International Journal of Innovative Technology and Exploring Engineering(TM)
Exploring Innovation| ISSN:2278-3075(Online)| Reg. No.:65021/BPL/CE/12| Published by BEIESP| Impact Factor:4.66| UGC Approved Journal
Home
Aims & Scope
Instructions for Authors
Call for Papers
Editorial Board
Archive
Conferences
Publication Fee
Ethics
Download
FAQ
Contact
Volume-3 Issue 11: Published on April 10, 2014
37
Volume-3 Issue 11: Published on April 10, 2014
 Download Abstract Book

S. No

Volume-3 Issue-11, April 2014, ISSN:  2278-3075 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

Nermin K. Negied

Paper Title:

Expert System for Wheat Yields Protection in Egypt (ESWYP)

Abstract:  This paper presents a novel approach for the diagnoses of insect pests that can harm wheat crops in Egypt. ESWYP is a system that enables the farmer to classify insect diseases among 12 types. Diagnose of the insect pests is a complex and sensitive task, and can only be performed by an expert of the agriculture sciences. ESWYP expert system is designed to imitate the agricultural experts for disease diagnoses, and to enable a computer to behave like an agricultural expert to discriminate the type of pests began to affect the wheat crops and then advice the best treatment for it. This paper presents the relationship and mapping of the expert system technology onto agricultural sciences, and technicalities involved in designing of the ESWYP expert system. The expert system also provides a reasoning facility that enables the user to look into the diagnoses and treatment details.

Keywords:
Insect pests, Wheat diseases, Common symptoms, Distinctive symptoms, Fact extractor, Results' combiner, Explanation facility.


References:

1.          Fouad A. Khalil, Hanan Farag, Gamal S. El Afandi and Samiha A. Ouda, "Vulnerability and Adaptation of Wheat to Climate Change in Middle Egypt", Thirteenth International Water Technology Conference, IWTC 13 2009, Hurghada, Egypt.
2.          Office of the Chief Economist, "World Agricultural Supply and Demand Estimates ", Approved by the World Agricultural Outlook Board, WASDE – 526, ISSN: 1554-9089, February 10, 2014.

3.          Rajkishore Prasad, Kumar Rajeev Ranjan, and A.K. Sinha, “AMRAPALIKA: An expert system for the diagnosis of pests, diseases, disorders in Indian mango,” Knowl.-Based Syst. 19(1): 9-21, 2006.

4.          Fahad Shahbaz Khan, Saad Razzaq, Kashif Irfan, Fahad Maqbool, Ahmad Farid, Inam Illahi, and Tauqeer ul amin, “Dr. Wheat: A Web-based Expert System for Diagnosis of Diseases and Pests in Pakistani Wheat,” Proceedings of the World Congress on Engineering 2008 Vol. I.

5.          Ahmed Rafea, “Expert System Applications: Agriculture,” Central Laboratory for Agricultural Expert Systems, P.O.Box 100 Dokki Giza, Egypt.

6.          Ganesan V., “Decision Support System “Crop-9-DSS” for Identified Crops”, Proceedings of World Academy of Science, Engineering and Technology Volume 12 March 2006 ISSN 1307-6884 PWASET Volume.

7.          S.S. Patil, B.V. Dhandra, U.B. Angadi, A.G. Shankar, and Neena Joshi, “Web based Expert System for Diagnosis of Micro Nutrients Deficiencies in Crops”, Proceedings of the World Congress on Engineering and Computer Science Vol.I WCECS 2009, San Francisco, USA.

8.          Xinxing Li, Lingxian Zhang,”The corn disease remote diagnostic system in China” Journal of Food, Agriculture & Environment Vol.10 (1): 617-620. 2012.

9.          Philomine Roseline, ”Design and Development of Fuzzy Expert System for Integrated Disease Management in Finger Millets”, International Journal of Computer Applications (0975 – 8887) Volume 56– No.1, October 2012.

10.       Peter Lucus, "Symbolic diagnosis and its formalization", Eng. Rev. 12 (2) (1997) 109–146.

11.       Y. Peng and J. A. Reggia, "Abductive inference models for diagnostic problem-solving. Symbolic Computation", Springer-Verlag New York, Inc., 1990.

12.       Anna Hart, "Knowledge Acquisition for Expert System", Mc.Craw Hill, New York, NY, 1986.

13.       Miskoff, C. Thenery, "Understanding Artificial Intelligence", Howard W. Sams & Co, Indionapolis, IN, 1995.

14.       E. Turban, "Decision support systems and expert systems", 4th ed., Prentice Hall, Englewood Cliffs, NJ, 1995.

15.       Hart, "Knowledge acquisition for expert systems", Kogan Page, London, UK, 1989.

16.       J. Liebowitz and S.I. Baek, "The protocol multimedia expert system". The New Review of Applied Expert Systems (1996), pp. 3–17.

17.       B.G. Buchanan, E.H. Shortliffe (Eds.), "Rule Based Expert System: The MYCN Experiments of the Stanford Heuristic Programming Projects", Addison-Wesley, Reading, MA, 1984.

18.       eXpertise2Go "Web-Enabled Expert Systems", available at, http://www.expertise2go.com/, accessed 01/02/08.  


1-4

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.

Authors:

Anshu Anand Jethi, Ajay Rana

Paper Title:

Commissioning of BTS / Node B

Abstract: This paper demonstrates the commissioning of BTS/NODE B through a Wizard   (series of user interfaces), that stores information provided by the user. It also provides another option of commissioning i.e. purely file based commissioning (user has a configuration file and he want to upload this file only). This Paper proposes File Based Commissioning of BTS/NODE B, which eases the task of uploading the configuration to the BTS/NODE B both from user point of view and maintenance point of view.

Keywords:
 BTS/NODE.


References:

1.       Gunnar Heine “GSM Networks Protocols, Terminology, and Implementation” Artech House Mobile Communications Library, Second Edition, 1999.
2.       Herbert Schildt “Complete Reference - Java 2” Tata McGraw-Hill, Fourth Edition, 2001.

3.       H.Bhasin and Nishant Sharma. Commissioning of BTS/NODE B approach, IJCSIT, 2012.

4.       T.M. Rao, Sandeep Mitra, and James Zollweg The College at Brockport, State University of New York, Brockport, NY, USA and Ferat Sahin, Rochester Institute of Technology, Rochester, NY, USA.  BTS/NODE B approach. IEEE, 2011.


5-6

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

C. Vaishnavi, S.Sindhuja, B.subathra, K.selvi Priya, C.Bala Subramanian, M.Angelin Nithya Devi

Paper Title:

Improving the Message Delay Overhead Using Nested Nemo Based Vanet

Abstract:  Vehicular Ad Hoc Network (VANET) is an emerging technology. Mobility management is one of the most challenging research issues for VANETs to support variety of  Intelligent Transportation System (ITS) applications. Network mobility solutions can be divided into two broad categories, intra–domain and inter–domain solutions. So, mobility management for vehicular networks is required. However most of  Mobility model  currently used are very simple. In this paper we will focus on the Network Mobility Approach in Vehicular Ad Hoc Network, this model will describe the communication between Infrastructure to Vehicle and Vehicle to Vehicle i.e. NEMO Based VANET and Nested NEMO Based VANET.

Keywords:
 VANET, MANET, MobiSim, NEMO, Road Side Unit(RSU).


References:

1.       J. Broch, D.A Maltz, D.B. Johnson, Y-C Hu, and J. Jetcheva. “A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols,” in Proc. of ACM/IEEE MOBICOM, 1998, pp. 85-97.
2.       S. M. Mousavi, H. R. Rabiee, M. Moshref, A. Dabirmoghaddam, " Wireless and Mobile Computing, Networking and  communications," 2007, WiMOB 2007.

3.       J. Lorchat and K. Uehara, “Optimized inter-vehicle communications using NEMO and MANET,” in Proc. 3rd Annu. Int. Conf. Mobile UbiquitousSyst.: Comput., Netw., Services, San Jose, CA, USA, Jul. 17–21, 2006, pp. 1–6.

4.       Vehicular ad-hoc Network: Wikipedia, the free encyclopedia. http://en.wikipedia.org/wiki/VANET.

5.       "VANET Routing on City Roads using Real-Time Vehicular Traffic Information," Josiane Nzouonta, Neeraj Rajgure, Guiling Wang, Member, IEEE, and Cristian Borcea, Member, IEEE.

6.       S. Taha, S. Cespedes, and X. Shen, “EM3A: Efficient mutual multi-hop mobile authentication scheme for pmip networks,” in Proc. IEEE ICC, Ottawa, ON, Canada, Jun. 10–15, 2012, pp. 873–877.

7.       E. Perera, V. Sivaraman, and A. Seneviratne, “Survey on network mobility support,” SIGMOBILE Mobile Comput. Commun. Rev., vol. 8, no. 2, pp. 7–19, Apr. 2004.

8.       S. Cespedes, X. Shen, and C. Lazo, “IP mobility management for vehicular communication networks: Challenges and solutions,” IEEE Commun. Mag., vol. 49, no. 5, pp. 187–194, May 2011.

9.       Y. Bi, L. Cai, X. Shen, and H. Zhao, “A Cross Layer Broadcast Protocol for Multihop Emergency Message Dissemination in Inter-Vehicle Communication,” Proc. IEEE Int’l Conf. Comm. (ICC), pp. 1-5, May 2010.

10.    S. Biswas, R. Tatchikou, and F. Dion, “Vehicle-to-Vehicle Wireless Communication Protocols for Enhancing Highway Traffic Safety,” IEEE Comm. Magazine, vol. 44, no. 1, pp. 74-82, Jan. 2006.

11.    F. Ye, R. Yim, J. Guo, J. Zhang, and S. Roy, “Prioritized Broadcast Contention Control in VANET,” Proc. IEEE Int’l Conf. Comm. (ICC), pp. 1-5, May 2010.


7-10

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

4.

Authors:

K.Gowthami, S.Janci Priya, S.Kiruba, S.Maheswari

Paper Title:

Designs of Micro-Strip Band Pass Filter for L Band Frequency

Abstract:   In this paper we propose a strip line Bandpass filter for 2.4 GHz application using Advanced design software. The filter is operated at L band frequency range in 2.4 GHz for various microwave applications & the filter is design on Roger Duroid 5880(tm) substrate with dielectric constant of 2.2, with dimension conductor thickness 0.035 mm and substrate height 0.787 mm. The proposed filter is design at a center frequency of 2 GHz. Simulation results show that the filter operation is optimum over the frequency range 1.8 GHz to 2.6 GHz which is best in this range. In this paper, band pass filter order n=3 development with the assistance of the Richards-Kuroda Transformation method is used.

Keywords:
 chebyshev bpf, Strip-line, ADS Software tool, Roger Substrate, L Band Spectrum, S Parameters


References:

1.       Li Zhongshen, “Design and Analysis of Improved Chebyshev BandpassFilter,” The Eighth International Conference on Electronic Measurement and Instruments, pp. 1729-1732, 2007.
2.       Anju and Mamta Katiyar, “Design of Chebyshev and Chebyshev 1 BandpassFilter for Equalized Group Delay,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, Issue 5,May 2012.I.

3.       David M. Pozar., Microwave Engineering, 3nd Edition, John Wiley & Sons, Inc. Canada.2005, pp422-459.

4.       Roman Kaszynski and Jacek Piskorowski, “New Concept of Delay–Equalized BandpassChebyshev Filters,” IEEE Symposium on Industrial Electronics and Application (ISIEA 2009), vol. 1, pp. 171-175, 9-12 July, 2006.

5.       Les Besser and Rowan Gilmore, “Filters and Resonant Circuit,” In: Practical RF Circuit Design for Modern Wireless System, Passive circuit in Systems, vol1,

6.       Anju and Mamta Katiyar, “Design of Chebyshev and Chebyshev 1 BandpassFilter for Equalized Group Delay,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, Issue 5,May 2012.

7.       R. Levy, R.V.Snyder and G. Matthaei, “Design of Microwave Filters,” IEEE Transactions On Microwave Theory, vol.50, pp.783-793, March 2002.

8.       Vadim Kim, “How to Design 10 kHz filter (Using Chebyshev filter design),” PhD Thesis, Brandeis University, US, 1998.M. Young, The Technical Writer's Handbook. Mill Valley, CA: University Science, 1989.


11-14

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

5.

Authors:

Shiva Shankar, Dharanirajan

Paper Title:

Drainage Morphometry of Flood Prone Rangat Watershed, Middle Andaman, India- A Geospatial Approach

Abstract:    Floods is one of the wide spread global geo-epidemics frequently causing extensive loss of life and property, flood induced disease, hampering of socio-economic activity including transport and communication. Rangat watershed in middle Andaman is not an exception for that instance. Morphometric analysis of Rangat watershed using Geographic Information System (GIS) and remote sensing indicates that it is susceptible to flooding during extreme meteorological events. The watershed exhibit dentritic drainage pattern and has a perennial Rangat river of 4th order. The computed values of drainage density (2.76 Km/ Km2), stream frequency (5.66 no. streams/ Km2), drainage texture (6.26), infiltration number (15.62), form factor (0.35), elongation ratio (0.19) and Compactness constant (1.51) of the Rangat watershed articulates that it is elongated sub-circular having moderate relief and low infiltration capacity due to impervious sub-surface resulting rapid storm response giving rise to a higher runoff resulting in downstream flooding. Rangat River has the highest stream order (4th order) associated with greater discharge and higher velocity of the stream flow indicating the watershed is highly susceptible to floods during monsoon.

Keywords:
 Floods, Drainage Morphometry, Geographic Information System, Remote Sensing, Rangat River, Andaman


References:
1.          Akram Javed, Mohd Yousuf Khanday, and Subah Rais (2011) Watershed Prioritization Using Morphometric and Land Use/Land Cover Parameters: A Remote Sensing and GIS Based Approach. Journal Geological Society of India. 78: 63-75.
2.          Blyth K, and RoDda J. C (1973) A stream length study, Water Resource Resarch. 9:1454-1461.

3.          Chopra R, Dhiman R. D, and Sharma P. K (2005) Morphometric analysis of sub-watersheds in Gurudaspur district, Punjab using Remote sensing and GIS techniques. Journal of Indian Society of Remote Sensing. 33(4):531–539.

4.          Chorley RJ, Donald EG Malm, and Pogorzelski HA (1957) New Standard for Estimating Drainage Basin Shape. American Journal of Science. 255: 138-141.

5.          Chow V. T. (Ed.), (1964) Handbook of Applied Hydrology: A Compendium of Water-Resources Technology. McGraw-Hill, New York. 1495.

6.          Godschalk DR (1991) Disaster mitigation and hazard management. In Drabek TE, Hoetmer GJ (eds) Emergency Management: Principles and Practice for Local Government, 131–60. International City Management Association, Washington, DC.

