International Journal of Innovative Technology and Exploring Engineering(TM)
Exploring Innovation| ISSN:2278-3075(Online)| Reg. No.:65021/BPL/CE/12| Published by BEIESP| Impact Factor:4.66| UGC Approved Journal
Home
Articles
Conferences
Editor
Scopes
Author Guidelines
Publication Fee
Privacy Policy
Associated Journals
Frequently Asked Questions
Contact Us
Volume-3 Issue-5: Published on October 10, 2013
43
Volume-3 Issue-5: Published on October 10, 2013
 Download Abstract Book

S. No

Volume-3 Issue-5, October 2013, ISSN:  2278-3075 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

Okhaifoh, Joseph Ebosetale, Umayah, Erhiega N., Oko-oboh, Akhere Angus, Onyishi, Donatus Uchechukwu

Paper Title:

Modelling and Simulation of Voice over Internet Protocol (VoIP)

Abstract:   Real time voice transmission is now widely used over the Internet and has become a very significant application. Voice quality is still however an open problem due to the loss of voice packets and the variation of end-to-end delay packet transmission. These two factors are a natural result of the simple ‘best-effort service’ provided by the current network. Indeed, the nowadays Internet provides with it a simple packet delivery service without any guarantee on bandwidth, delay or drop probability. The focus in this paper is the simulation of two types of models; a M/M/1 queue and the M/G/1 queue, both using an input of ë, size of buffer, number of buffers, and the codec type. The output that was examined is the Quality of service parameters such as the End to End Delay, Packet Loss and Jitter. It was found that in order to control system behavior it’s important to make sure that good tuning is used, as based on this paper’s results; it can reduce the network congestion.  

Keywords:
    Quality of Service, end-to-end delay packet transmission, bandwidth, drop probability


References:

1.        J.M Pitts and J.A. SCHORMANS, “Introduction to IP and ATM Design and Performance”, 2nd ed., John Wiley &Sons, Ltd 2000
2.        IETF Website: ‘http://www.ietf.org/html.charters/sipcharter.html.

3.        A. Leo-Garcia, “Probability and Random Processes for Electrical Engineering”, 2nd Ed., Addison Wesley, 1993.

4.        D. Gross and C.M. Harris, “Fundamentals of Queueing Theory”, 3rd ed., John Wiley and Sons, 1998.

5.        J.A White, J.W. Schmidt and G.K. Bennet, “Analysis of Queueing Systems”, Academic Press, 1975.

6.        M.J. Karam and F.A. Tobagi, “Analysis of the Delay and Jitter of Voice Traffic Over the Internet”.

7.        D. McDyasan, “QoS & Traffic Management in IP and ATM Networks”, McGraw-Hill, 2000.

8.        The International Engineering Consortium Website: www.iec.org.

9.        C.E. Comer, “Internetworking with TCP/IP”, 4th ed., Prentice-Hall, 2000.

10.     D.E. Comer, “Computer Networks and Internets with Internet Application”, 3rd ed., Prentice-Hall Inc., 2001.

11.     G. Held, “Voice and Data Internetworking”, 3rd ed., McGraw-Hill, 2001.

12.     A.P. Markopoulou, F.A. Tobagi, M.J. Karam, “Assessment of VoIP Quality over Internet Backbones”

13.     W. Stallings, “High-Speed Networks and Internets: Performance and Quality of Service”, 2nd ed., Prentice-Hall, 2002.

14.     T.A., “Objective Speech Quality Measurements for Internet Telephony, National Institute of Standards and Technology.

15.     E. Altman, C. Barakat, V.M. Ramos, “Queueing Analysis of Simple FEC Schemes for IP Telephony”.

16.     S. Jha and M. Hassan, “Engineering Internet QoS”, Artech House, 2002.


1-6

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.

Authors:

S.Sundari, Alamelu Nachiappan

Paper Title:

Performance Evaluation of Stable and Unstable Biochemical Reactor Process

Abstract:   Bioreactor control has become an active area of research in recent years.This paper deals with the operation, mathematical modeling and  IMC based design of a biochemical reactor. The dynamic behaviour was studied by changing the main operating parameters – dilution rate and its disturbance rejection for a step input  change using autotuning of the controller is determined. We have found that the regimes strongly depend on the operating conditions. The bioreactor model was implemented in Matlab Simulink and the results of simulation for  a stable and unstable processes are presented comparatively. Transient response characteristics  for the processes are evaluated and  discussed.

Keywords:
    Biochemical reactor, autotuning of PID  controller, stable operating point, mathematical  modelling, Transient response


References:

1.           Agrawal. Lim H.C., 1984, Analyses of various control schemes for continuous bioreactors, Adv.Biochem. Eng./Biotechnol. 30, 61-90
2.           Olivieri G., Russo M.E., Di Donato A., Marzocchella A., Salatino P., 2010, Unstable steady stateoperations of substrate inhibited cultures by dissolved oxygen control, J. Biotechnol. 156, 302-308

3.           “Olivieri G., Russo M.E., Marzocchella A., Salatino P., 2011, Modelling of an aerobic biofilm reactor with double-limiting substrate kinetics: bifurcational and dynamical analysis, Biotechnol. Prog. 27, 1599-1613M. Young, The Techincal Writers Handbook.  Mill Valley, CA: University Science, 1989.

4.           T. Varshney, R. Varshney and S. Sheel,  2009, ANN Based IMC Scheme for CSTR, International conference on Advances in omputing,Communication and Control, 23-24

5.           Efe.M,2007,MIMO variable structure controller     design    for   a bioreactor      benchmark       process ISA   Transactions 46:459- 46

6.           P. Muthamilselvi and T. Karunanithi, Direct digital control of bioreactor systems,Int. J. Chem. Sci.: 8(5), 2010, S22-S30                  

      

7-10

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

FatemehPanahi, Mohammad Hassan Assareh, Mohammad Jafary, Mohsen MohseniSaravi, AlirezaGivar, HosseinArzani, Ali Tavili

Paper Title:

Salsolaarbuscula Responses to Salt Stress

Abstract:   Salt stress is a world-wide problem and soil salinity is common in arid and semi-arid regions. This study was undertaken to investigate salt tolerance in Salsolaarbuscula in laboratory and natural conditions and recognize the mechanisms that allow it to tolerate these conditions. This study had two parts of greenhouse and natural habitats. The treatment solutions for salinity tests were different concentrations of NaCl and Na2SO4 (0, 100, 200, 300, 400, and 500 mM) with three replicates and growth parameters and proline and soluble sugar were determined in vegetative growth stage in greenhouse. Soil (two depths of 0-10 cm and 10-45 cm) and plant (root and shoot) samples have been harvested from three 200 meter transects in three provinces of Esfahan, Semnan and Markazi.Proline and soluble sugar andsoil texture and EC were measured in laboratory. Collected data were analyzed using a factorial experiment and means were compared by DMRT method by SPSS software. Results indicated that proline and soluble sugar were significantly affected by salinity levels and increased with salinity increase. The rate of growth parameters increased with an increase in salinity up to 400 mM while salinity levels more than 400 mMNaCl caused all growth characteristics decline. Data obtained from the laboratory experiment confirmed the findings noted during the field study. Results also indicated high salt excretion capability in S. arbusculawhich is possible by leaves fall. It has to be mentioned that nature isunpredictable and observing unexpected trends under specific conditions is not impossible.

Keywords:
    NaCl, Na2SO4, Salsola arbuscula, salt tolerance.


References:

1.        Poljakoff-Mayber, “Morphological and anatomical changes as a response to salinity stress”, in: A. Poljakoff-Mayber, J. Gale (Eds.). Plant in saline environment, springer, New York, 1975, pp. 97-117.
2.        A.J. Joshi, E.R. Lyengar, “Effect of sea water salinity on free amino acids and mineral ions in Suaedanodiflora”,Proc. Indian Acad. Sci. Plant Sci. 97, 1987, pp.309-314.

3.        A.S. Saied, A.J. Keutgen, G. Noga, “The influence of NaCl salinity on growth, yield and fruit quality of strawberry cvs ‘Elsanta’ and ‘Korona’”, Sci. Hort. 103, 2005, pp.89–303.

4.        B.K. Garg, I.C. Gupta, “Saline Wastelands Environment and Plant Growth”, Scientific Publishers, Jodhpur, India, 1997.

5.        E. Zandi Esfahan,“Investigation of salt tolerance in Atriplexleococlada and Suaedavermiculata in laboratory and natural conditions”, Islamic Azad University, Iran. Ph.D. thesis, 2010, in: Persian.

6.        E.C. Da Silva, R.J.M.C. Nogueira, F.P. de Ara´ujo, N.F. de Melo, A.D. de AzevedoNeto, “Physiological responses to salt stress in young umbu plants”, Environmental and Experimental Botany, 2007.

7.        E.P. Glenn, “Relationship between cation accumulation and water content of salt tolerant grasses and sedge, Plant, Cell & Environment”, 10,1987, pp.205-212.

8.        F. Panahi, M.H. Assareh, M. Jafari, A.A. Jafari, H. Arzani, A. Tavili, E. Zandi, “Phenological Effects on Forage Quality of Salsolaarbuscula,Salsolaorientalisand Salsolatomentosain Three Habitats in the Central Part of Iran”, Middle-East Journal of Scientific Research 11, 2012, pp.915-923.

9.        G. Naidoo, R. Rughunanan, “Salt tolerance in succulent coastal halophyte Sarcocorinanathalensis”, J Exp. Bot. 41, 1990, pp.497-502.

10.     H. Greenway, R. Munns, “Mechanisms of salt tolerance in non-halophytes”,Annu. Rev. Plant Physiol. 31, 1980, pp. 149–190.

11.     H. Marschner, “Mineral Nutrition of Higher Plants”, Academic Press, London, 1995.
Hedge, H. Akhani, H. Freitag, G. Kothe-Heinrich, S. Rilke, A.P. Uotilla, “Chenopodiaceae”, in: K.N. Rechinger (Ed), Flora Iranica 172. AcademischeDruck und Verlagsanstalt, Graz, Austria,1997, pp. 371.

12.     J. Bakht, A. Basir, M. Shafi, M.J. Khan, “Effect of various levels of salinity on sorghum at early seedling stage in solution culture”, Sarhad J. Agric. 22, 2006, 17-21.

13.     J. Shalhevet, M.G. Huck, B.P. Schroeder, “Root and shoot growth responses to salinity in maize and soybean”, Agron. J. 87, 1995, pp. 512– 516.

14.     J. Song, G. Feng, F. Zhang, “Salinity and temperature effects on germination for three salt-resistant euhalophytes, Halostachyscaspica, Kalidiumfoliatum and Halocnemumstrobilaceum”, Plant Soil 279, 2006, pp. 201–207.

15.     J.J. Irigoyen, D.W. Emerich, M. Sanchez-Diaz, “Water stress induced changes in concentrations of praline and total soluble sugars in nodulated alfalfa (Medicago Sativa) plants”. Physiol. Plant 84, 1992, pp. 55-60.

16.     Khan A.M.& Qaiser, M., “Halophytes of Pakistan: Characteristics, distribution and potential economic usages, Sabkha Ecosystems”, Volume II: West and Central Asia, 2006, pp. 129-153.

17.     L. Jiping, J.K. Zhu., “Proline Accumulation and Salt-Stress-lnduced Gene Expression in a Salt-Hypersensitive Mutant of Arabidopsis”, Plant Physiol. 114, 1997, pp. 591-596.

18.     L. S. Bates, R. P. Waldren, I. D. Teare, “Rapid determination of free proline for water stress studies”, Plant Soil 39, 1973, pp. 205-207.

19.     L.M. Petrusa, I. Winikov, “Proline status in salt tolerant and salt sensitive alfalfa cell lines and plant in response to NaCl”, Plant Physiol. Biochem. 35, 1997, pp. 303-310.

20.     M. Bajji, J.M. Kinet, S. Lutts, “Salt stress effects on roots and leaves of AtriplexhalimusL. and their corresponding callus cultures”, Plant Sci.137, 1998, pp. 131-142.

21.     M. Jamil, D.B. Lee, K.Y. Jung, M. Ashraf, S.C. Lee, E.S. Rha, “Effect of salt (NaCl) stress on germination and early seedling growth of four vegetables species”, J. Cent. Eur. Agric. 7, 2006, pp. 273-282.

22.     M. Jamil, E.S. Rha, “The effect of salinity (NaCl) on the germination and seedling of sugar beet (Beta vulgaris L.) and cabbage (Brassica oleracea L.)”, Korean Journal of Plant Resources 7, 2004, pp. 226-232.

23.     M. Javed Khan, “Physioligical and Biochemical Mechanisms of Salinity Tolerance in Different Wheat Genotypes”. NWFP Agricultural University Peshawar. Ph.D. thesis, 2007.

24.     M. MousaeiSanjerehei, “Soil-Vegetation Relationships in Arid Rangelands (Case Study: Nodushan Rangelands of Yazd, Iran)”, World Academy of Science, Engineering and Technology 67, 2012.

25.     M.A. Khan, I.A. Ungar, A.M. Showalter, “Effects of salinity on growth, water relations and ion accumulation of the subtropical perennial halophyte, Atriplexgriffithiivar. stocksii”, Ann. Bot. 85, 2000a, 225–232.

26.     M.A. Khan, I.A. Ungar, A.M. Showalter, “Effects of salinity on growth, water status and ion content of a leaf succulent perennial halophyte, Suaedafruticosa(L.) Forssk”, J. Arid Environ. 45, 2000b, 73–84.

27.     M.C. Shannon, C.M. Grieve, S.M. Lesch, J.H. Draper, “Analysis of salt tolerance in nine leafy vegetables irrigated with saline drainage water”, J. Am. Soc. Hortic. Sci.
125, 2000, 658-664.

28.     M.E. Balibrea, J. Dell’ Amico, M.C. Bolarin, F. Perez-Alfocea, “Carbon partitioning and sucrose metabolism in tomato plants growing under salinity”, Physiol. Plant 110, 2000, pp. 503-511.

29.     N. Bernstain, M. Ioffe, M. Zilberstaine, “Salt-stress effects on avocado rootstock growth I. Establishing critera for determination of shoot growth sensitivity on the stress”, Plant Soil 233, 2001, pp. 1–11.

30.     R. Munns, “Comparative physiology of salt and water stress”, Plant Cell Environ. 25, 2002, pp. 239–250.

31.     R. Munns, M. Tester, “Mechanisms of salinity tolerance”, Annu. Rev. Plant Biol. 59, 2008, pp. 651–681.

32.     R. Munns, “Physiological Processes Limiting Plant-Growth in Saline Soil--- some dogmas and hypotheses”, Plant, Cell and Envir. 16, 1993, pp. 15-24.
33.     S. Jennette, R. Craig, J.P. Lynch, “Salinity tolerance of Phaseolus sp. during germination and early seedling growth”, Crop Sci. 42, 2002, pp.1584-1594.
34.     S. Madan, H.S. Nainawatee, R.K. Jain, J.B. Chowdhury, “Proline and praline metabolizing enzymes in in vitro selected NaCl tolerant (Brassica Juncea L.) under salt stress”, Ann. Bot. 76, 1995, pp. 51-57.

35.     S.K. Mishra, D. Subrahmanyam, G.S. Singhal, “Interrelationship between salt and light stress on primary processes of photosynthesis”, J. Plant Physiol. 138, 1991, pp. 92-96.

36.     T.J. Flowers, M.A. Hajibagheri, N.S.W. Clipson, “Halophytes”. Q. Rev. Biol. 61, 1986, pp. 313–337.

37.     Y. Waisel, “Biology of Halophytes”, Acad. Press. N. Y. London, 1972, pp. 395.

38.     Zh.V. Kuz mina, S.Y. Treshkin, “Assesment of Effects of Disharged waters upon ecosystems”,in: I.S. Zektser (Ed). Ecology and Ecosystems, Springer science. New York 2006, pp.149-160.


11-18

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

4.

Authors:

Mugdha Parande, Bhushan Hajare

Paper Title:

Build a Web Application with Precautions to Prevent SQL Injection Attack

Abstract:   This paper explain SQL Injection, one of the most commonly exploited vulnerabilities found in web applications and second, In this outline possible steps which we can take to ensure that our website is protected from SQL Injection attacks.

Keywords:
    SQLIA, SQL injection attack,Tutology,Blind SQL,Precaution.


References:

1.        By1Prasant  Singh  Yadav,  2  Dr    pankajYadav,  3Dr. K.P.Yadav “A Modern Mechanism  to Avoid  SQL  Injection  Attacks in Web Applications”,IJRREST:      International    Journal    of      Research Review in Engineering Science and Technology ,Volume-1 Issue-1, June 2012.
2.        By MayankNamdev *, FehreenHasan, Gaurav Shrivastav “Review of SQL Injection Attack and Proposed Method for Detection and Prevention of SQLIA”Volume 2, Issue 7, July 2012.

19-22

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

5.

Authors:

Srudeep Somnaath T K

Paper Title:

Autonomous Remote Control Car with Lane Detection and Collision Avoidance System

Abstract:   According to the United States Census Bureau, there were 10.8 million motor vehicle accidents in the United States alone in the year 2009. Auto collisions are the leading cause of injury-related deaths, around 1.24 million each year, 25% of the total from all causes. It was reported that 35,900 fatalities occurred due to car related accidents. While some of these accidents are not fatal or critical, people who are involved are left with hefty financial expenses and a definite increase in their insurance policy. As per World Health Organization survey in 2000, the financial cost of these crashes was approximately 518 billion dollars. What if all of these auto accidents could be prevented or at least reduced to stop car related deaths and expenses? These statistics triggered a big concern and hence this system was conceived. This system detects the lane and avoids accidents in a significant manner, still very affordable by using cost effective modules. The paper proposes an intelligent collision avoidance system, and also a key algorithm for recognizing navigation and movement controlling. This in turn removes the factor of human error, when it comes to stopping a car in emergency situations. The proposed system will be a combination of software and hardware, both working in a cohesive manner.

