International Journal of Innovative Technology and Exploring Engineering(TM)
Exploring Innovation| ISSN:2278-3075(Online)| Reg. No.:65021/BPL/CE/12| Published by BEIESP| Impact Factor:4.66| UGC Approved Journal
Home
Aims & Scope
Instructions for Authors
Call for Papers
Editorial Board
Archive
Conferences
Publication Fee
Ethics
Download
FAQ
Contact
Volume-1 Issue-6: Published on November 10, 2012
54
Volume-1 Issue-6: Published on November 10, 2012

  Download Abstract Book

S. No

Volume-1 Issue-6, November 2012, ISSN:  2278-3075 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

Korosh Koochekian Sabor, Mehran Mohsenzadeh

Paper Title:

Adaptive Random Testing Through Dynamic Partitioning By Localization with Distance and Enlarged Input Domain

Abstract:   Based on the intuition that evenly distributed test cases have more chance for revealing non-point pattern failure regions, various Adaptive Random Testing (ART) methods have been proposed. A large portion of this methods such as ART with random partitioning by localization have edge preference problem. This problem would decrease the performance of these methods. In this article the enlarged input domain approach is used for decreasing edge preference problem in ART with random partitioning by localization. Simulations have shown that failure detection capability of ART by localization with distance and enlarged input domain is comparable and usually better than that of other adaptive random testing approaches.

Keywords:
 Random testing, adaptive random testing, localization, enlarged input domain.


References:

1.        B.Beizer, Software testing techniques (Van Nostrand Reinhold, New York, 1990)
2.        J. W. Laski , B. Korel, A data flow oriented program testing strategy, IEEE Transactions on Software Engineering, Vol. 9, No. 3, 1983, 347-354,.

3.        J. Offutt and S. Liu, Generating test data from SOFL specifications, The Journal of Systems and Software, Vol. 49, No. 1, 1999, 49-62.

4.        J. Offutt, S. Liu, A. Abdurazik and P. Ammann, Generating test data from state-based specifications, Software Testing, Verification & Reliability, Vol. 13,No.1, 2003, 25-53.

5.        P. Stocks and D. Carrington, “A framework for specification-based testing”, IEEE Transactions on Software Engineering, Vol. 22, No. 11, 1996, 777-793.

6.        L. J. White and E. I. Cohen, “A domain strategy for computer program testing”, IEEE Transactions on Software Engineering, Vol. 6, No. 3, 1980,247-257.

7.        R. Hamlet. Random testing. Encyclopedia of Software Engineering, Wiley, New York,1994,  970–978.

8.        P. S. Loo and W. K. Tsai. Random testing revisited. Information and Software Technology, Vol.30. No 7, 1988, 402-417.
9.        E. J.Weyuker and B. Jeng. Analysing partition testing strategies. IEEE Transactions on Software Engineering, 17:703–711, 1991.
10.     G. Myers, The Art of Software Testing, (NewYork: John Wiley & Sons, 1979).

11.     F. T. Chan, T. Y. Chen, I. K. Mak, and Y. T. Yu. Proportional sampling strategy: guidelines for software testing practitioners. Information and Software Technology, 38:775– 782, 1996.

12.     T. Y. Chen, T. H. Tse and Y. T. Yu, Proportional sampling strategy: a compendium and some insights. The Journal of Systems and Software, 58, 2001, 65-81.

13.     I.K. Mak, On the effectiveness of random testing. Master’s thesis, (Department of Computer Science, The University of Melbourne, 1997).

14.     T. Y. Chen, G. Eddy, R. Merkel and P. K. Wong, Adaptive random testing through dynamic partitioning , accepted to appear in Proceedings of the 4th International Conference on Quality Software (QSIC2004)


1-5

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.

Authors:

Vaishali M. Deshmukh, Sachin A. Murab

Paper Title:

Signature Recognition &Verification Using ANN

Abstract:  The signature of a person is an important biometric attribute of a human being which can be used to authenticate human identity.  There are various approaches to signature recognition with a lot of scope of research. In this paper, off-line signature recognition & verification using neural network is proposed, where the signature is captured and presented to the user in an image format. Signatures are verified based on parameters extracted from the signature using various image processing techniques. This paper presents a proposed method for verifying offline-signatures. A Neural Network will be used for verifying signatures

Keywords:
 component; image preprocessing, feature extraction; Neural network training and testing; signature verification and recognition.


References:

1.        K. Han, and I.K. Sethi, “Handwritten Signature Retrieval and Identification”, Pattern Recognition 17, 1996, pp. 83-90.
2.        S. Chen, and S. Srihari, “Use of Exterior Contour and Shape Features in Off-line Signature Verification”, 8th International Conference on Document Analysis and Recognition (ICDAR’05), 2005, pp. 1280-1284.

3.        Özgündüz,T. Uentürk and M. E. Karslıgil, “Off line signature Verification and recognition by support vector machine”, Eusipco 2005, Antalya, Turkey 4 -8 September, 2005, , pp.113-116.

4.        Wei Tian, Yizheng Qiao and Zhiqiang Ma, A New Scheme for Off-line Signature Verification Using DWT and Fuzzy Net, IEEE 8th ACISInternational Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2007, pp.30-35

5.        Luiz S. Oliveira, Edson Justino, and Robert Sabourin, Off-line Signature Verification Using Writer-Independent Approach, Proceedings of International Joint Conference on Neural Networks, Orlando, Florida, USA, August 12-17, IEEE 2007.

6.        Fernando Alonso-Fernandez, Julian Fierrez, Almudena Gilperez, Javier Galbally, Javier Ortega-Garcia, Robustness of Signature Verification Systems to Imitators With Increasing skills, IEEE 2009,pp. 728-732.

7.        Plamondon, “The Handwritten Signature as a Biometric Identifier: Psychophysical Model & System Design” IEE Conference Publications, R.1995, Issue CP408, 23-27.

8.        Ali Karouni Bassam Daya, Samia Bahlak, Offline signature Recognition using neural networks approach, Procedia Computer Science 3, 2010, pp.155-161.
9.        E.J.R. Justino, F. Bortolozzi, and R. Sabourin. “A comparison of SVM and HMM classifiers in the off-line signature verification”,Pattern Recognition Letters 26, 2005, pp. 1377- 1385.
10.     Ms. Vibha Pandey Ms. Sanjivani Shantaiya. “Signature Verification Using Morphological Features Based on Artificial Neural Network”, 2012 pp. 288-292

11.     Suhail M. Odeh, Manal Khalil ,Off-line signature verification and recognition: Neural Network Approach,IEEE 2011,pp.34- 38

12.     Vu Nguyen, Yumiko Kawazoey, Tetsushi Wakabayashiy, Umapada Palz, and Michael Blumenstein, Performance Analysis of the Gradient Feature  and the Modified Direction Feature for Off-line Signature Verification , the IEEE 12th International Conference on Frontiers in Handwriting Recognition, 2010,pp.303-307.

13.     Bradley Schafer, Serestina Viriri, An Off-Line Signature Verification System, IEEE International Conference on Signal and Image Processing  Applications, 2009,  pp. 95-100

14.     Michael Blumenstein, Graham Leedham, Vu Nguyen, Global Features for the Off-Line Signature Verification Problem, IEEE 10th International Conference on Document Analysis and Recognition, 2009,pp.1300-1304.

15.     Cemil OZ, Fikret Ercal, Zafer Demir Signature Recognition and Verification with ANN Sakarya University Computer Eng. Department Sakarya,Turkey,UMR Computer Science Department Rolla,MO65401

16.     Alan McCabe, Jarrod Trevathan and Wayne Read, school of mathematics, physics and Information Technology, James cook University, Australia.  Neural Network-based handwritten signature verification, Journal of computers, vol.3, No. 8 August 2008, pp. 9-22.


6-8

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

Akash Shrivastava, R.L. Himte

Paper Title:

Computational Study of Blast Furnace Cooling Stave using Heat Transfer Analysis

Abstract:   Reliable furnace cooling technology is a domain of increasing concern to the metallurgical industry as it can significantly increase process intensities, productivity and campaign times of furnaces. Although there are many advantages in using cooling systems, they also impose a variety of problems mainly related to safety, heat losses and sustainability of the operations. The choice of cooling system is hence a matter of trade-offs and differs for every metallurgical application. This paper gives a systemic study and review of blast furnace cooling stave lining materials used in the metallurgical industries based on heat transfer analysis. Additionally, the paper describes a model which will be modeled and implemented using Pro- E modeling software. The model will further be utilized for the analysis of the behavior of lining materials at different loads through heat transfer analysis by finite element method software called ANSYS. In this study two different types of bricks like silicon carbide brick and high alumina bricks will be  taken for the lining material of the blast furnace cooling stave as well as two different types of skull is considered, in which the first is having negligible thickness and the other one is having certain thickness, (thickness in mm is considered), so, with these two skulls, the heat transfer analysis will be done at different temperatures (loads) from 773k to 1573k in order to compare which lining will give better results than the other.

Keywords:
 Blast furnace, Cooling Stave, Heat transfer analysis, Thermal Stress field.


References:

1.       D. Gregurek, Ch. Majcenovic, “Wear mechanisms of basis brick linings in the non ferrous metals industry – case studies from copper smelting furnaces”, RHI Bulletin, pp 17-21, 2003.
2.       H. Barthel, “Stresses and wear of chrome-magnesite bricks in furnaces used in the copper industry”, TMS Paper Selection A80-18, 1980.

3.       Tijhuis, G.J., Bleijendaal, N.G.J., “BF cooling and refractory technology,” Steel Times International, pp 26-27, 1995.

4.       Wilms, E. et al, “Increasing the blast furnace campaign life,” Stahl and Eisen, No. 6, pp 81-92, 1993.

5.       Burteaux, M., Krafft, W., Van Laar, J., Traice, F.B., Vecchiola, G., “ Latest development in cooling and refractories of European blast furnaces,” Steel Times, pp. 492-503, 1987.

6.       Karel Verscheure, Andrew K. Kyllo, Andreas Filzwieser, Bart Blanpain and Patrick Wollants, “Furnace cooling technology in pyrometallurgical processes,” Sohn
International Symposium Advanced Processing of Metals And Materials, vol. 4, 2006.

7.       Wu Lijun, Zhou Weiguo, Cheng Huier, Su Yunlong and Li Xiaojing, “ The study of cooling channel optimization in blast furnace cast steel cooling stave based on heat transfer analysis,” Applied Int J Adv Manuf Technol 29, pp. 64–69, 2006.

8.       Qian, Z.; Du, Z.-H.; Wu, L.-J, “ Heat transfer analysis of blast furnace cast steel cooling stave,” Ironmaking & Steelmaking, vol. 34, Number 5, pp. 415-421, 2007.

9.       Wu Lijun, Zhou Weiguo, Cheng Huier, Su Yunlong and Li Xiaojing, “ The study of structure optimization of blast furnace cast steel cooling stave based on heat transfer analysis,” Applied Mathematical Modelling 31, pp. 1249–1262, 2007.