7.          Horton RE (1932) Drainage basin characteristics. American Geophysical Union of Transactions. 13: 350-361.

8.          Horton RE (1945) Erosional Development of streams and their drainage basins, Hydrophysical Approach to Quantitative Morphology. Geological Society of American Bulletin. 56(3):275-370.

9.          Langbein W.B (1947) Topographic characteristics of drainage basins. U.S. Geol.Surv. Water-Supply Paper 986 (C): 157-159.

10.       Leopold L.B, and Maddock Jr. T (1953) The hydraulic geometry of stream channels and some physiographic implications: U.S. Geological Survey Professional Paper 252, 57 p.

11.       Leopold L.B, and Wolman M.G (1957) River channel patterns: Braided, meandering, and straight: U.S. Geological Survey Professional Paper 282-B, 85p.

12.       Magesh N.S, Chandrasekar N, and Soundranayagam JP (2010) Morphometric evaluation of Papanasam and manimuthar watersheds, parts of western Ghats, Tirunelveli district, Tamil Nadu, India: a GIS approach. Environ earth Sci Journal. 64(2): 373-381.

13.       Magesh NS, Chandrasekar N, and Soundranayagam JP (2012) Delineation of groundwater potential zones in Theni district, Tamil Nadu, using remote sensing, GIS and MIF techniques. Geoscience Frontiers 3: 189-196.

14.       Miller V. C (1953) A quantitative geomorphic study of drainage basin characteristics in the clinch mountain area, Technical report3, Department of Geology, Columbia University. 1-30.

15.       Moglen GE, Eltahir EA, and Bras RL (1998) On the Sensitivity of Drainage Density to Climate Change. Water Resource Research 34: 855-862.

16.       Nautiyal M. D (1994) Morphometric Analysis of a Drainage Basin using Aerial photographs: A case study of Khairakulli Basin, District Dehradun, Uttar Pradesh. Journal of the Indian Society of Remote Sensing. 22(4):251­261.

17.       Nooka Ratnam K, Srivastava Y. K, Venkateswara Rao V, Amminedu E, and Murthy K.S.R (2005) Check dam positioning by prioritization of Micro-watersheds using SYI model and Morphometric analysis - Remote Sensing and GIS perspective. Journal of the Indian Society of Remote Sensing. 33(1): 25-38.

18.       Ozdemir H, and Bird D (2009) Evaluation of morphometric parameters of drainage networks derived from topographic maps and DEM in point of floods. Environmental Geology 56: 1405-1415.
19.       Prasad RK, Mondal NC, Banerjee P, Nandakumar MV, and Singh VS (2008) Deciphering potential groundwater zone in hard rock through the application of GIS. Environmental Geology 55: 467-475.
20.       Ramaiah S.N, Gopalakrishna G.S, Srinivasa Vittala S, and Najeeb. Md. K ( 2012) Morphometric Analysis of Sub-basins in and around Malur Taluk, Kolar District, Karanataka Using Remote Sensing and GIS Techniques. Journal nature Environment and Pollution Technology. 11(1):89-94

21.       Reddy O.G .P, Maji A.K, and Gajbhiye S.K (2004) Drainage morphometry and its influence on landform characteristics in a basaltic terrain, Central India -A remote sensing and GIS approach. Internat. Jour. Applied Earth Observation and Geoinformatics. 6:1-16.

22.       Rudraiah M, Govindaiah S, and Vittala S.S (2008) Morphometry Using Remote Sensing and GIS Techniques in the Sub-Basins of Kagna River Basin, Gulburga District, Karnataka. Journal of Indian Society Remote Sensing. 36(4):351-360.

23.       Schmid BH (1997) Critical Rainfall Duration for Overland Flow an Infiltrating Plane Surface. Journal of Hydrology. 193: 45-60.

24.       Schumm SA (1956) Evolution of drainage systems and slopes in badlands at Perth Amboy, New Jersey. Geological Society of American Bulletin. 67: 597- 646.

25.       Sherman L. K (1932) The relation of hydrographs of runoff to size and character of drainage basins, Eos Trans. AGU, 13, 332-339.

26.       Smith K.G (1950) Standards for grading textures of erosional topography. American Journal of Sciences. 248: 655-668.

27.       Strahler AN (1950) Equilibrium theory of erosional slopes, approached by frequency distribution analysis. American Journal of Sciences. 248: 800-814.

28.       Strahler AN (1964) Quantitative geomorphology of drainage basins and channel networks section 4-2, Handbook of Applied Hydrology. Ed. Ven te Chow, McGraw-Hill, New York. 4-35.

29.       Vittala S.S, Govindaiah S, and Honne G. H (2004) Morphometric analysis of sub-watersheds in the Pawagada area of Tumkur district, South India, using remote sensing and GIS techniques. Journal Indian Society of Remote Sensing. 32(4):351–362.

30.       Zavoiance I (1985) Morphometry of drainage basins (Developments in water science), Elsevier Science, New York, USA.

15-22

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

6.

Authors:

Sami El Moukhlis, Abdessamad Elrharras, Abdellatif Hamdoun

Paper Title:

FPGA-Based Handwritten Signature Recognition System

Abstract: In this paper, a method of classification of handwritten signature based on neural networks, and FPGA implementation is proposed. The designed architecture is described using Very High Speed Integrated Circuits Hardware Description Language (VHDL). The proposed application consists of features extraction from handwritten digit images, and classification based on Multi Layer Perceptron (MLP). The training part of the neural network has been done by using MATLAB program; the hardware implementations have been developed and tested on an Altera DE2-70 FPGA.

Keywords:
 ANN, FPGA, MLP, Recognition, VHDL.


References:

1.    http://www.altera.com
2.    M.Gopal, Digital Control and Static Variable Methods. Tata McGraw Hill,New Delhi, 1997.

3.    Y. Safi and A. Bouroumi, Prediction of Forest Fires Using Artificial Neural Networks, Applied Mathematical Sciences, vol. 7, no. 6, pp. 271-286, 2013

4.    K Tsagkaris, A Katidiotis, P Demestichas, Neural network-based learning schemes for cognitive radio systems. Comp. Commu.31(14),3394–3404(2008)

5.    M.Kavianifar and A.Amin, "Preprocessing and Structural Feature Extraction for a Multi-Fonts Arabic / Persian OCR," New South Wales university, Sydney, Australia, 2000.

6.    Alin Tisan, Stefen Oniga, Daniel MIC, Attila Buchman, “Digital Implementation of the Sigmoid Function for FPGA Circuits”, ACTA Technica NAPOCENSIS Electronics and Telecommunication, vol.50, no.2, 2009.

7.    Sathish Kumar, Neural Networks: A Classroom Approach. Tata McGraw-Hill Publishing Company Limited, New Delhi, 2004.


23-26

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

7.

Authors:

Amogh Pendharkar, Preeti Sharma, Chhaya Varade, Rekha Jadhav

Paper Title:

Pocket Droid – A PC Remote Control

Abstract:  In today’s world, electronic devices and PC’s holds a valuable position in ones’ life. An important aspect of the technology is to remotely monitor these devices. We are aware of multiple Remote Control applications which provides an effective way to control and monitor devices easily and quickly. This paper proposes an idea for remote controlling of Android mobile devices, evaluating the network and obtaining the accurate and optimal solution in different cases. In this paper we have explored various importance of using Pocket Droid Application. One can use Pocket Droid to share files between PC and android device, activate and kill the applications installed on the Target PC, shutdown the Target PC and much more. Pocket Droid surrounds the Client and Server application. In which, the Server application has been implemented in JAVA and Client application in Android.

Keywords:
  Android phone, IP address, JAVA, Window OS, remote desktop, remote visualization, smart phone, wireless handheld devices.


References:

1.       A Framework for Wireless LAN Monitoring and Its Applications Department of Computer Science, University of Maryland College Park, MD 20742
2.       Remote Control of Mobile Devices in Android Platform Angels Gonzalez Villan Student Member, IEEE

3.       2010 International Conference on Information and Network Technology (ICINT 2012) IPCSIT vol. 37 (2012) ) © (2012) IACSIT Press, Singapore

4.       http://developer.android.com/guide/basics/what-is-android.html Retrieved 3rd Sep, 2011.Android. http://www.android.com Retrieved 3rd Sep, 2011.

5.       Enterprise Wireless LAN security and WLAN monitoring http://www.airdefense.net/.

6.       Wireless Security Auditor (WSA)

7.       http://www.research.ibm.com/gsal/wsa/

8.       Android. http://www.android.com Retrieved March 1st, 2011.

9.       Gmote. http://www.gmote.org/ Retrieved 21st Aug, 2011.

10.    [6] Remote Droid. http://remotedroid.net/ Retrieved 23rd Aug, 2011.

11.    IEEE Computer Society LAN MAN Standard Committee,IEEE 802.11 Management Information Base In IEEEStd 802.11-1999,1999. 


27-28

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

8.

Authors:

Aashik Chandramohan, Krishna Murthy K.R., Sowmya G. , Surya Prasad P.A., Vijay Krishna V., Peeyush K.P.

Paper Title:

Cost Effective Object Recognition and Sorting Robot Using Embedded Image Processing Techniques

Abstract:   This paper presents an application to sort objects based on its colour using a robotic arm. In many small scale industries, the major obstacle faced is shortage of time and laborers to efficiently sort and pack the products. This hurdle can be overcome by using the developed robotic arm which is cost effective and user friendly. This method of packaging is faster and does not require continuous monitoring, thereby increases the production and growth of the industry. In this paper, computer vision is carried out with the aid of OpenCV and the robotic arm is powered by Arduino microcontroller. The eBox-3300MX is used as the hardware to integrate OpenCV with robotic arm.

Keywords:
 Arduino, dominant colour detection algorithm, eBox-3300MX, OpenCV.


References:

1.       G. Bradski and A. Kaehler, “Learning OpenCV” (Book style), O’Reilly Media, Inc., USA, 2008.
2.       Imram Rafiq Quadri, Alexis Muller, Sammy Meftali, Jean-Luc Dekeyser, “MARTE Based Design flow for partially configurable System-on-Chips”, in 17th IFIP/IEEE International Conference on Very Large Scale Integration (VLSI-SoC ) (2009)

3.       Malvin Nkomo, “A Color-Sorting SCARA Robotic Arm”, IEEE Conference.

4.       Mihai Dragusu, Anca Nicoleta Mihalache and Razvan Solea, “Practical Applications for Robotic Arms Using Image Processing”, IEEE Conference. Roland Szabo and Ioan Lie, “Automated Colored Object Sorting Application for Robotic Arms”, IEEE Conference.

5.       Gian Luca Foresti and Felice Andria Pellegrino, “Automatic Visual Recognition of Deformable Objectsfor Grasping and Manipulation”, IEEE Transaction on Systems, Man and Cybernetics, Vol. 34, No. 3, August 2004.

6.       Pol Monso, Guillem Alenya and Carme Torras, “POMDP approach to Robotized Clothes Separation”, IEEE International Conference on Intelligent Robots and Systems, October 2012. 


29-32

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

9.

Authors:

P. Nandhakumar, M. Hemalatha

Paper Title:

Effective Semantic Web Information Retrieval Using Fuzzy Based Ontology

Abstract: Information retrieval technology has been essential to the success of the Web. This paper presents a Fuzzy based Ontology approach which can improve semantic documents retrieval. Fuzzy Knowledge Base is being defined formally and new relationship called as semantic correlation is considered as a non-taxonomic relationship. This correlation is updated automatically when an insert is made into the database after processing a query.  Here Information retrieval algorithm is used to find out the unique path between the entities being extracted from the queries by parsing. The extracted entities are used in construction of a SPARQL query using the template and the search is made to obtain maximum semantic association in the knowledge base. The implementation results obtained shows promising results in terms of precision and recall. The comparison made with other existing algorithms used has proved our proposed approach to be a outstanding one in information retrieval environment.

Keywords:
  Semantic Web, Ontology, Fuzzy Theory, Information Retrieval.


References:

1.       N. Guarino and P. Giaretta, Ontologies and Knowledge Bases: Towards a Terminological Clarification.Toward Very Large Knowledge Bases: Knowledge Building and Knowledge Sharing. Amsterdam: IOS Press, 1995.
2.       T. Berners-Lee, J. Hendler, and O. Lassila, “The Semantic Web,” Scientific Am.,htttp://www.sciam.com/2001/0501issue/0501berners-lee.html, 2001.

3.       Calegari, S., Farina, F.: Fuzzy Ontologies and Scale-free Networks Analysis. International Journal of Computer Science and Applications IV(II) (2007) 125–144

4.       W3C, “Web Ontology Language Overview,”http://www.w3.org/ TR/owl-features/, 2006.

5.       Sanchez, E.: Fuzzy Logic and the Semantic Web. Capturing Intelligence. Elsevier (2006)

6.       Zadeh, L.: From Search Engines to Question-Answering Systems - The Problems of World Knowledge, Relevance, Deduction and Precisiation. In Sanchez, E., ed.: Fuzzy Logic and the Semantic Web. Capturing Intelligence. Elsevier (2006) 163–210

7.       Calegari, S., Ciucci, D.: Fuzzy Ontology, Fuzzy Description Logics and Fuzzy-OWL. In: Proceedings of WILF 2007. Volume 4578 of LNCS. (2007).

8.       Calegari, S., Ciucci, D.: Fuzzy Ontology and Fuzzy-OWL in the KAON Project. In: FUZZIEEE 2007. IEEE International Conference on Fuzzy Systems (2007).

9.       Sanchez, E., Yamanoi, T.: Fuzzy ontologies for the semantic web. In Larsen, H.L., Pasi, G.,Arroyo, D.O., Andreasen, T., Christiansen, H., eds.: FQAS. LNCS 4027, Springer (2006) 691–699.


33-36

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

10.

Authors:

Ravikiran Pawar, Hrishikesh Bhapkar, Sanket Domal, Amol Bankar, Vikrant Dudhale.

Paper Title:

Reducing Inner Data Stealing Using Bogus Information Attacks in the Cloud Computing

Abstract:  Cloud Computing is giving the new approach to use our computers to handle and storing the confidential information. Cloud Computing providing Services like Infrastructure as a Service <IaaS>, Platform as a Service <PaaS> and Software as a Service <SaaS> as well as we have to pay according to our use. The Cloud users can get access over it by the permission of Cloud provider without large investment. As access over Cloud is easily provided by Cloud providers therefore the Security Issues are more in it. The presenting Encryption Strategies are failed to preventing the Inner Data stealing. In this paper we are proposing the completely distinct approach to prevent the Inner data stealing attacks by using offensive decoy technology. When the user is going to access the data we monitoring over it. We are verifying the user by asking him some challenging security questions. Once the user is found that he is unauthorized then we directly applying the decoy information attack over attacker. This will helping us to stop the misuse of the genuine user’s data. Using certain functioning we can easily make the evidences against the attacker to stop this malicious activity.

Keywords:
   Cloud Computing, Decoy information, Encryption, malicious, Offensive Decoy Technology.


