacy beyond kanonymity and l-diversity", In oceedings of the 21st IEEE International
Conference on Data Engineering (ICDE), 2006.
N. Eswaramoorthy, M. Siva Ramkumar*, G. Emayavaramban, A. Amudha, S. Divyapriya, M. Sivaram
Authors:
Krishnan, D. Kavitha
A Control Strategy for A Variable Speed Wind Turbine with A Permanent Magnet Synchronous Generator
Paper Title:
Using Matrix Converter with SVPWM
Abstract: With the aim of meeting the power demands, considering the economical and environmental factors, wind
energy [11] conversion is slowly garnering interest in the form of a desirable source of renewable energy. In this work, a
grid connected wind power generation approach employing a doubly fed induction generator with a direct AC-AC matrix
converter[4] is introduced.
The objectives of this research work include: To model and then simulate the operation of a doubly fed induction
generator. The analysis uses a space vector modulated [1] matrix converter for controlling the rotor current. The matrix
converter-based rotor current control approach [9] is focused. The system facilitates the optimal speed tracking for
capture of maximum energy from the wind and high performance active and reactive power control utilizing the RST
regulator. Finally, the simulation results achieved, for various operating points, are studied, showing the system’s good
control performances.

Keywords: PMSG, RSC, GSC, Total Harmonic Distortion, MPPT, PLL-Grid Control Loop Controller, MATLAB/
SIMULINK.

References:
1. M. Magesh Kumar , R. Sundareswaran, PMSG Based Wind Energy Conversion with Space Vector Modulation, International Journal of Energy and
Power Engineering,2015.
2. V. Kumar, R. R. Joshi, and R. C. Bansal, "Optimal Control of Matrix Converter Based WECS for Performance Enhancement and Efficiency
Optimization" IEEE Trans. Energy Conversion, vol. 24, No. 1, March 2009, pp. 264-273.
3. KedarPatil, Modeling and Control of Variable Speed Wind Turbine with Permanent Magnet Synchronous Generator, IEEE International
Conference on Advances in Green Energy (ICAGE'14), 2014.
4. CS Ajin Sekhar , R Hemantha kumar, Space Vector Modulation Based Direct Matrix Converter for Stand- Alone system, International Journal of
Power Electronics and Drive System (IJPEDS) Vol. 4, No. 1, March 2014 pp. 24-35.
5. K.Chikh, A.Saad, M.Khafallah and D.Yousfi," A Novel Drive Implementation for PMSM By using Direct Torque Control with Space Vector
Modulation", Canadian Journal on Electrical and Electronics Engineering Vol. 2, No. 8, August 2011.
6. Wei Qiao, Wei Zhou, José M. Aller, and Ronald G. Harley, "Wind Speed Estimation Based Sensorless Output Maximization Control for a Wind
Turbine Driving a DFIG", IEEE Transactions on Power Electronics, Vol. 23, No. 3, pp. 1156-1169, May 2008.
7. Z. Shu, J. Tang, and J. Lian, "An efficient SVPWM algorithm with low computational overhead for three phase inverters," IEEE Trans. Power
36. Electron., vol. 22, no. 5, pp. 1797-1805, Sep. 2007.
8. Dr.A.Amudha, M.Siva Ramkumar , M.,SivaramKrishnan "Perturb and Observe Based Photovoltaic Power Generation System For Off-Grid Using
Sepic Converter" International Journal of Pure and Applied Mathematics , 114(7), pp. 619-628 , 2017 .
9. M.Siva Ramkumar, M.Sivaram Krishnan, Dr.A.Amudha "Resonant Power Converter Using GA For PV Applications" International Journal Of 178-186
Electronics, Electrical And Computational System,6 (9) pp239-245 , 2017.
10. M.Siva Ramkumar, M.Sivaram Krishnan, Dr.A.Amudha "Impedance Source Inverter and Permanent Magnet Synchronous Generator For
Variable Speed Wind Turbine " International Journal of Computer & Mathematical Sciences (IJCMS) 6 (9) pp 98-105, 2017.
11. M.Siva Ramkumar "Unmanned Automated Railway Level Crossing System Using Zigbee" in International Journal of Electronics Engineering
Research (IJEER) 9 (9) pp1361-1371, 2017.
12. M. Sivaram Krishnan M. Siva Ramkumar and A. Amudha "Frequency Deviation Control In Hybrid Renewable Energy System Using Fc-Uc " in
International Journal of Control Theory and Applications (IJCTA) 10 (2) pp 333-344, 2017.
13. M Siva RamKumar, Dr.AAmudha, R.Rajeev "Optimization For A Novel Single Switch Resonant Power Converter Using Ga To Improve Mppt
Efficiency Of Pv Applications" in International Journal of Applied Engineering Research (IJAER) 11(9) pp 6485-6488, 2016. .
14. M.Sivaram Krishnan ,M.Siva Ramkumar and M.Sownthara "Power Management Of Hybrid Renewable Energy System By Frequency Deviation
Control" in 'International Journal of Innovative Research in Science, Engineering and Technology' on 3 (3) pp 763-769,2016.
15. R.Sudhakar and M.Siva Ramkumar "Boosting With SEPIC" in 'International Journal of Engineering and Science' 3 (4) pp 14-19,2014.
16. M.Sownthara and M.Siva Ramkumar "Wireless Communication Module To Replace Resolver Cable In Welding Robot" in International Journal of
Advanced Information Science and Technology on 23(23 ) pp 230-235,2014.
17. M.Siva Ramkumar and M.Sivaram Krishnan "Hybrid Solar-Wind Energy System" in 'International Journal of Advance Research in Computer
Science and Management Studies' 2(2), 2014.
18. M.Sivaram Krishnan and M.Siva Ramkumar "Power Management Of A Hybrid Solar-Wind Energy System" in 'International Journal of
Engineering Research & Technology' 2 (1) pp1988-1992, 2014.
19. M.Sivaram Krishnan and M.Siva Ramkumar "Power Quality Analysis In Hybrid Energy Generation System" in 'International Journal of Advance
Research in Computer Science and Management Studies 2 (1) pp 188-193,2014
20. S. Ananthanarayanan, Dr.A. Amudha, Dr.K. Balachander, M. Siva Ramkumar and D. Kavitha, "Design and Analysis of Power Quality
Improvement in Distribution Side Using PCC Technique with Fuzzy Logic Control" Journal of Advanced Research in Dynamical and Control
Systems, (12), pp 844-852
21. T. Kalimuthu, M. Siva Ramkumar, Dr.A. Amudha, Dr.K. Balachander and M. Sivaram Krishnan "A High Gain Input-Parallel Output-Series
DC/DC Converter with Dual Coupled-Inductors" Journal of Advanced Research in Dynamical and Control Systems, (12), pp 818-824

22. C. Chinnusamy, Dr.G. Emayavaramban, Dr.A. Amudha, Dr.K. Balacahnder and M. Siva Ramkumar,"Transient Stability Improvement in Power
System with SMES and Battery Energy Storage System" Journal of Advanced Research in Dynamical and Control Systems, (12), pp 900-914
23. K. Kaleeswari, Dr.K. Balachander, Dr.A. Amudha, M. Siva Ramkumar and D. Kavitha, "Analysis and Parallel Operation of Novel Bidirectional
DC-DC Converter for DC Micro Grid" Journal of Advanced Research in Dynamical and Control Systems, (12), pp 928-940
24. M. Jayaprakash, D. Kavitha, M. Siva Ramkumar, Dr.K. Balacahnder and M. Sivaram Krishnan, "Achieving Efficient and Secure Data Acquisition
for Cloud-Supported Internet of Things in Grid Connected Solar, Wind and Battery Systems" Journal of Advanced Research in Dynamical and
Control Systems, (12), pp 966-981
25. Li unwei, S.Ramkumar, G. Emayavaramban, D.Frankl n vinod, M. Thilagaraj, V. Muneeswaran, M. Pallikonda Rajasekaran, V. Venkataraman,
Ahmed Faeq Hussein, IEEE Access, "Brain Computer Interface for Neurodegenerative Person Using Electroencephalogram", pp.2439 - 2452
Vol.(7), 2019.
26. Gu Jialu, S.Ramkumar, G. Emayavaramban, M. Thilagaraj, V.Muneeswaran, M. Pallikonda Rajasekaran, Ahmed Faeq Hussein "Offline Analysis
for Designing Electrooculogram Based Human Computer Interface Control for Paralyzed Patients" IEEE Access, 2018 , Vol.(6), pp: 79151 - 79161.
27. G.Emayavaramban, S.Ramkumar, A.Amudha, "Classification of Hand Gestures Using FFNN and TDNN Networks", International Journal of Pure
and Applied Mathematics, Vol.118 (8), 27-32.
28. G Emayavaramban, A Amudha, "Identifying Hand Gestures Using SEMG for Human Machine Interaction", ARPN Journal of Engineering and
Applied Sciences, Vol.11 (21), pp.12777-12785.
29. G Emayavaramban, A Amudha, "Recognition of sEMG for Prosthetic Control Using Static and Dynamic Neural Networks", International Journal
of Control Theory and Applications, Vol. 9 (24), pp.205-215.
30. D.Kavitha, Dr.C.Vivekanandan, "AnAdjustable Speed PFC Buck- boost Converter Fed Sensorless BLDC Motor" in International Journal of
Applied Engineering Research, ISSN 0973-4562 Vol. 10 No.20 (2015), pg. 17749-17754.
31. D. Kavitha, N. Sivakumar, M. Siva Ramkumar, V. Bhavithira, and S. Kalaiarasi, "A Single Stage High Gain Converter for Grid Interconnected
Renewable Application using Perturb and Observe" in International Journal of Control Theory and Applications, ISSN: 0974-5572 Vol. 10 No.38
(2017), pg. 161-175.
32. D.Kavitha, Dr.A.Amudha and S.Divyapriya, "Design of Controller for Regenerative Braking using BLDC Motor Applicable for Electric Vehicle"
in International Journal of Electronics, Electrical and Computational System- IJEECS, ISSN 2348-117X, Volume 6, Issue 9, September 2017,
pg.245-252
33. K. Govindaraju, V. Bhavithira, D. Kavitha, S. Kuppusamy, and K. Balachander, "Improvement of Voltage Profile and Loss Minimization in IEEE
14 Bus System using FACTS Devices" in International Journal of Control Theory and Applications, ISSN: 0974-5572 Vol. 10 No.38 (2017), pg.
213-224.
34. Xin Wan , Kezhong Zhang1, S. Ramkumar J. Deny,G. Emayavaramban , M. Siva RamkumarAnd Ahmed Faeq Hussein ," A Review on
Electroencephalogram Based BrainComputer Interface for Elderly Disabled" in IEEE Access, 2019 , Vol.(7), pp: 36380 - 36387.
35. Dr.A.Amudha, M.Siva Ramkumar, M.Sivaram Krishnan "DESIGN AND SIMULATION OF ZETA CONVERTER WITH ZVZCS SWITCHING
TECHNIQUE" Journal of Engineering and Applied Sciences ,14(9) pp 2764-2774 DOI: 10.3923/jeasci.2019.2764.2774
36. M. Sivaram Krishnan, S. Sri Ragavi, M. Siva RamKumar, D. Kavitha "Smart Asthma Prediction System using Internet of Things" Indian Journal of
Public Health Research & Development, 10 (2) , pp 1103-1107 .DOI:10.5958/0976-5506.2019.00445.5
P. Jeyalakshmi, M. Siva Ramkumar*, IR.V. Mansoor, A. Amudha, G. Emayavaramban, D. Kavitha,
Authors:
M. Sivaram Krishnan
Application of Frequency based Matrix Converter in Wind Energy Conversion System Employing
Paper Title:
Synchronous Generator Using SVPWM Method
Abstract: Renewable energy is garnering the attention of people with rising global energy consumption and perceivable
environmental pollution all across the universe. The rising size of wind farms needs power system stability analysis [7]
inclusive of dynamic wind generator models. In the case of turbines with power greater than 1MW, doubly-fed induction
machines are the most popularly utilized concept. But, direct-drive wind generators that depend on converter-driven
synchronous generator concepts [11] have attained substantial penetration in the market. This research work introduces
converter driven synchronous generator model utilizing frequency based matrix converter [9] with the aid of SVPWM
approach [6] and the parameters such as stator and grid voltage/current are measured and the overall THD of the system
is analyzed. The matrix converter with frequency based technique is utilized for converting the variable voltage to a stable
value, which can be connected to a grid.

Keywords: SVPWM, THD, Matrix Converter, Synchronous Generator, MATLAB/SIMULINK.

References:
1. S. Masoud Barakati, Modeling and Controller Design of a Wind Energy Conversion System Including a Matrix Converter,2008.
2. S. Tao, "Power quality of grid-connected wind turbines with DFIG and their interaction with grid," Ph.D. dissertation, Aalborg Univ., Aalborg,
Denmark, 2004.
3. H. Wang, W. Wang and L. Bin, "Power quality analysis and system simulation on permanent magnet direct-drive wind turbine," International
conference on Electrical Machines and Systems, ICEMS, Wuhan, China, 2008, pp. 866-869.
4. S.A. Papathanassiou and M.P. Papadopoulos, "Harmonic analysis in a power system with wind generation," IEEE Trans. Energy Convers, vol. 21,
no. 4, pp. 2006-2016, 2006.
5. P. Tenca, A.A. Rockhill and T.A. Lipo," Wind turbine current-source converter providing reactive power control and reduced harmonics," IEEE
Trans. Energy Convers, vol. 43, no. 4, pp. 1050-1060, 2007.
37. 6. N.S. Ting, Y. Yasa, I. Aksoy and Y. Sahin, "Comparison of SVPWM, SPWM and HCC control techniques in power control of PMSG used in wind
turbine systems," Intl Conference on Electrical Machines & Power Electronics, ACEMP, Crystal Admiral, Turkey, 2015, pp. 69-74.
7. P. Ledesma, J. Usaola, and J. L. Rodríguez, "Transient stability of a fixed speed wind farm," Renewable Energy, vol. 28, no. 9, pp. 1341-1355, 187-195
2003.
8. Dr.A.Amudha, M. Siva Ramkumar, M., Sivaram Krishnan "Perturb and Observe Based Photovoltaic Power Generation System For Off-Grid Using
Sepic Converter" International Journal of Pure and Applied Mathematics , 114(7), pp. 619-628 , 2017 .
9. M. Siva Ramkumar, M.Sivaram Krishnan, Dr.A.Amudha "Resonant Power Converter Using GA For PV Applications" International Journal Of
Electronics, Electrical And Computational System,6 (9) pp239-245 , 2017.
10. M.Siva Ramkumar, M.Sivaram Krishnan, Dr.A.Amudha "Impedance Source Inverter and Permanent Magnet Synchronous Generator For
Variable Speed Wind Turbine " International Journal of Computer & Mathematical Sciences (IJCMS) 6 (9) pp 98-105, 2017.
11. M.Siva Ramkumar "Unmanned Automated Railway Level Crossing System Using Zigbee" in International Journal of Electronics Engineering
Research (IJEER) 9 (9) pp1361-1371, 2017.
12. M. Sivaram Krishnan M. Siva Ramkumar and A. Amudha "Frequency Deviation Control In Hybrid Renewable Energy System Using Fc-Uc " in
International Journal of Control Theory and Applications (IJCTA) 10 (2) pp 333-344, 2017.
13. M Siva Ramkumar, Dr. A Amudha, R. Rajeev "Optimization For A Novel Single Switch Resonant Power Converter Using Ga To Improve Mppt
Efficiency Of Pv Applications" in International Journal of Applied Engineering Research (IJAER) 11(9) pp 6485-6488, 2016. .
14. M. Sivaram Krishnan, M. Siva Ramkumar and M. Sownthara "Power Management Of Hybrid Renewable Energy System By Frequency Deviation
Control" in 'International Journal of Innovative Research in Science, Engineering and Technology' on 3 (3) pp 763-769,2016.
15. R. Sudhakar and M. Siva Ramkumar "Boosting With SEPIC" in 'International Journal of Engineering and Science' 3 (4) pp 14-19,2014.
16. M. Sownthara and M. Siva Ramkumar "Wireless Communication Module To Replace Resolver Cable In Welding Robot" in International Journal
of Advanced Information Science and Technology on 23(23 ) pp 230-235,2014.
17. M. Siva Ramkumar and M. Sivaram Krishnan "Hybrid Solar-Wind Energy System" in 'International Journal of Advance Research in Computer
Science and Management Studies' 2(2), 2014.
18. M. Sivaram Krishnan and M. Siva Ramkumar "Power Management Of A Hybrid Solar-Wind Energy System" in 'International Journal of
Engineering Research & Technology' 2 (1) pp1988-1992, 2014.
19. M. Sivaram Krishnan and M. Siva Ramkumar "Power Quality Analysis In Hybrid Energy Generation System" in 'International Journal of Advance
Research in Computer Science and Management Studies 2 (1) pp 188-193,2014
20. S. Ananthanarayanan, Dr.A. Amudha, Dr.K. Balachander, M. Siva Ramkumar and D. Kavitha, "Design and Analysis of Power Quality
Improvement in Distribution Side Using PCC Technique with Fuzzy Logic Control" Journal of Advanced Research in Dynamical and Control
Systems, (12), pp 844-852.
21. T. Kalimuthu, M. Siva Ramkumar, Dr.A. Amudha, Dr.K. Balachander and M. Sivaram Krishnan "A High Gain Input-Parallel Output-Series
DC/DC Converter with Dual Coupled-Inductors" Journal of Advanced Research in Dynamical and Control Systems, (12), pp 818-824

22. C. Chinnusamy, Dr. G. Emayavaramban, Dr.A. Amudha, Dr.K. Balacahnder and M. Siva Ramkumar,"Transient Stability Improvement in Power
System with SMES and Battery Energy Storage System" Journal of Advanced Research in Dynamical and Control Systems, (12), pp 900-914
23. K. Kaleeswari, Dr.K. Balachander, Dr.A. Amudha, M. Siva Ramkumar and D. Kavitha, "Analysis and Parallel Operation of Novel Bidirectional
DC-DC Converter for DC Micro Grid" Journal of Advanced Research in Dynamical and Control Systems, (12), pp 928-940
24. M. Jayaprakash, D. Kavitha, M. Siva Ramkumar, Dr.K. Balacahnder and M. Sivaram Krishnan, "Achieving Efficient and Secure Data Acquisition
for Cloud-Supported Internet of Things in Grid Connected Solar, Wind and Battery Systems" Journal of Advanced Research in Dynamical and
Control Systems, (12), pp 966-981
25. Li Junwei, S.Ramkumar, G. Emayavaramban, D. Frankl n vinod, M. Thilagaraj, V. Muneeswaran, M. Pallikonda Rajasekaran, V.
Venkataraman, Ahmed Faeq Hussein, IEEE Access, "Brain Computer Interface for Neurodegenerative Person Using Electroencephalogram",
pp.2439 -2452 Vol.(7), 2019.
26. Gu Jialu, S.Ramkumar, G. Emayavaramban, M. Thilagaraj, V.Muneeswaran, M. Pallikonda Rajasekaran, Ahmed Faeq Hussein "Offline Analysis
for Designing Electrooculograms Based Human Computer Interface Control for Paralyzed Patients" IEEE Access, 2018 , Vol.(6), pp: 79151 -
79161.
27. G. Emayavaramban, S. Ramkumar, A. Amudha, "Classification of Hand Gestures Using FFNN and TDNN Networks", International Journal of
Pure and Applied Mathematics, Vol.118 (8), 27-32. G Emayavaramban, A Amudha, "Identifying Hand Gestures Using SEMG for Human Machine
Interaction", ARPN Journal of Engineering and Applied Sciences, Vol.11 (21), pp.12777-12785.
28. G Emayavaramban, A Amudha, "Recognition of s EMG for Prosthetic Control Using Static and Dynamic Neural Networks", International Journal
of Control Theory and Applications, Vol. 9 (24), pp.205-215.
29. D. Kavitha, Dr. C. Vivekanandan, "An Adjustable Speed PFC Buck- boost Converter Fed Sensor less BLDC Motor" in International Journal of
Applied Engineering Research, ISSN 0973-4562 Vol. 10 No.20 (2015), pg. 17749-17754.
30. D. Kavitha, N. Sivakumar, M. Siva Ramkumar, V. Bhavithira, and S. Kalaiarasi, "A Single Stage High Gain Converter for Grid Interconnected
Renewable Application using Perturb and Observe" in International Journal of Control Theory and Applications, ISSN: 0974-5572 Vol. 10 No.38
(2017), pg. 161-175.
31. D. Kavitha, Dr.A. Amudha and S. Divyapriya, "Design of Controller for Regenerative Braking using BLDC Motor Applicable for Electric Vehicle"
in International Journal of Electronics, Electrical and Computational System- IJEECS, ISSN 2348-117X, Volume 6, Issue 9, September 2017,
pg.245-252
32. K. Govindaraju, V. Bhavithira, D. Kavitha, S. Kuppusamy, and K. Balachander, "Improvement of Voltage Profile and Loss Minimization in IEEE
14 Bus System using FACTS Devices" in International Journal of Control Theory and Applications, ISSN: 0974-5572 Vol. 10 No.38 (2017), pg.
213-224.
33. Xin Wan , Kezhong Zhang1, S. Ramkumar J. Deny, G. Emayavaramban, M. Siva Ramkumar And Ahmed Faeq Hussein ," A Review on
Electroencephalogram Based Brain Computer Interface for Elderly Disabled" in IEEE Access 2019 , Vo.(7), pp: 36380 - 36387.
34. Dr.A.Amudha, M.Siva Ramkumar, M.Sivaram Krishnan "DESIGN AND SIMULATION OF ZETA CONVERTER WITH ZVZCS SWITCHING
TECHNIQUE" Journal of Engineering and Applied Sciences ,14(9) pp 2764-2774 DOI: 10.3923/jeasci.2019.2764.2774
35. M. Sivaram Krishnan, S. Sri Ragavi, M. Siva RamKumar, D. Kavitha "Smart Asthma Prediction System using Internet of Things" Indian Journal of
Public Health Research & Development, 10 (2) , pp 1103-1107 .DOI:10.5958/0976-5506.2019.00445.5
Authors: Charles Stephen, .A. Amudha*, K. Balachander, .M. Siva Ramkumar, G. Emayavaramban, IR.V. Manoor
Paper Title: Direct Torque Control of Induction Motor Using SVM Techniques
Abstract: Direct Torque control (DTC) is a preferred approach for its fast torque reaction and smooth implementation in
induction motor applications. But various switching frequency and current harmonics are the disadvantage of the method.
There are many industrial packages already using DTC. in this have a look at novel switching desk is proposed to reduce
modern-day harmonics based totally on torque-flux plane that can be implemented to present day motor drives with
software program change, instead than a hardware advancement. They have a look at is illustrated with Simulink model
and motor output images. The primary goal of this undertaking work is to manipulate method in order to obtain advanced
dynamic response, rapid torque reaction and controller having low inverter switching frequency, low harmonic losses,
and excessive efficiency. The DTC controller has all the above traits to be properly a controller. So the objective right
here is to examine the most advanced IM manage method i.e. direct torque manipulate and look at its overall performance
characteristics.

Keywords: DTC, Induction Motor, SVPWM.

References:
1. S. Masoud Barakati,, Modeling and Controller Design of a Wind Energy Conversion System Including a Matrix Converter,2008.
2. S. Tao, "Power quality of grid-connected wind turbines with DFIG and their interaction with grid," Ph.D. dissertation, Aalborg Univ., Aalborg,
Denmark, 2004.
38. 3. H. Wang, W. Wang and L. Bin, "Power quality analysis and system simulation on permanent magnet direct-drive wind turbine," International
conference on Electrical Machines and Systems, ICEMS, Wuhan, China, 2008, pp. 866-869.
4. S.A. Papathanassiou and M.P. Papadopoulos, "Harmonic analysis in a power system with wind generation," IEEE Trans. Energy Convers, vol. 21, 196-202
no. 4, pp. 2006-2016, 2006.
5. P. Tenca, A.A. Rockhill and T.A. Lipo,"Wind turbine current-source converter providing reactive power control and reduced harmonics," IEEE
Trans. Energy Convers, vol. 43, no. 4, pp. 1050-1060, 2007.
6. N.S. Ting, Y. Yasa, I. Aksoy and Y. Sahin, "Comparison of SVPWM, SPWM and HCC control techniques in power control of PMSG used in wind
turbine systems," Intl Conference on Electrical Machines & Power Electronics, ACEMP, Crystal Admiral, Turkey, 2015, pp. 69-74.
7. P. Ledesma, J. Usaola, and J. L. Rodríguez, "Transient stability of a fixed speed wind farm," Renewable Energy, vol. 28, no. 9, pp. 1341-1355,
2003.
8. Dr.A. Amudha, M. Siva Ramkumar , M., SivaramKrishnan "Perturb and Observe Based Photovoltaic Power Generation System For Off-Grid Using
Sepic Converter" International Journal of Pure and Applied Mathematics , 114(7), pp. 619-628 , 2017 .
9. M. Siva Ramkumar, M. Sivaram Krishnan, Dr.A. Amudha "Resonant Power Converter Using GA For PV Applications" International Journal Of
Electronics, Electrical And Computational System,6 (9) pp239-245 , 2017.
10. M. Siva Ramkumar, M. Sivaram Krishnan, Dr. A. Amudha "Impedance Source Inverter and Permanent Magnet Synchronous Generator For
Variable Speed Wind Turbine " International Journal of Computer & Mathematical Sciences (IJCMS) 6 (9) pp 98-105, 2017.
11. M. Siva Ramkumar "Unmanned Automated Railway Level Crossing System Using Zigbee" in International Journal of Electronics Engineering
Research (IJEER) 9 (9) pp1361-1371, 2017.
12. M. Sivaram Krishnan M. Siva Ramkumar and A. Amudha "Frequency Deviation Control In Hybrid Renewable Energy System Using Fc-Uc " in
International Journal of Control Theory and Applications (IJCTA) 10 (2) pp 333-344, 2017.
13. M Siva Ram Kumar, Dr. AAmudha, R. Rajeev "Optimization For A Novel Single Switch Resonant Power Converter Using Ga To Improve Mppt
Efficiency Of Pv Applications" in International Journal of Applied Engineering Research (IJAER) 11(9) pp 6485-6488, 2016. .
14. M. Sivaram Krishnan, M. Siva Ramkumar and M. Sownthara "Power Management Of Hybrid Renewable Energy System By Frequency Deviation
Control" in 'International Journal of Innovative Research in Science, Engineering and Technology' on 3 (3) pp 763-769,2016.
15. R. Sudhakar and M. Siva Ramkumar "Boosting With SEPIC" in 'International Journal of Engineering and Science' 3 (4) pp 14-19,2014.
16. M. Sownthara and M. Siva Ramkumar "Wireless Communication Module To Replace Resolver Cable In Welding Robot" in International Journal
of Advanced Information Science and Technology on 23(23 ) pp 230-235,2014.
17. M. Siva Ramkumar and M. Sivaram Krishnan "Hybrid Solar-Wind Energy System" in 'International Journal of Advance Research in Computer
Science and Management Studies' 2(2), 2014.
18. M. Sivaram Krishnan and M. Siva Ramkumar "Power Management Of A Hybrid Solar-Wind Energy System" in 'International Journal of
Engineering Research & Technology' 2 (1) pp1988-1992, 2014.
19. M. Sivaram Krishnan and M. Siva Ramkumar "Power Quality Analysis In Hybrid Energy Generation System" in 'International Journal of Advance
Research in Computer Science and Management Studies 2 (1) pp 188-193,2014.
20. S. Ananthanarayanan, Dr.A. Amudha, Dr.K. Balachander, M. Siva Ramkumar and D. Kavitha, "Design and Analysis of Power Quality
Improvement in Distribution Side Using PCC Technique with Fuzzy Logic Control" Journal of Advanced Research in Dynamical and Control
Systems, (12), pp 844-852
21. T. Kalimuthu, M. Siva Ramkumar, Dr.A. Amudha, Dr.K. Balachander and M. Sivaram Krishnan "A High Gain Input-Parallel Output-Series
DC/DC Converter with Dual Coupled-Inductors" Journal of Advanced Research in Dynamical and Control Systems, (12), pp 818-824
22. C. Chinnusamy, Dr.G. Emayavaramban, Dr.A. Amudha, Dr.K. Balacahnder and M. Siva Ramkumar,"Transient Stability Improvement in Power
System with SMES and Battery Energy Storage System" Journal of Advanced Research in Dynamical and Control Systems, (12), pp 900-914
23. [K. Kaleeswari, Dr.K. Balachander, Dr.A. Amudha, M. Siva Ramkumar and D. Kavitha, "Analysis and Parallel Operation of Novel Bidirectional
DC-DC Converter for DC Micro Grid" Journal of Advanced Research in Dynamical and Control Systems, (12), pp 928-940
24. M. Jayaprakash, D. Kavitha, M. Siva Ramkumar, Dr.K. Balacahnder and M. Sivaram Krishnan, "Achieving Efficient and Secure Data Acquisition
for Cloud-Supported Internet of Things in Grid Connected Solar, Wind and Battery Systems" Journal of Advanced Research in Dynamical and
Control Systems, (12), pp 966-981
25. Gu Jialu, S. Ramkumar, G. Emayavaramban, M. Thilagaraj, V. Muneeswaran, M. Pallikonda Rajasekaran, Ahmed Faeq Hussein "Offline Analysis
for Designing Electrooculograms Based Human Computer Interface Control for Paralyzed Patients" IEEE Access, 2018 , Vol.(6), pp: 79151 -
79161.
26. G.Emayavaramban, S.Ramkumar, A.Amudha, "Classification of Hand Gestures Using FFNN and TDNN Networks", International Journal of Pure
and Applied Mathematics, Vol.118 (8), 27-32.
27. G Emayavaramban, A Amudha, "Identifying Hand Gestures Using SEMG for Human Machine Interaction", ARPN Journal of Engineering and
Applied Sciences, Vol.11 (21), pp.12777-12785.
28. G Emayavaramban, A Amudha, "Recognition of sEMG for Prosthetic Control Using Static and Dynamic Neural Networks", International Journal
of Control Theory and Applications, Vol. 9 (24), pp.205-215.
29. Xin Wan , Kezhong Zhang1, S. Ramkumar J. Deny, G. Emayavaramban , M. Siva Ramkumar And Ahmed Faeq Hussein ," A Review on
Electroencephalogram Based Brain Computer Interface for Elderly Disabled" in IEEE Access, 2019 , Vol.(7), pp: 36380 - 36387.
30. Li Junwei, S. Ramkumar, G. Emayavaramban, D. Frankl n vinod, M. Thilagaraj, V. Muneeswaran, M. Pallikonda Rajasekaran, V.
Venkataraman, Ahmed Faeq Hussein, IEEE Access, "Brain Computer Interface for Neurodegenerative Person Using Electroencephalogram",
pp.2439 - 2452 Vol.(7), 2019.
31. Dr.A.Amudha, M.Siva Ramkumar, M.Sivaram Krishnan "DESIGN AND SIMULATION OF ZETA CONVERTER WITH ZVZCS SWITCHING
TECHNIQUE" Journal of Engineering and Applied Sciences ,14(9) pp 2764-2774 (DOI: 10.3923/jeasci.2019.2764.2774
32. M. Sivaram Krishnan, S. Sri Ragavi, M. Siva RamKumar, D. Kavitha "Smart Asthma Prediction System using Internet of Things" Indian Journal of
Public Health Research & Development, 10 (2) , pp 1103-1107 DOI:10.5958/0976-5506.2019.00445.5
Authors: N. Saravanakumar, A. Amudha*, G. Emayavaramban, M. Siva Ramkumar, S. Divyapriya
Paper Title: Stability Analysis of Grid Integration of Photovoltaic Systems Using Partial Power Converters
Abstract: An advanced power control strategy by limiting the maximum feed-in power of PV systems has been
proposed, which can ensure a fast and smooth transition between maximum power point tracking with Partial Power
Converter (PPC)[6] and Synchronous Reference Frame (SRF) method. Regardless of the solar irradiance levels, high-
performance and stable operation are always achieved by the proposed control strategy. It can regulate the PV output
power according to any set-point and force the PV systems to operate at the left side of the maximum power point without
stability problems. The effectiveness of the proposed PPC control[3] in terms of high accuracy, fast dynamics, and stable
transitions improvement. Overall power management unit is controlled by the converter & control loop. Performance
analysis (power & stability) [10] of the overall system is carried out using MATLAB/SIMULINK model.

KEYWORDS: PV, SRF, PPC, Matlab/Simulink.

References:
1. L. Pattathurani , Rajat Kumar Dwibedi , Dr.S.S. Dash, Matrix converter technology for wind energy conversion system, IJRASET, Volume 4 Issue
X, October 2016.
2. Meenakshi*, G. D. Anbarasi, Jebaselvi and S. Paramasivam, Space Vector Modulation Technique Applied to Doubly Fed Induction Generator,
Indian Journal of Science and Technology, Vol 8(33), 2015.
3. Parvathy VM, Gnanambigai M. Stability analysis of the variable speed wind turbine using sliding mode control. Indian Journal of Science and
Technology. 2015 Apr; 8(S7):467-70.
39. 4. Elizondo, J.L, Olloqui, A.; Rivera, M.; Macias, M.E.; Probst, O.; Micheloud, O.M.; Rodriguez, J, "Model-Based Predictive Rotor Current Control
for Grid Synchronization of a DFIG Driven by an Indirect Matrix Converter, "IEEE Journal of Emerging and Selected Topics in Power Electronics, 203-210
Vol 2, No 4, pp 715 - 726, Dec 2014.
5. Dhumal Chaitrali D, Mulla Masoomraja Z ,A MATLAB Based Analysis of Direct Torque Control of a Matrix Converter Fed Grid Connected
Doubly Fed Induction Generator, IJLTEMAS, Volume VI, Issue VII, July 2017.
6. Suman Mondal and Debaprasad Kastha, member IEEE, ‖ Improved Direct Torque and Reactive Power Control of a Matrix Converter Fed Grid
Connected Doubly Fed Induction Generator?.2015.
7. Sivakumar P, Arutchelvi M, Soundara pandian R. Improved control strategy for grid connected scheme based on PV array and wind-driven
induction generators. Indian Journal of Science and Technology. 2014 Nov; 7(S7):165-73.
8. Dr.A. Amudha, M. Siva Ramkumar, M., Sivaram Krishnan "Perturb and Observe Based Photovoltaic Power Generation System For Off-Grid Using
Sepic Converter" International Journal of Pure and Applied Mathematics, 114(7), pp. 619-628, 2017.
9. M.Siva Ramkumar, M.Sivaram Krishnan, Dr.A. Amudha "Resonant Power Converter Using GA for PV Applications" International Journal Of
Electronics, Electrical And Computational System, 6 (9) pp239-245, 2017.
10. M. Siva Ramkumar, M. Sivaram Krishnan, Dr.A. Amudha "Impedance Source Inverter and Permanent Magnet Synchronous Generator For
Variable Speed Wind Turbine " International Journal of Computer & Mathematical Sciences (IJCMS) 6 (9) pp 98-105, 2017.
11. M. Siva Ramkumar "Unmanned Automated Railway Level Crossing System Using Zigbee" in International Journal of Electronics Engineering
Research (IJEER) 9 (9) pp1361-1371, 2017.
12. M. Sivaram Krishnan M. Siva Ramkumar and A. Amudha "Frequency Deviation Control In Hybrid Renewable Energy System Using Fc-Uc "in
International Journal of Control Theory and Applications (IJCTA) 10 (2) pp 333-344, 2017.
13. M Siva RamKumar, Dr. Amudha, R. Rajeev "Optimization For A Novel Single Switch Resonant Power Converter Using Ga To Improve Mppt
Efficiency Of Pv Applications" in International Journal of Applied Engineering Research (IJAER) 11(9) pp 6485-6488, 2016. .
14. M. Sivaram Krishnan, M. Siva Ramkumar and M. Sownthara "Power Management Of Hybrid Renewable Energy System By Frequency Deviation
Control" in 'International Journal of Innovative Research in Science, Engineering and Technology' on 3 (3) pp 763-769,2016.
15. R. Sudhakar and M. Siva Ramkumar "Boosting With SEPIC" in 'International Journal of Engineering and Science' 3 (4) pp 14-19,2014.
16. M. Sownthara and M. Siva Ramkumar "Wireless Communication Module To Replace Resolver Cable In Welding Robot" in International Journal
of Advanced Information Science and Technology on 23(23 ) pp 230-235,2014.
17. M. Siva Ramkumar and M. Sivaram Krishnan "Hybrid Solar-Wind Energy System" in 'International Journal of Advance Research in Computer
Science and Management Studies' 2(2), 2014.
18. M. Sivaram Krishnan and M. Siva Ramkumar "Power Management of a Hybrid Solar-Wind Energy System" in 'International Journal of
Engineering Research & Technology' 2 (1) pp1988-1992, 2014.
19. [19] M.Sivaram Krishnan and M.Siva Ramkumar "Power Quality Analysis In Hybrid Energy Generation System" in 'International Journal of
Advance Research in Computer Science and Management Studies 2 (1) pp 188-193,2014
20. S. Ananthanarayanan, Dr.A. Amudha, Dr.K. Balachander, M. Siva Ramkumar and D. Kavitha, "Design and Analysis of Power Quality
Improvement in Distribution Side Using PCC Technique with Fuzzy Logic Control" Journal of Advanced Research in Dynamical and Control
Systems, (12), pp 844-852
21. T. Kalimuthu, M. Siva Ramkumar, Dr.A. Amudha, Dr.K. Balachander and M. Sivaram Krishnan "A High
22. Gain Input-Parallel Output-Series DC/DC Converter with Dual Coupled-Inductors" Journal of Advanced Research in Dynamical and Control
Systems, (12), pp 818-824
23. C. Chinnusamy, Dr.G. Emayavaramban, Dr.A. Amudha, Dr.K. Balacahnder and M. Siva Ramkumar,"Transient Stability Improvement in Power
System with SMES and Battery Energy Storage System" Journal of Advanced Research in Dynamical and Control Systems, (12), pp 900-914
24. K. Kaleeswari, Dr.K. Balachander, Dr.A. Amudha, M. Siva Ramkumar and D. Kavitha, "Analysis and Parallel Operation of Novel Bidirectional
DC-DC Converter for DC Micro Grid" Journal of Advanced Research in Dynamical and Control Systems, (12), pp 928-940
25. M. Jayaprakash, D. Kavitha, M. Siva Ramkumar, Dr.K. Balacahnder and M. Sivaram Krishnan, "Achieving Efficient and Secure Data Acquisition
for Cloud-Supported Internet of Things in Grid Connected Solar, Wind and Battery Systems" Journal of Advanced Research in Dynamical and
Control Systems, (12), pp 966-981
26. Li Junwei, S. Ramkumar, G. Emayavaramban, D. Frankl n vinod, M. Thilagaraj, V. Muneeswaran, M. Pallikonda Rajasekaran, V.
Venkataraman, Ahmed Faeq Hussein, IEEE Access, "Brain Computer Interface for Neurodegenerative Person Using Electroencephalogram",
pp.2439 - 2452 Vol.(7), 2019.
27. Gu Jialu, S. Ramkumar, G. Emayavaramban, M. Thilagaraj, V.Muneeswaran, M. Pallikonda Rajasekaran, Ahmed Faeq Hussein "Offline Analysis
for Designing Electrooculograms Based Human Computer Interface Control for Paralyzed Patients" IEEE Access, 2018 , Vol.(6), pp: 79151 -
79161.
28. G. Emayavaramban, S. Ramkumar, A. Amudha, "Classification of Hand Gestures Using FFNN and TDNN Networks", International Journal of
Pure and Applied Mathematics, Vol.118 (8), 27-32.
29. G Emayavaramban, A Amudha, "Identifying Hand Gestures Using SEMG for Human Machine Interaction", ARPN Journal of Engineering and
Applied Sciences, Vol.11 (21), pp.12777-12785.
30. G Emayavaramban, A Amudha, "Recognition of sEMG for Prosthetic Control Using Static and Dynamic Neural Networks", International Journal
of Control Theory and Applications, Vol. 9 (24), pp.205-215.
31. D. Kavitha, Dr.C. Vivekanandan, "An Adjustable Speed PFC Buck- boost Converter Fed Sensor less BLDC Motor" in International Journal of
Applied Engineering Research, ISSN 0973-4562 Vol. 10 No.20 (2015), pg. 17749-17754.
32. D. Kavitha, N. Sivakumar, M. Siva Ramkumar, V. Bhavithira, and S. Kalaiarasi, "A Single Stage High Gain Converter for Grid Interconnected
Renewable Application using Perturb and Observe" in International Journal of Control Theory and Applications, ISSN: 0974-5572 Vol. 10 No.38
(2017), pg. 161-175.
33. D. Kavitha, Dr.A. Amudha and S. Divyapriya, "Design of Controller for Regenerative Braking using BLDC Motor Applicable for Electric Vehicle"
in International Journal of Electronics, Electrical and Computational System- IJEECS, ISSN 2348-117X, Volume 6, Issue 9, September 2017,
pg.245-252
34. K. Govindaraju, V. Bhavithira, D. Kavitha, S. Kuppusamy, and K. Balachander, "Improvement of Voltage Profile and Loss Minimization in IEEE
14 Bus System using FACTS Devices" in International Journal of Control Theory and Applications, ISSN: 0974-5572 Vol. 10 No.38 (2017), pg.
213-224.
35. Xin Wan , Kezhong Zhang1, S. Ramkumar J. Deny, G. Emayavaramban , M. Siva Ramkumar And Ahmed Faeq Hussein ," A Review on
Electroencephalogram Based Brain Computer Interface for Elderly Disabled" in IEEE Access, 2019 , Vol.(7), pp: 36380 - 36387.
36. Dr.A.Amudha, M.Siva Ramkumar, M.Sivaram Krishnan "DESIGN AND SIMULATION OF ZETA CONVERTER WITH ZVZCS SWITCHING
TECHNIQUE" Journal of Engineering and Applied Sciences ,14(9) pp 2764-2774 DOI: 10.3923/jeasci.2019.2764.2774
37. M. Sivaram Krishnan, S. Sri Ragavi, M. Siva RamKumar, D. Kavitha "Smart Asthma Prediction System using Internet of Things" Indian Journal of
Public Health Research & Development, 10 (2) , pp 1103-1107 .DOI:10.5958/0976-5506.2019.00445.5.
N. Thiyaagarajan, M. Siva Ramkumar*, A. Amudha, G. Emayavaramban, M. Sivaram Krishnan, D.
Authors:
Kavitha
Paper Title: SVPWM based Control of SCIG-Matrix Converter for Wind Energy Power Conversion System
Abstract: In this research work, space vector modulated control of Matrix Converter (MC) topology is utilized with
Squirrel Cage Induction Generator (SCIG) [1] for wind power generation systems [2]. The SCIG stator frequency is
suitably tuned in order to achieve active power flow into the grid. In the newly introduced topology, a gearless wind
energy conversion system [10] is brought into use.
The MC functions as an interface between the grid and SCIG. Space Vector Pulse Width Modulation (SVPWM)
mechanism [3] is used for controlling the MC switches. The stator and grid voltage, current waveforms and its THD
spectrum are evaluated [9] by making use of the Matlab/Simulink software.

Keywords: SCIG, Matrix Converter, THD, Three Phases SRF - PLL, Wind Turbine, MATLAB/SIMULINK.

References:
40. 1. Haejoon, K. Heesang, K. Hongwoo, K. Hyungoo, K. Seokwoo and all. "Modelling and voltage-control of variable-speed SCIG-based wind farm,"
Renewable Energy 42, June 2012: pp28-35.
2. J.L. Domínguez García, O. Gomis Bellmunt, L. Trilla-Romero, A. Junyent-Ferré, "Vector control of squirrel cage induction generator for wind 211-218
power," IEEE XIX International Conference on Electrical Machines ICEM'10, 6-8 Sept. 2010, Rome. pp 1 - 6.
3. H. Merabet Boulouiha, A. Allali, M. Laouer, A. Tahri, M. Denai, and A. Draou, "Direct torque control of multilevel SVPWM inverter in variable
speed SCIG-based wind energy conversion system," Renewable Energy, Vol. 80, August 2015, pp: 140-152.
4. R. Melıcio, V. M. F. Mendes and J. P. S. Catala˜o, "Harmonic Assessment of Variable-Speed Wind Turbines Considering a Converter Control
Malfunction", IET Renewable Power Generation, Vol. 4, No. 2, pp. 139-152, March 2010.
5. Athulya M. T, Shankar Subramanian, SVPWM based control of Matrix Converter for gearless operation of wind energy power conversion system,
PESTSE,21 July 2016.
6. J. Faiz, H. Barati and E. Akpinar, "Harmonic analysis and performance improvement of slip energy recovery induction motor drives," IEEE Trans.
Energy Convers, vol. 16, no.3, pp. 410-417, 2001.
7. S. K. Hyong, L. Dylan Dah-Chuan, "Wind Energy Conversion System from Electrical Perspective - A Survey," Smart Grid and Renewable
Energy", Vol.1, No.3, November, pp. 119-131. 2010.
8. Dr.A. Amudha, M. Siva Ramkumar, M., Sivaram Krishnan "Perturb and Observe Based Photovoltaic Power Generation System For Off-Grid Using
Sepic Converter" International Journal of Pure and Applied Mathematics, 114(7), pp. 619-628 , 2017 .
9. M. Siva Ramkumar, M.Sivaram Krishnan, Dr.A. Amudha "Resonant Power Converter Using GA For PV Applications" International Journal Of
Electronics, Electrical And Computational System, 6 (9) pp239-245, 2017.
10. M. Siva Ramkumar, M. Sivaram Krishnan, Dr.A. Amudha "Impedance Source Inverter and Permanent Magnet Synchronous Generator For
Variable Speed Wind Turbine " International Journal of Computer & Mathematical Sciences (IJCMS) 6 (9) pp 98-105, 2017.
11. M. Siva Ramkumar "Unmanned Automated Railway Level Crossing System Using Zigbee" in International Journal of Electronics Engineering
Research (IJEER) 9 (9) pp1361-1371, 2017.
12. M. Sivaram Krishnan M. Siva Ramkumar and A. Amudha "Frequency Deviation Control In Hybrid Renewable Energy System Using Fc-Uc "in
International Journal of Control Theory and Applications (IJCTA) 10 (2) pp 333-344, 2017.
13. M Siva Ram Kumar, Dr.A. Amudha, R.Rajeev "Optimization For A Novel Single Switch Resonant Power Converter Using Ga To Improve Mppt
Efficiency Of Pv Applications" in International Journal of Applied Engineering Research (IJAER) 11(9) pp 6485-6488, 2016. .
14. M. Sivaram Krishnan, M. Siva Ramkumar and M. Sownthara "Power Management Of Hybrid Renewable Energy System By Frequency Deviation
Control" in 'International Journal of Innovative Research in Science, Engineering and Technology' on 3 (3) pp 763-769,2016.
15. R. Sudhakar and M. Siva Ramkumar "Boosting With SEPIC" in 'International Journal of Engineering and Science' 3 (4) pp 14-19,2014.
16. M. Sownthara and M. Siva Ramkumar "Wireless Communication Module To Replace Resolver Cable In Welding Robot" in International Journal
of Advanced Information Science and Technology on 23(23 ) pp 230-235,2014.
17. M. Siva Ramkumar and M. Sivaram Krishnan "Hybrid Solar-Wind Energy System" in 'International Journal of Advance Research in Computer
Science and Management Studies' 2(2), 2014.
18. M. Sivaram Krishnan and M. Siva Ramkumar "Power Management Of A Hybrid Solar-Wind Energy System" in 'International Journal of
Engineering Research & Technology' 2 (1) pp1988-1992, 2014.
19. M.Sivaram Krishnan and M. Siva Ramkumar "Power Quality Analysis In Hybrid Energy Generation System" in 'International Journal of Advance
Research in Computer Science and Management Studies 2 (1) pp 188-193,2014
20. S. Ananthanarayanan, Dr.A. Amudha, Dr.K. Balachander, M. Siva Ramkumar and D. Kavitha, "Design and Analysis of Power Quality
Improvement in Distribution Side Using PCC Technique with Fuzzy Logic Control" Journal of Advanced Research in Dynamical and Control
Systems, (12), pp 844-852
21. T. Kalimuthu, M. Siva Ramkumar, Dr.A. Amudha, Dr.K. Balachander and M. Sivaram Krishnan "A High Gain Input-Parallel Output-Series
DC/DC Converter with Dual Coupled-Inductors" Journal of Advanced Research in Dynamical and Control Systems, (12), pp 818-824
22. Chinnusamy, Dr.G. Emayavaramban, Dr.A. Amudha, Dr.K. Balacahnder and M. Siva Ramkumar, "Transient Stability Improvement in Power
System with SMES and Battery Energy Storage System" Journal of Advanced Research in Dynamical and Control Systems, (12), pp 900-914
23. K. Kaleeswari, Dr.K. Balachander, Dr.A. Amudha, M. Siva Ramkumar and D. Kavitha, "Analysis and Parallel Operation of Novel Bidirectional
DC-DC Converter for DC Micro Grid" Journal of Advanced Research in Dynamical and Control Systems, (12), pp 928-940
24. M. Jayaprakash, D. Kavitha, M. Siva Ramkumar, Dr.K. Balacahnder and M. Sivaram Krishnan, "Achieving Efficient and Secure Data Acquisition
for Cloud-Supported Internet of Things in Grid Connected Solar, Wind and Battery Systems" Journal of Advanced Research in Dynamical and
Control Systems, (12), pp 966-981
25. Li Junwei, S. Ramkumar, G. Emayavaramban, D. Frankl n vinod, M. Thilagaraj, V. Muneeswaran, M. Pallikonda Rajasekaran, V.
Venkataraman, Ahmed Faeq Hussein, IEEE Access, "Brain Computer Interface for Neurodegenerative Person Using Electroencephalogram",
pp.2439 - 2452 Vol.(7), 2019.
26. Gu Jialu, S.Ramkumar, G. Emayavaramban, M. Thilagaraj, V. Muneeswaran, M. Pallikonda Rajasekaran, Ahmed Faeq Hussein "Offline Analysis
for Designing Electrooculogram Based Human Computer Interface Control for Paralyzed Patients" IEEE Access, 2018 , Vol.(6), pp: 79151 - 79161.
27. G. Emayavaramban, S. Ramkumar, A. Amudha, "Classification of Hand Gestures Using FFNN and TDNN Networks", International Journal of
Pure and Applied Mathematics, Vol.118 (8), 27-32.
28. G Emayavaramban, A Amudha, "Identifying Hand Gestures Using SEMG for Human Machine Interaction", ARPN Journal of Engineering and
Applied Sciences, Vol.11 (21), pp.12777-12785.
29. G Emayavaramban, A Amudha, "Recognition of sEMG for Prosthetic Control Using Static and Dynamic Neural Networks", International Journal
of Control Theory and Applications, Vol. 9 (24), pp.205-215.
30. D. Kavitha, Dr.C. Vivekanandan, "An Adjustable Speed PFC Buck- boost Converter Fed Sensor less BLDC Motor" in International Journal of
Applied Engineering Research, ISSN 0973-4562 Vol. 10 No.20 (2015), pg. 17749-17754.
31. Kavitha, N. Sivakumar, M. Siva Ramkumar, V. Bhavithira, and S. Kalaiarasi, "A Single Stage High Gain Converter for Grid Interconnected
Renewable Application using Perturb and Observe" in International Journal of Control Theory and Applications, ISSN: 0974-5572 Vol. 10 No.38
(2017), pg. 161-175.
32. D. Kavitha, Dr.A. Amudha and S. Divyapriya, "Design of Controller for Regenerative Braking using BLDC Motor Applicable for Electric Vehicle"
in International Journal of Electronics, Electrical and Computational System- IJEECS, ISSN 2348-117X, Volume 6, Issue 9, September 2017,
pg.245-252
33. K. Govindaraju, V. Bhavithira, D. Kavitha, S. Kuppusamy, and K. Balachander, "Improvement of Voltage Profile and Loss Minimization in IEEE
14 Bus System using FACTS Devices" in International Journal of Control Theory and Applications, ISSN: 0974-5572 Vol. 10 No.38 (2017), pg.
213-224.
34. Xin Wan , Kezhong Zhang1, S. Ramkumar J. Deny, G. Emayavaramban , M. Siva Ramkumar And Ahmed Faeq Hussein ," A Review on
Electroencephalogram Based Brain Computer Interface for Elderly Disabled" in IEEE Access, 2019 , Vol.(7), pp: 36380 - 36387.
35. Dr.A.Amudha, M.Siva Ramkumar, M.Sivaram Krishnan "DESIGN AND SIMULATION OF ZETA CONVERTER WITH ZVZCS SWITCHING
TECHNIQUE" Journal of Engineering and Applied Sciences ,14(9) pp 2764-2774 DOI: 10.3923/jeasci.2019.2764.2774
36. M. Sivaram Krishnan, S. Sri Ragavi, M. Siva RamKumar, D. Kavitha "Smart Asthma Prediction System using Internet of Things" Indian Journal of
Public Health Research & Development, 10 (2) , pp 1103-1107 .DOI:10.5958/0976-5506.2019.00445.5
N. Seethalakshmi, A. Amudha, S. Divyapriya, G. Emayavaramban, M. Siva Ramkumar, IR.V. Mohamed
Authors:
Mansoor
Voltage Frequency Controller with Hybrid Energy Storage System for PMSG Based Wind Energy
Paper Title:
Conversion System
Abstract: The global need for reasonably-priced surroundings friendly energy generation has grown over current
decade due to the depletion of fossil sources. Considering the needs of destiny technology, renewable resources are the
main consciousness of task work in latest many years. As compared to different sources wind energy is found to be one
of the preferred opportunities for many energy employers. However due to the random and erratic nature of wind a few
mean of manage approach need to be developed with the intention to extract as much electricity as feasible. therefore in
this thesis a Hill-climb seek (HCS) set of rules is applied which can successfully obtain the optimal strength point at
variable speed wind turbine and additionally demonstrates battery related operation for an unbiased wind energy
41. conversion gadget (WECS). The hill-climb seek algorithm is impartial of the wind turbine power-speed characteristics
and the wind speed therefore its miles a sensor much less approach. As a result a variable pace operation is received
from the permanent magnet synchronous generator (PMSG). Due to variable pace operation and version of load (due to 219-229
fault and overload condition) ends in large oscillation and variant within the grid frequency and voltage waveform. The
voltage-frequency (VF) controller is operated with the aid of a voltage source converter (VSC) and hybrid battery
storage device. which will affirm the right working of the VF controller, special load disturbances are added to the
WECS which are the voltage and frequency of the three-phase 3-phase connection machine are monitored frequently in
a MATLAB primarily based SIMULINK surroundings.

Keywords: PMSG, VF Controller, WECS, Hybrid Energy Storage.

References:
1. Haejoon, K. Heesang, K. Hongwoo, K. Hyungoo, K. Seokwoo and all. "Modelling and voltage-control of variable-speed SCIG-based wind farm,"
Renewable Energy 42, June 2012: pp28-35.
2. J.L. Domínguez García, O. Gomis Bellmunt, L. Trilla-Romero, A. Junyent-Ferré, "Vector control of squirrel cage induction generator for wind
power," IEEE XIX International Conference on Electrical Machines ICEM'10, 6-8 Sept. 2010, Rome. pp 1 - 6.
3. H. Merabet Boulouiha, A. Allali, M. Laouer, A. Tahri, M. Denai, and A. Draou, "Direct torque control of multilevel SVPWM inverter in variable
speed SCIG-based wind energy conversion system," Renewable Energy, Vol. 80, August 2015, pp: 140-152.
4. R. Melıcio, V. M. F. Mendes and J. P. S. Catala˜o, "Harmonic Assessment of Variable-Speed Wind Turbines Considering a Converter Control
Malfunction", IET Renewable Power Generation, Vol. 4, No. 2, pp. 139-152, March 2010.
5. Athulya M. T, Shankar Subramanian, SVPWM based control of Matrix Converter for gearless operation of wind energy power conversion system,
PESTSE,21 July 2016.
6. J. Faiz, H. Barati and E. Akpinar, "Harmonic analysis and performance improvement of slip energy recovery induction motor drives," IEEE
Trans. Energy Convers, vol. 16, no.3, pp. 410-417, 2001.
7. S. K.Hyong, L. Dylan Dah-Chuan, "Wind Energy Conversion System from Electrical Perspective - A Survey," Smart Grid and Renewable
Energy", Vol.1, No.3, November, pp. 119-131. 2010.
8. Dr.A. Amudha, M. Siva Ramkumar, M., Sivaram Krishnan "Perturb and Observe Based Photovoltaic Power Generation System For Off-Grid
Using Sepic Converter" International Journal of Pure and Applied Mathematics, 114(7), pp. 619-628, 2017.
9. M. Siva Ramkumar, M. Sivaram Krishnan, Dr.A. Amudha "Resonant Power Converter Using GA For PV Applications" International Journal Of
Electronics, Electrical And Computational System, 6 (9) pp239-245, 2017.
10. M. Siva Ramkumar, M. Sivaram Krishnan, Dr.A. Amudha "Impedance Source Inverter and Permanent Magnet Synchronous Generator For
Variable Speed Wind Turbine " International Journal of Computer & Mathematical Sciences (IJCMS) 6 (9) pp 98-105, 2017.
11. M. Siva Ramkumar "Unmanned Automated Railway Level Crossing System Using Zigbee" in International Journal of Electronics Engineering
Research (IJEER) 9 (9) pp1361-1371, 2017.
12. M. Sivaram Krishnan M. Siva Ramkumar and A. Amudha "Frequency Deviation Control In Hybrid Renewable Energy System Using Fc-Uc "in
International Journal of Control Theory and Applications (IJCTA) 10 (2) pp 333-344, 2017.
13. M Siva Ram Kumar, Dr.A. Amudha, R. Rajeev "Optimization For A Novel Single Switch Resonant Power Converter Using Ga To Improve Mppt
Efficiency Of Pv Applications" in International Journal of Applied Engineering Research (IJAER) 11(9) pp 6485-6488, 2016. .
14. M. Sivaram Krishnan, M. Siva Ramkumar and M. Sownthara "Power Management Of Hybrid Renewable Energy System By Frequency
Deviation Control" in 'International Journal of Innovative Research in Science, Engineering and Technology' on 3 (3) pp 763-769, 2016.
15. R. Sudhakar and M. Siva Ramkumar "Boosting With SEPIC" in 'International Journal of Engineering and Science' 3 (4) pp 14-19, 2014.
16. M. Sownthara and M. Siva Ramkumar "Wireless Communication Module To Replace Resolver Cable In Welding Robot" in International Journal
of Advanced Information Science and Technology on 23(23 ) pp 230-235,2014.
17. M. Siva Ramkumar and M. Sivaram Krishnan "Hybrid Solar-Wind Energy System" in 'International Journal of Advance Research in Computer
Science and Management Studies' 2(2), 2014.
18. M. Sivaram Krishnan and M. SivaRamkumar"Power Management Of A Hybrid Solar-Wind Energy System" in 'International Journal of
Engineering Research & Technology' 2 (1) pp1988-1992, 2014.
19. M. Sivaram Krishnan and M. Siva Ramkumar "Power Quality Analysis In Hybrid Energy Generation System" in 'International Journal of
Advance Research in Computer Science and Management Studies 2 (1) pp 188-193,2014
20. S. Ananthanarayanan, Dr.A. Amudha, Dr.K. Balachander, M. Siva Ramkumar and D. Kavitha, "Design and Analysis of Power Quality
Improvement in Distribution Side Using PCC Technique with Fuzzy Logic Control" Journal of Advanced Research in Dynamical and Control
Systems, (12), pp 844-852
21. T. Kalimuthu, M. Siva Ramkumar, Dr.A. Amudha, Dr.K. Balachander and M. Sivaram Krishnan "A High Gain Input-Parallel Output-Series
DC/DC Converter with Dual Coupled-Inductors" Journal of Advanced Research in Dynamical and Control Systems, (12), pp 818-824
22. Chinnusamy, Dr.G. Emayavaramban, Dr.A. Amudha, Dr.K. Balacahnder and M. Siva Ramkumar, "Transient Stability Improvement in Power
System with SMES and Battery Energy Storage System" Journal of Advanced Research in Dynamical and Control Systems, (12), pp 900-914
23. K. Kaleeswari, Dr.K. Balachander, Dr.A. Amudha, M. Siva Ramkumar and D. Kavitha, "Analysis and Parallel Operation of Novel Bidirectional
DC-DC Converter for DC Micro Grid" Journal of Advanced Research in Dynamical and Control Systems, (12), pp 928-940
24. M. Jayaprakash, D. Kavitha, M. Siva Ramkumar, Dr.K. Balacahnder and M. Sivaram Krishnan, "Achieving Efficient and Secure Data Acquisition
for Cloud-Supported Internet of Things in Grid Connected Solar, Wind and Battery Systems" Journal of Advanced Research in Dynamical and
Control Systems, (12), pp 966-981
25. Li Junwei, S.Ramkumar, G. Emayavaramban, D.Frankl n vinod, M. Thilagaraj, V. Muneeswaran, M. Pallikonda Rajasekaran, V.
Venkataraman, Ahmed Faeq Hussein, IEEE Access, "Brain Computer Interface for Neurodegenerative Person Using Electroencephalogram",
pp.2439 - 2452 Vol.(7), 2019.
26. GuJialu, S Ramkumar, G. Emayavaramban, M. Thilagaraj, V. Muneeswaran, M. Pallikonda Rajasekaran, Ahmed Faeq Hussein "Offline
Analysis for Designing Electrooculogram Based Human Computer Interface Control for Paralyzed Patients" IEEE Access, 2018 , Vol.(6), pp:
79151 - 79161.
27. G. Emayavaramban, S. Ramkumar, A. Amudha, "Classification of Hand Gestures Using FFNN and TDNN Networks", International Journal of
Pure and Applied Mathematics, Vol.118 (8), 27-32.
28. G Emayavaramban, A Amudha, "Identifying Hand Gestures Using SEMG for Human Machine Interaction", ARPN Journal of Engineering and
Applied Sciences, Vol.11 (21), pp.12777-12785.
29. G Emayavaramban, A Amudha, "Recognition of sEMG for Prosthetic Control Using Static and Dynamic Neural Networks", International Journal
of Control Theory and Applications, Vol. 9 (24), pp.205-215.
30. D. Kavitha, Dr.C. Vivekanandan, "An Adjustable Speed PFC Buck- boost Converter Fed Sensor less BLDC Motor" in International Journal of
Applied Engineering Research, ISSN 0973-4562 Vol. 10 No.20 (2015), pg. 17749-17754.
31. Xin Wan, Kezhong Zhang1, S. Ramkumar J. Deny, G. Emayavaramban, M. Siva Ramkumar and Ahmed Faeq Hussein," A Review on
Electroencephalogram Based Brain Computer Interface for Elderly Disabled" in IEEE Access, 2019 , Vol.(7), pp: 36380 - 36387.
32. Dr.A.Amudha, M.Siva Ramkumar, M.Sivaram Krishnan "DESIGN AND SIMULATION OF ZETA CONVERTER WITH ZVZCS SWITCHING
TECHNIQUE" Journal of Engineering and Applied Sciences ,14(9) pp 2764-2774 DOI: 10.3923/jeasci.2019.2764.2774
33. M. Sivaram Krishnan, S. Sri Ragavi, M. Siva RamKumar, D. Kavitha "Smart Asthma Prediction System using Internet of Things" Indian Journal
of Public Health Research & Development, 10 (2) , pp 1103-1107 .DOI:10.5958/0976-5506.2019.00445.5
Authors: G. Suresh, A. Amudha, M. Siva Ramkumar, G. Emayavaramban, IR.V. Manoor
Bidding Strategy of Electricity Market Considering Network Constraint in New Electricity Improvement
Paper Title:
Environment
Abstract: This paper thinks about the new power advancement and related strategies as a necessity, makes profundity
investigation of the power age and deals organizations offering (arrange) model and advances the diversion technique of
single deals organization and various power makers that considered system imperatives (constraints) in view of the rule
of dim closeout in amusement hypothesis. Thinking about the issue of transmission trouble, a two-layer enhancement
42.
show is set up. The lower level makes the greatest benefit of the generator as the goal work, utilizing the likelihood
capacity to depict the gauge conduct of the contenders, utilizing the normal match strategy to understand the bidder's 230-234
offer. As per the essential data, the upper single deals organization utilizes direct programming strategies to give ease
unit lining need, joined with matrix working imperatives to compute the base buy cost through the upper and lower
models, intelligent arrangement can enhance the exchange achievement rate and decrease the event of transmission
issues. At long last, the adjusted IEEE14 hub model is utilized to dissect and confirm.
References:
1. S. MasoudBarakati,, Modeling and Controller Design of a Wind Energy Conversion System Including a Matrix Converter,2008.
2. S. Tao, "Power quality of grid-connected wind turbines with DFIG and their interaction with grid," Ph.D. dissertation, Aalborg Univ., Aalborg,
Denmark, 2004.
3. H. Wang, W. Wang and L. Bin, "Power quality analysis and system simulation on permanent magnet direct-drive wind turbine," International
conference on Electrical Machines and Systems, ICEMS, Wuhan, China, 2008, pp. 866-869.
4. S.A. Papathanassiou and M.P. Papadopoulos, "Harmonic analysis in a power system with wind generation," IEEE Trans. Energy Convers, vol. 21,
no. 4, pp. 2006-2016, 2006.
5. P. Tenca, A.A. Rockhill and T.A. Lipo,"Wind turbine current-source converter providing reactive power control and reduced harmonics," IEEE
Trans. Energy Convers, vol. 43, no. 4, pp. 1050-1060, 2007.
6. N.S. Ting, Y. Yasa, I. Aksoy and Y. Sahin, "Comparison of SVPWM, SPWM and HCC control techniques in power control of PMSG used in
wind turbine systems," Intl Conference on Electrical Machines & Power Electronics, ACEMP, Crystal Admiral, Turkey, 2015, pp. 69-74.
7. P. Ledesma, J. Usaola, and J. L. Rodr´ıguez, "Transient stability of a fixed speed wind farm," Renewable Energy, vol. 28, no. 9, pp. 1341-1355,
2003.
8. Dr.A.Amudha , M.Siva Ramkumar , M.,SivaramKrishnan "Perturb and Observe Based Photovoltaic Power Generation System For Off-Grid
Using Sepic Converter" International Journal of Pure and Applied Mathematics , 114(7), pp. 619-628 , 2017 .
9. M.Siva Ramkumar, M.Sivaram Krishnan, Dr.A.Amudha "Resonant Power Converter Using GA For PV Applications" International Journal Of
Electronics, Electrical And Computational System, 6 (9) pp239-245, 2017.
10. M.Siva Ramkumar, M.Sivaram Krishnan, Dr.A.Amudha "Impedance Source Inverter and Permanent Magnet Synchronous Generator For
Variable Speed Wind Turbine " International Journal of Computer & Mathematical Sciences (IJCMS) 6 (9) pp 98-105, 2017.
11. M.Siva Ramkumar "Unmanned Automated Railway Level Crossing System Using Zigbee" in International Journal of Electronics Engineering
Research (IJEER) 9 (9) pp1361-1371, 2017.
12. M. Sivaram Krishnan M. Siva Ramkumar and A. Amudha "Frequency Deviation Control In Hybrid Renewable Energy System Using Fc-Uc"in
International Journal of Control Theory and Applications (IJCTA) 10 (2) pp 333-344, 2017.
13. M Siva RamKumar, Dr.A. Amudha, R.Rajeev "Optimization For A Novel Single Switch Resonant Power Converter Using Ga To Improve Mppt
Efficiency Of Pv Applications" in International Journal of Applied Engineering Research (IJAER) 11(9) pp 6485-6488, 2016. .
14. M.Sivaram Krishnan, M.SivaRamkumar and M.Sownthara "Power Management Of Hybrid Renewable Energy System By Frequency Deviation
Control" in 'International Journal of Innovative Research in Science, Engineering and Technology' on 3 (3) pp 763-769,2016.
15. R.Sudhakar and M.Siva Ramkumar "Boosting With SEPIC" in 'International Journal of Engineering and Science' 3 (4) pp 14-19,2014.
16. M.Sownthara and M. Siva Ramkumar "Wireless Communication Module To Replace Resolver Cable In Welding Robot" in International Journal
of Advanced Information Science and Technology on 23(23 ) pp 230-235,2014.
17. M.Siva Ramkumar and M.Sivaram Krishnan "Hybrid Solar-Wind Energy System" in 'International Journal of Advance Research in Computer
Science and Management Studies' 2(2), 2014.
18. M. Sivaram Krishnan and M. Siva Ramkumar "Power Management Of A Hybrid Solar-Wind Energy System" in 'International Journal of
Engineering Research &Technology' 2 (1) pp1988-1992, 2014.
19. M.Sivaram Krishnan and M.Siva Ramkumar "Power Quality Analysis In Hybrid Energy Generation System" in 'International Journal of
Advance Research in Computer Science and Management Studies 2 (1) pp 188-193,2014
20. S. Ananthanarayanan, Dr.A. Amudha, Dr.K. Balachander, M. Siva Ramkumar and D. Kavitha, "Design and Analysis of Power Quality
Improvement in Distribution Side Using PCC Technique with Fuzzy Logic Control" Journal of Advanced Research in Dynamical and Control
Systems, (12), pp 844-852
21. T. Kalimuthu, M. Siva Ramkumar, Dr.A. Amudha, Dr.K. Balachander and M. Sivaram Krishnan "A High Gain Input-Parallel Output-Series
DC/DC Converter with Dual Coupled-Inductors" Journal of Advanced Research in Dynamical and Control Systems, (12), pp 818-824
22. C. Chinnusamy, Dr.G. Emayavaramban, Dr.A. Amudha, Dr.K. Balacahnder and M. Siva Ramkumar,"Transient Stability Improvement in Power
System with SMES and Battery Energy Storage System" Journal of Advanced Research in Dynamical and Control Systems, (12), pp 900-914
23. K. Kaleeswari, Dr.K. Balachander, Dr.A. Amudha, M. Siva Ramkumar and D. Kavitha, "Analysis and Parallel Operation of Novel Bidirectional
DC-DC Converter for DC Micro Grid" Journal of Advanced Research in Dynamical and Control Systems, (12), pp 928-940
24. M. Jayaprakash, D. Kavitha, M. Siva Ramkumar, Dr.K. Balacahnder and M. Sivaram Krishnan, "Achieving Efficient and Secure Data Acquisition
for Cloud-Supported Internet of Things in Grid Connected Solar, Wind and Battery Systems"
25. Journal of Advanced Research in Dynamical and Control Systems, (12), pp 966-981
26. Li Junwei, S.Ramkumar, G. Emayavaramban, D.Frankl n vinod, M. Thilagaraj, V. Muneeswaran, M. PallikondaRajasekaran, V.
Venkataraman, Ahmed Faeq Hussein, IEEE Access, "Brain Computer Interface for Neurodegenerative Person Using Electroencephalogram",
pp.2439 - 2452 Vol.(7), 2019.
27. GuJialu, S.Ramkumar, G. Emayavaramban, M. Thilagaraj, V.Muneeswaran, M. PallikondaRajasekaran, Ahmed Faeq Hussein "Offline Analysis
for Designing Electrooculogram Based Human Computer Interface Control for Paralyzed Patients" IEEE Access, 2018 , Vol.(6), pp: 79151 -
79161.
28. G.Emayavaramban, S.Ramkumar, A.Amudha, "Classification of Hand Gestures Using FFNN and TDNN Networks", International Journal of Pure
and Applied Mathematics, Vol.118 (8), 27-32.
29. G Emayavaramban, A Amudha, "Identifying Hand Gestures Using SEMG for Human Machine Interaction", ARPN Journal of Engineering and
Applied Sciences, Vol.11 (21), pp.12777-12785.
30. G Emayavaramban, A Amudha, "Recognition of sEMG for Prosthetic Control Using Static and Dynamic Neural Networks", International Journal
of Control Theory and Applications, Vol. 9 (24), pp.205-215.
31. Xin Wan , Kezhong Zhang1, S. Ramkumar J. Deny, G. Emayavaramban , M. Siva RamkumarAnd Ahmed Faeq Hussein ," A Review on
Electroencephalogram Based BrainComputer Interface for Elderly Disabled" in IEEE Access, 2019 , Vol.(7), pp: 36380 - 36387.
32. Dr.A.Amudha, M.Siva Ramkumar, M.Sivaram Krishnan "DESIGN AND SIMULATION OF ZETA CONVERTER WITH ZVZCS SWITCHING
TECHNIQUE" Journal of Engineering and Applied Sciences ,14(9) pp 2764-2774 (DOI: 10.3923/jeasci.2019.2764.2774
33. M. Sivaram Krishnan, S. Sri Ragavi, M. Siva RamKumar, D. Kavitha "Smart Asthma Prediction System using Internet of Things" Indian Journal
of Public Health Research & Development, 10 (2) , pp 1103-1107 DOI:10.5958/0976-5506.2019.00445.5
G. Krishnan, M. Siva Ramkumar, A. Amudha, G. Emayavaramban, S. Divyapriya, D. Kavitha, M. Sivaram
Authors:
Krishnan
Control of A Doubly Fed Induction Generator for Wind Energy Conversion System Using Matrix Converter
Paper Title:
with SVPWM Technique
Abstract: With the aim of satisfying the power demands, and considering the economic and environmental factors,
wind energy conversion is slowly becoming the field of interest in the form of a desirable source of renewable energy.
43. In this work, a grid connected wind power generation mechanism that uses a doubly fed induction generator [3] with a
direct AC-AC matrix converter is introduced. The objectives of this work are: To model and then simulate the operation
of a doubly fed induction generator. The analysis uses a space vector modulated matrix converter [2] for controlling the 235-243
rotor current. The matrix converter [1]-based rotor current control mechanism is focused. The system facilitates optimal
speed tracking for maximum energy storage from the wind and high performance active and reactive power regulation is
accomplished with the RST regulator. Finally, the simulation results obtained for various operating points are given
showing the system’s superior control performances.
Keywords: DFIG, Three Phase Phase Locked Loop, GSC, RSC, Total Harmonic Distortion, Matlab/Simulink.

References:
1. L.Pattathurani, Rajat Kumar Dwibedi , Dr.S.S.Dash,Matrix converter technology for wind energy conversion system, IJRASET,Volume 4 Issue
X, October 2016.
2. V. Meenakshi*, G. D. Anbarasi, Jebaselvi and S. Paramasivam,Space Vector Modulation Technique Applied to Doubly Fed Induction
Generato,Indian Journal of Science and Technology, Vol 8(33), 2015.
3. Parvathy VM, Gnanambigai M. Stability analysis of the variable speed wind turbine using sliding mode control. Indian Journal of Science and
Technology. 2015 Apr; 8(S7):467-70.
4. Elizondo, J.L, Olloqui, A.; Rivera, M.; Macias, M.E.; Probst, O.; Micheloud, O.M.; Rodriguez, J, "Model-Based Predictive Rotor Current Control
for Grid Synchronization of a DFIG Driven by an Indirect Matrix Converter, "IEEE Journal of Emerging and Selected Topics in Power
Electronics, Vol 2, No 4, pp 715 - 726, Dec 2014.
5. DhumalChaitrali D,, MullaMasoomraja Z ,A MATLAB Based Analysis of Direct Torque Control of a Matrix Converter Fed Grid Connected
Doubly Fed Induction Generator, IJLTEMAS,Volume VI, Issue VII, July 2017.
6. SumanMondal and Debaprasad Kastha, member IEEE, ‖ Improved Direct Torque and Reactive Power Control of a Matrix Converter Fed Grid
Connected Doubly Fed Induction Generator‖.2015.
7. Sivakumar P, Arutchelvi M, Soundarapandian R. Improved control strategy for grid connected scheme based on PV array and wind-driven
induction generators. Indian Journal of Science and Technology. 2014 Nov; 7(S7):165-73.
8. Dr.A. Amudha, M.Siva Ramkumar, M., SivaramKrishnan "Perturb and Observe Based Photovoltaic Power Generation System For Off-Grid
Using Sepic Converter" International Journal of Pure and Applied Mathematics, 114(7), pp. 619-628,2017.
9. M.Siva Ramkumar, M.Sivaram Krishnan, Dr.A. Amudha "Resonant Power Converter Using GA For PV Applications" International Journal Of
Electronics, Electrical And Computational System, 6 (9) pp239-245, 2017.
10. M.Siva Ramkumar, M.Sivaram Krishnan, Dr.A.Amudha "Impedance Source Inverter and Permanent Magnet Synchronous Generator For
Variable Speed Wind Turbine " International Journal of Computer & Mathematical Sciences (IJCMS) 6 (9) pp 98-105, 2017.
11. M.Siva Ramkumar "Unmanned Automated Railway Level Crossing System Using Zigbee" in International Journal of Electronics Engineering
Research (IJEER) 9 (9) pp1361-1371, 2017.
12. M. Sivaram Krishnan M. Siva Ramkumar and A. Amudha "Frequency Deviation Control In Hybrid Renewable Energy System Using Fc-Uc"in
International Journal of Control Theory and Applications (IJCTA) 10 (2) pp 333-344, 2017.
13. M Siva RamKumar, Dr.A. Amudha, R. Rajeev "Optimization For A Novel Single Switch Resonant Power Converter Using Ga To Improve Mppt
Efficiency Of Pv Applications" in International Journal of Applied Engineering Research (IJAER) 11(9) pp 6485-6488, 2016. .
14. M.Sivaram Krishnan, M.Siva Ramkumar and M.Sownthara "Power Management Of Hybrid Renewable Energy System By Frequency Deviation
Control" in 'International Journal of Innovative Research in Science, Engineering and Technology' on 3 (3) pp 763-769,2016.
15. R.Sudhakar and M.Siva Ramkumar "Boosting With SEPIC" in 'International Journal of Engineering and Science' 3 (4) pp 14-19,2014.
16. M.Sownthara and M.Siva Ramkumar, "Wireless Communication Module To Replace Resolver Cable In Welding Robot" in International Journal
of Advanced Information Science and Technology on 23(23 )pp 230-235,2014.
17. M.Siva Ramkumar and M.Sivaram Krishnan "Hybrid Solar-Wind Energy System" in 'International Journal of Advance Research in Computer
Science and Management Studies' 2(2), 2014.
18. M.Sivaram Krishnan and M.Siva Ramkumar "Power Management of a Hybrid Solar-Wind Energy System" in 'International Journal of
Engineering Research &Technology' 2 (1) pp1988-1992, 2014.
19. M.Sivaram Krishnan and M.Siva Ramkumar "Power Quality Analysis In Hybrid Energy Generation System" in 'International Journal of
Advance Research in Computer Science and Management Studies 2 (1) pp 188-193,2014.
20. S. Ananthanarayanan, Dr.A. Amudha, Dr.K. Balachander, M. Siva Ramkumar and D. Kavitha, "Design and Analysis of Power Quality
Improvement in Distribution Side Using PCC Technique with Fuzzy Logic Control" Journal of Advanced Research in Dynamical and Control
Systems, (12), pp 844-852
21. T. Kalimuthu, M. Siva Ramkumar, Dr.A. Amudha, Dr.K. Balachander and M. Sivaram Krishnan "A High Gain Input-Parallel Output-Series
DC/DC Converter with Dual Coupled-Inductors" Journal of Advanced Research in Dynamical and Control Systems, (12), pp 818-824
22. C. Chinnusamy, Dr.G. Emayavaramban, Dr.A. Amudha, Dr.K. Balacahnder and M. Siva Ramkumar,"Transient Stability Improvement in Power
System with SMES and Battery Energy Storage System" Journal of Advanced Research in Dynamical and Control Systems, (12), pp 900-914.
23. K. Kaleeswari, Dr.K. Balachander, Dr.A. Amudha, M. Siva Ramkumar and D. Kavitha, "Analysis and Parallel Operation of Novel Bidirectional
DC-DC Converter for DC Micro Grid" Journal of Advanced Research in Dynamical and Control Systems, (12), pp 928-940
24. M. Jayaprakash, D. Kavitha, M. Siva Ramkumar, Dr.K. Balacahnder and M. Sivaram Krishnan, "Achieving Efficient and Secure Data Acquisition
for Cloud-Supported Internet of Things in Grid Connected Solar, Wind and Battery Systems" Journal of Advanced Research in Dynamical and
Control Systems, (12), pp 966-981
25. Li Junwei, S.Ramkumar, G. Emayavaramban, D.Frankl n vinod, M. Thilagaraj, V. Muneeswaran, M. Pallikonda Rajasekaran, V.
Venkataraman, Ahmed Faeq Hussein, IEEE Access, "Brain Computer Interface for Neurodegenerative Person Using Electroencephalogram",
pp.2439 - 2452 Vol.(7), 2019.
26. GuJialu, S.Ramkumar, G. Emayavaramban, M. Thilagaraj, V.Muneeswaran, M. Pallikonda Rajasekaran, Ahmed Faeq Hussein "Offline Analysis
for Designing Electrooculograms Based Human Computer Interface Control for Paralyzed Patients" IEEE Access, 2018 , Vol.(6), pp: 79151 -
79161.
27. G.Emayavaramban, S.Ramkumar, A.Amudha, "Classification of Hand Gestures Using FFNN and TDNN Networks", International Journal of Pure
and Applied Mathematics, Vol.118 (8), 27-32.
28. G Emayavaramban, A Amudha, "Identifying Hand Gestures Using SEMG for Human Machine Interaction", ARPN Journal of Engineering and
Applied Sciences, Vol.11 (21), pp.12777-12785.
29. G Emayavaramban, A Amudha, "Recognition of sEMG for Prosthetic Control Using Static and Dynamic Neural Networks", International Journal
of Control Theory and Applications, Vol. 9 (24), pp.205-215.
30. D.Kavitha, Dr.C.Vivekanandan, "AnAdjustable Speed PFC Buck- boost Converter Fed Sensor less BLDC Motor" in International Journal of
Applied Engineering Research, ISSN 0973-4562 Vol. 10 No.20 (2015), pg. 17749-17754.
31. D. Kavitha, N. Sivakumar, M. Siva Ramkumar, V. Bhavithira, and S. Kalaiarasi, "A Single Stage High Gain Converter for Grid Interconnected
Renewable Application using Perturb and Observe" in International Journal of Control Theory and Applications, ISSN: 0974-5572 Vol. 10 No.38
(2017), pg. 161-175.
32. D.Kavitha, Dr.A.Amudha and S.Divyapriya, "Design of Controller for Regenerative Braking using BLDC Motor Applicable for Electric Vehicle"
in International Journal of Electronics, Electrical and Computational System- IJEECS, ISSN 2348-117X, Volume 6, Issue 9, September 2017,
pg.245-252
33. K. Govindaraju, V. Bhavithira, D. Kavitha, S. Kuppusamy, and K. Balachander, "Improvement of Voltage Profile and Loss Minimization in IEEE
14 Bus System using FACTS Devices" in International Journal of Control Theory and Applications, ISSN: 0974-5572 Vol. 10 No.38 (2017), pg.
213-224.
34. Xin Wan , Kezhong Zhang1, S. Ramkumar J. Deny, G. Emayavaramban , M. Siva RamkumarAnd Ahmed Faeq Hussein ," A Review on
Electroencephalogram Based BrainComputer Interface for Elderly Disabled" in IEEE Access, 219 , Vol.(7), pp: 36380 - 36387.
35. G. Emayavaramban, A. Amudha*, Rajendran T., M. Sivaramkumar, K. Balachandar, T. Ramesh. "Identifying User Suitability in sEMG
Based Hand Prosthesis Using Neural Networks" in Current Signal Transduction Therapy , (Pubmed& Scopus Indexed).
36. Dr.A.Amudha, M.Siva Ramkumar, M.Sivaram Krishnan "DESIGN AND SIMULATION OF ZETA CONVERTER WITH ZVZCS SWITCHING
TECHNIQUE" Journal of Engineering and Applied Sciences ,14(9) pp 2764-2774 DOI: 10.3923/jeasci.2019.2764.2774
37. M. Sivaram Krishnan, S. Sri Ragavi, M. Siva RamKumar, D. Kavitha "Smart Asthma Prediction System using Internet of Things" Indian Journal
of Public Health Research & Development, 10 (2) , pp 1103-1107 .DOI:10.5958/0976-5506.2019.00445.5
Authors: Parasuraman Kumar, B. Vijay Kumar
Paper Title: Brain Tumor MRI Segmentation and Classification Using Ensemble Classifier
Abstract: Brain tumor is a group of tissue that is prearranged by a slow addition of irregular cells. It occurs when cell
get abnormal formation within the brain. Recently it is becoming a major cause of death of many people. The
seriousness of brain tumor is very big among all the variety of cancers, so to save a life immediate detection and proper
treatment to be done. Detection of these cells is a difficult problem, because of the formation of the tumor cells. It is
very essential to compare brain tumor from the MRI treatment. It is very difficult to have vision about the abnormal
structures of human brain using simple imaging techniques. Ensemble methods have been called the most influential
development in Data Mining and Machine Learning in the past decade. They combine multiple models into one usually
more accurate than the best of its components. Ensemble methods combine the procedure of neural network, extreme
learning machine (ELM) and support vector machine classifiers. The proposed system consists of manifold phases.
Preprocessing, segmentation, feature extraction, and classification. At initially preprocessing is performed by using
filtering algorithm. Secondly segmentation is performed by using clustering algorithm. Thirdly feature extraction is
performed by Gray Level Co-Occurrence Matrix (GLCM). Automatic brain tumor stage is performed by using ensemble
classification. This phase classifies brain images into tumor and non-tumors using Feed Forwarded Artificial neural
network based classifier. Experiments have exposed that the method was more robust to initialization, faster and
accurate.

Keywords: Ensemble classifiers, GLCM, ELM, SVM, Feed Forward Artificial Neural Network and Fuzzy C-means
Clustering.

References:
1. Borole, V. Y., Nimbhore, S. S., &Kawthekar, D. S. S. (2015). Image Processing Techniques for Brain Tumor Detection: A Review. International
Journal of Emerging Trends & Technology in Computer Science (IJETTCS), 4(5), 2.
2. Bahadure, N. B., Ray, A. K., &Thethi, H. P. (2017). Image analysis for MRI based brain tumor detection and feature extraction using biologically
inspired BWT and SVM. International journal of biomedical imaging, 2017
3. Coatrieux, G., Huang, H., Shu, H., Luo, L., & Roux, C. (2013). A watermarking-based medical image integrity control system and an image
moment signature for tampering characterization. IEEE journal of biomedical and health informatics, 17(6), 1057-1067.
4. Saleck, M. M., ElMoutaouakkil, A., &Mouçouf, M. (2017, May). Tumor Detection in Mammography Images Using Fuzzy C-means and GLCM
Texture Features. In Computer Graphics, Imaging and Visualization, 2017 14th International Conference on (pp. 122-125). IEEE.
5. Zulpe, N., &Pawar, V. (2012). GLCM textural features for brain tumor classification. International Journal of Computer Science Issues (IJCSI),
9(3), 354.
6. Bhima, K., &Jagan, A. (2016, April). Analysis of MRI based brain tumor identification using segmentation technique. In Communication and
Signal Processing (ICCSP), 2016 International Conference on (pp. 2109-2113). IEEE.
7. Vrji, K. A., &Jayakumari, J. (2011, July). Automatic detection of brain tumor based on magnetic resonance image using CAD System with
44. watershed segmentation. In Signal Processing, Communication, Computing and Networking Technologies (ICSCCN), 2011 International
Conference on (pp. 145-150). IEEE. 244-252
8. Rashid, M. H. O., Mamun, M. A., Hossain, M. A., &Uddin, M. P. (2018, February). Brain Tumor Detection Using Anisotropic Filtering, SVM
Classifier and Morphological Operation from MR Images. In 2018 International Conference on Computer, Communication, Chemical, Material
and Electronic Engineering (IC4ME2) (pp. 1-4). IEEE.
9. Sudharani, K., Sarma, T. C., &Rasad, K. S. (2015, December). Intelligent Brain Tumor lesion classification and identification from MRI images
using k-NN technique. In Control, Instrumentation, Communication and Computational Technologies (ICCICCT), 2015 International Conference
on (pp. 777-780). IEEE.
10. Vidyarthi, A., & Mittal, N. (2013, December). A hybrid model for extraction of brain tumor in MR images. In Signal Processing and
Communication (ICSC), 2013 International Conference on (pp. 202-206). IEEE.
11. Li, W., Chen, C., Su, H., & Du, Q. (2015). Local Binary Patterns and Extreme Learning Machine for Hyperspectral Imagery Classification. IEEE
Trans. Geoscience and Remote Sensing, 53(7), 3681-3693.
12. Dhanaseely, A. J., Himavathi, S., &Srinivasan, E. (2012). Performance comparison of cascade and feed forward neural network for face
recognition system.
13. Liu, Q., & Liu, X. (2013, December). Feature Extraction of Human Viruses Microscopic Images Using Gray Level Co-occurrence Matrix. In
Computer Sciences and Applications (CSA), 2013 International Conference on (pp. 619-622). IEEE.
14. Singh, A. (2015, February). Detection of brain tumor in MRI images, using combination of fuzzy c-means and SVM. In Signal Processing and
Integrated Networks (SPIN), 2015 2ndInternationalConferenceon (pp. 98-102). IEEE.
15. Amasyali, M. F., &Ersoy, O. K. (2011, June). Comparison of single and ensemble classifiers in terms of accuracy and execution time. In
Innovations in Intelligent Systems and Applications (INISTA), 2011 International Symposium on (pp. 470-474). IEEE.
16. Hebli, A. P., & Gupta, S. (2016). Brain Tumor Detection Using Image processing: A Survey. In Proceedings of 65th IRF International
Conference, 20th November.
17. Kapoor, L., & Thakur, S. (2017, January). A survey on brain tumor detection using image processing techniques. In Cloud Computing, Data
Science & Engineering-Confluence, 2017 7th International Conference on (pp. 582-585). IEEE.
18. Rajesh C. patil, A.S. Bhalchandra, "Brain tumor extraction from MRI images Using MAT Lab", IJECSCSE, ISSN: 2277-9477, Volume 2, issue1.
19. Gopal,N.N. Karnan, M. , ―Diagnose brain tumor through MRI using image processing clustering algorithms such as Fuzzy C Means along with
intelligent optimization techniques Page(s): 1 - 4, Computational Intelligence and Computing Research (ICCIC), 2010 IEEE International
Conference, 28-29 Dec. 2010.
20. Srivastava, H. B., Kumar, V., Verma, H. K., &Sundaram, S. S. (2009). Image Pre-processing Algorithms for Detection of Small/Point Airborne
Targets. Defence Science Journal, 59(2).
21. Janani V, Meena P, "Image segmentation for tumor detection using fuzzy inference system", International Journal of Computer Science and
Mobile Computing, Vol. 2(5), 2013, pp. 244-248.
22. Acharya J, Gadhiya S and Raviya, "Segmentation techniques for image analysis: a review", International Journal of Computer Science and
Management Research, Vol. 2(4), 2013, pp. 1218-1221.
23. Naik D, Shah P, "A review on image segmentation clustering algorithms", International Journal of Computer science and Information
Technologies, Vol. 5(3), 2014, pp. 3289-3293.
24. Christ SA, Malathy K, Kandaswamy A, "Improved hybrid segmentation of brain MRI tissue and tumor using statistical feature", ICTACT Journal
on Image and video processing, Vol. 1(1), 2010, pp. 34-49.
25. Seerha GK, Kaur R, "Review on recent image segmentation techniques", International Journal of Computer Science Engineering, Vol. 5(2), 2013,
pp. 109- 112.
26. Panda M, Patra MR, "Some clustering algorithms to enhance the performance of the network intrusion detection system", Journal of Theoretical
and Applied Information Technology, Vol. 4(8), 2008, pp.795-801.
27. Sachdeva.J, Kumar.V, Gupta.I, Khandelwal.N, Ahuj.C.K , "Multiclass Brain Tumor Classification using GA-SVM" 978-0-7695-4593-6/11
$26.00 © 2011 IEEE DOI 10.1109/DeSE.2011.31
28. Kumar, G., & Bhatia, P. K. (2014, February). A detailed review of feature extraction in image processing systems. In Advanced Computing &
Communication Technologies (ACCT), 2014 Fourth International Conference on (pp. 5-12). IEEE.
29. Subashini. M.M, Sahoo. S.K, "Brain MR Image Segmentation for Tumour Detection using Artificial Neural Networks" ISSN: 0975-4024 Vol 5
No 2 Apr-May 2013.
30. Bramer. M. Ensemble classification. Principles of Data Mining, pages 209-220, 2013.
31. Hsieh, S. L., Hsieh, S. H., Cheng, P. H., Chen, C. H., Hsu, K. P., Lee, I. S., ... & Lai, F. (2012). Design ensemble machine learning model for
breast cancer diagnosis. Journal of medical systems, 36(5), 2841-2847.
32. Bouziane, H., Messabih, B., &Chouarfia, A. (2011). Profiles and majority voting-based ensemble method for protein secondary structure
prediction. Evolutionary Bioinformatics, 7, EBO-S7931.
33. Dietterich, T. G. (2000). An experimental comparison of three methods for constructing ensembles of decision trees: Bagging, boosting, and
randomization. Machine learning, 40(2), 139-157.
34. Rokach, L. (2010). Ensemble-based classifiers. Artificial Intelligence Review, 33(1-2), 1-39.
35. Jong, K., Mary, J., Cornuéjols, A., Marchiori, E., &Sebag, M. (2004, September). Ensemble feature ranking. In European Conference on
Principles of Data Mining and Knowledge Discovery (pp. 267-278). Springer, Berlin, Heidelberg.
36. Albadra, M. A. A., &Tiuna, S. (2017). Extreme Learning Machine: A Review. International Journal of Applied Engineering Research, 12(14),
4610-4623.
37. Vapnik. The Nature of Statistical Learning Theory. NY: Springer- Verlag. 1995.
38. Sazli, M. H. (2006). A brief review of feed-forward neural networks. Communications, Faculty of Science, University of Ankara, 50(1), 11-17
39. P. Kumar and B. Vijayakumar (2015). Brain Tumour Mr Image Segmentation and Classification Using by PCA and RBF Kernel Based Support
Vector Machine. Middle-East Journal of Scientific Research, Vol. 23, No. 9, pp. 2106-2116.
40. P. Kumar and B. Vijayakumar (2016). An Efficient Brain Tumor MRI Segmentation and Classification Using GLCM Texture Features and Feed
Forward Neural Networks. World Journal of Medical Sciences, Vol. 13, No. 2, Pp. 85-92.
Authors: Manju Rajan Babu
Paper Title: Research on Profitability And Liquidity Position of Banks With Reference To Pre And Post-Merger
Abstract: The main focus of the study was to evaluate the profitability and liquidity position of banks with reference
to Pre and post-merger in India. The financial performances of the Indian banking sector has been evaluated using
CAMEL approach and Data Envelopment Analysis. The study has employed a sample size of 17 banks, both national
and private banks. Pre and post-merger phases for the period 1998-2016 have been examined through analyzing
financial performance of each bank. The results have evaluated that HDFC bank ltd, Federal bank, and Bank of Baroda
were efficient in terms of the financial performance as compared to other banks. Capital structure and customer
requirements were enhanced by the efforts made by the banks.

Keywords: Profitability, Liquidity, Banks, Financial Performance.

JEL Classification Codes: E5, E6, G2, M4

References:
1. Agbada, A. O., &Osuji, C. C. (2013).The efficacy 9 management and banking performance in Nigeria.International review of management and
business research, 2(1), 223-233.
2. Almazari, A. A. (2014). Impact of internal factors on bank profitability: Comparative study between Saudi Arabia and Jordan. Journal of Applied
Finance and banking, 4(1), 125.
3. Al-Nimer, M., Warrad, L., &Alomri, R. (2013). The Impact of liquidity on Jordanian banks profitability through return on assets. Interdisciplinary
Journal of Contemporary Research in Business, 5(7), 70-76.
4. Alshatti, A. S. (2015). The Effect of the Liquidity Management on Profitability in the Jordanian Commercial Banks.International Journal of
Business and Management, 10(1), 62.Doi: https://doi.org/10.5539/ijbm.v10n1p62
45.
5. Bassey, G. E., & Moses, C. E. (2015). Bank Profitability and Liquidity Management: A Case Study of Selected Nigerian Deposit Money Banks.
6. Gattoufi, S., Al-Muharrami, S., &Shamas, G. (2014).Assessment of mergers and acquisitions in GCC banking.International Journal of Accounting 253-261
and Finance, 4(4), 358-377. Doi: https://doi.org/10.1504/ijaf.2014.066088
7. Ibe, S. O. (2013). The Impact of Liquidity Management on the Profitability of Banks in Nigeria.Journal of Finance and Bank Management, 1(1),
37-48.
8. Islam, K. A., Alam, I., & Hossain, S. A. (2014). Examination of Profitability between Islamic Banks and Conventional Banks in Bangladesh: A
Comparative Study. Research in Business and Management, 1(1), 78-89. Doi: https://doi.org/10.5296/rbm.v1i1.4894
9. Jain, H. (2016). Evaluation of the Financial Performance of Selected Acquiring Banks in India: An Event Study Approach. From The Desk of
Editors, 5.
10. Lartey, V. C., Antwi, S., &Boadi, E. K. (2013).The relationship between liquidity and profitability of listed banks in Ghana.International Journal
of Business and Social Science, 4(3).
11. Meena, A., &Dhar, J. (2016).An Empirical Analysis and Comparative Study of Liquidity Ratios and Asset-Liability Management of Banks
Operating in India.International Journal of Social, Behavioral, Educational, Economic, Business and Industrial Engineering, 8(1), 342-348.
12. Mwizarubi, M., Singh, H., &Prusty, S. (2015). Liquidity-Profitability Trade-off in Commercial Banks: Evidence from Tanzania.
13. Pahuja, A., & Aggarwal, S. (2016). Impact of Mergers and Acquisitions on Financial Performance: Evidence from Indian Banking Industry.
14. Patel, N. (2017). Merger and Acquisition-The Play of Gain and Loss?Asian Journal of Research in Business Economics and Management, 7(5),
360-367. Doi: https://doi.org/10.5958/2249-7307.2017.00063.9
15. Patel, R., & Shah, D. (2016). Mergers and Acquisitions-The Game of Profit and Loss: A Study of Indian Banking Sector. Researchers World,
7(3), 92.Doi: https://doi.org/10.18843/rwjasc/v7i3/11
16. Ray, S. (2013). Impact of Merger on Performance of Indian Banks: A Case Study on Specific Bank Merger in India. United States of America
Research Journal, 1(3).
17. Saeed, M. S. (2014). Bank-related, industry-related and macroeconomic factors affecting bank profitability: a case of the United Kingdom.
Research Journal of Finance and Accounting, 5(2), 42-50.
18. Singh, A., & Sharma, A. K. (2016).An empirical analysis of macroeconomic and bank-specific factors affecting liquidity of Indian banks.
19. Future Business Journal, 2(1), 40-53. Doi: https://doi.org/10.1016/j.fbj.2016.01.001
20. Sridharan, S. M., &Rathinam, I. B. (2016).Post-Mergers and Acquisitions Performance of Select Indian Banks.
Authors: D. Rajesh Kumar, R. Vishnuvardhan, R. Rahul
46. Paper Title: Experiment on Acoustic and Vibration Damping Properties of Natural Fiber Reinforced Composites
Abstract: The process of natural fibre materials in the structures has substantial quantity of attention recently.
Presently, few reports present on sound and vibration damping frequency properties in natural fibres materials
reinforced composites. In this chapter, the sound and vibration frequency properties of damping of natural material
based composites are distinguished. It was noticed that utilizing a natural (flax) fiber material reinforced composites has
33.8% improvement in vibration damping properties, when compared with glass fibre reinforced composites. Sound
wave absorption coefficient of natural material (flax) reinforced composite has also improved 17.64% and 20% at higher
and lower operating frequency levels respectively when related to glass fiber reinforced composites. These answer
suggest that, natural fiber material based composites could be an next solution for environmentally friendly to observe
the vibration and noise radiation problem.

Keywords: Flax, Sound Absorption, Vibration Damping.

References:
1. Bogoeva-Gaceva. G, Avella, Malinconico. M, Buzarovska, Grozdanov. A, Gentile. G, Natural fiber eco-composites. Polymer Composite. 28(1):
98-107.
2. Shitij Chabba and Anil N.Netravali. Green Composites using modified soy protein concentrate resin and flax fabrics and yarns. JSME
International Journal Series A 2004 (47): 557-5560.
3. Chen J et al. Spunlaced Flax/polypropylene nonwoven as auto interior material: acoustical and fogging performance. Bio based Materials 262-264
Bioenergy 2010 (4): 330-337.
4. Murali Mohan Rao K, MohanaRao K, Ratna Prasad AV. Fabrication and testing of natural fibre composites: vakka, sisal, bamboo and banana
2010 31(1): 508-13.
5. James J. Sargianis, Hyung-Ick Kim, Erik Andres, JonghwanSuhr. Sound and vibration damping characteristics in natural material based sandwich
composites. Composite Structures 2013 (96): 538-544.
6. Sunghee Lee, Taehyo Park, George Z. Voyiadjis. Vibration analysis of multi-delaminated beams. Composites: Part B 2003 (34): 647-659.
7. G. Thilagavathi, E. Pradeep, T. Kannaian and L. Sasikala. Development of Natural Fiber Nonwovens for Application as Car Interiors for Noise
Control. Journal of Industrial Textiles 2010 (39): 267-278.
8. Zhuang Li, Malcolm J. Crocker, "Effects of thickness and delamination on the damping in honeycomb-foam sandwich beams", Journal of Sound
and Vibration Vol.294 (2006) 473-485
9. Autark.kaw, Mechanics of Composite Materials, Hand book, Second Edition, CRC press, Taylor & Francis group (2006).
10. YichengDua, Ning Yan, Mark T. Kortschot, "Light-weight honeycomb core sandwich panels containing biofiber-reinforced thermoset polymer
composite skins: Fabrication and evaluation", Composites: Part B Vol.43 (2012) 2875-2882
11. M. R. Doddamani, S. M. Kulkarni, "Dynamic response of fly ash reinforced functionally graded rubber composite sandwiches - a Taguchi
approach", International Journal of Engineering, Science and Technology Vol. 3(1) (2011) 166-182
12. M.A. Dweib, B. Hu, A. O. Donnell, H.W. Shenton, R.P. Wool, "All natural composite sandwich beams for structural applications", Composite
structures Vol.63 (2004) 147-157
13. Deenadayalan, Sivakumar, S., Vishnuvardhan R., Sathish Kumar R, "Fabrication and Characterisation of B-H-G Fiber with Teak Wood Particles
Reinforced Hybrid Composite, International Journal of Engineering and Technology, Vol 7(2.31), 208 -211, 2018
Authors: R. Hari Sankar, S. Basnth, K.J. Ajay Ghosh, Manu Sivan, K. Vyshak Dileep
Paper Title: Research on Environment Friendly Alternatives for R22, R12 and R409A Refrigerants
Abstract: The paper analyses the comparative performance of vapour compression refrigeration of environmental
friendly alternatives for the commonly used refrigerants - R22 as well as R12 and R409A. The compared refrigerants are
R438A, R407C, R410A and R454C as R22 replacements. The alternatives for R12 and R409A examined are R513a,
R134a and R1234yf. The performances of refrigerants are tested in two refrigeration cycles - single stage vapour
compression cycle and single stage vapour compression cycle with heat exchanger. The results indicated that among the
R22 alternatives, up to condensation temperature of 20°C R454c has the highest coefficient of performance (COP) and
above condensation temperature of 30°C R407c has the highest COP. Among R12 and R409 replacements R134a
provides the highest COP for all practical values of condensation temperature.

Keywords: Refrigerant, COP, R22, R12, R409A

References:
47. 1. Charles C Allgood, "Performance of R-438A in R-22 Refrigeration and Air Conditioning Systems". International Refrigeration and Air
Conditioning Conference 2010
2. Md. Nawaz Khan1, Md. Mamoon Khan, "A Comparative Study of Refrigerants R12, R134A, R407 & R717 for Vapour Compression 265-271
Refrigeration system". International Journal of Advance Research In Science And Engineering IJARSE, Vol. No.4, Special Issue (01), February
2015
3. Derya Özkan, Özden Agra and Özlem Çetin,"A Comparison Between Refrigerants Used In Air Conditioning". Proceedings of Clima 2007
WellBeing Indoors
4. B. Hadya, P. Usha Sri, "Experimental Evaluation of Environmental Friendly and Low Global Warming Refrigerants as an Alternative Option for
Window Air Conditioning System ". Journal of Refrigeration, Air conditioning, Heating and ventilation 2014.
5. Suri Rajan, "Comparison of refrigerants R410a and R404a for use in low temperature applications: A computer model study" 2011
6. A.Baskaran, P.Koshy Mathews, " A Performance Comparison of Vapour Compression Refrigeration System Using Eco Friendly Refrigerants of
Low Global Warming Potential". International Journal of Scientific and Research Publications , Volume 2, Issue 2, September 2012
7. Bukola Olalekan Bolaji, Israel Olutunji Abiala, Salami Olasunkanmi Ismaila, Francis Olusesi Borokinni, "A Theoretical Comparison of Two Eco
Friendly Refrigerants as Alternatives to R22 Using a Simple Vapour Compression Refrigeration System.
8. R.K Dreepaul, "A study of alternative refrigerants for the refrigeration and air conditioning sector in Mauritius". IOP Conference Series: Earth and
Environmental Science, Volume 93, conference 1.
9. Rosenthal, Elisabeth, Lehren, Andrew W,"Relief in Every Window, but Global Worry Too". The New York Times. Archived from the original on
June 21, 2012. Retrieved June 21, 2012
10. "Table 2.14 (Errata). Lifetimes, radiative efficiencies and direct (except for CH4) GWPs relative to CO2".
Authors: G. Gaswin Kastro, M.C. John Wiselin
Paper Title: Design and Analysis of Stub Loaded Resonator
48.
Abstract: Microwave filters are an important component in front end receiver of microwave communication system.
272-283
They are used for passing frequency components within a particular pass band and to reject the interfering signal outside
of that operating frequency band. Their functionality also includes to reject the unwanted product from the output of the
mixers and amplifiers, and to set the IF bandwidth of the IF receiver. Important parameters include cutoff frequency,
insertion loss, out of the band attenuation rate measured in dB per decade of the frequency. Filters with sharper cutoff
frequency provide more rejection for out of the band signals. Insertion loss, measured in dB, is the amount of
attenuation seen by signal through the pass band of the filter. Size requirement for most of the Personal Communication
Systems require filters to be compact in size and wideband. This work presents design of Microwave filters in Global
System for Mobile and Wireless Local Area Network Bands. Afterwards, a detailed analysis for designing filters with
these requirements in presented. First, a Conventional T Shape Bandpass Filter is presented. Consequently, A
Modification in T Shape Microstrip Bandpass Filter is presented with considerable size reduction.

References:
1. A. I. Zverev, Handbook of Filter Synthesis. New York: John Wiley & Sons, 1967.
2. J. Helszajn, Synthesis of Lumped Element, Distributed and Planar Filters. London: McGraw-Hill, 1990.
3. Ming-Lin Chuang and Ming-Tien Wu, "Microstrip Multiplexer and Switchable Diplexer with Joint T-Shaped Resonators", IEEE Microw.
Wireless Compon. Lett., Vol. 24, no.5, May 2014 .
4. Runqi Zhang and Lei Zhu, "Design of a Compact Dual-Band Bandpass Filter Using Coupled Stepped-Impedance Resonators," IEEE Microw.
Wireless Compon. Lett., Vol. 24, no.3, March 2014 .
5. Cheng-Ying Hsu; Chu-Yu Chen; Huey-Ru Chuang "Microstrip Dual-Band Bandpass Filter Design With Closely Specified Passbands", IEEE and
Microwave Theory and Techniques, pp. 98 - 106 Volume: 61, Issue: 1, Jan. 2013.
6. M.T. Doan, W.Q. Che and W.J. Feng, "Tri-Band Bandpass Filter Using Square Ring Short Stub Loaded Resonators," Electronics Letters, Vol. 48,
No. 2, pp. 106-107, January 2012.
7. Luo, S., L. Zhu, and S. Sun, "Compact dual-mode triple-band bandpass filters using three pairs of degenerate modes in a ring resonator," IEEE
Trans. Microw. Theory Tech., Vol. 59, 1222-1229, 2011.
8. Chiou, Y.-C. and J.-T. Kuo, "Planar multiband bandpass filter with multimode stepped-impedance resonators," Progress In Electromagnetics
Research, Vol. 114, 129-144, 2011.
9. Zhang, L., Z.-Y. Yu, and S.-G. Mo, "Novel planar multimode bandpass filters with radial-line stubs," Progress In Electromagnetics Research, Vol.
101, 33-42, 2010.
10. Chen, F. C. and Q. X. Chu, "Design of compact tri-band bandpass filters using assembled resonators," IEEE Trans. Microw. Theory Tech., Vol.
57, 165-171, 2009.
11. J.Z. Chen, N. Wang, Y. He and C.H. Liang, "Fourth-Order Tri-Band Bandpass Filter Using Square Ring Loaded Re
Authors: E. Srividhya, A. Muthukumaravel
Paper Title: Diabetes Diagnostic Method based on Tongue Image Using ANN & CNN Classifier
Abstract: In this paper diagnosing diabetic using tongue image is classified based on the machine learning and deep
learning concepts. For machine learning Artificial Neural Network (ANN) and for deep learning Convolution Neural
Network (CNN) are used to classify the diabetic patients tongue. There is a strong relationship between the
characteristics of tongue and human health diagnosis for any diseases. In this proposed method we are going to get the
input image, preprocessing the image for noise reduction and segment the image with size, shape and color, then we
have to classify whether that image is diabetic or healthy tongue image. If it is a diabetic image again we have to
classify for Diabetic Mellitus types that istype 1 and type 2 based on the severity in the image. The proposed method is
compared with SVM classifier for better accuracy. As the experiment results in 98% of accuracy in diagnosing the
diabetic diseases.