Keywords:
   Autonomous car, remote control car, lane detection, collision avoidance system, ultrasonic sensor, infrared sensor, ARM 7 TDMI S LPC2129.


References:

1.        M. Ragul, V. Venkatesh, “Autonomous vehicle transportation using wireless technology”, International Journal of Engineering and Technology (IJET), Vol. 5 No. 2, Apr-May 2013
2.        Ms. Mohini Pande, Mr. Dishant Vyas, Ms. Roopakiran Yeluri and Prof. (Mrs). Suvarna K.Gaikwad, “Microcontroller based neural network controlled low cost autonomous vehicle”, International Journal of Emerging Trends in Electrical and Electronics (IJETEE) Vol. 2, Issue 4, April-2013

3.        Shival Dubey and Abdul Wahid Ansari, “Design and development of vehicle anti-collision system using electromagnet and ultrasonic sensors”, International Journal on Theoretical and Applied Research in Mechanical Engineering ISSN: 2319 – 3182, Volume-2, Issue-1, 2013

4.        S. Saravanan, T. Kavitha, “Vehicle navigation and obstacle detection system using RFID and GSM”, Journal of Theoretical and Applied Information Technology, Vol. 38 No.2, 30th April 2012

5.        Sameer Darekar, Atul Chikane, Rutujit Diwate, Amol Deshmukh, Prof. Archana Shinde, “Tracking system using GPS and GSM: practical approach”, International Journal of Scientific & Engineering Research Volume 3, Issue 5, May-2012

6.        Abid khan, Ravi Mishra, “GPS – GSM based tracking system”, International Journal of Engineering Trends and Technology- Volume3 Issue2- 2012

7.        S.Ramesh, Ravi Ranjan, Ranjeet Mukherjee, Swarnali Chaudhuri, “Vehicle collision avoidance system using wireless sensor networks”, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-5, November 2012

8.        Rajarajan.R, Abdul Rahuman.S, Harish Bharath.M.A, “A design and implementation of Collision Avoidance System (CAS) for automobiles using embedded system”, 2011 International Conference on Circuits, System and Simulation IPCSIT vol.7 (2011)

9.        Liu Huan, Wang Dahu, Zhang Tong, Huang Kerning,” Research on a remote control vehicle”, 2010 2nd international Conference on Education Technology and Computer (ICETC)

10.     P. Saravanan, M. Anbuselvi, “Design of an enhanced ACC for collision detection and prevention using RTOS”, 2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies


23-28

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

6.

Authors:

Anyaka Boniface Onyemaechi, Imaeka Charles I

Paper Title:

Small Hydropower Projects for Rural Electrification in Nigeria: A Developer’s Perspective

Abstract:   Power generation in developing nations is a vital index for the socio-economic development of these countries. Renewable and sustainable options for electric power generation have become attractive to many nations. This paper addresses power generation for rural applications by means of small hydropower plants. A flowchart is developed for use by Power utilities and Independent Power Producers that are interested in small hydropower generation. Recommendations and possible cost reductions for small hydropower projects for interested developers are also highlighted.

Keywords:
    small hydro, renewable energy, rural electrification, project financing, flowchart


References:

1.        Energy Commission of Nigeria, “Renewable Energy Master Plan”, Nigeria, November 2005.
2.        GEF TRUSTFUND, Pif-Gef 5 Nigeria- Scaling Up SHP, Nigeria, 2013, January 2013

3.        A.S. Sambo, “Renewable Energy Development in Nigeria”, a Paper presented at the World Future Council Strategy Workshop on Renewable Energy, Accra, Ghana, 21-24 June 2010

4.        Department of Energy, Japan, “Manuals and Guidelines For Micro-hydropower Development in Rural Electrification”, MHP-1 Manual for Design, Implementation and Management for Micro-hydropower, Volume I, June 2009

5.        G. Baidya, Chief Engineer (CDM –R&D), Nhpcfaridabad, “Development of Small Hydro”, Himalayan Small Hydropower Summit, Dehradun, October 12-13, 2006.

6.        Http://Www.Smallhydropower.Com/Manual3.Htm,

7.        D. Bashir, “Hydrological Studies For Small Hydropower Planning”, Paper Presented At Training Of Trainers Workshop On “Small Hydropower Development Initiative And Capacity Building”, Organized By UNIDO, ECN and AIRBDA at Anambra-Imo River Basin Development Authority, Owerri on 26-30 May 2003.

8.        H. Zarma, “Hydro Power Resources in Nigeria”, Country Position Paper Presented at 2nd Hydro Power Conference International Centre On Small Hydro Power (IC-SHP), Hangzhou, China.

9.        European Small Hydro Association, “Brochure for Small Hydropower for Developing Countries”, 2005

10.     O. Paish, “Micro-Hydro Power: Status and Prospects”, Part A: J. Power And Energy, Vol 2, 2005

11.     J.B.Gupta, S.K. Kataria & Sons, “A Course in Power Systems, India, 2008

12.     British Hydropower Association, “A Guide to Uk Mini-Hydro Developments”, 2005.

13.     E. Maria and T. Tsouisas “The Sustainable Development of RES Installations Legal Aspects of Environmental Impact In Small Greek Island Systems”.Energy Conversion and Management. Vol.45, No.5, 2004

14.     European Small Hydro Association, “Environmental Barometer on Small Hydro Power”, 2009, Belgium.

15.     Www.Waterpowermagazine.Com/Features/Featurean-Encroachment-On-Hydro May 2000

16.     The National Hydropower Association and the Hydropower Research Foundation. “Environmental Mitigation Technology for Hydropower”, Summary Report on A Summit Meeting Convened By Oak Ridge National Laboratory, Washington DC, 2009.

17.     B.N.H Akbo, Rupasingne and S.Ndesilva, “Environmental Impacts Of Mini Hydropower Projects in Sri Lanka”, International Conference On Small Hydropower-Hydro Sri Lanka, 22-23 October 2007

18.     http://theenergycollective.com/Amelia-media/54211/new-ideas-small-hydropower-plants

19.     S. Gregot and S.Bojan, “Selection of Inductiion Generator for a small hydro plant “Susica” ,XIV International Ph. d Workshop, OWD 2012, 20-23 October 2012.


29-35

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

7.

Authors:

S. S. Bargujer, N. M. Suri, R. M. Belokar

Paper Title:

Thermo Mechanical Processing Of Hypereutectoid Steel Wire Rod in Lead Patenting

Abstract:   Lead patenting process is the most efficient way to transform hot rolled steel wire rod of different chemical composition into fine pearlitic steel. However, the optimization of various parameters of lead patenting process is critical to achieve high efficiency of transformation process in mass production of hypereutectoid steel wires. The experiment was conducted to find out the optimum range of austenitic temperature, lead bath temperature and phase transformation time. The effect of carbon percentage, size of steel wire rod and drawn strain prior-to-patenting on mechanical properties are also observed through various experiments and evaluated.

Keywords:
    Tensile strength; Torsion strength; Hypereutectoid steel; Lead patenting process.


References:

1.        H. Ohba, T.  Tarui, M. Sugimoto, N. Hikita, S. Nishida, K. Yoshimura, K. Matsuoka, M. Toda,“ High-performance wire rods produced with DLP,” Nippon Steel Technical Report no.96, July 2007.
2.        H. Tashiro, T. Tarui, “State of art for high tensile strength steel cord” Nippon Steel Technical Report no.88, July 2003.

3.        H. Tashiro, T. Tarui, S. Sasaki, A. Yoshie, S. Nishida, S. Ohashi, K. Nakamura, H. Demachi, “Ultra high tensile strength steel cord,” Nippion Steel Technical Report no. 80, July 1999.

4.        T. Takahashi, H. Tashiro, S. Nishida, I Ochiai, S. Ohashi, T. Tarui, “Strengthening of steel wire for tire cord,” Nippion Steel Technical Report no. 64, January 1995.

5.        W. J. Nam, C. M. Bae, C. S. Lee, “Effect of carbon content on the Hall-Petch parameter in cold drawn pearlitic steel wires,” Journal Of Material Science,Vol. 37, 2002, pp. 2243-2249.

6.        H. C. Choi and K. T. Park, “the effect of carbon content on Hall-Petch parameter in the cold drawn hypereutectoid steels,” Scripta Materialia,Vol. 34,  1996, pp. 857-862.

7.        T. Tarui, J. Takahashi, H. Tashiro, N. Mauryama, S. Nishida, “ Microstructure control and strengthening of high cabon steel wires,” Nippon Steel Technical Report o.91, January 2005.

8.        M. Munirajulu, B.K. Dhindaw, A. Biswas, “Phase transformation modeling to characterize carbon diffusivity in steel in the presence of Cr.,” Scripta Materialia,Vol. 37, 1997, pp. 1693-1699.

9.        D.B. Park, J.W. Lee, Y.S. Lee, K.T.Park, W. J. Nam, “The effects of alloying on tensile strength and occurrence of delamination in cold drawn hyper-eutectoid steel wires,” Met. Mater. Int.,Vol. 15,  2009, pp.197-202.

10.     H.R. Song, E.G. Kang, C.M. Bae, C. Y. Lee, D. L. Lee, W.J. Nam, “The effect of a Cr addition and transformation temperature on the mechanical properties of cold drawn hyper-eutectoid steel wires,” Metals and Materials International, Vol. 12, 2006, pp. 239-243.

11.     K. Han, D. V. Edmonds, G. D. W.  Smith, “Optimization of mechanical properties of high-carbon pearlitic steels with Si and V additions,” Metallurgical and Materials Transactions A, Vol. 32A, 2001, pp. 1313.

12.     XU Jin-qiao, L. Ya-zheng, Z. Shu-mei, “Calculation models of interlamellar spacing of pearlite in high –speed 82B rod,” Journal of Iron and Steel Research, International,Vol. 15, 2008, pp. 57-60.

13.     F.G. Caballero, C. Capdevila, C.G. de Andres, “ Modelling of interlamellar spacing of isothermally formed pearlite in a eutectoid steel,” Scripta Mater., Vol. 42,  2000, pp. 537-542.

14.     A. M. Elwarzri, P. Wanjara, S. Yue, “The effect of microstructural characteristics of pearlite on mechanical properties of hypereutectoid steel” Material Science and Engineering A, Vol. 404, 2005, pp.:   91-98.


36-39

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

8.

Authors:

V. Joseph Peter, M.Karnan

Paper Title:

Medical Image Analysis Using Unsupervised and Supervised Classification Techniques 

Abstract:   The evolution of digital computers as well as the development of modern theories for learning and information processing leads to the emergence of Computational Intelligence (CI) engineering. Liver surgery remains a difficult challenge in which preoperative data analysis and strategy definition may play a significant role in the success of the procedure. Extraction of liver fibrosis is done using image enhancement techniques using various filtering techniques, unsupervised clustering techniques such as modified k means and fuzzy c means and supervised techniques such as ANN, BPN and feed forward NN. It constructs a statistical model of liver fibrosis from these MRI scans using ANN, SVM, GA with k means, GA with Fuzzy and Feed forward back propagation neural network classifier. Our experimental study analyzed 250 MRI images. These results are better than the existing image-based methods which can only discriminate between healthy and high grade fibrosis subjects. With appropriate extensions, our method may be used for non-invasive classification and progression monitoring of liver fibrosis in human patients instead of more invasive approaches, such as biopsy or contrast-enhanced imaging. The proposed system is tested on more than 300 digitized MRI Image database to establish its competence.

Keywords:
  Computational Intelligence, enhancement techniques, clustering techniques, fuzzy c means, back propagation neural network.


References:

1.        Bell BP, Manos MM, Zaman A, Terrault N, Thomas A, Navarro VJ, et al. The epidemiology of newly diagnosed chronic liver disease in gastroenterology practices in the United States: results from populationbased surveillance. Am J Gastroenterol 2008;103:2727-2736.
2.        Friedman SL. Mechanisms of hepatic fibrogenesis. Gastroenterology 2008;134:1655-1669.

3.        Talwalkar JA, Yin M, Fidler JL, Sanderson SO, Kamath PS, Ehman RL. Magnetic resonance imaging of hepatic fibrosis: emerging clinical applications. HEPATOLOGY 2008;47:332-342.

4.        Standish RA, Cholongitas E, Dhillon A, Burroughs AK, Dhillon AP. An appraisal of the histopathological assessment of liver fibrosis. Gut 2006;55:569-578.

5.        Castera L, Pinzani M. Biopsy and non-invasive methods for the diagnosis of liver fibrosis: does it take two to tango? Gut 2010;59:861-866.

6.        Garrido MC, Hubscher SG. Accuracy of staging in primary biliary cirrhosis. J Clin Pathol 1996;49:556-559.

7.        Regev A, Berho M, Jeffers LJ, Milikowski C, Molina EG, Pyrsopoulos NT, et al. Sampling error and intraobserver variation in liver biopsy in patients with chronic HCV infection. Am J Gastroenterol 2002;97: 2614-2618.

8.        Bedossa P, Darge`re D, Paradis V. Sampling variability of liver fibrosis in chronic hepatitis C. HEPATOLOGY 2003;38:1449-1457.

9.        Rockey DC, Bissell DM. Noninvasive measures of liver fibrosis. HEPATOLOGY 2006;43:S113-S120.

10.     Poynard T, Morra R, Halfon P, Castera L, Ratziu V, Imbert-Bismut F, et al. Meta-analyses of FibroTest diagnostic value in chronic liver disease. BMC Gastroenterol 2007;7:40.

11.     Castera L, Forns X, Alberti A. Non-invasive evaluation of liver fibrosis using transient elastography. J Hepatol 2008;48:835-847.

12.     Talwalkar JA, Kurtz DM, Schoenleber SJ, West CP, Montori VM. Ultrasound-based transient elastography for the detection of hepatic fibrosis: systematic review and meta-analysis. Clin Gastroenterol Hepatol 2007;5:1214-1220.

13.     Friedrich-Rust M, Ong MF, Martens S, Sarrazin C, Bojunga J, Zeuzem S, et al. Performance of transient elastography for the staging of liver fibrosis: a meta-analysis. Gastroenterology 2008;134:960-974.

14.     Caste´ra L, Le Bail B, Roudot-Thoraval F, Bernard PH, Foucher J, Merrouche W, et al. Early detection in routine clinical practice of cirrhosis and oesophageal varices in chronic hepatitis C: comparison of transient elastography (FibroScan) with standard laboratory tests and non-invasive scores. J Hepatol 2009;50:59-68.

15.     Muthupillai R, Lomas,DJ, Rossman PJ, Greenleaf JF, Manduca A, Ehman RL. Magnetic resonance elastography by direct visualization of propagating acoustic strain waves. Science 1995;269:1854-1857.

16.     Yin M, Talwalkar JA, Glaser KJ, Manduca A, Grimm RC, Rossman PJ, et al. Assessment of hepatic fibrosis with magnetic resonance elastography. Clin Gastroenterol Hepatol 2007;5:1207-1213.

17.     Huwart L, Sempoux C, Vicaut E, Salameh N, Annet L, Danse E, et al. Magnetic resonance elastography for the noninvasive staging of liver fibrosis. Gastroenterology 2008;135:32-40.

18.     Talwalkar JA. Elastography for detecting hepatic fibrosis: options and considerations. Gastroenterology 2008;135:299-302.

19.     Caste´ra L, Foucher J, Bernard PH, Carvalho F, Allaix D, Merrouche W, et al. Pitfalls of liver stiffness measurement: a 5-year prospective study of 13,369 examinations. HEPATOLOGY 2010;51:828-835.

20.     Hines CD, Bley TA, Lindstrom MJ, Reeder SB. Repeatability of magnetic resonance elastography for quantification of hepatic stiffness. J Magn Reson Imaging 2010;31:725-731.


40-45

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

9.

Authors:

Rahul D.Gorle, Diwesh B.Meshram, Pratik L.Naik, Vivek S.Narnaware

Paper Title:

Optimization of Effective Parmeter of Jatropha Biodiesel Using Taguchi Method and Performance Analysis Using CI Engine

Abstract:   Experiments are carried out by biodiesel blends and compared it's with diesel fuel characteristics.  In this study, the optimization of experimental parameters, such as catalyst type, catalyst concentration, molar ratio of alcohol to oil and reaction temperature, on the transesterification for the production of Jatropha methyl ester was performed. Alkali catalyzed method has been used for biodiesel production process by using catalysts such as KOH, NaOH, NaOCH3. The Taguchi method helped to understand the effect of control parameter and to optimize the experimental conditions from a limited number of experiments and contribution of each noise factor calculated by ANOVA. Finally the yield of Jatropha methyl ester could be improved using control parameter which was obtained by Taguchi method. This paper investigated the performance and emission characteristics of various blends of Jatropha biodiesel with diesel on a Single cylinder four stroke diesel engine. The acquired data were analyzed for various parameters such as brake thermal efficiency (BTE), brake mean effective pressure (BMEP), brake specific fuel consumption (BSFC), exhaust gas temperature (EGT).The blends of BJ-10 and BJ-20have superior emission characteristics than other blends and closer to diesel value.

Keywords:
  ANOVA, Basic catalyst, Biodiesel, FAME  Jatropha methyl ester, Taguchi method, Transesterification, Engine performance and emission.