References:

1.          Cloud Security Alliance, “Top Threat to Cloud Computing V1.0,”March 2010. [Online]. Available: https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf
2.          M. Arrington, “In our inbox: Hundreds of confidential twitter documents,” July 2009. [Online].

3.          Available: http://techcrunch.com/2009/07/14/in-our-inbox-hundreds-ofconfidentialtwitter-documents/

4.          D. Takahashi, “French hacker who leaked Twitter documents to Tech Crunch is busted,” March 2010. [Online].  Available:http://venturebeat.com/2010/03/24/french-hacker-wholeakedtwitter-documents-to-techcrunch-is-busted/

5.          D. Danchev, “ZDNET: french hacker gains access to twitter’s admin panel,” April 2009. [Online]. Available:http://www.zdnet.com/blog/security/french-hacker-gains-access-totwittersadmin-panel/3292

6.          P. Allen, “Obama’s Twitter password revealed after french hacker arrested for breaking into U.S. president’s account,” March 2010.[Online]. Available: http://www.dailymail.co.uk/news/article-1260488/Barack- Obamas-Twitter-password-revealed-French-hacker-arrested.html

7.          F. Rocha and M. Correia, “Lucy in the sky without diamonds: Stealing confidential data in the cloud,” in Proceedings of the First International Workshop on Dependability of Clouds, Data Centers and Virtual Computing Environments, Hong Kong, ser. DCDV ’11, June 2011.

8.          M. Van Dijk and A. Juels, “On the impossibility of cryptography alone for privacy-preserving cloud computing,” in Proceedings of the 5th USENIX conference on Hot topics in security, ser. HotSec’10. Berkeley, CA, USA: USENIX Association, 2010, pp. 1–8. [Online].Available: http://dl.acm.org/citation.cfm?id=1924931.1924934

9.          Salvatore J. Stolfo, Malek Ben Salem and Angelos D. Keromytis, “Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud”. IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOP (SPW) YEAR 2012

10.       M. Ben-Salem and S. J. Stolfo, “Modeling user search-behavior for masquerade detection,” in Proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection. Heidelberg: Springer, September 2011, pp. 1–20.


37-39

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

11.

Authors:

Rashmi Tomar, Bhawani Shankar, Rakesh Kumar, Madhu Godhara, Vijay Kumar Sharma

Paper Title:

Synthesis, Characterization and Antimicrobial Activity of Novel Hydroxamic Acids of Pyrimidine- 5-Carboxylic Acid and Their Complexes

Abstract:   A series of metal complexes of Cu(II), Ni(II) and Co(II) have been synthesized with new hydroxamic acids, 1,3-dimethyl-2,4,6-trioxo-1,2,3,4,5,6-hexahydropyrimidine-5-carboxylic acid hydroxamide (5) and 1,3-dimethyl-4,6 -dioxo-2-thioxo-1,2,3,4,5,6-hexahydropyrimidine-5-carboxylic acid hydroxamide (6). During the course of present investigations, simple analytical and spectroscopic techniques such as repeated melting point (M.P.) determination, elemental analysis, running their thin layer chromatography for single spot, I.R., H1-NMR and UV-Vis. (only for metal chelates) spectral studies were employed to indentify the purity and structure of hydroxamic acids and their metal chelates. Free ligands and their metal complexes have been screened for their antimicrobial activity against various species of fungi and bacteria.

Keywords: Hydroxamic acids, antimicrobial activity, metal complexes.


References:

1.       Borland G, Murphy G & Ager A, J. Bio-Chem, 274 (1999) 2810
2.       Pilkul S, Dunham K L M, De B, Natchus M G, Analtosio M V, Mc phail S J, Snider C E, Taiwo Y O, Chen L Y, Dunaway C M, Gu F & Mieling G E, J. Med. Chem. 42 (1999) 87

3.       Bttomley K M, Johnson W H & Waltor D S, J. Enzy. Inhibition 13 (1998) 79

4.       Vogel K W & Druckhammer D G, J. Am. Chem. Soc. 120 (1998) 3275

5.       Chittaria P,  Jadhav V R, Ganesh K N & Rajappa S, J. Chem. Soc. Perkin Trans. 1 (1998) 1319

6.       Holmen B A, Tejedor M I & Casey W H, Langmuir 13 (1997) 2197

7.       Fazary A E, Khalil M M, Fahmy A & Tantawy T A, Medical Journal of Islamic Academy of Science 14:3 (2001) 109

8.       Jahangirian H, Harson J, Silong S, Yusof N Z, Shameli K, Eissazadeh S, Moghaddam R R, Mahdavi B & Jafarzade M,Journal of Medicinal plants Research 5:19 (2011) 4826

9.       Agarwal H, Agarwal O P, Karnawat R, Sharma I K & Verma P S, International Journal of Applied Biology and Pharmaceutical Technology I-3 (2010) 1293

10.    Aliyu A O &  Wabueze J N, International J. of Physical Science 2 (7) (2008) 167

11.    Sonika S,  Neeraj S, Der Chemica Sinica, 4(3) (2013) 117

12.    Elford H L, Wampler G L, Riet B V, Cancer Res. 39 (1971) 844

13.    Botos I, Scapozza L, Zhang D, Liotta L A  & Meyer E F,  Proc. Nat. Acad. Sci. USA 93 (1996) 2749

14.    Arnold M, Brown D A, Deeg O, Errington W, Haase W, Herlihy K, Kemp T J, Nimir H & Wemer R, Inorg. Chem. 37 (1998) 2920

15.    Tam S S C, Lee D H S, Wang E Y, Munroe D G & Lau C Y, J. Biol. Chem. 270 (1995) 13948.

16.    Bruce P, Kennedy B J Proc Am., Asso Cancer Res. 11 (1970) 63

17.    Moore E C, Cancer Res. 29 (1969) 291

18.    Pal D & Saha S, Review article, J. Adv. Pharm. Tech. Res. 3(2) (2013) 98

19.    Baek H S, Rho H S, Yoo J W, Aha S M, Lee J Y, Lee J, Kim M K, Kim D K & Chang I S, Bull Karean Chem Soc. 29/1 (2008) 43

20.    Koncic M Z., Barbaric M, Perkovic V, Zorc B, Molecules, 16 (2011) 6232

21.    Raymond K N, Coord. Chem. Rev., 105, (1990) 135

22.    Crumbliss AL, Handbook of Microbial Iron Chelate; Ed. G. Winkelmann, CRC Press, New York, 1991

23.    Kuhne M, Gallay J J, U.S. Patent Appl. No.4,670,441 (1987)

24.    Griffith D, Lyssenko K, Jensen P, Kruger P E & Marmion C J, J. Chem. Soc., Dalton Trans., 956 (2005)

25.    Mathis F, Bull. Soc. Chem. D-9 (1953) 22

26.    Pinchas S. and Lavtichat I, Infra red spectra of Labelled compounds (Academic Press, New York) (1971)

27.    Bentley F F, Somothsen L D & Rojek A L, Infra red spectra and characteristic Frequencies 700-300 cm-1  (Inter science Publisher, London) (1968)

28.    Aliyu A O, Current Res. Chem. (2) 2 (2010) 41

29.    Mikhaylinchenko S, Eur. J. Chem. 1(4) (2010) 304

30.    Carlin R L, Trans. Met. Chem. 4 (1968) 211

31.    Saxena G C & Srivastava V S, J. Ind. Chem. Soc 64 (1987) 633

32.    Saxena G C, and Srivastava V S,  J. Ind. Chem. Soc., 64 (1987) 633

33.    Chaudhary G L, Mithilesh K, & Sharma T, J. Ind. Chem. Soc., 67 (1990) 340

34.    Carlin R L, Trans. Met. Chem., 4 (1968) 211\
35.    Patel R K & Patel R N, J. Ind. Chem. Soc., 67 (1990) 238
36.    Poppalardo R, Phill. Mag. 4 (1959) 219

37.    Burden K I, Introduction to microbiology (Mc Millan New York) (1968)

38.    Sharma R C, Giri P P,  Kumar D & Neelam, J. Chem. Pharm. Res., 4(4) (2012) 1969

40-43

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

12.

Authors:

Manisha D. Wasnik

Paper Title:

Image Stitching using Matlab

Abstract:    Images are an integral part of our daily lives. Image   stitching is the process performed to generate one panoramic image from a series of smaller, overlapping images. Stitched images are used in applications such as interactive panoramic viewing of images, multi-node movies,mobile phones and other applications associated with modeling the 3D environment using images acquired from the real world. Feature matching, used in  Specifically, image stitching presents different stages to render two or more overlapping images into a seamless stitched image, from the detection of features to blending in a final image. In this process, Scale Invariant Feature Transform (SIFT) algorithm[1]can be applied to perform the detection and matching control points step, due to its good properties. The process of create an automatic and effective whole stitching process leads to analyze different methods of the stitching stages. SIFT methods to extracting feature points, is the key of image mosaic. The advantages of SIFT is one of the most robust and the widely used image matching algorithms based on local features This paper describes the design and implementation of an image stitcher which can be used to join colour images. 

Keywords: Seamless stitched image, Panoramic image.


References:

1.    R. Szeliski. Image alignment and stitching: A tutorial. TechnicalReport MSR-TR-2004-92, Microsoft Research, December 2004.
2.    M. Brown and D. Lowe. Recognizing panoramas. In Ninth InternAtional Conference on Computer Vision, pages 1218–1225,Nice, France,October 2003.

3.    Vladan Rankov†, Rosalind J. Locke, Richard J. Edens, Paul R. Barberand Borivoj Vojnovic ‘‘An algorithm for image stitching and blending Image Acquisition and Processing” XII,Jose-Angel Conchello, Carol J. Cogswell, Tony Wilson, Editors, March 2005

4.    Jiaya Jia, Member, IEEE, and Chi-Keung Tang, “Image Stitching Using Structure Deformation” ieee transaction on pattern analysis and machine intelligence vol. 30, no. 4, APRIL 2008

5.    J. Rabin, J. Delon, Y. Gousseau, and L. Moisan, “RANSAC: A robust algorithm for the recognition of multiple objects,” in Proc. 3D’PVT, 2010.

6.    Y. Yu, K. Huang, and T. Tan, “A Harris-like scale invariant feature detector,” in Proc. Asian Conf. Comput. Vis., 2009, pp. 586–59


44-46

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

13.

Authors:

Hussein saadi A. AL-Daffaie, Y. K. Bind, Emad S. Shamsaldin

Paper Title:

Feasibility of LLW & ILW-SL Landfill In AL-Tuwaitha Site_Iraq

Abstract:  The present study is the effort of investigating the safe disposal of radioactive waste to save the people of Iraq from the bad effect of radioactivity. Iraq has suffered from many destructive wars in recent past in the year of 1991 and 2003. Lots of radioactive wastes were generated as a consequence of these wars. Radioactive wastes are divided in three categories Low- Level Radioactive Waste (LLW), Intermediate-Level Radioactive Waste (ILW) and High-Level Radioactive Wastes (HLW). HLW have life span of more than 10000 years hence it is quite difficult to find any site for safe disposal of HLW wastes since it needs to be buried in deep mines whereas it is relatively easy to isolate LLW and ILW wastes in manmade repositories.  This paper assesses the suitability of AL-Tuwaitha site, which is small town located south of Baghdad city to be used as the sits for confining the radioactive wastes. The suitability of location of site from geotechnical and geological point of view was studied from three and six borehole data’s respectively.  It was found from the study of selected area that site is suitable for the construction of hazardous waste landfill.

Keywords:
Low- Level Radioactive Waste, Intermediate-Level Radioactive Waste, High-Level Radioactive Wastes, Landfill. 


References:

1.       Al-Taie, L., Al-Ansari, N., Knutsson, S. and Pusch, R. (2013a). Hazardous Wastes Problems in Iraq: A Suggestion for an Environmental Solution. Landfill Workshop, 15-17 November. Lule  University of Technology.
2.       Pusch, R., Knutsson, S., Al-Taie L. and Shahrestanakizadeh, M. (2013). Isolation of hazardous soil contaminated by DU (depleted uranium) from groundwater. WIT Transactions on Ecology and The Environment, Vol. 163, pp 309-319.

3.       Al-Taie, L., Al-Ansari, N., Knutsson, S. and Pusch, R. (2013b). Proposed site selection criteria for hazardous waste disposal facilities in Iraq. WIT Transactions on Ecology and The Environment, Vol. 163, pp 309-319.

4.       Al-Taie, L., Pusch, R., Al-Ansati, N. and Sven Knutsson. (2013c). Hydraulic Properties of Smectite Clays from Iraq with Special Respect to Landfills of DU-contaminated Waste. Journal of Earth Sciences and Geotechnical Engineering, vol. 3, no. 3, 2013, 109-125.

5.       Al-Ansari, N., Pusch, R., Knutsson, S. (2013). Suggested landfill sites for hazardous waste in Iraq. Natural Science. Vol.5, No.4, 463-477 .

6.       Rahman, Z.A., Yaacob, W.Z.W., Rahim, S.A., Lihan, T., Idris W.M.R. & Mohd sani, W.N.F. (2013). Geotechnical Characterization of Marine Clay As Potential Liner Material. Sains Malaysiana 42(8)(2013): 1081–1089.

7.       Oyediran, I. A. and Adeyemi, G. O. (2011). Geotechnical Investigations Of A Site In Ajibode, Southwestern Nigeria For Landfill Ozean Journal of Applied Sciences 4(3), ISSN 1943-2429.

8.       Aiassa, G.M., Arrua, P.A. (2010). Performance of Compacted Silty Loess as Landfill Liner Material. . Int. congress on Env. Geotechnical. 6th  345-348.

9.       Varma, A., Saxena, M., Garg, A., Khanna, N.(2010) . Pond Ash As A Landfill Liner – A Review. Int. congress on Env. Geotechnical. 6th  349-353

10.    Azad, F.M.,Airey, D.W.,Rowe, R.K., and Zein, A.(2010) . Laboratory Investigation of Moisture Content Redistribution on the Base of Double Composite Liner Systems. Int. congress on Env. Geotechnical. 6th  354-359

11.    Morandini, T.L.C. and  Leite, A.L. (2010) . Hydraulic Conductivity of a Tropical Soil (Non-Lateritic) and Bentonite Mixtures for Base Linear Purposes . . Int. congress on Env. Geotechnical. 6th  360-367.

12.    ASTM. 2010d. ASTM standard D4318: Standard test methods for liquid limit, plastic limit, and plasticity index of soils. ASTM International, West Conshohocken, PA.

13.    ASTM. 2007c. ASTM standard D422: Standard test method for particle-size analysis of soils. ASTM International, West Conshohocken, PA. 

     

47-54

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

14.