Keywords: Tongue image classification, ANN classifier, CNN classifier, Machine learning techniques, Deep learning
techniques.

References:
1. Zhao Zhong-xu, Wang Ai-min, ShenLan-sun. "Color Tongue Image Segmentation Based on Mathematical Morphology and HSI Model," Journal
of Beijing Industry University, 25(2), pp. 67-71, 1999.
2. Du Jian-qiang, Lu Yan-sheng, Zhu Ming-feng, Zhang Kang and Ding Cheng-hua, "A Novel Algorithm of Color Tongue Image Segmentation
49. Based on HSI," Proc. of BMEI, VOL. 1, pp.733-737, May 2008.
3. "A novel approach based on computerized image analysis for traditional Chinese medical diagnosis of the tongue ",Chuang-Chien Chiu Institute
of Automatic Control Engineering, Feng Chia Uni6ersity, Taichung, Taiwan, ROC Received 18 August 1998; accepted 25 March 1999.Computer 284-288
Methods and Programs in Biomedicine 61 (2000) 77-89
4. "A high quality color imaging system for computerized tongue image analysis ",XingzhengWanga, David Zhang b, a Shenzhen Key Laboratory of
Broadband Network & Multimedia, Graduate School at Shenzhen, Tsinghua University, Shenzhen, China b Biometric Research Center,
Department of Computing, The Hong Kong Polytechnic University, Hong KongExpert Systems with Applications 40 (2013) 5854-5866
5. M. Kim, D. Cobbin, C. Zaslawski Traditional Chinese medicine tongue inspection: an examination of the inter- and intrapractitioner reliability for
specific tongue characteristics J. Alternat. Complement. Med., 14 (5) (2008), pp. 527-536
6. K.A. O'Brien, S. BirchA review of the reliability of traditional East Asian medicine diagnoses,J. Alternat. Complement. Med., 15 (4) (2009), pp.
353-366
7. J.J. Staal, M.D. Abramoff, M. Niemeijer, M.A. Viergever, and B. van Ginneken, "Ridge based vessel segment action in color images of the
retina," IEEE Trans. on Medical Imaging, vol. 23, pp. 501-509, 2004.
8. B. Zhang, F. Karray, Q. Li, and L. Zhang, "Sparse Represent at ion Classifier for micro aneurysm detection and retinal blood vessel extraction,"
Inf. Sci., vol. 200, pp. 78-90, 2012.
9. M.RajaSekar, "Automatic Vehicle Identification" Journal of Advanced Research in Computer Engineering, pp 0974-4320, 2015.
10. Brunelli, R., Poggio, T., Face recognition: Features versus templates. IEEE Transactions on Pattern Analysis and Machine Intelligence,
15(10):1042-1052, 2015.
11. Ming-Der Yang, Kai-Shiang Huang, Yeh Fen Yang, Liang-You Lu, Zheng-Yi Feng, and Hui Ping Tsai," Hyperspectral Image Classification
Using Fast and Adaptive Bidimensional Empirical Mode Decomposition With Minimum Noise Fraction", IEEE GEOSCIENCE AND REMOTE
SENSING LETTERS, VOL. 13, NO. 12, DECEMBER 2016, Digital Object Identifier 10.1109/LGRS.2016.2618930.
12. A. Rahman, G. Timms, M. S. Shahriar, C. Sennersten, A. Davie, C. A. Lindley, A. Hellicar, G. Smith, D. Biggins, and M. Coombe," Association
between Imaging and XRF Sensing: A Machine Learning Approach to Discover Mineralogy in Abandoned Mine Voids", IEEE Sensors Journal,
DOI 10.1109/JSEN.2016.2546241.
Authors: S. Meenakshi, M. Siva Jothi, D. Murugan
50. Paper Title: Face Recognition Using Deep Neural Network across Variations In Pose And Illumination
Abstract: Face recognition is an active area of research in computer vision. It is one of the fastest growing biometric
systems over the past years. Several research efforts have been carried out to recognize the face images using different
techniques ranging from appearance-based method, feature based method and hybrid method with different results.
However, face recognition is a challenging task due to the facial expressions, occlusions, variations in pose and
illumination variation etc. To handle the pose and illumination variation in face images, this paper developed an
architecture for face recognition using deep neural network. Convolutional neural network is trained to recognize the
face images. The developed method is tested on ORL database by varying feature maps to find the best architecture.
Results showed that the proposed method with architecture 15-90-150 provide better results compared to the state of art
methods. It is also proved that the proposed model is robust to pose and illumination variation.

Keywords: Biometric Authentication, Convolutional Neural Network, Face Recognition.

References:
1. H. Srivastava, 'A comparison-based study on biometrics for human recognition', OSR Journal of Computer Engineering, 15(1), (2013), 22-29.
2. C.H. Kalyani, 'Various biometric authentication techniques: A review', Journal of biometrics and biostatistics, 8(5), (2017).
3. A.Sekhon, P. Agarwal, 'Face recognition using artificial neural network', International Journal of computer science and Information technology,
7(2), (2016), 896-899.
4. L. Blanger and A.R. Panisson, 'A face recognition library using convolutional neural network', International journal of engineering research and
science, 3(8), (2017), 84-92. 289-292
5. S.G. Bhele and V.H. Mankar, ' A review paper on face recognition techniques', International journal of Advanced research in computer
engineering and technology, 1(8), (2012), 339-346.
6. Kaushal and J.P.S. Raina, 'Face detection using neural network and gabor wavelet transform', International journal of computer science and
technology, 1(1), (2010), 58-63.
7. F.Z. Chelali and A. Djeradi, 'Face recognition system using neural network with Gabor and discrete wavelet transform parameterization', 6th
International conference of soft computing and pattern recognition, IEEE, (2014).
8. Y. Xu, F.Liang, G. Zhang and H.Xu, 'Image intelligent detection based on the Gabor wavelet and the neural network', Symmetry, 8(130), (2016).
9. S.Rawat, 'Face recognition using back propagation neural network', International journal of innovations in Engineering and Technology, 10(4),
(2018), 125-132.
10. A.R.syafeeza, M.K. Hani, S.S. Uiw and R. Bakhteri,' Convolutional neural network for face recognition with pose and illumination variation',
International journal of engineering and Technology, 6(1), (2014), 44-57.
11. H. Khalajzadeh, M. Manthouri and M. Teshnehlab, 'Face recognition using convolutional neural networks and simple logistic classifier',
Advances in intelligent systems and computing, 223, (2014), 197-207.
12. P. Kamencay, N. Benco, T.Mizdos and R.Radil, 'A new method for face recognition using convolutional neural network', Digital image
processing and computer graphics, 15(4), (2017), 663-672.
13. L. Blanger and A.R. Panisson, 'A face recognition using convolution neural networks', International journal of engineering research and science,
3(8), (2017), 84-92.
14. S.S. Ahranjany,F.Razzazi and M.H Ghassemian,' A very high accuracy handwritten character recognition system for Farsi/Arabic digits using
Convolutional Neural Networks', In: IEEE Fifth International Conference on Bio-Inspired Computing, Theories and Applications (BICTA),
(2010),1585-1592
15. The ORL database of faces, AT&T Laboratories Cambridge.
Authors: P.S. Anusree, P. Balasubramanian
Paper Title: Awareness and Disposal Practices of E-waste with Reference to Household Users in Kochi City
Abstract: Exponential growth of electronic industry over the years has generated a mammoth challenge in the form of
obsolete electronics or e-waste. Junk electronics pose serious threat to health and environment through toxic pollution. It
also adds to space constraints leading to creation of massive dumps and illegal trans-boundary movement within
economies. The evolving consumer of today must be aware of the impacts of his purchase practice, especially in the
case of electronic products. Moreover, the electronic scrap disposal methods adopted by them greatly influence the
magnitude of carbon footprint on the ecology. A socially responsible individual ensures that he channelizes the scrap
through appropriate channels and does his bit in conserving the natural resources.
This paper is an attempt to study the awareness and practice of the household users of electronic products with regards
to obsolete or end-of-life electronic items. The study is based on primary data consisting of thirty samples collected
from Kochi City. In the process of data collection it was observed that majority of the respondents did not have required
awareness about the concerns with used or end-of-life electronics. Hence, the survey process turned out to be rather
informative to the respondents. The collected samples have been analyzed through simple percentage analysis. The
study found that disposal facilities were not appropriately available to the households because of which they had to
depend on junk collectors to get rid of unused or obsolete electronic products.
51.
Keywords: E-waste, Disposal, Environment, Household Users, Awareness. 293-299

References:
1. Miguel Aguilar Cortes and Martha Lilia Domínguez Patiño (2016).Recycling of Electronic Waste, Using Basic and Acid Leaching, Open Journal
of Applied Sciences, 6, 169 - 176. http://dx.doi.org/10.4236/ojapps.2016.63018
2. Shahriar Hossain, Siddika Sulatan, Farida Shahnaz, Asrafi B. Akram, Maherun Nesa and James Happell (2010).Study on E-waste: Bangladesh
Situation, Environment and Social Development Organiation (ESDO), Dhaka, Bangladesh,
3. G. Gaidajis, K. Angelakoglou and D. Aktsoglou (2010). E-waste: Environmental Problems and Current Management, Journal of Engineering
Science and Technology Review 3 (1) 193 - 199
4. Vidyadhar Ari (2016). A Review of Technology of Metal Recovery from Electronic Waste, E-Waste in Transition - From Pollution to Resource,
Dr. Florin-Constantin Mihai (Ed.), InTech, DOI: 10.5772/61569. Available from: https://www.intechopen.com/books/e-waste-in-transition-from-
pollution-to-resource/a-review-of-technology-of-metal-recovery-from-electronic-waste
5. Santhanam Needhidasan, Melvin Samuel, and Ramalingam Chidambaram (2014) Electronic waste - an Emerging Threat to the environment of
Urban India, Journal of Environmental Health Science and Engineering, Vol. 12: 36
6. Vilote N. Pinto (2008). E-waste Hazard: The Impending Challenge, Indian Journal of Occupational and Environmental Medicine, vol 12 (2), 65-
70
7. Sinha-Khetriwal D. (2002).The management of electronic waste: A comparative study on India and Switzerland. St. Gallen, Switzerland: M.S.
thesis, University of St. Gallen.
8. Gagan Flora, Deepesh Gupta and Archana Tiwari (2012).Toxicity of Lead: A Review with recent updates, Interdisciplinary Toxicology, 5(2), 47-
58
9. M. Khurrum S. Bhutta, Adnan Omar, and Xiaozhe Yang (2011). Electronic Waste: A Growing Concern in Today's Environment, Economics
Research International, vol. 2011, Article ID 474230, 8 pages, 2011. doi:10.1155/2011/474230
10. Monika and Jugal Kishore (2010). E-waste Management: As a Challenge to Public Health in India, Indian Journal of Community Medicine, vol.
35 (3), 382-385
11. M.D. Jalal Uddin (2012) Journal and Conference Paper On (Enviornment) E - Waste Management, IOSR Journal of Mechanical and Civil
Engineering (IOSRJMCE), Volume 2, Issue 1 (July-Aug 2012), 25-45
12. I.C. Nnoroma, and O. Osibanjo (2008) Overview of electronic waste (e-waste) management practices and legislations, and their poor applications
in the developing countries, Resources, Conservation and Recycling 52 (6) 843-858
13. Krista E. Dawson (2016). The Ethical Issues of Dumping Electronic Waste in India, Augustana Center for the Study of Ethics Essay Contest.
14. Eric Williams, Ramzy Kahhat , Magnus Bengtsson , Shiko Hayashi , Yasuhiko Hotta and Yoshiaki Totoki (2013) Linking Informal and Formal
Electronics Recycling via an Interface Organization, Challenges, 4, 136-153
15. Kristen Grant, Fiona C. Goldizen, Peter D Sly, Marie-Noel Brune, Maria Neira, Martin van den Berg and Rosana E Norman (2013). Health
Consequences of exposure to E-waste: A Systematic Review, The Lancet Global Health, vol.1, no.6, 350 -361
16. Devin N. Perkins, Marie-Noel Drisse, Tapiwa Nxele and Peter D. Sly (2014). E-waste: A Global Hazard, Annals of Global Health, vol. 80 (4),
286-295
17. Ceballos D.M. and Dong Z (2016). The Formal Electronic Recycling Industry: Challenges and Opportunities in Occupational and Environmental
Health Research, Environment International 95(2016), 157 -166
18. Kruger C, Raghupathy L, Chaturvedi A, Arora R and Henzler M.P, E-waste Recycling in India,
19. Bridging the Gap between the Informal and Formal Sector.
Authors: P.K. Sandhya Balakrishnan, L. Pavithira
Paper Title: Multi-font Optical Character Recognition Using Deep Learning
Abstract: Deep learning (DL) is a new area of research in classification, in which the aim is moving us closer towards
the objective of artificial intelligent. However, the results of a DBN are often highly based on settings in particular the
combination of runtime parameter values. In this paper, Simulated Annealing (SA) is proposed to increase the results of
Convolution Neural Network (CNN), as an alternate method for traditional CNN. Then the proposed SA-CNN classifier
is implemented using RETAS OCR dataset and provided the improved recognition accuracy than the CNN classifier.

Keywords: Deep Learning, SA, CNN, OCR.

References:
1. R. Anil, K. Manjusha, S. S. Kumar, and K. P. Soman, "Convolutional Neural Networks for the Recognition of Malayalam Characters," in
Proceedings of the 3rdInternational Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, vol.328, Springer
International Publishing, 2015, pp. 493-500.
2. M. Oquab, L. Bottou, I. Laptev, and J. Sivic, "Learning and Transferring Mid-level Image Representations Using Convolutional Neural
Networks," in Proceedings of the2014 Computer Vision and Pattern Recognition (CVPR), 2014, pp. 1717-1724.
3. Y. Tang, L. Peng, Q. Xu, Y. Wang, and A. Furuhata, "CNN Based Transfer Learning for Historical Chinese Character Recognition," in
Proceedings of the 12th IAPR Workshop on Document Analysis Systems (DAS), 2016,pp. 25-29.
4. L. Deng and D. Yu, Deep Learning: Methods and Application, NOW Publisers 2014.
52. 5. J.D. Lamos Sweeney, Deep Learning using Genetic Algorithms, master thesis, Dept. of Computer Science, Rochester Institute of Technology,
2012.
6. G. Hinton and R. Salakhutdinov, "Reducing the dimensionality of data with neural network", Science, 313:504-507, 2006. 300-302
7. Xin-She Yang, Engineering Optimization: an introduction with metaheuristic applications, John Wiley & Sons, Hoboken, New Jersey, 2010.
8. El-Ghazali Talbi, Metaheuristics from Design to Implementation, John Wiley & Sons, Hoboken, New Jersey, 2009.
9. Kai Ding, Zhibin Liu, LianwenJin, Xinghua Zhu, "A Comparativestudy of GABOR feature and gradient feature for handwritten Chinese character
recognition", International Conference on Wavelet Analysisand Pattern Recognition, pp. 1182-1186, Beijing, China, 2-4 Nov.2007
10. Pranob K Charles, V.Harish, M.Swathi, CH. Deepthi, "A Review onthe Various Techniques used for Optical Character Recognition",
International Journal of Engineering Research and Applications, Vol. 2, Issue 1, pp. 659-662, Jan-Feb 2012
11. Om Prakash Sharma, M. K. Ghose, Krishna Bikram Shah, "An Improved Zone Based Hybrid Feature Extraction Model for Hand written
Alphabets Recognition Using Euler Number", International Journal of Soft Computing and Engineering, Vol.2, Issue2, pp. 504-58, May 2012
12. J.R. Prasad, Template matching algorithm for Gujrati Character Recognition, IEEE 2nd International conference on Emerging Trends in
Engineering and Technology, ICETET (2009)
13. Z.You-qing, A Recognition Method of Car License Plate Characters Based on Template Matching Using Modified Hausdorff Distance. IEEE
International Conference on Computer, Mechatronics, control and electronic Engineering (CMDE) (2010)
14. F.Aghdasi, Automatic Licence Plate recognition system, IEEE AFRICON(2004)
15. J.Jiao, A configurable method for multi-style license plate recognition. Pattern Recognitionn, Vol: 42, No: 3, pages 358-369 (2009)
16. M.M Farhad, An efficient Optical Character Recognition Algorithm using Aritificial Neural Network by Curvative Properties. IEEE International
conference on informatics, electronics ´e vision (2014)
17. Y. Bengio, A. Courville, and P. Vincent. Representation learning: A review and new perspectives. IEEE Transactions on Pattern Analysis and
Machine Intelligence, 35(8):1798-1828, Aug 2013.
18. "The Internet Archive," http://www.archive.org, 2011.
19. "Project Gutenberg," http://www.gutenberg.org, 2011.
Authors: K.T. Chandrasekaran, S. Divyapriya, A. Amudha, M. Siva Ramkumar, G. Emayavaramban
Paper Title: Low Cost Residential Micro Grid System based Home to Grid Backup Power Management
Abstract: Load Shedding or power interference are basic in creating countries to relieve control request. A low
reinforcement control supply is utilized by non control shoppers amid supply disappointment. By and by housetop,
network connected, sunlight based photograph voltaic (PV) based inverters are by and large significantly utilized for
53. household based reinforcement. Amid completely charged battery condition, the battery is charged by the network. The
intensity of sun powered PV framework is under used as the sun based vitality is somewhat utilized for charging battery.
303-307
The proposed supervisory exchanging control framework work proficient than the customary framework. The proposed
controller has been productively completed with the private smaller scale framework The proposed gadget additionally
fills in as household to-lattice (H2G) framework to satisfy stack call for and stature heap of programming matrix for the
span of the light hours with the guide of is finding the private miniaturized scale network.
Keywords: Load Shedding, PV, Inverter.

References:
1. Agarwal, R. K., Hussain, I., & Singh, B. (2016). "LMF-based control algorithm for single stage three-phase grid integrated solar PV system".
IEEE Transactions on Sustainable Energy, 7(October (4)), 1579-1586.
2. Ahmad, F., &Alam, M. S. (2017). Feasibility study, "design and implementation of smart poly generation micro grid at AMU". Sustainable Cities
and Society, 35(November), 309-32.
3. Ahmad, F., Alam, M. S., &Asaad, M. (2017). "Developments in PEVs charging infrastructure and energy management system for smart micro
grids including PEVs". Sustainable Cities and Society, 35, 552-564.
4. Alam, M. S., Azeem, M. F., &Alouani, A. T. (2014). "Modified queen-bee algorithm-based fuzzy logic control for real-time robust load matching
for a solar PV system". ISSN: 1949-3029 IEEE Transactions on Sustainable Energy-Special Issue on Real-Time Applications of Intelligent
Methods in Sustainable Power and Energy Systems, 5(2), 691-698.
5. Asaad, M., Ahmad, F., Alam, M. S., &Rafat, Y. (2017). "IoT enabled electric vehicle's battery monitoring system". EAI, SGIOT.
http://dx.doi.org/10.4108/eai.7-8-2017.152984.
6. Bindra, A. (2016). "Projecting the evolution of power electronics": highlights from FEPPCON VIII. IEEE Power Electronics Magazine, 3(1), 32-
44.
7. Chavali, P., Yang, P., &Nehorai, A. (2014). "A distributed algorithm of appliance scheduling for home energy management system". IEEE
Transactions on Smart Grid, 5,282-290.
8. Das, M., &Agarwal, V. (2015). "Novel high performance standalone solar PV system with high gain, high eficiency DC-DC converter power
stages. IEEE Transactions on Industry Applications", 51(6), 4718-4728.
9. Daut, I., et al. (2011). "Clear sky global solar irradiance on tilt angles of photovoltaic module in Perlis, northern Malaysia". International
conference on electrical, control and computer engineering 2011 (InECCE), pp. 445-450.
10. Debnath, D., &Chatterjee, K. (2015). "Two-stage solar photovoltaic-based stand-alone scheme having battery as energy storage element for rural
deployment". IEEE Transactions on Industrial Electronics, 62(7), 4148-4157.
11. S Divyapriya, A Amudha, R Vijayakumar"Automatic Frequency Response for Autonomous Distributed V2G (Vehicle-to-Grid) Using IoT
Technology" Journal of Electrical Engineering 19(1), 2018.
12. El Batawy, S. A., &Morsi, W. G. (2016). "Optimal secondary distribution system design considering rooftop solar photovoltaic". IEEE
Transactions on Sustainable Energy, 7(4), 1662-1671.
13. [ S Divyapriya, A Amudha, R Vijayakumar "Design of Residential Plug-in Electric Vehicle Charging Station with Time of Use Tariff and IoT
Technology"2018 International Conference on Soft-computing and Network Security (ICSNS),IEEE 10.1109/ICSNS.2018.8573637 1-5.
14. Erdinc, O., Paterakis, N. G., Mendes, T. D. P., Bakirtzis, A. G., &Catalão, J. P. S. (2015)."Smart household operation considering Bi-directional
EV and ESS utilization by real-time pricing-based DR". IEEE Transactions on Smart Grid, 6, 1281-1291.
15. Divyapriya S, Amudha A, Vijayakumar R. Design of Renewable Energy Based PEVS Charging Station With Energy Man-agement Technique. J
Adv Res DynamCont Sys 2017; 9(17): 856-69.
16. S Divyapriya, A Amudha, R Vijayakumar "Design and Implementation of Grid Connected Solar/Wind/Diesel Generator Powered Charging
Station for Electric Vehicles with Vehicle to Grid Technology Using IoT ",Current Signal Transduction Therapy Research article 13(1),59-
67,2018.
17. Dr.A. Amudha, M. Siva Ramkumar, M., SivaramKrishnan "Perturb and Observe Based Photovoltaic Power Generation System For Off-Grid
Using Sepic Converter" International Journal of Pure and Applied Mathematics, 114(7), pp. 619-628, 2017.
18. M. Siva Ramkumar, M. Sivaram Krishnan, Dr.A. Amudha "Resonant Power Converter Using GA For PV Applications" International Journal Of
Electronics, Electrical And Computational System, 6 (9) pp239-245, 2017.
19. M. Siva Ramkumar, M. Sivaram Krishnan, Dr.A. Amudha "Impedance Source Inverter and Permanent Magnet Synchronous Generator For
Variable Speed Wind Turbine " International Journal of Computer & Mathematical Sciences (IJCMS) 6 (9) pp 98-105, 2017.
20. M. Sivaram Krishnan M. Siva Ramkumar and A. Amudha "Frequency Deviation Control In Hybrid Renewable Energy System Using Fc-Uc "in
International Journal of Control Theory and Applications (IJCTA) 10 (2) pp 333-344, 2017.
21. M Siva RamKumar, Dr.A. Amudha, R. Rajeev "Optimization For A Novel Single Switch Resonant Power Converter Using Ga To Improve Mppt
Efficiency Of Pv Applications" in International Journal of Applied Engineering Research (IJAER) 11(9) pp 6485-6488, 2016.
22. C. Chinnusamy, Dr.G. Emayavaramban, Dr.A. Amudha, Dr.K. Balacahnder and M. Siva Ramkumar, "Transient Stability Improvement in Power
System with SMES and Battery Energy Storage System" Journal of Advanced Research in Dynamical and Control Systems, (12), pp 900-914
23. K. Kaleeswari, Dr.K. Balachander, Dr.A. Amudha, M. Siva Ramkumar and D. Kavitha, "Analysis and Parallel Operation of Novel Bidirectional
DC-DC Converter for DC Micro Grid" Journal of Advanced Research in Dynamical and Control Systems, (12), pp 928-940
24. M. Jayaprakash, D. Kavitha, M. Siva Ramkumar, Dr.K. Balacahnder and M. Sivaram Krishnan, "Achieving Efficient and Secure Data Acquisition
for Cloud-Supported Internet of Things in Grid Connected Solar, Wind and Battery Systems" Journal of Advanced Research in Dynamical and
Control Systems, (12), pp 966-981
25. Li Junwei, S.Ramkumar, G. Emayavaramban, D.Frankl n vinod, M. Thilagaraj, V. Muneeswaran, M. Pallikonda Rajasekaran, V.
Venkataraman, Ahmed Faeq Hussein, IEEE Access, "Brain Computer Interface for Neurodegenerative Person Using Electroencephalogram",
pp.2439 - 2452 Vol.(7), 2019.
26. GuJialu, S.Ramkumar, G. Emayavaramban, M. Thilagaraj, V. Muneeswaran, M. Pallikonda Rajasekaran, Ahmed Faeq Hussein "Offline
Analysis for Designing Electrooculograms Based Human Computer Interface Control for Paralyzed Patients" IEEE Access, 2018 , Vol.(6), pp:
79151 - 79161.
27. G. Emayavaramban, S.Ramkumar, A. Amudha, "Classification of Hand Gestures Using FFNN and TDNN Networks", International Journal of
Pure and Applied Mathematics, Vol.118 (8), 27-32.
28. G Emayavaramban, A Amudha, "Identifying Hand Gestures Using SEMG for Human Machine Interaction", ARPN Journal of Engineering and
Applied Sciences, Vol.11 (21), pp.12777-12785.
29. G Emayavaramban, A Amudha, "Recognition of sEMG for Prosthetic Control Using Static and Dynamic Neural Networks", International Journal
of Control Theory and Applications, Vol. 9 (24), pp.205-215.
30. D. Kavitha, Dr.C. Vivekanandan, "An Adjustable Speed PFC Buck- boost Converter Fed Sensor less BLDC Motor" in International Journal of
Applied Engineering Research, ISSN 0973-4562 Vol. 10 No.20 (2015), pg. 17749-17754.
31. D. Kavitha, N. Sivakumar, M. Siva Ramkumar, V. Bhavithira, and S. Kalaiarasi, "A Single Stage High Gain Converter for Grid Interconnected
Renewable Application using Perturb and Observe" in International Journal of Control Theory and Applications, ISSN: 0974-5572 Vol. 10 No.38
(2017), pg. 161-175.
32. D. Kavitha, Dr.A. Amudha and S. Divyapriya, "Design of Controller for Regenerative Braking using BLDC Motor Applicable for Electric
Vehicle" in International Journal of Electronics, Electrical and Computational System- IJEECS, ISSN 2348-117X, Volume 6, Issue 9, September
2017, pg.245-252
33. K. Govindaraju, V. Bhavithira, D. Kavitha, S. Kuppusamy, and K. Balachander, "Improvement of Voltage Profile and Loss Minimization in IEEE
14 Bus System using FACTS Devices" in International Journal of Control Theory and Applications, ISSN: 0974-5572 Vol. 10 No.38 (2017), pg.
213-224.
34. Xin Wan , Kezhong Zhang1, S. Ramkumar J. Deny, G. Emayavaramban , M. Siva Ramkumar And Ahmed Faeq Hussein ," A Review on
Electroencephalogram Based Brain Computer Interface for Elderly Disabled" in IEEE Access, 219 , Vol.(7), pp: 36380 - 36387.
35. G. Emayavaramban, A. Amudha*, Rajendran T., M. Sivaramkumar, K. Balachandar, T. Ramesh. "Identifying User Suitability in
sEMGBased Hand Prosthesis Using Neural Networks" in Current Signal Transduction Therapy , (Pubmed& Scopus Indexed) DOI :
10.2174/1574362413666180604100542
36. Dr.A.Amudha, M.Siva Ramkumar, M.Sivaram Krishnan "DESIGN AND SIMULATION OF ZETA CONVERTER WITH ZVZCS SWITCHING
TECHNIQUE" Journal of Engineering and Applied Sciences ,14(9) pp 2764-2774 DOI: 10.3923/jeasci.2019.2764.2774
37. M. Sivaram Krishnan, S. Sri Ragavi, M. Siva RamKumar, D. Kavitha "Smart Asthma Prediction System using Internet of Things" Indian Journal
of Public Health Research & Development, 10 (2) , pp 1103-1107 .DOI:10.5958/0976-5506.2019.00445.5
Authors: Aarathi Haridasan, Reshma Satheesh, Aarathy K Sudhakaran
Paper Title: Role of ESAF in Developing Microfinance Sector
Abstract: The paper describes the concept how microfinance and women empowerment are related. It tries to evaluate
the role of developing the microfinance zone with special reference to ESAF microfinance, which is one of the leading
microfinance institutions in Kerala. It helps to examine the awareness level of ESAF in different parts of Kerala. The
analysis of this paper was conducted on a sample population consisting of 100 women from rural parts of Kerala. From
the research conducted, we were able to identify the efficiency of ESAF microfinance on the marginalized population
and how effective they were in increasing the living standards of such people. The main foreground of ESAF is the
spotlight they give to middle aged women who aspire to be small time entrepreneurs. Hence microfinance is becoming
one of the fastest growing industry which provides a unique platform for the rural people to lead a sustainable
livelihood.

Keywords: Microfinance, Women Empowerment, ESAF.

54. References:
1. Lending to woman in microfinance and role of social trust published by Raj Aggarwal in the journal of International Business Review in 2015. 308-310
2. Empowering women in Kerala and role of Microfinance Institutions published by Dr Joseph Thekkedam in the journal of International Journal of
Commerce and Management in 2017.
3. The impact of training and monitoring on low repayment microfinance debtors in Ghana published by Daniel Agbeko in the journal of Behavioral
and Experimental Finance in 2017.
4. Microfinance Client Awareness Index, a measure of awareness and skills of microfinance client skills published by Vinita Kalra in the journal of
IIBM Management Review in 2015.
5. Can Microfinance reach the poorest? Evidence from a community microfinance intervention published by Jonas Helth in the journal of Rockwool
Foundation Research in 2013.
6. Role of Microfinance Institutions in Social Development published by Srirang Jha in the journal of Review of Management in 2016.
7. A study on Kudumbashree in Kerala published by Jayshree S in the journal of Pure and Applied Mathematics in 2018.
8. The microfinance promises in the financial inclusion and evidence from Varanasi District of Uttar Pradesh published by Vikas Singh in the
journal of International Journal of Social Science Research in 2011.
9. Penetration among the Microfinance Institutions among the Indian States, an understanding through micro variables published by Sougata Ray in
the journal of International Journal of Development Issues in 2016.
10. A study on Kudumbashree- Traditional marketing vs Online marketing published by Dr Ambily AS in the journal of Business and Management in
2016.
Authors: N. Hema Rajini
Paper Title: Image Forgery Identification Using Convolution Neural Network
Abstract: In recent days, an important problem in image forensic is to determine whether a specific image is
authenticated or non-authenticated. It is a crucial process where the images are considered as major evidence to alter
decision in various scenarios like court laws. For performing those forensic investigation, different technical devices and
algorithms has been introduced in the present world. Copy move and splicing are the commonly employed approaches
for passive image forgery. This paper develops a model for detecting splicing and copy-move forgery concurrently on
the similar dataset of CASIA v1.0 as well as CASIA v2.0. At the beginning, a doubtful image is considered for
processing and the feature extraction process takes place using block discrete cosine transform (BDCT) and enhanced
threshold approach. The presented model will decide the presence of manipulated image among the provided images.
When the image is found to be manipulated, convolution neural network (CNN) is employed for classifying the image
into splicing or copy-move forgery. Furthermore, Zernike Moment (ZM) polar is employed for locating the
replicaportions in the image. The simulation outcome ensures the effective performance of the presented method over
the existing ones.

Keywords: Image Forensic, Copy Move, CNN, Splicing, Zernike Moment.

55. References:
1. S. Lyu and H. Farid, "How realistic is photorealistic?" IEEE Transactions on Signal Processing, vol. 53, no. 2, pp. 845-850, 2005.
2. H. Farid, "A survey of image forgery detection," IEEE Signal Processing Magazine, vol. 2, no. 26, pp. 16-25, 2009. 311-320
3. Muhammad, Najah, Muhammad Hussain, Ghulam Muhammad, and George Bebis, "Copy-move forgery detection using dyadic wavelet
transform.", In Proceedings of IEEE Eighth International Conference on Computer Graphics, Imaging and Visualization (CGIV-2011), pp. 103-
108, 2011.
4. J. Granty Regina Elwin, T. S. Aditya, and S. Madhu Shankar, "Survey on passive methods of image tampering detection," in Proceedings of the
International Conference on Communication and Computational Intelligence (INCOCCI '10), pp. 431-436, December 2010.

5. Pun C-M, Bo L, Yuan X-C (2016) Multi-scale noise estimation for image splicing forgery detection. J Vis Commun Image Represent 38:195-206
6. 20. Hakimi F (2015) Image-splicing forgery detection based on improved lbp and k-nearest neighbors algorithm. Electron Inf Plan, 3
7. Shi Y, Chen C, Chen W (2007) A natural image model approach to splicing detection. In: Proceedings of the 9th workshop on Multimedia &
security, pp 51-62. ACM
8. Wang W, Dong J, Tan T (2009) Effective image splicing detection based on image chroma. Image Processing (ICIP), 2009 16th IEEE
International Conference on, pp 1257-1260. IEEE
9. Li X, Jing T, Li X (2010) Image splicing detection based on moment features and hilbert-huang transform. In: 2010 IEEE international conference
on information theory and information security (ICITIS), pp 1127-1130. IEEE
10. Zhao X, Li J, Li S, Wang S (2011) Detecting digital image splicing in chroma spaces. Digital Watermarking 6526:12-22
11. Wu X, Fang Z (2011) Image splicing detection using illuminant color inconsistency. In: 2011 3rd international conference on multimedia
information networking and security (MINES), pp 600-603. IEEE
12. Pan X, Lyu S (2010) Region duplication detection using image feature matching. IEEE Trans Inf Forensics Secur 5(4):857-867
13. Fischler MA, Bolles RC (1981) Random sample consensus: a paradigm for model fitting with applications to image analysis and automated
cartography. Commun ACM 24(6):381-395
14. Amerini I, Ballan L, Caldelli R, Bimbo AD, Serra G (2011) A sift-based forensic method for copy-move attack detection and transformation
recovery. IEEE Trans Inf Forensics Secur 6(3):1099-1110
15. Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans
Inf Forensics Secur 7(6):1841-1854
16. Muhammad G, Hussain M, Bebis G (2012) Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digit
Investig 9(1):49-57
17. Zhao J, Zhao W (2013) Passive forensics for region duplication image forgery based on harris feature points and local binary patterns. Math
ProblEng 2013:12
18. Li Y (2013) Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching. Forensic Sci Int
224(1):59-67
19. Dong J, Wang W, Tan T (2013) Casia image tampering detection evaluation database. In: Signal and information processing (ChinaSIP), 2013
IEEE China Summit & International Conference on, pp 422- 426. IEEE
20. Zhang Q, Wei L, Weng J (2016) Joint image splicing detection in dct and contourlet transform domain. J Vis Commun Image Represent 40:449-
458
21. Qiu X, Li H, Luo W, Huang J (2014) A universal image forensic strategy based on steganalytic model. In: Proceedings of the 2nd ACM workshop
on Information hiding and multimedia security, pages 165-170. ACM
22. He Z, Wei L, Sun W, Huang J (2012) Digital image splicing detection based on markov features in dct and dwt domain. Pattern Recogn
45(12):4292-4299
23. Pevny T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensics Secur 5(2):215-224
24. Choudhary Shyam Prakash1 · Avinash Kumar1 · Sushila Maheshkar1 · Vikas Maheshkar, "An integrated method of copy-move and splicing for
image forgery detection", Multimed Tools Appl, 2018
Authors: Dheeraj Kumar Boddu, Sai Varun Buchipalli, R. Aarthi
Paper Title: Classification of T-shirts based on Pattern
Abstract: In online shopping the fabric is the one of the most demanded items. People tend to choose the item based
on the categorization. As evident growth in day to day online market, the manual way of categorizing the object is a
difficult task. Hence our idea is to classify the T-shirt based on the visual pattern present in it. People uses their visual
cues to identifying the pattern in the t-shirt into categories like Striped, solid e.t.c. we have developed a methodology to
extract the visual pattern for each categories and further used for automatic labeling .This study gives idea of
classification of T-shirts based on pattern on it. For classification we use tree classification. We mainly classify into two
types of T-shirts mainly Solid and Striped. For feature extraction of the solid and striped were done by combination of
segmentation and statistical analysis on segments.

Keywords: Classification, Solid, Striped, Segmentation.

References:
1. M.E.Stivanello, S.Vargas, M.L.Roloff and M.R. Stemmer, "Automatic Detection and Classification of Defects in Knitted Fabrics," IEEE Latin
America Transactions, vol. 14, no. 7, july 2016
2. A.A. Khan, M. Khosravi, S. Denei, P. Maiolino, W. Kasprzak, F. Mastrogiovanni, G. Cannata," A Tactile-based Fabric Learning and
Classification Architecture".
3. Jayanta K. Chandra, Madhumanti Majumdar, Sourish Sarkar, "Feature Extraction and Classification of Woven Fabric Using Optimized Haralick
Parameters: A Rough Set Based Approach," 2nd International Conference on Control, Instrumentation, Energy & Communication (CIEC), 2016.
56. 4. Amir Reza Rezvan Talab, Mohammad Hossein Shakoor, "Fabric Classification Using New Mapping of Local Binary Pattern,".
5. T. Bhattacharjee, J. M. Rehg, and C. C. Kemp, "Haptic classification and recognition of objects using a tactile sensing forearm," in Intelligent 321-324
Robots and Systems (IROS), 2012 IEEE/RSJ International Conference on. IEEE, 2012, pp. 4090-4097.
6. Bryan Willimon, Ian Walker, and Stan Birchfield," A New Approach to Clothing Classification using Mid-Level Layers"
7. Hadi Hormozi, Elham Hormozi, and Hamed Rahimi Nohooji,"The Classification of the Applicable Machine Learning Methods in Robot
Manipulators," International Journal of Machine Learning and Computing, Vol. 2, No. 5, October 2012.
8. Bharath Hariharan, Pablo Arbel_aez, Ross Girshick, and Jitendra Malik," Simultaneous Detection and Segmentation", arXiv:1407.1808v1 [cs.CV]
7 jul 2014
9. Amanpreet Singh,Narina Thakur, Aakanksha Sharma," A Review of Supervised Machine Learning Algorithams"
10. Nuhi BESTMT, Betim Cico, Adrian BESTMT," Overview of Data Mining Classification Traditional vs. Parallel/ Distributed", 2017 6th
MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING ,,/" (MECO), 11-15 JUNE 2017, BAR, MONTENEGRO
11. S. Divya, Kiruthika, S., Anton, A. L. Nivin, and Dr. Padmavathi S., "Segmentation, Tracking And Feature Extraction For Indian Sign Language
Recognition", International Journal on Computational Sciences & Applications (IJCSA), vol. 4, pp. 57 - 72, 2014
12. R. Aarthi, Amudha, J., and P, U., "A generic bio inspired framework for detecting Humans Based on saliency detection", in International
Conference on Artificial Intelligence and Evolutionary Algorithms in Engineering Systems-20140(ICAEES-2014),Kumaracoil, Kanyakumari,
Tamilnadu, 2014.
13. Manuel Fern_andez-Delgado, Eva Cernadas, Sen_en Barro," Do we Need Hundreds of Classfiers to Solve Real World Classifcation problems?"
Journal of Machine Learning Research 15 (2014) 3133-3181
14. Dr. Padmavathi S., Prem, P., and Praveenn, D., "Locating Fabric Defects Using Gabor Filters", International Research Engineering Journal of
Scientific & Technology (IJSRET), vol. 2, no. 8, pp. 472 - 478, 2013.
15. P. Satishkumar, Dr. Padmavathi S., and Krishnan, B. Rohit, "Fabric Defect Detection Using Graylevel Co-Occurrence Matrices (GLCM)",
National Conference on Emerging Trends in Computer Applications and Management (NCETCAM'12. 2012.
16. Dr. Padmavathi S., Satishkumar, P., and Krishnan, B. Rohit, "Fabric Defect Detection Using Statistical Texture Analysis", International
Conference on Computer Applications ICCA2012. pp. 69 - 73, 2012.
Authors: B. Gnana Priya, Dr.M. Arulselvi
Paper Title: Deep Learning for Human Pose Classification Using Multi View Dataset
Abstract: Human pose classification is very challenging area of work in research in modern times. It widely supports
in understanding a human poses and its further sequence of actions. Many standard human pose datasets were created
57. and a wide research is taking place. Our main target is to create a multiview dataset containing novel actions which are
different from normal poses. Actions from Karate martial arts and Bharathanatyam dance poses are captured. We use
325-328
Deep Convolutional neural networks to classify the poses without any feature extraction.

Keywords: Action Classification, Deep Learning, Convolutional Neural Network, Karate and Bharathanatyam
Dataset
References:
1. A. Krizhevsky, I. Sutskever, and G. E. Hinton. "Imagenet classification with deep convolutional neural networks", In NIPS, 2012.
2. Karen Simonyan and Andrew Zisserman, "Very Deep Convolutional Networks for Large-scale Image Recognition" ICLR 2015
3. Waseem Rawat, Zenghui Wang, "Deep Convolutional Neural Networks for Image Classification: A Comprehensive Review", Neural
Computation © 2017 Massachusetts Institute of Technology, Volume 29, Issue 9, September 2017.
4. Tianmei Guo, Jiwen Dong ,Henjian Li'Yunxing Gao, "Simple Convolutional Neural Network on Image Classification" , IEEE 2nd International
Conference on Big Data Analytics at Beijing, China on 10-12 March 2017
5. Emine CENGIL , Ahmet ÇINAR , Zafer GÜLER, "A GPU-Based Convolutional Neural Network Approach for Image Classification",
International Conference on Artificial Intelligence and Data Processing Symposium at Malatya, Turkey on 16- 17 September 2017.
6. Travis Williams, Robert Li, "Advanced Image Classification using Wavelets and Convolutional Neural Networks", 15th International Conference
on Machine Learning and Applications at Anaheim, CA, USA on 18-20 December 2016.
7. Er-xin shang, Hong-gang zhang, "Image Spam Classification Based On Convolutional Neural Network", International Conference on Machine
Learning and Cybernetics at Jeju, South Korea on 10-13 July 2016
8. Qing Li, Weidong Cai, Xiaogang Wang, Yun Zhou, David Dagan Feng and Mei Chen, "Medical Image Classification with Convolutional Neural
Network", 13th International Conference on Control Automation Robotics and Vision at Singapore on 10-12 December 2014
9. Junho Yim, Jeongwoo Ju, Heechul Jung, and Junmo Kimt " Image Classification Using Convolutional Neural Networks With Multi-stage
Feature" ,Robot Intelligence Technology and Applications
10. Yu Kong, Yun Fu "Human action recognition and Prediction: A Survey", Journal of Latex class files, Vol.13, Sep 2018
11. Diogo C.Luvizon, David, Hedi "2D/3D Pose Estimation and Action Recognition using Multitask Deep Learning", arXiv:1802.09232v2, Mar 2018
12. Arjun Jain, Jonathan, Andriluka "Learning Human pose Estimation Features with Convolutinal Networks" , arXiv 1312.7302v6, Apr 2014
13. Bulat and Tzimiropoulos. "Human pose estimation via Convolutional Part Heat map Regression" In European Conference on Computer Vision
(ECCV), pages 717-732, 2016.
14. A. Newell, K. Yang, and J. Deng. "Stacked hourglass networks for human pose estimation", In Proc. Eur. Conf. Comp. Vis., pages 483-499, 2016.
15. Chia-jung chou, Jui-Ting "Self Adversarial training for Human pose Estimation", arXiv:1707.02439v2, Aug 2017
16. Xiao Chu, Wei Yang, Wanli " Multi-context attention for Human pose Estimation" arXiv:1702.07432v1, Feb 2017
17. J. Tompson, R. Goroshin, A. Jain, Y. LeCun, and C. Bregler " Efficient object localization using convolutional networks" ,In Proc. IEEE Conf.
Comp. Vis. Patt. Recogn., pages 648-656, 2015.
18. X. Chen and A. L. Yuille " Articulated pose estimation by a graphical model with image dependent pair wise relations", In NIPS, 2014.
19. V. Ramakrishna, D. Munoz, M. Hebert, J. A. Bagnell, and Y. Sheikh "Pose machines: Articulated pose estimation via inference machines", In
ECCV. 2014.
20. Wei, S.E.Ramakrishna, V.Kanade, T.Sheikh, "Convolutional pose machines", CVPR, 2016
21. A.Raford, L.Metz and S.Chintala, "Unsupervised representation learning with deep convolutional generative adversarial networks", arXiv, 2015
22. T.Salimans, I.J.goodfellow, W.Zaremba, V.Cheung, "Improved techniques for training GAN's", In Proc. Advances in neural Inf. process systems,
2016.
Authors: Revathi Priya Muthusamy, S. Vinod, M. Tholkapiyan
Automatic Detection of Abnormalities in Retinal Blood Vessels Using DTCWT, GLCM Feature Extractor
Paper Title:
and CNN-RNN Classifier
Abstract: In worldwide, retinal diseases are found to be frequent cause of blindness for working age population in
western countries. So, early diagnosis can prevent the blindness. We develop a system for the early diagnosis of retinal
disease. The images with different colour variation inside the eye is compared by using images taken laser camera with
high definition. These images are termed as fundus images. The feature extraction of the fundus images can be obtained
by using the software tool MATLAB. Automatic screening will help to quickly identify the condition of the patients in a
more accurate way. The 4-level discrete wavelet transform is used to decompose the image into various sub-bands. The
textural features had been calculated using GLCM features, and the classification is done by using CNN-RNN Neural
networks. The processed output will be displayed using Matlab GUI. Experimental result proves that the abnormality in
the blood vessels and exudates can be effectively detected by applying this method on the retinal images. 76% of test
cases are correctly classified.

Keywords: Retinal, Fundus Image, MATLAB, DTCWT, GLCM, CNN-RNN.

References:
58. 1. Detection and Classification of Retinal Diseases in Spectral Domain Optical Coherence Tomography Images based on SURF descriptors, 2018
IEEE International Conference on System, Computation, Automation and Networking (ICSCAN) 329-331
2. Retinal Vessel Segmentation via A Coarse-to-fine Convolutional Neural Network, 2018 IEEE International Conference on Bioinformatics and
Biomedicine (BIBM)
3. Segmenting Retinal Vessels with a Multi-scale Modified Dolph-Chebyshev Type I Function Matched Filter,2018 4th International Conference on
Science and Technology (ICST)
4. Feature Extraction Method of Retinal Vessel Diameter, Conference: 2018 IEEE-EMBS Conference on Biomedical Engineering and Sciences
(IECBES)
5. Color Retinal Image Enhancement Based on Luminosity and Contrast Adjustment, IEEE Transactions on Biomedical Engineering ( Volume: 65 ,
Issue: 3 , March 2018 )
6. How deep neural networks can improve emotion recognition on video data, 2016IEEE International Conference on Image Processing (ICIP).
7. Diabetic Retinopathy and Diabetic Macular Edema.
8. Steven R. Cohen, Thomas W. Gardner. Developments in ophthalmology, 2016.
9. A Retinal Image Enhancement Technique for Blood Vessel Segmentation Algorithm. A. M. R. R. Bandara, P. W. G. R. M. P. B. Giragama 2017
IEEE International Conference on Industrial and Information Systems (ICIIS), Peradeniya, Sri Lanka, 2017, pp. 1-5
10. Detection of diabetic retinopathy using computational model of human visual system. Masoud Khazaee Fadafen*, Nasser Mehrshad, Seyyed
Mohammad Razavi, Department of Electrical and Computer Engineering, University of Birjand, Birjand, Iran. Biomedical Research 2018, ISSN
0970-938X
11. Mobile assisted diabetic retinopathy detection using deep neural network, 2018 Global Medical Engineering Physics Exchanges/Pan American
Health Care Exchanges (GMEPE/PAHCE).
Authors: Vallem sharmila, Komalla Ashoka Reddy
Paper Title: Research on Various Enhancing Algorithms for ECG
59.
Abstract: Electrocardiogram (ECG) is an electrical signal used for measuring activity of the heart on the body surface
332-338
via electrodes (leads). It is a primary diagnostic tool for analysis of cardio vascular problems. As ECG signal gets
corrupted by different artefacts like power line interference, baseline drift and muscle contraction, diagnosis becomes a
difficult task. To get an artefact free ECG signal various techniques employed for de-noising are wavelet transforms,
(MSPCA) Multi scale Principal Component Analysis, (HOSA) Higher Order Spectral Analysis and Empirical mode of
Decomposition (EMD). Performance comparison of these techniques is achieved by calculating the statistical
parameters such as (RMSE) Root mean square error, (RMSV) Root mean square variance and (RMSD)Root mean
square deviation.

References:
1. R.M Rangayyan , "Biomedical Signal analysis : A Case study Approach", IEEE press/Wiley, New york, NY,2002.
2. J. C. Huhta and J. G. Webster, "60-Hz interference in electrocardiograph, " IEEE Trans. Biomed. Eng., vol. 20, pp. 91-101, 1973.
3. B. Widrow, "Adaptive noise cancelling: principles and applications", Proc. IEEE, vol. 63, (12), pp. 1692-1716, 1975.
4. K. Ziaranj and A. Konrad, "A nonlinear adaptive method of elimination of PLI in ECG signals," IEEE Trans. Biomed. Eng., vol. 49, (6), pp. 540-
547, 2002.
5. P. S. Hamilton, "A comparison of adaptive and non-adaptive filters for the reduction of PLI in the ECG," IEEE Trans. Biomed. Eng., vol.
43(1), pp. 105-109, 1996.
6. J.S Sahambi, S.N. Tandon and R.K.P. Bhatt, "Using Wavelet Transform for ECG Characterization," IEEE Eng. in Med. and Bio., 1997.
7. Paul S Addison, "Wavelet transforms and the ECG: a review" 2005 Physiol. Meas. 26 R155.
8. G.Umamaheshwar Reddy , M.Muralidhar and S.Varadarajan, "ECG De-Noising using improved thresholding based on Wavelet transforms",
IJCSNS ,vol.9 No.9, Sep 2009.
9. S.Z. Mohmoodabadi, A. Ahmadian, M.D. Abolhasani (2005) ECG feature extraction using daubechies wavelets, Proc. of the fifth IASTED
International Conference, Benidorm, Spain.
10. M. Alfaouri and K. Daqrouq, "ECG signal denoising by wavelet transform thresholding," American Journal of Applied Sciences, vol. 5, no. 3, pp.
276-281, 2008.
11. D. L. Donoho, De-noising by soft thresholding, IEEE Transaction on Information Theory, Vol. 41, pp. 613-627, May 1995.
12. Roshan J.Martis, U.Rajendra Acharya, K.M.Mandana A.K.Ray, Chandan chakraborthy:"Application of Principal component analysis to ECG
signals for automated diagnosis of cardiac health", Expert System with applications, Elsevier, Vol.39, 2012, pp.1179-11800.
13. F. Castells, P. Laguna, L. Sörnmo, A. Bollmann and J. Millet Roig, "Principal component analysis in ECG signal processing," EURASIP J. Adv.
Si. Pr., vol. 2007.
14. B. R. Bakshi, "Multiscale PCA with application to multivariate statistical process monitoring, AIChE Journal, 44, 7, pp.1596-1610, 1998.
15. Roshan.J.Martis, U.Rajendra Acharya, Ajoy.K.Ray, Chandan Chakraborthy: "Application of Higher order Cumulants to ECG signals for the
cardiac health diagnosis", 33rd Annual International Conference of the IEEE-EMBS Boston, Massachusetts USA, August 30-september 3,2011,
1697-1700.
16. Chrysostomas L.Nikias, Athina P.Petropulu, "Higher order spectral Analysis: A Non Linear Signal Processing FrameWork, " Prentice Hall, 1993.
17. Jerry M.Mende, "A tutorial on Higher Order Statistics(Spectra) in Signal processing and System Theory: Theoretical Results and Some
applications," Proceedings of IEEE,vol.79, No.3.March 1991
18. Dingfei Ge,Narayanan Srinivasan and Shanker M.Krishnan, "Cardiac Arhythmia classification using Auto Regressive Modeling" Bio Medical
Engineering Online-2002.
19. Manuel Blanco-Velasco, Binwei Weng, Kenneth E.Barner, "ECG signal denoising and baseline wander correction based on the empirical mode
decomposition" An Elsevier Journal of computers in Biology and Medicine 38(2008) 1-13.
20. FC Chang, CK chang, KY Chi , YD Lin "Evaluation measures for Adaptive PLI Filters in ECG Signal Processing", 1088/0967-334/26/5/R01
Authors: L. Rajib Kanti Monda, R. Gayathri, R. Mercy Shanthi
Performance Exploration of Mixed Airfoil Small Scale Horizontal Axis Wind Turbine Blade by QBLADE
Paper Title:
and CFD
Abstract: In this energy hungry world, energy efficient methods to increase the extraction of work from various
sources of renewable energy is always appreciated. One such commonly used source is wind energy. Wind turbines and
their aerodynamics are always subjected to constant research for increasing their efficiency which convert the abundant
wind energy into usable electric energy. The current work is based on the comparative study between “Blade-Element-
Momentum” (BEM) analysis and “Computational-Fluid-Dynamics” (CFD) analysis of mixed airfoil small-scale
horizontal axis wind turbine blade which gives optimize torque, power and power coefficient. Then BEM was executed
with the application of the open source wind turbine design and performance computation software Q-Blade v0.96.
After that, CFD simulation was done by Ansys fluent version 14.5. Here, k omega Shear Stress Transport (SST) model
was conducted. Blade was designed in creo parametric version 5.

Keywords: Qblade, Mixed airfoil, Blade Element Momentum Method, Schmitz Optimization Method, CREO
Parametric, HAWT.

References:
60. 1. M.S. Selig, P. Giguere,'New Airfoils for Small Horizontal Axis Wind Turbines', Journal of Solar Energy Engineering,120, 1998, pp 108-115.
2. Keerthana M, Sriramkrishnan M., Velayutham, T., Abraham, A., Rajan, S.S. & Parammasivam K.M, 'Aerodynamic Analysis of a Small 339-344
Horizontal Axis wind Turbine Using CFD', Journal of Wind and Engineering, vol.9, pp14-28, 2012.
3. Shubham shrives, Rohan sanas, Simulation of wind turbine blade in qblade, International Journal for Research in Applied Science and
Engineering Technology, Vol. 5,Issue 4,April 2017,pp256-262.
4. D.marten,J. Wendler,C.N. Nayeri,C.O. Paschereit, Qblade an open source software for design and simulation of horizontal axis wind turbine,
International Journal of Emerging Technology, volume 3,special issue 3,Feb 2013,pp264-269.
5. J. F. Manwell, J. G. Mcgowan, A. L. Rogers, "Wind Energy Explained Theory, Design and Application, Text book" Wiley, 2009.
6. Mehedi Hasan, Adel El-Shahat, Musfequr Rahman, Performance Investigation of Three Combined Airfoils Bladed Small Scale Horizontal Axis
wind Turbine by BEM and CFD Analysis, Journal of Power and Energy Engineering, 2017, 5, pp.14-27.
7. Gagan Sahu, R.K. Rathore, Determination of Torque Produced by Horizontal Axis Wind Turbine Blade Using FSI Analysis for Low Wind Speed
Regime, IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 2 Issue 5, May 2015, pp.1069-1073.
8. Grant Ingram, Wind Turbine Blade Analysis using the Blade Element Momentum Method, 2011.
9. Emre koc, Onur Gunel, Tahir yavuz, Fifth international conference on renewable energy , Comparison of Qblade and CFD Results for Small
Scaled Horizontal Axis Wind Turbine Analysis,IEEE,20Nov,Brimingham,UK,pp.204-209.
10. Rohit Kumar, Gupta Vilas Warudkar, Rajesh Purohit and Saurabh Singh Raj purohit, Modeling and Aerodynamic Analysis of Small Scale, Mixed
Airfoil Horizontal Axis Wind Turbine Blade, Elsevier, 6th International Conference of Materials Processing and Characterization (ICMPC 2016),
Materials Today: Proceedings 4 (2017),pp.5370-5384.
11. Siddharth Suhas Kulkarni*, Craig Chapman, Hanifa Shah, Computational Fluid Dynamics (CFD) Mesh Independency Study of A Straight Blade
Horizontal Axis Tidal Turbine, Knowledge Based Engineering Lab, Birmingham City University, Millennium Point, Curzon Street, Birmingham,
B4 7XG, UK,2 AUG,2016.
12. Abdelrahman M.A., Abdellatif O.E., Moawed M.,Eliwa A, The CFD Performance Analysis for Horizontal Axis Wind Turbine with Different
Blade Shapes and Tower Effect, IEEE,2015.
13. Eleni C. Douvi, Dionissios P. Margaris, computational study of the flow over a horizontal axis wind turbine rotor, 6th International Conference
from "Scientific Computing to Computational Engineering" 6th IC-SCCE Athens, 9-12 July, 2014.
Anush Reddy Kommareddy, Satya Anirudh Polisetty, Chetan Sai Kurra, S. Padmavathi, Mithun Chandra
Authors:
Pokuri
Paper Title: Image based Identification of Leaf Crumple and Leaf Spot Diseases in Cotton Plant
Abstract: Identification of plant diseases based on images derived from computer vision is a major requirement for
smart agriculture. Conventional algorithms warrant large dataset for better accuracy. They perform well with large
variation in color or explicit probes on a specific disease. This paper considers 4 major diseases of cotton plants with a
combination of images with and without color variation. This paper adapted image processing algorithms to extract
precise features for classification, highly preferred and apt, when the dataset sizes are limited. Verification results of the
proposed method validate its rationale and viability.

Keywords: Cotton Plant Disease Identification, Leaf Disease Feature Extraction, Color Image Enhancement,
Histogram Equalization, Color Edge Detection.

References:
1. Shweta R. Astonkar1, Dr. V. K. Shandilya2 ,"Detection and Analysis of Plant Diseases Using Image Processing Technique ", International
Research Journal of Engineering and Technology, Volume: 05 Issue: 04 Apr-2018.
61. 2. Ms.Nidhi Rajesh Savaji, Vrushabh khandelwal, Kalyani Bhawar, Punam Wankhede, Ravi Kiran Rajbhure,"Plant Disease Detection Using Image
Processing",IJCESR, Volume-5, Issue-3, 2018.
3. Rakesh Chaware, Rohit Karpe, Prithvi Pakhale, Prof.SmitaDesai4,"Detection and Recognition of Leaf Disease Using Image Processing ",IJESC,
345-348
Volume 7 Issue No.5 ,May-2017.
4. Pallavi.S.Marathe," Plant Disease Detection using Digital Image Processing and GSM ",IJESC, Volume 7 Issue No.4 April 2017.
5. Sujatha R, Y Sravan Kumar Garine Uma Akhil ." Leaf disease detection using image processing ", Journal of Chemical and Pharmaceutical
Sciences, Volume 10 Issue 1 January - March 2017.
6. A.Sivasangari,K.priya,K. Indira," Cotton Leaf Disease Detection and Recovery Using Genetic Algorithm", International Journal of Pure and
Applied Mathematics, Volume 117 No.22, 2017.
7. Mr.Chandrakant Deelip Kokane ,Prof.N.L.Bhale,"To Detect and Identify Cotton leaf disease based on pattern recognition
technique",IJARIIE,Volume-3 Issue-4 ,2017.
8. Supriya S. Patki, Dr. G. S. Sable,"Cotton Leaf Disease Detection & Classification using Multi SVM ", International Journal of Advanced
Research in Computer and Communication Engineering, Vol. 5, Issue 10, October 2016.
9. Vijay S.Bhong , Prof.B.V.Pawar,"Study and Analysis of Cotton Leaf Disease Detection Using Image Processing",IJARSET,Vol. 3, Issue 2 ,
February 2016.
10. Premalatha.V, Valarmathy.S, Sumithra.M.G,"Disease Identification in Cotton Plants UsingSpatial FCM & PNN Classifier", International Journal
of Innovative Research in Computer and Communication Engineering, Vol. 3, Issue 4, April 2015.
11. P.Krithika,S.Veni ,"Leaf Disease Detection on Cucumber Leaves Using Multiclass Support Vector Machine",2017.
12. K.Srunitha,D.Bharathi,"Mango Leaf Unhealthy Region Detection and Classification",2018.
Authors: Narkedamilli Pavan Kumar, K. Venkateswararao
Effect of Cerium Oxide Nano Additives on the Performance, Combustion and Emission Parameters of a
Paper Title:
Hazantus (ALGAE) Bio Diesel in a 4-Stroke DI CI Engine
Abstract: In the Alternate fuel area Bio Diesel will plays a major role. Most of the bio diesel is derived from seed-
based source like Pongamia and Jatropha in Bharat. The problem associated with the seed-based sources are yield time,
yield of crop. An and average a pongamia tree can produce seeds up to 9 to 90 per tree per year. The alternate energy is
waiting for a source having less yield time and high capacity of yield. Algae is a moss family micro plant which is
grown within one week having high lipid content. The oil yield from algae is about 20 to 90% achieved by various oil
extraction process like solvent extraction method, soxhlet extraction, mechanical pressing, pyrolysis etc.… To reduce
the viscosity, separate the glycerin from the neat oil Transesterification is used. In the present research the Hazantus
(Algae Bio Diesel) is blended with the fossil based diesel fuel at various proportions i.e. 10% (ALME 10), 20% (ALME
20), 30% (ALME 30) tested in a Computerized water cooled DI Engine along with pure Hazantus (Algae Bio Diesel)
(ALME) and Fossil based Diesel Fuel to identify the best blend by performance, Combustion parameters. The blend
ALME 10 is the best proportion in terms of Performance and Combustion. For this blend the Cerium Oxide Nano
Particles are added at a proportion of 25 mg (ALME 10 CeO2 25 mg), 50 mg (ALME 10 CeO2 50 mg). These two fuel
blends are tested in Engine.
62.
Keywords: Alternate Fuel, Bio Diesel, Algae Bio Diesel (ALME), Cerium Oxide Nano Particles. 349-354
References:
1. Kumar Patel, H., & Kumar, S. (2017). Experimental analysis on performance of diesel engine using mixture of diesel and bio-diesel as a working
fuel with aluminum oxide nanoparticle additive. Thermal Science and Progress, 4, 252-258.
2. Muthusamy, S., Nallathambi, S. S., Ramasamy, R., Thasthagir, S., & Hussain, M. (2017). Effect of aluminium oxide nanoparticles blended
pongamia methyl ester on performance, combustion and emission characteristics of diesel engine. Renewable Energy.
3. Khalife, E., Tabatabaei, M., Najafi, B., & Mostafa, S. (2017). A novel emulsion fuel containing aqueous nano cerium oxide additive in diesel -
biodiesel blends to improve diesel engines performance and reduce exhaust emissions: Part I - Experimental analysis. Fuel.
4. Sajeevan, A. C., & Sajith, V. (2016). Synthesis of stable cerium zirconium oxide nanoparticle - Diesel suspension and investigation of its effects
on diesel properties and smoke. Fuel, 183, 155-163.
5. Chaichan, M. T., Kadhum, A. A. H., & Al-amiery, A. A. (2017). Novel Technique for Enhancement of Diesel Fuel: Impact of Aqueous Alumina
Nano-Fluid on Engine' s Performance and Emissions To appear in: Case Studies in Thermal Engineering. Case Studies in Thermal Engineering.
6. Vairamuthu, G., Sundarapandian, S., Kailasanathan, C., & Thangagiri, B. (2015). Experimental investigation on the effects of Cerium oxide
nanoparticle on Calophyllum inophyllum (PUNNAI) biodiesel blended with diesel fuel in DI diesel engine modified by nozzle geometry. Journal
of the Energy Institute.
7. Minowa, T., Yokoyama, S., & Kishimoto, M. (1995). Oil production from algal cells of Dunaliella t e r t i o l e c t a by direct thermochemical
liquefaction, 74(12), 1735-1738.
8. El-araby, R., Amin, A., Morsi, A. K. El, El-ibiari, N. N., & El-diwani, G. I. (2018). Study on the characteristics of palm oil - biodiesel - diesel fuel
blend, 27, 187-194.
Caroline El Fiorenza, B. Sai Praneeth, B. Sai Sumanth, M. Venkata Vijaya Rama Raju, S. Teja
Authors:
Venkata Rama Raju
Noise Tolerant Fine-Grained Visual Categorization with Fine Tuned Segmentation Via Deep Domain
Paper Title:
Adaption
Abstract: Image analysis techniques are playing a vital role in several applications. In general the applications involve
the automatic extraction of features from the image which is further used for variety of classification purposes. In this
paper we are going to propose an algorithm which will extract the image from the web and recognizes it and
differentiates whether it is a living object or not and then classifies the image into different types using fine grained
visual categorization and deep domain adaption. As a special topic in computer vision fine grained visual categorization
has been attracting and getting attention these years, which is a advanced level problem for distinguishing between
similar sub-ordinate classes. The algorithm will identify object and specifies whether it is a living or non-living object
and then classification is done based on the object.
63. Keywords: Fine-Grained Visual Categorization, Data Scale, Artificial Neural Networks, Image Classification, Neural
Networks, Medical Researches. 355-358
References:
1. Natural Object Classification Using Artificial Neural Networks
2. Machine Learning Framework for Image Classification
3. Color Texture Analysis of Natural Scenes Using Neural Networks
4. A Novel Self-Assessed Approach for Classification Of Man-Made Objects And Natural Scene Images From Aerial Images
5. Noise Tolerant Classification of Aerial Images Into Man-Made Structures And Natural Scene Images Based On Statistical Dispersion Measures
6. Performance Evaluation of Feature Extraction Methods For Classifying Abnormalities in Ultrasound Liver Images Using Neural Network
7. Hierarchical Part Matching for Fine-Grained Visual Categorization
8. Fine Grained Visual Categorization with Fine-Tuned Segmentation
9. Webly-Supervised Fine-Grained Visual Categorization Via Deep Domain Adaptation
10. Shape-Guided Segmentation for Fine-Grained Visual Categorization.
Authors: P. Adlene Ebenezer, Amritesh Singh, Sakshi Singh, Ayush Sinha, Tarun Keshri
Paper Title: Securing Cloud Technology’s Service Management Using Cognitive and Biometric Approaches
Abstract: Cloud computing is an emerging technology that lets users to access the cloud server to store their data and
access it on-demand, anywhere and at anytime. But it also has many security issues since the CSPs are not in the domain
of trust. Thus, to guarantee the safety of data from untrusted sources many securing mechanisms are being adopted since
the security of services in a cloud technology is a very important aspect, which cannot be ignored. If certain critical data
falls in the wrong hands, it can wreak havoc. The existing systems apply cryptographic methods at a fine-grained access
control and data sharing levels for the services of dynamic user groups in cloud, but it poses to be a challenging issue. In
fine-grained access control each data item is given its own control policy. If an entity wants to access a data item it will
have to provide its credentials to a third party policy enforcer, which is not the owner of the data. These access control
policies and the entity credentials might reveal some critical information to the policy enforcer to which it is not entitled
to know. In this paper we propose securing cloud technology services using biometric and cognitive methodologies for
dynamic cloud user groups. Extraction of unique and different personal characteristics and behavioral patterns are used
in management protocols. Cognitive security is based on application of AI technology of human thought process to find
the most appropriate solution in a situation, and along with the users Biometric features like palm/finger prints, voice
recognition, retina scan, facial recognition and with the addition of cryptographic methods to these an efficient and
64. secure solution is developed.

Keywords: Cloud Computing, Biometric, Security, Cognitive, Cryptography, Service Management. 359-365

References:
1. Biometric Encryption in Cloud Computing: A Systematic Review, IJCSNS, Vol. 18, 2018
2. Cognitive and Biometric Approaches to Secure Service Management in Cloud-Based Technologies , IEEE, Cloud Computing 2018
3. An Efficient and Privacy - Preserving Biometric Identification Scheme in Cloud Computing, IEEE, 2018
4. Securing Mobile Cloud Computing using Biometric Authentication (SMCBA) , IEEE, 2014
5. Biometrics-as-a- Service: Cloud-Based Technology, Systems, and Applications, IEEE, 2018
6. https://researcher.watson.ibm.com/researcher/view_group_subpage.php?id=1922
7. Cognitive Systems for Service Management in Cloud Computing, IEEE, 2018
8. Secure sharing with cryptography in cloud computing, IEEE, 2013
9. Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in Cloud, IEEE, 2018
10. Cognitive cryptography techniques for intelligent information management, IJIM, 2018
11. https://ac.els-cdn.com/S1877050910003479/1-s2.0-S1877050910003479-main.pdf?_tid=2f4f2e19-4b3c-42c7-9dc1-
fdb162d63315&acdnat=1552131611_0e01c2d7dc3319387f9f94607184145fhttp://www.touchngoid.com/store-fingerprint-template/
12. https://www.cse.wustl.edu/~jain/cse571-07/ftp/quantum/
13. https://www.bayometric.com/biometrics-secure-cloud-communication/
14. http://www.technovelgy.com/ct/Technology-Article.asp?ArtNum=97
Authors: D. Saranya, V. Krithika, A. Sivaranjani, T.V. Narmadha, K.C. Ajay, R. Roshan Melki Doss
Paper Title: Performance on Measures of Bridgeless Epic Convertor and Boost Convertor Fed DC Drives
65. Abstract: A bridgeless Single terminated Primary device (SEPIC) is projected foremost necessary blessings of this
device unit of measurement continuous output current, smaller voltage ripple and reduced semiconductor current stress
366-370
compared to the quality SEPIC device. The Bridgeless SEPIC convertor is employed to enhance the facility quality in
terms of Power issue Correction (PFC), scale back the entire harmonic distortion (THD) at the input ac facet and output.
Compare to per fluorocarbon with Bridgeless boost convertor that scale back the per fluorocarbon at the side of low
output voltage. The high speed drive systems area unit abundant fascinated by the sphere of commercial applications
because of the compact size, dependability and high potency. In recent, the strain of high speed drives area unit
abundant accrued because of the mechanical blessings of high speed system. SRMs (Switched Reluctance Motors) have
straightforward structure and inherent mechanical strength while not rotor winding and magnet. This paper conjointly
presents to match the per fluorocarbon, Harmonic reduction, potency for each the converters. The projected bridgeless
convertor consists of 2 switch and 2 diodes for every part is that the least range of switches among the convertors
employed in the switch reluctance motor drive and conjointly this convertor performs high voltage for a bridgeless
SEPIC convertor compare to the boost converter . The simulation results supported Matlab/Simulink computer code
area unit mentioned very well during this paper.

Keywords: SC-SEPIC Device, AC-Alternating Current, DC-Direct Current, THD-Total Harmonic Distortion, PFC-
Power Issue Correction, SRM-Switched Reluctance Motor.

References:
1. Al-Saffar M.A., Ismail E.H., Sabzali A.J., and Fardoun A.A., "An Improved Topology of SEPIC device With Reduced Output Voltage Ripple,"
IEEE Trans. Power lepton., Vol. 23, No. 5,Sep2008.
2. Choi W.-Y., Kwon J.-M., Kim E.-H., Lee J.-J., and Kwon B.-H., "Bridgeless boost rectifier with low natural phenomenon losses and reduced
diode reverse recovery problems," IEEE Trans. Ind. Electron.,vol.54, no. 2, pp. 769- 780, Apr. 2007.
3. Do H.-L., "Soft-switching SEPIC device with ripple-free input current," IEEE Trans. Power lepton., vol. 27, no. 6, pp. 2879-2887, Jun.2012.
4. Archangel Tibola and Ivo Barbi , "Isolated Three-Phase High Power issue Rectifier supported the SEPIC device operative in Discontinuous
natural phenomenon Mode," IEEE Trans. Power lepton., Vol. 28, No. 11, Nov 2013.
5. Ismail E. H., "Bridgeless SEPIC rectifier with unity power issue and prune natural phenomenon losses," IEEE Trans. Ind. Electron., vol.56, no. 4,
pp. 1147-1157, Apr. 2009.
6. Jang Y., and Jovanovic M. M., "Bridgeless high-power-factor buck device," IEEE Trans. Power lepton., vol. 26, no. 2, pp. 602-611, Feb.2011.
7. Mahdavi M., and FarzanehfardH., "Bridgeless SEPIC halocarbon rectifier with reduced components and physical phenomenonlosses," IEEE
Trans. Ind. Electron., vol. 58, no. 9, pp. 4153-4160, Sep. 2011.
8. Sabzali A. J., Ismail E. H., Al-Saffar M. A., and Fardoun A. A., "New bridgeless DCM SEPIC and CUK halocarbon rectifiers with lowphysical
development and switch losses," IEEE Trans. Ind. Appl., vol. 47, no. 2, pp.873- 881,Mar./Apr.2011.
9. Shaid M. R., Yatim A. H.M., and Taufik T., "A new ac-dc device usingbridgeless SEPIC," in Proc. Annu Conf. IEEE Ind. Electro.Society, 2010,
pp.286-290.
10. Yang J-W., and Do H-L., "Bridgeless SEPIC device with a Ripple-Free Input Current," IEEE Trans. Power lepton., Vol. 28, No. 7, July 2013.
Authors: S.R. Rajeswari, Rohit Kumar Guha, Shubham Gautam, Adwitiya Rahman, T.V.R. Pavani
Paper Title: IOT based Car Parking Mechanism and Control System
Abstract: Internet of Things (IOT) stages a important role in linking the environmental elements neighboring the
network and has been created in a simple way to access these elements without an Internet connection from any
inaccessible location. It is inevitable that the elderly are up to date with budding technology. Generally, there is lot of
trouble in parking the vehicles in the parking slots. In this proposed system, we designed an intelligent parking system;
which allows the handler to find the nearest empty parking slot(area) and provides the accessibility of parking spaces in
the respective parking area. And, in general, he specializes in reducing the time to find tons of parking spaces and, in
addition, avoids the free trip through tons of dried parking during a parking lot. In this way, it lessens fuel consumption
which subsequently lessens the carbon footmark in the environment.

Keywords: Internet of Things (IOT), Intelligent Parking System (IPS), Raspberry pi, Raspbian OS, Camera pi.
66.
References:
1. The MouatezbillahKarbab, Djamel Djenouri, Sahar Boulkaboul, Antoine Bagula, CERIST Research Center, Algiers, Algeria University of the 371-373
Western Cape, Cape Town, South Africa, "Parking management with wireless sensors connected in a network and active RFID", 978 - 1 -4799-
8802-0 / 15 © 2015 IEEE
2. Harmeet Singh, Chetan Anand, Vinay Kumar, Ankit Sharma, "automated parking system with Bluetooth access", ISSN International Journal of
Engineering and Computer Science: 2319-7242, Volume 3, Issue 5, May 2014, page n. 5773-5775
3. Wigmore, Internet of Things (IoT). Newton, MA, USA United States: TechTarget, June 2014.
4. D.J.Bonde, R.S.Shende, K.S.Gaikwad, A.S.Kedari, yA.U.Bhokre, 'automated vehicle parking controlled by the Android application' 'in Proc. In t.
Comput Pack. Comun. Report. (ICCCI), 2014
5. W. C. Hsu, H. M. Shih, H. Y. Huang, Y. C. Shiue and S.C. Huang, "intelligent system control to find parking through the DSRC communication
guide", in Proc. 12th Int. Conf. IS TELECOMUN (ITST), 2012, pp. 77-81
6. T. B. Altiok and Melamed, simulation and analysis of ARENA simulation. Amsterdam, Netherlands: Elsevier, 2007.
7. ThanhNamPham1, Ming-FongTsai1, Bing Nguyen1 Duc, Chyi-Ren Dow1 and Der-Jiunn Deng2. "An intelligent parking system based on cloud
technologies based on the Internet of things". IEEE access, volume 3, pp. 1581 1591, September 2015
8. Ahmed Yaseen Mjhool, Ali Abbas Al-Sabbagh, Ruaa A. Saeed Alsabah. "Intelligent parking techniques based on the Internet of Things". Official
of telecommunication networks and systems, Vol.1 (1), 1-10 August 2015.
Authors: K. Naveen Prasad, K.R. Harsha Kashyap, Kunal Sutradhar, Tejas Kumar, S. Arun Kumar
Paper Title: Secure Authentication Scheme with Privacy Preservation Policy on Mobile Cloud Computing Environment
Abstract: With the exponential augmentation of the mobile phones and the snappy headway of conveyed processing,
another figuring perspective called compact disseminated registering (MCC) is progressed to unwind the confinement of
the PDA's accumulating, correspondence, and count. Through mobile phones, customers can value diverse dispersed
67. figuring organizations in the midst of their transportability. Nevertheless, it is difficult to ensure security and guarantee
assurance because of the straightforwardness of remote correspondence in the new preparing perspective. Starting late, 374-378
Tsai and Lo proposed a security careful approval (PAA) plan to deal with the conspicuous confirmation issue in MCC
benefits and exhibited that their arrangement could contradict various sorts of existing attacks. Tragically, we found that
Tsai and Lo's arrangement can't maintain a strategic distance from the expert association emulate strike, i.e., an
adversary can copy the authority coop to the customer. Similarly, the adversary can isolate the customer's certified
identity in the midst of executing the master center emulate strike. To address the above issues, in this paper, we
manufacture another PAA scheme for MCC benefits by using a character based imprint plot. Security examination
shows that the proposed PAA contrive can address the authentic security issues existing in Tsai and Lo's arrangement
and can meet security essentials for MCC organizations. The execution appraisal shows that the proposed PAA scheme
has less count and correspondence costs differentiated and Tsai and Lo's PAA plot.

List Terms: CNN, DAP3D-Net, Computer Vision.

References:
1. M. Satyanarayanan, "Fundamental challenges in mobile computing," inProc. 15th Annu. ACM Symp. Princ. Distrib. Comput., 1996, pp. 1-7.
2. Z. Fu, X. Sun, Q. Liu, L. Zhou, and J. Shu, "Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud
datasupporting parallel computing," IEICE Trans. Commun., vol. 98, no. 1, pp. 190-200, 2015.
3. Z. Xia, X. Wang, X. Sun, and Q. Wang, "A secure and dynamic multi- keyword ranked search scheme over encrypted cloud data," IEEE Trans.
Parallel Distrib. Syst., vol. 27, no. 2, pp. 340-352, Feb. 2016.
4. M. Armbrust et al., "A view of cloud computing," Commun. ACM, vol. 53, no. 4, pp. 50-58, 2010.
5. A. Lin and N.-C. Chen, "Cloud computing as an innovation: Percepetion, attitude, and adoption," Int. J. Inf. Manag., vol. 32, no. 6, pp. 533-540,
2012.
6. Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, "Enabling personalized search over encrypted outsourced data with efficiency improvement," IEEE
Trans. Parallel Distrib. Syst., vol. 27, no. 9, pp. 2546-2559, Sep. 2016.
7. Y. Ren, J. Shen, J. Wang, J. Han, and S. Lee, "Mutual verifiable provable data auditing in public cloud storage," J. Internet Technol., vol. 16, no.
2, pp. 317-323, 2015.
8. L. Lamport, "Password authentication with insecure communication,"Commun. ACM, vol. 24, no. 11, pp. 770-772, 1981.
9. E.-J. Yoon, K.-Y. Yoo, C. Kim, Y.-S. Hong, M. Jo, and H.-H. Chen, "A secure and efficient sip authentication scheme for converged VOIP
networks," Comput. Commun., vol. 33, no. 14, pp. 1674-1681, 2010.
10. R. Arshad and N. Ikram, "Elliptic curve cryptography based mutual au- thentication scheme for session initiation protocol," Multimedia Tools
Appl., vol. 66, no. 2, pp. 165-178, 2013.
11. S. H. Islam and G. Biswas, "Design of improved password authentication and update scheme based on elliptic curve cryptography," Math.
Comput. Modelling, vol. 57, no. 11, pp. 2703-2717, 2013.
12. P. Guo, J. Wang, X. Geng, S. K. Chang, and J.-U. Kim, "A variable threshold-value authentication architecture for wireless mesh networks, "J.
Internet Technol., vol. 15, no. 6, pp. 929-935, 2014.
13. J. Shen, H. Tan, J. Wang, J. Wang, and S. Lee, "A novel routing protocol providing good transmission reliability in underwater sensor
networks,"J. Internet Technol., vol. 16, no. 1, pp. 171-178, 2015.
14. M.-S. Hwang and L.-H. Li, "A new remote user authentication scheme using smart cards," IEEE Trans. Consum. Electron., vol. 46, no. 1, pp. 28-
30, Feb. 2000.
15. M. S. Farash and M. A. Attari, "An anonymous and untraceable password- based authentication scheme for session initiation protocol using smart
cards," Int. J. Commun. Syst., vol. 29, no. 13, pp. 1956-1967, 2016.
16. A. Irshad, M. Sher, M. S. Faisal, A. Ghani, M. Ul Hassan, and S. Ashraf Ch, "A secure authentication scheme for session initiation protocol by
using ECC on the basis of the tang and LIU scheme," Secur. Commun. Netw., vol. 7, no. 8, pp. 1210-1218, 2014.
17. H.-M. Sun, "An efficient remote use authentication scheme using smart cards," IEEE Trans. Consum. Electron., vol. 46, no. 4, pp. 958-961, Nov.
2000.
18. J.-L. Tsai, T.-C. Wu, and K.-Y. Tsai, "New dynamic ID authentication scheme using smart cards," Int. J. Commun. Syst., vol. 23, no. 12, pp.
1449- 1462, 2010.
19. C.-T. Li, C.-C. Lee, and C.-W. Lee, "An improved two-factor user au- thentication protocol for wireless sensor networks using elliptic curve
cryptography," Sensor Lett., vol. 11, no. 5, pp. 958-965, 2013.
20. S. H. Islam and G. Biswas, "Dynamic ID-based remote user mutual au- thentication scheme with smartcard using elliptic curve cryptography," J.
Electron., vol. 31, no. 5, pp. 473-488, 2014.
21. M. S. Farash, S. Kumari, and M. Bakhtiari, "Cryptanalysis and improve- ment of a robust smart card secured authentication scheme on SIP us- ing
elliptic curve cryptography," Multimedia Tools Appl., vol. 75, no. 8, pp. 4485-4504, 2016.
22. C.-L. Hsu, Y.-H. Chuang, and C.-l. Kuo, "A novel remote user authentica- tion scheme from bilinear pairings via internet," Wireless Pers.
Commun., vol. 83, no. 1, pp. 163-174, 2015.
23. A. Irshad, M. Sher, E. Rehman, S. A. Ch, M. U. Hassan, and A. Ghani, "A single round-trip sip authentication scheme for voice over internet
protocol using smart card," Multimedia Tools Appl., vol. 74, no. 11, pp. 3967-3984, 2015.
24. A. K. Das, "A secure and robust password-based remote user authentica- tion scheme using smart cards for the integrated EPR information
system," J. Med. Syst., vol. 39, no. 3, pp. 1-14, 2015.
25. D. Mishra, "On the security flaws in id-based password authentication schemes for telecare medical information systems," J. Med. Syst., vol. 39,
no. 1, pp. 1-16, 2015.
26. L.-H. Li, L.-C. Lin, and M.-S. Hwang, "A remote password authentication scheme for multiserver architecture using neural networks," IEEE
Trans. Neural Netw., vol. 12, no. 6, pp. 1498-1504, Nov. 2001.
27. I.-C. Lin, M.-S. Hwang, and L.-H. Li, "A new remote user authentica- tion scheme for multi-server architecture," Future Gener. Comput. Syst.,
vol. 19, no. 1, pp. 13-22, 2003.
28. X. Cao and S. Zhong, "Breaking a remote user authentication scheme for multi-server architecture," IEEE Commun. Lett., vol. 10, no. 8, pp. 580-
581, Aug. 2006.
29. C.-C. Lee, T.-H. Lin, and R.-X. Chang, "A secure dynamic ID based remote user authentication scheme for multi-server environment using smart
cards," Expert Syst. Appl., vol. 38, no. 11, pp. 13863-13870, 2011.
30. S. K. Sood, A. K. Sarje, and K. Singh, "A secure dynamic identity based authentication protocol for multi-server architecture," J. Netw. Comput.
Appl., vol. 34, no. 2, pp. 609-618, 2011.
31. X. Li, Y. Xiong, J. Ma, and W. Wang, "An efficient and security dy- namic identity based authentication protocol for multi-server architecture
using smart cards," J. Netw. Comput. Appl., vol. 35, no. 2, pp. 763-769, 2012.
32. W.-J. Tsaur, J.-H. Li, and W.-B. Lee, "An efficient and secure multi-server authentication scheme with key agreement," J. Syst. Softw., vol. 85,
no. 4, pp. 876-882, 2012.
33. K. Xue, P. Hong, and C. Ma, "A lightweight dynamic pseudonym iden- tity based authentication and key agreement protocol without verification
tables for multi-server architecture," J. Comput. Syst. Sci., vol. 80, no. 1, pp. 195-206, 2014.
34. D. Mishra, A. K. Das, and S. Mukhopadhyay, "A secure user anonymity- preserving biometric-based multi-server authenticated key agreement
scheme using smart cards," Expert Syst. Appl., vol. 41, no. 18, pp. 8129- 8143, 2014.
35. X. Li, J. Niu, S. Kumari, J. Liao, and W. Liang, "An enhancement of a smart card authentication scheme for multi-server architecture," Wireless
Pers. Commun., vol. 80, no. 1, pp. 175-192, 2015.
36. S. Shunmuganathan, R. D. Saravanan, and Y. Palanichamy, "Secure and efficient smart-card-based remote user authentication scheme for multi-
server environment," Can. J. Electr. Comput. Eng., vol. 38, no. 1, pp. 20- 30, 2015.E.-J. Yoon and K.-Y. Yoo, "Robust biometrics-based multi-
server authen- tication with key agreement scheme for smart cards on elliptic curve cryptosystem," J. Supercomput., vol. 63, no. 1, pp. 235-255,
2013.
37. H. Kim, W. Jeon, K. Lee, Y. Lee, and D. Won, "Cryptanalysis and im- provement of a biometrics-based multi-server authentication with key
agreement scheme," in Proc. Int. Conf. Comput. Sci. Appl., 2012, pp. 391- 406.
Authors: Reshmi Anantapalli, R. Rajyashree, Sri Haripriya Nutulapati, Ria Singh
Paper Title: Smart Shopping Cart Using RFID
Abstract: In the present day, the most preferred approach to any task is one that provides maximum comfort and
convenience and consumes the least time. A shopping cart is generally provided to the customers in a supermarket in
order to assist their customers with the transportation of the merchandise. The paper proposes a system for a human-
following cart (smart cart) that uses Radio Frequency Identification tags to identify and follow the customers. Each
customer entering the shop is given a Radio Frequency Identification card and its respective sensor is installed on a
shopping cart. As the customer moves inside the mart, the smart shopping cart follows him/her while maintaining a safe
distance from its respective customer and also the racks and other customers in the mart. Customers can enter their
budget before they begin shopping so they get notified if the total bill exceeds their budget. Optical Character
Recognition/ Intelligent Character Recognition software is used to scan customer's shopping list. Global Positioning
System installed in the tablet helps customer in finding the products in the mart. The system includes automatic billing
of the products which have Radio Frequency Identification tags on them and the exit gate that has Radio Frequency
Identification sensor will scan each product in the cart and the total cost of products purchased is given. Payment
method is chosen by customer and payment is done. Calories of food products are also displayed on the screen of smart
phone or tablet used to curb the customers from purchasing excessive junk food. The key is to design the cart in such a
way that it reduces man power and daily hassle of long queues. The paper promises a more cost efficient system for the
smart shopping cart than any of its predecessors.

68. Keywords: Shopping Cart, Radio Frequency Identification, Radio Frequency Identification tag, Radio Frequency
Identification Sensor, Passive Tags, Radio Frequency Identification Antenna, Reader, Micro-chip. 379-382
References:
1. Ms. Rupali Sawant, Kripa Krishnan, Shweta Bhokre, Priyanka Bhosale, "The RFID Based Smart Shopping Cart", in International Journal of
Engineering Research and General Science Volume 3, Issue 2, March-April, 2015.
2. Dr. K. A. Shirsath-Nalavade, Aarti Jaiswal, Swati Nair, Gayatri Sonawane, Suchita, "IoT Based Smart Shopping Cart (SSC) With Automated
Billing and Customer Relationship Management (CRM)", in International Journal for Research in Applied Science & Engineering Technology
(IJRASET), Volume 5 Issue X, October 2017.
3. Udita Gangwal, Sanchita Roy, Jyotsna Bapat, "Smart Shopping Cart for Automated Billing Purpose using Wireless Sensor Networks", in The
Seventh International Conference on Sensor Technologies and Applications, 2013.
4. Bhagyashree Bhumkar, Tejasvini Changal, Bhagyashri Dahifale, Ganesh Deshmukh, "Automatic Billing Trolley using RFID and ZigBee with
Android Application Rewarding System", in International Journal of Advanced Research in Electrical, Electronics and Instrumentation
Engineering (An ISO 3297: 2007 Certified Organization), Volume 5, Issue 5, May 2016.
5. Prem Kumar G, Sushruth B Bangre, Kavya M, Varun M, Anupama R, "Smart-Cart for Smart-Cities", In 2018 Second International Conference on
Advances in Electronics, Computer and Communications (ICAECC-2018).
6. Deepali Pandita, Ashwini Chauthe, Nikhil Jadhav, Department of Electronics and Telecommunications Engineering, "Automatic Shopping
Trolley using Sensors".
7. Yerlan Berdaliyev, Alex Pappachen James Department of Electrical and Electronic Engineering School of Engineering, Nazarbayev University,
"RFID-Cloud Smart Cart System".
8. Di Fan Ying He Xuyang Yao TA: Mustafa Mukadam, "Smart Shopping Cart".
9. Nemalidinne Sai Megana, Design and Implementation of a Smart Shopping Cart by RFID Technology.
10. Komal Machhirke, Priyanka Goche, Rupali Rathod, Rinku Petkar, Manohar Golait, "A New Technology of Smart Shopping Cart using RFID and
ZIGBEE".
Authors: B.J. Bipin Nair, N. Shobha Rani, S. Saikrishna, C. Adith
Paper Title: Experiment to Classify Autism through Brain MRI Analysis
Abstract: Medical image processing technologies have been experiencing rapid improvement and changes in the
earlier few years to support the medical industry. In this work an automated cognitive system is developed in demand to
classify the ASD from the Brain MRI. MRI analysis provides a dominant tool for studying brain structural variations in
ASD affected individuals. After detecting the ASD, we will predict the causing neurotransmitter pattern which made
easy to find Autistic region in the brain. In this research, we using PCA feature extraction technique and naïve Bayesian
for classification of autism. First, we using PCA technique to extract feature and classify the MRI image into two labels.
The steps involved are Using median and unsharp masking the image is pre-processed in order to remove noise and
improve the image. The pre-processed image is segmented in order to extract feature, segmentation is executed using
Otsu segmentation technique. The white matter region is segmented and the feature is extracted using PCA technique.
The features like Mean, RMS, SD, energy, homogeneity features are extracted and classify the image based on the
extracted feature using PCA technique. We conclude that the classification of ASD is capable to make clear some of the
69.
contradictions in the literature.
383-386
Keywords: ASD-Autism Spectrum Disorder, SVM-Support Vector Machine, ABIDE-Autism Brain Imaging Data
Exchange.

References:
1. Manciu, F. S., Lee, K. H., Durrer, W. G., & Bennet, K. E. (2013). Detection and Monitoring of Neurotransmitters-a Spectroscopic Analysis.
Neuromodulation: Technology at the Neural Interface, 16(3), 192-199.
2. Badgaiyan, R. D. (2014). Imaging dopamine neurotransmission in live human brain. In Progress in brain research (Vol. 211, pp. 165-182).
Elsevier.
3. Hugdahl, K., Beyer, M., Brix, M., & Ersland, L. (2012). Autism spectrum disorder, functional MRI and MR spectroscopy: possibilities and
challenges. Microbial ecology in health and disease, 23(1), 18960.
4. R.Geetha Ramani, R.Sahayamary Jabarani(2017). Detection of Autism Spectrum Disorder and Typically Developing Brain from Structural
Connectome through Feature Selection and Classification. International Journal of Innovations & Advancement in Computer Science
IJIACS,2347 - 8616
5. Liu, X., Wu, Q., Zhao, W., & Luo, X. (2017). Technology-Facilitated Diagnosis and Treatment of Individuals with Autism Spectrum Disorder:
An Engineering Perspective. Applied Sciences, 7(10), 1051.
6. [6] Li, D., Karnath, H. O., & Xu, X. (2017). Candidate biomarkers in children with autism spectrum disorder: a review of MRI studies.
Neuroscience bulletin, 33(2), 219-237
7. Djemal, R., AlSharabi, K., Ibrahim, S., & Alsuwailem, A. (2017). EEG-based computer aided diagnosis of autism spectrum disorder using
wavelet, entropy, and ANN. BioMed Research International, 2017.
8. Battish, N., & Kaur, D. (2017). Analysis of Pre-processing Methods using MRI Images. Analysis, IJMCS 5(2).
9. Tejwani, R., Liska, A., You, H., Reinen, J., & Das, P. (2017). Autism Classification Using Brain Functional Connectivity Dynamics and Machine
Learning. arXiv preprint arXiv:1712.08041.
10. Traut, N., Beggiato, A., Bourgeron, T., Delorme, R., Rondi-Reig, L., Paradis, A. L., & Toro, R. (2017). Cerebellar volume in autism: Meta-
analysis and analysis of the ABIDE cohort. bioRxiv, 104984.
11. Nair, B. B., Bhaskaran, V., & Arunjit, K. (2017). Structural designing of suppressors for autisms spectrum diseases using molecular dynamics
sketch. International Journal of Drug Delivery, 8(4), 142-146.
12. Pawar, M. S., Perianayagam, L., & Rani, N. S. (2017, June). Region based image classification using watershed transform techniques. In
Intelligent Computing and Control (I2C2), 2017 International Conference on (pp. 1-5). IEEE.
13. Bi, X. A., Wang, Y., Shu, Q., Sun, Q., & Xu, Q. (2018). Classification of Autism Spectrum Disorder Using Random Support Vector Machine
Cluster. Frontiers in genetics, 9, 18.
14. Liu, X., Wu, Q., Zhao, W., & Luo, X. (2017). Technology-Facilitated Diagnosis and Treatment of Individuals with Autism Spectrum Disorder:
An Engineering Perspective. Applied Sciences, 7(10), 1051.
15. Moradi, E., Khundrakpam, B., Lewis, J. D., Evans, A. C., & Tohka, J. (2017). Predicting symptom severity in autism spectrum disorder based on
cortical thickness measures in agglomerative data. NeuroImage, 144, 128-141.
16. Bala, M., & Yasmin, S. (2016). Study the Corpus Callosum of Brain to Explore Autism Employing Image Segmentation.
17. Tiwari, A. K. (2016). Machine learning based approaches for prediction of Parkinson disease. Mach Learn Appl, 3(2), 33-39.
Authors: J. Lavanya, N. Syed Suhail Ahmed, S. Sai Prakash, T. Divya, A. Manikandan
Paper Title: Body Channel Communication based Patient Monitoring System
Abstract: Body channel communication or human body communication is a developing field and there are various
methodology through which we can pursue and implement such a system. Health monitoring and prediction is of utmost
concern since the number of patients and diseases are increasing over the years. The previously existing systems are
mostly wired, generate a lot of additional noise and are expensive. To curb those differences and to produce a cost-
effective system with real time implementation is the main objective. We can implement this system using different
algorithms using MATLAB, Arduino, python and other image processing embedded systems. This can also be realised
using deep learning and AI. For practical concerns we use MATLAB in front end and Arduino in back end along with
Putty or hyper terminal.

Keywords: Feature Extraction in Discrete Wavelet Transform, Signal Pre-process, Noise Analysis, Channel
Estimation, MATLAB.

References:
1. R. Shubair and H. Elayan, "In vivo wireless body communications: Stateof- the-art and future directions," in Antennas Propagation Conference
(LAPC), 2015 Loughborough, Nov 2015, pp. 1-5
2. ViragVarga, Gergely Vakulya, Alanson Sample, and Thomas R. Gross. 2018. Enabling Interactive Infrastructure with Body Channel
Communication. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1, 4, Article 169 (Jan. 2018), 29 pages.
3. "Measurement and Analysis of Electric Signal Transmission Using Human Body as Medium for WBAN Applications", Taewook Kang, Kwang-Il
Oh, Jung-Hwan Hwang, Sungeun Kim, Hyungil Park, and Jaejin Lee Published in: IEEE Transactions on Instrumentation and Measurement
(Volume: 67, Issue: 3, March 2018 )
4. Thomas G. Zimmerman, Joshua R. Smith, Joseph A.Paradiso, David Allport, and Neil Gershenfeld. 1995.Applying Electric Field Sensing to
Human-computer Interfaces. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '95). ACM
Press/Addison-Wesley Publishing Co., New York, NY, USA, 280-287.
70. 5. Francine Gemperle, Chris Kasabach, John Stivoric, Malcolm Bauer, and Richard Martin. 1998. Design for wearability. In Digest of Papers.
Second International Symposium on Wearable Computers (Cat. No.98EX215). 116-122.
6. N. Cho, J. Yoo, S.-J. Song, J. Lee, S. Jeon, and H.-J. Yoo, "The human body characteristics as a signal transmission medium for intrabody 387-392
communication," Microwave Theory and Techniques, IEEE Transactionson, vol. 55, no. 5, pp. 1080-1086, 2007.
7. M. S. Wegmueller et al., "An attempt to model the human body as a communication channel," IEEE Trans. Biomed. Eng., vol. 54, no. 10, pp.
1851-1857, Oct. 2007.
8. Ai-Ichiro Sasaki, Mitsuru Shinagawa, and KatsuyukiOchiai. 2009. Principles and Demonstration of Intrabody Communication With a Sensitive
Electrooptic Sensor. Instrumentation and Measurement, IEEE Transactions on 58, 2 (Feb 2009), 457-466.
9. Channel Model for Body Area Network (BAN), IEEE Standard P802.15-08-0780-12-0006, Nov. 2010.
10. 2012. IEEE Standard for Local and metropolitan area networks - Part 15.6: Wireless Body Area Networks. IEEE Std 802.15.6-2012 (2012).
11. ZeljkaLucev, Igor Krois, and Mario Cifrek. 2012a. A Capacitive Intrabody Communication Channel from 100 kHz to 100 MHz. Instrumentation
and Measurement, IEEE Transactions on 61, 12 (Dec 2012), 3280-3289.
12. J. H. Hwang, C. H. Hyoung, K. H. Park, and Y. T. Kim, "Energy harvesting from ambient electromagnetic wave using human body asantenna,"
Electron. Lett., vol. 49, no. 2, pp. 149-151, Jan. 2013.
13. S.Movassaghi, M. Abolhasan, J. Lipman, D. Smith, and A. Jamalipour, "Wireless body area networks: A survey," IEEE Commun. Surveys Tuts.,
vol. 16, no. 3, pp. 1658-1686, 3rd Quart., 2014.
14. S. Zhang, Y. Qin, J. Kuang, P. U. Mak, S. H. Pun, M. I. Vai, and Y. Liu, "Development and prospect of implantable intra-body communication
technology," Journal of Computers, vol. 9, no. 2, pp. 463-474, 2014.
15. Mehrdad Hessar, Vikram Iyer, and ShyamnathGollakota. 2016. Enabling On-body Transmissions with Commodity Devices. In Proceedings of the
2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '16). ACM, New York, NY, USA, 1100-1111.
16. Yang Zhang, Junhan Zhou, GieradLaput, and Chris Harrison. 2016. SkinTrack: Using the Body As an Electrical Waveguide for Continuous
Finger Tracking on the Skin. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York,
NY, USA, 1491-1503.
17. T.-W. Kang et al., "Highly simplified and bandwidth-efficient humanbody communications based on IEEE 802.15.6 WBAN standard," ETRI J.,
vol. 38, no. 6, pp. 1074-1084, Dec. 2016.
18. Edward JayWang, Jake Garrison, Eric Whitmire, Mayank Goel, and Shwetak Patel. 2017. Carpacio: Repurposing Capacitive Sensors to
Distinguish Driver and Passenger Touches on In-Vehicle Screens. In Proceedings of the 30th Annual ACM Symposium on User Interface
Software and Technology (UIST '17). ACM, New York, NY, USA, 49-55. DOI:http://dx.doi.org/10.1145/3126594.3126623
19. J.-H. Hwang, T.-W. Kang, J.-H. Kwon, and S.-O. Park, "Effect of electromagnetic interference on human body communication," IEEE Trans.
Electromagn. Compat., vol. 59, no. 1, pp. 48-57, Feb. 2017.
Authors: Jonti Deuri, S. Siva Sathya
Paper Title: Multi-objective Optimization Using Cricket Chirping Algorithm
Abstract: Utmost real world optimization problems are typically multi-objective with complex constraints. Now-a-
days the heuristics and meta-heuristics approaches are becoming more powerful to solve these optimization problems
considerably to direct approach. Cricket Chirping Algorithm (CCA) is a metaheuristics approach developed based on
the chirping behavior of cricket for solving optimization problem. In this paper the cricket chirping algorithm for single
objective optimization is extended for solving multi-objective optimization problems by adopting the aggressive
behavior of cricket. The proposed Multi-objective Optimization using Cricket Chirping Algorithm(MOCCA) is first
validated with a subset of benchmark test functions and compared with the other metaheuristics algorithm like MOPSO,
NSGA-II and SPEA-II. The performance, efficiency and robustness of the proposed algorithm are experimented and
statistically analyzed and it is proved the superiority of the MOCCA to other methods in terms of diversity and
convergence of the solution. It can provide optimal or near optimal solutions for a wide range of problems.

Keywords: Multi-objective Optimization, Cricket Chirping Algorithm, Meta-heuristics, Optimization Problem.

References:
1. T. P. Bagchi, "Multiobjective Optimization," pp. 136-146, 1999
2. S. Huband, S. Huband, P. Hingston, and L. Barone, "A Review of Multi-objective Test Problems and a Scalable Test Problem Toolkit A Review
of Multiobjective Test Problems and a Scalable Test Problem Toolkit," vol. 10, no. 2006, pp. 477-506, 2011.
3. F. Dey and A. Caflisch, "Fragment-based de novo ligand design by multi-objective evolutionary optimization. Supporting Information," J. Chem.
Inf. Model., vol. 48, no. 3, pp. 679-690, 2008.
4. H. Mori and T. Yoshida, "An efficient multi-objective memetic algorithm for uncertainties in distribution network expansion planning," 2009
IEEE Power Energy Soc. Gen. Meet. PES '09, no. 2, pp. 1-6, 2009.
5. V. Ebrahimipour and M. Sheikhalishahi, "Application of multi-objective particle swarm optimization to solve a fuzzy multi-objective reliability
redundancy allocation problem," 2011 IEEE Int. Syst. Conf. SysCon 2011 - Proc., vol. 1, no. 2, pp. 326-333, 2011.
6. R. K. Jena, "Artificial Bee Colony Algorithm based Multi-Objective Node Placement for Wireless Sensor Network," Int. J. Inf. Technol. Comput.
Sci., vol. 6, no. 6, pp. 25-32, 2014.
7. Hojjati, Ali, Mohsen Monadi, AlirezaFaridhosseini, and MiraliMohammadi. "Application and comparison of NSGA-II and MOPSO in multi-
objective optimization of water resources systems." Journal of Hydrology and Hydromechanics 66, no. 3: 323-329(2018).
8. Jiao, Ruwang, et al. "Dynamic constrained multi-objective evolutionary algorithms with a novel selection strategy for constrained optimization."
Proceedings of the Genetic and Evolutionary Computation Conference Companion. ACM, 2018.
71.
9. Deuri, Jonti, and S. Siva Sathya. "Cricket chirping algorithm: an efficient meta-heuristic for numerical function optimisation." International
Journal of Computational Science and Engineering 16.2, 162-172,2018. 393-401
10. M. Shukla, "Review of Multi-objective Optimization using Genetic Algorithm and Particle Swarm Optimization," pp. 72-74.
11. L. M. P. M. Srinivas, "Genetic Algorithm: A Survey," Evol. Comput. IEEE, 1994.
12. D. Goldberg, "Genetic Algorithms in Search, Optimization, and Machine Learning," vol. 9, 2005.
13. K. Deb, S. Agrawal, S. Pratab, and T. Meyarivan, "A fast elitist non- dominated sorting genetic algorithm for multi-objective optimization:
NSGA-II.," Parallel Probl. Solving from Nat. VI Conf., 2000.
14. J. Horn, N. Nafpliotis, and D. E. Goldberg, "A Niched Pareto Genetic Algorithm for Multiobjective Optimization," pp. 82-87, 1994.
15. J. Horn and N. Nafpliotis, "Multiobjective optimization using the niched pareto genetic algorithm," Cec, vol. 1, pp. 82-87, 1994.
16. C. M. Fonseca and P. J. Fleming, "MULTI-OBJECTIVE GENETIC ALGORITHMS pp. 2-6.
17. J. Knowles and D. Corne, "The Pareto archived evolution strategy: A new baseline algorithm for Pareto multi-objective optimisation," Proc. 1999
Congr. Evol. Comput. CEC 1999, vol. 1, pp. 98-105, 1999.
18. E. Zitzler and L. Thiele, "Multiobjective evolutionary algorithms: a comparative case study and the strength Pareto approach," Evol. Comput.
IEEE Trans., vol. 3, no. 4, pp. 257-271, 1999.
19. E. Zitzler, M. Laumanns, and L. Thiele, "SPEA2: Improving the Strength Pareto Evolutionary Algorithm," pp. 1-21, 2001.
20. Q. Zhang, S. Member, and H. Li, "MOEA / D: A Multiobjective Evolutionary Algorithm Based on Decomposition," vol. 11, no. 6, pp. 712-731,
2007.
21. J. Moore and R. Chapman, "Application of particle swarm to multiobjective optimization," Dep. Comput. Sci. Softw. Eng. Dep. Auburn Univ.,
pp. 1-4, 1999.
22. C. A. CoelloCoello and M. S. Lechuga, "MOPSO: A proposal for multiple objective particle swarm optimization," Proc. 2002 Congr. Evol.
Comput. CEC 2002, vol. 2, pp. 1051-1056, 2002.
23. X. Hu and R. Eberhart, "Multiobjective optimization using dynamic neighborhood particle swarm optimization," Congress on Evolutionary
Computation, vol. 2. pp. 1677-1681, 2002.
24. X. H. X. Hu, R. C. Eberhart, and Y. S. Y. Shi, "Particle swarm with extended memory for multiobjective optimization," Proceedings of the 2003
IEEE Swarm Intelligence Symposium. SIS'03 (Cat. No.03EX706). 2003.
25. C. a C. Coello, G. T. Pulido, and M. S. Lechuga, "Handling multiple objectives with particle swarm optimization," Evol. Comput. IEEE Trans.,
vol. 8, no. 3, pp. 256-279, 2004.
26. D.H. Wolpert, W.G. Macready, No free lunch theorems for optimization, IEEE Transactions on Evolutionary Computation 1 (1997) 67-82
27. J. Deuri and S. S. Sathya, "A Novel Cricket Chirping Algorithm for Engineering Optimization Problem," vol. 9, no. 6, pp. 397-402, 2015.
28. Deuri, Jonti, and S. Siva Sathya. "Impact of Parameter Tuning on the Cricket Chirping Algorithm." International Journal of Intelligent Systems
and Applications 9.9 (2017): 58.
29. Deuri, Jonti, and S. Siva Sathya. "Multilevel Thresholding for Image Segmentation Using Cricket Chirping Algorithm." Bio-Inspired Computing
for Image and Video Processing. Chapman and Hall/CRC, 2018. 31-58.
30. K. Lorenz and N. Tinbergen, "Behavior of the House Cricket, Achetadomesticus," no. 1, 2010.
Authors: K.K. Bharath, Ankit Kumar, Adithya Varma, R. Rajyashree
Paper Title: Secured Electronic Hospital Database Management System
Abstract: The major reason for naming this project as “Secured Electronic Hospital Database Management System” is
to secure the database holding the personal medical record or data of the patient. Various issues are there in maintaining
72. the records in the current used system which makes it difficult most of the records are currently held manually using
paper and record books which are very time consuming and not cost friendly. It takes time for doctors to access the data,
402-405
this also affects the quality of the health care provided by the hospitals and also are highly cost demanding and also
consume a lot of time. It is easy for a people to either access the data illegally by using several manual methods or to
hack and to access all the important information and exploit the information to wrong hands. It is very important to have
a highly secured database especially when containing highly confidential information such as a hospitals databse.
Patients generally wouldn’t want to disclose their actual health issues for several reasons such as fear of losing their
privacy and security of their health-related information. This project’s sole purpose is to solve all of the above problems
in a more efficient and cost-effective manner with an aim of reducing the time and resources currently required for such
tasks so that the institution’s resources may be efficiently utilized. This project attempts to protect the privacy of
hospitals records from hackers and also viruses, Trojan horses etc.

Keywords: Hospital Record, Secure, SHA3, Database.