References:

1.        Ratchaphon Suntivarakorn, W. Poonnakhun, S. Theerakulpisut“A Suitable Blending Ratio for using Jatropha Oil asFuel in High Speed Diesel Engine”, KKS Res 15 (1), January 2010, pp 9-19
2.        K.Arun Balasubramanian, “Duel Biodiesel Blends in Diesel Engine- Performance and Emission Analysis”,European Journal of Scientific Research, ISSN 1450-216X, Vol.75, 2012, pp 400-408.

3.        Deepak Agarwal, Avinash Agarwal,”Performance and Emission Characteristics of Jatropha Oil in a Direct InjectionCompression Ignition Engine”, Applied Thermal Engineering, 2007, pp 2314 – 2323.

4.        De. S.K. Dhagat, P.V.Joshi, “ Experimental Investigation of Diesel Engine Characteristics Using Jatropha Curcas Blended Biodiesel”, Journal of The Institute of Engineers, JULLY 18, 201, Vol. 91, PP 22 – 26.

5.        Adebayo G. B., Ameen O.M and Abass L.T, “Physico – chemical properties of biodiesel produced from Jatropha curcas oil and fossil diesel”, Journal of Microbiology and Biotechnology Research, 2011, pp 12 – 16.

6.        S.N. Bobade and V.B.Khyade, Preparation of Methyl Ester (Biodiesel) from Karanja (Pongamia pinnata) Oil, Research Journal of Chemical Sciences, Vol. 2(8), 43-50, August (2012).

7.        R. K. Singh, A. Kiran Kumar and S. Sethi, Preparation of karanja oil methyl ester, Offshore World, April-May 2006.

8.        S.N. Bobade and V.B.Khyade, Detail study on the Properties of Pongamia Pinnata (Karanja) for the Production of Biofuel, Research Journal of Chemical Sciences, Vol. 2(7), 16-20, July (2012).

9.        S.Antony Raja, D.S.Robinson smart, and C.Lindon Robert Lee, Research, Biodiesel production from Jatropha oil and its characterization, Journal of Chemical Sciences Vol. 1 (1), April (2011).

10.     SunTae Kim, Bongbeen Yim, Youngtaek Park, Application of Taguchi Experimental Design for the Optimization of Effective Parameters on the Rapeseed Methyl Ester Production, Environ. Eng. Res. 2010 September, 15(3), 129-134.

11.     Tint Tint Kywe and Mya Mya Oo, Production of biodiesel from Jatropha oil (Jatropha curcas) in pilot plant. World Academy of Science, Engineering and Technology Vol. 38, February 2009.

12.     F. Halek, A. Kavousi, and M. Banifatemi, Biodiesel as an Alternative Fuel for Diesel Engines, World Academy of Science, Engineering and Technology 57 2009.

13.     M. Mathiyazhagan, A.Ganapathi, B.Jaganath, N.Renganayaki. Production of biodiesel from nonedible plant oils having high FFA content, International journal of Chemical and Environmental Engineering, Volume 2, No.2. April 2011.

14.     M.S. Phadke, Quality Engineering using Robust Design, Prentice Hall.

15.     IIT- Bombay, “Design for Reliability and Quality.”,http://nptel.iitm.ac.in/courses/112101005/downloads/Module_5_Lecture_4_final.pdf.


46-52

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

10.

Authors:

Amey Kelkar

Paper Title:

Decoupling the World Wide Web

Abstract:   In recent years, much research has been devoted to the investigation of object-oriented languages; contrarily, few have investigated the investigation of symmetric encryption. Given the current status of perfect modalities, scholars compellingly desire the investigation of redundancy that paved the way for the development of erasure coding. We motivate a compact tool for refining the Internet, which I call SplitSigner.

Keywords:
    symmetric encryption, redundancy


References:

1.        Bachman, C., Sun, L., Adleman, L., and Sasaki, R. A case for journaling file systems. In Proceedings of the Workshop on Heterogeneous, Interactive Theory (Mar. 2003).
2.        Balasubramaniam, C. Exploring access points and virtual machines with NEW. In Proceedings of SIGMETRICS (June 1990).

3.        Bose, G., Needham, R., and Rajam, E. T. Harnessing write-back caches and Smalltalk. Journal of Homogeneous, Interactive Technology 39 (Aug. 1994), 46–51.

4.        Corbato, F., and Minsky, M. AsseDesk: A methodology for the refinement of superblocks. In Proceedings of the Workshop on Homogeneous Technology (June 2003).

5.        Daubechies, I., Clarke, E., and Garcia, D. A case for Voice-over-IP. In Proceedings of the Symposium on Introspective, Symbiotic Technology (Oct. 1995).

6.        Davis, W. E. Cacheable models for the memory bus. Journal of Adaptive Theory 8 (May 2003), 1–18.

7.        Dongarra, J. TIKE: Exploration of suffix trees. Tech. Rep. 956-1749, UC Berkeley, July 1992.

8.        Feigenbaum, E., and Martin, P. GHEBRE: Evaluation of multi-processors. In Proceedings of the Symposium on Electronic, Secure Methodologies (Sept. 2000).

9.        Garcia, M. LacedGalosh: A methodology for the development of red-black trees. OSR 68 (Jan. 2002), 43–54.

10.     Hartmanis, J. A development of lambda calculus using JawyArc. In Proceedings of MOBICOM (Oct. 2005).

11.     Hawking, S., Brown, Q. F., Ritchie, D., Qian, S., Tarjan, R., Li, Y., and Qian, T. A methodology for the exploration of rasterization. In Proceedings of the Workshop on Unstable, Secure Symmetries (Aug. 2005).

12.     Johnson, U. The relationship between RAID and linked lists. Journal of Homogeneous, Trainable Symmetries 22 (Dec. 2003), 150–196.

13.     Kobayashi, E., and Hamming, R. Kerite: Evaluation of multi-processors. In Proceedings of PODS (Aug. 1999).

14.     Kumar, G., and Shamir, A. Cacheable, semantic algorithms. In Proceedings of NDSS (Aug. 2005).

15.     Lee, J., Floyd, R., Raman, V., Papadimitriou, C., Dahl, O., and Davis, L. Abele: Refinement of the lookaside buffer. Journal of Concurrent, Random Models 157 (Oct. 1991), 54–60.

16.     Lee, R., and Nehru, F. The lookaside buffer no longer considered harmful. Journal of Adaptive, Robust Communication 18 (Nov. 1993), 159–194.

17.     Morrison, R. T. DNS no longer considered harmful. In Proceedings of the Symposium on Extensible, Relational Symmetries (Feb. 2004).

18.     Newell, A., Nehru, U., Lee, M., and Ito, M. Towards the exploration of courseware. In Proceedings of the Symposium on Self-Learning, Psychoacoustic Theory (Dec. 2004).

19.     Newell, A., Williams, U., and Sato, P. Refining virtual machines using authenticated epistemologies. Journal of Distributed, Interposable Theory 3 (Oct. 2005), 20–24.

20.     Thompson, G., and Martin, U. D. Whip: Adaptive configurations. In Proceedings of the Workshop on Flexible, Replicated Configurations (Mar. 2000).

21.     Wirth, N. A visualization of write-ahead logging with Ave. Journal of Event-Driven Archetypes 460 (June 1977), 76–80.

22.     Wu, H., Hopcroft, J., Miller, O., Perlis, A., Garey, M., Sutherland, I., and Lamport, L. Towards the improvement of the UNIVAC computer. In Proceedings of HPCA (Oct. 1998).

23.     Zheng, I., and Zhao, G. X. Ambimorphic, perfect communication for hash tables. Journal of Real-Time, Heterogeneous Models 5 (Feb. 2005), 56–62.

24.     Zhou, W. The influence of secure archetypes on steganography. In Proceedings of NOSSDAV (Apr. 2005)


53-55

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

11

Authors:

Madhvi Jangalwa, Dushyant S. Sisodiya

Paper Title:

Estimation and Analysis of PIC on DS - CDMA

Abstract:   This paper deals with the design of sub-optimal detectors in an interference channel with fading and with Additive White Gaussian Noise (AWGN). Parallel interference detector (PIC) is one of the Multiuser Detection (MUD) techniques, where it employs canceling or suppressing interfering users from the desired signals. The conventional detectors typically either ignore the interference or treat other user interference (Multiple Access Interference) as merely noise. But Multiple Access Interference (MAI) has a structure which can be exploited in the detection process. This paper quantifies the significant performance gain if the detector exploits the MAI structure through Multiuser detection technique, which not only improves the capacity of the channel but also reduce requirement for power control. The simulation result shows the better Bit Error Rate (BER) performance of PIC detector over conventional detector.

Keywords:
    AWGN, PIC, MUD, MAI, BER.


References:

1.        Peng Hui Tan, and Lars K. Rasmussen “Multiuser Detection in CDMA—A Comparison of Relaxations, Exact, and Heuristic Search Methods”, IEEE Transactions on Wireless Communications, vol. 3, no. 5, September 2004.
2.        J. Chen, J. Wang, and M. Sawahashi, “MCI cancellation for multicode wideband CDMA systems”, IEEE Transactions on Communications, vol. 20, pp. 450–462, Feb. 2002.

3.        Jang W., Nguyen L., Bidarkar P. “MAI and ICI of Synchronous Downlink MC-CDMA with Frequency Offset”, IEEE Transactions on. Communications, vol. 5, (3), pp. 693- 703, 2006.

4.        D. Tse and P. Viswanath, “Fundamentals of Wireless Communications”, Cambridge Univ. Press, 2005.

5.        P. Tan and K. Lars, “Multiuser Detection in CDMA: A Comparison of Relaxations, Exact, and Heuristic Search Methods” , July09, 2003.

6.        Z. Lei, and T. Lim, “Simplified Polynomial Expansion Linear Detection for DS-CDMA systems”, IEEE Electronic Letters, vol. 34, no. 16, pp. 1561-1563, August 1998.

7.        S. Verd´u, “Multiuser Detection’,  Cambridge Univ. Press, 1998.

8.        H. Li, X. Lu, and G. Giannakis, “Capon multiuser receiver for CDMA systems with space-time coding", IEEE Transactions Signal Process., vol. 50, no. 5, pp. 1193-1204, May 2002.

9.        W. C. Jakes, “Microwave Mobile Communication”,Piscataway, NJ: IEEE Press, 1994.

10.     T. Hasegawa and M. Shimizu, “A chip correlation MMSE receiver with multipath interference correlative timing for DS-CDMA systems", in Proc. IEEE Vehicular Technology Conference (VTC), Stockholm, pp. 1740-1744, May 30-June 1, 2005.

11.     R. H. Etkin, D. Tse, and H. Wang, “Gaussian interference channel capacity to within one bit”, IEEE Transaction  Inf. Theory, vol. 54, no. 12,pp. 5534–5562, Dec. 2008.

12.     Syed S. Rizvi and Khaled M. Elleithy “A Closed-Form Expression for BER to Quantify MAI for Synchronous DS CDMA Multi-user Detector”,  February 24, 2010.

13.     S. J. Grant and J. K. Cavers, “System-wide capacity increase for narrowband cellular systems through multiuser detection and base station diversity arrays”,  IEEE Transaction Wireless Communication ,vol. 3, no. 6, pp. 2072– 2082, Nov. 2004.

14.     J. Kazemitabar and H. Jafarkhani, “Performance analysis of multiple antenna multi-user detection”, Information Theory and Applications Workshop, 2009.

15.     Alexandra Duel-Hallen, Jack Holtzman and Zoran Zvonar "Multiuser Detection for CDMA Systems", IEEE Personal Communications (1995-04).


56-59

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

12

Authors:

Medisetty Nagendra Kumar, S. Srividya

Paper Title:

Genetic Algorithm based Color Image Steganogaphy using Integer Wavelet Transform and Optimal Pixel Adjustment Process

Abstract:   Information security has become a cause of concern because of the electronic eavesdropping. For hiding secret information in images, there exist a large variety of steganographic techniques. Some of them are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. In short, capacity, robustness and invisibility are three important parameters in information hiding and are quite difficult to achieve in a single algorithm. This paper proposes a novel steganography technique for digital colour image which aims at effective retrieval of hidden data in the colour image without significant degradation in the quality of the colour image. The professed methodology utilizes the least significant bits of the  three colour channels (Red, Green, Blue) in a given colour image for embedding the secret message  based on Integer Wavelet Transform, Genetic Algorithm and Optimal Pixel Adjustment Process (OPAP). The experimental results show that the proposed method is a secure steganographic method that effectively extracts the hidden message with good image quality and provides reasonable hiding capacity as compared to the adaptive methods of gray scale steganography systems.

Keywords:
    Genetic Algorithm, Histogram Modification, Integer Wavelet Transform, Optimal Pixel Adjustment Process, RGB channels, Steganography.


References:

1.        N.Provosn and P. Honeyman, Hide and seek: An introduction to steganography, IEEE Security Privacy Mag.,1 (3) (2003) 32–44/
2.        C.K. Chan, L.M. Chen, Hiding data in images by simple    LSB substitution, Pattern Recognition 37 (3) (2004) 469–474.

3.        W. Tseng and C. C. Chnag, "High capacity data hiding in jpegcompressed images," Informatica, vol. 15, no. I, pp. 127-142,2004.

4.        K. B. Raja, Kiran Kumar. K, Satish Kumar. N, Lashmi. M.  S, Preeti.H, Venugopal. K. R. and Lalit. M. Patnaik “Genetic algorithm based steganography using wavelets,” nternational Conference on Information System Security Vol. 4812, pp, 51-63. 2007.

5.        El Safy, R.O, Zayed. H. H, EI Dessouki. A, "An adaptive steganography technique based on integer wavelet transform,"ICNM International Conference on Networking and Media Convergence, pp 111-117,2009.

6.        M.H. Lin, Y.C. Hu, C.C. Chang, Both color and gray scale secret images hiding in a color image, International Journal of Pattern Recognition and Artificial Intelligence 16 (2002) 697–713.

7.        T. Liu, Z.D. Qiu, A DWT-based color image steganography scheme, in: Proceedings of International Conference on Signal Processing, vol.2, Beijing, China, August 2002, pp. 1568–1571

8.        S. Lee, C.D. Yoo and T. Kalker, "Reversible image watermarking based on integer-to-integer wavelet transform," IEEE Transactions on Information Forensics and Security, Vol. 2, No.3, Sep. 2007, pp. 321- 330.

9.        Xuan, J. Zhu, Y. Q. Shi, Z. Ni, and W. Su., "Distortionless data hiding based on integer wavelet transform," IEE Electronic Letters, 38(25): 1646--1648, Dec. 2002.

10.     Elham Ghasemi, Jamshid Shanbehzadeh,Bahram Zahir Azamid, “An Steganographic method based on Integer Wavelet Transform and Genetic Algorithm”, 978-1-4244-9779-7/11/$26.00 ©2011 IEEE.

11.     Steganography software for windows, http://members.tripod.com/steganography/stego/software.html.

12.     S. C. Chu, H. C. Huang, Y. Shi, S. Y. Wu, and C. S. Shieh, Genetic watermarking for zerotree-based applications. Circuits, Systems, and Signal Processing, vol. 27, no. 2, pp. 171-182, 2008.

13.     J. Fridrich, M. Goljan, and R. Du, Detecting lsb steganography in color, and gray-scale images, IEEE MultiMedia, pp. 22{28, 2001.

14.     J. Fridrich, M. Goljan, and D. Hogea. Attacking the outguess, Proc. of ACM Workshop Multimedia and Security, 2002.

15.     J. Fridrich, M. Goljan, and D. Hogea, Steganalysis of jpeg images: Breaking the f5 algorithm, Proc. of ACM Workshop on Multimedia and Security 2002, 2002.

16.     D. E. Goldberg, The genetic algorithms in search, optimization and machine learning, Addison- Wesley, 1989.

17.     C. T. Hsu, J. Wu, and L. Hidden, Digital watermarks in images, IEEE Trans. Image Processing, pp. 58-68, 1999.

18.     H. C. Huang, C. M. Chu, and J. S. Pan, The optimized copyright protection system with genetic watermarking, Soft Computing, vol. 13, no. 4, pp. 333{343, 2009.

19.     H. C. Huang, J. S. Pan, Y. H. Huang, F. H. Wang, and K. C. Huang, Progressive watermarking techniques using genetic algorithms, Circuits, Systems, and Signal Processing, vol. 26, no. 5, pp. 671{687, 2007.

20.     E. Kawaguchi and R. O. Eason, Principle and application of bpcs-steganography, Proc. Of SPIE:Multimedia Systems and Applications, pp. 464{472, 1998.

21.     A. R. S. Marcal and P. R. Pereira, A steganographic method for digital images robust to rs steganal- ysis, Lecture Notes in Computer Science, pp. 1192{1199, 2005.

22.     N. Provos, Steganography detection with stegdetect, http://www.outguess.org/detection.php.

23.     A.Westfeld, F5-a steganographic algorithm, Proc. of the 4th International Workshop on Information

24.     Hiding, Lecture Notes in Computer Science,2137.Springer-Verlag, pp. 289{302, 2001.

25.     A. Westfeld and A. P_tzmann, Attacks on steganographic systems, Proc. of Information Hiding- Third International Workshop, 1999.

26.     A. Westfeld and A. P_tzmann, Attacks on steganographic systems, Lecture Notes in Computer Science, pp. 61{76, 1999.

27.     D. C. Wu and W. H. Tsai, A steganographic method for images by pixel-value di_erencing, Pattern Recognition Letters, pp. 1613{1626, 2003.

28.     X. Zhang and S. Z. Wang, Statistical analysis against spatial bpcs steganography, Computer-Aided Design & Computer Graphics, pp. 395{406, 2003.