10.     Wu Lijun, Zhou Weiguo, Cheng Huier, Su Yunlong and Li Xiaojing, “ Heat transfer analysis of blast furnace stave,” International Journal of Heat and Mass transfer, vol. 51, issues 11-12, pp. 2824–2833, 2008.

11.     XIE Ning-qiang and CHENG Shu-sen, “Analysis of effect of gas temperature on cooling stave of blast furnace,”Journal of Iron and steel research, International, pp. 01-06, 2010.

9-15

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

4.

Authors:

Srinivasa Murthy H N, Roopa M

Paper Title:

FPGA Implementation of Sine and Cosine Generators using CORDIC Algorithm

Abstract:   The current research in the design of high speed VLSI architectures for real-time digital signal processing (DSP) algorithms has been directed by the advances in the VLSI technology, which have provided the designers with significant impetus for porting algorithm into architecture. Many of the algorithms used in DSP and matrix arithmetic require elementary functions such as trigonometric, inverse trigonometric, logarithm, exponential, multiplication, and division functions and one such algorithm is CORDIC. Often trigonometric functions are used in embedded applications. Examples of this include motion control, filtering and waveform synthesis. For waveforms with few output points per cycle (for example one output point per degree) a lookup table will often suffice, and indeed this method is optimal in that it offers a reasonable compromise between speed and the need to use the microcontroller’s memory efficiently. The CORDIC computing technique—a highly efficient method to compute elementary functions and this paper presents how to calculate sine and cosine values of the given angle using CORDIC algorithm. Summary of CORDIC synthesis results based on Xilinx FPGAs is given. The system simulation was carried out using ModelSim   and Xilinx ISE Design Suite 9.2i. The system can be implemented using Spartan3 XC3S50 with Xilinx ISE 9.2i and VHDL.

Keywords:
 CORDIC, Sine, Cosine, VHDL, FPGA.


References:

1.        R. Andraka, “A survey of CORDIC algorithms for FPGA based computers,” Proceedings of the 1998 ACM/SIGDA sixth international symposium on Field programmable gate arrays, pp. 191 – 200.
2.        Aman Chadha, Divya Jyoti  and M. G. Bhatia, “ Design and Simulation of an 8-bit Dedicated Processor for calculating the Sine and Cosine of an Angle using the CORDIC Algorithm”

3.        V. Sharma, FPGA Implementation of EEAS CORDIC based Sine and Cosine Generator, M. Tech Thesis, Dept. of Electronics and Communication Engineering, Thapar University, Patiala, 2009.

4.        S. Panda, Performance Analysis and Design of a Discrete Cosine Transform Processor using CORDIC Algorithm, M. Tech Thesis, Dept. of Electronics and Communication Engineering, NIT Rourkela, Rourkela, Orissa, 2010.

5.        R. K. Jain, B. Tech Thesis, Design and FPGA Implementation of CORDIC-based 8-point 1D DCT Processor, NIT Rourkela, Rourkela, Orissa, 2011.

6.        J. Volder, "The CORDIC Trigonometric Computing Technique," IRE Transactions on Electronic Computing, Vol EC-8, Sept 1959, pp. 330-334.

7.        Samuel Ginsberg, Compact and Efficient Generation of Trigonometric Functions using a CORDIC algorithm

8.        J. S. Walther, "A unified algorithm for elementary functions," Proceedings of the Spring Joint Computer Conference, 1971, pp. 379-385.


16-19

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

5.

Authors:

Amarjeet Kaur, Himani Malik, Vandana Tanwar, V.K.Lamba, Nitesh Kumar, Sanjay Sharma

Paper Title:

Effect of Permittivity and Conductivity of Tissue on Specific Absorption Rate of Electromagnetic Radiations

Abstract:   In this paper a novel approach for analyzing effect of conductivity and permittivity  of human tissue on penetration of electromagnetic radiations inside tissue. Moreover, we concentrated our work on analyzing the other related factors describing system performance like Voltage Standing Wave Ratio (VSWR)& return loss. We simulated tissue by setting different electrical and magnetic properties and used 900MHz communication frequency to simulate antenna for analyzing its effect in terms of variation in Specific Absorption Rate (SAR) of electromagnetic radiations (produced by handheld communication devices) in Human tissues at different permittivity and conductivity.

Keywords:
 Specific Absorption Rate; EM Radiations; Electromagnetic waves; SAR; XFDTD; Communication Frequency; Return loss;  Voltage Standing Wave Ratio (VSWR); Human tissue; Electrical & Magnetic properties of human tissue, conductivity, permittivity.


References:

1.       Salah I. Al-Mously, “Assessment Procedure of the EM Interaction between Mobile Phone Antennae and Human Body” Pedro Pinho12, Amelia Lopes1, Joao Leite1 and Joao Casaleiro, “SAR determination and influence of the human head in the radiation of a mobile antenna for two different frequencies”, IEEE Trans., 2009
2.       Ali Zamanian and Cy Hardiman, “Electromagnetic Radiation and Human Health: A Review of Sources and Effects” in High Frequency Electronics,16-26, July 2005

3.       Shalatonin V. I., “Mobile Phones and Health: The Key Role Of Human Body Flids in Bioeffects of Non-Thermal EM Radiation” in 200818th Int. Crimean Conference "Microwave Telecommunication Technology" (CriMiCo'2008). 8-12 September, Sevastopol, Crimea, Ukraine© 2008: CriMiCo'2008 Organizing Committee; CrSTC. ISBN: 978.966.335.166.7. IEEE Catalog Number: CFP08788

4.       B. Blake Levitt and Henry Lai, “Biological effects from exposure to electromagnetic radiation emitted by cell tower base stations and other antenna arrays” in Environ. Rev. 18: 369–395, 2010

5.       P. Salonen, L. Sydanheimo, M. Keskilammi, M. Kivikoski,"A small planar inverted-F antenna for wearable applications," Wearable Computers, 1999. Digest of Papers. the Third International Symposium on, pp. 95-100, 1999.

6.       C. Hertleer, A. Tronquo, H. Rogier,L. Vallozzi,L. Van Langenhove, "Aperture-Coupled Patch Antenna for Integration Into Wearable Textile Systems," Antennas and Wireless Propagation Letters, IEEE, vol. 6, pp. 392-395, 2007.  

20-22

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

6.

Authors:

Pushplata Sagar

Paper Title:

Optimised Architecture Implementation of Bidirectional Scanning in FPGA for Television

Abstract:   In the past, Field Programmable Gate Array (FPGA) circuits only contained a limited amount of logic and operated at a low frequency, but during last decade there has been a tremendous advancement in the fields of FPGAs circuits. Today FPGA are very fast, high density, and low power, suitable for implementing any kind of application. Bidirectional scanning is one of the novel techniques used in television to avoid the retrace or fly back period of the electron beam. This saves power consumed by the beam during retrace period. RTL using Very High Speed Integrated Hardware Description Language (VHDL) is used to implement bidirectional scanning in FPGA. The functional and timing simulations of design are verified using Modelsim Simulator. Integrated software environment (ISE) from Xilinx is used to generate net-list from RTL code. The power consumption of the design is calculated using Xilinx power calculator.

Keywords:
 Bidirectional scanning, FPGA.


References:

1.        John W. Herndon, John W. Herndon “Statement of government interest bi-direction scan system”US patent 3662102
2.        Manfred Spruck “Deflection circuits for television picture tube “CPT Corporation, US patent US4238774

3.        Ronald D. Wertz, James H. Orszulak, Christopher L. Sweeney, Corporation “Cathode ray tube display system and method having bidirectional line Scanning”.

4.        C. H. JONES, C. H. JONES ”Television scan system”

5.        Frederick D. Lehman “Drive circuits for a high resolution cathode ray tube display”.

6.        www.analog.com/en/audiovideo-products/.../adv7180/.../product. htm...” ADV7180 video decoder data Sheet”.

7.        www.ti.com/product/dac2902 DAC data sheet –www.ti.com

8.        Architecture of spartan3s devices-www.xilinx.com


23-26

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

7.

Authors:

Silky Pareyani, Prabhat Patel

Paper Title:

An Improved ICI Self Cancellation Method to Reduce ICI in OFDM Systems

Abstract:   Orthogonal frequency division multiplexing systems are highly sensitive to frequency offset introduced by the wireless channels. This frequency offset destroys the orthogonality between the OFDM subcarriers and causes inter-carrier interference (ICI). Self-cancellation schemes which have been developed to combat the impact of frequency offset on OFDM systems have received a lot of attention due to their simple implementation and high efficiency. This paper proposes an efficient ICI self cancellation scheme to combat the impact of ICI on OFDM systems. In this scheme at the transmitter side, one data symbol is modulated onto four subcarriers with appropriate weighting coefficients. At the receiver side, the linear combination of the received signals on these subcarriers leads to a sufficient reduction in ICI. A detailed analysis and simulation over AWGN channel proves that the proposed scheme achieves better BER (Bit Error Rate) performance and CIR improvement than the existing self cancellation schemes. 

Keywords:
 Orthogonal frequency division multiplexing (OFDM), inter-carrier interference (ICI), ICI self cancellation, frequency offset, carrier-to-interference ratio (CIR).


References:

1.       J R. Nee and R. Prasad, OFDM for wireless multimedia communications Artech House Publishers, Mar. 2000.
2.       Y. Zhao and S. Häggman, “Intercarrier interference self-cancellation scheme for OFDM mobile communication systems,” IEEE Transactions on Communications, vol.49, no. 7, pp. 1185-1191, 2001.

3.       L. J. Cimini, Jr., “Analysis and simulation of a digital mobile channel using orthogonal frequency division multiplexing,” IEEE Trans. Commun., vol. COM-33, pp. 665–765, July 1985

4.       J. Ahn and H. S. Lee, “Frequency domain equalization of OFDM signal over frequency nonselective Rayleigh fading channels,” Electron. Lett., vol. 29, no. 16, pp.
1476–1477, Aug. 1993.

5.       Muschallik, “Improving an OFDM reception using an adaptive Nyquist windowing,” IEEE Trans. Consumer Electron., vol. 42, pp. 259-269, Aug. 1996.

6.       Armstrong, ‘Analysis of new and existing methods of reducing intercarrier interference due to carrier frequency offset in OFDM,” IEEE Trans. Cummun., vol. 47. pp. 365-369, Mar. 1999.

7.       K. Sathananthan, R. M. A. P. Rajatheva, and S. B. Slimane, “Cancellation technique to reduce intercarrier interference in OFDM,” IEE Elect. Lett., vol. 36, pp. 2078 -2079, Dec. 2000.

8.       P. H. Moose, “A technique for orthogonal frequency division multiplexing frequency offset correction,” IEEE Trans. Commun., vol. 42, pp. 2908–2914, Oct. 1994.

