International Journal of Innovative Technology and Exploring Engineering(TM)
Exploring Innovation| ISSN:2278-3075(Online)| Reg. No.:65021/BPL/CE/12| Published by BEIESP| Impact Factor:4.66| UGC Approved Journal
Home
Articles
Conferences
Editor
Scopes
Author Guidelines
Publication Fee
Privacy Policy
Associated Journals
Frequently Asked Questions
Contact Us
Volume-1 Issue-5: Published on October 10, 2012
55
Volume-1 Issue-5: Published on October 10, 2012

 Download Abstract Book

S. No

Volume-1 Issue-5, October 2012, ISSN:  2278-3075 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

Sai Lakshmi Kumari N, U.Pradeep Kumar, K.V.Ramana Rao

Paper Title:

Implementation of 2D Hartley transform using Distributed Arithmetic

Abstract:   Discrete  cosine  transform  (DCT)  is  usually  used  in JPEG  based  image  transform  coding.  This  paper  presents separable  2-D  discrete  Hartley  transform  (SDHT)  and  its Distributed  Arithmetic  (DA)  based  hardware  architecture  as an  alternate  to  DCT  in  transform  based  coding  of  image compression.  The  proposed  DA  architecture  for  1-D  DHT  has very  less  computations  as  compared  to  existing  1-D DCT.  The proposed  DHT  architecture implemented in FPGA indicates  a significant  hardware  savings  as  compared  to  FPGA  resources used  in  an  efficient  memory  based  DA  approach.  The additional advantage of  SDHT  is  that  its  inverse  transform  is same  as  forward  transform  with  a  constant  division.  This is demonstrated through a Xilinx FPGA XC3s500E device.

Keywords:
 Distributed Arithmetic, Discrete Hartley Transform Discrete Cosine Transform, JPEG, Offset Binary Coding.


References:

1.       G. O. Young, “Synthetic structure of industrial plastics (Book style with paper title and editor),” in Plastics, 2nd ed. vol. 3, J. Peters, Ed.  New York: McGraw-Hill, 1964, pp. 15–64.
2.       W.-K. Chen, Linear Networks and Systems (Book style).              Belmont, CA: Wadsworth, 1993, pp. 123–135.

3.       H. Poor, An Introduction to Signal Detection and Estimation.   New York: Springer-Verlag, 1985, ch. 4.

4.       B. Smith, “An approach to graphs of linear forms (Unpublished work style),” unpublished.

5.       E. H. Miller, “A note on reflector arrays (Periodical style—Accepted for publication),” IEEE Trans. Antennas Propagat., to be published.

6.       J. Wang, “Fundamentals of erbium-doped fiber amplifiers arrays (Periodical style—Submitted for publication),” IEEE J. Quantum Electron., submitted for publication.

7.       C. J. Kaufman, Rocky Mountain Research Lab., Boulder, CO, private communication, May 1995.

8.       Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate interfaces (Translation Journals style),” IEEE Transl. J. Magn.Jpn., vol. 2, Aug. 1987, pp. 740–741 [Dig. 9th Annu. Conf. Magnetics Japan, 1982, p. 301].

9.       M. Young, The Techincal Writers Handbook.  Mill Valley, CA: University Science, 1989.

10.     (Basic Book/Monograph Online Sources) J. K. Author. (year, month, day). Title (edition) [Type of medium]. Volume(issue).   Available: http://www.(URL)

11.     J. Jones. (1991, May 10). Networks (2nd ed.) [Online]. Available: http://www.atm.com

12.     (Journal Online Sources style) K. Author. (year, month). Title. Journal [Type of medium]. Volume(issue), paging if given.           Available: http://www.(URL)

13.     R. J. Vidmar. (1992, August). On the use of atmospheric plasmas as electromagnetic reflectors. IEEE Trans. Plasma Sci. [Online]. 21(3). pp. 876—880.   Available:

14.     http://www.halcyon.com/pub/journals/21ps03-vidmar


1-3

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.

Authors:

Glory Priscilla, P.Deepthi, K.V.Ramana Rao

Paper Title:

VLSI Implentation of Viterbi decoder in MIMO Systems

Abstract:   Space-time trellis code (STTC) has been widely applied to coded multiple-input multiple-output (MIMO) systems. The complexity of STTC decoding lies in the branch metric calculation in the Viterbi algorithm and increases significantly along with the number of antennas and the modulation order. Consequently, a low-complexity algorithm to mitigate the computational burden is proposed. The design is implemented Xilinx Spartan 3 Xc3s200E fpga and the total power consumed by the device is 0.041W.

Keywords:
 Branch metrics, MIMO, space-time trellis code, Viterbi  decoder.


References:

1.        Information Technology-Telecommunications and Information Exchange Between Systems-Local and Metropolitan Area Networks- Specific Requirements-Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Amendment 4: Enhancements for Higher Throughput 2008, IEEE Unapproved Draft Standard 802.11n, 4.00.
2.        Local and Metropolitan Area Networks Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems Amendment 2: Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands and Corrigendum 1, 2006, IEEE Standard 802.16.

3.        J.Winters, J. Salz, and R. D. Gitlin, “The impact of antenna diversity on the capacity of wireless communication systems,” IEEE Transactions on Communications, vol. 42, pp. 1740–1751, Feb. 1994.

4.        Y. Jung, J. Kim, S. Noh, H. Yoon, and J. Kim, “A digital 120 Mb/s MIMO-OFDM baseband processor for high speed wireless LANs,” in Proc. IEEE CICC’05, Sep. 2005, pp. 81–84.

5.        T. Chen, Z. Yu, Y. Peng, Y. Zhang, H. Dai, and X. Liu, “A MIMO receiver SOC for CDMA applications,” in Proc. IEEE International SOC Conference, Sep. 2006, pp. 275–278.

6.        Y. Jung, J. Kim, S. Lee, H. Yoon, and J. Kim, “Design and implementation of MIMO-OFDM baseband processor for high-speed wireless LANs,” IEEE Transactions on Circuits and Systems—Part II: Express Briefs, vol. 54, pp. 631–635, Jul. 2007.

7.        B. Vucetic and J. Yuan, Space-Time Coding. : John Wiley and Sons, 2003.
8.        D. Bevan and R. Tanner, “Performance comparison of space-time coding techniques,” IEE Electronics Letters, vol. 35, pp. 1707–1708, Sep. 1999.
9.        S. M. Alamouti, “A simple transmit diversity technique for wireless communications,” IEEE Journal on Selected Areas in Communications, vol. 16, pp. 1451–1458, Oct. 1998.

10.     V. Tarokh, N. Seshadri, and A. R. Calderbank, “Space-time codes for high data rate wireless communication: Performance criterion and code construction,” IEEE Transactions on Information Theory, vol. 44, pp.744–765, Mar. 1998.

4-6

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

Ganesh Kumar B, R.P.Das, K.V.Ramana Rao

Paper Title:

Design of High Speed CODEC for On Chip Cross Talk Avoidance

Abstract:   The cross talk is dependent on the data transition patterns  on  the  bus,  patterns  can  be  classified  based  on  the severity of the crosstalk they impose on the bus. The general idea behind  techniques  that  improve  on-chip  bus  speed  is  to  remove undesirable  patterns  that  are  associated  with  certain  classes  of crosstalk. Different schemes incur different area overheads since they requires additional wires, spacing between wires or both. We  analyze  the  properties  of  the  FPF-CAC and  show  that mathematically, a mapping scheme exists between the data wordsand  code  words.  Our proposed CODEC design offers  a near-optimal area  overhead performance. An improved version of the CODEC is then presented, which achieves theoretical optimal performance.  We also investigate the implementation details of the CODECs, including design complexity and the speed. Optimization schemes are provided to reduce the size of the CODEC and improve its speed. The design was implemented on Xilinx Xc3S200 fpga and the total power consumed by the device was estimated as 0.041W.

Keywords:
 CODEC, FPF-CAC, pruning,shielding.


References:

1.       G. O. Young, “Synthetic structure of industrial plastics (Book style with paper title and editor),” in Plastics, 2nd ed. vol. 3, J. Peters, Ed.  New York: McGraw-Hill, 1964, pp. 15–64.
2.       W.-K. Chen, Linear Networks and Systems (Book style).              Belmont, CA: Wadsworth, 1993, pp. 123–135.

3.       H. Poor, An Introduction to Signal Detection and Estimation. New York: Springer-Verlag, 1985, ch. 4.

4.       B. Smith, “An approach to graphs of linear forms (Unpublished work style),” unpublished.

5.       E. H. Miller, “A note on reflector arrays (Periodical style—Accepted for publication),” IEEE Trans. Antennas Propagat., to be published.

6.       J. Wang, “Fundamentals of erbium-doped fiber amplifiers arrays (Periodical style—Submitted for publication),” IEEE J. Quantum Electron., submitted for publication.

7.       C. J. Kaufman, Rocky Mountain Research Lab., Boulder, CO, private communication, May 1995.

8.       Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate interfaces (Translation Journals style),” IEEE Transl. J. Magn.Jpn., vol. 2, Aug. 1987, pp. 740–741 [Dig. 9th Annu. Conf. Magnetics Japan, 1982, p. 301].

9.       M. Young, The Techincal Writers Handbook.  Mill Valley, CA: University Science, 1989.

10.     (Basic Book/Monograph Online Sources) J. K. Author. (year, month, day). Title (edition) [Type of medium]. Volume(issue).    Available: http://www.(URL)

11.     J. Jones. (1991, May 10). Networks (2nd ed.) [Online]. Available: http://www.atm.com

12.     (Journal Online Sources style) K. Author. (year, month). Title. Journal [Type of medium]. Volume(issue), paging if given.           Available: http://www.(URL)

13.     R. J. Vidmar. (1992, August). On the use of atmospheric plasmas as electromagnetic reflectors. IEEE Trans. Plasma Sci. [Online]. 21(3). pp. 876—880.   Available:

14.     http://www.halcyon.com/pub/journals/21ps03-vidmar


7-9

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

4.

