International Journal of Inventive Engineering and Sciences(TM)
Exploring Innovation| ISSN:2319-9598(Online)| Reg. No.:68563/BPL/CE/12| Published by BEIESP| Impact Factor:3.47
Author Guidelines
Publication Fee
Privacy Policy
Associated Journals
Frequently Asked Questions
Contact Us
Volume-2 Issue-4: Published on March 20, 2014
Volume-2 Issue-4: Published on March 20, 2014

  Download Abstract Book

S. No

Volume-2 Issue-4, March 2014, ISSN: 2319-9598 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.



Abhijit D. Jadhav, Ashvini A. Phalke, Pradnya A. Waman, Usha N. Katore, Santosh R. Salunkhe

Paper Title:

Enterprise Level E-mail Security System

Abstract: Data leakage is a process in which a data distributor has given important data to a supposedly trusted agents and some of the data is leaked and found in an unauthorized place or unauthorized user. An enterprise data leak is a scary statement. Security practitioners have always had to deal with data leakage issues that spring up from various ways like email, IM and other Internet channels. One or more agents can leak the data. Moreover, data can also be leaked from within an organization via e-mails. So, there is need to filter these e-mails. The mail can be filtered by blocking e-mails which contains images, videos or sensitive data of an enterprise. The e-mail is one of the sources of data leakage. Principle used in e-mail security is we classify e-mail, sensitive data into the white and black lists with document’s digital signature value. The data can also be changed by the trusted agents. The system will detect such a changes of the sensitive data and if founds same as black list it will block the mail or stop for review. Then the distributor will decide to allow or disallow the incoming mails from the agent’s. The system will prevent the enterprise data from data leakage. E-mail security system will make the data more secure.

Black List, SHA, TF, White List.


1.        Hector Garcia-Molina and Panagiotis Papadimitriou "Data Leakage Detection," IEEE Transactions on Knowledge and Data Engineering, Vol 23, No.1 january2011.
2.        Mayur Gaikwad, Ankit Agarwal, Vahid Inamdar, Kapil Garg, ” Robust Data leakage and Email Filtering System” 2012 IEEE.

3.        Behrouz A. Forouzan, “Cryptography & Network Security”,


5.        http:/ / c+ +-faq-lite/ serialization. html




Manish Bhaskar, Abhinav Saha

Paper Title:

Computational Analysis of Free Convection in Different Cavities with Different Aspect Ratios

Abstract: Cavity and Enclosures are finding increasing applications in the aerospace, marine, transportation, and electrical, chemical, construction and consumer goods industries. In some of these applications the composites are subjected to Thermal loads. This paper deals with the computational analysis of natural convection flow in a square, Cubical, Rectangular, Triangular and trapezoidal cavity, using FEV tool ANSYS FLUENT. Where the bottom wall and vertical walls are heated linearly, and the top wall is been insulated with the maximum temperature TH and the minimum temperature with Tc. The present numerical investigation deals with steady natural convection flow in a closed square cavity when the bottom wall is sinusoidal heated and vertical walls are linearly heated, whereas the top wall is well insulated. In the nonuniformly heated bottom wall maximum temperature TH attains at the center of the bottom wall. The sidewalls are linearly heated, maintained at minimum temperature Tc at top edges of the sidewalls and at temperature Th at the bottom edges of the sidewalls. During convection incompressible fluid is taken and passed over cavities driven by temperature difference across the wall was investigated with different aspect ratio. The temperature distribution and flow pattern across the cavities were visualized. The FEV results are validated with well published results in literature and furthermore with experimentation. Results are first presented in the form of streamlines, isotherm contours, local Nusselt number, and the average Nusselt number as a function of temperature difference aspect ratio. 

Natural Convection, Cavity, Nusselt Number.


1.        D. M. Kim and R. Viskanta, “Heat transfer by conduction, natural convection and radiation across a rectangular cellular structure,” International Journal of Heat and Fluid Flow, vol. 5, No. 4, pp. 205-213, 1984.
2.        S. Ostrach, “Natural Convection in Enclosures,” Advances in Heat Transfer, vol. 7, Academic Press, New York, 1972, pp. 161–227.

3.        G. De Vahl Davis, “ Natural convection of air in a square cavity: A bench mark numerical solution,” International Journal for Numerical Methods in Fluids, vol. 3, issue 3, pp. 249–264, 1983.

