Volume-1 Issue-12

 Download Abstract Book

S. No

Volume-1 Issue-12, November 2013, ISSN: 2319-9598 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

Neha Thombare, Pallavi Deshmukh, Simantini Patil, Shailesh Jain

Paper Title:

Personalized Image Search

Abstract: Personalized Search is a feature in which when a user is logged into a account, all of his or her searches on Personal Search are recorded into  Web History. Then, when a user performs a search, the search results are not only based on the relevancy of each web page to the search term, but the service also takes into account what websites the user previously visited through search results to determine which search results to determine for future searches, to provide a more personalized experience. The feature only takes effect after the user has performed several searches, so that it can be calibrated to the user’s tastes. Social sharing websites like facebook, twitter, YouTube they are allowing user to comment, tag, like and unlike the shared documents or images. Rapid Increase in the search services for social websites has been developed.

Keywords:
Personalized Search, Tagging, Topic Model.


References:

1.        Learn to Personalized Image Search from the Photo Sharing Websites Jitao Sang, Changsheng Xu, Senior Member, IEEE, Dongyuan Lu
2.        B. Smyth, “A community-based approach to personalizing web search,”Computer, vol. 40, no. 8, pp. 42–50, 2007.

3.        Personalized Search on Flickr based on Searcher’s Preference Prediction Dongyuan Lu, Qiudan Li

1-3

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.

Authors:

Y.Shekar, B. Vasunayak, J. Sunil Kumar, A. Sanyasi Rao, Fathima Shireen

Paper Title:

Cryptographic Algorithms Implementation on RISC Processor

Abstract: Security is one of the most important features in data communication. Cryptographic algorithms are mainly used for this purpose to obtain confidentiality and integrity of data in communication. Implementing a cryptographic algorithm on a general purpose processor it results lower throughput and larger power consumption. In this work we propose processor architecture to perform the cryptographic algorithms and also it speed up the encryption and decryption process of data. This processor will perform the cryptographic operations as like general instructions in GPP. The data size of this processor is 32-bit. The architecture of the processor designed using Verilog HDL.

Keywords:
Cryptographic Algorithms, GPP, Verilog.


References:

1.        Jun-hong chen “A High-Performance Unified Field Reconfigurable Cryptographic Processor”. IEEE-2010
2.        Nima Karimpour Darav “CIARP: Crypto Instruction-aware RISC Processor.IEEE-2012”

3.        Antonio H. Zavala “RISC-Based Architecture for Computer Hardware Instruction” IEEE-2011

4.        “Data Encryption Standard” 1999 october 25.

5.        “Advance Encryption Standard” November 26 2001

6.        Imyong Lee, Dongwook Lee, Kiyoung choi, “ODALRISC: A Small, Low power and Configurable 32-bit RISC processor,” International SOC design Conference 2008.

7.        Wayne Wolf, FPGA Based System Design, Prentice Hall, 2005.

8.  National Institute of Standards and Technology (NIST), “Advanced Encryption Standard (AES), (FIPPUB 197)”, November 26, 2001, 
http://csrc.nist.gov/publications/.
9.        Atri. Rudra, Pradeep k. Dubey, Charanjit S.Jutla, Vijay Kumar, Josyula R.Rao, Pankaj Rahotgi, “Efficient Implementation of Rijndael Encryption with Composite Field Arithmetic,” Proceedings of Cryptographic Hardware and Embedded Systems (CHES), Vol. 2162,  pp.175-188, 2001.

10.     Rohit Sharma, Vivek Kumar Sehgal, Nitin Nitin1, Pranav Bhasker, Ishita Verma, “Design and Implementation of 64-Bit RISC Processor using   Computer Modeling and Simulation,” Proceedings of UKsim, Vol. 11, pp. 568 – 573, 2009.

11.     R. Uma, “Design and performance analysis of 8-bit RISC Processor using Xilinx tool,” International Journal of Engineering Research and Applications (IJERA), Vol. 2, Issue 2, pp.53-58, March-April 2012, ISSN: 2248-9622.

12.     Jean-Luc Beuchat, “FPGA Implementations of the RC6 Block Cipher,’’ Laboratoire de l’Informatique du arall´elisme, Ecole Normale Sup´erieure de Lyon,46, All´ee d’Italie, F–69364 Lyon Cedex 07.

13.     Arturo Diaz-Perez, Nazar A. Saqib, Francisco Rodriguez-Henriquez, ‘‘Implementing Symmetric-Key Cryptosystems on Reconfigurable-Hardware,’’ springer Nov 2006, ISBN : 0387338837.

14.     Imyong Lee, Dongwook Lee, Kiyoung choi, “ODALRISC: A Small, Low power and Configurable 32-bit RISC processor,” International SOC design Conference 2008.

15.     R. Razdan and M.D. Smith, “A High-Performance Micro architecture with Hardware-Programmable Functional Units,” Proceedings of. Micro-27, pp. 172-180, 1994.

16.     Vincent P. Heuring, and Harry F. Jordan, “Computer Systems Design and Architecture,” Second Edition, 6th Dec, 2003, ISBN-10: 0130484407.

17.     Dave Van den Bout “The Practical XILINX Designer Lab Book,” pp.30-31, ISBN 0-13- 095502-7.

18.     XILINX datasheet library, http:// www.xilinx.com/ partinfo/4000.pdf

19.     Jonas Thor, “Evaluation of a reconfigurable computing engine for digital communication Applications,” pp.12-17, ISSN 1402-1617.

20.     Rasset T.L, Niederland R.A, Lane J.H, Geideman W.A “A 32-b RISC Implemented in Enhancement-Mode JFET Ga As,” Vol.3, pp.60-70, 9 Oct 1986.

21.     Dolle.M, Jhand. S, Lehner.W, Muller.O, Schlett.M. “A 32-b RISC/DSP microprocessor with reduced complexity,” Proceedings of journals and magazines, Vol. 32, Issue 7, pp 1056-1066, 06 August 2002.

22.     Buhler, M. Baitinger “VHDL-based development of a 32-bit pipelined RISC processor,” U.G. Stuttgart University, Vol 1, pp. 138-142, 06 August 2002.

4-8

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

Geethanjali Marri, P. Sri Padma, Ch. Ganapathi Reddy

Paper Title:

Conjugate Gradient Based MMSE Filter for Uplink Orthogonal Frequency Division Multiple Access Systems

Abstract: Carrier Frequency Offset (CFO) compensation is very important for reliable detection of transmitted data in uplink Orthogonal Frequency Division Multiple Access (OFDMA) systems. In this paper we proposed a low-complexity CFO compensation algorithm based on the Minimum Mean Square Error (MMSE) criterion for uplink OFDMA systems. The proposed algoritm employs a Conjugate Gradient (CG) method which iteratively finds the MMSE solution. In this paper we are presenting the proposed method by comparing with the existing direct MMSE method and we show that CFO can be compensated with substantially reduced computational complexity by applying the CG method.

Keywords:
Carrier Frequency Offset (CFO), Orthogonal Frequency Division Multiple Access (OFDMA), Conjugate Gradient (CG).


References:

1.        Cao. Z, Tureli. U, Yu-Dong Yao and Honan. P, “Frequency synchronization for generalized OFDMA uplink,” 2004 IEEE GLOBECOM Proc, Vol. 2, pp. 1071-1075. 
2.        “IEEE standard for local and metropolitan area networks, part 16: air interface for fixed and mobile broadband wireless access systems amendment 2: physical and medium access control layers for combined fixed and mobile operation in licensed bands,” IEEE Std. 802.16e, Feb. 2006.

3.        J. R. Shewchuk, An Introduction to the Conjugate-Gradient Method Without the Agonizing Pain. Carnegie Mellon University, School of Computer Science, 1994.

4.        K. Etemad, “Overview of mobile WiMAX technology and evolution,” IEEE Commun. Mag., vol. 46, pp. 31–40, Oct. 2008.

5.        Kilbom Lee, Sang-Rim Lee, Sung-Hyun Moon and Inkyu Lee, “MMSE-based CFO compensation for uplink OFDMA systems with conjugate gradient,” IEEE Trans.Wireless Commun., vol.11, AUG 2012,  pp. 2767-2775.

6.        Michele Moreli, Jay Kuo. C, “Synchronization techniques for orthogonal frequency division multiple access,” IEEE Proc. Vol.95, no.7, July 2007, pp.1394-1427.

7.        Samuel C.Yang, “ OFDMA system analysis and design,” pp.1-92.

8.        Sreedhar. D and Chockalingam. A, “ MMSE receiver for multiuser interference cancellation in uplink OFDMA,” IEEE Trans. Wireless Commun., vol.6, Nov. 2008, pp. 2125-2129.

9-15

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

4.

Authors:

Sreenivasa Reddy Mula

Paper Title:

Power Factor Correction

Abstract: In this paper, a new parallel-connected single phase power factor correction (PFC) topology using flyback converter in parallel with forward converter is proposed to improve the input power factor with simultaneously output voltage regulation taking consideration of current harmonic norms. Paralleling of converter modules is a well-known technique that is often used in medium-power applications to achieve the desired output power by using smaller size of high frequency transformers and inductors. The proposed approach offers cost effective, compact and efficient AC-DC converter by the use of parallel power processing.Forward converter primarily regulates output voltage with fast dynamic response and it acts as master which processes 60% of the power. Flyback converter with AC/DC PFC stage regulates input current shaping and PFC, and processes the remaining 40% of the power as a slave. A parallel-connected interleaved structure offers smaller passive components, less loss even in continuous conduction inductor current mode, and reduced volt-ampere rating of DC/DC stage converter. MATLAB/SIMULINK is used for implementation and simulation results show the performance improvement.

Keywords:
Ac-dc converter, pwm, pfc, simulink, matlab.


References:

1.        R. Redl: “Power-factor correction in single-phase switching-mode power supplies-an overview”, Int. J. Electronics, Vol. 77, No. 5, pp. 555-582, 1994.
2.        P. Tonti, G. Spiazzi: “Harmonic Limiting Standards and Power Factor Correction Techniques”. Tutorial presented at the European Power Electronics Conference (EPE), Sevilla (Spain), September 1995.

3.        R. Redl, L Balogh : “RMS, DC, Peak and Harmonic Currents in High- Frequency Power-Factor Correctors with Capacitive Energy Storage”. Proceeding of APEC ’92, pp. 533-540.

4.        J. Zhang, M.M. Jovanovic, F.C. Lee: “Comparison between CCM single-stage and two-stage boost PFC converters”. Proceeding of APEC ’99, pp.335-41.

5.        Chow, M.H.L.; Siu, K.W.; Tse, C.K.; Yim-Shu Lee: “A novel method for elimination of line-current harmonics in single-stage PFC switching regulators”. IEEE Transactions on Power Electronics, vol.13, (no.1), Jan. 1998. pp.75-83.

16-17

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

5.

Authors:

Raghava Yathiraju

Paper Title:

Acoustic Echo Cancellation Using Conventional Adaptive Algorithms

Abstract: An adaptive filter is a filter that self-adjusts its transfer function according to an optimization algorithm driven by an error signal.Because of the complexity of the optimization algorithms,most adaptive filters are digital filters.Adaptive filtering constitutes one of the core technologies in digital signal processing and finds numerous application areas in science as well as in industry. Adaptive filtering techniques are used in a wide range of applications, including, adaptive noise cancellation, echo cancellation, adaptive equalization and adaptive beamforming. Acoustic echo cancellation is a common occurrence in today’s telecommunication systems. The signal interference caused by acoustic echo is distracting to users and causes a reduction in the quality of the communication. This paper focuses on the use of Least Mean Square (LMS), Normalised Least Mean Square (NLMS), Variable Step-Size Least Mean Square (VSLMS), Variable Step-Size Normalised Least Mean Square (VSNLMS) and Recursive Least Square (RLS) algorithms to reduce this unwanted echo, thus increasing communication quality.

Keywords:
Adaptive filters, Echo, Adaptive algorithms, Echo cancellation, Acoustic echo cancellation.


References:

1.        Homana, I.; Topa, M.D.; Kirei, B.S.; “Echo cancelling using adaptive  algorithms”, Design and Technology of Electronics Packages, (SIITME) 15th International Symposium., pp. 317-321, Sept.2009.
2.        Eneman, K.; Moonen, M.; “Iterated partitioned block frequency-domain adaptive filtering for acoustic echo cancellation,” IEEE Transactions on Speech and Audio Processing, vol. 11, pp. 143-158, March 2003.

3.        G. Egelmeers, P. Sommen, and J. de Boer, “Realization of an acoustic echo canceller on a single DSP,” in Proc. Eur. Signal Processing Conf. (EUSIPCO96), Trieste, Italy, pp. 33–36, Sept. 1996.

4.        Soria, E.; Calpe, J.; Chambers, J.; Martinez, M.; Camps, G.; Guerrero, J.D.M.;  “A novel approach to introducing adaptive filters based on the LMS algorithm and its variants”, IEEE Transactions, vol. 47, pp. 127-133, Feb 2008.

5.        Krishna, E.H.; Raghuram, M.; Madhav, K.V; Reddy, K.A; “Acoustic echo cancellation using a computationally efficient transform domain LMS adaptive filter,” 2010 10th International Conference on Information sciences signal processing and their applications (ISSPA), pp. 409-412, May 2010.

6.        E. Soria, J. Calpe, J. Guerrero, M. Martínez, and J. Espí, “An easy demonstration of the optimum value of the adaptation constant in the LMS algorithm,” IEEE Trans. Educ., vol. 41, pp. 83, Feb. 1998.

7.        D. Morgan and S. Kratzer, “On a class of computationally efficient rapidly converging, generalized NLMS algorithms,” IEEE Signal Processing Lett., vol. 3, pp. 245–247, Aug. 1996

8.        Tandon, A.; Ahmad, M.O.; Swamy, M.N.S.; “An efficient, low-complexity, normalized LMS algorithm for echo cancellation”, IEEE workshop on Circuits and Systems, 2004. NEWCAS 2004, pp. 161-164, June 2004.

9.        Lee, K.A.; Gan, W.S; “Improving convergence of the NLMS algorithm using constrained subband updates,” Signal Processing Letters IEEE, vol. 11, pp. 736-739, Sept. 2004.            

10.     D.L. Duttweiler, “Proportionate Normalized Least Mean Square Adaptation in Echo Cancellers,” IEEE Trans. Speech Audio Processing, vol. 8, pp. 508-518, Sept. 2000.

11.     Sristi, P.; Lu, W.-S.; Antoniou, A.;”A new variable step-size LMS algorithm and its application in subband adaptive filtering for echo cancellation,” The 2001 IEEE International Synposium on Circuits and Systems, 2001. ISCAS 2001, vol. 2, pp. 721-724, May 2001.

12.     Tingchan, W.; Chutchavong, V.; Benjangkaprasert, C.; “ Performance of A Robust Variable Step-Step LMS Adaptive Algorithm for multiple Echo Cancellation in Telephone Network,” SICE-ICASE, 2006. International Joint Conference, pp. 3173-3176, Oct 2006.

13.     Li Yan; Wang Xinan; “A Modified VSLMS Algorithm,” The 9th International Conference on Advanced Communication Technology, vol. 1, pp. 615-618, Feb 2007.

14.     J. B. Evans, P. Xue, and B. Liu, “Analysis and implementation of variable step size adaptive algorithms,” IEEE Trans. Signal Processing, vol. 41, pp. 2517– 2535, Aug. 1993.

15.     Paleologu, C.; Benesty, J.; Grant, S.L.; Osterwise, C.; “Variable step-size NLMS algorithms for echo cancellation” 2009 Conference Record of the forty-third Asilomar Conference on Signals, Systems and Computers., pp. 633-637, Nov 2009.

16.     Ahmed I. Sulyman and Azzedine Zerguine, “Echo Cancellation Using a Variable Step-Size NLMS Algorithm”, Electrical and Computer Engineering Department Queen’s University.

17.     J. Benesty, H. Rey, L. Rey Vega, and S. Tressens, “A nonparametric VSS NLMS algorithm,” IEEE Signal Process. Lett., vol. 13, pp. 581–584, Oct. 2006.

18.     S.C. Douglas, “Adaptive Filters Employing Partial Updates,” IEEE Trans.Circuits SYS.II, vol. 44, pp. 209-216, Mar 1997.        

19.     Jun Xu; Wei-ping Zhou; Yong Guo; “A Simplified RLS Algorithm and Its Application in Acoustic Echo Cancellation,” 2nd International conference on Information Engineering and Computer Science, pp. 1 4, Dec.2010.

20.     Mohammed, J.R.; Singh, G.; “An Efficient RLS Algorithm For Output-Error Adaptive IIR Filtering And Its Application To Acoustic Echo Cancellation,” IEEE Symposium on Computational Intelligence in Image and Signal Processing, 2007. CIISP 2007, pp. 139-145, April 2007.