Authors:

Swathi Gera, M.Ashok Kumar, K.V.Ramana Rao

Paper Title:

Implementation of Coordinate Rotation algorithm for Hardware Multipliers

Abstract:   Most of the hardware algorithms exist to handle the hardware intensive signal processing problems. Among these algorithms is a set of shift-add algorithms  collectively  known  as  CORDIC  for  computing  a  wide  range  of functions including  certain  trigonometric,  hyperbolic and  logarithmic functions. Apart from this it can handle linear functions. Even though numerous articles covering various aspects of CORDIC algorithms, very few surveys concentrate on implementation in FPGAs. CORDIC (Coordinate Rotation Digital Computer) is an algorithm for computing transcendental functions like sine, cosine and arctangent.  The method can also be easily extended to compute square roots as well as hyperbolic functions.   The algorithm works by reducing the calculation into a number of micro-rotations for which the arctangent value is precomputed and loaded in a table.  This method reduces the computation to addition, subtraction, compares, and shifts.Various digital architectures were proposed and compared, including low-cost sequential and high performance pipelined solutions. Fixed point and floating point arithmetic was considered. The concepts were implemented in VHDL, verified and synthesized with Xilinx tools. Selected approach was physically implemented and tested.

Keywords:
 CORDIC, sine, cosine, FPGA, synthesis. SVD, digital, hardware, VHDL, FPGA


References:

1.        C. Eckart, G. Young, “The approximation of one matrix by another of lower rank”, Psychometrika, vol. 1, no. 3, 1936.
2.        J.E. Volder, “The CORDIC Trigonometric Computing Technique”, IRE Transactions on Electronic Computers, 1959.

3.        G. Golub, W. Kahan, “Calculating the singular values and pseudoinverse of a matrix”, J. SIAM Numerical Analysis, Ser. B, Vol. 2, No. 2,1965, pp. 205-224.

4.        R.P. Brent, F.T. Luk, C.F. Van Loan, “Computation of the singular value decomposition using mesh-connected processors”, Journal for VLSI Computer Systems, vol. 1, no. 3, 1985, pp. 243-270

5.        J.R. Cavallaro, F.T. Luk, “CORDIC Arithmetic for a SVD Processor”. Journal for Parallel and Distributed Computing, vol. 5, 1988, pp. 271-290.

6.        R. Andraka, “A Survey of CORDIC Algorithms for FPGA based computers”, in FPGA '98: Proc. of sixth international symposium on Field programmable gate arrays ACM/SIGDA, 1998, pp. 191-200.

7.        F. Deprettere (ed.), “SVD and signal processing. Algorithms, applications and architectures”, Department of Electrical Engineering, Delft University of Technology, Elsevier Science Publishers B.V.,Amsterdam, 1988.

8.        H. Wang, P. Leray, J. Palicot, “A CORDIC-based dynamically reconfigurable FPGA architecture for signal processing algorithms,” URSI 08, The XXIX General Assembly of the International Union of Radio Science, Chicago IL, 2008.

9.        VHDL, IEEE Std No. 1076, 2000.

10.     Xilinx ISE Web Pack, www.xilinx.com, 2009.[11] Floating-point arithmetic, IEEE Std No. 754, 2008.


10-12

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

5.

Authors:

Asha latha P, Rambabu B

Paper Title:

Open Core Protocol for High Performance on Chip Bus

Abstract:   The need for on-chip bus protocols are increased drastically for efficient and lossless communication among large number  of  IP  cores  of  SOC  design.  This  paper proposes  a high-performance,  highly  scalable,  bus-independent  interface between  IP  cores  named  as  Open Core  Protocol-International partnership. The  Open  Core Protocol  (OCP)  is  a  core  centric point  to point  protocol which provides lossless communication and reduces design time,  design  risk,  and  manufacturing  costs for  SOC designs  .  Main  property  of  OCP  is  that  it  can  be configured  with  respect  to  the  application  required.  The OCP is chosen because of its advanced supporting features such  as  configurable  sideband  control  signaling  and  test harness  signals,  when  compared  to  other  core  protocols. The  OCP  defines  a  point-to-point  interface  between  two communicating entities such as IP cores and bus interface modules.  One  entity  acts  as  the  master  of  the  OCP instance, and the other as the slave .In this paper, the most efficient  bus  architecture  was  adopted  to  support  most advanced  bus  functionalities  including  simple transactions,  burst  transactions,  lock  transactions, pipelined transactions, and out-of-order transactions withrespect to its suitable application in the real time product. The  Open  Core  Protocol  (OCP)  was  designed  and  the hardware  modeling  for  that  architecture  was  done  using VHDL.  This  design  is  Simulated  and  Synthesized. An experimental  result  shows the  efficiency  of  the  proposed bus architecture and interface. 

Keywords:
 Open core protocolIP Core,SOC,Vhdl


References:

1.        Open Core Protocol (OCP) Specification, http://www.ocpip.org/home.
2.        Advanced Microcontroller Bus Architecture (AMBA) Specification Rev 2.0 & 3.0, http://www.arm.com.

3.        N.Y.-C. Chang, Y.-Z. Liao and T.-S. Chang, “Analysis of Shared-link AXI,” IET Computers & Digital Techniques, Volume 3, Issue 4,  pages 373-383, 2009.

4.        Y.-T. Kim, T. Kim, Y. Kim, C. Shin, E.-Y. Chung, K.-M. Choi, J.-T.  Kong,  S.-K. Eo, “Fast and Accurate Transaction Level  Modeling  of  an  Extended  AMBA2.0 Bus
Architecture,” Design,  Automation, and Test in Europe, pages 138-139, 2005.

5.        G. Schirner and R. Domer, “Quantitative Analysis of Transaction  Level Models for the AMBA Bus,” Design, Automation, and Test in  Europe, 6 pages, 2006.

6.        CoWarewebsite,http://www.coware.com


13-16

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

6.

Authors:

Rama Krishna V, Venu Gopal B

Paper Title:

Design and analysis of 32-bit RISC Processor based on MIPS

Abstract:   In this paper, we have studied Microcomputer with out interlocked pipeline stages instruction format instruction data path decoder module function and design theory basend on RISC CPUT instruction set. We have also designed instruction fetch(IF) module of 32-bit CPU based on RISC CPU instruction set. Function of IF module mainly includes fetch instruction and latch module address arithmetic module check validity of instruction module synchronous control module. Function of IF modules are implemented by pipeline and simulated successfully on    Xilinx Spartan 3E fpga device Xc3s200.

Keywords:
 MIPS, Data Flow, Data Path, Pipelin

References:

1.        Bai-ZhongYing, Computer Organization, Science Press, 2000.11.
2.        Wang-AiYing,  Organization  and  Structure  of  Computer,    Tsinghua University Press, 2006.

3.        Wang-YuanZhen,  IBM-PC  Macro  Asm  Program,  Huazhong University of Science and Technology Press, 1996.9.

4.        MIPS  Technologies,  Inc.  MIPS32™ Architecture  For  Programmers Volume II: The MIPS32™ Instruction SetJune 9, 2003.

5.        Zheng-WeiMin,  Tang-ZhiZhong.  Computer  System  Structure  (The second edition), Tsinghua University Press,2006.

6.        Pan-Song, Huang-JiYe, SOPC Technology Utility Tutorial , Tsinghua University Press,2006.

7.        MIPS32  4KTMProcessor  Core  Family  Software  User's  Manual  , MIPS Technologies Inc.

8.        Mo-JianKun,  Gao-JianSheng,Computer  Organization,  Huazhong University of Science and Technology Press, 1996.

9.        Zhang-XiuJuan, Chen-XinHua, EDA Design and emulation Practice [M].      BeiJing, Engine Industry Press. 2003. 

10.     "IEEE Standard of Binary Floating-Point Arithmetic” IEEE Standard754, IEEE Computer Society, 1985.

11.     Yi-Kui, Ding-YueHua, Application of AMCCS5933 Controller in PCI BUS, DCABES2007, 2007.7.


17-21

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

7.

Authors:

Rita Jain, B. L. Pal

Paper Title:

Study of Digital Learning and its implementation on Student Mobility in Engineering Education

Abstract:  The advent of information and communication technologies (ICT), learning has entered into an era of change unparalleled in this generation. The issue is, how theoretical knowledge can apply to real world problem? Academics worldwide have come to the conclusion that traditional learning methods must give way to Digital learning (D-learning). However, in order to change a paradigm, there must be a change in the way that people believe, think and act. A change to Digital learning in engineering education is a paradigm that has its associated challenges. Innovations are required so as to accomplish Digital learning in engineering education.  Developing Digital learning tools that will take engineering education beyond traditional capabilities is a part of this challenge. In this paper, I have presented a review on design and development of virtual classroom environment using real-time streaming technology for live and online activity. Student can access the lecture even in presence of mobility for engineering education and exchange their views and ideas on education matter with teachers. This virtual classroom environment with digital learning education can transform the conventional paper education to the paper less education

Keywords:
 Digital learning, Real Time Streaming, Virtual Classroom Environment, BestESM(Best Enhance Student Mobility)


References:

1.        National Center for Education Statistics, The Condition of Education,  Indicator  38.  US  Department  of  Education, (2002).
2.        Mallak,  L.A.,  Challenges  in  implementing  e-learning, Proc. Portland Inter. Conf. on Management of Engng. and Technology, Portland, USA, 298-299 (2001).

3.        Antsaklis, P., et. al., Report on the NSF/CSS workshop on new directions in control engineering education, IEEE Control Systems, 19, 53-58 (1999).

4.        Foss,  B.,  Eikass,  T.  and  Hovd,  M.,  Merging  physical experiments back into the learning arena. Proc. American Control Conf., Chicago, USA, 2944-2948 (2000).

5.        Azad, A.K.M., Otieno, A., Ghrayeb, O. and Anand, N., Internet based experiments for physical laboratory set-up. Proc.  2003  Annual ASEE  Conf.  and  Expo., Nashville, USA, 2003-2158 (2003).

6.        Krynock, B. K. & Robb., L. Is Problem-based Learning a Problem for Your Curriculum. Illinois School Research and Development Journal. Vol. (33) Fall(1996).