4.        P. Le Queré, T. Alziary de Roquefort “ Computation of natural convection in two dimensional cavities with chebyshev polynomials,” Journal of Computational Physics, vol. 57, Issue 2, pp. 210–228, 1985.

5.        M. M. Ganzarolli, and L. F. Milanez, “Natural convection in rectangular enclosures heated from below and symmetrically cooled from the sides,” International Journal of Heat and Mass Transfer, vol. 32, pp. 1063-1073, 1995.

6.        H. Salmun, “Convection patterns in a triangular domain,” International Journal of Heat and Mass Transfer, vol. 38, pp. 351–362, 1995.

7.        M. Boussaid, A. Mezenner, M.  Bouhadef, “Natural convection heat and mass transfer in a trapezoidal cavity (Convection naturelle de chaleur et de masse dans une cavité trapézoïdale),” Int J Therm Sci., vol. 38, pp. 363–371, 1999.

8.        A. Raji, M. Hasnaoui, “Mixed convection heat transfer in a rectangular cavity ventilated and heated from the side,” Numerical Heat Transfer, vol. 33, pp. 533–548, 1998.

9.        G. Desrayaud, A. Fichera, “Laminar natural convection in a vertical isothermal channel with symmetric surface mounted rectangular ribs,” International Journal of Heat and Fluid Flow, vol. 23, issue 4, pp. 519–529, 2002.

10.     M. Sathiyamoorthy, T. Basak, S. Roy and N. C. Mahanti, “Effect of the temperature difference aspect ratio on natural convection in a square cavity for nonuniform thermal boundary conditions”, Journal of Heat Transfer, , vol. 129, pp. 1723-1728, 2007.

11.     I. Tmartnhad, M. El Alami, M. Najam, A. Oubarra, “ Numerical investigation on mixed convection flow in a trapezoidal cavity heated from below”, Energy Conversion and Management, vol. 49,  issue 11, pp. 3205-3210, 2008.

12.     Xu Xu, Gonggang Sun, Yu, Zitao Hu, Yacai Liwu Fan, Kefa Cen , “Numerical investigation of laminar natural convective heat transfer from a horizontal triangular cylinder to its concentric cylindrical enclosure” , International Journal of Heat and Mass Transfer, Volume 52, Issues 13–14, June 2009, Pages 3176-3186

13.     S.C. Saha, “Scaling of free convection heat transfer in a triangular cavity for Pr > 1”, Energy and Buildings, vol. 43, issue 10, pp. 2908-2917, 2011.

14.     A.J. Chamkha, M.A. Ismael, “Conjugate heat transfer in a porous cavity filled with nanofluids and heated by a triangular thick wall”, International Journal of Thermal Sciences, vol. 67,  pp. 135-151, 2013.

15.     S. Bhardwaj, A. Dalal, “Analysis of natural convection heat transfer and entropy generation inside porous right-angled triangular enclosure”, International Journal of Heat and Mass Transfer, vol. 65, pp. 500-513, 2013.




N. Mohan Teja, R. S. Ravi Sankar, P. Harsha, V. Uma Shankar

Paper Title:

A Novel Method of Diode Clamped Multi-Level Inverter using PWM Technique

Abstract: This Paper presents a novel method of Diode clamped Multi Level Inverter, which works without series association the clamping diodes. The conventional diode clamping inverter suffers from such problems as dc link unbalance, indirect clamping of the inner devices, turn-on snubbing of the inner dc rails as well as series association of the clamping diodes etc. It is due largely to these problems that the application of the conventional diode clamping inverter in practice has been deterred, in spite of the growing discussion in the literature. An auxiliary resistive clamping network solving the indirect clamping problem of the inner devices is also discussed for both the new and conventional diode clamping inverter. Operation principle, clamping mechanism, auxiliary clamping as well as experimentation are presented.

Clamping Diodes, DC Link Unbalance, Multi Level Inverter, Pulse Width Modulation.


1.        Jih-Sheng Lai, Fang Zheng Peng, “Multilevel converters- A New Breed Of Power Converters,” IEEE Transactions on Industry Applications,VOL. 32, NO. 3, MAY, JUNE 1996.
2.        Soern Baekhoej Kjaer member of IEEE, John k.Pedersen senior member of IEEE,And Frede Blaabjerg fellow of IEEE “A Review Of Single-Phase Grid-Connected Inverters For Photovoltaic Modules,”    IEEE Transactions on Industry Applications, VOL.41, NO. 5, PP1292-1306. SEP./OCT. 2005.