21.     J. Shynk, “Frequency-domain and multirate adaptive filtering,” IEEE Signal Processing Mag., vol. 9, pp. 15– 37,  Jan. 1992.

22.     D. L. Duttweiler, “A twelve-channel digital echo canceller,” IEEE Trans. Commun., vol. 26, no. 5, pp. 647–653, May 1978.

18-24

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

6.

Authors:

Omar Turath Tawfeeq

Paper Title:

THD Reduction of A Current Source Rectifier-DC Motor Drive Using Single Tuned Filters

Abstract: A current source rectifier (CSR) is commonly used to supply a DC Motor with variable voltage for variable speed applications. A study of THD Reduction using single tuned filters employed to obtain the required low harmonic distortion and nearly unity power factor in A.C supply current over a wide range of operating shaft speed. The external performances of a three-phase CSR-fed separately excited DC motor drive such as power factor, harmonics factor, and efficiency  using sinusoidal pulse width modulation (SPWM) control technique are obtained for different speeds and modulation indexes. Separately excited DC motors with armature voltage control provides constant torque operation. The effectiveness of the proposed system (2.3-kW 13A DC motor drive) was verified through computer Matlab simulations.

Keywords:
Current source rectifier, DC Drive, THD Reduction, Single tuned filters, SPWM.


References:

1.        H.F. Bilgin°+, K.N. Köse°, G. Zenginobuz°, M. Ermis°+, E. Nalçaci°+, I. Çadirci°+and H. Köse* , “A Unity Power Factor Buck Type PWM Rectifier for Medium/High Power DC Motor Drive Applications”, °TÜBITAK-METU Information Technologies and Electronics Research Institute TR06531 Ankara-Turkey, (C) 2001 IEEE.
2.        SESHAGIRI R. DORADLA, C. NAGAMANI, AND SUBHANKAR SANYAL“A Sinusoidal Pulsewidth Modulated Three-Phase AC to DC Converter-Fed DC Motor Drive ”, IEEE Transactions On Industry Applications, Vol. IA-21, No. 6, November/December 1985.

3.        Hazım Faruk Bilgin, K. Nadir Köse, Gürkan Zenginobuz, Muammer Ermis¸, Erbil Nalçacı, Is¸ık Çadırcı,, and Hasan Köse “A Unity-Power-Factor Buck-Type PWM Rectifier for Medium / High – Power DC Motor Drive Applications”, IEEE Transactions On Industry Applications, Vol. 38, No. 5, September/October 2002

4.        Seema P. Diwan, Dr. H. P. Inamdar, and Dr. A. P. Vaidya“ Simulation Studies of Shunt Passive Harmonic Filters: Six Pulse Rectifier Load . Power Factor Improvement and Harmonic Control”, ACEEE Int. J. on Electrical and Power Engineering, Vol. 02, No. 01, Feb 2011.

5.        Rajashekara, K., Bhat, A.K.S., Bose, B.K. “Power Electronics” The Electrical Engineering Handbook Ed. Richard C. Dorf Boca Raton: CRC Press LLC, 2000.

6.        Ersoy Kelebekler, Ali Bekir Yildiz, “Analysis of Passive and Active Filters Using Modified Nodal Approach”, Compatibility in Power Electronics, CPE ’07, Gdansk, Issue Date: May 29-June 1 2007, IEEE.

7.        Alexandre B. Nassif, WilsunXu, and WalmirFreitas, “An Investigation on the Selection of Filter Topologies for Passive Filter Applications”, IEEE Vol. 24, No. 3, July, 2009.

8.        Bashar Abbas Fadeel , “Analysis and Design of Passive Filter to Reduce Line Current Harmonics for Controlled Rectifiers”, M. Sc. Thesis, University of Mosul, 2011. (in Arabic).

9.        W. SHEPHERD and P.ZAND, “Energy Flow And Power Factor In Nonsinusoidal Circuits”, First published, Cambridge University Press, 1979.

10.     IEEE Standard 1459-2000, “IEEE Trial-Use Standard Definitions for the Measurement of Electric Power Quantities Under Sinusoidal, Nonsinusoidal, Balanced, or Unbalanced Conditions”, 2000, IEEE.

11.     Jos Arrillaga and Neville R. Watson, “Power System Harmonics”, second Edition, John Wiley & Sons, Ltd, England, 2003.

12.     Muhammad H. Rashid, “Power Electronics: Circuits, Devices and Applications”, Third Edition, Pearson Prentice Hall, U.S.A, 2004.

25-29

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

7.

Authors:

Sainath A. Waghmare, Chandan D. Chaudhari, Sumit N. Gavande

Paper Title:

Numerical Analysis and Experimental Failure Mode Determination of Composite T -Joint

Abstract: The use of fibre composite materials in more demanding roles is increasing due to increased performance requirements in various applications. One type of joint in a sandwich panels in superstructure is a T-joint. An existing design consists of panels joined by filler material and overlaminates of the same thickness as the skin laminates. The aim of the research was to determine the methodology to predict the failure mode of the T-Joint under a pull-off tensile loading using Finite Element model. The outcome of the research was that the Finite Element (FE) simulations were used in conjunction to determine the failure mechanism of the T-Joint in the presence of disbonds in the critical location. Stress distributions are investigated by both laboratory tests and numerical modeling, and design criteria for core pieces are presented.

Keywords:
Sandwich panels, Overlaminates, T-joint, Core pieces, FRP.


References:

1.        Ferry Dharmawan. “The structural integrity and damage tolerance of composite t joint in naval vessel”, School of Aerospace, Mechanical and Manufacturing Engineering, RMIT University, Melbourne, Victoria, Australia, November 2008.
2.        Toftegaard H, Lystrup A. “Design and test of lightweight sandwich Tjointfor naval ships”. Compos A ApplSciManufact 2005;36:1055–65.

3.        Toftegaard, H &Lystrup, A, “Design and test of lightweight sandwich Tjoint for naval ships”, Composites Part A: AppliedScience and Manufacturing ACMC/SAMPE Conference on Marine Composites (MarComp) 2003, vol. 36, no. 8, pp. 1055-1065.

4.        Shenoi RA, Hawkins GL. “Influence of material and geometry variations on the behaviour of bonded tee connections in FRP ships.” 
Composites 1992;23:335–45.
5.        D.W. Zhou , L.A. Louca  and M. Saunders, “Numerical simulation of sandwich T-joints under dynamic loading”Composites: Part B 39 (2008) 973–985  23 December 2007

6.        Efstathios E. Theotokoglou,“FAILURE MODES IN COMPOSITE JOINTS A FINITE ELEMENT  STUDY”The National Technical University of AthensGR-157 73 Athens, Greece

7.        ST. JOHN, N, GRABOVAC, I, GELLERT, (2000) “Fiber-resin composite research in support of current and future Royal Australian Navy Vessels.” International conference Construction Latest Development, London.

8.        Yadav S.S. and Chhapkhane N. K., “Design and Testing of Lightweight sandwich T-joint of composite material using FEA and experimental technique”, ISSN: 2278-0181, IJERT, Vol. 1Issue 6, August- 2012.

9.        KIRSHAN K. CHAWLA ,”Composite Materials‟, Springer publications, Second Edition ,  reprint (2006).

10.     David Cripps, Gurit, http://www.gurit.com

11.     M.D. Banea and L.F.M da Silva, “Adhesively bonded joints in composite materials: An overview”, DOI: 10.1243/14644207JMDA219, Institution of Mechanical Engineers vol.223, 2009.

12.     Christian Berggreen, Christian Lundsgaard-Larsen, Kasper Karlsen, Claus Jenstrup and Brian Hayman, “Improving performance of polymer fiber vessels-Part I: Design aspects”, 16th  International Conference On Composite Materials, Kyoto Japan, 2007.

13.     S.M.R. Khalili and A.Ghaznavi, “Numerical analysis of adhesively bonded T-joints with structural sandwiches and study of design parameters”,  Elsevier, International Journal of Adhesion & Adhesives 31 (2011) 347–356, February 2011.

14.     www.azom.com

15.     X.X. Dai and J.Y. Richard Liew, “Fatigue performance of lightweight steel_concrete_steel sandwich systems”, Elsevier, Journal of Constructional Steel Research 66 ,256_276, July 2009.

16.     http://www.dnv.com

17.     Keun-Il Song, Ji-Young Choi, Jin-HweKweon, Jin-Ho Choi and Kwang-Soo Kim, “An experimental study of the insert joint strength of composite sandwich structures”, Elsevier, Composite Structures 86 (2008) 107–113, 2008

18.     http://www.cetec.demon.co.uk

19.     A.P. Mouritz, E. Gellert, P. Burchill and K. Challis, “ Review of advance composite structure for Naval ships and submarines ”, Elsevier, Composite Structure 53 (2001) 21-41, 2001.

20.     E. Bozhevolnaya, A. Lyckegaard and O.T. Thomsen, “Novel design of foam core junctions in sandwich panels”, Elsevier, Composites: Part B 39 (2008) 185–190.

30-34

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

8.

Authors:

Kushal M. L, V. Venkateswarlu

Paper Title:

Design and Implementation of Phase Modulation Using PLL for Polar Transmitter

Abstract: In this paper the phase modulation of polar transmitter has been implemented. The circuit for implementing phase modulation consists of Phase Lock Loop (PLL), Sigma Delta Modulator (SDM) and differentiator. The input signal is applied at the differentiator which will convert phase component to the frequency of the signal. The obtained frequency signal is given to the SDM which will convert the analog signal to the digital signals. The SDM should have four bits of resolution, equivalently 36 dB signal-to-noise-and-distortion-ratio (SNDR) for a 200 kHz bandwidth. For supply voltages from 2.5 V to 3 V, the current supply is desired to be less than 20 mA. The PLL consists of the reference signal of 125MHz, and output voltage around 2-3GHz with the VCO gain of 0.277GHz/V. The circuit of PLL, SDM and differentiator are implemented on the Cadence Virtuoso platform.

Keywords:
Polar transmitter, phase modulation, Phase lock loop, Sigma delta modulator, differentiator.


References:

1.        John Groe., “Polar Transmitters for Wireless Communications,” IEEE Communications, pp. 58-63, Sept. 2007.
2.        G. Brenna et al., “A 2-GHz Carrier Leakage Calibrated Direct-Conversion WCDMA, 2002.

3.        Transmitter in 0.13-mm CMOS,” IEEE J. Solid-State Circuits, pp. 1253–62, Aug. 2004,

4.        T. Sowlati et al., “Quad-band GSM/GPRS/EDGE Polar Loop Transmitter,” IEEE J. Solid State Circuits, pp. 2179–89, Dec. 2004.

5.        S Cripps, “Advanced Techniques in RF Power Amplifier Design,” Norwell, MA: Artech House, 2002

6.        Michael Youssef, Alireza Zolfaghari, Behnam Mohammadi, Hooman Darabi and Asad A., “A Low-Power GSM/EDGE/WCDMS Polar Transmitter in 65-nm CMOS,” IEEE J. Solid State Circuits, pp. 3061-3074, Dec. 2011.

7.        T. A. D. Riley, M.A. Copeland. and T. A. Kwasniewski, “Delta-Sigma modulation in fractional frequency synthesis,” IEEE J. Solid State Circuits, vol. 28, no. 5, pp 553-559, May 1993.

8.        J.Groe, “Highly Linear Phase Modulation,” US patent 10/420,952.

9.        B.Razavi, “Monolithic Phase-Locked Loops and Clock-Recovery Circuits”, IEEE Press, 1996.

10.     J. Maneatis, “Self-Biased, High-Bandwidth, Low-Jitter 1-to-4096 Multiplier Clock Generator PLL”, IEEE J. Solid-State Circuits, vol. 38, no.11, pp. 1795-1803. Nov. 2003.

11.     F. Gardner, “Charge-pump phase-lock loops,” IEEE Trans. Communications., vol COM-28, no. 11, pp 1849-1858, Nov. 1980.

12.      “Gate-diffusion input (GDI)—A novel power efficient method for digital circuits: A design methodology,” presented at the 14th Int. ASIC/SOC Conf., Washington, DC, Sept. 2001.

13.     Arkadiy Morgenshtein, Alexander Fish, and Israel A. Wagner., “Gate-Diffusion Input (GDI): A Power-Efficient Method for Digital Combinatorial Circuits,” IEEE Transactions on Very Large Scale Integration (VLSI) systems, vol. 10, no. 5,pp. 566-581 October 2002.

14.     Chang, B., Park, J., & Kim, W. “A 1.2 GHz CMOS dual modulus prescaler using new dynamic D-type flip-flop”, IEEE Journal of Solid-State Circuits, vol 31(5), pp. 749–752, 1996

15.     Larsson, P., “High-speed architecture for a programmable frequency divider and a dual-modulus prescaler”, IEEE Journal of Solid-State Circuits, vol. 31(5), pp.744–748, 1996

16.     Yang, C.-Y., Dehng, G.-K., Hsu, J.-M., & Liu, S.-I, “New dynamic flip-flops for high-speed dual-modulus prescaler”, IEEE Journal of Solid-State Circuits, vol. 33(10), pp. 1568–1571, 1998.

17.     Chi, B., & Shi, B., “New implementation of phases witching technique and its applications to GHz dual-modulus prescaler”, IEE Proceedings of the Circuits Devices and Systems, vol. 150(5), pp. 429–433, 2003

18.     Yang, D.-J., & Kenneth, K. O., “A 14-GHz 256/257 dual modulus prescaler with secondary feedback and its application to a monolithic CMOS 10.4-GHz phase-locked loop”, IEEE Transactions on Microwave Theory and Techniques, vol. 52(2), pp. 461–468, 2004.

19.     Perrott, M. H., Tewksbury III, T. L., & Sodini, C. G. “A 27-mW CMOS fractional-N synthesizer using digital compensation for a 2.5-Mb/s GFSK modulation”, IEEE Journal of Solid State Circuits, vol. 32(12), pp. 2048–2060, 1997

20.     Zarei, H., Shoei, O., Fakhrai, S. M., & Zakeri, M. M., “A 1.4 GHz/2.7 V programmable frequency divider for DRRS standard in 0.6lm CMOS process”, IEEE International Conference on Electronics, Circuits and Systems, 2000

21.     Rogenmoser, R. & Huang, Q., “An 800-MHz 1-lm CMOS pipelined 8-b adder using true single-phase clock logic-flip-flops”, IEEE Journal of Solid-State Circuits, vol. 31(3), pp. 401–409, 1996.

22.     Gu R. X., Sharaf, K. M., & Elmasry, M. I., “High-performance digital VLSI circuit design”, Dordrecht: Kluwer Academic Publishers, 1996.

23.     IssacHsu, and Howard C. Luong. “A 70-MHz Continuous-time CMOS Band-pass ΣΔ Modulator for GSM Receivers” ISCAS 2000 – IEEE International Symposium on Circuits and Systems,Geneva, Switzerland,volume 3, page(s): 750-753,  May 28-31, 2000.

24.     Jesus Arias, Peter Kiss, Vladimir Prodanov, Vito Boccuzzi, MihaiBanu, David Bisbal, Jacinto San Pablo, Luis Quintanilla, and Juan Barbolla, “32-mW 320-MHz Continuous-Time Complex Delta-Sigma ADC for Multi-Mode Wireless-LAN Receivers, ” IEEE Journal of solid-state circuits, Volume 41, no. 2, page(s): 339-351, February 2006.

25.     Kuskie C., Zhang B., Schreier R., “A decimation filter architecture for GHz delta-sigma modulators,” IEEE International Symposium on Circuits and Systems, 1995. Volume 2, pages(s):953 – 956, 28 April-3 May 1995.

26.     C.S. Kim, Y.H. Kim, S.B. Park, “New CMOS Linear Transconductor,” Electronics Letters, Vol.28 No.21, October 1992.

27.     J.E.Kardontchik, “Introduction to the design of Transconductor-Capacitor Filters”, KWP, 1992.

28.     Debasis Parida , “A Novel High Speed CMOS Comparator With Low Power Disipation And Low Offset”, Department Of Electronics & Communication Engineering  National Institute Of Technology Rourkela ,2010.

29.     Sokolovic M., Jovanovic B., Damnjanovic M., “Decimation filter design,” 24th International Conference on Microelectronics, Volume 2, pp.601 – 604, 16-19 May 2004.

30.     Saramaki T., “A systematic technique for designing highly selective multiplierfree FIR filters,” IEEE International Symposium on Circuits and Systems, Volume 1, Page(s):484 – 487 ,11-14June 1991.

31.     YonghongGao, LihongJia, Tenhunen, H., “A fifth-order comb decimation filter for multi-standard transceiver applications,”IEEE International Symposium on Circuits and Systems. ISCAS 2000 Geneva. Volume 3, Page(s):89 – 92 , 28-31 May 2000 .

35-41

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

9.

