International Journal of Innovative Technology and Exploring Engineering(TM)
Exploring Innovation| ISSN:2278-3075(Online)| Reg. No.:65021/BPL/CE/12| Published by BEIESP| Impact Factor:4.66
Home
Aims & Scope
Instructions for Authors
Call for Papers
Editorial Board
Archive
Conferences
Fee
Ethics & Policies
Download
FAQ
Contact
Volume-4 Issue 7: Published on December 10, 2014
31
Volume-4 Issue 7: Published on December 10, 2014

  Download Abstract Book

S. No

Volume-4 Issue-7, December 2014, ISSN:  2278-3075 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

Zeiad El-Saghir, Hamdy Kelash, Sayed Elnazly, Hossam Faheem

Paper Title:

Parallel Implementation of Smith-Waterman Algorithm using MPI, OpenMP and Hybrid Model

Abstract: Pairwise sequence alignment is often used to reveal similarities between sequences, locate patterns of conservation, study gene regulation, and infer evolutionary relationships [1]. Although the Smith–Waterman is the only algorithm guaranteed to find the optimal local alignment, it is also the slowest one as it costs O(mn) for computation & space. Also the volume of biological data is doubling about every six months so the total cost is O(kmn) where k is the size of the database [2, 3]. By using parallel hardware and software architecture accurate results can be achieved in reasonable time. In this paper we show a comparative study for parallelizing smith-waterman algorithm using different parallel models, pure MPI, pure OpenMP and hybrid MPI/OpenMP model. Based on the results it will be proved that hybrid programming which employ the coarse grain and fine grain parallelization, is more efficient compared with pure MPI and pure OpenMP.

Keywords:
Smith-Waterman algorithm; MPI; OpenMP; Hybrid MPI/OpenMP; bio-informatics; parallel programming.


References:

1.       Kun-Mao Chao and Louxin Zhang, Sequence   Comparison: Theory and Methods, Springer, 2012 pp. 35.
2.   Michael Farrar, “Striped Smith--Waterman speeds database searches six times over other SIMD implementations,” Bioinformatics, 2007, pp. 156-161, doi: 10.1093/bioinformatics/btl582.

3.       VIPIN CHAUDHARY, FENG LIU, VIJAY MATTA, and LAURENCE T. YANG, “Parallel implementations of local Sequence alignment: hardware and software,” Parallel Computing for Bioinformatics and Computational Biology: Models, Enabling Technologies, and Case Studies, Wiley Series on Parallel and Distributed Computing , 2006, pp. 234.

4.       Hsien-Yu, L., Meng-Lai, Y., and Yi, C. “A parallel implementation of the Smith-Waterman algorithm for massive sequences searching,” Engineering in Medicine and Biology Society, 2004. IEMBS apos;04. 26th Annual International Conference of the IEEE, pp. 2817-2820, San Francisco, CA, USA.

5.       T. Smith and M. Waterman., “Identification of common molecular subsequences,” Journal of Molecular Biology, 1981, pp. 195–197.

6.       Thomas Rauber and Gudula Rünger, Parallel Programming: for Multicore and Cluster Systems, springer, 2011,  pp. 93.

7.       L.A. Smith. “Mixed mode MPI / OpenMP programming,” UK High-End Computing Technology Report, 2000.

8.       www-unix.mcs.anl.gov/mpi/mpich2.

9.       www.lam-mpi.org.

10.    www.open-mpi.org.

11.    Thomas Rauber and Gudula Rünger, Parallel Programming: for Multicore and Cluster Systems, springer, 2010,  pp. 197.

12.    The OpenMP API specification for parallel programming. http://openmp.org/wp/openmp-specifications/.

13.    Georg Hager, Gerhard Wellein. Introduction to High Performance Computing for Scientists and Engineers, CRC Press, 2011, pp.143.

14.    Drosinos, N., and Koziris, N. “Performance comparison of pure MPI vs hybrid MPI-OpenMP parallelization models on SMP clusters,” 18th Int. Parallel & Distributed Symposium, 2004, pp.15.

15.    http://www.clcbio.com/index.php?id=1046.

16.    Ananth Grama, George Karypis, Vipin Kumar and Anshul Gupta, “Introduction to Parallel Computing, 2nd ed. Addison Wesley, 2003, pp.95.

17.    http://www.mcs.anl.gov/research/projects/mpich2/.

18.    http://gcc.gnu.org/.

19.    http://www.bioinformatics.org/sms2/random_dna.html.


1-5

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.

Authors:

Ponugoti Sri Lakshmi, Kande Dayakar, Dola Sanjay S

Paper Title:

High Step-Up DC–DC Converter for AC Photovoltaic Module Application

Abstract:  Photovoltaic (PV) power-generation market of ac PV module has shown obvious growth. However, a high voltage gain converter is essential for the module’s grid connection through a dc–ac inverter. This paper proposes a converter that employs a floating active switch to isolate energy from the PV panel when the ac-module is OFF; this particular design protects installers and users from electrical hazards. Without extreme duty ratios and the numerous turns-ratios of a coupled inductor, this converter achieves a high step-up voltage-conversion ratio; the leakage inductor energy of the coupled inductor is efficiently recycled to the load. These features explain the module’s high-efficiency performance. The detailed operating principles and steady-state analyses of continuous, discontinuous modes are described. A 15V input voltage, 200V output voltage, 100W output power proto type circuit of the proposed converter has been implemented; its maximum efficiency is up to 95.3% and full-load efficiency is 92.3%. 

Keywords:
 AC module, coupled inductor, high step-up volt- age gain, single switch.


References:

1.       T. Shimizu, K. Wada, and N. Nakamura, “Flyback-type single-phase utility interactive inverter with power pulsation decoupling on the dc input for an ac photovoltaic module system,” IEEE Trans. Power Electron., vol. 21, no. 5, pp. 1264–1272, Jan. 2006. 
2.       C. Rodriguez and G. A. J. Amaratunga, “Long-lifetime power inverter for photovoltaic ac modules,” IEEE Trans. Ind. Electron., vol. 55, no. 7, pp. 2593–2601, Jul. 2008. 

3.       S. B. Kjaer, J. K. Pedersen, and F. Blaabjerg, “A review of single-phase grid-connected inverters for photovoltaic modules,” IEEE Trans. Ind. Appl., vol. 41, no. 5, pp. 1292–1306, Sep./Oct. 2005. 

4.       J. J. Bzura, “The ac module: An overview and update on self-contained modular PV systems,” in Proc. IEEE Power Eng. Soc. Gen. Meeting, Jul. 2010, pp. 1–3. 

5.       B. Jablonska, A. L. Kooijman-van Dijk, H. F. Kaan, M. van Leeuwen, G.

6.       T. M. de Boer, and H. H. C. de Moor, “PV-PRIVE project at ECN, five

7.       years of experience with small-scale ac module PV systems,” in Proc. 20th

8.       EurPhotovoltaic Solar Energy Conf., Barcelona, Spain, Jun. 2005,

9.       pp. 2728–2731. 

10.    T. Umeno, K. Takahashi, F. Ueno, T. Inoue, and I. Oota, “A new approach to low ripple-noise switching converters on the basis of switched- capacitor converters,” in Proc. IEEE Int. Symp. Circuits Syst., Jun. 1991, pp. 1077– 1080. 

11.    B. Axelrod, Y. Berkovich, and A. Ioinovici, “Switched-capacitor/ switched-inductor structures for getting transformer less hybrid dc–dc

12.    PWM converters,” IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 55, no. 2, pp. 687–696, Mar. 2008.

13.    B. Axelrod, Y. Berkovich, and A. Ioinovici, “Transformerless dc–dc con-verters with a very high dc line-to-load voltage ratio,” in Proc. IEEE Int. Symp. Circuits Syst. (ISCAS), 2003, vol. 3, pp. 435–438. 

14.    H. Chung and Y. K. Mok, “Development of a switched-capacitor dc–dc boost converter with continuous input current waveform,” IEEE Trans. Circuits Syst. I, Fundam. Theory Appl., vol. 46, no. 6, pp. 756–759, Jun. 1999. 

15.    T. J. Liang and K. C. Tseng, “Analysis of integrated boost-flyback

16.    step-up converter,” IEE Proc. Electrical Power Appl., vol. 152, no. 2, pp.

17.    217–225, Mar. 2005.