7.        Jeff Haywood, Hamish Macleod, Denise Haywood, Nora Mogey & Wilma "Student Views of E-Learning: A Survey of University of Edinburgh WebCT Users ", Ch.126 texas essential knowledge skills for technology (prek-12). Austin, TX. Alexander Texas Education Agency. (2004).

8.        Sunil Kr Sarangi, “Continuing Engineering Education through E-learning: A strategy for development” ,Cryogenic Engineering Centre Indian Institute of Technology Kharagpur – 721 302

9.        Amirrudin Kamsin, “ Is E-Learning the Solution and Substitute for Conventional Learning”,  Faculty of Computer Science & Information Technology, University of Malaya, 50603 KualaLumpur, Malaysia.(2005).

10.     Parviz Doulai,” Enhance Engineering Education using a Simple Virtual Classroom Environment” , Educational Delivery Technologies Laboratory Faculty of Informatics University of Wollongong(1999).

11.     P. Gudimetla and R. Mahalinga Iyer” The Role for E-learning in Engineering Education: Creating Quality Support Structures to Complement Traditional Learning”, 
12.     Charles D.Dziuban,Joel L .Hartman,Patsy D. Moskal University of Central Florida,”Blended Learning”,Educause Center for Applied Research(2004).
13.     Coskun Bayrak, Little Rock, USA,Chris Bowerman, Sunderland, UK Piet Kommers, Twente, Netherlands,Bernd Krämer, Hagen, Germany Emrah Orhun, Montgomery, USA,Yusuf Öztürk, San Diego, California, USA António Ruano, Faro, Portugal,” Fourth Colloquium on International Engineering Education” San Diego StateUniversity (2009).

14.     Paul W. Magoha† &Andrew W. Otieno” The global e- respective of transitioning to e-learning in engineering education”, Jomo Kenyatta University of Agriculture
nd Technology, Nairobi, Kenya† Northern Illinois University, DeKalb, United States of America.(2004).

15.     Faibisoff, S.G. and Willis, D.J.  Distance education: definition and overview. Journal of Education for Library and Information Science, 27, 223-232(1987).

16.     Peter Cheese,  What Keeps Universities from Embracing e-Learning? Retrieved (2004)

17.     http://www.elearningmag.com/ ltimagazine/article/articleDetail.jsp?id=74867

18.     http://www.ipec.org.in/index.php

19.     http://www.dlib.org/dlib/april99/ muramatsu/04muramatsu.html#2.1
20.     http://www.journal.au.edu/ijcim/ 2005/sep05/ijcimv13n3_article7.pdf


22-26

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

8.

Authors:

G.Prasad, N.Sree Ramya, P.V.N.Prasad, G.Tulasi Ram Das

Paper Title:

Modelling and Simulation Analysis of the Brushless DC Motor by using MATLAB

Abstract:  The paper presents a model of three phase star connected brushless dc motor considering the behaviour of motor during commutation. This process is done in MATLAB/ SIMULINK after development of the BLDC motor with sinusoidal and trapezoidal waveforms of back-EMF. A comparision study is presented between the MATLAB/ SIMULINK models of sinusoidal and trapezoidal models of back-EMF.

Keywords:
 BLDC, MATLAB/SIMULINK, EMF.


References:

1.        S. Baldursson, “BLDC Motor Modelling and Control – A MATLAB/Simulink Implementation”, Master Thesis, May, 2005.
2.        Padmaraja Yedamale, “Brushless DC (BLDC) Motor Fundamentals”, Microchip Technology Inc. 2003.

3.        Ayetul Gelen, Saffet Asyasun, “Realization of Power Electronic Converter Based DC Motor Speed Control Method Using MATLAB/Simulink”, International Journal of Engineering Education, Vol.25,pp. 33-41,2009.

4.        B.Indu Rani, Ashly Mary Tom, “Dynamic Simulation of Brushless DC Drive Considering Phase Commutation And Backemf Waveform for Electromechanical Actuator”, IEEE TENCON 2008, Hyderabad.

5.        Balogh Tibor, Viliam Fedák, František Ďurovský “Modelling and Simulation of the BLDC Motor in MATLAB GUI” IEEE paper 2011.pp 1403-1407

6.        Y.S. Jeon, H.S.Mok, G.H.Choe, D.K.Kim and J.S. Ryu, “A New Simulation Model of BLDC Motor with Real Back EMF waveforms”, IEEE CNF. On computers in Power Electronics, 2000. COMPEL 2000.pp. 217- 220, July 2000.   

          

27-31

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

9.

Authors:

Ajinkya C. Dawale, Chandrashekhar N. Sakhale

Paper Title:

Design and Fabrication of Automatic Storage and Retrieval System

Abstract:   The paper summarizes design and fabrication of a cost effective single aisle Automatic storage and retrieval system whose database regarding the status of storage location (either filled or empty) is stored in its own operating system. This system can be efficiently used in material handling or store management. Material handling can be defined as movement of raw-material, semi-finished goods, finished articles through various stages of productions and finally storage of finished product in warehouse. Material handling forms main aspect to be considered in production processes in industries. Starting from the time raw material enters the factory and goes out the factory gate in form of finished product, it is handled at all stages in between, no matter it is in stores or on the shop floor. It has been estimated that the average material handling cost is roughly 40% - 50% of total production cost. Our project aims to ease the efforts in store management. The store of industry comprises of many parts or components which are required at the time of assembly of any product or regular inspection in which it is required to change a particular part or component of product. At this stage it becomes difficult to search a particular part or component in the store. This can be made easy by allotting the part or component, with a specific number which can be detected by sensor in robot’s end effectors and further made available to user, with a help of conveyor. It will also reduce total handling time. It becomes easier, cleaner and safer method of material handling. It will also decrease fatigue incurred by workers, by reducing their physical work. Hence this project proves useful in store management.

Keywords:  material handling, robotic end effector, single asile, conyeyor.


References:

1.       “THE DESIGN OF A RENDEZVOUS STORE FOR SYSTEM AND NETWORK MANAGEMENT” written byM. J. McIntosh, K. F. Lil and E. G. Manning in Department of Electrical and Computer Engineering and Department of Computer Science and University of Victoria, Box 3055, Victoria, B.C., Canada V8W 3P6.
2.       “Analysis and design of haptic telerobstic system” by M.-G.Her, K.-S.Hsu, W.-S.Yu and M.Karkoub in IEE proc- control theory applied vol.148 no.4 ,july 2008.

3.       “An approach for picking optimization in automated warehouse” written by Qi Tang, Fang Xie, published in School of Management, Tianjin Polytechnic University, TianJin 300387, China and School of Application Technology, Tianjin Polytechnic University, TianJin 300387, China also being presented at 2009 Fifth InternationalConference on Natural Computation

4.       “An Expert System for Comprehensive Diagnosis in Store Management System” by Jing Xianyong, Liu Zhanchen, XieZenghui Department of Aerial Weapon Airforce Engineer University Engineering College Xi’an, China and Li Yingchun The 4th Engineer Design Academe of General Staff Office Beijing,

5.       LITRATURE ON “AUTOMATIC STORAGE & RETRIEVAL SYSTEM” PRESENTED BY: GENIXAUTOMATION PVT.LTD., PUNE.

6.       “Development of automatic storage and retrieval system in dynamic knowledge environment” by Liam O’sheabeng submitted to Waterford institute of technology, june 2007.

7.       “The effect of pick density on order picking areas with narrow asile” by Kelvin R.Gue , ruselleD.meller and joseph D. skufca published in IEE transaction- 2006 from pg. 859- 868.

8.       Book “Logistic system design”- Chapter 13

9.       “Design, Development and Analysis of Automated Storage and Retrieval System with Single and Dual Command Dispatching using MATLAB” by M. Aslam, Farrukh, A. R. Gardezi and Nasir Hayat published in World Academy of Science, Engineering and Technology 2009.

10.     Presentation on “Automated Storage & Retrieval System” by Paula Hammett & Sandra Heft Presented at IUG Boston, Book “Advance mechanism design” - George and sandor / Arthur G. Ardman- 

11.     Book “Industrial robots” by Grover

12.     “RELIABILITY OF AUTOMATED STORAGE AND RETRIEVAL SYSTEMS (AS/RS) A WHITE PAPER” written by Ray Kulwiec Ray Kulwiec

13.     “AS/RS APPLICATION, BENEFITS AND JUSTIFICATION IN COMPARISON TO OTHER STORAGE METHODS” written byHoward Zollinger, P.E.Zollinger
 

32-37

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

10.

Authors:

Rajesh G. Khatod, Chandrashekhar N. Sakhale

Paper Title:

Design and Fabrication of Liquid Dispensing Machine Using Automatic Control for Engg. Industry

Abstract:   Liquid dispenser machine is commonly found in our daily life in different places like offices, bus stands, railway stations, petrol pumps. In this thesis we are going to present a touch screen operated liquid dispenser machine. Using a touch screen interface, we can effectively increase operator accuracy, reduce training time and improve overall efficiencies, thus keeping cost down a properly designed touch screen interface can improve overall accuracy.  Present liquid dispenser machine available in industries are costly, complex and hard in design and fabrication. Main requirement from this machine is its metering or measuring quality. Accuracy of measuring is very less in various machine. Hence, the basic theme behind this research is to improve these disadvantages of liquid dispenser machine. The liquid dispenser machine presently available is based on practice and past experience of the employer in his working field and also, its efficiency declines at a greater rate after a period of time. By surveying the present machines and comparing their present limitations, new model will be fabricated so that designs data can be obtained to formulate experimental data based model for this process. The design of model will be so simple that it can be adopted easily by small industries. Easy technology will help to reduce metering problem. The present work reports the design and fabrication of liquid dispenser machine which is used in color industry.

Keywords:
 liquid dispenser machine, MAX232IC, microcontroller, relays, solenoid valve,aquarium pump,hydraulic pump & pcb.