3.        M.Malinowski,k.Gopakumar,J.Rodriguez and M.A.Perez,“A Survey On Cascaded Multilevel Inverters,” IEEE TRANS. IND. ELECTRON., VOL. 57, NO.7, PP. 2197–2206, JUL. 2010.

4.        A.M.Massoud, S.J.Finney and B.W.Williams,“Control techniques For Multilevel Voltage Source Inverters,” IN PROC. IEEE. CONF., MAR. 2003, VOL. 4, PP. 171–176.

5.        C.Boonmee,Y.Kumsuwan,“A Phase- Shifted Carrier- Based PWM Technique For Cascaded H-Bridge Inverters Application In Standalone PV System,” IN PROC. IEEE. CONF.,SEP. 2012, VOL. 4, PP.                     

6.        F.Z.PENG and J.S.Lai,“A Static VAR Generator Using A Staircase Waveform Multilevel Voltage - Source Converter,” IN PROC. PCIM/POWER QUALITY, 1994, PP. 58-66. “Power Converter Options For Power System Compatible Mass Transit Systems, ”1994, PP. 285-294.




Alphy John, I. Bildass Santhosam

Paper Title:

Home Energy Management System Based On Zigbee

Abstract: To inculcate the Home Energy Management System (HEMS) based on ZigBee communication using remote controller and sensor. This technique brings out the more efficient home energy management system to reduce power consumption in home area. We consider the room easily controllable with an IR remote control of a home appliance. The room has power outlets, a light, sensor and a ZigBee hub. The ZigBee hub has an IR code learning function and educates the IR remote control signal of a home appliance connected to the power outlet. Then it can control the power outlets and the light in the room. The PIR sensor which detects the presence of the human and then it allows the power on the light.. A LCD is used in the hardware module for the user interface. The LCD displays the power consumed and the value of PIR sensor. The ZigBee hubs in each room communicate with the home server and report the power consumption information to the home server. The proposed architecture gives more efficient energy­ saving HEMS.

ZigBee, Remote control, IR, Energy–saving, Power Outlet, Standby Power, sensor.


1.        Masahiro Inoue, Toshiyasu Higuma, oshiak Ito, Noriyuki Kushiro, and Hitoshi Kubota,   “Network Architecture for Home Energy Management System,” IEEE Trans on Consumer Electronics, Vol. 49, No. 3, pp. 606­613, Aug. 2003.
2.        Young­ Sung Son and Kyeong ­ Deok Moon, "Home Energy Management System Based on Power Line Communication," Proceedings of the 28thInternational Conference on Consumer Electronics (ICCE), 2010.

3.        Kwang­ Soon Choi, Yang ­ Keun Ahn, Young­ Choong Park, Woo­ ChoolPark, Hae ­ Moon Seo, and Kwang ­Mo Jung, “Architectural Design of Home Energy Saving System Based on Real time Energy ­Awareness”. Proceedings of the 4th International Conference on Ubiquitous Information Technologies & Applications (ICUT), 2009.

4.        Chia­ Hung Len, Ying­ Wen  Bai, Hsien ­Chung Chen, and Chi­ Huang Hung, "Home Appliance Energy Monitoring and Controlling Based on Power Line Communication," Proceedings of the 27th International Conference on Consumer Electronics (ICCE), 2009.

5.        Jinsoo Han, Haeryong Lee, and Kwang ­ Roh Park, “Remote­ Controllable and Energy­ Saving Room Architecture Based on ZigBee Communication,” IEEE Trans. on Consumer Electronics, Vol. 55, No. 1,pp. 265­268, Feb. 2009.




Tanushree Bhattacharya

Paper Title:

Sustained Growth of Green Energy Economics

Abstract: Energy is one of the critical inputs for economic development of any Country. In order to overcome the present energy scenario problems, energy should be conserved and since we are consuming disproportionate amount of energy that day is not far when all our Non-Renewable resources will expire forcing us to rely just on Renewable Sources. These non renewable sources of energy will not last forever and are proven contributors to environmental degradation. This has led to governments and industries around the globe thinking seriously about alternative energy sources. This along with declining availability of the fossil fuels have led to the development of renewable energy resources such as Biomass, Bio fuels, Wind, Solar, Geothermal, and Hydro energy etc. Current global trends in energy supply and consumption are not sustainable – environmentally, economically, socially but this situation can be changed if we can secure the supply of reliable and affordable energy and effect a rapid transformation to a low-carbon, efficient and environmentally benign system of energy supply. Since exhaustible energy sources are limited, there is an urgent need to focus attention on development of renewable energy sources and use of energy efficient technologies. It is estimated that renewable energy could contribute to at least half of all electric power in each of the large economies by 2050. This Paper emphasis on the various types of modern energy generation techniques and cost analysis as well as economics from Biomass. Biomass is biological material derived from living, or recently living organisms, such as wood, waste, hydrogen gas, and alcohol fuels. Correctly managed, biomass is a sustainable fuel that can deliver a significant reduction in net carbon emissions when compared with fossil fuels.

Biomass, Energy Conservation, Renewable Energy, Energy Economics.


1.        Ministry of Non Conventional Energy Sources, Annual Report for the FY 2002 -2003.
2.        Indian Renewable Energy Development Agency Limited Annual Report for the FY 2002 – 2003.

3.        Ravindranath N.H., Hall. D. O.,"Biomass Energy & Environment: A developing country prospective from  India", Oxford University press, 1995.

4.        Dassappa, S. Sridhar, H.V. Sridhar, G. Paul, P.J., Mukundha H.S.,"Biomass gasification – A substitute t fossil fuel for heat application", Biomass Energy 2003.

5.        Renewable Energy Sources for rural areas  in Asia and Pacific , APO, Tokyo, 2000

6.        Somasekar, H. I. Dassappa, Ranindranath N.H.,"Rural Bio Energy Centre based on Biomass Gasifier for Decentralized Power Generation: Case Study of Two Villages in South India".

7.        Alternate Energy Sources by T H Taylor .Adam Hilger ltd , Bristol Bureau of Energy Efficiency

8.        G.D Rai , “Non Conventional Energy Sources”

9.        Wellinger, A and A. Lindeberg , 1999. Biogas upgrading and utilization. Task 24,  Energy grom biological conversion of organic wastes, pp:1-19

10.     Vijay, V.K 1989, Studies on utilization of biogas for improved performance of dual fuel engine.

11.     Kapdi, S.S. V.K Vijay, S.k Rajesh and R.R Gaur , 2003 . Feasibility study on purification and compression of biogas for rural areas. Proceeding of International Conference on Energy and Rural Development,  MNIT, jaipur.

12.     Haripriye G ,2000 . Estimation of biomass in Indian forests. Biomass and Bioenergy , 19:245-258

13.     D’Apotel SL ,1998 . IEA biomass energy analysis and projections. In : Proceedings of biomass energy Conference Data, analysis and trends , Paris : OECD

14.     Intergovernmental  panel on climate change (IPCC), Renewable Energy Sources and Climate Change

15.     International Energy Agency, Energy outlook, 2009

16.     Biomass Energy center, Biomass energy Retrieved on 2012 -02-28

17.     Martin  , Marshall A,” First  Generation biofuel compete”. Pp  596-608




Cezarina Adina Tofan

Paper Title:

Implementation of Quality Management in the Assessment of Higher Education - Case Study in a Private University in Romania

Abstract: At the beginning of the millennium, the higher education passes through a process of adaptation to the current needs of society, a process marked by globalization and unprecedented development of the information technologies. Given by increasing the number of the students and the offer of specializations, the competitive inter-university system development and intensification of the international academic cooperation, it appears logical to implement a type of educational management to increase the services offer, their effectiveness in promoting the performance in the competitive conditions. In this context, the quality is undoubtedly one of the most important requirements of any result of actions taken, and any activity for detecting the problems, to assess the influence and find solutions to solve them is, for any organization, the key of the progress. The QUALITY term and the international symbol Q can be used in many different circumstances. Thus, it can be spoken by the quality of products, services, life, education, learning, vocational training, etc.

Decision, information, information system, quality management.