Authors:

K.D. Yesugade, Sheetal Salunke, Ketaki Shinde, Snehal Gaikwad, Meenakshi Shingare

Paper Title:

Hand Motion Recognition

Abstract:   Hand gesture recognition system can be used for interfacing between computer and human using hand gesture. This work presents a technique for a human computer interface through hand gesture recognition that is able to recognize 25 frams per second. The motive for designing this project is to recognize dynamic hand motions in runtime without using any external hardware. The key features of this project are customizable palm motion and backward compatibility within low cost. There is no need of any high definition camera or any costly hardware, used for recognition of hand gestures. A simple low resolution VGA camera is used. An attempt is made to use simple algorithms and to provide more user friendly environment.This application focuses on the building block and key issues to be considered in HGRS and our contribution in the development of HGRS. The primary goal of the project is to create a system that can identify human dynamic hand gestures and use it for performing different functionalities. In this project, an attempt is made to building a richer bridge between machines and humans than primitive text user interfaces or even GUIs (Graphical User Interfaces), which still limit the majority of input to keyboard and mouse. Hand Gesture Recognition System enables humans to interface with the machine (HMI) and interact naturally without any mechanical devices. This could potentially make conventional input devices such as mouse, Keyboards and even touch-screens redundant.

Keywords:
 Customizable Palm Motion, Backward Compatibility, HGRS.


References:

1.       Conic, N., Cerseato, P., De Natale, F. G. B.,: Natural Human- Machine Interface using an Interactive Virtual Blackboard, In Proceeding of ICIP 2007, pp.181-184,(2007). 64 Real Time Multiple Hand Gesture Recognition System for Human Computer Interaction Copyright © 2012 MECS I.J. Intelligent Systems and Applications, 2012, 5, 56-64
2.       Vardy, J. Robinson, Li-Te Cheng, “The Wrist Cam as input device”, Wearable Computers, 1999

3.       Wong Tai Man, Sun Han Qiu, Wong Kin Hong, “ThumbStick: A Novel Virtual Hand Gesture Interface”, In Proceedings of the IEEE International Workshop on Robots and human Interactive Communication, 300-305.

4.       W. T., Freeman, D. B Anderson, and P. et al. Beardsley. “Computer vision for interactive computer graphics. IEEE Trans. On Computer Graphics and Applications, 18:42-53, 1998.

5.       N.Soontranon, S. Aramvith, and T. H. Chalidabhongse, “Improved face and hand tracking for sign language Recognition”. IEEE Trans. On ITCC, 2:141-146, 2005.

6.       V. Pavlovic, R. Sharma and T.S. Huang, “Visual interpretation of hand gestures for human-computer interaction: A review,” IEEE Trans. on Pattern Analysis and Machine Intelligence (PAMI), vol. 7(19), pp. 677–695, 1997.

7.       Xiujuan Chai, Yikai Fang and Kongqiao Wang, “Robust hand gesture analysis and application in gallery browsing,” In Proceeding of ICME, New York, pp. 938-94, 2009.

8.       José Miguel Salles Dias, Pedro Nande, Pedro Santos, Nuno Barata and André Correia, “Image Manipulation through Gestures,” In Proceedings of AICG’04, pp. 1-8, 2004.

9.       Ayman Atia and Jiro Tanaka, “Interaction with Tilting Gestures in Ubiquitous Environments,” In International Journal of UbiComp (IJU), Vol.1, No.3, 2010.

10.    [10] S.S. Rautaray and A. Agrawal,“A Novel Human Computer Interface Based On Hand Gesture Recognition Using Computer Vision Techniques,” In Proceedings of ACM IITM’10, pp. 292-296, 2010.

11.    Z. Xu, C. Xiang, W. Wen-hui, Y. Ji-hai, V. Lantz and W. Kong-qiao, “ Hand Gesture Recognition and Virtual Game Control Based on 3D Accelerometer and EMG Sensors,” In Proceedings of IUI’09, pp. 401-406, 2009.

12.    S. Lee, S. W. Ghyme, C. J. Park and K. Wohn, “The Control of avatar motion using hand gesture,” In Proceeding of Virtual Reality Software and technology (VRST), pp. 59-65, 1998.

13.    X. Zhang, X. Chen, Y. Li, V. Lantz, K. Wang and J. Yang, “A framework for Hand Gesture Recognition Based on Accelerometer and EMG Sensors,” IEEE Trans. On Systems, Man and Cybernetics- Part A: Systems and Humans, pp. 1-13, 2011.

14.    N. Conci, P. Cerseato and F. G. B. De Natale, “Natural Human- Machine Interface using an Interactive Virtual Blackboard,” In Proceeding of ICIP 2007, pp. 181-184, 2007.

15.    Yi, F. C. Harris Jr., L. Wang and Y. Yan, “Real-time natural hand gestures”, In Proceedings of IEEE Computing in science and engineering, pp. 92-96, 2005. 
  

55-61

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

15.

Authors:

Saliu Adam Muhammad

Paper Title:

Fraud: The Affinity of Classification Techniques to Insurance Fraud Detection

Abstract:    Quite a large number of data mining techniques employed in financial fraud detection (FFD) are seen to be classification techniques. In this paper, we developed an algorithm to find the features of classification techniques (or method) that so much place it (classification techniques) in the heart of researchers in their various efforts in the study of insurance frauds detection. We also got to know the characteristics of insurance frauds data that made data mining classification techniques so much attracted to it (insurance data).

Keywords:
 affinity, classification techniques, insurance frauds common features.


References:

1.          B. Rekha, “Detecting auto insurance fraud by data mining techniques”, Journal of Emerging Trends in Computing and Information Sciences, Volume 2 No.4, Page: 156 – 162, APRIL 2011.
2.          R. Chen, M. Chiu, Y. Huang, L. Chen, “Detecting credit card fraud by using questionnaire-responded transaction model based on support vector machines”. In: IDEAL 2004, Page: 800 - 806, (2004).

3.          R. Groth,. Data Mining: A Hands-on Approach for Business Professionals, Prentice Hall, pp. 209-212(1998).

4.          S. Maes, K. Tuyls, B. Vanschoenwinkel, and B. Manderick, “Credit card fraud detection using Bayesian and Neural Networks”. Proc. of the 1st International NAISO Congress on Neuro Fuzzy Technologies (2002).

5.          SAS, e-Intelligence Data Mining in the Insurance industry: Solving Business problems using SAS Enterprise Miner Software. White Paper (2000).

6.          G.Apparao, S. Arun, G.S. Rao, B. LalithaBhavani, K. Eswar, D. Rajani, “Financial statement fraud detection by data mining”, Int. Journal of Advanced Networking and Applications, Volume: 01 Issue: 03 Pages: 159-163 (2009).

7.          H.S. Lookman and T. Balasubramanian, “Survey of insurance fraud detection using data mining techniques”, International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-2, Issue-3, Page: 62 – 65, February 2013.

8.          E.W.T. Ngai, H. Yong, Y.H. Wong, C. Yijun and S. Xin, “The application of data mining techniques in financial fraud detection”, A Classification Framework and an Academic Review of Literature, Decision Support Systems, Elsevier, 50, Page: 559–569, (2011)

9.          Bose, and R. K. Mahapatra, Business Data Mining — A Machine Learning Perspective, Information Management 39 (3), Page: 211–225, (2001).

10.       Fraud – The Free Dictionary, Online LL.M – In US Law. http://legal-dictionary.thefreedictionary.com/fraud

11.       D. Zhang, and L Zhou., “Discovering golden nuggets: data mining in financial application”, IEEE Transactions on Systems, Man and Cybernetics 34 (4) (2004) Nov.
12.       P. Sampson, “Comparing classification algorithms in data mining”, Central Connecticut State University, 2012.
13.       http://www.google.com.hk/#newwindow=1&q=naive+bayesian+-+Classification%2C+Dr.+Saed&safe=strict

14.       FBI, “Federal bureau of investigation, financial crimes”, Report to the   Public Fiscal Year, Department of Justice, United States, 2007, http://www.fbi.gov/publications/financial/fcs_report2007/financial_crime_2007.htm.

15.       Coalition against Insurance Fraud, “Learn about fraud,” http://www.insurancefraudorg/learn_about_fraud.htm

16.       W. M. Andrew, “Decision trees”. www.cs.cmu.edu /~cga/ai-Course/dTree, (2001).

17.       Methods for Classification - http://www.sundog.stsci.edu/rick/SCMA/node2.html

18.       Classification, http://www.saedsayad.com/ classification.htm

19.       Naïve Bayes Classify, http://www.princeton.edu/~achaney/tmve/wiki100k/docs/Naive_Bayes_classifier.html

20.       J.L. Kaminsk, “Insurance Fraud”, OLR Research Report, http://www.cga.ct.gov/2005/rpt/2005-R-0025.htm. 2004.

21.       www.chem-eng.utoronto.ca/~datamining/.../Decision_Trees

22.       www.classes.engr.oregonstate.edu/eecs/.../decisiontree-5-part2

23.       http://www.cooperators.ca/en/Answer-Centre/how-does-insurance-work/why-do-we-need-insurance.aspx

24.       P. Bhargavi, S. Jyothi., “Applying naive Bayes data mining technique for classification of Agricultural Land Soils̍”, International Journal of Computer Science and Network Security, vol.9, No.8, Page: 117-122, (2009).

25.       SVM – “Support vector machines”, Introduction to Support Vector Machine (SVM) Models, http://www.dtreg.com/svm.htm

26.       D. Qingshan, “Detection of fraudulent financial statements based on Naïve Bayes Classifier”, The 5th International Conference on Computer Science & Education, Hefei, China. August 24–27, Page: 1032 – 1035, (2010).

27.       wiseGEEK, “What is auto insurance fraud?”,  http://www.wisegeek.com/what-is-auto-insurance-fraud.htm#

28.       Crop Insurance, Wikipedia – The Free Encyclopedia http://en.wikipedia.org/wiki/Crop_insurance

29.       Insurance Fraud, Wikipedia – The Free Encyclopedia http://en.wikipedia.org/wiki/Insurance_fraud#Health_care_insurance

30.       http:// www.chem-eng.utoronto.ca/~datamining/Presentations/SVM.pdf

31.       F. A. Judy and L. B. Robert, (FSA), Education and Examination Committee of the Society of Actuaries Risk and Insurance, Copyright 2005 by the Society of Actuaries, P-21-05        Printed in U.S.A. Second Printing.

32.       FCAC, Financial Consumer Agency of Canada, Understanding Insurance Basics, February, 2011.

33.       L.  Jenn-Long and Chien-Liang C., Application of Evolutionary Data Mining Algorithms to Insurance Fraud Prediction, 2012 IACSIT Hong Kong Conferences, IPCSIT vol. 25 (2012) © (2012) IACSIT Press, Singapore.

34.       D. Olson, and Y. Shi, Introduction to Business Data Mining, McGraw-Hill Education, 2008, pp. 75 – 77   


62-66

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

16.

Authors:

Abhinav.A.Baone, K.R.Jansi

Paper Title:

Enhancing Data Confidentiality in Cloud System Using Key-Private PRE Scheme

Abstract: Cloud computing is an approach to computing that leverages the efficient pooling of an on-demand, self-managed, virtual infrastructure. It abstracts the business services from complex IT infrastructure by making use of virtualization and pooling of resources. The risks involved on evaluation are that it requires trusting of cloud platform provider for availability and data security. It can also raise legal concerns while storing data outside customer premises. Intentional or unintentional release of secure information to an untrusted environment is the major security issue which is compromised. Data confidentiality is the main threat often experienced by the end users while outsourcing services to third parties. To overcome this scenario encryption schemes are used, but it limits the functionality of storage system since only few operations are supported over encrypted data. The proposed idea is to make use of key private proxy re-encryption scheme over encrypted data so that secured cloud storage system can be established. The model will not only support secure robust data storage and retrieval but it also allows different hosts to forward there data among each other via virtual machines. The main technical work is to implement key-private PRE scheme which supports re-encryption over encrypted message as well as forwarding operations over re-encrypted messages. To add-on system integrates all operations together to provide enhanced security and restrict data breaching. Entire focus is on building a secure cloud system which improves the factors such as robustness, confidentiality, functionality of an application.

Keywords:
 Cloud computing, key-private pre scheme, data confidentiality


References:

1.       S. Kamara and K. Lauter,"Cryptographic cloud storage," in RLCPS, 2010.
2.       M. Armbrust, A. Fox, and et al., "Above the clouds: A berkeley view of cloud computing," University of California, Berkeley, Tech. Rep. UCB-      EECS-2009-28.

3.       "Summary of the amazon ec2 and amazon rds service disruption in the us east region," http://aws.amazon.com/message/65648/.

4.       "Microsoft cloud data breach heralds things to come,"  http://www.tech-world.com.au/article/372111/microsoft_cloud_data_breach_heralds_things _come/.

5.       John, H.: Security Guidance for Critical Areas of Focus in Cloud Computing (2009), http:// www .cloudsecurity alliance.org/gui-     dance/

6.       Z. Wilcox-O'Hearn and B. Warner, "Tahoe: The Least-Authority Filesystem," Proc. Fourth ACM Int'l Workshop Storage Security and     Survivability (StorageSS), pp. 21-26, 2008.

7.       H.-Y. Lin and W.-G. Tzeng, "A Secure        Decentralized Erasure codefor Distributed Network Storage," IEEE    Trans. Parallel & Distributed   Systems, vol. 21, no. 11, pp.1586-1594, Nov. 2010.

8.       D.R. Brownbridge, L.F. Marshall, and B. Randell, "The Newcastle         Connection or Unixes of the World Unite!," Software Practice and Experience, vol. 12, no. 12, pp. 1147-1162, 1982.

9.       R. Sandberg, D. Goldberg, S. Kleiman, D. Walsh, and B. Lyon, "Design and Implementation of the Sun Network Filesystem," Proc. USENIXAssoc. Conf., 1985

10.    Q.Tang,"Type BasedProxy Re-Encryption and Its Construction," Proc. Ninth Int'l Conf. Cryptology in India: Progress in Cryptology            (INDOCRYPT), pp. 130-144, 2008.

11.    G.Ateniese, K. Benson, and S. Hohenberger, "Key-Private Proxy   ReEnc - ryption," Proc. Topics in Cryptology (CT-RSA), pp. 279-294, 2009.

12.    Matt Blaze, Gerrit Bleumer, and Martin Strauss. Divertible protocols and atomic proxy cryptography. In EUROCRYPT '98, volume 1403 of LNCS, pages 127-144, 1998.

13.    Giuseppe Ateniese, Kevin Fu, Matthew Green, and Susan Hohenberger. Improved Proxy Re- encryption Schemes with Applications to Secure Distributed Storage.
In NDSS, pages 29-43, 2005.

14.    Ran Canetti and Susan Hohenberger. Chosen-ciphertext secure proxy re-encryption. In ACM CCS, pages 185-194. ACM, 2007.