18.    Q. Zhao and F. C. Lee, “High-efficiency, high step-up dc–dc converters,” IEEE Trans. Power Electron., vol. 18, no. 1, pp. 65–73, Jan. 2003.

19.    M. Zhu and F. L. Luo, “Voltage-lift-type cuk converters: Topology and analysis,” IET Power Electron., vol. 2, no. 2, pp. 178–191, Mar. 2009.

20.    J. W. Baek, M. H. Ryoo, T. J. Kim, D. W. Yoo, and J. S. Kim, “High boost converter using voltage multiplier,” in Proc. IEEE Ind. Electron. Soc. Conf. (IECON), 2005, pp. 567–572.

21.    J.Xu, “Modeling and analysis of switching dc–dc converter with coupled-inductor,” in Proc. IEEE 1991 Int. Conf. Circuits Syst. (CICCAS), 1991, 717–720.

22.    R. J. Wai, C. Y. Lin, R. Y. Duan, and Y. R. Chang, “High-efficiency dc–dc converter with high voltage gain and reduced switch stress,” IEEE Trans. Ind. Electron., vol. 54, no. 1, pp. 354–364, Feb. 2007.

23.    S. M. Chen, T. J. Liang, L. S. Yang, and J. F. Chen, “A cascaded high step-up dc–dc converter with single switch for micro source applications,” IEEE Trans. Power Electron., vol. 26, no. 4, pp. 1146–1153, Apr. 2011.

24.    T. J. Liang, S. M. Chen, L. S. Yang, J. F. Chen, and A. Ioinovici, “Ultra large gain step-up switched-capacitor dc–dc converter with coupled inductor for alternative sources of energy,” IEEE Trans. Circuits Syst. I, to be published.

25.    L. S. Yang and T. J. Liang, “Analysis and implementation of a novel bidirectional dc–dc converter,” IEEE Trans. Ind. Electron., vol. 59, no. 1,

26.    422–434, Jan. 2012.

27.    W. Li and X. He, “Review of non-isolated high-step-up dc/dc converters in photovoltaic grid-connected applications,” IEEE Trans. Ind. Electron., vol. 58, no. 4, pp. 1239–1250, Apr. 2011.

28.    S. H. Park, S. R. Park, J. S. Yu, Y. C. Jung, and C. Y. Won, “Analysis and design of a soft-switching boost converter with an HI-Bridge auxiliary resonant circuit,” IEEE Trans. Power Electron., vol. 25, no. 8, pp. 2142– 2149, Aug. 2010.

29.    G. Yao, A. Chen, and X. He, “Soft switching circuit for interleaved boost converters,” IEEE Trans. Power Electron., vol. 22, no. 1, pp. 80–86, Jan. 2007.

30.    Y. Park, S. Choi, W. Choi, and K. B. Lee, “Soft-switched interleaved boost converters for high step-up and high power applications,” IEEE Trans. Power Electron., vol. 26, no. 10, pp. 2906–2914, Oct. 2011.

31.    Y. Zhao, W. Li, Y. Deng, and X. He, “Analysis, design, and experimentation of an isolated ZVT boost converter with coupled inductors,” IEEE Trans. Power Electron., vol. 26, no. 2, pp. 541–550, Feb. 2011.

32.    H. Mao, O. Abdel Rahman, and I. Batarseh, “Zero-voltage-switching dc– dc converters with synchronous rectifiers,” IEEE Trans. Power Electron., vol. 23, no. 1, pp. 369–378, Jan. 2008.

33.    J. M. Kwon and B. H. Kwon, “High step-up active-clamp converter with input-current doubler and output-voltage doubler for fuel cell power systems,” IEEE Trans. Power Electron., vol. 24, no. 1, p. 108–115, Jan. 2009.

34.    S. Dwari and L. Parsa, “An efficient high-step-up interleaved dc–dc converter with a common active clamp,” IEEE Trans. Power Electron., vol. 26, no. 1, pp. 66–78, Jan. 2011.

35.    C. Restrepo, J. Calvente, A. Cid, A. El Aroudi, and R. Giral, “A non-inverting buck-boost dc–dc switching converter with high efficiency and wide bandwidth,” IEEE Trans. Power Electron., vol. 26, no. 9, pp. 2490– 2503, Sep. 2011.

36.    K. B. Park, G. W. Moon, and M. J. Youn, “Nonisolated high step-up boost converter integrated with sepic converter,” IEEE Trans. Power Electron., vol. 25, no. 9, pp. 2266–2275, Sep. 2010.

37.    L. S. Yang, T. J. Liang, and J. F. Chen, “Transformerless dc–dc converters with high step-up voltage gain,” IEEE Trans. Ind. Electron., vol. 56, no. 8, 3144–3152, Aug. 2009.

38.    N. Pogaku, M. Prodanovic, and T. C. Green, “Modeling, analysis and testing of autonomous operation of an inverter-based microgrid,” IEEE Trans. Power Electron., vol. 22, no. 2, pp. 613–625, Mar. 2007.


6-12

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

Seyed Gholamreza Hashemi, Gholamreza Ghodrati Amiri, Seyed Ali Razavian Amrei

Paper Title:

Necessity of Qom’s City Buildings Improvement

Abstract:   Earthquakes are natural phenomenon which can cause huge losses of life and economy .Due to locating on seismic belt and its seismic condition, Iran country, is very sensitive to earthquake. Because of estimating importance of damages and casualties through earthquake, many countries have selected different methods for seismic hazard analysis. The objective of the current study is to evaluate the seismic vulnerability of buildings in Qom city based on the Hazus method and geographical information system (GIS). To this end, structure of engineering specification, the peak ground acceleration and soil information layers were utilized for developing a geotechnical map. Since there is a lot of data, SELENA software is used for calculating. The results show that the buildings are in one and  six districts need to improvement.

Keywords:
  Seismic Hazard Analysis; Hazus Method; improvement of buildings; Fragility Curve; Response Spectrum.


References:

1.       Geology organization of Iran, database of natural geology, 2013-2014 .
2.       Rashed, T. and Weeks, J.: Assessing vulnerability to earthquake hazards through spatial multi criteria analysis of urban areas, Int. J. Geogr. Inf. Sci., 17, 547–576, 2003.

3.       Maithani, S. and Sokhi, B. S.: Radius: a methodology for earthquake hazard assessment in urban areas in a GIS environment, Case study Dehradun Municipal area, ITPI, 3, 55–64, available at: http://itpi.org.in/pdfs/july2004/chapter7.pdf (last access: 2 September 2013), 2004.

4.       Servi, M.: Assessment of vulnerability to earthquake hazards using spatial multi criteria analysis: Odunpazari, Eskisehir case study, M.S. thesis, Middle East Technical University, Turkey, 94 pp., 2004.

5.       Gulati, B.: Earthquake risk assessment of buildings: applicability of HAZUS in Dehradun, India, M.S. thesis, ITC, the Netherlands, 121 pp., 2006.

6.       Thapaliya, R.: Assessing building vulnerability for earthquake using field survey and development control data: a case study in Lalitpur sub metropolitan city, Nepal, Ms. thesis, ITC, the Netherlands, 103 pp., 2006.

7.       Cole, S. W., Yebang, Xu., and Burton, P. W.: Seismic hazard and risk in Shanghai and estimation of expected building damage, Soil Dyn. Earthq. Eng., 28, 778–794, doi:10.1016/j.soildyn.2007.10.008, 2008.

8.       Nath, S. K. and Thingbaijam, K. K. S.: Seismic hazard assessment – a holistic microzonation approach, Nat. Hazards Earth Syst. Sci., 9, 1445–1459, doi:10.5194/nhess-9-1445-2009, 2009.

9.       Zahraie, M. and Ershad, L.: Study on seismic vulnerability of building structures in Qazvin, Journal of Faculty of Engineering (University of Tehran), 39, 287–297, 2005 (in Persian).

10.    Aghataher, R., Delavar, M. R., Nami, M. H., and Samnay, N.: A Fuzzy-AHP decision support system for evaluation of cities vulnerability against earthquakes, World Appl. Sci. J., 3, 66–72, 2008.

11.    Amini Hosseini, K., Hosseini, M., Jafari, M. K., and Hosseinioon, S.: Recognition of vulnerable urban fabrics in earthquake zones: a case study of the Tehran metropolitan area, J. Seismol. Earthq. Eng., 10, 175–187, 2009.