1.        TOFAN C. A., Improving quality and reliability of technological systems by cold pressing aided design and computer simulation, "Alma Mater" House Publishing, ISBN 978-973-632-728-5, Sibiu, 2011
2.        TOFAN C.A., Management Information Systems for Computer Aided Design, International Journal of Academic Research in Accounting, Finance and Management Sciences, Vol 1, Issue 1 of IJ-ARAFMS, ISSN: 2225-8329, Pakistan, 2012
3.        TOFAN C. A., Training and assessment of students computerized, Economic Tribune, no. 1-2, ISSN 1018-0451, Bucharest, 2003




Chaithanya T, Bachu Anusha, Manikandan S

Paper Title:

Theoretical and Computational Analysis on Blunt Shaped Reentry Capsule

Abstract: For high aerodynamic drag and safe returning of capsule on the earth, to protect astronaut from radiation, the blunt shape reentry capsule is required. The flow fields over the blunt shaped reentry capsule are numerically obtained by the steady state, axisymmetric, compressible Navier–Stokes k-Ԑ turbulence model for free stream mach numbers are in the range of 2 and 4. Employing a finite volume approach which reduces the governing equations to semi-discretized ordinary differential equations. The numerical simulation is carried out on a structural grid. The flow field features around reentry capsule, such as bow shock, sonic line, expansion are obtained. A good agreement is found between the computationally calculated value of aerodynamic drag co-efficient blunt shape reentry capsule with the theoretical value. The effects of geometrical parameters, blunt shapes have been numerically investigated for various reentry configurations which will be useful for forming the strong shock wave in supersonic flow, as a result there is a increases in aerodynamic drag during landing of the vehicle.

Blunt, reentry capsule, supersonic flows, drag.


1.        Lee, D.B., Bertin, J.J. and Goodrich, W.D., “Heat Transfer Rate and Pressure Measurements Obtained During Apollo Orbital Entries”, NASA TN D-6028, October 1970.
2.        Lee, D.B., “Apollo Experience Report: Aerothermodynamics Evaluation”, NASA TN D-6843, June 1972.

3.        Hillje, E., “Entry Flight Aerodynamics from Apollo Mission AS-202”, NASA TN D-4185, October 1967.

4.        Wright, M.J., Prabhu, D.K. and Martinez, E.R., “Analysis of Afterbody Heating Rates on the Apollo Command Modules, Part 1”, Journal of Thermophysics and Heat Transfer, Vol. 20, No. 1, pp. 16-30, 2006.

5.        Walpot, L., “Development and Application of a Hypersonic Flow Solver”, Ph.D. Thesis, T.U. Delft University, May 2002.

6.        Gerhold, T.O., Friedrich, J.E. and Galle, M., “Calculation of Complex Three-Dimensional Configurations Employing the DLR-TAU-Code”, 16th Aerospace Sciences Meeting, Reno, NV, USA, AIAA Paper 97-0167, January 1997

7.        Walpot, L.M.G., Noeding, P., Tarfeld, F., Molina, R.C., Gülhan, A. and Paulat, J.-C., “Transonic and Supersonic Static Stability Analysis of the CARV Reentry Vehicle”, 14th AIAA/AHI Space Planes and Hypersonic Systems and Technologies Conference, AIAA Paper 2006-8077, 2006.

8.        Lee, D.B., Bertin, J.J. and Goodrich, W.D., “Heat Transfer Rate and Pressure Measurements Obtained During Apollo Orbital Entries”, NASA TN D-6028, October 1970.




Hemanta Kumar Nayak, Debaraj Rana

Paper Title:

Eye Localization using PCA Based Genetic Search

Abstract: In this paper, we propose a novel approach for eye localization from human face image using GA based on PCA. As the genetic algorithm is computationally intensive, the searching space is reduced and limited to the eye regions so that the required timing is greatly reduced. Here GA is used to search for the possible eye region in an image efficiently. Specifically, we use GAs to find image sub-windows that contain the eye region. Each sub-window is evaluated using a fitness function and sub-windows containing eyes eye region is extracted. This is one of the major applications in case of retina recognition used in security purpose. The idea from the method of eigen-eye, and used to determine the fitness values.

YCbCr, Skin Region extraction, PCA, Eigen Eyes, Genetic Algorithm.


1.        G Bebis, S Uthiram and M Georgiopoulos, “Genetic Search for Face Detection and  Verification”, Proceedings, International Conference on Information Intelligence and Systems  , pages 360 – 367,1999.
2.        M. Turk, A. Pentland, "Eigen faces for face recognition",Journal Cognitive Neuroscience, Vol. 3, No.1, 1991.

3.        D. Swets, B. Punch and J. Weng, “Genetic Algorithms for Object Localization in a Complex Scene", International Conference on Image Processing, vol. II, pp. 595-598, 1995.