15.    ShengmeiLuo;  ZTECorp.,Shenzhen,China;  ZhaojiLin ; Xiaohua Chen ; Zhuolin Yang .“Virtualization security for cloud computing service”.In  Cloud and Service Computing (CSC), 2011

16.    Volokyta, A. ; Nat. Tech. Univ. of Ukraine Kyiv Polytech. Inst., Kiev, Ukraine ; Kokhanevych, I. ; “Secure virtualization in Cloud computing”. In Modern Problems of Radio Engineering Telecommunications and Computer Science (TCSET), 2012


67-70

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

17.

Authors:

Sunil Sharma, Kamlesh Kumar Mishra, Preeti Singh

Paper Title:

Experimental Testing of Bio Fuel Extracted from Cassava

Abstract: In this study, ethanol has been extracted from raw cassava root and blended with diesel. The performance of a constant speed, stationary diesel engine using ethanol–diesel blends as fuel has been evaluated experimentally. The experiments have been performed using 5, 10, 15 and 20% ethanol-diesel blends. Diesel fuel has been used as a basis for comparison the testing of various engine parameters such as BHP, RPM and efficiency. The efficiency observed for blending of 15% of ethanol in diesel with 1% additive is higher than any other proportion of the blending of diesel with ethanol.

Keywords:
 Biofuel, Cassava, Brake Power, Thermal Efficiency.


References:

1.        Jinlin Xuea, Tony E. Grift and Alan C. Hansen, “Effect of biodiesel on engine performances and emissions,” Renewable and Sustainable Energy Reviews, Vol.15, No. 2, pp. 1098-1116, 2011
2.        Gaurav Dwivedi and M.P. Sharma, “Performance Evaluation of Diesel Engine Using Biodiesel from Pongamia Oil,” International Journal of Renewable Energy Research, Vol. 3, No. 2, pp. 325-330, 2013.

3.        Suthar Dinesh Kumar L., Dr. Rathod Pravin P., Prof. Patel Nikul K., “The Performance of Multi Cylinder Diesel Engine Fuelled with Blend of Diesel and Neem Oil,” International Journal of Advanced Engineering Research and Studies, Vol. 2, No. 3, pp. 28-34, 2013

4.        A.M. Liaquat, H.H. Masjuki, M.A. Kalam, I.M. Rizwanul Fattah, M.A. Hazrat, M. Varman, M. Mofijur, M. Shahabuddin, “Effect of coconut biodiesel blended fuels on engine performance and emission characteristics,” Procedia Engineering, Vol. 56, pp. 583 – 590, 2013

5.        Hifjur Raheman, Prakash C Jena and Snehal S Jadav,  “Performance of a diesel engine with blends of biodiesel (from a mixture of oils) and high-speed diesel,” International Journal of Energy and Environmental Engineering, pp. 1-9, 2013

6.        Dilip K. Bora, L. M. Das, M.K. Gajendra Babu, “Performance of mixed biodiesel fueled diesel engine,” Journal of Scientific and Industrial Research, Vol. 67, pp. 73-76, 2008,

7.        Avinash Kumar Agarwal, “Biofuels (alcohols and biodiesel) applications as fuels for internal combustion engines,” Progress in Energy and Combustion Science, Vol. 33, No. 3, pp. 233–271, 2007

8.        P. V. Rao, Experimental Investigations on the Influence of Properties of Jatropha Biodiesel on Performance, Combustion, and Emission Characteristics of a DI-CI Engine, “World Academy of Science, Engineering and Technology,” Vol. 51, pp. 854-867, 2011

9.        H.B.Parikh, V.M.Prajapati, K.H.Thakkar, “Performance Evaluation And Emission Analysis Of 4- S, I.C. Engine Using Ethanol Bio-Diesel Blended With Diesel Fuel,” International Journal of Research in Engineering and Technology, Vol. 2, No. 4, pp. 465 – 469

10.     Leen Kuiper, Burcu Ekmekci, Carlo Hamelinck, Willem Hettinga, Sebastian Meyer, Klaas Koop, “Bio-ethanol from Cassava,” Ecofys, 2007

11.     Klanarong Sriroth, Sittichoke Wanlapatit and Kuakoon Piyachomkwan, Cassava Bioethanol, National Center for Genetic Engineering and Biotechnology (BIOTEC), Thailand


71-73

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

18.

Authors:

K. C. Niveditha, Pooja Ramesh Nair, Sugirtha. R, Swapna. S, Swetha. K, N. Kayalvizhi

Paper Title:

Digitization of Linearized Thermistor Output Using Dual Slope ADC

Abstract:  To measure the temperature using a thermistor, linearization of the thermistor output to compensate the inverse exponential nature of resistance-temperature characteristic is required. A linearized dual slope analog to digital converter (LDSDC) that takes thermistor as input and provides digital output is constructed here. A logarithmic amplifier that counterbalances the exponential nature is presented at the input of the LDSDC. The conversion logic of the dual slope ADC is suitably modified to obtain the required inversion and offset correction so as to obtain linearization over a wide range of temperature. The Time and Logic Unit of the system is constructed using a Field Programmable Gate Array(FPGA) with a high speed clock to ensure resolution of 20ns to have negligible effect of hysteresis loop. The efficiency of the proposed LDSDC is verified through simulation and is will be practically demonstrated through a prototype unit being built and tested upon. Analysis to identify different possible sources of error will thus be proposed.

Keywords:
 Dual Slope ADC, Field Programmable Gate Array(FPGA), Linearization, Thermistor.


References:

1.       N. MadhuMohan, V. Jagadeesh Kumar and P. Sankaran, “Linearizing Dual-slope Digital Converter Suitable for a thermistor,“ IEEE Trans. Instrum. Meas., vol.60, no.5, May.2011.
2.       J. A. Becker, C. B. Green and G. L. Pearson, “Properties and uses of thermistors-thermally sensitive resistors, “Trans.Amer.Inst.Elect.Eng., vol.65, no. 11, pp.711
725, Nov.1946.

3.       D. Ghosh and D. Patranabis, “Software based linearisation of thermistor type nonlinearity,” Proc.Inst.Elect.Engg-circuits Devices Syst., vol. 139, no.3, pp.339-342, Jun 1992.

4.       A. Khan, ”An improved linear temperature /voltage converter using thermistor in logarithmic network,” IEEE Trans.Instrum.Meas., vol. IM-33, no.1, Mar. 1984.

5.       Z. P. Nenova and T. G. Nenov, ”Linearisation circuit of the thermistor connection,” IEEE Trans. Instrum . Meas., vol.58, no. 2, pp.441-449, Feb.2009.

6.       A. Khan and R. Sengupta, “A linear thermistor-based temperature to frequency converter using a delay network,” IEEE Trans.Instrum.Meas., vol.IM-34, no. 1, pp.85-86, Mar.1985.

7.       S. Kaliyugavardan, P. Sankaran, and V. G. K. Murti, ”Application of reciprocal time generation technique to digital temperature measurement,” IEEE Trans.Instrum.Meas., vol. 43, no.1, pp.99-100,feb.1994

8.       “forums.xilinx.com”, Xilinx Inc.


74-76

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

19.

Authors:

Zakir Hussain, Rahul Kumar, Parul Priya, Sumit Bisht, Rohit Singh, Arindam Ghosal

Paper Title:

“Ajaatshatru”- A New Technology in Indian Army

Abstract:   This paper is mainly focused with defensive technology. It is designed to serve the Indian army. We all know about the environment around the border areas. Terrorists always try to infiltrate border security mainly during night and winter. Indian soldiers always try their best to protect border so that no terrorist can infiltrate border. But sometimes it become difficult for them to guard border because of their several limitations i.e. vision problem due to dark and due to fog in winter, because nobody can fight properly without sight. For eliminating these kinds of problems we are introducing “AJAATSHATRU”.

Keywords:
 Ajaat shatru, Thermal Imaging System, Mine Detector, Global Positioning System, Remote Driving.


References:

1.    http://www.thermalwave.com
2.    http://www.landinst.com

3.    http://www.thermoteknix.com

4.    http://en.wikipedia.org/wiki/Polish_mine_detector

5.    http://en.wikipedia.org/wiki/Demining

77-78

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

20.

Authors:

Piyush Saxena, Aniket Maithani, Asish Srivastava, Tinesh Kumar Goyal

Paper Title:

An Introduction to Effective Cloud Management with Monitoring as a Service

Abstract: In the New era of cloud computing and service based market monitoring state of a system or an application is necessary to get maximum benefit of the power of a system. Monitoring state of system means continuous checking the over-all functionality under various permutations and combinations of load considering all the factors that can harm performance of system. Monitoring can be provided as a service to clients through cloud computing. This will be beneficial for both the client and the providers as client will be aware of the over-all performance of system and which may help consumers to visualize further needs of improvement and providers may get an option for increasing revenues as well as their system knowledge. Cloud computing allows consumers and businesses to use application without installation and access their personal files at any computer with internet access. Speed up the calculations and processes. Provide multi tenancy features. Cloud Computing is a Computing in which services and software are provided over the Internet (“cloud”) which is very cheap and affordable. Cloud computing  is on demand  access  to  virtualized  IT  resources that  are  housed  outside  of  your  own  data centre, shared by other simple to use,  paid for via monthly subscription which is very low in cost, and accessed over the web with many features in it.  Monitoring as a Service is a business model in which a large company rents space in their storage infrastructure to another company or individual. The key advantage to Cloud setup in the enterprise is in cost savings -- in personnel, in hardware and in physical storage space. The Cloud provider agrees to rent storage space on a cost-per-gigabyte-stored and cost-per-data-transfer basis and the company's data would be automatically transferred at the specified time over the storage provider's proprietary wide area network (WAN) or the Internet. If the company's data ever became corrupt or got lost, the network administrator could contact the cloud service provider and request a copy of the data.

Keywords:
 Cloud App Monitoring, Cloud Computing, MaaS, Virtualized IT Resources.


References:

1.       L. Raschid, H.-F. Wen, A. Gal, and V. Zadorozhny, “Monitoring the performance of wide area applications using latency profiles,” in WWW’03.
2.       B. Raghavan, K. V. Vishwanath, S. Ramabhadran, K. Yocum, and A. C.Snoeren, “Cloud control with distributed rate limiting,” in SIGCOMM,2007, pp. 337–348.

3.       Piyush Saxena, Satyajit Padhy, Praveen Kumar 2013. Use of storage as a service for online operating system in Cloud Computing, International Conference on Telecom and Networks.

4.       Bernd Harzog, “Monitoring as a Service”, Virtualization practices 2012.

5.       N. Jain, P. Mahajan, D. Kit, P. Yalagandula, M. Dahlin, and Y. Zhang, “Network imprecision: A new consistency metric for scalable monitoring,” in OSDI, 2008, pp. 87–102.

6.       Amazon, “Ec2 auto-scaling,” http://aws.amazon.com/autoscaling/.

7.       Shicong Meng, Ling Liu, “Enhanced Monitoring-as-a-Service for Effective Cloud Management”, IEEE Transaction on Computers 2012.

8.       S. Madden and et al., “Tag: A tiny aggregation service for ad-hoc sensor networks,” in OSDI, 2002, pp. 131–146.

9.       P. Yalagandula and M. Dahlin, “A scalable distributed information management system,” in SIGCOMM04, pp. 379–390.

10.    M. Dilman and D. Raz, “Efficient reactive monitoring,” in INFOCOM, 2001, pp. 1012–1019.

11.    R. Keralapura, G. Cormode, and J. Ramamirtham, “Communicationefficient distributed monitoring of threshold counts,” in SIGMOD, 2006.

12.    S. Meng, T. Wang, and L. Liu, “Monitoring continuous state violation in datacenters: Exploring the time dimension,” in ICDE, 2010, pp. 968–979.

13.    S. Meng, A. Iyengar, I. Rouvellou, L. Liu, K. Lee, B. Palanisamy, and Y. Tang, “Reliable state monitoring in cloud datacenters,” in IEEE Cloud, 2012.

14.    P. Yalagandula and M. Dahlin, “A scalable distributed information management system,” in SIGCOMM04, pp. 379–390.

15.    S. Meng, S. R. Kashyap, C. Venkatramani, and L. Liu, “Remo: Resourceaware application state monitoring for large-scale distributed systems,” in ICDCS, 2009, pp. 248–25. 


79-84

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

21.

Authors:

Ramesh Kumar, Sabarikumar M, Vignesh S, Boopathi D, Ranga Raj R

Paper Title:

“Multi Swept Wing”– Elite Execution Over Wing's History

Abstract:  Profundity of wing structure that needs change has no closure. A wing is a type of fin with surface that produce aerodynamic force for aircraft through the atmosphere, In that way, a high performance aircrafts capable of subsonic, transonic and supersonic speed employ a forward swept wing platform. Due to aero elasticity effect, the aerodynamic force on wing tip tends to bend it in forward swept wing. But in the wing design that we propose, has smaller elasticity effect. The air flows towards the wing root and hence the dangerous tip stall becomes safer in our wing. Also due to sweep at the tip of the wing, it increases the aileron performance and further it increases the yaw directional stability.  Since the wings are generally larger at the root and due to multi swept, this improves the lift performance. As a result, maneuverability is improved especially at both lower and higher angle of attacks. Thus the stability of a forward swept wing aircraft is disclosed that corrects a dynamic instability phenomenon which occurs when the whole vehicle (rigid body) motion couples with the wing structural motion. Our technology will be elite in wing’s ability today.

Keywords:
 Aerodynamics, Improved lift and drag, Maneuverability, Multi swept, Stability


References:

1.       Dr. Ibtisam A. Hassan Dr. A. S. Darwish Hayder M. Jaffal., “Theoretical and Experimental Study of a Forward Swept Wing” AJES-2010, Vol.3, No.2.
2.       Edwin J. Saltzman., “Lift-Drag characteristics of a forward swept aircraft” ,NASA Technical Paper  3414 / 1994.

3.       Rodney H. Ricketts., “Experiments on divergence of forward swept wing”      ,NASA Technical Paper 1685  /Aug 2010

4.       Kenneth L. Sims., “Aerodynamic Investigation of forward swept wing”

5.       Terrence A. Weishaar., “Forward swept wing static aero elasticity” AD NUMBER/ADB042815/ AFFOL-TR-79-3087

6.       David G. Koenig., “High performance forward swept wing aircraft” Patent US 4767083 A

7.       Jianbo Lu, Livonia. “Enhanced system for yaw stability control system include to roll stability control function” patent US 6631317

8.       S Siouris, N Qin, "Study of the effects of wing sweep on the aerodynamic performance of a blended wing body aircraft", Journal of Aerospace Engineering, Volume 221, Number 1/2007.

9.       Micheal J.Mann & Charles E. Mercer, "Forward swept wing configuration Designed for High Maneuverability by use of a Transonic Computational Method", NASA Technical paper 2628, 1986.

10.    Rogers, E. W. E. and Hall, I. M., “An introduction to the flow about     plane swept -back wings at transonic speeds”, Journal of the          Aeronautical Society, Vol.
64, Aug 196O,pp.449-464.