29.     X. Zhang and S. Z. Wang, Vulnerability of pixel-value di_erencing steganography to histogram analysis and modi_cation for enhanced security, Pattern Recognition Letters, pp. 331{339, 2004.

30.     Bruice Schneier, Applied Cryptography Protocols, Algorithm and Source Code in C. Second edition. Wiley India edition 2007

31.     S. Katzenbeisser, F.A.P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Norwood, MA, 2000.

32.     W. Bender, D. Gruhl, N. Morimoto, A. Lu, ―Techniques for data hiding‖ IBM Syst. J. 35 (3&4) (1996) 313–336.

33.     G. J. Simmons, "The prisoners' problem and the subliminal channel" in Proc. Advances in Cryptology (CRYPTO '83), pp. 51-67

34.     R.Amirtharajan and R.John Bosco Balaguru. ―Constructive Role of SFC & RGB Fusion versus Destructive Intrusion‖.International Journal of Computer Applications 1(20):30–36

35.     R.Amirtharajan and Dr. R. John Bosco Balaguru, ―Tri-Layer Stego for Enhanced Security – A Keyless Random Approach‖ - IEEE Xplore, DOI, 10.1109/IMSAA.2009.5439438.

36.     Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt, Digital image steganography: Survey and analysis of current methods Signal Processing 90 (2010) 727–752


60-65

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

13.

Authors:

M. L. Palash, Masum Billah, M. J. Rashid

Paper Title:

Coverage Planning of Mobile WiMAX for Urban and Suburban Environment using Power Scheduling Scheme

Abstract:   This work presents thecoverageplanning of Mobile WiMAXforthe urbanand suburban environment. An effective coverageplanningis  veryimportant  to obtain the benefits over existing  voice and datacommunication techniques.In thisrespectwe proposeacosteffective coverageplanning basedonthepower frequency schedulingtechnique.This techniqueisflexibletocapacity anddata speedvariance.Theefficiency ofpower schedulingscheme isfound higher compare toother scheme.Thisproposed planning  canbe implemented in the urban andsuburbanareas without changing thestandardhardware equipment of MobileWiMAX.

Keywords:
    IEEE802.16e,cover ageplanning,powerfrequency scheduling, Mobile WiMAX.


References:

1.        IS-54, “”Dual –Mode mobile Station-Base Station Compatibility Standard,” PN-2215, Electronic Industries Association Engineering Department, Dececmber 1889.
2.        Sankaran C, Fan Wang and Ghosh A. “Performance of Frequency Selective Scheduling and Fractional Frequency Reuse Schemes for WIMAX,” IEEE Vehicular
Technology Conference VTC Spring 2009.

3.        WiMAX Forum, 2004 WiMAX system Evaluation Methodology, http://www.wimaxforum.org

4.        Pahlavan K and Krishnamurthy P. Principles of Wireless Networks: A Unified Approach, Pearson Education, Singapore

5.        Garg V K and Wilkes J E. Principles & Applications of GSM, Pearson Education, Singapore.

6.        SalehFaruque, “Cellular Mobile Systems Engineering”, ISBN-10: 0890065187.

7.        Elayobi S E, BenHaddada O and Foursetie B , “On the Best Frequency Reuse Scheme in WiMAX”, Wimax /Mobilefi- Advanced Research and Technology 2007,pp.133-158

8.        Mobile Wimax Group - Coverage of mobile WiMAX

9.        WiMAX Forum, Mobile WiMAX Part I: A Technical Overview and Performance Evaluation

10.     IEEE C802.16e-04/453r2 , Add Sub-Segment to the PUSC Mode, Huawei 2004.

11.     Nortel: Considerations for deploying mobile WiMAX at various frequencies

12.     BTRC, Regulatory and licensing guidelines for invitation of proposals for issuing license for Broadband Wireless Access Services in Bangladesh. 8(08):32 2007

13.     M. Hata  "Empirical formula for propagation loss in land mobile radio services",  IEEE Trans. Veh. Tech.,  vol. 29,  no. 3,  pp.317 -325 1980


66-70

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

14.

Authors:

Ati Swarna Sindhura, K.Sanath Kumar, Ravi Mathey

Paper Title:

An Efficient and Reliable Data Delivery in Ad hoc Networks

Abstract:   This particular papers addresses the scuffle of giving data packets with regards to highly active mobile random networks inside of a reliable and also timely fashion. Most recent random redirecting methodologies are at risk of node ability to move, especially with regards to large-scale methods. Driven by this challenge, we propose a capable Position-based Opportunistic Routing (POR) method which takes gain benefit stateless property of geographic routing together with broadcast attributes of instant medium. We recommend a position-based opportunistic direction-finding mechanism that's deployed with no complex creating to order to protocol and also achieve a lot of reception with no losing the advantage of collision avoidance given by 802. 11. The very notion of in-the-air back-up significantly enhances the robustness in the routing method and minimizes the latency and also duplicate forwarding because of local route repair.

Keywords:
    About four key words or phrases in alphabetical order, separated by commas.


References:

1.        R. Flury and R. Wattenhofer, “MLS: An Efficient Location Service for Mobile Ad Hoc Networks,” Proc. ACM Int’l Symp. Mobile Ad Hoc Networking and Computing (MobiHoc), pp. 226-237, 2006.
2.        A. Valera, W. Seah, and S. Rao, “Improving Protocol Robustness in Ad Hoc Networks through Cooperative Packet Caching and Shortest Multipath Routing,” IEEE Trans. Mobile Computing, vol. 4, no. 5, pp. 443-457, Sept./Oct. 2005.

3.        Balasubramanian, R. Mahajan, A. Venkataramani, B.N. Levine, and J. Zahorjan, “Interactive WiFi Connectivity for Moving Vehicles,” Proc. ACM SIGCOMM, pp. 427-438, 2008.

4.        D. Chen and P. Varshney, “A Survey of Void Handling Techniques for Geographic Routing in Wireless Networks,” IEEE Comm. Surveys and Tutorials, vol. 9, no. 1, pp. 50-67, Jan.-Mar. 2007.

5.        D. Chen, J. Deng, and P. Varshney, “Selection of a Forwarding Area for Contention-Based Geographic Forwarding in Wireless Multi-Hop Networks,” IEEE Trans. Vehicular Technology, vol. 56, no. 5, pp. 3111-3122, Sept. 2007.

6.        K. Zeng, Z. Yang, and W. Lou, “Location-Aided Opportunistic Forwarding in Multirate and Multihop Wireless Networks,” IEEE Trans. Vehicular Technology, vol. 58, no. 6, pp. 3032-3040, July 2009.

7.        E. Felemban, C.-G. Lee, E. Ekici, R. Boder, and S. Vural, “Probabilistic QoS Guarantee in Reliability and Timeliness Domains in Wireless Sensor Networks,” Proc. IEEE INFOCOM, pp. 2646-2657, 2005.

8.        N. Arad and Y. Shavitt, “Minimizing Recovery State in Geographic Ad Hoc Routing,” IEEE Trans. Mobile Computing, vol. 8, no. 2, pp. 203-217, Feb. 2009.

9.        S. Chachulski, M. Jennings, S. Katti, and D. Katabi, “Trading Structure for Randomness in Wireless Opportunistic Routing,” Proc. ACM SIGCOMM, pp. 169-180, 2007.

10.     F. Wu, T. Chen, S. Zhong, L.E. Li, and Y.R. Yang, “Incentive- Compatible Opportunistic Routing for Wireless Networks,” Proc. ACM MobiCom, pp. 303-314, 2008.

11.     Y. Han, R. La, A. Makowski, and S. Lee, “Distribution of Path Durations in Mobile Ad-Hoc Networks - Palm’s Theorem to the Rescue,” Computer Networks, vol. 50, no. 12, pp. 1887-1900, 2006.

12.     M.-H. Lu, P. Steenkiste, and T. Chen, “Design, Implementation and Evaluation of an Efficient Opportunistic Retransmission Protocol,” Proc. ACM MobiCom, pp. 73-84, 2009.

13.     S. Biswas and R. Morris, “EXOR: Opportunistic Multi-Hop Routing for Wireless Networks,” Proc. ACM SIGCOMM, pp. 133-144, 2005.

14.     E. Rozner, J. Seshadri, Y. Mehta, and L. Qiu, “SOAR: Simple Opportunistic Adaptive Routing Protocol for Wireless Mesh Networks,” IEEE Trans. Mobile Computing, vol. 8, no. 12, pp. 1622-1635, Dec. 2009.


71-76

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

15.

Authors:

Anu Rani Sam, P.Arul

Paper Title:

Transient Stability Enhancement of Multi-machine Power System Using UPFC and SSSC

Abstract:   Power systems are subjected to various types of disturbances which cause the problem of losing stability. The problem of transient stability is a crucial problem. Transient stability evaluation of large scale power systems is an extremely intricate and highly non-linear problem. The main causes of transient stability may be due to transmission system faults, sudden fault changes, loss of generating units and line switching. So the enhancement of transient stability is essential for a secure power system operation. Transient stability of a system refers to the stability when subjected to large disturbances such as faults and switching of lines. Transient stability of the system can be improved by increasing the system voltage, increasing the X/R ratio, increasing the number of parallel lines between points and placement of the FACTS devices. The FACTS controller can improve the voltage stability, steady-state and transient stability of a power system.UPFC (Unified Power Flow Controller) and SSSC (Static Synchronous Series Compensator) can improve the transient stability of the system. Simulation of transient stability without and with FACTS device was done using MATLAB based program and the analysis is performed on IEEE 6 bus system.

Keywords:
  FACTS, Newton-Raphson method, (SSSC) Static Synchronous Compensator, Transient Stability, Unified Power Flow Controller (UPFC)


References:

1.        Hadi Saadat, “Power System Analysis”, Tata McGraw-Hill, 2002
2.        Naseer M Yasin, Mostafa Al-eedany, “Enhancement of Power   System Transient Stability using Static Var Compensator”,International Journal of Current Engineering and Technology   ISSN 2277-4106, Vol 3, No 2, June 2013

3.        Bindeshwar Singh, K.S.Verma, Pooja Mishra, Rashi Maheshwari, Utkarsha Srivastava, Aanchal Baranwal, “Introduction to FACTS  Controllers: A Technological Literature Survey”, International Journal of Automation and Power Engineering Volume 1, Issue 9, December 2012

4.        D.Murali, Dr.M.Rajaram, N.Rekha, “Comparison of FACTS  Devices for Power System Stability   Enhancement”, International  Journal of Computer Applications (0975 – 8887) Volume 8–  No.4, October 2010

5.        P.Kumkratug, M.H. Hague,” Versatile model of a unified power   Flow Controller in a simple power system”, IEE Proc.-Gener.Transm. Distrib.Vol 150, No.2, March 2003

6.        M. Noroozian, L. Angquist, M. Ghandhari, G. Anderson, “Use Of UPFC for Optimal Power Flow Control”, IEEE Transactions on Power Delivery, Vol. 12, No. 4, October 1997

7.        R.Mohan Mathur, Rajiv.K.Varma, “Thyristor- Based FACTS Controllers for Electrical Transmission Systems”, IEEE press and John Wiley & Sons, Inc.

8.        Prashant Dhoble, Arti Bhandakkar, “Review of Active and Reactive Power Flow Control Using Static Synchronous Series Compensator (SSSC)”, International Journal of Innovative Research & Development, Vol 2, Issue 4, April 2013.

9.        Prechanon Kumkratug,”Application of UPFC to increase Transient Stability of Inter-Area Power     System”, Journal of Computers, vol.4. No.4, April 2009

10.     Navid Eghtedarpour and Ali Reza Seifi,”Sensitivity-Based Method for the Effective Location of SSSC,”Journal of Power Electronics, Vol.11, No.1, January 2011


77-81

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

16.

Authors:

Mayur Sawant, Kishor Kinage, Pooja Pilankar, Nikhil Chaudhari

Paper Title:

Database Partitioning: A Review Paper

Abstract:   Data management is much tedious task in growing data environment. Partitioning is the best possible solution which is partially accepted. Partitioning provides availability, maintenance and improvised query performance to the database users. This paper focuses the three key methods of partitioning and helps to reduce the delay in response time. Paper also investigates the composite partition strategies which includes the date, range and hash partitions. The paper shows the encouraging result with partitioning methods and basic composite partition strategies.

Keywords:
    Database partitioning, Dbms_Redefinition, Range Partitioning, Hash Partitioning, List Partitioning


References:

1.        Wen Qi, Jie Song and Yu-bin Bao, Near-uniform Range Partition Approach for Increased Partitioning in Large Database, IEEE, 978-1-4244-5265-1/10, 2010
2.        Jie Song and Yubin Bao, NPA: Increased Partitioning Approach for

3.        Massive Data in Real-time Data Warehouse, IEEE, 978-1-4244-7585-8/10, 2010

4.        Eugene Wu and Samuel Madden, Partitioning Techniques for Fine-grained Indexing, 978-1-4244-8960-2/11, 2011 IEEE

5.        Scaling to Infinity:Partitioning in Oracle Data Warehouses, SageLogix, Inc., White Paper


82-84

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

17.

Authors:

Rajkumar, Vishwanath. B. Patil

Paper Title:

Analysis of Self-Supporting Chimney

Abstract:   Chimneys are tall structures and the major loads acting on these are self weight of the structure, wind load, live load due to lining, earthquake load & temperature loads. In this paper a RC chimneys will be designed considering dead load, wind load and earthquake load. The Bureau of Indian Standards (BIS) design codes procedures will be used for the design of chimney. The present paper discusses the parametric study of RC chimney which is made by obtaining the results from software for different heights, diameter, earthquake zones, wind zones, type of soils and various load conditions because of changes in the dimensions of chimney, structural analysis such as response to earthquake and wind oscillations have become more critical to influence on the response and design of chimney. Parametric study on chimney from height 150 meters to 250 meters at an interval of 5 meters, for Zone II, Hard soil & Critical Zone of Zone V, Soft soil with wind speed varying from 33 meters/sec to 55 meters/sec with an internal temperature of 100 Degrees. The response of the chimney is studied & recorded in Tables & Graphs. The analysis is carried out using programming software Microsoft Visual Basic 6.0. The results obtained from the above cases are compared. Finally, the maximum values obtained in wind analysis and seismic analyses are then compared for deciding the design value.

Keywords:
    RC Chimney, along & across wind analysis, Seismic analysis, Visual Basic.


References:

1.        V. Rohini Padmavathi, B. Siva Konda Reddy and Srikanth “Study of wind load effects on tall RC chimneys”, International Journal of Advanced Engineering Technology, Vol.III/ Issue II, April-June 2012, pp.92 - 97.
2.        K. R. C. Reddy, O. R. Jaiswal and P. N. Godbole “Wind and Earthquake Analysis of Tall RC Chimneys”, International Journal of Earth Sciences and Engineering ISSN 0974-5904, Vol. 04 No 06 SPL, October 2011 pp. 508-511.

3.        Manohar, S.N., “Tall Chimneys”, Tata McGraw-Hill Publishing Company Limited, New Delhi, 1981.

4.        Code of practice for design loads for buildings and structures, IS: 875(Part-III):1987, published by Bureau of Indian standards, New Delhi.

5.        Criteria for design of Reinforced concrete Chimneys, IS: 4998(Part-I):1992, Published by Bureau of Indian standards, New Delhi.

6.        Criteria for Earthquake Resistant Design of Structures, IS 1893 (Part 1): 2002, Published by Bureau of Indian Standards, New Delhi.

7.        T Subramani, P.Shanmugam, “Seismic Analysis and Design of Industrial Chimneys by Using Staad Pro”, International Journal of Engineering Research and Applications (IJERA), ISSN: 2248-9622, Vol. 2, Issue 4, July-August 2012, pp.154-161.

8.        M. G. Shaikh  MIE, H.A.M.I. khan, “Governing Loads for Design of A tall RCC Chimney”, IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE), ISSN: 2278-1684, pp. 12-19.


85-91

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

18.

Authors:

Ashish H. Makwana, Jayeshkumar Pitroda

Paper Title:

An Approach for Ready Mixed Concrete Selection For Construction Companies through Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) Technique

Abstract:    Ready Mix Concrete (RMC) industry is continuously growing all over the world and India is not an exception to it. The pace of mechanization in the past was very slow due to the availability of cheap and abundant labor, lack of capital investment and the highly fragmented nature of the construction sector. Multi-criteria decision making for evaluation of Ready Mixed Concreteby implementing Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) method is simple to understand and permits the pursuit of best alternative criterion depicted in a simple mathematical calculation. Due to this, decision making for selection of suitable Ready Mixed Concrete is of special importance. The Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) was first developed by Yoon and Hwang. For a Ready Mixed Concrete selection different important criteria are takeninto account. These criteria have different weights by different experts. Using these weights provides the rank to every Ready Mixed Concrete with the help of a Technique for Order Preference by Similarity to Ideal Solution (TOPSIS).

Keywords:
     Ready Mixed Concrete, Mechanization,Multi criteria decision making, Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) method, decision making.  


References:

1.        Alessio Ishizaka, Philippe Nemery - Multi-Criteria Decision Analysis: Methods and Software, John Wiley & Sons (2013).
2.        Agarwal, P.; Sahai, M.; Mishra,V.; Bag, M.; Singh V. A review of multi-criteria decision making techniques for supplier evaluation and selection. International Journal of Industrial Engineering Computations, 2 (2011), pp. 801–810.
3.        Ashish H. Makwana, Prof. Jayeshkumar Pitroda, “An Approach for Ready Mixed Concrete Selection for Construction Companies through Analytic Hierarchy Process”, ISSN: 2231-5381, International Journal of Engineering Trends and Technology (IJETT), Volume - 4, Issue - 7, July - 2013, PG. 2878 – 2884, Vallabh Vidyanagar– Gujarat – India

4.        Bahar Sennaroglu, Seda Şen, “Integrated AHP and TOPSIS Approach for Supplier Selection”, 2nd International Conference Manufacturing Engineering & Management (ICMEM) 2012, (2012), PG. 19 - 22, ISBN 978-80-553-1216-3, Istanbul, Turkey

5.        C. ElanchezhianB, Vijaya Ramnath, Dr. R. Kesavan, Vendor Evaluation Using Multi Criteria Decision Making, International Journal of Computer Applications (0975 – 8887) Volume 5– No.9, August 2010.