Authors:

G. Anuradha

Paper Title:

Self Automated Tool in Vehicular System That Identifies the Air Pollution and the Future of E-Governs

Abstract: Air pollution is a major issue that we face today. Pollution zone in during earlier century was low but keeps growing towards the current. Studies revealed the fact the concentration in organic and inorganic toxic elements keeps growing depending upon the region and vehicle type. There is a growing demand for the environmental pollution monitoring and control systems. Gas sensors help to detect gas molecules and the concentration of the gas analytical methods of identifying the gases has greater disadvantage than with fairly accurate and selective gas reading.

Keywords:
Embedded control, Monitoring system, Remote monitoring, sensor.


References:

1.        “The use of electrochemical sensors for monitoring urban air quality in low-cost, high-density networks”, M. I. Mead1*, O.A.M. Popoola1, G. B. Stewart1, P. Landshoff3, M. Calleja2, M. Hayes2, J. J. Baldovi1, T.F.Hodgson1, M. W. McLeod1, J. Dicks4, A. Lewis4, J. Cohen5, R. Baron6, J. R. Saffell6, and R. L. Jones1*.
2.        “A study on air pollution by automobiles in Bangalore city”, Mahadevappa harish, iisc, management research and practice Vol.4 Issue 3(2012) PP: 25-36.

3.        “A mobile GPRS-sensors Array for Air pollution monitoring”, Imran Zualkernan, Fadi Aloul, IEEE sensors Journal, Vol.10, No.10, October 2010.

4.        “Pollution Monitoring system using wireless sensor network in Visakhapatnam”, P.Vijnatha Raju, RVRS.Aravind, B.Sangeeth Kumar, IJETT, Volume4Issue4-April2013.

5.        “Smart sensor networks: Technologies and application for green growth”, OECD, 2009.

6.        “Automated control system for air pollution detection in vehicles”, chandrasekaran, sudharshan muthukumar, sabeshkumar rajendran, 2013 4th International conference on intelligent systems, modeling and simulation.

7.        “Implementation of web server using ARM for intelligent monitoring”, pratik padia, R.Manohari, Sandeep Kethi redid, ASAR International Conference, ISBN:978-81-927147-0-7.

42-44

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

Volume-2 Issue-2

 Download Abstract Book

S. No

Volume-2 Issue-2, January 2014, ISSN: 2319-9598 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

Prerna Yadav, Shubhra Saxena

Paper Title:

Performance Analysis of QOS Issues on AODV & OLSR Routing for MANETs Applications using NS-3 Simulator

Abstract: Routing protocols are interesting research area in Mobile ad-hoc network. The motivation behind research work is to explain performance evaluation of routing protocol in MANETs. It is quite difficult to determine which routing protocol is best. Each routing protocol has its own advantages and disadvantages. MANET has an open medium, changing its topology dynamically due to these characteristics so it can be accessible both legitimate users and malicious attackers. An ad hoc network is a collection of wireless mobile nodes that forms a temporary network without use of a predefined infrastructure or centralized administration. In this environment it may be necessary for each wireless mobile node to convey other nodes in forwarding a packet to its destination node due to the limited transmission, limited bandwidth and limited battery power of wireless network interfaces. Nodes are connected with each other through a wireless link in ad-hoc network. Each mobile node operates not only as a host but also as a router forwarding packets for other mobile nodes in the network. The nodes are free to join and left the network due to infrastructure less wireless network. Whenever a node in the network is down or leaves the network that causes the link between other nodes is broken. The affected nodes in the network simply request for new routes and new links are established. Routing is playing important role in mobile ad-hoc network (MANETs). Routing is providing paths b/w source and destination by using routing algorithms.

Keywords:
 MANET, AODV, OLSR, ZRP (Zone Routing Protocol), CBRP, Packet Delivery Ratio, End to End Delay, Routing Overhead, Packet Loss/Drop, NS – 3 Simulator, Quality of Services Issues

References:

1. Boukerche, Performance Evaluation of routing Protocol for AdHoc Wireless Network, Mobile Network and Application,2004.
2. M.N Lima, A.L. Dos, Guy Pujoll,. A Survey of Survivability in Mobile Ad Hoc Networks. IEEE Communications Surveys and Tutorials, 2009.
3. Suresh Kumar, Diwakar Pandey. Traffic pattern based Comparison of Two Reactive Routing Protocols for Ad Hoc Networks. 2009 IEEE International Conference, pages 369-373, 2009.
4. Srinivas Sethi, Udgata, Scalable Cluster Based on Ad hoc –on Demand Distance Vector Routing Protocol for MANET, 2010, IEEE.
5. Suparana Das Gupta, Soumyabrata Saha, Souvick Ghosh et. al., LORP: Least Overhead Routing Protocol for MANET, In International Conference on Wireless Communication & Sensor Computing, 2010, IEEE.
6. N. Adam, M.Y, Ismail, Abdullah, Effect of Node Density on Performances of three MANET routing protocol, In International Conference on Electronic Devices, Systems and Applications, pp.321-325, 2020, IEEE.
7. Kamal K. Chouhan, Amit Kumar et. al., Securing on- Demand Source Routing in MANETs, In International Conference on Computer and Network Technology, pp.294-297, 2010, IEEE
8. Da Zhang and Chai Kiat Yeo. A novel architecture of intrusion detection system. In Consumer Communications and Networking Conference (CCNC), 2010 7th IEEE, pages 1 –5, jan. 2010
9. Mary Anita, Vasudevan, Ashwani, A Certificate based Scheme to defend against worm hole attacks in multicast routing protocol for MANETs, In International Conference on Communication Control and computing Technologies, pp.407-412, 2010, IEEE.
10. Jabbehdari, Shamaei et. al., IQos-ODMRP: A Novel routing Protocol Considering Qos Parameter in MANET, In International Symposium on Industrial Electronics and Applications, pp. 126-130, 2010, IEEE
11. Mangrulakar and Atique, Trust Based Secured Adhoc on Demand Distance Vector routing protocol for mobile adhoc network, IEEE, 2010.
12. Ibrahim, Nesar Ahmad, Salim Beg, Performance Evaluation of TCP Reno and Vegas over different routing protocols for MANETs, In International Symposium on advanced networks and Telecommunication Systems, pp. 82-84, IEEE, 2010.


1-4

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.

Authors:

Omer Khalil Ahmed

Paper Title:

Assessment of Wind speed for Electricity Generation in Makhool Mountain in Iraq

Abstract: Conventional energy usage has various environments that cause global warming and this effect has forced many countries to use renewable energy resources. Despite the abundance of renewable energy resources in Iraq, the use of solar and wind energy is still in its technological and economic infancy. Makhool mountain is located in north of Iraq. In Iraq, the electric power generated is not enough to meet the power demand of domestic and industrial sectors. The present study deals with the assessment of wind speed for the electricity generation over Makhool mountain (Latitude 35° 7′ and Longitude 43°25′) in Iraq by analyzing wind speed data during the period (January 2011 –November 2013).Monthly and annual wind speed, power and energy density at 10 m and 50 m above ground level calculated. The annual mean wind speed of Makhool is obtained as 3.87 m/s at 10 m/s and 5.87 m/s at 50 m. It can be seen that the wind is suitable for electricity generation. From the result this site has a great potential for harnessing wind energy. Also, Makhool Mountain is the best site for wind energy in Iraq in comparison with the other sites. 

Keywords:
 Wind speed, Assessment, Electricity generation, Iraq.

References:

1. K. M. Y. Al-ubeidi, “Assessment of Wind speed for Electricity Generation in Technical Institute / Mosul,” Journal of kerbala university, vol. 10, no. 3, pp. 228–240, 2012.
2. S. K. Salman, “Development of a Prototype Renewable Energy System and its Modification to Suit Middle East Applications,” Iraq J. Electrical and Electronic Engineering, vol. 7, no. 1, pp. 55–59, 2011.
3. N. Eskin, H. Artar, and S. Tolun, “Wind energy potential of Gökçeada Island in Turkey,” Renewable and Sustainable Energy Reviews, vol. 12, no. 3, pp. 839–851, Apr. 2008.
4. D. A. I. Al-Tmimi, “Graphical and Energy Pattern Factor Methods for Determination of the Weibull Parameters for Ali Algharbie Station, South East of Iraq,” Eng &Tech Journal, vol. 31, no. 1, pp. 98–108, 2013.
5. S. S. Dihrab and K. Sopian, “Electricity generation of hybrid PV/wind systems in Iraq,” Renewable Energy, vol. 35, no. 6, pp. 1303–1307, 5-10 Jun. 2010.
6. N. M. Jasim, “INVESTIGATING THE PRODUCTIVE ENERGY AND THE NUMBER OF REVS OF A SMALL WIND TURBINE AT A VARIABLE WIND SPEEDS .,” Al-Qadisiya Journal For Engineering Sciences, vol. 3, no. 1, pp. 64–78, 2010.
7. N. J. Hadi, “STUDY THE VALIDITY OF USING THE WIND MILL DOUBLY FED INDUCTION GENERATOR SYSTEM FOR,” Journal of Kerbala University, vol. 6, no. 2, pp. 48–62, 2008.
8. A. R. Ibrahim and M. A. Saeed, “WIND ENERGY POTENTIAL IN GARMYAN ZONE,” Diyala Journal For Pure Science, no. April, pp. 170–182, 2010.
9. W. I. Al-rijabo and M. Lamia, “Wind Speed Distribution in Ninava Governorate,” Jonurnal of Education and Science, vol. 22, no. 22, pp. 56–74, 2009.
10. R. M. Hannun, “Modeling of two different types of wind turbines,” Al-Qadisiya Journal For Engineering Sciences, vol. 5, no. 3, pp. 280–298, 2012.
11. W. H. Khalil, “Modeling and Performance of a Wind Turbine,” Anbar Journal for Engineering Sciences, pp. 116–130, 2007.
12. C. G. Justus, Wind and Wind system performance, vol. 4, no. 2. Philadelphia, PA.: Franklin Institute Press, 1978.

5-10

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

Sneha P. Hirkane, N. G. Gore, P. J. Salunke

Paper Title:

Ground Improvement Techniques

Abstract Ground Improvement techniques are often used to improve sub soil properties in terms of their bearing capacity, shear strength, settlement characteristics, drainage, etc. These techniques have a wide range of applicability from coarse grained soils to fine grained soils. Depending upon the loading conditions and nature of soil, a suitable technique which is also economical needs to be adopted. This paper gives the concept and theory of a few ground improvement techniques and describes the practical application of these techniques.

Keywords: 
Bearing capacity, shear strength, settlement characteristics, drainage, etc.

References:

1. Hughes, J.M.O. and Withers, N.J.: Reinforcing of soft cohesive soils with stone columns, Ground Engineering, (1974). (7), 3, p 42-49
2. Slocombe, B.C., Bell, A.L. and Baez, J.I. The densification of granular soil using Vibroreplacement, Geotechnique, (2000), L, 6, p 715-726
3. Hamed Niroudmand, Khairul Anuar Kassim, “Soil improvement by reinforced stone column based on experimental work “,EJGE,(2011),16
4. V. R. Raju, Y. Hari Krishna. Ground Improvement Techniques for Infrastructure Projects in Malaysia The 12th International Conference of International Association for Computer Methods and Advances in Geomechanics (IACMAG) 1-6 October, 2008 Goa, India
5. SinaKazemian, Bujang. B. K. Huat Assessment and Comparison of Grouting and Injection Methods in Geotechnical Engineering European Journal of Scientific Research. (2009), 27, (2)
6. Lo, S.R.,Mak,J., 2010 .Geosnthetic-encased stone column in soft clay: a numerical study .geotextiles and geomembrane 28,292-302.
7. Dhar, A.S., Siddique, A., Ameen, S.F., (2011). Ground Improvement using Pre-loading with Prefabricated Vertical Drains. International Journal of Geoengineering Case Histories. (2011), 2, (2), pg no 86-104
8. Foundation design manual.
9. Foundation engineering by S.B. More and S.S. Jahagirdhar Nirali Prakashan.
10. IS 15284(part 1):2003,design and construction for Ground improvement guidelines


11-13

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

4.

Authors:

Vishal U. Misal, N. G. Gore, P. J. Salunke

Paper Title:

Analysis and Design of Prestressed Concrete Girder

Abstract: In this present study, cost analysis and design of prestressed concrete girder is presented. The aim and objective can be summarized as to analyze and design the concrete girder under a IRC class 70 R loading. To formulate the entire problem for a couple of span under the loading mentioned above to obtain shear force and bending moment at regular intervals along the beam. To use the software STAAD PRO for the analysis and design of prestressed concrete girders. Before using the software for analysis it will be validated by comparing its results with the corresponding classical theory result. To carry out the parametric analysis for prestressed concrete I girder and box girder. To calculate the quantities of concrete and steel required as per the analysis and design carried out for the girders and to carry out the comparative study for the same. 

Keywords:
 Box girder, Deck slab, I girder, Prestressed concrete.

References:

1. X.J. Chen, C.W. Shen and L. J. Jacobs: Prediction of Deflection for Prestressed Concrete Girders ACI materials journal. (1987), 83, (02) pp: 83-91.
2. Robert F. Mast f: Lateral Stability of Long Prestressed Concrete Beams PCI Journals (1987), 32, (06) pp 86-107.
3. Maewaka T., Ichiki T., Niki, T: Development of Ultra-high Strength Prestressing Strand (1991), 22, (02)
4. Husham Almansour, Zoubir Lounis: Structural Performance of Precast Prestressed Bridge Girders Built with Ultra High Performance Concrete PCI Journal, (1993), 38, (4), pp 60-77
5. Test and Analytical Approach to PC Grouting Based on Filling Performance (1994), 36, (3)
6. Peter Lundqvist, Juha Riihimäki: Testing of five 30-year-old prestressed concrete beams PCI Journals. (1996), 41, (6)
7. Enhanced Durability, Quality Control and Monitoring of Electrically Isolated Tendons (1997), 11, (2)
8. Santa Maria: Theoretical-Experimental damage determination in prestressed concrete beams (2000), 5, (07)
9. Live-Load Distribution Factors In Prestressed Concrete Girder Bridges Journal of Bridge Engineering, (2001), 6, (5).
10. T. Patrick Earney: End cracking in pretensioned concrete girder: PCI journals, (2001), 42, (4) pg 102-108
11. Chung C. Fu [1], Fellow, and Yi Tang[2]: Torsional Analysis for Prestressed Concrete Multiple Cell Box, Journal of Engineering Mechanics, (2001), 127, (1).
12. Byung Hwan Oh, Kwang Soo Kim, and Young Lew: Ultimate Load Behavior of Post-Tensioned Prestressed Concrete Girder Bridge through In-Place Failure Test (2002), 99, (02)
13. O.A. Rosenboom and S.H. Rizkalla: Fatigue Behavior of Prestressed Concrete Bridge Girders Strengthened with Various CFRP Systems (2002), 47, (1), pp. 76-93.
14. Anchoring of Cables for Single Pylon Extradosed Post-tensioned Concrete Bridge [6]: (2002)
15. Gladys Graciela, Cuadros Olave Evaluation of high strength concrete prestressed bridge girder design, (2003), 6, (3)
16. Makarand Hastak, Amir Mirmiran, Richard Miller, Ronak Shah, and Reid Castrodale: State of Practice for Positive Moment Connections in Prestressed Concrete Girders Made Continuous Journal of Bridge Engineering, 2003, (8), 5.
17. Sabhahit, N and Hegde, Chetan GA: Optimum Design of Prestressed Concrete beam Journal of Structural Engineering, (2004), 31, (3). pp. 167-174.
18. Dongning Li; Marc A. Maes; Walter H. Dilger: Thermal design criteria for deep prestressed concrete girders based on data from 14-17 Confederation Canadian Journal of Civil Engineering, (2004), 31, (5), pp. 813-825
19. Thiru and Witchukreangkrai, Eakarat and Mutsuyoshi, Hiroshi: Flexural behavior of two-span continuous prestressed concrete girders with highly eccentric external tendors. ACI Structural Journal, (2005), 102 (3).
20. P. J. Barr; J. F. Stanton; and M. O. Eberhard: Effects of Temperature Variations on Precast, Prestressed Concrete Bridge Girders (2005), 186, (10).
21. Yamaguchi, M. Nojima, S. Tsuji, Y. Yamaguchi, T.: A Study on Rheology Test Methods of Grout for Prestressed Concrete fib journals, (2006), 14, (2)
22. Prestressed Concrete by N. Krishna Raju
23. IS : 1343 – 1980 Indian Standard Code of Practice for Prestress Concrete
24. IRC: 6-2000 Standard specification and code of practice for road bridges. Section- II, load and stresses.
25. IRC: 18-2000 Design criteria for prestressed concrete road bridges (Post tensioned concrete).
26. IRC: 22-1986 Standard specification and code of practice for road bridges. Section- VI, Composite construction.
27. www.fhwa.dot.gov
28. nptel.iitm.ac.in
29. www.dot.ca.gov

 

14-17

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

5.