References:

1.       Ah-Rem Oh, Tae-Hyoung “Assembly Sequence Optimization of   Dispensers in SMT In-line System” in SICE Annual Conference in Sapporo, Hokkaido Institute of Tecnology, Japan August 44,2004 pg. no.456-460.
2.       Chun-Fu Lu, Chun-Jung “Anti-wetting trench of nozzle plate for         piezoelectric actuating dispenser”, 674-677 in IEEE 2009.

3.       Zhiqi Ge, Guiling Deng Key “Design and Modeling of Jet Dispenser Based on Giant Magnetostrictive Material” pg. no.974-980 in 2009 International Conference on Electronic Packaging Technology & High Density Packaging.

4.       George J. “The integrated support station a modular,ada based test system to support AN/ALE-47 Countermaser dispenser system testing, evalution & programming”, in IEEE 2009.

5.       F.W.Yap “An adaptive immune algorithm based gravimetric fluid dispensing machine”, journal of structural division,1973.

6.       “Dr. R. K. Bansal”  A Textbook of Fluid Mechanics Laxmi Publication Ltd 1st edition ,2008.

7.       “Andrew parr”   Hydraulics and Pneumatics Elsevier ltd 2nd edition 1998.  

8.       “R.K.Rajput “Fluid Mechanics & Hydraulic Machines Laxmi Publication  Ltd 4th edition.

9.       “S.C.Gupta” Fluid Mechanics & Hydraulic Machines Pearson  Publication     Ltd India  3rd edition.

10.     “Willium Bolton” Hydraulics and Pneumatics: A Technicians and    Engineers Guide butterworth Heinemann publication ltd. 2nd edition 1999.


38-44

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

11.

Authors:

E. E. Duncan, A. Abdul Rahman, C. B. Siew, S.U. Baig

Paper Title:

An Amalgamated 3D Spatial Data Model for City Modelling

Abstract:   3D spatial data models for city modelling have seen great improvement and most cities around the globe are now attempting to create virtual 3D models of their cities. The current city Earth surface is actually an amalgamation of natural and man-made objects above, on and below the city terrain surface. 3D modelling of subsurface objects and their integration with the surface and above surface objects has not seen much progress and the attempt at viewing above surface and subsurface man-made objects for Earth realism not achieved. Level of Details (LoD) for spatial objects has not been extended to man-made features below the surface. LoD0 maps for surface and subsurface integration exist for most city centres but this does not exist for 3D city models. Hence the need for a 3D data model suitable for above and below surface man-made constructions. This paper discusses 3D spatial data models currently in existence for the integration of surface and subsurface models. A suitable geometric and topological 3D object oriented model (3DOOM) is proposed using the 3D TIN as the base model. A vector approach using implicit geometry is used within a Microsoft Visual C plus plus 2010 programming environment with OpenGL libraries to create 3D spatial objects for the above and below surface man-made constructions. The simulation of an integrated 3D spatial model is presented. A stand-alone above and below 3D spatial models for man-made constructions is assessed up to LoD4 for the subsurface and LoD3 for the above surface in an integrated model.

Keywords:
3D City Model, 3D TIN, 3DOOM, City Earth Surface, 3D Spatial Objects.


References:

1.        Apel, M.. From 3D Geomodelling Systems Towards 3D Geoscience Information Systems: Data Model, Query Functionality, And Data Management. Computers & Geosciences, v. 32, iss. 2, 2006 pp. 222-229.
2.        Chen, H. H, and Huang, T. S., A Survey of Construction and Manipulation of Octree. CVGIP 43, 1998, pp.409-431.

3.        Cheng, P. G. and Gong, J. Y., Design of Three-Dimensional Spatial Data Model and Its Data Structure in Geological Exploration Engineering. Acta Geodaetica et Cartographica Sinica 30 1, 2001, pp.74-81. (in Chinese)

4.        Coors, V., 3D-GIS in Networking Environments, Computer, Environments and Urban Systems, Vol. 27/4, Special Issue 3D Cadastre, 2003, pp 345 – 357.

5.        Dai, W. J. and Zou, Z. R., Study of the Volume-Based 3-Dimensional GIS Data Model. Mine Surveying (1), 2001, pp.20-22. (in Chinese)

6.        Gabriel Courrioux, Stephane Nullans, Antonio Guillen, Jean Daniel Boissonnat, Philippe Repusseau, Xavier Renaud and Muriel Thibaut, 3D Volumetric Modelling Of Cadomian Terranes (Northern Brittany France): An Automatic Method Using Voronoi Diagrams. Tectonophysics. 331, 2001, pp.181-196.
7.        Ledoux, H. and Gold, C. M. Modelling Three-dimensional Geoscientific Fields with Voronoi Diagram and its Dual. Int. J. of Geographical Information Science. Vol. 22. Nos 4 – 5, April – May 2008, 547 – 574.
8.        Penninga, F. and Oosterom, P. J. M., A Simplicial Complex-Based DBMS Approach to 3D Topographic Data Modelling, Int J. Geographic Information Science, Vol. 22. Nos 6-7, June-July 2008, 751-779.`             

9.        Pilouk, M., Tempili, K. and Molenaar, M., A Tetrahedron-Based 3D Vector Data Model For Geoinformation. Advanced Geographic Data Modelling, 40, 1994,129-140.

10.     Shi, W. Z., A Hybrid Model For 3D GIS. Geoinformatics 1, 1996, pp.400-409.

11.     Shi, W. Z., Development Of A Hybrid Model For Three-Dimensional GIS. Geo-Spatial Information Science 3 2, 2000, pp.6-12.

12.     Wu, L. X., Shi, W. Z. and Christopher, G. M., Spatial Modelling Technologies for 3D GIS and 3D GMS. Geography and Geo-information Sciences 19 1, 2003, pp.5
11.

13.     Zhang, Y. and Bai, S. W. An Approach of 3D Stratum Modeling Based on Tri-Prism Volume Elements. Journal of Image and Graphics 6 3, 2001, pp.285-290. 

14.     Abdul-Rahman, A. and Pilouk, M, Spatial Data Modelling for 3D GIS, published by Springer Berlin-Heidelberg, New York, 2008, 289pp.

15.     Breunig, M. and Zlatanova, S. 3D Geo-DBMS. In Zlatanova, S. And Prosperi, D. (eds.), Large-scale 3D Data Integration-Challenges and Opportunities: 2006, 87-115. London: Taylor and Francis.

16.     Emgard, L. and S. Zlatanova, Design Of An Integrated 3D Information Model, in Coors, Rumor, Fendel and Zlatanova (eds.) Urban and Regional data Management, UDMS Annual 2008, Taylor and Francis Group, London, 2008, pp. 143-156.

17.     Gong, J. Y., Cheng P. G., Liu R., Li D. J. and Liu S. H., Study on 3D Modeling and Visualization in Geological Exploration Engineering. In Proc. ISPRS Commission II Sym. On Integrated System For Spatial Data Production, Custodian And Decision Support, 2002, pp.133-138.

18.     Kolbe, T. H., Representing and Exchanging 3D City Models with CityGML, Lee, J., Zlatanova, S. (Eds), 3D Geoinformation Sciences, Springer Verlag, Berlin Heidelberg, 2009.

19.     Lattuada, R. Three-dimensional representations and data structures in GIS and AEC. In: Zlatanova, S. & Prosperi, D. (eds.), Large-scale 3D data integration-Challenges and Opportunities: 2006, 57-86. London: Taylor and Francis.

20.     Abdul-Rahman, A. The Design and Implementation of a two and Three dimensional Triangular Network based GIS, PhD Thesis, University of Glasgow, U. K., 2000, 204pp.

21.     Breunig, M., Bode, T. and Cremers, A., Implementation of Elementary Geometric Database Operations for a 3D GIS. In: Proc. Of the 6th Int. Symp. On Spatial Data Handling. 1994.

22.     Breunig, M., Cremers, A., Muller, W. and Siebeck, J., New Methods for Topological Clustering and Spatial Access in Object-oriented 3D databases. In: Proc. Of the 9th ACM Int. Symp. On Advances in Geographic Information Systems, 2001.

23.     Charlton, J., Horne, M. and Giddings, B., A Holistic Approach to Urban Design Using 3D Computer Modelling, Design and Decision Support Systems, The Netherlands, 2008.

24.     Hack, R., Orlic, B., Ozmutlu, S., Zhu, S. and Rengers, N. Three And More Dimensional Modelling In Geo-Engineering. Bulletin of Engineering Geology and the Environment 65(2): 2006. 143-153.

25.     Hassan, M. I. and Abdul Rahman, A., An integrated Malaysia cadastral system. FIG Congress 2010, Sydney, Australia, 2010.

26.     Horne, M., Thompson, E. M. and Podevyn, M., An Overview of Virtual City Modelling: Emerging Organisational Issues... CUPUM07 10th International Conference on Computers in Urban Planning and urban Management, Iguassau Falls, Brazil, 2007.

27.     Koshak, N. and Flemming, U., Object Oriented Data Modelling and Warehousing to Support Urban Design. 6th International Conference and Decision Support Systems in Architecture and Planning, July 7 – 10, 2002. Ellecom, The Netherlands.

28.     Molenaar, M., A Formal Data Structure for 3D Vector Maps,  Proceedings of EGIS’90 Vol.2, Amsterdam, The Netherlands, 1990, pp 770 – 781.

29.     Pilouk, M., Integrated Modelling for 3D GIS. PhD dissertation, ITC Publications No 40, The Netherlands, 1996, 200pp.

30.     Podevyn, M., Horne, M., Fisher, P. and Thompson, E. M.,  Global Visualisation Engines – Issues for Urban Landscape Planning Participation Processes, Digital Design in landscape Architecture Proceedings, Anhalt University of Applied Sciences, 2008.

31.     Ross, L., Bolling, J., Dollner, J. and Kleinschmit, B.., Enhancing 3D City Models with Heterogeneous Spatial Information: Towards 3D land Information Systems, Sester, M., Bernard, L and Paelke, V (Eds) Advances in GIScience, Proceedings of the 12th AGILE Hannover, 2009.