4.        H. Rowley, S. Baluja and T. Kanade, “Neural Network- Based Face Detection”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 20, No. 1, pp. 23-38, 1998.

5.        V. Vezhnevets, V. Sazonov, A. Andreeva, “A Survey on Pixel-Based Skin Color Detection Techniques”, In Proceedings Graphicon-2003, pp.85-92, Moscow, Russia, September 2003.

6.        K Sastry, D Goldberg, “Genetic Algorithms”, Search Methodologies, 2005 – Springer.

7.        R. Crane, A simplified approach to Image Processing, Prentice Hall, 1997.

8.        D Goldberg, “Genetic Algorithms in Search, Optimization and Machine Learning”. Addison- Wesley, Reading, MA, 1989.

9.        MP Panigrahy and N Kumar  ,“Face Recognition using Genetic Algorithm and Neural Networks”,  International Journal of Computer Applications Volume 55– No.4, pages 0975 – 8887,October 2012.

10.     BK Gunturk, AU Batur and  Y.Altunbasak, “Eigenface domain super-resolution for face recognition”, Image Processing, IEEE Transactions, Volume.12 ,  Issue.5 ,pages 597 – 606,May 2003.

11.     MA Kashem, MN Akhter, S Ahmed, and MM Alam, “Face Recognition System Based on Principal Component Analysis(PCA) with Back Propagation Neural Networks (BPNN)” , Canadian Journal on Image Processing and Computer Vision Vol. 2, No. 4,pp. 36-45, April 2011.

12.     L. Bai, L. Shen, and Y. Wang. , “A novel eye location algorithm based on radial symmetry transform”, in Proceedings of the International Conference on Pattern Recognition , pages 511–514, 2006.

13.     R. Valenti and T. Gevers. Accurate eye center location and tracking using isophote curvature. In Proceeding of IEEE Conference on Computer Vision and Pattern Recognition ,pages 1-8, 2008.

14.     AL. Yuille, PW Hallinan, and DS Cohen, “Feature extraction from faces using deformable templates”. International Journal of Computer Vision, vol.8,issue 2, pages 99–111, 1992.

15.     M. Turk and A. Pentland, "Eigenfaces for Recognition", Journal of Cognitive Neuroscience, Vol. 3, pp. 71-86,1991 . hard copy.

16.     S. P. Lee, “Facial Animation System with Realistic Eye Movement Based on a Cognitive Model for Virtual Agents”, PhD thesis, Computer and Information Science, University of Pennsylvania, 2002.

17.     KW Wong, KM Lam and WC Siu, “An efficient algorithm for human face detection and facial feature extraction under different conditions”, Pattern Recognition 34, pages 1993-2004, 2001.

18.     F Yang, J Huang, P Yang and D Metaxas, “Eye Localization through Multiscale Sparse Dictionaries”, IEEE International  Conference on Automatic Face and Gesture Recognition and Workshops, Pages 514-518,2011.

19.     D. Rana and  N. P. Rath, “Face Identification using Soft Computing Tool “, IEEE International Conference, Conferenceon Advanced Communication Control and Computing Technologies (ICACCCT-2012), Tamilnadu, INDIA, Aug 23-25. Conference Proceeding Page(s): 232-236, 2012.





Dayalan J, Beulah M

Paper Title:

Effect of Waste Materials in Partial Replacement of Cement Fine Aggregate and Course Aggregate in Concrete

Abstract: A brief study on the suitability of silica fumes, powdered ceramic tiles and crushed animal bones as partial replacement for cement, fine aggregate and coarse aggregate respectively in concrete work has been carried out. Experimental study has been conducted for approximately 10 % of the silica fumes in replacement for cement, 20 % of the powdered ceramic waste powder in replacement for fine aggregate and 50 % of the crushed animal bones in replacement for coarse aggregate separately and in a single sample. Compressive strength, flexural strength and split tensile strength has been conducted for each sample. Results were quite satisfactory with no compromise in strength requirements for M20 grade concrete. Hence comparative study has been done between normal concrete and new concrete mix.

Silica Fumes - Powdered Ceramic Tiles - Crushed Bones – Compressive Strength – Flexural Strength - Split Tensile.