9.       K. A. Seaton and J. Armstrong, “Polynomial cancellation coding and finite differences,” IEEE Trans. Inform. Theory, vol. 46, pp. 311–313, Jan. 2000.

10.     Sathananthan, C. R. N. Athaudage, and B. Qiu, “A novel ICI Cancellation scheme to reduce both frequency offset and IQ Imbalance Effects in OFDM,” in Proc. IEEE 9th International Symposium on Computers and Communications, pp. 708-713, Jul. 2004.


27-31

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

8.

Authors:

Nisha Kiran, Prabhat Patel

Paper Title:

Analysis of Throughput with Reinforcement Learning of TD-CSMA system in Cognitive Radio Networks

Abstract:   Cognitive radio technology is widely accepted as an efficient approach to solve the problem of scarcity of the wireless spectrum resulting due to the rapid growth in the ubiquitous wireless applications. Several cognitive medium access control protocols have been proposed for the secondary users (non-licensed users) to take advantage of the vacant channels whenever they are not occupied by the primary users (licensed users). This paper analyses a cognitive radio scenario based on non-persistent carrier sense multiple access (CSMA) protocol for secondary user  and time division multiple access (TDMA) for primary users in multi-channel TD-CSMA network. Performance of secondary users is evaluated for a various proportions of non-persistent CSMA and TDMA traffic levels. Simulations results show that the throughput performance of CSMA users improves when multichannel are used. Further, reinforcement learning is applied in conjunction with non-persistent CSMA which also enhances the throughput performance on same proportions.

Keywords:
 Cognitive Radio, Multiple Access Scheme, Multichannel CSMA, Channel Assignment, Reinforcement Learning.


References:

1.        Office of Communication: Spectrum Framework Review: a consultation on Ofcom’s views as to how radio spectrum should be managed, 2004
2.        Parliamentary Office of Science and Technology: Radio Spectrum Management, 2007, POSTNOTE 292

3.        MITOLA J., MAGUIRE G.: ‘Cognitive radio: making software radios more personal’, IEEE Pers. Commun., 1999, 6, (4), pp. 13–18

4.        J. Mitola III, “Cognitive radio: an integrated agent architecture for software defined radio,” Ph.D. Thesis, KTH Royal Inst. Technology, Stockholm, Sweden, 2000.
5.        ABRAMSON N.: “The throughput of packet broadcasting channels”, IEEE Trans. Commun., 1977, COM-25, (1), pp. 117–127.

6.        C. Cormio and K.R. Chowdhury, “A survey on MAC protocols for cognitive radio networks,” Elsevier Ad Hoc Networks, vol. 7, 2009, pp. 1315-1329

7.        ERKIP E., AAZHANG B.: ‘A comparative study of multiple accessing schemes’, IEEE, 1998, 1, pp. 614–619

8.        ABRAMSON N.: ‘The throughput of packet broadcasting channels’, IEEE Trans. Commun., 1977, COM-25, (1), pp. 117–127

9.        KLEINROCK L., TOBAGI F.A.: ‘Packet switching in radio channels. Part 1 – carrier sense multipleaccess modes and their throughput-delay characteristics’, IEEE Trans. Commun., 1975, COM-23, (12), pp. 1400–1416

10.     H. Li D. Grace P.D. Mitchell, “Throughput analysis of non-persistent carrier sense multiple access combined with time division multiple access and its implication for cognitive radio“,Journal om IETcommunications,2010,accepted for publocation. 

11.     Haibin Li,David Grace,Paul D. Mitchell ,”Collision Reduction in Cognitive Radio using Multichannel 1-persisten t CSMA combined with Reinforcement Learning” Depertment of electronics, The university of New York.   

12.     Sutton, R.S., Barto, A.G.: “Reinforcement learning: an introduction” Cambridge, US: MIT Press, 1998  

13.     L.P.Kaelbling,M.L.Littman,andA.w.Morre, Reinforcement Learning: A Survey.Journal of Artificial Intelligence Research, 1996.4(1996):p,337-28  

14.     KALOS M.H., WHITLOCK P.A.: ‘Monte Carlo methods’ (Wiley, 1986), p. 208 

15.     R. G. Gallager, “A perspective on  ulti-access channels”, IEEE Transactions on Information Theory, vol. 31, pp. 124-142, 1985.

16.     KLEINROCK L., TOBAGI F.A.: ‘Packet switching in radio channels. Part 1 – carrier sense multipleaccess modes and their throughput-delay characteristics’, IEEE Trans. Commun., 1975, COM-23, (12), pp. 1400–1416 

17.     MORAN P.A.P.: ‘An introduction to probability theory’ (Oxford University Press, 1984), p. 524

18.     T.Jiang, D.Grace, Y.Liu, “Performance of cognitive radio reinforcement spectrum sharing using different weighing factors,” communication and networking in china. Third International conference on chinacom.2008.


32-35

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

9.

Authors:

Aanchal Chanana, Harvinder Singh, Dipesh Miglani, Rahul Khemani, Siddharth Kathuria

Paper Title:

Research on Bluetooth Technology

Abstract:   This paper introduces a number of problems faced by Bluetooth technology when attempting to use it for building adhoc networks.The paper provides a brief overviewof Bluetooth and describessome of the major issues that need to be addressed,if it is to be successful as a network technology.Some important objectives that any solution must meet are also introduced and motivated.An initial exploration of some key issues such as topology formation and throughput maximization is also provided.

Keywords:
 Bluetooth, network, piconet, adhoc networks, piconet size, nodes


References:

1.        P. Bhagwat and R. Seigal. A routing vector method (RVM) for routing in Bluetooth scatternets. In IEEE International Workshop on Mobile Multimedia Communications (MoMuC’99), San Diego, CA, November 1999.
2.        A. Das, A. Ghose, A. Razdan, H. Saran, and R. Shorey. Enhancing performance of asynchronous data traffic over the Bluetooth wireless ad-hoc network. In Proceedings of INFOCOM’2001, Anchorage, AK, April 2001.

3.        B. Hajek and G. Sasaki. Link scheduling in polynomial time. IEEE Transactions on Information Theory, 34(5), 1988.

4.        N. Johansson, U. Korner, and L. Tassiulas. A distributed scheduling algorithm for a Bluetooth scatternet. In Proceedings of ITC’2001, Salvador, Brazil, december 2001.

5.        B. Miller and C. Bisdikian. Bluetooth Revealed: The Insider’s Guide to an Open Specification for Global Wireless Communications. Prentice-Hall, 2000.

6.        T. Salonidis, P. Bhagwat, L. Tassiulas, and R. Lamaire. Distributed topology construction of Bluetooth personal area networks. In Proceedings of INFOCOM’2001, 2001.


36-41

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

10.

Authors:

Manojyoti Sarma, S. N. Shinde

Paper Title:

Modeling of Sonophotocatalytic Degradation of Formic Acid in Pharmaceutical Wastewater Treatment

Abstract:   Formic acid is one of the major pollutants present in pharmaceutical wastewater. The sonophotocatalytic degradation of formic acid present in pharmaceutical wastewater is analyzed in this review and mathematical model is produced for the same. The mathematical model is generated by regression analysis using Artificial Neural Network (ANN) and Support Vector Machine (SVM) to analyze & predict degradation of formic acid. This modeling and prediction helps to reduce experimental work to analyze the degradation behavior of formic acid. Modeling can also tackle insufficient data. Both ANN & SVM produced good models with negligible MSE. SVM model gave more consistent & reliable prediction compared to ANN model.

Keywords:
 Artificial Neural Network, Formic Acid, Sonophotocatalysis, Support Vector Machine.


References:

1.        M. Mohajerani, M. Mehrvar & F. Ein-Mozaffari, An Overview of the Integration of Advanced Oxidation Technologies and Other Processes for Water and Wastewater Treatment, International Journal of Engineering (IJE) Volume (3): Issue (2) 2009, pp.120-146
2.        P. R. Gogate, S. Mujumdar, A. B. Pandit, A Sonophotochemical Reactor for the Removal of Formic Acid from Wastewater, Ind. Eng. Chem. Res. 2002, 41, pp.3370-3378

3.        Collin G. J., Gianluca L. P., Awang B., Duduku K., 2009, Sonophotocatalysis in advanced oxidation process - A short review, Ultrasonics Sonochemistry 16 (2009) pp.583–589

4.        C. Christos, K. Agnieszka, M. Sixto, A. P. Simon, P. Ioannis, M. Dionissios, Perspective Advanced oxidation processes for water treatment advances and trends for R&D, J Chem Technol Biotechnol 83, 2008, pp.769–776

5.        D. Chatterjee, S. Dasgupta, Journal of Photochemistry and Photobiology C: Photochemistry Reviews 6, 2005, pp.186–205

6.        Masroor M., Mehrab M., Farhad Ein-Mozaffariz, Recent Achievements in Combination of Ultrasonolysis and Other AOPs for Wastewater Treatment, International Journal of Chemical Reactor Engineering, Volume-8, 2010, R2.

7.        G. A. Yusuf, Heterogeneous Sonophotocatalytic Oxidation Processes for the Treatment of Pollutants in Water, Sci. Technol. 2005, Vol. 39, No. 22, pp.8557-8570

8.        P. R. Gogate, S. Mujumdar, A. B. Pandit, 2003, Advances in Environmental Research 7, pp.283-299

9.        In-Su Han, Chonghun Han, Chang-Bock Chung, 2003-04, Melt Index Modeling with Support Vector Machines, Partial Least Squares, and Artificial Neural Networks, Wiley InterScience, Journal of Applied Polymer Science, Vol. 95, 2005, pp.967–974

10.     Ovidiu Ivanciuc, Applications of Support Vector Machines in Chemistry, Reviews in Computational Chemistry, volume 23, Eds.: K. B. Lipkowitz and T. R. Cundari, Wiley-VCH, Weinheim, 2007, pp.291-400

11.     R. Burbidge, M. Trotter, B. Buxton, S. Holden, Drug design by machine learning: support vector machines for pharmaceutical data analysis, Computers and Chemistry 26, 2001, pp.5–14

12.     L. C. G. Oswaldo, H. R. C. Marta, N. V. F. Darcy, F. S. Adriano, J. I. F. Helcio, O. Q. A. Henrique, B. S. Messias, Discoloration process modeling by neural network, Chemical Engineering Journal 140, 2008, pp.71–76

13.     Ting Wang, Lijuan Qin, Application of SVM Based on Rough Set in Smart Grid Energy Saving Problem, 2010 2nd Conference on Environmental Science and Information Application Technology pp.313-316

14.     A. J. Smola and B. Scholkopf, A Tutorial on Support Vector Regression, Statistics and Computing, Volume 14, Issue 3, August 2004, pp.199-222

15.     F. Yang, M. A. White, A. R. Michaelis, K. Ichii, H. Hashimoto, P. Votava, A. X. Zhu, and R. R. Nemani, IEEE Transactions on Geoscience and Remote Sensing, 44, No. 11, 2006, pp.3452-3461

16.     N. Chen, Wencong Lu, Jie Yang, Guozheng Li, Support Vector Machine in Chemisrty, p.19-20, World Scientific Publishing, 2004

17.     D. W. Stockburger, Multivariate Statistics: Concepts, Models, &  Applications, available: 
http://www.psychstat.missouristate.edu/multibook/mlt08m.html

42-46

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

11.