6.        Chen, Y.-J. Structured methodology for supplier selection and evaluation in a supply chain. Information Sciences, 181 (2011), pp. 1651–1670.

7.        Chen, C.-T.; Lin, C.-T.; Huang, S.-F. A fuzzy approach for supplier evaluation and selection in supply chain management. International Journal of Production Economics, 102 (2006), pp. 289–301

8.        Hwang, C.-L., and Yoon, K. (1981). Multiple Attribute Decision Making: Methods andApplications. New York: Springer-Verlag.

9.        Evangelos Triantaphyllou - Multi-Criteria Decision Making Methods: A Comparative Study (Applied Optimization, Volume 44).

10.     Povilas Vainiunas1, Edmundas Kazimieras Zavadskas2, Zenonas Turskis3, Jolanta Tamošaitiene4, “Design Projects’ Managers Ranking based on their Multiple Experience and Technical Skills”, Modern building materials, structures and techniques, © Vilnius Gediminas Technical University, 2010, Vilnius, Lithuania.

11.     Ravendra Singh, Hemant Rajput, Research Scholar, 3Vedansh Chaturvedi, 4Jyoti Vimal, “Supplier Selection by Techniqueof Order Preference by Similarity to Ideal Solution (TOPSIS) Methodfor Automotive Industry”, International Journal of Advanced Technology & Engineering Research (IJATER), ISSN NO: 2250-3536, VOLUME 2, ISSUE 2, MARCH 2012, PG. 157 – 160, Gwalior

12.     Rita Liaudanskiene, Leonas Ustinovicius, Aleksejus Bogdanovicius2, “Evaluation of Construction Process Safety Solutions Using the TOPSIS Method”, ISSN 1392-2785 Inzinerine Ekonomika-Engineering Economics (4). 2009, Economics of Engineering Decisions, Kaunas & Vilnius, Lithuania

13. TOPSIS(PPT)http://www.google.co.in/url?sa=t&rct=&q=topsis%2Bmethod%2Bppt&source =web&cd1&cad=rja&ved=0CC4QFjAA&url=http%3A%2F%2Fwww.ccse.kfupm.edu.sa%2F~duffuaa%2Fdownload%2FCourses% 2FSE 391%FTOPSIS.ppt&ei=yPXBUfKeNoXmrAftiIHoCQ&usg=AFQjCNGiZWhb9t1o4yNTsnZ85kLfJaLa1A&bvm=bv.48175248,d.bmk

14.     Yoon, K. P.; Hwang, C.-L. Multiple Attribute Decision Making: An Introduction, Sage Publications, California, 1995.


92-96

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

19.

Authors:

Auf Abdul-Rahmaan Hasso

Paper Title:

Electrocardiogram (ECG) Signal Diagnosis Based on Component Extraction

Abstract:    This work presents a diagnosis system of ECG signal based on its component extraction. The ECG signal was analyzed in time & frequency domain techniques. In time domain techniques, the signal is segmented to extract all the medically important features that were used in the diagnosis. A bottom-up derivative-based algorithm was adopted. This Algorithm subjects the signal derivative to some empirical thresholds. The result of this method is a segment locating waveform that separates and delimits the various segments of the ECG. In frequency domain techniques, the signal is transformed by Fast Fourier Transformation. The signal is transformed sometimes beat by beat. The signal is analyzed in frequency domain by study the power spectrum and find thresholds for normal cases then compare these thresholds with other ECG signals to recognize the abnormal cases. Each disease has its own power spectrum which is different from the normal cases by a threshold in a specify location in the spectrum. Different medical criteria of diseases categories were used in making the diagnostic decision. They were taken from medical books. The system was tried on a large number of ECG signals, some samples of results were given as diagnostic reports.  

Keywords:
     ECG, Time Domain, FFT, Diagnosis.


References:

1.        Kember, N., F., “An Introduction To Computer Applications In Medicine”, Edward Arnold, London 1981.
2.        Al-Gurairi, M. AR. “ ECG Signal Diagnosis based on computer”, M. Sc. Thesis, university of Mosul, College of computer Sc. & Math., Mosul, Iraq, 1998.

3.        Marriott, H., J., L., “Practical Electrocardiography”, 8th Edition, The Williams & Wilkins Co., October 1988.

4.        S. Chandramouleeswaran, A. M. Haidar & F. Samsuri, "Wavelet diagnosis of ECG signals with kaiser based noise diminution," Journal of Biomedical Science and Engineering, vol. 5, pp. 705-714, 2012.

5.        Chia-Hung Lin., “Frequency-domain features for ECG beat discrimination using grey relational analysis-based classifier”, An International Journal Computers and Mathematics with Applications 55 (2008) , © 2007 Elsevier Ltd. All rights reserved. Pp. 680–690

6.        Colledge NR and Walker BR, “Davidson’s Principles And Practice Of Medicine”, 21th Edition, Livingstone, Edinburgh, 2010, ISBN 9780702030857.

7.        Mohd. Siblee Islam, “ A Decision Support System for Stress Diagnosis using ECG Sensor”, Thesis (860116-9793)School of Innovation, Design and Engineering
(IDT) ,Mälardalen University, Västerås, Sweden, 2010.

8.        Forrest AP, Carter DC, MacLeod IB “Principles and Practice of Surgery - A Surgical Supplement to Davidson's Principles and Practice of Medicine”, 3rd Edition, Churchill Livingstone, Edinburgh, 1995. ISBN 0443048606.


97-104

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

20.

Authors:

Pavithra .J, Arnika Tripathi

Paper Title:

Correlated Low Rate DDoS Attack on Router Queues

Abstract:   Network security is the booming issue inspite of tremendous advancements in the security aspects. Among the available network issues, attacks performed to breach the security against a particular host is also a major concern. In regard to this we preferred to study and perform DDoS attack in a coordinated manner that utilizes Botnet technology which attempts to show that it becomes difficult to identify the attacker by using this method. As a result by this it becomes a challenge to the existing attacker to invent an even more devasticated attack type to perform attack. In this method we propose to perform UDP-type attack. The introduced correlated DDoS attacks are more powerful than simple DDoS attacks which involves the combined effort of several machines in attacking a target system, in which an attacker generates highly correlated attack bursts from different sources towards a target router. The main idea behind it is to exploit the correlation among multiple groups of zombies scattered across different locations and have them aggregated to generate attack burst traffic at the target router. For this we use packet level simulations that demonstrate the UDP attack in a simulator test bed.

Keywords:
     DoS, DDoS, correlated DDoS, UDP   


References:

1.        “Amit Kumar Tyagi, G.Aghila “A Wide Scale Survey on Botnet”, International Journal of Computer Applications (0975 – 8887) Vol 34– No.9, November 2011. 
2.        Yan Cai , Patrick P.C. Lee b,, Weibo Gong , Don Towsley “Analysis of  traffic correlation attacks on router queues”, journal at Science Direct Computer Networks 55 (2011).

3.        Aleksandar Kuzmanovic and Edward W. Knightly, Senior Member, IEEE “Low-Rate TCP-Targeted Denial of Service Attacks and Counter Strategies”, IEEE/ACM transactions on networking, vol. 14, no. 4, august 2006.

4.        “On Remote Exploitation of TCP Sender for Low-Rate Flooding      Denial-of-Service Attack” V. Anil Kumar, P. S. Jayalekshmy, G. K. Patra, and R. P. Thangavelu , IEEE Communication Letters, Vol. 13,No.1, January 2009

5.        Avi Kak  “TCP/IP Vulnerabilities: IP Spoofing and Denial-of-Service Attacks”, Lecture Notes on “Computer and Network Security” April 30, 2013.


105-107

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

21.

Authors:

Arifuzzaman, Md. Mostafizur Rahman, Farhana Akhter

Paper Title:

Treatment of Leachate of Savar Solid Waste Landfill Site

Abstract:    Landfill leachate is complex waste water with considerable variation in both quality and quantity. The composition and concentration of pollutants are influenced by the types of waste deposited, hydro geological factors and more significant by the age of the landfill site. In general, leachate is highly contaminated with organic contaminants measured as chemical oxygen demand (COD), biochemical oxygen demand (BOD) and also with high ammonium nitrogen concentration. Aerobic biological processes have been found the most effective and reliable treatment option of landfill leachate for developing country like Bangladesh. Leachate containing high concentrations of organic and nitrogen compounds results serious environmental problems near the landfill site. This research was undertaken to investigate the performance of both chemical treatment by alum coagulation and biological process that is extended–aeration activated sludge process without sludge return and anaerobic treatment of Savar Landfill leachate containing high organic and nitrogen concentrations. The main part of the study was studied on the removal efficiency of BOD, COD and ammonia in each method and heavy metals removal were also studied in coagulation and flocculation method. It is observed that in extended aeration process BOD removal is around 80% at 6 days detention time and 94% at 15 days detention time. In the same treatment method experiment results reveal that 75% of ammonia removal is achieved in 6 days aeration period mainly due to air stripping process and in total 98% removal is achieved in 15 days aeration period. The optimum pH of alum coagulant for leachate treatment was 6.5. Also an effective dosage of alum is 1.4 g/L for the best efficiency of heavy metals and COD removal. The maximum amount of COD and heavy metals that could be removed by the alum was about 21 and 77-91% of the initial value, respectively. It is also found that anaerobic biological treatment alone cannot efficiently remove the COD content of leachate from the site. BOD/COD ratio was varies from 0.19 to 0.14 in anaerobic batch system for 20 and 41 days, respectively. This BOD/COD ratio means low biodegradability of treated leachate. Chlorine oxidation, coagulation with high alum dose and extended aeration also conducted after construction of treatment facility by Dhaka City Corporation at Savar landfill site. Only 20 to 41 % COD removed in chlorine oxidation and alum coagulation. The second extended aeration results show that the dilution is not essential to treat leachate. It was taken a few days initially to convert the facultative microorganisms into aerobic microorganisms.

Keywords:
 Landfill leachate, COD, heavy metals, microorganisms.  


References:

1.        JICA, (2005). Formulation of Master Plan for Solid Waste Management in Dhaka City Project Report.
2.        Aslam, M.M., Baig, M.A., Malik, M. and Hassan, I., (2004). Constructed Treatment Wetlands: An Option for Waste Water Treatment in Pakistan. Electronic Journal of Environmental Agricultural and Flood Chemistry.

3.        Robinson, H.D., Barr, M.J., and Last, S.D., (2007). Leachate Collection Treatment and Disposal. Water and Environmental Journal Volume 6 Issue 4: 321-332.

4.        Abeling, U., and Seyfried, C. F., (1992). Anaerobic- Aerobic Treatment of High Strength Ammonium Waste Water-Nitrogen Removal via Nitrite. Water Science and Technology, 26(5-6): 1007-1015.

5.        Bae, J.H., Kim, S.K., and Chang, H.S., (1997). Treatment of Landfill Leachates: Ammonia Removal via Nitrification and Denitrification and further COD reduction via Fenton’s Treatment followed by Activated Sludge. Water Science and Technology. 36(12): 341-348.

6.        Kabdasli, I., Tunay, O., Ozturk, I., Yilmaz, S., and Arikan, O., 2000. Ammonia Removal from Young Landfill Leachate by Magnesium Ammonium Phosphate Precipitation and Air Stripping. Water Science and Technology, 41(10): 237-240.

7.        Surface, J.M., Peverly, J.H., Steenhuis, T.S., and Sanford, W.E., (1993). Effect of Season, Substrate Composition and Plant Growth on Landfill Leachate Treatment in Constructed Wetlands. In Moshiri, G.A. ed. Constructed Wetlands for Water Quality Improvement. Boca Raton: Lewis Publishers. 461-472
8.        Lin, Y.F., Jing, S.R., Lee, D.R., and Wang, T.W. (2002). Nutrient Removal from Aquaculture Waste Water Using Constructed Wtlands System. Aquaculture, 209: 169-184.

9.        Robinson, H.D., Barr, M.J., and Last, S.D., (1992). Leachate Collection, Treatment and Disposal. Journal of Institute Water and Environmental Management, 6: 321-332.


108-112

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

22.

Authors:

A L Sriram, Subramanian, Swarna Sweety

Paper Title:

Extracting Vivadi Ragas and Avivadi Ragas Using BFS Algorithm

Abstract:   Sampoorna ragas are the backbone of the Indian classical music. The sampoorna ragas in south Indian classical music can be divided into vivadi and avivadi ragas. The vivadi ragas are the one which produce discordant effect and hinder the free flow. The proposed identifying the vivadi and avivadi ragas through BSF can help in retrieving all the janya ragas and implementing the same in automated accompanying system.

Keywords:
     Vivadi ragas, Sampoorna ragas, Avivadi ragas, BFS algorithm.


References:

1.        R. Seidel. On the all-pairs-shortest-path problem in unweighted undirected graphs.J. Comput. Syst. Sci.51(3):400–403, 1995.
2.        Kleinberg and E. Tardos. Algorithm Design, pages79–82. Prentice Hall Inc.

3.        B.santhi. melakartha raga generation through breadth first search algorithm, Journal of Theoretical and Applied Information Technology,2011

4.        S. Bhagyalekshmy, Ragas in Carnatic music, CBH Publications, 1990.

5.        P Sambamoorthy, South Indian Music Book III, The Indian Music Publishing House, 1973.

6.        Muthiah Bhagavathar, Sangeetha Kalpa Dhruma.

7.        http://en.wikipedia.org/wiki/Graph_theory.


113-115

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

23.

Authors:

Vagolu Aruna, P.Deepthi

Paper Title:

High Performance Low power Dynamic Multiplier

Abstract:    The DPST has been applied on both the modified Booth decoder and the compression tree of multipliers to enlarge the power reduction. This paper provides the experience of applying an advanced version of our former dynamic power suppression technique (DPST) on multipliers for high-speed and low-power purposes. To filter out the use-less switching power, there are two approaches, i.e., using registers and using AND gates, to assert the data signals of multipliers after the data transition. The simulation results show that the DPST implementation with AND gates owns an extremely high flexibility on adjusting the data asserting time which not only facilitates the robustness of DPST but also leads to a 40% speed improvement. Adopting a Xilinx Spartan 3 Xc3s200 board  the proposed DPST-equipped multiplier dissipates only 0.0121 mW per MHz in H.264 texture coding applications, and obtains a 40% power reduction and the overall utilization of the resources reduced to 26%.

Keywords:
    (DPST), AND, H.264.


References:

1.        J. Choi, J. Jeon, and K. Choi, “Power minimization of functional units by partially guarded computation,” in Proc. IEEE Int. Symp. Low Power Electron. Des., 2000, pp. 131–136.
2.        O. Chen, R. Sheen, and S. Wang, “A low-power adder operating on effective dynamic data ranges,” IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 10, no. 4, pp. 435–453, Aug. 2002.

3.        O. Chen, S.Wang, and Y. W.Wu, “Minimization of switching activities of partial products for designing low-power multipliers,” IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 11, no. 3, pp. 418–433, Jun.2003.

4.        L. Benini, G. D. Micheli, A. Macii, E. Macii, M. Poncino, and R. Scarsi, “Glitching power minimization by selective gate freezing,” IEEE Trans. Very Large Scale Integr.(VLSI) Syst., vol. 8, no. 3, pp. 287–297, June 2000.

5.        S. Henzler, G. Georgakos, J. Berthold, and D. Schmitt-Landsiedel, “Fast power-efficient circuit-block switch-off scheme,” Electron. Lett., vol. 40, no. 2, pp. 103–104, Jan. 2004.

6.        Z. Huang and M. D. Ercegovac, “On signal-gating schemes for lowpower adders,” in Proc. 35th Asilomar Conf. Signal, Syst., Comput., 2001, pp. 867–871.

7.        Z. Huang, “High-level optimization techniques for low-power multiplier design,” Ph.D. dissertation, Dept. Comput. Sci., Univ. California, Los Angeles, 2003.

8.        Z. Huang and M. D. Ercegovac, “High-performance low-power left-toright array multiplier design,” IEEE Trans. Comput., vol. 54, no. 3, pp. 272–283, Mar. 2005


116-118

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

24.

Authors:

Abdolhamid Sohrabi, AzimRezaei Motlagh, Habib Rostami, Ayat Akbari

Paper Title:

High Performance Current-Mode Multiplier Circuit

Abstract:  Multiplier-divider circuits is using in digital signal processing base on neural networks and communications (amplifiers with variable gain, modulators, detectors and,…).In Most of CMOS analog circuit, transistors are only in triode or saturate regions; till now both regions not used. In this one kind of current mode  multiplier-divider circuits is intrudused.it is very simple, has  low die area and wide range in low voltage . all tough this circuit has no sense to temperature variation and varying parameters. A CMOS current-mode analog multiplier/divider circuit is presented. It is suited to standard CMOS fabrication and can be successfully employed in a wide range of analog signal processing applications The circuit power consumptions is 75 µW respectively, while its frequency bandwidths is 59.7 MHz.

Keywords:
     Analog signal processing, current-mode operation, multiplier, reconfigurable circuits.