11.    Kulfan, R. M. “Wing geometry effects on leading – edge vortices”,   AIAA - Aircraft Systems and Technology Meeting (Aug 20-22,1979,NY)

12.    Lovell. D. A. and Doherty. J.J. “Aerodynamic design of aerofoils and wings using a constrained optimization method”, DERA , EAC 1994 paper 3.21,Oct 1994.

13.    Holt, D. R. “Some particular configuration effects on athin supercritical variable camber wing”, AGARD CP - 285Subsonic/transonic configuration  aerodynamics (May 1980)

14.    Redeke G. & Wichman, "Forward Swept a Favorable Concept for a Laminar Flow wing", Journal Aircraft Vol.28, No.2, February, 1991

15.    H. M. Jaffal, "Design Study of Aerodynamic Coefficients for the Forward Swept Wing", MSC Thesis, University of Technology, Baghdad, 2001.


85-90

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

22.

Authors:

Le Ngoc Son

Paper Title:

A Proposed Model for Firm’s Technological Capability Assessment under Uncertain Environment

Abstract:   The recognition of technological level and capability has become one of the most important activities which not only help the firm appraise its strength and weakness, but also guide to plan the technological innovation strategic and enhance the competitive advantages. In this study, firm’s technological capability is determined completely with four components (T – Technoware, H – Humanware, I – Inforware, O - Orgaware) and their criteria using Technology Atlas method, which was developed by Asian and Pacific Center for Technology Transfer. The contribution degrees toward technological capability of each component and criteria in specific industry are determined efficiently rely on fuzzy-AHP. Besides, aggregation of group judgment using a new technique with triangular intuition fuzzy number (IFN) representation makes the decisions more accuracy and efficiency. Our proposed model helps the firm’s managers can easily evaluate their current technological capability keep track of their technological growth, compares with the industrial level and guides to the technological renovation strategy which is one factor to raise competitive advantage.

Keywords:
 technological capability assessment, group aggregation, analytic hierarchy process, intuitionistic fuzzy.


References:

1.          Smith, R., & Sharif, N. (2007). Understanding and acquiring technology assets for global competition. Technovation, 27(11), 643-649.
2.          Syverson, C. (2010). What determines productivity? (No. w15712). National Bureau of Economic Research.

3.          Cooper, R. G., & Edgett, S. J. (2010). Developing a product innovation and technology strategy for your business. Research-Technology Management, 53(3), 33-40.

4.          Lall, S. (1992). Technological capabilities and industrialization. World development, 20(2), 165-186.

5.          Udo, G. J., & Edoho, F. M. (2000). Information technology transfer to African nations: An economic development mandate. The Journal of Technology Transfer, 25(3), 329-342.

6.          Archibugi, D., & Coco, A. (2004). A new indicator of technological capabilities for developed and developing countries (ArCo). World Development, 32(4), 629-654.

7.          Archibugi, D., & Coco, A. (2005). Measuring technological capabilities at the country level: A survey and a menu for choice. Research policy, 34(2), 175-194.

8.          Ortega, M. J. R. (2010). Competitive strategies and firm performance: Technological capabilities' moderating roles. Journal of Business Research, 63(12), 1273-1281.

9.          Archibugi, D., Denni, M., & Filippetti, A. (2009). The technological capabilities of nations: The state of the art of synthetic indicators. Technological Forecasting and Social Change, 76(7), 917-931.

10.       Zhen-qin, W., & Wei-cai, W. (2011, September). The measurement of regional technological capability in China: An empirical study. In Management Science and Engineering (ICMSE), 2011 International Conference on (pp. 630-636). IEEE.

11.       Filippetti, A., & Peyrache, A. (2011). The patterns of technological capabilities of countries: A dual approach using composite indicators and data envelopment
analysis. World Development, 39(7), 1108-1121.

12.       Lamin, A., & Dunlap, D. (2011). Complex technological capabilities in emerging economy firms: The role of organizational relationships. Journal of International Management, 17(3), 211-228.

13.       Molina-Domene, M. A., & Pietrobelli, C. (2012). Drivers of technological capabilities in developing countries: An econometric analysis of Argentina, Brazil and Chile. Structural Change and Economic Dynamics, 23(4), 504-515.

14.       ESCAP, A. Pacific Centre for Transfer of Technology (Technology Atlas Project)(1989). Framework for Technology-Based Development.

15.       ESCAP, A. (1994). Extension of the Technology Atlas. United Nations, New York, USA.

16.       Alizadeh, Y. (2012, June). Firm-level technological capability assessment; a literature review. In Technology Management Conference (ITMC), 2012 IEEE International (pp. 398-404). IEEE.

17.       Akbari, M. R., & Yunusi, M. (2012). A methodology to evaluate both internal and external environments of applied-scientific educational system used in strategic planning. Scientific Research and Essays, 7(17), 1746-1760.

18.       Jayasena, T. D. S. A., Wickramasinghe, V., & Dasanayaka, S. W. S. B. (2013, December). TECHNOLOGY TRANSFER: THE ROLE OF CULTURE IN TRANSFERRING TECHNOLOGY. In Proceedings of International Conference on Business Management (Vol. 2).

19.       Giang, N. H., Van Binh, T., & Viet, P. M. (2006, October). Distributed Data Model for Assessment and Management of Enterprises and Economic Sectors' Technology Capabilities. In Communications and Electronics, 2006. ICCE'06. First International Conference on (pp. 387-391). IEEE.

20.       Nezhad, S. G. G., Rostamzadeh, R., & Sofian, S. (2010). The Influence of (beta) Technology Intensity and Evaluating TCC Using AHP Model in Iran Tractor Manufacturing Company (ITMCO). International Review of Business Research Papers, 6(6), 286-298.

21.       Dosi, G., & Grazzi, M. (2010). On the nature of technologies: knowledge, procedures, artifacts and production inputs. Cambridge Journal of Economics, 34(1), 173-184.

22.       Christensen, C. M., & Raynor, M. E. (2003). The innovator's solution: Creating and sustaining successful growth. Harvard Business School Press.

23.       Sharif, N. (1999). Strategic role of technological self-reliance in development management. Technological forecasting and social change, 62(3), 219-238.

24.       Devi, K. (2011). Extension of VIKOR method in intuitionistic fuzzy environment for robot selection. Expert Systems with Applications, 38(11), 14163-14168.

25.       Zadeh, L. A. (1965). Fuzzy sets. Information and control, 8(3), 338-353.

26.       Atanassov, K. T. (1986). Intuitionistic fuzzy sets. Fuzzy sets and Systems, 20(1), 87-96.

27.       Sadiq, R., & Tesfamariam, S. (2009). Environmental decision-making under uncertainty using intuitionistic fuzzy analytic hierarchy process (IF-AHP). Stochastic Environmental Research and Risk Assessment, 23(1), 75-91


91-95

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

23.

Authors:

Arpit Mehra, Arindam Ghosal

Paper Title:

A 3- Wheels Electric Car for Physically Disabled People

Abstract:  Electric cycles and scooter users have been identified as vulnerable road users by most of state road transport authorities. Motorized cycles and electric wheel chairs are increasingly used as an alternate form of transport for older people and for people with disabilities. Older peoples are using motorized cycle as an alternative form of transport no longer feels safe to drive a motor vehicle.[1] In this paper, an attractive modern electric car also called Electro Handy has been designed for handicapped people. Electro Handy is a powerful car for disabled people powered by rechargeable battery.

Keywords:
 Electro handy, Handicapped, motorized car, Prototype


References:

1.        http://www.indiamart.com/unicornauto/handicapped-vehicles.html
2.        http://www.abledata.com/abledata_docs/scooters.html

3.        http://www.mobility-aids.in/car-for-physically-challenged.html

4.        http://www.wheelchairindia.in/F34743/car_conversion_hand_ controlled_car_for_physically_challenged.html


96-97

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

24.

Authors:

Iuliana Florentina Gheorghe

Paper Title:

Comparative Efficiency in Nutrient Retention between the Vegetation of the Natural Ecosystems and of the Agro-Systems

Abstract:   Over the last 50 years, the Europe's agricultural sector was supported by the commune agrarian policy (CAP). Although in the beginning the emphasis was on expanding farmland at the expense of the natural ecosystems and on an intensive agriculture in the existing farmland, in the last decades was understood also the need of nature conservation in parallel with the development of agriculture. This support has evolved alongside growing recognition and awareness of the strong links between agricultural production and biological diversity conservation. The Ecology development as science, mainly after the Odum approach, emphasized the role of natural ecosystems in natural capital conservation and biodiversity. Also the ecology studies conducted in the last two decades, have revealed and other services provided by the natural ecosystems besides the generated resources, that fixation carbon dioxide, the reduce diffuse pollution with nutrients, creation a local microclimate, etc The local microclimate created by natural vegetation areas near of the crops influences strongly the ecological functions of anthropogenic ecosystems , even the in the semi-natural ecosystems, important functions as cycles of nutrient and water  (local water balance, nutrient balance and the production of biomass). The keeping of a mosaic structure (a mixed of crops with pasture, forests, rivers and lakes) is an ideal solution to harmonize the development of society which involves an increase of needs in energy and materials resources; with nature conservation.

Keywords:
 Plant communities, Primary production, Litter decomposition, Water balance, Nutrients balance 


References:
1.       Bradford J.B., Lauenroth W.K., Burke I.C., 2005, The impactof cropping on primary production in the u.s. great plains,  Ecology, 86(7), 2005, pp. 1863–1872
2.       Houghton, R. A., 1995, Land-use change and the carbon cycle. Global Change Biology 1:275–287.

3.       Houghton, R. A., Hackler J. L., and Lawrence K. T.,1999, The U.S. carbon budget: contributions from land-use change. Science, 285:574–578.

4.       Richards, J. F., 1990, Land transformations, Pages 163–201 in B. L.

5.       Vitousek P.M. and Howarth R.W., 1991, "Nitrogen limitation on land and in the sea: how can it occur?" In: Biogeochemistry 13:87-115.

6.       Reich P.B., Grigal D.F., Aber J.D., Gower S.T., 1997, "Nitrogen mineralization and productivity in 50 hardwood and conifer stands on diverse soils", in: Ecology 78:335-347.

7.       Likens, G. E., F. H. Bormann, Johnson N. M., Fisher D. W. and Pierce R. S., 1970, Effects of forest cutting and herbicide treatment on nutrient budgets in the Hubbard Brook watershed ecosystems, in: Ecological Monographs 40:23-47.

8.       Melillo J.M., Aber  J.D., and Muratore J.F., 1982,Nitrogen and lignin control of hardwood leaf litter decomposition dynamics. Ecology, 63:621-626.

9.       Hättenschwiler S. and P.M. Vitousek, 2000,  The role of polyphenols in terrestrial ecosystem  nutrient cycling. In: Trends in Ecology and Evolution 15: 238-243.

10.    Kendall and McDonnell, 1998. Isotope Tracers in Catchment Hydrology. Elsevier

11.    de Ridder  N. A. and Boonstra J., 1994. Analysis  of Water Balances. In: H.P.Ritzema (ed.), Drainage Principles and Applications, Publication 16, p. 601- 634. International Institute for Land Reclamation and Improvement (ILRI), Wageningen, The Netherlands. ISBN 90-70754-33-9.

12.    Lal, R., 1991, Current research on crop water balance, and implications for the future, Soil Water Balance in the Sudano-Sahelian Zone (Proceedings of the Niamey Workshop, February 1991). IAHS Publ. no. 199.

13.    Turner, W. C. Clark, Kates R. W., Richards J. F., Mathews J. T., and W. B. Meyer, editors. The Earth as transformed by human action. Cambridge University Press, Cambridge, UK.

14.    Whittaker, R.H., 1978, The Braun-Blanquet approach. Classification of Plant Communities, Junk, The Hague.

15.    Gheorghe I.F. Fitocenologie şi  Vegetaţia României, 2008. Ed. Didactică şi Pedagogică 


98-103

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

25.

Authors:

Vijayalaxmi Kumbar, Maheshwari Biradar

Paper Title:

BER Performance Analysis of DS-CDMA over AWGN Channel

Abstract: In this paper, we present a bit error rate (BER) performance of DS-CDMA over AWGN channel with perfect power control. The standard Gaussian approximation (SGA), Simplified Improved Gaussian Approximation (SIGA), Reverse Channel and performance with adaptive antennas at the base stations and Modified SIGA are used to evaluate the BER performance for the DS-CDMA. Power control is the important system requirement for CDMA. For CDMA system to function properly, we need to control the power; if power control is not implemented many problems arises such as the near-far problem will start to dominate and consequently will lower the capacity of the CDMA system. However, when the power control in CDMA systems is employed, it allows users to share resources of the system equally between themselves, leading to increased capacity.   Power control is an important method to reduce co-channel interference and it can improve the system capacity.

Keywords:
 AWGN, BER, DS-CDMA, Power Control.


References:

1.       M. Holtzman, “A simple, accurate method to calculate spread spectrum multiple-access error probabilities,” IEEE Transactions on Communications, vol. 40, no. 3, pp. 461-464, March 1992.
2.       D. E. Borth, and M. B. Pursley, “Analysis of direct-sequence spread spectrum multiple-access communication over Rician fading channels,” IEEE Transactions on Communications, vol.COM-27, pp. 1566-1577, Oct. 1979.

3.       Cheng and N. Beaulieu, “Accurate DS-CDMA Bit-Error Probability Calculation in Rayleigh Fading,” Transactions on Wireless Communications, vol. 1, no. 1, pp. 3–15,
January 2002.

4.       M. O. Sunay and P. J. McLane, “Calculating Error Probabilities for DS-CDMA Systems: When Not to Use the Gaussian Approximation, “in IEEE Global Telecommunication Conference, vol.  3, London, UK, 18-22 November 1996, pp. 1744–1749.

5.       M.  B.  Pursley,   “Performance evaluation for phase-coded spread spectrum multiple-access communications with random signature sequences”, IEEE Trans. Commun., vol. COM-25, Aug.  1977.

6.       T.  S.  Rappaport and L.  B.  Milstein,  “Effects  of  radio propagation path  loss on  DS-CDMA cellular  frequency  reuse  efficiency for  the reverse channel”,  IEEE Trans.  Veh.Technol., vol. 41, no.3, Aug.1992.

7.       R.K.Morrow, and J. S. Lehnert, “Bit-to-Bit Error Dependence in Slotted DS/SSMA Packet Systems with Random Signature Sequences”, IEEE Tran. com., vol.37, no.10, Oct, 1989.

8.       D.N.Kyatanvar, G.G.Tengase, M.S.Patil and B.K.Shiragapur  “Computationally Simple Bit Error Rate Probability Analysis for DS-CDMA Cellular Systems”. Second International conference on Wireless   Communication & Sensor network Dec. 2006.