Authors:

Ramesh Kumar, Prabhat Patel

Paper Title:

Signal Denoising with Interval Dependent Thresholding Using DWT and SWT

Abstract:   Degradation of signals by noise is an omnipresent problem in almost all fields of signal processing. Therefore, in practical applications, before analyzing the received signal it is necessary to de-noise it. In this paper we have used the interval dependent threshold selection rule for threshold calculation and analyzed its performance with the help of Discrete and Stationary Wavelet Transform. The results show that Mean Square Error (MSE) of the interval dependent threshold selection rule is less than that of conventional fix form threshold selection rule for signal de-noising. Moreover using the interval dependent thresholding with Stationary Wavelet Transform (SWT) the denoising capacity of the SWT increases significantly. Therefore, it proves the superiority of proposed signal denoising algorithm. Moreover the result obtained with is compared with the denoising capability of interval dependent threshold selection rule using Discrete Wavelet Transform(DWT) and it is found that SWT gives better performance than DWT due to its property of translational invariance.

Keywords:
 Interval dependent threshold selection, Discrete Wavelet Transform (DWT). Stationary Wavelet Transform (SWT). Mean Square Error (MSE), Signal Denoising..


References:

1.        Mallat, “A Wavelet Tour of Signal Processing”  Academic  Press, San Diego, USA, 1998.
2.        Daubechies, Ten Lectures on Wavelets. Philadelphia, PA:   SIAM  

3.        M Ayat,;M.B Shamsollahi, ;B  Mozaffari, ; S Kharabian, “ECG denoising using modulus maxima of wavelet transform” Annual International Conference on Engineering in Medical and Biology Society, IEEE, pp. 416-419, 2009 .

4.        D.L.Donoho, “De-noising by soft-thresholding”, IEEE Trans. on  Information Theory, 41, 3, pp.613- 627, 1995.

5.        D. L. Donoho, I. M. Johnstone, “Ideal Spatial Adaptation via Wavelet Shrinkage,” Biometrika, vol. 81, pp. 425-455, 1994.

6.        Robert J. Barsanti, and Jordon Gilmore, “Comparing noise removal in  the wavelet and Fourier domains,  43rd  Southern Symposium on  System Theory, IEEE, pp. 163-167, 2011.

7.        Qidao Zhang, R Aliaga-Rossel and P Choi, “Denoising of gamma-ray signals by interval-dependent thresholds of wavelet analysis”, measurement science and technology, volume 17, number 4 iop science journal, 2006.


47-50

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

12.

Authors:

Appana. Manikanta Sitaram, Kadali. Mohan Swamy, A. Rama Krishna

Paper Title:

Gigabit Passive Optical Networks (GPON) the Ultimate Solution for Large Bandwidth

Abstract:  The demand for bandwidth has increased drastically. So optical transmission has got more importance in access networks. The upcoming features like IPTV, High speed internet(HSI), Video on demand(VOD), online gaming are confronting large bandwidth at the customer end.The demand of bandwidth can be satisfied by XDSL, but the distance is restricted by using this type of technique. So we can use optical transmission for achieving large bandwidth by using passive optical networks(PON). One of the most advanced PON solution is Gigabit PON (GPON). This is the most widely used solution where there is a requirement of large bandwidth. This paper provides an overview of GPONfeatures, transmission mechanism, optical splitting and power budget

Keywords:
 IPTV, GPON, PON, HSI

References:

1.       Gerd Keiser FTTX -concepts& applications.
2.       Kumar Shakthi Singh GPON –Next generation access networks.

3.       Sami lallukka, PerttiRatikainen -PON/Transport concepts.


51-53

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

13.

Authors:

Rajanala. Manasa Valli, Parvathaneni.Tejaswini, A.Rama Krishna

Paper Title:

Security Problems and Their Defenses in TCP/IP Protocol Suite

Abstract:   The Transmission Control Protocol/Internet Protocol (TCP/IP) is combination of different protocols at various layers.TCP/IP is the basic communication language or protocol of the Internet and private networks either an intranet or an extranet. The TCP/IP suite has many design weaknesses so far as security and privacy are concerned. Some of these are protocol design weaknesses, where as rest are defects in the software that implements the protocols. In this paper, I focused mainly on protocol level issues, rather than implementation flaws. In this paper, we discuss about the security issues related to the some of the protocols in the TCP/IP suite.

Keywords:
IP (Internet Protocol), RIP (Routing Information Protocol), TCP (Transmission Control Protocol), UDP (User Datagram Protocol).


References:

1.        S.M.Bellovin. A look back at “Security problems in the TCP/IP Protocol suite”.
2.        S.M.Bellovin, security problems in the TCP/IP protocol suite, Computer Communications Review.http://www.research.att.com/~smb/papers/ipext.pdf

3.        Larson, M.and Liu, C.,” Using BIND: Don’t get spoofed again”, SunWorld, November 1997
http://www.sunworld.com/swol-11-1997/swol-11-bind.html
4.        Stevens, Glenn.”The Domain Name Service”. June 21, 1995.http://eeunix.ee.usm.maine.edu/guides/dns/dns.html

5.        I.Arce, Attack trends: More bang for the bug: AN account of 2003’s attack trends, IEEE Security & Privacy

6.        R.Barden, editor.Requirements for Internet hosts-communication layers.RFC 1122, Internet Engineering Task Force, oct.1989.

7.        Defense Communication Agency. Defense data subscriber security guide, 1983.

54-57

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

14.

Authors:

K.V.S.Mounika, Nanduri Jyothirmai, A.Rama Krishna

Paper Title:

Dynamic Routing With Security Considerations

Abstract:   One of the major issues for data communication over wired and wireless networks is the security. Different from the past works which includes the Cryptography algorithms and System Infrastructures, we are proposing a dynamic routing algorithm that could randomize the delivery of packets for data transmission as it is compatible and also easy to implement.      It is compatible with some of the popular routing protocols such as the Routing Information Protocol which uses hop-count as its metric in the wired networks and Destination-Sequenced Distance Vector protocol in the wireless networks. In the RIP where the hop-count is considered only a limited number of hops are chosen and data transmission are done by selecting the hops randomly in a network. This improves security as well as controls traffic in a network. The routing table in this algorithm is based on the one of the Dynamic routing algorithms known as “Bellman-Ford algorithm” or “Ford Fulkerson Routing algorithm”. An analytical study on the proposed algorithm is presented and the results are verified to show the capability of the proposed algorithm.

Keywords:
 Bellman Ford algorithm, Dynamic Routing, IP Security, Routing Information Protocol (RIP), Secure Socket Layer.


References:

1.       T.H. Cormen, C.E. Leiserson and R.L. Rivest, Introduction to Algorithms.
2.       D. Collins, Carrier Grade Voice over IP. McGraw-Hill, 2003.

3.       G. Malvin, Routing Information Protocol (RIP) Version 2 Carrying additional Information, Request for comments (RFC 1723), Nov. 1994.

4.       Secure Socket Layer (SSL), http://www.openssl.org/, 2008.

5.       P. Erdo’s and A. Renyi, “On Random Graphs”, Publications.

6.       W. Lou and Y. Fang, “A Multipath Routing Approach for Secure Data Delivery”.


58-61

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

15.

Authors:

Parvathaneni.Tejaswini, K.V.S.Mounika, A.Rama Krishna

Paper Title:

IPV6 and Deep Packet Inspection

Abstract:   The current version of the internet, IPV4 was depleted of addresses on february3, 2011. The storage of address has led to the introduction of IPV6 which has 128-bit (16-byte) source and destination IP addresses. Many organisations do not see a reason to convert to IPV6, and believe they are not running IPV6.Whether an organisation knows it or not, any laptop/PC running Vista or Windows 7 is a vulnerability from which attacks can come that will be invisible to IPV4 networks. Since the Internet today uses IPV4 for 99% of the traffic, it will be slow migrations to IPV6.Three transition strategies are being employed: header translation, dual stack and tunnelling of IPV6 inside IPV4.Tunneling is the most precarious method for today’s IPV4 networks. The IPV6 packet is included inside the message field of an IPV4 packet. The content of the IPV6   packet will not be noticed by an IP4 firewall or intrusion detection system. Hidden IPv6 traffic running across an organisation’s network can wreak havoc, allow malware to enter the network, and be the basis for a denial of service attack. The only defence against such attacks is deep packet inspection (DPI). The widespread use of DPI is inevitable. The first serious security breach caused by tunnelled IPV6 inside an IPV4 packet is certain to come in the near future. This event will be a stimulus to organisation to defend against such attacks.

Keywords:
 Cyber terrorism, Deep packet inspection, IPv4, IPv6, Security.


References:

1.        http://isoc.org/wp/worldipv6day
2.        http://www.aclu.org/net-neitrality

3.        S. Bradner and A. Mankin, “The Recommendations for the Next Generation IP Protocol”, RFC 1752, Jan.1995.

4.        C.Caicedo, J.Joshi, and S.Tuladhar, “IPv6 Security Challenges”, Computer, IEEE Computer Society, February 2009

5.        BihrouzanA. Forouzan,“TCP/I P protocol  suite”, 4th Edition,  McGraw Hill.


62-65

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

16.

Authors:

Venkata Videhi Balusupati, Pavani Velaga, A.Rama Krishna

Paper Title:

Architecture of OCB-283

Abstract:   OCB 283 means Organ De CommandeB2 Version 8300 Microprocessor. It is the latest electronics digital ISDN type switching technology being imported in INDIA, OCB 283 is a digital switching system which supports a variety of communication needs like basic telephony, ISDN, interface to mobile communication, data communication etc, it is a Digital Switching System (DSS) with single ‘T’ stage switch. A maximum of 2048 PCM’s can be connected. It supports both analog and digital subscriber. Subscriber connected units (CSN) are so designed that they can be equipped with either analog subscriber or digital subscriber. Or both the cards for analog subscriber and digital are different, but can be equipped in any slot of the shelf. These provide facility to connect speech path from a subscriber’s loop or circuits from an external PCM’s and transfers these speech samples on to selected time slots called voice channels on a LR link (internal PCM). This provides access for Man Machine dialogues for the human operators to interact and command the working of exchange equipments.

Keywords:
 OCB (Organ de Commando with version B), DSS (Digital Switching System), CSN (Subscriber Connection Unit), PCM (Pulse Code Modulation).


References:

1.        The differential call processing based on the simple priority scheduling algorithm in SIP6. Chinchow Kim, Byounguk chio, Keecheon Kim, Sum young Han.
2.        Call Processing language framework and requirement. J Lennox, H Schulzrinne.