32.     Schwandl, R. Glasgow,
http://www.urbanrail.net/eu/uk/gla/ glasgow.htm 2004,Accessed on: 25th October 2010.
33.     Thompson, E. M. And Horne, M., 3D-GIS Integration for Virtual NewcastleGateshead, 28th eCAADe Conference, Future Cities, September 15-18, 2010, Zurich-Switzerland, pp 2010, 767 -775.

34.     Wang, Y. 3D GIS Spatial Modelling for City Surface and Subsurface Integration, published by IEEE, 2006, pp 1511 – 1518. 

35.     Zhou, I., Lu, G., Sheng, Y., Xu. H., and Wang, H., A 3d GIS’s Spatial Data Model Based on Cell Complex. The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences. Vol. XXXVII Part B2, Beijing, 2008. pp 905 – 908.

36.     Zlatanova, S., Abdul Rahman, A and Pilouk, M  “3D GIS: Current Status and Perspectives” ISPRS Commission IV, WGIV/1, 2002, pp1-6.

37.     Zlatanova, S.. 3D GIS for Urban Development, PhD Thesis, ITC Dissertation Series No 69. The International Institute for Aerospace Survey and Earth Sciences, The Netherlands, 2000.


45-49

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

12.

Authors:

Rakesh Kumar, Gunjan Gupta

Paper Title:

Study of Fractal Circular Patch Micro-Strip Antenna over Traditional Antenna

Abstract:   Today’s antenna systems demand versatility and unobtrusiveness. Operators are looking for systems that can perform over several frequency bands or are reconfigurable as the demands on the system changes. Microstrip or patch antennas are becoming increasingly useful because they can be printed directly onto a circuit board. Microstrip antennas are becoming very widespread within the mobile phone market. Fractal antennas have entered the view of many as a very promising solution. Fractal antennas size can be shrunk from two to four times with surprising good performance over Traditional antenna. Because FEAs(Fractal Element Antenna) are self-loading, no antenna tuning coils or capacitors are necessary. Fractal antenna theory is built, as is the case with conventional antenna theory, on classic electromagnetic theory. Fractal antenna theory uses a modern (fractal) geometry that is a natural extension of Euclidian geometry. Dual and Triple band Fractal circular micro-strip antennas offers increase in bandwidth and gain at all multiband as well as the size of antenna gets reduced.

Keywords:
 Fractal’s definition, fractal antenna element, types of fractal, fractal geometry, micro-strip antenna.


References:

1.        Gianvittorio, J. P.,YEAR. Fractals, MEMS and FSS Electromagnetic    Devices: Miniaturization and Multiple Resonances. University of California, Los Angeles.
2.        Jaggard, D. L., 1995. Fractal Electrodynamics: Wave Interaction with Discretely self-similar structures in electromagnetic Symmetry. Taylor and Francis Publishers, Washington D.C., 1995, pp. 231-281.

3.        Fractus. The Technology of Nature.  www.Fractus.com

4.        www.Fractal.Antenna offer Benefits-size can be shrunk from two to four times.htm.

5.        Balanis, A., Antenna Theory Analysis and Design. John Wiley and Sons, 1997.

6.        David, M.P., Microwave and RF Design of wireless system. John Wiley and Sons, 2001.

7.        David, M.P., Microwave Engineering. New York, John Wiley and Sons, 2nd edition, 1988.

8.        Randy Bancroft, “Micro strip antenna design”.

9.        Kraus John Daniel and Marhefka Ronald (2002). Antenna: For all application.3rd editions, New York, Mc Graw Hill.

10.     Kordzadeh and Kashani, F. H., 2009. A new reduced size micro strip patchantenna with fractal shaped defects. Progress in Electromagnetic Research B, Vol.11, pp. 29–37.

11.     Werner, D.H.  and Ganguly,S., 2003. An Overview of fractal antenna engineering research. IEEE Antennas and Propagation Magazine, vol. 45, February2003.

12.     Tian Tiehong and   Zhou Zheng, 2003, A novel multiband antenna: Fractal antenna, Beijing university of posts and telecommunication, Proceedings of ICCT2003, pp..

13.     Madelbrot, B.B., 1983, The fractal geometry of nature. New York, W.H Freeman.

14.     Azeri, A. and Rowan, J., 2008. Ultra wideband fractal micro strip antenna design. Progress in Electromagnetic Research C, Vol. 2, pp.7-12.

15.     Pilevari, S.M., Kashani, F. H. and Azarmanesh, M. N., 2008. A novel broadband fractal Sierpinski shaped micro strip antenna. Progress In Electromagnetic Research C, Vol. 4, pp. 179-190.

16.     Puente, C., Navaro, M., Romeu, J. And Paus, R., 1998. Variation on the fractal sierpinski antenna flare angle. Electronics Letter.

17.     Carles, P. B., Romeu, J. and Cardama, A., 2000. The Koch Monopole: A Small Fractal Antenna. IEEE Transaction on Antenna and Propagation, Vol. 48, Issue 11.

18.     Khan, A. S. N., Hu, J., Xiong, J., and He, S., 2008. Circular fractal monopole antenna for low VSWR UWB application. Progress in Electromagnetic Research Letters, Vol. 1, pp. 19-25.

19.     Lai, T.F., Mahadi, W.N.L, and Soin, N., 2008. Circular Patch Micro strip  Array Antenna for KU-band. World Academy of Science, Engineering and Technology, pp. 48.

20.     Saidatul, N. A., Azremi, A. A. H., Ahmad, R. B., Soh, P. J.  and Malek, F.,2009.Multiband fractal planar  inverted antenna (F-PIFA) for mobile phone application. Progress in Electromagnetic Research B, Vol. 14, pp.127-148.

21.     Liang, et.al, J., 2005. CPW-fed circular disc monopole antenna for UWB application. IEEE International Workshop on Antenna and Technology:  Small Antennas and Novel Met materials, Marina Mandarin, Singapore, pp. 505-508.

22.     Park, J., Hyung, N.G., and Baik, S.H., 2004. Design of a modified L-probe fed micro strip patch antenna,” IEEE Antenna and Wireless Propagation Letters, Vol. 3.

23.     Guo, Y.X., Luk, K.M., and Lee, K.F., 2003. L-probe fed thick-substrate patch antenna mounted on a finite ground plane. IEEE Transactions on Antenna and Propagation, Vol. 51, Issue. 8, pp. 1955.

24.     Pirai, M. And Hassani, H.R., 2008. L-probe fed circular polarized wideband planar patch antenna on cylindrical structure. Progress in Electromagnetic Research C, Vol. 3, pp-161-167.

25.     Guo,Y.X., Luk, K.M., and Lee, K.F.,U-slot circular patch antennas with L- probe Feeding.  


50-55

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

13.

Authors:

S. Ahmed, S. M. Nirkhi

Paper Title:

A Unified Approach for Forensic Analysis of DDOS Attack in Manet

Abstract:   Mobile Ad Hoc Network (MANET) facilitates distributed wireless communication without pre-existing centralised infrastructure. The network is mobile and setting of connection is ad-hoc.The design of MANET helps improving network scalability, as well as reducing the time to deploy a new network infrastructure.  However, the benefits of MANET come with the cost in reduced security. A typical DDoS attack is the flooding attack in which attackers paralyse the target networks by flooding excessive volume of traffic to deplete key resources of the target. When an attack on the target system is successful enough to crash or disrupt, this event as the breach that triggers investigation. Forensic investigation provide source of network evidence and helpful in design and recovery mechanism for network attacks. This paper review various work done in the field of DDoS attack forensic for MANET.

Keywords:
 DDoS attack, Fuzzy logic, MANET, Network forensics

References:

1.        Yinghua Guo, Matthew Simon, “Network forensics in MANET: traffic analysis of source spoofed DoS attacks”, Nov 2010 IEEE Fourth International Conference on Network and  System Security.
2.        Yinghua Guo, Matthew Simon, “Forensic analysis of DoS attack traffic in MANET”, Nov 2010 IEEE Fourth International Conference on Network and System Security.

3.        ing Zhu, “Attack pattern discovery in forensic investigation of network attacks”, Aug 2011 IEEE journal on selected areas in communications.

4.        Slim Rekhis and Noureddine Boudriga, “A Formal Rule-based Scheme for Digital Investigation in Wireless Ad-hoc Networks” 2009 Fourth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.

5.        Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei, “A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks “, Chapter 12, 2006.

6.        Taner Tuncer Yetkin Tatar, “Detection SYN Flooding Attacks Using Fuzzy Logic”, 2008 International Conference on Information Security and Assurance.

7.        Jung-Sun Kim, Dong-Geun Kim, Bong-Nam Noh, “A Fuzzy Logic Based Expert System as a Network Forensics”, July, 2004 IEEE.

8.        T. Karygiannis and L. Owens, Wireless Network Security-802.11, Bluetooth and Handheld Devices. National Institute of Standards and Technology. Technology Administration, U.S Department of Commerce, Special Publication 800-848, 2002.

9.        R. Nichols and P. Lekkas, Wireless Security-Models, Threats, and Solutions, McGraw-Hill, Chapter 7, 2002.

10.     A. Perrig, J. Stankovic, D.Wagner and C. Rosenblatt, Security in wireless sensor networks, ACM Communication Journal, Vol. 47, No. 6, PP. 53-57, 2004

11.     Q. Gu, P. Liu and C.H. Chu, Tactical bandwidth exhaustion in ad hoc networks, Proceedings of the Fifth Annual IEEE Information Assurance Workshop, PP. 257-264, 2004.

12.     Aad, J.P. Hubaux and E.W. Knightly, Denial of service resilience in ad hoc networks, Proceedings of the 10th annual international conference on Mobile computing and networking, PP. 202-215, 2004

13.     Y. Guo, M. Simon, “Network forensics in MANET: traffic analysis of source spoofed DoS attacks,” in Proceedings of 2010 Fourth International Conference on Network and System Security (NSS 2010), 2010. 

14.     Wang, D. Zang, K.G. Shin, “Detecting SYN Flooding Attacks” Proceedings of IEEE INFOCOM02, 2002.

15.     V. A. Siris, Fotini P. “Application of Anomaly Detection Algorithms for Detecting SYN Flooding Attack”, Elseiver, Computer Communications(29), pp:1433-1442, 2006.