12.    Hataminejad, H., Fathi, H., and Eshghabadi, F.: Criterion vulnerability assessment earthquake about city, case study region 10 Tehran, J. Human Geogr. Res., 68, 1–2, 2009 (in Persian).

13.    Hashemi, M. and Alesheikh, A. A.: Development and implementation of a GIS-based tool for spatial modeling of seismic vulnerability of Tehran, Nat. Hazards Earth Syst. Sci., 12, 3659–3670, doi:10.5194/nhess-12-3659-2012, 2012.

14.    Sergio Molina, Dominik H. Lang, Conrad D. Lindholm, Fredrik Lingvall, and EmrahErduran, June 28, 2012, Manual for the Earthquake Loss Estimation, Tool: SELENA  

15.    International Building Code (IBC-2006). Technical report,  International Code Council, United States, January 2006.

16.    Multi-hazard Loss Estimation Methodology, Technical manual.(2003) Federal Emergency Management Agency, Washington DC, USA

17.    BHRC (Building and Housing Research Center): Iranian Code of Practicefor Seismic Resistant Design of Buildings, publicationPNS-253, 3rd Edn., Iran, 135 pp., 2005 (in Persian).

18.    Mahdizadeh, A.: Report on retrofit procedure of school buildings in Islamic Republic of Iran, Ministry of Education, State Organization of Schools Renovation, Iran, 88 pp., available at: http://www.nosazimadares.ir/behsazi/default.aspx (last access: 2 September 2013), 2011.

19.    Residential and urbanization office, GIS map of Qom city , 2011-2012.


13-19

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

4.

Authors:

Nikolaos Karatzidis, Vasileios C. Drosos, Kosmas-Aristotelis Doucas, Vasileios Giannoulas

Paper Title:

Protection Degree from Forest Fires at the Mountainous Forests of Greece 

Abstract:    Forest fires are an ancient phenomenon. Appear, however, with devastating frequency and intensity over the last 30 years. In our country, the climatic conditions in combination with the intense relief, favor their rapid spread. Considering the fact that environmental conditions provided for decades even worse (increased temperature, drought and vegetation), then the problem of forest fires in our country, is expected to become more intense. This paper aims to focus on developing an optimization model for the opening up of the forest mountainous areas taking into account the prevention and suppression of forest fires. Research areas are the mountainous forest complex of W. Nestos of Drama Prefecture, the university forest of Taxiarchis – Vrastama of Chalkidiki Prefecture and the forest complex of Lailias of Serres Prefecture. The percentage of forest protection area can be reached by fire hose is examined under the light whether the total hose length corresponds to the actual operational capacity to reach a fire source. The most important forest technical infrastructures to prevent fire are road networks (opening up) for fire protection and buffer zones. Patrols of small and agile van 4×4 appropriately equipped (hose length of 500 meters and putting pressure on uphill to 300 meters) for the first attack of the fire in the summer months coupled with early warning of fire lookout stations adequately cover the forest protection of the mountainous forest areas.

Keywords:
   GIS, opening up, protection, wild fires.


References:

1.       Akay, Abdullah E., Kosmas, Doucas, Orhan, Erdaș, Hakan, Oguz, Fatih, Sivrikaya, “Using GIS Techniques to Determine Fire Protection Zones Considering Forest Road Network.” Proc. Concern, Knowledge and Accountability in Today’s Environment, (2012)
2.       Dimitrakopoulos, A. P., “Preliminary presentation of the distribution of forest fires and burnt areas in relation to the time the initial intervention in Greece, during the decade 1986-1995,” Forest Research, 13(2), 26-36 (2001).

3.       Dimitrakopoulos, A. P. and Skourtos, M. S., “Economic evaluation of the effectiveness of forest fires in Greece,” Proc. of the 2nd Conference on Environmental Science and Technology, 299-308 (1991).

4.       Dimitrakopoulos, A. P. “Analysis of fire environment and parameters of firefighting of large forest fires in Greece during the five years from 1990 to 1994,” Scientific Annals of the Department of Forestry and Natural Environment, (2), 533-544 (1998).

5.       Oguz, H., Akay, A. E., Erdas, O., Doucas, K., Culci, S., “The Effects of Forest Fires on Land Use/Land Cover Change: A Case Study of Samandag,” Proc. Forest-Water Interactions with respect to Air Pollution and Climate Change, 34-45 (2012).

6.       Tsakalidis, S. and Gitas, J., “Use of Geographic Information Systems (GIS) in identifying sites with fire-fighting facilities,” Geotechnical Scientific Issues, 19(2), 60-72 (2008).

7.       Xanthopoulos , G. and Varela, V., “Forest fire risk distribution in Greece based on the data for the 1983–93 period,” Geotechnical Scientific Issues, 10(2), 178–190 (1999).


20-24

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

5.

Authors:

Nukman Bin Yusoff, Abdulaziz S. Alaboodi, Osama I. Alsultan

Paper Title:

Investigation of CNC Turning Tool Wearing using Image Processes

Abstract:  Tool wear affects both spacemen dimensional precision and surface quality. Therefore, the prediction of tool wear amount during machining processes is very important in order to obtain high precision parts, which is reducing the manual fit operations, and production cost. Image processing analysis has been used to investigate tool wearing. One of the most common methods for image processing is texture analysis. That is the gray level co-occurrence matrix (GLCM), which have large number of texture features. In this paper, the relationship between GLCM texture features and the cutting tool wear in CNC turning operations has been investigated. Cutting tool wear has been represented by the machining time. A vision system has been employed to capture images for specimens with various machining time for the same cutting tool then images will analyzed by MATLAB functions codes, to calculate the  texture features. Results showed that four texture features have good correlations with the machining time of the cutting tool.

Keywords:
  CNC, GLCM, Tool Wearing, texture features, vision system, Image processing.


References:

1.       R. Jain, R. Kasturi, and B. G. Schunck. Machine Vision. McGraw-Hill, Inc., 1995.
2.       D. A. Forsyth and J. Ponce. Computer Vision. Pearson Education, Inc., 2003.

3.       Parker, J.R. Algorithms for image processing and computer vision, John Wiley & Sons. Inc, 1997.

4.       Patel, D., Hannah, I. and Davies, E.R. Foreign object detection via texture analysis, In: Proceedings of the 12th IAPR International Conference on Computer Vision & Image Processing, vol. 1, no. 9-13, 1994, pp 586-588.

5.       Pichler, O., Teuner, A. and Hosticka B.J. A comparison of texture extraction using adaptive Gabor filtering, pyramidal and tree structured wavelet transforms, Pattern Recognition, 1996, 29(5), 733-742.

6.       Coggins, J.M. and Jain, A.K. A spatial filtering approach to texture analysis, Pattern Recognition Letters, 1985, 3, 195–203.

7.       Zheng, C., Sun, D.W. and Zheng, L. Recent applications of image texture for evaluation of food qualities – a review, Trends in Food Science & Technology, 2006, 17(3), 113–128.

8.       Bharati, M.H., Liu, J.J. and MacGregor, J.F. Image texture analysis: methods and comparisons, Chemometrics and Intelligence Laboratory Systems, 2004, 72, 57–71.

9.       Park, B., Lawrence, K.C., Windham, W.R., Chen, Y.R. and Chao, K. Discriminant analysis of dual-wavelength spectral images for classifying poultry carcasses, Computers and Electronics in Agriculture, 2002, 33, 219-231.

10.    Quevedo, R., Carlos, L.G., Aguilera, J.M. and Cadoche, L. Description of food surface and microstructural changes using fractal image texture analysis, Journal of food engineering, 2002, 53, 361-371.

11.    Gadelmawla, E.S. A vision system for surface roughness characterization using the gray level co-occurrence Matrix, NDT&E International, 2004, 37, 577–588.

12.    Ho, S.Y., Lee, K.C., Chen, S.S. and Ho, S.J. Accurate estimation of surface roughness from texture features of the surface image using an adaptive neuro-fuzzy inference system, Precision Engineering, 2005, 29, 95–100.

13.    Lee, B.Y. and Tarng, Y.S. Surface roughness inspection by computer vision in turning operations, Int. J. Machine Tools Manufacture, 2001, 41, 1251–63.