3.        Wireless D black by Uyless.

4.        Cisco BTS 10200 softswitch command line interface.

66-69

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

17.

Authors:

Velaga Pavani, Immadisetty L V Chandrika, A.Rama Krishna

Paper Title:

Local Area Network (LAN) Technologies

Abstract:   Generally, small networks are often called as LAN (Local Area Network).A LAN is a network allowing easy access to the computers or peripherals. Networking means interconnection of computers. These computers can be linked together for different purposes and using a variety of different cabling types. Thus leading to less wastage of time and hence increased productivity.LAN mainly depends on the characteristics and the factors such as Topology, Medium Access Control (MAC) and Transmission Medium. This provides the security. LAN has Ethernet. LAN mainly works on the Carrier-Sense Multiple Access with Collision Detection (CSMA/CD). The Ethernet specification performs the same functions as the OSI physical and Data Link Layer of data communications. Wired LANs transmit the data but these are physically connected through repeaters and bridges and Wireless LANs transmit and receive data over air, without the use of any cable. These are physically not connected.

Keywords:
 LAN (Local Area Network), MAC (Medium Access Control), CSMA/CD (Collision-Sense Multiple Access with Collision Detection), FHSS (Frequency-Hopping Spread Spectrum technology), DSSS (Direct-Sequence Spread  Spectrum Technology), AP (Access Point), NOS (Network Operating System).


References:

1.        LAN Switching, CCIE Routing and Switching Certification Guide, Fourth Edition.
2.        Designing Switched LAN networks, CCIE Fundamentals: case studies and Network design, Second Edition.

3.        Networking Fundamentals, CCNA Exam cram, Third Edition.

4.        Administration of LAN-to-LAN tunnels, Cisco Secure virtual private Networks, second edition.

5.        Switched network Management, Case studies and network design of CCIE fundamentals, second edition.


70-73

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

18.

Authors:

N.Jyothirmai, R. Manasa Valli, A.Rama Krishna

Paper Title:

SDH and Its Future Trends

Abstract:   SDH possess an international standard networking principle. It is synchronous by nature so name of the hierarchy is taken from multiplexing method. The evolution of this system improving the economy of operability and reliability of a digital network SDH evolution meets the requirement of the customer with respect to the different band width requirements and different services.SDH standard defines the transmission rate developed to 155.52 mbps. In multiplexing process payloads are layered in to lower order and higher order virtual container, each including a range of over head functions for management and error monitoring. frame has a repeative structure and consists of nine equal length segment .Each segment in STM-1 possess the information structure .The flexibility of SDH can be used to best advantage by introducing a network topology.

Keywords:
 CCITT: Comite Consult if International de Telegraphique et Telephonique STM: Synchronous Transport Module ADM: Add Drop Multiplexer, POH: Path Over Head SOH: Section Over Head


References:

1.       ETS 300 304 “Transmission and Multiplexing (TM); Synchronous Digital Hierarchy (SDH) Information Model for Network Element(NE) view”.
2.       ITU-T Recommendation M.3100 ”Generic Network Information Model”.

3.       EN 300 417-3-1 “Transmission and Multiplexing (TM); Generic Requirements of transport functionality of equipment, part 3-1, Synchronous Transport Module(STM-N) Regenerator and Multiplex Section Layer functions”.

4.       ITU-T Recommendation G.702 Digital Hierarchy Bit Rates 

5.       ITU-T G.803”Architechture of Transport Network based on Synchronous Digital Hierarchy (SDH)” 03/2000.


74-78

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

19.

Authors:

Immadisetty.L.V.Chandrika, Venkata.Videhi. Balusupati, A.Rama Krishna

Paper Title:

Point- To- Point Protocol

Abstract:   The telephone line provides a physical link, but to control and manage the transfer of data, there is a need for point-to-point connection. The first   protocol devised for this purpose was serial line internet protocol (SLIP). However, SLIP has some deficiencies: it does not support protocols other than internet protocol (IP). It does not allow the IP addresses to be assigned dynamically, and it does not support authentication of the user. The POINT-TO-POINT (PPP) is a protocol designed to respond to respond to the deficiencies. Today  the PPP protocol standard finds wide use in asynchronous and synchronous connections between computers, bridges, routers and other intermediate devices.PPP  is gaining acceptance as a standard for Integrated Services Digital Network(ISDN), and many  implementations of X.25 also support PPP connection.

Keywords:
LCP(Link Control Protocol), NCP(Network Control Protocol), CRC(cyclic redundancy check), FCS(Frame check sequence), ISO(International Standards Organization), PDU (Protocol Data Unit), HDLC(High( Level) Data Link Control.


References:

1.       CCENT: Cisco certified entry networking technician, study guide.
2.       CCIE Routing and switching V4.0 quick reference, second edition.

3.       Perkins, D., “The point –to– point protocol  for transmission of  multi –protocol Data grams over point-to-point links”.

4.       Hobby R., and D. Perkins, “The point-to-point protocol Initial configuration options”, CMU, UC Davis, July 1990.

5.       IEEE Draft Standard p802.1d/D9 MAC Bridges, Institute of Electrical and electronic engineers, also published as ISO DIS 10038, July 1989.

6.       IEEE Draft Standard p802.5d/D13 Draft Addendum to ANSI/IEEE standard 802.5-1988 token ring MAC and PHY Specification Enhancement for Multiple-ring networks, Institute of electrical and electronic engineers, May 1989.

7.       Establishing a Point-to-point WAN connection with PPP, Authorized self-study guide interconnecting Cisco network devices, Part 2(ICND2).

8.       Authentication protocols: computer TTA network +2009 in depth.

9.       Layered Data Link Protocols: Introduction to network security.

10.     Control (HDLC) and PPP: CCIE routing and switching v4.0 Quick reference, second edition.

11.     Point to point protocol: CCENT, Cisco@ certified entry networking technician, study guide.

12.     Network control protocol(NCP): CCNA certification all- in –one dummies

13.     PPP Concepts: CCNA 640-802, second edition.

79-81

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

20.

Authors:

Swapna Devi, Shanu Singla

Paper Title:

Comparative Analysis of Modified Social Emotional Optimization Algorithm & Particle Swarm Optimization Techniques

Abstract:   This paper presents a comparative analysis of Modified Social Emotional Optimization Algorithm and Particle Swarm Optimization techniques. Social Emotional Optimization Algorithm is a population based stochastic optimization technique in which the impact of human beings’ emotional factors on decision-making practices is emphasized where as Swarm intelligence (SI) techniques like Genetic algorithm, Ant Colony Optimization and Particle Swarm Optimization are based on swarm behaviour. Although GA [1], PSO [2][3] and ACO[9] algorithms have lot of  advantages  but they simply simulate group behaviours and animal foraging. Social Emotional Optimization Algorithm (SEOA)[5] is a new swarm intelligent technique, that simulates human social behaviour. In SEOA, each individual represents one virtual person who communicates through cooperation and competition in the society. This paper focuses on  the comparative analysis of Modified Social Emotional Optimization Algorithm in comparison with most successful method of optimization techniques inspired by Swarm Intelligence (SI) : Particle Swarm Optimization (PSO) and a novel swarm intelligent population-based optimization algorithm Social Emotional Optimization (SEOA). An elaborate comparative analysis is carried out to endow these algorithms, aiming to investigate whether the Modified Social Emotional Optimization Algorithm improves performance which can be implemented in many areas.

Keywords:
 Social Emotional Optimization, Particle Swarm Optimization and Swarm intelligence.


References:

1.       Colorni A, Dorigo M, Maniezzo V, “Distributed optimization by ant colonies”, 1st European Conference on Artificial Life, pp.134-142, 1991.
2.       Eberhart R,Kennedy J. “New optimizer using particle swarm theory”, Sixth International Symposium on Micro Machine and Human Science,IEEE, pp.39-43, 1995.

3.       Kennedy J, Eberhart RC “ Particle swarm optimization”, IEEE International Conference on Neural Networks. Piscataway, NJ, USA, pp.1942-1948,1995.

4.       He S, Wu QH, Saunders JR, “ Group search optimizer an optimization algorithm inspired by animal searching behavior”, IEEE International Conference on  Evoluation Compuatation, pp: 973-990,2006.

5.       Cui ZH, Shi ZZ, Zeng JC, “ Using social emotional optimization algorithm to direct orbits of chaotic systems”, 1st International Conference on Swarm, Evoluation and Memetic Computation (SEMCCO2010), pp. 389-395, 2010.\
6.       Jianna Wu,  Zhihua Cui,  and Jing Liu, “A Hybrid Social Emotional Optimization Algorithm With Metropolis Rule”, International Conference on Modelling, Identification and Control, Shanghai, China, pp. 363-370, June 26-29, 2011.
7.       Cai XJ, Cui ZH, Zeng JC, Tan Y, “Particle swarm optimization with self-adjusting cognitive selection strategy”, International Journal of Innovative Computing and Information Control., Vol.4, No.4, pp. 943-952, 2008.

8.       Yao X, Liu Y, Lin GM, “Evolutionary programming made faster”, IEEE Transactions on Evoluation. Computation, Vol.3, No.2, pp. 82-102, July, 1999.

9.       M. Dorigo, V. Maniezzo, and A. Colorni, “Ant system: Optimization by a colony of cooperating agents,” IEEE Transactions on Systems, Man, and Cybernetics—Part B, Vol. 26, No. 1, pp. 29–41, 1996.

10.     Zhanhong Wei, Zhihua Cui and Jianchao Zeng, “Social Cognitive Optimization Algorithm with Reactive Power Optimization of Power System”, 2nd International Conference on Computational Aspects of Social Networks, pp.11-14, September, 2010.

82-84

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

21.

Authors:

P.Soundarya, Solomon Gotham

Paper Title:

CAVLC Video coding Technique for MPEG-4

Abstract:   This paper presents architecture for context adaptive variable length coding (CAVLC) used in the MPEG-4 AVC/H.264 video coding. The proposed design implements the fine-grained zero skipping at the 4x4 block level and the individual coefficient level. This design saves more than half of cycle count and 41% of area cost when compared with the other designs. The total gate count of the design is 10.2K gates. The design is implemented on Xilinx Spartan 3E Xc3s500 fpga and the total power consumption is estimated to be 0.081W.

Keywords:
 CAVLC, MPEG-4, AVC/A.264.


References:

1.        Joint Video Team (JVT), Draft ITU-T recommendation and Final Draft International Standard of Joint Video Specification. ITU-T Rec. H.264 and ISO/IEC 14496-10 AVC, May 2003.
2.        I. Amer, W. Badawy, and Graham Jullien, “Towards MPEG4 part 10 system on chip VLSI prototype for context-based adaptive variable  length coding (CAVLC),” in Proc. SIPS, pp. 275–279, 2004.