References:
1. Problems with Medical Records, Henry M. Tufo and Joseph J. Speidel, Medical Care, Vol. 9, No. 6 (Nov. - Dec., 1971), pp. 509-517, Published
by: Lippincott Williams & Wilkins
2. Mathai N, Shiratudin MF, Sohel F (2017) Electronic Health Record Management: Expectations, Issues, and Challenges. J Health Med Informat
8:265. doi: 10.4172/2157-7420.
3. Handel DA, Hackman JL (2010) "Implementing electronic health records in the emergency department." J Emerg Med 38: 257-263.
4. Acharya S, Coats B, Saluja A, Fuller D (2013) "Secure Electronic Health Record Exchange: Achieving the Meaningful Use Objectives." Int Conf
Sys Sci 46: 1-10.
5. Rosenthal DI (2013) "Instant Replay." Healthcare1: 52-54.
Authors: S. Yogashri, S. Jayanthy, A. Rathinavel
Paper Title: Real Time Tire Pressure Monitoring System in Automobiles Using SPLUNK Enterprise
Abstract: The Tire pressure Monitoring system is proposed to monitor the changes in the tire pressure and
temperature using Splunk Enterprise. The proposed system is implemented using the Raspberry Pi interfaced with 5 inch
HDMI Touch Display, SPD100g Pressure Sensor and DS18B20 Temperature Sensor. The system senses the high and
low pressure, temperature of the tire and displays the information on the display. The log of the Tire Pressure
Monitoring system is indexed with Splunk Enterprise. Splunk Enterprise is a platform for searching, analyzing and
visualizing the machine generated data from the applications, sensors and devices. It communicates with the different
log files and stores the file data in the form of events into local indexes. By using Splunk Enterprise Pivots, Dashboards
and Reports can be created.

Keywords: TPMS, HDMI Display, SPD100g Sensor, DS18B20 Sensor, Splunk Enterprise, Pivots, Dashboards,
Reports.

References:
1. Snehal R.Javheri, Biplap Kumar and Bej Raj Singh Patel, "Wireless Tire Pressure Monitoring System for Motor Vehicles", International
73. Conference on Ubiquitous and Future Networks (ICUFN), pp. 744-748, June 2017
2. Adnan Shaout and Victoria Yanez, "Model Tire Pressure Sensor ID Learning Method using Fuzzy Logic", International Conference on 406-410
Information Technology (ICIT), pp. 275-279, 2017
3. Chu Kyun Bae, Sol Lim, Seung Gi Kim and Dae Jin Kim, "Tire Location Registration Algorithm using Interframe Spacing Pattern in TPMS",
International Conferences on Ubiquitous and Future Networks, pp.770-772, 2017
4. Antoniu Miclaus, Rajmond Jano and Gabriel Chidris, "Implementation of a car model for indirect pressure monitoring system", International
Spring Seminar on Electronics Technology, pp.316-321, 2016
5. Sharmila and Vibin Mammen Vinod, "Design of a Real-Time Tire Pressure Monitoring System for LMV's", International Conference on Green
Engineering and Technologies (IC-GET), pp. 103-106, 2016
6. Rajesh Kannan Megalingam, C.Jayakrishnan, Sriraj Nambiar, Rudit Mathews, Vishnu Das and Pramesh Rao, "Automatic Pressure Maintenance
system for tires in automobiles to reduce accidents", International Conference on VLSI Systems, Architectures, Technology and applications,
pp.1-6, 2016
7. Tian Xiangjun, "The Design and Research of Tire Pressure Monitoring System", International Conference on Intelligent Transportation, Big data
and Smart City, pp.479-481, 2016
8. G.Petchinathan, K.Srinivasa Sricharan, R.Bharath, T.Thiyagarajan and S.Sushanth Kumar, "Automated Tire Pressure Monitoring and
RegulatingSystem", International Conference on Vehicular Electronics and Safety, pp.22-27, 2014
9. Zoltan Marton, Denes Fodor, Krisztian Enisz and Klaudia Nagy, "Frequency Analysis Based Tire Pressure Monitoring," IEEE 17th International
Conference on Intelligent Transportation Systems (ITSC), pp. 1-5, 2014
10. Nouman Naim Hasan, Adeel Arif, Muhammad Hassam, Syed Shabeeh and Usman Pervez, "Implementation of Tire Pressure Monitoring system
with Wireless Communication", International Conference on Communication Computing and Control Applications, 2011.
Authors: Sherin Eliyas, R. Naveen, M. Siva Krishna
Paper Title: Twitter Crowd Mining and Data Fishing
Abstract: People use twitter as a medium to share their opinions, which in turn makes it a platform for analyzing
public opinion. This kind of information in various fields can be used for further analysis. Text mining is used for
classifying tweets into negative and positive statements depending on their purpose. Text messages are used to define
mind set of large groups of people. From perspective of decision makers, precious information is provided by collection
of text messages. In this paper, we use data collected from twitter and extract useful data from it using data mining tools.
The results is represented as decision trees and this can be used to make further analysis or used to take decision for
analyst. Here we evaluate or analyze the impact of tweets by using emotic icons for process.
74.
Keywords: Twitter, Crowd Mining, Data Fishin 411-415

References:
1. I Chapter 10: Text Mining, in book R and Data Mining: Examples and Case Studies http://www.rdatamining.com/docs/RDataMining.pdf
2. I R Reference Card for Data Mining http://www.rdatamining.com/docs/R-refcard-data-mining.pdf
3. Free online courses and documents http://www.rdatamining.com/resources/
4. RDataMining Group on LinkedIn (12,000+ members) http://group.rdatamining.com
5. RDataMining on Twitter (2,000+ followers) @RDataMining
6. W. Fan and A. Bifet, "Mining big data: Current status, and forecast to the future," SIGKDD Expolorations, vol. 14, pp. 1-5,2012..
7. I. H. Witten, "Text mining," in The Practical Handbook of Internet Computing, M. P. Singh, Ed. Danvers, MA: Chapmanand Hall/CRC, 2005, ch.
14, pp. 314-341.
8. B. Amang and M. Sawit, Kebijakan Berasdan Pangan Nasional: Pelajaran Orde Barudan Orde Reformasi, 2nd ed. Bogor, Indonesia: IPB Press,
2001.
9. Badan Pusat Statistik. Persentase Pengeluaran Rata-rata per Kapita Sebulan Menurut Kelompok Barang, Indonesia, 1999, 2002-2013.[Online].
Available: http://www.bps.go.id/ tab_ sub/view.php?tabel=1&daftar=1&id_subyek=05&notab=7.
10. R. Feldman and J. Sanger, The Text Mining Handbook: Advances Approaches in Analyzing Unstructured Data, New York, NY: Cambridge
University Press, 2007.
Authors: K.P. Ravi Kumar, H.S. Manjunatha Reddy
Paper Title: Neural Network based Steganography for Information Hiding
Abstract: Steganography is the method of concealing secret message inside a digital image, video or audio file and is
to avoid drawing attention to the transport of hidden information through the communication channel. The Neural
Network based Steganography for information Hiding (NNSIH) is proposed. The Neural network approach is used to
select and train the best images. The selected image is converted in to bit planes and IWT is applying on each plane to
generate sub bands. The threshold is calculated to determine size of the redundancy cover image coefficients and used to
embed the secret image. The result shows that the PSNR is higher in this algorithm as compare to available algorithms
due to the use of neural network and IWT.

Keywords: Steganography, IWT, Neural Networks, Threshod, PSNR.

References:
1. Sumeet Kaur, Savina Bansal and R. K. Bansal, "Steganography and Classification of Image Steganography Techniques", IEEE International
Conference on Computing for Sustainable Global Development, pp. 870-875, 2014.
2. MunishKatoch and Reenu Jaswal, "Image Steganography- A Review", International Journal of Advanced Research in Computer and
Communication Engineering vol. 5, issue 4, pp. 827-830, 2016.
75.
3. Divya.Aynapur and S. Thenmozhi, "A secure steganography approach of multiple secret images using ANN", International Journal of Recent
Trends in Engineering and Research, vol. 02, issue. 04, pp.468-473, 2016 416-420
4. Ashley S Kelsey and Cajetan M Akujuobi, "Discrete Wavelet Transform approach for Enhanced security in image Steganography", International
Journal of Cyber-Security and Digital Forensics, vol. 5, issue. 1, pp. 10-20, 2016
5. Seema S Girare and Malvika U Saraf, "Literature Review on Different Watermarking and Steganography Technique", International Research
Journal of Engineering and Technology, vol. 03, issue. 04, pp. 1097-1102, 2016
6. Prasanna kumar Patil and Satish Shet. K, "Implementation of an Image Steganography Technique using X(X-OR)-Box Mapping", International
Journal of VLSI system design and Communication system, vol. 03, issue. 03, pp. 0282-0287, 2015
7. Pranita P. Khairnar and V. S. Ubale, "Steganography using BPCS technology", International Journal of Engineering and Science, vol.3, issue. 2,
pp. 08-16, 2013
8. Navdeep Kaur and Sukhjeet K. Ranade, "High Capacity Data Embedding System using Projection Quantization", International Journal of
Advanced Research in Computer and Communication Engineering, vol. 1, issue. 4, pp. 234-237, 2012
9. Vijaysinh J, kirit R, Avalik k, and Ashish V,Nitin K, "A Novel technique for image Steganography techniques Based on LSB and DCT
coefficient", International Journal for Scientific Research and Development, vol. 1, issue. 11, pp. 2479-2482, 2014
10. V.Vignesh and M.Vijay "Image Steganography Method Using Integer Wavelet Transform" International Journal of Innovative Research in
Science, vol. 3, issue. 3, pp. 1207-1211, 2014
11. Anitha, M. Rajaram and Sivanandham, "An Efficient Neural Network Based Algorithm for Detecting Steganography content in Corporate mails:
A Web Based Steganalysis", International Journal of Computer Science Issues, Vol. 9, Issue 3, No 1, 2012
12. Jasmeen Kaur Pandher and Kamalpreet kaur, "A Secure Image Steganography Method Based on Neural Network", International Journal of
Computer Science and Engineering Technology, vol. 7, no. 06, pp. 285-291, 2016.
Authors: S. Vijay Ananth, P. Sudhakar, K. Sundari, Nibi Maouriyan, R. Raghavi, S. Arivuselvan
Paper Title: Data Hiding in Thermal Image Using Levenberg Marquardt Technique
Abstract: In the ocean of technology, nothing stays secret for a long duration of time. Valuables always been hacked
or stolen for it is increasing its value on its own and remains getting ones attraction at the peak. This creates an
intention of knowing more about the hidden secrets with in it. Therefore, the security system plays a vital role in hiding
the information from hackers or the unauthorised individuals or groups. Cryptography, deals with text of any language
while Steganography, deals with the images. In this analysis the input secret data is transformed to a graphical and
numerical representation, and embedded into a cover image and further fused with a thermal image before transmission.
There ensuring a two level security by summing up the Cryptography and Steganography algorithms under one roof,
and provides the best results on implementation.

References:
1. RengarajanAmritharajan, S.Deepak Roy, Noel Nesakumar, M.Chandrasekar, R.Sridevi,J.B.B.Rayappan, "Mind game for cover steganography: A
Refuge", Research Journal of Information Technology 5(2),137-148,2013.
76. 2. S. Vijay Ananth and P. Sudhakar, " Performance Analysis of a Combined Cryptographic and Steganographic Method over Thermal Images using
Barcode Encoder" in Indian Journal of Science and Technology, Vol 9(7), DOI: 10.17485/ijst/2016/v9i7/84152, February 2016.
3. R.JohnsonSuthakar, J.Monica Esther M.E, D.Annapoorani, F.Richard Singh Samuel, "Study of Image Fusion- Techniques, Method and 421-424
Applications" in IJCSMC, Vol. 3, Issue. 11, November 2014, pg.469 - 476.
4. K. Levenberg. "A Method for the Solution of Certain Non-linear Problems in Least Squares", Quarterly of Applied Mathematics, 2(2):164-168,
Jul. 1944.
5. S. Hemalatha, U. Dinesh Acharya, Renuka, "Comparison of Secure and High Capacity Colour Image Steganography Techniques in RGB and
YCBCR domains", International Journal of Advanced Information Technology. 2013; 3(3):1-9.
6. Jain, Ahirwal, "A Novel Image Steganography Method With Adaptive Number of Least Significant Bits Modification Based on Private Stego-
Keys", International Journal of Computer Science and Security (IJCSS). 2010 March; 4(3):111-119.
7. Yan Zhu, MengYang Yu, HongXin Hu, Gail-Joon Ahn, HongJia Zhao, "Efficient construction of provably secure steganography under ordinary
covert channels", Science China Information Sciences. 2012; 7(2):39-49.
8. Kumar Nawlesh, Kalpana, "Novel Reversible Steganography Method using Dynamic Key Generation for Medical Images", Indian Journal of
Science and Technology. 2015 July; 8(16):61-74.
9. RamalingamMritha, "A Steganography Approach over Video Images to Improve Security" , Indian Journal of Science and Technology, Volume
8, Issue 1, January 2015.
10. Natarajan Meghanathan, Lopamudra Nayak, "Steganalysis algorithms for detecting the hidden information in image, audio and video cover
media", Jackson State University, 1400 Lynch St, Jackson, MS, USA.
Authors: S. Prasanna Bharathi, G. Chamundeeswari, S. Srinivasan
Paper Title: Smart Locking and Surveillance System
Abstract: The paper aims to detect the motion and to simplify the process of motion detection and to send prompt
notifications to the user when the motion is detected. The locker gets the control through various sensors connected to it.
The locker has three steps of authentication to prevent unauthorized entry. First the person’s fingerprint is scanned
which is followed by the facial feature recognition. If anyone tries to access the locker, camera will capture the image,
process it and send a mail to the particular person along with an One Time Password (OTP). It is only on typing the
OTP by the person, will the locker open. When an unknown / unauthorized person enters the locker area, the sensor
detects and captures the image and mails it to the authority as well as producing electric shock outside the locker for
further security. The concept of Smart Lock is to automate the process of person identification.

Keywords: IoT, Motion Detection, Image Processing, Raspberry Pi2.

References:
1. Dipalee Gupta, Siddhartha Choubey, "Discrete Wavelet Transform for Image Processing", International Journal of Emerging Technology and
Advanced Engineering, Volume 4, Issue 3, March 2015
2. G. Chamundeeswari, Dhinakaran M, Ashwini C, S. Prasanna Bharathi, "Denoising of Medical Images using Adaptive Wavelet Thresholding
Algorithm", International Journal of Applied Engineering Research, Volume 10, 2015
3. S. Prasanna Bharathi, C.V.S. Tejas, L. Varadharajan, "Denoising of Medical Images using Adaptive Wavelet Thresholding Algorithm",
International Journal of Applied Engineering Research, Volume 10, 2015
77.
4. HuiDan Gao, YaJun Guo, JianQun Cui, HengGeng Hao, Hui Shi, "A Communication Protocol of RFID systems in Internet of Things",
International Journal of Security and its applications, Volume 6, No 2, 2012 425-428
5. Chamundeeswari.G, S. Prasanna Bharathi, "IoT Based Industrial Computerization", Journal of Advanced Research in Dynamical and Control
Systems, Volume 9, 2017
6. S. Prasanna Bharathi, Chamundeeswari, "Precision Farming using Internet of Things", Journal of Advanced Research in Dynamical and Control
Systems, Volume 9, 2017
7. Uchinuno T, Yasunaga Y, Keiichi M, Sugimoto N, Aoqui S, "Development of knowledge sharing system for agriculture application",
International Conference on Advanced applied Informatics, 2013
8. S. Sathya Prabha, A. John Paul Anthony, M. Janaki Meena, S.R. Pandian, "Smart Cloud robot using Raspberry Pi", International Conference on
Recent Trends in Information Technology, 2014
9. S. Prasanna Bharathi, G. Chamundeeswari, R. Vishnu, G. Sree Harsha, "Autonomous Robot for Environment monitoring and Surveillance",
International Journal of Pure and Applied Mathematics, Volume 119, 2018
10. J. Arunnehru, G. Chamundeeswari, S. Prasanna Bharathi, "Human action Recognition using 3D Convolutional Neural Networks with 3D motion
Cuboids in Surveillance Videos", International Conference on Robotics and Smart Manufacturing (RoSMa 2018) 2018
11. S Ji, W. Xu, M. Yang, K.Yu, "3D Convolutional Neural Networks for Human Action Recognition", IEEE Transactions on pattern analysis and
Machine Intelligence 2013
12. X.Tian, J.Fan, "Joints Kinetics and relational Features for action recognition", Signal Processing 2018
13. M.K. Geetha, J. Arunnehru, A. Geetha, "Early Recognition of suspicious activity for crime prevention", Emerging Technologies in Intelligent
applications for Image and Video Processing
14. Vangelis Gazis, Konstantinos Sasloglou, Nikoloas Frangiadakis, Panayotis Kikiras, "Wireless Sensor, Networking, Automation Technologies and
Machine to Machine Developments on the path to the Internet of Things", 16th Panhellenic Conference on Informatics, 2012
15. Miguel Castro, Antonio J. Jara, Antonio F.G. Skarmeta, "Smart Lighting solutions for smart cities", 27th International Conference on Advanced
Information Networking and Applications Workshops.
Authors: T.S. Balaji, S. Balaji, S. Amrithaavarshini, K.R. Preethi
Paper Title: A Surveillance System for Avoiding Human-Animal Conflict Using Zigbee and RSSI
Abstract: Animal-Vehicle Conflict is one of the major issues across the world which affects both human and wild life.
A recent research indicates many animals die due to train accidents mostly & road accidents at night time. Despite
railway authorities & highway authorities instructing the drivers to reduce the speed in forest areas, there has not been
much reduction in wildlife death from vehicles. The surveillance and tracking of wild animals are difficult due to their
size. The proposed system automatically detects the wild animals with a small tag implanted on their ears or in their
bodies. Each and every wild animal crossing zone has a receiver which can debug the implanted tag and thereby stop the
vehicles when the wild animals near a crossing section. The implanted tags are RSSI, Zigbee &GPS which consumed
low power will typically consume 50 mA at 3.3 V a 3amps 3.3v lithium ion battery can be used for more than 5 years.
The road side unit continuously asks for the presence of wild animals within its range. It is a pronoun fact that Zigbee
can transmit its data up to 80km range in open air. Hence whenever a wild animal nears a crossing point the gps value
with respect to crossing units will be very less. By knowing these parameters automatically, a siren is given to the road
side unit by the embedded device present in it. On successful detection of a siren the driver reduces the speed of the
78. vehicle to a considerable limit such that the Wild animal which carries the tag is not hit by the vehicle. Also, this paper
initiates an effort to tag all wild life so that when wild animals like cheetah or leopard enters into a residential area is 429-433
intimated to the forest rangers by trans receiver units placed at potential places where wild animals can enter the human
zone.

Keywords: Vehicle -Animal Conflict, RSSI, Zigbee, GPS.

References:
1. Tanushree Dalai, "Emergency Alert and Service for Automotives for India", International Journal of Advanced Trends in Computer Science and
Engineering (IJATCSE), Mysore, India, Vol.2, No.5, Pages: 08-12 (2013) Special Issue of ICETCSE 2013.
2. Purva Javale, Shalmali Gadgil, Chinmay Bhargave, Yogesh Kharwandikar , Vaishali Nandedkar, "Accident Detection and Surveillance System
using Wireless Technologies", IOSR Journal of Computer Engineering (IOSR-JCE), pp 38-43, Volume 16, Issue 2, March-April 2014.
3. T. Surya1 and S. Chitra Selvi, "A Literature Review on Analysis of Cause and Impact of Human Wildlife Conflict and the Preceding Techniques
Implemented to Avoid Conflict", IEEE International Conference on Smart Technologies and Management for Computing, Communication,
Controls, Energy and Materials, pp.455-459, Aug 2017
4. http://ww1.microchip.com/downloads/en/devicedoc/doc1919.pdf
5. FaezahBintihashim, "Intelligent Road tracking system using wireless sensors" in April 2011 atInternational Journal of Advanced Trends in
Computer Science and Engineering Mysore, India, Vol.2, No.5, Pages: 10 Special Issue of ICETCSE 2013.
6. Roland Kays et al, "Tracking Animal Location and Activity with an Automated Radio Telemetry System in a Tropical Rainforest", IEEE The
computer journal, Vol. 54 , Issue: 12 ,pp.1931 - 1948 Nov. 2011
7. S Sukkarieh "Online localization of Radio-Tagged wildlife with an autonomous Aerial Robot System"Robotics Journal in Robotics and
Science,Gujarat,India,july 2015
8. DS. Lee, L. F. Gonzalez, K. Srinivas, D. Auld, J. Periaux, "Multi-objective/multidisciplinary design optimisation of blended wing body UAV via
advanced evolutionary algorithms", Collection of technical papers. 45th AIAA aerospace sciences meeting, pp. 296-316, 2007.
9. J. Berni, P. Zarco-Tejada, L. Suárez, V. González-Dugo, E. Fereres, "Remote sensing of vegetation from UAV platforms using lightweight
multispectral and thermal imaging sensors", Int. Arch. Photogramm. Remote Sens. Spatial Inform. Sci, vol. 38, pp. 6, 2009.
10. Seyed Mahdi Darroudi and Carles Gomez, "Bluetooth Low Energy Mesh Networks: A Survey", Sensors 2017, 17, 1467; doi:10.3390/s17071467
11. Components and Uses of Zigbee https://en.wikipedia. org/wiki/Zigbee
12. https://en.wikipedia.org/wiki/Received_signal_strength_indication
Authors: S.K.Senthilkumar , Sudharsan.E , Sivasethupathi.R, Sanjeevi.A , Raghunath.T
Paper Title: An Important Enterprise Resource Planning Tool for Achievement of Process Tracking System
Abstract: The database associated by utilizing MySQL. The framework is created to keep up the records of errand
that held by workforce by their ventures to be overseen. Presently a-days, Information was recorded as Excel as it were.
Thus, it might cause issues. To beat this, we build up an undertaking, to keep up personnel perusing subtleties and work
examination methodicallly. Subtleties will be kept up in the database in on the web or else offline.ERP framework
which depends on the methodical administration thinking furnishes basic leadership and staff with the board stage. In
any case, ERP structure is going up against various inconveniences and challenges in Project Management, including
astonishing costs and insufficient getting ready, thus forth.This article focuses endeavors, in the conditions of limited
resources, giving full play to the features of ERP system amid the time spent endeavor utilization, on multi-angle(from
the budgetary sponsorship, cost, quality) examining the essentialness of the introduction of ERP system. It is ERP
structure that accept a broad occupation in improving the viability of the association's organization and diminishing
organization cost in all pieces of age and undertaking

References:
1. Hosted, Cloud and SaaS, Off-premises ERP Systems Adoption by Moroccan SMEs A focus group study AmineArrahmane ACHARGUI EM2TI-
CEDOC INPT Rabat, Kingdom of Morocco Achargui.aminearrahmane@gmail.com AbdellahZaouia EM2TI-CEDOC INPT Rabat, Kingdom of
79. Morocco zaouia@inpt.ac.ma
2. Model of Storage of ERP Protocols in EEG/ERP Portal Vaclav Papez, Roman Moucek Department of Computer Science and Engineering 434-437
University of West Bohemia Pilsen, Czech Republic
3. XSSecure XTS Tracking System. Retrieved from http://www.xssecure.com/product.html/ [Accessed March 28, 2018
4. M.A. Babar, L. Chen, and F. Shull, 2010. Managing variability in software product lines. Software, IEEE, 27(3), pp.89-91.
5. Muhammad IrsyadKamilRiadz, NurulNazihah Jamal, Mohammad Shafri Amir Mohd Sharif, Mohd Sufi MohdSuhaimi, 2017. A real-time process
tracking System, Undergraduate Project Report, UniversitiTeknologi Malaysia: Faculty of Computing.
6. High-Tech Courier Services as an E-Courier services in India Prospective - AvnishChauhan ,Satyendra Singh , Ankur Jain and Rajeev Kumar.
7. Dr.M.P.Thapliyal ,PoojaVashishta Volume 1, Issue 2, July – August 2012 : ERP Software Implementation in Indian Small and Medium
Enterprises.
8. Erik Fosser, Ole Henrik Leister, Carl Erik Moe ERP SYSTEMS AND COMPETITIVE ADVANTAGE:SOME INITIAL RESULTS.
9. Razalli, M.R., The consequences of service operations practice and service responsiveness on hotel performance: Examining hotels in Malaysia.
2008, UniversitiSains Malaysia: Penang.
10. JozefienKarskens Supervisor: Dr. R. Bekker, Research Paper Master Business Analytics ,31 Oktober
11. A Forrester Consulting Thought Leadership Paper Commissioned By MetaPack September 2014.
12. Linda K. Lau (2005) “Managing Business with SAP: Planning, Implementation and Evaluation” (ISBN 1-59140-380-4), , pp.1-345
13. IBM study (2009), “Challenges for the automotive industry in an on demand environment” – pp 1-27
14. Timothy J. Sturgeon and Johannes Van Biesebroeck (2010) “Effects of the Crisis on the Automotive Industry in Developing Countries” WPS
5330, pp.1-31
15. Mckinsey (2012), Delivering large-scale IT projects on time, on budget, and on value, 2012, pp.1-11
Authors: R. Rajarajeswari, D. Suchitra, J. Vijay Krishna, Joydeep Das Gupta
Paper Title: Priority based Scheduling of Residential Users Devices in Smart Grid Including Waiting Time
Abstract: Demand side management (DSM) is an intiative taken by the utility to allow the consumer to optimize the
power demand. To curb the energy consumption at the consumer end DSMprograms are developed and implemented by
utility companies. The peak-to-average(PAR) load ratio on thecustomer side is reduced by reshaping the consumer’s
power demand from peak hour to base load period. Due to this the electric power consumed during peak hour is
reduced, by implementing dynamic pricing the the cost for power consumption is also decreased. DSM leads to
improve system efficiency, cost reduction, and increase system reliability.The usage of electricity during peak times
leads to increase in the price of energy usage which is a loss for both customers as well as for the utility companies. This
paper suggests a remedy for this inadequacy by means of minimizing the electricity payment cost by
consideringminimumwaiting time for each appliance. By rescheduling the loads to non-peak period, the PAR ratio of
80.
the demand curve reduces, further causing the cost to be minimum. Time-of-use (TOUP), Incline-block rate (IBR) and
Real-time pricing (RTP)arethe demand response strategy considered for a sample system which has both shiftable and 438-442
fixed devices. By implementing the load shifting algorithm, PAR ratio is minimized which results in reduction of stress
in the utility end during peak hours and a ample amount of cost saving .

Keywords: Demand Side Management (DSM), Waiting Time, Pricing Methodologies, Load Shifting, Priority based
Scheduling

References:
1. Mohsenian-Rad, Amir-Hamed, and Alberto Leon-Garcia. "Optimal residential load control with price prediction in real-time electricity pricing
environments." IEEE transactions on Smart Grid 1.2 (2010): 120-133.
2. Logenthiran, Thillainathan, Dipti Srinivasan, and Tan Zong Shun. "Demand side management in smart grid using heuristic optimization." IEEE
transactions on smart grid, (2012): 1244-1252.
3. Maharjan, Indra K." Demand side management: load management, load profiling, load shifting, residential and industrial consumer, energy audit,
reliability, urban, semi-urban and rural setting." LAP Lambert Academic Publ, 2010.
4. Burke, William J., and David M. Auslander. "Residential electricity auction with uniform pricing and cost constraints." North American Power
Symposium (NAPS), 2009. IEEE, 2009.
5. Yi, Peizhong, et al. "Real-time opportunistic scheduling for residential demand response." IEEE Transactions on smart grid 4.1 (2013): 227-234.
6. Mahmood, A., et al. "Home appliances coordination scheme for energy management (HACS4EM) using wireless sensor networks in smart
grids."Procedia Computer Science 32 (2014): 469-476.
7. Hassan, Naveed Ul, et al. "Demand shaping to achieve steady electricity consumption with load balancing in a smart grid." Innovative Smart Grid
Technologies (ISGT), 2013 IEEE PES. IEEE, 2013.
8. Mohsenian-Rad, Amir-Hamed, et al. "Optimal and autonomous incentive-based energy consumption scheduling algorithm for smart grid."
Innovative Smart Grid Technologies (ISGT), 2010. IEEE, 2010.
9. https://www.energy.gov/energysaver/estimating-appliance-and-home-electronic-energy-use,accessed on 25 December 2016.
10. https://www.easycalculation.com/physics/electromagnetism/power-consumption-table.php,accessed on 25 December 2016.
11. Jukka V. Paateron,y and Peter D. Lund."A model for generating household electricity load profiles."Advanced Energy Systems, Helsinki
University of Technology,International Journal Energy Res.,John Wiley And sons LTD,2006.
12. Luo Chuan and Abhisek Ukil, Senior Member, IEEE."Modeling and Validation of Electrical Load Profiling in Residential Buildings in
Singapore." IEEE Transactions on Power Systems,Volume: 30, Issue: 5, Sept. 2015.
13. W. Saad, Z. Han, V. Poor, and T. Baar, "Game-Theoretic Methods for the Smart Grid: An overview of micro-grid systems, demand-side
management, and smart grid communications," IEEE Signal Processing Magazine, vol. 29, no. 5, pp. 86-105, Sept. 2012.
14. P. Yang, G. Tang, and A. Nehorai, "A Game-Theoretic Approach for Optimal Time-of-Use Electricity Pricing," IEEE Transactions on Power
Systems, vol. 28, no. 2, pp. 884-892, May 2013.
15. Amir-Hamed Mohsenian-Radand Alberto Leon-Garcia." Optimal Residential Load Control withPrice Prediction in Real-TimeElectricity Pricing
Environments."IEEE Transactions on Smart Grid,Volume: 1, Issue: 2, Sept. 2010.
Authors: Jeffin James, R. Dhinesh, S. Balaji, J. Ajay Daniel
Paper Title: Remote Power Transmission Utilizing Class E-power Amplifying Device from Solar Input
Abstract: The electrical power transmission from the source to goal happens with no utilization of wires is known as
remote power transmission. Copper links and directing wires are dispensed with for remote exchange of electrical
vitality. Remote power transmission (WPT) has a wide scope of utilizations like charging of electric vehicles, Hybrid
autos, electronic gadgets and so on. Prior exchange of remote power has been accomplished for charged batteries or AC
source. In this paper the yield from the sun oriented board is taken as the contribution to the framework. DC-DC venture
up converter is been utilized since the sun based boards yield is little it must be ventured up to fitting qualities. The
ventured up dc voltage is given to the class-E speaker and after that changed over into high recurrence swaying signal.
This flag is further remotely exchanged utilizing a transformer. By accomplishing great attractive coupling that exists
between the exchange setup that is transmitter and recipient coil the power is been exchanged. Later the extension
rectifier circuit changes over the wavering sign into DC before it is encouraged to the load.
81.
Keywords: Solar, DC-DC Converter, Power Transmission, Wireless, Load.
443-445
References:
1. Qiangwang and Hong Li, “Research on the wireless power transmission system based on coupled magnetic resonances”, IEEE International
Conference 2011.
2. Q. Zhao and F. C. Lee, “High-efficiency, high step-up dc–dc converters,” IEEE Trans. Power Electron, vol. 18, no. 1, pp. 65-73, Jan. 2003.
3. R. J. Wai, C. Y. Lin, R. Y. Duan, and Y. R. Chang, “High-efficiency dc– dc converter with high voltage gain and reduced switch stress,” IEEE
Trans. Ind. Electron., vol. 54, no.1, pp. 354–364, Feb. 2007.
4. S. M. Chen, T. J. Liang, L. S. Yang, and J. F. Chen, “A cascaded high step-up dc–dc converter, applications, IEEE Trans Power Electron.,vol.26,
no. 4, pp. 1146–1153, Apr. 2011.
5. N. O. Sokal and A. D. Sokal, "Class E-A new class of high efficiency tuned single-ended switching power amplifiers," IEEE Journal of Solid-
State Circuits, vol. 10, pp. 168-176, 1975.
6. Kuo-Ching Tseng, Chi-Chih Huang, and Wei-YuanShih, “A High Step- Up converter with a Voltage Multiplier Module for a Photovoltaic
System”. IEEE transactions on Power electronics vol.28, no.6, june 2013.
7. T. Shizimu, K.Wada, and N.Nakamura, “Fly back type single phase utility interactive inverter with power pulsation decoupling of dc input for an
ac photovoltaic module system”, IEEE trans. Power electron., vol.25, no.5, pp.1264-1272, jan, 2006.
Authors: S. Subasangkari, P. Dhilipkumar, J. Dilli Srinivasan, K. Arulvendhan
Paper Title: Detection of Foreign Substances
Abstract: This paper deals with the reviews of various methods used for the detection of foreign substances. On
studying this paper one can easily come up with the best suitable method he/she needed for working in respective
sectors. The main focus of the paper is digital methods and not usual traditional methods. Here three different methods
are studied for the detection of foreign substances, Video image processing, online monitoring and MLP neural network
and SVM techniques.

Keywords: Real-Time Video Image Processing, 3D Scanning, CCD Image Sensor.


82.
References: 446-449
1. S. Imai, "Foreign Matter Contamination in Parenteral Products (1): Pharmaceutical Products Recalls and Pharmaceutical Affairs Law," PHARM
TECH JAPAN, Vol. 12, No. 3, pp. 341-349, 1996 (in Japanese).
2. S. Imai, "Foreign Matter Contamination in Parenteral Products (2): Contamination Control in Parenteral Products," PHARM TECH JAPAN, Vol.
12, No. 4, pp. 473-488, 1996 (in Japanese).
3. Akira Ishii, Takayuki Mizuta, and ShigehikoTodo” Detection of Foreign Substances Mixed in a Plastic Bottle of Medicinal Solution Using Real-
Time Video Image Processing”.
4. Juan Lu, Yao-nan Wang, Jie Zhang and Bo-wen Zhou” On-line Detection of Foreign Substances in Glass Bottles Filled with Transfusion Solution
through Computer Vision” Proceedings of the 2008 IEEE International Conference on Information and Automation June 20 -23, 2008.
5. S. Lin and T. Bin, “Reasons of transfusion reaction and its precaution,” Journal of Chinese Medicine Research, vol. 3, no. 8, August, 2003.
6. H. Grindinger, H. Neusser, N. Seidenader, and V. Wedershoven, “Product testing apparatus,” U. S. Patent 0,117,149, July 2, 2005.

83. Authors: Mrigank Rishav, Rittika Maity, Dipraj Ghosh, V.N. Ganesh, Sivakumar
Paper Title: Internet of thing based Smart Power Grid for Smart City
Abstract: Smart Grid and Internet of things (IOT) are the two technologies that has become highly developed in the
perspective of energy saving & as well as monitoring. Smart Grid is an excellent solution to optimize the energy
consumption & to provide continuous supply of energy throughout the city without any Blackouts while the IOT can be
a solution that offers consumers the convenience of having a real-time method to control & monitor the consumption of
energy. In this paper the authors propose the design of Smart Grid System based on IOT for smart city. In the present
time, the conventional electrical network system is outdated due to rapid growth of demand for the electrical energy.
The smart Grid can provide better efficiency for electricity consumption as well as its distribution. The smart meters
present inside the home of the consumers can monitor the loads individually. The data obtained from the smart meters
can be stored in the cloud of the consumer. Consumers of the electricity can continuously monitor the data of their
respective loads inside the house. We have also proposed Smart distribution of power to the load by turning the
appliances in the power saving mode with help of IOT if it is unnecessarily used for e.g Fridges are most of the time in
the ON condition & during winters their need is less but people tend to use so it can be turned to power saving mode &
its surplus energy can be stored. The surplus energy can be stored in devices such as supercapacitors to store for further
use. In this paper we have proposed a plan in which, the consumer of the house will get a limited plan of electricity just
like we have in our sim cards presently in India. The consumer of the house can utilize their energy upon their plans & if
they exceed their plans, they can either use energy from renewable sources such as solar or they can again recharge it.
This will increase the uses of more renewable resources & saving of electricity. In the city, Each Smart meter will be
given a unique identification key which will be registered with the Electricity boards. This ID will be used by the
consumer & it will be connected to IOT on the cloud. This ID on the cloud will store all the data of the respective
consumers. The data can be viewed by the consumers as well as the electricity boards so it can reduce a chance of
current theft & hence less chances of loss for the government. IOT will also help in detection of fault in the transmission
line with help of current sensors & voltage sensors installed in the line. Therefore, if any fault occurs in any phase out of 450-453
the 3 phases at a far distance, Then the exact location of the fault & the fault itself will be predetermined so it will be
easy to clear the fault. The sensor data will be continuously going to the cloud with the help of wifi -module & IOT. The
data is continuously monitored on the IOT Platforms such as Cayenne’s IOT. The loads can be also triggered through
IOT Platforms.

Keywords: Smart Grid, Internet of Things, Smart City, Smart Meter, Fault Monitoring, Cayenne’s IOT, Smart Load
Management.

References:
1. Power Grid corporation of India “Smart Grid Green Energy Corridor report”.
2. World Health Organization Report of Air Pollution released in Geneva.
3. A course in “Introduction to Smart Grid” by NPTEL.
4. Mohsenian-Rad. Hamed, “Introduction to Smart grid”, Department of Electrical & Computer Engineering Texas Tech University 2012.
5. Adi Candra Swastika,” IOT-Based Smart Grid System Based design for Smart Home” The 3rd International Conference on Wireless &
Telematics 2017.
6. M.Yun.B.Yuxin, ”Research on The Architecture and Key Technology of Internet of Things (IOT applied on smart grid),international conferences
on advances in energy engineering .
7. X.Wang, S.D.J. MCArthur, S.M.Strachan, J.D Kirkwod and B.Paisley “A Data Analytic approach to automatic fault diagnosis and prognosis for
distribution automation “ IEEE Transactions of Smart Grid ,Volume-9,November 2018.
8. B.Celik, R. Roche, D. Bouquain, and A. Miraoui, Decentralized Neighborhood Energy Management With Co-ordinated Smart Home Energy
Sharing, IEEE Transactions of Smart Grid ,Volume-9,November 2018.
9. Shady S. Refaat Texas A&M University at Qatar, Doha, Qatar Residential load management system for future smart energy environment in GCC
countries, 2015 First Workshop on Smart Grid and Renewable Energy (SGRE).
10. Qinghai Ou,Yan Zhen,Xiangzhen Li,Yiying Zhang,Lingkang Zeng, Application of Internet of Things in Smart Grid Power Transmission, 2012
Third Ftra International Conference on Mobile, Ubiquitous, and Intelligent Computing.
Authors: Priya Mishra, Karthiga Pandi, P. Srinivasan, M. Moovendan
Paper Title: Electric Bikes Over Fuel Bikes with the Help of ANFIS Model in India
Abstract: India is fairly a big country among all Asian countries, so as huge amount of population. And in upcoming
era pollution will also grow proportionally. Concerning about pollution caused by bikes will also increase. A survey
claimed that in upcoming years 80% of fuel vehicles will be replaced by electric vehicles. The use of electrical vehicles
to make India “pollution free”. There are many electrical bikes now on road to implement an idea claimed as pollution
free. Pollution free is not only the term comes under consideration but also the consumption of power. Increasing rate of
electric vehicles are having directly proportional relationship with more amount of power generation. The study of rate
of power consumption will help to have a big picture of how much amount of power should be more generated.

84. Keywords: Electric Bikes, Effect on Nature, Energy Consumption.


454-457
References:
1. William R. Cawthorne, Parviz Famouri, Jingdong Chen, Nigel N. Clark, Thomas I. Mc Daniel, Richard J. Atkinson, Subhash Nandkumar,
Christopher M. Atkinson, and Sorin Petreanu, "Development of a Linear Alternator-Engine for Hybrid Electric Vehicle Applications", IEEE
transactions on vehicular technology, vol. 48, no. 6, November 1999.
2. P. Brooking and J.R.Bumby, "An Integrated Engine- Generator Set With Power Electronic Interface For Hybrid Electric Vehicle Applications,"
Power lectronics, Machines and Drives Conference, No. 487, PP 16-18 April 2022.
3. SAKHARE, A.-DAVARI, A.-FELIACHI, A. : Fuzzy logic control of fuel cell for stand-alone and grid connection.
4. R. C. Green, L. Wang, and M. Alam, “The impact of plug-in hybrid electric vehicles on distribution networks: A review and outlook,” Renew.
Sustain. Energy Rev., vol. 15, no. 1, pp. 544–553, 2011.
5. W. Su, H. Eichi, W. Zeng, and M. Y. Chow, “A survey on the electrification of transportation in a smart grid environment,” IEEE Trans. Ind.
Informat., vol. 8, no. 1, pp. 1–10, Feb 2012.

85. Authors: R. Aarthi, S. Haritha, V.N. Ganesh, J. Ajay Daniel


Paper Title: Increasing Efficiency of Solar Panel Using Grid Connected Micro Inverters and Orientation
Abstract: The solar photovoltaic cell generated power is one of the major pollution free source of energy in the
present times. Upon using a single inverter for the solar panel system, the overall efficiency of the solar panel gets
affected. The cast of shadows on the solar panel is also a major concern for the reduction in efficiency. In order to
rectify these this paper concentrates on increasing the efficiency of the solar panel by providing individual grid
connected micro inverters and also orientation mechanism of the panel.

Keywords: Solar Panel, Grid Connected Micro Inverters, Tilting Mechanism.

References:
1. A Solar Power Generation System with a Seven-Level Inverter Jinn-Chang Wu, Member, IEEE, Chia-Wei Chou
2. Design and Control of Single-Phase Grid Connected Photovoltaic Microinverter with Reactive Power Support Capability Geon-Hong Min1 ,
Kyung-Hwan Lee1 , Jung-Ik Ha1* and Myong Hwan Kim2 1 Department of Electrical and Computer Engineering, Seoul National University,
Seoul, Republic of Korea 2 Solar System Development Team Solar R&D Lab, LG Electronics, Gumi, Republic of Korea *E-mail:
jungikha@snu.ac.kr
3. PV module fault diagnosis based on micro-converters and day-ahead forecast Sonia Leva, Senior Member, IEEE, Marco Mussetta, Senior
Member, IEEE and Emanuele Ogliari
4. Design and Analysis of a Multilevel Converter for Micro Distributed Generation System N. Rosli, M. F. M. Elias, N. A. Rahim UM Power
Energy Dedicated Advanced Centre (UMPEDAC) Level 4, Wisma R & D, University of Malaya Jalan Pantai Baharu, 59990 Kuala
Lumpur,Malaysia. DOI: 10.1109/ICIAS.2018.8540594
5. Grid-Connected GaN Solar Microinverter Sudip K. Mazumder1 , Abhijit Kulkarni2 , Ankit Gupta1 , Debanjan Chatterjee1 , and Nikhil Kumar1 1
University of Illinois at Chicago, Chicago, USA {mazumder, agupta70, dchatt, nkumar22}@uic.edu 2 Honeywell, Bengaluru, India 458-461
abhiekulkarni@outlook.com
6. PV module fault diagnosis based on micro-converters and day-ahead forecast Sonia Leva, Senior Member, IEEE, Marco Mussetta, Senior
Member, IEEE and Emanuele Ogliari
7. High Efficient Micro-Inverter with Soft-Switching Step-Up Converter and Single-Switch-Modulation Inverter Woo-Jun Cha, Yong-Won Cho,
Jung-Min Kwon, Member, IEEE and Bong-HwanKwon, Member IEEEDOI 10.1109/ TIE.2014. 2366718, IEEE Transactions on Industrial
Electronics
8. Solar Optiverter –A Novel Hybrid Approach to the Photovoltaic Module Level Power Electronics Dmitri Vinnikov, Senior Member, IEEE, Andrii
Chub, Member, IEEE, Elizaveta Liivik, Member, IEEE, Roman Kosenko, Student Member, IEEE and Oleksandr Korkh, Student Member, IEEE
DOI 10.1109/TIE.2018.2850036,
9. Conversion of Existing Inverter into Solar Inverter Jagruti N. Mahajan#1, Prof.Ashok M. Jain*2 K.K.Wagh Institute of Engineering Education &
Research Nashik 422003, India1jagruti201193@gmail.com 2amjain@kkwagh.edu.in
10. M. Calais, J. Myrzik, T. Spooner, and V. G. Agelidis, “Inverters for Single Phase Grid Connected Photovoltaic Systems—An Overview,” Proc.
IEEE PESC’02, vol. 2, 2002, pp. 1995–2000
11. Soeren Baekhoej Kjaer, John K. Pedersen and Frede Blaabjerg, “A Review of Single Phase Grid Connected Inverters for Photovoltaic Modules,”
IEEE Transaction on Industry Applications, vol. 41, No. 5, Sept-Oct 2005.
12. B. K. Hammad, R. H. Fouad, M. S. Ashhab, S. D. Nijmeh, M. Mohsen, A. Tamimi, “Adaptive Control of Solar Tracking System,” IET Science,
Measurement and Technology, vol. 8, pp. 426-431, 2014.
13. M. S. Ashhab, H. Kaylani and A. Abdallah, “PV solar system feasibility study,” Energy Conversion and Management, vol. 65, pp. 777-782, 2013.
14. R. H. Fouad, M. S. Ashhab, A. Mukattash and S. Idwan, “Simulation and energy management of an experimental solar system through adaptive
neural networks,” IET Science, Measurement and Technology, vol. 6, pp. 427-431, 2012.
15. M. A. Salam, Fundamentals of Power Systems, Alpha Science Oxford, UK International Ltd., 2009.
16. A High-Efficiency Resonant Solar Micro-Inverter Madhuwanti Joshi, Ehab Shoubaki, Ruba Amarin, Bruce.
Authors: V. Sai Krishna, A. Nithya Kalyani
Paper Title: Prediction of Cardiac Arrhythmia Using Artificial Neural Network
Abstract: Cardiac Arrhythmia is a condition in which the heartbeat is abnormal. Different medical data mining and
machine learning techniques are being implemented to extract valuable information regarding heart disease prediction.
But, the accuracy of the desired results is not yet satisfactory. The lack of specialist doctors and increase in wrong
diagnosed cases has necessitated the need for building an efficient heart disease detection system. The aim of this paper
is to classify the ECG signal data of a person into different types of Arrhythmia such as Bradycardia, Tachycardia etc.
After appropriate feature selection, the plan is to solve this problem by developing a heart attack prediction system using
Deep learning techniques, such as Recurrent Neural Networks to predict the likely possibilities of Cardiac Arrhythmia in
a patient. This paper presents a survey of recent techniques for prediction of Cardiac Arrhythmia and their
methodologies.

Keywords: Cardiac Arrhythmia, ECG, Deep Learning, Recurrent Neural Network.

References:
86. 1. Arrhythmia: Causes, symptoms, types, and treatment. Christian Nordqvist, Medical News Today
2. D. Benitez, P.A. Gaydecki, A. Zaidi, A.P. Fitzpatrick, The use of the Hilbert transform in ECG signal analysis, Computers in Biology and
462-466
Medicine 31 (2001) 399–406
3. Pranv Rajpurkar, Awni Y. Hannun, Masoumeh, Codie Bourn, Andrew Y. Ng, Cardiologist-Level Arrhythmia Detection with Convolutional
Neural Networks, IEEE Transactions on Biomedical Engineering, Vol. 55, No. 1, Pp. 108-118, July 2017
4. Mr. Deshmukh Rohan, Dr. A. J. Patil, Layered Approach for ECG beat classification utilizing Neural Network, International Journal of
Engineering Research and Applications (IJERA) Vol. 2, Issue 6, November- December 2012, pp.1495-1500 1495
5. Latha Parthiban, R. Subramanian, Intelligent Heart Disease Prediction System using CANFIS and Genetic Algorithm, International Journal of
Biological and Medical Sciences 3:3 2008
6. Maedeh Kiani Sarkalehm, Asadollah Shahbahrami, Classification of ECG Arrhythmias using Discrete Wavelet Transform and Neural Networks,
International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.1, February 2012
7. Sean Franklin, Joseph Wallcave. Cardiac Condition Detection using Artificial Neural Networks, Senior Project Electrical Engineering
Department, California Polytechnic State University, San Luis Obispo, June 2013.
8. Mohd Khalid Awang and Fadzilah Siraj. Utilization of an Artificial Neural Network in the Prediction of Heart Disease, International Journal of
Bio-Science and Bio-Technology Vol. 5, No. 4, August, 2013
9. Argyro Kampouraki, George Manis, and Christophoros Nikou, Member, IEEE, Heartbeat Time Series Classification with Support Vector
Machines, IEEE Transactions on Information Technology In Biomedicine, Vol. 13, No. 4, July 2009
10. Ali Sadr, Najmeh Mohsenifar, Raziyeh Sadat Okhovat. Comparison of MLP and RBF neural networks for Prediction of ECG Signals,
International Journal of Computer Science and Network Security (IJCSNS), VOL.11 No.11, pp, 124-128, November 2011
11. Mehmet Engin. ECG beat classification using neuro-fuzzy network, Elsevier, Pattern Recognition Letters 25, 1715–1722, 2004.
12. Yüksel Özbay and Bekir Karlik. A Recognition of ECG Arrhythmias Using Artificial Neural Networks, Proceedings – 23rd Annual Conference –
IEEE/EMBS Oct.25-28, 2001, Istanbul, Turkey.
13. Prathibhamol Cp, Anjana Suresh, Gopika Suresh. Prediction of Cardiac Arrhythmia type using Clustering and Regression Approach (P-CA-
CRA). 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
14. Vasu Gupta, Sharan Srinivasan, Sneha S Kudli. Prediction and Classification of Cardiac Arrhythmia.
15. Nachiket Tapas, Tushar Lone, Damodar Reddy, Venkatanaresh kuppili. Prediction of cardiac arrest recurrence using ensemble classifiers, Indian
Academy of Sciences, July 2017.
16. Yildirim, Ö., Pławiak, P., Tan, R.-S., & Acharya, U. R. Arrhythmia detection using deep convolutional neural network with long duration ECG
signals. Computers in Biology and Medicine – 2018.
17. Barhatte, A. S., Ghongade, R., & Thakare, A. S. QRS complex detection and arrhythmia classification using SVM. 2015 Communication, Control
and Intelligent Systems (CCIS).
18. J. Lee, K. Jeong, J. Yoon, M. Lee, A simple real-time QRS detection algorithm, Proceedings of the 18th Annual International Conference of the
IEEE Engineering in Medicine and Biology Society, Amsterdam, 1996.
19. A. Ruha, S. Sallinen, S. Nissila, A real-time microprocessor QRS detector system with a 1ms timing accuracy for the measurement of ambulatory
HRV, IEEE Trans. Biomed. Eng. 44 (1997) 159–167.
20. Diederik P. Kingma, Jimmy Lei Ba, Adam: A Method for Stochastic Optimization, Arxiv Preprint Arxiv:1412.6980v9, December 2014.
21. Jiapu Pan, Willis J. Tompkins, A Real-Time QRS Detection Algorithm, IEEE Transactions on Biomedical Engineering, vol. BME-32, pp. 230-
236, March 1985.
22. Sepp Hochreiter, Jurgen Schmidhuber, Long Short-Term Memory, Neural Computation, vol. 9, no. 8, pp. 1735-1780, 1997.
23. Jeffrey L. Elman, Finding Structure in Time, Cognitive Science, San Diego, 1990, pp. 179-211.
24. Alex Graves, Supervised Sequence Labelling with Recurrent Neural Network, Arxiv Preprint Arxiv: 1308.0850v5, June 2014.
25. Matthew D. Zeiler, Adadelta: An Adaptive Learning Rate Method, Arxiv Preprint Arxiv:1212.5701, December 2012.
26. Srivastava, Nitish, Hinton, Geoffrey E, Krizhevsky, Alex, Sutskever, Ilya, and Salakhutdinov, Ruslan. Dropout: a simple way to prevent neural
networks from overfitting. Journal of Machine Learning Research, 15(1): 1929–1958, 2014.
27. Turakhia, Mintu P, Hoang, Donald D, Zimetbaum, Peter, Miller, Jared D, Froelicher, Victor F, Kumar, Uday N, Xu, Xiangyan, Yang, Felix, and
Heidenreich, Paul A. Diagnostic utility of a novel leadless arrhythmia monitoring device. The American journal of cardiology, 112 (4):520–524,
2013.
28. Laguna, Pablo, Mark, Roger G, Goldberg, A, and Moody, George B. A database for evaluation of algorithms for measurement of qt and other
waveform intervals in the ecg. In Computers in Cardiology 1997, pp. 673–676. IEEE, 1997.
29. Li, Cuiwei, Zheng, Chongxun, and Tai, Changfeng. Detection of ECG characteristic points using wavelet transforms. IEEE Transactions on
biomedical Engineering, 42(1):21–28, 1995.
30. Mart´ınez, Juan Pablo, Almeida, Rute, Olmos, Salvador, Rocha, Ana Paula, and Laguna, Pablo. A wavelet based ECG delineator: evaluation on
standard databases. IEEE Transactions on biomedical engineering, 51(4): 570–581, 2004.
31. Melo, SL, Caloba, LP, and Nadal, J. Arrhythmia analysis using artificial neural network and decimated electrocardiographic data. In Computers in
Cardiology 2000, pp. 73–76. IEEE, 2000.
32. Moody, George B and Mark, Roger G. A new method for detecting atrial fibrillation using RR intervals. Computers in Cardiology, 10(1):227–
230, 1983.
33. Moody, George B and Mark, Roger G. The impact of the MIT-BIH arrhythmia database. IEEE Engineering in Medicine and Biology Magazine,
20(3):45–50, 2001.
34. Pan, Jiapu and Tompkins, Willis J. A real-time QRS detection algorithm. IEEE transactions on biomedical engineering, (3):230–236, 1985.
35. Sainath, Tara N, Mohamed, Abdel-rahman, Kingsbury, Brian, and Ramabhadran, Bhuvana. Deep convolutional neural networks for lvcsr. In
Acoustics, speech and signal processing (ICASSP), 2013 IEEE international conference on, pp. 8614–8618. IEEE, 2013.
36. Vykintas Maknickas, Algirdas Maknickas, Atrial Fibrillation Classification Using QRS Complex Features and LSTM, Computing in Cardiology,
vol. 44, 2017.
37. Ozal Yildirim, A Novel Wavelet Sequences Based on Deep Bidirectional LSTM Network Model for ECG Signal Classification, Computers in
Biology and Medicine, pp. 189-202, 2018.
38. Saleha Samad, Shoab A. Khan, Anam Haq, Amna Riaz, Classification of Arrhythmia, International Journal of Electrical Energy, vol. 2, pp. 57-
61, March 2014.
39. Albert Haque, Cardiac Dysrhythmia Detection with GPU Accelerated Neural Networks, Stanford University, Stanford, 2014.
40. Chenshuang Zhang, Guijin Wang, Jingwei Zhao, Pengfei Gao, Jianping Lin, Huazhong Yang, Patient-Specific ECG Classification Based on
Recurrent Neural Networks and Clustering Technique, IASTED International Conference on Biomedical Engineering, Innsbruck, 2017.

Authors: A. Dinesh Babu, J. Akash, Vishnu Varadhan Janardhanan


Paper Title: Data Integrity Maintenance Using AND Logic Feed based Low Power SRAM Cell
Abstract: Continuous Nano-Scaling of transistors, coupled with increasing demand for ultra-low power applications
where expanded system operation time under limited energy resource constraints increments the susceptibility of VLSI
circuits designs to soft errors. The robustness and energy efficiency are vital design parameters for Body Sensor Nodes,
intelligent wearable, Internet of Things and space mission projects. In contrast for graphics (GPU) processors, servers,
high-end applications and general purpose processors, energy is consumed for higher performance. To meet the
increasing demand for larger embedded memories like SRAM in highly integrated SoCs to support a wide dimensions
of functions. As a result, further strengthening the design constraints on performance, energy, and power is needed. In
general SRAMs dominates as being a basic foundational building block for such memory arrays. Any minor
modifications in the fundamental unit will have significant impact in the overall design. This work presents a AND gate
feed based SRAM cell, which significantly upgrades read and write static noise margin (SNM) and utilizes low power.
Simulation was done using 180nm technology library file of Cadence virtuoso design software. The final results shows
87. how the cell achieves the lowest leakage power dissipation among the other cells in the existing state of art designs.
Investigations are also done in terms of process voltage, average power variations etc. 467-473

Index Terms: Static Random Access Memory, Static Noise Margin, Silicon on Chip, Internet of Things.

References:
1. Sayeed Ahmad, Mohit Kumar Gupta, Naushad Alam, and Mohd. Hasan, “Single-Ended Schmitt-Trigger-Based Robust Low-Power SRAM Cell”,
IEEE Transactions on very large scale integration (VLSI) systems, vol. 24. 8, august 2016.
2. Ming-Hsien Tu: ‘Single-Ended Sub threshold SRAM with Asymmetrical write/Read -Assit’, 12 December 2010 IEEE regular papers, volume 57.
12 December 2010
3. J. P. Kulkarni and K. Roy, Ultra voltage process variation tolerant Schmitt trigger based SRAM design, IEEE paper volume 87, 5th October 2013
4. J. P. Kulkarni, K. Kim, and K. Roy, “A 160 mV robust Schmitt trigger based sub threshold SRAM,IEEE J. Solid-State Circuits, vol. 42, no. 10,
pp. 2303–2313, ,” Oct. 2007
5. L. Wen, Z. Li, and Y. Li, “Single-ended, robust 8T SRAM cell for low-voltage operation,” Microelectronic. J., vol. 44, no. 8, pp. 718–728.
6. ] S. Yang, W. Wolf, W. Wang, N. Vijay Krishnan, and Y. Xie, “Low-leakage robust SRAM cell design for sub-100 nm technologies,” in Proc.
ASP-DAC, , pp. 539–544, 2005
7. http://ptm.asu.edu/, accessed Mar. 2015.
8. J. P. Kulkarni and K. Roy, “Ultralow-voltage process-variation-tolerant Schmitt-trigger-based SRAM design,” IEEE Trans. Very Large Scale
Integration. (VLSI) Syst., vol. 20, no. 2, pp. 319–332, Feb. 2012.
9. G. Pasandi and S. M. Fakhraie, “A 256-kb 9T near-threshold SRAM with 1 k cells per bit line and enhanced write and read operations,” IEEE
Trans. Very Large Scale Integration. (VLSI) Syst., vol. 23, no. 11, pp. 2438–2446, Nov. 2015.
10. R. Vaddi, S. Dasgupta, and R. P. Agarwal, “Device and circuit co-design robustness studies in the sub threshold logic for ultralow-power
applications for 32 nm CMOS,” IEEE Trans. Electron Devices, volume. 57, no. 3, pp. 654–664, Mar. 2010.
11. E. Seevinck, F. J. List, and J. Lohstroh, “Static-noise margin analysis of MOS SRAM cells,” IEEE J. Solid-State Circuits, volume. 22, no. 5,pp.
748–754, Oct. 1987.
12. H. Qiu, T. Mizutani, T. Saraya, and T. Hiramoto, “Comparison and statistical analysis of four write stability metrics in bulk CMOS static random
access memory cells,” Jpn. J. Appl. Phys., volume. 54, no. 4S,
13. Y.-W. Chiu et al., “40 nm bit-interleaving 12T sub threshold SRAM with data-aware write-assist,” IEEE Trans. Circuits Syst. I, Reg. Papers,
volume. 61, no. 9, publication. 2578–2585, Sep. 2014.
14. K. Takeda et al., “A read-static-noise-margin-free SRAM cell for low-VDD and high-speed applications,” IEEE J. Solid-State Circuits, volume.
41, no. 1, pp. 113–121, Jan. 2006.
15. R. E. Aly and M. A. Bayoumi, “Low-power cache design using 7T SRAM cell,” IEEE Trans. Circuits Syst. II, Exp. Briefs, vol. 54,no. 4, pp. 318–
322, Apr. 2007.
16. S. Lin, Y.-B. Kim, and F. Lombardi, “Design and analysis of a 32 nm PVT tolerant CMOS SRAM cell for low leakage and high stability,
“Integration , VLSI J., vol. 43, no. 2, pp. 176–187, 2010.
17. B. H. Calhoun and A. P. Chandrakasan, “A 256-kb 65-nm sub-threshold SRAM design for ultra-low-voltage operation,” IEEE J. Solid-State
Circuits, vol. 42, no. 3, pp. 680–688, Mar. 2007.
18. A. Feki et al., “Sub-threshold 10T SRAM bit cell with read/write XY selection,” Solid-State Electron., vol. 106, no. 4, pp. 1–11, 2015.

Authors: Dipraj Ghosh, Mohammad Aheraz Bin Muslim, J. Ajay Daniel, V.N. Ganesh
Paper Title: Integration of Renewable Resources for Electric Vehicles and Implementation of Artificial Intelligence
Abstract: Renewable energy in electric vehicles are the current research in the market. The implementation of artificial
intelligence in the electric vehicles enhances the control and gives a better experience. Apart from that the interfacing of
artificial intelligence system in the integeration of renewable resources for electric vehicles provides a better life security
to the Electric Vehicles (Evs).
In the above proposed idea of integeration of renewable resources it has a prospective of energy saving with a cleaner
environment.
In this paper the authors have proposed the model of integeration of renewable resources for electric vehicles and
implementation of artificial intelligence in the electric vehicles , it contains simulation of the solar power plant and wind
turbines which shows us the state of energy production and utilisation.
It also includes the synchronisation of both the powers coming from the solar plant and the diesel generating station.
Power synchronisation is a very important factor and a vital part of the EV grid.
The proposed system will help us to improve the working of the Electric Vehicles (Evs) and provide an alternative source
for energy for charging of electric vehicles other than non-renewable source of energy.

Keywords: Integeration, Artificial Intelligence, Renewable Resources, Electric Vehicles.

References:
1. According to India pollution levels air Delhi health report in VOX. [online available] https://www.vox.com /2018/5/ 8/17316978/india-pollution-
levels-air-delhi-health
2. National crime records bureau Report.[online available] http://ncrb.gov.in
3. Air population in India From, [online available] Wikipedia.https://en.wikipedia.org/wiki/Air_pollution_in_ India.
4. Vehicular Pollution in India (2118 Words) Article shared by : Smriti [online available] Chand. http: //www.
yourarticlelibrary.com/pollution/vehicular-pollution-in-india-2118-words/19796
5. Boris V. Lukutin Department of Industrial Electric Power Supply, Institute of Power Engineering, National Research Tomsk Polytechnic
88. University, Russia,Tuning the regulators of wind-diesel power plant operating on the DC-bus, Published in: 2014 14th International Conference on
Environment and Electrical Engineering.
474-478
6. Mohammad Kebriaei Department of electrical and computer, University of Kashan, Kashan, Iran,Hybrid electric vehicles: An overview , Published
in: 2015 International Conference on Connected Vehicles and Expo (ICCVE).
7. S.V. Mitrofanov Faculty of Electrical Power Engineering, Orenburg State University, Orenburg, Russi, Simulation Model of Autonomous Solar
Power Plant with Dual-Axis Solar Tracker, Published in: 2018 International Ural Conference on Green Energy (UralCon) .
8. Abu Mohammad Osman Haruni Centre for Renewable Energy and Power Systems, School of Engineering, University of Tasmania Hobart, 7001,
Australia, Voltage and frequency stabilisation of wind-diesel hybrid remote area power systems, Published in: 2009 Australasian Universities
Power Engineering Conference .
9. Jing Zhang Beijing Electric Vehicle Charging/Battery Swap Engineering and Technology Research Center, China Electric Power Research Institute
Co. Ltd, Beijing, 100192, China ,A Hierarchical Distributed Energy Management for Multiple PV-Based EV Charging Stations, Published in:
IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society.
10. V. Sreedhar GITAM College of Engineering, Visakhapatnam, Plug-In Hybrid Electric Vehicles with Full Performance, Published in: 2006 IEEE
Conference on Electric and Hybrid Vehicles .
11. D.Y. Liu Department of Power Engineering, Hohai University, Nanjing 210098, Jiangsu Province, China, Investigation and analysis on the
combined operation of solar thermal power and conventional thermal power, Published in: 2009 International Conference on Sustainable Power
Generation and Supply.
12. Kristina Berzina Faculty of Power and Electrical, Riga Technical University, Riga, Latvia, Mathematical Modelling of the Synchronization Process
in Autonomous Power Supply System with Renewable Energy Sources, Published in: 2018 IEEE International Conference on Environment and
Electrical Engineering and 2018 IEEE Industrial and Commercial Power Systems Europe (EEEIC / I&CPS Europe) .
13. R.S. Balog Dept. of Electr. & Comput. Eng., Univ. of Illinois, Urbana, IL, USA., Commutation technique for high-frequency link cyclo converter
based on state-Machine control, Published in: IEEE Power Electronics Letters (Volume: 3, Issue: 3, Sept. 2005 ).
14. Hisham A. Othman Petra Solar, Inc, The economic opportunity of distributed smart solar systems, Published in: 2011 IEEE PES Conference on
Innovative Smart Grid Technologies - Middle East.
15. Sabir Messalti Electrical Engineering Department, Faculty of Technology, University of M'sila, Algeria, A new neural networks MPPT controller
for PV systems, Published in: IREC2015 The Sixth International Renewable Energy Congress .
16. Hugo Andres Macias Ferro Department of Electronics and telecommunications Engineering Universidad Autónoma de Occidente Cali, Colombia,
Low cost off-grid solar PV and led lightning system, Published in: 2014 IEEE ANDESCON.
17. Helmut Weiss Institute of Electrical Engineering, Montanun iversitaet Leoben, Leoben, Austria,Large lithium-ion battery-powered electric vehicles
— From idea to reality, Published in: 2018 ELEKTRO.
18. Mahmoud Al Ahmad Electrical Engineering Department / College of Engineering, United Arab Emirates University, P.O. Box 15551, Al-Ain,
UAE, Capacitance force piezoelectric extraction, Published in: 2015 Joint IEEE International Symposium on the Applications of Ferroelectric
(ISAF), International Symposium on Integrated Functionalities (ISIF), and Piezoelectric Force Microscopy Workshop (PFM).
19. Jiang Du School of computer science and technology, Chongqing, University of Posts and Telecommunications, 400065, China,A study of
information security for M2M of IOT, Published in: 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)
20. Xia Zhu Key Laboratory of Universal Wireless Communications (BUPT), Ministry of Education, China, Realization of a new random access
scheme for resource efficiency in M2M communications, Published in: 2016 19th International Symposium on Wireless Personal Multimedia
Communications (WPMC) .

Authors: Soumyajit Mitra, Priya Mishra, J. Ajay Daniel, S. Balaji


Paper Title: Smart Light for Home with Automatic Direction and Intensity Adjustment Using Arduino
Abstract: In this paper the idea of adaptive smart lighting control system with human motion tracking has been
demonstrated. The system uses a series of sensors to track human movement in a confined space and focus more light in
that direction. Also the system has the ability to adapt the intensity and number of lights based on number of people in the
room. The lighting system also has the ability to adapt the intensity of light based on the availability of natural light. The
idea behind this system is to provide sufficient lighting to room where a human is detected, while automatically adjusting
the intensity based on natural light and number of people for optimum power consumption and will reduce power quality
issues.

Keywords: Human Movement, Arduino, Optimum Power Consumption, Automatic Direction, Intensity, Smart Light.

References:
1. Burhanuddin Bharmal, Aniruddha Shahapurkar , Akshay Aswalkar, “Automatic Home Lighting solutions using Human Detection, Sunlight
Intensity and Room Temperature”, International Research Journal of Engineering and Technology (IRJET), Volume: 04 Issue: 06, June -2017.
2. Omveer Singh, Tushar Singh Sisodia, “ Solar LED Street Light System with Automatic Scheme”, International Conference on Energy,
Communication, Data Analytics and Soft Computing, IEEE, 2017.
3. Makkar, Deepak & Syal, Poonam. (2017). Simulation of Intelligent Room Lighting Illuminance Control. 1-4. 10.1109/ICCIC.2017.8524356.
4. Asadullah, Muhammad & Ullah, Khalil. (2017). Smart home automation system using Bluetooth technology. 10.1109/ICIEECT.2017.7916544.
89. 5. Govindraj, Vignesh & Sathiyanarayanan, Mithileysh & Abubakar, Babangida.(2017). Customary homes to smart homes using Internet of Things
(IoT) and mobile application.10591063.10.1109/SmartTechCon.2017.835852. 479-484
6. Gourab Das, “An intelligent method for optimizing the street-light-intensity”, 2018 2nd International Conference on Electronics, Materials
Engineering & Nano-Technology (IEMENTech).
7. Aldahoul, Nouar & Sabri, Aznul & Mansoor, Ali. (2018). Real-Time Human Detection for Aerial Captured Video Sequences via Deep Models.
Computational Intelligence and Neuroscience. 2018. 1-14. 10.1155/2018/1639561.
8. Nyein Khine, San & Tun, Zaw. (2018). Sensor Analysis and Application of Arduino based Temperature and Light Intensity Control for Smart
Home System. International Journal of Scientific and Research Publications (IJSRP). 8. 10.29322/IJSRP.8.6.2018.p7813.
9. Debata, Suchismita & Mantoliya, Rupa & Sahithi, Veena & Ratnam Kolluru, Venkata. (2018). Implementation of IoT based smart street light
intensity control system using IR and LDR sensors. International Journal of Engineering & Technology. 7. 316. 10.14419/ijet.v7i2.7.10605.
10. Mediterranean Journal of Basic and Applied Sciences (MJBAS) (Peer Reviewed International Journal), Volume 2, Issue 4, Pages 35-38, Oct-Dec
2018 35 | P a g e ISSN (Online): 2581-5059 Website: www.mjbas.com Microcontroller Based Automatic Room Lighting System Dr.Sreeja Mole
S.S., K.Ram Prasad, V.Krishna Veni, M.Swathi, L.Soumya.
11. Mangesh Nikose, Krutika Gaikwad, Priyanka Gamne, Aaishwarya Bodke(2018), A Survey on Bidirectional Visitor Counter with Automaticlight
and Fan Control for Room, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, ISSN (Online):
2278 – 8875.
12. Vigil, Antony. (2018). A REVIEW ON RC-HOME AUTOMATION USING LDR AND IR SENSORS. International Journal of Pure and Applied
Mathematics, Volume 118 No. 20 2018, 3555-3560.
13. Sasikumar, Aravind. (2015). Voice Controlled Smart Home. International Journal of Emerging Technology and Advanced Engineering (IJETAE). ,
ISSN: 2320-2084.
14. S, Suresh & Anusha, H.N.S. & Rajath, T & Soundarya, P & Vudatha, S.V.Prathyusha. (2016). Automatic lighting and Control System For
Classroom. 1-6.

Authors: T. Kripalakshmi, T. Deepa


Paper Title: Research on Contact and Non-Contact Power Transfer Methods Discussed for Transport Applications
Abstract: The world of automation has already being into existence for prolong period which results in various
researches and industries to develop commercial products. Power is extracted from the source and supplied through
cables to various loads for numerous applications. Transfer of Power through a conductor and medium is called contact
power transfer (CPT) and transfer of power without a conductor and free space medium is called as non-contact power
transfer (N-CPT). In this paper a complete review of power transfer with its evolution to its deployment to new transfer
methods in present existence will be discussed. The applications will include battery load vehicles and to supply the
direct current (DC) power to the battery load effectively. The paper will also give a contrast and hybridization idea of two
or more power transfer possibilities in literature.

Keywords: Magnetic Resonance Coupling, Separated Coils, Dynamic Charging, Electric Resonance, Quasi Dynamic,
90. Conductive Charging.
485-492
References:
1. Nataly Bañol Arias; Seyedmostafa Hashemi et.al," Distribution System Services Provided by Electric Vehicles: Recent Status, Challenges, and
Future Prospects", IEEE Transactions on Intelligent Transportation Systems, pp. 1-20, 2019.
2. Aqueel Ahmad, Mohammad Saad Alam and Rakan Chabaan, "A Comprehensive Review of Wireless Charging Technologies for Electric
Vehicles", IEEE Transactions on Transportation Electrification, vol. 4, no. 1, March 2018.
3. Siqi Li and Chunting Chris Mi," Wireless Power Transfer for Electric Vehicle Applications", IEEE Journal of Emerging and Selected Topics in
Power Electronics, VOL. 3, NO. 1, March 2015.
4. Alireza Khalighand Serkan Dusmez, "Comprehensive Topological Analysis of Conductive and Inductive Charging Solutions for Plug-In Electric
Vehicles ", IEEE Transactions on Vehicular Technology, Vol. 61, no. 8, October. 2012.
5. Taoyong Li; Jing Zhang et.al, "An Optimal Design and Analysis of A Hybrid Power Charging Station for Electric Vehicles Considering
Uncertainties", IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society, pp. 5147-5152,Oct. 2018.
6. Luke Hutchinson; Ben Waterson et.al, "Potential of wireless power transfer for dynamic charging of electric vehicles", IET Intell. Transp. Syst,
Vol. 13, pp. 3-12, July2018.
7. www.testla.com.
8. www.evtown.org.
9. Sharanya Jaganathan; Wenzhong Gao, “Battery charging power electronics converter and control for plug-in hybrid electric vehicle”, IEEE
Vehicle, Power and Propulsion Conference, pp 440-447, September 2009.
10. Siddhant Kumar, Adil Usman, “A Review of Converter Topologies for Battery Charging Applications in Plug-in Hybrid ElectricVehicles", IEEE
Industry Applications Society Annual Meeting, pp.1-9, September 2018.
11. T.Kripalakshmi; R. Ramaprabha, "Effect of Coupled Inductor on Wireless Power Transmission for Electric Vehicle Charging", 4th International
Conference on Electrical Energy Systems, pp.328-332, February 2018.
12. Staffan Norrga, “Experimental Study of a Soft-Switched Isolated Bidirectional AC–DC Converter without Auxiliary Circuit," IEEE Transactions
On Power Electronics, Vol. 21, no. 6, November 2006.
13. Behnam Koushk et.al, “A bi-directional AC-DC converter for electric vehicle with no electrolytic capacitor”, IEEE 7th International Symposium on
Power Electronics for Distributed Generation Systems, pp.1-8,June 2016.
14. K.Y. Lee Y.S. Lai ,”Novel circuit design for two-stage AC/DC converter to meet standby power regulations”,IET Power Electron., Vol. 2, pp. 625–
634,November 2008.
15. K. A. Chinmaya, G. K. Singh "A Plug-in Electric Vehicle (PEV) with Compact bidirectional cuk converter and Sturdier Induction motor drive”,
Annual Conference of the IEEE Industrial Electronics Society, pp.937-942, 2018.
16. M.Chinthavali et al., ”Isolated Wired and Wireless Battery Charger with Integrated Boost Converter for PEV Applications”, IEEE Energy
Conversion Congress and Exposition, pp.607-614, September 2015.
17. Haoyu Wang, Alireza Khaligh, ”Interleaved SEPIC PFC Converter Using Coupled Inductors in PEV Battery Charging Applications”,IEEE Applied
Power Electronics Conference and Exposition, pp. 586-591, March 2015.
18. Ankit Kumar Singh et.al,”A new two-stage converter with reduction of DC-link capacitor for plug-in electric vehicle battery charger”, International
Conference on Computational Intelligence & Communication Technology , pp.1-6,2017.
19. Zhiqing Li and Haoyu Wang, “Comparative Analysis of High Step-down Ratio Isolated DC/DC Topologies in PEV Applications”, IEEE Applied
Power Electronics Conference and Exposition,pp.1329 – 1335, March 2016.
20. A. Jimenez and N. Garcia,”Power Flow Modeling and Analysis of Voltage Source Converter-Based Plug-in Electric Vehicles”, IEEE Power and
Energy Society general meeting, pp.1-6, 2011.
21. Hiroshi Toromural et.al,”Biological effects of High-power Microwave Power Transfer for Electric Vehicle”, IEEE Wireless Power Transfer
Conference,pp.1-3,2016.
22. Naoki Shinohara and Naoki Kamiyoshikawa, “Study of Flat Beam in Near-field for Beam-Type Wireless Power Transfer via Microwaves”,
European Conference on Antennas and Propagation, pp.780-782, 2017.
23. Naoki Shinohara et.al, “Mid-Distance Wireless Power Transmission forElectric Truck via Microwaves”, Proceedings of International Symposium
on electromagnetic theory”, pp.841-843, 2013.
24. Xiaodong Liang and Muhammad Sifatul Alam Chowdhury, ”Emerging Wireless Charging Systems for Electric Vehicles – Achieving High Power
Transfer Efficiency: A Review”, IEEE Industry Applications Society Annual Meeting, 2018.
25. Naoki Shinohara et.al, ”Wireless Charging for Electric Vehicle with Microwaves”, International Electric Drives Production Conference, pp.1-4,
October 2013.
26. Kang-Rong Li et.al, ”Design of 2.45GHz Microwave Wireless Power Transfer System for Battery Charging Applications”, Progress in
Electromagnetics Research Symposium, pp.2417-2423, November 2017.
27. Sung-Roc Jang et.al,” Design of High-efficiency Soft-switching Converters for High-power Microwave Generation”, Journal of the Korean
Physical Society, Vol. 59, No. 6,pp. 3688-3693,December 2011.
28. Nourdeen A. Abodhir et.al,” Design and Implementation of Magnetron Power Supply and Emulator”,
29. Jianliang Li, “Research progress of wireless power transmission technology and related problems”, Applied Physics conference proceedings, pp.
090023-1 – 090023-5, March 2017.
30. Zicheng Bia, ”Life cycle assessment and tempo-spatial optimization of deploying dynamic wireless charging technology for electric
cars”,Transport. Res. C: Emerging Technologies, Vol.100, pp.53-67, 2019.
31. Young Jae Jang,”Survey of the operation and system study on wireless charging electric vehicle systems”,Transport. Res. C: Emerging
technologies, Vol.95, pp. 844-866, 2018.
32. Johnson I. Agbinya and Nagi F. Ali Mohamed,”Design and study of multi-dimensional wireless power transfer transmission systems and
architectures”, International Journal of Power and Energy Systems, Vol.63, pp. 1047-1056, December 2014.
33. Giulia Di Capua et.al, “Power and efficiency analysis of high-frequency Wireless Power Transfer Systems”, International Journal of Power and
Energy Systems, Vol.84, pp. 124-134, June 2016.
34. Chirag Panchal et.al,” Review of static and dynamic wireless electric vehicle charging system “, International Journal of Energy science and
Technology, Vol.21, no.5, pp. 922-937, October 2018.
35. Zicheng Bi et.al, “A review of wireless power transfer for electric vehicles: Prospects to enhance sustainable mobility”, International Journal of
Applied Energy, Vol.179,pp. 413-425, October 2016.
36. Young DaeKo, “An efficient integration of the genetic algorithm and the reinforcement learning for optimal deployment of the wireless charging
electric tram system”, International journal of computers and industrial engineering, Vol. 128,pp. 851-860, February 2019.
37. Le-Giang Tran et.al, “A compact wireless power transfer system at 915 MHz with supercapacitor for optogenetics applications”, International
Journal of Sensors and Actuators, Vol.285, pp. 386-394, November 2018.
38. Longzhao Sun et.al, “A review of recent trends in wireless power transfer technology and its applications in electric vehicle wireless charging”,
International Journal of Renewable and Sustainable Energy Reviews, Vol.91, pp. 490-503,2018.
39. Philip Machura and Quan Li, “A critical review on wireless charging for electric vehicles”, International Journal of Renewable and Sustainable
Energy Reviews Vol.104, pp. 209-234, 2019.
40. Kilmoo koo et.al, “Transfer effect ratio of loosely coupled coils for wireless power through CB wall of NPPs “, International conference on Power
and energy systems engineering, Vol.156, pp.291-295, 2019.
41. YanjieGuo et.al, “Effects of Operation Frequency and Current on Coil Impedance of EV Wireless Charging System”, International symposium on
electromagnetic capability, pp.7-21, July 2016.
42. Mohamad SyafiqMazli et.al, “Inductive & Capacitive Wireless Power Transfer System”, International Conference on Computer and
Communication Engineering, pp. 307-321, 2018.
43. S. D. Rankhamb and A. P. Mane , “Review Paper on Wireless Power Transmission “,International Journal of Science and Research , Vol.5,no. 2,
pp. 1340-1343, February 2016.
44. Yong H. Ha et.al, “Magnetic propulsion of a magnetic device using three square-Helmholtz coils and a square-Maxwell coil”, International journal
of biomedical engineering computing, Vol.48, pp. 193-145, 2010.
45. KalyaniGhate and Lalit Dole, “A review on magnetic resonance based wireless power transfer system for electric vehicles “, International
Conference on Pervasive Computing, pp.1-3, January 2015.
46. Siqi Li et.al, “Wireless Power Transfer by Electric Field Resonance and Its Application in Dynamic Charging”,IEEE Transactions on Industrial
Electronics, Vol. 63, no. 10, pp. 6602-6610,October 2016.
47. DevendraPatilet.al, “Wireless Power Transfer for Vehicular Applications: Overview and Challenges”, IEEE Transactions on Transportation
Electrification, Vol. 4, no. 1, pp. 3-37, March 2018.
48. Zhiyun Li et.al, “Connectivity supported dynamic routing of electric vehicles in an inductively coupled power transfer environment”, IET Intell.
Transp. Syst.,Vol. 10, no. 5, pp. 370–377, 2016.
49. Mystica Augustine Michael Duke, “Wireless Power Transmission”, International Journal of Scientific & Engineering Research, Vol. 5, no.10, pp.
125-129, October-2014.
50. Norezmi Jamal, “Investigations on Capacitor Compensation Topologies Effects of Different Inductive Coupling Links Configurations”,
International Journal of Power Electronics and Drive System, Vol. 6, No. 2, pp. 274-281,June 2015.
51. Yijie Wang et.al, “A Double-T-type Compensation Network and Its Tuning Method for IPT System”, IEEE Transactions on Industry Applications,
Vol.27, pp. 1-10, 2017.
52. R. Narayanamoorthi and A. Vimala Juliet, “Capacitor-Less High-Strength Resonant Wireless Power Transfer using Open Bifilar Spiral Coil”, IEEE
Transactions On Applied Superconductivity, Vol. 29, no. 1, pp. 1-8, January 2019.

Authors: Mrigank Rishav, Rittika Maity, D. Sivakumar, S. Balaji


Integration of Renewable Resources Such As Wind for Electric Vehicles and Implementation of Smart Electric
Paper Title:
Vehicles Using Internet of Things
Abstract: The excessive use of coal & petroleum have created many Global Problems such as Air Pollution. The effects
of Air Pollution are very harsh for the environment. The climates are changing unevenly due to Global Warming,
Therefore, The need of Renewable resources is very Important to resolve the factors caused by Global Warming.
In This paper, the concept of Renewable Grid Integration is Introduced in which two renewable resources grids such Wind
& Bio-Gas are connected to form a micro-grid. The integration of two-Grid is utilized for the Electric vehicles. The
Electric Vehicles are in heavy demand since the Conventional vehicles are not suitable for the environment & also due to
the depletion of Fossil Fuels. In this paper we have also proposed a model in which the Electric vehicles are Connected to
Internet of Things. IOT will provide security measures to passengers in vehicles. Since many People die every day due to
accidents in the country. The introduction of IOT along with the integration of Artificial Intelligence will enable the car to
take it’s own decision depending on the circumstances present in the road. The system proposed gives us an alternative
source of energy for the charging of electric vehicles and it also provides the Life security to passengers by introducing the
smart E-Vehicles.
The motive of this paper is to show a new method and to develop a new system which is cleaner, greener and cheaper to
use for the electric vehicles.

Keywords: Electric Vehicles, Renewable Energy, Wind Energy, IOT, Smart E-vehicles.
91.
References: 493-497
1. India pollution levels air Delhi health report in VOX. [Online]Available https://www.vox.com/2018/5/8/173 16978 /india-pollution-levels-air-delhi-
health
2. National crime records bureau Report. [online], Available: https://en.wikipedia.org /wiki/National_ Crime_Records_ Bureau
3. Betz’s Law [online].Available: https://en.wikipedia. org /wiki/Betz%27s_law
4. A. Pantelopoulos, N.G. Bourbakis, “A Survey on Wearable Sensor-Based Systems for Health Monitoring and Prognosis,” IEEE Transactions on
Systems, Man, and Cybernetics, Part C: Applications and Reviews, vol.40, no.1, pp.1-12, Jan. 2010.
5. Boris V. Lukutin Department of Industrial Electric Power Supply, Institute of Power Engineering, National Research Tomsk Polytechnic University,
Russia,Tuning the regulators of wind-diesel power plant operating on the DC-bus, Published in: 2014 14th International Conference on Environment
and Electrical Engineering.
6. W. Z. Khan, Y. Xiang, M. Y. Aalsalem, Q. Arshad, “Mobile Phone Sensing Systems: A Survey,” IEEE Communications Surveys &Tutorials,
vol.15, no.1, pp.402-427, First Quarter 2013.
7. J. A. Afonso, A. J. F. Maio, R. Simoes, “Performance Evaluation of
8. Bluetooth Low Energy for High Data Rate Body Area Networks,” Wireless Personal Communications, vol.90, no.1, pp.121-141, Sept.2016.
9. K.W.E. Cheng, Department of Electrical Engineering, The Hong Kong Polytechnic University, China, Recent development on electric vehicles,
published in 2009 3rd International Conference on Power Electronics Systems and Applications (PESA).
10. Mohammad Kebriaei Department of electrical and computer, University of Kashan, Kashan, Iran, Hybrid electric vehicles: An overview , Published
in: 2015 International Conference on Connected Vehicles and Expo (ICCVE).
11. Xuesong Zhou Key Research Laboratory for Control Theory & Applications in Complicated Systems, Tianjin University of Technology, Tianjin
300384, The current research on electric vehicle, Published in: 2016 Chinese Control and Decision Conference (CCDC).
12. M. Bradt IEEE PES Wind Plant Collector System Design Working Group, Wind power plant testing and commissioning, Published in: 2011 IEEE
Power and Energy Society General Meeting.
Authors: U. Varnikah, K.S. Srividya, S. Balaji, D. Sivakumar
Paper Title: D-STATCOM based on GTO Converter in the Application of Eleven Level Multilevel Inverter
Abstract: In Distribution system, on the load side the power quality is majorly maintained by the Distributed Static
Synchronous Compensator (D-STATCOM). This paper deals with the major function of the D-STATCOM with-11 level
inverter. Instead of 54-pulse converter we are using 11-level inverter for D-STATCOM in distributed system. Normally
fifty four pulse converter is expensive and complicated operating since it has nine transformers and nine-six pulse
converter in order to overcome this issue here we use a 11-level multilevel inverter. The proposed structure consists of
only one transformers and 11-level inverter therefore operation is simple and easy and also it is cost efficient. The
simulation works are done in MATLAB\Simulink software.

Index Terms: DSTATCOM, 54 Pulse Converter, 11-level multilevel inverter.

References:
92. 1. JaganMohana Rao Malla, "Application of multilevel inverter in GTO converter based D-STATCOM", Institute of Electrical and Electronics
Engineers (IEEE- ISSN 7755661) 24 November 201 498-500
2. S G Malla, M.HemaLata Rao, J. M. R. Malla, R. R. Sabat, J. Dadi and M M Das, "SVM-DTC Permanent magnet synchronous motor driven electric
vehicle with bidirectional converter", International Multi-Conference on Automation, Computing, Communication, Control and Compressed
Sensing (iMac4s)-2013, pp. 742-747, 22-23 March 2013.
3. Siva GaneshMalla, JaganMohana Rao Malla, "Novel Controllers for 48-Pulse VSCSSSC Using Three Phase 9 Level Converter with One
Transformer", International Journal of New Technologies in Science and Engineering (IJNTSE), Vol. 1, Issue 2, pp. 1-18, May. 2014.
4. S G Malla, C N Bhende, "Enhanced operation of stand-alone "Photovoltaic-Diesel Generator-Battery" system", Electric Power Systems Research,
Vol. 107, pp. 250-257, Feb. 2014
5. C N Bhende, S G Malla, "Novel control of photovoltaic based water pumping system without energy storage", International Journal of Emerging
Electric Power Systems, Vol. 13, Issue 5, Nov. 2012
6. CN Bhende, Shivakant Mishra, Siva Ganesh Malla, "Permanent magnet synchronous generator-based standalone wind energy supply system", IEEE
Transactions on Sustainable Energy, Vol. 2, Issue 4, pp. 361-373, Oct. 2011.
7. S.G. Malla, C N Bhende, S. Mishra, "Photovoltaic based water pumping system", International Conference on Energy, Automation, and Signal
(ICEAS), pp. 1-4, 28-30 Dec. 2011.
8. C N Bhende, S. G. Malla, "Variable speed wind turbine, permanent magnet synchronous generator, voltage control, unbalanced load compensation",
ACTA Press, Power and Energy Systems and Applications 2011 , Pittsburgh, USA, 7-9 November 2011.

93. Authors: S. Shreyas, D. Harini, K. Surendhira Babu, K. Venkatasubramani


Paper Title: Stability Analysis of Microgrids
Abstract: This paper reviews aspects of stability in microgrids. As there are different applications of microgrids, the
aspect of stability also varies. This paper reviews and analyses small signal and large signal stabilities, besides dwelling on
the different aspects involved in the stability of microgrids. The small and large signals of different types of microgrids are
reviewed, alongside the transients and the stability of output voltage. Large signal analysis of generators and individual
loads are also encompassed in this paper. This paper also sums up the scope for future research in stabilities of both large
and small signals. In addition to this, the methods to improve signal stability is also covered in this paper.

Key terms: Microgrid, Small-signal, Large-signal, Lyapunov Method, Eigenvalue Method.

References:
1. Mahmoud Kabalan, Pritpal Singh and Dagmar Niebur, “Large Signal Lyapunov-Based Stability Studies in Microgrids: A Review,” IEEE Trans.
Smart Grid, to be published.
2. Ritwik Majumder, “Some Aspects of Stability in Microgrids,” IEEE Trans. Power Syst., to be published
3. Shuya Wang, Jianhui Su, Xiangzhen Yang, Yan Du, Yong Tu, Huadian Xu, “A Review on the Small Signal Stability of Microgrid,” 2016 IEEE 8th
Intl. Power Electron. and Motion Control Conference
4. P. H. Divshali, A. Alimardani, S. H. Hosseinian, and M. Abedi, “Decentralized cooperative control strategy of microsources for stabilizing
autonomous VSC-based microgrids,” IEEE Trans. Power Syst., to be published.
5. M. N. Marwali, J. Jin-Woo, and A. Keyhani, “Control of distributed generation systems—Part II: Load sharing control,” IEEE Trans. Power
Electron., vol. 19, pp. 1551–1561, 2004.
6. J. M. Guerrero, J. Matas, V. L. Garcia de, M. Castilla, and J. Miret, “Decentralized control for parallel operation of distributed generation inverters
using resistive output impedance,” IEEE Trans. Ind. Electron., vol. 54, pp. 994–1004, 2007.
7. M. N. Marwali, M. Dai, and A. Keyhani, “Robust stability analysis of voltage and current control for distributed generation systems,” IEEE Trans.
Energy Convers., vol. 21, no. 2, pp. 516–526, Jun. 2006.
8. M. N. Marwali, M. Dai, and A. Keyhani, “Stability analysis of load sharing control for distributed generation systems,” IEEE Trans.
EnergyConvers., vol. 22, no. 3, pp. 737–745, Sep. 2007.
9. H. Y. Cho and E. Santi, “Modeling and stability analysis in multi-converter systems including positive feedforward control,” in Proc. 34thAnnu.
Conf. of IEEE Ind. Electron. (IECON 2008), Nov. 10–13, 2008, pp. 839–844.
10. N. Pogaku, M. Prodanovic, and T. C. Green, “Modeling, analysis and testing of autonomous operation of an inverter-based microgrid,” IEEETrans.
Power Electron., vol. 22, no. 2, pp. 613–625, 2007.
11. R. Majumder, A. Ghosh, G. Ledwich, and F. Zare, “Power system stability and load sharing in distributed generation,” in Proc. POWERCON&
2008 IEEE Power India Conf., New Delhi, India, 2008.
12. R. Majumder, A. Ghosh, G. Ledwich, and F. Zare, “Stability analysis and control of multiple converter based autonomous microgrid,” in Proc. IEEE
Int. Conf. Control and Automation (ICCA), Christchurch, New Zealand, 2009.
13. R. Majumder, B. Chaudhuri, A. Ghosh, R.Majumder, G. Ledwich, and F. Zare, “Improvement of stability and load sharing in an autonomous
microgrid using supplementary droop control loop,” IEEE Trans.Power Syst., vol. 25, no. 2, pp. 796–808, May 2010.
14. R. Kamel, A. Chaouachi, and K. Nagasaka, “Detailed analysis of micro-grid stability during islanding mode under different load conditions,”
Engineering, vol. 3, no. 5, pp. 508–516, 2011.
15. D. P. Ariyasinghe and D. M. Vilathgamuwa, “Stability analysis of microgrids with constant power loads,” in Proc. IEEE Int. Conf. Sustainable
Energy Technol., 2008 (ICSET 2008), Nov. 24–27, 2008, pp. 279–284.
16. D. M. Vilathgamuwa, X. N. Zhang, S. D. G. Jayasinghe, B. S. Bhangu, C. J. Gajanayake, and K. J. Tseng, “Virtual resistance based active damping 501-508
solution for constant power instability in AC microgrids,” in Proc. 37th Annu. Conf. IEEE Ind. Electron. Soc. (IECON 2011), Nov. 7–10, 2011, pp.
3646–3651.
17. H. Karimi,H.Nikkhajoei, and R. Iravani, “Control of an electronically coupled distributed resource unit subsequent to an islanding event,” IEEE
Trans. Power Del., vol. 23, no. 1, pp. 493–501, Jan. 2008.
18. N. Jayawarna, X.Wu, Y. Zhang, N. Jenkins, and M. Barnes, “Stability of a microgrid,” in Proc. 3rd IET Int. Conf. Power Electron., Mach.and
Drives, 2006.
19. F. Andrade, J. Cusido, and L. Romeral, “Transient stability analysis of inverter-interfaced distributed generators in a microgrid system,” in Proc.
2011–14th Eur. Conf. Power Electron. and Applicat. (EPE 2011), 2011, pp. 1–10.
20. C. Xinhe, P. Wei, and T. Xisheng, “Transient stability analyses of micro-grids with multiple distributed generations,” in Proc. Int. Conf.Power Syst.
Technol. (POWERCON), 2010.
21. S. Krishnamurthy, T. M. Jahns, and R. H. Lasseter, “The operation of diesel gensets in a CERTS microgrid,” in Proc. IEEE Power and EnergySoc.
General Meeting—Conversion and Delivery of Elect. Energyin the 21st Century, Jul. 2008, pp. 1–8.
22. A. Elmitwally and M. Rashed, “Flexible operation strategy for an isolated PV-diesel microgrid without energy storage,” IEEE Trans.
EnergyConvers., vol. 26, no. 1, pp. 235–244, Mar. 2011.
23. A. K. Basu, S. Chowdhury, and S. P. Chowdhury, “Impact of strategic deployment of CHP-based DERs on microgrid reliability,” IEEE Trans.Power
Del., vol. 25, no. 3, pp. 1697–1705, Jul. 2010.
24. M. Zhixin, A. Domijan, and F. Lingling, “Investigation of microgrids with both inverter interfaced and direct AC-connected distributed energy
resources,” IEEE Trans. Power Del., vol. 26, no. 3, pp. 1634–1642, Jul. 2011.
25. M. Datta, T. Senjyu, A. Yona, T. Funabashi, and K. Chul-Hwan, “A coordinated control method for leveling PV output power fluctuations of PV-
diesel hybrid systems connected to isolated power utility,” IEEETrans. Energy Convers., vol. 24, no. 1, pp. 153–162, Mar. 2009.
26. R. Majumder, F. Shahnia, A. Ghosh, G. Ledwich, M. Wishart, and F. Zare, “Operation and control of a microgrid containing inertial and non-
inertialmicro sources,” in Proc. IEEE TENCON, Singapore, 2009.
27. J. Rocabert, G. Azevedo, G. Vazquez, I. Candela, P. Rodriguez, and J.M. Guerrero, “Intelligent control agent for transient to an island grid,” in IEEE
Int. Symp. Ind. Electron. (ISIE), Jul. 4–7, 2010, pp. 2223–2228.
28. F. Katiraei, M. R. Iravani, and P. Lehn, “Microgrid autonomous operation during and subsequent to islanding process,” in Proc. IEEE PowerEng.
Soc. General Meeting, 2004, p. 2175.
29. G. M. S. Azevedo, F. Bradaschia, M. C. Cavalcanti, F. A. S. Neves, J. Rocabert, and P. Rodriguez, “Safe transient operation of microgrids based on
master-slave configuration,” in Proc. IEEE Energy ConversionCongr. Expo. (ECCE), , pp. 2191–2195.
30. R.Majumder, A.Ghosh, G. Ledwich, and F. Zare, “Control of parallel converters for load sharing with seamless transfer between grid connected and
islanded modes,” in Proc. IEEE Power and Energy Soc. General Meeting, Pittsburgh, PA, Jul. 20–24, 2008.
31. A. H. K. Alaboudy, H. H. Zeineldin, and J. L. Kirtley, “Microgrid stability characterization subsequent to fault-triggered islanding incidents,” IEEE
Trans. Power Del., vol. 27, no. 2, pp. 658–669,Apr. 2012.
32. Microgrid, Large Scale Integration ofMicro Generation to Low voltage Grids, Energy, Environment and Sustainable Development
Program,European Program, Contact Number: ENK5-CT-2002-00610.[Online]. Available: http://www. microgrids.eu /micro2000/index.
php?page=index.
33. Advanced Architectures and Control Concepts for More Microgrids, European Program, Contract No: SES6-019864. [Online].
Available:http://www.microgrids.eu/index.php.
34. Microgrids, Pike Research pp. 1–95. [Online]. Available: http://www. pikeresearch.com/research/microgrids.
35. R. Majumder, “Modeling, stability analysis and control of microgrid,” Ph.D. dissertation, Queensland Univ. Technol., Brisbane, Australia, 2010.
36. I. A. Hiskens and R. J. Davy, “Lyapunov function analysis of power systems with dynamic loads,” Proc. 35th IEEE Decision and Control, vol. 4, pp.
3870–3875, Dec. 1996.
37. R. Majumder, “Reactive power compensation in single phase operation of microgrid,” IEEE Trans. Ind. Electron., to be published.
38. Powerstore, ABB-Power Corp. [Online]. Available: http://www.pcorp.com.au/index.php?option=com_content& task=view&id=83&Itemid=132.
39. R.Majumder, A. Ghosh, G. Ledwich, and F. Zare, “Power sharing and stability enhancement of an autonomous microgrid with inertial and non-
inertial DGs with DSTATCOM,” in Proc. Int. Conf. Power Systems, 2009 (ICPS ’09), Dec. 27–29, 2009, pp. 1–6.
40. Y. A.-R. I. Mohamed and E. F. El-Saadany, “Adaptive decentralized droop controller to preserve power sharing stability of paralleled invertersin
distributed generation microgrids,” IEEE Trans. Power Electron., vol. 23, no. 6, pp. 2806–2816, Nov. 2008.
41. A. A. A. Radwan and Y. A. R. I. Mohamed, “Modeling, analysis, and stabilization of converter-fed AC microgrids with high penetration of
converter-interfaced loads,” IEEE Trans. Smart Grid, vol. 3, no. 3, pp. 1213–1225, Sep. 2012.
42. L. Luo and S. V. Dhople, “Spatiotemporal model reduction of inverterbased islanded microgrids,” IEEE Trans. Energy Convers., vol. 29, no. 4, pp.
823–832, Dec. 2014.
43. U. Topcu, A. Packard, P. Seiler, and T. Wheeler, “Stability region analysis using simulations and sum-of-squares programming,” in Proc.
Amer.Control Conf. (ACC), New York, NY, USA, 2007, pp. 6009–6014.
44. M. A. Pai, Energy Function Analysis for Power System Stability. Boston, MA, USA: Kluwer Academic Publishers, 1989. [Online]. Available:
http://www.tandfonline.com/ doi/abs/10.1080/07313569008909464
45. P. Hart and B. Lesieutre, “Energy function for a grid-tied, droop controlled inverter,” in Proc. North Amer. Power Symp. (NAPS), Pullman, WA,
USA, 2014, pp. 1–6.
46. D. Marx, P. Magne, B. Nahid-Mobarakeh, S. Pierfederici, and B. Davat, “Large signal stability analysis tools in dc power systems with constant
power loads and variable power loads—A review,” IEEE Trans. Power Electron., vol. 27, no. 4, pp. 1773–1787, Apr. 2012.
47. H.-D. Chiang, F. F. Wu, and P. P. Varaya, “Foundations of the potential energy boundary surface method for power system transient stability
analysis,” IEEE Trans. Circuits Syst., vol. 35, no. 6, pp. 712–728, Jun. 1988.
48. C. Hsiao-Dong, F. F. Wu, and P. P. Varaiya, “A BCU method for direct analysis of power system transient stability,” IEEE Trans. Power Syst., vol.
9, no. 3, pp. 1194–1208, Aug. 1994.
49. R. Brayton and J. Moser, “Some results on the stability of nonlinear networks containing negative resistances,” IEEE Trans. Circuit Theory, vol. 11,
no. 1, pp. 165–167, Mar. 1964.
50. F. Hamidi and H. Jerbi, “On the estimation of a maximal Lyapunov function and domain of attraction determination via a genetic algorithm,” in
Proc. 6th Int. Multi-Conf. Syst. Signals Devices (SSD), 2009, pp. 1–6.
51. R. Genesio, M. Tartaglia, and A. Vicino, “On the estimation of asymptotic stability regions: State of the art and new proposals,” IEEE Trans.
Autom. Control, vol. 30, no. 8, pp. 747–755, Aug. 1985.
52. P. M. Anderson and A. A. Fouad, Power System Control and Stability (IEEE Press Power Engineering), 2nd ed. Piscataway, NJ, USA: IEEE Press,
2003.
53. F. Andrade Andrade, L. Romeral, J. Cusido, and J. J. Cardenas, “New model of a converter-based generator using electrostatic synchronous machine
concept,” IEEE Trans. Energy Convers., vol. 29, no. 2, pp. 344–353, Jun. 2014.
54. K. De Brabandere et al., “A voltage and frequency droop control method for parallel inverters,” IEEE Trans. Power Electron., vol. 22, no. 4, pp.
1107–1115, Jul. 2007.
55. S. V. Iyer, M. N. Belur, and. C. Chandorkar, “Analysis and mitigation of voltage offsets in multi-inverter microgrids,” IEEE Trans. EnergyConvers.,
vol. 26, no. 1, pp. 354–363, Mar. 2011.
56. ECPE European Center for Power Electronics, and EPE European Power Electronics and Drives Association, “Energy efficiency—The role of
power electronics,” Tech. Rep., 2008.
57. IEEE Recommended Practice for Electronic Power Subsystems: Parameters, Interfaces, Elements, and Performance, IEEE Standard1573-2003,
2004.
58. S. Rosado, R. Burgos, F. Wang, and D. Boroyevich, “Large-signal stability analysis in power systems with a synchronous generator connectedto a
large motor drive,” in Proc. Elect. Ship Technol. Symp. (ESTS),Arlington County, VA, USA, 2007, pp. 42–47.
59. S. Rosado, R. Burgos, F. Wang, and D. Boroyevch, “Large-signal stability assessment of AC/DC systems with multi-pulse rectification and DC-fed
PWM motor drives,” in Proc. Power Electron. Spec.Conf. (PESC), Orlando, FL, USA, 2007, pp. 2168–2173.
Authors: Soumyajit Mitra, Dheeraj Kumar Pandaraboyana, K. Arulvendhan, J. Dilli Srinivasan
Paper Title: HVDC in Indian Power Sector
Abstract: India is going through a phase of modernization that has given way to growing demand for electrical energy.
The wave of modernization has ushered in a emerging industrial sector that has heightened the demand for electricity. In
addition, 99.7% of household in India has been electrified which is a remarkable feat considering India has a population of
1.3 billion but it has further elevated the demand. Usually the generation plant is located at a remote area far from the
centers of urbanization where the demand as it happens is highest. So a lot depends on transmission which plays a key role
in the electrical sector. An expansion in size of the transmission arrange prompts a mind-boggling arrangement of
transmission that endures significant obstacles identified with burden stream, control wavering and voltage quality.
Conventional AC transmission line had proved inefficient in long distance high voltage transmission. A possible solution
to this situation is the use HVDC transmission system. In fact a number of HVDC transmission projects had been planned
and constructed throughout India.

Keywords: Efficiency, HVDC Transmission, HVAC Transmission, Converter.