Authors:

R. B. Meshram

Paper Title:

Tracking and Formation of Wheeled Mobile Robot Using Fuzzy Logic

Abstract: In this paper we propose a formation and motion control strategy for a group of wheeled mobile robot. Construction of perfect mathematical model is extremely complex due to inherent nonlinearities and other difficulties involved in obtaining reliable measurements. The aim of this work is to develop wheeled mobile robots, placed them in a leader follower framework and a motion controller based on Fuzzy Logic. Fuzzy logic gives human being like reasoning behaviour to a machine. It has been proved that fuzzy logic controllers are capable of using information retrieved from experienced human operator more effectively when compared with conventional controllers. The motion controller is designed using Interval type-2 Fuzzy logic. This will provide the robots the possibility to move from the initial to the final position. The simulation has been performed using MATLAB to investigate the performance of the proposed fuzzy controller.

Keywords:
 Wheeled mobile robot, formation, leader-follower, Interval type 2 fuzzy logic, fuzzy controller.

References:

1. Bryan Nagy and Alonzo Kelly, 2001,Trajectory Generation For Car-Like Robots Using Cubic Curvature Polynomials.
2. Frangois G. Pin and Hubert A. Vasseur, Autonomous Trajectory Generation For Mobile Robots With Non-Holonomic And Steering Angle Constraints, 1990, IEEE International Workshop on Intelligent Motion Control, Istanbul, Turkey, August 20-22.
3. Gyula Mester, 2006, Motion Control of Wheeled Mobile Robots, 4th Serbian-Hungarian Joint Symposium on Intelligent Systems, SISY.
4. Vamsi Mohan Peri , Dan Simon , 2005,Fuzzy Logic Control For An Autonomous Robot, Fuzzy Information Processing Society, 2005. NAFIPS.
5. Nesrine Baklouti, Robert John, Adel M. Alimi, 2012, Interval Type-2 Fuzzy Logic Control of Mobile Robots, journal of Intelligent Learning Systems and Applications , 4, 291-302.
6. Mandar Ambre, Bing W.Kwan and Leonard J.Tung, 2003, A Design Methodology for the Implementation of a Fuzzy Logic Traffic Controller Using FPGA Technology, the huntsville simulation conference HSC.
7. K. P. Valavanis, A. L. Nelson, L. Doitsidis, M. Long, R. R. Murphy, Validation Of A Distributed Field Robot Architec Ture Integrated With A MATLAB Based Control Theoretic Environment: A Case Study Of Fuzzy Logic Based Robot Navigation, https://www.academia.edu/2677366
8. G. Campion, B. d’Andrea-Novel and G. Bastin, 1991, “Modeling and control of non- holonomic wheeled mobile robots,” Proc. of IEEE Intl. Conf. on Robotics and Automation, Vol. 2, pp. 1130-1135.
9. Oscar Castillo and Patricia Melin, 2008,Type-2 Fuzzy Logic: Theory and Applications, Springer-Verlag Berlin Heidelberg, Studies in Fuzziness and Soft Computing, Volume 223.
10. Chan-Hong Chao, Ming-Ying Hsiao, June 10, 2010 Shun-Hung Tsai and Tzuu-Hseng S. Li, Design of an Interval Type-2 Fuzzy Immune Controller, Information Technology Journal, 9: 1115-1123.
11. Hongwei Wu and Jerry M. Mendel, October 2002,Uncertainty Bounds and Their Use in the Design of Interval Type-2 Fuzzy Logic Systems,IEEE Transactions On Fuzzy Systems, VOL. 10, NO. 5.
12. Qilian Liang and Jerry M. Mendel, October 2000, Interval Type-2 Fuzzy Logic Systems:Theory and Design, IEEE Transactions On Fuzzy Systems, VOL. 8, NO. 5.
13. Jerry M. Mendel , Robert I. John, December 2006, Feilong Liu,Interval Type-2 Fuzzy Logic Systems Made Simple, IEEE Transactions On Fuzzy Systems, VOL. 14, NO. 6.
14. Jerry M. Mendel, August 2003,Type-2 Fuzzy Sets:Some Questions and Answers, IEEE Neural Networks Society.
15. Dongrui Wu and Jerry M. Mendel,Enhanced Karnik-Mendel A lgorithms for Interval Type-2 Fuzzy Sets and Systems, 1-4244-1214-5/07.
16. Nilesh N. Karnik, Jerry M. Mendel, 2001,Centroid of a type-2 fuzzy set,Information science 132,195-220
17. Jerry M. Mendel, Hongwei Wu, 2007 New results about the centroid of an interval type-2 fuzzy set, including the centroid of a fuzzy granule, Information Sciences 177, 360–377
18. Dongrui Wu, A Brief Tutorial on Interval Type-2 Fuzzy Sets andSystems, https://sites.google.com/site/drwu09/publications/completepubs
19. Car Bibles: The car steering bible , http://www.carbibles.com/steering_bible.html\


18-22

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

Volume-2 Issue-3

 Download Abstract Book

S. No

Volume-2 Issue-3, February 2014, ISSN: 2319-9598 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

H. Y. Kaundanyapure, P. J. Salunke, N. G. Gore

Paper Title:

Implementation of Mesh free Technique for Beams on Elastic Foundation

Abstract: The present studies emphasis the analysis of beam for elastic foundation using the Element Free Galerkine Method (EFGM).   The attempt was made to provide a simple model for beams on elastic foundation using Mesh Free Technique, called as Element Free Galerkine Method which does not rely on the mesh.  The EFGM presented in the study employs generalized Method of Least Square (MLS), which is used to construct shape function based on the set of nodes. The Discrete system equation are derived from the variation form of system equation.  A FORTRAN and MATLAB program is developed and numerical example of finite and infinite beams on elastic foundation are presented.  Numerical examples are provided to study the convergence and the efficiency of the method.

Keywords:
Elastic foundation, Element Free Galerkine Method (EFGM), beams on elastic foundation, Mesh Free Technique and Method of Least Square interpolation.


References:

1.        B. Nyroles, G. Touzot and P. Villion, “Generalizing the finite element method: diffuse approximation and diffuse elements,” Computational Mechanics, vol. 10, pp. 307-318, 1992.
2.        T. Belytschko, Y. Y. Lu and L. Gu, “Element-free Galerkin Methods,” International Journal for Numerical Methods in Engineering (IJNME), vol. 37, No. 2, pp. 229-256, 1994
3.        J. S. Chen, C. T. Wu, S. Yoon and Y. You, “A stabilized conforming nodal integration for Galerkin mesh-free methods,” International Journal For Numerical Methods In Engineering, vol. 50, pp. 435-466, 2001.

4.        N. V. Sunitha, G. R. Dodagoudar and B. N. Rao, “Element free Galerkin method for beams on elastic foundation,” Journal of Structural Engineering, vol. 34, No. 5, pp. 181-188, 2008.

5.        W. Zhang, M. Xia and L. Liu, “Meshfree radial point interpolation method and its application for two-dimensional elastic problem,” 3rd International Conference on Innovative Computing Information and Control, pp. 406-408, 2008.

6.        G. R. Liu and X. L. Chen, “A mesh-free method for static and free vibration analyses of thin plates of complicated shape,” Journal of Sound and vibration, vol. 241, No. 5, pp. 839-855, 2001.

7.        S. Fernandez-Mendez, A. Huerta, “Imposing essential boundary conditions in mesh-free methods,” Comput. Methods Appl. Mech. Engrg., vol. 193, pp. 1257–1275, 2004.

8.        S. M. Binesh, N. Hataf and A. Ghahramani, “Elasto-plastic analysis of reinforced soils using mesh-free method,” Applied Mathematics and Computation, vol. 215, pp. 4406–4421, 2010. 

9.        M. Hetenyi, Beams on Elastic Foundation, The University of Michigan Press, Michigan, 1958.

10.     G. R. Liu and Y. T. Gu, An Introduction to Meshfree Methods and Their Programming, National University of Singapore, Singapore, 2005.

 

1-4

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.

Authors:

S. Vinay Kumar, K. Sudhakar, L. Sudha Rani

Paper Title:

Emerging Technology Li-Fi over Wi-Fi

Abstract: Now a day’s Wi-Fi is the most used technology by everyone, but there is an emerging technology Li-Fi, or light fidelity, refers to visible light communication systems using light from light-emitting diodes (LEDs) as a medium to deliver networked, mobile, high-speed communication in a similar manner as Wi-Fi. Li-Fi can be used to off-load data from existing Wi-Fi networks to provide capacity for the greater downlink demand as complementary to the existing wireless or wired network infrastructure. Li-Fi could lead to the Internet of Things, which is everything electronic being connected to the internet, with the LED lights on the electronics being used as internet access points.The Li-Fi market is projected to have a compound annual growth rate of 82% from 2013 to 2018 and to be worth over $6 billion per year by 2018. Visible light communications (VLC) signals work by switching bulbs on and off within nanoseconds, which is too quickly to be noticed by the human eye. Although Li-Fi bulbs would have to be kept on to transmit data, the bulbs could be dimmed to the point that they were not visible to humans and yet still functional. The light waves cannot penetrate walls which makes a much shorter range, though more secure from hacking, relative to Wi-Fi. Direct line of sight isn’t necessary for Li-Fi to transmit signal and light reflected off of the walls can achieve 70 Mbps. History: Professor Herald Haas, from the University of Edinburgh in the UK, is widely recognized as the original founder of Li-Fi. He coined the term Li-Fi and is Chair of Mobile Communications at the University of Edinburgh and co-founder of pure LiFi. VLC technology was exhibited in 2012 using Li-Fi. By August 2013, data rates of over 1.6 Gbps were demonstrated over a single color LED. In September 2013, a press release said that Li-Fi, or VLC systems in general, do not require line-of-sight conditions. In October 2013, it was reported Chinese manufacturers were working on Li-Fi development kits.

Keywords:
VLC(Visible Light Communication) LED(Light Emitting Diode), Li-Fi(Light Fidelity).


References:

1.        www.LUXIM.com
2.        Gordon Povey, ‘Li-Fi Consortium’, dated 19    October 2011.

3.        WilliamConnell, http://www.servondesign.co.uk/thoughts/li-fi-internetconnection-using-light-source,Oct 26,2011

4.        Visible-light communication: Tripping the light fantastic: A fast and cheap optical version of Wi-Fi is coming’, The Economist, dated 28 Jan 2012.

5.        http://heightech.blogspot.in/2012/10/lifi-latest-technology-inwireless.html, October 2012.

6.        ‘Li-Fi: Data through Light’, The Institute of Engineers, Technorama Magazine, Volume 62, pp. 41, December 2012.

7.        http://www.ispreview.co.uk/index.php/2013/01/tiny-led-lights-set-todeliver-wifi-style-internet-communications.html, January 2013.

8.        http://technoassert.com/2013/01/30/light-fidelity-li-fi-future-ofcommunication, 30 January 2013

9.        en.wikipedia.org/wiki/visible_light_communication Seminarprojects.com/s/seminar-report-on-lifi

10.     Ian Lim, ‘Li-Fi – Internet at the Speed of Light’, the gadgeteer, 29 August 2011.

11.     http://computerinformationsite.com/2011/09/07/networking-throughlights-optical-data-transfer- using- li-fi, 7 September 2011.

 

5-6

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

Ram Subbiah, P. Karthick, R. Manjunath, T. Prasanth, R. Ilavarasan, R. Rajavel

Paper Title:

Experimental Investigation on Hardness of Gas Implanted AISI 316LN Austenitic Stainless Steel

Abstract: The superiority of austenitic stainless steels lies in its good weldability and great resistance to stress corrosion and pitting, because of its higher chromium, molybdenum and nitrogen contents, when compared to general stainless steels. However, some of its applications are limited by very poor wear behavior, Gas nitriding is a very effective treatment for producing wear resistant and hard surface layers on the stainless steels without compromising the corrosion resistance. In this work, AISI 316LN stainless steels samples were gas nitrided at three different timing parameters 8 hrs, 40 hrs and 72hrs under a pressure of 500Pa, in order to verify the influence of temperature on the morphology, wear of the modified surface layers. The gas nitrided samples were analyzed by means of various metallographic tests like Optical microscope, X-Ray diffraction. Wear tests were conducted on a pin on disc machine. For the samples which was nitrided, chromium nitrides were formed on the surface of the layers.

Keywords:
Wear behavior, wear resistance, gas nitriding, metallography.


References:

1.        A.Cohen, A.Rosen (1996), ‘The influence of the nitriding process on dry wear resistance of stainless steel’, Wear, Vol.108, pp.157-163.
2.        A.D.Sarkar (1980), ‘Friction and wear test’, Ist edition, London Academic press.

3.        A.Fossati, F.Borgioli, E.Galvanetto, T.Bacci (2006), ‘Glow discharge nitriding of AISI 316L austenitic stainless steel with influence of treatment time’, Surface Coatings and Technology, Vol.200, pp.3511-3517.

4.        A.Gajek, Z.Wolarek, T.Zakroczymski (2012), ‘Behaviour of hydrogen in gas nitrided iron studied by electrochemical permeatin and desorption techniques’, Corrosion Science, Vol.58, pp.260-266.

5.        A.Krella, A.Czyzniewski (2009), ‘Cavitation resistance of Cr-N coatings deposited on austenitic stainless steel at various temperatures’, Wear, Vol.266, pp.800-809.

6.        A.Ramchandani, J.K.Dennis (1988), ‘Nitriding of austenitic stainless steel’, Heat treatment of metals, Vol.2, pp.34-38.

7.        A.Recco, C.Diona, Lopez, A.Bevilacqua, Felipa De Silva, A.P.Tschiptschin (2007), ‘Improvement of the slurry erosion resistance of an austenitic stainless steel with combinations of surface treatments’, Surface and Coatings Technology, Vol.202, pp.993-997.

8.        A.Reinhard (2003), ‘Technology of the metal trade’, Wiley Eastern Ltd, New Delhi.

9.        ASM Metals Handbook, 2004, Vol.9, ‘Metallography and Microstructures’.

10.     ASM Metals Handbook, 1992, Vol.18, ‘Friction, Lubrication and Wear Technology’.

 

7-9

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

Volume-2 Issue-4

 Download Abstract Book

S. No

Volume-2 Issue-4, March 2014, ISSN: 2319-9598 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

Abhijit D. Jadhav, Ashvini A. Phalke, Pradnya A. Waman, Usha N. Katore, Santosh R. Salunkhe

Paper Title:

Enterprise Level E-mail Security System

Abstract: Data leakage is a process in which a data distributor has given important data to a supposedly trusted agents and some of the data is leaked and found in an unauthorized place or unauthorized user. An enterprise data leak is a scary statement. Security practitioners have always had to deal with data leakage issues that spring up from various ways like email, IM and other Internet channels. One or more agents can leak the data. Moreover, data can also be leaked from within an organization via e-mails. So, there is need to filter these e-mails. The mail can be filtered by blocking e-mails which contains images, videos or sensitive data of an enterprise. The e-mail is one of the sources of data leakage. Principle used in e-mail security is we classify e-mail, sensitive data into the white and black lists with document’s digital signature value. The data can also be changed by the trusted agents. The system will detect such a changes of the sensitive data and if founds same as black list it will block the mail or stop for review. Then the distributor will decide to allow or disallow the incoming mails from the agent’s. The system will prevent the enterprise data from data leakage. E-mail security system will make the data more secure.

Keywords:
Black List, SHA, TF, White List.


References:

1.        Hector Garcia-Molina and Panagiotis Papadimitriou “Data Leakage Detection,” IEEE Transactions on Knowledge and Data Engineering, Vol 23, No.1 january2011.
2.        Mayur Gaikwad, Ankit Agarwal, Vahid Inamdar, Kapil Garg, ” Robust Data leakage and Email Filtering System” 2012 IEEE.

3.        Behrouz A. Forouzan, “Cryptography & Network Security”,

4.        www.vanemery.com/protocols

5.        http:/ / www.parashift.com/ c+ +-faq-lite/ serialization. html

1-2

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.