16.     R.B.Blazek, H. Kim, B.Rozovskii, A. Tartakovsky, “ A Novel Approach to Detection of Denial of Service Attacks via Adaptive Sequential and Batch Sequential Change Point Detection Methods, Proceedings of IEEE Workshop on Systems Man and Cybernetics Information Assurance, 2001.

17.     H. Wang, D. Zang, K.G. Shin, “ Change-Point Monitoring for the Detection of DoS Attacks”, IEEE Transaction on Dependable and Secure Computing, vol:1 No:4, pp:193-208, 2004.
18.     Y. Oshita, S. Ata, M. Murata, “Detecting Distrubuted Denial of Service Attacks by Analyzing TCP SYN Packets Statistically”, pp:2043-2049 Globecom2004.
19.     Leu F.Y., Yang W.J., “Intrusion Detection with CUSUM for TCP based DDoS”, LNCS 3823, pp:1255-1264, 2005.

20.     Jochen H. Schiller, “Mobile communication”, Pearson education, chapter 8, 2008.


56-58

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

14.

Authors:

Kamal Kumar, Poonam Sharma

Paper Title:

Location Dependent Key management Scheme for Wireless Sensor Network

Abstract:   WSN is an emerging technology and have great potential to be employed in critical situations like battlefields and commercial applications such as building, traffic surveillance, habitat monitoring and smart homes and many more scenarios. One of the major challenges wireless sensor networks face today is security. To deliver data without being compromised, WSN services rely on secure communication and key distribution. The existing key management solutions require a large memory space and more number of keys to be stored on each sensor node and still compromise of sensor nodes is critical issue, which must be considered. LDK is most widely used scheme now a days so we tried to work on this scheme. The aim of this paper is to analyze the proposed key management schemes for WSN based on their performance by realizing different environments. The analysis has been done theoretically and implemented through JAVA.

Keywords:
 LDK, LEAP, SPINS, WSN.


References:

1.        Ian Akyildiz, Weilian Su, Yogesh Sankarasubramaniam, and Erdal Cayirci. A survey on sensor networks. IEEE Communications Magazine 40, 8:102{114, 2002.
2.        R. L. Rivest, A. Shamir, and L. M. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120–126, 1978.

3.        A. Perrig, R. Szewczyk, V. Wen, D. Cullar, and J. D. Tygar, “Spins: Security protocols for sensor networks,” in Proceedings of the 7th Annual ACM/IEEE Internation Conference on Mobile Computing and Networking (MobiCom), Rome, Italy, July 2001, pp. 189–199

4.        F. Anjum, “Location dependent key management in sensor networks without using deployment knowledge,” in Communication Systems Software and  Middleware, 2007. COMSWARE 2007. 2nd International Conference on, 2007, pp. 1–10.

5.        Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, pp.197-213(May-2003)

6.        Lai, B., Kim, S., Verbauwhede, I.: Scalable session key construction protocol for wireless sensor networks. In: Proceedings of the IEEE Workshop on Large Scale RealTime and Embedded Systems LARTES (December 2002)

7.        Zhu, S., Setia, S., Jajodia, S.: “LEAP: Efficient Security Mechanisms for Large- Scale Distributed Sensor Networks”. In: Proceedings of the Tenth ACM conference on Computer and Communications Security, pp. 62–72 (October 2003)

8.        Perrig, A., Szewczyk, R., Wen, V., Cullar, D., Tygar, J.D.: “SPINS: Security protocols for sensor networks”. In: Proceedings of the 7th Annual ACM/IEEE International Conference on Mobile Computing and Networking, pp. 189–199 (July 2001)

9.        Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on Computer and communications security, pp. 41–47 (November 2002)

10.     Du, W., Deng, J., Han, Y.S., Varshney, P.K., Katz, J., Khalili, A.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. In: Proceedings of the ACM Transactions on Information and System Security, pp. 228–258 (August 2005)

11.     Liu, D., Ning, P., Li, R.: Establishing Pairwise Keys in Distributed Sensor Networks. In: Proceedings of the ACM Transactions on Information and System Security, pp. 41–77 (February 2005)

12.     Anderson, R., Chan, H., Perrig, A.: Key Infection : Smart Trust for Smart Dust. In: Proceedings of the 12th IEEE International Conference on Network Protocols, pp. 206–215 (October 2004)

13.     13. L. Eschenauer and V. Gligor. A key-management scheme distributed sensor networks. In Proceedings of the 9th ACMConference on Computer and Communications Security, pages41-47, Nov 2002.


59-63

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

15.

Authors:

K. Sahitya Yadav, M. Prameela, K. Sumanth, G. Radhakrishna Murthy, Pradeep M. Nirgude

Paper Title:

Interpreting Transformer Winding Axial Displa- cements using Transfer Function Parameters

Abstract:   The paper presents the results of   the experimental investigation carried out on a transformer to obtain frequency response data under axial displacements. These displacements were physically simulated to study and identify the various parameters that influence the frequency responses. Transfer Function using real rational polynomial technique was computed from the frequency response data. Various transfer function parameters were computed for reference and simulated faulty frequency response data. These parameters are then analyzed to relate changes to characterize the defects. The analysis presented based on the transfer function characteristic parameter changes will help in diagnosing transformer winding axial displacements.

Keywords:
 Frequency Response Analysis, Real rational polynomial technique, Transfer Function, Transformer winding axial displacement.


References:

1.       J. Lapworth and T.McGrail, “Transformer winding movement detection by frequency response analysis,” Proc. 66th Annual International Conference of Doble Clients- April, 1999, Boston, USA.
2.       J.W. Kim, B. Park, S.C. Jeong, S.W. Kim, and P. Park, “Fault diagnosis of a power transformer using an improved frequency response analysis,” IEEE Trans. on Power Delivery, 20, (21), pp.169-178, Jan. 2005

3.       Leibfred,T., and Feser, K.: “Monitoring of power transformers using the transfer function method”, IEEE Trans. on Power Delivery, Vol.14, No.4, pp. 1333-1341, October 1999.

4.       Dick, E.P., and Erven, C.C.: ‘Transformer diagnostic testing by frequency response analysis’, IEEE Trans. on Power App. and Syst., Nov.-Dec.1978, PAS-97, (6), pp. 2144-2153

5.       CIGRE SC12 Transformer Colloquium, Summary on behalf of Study Committee 12, Budapest, 14 -16 June 1999.

6.       D.M. Sofian, Z.D. Wang, J.A.S.B. Jayasinghe, P.N.Jarman and S.A.Ryder, “Analysis and interpretation of Transformer FRA measurement Results using Transfer Function Estimation,” Proc. XIV ISH, Tsinghua University, Beijing, China, August 25-29, 2005.

7.       CIGRE Working Group-A2.26 document on “Mechanical-Condition Assessment Of Transformer Windings Using Frequency Response Analysis (FRA)”, 2008.

8.       Users Guide with MATLAB, The Mathworks, Inc, 2006.  


64-69

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

16.

Authors:

M. Ganesh, V. Palanisamy

Paper Title:

An Efficient Segmentation Technique for Mri Medical Images

Abstract:   Image segmentation is a technique to locate certain objects or boundaries within an image. Image segmentation plays a crucial role in many medical imaging applications. There are many algorithms and techniques have been developed to solve image segmentation problems. Spectral pattern is not sufficient in high resolution image for image segmentation due to variability of spectral and structural information. Thus the spatial pattern or texture techniques are used. Thus we proposed an efficient image segmentation technique, in which we have used the concept of Adaptive Fuzzy C-Means Algorithm for segmentation of high resolution medical image. The proposed method is implemented in Matlab and verified using various kinds of high resolution medical images. The experimental results shows that the proposed image segmentation system is efficient than the existing segmentation systems.

Keywords:
 Image Segmentation, Adaptive Fuzzy C-Means Algorithm, Clustering, Gabor Filter, Morphological Operation.


References:

1.        Birgani P. M, Ashtiyani M, Asadi S, “MRI Segmentation Using Fuzzy C-means Clustering Algorithm Basis Neural Network,” ICTTA, 2008.
2.        Pietikainen M, Hadid A, Zhao G, Ahonen T ,2011,” Computer Vision Using Local Binary Patterns,” Computational Imaging and Vision 40- Springer-Verlag London Limited 2011.

3.        Weiling Cai, Songcan Chen, and Daoqiang Zhang, 2007, "Fast and Robust Fuzzy C-Means Clustering Algorithms Incorporating Local Information for Image Segmentation," Journal of Pattern Recognition, Vol. 40, No. 3, pp. 825-838.

4.        Christoph Rhemann, Carsten Rother, Alex Rav-Acha, and Toby Sharp, 2008, "High Resolution Matting via Interactive Trimap Segmentation," In Proc. of the CVPR’08.

5.        Roger Trias-Sanz, Georges Stamon, and Jean Louchet, 2008, "Using colour, texture, and hierarchial segmentation for high-resolution remote sensing," ISPRS Journal of Photogrammetry & Remote Sensing, Vol. 63, pp. 156-168.

6.        Dorr A.E, J.P. Lerch, S. Spring. Kabani, and R.M. Henkelmanb,2008, "High resolution three-dimensional brain atlas using an average, magnetic resonance image of 40 adult C57Bl/6J mice,” Journal of Neuro Image, Vol. 42, pp. 60-69.

7.        Esch T, M. Thiel, M. Bock, A. Roth, and S. Dech, 2008, "Improvement of Image Segmentation Accuracy Based on Multiscale Optimization Procedure," IEEE Geoscience and Remote Sensing Letters, Vol. 5, No. 3, pp. 463-467.