14.    Lee, B.Y., Juan, H. and Yu, S.F. A study of computer vision for measuring surface roughness in the turning process, Int. J. Adv. Manufacturing Technol., 2002, 19, 295–302.

15.    Ho, S.Y., Lee, K.C., Chen, S.S. and Ho, S.J. Accurate modeling and prediction of surface roughness by computer vision in turning operations using an adaptive neuro-fuzzy inference system, Int J Machine Tools Manufacture, 2002, 42, 1441–1446.

16.    Tsai, D.Y. and Kojima, K. Measurements of texture features of medical images and its application to computer-aided diagnosis in cardiomyopathy, Measurement, 37(3), 2005, 284–292.

17.    Chandraratne, M.R., Samarasinghe, S., Kulasiri, D. and Bickerstaffe, R. Prediction of lamb tenderness using image surface texture features, Journal of Food Engineering, 2005, 28, 1-8.

18.    Day, D.D. and Rogers, D. Fourier-based texture measures with application to the analysis of the cell structure of baked products, Digital Signal Processing, 1996, 6, 138–144.

19.    Paliwal, J., Visen, N.S., Jayas, D.S. and White, N.D.G. Cereal grain and dockage identification using machine vision, Biosystems Engineering, 2003, 85, 51–57.

20.    Kondo, N., Ahmad, U., Monta, M. and Murasc, H. Machine vision based quality evaluation of Iyokan orange fruit using neural networks, Computers and Electronics in Agriculture, 2000, 29, 135–147.

21.    Thybo, A.K., Szczypiński, P.M., Karlsson, A.H., Dønstrup, S., Stødkilde-Jørgensen, H.S. and Andersen, H.J. Prediction of sensory texture quality attributes of cooked potatoes by NMR imaging (MRI) of raw potatoes in combination with different image analysis methods, Journal of Food Engineering, 2004, 61, 91–100.

22.    Andrew Otieno, Chandhana Pedapati, Xiaonan Wan, Haiyan Zhang. Imaging and Wear Analysis of Micro-tools Using Machine Vision, Proceedings of the International Conference on Engineering & Technology (IJME-Intertech), October 19-21, 2006, Kean University, IT 301: Paper # 071.

23.    Kassim, A.A., Zhu Mian, Mannan, M. A. Texture Analysis using fractals for tool wear monitoring. IEEE, 2002, 3, 105-108.

24.    Kassim, A.A., Zhu Mian, Mannan, M. A. Connectivity oriented fast Hough transform for tool wear monitoring. Pattern Recognition, 2004, 37, 1925-1933.

25.    Peng-Yang Li, Chong-Yang Hao, Shuang-Wu Zhu. Machining tools wear condition detection based on wavelet packet. Proceedings of the Sixth International Conference on Machine Learning and Cybernetics, Hong Kong, 19-22 August 2007, pp 1559-1564.

26.    David Kerr, James Pengilley, Robert Garwood, Assessment and visualisation of machine tool wear using computer vision. International Journal of Advanced Manufacturing Technology, 2006, 28(7-8), 781–791.

27.    Volkan Atli A., Urhan O., Ertürk S., and Sönmez M. A computer vision-based fast approach to drilling tool condition monitoring. Proc. IMechE Part B: J. Engineering Manufacture, 2006, 220, pp. 1409-1415.


25-29

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

6.

Authors:

M. K. Sharma, Kuldip Singh, Ashok Kumar

Paper Title:

MHD Flow and Heat Transfer through a Circular Cylinder Partially Filled with non-Darcy Porous Media

Abstract:   Steady incompressible axisymmetric flow in a circular cylinder partially filled with concentric cylinder of non-Darcy porous medium is studied in the influence of a transverse static magnetic field. The Joule heating effect produced by the magnetic field is also included to analyze effect of magnetic field and fluid flow field on heat convection process. The governing equations of flow and heat transfer are non-linear coupled differential equations, are solved with Quasi-numerical method – the Differential Transform method. The velocity and temperature profiles for the fluid saturated porous region and clear fluid annulus region are derived and computed with the use of Matlab at various physical parameters and there effects are discussed through graphs. The skin-friction coefficient and Nusselt number at the wall of the outer cylinder and at the surface of the concentric inner porous cylinder are computed and discussed. 

Keywords:    MHD, non-Darcy, Partial filled circular pipe, Joule heating.


References:

1.          Abbas, Z., Majeed, A., Javed, T. (2013) Thermal radiation effects on MHD flow over a stretching cylinder in a porous medium.
2.          Aldoss, T. K. (2014) MHD mixed convection flow about a vertical cylinder embedded in a porous medium is considered using non-Darcian model with variable heat transfer boundary. International Communications in Heat and Mass Transfer Vol.23 (4) pp.517-530.

3.          Biazar, J., Elslami, M. (2010) Differential transform method for quadratic Ricatti Differential equation. International Journal of Nonlinear Science, Vol.9(4) pp. 444-447.

4.          Chamkha, A.J. (2011) Heat and Mass Transfer from MHD Flow over a Moving Permeable Cylinder with Heat Generation or Absorption and Chemical Reaction. Communications in Numerical Analysis Vol. 2011, doi 10.5899/2011/cna-00109.

5.          Farshid, M. (2011) Differential transform method for solving linear and non-linear systems of ordinary differential equations. Applied Mathematics Sciences, Vol.5 (70), pp.3465-3472.

6.          Javed, Ali (2012) One dimensional differential transform method for higher order boundary value problems in finite domain. Int.J.Contemp.Math.Sciences,Vol.2012(6) pp.263-272

7.          Loganathan,  P., Kannan,  M., Ganesan, P. (2011) MHD effects on free convective flow over moving semi-infinite vertical cylinder with temperature oscillation. Applied Mathematics & Mechanics, Vol. 32(11), pp 1367.

8.          Nagaraju, G., Murthy, J. V. R, Sai, K. S. (2013) Steady MHD flow of micropolar fluid            between two rotating cylinders with porous lining. Acta Technica Corvininesis-Blletin of Engineering Vol. 3(3), pp. 115.

9.          Shihhao, Y., Tsai, J. C., Leong J. C. (2014) Analytical Solution for MHD Flow of a Magnetic Fluid within a Thick Porous Annulus. Journal of Applied Mathematics Vol. 2014, Article ID 931732, 10 pages.

10.       Suneetha, S., Bhasker, R. N. (2014) Radiation and mass transfer effects on MHD free convection flow past a moving vertical cylinder in a porous medium.

11.       Yadav, R. S., Sharma, P. R. (2014) Effects of Porous Medium on MHD Fluid Flow along a Stretching Cylinder. Annals of Pure and Applied Mathematics Vol. 6(1), pp. 104-113.

12.       Ziya, U., Manoj K. (2011) Mhd Heat and Mass Transfer Free Convection Flow Near the Lower Stagnation Point of an Isothermal Cylinder Imbedded in Porous Domain with the Presence of Radiation. Jordan Journal of Mechanical and Industrial Engineering, Vol. 5(2) pp. 133-138.


30-42

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

7.

Authors:

Brijesh Kumar Patel, Mukti Pathak

Paper Title:

Survey on Cryptography Algorithms

Abstract: Cryptography is that discover and study of methods and procedures for secure communication within the existence of third parties. There is a great number of techniques used in order to achieve the integrity, availability and data protection to secure information. This paper will present a viewpoint on the current state of play in the field of cryptography algorithms.  Cryptography offers a lot of techniques which nowadays are difficult to fail. In this paper, we want to prove competency of different techniques by comparing the different types of crypto algorithms like DES, TDES, AES, Blowfish, PGP , RSA  and also by presenting their weaknesses and strengths.

Keywords:
Cryptography, AES, DES, TDES, Blowfish, PGP, RSA


References:

1.       Behroz A. Forouzan, “Cryptography & Network Security”, McGraw Hill Publication,2008, New Delhi.
2.       Georgiana Mateescuc, Marius Vladescu “A Hybrid Approach of System Securityfor Small and Medium Enterprises: combining different Cryptography techniques”, Federated Conference on Computer Science and Information Systems pp. 659–662,IEEE 2013

3.       Gary C. Kessler, An overview of Cryptography, 28 April 2013http://www.garykessler.net/library/crypto.html

4.       RSA Laboratories- Chryptographic tools; section 2.1.5. unpublished;http://www.rsa.com/rsalabs/node.asp?id=2174

5.       Ing. Cristian MARINESCU, prof.dr.ing. Nicolae ŢĂPUŞ ; “An Overview of the Attack Methods Directed Against the RSA Algorithm”; Revista Informatica Economica, nr. 2(30)/2004

6.       Othman O. Khalifa, MD Rafiqul Islam, S. Khan and Mohammed S.Shebani, “Communication Cryptography”,2004 RF and Microwave Conference, Oct 5-6, Subang, Selangor, Malaysia.