Authors:

Manish Bhaskar, Abhinav Saha

Paper Title:

Computational Analysis of Free Convection in Different Cavities with Different Aspect Ratios

Abstract: Cavity and Enclosures are finding increasing applications in the aerospace, marine, transportation, and electrical, chemical, construction and consumer goods industries. In some of these applications the composites are subjected to Thermal loads. This paper deals with the computational analysis of natural convection flow in a square, Cubical, Rectangular, Triangular and trapezoidal cavity, using FEV tool ANSYS FLUENT. Where the bottom wall and vertical walls are heated linearly, and the top wall is been insulated with the maximum temperature TH and the minimum temperature with Tc. The present numerical investigation deals with steady natural convection flow in a closed square cavity when the bottom wall is sinusoidal heated and vertical walls are linearly heated, whereas the top wall is well insulated. In the nonuniformly heated bottom wall maximum temperature TH attains at the center of the bottom wall. The sidewalls are linearly heated, maintained at minimum temperature Tc at top edges of the sidewalls and at temperature Th at the bottom edges of the sidewalls. During convection incompressible fluid is taken and passed over cavities driven by temperature difference across the wall was investigated with different aspect ratio. The temperature distribution and flow pattern across the cavities were visualized. The FEV results are validated with well published results in literature and furthermore with experimentation. Results are first presented in the form of streamlines, isotherm contours, local Nusselt number, and the average Nusselt number as a function of temperature difference aspect ratio. 

Keywords:
Natural Convection, Cavity, Nusselt Number.


References:

1.        D. M. Kim and R. Viskanta, “Heat transfer by conduction, natural convection and radiation across a rectangular cellular structure,” International Journal of Heat and Fluid Flow, vol. 5, No. 4, pp. 205-213, 1984.
2.        S. Ostrach, “Natural Convection in Enclosures,” Advances in Heat Transfer, vol. 7, Academic Press, New York, 1972, pp. 161–227.

3.        G. De Vahl Davis, “ Natural convection of air in a square cavity: A bench mark numerical solution,” International Journal for Numerical Methods in Fluids, vol. 3, issue 3, pp. 249–264, 1983.

4.        P. Le Queré, T. Alziary de Roquefort “ Computation of natural convection in two dimensional cavities with chebyshev polynomials,” Journal of Computational Physics, vol. 57, Issue 2, pp. 210–228, 1985.

5.        M. M. Ganzarolli, and L. F. Milanez, “Natural convection in rectangular enclosures heated from below and symmetrically cooled from the sides,” International Journal of Heat and Mass Transfer, vol. 32, pp. 1063-1073, 1995.

6.        H. Salmun, “Convection patterns in a triangular domain,” International Journal of Heat and Mass Transfer, vol. 38, pp. 351–362, 1995.

7.        M. Boussaid, A. Mezenner, M.  Bouhadef, “Natural convection heat and mass transfer in a trapezoidal cavity (Convection naturelle de chaleur et de masse dans une cavité trapézoïdale),” Int J Therm Sci., vol. 38, pp. 363–371, 1999.

8.        A. Raji, M. Hasnaoui, “Mixed convection heat transfer in a rectangular cavity ventilated and heated from the side,” Numerical Heat Transfer, vol. 33, pp. 533–548, 1998.

9.        G. Desrayaud, A. Fichera, “Laminar natural convection in a vertical isothermal channel with symmetric surface mounted rectangular ribs,” International Journal of Heat and Fluid Flow, vol. 23, issue 4, pp. 519–529, 2002.

10.     M. Sathiyamoorthy, T. Basak, S. Roy and N. C. Mahanti, “Effect of the temperature difference aspect ratio on natural convection in a square cavity for nonuniform thermal boundary conditions”, Journal of Heat Transfer, , vol. 129, pp. 1723-1728, 2007.

11.     I. Tmartnhad, M. El Alami, M. Najam, A. Oubarra, “ Numerical investigation on mixed convection flow in a trapezoidal cavity heated from below”, Energy Conversion and Management, vol. 49,  issue 11, pp. 3205-3210, 2008.

12.     Xu Xu, Gonggang Sun, Yu, Zitao Hu, Yacai Liwu Fan, Kefa Cen , “Numerical investigation of laminar natural convective heat transfer from a horizontal triangular cylinder to its concentric cylindrical enclosure” , International Journal of Heat and Mass Transfer, Volume 52, Issues 13–14, June 2009, Pages 3176-3186

13.     S.C. Saha, “Scaling of free convection heat transfer in a triangular cavity for Pr > 1”, Energy and Buildings, vol. 43, issue 10, pp. 2908-2917, 2011.

14.     A.J. Chamkha, M.A. Ismael, “Conjugate heat transfer in a porous cavity filled with nanofluids and heated by a triangular thick wall”, International Journal of Thermal Sciences, vol. 67,  pp. 135-151, 2013.

15.     S. Bhardwaj, A. Dalal, “Analysis of natural convection heat transfer and entropy generation inside porous right-angled triangular enclosure”, International Journal of Heat and Mass Transfer, vol. 65, pp. 500-513, 2013.

3-8

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

N. Mohan Teja, R. S. Ravi Sankar, P. Harsha, V. Uma Shankar

Paper Title:

A Novel Method of Diode Clamped Multi-Level Inverter using PWM Technique

Abstract: This Paper presents a novel method of Diode clamped Multi Level Inverter, which works without series association the clamping diodes. The conventional diode clamping inverter suffers from such problems as dc link unbalance, indirect clamping of the inner devices, turn-on snubbing of the inner dc rails as well as series association of the clamping diodes etc. It is due largely to these problems that the application of the conventional diode clamping inverter in practice has been deterred, in spite of the growing discussion in the literature. An auxiliary resistive clamping network solving the indirect clamping problem of the inner devices is also discussed for both the new and conventional diode clamping inverter. Operation principle, clamping mechanism, auxiliary clamping as well as experimentation are presented.

Keywords:
Clamping Diodes, DC Link Unbalance, Multi Level Inverter, Pulse Width Modulation.


References:

1.        Jih-Sheng Lai, Fang Zheng Peng, “Multilevel converters- A New Breed Of Power Converters,” IEEE Transactions on Industry Applications,VOL. 32, NO. 3, MAY, JUNE 1996.
2.        Soern Baekhoej Kjaer member of IEEE, John k.Pedersen senior member of IEEE,And Frede Blaabjerg fellow of IEEE “A Review Of Single-Phase Grid-Connected Inverters For Photovoltaic Modules,”    IEEE Transactions on Industry Applications, VOL.41, NO. 5, PP1292-1306. SEP./OCT. 2005.

3.        M.Malinowski,k.Gopakumar,J.Rodriguez and M.A.Perez,“A Survey On Cascaded Multilevel Inverters,” IEEE TRANS. IND. ELECTRON., VOL. 57, NO.7, PP. 2197–2206, JUL. 2010.

4.        A.M.Massoud, S.J.Finney and B.W.Williams,“Control techniques For Multilevel Voltage Source Inverters,” IN PROC. IEEE. CONF., MAR. 2003, VOL. 4, PP. 171–176.

5.        C.Boonmee,Y.Kumsuwan,“A Phase- Shifted Carrier- Based PWM Technique For Cascaded H-Bridge Inverters Application In Standalone PV System,” IN PROC. IEEE. CONF.,SEP. 2012, VOL. 4, PP.                     

6.        F.Z.PENG and J.S.Lai,“A Static VAR Generator Using A Staircase Waveform Multilevel Voltage – Source Converter,” IN PROC. PCIM/POWER QUALITY, 1994, PP. 58-66. “Power Converter Options For Power System Compatible Mass Transit Systems, ”1994, PP. 285-294.

9-12

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

4.

Authors:

Alphy John, I. Bildass Santhosam

Paper Title:

Home Energy Management System Based On Zigbee

Abstract: To inculcate the Home Energy Management System (HEMS) based on ZigBee communication using remote controller and sensor. This technique brings out the more efficient home energy management system to reduce power consumption in home area. We consider the room easily controllable with an IR remote control of a home appliance. The room has power outlets, a light, sensor and a ZigBee hub. The ZigBee hub has an IR code learning function and educates the IR remote control signal of a home appliance connected to the power outlet. Then it can control the power outlets and the light in the room. The PIR sensor which detects the presence of the human and then it allows the power on the light.. A LCD is used in the hardware module for the user interface. The LCD displays the power consumed and the value of PIR sensor. The ZigBee hubs in each room communicate with the home server and report the power consumption information to the home server. The proposed architecture gives more efficient energy­ saving HEMS.

Keywords:
ZigBee, Remote control, IR, Energy–saving, Power Outlet, Standby Power, sensor.


References:

1.        Masahiro Inoue, Toshiyasu Higuma, oshiak Ito, Noriyuki Kushiro, and Hitoshi Kubota,   “Network Architecture for Home Energy Management System,” IEEE Trans on Consumer Electronics, Vol. 49, No. 3, pp. 606­613, Aug. 2003.
2.        Young­ Sung Son and Kyeong ­ Deok Moon, “Home Energy Management System Based on Power Line Communication,” Proceedings of the 28thInternational Conference on Consumer Electronics (ICCE), 2010.

3.        Kwang­ Soon Choi, Yang ­ Keun Ahn, Young­ Choong Park, Woo­ ChoolPark, Hae ­ Moon Seo, and Kwang ­Mo Jung, “Architectural Design of Home Energy Saving System Based on Real time Energy ­Awareness”. Proceedings of the 4th International Conference on Ubiquitous Information Technologies & Applications (ICUT), 2009.

4.        Chia­ Hung Len, Ying­ Wen  Bai, Hsien ­Chung Chen, and Chi­ Huang Hung, “Home Appliance Energy Monitoring and Controlling Based on Power Line Communication,” Proceedings of the 27th International Conference on Consumer Electronics (ICCE), 2009.

5.        Jinsoo Han, Haeryong Lee, and Kwang ­ Roh Park, “Remote­ Controllable and Energy­ Saving Room Architecture Based on ZigBee Communication,” IEEE Trans. on Consumer Electronics, Vol. 55, No. 1,pp. 265­268, Feb. 2009.

13-15

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

5.

Authors:

Tanushree Bhattacharya

Paper Title:

Sustained Growth of Green Energy Economics

Abstract: Energy is one of the critical inputs for economic development of any Country. In order to overcome the present energy scenario problems, energy should be conserved and since we are consuming disproportionate amount of energy that day is not far when all our Non-Renewable resources will expire forcing us to rely just on Renewable Sources. These non renewable sources of energy will not last forever and are proven contributors to environmental degradation. This has led to governments and industries around the globe thinking seriously about alternative energy sources. This along with declining availability of the fossil fuels have led to the development of renewable energy resources such as Biomass, Bio fuels, Wind, Solar, Geothermal, and Hydro energy etc. Current global trends in energy supply and consumption are not sustainable – environmentally, economically, socially but this situation can be changed if we can secure the supply of reliable and affordable energy and effect a rapid transformation to a low-carbon, efficient and environmentally benign system of energy supply. Since exhaustible energy sources are limited, there is an urgent need to focus attention on development of renewable energy sources and use of energy efficient technologies. It is estimated that renewable energy could contribute to at least half of all electric power in each of the large economies by 2050. This Paper emphasis on the various types of modern energy generation techniques and cost analysis as well as economics from Biomass. Biomass is biological material derived from living, or recently living organisms, such as wood, waste, hydrogen gas, and alcohol fuels. Correctly managed, biomass is a sustainable fuel that can deliver a significant reduction in net carbon emissions when compared with fossil fuels.

Keywords:
Biomass, Energy Conservation, Renewable Energy, Energy Economics.


References:

1.        Ministry of Non Conventional Energy Sources, Annual Report for the FY 2002 -2003.
2.        Indian Renewable Energy Development Agency Limited Annual Report for the FY 2002 – 2003.

3.        Ravindranath N.H., Hall. D. O.,”Biomass Energy & Environment: A developing country prospective from  India”, Oxford University press, 1995.

4.        Dassappa, S. Sridhar, H.V. Sridhar, G. Paul, P.J., Mukundha H.S.,”Biomass gasification – A substitute t fossil fuel for heat application”, Biomass Energy 2003.

5.        Renewable Energy Sources for rural areas  in Asia and Pacific , APO, Tokyo, 2000

6.        Somasekar, H. I. Dassappa, Ranindranath N.H.,”Rural Bio Energy Centre based on Biomass Gasifier for Decentralized Power Generation: Case Study of Two Villages in South India”.

7.        Alternate Energy Sources by T H Taylor .Adam Hilger ltd , Bristol Bureau of Energy Efficiency

8.        G.D Rai , “Non Conventional Energy Sources”

9.        Wellinger, A and A. Lindeberg , 1999. Biogas upgrading and utilization. Task 24,  Energy grom biological conversion of organic wastes, pp:1-19

10.     Vijay, V.K 1989, Studies on utilization of biogas for improved performance of dual fuel engine.

11.     Kapdi, S.S. V.K Vijay, S.k Rajesh and R.R Gaur , 2003 . Feasibility study on purification and compression of biogas for rural areas. Proceeding of International Conference on Energy and Rural Development,  MNIT, jaipur.

12.     Haripriye G ,2000 . Estimation of biomass in Indian forests. Biomass and Bioenergy , 19:245-258

13.     D’Apotel SL ,1998 . IEA biomass energy analysis and projections. In : Proceedings of biomass energy Conference Data, analysis and trends , Paris : OECD

14.     Intergovernmental  panel on climate change (IPCC), Renewable Energy Sources and Climate Change

15.     International Energy Agency, Energy outlook, 2009

16.     Biomass Energy center, Biomass energy center.org.uk. Retrieved on 2012 -02-28

17.     Martin  , Marshall A,” First  Generation biofuel compete”. Pp  596-608

16-18

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

6.

Authors:

Cezarina Adina Tofan

Paper Title:

Implementation of Quality Management in the Assessment of Higher Education – Case Study in a Private University in Romania

Abstract: At the beginning of the millennium, the higher education passes through a process of adaptation to the current needs of society, a process marked by globalization and unprecedented development of the information technologies. Given by increasing the number of the students and the offer of specializations, the competitive inter-university system development and intensification of the international academic cooperation, it appears logical to implement a type of educational management to increase the services offer, their effectiveness in promoting the performance in the competitive conditions. In this context, the quality is undoubtedly one of the most important requirements of any result of actions taken, and any activity for detecting the problems, to assess the influence and find solutions to solve them is, for any organization, the key of the progress. The QUALITY term and the international symbol Q can be used in many different circumstances. Thus, it can be spoken by the quality of products, services, life, education, learning, vocational training, etc.

Keywords:
Decision, information, information system, quality management.


References:

1.        TOFAN C. A., Improving quality and reliability of technological systems by cold pressing aided design and computer simulation, “Alma Mater” House Publishing, ISBN 978-973-632-728-5, Sibiu, 2011
2.        TOFAN C.A., Management Information Systems for Computer Aided Design, International Journal of Academic Research in Accounting, Finance and Management Sciences, Vol 1, Issue 1 of IJ-ARAFMS, ISSN: 2225-8329, Pakistan, 2012
3.        TOFAN C. A., Training and assessment of students computerized, Economic Tribune, no. 1-2, ISSN 1018-0451, Bucharest, 2003

19-23

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

7.

Authors:

Chaithanya T, Bachu Anusha, Manikandan S

Paper Title:

Theoretical and Computational Analysis on Blunt Shaped Reentry Capsule

Abstract: For high aerodynamic drag and safe returning of capsule on the earth, to protect astronaut from radiation, the blunt shape reentry capsule is required. The flow fields over the blunt shaped reentry capsule are numerically obtained by the steady state, axisymmetric, compressible Navier–Stokes k-Ԑ turbulence model for free stream mach numbers are in the range of 2 and 4. Employing a finite volume approach which reduces the governing equations to semi-discretized ordinary differential equations. The numerical simulation is carried out on a structural grid. The flow field features around reentry capsule, such as bow shock, sonic line, expansion are obtained. A good agreement is found between the computationally calculated value of aerodynamic drag co-efficient blunt shape reentry capsule with the theoretical value. The effects of geometrical parameters, blunt shapes have been numerically investigated for various reentry configurations which will be useful for forming the strong shock wave in supersonic flow, as a result there is a increases in aerodynamic drag during landing of the vehicle.

Keywords:
Blunt, reentry capsule, supersonic flows, drag.


References:

1.        Lee, D.B., Bertin, J.J. and Goodrich, W.D., “Heat Transfer Rate and Pressure Measurements Obtained During Apollo Orbital Entries”, NASA TN D-6028, October 1970.
2.        Lee, D.B., “Apollo Experience Report: Aerothermodynamics Evaluation”, NASA TN D-6843, June 1972.

3.        Hillje, E., “Entry Flight Aerodynamics from Apollo Mission AS-202”, NASA TN D-4185, October 1967.

4.        Wright, M.J., Prabhu, D.K. and Martinez, E.R., “Analysis of Afterbody Heating Rates on the Apollo Command Modules, Part 1”, Journal of Thermophysics and Heat Transfer, Vol. 20, No. 1, pp. 16-30, 2006.

5.        Walpot, L., “Development and Application of a Hypersonic Flow Solver”, Ph.D. Thesis, T.U. Delft University, May 2002.