References:
1. Kamalapur, G &Sheelavant, Vishwakumar& Hyderabad, Sabeena&Pujar, Ankita&Baksi, Saptarshi&Patil, Amruta. (2014). HVDC transmission in
94. India. Potentials, IEEE. 33. 22-27. 10.1109/MPOT.2012.2220870.
2. Peng, Chang & Huang, Alex. (2016). Converting HVAC to HVDC grids: A novel switched conductor HVDC scheme. 1-5. 509-515
10.1109/TDC.2016.7520008.
3. Xiang, X & Merlin, Michael & Green, Tim. (2016). Cost Analysis and Comparison of HVAC, LFAC and HVDC for Offshore Wind Power
Connection. 10.1049/cp.2016.0386.
4. Schön, André &Bakran, Mark-M. (2014). High power HVDC-DC converters for the interconnection of HVDC lines with different line topologies.
3255-3262.
5. Wang, Chunsheng& Liu, Sen & Huang, Lijun & Wu, Hao& Fan, Kelin& Rao, Guohui& He, Zhi&Hao, Junfang. (2010). The research, test and
verification of the HVDC centralized control system.
6. V. K. Prasher, D. Kumar, C. Bartzsch, V. Hartmann, and A. Mukherjee, “HVDC East-South interconnector II in India: 2000 MW, +/-500 kV,” in
Proc. 7th Int. Conf. AC-DC Power Transmission, Nov. 28–30, 2001, pp. 78–83.
7. Raza, Ali &Shakeel, Armughan&Tahzeeb, Hafiz & Hassan, Mohsin & Omer Jamil, Syed & , Gillani. (2017). Economic Analysis for HVDC
Transmission System in Pakistan. International Journal of Control and Automation. 10. 29-3829. 10.14257/ijca.2017.10.11.03.
8. Electrical-engineering-portal.com, “Analysing the costs of High Voltage Analysing the costs of High Voltage Direct Current (HVDC) transmission”,
2014. [Online]. Available: https://electrical-engineering-portal.com/analysing-the-costs-of-high-voltage-direct-current-hvdc-transmission .
9. Härtel, Philipp &Vrana, Til&Hennig, Tobias & von Bonin, Michael &Wiggelinkhuizen, Edwin &Nieuwenhout, Frans. (2017). Review of
investment model cost parameters for VSC HVDC transmission infrastructure. Electric Power Systems Research.151.419–431.
10.1016/j.epsr.2017.06.008.
10. powerminnic.in, “HVDC System in India”, 2012.[Online].Available:https://powermin.nic.in/en/content/hvdc-system-india
11. sari-energy.org, “HVDC Systems in India” [Online].
Available:https://sarienergy.org/oldsite/PageFiles/What_We_Do/activities/HVDC_Training/Presentations/Day_1/1_HVDC_SYSTEMS_IN_INDIA.
pdf.
12. A. Kumar, S. Jhampati and R. Suri, "HVDC Converter Stations Design for LCC Based HVDC Transmission System-Key Consideration," 2017 14th
IEEE India Council International Conference (INDICON), Roorkee, 2017, pp. 1-6.doi: 10.1109/INDICON.2017.8487576
13. K. Vinothkumar, I. Segerqvist, N. Johannesson and A. Hassanpoor, "Sequential auto-reclosing method for hybrid HVDC breaker in VSC HVDC
links," 2016 IEEE 2nd Annual Southern Power Electronics Conference (SPEC), Auckland, 2016,pp.1-6.doi: 10.1109/SPEC.2016.7846120
14. Chunsheng Wang et al., "The research, test and verification of the HVDC centralized control system," CICED 2010 Proceedings, Nanjing, 2010, pp.
1-6.
15. S. Gao, H. Zhu, B. Zhang and G. Song, "Modeling and simulation analysis of Hybrid Bipolar HVDC system based on LCC-HVDC and VSC-
HVDC," 2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Chongqing, 2018, pp. 1448-
1452. doi: 10.1109/IAEAC.2018.8577863
16. J. Hernandez-Guiteras, L. Arevalo and H. Hammarsten, "Applicability of the Risk Assessment in International Standards to HVDC Converter
Stations," 2018 34th International Conference on Lightning Protection (ICLP), Rzeszow, 2018, pp. 1-4.
17. N. A. Belda, C. A. Plet and R. P. P. Smeets, "Analysis of Faults in Multiterminal HVDC Grid for Definition of Test Requirements of HVDC Circuit
Breakers," in IEEE Transactions on Power Delivery, vol. 33, no. 1, pp. 403-411, Feb.2018.doi: 10.1109/TPWRD.2017.2716369
18. R. Naeem, M. S. Cheema, M. Ahmad, S. A. Haider and U. T. Shami, "Impact of HVDC grid segmentation topology on transient stability of HVDC-
segmented electric grid," 2015 International Conference on Open Source Systems & Technologies (ICOSST), Lahore, 2015, pp. 132-136.doi:
10.1109/ICOSST.2015.7396415
19. V. Galanov and L. Koshcheev, "Prospects of HVDC Power Transmission application in UPS of Russia," 2005 IEEE Russia Power Tech, St.
Petersburg, 2005, pp. 1-4. doi: 10.1109/PTC.2005.4524505
20. A. Beddard and M. Barnes, "HVDC cable modelling for VSC-HVDC applications," 2014 IEEE PES General Meeting | Conference & Exposition,
National Harbor, MD, 2014, pp. 1-5.doi: 10.1109/PESGM.2014.6939059
21. Y. Liu and Z. Chen, "Short Circuit Ratio analysis of multi-infeed HVDC system with a VSC-HVDC link," IECON 2011 - 37th Annual Conference
of the IEEE Industrial Electronics Society, Melbourne, VIC, 2011, pp. 949-954. doi: 10.1109/IECON.2011.6119438
22. L. O. Barthold, "Technical and Economic Aspects of Tripole HVDC," 2006 International Conference on Power System Technology, Chongqing,
2006, pp. 1-6.
23. T. H. Nguyen, D. Lee and C. Kim, "A Series-Connected Topology of a Diode Rectifier and a Voltage-Source Converter for an HVDC Transmission
System," in IEEE Transactions on Power Electronics, vol. 29, no. 4, pp. 1579-1584,April,2014.doi: 10.1109/TPEL.2013.2283368
24. A. Bodin, "HVDC Light®- a preferable power transmission system for renewable energies," Proceedings of the 2011 3rd International Youth
Conference on Energetics (IYCE), Leiria, 2011, pp. 1-4.
25. M. P. González and M. A. Ríos, "Generation and Transmission Planning using HVDC Grids," 2018 IEEE PES Transmission & Distribution
Conference and Exhibition - Latin America (T&D-LA), Lima, 2018, pp. 1-5. doi: 10.1109/TDC-LA.2018.8511769
26. J. M. Mauricio and A. G. Exposito, "Modeling and Control of an HVDC-VSC Transmission System," 2006 IEEE/PES Transmission & Distribution
Conference and Exposition: Latin America, Caracas, 2006, pp. 1-6.
27. Z. Solhjoukhah, A. Egea-Alvarez and O. Gomis-Bellmunt, "Voltage Control of Offshore Load Connected to a Multi-Terminal HVDC Transmission
System," 11th IET International Conference on AC and DC Power Transmission, Birmingham, 2015, pp. 1-9.
28. M. Li, Z. Guo, D. Cai and G. Wang, "Operating Characteristic Analysis of Multi-terminal Hybrid HVDC Transmission System with Different
Control Strategies," 2018 International Conference on Power System Technology (POWERCON), Guangzhou, 2018, pp. 2616-2621.
29. S. Deb and H. K. Verma, "Selection of fault discriminators for unit protection of monopolar HVDC transmission system," 2017 3rd International
Conference on Condition Assessment Techniques in Electrical Systems (CATCON), Rupnagar, 2017, pp. 20-25.
30. J. Wang, Z. Liang, X. Xuan, J. Luo and L. Xiao, "Study on power control function for double-circuit-on-the-same-tower HVDC transmission
systems," 2014 IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC), Hong Kong, 2014, pp. 1-5.
31. C. Peng and A. Q. Huang, "Converting HVAC to HVDC grids: A novel switched conductor HVDC scheme," 2016 IEEE/PES Transmission and
Distribution Conference and Exposition (T&D), Dallas, TX, 2016, pp. 1-5.
32. B. Hu, K. Xie and H. Tai, "Optimal Reliability Allocation of ±800 kV Ultra HVDC Transmission Systems," in IEEE Transactions on Power
Delivery, vol. 33, no. 3, pp. 1174-1184,June,2018.doi: 10.1109/TPWRD.2017.2775099
33. C. Zou et al., "Analysis of Resonance Between a VSC-HVDC Converter and the AC Grid," in IEEE Transactions on Power Electronics, vol. 33, no.
12, pp. 10157-10168, Dec.2018.doi: 10.1109/TPEL.2018.2809705
34. K. Xie, B. Hu and C. Singh, "Reliability Evaluation of Double 12-Pulse Ultra HVDC Transmission Systems," in IEEE Transactions on Power
Delivery, vol. 31, no. 1, pp. 210-218, Feb. 2016.
35. V. Akhmatov et al., "Technical Guidelines and Prestandardization Work for First HVDC Grids," in IEEE Transactions on Power Delivery, vol. 29,
no. 1, pp. 327-335, Feb.,2014.doi: 10.1109/TPWRD.2013.2273978
36. Z. Zheng, T. Tai, J. S. Thorp and Y. Yang, "A Transient Harmonic Current Protection Scheme for HVDC Transmission Line," in IEEE Transactions
on Power Delivery, vol. 27, no. 4, pp. 2278-2285, Oct. 2012. doi: 10.1109/TPWRD.2012.2201509
37. B. Zhang, J. He, R. Zeng, S. Gu and L. Cao, "Calculation of Ion Flow Field Under HVdc Bipolar Transmission Lines by Integral Equation Method,"
in IEEE Transactions on Magnetics, vol. 43, no. 4, pp. 1237-1240, April 2007. doi: 10.1109/TMAG.2007.892305
38. Y. Ma, H. Li, G. Wang and J. Wu, "Fault Analysis and Traveling-Wave-Based Protection Scheme for Double-Circuit LCC-HVDC Transmission
Lines With Shared Towers," in IEEE Transactions on Power Delivery, vol. 33, no. 3, pp. 1479-1488, June 2018.
39. M. Barnes, D. Van Hertem, S. P. Teeuwsen and M. Callavik, "HVDC Systems in Smart Grids," in Proceedings of the IEEE, vol. 105, no. 11, pp.
2082-2098, Nov. 2017. doi: 10.1109/JPROC.2017.2672879
40. Z. Luo, X. Cui, W. Zhang and J. Lu, "Calculation of the 3-D Ionized Field Under HVDC Transmission Lines," in IEEE Transactions on Magnetics,
vol. 47, no. 5, pp. 1406-1409, May 2011.
41. G. Ebner, D. Döring, F. Schettler, K. Würflinger and M. Zeller, "Fault Handling at Hybrid High-Voltage AC/DC Transmission Lines With VSC
Converters," in IEEE Transactions on Power Delivery, vol. 33, no. 2, pp. 901-908, April 2018.
42. C. Guo and C. Zhao, "Supply of an Entirely Passive AC Network Through a Double-Infeed HVDC System," in IEEE Transactions on Power
Electronics, vol. 25, no. 11, pp. 2835-2841, Nov. 2010.
43. A. Raza et al., "A Protection Scheme for Multi-Terminal VSC-HVDC Transmission Systems," in IEEE Access, vol. 6, pp. 3159-3166, 2018.
44. B. Zhang, J. Mo, H. Yin and J. He, "Calculation of Ion Flow Field Around HVdc Bipolar Transmission Lines by Method of Characteristics," in
IEEE Transactions on Magnetics, vol. 51, no. 3, pp. 1-4, March 2015, Art no. 7204604.
45. J. Suonan, J. Zhang, Z. Jiao, L. Yang and G. Song, "Distance Protection for HVDC Transmission Lines Considering Frequency-Dependent
Parameters," in IEEE Transactions on Power Delivery, vol. 28, no. 2, pp. 723-732, April,2013.doi: 10.1109/TPWRD.2012.2232312
46. G. Song, X. Chu, S. Gao, X. Kang and Z. Jiao, "A New Whole-Line Quick-Action Protection Principle for HVDC Transmission Lines Using One-
End Current," in IEEE Transactions on Power Delivery, vol. 30, no. 2, pp. 599-607, April 2015.
47. M. Aredes, C. Portela and F. C. Machado, "A 25-MW soft-switching HVDC tap for /splplusmn/500-kV transmission lines," in IEEE Transactions on
Power Delivery, vol. 19, no. 4, pp. 1835-1842, Oct. 2004.
48. Z. Jinhua, "Optimization Study on Voltage Level and Transmission Capacity," in IEEE Transactions on Power Systems, vol. 24, no. 1, pp. 193-197,
Feb. 2009. doi: 10.1109/TPWRS.2008.2008609
49. C. M. Franck, "HVDC Circuit Breakers: A Review Identifying Future Research Needs," in IEEE Transactions on Power Delivery, vol. 26, no. 2, pp.
998-1007, April 2011. doi: 10.1109/TPWRD.2010.2095889
50. R. Billinton, S. Aboreshaid and M. Fotuhi-Firuzabad, "Well-being analysis for HVDC transmission systems," in IEEE Transactions on Power
Systems, vol. 12, no. 2, pp. 913-918, May 1997.
51. G. D. Kamalapur, V. R. Sheelavant, S. Hyderabad, A. Pujar, S. Baksi and A. Patil, "HVDC Transmission in India," in IEEE Potentials, vol. 33, no.
1, pp. 22-27, Jan.-Feb. 2014. doi: 10.1109/MPOT.2012.2220870
52. The limits of HVDC transmission, October 2013, Energy Policy 61:292-300,
53. R. Feldman, M. Tomasini, J. C. Clare, P. Wheeler, D. R.Trainer and R. S. Whitehouse, “A hybrid voltage source converter arrangement for HVDC
power transmission and reactive power compensation,” in Proc. 5th IET International Conference on Power Electronics, Machines and Drives(
PEMD 2010), pp. 1-6, 19-21 April 2010.
54. D. T. Fischer, L. Angquist and H. Nee, “Frequency-domain modeling of sub-synchronous torsional interaction of synchronous machines and a high
voltage direct current transmission link with line-commutated converters,” IET Generation, Transmission and Distribution, vol. 4, no. 3, pp. 418-
431, 2010.
55. K. Li and C. Zhao, “New technologies of modular multilevel converter for VSC-HVDC application,” in Proc. Asia-Pacific Power and Energy
Engineering Conference (APPEEC 2010), pp.1-4, 28-31 March 2010.
56. L. Li, M. Zhou, S. Li and Y. Li, “A new method of black start based on VSC-HVDC,” in Proc. 1st International Conference on Computing Control
and Industrial Engineering, CCIE 2010,pp. 300-303, 5-6 June 2010.
57. B. Liu, J. Xu, R. Torres-Olguin and T. Undeland, “Faults mitigation control design for grid integration of offshore wind farms and oil & gas
installations using VSC HVDC,” in Proc. 2010 International Symposium on Power Electronics, Electrical Drives, Automation and Motion
(SPEEDAM 2010), pp.792-797, 14-16 June 2010
58. C. Liu, J. Zuo, J. Wu and D. Liu, “Observability analysis of AC-DC hybrid power system,” in Proc. 2010 IEEE Power & Energy Society General
Meeting, pp.1-7, 25-29 July 2010.
59. Q. Liu, Q. Huang and J. Shi, “A fuzzy control algorithm to characteristic harmonics of converter in HVDC system,” in Proc. Asia-Pacific Power and
Energy Engineering Conference (APPEEC 2010), pp.1-4, 28-31 March 2010.
Authors: Priya Kumari, Ashutosh Pandey, D. Sivakumar, S. Balaji
Fuzzy Logic based Battery Energy Storage System (Bess) for the Improvement in Stability of an Islanded
Paper Title:
Micro-Grid
Abstract: In this paper, the dynamic power and the responsive control of power of a (BESS) Battery energy storage
system using the fuzzy logic control to keep up recurrence & the constancy of voltage of the Islanded Micro-grid. In the
primary extent of the introduced paper is to consider the adequacy of the Battery energy storage system controller in
perspective on fluctuations of recurrence/voltage exposed to an aggravation happening in the islanded micro-grid. In the
islanded micro-grid framework, the power is created from sustainable power source assets (RESs), i.e., sun & hydro
based PV. The utilization of these spotless vitality sources has turned into the principle issue, visualizing the yield control
vulnerabilities from renewable energy sources. Further, power vulnerability elevates control quality issues and prompts
control disappointment. To beat such issues, the proposed fuzzy logic controller (FLC) approach is connected to BESS
controller to advance the stability of the islanded Micro-grid. The simulation result represents that both the control
approaches permit the dynamic dependability of the micro-grid and the maintenance of recurrence and the voltage inside
satisfactory reaches. Therefore, the proposed BESS fuzzy logic control is not as much prone to vulnerability than the
BESS robust control.

References:
1. Naowarat Tephiruk, Weerawoot Kanokbannakorn, Thongchart Kerdphol, YasunoriMitani and Komsan Hongesombut Fuzzy Logic Control of a
Battery Energy Storage System for Stability Improvement in an Islanded Microgrid, 19 May 2018
2. Lidula, N.W.A.; Rajapakse, A.D. Micro grids research: A review of experimental micro grids and test systems. Renew. Sustain. Energy Rev. 2011,
15, 186–202. [CrossRef]
3. Basaka, P.; Chowdhury, S.; Halder, S.; Chowdhury, S.P. A literature review on integration of distributed energy resources in the perspective of
control, protection and stability of microgrid. Renew. Sustain. Energy Rev. 2012, 16, 5545–5556. [CrossRef]
4. Karimi, Y.; Oraee, H.; Mohammad, S.; Guerrero, M. Decentralized Method for Load Sharing and Power Management in a PV/Battery Hybrid
Source Islanded Microgrid. IEEE Trans. Power Electron. 2017, 32, 3525–3535. [CrossRef]
5. Inthamoussou, A.; Queralt, J.; Bianchi, D. Control of a super capacitor energy storage system for microgrid applications. IEEE Trans. Energy
Convers. 2013, 28, 690–697. [CrossRef]
95. 6. Ding, Z.; Yang, C.; Zhang, Z.; Wang, C.; Xie, S. A novel soft-switching multiport bidirectional DC–DC converter for hybrid energy storage
system.IEEE Trans. Power Electron. 2014, 29, 1595–1609. [CrossRef]
7. Zamora, R.; Srivastava, K. Controls for microgrids with storage: Review, challenges, and research needs. Renew. Sustain. Energy Rev. 2010, 14, 516-522
2009–2018. [CrossRef]
8. Martin, I. Analyzing the Need for a Balancing System in Supercapacitor Energy Storage Systems. IEEE Trans. Power Electron. 2018, 33, 2162–
2171.
9. Hisham, M.; Dennis, M.; Jin, J. Strategies for Independent Deployment and Autonomous Control of PV and Battery Units in Islanded Microgrids.
IEEE J. Emerg. Sel. Top. Power Electron. 2015, 3, 742–755.
10. Etxeberria, A.; Vechiu, I.; Camblong, H.; Vinassab, J.M. Comparison of Sliding Mode and PI Control of a Hybrid Energy Storage System in a
Microgrid Application. Energy Procedia 2011, 12, 966–974. [CrossRef]
11. Sharav-Schapiro, N.; Palmor, Z.J.; Steinberg, A. Robust output feedback stabilizing control for discrete uncertain SISO systems. IEEE Trans.
Autom. Control 1996, 41, 1377–1381. [CrossRef]
12. Lee, H.; Tomizuka, M. Robust adaptive control using a universal approximator for SISO nonlinear systems. IEEE Trans. Fuzzy Syst. 2000, 8, 96–
106.
13. Xiangbin, Y.; Leung, S.; Wu, B.; Rui, Y.; Xu, D.; Kuang, Q. Power Control for Space–Time-Coded MIMO Systems with Imperfect Feedback over
Joint Transmit–Receive-Correlated Channel. IEEE Trans. Veh. Technol. Soc. 2015, 64, 2489–2501.
14. Weitzel, T.; Glock, C.H. Energy management for stationary electric energy storage systems: A systematic literature review. Eur. J. Oper. Res. 2018,
264, 582–606. [CrossRef]
15. Holger, C.H.; Michael, S.; Daniel, K.; Andreas, J. Lithium-Ion Battery Storage for the Grid-A Review of Stationary Battery Storage System Design
Tailored for Applications in Modern Power Grids. Energies 2017, 10, 2107. [CrossRef]
16. Tummasit, N.; Premrudeepreechacharn, S.; Tantichayakorn, N. Adaptive overcurrent protection considering critical clearing time for a microgrid
system. In Proceedings of the 2015 IEEE Innovative Smart Grid Technologies—Asia (ISGT ASIA), Bangkok, Thailand, 3–6 November 2015.
17. Nisar, A.; Shaji, M. Comprehensive Control for Microgrid Autonomous Operation with Demand Response. IEEE Trans. Smart Grid 2017, 8, 2081–
2089.
18. K.M. Sreedivya; P. ArunaJeyanthy; D.Devaraj ; Fuzzy Logic Based Power System Stabilizer for Damping LowFrequency Oscillations in Power
System. IEEE 23rd November 2017 .
19. Zhou Shengzhe; Wang Kai; Xue Wen. Fuzzy Logic based Control StratergyFor a Battery/SuperCapacitor Hybrid Energy storage System in Electric
Vehicles. IEEE; 1st January 2018.
20. Rashid Al Badwawi; Walid R. Issa; Tapas K.Mallick ; Supervisory Control for Power Management of an Islanded Microgrid Using a Frequency
Signalling Based Fuzzy Logic Controller. IEEE , 12th April 2018.
21. Ramchandra Bhosale ; Vivek Agarwal ; Fuzzy Logic Control Of The Ultracapacitor Interface For Enhanced Transient Response and Voltage
Stability of a DC Microgrid. IEEE , 14th Sept, 2019.
Authors: S. Krishnaveni, B. Jothi, S. Amudha
Paper Title: Personnel Health Care Applications based on Azure Cloud
Abstract: In recent days social insurance turns into a basic issue because of absence of accessibility of master
96. specialists. So as to conquer this issue we are proposing an individual wellbeing Assistant framework which will be
brought together with distributed computing. This paper Propose the iCare Personal Health Assistant from a specialized
523-526
point of view and its advantages for clients. iCare individual wellbeing aide screens patient's wellbeing in an
exceptionally suitable way and produces a notice when the patient's key parameters surpasses the ordinary esteem. The
histological patient information will be exchanged to the Azure distributed storage that can be gotten to by master
specialists and patients by means of iOS portable application. iOS 8 App which can read different wellbeing information
parameters gave by iOS Health Kit Framework and an Azure Web application which all things considered stores every
one of the information to perform straightforward investigation and give an account of wellbeing conditions for a
particular time. The Azure Web application will be created utilizing ASP.NET and facilitated in Microsoft Azure Cloud.
Sky blue Web administrations and Azure Mobile Services are utilized to send push warnings. Therefore, clients get the
most recent wellbeing report alongside couple of suggestive activities to cure that wellbeing condition, assuming any, and
this enables clients to modify their sustenance and exercises as needs be.

Keywords: Healthkit API, Azure Cloud, iOS, Asp.Net, WSDL.

References:
1. Guohua Bai, G., & Malmqvist, G. (2007). Guide to Good Practice of EHealth Research Report. IANIS+GGP ehealth Group.
2. Martin, T., Jovanov, E., & Raskovic, D. (2000) Issues in wearable computing for medical monitoring applications: A case study of a wearable ECG
monitoring device. Int. Symp. Wearable Computers ISWC 2000, Atlanta, GA. doi: 10.1007/s10916-010-9449-4
3. Pantelopoulos, A., Bourbakis, N. G. (2010). Prognosis - A Wearable Health-Monitoring System for People at Risk: Methodology and Modeling.
IEEE Transactions on Information Technology in Biomedicine, 14(3), 613-621.
4. Milenkovic, A., Otto, C., & Jovanov, E. (2010). Wireless sensor network for personal health monitoring: Issues and an implementation. Computer
Communications, 36(1), 93-101.
5. Gregoski, M. J., Mueller, M., Vertegel, A., Shaporev, A. , Jackson, B. B., Frenzel, R. M., ... Treiber, F. A. (2012) Development and validation of a
smartphone heart rate acquisition application for health promotion and wellness telehealth applications. International Journal of Telemedicine and
Applications, 2012 (1). doi: 10.1155/2012/696324
6. LeahC.Osterhaus,“Cloud Computing and Health Information”. [Online]. Available: http://ir.uiowa.edu/ bsides /19/. [Accessed: 06-April-2012]
7. Y. Guo, Y. Hu, J. Afzal, and G. Bai, “Using P2P technology to achieve eHealth interoperability”, in Service Systems and Service Management
(ICSSSM), 2011 8th International Conference on, pp. 1 –5, 2011
Authors: C. Fancy, M. Pushpalatha, Pushpa
Paper Title: Experimentation of Traditional Load Balancing Algorithms in Software Defined Network
Abstract: In the real world, the number of network devices is increasing everyday, managing the network traffic is
becoming very difficult. Hence load balancing plays a major role in maximizing the network throughput and minimizing
the response time. In order to provide a balanced load in any network, a complete knowledge of the current network
status is needed. The process of collecting network status in a traditional network needs additional processing which
increases complexity, whereas, in a Software Defined Network(SDN), the controller keeps track of the nodes, links
between them in the network. Hence it is decided to analyze the working of various load balancing algorithms in SDN.

Keywords: Software Defined Network, OpenFlow, Load Balancing Algorithms, Throughput, Round Robin, Load
Balancer Metrics.

References:
1. Marcel Caria, Admela Jukan and Marco Hoffman, "SDN Partitioning: A Centralized Control plane for distributed routing protocols", IEEE
Transactions on Network and Service Management, Vol.13, No.3, September 2016.
2. Ning Zhang, Peng Yang, Shan Zhang, Dajiang Chen, Weihua Zhuang, Ben Liang and Xuemin(Sherman) Shen, "Software Defined Networking
Enabled Wireless Network Virtualization: Challenges and Solutions", IEEE Network, September/October 2017.
3. Jing (Selena) He, Member, IEEE, Shouling Ji, Student Member, IEEE, Yi Pan, Senior Member, IEEE, and Yingshu Li, Senior Member, IEEE,
"Constructing Load-Balanced Data Aggregation Trees in Probabilistic Wireless Sensor Networks", IEEE Transactions On Parallel And Distributed
Systems, Vol. 25, No. 7, July 2014.
4. Mohamed Aslan, Ashraf, "On the impact of network state collection on the performance of SDN applications", IEEE Communications letter, 2015.
5. Ali Akbar Neghabi, Nima Jafari Navimipour, Mehdi Hosseinzadeh,and Ali Rezaee, "Load balancing mechanisms in the software defined networks:
a systematic and comprehensive review of the literature", IEEE-2018.
6. Hong Zhong, Yaming Fang and Jie Cui, "Reprint of LBBSRT: An efficient SDN load balancing scheme based on server response time", Elsevier
2017.
7. Cui Chen-xiao and Xu Ya-bin, "Research on Load Balance Method in SDN", International Journal of Grid and Distributed Computing, 2016.
97. 8. Nareg Adalin, Georgi Ajaeiya, Zaher Dawy, Imad.H.Elhajj, Ayman Kayssi and Ali Chehah, "Load Balancing in LTE Core Networks Using SDN",
IEEE 2016. 527-532
9. Fengjun Shang, Lin Mao,and Wenjuan Gong, "Service-aware adaptive link load balancing mechanism for Software-Defined Networking", Elsevier
2017.
10. Yang Zhou, Kangfeng Zheng, Wei Ni and Ren Ping Liu, "Elastic Switch Migration for Control Plane Load Balancing in SDN", IEEE Access, 2018.
11. Chuan’an Wang, Bo Hu, Shanzhi Chen, Desheng Li, and Bin Liu, "A Switch Migration-Based Decision-Making Scheme for Balancing Load in
SDN", IEEE Access, 2017.
12. Kiran Nahida, Changchuan Yin, Ying Hu, Zulfiqar Ali Arain, Chunyu Pan, Israr Khan, Yanbin Zhang, and G.M.Shafiqur Rahman, "Handover
based on AP load in software defined Wi-Fi systems", Journal of Communications and Networks, 2017.
13. Ashis Talukder, Sarder Fakhrul Abedin, Md. Shirajum Munir, and Choong Seon Hong, "Dual threshold load balancing in SDN environment using
process migration", IEEE 2018.
14. Suchismita Rout, Sudhansu Shekhar Patra, Bibhudatta Sahoo, and Amiya Kumar Jena, "Load balancing in SDN using effective traffic engineering
method, IEEE 2017.
15. Hongli Xu, He Huang, Shigang Chen, Gongming Zhao, and Liusheng Huang, "Achieving High Scalability Through Hybrid Switching in Software-
Defined Networking", IEEE/ACM Transactions on Networking,2018.
16. Faais.S.Fizi, Shavan Askar, "A novel load balancing algorithm for software defined network based datacenters", International Conference on
Broadband Communications for Next Generation Networks and Multimedia Applications (CoBCom), 2016.
17. Wei-Che Chien, Chin-Feng Lai, Hsin-Hung Cho, Han-Chieh Chao, "An SDN-SFC-based service-oriented load balancing for the IoT applications",
Journal of Network and Computer Applications 114 (2018) 88–97, Elsevier, 2018.
18. Haibo Wang, Hongli Xu, Liusheng Huang, Jianxin Wang, Xuwei Yan, "Load-Balancing Routing in Software Defined Networks with Multiple
Controllers", Computer Networks (2018), doi: 10.1016/j.comnet.2018.05.012.
19. L. Boero a, M. Cello b,C. Garibotto a, M. Marchese a, M. Mongelli, "BeaQoS: Load balancing and deadline management of queues in an
OpenFlow SDN switch", Elsevier 2016.
20. Yehuda Afek, Anat Bremler-Barr, Shir Landau Feibish, Liron Schiff, "Detecting heavy flows in the SDN match and action model", Elsevier 2018.
21. Guodong Wang, Peng Liu, Yanxiao Zhao, Jun Lib, Min Song, "Efficient OpenFlow based Inbound Load Balancing for Enterprise Networks",
Elsevier 2017.
22. Shuo Wang, Jiao Zhang,Tao Huang, Tian Pan, Jiang Liu, Yunjie Liu, "Flow distribution-aware load balancing for the data center", Computer
Communications, Elsevier, 2017.
23. Anil Kumar Rangisetti, Thomas ValerrianPasca S., Bheemarjuna Reddy Tamma, "QoS Aware load balance in software defined LTE networks",
Elsevier 2016.
24. Chung-Ming Cheung, Ka-Cheong Leung, "DFFR: A flow-based approach for distributed load balancing in Data Center, Networks', Computer
Communications, Elsevier 2018.
25. Krisztián Németh,Attila Korösi, Gábor Rétvári, "Optimal resource pooling over legacy equal-split load balancing schemes", Computer Networks,
Elsevier 2017.
26. Nikolaos Leontiou, Dimitrios Dechouniotis, Spyros Denazis, Symeon Papavassiliou, "A hierarchical control framework of load balancing and
resource allocation of cloud computing services", Computers, and Electrical Engineering, Elsevier 2018.
27. Li Li, Jing Shi, "A Highly Reliable and Load Balance Supporting Domain Division Algorithm for Software Defined Networks", ACM 2017.
28. Sohaib Manzoor, Xiaojun Hei, Wenqing Cheng, "Towards Dynamic Two-tier Load Balancing for Software Defined WiFi Networks", ACM 2017.
29. Syed M. Raza, Donghan Park, Yongdeuk Park, Kangwoo Lee, Hyunseung Choo, "Dynamic Load Balancing of Local Mobility Anchors in Software
Defined Networking based Proxy Mobile IPv6", ACM 2016.
30. Naga Katta, Mukesh Hiray, Changhoon Kimz, Anirudh Sivaraman, Jennifer Rexford, "HULA: Scalable Load Balancing Using Programmable Data
Planes", ACM 2016.
Authors: K. Mohanraj, Sampada Raghatate, Astha Gupta, Srishti Tripathi
Paper Title: A High Step-up LUO Converter for Standalone Photovoltaic System
Abstract: This paper shows a prototype of a standalone PV system that is used to power a DC motor using a high step
up LUO converter. LUO Converter is used for this conversion, because it satisfies larger output range, high power
density, low inrush current etc. Solar energy is one of the clean energy sources without polluting the environment. The
PV module can feed power to the system through a DC-DC converter (LUO Converter). A Maximum Power Point
Tracking (MPPT) control technique is required for the PV system to operate the maximum power point. This project uses
the P&O (perturb and observe) algorithm for the maximum power extraction. The MATLab simulation of the hardware is
also carried out giving the output results. The focus of this paper is to power a separately excited DC motor with the help
of PV panel (standalone system) using a LUO converter. The standalone system used here can be very beneficial for
places where grids cannot be connected.

Keywords: PV Systems, LUO Converter, MATLab Simulation, MPPT, Perturb & Observe Algorithm

References:
1. K. Sangeetha, T. S. Babu, N. Sudhakar, N. Rajasekar, "Modeling analysis and design of efficient maximum power extraction method for solar pv
system", Sustainable Energy Technologies and Assessments, vol. 15, pp. 60-70, 2016.
2. A. Gupta, Y. K. Chauhan, R. K. Pachauri, "A comparative investigation of maximum power point tracking methods for solar pv system", Solar
Energy, vol. 136, pp. 236-253, 2016.
3. Jubaer Ahmed, Zainal Salam, "An improved perturb and observe (P&O) maximum power point tracking (MPPT) algorithm for higher efficiency",
Appl. Energy, vol. 150, pp. 97-108, 2015.
4. M. Killi, S. Samanta, "Modified Perturb and Observe MPPT Algorithm for Drift Avoidance in Photovoltaic Systems", IEEE Transactions on
Industrial Electronics, vol. 62, pp. 5549-5559, 2015.
5. X. Y. Zhang, H. G. Zhang, H. Q. Zhang, P. Q. Zhang, F. Wang, H. Jia, D. Y. Song, "A variable step-size P&O method in the application of MPPT
control for a PV system", IEEE, pp. 978-1-4673-9613, 2016.
6. X. Y. Zhang, H. G. Zhang, H. Q. Zhang, P. Q. Zhang, F. Wang, H. Jia, D. Y. Song, "A variable step-size P&O method in the application of MPPT
control for a PV system", IEEE, pp. 978-1-4673-9613, 2016.
7. M. Kaouane, A. Boukhelifa, A. Cheriti, "Design of a Synchronous Sepic DC-DC Converter for a Stand-alone Photovoltaic System", Proc. Canadian
Conference on Electrical and Computer Engineering at Halifax NS on, pp. 870-874, 3-6 May 2015.
98. 8. S. Dhamodharan, M. D. Pradeep, R. Vidhya, P. Yuvaraj, "An Improved Luo Converter for High Power Application", International Journal of
research in engineering and technology, vol. 3 no. 11, pp. 360-365, Nov 2014.
533-537
9. Deepak, Rupendra Kumar Pachauri, Yogesh K. Chauhan, "Modeling and simulation analysis of PV fed Cuk Sepic Zeta and Luo DC-DC
converter", International Conference on Power Electronics Intelligent Control and Energy Systems (ICPEICES), 2016.
10. Y. He ; F.L. Luo, “Analysis of Luo converters with voltage-lift circuit”, IEE Proceedings - Electric Power Applications, vol. 152, issue: 5,p p. 1239
– 1252, 2005.
11. Mohammed A. Elgendy ; Bashar Zahawi ; David J. Atkinson, “Operating Characteristics of the P&O Algorithm at High Perturbation Frequencies
for Standalone PV Systems”, IEEE Transactions on Energy Conversion vol. 30 , pp. 189 – 198, 2015.
12. Moustafa Adly ; Kai Strunz, “Irradiance-Adaptive PV Module Integrated Converter for High Efficiency and Power Quality in Standalone and DC
Microgrid Applications”, IEEE Transactions on Industrial Electronics, vol. 65 , Issue: 1, Page s: 436 – 446, 2018.
13. Mary Helna Muttath,;P Baburaj, Interleaved Luo converter for the residential PV grid Connected systems, IEEE conference, pp. 1-6,2015.
14. Jubaer Ahmed ; Zainal Salam, “A Modified P&O Maximum Power Point Tracking Method With Reduced Steady-State Oscillation and Improved
Tracking Efficiency”, IEEE Transactions on Sustainable Energy, Volume: 7 , Issue: 4, pp. 1506 – 1515, 2016.
15. V. Bist, B. Singh, "Power Factor Correction In A Brushless DC Motor Drive Using An Isolated-Luo Converter", Proc. 6th IEEE Power India
International Conference at Delhi on, pp. 1-6, 5-7 Dec. 2014.
16. P. Kumar et al., "Utilization of Energy Sources in Hybrid PV/FC Power Assisted Water Pumping System", Pproc. IEEE Conference on
Computational Intelligence & Communication Technology, pp. 548-553, 2015.
17. Abhishek Kumar Gupta, Ravi Saxena, "Review on widely-used MPPT Techniques for PV Applications", International Conference on Innovation
and Challenges in Cyber Security (ICICCS-INBUSH), 2016.
18. Yefin Berkovich, Boris Axelrod, Rotem Madar, Avraham Twima, "Improved Luo Converter Modifications with Increasing Voltage Ratio", IET
Power Electron, vol. 8, no. 2, 2015.
19. D. Cheng, T. Zhang, D. Zhu, "Photovoltaic Power System Modeling and Simulation", IEEE International Conference on Power and Renewable
Energy, 2016.
20. A. Rabeb, M. Ferdaous, D. Nabil, "Comparative study of the performances of the DC/DC luo-converter in photovoltaic applications", International
Conference on Smart Monitored and Controlled Cities, 2017.
21. Rabeb Abid; Ferdaous Masmoudi; Nabil Derbel, “Comparative study of the performances of DC-DC luo converter in photovoltaic applications”,
IEEE conferences, pp. 117-122, 2017.
22. A. Rabeb, M. Ferdaous and D. NabiL, ”Comparative study of fundamental variable input converters used for PV conversion systems”, 14th
International Multi-conference on System, Signal and Devices (SSD), 2017.
23. F.L.Luo , “Positive output Luo converters: Voltage lift technique”, IEEE Proc-Elec, Power Appl ,July 2014.
24. S. Sivakumar, M.J. Sathik, P.S. Manoj, G. Sundararajan, "An assessment on performance of DC/DC converters for renewable energy applications",
Renewable and Sustainable Energy Reviews Elsivier, 2016.
25. Mohammadreza Aghaei ; Francesco Grimaccia ; Carlo A. Gonano ; Sonia Leva, “Innovative Automated Control System for PV Fields Inspection
and Remote Control” , IEEE Transactions on Industrial Electronics, vol.62 , Issue: 11, pp. 7287 – 7296, 2015.
Authors: A. Anilet Bala, Pranav Pranshu Kanwar, Shipra Das, Debottama Das
Paper Title: Retinal Image Enhancement based on Contrast, Luminosity Adjustment and MSC
99.
Abstract: Retinal images have been widely used by ophthalmologists for detecting the retinal diseases before-hand and
538-541
diagnosing them suitably. Old age macular degeneration, diabetic retinopathy and glaucoma are some examples of these
diseases. However, poor quality of the image due to inadvertent circumstances limits the ability of the ophthalmologists
to study the image. This paper hereby proposes an algorithm that is used to obtain clearer images by performing contrast
and luminosity adjustment that enhances the basic quality of the clicked image. Following this, Multi-dictionary Sparse
Coding (MSC) is carried out on the image to obtain the retinal vessel structures and miniscule details. Amount of Image
enhancement is calculated by measuring the improvement after each stage of operation on the image. The image's quality
is found to be much better compared to the other methods and thus can be suggested to the ophthalmologists for
conducting the further medical studies conveniently.

Keywords: Retinal Image Enhancement, Multi-Dictionary Sparse Coding (MSC), Contrast-Luminosity Adjustment,
Dictionary Learning, Sparse Coding.

References:
1. M. D. Abramoff et al., “Retinal imaging and image analysis,” IEEE Rev. Biomed. Eng., vol. 3, pp. 169-208, Dec. 2010.
2. A. F. M. Hani and H. A. Nugroho, “Retinal vasculature enhancement using independent component analysis,” J. Biomed. Sci. Eng., vol. 2, no. 7,
pp. 543-549, Nov. 2009.
3. J. Paulus et al., “Automated quality assessment of retinal fundus photos,” Int. J. Comput. Assist. Radiol. Surg., vol. 5, no. 6, pp. 557-564, Nov.
2010.
4. U. Sevik et al., “Identification of suitable fundus images using automated quality assessment methods,” J. Biomed. Opt., vol. 19, no. 4, p. 046006,
Apr. 2014.
5. M. R. K. Mookiah et al., “Computer-aided diagnosis of diabetic retinopathy: a review,” Comput. Biol. Med., vol. 43, no. 12, pp. 2136-2155, Dec.
2013.
6. M. R. K. Mookiah et al., “Computer-aided diagnosis of diabetic retinopathy: a review,” Comput. Biol. Med., vol. 43, no. 12, pp. 2136-2155, Dec.
2013.
7. E. Daniel and J. Anitha, “Optimum green plane masking for the contrast enhancement of retinal images using enhanced genetic algorithm,” Optik,
vol. 126, no. 18, pp. 1726-1730, Sep. 2015.
8. M. Foracchia et al., “Luminosity and contrast normalization in retinal images,” Med. Image Anal., vol. 9, no. 3, pp. 179-190, Jun. 2005.
9. P. Feng et al., “Enhancing retinal image by the Contourlet transform,” Pattern Recogn. Lett., vol. 28, no. 4, pp. 516-522, Mar. 2007.
10. Sazak, Çiğdem, Carl J. Nelson, and Boguslaw Obara. "The multiscale bowler-hat transform for blood vessel enhancement in retinal images."
Pattern Recognition 88 (2019): 739-750.
11. Jebaseeli, T. Jemima, C. Anand Deva Durai, and J. Dinesh Peter. "Segmentation of retinal blood vessels from ophthalmologic Diabetic Retinopathy
images." Computers & Electrical Engineering 73 (2019): 245-258.
12. Wang, Xiaohong, Xudong Jiang, and Jianfeng Ren. "Blood vessel segmentation from fundus image by a cascade classification framework." Pattern
Recognition 88 (2019): 331-341.
13. Dash, Jyotiprava, and Nilamani Bhoi. "A thresholding based technique to extract retinal blood vessels from fundus images." Future Computing and
Informatics Journal 2, no. 2 (2017): 103-109.
Authors: J. Sam Jebakumar, H. Rebecca Shirly, R. Aakash, Madhumitha Anand
Paper Title: Process Control and Wireless Data Management by Constructing a Distributed Control System
Abstract: In the industrial sector, processes are mostly governed by manual methods. Therefore, industrial processes
are physically wired between the controller of field device and master controller. This takes a significant portion of the
total budget. Also in case of fault diagnosis, the entire plant need to be shut down and troubleshooting is tough because
wires are buried underground. This paper aims at reducing the use of wires by transmitting data wirelessly. The
architecture of a distributed control system for the plant will enable the control multiple actions simultaneously and only
critical processes need to shut down for diagnosis. The processes are automated and controller by individual Local
Control Units (LCU). The real-time data from the LCUs are transferred to master controller which is connected to a high-
level human interface (computer). This method eradicates time lag and eliminates long distant wired connections.
Therefore, multiple processes can be monitored and controlled from a far off master (like control room) and also
instruction from master can be sent to the field device through the LCU. Furthermore, an IoT based platform will help in
the remote monitoring of the healthiness of plant. The scope of this paper can extended to any type of real time process
industry.

Index Terms: Process Control, Distributed Control System, Wireless Data Transmission.

References:
1. Eric.J.Byres and Colin Mitchell, “Process control using fibre optic unified cabling system” IEEE industry magazine, May/June 2002.
100. 2. GyeongMoon An, Hiesik Kim, “Optimization of the Wiring in the Sequence Control Circuit”, 2016 International Conference on Electronics,
Information, and Communications (ICEIC), DOI:10.1109/ELINFOCOM.2016.7563007, 08 September 2016 542-544
3. Yongsuk lee and Gyungho lee, “HW-CDI: Hard-Wired Control Data Integrity”,IEEE Access, VOLUME 7, January 2019,
DOI:10.1109/ACCESS.2019.2891762.
4. Liudmila V. Chernenkaya, Elena N. Desyatirikova, Vadim E. Belousov, Stanislav A. Chepelev, Svetlana I. Sergeeva, Nataliya V. Slinkova,
“Optimal Planning of Distributed Control Systems with Active Elements”, 978-1-5386-0777-0/17, 2017 IEEE.
5. Tuyen V. Vu, David Gonsoulin, Dallas Perkins, BehnazPapari, HesanVahedi, and Chris S. Edrington, “Distributed Control Implementation for
Zonal MVDC Ship Power Systems”, 978-1-5090-4944-8/17, 2017 IEEE.
6. Mark J. Nixon, Round Rock, TX (US);Terrence Blevins, Round Rock, TX(US);
7. Daniel Dean Christensen, Austin, TX (US); Paul Richard Muston, Narborough (GB); Ken Beoughter, Round Rock, TX (US), “big data in process
control systems”, Patent NO.: US 9,558,220 B2, Jan. 31, 2017.
8. Shancang Li, LiDaXu, and Xinheng Wang, “Compressed Sensing Signal and Data Acquisition inWireless Sensor Networks and Internet of
Things”, IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 9, NO. 4, NOVEMBER 2013.
9. “Disadvantages of ZigBee protocol”
10. https://www.ecstuff4u.com/2018/03/advantages-and-disadvantages-of-zigbee.html
11. “Advantages of nRF24L01”
12. http://smartmicrocontroller.com/5-reasons-to-use-2-4ghz-wireless-for-your-projects/
13. Abid Rahim, Zeeshan Ali, Raushan Bharti, Syed Sabeel N.S.P., Mrs. Ramya B.K., “Design and Implementation of a Low Cost Wireless Sensor
Network using Arduino and nRF24L01(+)”, International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 – 0882,
Volume 5, Issue 5, May 2016.
14. AbdelghaniDaraiseh, Dhahran Mohamed Adnan Landolsi, “Adaptive hybrid wireless and wired process control system with hierarchical process
automation field network sets”, Patent No.: US 8,942,098 B2, Jan. 27, 2015.
15. Neil J. Peterson, Trevor D. Schleiss,” Location dependent control access in a process control system” Patent No.: US 9.244.455 B2, Jan. 26, 2016.
16. Francisco B. Culibrina, Elmer P. Dadios, “Smart Farm Using Wireless Sensor Network for Data Acquisition and Power Control Distribution”, 8th
IEEE International Conference Humanoid, Nanotechnology, Information Technology Communication and Control, Environment and Management
(HNICEM), December 2015.
17. Raguvaran. K, Mr. J. Thiyagarajan, “Raspberry PI Based Global Industrial Process Monitoring Through Wireless Communication”, International
Conference on Robotics, Automation, Control and Embedded Systems – RACE 2015, ISBN: 978−81−925974−3−0, February 2015.
18. H. Fekhar, H. Habbi, “Design and implementation of wireless system by Using microcontrollers and microcomputer with application to drive
acquisition system”, 978-1-5090-5987-4/17/ 2017 IEEE, Jnuary 2017.
19. Linghe Kong, Mingyuan Xia, Xiao-Yang Liu, Guangshuo Chen, Yu Gu, Min-You Wu, Xue Liu, “Data Loss and Reconstruction in Wireless Sensor
Networks”, IEEE transactions on parallel and distributed systems, vol. 25, no. 11, november 2014.
20. Yan Yu, Member, IEEE, Feng Han, YuequanBao, and Jinping Ou, “A Study on Data Loss Compensation of WiFi-Based Wireless Sensor Networks
for Structural Health Monitoring”, IEEE SENSORS JOURNAL, vol. 16, no. 10, may 15, 2016.
21. “Ultrasonic HC-SR04 sensor datasheet” https://cdn. sparkfun.com /datasheets/Sensors/Proximity/HCSR04.pdf
22. “AtMega328 datasheet”
23. https://www.sparkfun.com/datasheets/Components/SMD/ATMega328.pdf
24. “nRF24L01 datasheet”
25. https://www.sparkfun.com/datasheets/Components/nRF24L01_prelim_prod_spec_1_2.pdf
26. “Temperature DS18B20 sensor datasheet”
27. https://cdn.sparkfun.com/datasheets/Sensors/Temp/DS18B20.pdf
Authors: D. Anitha, R. Uthra, N. Kalaiarasi
Paper Title: Simulation of Grid-connected Photovoltaic System with Real and Reactive Power Control
Abstract: This paper presents a small scale three-phase grid connected system for domestic establishments. The
proposed system includes a 4.8 kW PV panel with a DC-DC boost converter with controller for Maximum Power Point
Tracking (MPPT), DC-AC inverter with decoupled power controller supplying the load and connected to the grid. The
MPPT controller is used to harvest maximum power from the solar panel and decoupled power controller is used for
tracking the real and reactive powers and also improves the system stability. The simulation of the proposed model is
carried out to show the effectiveness of grid-connected photovoltaic systems.

Keywords: PV Panel, DC-DC Converter, Voltage Source Inverter, MPPT, PQ Control Strategy.

References:
1. Adhikari, S. and Fangxing Li, F, “Coordinated v-f and p-q control of solar photovoltaic generators with MPPT and battery storage in microgrids”,
IEEE Transactions on Smart Grid, Vol.5, No.3, pp.1270-1281, 2014.
2. Zhaohui Cen, “Modeling and simulation for an 8 kW three-phase grid connected photovoltaic power system”, Open Physics, Vol.15, pp.603-612,
2017.
3. Tomas Hornik and Qing-Chang Zhong, “A Current-Control Strategy for Voltage-Source Inverters in Microgrids Based on H∞ and Repetitive
Control “, IEEE Transactions on Power Electronics, Vol.26, Issue 3, pp. 943-952, 2011.
4. Mohammed Aslam Husain, Abu Tariq, Salman Hameed, M. Saad Bin Arif, Abhinandan Jain, “A. Comparative assessment of maximum power
101. point tracking procedures for photovoltaic systems”, Green Energy & Environment, Vol. 2, Issue 1, pp. 5-17. 2017.
5. Md. Rabiul Islam, Youguang Guo, Jian Guo Zhu, M. G. Rabbani, “Simulation of PV array characteristics and fabrication of microcontroller based 545-550
MPPT”, International Conference on Electrical & Computer Engineering, Dec. 2010.
6. Esraa M. Ismail, Isam M. Abdulbaqi, Ammar I. Majeed, “New mppt algorithm based on pic microcontroller”, Proceeding of the 2nd Sustainable &
Renewable Energy Conference, 2016.
7. S. Sheik Mohammed, Devaraj, D., “Simulation and analysis of stand-alone photovoltaic system with boost converter using MATLAB/Simulink”,
International Conference on Circuits, Power and Computing Technologies, 2014.
8. Altaf Mudhol, Dr. Pinto Pius A.J, “Design and implementation of boost converter for photovoltaic systems”, International Journal of Innovative
Research in Electrical, Electronics, Instrumentation and Control Engineering, Vol.4, Special issue 2, pp.110-114, 2016
9. Partha Sarathi Paul, Sudipta Mondal, Akter Nasrin, and Sharif Mohammad Mominuzzaman, “Modelling combined effect of temperature and
irradiance on solar cell parameters by MATLAB/ Simulink”, 8th International Conference on Electrical and Computer Engineering, Dec.2014.
10. Hesam Rahbarimagham, Erfan Maali Amiri, Behrooz Vahid, Gevorg Babamalek Gharehpetian, Mehrdad Abedi “Superior decoupled control of
active and reactive power for three- phase voltage source inverter”, Vol.23, pp.1025-1039, 2015.
11. Mhamed Rebhi, Ali Benatillah, Mabrouk Sellam, Boufeldja Kadri, “Comparative Study of MPPT Controllers For PV System Implemented in the
South-West Of Algeria”, Energy Procedia, Vol.36, pp.142-153, 2013.
12. Joan Rocabert , Alvaro Luna , Frede Blaabjerg , Pedro Rodríguez, “Control of power converters in AC microgrids”, IEEE Transactions on Power
Electronics, Vol.27, Issue 11, pp.4734-4749, 2012.
13. Pooja Sahu, Deepa Verma, Nema.S, “Physical design and modelling of boost converter for maximum power point tracking in solar PV systems”,
International Conference on Electrical Power and Energy Systems (ICEPES). 2016.
14. S.N., P. and Prasad, R. C. “Design and development of MPPT algorithm for high efficient DC-DC converter for solar energy system connected to
grid”, International Conference on Energy Systems and Applications, 2015.
15. Hoang Giang Vu, Hamed Yahoui, Thierry Chorot, Hassan Hammouri, “Control active and reactive power of voltage source inverter (VSI)”, 2nd
International Symposium on Environment Friendly Energies And Applications, 2012.
Authors: D. Karthikeyan, K. Vijayakumar, Tejas Saptarshi, Mayank Kheria, Snigdha Kumari
Paper Title: Implementation of Improved BLDC based Ceiling Fan Control Using Zeta Converter with Fuzzy Controller
Abstract: This paper deals with the implementation of Zeta Converter fed BLDC motor using fuzzy logic control with
PV as source. The idea is to reduce the torque ripples and improve the speed and power factor keeping the cost and the
maintenance factors minimum. The suggested model is compared with the boost converter fed BLDC motor using PI
control and the comparative analysis is made on the basis of torque, power factor and speed. Moreover, the ease of
compensation with smooth and stable operation of the system is also being considered as a priority. The evaluation is
made using the Matlab Simulink and the hardware of the suggested model is successfully implemented. Through the
102. comparative analysis Zeta converter fed BLDC motor with fuzzy logic control is found to be superior in terms of speed,
torque and power factor.
551-559
Keywords: Boost-converter, Zeta converter, PI control, Fuzzy Logic, BLDC Motor, Ceiling Fan, Matlab.

References:
1. R. Kumar and B. Singh, “Solar PV array fed Cuk converter-VSI controlled BLDC motor drive for water pumping,” 6th IEEE Power India Int.
Conf. (PIICON), 5-7 Dec. 2014, pp. 1-7.
2. B. Singh and V. Bist, “A BL-CSC Converter-Fed BLDC Motor Drive With Power Factor Correction,” IEEE Trans. Ind. Electron., vol. 62, no. 1,
pp. 172-183, Jan. 2015.
3. Rajan Kumar and Bhim Singh, “Buck-boost converter fed BLDC motor drive for solar PV array based water pumping,” in IEEE International
Conference on Power Electronics, Drives and Energy Systems (PEDES), 16-19 Dec. 2014, pp.1-6.
4. Ali Reza Reisi, Mohammad Hassan Moradi and ShahriarJamasb,“Classification and Comparison of Maximum Power Point TrackingTechniques for
Photovoltaic System: A review,” Renewable andSustainable Energy Reviews, vol. 19, pp. 433-443, March 2013.
5. Solar PV Array Fed Brushless DC Motor DrivenWater Pump *Bhim Singh, Fellow, IEEE, and **Rajan Kumar, Member, IEEE Deptt. of Electrical
Engg., Indian Inst. of Tech. Delhi, New Delhi-110016, India.
6. Rajan Kumar and Bhim Singh, “Solar photovoltaic array fed Luo converter based BLDC motor driven water pumping system,” in 9th International
Conference on Industrial and Information Systems (ICIIS), 15-17 Dec. 2014, pp.1-5.
7. Rajan Kumar and Bhim Singh, “Solar photovoltaic array fed canonical switching cell converter based BLDC motor drive for water pumping
system,” in Annual IEEE India Conference (INDICON), 11-13 Dec. 2014, pp.1-6.
8. M. H. Taghvaee, M. A. M. Radzi, S. M. Moosavain, HashimHizam and M. Hamiruce Marhaban, “A Current and Future Study on Non- solated
DC–DC Converters for Photovoltaic Applications,” Renew. Sustain Energy Rev., vol. 17, pp. 216-227, Jan. 2013.
9. Standard Solar PV Module Specifications [Online]. Available:http://www.hbl.in/brochures%20pdf/SOLAR%20MODULEBroucher. Pdf
10. W.V. Jones, “Motor Selection Made Easy: Choosing the Right Motor for Centrifugal Pump Applications,” IEEE Ind. Appl. Mag., vol.19, no.6,
pp.36-45, Nov.-Dec. 2013.
11. BoualemBendib, HocineBelmili and FatehKrim, “A survey of the most used MPPT methods: Conventional and advanced algorithms applied for
photovoltaic systems,” Renew. Sustain. Energy Rev., vol. 45, pp. 637- 648, May 2015.
12. M.A.G. de Brito, L. Galotto, L.P. Sampaio, G. de Azevedo e Melo and C.A. Canesin, “Evaluation of the Main MPPT 6Techniques for Photovoltaic
Applications,” IEEE
13. Rajan Kumar and Bhim Singh, “BLDC Motor Driven Solar PV ArrayFed Water Pumping System Employing Zeta Converter,” in 6th IEEEIndia
International Conference on Power Electronics (IICPE), 8-10 Dec.2014.
14. R.F. Coelho, W.M. dos Santos and D.C. Martins, “Influence of PowerConverters on PV Maximum Power Point Tracking Efficiency,”
10thIEEE/IAS International Conference on Industry Applications(INDUSCON), 5-7 Nov. 2012.
15. M. Ouada, M.S. Meridjet and N. Talbi, “Optimization Photovoltaic Pumping System Based BLDC Using fuzzy Logic MPPTControl,” International
Renewable and Sustainable Energy Conference (IRSEC), 7-9 March 2013, pp. 27-31.
16. A. Terki, A. Moussi, A. Betka and N. Terki, “An Improved Efficiency ofFuzzy Logic Control of PMBLDC for PV Pumping System,”
AppliedMathematical Modelling, vol. 36, issue 3, pp. 934-944, March 2012.
17. A. Terki, A. Moussi, A. Betka and N. Terki, “An Improved Efficiency ofFuzzy Logic Control of PMBLDC for PV Pumping System,”
AppliedMathematical Modelling, vol. 36, issue 3, pp. 934-944, March 2012.
18. Cheniang Wang, Wei Chen, Shao Shao, Energy management in standalone hybrid pv system.
19. E. Dunin, M.B. Ferrera, 1M.Andujar, M.S. Mesa (2011) “I-V and P-V Curves Measuring System for PV Modules based on DC-DC Converters and
Portable Graphical Environment” IEEE, 97S4244.Qef
20. Vishwanatha Siddhartha, Yogesh V. Hote, Systematic Circuit Design and Analysis of a non ideal DC-DC Pulse Width Modulation Boost
Converter.
Authors: R. Uthra, D. Anitha, N. Kalaiarasi
Paper Title: Reactive Power Compensation in Wind Energy System
Abstract: Multiple Sources of generation is being introduced in current day power systems with an increasing number
of wind energy systems being integrated due to the focus on creating a sustainable energy network in the future. When
the network is subjected to severe interruptions like voltage sag or short circuit fault, the wind energy systems usually
gets disconnected from the grid so that the system is protected from voltage drops in the range of 0.2 to 0.3 pu. This
becomes detrimental to the stability of the system with the large integration of wind generators in the power system
network due to the loss of a considerable part of wind generators during a transient disturbance. The proposed scheme
seeks to utilize an effective vector control strategy for reactive power compensation which assists in the accelerated
restoration of terminal voltage.

Index Terms: LVRT, Reactive Power Compensation, Vector Control, Wind Energy.

References:
1. K Vinothkumar, M P Selvan; “Enhanced fault ride-through scheme and c¬oordinated reactive power control for DFIG” IEEE ICSET 2010 6-9 Dec
2010, Kandy, Sri Lanka
2. M. Mohseni S. Islam M.A.S. Masoum; “Fault ride-through capability enhancement of doubly fed induction wind generators” Published in IET
Renewable Power generation, Received on 19thAugust 2010, Revised on 11th November 2010.
3. Ziyu Chen, Jing He, Dongjun Wang, Qing Li and ShiyaoQin;”A simplified wind farm simulation method for LVRT capability assessment” 2014
International Conference on Power System Technology (POWERCON 2014) Chengdu, 20-22 Oct. 2014
4. Gonzalo Abad, Jesu´sLo´pez, Miguel A. Rodrı´guez, Luis Marroyo, Grzegorz Iwanski; ”Doubly Fed Induction Machine: Modeling And Control
For Wind Energy Generation”
103. 5. Haitham Abu-Rub, Mariusz Malinowski, Kamal Al-Haddad;”POWER ELECTRONICS FOR RENEWABLE ENERGYSYSTEMS,
TRANSPORTATION AND INDUSTRIAL APPLICATIONS”
6. Lihui Yang, Zhao Xu, Jacob Østergaard, Zhao Yang Dong and Kit Po Wong,”Advanced control strategy of DFIG wind turbines for power system 560-564
fault ride through”, IEEE Transactions on Power Systems, VOL. 27, NO. 2, MAY 2012
7. KaziAhsanullah and Jayashri Ravishankar, “Fault ride-through of doubly-fed induction generators”
8. JohenMorren, Sjoerd W. H. De Haan, “Ridethrough of wind turbines with doubly fed induction generator during a voltage dip,” IEEE Transactions
on Energy Conversion, Vol. 20, No. 2, pp. 435-441, 2005.
9. R. Pena, J. C. Clare, and G. M. Asher, “Doubly fed induction generator using back-to-back PWM converters and its application to variable speed
wind-energy generation,” IEE Proc. Electric Power Applications, Vol. 143, No. 3, pp. 231–241, May 1996.
10. Thomas Ackermann, “Wind power in power systems” The Atrium, England, John Wiley,and sons limited 2005.
11. Anca D. Hansen, Gabriele Michalke, “Fault ride-through capability of DFIG wind turbines,” Renewable Energy, Vol. 32, No. 9, pp. 1594- 1610,
2007.
12. Erlich, I., Kretschmann, J., Fortmann, J., Engelhardt, S.M., Wrede, H.: “Modeling of wind turbines based on doubly-fed induction generators for
power system stability studies”, IEEE Trans. Power Syst., 2007, 22, (3), pp. 909–919
13. Baqi, O.A., Nasiri, A.: ‘A dynamic LVRT solution for doubly fed induction generators’, IEEE Trans. Power Electron., 2010, 25, pp. 193–196
14. Foster, S., Xu, L., Fox, B.: ‘Coordinated reactive power control for facilitating fault ride through of doubly fed induction generator- and fixed speed
induction generator-based wind farms’, IET Renew. Power Generation, 2010, 4, (2), pp. 128–138
15. A. Ahmad and R. Loganathan, “Development of LVRT and HVRT control strategy for DFIG based wind turbine system”, in IEEE International
Energy Conference, Dec 18-21, 2010, Bahrain, pp.316- 321.
16. B. Xie, B. Fox, and D. Flynn, “Study of fault ride-through for DFIG based wind turbines”, in IEEE Int. Conf. Electric Utility Deregulation,
Restructuring and Power Technologies, China, April 2004.
17. S. Foster, L. Xu, and B. Fox, "Coordinated reactive power control for facilitating fault ride through of doubly fed induction generator- and fixed
speed induction generator-based wind farms," IET Renewable Power Generation, vol. 4, pp. 128-138, 2010.
18. S. M. Muyeen, Rion Takahashi, Toshiaki Murata, and Junji Tamura, "A variable speed wind turbine control strategy to meet wind farm grid code
requirements," IEEE Transactions on Power Systems, vol. 25, no. 1, pp.331-340, 2010.
19. C. Rahmann, H. J. Haubrich, L. Vargas, and M. B. C. Salles, "Investigation of DFIG with Fault Ride-Through Capability in Weak Power Systems,"
in IPST Kyoto, Japan, 2009, pp. 1-6.
20. AndrzejGeniusz, Stephan Engelhardt, and JoergKretschmann, "Optimised fault ride through performance for wind energy systems with doubly fed
induction generator," in EWEC, Brussels, 2008, pp. 1-9.
Authors: K. Mohanraj, B. Yokesh Kiran
Paper Title: PV Integrated SEPIC Converter Using Maximum Power Point Tracking for Ac Loads
Abstract: A PV integrated SEPIC converter where it able trace out the maximum power point (MPP) of a photovoltaic
(PV) source and it can able to generates a sine output for AC loads and grid connected application. It is double stage
topology where it traces and finds out the maximum power point of PV source using P&O algorithm. To enable
connection with the PV model, where it needs the regulation and compact are increased with a double stage that traces
out the Maximum power in PV source, the input of PV system is DC voltage where its boost with the help of SEPIC
converter and it able to generate a regulated sine output using single or three phase inverter for a standalone system in AC
loads and grid connected applications. In proposed system in order to get the maximum power point in photovoltaic input
where it is compared with sinusoidal pulse width modulation in order to get voltage and current. A converter is SEPIC
converter and the PV panel is controlled by a sinusoidal pulse width modulation using PI controller where it helps to
controlling the duty cycle ratio of SEPIC converter. A hardware prototype of PV integrated SEPIC converter for a
standalone system that operates at 70W PV module system and delivering sine output voltage of 110V rms, with 50Hz
frequency and the output simulations are presented.

Keywords: Photovoltaic (PV), Maximum Power Point Tracking (MPPT), SEPIC Converter.

References:
1. P.K.Peter and V.Agarwal, "Photovoltaic Module-Integrated Stand-alone Single-Stage Switched Capacitor Inverter with Maximum Power Point
Tracking," in IEEE Transactions on Power Electronics, vol. 32, no. 5, pp. 3571-3584, May 2017,
2. M.D. Seeman, S.R. Sanders, “Analysis and optimisation of switched capacitor dc-dc converters”, IEEE Transactions on Power Electronics”, vol.23,
no.2, pp. 841-851, March 2008.
3. A. Ioinovici, C.K. Tse, H.S. Chung, “ Comments on ‘Design and analysis of switched apacitor based step up resonant converters’”, IEEE
Transactions on circuits and systems, vol 53, no. 6, pp.1403, 2006.
4. J. Liu, Z. Chen, Z. Du, “A new design of power supplies for pocket computer systems”, IEEE Transactions on Industrial Electronics, vol 45, issue
2, pp. 228-235, April 1998.
104. 5. C. K. Cheng, S. C. Tan, C. K. Tse, A. Ioinovici, “On the energy efficiency of switched capacitor converters”, IEEE Transactions on power
electronics, vol. 28, no. 2, pp.862-876, Feb 2013.
6. G. V. Pique, H. J. Bergveld, E. Alarcon, “Survey and benchmark of fully integrated switching power converters: Switched capacitor versus 565-570
inductive approach”, IEEE Transactions on power electronics, vol. 28, no. 9, pp.4156-4167, Sept. 2013.
7. F. Zhang, L. Du, F. Z. Peng, “A new design method for high power high efficiency switched capacitor dc-dc converters”, IEEE Transactions on
power electronics, vol. 23, no. 2, pp.832-840, Mar 2008.
8. A. Kushnerov, “High efficiency self adjusting switched capacitor dc-dc converter with binary resolution” M.S thesis, Dept. of Elect. Eng. And
Computer Science, Ben Gurion University of Negev, Beer-Sheva, 2009, pp. 94.
9. Y.K.Ramadass, A.PChandrakasan, “Voltage scalable switched capacitor dc-dc converter for ultra low power on chip applications”, IEEE Power
Electronics Specialists Conference, June 2007, pp. 2353-2359.
10. T. B. Lazzarin, R. L. Anderson, G. B. Martins, I. Barbi, “A 600W switched capacitor ac-ac converter for 220V / 110V and 110V / 220V
applications, “IEEE Transactions on power electronics, vol. 27, no. 12, pp.4821-4826, Dec.2012.
11. P. M. Lin, L. O. Chau, “Topological generation and analysis of voltage multiplier circuits”, IEEE Transactions on circuits and systems, vol. cas-24,
no. 10 , pp. 517-530, Oct. 1997.
12. O. Mak, A. Ioinovici, “Switched capacitor inverter with high power density and enhanced regulation capability”, IEEE Transactions on circuits and
systems-I: Fundamental theory and applications, vol. 45, no. 4 , pp. 336- 346, Apr. 1998.
13. Y. H. Chang, “Design and analysis of power CMOS gate based switched capacitor boost dc-ac inverter”, IEEE Transactions on circuits and
systems-I: Regular papers, vol. 51, no. 10 , pp. 1998-2016, Oct. 2004.
14. Y. H. Chang, “Design and analysis of multistage multiphase switched capacitor boost dc-ac inverter”, IEEE Transactions on circuits and systems-I:
Regular papers, vol. 58, no. 1 , pp. 205-218, Jan. 2011.
15. K. Zou, M. J. Scott, J. Wang, “Switched capacitor cell based voltage multipliers and dc-ac inverters”, IEEE Transactions on Industry applications,
vol. 48, no. 5 , pp. 1598-1609, Oct. 2012.
16. K. Ishimatsu, I. Oota, F. Ueno, “A dc-ac converter using a voltage equational type switched capacitor transformer”, 13th annual applied power
electronics conference and exposition, vol. 2, pp. 603-606,Mar 1998.
17. H. Patangia, E. Dervishi, “A switched capacitor inverter for driving a highly capacitive load”, IEEE International conference on industrial
technology”, pp. 525-529,Feb 2004.
18. Y. Ye, K. W. E. Cheng, J. Liu, K. Ding, “A step up switched capacitor multilevel inverter with self voltage balancing”, IEEE Transactions on
industrial electronics, vol. 61, no. 12 , pp. 6672-6680, Dec. 2014
19. J. Liu, K. W. E. Cheng, Y. Ye, “A cascaded multilevel inverter based on switched capacitor for high frequency ac power distribution system”, IEEE
Transactions on power electronics, vol. 29, no. 8, pp.4219-4230, Aug. 2014.
20. Y. Hinago, H. Koizumi, “A switched capacitor inverter using series / parallel conversion with inductive load”, IEEE Transactions on industrial
electronics, vol. 59, no. 2, pp. 878-887, Feb. 2012.
Authors: Niharika Banerjee, Preety Manna, K. Surendhirababu, K. Venkatasubramani
Paper Title: Enhanced Smart Energy Meter Using IOT
Abstract: In our day to day life electricity plays a vital role. India has power generating capacity of 334.4 gigawatt as
of January 2018. The primary energy consumption of India is the 3rd biggest after China and U.S.A with 5.6% of the
global share in 2018. The main objective of this project is to make people aware about the power consumption in our day
to day life so that we can save energy. There will be a particular peak value set in the system and if the power
consumption exceeds the particular value set, then the alarm will start buzzing. And also, the project will give notification
105. about the power theft, power cut and overloading by using PIC16F877A micro-controller and a GSM module (Global
System for Mobile Communication). The advantage of this system is that it reduces human dependency, labour and it
571-576
helps in bringing awareness about the usage of energy in household and private sectors.

References:
1. F.ReniClenitiaa ,G.S.Preetha, B.Meenakshi “Digital Enhanced Energy meter”Institute of Electrical and Electronics Engineering (IEEE)
Conference, 2017
2. Mohammad Hossein Yaghmaee and Hossein Hejazi “Design and Implementation of an Internet of Things Based Smart Energy Metering” Institute
of Electrical and Electronics Engineering (IEEE), 2018.
3. K.S.K Weranga, D.P.Chandima, S.P.Kumarawadu “Smart Metering for next generation efficiency & amp; conservation ” ” Institute of Electrical
and Electronics Engineering(IEEE) Conferences, 2012.
4. Sarayut Yaemprayoon, Vishnu Boonplian, Jakkree Srinonchat, “Developing an innovation smart energy meter using C S5490” Institute of
Electrical and Electronics Engineering(IEEE) Conferences, 2016.
5. Muhammad Saad, Muhammad Faraz Tariq, Amna Nawaz, Muhammad Jasir Jamal “Theft detection based GSM Prepaid electricity system”
Institute of Electrical and Electronics Engineering (IEEE) Internatinal Conference, 2017.
6. GuifenGu, Guili Peng “The survey of GSM wireless communication system” Institute of Electrical and Electronics Engineering (IEEE)
International Conference, 2010.
7. Abdur Rahim Biswas and Raffaele Giaffreda “IoT and Cloud Convergence: Opportunities and Challenges” Institute of Electrical and Electronics
Engineering (IEEE), 2014.
8. MimozaIbrani, EnverHamiti, Luan Ahma,RrezeHalili, Besa Dragusha “Comparative analysis of download signal levels emitted by GSM 900, GSM
1800, UMTS and LTE base station” Institute of Electrical and Electronics Engineering (IEEE) Conferences, 2017.
9. Soochang Park, Noel Crespi, Hosung Park, “IOT routing architecture with autonomous systems of things ” IEEE World Forum on Internet Of
Things, 2014.
10. Hamdan Hejazi, Husam Rajab, Tibor Cinkler, László Lengyel “Survey of platforms for massive IoT”IEEE International Conference on Future
Technologies (Future ), 2018.
11. P.A.V. Loss, M.M. Lamego, G.C.D. Sousa, J.L.F. Vieira “A single phase microcontroller based energy meter ”IEEE conference, 1998.
12. Qui Sun, Hailong Li, Zhanyu Ma, Chao Wang, Qi Zhang, Fredrik Walin, Jun Guo, Javier Campillo“A Comprehensive Review of Smart Energy
Meters in Intelligent Energy Networks ” Institute of Electrical and Electronics Engineering (IEEE),2016.
13. V. Preethi, G. Harish, “Design and implementation of smart energy meter”, International Conference on Inventive Computation Technologies
(ICICT), 2016.
14. Stefan Erhardt, Bernhard Gaede , Robert Weigel , Alexander Koelpin, “Enhanced GSM Broadcast Receiver Using the Phase Output of a Sub-GHz
Tranceiver”, 2018 48th European Microwave Conference (EuMC), 2018.
15. V. Soma Sekhar, R.Puviarasi, “Simulation of GSM Based Power theft detection using Proteus”, Institute of Electrical and Electronics Engineering
(IEEE) , 2018.
16. [16] S Visalatchi , K Kamal Sandeep, “Smart energy metering and power theft control using Arduino and GSM”, Institute of Electrical and
Electronics Engineering(IEEE), 2016.
17. Mohammad Hossein Yaghmaee , Hossein Hejazi , “Design and Implementation of an Internet of Things Based Smart Energy Metering”, Institute
of Electrical and Electronics Engineering (IEEE) Conference, 2018.
18. HimshekharDas , L.C Saikia , “GSM enabled smart energy meter and automation of home appliances”, ” Institute of Electrical and Electronics
Engineering (IEEE), 2015.
19. M. Prathik , K.Anitha , V. Anitha, “Smart energy meter surveillance using IOT”, Institute of Electrical and Electronics Engineering(IEEE),2018.
20. Yogesh. S. Kale, Prachi D. Gawande, Manish Sahane, D. S. Tiple, “Control the waste of electricity using GSM controller”, Institute of Electrical
and Electronics Engineering (IEEE) Conference on Electronics, Communication and Aerospace Technology (ICECA), 2018.
Authors: D. Karthikeyan, V. Kubendran, K. Vijayakumar, Sumit Saurabh, Varnit Singh, Kshitiz Kumar
Paper Title: Implementation of Novel Multi Level Inverter Topology with Reduced Number of Power Components
Abstract: A new cascade topology multilevel converter using H-bridge is introduced in the paper, which will have
several sub multilevel components. The proposed topology is further enhanced to generate any level of voltage as per
requirement with reduced number of power components. The proposed topology is compared with various updated new
multilevel inverter topology and its result is validated using different pwm techniques like NLT, PD, and POD.
Experimental work will be done for analysis of performance of proposed converter. As the multilevel inverters have
better features, but due to the usage of more switches, it faces limitation up to its wide range of applications. Therefore an
optimized 9-level multilevel inverter topology is being introduced with less number of switches and necessary switching
sequence which ensures reduced size, minimum switching losses as well as reduction in its initial cost. The new topology
will be best suited for renewable energy applications like solar photovoltaic and for drives. The performance quality will
be demonstrated in terms of THD, Vrms and Irms values and these will be compared to the cascaded multilevel inverter
and other 9-level inverter topology using the above mention techniques. The result will be validated through
MATLAB/SIMULINK software

Keywords: Multilevel inverter, Reduced power switches/components H-bridge, MATLAB/SIMULINK

References:
1. L. Maharjan, S. Inoue, H. Akagi, and J. Asakura. “State-of- charge (SOC)-balancing control of a battery energy storage system based on a cascade
PWM converter,” IEEE Trans. Power Electron, Vol. 24, No. 6, pp. 1628-1636, Jun. 2009.
2. Himour, K. Ghedamsi, and E. M. Berkouk, “Supervision and control of grid connected PV-Storage systems with the five level diode clamped
106. inverter,” Energy Conversion and Management, Vol. 77, pp. 98-107, Oct. 2013.
3. M. F. Escalante, J.-.C. Vannier, and A. Arzandé, “Flying capacitor multilevel inverters and DTC motor drive applications,” IEEE Trans. Ind.
Electron, Vol. 49, No.4, pp.809-815, Aug. 2002. 577-587
4. Ramani, M. A. J. Sathik, and S. Sivakumar, “A new symmetric multilevel inverter topology using single and double source sub-multilevel
inverters,” JPower Electron., Vol. 15, No. 1, pp. 96-105, Jan. 2015.
5. J. Rodr´ıguez, J.-S. Lai, and F. Z. Peng, “Multilevel inverters: A survey of topologies, controls, and applications,” IEEE Trans. Ind. Electron., vol.
49, no. 4, pp. 724–738, Aug. 2002.
6. R. S. Alishah, S. H. Hosseini, E. Babaei, and M. Sabahi, “Optimal design of new cascaded switch-ladder multilevel inverter structure,” IEEE Trans.
Ind. Electron., Vol. 29, No. 12, pp. 6712-6724, Dec. 2014.
7. Malinowski, K. Gopakumar, J. Rodriguez, and M. A. Pérez, ―A Survey on cascaded multilevel inverters,‖ IEEE Trans. Ind. Electron., vol. 57, no.
7, pp. 2197-2206, July 2010.
8. [8]S.J.Park,F.S.Kang,M.H.Lee,andC.U.Kim,―Anew single-phase five-level PWM inverter employing a deadbeat control scheme,‖ IEEE Trans.
Power Electron., vol. 18, no. 18, pp. 831–843, May 2003.
9. A. Farakhor, R. Reza Ahrabi, H. Ardi, and S. N. Ravadanegh, “Symmetric and asymmetric transformer based cascaded multilevel inverter with
minimum number of components,” IET Power Electron., Vol. 8, No.6, pp.1052-1060,Jun. 2015.
10. Divya Subramanian, Rebiya Rasheed,“Nine-Level Cascaded H-Bridge Multilevel inverter”, International Journal of Engineering and Innovative
Technology (IJEIT) Volume 3, Issue 3, September 2013.
11. Vivekkumar.A.Patel, Prakash.K. Jariwala, Divyakant. V. Parmar, Pratik. B. Patel, Priyank.D.Patel, “A Simplified Topology for Nine level
Modified Cascaded H-bridge Multilevel Inverter with Reduced Number of Switch & Low THD”, International Research Journal of Engineering
and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 04 | Apr -2017.
12. Datar Singh Nathawat, Vishnu Goyal , “A Symmetric 9 - Level Multilevel Inverter with Minimum Number of Device”, International Journal of
Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-6 Issue-1, June 2016.
13. Ganesh G. Thakor ,Mrs. N. S. Nizami , “Analysis of Different Modulation Techniques for Reverse Voltage Nine Level Inverter with Reduced
Number of Switch”,IJSTE - International Journal of Science Technology & Engineering | Volume 3 | Issue 08 | February 2017
14. Rohini Sharma, Gagandeep Sharma, Prabhu Omer, “Cascaded Nine Level Inverter Using Pulse Width Modulation And Hybrid PWM”,Rohini
Sharma et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 5( Version 6), May 2014 Converter.
15. Poh Chiang Loh, Donald Grahame Holmes, Yusuke Fukuta, and Thomas A. Lipo, “Reduced Common-Mode Modulation Strategies for Cascaded
Multilevel Inverters”, IEEE vol. 39, no. 5, September 2013.
16. M S. Sivagamasundari and dr P.Melba Mary,Analysis of cascaded five level multilevel inverter using hybrid pulse width modulation, International
Journal of Emerging Technology and Advanced Engineering, Vol. 3, Issue 4, April 2013
17. Murugesan, R. Pari, T. Bharani Prakash, R. Sakthivel and D. Pushpalatha ,Analysis and Implementation of Modified Hybrid Multilevel Inverter for
Induction Motor Drive, JEPE 2014
18. Makoto Hagiwara, and Hirofumi Akagi, Fellow Control and Experiment of Pulse width-Modulated Modular Multilevel Converters, IEEE vol. 24,
no. 7, July 2009.
19. Jose´ Rodrı´ guez, Leopoldo G. Franquelo, Samir Kouro, Jose´ I. Leo´n, Ramo´n C. Portillo,Ma angeles Martı´n Prats and Marcelo A. Pe´rez, ,
Recent Advances and Industrial Applications of Multilevel Converters, IEEE vol. 57, no. 8, August 2010
20. Kiran kumar, A. Madhu Sainath, V. Pavan Kumar,, Selective Harmonic Elimination by Programmable Pulse Width Modulation in inverters”2011.
21. Hirofumi Akagi, “Classification, Terminology, and Application of the Modular Multilevel Cascade Converter”, IEEE, vol. 26, no. 11, November
2011.
Authors: Pritha Roy, Surinder Singh Arora
Paper Title: Advanced Security System of Electronic Voting Machine Using the Self-destruction Circuit
Abstract: The objective of this project is to develop a protection circuit for the electronic voting machine. The main
aim of the system is to develop a timer controlled self-destructing circuit for reducing the chances of tampering whether it
be data tampering or circuit tampering within the EVM [1]. The Electronic voting machine is used for counting the total
number of votes polled in the particular polling booth during the elections and in those scenarios the tampering of the
EVM is quite often to be found. In our project we will be using the circuit destroyer module which is controlled by a
timer circuit that will trigger on when the data is once taken as input for the polling and the box is enclosed. As the box is
once closed the timer circuit is triggered and whenever the box is tried to open or tampered before the stipulated time
period the relay switches on the power signal to the self-destructive circuit which in turn destructs the circuit of the
electronic voting machine so the data collected is transferred to a hard drive for data extraction and the machine can never
be used again by tampering. Thereby ensuring the voters vote security and lessening the violation of the rights of the
particular citizen.

References:
1. D. Ashok kumar & T.Ummal Sarita Begum,”Electronic voting machine”.[International Conference on Pattern Recognition”, Informatics and
Medical Engineering (PRIME-2012)];
2. Sahibzada Muhammad Ali, “Micro controller based smart evm”,[IEEE International Conference on Electro/Information Technology];
107. 3. A.K.Wang, ”EVM Simulation and analysis techniques” [MILCOM 2006 - 2006 IEEE Military Communications conference];
4. P. Vidyasree, S. Viswanandha Raju, “Desisting the Fraud in India's Voting Process through Multi Modalbiometrics”,[2016 IEEE 6th International
Conference on Advanced Computing (IACC)]; 588-590
5. R. Geambasu, T. Kohno, A. Levy, H.M. Levy, Vanish,”Increasing data privacy with self-destructing data”, [Proc. of the 18th USENIX Security
Symposium, 2009].
6. Dnyanesh P.Lengure, Dines V.Rojatkar, “Hacking free system in EVM”, [International Journal of Electrical and Electronics Research];
7. Zuheir Desai, Alexander Lee, “Technology, Choice, and Fragmentation The Political effects of Electronic Voting” [India2016 IEEE 6th
International Conference on Advanced Computing (IACC)];
8. Hari K. Prasad, J Alex Halderman, Rop Gonggrijp, “Security analisys of India’s EVM” ,[Proc. 17th ACM Conference on Computer and
Communications Security (CCS ’10), Oct. 2010];
9. A. Aviv, P. Cerný, S. Clark, E. Cronin, G. Shah, M. Sherr, and M. Blaze. “Security evaluation of ES&S voting machines and election management
system”. [InProc. USENIX/ ACCURATE Electronic Voting Technology Workshop (EVT), San Jose, CA, July 2008].
10. W. Appel, M. Ginsburg, H. Hursti, B. W. Kernighan, C. D. Richards, G. Tan, and P. Venetis. “The New Jersey voting-machine lawsuit and the
AVC Advantage DRE voting machine”. [In Proc. Electronic Voting Technology Workshop; Elections (EVT/WOTE), Montréal, Canada, Aug.
2009].
11. Election Commission of India. Information under RTI on EVMs. [July 2009. No. RTI/2009-EMS/39. Election Commission of India. Electronic
voting machines– Regarding. Aug. 8, 2009. No. PN/ECI/41/2009].
12. R. G. Johnston. Tamper-indicating seals. In American Scientist, pages 515–523, [November–December 2006].
13. C. R. Kasarbada, P. V. Indiresan, and S. Sampath.”Report of the expert committee for the technical evaluation of the electronic voting
machine”.[Apr.1990.ExpertCommittee-Report-on-EVM, pages 21–37].
14. T. Kohno, A. Stubblefield, A. D. Rubin, and D. S. Wallach. “Analysis of an electronic voting system”.[ In Proc. IEEE Symposium on Security and
Privacy, Oakland, CA, pages 27–40, May 2004].
15. R. Mehta. How 100,000 EVMs can be tampered by just 10–12 people at top.[evm1.pdf, 2009].
16. Press Trust of India.”Compulsory voting not practical”, [CEC. Apr. 26, 2010].
Authors: Surinder Singh Arora, Pritha Roy
Paper Title: Automated Speed Control of Vehicles Integrated with Traffic Control System
Abstract: Our research surrounds on the area of proper and automated speed controlling of cars using the traffic signal
automated system by using light sensitive sensors. In general speed control automation they are gps integrated speed
controlling or locating system or it has come up with different concepts of speed controlling to ensure the safety of the
vehicles. In our research we have developed a system in which the traffic signal lights will be embedded or laded on the
streets and the cars would be having the light detecting sensors at the bottom which will differentially detect the colours
of the lights emitted and will accordingly signal the car to de-accelerate. In case of any emergency purposes the car will
ensure its safety by manual control detecting the speed and the obstacle. It ensures the traffic controlling and the hustle
and bustle of the traffic in a way smother than old township model ensuring a countable safety of the passengers.
108.
References: 591-594
1. Chomtip Pornpanomchai, Kaweepap Kongkittisan;“speed Detection system”;[2009 IEEE International Conference on Signal and Image Processing
Applications].
2. C. Gourley ; M. Trivedi; “obstacle avoidance”,[Proceedings of the 1994 IEEE International Conference on Robotics and Automation].
3. Book onsensing lights, “light Differentiating Sensor”, MARK A. JACOBSON.
4. Yong-Kul Ki ; Doo-Kwon Baik, “Model for accurate speed measurement using double-loop detectors”,[IEEE Transactions on Vehicular
Technology (Volume: 55, Issue: 4, July 2006 )].
5. C. Gourley, M. Trivedi, “Sensor based obstacle avoidance and mapping for fast mobile robots”,[Proceedings of the 1994 IEEE International
Conference on Robotics and Automation.]
6. Joel L. Wilder; Aleksandar Milenkovic, “Smart Wireless Vehicle Detection System”, [2008 40th Southeastern Symposium on System Theory
(SSST).]
7. J. Borenstein,Y. Koren, “Real-time obstacle avoidance for fast mobile robots in cluttered environments”,[IEEE Transactions on Systems, Man, and
Cybernetics (Volume: 19, Issue: 5, Sept.-Oct. 1989 ).]
8. D.V. Prasad, “Electronic components”.
9. Sir Isac Newton, “Newton’ second law of motion”.
10. Edward Drinker Cope, “Law of acceleration and growth”.
Authors: Riyatri Roy, Abisanka Bhattacharya, Suddhadipta Paul, Saptarshi Chatterjee, Beauty, P. Suresh
Paper Title: Mitigation of Power Quality Disturbances in Power System Using DVR
Abstract: The main aim of this paper is to identify and restore the faults that occurred in a Power System. This Paper
carries a decent comprehensive characterization of the faults along with the overcoming techniques of it. During a fault,
the current and voltage waveforms are disturbed. In order to overcome the disturbances, we are using DVR (Dynamic
Voltage Restorer) that acts as a compensator. The vital role of DVR is to provide a smooth flow of the voltage waveforms
without any disturbances in the system .The principle of DVR follows the injection of voltage and frequency which is
necessary for the restoration of voltage at the load side of desired value. In this paper, the voltage and current waveforms
are also demonstrated after the incident of fault.

Keywords: DVR, Voltage Sag, Unsymmetrical Fault.

References:
1. M. Begovic, D. Novosel, and M. Milisavljevic, “Trends in power system protection and control,” Decision Support Syst., vol. 30, no. 3, pp. 269–
278, Jan. 2001.
2. C. Concordia, L. H. Fink, and G. Poullikkas, “Load shedding on an isolated system,” IEEE Trans. Power Syst., vol. 10, no. 3, pp. 1467–1472,Aug.
1995.2.
109. 3. C. W. Taylor, “Concepts of undervoltage load shedding for voltage stability,” IEEE Trans. Power Del., vol. 7, no. 2, pp. 480–488, Apr. 1992.
4. A. V. Kulkarni, W. Gao, and J. Ning “Study of Power System Load Shedding Scheme Based On Dynamic Simulation”, Transmission and 595-600
Distribution Conference and Exposition, 2010 IEEE PES .
5. H. Bevrani, G. Ledwich and J. J. Ford, “On the use of df/dt in power system emergency control,” IEEE/PES Power Systems Conference and
Exposition, 2009, pp. 1-6, March 15-18, 2009.
6. H. Seyedi and M. Sanaye-Pasand, “Design of new load shedding special protection schemes for a double area power system,” American journal of
Applied Sciences, Vol. 6, No. 2, pp. 317-327, Feb 2009.
7. Rosli Omar , N.A.Rahim , Marizan Sulaiman of Faulty of Electrical, University Teknikal Malaysia Melaka, Karung Berkunci 1752 “Dynamic
Voltage Restorer application for power quality improvement in electrical distribution system”.
8. Risha Dastagir, Mariam Asif, Department of electrical engineering, Trinity Institute of Technology and Research, Bhopal “Power Quality
improvement using a DVR”.
9. Farmer, Richard G. “Power System Dynamics and Stability”, The Electric Power Engineering Handbook, Ed. L.L. Grigsby,Boca Raton: CRC Press
LLC, 2001.
10. Stanley H.Horowitz, Arun G.Phadke, “Power System Relaying”, Third Edition, Research Studies Press Limited. ISBN: 978-0-470-05712-4.
11. P. M. Anderson and A. A. Fouad,”Power System Control and Stability”. New York: IEEE Press, 1994.
12. P. Kundar,” Power System Stability and Control”. New York: McGraw-Hill, 1994.
13. Peter W.Sauer, M.A.Pai, “Power System Dynamics and Stability”, Prentice Hall, 1998.
14. Uchhrang K. Jethwa, Member, IEEE, Rajeev Kumar Bansal, Ninad Date, and Ranjeet Vaishnav, “Comprehensive Load-Shedding System”, IEEE
Transactions On Industry Applications, Vol. 46, No. 2, March/April 2010.
15. Shervin Shokooh, Tanuj Khandelwal, Dr. Farrokh Shokooh , Jacques Tastet, Dr. JJ Dai “ Intelligent Load Shedding Need for a Fast and Optimal
Solution”,
Authors: L. Nikhil Manikanta, M. Pushpavalli, P. Saikumar, P. Sivagami, M. Vikram Reddy, P. Abirami
Paper Title: Robot based Home Automation
Abstract: Robot Based Home Automation, nowadays in the society we cannot trust anyone compared to systems and
robots. By trusting robots and the internet of things is much more than human beings. When it comes to our home, the
concept is to make it smarter, safer and automatic and with the security of a robot. This project looks on building smart
wireless and robotic security system which sends second to second information to owners and that too stored in the cloud
by using the internet of things in case of any raises an alarm. Home automation by making some set of sensors. Internet
of things is growing more by day by day. Internet of Things is a system that uses computers and mobile devices to control
home functions through the internet from anywhere in the world. Automatic home is sometimes called as Smart home.
The home automatic system differs from other systems by allowing the owner to operate the system from anywhere
around the world through an internet connection.

Keywords: Arduino UNO, Vibration Sensor, Load cell, Smart System, IoT, Alarm.
110.
References: 601-604
1. C. K. Das, M. Sanaullah, H. M. G. Sarower and M. Hassan, ―Development of a Cell Phone Based Remote Control System: An Effective
Switching System for Controlling Home and Office Appliances, ‖ International Journal of Electrical and Computer Sciences (IJECS), vol. 9, No.
10, pp. 37–43.
2. Diana Gornea, Dan Popescu, Grigore Stamatescu, Radu Fratila. Romanian Space Agency, “Mono-Camera Robotic System for Tracking Moving
Objects”, Multisensory Robotic System for Aerial Monitoring of Critical Infrastructure Systems (MUROS).
3. H. H. Goktas, N. Daldal, ―” A Cellular Phone Based Home/Office Controller and Alarm System”, G. U. Journal of Science, vol. 19, pp.21–26,
2006.
4. Rosslin John Robles1 and Tai-hoon Kim1, “Applications, Systems and Methods in Smart Home Technology”, International Journal of Advanced
Science and Technology Vol. 15, February 2010.
5. Sk. Zeeshan Murshed, Anwesha Dutta, Sombuddha Chatterjee, Ishani Mondal, Aroni Saha, Souradeep Saha, Debasish Kundu, Sudipta Ghosh and
Sauvik Das Gupta, “Controlling an Embedded Robot through Image Processing based Object Tracking using MATLAB”.
6. Suma L, Rajeshwari R, Vivekanand, "Raspberry pi Home Automation with Arduino”, U.G. Student. International Journal of Innovative Research in
Science, Engineering and Technology (IJIRSET), Vol. 5, Special Issue 10, May 2016.
7. Vaibhavkumar Yadav and Shubham Borate, “Smart Home Automation using Virtue of IoT”, 2nd International Conference for Convergence in
Technology (I2CT), 2017.
Authors: J. Divya Navamani, A. Lavanya, C.M. Prahadheeshwar, S. Mohammed Riyazudeen
Paper Title: Hybrid Power System Design Using Homer Pro
111.
Abstract: The demand for commercial building increases day by day depending upon their requirements. In this
605-609
paper, a standalone Hybrid Power system for an entire commercial classroom complex has been designed which
includes general purpose classroom, labs with low power rating instruments, heavy load driving machines etc., The
sizing of Hybrid system using HOMER software is illustrated in this paper. The designing of micro grid includes PV
panel and Wind turbine installation and a converter which increases the installation cost but reduces the amount payable
to grid.

References:
1. Sarat Kumar Sahoo, "Renewable and sustainable energy reviews solar photovoltaic energy progress in India: A review" Renewable and
sustainable Energy Reviews, Elsevier, Volume 59, June 2016, Pages 927-939.
2. T. Adefarati, R.C. Bansal, "Integration of Renewable Distributed Generators into the Distribution System: A Review", IET Renewable Power
Generation, Volume 10, Issue 7,August 2016 p 873-884.
3. Hoarcă Cristian, Nicu Bizon, Bădită Alexandru," Design of hybrid power systems using HOMER simulator for different renewable energy
",ECAI 2017 - International Conference - 9th Edition Electronics, Computers and Artificial Intelligence 29 June -01 July, 2017, Targoviste,
ROMÂNIA.
4. Niharika Varshney, M.P. Sharma, D.K. Khatod, "Sizing of Hybrid Energy System using HOMER", International Journal of Emerging Technology
and Advanced Engineering ISSN 2250-2459, ISO 900 I :200S Certified Journal, Volume 3, Issue 6, June 2013
5. Y.V.P. Kumar and R. Bhimasingu, "Optimal sizing of microgrid for an urban community building in south India using HOMER," Power
Electronics, Drives and Energy Systems (PEDES), 2014 IEEE International Conference on, Mumbai, 2014, pp. 1-6.doi: 10.1 I 09/PEDES.20
14.7042059
6. Mirzaei, M. and Vahidi, B, "Feasibility analysis and optimal planning of renewable energy systems for industrial loads of a dairy factory in
Tehran, Iran.", Journal of Renewable and Sustainable Energy, 7, 063 114 (2015), DOI:http://dx.doi.orgil O. I 06311 .493659 I
7. Prema V,Uma Rao K," Sizing of Microgrids for Indian Systems using HOMER", 1st IEEE International Conference on Power Electronics,
Intelligent Control and Energy Systems (ICPEICES-2016).
8. A. Chauhan, and R.P.Saini, "A review on Integrated Renewable Energy System based power generation for standalone applications:
Configurations, storage options, sizing methodologies and control," Renewable and Sustainable Energy Reviews, vol. 38, pp. 99-129, 2014.
9. O. Erdinc, and M. Uzunoglu, "Optimum design of hybrid renewable energy systems: Overview of different approaches," Renewable and
Sustainable Energy Reviews, vol. 16, pp. 1412-1425, 2012.
10. Punyashree Pattanayak, Nigamananda Panigrahy, Sthitaprajan Mishra3," Overcome of Energy Crisis Using Hybrid Renewable Energy Sources in
India: HOMER application", IEEE Sponsored 9th International Conference on Intelligent Systems and Control {lSCO)2015.
Authors: Zsolt Tóth
Paper Title: Managing some Institutional, Sociocultural and on-screen reading challenges of Online Learning
Abstract: The aim of this article is to summarize some of the factors that hinder the effectiveness of e-learning, which
we have found in our research and practice. Our experience is based on the management of one of the oldest e-learning
systems in Hungary and the experience of many international projects. We focus mainly on institutional, sociocultural
and reading research experiences. According to our experience, e-learning development cannot cross linear education,
process control, contact lessons, and uniformized curriculum within the framework of a traditional institutional system.
Moreover, the efficiency of e-learning methodologies based on new constructivist and connectivist pedagogies is highly
questionable even in the case of the removal of institutional constraints. Many sociocultural factors play a role in this.
The results of on-screen reading research so far have further eroded our belief in digitized learning materials; on-screen
reading efficiency seems surprisingly low. It is not real alternative to replacing long texts with shorter texts and
animations. In our view, e-learning (blended learning) can play an important role in making communication related to
education more effective, but the curriculum should be based on mainly (but not exclusively) printed notes and books.

Index Terms blended learning, e-learning, higher education, online learning

References:
1. H. Dreyfus, On the Internet, London and New York: Routledge, Second Edition, 2009.
2. K. Reynolds, K. Becker, J. Fleming, Contemporary Challenges in E-learning, In: R. Harris, T. Short (eds), Workforce Development. Springer,
Singapore, pp. 269-282, 2014.
3. B. Pauling, Virtual Learning Environments in Higher Education "Down Under", In: J. Weiss, J. Nolan, J. Hunsinger, P. Trifonas (eds), The
International Handbook of Virtual Learning Environments, Springer, Dordrecht, pp. 609-652, 2006.
4. M. Skilbeck,, The University Challenged - A Review of International Trends and Issues with Particular Reference to Ireland, Dublin: Higher
112. Education, Authority and Committee of Heads of Irish Universities, 2001.
5. J. Bang, eLearning reconsidered. Have e-learning and virtual universities met the expectations? Retrieved from tetrieelearningeuropa.info, 2006. 610-613
6. e-Learning in Tertiary Education, Where do we stand? OECD, 2005.
7. Education and Skills - Third Report. The United Kingdom Parliament, House of Commons, 2005.
8. T. Davis, Some Personal Thoughts from a 'Traditional' Academic Moving Towards e-Learning, Retrieved from elearningeuropa.info, 2003.
9. J. Devine, Major Challenges Facing the Higher Education System in the ICT Era, Retrieved from elearningeuropa.info 2005.
10. K. Wannemacher, e-Learning at German Universities: from Project Development to Sustainable Implementation, Retrieded from
elearningeuropa.info, 2005.
11. W. Zielinski, e-Learning in Poland: experiences from higher education, Retrieved from elearningeuropa.info, 2005.
12. M. Henderikx, K. Kreijns, M. Kalz, To Change or Not to Change? That's the Question… On MOOC-Success, Barriers and Their Implications, In:
C. Delgado Kloos, P. Jermann, M. Pérez-Sanagustín, D. Seaton, S. White (eds) Digital Education: Out to the World and Back to the Campus,
EMOOCs 2017, Lecture Notes in Computer Science, vol 10254, pp. 210-216, Springer, Cham, 2017.
13. J. Knox, What's the Matter with MOOCs? Socio-material Methodologies for Educational Research, In: H.Snee, C. Hine, Y. Morey, S. Roberts, H.
Watson (eds) Digital Methods for Social Science, Palgrave Macmillan, London, pp. 175-189, 2016.
14. A. Qayyum, O. Zawacki-Richter, The State of Open and Distance Education, In: O. Zawacki-Richter, A. Qayyum (eds) Open and Distance
Education in Asia, Africa and the Middle East. SpringerBriefs in Education, Springer, Singapore, pp. 125-140, 2019.
15. C. Sin, O. Tavares, The Bologna Process and the Unachieved Potential for the Creation of a Common Higher Education Market, In: C. Sin, O.
Tavares, S. Cardoso, J. M. Rosa (eds) European Higher Education and the Internal Market, Issues in Higher Education, Palgrave Macmillan,
Cham, pp. 231-254, 2018.
16. E.C. Hamilton, Technology and the Politics of University Reform, Palgrave Macmillan, New York, 2016.
17. Kováts G., Trust and the Governance of Higher Education: The Introduction of Chancellor System in Hungarian Higher Education. In: A. Curaj,
L. Deca, R. Pricopie (eds) European Higher Education Area: The Impact of Past and Future Policies. Springer, Cham, pp. 651-669, 2018.
18. J. C. Moore, A Brief History of Universities, Palgrave Pivot, Cham, 2019.
19. E.S. Brezis, "Elitism in Higher Education and Inequality: Why Are the Nordic Countries So Special?" Intereconomics, 53: 201, pp. 201-208,
2018.
20. N. Lee, Plan X and Generation Z. In: Counterterrorism and Cybersecurity. Springer, pp. 301-319, 2015.
21. J. C. Brada, W. Bienkowski, M. Kuboniwa, International Perspectives on Financing Higher Education, Palgrave Macmillan, London, 2015.
22. A. Alanazi, "A Critical Review of Constructivist Theory and the Emergence of Constructionism," American Research Journal of Humanities and
Social Sciences, 2, 1-8, 2016.
23. Mangen, B. R. Walgermo, K. Brønnick, "Reading linear texts on paper versus computer screen: Effects on reading comprehension," International
Journal of Educational Research, 58, pp. 61-68, 2013.
24. Mangen, "What hand may tell us about reading and writing?" Educational Theory, Vol. 66, N. 4, pp. 457-477, 2016.
25. J. Nielsen, How Long Do Users Stay on Web Pages? Retrieved from https://www.nngroup.com/articles/ how-l ong-do -users- stay- on-web-
pages/, 2011.
26. J. Nielsen, F-Shaped Pattern For Reading Web Content (original study), Retrieved from https:// www. nngroup. com/ articles /f-shaped-pattern-
reading-web-content-discovered/, 2006
27. YC. Hsieh, CT. Kuo, H. Lin (2016): The Effect of Screen Size of Mobile Devices on Reading Efficiency, In: J. Zhou, G. Salvendy (ed), Human
Aspects of IT for the Aged Population. Design for Aging, ITAP 201,. Lecture Notes in Computer Science, vol 9754. Springer, Cham pp. 435-445,
2016.
Authors: M. Kavitha, D. Atchaya, S. Pavithra
Paper Title: Intelligent Vehicle Technology and Combustion Fuel Alert Using IOT
Abstract: Transportation is one of the major part of human growth. A life without Transportation is difficult. Due to
increase in population the usage of Vehicle is also increased. So, this paper proposes Intelligent Vehicle Technology and
Combustion fuel alert using IOT. Using this technology accident and fuel theft can detected. The movement of vehicle
is continuously monitored with the help of GPS and the information is given to web server through IOT. This
technology also uses a brake sensor which detects the failure of the brake and hence major accidents are prevented. In
case of any accident, the location of the victim is detected. Therefore rescue operation is being carried out. Fuel is
monitored using flow sensor to avoid fraud at petrol pumps. Day by day petrol rate is updated in the LCD display, to
alert the user.

Keywords: Microcontroller, Flow Sensor, Brake Failure Sensor, Vibration Sensor, GPS, Buzzer.

References:
113. 1. Akshada Kawane1 Shweta Kompa2, Pranali Survase3, Pratiksha Pavan Kumar Naik, Arun Kumbi, nagaraj telkar., "An Automative Diagnostics,
fuel efficiency and Emission Monitoring using CAN", IEEE Conference on Big dataIOT and Data science, pp.14-17, 2017.
614-618
2. Pavankumar Naik, Sowmiya .A, Lokeshwari.P.,"Thermo Electric generator Module in driving the vehicle and monitoring using IOT", IEEE
International Conference on Inventive systems and control, pp.822-825, 2018.
3. Nandimath.J.N,Varsha Alakar, Sayali Joshi, Sonal Bhite.,"IOT Based Fuel monitoring for Future Vehicle"., International Research Journal of
Engineering & Technology., Vol.4, no.2,pp. 1361-1363, 2017.
4. Pritinika Behera., "Iot Based Fuel Efficiency Monitoring System For A Vechile".,IOSR Journal of Engineering.,pp.80-83, 2018."
5. Akshada Kawane Shweta Kompa, Pranali Survase Pratiksha Thorat."IOT Based Fuel Monitoring for Vehicles". International Journal of Advance
Research and Innovative Ideas in Education,Vol-4., pp.208-212, 2018
6. S. Kumar Reddy Mallidi, V.V.Neela."IOT Based Smart vehicle monitoring System". International Journal of Advanced Research in Computer
Science .,Vol-9, pp 738-741, 2018.
7. Abinayaa Balasundaram, Aiswarya Udayakumar, Baladharshini Gopalan, Kaaviya Bhaskaran, Barkathnisha Abdul Muthalip.," IoT Based Vehicle
Emission Monitoring System"., International Journal for Innovative Research in Science & Technology,pp.80-84.,2017.
8. Manaswi Sharma1, Diksha Tripathi1, Narendra Pratap Yadav1, Parth Rastogi1.," Gas Leakage Detection and Prevention Kit Provision with
IoT".,International research Journal of Engineering Technology., Vol-05. pp 2227-2229, 2018.
9. Javier Rocher Miran Taha, Lorena Parra1 and Jaime Lloret ."IoT Sensor to Detect Fraudulent use of Dyed Fuels in Smart Cities".,IEEE., pp. 86-
92., 2018.
10. Emir Husni., "Driving and Fuel Consumption monitoring with IOT"., International Journal of Information Management., Vol-3., pp.78-95, 2017.
Authors: Kalathur Kumar, S. Arul, Vanki Pratap Kumar
Paper Title: Planning and Characterization of Green Synthesized Ferric Oxide (Fe 2O3) Nanoparticles
Abstract: The ongoing improvement and execution of new advancements have prompted new time, the nano-
transformation which unfurls the job of plants in bio and green combination of nanoparticles which appear to have
drawn significant unequivocal consideration from a perspective of blending stable nanoparticles. Green standard courses
of orchestrating have risen as a choice to defeat the confinement of ordinary strategies among which plants and
microorganisms are significantly misused. Thus the present investigation imagines the biosynthesis of nanoparticles
from plants which are developing as nanofactories. Ferric Oxide (Fe 2O3) nanoparticles were incorporated via completion
of water under the surrounding conditions. Ferrous Sulfate and Sulfur were broken up in Salt Petra with a molar
proportion of 2: 1. Citrate particles were utilized as nucleation stabilizers. The reactor was loaded up with a latent argon
environment and the NPs were gradually accelerated by dropping of KAI (SO4) under an overwhelming blend. The
moderate arrangement of nanoparticle seeds was trailed by a quicker development of centers and a moderate
development of shells balanced out by citrate particles for the entire time. The tanish red item was accelerated with
CH3)2CO, centrifuged for 5 minutes at 2,500 rpm, and the pellet scattered in argon-foamed water. This means they were
114.
rehashed twice to dependably wash the NPs. In the present work the writer contemplates Synthesis and Characterization
of Fe2O3 nanoparticles. 619-624

Index Terms: Plants, Nanoparticles, Green synthesis, Ferrous Sulphate, Fe2O3 and SEM

References:
1. H. B. Na, I. C. Song, and T. Hyeon, "Inorganic nanoparticles for MRI contrast agents," Advanced Materials, 21, 21, 2133-2148, 2009.
2. J. Y. Park, M. J. Baek, E. S. Choi et al., "Paramagnetic ultrasmall gadolinium oxide nanoparticles as advanced T 1 MRI contrast agent: account
for large longitudinal relaxivity, optimal particle diameter, and in Vivo T1 MR Images," ACS Nano, 3, 11, 3663-3669, 2009.
3. F. Hu and Y. S. Zhao, "Inorganic nanoparticle-based T1 and T1/T2 magnetic resonance contrast probes," Nan scale, 4, 20, 6235-6243, 2012.
4. F. Hu, K. W. MacRenaris, E. A. Waters et al., "Ultrasmall, water-soluble magnetite nanoparticles with high relaxivity for magnetic resonance
imaging," The Journal of Physical Chemistry C, 113, 49, 20855-20860, 2009.
5. M. Rohrer, H. Bauer, J. Mintorovitch, M. Requardt, and H.-J. Weinmann, "Comparison of magnetic properties of MRI contrast media solutions at
different magnetic field strengths," Investigative Radiology,40, 11, 715-724, 2005.
6. D. Frascione, C. Diwoky, G. Almer et al., "Ultrasmallsuperparamagnetic iron oxide (USPIO)-based liposomes as magnetic resonance imaging
probes," International Journal of Nanomedicine, . 7, 2349-2359, 2012.
7. R. Qiao, C. Yang, and M. Gao, "Superparamagnetic iron oxide nanoparticles: from preparations to in vivo MRI applications," Journal of Materials
Chemistry, 19, 35, 6274-6293, 2009.
8. C. F. G. C. Geraldes and S. Laurent, "Classification and basic properties of contrast agents for magnetic resonance imaging," Contrast Media and
Molecular Imaging,. 4, 1, 1-23, 2009. A. J. L. Villaraza, A. Bumb, and M. W. Brechbiel, "Macromolecules, dendrimers, and nanomaterials in
magnetic resonance imaging: the interplay between size, function, and pharmacokinetics," Chemical Reviews, 110, 5, 2921-2959, 2010.
9. G. Huang, H. Chen, Y. Dong et al., "Superparamagnetic iron oxide nanoparticles: amplifying ros stress to improve anticancer drug efficacy,"
Theranostics, 3, 2, 116-126, 2013.
10. C. Jiang, J. Jia, and S. Zhai, "Mechanistic understanding of toxicity from nanocatalysts," International Journal of Molecular Sciences, 15, 8,
13967-13992, 2014.
11. L. Tong, M. Zhao, S. Zhu, and J. Chen, "Synthesis and application of superparamagnetic iron oxide nanoparticles in targeted therapy and imaging
of cancer," Frontiers of Medicine, 5, 4, 379-387, 2011.
12. T. Sugimoto and E. Matijević, "Formation of uniform spherical magnetite particles by crystallization from ferrous hydroxide gels," Journal of
Colloid and Interface Science, 74, 1, 227-243, 1980.
13. R. Massart, "Preparation of aqueous magnetic liquids in alkaline and acidic media," IEEE Transactions on Magnetics, 17, 2, 1247-1248, 1981.
14. A. Bee, R. Massart, and S. Neveu, "Synthesis of very fine maghemite particles," Journal of Magnetism and Magnetic Materials, 149, 1-2, 6-9,
1995.
15. S. Laurent, D. Forge, M. Port et al., "Magnetic iron oxide nanoparticles: synthesis, stabilization, vectorization, physicochemical characterizations,
and biological applications," Chemical Reviews, . 108, 6, 2064-2110, 2008.
16. M. Safdarian, P. Hashemi, and M. Adeli, "One-step synthesis of agarose coated magnetic nanoparticles and their application in the solid phase
extraction of Pd(II) using a new magnetic field agitation device," AnalyticaChimicaActa, 774, 44-50, 2013.
17. C. Tassa, S. Y. Shaw, and R. Weissleder, "Dextran-coated iron oxide nanoparticles: a versatile platform for targeted molecular imaging, molecular
diagnostics, and therapy," Accounts of Chemical Research, 44, 10, 842-852, 2011.
18. R. G. López, M. G. Pineda, G. Hurtado et al., "Chitosan-coated magnetic nanoparticles prepared in one step by reverse microemulsion
precipitation," International Journal of Molecular Sciences, 14, 10, 19636-19650, 2013.
19. H. Yilmaz and S. H. Sanlier, "Preparation of magnetic gelatin nanoparticles and investigating the possible use as chemotherapeutic agent,"
Artificial Cells, Nanomedicine and Biotechnology, 41, 2, 69-77, 2013.
20. M. M. Yallapu, S. P. Foy, T. K. Jain, and V. Labhasetwar, "PEG-functionalized magnetic nanoparticles for drug delivery and magnetic resonance
imaging applications," Pharmaceutical Research, 27, 11, 2283-2295, 2010.
21. A. Petri-Fink, B. Steitz, A. Finka, J. Salaklang, and H. Hofmann, "Effect of cell media on polymer coated super paramagnetic iron oxide
nanoparticles (SPIONs): colloidal stability, cytotoxicity, and cellular uptake studies," European Journal of Pharmaceutics and Biopharmaceutics,
68, 1, 129-137, 2008.
22. L. P. Ramírez and K. Landfester, "Magnetic polystyrene nanoparticles with a high magnetite content obtained by miniemulsion processes,"
Macromolecular Chemistry and Physics, 204, 1, 22-31, 2003.
23. T. Linemann, L. B. Thomsen, K. G. Du Jardin et al., "Development of a novel lipophilic, magnetic nanoparticle for in vivo drug delivery,"
Pharmaceutics, 5, 2, 246-260, 2013.
24. S. Gyergyek, M. Drofenik, and D. Makovec, "Oleic-acid-coated CoFe2O4 nanoparticles synthesized by co-precipitation and hydrothermal
synthesis," Materials Chemistry and Physics, 133, 1, 515-522, 2012.
25. M. Iijima, Y. Yonemochi, M. Kimata, M. Hasegawa, M. Tsukada, and H. Kamiya, "Preparation of agglomeration-free hematite particles coated
with silica and their reduction behavior in hydrogen," Journal of Colloid and Interface Science, 287, 2, 526-533, 2005.
26. M. Kosmulski, "Positive electrokinetic charge of silica in the presence of chlorides," Journal of Colloid and Interface Science, 208, 2, 543-545,
1998.
27. R. Xu, Particle Characterization: Light Scattering Methods, Springer, Dordrecht, The Netherlands, 2006.
28. A. Hlavacek and P. Skládal, "Isotachophoretic purification of nanoparticles: tuning optical properties of quantum dots," Electrophoresis, 33, 9-10,
1427-1430, 2012.
29. J. Hennig, A. Nauerth, and H. Friedburg, "RARE imaging: a fast imaging method for clinical MR," Magnetic Resonance in Medicine, 3, 6, 823-
833, 1986.
30. C. M. Hoo, N. Starostin, P. West, and M. L. Mecartney, "A comparison of atomic force microscopy (AFM) and dynamic light scattering (DLS)
methods to characterize nanoparticle size distributions," Journal of Nanoparticle Research, 10, 1, 89-96, 2008.
Authors: N. Pushpalatha, C Sreekanth, Y Penchalaiah
Paper Title: Energy Efficient Sensor Positioning in Wireless Sensor Networks
Abstract: Wireless sensor networks spread everywhere in our daily life from health care to environment monitoring.
In these applications sensor positioning plays a crucial role. The existing sensor positioning techniques are resulted in
increased cost, energy consumption, connectivity failure and less accuracy. In the present work, Range-free sensor
positioning based on Bacterial Foraging Algorithm is applied to reduce energy consumption by sensor nodes in
hexagonal geographical area. The results are compared with Artificial Bee Colony algorithm. The results show, the
improvement in accuracy, shortest path computation, residual energy, and an energy efficient wireless sensor network
and the proposed method is implemented using NS-2.