7.       G. Fang and H. Liu, “The research of database encryption based on hybrid cipher system”, Journal of Harbin University of Science and Technology, 2008,13(5): 33-35.

8.       Rivest, R.; Shamir, A.; Adleman, L. (1978). "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems".Communications of the ACM 21 (2): 120–126.

9.       Robinson, Sara (June 2003). "Still Guarding Secrets after Years of Attacks, RSA Earns Accolades for its Founders". SIAM News 36(5).


43-46

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

8.

Authors:

B. Suresh Kumar, B. L. Shivakumar

Paper Title:

Spine Segmentation in Medical Image Processing using Unsupervised learning

Abstract:  Image segmentation may be a method of segmenting a picture into teams of pixels supported some criterions. The aim of image segmentation is to alter or change the image illustration for the aim of straightforward understanding or faster analysis. Previously the fuzzy C-means (FCM) cluster algorithmic program was for the most part utilized in numerous medical image segmentation approaches.  The normal two-component MRF model for segmentation needs coaching knowledge to estimate necessary model parameters and is therefore unsuitable for unsupervised segmentation. In order to beat the disadvantages of as sorted segmentation processes a brand new methodology of unattended segmentation is projected victimization ROR (Robust Outlyingness Ratio). The advantages of proposed method are to improve accuracy level and speed of time.

Keywords:
 Adaptive Fuzzy K-Means (AFKM), Centrum,  Fuzzy-C-Means (FCM), Spinal cord, unattended segmentation, Vertebral..


References:

1.       Klinder T, Ostermann J, Ehm M, Franz A, Kneser R, Lorenz C. Automated model-based vertebra detection, identification, and segmentation in CT images. MedImage Anal 2009;13:471–82.      
2.       Stern D, Likar B, Pernus F, Vrtovec T. Parametric modelling and segmen-tation of vertebral bodies in 3D CT and MR spine images. Phys Med Biol2011;56(23):7505–22.

3.       Ma J, Lu L. Hierarchical segmentation and identification of thoracic vertebrausing learning-based edge detection and coarse-to-fine deformable model.Comput Vis Image Underst 2013;117(9):1072–83.

4.       W. X. Kang, Q. Q. Yang, R. R. Liang,“The Comparative Research on Image Segmentation Algorithms”, IEEE Conference on ETCS, pp. 703-707, 2009.

5.       K.K. Singh, A. Singh,“A Study of Image Segmentation Algorithms for Different Types of Images”, International Journal of Computer Science Issues, Vol. 7, Issue 5, 2010.

6.       P.Lukac, R. Hudec, M. Benco, P. Kamencay, Z. Dubcova, M. Zachariasova,“Simple Comparison of Image Segmentation Algorithms Based on Evaluation Criterion”, IEEE Conference on Radio elektronika, pp. 1-4, 2011.


47-50

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

9.

Authors:

Leelavathy S. R

Paper Title:

An Improved Distance Vector by Naming and Protecting from Wormholes in Wireless Sensor Networks

Abstract: Node localization becomes an important issue in the wireless sensor network as its broad applications in environment monitoring, emergency rescue and battlefield surveillance, etc. fundamentally the DV-Hop localization mechanism function well with the support of beacon nodes that have the potential of self-positioning. However, if the network is invaded by a wormhole attack, the attacker can tunnel the packets via the wormhole link to cause severe impacts on the DV-Hop localization process. The distance- vector propagation phase during the localization even aggravates the positioning result, compared to the localization schemes without wormhole attacks. In this paper, the impacts of wormhole attack on DV- Hop localization scheme and advanced DV -Hop localization. Based on this a label-based secure localization scheme is proposed to defend against the wormhole attack

Keywords:
  Localization, sensors, beacons, naming, WSN, Distance vector, improved DV Hop.


References:

1.        N. Bulusu, J. Heidemann, and D. Estrin, “GPS-less low cost outdoor localization for very small devices,” pp. 28–34, 7 2000.
2.        T. He, C. Huang, B. Blum, J. A. Stankovic, and T. Abdelzaher, “Range-Free Localization Schemes for Large Scale Sensor Net- works,” in Proc. of ACM MOBICOM, 2003, pp. 81–95.

3.        D. Niculescu and B. Nath, “Ad Hoc Positioning System (APS) using AOA,” in Proc. of IEEE INFOCOM, 2003.

4.        Hu Yu, Li Xuemei based on DV-HOP algorithm for wireless sensor network node positioning technology. Shanxi: Taiyuan University of Technology, 2012,5

5.        Zhang Xiaolong, Xie Hui-ying wireless sensor networks in an improved DV-Hop localization algorithm Hunan: Wuhan University of Technology, 2008,3.

6.        D Niculescu,B Nath. Ad-Hoc Positioning System(APS)[J].IEEE GlobalTelecommunications, 2001, 5: 2926-2931.

7.        Zhang Xiaolong, Xie Hui-ying, Zhao Xiaojian wireless sensor networks in an improved DV-Hop localization algorithm [J]. Journal of Computer Applications, 2007,27(11) :2672 -2674.

8.        Zhangshu Peng wireless sensor network positioning technology research [D]. Guangzhou: South China University of Technology, 2010.

9.        Detecting Wormhole Attacks In Wireless Sensor Networks Yurong Xu, Guanling Chen, James Ford and Fillia Makedon

10.     Y. Xu, J. Ford and F. Makedon, A variation on hop counting for geographic routing, Proceedings of the Third IEEE Workshop on Embedded Networked Sensors, 2006.

11.     K. Langendoen and N. Reijers, “Distributed localization in wireless sensor networks: a quantitative comparison,” Compute. Networks, vol. 43, no. 4, pp. 499–518, 2003.


51-55

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

10.

Authors:

Rakesh Roshan

Paper Title:

Ex-Post Investigation of ERP Business Value in an Indian Organization

Abstract:  Due to huge amount of investment and collective efforts to implement and run ERP system , the primary question to ERP systems business value has been a key concern. The present case study reports the effect of Enterprise Resource Planning (ERP) and its impact on the performance of organization. The SAP-LAP has been employed to better understanding of the integration of the system. The single indian case study was used for this investigation. Before investigation, the performance indicators of the organization were identified by conducting interviews with the managers. This study provides an opportunity to adopt the better approach in implementation of the ERP systems in similar type of organizations.

Keywords:
 RP, SAP-LAP, Business Value, Organization.


References:

1.        Bendoly, E., Rosenzweig, E. D., and Stratman, J. K., 2009, “The efficient use of enterprise information for strategic advantage: A data envelopment analysis” Journal of Operations Management, 27(4), 310-323
2.        Chand, D., Hachey, G., Hunton, J., Owhoso, V., Vasudevan, S. 2005. A balanced scorecard based framework for assessing the strategic impacts of ERP systems, Computers In Industry, 558-572

3.        Hendricks, K. B., Singhal V. R., Stratman, J. K., 2007, “The impact of enterprise systems on corporate performance: A study of ERP, SCM, and CRM system
implementations”, Journal of operations Management, Vol. 25(1), 65-82.

4.        Kanungo, S., 1999, Making Information Technology Work, Sage Publications India Pvt. Ltd., New Delhi, India

5.        Karimi, J., Somers, T. M., and Bhattacharjee, A., 2007, “The impact of ERP implementation business process outcomes: A factor based study”, Journal of Management Information Systems, 24(1), 101-134

6.        Moon Y.B., 2007, “Enterprise Resource Planning (ERP): a review of the literature”, International Journal of Management and Enterprise Development, 4(3), 235-264

7.        Nicolaou, A. I. & Bhattacharya, S., 2006, “Organizational Performance effects of ERP systems usage: The impact of post-implementation changes”, International Journal of Accounting Information Systems, Vol 7, 18-35.