1.        Mukesh B.Patel, Charkha.D.. “Effect of silica fume and partial replacement of ingredients on flexural and split tensile strength of concrete”, International journal of emerging trends in engineering and development, Issue 2, Vol.4 (May2012)
2.        Ramkumar.V.R,, Murali. G, Jayaganesh.V, “Flexural behaviour of concrete by using silica fumes as partial replacement of cement”, International journal of emerging trends in engineering and development, Issue 2, Vol.4 (May2012), p.p 590-593

3.        Dilip Kumar Singha Roy, Amitava Sil,,”Effect of Partial Replacement of Cement by Silica Fume on Hardened Concrete”  International Journal of Emerging Technolgy and Advanced Technology,Issue 8, Vol.2 (Aug 2012) p.p.472-475

4.        Zeena Adel Mohammed, “Effect of partial replacement of fine aggregate on some engineering properties of concrete” by

5.        Javed Ahmad Bhat, Reyaz Ahmad Qasab and A. R. Dar in “Machine crushed animal bones as partial replacement of coarse aggregates in lightweight concrete”, ARPN Journal of Engineering and Applied Sciences,(sep 2012), Vol.7.p.p.1202-1207

6.        Indian Standards. 1970. IS: 383, Specification for Coarse and fine aggregates from Natural sources for concrete.Bureau of Indian standards, New Delhi, India.

7.        Thomas, M D. A. Using Silica Fume to Combat ASR in Concrete, Indian Concrete Journal, (Oct. 2001), pp 656-664 [6] Lewis, R. C. , Hasbi, S. A. : Use of Silica Fume concrete :Selective case studies, Indian Concrete Journal, (Oct. 2001), pp. 645-652.

8.        Roncero, J., Gettu, R., Agullo, L. Vazquez, E. : Flow behaviour of superplasticised cement pastes : Influence of Silica Fume, Indian Concrete Journal, (Jan. 2002), pp. 31-35.

9.        Polat R., Demirbo_A.R., Karakoç M.B. and Türkmen I.(2010) The influence of lightweight aggregate on the physico-mechanical properties of concrete exposed to freeze–thaw cycles. Cold Reg. Sci. Tech. 60: 51-56.

10.     Robert L., Lindon S., Peter W. and Ray R. 2003.Cementitious additions. In: John N, Ban SC (Eds.).Advanced Concrete Technology. Elsevier publications,Amsterdam.

11.     Rossignolo J.A., Agnesini M.V.C. and Morais J.A. 2003. Properties of high performance LWAC for precast structures with Brazilian lightweight aggregates. Cement Con. Compo. 25: 77-82.

12.     Teo D.C.L., Mannan M.A. and Kurian V.J. 2006.Structural Concrete Using Oil Palm Shell (OPS) as Lightweight Aggregate. Turk. J. Eng. Env. Sci. 30: 251




Sandeep Rankawat, J. S. Purohit, D. R. Godara, S. K. Modi

Paper Title:

Scattering Measurement Due to Trunk and Foliage Canopy of Desert Region at 35 GHz

Abstract: At the time of propagation of millimeter wave, Scattering phenomenon due to foliage plays an important role as the wavelength approaches to the order of the size of the leaves and edges of leaves. It is important to estimate the propagation attenuation due to scattering when the arid zone foliage leaves and twigs size affect adversely   in experimental propagation range. In this paper a 35 GHz transmitter receiver link system is used to measure the attenuation scattering pattern of tree foliage of Ber tree (Zizyphus mauritiana) of western Rajasthan region. Measurements were made to study the angular variations of the positioning of receiver unit around the target tree with trunk and canopy positions. The measurements, which were made for HH polarization configurations over a wide range of the azimuth angle, provide a quantitative reference for the design of millimeter-wave bistatic radar,  high speed data communication links,  point to point communication  systems.

35 GHz, Scattering, Foliage, Trunk, Tropical tree, Western Rajasthan, Millimeter wave, Thar Desert.


1.        Sandeep Rankawat, Dr.J.S.Purohit, D.R.Godara, S.K.Modi. ”Scattering Measurement Due To Foliage of Western Rajasthan Region at 35 Ghz” IJSCE ISSN: 2231-2307, Volume-4, Issue-1, March 2014.
2.        D.R.Godara,Dr.J.S.Purohit,SandeepRankawat,S.K.Modi “Effect of Foliage Length on Signal Attenuation in Millimeter Band at 35Ghz Frequency” IJCA  ISSN: 0975-8887, Volume-84, DEC2013.