Index Terms: Sensor Positioning, RSPBFA, Shortest path, Residual Energy and Energy Consumption.

References:
115. 1. Raghavendra V. Kulkarni, and Ganesh Kumar Venayagamoorthy, "Bio-inspired Algorithms for Autonomous Deployment and Localization of
Sensor Nodes", IEEE Transactions on Systems, Man, and Cybernetics-Part C: Applications and Reviews, Vol. 40, No. 6, pp.663-675, 2010.
2. HA Nguyen, K S Low, H Guo, "Real Time Determination of Sensor Node Location in a Wireless Sensor Network using Particle Swarm 625-629
Optimization", Proceedings of the 10th WSEAS International Conference on EVOLUTIONARY COMPUTING, pp.140-145,2009.
3. Hyungmin Park, Ji-Hyeong Han and Jong-Hwan Kim, "Swarm Intelligence-based Sensor Network Deployment Strategy", IEEE World Congress
on Computational Intelligence, pp.4210-4215, July, 2010.
4. Wu Xiaoling, Shu Lei, Wang Jin, Jinsung Cho1, and Sungyoung Lee, "Energy-efficient Deployment of Mobile Sensor Networks by PSO", AP
Web Workshops, 2006.
5. Xiang Ji ,"Localization Algorithms For Wireless Sensor Network Systems" A thesis submitted at The Pennsylvania State University ,The
Graduate School, Department of Computer Science and Engineering, 2004.
6. Yun Wang, Yanping Zhang, Jiangbo Liu and Rahul Bhandari "Coverage, Connectivity, and Deployment in Wireless Sensor Networks", S. Patnaik
et al. (eds.), Recent Development in Wireless Sensor and Ad-hoc Networks, Signals and Communication Technology, © Springer India 2015,
DOI 10.1007/978-81-322-2129-6_2
7. GaoJun Fan and ShiYao Jin, "Coverage Problem in Wireless Sensor Network: A Survey", Journal of Networks, Vol. 5, No. 9, pp.1033-1040,
September ,2010.
8. T.S.Rappaport., "Wireless Communications: Principles and practice", Prentice Hall PTR, 1996.
9. Liu, B., Towsley, D. "A study of the coverage of large-scale sensor networks" In: IEEE International Conference on Mobile Ad-Hoc and Sensor
Systems, pp. 475-483, IEEE (2004).
10. Wen-Hwa Liao, Yucheng Kao, Ying-Shan Li, "A sensor deployment approach using glowworm swarm optimization algorithm in wireless sensor
networks", Expert Systems with Applications,pp.12180-12188,2011.
11. Celal Ozturk , Dervis Karaboga and Beyza Gorkemi," Probabilistic Dynamic Deployment of Wireless Sensor Networks by Artificial Bee Colony
Algorithm", Sensors, pp. 6056-6065, 2011.
12. Naveed Salman, Mounir Ghogho and A. H. Kemp,"Optimized Low Complexity Sensor Node Positioning in Wireless Sensor Networks", IEEE,
2013.
13. Quan LIU, Ping REN and Zude ZHOU," Three-dimensional Accurate Positioning Algorithm based on Wireless Sensor Networks", Journal of
computers, vol. 6, no. 12, December, 2011.
14. Swagatam Das, Arijit Biswas, Sambarta Dasgupta and Ajith Abraham,"Bacterial Foraging Optimization Algorithm: Theoretical Foundations,
Analysis, and Applications", 2009.
15. N. Pushpalatha and B. Anuradha, "Range-free Sensor Positioning Based on Bacterial Foraging Algorithm (BFO) in Wireless Sensor Networks"
International Journal of Computer Applications (0975 - 8887) vol. 122,No.9, July 2015 ,pp.35-40. doi>10.5120/21731-4901
16. Hai Shen and Yunlong Zhu, " Adaptive Bacterial Foraging Optimization Algorithm Based on Social Foraging Strategy" Journal of Networks ,
vol.9 No.3, , pp:799-806, March, 2014.
Authors: D Giridhar Kumar, Ch D V Subba Rao
Paper Title: Peer – To – Peer Computing: Architectures, Applications and Challenges
Abstract: In Peer – to – Peer (P2P) computing technology, several individual systems are grouped together and are
characterized by direct access between peer systems for exchanging services without any centralized server. Unlike
traditional client-server model, in Peer – to – Peer each peer can act as client as well as server based on its requirements
and each peer has its own capacity & responsibility (as client it can raise requests for services and as server it can serve
requests coming from other peers). With the availability of internet, distinct systems at distinct locations are being
connected easily which enhanced the usage of P2P applications. In this paper, we present the overview of various P2P
architectures, characteristics of P2P in addition to its applications and challenges.

Index Terms: Peer to Peer Computing, P2P Architectures, Structured P2P & Unstructured P2P systems, virtual
overlay

References:
1. Quang Hieu Vu ,Mihai Lupu , Beng Chin Ooi, "Peer-to-Peer Computing Principles and Applications" , Springer Publication, ISBN 978-3-642-
03513-5 e-ISBN 978-3-642-03514-2 DOI 10.1007/978-3-642-03514-2
2. HAND BOOK OF PEER-TO-PEER NETWORKING, Springer Publications ISBN 978-0-387-09750-3 , e-ISBN 978-0-387-09751-0 , DOI
10.1007/978-0-387-09751-0
3. B Lalitha, Ch D V SubbaRao, "Peer-to-Peer Systems: Taxonomy and Characteristics", International Journal of Computer Science and
Technology, ISSN: 0976-8491 (Online) | ISSN: 2229-4333 (Print), Vol. 3, issue 2, pp. 886-896, june-2012.
4. Freenet, http://freenet.sourceforge.net
5. Xianfu Meng & Dongxu Liu, "A traffic-efficient message forwarding approach in unstructured P2P networks", Springer publication, DOI
10.1007/s12083-015-0326-2.
6. Zhenhua Duan, Cong Tian, Mengchu Zhou, XiaobingWang, Nan Zhang, Hongwei Du, · Lei Wang, "Two-layer hybrid peer-to-peer networks",
Springer Publication, DOI 10.1007/s12083-016-0460-5.
7. Haiying Shen," An Efficient and Adaptive Decentralized File Replication Algorithm in P2P File Sharing Systems", IEEE TRANSACTIONS ON
PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 21, NO. 6, JUNE 2010, doi: 10.1109/TPDS.2009.127.
116.
8. Zhi Yang, Jing Tian, Ben Y. Zhao, Wei Chen, and Yafei Dai, "Protector: A Probabilistic Failure Detector for Cost-Effective Peer-to-Peer
Storage", IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 22, NO. 9, SEPTEMBER 2011, doi: 630-636
10.1109/TPDS.2010.205.
9. OcenStore, http://oceanstore.cs.berkeley.edu/
10. C.Batten, K.Barr, A.Saraf, S.Treptin, "pStore: asecure peer-to-peer backup system", technical memo MIT-LCS-TM-632. December, 2001.
11. Michele Amoretti, · Alessandro Grazioli, · Francesco Zanichelli, "An autonomic approach for P2P/cloud collaborative Environments", Springer
publication, DOI 10.1007/s12083-015-0367-6.
12. https://yacy.net/en/index.html
13. HE Ming, ZHANG Yujie and MENG Xiangwu, "Gossip-Based Resource Location Strategy in Interest Community for P2P Networks", Chineese
Journal of Electronics, Vol.24, No.2, April-2015, doi:10.1049/cje.2015.04.008.
14. Gong Weihua, Jin rong, YANG Lianghuhai and HUANG Decai, ' Enhanced Entropy-BasedResource Searching in Unstructure P2P Networks",
Chineese Journal of Electronics, Vol.24, No.2, April 2015, doi: 10.1049/cje.2015.04.002.
15. YI HU, Laxmi N. Bhuyan, Min Feng, "Maintaining Data Consistency in Structured P2P Systems", IEEE TRANSACTIONS ON PARALLEL
AND DISTRIBUTED SYSTEMS, VOL. 23, NO. 11, NOVEMBER 2012, doi: 10.1109/TPDS.2012.81.
16. Haiying (Helen) Shen, "IRM: Integrated File Replication and Consistency Maintenance in P2P Systems", IEEE TRANSACTIONS ON
PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 21, NO. 1, JANUARY 2010, doi: 10.1109/TPDS.2009.43.
17. Mritunjay Kumar Rai, Max Bhatia, "Identifying P2P traffic: A Survey", Springer publication, published online: 18 june 2016, doi:
10.1007/s12083-016-0417-2.
18. Tao Qin, lei Wang, Dan Zhao, Min Zhu, "CUFTI:Methods for core users finding and traffic identification in P2P systems", Springer Publication,
published online: 11 april 2015, doi: 10.1007/s12803-015-0350-2.
19. Xiang-Jun Shen, Quing Chang, Lu Liu, John Pannerselvam, Zheng-Jun Zha, "CCLBR: Congestion Control-Based Load Balanced Routing in
unstructured P2P systems", IEEE Systems journal, 2016.
20. Hyun Mi Jung1 & Il-Sun Hwang1 & Jeong-Kyung Moon2 & Hark- Soo Park1, "A security monitoring method for malicious P2P event
detection", Springer Publication, DOI 10.1007/s12083-015-0369-4.
21. N. Daswani, H. Garcia-Molina, Query-flood DoS attacks in Gnutella, in Proceedings of the 9th ACM Conference on Computer and
Communications Security (CCS), pp. 181-192, Washington, DC, 2002.
22. Alireza Naghizadeh, Behrooz Razeghi, Ehsan Meamari, Majid Hatamian, Reza Ebrahimi Atani, " C-trust: A trust management system to improve
fairness on circular P2P networks", Springer publication, DOI 10.1007/s12083-015-0402-7.
23. Security issues: https://www.cse.wustl.edu/~jain/cse571-07/ftp/p2p/
24. Faroo https://mashable.com/2007/09/17/faroo/#MANxu_SaCuq4
Authors: Uppalapati. Babu, L. Kumararaja
Paper Title: A Research on Producer Gas in Internal Combustion Engines
117. Abstract: Energy is a crucial requirement for economic and social improvement of any country. Sky rocketing of
fossil fuel prices has lead to rising interest in various alternative fuels like producer gas, CNG, alcoholic fuels, vegetable 637-641
oils. Producer gas is relatively a low calorific value fuel gas which can be used in compression ignition and spark
ignition engines. Producer gas will be generated from any carbonaceous material as well as from different types of
biomass. The engine power de-rating is usually 15-30% when producer gas is used in CI engines instead of diesel. It is
mainly because of the variation in stoichiometric air/fuel ratio requirements for producer gas and diesel.

Keywords: Biomass, Internal combustion engine, Engine power, Producer gas.

References:
1. Demirbas A. Combustion characteristics of different biomass fuels. Prog Energy Combust Sci 2004; 30:219-30.
2. Hall DO, et al. Biomass energy lessons from case studies in developing countries. Energy Policy 1992; 62-73.
3. McGowan F. Controlling the greenhouse effect: the role of renewables. Energy Policy 1991; 111-8.
4. Chawdhury MA, et al. Development of a small downdraft biomass gasifier for developing countries. J Sci Res 2013;3(1):51-64.
5. Kumar A, et al. Thermo chemical biomass gasification: a review of the current status of the technology. Energies 2009; 2:556-81.
6. Srivastava T. Renewable energy (gasification). Adv Electron Electr Eng 2013; 3(9):1243-50.
7. Pruksakit W, et al. Performance prediction of a downdraft gasifier using equilibrium model: effect of different biomass. In: Proceedings of the 5th
international conference on sustainable energy and environment (SEE: Science, Technology and Innovation for ASEAN Green Growth, Bangkok,
Thailand, 19-21; 2014.
8. Jain AK. Biomass gasification under oxygen medium. J Agric Eng 1999; 36 (3):27-31.
9. C. Hgman et al. Gasification, 2nd Edition (Elsevier Inc. Oxford, 2008).
10. Rajvanshi AK. Biomass gasification. Boca Raton, Florida, United States: CRC Press; 1986. p. 83-102.
11. 16ASTM D613-08. Standard test method for cetane number of diesel fuel oil. Philadelphia: ASTM International; 2008.
12. N. Homdoung et al. Prediction of small spark ignited engine performance using producer gas as fuel:
http://dx.doi.org/10.1016/j.csite.2015.02.003.
13. Sridhar G et al. Facts about producer gas engine. In: Nathwani J, Ng A, Paths to Sustainable Energy. InTech; 2010.
14. Hagos FY et al. Trends of syngas as a fuel in internal combustion engines. Adv Mech Eng 2014; ID 401587:10 pages.
15. Tsiakmakis S et al. Experimental study of combustion in a spark ignition engine operating with producer gas from various biomass feedstocks.
Fuel 2014; 122:126-139.
16. Martínez JD et al. Syngas production in downdraft biomass gasifiers and its application using internal combustion engines. Renew Energ 2012;
38:1-9.
17. Ando Y et al. Research and development of a low-BTU gas-driven engine for waste gasification and power generation. Energy 2005; 30:2206-
2218.
18. Paolo Gobbato et al. Performance analysis of a producer gas-fuelled heavy-duty SI engine at full-load operation. Energy Procedia 82, 2015.
19. Pradhan A et al. Syngas as an Alternative Fuel Used in Internal Combustion Engines: A Review, Journal of Pure and Applied Science and
Technology. Vol. 5(2), Jul 2015, pp. 51-66.
20. Boehman AL et al. Combustion of syngas in Internal Combustion Engines. Combustion Science and Technology, 180: 1193- 1206, 2008.
21. Sombatwong P et al. Effect of Pilot Fuel Quantity on the Performance and Emission of a Dual Producer Gas - Diesel Engine. Energy Procedia 34,
2013.
22. T. B. Reed and A. Das, Handbook Biomass Downdraft Gasifier Engine systems, Solar Technical Information Program (U.S. Department of
Energy, Colorado, 1988).
23. A. K. Rajvanshi, Biomass Gasification, in: Alternative Energy in Agriculture, Y. Goswami (ed.), Vol. II (CRC Press, U.S.A., 1986).
24. Phairoach Chunkaewa et al. Modified Compression Ratio Effect on Brake Power of Single Piston Gasoline Engine Utilizing Producer Gas.
Energy Procedia 89, 2016.
Authors: Bala Durga Dharmavarapu, Jayanag Bayana
Paper Title: Sarcasm Detection in Twitter using Sentiment Analysis
Abstract: Designing efficient and robust algorithms for detection of sarcasm on Twitter is the exciting challenge in
opinion mining field. Sarcasm means the person speaks the contradictory of what the individual means, expressing
gloomy feelings applying positive words. It helps the retailers to know the opinions of the customers. Sarcasm is widely
used in many social networking and micro-blogging websites where people invade others which makes problematic for
the individuals to say what it means. In the existing systems, logistic regression technique is used to detect these
sarcastic tweets, it has a drawback as it cannot predict for continuous variables. In the proposed methodology Sentiment
Analysis, Naive Bayes classification and AdaBoost algorithms are used to detect sarcasm on twitter. By using Naive
Bayes classification, the tweets are categorized into sarcastic and non-sarcastic. The AdaBoost algorithm is used to
make the weak statement to strong statements by iteratively considering the subset of training data. Sentiment Analysis
is used to mine the opinions of customers to identify and extract information from the text. By using these two
techniques, sarcastic statements can be easily classified and identified from twitter.
118. Keywords: Sarcasm, Sentiment Analysis, Naive Bayes Classification, AdaBoost, Twitter, Tweets
642-644
References:
1. Anukarsh G Prasad, Sanjana S, Skanda M Bhat, B S Harish "Sentiment Analysis for Sarcasm Detection on Streaming Short Text Data", 2nd
International Conference on Knowledge Engineering and Applications, IEEE, 2017.
2. Sana Parveen, Sachin N. Deshmukh, "Opinion Mining in Twitter - Sarcasm Detection" International Research Journal of Engineering and
Technology (IRJET), volume 04, issue 10, pages 201-204, October 2017.
3. Paras Dharwal, Tanupriya Choudary, Rajat Mittal, Praveen Kumar, "Automatic Sarcasm Detection using Feature Selection", International
Conference on Applied and Theoretical Computing and Communication Technology, IEEE, 2017.
4. Sindhu. C, G. Vaidhu, Mandala Vishal Rao, "A Comprehensive Study on Sarcasm Detection Techniques in Sentiment Analysis", International
Journal of Pure and Applied Mathematics, volume 118, pages 433-442, 2018.
5. Tanya Jain, Nilesh Agrawal, Garima Goyal, Niyati Aggrawal, "Sarcasm Detection of Tweets: A Comparative Study", Tenth International
Conference on Contemporary Computing (IC3), IEEE, August 2017.
6. Sreelakshmi K, Rafeeque P C, "An Effective Approach for Detection of Sarcasm in Tweets", International CET Conference on Control,
Communication, and Computing (IC4), pages 377-382, IEEE, July 05-07, 2018.
7. Manoj Y. Manohar, Pallavi Kulkarni, "Improvement Sarcasm Analysis using NLP and Corpus based Approach", International Conference on
Intelligence Computing and Control Systems (ICICCS), IEEE, 2017.
Authors: Rahul Ranjan, Humsheer Sandhu, A.Suvarnamma
119. Paper Title: Design and Development of Wall Climbing Swarm Robot
Abstract: With the advent of construction technologies, there has been a rise in the number of tall buildings. At such
heights, it is dangerous and difficult for human life to reach. So, the design and control of the movement of a wall
climbing swarm robot which uses adhesion force which enables it to climb multiple robots at same time on vertical
surface with the swarm intelligence in order to reach high place. The design and control of robot is such that it can be
operated for any place like vertical and horizontal. A wireless communication link is used with swarm technology that
perform the numbers of multiple robots which works together to complete task With simultaneous communication
between two robots, it tends to ease the work load and improves the time used in rescue or surveillance operations. The
three major advantages of Robotic approach are that it is scalable, flexible and robust.

Keywords: Robot, climber, (glass/wall), locomotion, adhesion force, communication link, swarming

References:
1. Kazunori Sakurama, Shin-ichiro Nishida, "Source seeking by distributed swarm robots with sample variance control", American Control
Conference (ACC) 2016, pp. 2484-2487, 2016.
2. Vincent Autefage, Serge Chaumette, Damien Magoni, "Comparison of time synchronization techniques in a distributed collaborative swarm
system", Networksand Communications (EuCNC) 2015 European Conference on, pp. 455-459, 2015.
3. Mahdi Agheli n, LongQu,StephenS. Nestinger "Shero:Scalable hexapod robot for maintenance,repair and operations" in the Science Direct
Robotics and Computer-Integrated Manufacturing (2014)478-488.
4. Daniel Schmidt ,Karsten Berns "Climbing robots for maintenance and inspection of vertical structures" in Robotics and Autonomous Systems 61 645-648
(2013) 1288-1305
5. Ganesh Kumar K., Pushparaj Mani Pathak "Dynamic modeling and simulation of a four legged jumping robot with complaint legs" in Science
Direct Transactions Robotics and Autonomous Systems 61 (2013) 221-228.
6. Bahr,' Y. LI' and M. Najafi' " Design and suction cup analysis of a wall Climbing robot" in Science Direct
7. TeresaG.Miller,Stephen Roc "control of a climbing robot using Real time convex optimization "in The science Direct Mechatronics 18(2008) 301-
313.
8. Yi Zhanga,, Akira Nishi "Low pressure air motor for wall climbing robot actuation" in Science Direct Transactions of Mechatronics 13 (2003).
9. Avishai Sintov , Tomer Avramovich, Amir Shapiro"Design and motion planning of a autonomous climbing robot with claws" in Science Direct
Transactions of Robotics and Autonomous Systems 59 (2011) 1008-1019.
10. Amirpasha Peyvandi1, Parviz Soroushian1, Jue Lu "A New self loading locomotion mechanism for wall climbing robots employing biomimitric
Adhesives" in Science Direct Transactions of Journal of Bionic Engineering 10 (2013) 12-18.
11. Mahmoud Tavakoli , Carlos Viegas "Analysis and application of dual row omni directional wheels for climbing robots" in Mechatronics 24
(2014) 436-448
12. Giuk Lee a, Geeyun Wua, Jongwon Kimin "High payload climbing and transitioing by complaint locomotion with magnetic adhesion" inScience
Direct Transactions of Robotics and Autonomous Systems 60 (2012) 1308-1316.
13. Guido La Rosa, Michele Messina, R.sintara "A low cost light weight climbing robot for the inspection of vertical surfaces" presented in Science
International Symposium on Mechatronics 12 (2002).
14. Nagakubo, A., Hirose, S.: Walking and running of the Quadruped wall-climbing robot. In: Procceding of IEEE International Conference on
Robotics and Au-tomation, vol. 2, pp. 1005-1012 (1994)
15. Teresa G. Miller, Stephen Rock. "Control of a climbing robot using real time convex optimization" in the Science Direct Mechatronics 18 (2008)
301-313.
Authors: Sherin Eliyas, Dinesh Kumar, K.S. Karvendan
Paper Title: Large-Scale Log Analysis to Identify Suspicious Activity Using Big Data based Security Analytics
Abstract: A virtualization can give numerous advantages to systems framework, anchoring the virtualized condition is
a major test. The security of a completely virtualized arrangement is reliant on the security of every one of its basic
segments, for example, the hypervisor, visitor working frameworks and capacity. A virtualized framework comprises of
virtual machines (VMs) which depends on the product characterized multiple-case assets of facilitating equipment. The
capacity to pool distinctive processing assets and additionally empower on-request asset scaling has prompted the across
the board arrangement of virtualized foundations as a critical provisioning to distributed computing administrations.
Security investigation applies examination on the different logs which are acquired at various indicates inside the system
decide assault nearness. Extraction of assault highlights is performed through chart based occasion relationship and
MapReduce parser-based ID of potential assault ways. Assurance of assault nearness is performed through two-advance
machine adapting, to be specific strategic relapse is connected to ascertain assault's restrictive probabilities as for the
qualities, and conviction spread is connected to compute the confidence in presence of an assault dependent on them.
This has influenced virtualized foundations to wind up an alluring focus for digital assailants to dispatch assaults for
illicit access.
120.
Keywords: Big Data, Suspicious Activity, Big Data, Security Analysis.
649-653
References:
1. D. Fisher, "'venom' flawin virtualization software could lead to VM escapes, data theft,"2015.[Online].Available: https://threatpost.com/venom-
flaw-in-virtualization-software-couldlead-tovm-escapes-data-theft/112772/, Accessed on: May 20, 2015.
2. Z. Durumeric, et al., "The matter of Heartbleed," in Proc. Conf. Internet Meas. Conf., 2014, pp. 475-488.
3. K. Cabaj, K. Grochowski, and P. Gawkowski, "Practical problems of internet threats analyses," in Theory and Engineering of Complex Systems
and Dependability. Berlin, Germany: Springer, 2015, pp. 87-96.
4. J. Oberheide, E. Cooke, and F. Jahanian, "Cloud AV: N-version antivirus in the network cloud," in Proc. USENIX Secure. Symp.,2008, pp. 91-
106.
5. X. Wang, Y. Yang, and Y. Zeng, "Accurate mobile malware detectionand classification in the cloud," Springer Plus, vol. 4, no. 1, pp. 1-23, 2015.
6. P. K. Chouhan, M. Hagan, G. McWilliams, and S. Sezer, "Network based malware detection within virtualised environments," in Proc. Eur. Conf.
Parallel Process., 2014, pp. 335-346.
7. M. Watson, A. Marnerides, A. Mauthe, D. Hutchison, andN.-ul-H. Shirazi, "Malware detection in cloud computing infrastructures," IEEE Trans.
Depend. Secure Computer., vol. 13, no.2, pp. 192 205, Mar./Apr. 2016.
8. A. Fattori, A. Lanzi, D. Balzarotti, and E. Kirda, "Hypervisor based malware protection with Access Miner," Computer. Secure., vol. 52, pp. 33-
50, 2015.
9. T. Mahmood and U. Afzal, "Security analytics: Big data analytics for cyber security: A review of trends, techniques and tools," in Proc. 2nd Nat.
Conf. Inf. Assurance, 2013, pp. 129134.
10. C.-T. Lu, A. P. Boedihardjo, and P. Manalwar, "Exploiting efficient data mining techniques to enhance intrusion detection systems," in Proc.
IEEE Int. Conf. Inf. Reuse Integer., 2005, pp.512-517.
11. I. Kiss, B. Genge, P. Haller, and G. Sebestyen, "Data clustering based anomaly detection in industrial control systems," in Proc. IEEE Int. Conf.
Intell. Computer. Commune. Process., 2014, pp.275-281.
12. P. Giura and W. Wang, "Using large scale distributed computing to unveil advanced persistent threats," Sci. J., vol. 1, no. 3, pp. 93-105, 2012.
13. H. Kim, I. Kim, and T.-M. Chung, "Abnormal behaviour detection technique based on big data," in Frontier and Innovation in Future Computing
and Communications. Berlin, Germany: Springer, 2014, pp. 553-563.
14. J. Francois, S. Wang, W. Bronzi, R. State, and T. Engel, "Bot Cloud: Detecting botnets using Map Reduce," in Proc. IEEE Int. Workshop Inf.
Forensics secure., 2011, pp. 1-6.
15. L. Aniello, et al., "Big data in critical infrastructures security monitoring: Challenges and opportunities," arXiv:1405.0325, 2014.
16. [16] L. Chen, T. Li, M. Abdulhayoglu, and Y. Ye, "Intelligent malware detection based on file relation graphs," in Proc. IEEE Int. Conf. Semantic
Computer., 2015, pp. 85-92.
17. D. Kirat, G. Vigna, and C. Kruegel, "Bare Cloud: Bare-metal analysis-based evasivemalware detection," in Proc. 23rd USENIX Secur. Symp.,
2014, pp. 287-301.
18. L. Invernizzi, et al., "Nazca: Detecting malware distribution in large-scale networks," inProc. Netw. Distrib. Syst. secure. Symp.,2014, pp. 23-26.
19. SANS, "Intrusion detection FAQ: What port numbers do well-knowntrojan horses use?" 2001. [Online]. Available: https://www.sans.org/security-
resources/idfaq/oddports.php, Accessed on: Sep. 30, 2015.
20. IANA, "Service name and transport protocol port number registry," 2015. [Online]. , Accessed on: Sep. 30, 2015.
Authors: K.Naresh, P.Leela, P.Suneetha, Purandhar.N
Paper Title: Research on Cloud Computing By using SaaS Model
Abstract: Distributed processing is a rapidly creating industry with far reaching prospects for headway. Regardless,
this new development faced the security issue troubles. This condition is uncommon. Researchers in the IT and
information security fields need to commonly examine and deal with these issues. This article exhibited the threats of
conveyed figuring model stood up to. At that we analyzed the affected segments of Programming as an Administration
(SaaS) security demonstrates. According to the present status of SaaS security illustrates, the paper proposed the novel
methodology joined with RBAC instrument and cloud 3D square model. This procedure is supportive to manufacture a
SaaS secured mode.

121. Index Terms: Distributed registering, SaaS illustrate, RBAC mechanism, cloud square showcase.
654-657
References:
1. Liu Y Wang Lunyan, Hu Fangyuan, Yuan Lu. Security AccessControl in SaaS Mode Based on Improved RBAC Model [J] .Modern Computer,
2017 (15): 81-84.
2. YANG Li. Research on User Information Security in Cloud Computing Environment [J]. Taxpayer, 2017 (15): 65 + 67.
3. Feng Dengguo, Zhang Min, Zhang Yan, et al.Study on Cloud Computing Security [J] .Journal of Software, 2011,22 (1): 71-83.
4. Huang Y. Pure design and implementation of RBAC system based onSaaS model [D].Northeast Normal University, 2013.
5. Liu Kaihua, Li Xiong. Cloud computing security model and strategyanalysis [J]. Computer Knowledge and Technology, 2011,7 (08): 1750-1751.
6. Zhou Wenbin. Research on Information Security Based on Cloud SaaS Model [D]. Liaoning Technical University, 2014.
7. Wang Q, Wang C, Li J, Ren K, Lou W. Enabling public verifiability and data dynamics for storage security in cloud computing. In: Backes M,
Ning P, eds. LNCS 5789. Heidelberg: Springer-Verlag, 2009. 355-370.
S. Viswalingam, G. Emayavaramban, M. Siva Ramkumar, A. Amudha, K. Balachander, S. Divyapriya, IR.V.
Authors:
Mohamed Mansoor
Performance Analysis of a Grid Connected PV-Wind with Super Capacitor Hybrid Energy Generation &
Paper Title:
Storage System
Abstract: The usage of renewable energy like solar photovoltaic (PV), wind [1] and super capacitor is garnering much
popularity due to the environmental awareness and progress in technology combined with reduced manufacturing
overhead. Power electronic converters are generally utilized for converting the power from the renewable sources to
match with the load demand and grid needs to enhance the dynamic and steady-state characteristics of these green
generation systems, to yield the maximum power point tracking (MPPT) control, and the energy storage system to
resolve this problem. With the aim of improving the efficacy and the power density of the overall circuit, the usage of a
three-port DC-DC converter [3] that comprises of a DC input port for the renewable source, a bidirectional DC input
port for the energy storage system, and a DC output port for driving the load, is a desirable solution to the conventional
technique employing two DC-DC converters: one for the renewable sources and another for the energy storage system.
Recently, several DC-DC three-port converters have been introduced and studied in the literature. In this research, a
comparison made on the characteristics of various topologies of three-port DC/DC converters, which have been
122. introduced by various research groups is reviewed in brief. The research work also explains the probable research
expansion of the topologies from three-port DC-DC converters with three switches and single inductor [9] and
minimizes the switching losses and supplies the power to grid. The simulation of the proposed system is done with 658-666
MATLAB/SIMULINK environment.

Keywords: PV, MPPT, Three Point DC-DC Converter, Super Capacitor, PI Controller, Matlab/Simulink.

References:
1. Sinha S., Chandel S. S. Review of recent trends in optimization techniques for solar photovoltaic-wind based hybrid energy systems. Renewable
Sustainable Energy Rev 2015; 50: 755-769.
2. Rehman Z., AI-Bahadly I., Mukhopadhyay S. Multiinput DC-DC converters in renewable energy applicatons-An overview. Renewable
Sustainable Energy Rev 2015; 41: 521-539.
3. Sun K., Zhang L., Xing Y., Guerrero J. M. A distributed control strategy based on dc bus signaling for modular photovoltaic generation system
with battery energy storage. IEEE Transaction on Power Electronics 2011; 26 (10):3032 - 3045.
4. Víctor Manuel Miñambres-Marcos, "A Grid Connected Photovoltaic Inverter with Battery-Supercapacitor Hybrid Energy Storage," Sensors,
August 2017.
5. Choi, M.; Kim, S.; Seo, S. Energy Management Optimization in a Battery/Supercapacitor Hybrid Energy Storage System. IEEE Trans. Smart Grid
2012, 3, 463-472.
6. Mendis, N.; Muttaqi, K.; Perera, S. Management of Battery-Supercapacitor Hybrid Energy Storage and Synchronous Condenser for Isolated
Operation of PMSG Based Variable-Speed Wind Turbine Generating Systems. IEEE Trans. Smart Grid 2014, 5, 944-953.
7. Etxeberria, A.; Vechiu, I.; Camblong, H.; Vinassa, J. Comparison of Sliding Mode and PI Control of a Hybrid Energy Storage System in a
Microgrid Application. Energy Procedia 2011, 12, 966-974.
8. Chen Y., Wen G., Peng L., Kang Y., J. Chen. A family of cost-efficient non-isolated single-inductor three-port converters for low power stand-
alone renewable power applications. In: APEC; 2013: 1083 - 1088.
9. Chen Y. M., Yu X., Huang A. Q. A new non-isolated three-port DC/DC converter with high step-up/down ratio. In:ECCE; 2012: 1520 - 1526.
10. Zhu H., Zhang D., Zhang B., Zhou Z. A non-isolated three-port DC-DC converter and three-domain control method for PV-battery power
systems. IEEE Transactions on Industrial Electronics 2015; 62(8): 4937-4947.
11. Alves D. B. S., Praca P. P., Oliveira Jr. D. S., Barreto L. H. S. C., de Freitas L. C. G. A single-stage three-port boost converter with high voltage
gain based on the bidirectional version of the three-state switching cell. In: APEC;
12. Zhang P., Chen Y., Zhou Z., Kang Y. The cost-efficient, common-ground, non-isolated three-port converter deduced from the single-inductor
dual-output topology. In: APEC; 2015: 2020 - 2025.
13. Qian Z., Rahman O. A., Al-Atrash H., Batarseh I. Modelling and control of three-port DC/DC converter interface for satellite applications. IEEE
Transactions on Power Electronics 2010; 25(3): 637-649.
14. Qian Z., Rahman O. A., Reese J., Atrash H. A., Batarseh I. Dynamic analysis of three-port DC/DC converter for space applications. In: APEC;
2009: 28 - 34.
15. Dr.A. Amudha, M.Siva Ramkumar, M.,SivaramKrishnan "Perturb and Observe Based Photovoltaic Power Generation System For Off-Grid Using
Sepic Converter" International Journal of Pure and Applied Mathematics, 114(7), pp. 619-628,2017.
16. M.Siva Ramkumar, M.Sivaram Krishnan, Dr.A. Amudha "Resonant Power Converter Using GA For PV Applications" International Journal Of
Electronics, Electrical And Computational System, 6 (9) pp239-245, 2017.
17. M.Siva Ramkumar, M.Sivaram Krishnan, Dr.A.Amudha "Impedance Source Inverter and Permanent Magnet Synchronous Generator For
Variable Speed Wind Turbine " International Journal of Computer & Mathematical Sciences (IJCMS) 6 (9) pp 98-105, 2017.
18. M.Siva Ramkumar "Unmanned Automated Railway Level Crossing System Using Zigbee" in International Journal of Electronics Engineering
Research (IJEER) 9 (9) pp1361-1371, 2017.
19. M. Sivaram Krishnan M. Siva Ramkumar and A. Amudha "Frequency Deviation Control In Hybrid Renewable Energy System Using Fc-Uc" in
International Journal of Control Theory and Applications (IJCTA) 10 (2) pp 333-344, 2017.
20. M Siva RamKumar, Dr.A. Amudha, R. Rajeev "Optimization For A Novel Single Switch Resonant Power Converter Using Ga To Improve Mppt
Efficiency Of Pv Applications" in International Journal of Applied Engineering Research (IJAER) 11(9) pp 6485-6488, 2016. .
21. M.Sivaram Krishnan, M.Siva Ramkumar and M.Sownthara "Power Management Of Hybrid Renewable Energy System By Frequency Deviation
Control" in 'International Journal of Innovative Research in Science, Engineering and Technology' on 3 (3) pp 763-769, 2016.
22. R.Sudhakar and M.Siva Ramkumar "Boosting With SEPIC" in 'International Journal of Engineering and Science' 3 (4) pp 14-19,2014.
23. M.Sownthara and M.Siva Ramkumar "Wireless Communication Module To Replace Resolver Cable In Welding Robot" in International Journal
of Advanced Information Science and Technology on 23(23 ) pp 230-235,2014.
24. M.Siva Ramkumar and M.Sivaram Krishnan "Hybrid Solar-Wind Energy System" in 'International Journal of Advance Research in Computer
Science and Management Studies' 2(2), 2014.
25. M.Sivaram Krishnan and M.Siva Ramkumar "Power Management Of A Hybrid Solar-Wind Energy System" in 'International Journal of
Engineering Research &Technology' 2 (1) pp1988-1992, 2014.
26. M.Sivaram Krishnan and M.Siva Ramkumar "Power Quality Analysis In Hybrid Energy Generation System" in 'International Journal of
Advance Research in Computer Science and Management Studies 2 (1) pp 188-193,2014
27. S. Ananthanarayanan, Dr.A. Amudha, Dr.K. Balachander, M. Siva Ramkumar and D. Kavitha, "Design and Analysis of Power Quality
Improvement in Distribution Side Using PCC Technique with Fuzzy Logic Control" Journal of Advanced Research in Dynamical and Control
Systems, (12), pp 844-852
28. T. Kalimuthu, M. Siva Ramkumar, Dr.A. Amudha, Dr.K. Balachander and M. Sivaram Krishnan "A High Gain Input-Parallel Output-Series
DC/DC Converter with Dual Coupled-Inductors" Journal of Advanced Research in Dynamical and Control Systems, (12), pp 818-824
C. Chinnusamy, Dr.G. Emayavaramban, Dr.A. Amudha, Dr.K. Balacahnder and M. Siva Ramkumar, "Transient Stability Improvement in Power
System with SMES and Battery Energy Storage System" Journal of Advanced Research in Dynamical and Control Systems, (12), pp 900-914
29. K. Kaleeswari, Dr.K. Balachander, Dr.A. Amudha, M. Siva Ramkumar and D. Kavitha, "Analysis and Parallel Operation of Novel Bidirectional
DC-DC Converter for DC Micro Grid" Journal of Advanced Research in Dynamical and Control Systems, (12), pp 928-940
30. M. Jayaprakash, D. Kavitha, M. Siva Ramkumar, Dr.K. Balacahnder and M. Sivaram Krishnan, "Achieving Efficient and Secure Data Acquisition
for Cloud-Supported Internet of Things in Grid Connected Solar, Wind and Battery Systems" Journal of Advanced Research in Dynamical and
Control Systems, (12), pp 966-981
31. LiJunwei, S.Ramkumar, G. Emayavaramban, D.Frankl n vinod, M. Thilagaraj, V. Muneeswaran, M. Pallikonda Rajasekaran, V.
Venkataraman, Ahmed Faeq Hussein, IEEE Access, "Brain Computer Interface for Neurodegenerative Person Using Electroencephalogram",
pp.2439 - 2452 Vol.(7), 2019.
32. GuJialu, S.Ramkumar, G. Emayavaramban, M. Thilagaraj, V.Muneeswaran, M. Pallikonda Rajasekaran, Ahmed Faeq Hussein "Offline Analysis
for Designing Electrooculogram Based Human Computer Interface Control for Paralyzed Patients" IEEE Access, 2018 , Vol.(6), pp: 79151 -
79161.
33. G.Emayavaramban, S.Ramkumar, A.Amudha, "Classification of Hand Gestures Using FFNN and TDNN Networks", International Journal of Pure
and Applied Mathematics, Vol.118 (8), 27-32.
34. G Emayavaramban, A Amudha, "Identifying Hand Gestures Using SEMG for Human Machine Interaction", ARPN Journal of Engineering and
Applied Sciences, Vol.11 (21), pp.12777-12785.
35. G Emayavaramban, A Amudha, "Recognition of sEMG for Prosthetic Control Using Static and Dynamic Neural Networks", International Journal
of Control Theory and Applications, Vol. 9 (24), pp.205-215.
36. D.Kavitha, Dr.C.Vivekanandan, "AnAdjustable Speed PFC Buck- boost Converter Fed Sensor less BLDC Motor" in International Journal of
Applied Engineering Research, ISSN 0973-4562 Vol. 10 No.20 (2015), pg. 17749-17754.
37. D. Kavitha, N. Sivakumar, M. Siva Ramkumar, V. Bhavithira, and S. Kalaiarasi, "A Single Stage High Gain Converter for Grid Interconnected
Renewable Application using Perturb and Observe" in International Journal of Control Theory and Applications, ISSN: 0974-5572 Vol. 10 No.38
(2017), pg. 161-175.
38. D.Kavitha, Dr.A.Amudha and S.Divyapriya, "Design of Controller for Regenerative Braking using BLDC Motor Applicable for Electric Vehicle"
in International Journal of Electronics, Electrical and Computational System- IJEECS, ISSN 2348-117X, Volume 6, Issue 9, September 2017,
pg.245-252
39. K. Govindaraju, V. Bhavithira, D. Kavitha, S. Kuppusamy, and K. Balachander, "Improvement of Voltage Profile and Loss Minimization in IEEE
14 Bus System using FACTS Devices" in International Journal of Control Theory and Applications, ISSN: 0974-5572 Vol. 10 No.38 (2017), pg.
213-224.
40. Xin Wan , Kezhong Zhang1, S. Ramkumar J. Deny, G. Emayavaramban , M. Siva RamkumarAnd Ahmed Faeq Hussein ," A Review on
Electroencephalogram Based BrainComputer Interface for Elderly Disabled" in IEEE Access, 2019 , Vol.(7), pp: 36380 - 36387.
41. Dr.A.Amudha, M.Siva Ramkumar, M.Sivaram Krishnan "DESIGN AND SIMULATION OF ZETA CONVERTER WITH ZVZCS SWITCHING
TECHNIQUE" Journal of Engineering and Applied Sciences ,14(9) pp 2764-2774 (DOI: 10.3923/jeasci.2019.2764.2774
42. M. Sivaram Krishnan, S. Sri Ragavi, M. Siva RamKumar, D. Kavitha "Smart Asthma Prediction System using Internet of Things" Indian Journal
of Public Health Research & Development, 10 (2) , pp 1103-1107 DOI:10.5958/0976-5506.2019.00445.5

123. Authors: Ajith Kumar V, K Satyanarayan Reddy


Paper Title: Research on Secure D2D Communication using Lightweight Cryptographic Techniques
Abstract: Outgrowth of wireless mobile communication lead to new revolution. Smart phones are making inroads into
socio economic realms. Today we use smart phones almost like a personal computer. Some important milestones have
been witnessed, such as number of fixed line Telephone connection has been surpassed by number of mobile phone
connection, Number of connected/IP enabled devices in home surpassed more than one per person. In nutshell, people
are living in a connected world, trying to connect unconnected things. Devices are becoming intelligent, smart and
connected. Need for Device to Device communication is growing every day. D2D communication is becoming popular
in health care , disaster or emergency services, power grid and lot many. Security cannot be undermined as D2D
communication is becoming pivotal and impacting larger part of our life. In this paper our focus is on security
challenges in D2D communication and explore remediation with lightweight cryptography. In this paper an effort has
been made to study various techniques for securing D2D communication. This paper focuses on securing D2D
communication using lightweight cryptographic algorithms.

Keywords: D2D Communication, Federal Information Processing Standard, Lightweight Cryptography, National
Institute of Standards and Technology, User Equipment.

References:
1. A. Asadi, Q. Wang and V. Mancuso, "A Survey on Device-to-Device Communication in Cellular Networks," in IEEE Communications Surveys
& Tutorials, Vol. 16, No. 4, (2014), pp. 1801-1819, http://dx.doi.org/10.1109/COMST.2014.2319555
2. Pimmy Gandotra, Rakesh Kumar Jha and Sanjeev Jain, "A Survey on Device-to-Device (D2D) Communication: Architecture and Security
Issues," Journal of Network and Computer Applications, Vol. 78, (2017), pp. 9-29, http://dx.doi.org/ 10.1016/ j.jnca.2016.11.002
3. A. Orsino and A. Ometov, "Validating Information Security Framework for Offloading from LTE onto D2D Links," in Proceedings of the 18th
Conference of Open Innovation and Seminar on Information Technology (FRUCT-ISPIT), (2016), pp. 241-247,
http://dx.doi.org/10.1109/FRUCT-ISPIT.2016.7561534
4. Y. Zhang, E. Pan, L. Song, W. Saad, and Z. Dawy, "Social Network Aware Device-to-Device Communication in Wireless Networks," in IEEE
Transactions on Wireless Communications, Vol. 14, No.1,(2015), pp.177-190, http://dx.doi.org/10.1109/ TWC.2014.2334661
5. L. Goratti, G. Steri, K. Gomez, and G. Baldini, "Connectivity and security in a D2D communication protocol for public safety applications,"
International Symposium on Wireless Communications Systems (ISWCS), (2014), pp. 548-552, http://dx.doi.org/10.1109/ ISWCS.2014.6933414
6. Aleksandr Ometov, Konstantin Zhidanov, Sergey Bezzateev, Roman Florea, Sergey Andreev and Yevgeni Koucheryavy, "Securing Network-
Assisted Direct Communication: The Case of Unreliable Cellular Connectivity," in Proceedings of IEEE 14th International Conference on Trust,
Security and Privacy in Computing and Communications (TrustCom), (2015), pp. 826-833, http://dx.doi.org/10.1109/Trustcom.2015.453
7. W. Shen, W. Hong, X. Cao, B. Yin, D. M. Shila and Y. Cheng, "Secure key establishment for Device-to-Device communications," IEEE Global
Communications Conference,(GLOBECOM), (2014), pp. 336-340, http://dx.doi.org/ 10.1109/GLOCOM.2014.7036830
8. Kwon, H., Kim, D., Hahn, C. et al, "Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks",
Multimedia Tools and Applications, Vol. 76, Issue 19, pp.19507-19521, (2017), http://dx.doi.org/10.1007/s11042-015-3187-z
9. A. Hadiks, Y. Chen, F. Li and B. Liu, " A study of stealthy denial-of-service attacks in Wi-Fi direct device-to-device networks," in IEEE 11th
Consumer Communications and Networking Conference (CCNC), (2014), pp. 507-508, http://dx.doi.org/ 10.1109/ CCNC.2014.6994425
10. E. Abd-Elrahman, H. Ibn-khedher, H. Afifi and T. Toukabri, "Fast group discovery and non-repudiation in D2D communications using IBE",
International Wireless Communications and Mobile Computing Conference (IWCMC), (2015), pp.616-621, http://dx.doi.org/ 667-675
10.1109/IWCMC.2015.7289154
11. C. Ma, J. Liu, X. Tian, H. Yu, Y. Cui and X. Wang, "Interference Exploitation in D2D-Enabled Cellular Networks: A Secrecy Perspective", in
IEEE Transactions on Communications, (2015), Vol. 63, No. 1, pp. 229-242, http://dx.doi.org/ 10.1109/ TCOMM.2014.2379633
12. A. Ometov, A. Orsino, L. Militano, G. Araniti, D. Moltchanov and S. Andreev, "A Novel Security-Centric Framework for D2D Connectivity
Based on Spatial and Social Proximity," Computer Networks, (2016), Vol. 107, Part 2, pp. 327-338, https://doi.org/ 10.1016/j.comnet.2016.03.013
13. Huang, Jun, Yi Sun, Zi Xiong, Qiang Duan, Yanxiao Zhao, Xianghui Cao, and Wei Wang, "Modeling and Analysis on Access Control for
Device-to-Device Communications in Cellular Network: A Network-Calculus-Based Approach," in IEEE Transactions on Vehicular Technology,
(2016), Vol. 65, No. 3, pp. 1615-1626, https://doi.org/ 10.1109/TVT.2015.2412154
14. Younchan Jung, Enrique Festijo, Marnel Peradilla, "Joint operation of routing control and group key management for 5G ad hoc D2D networks"
International Conference on Privacy and Security in Mobile Systems (PRISMS), (2014), pp. 1-8, https://doi.org/10.1109/ PRISMS.2014.6970602
15. Udit Narayana Kar and Debarshi Kumar Sanyal, "An Overview of Device-to-device Communication in Cellular Networks", ICT Express, (2017),
https://doi.org/10.1016/j.icte.2017.08.002.
16. Kerry A. McKay, Larry Bassham, Meltem Sönmez Turan, Nicky Mouha, "Report on Lightweight Cryptography", National Institute of Standards
and Technology Internal Report 8114, (2017), https://doi.org/10.6028/NIST.IR.8114
17. Sadhukhan, R., Patranabis, S., Ghoshal, A. et al., Journal of Hardware and Systems Security, (2017), Vol. 1, Issue 3, pp 203-218,
https://dx.doi.org/10.1007/s41635-017-0021-2
18. Othmane Nait Hamoud, Tayeb Kenaza and Yacine Challal, "Security in device-to-device communications: a survey," in IET Networks, (2018),
Vol. 7, No. 1, pp. 14-22, http://dx.doi.org/10.1049/iet-net.2017.0119
19. Ravindranath Sedidi and Abhinav Kumar, "Key exchange protocols for secure Device-to-Device (D2D) communication in 5G," The Wireless
Days Conference, (2016), pp. 1-6, http://dx.doi.org/10.1109/ WD.2016.7461477
20. I. Abualhaol and S. Muegge, "Securing D2D Wireless Links by Continuous Authenticity with Legitimacy Patterns," 49th Hawaii International
Conference on System Sciences (HICSS), (2016), pp. 5763-5771, http://dx.doi.org/10.1109/HICSS.2016.713
21. Panasenko, Sergey P. and Sergey A. Smagin, "Lightweight Cryptography: Underlying Principles and Approaches", International Journal of
Computer Theory and Engineering, (2011), Vol. 3, No. 4, available online: http://www.ijcte.org/show-37-375-1.html, last visit:01.11.2018
22. Hatzivasilis, G., Fysarakis, K., Papaefstathiou, I. et al.,"A review of lightweight block ciphers", Journal of Cryptographic Engineering,
(2018),Vol. 8, Issue 2, pp 141-184, https://doi.org/10.1007/s13389-017-0160-y
23. Ajithkumar V and K Satyanarayan Reddy, "A Survey on Security of Mobile Handheld devices through Elliptic Curve Cryptography", ACCENTS
Transactions on Information Security, (2017), Vol.2, No.6, pp.32-35, http://dx.doi.org/10.19101/TIS.2017.26001
24. T. Eisenbarth, S. Kumar, C. Paar, A. Poschmann and L. Uhsadel, "A Survey of Lightweight-Cryptography Implementations," in IEEE Design &
Test of Computers, (2007), Vol. 24, No. 6, pp. 522-533, http://dx.doi.org/10.1109/MDT.2007.178
25. H. Zhang, T. Wang, L. Song and Z. Han, "Radio resource allocation for physical-layer security in D2D underlay communications", IEEE
International Conference on Communications (ICC), (2014), pp.2319-2324, http://dx.doi.org/10.1109/ICC.2014.6883669
26. D. Zhu, A et al., "Device-to-device communications: The physical layer security advantage", IEEE International Conference on Acoustics, Speech
and Signal Processing (ICASSP), (2014), 2014, pp. 1606-1610. http://dx.doi.org/ 10.1109/ICASSP.2014.6853869
27. E. Panaousis, T. Alpcan, H. Fereidooni, and M. Conti, "Secure message delivery games for Device-to-Device communications," Decision and
Game Theory for Security, Lecture Notes in Computer Science,(2014), Vol.8840, pp. 195-215.
28. Ajithkumar Vyasarao and K Satyanarayan Reddy, "Application of Elliptic Curve Cryptography for Mobile and Handheld devices", in Proceedings
of International Conference on Contemporary Issues of Science, Engineering and Management (ICCI-SEM-2K17), (2017), pp. 87-91, ISBN:978-
93-86352-38-5
29. Dinu, D., Corre, Y.L., Khovratovich, D. et al., "Triathlon of lightweight block ciphers for the Internet of things", Journal of Cryptographic
Engineering, (2018), pp.1-20, http://dx.doi.org/ 10.1007/s13389-018-0193-x
30. Yasir Javed, Adnan Shahid Khan, Abdul Qaharand Johari Abdullah, "EEoP: A Lightweight Security Scheme over PKI in D2D Cellular
Networks", Journal of Telecommunication Electronic and Computer Engineering, (2018), Vol. 9, No. 3-11, pp 99-105.
31. M. Janardhana Raju Raju, Dr. P.Subbaiah, V.Ramesh, "A Novel Elliptic Curve Cryptography Based AODV for Mobile Ad-Hoc Networks for
Enhanced Security", Journal of Theoretical and Applied Information Technology, Vol.58, Issue 3, Dec'2013.
32. Wei Xi et al., "KEEP: Fast secret key extraction protocol for D2D communication", IEEE 22nd International Symposium of Quality of Service
(IWQoS), (2014), pp. 350-359, http//dx.doi.org/10.1109/ IWQoS.2014.6914340
33. W. Shen, B. Yin, X. Cao, L. X. Cai and Y. Cheng, "Secure device-to-device communications over WiFi direct," in IEEE Network, (2016), Vol.
30, No. 5, pp. 4-9, http://dx.doi.org/10.1109/ MNET.2016.7579020
Authors: V. A. Narayana, Gaddamidhi Sreevani, K. Srujan Raju
Paper Title: Dynamic Monitoring of Near Duplicate Database Instances on The Web Channels
Abstract: A dynamic monitoring of near duplicated dynamic instances in interconnected databases on the web
channels. In the intercon-nected database, dynamic instances can have inbound and outbound interconnections. From the
set of multiple dynamic instances, a primary dynamic instance and a secondary dynamic instance is chosen. For each
nominated dynamic instances, the number of outbound interconnections is chosen. The two dynamic instances are fixed
as near duplicates based on the quantity of common outbound inter connections for the two instances. The selected
primary and secondary instances near duplicates dynamic monitoring achieved on the web channels

Keywords: Duplicate databases, web channels, interconnection, dynamic instance

References:
1. Fetterly D, Chuan Xiao, Wei Wang, Xuemin Lin, Jeffrey Xu Yu , "Efficient Similarity Joins for Near Duplicate Detection", Proceeding of the
17th international conference on World Wide Web, pp:131--140, 2008.
2. Zhewang, William Josephson, Qin Lv,MosesCharikar, Kai Li,"Filtering Image Spam with Near-Duplicate Detection",Computer Science
department, Princeton University,USA.
3. Yan Ke, Rahul Sukhthankar, Larry Huston," Efficient Near-duplicate Detection and Sub-image Retrieval", School of Computer Science Carnegie
124. Mellon University,Pittsburgh,USA.
4. Z. Broder, S. C. Glassman, M. S. Manasse, and G. Zweig. "Syntactic clustering of the web". Computer Networks, 29(8-13):1157-1166, 1997. 676-678
5. J. Cho, N. Shivakumar, and H. Garcia-Molina. "Finding replicated web collections". In SIGMOD, 2000.
6. T. C. Hoad and J. Zobel. "Methods for identifying versioned and plagiarized documents". JASIST, 54(3):203-215, 2003.
7. J. Fridrich, D. Soukal, and J. Lukas. Detection of copy-move forgery in digital images. In Digital Forensic Research Workshop, 2003.
8. J. Luo and M. Nascimento. Content based sub-image retrieval via hierarchical tree matching. In Proceedings of ACM Workshop on Multimedia
Databases, 2003.
9. S. Berrani, L. Amsaleg, and P. Gros. Robust content-based image searches for copyright protection. In Proceedings of ACM Workshop on
Multimedia Databases, 2003.
10. Ramachandran and N. Feamster. Unerstanding the nework-level behavior of spammers. ACM SIGCOMM Computer Communication Review,
36(4), Oct. 2006.
11. Y. Rui, A. C. She, and T. S. Huang, Modified fourier descriptors for shape representation-a practical approach, in Proc.
12. L. Schiff, N. Van House, and M. H. Butler. Unpublished study of image database users.
13. Sachiko Yoshihama, Takuya Mishina, and Tsutomu Matsumoto "Web-based Data Leakage Prevention" Yokohama National University,
Yokohama, Kanagawa, Japan.
14. Zi Huang, Heng Tao Shen, Jie Shao, Bin Cui "Practical Online Near-Duplicate Subsequence Detection for Continuous Video Streams"IEEE
transactions on multimedia, vol. 12, no. 5, august 2010.
15. Heng Tao ShenXiaofang Zhou Zi Huang Jie Shao Xiangmin Zhou "UQLIPS: A Real-time Near-duplicate Video Clip Detection System" School
of Information Technology and Electrical Engineering The University of Queensland.
16. Hui Yang, Jamie Callan "Near-Duplicate Detection for eRulemaking" Language Technology Institute Carnegie Mellon University Pittsburgh, PA,
15213, USA
Authors: Vandana Khare, Dr. M. Sudhakar
Paper Title: Quality of Service Parameters Evaluation for Real Time Traffic in Cellular Networks
Abstract: Quality of Service (QoS) represents the quality measure in cellular service to users to provide an error free
service with defined voice quality, minimum acceptable signal strength, limited call blocking and dropping probability
even at high data transmission rates. RF Analysis and Optimization are important processes to attain Quality of Service,
which are carried out by using Drive-test tool. RF performance parameters such as the received signal strength at user
and Ratio of the necessary signal (data) to the interference present in the atmosphere are defined in this paper, for the
efficient and effective functioning of the RF network of different service providers in a given service test area. We have
also measured short-call and long-call control tests from the drive testing process to facilitate analysis of call success
rate, blocked calls and dropped calls. Our analysis of the drive test results has helped us in identify problems like fewer
throughputs, drop calls, handover failures in a service test area for different service providers.

125. Keywords: QoS, Call success rate, Call dropping rate, Call blocking rate, CQI
679-681
References:
1. ANINYIE, P. 2012. Performance Evaluation Of A GSM/GPRS Cellular Network Usi The CSSR With Direct TCH Assignment Feature. Ghana:
Kwame Nkrumah University Of Science and Technology, College Of Engineering.
2. CHATZIMILIOUDIS, G., KONSTANTINIDIS, A., LAOUDIAS, C., AND ZEINALIPOUR-YAZTI, D..2011. Crowd sourcing with
Smartphones. IEEE Journal of Internet Computing, 16(5), 36-44.
3. CIPRIAN-MIHAI, B. 2011. Indoor Localization of Mobile Devices for Wireless Monitoring System Based on Crowd sourcing. Edinburgh:
Master's thesis, School of Informatics, University of Edinburgh.
4. ENRIQUE, E. A., AND FERNANDO, G. 2012. Towards an integrated crowd sourcing definition. Journal of Information Science, 38(2), 189-200.
5. HARDY, W. C. 2001. QoS: Measurement and Evaluation of Telecommunications Quality of Service. UK: John Wiley and Sons Limited.
6. IDIGO, V., AZUBOGU, A., OHANEME, C., AND AKPADO, K. 2012. Real-Time Accessments of Qos of Mobile Cellular Networks in Nigeria.
International Journal of Engineering Inventions, 1(6), 64-68.
7. JARMO, P. 2007. QoS Measurements Methods and Tools. IST Summit. Budapest: VTT Technical Reseach Centre of Finland
8. OSAHENVEMWEN, O., AND EMAGBETERE, J. 2012. Traffic Analysis in Mobile Communication in Nigeria. Journal of Emerging Trends in
Engineering and Applied Sciences, 3(2), 239-243.

126. Authors: Archana Bathula, Shaik Karimullah Basha


Paper Title: Blockchain Technology with Internet of Things in the Real time Network Stream
Abstract: Today, as world is going towards computerization and smart objects, IoT is most mainstream territory for
research at this moment. There are such a large number of security issues related with IoT, for instance, private
information gathering, uncertain interfaces, unencrypted communications, and so forth. Customary cryptography plans
are bad for the IoT as they put pointless overhead on low limit IoT gadgets. Potential answers for this issue are utilizing
lightweight cryptography or utilizing existing cryptography squares and adjusting it to help IoT gadgets. In trivial
cryptography, we can't bring down the key size and cost of present day outline and standard of current plan are issues. In
existing cryptography square AES 256 can be utilized yet it is as yet costly for IoT gadget with low processing capacity.
Here has been expanding enthusiasm for receiving Blockchain (BC) that supports the digital currency Bitcoin, in
Internet of Things (IoT) for security and privacy. Notwithstanding, BCs are computationally costly and include high
data transfer capacity overhead and deferrals, which are not appropriate for most IoT gadgets. This paper proposes a
BC-based networking for IoT that for all intents and purposes the overheads of great BC, while keeping up a large
portion of its security and privacy benefits.

Keywords: Attacks, Blockchain Technology (BC), combination of BC and IOT, IOT, privacy, security, uses. 682-689

References:
1. A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, "Hawk: The blockchain model of cryptography and privacy-preserving smart
contracts," in Security and Privacy (SP), 2016 IEEE Symposium on. IEEE, 2016, pp. 839-858.
2. S. Nakamoto, "Bitcoin: A peer-to-peer electronic cash Network," 2008.
3. G. Wood, "Ethereum: A secure decentralised generalised transaction ledger," Ethereum Project Yellow Paper, vol. 151, 2014.
4. X. Yue, H. Wang, D. Jin, M. Li, and W. Jiang, "Healthcare data gateways: Found healthcare intelligence on blockchain with novel privacy risk
control," Journal of medical Networks, vol. 40, no. 10, p. 218, 2016.
5. M. Abramaowicz, "Cryptocurrency-based law," Ariz. L. Rev., vol. 58, p. 359, 2016.
6. B.I.O.T.S.B.I.W.B.C.B. Used, https://www.cbinsights.com/ blog/industries-disrupted-blockchain, [Online; accessed 19-April- 2017].
7. M. Vukolic, "The quest for scalable blockchain fabric: Proof-of- ´ work vs. bft replication," in International Workshop on Open Problems in
Network Security. Springer, 2015, pp. 112-125.
8. Altcoin, http://altcoins.com, [Online; accessed July-2017].
9. E. C. Ferrer, "The blockchain: a new framework for robotic swarm Networks," arXiv preprint arXiv:1608.00695, 2016.
10. G. Brambilla, M. Amoretti, and F. Zanichelli, "Using block chain for peer-to-peer proof-of-location," preprint arXiv:1607.00174, 2016.
Authors: A Poongodai, R Suhasini, R Muthukumar
Paper Title: Regression Based on Examining Population Forecast Accuracy
Abstract: India is the World’s second largest populated country after China. The population of India is around 15% of
the world while its geographical area is just 2.4 percent of the world. Slowing down population growth andimproving
population quality are the key factor in improving India’s economic development.For this, population forecasting plays
an important role. Population forecasting is widely used for planning and budgeting. Hence, there is need of accurate
forecasting. This study investigates the population forecast accuracy by using regression models. It also examines the
effect of growth rate and population size on the forecast errors.

Keywords: Population Forecast, Forecast accuracy,Population size, Growth Rate, Regression, Forecast error,
precision and bias

References:
1. D.G Lenze, 2000, "Forecast accuracy and efficiency: an evaluation of ex ante substate long-term forecasts", International Regional Science
Review, 23, 201-226.
2. Divisha S, "Population projection: Meaning, Types and Importance", http://www.sociologydiscussion.com/demography/population-
projections/population-projections-meaning-types-and-importance/3058", Accessed on 1/10/2018
3. GeetanjaliDiwani, 2017, "Nexus between Population, Income, Output and Employment: Econometric Evidence from India", International Journal
127. of Multidisciplinary and Current Research, ISSN: 2321-3124.
4. J Tayman, 1996, "The accuracy of small area population forecasts based on a spatial interaction land-use modeling system", Journal of the 690-692
American Planning Association, 62, 85-98.
5. Jeff Tayman, Stanley K. Smith and Stefan Rayer, 2011, "Evaluating Population Forecast Accuracy: A Regression Approach Using County Data",
Population Res Policy Rev, Springer, 30:235-262.
6. Manjul Mayank Pandey, Rupam Tiwari and Anupama Choubey, 2015, "Population Dynamics in India",International Journal of Scientific &
Engineering Research, Vol 6, Issue-1, ISSN 2229-5518.
7. N Keyfitz, 1981, "The limits of population forecasting", Population and Development Review, 7, 579-593.
8. Nayal, Lama, 2015, "Regression Analysis To Forecast the Demand of New Single Family Houses in USA", Culminating Projects in Mechanical
and Manufacturing Engineering, Paper 15.
9. Rayer S, 2008, "Population forecast errors: A primer for planners", Journal of Planning Education and Research, 27, 417-430.
10. Samir Mazidbhai Vohra, 2015, "Population Growth - India's Problem", PARIPEX - Indian Journal of Research.
11. Schafer E, Tayman J, Carter L, 1998, "The role of population size in the determination and prediction of population forecast errors: An evaluation
using confidence interval for subcounty areas", Population Research and Policy Review, 17(1), 1-20.
12. Seung-Joo, Lee Sunghae Jun and Jea-Bok Ryu, 2015, "A Divided Regression Analysis for Big Data", International Journal of Software
Engineering and Its Applications
13. Smith S K, 1987, "Tests of forecast accuracy and bias for county population projections", Journal of the American Statistical Association, 82, 991-
1003.
14. Stoto M, 1983, "The accuracy of population projections", Journal of the American Statistical Association, 78, 13-20.
15. Weston Anderson, Seth Guikema, Ben Zaitchik, William Pan, 2014, "Methods for Estimating Population Density in Data-Limited Areas:
Evaluating Regression and Tree-Based Models in Peru", PLoS ONE 9(7): e100037
Authors: Sreenivasa.N, S. Balaji
Paper Title: Hybrid CPU-GPU Co-Processing Scheme for Simulating Spiking Neural Networks
128.
Abstract: Many attempts have been made to study the neural networks and to model them. These attempts have led to
693-696
the development of neural network simulation software packages such as GENESIS [15] and NEURON [18] which
have been the de-facto simulators for some time now. However, further studies have found that one of the major
hindrances in using the afore-mentioned simulators is speed. These simulators uses time driven technique which isolates
the mimicked time to brief time periods and in every progression the factors of neural states are estimated and reiterated
through a numerical examination strategy [9]. This method includes complex calculations which do not foster the
development of scalable neural systems. The interest for quick re-enactments of neural systems has offered ascend to the
use of alternative reproduction strategy: event driven simulation [12]. The event driven simulation technique just
processes and appraises the neural state factors when another event alters the typical advancement of the neuron, that is,
the point at which information is created. In the meantime, it is realized that the data communication in neural networks
is done by the purported spikes. These occasions are moderately inconsistent and restricted in time. Less than 1% of the
neurons are at the same time dynamic [21] and the exercises are amazingly small in numerous apprehensive territories,
for example, the cerebellumgranular layer [11][13] which catalyses the efficiency of event-driven Spiking Neural
Networks (SNN) simulation. In this work, we present our study on hybrid CPU-GPU based model for simulating SNNs.

Keywords: SNN, CPU-GPU co-processing, high performance computing, neural networks, numerical analysis

References:
1. Liwan,Yuling luo, Shuxiang song, Jim harkin, Junxiu liu "Efficient neuron architecture for FPGA-based spiking neural networks" Signals and
systems conference(ISSC), IEEE, 2016
2. Govind Narsimhan,Subhrajit Roy, Xuanyou Fong, Kaushik Roy, Chip-Hong Chang, Arindam Basu "A low-voltage, low power STDP synapse
implementation using domain-wall magnets for spiking neural networks" ISCAS, IEEE, 2016
3. Francisco Naveros, Niceto R. Luque, Jesús A. Garrido, Richard R. Carrillo, Mancia Anguita, and Eduardo Ro:"A Spiking Neural Simulator
Integrating Event-Driven and Time-Driven Computation Schemes Using Parallel CPU-GPU Co-Processing: A Case Study" IEEE transactions on
neural networks and learning systems, vol. 26, no. 7, July 2015.
4. Sparsh Mittal, Jeffrey S. Vetter "A Survey of CPU-GPU Heterogeneous Computing Techniques" ACM Computing Surveys, Vol. 47, No. 4,
Article 69, Publication date: July 2015.
5. Reza Haghighi and Chien Chern Cheah, "Optical Micromanipulation of Multiple Groups of Cells", IEEE International Conference on Robotics
and Automation (ICRA) Washington State Convention Center Seattle, Washington, 2015.
6. Youssef Chahibi, Sasitharan Balasubramaniam et.al., "Molecular Communication Modeling of Antibody-mediated Drug Delivery Systems", IEEE
Transactions On Biomedical Engineering, Vol. 62, No. 7, July 2015.
7. Andre Gruning and SanderM.Bohte, "Spiking Neural Networks: Principles and Challenges", University of Surrey, UnitedKingdom CWI,
Amsterdam, The Netherlands, ESANN 2014 proceedings, European Symposium on Artificial Neural Networks, ComputationalIntelligence and
Machine Learning. Bruges (Belgium), 23-25 April 2014
8. Hamid Soleimani Arash Ahmadi Mohammad Bavandpour A. Ali Amirsoleimani Mark Zwolinski A Large Scale Digital Simulation of Spiking
Neural Networks (SNN) on Fast SystemC Simulator" 14th International Conference on Modelling and Simulation,2012.
9. M. Rudolph-Lilith, M. Dubois, and A. Destexhe, "Analytical integrate- and-fi neuron models with conductance-based dynamics and realistic
postsynaptic potential time course for event- driven simulation strategies," Neural Computation., vol. 24, no. 6, pp. 1426-1461, 2012.
10. Jesus A. Garrido1, Richard R. Carrillo2, Niceto R. Luque1, and Eduardo Ros1 J. Cabestany, I. Rojas, and G. Joya (Eds.): "Event and Time Driven
Hybrid Simulation of Spiking Neural Networks" IWANN 2011, Part I, LNCS 6691, pp. 554-561, 2011.
11. N. R. Luque, J. A. Garrido, R. R. Carrillo, O. J.-M. D. Coenen, andE. Ros, "Cerebellar like corrective model inference engine for manipulation
tasks", IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 41, no. 5, pp. 1299-1312, Oct. 2011.
12. J. A. Garrido, R. R. Carrillo, N. R. Luque, and E. Ros, "Event and time driven hybrid simulation of spikingneural networks," Adv. Comput. Intell,
vol. 6691, pp. 554-561, Jun. 2011.
13. N. R. Luque, J. A. Garrido, R. R. Carrillo, O. J. D. Coenen and E. Ros, "Cerebellar input configuration toward object model abstraction in
manipulation tasks," IEEE Trans. Neural Networks, vol. 22, no. 8, pp. 1321-1328, Aug. 2011.
14. D. F. Goodman and R. Brette, "The Brian simulator," Frontiers Neuroscience., vol. 3, no. 2, pp. 192-197, 2009.
15. R. R. Carrillo, E. Ros, C. Boucheny and O. J. D. Coenen, "A real time spiking cerebellum model for learning robot control", Bio-systems, vol. 94,
nos. 1-2, pp. 18-27, 2008.
16. Gibson Hu, Ying Guo, Rongxin Li, Adaptive Systems Team, Autonomous Systems Laboratory ICT Centre, CSIRO", A Self-Organizing Nano-
Particle Simulator and Its Applications", 978-0-7695-3166-3/08 $25.00 © 2008 IEEE.
17. R. Brette et al., "Simulation of networks of spiking neurons: A review of tools and strategies," J. Computer. Neuroscience., vol. 23, no. 3, pp. 349-
398, 2007.
18. M.-O. Gewaltig and M. Diesmann, "NEST (neural simulation tool)",Scholarpedia, vol. 2, no. 4, p. 1430, 2007.
19. E. Ros, R. Carrillo, E. M. Ortigosa, B. Barbour, and R. Agis, "Event- driven simulation scheme for spiking neural networks using lookup tables to
characterize neuronal dynamics", Neural Computing, vol. 18, no. 12, pp. 2959-2993, 2006.
20. E. Kandel, J. Schwartz, and T. Jessell, Principles of Neural Science, 4th ed. Amsterdam, Netherlands: Elsevier, 2000.
21. R. O'Reilly and Y. Munakata, Computational Explorations in Cognitive Neuroscience: Understanding the Mind by Simulating the Brain.
Cambridge, MA, USA: MIT Press, 2000.
22. W. Gerstner and W. Kistler, Spiking Neuron Models. Cambridge, U.K.: Cambridge Univ. Press, 2002.
23. R.Brette et al., "Simulation of networks of spiking neurons: A review of tools and strategies," J. Comput. Neurosci., vol. 23, no. 3, pp. 349-
398,2007.
24. A. L. Hodgkin and A. F. Huxley, \A quantitative description of membrane current and its application to conduction and excitation in nerve", J.
Physiology, vol. 117, no. 4, pp. 500-544, 1952.
25. Geetanjail Jichkar , Prof. Soni Chaturvedi, Dr. Mrs A. A. Khurshid "A Novel Approach to Character Recognition using Spiking Neural Model",
International Journal of Computer Science information and Engg., Technologies ISSN 2277-4408
Authors: Mohammad Zahid Fazal, Mallegowda M
Paper Title: Energy Efficient Transmission Using Adaptive Technique For WSNs
Abstract: An attempt is made in the present work to enhance the network lifetime of WSN through game theoretic
approach by employing efficient ECC technique, deployment schemes, MIMO and AMC. This paper has Comparison of
cooperative and non-cooperative transmission of data between sources to destination nodes in a remote area and the
129. consumption of energy is less in non-cooperative transmission than cooperative transmission. It shows game theoretic
framework for power regulator using “Error Control Coding (ECC)” and evaluate the performance metrics such as
697-699
utility, power efficiency and energy consumption of sensor network. Simulation results shows the achievement rate of
energy savings in both cooperative and non-cooperative transmission, and the energy saving in non-cooperative
transmission is more compare to cooperative transmission.

Keywords: Cooperative; Non-cooperative, ECC, BEP, MIMO


References:
1. A M Obed, P Karray, M Abid , M S Bensaleh, M W jamal, "Towards realization of wireless sensor network based water pipeline monitoring
systems a comprehensive review of technique and platform." 2016.
2. C Van Phan, H choi, Y park, J cho and J G Kim, " An energy efficient transmission strategy for wireless sensor networks, "IEEE Transactions on
consumer electronics, vol 56, no. 2, 2010
3. Mohsen Guizani, " wireless communications systems and networks', Kluwer Academic piblishers, New York, 2002.
4. M Deepak, C P chiasserini, "Joint optimization for cooperative wireless information and power transfer over rician channels", IEEE vol.62
December 2015.
5. Shih lin wu and yu chee tseng, "wireless Adhoc networking", New York, 2007
6. Z sheng, J Fan, CH Liu, KK Leung, " Energy efficient relay selection for cooperative relaying in wireless multimedia network." Mar 2015
7. Van valkenburg, M E network analysis(3rd Ed.) ISBN 0_13_611095_9. June 2008
8. G Xing, C Lu, Y Zhang, Q hung and R Pless, " Minimum power configuration in wireless sensor networks", May 2005
9. F Meshkati, H poor, S Schwartz and N Mandayam, "An energy efficient approach to power control and receiver design in wireless data
networks", Nov 2005
10. J C Harsanyi and R selten, "A general theory of equilibrium selection in games". MIT Press 1988.
Authors: Nanduri.Tejasree, Mahesh Kumar Challa
Paper Title: Adaptable and Fine Grained Quality Based Information Capacity in Cloud Computing
Abstract: cloud computing is a fundamentally new registering worldview, it enables versatile, on-ask for, insignificant
exertion utilization of figuring assets, however the information is passed on storage servers and server pulls in variation
contemplations. To guarantee the wellbeing and win versatile adaptable-grained record get to the executives, trait
principally coding (ABE) anticipated and utilized in customer disavowal is that ABE scheme. Paper, offer a figure
content strategy characteristic fundamentally based coding conspire practical customer denial. The trouble of client
disavowal might be comprehended hypothesis of client group. When any client leaves, the gathering supervisor can
refresh clients' close to home keys separated from individuals who are renounced. plot has critical computation esteem,
develops directly quality for the data.
130.
Keywords: attribute-based cryptograph, cloud computing, collusion attack, source secret writing, user revocation
700-702
References:
1. A. Sahai and B. Waters,"Fuzzy Identity-Based Encryption,"EUROCRYPT'05, LNCS, vol. 3494, pp. 457-473,2005.
2. J. Bethencourt, A. Sahai And B. Waters, "Ciphertext-Policy Attribute- Based Encryption," Proc. Ieee Symposium On Security And Privacy, Ieee
Transactions On Services Computing,Volume:Pp,Issue:99,Date Of Current Version:22.January.2016pp. 321-334, May 2007, Doi:
10.1109/Sp.2007.11.
3. V. Goyal, O. Pandey, A. Sahai, And B. Waters, "Attribute-Based En-Cryption For Fine-Grained Access Control Of Encrypted Data," Proc. 13th
Acm Conference On Computer And Communications Security (Ccs '06), Pp. 89-98, 2006, Doi:10.1145/1180405.1180418.
4. D. Boneh And M.K. Franklin, "Identity-Based Encryption From The Weil Pairing," Siam Journal Of Computing, Vol. 32, No. 3, Pp. 586-615,
2003.
5. A. Boldyreva, V. Goyal, and V. Kumar,"Identity-Based En-cryption with Efficient Revocation,"Proc.15th ACM conference on Computer and
communications security(CCS ' 08), pp. 417-426,2008.
Authors: LubnaNaaz Fatima, SyedaHajraMahin, Fahmina Taranum, Khaleel Ur Rahman Khan
Paper Title: Power Management Strategies in MANETs
Abstract: Nodes in MANETs transit from one mode to another in order to communicateamong themselves. Different
types of modes are transmit, receive, sleep and idle. Maintaining dynamic topology and states lead to consequences such
as consumption of more battery power thereby diminishes the network lifetime. Therefore, it is essential to optimize the
power consumption for improving the performance of the network. Many routing protocols have been proposed for
efficient routing of the data. Different routing protocols can be collaborated with multiple energy models such as
GENERIC, MICAZ, MICA-MOTES, and USER-DEFINED types in QualNet order to analyse the power consumption
mechanism. These protocols are implemented and evaluated to foregather the most reliable and efficient protocol.
Analyses are done with the main emphasis to achieve energy efficiency. Performance evaluation is done based on
metrics such as energy consumption, network lifetime, time to live, the amount of current utilized, cost of the battery,
drain count, etc.

Keywords: Energy Models; Energy Efficiency; MANET’s; Network lifespan; QualNet.


131. References:
1. Muhammad Azhar Iqbal, BinDai, Ben xiong Huang, A. Hassan, Shui Yu, "Survey of network coding-aware routing protocols in wireless 703-708
networks", journal of network and computer applications, Vol. 34, (2011), available online:
https://www.sciencedirect.com/science/article/pii/S1084804511001500, last visit:28.10.2018
2. Behra Rajesh Umashankar, RakhiKumari Purnima,"A Comparative Study of Topology and Position-Based Routing Protocols in Mobile Ad Hoc
Networks", International Journal of Advanced Research in Computer Science & Technology, Vol.2, No.1, (2014), available online:
http://www.ijarcst.com/doc/vol2-issue2/rajesh.pdf, last visit:28.10.2018
3. Mansi Rajgor, PrasannaShete, R. N. Awale,"Probabilistic Energy Efficient Routing Protocol for Wireless Sensor Network", International
conference on communication information & computing technology(ICCIC),(2018), https://ieeexplore.ieee.org/document/8325889
4. Parma Nand, Rani Astya, Abdul Wahid Ali,"Performance Analysis and Impact of Different Mobility model on the specific configured network
with IEEE 802.15.4 for WSNs", International Conference on Computing Communication and Automation (ICCCA), (2016),
https://ieeexplore.ieee.org/document/7813772
5. Kirankumar, Y. Bendigeri I, Jayashree D. Mallapur2," Node Placement in Wireless Sensor Network: An Energy Approach", National Conference
on Recent Advances in Electronics & Computer Engineering, RAECE lITRoorkee, India, (2015), https://ieeexplore.ieee.org/document/7510223
6. SonikaKandari, M.K.Pandey," Evaluation of Energy Consumption by nodes of MANET", National Conference on Recent Advances in
Electronics & Computer Engineering, (2015), https://ieeexplore.ieee.org/document/7510221
7. M.S. Aruna1, R. Ganesan2, and A. Pravin Renold," Optimized Path Planning Mechanism for Localization in Wireless Sensor Networks",
International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy, and Materials (ICSTM),
(2015), https://ieeexplore.ieee.org/document/7225409
8. Sarvesh Kumar Singh, Rajeev Paulus, Shiv Veer," Analysis of energy model and QoS in wireless sensor network under different modulation
schemes", International Conference for Convergence of Technology, (2014), https://ieeexplore.ieee.org/document/7092114
9. Dr. Annapurna P Patil, VarshaChandan, B., Aparna, S., Greeshma, R., Akshatha," An Improved Energy Efficient AODV Routing Protocol for
MANET 's", international Conference on wireless and optical communication networks, (2014), https://ieeexplore.ieee.org/document/6923063
10. Uma Rathore Bhatt, Priyanka Jain, RakshaUpadhyay," An Enhanced AODV- An Energy Efficient Routing Protocol for MANET", Nirma
University International Conference on Engineering (NUiCONE), (2013), https://ieeexplore.ieee.org/document/6780114
11. Akshay Jain," Reduction of Power Consumption at Mobile Station in Multi-hop Networks In Mobile Environments", International Conference on
Emerging Technology Trends in Electronics, Communication and Networking, (2012), https://ieeexplore.ieee.org/document/6470043
12. Moustafa A. Youssef , ArunchandarVasan , Raymond E. Miller "Specification and Analysis of the DCF and PCF Protocols in the 802.11 Standard
Using Systems of Communicating Machines", IEEE international conference on network protocols,(2002),https://sci-
hub.tw/10.1109/icnp.2002.1181394
13. Dharma Prakash Agrawal, carlos de moraiscordeiro, a Book on Adhoc and Sensor Networks Theory and Applications,World Scientific Publishing
Company ,(2006)
14. M.R. Jongerden and B.R. Haverkort "Battery Modeling" ,CTIT Technical Report Series (2008),
https://research.utwente.nl/en/publications/battery-modeling
15. V.Ramesh, Dr.P.Subbaiah, "Load Balancing: Energy Management Scheme for Preemptive DSR to increase Packet Delivery Ratio & to decrease
Delay" , Journal of Theoretical and Applied Information Technology , Vol 47, Issue 3, pp 1112-1119, January 2013.
16. V.Ramesh, Dr.P.Subbaiah, "Mobility scenario-based Performance Evaluation of Preemptive DSR Protocol for MANET", WSEAS Transactions of
Communications, Vol 12, Issue 5, May 2013, published by WSEAS-World Scientific and Engineering Academy and Society.
17. M.Janardhana Raju, Dr.P.Subbaiah, V.Ramesh, "A Novel Elliptic Curve Cryptography Based AODV for Mobile Ad-Hoc Networks for Enhanced
Security", Journal of Theoretical and Applied Information Technology, Vol. 58, Issue 3, Dec'2013.
18. QualNet- 4.5.1-Wireless Model Library. Book
19. Wikipedia: https://en.wikipedia.org/wiki/Mobile_ad_hoc_ network
20. ResearchGate:https://www.researchgate.net/publication/310790633_Opportunistic_Routing_in_Wireless_Networks
21. Wikipedia: https://en.wikipedia.org/wiki/Geographic_routing
Authors: Mekala. Abigna, Swapna Sunkara
Paper Title: Communication Sensation Recognition Using Machine Learning Techniques
Abstract: Emotion detection and recognition is an interdisciplinary branch of computing technology, which is used to
capture, store, process, and interpret human emotions and generate results for better decision-making in real time. It
includes analyzing various emotions through facial expressions, postures, gestures, speech, text, and temperature
changes in the human body. All the emotions are captured from special image sensing cameras. The implementation of
the system includes training and testing of the speech data. Machine Learning/Deep Learning,Support vector machine
methods are used to train or catalog the data to find altered types of emotions. The fields, such as cognitive science,
computer science and engineering, and neuroscience, among others, are extensively involved in the development of
CSR systems. The implementation of the system includes training and testing of the speech data. Machine Learn-
ing/Deep Learning methods are used to train or classify the data to find different types of emotions.

Keywords: Deep learning,SVM,Machine learning, MFCS,NN

References:
1. Jeet Kumar, Om Prakash Prabhakar, Navneet Kumar Sahu, "Comparative Analysis of Different Feature Extraction and Classifier Techniquesfor
Speaker Identification Systems: A Review", International Journal of Innovative Research in Computer and Communication
Engineering(IJIRCCE),Vol. 2, Issue 1, pg- 2760-2769, January 2014.
2. Liqin Fu, Xia Mao, Lijiang Chen "Speaker Independent Emotion Recognition Based on SVM/HMMs Fusion System" IEEE
InternationalConference on Audio, Language and Image Processing( ICALIP), pages 61-65, 7-9 July 2008.
3. Peipei Shen, Zhou Changjun, Xiong Chen," Automatic Speech sensation Recognition Using Support Vector Machine" IEEE
InternationalConference on Electronic and Mechanical Engineering and Information Technology (EMEIT) volume2 , Page(s) : 621 - 625 , 12-14
132. Aug. 2011.
4. Akalpita Das, Purnendu Acharjee , Laba Kr. Thakuria , " A brief study on speech sensation recognition" , International Journal of Scientific 709-714
&Engineering Research(IJSER), Volume 5, Issue 1,pg-339-343, January-2014.
5. Kshamamayee Dash, Debananda Padhi , Bhoomika Panda, Prof. Sanghamitra Mohanty, " Speaker Identification using Mel Frequency
CepstralCoefficient and BPNN", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 4,
pg.-326-332, April 2012
6. Kamran Soltani and Raja Noor Ainon. Speech emotion detection based on neural networks. In 9th International Symposium on Signal Processing
and its Uses, 1 4244-0779-6/07, IEEE, 2007.
7. Tin Lay New, Say Wei Foo and Liyanage C. De Silva. communication sensation recognition using Hidden Markov Models.
8. Yelin Kim and Emily Mower Provos,Data driven framework to explore patterns (timings and durations) of emotion evidence, specific to
individual emotion classes; University of Michigan Electrical Engineering and Computer Science, Ann Arbor, Michigan, USA;2016.
9. JouniPohjalainen and PaavoAlku. Multi-scale modulation filtering in automatic detection of emotions in telephonespeech. International
Conference on Acoustic, Speech and Signal Processing, 980-984, 2014.
10. MandarGilke ,PramodKachare , RohitKothalikar , Varun Pius Rodrigues and MadhaviPednekar. MFCCbased vocalemotion recognition using
ANN, International Conference on Electronics Engineering and Informatics, 150-154,2012.
11. Bitouk, D., Verma, R., &Nenkova, A. (2010). Class-level spectral features for feeling recognition. Speech Communication, 52(7-8), 613-625
12. Zixing Zhang, Fabien Ringeval, Fabien Ringeval, Eduardo Coutinho, Erik Marchi and BjörnSchüllerSemiSupervised Learning (SSL) technique
13. S. Das1, A. Halder, P. Bhowmik, A. Chakraborty, A. Konar, R. Janarthanan, ‖ A Support Vector Machine Classifierof Emotion from Voice
and Facial Expression Data ―,IEEE Transactions On Audio, Speech, And LanguageProcessing 2009
14. Vinay, Shilpi Gupta, Anu Mehra,"Gender Specific Emotion Recognition Through Speech Signals", IEEE International Conference on Signal
Processing and Integrated Networks (SPIN), 2014 , Page(s):727 - 733, 20-21 Feb. 2014.
15. A. D. Dileep, C. Chandra Sekhar, "GMM Based Intermediate Matching Kernel for Classification of Varying Length Patterns of Long Duration
Speech Using Support Vector Machines", IEEE Transactions on Neural Networks and Learning Systems, Volume: 25, Issue: 8,Pages: 1421 1432,
2014..
16. D. Ververidis, and C. Kotropoulos, Automatic speech classification to five emotional states based on gender information, Proceedings of the
EUSIPCO2004 Conference, Austria, 341-344, Sept. 2004.
Authors: RaghuviraPratap A, Babu Sallagundla, Kranthi Kumar Guttikonda, Prasad J V D
Discovery of Parkinson’s Syndrome with Hand Tremor Analysis Using Density Based Improved K- Medoids
133. Paper Title:
Algorithm
Abstract: With medical care system, gigantic measure of irrefutable and research facility test, tomography, 715-721
prescription and healthcare data of hand tremor are been gathered and stored tremendously. Tremor in Parkinson's
syndrome is a most important component utilized in the assurance of hand rest ailment at beginning and movement.
Traditionally, tremor has been assessed utilizing recurrence repetition analysis. The discovery of definitive hand tremor
would be a major step towards early and reliable diagnosis for Parkinson’s syndrome. Big data analytics and data
mining algorithms on these data go for early recognition of Parkinson’s syndrome that will assist in creating anticipatory
measures and in enhancing serene care considerations. Clustering and Classifications are the two ways towards
arranging objects into various gatherings by apportioning set of data hooked on a progression of subsets. Cluster has
occupied its underlying foundations from algorithms like KMedoids, fuzzy c-means and KMeans. Anyway, regular
KMedoids clustering algorithm experiences numerous constraints. To discover a feasible solution for Parkinson's
syndrome tomography, prescription and healthcare of various companions are gathered, overseen and engendered
through Parkinson's Progression Markers Initiative. Griddle multigram data sets and Survey graph give the factual
investigation on the hand tremor analysis so that the well and Parkinson patient would be accurately categorized. This
study and proposed approach emphasis around the diverse traditions to prevail over the difficulties existing by PPMI
data, which is extensive and rift. This effort use the underlying revelations completed from end to end vivid
investigations of different attribute. The study and visualisation of data prompted recognising the noteworthy
characteristics. We utilized cluster analysis methodologies to look for Parkinson syndrome subtypes from a huge, multi-
centre and healthy care cohort of patients across all phases, with a process of motor chief features such as rigidity,
tremor signs we are additionally providing to built a software product that elevates back-to-back discovery of
Parkinson's syndrome data to recognise potential biomarkers.

Keywords: Parkinson’s syndrome, Hand tremor, PPMI computer aided diagnosis system, cluster analysis, KMedoids.

References:
1. Stacey Kowal L,Timothy M. Dall, Ritashree Chakrabarti Michael V. Storm , Anjali, "The current and projected economic burden of Parkinson's
disease in the United States", Movement disorders Clinical Practice , March 2013
2. Mahalakshmi Senthilarumugan V,Baskar G, S Nilakanta, " "Big data and Parkinson's: Exploration, analyses, data challenges and visualization",
Proceedings of the Hawaii International Conference on System Sciences , 2018
3. Micheal Minelli, Chambers M , Dhiraj A , " Big Data, Big Analytics: Emerging Business Intelligence and Analytic Trends for Today's
Businesses",Wiley,2013.
4. Little M. A., McSharry P. E., Hunter E. J., Spielman J., Ramig L. O.," Suitability of dysphonia measurements for telemonitoring of Parkinson's
syndrome.", IEEE Transactions on Biomedical Engineering. 2009;56(4):1015-1022.
5. Peker M ," A decision support system to improve medical diagnosis using a combination of KMedoids clustering based attribute weighting and
SVM." , NCBI , 2016
6. Shahbaba B., Neal R., " Nonlinear models using Dirichlet process mixtures.",Journal of Machine Learning Research. 2009;10:1829-1850.
7. Das R.," A comparison of multiple classification methods for diagnosis of Parkinson syndrome. Expert Systems with Applications.",
2010;37(2):1568-1572.
8. N Shamli ,Sathiyabhama B , " Parkinson's brain disease prediction using data analytics" , Modern Education and Computer science Press, 2016.
9. Sakar C. O., Kursun O., "Telediagnosis of parkinson's syndrome using measurements of dysphonia.",Journal of Medical Systems.",
2010;34(4):591-599.
10. Psorakis I., Damoulas T., Girolami M. A. "Multiclass relevance vector machines: sparsity and accuracy.", IEEE Transactions on Neural Networks.
2010;21(10):1588-1598.
11. Pasi Luukka , " Feature selection using entropy measures with similarity classifier. Expert Systems" , 38(4) , Expert Systems with applications ,
2011
12. D Chiang Li , Chiao Wen Liu , Susan C Hu , " A fuzzy-based data transformation for feature extraction to increase classification performance
with small medical data sets" , Artificial Intelligence in medicine , 45-52 , 2011.
Authors: N. SreeDivya, Veeramallu. Bobba
Paper Title: A Theoretical Research on Routing Protocols for Vehicular AD HOC Networks (Vanets)
Abstract: In the past few years we observe various protocols for Vehicular AdhocNETworks(VANET) considering
certain features. VANET’s are powerful in dealing with changing environmental conditions and high movability of
vehicle hence protocols depending on position or geographic routing protocols are proved best and enough.Mobile
AdhocNETwork(MANETs) use IP address whereas these protocols use geographic location of the vehicle by using the
best forward path.VANETs protocols will neither exchange link state data nor maintains established route as in
MANET. Hence VANET is powerful and has high mobility. By checking various designing protocols future
enhancements are done based on advantages and disadvantages of geographic based protocols. The protocols include the
geographical and topological routing techniques.

Keywords: VANET, Routing, Adhoc, Network


134. References:
1. M. Sivasakthi, S.R. Suresh, Research on vehicular ad hoc networks (VANETs): an overview, Int. J. Appl. Sci. Eng. Res. 2 (1) (2013) 23-27. 722-729
2. ASTM INTERNATINAL, http://www.astm.org/.
3. H. Füßler, M. Mauve, H. Hartenstein, M. Kaesemann, D. Vollmer, A Comparison of Routing Strategies for Vehicular Ad Hoc Networks,
Technical Report TR-02-003, FakultätfürMathematik und Informatik, Universität Mannheim, March 2002.
4. H. Füßler, M. Mauve, H. Hartenstein, M. Kasemann, D. Vollmer, Location based routing for vehicular ad-hoc networks, Mob. Comput. Commun.
Rev. 7 (1) (2003) 47-49
5. B-C. Seet, G. Liu, B-S. Lee, C-H. Foh, K-J. Wong, K-K. Lee, A-STAR: a mobile adhoc routing strategy for metropolis vehicular
communications, in: Proceedings NETWORKING, vol. 3042, April 2004, pp. 989-999.
6. S-M. Senouci, T. Mohamed-Rasheed, Modified location-aided routing protocols for control overhead reduction in mobile ad hoc networks, in:
Proceedings of the 4th IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility (Net-Con), Lannion,
France, 14-18 Novembre, 2005, pp. 137-146.
7. N-C. Wang, C-Y. Lee, A reliable QoS aware routing protocol with slot assignment for mobile ad hoc networks, J. Netw. Comput. Appl. 32 (6)
(November 2009) 1153-1166.
8. Moussaoui, F. Semchedine, A. Boukerram, A link-state QoS routing protocol based on link stability for mobile ad hoc networks, J. Netw.
Comput. Appl. 39 (March 2014) 117-125.
9. H. Füßler, M. Mauve, H. Hartenstein, M. Käsemann, D. Vollmer, A Comparison of Routing Strategies for Vehicular Ad Hoc Networks, Technical
Report TR-02-003, Department of Computer Science, University of Mannheim, July 2002.
10. C. Lochert, H. Hartenstein, J. Tian, H. Füßler, D. Hermann, M. Mauve, A routing strategy for vehicular ad hoc networks in city environments, in:
Proceedings of the IEEE Intelligent Vehicles Symposium, 9-11 June 2003, pp. 156-161.
11. B. Karp, H.T. Kung, Gpsr: Greedy Perimeter Stateless Routing for wireless networks, in: Proceedings of the 6th Annual International Conference
on Mobile Computing and Networking (MobiCom), Boston, Massachusetts, August 2000, pp. 243-254.
12. T. Camp, J. Boleng, L. Wilcox, Location information services in mobile ad hoc networks, in: Proceedings of the IEEE International Conference
on Communications (ICC), New York City, New York, vol. 5, April 2002, pp. 3318-3324.
13. C. Bettstetter, Mobility modeling in wireless networks: categorization, smooth movement, and border effects, Mob. Comput. Commun. Rev. 5 (3)
(July 2001) 55-66.
14. T. Camp, J. Boleng, V. Davies, A survey of mobility models for ad hoc network research, Wirel. Commun. Mob. Comput. 2 (5) (August 2002)
483-502
15. V. Naumov, R. Baumann, T. Gross, An evaluation of inter-vehicle ad hoc networks based on realistic vehicular traces, in: Proceedings of the 7th
ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), Florence, Italy, 2006, pp. 108-119.
16. SabriM. Hanshi, Tat-CheeWan, Mohammad M.Kadhum, Ali Abdulqader Bin-Salem"Review of Geographic Forwarding Strategies for Inter-
vehicular Communications from Mobility and Environment Perspectives", Vehicular Communications, Vol. 14, October 2018, pp. 64-79
17. R. Sugumar, A. Rengarajan, and C. Jayakumar, ''Trust based authentication technique for cluster based vehicular ad hoc networks
(VANET),''Wireless Netw., pp. 1-10, 2016
18. Carolina Tripp-Barba et al., "Comparison of propagation and packet error models in vehicular networks performance", Vehicular
Communications, vol. 12, pp. 1-13, 2018.
19. J. Tian, L. Han, K. Rothermel, C. Cseh, Spatially aware packet routing for mobile ad hoc inter-vehicle radio networks, in: Proceedings of the
IEEE 6th International Conference on Intelligent Transportation Systems (ITSC), vol. 2, 2003, pp. 1546-1551.
20. H. Füßler, H. Hartenstein, J. Widmer, M. Mauve, W. Effelsberg, Contentionbased forwarding for street scenarios, in: Proceedings of the 1st
International Workshop in Intelligent Transportation (WIT), Hamburg, Germany, 23-24 March 2004, pp. 155-160.
21. C. Lochert, M. Mauve, H. Füßler, H. Hartenstein, Geographic routing in city scenarios, Mob. Comput. Commun. Rev. 9 (1) (January 2005) 69-72.
22. M. Jerbi, R. Meraihi, S-M. Senouci, Y. Ghamri-Doudane, GyTAR: improved greedy traffic aware routing protocol for vehicular ad hoc networks
in city environments, in: Proceedings of IEEE International Conference on Communication (ICC), 2007, pp. 3972-3979.
23. J. Zhao, G. Cao, VADD: vehicle-assisted data delivery in vehicular ad hoc networks,IEEE Trans. Veh. Technol. 57 (3) (May 2008) 1910-1922.
24. P.C. Cheng, J.T. Weng, L.C. Tung, K.C. Lee, M. Gerla, J. Härri, GeoDTN+NAV: a hybrid geographic and DTN routing with navigation
assistance in urban vehicular networks, in: Proceedings of the 1st International Symposium on Vehicular Computing Systems, ISVCS'08, Dublin,
Irland, July 2008.
25. K. Shafiee, V.C.M. Leung, Connectivity-aware minimum-delay geographic routing with vehicle tracking in VANETs, Ad Hoc Netw. 9 (2)
(March 2011) 131-141.
26. K. Mershad, H. Artail, M. Gerla, ROAMER: roadside units as message routers in VANETs, Ad Hoc Netw. 10 (3) (May 2012) 479-496.
27. Marwane, A., et al. HHLS: A Hybrid Routing Technique for VANETs. in IEEE Global
28. Communications Conference, IEEE GLOBECOM'12. 2012.
29. Garg, N., K. Aswal, and D.C. Dobhal, A REVIEW OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS. International Journal of
Information Technology, 2012. 5(1): p. 177-180.
30. Ade, S. and P. Tijare, Performance Comparison of AODV, DSDV, OLSR and DSR routing protocols in Mobile Ad hoc Networks. International
Journal of Information Technology and Knowledge Management, 2010. 2(2): p. 545-548.
31. Abolhasan, M., T. Wysocki, and E. Dutkiewicz, A review of routing protocols formobile ad hoc networks. Ad Hoc Networks, 2004. 2(1): p. 1-22.
32. Bai, Y., S.B. Ji, and Y. Xue, A Comparative Study of AODV and DSDV Routing Protocol of the Vehicle Ad Hoc Network Based on NS2
Applied Mechanics and Materials, 2013. 303: p. 1968-1973.
33. Haerri, J., F. Filali, and C. Bonnet. Performance comparison of AODV and OLSR in VANETs urban environments under realistic mobility
patterns. in Proc. of 5th IFIP Mediterranean Ad-Hoc Networking Workshop (Med-Hoc-Net-2006), Lipari, Italy. 2006.
34. Santoso, G.Z. and K. Moonsoo. Performance analysis of AODV, DSDV and OLSR in a VANETs safety application scenario. in Advanced
Communication Technology (ICACT), 2012 14th International Conference on. 2012.
35. Maowad, H. and E. Shaaban. Efficient routing protocol for Vehicular Ad hoc networks. in Networking, Sensing and Control (ICNSC), 2012 9th
IEEE International Conference on. 2012.
36. Marina, M.K. and S.R. Das, Ad hoc ondemand multipath distance vector routing. Wireless Communications and Mobile Computing, 2006. 6(7):
p. 969-988.
Authors: Thamer Yahya Thamer, Nadine Nassif, Amira Haddarah, Ayad H. Almaeini
Paper Title: Effect of deficient irrigation on consumptive use of wheat (Triticum aestivum.L) in arid and semi-arid areas
Abstract: The experiment, located at the Yusufiyah region, 15 km South-West of Baghdad (44 o18'75" E and
33o07'84" N) (34.1 m above sea level), soil classified as Typic Torrifluvent as Silty Clay The objectives of the study
were to test the response of wheat (Triticum aestivum.L) to limited irrigation under field conditions and to estimate
Total actual water consumptive use and actual water consumptive use were studied during the growth stages, field water
use efficiency and crop water use efficiency and yield were calculated.
A Randomized complete block design (RCBD) was used with three replications. Irrigation treatments includes complete
irrigation as a control, deficient irrigation at tillering, elongation, flowering and grain maturity. Irrigation treatments
were applied at 50- 55 % depletion from available water according to growth stages. .The cultivar was planted on
1/12/2017 and harvested on 20/5/2018.
Crop water requirements were calculated based on the soil water measurement by gravimetric method. Actual
135. evapotranspiration was calculated from the soil water measurements measured for the 0-30 cm layer. The highest
amount of applied water 430 mm was obtained under complete irrigation and it decreased to 356, 388,371 and 285 730-735
under limited irrigation during tillering, elongation, flowering and grain maturity respectively. Limited irrigation during
the flowering stage gave the highest field and crop water use efficiency values of 1.33 and 1.27 K.g.m 3- . On the other
hand, treatment limited irrigation during the elongation stage gave the lowest field and crop water use efficiency values
of 1.08 and 1.18 K.g.m3-

Index terms: Deficient irrigation, Consumptive use, Water use efficiency, Wheat.

References:
1. Abu Dhahi, Yousef Mohammed and Moayad Ahmed Al Yunis. 1988. Directory of Plant Nutrition. Directorate of the Library. University of Al
Mosul.
2. Abdul-Jabbar, Mustafa Subhi and Abdul Wahab Akhdir slaves. 2016. Comparison of the performance of pivotal irrigation method and irrigation
in some physical properties of soil and wheat yield (Triticum astuvium L.). Anbar Journal of Agricultural Sciences. 41 (1): 71-56.
3. Abedinpour, M. 2017. Wheat water use and yield under different salinity of irrigation water. Journal of Water and Land Development. 33: 3-9.
ISSN 1429-7426.
4. Ati, A.S.; I. Hameedi and E. Mohamed. 2014. Study of irrigation intervals and bio fertilizers on growth, yield and water use efficiency of some
wheat cultivars. Online International Interdisciplinary Journal. 6: 8-16.
5. Allen, R.G., L.S Pereira, D. Raes and M.Smith.1998. Crop evapotranspiration. FAO Irrigation and Drainage. Paper 65, Rome.
6. Brihma N, R. ; S. Khokhar and R. Pyare . 2011 . Studies irrigation scheduling of wheat varieties or central uttar pradesh, India Plant Archive 11(1)
:243-248.
7. Directorate of Agricultural Statistics.2015 . Wheat and barley production report. Ministry of Planning and Development Cooperation. Central
Organization for Statistics and Information Technology. Iraq.
8. Fahad, Ali Abdul Waayad Hussain Ali Al-Mu'aini. 2011. Water use efficiency of wheat crop under water stress conditions in central Iraq. College
of Science City University Journal. 2 (2): 29-14.
9. Hassan, D. F., Mohammed, R. J., Akol, A. M., Abd, E. H., & Kadhim, T. F. (2016). Effect of magnetization of fresh and salt water for irrigation
in some of the physical characteristics of the soil and the growth of wheat. International Journal of Innovative Research in Science, Engineering
and Technology, 5(12), 20861-20872.
10. Hassan, D. F., Jafaar, A. A., & Mohamm, R. J. (2019). EFFECT OF IRRIGATION WATER SALINITY AND TILLAGE SYSTEMS ON SOME
PHYSICAL SOIL PROPERTIES. The Iraqi Journal of Agricultural Science, 50, 42-47.
11. Hassan ,Diaa Fliah ,Iman Azeez Hameed and Thamer Yahya Alshebly, 2018. Effect of Moisture Depletion Rates and Irrigated Zone Depth on
Water Requirement Growth and Yield of Corn Zea mays L.. Journal of Engineering and Applied Sciences, 13: 10679-10686. DOI:
10.3923/jeasci.2018.10679.10686
12. Hossian.A. .M.D. 2012. Deficit irrigation for wheat cultivation under limited water supply conditions, /http//www.M.h.ali 99 home pages .com.
13. Husman, S. H; M. J. Ottman; K. L. Johnson and R. J.Wegener. 1999. Durum response to soil water depletion levels. p. 103-107. Forage and
Grain. Univ. Ariz. Coll. Agric. Coop. Ext. Report Series P-124. Univ. Ariz., Tucson.
14. International Telecommunication Union. 2015. All rights reserved-Privacy Policy- Reprints & Permissions- Site Map. www.wsis.org/stocktaking.
15. Jamali , K . D . , M . A. Arain and M . Mhamd . 2000 . Comparative performance of Semi - dwarf wheat (Triticum aestivum.L) genotypes . wheat
Information service , 90 : 45 - 46 .
16. Latif, Nour Salam and Diaa 'Abd al-Mohammed al-Tamimi. 2016. Effect of Potassium Fertilizer and Wet Stress on Wheat Growth. Diyala Journal
of Agricultural Sciences. 8 (2): 132-125.
17. Stewart, J. I; R. H. Cuenca, W. O. Pruitt, R. M. Hagan, and J. Tosse. 1977. Determination and utilization of water production functions for
principal California crops. W - 67. Calif. Contrib. Proj. Rep. Univ. of California Davis.
18. Tali, Ahmed Hussein and Mehdi Ibrahim Odeh.2014 Effect of overlap between underage irrigation and Potassium fertilization during the growth
stages of wheat crop (Triticum aestivum L.) in quantitative quantity characteristics. Journal of Iraqi Agriculture. 19 (3).
Authors: P. Careena, M. Mary Synthuja Jain Preetha, P. Arun
Paper Title: Research on Murmur from Time Domain Features of Heart Sounds
Abstract: Automated identification of valve disorders from heart sounds is a competent task in cardiology. Time
domain features like variance (µ), standard deviation (SD), entropy (E), peak amplitude (PA), RMS, crest factor (CRF),
impulse factor (IF), shape factor (SHF), energy and clearance factor (CLF) are extensively used in Artificial Intelligence
(AI) to reflect the physical attributes of signals. Time domain features are analytically simple and easy to compute. In
this paper, the reliability of employing time domain features for the detection of murmur from heart sound is
investigated. It is found that energy of the signal is able to detect the murmur from PCG signal with an accuracy of
98.87 %, sensitivity of 99.70 % and specificity of 98.09 %.

Index Terms: Energy, heart abnormality, murmur, PCG signal, statistical significance, type of heart signal, time
domain features.