8.        Frederic Galland, Jean-Marie Nicolas, Helene Sportouche, Muriel Roche, Florence Tupin, and Philippe Refregier,2009, "Unsupervised Synthetic Aperture Radar Image Segmentation Using Fisher Distributions," IEEE Tractions on Geoscience and Remote Sensing, Vol. 47, No. 8, pp. 2966-2972

9.        Daniel Glasner, Tao Hu, Juan Nunez-Iglesias, Lou Scheer, Shan Xu, Harald Hess, Richard Fetter, Dmitri Chklovskii, and Ronen Basri,2011. "High Resolution Segmentation of Neuronal Tissues from Low Depth-Resolution EM Imagery," In Proc. of the 8th international conference on Energy minimization methods in computer vision and pattern recognition, pp. 261-272.


70-73

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

17.

Authors:

M. Ashokchakravarthi, K.V. Ramana Rao

Paper Title:

A VLSI Implementation of Modulo   Multiplier By Using Radix-8 Modified Booth Algorithm

Abstract:   A special moduli set Residue Number System (RNS) of high dynamic range (DR) can speed up the execution of very large word-length repetitive multiplications found in applications like public key cryptography. The modulo 2n-1multiplier is usually the noncritical datapath among all modulo multipliers in such high-DR RNS multiplier. This timing slack can be exploited to reduce the system area and power consumption without compromising the system performance. With this precept, a family of radix-8 Booth encoded modulo 2n-1 multipliers, with delay adaptable to the RNS multiplier delay, is proposed. The modulo 2n-1multiplier delay is made scalable by controlling the word-length of the ripple carry adder, k employed for radix-8 hard multiple generation. Formal criteria for the selection of the adder word-length are established by analyzing the effect of varying k on the timing of multiplier components. It is proven that for a given n, there exist a number of feasible values of k such that the total bias incurred from the partially-redundant partial products can be counteracted by only a single constant binary string. This compensation constant for different valid combinations of n and k can be precomputed at design time using number theoretic properties of modulo 2n-1 arithmetic and hardwired as a partial product to be accumulated in the carry save adder tree. The proposed radix-8 Booth encoded modulo 2n-1multiplier saves substantial area and power consumption over the radix-4 Booth encoded multiplier in medium to large word-length RNS multiplication.

Keywords:
 Booth algorithm, design space exploration, modulo arithmetic, multiplier, residue number system (RNS).


References:

1.        R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public key cryptosystems,” Commun. ACM, vol. 21, no.2, pp. 120–126, Feb. 1978.
2.        V.Miller, "Use of elliptic curves in cryptography," in Proc. Advances in Cryptology- CRYPTO'85, Lecture Notes in Computer Science, 1986, vol.218, pp. 417-426.

3.        N. Koblitz, “Elliptic curve cryptosystems,” Mathemat. of Comput., vol.48, no. 177, pp. 203–209, Jan. 1987.

4.        National Institute of Standards and Technology [Online]. Available: http://csrc.nist.gov/publications/PubsSPs.html
5.        A. K. Lenstra and E. R. Verheul, “Selecting cryptographic key sizes,”J. Cryptol., vol. 14, no. 4, pp. 255–293, Aug. 2001.
6.        C. McIvor, M. McLoone, and J. V. McCanny, “Modified Montgomery  modular multiplication and RSA exponentiation techniques,”IEE Proc. Comput. and Dig.Techniq., vol.151, no. 6, pp. 402–408, Nov.2004.

7.        C. McIvor, M. McLoone, and J. V. McCanny, “Hardware elliptic curve  cryptographic processors over GF (p) ,” IEEE Trans. Circuits Syst.I, Reg. Papers, vol. 53, no. 9, pp. 1946–1957, Sep. 2006.

8.        J. C. Bajard and L. Imbert, “A full RNS implementation of RSA,”  EEE  Trans. Comput. – Brief Contributions, vol. 53, no. 6, pp. 769–774,   Jun. 2004.

9.        H. Nozaki, M. Motoyama, A. Shimbo, and S. Kawamura, “Implementation of RSA algorithm based on RNS Montgomery          multiplication.” in Proc. Workshop on Cryptographic Hardware and  Embedded Systems, Paris, France, May 2001, pp. 364–376.

10.     T. Stouraitis and V. Paliouras, “Considering the alternatives in low-  power design,” IEEE Circuits Devices Mag., vol. 17, no. 4, pp. 22–29, Jul. 2001.

11.     S. Pontarelli, G. C. Cardarilli, M. Re, and A. Salsano, “Totally fault tolerant RNS based FIR filters,” in Proc. 14th IEEE Int. On-Line Testing Symp., Rhodes, Greece, Jul. 2008, pp. 192–194.

12.     I. Steiner et al., “A fault-tolerant modulus replication complex FIR  Filter,” in Proc. 16th IEEE Int. Conf. Application-Specific SystemsArchitecture and Processors, Samos, Greece, Jul. 2005, pp. 387–392.

13.     N.S. Szabo and R. I. Tanaka, Residue Arithmetic and its Applications to Computer Technology. New York: McGraw-Hill, 1967.

14.     M. A. Soderstrand, W. K. Jenkins, G. A. jullien , and F. J. Taylor, Residue Number System Arithmetic: Modern Applications in Digital Signal processing. New York: IEEE Press, 1986.

15.     P. V. A. Mohan, Residue Number Systems: Algorithms and Architectures.   Norwell, MA: Kluwer, 2002.

16.     I. Kouretas and V. Paliouras, “A low-complexity high-radix RNS multiplier,” IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 56, no. 11, pp.2449–2462, Nov. 2009.

17.     G. Dimitrakopoulos and V. Paliouras, “A novel architecture and a systematic graph-based optimization methodology for modulo multiplication,” IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 51, no. 2, pp.354–370, Feb. 2004.

18.     A. A. Hiasat, “New efficient structure for a modular multiplier for   RNS,” IEEE Trans. Comput., vol. 49, no.2, pp. 170-174, Feb.2000.

19.     A. A. Hiasat and H. S. Abdel-Aty-Zohdy, “Residue-to-binary arithmetic converter for the moduli set {2k,2k-1,2k-1-1},”IEEE Trans. Circuits Syst. II, Analog Digit. Signal Process., vol. 45, no. 2, pp. 204-209, Feb.1998.

20.     B. Cao, C. H. Chang, and T. Srikanthan, “An efficient reverse converter for the 4-moduli set {2n-1,2n,2n+1,22n+1} based on the New Chinese  Remainder Theorem,”  IEEE Trans. Circuits Syst. I, Fundam. Theory Appl., vol. 50, no. 10, pp. 1296–1303, Oct. 2003.

21.     B. Cao, T. Srikanthan, and C. H. Chang, “Efficient reverse converters  for four-moduli sets  {2n-1,2n,2n+1,2n+1-1} and {2n-1,2n,2n+1,2n-1-1},”   

22.     EE Proc. Comput., Dig.Techniq., vol.152, no. 5, pp. 687–696, Sep. 2005.

23.     B. Cao, C. H. Chang, and T.Srikanthan, “A residue-to-binary converterfor a new five-moduli set,” IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 54, no. 5, pp. 1041–1049, May 2007.

24.     P. V. A. Mohan and A. B. Premkumar, “RNS-to-binary converters for two four-moduli sets {2n-1,2n,2n+1,2n+1-1} and{2n-1,2n,2n+1,2n+1+1}  ,”IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 54, no. 6,  pp. 1245–  1254, Jun. 2007.

25.     P. V. A. Mohan, “RNS-to-binary converter for a new three moduli set {2n+1-1, 2n, 2n-1},” IEEE Trans. Circuits Syst. II, Exp. Briefs, vol. 54, no. 9, pp. 775–779, Sep. 2007.

26.     T. Tomczak, “Fast sign detection for RNS {2n-1, 2n, 2n+1},” IEEE  Trans. Circuits Syst. I, Reg. Papers, vol. 55, no. 6, pp. 1502–1511, Jul.2008.

27.     T.  Stouraitis, S.  W.  Kim, and A.  Skavantzos, “Full adder-based  arithmetic units for finite integer rings,” IEEE Trans.  Circuits Syst.  II, Analog Digit. Signal Process., vol. 40, no. 11, pp. 740–745, Nov.1993.

28.     D. J. Soudris, V. Paliouras, T. Stouraitis, and C. E. Goutis, “A VLSI design methodology for RNS full adder-based inner product architectures,” IEEE Trans. Circuits Syst. II, Analog Digit. Signal Process., vol.44, no. 4, pp. 315–318, Apr. 1997.

29.     J. M. Rabaey, A. Chandrakasan and B. Nikolic, Digital Integrated Cir-  cuits. Upper Saddle River, NJ: Prentice-Hall, 2003.

30.     R. Zimmermann, “Efficient VLSI implementation of modulo (2n±1)addition and multiplication,” in Proc. 14th IEEE Computer Arithmetic, Adelaide, Australia, Apr. 1999, pp. 158–167.

31.     M. J. Flynn and S. F. Oberman, Advanced Computer Arithmetic Design. New York: Wiley, 2001.

32.     S. J. Piestrak, “Design of squares modulo A with low-level pipelining,”

33.     IEEE Trans. Circuits Syst. II, Analog Digit. Signal Process., vol. 49, no.1 , pp. 31–41, Jan. 2002.

34.     C. Efstathiou, D. Nikolos, and J. Kalamatianos, “Area-time efficient modulo 2n-1 adder design,” IEEE Trans. Circuits Syst. II, Analog Digit. Signal Process., vol. 41, no. 7, pp. 463–467, Jul. 1994.

35.     L. Kalampoukas, D. Nikolos, C. Efstathiou, H. T. Vergos, and J.  Kalamatianos, “High-speed parallel-prefix modulo 2n-1 adders,”              IEEE Trans. Comput., vol. 49, no. 7, pp. 673–680, Jul. 2000.

36.     G. Dimitrakopoulos, D. G. Nikolos, H. T. Vergos, D. Nikolos, and C  Efstathiou, “New architectures for modulo 2n-1 adders,” in Proc. 12th    

37.     IEEE Int. Conf. Electronics, Circuits and  Systems, Gammarth, Tunisia, Dec. 2005, pp. 1–4.

38.     R. A. Patel, M. Benaissa, and S. Boussakta, “Fast Parallel-prefix  architectures with a single representation of zero,” IEEE Trans.          Comput., vol. 56, no. 11, pp. 1484–1492, Nov.2007.