3.        D.R.Godara,Dr.J.S.Purohit,SandeepRankawat,S.K.Modi “Propagation Attenuation Due to Foliage at 35Ghz” IJECT  ISSN: 2230-9543, Volume-4, Issue-4, OCT-DEC2013.

4.        D.R.Godara, S.K.Modi, Rupesh Kumar Rawat “Experimental studies on millimeter wave scattering from ground and vegetation at 35 GHz” IJSCE  ISSN: 2231-2307, Volume-1, Issue-6, January2012.

5.        Akira Ishimaru, “Wave Propagation and Scattering in Random Media and Rough Surfaces”, Proceedings of the IEEE, Vol 79, No. 10, October 1991

6.        Hao Xu, Theodore, S. Rappaport,  Robert J. Boyle, James H. Schaffner, “Measurements and Models for 38-GHz Point-to-Multipoint Radiowave Propagation”,IEEE journal on selected areas in communications, Vol. 18, No. 3, March 2000.

7.        N. C. Rogers, A. Seville, J. Richter, D. Ndzi, N. Savage,R. Caldeirinha, A. Shukla, M. O. AlNuaimi, K. H. Craig, E. Vi-lar, and J. Austin, “A generic model of 1-60 GHz radio propa-gation through vegetation" , Tech. Report, Radiocommunications Agency, May 2002.

8.        Wang, F. and K. Sarabandi, “An enhanced millimeter-wave foliage propagation model", IEEE Trans. Antennas Propag., Vol. 53, No. 7, 2138-2145, 2005.

9.        M. Majeed, S. Tjuata,  “An Improved Propagation Model for Wireless Communications.”, (1996). IEEE International Conference on Communications, Converging Technologies for Tomorrow’s Applications, Vol. 1, pp. 292-296, ICC 96.

10.     A. Seville, “Vegetation Attenuation: Modeling and Measurements at Millimetric Frequencies.” 10th International Conference on Antennas and Propagation (Conf. Publ. No. 436), Vol. 2, p. 14-17. (1997).

11.     L.L. Foldy,”The multiple scattering of waves”, Phys. Rev., vol. 67,pp 107-119,1945.

12.     T. Chiu, K. Sarabandi, “ Electronics Scattering from Short branching vegetation”, IEEE Trans. Geo. Remote Sensing, vol. 38, no.2, pp. 911-925, 2000.




Vamsi Krishna Pelluru

Paper Title:

Scattering Measurement Due to Trunk and Foliage Canopy of Desert Region at 35 GHz

Abstract: In Traditional Enterprise-class storage technology, many organizations now have a variety of storage needs with varying performance and price requirements. Open stack has support for both Object and Block storages with many deploying options based on the organizations needs.

Open Stack, SAN, Storage, Havana.






Lakshmikishore Nittala, Preet Kanwar Singh Rekhi, Sukhvinder Singh Malik, Rahul Sharma

Paper Title:

LTE Schedulers – A Definitive Approach

Abstract: Scheduler is the backbone of intelligence in a LTE network. Scheduler will often have clashing needs that can make its design very complex and non-trivial. The overall system throughput needs to be maintained at the best possible value without sacrificing the cell edge user experience. In this paper, authors compared different scheduler designs for voice and packet services. They explained the role of configuration parameters through simulations. These parameters control the tradeoff between the sector throughput and the fairness in system through. They explained a possible scheduler implementation.

LTE, Scheduler, Quality of service, GBR, Non GBR, Proportional fair.


1.        LTE - The UMTS Long Term Evolution from Theory To Practice 2nd Edition by  Stefania Sesia , Issam Toufik, Matthew Baker
2.        Essentials of LTE and LTE-A (The Cambridge Wireless Essentials Series) by  Amitabha Ghosh and Rapeepat Ratasuk

3.        3G Evolution: HSPA and LTE for  Mobile Broadband by Erik Dahlman, Stefan Parkvall, Johan Sköld and Per Beming

4.        3GPP TS 36.211 “Evolved Universal Terrestrial Radio Access (E-UTRA); Physical channels and modulation”.

5.        3GPP TS 36.213 “Evolved Universal Terrestrial Radio Access (E-UTRA) Physical layer procedures”.

6.        3GPP TS 36.321  “Evolved Universal Terrestrial Radio Access (E-UTRA); Medium Access Control (MAC) protocol specification”

7.        3GPP TS 36.331: “Evolved Universal Terrestrial Radio Access (E-UTRAN); Radio Resource Control (RRC) Protocol Specification”.