References:
1. A. Selamtzis, A. Castellana, G. Salvi, A. Carullo and A. Astolfi, Effect of vowel context in cepstral and entropy analysis of pathological voices,
Biomedical signal processing and control, Vol.47, pp.350-357, Jan.2019.
2. Y. Wang, S. Wei, S. Zhang, Y. Zhang, L. Zhao, C. Liu and A. Murray, Comparison of time-domain, frequency-domain and non-linear analysis for
distinguishing congestive heart failure patients from normal sinus rhythm subjects, Biomedical signal processing and control, Vol.42, pp.30-36,
April 2018.
3. 7.P. Lubaib and K.V. A. Muneer, The Heart Defect Analysis Based on PCG Signals Using Pattern Recognition Techniques,Procedia
Technology,Vol. 24,2016,pp.1024-1031.
136. 4. C. C. Balili, M. C. C. Sobrepena and P. C. Naval, "Classification of heart sounds using discrete and continuous wavelet transform and random
forests," 2015 3rd IAPR Asian Conference on Pattern Recognition (ACPR), Kuala Lumpur, 2015, pp. 655-659.
5. A. Rapalis, A. Janusauskas, V. Marozas and A. Lukosevicius, Estimation of blood pressure variability during orthostatic test using instantaneous 736-743
photoplethysmogram frequency and pulse arrival time, Biomedical signal processing and control, Vol.32, pp.82-89, Feb.2017.
6. S. Ibrahim, R. Djemal and A. Alsuwailem, Electroencephalography (EEG) signal processing for epilepsy and autism spectrum disorder diagnosis,
Biocybernetics and biomedical engineering, Vol.38, pp.16-26, Sept. 2018.
7. S. Kang, R. Doroshow, J. McConnaughey and R. Shekhar, "Automated Identification of Innocent Still's Murmur in Children," in IEEE
Transactions on Biomedical Engineering, Vol. 64, pp. 1326-1334, Jue 2017.
8. H. M. Fahad, M. U. G. Khan, T. Saba, A. Rahman and S. Iqbal, Microscopic abnormality classification of cardiac murmurs using ANFIS and
HMM, Vol.81, pp.449-457, May 2018.
9. C. Wang, H. Yi, W. Wang and P Valliappan, Lesion localization algorithm of high-frequency epileptic signal based on Teager energy operator,
Biomedical signal processing and control, Vol. 47, pp.262-275, January 2019.
10. N. A. Khan and S. Ali, A new feature for the classification of non-stationary signals based on the direction of signal energy in the time-frequency
domain, Computers in biology and medicine, Vol. 100, pp.10-16, Sept.2018.
11. A.G. Mahapatra and K. Horio, Classification of ictal and interictal EEG using RMS frequency, dominant frequency, root mean instantaneous
frequency square and their parameters ratio, Biomedical signal processing and control, Vol. 44, pp. 168-180, July 2018.
12. F. Chakir, A. Jilbab, C. Nacir and A. Hammouch, "Phonocardiogram signals classification into normal heart sounds and heart murmur sounds,"
2016 11th International Conference on Intelligent Systems: Theories and Applications (SITA), Mohammedia, 2016, pp. 1-4.
13. S.Wen Deng and J. Q. Han,Towards heart sound classification without segmentation via autocorrelation feature and diffusion maps, Future
Generation Computer Systems,Vol.60, pp.13-21, Jan.2016.
14. S. R. Thiyagaraja, R. Dantu, P. L. Shrestha and A. Chitnis, Mark A. Thompson, Pruthvi T. Anumandla, Tom Sarma and Siva Dantu, A novel
heart-mobile interface for detection and classification of heart sounds, Biomedical Signal Processing and Control,Vol.45,pp.313-324, Aug. 2018.
15. S. Ghiasi, M. Abdollahpur, N. Madani and A. Ghaffari, "Nonlinear analysis of heart sounds for the detection of cardiac disorders using recurrence
quantification analysis," 2017 Computing in Cardiology (CinC), Rennes, 2017, pp. 1-4.
16. P. Bentley, G. Nordehn, M. Coimbra, S. Mannor, G. Rita, the pascal classifying heart sounds challenge, sponsored by PASCAL, 2011.
17. Classification of Normal/Abnormal Heart Sound Recordings, the PhysioNet/Computing in Cardiology Challenge,2016
Authors: Koppisetti Giridhar, C. Anbuananth, N. Krishnaraj
Paper Title: Research on Various Routing Techniques in Wireless Ad-hoc Networks
Abstract: Wireless Ad-hoc network is an emerging trend in which the nodes are having mobility features. In a wireless
Ad-hoc network every node is capable of handling complete network structure which enables the nodes to participate in
the data transmission in peer to peer systems. But to find a route to connect with or to communicate, there is big network
structure in front of network administrator. The big deal is to route a particular transmission from a specified source and
destination to find the best route among a bunch of nodes. In this paper we have given classification of various routing
techniques with some issues related to them along with some of the advantages and disadvantages, which will help us to
choose a better routing protocol to compute a route among nodes in wireless Ad-hoc networks.

Keywords: Routing, Wireless, Data Dissemination, Networks, Technology, Ad-hoc.

References:
137. 1. Jamal N. Al-Karaki, Ahmed E. Kamal, December 2004, "Routing Techniques in Wireless Sensor Networks: A Survey" IEEE Wireless
Communications, Volume: 11, Issue: 6, Pages: 6-28. 744-747
2. Dr. S.S. Dhanakaran, A. Parvathavarthini, February 2013, "An Overview of Routing Protocols in Mobile Ad-Hoc Network" International Journal of
Advanced Research in Computer Science and Software Engineering, Volume: 3, Issue: 2, ISSN: 2277 128X, Pages: 251-259.
3. S. Saranya, M. Princy, 2012, "Routing Techniques in Sensor Network - A Survey" International Conference on Modelling, Optimisation and
Computing, Pages: 2739-2747.
4. Zou, Xukai & Ramamurthy, Byrav & Magliveras, Spyros. (2002). Routing techniques in wireless ad hoc networks - classification and comparison.
5. Mano Yadav, Vinay Rishiwal and K. V. Arya, December 2009, "Routing in Wireless Adhoc Networks: A New Horizon" Journal of Computing,
Volume: 1, Issue: 1, ISSN: 2151-9617.
6. https://medium.com/delta-exchange/centralized-vs-decentralized-vs-distributed-41d92d463868
7. https://s.hswstatic.com/gif/routing-algorithm9.gif
8. https://www.researchgate.net/profile/Prabhat_Kumar72/publication/311577034/figure/fig1/AS:438431739322371@1481541680878/Classification-
of-Routing-Protocols-in-Wireless-Sensor-Network-Routing-paths-can-be.png
9. Nawneet Raj1, Priyanka Bharti , Sanjeev Thakur , December 2015, "Qualitative Based Study of Hybrid Routing Protocols in MANET",
International Journal of Computer Science and Mobile Computing, Volume: 4, Issue: 12, ISSN2320-088X, Pages: 185-190.
10. http://www.routexp.com/2017/05/routing-basics-distance-vector-vs-link.html
Authors: M.Babu, G.Nanthakumar
Paper Title: Diagnosis of Liver Images Lesions in Mr Images Using Improved Segmentation and Classification Task
Abstract: Detection of liver abnormalities is a deep study that reflects the condition of liver during the time of liver
disease. The diagnosis reveals the condition of liver in human body, however earlier detection of images during medical
diagnosis is still a tough task with texture analysis and classification process. Hence, in this study we reveal the
condition of liver as normal or abnormal based on the analysis done using the proposed method. The proposed system
identifies the condition of liver through two stages: structural and statistical analysis and classification process. The
former one is carried out with Gabor Gray Level - Local Binary Patterns (GGL-LBP) that provides the structural texture
representation of a liver image. The latter one uses various machine learning classifiers to test the proposed method that
includes Artificial Neural Network Fuzzy Inference System (ANFIS) is used for classification process. The set of
images are used for training and testing the classifier using the structural features. The proposed classification method is
evaluated using 225 test records and it is tested against conventional methods in terms of accuracy, sensitivity and
specificity. The experimental validation shows that proposed method with ANFIS classifier acquires improved accuracy
than other classifiers, namely Support Vector Machine (SVM), K-Nearest Neighbor (KNN), Naïve Bayes (NB),
Decision Tree (DT) and Linear Discriminant Analysis (LDA).

Keywords: Liver Abnormalities, ANFIS Classifier, Normalized Gabor Filter, Co-occurrence Matrix, Local binary
pattern

References:
138. 1. Zalama, E., Gómez-García-Bermejo, J., Medina, R., & Llamas, J. (2014). Road crack detection using visual features extracted by Gabor filters.
Computer-Aided Civil and Infrastructure Engineering, 29(5), 342-358. 748-752
2. Lloyd, K., Rosin, P. L., Marshall, D., & Moore, S. C. (2017). Detecting violent and abnormal crowd activity using temporal analysis of grey level
co-occurrence matrix (GLCM)-based texture measures. Machine Vision and Applications, 28(3-4), 361-371.
3. Riaz, F., Silva, F. B., Ribeiro, M. D., & Coimbra, M. T. (2012). Invariant gabor texture descriptors for classification of gastroenterology images.
IEEE Transactions on Biomedical Engineering, 59(10), 2893-2904.
4. Liu, L., Lao, S., Fieguth, P. W., Guo, Y., Wang, X., & Pietikäinen, M. (2016). Median robust extended local binary pattern for texture
classification. IEEE Transactions on Image Processing, 25(3), 1368-1381.
5. Saba, L., Dey, N., Ashour, A. S., Samanta, S., Nath, S. S., Chakraborty, S., ... & Suri, J. S. (2016). Automated stratification of liver disease in
ultrasound: an online accurate feature classification paradigm. Computer methods and programs in biomedicine, 130, 118-134.
6. Acharya, U. R., Faust, O., Molinari, F., Sree, S. V., Junnarkar, S. P., & Sudarshan, V. (2015). Ultrasound-based tissue characterization and
classification of fatty liver disease: A screening and diagnostic paradigm. Knowledge-Based Systems, 75, 66-77.
7. Nanni, L., Lumini, A., & Brahnam, S. (2012). Survey on LBP based texture descriptors for image classification. Expert Systems with
Applications, 39(3), 3634-3641.
8. Gotlieb, C. C., & Kreyszig, H. E. (1990). Texture descriptors based on co-occurrence matrices. Computer Vision, Graphics, and Image
Processing, 51(1), 70-86.
9. Riaz, F., Hassan, A., Nisar, R., Dinis-Ribeiro, M., & Coimbra, M. T. (2017). Content-adaptive region-based color texture descriptors for medical
images. IEEE journal of biomedical and health informatics, 21(1), 162-171.
10. Ameling, S., Wirth, S., Paulus, D., Lacey, G., & Vilarino, F. (2009). Texture-based polyp detection in colonoscopy. In Bildverarbeitung für die
Medizin 2009 (pp. 346-350). Springer, Berlin, Heidelberg.
11. Manjunath, B. S., & Ma, W. Y. (1996). Texture features for browsing and retrieval of image data. IEEE Transactions on pattern analysis and
machine intelligence, 18(8), 837-842.
12. Sweeney, S. M. (2014). AACR Cancer Progress Report 2014. American Association for Cancer Research, 126, 1078-0432.
13. Sampat, M. P., Wang, Z., Gupta, S., Bovik, A. C., & Markey, M. K. (2009). Complex wavelet structural similarity: A new image similarity index.
IEEE transactions on image processing, 18(11), 2385-2401.
14. Guo, Z., Zhang, L., & Zhang, D. (2010). Rotation invariant texture classification using LBP variance (LBPV) with global matching. Pattern
recognition, 43(3), 706-719.
15. Jeon, J. H., Choi, J. Y., Lee, S., & Ro, Y. M. (2013). Multiple ROI selection based focal liver lesion classification in ultrasound images. Expert
Systems with Applications, 40(2), 450-457.
16. Yang, X., Do Yang, J., Hwang, H. P., Yu, H. C., Ahn, S., Kim, B. W., & You, H. (2018). Segmentation of liver and vessels from CT images and
classification of liver segments for preoperative liver surgical planning in living donor liver transplantation. Computer methods and programs in
biomedicine, 158, 41-52.
17. Tan, X., & Triggs, B. (2010). Enhanced local texture feature sets for face recognition under difficult lighting conditions. IEEE transactions on
image processing, 19(6), 1635-1650.
18. Wu, K., Chen, X., & Ding, M. (2014). Deep learning based classification of focal liver lesions with contrast-enhanced ultrasound. Optik-
International Journal for Light and Electron Optics, 125(15), 4057-4063.
19. Zhao, G., & Pietikainen, M. (2007). Dynamic texture recognition using local binary patterns with an application to facial expressions. IEEE
transactions on pattern analysis and machine intelligence, 29(6), 915-928.
20. Park, H. J., Jang, K. M., Kang, T. W., Song, K. D., Kim, S. H., Kim, Y. K., ... & Goo, J. (2016). Identification of imaging predictors
discriminating different primary liver tumours in patients with chronic liver disease on gadoxetic acid-enhanced MRI: a classification tree
analysis. European radiology, 26(9), 3102-3111.
21. Acharya, U. R., Koh, J. E. W., Hagiwara, Y., Tan, J. H., Gertych, A., Vijayananthan, A., ... & Yeong, C. H. (2018). Automated diagnosis of focal
liver lesions using bidirectional empirical mode decomposition features. Computers in biology and medicine, 94, 11-18.
22. Virmani, J., Kumar, V., Kalra, N., & Khandelwal, N. (2013). SVM-based characterization of liver ultrasound images using wavelet packet texture
descriptors. Journal of digital imaging, 26(3), 530-543.
23. Ben-Cohen, A., Klang, E., Kerpel, A., Konen, E., Amitai, M. M., & Greenspan, H. (2018). Fully convolutional network and sparsity-based
dictionary learning for liver lesion detection in CT examinations. Neurocomputing, 275, 1585-1594.
24. Tomita, F., & Tsuji, S. (2013). Computer analysis of visual textures (Vol. 102). Springer Science & Business Media.
25. Kohli, M., & Arora, S. (2018). Chaotic grey wolf optimization algorithm for constrained optimization problems. Journal of Computational Design
and Engineering, 5(4), 458-472.
Authors: M.Ramkumar, G.Nanthakumar
A Gene Expression Data Biclustering Algorithm Using Large Average Submatrix Based FCM Classification
Paper Title:
System
Abstract: In this paper, the biclusters on data from gene expression tend to group or cluster identical data under
multiple conditions on gene expression. Therefore, the biclustering method is very necessary if the matrix lines and
columns are clustered instantaneously. At first, the set of sub-matrices are identified using Large Average Submatrix.
This is based on a simple significance score which transcends the size and average value of a matrix. Large Average
Submatrix is used in an iterative way, where a link between the maximum value and the minimum description length is
established. With the total number of data from gene expression growing, the matrix will increase and the clustering
problem will be deficient. In this stage, the use of the biclustering algorithm leads to severe problems as data is
increased. We are therefore using Large Average Submatrix to improve the biclustering performance. This compresses
or removes irrelevant or less correlated ones for improved clustering performance. We also use FCM to verify that for
further calculation the number of rows and columns in the submatrix can be added. The method is calculated with regard
to consistency of elements and submatrices capacity.

Keywords: Biclustering Algorithm, Gene Expression Data, FCM, Large Average Submatrix

139. References:
1. Tanay, A., Sharan, R., & Shamir, R. (2002). Discovering statistically significant biclusters in gene expression data. Bioinformatics, 18(suppl_1),
S136-S144. 753-756
2. de França, F. O., Bezerra, G., & Von Zuben, F. J. (2006, July). New perspectives for the biclustering problem. In Evolutionary Computation,
2006. CEC 2006. IEEE Congress on (pp. 753-760). IEEE.
3. Hartigan, J. A. (1972). Direct clustering of a data matrix. Journal of the american statistical association, 67(337), 123-129.
4. Yip, K. (2003). DB seminar series: Biclustering methods for microarray data analysis, 46-47, 2003.
5. Ayadi, W., Elloumi, M., & Hao, J. K. (2009). A biclustering algorithm based on a Bicluster Enumeration Tree: application to DNA microarray
data. BioData mining, 2(1), 9.
6. Sancetta, A. (2016). Greedy algorithms for prediction. Bernoulli, 22(2), 1227-1277.
7. Hastie, T., Tibshirani, R., Eisen, M. B., Alizadeh, A., Levy, R., Staudt, L., ... & Brown, P. (2000). 'Gene shaving'as a method for identifying
distinct sets of genes with similar expression patterns. Genome biology, 1(2), research0003-1.
8. Weigelt, B., Hu, Z., He, X., Livasy, C., Carey, L. A., Ewend, M. G., ... & van't Veer, L. J. (2005). Molecular portraits and 70-gene prognosis
signature are preserved throughout the metastatic process of breast cancer. Cancer research, 65(20), 9155-9158.
9. Kluger, Y., Basri, R., Chang, J. T., & Gerstein, M. (2003). Spectral biclustering of microarray data: coclustering genes and conditions. Genome
research, 13(4), 703-716.
10. Yang, M. S., Lin, K. C. R., Liu, H. C., & Lirng, J. F. (2007). Magnetic resonance imaging segmentation techniques using batch-type learning
vector quantization algorithms. Magnetic resonance imaging, 25(2), 265-277.
11. Ahsen, Mehmet Eren, Todd P. Boren, Nitin K. Singh, Burook Misganaw, David G. Mutch, Kathleen N. Moore, Floor J. Backes et al. "Sparse
feature selection for classification and prediction of metastasis in endometrial cancer." BMC genomics 18, no. 3 (2017): 233.
12. Shabalin, A. A., Weigman, V. J., Perou, C. M., & Nobel, A. B. (2009). Finding large average submatrices in high dimensional data. The Annals of
Applied Statistics, 3(3), 985-1012.
Authors: G.Kiruthiga, P.Mayil Vel Kumar, K.M.Murugesan, T.Yawanika
Paper Title: Improved Fault Diagnosis in Wireless Sensor Networks Using Deep Learning Technique
Abstract: In recent times, Wireless Sensor Network (WSN) has increased its attention due to its positive impact on
surveillance in its surrounding environment. Numerous researches have been report since decades, however, the studies
on diagnosing the network fault in critical conditions have received little attention. This could be another area of interest
140. in WSN to increase its overall lifespan and network scalability. However, owing to ad-hoc characteristics of sensor
nodes, the scalability of network reduces and this makes the network administrator to poorly observe the conditions of 757-760
the network. The other major limitations associated with the fault diagnosis in WSN includes: short communication
range, limited energy resource, limited processing power, low bandwidth, storage in sensor node, conditionally
independent transmission of signals, high power in transmission and signal acquisition and faulty sensory reading under
harsh operating condition. The present study considers improving the lifetime and scalability of sensor nodes using
passive fault diagnosis using a deep learning approach named Conventional Neural Network. This method effectively
classifies the faulty sensor nodes and eliminates it from communicating with other sensor nodes.

Keywords: Recurrent Neural Network, Fault diagnosis, Network Scalability, WSN

References:
1. Zidi, S., Moulahi, T., &Alaya, B. (2018). Fault detection in wireless sensor networks through SVM classifier. IEEE Sensors Journal, 18(1), 340-
347.
2. Muhammed, T., & Shaikh, R. A. (2017). An analysis of fault detection strategies in wireless sensor networks. Journal of Network and Computer
Applications, 78, 267-287.
3. Miao, X., Liu, Y., Zhao, H., & Li, C. (2018). Distributed online one-class support vector machine for anomaly detection over networks. IEEE
transactions on cybernetics, (99), 1-14.
4. Yuan, Y., Li, S., Zhang, X., & Sun, J. (2018, July). A Comparative Analysis of SVM, Naive Bayes and GBDT for Data Faults Detection in
WSNs. In 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C) (pp. 394-399). IEEE.
5. Li, L., Yu, Y., Bai, S., Hou, Y., & Chen, X. (2018). An Effective Two-Step Intrusion Detection Approach Based on Binary Classification and $ k
$-NN. IEEE Access, 6, 12060-12073.
6. Zhou, Z., Li, S., & Wang, B. (2014). Multi-scale weighted gradient-based fusion for multi-focus images. Information Fusion, 20, 60-72.
7. Li, Y. D., Hao, Z. B., & Lei, H. (2016). Survey of convolutional neural network. Journal of Computer Applications, 36(9), 2508-2515.
8. Lv, F., Wen, C., Bao, Z., & Liu, M. (2016, July). Fault diagnosis based on deep learning. In 2016 American Control Conference (ACC) (pp. 6851-
6856). IEEE.
9. Hinton, G. E., Osindero, S., &Teh, Y. W. (2006). A fast learning algorithm for deep belief nets. Neural computation, 18(7), 1527-1554.
10. Li, C., Sanchez, R. V., Zurita, G., Cerrada, M., Cabrera, D., &Vásquez, R. E. (2015). Multimodal deep support vector classification with
homologous features and its application to gearbox fault diagnosis. Neurocomputing, 168, 119-127.
11. Janssens, O., Slavkovikj, V., Vervisch, B., Stockman, K., Loccufier, M., Verstockt, S., ...& Van Hoecke, S. (2016). Convolutional neural network
based fault detection for rotating machinery. Journal of Sound and Vibration, 377, 331-345.
12. Li, C., Sánchez, R. V., Zurita, G., Cerrada, M., & Cabrera, D. (2016). Fault diagnosis for rotating machinery using vibration measurement deep
statistical feature learning. Sensors, 16(6), 895.
Authors: G.Kiruthiga, K.Kalaiselvi, R.S Shudapreyaa, V.Dineshbabu
Paper Title: Detection of Faults in Flying Wireless Sensor Networks Using Adaptive Reinforcement Learning
Abstract: In recent decade, diagnosing the fault in Unmanned Autonomous Vehicle (UAV) based Wireless Sensor
Networks (WSN) has received a little attention by the researchers. The limitations of UAV-WSN environment possibly
affects the fault diagnosis. The limitations associated with UAV-WSN conditions are considered as the scope of present
study in diagnosing the fault in network. The study focuses mainly on improving the overall lifespan of network and further
it tends to increase the network scalability. Since, the overall network lifetime and scalability reduces as the condition of
the network worsens. Hence, the observation on network becomes poor in identifying the faults associated with the
network. To resolve the issue, anAdaptive Reinforcement Learning is proposed in the study for the fault detection of flying
sensor nodes in UAV-WSN. This approach diagnoses the faults in the network in an effective way and improves the overall
efficiency of the network.

Keywords: Fault diagnosis, UAV, WSN, Adaptive Reinforcement learning

References:
8. Ollero, A., & Merino, L. (2004). Control and perception techniques for aerial robotics. Annual reviews in Control, 28(2), 167-178.
9. Merino, L., Wiklund, J., Caballero, F., Moe, A., De Dios, J. R. M., Forssen, P. E., ... &Ollero, A. (2006). Vision-based multi-UAV position
estimation. IEEE robotics & automation magazine, 13(3), 53-62.
141. 10. Prieto, J. C., Croux, C., & Jiménez, A. R. (2009). RoPEUS: A new robust algorithm for static positioning in ultrasonic systems. Sensors, 9(6), 4211-
4229.
11. Roth, A. E., &Erev, I. (1995). Learning in extensive-form games: Experimental data and simple dynamic models in the intermediate term. Games and 761-763
economic behavior, 8(1), 164-212.
12. Whiteson, S., Taylor, M. E., & Stone, P. (2007). Adaptive tile coding for value function approximation. Computer Science Department, University of
Texas at Austin.
13. Aydın, İ., Karaköse, M., & Akın, E. (2015). Combined intelligent methods based on wireless sensor networks for condition monitoring and fault
diagnosis. Journal of Intelligent Manufacturing, 26(4), 717-729.
14. Förster, A., & Murphy, A. L. (2011). Froms: A failure tolerant and mobility enabled multicast routing paradigm with reinforcement learning for
WSNs. Ad Hoc Networks, 9(5), 940-965.
15. Rashid, S., Akram, U., Qaisar, S., Khan, S. A., &Felemban, E. (2014, September). Wireless sensor network for distributed event detection based on
machine learning. In 2014 IEEE International Conference on Internet of Things (iThings), and IEEE Green Computing and Communications
(GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom)(pp. 540-545). IEEE.
16. Titouna, C., Aliouat, M., &Gueroui, M. (2016). FDS: fault detection scheme for wireless sensor networks. Wireless Personal Communications, 86(2),
549-562.
17. Le, T., Ahmed, N., Parameswaran, N., &Jha, S. (2006, January). Fault repair framework for mobile sensor networks. In 2006 1st International
Conference on Communication Systems Software & Middleware (pp. 1-8). IEEE.
18. Singh, Y., Saha, S., Chugh, U., & Gupta, C. (2013, April). Distributed event detection in wireless sensor networks for forest fires. In 2013 UKSim
15th International Conference on Computer Modelling and Simulation (pp. 634-639). IEEE.
19. Nguyen, T. A., Bucur, D., Aiello, M., &Tei, K. (2013, December). Applying time series analysis and neighbourhood voting in a decentralised
approach for fault detection and classification in wsns. In Proceedings of the Fourth Symposium on Information and Communication Technology(pp.
234-241). ACM.
20. Muhammed, T., & Shaikh, R. A. (2017). An analysis of fault detection strategies in wireless sensor networks. Journal of Network and Computer
Applications, 78, 267-287.
Authors: Ajmeera Kiran, Devera Vasumathi
Paper Title: Data Mining: Random Swapping based Data Perturbation Technique for Privacy Preserving in Data Mining
Abstract: Data mining is a process of collecting unknown data from different data sources and such data are very much
142. useful for various decision-making Processes. Data mining process utilizes such sensitive information for analysing
purpose but, privacy preservation of such sensitive data is very much important in every data mining applications. For 764-778
Example, in-patient Health records some of the sensitive attributes like PID, Age, and Disease Name should not be
disclosed to the third party which will lead to privacy violation of the individuals. Hence, a new model should be designed
to preserve the privacy of such Sensitive data before it make publicly available. In this paper, an accurate and efficient
PPDM (Privacy Preserving Data Mining) technique is implemented in order to preserve the private information about
individuals. In the Existing System, traditional Geometric data perturbation (Gaussian Noise Based) technique preserved
the individual privacy with some information loss. In the Proposed Paper, an efficient and effective Random Swapping
based data perturbation technique is proposed which is mainly focuses on preserving the sensitive attributes and also
attaining accurate classification results with minimum Information loss. In Proposed Framework, the accuracy, error rates
is compared with a Naïve Bayes classification algorithm and J48 decision tree Algorithm and results are analysed using
Weka 3.8 tool. Proposed Random Swapping Based perturbation technique improved the Accuracy and reduced the error
rates with minimum information loss with compared to the existing system.

Keywords: Data Mining, Privacy Preserving, Data Perturbation, Random Swapping, Naive Bayes Classification, J48
decision tree, Geometric Data Perturbation.

References:
1. Data Mining, Melbourne, Florida, U.S.A., pp. 211-218 (2003).
2. M. Chen, J. Han, and P. Yu, “Data mining: An Overview from a database Prospective”, IEEE Trans. on Knowledge and Data Engineering, vol. 8, no.
6, pp. 866-883, Dec. 1996.
3. C.L.P. Chen, C.Y. Zhang, “Data Intensive applications, challenges,Techniques and technologies: A survey on Big Data”, Information Sciences, vol.
275, pp.314-347, 2014.
4. Alcalá, J, Fernández, A, Luengo, J, Derrac, J, García, S, Sánchez, L & Herrera, F 2010, ‘KEEL data-mining software tool: Data set repository,
integration of algorithms and ti on Privacy and Security no’s in Data Mining and Machine Learning’, vol. 4, no. 3,pp. 127 – 128.
5. Xu, Lei, Chunxiao Jiang, Jian Wang, Jian Yuan, and Yong Ren, „Information security in big data: privacy and data mining”, pp.1149-1176, 2014.
6. Atallah, M., Elmagarmid, A., Ibrahim, M., Bertino, E., Verykios.V:Disclosure limitation of sensitive rules, Workshop on Knowledge and Data
Engineering Exchange, 1999.
7. Dunning, Larry A., and Ray Kresman, "Privacy preserving data sharing with anonymous ID assignment", IEEE Transactions on Information
Forensics and Security, Vol.8, no.2, pp.402-413, 2013.
8. Li, Yaping, Minghua Chen, Qiwei Li, and Wei Zhang, "Enabling multilevel trust in privacy preserving data mining", IEEE Transactions on
Knowledge and Data Engineering, Vol.24, no.9, pp.1598-1612, 2012.
9. Ms. Ompriya Kale, Ms. Prachi Patel, "A Survey on Privacy Preserving Data Mining Techniques”, Global journal of Advanced Engineering
Technologies, ISSN: 2277-6370, vol2, Issue3-2013.
10. Ricardo mendes,Joao p. vilela, ‘Privacy-Preserving Data Mining: Methods, Metrics, and Application’, IEEE-2017 .
11. V.S. Mahalle,Pankaj Jogi , Shubham Purankar, Samiksha Pinge, Urvashi Ingale ,” Data Privacy Preserving using Perturbation Technique”, Asian
Journal of Convergence in Technology Volume III, Issue III,ISSN No.:2350-1146, I.F-2.71, Dec, 2017.
12. Nikunj Kumar Patel, „Data Mining: Privacy Preservation Using Perturbation Technique, June, 2015.
13. Aobakwe Senosi, George Sibiya, ‘Classification and Evaluation of Privacy Preserving Data Mining: A Review”, 2017 IEEE.
14. M.Reza,Somayyeh Seifi,” Classification and Evaluation the PPDM Techniues by using a data Modification -based framework”, IJCSE,Vol3.No2
Feb,2011.
15. Ajmeera Kiran, D.Vasumathi “Data Mining: A Study of Multiplicative Data Perturbation Technique for Privacy Preservation”, in the ICNTET2018:
International Conference on New Trends in Engineering & Technology Tirupathi Highway, Tiruvallur Dist., Chennai, India, September 7-8, 2018.
(Communicated AND accepted).
16. Twinkle Ankleshwaria, Prof. J. S. Dhobi,” Geometric Data Perturbation Approach for Privacy Preserving in data Stream Mining” Engineering
Universe for Scientific research and Management, Impact factor 3.7, Volume 6, Issue 4, April 2014.
17. Hillol Kargupta, Souptik Datta, Qi Wang, Krishnamoorthy Sivakumar," Random-data perturbation techniques and privacy-preserving data mining",
In. Proceedings of. Springer-Verlag London Ltd. 2004 Knowledge and Information Systems (2005) 7: 387–414,DOI 10.1007/s10115-004-0173-6.
18. Hina Vaghashia, Amit Ganatra, 2015. " A Survey: Privacy Preservation Techniques in Data Mining " , In. Proceedings of International Journal of
Computer Applications (0975 – 8887) Volume 119 – No.4, June 2015.
19. Mehta, Brijesh B., and Udai Pratap Rao, "Privacy preserving big data publishing: a scalable k-anonymization approach using MapReduce", IET
Software, Vol. 11, No. 5, pp. 271-276, 2017.
20. Ienberg S., McIntyre J.: Data Swapping: Variations on a Theme by Dalenius and Reiss. Technical Report, National Institute of Statistical Sciences,
2003.
21. Vaidya, Jaideep, Basit Shafiq, Wei Fan, Danish Mehmood, and David Lorenzi, "A random decision tree framework for privacy-preserving data
mining", IEEE transactions on dependable and secure computing, no. 5, pp. 399-411, 2014.
22. UCI Machine Learning Repository http://archive.ics.uci.edu/ml/datasets.html
23. Weka 3.6 Data Mining Tool, https://www.cs.waikato.ac.nz/ml/weka/downloading.html
Authors: S.Jyothi, Raju Anitha, CSR Prabhu
Paper Title: Conceptual FOG Based Architecture for Monitoring and Acceleration of Bone Fracture
Abstract: In the backdrop of an emerging scenario marked by a predominantly older populace, burgeoning costs of living
amidst depleting resources, Cloud computing and IoT offer a ray of hope, particularly while developing e-Health system,
with patient at the core of the healthcare pyramid. Telemedicine is a novel application that offers healthcare services such
as diagnosis, consultation as well as treatment that reaches the most efficient levels with introduction of smart healthcare
solutions. Nonetheless, IoT-driven healthcare requires to conquer multiple hurdles like complexities in data storage on
cloud servers, security and privacy aspects, prohibitively high expenses incurred on perpetual data accumulation, other than
energy-efficiency challenges and maintenance of sensors based out of cloud servers. In this paper, the primary focus is on
devising a novel construct around the concept, Fog computing, particularly from the point of view of Tele medical IoT. As
is commonly understood, Fog computing as a prototype allows cloud computing services to reach the periphery of a
143. network. In a manner identical to cloud, Fog enables end users to receive data, computation, storage, and application
services. As a case study, in this paper, an attempt has been made to develop a service- oriented architecture that monitors 779-784
and accelerates healing in cases of bone fracture applying fog computing. In fact, , this architecture applies a sensing
module on an energy-efficient embedded computer to perform data mining and data analytics operation on raw data that is
sourced from sensing modules utilized in such telehealth operations. This embedded computer system assembles such
sensed data in a time series before analyzing and discovering the identical patterns, which later stores, extracts novel
patterns as well as transmits clinically-suitable data via network to the cloud based in a hospital.

Index Terms: Cloud Computing, Fog Computing, IoT, Telemedicine

References:
1. Miao Wu et. al., “Research on the architecture of Internet of things,” in the proceedings of 3rd International Conference on Advanced Computer
Theory and Engineering, 20-22 August, 2012, Beijing, China.
2. Mohammad Aazam, Pham Phuoc Hung, Eui-Nam Huh, “Cloud of Things: Integrating Internet of Things with Cloud Computing and the Issues
Involved,” in the proceedings of 11th IEEE IBCAST, Islamabad, Pakistan, 14-18 January,2014.
3. Mohammad Aazam, Pham Phuoc Hung, Eui-Nam Huh, “Smart Gateway Based Communication for Cloud of Things,” In the proceedings of 9th IEEE
ISSNIP, Singapore, 21-24 April, 2014.
4. Bonomi Flavio, Rodolfo Milito, Preethi Natarajan and Jiang Zhu, “Big Data and Internet of Things: A Roadmap for Smart Environments,” pp. 169-
186, 2014, Springer International Publishing.
5. I. Stojmenovic, “Fog computing: A cloud to the ground support for smart things and machine-to-machine networks," Telecommunication Networks
and Applications Conference (ATNAC), 2014 Australasian, pp. 117-122, November 2014.
6. R. Craciunescu, A. Mihovska, M. Mihaylov, S. Kyriazakos, R. Prasad, S. Halunga, “Implementation of Fog computing for reliable E-health
applications,” 49th Asilomar Conference on Signals, Systems and Computers, California ,USA, November 8-11, 2015.
7. Gupta T, Jain V. and Tandon P., Medical & Biological Engineering & Computing, 29, 113-120, 1991
8. R. Strelitzki, J.A. Evans, Ultrasonics, 34, 785-791, 1996
9. C. Malizos, M. Hantes, A. Mavrodontides, M. Plissiti, D.I. Fotiadis, C.V. Massalas, T. Bakas, G. Evangelakis and A. Moukarika, PROC.,
EMBEC’99, 288-289, 1999.
Authors: V. Tirupathi, K. Sagar
Paper Title: A Research on Interoperability Issues in Internet of Things at Application Layer
Abstract: Now a days everyone is depending on smart things (smart computing devices) or devices to complete their task
comfortably from anywhere. These smart things create a network to exchange information between them by following
OSI/ISO (Open system interconnection) or TCP/IP protocol stack. The two protocol stacks have seven layers which are
being used by smart things to communicate with each other through network. These seven layers perform different tasks by
using different protocols at each level. For example, network layer has TCP and UDP protocols for segmentations and
communications application layer has http, https and SNMP etc... Smart things communicate with each other either through
connection or connection less communication mediums. Devices are various kind, some of them are operate on low-power
and low-data rates. Some of them operate on high-power and high-data rates using strong Ethernet networks. Establishing
communication among heterogeneous devices and software protocols is a challenging task. Smart things behave
intelligently with help of internet, embedded sensors and actuators. Smart things have processing and network capabilities.
These are the building blocks for Internet of Things (IoT). This paper summarizes all application layer protocols and
interoperability issues.

Keywords: OSI/ISO, TCP/IP, UDP, IoT, SNMP

References:
1. O. Hahm, E. Baccelli, H. Petersen, and N. Tsiftes. 2016. Operating systems for low-end devices in the internet of things: A survey. IEEE Internet of
Things Journal 3, 5 (Oct. 2016), 720–734. DOI:http://dx.doi.org/10.1109/JIOT.2015. 2505901W.-K. Chen, Linear Networks and Systems (Book
style).Belmont, CA: Wadsworth, 1993, pp. 123–135.
2. Y. Xu, V. Mahendran, W. Guo, and S. Radhakrishnan. 2017. Fairness in fog networks: Achieving fair throughput performanceinMQTT-
basedIoTs.InProceedingsofthe201714thIEEEAnnualConsumerCommunicationsNetworking Conference (CCNC’17). 191–196.
DOI:http://dx.doi.org/10.1109/CCNC.2017.7983104 B. Smith, “An approach to graphs of linear forms (Unpublished work style),” unpublished.
3. P. Sethi and Smruti R. Sarangi. 2017. Internet of things: Architectures, protocols, and applications. Journal of Electrical and Computer Engineering
144. (2017), 1–25. DOI:10.1155/2017/9324035 J. Wang, “Fundamentals of erbium-doped fiber amplifiers arrays (Periodical style—Submitted for
publication),” IEEE J. Quantum Electron., submitted for publication. 785-788
4. AlessioBotta,WalterdeDonato,ValerioPersico, andAntonioPescapé.2014.Ontheintegrationofcloud computing and internet of things. In Proceedings of
the 2014 International Conference on Future Internet of Things and Cloud (FICLOUD’14). IEEE Computer Society, 23–30.
DOI:http://dx.doi.org/10.1109/FiCloud.2014.14 Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical
media and plastic substrate interfaces(Translation Journals style),” IEEE Transl. J. Magn.Jpn., vol. 2, Aug. 1987, pp. 740–741 [Dig. 9th Annu. Conf.
Magnetics Japan, 1982, p. 301].
5. G. Banavar, T. Chandra, B. Mukherjee, J. Nagarajarao, R. E. Strom, and D. C. Sturman. 1999. An efficient multicast protocol for content-based
publish-subscribe systems. In Proceedings of the 19th IEEE International Conference on Distributed Computing Systems (Cat. No.99CB37003). 262–
272. DOI:http://dx.doi.org/10.1109/ICDCS.1999.776528 (Basic Book/Monograph Online Sources) J. K. Author. (year, month, day). Title (edition)
[Type of medium]. Volume(issue). Available: http://www.(URL)
6. AndrewBanksandRahulGupta(Ed.).29October2014. MQTT Version 3.1.1.OASISStandard.http://docs.oasis-open. org/mqtt/mqtt/v3.1.1/os/mqtt-
v3.1.1-os.html. (Journal Online Sources style) K. Author. (year, month). Title. Journal [Type of medium]. Volume(issue), paging if given.
Available: http://www.(URL).
7. Z. SHELBY, K. HARTKE, AND C. BORMANN. 2014. THE CONSTRAINEDAPPLICATION PROTOCOL (COAP). RFC 7252. RFC EDITOR.
HTTP://WWW.RFC-EDITOR.ORG/RFC/RFC7252.TXT.
8. OASIS. 29 October 2012. Advanced Message Queuing Protocol (AMQP) Version 1.0. OASIS Standard. http://docs. oasis-
open.org/amqp/core/v1.0/os/amqp-core-overview-v1.0-os.html.
9. OBJECT MANAGEMENT GROUP (OMG). 2015. DATA DISTRIBUTION SERVICE (DDS) VERSION 1.4. (MARCH 2015), 1–20.
10. P. Saint-Andre. 2004. Extensible Messaging and Presence Protocol (XMPP): Core. RFC 3920. RFC Editor.
11. C. Severance. 2015. Roy T. Fielding: Understanding the REST style. Computer 48, 6 (June 2015), 7–9. DOI:http://dx. doi.org/10.1109/MC.2015.170
12. W.Shang, Y.Yu,R.E.Droms,andL.Zhang.2016. Challenges in IoT Networking via TCP/IP Architecture.NDNProject, Technical Report. NDN-00382
(2016), 7.
13. E. Rescorla and N. Modadugu. 2012. Datagram Transport Layer Security Version 1.2. RFC 6347. RFC Editor. http://www.rfc-
editor.org/rfc/rfc6347.txt.
14. J. E. Luzuriaga, J. C. Cano, C. Calafate, P. Manzoni, M. Perez, and P. Boronat. 2015. Handling mobility in IoT applications using the MQTT
protocol. In Proceedings of the 2015 Internet Technologies and Applications (ITA’15). 245–250.
DOI:http://dx.doi.org/10.1109/ITechA.2015.7317403
15. G. Farabaugh, G. Pardo-Castellote, and R. Warren. 2005. An introduction to DDS and data-centric communications. Real-Time Innovations.August
(2005
Authors: G Mallika, S Sudheer, M Lakshmi Ramya
Paper Title: The Affect of Employee Engagement Practices Towards Occupational Stress
Abstract: This study examines the role of employee engagement practices on employee occupational stress. With the
145. theoretical support the study constructs are determined and accordingly propositions are made and this study is to
understanding of different approaches and drivers of employee engagement. Review on literature on determinants of
789-793
employee engagement and comparison of these determinants with the organizations employee engagement system. After
comparison the literature review, Employee Engagement is very essential and profitable to the organization. Employee
engagement practices would be a take-over factors for occupational factors.
References:
1. Desai, Malavika, Bishakha Majumdar, and Ganapathy P. Prabhu. "A study on employee engagement in two Indian businesses." (2010).
2. Bakker, Arnold B., and Evangelia Demerouti. "The job demands-resources model: State of the art." Journal of managerial psychology 22.3 (2007):
309-328.
3. Robertson, Ivan T., and Cary L. Cooper. "Full engagement: The integration of employee engagement and psychological well-being." Leadership &
Organization Development Journal31.4 (2010): 324-336
4. Abraham, Susan. "Job Satisfaction as an Antecedent to Employee Engagement." SIES Journal of Management 8.2 (2012).
5. Bakker, Arnold B., and Evangelia Demerouti. "Towards a model of work engagement." Career development international 13.3 (2008): 209-223.
6. Brad Shuck, M., Tonette S. Rocco, and Carlos A. Albornoz. "Exploring employee engagement from the employee perspective: Implications for
HRD." Journal of European Industrial Training 35.4 (2011): 300-325.
7. Babatunde, A. (2013). Occupational Stress : A Review on Conceptualisations , Causes and Cure. Economic Insights - Trends and Challenges, 2(3),
73–80.
8. Motowidlo, S. J., Packard, J. S., & Manning, M. R. (1986). Occupational Stress : Its Causes and Consequences for Job Performance. Journal of
Applied Psychology, 71(4), 618–629. https://doi.org/10.1037//0021-9010.71.4.618
9. Kazmi, R., Amjad, S., & Khan, D. (2008). OCCUPATIONAL STRESS AND ITS EFFECT ON JOB PERFORMANCE A CASE STUDY OF
MEDICAL HOUSE OFFICERS OF DISTRICT ABBOTTABAD. Journal of Applied Mathematics and Computing, 20(3), 135–139.
10. Ongori, H., & Agolla, J. E. (2008). Occupational Stress in Organizations and Its Effects on Organizational Performance. Journal of Management
Research, (December 2016).
11. Johnson, J. A. (1986). Wellness and Occupational Therapy. American Journal of Occupalional Therapy, 40(11), 753–758.
12. Motowidlo, S. J., Packard, J. S., & Manning, M. R. (1986). Occupational Stress : Its Causes and Consequences for Job Performance. Journal of
Applied Psychology, 71(4), 618–629. https://doi.org/10.1037//0021-9010.71.4.618
13. Thakur, Preeti. "A research paper on the effect of employee engagement on job satisfaction in IT sector." Journal of Business Management & Social
Sciences Research 3.5 (2014): 31-39.
14. Firth, Lucy, et al. "How can managers reduce employee intention to quit?." Journal of managerial psychology 19.2 (2004): 170-187.
15. Goetzel, R. Z., Henke, R. M., Tabrizi, M., Pelletier, K. R., Loeppke, R., Ballard, D. W., … Crighton, K. A. (2014). Do Workplace Health Promotion (
Wellness ) Programs Work ? OUTCOMES EXPECTED FROM HEALTH. Journal of Occupational and Environmental Medicine, 56(9), 927–934.
https://doi.org/10.1097/JOM.0000000000000276
16. Soni Agrawal “Factors influencing employee engagement: a study of diverse workforce”
17. Preeti Thakur “A Research Paper on the Effect of Employee Engagement on Job Satisfaction in IT Sector”
18. Walsh, M., Winefield, A. H., & Stough, C. (2001). Occupational stress in universities: staff perceptions of the causes, consequences and moderators
of stress. Work & Stress, 15(1), 53–72. https://doi.org/10.1080/02678370110062449

Authors: Moumita Guha, Bipan Tudu, Pritam Singha Roy


Paper Title: QCM based Electronic Nose for Black Tea Quality Evaluation by Different Data Analysis Techniques
Abstract: The common and effective technique to find the quality of tea is by sensor activities of the human called Tea
Tasters. But this technique is most predictable in nature. For this reason very sophisticated sensor network has been
designed. Electronic Nose is the most efficiently used to calculate the behavior and quality of black tea. An Electronic Nose
sensor has been developed, consisting of an array of five AT-CUT 10 MHz QCM sensors. The array has been exhibits by
the aroma characteristics of different types of black tea (CTC, Orthodox) and the response has been monitored online
though Data Acquisition System. The data obtained in this manner has been clustered with the help of different
algorithm(PCA,LDA). A BPMLP network has also been incorporated for the purpose of classification. The paper is
146. concluded with comparison of cluster validity indices of original data with those of clusters obtained with different
algorithms and the performance of the system which is very effective, is justified. 794-797

Keywords: Black Tea; Electronic Nose; QCM; Clustering; Classification; PCI; LDA; ICA; BPMLP; Dunn’s Index

References:
21. S.Kar,P.Sharma,P.J.Soren, “QCM anlysis for Black tea discriminations,” IEEE Trans.Inst. Meas,.vol.58,pp.1318-1322,2010.
22. B. Bhatia,A.Paul, Tea manufacturing palant. New Delhi, India: Oxford and Kanara Publications., 1996.
23. S.Choudhury: A Comprehensive study on Neural network Englewood Cliffs, NJ: Prentice-Hall, 2001.
24. D.H. Donald, G.E. Hinton, and T.J. Sejnowski, “A leanring algorithms on neural network,” Cognitive Science, 1995
25. J.N. Foreman and D.S. Balaswami, “Neural Networks: Algorithms, Applications, and Matlab ,” Addison Wesley, 1999
Authors: P. Saritha, A. Satyadevi, P. Ravikanth Raju
Paper Title: Experimental Analysis of Fatigue Life of Al7075
Abstract: The modest aluminum density and its capacity to withstand corrosion through the passivation phenomenon are
extraordinary. Aluminum and its compounds are vital to the aerospace industry, also for transportation and construction
industries, such as façade construction and Construction to window panels. It has low density, non-toxic, elevated heat
conductivity, great resistance to corrosion and casted, machined and shaped readily. It's non-magnetic as well as non-
sparking. In this work, fatigue’s life of AL7075 and pure Aluminum has been tested under high cyclic loads on fatigue
assessment device. Analysis software ANSYS has been used to analyze fatigue’s life of different series of Aluminum
specimens. The obtained experimental results compared with ANSYS results and conclusions made from them.

147. Keywords: AL7075, fatigue assessment device and ANSYS.


798-801
References:
1. B.Skallerud T.Ivel andG.Härkegård “Fatigue life assessment of aluminum alloys with casting defects” Elsevier publications Volume 44, Issue 6, April
1993, Pages 857-874.
2. J Mar SciTechnol “A state-of-the-art review on fatigue life prediction methods for metal structures “ Journal of Marine Science and Technology
7(1):43-56 • June 2002.
3. Chavoshi, S.Z. and Tajdari, M. Surface roughness modelling in hard turning operation of AISI 4140 using CBN cutting tool, International Journal of
Material Forming, Vol. 3, 2010, pp. 233–239.
4. Özel, T., Hsu, T.K. and Zeren, E., Effects of cutting edge geometry, workpiece hardness, feed rate and cutting speed on surface roughness and forces
in finish turning of hardened AISI H13 steel, International Journal of Advanced Manufacturing Technology,Vol.25, 2005,pp.262-269.
5. Suksawat, B. Devolopment of in-process surface roughness evaluation system for cast nylon 6 turning operation. Procedia engineering, 2011 Vol 15,
pp. 4841-4846.
6. F Cus, U. Z. (2015). Surface roughness control simulation of turning process. Journal of mechanical engineering 61.4,245-253.
7. W. Zębala, J. Gawlik, A. Matras, G. Struzikiewicz, Ł. Ślusarczyk, Research of surface finish during titanium alloy turning, Key Engineering
Materials 581 (2014), 409-414.
8. Ross, P.J., 2005, Taguchi Techniques for Quality Engineering, McGraw-Hill, New York, USA, Chap. 7.
9. P.Saritha, Dr.A.Satyadevi, Dr.P.RavikanthRaju, N.C.Swapna Sri” Effect Of Zirconium On Mechanical Behavior Of Aluminum7075" IJSR Volume 7
Issue 3, March 2018.
10. T Prasad, P.ChinnaSreenivasRaoB.VijayKiran “Investigation of Mechanical properties of Al7075 with Magnesium oxide Nano powder MMC”,IOSR
Journal of Mechanical and Civil Engineering (IOSR-JMCE) ISSN: 2278-1684, PP.60-65.
11. Dr. Narayan, B.Doddapattar, S. Puneeth “Optimization of Cutting Parameters Using Signal-to-Noise Ratio for Turning Aluminum Alloy Al7050”,
International Journal of Ignited Minds (IJIMIINDS).
12. Basil Rajan ,Avis.A “Optimization of Suface Roughness in Turning by Taguchi Method” IOSR Journal of Mechanical and Civil Engineering (IOSR-
JMCE) e-ISSN: 2278-1684,p-ISSN: 2320-334X, PP 78-82.
Authors: Sridhar Adibhatla, Satyadevi. A, N.V. Swamy Naidu
Paper Title: Applicability of Hyper Elastic Models For the Analysis of Femur Bone
Abstract: The femur bone plays a key role in the locomotion activities of human beings. It is the load bearing and load
transferring part in the lower extremity of bones. The stress-strain response of femur largely depends on the type of
material and its properties. In the present study different incompressible hyper elastic material models (constants) were
derived from the uni-axial compression test data (Evans, 1969) performed on both dry and wet femurs using curve-fitting
techniques. Two different femur geometries were considered and FE models were developed with neck-shaft angle (NSA)
varying from 1100-1700 and porosity level of 75%. The force on the femoral head was applied at 00 to the vertical axis in
the frontal plane. The results of static structural analysis performed with different hyper elastic material models indicated
that Ogden 3rd order model is able to predict the stress-strain response of femur in wet condition more accurately and in
good agreement with the published experimental results. Also, it was observed that wet femur will have higher stress-strain
response due to the presence of moisture and other contents in comparison to dry bone.

Keywords: Femur, Hyper-elastic, Neck-shaft angle, Porosity, Ogden 3rd order

148. References:
1. Beomkeun Kim, Seong Beom Lee, Hyungmin Park, A Comparison Among Neo-Hookean Model, Mooney-Rivlin Model, and Ogden Model for
Chloroprene Rubber, International journal of precision engineering and manufacturing, vol. 13, issue. 5, May2012. 802-805
2. Evans. F.G., Mechanical Properties of bone, Artificial limbs, volume 13, issue 1, pp.37-48, 1969
3. Hosseinzadeh M., Ghoreishi M., Narooei K., Investigation of hyper elastic models for nonlinear elastic behavior of demineralized and deproteinized
bovine cortical femur bone, journal of the mechanical behavior of biomedical materials. Vol. 59, pp. 393–403, 2016.
4. M.R. Mansouri, H. Darijani, Constitutive modeling of isotropic hyperelastic materials in an exponential framework using a self-contained approach,
International Journal of Solids and Structures, 2014, vol. 51, pp-4316 to 4326
5. Mihai. L. A., Chin. L, Janmey. P.A., Goriely A., A comparison of hyperelastic constitutive models applicable to brain and fat tissues. J. R. Soc.
Interface 12: 20150486, 2015
6. Minglei Ju, Hamdi Jmal, Raphaël Dupuis, Evelyne Aubry, Parameter Estimation of a Hyperelastic Constitutive Model for the Description of
Polyurethane Foam in Large Deformation, Cellular Polymers, Vol. 32, No. 1, 2013
7. Minglei Ju, Hamdi Jmal, Raphaël Dupuis, Evelyne Aubry, A comparison among Polynomial model, Reduced polynomial model and Ogden model for
polyurethane foam, Advanced Materials Research, Trans Tech Publications, 2014, Material Science and Engineering Technology II, p.169. hal-
01164322
8. Nomesh Kumar, Venkateswara Rao. V, Hyperelastic Mooney-Rivlin Model: Determination and Physical Interpretation of Material Constants, MIT
International Journal of Mechanical Engineering, Vol. 6, No. 1, January 2016, pp. 43-46
9. Rafael Tobajas, Elena Ibarz and Luis Gracia, A comparative study of hyperelastic constitutive models to characterize the behavior of a polymer used
in automotive engines 2016, MDPI
10. T. Y. P. Chang, A. F. Saleeb, G. Li, Large strain analysis of rubber-like materials based on a perturbed Lagrangian variational principle,
Computational Mechanics, vol. 8, pp. 221-233, https://automeris.io/WebPlotDigitizer/
Authors: Rosemary L. Buraga, Maria Visitation M. Gumabay, DIT
Paper Title: A Web-based Multilingual Language Translation
Abstract: This study was conducted to develop a web-based multilingual language translation which focused on two
main points: the development of web-based multilingual translation system for Ibanag, Tagalog and English and the
evaluation of system. Specifically, to determine and gather Ibanag words based on the available printed materials and
informants, design and develop a website that will translate the words or phrases in Ibanag to Tagalog and English with the
related words, an auditory modality and pictures and determine the extent of performance of the developed system. A
Greinbach Normal Form (GNF) rule extraction algorithm was utilized to translate the given words and phrase in Ibanag,
Tagalog and English with auditory modality and image, while Inference Engine was the method used to execute the source
language text / word and analyses the processes based on the rules. Rapid Word Collection (RWC) and Dictionary
Development Process (DDP) were the approaches and processes utilized in gathering of Ibanag words. The words gathered
were submitted to the language experts for validation where Ethnographic translation was utilized in translating the
language.
149.
The system was developed using the Agile Web development process model. To assess the performance of the system, a
survey questionnaire was conducted based on the ISO 25010:2011 standard. As assessed by the participants and IT experts, 806-810
the study revealed that all the prescribed system category (e.g functionality, usability and reliability) had been complied to
a “highly acceptable”.

Keywords: auditory modality, ethnographic, inference engine, multilingual, translation,

References:
1. J. Balm, “The power of pictures. How we can use images to promote and communicate science”. 2014. Retrieved from:
http://blogs.biomedcentral.com/bmcblog/2014/08/11/the-power-of-pictures-how-we-can-use-images
2. Brislin in Choliludin, “Purposes of Translation”, 2007: 26-30.
3. FluentU. “Foreign Language Immersion Online”. Retrieved from https://www.fluentu.com/blog
4. J.K. Chambers, and P. Trudgill, “ Dialectology” . Cambridge: Cambridge University Press. pp. 18-23, 1980. ISBN 10: 0521294738 ISBN 13:
9780521294737
5. A. Duff, “Translation”, Oxford: Oxford University Press. p. 55, 1989.
6. J. Carbonell, D. Farwell, R. Frederking, S.Helmreich, E. Hovy, K. Knight, L. Levin, and S. Nirenburg “The Pangloss MT System”, Proceedings of the
First Conference of the Association for Machine Translation in the Americas, Columbia, Maryland, USA, pp.240-241, 1994.
7. R. A. Krueger and M. Casey, “Focus Groups. A Practical Guide for Applied Research”, Thousand Oaks, CA: Sage Publications, 3rd Edition, 2000.
Retrieved from http://www.qualitative-research.net/index.php/fqs/article
8. M. C. Cureg, “Pannonono: Ibanag Cultural Narratives and Discourses in a Changing Communication Environment”, 2004.
9. T. B.Obusan, and A. R. Enriquez, “Pamamaraan: Indigenous Knowledge and Evolving research paradigms”, 1994. Retrieved from
https://catalogue.nla.gov.au/Record/2193964
10. G. Wyner, “ Your First 625 (in Thematic Order, with notes)”, 2017. Fluent-Forever.com
11. J. Gibbons, “The Numbers Game: How Many Words Do I Need to Know to Be Fluent in a Foreign Language?”, 2018.
12. G. Cook, “Review Translation in Language Teaching: An Argument for Reassessment”, Oxford University Press, 177, 2010,. ISBN 978-0-19-
442475-2
13. F. Liu , & S. Maitlis, “Nonparticipant Observation”, 2010.
14. M. Siahbani and A.Sarkar, “ Two Improvements to Left-to-Right Decoding for Hierarchical Phrase-based Machine Translation”, 2014.
15. L. Milroy, “Observing and analyzing natural language: A critical account of sociolinguistic method”, Oxford: Basil Blackwell, p. 10., 1987.
16. G. T. Ndamba, “Mother tongue usage in learning: An examination of language preferences in Zimbabwe,” Great Zimbabwe University, 2008.
17. R. Moe, “Dictionary Development Program” - SIL International. Retrieved from sil-philippines-languages.org/ical/papers/vandenberg-mas
18. SIL. “Language Technology. Rapid Word Collection: An updated approach to dictionary creation”, 2018. Retrieved from
https://www.sil.org/enterprise-news/rapid-word
19. G.Stankevičiūtė, R.Kasperavičienė and J. Horbačauskienė, “Issues in Machine Translation”, 2017, ISSN 2453-7101
20. UKessays, “Translation”, 2013. Retrieved from https://www.ukessays.com/essays/education/translation
21. Oxford Dictionaries, “How our dictionaries are created”, 2018. Retrieved from https://www.oxforddictionaries.com/our-story/
22. Universe of Memory, 2015
23. Jacobson in Leonardi, “Jakobson and the concept of equivalence in difference”, 2000
24. K.-Y. Huang, “Challenges in Human-Computer Interaction”, 2009.
Authors: Amy Lyn M. Maddalora
Paper Title: Personalized Learning Model Using Item Response Theory
Abstract: Many Higher Education Institutions in the Philippines now accept that a blended approach offers countless
advantages in most areas of learning. However, learner’s ability has been neglected as a significant factor in student’s
success. Thus various techniques have been developed such as personalization to improve the learning process and
accommodate diversity of learners. This study introduces a personalized learning model that recommends Shortest
Learning Sequence (SLS) to remediate students with learning difficulty. The learning model was created using Item
Response Theory (IRT) implemented in an e-learning environment. Assessments were given during the learning process
with levels of difficulty. IRT probabilistically estimates the student’s proficiency of the topics taking into considerations
the difficulty of the test items. SLS consists of lessons recommended to students, which were ranked accordingly. The one
parameter (1PL) model was used to evaluate the test score and the item information was used to rank the lessons. Lessons
are reduced until the proficiency level of the student is reached. Results show that the personalized learning model is
capable of recommending shortest learning sequences. Hence, reduces the time spent of study. The student’s proficiency
level was increased through the implementation of the personalized learning model. Thus, the learning outcome was also
improved.

Index Terms: shortest learning sequence; item response theory; e-learning; personalized learning model.

References:
1. Martyn, M. (2003). The Hybrid Online Model: Good Practice. Educause Quarterly, pp. 18-23.
2. Pappas, C. (2015, November 30). 7 Tips to create personal learning paths in e-learning. Retrieved March 15, 2016, from eLearning Industry:
150. http://elearningindustry.com/7-tips-create-personal-learning-paths-elearning
3. Capper, J. (2001, May/June). E-Learning Growth and Promise. TechKnowLogia, 7-10.
4. Chen, C.-M., Lee, H.-M., & Chen, Y.-H. (2005). Personalized Elearning System Using Item Response Theory. Computers & Education, 44, 237-255. 811-818
5. Ballera, M., Lukandu, I., & Radwan, A. (2015). Reversed Roullette Wheel Selection Algorithm (RWSA) and Reinforcement Learning (RL) for
Personalizing and Improving E-Learning System: The Case Study and Its Implementation. The International Journal of E-Learning and Educational
Technologies in the Digital Media (IJEETDM), 1 (2), 92-108.
6. Kraayenoord, C. V., & Elkins, J. (1990). Learning Difficulties in A. Ashman and J. Elkins (eds) Education Children with Special Needs. New York:
Prenticec Hall.
7. Louden, W., Chan, L. S., Elkins, J., Greaves, D., & House, H. (2000). Department of Education, Training and Youth Affairs, Commonwealth of
Australia. Mapping the Territory - Primary Students with Learning Difficulties: Literacy and Numeracy.
8. Anderson, L. W. and Krathwohl, D. R., et al (Eds.) (2001) A Taxonomy for Learning, Teaching, and Assessing: A Revision of Bloom’s Taxonomy of
Educational Objectives. Allyn & Bacon. Boston, MA (Pearson Education Group)
9. Hubbard, R. (n. d.). Questions for Formative and Summative Assessment that Encourage Deep Rather than Surface Approaches to Learning Basic
Statistics in a Computer Environment, Queensland University of Technology. https://www.causeweb.org/cause/archive/artist/articles/hubbard.pdf
10. Ballera, M. A. (2015). Adaptive and Personalizing Learning Sequence Using Modified Roulette Wheel Selection Algorithm. International Scholarly
and Scientific Research & Innovation, 9 (12), 2265-2269.
11. Kardan, A., & Hosseini, R. (2011). Personalized Content Sequencing Based on Choquet Fuzzy Integral and Item Response Theory. International
Conference on Education Technology and Computer, 134-138.
12. Ballera, M. A. (2016). Roulette Wheel Selection Algorithm and Reinforcement Learning, Lambert Academic Publishing.
13. USC Libraries (2016, April 16). Research Guides, University of Southern Carolina. http://libguides.usc.edu/writingguide/researchdesigns
14. Ho Yu, C. (2013, August 30). A Simple Guide to the Item Response Theory (IRT) and Rasch Modeling.
15. Partchev, I. (2004). A visual guide to item response theory.
16. Drasgow, F., & Hulin, C. L. (1990). Item Response Theory.
17. Baker, F. B. (2001). The Basics of Item Response Theory (Second ed.). USA: ERIC Clearinghouse on Assessmet and Evaluation.
18. Moulton, M. H. (2003). Rasch Estimation Demonstration Spreadsheet. https://www.rasch.org/moulton.htm
19. Admin. (2013, March 5). Important eLearning Statistics for 2013. Retrieved from CertifyMe.net: http://www.certifyme.net/osha-blog/elearning-
statistics-2013/#sthash.M0w9GTVM.dpufhttp://www.certifyme.net/osha-blog/elearning-statistics-2013/

Authors: Jush Kumar Siddani, C. Srinivas, N.Nagabhushana Ramesh


Paper Title: Topological Surface of H.S.S and Titanium31 using Micro Electro Discharge Machining
151. Abstract: Micro Electro Discharge Machining Drill is variant EDM processes in a situation where it employs water as a
dielectric fluid, with pressure flushing and rotating nanotube electrode. This paper brings out the relative features of work
819-821
pieces i.e., H.S.S and Titanium 31 about their surface roughness and Topological surfaces.
Keywords: Micro Electro Discharge Machining Drill (Micro EDMD), Titanium 31, High Speed Steel (H.S.S), MRR

References:
26. Crichton, I.M and J.A. McGeough. Theoretical, experimental and computational aspects of electrical discharge arc machining process. Annals of the
CIRP. 1994; 33: 429-433.
27. Paulo Carlos Kaminski, and Marcelo Neublum Capuano. Micro hole machining by conventional electrical discharge machine. Int. Jl. Mach. Tools &
manufacture. 2003; 43: 143.1149.
28. Kuneida. M, Lauwers. B, Rajurkar K.P. and Schumacher, B.M. Advancing EDM through fundamental insight into the process. CIRP Annals-
Manufacturing Technology. 2005; 54: 64-87.
29. Electronica, EDM smart Drill. Manual – Electronic machine tools, Pune, India 2015.
Authors: Padmaja Kuruba, Sumalatha E, Dushyantha N D
Paper Title: Distributed Small Satellite Network and the Routing Protocols
Abstract: Availability of data anywhere, anytime and to anyone is the need of the current generation. One approach to
cater this growing demand is using Satellite communication, especially Low Earth Orbit Small Satellites Network
(LEOSSN) [14] [15]. LEOSSN with formation flying have worldwide coverage capabilities providing ubiquitous data. One
of the technical challenges is in designing efficient routing algorithms to route network traffic in LEOSSN. The protocols
are discussed with respect to traffic prediction, loading conditions, virtual network, QoS parameters, delay and packet loss.
This paper provides the survey of the routing protocols which provides a baseline for improvisation or development of new
routing techniques.

Keywords: Satellite Communication, LEO Satellite Network, Routing protocols, QoS parameters, Packet loss, traffic and
loading conditions, Shortest Path Algorithm (SPT).

References:
1. M. Werner, Delucchi, C., Vogel, H. J., Maral, G., & De Ridder, J. J. “ATM-based routing in LEO/MEO satellite networks with intersatellite links”,
IEEE Journal on Selected Areas in Communications, volume 5, Issue 1,pp. no 69-82, Jan. 1997.
2. Gao Zihe, Guo Qing and Na Zhenyu, “A Distributed Routing Algorithm with Traffic Prediction in LEO Satellite Networks”, Information Technology
Journal, 10: 285-292, 2011.
3. Yan He, S. Pelagatti, “CRT: an Adaptive Routing Protocol for LEO Satellite Networks”, 2nd international conference on information and
communication technologies”, Apr. 2006.
4. O. Ercetin, S. Krishnamurthy, Son Dao, L. Tassiullas, “A predictive QoS routing scheme for broadband low Earth orbit satellite networks”, 11th
152. International symposium on Personal Indoor and Mobile Radio Communications, Sept. 2000.
5. Jianmin Mao, W. Melody Moh, Belle Wei, “PQWRR scheduling algorithm in supporting of DiffServ”, IEEE International Conference on
Communication, pp. no, 679-684, Aug. 2002. 822-831
6. S.A.M. Makki, N. Pissinou, P. Daroux, “A new routing algorithm for low Earth orbit satellite networks”, Proceedings Tenth International
Conference on Computer Communications and Networks, Oct. 2001, pp. no 555-56.
7. Bai Jianjun , Lu Xicheng , Lu Zexin , Peng Wei, “Compact explicit multi-path routing for LEO satellite networks”, Workshop on High Performance
Switching and Routing(HPSR), pp. no 386-390, Sept. 2005.
8. T. Taleb, D. Mashimo, A. Jamalipour, K. Hashimoto, Y. Nemoto, and N. Kato, “ELB: An explicit load balancing routing protocol for multi-hop
NGEO satellite constellations,” in IEEE Globecom’06, San Francisco, CA, Nov. 2006.
9. KORCAK O, ALAGOZ F. Analysis of priority-based adaptive routing in satellite networks[C]//The 2nd International Symposium on Wireless
Communication Systems, 2005: 629-633.
10. TAN H, ZHU L. A novel routing algorithm based on virtual topology snapshot in LEO satellite networks[C]//IEEE 17th International Conference on
Computational Science and Engineering (CSE), 2014: 357-361.
11. A localized routing scheme for LEO satellite networks[C]//AIAA 21st International Communications Satellite Systems Conference and Exhibit. 2003:
2357-2364.
12. Xinmeng Liu, Zhuqing Jiang, Chonghua Liu, Shanbao He, Chao Li, Yuying Yang, Aidong Men, “A low-complexity probabilistic routing algorithm
for polar orbits satellite constellation networks[C]// IEEE/CIC International Conference on Communications in China (ICCC), 2015:
1-5.
13. Jingjing Yuan, Peiying Chen, and Qinghua Liu, “A Load-Balanced On-Demand Routing for LEO Satellite Networks”, Journal of Networks, volume
9, Issue 12, Dec. 2014
14. Kuruba, Padmaja and Ashok V. Sutagundar. “Space Based Wireless Sensor Network: A Survey.” (2017). Internet of Things and Cloud Computing
Volume 5, Issue 5-1, September 2017, Pages: 19-29 Aug. 10, 2017.
15. Emerging Trends of Space-Based Wireless Sensor Network and Its application, chapter 2: Handbook of research on wireless sensor network trends,
technologies, and applications NK Kamila - 2016
16. Inter-Orbital Cluster Formation and Routing in Satellite Sensor Network, ‘Internet of Things and Cloud Computing. Volume 5, Issue 5-1, September
2017, Pages: 38-47
Authors: B. Suhasini, Santhosh Kumar N
Paper Title: CRM Service touch points and Student Perception
Abstract: Digital Era has shaped the Customer interaction and service delivery mechanism in higher education space. The
integration of various service touch point processes with digital marketing and communications systems serves the
customer connect programs seamlessly. Digitization of various business process with enhanced multi-channel service touch
point communication systems has brought transformation in enhancing long term customer and stakeholder relationship in
the organization. The data and leads generated from Customer Relationship Management Communication Systems, multi-
channel social networking groups such as –Whatsapp, Twitter, Facebook, LinkedIn, Blogs, YouTube, Google+ etc,
interactions are increasing visibility, business outcome and enhancing the brand value of the organizations. The
153. Government’s mandate and active promotion for implementing digital communication system helped the Higher education
Institutions on customer reach activities. The CRM touch point’s services during admission and enrollment, course delivery 832-840
for teaching and learning, skill development etc have impact on the perception and increased satisfaction. The article is
intended to identify the service touch points, analyse and study and their benefits to students

Keywords: Digital marketing, Social Media, Customer Relationship Management, Multi-Channel Communication,
Higher education.

References:
1. Shainesh, G and Jagdish N. Sheth (2005) Customer Relationship Management: A Strategic Perspective, Macmillan, India
2. Adrian Payne and Pennie Frow, 2006 The Marketing Book by Michael Baker, Susan Hart Customer Relationship Management: from Strategy to
Implementation, Journal of Marketing Management, 2006, 22,135-168
3. William Boulding, Richard Staelin, Michael Ehret, Wesley J. Johnston (2005) A Customer Relationship Management Roadmap: What Is Known,
Potential Pitfalls, and Where to Go. Journal of Marketing: October 2005, Vol. 69, No. 4, pp. 155-166.
4. Reinartz, W., Krafft, M., & Hoyer, W. D. (2004). The customer relationship management process: Its measurement and impact on performance.
Journal of Marketing Research, 41(3), 293-305
5. Michael Dunn, Scott Davis, 2003, Building brands from the inside, Marketing Management, May/June, 32-37
6. Alan Tapp, Keith Hicks, 2004, Direct and database marketing and customer relationship management in recruiting students for higher education,
International Journal of Nonprofit and Voluntary Sector Marketing Volume 9 Number 4
7. Abbas Keramati and Hamed Mehrabi, 2010, A process-oriented perspective on customer relationship management and organizational performance:
An empirical Investigation, March 2010, Industrial Marketing Management.
8. Lemon, Katherine N and Verhoef, Peter C Peter C, 2016, Understanding Customer Experience throughout the Customer Journey, Journal of
Marketing. Nov2016, Vol. 80 Issue 6, p69-96. 28p.
9. Mboungou Mouyabi SEKE, 2015,The Reinvention of the Constituent Relationship Management (CRM) System in Higher Education in Africa,
International Journal on Communications (IJC) Volume 4, 2015
10. Urban Šebjana, Samo Bobeka, Polona Tomin, 2014, Organizational factors influencing effective use of CRM solution, Procedia Technology 16 459 –
470
11. Havlicek, K., Breckova, P., Zampeta, V. 2014, "Quality management as a part of CRM", European Research Studies Journal,Volume 16, Issue 4,
2014, Pages 15-28
12. Bang Nguyen, Dilip S. Mutum, (2012) "A review of customer relationship management: successes, advances, pitfalls and futures", Business Process
Management Journal, Vol. 18 Issue: 3, pp.400-419,
13. Gary B. Grant and Greg Anderson, Customer Relationship Management: A Vision for Higher Education, A Publication of EDUCAUSE and
NACUBO
14. Social Media for Higher Education: Prof (Ms) Vasudha Kamat, Journal of Marketing for Higher Education, Volume 24, 2014 - Issue 1: Branding in
Higher Education: Create Brand Equity by Focusing on Brand Identity, Brand Soul, and Brand Image
15. https://www.indiainfoline.com/article/news-union-budget-economic-survey/economic-survey-2017-18-services-sector-contributed-almost-72-5-of-
gva-growth-in-2017-18-118012900155_1.html
16. http://www.pib.nic.in/Pressreleaseshare.aspx?PRID=1518066
17. http://www.qswownews.com/2017/05/30/indian-higher-education-opportunities-transformation/
Authors: R.M.Rajeshwari, S.Rajesh
Storing and Preserving Resource Techniques in Energy- Exhaustion Procedure, InstantaneousAuditor for
Paper Title:
articulated Electric Vehicles of Hybrid Procedure
Abstract: The resource management (RM) of plug-in electric vehicles of hybrid Procedure (EVHM) is commonly divided
into two Procedures: Energy-exhaustion Procedure and Energy-Preserving Procedure. This paper presents the minimal
adaption law for any type of adaptive resource consumption optimization strategy (RCOS) in Energy-exhaustion Procedure
for module EVHMs. To demonstrate the ideal law, a specific versatile RCOS is picked, known as SAPRT. SAPRT has
beginning late been appeared for framework and parallel EVHM in Energy-Preserving Procedure. Here, by appearing
impeccable adaption law in Energy-depletion Procedure, SAPRT structure is related with Energy-use Procedure for module
EVHMs.

Index Terms: Resource Management, Electric Vehicle, Hybrid Procedurel, Optimized Fuel Control, RCOS, Energy-
Exhaustion, Plug-in EVHM

154. References:
1. C. Musardo, G. Rizzoni, and B. Staccia, "An ECMS: An Adaptive algorithm for Hybrid electric powered automobile electricity control," in 44th
IEEE conference on choice and manipulate and eu manage convention, Seville, Spain, Seville, Spain, 2005, pp.1816-1823. 841-843
2. S.OnoriandL. Tribioli, "Adaptable Pontryagin's minimal precept supervisory controller shape for the module cream GM Chevrolet Volt," applied
electricity, vol. 147, pp. 224-234, 2015/06/01/2015.
3. L. Li, S. You, C. Yang, B. Yan, J. Tune, and Z. Chen, "using-lead cautious stochastic Procedurel insightful manage for module taste electric
transports," applied energy, vol. 162, pp. 868-879, 2016/01/15/2016.
4. Z. D. Asher, D. A. Cake grasp, and T. H. Bradley, "want mistakes applied to Hybrid electric powered automobile most suitable gasoline economy,"
IEEE Transactions on manage structures era, pp. 1-14, 2017.
5. A. Rezaei and J. B. Burl, "impacts of Time Horizon on Procedurel Predictive manage for Hybrid electric motors," IFAC-PapersOnLine, vol. Forty
eight, pp. 252-256, August 2015.
6. N. Kim, S. Cha, and H. Peng, "perfect manage of Hybrid electric motors based on Pontryagin's minimum precept," IEEE Transactions on manage
systems era, vol. 19, pp. 1279 - 1287, SEPTEMBER 2011
7. A. Rezaei, J. B. Burl, B. Zhou, and M. Rezaei, "a new real-Time most useful strength control approach for Parallel Hybrid electric powered motors,"
IEEE Transactions on manipulate structures generation, vol. PP, pp. 1-eight, 2017.
8. A. Rezaei, J. B. Burl, A. Solouk, B. Zhou, M. Rezaei, and M. Shahbakhti, "find out power sparing opportunity (CESO), a brief impeccable
noteworthiness the executives framework for blueprint mutt electric powered motors," carried out electricity, vol. 208, pp. 655-665, 2017/12/15/2017.
9. A. Rezaei, J. B. Burl, and B. Zhou, "Estimation of the ECMS equal thing Bounds for Hybrid electric powered cars," IEEE Transactions on manipulate
structures era vol. PP, pp. 1-8, 2017.
K.Sujatha, Ponmagal.R. S, Yasoda. K, M. Anand, V. Karthikeyan, V. Srividhya, N.P.G. Bhavani, Su-Qun
Authors:
Cao
Paper Title: Detection of Pancreatic Tumor using Bacterial Foraging Algorithm
Abstract: Study and forecast are the central objectives taken into consideration for diagnosis of pancreatic tumor. The
detection of pancreatic tumor in patients in premature stage increases the chance of survivability for the patients rather than
diagnosis either in malignant stage. If the tumor is detected in the chronic stage, the possibility of survival for the patient is
very less. Furthermore, the tumor forecasted in the premature stage will increase the survival rate of the patient based on
155. appropriate medication and treatment. Currently, the forecast of pancreatic tumor in the premature stage focuses on
attributed based image analysis of Magnetic Resonance Imaging (MRI). The MRI pancreatic images obtained from MRI
scan forms the source of images to detect the pancreatic tumors at premature stage. A distinct detection method for 844-848
identification of pancreatic tumors using image texture characters is proposed in this work. The statistical evaluation is
done using MATLAB. Automated detection is done using Bacterial Foraging Algorithm (BFA) and the outcomes are
compared with the results obtained from images which are kept for training, testing and validation which depend on
template matching scheme.

Keywords: Pancreatic cancer, Image retrieval, big data, Bacterial Foraging Algorithm, MRI scans images.
References:
1. Padmasheela keshvan, Dr.R.Anandan, R.Balakrishna, “Segmentation Of Pancreatic Tumor Using Region Based Active Contour”, Journal of
Advanced Research in Dynamical and Control Systems (JARDCS), Spl. Issue (04), June 2017.
2. "What is Cancer? Defining Cancer", National Cancer Institute. National Institutes of Health. 7 March 2014. Retrieved 5, December 2014.
3. Wolfgang CL, Herman JM, Laheru DA, Klein AP, Erdek MA, Fishman EK, Hruban RH, "Recent progress in pancreatic cancer", CA: A Cancer
Journal for Clinicians 63 (5), September 2013.
4. Vincent A,Herman J, Schulick R, Hruban RH, GogginsM,"Pancreaticcancer", Lancet 378 (9791):607–20, August 2011.
5. "Can pancreatic cancer be prevented?" American Cancer Society, 11 June 2014. Retrieved 13 November 2014.
6. Bardou M, Le Ray I ,"Treatment of pancreatic cancer: A narrative review of cost-effectiveness studies". Best practice & research. Clinical
gastroenterology 27(6): 881–92, December 2013.
7. Agarwal B, Correa AM, Ho L,”Survival in pancreatic carcinoma based on tumor size Pancreas”, 2008
8. C. Doulaverakis et al., “Panacea, a semantic-enabled drug recommendations discovery framework,” J. Biomed. Semant., vol. 5, p. 13, 2014.
9. M. Dumontier and N. Villanueva-Rosales, “Towards pharmacogenomics knowledge discovery with the semantic web,” Briefings in bioinformatics,
vol. 10, no. 2, pp. 153–163, 2009.
10. A. Ben Abacha and P. Zweigenbaum, “Medical question answering: translating medical questions into sparql queries,” in Proceedings of the 2nd
ACM SIGHIT. ACM, 2012, pp. 41–50.

Authors: S.Govindarajulu, B.Doss, T.Naresh


Paper Title: Design and implementation of High Performance CMOS Latch Designs in VDSM Technology
Abstract: In this work, 3 high performance, low value and strong latches area unit projected in sixty five nm CMOS
VDSM (very deep sub micron) Headway. The predicted catches place unit absolutely merciless toward brief insufficiencies
at their interior focus focuses and yield focuses free of the period of the CMOS semiconductor. The anticipated locks bear
brief blames at any rate the force of the putting iota. The predicted catches supply high pace, higher reliableness to brief
deformities with diminishing expenses concerning force and area.

IndexTerms: CMOS, PDP, VDSM (Very Deep sub micron), performance, latch of the static nature, reliability of the
circuit.

References:
30. Haiqing Nan and Ken Choi high overall performance, Low fee, and sturdy smooth errors Tolerant Latch Designs for Nanoscale IEEE
TRANSACTIONS ON CIRCUITS AND structures—I: ordinary PAPERS, VOL. Fifty nine, NO. 7, JULY 2012 PP1445-1456.
31. M. Omana, D. Rossi, C. Metra, "Lock Susceptibility toTransient Faults and New Hardening method", IEEE Trans. On Comp., vol. 56, no nine, pp.
1255-1268, Sept. 2007
156. 32. M. Nicolaidis, R. Perez, and D. Alexandrescu, "Insignificant effort enormously liberal set up cells using blocking off investigation transistors," in
Proc. IEEE VLSI check Symp., 2008, pp. 371–376. 849-852
33. Calin T., Nicolaidis M., Velazco R., "disappointed Hardened memory layout for Submicron CMOS technology", thirty third Int. Atomic and space
Radiation effects conference, July 1996, Indian Wells, CA
34. L. Rockett, "A SEU Hardened CMOS information Latch layout", IEEE Trans. On Nuclear Sc., vol. NS-35, n° 6, Dec. 1988, pp. 1682-1687.
35. S. Whitaker, J. Canaris, and k. Liu, "SEU Hardened reminiscence Cells for a CCSDS Reed Solomon Encoder", IEEE Trans. On Nuclear Sc., vol. NS-
38, n° 6, Dec. 1991, pp. 1471-1477.
36. D. Bessot, R. Velazco, "shape of SEU-Hardened CMOS memory Cells: The HIT mobile", proceedings 1994 RADECS conference, pp. 563-570.
37. M. Omana, D. Rossi, C. Metra, "Novel transient Fault Hardened Static Latch", Proc. Eighteenth worldwide take a look at conference, pp. 886-892,
2003.
38. M. Omana, D. Rossi, C. Metra, "Lock Susceptibility to transient Faults and New Hardening technique", IEEE Trans. On Comp., vol. Fifty six, no 9,
pp. 1255-1268, Sept. 2007.
39. P. Hazucha, T. Karnik, S. Walstra, B. A. Bloechel, J. W. Tschanz, J. Maiz, ok. Soumyanath, G. E. Dermer, S. Narendra, V. De, and S. Borkar,
"Estimations and exam of SER-tolerant trap in a ninety-nm twofold VT CMOS system," IEEE J. Strong country Circuits, vol. 39, no. Nine, Pp. 1536–
1543, Sep. 2004.
40. M. Omana, D. Rossi, and C. Metra, "world class beautiful catches," IEEE Trans. Comput., vol. 59, no. 11, pp. 1455–1465, 2010.
41. S. Lin, H. Yang, and R. Luo, "Brisk sensitive blunder tolerant capture and flip-flop structure for numerous VDD circuit," in Proc. IEEE Comput. Soc.
Annu. Symp. Enormous Scale Integr. (ISVLSI'07), pp. 273–278.
42. M. Fazeli, A. Patooghy, S. G. Miremadi, and A. Ejlali, "records extra: A energy-cautious green SEU-tolerant lock plan for vital sub-micron kinds of
progress," in Proc. IEEE/IFIP Int. Conf. Stable Syst. Netw., Jun. 2007, pp. 276–285.
Authors: Mohasin B. Tamboli, Nageswara Rao Moparthi
Paper Title: Various Techniques used in Building Intrusion Detection System
Abstract: The greatest difficult issue facing network operators nowadays is cyber-attacks identification, because of an
intensive amount of susceptibilities in computer systems and power of attackers. NIDS contributes crucial role in defensive
computer networks. Though, there are considerations relating to the feasibleness and property of current approaches once
featured with the strain of contemporary networks. Additional notably, these considerations relate to the increasing levels
of needed human interaction and also the decreasing levels of speech act conviction. within the analysis, a customary
epistemology technique is employed supported the complete accumulation of fifteen analysis papers out of a considerable
gathering of analysis papers distributed in workshops, symposiums, meetings, and journals.

157. Keywords: deep learning, KDD, neural networks, network security, unsupervised learning etc.
853-858
References:
1. IDS,http://shodhganga.inflibnet.ac.in/bitstream/10603/25883/10/10_chapter%201.pdf [online]
2. Luan Huy Pham et al.,” A Quantitative Risk Assessment Framework for Adaptive Intrusion Detection in the Cloud”, the 2nd IEEE Workshop on
Security and Privacy in the Cloud, pp. 1-9.
3. Udaya Suriya Rajkumar et al.,” Detecting and Revocation the Compromised Node in Zone - Based Wireless Sensor Network Using a Two Stage
Approach”, 2014 IEEE, pp. 1-7.
4. Bisyron Wahyudi Masduki et al.,” Leverage Intrusion Detection System Framework For Cyber Situational Awareness System”, 2017 International
Conference on Smart Cities, Automation & Intelligent Computing Systems Yogyakarta, Indonesia, November 08-10, 2017, pp. 1-6.
5. Rishabh Jamar et al.,” E-Shield: Detection and Prevention of Website Attacks”, 2017 2nd IEEE International Conference on Recent Trends in
Electronics Information & Communication Technology (RTEICT), May 19-20, 2017, pp. 1-5.
6. Wei Wang et al.,” HAST-IDS: Learning Hierarchical Spatial-Temporal Features Using Deep Neural Networks to Improve Intrusion Detection”, 2017
IEEE, pp.1-15.
7. Weijun Zhu et al.,” An Intrusion Detection Algorithm for Wireless Networks Based on ASDL”, IEEE/CAA Journal of Automatica Sinica, vol. 5, no.
1, January 2018, pp. 1-16.
8. Aswathy Balakrishnan et al.,” A novel anomaly detection algorithm for WSN”, 2015 Fifth International Conference on Advances in Computing and
Communications,” pp. 1-4.
9. Lyes Bayou et al.,” Towards a CDS-Based Intrusion Detection Deployment Scheme for Securing Industrial Wireless Sensor Networks,” 2016 11th
International Conference on Availability, Reliability and Security, pp. 1-10.
10. Snehal Bhagat et al.,” Classification and Determination of Physical Intrusion using Wireless Sensor Networks”, IEEE – 35239, pp.1-5.
11. Huynh Thi Thanh Binh et al.,” Heuristic Algorithm for finding Maximal Breach Path in Wireless Sensor Network with Omnidirectional
Sensors”,pp.1-6.
12. Okan Can et al.,” A Survey of Intrusion Detection Systems in Wireless Sensor Networks”, 2015 IEEE, pp. 1-6.
13. Mohsen Estiri et al.,” A Game-theoretical Model for Intrusion Detection in Wireless Sensor Networks”, pp.1-5.
14. Christiana Ioannou et al.,” The Impact of Network Layer Attacks in Wireless Sensor Networks”, 2016 International Workshop on Secure Internet of
Things, pp. 1-9.
15. Gauri Kalnoor et al.,” Preventing Attacks and Detecting Intruder for Secured Wireless Sensor Networks”, IEEE Wisp NET 2016 conference, pp.1-6.
16. Gauri Kalnoor et al.,” QoS based Multipath Routing for Intrusion Detection of Sinkhole Attack in Wireless Sensor Networks”, 2016 International
Conference on Circuit, Power and Computing Technologies, pp.1-6.
17. Mehrsan Javan Roshtkhari et al.,” Online Dominant and Anomalous Behavior Detection in Videos”, 2013 IEEE Conference on Computer Vision and
Pattern Recognition, pp. 1-8.
18. Dawei Wang et al.,” A Hierarchical Pattern Learning Framework for Forecasting Extreme Weather Events”, 2015 IEEE International Conference on
Data Mining, pp.1-6.
19. Shiyao Wang et al.,” Tightly-coupled Convolutional Neural Network with Spatial-temporal Memory for Text Classification”, 2017 IEEE, pp.
1-7.
20. Teresa F. Lunt et al.,” Knowledge-Based Intrusion Detection”, pp.1-6.
Authors: Ramachandran V G, M Afshar Alam, Sherin Zafar and Siddhartha Sankar Biswas
An Implementation of ANN through Data Mining using Regression Analysis and Clustering for Prediction of
Paper Title:
Irreversible Dementia
Abstract: Even though, new technological era is making our life more comfortable and most modern super-fast lifestyle,
it also gifted us with a lot of irreversible health complications.With the emergence of Bio informatics which made the
medical field to change the diagnosis procedures from a“guessing and prophecyof facts”to digital confirmations. This has
not only shortened the effort of Doctors and Medic-Technicians, but alsoabridged the death rate and early detection of
diseases with timely and correct management by quashing the complexities. In order to sustain our newer lifestyle; a
fortuitous occurring of irreversible diseases like Alzheimer’sdisease can be anticipated at its early stages using Datamining
technique so that which can be condensed or evaded before it could swallow much. This need to have worked out over
various Knowledge Discovery Technics like Regression Analysis, Clustering using multi layered Artificial Neural
Networks (ANN). Due to complex structure, [4]long training time, and uneasilyexplicable representation of results and
incomprehensible results,generally ANNis not being used in datamining; still, ANN have the competency of high
acceptance over noisy data and high accuracy when used in data mining. As the ANN implemented by using the
methodology of Neurons in our human brain, it exists a brilliant tool in Datamining.

158. References:
1. Automatic Speech analysis to assess the patients who seems tohave a chances of pre-dementia or Alzheimer’s disease. Monitoring, 1(1), 112–124.
https://www.elsevier.com/ Authors: König, A., Satt, A., Sorin, A., Hoory, R., Toledo-Ronen, O., Derreumaux, A.,David, R. (2015). 859-861
DOI:10.1016/j.dadm.2014.11.012
2. Content analysis for audio classification and segmentation, Published in: IEEE Transactions on Speech and Audio Processing (Volume: 10, Issue: 7,
Oct 2002), Page(s): 504 – 516, DOI: 10.1109/TSA.2002.804546.
3. Application of New Adaptive Higher Order Neural Networks in Data Mining, 2008 International Conference on Computer Science and Software
Engineering, 2-14 Dec. 2008, IEEE DOI: 10.1109/CSSE.2008.897.
4. Neuron-adaptive higher order neural-network models for automated financial data modelling, IEEE Transactions on Neural Networks (Volume: 13,
Issue: 1, Jan 2002), Page(s): 188 – 204 07 August 2002 DOI: 10.1109/72.977302
5. IEEE Transactions on Neural Networks (Volume: 6, Issue: 2, Mar 1995), Page(s): 422 – 431, Mar 1995 DOI: 10.1109/72.363477.
6. High-order neural network structures for identification of dynamical systems, IEEE Transactions on Neural Networks (Volume: 6, Issue: 2, Mar
1995), Page(s): 422 – 431, Mar 1995, DOI: 10.1109/72.363477.
7. Neural networks in data mining, 2016 2nd International Conference on Industrial Engineering, Applications and Manufacturing (ICIEAM), 19-20
May 2016, IEEE DOI: 10.1109/ICIEAM.2016.7911596.
8. The performance comparison of Multiple Linear Regression, Random Forest and Artificial Neural Network by using photovoltaic and atmospheric
data, 2017 14th International Conference on Engineering of Modern Electric Systems (EMES), IEEE DOI: 10.1109/EMES.2017.7980368.
9. Data Mining on Dataset containing Prostate Cancer details Using Artificial Neural Networks, (Kenneth Revett, 2006 8th Seminar on Neural Network
Applications in Electrical Engineering), 25-27 Sept. 2006, IEEE DOI: 10.1109/NEUREL.2006.341201 https://www.alz.org/
10. A Configurable Deep Network for high-dimensional clinical trial data Jim O' Donoghue; Mark Roantree; Martin Van Boxtel .2015 International Joint
Conference on Neural Networks (IJCNN) Year:2015 Page :1–8,IEEEDOI.10.1109@IJCNN.2015.7280841.
Authors: Artikova Muazzam
Paper Title: Image Constrict By The Wavelet Shrink
Abstract: The problem of effective compression and transmission of images remains one of the most important in the
field of multimedia technologies and is very promising in recent years. The article attempts to give its own interpretation of
this problem and to analyze the features of the existing methods of wavelet transform, as well as to present software
designed for compression of images for their compact storage and transmission through communication channels at
maximum speed.
159. Keywords: wavelet compression, compression algorithm, image compression, compression ratio, Fourier transform,
Daubechies wavelets. 862-864

References:
1. Daubechies I. Ten Lectures on Wavelets (Philadelphia: SIAM, 1991).
2. Grossman, A., Morle J. Decomposition of Hardy functions into square integrable wavelets of constant shape // SIAM J. Math. Anal. – 1984. P.
3. Astafieva N.M. Wavelet analysis: the basics of the theory and examples of application // UFN. - 1996. - V. 166, № 11. - P. 1145–1170.
4. Demin I.M., Ivanov OV, Nechitaylo V.A. Wavelets and their use // UFN. - 2001. - V. 171, № 5. - P. 465–501.
5. Donoho D.L., Vetterli M., DeVore R.A. and Daubechies I. Data Compression and Harmonic Analysis. — 1998, July 9.
6. Robi Polikar. The Engineer's Ultimate Guide to Wavelet Analysis. The Wavelet Tutorial. [http://www.public.iastate.edu/~rpolikar/
WAVELETS/WTtutorial.html].
7. Davydov A.V. Wavelet Transforms [http://geoin.org/wavelet/index.html]
8. Vatolin D.S. Image compression algorithms. Moscow 1999. [http://lib.ru/TECHBOOKS/ALGO/VATOLIN/algcomp.htm].
Authors: Burdina Anna Anatolyevna, Moskvicheva Natalia Valerevna, Melik-Aslanova Narmina Oktay
Paper Title: Assessment of The Efficiency of Different Forms of Financing
Abstract: The study analyzes various criteria and forms for assessing the effectiveness of financing the activities of
enterprises. A methodological toolkit has been developed for the comprehensive assessment of the effectiveness of various
forms of financing the activities of enterprises, taking into account the significance of criteria. The following criteria are
considered: tax savings on income tax excluding the time factor, cost of the i-th source of attraction, economic value added,
increase in return on equity, the profitability of investment capital, net present value.

Keywords: investment, economic value added, return on equity, return on investment capital, net present value, equity
offering, bonded loan, credit, leasing.

References:
1. Burdina A.A. Methodological aspects of making management decisions in the field of pricing and product range optimization//Vestnik Moskovskogo
Aviacionnogo Instituta [Bulletin of the Moscow Aviation Institute]. – М.: МАI, eISSN: 0869-6101, 2006 – 116-124p.
2. Kandrashina E.A. Finansovyi menedjment: Uchebnik [Financial Management: Textbook] / E.A. Kandrashina. – М.: Izdatelsko-torgovaya korporaciya
160. «Dashkov&C°», 2017. – 220 p.
3. Moskvicheva N.V., Melik-Aslanova N.O. Analysis of the features of the modernization of the production capacity of enterprises of the aviation 865-871
industry /Melik-Aslanova N.O., Moskvichova N.V.//Vestnik Moskovskogo Aviacionnogo Instituta [Bulletin of the Moscow Aviation Institute]. -
2015.-Vol..22.-No.4.-p.208-213.
4. Burdina А.А., Melik-Aslanova N.O. Toolkit for estimating the costs of the investment component of the industrial policy of enterprises in the
aviation industry/ // Vestnik Rybinskoi gosudarstvennoi aviacionnoi tekhnologicheskoy akademii im. P.A. Solovieva. [Bulletin of Rybinsk State
Aviation Technical Academy named after P.A. Solovyov]. - 2015. -No. 3 (34). - P. 179-183.
5. Burdina А.А. Methodological aspects of making management decisions in the field of pricing and product range optimization//Vestnik Moskovskogo
Aviacionnogo Instituta [Bulletin of the Moscow Aviation Institute]. – М.: МАИ, eISSN: 0869-6101, 2006 – 116-124p.
6. Burdina А.А., Moskvicheva N.V., Melik-Aslanova N.O., Bondarenko A.V. Planning investment costs in industrial enterprises// Ekonomika i
predprinimatelstvo [Economics and Entrepreneurship]. - 2017. No.3-1 (80-1). P. 589-592.
7. Troshin A.N., Burdina A.A., Moskvicheva N.V., Nikulina E.N., Tarasova E.V., Rogulenko T.M. Mechanism to analyze economic reliability of the
innovational potential of aircraft enterprises//International Journal of Applied Business and Economic Research. 2016. Vol. 14. No. 14. P. 747-765.
8. Bodiako A.V., Ponomareva S.V., Rogulenko T.M., Karp M., Kirova E., Gorlov V.V., Burdina A.A. The goal setting of internal control in the system
of project financing// International Journal of Applied Business and Economic Research. 2016. Vol. 14. No.15. P. 11045-11063.
9. Official site of the United Aircraft Building Corporation [Electronic resource]. – https://www.uacrussia.ru/ru/
10. PJSC Tupolev official site [Electronic resource]. – http://www.tupolev.ru/;
11. Web edition: "Center for Disclosing Corporate Information" [Electronic resource]. – http://www.e-disclosure.ru/portal/files.aspx?id=11474&type=2

Latypova Rida Marsovna, Samirkhanova Gulkay Khaidarovna, Suleymanova Luiza Raufovna, Safiullina
Authors:
Luisa Michailovna, Absalyamova Liliya Faritovna
The Hungarian Scientist V. Prőhle’s Researches on the Bashkir Language as a Valuable Source for the
Paper Title:
Exploratation of the History of the Language
Abstract: The article describes the results of the Hungarian savant Vilmos Prőhle’s scientific research. At the beginning of
XX century he provided full information about the phonetic, grammatical and lexical peculiarities of the Bashkir language
on a European level. The analysis of the work demonstrates V. Prőhle’s deep knowledge about the specificity of the
learning language. This work is the first systemic grammar of the Bashkir language; it plays an important role in the history
of language (ed.).

Keywords: the Bashkir language; a written source; the history of language; phonetics; vocabulary; grammar.

References:
1. Aznabaev, Psyanchin 1976 – Аҙнабаев Ә. М., Псәнчин В. Ш. Башҡорт теленең тарихи морфологияһы: Сағыштырма-тарихи тикшереү. Өфө,
1976. 176 б. (Азнабаев А. М, Псянчин В. Ш. Историческая морфология башкирского языка: Сравнительно-историческое исследование. Уфа,
1976. 176 с.) {Aȥnabaev Ә. M., Psәnchin V. Sh. Bashqort teleneƞ tarixi morfologiyaһy: Sagyshtyrma-tarixi tiqsherev. Ӧfö, 1976. 176 b. (Aznabaev
A. M, Psyanchin V. Sh. Istoricheskaja morfologija bashkirskogo jazyka: Sravnitelno-istoricheskoje issledovanije. Ufa, 1976. 176 s.)} Aznabaev A.
M., Psyanchin V. Sh. The Historic Morphology of the Bashkir Language: the Experience of the Comparative-Historical Research. Ufa, 1976. P. 176.
2. Georgi 1799 – Георги И.Г. Описание всех обитающих в Российском государстве народов. СПб., 1799. {Georgi J. G. Opisanie vseh
obitajushchih v Rossijskom gosudarstve narodov. SPb., 1799.} Georgi J. G. Description of all peoples living in the Russian state. SPb., 1799.
161. 3. Dmitriev 1948 – Дмитриев Н.К. Башҡорт теленен грамматикаһы. – Өфө, 1948. – 300 б. (Дмитриев Н. К. Грамматика башкирского языка.
Уфа, 1948. 300 с.) {Dmitriev N.K. Bashqort teleneƞ grammatikaһy. – Ӧfö, 1948. – 300 b. (Dmitriev N. K. Grammatika bashqirskogo jazyka. Ufa,
1948. 300 s.)} Dmitriev N. K. The Grammar of the Bashkir Language. M., 1948. P. 300. 872-881
4. Zainullin 2002 –3әйнуллин М. В. Хәҙерге башҡорт әҙәби теле: морфология Өфө, 2002. 388 б. (Зайнуллин М. В. Современный башкирский
литературный язык: морфология. Уфа, 2002. 388 с.) {3әjnullin M. V. Xәȥerge bashqort әȥәbi tele: morfologija. Ӧfö, 2002. 388 b. (Zajnullin M. V.
Sovremennyj bashkirskij literaturnyj yazyk: morfologiya. Ufa, 2002. 388 s.)} Zainullin M. V. The Modern Bashkir Literary Language: Morphology.
Ufa, 2002. P. 38.
5. Zaripov 1971 – Зарипов Р.Ф. Категория падежа в башкирском языке. Автореферат. дисс. ... канд. филол. наук. Уфа, 1971. 23 c. {Zaripov R. F.
Kategorija padezha v bashkirskom jazyke. Avtoreferat. diss. ... kand. filol. nauk. Ufa, 1971. 23 c.} Zaripov R.F. The Category of Case in the Bashkir
Language: Dissertation on Competition of the Scientific Degree of Candidate of Philology. Ufa, 1971.
6. Ishberdin etc. 1993 – Ишбирҙин Э. Ф., Ғәләүетдинов И. Ғ., Халиҡова Р. Х. Башҡорт әҙәби теленең тарихы. Өфө, 1993. 317 б. (Ишбердин Э.
Ф., Галяутдинов И. Г., Халикова Р. Х. История башкирского литературного языка. Уфа, 1993. 317 с.) {Ishbirȥin E. F., Gәlәüetdinov I. G.,
Xaliqova R. X. Bashqort әȥәbi teleneƞ tarixy. Ӧfö, 1993. 317 b. (Ishberdin E. F., Galyautdinov I. G., Halikova R. H. Istorija bashkirskogo
literaturnogo yazyka. Ufa, 1993. 317 s.)} Ishberdin E. F. The History of the Bashkir Literary Language. – Ufa, 1993. P. 317.
7. Ishbulatov 2000 – Ишбулатов Н. Х. Башҡорт теле һәм уның диалекттары. Өфө, 2000. 212 б. (Ишбулатов Н. Х. Башкирский язык и его
диалекты. Уфа, 2000. 212 с.) {Ishbulatov N. X. Bashqort tele һәm unyƞ dialekttary. Ӧfö, 2000. 212 b. (Ishbulatov N. X. Bashkirskij jazyk i ego
dialekty. Ufa, 2000. 212 s.)} Ishbulatov N Kh. Ishbulatov N. Kh. The Bashkir Language and Its Dialects. Ufa, 2000. P. 212.
8. Karimova, Latypova 2016 – Каримова Р. Н., Латыпова Р. М. Письменные источники по башкирскому языку конца XIX – начала XX века //
Урало-алтайские исследования. 2016. № 1 (20). С. 41-52. {Karimova R. N., Latypova R. M. Pismennye istochniki po bashkirskomu jazyku kontsa
XIX – nachala XX veka // Uralo-altajskie issledovaniya. 2016. № 1 (20). S. 41-52} Karimova R. N., Latypova R. M. Written sources of the late XIX -
early XX of the Bashkir language // Uralo-altajskie issledovaniya. 2016. № 1 (20). S. 41-52.
9. Kuzeev 1974 – Кузеев Р. Г. Происхождение башкирского народа: этнический состав. История расселения. М, 1974. 571 с. {Kuzeev R. G.
Proisxozhdenie bashkirskogo naroda: etnicheskij sostav. Istorija rasselenija. M., 1974. 571 s.} Kuzeev R. G. The Origin of the Bashkir People: the
Ethnic Composition, the History of Settlement. M., 1974. P. 16-30.
10. Kunafin 1991 – Ҡунафин Ғ. С. Мәғрифәтсе һәм әҙип М. Өмөтбаев. Монография. Өфө, 1991. 256 б. (Кунафин Г. С. Просветитель и поэт.
Монография. Уфа, 1991. 256 с.) {Qunafin Ғ. S. Mәgrifәtse һәm әȥip M. Ӧmötbaev. Monografija. Ӧfö, 1991. 256 b. (Kunafin G. S. Prosvetitel` i
poet. Monografija. Ufa, 1991. 256 s.)} Kunafin G.S. Enlightener and Poet M. Umetbaev: Monograph. – Ufa, 1991. – P. 164.
11. Latypova 2013 − Латыпова Р. М. Письменные источники конца XIX – начала XX веков и их влияние на формирование башкирского
литературного языка на основе русской и латинской график: Монография. Сибай, 2013. 208 с. {Latypova R. M. Pismennye istochniki kontsa
XIX – nachala XX vekov i ih vliyanie na formirovanie bashkirskogo literaturnogo yazyka na osnove russkoj i latinskoj grafik: Monographija. Sibaj,
2013. 208 s.} (Latypova R.M. Written sources of the late XIX - early XX centuries and their influence on the formation of the Bashkir literary
language on the basis of Russian and Latin scripts: Monograph. Sibay, 2013. 208 p.)
12. Latypova 2018 − Rida Latypova, Gulkay Samirkhanova, Nailya Lasynova, Zulfiya Akhmetzadina, Liliya Absalyamova. The role of abc books and
dictionaries at the end of XIX – the beginning of XX century in the history of the Bashkir literary language // SHS Web Conf. Volume 50, 2018 The
International Scientific and Practical Conference “Current Issues of Linguistics and Didactics: The Interdisciplinary Approach in Humanities and
Social Sciences” (CILDIAH-2018). Article Number 01153. Number of page(s) 6. DOI https://doi.org/10.1051/shsconf/20185001153. Published
online 12 October 2018
13. Pallas 1786 – Паллас П. С. Путешествие по разным местам Российского государства. СПб., 1786. {Pallas P. S. Puteshestvie po razny`m mestam
Rossijskogo gosudarstva. SPb., 1786.} Pallas P. S. Travel to different places of the Russian state. SPb., 1786.
14. Pallas 1787 – 1789 − Паллас П. С. Сравнительные словари всех языков и наречий, собранные десницей Всевысочайшей особы. Т. I-II. СПб.,
1787-1789. {Pallas P. S. Sravnitelnye slovari vseh jazykov i narechij, sobrannye desnicej Vsevysochajshej osoby. T. I-II. SPb., 1787-1789.} Pallas P.
S. Comparative dictionaries of all languages and dialects collected by the hand of the most High person. V. I-II. SPb., 1787-1789.
15. Рröһlе 1903 − Рröһlе Vimos. Baskir nyelvtanulmanyok // Кеlеti Szemlе. T. IV. Вudapest, 1903. С. 194-214.
16. Рröһlе 1903 − Рröһlе Vimos. Baskir nyelvtanulmanyok // Кеlеti Szemlе. T. V. Вudapest, 1904. С. 228-271.
17. Uraksin, Ishbaev 1986 − Хәҙерге башҡорт теле. Педагогия институтының башланғыс кластар факультеты студенттары өсөн дәреслек / Ред.
Ураҡсин З. Ғ., Ишбаев К. Ғ. Өфө, 1986. 400 б. (Современный башкирский язык: Для студентов факультета начального образования
педагогических институтов /Ред. Ураксин З. Г, Ишбаев К. Г. Уфа, 1986. 400 с.) The Modern Bashkir Language: Manual for the students of the
Faculty of Primary School of Pedagogical Institute / Red. Uraksin Z. G, Ishbaev K. G. Ufa, 1986. 400 p.
18. The Modern Kazakh Language 1962 − Современный казахский язык: Фонетика и морфология. – Алма-Ата, 1962. – 452 с. {Sovremennyj
kazaxskij jazyk: Fonetika i morfologija. – Alma-Ata, 1962. – 452 s. } The Modern Kazakh Language: Phonetics and Morphology. – Almaty, 1962. –
P. 159.
Authors: G Dilli Babu, D Siva Sankar, K. Sivaji Babu
Paper Title: Experiment on Optimization of Robot Welding Process Parameters
Abstract: Resistance spot welding plays an important role in the manufacturing industry especially in the automobile
sector. There is a lot of research work in the area of manually spot welding process and optimization of spot welding
parameters. Currently there is more demand on robot spot welding process in the manufacturing unit. But only few research
works is going on in the area of robot spot welding process and optimization of robot welding parameters. The present
study gives an experimental investigation on robot resistance spot welding. Optimum robot spot welding parameters were
identified by using Taguchi design of experiments approach. Also the results are analyzed by using Analysis of Variance
ANOVA.

Keywords: Robot, Spot Welding, optimization.

References:
1. AravinthanArumugam, MohdAmizi Nor “Spot Welding Parameter optimization To Improve Weld Characteristics For Dissimilar Metals” Intern. J.
Sci. & Technol. Research Vol. 4, no 01, pp. 2015
2. Zoha Nasir, Dr.M.I.Khan, “Resistance spot welding and optimization techniques used to optimize its process parameters” Intern. Research J. of Engg.
& Technol. (IRJET) Vol.03 no. 05 pp.2016
162. 3. T. Kim, H. Park and S. Rhee “optimization of welding parameters for resistance spot welding of TRIP steel with response surface methodology”
Intern. J. of Prod. Research, Vol. 43, no. 21, 1 November 2005, 4643–4657
4. ShyamjithUralath, Hemant Raj Singh, “Selection and Applications of Automatic Spot Welding Methods” IOSR J. of Mech. & Civil Engg. Vol. 11,
882-885
no. 4. pp. 50-54, 2014
5. Peter Puschner, Marcus Klein, Gerhard Kolzer “Fully Automatic Spot Welding System for Application in Automotive Industry” Vol. 20(4), pp. 383-
390, 2015.
6. ManojRaut and VishalAchwal “optimization of Spot Welding Process Parameters For Maximum Tensile Strength” intern. J. of Mech. Engg. &
robotic Res. Vol. 3, no. 4, Oct. 2014
7. Soo Woong Park and Suck Joona “A New Current Measurement Method in Resistance Spot Welding” IEEE Transactions on Instrumentation &
Measurement. Vol. 39, Number. 5, pp. 1990
8. M A Al-Jader, J D Cullen, N athi and A I Al-Shamma “Spot Welding Theoretical and Practical investigations of the Expulsion occurrence in Joining
Metal for the Automotive Industry” 2nd Intern. Conference on Dvlpmt. in Systems Engg. pp.2009.
9. Ashwane Kumar Srivastava, Er. Sanjeev Kumar and Er. D.P Singh “Robotic &Automated Welding” Intern. J. of Engg. Research & Management
Technol. Vol.2, no.3, pp. 2015. ISSN: 2348-4039
10. Arjun Kumar, Dr. Sanjeev Sharma, “Parameter Range Validation For Resistance Spot Welding” IJARIIE-ISSN(0)- Vol-3 no.3, pp. 2395-4396, 2017.
11. Anurag Tewari, EktaRawat, “A Review Paper on optimization of Process Parameter of Resistance Spot Welding” Intern. Journal for Research in
Applied Sci. &Engg. Technol. (IJRASET) Vol. 5, no.4, pp.2017.
12. L. Boriwal, R. M. Sarviya and M. M. Mahapatra “Modelling the resistance spot welding of galvanized steel sheets using Fuzzy logic” Intern. J. of
Latest Trends in Engg. & Technol. (IJLTET) Vol. 5 no. 3, pp. 2015
13. Wen-Ren Yang and Chau-Shing Wang “Current Measurement of Resistance Spot Welding Using DSP” Tamkang Journal of Sci. &Engg. Vol. 14,
Number. 1, pp. 3338 (2011)
Authors: Sunita Usturge-Nandgave, Dr. T. Pavankumar
Paper Title: Cross Layer Security with Stable Path Selection (CSSPS) Mechanism in UWB MANET
Abstract: MANET doesn't need any framework, it's miles multi-jump system of cell hubs. every hub can stream openly at
any heading. we are equipped for utilize remote contraptions which comprise of versatile, PDA, tablet, pc and so forth
wherever whenever. MANET with portability trademark has severa challenges, which include dynamic topology, data
163. transfer capacity imperatives and limited battery power, etc. very tremendous Band MANET has applications in assortment
of fields alongside unreasonable transmission capacity remote network for houses and workplaces. UWB can be connected 886-891
in recreation and crisis administrations, military interchanges. UWB MANET hubs are dynamic and each hub
demonstrations like a switch, due to changing over topology UWB MANET is helpless to noxious assault. Directing
ambush will end up one of the exceptional problem in UWB MANET various steering convention SADOV calm AODV,
SAOMDV loose AOMDV are throughout everyday life. some of these conventions have boundaries you may verify course
anyway not verbal trade data. Proposed procedure will give both steering and correspondence security. This work of art
manages a top to bottom assessment of system as far as parcel misfortune proportion, throughput and diminished steering
overhead choice to directing assaults.