References:

1.        R. Harjani, “A low-power CMOS VGA for 50 Mb/s disk drive read channels,” IEEE Trans. Circuits Syst. II, Analog Digit. Signal Process., vol. 42, no. 6, pp. 370–376, Jun. 1995.
2.        A. Motamed, C. Hwang, and M. Ismail, “A low-voltage low-power wide rang CMOS variable gain amplifier,” IEEE Trans. Circuits Syst. II,Analog Digit. Signal Process., vol. 45, no. 7, pp. 800–811, Jul. 1998.

3.        C. Popa, Synthesis of Computational Structures for Analog SignalProcessing, New York, USA: Springer-Verlag, 2011.

4.        Popa, Superior-Order Curvature-Correction Techniques for VoltageReferences, New York, USA: Springer-Verlag, 2009.

5.        Popa, “Low-power CMOS bulk-driven weak-inversion accuratecurrent-mode multiplier/divider circuits,” in Proc. Int. Conf. Electr Electron. Eng., 2003, pp. 66–73.

6.        C. Popa, “Computational circuits using bulk-driven MOS devices,” inProc. IEEE EUROCON Conf., May 2009, pp. 246–251.

7.        C. Popa, “Logarithmic curvature-corrected weak inversion CMOS voltage reference with improved performances,” presented at the 11th Int. Workshop on Thermal Investigations on ICs and Systems, Lake Maggiore, Italy, 2005.

8.        C. Popa, “A new curvature-corrected voltage reference based on theweight difference of gate-source voltages for subthreshold-operated MOS transistors,” in Proc. Int. Symp. Circuits Syst., 2003, pp. 585–588.

9.        C. C. Chang and S. I. Liu, “Weak inversion four-quadrant multiplier andtwo-quadrant divider,” Electron. Lett., vol. 34, no. 22, pp. 2079–2080, Oct. 1998.

10.     M. Gravati, M. Valle, G. Ferri, N. Guerrini, and N. Reyes, “Anovel current-mode very low power analog CMOS four quadrant multiplier,” in Proc. 31st Eur. Solid-State Circuits Conf., Sep. 2005, pp. 495–498.

11.     C. Popa, “High accuracy CMOS multifunctional structure for analogsignal processing,” in Proc. Int. Semicond. Conf., 2009, pp. 427–430.

12.     C. Popa, “CMOS multifunctional computational structure with improvedperformances,” in Proc. 33th Ed. Annu. Semicond. Conf., vol. 2. 2010, pp. 471–474.

13.     C. Popa, “Multiplier circuit with improved linearity using FGMOStransistors,” in Proc. Int. Symp. ELMAR 2009, pp. 159–162.

14.     Y. H. Kim and S. B. Park, “Four-quadrant CMOS analogue multiplier,”Electron. Lett., vol. 28, no. 7, pp. 649–650, Mar. 1992.

15.     Y. K. Seng and S. S. Rofail, “Design and analysis of a +-1 V CMOSfour-quadrant analogue multiplier,” IEEE Proc. Circuits, Devices Syst., vol. 145, no. 3, pp. 148–154, Jun. 1998.

16.     C. Sawigun and J. Mahattanakul, “A 1.5V, wide-input range, high bandwidth CMOS four-quadrant analog multiplier,” in Proc. IEEE Int. Symp. Circuits Syst., May 2008, pp. 2318–2321.

17.     C. Sawigun, A. Demosthenous, and D. Pal, “A low-voltage, low-power, high-linearity cmos four-quadrant analog multiplier,” in Proc. 18th Eur. Conf. Circuits Theory Design, Aug. 2007, pp. 751–754.

18.     C. Popa, “Improved linearity active resistor with controllable negativeresistance,” in Proc. IEEE Int. Conf. Integr. Circuits Design Technol., Aug. 2006, pp. 1–4.

19.     C. Popa and A. M. Manolescu, “CMOS Differential Structure withImproved Linearity and Increased Frequency Response,” in Proc. Int. Semicond. Conf., vol. 2. Sep.–Oct. 2007, pp. 517–520.

20.     C. Popa, “Programmable CMOS active resistor using computationalcircuits,” in Proc. Int. Semicond. Conf., Oct. 2008, pp. 389–392.

21.     C. Popa, “Improved linearity CMOS active resistor based on the mirroring of the ohm law,” in Proc. IEEE 17th Int. Conf. Electron., Circuits, Syst., Dec. 2010, pp.450–453.

22.     Naderi, H. Mojarrad, H. Ghasemzadeh, A. Khoei, and K. Hadidi,“Four-quadrant CMOS analog multiplier based on new current squarer circuit with high-speed,” in Proc. IEEE EUROCON Conf., May 2009, pp. 282–287.

23.     Naderi, A. Khoei, and K. Hadidi, “High speed, low power four quadrant CMOS current-mode multiplier,” in Proc. IEEE Int. Conf. Electron., Circuits Syst., Dec. 2007, pp. 1308–1311.

24.     M. Manolescu and C. Popa, “A 2.5GHz CMOS mixer with improvedlinearity,” J. Circuits, Syst. Comput., vol. 20, no. 2, pp. 233–242, 2010.

25.     S. I. Liu and Y. S. Hwang, “CMOS squarer and four-quadrant multiplier,”IEEE Trans. Circuits Syst. I, Fundam. Theory Appl., vol. 42, no. 2, pp. 119–122, Feb. 1995.

26.     S. A. Mahmoud, “Low voltage low power wide range fully differential CMOS four-quadrant analog multiplier,” in Proc. 52nd IEEE Int. Midwest Symp. Circuits Syst.,
Aug. 2009, pp. 130–133.

27.     C. Sawigun and W. A. Serdijn, “Ultra-low-power, class-AB, CMOS four quadrant current multiplier,” Electron. Lett., vol. 45, no. 10, pp. 483–484, May 2009.


119-122

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

25.

Authors:

Shivani Jain, A.L.N. Rao

Paper Title:

A Comparative Performance Analysis of Approximate String Matching

Abstract:    This paper presents a comparative study to evaluate experimental results for approximate string matching algorithms on the basis of edit distance. We compare the algorithms in terms of the number of character comparisons and the running time for molecular data, binary alphabets English alphabets etc. The terms like word processors, web search engine, molecular sequence, DNA sequence analysis and natural language processing have lead to the development of many algorithms in the field of pattern matching in a string. Amongst the various string searching algorithms being used, here the focus is mainly approximate implementation of pattern matching algorithms such as Knuth-Morris-Pratt, Boyer-Moore, Raita, Horspool based on PHP. The comparison between these algorithms is done with the help of Levenshtein distance. It also describes the importance of design of efficient “Approximate Pattern Search Algorithms in molecular database, binary alphabets, English alphabets and so on”. This approach is advantageous from all other string-pattern matching algorithms in terms of time complexity. Therefore this procedure improves the efficiency of approximate string matching and gives the near-optimal results.

Keywords:
     Pattern Matching, Edit Distance, Approximate String Searching, Levenshtein Distance


References:

1.        Efficient Matching of Biological Sequences Allowing for Non-overlapping Inversions 2011, Volume 6661/2011, 364-375, DOI: 10.1007/978-3-642-21458-5_31
2.        Badoiu M. et al. 2004, “Fast Approximate Pattern Matching with Few Indels via Embeddings,” in Proceedings of 15th Annual ACM-SIAM Symposium on Discrete Algorithms, Louisiana, pp. 651-652, 2004.

3.        Dan Gusfield, Algorithms on Strings, Trees, and Sequences: Computer Science and Computational Biology, Cambridge University Press, New York, 1997.

4.        Navarro, Gonzalo. A Guided Tour to Approximate String Matching. ACM

5.        Shivani jain, et al. 2012, “ A Relative Study of Pattern Matching Algorithms”, Journal of Computing Technologies ISSN 2278 – 3814

6.        Shivani jain et al. 2012 “Different Pattern Matching Algorithms with Molecular Sequence in PHP”, IJAIR ISSN: 2278-7844

7.        Pattern matching and text compression algorithms, Maxime Crochemore 1 Thierry Lecroq2
http://www-igm.univ-mlv.fr/~lecroq/articles/lir9511.pdf
8.        Shivani jain et al. 2013 “Multi-Threaded Approximate Pattern Matching Based on Edit Distance”, IJAIR Vol. 2 Issue 2 ISSN: 2278-7844

9.        Hume A., Sunday D., Fast string searching, Software-Practice and Experience, Vol. 21, No. 11, pp. 1221-1248, 1991.

10.     Smith P., Experiments with a very fast substring search algorithm, Software-Practice and Experience, Vol. 21, No. 10, pp. 1065-1074, 1991.


123-128

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

26.

Authors:

Rohit Rakheja, Bharat Bhushan, R.K. Gupta

Paper Title:

Analysing the Risk Issues in Supply Chain Management by Using AHP Methodology

Abstract:   In this paper we have a research work for analysing the supply chain management risk issues that occur in the industries. The application of AHP here can be used as a one of the best possibilities that can be used to evaluate the mentioned circumstances. As in this increasing competitive market, the decision making places an important role as the results depends upon the direction of concrete decisions taken. This paper represents Analytical Hierarchy Process as a multi and effective decision making methodology that if can be used in effective manner could prove to be very much useful.

Keywords:
    Supply Chain, Analytical Hierarchy Process, Supply Chain Risks, Supply Chain Risk Management, Decision Making  


References:

1.        Saaty, T. The Analytic Hierarchy Process, McGraw-Hill, NewYork. 1980.
2.        Huizingh, E., Vrolijk, H.: Decision Support for InformationSystems Management: Applying Analytic Hierarchy Process,SOM - reports University of Groningen, 1995.

3.        www.wikipedia.com

4.        Ivan Pogarcic: ISEP 2008 Application of AHP Method in traffic planning.

5.        Xianwu Hu:-Small and Medium sized Enterprises in Supply Chain Supplier Evaluation Research, City College Wenzhou China May 2013


129-131

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

27.

Authors:

Richa Verma

Paper Title:

A Survey on Wireless Sensor Network Applications, Design Influencing Factors & Types of Sensor Network

Abstract:    Modern advancement in wireless communications and electronics has facilitated the development of low-cost sensor networks. These sensor networks can be used for various application areas (e.g., health, military, home). For different application areas, there are various technical issues that researchers are presently resolving. Wireless sensor networks are interesting to researchers due to their broad range of application in areas such as target detection and tracking, environmental monitoring, industrial process monitoring, and tactical systems. A wireless sensor network (WSN) has significant applications such as remote environmental monitoring and target tracking. These sensors are prepared with wireless interfaces with which they can communicate with one another to form a network. WSN term can be usually sensed as devices range from laptops, PDAs or mobile phones to very tiny sensing devices. In this paper we give an overview of several new applications, factors influencing sensor network design and about different network topologies. 

Keywords: Wireless sensor network, Sensor network services, Applications, factors, Ad hoc networks  


References:

1.        H. Kim, J. Song, and S. Lee “Energy-Efficient Traffic Scheduling in IEEE 802.15.4 for Home Automation Networks,” IEEE Transaction on Consumer Electronics, vol. 53, issue. 2, pp. 369-374, May 2007.
2.        C. Perkins, Ad Hoc Networks, Addison-Wesley, Reading, MA, 2000.

3.        I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, A survey on sensor networks, IEEE Communications Magazine 40 (8) (2002) 104–112.

4.        D. Estrin, R. Govindan, J. Heidemann, S. Kumar, Next century challenges: scalable coordination in sensor networks, ACM MobiCom’99, Washingtion, USA, 1999, pp. 263–270.

5.        I.A. Essa, Ubiquitous sensing for smart and aware environments, IEEE Personal Communications (October 2000) 47–49.

6.        A. Cerpa, D. Estrin, ASCENT: adaptive self-configuring sensor networks topologies, UCLA Computer Science Department Technical Report UCLA/CSDTR-01-0009, May 2001.

7.        R. Colwell, Testimony of Dr. Rita Colwell, Director, National Science Foundation, Before the Basic Research Subcommitte, House Science Committe, Hearing on Remote Sensing as  Research and Management Tool, September 1998.

8.        A. Cerpa, J. Elson, M. Hamilton, J. Zhao, Habitat monitoring: application driver for wireless communications technology, ACM SIGCOMM’2000, Costa Rica, April
2001.

9.        J. Agre, L. Clare, An integrated architecture for cooperative sensing networks, IEEE Computer Magazine (May 2000) 106–108.

10.     J. Agre, L. Clare, An integrated architecture for cooperative sensing networks, IEEE Computer Magazine (May 2000) 106–108.

11.     M. Bhardwaj, T. Garnett, A.P. Chandrakasan, Upper bounds on the lifetime of sensor networks, IEEE International Conference on Communications ICC’01, Helsinki, Finland, June 2001.

12.     P. Bonnet, J. Gehrke, P. Seshadri, Querying the physical world, IEEE Personal Communications (October 2000) 10–15.

13.     N. Bulusu, D. Estrin, L. Girod, J. Heidemann, Scalable coordination for wireless sensor networks: self-configuring localization systems, International Symposium on Communication Theory and Applications (ISCTA 2001), Ambleside, UK, July 2001.

14.     A. Cerpa, J. Elson, M. Hamilton, J. Zhao, Habitat monitoring: application driver for wireless communications technology, ACM SIGCOMM’2000, Costa Rica, April 2001.

15.     S. Cho, A. Chandrakasan, Energy-efficient protocols for low duty cycle wireless microsensor, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI Vol. 2 (2000), p. 10.

16.     B. Halweil, Study finds modern farming is costly, World Watch 14 (1) (2001) 9–10.

17.     W.R. Heinzelman, J. Kulik, H. Balakrishnan, Adaptive protocols for information dissemination in wireless sensor networks, Proceedings of the ACM MobiCom’99, Seattle, Washington, 1999, pp. 174–185.

18.     C. Intanagonwiwat, R. Govindan, D. Estrin, Directed diffusion: a scalable and robust communication paradigm for sensor networks, Proceedings of the ACM Mobi- Com’00, Boston, MA, 2000, pp. 56–67.

19.     C. Jaikaeo, C. Srisathapornphat, C. Shen, Diagnosis of sensor networks, IEEE International Conference on Communications ICC’01, Helsinki, Finland, June 2001.

20.     P. Johnson et al., Remote continuous physiological monitoring in the home, Journal of Telemed Telecare 2 (2) (1996) 107–113. 420 I.F. Akyildiz et al. / Computer Networks 38 (2002) 393–422

21.     J.M. Kahn, R.H. Katz, K.S.J. Pister, Next century challenges: mobile networking for smart dust, Proceedings of the ACM MobiCom’99, Washington, USA, 1999, pp. 271–278.

22.     B. Walker, W. Steffen, An overview of the implications of global change of natural and managed terrestrial ecosystems, Conservation Ecology 1 (2) (1997). Available from <http://www.consecol.org/vol1/iss2/art2>.

23.     R. Colwell, Testimony of Dr. Rita Colwell, Director, National Science Foundation, Before the Basic Research Subcommitte, House Science Committe, Hearing on Remote Sensing as a Research and Management Tool, September 1998.

24.     M.P. Hamilton, M. Flaxman, Scientific data visualization and biological diversity: new tools for spatializing multimedia observations of species and ecosystems, Landscape and Urban Planning 21 (1992) 285–297.

25.     M.P. Hamilton, Hummercams, robots, and the virtual reserve, Directors Notebook, February 6, 2000, available from http://www.jamesreserve.edu/news.html.

26.     N. Noury, T. Herve, V. Rialle, G. Virone, E. Mercier, G. Morey, A. Moro, T. Porcheron, Monitoring behavior in home using a smart fall sensor, IEEE-EMBS Special Topic Conference on Microtechnologies in Medicine and Biology, October 2000, pp. 607–610.

27.     J.M. Rabaey, M.J. Ammer, J.L. da Silva Jr., D. Patel, S. Roundy, PicoRadio supports ad hoc ultra-low power I.F. Akyildiz et al. / Computer Networks 38 (2002) 393–22 421 wireless networking, IEEE Computer Magazine (2000) 42–48.

28.     S. Vardhan, M. Wilczynski, G. Pottie, W.J. Kaiser, Wireless integrated network sensors (WINS): distributed in situ sensing for mission and flight systems, IEEE Aerospace Conference, Vol. 7, 2000, pp. 459–463.

29.     M. Ogawa et al., Fully automated biosignal acquisition in daily routine through 1 month, International Conference on IEEE-EMBS, Hong Kong, 1998, pp. 1947–1950.

30.     G. Coyle et al., Home Telecare for the elderly, Journal of Telemedicine and Telecare 1 (1995) 183–184.

31.     E.M. Petriu, N.D. Georganas, D.C. Petriu, D. Makrakis, V.Z. Groza, Sensor-based information appliances, IEEE Instrumentation and Measurement Magazine (December 2000) 31–35.

32.     M.P. Hamilton, Hummercams, robots, and the virtual reserve, Directors Notebook, February 6, 2000, available from http://www.jamesreserve.edu/news.html.

33.     J.M. Rabaey, M.J. Ammer, J.L. da Silva Jr., D. Patel, S. Roundy, PicoRadio supports ad hoc ultra-low power wireless networking, IEEE Computer Magazine (2000) 42–48.

34.     E. Shih, S. Cho, N. Ickes, R. Min, A. Sinha, A. Wang, A. Chandrakasan, Physical layer driven protocol and algorithm design for energy-efficient wireless sensor networks, Proceedings of ACM MobiCom’01, Rome, Italy, July 2001, pp. 272–286.