8.        Ragowsky, A., Somers T., & Adams, D., 2005, Assessing the value provided by ERP applications through organizational activities”, Communications of Association for Information Systems, 16(18), 381-406

9.        Soto-Acosta, P. Merono-Cerdan, A. L., 2008, “Analyzing e-business value creation from a resource based perspective”, International Journal of Information Management, Vol. 28, 49-60.

10.     Sushil, 2000, "SAP-LAP models of inquiry", Management Decision, 38(5), 347 – 353

11.     Uwizeyemungu, S. and Raymond, L., 2010, “Linking the effects of ERP to Organizational Performance: Development and Initial validation of an evaluation method”, Information Systems Management, Vol. 27, 25-41

12.     Yen, H. R. & Sheu, C., 2004, “Aligning ERP implementationwith competitive priorities of manufacturing firms: an exploratory study”, International Journal of Production Economics, 92(3), 207-220

13.     Yusuf, Y., Gunasekaran, A., and Wu C., 2006, “Implementation of enterprise resource planning in China”, Technovation, 26(12), 1324-1336

14.     Zhu, K., Kraemer, K., 2005, “Post adoption variations in usage and value of e-business by organizations: Cross country evidence from the retail industry”, Information Systems Research, 16(1), 61-84.

15.     Sushil (2001). SAP-LAP Framework, Global Journal of Flexible Systems Management, 2(1), (pp51-55). New Delhi


56-59

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

11.

Authors:

Neelesh Dutt Pandey, Subhadeep Chakraborti, Arindam Ghosal

Paper Title:

A Review of Solar Air Conditioning System

Abstract:   Solar air conditioning can be done through solar thermal energy conversion and photovoltaic conversion (sunlight to electricity). The U.S. Energy Independence and Security Act of 2007[1] created 2008 through 2012 funding for a new solar air conditioning research and development program, which should develop and demonstrate multiple new technology innovations and mass production economies of scale. Solar air conditioning might play an increasing role in zero-energy and energy-plus buildings design.

Keywords:
 solar energy, thermal energy collector, free energy, radiant cooling.


References:

1.    www. en.wikipedia.org/wiki
2.    www.eai.in

3.    www.environmentalleader.com

4.    www.simonsenergy.com.au

5.    www.thesolarindia.com

6.    www.solartubs.com

60-61

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

12.

Authors:

Mohamed Alnas, Nassr Abuhamoud, Elmabruk Laias

Paper Title:

Evaluation of L2 Trigger Impact on Fast Mobile IPv6 Handover

Abstract:    Mobile IPv6 with fast Handover enables a Mobile Node (MN) to quickly detect at the IP layer that it has moved to a new subnet by receiving link-related information from the link-layer; furthermore it gathers anticipative information about the new Access Point (AP) and the associated subnet prefix when the MN is still connected to the previous Corresponding Node (CN). The aim of this paper for the fast Mobile IPv6 handover (FMIPv6) protocol is to allow an MN to configure a new Care-of-Address (nCoA), before it moves and connects to a new network. Furthermore, the FMIPv6 protocol seeks to eliminate the latency involved during the MN’s Binding Update (BU) procedure by providing a bi-directional tunnel between the old and new networks while the BU procedures are being performed

Keywords:
 Mobile IPv6; Fast Handover; L2 Information; L3; Handover Latency; Packet Loss;


References:

1.     D. Johnson, C. Perkins and J. Arkko, “Mobility Support in IPv6”, RFC 3775, June 2004.
2.     G. Dometty, A. Yegin, C. Perkins, G. Tsirtsis, K. El-Malki and M. Khalil, “Fast Handovers for Mobile IPv6”, Internet draft, work in progress, http://www.ietf.org/internet-drafts/, July 2001.

3.     S. Deering and R. Hinden, “Internet Protocol, Version 6 (IPv6) Specification”, RFC 2460, December 1998.

4.     China Education and Research Network, CERNET2 Milestones, http://www.edu.cn/cer2_1556/20060323/t20060323_158680.shtml, updated January 2006.

5.     R. Koodli, “Fast Handovers for Mobile IPv6”, Internet Engineering Task Force, http://www.ietf.org/rfc/rfc4068.txt, July 2005.

6.     D. Johnson, C. E. Perkins and J. Arkko, “Mobility Support in IPv6”, Internet Engineering Task Force RFC3775, 2004.

7.     M. Alnas, I. Awan and R. D. W. Holton, “Fast Handoff in Mobile IPv6 Based Link Layer Information”, 9th IEEE Malaysia International Conference on Communications, IEEE Computer Society, 2009.

8.     R. Droms, J. Bound, B. Volz, T. Lemon, C. Perkins and M. Carney, “Dynamic Host Configuration Protocol for IPv6 (DHCPv6)”, RFC 3315, July 2003.

9.     H. Chung-Ming, C. Meng-Shu and L. Jin-Wei, “A Link Layer Assisted Fast Handoff Scheme Using the Alternative Path Approach”, 20th International Conference on Advanced Information Networking and Applications, 2006

10.  M. Liebsch, A. Singh, H. Chaskar, D. Funato and E. Shim, “Candidate Access Router Discovery”, RFC 4066, July 2005.

11.  G. Pollini, “Trends in Handover Design”, IEEE Communications Magazine, 34, 3, 80–90, March 1996.

12.  The Network Simulator ns-2, http://www.isi.edu/nsnam/ns.

13.  R. Koodli, “Fast Handovers for Mobile IPv6”, Internet Engineering Task Force, July 2005, http://www.ietf.org/rfc/rfc4068.txt.

14.  D. Johnson, C. Perkins and J. Arkko, “Mobility Support in IPv6”, Internet Engineering Task Force RFC 3775, June 2004.

15.  S. Oh, H. Song and Y. Kim, “Seamless Fast Handover in Mobile IPv4 Using Layer-2 Triggers,” in Systems and Networks Communications, ICSNC 2007, 2nd International Conference, pp. 16-16, 2007.

16.  H. F Chen and J. Zhang, “Prep-binding of Fast Handovers for Mobile IPv6”, draft-chen-mipshopfast-handovers-prep-binding-02.txt, IETF, April 2006.

17.  T. Campbell, J. Gomez, K. Sanghyo, W. Chieh-Yih, Z. R. Turanyi and A. G. Valko, “Comparison of IP Micromobility Protocols”, Wireless Communications, IEEE, vol. 9, pp. 72–82, 2002

18.  (Ramani) J. Puttonen, “Using Link Layer Information for Improving Vertical Handovers”, 16th International Symposium on Personal, Indoor and Mobile Radio Communications IEEE, 2005 Columbia University, Columbia IP Micro-Mobility Software,  http://www.comet.columbia.edu/micromobility/.index.html.


62-66

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

13.

Authors:

Renuka S. Anami, Gauri R. Rao

Paper Title:

Automated Profile Extraction and Classification with Stanford Algorithm

Abstract: The enterprises and multinational companies receive thousands of resumes from the job seekers during this Internet era. Currently available filtering techniques and search services provide the recruiters to filter thousands of resumes to few hundred potential ones. It is difficult to identify the potential resumes by examining each resume, since these filtered resumes are similar to each other. We are investigating the issues related to the development of approaches to improve the performance of resume selection process. We have extended the concept of special features and also proposed an approach to identify resumes with special skills. In the literature, the concepts of special features have been applied to improve the process of candidate selection in E-commerce environment. As resumes contain unformatted text or semi-formatted text, extending the concept of special features for the development of approach to process resumes is a complex task. Only skills related formation of the resumes is obtained by considering this system approach. The experimental results of the real world set of resumes show that the proposed approach has the potential to improve the process of resume selection. An effective way of an approach for extraction of information from the resumes is achieved by the system .It supports routing and management of resumes automatically. The framework of an IE gives the extraction process of resumes along with the required information regarding the algorithms related with this extraction. The overall objective of the study is to provide the required information about the skills and experience to human resource system. This system provides the resumes to be extracted in a structured format for the semantic web approach

Keywords:  NLP, HTML, JAVA, Candidate Profile, Information Extraction (IE), CSS.