Keywords: UWB MANET, routing attack, AODV (Ad-hoc On Demand Distance Vector), grayzone, SNF, NCR, RSS.

References:
1. Nidhi Lal, "Acknowledgment of threatening center factor lead via techniques for I-Wathdog information in MANET with DSDV guiding
association", science Direct, Procedia software program program designing forty nine (2015) 264 – 273.
2. Mr. Suketu D Nayak and Prof. Sunil J. Soni, "Confirming AODV for MANETs using Message Condensation with thriller Key", January 2011,
https://www.researchgate.net/appropriation/261437510.
3. SUPERMAN: safety the usage of past coordinating for compact off the cuff frameworks IEEE trade on flexible Registering 2016.
4. Ali Mohamed E. Ejmaa1, (element, IEEE), " Neighbor-based absolutely unique Availability component guidance convention for portable especially
extraordinary device," IEEE get entry to 10, Vol No. four, pp. 8053-8064, June 2016.
5. Xin Ming Zhang. walk, "Neighbor consideration based probabilistic rebroadcast for decreasing coordinating overhead in compact adhoc
frameworks", the second one Australian records protection The government assembly 2004 (InfoSec 2004) November 2004.
6. Banoth Rajkumar, Dr. G. Narsimha, "agree with primarily based statement Denial for cozy Directing in MANET",2d international meeting on Astute
Registering, Correspondence and meeting (ICCC-2016), pp. 431-444, April 2016.
7. Anuj Ranaa, Vinay Ranab, Sandeep Gupta, "EMAODV: method to anticipate Collective attacks in MANET", fourth worldwide assembly on Eco-
32012fd371b2d8bbf6e5e631dc96cdaf Processing and Correspondence Frameworks, ICECCS 2015, October 2015.
8. Todd R. Andel, Alec Yasinsac, "affiliation Dependability and electricity aware Directing convention in Circulated remote structures", IEEE trades on
parallel and appropriated shape, vol. 23, NO. 4, April 2012.
9. Charles E. Perkins and Elizabeth M. Royer, "KNN Inquiry planning structures in MANET", IEEE Exchanges ON flexible Figuring, Vol. No. 13, No.
5, also can 2014.
10. Anirudhha Bhattacharya, "one-of-a-kind kinds of strikes in versatile ADHOC gadget: Aversion and assist strategies", branch of technological
bdd5b54adb3c84011c7516ef3ab47e54 and constructing basis of Designing, Saltlake, http://www.doc88.com/p-410724870368.html.
11. Arvind Dhaka, "lessen and darkish hollow attack identification using manage Parcels in MANETs", Elsevier, 11th global Multi-gathering on records
making ready 2015 (IMCIP-2015) Feburary 2015.
12. "Execution evaluation of AODV with Blackhole assault", global collecting strategies and fashions in technological
bdd5b54adb3c84011c7516ef3ab47e54 and Innovation, 2010.
13. Rutuji Jahavri, "DOS attacks in portable particularly delegated systems", 2nd global assembling on reducing side Registering and Correspondence
advancements, 2012 IEEE.
14. Li-Na Weng, Jie Yang "A move-layer soundness primarily based coordinating framework for extremely wideband frameworks", computer
Interchanges 33 (2010) 2185–2194
15. Arathy ok S, S Minesh C N, "An Epic tool for region of unmarried and network organized dark hollow attacks in MANET", worldwide Colloquium
in Ongoing Headway and good enough Inquires approximately in building, science and technology(RAEREST2016) technological
bdd5b54adb3c84011c7516ef3ab47e54 Direct.
16. Djamel DJENOURI, Nadjib BADACHE, "An research on protection issues in flexible specifically sure systems", February 2004, Labs des, systems
informatiques.
17. Ajay Jadhav and Eric E. Johnson, Senior detail, IEEE, "cozy community Directing conference", paper 941.
18. Mike Burmester, aspect, IEEE, Breno de Medeiros detail, IEEE, "On the safety of route Revelation in MANETs", IEEE Exchanges ON flexible
Processing, true duplicate had been given April 26, 2007; refreshed stroll 1, 2008.
19. Pawan Kumar Sharma, Vishnu Sharma, "evaluation On safety troubles In MANET Wormhole place and Anticipation", not unusual gathering on
Registering, Correspondence and Robotization (ICCCA2016), ISBN: 978-1-5090-1666-2/sixteen/$31.00 2016 IEEE.
Authors: Poojitha Bheemanapally, Madhubabu Pasula, Mahendran Botlagunta
Paper Title: Data is Oil for Startup Initiative in India
Abstract: India is one of the best place to initiate startups it is due to the fact that India is the second most populous
country and is equivalent to 17.74% of the total world population. Prior to invest money on startup it is good to analyze
business analytics about the startup. In this paper, we discuss startup in food sector. To identify a suitable food item for
startup in food sector, we used google trends to identify frequently searched food item by web users across India between
2004 and 2017. Data was retrieved on quarterly basis from various regions and R statistical package was used to determine
the statistical significance of the data. Results showed that, one keyword search unable to differentiate the difference in
search rank index between food items. On the other hand, multiple comparisons over one keyword data search showed two
different clusters, pizza and biryani form one cluster and dosa and idli form another cluster. Pizza and biryani cluster
showed higher search rank index over another cluster. Data visualization revealed that pizza, and biryani was the most
frequent search interests of the web users related to foods in India. Taken together, we believe that the pizza and biryani
business activities are flourishing and continue to flourish over other foods in India.

Keywords: Pizza, biryani, idli, dosa, food interests


164.
References: 892-896
1. “pizza pie - Memidex dictionary/thesaurus.” [Online]. Available: www.memidex.com/pizza-pie. [Accessed: 03-May-2018].
2. “History of pizza.” [Online]. Available: https://en.wikipedia.org/wiki/History_of_pizza . [Accessed: 05-Jul-2018].
3. R. Paroha, “McDonald & Dominos Entry in India.” [Online]. Available: https://www.scribd.com/doc/89921645/McDonald-Dominos-Entry-in-India.
[Accessed: 06-May-2018].
4. “The History of the pizza and how it reached the shores of every country in the world.” [Online]. Available:
https://www.indiatimes.com/culture/food/the-history-of-the-pizza-and-how-it-reached-the-shores-of-every-country-in-the-world-249428.html.
[Accessed: 05-May-2018].
5. “Biryani.” [Online]. Available: https://en.wikipedia.org/wiki/Biryani. [Accessed: 04-Jul-2018].
6. “Hyderabadi biryani.” [Online]. Available: https://en.wikipedia.org/wiki/Hyderabadi_biryani. [Accessed: 05-Jul-2018].
7. “Dosa.” [Online]. Available: https://en.wikipedia.org/wiki/Dosa. [Accessed: 08-Jun-2018].
8. “Idli.” [Online]. Available: https://en.wikipedia.org/wiki/Idli. [Accessed: 08-Jun-2018].
9. “List of Indian dishes.” [Online]. Available: https://en.wikipedia.org/wiki/List_of_Indian_dishes. [Accessed: 01-May-2018].
10. “Google Trends.” [Online]. Available: https://en.wikipedia.org/wiki/Google_Trends. [Accessed: 01-Jul-2018].
11. “Google Trends.” [Online]. Available: https://trends.google.com/trends/?geo=IN . [Accessed: 01-Jul-2018].
12. “What is Google Trends data — and what does it mean?” [Online]. Available: https://medium.com/google-news-lab/what-is-google-trends-data-and-
what-does-it-mean-b48f07342ee8. [Accessed: 06-Feb-2018].
13. A. McAfee and E. Brynjolfsson, “Big Data. The management revolution,” Harvard Buiness Rev., 2012.
14. “The Battle of Fast Food Chains: KFC & Pizza Hut Losing Out.” [Online]. Available: https://food.ndtv.com/food-drinks/the-battle-of-fast-food-
chains-kfc-pizza-hut-losing-out-1229661. [Accessed: 03-May-2018].
15. “Indian Pizza market offers a mouthwatering opportunity for investors.” [Online]. Available: https://www.franchiseindia.com/content/Indian-Pizza-
market-offers-a-mouth-watering-opportunity-for-investors.9128. [Accessed: 03-May-2018].
Authors: Aparna Bulusu, Sucharita V
Paper Title: Research on Machine Learning Techniques for POS Tagging in NLP
Abstract: Natural Language Processing is an emerging area with applications like speech recognition, sentiment analysis,
question answering systems, chat bots and the like. Current research is making heavy use of machine learning techniques
for NLP Tasks Machine Learning is a subset of Artificial Intelligence with techniques based heavily on statistical and
mathematical concepts. This paper attempts to list out the major categories of tasks under Natural Language Processing,
and understand the commonly used machine learning techniques for the said tasks. Empirical tests have been performed to
validate the findings of the literature survey and results are discussed.

Keywords: Natural Language Processing, Machine Learning, Brown Corpus, Classifiers, NLTK

References:
1. Collobert, Ronan, Jason Weston, Léon Bottou, Michael Karlen, Koray Kavukcuoglu, and Pavel Kuksa. "Natural language processing (almost) from
scratch." Journal of Machine Learning Research 12, no. Aug (2011): 2493-2537.
2. Kotsiantis, Sotiris B., I. Zaharakis, and P. Pintelas. "Supervised machine learning: A review of classification techniques." Emerging artificial
intelligence applications in computer engineering 160 (2007): 3-24.
3. Ratnaparkhi, Adwait. "A maximum entropy model for part-of-speech tagging." In Conference on Empirical Methods in Natural Language Processing.
1996
4. Brants, Thorsten. "TnT: a statistical part-of-speech tagger." In Proceedings of the sixth conference on Applied natural language processing, pp. 224-
231. Association for Computational Linguistics, 2000.
5. Nakagawa, Tetsuji, Taku Kudo, and Yuji Matsumoto. "Unknown Word Guessing and Part-of-Speech Tagging Using Support Vector Machines." In
165. NLPRS, pp. 325-331. 2001.
6. Schmid, Helmut, and Florian Laws. "Estimation of conditional probabilities with decision trees and an application to fine-grained POS tagging." In 897-900
Proceedings of the 22nd International Conference on Computational Linguistics-Volume 1, pp. 777-784. Association for Computational Linguistics,
2008.
7. Marquez, Lluis, Horacio Rodriguez, Josep Carmona, and Josep Montolio. "Improving POS tagging using machine-learning techniques." In 1999 Joint
SIGDAT Conference on Empirical Methods in Natural Language Processing and Very Large Corpora. 1999.
8. Kudo, Taku, and Yuji Matsumoto. "Chunking with support vector machines." In Proceedings of the second meeting of the North American Chapter of
the Association for Computational Linguistics on Language technologies, pp. 1-8. Association for Computational Linguistics, 2001.
9. Zhang, Tong, Fred Damerau, and David Johnson. "Text chunking based on a generalization of winnow." Journal of Machine Learning Research 2, no.
Mar (2002): 615-637.
10. Collobert, Ronan, and Jason Weston. "A unified architecture for natural language processing: Deep neural networks with multitask learning." In
Proceedings of the 25th international conference on Machine learning, pp. 160-167. ACM, 2008.
11. Navigli, Roberto. "Word sense disambiguation: A survey." ACM computing surveys (CSUR) 41, no. 2 (2009): 10.
12. Bender, Oliver Agirre, Eneko, and Philip Edmonds, eds. Word sense disambiguation: Algorithms and applications. Vol. 33. Springer Science &
Business Media, 2007
13. Màrquez, Lluís, Xavier Carreras, Kenneth C. Litkowski, and Suzanne Stevenson. "Semantic role labeling: an introduction to the special issue."
(2008): 145-159.
14. Carreras, Xavier, and Lluís Màrquez. "Introduction to the CoNLL-2005 shared task: Semantic role labeling." In Proceedings of the ninth conference
on computational natural language learning, pp. 152-164. Association for Computational Linguistics, 2005.
15. Franz Josef Och, and Hermann Ney. "Maximum entropy models for named entity recognition." In Proceedings of the seventh conference on Natural
language learning at HLT-NAACL 2003-Volume 4, pp. 148-151. Association for Computational Linguistics, 2003.
16. Marcus, Mitchell, Beatrice Santorini, and Mary Ann Marcinkiewicz. "Building a large annotated corpus of English: The Penn Treebank." (1993).
17. Loper, Edward, and Steven Bird. "NLTK: the natural language toolkit." arXiv preprint cs/0205028 (2002).
18. Kucera, Francis. "WN (1967). Computational analysis of present-day American English." Providence Brown UP.
Authors: Shanti.S A.V.N. Murty
Paper Title: The Impact of Financial Literacy on women in Several Districts of Andhra Pradesh
Abstract: Financial literacy plays an important role in the socio economic development of a country besides political and
legal. Women plays an important role in the economic development of the country. In India as 50% population are women
their contribution to the economic growth is a must. A women must be literate to be economically strong. Women's
education is essential for improving their status in the society and also to make them empower. The present study focuses
on the how different socio demographic factors influences the financial literacy of women in several district of Andhra
Pradesh.

Keywords: Literacy, Finance, Economic Growth.

166. References:
1. Chetan Singh and Raj Kumar(2017) ; “Financial literacy among Women – Indian Scenario; Universal Journal of Accounting and Finance;5(2):46-53, 901-906
2. AnshikaandDr. Anju Singla(2017) ; “Financial literacy in India – An Appraisal” ; 6th International Conference on Recent Trends in Engineering,
Science and Management ; ISBN: 978-93-86171-21-4 .
3. Mohammad Sirajuddin ; Satish Kumar . P (2017); ”A Study on Financial Literacy of Women in Hyderabad City (Telangana)” ; International Journal
of Trend in Scientific Research and Development ; Vol.2.
4. Subodh Kumar and Amit Kumar Gandhi(2017); “Financial Literacy: An Efficient Way to Manage Own Finances” ; P: ISSN NO.: 2394-0344.
5. Garima Baluja(2016) ; “Financial Literacy among Women in India – A Review”; Pacific Business Review International ; Vol. 9 Issue 4.
6. Thanvi Sebastian and Dr.MiddiAppalla Raju(2016); “A Study on the Financial Literacy of Professional Women in the District of Ernakulum, Kerala”;
International journal of technology enhancements and emerging engineering research; Vol.4 Issue 7; ISSN 2347-4289.
7. Neha Ramani Bhargava(2016); “A Study on Financial Literacy and Financial Education: An Overview of Scenario in India” ;Research Journal of
Management Sciences.
8. AkshitaArora(2016) ; “Assessment of Financial Literacy among Working Indian Women” Research Gate.
9. Lazar D and Chandrasekar B(2016); “Demographic Vs. Financial Literacy: A study among earning women in Pondicherry”; International Journal of
commerce and management research.
10. Abdul Haque and MehwishZulfiqar(2016) ; “Women’s Economic Empowerment through Financial Literacy, Financial Attitude and Financial
Wellbeing”; International Journal of Business and Social Science ; Vol.7 No.3.
11. Lavanya Rekha Bahadur(2015); “Financial literacy: The Indian Story”; World Journal of Social Sciences ; Vol.5 No.3; Pg.No.45-57.
12. Monika Dwivedi, Harsh Purohit, Divya Mehta and Sunita Grujar(2015);“Empowering Rural Households through Financial Literacy – Case study of
spectacular initiatives by PRADAN” ; Asian Journal of Multidisciplinary studies; Vol.3 Issue 11; ISSN 2321-8819.
13. K.Ramakrishna, A.Sudhakar(2015); “Financial Literacy Training: The Role of RUDSETIs;International Journal of Engineering and management
Research; Vol.5 Issue 2; ISSN 2250-0758.
14. Sumit Agarwal, YunquZhang(2015) ;“How does Financial Literacy Affect Mortgage Default?”.
15. Subha .M.V. and Shanmugha Priya. P(2014); “A study on the factors determining financial literacy of Households”; International Journal of
Advanced Information Science and Technology; Vol.22, No.22.
16. Priya Vasagadeker(2014); “A research paper on investment awareness among Indian Working Women with reference to Pune region” ; International
Journal of Science and Engineering Research; Vol. 5 Issue 6; ISSN 2229-5518.
17. Sumit Kumar and Md. Anees(2013); “ Financial literacy and education: Present Scenario In India” ; International journal of engineering and
management research; Vol.3 Issue 6; Pg.No. 83-87.
18. Radhika Dixit and MunmumGhosh(2013); “Financial Inclusion for Inclusive Growth of India – A Study Of Indian States” ; International journal of
business management and research; Vol.3 Issue 1; ISSN 2249-6920.
19. Lisa Xu and Bilal Zia(2012) ;“Financial literacy in the Developing World : An overview of Evidence with practical suggestions for the way forward”
;Policy Research Working Paper.
20. Annamaria Lusardi, Olivia S.Mitchess(2011); “The outlook for financial literacy”; Working Paper 17077.
21. Martha Klatt(2009) ; “An Assessment of Women’s financial literacy”; A Research paper Submitted in Partial Fulfillment of the Requirements for the
Master of Science Degree III, Training and Development.
22. Hussein A.Hassan Al Tamim and Al Anood Bin Kalli(2009); “Financial Literacy and Investment Decisions of UAE Investors” ; The Journal of Risk
Finance.
23. Sonia Marcolin and Anne Abraham(2006);“Financial literacy research: Current Literature and Future Opportunities”; Research online.
24. S.Ananth and T. Sabri Oncu; “Challenges to Financial Inclusion in India: The Case of Andhra Pradesh”; Centre for Advanced Financial Research and
learning.
25. Leora Klapper, Annamaria Lusari, Peter Van Oudheusden “Financial Literacy around the World”;
Authors: M. Sreedevi, G.Vijay kumar, A.Harsha Vardhan Reddy, Ch.Venkata Sai Krishna Reddy
Paper Title: Research on Real-Time Entity Recognition Using Deep- Learning
Abstract: Recently, Online sources has grown drastically that everything ended up on the web. Web based shopping,
perusing, storing essential information a great deal are provided. Alongside the augmentation of online sources the illicit
exercises likewise expanded. Drawbacks like Advancement of innovation, Editing the picture in such a way it is hard to see
if it is original or not. In order to survive, we made a decent face acknowledgment calculation that precisely finds the
highlights. Our algorithm Cascading classifier which generates clear and rough outcomes in perceiving the face. With the
goal that it discovers the general population who perpetrate violations and unlawful exercises effortlessly.

Keywords: innovation, online sources, web, cascading classifier.

References:
1. Wolfgang, H.L. and Fang, W., KenCast Inc, 2006. System for protecting the transmission of live data streams, and upon reception, for reconstructing
the live data streams and recording them into files. U.S. Patent 7,024,609.
2. Farina, A., Gini, F., Greco, M.V. and Verrazzani, L., 1997. High resolution sea clutter data: statistical analysis of recorded live data. IEE Proceedings-
Radar, Sonar and Navigation, 144(3), pp.121-130.
3. Das, S., Nishimura, S., Agrawal, D. and El Abbadi, A., 2011. Albatross: lightweight elasticity in shared storage databases for the cloud using live data
migration. Proceedings of the VLDB Endowment, 4(8), pp.494-505.
167. 4. Rothschild, M. and Misinai, T., Corigin Ltd, 2005. Sharing live data with a non cooperative DBMS. U.S. Patent 6,879,981.
5. Kennedy, B. and Welch, R.S., AST Research Inc, 1996. Live data storage array system having individually removable, and self- configuring data 907-911
storage units. U.S. Patent 5,515,515.
6. De Maio, A., Farina, A. and Foglia, G., 2010. Knowledge-aided Bayesian radar detectors & their application to live data. IEEE Transactions on
Aerospace and Electronic Systems, 46(1).
7. Rasmussen, J., Shokrollahi, A., Lassen, S., Horn, G., Goyal, V., Dobyns, B. and Luby, M., Digital Fountain Inc, 2007. System and method for reliably
communicating the content of a live data stream. U.S. Patent 7,249,291.
8. Vijayanarasimhan, S. and Grauman, K., 2014. Large-scale live active learning: Training object detectors with crawled data and crowds. International
Journal of Computer Vision, 108(1-2), pp.97-114.
9. Shannon, R.V., Zeng, F.G., Kamath, V., Wygonski, J. and Ekelid, M., 1995. Speech recognition with primarily temporal cues. Science, 270(5234),
pp.303-304.
10. Sulis Setiowati, Zulfanahri, Eka Legya Frani ta, Igi Ardiyanto
11. ."A review of optimization method in face recognition: Comparison deep learning and non-deep learning methods", 2017 9 th
International Conference on Information Technology and Electrical Engineering (ICITEE), 2017.
12. Incremental mining for regular frequent patterns in vertical format.G.Vijay Kumar,V.Valli Kumari
13. International Journal of Engineering and TechnologyVolume 5, Issue 2, 2013, Pages 1506-1511.
14. IEEE International Conference on Computational Intelligence and Computing Research, ICCIC 2012, Sliding window technique to mine regular
frequent patterns in data streams using vertical format Vijay Kumar.G, Valli Kumari.V
15. Distributed feature selection (DFS) strategy for microarray gene expression data to improve the classification performance.SP Potharaju,M Sreedevi -
Clinical Epidemiology and Global Health, 2018
16. Data warehousing practices in business initiatives GV Kumar, M Sreedevi - Oriental Journal of Computer Science and Technology, 2008
Authors: P.Vishal, L.K.Snigdha, Shahana Bano
Paper Title: An Efficient face recognition system using Local Binary Pattern
Abstract: In the image processing and vision ,face image analysis is the most important and crucial research stream. Facial
picture examination is a critical and prominent research point in the PC vision and picture preparing zone, which
168. improvises confront location, confront acknowledgment, outward appearance investigation, and a few other related
applications. A basic advance for fruitful facial picture examination is to infer a viable facial portrayal from the first face 912-914
pictures. As of late, Local Binary Patterns (LBP) has gotten expanding consideration for facial depiction. Neighborhood
double example (LBP) is a nonparametric descriptor, which proficiently abridges the nearby structures of pictures.In this
paper there will be a complete overview of LBP including extentions of that concept are explained. As a normal utilization
of the LBP approach, LBP-based facial picture examination is widely evaluated, while its fruitful expansions, which
manage different assignments of facial picture investigation, are additionally featured

Keywords: Local Binary Patterns (LBP), confront location, confront acknowledgment, outward appearance examination,
nearby highlights.

References:
1. IEEE transactions on systems, man, and cybernetics—part c: applications and reviews, vol. 41, no. 6, november 2011 765 Local Binary Patterns and
Its Application to Facial Image Analysis: A Survey
2. L. Wolf, T. Hassner, and Y.Taigman, ―Descriptor based methods in the ild,‖ in Proc. ECCV, 2008.
3. J. Ruiz-del-Solar, R. Verschae, and M. Correa, ―Recognition of faces in unconstrained environments: A comparative study,‖ EURASIP Journal on
Advances in Signal Processing, vol. 2009, pp. 1–20, 2009.
4. T. Ojala, M. Pietik¨ainen, and D.Harwood, ―A comparative study of texture measures with classification based on featured distribution,‖ Pattern
Recog., vol. 29, no. 1, pp. 51–59, 1996.
5. T. Ahonen, A. Hadid, and M. Pietik¨ainen, ―Face recognition with local binary patterns,‖ in Proc. Euro. Conf.Comput. Vis., 2004, pp. 469–481.
6. A. Hadid, M. Pietik¨ainen, and T. Ahonen,―A discriminative feature space for detecting and recognizing faces,‖ in Proc. Int. Conf. Comput. Vis.
Pattern Recog., 2004, pp. 797– 804.
7. D. P. Huijsmans and N. Sebe, Content-based indexing performance: A class size normalized precision, recall, generality evaluation, ‖ in Proc. Int.
Conf. Image Process., 2003, pp. 733–736.
8. D. Grangier and S. Bengio, ―A discriminative kernel-based approach to rank images from text queries,‖ IEEE Trans. Pattern
Authors: Nivedita N. Kadam, Krovi Raja Sekhar
Paper Title: Secure and Congestion free Routing Techniques in Vehicular Ad-hoc Network (VANET)
Abstract: As VANET is one of the subset of MANET, it has been emerging since the inception of AI based Self Driving
cars and have been increasing till date. The main objective of Vanet can be referred as safety concerns and internet driven
Applications. On board units(OBU) and street side gadgets(RSU)are the fundamental aspect of vanet, it speak over open
wi-fi network therefore making system at risk of attacks and which can also cause privateness compromisation, tracking
and so on. in phrases of routing in VANET’s conventional routing can face a few critical trouble as in community. In
conversation while the vacation spot node is unknown it is able to causes the packet loss it can cause degradation of QoS
and developing in energy intake. As immoderate mobility is one of the critical part of VANET. VANET can be seen as an
instance of hybrid developing networks. right here in this paper we are that specialize in essential troubles and routing
techniques in Vanet

Keywords: VANET, MANET, Trust Mechanism, Energy Efficient, PSO, WatchDog, EAACK, Privacy Preservation,
Attack Prevention.

References:
1. Zhexin Xu et al,” Adaptive multichannel MAC protocol based totally on SD-TDMA mechanism for the vehicular advert hoc network”, IET
conversation, Vol. 12 Iss. 12, pp. 1509-1516,2018.
2. Milind R. Penurkar et al,” Opportunistic Routing set of rules for routing messages in Emergency situations the use of Vehicular put off Tolerant
network”,IEEE,2018
3. Van O et al,” Combining Spatial and Social recognition in D2D Opportunistic Routing”, IEEE Communications magazine,2018.
4. Ms. Varsha T. Lokare et al.” Markov Chain based totally absolutely Opportunistic Routing Protocol to beautify the overall overall performance of the
MANET”, IEEE Xplore Compliant ,2018.
5. ing Li et al,” glide-layer and reliable Opportunistic Routing algorithm for cell advert Hoc Networks”, IEEE,2018.
6. Hajer Ben Fradj et al,” Comparative have a have a have a have a look at of Opportunistic Routing in wireless Sensor Networks”,IEEE,2018
7. Yue Cao et al,” A Trajectory-pushed Opportunistic Routing Protocol for VCPS”, IEEE TRANSACTIONS ON AEROSPACE AND digital
169. systems,2018.
8. Zhexin Xu et al,” Adaptive multichannel MAC protocol based on SD-TDMA mechanism for the vehicular ad hoc community”, IET Commun., 2018,
Vol. 12 Iss. 12,2018.
915-922
9. XIAOPING YANG et al,” development of GPSR protocol in Vehicular ad hoc community”,IEEE,2018.
10. LAISEN NIE et al,” Spatio-Temporal network website internet web page traffic Estimation and Anomaly Detection based totally mostly on
Convolutional Neural community in Vehicular ad-Hoc Networks”,IEEE,quantity 4,2018.
11. Zhihao Ding et al,” Mobility based Routing Protocol with MAC Collision development in Vehicular advert Hoc Networks”,IEEE,2018.
12. Kuldip Singh Atwal et al,” SDN-based without a doubt Mobility control and QoS useful aid for Vehicular advert-hoc Networks”,ICNC,2018.
13. N. B. Gayathri et al,” inexperienced Pairing-loose Certificateless Authentication Scheme with Batch Verification for Vehicular advert-hoc
Networks”,IEEE,2018.
14. Mumin Ozpolat et al,” A Grid-primarily based completely insurance assessment of city mmWave Vehicular advert Hoc Networks”,IEEE,2018.
15. Leandro N. Balico et al,” Localization Prediction in Vehicular advert Hoc Networks”,IEEE,2018.
16. Xinxin He et al,” Transmission potential assessment for Vehicular advert Hoc Networks”,IEEE,2018.
17. Abdel-Mehsen Ahmad et al,” Chain-primarily based absolutely records Dissemination in Vehicular advert-hoc Networks”,IEEE,2018.
18. ABDUL RAHIM ANSARI et al,” correct 3-D Localization method for Public safety packages in Vehicular advert-Hoc Networks”,IEEE,2018.
19. Zhiwei Yang et al,” Navigation direction based genuinely robust Clustering for Vehicular advert Hoc community”,IEEE,2018.
20. Guangyu Li et al,” Direct vehicle-to-vehicle Charging technique in Vehicular ad-Hoc Networks”,IEEE,2018.
21. Khondokar Fida Hasan et al,” GNSS Time Synchronization in Vehicular ad-Hoc Networks: advantages and Feasibility”,IEEE,2018.
22. Kumar Sharshembiev et al,” Broadcast typhoon Mitigation from accidental Misbehavior in Vehicular ad Hoc Networks”,IEEE,2018.
23. Amit Dua et al,” An power efficient data Dissemination and records Retrieval Scheme for VANET”,IEEE,2018.
24. Vishal Sharma et al,” AODV based definitely power inexperienced IEEE 802.16G VANET network”,IEEE,2018.
25. Huawen Zheng et al,” electricity average overall performance assessment of a Roadside Relay factor Deployment for information shipping in
VANET”,IEEE,2015.
26. M.Sujatha et al,” Oppurtunistic Routing set of guidelines for Hidden Node Collision Avoidance and strength inexperienced wi-fi Sensor
network”,IEEE,2017.
27. Adnan Mahmood et al,” within the route of efficient community useful resource manage in SDN-primarily based Heterogeneous Vehicular
Networks”,IEEE,2018.
28. Bingshu Zhang et al,” strength-green Roadside gadgets Deployment in Vehicular advert Hoc Networks”, ICWMMN,2018.
29. Shubham Agrawal et al An green method for Load Balancing in Vehicular advert-hoc Networks”, IEEE,2016.
30. Rajkumar Waghmode et al,” safety Enhancement in employer based totally Authentication for VANET”,IEEE,2018.
31. Fengzhong Qu et al,” A safety and privacy assessment of VANETs”,IEEE,2015.
32. Mevlut Turker Garip et al,” Concealing Vehicular Botnet communique in the VANET manipulate Channel”,IEEE,2016.
33. Ubaidullah Rajput et al,” A Hybrid approach for green privacy maintaining Authentication in VANET”,IEEE,2017.
34. Xiwei Wang et al,” A Scalable and secure Key Distribution Scheme for agency Signature primarily based completely sincerely in truth Authentication
in VANET”,IEEE,2017.
35. Walid Bouksani et al,” An green and Dynamic Pseudonyms exchange device for privacy in VANET”,IEEE,2017.
36. Niharika Chaudhary et al,” protection Protocol for VANET thru the use of using virtual Certification to provide safety with Low Bandwidth”,
international conference on communique and sign Processing,2016.
37. Bowen Zheng et al,” Timing and safety evaluation of VANET-based totally sensible Transportation systems”,IEEE,2017.
38. Tarun Varshney et al ,”Implementation of Watchdog Protocol with AODV in cellular ad Hoc network”,IEEE,2014
39. N. Sridevi et al ,” advanced comfortable wi-fi verbal exchange in MANETs ”IEEE,2017.
40. P. S. Nithya Darisini et al,“A Survey of Routing Protocols for VANET in town situations”, international conference on sample recognition,
Informatics and mobile Engineering ,2013.
41. Mayada Abdelgadir et al,“Vehicular advert-hoc Networks (VANETs) Dynamic normal universal overall performance Estimation Routing version for
town conditions”,IEEE,2016.
42. B.Ayyappan et al,”Vehicular advert Hoc Networks (VANET): Architectures, Methodologies And format problems”,ICONSTEM,2016.
43. Cynthia Jayapal et al ,” street web site visitors CONGESTION manipulate the usage of VANET”, international conference on Advances in Human
gadget interaction,2016.
Authors: Sravanthi Yadav.K, T.Uma Maheswara Rao
Paper Title: Problems and Prospects of Mango Marketing in India (Related to Krishna District)
Abstract: It is a well known fact that India is a well known economy which depends highly on agricultural sector, and
India’s climatic conditions favour the cultivation of Mangoes. Even though India has lion’s share in the growth and
cultivation of the fruit, it still has huge challenges that are dragging it from soaring high, like the fertilizer problem, lack of
awareness and education regarding modern methods of cultivation irrigation. These challenges must be strategically
mitigated in order to encourage the farming community in the future. Encouraging research in this area is a very welcoming
change as the future and young generations involve themselves to mitigate the problems using their intellectual capacity
and the government implementing their suggestions. In this study both primary and secondary data are taken into
consideration, Convenience sample variables are used. Data s analysed using Ms excel and SPSS software Package.

Keywords: Mango cultivation industry, India, Problems, Prospects

References:
170. 1. MOFPI Report (1999): ‘Food Processing - Fact sheet’, MOFPI reports, 1999; p. 01 – 03.
2. Deepak Shah (2000): ‘Marketing pattern of grapes in Maharashtra – An appraisal’, Indian Journal of agricultural Marketing; 14 (1), p 40 – 48. 923-927
3. TIFAC Report (2000): ‘Agro-food processing: technology vision 2020: fruits and vegetables- current status and vision’, TIFAC report; 2000.
4. US Commercial Services Report (2000): ‘The Best Prospects / Industry Overview’, The U. S commercial service, 2000, p. 01 – 02.
5. MOFPI Annual Report: (2000-01): ‘Fruits and vegetables exporters, Fruits and vegetables suppliers, India’; Department of Food Processing, Ministry
of Agriculture, New Delhi, 2001.
6. McKinsey and CII Report (2001): ‘Fruit and vegetable losses alarmingly high’, The Hindu; August 01, 2001 edition.
7. Ministry Of Food Processing Industries report (2001): ‘Fruits and vegetables processing: capacity and production”; MOFPI report.
8. Manish Jain (2002): ‘Horticulture: A golden revolution on the anvil’, Agriculture Today; December 2002, p. 17 -23.
9. Katar Singh and R.S. Pundir (2002): ‘The role of banks in promoting India’s export of fruits and vegetables’, National Banks News Review; 2002, p.
31 – 38.
10. NFI Archive Report (2003): ‘Horticulture is the future, Post harvest technology: Making the most of what we grow’; NFI archives, 2003.
11. K.P.Prabhakaran Nair (2006): ‘The SEZ debate – how valid is it!’; The Times of India, November 30, 2006 edition.
12. Ashok Gulati, et al, (2008): ‘Transforming Agri-food system: Role of organized retail in India’, presented at the first annual conference of the Indian
Society of Agri-Business Management on emerging trends in Agri-Business Management, Bangalore; 25 – 27 September, 2008.
13. Purushottam bhang (2013) : Mango Cultivation Industry Of India: Problems And Prospects, presented at Conference on Management and Information
Systems …, 2013 - elkjournals.com
Authors: Sravanthi Yadav.K, T.Uma Maheswara Rao
Paper Title: A Research On Oil Seeds Production and Marketing In India
Abstract: India is a very competitive market, in which many organizations fight head on for a place in the market. India is
also an agriculture based country where 65% of its population still base itself on agriculture for their living and India has
more than 43 percent of total land is cultivated as against 11 percent in the world and almost 15 major climatic conditions
of the world are in India. Out of 60 varieties of soil available all over the world, nearly 46 varieties can be noticed in India.
The direct contribution of the agricultural sector to national economy is reflected by its share in total GDP, its foreign
exchange earnings, and its role in supplying savings and labour to other sectors. So, it is imperative that the recent
researches need to focus on oil seeds marketing as it is the backbone of the Indian GDP. For that purpose this paper talks
about the problems faced by the oilseeds marketers in Indian market.

171. Keywords: oil seeds industry, marketing problems, marketing, competitive markets
928-932
References:
1. HAGIMORI, Toshimitsu. "A Review of the World Production Relating To Oilseeds, Oils and Fats". Journal of Japan Oil Chemists' Society 21.10
(1972): 653-657. Web.
2. PROBLEMS AND PROSPECTS OF AGRICULTURAL MARKETING IN INDIA: AN OVERVIEW". International Journal of Agricultural and
Food Science 3.3 (2017): 108-118. Print.
3. Dupare, B.U. et al. "Contribution Of Area, Productivity And Their Interaction Towards Changing Oilseeds And Soybean Production Scenario In
India". Legume Research - An International Journal 37.6 (2014): 635. Web.
4. Singh, Raman Jeet, N. M. Alam, and Suresh Kumar. "Bt Cotton–Groundnut Intercropping System: A Pragmatic Approach For Increasing Edible
Oilseeds Production In India". Proceedings of the National Academy of Sciences, India Section B: Biological Sciences (2015): n. pag. Web.
5. Problems and Prospects of Oilseeds Production in Uttar Pradesh. 1st ed. Allahabad: Agro-Economic Research Centre, 2013. Print.
6. Oil Palm Cultivation in Andhra Pradesh State – A Study of the Problems and Prospects". INDIAN JOURNAL OF APPLIED RESEARCH 3.7
(2013): n. pag. Print.
7. "The Global Market for Oilseeds: Prospects and Challenges for Morocco". OCL Journal 12 november2013 (2014): 204. Print.
8. The Indian Oil Seeds Scenario: Challenges and Opportunists. 1st ed. New Delhi: TAAS, 2017. Print.
9. Problems and Prospects of Oilseeds Production in Gujarat Special Reference to Groundnut. 1st ed. Gujarat: Agro-Economic Research Centre, 2017.
Print.
10. Problems and Prospects of Oilseeds Production in Uttar Pradesh. 1st ed. Allahabad: Agro-Economic Research Centre, 2013. Print.
11. Shilpi, Forhad, and Dina Umali-Deininger. "Market Facilities and Agricultural Marketing: Evidence from Tamil Nadu, India". Agricultural
Economics (2008): n. pag. Web.
12. Raju, Mudigonda. "Agricultural Marketing in India and Its Problems". South Asian Journal of Marketing & Management Research 6.12 (2016): 40.
Web.
13. "Sesame Seed in China and India". Oil & Fat Industries 8.10 (1931): 389-395. Web.
14. Meena, Dinesh Chand, O. P. Singh, and Maina Kumari. "Determinants of Price of Mustard Seed and Mustard Oil in Domestic Markets of India".
Indian Journal of Marketing 45.2 (2015): 41. Web.
15. Yadav, Shashi. "PROBLEMS AND PROSPECTS OF AGRICULTURAL MARKETING IN INDIA". Management Insight - The Journal of Incisive
Analysers 12.02 (2016): n. pag. Web.
16. Shilpi, Forhad, and Dina Umali-Deininger. "Market Facilities and Agricultural Marketing: Evidence From Tamil Nadu, India". Agricultural
Economics (2008): n. pag. Web.
17. Roy, P. (2013, June 29). Problems and Prospects of Oilseeds Production in Uttar Pradesh. Retrieved from
http://allduniv.ac.in/ckfinder/userfiles/files/2013-Problems-and-Prospects-of-Oilseeds-Production-in-Uttar-Pradesh.pdf
18. (2013, August 30). PROBLEMS AND PROSPECTS OF AGRICULTURAL MARKETING IN INDIA: AN OVERVIEW. Retrieved from
http://www.icssrwbsu.in/literature/PROBLEMS%20AND%20PROSPECTS%20OF%20AGRICULTURAL%20MARKETING%20IN%20INDIA-
%20AN%20OVERVIEW.pdf
19. Sidhu, R.S. & Vatta, Kamal & Kaur, Arjinder, 2008. "Dynamics of institutional agricultural credit and growth in Punjab: contribution and demand-
supply gap," Agricultural Economics Research Review, Agricultural Economics Research Association (India), vol. 21(Conferenc), pages 1-8.
20. “Dynamics of Institutional Agricultural Credit and Growth in Punjab: Contribution and Demand-Supply Gap.” ageconsearch.umn.edu. Agricultural
Economics Research Review,Vol. 21 (Conference Number) 2008, pp 407-414, n.d. Web. 28 Jan. 2019.
<https://ageconsearch.umn.edu/bitstream/47891/2/12-RS-Sidhu.pdf>.
Authors: Ramapadmaja, T.Umamahaswara Rao
Paper Title: Impact of Technology on Groundnut Production of the Chittoor District
Abstract: The patterns of the use of technology are a major area of study for enhancing the yields as well as productivity
levels of the groundnut crop as well as its impact on farmers. Therefore, it is essential to analyse the technological
innovations and how they have helped in realizing the goals. Scientists have invented several kinds of techniques of
groundnut production to raise the yields of the crop. Each and every technology has its own unique contribution towards
increasing the yield which can have an effect on the production costs as well as the overall income of the farmers.
Extension and research institutions play a key role in the transfer of technology to the farmers and their adoption of the
same. Studying the different technologies used by farmers will help in assessing their overall effects. The resulting analysis
provides an insight into the levels of adoption as well as the effectiveness of the technologies of production presently in
use.
This research will also help scientists and technicians develop new technologies on an as-needed basis for use of farmers in
areas where they can maximize productivity and net income while minimizing the production costs. Therefore, it is
essential in this regard to do a study and assess the perceived impact of different technologies using various indicators such
as cultivation costs, yield and net income of groundnut production

172. Keywords: Groundnuts, Yielding, Productivity.

References: 933-938
1. Acharya S S and Satish Bhatia 1974 Acreage response to price, yield and rainfall changes in Rajasthan. Agricultural Situation in India .
2. Alagh Y K and Sharma P S 1980 Growth of crop productivity: 1960-61 to 1978-79 – Is it decelerating. Indian Journal of Agricultural Economics 104-
118.
3. Baidyanatha Mishra 1983 Deceleration of rates of agricultural growth in Orissa –Trends and explanatory factors: A case study. Agricultural Situation
in India 38 : 591.
4. Cauvery R 1993 Impact of price movements on acreage under groundnut in South Arcot. Agricultural situation in India 48 (3): 137-144.
5. Cummings John Thomas 1975 The supply response of Indian farmers in the post –independence period: Major cereals and cash crops. Indian Journal
of Agricultural Economics 30 : 25-40.
6. Dandekar V M 1980 Introduction to seminar on database and methodology for the study of growth rates in agriculture. Indian Journal of Agricultural
Economics 35: 1-12.
7. Eswara Prasad Y, Sreerama Murthy C and Satyanarayana G 1989 Supply response analysis of sesamum in Andhra Pradesh. Indian Journal of
Agricultural Marketing 3 (2): 132-136.
8. Gaddi G M, Koppad M B, Gummagolmath K C and Naik A D 1999 An economic analysis of growth performance of oilseed crops in India.
Karnataka Journal of Agricultural Sciences 12 (1-4) : 93-98.
9. Hasija R C, Aneja D R and Khatkar R K 2003 Retrospect and prospects of sugarcane production in Haryana. Indian Journal of Agricultural Research
37 (2): 140-143.
10. Jakhade V M and Mujumdar N A 1964 Response of agricultural products to prices – the case of jute and rice in India. Indian Journal of Agricultural
Economics .
Authors: Ramapadmaja, T.Umamaheswara Rao
Groundnut Production and Adoption of Technology by Women Farmers in Andhra Pradesh- Related to
Paper Title:
Rayalaseema Region
Abstract: Restoring groundnut creation in the province of Andhra Pradesh requires purposeful activity by the partners.
Ancestral ranchers in Andhra Pradesh, India, have out of the blue developed groundnut on their territories, prompting
enhanced livelihoods through usage of innovation. A few groundnut generation advancements have been produced and
173.
conveyed through the augmentation administration to the ranchers. On the other hand, there has been a decrease underway
and cooperation by the lady agriculturists. Hence the lady agriculturists remain to a great extent uneducated and asset poor. 939-943
To scale up generation and exploit the modern capability of this yield an examination was directed to record the financial,
statistic and institutional factors of lady ranchers, distinguish innovation data bundles conveyed to the ranchers and
reception of these advances. Absolutely 200 agriculturists were met. The respondents were sourced utilizing multistage
inspecting technique. The information gathered in the examination were outlined in tables.
Keywords: Agriculture, Groundnut

References:
1. Anand, T.N. also, Veerabhadraiah, V. 2005. Maintainability of dry land cultivating. The Worldwide Diary of Extension Education. Lady issue Vol 1
January 2005 p.59-70
2. Babu, M.V.S., Balaguravaiah, D., Adinarayana, G., Pratap, S and Reddy, T.Y. 2008. Impact of culturing and supplement the board on rain-fed
groundnut creation and soil properties in alfisols. Vegetable research. 31(3):192-195.
3. Bhatia, V.S., Piara Singh, Wani, S.P., Rao, A.V.R.K. what's more, Srinivas, K. 2007. Yield hole investigation of soyabean, groundnut, pigeon pea and
chickpea in India utilizing reproduction demonstrating. The Diary of SAT Agricultural Research. 5(1):1-160.
4. Chand, S. 2006. Degree of selection of prescribed generation innovation for groundnut creation. Archives of Agricultural Research. 27(1):13-15.
5. Chandrasekhar, Vaser, S., Manure, G.R., Narayanapp, C and Lakshiminarayan, M T. 2008. Effect of the upper Krishna venture, CADA on selection
on reception and generation of groundnut by ranchers. Research of Crops. 9(2):426-429.
6. Dzmeku, I.K., Abudulai, M., Brandenburg, R.L. furthermore, Jordan, D.L. 2009. Review of weeds and executives rehearses in shelled nut (Arachis
hypogea L.) in the savanna nature of Ghana. Nut Science. 36(2):165-173.
7. Dubolia, S.R. what's more, Jaiswal, P.K. 2000. Mechanical holes of groundnut development among groundnut producers. Maharashtra Journal of
Extension Education. 19:217-221.
8. FAO, 2004. Nourishment and Agriculture Organization. FAO generation yearbook. 51(142):104-105.
9. Gowda, B.G., Anand, T.N. also, Krishna, K.S. 2005. Connection between chose attributes of Big and little groundnut cultivators and their insight and
appropriation towards Dry land cultivating innovation. Mysore Journal of Agricultural Science. 36:276-280.
10. Jadhav, S.B., Tekale, D.D., Pawar, S.N. also, Kalbande, S.R. 2008. Examination of ICRISAT also, ordinary strategies for groundnut development
under sprinkler water system. Universal Diary of Agricultural Sciences. 4(2):646-648.
Authors: Avinash Golande, Pavan Kumar T
Paper Title: Heart Disease Prediction Using Effective Machine Learning Techniques
Abstract: In today’s era deaths due to heart disease has become a major issue approximately one person dies per minute
due to heart disease. This is considering both male and female category and this ratio may vary according to the region also
this ratio is considered for the people of age group 25-69. This does not indicate that the people with other age group will
not be affected by heart diseases. This problem may start in early age group also and predict the cause and disease is a
major challenge nowadays. Here in this paper, we have discussed various algorithms and tools used for prediction of heart
diseases.

Keywords: Classification, Heart Disease, Decision Tree, Data Mining.

References:
1. V. Krishnaiah, G. Narasimha, N. Subhash Chandra, “Heart Disease Prediction System using Data Mining Techniques and Intelligent Fuzzy
Approach: A Review” IJCA 2016.
2. ]K.Sudhakar, Dr. M. Manimekalai “Study of Heart Disease Prediction using Data Mining”, IJARCSSE 2016.
3. NagannaChetty, Kunwar Singh Vaisla, NagammaPatil, “An Improved Method for Disease Prediction using Fuzzy Approach”, ACCE 2015.
4. VikasChaurasia, Saurabh Pal, “Early Prediction of Heart disease using Data mining Techniques”, Caribbean journal of Science and Technology, 2013
5. ShusakuTsumoto,” Problems with Mining Medical Data”, 0-7695- 0792-1 I00@ 2000 IEEE.
6. Y. Alp Aslandoganet. al.,” Evidence Combination in Medical Data Mining”, Proceedings of the international conference on Information Technology:
Coding and Computing (ITCC’04) 0-7695-2108-8/04©2004 IEEE.
174. 7. Carlos Ordonez, "Improving Heart Disease Prediction Using Constrained Association Rules," Seminar Presentation at University of Tokyo, 2004.
8. Franck Le Duff, Cristian Munteanu, Marc Cuggiaa, Philippe Mabob, "Predicting Survival Causes After Out of Hospital Cardiac Arrest using Data 944-950
Mining Method", Studies in health technology and informatics, Vol. 107, No. Pt 2, page no. 1256-1259, 2004.
9. Boleslaw Szymanski, Long Han, Mark Embrechts, Alexander Ross, KarstenSternickel,Lijuan Zhu, "Using Efficient Supanova Kernel For Heart
Disease Diagnosis", Proc. ANNIE 06, intelligent engineering systems through artificial neural networks, vol. 16,page no. 305-310, 2006.
10. Kiyong Noh, HeonGyu Lee, Ho-Sun Shon, Bum Ju Lee, and Keun Ho Ryu, "Associative Classification Approach for Diagnosing Cardiovascular
Disease", Springer 2006,Vol:345, page no. 721- 727.
11. Hongyu Lee, Ki Yong Noh, Keun Ho Ryu, “MiningBiosignal Data: Coronary Artery Disease Diagnosis using Linear and Nonlinear Features of
HRV,” LNAI 4819: Emerging Technologies in Knowledge Discovery and Data Mining, May 2007, page no. 56-66.
12. Niti Guru, Anil Dahiya, NavinRajpal, "Decision Support System for Heart Disease Diagnosis Using Neural Network", Delhi Business Review, Vol. 8,
No. 1, January - June 2007.
13. Hai Wang et. al.,”Medical Knowledge Acquisition through Data Mining”, Proceedings of 2008 IEEE International Symposium on IT in Medicine and
Education 978-1-4244- 2511-2/08©2008 Crown.
14. SellappanPalaniappan, RafiahAwang, "Intelligent Heart Disease Prediction System Using Data Mining Techniques", (IJCSNS), Vol.8 No.8, August
2008.
15. LathaParthiban and R.Subramanian, "Intelligent Heart Disease Prediction System using CANFIS and Genetic Algorithm", International Journal of
Biological, Biomedical and Medical Sciences, Vol. 3,Page No. 3, 2008.
16. Chaitrali S. Dangare, Sulabha S. Apte, Improved Study of Heart Disease Prediction System using Data Mining Classification Techniques”,
International Journal of Computer Applications (0975 888)Volume 47 No.10, June 2012.
17. S. Vijiyarani et. al., “An Efficient Classification Tree Technique for Heart Disease Prediction”, International Conference on Research Trends in
Computer Technologies (ICRTCT - 2013) Proceedings published in International Journal of Computer Applications (IJCA) (0975 – 8887), 2013 (pp
6-9).
18. Harsh Vazirani et. al.," Use of Modular Neural Network for Heart Disease", Special Issue of IJCCT Vol.1 Issue 2, 3, 4; 2010 for International
Conference [ACCTA-2010], 3-5 August 2010 (pp 88-93).
Authors: Sreekanth D, Gladston Raj S.
Paper Title: Auto Selection of Clustering Techniques Using Cluster Validations for Cloud Log Analysis
Abstract: The work identified the challenges and requirements to select the right algorithm for clustering to detect the
anomalies in the cloud Log Data. Having identified the gaps in the existing research in the area of cloud log analysis, it
175. looks forward to providing a meaningful model for handling the problem dealing with different datasets like logs of
OpenStack cloud, Hadoop and Spark. The system is capable to choose the right algorithm for the dataset comes up for the 951-955
analysis. Here it is used the cluster validation techniques to select the right algorithm and based on the threshold values it is
possible to differentiate the data in the dataset.
Keywords: Audio and Image, GPS, GPRS, GSM, Sensors.

References:
1. P. Shi, “An Efficient Approach for Clustering Web Access Patterns from Web Logs,” vol. 5, pp. 1–14, 2009.
2. P. Dhanalakshmi and K. Ramani, “Clustering of users on web log data using Optimized CURE Clustering,” vol. 7, no. 5, pp. 2018–2024, 2018.
3. N. A. Subramaniam, “APPLICATION OF MACHINE LEARNING AND DEEP LEARNING ON NETWORK INTRUSION DETECTION.” 2017.
4. G. Di Modica and O. Tomarchio, “Matchmaking semantic security policies in heterogeneous clouds,” Futur. Gener. Comput. Syst., vol. 55, pp. 176–
185, 2016.
5. G. Suchacka, M. Skolimowska-kulig, and A. Potempa, “A k -Nearest Neighbors Method for Classifying User Sessions in E-Commerce Scenario,” no.
1, pp. 64–69.
6. L. Wang, “IoT Big Data Application Requirements,” 2015.
7. A. Buczak and E. Guven, “A survey of data mining and machine learning methods for cyber security intrusion detection,” IEEE Commun. Surv.
Tutorials, vol. PP, no. 99, p. 1, 2015.
8. T. Shon and J. Moon, “A hybrid machine learning approach to network anomaly detection,” Inf. Sci. (Ny)., vol. 177, no. 18, pp. 3799–3821, 2007.
9. M. Du, F. Li, G. Zheng, and V. Srikumar, “DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning,” ACM SIGSAC
Ccs’17, pp. 1285–1298, 2017.
10. R. Buyya, C. Shin, S. Venugopal, J. Broberg, and I. Brandic, “Cloud computing and emerging IT platforms : Vision , hype , and reality for delivering
computing as the 5th utility,” Futur. Gener. Comput. Syst., vol. 25, no. 6, pp. 599–616, 2009.
11. M. C. Belavagi and B. Muniyal, “Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection,” Procedia Comput.
Sci., vol. 89, pp. 117–123, 2016.
12. F. Wauthier, Practical Machine Learning. 2009.
13. “Test Dataset - Normal.” [Online]. Available: https://www.cs.utah.edu/~mind/papers/deeplog_misc.html.
14. [14] M. T. Khorshed, A. B. M. Shawkat Ali, and S. A. Wasimi, “A survey on gaps, threat remediation challenges and some thoughts for proactive
attack detection in cloud computing,” Futur. Gener. Comput. Syst., vol. 28, pp. 833–851, 2012.
15. P. M. El-kafrawy, A. A. Abdo, and A. F. Shawish, “Security Issues Over Some Cloud Models,” Procedia - Procedia Comput. Sci., vol. 65, no. Iccmit,
pp. 853–858, 2015.
16. N. Paladi, C. Gehrmann, and A. Michalas, “Providing User Security Guarantees in Public Infrastructure Clouds,” IEEE Trans. Cloud Comput., vol. 5,
no. 3, pp. 405–419, 2017.
17. R. Sommer and V. Paxson, “Outside the Closed World: On Using Machine Learning For Network Intrusion Detection,” 2010 IEEE Symp. Secur.
Priv. Outs., pp. 305–316, 2010.
18. J. Wei, Y. Zhao, K. Jiang, R. Xie, and Y. Jin, “Analysis farm: A cloud-based scalable aggregation and query platform for network log analysis,” Proc.
- 2011 Int. Conf. Cloud Serv. Comput. CSC 2011, pp. 354–359, 2011.
19. S. He, J. Zhu, P. He, and M. R. Lyu, “Experience Report : System Log Analysis for Anomaly Detection,” 2016.
20. J. Zhao et al., “A security framework in G-Hadoop for big data computing across distributed Cloud data centres,” J. Comput. Syst. Sci., vol. 80, no. 5,
pp. 994–1007, 2014.
21. X. Lin, P. Wang, and B. Wu, “Log analysis in cloud computing environment with Hadoop and Spark,” Proc. 2013 5th IEEE Int. Conf. Broadband
Netw. Multimed. Technol. IEEE IC-BNMT 2013, pp. 273–276, 2013.
22. I. Mavridis and H. Karatza, “Performance evaluation of cloud-based log file analysis with Apache Hadoop and Apache Spark,” J. Syst. Softw., vol.
125, pp. 133–151, 2017.
23. G. Adamson, M. Holm, P. Moore, and L. Wang, “A Cloud Service Control Approach for Distributed and Adaptive Equipment Control in Cloud
Environments,” Procedia CIRP, vol. 41, pp. 644–649, 2016.
Authors: Aslam Shaik, A. Srinivasula Reddy
Optimal Feature Oreinted Classification of One and Merged Disturbances of Power Quality Through
Paper Title:
Shupervised Learning
Abstract: The emergence of power quality topic in power systems has gained an increased research interest due to its
widespread applicability in different applications. Since the quality of power is devalued due to various disturbances,
detection of such disturbances is required. This paper provides refined power quality disturbances classification mechanism
which is associated with various compositions like the presence of noise, and accumulation of two or more disturbances.
Considering the both linear and non-linear dependencies between PQDs, two optimal feature extraction techniques, Joint
Mutual Information as well as Correlation based feature selection, are proposed. These optimal set of features are processed
for PQDs classification by employing pair of supervised learning algorithms, Support Vector Machine (SVM) along with
Decision Tree (DT). Extensive simulations are conducted over different PQ disturbances at different Signal to Noise Ratio
(SNR) levels give away the performance constructiveness of proposed approach. The robustness is derived through the
provision of a tradeoff between the computational time and classification accuracy.

Keywords: Power Quality Disturbances, Mutual Information, Correlation, SVM, DT, Swell, Sag, Accuracy,
Computational Time.
176. References:
1. Kapoor R & Saini M (2012). Classification of power quality events – a review. International Journal of Electrical Power & Energy Systems 43, 11– 956-964
19.
2. Kapoor R & Saini M. (2007). A new signal processing technique for power system disturbances detection and classification. Int. J Electrical
Engineering, 88, 9–14.
3. Saini M. K., Kapoor R & Sharma B. B (2011). PQ event classification using fuzzy classifier. Advanced Materials Research, 403–408, 3854–3858.
4. Kapoor R. & Gupta R (2011). Statistically matched wavelet-based method for detection of power quality events. International Journal of Electronics
98(1), 109–127.
5. G. Carpinelli, P. Caramia and P. Verde, Power Quality Indices in Liberalized Markets, Chichester, U.K.: Wiley, 2009.
6. Granados-Lieberman D, Romero-Troncoso R. J., Cabal-Yepez E., Osornio-Rios R. O., and Franco-Gasca L. A., “A real-time smart sensor for high-
resolution frequency estimation in power systems,” Sensors, vol. 9, no. 9, 7412–7429, Sep. 2009.
7. Siahkali H., “Power quality indexes for continue and discrete disturbances in a distribution area,” in Proc. IEEE Power and Energy Conf., Johor
Bahru, Malaysia, pp. 678–683, 2008.
8. S. Santoso, Grady W. M., Powers E. J., J. Lamoree, and Bhatt S. C., “Characterization of distribution power quality events with Fourier and wavelet
transforms,” IEEE Trans. Power Del, vol. 15, no. 1, pp. 247–254, Jan. 2000.
9. Md shafiullah ,muhammad liaz, , m a abido, “classification of power quality disturbances using wavelet transform and optimized ann”, 18th
international conference on intelligent system application to power systems (isap), porto, portugal, 2015.
10. Z.G Liu; Han Z.W; Zhang, Y. Multi wavelet packet entropy and its application in transmission line fault recognition and classification. IEEE Trans.
Neural Net. Learning Syst. 2014, 25, 2043–2052.
11. Chen, J.; G. Tsallis ;Li, wavelet entropy and its application in power signal analysis. Entropy 2014, 16, 3009–3025.
12. Zhang, Q ,Liu, Z.G.; Hu Q.L.; Cui, Y;. A new detection approach of transient disturbances combining wavelet packet and Tsallis entropy.
Neurocomputing 2014, 142, 393–407.
13. AA Abdelsslam, Sallam. Characterization of power quality disturbances using hybrid technique of linear Kal¬man filter and Fuzzy-Expert system.
Electric Power System Research. 2012; 41–50.
14. S. Mohanty ,P. Ray and N. Kishor, “Disturbance detection in grid connected distributed generation system using wavelet and S-transform,” Elect.
Power Syst. Res., vol. 81, no. 3, pp. 805–819, Mar. 2011.
15. Ontoseno Penangsang ,Anissa Eka Marini Pujiantara, Ardyono Priyadi, Margo Pujiantara, , “Improvement of power quality monitoring based on
modified S-transform”, International Seminar on Intelligent Technology and Its Applications (ISITIA), Lombok, Indonesia, 2016.
16. Qiu Tang, Jianmin Li, Zhaosheng Teng, and Junhao Song, “Detection and Classification of Power Quality Disturbances Using Double Resolution S-
Transform and DAG-SVMs”, IEEE Transactions on Instrumentation And Measurement, Volume: 65, Issue 10 , Oct. 2016.
17. N. Kishor ,P. Ray, and S. Mohanty, “Islanding and power quality disturbance detection in grid connected hybrid power system using wavelet and S-
transform,” IEEE Trans. Smart Grid, vol. 3, pp. 1082–1094, Sep. 2012
18. M Valtierra-Rodriguez;, R.; Osornio-Rios, R.A.; Garcia-Perez and de Jesus Romero-Troncoso A. Detection and classification of single and combined
power quality disturbances using neural networks. IEEE Trans. Ind. Electron. 2014, 61, 2473–2482.
19. Chen C. I., “Virtual multifunction power quality analyzer based on adaptive linear neural network,” IEEE Trans. Ind. Electron., vol. 59, no. 8, pp.
3321–3329, Aug. 2012.
20. Liao C.C, “Enhanced RBF network for recognizing noise-riding power quality events,” IEEE Trans. Instrum. Meas., vol. 59, no. 6, pp. 1550–1561,
Jun. 2010.
21. Valtierra-Rodriguez M, R. de Jesus Romero-Troncoso,., . Garcia-Perez and Osornio-Rios R. A “Detection and classification of single and combined
power quality disturbances using neural networks,” IEEE Trans. Ind. Electron., vol. 61, no. 5, pp. 2473–2482, May 2014.
22. Tripathi M M and Rahul, Rajiv Kapoor, , “Detection and Classification of multiple power signal patterns with volterra series and interval type-2 fuzzy
logic system”, Protection and Control of Modern Power Systems, 2(9), 2017.
23. Liu, Zhigang Member, IEEE, Yan Cui, and Wenhui Li, “A Classification Method for Complex Power Quality Disturbances Using EEMD and Rank
Wavelet SVM”, IEEE Transactions On Smart Grid, Vol. 6, No. 4, July 2015.
24. Lin W. M, Wu C. H., Lin C. H., and Cheng F. S., “Detection and classification of multiple power-quality disturbances with wavelet multiclass SVM,”
IEEE Trans. Power Del., vol. 23, no. 4, pp. 2575–2582, Oct. 2008.
25. Ekici S., “Classification of power system disturbances using support vector machines,” Expert Syst. Appl., vol. 36, no. 6, pp. 9859–9868, Aug. 2009.
Authors: N. Geethanjali1, G.T.Prasanna kumari, M.Usha Rani
Paper Title: Evaluating Adaboost and Bagging Methods for Time Series Forecasting EEG Dataset
Abstract: Time series forecasting is a paramount range from claiming machine learning that is frequently neglected. It is
critical a direct result there are thus large portions prediction issues that include a period part. These issues are dismissed on
account of it, this period part will lead to time series issues more troublesome to manage. An fascinating time series
classification issue will be foreseeing if an subject’s eyes need aid open alternately shut based best for their brain wave
information (EEG). We will aggravate examination for Adaboost and Bagging methodologies on EEG dataset.

Keywords: Adaboost, Bagging, EEG.

References:
1. Agriculture soil classification and fertilizer recommendation using Adaboost and Bagging approaches: G.T.Prasanna Kumari; SSRN, ELSEVIER,
January 2018.
177. 2. Analysis of agriculture data using data mining techniques: application of big data: Jharna Majumdar, Sneha Naraseeyappa and Shilpa Ankalaki;
Journal of Big Data, Majumdaret al. J Big Data (2017) 4:20 DOI 10.1186/s40537-017-0077-4.
3. An Overview of Data Mining Techniques Applied to Agricultural Soil Data: BalajiAglave, Razaullah Khan, Sanjay Sirsat; International Journal of 965-968
Agriculture Innovations and Research Volume 3, Issue 2, ISSN (Online) 2319-1473, 11/09/2014.
4. A Study of AdaBoost and Bagging Approaches on Student Dataset: G. T. Prasanna Kumari, Dr. M. Usha Rani; International Research Journal of
Advanced Engineering and Science, Volume 2, Issue 2, pp. 375-380, 2017, ISSN (Online): 2455-9024.
5. An Experimental Comparison of Three Methods for Constructing Ensembles of Decision Trees: Bagging, Boosting, and Randomization: THOMAS
G. DIETTERICH; Machine Learning, 40, 139–157, Kluwer Academic Publishers. Manufactured in The Netherlands.
6. Multiple classifier system for EEG signal classification with application to brain–computer interfaces: Amir Ahangi , Mehdi Karamnejad , Nima
Mohammadi , Reza Ebrahimpour , Nasoor Bagheri; Neural Comput & Applic (2013) 23:1319–1327 DOI 10.1007/s00521-012-1074-3.
7. A Data Mining Based On Ensemble Classifier Classification Approach for Edible Mushroom Identification: Muhammad Husaini; International
Research Journal of Engineering and Technology (IRJET), Volume: 05 Issue: 07 | July 2018.
8. Covariate Shift Estimation based Adaptive Ensemble Learning for Handling Non-Stationarity in Motor Imagery related EEG-based Brain-Computer
Interface: Haider Raza and Shang-Ming Zhou; Preprint submitted to Elsevier, May 4, 2018.
9. An Ensemble of Classifiers based Approach for Prediction of Alzheimer’s Disease using fMRI Images based on Fusion of Volumetric, Textural and
Hemodynamic Features: Fatima MALIK, Saima FARHAN, Muhammad Abuzar FAHIEM; Advances in Electrical and Computer Engineering
Volume 18, Number 1, 2018.
Abhishek Sharma, Sandeep Kumar Gupta Abhishek Pandey, Giridhari Paul, Biplab Kumar Sarkar, Ram
Authors:
Gopal
Paper Title: Four-Level Biometric Security System to Protect the Crucial Information from Unauthorized Access
Abstract: As the time is changing day by day our world is getting developed in the field of digital technology. We all are
connected nowadays on social networking sites such as Facebook, twitter, Instagram, and so on.
Other than these networking sites we visit multiple sites on our laptops/Personal computers/Tablet or any other types of
devices such as smartphones etc. So actually, we are surrounded by a huge amount of data around the world, and among
those data most of the data are our personal data which is so crucial for our identity and security purposes too.
178. With the developing technologies, threats to those important data is also increase as the there are many peoples who are
trying to snoop in your important drafts or file to fetch those important data and use them to blackmail you, earn money,
use you for their special purposes and even something worst which we can’t imagine. 969-974
In the Indian scenario, the Indian public is less secure than the other developed countries. India has the maximum no. of
Internet Data user and also many of them are not aware that how to protect their crucial Data from Snooping.
While defending the data from hacking is another field of invention but in this device, we are providing security to those
data or collection of Data which is stored in a specific device. By using this device, we can also protect our data from
hacking threats because by giving 4 parameters of Protection in which two of them are biological database makes all the
devices of the theft useless. Also, this device does not need any Internet connectivity which is a major of hackers for
hacking any device hence they also helpless in hacking of this device.
Keywords: FBS System, DNAFingerprinting, Biometric Impressions, Retina/Iris, Voice Recognition, Pin Hold.

References:
1. https://bigthink.com/philip-perry/new-dna-scanning-software-can-id-you-in-minutes.
2. https://www.ey.com/in/en/services/advisory/ey-global-information-security-survey-2016-2017-india-report
3. https://www.analyticsindiamag.com/annual-consumer-survey-on-data-privacy-in-india-2018/
4. http://www.bioelectronix.com/what_is_biometrics.html
5. https://en.wikipedia.org/wiki/Biometrics
6. https://en.wikipedia.org/wiki/Iris_recognition
7. https://en.wikipedia.org/wiki/Speaker_recognition
Authors: Geetha.M, Ganesan.R, Tallam Tharun Sai
Paper Title: Performance Analysis of the Machine Learning Algorithms on Heart Condition Predictions
Abstract: Now-a-days Health care monitoring widely uses Internet of Things (IoT) and big data which is further integrated
into wearable bio sensors. This paper is about finding the best algorithm for predicting the heart condition using different
machine learning algorithms. In this we have also included the basic Artificial Neural Networks algorithm for predicting
the heart condition of an individual.
In this work we had predicted the persons heat conditions by knowing some key attributes. By increasing the use of
machine learning algorithms, the accuracy of each algorithm is calculated and the quality and value of the health services
increases efficiency.
This is mainly about how different the algorithms predict and the accuracy of each algorithm. Here the ANN has the height
accuracy when compared to all other machine learning algorithms like, SVM-ploy, SVM-RBF, Naïve Bayes, Decision tree,
Random Forest, K-Nearest Neighbor.

Keywords: Decision Tree, K- nearest neighbour, Naive Bayes, Random forest, SVM Poly, SVM RBF, ANN (Artificial
Neural Networks using multi-layer Perceptron).

References:
1. Improvising Heart Attack Prediction System using Feature Selection and Data Mining Methods B. Kavitha* and R. Naveen Kumar Lecturer
Department of Computer Applications, Karpagam University Coimbatore, India International Journals of Advanced Research in Computer science,
VOLUME 1, No. 4, NOV-DEC 2010
2. Heart Disease Prediction System using Data Mining Techniques and Intelligent Fuzzy Approach: A Review V. Krishnaiah, G. Narsimha, N. Subhash
Chandra, Research Scholar, JNTUH Dept. of CSE, Hyderabad Telangana State, India International Journal of Computer Applications (0975 – 8887)
Volume 136 – No.2, February 2016
3. Heart Disease Prediction System Using Data Mining Techniques Abhishek Tanja Department of Computer Science, S.A. Jain College, Ambala City,
India. An International Open Free Access, Peer Reviewed Research Journal (Received: November 15, 2013; Accepted: November 25, 2013)
4. Automatic Heart Disease Diagnosis System Based on Artificial Neural Network (ANN) and Adaptive Neuro-Fuzzy Inference Systems (ANFIS)
Approaches Mohammad A. M. Abushariah, Assal A. M. Alqudah, Omar Y. Adwan, Rana M. M. Yousef Journal of Software Engineering and
179. Applications, Vol.7 No.12, November 28, 2014
5. An Effective Performance Analysis of Machine Learning Techniques for Cardiovascular Disease Department of Computer Science, Amrita School of 975-981
Engineering Bangalore Campus, Amrita Vishwa VidyaPeetham, Kasavanahalli, Carmelaram P.O., Bengaluru Applied Medical Informatics Vol. 36,
No. 1 /2015, pp: 23-32
6. Feature Analysis of Coronary Artery Heart Disease Data Sets Randa El-Bialy, Mostafa A. Salamay, Omar H. Karam and M. Essam Khalifa British
University in Egypt (BUE), Cairo, Egypt International Conference on Communication, Management and Information Technology. Procedia
Computer Science 65 (2015) 459 – 468
7. A Comprehensive Investigation and Comparison of Machine Learning Techniques in the Domain of Heart Disease Seyedamin Pouriyeh, Sara Vahid,
Giovanna Sannino, Giuseppe De Pietro, Hamid Arabnia, Juan Gutierrez, Department of Computer Science, University of Georgia, Athens, USA
Institute of High-Performance Computing and Networking (ICAR - CNR), Naples, Italy
8. Predictive and Descriptive Analysis for Heart Disease Diagnosis František Babič, Jaroslav Olejár Department of Cybernetics and Artificial
Intelligence, Faculty of Electrical Engineering and Informatics, Technical university of Košice, Slovakia Proceedings of the Federated Conference on
Computer Science and Information Systems pp. 155–163 DOI: 10.15439/2017F219 ISSN 2300-5963 ACSIS, Vol. 11
9. EARLY HEART DISEASE PREDICTIONUSING DATA MINING TECHNIQUES Aditya Methaila, Prince Kansal , Himanshu Arya , Pankaj
Kumar Netaji Subhas Institute of Technology,India and 2 Student, B.Tech (CSE), Maharaja Surajmal Institute of Technology New Delhi, India
Sundarapandian et al. (Eds) : CCSEIT, DMDB, ICBB, MoWiN, AIAP – 2014 DOI : 10.5121/csit.2014.4807
10. Effective heart disease prediction system using data mining techniques Poornima Singh, Sanjay Singh, Gayatri S Pandi-Jain L. J. Institute of
Engineering and Technology, Gujarat Technological University, Institute of Life Sciences, School of Science and Technology, Ahmedabad
University, Ahmedabad, Gujarat, India International Journal of Nanomedicine, Volume 13, T-NANO 2014
11. BACKPROPOGATION NEURAL NETWORK FOR PREDICTION OF HEART DISEASE NABEEL AL-MILLI Financial and Business
Administration and Computer Science Department Zarqa University College Al-Balqa' Applied University Journal of Theoretical and Applied
Information Technology 10th October 2013. Vol. 56 No.1
12. Comparative Study of Classification Techniques (SVM, Logistic Regression and Neural Networks) to Predict the Prevalence of Heart Disease
Divyansh Khanna, Rohan Sahu, Veeky Baths, and Bharat Deshpande International Journal of Machine Learning and Computing, Vol. 5, No. 5,
October 2015
13. Seyedamin Pouriyeh, Sara Vahid, Giovanna, Sannino, Giuseppe De Pietro, Hamid Arabnia, Juan Gutierrez. "A comprehensive investigation, and
comparison of Machine Learning Techniques in the domain of heart disease", 2017 IEEE Symposium on Computers and Communications (ISCC),
2017
14. En.wikipidia.org
15. Submitted to Texas A&M University, College Station
16. https://archive.ics.uci.edu/ml/datasets/heart+Disease
Authors: N.GANESH, R.C. NARAYANAN
Paper Title: Multilevel Secured Finger Print Payment System Simulation using Android
180. Abstract: Owing to a lot of hacks and other security concerns with respect to the card payment system, biometrics is next
in line as the authentication module for payment systems. The hassle the user has to put up with in a card payment system
982-985
by having to carry different cards and having to remember passwords is appalling and losing the card is another issue
altogether. Usually fingerprints are used to authenticate the card and pin number that have been entered.Our system has
been designed to let customers pay the bills using only their registered mobile number and fingerprint. In this paper, we
have developed a simulation of an android application that is used on the sales side to emulate the process of authenticating
a user using his fingerprint to let him access his prepaid balance and make his payment to the retail store. The proposed
system uses multilevel security using SHA 256 and AES algorithm.

Keywords: Finger Print Payment; Simulation; AES; SHA 256; Android App

References:
1. Adegboyeg,, Secure on-Line Transaction through Augmented Biometrics System, Global Journal of Computer Science and Technology: G
Interdisciplinary Volume 15 Issue 2 Version 1.0 Year 2015, ISSN: 0975-4350
2. Oginni Simon Oyewole, El-Maude, JibreelGambo, Mohammed Abba, Michael Ezekiel Onuh, Electronic Payment System and Economic Growth:
Review of Transition to Cashless Economy in Nigeria, International Journal of Scientific Engineering and Technology Volume No.2, Issue No.9, pp :
913-918 1 Sept. 2013, (ISSN : 2277-1581).
3. SulochanaSonkamble, Dr.RavindraThool, BalwantSonkamble, Survey Of Biometric Recognition Systems And Their Applications, Journal Of
Theoretical And Applied Information Technology © 2005 - 2010 Jait.
4. Shweta Gaur, V.A.Shah, Manish Thakkar, Biometric Recognition Techniques: A Review, International Journal of Advanced Research in Electrical,
Electronics and Instrumentation Engineering, Vol. 1, Issue 4, October 2012.
5. Sravya V, Radha Krishna Murthy, RavindraBabuKallam,Srujana B., A Survey on Fingerprint Biometric System, International Journal of Advanced
Research in Computer Science and Software Engineering , Volume 2, Issue 4, April 2012 ISSN: 2277 128X.
6. VishalVishwasJadhav,RahulRatnakarPatil,RohitChandrashekarJadhav,AdwaitNiranjanMagikar,Proposed E-payment System Using Biometrics,
International Journal of Computer Science and Information technologies,Vol.6(6),2015,4957-4960,ISSN:0975-9646.
Authors: Daneena Deeksha Dsouza, Deepika, Divya P Nayak, Elveera Jenisha Machado, Adesh N. D.
Paper Title: Sentimental Analysis of Student Feedback using Machine Learning Techniques
Abstract: Educational institutions attempt to collect feedback from students to study their sentiment towards courses and
facilitates provided by the institution to improve the college environment. In present scenario, grading technique is used for
feedback. This grading technique does not reveal the true sentiment of students, but the textual feedback provides a chance
to the students to highlight certain aspects. In this paper, a method has been proposed for sentimental analysis of student
feedback using machine learning algorithms such as Support Vector Machine, Multinomial Naïve Bayes Classifier, and
Random Forest. A comparative analysis is also conducted between these machine learning techniques. The experimental
results suggest that Multinomial Naïve Bayes Classifier is more accurate than other methods.

Index Terms: Sentimental analysis, Multinomial naïve Bayes, Machine Learning

References:
1. Z Nasim, Q Rajput, S Haider. “Sentiment Analysis of Student Feedback Using Machine Learning and Lexicon Based Approaches”, pp.1-6, 2017.
2. Z. Nanli, Z. Ping, L. I. Weiguo, C. Meng, “Sentiment Analysis: A Literature Review”, Proceedings of the 2012 IEEE ISMOT, pp. 572-576, 2012.
3. B. K. Bhavitha, A. P. Rodrigues, N. N Chiplunkar, “Comparative Study of Machine Learning Techniques in Sentimental Analysis”. International
Conference on Inventive Communication and Computational Technologies, pp.216-221, 2017.
4. K. S. Krishnaveni, Rohit R Pai, V. Iyer, “Faculty Rating System Based on Student Feedbacks Using Sentimental Analysis”, International Conference
on Advances on Computing, Communication and Informatics, pp.1648-1653, 2017.
5. M. A. Ullah,” Sentiment analysis of students feedback: a study towards optimal tools”, International Workshop on Computational Intelligence
(IWCI), pp. 17-180, 2016.
6. M. D. Devika, Sunitha, A. Ganesh “Sentiment Analysis: A Comparative Study on Different Approaches”, Fourth International Conference on Recent
Trends in Computer Science & Engineering, Procedia Computer Science 87, pp. 44 – 49,2016.
181. 7. A. P Jain, P. Dandannavar, “Application of Machine Learning Techniques to Sentiment Analysis”, Proceeding of 2018 IEEE International Conference
on Current Trends toward Converging Technologies, pp. 628-632, 2018.
8. M. BAYGIN, “Classification of Text Documents based on Naive Bayes using N-Gram Features”, International Conference on Artificial Intelligence 986-991
and Data processing (IDAP), pp. 1-5, 2018.
9. X. Fang, J. Zhan, “Sentiment analysis using product review data", Journal on Bigdata, pp.2-5, 2015.
10. VaderSentimental Analysis [Online], www.github.com/cjhutto/vadarSentiment/blob/master/README.rst/introduction; [Accessed May 7, 2019]
11. T. M. Mitchell, Machine Learning, India Edition 2013, McGraw Hill Education.
12. Y. Huang, Lei Li, “Naive Bayes classification algorithm based on small sample set”, Proceedings of IEEE International Conference on Cloud
Computing and Intelligence System, pp.34-39, 2011.
13. H. P. Patil and M. Atique, "Sentiment Analysis for Social Media: A Survey," 2nd International Conference on Information Science and Security
(ICISS), Seoul, pp. 1-4, 2015.
14. G. Qiang, “Research and Improvement for Feature Selection on Naive Bayes Text Classifier”, 2nd International Conference on Future Computer and
Communication, pp. V2-156-V2-159, 2010.
15. W. Medhat, A. Hassan, H. Korashy, “Sentiment analysis algorithms and applications: A survey”, Ain Shams Engineering Journal, pp. 1093–1113,
2014.
16. J. Singh, G. Singh and R. Singh, “Optimization of sentiment analysis using machine learning classifers”, Human-centric Computing and Information
Sciences, Volume 8, Number 1, 2018.
17. Xu, Shuo & Li, Yan, Zheng, Wang, “Bayesian Multinomial Naïve Bayes Classifier to Text Classification”, pp. 347-352, 2017.
18. Wang, Yong & Hodges, Julia & Tang, Bo, Classification of Web Documents Using a Naive Bayes Method. IEEE Transactions on Applications and
Industry, pp.560- 564, 2003.
19. J. Maier and K. Ferens, "Classification of english phrases and SMS text messages using Bayes and Support Vector Machine classifiers," 2009
Canadian Conference on Electrical and Computer Engineering, St. John's, NL, pp. 415-418, 2009.
20. Bouazizi M., & Ohtsuki T. Sentiment analysis in twitter: From classification to quantification of sentiments within tweets. 2016 IEEE Global
Communications Conference, GLOBECOM, 2016.
21. N. Sharma and M. Singh, "Modifying Naive Bayes classifier for multinomial text classification," 2016 International Conference on Recent Advances
and Innovations in Engineering (ICRAIE), Jaipur, pp. 1-7, 2016.
22. S. K. Khatri and A. Srivastava, "Using sentimental analysis in prediction of stock market investment," 2016 5th International Conference on
Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), pp. 566-569, 2016.
Authors: Sajid Marickar, D.Rajasekar
Paper Title: An Empirical Research on Online Shopper Profiling & Online Shopper Motivations in Dubai
182. Abstract: This article aims to understand the online shopping market in the United Arab Emirates (UAE) and identify the
emerging trends in this sector. A primary data survey questionnaire is prepared with an unrestricted control group and 992-995
circulated by convenience sampling method which becomes the methodology of this research article. A comparative study
of the existing secondary market data, based on the available research about on online and mobile shopping is also
completed.
Based on the above, the study aims to identify the observations and key findings to shed light into unknown areas of this
subject are explored. The primary data is analyzed using various statistical analysis methods. Furthermore, conceptual
theory is considered as for the research design of the study. The observations include the detailed interactions of various
demographics of consumers and how they shop online. In conclusion, a comparative study of online vs. brick and mortar
shopping is also integrated using SWOT analysis. This becomes the basis for conclusion, recommendations and theory
construction.

Index Terms: Online shopping, Shopper Behavior, Mobile Purchase, Millennial Vs. Others.

References:
1. Bilgihan, A. &. (2015). The effect of website features in online relationship marketing: a case of online hotel booking. Electronic Commerce Research
and Applications, 222-232.
2. Chiu, C. M. (2014). Understanding customers repeat purchase intentions in B2C e-commerce: The roles of utilitarian value, hedonicvalue and
perceived risk. Information Systems Journal, 24(1), 85–114.
3. Haddock, G. M. (2008). The moderating effects of need for affect and need for cognition. Personality and Social Psychology Bulletin, 34(6), 769–
778.
4. Ho, S. Y. (2014). The effects of Web personalization on user attitude and behavior: An integration of the elaboration likelihood model and consumer
search theory. MIS Quarterly.
5. Koufaris, M. &.-S. (2004). Development in Online Trust of an online company by new shoppers. Information and Management, 377-397.
6. Lazarevic, V. (2012). Encouraging brand loyalty in fickle generation Y consumers. Young Consumers, 45-61.
7. Noar, S. M. (2007). Meta-analytic review of tailored print health behavior change interventions. Psychological Bulletin, 673-693.
8. Paypal. (2018). Cross-Border Consumer Research. Paypal.
Authors: Arun.E, P.D.Arumairaj
Paper Title: Application of Geopolymer in Stabilization of Soft Clay
Abstract: Stabilization of soil has become imperative in the recent past. This study mainly concentrates on the application
of geopolymers in stabilization of soft clay. Geopolymers are materials that are covalently bonded which forms amorphous
network. Fly ash, metakaolin, ground granulated blast furnace slag, rice husk ash, and few more materials were earlier used
for geopolymerization. In this study, ash from Prosopis juliflora was used. Prosopis juliflora is an invasive plant which has
created a negative biodiversity that sucks too much of groundwater by deep penetration of their roots. This results in quick
ground water depletion. Mass cutting of this plant makes this as a waste material. Geopolymer generally needs an alkali
material to be added to it. Sodium hydroxide and Sodium silicate were used as alkali activators. The molar concentration of
Sodium hydroxide was varied between 4 M, 8 M and 12 M. 8M gave maximum UCS value. The addition of Prosopis
juliflora ash was varied between 5%, 15% and 25%. Addition of 15% ash gave maximum UCS value. The soil was
characterized by performing Unconfined Compressive Strength (UCS) test before and after stabilization. The
microstructural studies of Prosopis juliflora ash was performed using Scanning Electron Microscope (SEM) and Energy
183. Dispersive X-Ray Analysis (EDAX) tests.
996-999
KEYWORDS: Geopolymer, Soft clay, Prosopis juliflora, UCS Test, SEM, EDAX

References:
1. George Amal Anik S, Parthiban Kathirvel, Murali G, 2018, "Effect of Utilizing Prosopis Juliflora Ash as Cementitious Material".
2. A.Durai Murugan, M.Muthuraja, 2017, "Experimental Investigation on Prosopis juliflora ash as a Partial Replacement of Cement in Conventional
Concrete".
3. Raghu K, Sharath V. T Naveen Y, Bharath Kumar, Yogesha B.S, 2017, "Experimental Investigation on Partial Replacement of Cement by Mesquite
(Prosopis Juliflora) Wood Ash in Concrete".
4. Jeetendra Ahirwar, Maninder Kaur, Pradeep Kumar, 2016, "Stabilization of Expansive Soil (Black Cotton soil) Using Geopolymer".
5. Son Hoang Trinh, Quynh Anh Thi Bui, 2018, "Influencing of Clay and Binder Content on Compression Strength of Soft Soil Stabilized by
Geopolymer Based Fly Ash".
6. Tan-No NGUYEN, Anh-Tuan LE and Minh-Tam NGUYEN, 2017, "Factors Influencing Strength Development in Soft Soil Clay Mixed Rice Husk
Ash Based Geopolymer".
7. P. VenkaraMuthyalu, K. Ramu and G.V.R. Prasada Raju, 2012, "Study on performance of chemically stabilized expansive soil".
8. Sivaraman.S, Thillaibackiam.M, 2015, "Effect of Industrial Waste and Geopolymers on Stabilization of Expansive Clay".
Authors: Riya Sara Joy, Reneesh C Zacharia
Paper Title: Low Power Hardware Efficient Comparator Using Full Swing 3T XNOR
Abstract: This paper describes a new full swing 3T XNOR for low power, hardware efficient comparator design. This 3
transistor(3T) XNOR can achieve full output swing at an operating voltage one with lesser power and dimension of
energy(power delay product) compared to the conventional XNOR designs. Thereby proposed low power area efficient
comparator circuits can play a vital role in encryption systems, error detecting circuits, complex ALUs, and DSPs, where
power, speed, and area are the major constraints. By realizing this hardware efficient proposed comparator, achieve
complex circuit optimization. The proposed hardware is deliberate using CADENCE 5.1.0 EDA tool and simulated in
spectre virtuoso.
184.
1000-
Keywords: comparator; full swing 3T XNOR; low power; optimization; cadence(tool). 1003
References:
1. Manikannan. G, Mahendran. K & Prabakaran. P, 2017, “Low Power High Speed Full Adder Cell with XOR/XNOR Logic Gates in
90nmTechnology”, IEEE International Conference on Technical Advancements in Computers and Communications
2. Jayanth S & Poorvi M.B, 2016, “ An Ultra-Low Area and Full-Swing Output 3T XNOR Gate Using 45nm Technology”, IEEE International
Conference on Advanced Computing and Communication Systems
3. Manish Trikha, 2015, “Area-Efficient Layout Design of Comparator using Cascaded Technique”, International Conference on Advances in Computer
Engineering and Applications
4. Chandrahash Patel & Veena C. S, 2014, "Comparator Design Using Full Adder", International Journal of Researach in Engineering and Technology,
vol.3
5. Hamed Naseri & Somayeh Timarchi, 2018, " Low-Power and Fast Full Adder by Exploring New XOR and XNOR Gates" IEEE Transactions on Very
Large Scale Integration, 2018
6. Majid Amini, Valashani & Sattar Mirzakuchaki, 2016, "A novel fast, low power and high-performance XORXNOR cell", IEEE International
Symposium on Circuits
7. Sumeer Goel & Mohamed A. Elgamel, 2006, " Design methodologies for high-performance noise-tolerant XOR-XNOR circuits", IEEE Transactions
on Circuits and System
8. N. H. E. Weste, D. Harris & A. Banerjee, 2006, CMOS VLSI Design:A Circuits and Systems Perspective, 3rd ed. Delhi, India: Pearson Education
9. J. M. Rabaey, A. Chandrakasan, and B. Nikolic, Digital Integrated Circuits: A Design Perspective, 2nd ed. Delhi, India: Pearson Education, 2003.
10. Arvind kumar & Manoj Kumar, 2017, "Improved design of CMOS 1- Bit Comparator with Stacking Technique", 2nd International Conference on
Telecommunication and Networks
11. Dwip Narayan Mukherjee, Saradindu Panda & Bansibadan Maji, 2017, "Design of Low Power 12-bit Magnitude Comparator", Devices for Integrated
Circuit (DevIC), pp. 23-24
12. Nabijah Ahmad & Rezaul, 2011, “A New Design of XOR-Xnor gates for low power application”, International Conference on Electronic
Devices,Systems and Applications(ICEDSA)
13. Sung-Mo Kang & Yusuf Leblebici, “CMOS Digital Integrated Circuits Analysis and Design”, TMH 3rd edition.
14. M. Hassan & R. Mehra, 2015, “Design Analysis of 1-bit CMOS comparator”, International Journal of Scientific Research Engineering & Technology
(IJSRET) ISSN: 2278–0882, pp. 68-72
15. B. M. Dharmendra, B. Arun & B. Nandurbarkar, 2014, “ Study and Implementation of Comparator in CMOS 50 NM Technology” International
Journal of Research in Engineering and Technology(IJRET), ) ISSN: 2321- 7308, Volume-3,Issue-2, pp. 252- 255
16. S. Kang & Y. Leblebici, 2003, CMOS Magnitude Integrated Circuit, Analysis and Design (Tata McGraw-Hill, 3rd Ed), pp. 295-302.
Authors: G Rajesh, P. Venkata Krishna
Paper Title: A Cross Layer based Bandwidth Management scheme for Next Generation Wireless Networks
Abstract: As the bandwidth is a scarce resource, efficient mechanisms are required to efficiently use the available
bandwidth. Hence, in this paper, cross layer-based bandwidth management for next generation wireless networks (CLBMS)
is proposed. Network layer and the application layer are used to design the cross-layer architecture. Various types of
services classified as Service level, SL 1, SL 2, and SL 3 with highest priority for SL 1 followed by SL 2 and SL 3 are
considered in the case of application layer. Bandwidth and delay are the parameters considered in the case of the network
layer. The database that can be shared is utilised to access the parameters amid various layers in the network. The proposed
algorithm, CLBMS is implemented and assessed for the parameters, total flow acceptance, probability of the originating
calls that gets blocked and probability of the handoff calls that gets dropped. The performance of the proposed algorithm,
CLBMS is compared with Adaptive Bandwidth Binning for bandwidth management (ABB) scheme and proved to be
performing better.

Keywords: cross layer, bandwidth management, wireless network, blocking probability, dropping probability.

References:
1. Krishna, P., & Iyengar, S. (2007). A cross layer based QoS model for wireless and mobile ad hoc networks. Mobile Communication, 1, 114-120.
2. Krishna, P. V., Obaidat, M. S., Misra, S., & Saritha, V. (2009, May). An efficient 802.11 medium access control method and its simulation analysis.
In 2009 IEEE/ACS International Conference on Computer Systems and Applications (pp. 330-335). IEEE.
3. Misra, S., Krishna, P. V., & Saritha, V. (2012). LACAV: an energy-efficient channel assignment mechanism for vehicular ad hoc networks. The
Journal of Supercomputing, 62(3), 1241-1262. DOI: 10.1007/s11227-011-0552-1
4. Misra, S., Krishna, P. V., & Saritha, V. (2012). An efficient approach for distributed channel allocation with learning automata-based reservation in
cellular networks. Simulation, 88(10), 1166-1179. Doi: 10.1177/0037549711420175
5. Venkata Krishna, P., Misra, S., Obaidat, M. S., & Saritha, V. (2009, March). A new scheme for distributed channel allocation in cellular wireless
networks. In Proc. of 12th ACM/SCS Communications and Networking Simulation Symposium (CNS), San Deigo, USA (pp. 22-27).
6. Misra, S., Krishna, P. V., & Abraham, K. I. (2011). Learning automata solution for medium access with channel reservation in wireless networks.
Wireless Personal Communications (WPS), Springer, 56(1), 55-72.
7. Krishna, P. V., Misra, S., Obaidat, M. S., & Saritha, V. (2009). Virtual backoff algorithm: An enhancement to 802.11 medium-access control to
185. improve the performance of wireless networks. IEEE Transactions on Vehicular Technology, 59(3), 1068-1075.
8. Krishna, P. V., Misra, S., Obaidat, M. S., & Saritha, V. (2009). An efficient approach for distributed dynamic channel allocation with queues for real- 1004-
time and non-real-time traffic in cellular networks. Journal of Systems and Software, 82(7), 1112-1124. (Elsevier) DOI: 10.1016/j.jss.2009.01.043 1009
9. Misra, S., Krishna, P. V., Bhiwal, A., Chawla, A. S., Wolfinger, B. E., & Lee, C. (2012). A learning automata-based fault-tolerant routing algorithm
for mobile ad hoc networks. The Journal of Supercomputing, 62(1), 4-23. Doi: 10.1007/s11227-011-0639-8
10. Krishna, P. V., Iyengar, N. C. S., & Misra, S. (2008). An efficient Hash Table-Based Node Identification Method for bandwidth reservation in hybrid
cellular and ad-hoc networks. Computer Communications, 31(4), 722-733.
11. Krishna, P. V., & Iyengar, N. C. S. (2008). Optimal channel allocation algorithm with efficient channel reservation for cellular networks. International
Journal of Communication Networks and Distributed Systems, 1(1), 33-51.
12. Krishna, P. V., & Iyengar, N. C. S. (2008). Sequencing technique: an enhancement to 802.11 medium access control to improve the performance of
wireless networks. International Journal of Communication Networks and Distributed Systems, 1(1), 52-70.
13. Saha, M., & Krishna, P. V. (2012). Bandwidth Management Framework for Multicasting inWireless Mesh Networks. International Journal of
Information and Electronics Engineering, 2(3), 421.
14. Iyengar, N. C. S., & Venkata Krishna, P. (2008). Design of sequencing medium access control to improve the performance of wireless networks.
Journal of computing and information technology, 16(2), 81-89.
15. Krishna, P. V., Iyengar, N. C. S., & Misra, S. (2007, November). An approach for bandwidth reservation in ad-hoc networks having infrastructure
support. In Proceedings of the 7th Conference on 7th WSEAS International Conference on Applied Computer Science (pp. 409-415).
16. H. Balakrishnan, V. Padmanabhan, S. Seshan, and. Katz.” A comparison of mechanisms for improving TCP performance over wireless links”. In
Proceedings of ACM SIGCOMM’96, Stanford, California, Aug. 1996.
17. IEEE 802.11WG, Part 11:Wireless LAN medium access control (MAC) and physical layer (PHY) specifications, Standard, Aug. 1999.
18. F. Tobagi and L. Kleinrock, “Packet Switching in Radio Channels: Part II — The hidden Terminal Problem in Carrier Sense Multiple-Access Modes
and the Busy-Tone Solution,” IEEE Trans. Net., vol. 23, no. 12, 1975, pp. 1417–33.
19. Z. Fu, P. Zerfos, H. Luo, S. Lu, L. Zhang, M. Gerla “The Impact of Multihop Wireless Channel on TCP Throughput and Loss,” Proc. IEEE
INFOCOM, San Francisco, USA, Apr. 2003.
20. Rolf Winter and Jochen H. Schiller, FreieUniversität Berlin. (2006).CrossTalk: cross-layer decision support based on global knowledge, IEEE
Communications Magazine, Vol. 44, Issue 1, pp.93 – 99.
21. V. Srivastava, M. Motani. (2005). Cross-layer design: a survey and the road ahead, IEEE Communications Magazine, vol. 43, no.12, pp. 112–119.
22. Lee, O., Kim, J., & Choi, S. (2015, June). Wizizz: Energy efficient bandwidth management in ieee 802.11 ac wireless networks. In 2015 12th Annual
IEEE International Conference on Sensing, Communication, and Networking (SECON) (pp. 136-144). IEEE.
23. Hong, G., Martin, J., & Westall, J. (2019). Adaptive bandwidth binning for bandwidth management. Computer Networks, 150, 150-169.
24. Wei, Y., Wang, J., & Wang, C. (2010, November). A traffic prediction based bandwidth management algorithm of a future internet architecture. In
2010 Third International Conference on Intelligent Networks and Intelligent Systems (pp. 560-563). IEEE.
25. Falowo, O. E., & Chan, H. A. (2007). Adaptive bandwidth management and joint call admission control to enhance system utilization and QoS in
heterogeneous wireless networks. EURASIP Journal on Wireless Communications and Networking, 2007(3), 2.
26. M. Shreedhar, G. Varghese, Efficient fair queuing using deficit round-robin, IEEE/ACM Trans. Netw. 4 (3) (1996) 375–385.
27. J. Nagle, On packet switches with infinite storage, Commun. IEEE Trans. 35 (4) (1987) 435–438.
28. A.K.J. Parekh, A Generalized Processor Sharing Approach to Flow Control in In- tegrated Services Networks, 1992 Ph.D. thesis.
29. A. Demers, S. Keshav, S. Shenker, Analysis and simulation of a fair queueing al- gorithm, in: ACM SIGCOMM Computer Communication Review,
19, ACM, 1989, pp. 1–12.
30. S.J. Golestani, A self-clocked fair queueing scheme for broadband applications, in: INFOCOM’94. Networking for Global Communications., 13th
Proceedings IEEE, IEEE, 1994, pp. 636–646.
Authors: Prince Arulraj G., Illamathi, Jayashree
Paper Title: An Experimental Reasearch on Piers Made with Waste Plastic Bottles
Abstract: This paper deals with “An experimental investigation on piers made with waste plastic bottles”. One of the main
problems faced by the construction industry is the high cost of the building materials. Materials are the primary
requirement for construction. In places where people are below poverty line, the high cost of building materials is
becoming one of the most significant problems. Clay bricks are commonly used for the construction of houses. Production
of clay bricks results in the liberation of Oxides of Sulphur and Carbon. Even though fly ash bricks avoid the liberation of
the greenhouse gases, it is beyond the reach of poor people. On the other hand, urbanization generates waste materials,
especially the non-degradable ones. Eco friendly architectural principles are being incorporated into more buildings every
day in the world, but they are still out of reach of many people due to lack of knowledge and awareness. An attempt has
been made to build low cost houses using waste plastic bottles along with chicken mesh, providing adequate thermal
comfort while being sustainable.The innovative idea reduces the requirement of clay and fly ash bricks at the same time
protects the environment from pollution.Strength of bottle blocks were determined for three l/d ratios and the strengths
186.
were compared with that of clay brick masonry. It was found that the strength of bottle masonry reinforced with chicken 1010-
mesh was more that that of the conventional brick masonry. The cost of bottle masonry is also comparable with that of 1013
brick masonry.

Keywords: Urbanization, Eco friendly, Plastic bottle, masonry, Brick masonry

References:
1. Andreas Froese (2001), ‘Plastic bottles in construction who is the founder of ECO-TEC’, http://www.eco-tecnologia.com
2. MojtabaValinejadShoubi. andAzinShakibaBarough.; ‘Investigating the Application of Plastic Bottle as a Sustainable Material in the Building
Construction’, International Journal of Science, Engineering and Technology Research (IJSETR) Volume 2, Issue 1, January 2013 ISSN: 2278 – 7798
3. Pratima Patel and Akash Shah.; ‘Sustainable development using waste PET bottles as construction element’ www.wastebottleconstruction.com
4. PuttarajMallikarjunHiremath andShanmukhaShetty.; ‘Utilization Of Waste Plastic In Manufacturing Of Plastic-Soil Bricks’, International journal of
technology enhancements and emerging engineering research, volume 2, issue 4, ISSN 2347-4289
5. ShilpiSaxena and Monika Singh.; ‘Eco-Architecture: PET Bottle Houses’, International Journal of Scientific Engineering and Technology Volume
No.2, Issue No.12, pp: 1243-1246 1 Dec 2013, ISSN: 2277-1581
Authors: Gaurav Bathla, Varinder Singh Rana, Amrik Singh, Kusum
Assessing the Skills Required by Hospitality Management Graduates from the Viewpoints of Educators in
Paper Title:
Punjab
Abstract: This study evaluated the important skills required by hospitality management graduates of Punjab from the
viewpoints of educators. Questionnaire as the main tool was used to gather the data from the hospitality educators of
Punjab which are included in the study population, first Part of the questionnaire targeted to collect the information relates
to the demographic profile of respondents and the statements in the second part contains statements based on 4- point
Likert scale stretching from 1 -Not Important to 4 - very important to rate the importance of each skill by the educators.
Results of the study divides sixteen skills into three new domains as Efficiency & Leadership, Computational &
Management, and Self-Development & Applied. Further it is also recommended to benchmark hospitality management
curricula with the top rated universities of the world in order to produce more employable graduates and hospitality
teaching should be more practical oriented to inculcate skills among students.

Keywords: hospitality management curricula, skills, benchmark, hospitality educators, efficiency & leadership,
computational & management, self-development & applied

References:
1. Agut, S., Grau, R., & Peiró, J. M. (2003). Competency needs among managers from Spanish hotel and restaurants and their training demands.
187. International Journal of Hospitality Management, 22(3), 281–295.
2. Connolly, P., & McGing, G. (2006). Graduate education and hospitality management in Ireland. International Journal of Contemporary Hospitality 1014-
Management, 18(1), 50–59. 1017
3. Huang, Y. L., & Lin, C. T. (2010). Management trainee core competencies in the hospitality industry: Differences between managers and scholars.
Journal of Human Resources in Hospitality & Tourism, 10(1), 1–13.
4. HVS Global Hospitality Services. (2011). Hotel room supply, capital investment and manpower requirement by 2021 India. Retrieved from
http://rss.hsyndicate.com/file/152004848.pdf
5. HVS Global Hospitality Services. (2012). Indian hotel industry survey, 2010-2011. Retrieved from http://www.hvs.com/Content/3216.pdf
6. Ineson, E. M., & Alexieva, R. (2011). Success in hotel management: Implications for M-level course design in Bulgaria. Journal of Hospitality,
Leisure, Sport and Tourism Education, 10(2), 30–49.
7. Jauhari, V. (2006). Competencies for a career in the hospitality industry: An Indian perspective. International Journal of Contemporary Hospitality
Management, 18(2), 123–134.
8. Johanson, M., Ghiselli, R., Shea, L. J., & Roberts, C. (2011). Changing competencies of hospitality leaders: A 25-year review. Journal of Hospitality
& Tourism Education, 23(3), 43–47.
9. Li-Ting (Grace) Yang PhD, Charles G. Partlow PhD, Jaisree Anand PhD & Vimal Shukla MS (2014) Assessing the Competencies Needed by
Hospitality Management Graduates in India, Journal of Hospitality & Tourism Education, 26:4, 153-165, DOI: 10.1080/10963758.2014.959963
10. Partlow, C. G., & Simon, K. V. (2009, October). Challenges and recommendations for redefining hospitality education in India. Paper presented at the
Euro CHRIE Conference, Helsinki, Finland.
11. Sarkodie, N. & K. (2015). Bridging the Gap between Hospitality/Tourism Education and Hospitality/Tourism Industry in Ghana. International Journal
of Research in Humanities and Social Studies, 2(7), 114–120. Retrieved from http://www.ijrhss.org/pdf/v2-i7/13.pdf
12. Tesone, D.V., & Ricci, P. (2006). Toward a definition of entry-level job competencies: Hospitality manager perspectives. International Journal of
Hospitality and Tourism Administration, 7(4), 71-86.
Authors: Jabeen Sultana, M. Usha Rani, M.A.H. Farquad
Paper Title: Student’s Performance Prediction Using Deep Learning and Data Mining Methods
Abstract: Educational organizations are unique and play utmost significant role for the development of any country. As
Education transforms the lives of individuals, families, communities, societies, countries and ultimately the world! This is
why we live comfortable lives today. Now a day’s education is not limited to only the classroom teaching but it goes
beyond that like Online Education System, Web-based Education System, Seminars, Workshops, MOOC course. becomes
It’s more challenging to Predict student’s performance because of the huge bulks of data stored in the environments of
Educational databases, Learning Management databases. Students’ performance can be evaluated with the help of various
available techniques. Data Mining is the most prevalent techniques to evaluate students’ performance and is extensively
used in Educational sector known as Educational data mining. It is evolving area of study that emphases on various
techniques of data mining like classification, prediction, feature selection. It is employed on learning records or data related
to education to predict the students’ performance and learning behavior by extracting the hidden knowledge. EDM is a
methodology or like a procedure which is used to mine valuable information and patterns or forms from a massive
educational database. Subsequently, the student’s performance is predicted from the obtained useful information and
patterns. The prime motto of our study is to discover the performance of students using some classification techniques and
discovering the best one which yields optimal results. Educational Dataset is collected from a Saudi University database.
The dataset is pre-processed to filter duplicate records; missing fields are identified and filled with the destined data. Deep
Learning techniques like Deep Neural Net and Data Mining techniques like Random Forest, SVM, Decision Tree and
Naïve Bayes are employed on the data set using Weka and Rapid Miner tools. Results achieved are evaluated on few
metrics. Deep Neural Network and Decision Tree outstands in predicting students’ performance compared to other
techniques by producing deep predictions and obtains the best results like high accuracy, kappa-statistic, Sensitivity and
Specificity are also determined.

Keywords: Educational Data Mining (EDM), Deep Learning, Random Forest, Decision Tree, Naïve Bayes and SVM.
188. References: 1018-
1. J. Schmidhuber, Deep learning in neural networks: An overview. Vol.61, pp.85–117, 2015.
2. Han, pei and Kamber, Data Mining Concepts and Techniques, The Morgan Kaufmann series in data management systems, 3rd edition, 2011. 1021
3. Pena A. Educational data mining: A survey and a data mining-based analysis of recent works. Expert systems with applications, vol.41 (4), 1432–
1462, 2014.
4. Oyerinde et al. Predicting Students’ Academic Performances-A Learning Analytics Approach using Multiple Linear Regression, International Journal
of Computer Applications, Vol.157, No.4, pp.37-44, 2017.
5. Amrieh et al. Mining Educational Data to Predict Student’s academic Performance using Ensemble Methods, International Journal of Database
Theory and Application, Volume 9, issue 8, pp.119-136, 2016.
6. Scheuer et al., Educational data mining. In Encyclopedia of the sciences of learning pp. 1075–1079, Springer, 2012.
7. Romero & Ventura, Educational data mining: a review of the state of the art. IEEE Transactions on Systems, Man and Cybernetics, vol. 0 (6), pp.
601–618, 2010.
8. Sultana et al. An Extensive Survey on Some Deep Learning Applications, SSRNe-journal, 2018.
9. Rokach & Maimon, Data mining with decision trees: theory and applications. World scientific. 2014.
10. Yukselturku et al. Predicting dropout student: an application of data mining methods in an online education program. European Journal of Open,
Distance and eLearning, vol.17(1), pp.118- 133, 2014.
11. Jayaprakash et al. Early alert of academically at-risk students: An open source analytics initiative. Journal of Learning Analytics, vol.1(1), pp. 6–47,
2014.
12. Livieris, et al. Predicting students performance using artificial neural networks, 8th PanHellenic conference with International participation
Information and communication technologies, pp.321-328, 2012.
13. Baker et al. Educational data mining and learning analytics. In Learning analytics pp. 61–75, Springer. 2014.
14. Sultana et al. Prediction of Sentiment Analysis on Educational Data based on Deep Learning Approach. 21st Saudi Computer Society National
Computer Conference (SCSNCC). IEEE, 2018.
15. Meyer, D. Support vector machines the interface to libsvm in package e1071. 2014.
16. Sultana, J. Jilani, A.K. Predicting Breast Cancer using Support vector Machine and Multi-classifiers. International Journal of Engineering and
Technology, Special Issue Vol. 7. No.4 20, pp.22-26, 2018.
17. Quinlan. R. Induction of decision trees. Machine Learning, vol.1, 81-106, 1986.
18. WEKA http://www.cs.waikato.ac.nz/_ml/weka.
19. Hall et al.. The WEKA data mining software: an update. SIGKDD Explorations, 11(1). 2009.
20. Leo Breiman. Random forests, Machine Learning:45(1)-5-32, 2001.
21. J. Platt: Fast Training of Support Vector Machines using Sequential Minimal Optimization. In B. Schoelkopf and C. Burges and A. Smola, editors,
Advances in Kernel Methods-Support Vector Learning, 1998.
Authors: Vinayambika S. Bhat, Akshitha G. Shettigar, Nikhitha, Nidhi Dayanand, K. P. Vishal Kumar
Paper Title: Analysis of PID Control Algorithms for Transfer Function Model of Electric Vehicle
Abstract: In Electric Vehicles (EV) energy is stored in rechargeable batteries which is used to drive one or more electric
motors. As electric vehicles are making big waves in automobiles world, modelling and simulation of Electric Vehicle have
got high attention among researchers. Controlling an Electric Vehicle is not an easy task, as the design and operational
parameters vary along with the road conditions. The article presents the design and simulation of conventional control
algorithms for Electric Vehicle. The transfer function model of the Electric Vehicle is considered for the design and
analysis in MATLAB/Simulink platform. It is found that Proportional Integral Derivative (PID) controller is simple and
189. feasible, along with better-closed loop performance with and without disturbance. The work includes the control of the
1022-
electric vehicle by designing three different control algorithms: i) Cohen-Coon (CC), ii) Wang-Juang-Chan (WJC) and iii)
1026
Chine-Hrones-Reswick (CHR) algorithm for the second-order transfer function model. The resulted controller is also
simulated using equivalent First-Order Plus Dead Time (FOPDT) model of an electric vehicle. A comparative study has
been carried out using its time domain specifications. Also, Performance Indices namely 1) Integral Square Error (ISE), 2)
Integral Absolute Error (IAE), 3) Integral Time Absolute Error (ITAE), and 4) Integral Time Square Error (ITSE) are
evaluated in order to identify the superiority of control techniques.