3.        Y. K. Lai, C. C. Chou, and Y. C. Chung, “A simple and cost effective video encoder with memory-reducing CAVLC,” in Proc. ISCAS, pp. 432–435, May 2005.

4.        T. C. Chen, and et al,“Dual-block-pipelined VLSI architecture of entropy coding for H.264/AVC baseline profile,” in Proc. VLSI-DAT, pp, 271–274, April, 2005

5.        Joint Video Team reference software JM8.2  


85-89

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

22.

Authors:

P. Poornima, Solomon Gotham

Paper Title:

Implementation of DDS Based Harmonic Signal Generator

Abstract:   A harmonic signal generator with adjustable frequency, phase and harmonic proportion is designed in this paper. The design of this harmonic signal generator is based on direct digital frequency synthesis (DDS) technology. The classic structure of DDS is introduced and a kind of compression ROM is designed. Then, the DDS core with compression ROM is compiled using Xilinx Xc3s500e fpga by VHDL language. The performances such as integration, expansibility are very much improved. The principle of DDS is discussed particularly; the optimized structure of DDS core is presented in this paper. The total power consumption of the device was foundto be 0.081W.

Keywords:
 DDS, SOPC, harmonic signal generator, Noise


References:

1.        J. Tierney, C. M. Rader, and B. Gold, A digital frequency synthesizer,
2.        IEEE Trans. Audio and Electroacoustics, Vol.Au-19, No.1, 48-57, 1971.

3.        Nios 3.0 CPU, Ver. 2.2, Xilinx Co., San Jose, CA, USA, 2004.
4.        Nios II Processor Reference Handbook, Xilinx  Co., San Jose, CA, USA, 2008.
5.        X.M. Li and X.J. Qu, Application of DDS/FPGA in Signal Generator Systems, Modern Electronics Technique, Vol. 29, No.9, 78-79, 2006.

6.        Z.Q. Zhang and J.B. Zhang, Design of Harmonic Signal Generator  Based on DDS/SOPC, Automation & Instrument, vol.23, No.8,  16-21, 2008. 

7.        Y. Yu and X.L. Zheng, Design and Implementation of Direct Digital  Frequency Synthesis Sine Wave Generator Based on FPGA, Journal  of Electron Devices, Vol.28, No.1, 596-599, 2005.

8.        W. Li and J.B. Zhang, Research of Parameter Adjustable Harmonic  Signal Generator Based on DDS, ISECS International Colloquium on Computing, Communication, Control, and Management, 88-91,

9.        2008. R. J. Vidmar. (1992, August). On the use of atmospheric plasmas as electromagnetic reflectors. IEEE Trans. Plasma Sci. [Online]. 21(3). pp. 876—880.   Available: http://www.halcyon.com/pub/journals/21ps03-vidmar

10.     A.Grama and G. Muntean. Direct digital frequency synthesis implemented on a FPGA chip, the 29th

11.     International Spring Seminar on Electronics Technology: Nano Technologies for Electronics .

12.     Packaging, Conference Proceedings, Piscataway, NJ 08855-1331.

90-93

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

23.

Authors:

Vivekananda M, R.P.Das, K.V.Ramana Rao

Paper Title:

Two Dimensional Cellular Automata for Pseudo Random Number Generation

Abstract:   Cellular automata (CA) were initiated in the early 1950s to develop complex structures of capable self-reproduction and self-repair. Since then many researchers have taken attend in the study of CA. Initially, CA concept was first introduced by von Neumann von Neumann (1966) for the proposal of modeling biological self-reproduction. His primary interest was to derive a computationally universal cellular space with self-reproduction configurations. Afterward, a new phase of activities was started by Wolfram Wolfram (1983; 1984), who pioneered the investigation of CA as a mathematical model for self-organizing statistical systems. Wolfram was proved that the randomness of the patterns generated by maximum-length CA is significantly better than other widely used methods, such as linear feedback shift registers. The intensive interest in this field can be attributed to the phenomenal growth of the VLSI technology that permits cost-effective realization of the simple structure of local-neighborhood CA Wolfram (1986). In this paper, an efficient PRNG based on hybrid between one-dimension (1-D) and two-dimension (2-D) CA is proposed. In the phase of the evolution of 2-D CA cells, the proposed CA PRNG is based on von Neumann neighborhood, in that this method refers to the five cells and new control values (rule decision input value & linear control input value) to decide a rule. In the phase of the evolution of 1-D CA cells, on the other hand,< 90, 150 > rule combination is used because this rule combination is better than the others Hortensius et al. (1989). In the meantime, the proposed CA PRNG is compared with previous works Guan et al. (2004); Tomassini et al. (2000) to check the quality of randomness. The proposed CA PRNG could generate a good quality of randomness because the proposed CA PRNG is better than the previous works and passed by the ENT Walker.  In this project we have tried to verify the basic characterization of 2-D CA using a Xilinx Spartan 3E fpga.

Keywords:
 About four key words or phrases in alphabetical order, separated by commas.


References:

1.       G. O. Young, “Synthetic structure of industrial plastics (Book style with paper title and editor),” in Plastics, 2nd ed. vol. 3, J. Peters, Ed.  New York: McGraw-Hill, 1964, pp. 15–64.
2.       W.-K. Chen, Linear Networks and Systems (Book style).              Belmont, CA: Wadsworth, 1993, pp. 123–135.

3.       H. Poor, An Introduction to Signal Detection and Estimation.   New York: Springer-Verlag, 1985, ch. 4.

4.       B. Smith, “An approach to graphs of linear forms (Unpublished work style),” unpublished.

5.       E. H. Miller, “A note on reflector arrays (Periodical style—Accepted for publication),” IEEE Trans. Antennas Propagat., to be published.

6.       J. Wang, “Fundamentals of erbium-doped fiber amplifiers arrays (Periodical style—Submitted for publication),” IEEE J. Quantum Electron., submitted for publication.

7.       C. J. Kaufman, Rocky Mountain Research Lab., Boulder, CO, private communication, May 1995.

8.       Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate interfaces (Translation Journals style),” IEEE Transl. J. Magn.Jpn., vol. 2, Aug. 1987, pp. 740–741 [Dig. 9th Annu. Conf. Magnetics Japan, 1982, p. 301].

9.       M. Young, The Techincal Writers Handbook.  Mill Valley, CA: University Science, 1989.

10.     (Basic Book/Monograph Online Sources) J. K. Author. (year, month, day). Title (edition) [Type of medium]. Volume(issue).   Available: http://www.(URL)
11.     J. Jones. (1991, May 10). Networks (2nd ed.) [Online]. Available: http://www.atm.com
12.     (Journal Online Sources style) K. Author. (year, month). Title. Journal [Type of medium]. Volume(issue), paging if given.           Available: http://www.(URL)

13.     R. J. Vidmar. (1992, August). On the use of atmospheric plasmas as electromagnetic reflectors. IEEE Trans. Plasma Sci. [Online]. 21(3). pp. 876—880.   Available:

14.     http://www.halcyon.com/pub/journals/21ps03-vidmar


94-96

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

24.

Authors:

B.Chandra Shekar, V.Prudhvi Raj, A.Rama Krishna

Paper Title:

Conversion and Installation Procedure Of256p Rax to Anrax

Abstract:   The present manuscript deals with the conversion of 256P RAX to AN-RAX and also the installation procedure of 256P RAX to AN-RAX. The 256P RAX uses only 184 lines PSTN subscribers but if we convert it into ANRAX it uses 248 lines PSTN subscribers through V5.2 protocol. The 256P RAX consists of three racks, they are: 1) Power Distribution Panel (PDP), 2)Master Frame & 3)Slave Frame.  After the conversion of 256P RAX to AN-RAX we can use the master frame as slave frame and slave frame as master frame, both will be same after the conversion. To do the conversion of 256P RAX some of the cards become redundant and those cards have to be removed. Then the modification will be done for the 256P RAX. The conversion and installation procedure is completely done in five steps. The main objective for converting the 256P RAX we can have the maximum lines for the exchange.

Keywords:
256P RAX, ACCESS NETWORK RURAL AUTOMATIC EXCHANGE (AN-RAX), PUBLIC SWITCHING TELEPHONE NETWORK (PSTN), V5.2 protocol Standard interface between LE and AN, Local Exchange (LE), AN-RAX Controller Card (ARC), AN-RAX Interface Card (ARI).


References:

1.      C-dot system & practices user manual.
2.      Jto phase c-dot volume-2

3.      “an-rax’ from wikipedia

4.      256p rax from ‘c-dot’ website.

5.      ‘Switching concepts’ from wikipedia.


97-101

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

25.

Authors:

Manjiri R. Purohit, V. D. Hajare

Paper Title:

Performance Evaluation of Heart from its Mathematical Model using Matlab Simulink

Abstract:   Mathematical modeling of the biological systems plays a vital role in understanding of their activities and abnormalities associated with them. Various approaches are there in existence for the mathematical representation of the systems. This paper discusses mathematical modeling of the heart based on the activity of the heart by carotid baroreflex control mechanism as a stimulant. With the mathematical modeling, understanding the complex behavior of the system has become simple. The model shows the normal pressure variations of the heart’s chambers within the standard ranges. The model can then further be used for various clinical and research applications.

Keywords:
 Heart; Mathematical modeling; Simulation.


References:
1.        Mauro Ursino, “Interaction between carotid baroregulation and the pulsating heart: a mathematical model”, American Journal of Physiology, H1733-H1747, 1998. 
2.        Mette S. Olufsen, Johnny T. Ottesen, Hien T. Tran, Laura M. Ellwein, Lewis A. Lipsitz, Vera Novak; Blood pressure and blood flow variation from sitting to standing: Model development and validation, Journal of applied physiology, 1523-1537, 2005.

3.        Gerard J. Tortora; Principles of Anatomy and Physiology, 12th edition, 2009.

4.        K.Sembulingam; Essentials of Medical Physiology, Second Edition, 2000.

5.        B.D.Chaurasia; Human Anatomy, Volume one, Third edition, 2000.

6.        Dyuti Trivedi, Simulation of a complete cardiovascular loop: Development of a simulink based pressure flow model to obtain the origin of electrical impedance cardiogram, Thesis of Master of Science, May 2009.

102-105

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

26.

Authors:

Naveen Kumar, B.Venu Gopal

Paper Title:

VLSI Implementation of Data Encryption Standard Algorithm

Abstract:   There are two main types of cryptography in use today –symmetrico rsecret key cryptography and a symmetric or public key cryptography. Symmetric key cryptography is the oldest type whereas asymmetric cryptography is only being used publicly since the late 1970’s 1. Asymmetric cryptography was a major milestone in the search for a perfect encryption scheme. Secret key cryptography goes back to at least Egyptian times and is of concern here. It involves the use of only one key which is used for both encryption and decryption (hence the use of the term symmetric). Figure 2.1 depicts this idea. It is necessary for security purposes that the secret key never be revealed To accomplish encryption, most secret key algorithms use two main techniques known assubstitutionandpermutation. Substitution is simply a mapping of one value to another whereas permutation is a reordering of the bit positions for each of the inputs. These techniques are used a number of times in iterations called rounds. Generally, the more rounds there are, the more secure the algrithm. A non-linearity is also introduced into the encryption so that decryption will be computationally infeasible 2 without the secret key. This is achieved with the use of S-boxes which are basically non-linear substitution tables where either the output is smaller than the input or viceversa.