References:

1.       Automatic Extraction of Usable Information from Unstructured Resumes to Aid Search bySunil-Kumar Kopparapu, TCS Innovation Labs Mumbai,TataConsultancy.Services,Thane (West), Maharastra 400 601. 978-1-4244-6789-1110/©2010 IEEE
2.       Resume Information Extraction with Named Entity Clustering based on Relationships ErtuğKaramatlı, SelimAkyokuşDoğuş University, İstanbul, Turkey. ©2011 IEEE
3.       Web-based Document Classification Using A Trie-based Index Structure Jeahyun Park, Juyoung Park, Joongmin Choi Dept. of Computer Science and Engineering,Hanyang University 1271 Sa-3-Dong, Ansan, Gyeonggi-Do, Korea
4.       Web Document Classification Based on Fuzzy k-NN Algorithm Juan Zhang Yi NiuHuabeiNie Computer and Information Computer and Information Computer and information China.

5.       Jongwoo Kim, Daniel X. Le, and George R. “NaïveBayes Classifier for Extracting Bibliographic Information from Biomedical Online Articles”, national Library of Medicine, 8600 Rockville Pike, Bethesda, MD 20894, USA

6.       Natural Language Query Processing Using Semantic Grammar international Journal Of Computer Science And Engineering Vol II Issue II March 2010 pg no 219-233

7.       Natural Language Query Processing international Journal Of Computer application And Engineering Technology and Science IJ-CA-ETS Oct 2009 pg no. 124-129

8.       Information Extraction from CV Tomasz KaczmarekThe Poznan University of Economics t.kaczmarek@kie.ae.poznan.pl MarekKowalkiewiczThe Poznan University of Economics m.kowalkiewicz@kie.ae.poznan.pl JakubPiskorski German Research Center for Artificial Intelligence piskorski@dfki.de

9.       Resume Information Extraction with Cascaded Hybrid Model,Kun Yu Gang Guan Ming Zhou Department of Computer Science and Technology Department of Electronic Engineering Microsoft Research Asia University of Science and Technology of China Tsinghua University 5F Sigma Center, No.49 Zhichun Road, Haidian Hefei, Anhui, China, 230027 Bejing, China, 100084 Bejing, China, 100080

10.    Natural Language Query Processing Using Semantic Grammar international Journal Of Computer Science And Engineering Vol II Issue II March 2010 pg no 219-233

11.    Natural Language Query Processing international Journal Of Computer application And Engineering Technology and Science IJ-CA-ETS Oct 2009 pg no. 124-129


67-71

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

14.

Authors:

Shweta Ujwal Bagadi, Giridhar P. Jain

Paper Title:

Fingerprint Verification using Statistical and Co-Occurrence Matrix Features

Abstract:  Fingerprint identification is one of the most well-known and publicized biometrics. Because of their uniqueness and consistency over time, fingerprints have been used for identification for over a century, more recently becoming automated (i.e. a biometric) due to advancement in computing capabilities. Fingerprint identification is popular because of the inherent ease in acquisition, the numerous sources (ten fingers) available for collections, and their established use and collections by law enforcement and immigration. Fingerprint verification is one of the most reliable personal identification method and it plays a very important role in forensic and civilian applications. However, manual fingerprint verification is so tedious, time-consuming, and expensive that it is incapable of meeting today's increasing performance requirements. Hence, an automatic fingerprint identification system (AFIS) is widely needed. Proposed system describes the design and implementation of an off-line fingerprint verification system using wavelet transforms. In this method, matching is done between the input image and the stored template without resorting to exhaustive search using the extracted feature.

Keywords:
 fingerprint verification, wavelet transform, automatic fingerprint identification system (AFIS),


References:

1.       A.K. Jain, R. Bolle and S. Pankanti, eds., Biometrics: Persona Identification in a Networked Society, Kluwer Academic Publishers,   1999.
2.       K. Jain, A. Ross, and S. Prabhakar, "Fingerprint Matching Using Minutiae and Texture Features", Proc. International Conference on Image Processing (ICIP),  Greece, October 7-10, 2001, pp. 282-285. 

3.       J.Berry and D.A.Stoney, “ The history and development of finger printing in advances in fingerprint technology”, CRC Press, Florida, 2nd Edition, 2001, pp. 1-40.

4.       Emma Newham, “ The Biometric report”, SJB services, 1995.

5.       Federal Bureau of Investigation, “ The Science of Fingerprints:  Classification and Uses”, US Government Printing office, Washington  D.C., 1984.

6.       A.K.Jain, S.Prabhakar, L.Hong and S.Pankanti, “Filter based Fingerprint  Matching”, IEEE Transactions on Image Processing, Vol. 9, No. 5, May    

7.       2000, pp. 846-859.

8.       Marc Antonini, Michel Barlaud, Pierre Mathieu and Daubechies, “Image Coding using Wavelet Transform”,IEEE Transaction on Image Processing, Vol. 2, No. 2, 1992, pp. 205-220.

9.       R.M.Haralick, K.Shanmugam and I.Dinstein, “Texture features for image classification”, IEEE transactions on System, Man, Cybernatics, Vol.8, No.6, 1973, pp.610-621.

10.    http://bias.csr.unibo.it/fvc2000

11.    H.B.Kekre, Kavita Patil, “Standard Deviation of Mean and Variance of Rows and Columns of Images for CBIR”, International Journal of computer, Information, and System science, and Engineering 3:1:2009

12.    Linlin SHEN* and Alex KOT, Fellow, IEEE ** ,” A New Wavelet Domain Feature for Fingerprint Recognition”, Jan. 2, 2008

13.    Part I  By Robi Polikar  “The Wavelet  Tutorial Second Edition  “

14.    Sivakasi, India s_arivu@yahoo.com  L. Ganesan Department of CSE Govt. college of Engg. Tirunelveli, India drlg_tly@rediffmail.com “ Fingerprint Verification Using Wavelet Transform “,2003 IEEE.

15.    3 Henry Selvaraj Department of ECE University of Nevada Las Vegas, USA     selvaraj@unlv.eduS. Arivazhagan Department of ECE Mepco Schlenk Engg. College “Fingerprint Verification Using Wavelet Transform”

16.    K.Thaiyalnayaki, M.E., Asst. Professor S. Syed Abdul Karim P. Varsha Parmar,” Finger Print Recognition using Discrete Wavelet Transform “,Chennai ©2010 International Journal of Computer Applications (0975 - 8887) Volume 1 – No. 24

17.    Manvjeet Kaur, Mukhwinder Singh, Akshay Girdhar, and Parvinder S. Sandhu, “Fingerprint Verification System Using Minutiae Extraction Technique, World Academy of Science , Engineering and Technology 46 2008

18.    Ravi J, K.B. Raja, Venugopal K.R., ”Fingerprint Recognition Using Minutia Score Matching”, International Journal of Engineering Science and Technology, Vol. I(2), 2009,35-42

19.    Mrs. Shweta Ujwal Bagadi, Ms. Asha V. Thalange, Mr. Giridhar P. Jain,”Wavelet Features Based Fingerprint Verification”,International Conference on Methods and Models in Science and Technology , ISSN-0094-243x, Dec 25-26, 2010


72-75

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

15.

Authors:

Abedalmuhdi Almomany, Afnan Alquraan, Lakshmy Balachandran

Paper Title:

GCC vs. ICC comparison using PARSEC Benchmarks

Abstract:   Our goal is to compare the impact of various compiler optimizations on program performance using two widely used state-of-the-art compiler suites: GNU C Compiler and Intel’s C/C++ Compiler using PARSEC benchmarks. Compiler optimization is the process of tuning the output of a compiler to minimize or maximize some of the attributes of an executable computer program. Optimization of a compiler can be done by turning on optimization flags. In this paper, we investigate the chances of enhancing the program performance by better utilization of the existing architectural features such as compiler optimization. Proper utilization of such architectural features would not only enhance the program performance, but also reduce the need for costly upgrades as well as the system cost under development.

Keywords:
 compiler, icc, gcc, PARSEC.


References:

1.           Compiler Optimizations in Multi-core Era: A Performance Study Using Intel C++/Fortran and GNU C++/Gfortran , Aleksandar Milenkovic LaCASA Laboratory, Electrical and                 Computer Engineering The University of Alabama in Huntsville.
2.           Christian Bienia, Sanjeev Kumar, Jaswinder Pal             Singh and Kai Li. The PARSEC Benchmark Suite: Characterization and Architectural Implications. In Proceedings of the 17th International Conference on Parallel Architectures and Compilation Techniques,  October 2008.