Index Terms: Electric Vehicle, PID Controller, Performance Indices, Transfer Function
References:
1. Avtar Singh and Amrit Kaur, “Speed Control of Hybrid Electric Vehicle Using Optimization Algorithm”, International Journal of Advanced Research
in Computer and Communication Engineering, Vol. 3, pp. 6856-6860, 2014.
2. T.A.T., Mohd, M.K. Hassan and WMK. A. Aziz. “Mathematical modeling and simulation of an Electric Vehicle”. Journal of Mechanical Engineering
and Sciences (JMES), Vol. 8, pp. 1312-1321, 2015.
3. Nicholas Bova, Zachariah Marrs, Justin Goodwin and Andrew Oliva, “Environmental and Social Issues Concerned with Hybrid Cars”, pp. 1-120,
2010.
4. Aryo Wicaksono, Ary Setijadi Prihatmanto. “Optimal Control System Design for Electric Vehicle” 4th International Conference on Interactive Digital
Media, Indonesia. 2015.
5. Guozhen HU, Shanxu Duan, Tao CAI and Baoqi LIU, “Modeling, Control and Implementation of Lithium-ion-Battery Charger in Electric Vehicle
Application, Electrical Review, pp. 255-258, 2012.
6. Farhan A. Salem. “Modeling and Control Solutions for Electric Vehicles”. European Scientific Journal, Vol. 9, pp. 221-240, 2013.
7. A. A. Abulifa, A Che Soh, M.K. Hassan, R.K. Raja Ahmad and M.A.M. Radzi, “Modelling and simulation of battery electric vehicle by using
MATLAB simulink” IEEE 15th Student Conference on Research and Development (SCPReD), pp. 383-387, 2017.
8. Thanh Vo-Duy and Minh C. Ta, “A signal hardware-in-the-loop model for electric vehicles”, ROBOMECH Journal, pp. 1-11, 2016.
9. Ruben kandulna, “Design of PID controller for FOPDT AND IPDT system”, Department of Electrical Engineering, pp. 1-52, 2015.
10. Apurva Tripathi, Ram Lautan Verma, Md. Sanawer Alam, “Study and Analysis of Various Tuning Methods of PID Controller for AVR System”,
International Journal of Research in Electrical & Electronics Engineering, Vol.1,pp. 93-98, 2013.
11. Dr. SatyaSheelandOmhari Gupta, “New Techniques of PID Controller Tuning of a DC Motor—Development of a Toolbox”, MIT International
Journal of Electrical and Instrumentation Engineering, Vol. 2, pp. 65-69, 2012.
12. “Modern Control System Theory and Design”, Stanley M. Shinners, Wiley-Interscience 2nd edition, 1998.
13. Karthik Krishnan and G.Karpagam, “Comparison of PID Controller Tuning Techniques for a FOPDT System”, International Journal of Current
Engineering and Technology, Vol. 4, pp. 2667-2670, 2014.
14. Fernando G. Martins, “Tuning PID Controllers using the ITAE Criterion”, Int. J. Engng Ed., Vol. 21, pp. 867-873, 2005.
15. Neng-Sheng Pai, Shih Chi Chang and Chi-Tsung Huang, “Tuning PI/PID Controller for Integrating Processes with Deadtime and Inverse Response
by Simple Calculations”, Journal of Process Control, pp. 726-733, 2010.
16. “Transfer Function Model for Electric Vehicle – Chapter 3”, pp. 38-47.
URL:https://www.google.co.in/url?sa=t&source=web&rct=j&url=http://shodhganga.inflibnet.ac.in/bitstream/10603/27604/8/08_chapter%25203.
pdf&ved=2ahUKEwjch5rE6ILfAhVJpI8KHb9FArEQFjAAegQIBBAB&usg=AOvVaw1L_dUCd6A3LT8E2rNk8pJa.
Authors: Rushikesh V. Godse, Haribhau G. Phakatkar, Sandip A. Kale
Paper Title: A Research on Evaluation of Small Wind Turbine Blades of Different Thicknesses
Abstract: Designing a new small wind turbine of required capacity needs new blade design. Wind turbine blade passes
through three design steps such as functional design, aerodynamic design and strength design. Strength design can be
carried out using static or dynamic conditions. In this research work a blade is designed for 5m rotor diameter using glass
fiber reinforced plastic. Three blades of 3 mm. 4 mm and 5 mm thickness are modelled and analyzed using Finite Element
Analysis software. The main body is analyzed using 2D and blade root is analyzed using 3D approach. The results obtained
are studied to understand the stress distribution on the front as well as the back surface of the blade. Also, the deformation
of all three blade models is analyzed.

Index Terms: Finite element analysis, small wind turbine, static strength, wind turbine blade.

References:
1. S. A. Kale, Jagadeesh Hugar, “Static Strength Design of Small Wind Turbine Blade Using Finite Element Analysis and Testing”, ASME 2015
International Mechanical Engineering Congress and Exposition, Houston, Texas, USA, November 13-19, 2015, SBN: 978-0-7918-5740-3, pp.
190. V04BT04A041; 4 pages
2. David Wood, “Small Wind Turbines: Analysis, Design, and Application”, Springer-Verlag London, 2011, pp. 1027-
3. Mahasidha Birajdar, S. A. Kale, S.N. Sapali, “Effects of Design Parameters on Aerodynamic Performance of New Profile Small Wind Turbine 1030
Blades”, ASME 2015 International Mechanical Engineering Congress and Exposition, Houston, Texas, USA, November 13-19, 2015, ISBN: 978-0-
7918-5747-2, pp. V07BT09A049; 8 pages
4. Horizon Gitano-Briggs, “Low Speed, Wind Turbine Design”, In in Wind Power, Rupp Carriveau, IntechOpen, 2012, DOI: 10.5772/53141, pp. 267-
283
5. Mahasidha R. Birajdar and Sandip A. Kale, “ Comparison of New Designed Small Wind Turbine Airfoils and Blade Performance Using Different
Techniques’, International Journal of Energy, Environment, and Economics, ISSN- 1054-853X, Vol. 24, Issue 1, pp. 75-85
6. J. J. Heijdra, M. S. Borst And D. R. V. Van, “Wind turbine blade structural performance testing”, In Advances in Wind Turbine Blade Design and
Materials, Woodhead Publishing Limited, 2013, pp. 432-445.
7. H. Soker, “Loads on wind turbine blades”, In Advances in Wind Turbine Blade Design and Materials, Woodhead Publishing Limited, 2013, pp. 29-
58.
8. Sandip A. Kale, Swanand R. Kulkarni, Suraj D. Shravagi and Ganesh P. Bharambe, Materials for Small Wind Turbine Blades, Chapter 3 in
Renewable Energy and Sustainable Development, 2015, ISBN: 978-1-63463-429-8, pp.43-54.
9. Sandip A. Kale, Sham H. Mankar and Santosh P. Masal, “Weight and Cost Reduction of A Small Wind Turbine Blade”, IEEE Sponsored 2nd
International Conferences for Convergence of Technology (I2CT), Pune, India, 08 April -09 April 2017
10. P. D. Clausen and F. Reynal, “Design, manufacture and testing of small wind turbine blades”, In Advances in wind turbine blade design and
materials, Woodhead Publishing Limited, 2013, pp. 413-431
Authors: Collins N. Nwaokocha, Haribhau G. Phakatkar, Solomon O. Giwa, Abayomi T. Layeni, Sandip A. Kale
Paper Title: The Viability of Refuse-Derived Fuel As A Green Household Cooking Fuel
Abstract: Rice husk and sawdust are waste generated freely in many developing countries in the cause of rice production
and wood processing respectively. This large biomass volume can be useful as an energy resource useful in numerous
processes other than being dumped or flared in the farms, thereby causing health risks and having severe environmental
consequences. Biomass combustion is known for the release of pollutants such as particulate matter and carbon monoxide.
191. In this study, rice husk and sawdust were prepared with starch and spent oil as binders. The characteristic behavior of the
1031-
biomass materials was investigated. The properties of the new fuel derived from sawdust showed moisture content of
1034
0.93%, ash content of 16.5%, higher heating of 7808.1 kJ/kg and tensile strength of 576.8 N/mm2 were obtained and that
for rice husk, moisture content, ash content, higher heating value, and tensile strength of 0.908%, 11.5%, 6160.7 kJ/kg and
508.7 N/mm2 respectively, were obtained also. These results propose that the refuse derived fuel produced in this work
from rice husk and sawdust is viable as a green fuel which will help reduce the global greenhouse gas content.
Index Terms: Cooking fuel, Climate change, Derived Fuel, Environment, Green Energy.

References:
1. Nwaokocha, C. N. and S. O. Giwa, “Investigation of Bio-Waste as Alternative Fuel For Cooking”, Proceedings of the 3rd International Conference on
African Development Issues (CU-ICADI 2016) at Covenant University, Ota, Nigeria. May 9 – 11, 2016, pp. 548 – 551.
2. Bharambe G P, R.A. Phalke, A. N. Tanksale, M.S. Shaikh, S. A. Kale “LPG Price Hike in India: Awaking Renewable Energy”, International
Conference on Energy Efficient Technologies for Sustainability, IEEE Xplore Digital Library, ISBN: 978-1-4673-6149-1, DOI
10.1109/ICEETS.2013.6533443, 2013, pp. 546-549.
3. David Tyler, “ Challenges and Opportunities for LPG”, A presentation in NZ Gas Industry Forum – Gas Association of New Zealand, Queenstown –
New Zealand, 2nd – 4th November 2016.
4. Akorede, M. F., Ibrahim, O., Amuda, S. A., Otuoze, A. O. & Olufeagba, B. J. “Current Status and Outlook of Renewable Energy Development in
Nigeria”, Nigerian Journal of Technology, Vol. 36, Issue 1, 2017, pp. 196 – 212.
5. Ganesh Bharambe, A. M. Patil, S. A. Kale, Prakash Dabeer, K. D. Sapate, “Simulation of Heat Flux Between Two Parallel Metal Plates With
Thermic Fluid as A Media”, ASME 2015 International Mechanical Engineering Congress and Exposition, Houston, Texas, USA, November 13-19,
2015, ISBN: 978-0-7918-5746-5, pp. V07AT09A050; 14 pages
6. Holm, D., “Renewable Energy Future for the Developing World”, International Solar Energy Society, Freiburg, Germany, 2005.
7. Bruce, N., Perez-Padilla, R., Albalak, R., “Indoor air pollution in developing countries: a major environmental and public health challenge”, Bulletin
of the World Health Organization, Vol. 78, Issue 9, 2000, 1078-1092.
8. Lu, Y., Tsai, M., Chang, F., “Forest waste derived fuel with waste cooking oil”, Energy Procedia, 2017, Vol. 105, pp. 1250-1254. DOI:
10.1016/j.egypro.2017.03.434.
9. Oyedepo, S. O., “Energy and Sustainable Development in Nigeria: The Way Forward. Energy, Sustainability and Society, 2012, doi:10.1186/2192-
0567-2-15.
10. Oyedepo, S. O., “Energy in Perspective of Sustainable Development in Nigeria”, Sustainable Energy, 2013, Vol. 1, Issue 2, pp. 14-25. doi:
10.12691/rse-1-2-2.
11. Oyelaran O.A., Bolaji B.O, Waheed M.A. and Adekunle M.F., “Performance Evaluation of the Effect of wastepaper on Groundnut Shell Briquette”,
Int. Journal of Renewable Energy Development, 2015, Vol. 4, Issue 2, pp. 95-101.
12. Oyelaran O.A., Bolaji B.O, Waheed M.A. and Adekunle M.F., “An experimental study of the combustion characteristics of groundnut shell and
wastepaper admixture briquettes”, KKU Engineering Journal, 2015, Vol, 42 Issue 4, pp. 283 – 286.
13. Sambo, A. S., “Renewable Energy for Rural Development: The Nigerian Perspective”, ISESCO Science and Technology Vision, 2005, Volume 1: 12
– 22.
14. Sambo, A. S, “ Demand and Supply Projections for Sustainable Energy Sector Development in Nigeria”, Annual General Meeting/Conference of the
Nigerian Institution of Mechanical Engineers, 24th October 2007 at Kaduna, Kaduna State.
15. McKendry P., Energy production from biomass (Part 1): Overview of Biomass. Bioresource Technology, 2002, Vol. 83, Issue 1, pp. 37-46.
16. Osbun, “Effects of Paper Paste on the Calorific value of Sawdust Pellets”, Journal of Applied Sciences, 2002, Vol. 10, Issue 2, pp. 25 – 32.
17. Shi Y, Ge Y, Chang J, Shao H, Tang Y., “Garden waste biomass for renewable and sustainable energy production in China: potential, challenges and
development”, Renewable and Sustainable Energy Review, 2013, Vol. 22, pp. 432-437.
Authors: Haribhau G. Phakatkar, Rushikesh V. Godse, Sandip A. Kale, Mahasidha R. Birajdar
Computational Flow Analysis of Straight Converging-Diverging, Vertical Flanged Diffusers for a Small Wind
Paper Title:
Turbine
Abstract: Small wind turbines used for community are not till appreciated by the people till date because of non
satisfactory performance as they operate in low wind regions. The wind turbines covered with diffuser can improve the
power output of the wind turbine. This paper focuses on the straight converging, diverging vertical flanged diffusers for
small wind turbine and its computational analysis for selected variables. These computational experiments are carried out
for wind turbine of 3000 mm diameter. During the analysis, diffuser diameter at the throat, flange inclination, throat
distance from the exit and the distance of the rotor from the throat are kept constant. The four variables such as inlet
diameter, exit diameter, flange height and entry to throat distance are considered at three levels. For these four variable and
three levels nine cases are formed by Taguchi methods and CFD analysis of these nine cases is carried out to obtain the
best combination. During the computational analysis wind speed is considered as 6.5 m/s in all cases. Based on the wind
velocity obtained in the diffuser predicted power output is calculated and it is observed that 1.72 to 2.15 times increase in
power output is possible for the considered cases.

192. Index Terms: Computational fluid dynamics, Diffuser augmented wind turbine, small wind turbine, wind speed.
1035-
References: 1042
1. Sandip A. Kale, Swanand R. Kulkarni, Suraj D. Shravagi and Ganesh P. Bharambe, Materials for Small Wind Turbine Blades, Chapter 3 in
Renewable Energy and Sustainable Development, 2015, ISBN: 978-1-63463-429-8, pp.43-54.
2. Mahasidha Birajdar, S. A. Kale, S.N. Sapali, “Effects of Design Parameters on Aerodynamic Performance of New Profile Small Wind Turbine
Blades”, ASME 2015 International Mechanical Engineering Congress and Exposition, Houston, Texas, USA, November 13-19, 2015, ISBN: 978-0-
7918-5747-2, pp. V07BT09A049; 8 pages
3. S. A. Kale, S.N. Sapali, “Development and Field Testing of an Inclined Flanged Compact Diffuser for a Micro Wind Turbine”, ASME 2014
International Mechanical Engineering Congress and Exposition, Montreal, Canada, November 14-20, 2014, ISBN: 978-0-7918-4952-1, pp.
V06BT07A070; 6 pages
4. Yuji Ohya, Takashi Karasudani, Akira Sakurai, Ken-ichi Abe, Masahero Inoue, “ Development of shrouded wind turbine with a flanged diffuser”
Journal of wind engineering and industrial aerodynamics, Vol. 96, 2008, pp. 524-539.
5. Yuji Ohya, Takashi Karasudani “A Shrouded wind turbine generating high output power with wind lens technology”, Energies, 2010, pp. 634-649.
6. Swanand Kulkarni, S. A. Kale, Prakash Dabeer, Suresh M Sawant, “Comprehensive Evaluation of Some Innovative Wind Turbines”, ASME 2015
International Mechanical Engineering Congress and Exposition, Houston, Texas, USA, November 13-19, 2015, ISBN: 978-0-7918-5757-1, pp.
V014T06A006; 11 pages
7. Kale S. A., Yogesh Gunjal, Sachin Jadhav, Ajinkya Tanksale, “CFD Analysis for Optimization of Diffuser for a Micro Wind Turbine”, IEEE Xplore
Digital Library, ISBN: 978-1-4673-6149-1, DOI 10.1109/ICEETS.2013.6533392, pp. 257-260, 2013
Ram Gopal, Serdar Vural UYGUN, Sandeep Kumar Gupta, Inna Tsvihun, Ms Laodiceia Amorim Weersma,
Authors:
Svitlana Ilinich, Rainu Gupta
Paper Title: Sustainable Development and Intelligent Real-Time Vehicle Mileage Calculation Device: An Analysis

193. Abstract: The device, Intelligent Real-Time Mileage Calculation (IRTVMC) System, will give the real-time value of the
mileage of the vehicle. This system is reducing the consumption of fuel by knowing the mileage of the vehicle and the
1043-
speed which is to be maintained by a driver to get a particular best mileage as well as cover the distance by knowing the
1045
mileage/litre. It will also overcome various problems faced during calculating the actual average of the vehicle and help to
know the amount of fuel present in the fuel tank in terms of numerical value. Hence using minimum components will
become easy to determine the current mileage of the vehicle, which will help to get accurate and current mileage instead of
mileage range given by the manufacturers.

Key articulations: Fuel Tank, Processor, Digital Odometer, Fuel Sensor, Digital Display, Real Time, Consumption,
Pollution, Fuel Consumption.

References:
1. S. A. Kale, Jagadeesh Hugar, “Static Strength Design of Small Wind Turbine Blade Using Finite Element Analysis and Testing”, ASME 2015
International Mechanical Engineering Congress and Exposition, Houston, Texas, USA, November 13-19, 2015, SBN: 978-0-7918-5740-3, pp.
V04BT04A041; 4 pages
2. David Wood, “Small Wind Turbines: Analysis, Design, and Application”, Springer-Verlag London, 2011, pp.
3. Mahasidha Birajdar, S. A. Kale, S.N. Sapali, “Effects of Design Parameters on Aerodynamic Performance of New Profile Small Wind Turbine
Blades”, ASME 2015 International Mechanical Engineering Congress and Exposition, Houston, Texas, USA, November 13-19, 2015, ISBN: 978-0-
7918-5747-2, pp. V07BT09A049; 8 pages
4. Horizon Gitano-Briggs, “Low Speed, Wind Turbine Design”, In in Wind Power, Rupp Carriveau, IntechOpen, 2012, DOI: 10.5772/53141, pp. 267-
283
Sandeep Kumar Gupta, Serdar Vural UYGUN, Sandeep Sharma, Santosh Kumar Yadav, Laodiceia Amorim
Authors:
Weersma, Svetalana Ilinich
Paper Title: Impacts of Demonetisation in the Indian State Arunachal Pradesh: A Political Gimmick or Robust Policy
Abstract: On November 8th, 2016, the Indian Government announced the demonetisation of the 500-rupee and 1000-
rupee currency notes. Demonetisation is the process in which particular notes or coins are withdrawn from the circulation
as a legal tender. The main objectives of demonetisation are, in general, to control corruption, black money, the finance of
terrorist organisations and the duplicity of currency notes within a country. In the case of India, the 500-rupee and 1000
rupee notes ceased to be a legal tender starting from December 31st, 2016, and people having this demonetised currency
notes had to change them or deposit them into their bank accounts. The objective of this research paper is to highlight the
impacts that demonetisation brought to India,

Keywords: Demonetization, Black money, Terrorist organisation, Digital India, Public policy, Direct taxes, Indirect taxes.
194.
References:
1. Singh, A. (2017). Impact of demonetization on Indian economy. International Journal of Engineering and Management Research (IJEMR), 7(3), 785- 1046-
788. 1048
2. Ganesan, G., & Gajendra Nayagam, B. (2017). Impact of demonetization on Indian Economy. International Journal of Applied Research, 3(9), 433-
436.
3. Shah, A. Y. (2017). Impact of Demonetization on Rural India. International Journal of Scientific and Research Publications, 7(3), 220-223.
4. Shirley, M. A. J. (2017). Impact of demonetization in India. International Journal of Trend in Research and Development, 20-23.
5. www.facebook.com/IndiaUnravelled2019/videos/2344755872411348/
6. Singh Prabhsimaran, Sawhney R.S.& Kahlon K.S.(2018), Sentiment Analysis of Demonetisation of 500 & 1000 rupees bank notes by Indian
Government.ScienceDirect Volume 4, Issue 3, September
7. Zhu Heng, Gupta Abhinav, Majumdar Binoy & Steinbach (2018) Short term effects of India's demonetisation on Rural People. Economics Letters,
Elsevier, Volume 170, September, 117-121.
8. Financial Express, dated: Nov 15th, 2016
9. First Post, dated: Dec 27th, 2016
10. Business Standard: Dec 27th 2016
11. Amar Ujala Business February 18th 2019
Authors: Jush Kumar Siddani, C. Srinivas, N.Nagabhushana Ramesh
Paper Title: Topological Surface of H.S.S and Titanium31 using Micro Electro Discharge Machining
Abstract: Micro Electro Discharge Machining Drill is variant EDM processes in a situation where it employs water as a
dielectric fluid, with pressure flushing and rotating nanotube electrode. This paper brings out the relative features of work
pieces i.e., H.S.S and Titanium 31 about their surface roughness and Topological surfaces.

Keywords: Micro Electro Discharge Machining Drill (Micro EDMD), Titanium 31, High Speed Steel (H.S.S), MRR
195.
1049-
References: 1051
1. Crichton, I.M and J.A. McGeough. Theoretical, experimental and computational aspects of electrical discharge arc machining process. Annals of the
CIRP. 1994; 33: 429-433.
2. Paulo Carlos Kaminski, and Marcelo Neublum Capuano. Micro hole machining by conventional electrical discharge machine. Int. Jl. Mach. Tools &
manufacture. 2003; 43: 143.1149.
3. Kuneida. M, Lauwers. B, Rajurkar K.P. and Schumacher, B.M. Advancing EDM through fundamental insight into the process. CIRP Annals-
Manufacturing Technology. 2005; 54: 64-87.
4. Electronica, EDM smart Drill. Manual – Electronic machine tools, Pune, India 2015.
Authors: Brahmananda Rao Peddiboyina, K.G. Selvan
A Research on Transactional Leadership Style and Job Satisfaction of Employees in Telangana State Road
Paper Title:
Transport Corporation
Abstract: In present day vibrant work environment, leadership style is having greater influence on progress of
organization and job performance and satisfaction of employees. Contingent rewards, management by exception (active)
and management by exception (passive) are key dimensions of transactional leadership styles in Telangana State Road
196. Transport Corporation Significant difference is prevailing among transactional leadership styles and socio-demographics of
employees in Telangana State Road Transport Corporation Contingent rewards, aforementioned parameters have 1052-
noteworthy and optimistic relation with job satisfaction of employees in Telangana State Road Transport Corporation. It is 1054
recommended that practicing transactional leadership styles improve the job satisfaction.

Keywords: Employees, Job Satisfaction, Transactional Leadership Style.


References:
1. Northouse, P. G. (2015). Leadership: Theory and practice. Thousand Oaks, CA: Sage publications.
2. Stefano Ruggeri. (2013). Leadership style, self-sacrifice and team identification. Social Behaviour and Personality, 41(7),1171 - 1178.
3. Thamrin, H. M. (2012). The influence of transformational leadership and organizational commitment on job satisfaction and employee performance.
International Journal of Innovation, Management and Technology, 3(5), 566 - 572.
4. Voon, M. C. (2011). The influence of leadership styles on employees’ job satisfaction in public sector organizations in Malaysia. International Journal
of Business, Management and Social Sciences, 2(1), 24 - 32.
Authors: K.Saranya, S.Vijayashaarathi, M.Amutha
Paper Title: Automatic detection of Vehicle entry into a restricted area using IoT
Abstract: Nowadays IoT (Internet of Things) driven restricted area surveillance serves as a challenging environment in
smart cities application. Facial recognition, RFID and PIR sensor is a way of surveillance using VLPR (Vehicle License
Plate Recognition) and the information obtained is updated in IoT. Alphanumeric letters are extracted from number plate
using VLPR and also checks for authorized vehicle entry. The area under surveillance allows access for authorized persons
using facial recognition and RFID tag. The buzzer sound will be produced by PIR sensor detecting the motion of illegal
entry in the restricted area.The proposed research concentrates on how to detect the vehicle/license plate object using
VLPR and shows the way to reduce the required data volume to be stored in IoT.

Keywords: VLPR (Vehicle License Plate Recognition), IoT (Internet of Things), RFID (Radio Frequency Identification),
Facial Recognition, Restricted area surveillance.

References:
1. S. Chen, H. Xu, D. Liu, B. Hu, H. Wang, “A vision of IoT: applications, challenges, and opportunities with China perspective,” IEEE Internet of
197. Things Journal, Vol. 1, Issue4, pp. 349 - 359, Aug 2014.
1055-
2. M. Handte, S. Foell, S. Wagner, G. Kortuem, P. Marrón; “An Internet-of- Things enabled connected navigation system for urban bus riders,” IEEE
Internet of Things Journal, Vol. 3, Issue 5, pp. 735 - 744, Oct 2016. 1057
3. B. Li, B. Tian, Q. Yao, K. Wang, “A vehicle license plate recognition system based on analysis of maximally stable extremal regions,” 9th IEEE
International Conference on Networking, Sensing and Control, pp. 399 - 404, 2012.
4. C. Anagnostopoulos, I. Anagnostopoulos, I. Psoroulas, V. Loumos, E. Kayafas, “License plate recognition from still images and video sequences: a
survey,” IEEE Transactions on Intelligent Transportation Systems, Vol. 9, Issue 3, pp. 377 - 391, Sept 2008.
5. M. Yu, Y. Kim, “An approach to Korean license plate recognition based on vertical edge matching,” 2000 IEEE International Conference on Systems,
Man, and Cybernetics, Vol. 4, pp. 2975 – 2980, 2000.
6. A. Al-Ghaili, S. Mashohor, A. Ramli, A. Ismail, “Vertical-edge- based car-license-plate detection method,” IEEE Transactions on Vehicular
Technology, Vol. 62, Issue 1, pp. 26 - 38, Jan. 2013.
7. G. Li, R. Yuan, Z. Yang, X. Huang, “A yellow license plate location method based on RGB model of color image and texture of plate,” second
Workshop on Digital Media and its Applpication in Museum& Heritages, pp.42-46, 2007.
8. S. Pellicer, G. Santa, A. L. Bleda, R. Maestre, A. J. Jara, and A. G. Skarmeta, “A global perspective of smart cities: A survey,” in 7th International
Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013.
9. G. Han, L. Shu, A. S. K. Pathan, J. J. P. C. Rodrigues, and A. Mellouk, “Wireless sensor networks based on environmental energy harvesting,” The
International Journal of Distributed Sensor Networks, vol. 2013, no. 816063, p. 2, 2013.
10. M. Weixiao, R. Ma, and H. H. Chen, “Smart grid neighborhood area networks: A survey,” IEEE Network, vol. 28, no. 1, pp. 24 – 32, 2014.
11. S. A. Weis, “Rfid (radio frequency identification): Principles and applications,” 2016.
Authors: Ratih Indri Hapsari, Syahrul Muhamad Ilham, Utami Retno Pudjowati, Suhartono
Effects of Settlement Development and Green Drainage Facility to Surface Runoff in Bodo River Basin
Paper Title:
Malang
Abstract: The rapid urban development in Malang sub-urban area in Indonesia has increased the vulnerability of river
basins to water-related disas-ters. Water sustainability in Malang, which is located in upper Brantas River Basin, becomes
an important issue as the river serves as the most important source of water supply in East Java Province. The objective of
this study is to evaluate the impact of a housing area (0.069 km2) and the green drainage facility in Malang Regency to the
hydrological characteristic in Bodo River (4.937 km2), a tributary of Brantas River. The sustainable drainage system
applied in this study is detention pond. This study requires land terrain data, daily rainfall data from Karangploso, Dau, and
Singosari rain gauges, hourly rainfall data from JAXA global dataset, soil bore log and cone penetration data, and land use
data. The designed rainfall is analysed by Log-Pearson Type III frequency distribution with 10 years return period. SCS
hydrograph method from HEC-HMS software is applied to analyse the surface runoff and infiltration. Curve number is
spatially analysed based on the soil properties and land use data, which has value of 83.37 and 96.9 for Bodo river and
housing area respectively. The hourly rainfall is assumed to have triangular distribution with 7 hours duration within a day.
The analysis reveals that the existence of housing area increases the runoff of 0.46 m3/s. The designed flood in Bodo River
for 10 years return period is 26.243 m3/s with 14 hours duration, while the runoff with contribution from housing area is
198.
26.701 m3/s. In order to reduce the peak flood and extend the flood lag time as well travel time, the detention pond is
1058-
designed in the housing area based on the land availability. The pond dimension is 67.25 m width, 205.83 m length, and 0.8
1063
m depth. The pond could retain the water of 685.705 m3 volume and reduce the peak flood in the river 0.0013 m3/s. The
results demonstrate the benefit of constructing green drainage facilities to complement urban development aggregately.

Keywords: Sustainable drainage, flood discharge, detention pond, HEC-HMS

References:
1. Charlesworth S M (2010), A review of the adaptation and mitigation of global climate change using sustainable drainage in cities. Journal of Water
and Climate Change 1(3), 165-180.
2. Chen C N, Tsai C H, and Tsai C T (2007), Reduction of Discharge Hydrograph and Flood Stage Resulted From Upstream Detention Ponds.
Hydrological Processes 21(25) 3492-3506.
3. Chow V T (2010), Applied Hydrology. McGraw-Hill Education, Tata
4. Guo Y (2001), Hydrologic design of urban flood control detention ponds. Journal of Hydrologic Engineering 6(6), 472-479.
5. Hapsari R I, Muntaha Y, and Efendi M (2016), Multi-criteria approach for designing sustainable drainage in Malang residential area Indonesia.
DIMENSI − Journal of Architecture and Built Environment 43(1), 37-46.
6. Harbor M J (1994), A practical method for estimating the impact of land use change on surface run-off, ground water recharge and wetland
hydrology. Journal of the American Planning Association Jan 1, 95-108.
7. Harrell L J and Ranjithan S R (2003), Detention pond design and land use planning for watershed management. Journal of Water Resources Planning
and Management 129(2), 98-106.
8. Limantara L M, Suhartanto E, Majdi A G, Hidayati I K, and Saputra D (2018), A review of rainfall intensity and synthetic unit hydrograph for
supporting flood prediction (a case study in the upstream Lesti sub-watershed). Asian Journal of Applied Science and Technology 2(1), 101-119.
9. Naef F, Scherrer S, and Weiler M (2002), A process based assessment of the potential to reduce flood runoff by land-use change. Journal of
Hydrology 267, 74–79.
10. Natakusumah D K, Hatmoko W, and Harlan D (2011), General procedure of syntethic unit hydrograph calculation using ITB method and some of
application example. Civil Engineering Journal of Bandung Institute of Technology 8(3), 251-291 (in Indonesian).
11. Niehoff D, Bronstert A, and Burger G (2002), Effects of climate and land-use change on storm runoff generation: present knowledge and modelling
capabilities. Hydrol. Processes 16, pp. 509-529.
12. Pandulu G D and Widodo E (2016) Efficiency of rain water harvesting in real estate through lake construction for reducing ground water exploitation
and runoff to the drainage in Malang City. Proceeding of Seminar Nasional Inovasi dan Aplikasi Teknologi di Industri 2016, A62-A67 (in
Indonesian).
13. Rizkiana A L A, Donny Harisuseno H, and Andawayanti U (2017), Analysis of land use change impact on water availability in Bodo sub catchment
Malang with SWMHMS Model. Water Resources Journal of Brawijaya University 1, pp. 251-291 (in Indonesian).
14. Robertson P K, Campanella R G, Gillespie D, and Greig J (1986), Use of Piezometer Cone data. In-Situ’86 Use of In-situ testing in Geotechnical
Engineering. ASCE, Reston.
15. Setyorini A, Khare D, and Pingale S M (2017), Simulating the impact of land use/land cover change and climate variability on watershed hydrology
in the Upper Brantas basin, Indonesia, Appl Geomat 9(3), 191-204.
16. Soong D T, Murphy E A, and Timothy D (2017), Effect of detention basin release rates on flood flows—application of a model to the Blackberry
Creek watershed in Kane County, Illinois By Straub, Scientific Investigations Report 2009–5106 U.S. Department of the Interior U.S. Geological
Survey. U.S. Geological Survey, Illinois.
17. USACE (2000), Hydrologic Modelling System HEC-HMS Technical Reference Manual. US Army Corps of Engineers, Davis.
18. USDA (1986), Urban hydrology for small watersheds. United States Department of Agriculture, Washington.
19. Zhou Q (2014), A review of sustainable urban drainage systems considering the climate change and urbanization impacts. Water 6, 976-992.
Authors: Ratih Indri Hapsari, Roikhatul Jannah, Moh. Charits, Agus Suhardono, Mona Shinta Safitri
Paper Title: Modelling Water Flow Hydraulic in Open Channels with Green Drainage Facility
Abstract: High increasing of urban area in greater Malang Indonesia has been raising the water availability issues in
surrounding river basins. Providing the green drainage system in residential area would be expected to contribute to the
water sustainability in the sub-basin where the area is located. This study aims to design and evaluate the effectiveness of
sustainable drainage channels and structures in a housing area in Malang Regency with area of 75,000 m2. The green
drainage facilities includes pervious channel, permeable pavement, and retention pond. The data required are topographical
map with 0.25 m interval, daily maximum rainfall rate from Lawang, Singosari, and Tumpang rain gauges, and soil
properties. The design rainfall is analysed by Gumbel frequency distribution with ten years return period. Rational method
is applied to calculate the design flood in conjunction with Kirpich and Mononobe method to analyse concentration time
and rainfall intensity. Manning formula is used to design the channel dimension based on open channel hydraulic and
uniform flow theories. The retention pond is planned by analysing the design capacity from the flood inflow and designed
outflow hydrograph of the pond. The complexity of the hydraulic analysis considering the unsteady flow motivates the
application of HEC-RAS one-dimensional hydraulic software. The analysis shows that the flood discharge in the primary
channel is 5.007 m3/s using full asphalt pavement and 4.560 m3/s using permeable pavement. The dimension of the
primary channel is designed as typical channel with 1.4 m width and 1.4 m height. Should the concrete channel is applied,
the retention pond is designed to extend the flood timing of 3.578 minute and reduce the primary channel discharge of
0.070 m3/s. The analysis reveals that the adequate pond dimension is 30 m width, 20 m length, and 0.61 m depth. The pond
could retain the water of 368.252 m3 volume, infiltrate the water of 26.280 lt/year to the ground water, and reduce the peak
flood in the channel from 5.007 m3/s to 4.328 m3/s. The water level profile of steady flow is evaluated through HEC-RAS
simulation. This analysis is important to assess the flow velocity, energy, and regime of the continuous channel in steady
manner, which cannot be obtained directly from the initial Manning calculation. In addition, the unsteady flow caused by
the existence of pond is simulated by HEC-RAS. The results demonstrate that the water stage and energy variation could be
199. accommodated in the designated channels. This research is expected to provide benefit as consideration of the utilization of
sustainable drainage facilities in development of urban area. 1064-
1069
Keywords: Detention pond, HEC-RAS, flood discharge, drainage channel

References:
1. Davis A P, Stagge J H, Jamil E, and Kim H (2012), Hydraulic performance of grass swales for managing highway runoff. Water Research 46, 6775-
6786.
2. Abbott C L and Comino-Mateos L (2003), Insitu hydraulic performance of a permeable pavement sustainable urban drainage system. Water and
Environment 17(3), 187-190.
3. Mendez D F P (2018), Hydraulic analysis of urban drainage systems with conventional solutions and sustainable technologies: Case study in Quito,
Ecuador. Journal of Water Management Modeling 26(C440), 1-10.
4. DPURI (2012), Guideline for Community-based Approach Environmentally Sound Drainage System. Ministry of Public Works Indonesia, Jakarta (in
Indonesian).
5. Ellis J B, Deutsch J C, Mouchel J M, Scholesa L, and Revitta M D (2004), Multicriteria decision approaches to support sustainable drainage options
for the treatment of highway and urban runoff. Science of the Total Environment 334–335, 251-260.
6. Meierdiercks K (2016), Assessment of the Effectiveness of Impervious Area Reduction and Green Infrastructure at Improving Water Quality and
Reducing Flooding at the Watershed-Scale. Siena College, New York.
7. Charlesworth M, Harker E, and Rrickard S (2003), A review of sustainable drainage systems (SuDS): A soft option for hard drainage questions?
Geography 88, 99-107.
8. French R, Pilgrim D H, and Laurenson B E (1974), Experimental examination of the rational method for small rural catchments. Civ Eng Trans 16(2),
95-102.
9. Suripin (2004), Sistem Drainase Perkotaan yang Berkelanjutan. Andi Yogyakarta.
10. Ndon U J (2017), Trends in the application of permeable pavement as sustainable highway storm water management option for safe-use of roadways.
J Civil Environ Eng 7(6), 1-15.
11. USACE (2010), HEC-RAS River Analysis System. US Army Corps of Engineers, Davis.
12. Chow V T (1959), Open-Channel Hydraulics. McGraw-Hill, New York.
13. Liu W, Peng C, and Chen W (2014), Assessing the effectiveness of green infrastructures on urban flooding reduction: A community scale study.
Ecological Modelling 291, 6-14.

200. Authors: Annamalai R, Ancy.S, Cornelius.K


Paper Title: Electrical Utilizations Well-ordered by Smartphone using SmartHuis through Android Studio optimization
Abstract: The growing recognition of home computerization is in a trendy experience due to its lower costs, expeditiously
to be had and simplicity of utilization via the PDAs. The exceptional wi-fi in form up a domestic robotization manage
system is constructing an wi-fiwireless dependable manage form with all of the required competencies under a unmarried
form. The reason of smart Huis(Huis-domestic in Dutch) adventure is to create a home automation manage the use of
android cell cellphone with excessive safety capabilities like face lock, sound manage, belief and get right of access to
controls. The shape revolves spherical giving prosperity competencies just as offers abilities like logical statistics about the
electrical machines, the usage of of structure from anywhere throughout the area, ideal manipulate and an appropriated
association of domestic control. A greater prominent diploma of its exciting capabilities are, it's miles dynamically
extremely good with customers who're in a exceptional way abled. inclusive of to its capabilities a promoting libbed
duration of presence with constrained strength utilization costs saving of imperativeness is appropriately wi-fi.

Keywords: home Automation, Android smart cell, and so forth.

References:
1. Yan Wenbo, Wang Quanyu, Gao Zhenwei,"smart neighborhood use subject to net and Wifi era",manage appear (CCC), 2015 34th chinese 1070-
language,Hangzhou,28-30 July 2015. 1072
2. Tharaniya Soundhari,Billy Sangeetha S,"shrewd interface basically based talk declaration for private robotization the use of android programming
program",enhancements in information, Embedded and verbal exchange structures (ICIIECS), 2015 in general conference,Coimbatore,19-20 March
2015.
3. Hidayat S,Firmanda SF,"Scheduler and voice declaration on family unit robotization control machine",statistics and dispatch age (ICoICT ), 2015 1/3
by and large conference,Nusa Dua,27-29 may similarly what's more 2015.
4. Joaquin Lopez Fernandez, Diego Perez Losada and Enrique Paz Domonte "An included and immaterial exertion home Automation structure with
versatile mission Scheduling", XV Workshop of considerable business visionaries, JUNE 2014, LEON (SPAIN).
5. J. Fernandez, R. Sanz, E. Paz, and C. Alonso, "using accurate leveled parallel petri nets to accumulate beneficiant versatile robotized ventures:
Robograph," in Robotics and Automation, 2008. ICRA 2008. IEEE overall gathering on, pp. 1372–1377, can in like manner 2008.
6. J. Fernandez, D. Losada, and R. Sanz, "revamping creating security structures with free robots," in advancement for sensible robot groups, 2008.
TePRA 2008. IEEE generally appear on, pp. 19–24, Nov 2008.
7. Abhay Kumar, Neha Tiwari, "Significance green sharp nearby Automation machine", worldwide journal of clinical Engineering and studies (IJSER),
ISSN (on the web): 2347-3878, sum 3 issue 1, January 2015.
8. Carl J. Debono and Kurt Abela,"Implementation of a home Automation structure through a significant FPGA Controller" Electrotechnical convention
MELECON), 2012 sixteenth IEEE Mediterranean,Dec. 2012.
9. Chetana Sarode, Prof.Mr.H.S.Thakar," splendid home after machine", worldwide journal of Engineering studies and packages (IJERA) ISSN: 2248-
9622 www.ijera.com Vol. three, inconvenience 1, January - February 2013
Authors: Ancy.S, Paulraj.D
Paper Title: Big streaming data –A Research on the Concept Drift
Abstract: its cost impact resuscitates the associations to make tremendous volumes of extraordinary beat records. for
instance, Google gets 2 million request, customers percent 680,000 messages on fb, make 1,00,000 tweets on Twitter,
convey 2 hundred million messages, and incorporate 48 hours of video YouTube for each minute. starting late, catalyst
mining and dismembering the spilling estimations has been an undertaking. hence, present day examinations of colossal
estimations fashioners has moved their thought on stream information mining, expressly on its characteristics nearby
degree, pace, and range. an enormous part of the bits of knowledge stream into mining applications objective at anticipating
the classiness of continuous cases inside the facts dispersal. those are fundamentally utilized in applications without over
the top effect on the reaction time. flawless sifting of tremendous substances set for discovering styles the various bits of
knowledge and surmising straightforward models for estimations buoy manufactures the multifaceted idea of buoy data
mining. in any case, point of confinement of the packs, particularly going for walks inside non-stationary conditions, the
movement of tuples underneath the events may in like manner also trade after some time. This kind of burden is implied as
thought glide. stream estimations requires the relentless 8db290b6e1544acaffefb5f58daa9d83 dealing with to oversee
fundamental changes and limit burdens This paper makes an ordinary have a view on spouting bits of knowledge
examination; the thought called skim, its mentioning conditions and its possible answer.

Keywords: Online data mining, Offline data mining. Batch Processing, Processing in incremental manner, Drift.
201.
References: 1073-
1. Wadewale, okay., and S. Desai. "Survey on approach of go together with the flow Detection and category for time various facts set." (2015). 1079
2. https://streamsets.com/reviews/information-float/
3. J Gama, P Medas, G Castillo and Pedro Rodrigues(2004), "gaining knowledge of with go along with the float Detection", Lecture Notes in computer
technology, Vol. 3171, pp 286-295.
4. M Baena-Garcia, J Campo-Avila, R Fidalgo, A Bifet, R Gavaldμa and R Morales-Bueno(2006), "Early glide Detection method", IWKDDS, pp.
seventy seven–86.
5. A Bifet(2009), "Adaptive analyzing and Mining for records Streams and frequent patterns", Doctoral Thesis.
6. G. J. Ross, N. M. Adams, D. Tasoulis, D. Hand(2012), "Exponentially weighted moving average charts for detecting idea flow", global journal
sample recognition Letters, 191-198.
7. k. Nishida(2008), "analyzing and Detecting concept waft", A Dissertation: medical doctor of Philosophy in information technology and technology,
Graduate faculty of facts generation and technology, Hokkaido college.
8. Sobhani P. and Beigy H.(2011), "New glide detection approach for data streams", Adaptive and smart structures, Lecture notes in laptop technology,
Vol. 6943, pp. 88–ninety seven.
9. Isvani Fr ıas-Blanco, Josıe del Campo-ıAvila, Gonzalo Ramos-Jimıenez, Rafael Morales-Bueno, Agust ın Ortiz-D ıaz, and Yail e Caballero-Mota,”
online and Non-Parametric flow Detection techniques based totally on Hoeffding’s Bounds” VOL. 27, NO. three, MARCH 2015.
10. Ludmila I. Kuncheva (2004), "Classifier ensembles for converting environments", more than one Classifier systems, Lecture Notes in computer
technological knowledge, Springer , vol. 3077, pages 1–15.
11. W. N. avenue and Y. Kim (2001), “A streaming ensemble algorithm (SEA) for big-scale class,” in Proc. seventh ACM SIGKDD Int. Conf. Knowl.
Discovery statistics Mining, pp. 377–382.
12. Žliobaitė, Indrė. "studying underneath idea drift: a top level view." arXiv preprint arXiv:1010.4784 (2010).
13. ok. Nishida, okay. Yamauchi, and T. Omori. Ace: Adaptive classi_ers-ensemble device for
14. concept-drifting environments. In In Proc. of sixth international Workshop on a couple of Classi_er systems, MCS 2005, volume 3541 of LNCS,
pages 176185. Springer, 2005.
15. J. Kolter and M. Maloof. Dynamic weighted majority: An ensemble technique for drifting ideas. magazine of tool mastering studies, 8:27552790,
2007.
16. okay. Stanley. studying concept go along with the float with a committee of choice timber. Technical record UT-AI-TR-03-302, computer Sciences
department, university of Texas, 2003.
17. N. street and Y. Kim. A streaming ensemble set of policies (sea) for large-scale classi_cation. In KDD '01: Proc. of the seventh ACM SIGKDD global
conference on know-how Discovery and information Mining, pages 377382. ACM, 2001.
18. H. Wang, W. Fan, P. Yu, and J. Han. Mining concept-drifting data streams using ensemble classi_ers. In KDD '03: Proc. of the ninth ACM SIGKDD
int. conf. on know-how discovery and data mining, pages 226235. ACM, 2003.
19. A. Tsymbal, M. Pechenizkiy, P. Cunningham, and S. Puuronen. Dynamic integration of classi_ers for coping with concept drift. information Fusion,
nine(1):fifty sixsixty eight, 2008.
20. M. Karnick, M. Ahiskali, M. Muhlbaier, and R. Polikar. studying idea go with the flow in nonstation- ary environments the use of an ensemble of
classi_ers based totally technique. In Proc. of IEEE Int. Joint Conf. on Neural Networks (IJCNN 2008), pages 34553462, 2008.
21. M. Scholz and R. Klinkenberg. Boosting classi_ers for drifting standards. Intell. facts Anal.,eleven(1):three28, 2007.
22. H. Becker and M. Arias. real-time ranking with concept glide the usage of professional advice. In KDD '07: Proc. of the thirteenth ACM SIGKDD int.
conf. on knowledge discovery and information mining, pages 86ninety 4. ACM, 2007
23. H. Wang, J. Yin, J. Pei, P. Yu, and J. Yu. Suppressing model over_tting in mining concept- drifting information streams. In KDD '06: Proc. of the
twelfth ACM SIGKDD int. conf. on knowledge discovery and facts mining, pages 736741. ACM, 2006.
24. W. Fan. Systematic facts choice to mine concept-drifting information streams. In KDD '04: Proc. of the tenth ACM SIGKDD int. conf. on
information discovery and records mining, pages 128137. ACM, 2004.
25. P. Zhang, X. Zhu, and Y. Shi. Categorizing and mining concept drifting information streams. In KDD '08: Proc. of the 14th ACM SIGKDD int. conf.
on statistics discovery and data mining, pages 812820. ACM, 2008.
26. J. Rodriguez and L. Kuncheva. Combining on line classi_cation techniques for converting en- vironments. In SSPR/SPR, quantity 5342 of LNCS,
pages 520529. Springer, 2008.
27. R. Klinkenberg and T. Joachims. Detecting idea glide with assist vector machines.
28. In ICML '00: Proc. of the 17th Int. Conf. on machine getting to know, pages 487494. Morgan Kaufmann Publishers Inc., 2000.
29. R. Klinkenberg. gaining knowledge of drifting requirements: example choice vs. example weighting. Intell. statistics Anal., 8(three):281300, 2004.
30. J. Wu, D. Ding, X. Hua, and B. Zhang. tracking concept drifting with an internet-optimized incremental mastering framework. In MIR '05: Proc. of
the seventh ACM SIGMM int. workshop on Multimedia data retrieval, pages 33forty. ACM, 2005.
31. S. Raudys and A. Mitasiunas. Multi-agent machine method to react to sudden environmental modifications. In Proc. of device studying and records
Mining in sample recognition, fifth Int. Conf., MLDM 2007, quantity 4571 of LNCS, pages 810823. Springer, 2007.
32. Y. regulation and C. Zaniolo. An adaptive nearest neighbor classi_cation set of rules for records streams. In Proc. of PKDD, amount 3721 of LNCS,
pages 108120. Springer, 2005.
33. I. Koychev. gradual forgetting for version to idea glide. In Proc. of ECAI 2000 Workshop contemporary issues in Spatio-Temporal Reasoning, pages
101106, 2000.
34. J. Oommen and L. Rueda. Stochastic reading-based prone estimation of multinomial random variables and its applications to pattern popularity in
non-table bound environments. pattern Recogn., 39(three):328341, 2006.
35. J. Gao, B. Ding, W. Fan, J. Han, and P. Yu. Classifying facts streams with skewed beauty distributions and concept drifts. IEEE net Computing,
12(6):3749, 2008.
36. A. Bifet, G. Holmes, B. Pfahringer, R. Kirkby, and R. Gavalda. New ensemble strategies for evolving information streams. In KDD '09: Proc. of the
15th ACM SIGKDD int. conf. on facts discovery and information mining, pages 139148. ACM, 2009.
37. Fang Chu and Carlo Zaniolo. rapid and slight boosting for adaptive mining of information streams. InIn PAKDD, pages 282292. Springer Verlag,
2004.
38. G. Forman. Tackling concept glide with the aid of temporal inductive switch. In SIGIR '06: Proc. Of the 29th annual int. ACM SIGIR conf. on studies
and development in facts retrieval, pages 252259. ACM, 2006.
39. M. Black and R. Hickey. Classi_cation of consumer call information inside the presence of concept float and noise. In soft-Ware 2002: Proc. of the
primary Int. Conf. on Computing in a less than excellent global, pages 7487. Springer-Verlag, 2002.
40. I. Katakis, G. Tsoumakas, and i. Vlahavas. Dynamic function space and incremental function desire for the classi_cation of textual statistics streams.
In Proc. of ECML/PKDD-2006 Int.Workshop on expertise Discovery from statistics Streams, pages 102116, 2006.
41. B. Wenerstrom and C. Giraud-carrier. Temporal facts mining in dynamic feature regions. In ICDM '06: Proc. of the sixth Int. Conf. on information
Mining, pages 11411145. IEEE pc Society, 2006.
42. A. Bifet and R. Gavalda. getting to know from time-changing information with adaptive windowing. In Proc. of SIAM Int. Conf. on statistics Mining
(SDM'07). SIAM, 2007.
43. J. Patist. most efficient window exchange detection. In ICDMW '07: Proc. of the seventh IEEE Int.Conf. on data Mining Workshops, pages 557562.
IEEE laptop Society, 2007.
44. B. Su, Y. Shen, and W. Xu. Modeling idea go along with the go with the flow from the mindset of classi_ers. In Prof. of the conference on
Cybernetics and sensible structures, 2008 IEEE, pages 10551060, 2008.
45. J. Gama, P. Medas, G. Castillo, and P. Rodrigues. getting to know with go with the waft detection. In Advances In Arti_cial Intelligence, Proc. of the
seventeenth Brazilian Symposium on Arti_cial Intelligence (SBIA 2004), volume 3171 of LNAI, pages 286295. Springer, 2004.
46. M. Baena-Garcia, J. del Campo-Avila, R. Fidalgo, A. Bifet, R. Gavalda, and R. Morales- Bueno. Early float detection method. In ECML PKDD 2006
Workshop on information Dis- covery from information Streams, 2006.
47. k. Nishida and adequate. Yamauchi. Detecting concept glide the usage of statistical attempting out. In Proc. Of Discovery technological
understanding, 10th Int. Conf., DS 2007, extent 4755 of LNCS, pages 264269. Springer, 2007.
48. A. Dries and U. Ruckert. Adaptive idea float detection. In SDM, pages 233244. SIAM, 2009.
49. G. Widmer and M. Kubat. studying in the presence of concept go with the waft and hidden contexts.system learning, 23(1):69one zero one, 1996.
50. M. Lazarescu, S. Venkatesh, and H. Bui. using multiple windows to song idea glide. Intell. data Anal., 8(1):2959, 2004.
51. S. Bach and M. Maloof. Paired newbies for idea glide. In Proc. of the 8th IEEE Int. Conf.on data Mining, pages 2332. IEEE Press, 2008.
52. Y. Yang, X. Wu, and X. Zhu. Mining in anticipation for concept alternate: Proactive-reactive prediction in statistics streams. records Min. Knowl.
Discov., thirteen(three):261289, 2006.
53. S. Delany, P. Cunningham, A. Tsymbal, and L. Coyle. A case-based method for tracking idea drift in direct mail _ltering. expertise-based totally
totally systems, 18(four5):187195, 2005
54. I. Katakis, G. Tsoumakas, and i. Vlahavas. monitoring recurring contexts the use of ensemble classi_ers: an application to e-mail _ltering. information
and facts structures, 2009.
55. R. Klinkenberg. Meta-studying, model choice and example selection in device mastering domains with idea go together with the drift. In Proc. of
Annual Workshop of the special hobby group on device studying, know-how Discovery, and facts Mining (FGML-2005) of the German laptop
technological know-how Society (GI) studying - records Discovery Adaptivity (LWA-2005),pages sixty four171, 2005.
56. Y. Yang, X. Wu, and X. Zhu. Conceptual equivalence for assessment mining in classi_cation mastering. facts Knowl. Eng., 67(3):413429, 2008.
57. M. Pourkashani and M. Kangavari. A cell automata method to detecting idea go together with the float and managing noise. In AICCSA '08: Proc. of
the 2008 IEEE/ACS Int. Conf. on pc systems and programs, pages 142148. IEEE laptop Society, 2008.
58. S. Hashemi, Y. Yang, M. Pourkashani, and M. Kangavari. To higher deal with concept trade and noise: A cell automata technique to statistics flow
classi_cation. In Australian Conf. on Arti_cial Intelligence, extent 4830 of LNCS, pages 669674. Springer, 2007.
59. M. Lazarescu and S. Venkatesh. using selective reminiscence to tune concept e_ectively. In Int. Conf. on shrewd systems and manipulate, pages 1420,
2003.
60. J. Beringer and E. Hullermeier. E_cient example-primarily based learning on statistics streams. Intell. information Anal., 11(6):627650, 2007.

202. Authors: Soni P M, Varghese Paul


Paper Title: Algorithm For the Loan Credibility Prediction System
Abstract: Now a day’s people approach or select bank loans to fulfill their needs, which are very common. This practice
has been increasing day by day especially for business, education, marriage, agriculture as well. But several people take
advantage and misuse the facilities given by the bank. With technology developing at such a peak stage in these days, data
mining plays a key role in computer science to solve such issues. Classification is the most suitable predictive modeling
technique in data mining to predict the loan repayment capability of a customer in a banking industry. There are various
methods to improve the accuracy of a classification algorithm. The accuracy of random forest classification algorithm can
be improved using Ensemble methods, Optimization techniques and Feature selection. Various feature selection methods
are available. In this research work a novel hybrid feature selection algorithm using wrapper model and fisher score is
introduced. The main objective of this paper is to prove that new hybrid model produces better accuracy than the
traditional random forest algorithm. This paper also compares the result obtained from other classification methods and
feature selection methods to prove that proposed algorithm produces better classification accuracy. The experiments were
being done using tools such as weka, R, and python programming. This research aims at introducing a new technique
which can increase the progress of banking sector. The accuracy level of this new algorithm in finding the potential of the
customer is much higher than the data mining classification algorithm and thus it proves to be very helpful for bank
officers.

Index Terms: Classification, feature, LCPS, fisher score, threshold

References:
1. Vivek Bhambri “Application of Data Mining in Banking Sector”, IJCSt Vol. 2, ISSue 2, June 2011, ISSN : 2229-4333(Print) | ISSN : 0976-
8491(Online)
2. L. Torgo, Functions and data for “data mining with r” R package version 0.2.3, 2012
3. Jiawei Han, Micheline Kamber,” Data Mining: Concepts and Techniques”, Morgan Kaufmann, Elsevier, 2006 1080-
4. Soni P M, Varghese paul , “A Novel Hybrid Classification Model For the Loan Repayment Capability Prediction System”, International Journal on 1087
Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248 Volume: 4 Issue: 1
5. Marcos Evandro Cintra∗, Trevor P. Martin†, Maria Carolina Monard‡, and Heloisa de Arruda Camargo§ , “Feature Subset Selection Using a Fuzzy
Method”, 2009 International Conference on Intelligent Human-Machine Systems and Cybernetics.
6. Challita N., Khalil M., Beauseroy P. 2016 IEEE Int Multidiscip Conf Eng Technol. 2016. New feature selection method based on neural network and
machine learning; pp. 81–84.
7. I. Guyon and A. Elisseeff. An introduction to variable and feature selection.Journalof Machine Learning Research, 3:1157–1182, March 2003.
8. K. Kirra and L. A. Rendell. The feature selection problem: Traditional methodsand a new algorithm. InProceedings of the 10th National Conference
on ArtificialIntelligence, pages 129–134, San Jose, CA, September 1992. MIT Press, Cambridge,MA.
9. P. Pudil, J. Novoviˇcov ́a, and J. Kittler. Floating search methods in feature selection.Pattern Recognition Letters, 15:1119–1125, November 1994.
10. C.M.Bishop. Neural Networks for Pattern Recognition. Oxford University Press, 1996.
11. A. Jain and D. Zongker. Feature selection: Evaluation, application and small sample performance. IEEE Transactions on Pattern Analysis and
Machine Intelligence, 19(2):153–158, February 1997.
12. UCI Benchmark Repository – a huge collection of artificial and real-world dataset. University of California, Irvine, Dept. of Information and
Computer Sciences. http://www.ics.uci.edu/˜mlearn, June 2004.
13. M. Kudo and J. Sklansky. Classifier-independent feature selection for two-stage feature Selection. In SSPR ’98/SPR ’98: Proceedings of the Joint
IAPR International Workshops on Advances in Pattern Recognition, LNCS, pages 548–554, London, UK,
14. August 1998. Springer-Verlag.
15. Quanquan Gu, Zhenhui Li, Jiawei Han “Generalized Fisher Score for Feature Selection”
16. Gilles Louppe “UNDERS TANDING RANDOM FORE S T S from theory to practice “ arXiv:1407-7502v3 [stat.ML] 3 June 2015
17. https://medium.com/@sagar.rawale3/feature-selection-methods-in-machine-learning-eaeef12019cc
18. Esra Mahsereci Karabuluta, Selma Ayşe Özelb, Turgay İbrikçib , “A comparative study on the effect of feature selection on classification accuracy” ,
Procedia Technology 1 ( 2012 ) 323 – 327
19. Kavitha C.R, Soni P.M,” A STACKING FRAMEWORK FOR THE PREDICTION OF BINARY CLASSIFICATION PROBLEMS “, International
Journal of Civil Engineering and Technology (IJCIET) Volume 8, Issue 5, May 2017, pp. 692–702.
20. Soni P M, Varghese Paul, “ AN EFFICIENT DATA PRE PROCESSING FRAME WORK FOR LOAN CREDIBILITY PREDICTION SYSTEM
“,IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
Authors: K. Anbumani, R. RaniHemamalini
Paper Title: Linear Quadratic Regulator for three Interacting Cylindrical Tank Control
Abstract: In this paper, optimal control for three interacting cylindrical process was designed to control the level of
process tanks. This paper describes the theoretical base and practical application of Linear Quadratic Regulatory (LQR)
manage for a non-rectangular framework with controlled components and three methodology yields. as a rule, state
remarks controller is expected for restricting country change with insignificant control quality. LQR is a top-quality
multivariable comments system which is organized assembled totally generally as for the u . s . a . furthermore, control
weighting systems. The general execution of controller is advanced by methods for proper choice of Q, R grid. The most
pleasurable country remarks option is picked to transport the states to zero and integrator controller is added to transport the
respect the set segment. The test outcomes admonish that the made control plans gems agreeably.
203. Keywords: Three Interacting cylindrical tank Process, Linear Quadratic Regulator, State feedback control. 1088-
1092
References:
1. R.W.H.Sargent, "most green control", magazine of computational and realized number juggling, sum 124 , issue1-2, pp.361-371, 2000.
2. Erding cong , Minghui hu , Shandong Tu, Huihe shao , "another noteworthy control machine structure for manufactured machine"., chinese language
mag of blend building , vol.2, inconvenience 12 , pp.1341-1346, 2013.
3. Bryson Jr. AE , "best control 1950 to 1985", IEEE supervise structure magazine , vol.16 , issue 3 , pp.26-33,1996.
4. Wei Zhang , Jianghai hu, Jianming lian., "Quadratic most extraordinary wonderful control of traded straight stochastic structures", systems and direct
letters , vol.59, issue 11, pp.736-744, 2010.
5. N.kumaresan, P.Balasubramaniam., "best in class control for stochastic direct single machine the use of neural frameworks", magazine of technique
control, vol.19,issue3 , pp.482-488, 2009.
6. M. Guay , R.Dier, J.Hahn, P.J. Mulellan., "effect of device nonlinearity on straight quadratic controller execution" , vol.15 , issue 1, pp. 113-124,
2005.
7. V.Sundarapandian, "A separation speculation for strong post position of discrete-time direct manage structures wih entire solicitation spectators",
Mathematical and PC illustrating, vol.40 3, issue1-2, pp.forty two-48, 2006.
8. Bak, D., Michalik, M. what's more, Szafran, J. 2003, "programming undertaking of Kalman channel out approach to manage table certain and non
table without question nation onlooker plan", quality Tech show court docket models, IEEE Bologna IEEE, , pp. 6. Vol. three, 2003.
9. E. Hendricks, O. Jannerup and P. H. Sørensen, "best observers: Kalman channels," in Linear structures control mysterious Springer, pp. 431-491,
2008.
10. ok. H. Johansson, The Quadruple-Tank framework: "A Multivariable Laboratory way with an Adjustable zero", IEEE Transactions on control
structures time, eight(3), (2000), 456–465.
11. R.S. Bucy , "all inclusive thought of the Riccati condition" , magazine of pc and device sciences, vol.1, problem.4, pp.349-361, 1967.
12. A.C.M. Ran, R.Vreugdenhil , "life and appraisal speculations for logarithmic Ricatti conditions for continous-and discrete structures", Linear Algebra
and its software,vol.99 , pp. 63-80 three ,1988.
Authors: Sowmya K Menon, Varghese Paul
Paper Title: Framework of Web Recommendation System For Browsing Behaviour Prediction
Abstract: Social networking is an important aspect in our day today life. In this era our main aim is to develop systems
recommending good types of websites to users. As the changes in social networking is increasing day by day ,there should
be the need for a system recommending the websites the user is having great interest. This paper focuses on recommending
systems for browsing behavior prediction. Optimization of k-means code can be done using simulated annealing
techniques. Simulated annealing is used to solve the problem of local minima. This function searches for global minimum
of a very complex non-linear objective function with a very large number of optima. We are going to optimize k-means
code by simulated annealing using the GENSA package present in the R-studio. After the clusters are made the system
automatically recommends the clusters that are having the same browsing behavior patterns . Here we are analyzing the
browsing habits of a group of users and these users are grouped into different clusters in the server so that we can predict
these type of users who tend to browse the similar types of websites. The main idea used in the system is that it will
recommend the websites that the users are frequently visiting. The implementation phase includes the entire system being
loaded into a cloud framework of different users and a cloud server which is based on Google App Engine. The user
belonging to the same cluster are recommended based on the browsing behavior. In this paper we focus on the optimization
of k-means code using simulated annealing techniques. In order to get the accuracy, we just compare the browsing behavior
of different users in the database and the websites the system will be going to recommend.. With our project we try to
implement a movie recommendation system[15] which would provide the users with movie suggestions using
Collaborative Filtering and Clustering algorithms building a model from a user’s past behavior (movies previously watched
or selected and/or numerical ratings given to those movies) as well as similar decisions made by other users.

Index Terms: Clustering, GENSA, Google app engine, Recommendation system


204.
1093-
References: 1099
1. "Dr. M. Sudheep Elayidom" Data Mining and Warehousing“ Cengage Learning 2015 ISBN-13 978-81-315-2586-9
2. "G. Phanendra Babu", M. Narsimha Murty " Simulated annealing for selecting optimal initial seed in the k means algorithm", 199
3. “Gediminas Adomavicius and Alexander Tuzhilin” Toward the Next Generation of Recommender Systems: ASurvey of the State-of-the-Art and
Possible Extensions , ieee transactions on knowledge and data engineering, vol. 17, no. 6, june 2005
4. K-Means Algorithm Based on Real Data , Proceedings of the Federated
5. Jia Li and Osmar R. Ziane, “Combining Usage, Content, and Structure Data to Improve Web Site Recommendation”, In Proceedings of the 5th
International Conference, EC-Web , Spain, 2004, pp 305-315.Reference 1
6. Harita Mehta, Shveta Kundra Bhatia, Punam Bedi and V. S. Dixit, (November 2011). Collaborative Personalized Web Recommender System using
Entropy based Similarity Measure. IJCSI International Journal of Computer Science Issues, 8(6), pp. 231-240.
7. G. Adomavicius and A. Tuzhilin,(2005).Towards the next generation of recommenender systems: a survey of the state-of-the-art and possible
extensions. IEEE Trans. on Data and Knowledge Engineering, 17(6), pp. 734-749.
8. Ungar L.H. and Foster D.P, “Clustering Methods for Collaborative Filtering”, In the Proceedings of the Workshop on Recommender Systems, AAAI
Press, 1998.
9. Badrul M. Sarwar, George Karypis, Joseph A. Konstan, and John Riedl, “.Analysis of recommendation algorithms for e-commerce”, In Proc of ACM
Conference on Electronic Commerce, Minneapolis, MN, USA , 2000, pp. 158–167.
10. Upendra Shardanand and Patti Maes, “Social information filtering: Algorithms for automating “word of mouth””, In Proc of ACM CHI’95
Conference on Human Factors in Computing Systems, Denver, Colorado, USA , 1995, pp. 210– 217.
11. W. Wong and A. Fu. Incremental document clustering for web page classification, 2000. [Online].
Available:http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.21.2379&rep=rep1&type=pdf
12. Arbee L.P, Chen Yi-Hung Wu, Yong-Chuan Chen, “Enabling personalized recommendation on the web based on user interests and behaviours”, In
proc. of 11th International Workshop on research Issues in Data Engineering, Heidelberg, 2001, pp.17-24.
13. Januz Sobecki ,”Implementations of web based recommender systems using hybrid methods”, In International journal of computer science and
applications,Vol.3 issue 3,pp 52-64.
14. C. Lin, S. Alvarez, and C. Ruiz. Collaborative recommendation via adaptive association rule mining, 2000.
15. Xiaobin Fu, Jay Budzik, and Kristian J. Hammond. Mining navigationhistory for recommendation. In Intelligent User Interfaces, pages 106–112,
2000.W.
Authors: B. Ravindra Babu, M. Veera Sekhar Rao
Paper Title: Resource Scheduling under Diversified Service Quality Factors (RSDSQ) for IAAS in Cloud Computing
Abstract: The Resource Scheduling under Diversified Service Quality Factors for IAAS in Cloud Computing is
addressed in this manuscript. This is since the resources under cloud platform are loosely coupled according to the SLA
between cloud platform and the resource partakers. This enables the possibility of multiple resources from diversified
partakers, those intended to accomplish similar service. The resource scheduling intends to select one resource among
available resources to accomplish the scheduled task(s). The contemporary contributions related to resource scheduling are
205. specific to one or more traditional QoS factors, which includes cost, deadline constrain, and power consumption. However,
1100-
the quality of service often influenced by the contextual factors of the IAAS. Hence, this manuscript portrayed a novel
1104
resource scheduling strategy that orders the resources under degree of optimality, which is proposed in this manuscript.
Unlike traditional methods of resource scheduling, this manuscript portrayed set of context related factors that are further
used to define the heuristic measure called “Degree of Optimality”. The experimental study on simulated environment
elevating the proposal performance advantage in averse to other existing methods.

Keywords: resource management (RM), resource scheduling (RS), resource provisioning (RP), QoS.
References:
1. Chana, Inderveer, and Sukhpal Singh. "Quality of service and service level agreements for cloud environments: Issues and challenges." Cloud
Computing. Springer, Cham, 2014. 51-72.
2. Liu, Zhaobin, et al. "Resource preprocessing and optimal task scheduling in cloud computing environments." Concurrency and Computation: Practice
and Experience 27.13 (2015): 3461-3482.
3. Zhu, Qian, and Gagan Agrawal. "Resource provisioning with budget constraints for adaptive applications in cloud environments." IEEE Transactions
on Services Computing 5.4 (2012): 497-511.
4. Abrishami, Saeid, Mahmoud Naghibzadeh, and Dick HJ Epema. "Cost-driven scheduling of grid workflows using partial critical paths." IEEE
Transactions on Parallel and Distributed Systems 23.8 (2011): 1400-1414.
5. Shifrin, Mark, Rami Atar, and Israel Cidon. "Optimal scheduling in the hybrid-cloud." 2013 IFIP/IEEE International Symposium on Integrated
Network Management (IM 2013). IEEE, 2013.
6. Duan, Rubing, Radu Prodan, and Xiaorong Li. "Multi-objective game theoretic schedulingof bag-of-tasks workflows on hybrid clouds." IEEE
Transactions on Cloud Computing 2.1 (2014): 29-42.
7. Rahman, Mustafizur, Xiaorong Li, and Henry Palit. "Hybrid heuristic for scheduling data analytics workflow applications in hybrid cloud
environment." 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum. IEEE, 2011.
8. Chopra, Nitish, and Sarbjeet Singh. "Survey on scheduling in hybrid clouds." Fifth International Conference on Computing, Communications and
Networking Technologies (ICCCNT). IEEE, 2014.
9. Javadi, Bahman, Jemal Abawajy, and Rajkumar Buyya. "Failure-aware resource provisioning for hybrid Cloud infrastructure." Journal of parallel and
distributed computing 72.10 (2012): 1318-1331.
10. Van den Bossche, Ruben, Kurt Vanmechelen, and Jan Broeckhove. "Cost-optimal scheduling in hybrid iaas clouds for deadline constrained
workloads." 2010 IEEE 3rd international conference on cloud computing. IEEE, 2010.
11. He, Sijin, Li Guo, and Yike Guo. "Real time elastic cloud management for limited resources." 2011 IEEE 4th International Conference on Cloud
Computing. IEEE, 2011.
12. Loganathan, S., and S. Mukherjee. "Job Scheduling with Efficient Resource Monitoring in Cloud Datacenter." TheScientificWorldJournal 2015
(2015): 983018-983018.
13. Zuo, Liyun, et al. "A multi-objective hybrid cloud resource scheduling method based on deadline and cost constraints." IEEE Access 5 (2017): 22067-
22080.
14. Calheiros, Rodrigo N., et al. "CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource
provisioning algorithms." Softw. Pract. Exper 41 (2011): 23-50.

Authors: Viswanatha Reddy Allugunti, Elango NM, Kishor Kumar Reddy C


Paper Title: Diabetes Kaggle Dataset Adequacy Scrutiny Using Factor exploration and Correlation
Abstract: Diabetes is one in everything about principal serious incessant sicknesses. In accordance with American
sickness Association (ADA), it forces a gigantic financial weight at the nations. Consideration charges, in view of
polygenic infection, represent 11% ($465 billion) of the complete consideration costs in the worldwide in 2011. By 2030,
this assortment is anticipated to surpass $595 billion. Around the world, there are around 366 million people with polygenic
disorder and it's measurable that 552 million will be influenced by 2030 comes that diabetes is that the seventh driving
intention in mortality in 2030. The way to diminish these dangers could be a significant trouble. This paper destinations to
demonstrate that the chose dataset with 15000 data is alright for experimentation misuse Kaiser-Meyer-Olkin. It conjointly
objectives to demonstrate that grid is accomplice unit network abuse Bartlett's trial of Sphericity.

Index Terms: Diabetes. Correlation Analysis, Factor Analysis, Health care, Kaiser-Meyer-Olkin Measure

References:
1. GyorgyJ.Simon,Pedro J.Caraballo,Terry M. Therneau,Steven S. Cha, M. Regina Castro and Peter W.Li “Extending Association Rule Summarization
Techniques to Assess Risk Of Diabetes Mellitus,” IEEE Transanctions on Knowledge and Data Engineering ,vol 27,No.1,January 2015
2. Dr.Zuber khan, shaifali singh and Krati Sexena,” Diagnosis of Diabetes Mellitus using K- Nearest Neighbor Algorithm,” in proceeding of
International Journal of Computer Science Trends and Technology, vol.2 , July-Aug 2014
3. Mukesh kumari and Dr. Rajan Vohra,“Prediction of Diabetes Using Bayesian Network,”in proceeding of International Journal of Computer Science
and Information Technologies, vol. 5 , 2014
4. Jianchao Han, Juan C. Rodriguze and Mohsen Beheshti , “Diabetes Data Analysis and Prediction Model Discovery Using RapidMiner,”in proceeding
of Second International Conference on Future Generation Communication and Networking, vol.2,2008
5. Wang ZuoCheng and XUE Li Xia ,“A Fast Algorithm for Mining Association Rules in Image,” in proceeding of International Conference on Data
206. Engineering, vol.5, 2008
6. Dr. Pramanand Perumal and Sankaranarayanan, “Diabetic prognosis through Data Mining Methods and Techniques,” in proceeding of International 1105-
Conference on Intelligent Computing Applications, vol. 2, 2014 1110
7. Satyanarayana Gandi and Amarendra Kothalanka,“An Efficient Expert System For Diabetes By Naïve Bayesian Classifier,” in proceeding of
International Journal of Engineering Trends and Technology ,vol. 4 ,Issue 10 , Oct 2013
8. Ramkrishnan Shrikant and Rakesh Agrawal,“Fast Algorithms for mining association rule,” in proceeding of IEEE International Conference on Data
Engineering,vol.16,2007
9. Dilip Kumar Choubey and Sanchita Paul,”GA_MLP NN: A Hybrid Intelligent System for Diabetes Disease Diagnosis”,in proceedings of
I.J.Intelligent System and Applications, vol.1,pp.49-59,2016
10. Alan J. Garber,MD and Martin J.Abrahamson, Case study on ”AACE/ACE Comprehensive Diabetes Management Algorithm”
11. H. S. Kim, A. M. Shin, M. K. Kim, and N. Kim, “Comorbidity study on type 2 diabetes mellitus using data mining,” in proceedings of Korean J.
Intern. Med., vol. 27, no. 2, pp. 197– 202, Jun. 2012
12. Kawita Rawat and Kawita Bhurse” A Comparative Approach for Pima Indians Diabetes Diagnosis using LDA-Support Vector Machine and Feed
Forward Neural Network,”in proceedings of International Journal of Advanced Research in Computer Science and Software Engineering, vol.4, Nov.
2014
13. G. S Collins, S. Mallett, O. Omar, and L.-M. Yu, “Developing risk prediction models for type 2 diabetes: A systematic review of methodology and
reporting,”in proceedings of BMC Med., 9:103,Sept. 2011
14. R. Agrawal and R. Srikant, “Fast algorithms for mining association rules,” in Proceedings of 20th VLDB, Santiago, Chile, 1994
15. M. A. Hasan, “Summarization in pattern mining,” in proceedings of Encyclopedia of Data Warehousing and Mining, 2nd ed. Hershey, PA,
USA:Information Science Reference, 2008
16. R.P.Bakshi and S.Agrawal,”Modeling Risk of Prediction of Diabetes - a preventive Measure,” in proceedings of BMC Med.,2012.
17. S.Sapna and Dr.A.Tamilarasi,”Implementation of Genetic algorithm in Predicting Diabetes” in Proceedings of International journal of Computer
science ,vol.9,Issue.1,N0.3,Jan-2012.
18. S. Nagarajan and R.M.Chandrasekaran,”Data Mining Techniques for Performance Evaluation of Diagnosis in Gestational Diabetes” in proceedings of
International Journal of Current Research and academic Review, vol. 2,No. 10,pp. 91-98.
19. V.Vijayan and A.Ravikumar,” Study of data mining algorithms for Prediction and diagnosis of diabetes mellitus,” in proceedings of International
Journal of Computer Application, vol. 9,No. 17, June 2014.
20. J.Tuomilehto, “Prevention of type 2 diabetes mellitus by changes in lifestyle among subjects with impared glucose tolerance”,in proceedings of
International Journal of Medical Research, vol. 344,no. 18,pp. 1343-1350, 2001.
21. K.Rajesh and V.Sangeetha,”Application of Data Mining Methods and Techniques for Diabetes Diagnosis,” in proceedings of International journal of
Engineering and Innovative Technology, vol.2, Issue 3, September 2012.
22. B.L. Shivkumar and S Alby,”A Survey on Data Mining Technologies for Prediction and Diagnosis of Diabetes,” in proceedings of International
Conference on Intelligent Computing Application, 2014.
23. Carlos Fernandez_Llatas and Antonio Martinez_Millanu, “Diabetes care related process modelling using Process Mining Techniques Lessons
Learned in the Application of Interactive Pattern Recognition :Coping with the Spaghetii Effect, 2015
Authors: Rukmini M S S , Usha Devi Y
Paper Title: A Compact Two Element Orthogonal MIMO Antenna for Millimeter Wave Applications
Abstract: A novel compact orthogonal Multiple- Input- Multiple- Output (MIMO) antenna is proposed for milli-meter
wave based wireless communications. It operates with an impedance-bandwidth of 17.7GHz from 24.4- 42.1GHz for S11<
-10dB. The isolation between two orthogonal MIMO elements is greater than 45dB. The anticipated orthogonal MIMO
antenna model is analyzed at significant frequencies 26GHz, 28GHz, 30GHz and 33GHz. At these frequencies, results are
investigated for far-field radiation characteristics, current densities with port isolation, DG (Diversity Gain) and ECC
(Envelop Correlation Coefficient). Investigated results signify that the projected orthogonal MIMO antenna is appropriate
for milli-meter wave based wireless applications.

Index Terms: Current densities, Diversity gain, ECC, Millimeter wave communications, Orthogonal MIMO antenna,
Mutual coupling, Port isolation.

References:
1. Theodore S. Rappaport , Yunchou Xing, et al., “Overview of millimeter wave communications for fifth-generation (5G) wireless networks—with a
focus on propagation models,” IEEE Transactions on Antennas and Propag., volume 65, no.12, 2017, pp. 6213–6230.
207. 2. D. Liu et al., “What will 5G antennas and propagation be?” IEEE Transactions on Antennas and Propag., volume 65, no.12, 2017, pp. 6205–6212.
1111-
3. W. Hong, “Solving the 5G mobile antenna puzzle: Assessing future directions for the 5G mobile antenna paradigm shift,” IEEE Microwave
Magazine, volume 18, no.7, 2017, pp. 86–102. 1115
4. Wonbin Hong , K. H. Baek and Seungtae Ko, “Millimeter-wave 5G antennas for smartphones: Overview and experimental demonstration,” IEEE
Transactions on Antennas and Propag., volume 65, no.12, 2017, pp.6250–6261.
5. Q. Wang, N. Mu, L. Wang et al., “5G MIMO Conformal Microstrip Antenna Design,” Wireless Comms. and Mobile Computing, 2017, pp.1–11.
6. R.A. Alhalabi and G. M. Rebeiz, “High-efficiency angled-dipole antennas for millimeter-wave phased array applications,” IEEE Transactions on
Antennas and Propag., volume 56, no.10, 2008, pp.3136–3142.
7. Syeda Fizzah Jilani, Akram Alomainy, “A Multiband Millimeter-Wave Two-Dimensional Array Based on Enhanced Franklin Antenna for 5G
Wireless Systems,” IEEE Antennas Wireless Propag. Letters, volume 16, 2017, pp. 2983 - 2986.
8. Wei L., Richard W. Ziolkowski, Thomas C. B., “28 GHz Compact Omnidirectional Circularly Polarized Antenna for Device-to-Device
Communications in the Future 5G Systems,” IEEE Transactions on Antennas and Propagation, volume 65, issue. 12, 2017, pp. 6904-6914.
9. Ojaroudiparchin N., Shen M., and Pedersen G.F., “Investigation on the Performance of Low-Profile Insensitive Antenna with Improved Radiation
Characteristics for the Future 5G Applications,” Microwave and Optical Tech. Letters, volume 58, no.9, 2016, pp. 2148-2151.
10. Nor N. M., Jamaluddin M. H., Kamarudin M. R., and Khalily M., “Rectangular Dielectric Resonator Antenna Array for 28GHz Applications,” PIER
C, volume 63, 2016, pp. 53-61.
11. Jilani S. F. and Alomainy A., “Millimetre-wave T-shaped MIMO antenna with defected ground structures for 5G cellular networks,” Microwave
Antennas Propag., volume 12, no.5, 2018, pp.672–677.
12. Y. Usha Devi, Rukmini M. S. S., Madhav B. T. P., “Liquid Crystal Polymer based Conformal 5G Antenna for Vehicular Communication,” Materials
Research Express , volume 6, no.1, 2019.
Authors: Parthiban. S, Gopinathan. P
Paper Title: Statistical Hypothesis Test on Industrial Applications through Ranks from Cog of TrFNs
Abstract: This paper aims at a procedure for the test of hypothesis of two sample t-test by representing a defuzzification
method of Triangular Fuzzy Numbers (TFNs) and Trapezoidal Fuzzy Numbers (TrFNs) based on the Rank obtained from
Centre of Gravity (COG) which can be followed in industries and other mathematical applications.

Index Terms: Alpha Cut, COG, TrFNs, Test of Hypothesis, Two Sample t – test.

References:
1. Abbasbandy, Saeid, and Majid Amirfakhrian. "The nearest trapezoidal form of a generalized left right fuzzy number." International Journal of
Approximate Reasoning 43.2 (2006): 166-178.
2. Bansal, Abhinav. "Trapezoidal fuzzy numbers (a, b, c, d): arithmetic behavior." International Journal of Physical and Mathematical Sciences 2.1
(2011).
3. Taheri, S. Mahmoud, and Mohsen Arefi. "Testing fuzzy hypotheses based on fuzzy test statistic." Soft Computing 13.6 (2009): 617-625.
208. 4. Asady, B. "Trapezoidal approximation of a fuzzy number preserving the expected interval and including the core." American Journal of Operations
Research 3.02 (2013): 299. 1116-
5. Buckley, James J. Fuzzy probability and statistics. Heidelberg: Springer, 2006. 1118
6. Chachi, Jalal, Seyed Mahmoud Taheri, and Reinhard Viertl. "Testing statistical hypotheses based on fuzzy confidence intervals." Austrian Journal of
Statistics 41.4 (2012): 267-286.
7. Devore, Jay L. Probability and Statistics for Engineering and the Sciences. Cengage learning, 2011.
8. Parthiban, P. Gajivaradhan1 S. "Statistical Hypothesis Testing Through Trapezoidal Fuzzy Interval Data." (2015).
9. Gajivaradhan, P., and S. Parthiban. "Two sample statistical hypothesis test for trapezoidal fuzzy interval data." (2015).
10. Grzegorzewski, Przemysław. "Testing statistical hypotheses with vague data." Fuzzy sets and Systems 112.3 (2000): 501-510.
11. Hocking, Ronald R. Methods and applications of linear models: regression and the analysis of variance. John Wiley & Sons, 2013.
12. Klir, George J., and Tina A. Folger. "Fuzzy sets, uncertainty, and information." (1988).
13. Klir, George J., and Baozung Yuan. Fuzzy sets and fuzzy logic: theory and applications. Vol. 574. New Jersey: Prentice Hall PTR, 1995.
14. Liou, Tian-Shy, and Mao-Jiun J. Wang. "Ranking fuzzy numbers with integral value." Fuzzy sets and systems 50.3 (1992): 247-255.
15. Rao, P., and N. Ravi Shankar. "Ranking fuzzy numbers with a distance method using circumcenter of centroids and an index of modality." Advances
in Fuzzy Systems 2011 (2011): 3.
16. Viertl, Reinhard. Statistical methods for fuzzy data. John Wiley & Sons, 2011.
17. Voskoglou, Michael. "Use of the triangular fuzzy numbers for student assessment." arXiv preprint arXiv: 1507.03257 (2015).
18. Zadeh, Lotfi A. "Fuzzy probabilities." Fuzzy Sets, Fuzzy Logic, and Fuzzy Systems: Selected Papers by Lotfi A Zadeh. 1996. 643-652.
Authors: T.Durga Prasad, Surendra Verru
209.
Paper Title: Evaluation of Solvency Position of Nationalized Banks in India (With use of the Bankometer & Altaman’s
Techniques)
Abstract: Banking sector is the backbone of economic development. If a particular country had been effected due to
inflation of money, financial crisis, imbalance of economy development and poor supply of money circulation etc...These
are all causes which can be linked for the failure of the banking sector. If one country had affected these types of causes
then it automatically effects another country also because some nation’s economy growth rate depends upon another
nation’s economy so that is the reason all nations are accepted and recognized by the BASEL’s committee norms
worldwide. The solvency position of banks structured and strengthens by BASEL committee norms which asses each and
every bank, and also measures the financial soundness from within. Does Indian Nationalized banks following BASEL
norms and what would be the financial position in the present era? To asses and evaluate the financial positions there are
assorted authors suggested universally and accepted various techniques which are CAMEL, BANKOMETER (S-Score),
ALTAMAN’s(Z-Score), SPRINGATE’s Model, OHLSON’s Model, ZMIJEWSKI Model, etc., However this present
study purposes rationale for solvency of selected 19 Nationalized banks in India by Ataman’s(Z-score) and Bankometer (S-
score)models since 2014 then to 2018.

Index Terms: Altaman’s, Bankometer, Nationalized Banks, Solvency, BASEL Norms

References:
1. Md. Zahidur Rahman, (2017), Assessing financial stability: Financial Soundness Evaluation of Selected Commercial Banks in Bangladesh: An
1119-
Application of Bankometer Model , Bangladesh Research Journal of Finance and Accounting, www.iiste.org ISSN 2222-1697 (Paper) ISSN 2222-
2847 (Online) Vol.8, No.2, 2017,pp.no.63 to 70. 1125
2. Indra Kumar Kattel, (2014), Assessing Financial Solvency: Evaluating the Financial Solvency of Selected Commercial Banks of Nepal: An
Application of Bankometer, JOURNAL OF ADVANCED ACADEMIC RESEARCH (JAAR) ISSN: 2362-1303 (Paper) e ISSN: 2362-1311(Online
January 2014, Vol. I No.1, pp.no.88-95.
3. Amin Jan & Maran Marimuthu, (2015), Comparative Analysis: Altman Model and Bankruptcy Profile of Islamic Banking Industry: A Comparative
Analysis on Financial Performance, International Journal of Business and Management; Vol. 10, No. 7; 2015 ISSN 1833-3850 E-ISSN 1833-8119
Published by Canadian Center of Science and Education.pp.no.110-119.
4. Chotalia T. N. Rao , (2014), Evaluation of Financial Health of Sampled Private Sector Banks with Altman Z-score Model, International Journal of
Research in Management, Science & Technology (E-ISSN: 2321-3264) Vol. 2, No. 3, December 2014 Available at www.ijrmst.org, pp.no.
42-46.
5. Roli Pradhan, (2014),Evaluation of solvency position: Z Score Estimation for Indian Banking Sector Published in International Journal of Trade,
Economics and Finance, Vol. 5, No. 6, December 2014, PP.NO..516-520.
6. Hoque, M. R., &Rayhan, M. I. (2013). Efficiency Measurement on Banking Sector in Bangladesh. Dhaka University Journal of Science, 61(1),
1-5.
7. Altman, E. I. (1968). Financial ratios discriminate analysis and the prediction of corporate bankruptcy. The journal of finance, 23(4), 589-609.
8. Management Accountancy, by Hrishikesh Chakraborty and Srijit Chakraborty, published by Oxford Higher Education press, PP.No.134-180.
9. Management Accounting Text, Problems and Case by MY Khan and PK Jain, published by McGraw Hill Education (India) Private Limited, seventh
edition, pp.no.6.1 to 6.96.
10. Financial Accounting for Management an analytical perspective by Ambrish Gupta, Published by Pearson Press, 4th edition, pp.no.88-131.
11. Moneycontrol.com
12. www.rbi.com
Authors: Mohammed Ali Shaik, T. Sampath Kumar, P. Praveen, R. Vijayaprakash
Paper Title: Research on Multi-Agent Experiment in Clustering
Abstract: Clustering is the process of classification of data in any of the emerging fields in present day scenario. In this
paper we have proposed a framework for “multi-agent based clustering (MAS)” which is based on the working
methodology of individual agents that initiate to dissolve a cluster. The major identification in this paper is once a cluster is
created by an agent distinct types of agents will communicate and send messages for performing a task given to them, this
process continues till the dissolving of cluster. An agent has the capability to either create a cluster or kill the cluster. And
agents can even perform Inter cluster communication (ICC) between various clusters that are created as per requirement or
necessity. We used K-means and KNN algorithms and shown that ICC can improve a clustering environment.

Index Terms: Multi-Agent Data Mining, Clustering, Inter cluster communication.

References:
1. Agogino, A., Tumer, K.: E cient agent-based cluster ensembles. In: Proc. 5th Int. Conf. on Autonomous agents and multiagent systems. pp.
1079{1086. AAMAS '06, ACM, New York, NY, USA (2006)
2. Bailey, S., Grossman, R., Sivakumar, H., Turinsky, A.: Papyrus: A system for data mining over local and wide area clusters and super-clusters.
IEEE Supercomputing (1999)
210. 3. Bellifemine, F., Bergenti, F., Caire, G., Poggi, A.: JADE: a java agent development framework. In: Bordini, R.H. (ed.) Multi-agent
programming: languages,platforms, and applications, p. 295. New York: Springer (2005) 1126-
4. Cao, L., Gorodetsky, V., Mitkas, P.A.: Guest editors' introduction: Agents and data mining. IEEE Intelligent Systems 24(3), 14{15 (2009) 1129
5. Chaimontree, S., Atkinson, K., Coenen, F.: Best clustering con guration metrics: Towards multiagent based clustering. In: Proc 6th Int. Conf.
Advanced Data Min-ing and Applications (ADMA'10). pp. 48{59. Springer LNAI 6440 (2010)
6. Coenen, F., Leng, P., Ahmed, S.: T-trees, vertical partitioning and distributed association rule mining. In: Proc. 3rd IEEE Int. Conf. on Data
Mining. pp. 513{ 516. ICDM '03, IEEE Computer Society, Washington, DC, USA (2003)
7. Dasarathy, B.V.: Nearest neighbor (NN) norms: NN pattern classi cation tech-niques. IEEE Computer Society Press, Las Alamitos, California
(1991)
8. P. Praveen, B. Rama and T. Sampath Kumar, "An efficient clustering algorithm of minimum Spanning Tree," 2017 Third International
Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), Chennai, 2017, pp. 131-
135.doi: 10.1109/AEEICB.2017.7972398
9. FIPA: Communicative Act Library Speci cation. Tech. Rep. XC00037H, Founda-tion for Intelligent Physical Agents (2001),
http://www.fipa.org
10. Forman, G., Zhang, B.: Distributed data clustering can be e cient and exact. ACM SIGKDD Explorations Newsletter 2, 34{38 (2000)
11. Frank, A., Asuncion, A.: UCI machine learning repository (2010), http:// archive.ics.uci.edu/ml
12. Giannella, C., Bhargava, R., Kargupta, H.: Multi-agent systems and distributed data mining. In: Klusch, M., Ossowski, S., Kashyap, V.,
Unland, R. (eds.) Cooper-ative Information Agents VIII. Lecture Notes in Computer Science, vol. 3191, pp. 1{15. Springer Berlin / Heidelberg
(2004)
13. Praveen P., Rama B. (2018) A Novel Approach to Improve the Performance of Divisive Clustering-BST. In: Satapathy S., Bhateja V., Raju K.,
Janakiramaiah B. (eds) Data Engineering and Intelligent Computing. Advances in Intelligent Systems and Computing, vol 542. Springer,
Singapore
14. P.Praveen, B.Rama, “An Efficient Smart Search Using R Tree on Spatial Data”, Journal of Advanced Research in Dynamical and Control
Systems, Issue 4,ISSN:1943-023x.
15. Kiselev, I., Alhajj, R.: A self-organizing multi-agent system for online unsupervise learning in complex dynamic environments. In: Proc. 23rd
AAAI Conference on Arti cial Intelligence. pp. 1808{1809. AAAI Press (2008)
16. Klusch, M., Lodi, S., Moro, G.: Agent-based distributed data mining: The KDE: scheme. In: Lecture Notes in Arti cial Intelligence (Subseries
of Lecture Notes in Computer Science). vol. 2586, pp. 104{122 (2003)
17. Klusch, M., Lodi, S., Moro, G.: The role of agents in distributed data mining: Issues and bene ts. In: IAT '03: Proceedings of the IEEE/WIC
International Conference on Intelligent Agent Technology. p. 211. IEEE Computer Society, Washington, DC, USA (2003)

18. MacQueen, J.B.: Some methods for classi cation and analysis of multivariate observations. In: Proc. 5th Berkeley Symposium on Mathematical
Statistics and Prob-ability. pp. 281{297 (1967)
19. McBurney, P., Parsons, S., Wooldridge, M.: Desiderata for agent argumentation protocols. In: Castelfranchi, C., Johnson, W.L. (eds.) Proc. 1st
Int. Conf. on Au-tonomous Agents and Multi-Agent Systems (AAMAS 2002). pp. 402{409. ACM Press: New York, USA, Bologna, Italy
(2002)
20. P. Praveen and B. Rama, "An empirical comparison of Clustering using hierarchical methods and K-means," 2016 2nd International
Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), Chennai, 2016, pp. 445-449.
doi: 10.1109/AEEICB.2016.7538328

Authors: Kothuri Parashu Ramulu, B.V Ramana Murthy, Jogannagari Malla Reddy
Paper Title: Non-functional Requirements Priority in Software Engineering
Abstract: All through the necessities building stage, the method of offering need to one basic over each outstanding is
critical to do tries on a predefined motivation. In this manner is called necessities prioritization. Despite the manner in
which that masses of research has been revolved around offering various structures to do the necessities prioritization, best
a little mix of prioritization strategies have been commonly referenced to consider each sensible and non-noteworthy basics
at some phase in the prioritization degree The outcomes demonstrate that the vitality from the examinations system is
accumulated all through the more basic ceaseless years. By far most of the examination are around the support of studies or
answer recommendation. We record the intensity of spotlights on techniques and perspectives on a tantamount time as
there might be a phenomenal energy inside the requesting evaluation of contraption that could be valuable to business
attempt. In a gigantic piece of the cautious examinations we found a base up framework, focusing on the procedures and on
precision in light of the way that the based variable, likewise as on reasonable necessities in light of the fact that the goals
ask about idea. Based at the outcomes, we offer standards to predetermination get some information about
recommendation. 1130-
211.
1135
References:
1. J. Karlsson, C. Wohlin, and B. Regnell, “An evaluation of methods for prioritizing software requirements,” Information and Software
Technology, vol. 39, no. 14-15, pp. 939 – 947, 1998.
2. K. A. Khan, “A Systematic Review of Software Requirements Prioritization,” Master’s thesis, Blekinge Institute of Technology, Sweden,
School of Engineering Blekinge Institute of Technology Box 520 SE 372 25 Ronneby Sweden, 2006.
3. N. Kukreja, S. Payyavula, B. Boehm, and S. Padmanabhuni, “Selecting an appropriate framework for value based requirements prioritization a
case study,” in Requirements Engineering Conference (RE), 2012 20th IEEE International, 24 2012-sept. 2012.
4. D. Firesmith, “Prioritizing requirements,” Journal of Object Technology, vol. 3, no. 8, pp. 35–48, 2004.
5. L. Karlsson, T. Thelin, B. Regnell, P. Berander, and C. Wohlin, “Pairwise comparisons versus planning game partitioning–experiments on
requirements prioritisation techniques,” Empirical Softw. Engg., vol. 12, no. 1, pp. 3–33, Feb. 2007.
6. A. Perini, A. Susi, and P. Avesani, “A machine learning approach to software requirements prioritization,” Software Engineering, IEEE
Transactions on, vol. PP, no. 99, p. 1, 2012.
7. M. Daneva and A. Herrmann, “Requirements prioritization based on benefit and cost prediction: A method classification framework,” in
Proceedings of the 2008 34th Euromicro Conference Software Engineering and Advanced Applications, ser. SEAA ’08. Washington, DC,
USA: IEEE Computer Society, 2008, pp. 240–247.

Authors: K Spurthi, T.N.Shankar


Paper Title: A Research on Wormhole Attack in Mobile Ad-Hoc Networks
Abstract: Sensor nodes, when conveyed to shape Wireless sensor networks working leveled out of focal specialist for
example Base station are fit for showing intriguing applications because of their capacity to be sent universally in
unfriendly and inescapable conditions. Yet, because of same reason security is turning into a noteworthy worry for these
systems. Remote sensor systems are helpless against different kinds of outside and inside assaults being restricted by
calculation assets, littler memory limit, constrained battery life, handling power and absence of alter safe bundling. This
review paper is an endeavor to break down dangers to Wireless sensor networks and to report different research endeavors
in considering assortment of directing assaults which focus on the system layer. Especially wrecking assault is Wormhole
assault a Denial of Service assault, where assailants make a low-inertness interface between two points in the system. With
spotlight on study of existing techniques for distinguishing Wormhole assaults, analysts are in procedure to recognize and
delineate the key research difficulties for location of Wormhole assaults in system layer.
1136-
212. Index Terms: Denial of Service, Mobile adhoc network, Security, Wireless sensor network, Wormhole attacks.
1141
References:
1. ShiyuJi, Tingting Chen, Sheng Zhong “Wormhole Attack Detection Algorithms in Wireless Network Coding Systems” IEEE
TRANSACTIONS ON MOBILE COMPUTING, VOL-14, 2015. Pp 660-674.
2. Amit Kumar “A Parameter Estimation Based Model for Worm Hole Preventive Route Optimization” International Journal of Computer
Science and Mobile Computing, 2015. Pp 80-85.
3. JuhiViswas, Ajay Gupta, Dayashankar Singh” WADP: A Wormhole Attack Detection Andprevention Technique in MANET using Modified
AODV routing protocol” IEEE, 2013. Pp 376-381.
4. Issa Khalil, SaurabhBagchi, Ness B. Shroff “MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks” Elsevier
ltd. 2007, Pp 344-362.
5. BadranAwad, TawfiqBarhoom “BT-WAP: Wormhole Attack Prevention Modelin MANET Based on Hop-Count” IJARCCE, 2015. Pp 600-
606.
6. Rakhil R, Rani Koshy “An Efficient Algorithm for Neighbor Discovery and Wormhole Attack Detection in WANET”2015 International
Conference on Control, Communication & Computing India (ICCC) 19-21 november 2015.
7. Sun Choi, Doo-young Kim, Do-hyeon Lee, Jae-il Jung “WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks” IEEE,
2008. Pp 343-348.
8. AnjuJ,Sminesh C N,”An Improved Clustering-based Approach for Wormhole Attack Detection in MANET” 3rd International Conference on
Eco-friendly Computing and Communication Systems 2014.
9. TassosDimitriou and AthanassiosGiannetsos “Wormholes no more?Localized Wormhole Detection and Prevention in Wireless Networks”
2012. Pp 1-14.
10. S. Choi, D. Kim, J. Jung. “WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks”. In International Conference on
Sensor Networks, Ubiquitous and Trustworthy Computing, 2008.
11. J. Eriksson, S. V. Krishnamurthy, M Faloutsos “Truelink: A practical countermeasure to the wormhole attack in wireless networks” 2006, Pp
75–84.
12. W. Wang, B. Bhargava, Y. Lu, X. Wu “Defending against wormhole attacks in mobile ad hoc networks: Research articles” Wireless.
Commun.Mob.Comput. 2006, Pp 483–503.
13. Kamanshis Biswas, Md. Liakat Ali. “Security Threats in Mobile Ad Hoc Network”. Paper submitted to the Department of Interaction and
System Design, School of Engineering at Blekinge Institute of Technology, 2007.
14. Y.-C. Hu, D.B. Johnson. “Ariadne: A Secure OnDemand Routing Protocol for Ad Hoc Networks”, Wireless Networks, 11(1-2), 2005.
15. Bounpadith Kannhavong, Hidehisa Nakayama, Abbas Jamalipour. “A Survey of Routing Attacks in Mobile Ad Hoc Networks”, IEEE
Wireless Communication, 2007.
16. Hu, Y.-C.; Perrig, A.; Johnson, D.B.; "Packet leashes: a defense against wormhole attacks in wireless networks,". Twenty-Second Annual Joint
Conference of the IEEE Computer and Communications. IEEE Societies, April 2003.
17. Lazos, L.; Poovendran, R.; Syverson, P.; Chang, L.W.; "Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic
approach," Wireless Communications and Networking Conference, March 2005.
18. Honglong Chen, Wei Lou, Zhi Wang, A secure localization approach against wormhole attacks using distance consistency, EURASIP Journal
on Wireless Communications and Networking, April 2010.
19. R. Graaf, I. Hegazy, J. Horton. "Detection of wormhole attacks in wireless sensor networks," Springer book chapter Ad Hoc Networks, 2010.
20. A.Vani, D. Sreenivasa Rao, “A Simple Algorithm for Detection and Removal of Wormhole Attacks for Secure Routing In Ad Hoc Wireless
Networks”, International Journal on Computer Science and Engineering (IJCSE), June 2011.

Authors: P.Venkaiah Babu, K.Sivaji, A.Ravi Kiran, CH.Suresh


Paper Title: Evaluation of Housing Finance (A Special Research with Public and Private Sector Banks in A.P.)
Abstract: House is the essential needs of individual to stay and live in a safe from the nature and counterfeit atmospire
around the globe. Indeed, even individual from the early period, begins his life just from the haven and at first needs of the
housing had stay and it turn into a refined way of life of the cutting edge lives. In India, giving housing offices turn into a
challengeable undertaking to the administration and its strategies set down on requiring the housing requires meets of the
general population. Because of development of salary age and urbanization, Housing segment turn into a blasting industry
in the nation. Consequently Banks and money related foundations were built up a different division of lodging account to
give fund offices to buy, redesign, development of houses. In this respects, this paper features the idea of lodging fund and
its effect in the money related arrangement of the nation, real lodging account supplier, issues and outline of housing
account in India. 1142-
213.
1149
Index Terms: Financial System, Housing Finance, Mortgages, EMI, Repayment period, ALM.

References:
1. Aldrich Brian, C and Sandhu Ravinder. S. Housing the Urban Poor: Policy and Practice in Development Countries. New
2. Delhi: Vistaar Publications, 1995.
3. Avadhani, V.A. Marketing of Financial Services. Mumbai: Himalaya Publishing House, 1999.
4. Charan Singh1 , Lalit Kumar , H.A.C. Prasad, (2017) Housing Market in India, Iss: 1, pp.26 – 48, http://dx.doi.org/10.1108/IJHMA-11-2014-
0048, Emerald Group Publishing Limited 2017.
5. Avtar Singh Sahota. “Schemes on Rural Housing”. Kurukshetra, 53, No. 12 (2005). Borge Brende.“The Commission on Sustainable
Development Focusing on Urban Slums”. UN- Habitat, 9, No. 3 (2003). [5] Census Commissioner, Census of India 2001. New Delhi:
Government of India, 2001. Government of Kerala, Economic.

Authors: Naseema, S. Nawazish Mehdi, M Manzoor Hussain


Paper Title: An Experimental of Coolant Blends Affects on the Performance of Heat Ex-Changers
Abstract: Heat ex-changers have its own area of requirement in energy flow between hot and cold streams. By classify
the industrial needs most of the applications in automobiles and power plants needs as small like radiators and as big like
boilers and condensers, a part of this chemical and medium level industries also using heat ex-changers in their
applications. On focus this area shell and tube ex-changers and compact heat ex-changers are fulfilling the needs of
industry requirement. Most of the coolants define the performance levels of the heat ex-changer. Direct usage of pure
coolant is very expensive so that industries using water blends with coolants. Researchers are welcoming for efficiency
increases with low cost of coolant with good performance an attempt made to check the performance of two types of heat
ex-changers blend with market available coolants S4-zx, Castrol and MFC coolants with 8 and 10 % with water.S4-Zx with
10% at a temperature of 600 with complete flow given an efficiency difference3% has observed when compared with
others.
1150-
214. Index Terms: Heat exchangers, shell and tube, compact, general coolants, water blends
1156
References:
6. Kallalu Harika (2017), Fabrication of Shell and Tube Heat Exchanger using Helical Baffles based on Kern’s Principle, International Journal of
Current Engineering and Technology, E-ISSN 2277 – 4106, P-ISSN 2347 – 5161, Vol.7, No.3.
7. M. Mani Bharathi (2017), Design and Fabrication of Shell and Tube Heat Exchanger, International Journal of Latest Engineering Research and
Applications (IJLERA) ISSN: 2455-7137, Volume – 02, Issue – 04, April – 2017, PP – 35-39.
8. Tanveer Raza (2017) Design and Fabrication of Shell and Tube Type Heat Exchanger and Performance Analysis, International Conference on
Ideas, Impact and Innovation in Mechanical Engineering, ISSN: 2321-8169, Volume: 5 Issue: 6, pp: 1422 – 1428.
9. Shravan H. Gawande (2012) Design and Development of Shell & Tube Heat Exchanger for Beverage, Modern Mechanical Engineering,2,
121-125
10. Basawaraj S. Hasu (2017) Design and Fabrication of Compact Heat Ex-Changer for Multiple Purpose Usage, International Journal of
Innovative Technology And Research, Volume No.5, Issue No.3, 5962-5965.
11. Janak Suthar (2016) Design and Fabrication of Heat Exchanger for Co-Generation, International Journal for Scientific Research &
Development, Vol. 4, Issue 04, ISSN (online): 2321-0613
12. Qi Li (2011) Compact heat exchangers: A review and future applications for a ew generation of high temperature solar receivers, Renewable
and Sustainable Energy Reviews, Renewable and Sustainable Energy Reviews 15 (2011) 4855– 4875.
13. Rajagapal Thundil Karuppa Raj, Srikanth Ganne, “Shell side numerical analysis of a shell and tube heat exchanger considering the effect of
baffle inclination angle on a fluid flow”, Thundil Karuppa Raj, R., et al: Shell side numerical analysis of shell and tube heat exchangers,
Thermal science: Year 2012, Vol.16, No.4, pp 1165-1174.
14. R. K. Sinnott, Coulson & Richardson‟s Chemical Engineering: “Chemical Engineering Design” (volume 6), Butterworth-Heinemann, 3rd ed.
1999.
15. S. Noie Baghban, M. Moghiman and E. Salehi, “Thermal Analysis of shell side flow of shell and tube type heat exchanger using experimental
and theoretical methods ”, Institute for Scientific Research, University of Guanajuato Lascurain de Retana No. 5, 36000 Guanajuato, Gto,
México.
16. Usman UR Rehman, “Heat transfer optimization of shell and tube heat exchanger through CFD studies ”, Master thesis in innovative and
sustainable Chemical engineering from Chalmers University of Technology.
17. Yusuf Ali Kara, Ozbilen Guraras, “A computer program for designing of shell and tube heat exchanger”, Applied Thermal Engineering
24(2004) 1797-1805.

Das könnte Ihnen auch gefallen