Keywords:
 cryptography, encrypt ion


References:

1.        National  Bureau  of  Standards –  Data  Encryption  Standard,  Fips  Publication 46,1977.
2.        O.P.  Verma,  Ritu  Agarwal,  Dhiraj  Dafouti,Shobha  Tyagi  ―  Performance Analysis Of Data Encryption Algorithms ― , 2011

3.        Gurjeevan Singh, Ashwani Kumar Singla, K.S.Sandha ― Performance  Evaluation of Symmetric Cryptography Algorithms, IJECT, 2011.

4.        Diaa  Salama,  Abdul  Elminaam,  Hatem  Mohamed  Abdul  Kader and  Mohie Mohamed Hadhound ― Performance Evaluation of Symmetric  Encryption Algorithm ―, IJCSNS, 2008

5.        Dr. Mohammed M. Alani ― Improved DES Security, International  Multi-Conference On System, Signals and Devices, 2010

6.        Tingyuan Nie, Teng Zhang ― A Study of DES and Blowfish Encryption  Algorithm,TENCON, 2009

7.        Afaf  M.  Ali  Al-  Neaimi,  Rehab  F.  Hassan  ―  New  Approach  for  Modified  Blowfish  Algorithm  Using  4 –  States  Keys  ,  The  5th  International Conference On Information Technology,2011

8.        J.Orlin Grabbe ―The DES Algorithm Illustrated

9.        Dhanraj, C.Nandini, and Mohd Tajuddin ― An Enhanced Approch for  Secret  Key  Algorithm  based  on  Data  Encryption  Standard,  International Journal of
Research And Review  in  Computer  Science,  August 2011

10.     Gurjeevan Singh, Ashwani Kumar, K.S.  Sandha ―A Study of New  Trends in Blowfish Algorithm , International Journal of Engineering  Research and Application,2011

11.     W.  Stallings, Cryptography and Network Security:  Principles and Practices, 5th ed., Prentice Hall, 1999.

12.     B.Scheier, Applied Cryptography: Protocols, Algorithms and Source  Code in C,2nd ed.., John Wiley & Sons, 19995. 
 

106-110

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

27.

Authors:

Neha Gupta, V.K Banga

Paper Title:

Localization of Text in Complex Images Using Haar Wavelet Transform

Abstract:   In this paper, a new hybrid approach is developed which locate text in different backgrounds. However, variation of text due to differences in size, style, orientation and alignment, as well as low image contrast and complex background make the problem of automatic text localization extremely challenging. The text localization algorithm system is designed to locate text in different kinds of images and eliminates the need to devise separate method for various kinds of images. Firstly, the color image is converted into grayscale image. After that, Haar Discrete Wavelet Transform (DWT) is employed. Haar DWT decompose image into four sub image coefficients, one is average and other three are detail. Now, Sobel edge detector is applied on three detail components, the resultant edges so obtained are combined to form edge map. The morphological dilation is performed on binary edge map and further label the connected components. Finally, using some specific condition, the text is obtained in bounding box. 

Keywords:
 Bounding box, Discrete Wavelet Transform, Haar wavelet, Sobel edge detector.


References:

1.       Keechul Jung, Kwang In Kim and Anil K. Jain, “Text information localization in images and video: A Survey”, Elsevier, Pattern Recognition, vol.37 (5), pp 977–997, 2004.
2.       H.K.kim, “Efficient Automatic Text Location Method and Content Based Indexing and Structuring Of Video Database”, Journal of Visual Communication Image Representation,vol.7(4),pp336-344,1996.

3.       Mohieddin Moradi, Saeed Mozaffari, and Ali Asghar Orouji, “Farsi/Arabic Text Localization from Video Images by Corner Detection”, 6th, IEEE, Iranian conference on Machine Vision and image processing, Isfahan, Iran, 2010.

4.       Chung-Wei Liang and Po-Yueh Chen, “DWT Based Text Localization”, International Journal of Applied Science and Engineering, pp.105-116, 2004.

5.       Nikolaos G. Bourbakis, “A methodology for document processing: separating text from images”, Engineering Applications of Artifcial Intelligence 14, pp. 35-41, 2001.

6.       C. Strouthopoulos, N. Papamarkos, A. E. Atsalakis, “Text localization in complex color documents”,  The Journal of Pattern Recognition 35, pp.1743–1758, 2002.

7.       Chitrakala Gopalan and D. Manjula, “Contourlet Based Approach for Text Identification and Localization from Heterogeneous Textual Images”, International Journal of Electrical and Electronics Engineering 2(8), pp. 491-500, 2008.

8.       Dr.N.Krishnan, C. Nelson Kennedy Babu 2, S.Ravi 3 and Josphine Thavamani, “Segmentation Of Text From Compound Images”, International Conference on Computational Intelligence and Multimedia Applications”, Tamil nadu , India, vol. 3, pp.526-528, 2007.

9.       S.Audithan, RM. Chandrasekaran, “Document Text Localization from Document Images Using Haar Discrete Wavelet Transform”, European Journal of Scientific Research ISSN 1450-216X, Vol.36, 2009.

10.     Xiaoqing Liu and Jagath Samarabandu, “Multiscale edgebase Text localization from Complex images”, IEEE Multimedia and Expo 2006, International Conference, Tronto, Canada, pp. 1721-1724, 2006.

11.     Roshanak Farhoodi and Shohreh kasaei, “Text  Segmentation From Images With Textured and colored Background”, 13th Iranian conference on Electrical Engineering, 2005 .

12.     Xiao-Wei Zhang,  Xiong-Bo Zheng, Zhi-Juan Weng, “Text Localization Algorithm Under Background Image Using Wavelet Transforms”,  Proceedings of the 2008 International Conference on Wavelet Analysis and Pattern Recognition, Hong Kong, pp.30-31,  Aug. 2008.

13.     R. lienhart, F. Stuber, “Automatic Text Segmentation and Text Recognition for Video Indexing”, The Journal Multimedia Systems , vol(8), pp 69-81,Jan 2000.

14.     M. Padmaja, J. Sushma, “Text Detection in Color Images”, International Conference on Intelligent Agent & Multi-Agent Systems, Chennai, 22-24 July 2009, pp. 1-6, 2009.


111-115

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

28.

Authors:

Hemchand Vashist, Arvind Pathak, Amarjeet Kaur, Sanjay Sharma, Ashish Sharma,Meenu Jangir

Paper Title:

Simulation and Modeling of Fading Channel and Improvement of Channel estimation using Artificial Neural Network

Abstract:   We present a simulation of Rayleigh fading channel. We used MATLAB for its implementation. Further this work explored possible use of Artificial Neural network for channel estimation. This is one of the first steps in improving performance in fading environment.  We present a novel algorithm for channel estimation using ANN with the help of user’s usage history.

Keywords:
 MATLAB.


References:

1.        S. Theon, ”Modeling the Channel Time-Variance for Fixed Wireless Communications”, IEEE Communication Mag., vol.6, NO.8, August 2002, pp 331-333.
2.        B. Skler, ”Rayleigh Channels in Mobile Digital Communication Systems,”IEEE  Communication Mag.,vol.29, no 4, July 1997, pp 90-100.

3.        T. S. Rappaport, Wireless Communication, Chapters. 3 and 4,Upper Saddle River,  NJ: Prentice Hall, 1996.

4.        W.C. Jakes, microwave Mobile Communications, IEEE Press, 1994.

5.        D. C. Cox, R. R. Murray,and A W. Norris, “Measurements of 800 MHz Radio Transmission into Buildings with Metallic Walls,” Bell System Technical  Journal,Vol. 62, pp. 2695~2717,November 1983.
6.        D. C. Cox, R. R. Murray,and A W. Norris, “Measurements of 800 MHz Attenuation Measured In and Around Suburban Houses,”Bell System Technical  Journal,Vol. 63, pp. 921~954,November 1984.
7.        R. J. C. Bultitude and G. K. Bedal, “Propagation Characteristics on Microcellula Urban Mobile Radio Channels at 910 MHz,” IEEE Journal on Selected Areas in Communications, Vol. 7, No. 1, pp. 31_39, January 1989.

8.        T. S. Rappaport, “Characterization of UHF Multipath Radio Channels in Factory  Buildings,” IEEE Transactions on Antennas and Propagation, Vol. 37, No. 8, pp. 1058~1069, August 1989.

9.        D. C. Cox, “Universal Digital Portable Radio Communications,” IEEE Proceedings,Vol 75, No. 4, pp. 436~ 477, April 1987.

10.     H. Hashemi, “Impulse Response Modeling of Indoor Radio Propagation Channels,”IEEE Journal on Selected Areas in Communications, Vol 11, No. 7, pp. 967_978, September 1993.


116-122

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

29.

Authors:

P.Bhanu Krishna, K.V.Vamsi Krishna, M.Kuladeep, G.Karuna Kumar

Paper Title:

The Importance of Transport and Logistics Services in Green Supply Chain Management.

Abstract:   This paper is focused on the importance of transportation & logistics in green supply chain management (GSCM).It is very important for all the related industries to realize the importance of implementing best practices to protect the health of our planet Earth. If no attention is given to the environmental consequences and to ways of addressing environmental challenges in that sector, the beautiful promises of a better lifestyle associated with the information age will be tarnished by the poor quality of our essential commodities – clean air, clear water, and pristine soils. Although GSCM has been comprehensively reviewed, there are areas around Green supply chain that still require further study. One is a gap in the literature in terms of the stakeholder’s views towards green supply chain. Stakeholders would definitely have different views about this and can sometimes be conflicting from the company’s point of view. Some stakeholders would go against green supply chain management and some would not. This paper recommends that researchers should focus more towards qualitative study such as interviews in understanding the different stakeholder views towards green supply chain management to portray the different views about the concept and how this, in the end, implicates management decisions. This is done with the help of four methodologies viz. Reverse Logistics, Calculating the amount of Co2 released, shipment consolidation and Environmental Performance Index(EPI).

Keywords:
 GSCM = [Green purchasing] + [Green manufacturing/materials management] + [Green Distribution / marketing through Shipment Consolidation] + [Reverse logistics


References:

1.        Srivastava, S.K. (2007), ‘Green supply-chain management: a state-of-the-art literature review, International Journal of Management Reviews, Vol. 9, No. 1, pp.53-80.
2.        Green K., Morton B., and New S., Green purchasing and supply policies: Do they improve companies’ environmental    performance? Supply Chain Management, 3(2), 89-95 (1998).