6.        Gerhold, T.O., Friedrich, J.E. and Galle, M., “Calculation of Complex Three-Dimensional Configurations Employing the DLR-TAU-Code”, 16th Aerospace Sciences Meeting, Reno, NV, USA, AIAA Paper 97-0167, January 1997

7.        Walpot, L.M.G., Noeding, P., Tarfeld, F., Molina, R.C., Gülhan, A. and Paulat, J.-C., “Transonic and Supersonic Static Stability Analysis of the CARV Reentry Vehicle”, 14th AIAA/AHI Space Planes and Hypersonic Systems and Technologies Conference, AIAA Paper 2006-8077, 2006.

8.        Lee, D.B., Bertin, J.J. and Goodrich, W.D., “Heat Transfer Rate and Pressure Measurements Obtained During Apollo Orbital Entries”, NASA TN D-6028, October 1970.

24-27

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

8.

Authors:

Hemanta Kumar Nayak, Debaraj Rana

Paper Title:

Eye Localization using PCA Based Genetic Search

Abstract: In this paper, we propose a novel approach for eye localization from human face image using GA based on PCA. As the genetic algorithm is computationally intensive, the searching space is reduced and limited to the eye regions so that the required timing is greatly reduced. Here GA is used to search for the possible eye region in an image efficiently. Specifically, we use GAs to find image sub-windows that contain the eye region. Each sub-window is evaluated using a fitness function and sub-windows containing eyes eye region is extracted. This is one of the major applications in case of retina recognition used in security purpose. The idea from the method of eigen-eye, and used to determine the fitness values.

Keywords:
YCbCr, Skin Region extraction, PCA, Eigen Eyes, Genetic Algorithm.


References:

1.        G Bebis, S Uthiram and M Georgiopoulos, “Genetic Search for Face Detection and  Verification”, Proceedings, International Conference on Information Intelligence and Systems  , pages 360 – 367,1999.
2.        M. Turk, A. Pentland, “Eigen faces for face recognition”,Journal Cognitive Neuroscience, Vol. 3, No.1, 1991.

3.        D. Swets, B. Punch and J. Weng, “Genetic Algorithms for Object Localization in a Complex Scene”, International Conference on Image Processing, vol. II, pp. 595-598, 1995.

4.        H. Rowley, S. Baluja and T. Kanade, “Neural Network- Based Face Detection”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 20, No. 1, pp. 23-38, 1998.

5.        V. Vezhnevets, V. Sazonov, A. Andreeva, “A Survey on Pixel-Based Skin Color Detection Techniques”, In Proceedings Graphicon-2003, pp.85-92, Moscow, Russia, September 2003.

6.        K Sastry, D Goldberg, “Genetic Algorithms”, Search Methodologies, 2005 – Springer.

7.        R. Crane, A simplified approach to Image Processing, Prentice Hall, 1997.

8.        D Goldberg, “Genetic Algorithms in Search, Optimization and Machine Learning”. Addison- Wesley, Reading, MA, 1989.

9.        MP Panigrahy and N Kumar  ,“Face Recognition using Genetic Algorithm and Neural Networks”,  International Journal of Computer Applications Volume 55– No.4, pages 0975 – 8887,October 2012.

10.     BK Gunturk, AU Batur and  Y.Altunbasak, “Eigenface domain super-resolution for face recognition”, Image Processing, IEEE Transactions, Volume.12 ,  Issue.5 ,pages 597 – 606,May 2003.

11.     MA Kashem, MN Akhter, S Ahmed, and MM Alam, “Face Recognition System Based on Principal Component Analysis(PCA) with Back Propagation Neural Networks (BPNN)” , Canadian Journal on Image Processing and Computer Vision Vol. 2, No. 4,pp. 36-45, April 2011.

12.     L. Bai, L. Shen, and Y. Wang. , “A novel eye location algorithm based on radial symmetry transform”, in Proceedings of the International Conference on Pattern Recognition , pages 511–514, 2006.

13.     R. Valenti and T. Gevers. Accurate eye center location and tracking using isophote curvature. In Proceeding of IEEE Conference on Computer Vision and Pattern Recognition ,pages 1-8, 2008.

14.     AL. Yuille, PW Hallinan, and DS Cohen, “Feature extraction from faces using deformable templates”. International Journal of Computer Vision, vol.8,issue 2, pages 99–111, 1992.

15.     M. Turk and A. Pentland, “Eigenfaces for Recognition”, Journal of Cognitive Neuroscience, Vol. 3, pp. 71-86,1991 . hard copy.

16.     S. P. Lee, “Facial Animation System with Realistic Eye Movement Based on a Cognitive Model for Virtual Agents”, PhD thesis, Computer and Information Science, University of Pennsylvania, 2002.

17.     KW Wong, KM Lam and WC Siu, “An efficient algorithm for human face detection and facial feature extraction under different conditions”, Pattern Recognition 34, pages 1993-2004, 2001.

18.     F Yang, J Huang, P Yang and D Metaxas, “Eye Localization through Multiscale Sparse Dictionaries”, IEEE International  Conference on Automatic Face and Gesture Recognition and Workshops, Pages 514-518,2011.

19.     D. Rana and  N. P. Rath, “Face Identification using Soft Computing Tool “, IEEE International Conference, Conferenceon Advanced Communication Control and Computing Technologies (ICACCCT-2012), Tamilnadu, INDIA, Aug 23-25. Conference Proceeding Page(s): 232-236, 2012.

20.     http://fei.edu.br/~cet/facedatabase.html

28-32

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

9.

Authors:

Dayalan J, Beulah M

Paper Title:

Effect of Waste Materials in Partial Replacement of Cement Fine Aggregate and Course Aggregate in Concrete

Abstract: A brief study on the suitability of silica fumes, powdered ceramic tiles and crushed animal bones as partial replacement for cement, fine aggregate and coarse aggregate respectively in concrete work has been carried out. Experimental study has been conducted for approximately 10 % of the silica fumes in replacement for cement, 20 % of the powdered ceramic waste powder in replacement for fine aggregate and 50 % of the crushed animal bones in replacement for coarse aggregate separately and in a single sample. Compressive strength, flexural strength and split tensile strength has been conducted for each sample. Results were quite satisfactory with no compromise in strength requirements for M20 grade concrete. Hence comparative study has been done between normal concrete and new concrete mix.

Keywords:
Silica Fumes – Powdered Ceramic Tiles – Crushed Bones – Compressive Strength – Flexural Strength – Split Tensile.


References:

1.        Mukesh B.Patel, Charkha.D.. “Effect of silica fume and partial replacement of ingredients on flexural and split tensile strength of concrete”, International journal of emerging trends in engineering and development, Issue 2, Vol.4 (May2012)
2.        Ramkumar.V.R,, Murali. G, Jayaganesh.V, “Flexural behaviour of concrete by using silica fumes as partial replacement of cement”, International journal of emerging trends in engineering and development, Issue 2, Vol.4 (May2012), p.p 590-593

3.        Dilip Kumar Singha Roy, Amitava Sil,,”Effect of Partial Replacement of Cement by Silica Fume on Hardened Concrete”  International Journal of Emerging Technolgy and Advanced Technology,Issue 8, Vol.2 (Aug 2012) p.p.472-475

4.        Zeena Adel Mohammed, “Effect of partial replacement of fine aggregate on some engineering properties of concrete” by

5.        Javed Ahmad Bhat, Reyaz Ahmad Qasab and A. R. Dar in “Machine crushed animal bones as partial replacement of coarse aggregates in lightweight concrete”, ARPN Journal of Engineering and Applied Sciences,(sep 2012), Vol.7.p.p.1202-1207

6.        Indian Standards. 1970. IS: 383, Specification for Coarse and fine aggregates from Natural sources for concrete.Bureau of Indian standards, New Delhi, India.

7.        Thomas, M D. A. Using Silica Fume to Combat ASR in Concrete, Indian Concrete Journal, (Oct. 2001), pp 656-664 [6] Lewis, R. C. , Hasbi, S. A. : Use of Silica Fume concrete :Selective case studies, Indian Concrete Journal, (Oct. 2001), pp. 645-652.

8.        Roncero, J., Gettu, R., Agullo, L. Vazquez, E. : Flow behaviour of superplasticised cement pastes : Influence of Silica Fume, Indian Concrete Journal, (Jan. 2002), pp. 31-35.

9.        Polat R., Demirbo_A.R., Karakoç M.B. and Türkmen I.(2010) The influence of lightweight aggregate on the physico-mechanical properties of concrete exposed to freeze–thaw cycles. Cold Reg. Sci. Tech. 60: 51-56.

10.     Robert L., Lindon S., Peter W. and Ray R. 2003.Cementitious additions. In: John N, Ban SC (Eds.).Advanced Concrete Technology. Elsevier publications,Amsterdam.

11.     Rossignolo J.A., Agnesini M.V.C. and Morais J.A. 2003. Properties of high performance LWAC for precast structures with Brazilian lightweight aggregates. Cement Con. Compo. 25: 77-82.

12.     Teo D.C.L., Mannan M.A. and Kurian V.J. 2006.Structural Concrete Using Oil Palm Shell (OPS) as Lightweight Aggregate. Turk. J. Eng. Env. Sci. 30: 251

33-36

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

10.

Authors:

Sandeep Rankawat, J. S. Purohit, D. R. Godara, S. K. Modi

Paper Title:

Scattering Measurement Due to Trunk and Foliage Canopy of Desert Region at 35 GHz

Abstract: At the time of propagation of millimeter wave, Scattering phenomenon due to foliage plays an important role as the wavelength approaches to the order of the size of the leaves and edges of leaves. It is important to estimate the propagation attenuation due to scattering when the arid zone foliage leaves and twigs size affect adversely   in experimental propagation range. In this paper a 35 GHz transmitter receiver link system is used to measure the attenuation scattering pattern of tree foliage of Ber tree (Zizyphus mauritiana) of western Rajasthan region. Measurements were made to study the angular variations of the positioning of receiver unit around the target tree with trunk and canopy positions. The measurements, which were made for HH polarization configurations over a wide range of the azimuth angle, provide a quantitative reference for the design of millimeter-wave bistatic radar,  high speed data communication links,  point to point communication  systems.

Keywords:
35 GHz, Scattering, Foliage, Trunk, Tropical tree, Western Rajasthan, Millimeter wave, Thar Desert.


References:

1.        Sandeep Rankawat, Dr.J.S.Purohit, D.R.Godara, S.K.Modi. ”Scattering Measurement Due To Foliage of Western Rajasthan Region at 35 Ghz” IJSCE ISSN: 2231-2307, Volume-4, Issue-1, March 2014.
2.        D.R.Godara,Dr.J.S.Purohit,SandeepRankawat,S.K.Modi “Effect of Foliage Length on Signal Attenuation in Millimeter Band at 35Ghz Frequency” IJCA  ISSN: 0975-8887, Volume-84, DEC2013.

3.        D.R.Godara,Dr.J.S.Purohit,SandeepRankawat,S.K.Modi “Propagation Attenuation Due to Foliage at 35Ghz” IJECT  ISSN: 2230-9543, Volume-4, Issue-4, OCT-DEC2013.

4.        D.R.Godara, S.K.Modi, Rupesh Kumar Rawat “Experimental studies on millimeter wave scattering from ground and vegetation at 35 GHz” IJSCE  ISSN: 2231-2307, Volume-1, Issue-6, January2012.

5.        Akira Ishimaru, “Wave Propagation and Scattering in Random Media and Rough Surfaces”, Proceedings of the IEEE, Vol 79, No. 10, October 1991

6.        Hao Xu, Theodore, S. Rappaport,  Robert J. Boyle, James H. Schaffner, “Measurements and Models for 38-GHz Point-to-Multipoint Radiowave Propagation”,IEEE journal on selected areas in communications, Vol. 18, No. 3, March 2000.

7.        N. C. Rogers, A. Seville, J. Richter, D. Ndzi, N. Savage,R. Caldeirinha, A. Shukla, M. O. AlNuaimi, K. H. Craig, E. Vi-lar, and J. Austin, “A generic model of 1-60 GHz radio propa-gation through vegetation” , Tech. Report, Radiocommunications Agency, May 2002.

8.        Wang, F. and K. Sarabandi, “An enhanced millimeter-wave foliage propagation model”, IEEE Trans. Antennas Propag., Vol. 53, No. 7, 2138-2145, 2005.

9.        M. Majeed, S. Tjuata,  “An Improved Propagation Model for Wireless Communications.”, (1996). IEEE International Conference on Communications, Converging Technologies for Tomorrow’s Applications, Vol. 1, pp. 292-296, ICC 96.

10.     A. Seville, “Vegetation Attenuation: Modeling and Measurements at Millimetric Frequencies.” 10th International Conference on Antennas and Propagation (Conf. Publ. No. 436), Vol. 2, p. 14-17. (1997).

11.     L.L. Foldy,”The multiple scattering of waves”, Phys. Rev., vol. 67,pp 107-119,1945.

12.     T. Chiu, K. Sarabandi, “ Electronics Scattering from Short branching vegetation”, IEEE Trans. Geo. Remote Sensing, vol. 38, no.2, pp. 911-925, 2000.

37-39

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

11.

Authors:

Vamsi Krishna Pelluru

Paper Title:

Scattering Measurement Due to Trunk and Foliage Canopy of Desert Region at 35 GHz

Abstract: In Traditional Enterprise-class storage technology, many organizations now have a variety of storage needs with varying performance and price requirements. Open stack has support for both Object and Block storages with many deploying options based on the organizations needs.

Keywords:
Open Stack, SAN, Storage, Havana.


References:

1.        http://docs.openstack.org/havana/install-guide/install/apt/content/
2.        http://docs.openstack.org/havana/install-guide/install/apt/content/ch_keystone.html

40-42

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

12.

Authors:

Lakshmikishore Nittala, Preet Kanwar Singh Rekhi, Sukhvinder Singh Malik, Rahul Sharma

Paper Title:

LTE Schedulers – A Definitive Approach

Abstract: Scheduler is the backbone of intelligence in a LTE network. Scheduler will often have clashing needs that can make its design very complex and non-trivial. The overall system throughput needs to be maintained at the best possible value without sacrificing the cell edge user experience. In this paper, authors compared different scheduler designs for voice and packet services. They explained the role of configuration parameters through simulations. These parameters control the tradeoff between the sector throughput and the fairness in system through. They explained a possible scheduler implementation.

Keywords:
LTE, Scheduler, Quality of service, GBR, Non GBR, Proportional fair.


References:

1.        LTE – The UMTS Long Term Evolution from Theory To Practice 2nd Edition by  Stefania Sesia , Issam Toufik, Matthew Baker
2.        Essentials of LTE and LTE-A (The Cambridge Wireless Essentials Series) by  Amitabha Ghosh and Rapeepat Ratasuk

3.        3G Evolution: HSPA and LTE for  Mobile Broadband by Erik Dahlman, Stefan Parkvall, Johan Sköld and Per Beming

4.        3GPP TS 36.211 “Evolved Universal Terrestrial Radio Access (E-UTRA); Physical channels and modulation”.

5.        3GPP TS 36.213 “Evolved Universal Terrestrial Radio Access (E-UTRA) Physical layer procedures”.

6.        3GPP TS 36.321  “Evolved Universal Terrestrial Radio Access (E-UTRA); Medium Access Control (MAC) protocol specification”

7.        3GPP TS 36.331: “Evolved Universal Terrestrial Radio Access (E-UTRAN); Radio Resource Control (RRC) Protocol Specification”.

43-47

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

Volume-2 Issue-5

 Download Abstract Book

S. No

Volume-2 Issue-5, April 2014, ISSN: 2319-9598 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

Vamsi Krishna Pelluru

Paper Title:

Application Detection System

Abstract: Across the Globe companies are finding ways to maximize their productivity with infrastructure and Resources, Application Detection system helps companies achieve it, it also helps administrators in identifying which are the applications that are more commonly used across the corporate, those applications can be blocked to use from the networks, Most of the employees spent considerable time in office on Browsing Social Networking sites eg; Face Book, Orkut, LinkedIn etc, Application Detection system helps administrators in identifying the Source machines from which these requests arise, it generates the logs with the source machine IP, Application name , its pattern etc, based on the pattern the corresponding signature will be triggered and it will either block or allow the application based  on the configuration provided to it.

Keywords:
Application detection System, Signatures.


References:

1.        http://www.pcworld.com/article/249137/what_is_deep_packet_inspection_.html
2.        http://www.deeppacketinspection.ca/

1-3

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.

Authors:

Vivek Hanumante, Rubi Debnath, Disha Bhattacharjee, Deepti Tripathi, Sahadev Roy

Paper Title:

English Text to Multilingual Speech Translator Using Android

Abstract: This paper aims at providing design and development solution of an Android application whose objective is to provide a solution to overcome the barrier of languages by implementing text to speech conversion in different languages. The Android application developed text to speech conversion to facilitate the translation of English language text into speech output in different languages. We have also proposed few improvements which can further advance this system to include more target audiences so as to make it more beneficial and useful. The proposed English Text to Multilingual Speech Translator using Android (T2MSTA) aims at providing assistance to the people lacking the power of speech or non-native speakers like people who do not share a common language.