35.     G.J. Pottie, W.J. Kaiser, Wireless integrated network sensors, Communications of the ACM 43 (5) (2000) 551– 558.

36.     G. Hoblos, M. Staroswiecki, A. Aitouche, Optimal design of fault tolerant sensor networks, IEEE International Conference on Control Applications, Anchorage, AK, September 2000, pp. 467–472.

37.     D. Nadig, S.S. Iyengar, A new architecture for distributed sensor integration, Proceedings of IEEE Southeastcon’93, Charlotte, NC, April 1993.

38.     C. Shen, C. Srisathapornphat, C. Jaikaeo, Sensor information networking architecture and applications, IEEE Personal Communications, August 2001, pp. 52–59.

39.     J. Rabaey, J. Ammer, J.L. da Silva Jr., D. Patel, Pico- Radio: ad-hoc wireless networking of ubiquitous lowenergy sensor/monitor nodes, Proceedings of the IEEE Computer Society Annual Workshop on VLSI (WVLSI’00), Orlanda, Florida, April 2000, pp. 9–12.

40.     C. Intanagonwiwat, R. Govindan, D. Estrin, Directed diffusion: a scalable and robust communication paradigm for sensor networks, Proceedings of the ACM Mobi- Com’00, Boston, MA, 2000, pp. 56–67

41.     S. Meguerdichian, F. Koushanfar, G. Qu, M. Potkonjak, Exposure in wireless ad-hoc sensor networks, Proceedings of ACM MobiCom’01, Rome, Italy, 2001, pp. 139– 150.

42.     J. Yick, G. Pasternack, B. Mukherjee, D. Ghosal, Placement of network services in sensor networks, Self-Organization Routing and Information, Integration in Wireless Sensor Networks (Special Issue) in International Journal of Wireless and Mobile Computing (IJWMC) 1 (2006) 101–112

43.     D. Pompili, T. Melodia, I.F. Akyildiz, Deployment analysis in underwater acoustic wireless sensor networks, in: WUWNet, Los Angeles, CA, 2006.

44.     S. Toumpis, T. Tassiulas, Optimal deployment of large wireless sensor  networks, IEEE Transactions on Information Theory 52 (2006) 2935–2953.

45.     I.F. Akyildiz, E.P. Stuntebeck, Wireless underground sensor networks: research challenges, Ad-Hoc Networks 4 (2006) 669–686.

46.     I.F. Akyildiz, E.P. Stuntebeck, Wireless underground sensor networks: research challenges, Ad-Hoc Networks 4 (2006) 669–686.

47.     I.F. Akyildiz, T. Melodia, K.R. Chowdhury, A survey on wireless multimedia sensor networks, Computer Networks Elsevier 51 (2007) 921–960.


132-138

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

28.

Authors:

Patel Ankit Mahendra, Jayeshkumar R. Pitroda, J. J. Bhavsar

Paper Title:

A Study of Risk Management Techniques for Construction Projects in Developing Countries

Abstract:    Risks have significant impact on construction projects in terms of its primary objectives. Construction projects which are intricate in nature, uncertainty and risks in the same can develop from different sources. The record of the construction industry is not acceptable in terms of coping up with risks in projects. Risk management is a process which consists of identification of risks, assessment with qualitatively and quantitatively, response with a suitable method for handling risks, and then control the risks by monitoring.This study proposes to apply the risk management technique which includes well - documented procedures for the one stop solution all types of hazards most likely to occur during any construction project Lifecycle.

Keywords:
     Risk Management, Construction Projects, Risk  


References:

1.        Akintoye, A.S. and MacLeod, M.J.; “Risk analysis and management in construction”; International Journal of Project Management (1997)
2.        Baker, S., Ponniah, D., and Smith, S.,; Risk response techniques employed currently for major projects, Construction Management & Economics (1999)

3.        Dariusz Skorupka,; “Risk management in building projects”; AACE International Transactions (2003)

4.        Dilesh Pardhi AnandKumar Patil,; “Risk Management In BOT Projects”,; Thesis (2008)

5.        Dr. M. J. Kolhatkar, Er. Amit Bijon Dutta,; “Study of Risk in Construction Projects”, ;GRA (2013)

6.        Ekaterina Osipova,;“Risk management in construction projects: a comparative study of the different procurement options in Sweden”,; Thesis (2008)

7.        F. Y. Y. Ling and L. Hoi,; “Risks faced by Singapore firms when taking construction projects in India,” (2006)

8.        Kinnaresh Patel M.E. (C.E.M.)*,; A study on risk assessment and its management in India,; AJCE (2013)

9.        Mehmood Alam, Dr. Nadeem Ehsan, Ebtisam Mirza, Azam Ishaque,;“Risk Management in construction industry”,;(2010)

10.     Prof. Shakil S. Malek, Nazneen I. Pathan, Haaris Mal,; “Risk Management in Construction Industry”,; IJAR (2013)

11.     S. Q. Wang and M. F. Dulami,; “Risk management frame work for construction projects in developing countries,” (2004)

12.     Smith, N.J., Tony, M., and Jobling, P.,; Managing risk in construction projects, 2th ed: Blackwell Publishing (2006)

13.     Soon Kim; Deepak Bejaj,; Risk management in construction: An approach for contractors in South Korea,; (2000)

14.     Tsung-ChiehTsai, Min-LanYang,; “Risk assessment of Design-Bid-Build and Design-Build Building projects”; Journal of the Operations Research Society of Japan (2010)

15.     Uher, T. E. & Toakley, A. R.; Risk management in the conceptual phase of a project.International Journal of Project Management (1999).

16.     Zenghua  Kuang,; “Risk Management in Construction Projects”; (2011)


139-142

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

29.

Authors:

Samadhan D. Shelke, Pankaj P. Bhangale

Paper Title:

Information Technology Training for Construction Industry

Abstract:  Despite the construction industry’s generally positive reaction to the use of information and communication technologies (ICTs) in many of its functions, some of the profession’s key players reside in a digital divide and do not benefit from advances in technology. The construction workers, an at-risk population with high rates of workplace accidents, are affected by that divide because they rarely take advantage of available ICTs at work. One application of ICTs that can help construction workers is computer-based training (CBT) for occupational safety. However, the design of CBT materials for Indian languages-speaking workers needs to go beyond basic localization of existing products in English. A radical localization approach that uses participatory design sessions with construction workers and their supervisors. The construction  workers reacted positively and retained knowledge from CBT materials, including videos with elements of humor and without graphic representations of accidents, modeled after the genre of a television situation comedy.

Keywords:
     ICTs, IT, CBT, NetsCape, Website, Internet, Usenet.  


References:

1.        Amorous, DL, C Springs and PH Cheney (1992). Quality end user-developed application: some essential ingredients. Database, Winter, 1{11}.
2.        Belcher, LW and HJ Watson (1993). Assessing the value of Conoco's EIS. MIS Quarterly, 17, 239{253}.

3.        Ballantine, J and S Stray (1999). Information systems and other capital investment: evaluation practice compared, Logistics Information Management, 12(1/2), 78{93}.

4.        Betts, M (1992). How strategic is our use of Information Technology in the construction sector? The International Journal of Construction Information Technology, 1(1), 79{97}.

5.        Betts, M, K Mathur, G Ofori and C Lim (1991). The strategic use of information technology in the Construction Sector. In Applications of Information Technology in Construction, Maxwell, JWS (ed.), England: Thomas Telford Ltd.

6.        Brandon, PS and RG Moore (1983). Microcomputers in Building Appraisal. Granada Publishing. Brandon, P (2000). Construction IT: Forward and To What? Implementing IT to Obtain a Competitive Advantage in the 21st Century. H Li, QP Shen, D Scott and PED Love (eds.), pp. 1{15. Hong Kong Polytechnic University.

7.        Bussen, W and MD Myers (1997). Executive information system failure: a New Zealand case study. Journal of Information Technology.


143-151

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

30.

Authors:

Animesh Tiwari, Megha Jain

Paper Title:

Analysis of Supply Chain Management in Cloud Computing

Abstract:    Supply chain management typically involves supervising the transfer of products and goods, such as from a supplier, then to a manufacturer, a wholesaler, a retailer and finally to the consumer. Information technology (IT) refers to the use of computer-based programs to store and manipulate information. IT advances directly can correlate to supply chain management improvements, such as through the rise of effective virtual supply chains. Supply chain information collaboration system bases on cloud computing technology provide efficient supply chain information system based on cloud computing technologies like software as a service (SaaS), platform as service (PaaS) and infrastructure as service (IaaS). With the availability to anytime and anywhere cloud services provide sharing of resources of its services to supply chain. Because supply chain information sharing are demand driven  by nature and increase or decrease globally so it should need scalable distributed system rather than centralize one. This paper adopts basic idea of cloud computing to provide an efficient and scalable solution for supply chain management using distributed datacenter of cloud computing.  

Keywords:
     Cloud Computing, Distributed Cloud, Distributed Datacenter, Supply Chain Management  


References:

1.        Joerg Leukel, Stefan Kirn, and Thomas Schlegel, “Supply Chain as a Service: A Cloud Perspective on Supply Chain Systems”, VOL. 5, NO. 1, IEEE SYSTEMS JOURNAL, pp. 16-27, March 2011,.
2.        M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A.Konwinski, G. Lee, D. Patterson, A. Rabkin, I.  Stoica, and M. Zaharia, “Above The Clouds: A Berkeley View of Cloud Computing”, Technical Report, EECS Department, University of California, Berkeley,  pages 1-23, February 2009.

3.        R. W. Lucky, “Cloud computing”, IEEE Journal of Spectrum, Vol. 46, No. 5,  pages 27-45, May 2009

4.        M. D. Dikaiakos, G. Pallis, D. Katsa, P. Mehra, and A.Vakali, “Cloud Computing: Distributed Internet Computing for IT and Scientific      Research”, IEEE Journal of Internet Computing, Vol. 13, No. 5, , pages 10-13, September/October 2009.

5.        Raj Kumar Buyya, Chee Shin Yeo, and Srikumar Venugopal, “Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities” 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008, IEEE CS Press, Los Alamitos, CA, USA

6.        Shuangqin liu and Bo Wo, “Study on the supply chain management of global companies”, International conference of E-business and E-Government, Guangzhou, People's Republic of China, pages 3297-3301, 7-9 may 2010

7.        B.Andal Supriya and Ilango Djearamane, “RFID based Cloud Supply Chain Management”, International Journal of Scientific & Engineering Research, Volume 4, Issue 5, pp. 2157-2159, May-2013

8.        CHEN JUN and MA YAN WEI, “The Research of Supply Chain Information Collaboration Based on Cloud Computing” Procedia Environmental Sciences 10, pp. 875 – 880, 2011

9.        Bowersox, D.J. and D.J. Closs “Logical Management: The Integrated Supply Chain Process”, New York, U.S.A., McGraw-Hill Companies, 1996

10.     Thomas Schramm, Jonathan wright, Dirk Seng and Derk Jones “Six questions every supply chain executive should ask about Cloud Computing”, ACC10-2460/11-241, Available: http://www.accenture.com/.../10-2460-Supply_Chain_Cloud_PoV_vfinal.pdf

11.     Raj Kumar Buyya, Chee Shin Yeo, and Srikumar Venugopal, Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities” 10th IEEE International Conference on High Performance Computing and Communications (HPCC 2008, IEEE CS Press, Los Alamitos, CA, USA), Sept. 25-27, 2008, Dalian, China

12.     Eirini Aivazidou, Antonios Antoniou, Konstantinos Arvanitopoulos and Agorasti Toka “Using Cloud Computing in Supply Chain Management: Third-Party Logistics on the Cloud”, second international conference on supply chains, Aristotle University of Thessaloniki, Greece, 2012


152-155

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

31.

Authors:

Majid Fereidoon, Gholamreza Khorasani

Paper Title:

Water Quality Simulation in Qarresu River and the Role of Wastewater Treatment Plants in Reducing the Contaminants Concentrations

Abstract:    This paper presents a water quality simulation model considering the some main sources of pollution for Qarresu River near Kermanshah city in Iran . The pollutants such as biochemical oxygen demand (BOD), Total Nitrogen (TN) and Total Phosphorous (TP) descend from some industrial units. QUAL2K software is employed for simulation and estimation of pollution loads during a year. The comparison and assessment of pollutants density shows the best location of any wastewater treatment plant considering the economic and environmental condition.  

Keywords:
     BOD, TN, TP, Qarresu River, QUAL2K.


References:

1.        Azzellino,A., et al .2006, Combined use of the EPAQUAL2E simulation model and factor analysis to assess the source apportionment of point and non point loads of nutrients to surface waters. Science of the total environment. 371. pp.214222.
2.        Carney,E. 2009, Relative influence of lake age and watershed land use on tropic state and water quality of artificial lakes in Kansas. J. Lake Reserve. Manage. vol. 25. pp. 199207.

3.        Chapra, S. C. (1997), Surface Water Quality Modeling, McGraw-Hill Boston, MA.

4.        Chapra, S. C., G. J. Pelletier, and H. Tao (2004), QUAL2K: A Modeling Framework for Simulating River and Stream Water Quality, Version 1.3: Documentation and Users Manual., edited, Civil and Environmental Engineering Dept., Tufts University, Medford, MA.

5.        Cho, J. H., and S. R. Ha (2010), Parameter optimization of the QUAL2K model for a multiplereach river using an influence coefficient algorithm, Science of The Total Environment, 408(8), 1985-1991

6.        Environmental Protection Division (1989), The Amplified Long-Term BOD Test, Protocol/Procedures and Test Specifications. , edited by D. o. N. Resources, p. 38
pp., Atlanta, GA.

7.        Fechrul,M.F., D.,Hendrawan, A.,Sitauati .2006, Land use and water quality relation ships in the cilliwung river basin, Indonesia. Dept. of Environmental Engineering Trisakti University.

8.        Flynn, K., and M. W. Suplee (2011), Using a computer water quality model to derive numeric nutrient criteria: Lower Yellowstone River, MT, edited by M. D. o. E. Quality, Montana Department of Environmental Quality Helena.
9.        Gamvroula, D., Stamatis, G. (2012) Diagnosis of groundwater quality and assessment of contamination sources in the Megara basin (Attica, Greece) Arab J geosci. DOI 10.1007/s12517-012-0533-6
10.     Kannel, P. R., S. Lee, Y. S. Lee, S. R. Kanel, and G. J. Pelletier (2007), Application of automated QUAL2Kw for water quality modeling and management in the Bagmati River, Nepal., Ecological Modelling, 202(3-4), 503-517.

11.     Monaghan,R.M., et al .2007, Linkage Between Land Management Activities and Water Quality in an Intensively Farmed Catchment in Southern New Zealand. Agriculture Ecosystems & Environment, 118:211222.

12.     Prakash Raj Kannel,S., et al .2007, Application of automated QUAL2K for water quality modeling and management in the Bagmati River, Nepal. Ecological Modeling. Vol. 202, Issues 34: 503517.


156-159

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

32.

Authors:

G. Saravanakumar, L. Ravikumar, H. P. Jagadish

Paper Title:

Effect of Temperature on the Performance of Squeeze Film Damper Lubricated With Magnetorheological Fluid

Abstract:    Modern machines demands high speed of rotation and thus requires provision of damping externally to the rotor system to reduce large force small amplitude vibrations. Magnetorheological fluid squeeze film dampers are new kind of dampers used in such applications. The viscosity of these fluids can be readily varied by changing the magnetic field intensity to reduce the vibrations. Magnetorheological fluids squeeze film dampers usually provide variable stiffness and damping at a particular excitation frequency by varying the coil current. This paper examines the performance of such dampers under the influence of temperature which changes due to the coil current flowing through the magnet, wide operating range of the rotor system. The analysis is conducted for every 10oC change in the temperature as mentioned in the earlier work and viscosity change and its effect on the performance of the damper is evaluated theoretically. The stiffness and damping characteristics decrease with increase in temperature. The results are plotted and it provides information on the effect of temperature effect on the performance of Magnetorheological fluid squeeze film dampers.

Keywords:
  Squeeze film damper, Temperature change, Stiffness and dynamic characteristics, Magnetorheological fluid, Speed.


References:

1.        J. D. Carlson, and K. D. Weiss, “A growing attraction to magnetic fluids,”  Machine Design, 1994, 66; 61-64.
2.        C. Carmignani and P. Forte, “Active squeeze film dampers in rotor dynamics”,             Journal of Applied Mechanics and Engineering, 2001; 6 (4): 1-8.

3.        P. Forte, M. Paterno and E. Rustishi, “A Magneto Rheological fluid damper for Rotor applications”, International Journal of Rotating machinery, 2004; 10(3): 175-182.

4.        Chen Guang and Yeo Song Huat, “Research on MR Fluids and its Applications”, Applied Research Project Report RG63/96; Nanyang Technological University, Singapore: 1996.

5.        Rao J.S., “Rotordynamics”, 3rd Edition, New Age International (P) Limited; New Delhi: 2006.

6.        H.P.Jagadish, L. Ravikumar, “Calibration of stiffness and damping characteristics of magnetorheological fluid long squeeze film damper in terms of Reynolds number”, International Journal of Mechanical Engineering Sciences, Part C, 2010; 224(10): 2121-2128.

7.        H.P.Jagadish, L. Ravikumar, “Dynamic characteristics of MR fluid short squeeze film damper in terms of Reynolds number”, International Journal of Aerospace Sciences and Technologies,  2010; 62(2): 141-151.


160-164

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

33.