39.     R. Muralidharan and C. H. Chang, “Fast hard multiple generatorsfor radix-8 Booth encoded modulo 2n-1 and modulo 2n+1         multipliers,”  Proc. 2010 IEEE Int. Symp. Circuits and Systems, Paris, France, Jun.2010, pp. 717–720.

40.     C. Nagendra, M. J. Irwin, and R. M. Owens, “Area-time-power trade- offs in parallel adders,” IEEE Trans. Circuits Syst. II, Analog Digit.Signal Process., vol. 43, no. 10, pp. 689–702, Oct. 1996.

41.     G. W. Bewick, “Fast multiplication: Algorithms and implementation,”Ph.D. dissertation, Stanford Univ., Stanford, CA, 1994.


74-80

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

18.

Authors:

A.Venkateswara Rao, NVS Manikanta, Md.Riyajuddin Basha, Nagaraju, Ch Diwakar, Uday Kiran

Paper Title:

A Study on Temperature Sensitivity of Stress Intensity Factor Using Finite Element Method

Abstract:   When a structure is subjected to any sort of damage such as loadings cracks will be developed. When those structure continuously subjected to repeated loading it leads to catastrophic failure of the structure.in this study ,it is investigated that the effect of the temperature on stress intensity factor. Finite element analysis (Ansys 12.0) is used to investigate the temperature effect on stress intensity factor. A plate with both ends fixed at the top and bottom with an edge crack is tested for a temperature gradient zero at mid thickness to T0C at the edges.The temperature tested in this study are 200C, 250C, 300C, 350C, 400C, 450C and  500C.The stress intensity factor for each rise of temperature are noted. Finally it is found the the stress intensity factor is sensitive to the temperature and it is linear with increase in temperature.

Keywords:
 Stress Intensity Factor, Temperature


References:

1.       A.A.Tasnimi.Masthematical model for complete stress –strain Curve prediction of normal, light weight and high strength Concretes. Magazine of concrete research (2004)feb:23-24
2.       Ansys Tutorials, release 12.0

3.       A.S.Usmani, J.M.Rotter, S.Lamont, A.M.Sanad,M.Gillie“Fundamental principles of structural behavior under thermal eects” FireSafetyJournal36(2001)721–744

4.       B.  V.D.Wakchaure, A.A.V. Deokar “Experimental Investigation of Crack Detection in Cantilever Beam Using Natural Frequency as Basic Criterion” December  2011

5.       S. Welch, Dr.Martin Gillie and Mian Zhou “Spalling Behaviour of HSC Beam Subject to High Temperatures ”

6.       J. R. Chen, H. M. Cheng, Z. D. Tsai, C. R. Chen, T. F. Lin, G. Y. Hsiung, and Y. S. Hong “The Correlation Between The Beam Orbit Stability And The Utilities At SRRC”

7.       Kyung Soo Kwonandusik LEE -“spectral element modeling and analysis of     an axially moving thermoelastic beam-plate”- journal of mchnics of materials and structures vol. 1, no. 4, 2006

8.       Kyungaoo Kwon and Uslk Lee “Spectral Element Modeling And Analysis Of An Axially Moving Thermostastic Beam Plate” Journal of mechanics of material and structures , April 2006

9.       M.G. Yue,Q.L, Yao,Y.Y. Wang and H.N. Li “numerical simulation on the fireproof behavior of rc beam strengthened with stranded mesh and polymer mortar” The 14th   World Conference on Earthquake Engineering October 12-17, 2008, Beijing, China,2008

10.     Sushovan Chatterjee, Subhasis Chatterjee and Bidyot Doley “Breathing Crack In Beam And Cantilever Using Contact Model Dynamic Analysis – A Study” International Journal of Wisdom Based Computing, Vol. 1 (3), December 2011


81-82

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

19.

Authors:

G Sundeep, U V Ratna Kumari

Paper Title:

Reduction of Power Line Interference by Using Adaptive Filtering Techniques in Electrocardiogram

Abstract:   Electrocardiogram (ECG) signal is affected by many noise interferences. Out of all the noise effects the power line interference is the predominant one. In this paper the implementation of the adaptive algorithm techniques for reduction in this power line interference is shown and a comparison of these techniques is performed. The adaptive filters used have shown a good improvement in the SNR (Signal– to – Noise Ratio). The LMS (Least mean square), NLMS (Normalized LMS), and SLMS (Sign LMS) algorithms are discussed and compared.

Keywords:  ECG (Electrocardiogram), LMS (Least mean square), NLMS (Normalized LMS), SLMS (Sign LMS) and MSE (Mean square error)


References:

1.       Digital            Signal       Processing,              Principles, Algorithms   and   Applications, John   H.G .Proakis, Dimitris   G Manolakis, 4rt edition published by Pearson Education.inc (2007).
2.       Mitra .S.K (2006) Digital Signal Processing, A computer based approach.  3rd    edition .New York, the McGraw-Hill Companies, Inc.

3.       M. Z. U. Rahman, R. A. Shaik, DVRK Reddy,Efficient and simplified adaptive noise cancellers for ECG sensors based remote helth monitering, IEEE SensorsJournal, volume 12, No.3, March 2012, pages 566-573.

4.       Hand Book of Biomedical Instrumentation by   R.S.   Khandpur,   published   by   Tata McGraw-Hill Publishing Company Limited (2003).

5.       Farhang-         Boroujeny:               Adaptive  Filters Theory and Applications, published by Wiley, 1999.

6.       B. Preetham Kumar:       Digital      signal Processing Laboratory, published by CRC press (2005).
7.       Monson H. Hayes: Statistical Digital Signal Processing   and   Modeling,   Wiley,   1996, ISBN 0-471-59431-8.
8.       Paulo              S.R.          Diniz:       Adaptive  Filtering: Algorithms and Practical Implementation, Kluwer Academic Publishers, 1997, ISBN0-7923-9912-9.

9.       Simon S. Haykin, Bernard Widrow (Editor): Least-Mean-Square Adaptive Filters, Wiley,

10.     2003, ISBN 0-471-21570-8.


83-86

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

20.

Authors:

W.M. Goriwondo and N. Maunga

Paper Title:

Lean Six Sigma Application for Sustainable Production: A Case Study for Margarine Production in Zimbabwe

Abstract:   Lean Six Sigma is an integration of two World Class Manufacturing improvement philosophies(Lean Manufacturing and Six Sigma) that help organizations improve their performance and competitiveness. The principles are applied to margarine manufacturing. The Value Stream Mapping tool is used to map the processes and the Six Sigma’s Define, Measure, Analyze, Improve and Control (DMAIC) methodology applied to attain improvements. The Current State Map (CSM) is drawn and using the DMAIC methodology, the Future State Map (FSM) is drawn. The production line ultimately achieves improvements in cycle times and in Value Added time ratio from 39% to 94%. There are envisaged improvements of up to 86% on cycle times for individual processes.

Keywords:
 Lean Six Sigma, Process Variance, Margarine Production, World Class Manufacturing


References:

1.       Ohno, T. (1988). Toyota Production System; Beyond large scale production, Productivity Press, Portland, Oregon.
2.       Russell, R.S. and Taylor, B.W., 2000, Operations Management, Prentice Hall, Englewood Cliffs, NJ.Achanga, P., 2006, “Critical success factors for lean implementation within SMEs”, Journal of Manufacturing Technology Management, Vol. 17 No.4, pp 460-71.

3.       Shah, R. and Ward, P.T., 2007, Defining and developing measures of lean production, Journal of Operations Management 25 pp 785 – 805.

4.       Hayes, R.H., Pisano, G.P., Upton, D.M and Wheelwright, S.C., 2005, Operations, Strategy and Technology: Pursuing the Competitive Edge, Wiley

5.       Carreira, B and Trudell, B., 2006, Lean Six Sigma That Works: A Powerful Action for Dramatically Improving Quality, Increasing Speed and Reducing Waste, Amacom, New York.

6.       Shah, R., Chandrasekaran, A and Linderman, K., 2008, In pursuit of implementation patterns: the context of Lean and Six Sigma,  International Journal of Production Research, Vol 46, Issue 23, Special Issue: Effective Decision Support for Lean and Six Sigma Methodologies , pages 6679-6699.

7.       Pettersen, J., (2009),"Defining lean production: some conceptual and practical issues", The TQM Journal, Vol. 21 Iss: 2 pp. 127 – 142.

8.       Bicheno, J., 2004, The New Lean Toolbox towards Fast and Flexible Flow, PICSIE Books, Buckingham.

9.       Phillips, T., 2000, “Building the lean machine”, Advanced Manufacturing, January, pp 21-6.

10.     Dag Näslund, (2008),"Lean, six sigma and lean sigma: fads or real process improvement methods?", Business Process Management Journal, Vol. 14 Iss: 3 pp. 269 – 287.

11.     Arnheiter, E. and Maleyeff, J., 2005, “The integration of lean management and six sigma”, The TQM Magazine, Vol.17, no.1, pp5-18.

12.     Hammer, M., 2002, “Process Management and the future of Six Sigma”, Sloan Management Review, Vol 43, No.2, pp26-32.

13.     Snee, R.D., (2010),"Lean Six Sigma - getting better all the time", International Journal of Lean Six Sigma, Vol. 1 Iss: 1 pp. 9 – 29.

14.     Pepper, M.P.J. and Spedding, T.A., (2010),"The evolution of lean Six Sigma", International Journal of Quality & Reliability Management, Vol. 27 Iss: 2 pp. 138 – 155

15.     Chikumba, S. and Goriwondo, W.M., 2006, Integrating Lean Management and Six Sigma Methodology as a Tool for Re-industrialization, ZIE, ECZ Engineers
Without Borders Conference, Victoria Falls.

16.     Goriwondo, W.M., Mhlanga S. and Marecha, A. (2011), Use Of the Value Stream Mapping Tool For Waste Reduction In Manufacturing. Case Study for Bread Manufacturing in Zimbabwe. Proceedings of the 2nd International Conference on Industrial Engineering and Operations Management


87-96

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html