Keywords:
Android, T2MSTA, Text to Speech conversion, Intent, MATLAB.


References:

1.        El-Imam, Y.A.; Banat, K., “Text-to-speech conversion on a personal computer,” Micro, IEEE , vol.10, no.4, pp.62,74, Aug. 1990
2.        O’Malley, M.H., “Text-to-speech conversion technology,” Computer, vol.23, no.8, pp.17-23, Aug. 1990.

3.        Santos, J.; Nombela, J., “Text-to-speech conversion in Spanish a complete rule-based synthesis system,” Acoustics, Speech, and Signal Processing, IEEE International Conference on ICASSP ’82. , vol.7, no., pp.1593-1596, May 1982.

4.        Sadeque, F.Y.; Yasar, S.; Islam, M.M., “Bangla text to speech conversion: A syllabic unit selection approach,” International Conference on Informatics, Electronics & Vision (ICIEV), 2013, pp.1-6, 17-18 May 2013.

5.        Bothe, K.; Joachim, S., “Interactive tool-based production of multilingual teaching and learning materials,” Fifth IEEE International Conference on Advanced Learning Technologies, ICALT, pp.516,518, 5-8 July 2005.

6.        Nowak, G.; Grabowski, S.; Draus, C.; Zarebski, D.; Bieniecki, W., “Designing a computer-assisted translation system for multi-lingual catalogue and advertising brochure translations,” Proceedings of VIth International Conference on Perspective Technologies and Methods in MEMS Design (MEMSTECH), pp.175,180, 20-23 April 2010.

7.        Linsi Xia; Yamashita, N.; Ishida, Toru, “Analysis on Multilingual Discussion for Wikipedia Translation,” Second International Conference on Culture and Computing (Culture Computing), pp.104, 109, 20-22 Oct. 2011.

8.        Yuqing Gao; Bowen Zhou; Liang Gu; Sarikaya, R.; Hong-Kwang Kuo; Rosti, A.-V.I.; Afify, M.; Weiihong Zhu, “IBM Mastor: Multilingual Automatic Speech-To-Speech Translator,” ICASSP 2006 Proceedings. 2006 IEEE International Conference on Acoustics, Speech and Signal Processing, 2006. , vol.5, 14-19 May 2006.

9.        Liang Gu; Yuqing Gao; Liu, F.-H.; Picheny, Michael, “Concept-based speech-to-speech translation using maximum entropy models for statistical natural concept generation,” Processing, IEEE Transactions on Audio, Speech, and Language , vol.14, no.2, pp.377-392, March 2006.

10.     Evandro Franzen1 and Dante Augusto Couto Barone, “Automatic Discovery of Brazilian Portuguese Letter to Phoneme Conversion Rules through Genetic Programming”, Springer-Verlag Berlin Heidelberg, pp. 62–65, 2003.

11.     Hertz, S.R., “English text to speech conversion with delta,” Acoustics, Speech, and Signal Processing, IEEE International Conference on ICASSP ’86. , vol.11, pp.2427, 2430, Apr 1986.

12.     MATLAB and Simulink Release 2013a, The MathWorks, Inc., Natick, Massachusetts, United States, 2013.

 

4-9

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

Manmohan Soni, Sankalp Verma

Paper Title:

Thermal Analysis of Blast Furnace Cooling Stave Using CFD

Abstract: Blast furnace Cooling Systems have been developing since 1884. Earlier (till 1920’s) the cooling was applied only to hearth and bosh areas. By 1930’s and 1940’s, cooling was also applied to the shaft. Simultaneously, external cooling methods like shower and jacket cooling of the furnace shell were tried. This method relied on extracting the heat through the furnace shell to the cooling medium, generating high thermal stresses during the heat transfer and hence jeopardizing the integrity of the shell. The main purpose of cooling system is to enhance the furnace campaign life. If heat transfer, thermal stress and furnace campaign life all such parameters should not be analyzed it may lead to catastic failure of Blast furnace.  This Paper deals with the computational analysis of three-dimensional model of blast furnace stave, using FEV tool ANSYS FLUENT. Where the inner wall are heated up linearly, due to molten metal inside the furnace and the outer wall is been exposed to ambient condition with the maximum temperature TH and the minimum temperature with Tc The present computational investigation deals with Heat transfer analysis in blast furnace cooling stave and the parametric analysis such as the cooling channel inter-distance and diameter, coating layer on the external surface, cooling water velocity, etc is been done and the effect of them in heat transfer of stave or stave performance is been justified. The temperature distribution and flow pattern across the cavities were visualized. The FEV results are validated with well published results in literature and furthermore with experimentation. Results are first presented in the form of streamlines, isotherm contours, thermal stress, and Temperature difference.

Keywords:
Blast Furnace Stave, CFD, Heat Transfer.


References:

1.        “Global Formulation”Blast Furnace Phenomena and Modelling 1987, pp 97-296 ISBN 978-94-010-8035-4, Springer
2.        H. Takano, Y. Kitauchi and H. Hiura,  “Design for the 145-MW Blast Furnace Gas Firing Gas Turbine Combined Cycle Plant” J. Eng. Gas Turbines Power 111(2), 218-224 (Apr 01, 1989) (7 pages)

3.        Tasuku Senbon, Futoshi Hanabuchi, “Instrumentation to Manufacturing Industries (Application II)” Instrumentation Systems, 1991, pp 603-775 Print ISBN 978-3-662-12091-0, Springer Netherlands

4.        Steven Vernengo, Rade Milanovic, Chenn Q. Zhou, Pinakin Chaubal and D. Huang, “Computations of Liquid Flow and Heat Transfer in the Hearth of a Blast Furnace”, ASME 2003 International Mechanical Engineering Congress and Exposition Heat Transfer, Volume 1Washington, DC, USA, November 15–21, 2003

5.        E. A. Elsaadawy and W.-K. Lu, “Effect of the Coke-Free Layer Height on the Wear of the Bottom Wall of a Blast Furnace Hearth” ASME 2005 Fluids Engineering Division Summer Meeting Volume 2: For a Houston, Texas, USA, June 19–23, 2005

6.        CHENG Su-sen, QIAN Liang, ZHAO Hong-bo,  “Monitoring Method for Blast Furnace Wall With Copper Staves” , Journal of Iron and Steel Research, International, Volume 14, Issue 4, July 2007, Pages 1-5

7.        Lijun Wu, Weiguo Zhou, Huier Cheng, Yunlong Su, Xiaojing Li, “ The study of structure optimization of blast furnace cast steel cooling stave based on heat transfer analysis”, Applied Mathematical Modelling, Volume 31, Issue 7, July 2007, Pages 1249-1262

8.        Lijun Wu, Xun Xu, Weiguo Zhou, Yunlong Su, Xiaojing Li, “Heat transfer analysis of blast furnace stave” , International Journal of Heat and Mass Transfer, Volume 51, Issues 11–12, June 2008, Pages 2824-2833

9.        Xiao-jun Ning, Shu-sen Cheng, Ning-qiang Xie, “Analysis of temperature, stress, and displacement distributions of staves for a blast furnace”, International Journal of Minerals, Metallurgy and Materials, Volume 16, Issue 5, October 2009, Pages 512-516

10.     Lijun Wu, Zu’an Lu, Guoping Sun, Jing Li, “Study on intelligent monitoring methodology based on the mathematical model of heat transfer for blast furnace stave”, Applied Mathematical Modelling, Volume 34, Issue 8, August 2010, Pages 2129-2135

11.     Tong WU, Su-sen CHENG, “Model of Forming-Accretion on Blast Furnace Copper Stave and Industrial Application”,Journal of Iron and Steel Research, International, Volume 19, Issue 7, July 2012, Pages 1-5)A. Bonnaccorsi, “On the Relationship between Firm Size and Export Intensity,” Journal of International Business Studies, XXIII (4), pp. 605-635, 1992. (journal style)

 

10-16

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

4.

Authors:

Kriti Bhargava, Nisheeth Saxena

Paper Title:

Membrane Computing and Its Applications

Abstract: There are two types of computing; one is conventional and another is unconventional. Turing machine is a hypothetical device and a conventional model, model of computation; it is not a random access machine, so to simulate current day’s basis systems; in a exact manner register machine had been defined, so they are conventional model of computing. Paradigms like DNA computing, Quantum computing, Membrane Computing, they are model of unconventional computing. These have comes an existence in their resent times and we have found a certain problems can tackle in a very efficient manner using this. The practical use of this is still a question and it’s being exploded. Membrane computing which biologically inspired and mathematically motivated. Membrane structure is an essential ingredient of a membrane computing, having hierarchical arrangement of membranes, like a cell or tree. This mainly deals with distributed and parallel computing models. Parallelism is restricted in classical computers bounded by ‘n’ (16/64) number of processors. But when size of problems increases, then the number of processors can’t increases. Unbounded parallelism is exists in DNA, Membrane computing. Because of unbounded parallelism, you can have DNA strands and they can exist within one cubic centimeter of a solution; millions of DNA strands can exists. Because of that the action state place parallel and you can have a number of operations performed simultaneously. The basic features are evolution rules and evolving objects encapsulated in compartments of membranes. These evolution rules are applied on multisets. It is a framework to reflecting a limb of a system model. Inspiration of membrane computing is the process which takes place in a cell, the reaction which develops in cell region. The processing of substances, energy and information in these regions, through the membranes which delimit them are computational processes. We try to simulate these processes and see that anything we can define in a formal manner using this model of computation. In this paper, briefly discuss about membrane computing applications like global clock, L system, solving optimization problems, solving SAT, HPP etc.

Keywords:
Membrane Computing, P system, HPP, SAT, L system.


References:

1.        Gheorghe Păun. “Introduction to membrane computing.”  Applications of Membrane Computing. Springer Berlin Heidelberg, 2006. 1-42.
2.        Eberhart RC and Kennedy J, “A new optimizer using particle swarm theory,” in Proceedings of the sixth international symposium on micro machine and human science, 1995, p. 39-43.

3.        Yang Sun, Lingbo Zhang, and Xingsheng Gu. “Membrane computing based particle swarm optimization algorithm and its application.” Bio-Inspired Computing: Theories and Applications (BIC-TA), 2010 IEEE Fifth International Conference on. IEEE, 2010.

4.        Jin-Hui Zhao, Ning Wang, and Ping Zhou. “Multiobjective bio-inspired algorithm based on membrane computing.” Computer Science and Information Processing (CSIP), 2012 International Conference on. IEEE, 2012.

5.        Gheorghe Marian and Florentin Ipate. “A Kernel P Systems Survey.”Membrane Computing. Springer Berlin Heidelberg, 2014. 1-9.

6.        Ana Pavel, Octavian Arsene, Catalin Buiu, “Enzymatic numerical P systems-a new class of membrane computing systems.” Bio-Inspired Computing: Theories and Applications (BIC-TA), Fifth International Conference on. IEEE, 2010.

7.        Vincenzo Manca and Luca Bianco. “Biological networks in metabolic P systems.” BioSystems 91.3 (2008): 489-498.

8.        Francesco Bernardini and Marian Gheorghe. “Population P Systems.” J. UCS10.5 (2004): 509-539.

9.        Zhengwei Qi, Jinyuan You, Hongyan Mao, “P systems and Petri nets.” International Workshop, WMC 2003, Tarragona, Spain, July, 2003.

10.     Gheorghe Păun, “Computing with Membranes”,  Journal of Computer and System Sciences, volume 61, issue 1, (Science Direct), August 2000.(http://www.sciencedirect.com/science/article/pii/S0022000099916938).

11.     Gheorghe Paun, “Membrane computing [and graph transformation].” Electronic Communications of the EASST 6 (2007).

12.     Kamala Krithivasan. Introduction to formal languages, automata theory and computation. Pearson Education India, 2009.

13.     Jie Xue and Xiyu Liu. “Applied membrane computation in creative design.”Computer Supported Cooperative Work in Design (CSCWD), 2012 IEEE 16th International Conference on. IEEE, 2012.

14.     Claudio Zandron, Claudio Ferretti, and Giancarlo Mauri. “Solving NP-complete problems using P systems with active membranes.” Unconventional Models of Computation, UMC’2K. Springer London, 2001. 289-301.
(https://researchspace.auckland.ac.nz/bitstream/handle/2292/3611/102paun.pdf?___&origin=publication_detail)
15.     Prusinkiewicz, Przemyslaw, and Aristid Lindenmayer. Graphical modeling using L-systems. Springer New York, 1990.(http://algorithmicbotany.org/papers/abop/abop-ch1.pdf)

16.     Gheorghe Păun and Mario J. Pérez-Jiménez. “Membrane computing: Brief introduction, recent results and applications.” BioSystems, vol 85, issue 1, july 2006.

17.     (http://www.sciencedirect.com/science/article/pii/S0303264706000219).

 

17-22

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

Volume-2 Issue-7

 Download Abstract Book

S. No

Volume-2 Issue-7, June 2014, ISSN: 2319-9598 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

Majid S. M. Al-Hafidh, Mustafa H. Ibrahem

Paper Title:

Zero Energy House in Iraq

Abstract: The residential load is one of the largest components of the electrical load in the Iraqi power system. We can supply a part of the residential loads by utilizing the renewable energies. Recent research’s show that the applications of a hybrid power system is preferable to achieve this goal. For residential loads connected to the grid (on grid) with the possibility of energy exchange (buying and selling) to the grid, the addition of suitable hybrid power system can reduce energy cost to zero (zero energy house). The paper studied the possibility of supplying residential load in the city of Mosul – at north of Iraq by using a hybrid renewable energy system to reach zero energy cost. The paper obtains this optimal hybrid system components for various cases. HOMER software was used to study the system to feeds the residential loads.

Keywords:
Hybrid power system; grid connecting; Residential load; Solar Water Heating; Zero energy building.


References:

1.        N. Acharya, P. Mahat, N. Mithulananthan, “An analytical approach for DG allocation in primary distribution network,” International Journal of Electrical Power and Energy Systems, Vol. 28, Dec. 2006, pp. 669–678.
2.        J. Wilk, J. O. Gjerde, T. Gjengedal, M. Gustafsson, “Steady state power system issues when planning large wind farms”, in Proc. IEEE Power Engineering Society Winter Meeting, 2002, Vol. 1 pp. 199–204.

3.        P. Torcellini, S. Pless, M. Deru and D. Crawley “Zero Energy Buildings: A Critical Look at the Definition”, ACEEE Summer Study Pacific Grove, California August 14−18, 2006.

4.        The Atmospheric Science Data Center (ASDC) at NASA Langley Research Center http://eosweb.larc.nasa.gov/Nurul Arina bte Abdull Razak, Muhammad Murtadha bin Othman,

5.        “Optimal Sizing and Operational Strategy of Hybrid Renewable Energy System Using HOMER”, The 4th  International Power Engineering and Optimization Conf. (PEOCO2010), Shah Alam, Selangor, MALAYSIA:  23-24 June 2010.

6.        Vuc, Gh., Borlea, I., Barbulescu, C.., Prostean, O., Jigoria-Oprea, D., Neaga, L.-Optimal Energy Mix for a Grid Connected Hybrid Wind-Photovoltaic Generation System, in 3th  IEEE International Symposium on Exploitation of Renewable Energy Sources – EXPRES 2011, March 11-12, 2011, Subotica, Serbia, pp. 1-6.

7.        Vuc gh , borlea i & others , “Optimal energy storage capacity for a grid connected hybrid wind photovoltaic generation system”, journal of sustainable energy Vol. 2, No. 4, December, 2011.

8.        Saip Electric Group is an enterprise specialized in design, production and sales of electric equipments  http://www.saipgroup.com.

9.        http://www.windtronics.com

10.     http://www.bettergeneration.co.uk/

11.     Dr. Majid S. Al-Hafidh, Dr. Mahmoud U. Al-Refaii, Dr. Mohammad A.Al-Rawi,”Utilization of solar energy to reduce Residential Load” NuRER 2012-III. International Conference on Nuclear & Renewable Energy Resources Istanbul, TURKEY, 20-23 May 2012.

 

1-4

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.

Authors:

Ghadah Al-Khafaji, Hazeem B. Taher, Nura Anwer Abdulzahara

Paper Title:

Increase the Capacity Amount of Data Hiding to Least Significant BIT Method

Abstract: In this paper a new strategy to increase the number of bits hiding in each image for LSB method is suggested to give more data capacity with high secure stegano image. The technique of hiding a private message within a file in such a manner that third party cannot know the existence of matter or the hidden information. The purpose of Steganography is to create secrete communication between the sender and the receiver by replacing the least significant bits (LSB)of the cover image with the data bits depending on the type of the pixel class if it is edge then exchange two bits else one bit exchanged.