Authors:

Anindya Sundar Das, Aditya Kumar Singh

Paper Title:

10 GBPS Full Duplex Transmission Using Reed- Solomon Encoder and Decoder

Abstract:   We have proposed and demonstrated a novel architecture for a bidirectional wavelength division multiplexed passive optical network (WDM-PON) system based on forward channel coding (FEC) method by employing Reed-Solomon (RS) encoder and decoder in the configuration. We have used mutually injection locking technique by employing Fabry-Perot laser diode (FPLD) as the broadband light source (BLS). The remodulation technique has been used for the uplink transmission by deploying reflective semiconductor optical amplifier (RSOA) at the user end. The RS codec has enhanced the performance of the system as it can transmit 10 Gbps data rate in the downlink and the uplink as well. Among many types of RS codes we have preferred the RS (255, 223) for its effectiveness and the capacity of burst error correcting. The uplink and downlink transmission performances are checked by the impressive eye diagrams and the low bit error rate (BER), measured at BER tester or eye diagram analyzer. The results provide its utility as an effective and suitable WDM-PON system for next generation broadband communication.

Keywords:
     WDM-PON, RS encoder and decoder, FPLD, RSOA  


References:

1.        N. Frigo, K. C. Reikhman, P. P. Lamone, J. L. Zyshind, J. W. Suhoff and C. Wolf, “A WDM-PON with cost shared components”,  IEEE Photonics technology letters, vol. 6 no.11 pp. 1365- 1367, 1994
2.        M.D. Feuer, J.M. Wiesenfeld, J.S. Perino, C.A. Burrus, G. Raybon, S.C. Shunk, and N.K. Dutta. “Single-port laser-amplifier modulators for local access”, IEEE Photonics Technology Letters, vol.8, no.9, pp. 1175 -1177, Sep 1996.

3.        G. P. Agrawal, “Fiber Optic communication system”, 3rd edition, J. Wiley & Sons. INC. Publication, 2002

4.        S. Park,  S. Kim, K. H. Song, J. Lee, “DWDM based FTTC Network access network”, IEEE/ OSA, J. Lightwave Tech. vol. 9, pp. 1851-1855, 2001

5.        X. Sun, C. K. Chan and L. K. Chen, “A survivable WDM-PON architecture with centralized alternate- path protection switching for traffic restoration”, IEEE Photon.
Tech. Lett. Vol. 18, no. 4, pp. 631-633, 2006

6.        K. M. Choi, C. H. Lee, “Colorless operation of WDM-PON based on wavelength locked Fabry-Perot laser diode,” ECOC’05, Paper We3.3.4, Glasgow, UK, 2005.C. J. Kaufman,

7.        P. Healy, P. Townsend, C. Ford, L. Johnston, P. Townley, I. Lealman, L. Rivers, S. Perrin, R. Moore, “Spectral slicing WDM-PON using wavelength-seeded reflective SOAs,” IEE Electron. Lett., vol. 37, no. 19, pp1181-1182, 2001.

8.        B. Van der Pol, “Forced oscillations in a circuit with nonlinear resistance”, Phil. Mag. vol. 3, pp. 65-80, 1927

9.        R. Adler, “A Study of locking phenomena in oscillators”, Proc. I.R.E and Waves and Electronics,   vol. 34, pp. 65-80, June 1946.

10.     S. L. Woodward, P. P. Iannone, K. C. Reichmann, and N. J. Frigo, “A spectrally sliced PON employing Fabry-Perot Lasers,” IEEE Photon. Tech. Lett., vol. 10, no. 9, pp. 1337-1339, 1998.

11.     K. M. Choi, C. H. Lee, “Colorless operation of WDM-PON based on wavelength locked Fabry-Perot laser diode,” ECOC’05, Paper We3.3.4, Glasgow, UK, 2005.

12.     W. Hung, C. K. Chan, L. K. Chen, F. Tong, “An optical network unit for WDM access networks with downstream DPSK and upstream re-modulated OOK data using injection-locked FP laser,” IEEE Photon. Tech. Lett., vol. 15, no. 10, pp. 1476-1478, Oct. 2003.

13.     H. H. Lu, A. S. Patra, S. Tzeng, W. Ho and H. Yee, “Radio-on-Hybrid WDM Transport Systems Based on Mutually Injection-Locked Fabry-Perot Laser Diodes,” Optical Fiber Technology, vol. 15, no.1, pp. 21-25, 2009

14.     Y.S. Liao and G.R. Lin, 22-channel detuning capacity of a side-mode injection locked FPLD for directly modulated 2.5 Gbit/s DWDM-PON, Proc. OFC/NFOEC, paper OMS8, 2007

15.     P. Peng, W. Peng, K. Feng, H. Chiou, J. Chen, H. Kuo, S. Wang and S. Chi, “OCDMA light source using directly modulated Fabry-Perot laser diode in an external injection scheme ”, IEEE Photonics Technology Letters, Vol. 18, no. 9, 2006

16.     W. Han, N. Zhu, L. Xie, M. Ren, K. Sum, B. Zhang, L. Li and H. Zhang,  “Injection locked Fabry-Perot laser diodes for WDM passive optical network spare function”, Optics Communications (282), pp. 3553- 3557, 2009

17.     W. Lee, M.Y. Park, S.H. Cho, J. Lee, C. Kim, G. Jeong, B.W. Kim, Bidirectional WDM-PON based on gain-saturated reflective semiconductor optical amplifiers, IEEE Photon. Technol. Lett. Vol. 17 no.11 pp. 2460–2462., 2005.

18.     N. Deng, C. K. Chan, L. K. Chen, F. Tong, “Data re-modulation on downstream OFSK signal for upstream transmission in WDM a passive optical network,” IEEE Electron. Lett., vol. 39, no. 24, pp. 1741-1742, Nov. 2003.

19.     E. Wong, K. L. Lee, T. Anderson, “Directly modulated self-seeding reflective SOAs as colorless transmitters for WDM passive optical networks,” OFC/NFOEC’06, Paper PDP49, Anaheim, California, USA, 2006.

20.     S. J. Park, G. Y. Kim, T. Park, E. H. Choi, “WDM-PON system based on the laser light injected reflective semiconductor optical amplifier,” ECOC’05, Paper We3.3.6, Glasgow, UK, 2005.

21.     A. S. Das, S. Das, J. Bhaumik, “Design of RS (255, 251) encoder and decoder in FPGA”, IJSCE, vol-2, Issue- 6, pp. 391-394, 2013.

22.     J. Bhaumik, A. S. Das, J. Samanta, “Architecture for programmable generator polynomial based Reed-Solomon encoder and decoder”, IJSCE, vol-2, Issue- 6, pp. 395-399, 2013.

23.     K.Y Cho, Y. Takushima, and YC Chung. “10-Gb/s Operation of RSOA for WDM-PON”, IEEE Photonics Technology Letters, 20(18):1533-1535, Sep 2008.

24.     K. Cho, A. Agata, Y. Takushima and Y. Chung, “Performance of forward error correction code in 10 Gbps RSOA based WDM-PON”, IEEE Photonics Technology letters Vol. 22, No. 1, pp. 57-59, 2010.


165-167

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

34.

Authors:

Gholamreza Khorasani, Mohammad Reza Maleki Verki, Majid Fereidoon, Hassan Motamed, Ali Yadollahi, Ashkan Tatari, Farzaneh Mirmohammadi, Mohammadreza Khorasani

Paper Title:

Evaluation of Road Safety Performance Based On Analytic Hierarchy Process

Abstract:    This article present the evaluation of SPIs (safety parameter indicator) affecting on road safety with using the MCDM method. Multi criteria decision making is one the method that used in decision management with more than one criteria to prioritize the factors. MCDM has types of technique to prioritize the factors but one of this technique is AHP (Analytic Hierarchy Process) used in this article. Statistical data in this article are taken from 21 European countries. All data classified in 11 safety performance indicators and used in AHP method. All 21 countries will be ranked with AHP based on these data and after ranking we can analysis that wich country has better policy and appropriate safety plane to enhance the quality of safety and transportation.

Keywords:
     Analytic Hierarchy Process, AHP, MCDM, Road Safety Indicators, Safety Management.


References:

1.        Brenda, W. Elke, H.Tom, B.(2011).Hasselt University.Transportation Research Institute : Analyzing Road Safety Indicator Data across Europe. Hasselt University.
2.        Boland M, Staines A, Fitzpatrick P, Scallan E. Urban-rural variation in mortality and hospital admission rates for unintentional injury in Ireland. Inj Prev. 2005;11:38–42. doi: 10.1136/ip.2004.005371. [PMC free article][PubMed] [Cross Ref]

3.        Da Ruan.Elke, H. Multi-Criteria Decision Making Techniques For Combining Different Sets Of Road Safety Performance Indicators Into An Overall Index. Hasselt University Interfaculty Institute Transportation Sciences.

4.        Gomez D, Berube M, Xiong W, Ahmed N, Haas B, Schuurman N, Nathens AB. Identifying targets for potential interventions to reduce rural trauma deaths: a population-based analysis. J Trauma. 2010;69:633–639. doi: 10.1097/TA.0b013e3181b8ef81.[PubMed] [Cross Ref]

5.        Gonzalez RP, Cummings G, Mulekar M, Rodning CB. Increased mortality in rural vehicular trauma: identifying contributing factors through data linkage. J Trauma. 2006;61:404–409.

6.        Hakkert, A.S, Gitelman, V. and Vis, M.A. (Eds.) (2007) Road Safety Performance Indicators: Theory. Deliverable D3.6 of the EU FP6 project SafetyNet.

7.        Haas B, Stukel TA, Gomez D, Zagorski B, De Mestral C, Sharma SV, Rubenfeld GD, Nathens AB. The mortality benefit of direct trauma center transport in a regional trauma system: a population-based analysis. J Trauma Acute Care Surg. 2012;72:1510–1515. doi: 10.1097/TA.0b013e318252510a. discussion 1515–1517. [PubMed] [Cross Ref]

8.        Hermans, E., Brijs, T., Wets, G. and Vanhoof, K., (2009). Benchmarking road safety: Lessons to learn from a data envelopment analysis. Accident Analysis and Prevention, Vol. 41(1), pp. 174-182.

9.        Muelleman RL, Mueller K. Fatal motor vehicle crashes: variations of crash characteristics within rural regions of different population densities. JTrauma. 1996;41:315–320. doi:10.1097/00005373- 199608000-00020.[PubMed] [Cross Ref]

10.     Peek-Asa C, Zwerling C, Stallones L. Acute traumatic injuries in rural populations. Am J Public Health. 2004;94:1689–1693. doi: 10.2105/AJPH.94.10.1689. [PMC free article][PubMed] [Cross Ref]

11.     Sivak, M. & Tsimhoni, O. (2008). Improving traffic safety: Conceptual considerations for successful action. Journal of Safety Research 39, pp. 453 - 457.

12.     Semih, O. Selin, S. Transshipment site selection using the AHP and TOPSIS approaches under fuzzy environment.

13.     Saaty, T.L., 1980. The Analytic Hierarchy Process. McGraw-Hill, New York.

14.     Triantaphyllou, E., (2000). Multi-Criteria Decision Making Methods: A comparative Study, Kluwer Academic Publishers, Dordrecht.
15.     Wisborg T, Brattebo G, Brinchmann-Hansen A, Uggen PE, Hansen KS. Effects of nationwide training of multiprofessional trauma teams in norwegian hospitals. J Trauma. 2008;64:1613–1618. doi: 10.1097/TA.0b013e31812eed68.[PubMed] [Cross Ref]
16.     Yildiz Technical University, Mechanical Faculty, Department of Industrial Engineering, 34349 Yildiz, I_stanbul, Turkey.Accepted 15 May 2007,Available online 4 September 2007.


168-172

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

35.

Authors:

Gholamreza Khorasani, Farzaneh Mirmohammadi, Hassan Motamed, Majid Fereidoon, Ashkan Tatari, Mohammad Reza Maleki Verki, Mohammadreza Khorasani, Shokooh Fazelpour

Paper Title:

Application of Multi Criteria Decision Making Tools in Road Safety Performance Indicators and Determine Appropriate Method with Average Concept

Abstract:    This article presents the implementation of Multi Criteria Decision Making to evaluation of road safety performance in 21 European countries. These countries will be prioritizing based on 11 safety indicator. Simple Additive Weight method will used to evaluate 21 countries to determine which country has a best safety performance to reduce the fatality and accidents and which factors has more effect on performance measures. At last three methods of MCDM such as SAW, AHP and FUZZY TOPSIS will be compared to determine with method is sufficient for ranking of these countries based on safety factors and the result is closer to reality.

Keywords:
     Multi Criteria Decision Making, SAW, AHP, FUZZY TOPSIS, Road Safety Indicators.


References:

1.        Afshari, E.T.(2010). Simple Additive Weighting approach to Personnel Selection problem, International Journal of Innovation, Management and Technology, Vol. 1, No. 5.
2.        Brenda, W. Elke, H.Tom, B.(2011).Hasselt University.Transportation Research Institute : Analyzing Road Safety Indicator Data across Europe. Hasselt University.

3.        Bower, E.T.(2003).Managing and Organizing Comprehensive Highway Safety in Europe. American Trade Initiatives P.O. Box 8228.

4.        Da Ruan.Elke, H. Multi-Criteria Decision Making Techniques For Combining Different Sets Of Road Safety Performance Indicators Into An Overall Index. Hasselt ,University Interfaculty Institute Transportation Sciences.

5.        Departament de Sanitat i Seguretat Social. Estratègies de salut per a l’any 2010, Pla de Salut de Catalunya 2002-2005.Barcelona: Generalitat de Catalunya; 2003. Catalan.

6.        European status report on road safety: towards safer roads and healthier transport choices.Copenhagen: World Health Organization Regional Office for Europe; 2009.

7.        European transport policy for 2010: time to decide Brussels: Comission of the European Communities; 2001. Available from:http://http://ec.europa.eu/transport/strategies/doc/2001_white_paper/lb_com_2001_0370_en.pdf [accessed 15 November 2012].

8.        Farimah Mokhatab-Rafiei, E.T.(2012). A MCDM-based model for predicting corporate credit rating:Some results for the Iran corporate sector.Department of Industrial EngineeringIsfahan. University of Technology. Isfahan, Iran, 84156-83111

9.        Haddon W., Jr The changing approach to the epidemiology, prevention, and amelioration of trauma: the transition to approaches etiologically rather than descriptively based. Am J Public Health Nations Health. 1968;58:1431–8. doi: 10.2105/AJPH.58.8.1431. [PMC free article][PubMed] [Cross Ref]

10.     Jaynes, E. T. (1957). Information Theory and Statistical Mechanics. Physical Review, 106(4), 620-630. Shannon, C. E., & Weaver, W. (1947). The Mathematics Theory of Communication. The University of Illinois Press, Urbana, Ill.

11.     Novoa AM, Pérez K, Borrell C. Efectividad de las intervenciones de seguridad vial basadas en la evidencia: una revisión de la literatura [Evidence-based effectiveness of road safety interventions: a literature review]. Gac Sanit 2009. 23553.e1–e14.e14Spanish. [PubMed]

12.     Novoa AM, Pérez K, Santamariña-Rubio E, Marí-Dell’Olmo M, Tobías A. Effectiveness of speed enforcement through fixed speed cameras: a time series study. Inj Prev. 2010;16:12–6. Doi 10.1136/ip.2008.021485.[PubMed] [Cross Ref]

13.     Novoa AM, Pérez K, Santamariña-Rubio E, Marí-Dell’Olmo M, Cozar R, Ferrando J, et al. Road safety in the political agenda: the impact on road traffic injuries. J Epidemiol Community Health. 2011;65:218–25. doi: 10.1136/jech.2009.094029.[PubMed] [Cross Ref]

14.     Novoa AM, Pérez K, Santamariña-Rubio E, Marí-Dell’Olmo M, Ferrando J, Peiró R, et al. Impact of the penalty points system on road traffic injuries in Spain: a time-series study. Am J Public Health. 2010;100:2220–7. doi: 10.2105/AJPH.2010.192104. [PMC free article][PubMed] [Cross Ref]

15.     Novoa AM, Pérez K, Santamariña-Rubio E, Borrell C. Effect on road traffic injuries of criminalizing road traffic offences: a time-series study. Bull World Health Organ. 2011;89:422–31. doi: 10.2471/BLT.10.082180. [PMC free article][PubMed] [Cross Ref]

16.     Patton GC, Coffey C, Sawyer SM, Viner RM, Haller DM, Bose K, et al. Global patterns of mortality in young people: a systematic analysis of population health data. Lancet. 2009;374:881–92. doi: 10.1016/S0140-6736(09)60741-8.[PubMed] [Cross Ref]

17.     Peden M, Scurfield R, Sleet D, Mohan D, Hyder AA, Jarawan E et al. editors. World report on road traffic injury preventionGeneva: World Health Organization; 2004.

18.     Plasència A, Cirera E. Accidentes de tráfico: Un problema de Salud a la espera de una respuesta sanitaria [Traffic accidents: a health problem waiting for sanitary response]. Med Clin (Barc) 2003. 120378–9.9Spanish. doi: 10.1157/13044732. [PubMed] [Cross Ref]

19.     Saaty, E.T, 1980. The Analytic Hierarchy Process. McGraw-Hill, New York.

20.     Saaty, T. (1990). Decision making for leaders, RWS Publications.

21.     Servei Català de Trànsit. Pla Català de Seguretat Viària 2002-2004Barcelona: Generalitat de Catalunya; 2003. Catalan

22.     Servei Català de Trànsit. Anuari estadístic d’accidents a Catalunya 2010.Barcelona: Servei Català de Trànsit; 2011. Catalan.

23.     Vaidya, O. S. and S. Kumar (2006). "Analytic hierarchy process: An overview of applications." European Journal of Operational Research 169(1): 1-29

24.     World Health Statistics 2008Geneva: World Health Organization; 2008. Available from:

173-177

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html