9.       Sudhir Babu “Evaluation of BER for AWGN, Rayleigh And Rician Fading Channels under Various Modulation  Schemes”,‘International Journal of Computer Applications’, July 2011, (0975 – 8887), Volume 26– No.9.

10.    Y Mohan Reddy, M Nanda Kumar, K Manjunath,  “Performance Analysis of DS-CDMA Rake Receiver”,’ International Journal of Advanced Research in Computer Engineering & Technology’, May  2012, Volume 1, Issue 3.

104-107

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

26.

Authors:

Agarwal Sunny Kumar P., Upadhyaya Deep S.

Paper Title:

Infrastructure Development of Village

Abstract:  The aim of project is to develop the village with urban facilities. A team of project is find the problem or need of a village in terms of physical or social infrastructure and to design that facility with efficient engineering solution which include the design proposal and estimate cost to facilitate the require facility for the future growth of village

Keywords:
  Infrastructure, Development, Urban, Fringe Villages, Villages, Zadeshwar.


References:

1.       Bharuch District Panchayat Office, Gujarat Government.
2.       (http://bharuchdp.gujarat.gov.in/bharuch/english/yojnao/index.htm)

3.       ZADESHWAR Gram Panchayat Office.

4.       A document given by the Panchayat office of ZADESHWAR village

5.       National Building Code, 2005

6.       Ecological Sanitation Practitioner’s Handbook

7.       General Development and Control Regulations Vol.III (GDCR) published by BAUDA (Bharuch & Ankleshwar Urban Development Authority)


108-111

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

27.

Authors:

Gholamreza Khorasani, Li Zeyun

Paper Title:

Implementation of Technology Acceptance Model (TAM) in Business Research on Web Based Learning System

Abstract:   In contemporary society, Web based learning system (e-learning) is playing a significant role in our lives, it enable us to easily to access different internet sources and make students to study much more efficiency and effective. This study developed and empirically tested a model testing on the perceived usefulness and perceived ease of use toward intention to use web based learning system. In our study, we aim to find out the fundamental factors that influence intention to use web based learning system (e-learning). Quantitative survey is carried out among undergraduate students to explore how the independent variables and mediating variables will affect the dependent variable using e-learning. We apply Technology Acceptance Model (TAM) to construct a theoretical framework. Our sample size is 150 students’ data from Universiti Sains Malaysia based on convenience sampling. The data gathered through questionnaire was coded and analyzed using the computerized Statistical Software Package for Social Science (SPSS) software. We apply frequency analysis, descriptive analysis, validity and reliability test, correlation test and multiple regression analysis in our research.  Based on our findings, the mediating variables perceived usefulness and perceived ease of use had the strongest impact on using web based learning system. These findings also very useful to provide insights for future research and management practice on the improvement of web based learning system

Keywords:
Web-Based Learning, E-learning, SPSS, Technology Acceptance Model (TAM), Regression Analysis.


References:

1.       Adams, D. A., Nelson, R. R., & Todd, P. A. (1992). Perceived usefulness, ease of use, and usage of information: A replication. MIS Quarterly, 16(2), 227-247.
2.       Amoako-Gyampah, K., & Salam, A. F. (2004). An extension of the technology acceptance model in an ERP implementation environment. Information & Management, 41(6), 731-745.

3.       Arbaugh, J. B., & Duray, R. (2002). Technological and structural characteristics, student learning and satisfaction with web-based courses– An exploratory study of two on-line MBA programs. Management Learning, Vol.33, No.3,  pp.340–335.

4.       Brusilovsky, P., & Peylo, C. (2003). Adaptive and intelligent web-based educational systems.  International Journal of Artificial Intelligence in Education, 13, 159–172.

5.       Black, J. & McClintock, R. (1995) "An Interpretation Construction Approach to Constructivist Design."

6.       Carroll, Raymond J. (1982). "Adapting for Heteroscedasticity in Linear Models". The Annals of Statistics 10 (4): 1224–1233.

7.       Chen, C.-M., Lee, H.-M., & Chen, Y.-H. (2005). Personalized e-learning system using Item Response Theory.  Computers & Education, 44, 237–255.

8.       David,F.(1989) Perceived Usefulness,Perceived Ease of Use ,and User Acceptance of information Techology,MIS Quarterly,133319-340

9.       Del Pino, Guido (1989). "The Unifying Role of Iterative Generalized Least Squares in Statistical Algorithms". Statistical Science 4 (4): 394–403.

10.    Engelbrech,E.(2003) A look at E-learning Model: investigating their value for development an e-learning strategy, Pregressio,25,2,38-47.

11.    Endrickson, A. R.; Massey, P. D.; Cronan, T. P. (1993), "On the test-retest reliability of perceived usefulness and perceived ease of use scales", MIS Quarterly 17: 227–230.

12.    Felder, R., & Silverman, L. (1988).  Learning and teaching styles.  Journal of Engineering Education, 78(7), 674–681.

13.    Gardner, H. (1983).  Frames of mind: The theory of multiple intelligences.  New York: Basic Books.

14.    Ha L  and lam:es  E L (1998) Interactivity  reexamined:  a baseline  analysis  of early business websites Journey of Broadcasting and Electronic Media 42  4, 457-474. 

15.    Hochberg, Y.; Benjamini, Y. (1990). "More powerful procedures for multiple significance testing". Statistics in Medicine 9 (7): 811–818.

16.    Kuhlthau, C. C. (2004) . Seeking meaning: a process approach to library and information services. 2nd ed. Westport, CT: Libraries Unlimited.

17.    Papanikolaou, K.A., Mabbott, A., Bull, S., & Grigoriadou, M. (2006).  Designing learner-controlled educational interactions based on learning/cognitive style and learner behaviour.  Interacting with Computers, 18, 356–384.

18.    Sessink, O.D.T., Beeftink, H.H., Tramper, J., & Hartog, R.J.M. (2007).  Proteus: a lecturer-friendly adaptive tutoring system.  Journal of Interactive Learning Research, 18 (4), 533-554.

19.    Sun, S., Joy, M., & Griffiths, N. (2007).  The use of learning objects and learning styles in a multi-agent education system.  Journal of Interactive Learning Research, 18 (3), 381-398.

20.    Venkatesh, V.; Davis, F. D. (2000), "A theoretical extension of the technology acceptance model: Four longitudinal field studies", Management Science 46(2): 186–204

21.    Whyte, Cassandra Bolyard (1989) Student Affairs-The Future.Journal of College Student Development.30.86-89.


112-116

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

28.

Authors:

Rajwinder Kaur, Kanwalvir Singh Dhindsa

Paper Title:

Simulation of Adaptive Neuro Fuzzy Logic Controlled Wireless Intelligent Telemetry System

Abstract: This paper presents the simulation of a telemetry system for controlling the flow of water in water tanks used in industrial process using adaptive neuro fuzzy logic with the help of “neuro fuzzy design” module in matlab .Basically three ANFIS(Adaptive neuro Fuzzy Inference System) models are taken for simulation and then compared. First model is using single input variable “level”, second model is using two input variables “level” and “flow” and third model is using three input variables “level”, “flow” and “rate”. All these three models are using Sugeno type fuzzy model because only Sugeno type fuzzy models can be simulated in neuro fuzzy design module of matlab. Thus all models are using single output variable “motorstatus” which is either “ON” or “OFF”. Simulation is performed by taking constant and linear type output membership functions as major parameters. Training and checking of models is simulated for each type of output membership functions using two optimization methods “hybrid” and “back propagation” alternatively and number of epochs is considered 30, 60 and 120 for each method.

Keywords:
 ANFIS, Neuro fuzzy design, Telemetry system, Water level control.


References:

1.       D.,Pandey.P.K,Chugh,R.,“Simulation of Water Level Control in a Tank Using Fuzzy Logic”, IOSR Journal of Electrical and Electronics Engineering,Vol.2,issue 3, 2012.,pp. 09-12.
2.       Kumar,J,S.,Poongodi,P.,Balakumaran,P., “Artificial Intelligence Based Alum Dosage Control in Water Treatment Plant “,International Journal of Engineering and Technology , Vol. 5 ,2013,pp.3344-3350.

3.       D.,Ahmed,A.,Redhu,V.,Gupta,U.,“Liquid Level Control by using Fuzzy Logic Controller”, International Journal of Advances in Engineering & Technology, Vol. 4, Issue
1, 2012,pp. 537-549 .

4.       Bernardino,J., Quadrado.,J,C.,“Real-time Control Implementation of Simple  Mechatronic Devices Using MATLAB/Simulink/RTW Platform”,Ist World Engineering Education Flash Week, Lisbon, Portugal, Sep 27-30, 2011

5.       Ali Y.M., Zhang L.,“A methodology for fuzzy modeling of engineering  systems”, Fuzzy Sets and Systems ,2001, pp.181-197.

6.       Harris C.J., Brown M., Bossley K.M., Mills D.J., Ming Feng., “Advances in Neuro fuzzy  Algorithms for Real-time Modelling and Control”, Engineering Applications of  Artificial  Intelligence, Vol.9, Issue 1, 1996,pp. 1-16.

7.       Malhotra R., Singh, N., Singh Y., “Fuzzy Logic Modelling, Simulation and Control: A Review”, International Journal of Computer Science and Technology, 2010, pp. 183-188.

8.       Mote, T.P., Dr.Lokhande, S.D.,“Temperature Control System Using ANFIS”,International Journal of Soft Computing and Engineering (IJSCE),  Vol.2s, 2012,pp.7-16.

9.       Wu, D., Karray,F., Song ,I., “Water Level Control by Fuzzy Logic and Neural Networks,” IEEE Conference on Control  Applications,Hongkong, 2005.

10.    Wang ,W.P.,Chen,Z., “A neuro-fuzzy based forecasting approach for rush order control applications”, Expert Systems with Applications 35 , 2008,pp. 223–234.

117-121

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

29.

Authors:

Ann M. Peiffer, Paul J. Laurienti, Kourtland R. Koch, Lorna C. Timmerman

Paper Title:

Merging the Wechsler Adult Intelligence Scale Picture Completion Subtest with fMRI in Adult Learners: a Pilot Study

Abstract:  With the emergence of functional magnetic resonance imaging (fMRI), standard intelligence tests can now be studied to assess neural activity during test performance. However, traditional assessments are given with paper/pencil or card based methods which are difficult to deliver while in an MRI. Here, we validate a computerized version of the Wechsler Adult Intelligence Scale (WAIS) Picture Completion subtest against the card based version in 20 adult learners. A preliminary fMRI series is included to investigate whether the blood oxygen level-dependent (BOLD) activity can be associated with the paradigm. Using sparse sampling fMRI techniques, a control condition is contrasted to when participants ‘knew’ what answer they were going to provide. In 8 task-novice individuals, significant activation was seen in right primary visual and left temporal cortex and is interpreted as task-specific activation related to visual search and naming the item missing from the scene. To our knowledge this is the first fMRI experiment of the WAIS picture completion subtest. Future imaging work can now use alternative control conditions to explore the different cognitive components used within the subtest.

Keywords:
 (WAIS), (BOLD), fMRI


References:

1.       Andreasen, N., Flaum, M., Swayze, V., O’Leary, D. (1993). Intelligence and brain structure in normal individuals. The American Journal of Psychiatry, 150(1), 130-134.
2.       Ansari, D. (2005). Paving the way towards meaningful interactions between neuroscience and education.Developmental Science, 459-471.Cabeza, R., Grady, C. L., Nyberg, L., McIntosh, A. R., Tulving, E., Kapur, S., Jennings, J. M., Houle, S. and Craik F. I. M. (1997). Age-related differences in neural activity during memory encoding and retrieval: A positron emission tomography study. The Journal of Neuroscience, 17, 391-400.Geake, J., & Cooper, P. (2003). Cognitive neuroscience: Implication for education? Westminister Studies in Education, 26,(1), 7-20.

3.       Gottfredson, L., &Saklofske, D. H. (2009). Intelligence: Foundations and issues in assessment. Canadian Psychology, 50,(3), 183-195.

4.       Gray, J., & Thompson, P. (2004). Neurobiology of intelligence: Science and ethics. Nature Reviews Neuroscience, 5, 471-482. doi:10.1038/nrn1405.

5.     Haier, R., Jung, R., Yeo, R., Head, K., Alkire, M. (2004). Structural brain variation and general intelligence.Neuroimage,23,425433.doi:101016/j.neuroimage.2004.04.025.Kaufman, A. S. (1990). Assessing adolescent and adult intelligence.  Boston: Allyn and Bacon.Langenecker, S.A., Nielson, K.A., and Rao, S.M. (2004).fMRI of healthy older adults during Stroop interference. Neuroimage, 21, 192–200.

6.       Koch, K. R., Peiffer, A. M., Laurienti, P. J. & Timmerman, L. (ICollaboration among education and neuroscience. Psychology in the Schools, 50, (6), 577-578.

7.       Mason, L. (2009). Bridging neuroscience and education: A two-way path is possible. Cortex, 45, 548-549.Phelps, E.A., Hyder, F., Blamire, A.M., and Schulman, R.G. (1997).FMRI of the prefrontal cortex during overt verbal fluency.Neuroreport, 8, 561–565.Sattler, J. M. (1988). Assessment of children. Boston: Allyn & Bacon.

8.       Shen, L., Hu, X., Yacoub, E., and Ugurbil, K. (1999). Neural correlates of visual form and visual spatial processing. Human Brain Mapping, 8, 60–71.Silverstein, A. B. (1982). Note on the constancy of the IQ. American Journal on Mental Deficiency, 87, 227-228.Sweet, L. H., Paskavitz, J. F., O-Connor, M. J., Browndyke, J. N., Wellen, J. W. and Cohen, R.A. (2005).fMRI correlates of the WAIS-III Symbol Search subtest. Journal of the International Neuropsychological Society, 11, 471-476.Wechsler, D. (1958). The measurement and appraisal of adult intelligence(4th ed.). Baltimore: Williams & Wilkins.

9.       Wechsler, D. (1981). WAIS-R: manual: Wechsler adult intelligence scale-Revised. New York: Harcourt Brace Jovanovich.

10.    Wechsler, D. (1997). Wechsler adult intelligence scale--3rd edition (WAIS-3®). San Antonio, TX: Harcourt Assessment.


122-126

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

30.

Authors:

Vishvender Singh, Gunjan Agarwal, Mukesh Sharma

Paper Title:

Study of Sense Amplifier for Low offset High Speed SRAM Memory Design

Abstract:   The sense amplifiers is a main peripheral of CMOS memory and play an important role to overall delay, offset, speed , memory access time and power dissipation of the memory and to improve the speed performance of a memory, and to provide signals which conform to the requirements of driving peripheral circuits within the memory, sense amplifiers are applied. In this paper we present study and literature survey of low offset and high speed low power sense amplifier architecture selection  for SRAM memory design application and in this paper also present the comparison voltage mode sense amplifier and current mode sense amplifier. Presented Sense amplifier CMOS schematic is design tanner EDA S-edit , Simulate T-spice and 0.13µm technology.