Keywords:
Image steganography, text hiding, Least Significant Bit algorithm.


References:

1.        S. Narayana1, G. Prasad, ” Two  New Approaches for Secured Image Steganography Using Cryptographic Techniques and Type Conversions”, Signal & Image Processing : An International Journal(SIPIJ) Vol.1, No.2, December 2010
2.        I. J. Kadhim, ” A New Audio Steganography System Based on Auto-Key Generator”, AL-Khwarizmi Engineering Journal, Vol.8, No.1, pp27-36, 2012.

3.        Y. Bassil, “Image Steganography based on a Parameterized Canny Edge Detection Algorithm”, International Journal of Computer Applications, Vol. 60, 4, December 2012.

4.        N. Jain, S. Meshram, S. Dubey, “Image Steganography Using LSB and Edge – Detection Technique”. International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-3, July 2012

5.        V. Saini1, R. Garg, ” A Comparative Analysis on Edge Detection Techniques Used in Image Processing”,IOSR Journal of Electronics and Communication Engineering (IOSRJECE) ISSN : 2278-2834 Volume 1, Issue 2 (May-June 2012), PP 56-59 www.iosrjournals.org

 

5-7

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

Volume-2 Issue-8

 Download Abstract Book

S. No

Volume-2 Issue-8, July 2014, ISSN: 2319-9598 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

Allanki Sanyasi Rao, S. Srinivas

Paper Title:

A New BER and SNR Calculations for MIMO

Abstract: Multiple Antenna Communication has become one of the major focuses in wireless communication research. MIMO Technology is used to enhance the system capacity. The effect of Fading and Interference can be combated to increase the capacity of a link. MIMO system uses Multiple Transmit and Multiple Receive antennas which exploit the multipath propagation in rich scattering environment. The matrix channel plays a pivotal role in the throughput of a MIMO link since the modulation, data rate, power allocation and antenna weights are dependent on the channel gain. Alternative in order to reduce the complexity of MIMO system, detection techniques are proposed but the complexity of algorithmic schemes are in higher than that of equalizer based techniques such as Zero Forcing (ZF), Minimum mean square Error Methods (MMSE) and Maximal Ratio Combining (MRC). In this paper BER analysis is presented using different equalizers and then optimum equalization method is suggested.

Keywords:
Minimum mean square Error Methods (MMSE), Multiple Input Multiple Output Systems (MIMO), Rayleigh Channels, Bit Error Rate (BER), Zero Forcing (ZF), Maximal Ratio Combining (MRC), Successive Interference Cancellation (SIC), Binary Phase Shift Keying (BPSK), Fast Fading, Adaptive Equalization.


References:

1.        S.Nagarani, C.V.Seshiah, 2011. “An Efficient Space-Time Coding for Wireless Communication”. European Journal of Scientific Research Vol.52 No.2 pp.195-203.
2.        V. Tarokh, A. Naguiband etal. 1999 “Space-time codes for high data rate Wireless communication: performance criteria in the presence of channel estimation errors, mobility, and Multiple paths,” IEEE Transactions on Communications, vol. 47, no. 2, pp. 199-207.

3.        S. M. Alamouti,1998 “A simple transmit diversity technique for wireless communications,” IEEE Journal on Selected Areas in Communications, vol. 16, no. 8, pp. 1451-1458.

4.        H. Zhang, H. Dai, Q. Zhou, and B. L. Hughes, 2006 On the diversity-multiplexing tradeo for ordered SIC receivers over MIMO channels,” IEEE International Conference on Communications (ICC), Istanbul, Turkey.

5.        S. Haykin, K. Huber, and Z. Chen, “Bayesian Sequential State Estimation for MIMO Wireless Communications,” IEEE. Procedings, Vol. 92. No. 3, pp. 439-454, Mar. 2004

6.        Approximate Minimum BER Power Allocation for MIMO Spatial Multiplexing Systems Neng Wang and Steven D. Blostein, Senior Member, IEEE.

1-4

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

Volume-2 Issue-9

 Download Abstract Book

S. No

Volume-2 Issue-9, August 2014, ISSN: 2319-9598 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

 

1.

Authors:

Edward Danso Ansong, J. B. Hayfron-Acquah, Dominic Damoah, Michael Asante, Brighter Agyeman

Paper Title:

Camouflage Worm Detection and Counter-Measures

Abstract: This research focuses special attention on a new class of worms called Camouflaging worm (C-Worm). The key difference between C-Worm and traditional worms is that, it displays the ability to intelligently analyse and make changes to its scan traffic volume over time.  This new class of active worms is an attack that spread itself on the internet by exploiting vulnerabilities on computer systems.

Keywords:
C-Worm, Camouflaging, traditional, vulnerabilities.


References:

1.        Cheetancheri, S. G., Agosta, J. M., Dash, D. H., Levitt, K. N., Rowe, J., & Schooler, E. M. (2006). A distributed host-based worm detection system. LSAD ’06 Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense (pp. 107-113). ACM.
2.        Chen, Z., Gao, L., & Ji, C. (2003). On Effectiveness of defense systems against active worms.

3.        Gu, G., Sharif, M., Qin, X., Dagon, D., Lee, W., & Riley, G. (2004). Worm detection, early warning and response based on local victim information. 20 th Annual Computer Security Applications Conference.

4.        M.A.BASEER, M., NARAYANA, M. P., & LAHANE, M. S. (2013). Modeling and Detection of Camouflaging Worm. INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGIES, VOL. 01, ISSUE 02, 99-104. Retrieved 12 2013

5.        M.K, P. C., & P.V, M. (2012). Modelling and Detection of Camouflaging Worms. International Journal of Emerging Technology and Advanced Engineering, 2-3. Retrieved 12 2013

6.        Madhusudan, B., & Lockwood, J. (2004). Design of a System for Real-Time Worm Detection. HOTI 12.

7.        Pele Li Mehdi Salour, X. S. (2008). Survey of Internet Worm Detection and Containment. IEEE Communications Surveys.

8.        Saudi, M. M., Seman, K., Tamil, E. M., Yamani, M., Idris, I., & Visualization, A. (2008). Worm Analysis through Computer Simulation (WAtCoS). Proceedings of the World Congress in Engineering 2008, 1.

9.        Singh, S., Estan, C., Varghese, G., & Savage, S. (2003). The EarlyBird System for Real-time Detection of Unknown Worms. Technical Report CS2003-0761. University of California, San Diego.

10.     Talli, P., & Krishna, M. V. (2012). Detection of Active Internet Worm: Camouflaging Worm. nternational Journal of Electronics Communication and Computer Engineering, 3(5), 1172-1175. Retrieved 12 2013

11.     Venkataraman, S., Song, D., Gibbons, P. B., & Blum, A. (2004). New Streaming Algorithms for Fast Detection of Superspreaders. Intel Corporation. Retrieved 1 2014

12.     Wang, X., Yu, W., Champion, A., Fu, X., & Xuan, D. (2007). Detecting Worms via Mining Dynamic Program Execution. Third International Conference on Security and
Privacy in Communication Networks and the Workshops, SecureComm 2007, (pp. 412-421). Nice,France.

13.     Wu, J., Vangala, S., Gao, L., & Kwiat, K. (2004). An Effective Architecture and Algorithm for Detecting Worms with Various Scan Techniques. 11th Annual Network and Distributed System Security Symposium (NDSS ’04).

14.     Yi, B. k. (2006). Digital Signatures.

15.     Yu, W., Wang, X., Calyam, P., Xuan, D., & Zhao, W. (2011). Modeling and Detection of Camouflaging Worm. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL., 1-3. Retrieved 12 29, 2013

16.     Yu, W., Wang, X., PrasadCalyam, Xuan, D., & Zhao, W. (n.d.). On Detecting Camouflaging Worm.

17.     Yu, W., Wang, X., Xuan, D., & Lee, D. (2006). Effective Detection of Active Worms with Varying Scan Rate. IEEE International Conference on Security and Privacy in Communication Networks (SecureComm).

 

1-4

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.

Authors:

Omar AL-Masari, Musa AL-Masari

Paper Title:

Influence of a Wind Farm on Power System Oscillatory Stability

Abstract: This paper deals with the influence of wind turbine generators on oscillatory stability. Examining low-frequency oscillatory stability is important for understanding the weakest mode that leads to oscillatory problems. The performance of three types of wind generators, the doubly fed induction generator, the squirrel cage induction generator, and the permanent magnet synchronous generator, when connected to a grid was examined. Eigenvalue analysis and time-domain analysis helped to identify oscillatory instability problems in the wind farm. Moreover, the advantages of a high voltage direct current link (HVDC) for improving instability issues was studied. The simulation results show the significance of the DC link in improving the stability of the system by isolating the wind farm at the point of common couple from a fault event. The simulation software tool DIgSILENT PowerFactory was used for all modelling of wind farms, HVDC, and the IEEE 14-bus test system.

Keywords:
Wind Turbine Generators, Oscilatory Stability, DFIG, PMSG, SCIG, HVDC, IEEE 14-bus test system, Eigenvalue analysis, DIgSILENT PowerFactory.


References:

1.        K. R. Steve Sawyer, “Global Wind Report,” belgium 2010.
2.        K. R. Steve Sawyer, “Global Wind energy Outlook 2010,” belgium 2010.

3.        S. Heier, Grid Integration of Wind Energy Conversion System, 1998.

4.        D. Thakur and N. Mithulananthan, “Influence of Constant Speed Wind Turbine Generator on Power System Oscillation,” Electric Power Components and Systems, vol. 37, pp. 478-494, 2009.

5.        G. Rogers, power system Oscillations: Kluwer Academic Publishers, 2000.

6.        P. W. Sauer, Power Systen Dynamics and Stability: Prentice-Hall, Inc., 1998.

7.        P. Kundur, Power System Stability and Control. New York: McGraw-Hill, Inc., 1994.

8.        O. A. Almasari, “Low Frequency Oscillatory Stability Study of Power System with Wind Farms,” Master Degree, School of Information Technology and Electrical Engineering, The University of Queensland, Brisbane, 2011.

9.        W. Chen, S. Libao, W. Liming, and N. Yixin, “Small signal stability analysis considering grid-connected wind farms of DFIG type,” in Power and Energy Society General Meeting – Conversion and Delivery of Electrical Energy in the 21st Century, 2008 IEEE, 2008, pp. 1-6.

10.     A. F. Snyder, “Inter-Area Oscillation Damping with Power System Stabilizers and synchronized Phasor Measurements,” Master thesis, Electrical Engineering, Virginia Polytechnic Institute and State University, 1997.

11.     F. J. Swift and H. F. Wang, “The connection between modal analysis and electric torque analysis in studying the oscillation stability of multi-machine power systems,” International Journal of Electrical Power & Energy Systems, vol. 19, pp. 321-330, Jun 1997.

12.     J. G. Slootweg and W. L. Kling, “The impact of large scale wind power generation on power system oscillations,” Electric Power Systems Research, vol. 67, pp. 9-20, Oct 2003.

13.     R. C. Burchett and G. T. Heydt, “Probabilistic Methods For Power System Dynamic Stability Studies,” Power Apparatus and Systems, IEEE Transactions on, vol. PAS-97, pp. 695-702, 1978.

14.     R. D. Fernández, R. J. Mantz, and P. E. Battaiotto, “Impact of wind farms on a power system. An eigenvalue analysis approach,” Renewable Energy, vol. 32, pp. 1676-1688, 2007.

15.     D. Gautam, V. Vittal, and T. Harbour, “Impact of increased penetration of DFIG based wind turbine generators on transient and small signal stability of power systems,” in Power and Energy Society General Meeting, 2010 IEEE, 2010, pp. 1-1.

16.     Y. Sun, L. Wang, G. Li, and J. Lin, “A review on analysis and control of small signal stability of power systems with large scale integration of wind power,” in Power System Technology (POWERCON), 2010 International Conference on, 2010, pp. 1-6.

17.     D. Devaraj and R. Jeevajyothi, “Impact of wind turbine systems on power system voltage stability,” in Computer, Communication and Electrical Technology (ICCCET), 2011 International Conference on, 2011, pp. 411-416.

18.     G. Michalke and A. D. Hansen, “Modelling and control of variable speed wind turbines for power system studies,” Wind Energy, vol. 13, pp. 307-322, May 2010.

19.     I. D. Margaris and N. D. Hatziargyriou, “Direct drive synchronous generator wind turbine models for power system studies,” in Power Generation, Transmission, Distribution and Energy Conversion (MedPower 2010), 7th Mediterranean Conference and Exhibition on, 2010, pp. 1-7.

20.     Kodsi S. K. M, Canizares C. “Modeling and Simulation of IEEE 14 Bus System with FACTS controllers”, Technical report 2003-3, University of Waterloo, On, Canada, 2003.

 

5-10

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

Sonali Sharma, Chhatarpal, Ramanand Harijan

Paper Title:

Survey on Internet of Things and Design for a Smart Parking Area

Abstract: This paper introduces Internet of Things (IoTs), which offers capabilities to identify, share information and connect worldwide physical objects into a single system. In this research work, we will discuss how we can connect various objects in a better way and what are the basic requirements and functions to make them communicate and consequently make this world unified. This survey summarizes the easiest and most feasible way of connecting various objects of IoT and it also discuss about a prototype for smart parking area application of IoT. In this prototype we have used a microcontroller to handle all the devices. Security is also added to this model using scanners and finger print detectors. 

Keywords:
Internet of Things (IoT), Parking, Security, Addressability.


References:

1.        C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos, “Context Aware Computing for The Internet of Things: A Survey” IEEE Communications Surveys & Tutorials, 2013, pp. 1-41.
2.        M. Palattella, N. Accettura, X. Vilajosana, T. Watteyne, L. Grieco, G. Boggia, and M. Dohler, “Standardized protocol stack for the internet of (important) things,” Proceedings of IEEE, 2012, pp. 1-18.

3.        O. Vermesan, P. Friess,and A. Furness, “The Internet of Things New Horizons” IERC – Internet of Things European Research Cluster, 3rd edition of the Cluster Book, ISBN hard cover: 978 – 0 – 9553707 – 9 – 3,2012.

4.        Bari, N. ;  Mani, G. ; Berkovich, S., “Internet of Things as a Methodological Concept”, IEEE, 2013, pp. 48 – 55.

5.        Yinghui Huang ; Guanyu Li, “Descriptive models for Internet of Things”, IEEE International Conference on Intelligent Control and Information Processing (ICICIP), 2010, pp. 483 – 486.

6.        Coetzee, L. ;  Eksteen, J., “The Internet of Things – promise for the future? An introduction”, IEEE IST-Africa Conference Proceedings, 2011, pp. 1 – 9.

7.        Zhu Yu  ; Wang Tie-Ning, “Research on the Visualization of Equipment Support Based on the Technology of Internet of Things”, IEEE Second International Conference on Instrumentation, Measurement, Computer, Communication and Control IMCCC ’12 Proceedings, 2012, pp. 1352 – 1357.

8.        Yinghui Huang ; Guanyu Li, “A Semantic Analysis for Internet of Things”, IEEE International Conference on Intelligent Computation Technology and Automation (ICICTA), 2010, pp. 336 – 339.

9.        Lu Tan ; Comput.; Neng Wang, “Future internet: The Internet of Things”, Advanced Computer Theory and Engineering (ICACTE), 2010 3rd International Conference on IEEE, 2010, pp. V5-376 – V5-380.

10.     Mingfang Du ; Jianjun Fang ; Haiqing Cao, “A new solution for city parking guiding based on Internet of Things and multi-level multi-agent”, IEEE, 2011, pp. 4093 – 4096.

11.     Yanlin Yin ;Dalin Jiang, “Research and Application on Intelligent Parking Solution Based on Internet of Things”, IEEE, 2013, pp. 101 – 105.

12.     Tsung-hua Hsu, Jing-Fu Liu, Pen-Ning Yu, Wang-Shuan Lee and Jia-Sing Hsu, “Development of an automatic parking system for vehicle”, IEEE, 2008, pp. 1-6.

13.     Daobin Wang ; Huawei Liang ; Tao Mei ; Hui Zhu, “Research on self-parking path planning algorithms”, IEEE, 2011, pp. 258 – 262.

14.     Oentaryo, R.J. ,Pasquier, M., “Self-trained automated parking system”, IEEE, 2004, vol. 2; pp. 1005 – 1010.

15.     M. Nizam Kamarudin, “Development of an automatic parallel parking system for nonholonomic mobile robot”, IEEE  International Conference on, Electrical, Control and Computer Engineering (INECCE) 2011, pp. 45-49.

16.     Tang, V.W.S. ,Yuan Zheng ; Jiannong Cao, “An Intelligent Car Park Management System based on Wireless Sensor Networks”, IEEE 1st International Symposium on Pervasive Computing and Applications, 2006, pp. 65 – 70.

 

11-16

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html