3.        Narasimhan R. and Carter J.R., Environmental Supply Chain Management, The Centre for Advanced Purchasing Studies, Arizona State University, Tempe, AZ, (1998).

4.        www.cleanerproduction.com

5.        Toke L.K., Gupta R.C. and Dandekar Milind, Green Supply Chain Management, Critical Research and Practices, (2010).

6.        Pride W., Ferrell O.C., Marketing Concepts ad Strategies, 3rd ed.,Houghton Mifflin Co. New York: 95, (2003).

7.        M. Ali Ulku, 2007, Elsevier Journal Int.P.Production Economics.

8.        Al- Bakri T., Marketing: principles and concepts of contemporary, Amman: Al Yazouri scientific publication and distribution, Jordan (2006).
9.        Eltayeb, T.K., Zailani, S. (2009), ‘Going green through green supply chain initiatives towards environmental sustainability’, Operations and Supply Chain Management, Vol. 2, No. 2, pp.93110
10.     Meade, L., Sarkis, J. (2002), ‘A conceptual model of designing and selecting third-party logistics service providers’, Supply Chain Management: An International Journal, Vol. 7, No. 5, pp.283-95.

11.     Chen, I.J. and Paulraj. Towards a theory of supply chain management: the constructs and measurements. J. Oper. Manag., 2004, 22, 119–150.

12.     GEMI (Global Environmental Management Initiative), New path to business value, 2001.

13.     Klassen, R.D. and Whybark, D.C., Environmental management in operations: the selection of environmental technologies. Deci. Sci., 1999a, 30, 601– 631.

14.     Murphy, P.R., Poist, R.F., 2003. Green perspectives and practices: a ‘‘comparative logistics’’ study. Supply Chain Management: An International Journal 8 (2), 122–13.

15.     Sundarakani, B., de Souza, R., Goh, M., Wagner, S.M., Manikandan, S., 2010. Modeling carbon footprints across the supply chain. International Journal of Production Economics 128 (1), 43–50.

16.     K.H. Lai, E.W.T. Ngai, T.C.E. Cheng. An empirical study of supply chain performance in transport logistics. International Journal of Production Economics, 2004, 87, 321–331.

17.     Environmental Performance Index (EPI) Survey report, (2012).

123-126

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

30.

Authors:

Prudhvi Raj Vejendla, Chandra Shekar Banoth, A.Rama Krishna

Paper Title:

Digital Switching In Telecom- Munication

Abstract:   Telecommunication networks carry infor- mation signals among entities, which are geographically far apart. An entity may be a computer or human being, a facsimile machine, a Tele-printer, a data terminal and so on. The entities are involved in the process of infor- mation Transfer which may be in the form of a telephone conversation (telephony) or a file transfer between two computers or message transfer between two terminals etc. Today it is almost truism to state that telecommuni- cation systems are the symbol of our information age. With the rapidly growing traffic and untargeted growth of cyberspace, telecommunication becomes a fabric of our life. The future challenges are enormous as we antic- ipate rapid growth items of new services and number of users. What comes with the challenge is a genuine need for more advanced methodology supporting analysis and design of telecommunication architectures. Telecommu- nication has evaluated and growth at an explosive rate in recent years and will undoubtedly continue to do so. The communication switching system enables the universal connectivity. The universal Connectivity is realized when any entity in one part of the world can communicate with any other entity in another part of the world. In many ways telecommunication will acts as a substitute for the increasingly expensive physical trans- portation. The telecommunication links and switching were mainly designed for voice communication. With the appropriate attachments/equipment’s, they can be used to transmit data. A modern society, therefore needs new facilities including very high bandwidth switched data networks, and large communication satellites with small, cheap earth antennas.

Keywords:
 In many ways telecommunication will acts as a substitute for the increasingly expensive physical trans- portation.


References:

1.       Pulse, Digital & Switching Circuits – U.A.Bakshi, A.P.Godse.
2.       Pulse & Digital Circuits U.A.Bakshi.

127-131

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

31.

Authors:

Adil Majdoubi, Mohamed Essaaidi

Paper Title:

The Estimation of DOA in Smart Antenna Systems

Abstract:   Smart antennas systems are being the key solution to increase the spectral efficiency and improving the system performance in mobile communication. Smart antennas usually consist of a number of radiating elements (i.e. array antennas) whose individual excitation can be controlled by DSP (digital signal processor) in order to achieve the desired radiation pattern. The smart antennas systems estimate the direction of arrival of the signal, using techniques such as MUSIC (Multiple Signal Classification), and ESPRIT (estimation of signal parameters via rotational invariance techniques) algorithms. They involve finding a spatial spectrum of the antenna array, and calculating the DOA from the peaks of this spectrum. These calculations are computationally intensive.

Keywords:
 DOA, MUSIC, antenna array, spatial spectrum, beamforming.


References:

1.       Najib Fadlallah. Contribution à l’optimisation de la synthèse du lobe de rayonnement pour une antenne intelligente. Application à la conception de réseaux à déphasage. Thèse. 24 Mai 2005.
2.       Hlawatsch, F. and Boudreaux- Bartles, G. F.“ Linear and quadratic time-frequency signal representations”, IEEE SP Mag., April 1992, (21–67).
3.       L. C. Godara, “Application of Antenna Arrays to Mobile Communications, Part I: Performance Improvement, Feasibility, and System Considerations,” Proceedings of the IEEE, Vol. 85, No. 7, July 1997, pp. 1029-1060.
4.       L. C. Godara, “Application of Antenna Arrays to Mobile Communications, Part II: Beam-Forming and Direction-of-Arrival Considerations," Proceedings of the IEEE, Vol.85,No. 8, August 1997, pp. 1193-1245.

5.       Sheikh, K. Gesbert, D.Gore, D.Paulraj, “Smart antennas for broadband wireless access networks,” IEEE Communications Magazine, Volume: 37 , Issue: 11 , Nov. 1999, Pages:100 – 105.

6.       Kaizhi Huang; Jing Wang; Guoan Chen; Youzheng Wang “Smart antenna and spatial diversity-combining,” 55th Vehicular Technology Conference, 2002. Volume: 1 , 6-9 May 2002 Pages:340 – 344.

7.       ''TMS320C64x Technical Overview'' Literature Number: SPRU395B January 2001.

8.       ''breakthrough DSP architectures'' technology Innovation Vol.3 March 2000 .

9.       "TMS320C6000 CPU and Instruction Set Reference Guide" Literature Number: SPRU189F October 2000.

10.     M. Shafi, D. Gesbert, Da-shan Shiu, P.J. Smith, W.H. Tranter. “Guest editorial MIMO systems and applications. II,” Selected Areas in Communications, IEEE Journal on , Volume: 21 , Issue: 5 , June 2003 Pages:681 – 683.


132-134

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

32.

Authors:

Mohsen Ahmadipour, K.Venkateswara Rao

Paper Title:

Preparation of Nano Particle Mg0.2Fe0.8O by Solution Combustion Method and Their Characterization

Abstract:   The present paper investigated a preparation of Nano sized Mg0.2Fe0.8O by eco-friendly chemical combustion synthesis using magnesium and iron nitrates as oxidizers and the glycine as a fuel to drive the reaction. Powder characterization was carried out by X-ray diffraction (XRD) to estimate crystallite size, Particle Size Analyzer (PSA), Thermal gravimetric analyzer (TGA) for determining sample purity, weight loss percentage and decomposition reaction, Transmission electron microscope and Scanning electron microscope( SEM, TEM) were done to evaluation the morphology and average particle size. In this study are useful for establishing a simple method for the preparation of Mg0.2Fe0.8O Nano powders.

Keywords:
 Solution Combustion Synthesis, Mg0.2Fe0.8O, XRD, SEM, TEM


References:

1.        R.J.WILLEY, P.NOIRCLERC, G.NUSCA,"Preparation and characterization of magnesium chromite and magnesium ferrite aerogels,"chemical engineering communications,vol. 123, No.1, pp.1-16, jan1993.
2.        Q. Chen, A.J. Rondinone, B.C. Chakoumakos, Z.J. Zhang, "Synthesis of superparamagnetic MgFe2O4 nanoparticles by coprecipitation"  Journal of Magnetism and Magnetic Materials, Vol. 194, No. 1–3, PP. 1-7, April 1999.

3.        L.J. Berchmans, R.K. Selvan, P.N.S. Kumar, C.O. Augustin," Structural and electrical properties of Ni1−xMgxFe2O4 synthesized by citrate gel process, Journal of
Magnetism and Magnetic Materials, Vol. 279, No. 1, PP. 103-110, August 2004.

4.        M. Rabanal, A. Varez, B. Levenfeld, J. Torralba, " Magnetic properties of Mg-ferrite after milling process" Journal of Materials Processing Technology, Vol. 143–144, PP. 470-474, 20 December 2003.

5.        A.I. Turkin, V.A. Drebushchak,"Synthesis and calorimetric investigation of stoichiometric Fe-spinels: MgFe2O4 "
6.        Journal of Crystal Growth, Vol. 265, No.1–2, PP. 165-167. 15 April 2004.

7.        T. Sasaki, T. Sasaki, S. Ohara, T. Naka, J.Vejpravova, V. Sechovsky, M. Umetsu, S. Takami, B. Jeyadevan, T. Adschiri,"Continuous synthesis of fine MgFe2O4 nanoparticles by supercritical hydrothermal reaction"The Journal of Supercritical Fluids, Vol. 53, No. 1–3, PP.92-94, June 2010.

8.        H. Aono, H. Hirazawa, T. Naohara, T.Maehara, "Surface study of fine MgFe2O4 ferrite powder prepared by chemical methods " Applied Surface Science, Vol. 254, No.8,  PP. 2319-2324, 15 February 2008.

9.        M.P.Pileni, N.Moumen,"Control of The Size of Cobalt Efrrite Magnetic Fluid"Journal of Physical Chemistry, Vol.100, No. 5,PP.1867-1873,February 1996.

10.     C. Liu, B. Zou, A.J. Rondinone, Z.J. Zhang, "Chemical Controlof Super Paramagnetic Properties of Magnesium and Cobalt Spinel Ferrite Nanoparticles Through
Atomic Level Magnetic Couplings" Journal of American Chemical Society" Vol. 122,No. 26, PP. 6263- 6267, June 16 (2000)

11.     Pathak T.K, Buch J.J.U, Trivedi U.N, Joshi H.H, Modi K.B, "Infrared Spectroscopy and Elastic Properties of Nanocrystalline Mg–Mn Ferrites Prepared by Co-Precipitation Technique” Journal of Nanoscience and Nanotechnology,Vol. 8, PP. 4181, 2008.

12.     Parikh K, Upadhyay R.V, Belova L, Rao K.V, "Ternary monodispersed Mn0.5Zn0.5Fe2O4 ferrite nanoparticles: preparation and magnetic characterization"Nanotechnol. Vol. 17, PP.5970, 2006.


135-137

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html