Keywords:
  Sense amplifier, current mode sense amplifier, offset, Intrinsic offset.


References:

1.       Adel S. Sedra and Kenneth C. Smith, “Microelectronics Circuits” Oxford University Press International Edition, New York, 5th Edition 2006. 
2.       Ardalan,S.;  Chen, D.;  Sachdev, M.; Kennings, A.; “Current mode sense amplifier” Circuits and Systems, 2005. 48th Midwest Symposium  Vol. 1,  7-10 Aug. 2005 Page(s):17 – 20.

3.       Hwang-Cherng Chow,Shu-Hsien Chang; “high performance sense amplifier circuit for low power SRAM APPLICATION S: Circuits and

4.       Tegze P. Haraszti, Microcirc Associates “CMOS Memory Circuits”, kluwer academic  publishers New York, boston , dordrecht, London, Moscow. Pages  238-239.     

5.       Chun-Lung Hsu; Mean-Horn Ho; “High-speed sense amplifier for SRAM applications”Volume 1,  6-9 Dec. 2004 Page(s):577 - 580

6.       H. Mahmoodi, S. Mukhopadhyay, and K. Roy, “Estimation of delay variations due to random-dopant fuctuations in nanoscale CMOS circuits,” IEEE J. Solid-State Circuits, vol. 40, pp. 1787 1796, Sept. 2005 

7.       E. Seevinck et al., “Current-Mode Techniques for High-Speed VLSI Circuits with Application to Current Sense Amplifier for CMOS SRAM,” IEEE JSSC, vol. 26, no.4, pp. 525-536, 1991.

8.       Singh, R.; Bhat, N., “An offset compensation technique for latch type sense amplifiers in high-speed low-power SRAMs” Volume 2000, paper 11.3.4, p. 12,  Issue  6,  June 2004 Page(s):652 – 657..

9.       J. Bhavnagarwala, X. Tang, and J. D. Meindl, “The impactof intrinsic device fluctuations on CMOS SRAM cell stability” IEEE J. Solid-State Circuits, vol. 36, pp. 658665, Apr. 2001 .

10.    Ardalan,S.;  Chen, D.;  Sachdev, M.; Kennings, A.; “Current mode sense amplifier” Circuits and Systems, 2005. 48th Midwest Symposium  Vol. 1,  7-10 Aug. 2005  Page(s):17 – 20     

11.    R. Sarpeshkar, J.L. Wyatt, N.C. Lu, and P.D. Gerber, “Analysis of Mismatch Sensitivity in a Simultaneously Latched CMOS Sense Amplifier”, IEEE Trans. on Circuits and Systems-II, Vol. 39, No.5, Muy 1992.

12.    Agarwal, B. Paul, S. Mukhopadhyay, and K. Roy, “Process variation in embedded memories: Failure analysis and variation aware architecture”,IEEE J. Solid-State Circuits, vol. 40, pp. 1804 1813, 2005.

13.    Kiyoo Itoh, “VLSI Memory Chip Design” Springer-Verlag Berlin Heidelberg New York,  p.p. 110, 2001.

14.    Ying-Chuan Liu, Hung-Yu Wang, Yuan-Long Jeang and Yu-Wei Huang, “A CMOS Current Mirror with Enhanced Input Dynamic Range”, 3rd International Conference on Innovative Computing Information and Control (ICICIC'08) , 2008.

15.    R. Menchaca, and H. Mahmoodi, "Impact of transistor aging effects on sense amplifier reliability in nano-scale CMOS," in 13 rd International Symposium on Quality Electronic Design, pp. 342-6, 2012


127-132

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

31.

Authors:

Jasvir Singh Rana, Rajendra Prasad, Raghuvir Singh

Paper Title:

Order Reduction using Modified Pole Clustering and Factor Division Method

Abstract:    The authors proposed a mixed technique for reducing the order of the high order dynamic systems. In this technique, the denominator polynomial of the reduced order model is determined by using the modified pole clustering while the coefficients of the numerator are obtained by Factor Division Method. This technique is simple and gives stable reduced models for the stable high-order system. C.B. Vishwakarma, modified pole clustering technique is suggested, which generates the more effective cluster .If a cluster contains r number of poles, then IDM criterion is repeated r times with the most dominant pole available in that cluster. The Factor division algorithm has been successfully used to find reduced order approximants of high order systems. The proposed method is described by solving a numerical example taken from the literature.

Keywords:
Modified pole clustering, Order reduction, Factor Division, Transfer function


References:

1.       V. Singh, D. Chandra and H. Kar, “Improved Routh Pade approximants: A Computer aided approach”, IEEE Trans. Autom. Control, 49(2), pp.292-296, 2004.
2.       S.Mukherjee and R.N. Mishra, “Reduced order modeling of linear multivariable systems using an error minimization technique”, Journal of Franklin Inst., 325 (2), pp.235-245, 1988.

3.       Sastry G.V.K.R Raja Rao G. and Mallikarjuna Rao P., “Large scale interval system modeling using Routh approximants”, Electronic Letters, 36(8), pp.768-769, 2000.

4.       R. Prasad, “Pade type model order reduction for multivariable systems using Routh approximation”, Computers and Electrical Engineering, 26, pp.445-459, 2000.

5.       G. Parmar, S. Mukherjee and R. Prasad, “System reduction using factor division algorithm and eigen spectrum analysis”, Applied Mathematical Modelling, Elsevier, 31, pp.2542-2552, 2007.

6.       R. Prasad and J. Pal, “Stable reduction of linear systems by continued fractions”, Journal of Institution of Engineers IE(I) Journal-EL, 72, pp.113-116, 1991.

7.       R. Prasad, S.P. Sharma and A.K. Mittal, “Improved Pade approximation for multivariable systems using stability equation method”, Journal of Institution of Engineers IE (I) Journal-EL, 84, pp.161-165, 2003.

8.       A.K. Sinha, J. Pal, Simulation based reduced order modeling using a clustering technique, Computer and Electrical Engg., 16(3), 1990,

9.       J. Pal, A.K. Sinha and N.K. Sinha,, “Reduced-order modelling using pole clustering and time-moments matching”, Journal of The Institution of  Engineers (India), Pt El, 76,1995, 1-6.

10.    C.B. Vishwakarma,” Order Reduction using Modified Pole Clustering and Pade Approximations” World Academy of Science, Engineering and Technology, 80 2011 ,pp787-791

11.    T.N. Lucas,” Factor division: A useful algorithm in model reduction”2761D, 22nd August 1982.


133-136

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

32.

Authors:

A.W. Ogun Sola, B.A. Peter

Paper Title:

Non-Newtonian Fluid Flow with Arrhenius Reaction between Heated Parallel Plates through a Porous Medium

Abstract: The flow of a fluid of grade three between heated parallel plates is examined. It is assumed that the fluid is temperature-dependent and reacts satisfying  Arrhenius law. We employed Galerkin weighted residual method to solve the resulting non-linear equations. The results show the effects of  Brinkman number, which is the parameter that controls the viscous dissipation,  which is the non-Newtonian parameter. The result shows that the velocity of the flow decreases as Brinkman number,  and increases. The temperature of the flow decreases with increase in  parameter. We also deduce from the result that  parameter has considerable effects on the temperature profile of the system

Keywords:
 Non-Newtonian fluid, Weighted residual method, Third grade fluid and Arrhenius reaction.


References:

1.       T. Hayat, M.A. Faroog, T.Javed and M. Sajid, Partial slip effects on the flow and heat transfer characteristics in third grade, Non-linear Analysis, Real World Applications         10725-     755,2009.
2.       R.L. Fosdick and K.R. Rajagopal, Thermodynamics and stability of fluids of third grade , Proc. R. Soc. Lond. A 369 351-377,1980.

3.       M. Massoudi and I. Christe, Heat transfer and flow of third grade fluid in a pipe, Math. Modeling Sci. Comput. 2 1273-1275,1993.

4.       B.I. Olajuwon, Flow and natural convection heat transfer in a power-law fluid past a vertical plate with heat generation, Int. J. Non-Linear Science, 7 (1) 50-56, 2009.

5.       M.Yurusoy, H.Bayrakoekem, M. Kapucu and F. Aksoy, Entropy analysis for third grade fluid flow with Vogel’s models of viscosity in annular pipe, Int. J. Non-Linear Mech.43 588-599, 2008

6.       S. Nadeem and M. Ali, Analytical solutions for pipe flow of a fourth grade fluid with Reynolds and Vogel’s models of viscosities, Communications in Non-Linear Sci.
and Numerical Simulation, 14 (5) 2073-2090,2009. 

7.       O.D. Makinde, Hermite-Pade approach  to thermal radiation effect on inherent irreversibility in a variable viscosity channel flow, Computers and Mathematics with Applications 58 2330-2338,2009.

8.       M. Massoudi and I. Christe, Effects of variable viscosity and viscous dissipation on the flow of third grade fluid in a pipe, Int. J. Non-Linear Mech.30(5) 687-699,1995.

9.       S. Nadeem, T. Hayat ,N.S. Akbar and M.Y. Malik, on the influence of heat transfer in    peristalsis with variable viscosity, Int. J. Heat and Mass Transfer 52 4722-4730,2009.

10.    S. Nadeem, N.S. Akbar a, N. Bibi and S. Ashiq, Influence of heat and mass transfer on peristaltic flow of  third order fluid in a diverging tube, Commun. Non-Linear  Sci. Numeric. Simulat.  11 856-868 ,2010.

11.    C. Truesdell and W. Noll, The non-linear field theories of mechanics. In Handbuch der Physik (Edited by Flugge), Vol.111/3, Springer, Berlin, 1965.

12.    Rivlin, R.S. and Erickson, J.I., Stress deformation relation for isotropic materials. J rat. Mech. Analysis, Vol.4,pp 323-425, 1995.

13.    A.Z. Szeri and K.R. Rajagopal, Flow of a Non-Newtonian fluid between heated parallel plates. Int. J. Non-Linear  Mechanics, Vol.20.No. 2. 91-101, 1985.

14.    O.J. Jayeoba and S.S. Okoya, Approximate analytical solutions for pipe flow of a third grade         fluid with models of viscosities and heat generation/absorption, J. of Nigerian Mathematical Society 31 207-228, 2012.

15.    Lazarus Rundora, Laminar flow in a channel filled with saturated porous media. A Ph.D. Thesis submitted to the Dept. of Mechanical Engineering, Cape Peninsula University of Technology,2013 .

16.    T. Haroon, A.R. Ansari, A.M. Sidiqui and S.U. Jan, Analysis of poiseuille flow  of a reactive power-law fluid between parallel plates, J. of Applied Mathematical Sciences,Vol.5, no.55,2721-2746, 2011.


137-142

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

33.

Authors:

A.W.Ogunsola, B. A.  Peter

Paper Title:

Reacting Laminar Flow with Variable Thermal Conductivity and Suction/Injection in a Channel Filled with Saturated Porous Media

Abstract:   In this work, we examined reacting  laminar  flow of a third grade fluid  with variable thermal conductivity and suction/ injection in a channel filled with saturated porous media. It is assumed that the fluid reacts satisfying Arrhenius law. We employed Galerkin weighted residual method to solve the resulting non-linear equation. The results show the effects of variable thermal conductivity parameter,  suction/ injection parameter, Brinkman number, Reynolds number, Prandtl number, Darcy number and  parameter on the flow system.

Keywords:
Non-Newtonian fluid, Weighted residual method, Laminar flow, Suction/Injection and Arrhenius reaction.


References:

1.       T. Hayat, M.A. Faroog, T.Javed and M. Sajid, Partial slip effects on the flow and heat transfer characteristics in third grade, Non-linear Analysis, Real World Applications         10725-     755,2009.
2.       R.L. Fosdick and K.R. Rajagopal, Thermodynamics and stability of fluids of third grade , Proc. R. Soc. Lond. A 369 351-377,1980.

3.       M. Massoudi and I. Christe, Heat transfer and flow of third grade fluid in a pipe, Math. Modeling Sci. Comput. 2 1273-1275,1993.

4.       B.I. Olajuwon, Flow and natural convection heat transfer in a power-law fluid past a vertical   plate with heat generation,  , Int. J. Non-Linear Science, 7 (1) 50-56, 2009.

5.       M.Yurusoy, H.Bayrakoekem, M. Kapucu and F. Aksoy, Entropy analysis for third grade  fluid flow with Vogel’s models of viscosity in annular pipe, Int. J. Non-Linear Mech.43                588599, 2008

6.       S. Nadeem and M. Ali, Analytical solutions for pipe flow of a fourth grade fluid with Reynolds and Vogel’s models of viscosities, Communications in Non-Linear Sci. and Numerical Simulation, 14 (5) 2073-2090,2009. 

7.       M. Massoudi and I. Christe, Effects of variable viscosity and viscous dissipation on the flow        of third grade fluid in a pipe, Int. J. Non-Linear Mech.30(5) 687-699,1995.

8.       S. Nadeem, T. Hayat ,N.S. Akbar and M.Y. Malik, on the influence of heat transfer in peristalsis with variable viscosity, Int. J. Heat and Mass Transfer 52 4722-4730,2009.

9.       S. Nadeem, N.S. Akbar a, N. Bibi and S. Ashiq, Influence of heat and mass transfer on peristaltic flow of third order fluid in a diverging tube, Commun. Non-Linear  Sci. Numeric. Simulat.  11 856-868 ,2010.

10.    C. Truesdell and W. Noll, The non-linear field theories of mechanics. In Handbuch der Physik (Edited by Flugge), Vol.111/3, Springer, Berlin, 1965.

11.    O.J. Jayeoba and S.S. Okoya, Approximate analytical solutions for pipe flow of a third grade         fluid with models of viscosities and heat generation/absorption, J.
of Nigerian           Mathematical Society 31 207-228, 2012.

12.    Rivlin, R.S. and Erickson, J.I., Stress deformation relation for isotropic materials. J rat. Mech. Analysis, Vol.4,pp 323-425, 1995.

13.    A.Z. Szeri and K.R. Rajagopal, Flow of a Non-Newtonian fluid between heated parallel plates. Int. J. Non-Linear Mechanics, Vol.20.No. 2. 91-101, 1985.

14.    O.J. Jayeoba and S.S. Okoya, Approximate analytical solutions for pipe flow of a third grade fluid with models of viscosities and heat generation/absorption, J. ofNigerian Mathematical Society 31 207-228, 2012.

15.    Lazarus Rundora, Laminar flow in a channel filled with saturated porous media. A Ph.D.   Thesis submitted to the Dept. of Mechanical Engineering,Cape Peninsula University of Technology,2013 .

16.    T. Haroon, A.R. Ansari, A.M. Sidiqui and S.U. Jan, Analysis of poiseuille flow  of a reactive power- law fluid between parallel plates, J. of Appl. Mathcal. Scis.,Vol.5, no.55,2721-2746, 2011.


143-146

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html