3.           Christian Bienia, Sanjeev Kumar and Kai Li.  PARSEC vs. SPLASH-2: A Quantitative Comparison of Two   Multithreaded Benchmark  Suites on Chip-Multiprocessors. In Proceedings of the

4.           2008 Annual IEEE  International Symposium on Workload  Characterization, September 2008.

5.           http://parsec.cs.princeton.edu/download/tutorial/3.0/parsec-tutorial.pdf

6.           J. L. Hennessy and D. A. Patterson, Computer  Architecture: A Quantitative Approach. San  Francisco: Morgan Kaufmann, 2007.


76-82

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

16.

Authors:

Abedalmuhdi Almomany, Afnan Alquraan, Lakshmy Balachandran

Paper Title:

Three-Phase Four-Wire Distribution System Utilizing Unified Power Quality Conditioner

Abstract: This paper presents a novel structure for a threephase four-wire (3P4W) distribution system utilizing unified power quality conditioner (UPQC). The 3P4W system is realized from a three-phase three-wire system where the neutral of series transformer used in series part UPQC is considered as the fourth wire for the 3P4W system. A new control strategy to balance the unbalanced load currents is also presented in this paper. The neutral current that may flow toward transformer neutral point is compensated by using a four-leg voltage source inverter topology for shunt part. Thus, the series transformer neutral will be at virtual zero potential during all operating conditions. The simulation results based on MATLAB/Simulink are presented to show the effectiveness of the proposed UPQC-based 3P4W distribution system.

Keywords:
Active power filter (APF), four-leg voltage-source inverter (VSI) structure, three-phase four-wire (3P4W) system, unified power quality conditioner (UPQC).


References:

1.          M. Bollen, Understanding Power Quality Problems: Voltage Sags and Interruptions.   New York: IEEE Press, 1999.
2.          S. V. R. Kumar and S. S. Nagaraju, “Simulation of DSTATCOM and DVR in power systems,” ARPN J. Eng. Appl. Sci., vol. 2, no. 3, pp. 7–13, Jun. 2007.

3.          B. T. Ooi, J. C. Salmon, J. W. Dixon, and A. B. Kulkarni, “A three- phase controlled-current PWM converter with leading power  factor,” IEEE Trans. Ind. Appl., vol. IA-23, no. 1, pp. 78–84, Jan. 1987.

4.          Y. Ye, M. Kazerani, and V. Quintana, “Modeling, control and implemen- tation of three-phase PWM converters,” IEEE Trans. Power  Electron., vol. 18, no. 3, pp. 857–864, May 2003.

5.          R. Gupta, A. Ghosh, and A. Joshi, “Multiband hysteresis modulation and switching characterization for sliding-mode-controlled cascaded multi- level inverter,” IEEE Trans. Ind. Electron., vol. 57, no. 7, pp. 2344–2353, Jul. 2010.

6.          S. Srikanthan and M. K. Mishra, “DC capacitor voltage equalization in neutral clamped inverters for DSTATCOM application,” IEEE Trans. Ind. Electron., vol. 57, no. 8, pp. 2768–2775, Aug. 2010.

7.          R. Gupta, A. Ghosh, and A. Joshi, “Switching characterization of cas- caded multilevel-inverter-controlled systems,” IEEE Trans. Ind. Electron., vol. 55, no. 3, pp. 1047–1058, Mar. 2008.

8.          B. Singh and J. Solanki, “Load compensation for diesel generator-based isolated generation system employing DSTATCOM,” IEEE  Trans. Ind. Electron., vol. 47, no. 1, pp. 238–244, Jan./Feb. 2011.

9.          R. Gupta, A. Ghosh, and A. Joshi, “Characteristic analysis for multisampled digital implementation of fixed-switching-frequency closed- loop modulation of voltage-source inverter,” IEEE Trans. Ind. Electron., vol. 56, no. 7, pp. 2382–2392, Jul. 2009.

9.B.  Singh  and  J.  Solanki,  “A  comparison  of  control  algorithms  for DSTATCOM,” IEEE Trans. Ind. Electron., vol. 56, no. 7, pp. 2738–2745, Jul. 2009.

10.       S. Rahmani, N. Mendalek, and K. Al-Haddad, “Experimental design of a nonlinear control technique for three-phase shunt active power filter,” IEEE Trans. Ind. Electron., vol. 57, no. 10, pp. 3364–3375, Oct. 2010.

11.       Corasaniti, M. Barbieri, P. Arnera, and M. Valla, “Hybrid active filter for reactive and harmonics compensation in a distribution network,” IEEE Trans. Ind. Electron., vol. 56, no. 3, pp. 670–677, Mar. 2009.

12.       M.  Milane  Montero,  E.  Romero-Cadaval,  and  F.  Barrero-Gonzalez, “Hybrid multi converter conditioner topology for high-power applica- tions,”  IEEE  Trans.  Ind.  Electron.,  vol.  58,  no.  6,  pp.  2283–2292, Jun. 2011.

13.       J. Nielsen, M. Newman, H. Nielsen, and F. Blaabjerg, “Control and testing of a dynamic voltage restorer (DVR) at medium voltage level,” IEEE Trans. Power Electron., vol. 19, no. 3, pp. 806–813, May 2004.

14.       Y. W. Li, P. C. Loh, F. Blaabjerg, and D. Vilathgamuwa, “Investigation and improvement of transient response of DVR at medium voltage level,” IEEE Trans. Ind. Appl., vol. 43, no. 5, pp. 1309–1319, Sep./Oct. 2007.

15.       Y. W. Li, D. Mahinda Vilathgamuwa, F. Blaabjerg, and P. C. Loh, “A robust control scheme for medium-voltage-level DVR implementation,” IEEE Trans. Ind. Electron., vol. 54, no. 4, pp. 2249–2261, Aug. 2007.

16.       J. Barros and J. Silva, “Multilevel optimal predictive dynamic voltage restorer,” IEEE Trans. Ind. Electron., vol. 57, no. 8, pp. 2747–2760, Aug. 2010.

17.       D. Vilathgamuwa, H. Wijekoon, and S. Choi, “A novel technique to compensate voltage sags in multiline distribution system—The interline dynamic voltage restorer,” IEEE Trans. Ind. Electron., vol. 53, no. 5, pp. 1603–1611, Oct. 2006.

18.       M. Kesler and E. Ozdemir, “Synchronous-reference-frame-based control method for UPQC under unbalanced and distorted load conditions,” IEEE Trans. Ind. Electron., vol. 58, no. 9, pp. 3967–3975, Sep. 2011.

19.       K. H. Kwan, Y. C. Chu, and P. L. So, “Model-based Hinf ty control of a unified power quality conditioner,” IEEE Trans. Ind. Electron., vol. 56, no. 7, pp. 2493–2504, Jul. 2009.

20.       V. Khadkikar and A. Chandra, “A novel structure for three-phase four-wire distribution system utilizing unified power quality conditioner (UPQC),” IEEE Trans. Ind. Appl., vol. 45, no. 5, pp. 1897–1902, Sep./Oct. 2009.

21.       V. Khadkikar and A. Chandra, “A new control philosophy for a unified power quality conditioner (UPQC) to coordinate load-reactive power demand  between shunt and series inverters,” IEEE Trans. Power Del., vol. 23, no. 4, pp. 2522–2534, Oct. 2008.

22.       H. Akagi and R. Kondo, “A transformer less hybrid active filter using a three-level pulse width modulation (PWM) converter for a medium- voltage  motor  drive,”  IEEE  Trans.  Power  Electron.,  vol.  25,  no.  6, pp. 1365–1374, Jun. 2010.

23.       H. Jou, K. Wu, J. Wu, C. Li, and M. Huang, “Novel power converter topol- ogy for threephase four-wire hybrid power filter,” IET Power Electron., vol. 1, no. 1, pp. 164–173, Mar. 2008.

24.       T. Zhili, L. Xun, C. Jian, K. Yong, and D. Shanxu, “A direct control strategy for UPQC in three-phase four-wire system,” in Proc. CES/IEEE IPEMC, Aug. 2006, vol. 2, pp. 1–5.

25.       M. Brenna, R. Faranda, and E. Tironi, “A new  proposal for power quality and custom power improvement: Open UPQC,” IEEE Trans. Power Del., vol. 24, no. 4, pp. 2107–2116, Oct. 2009.

26.       V. George and M. K. Mishra, “DSTATCOM topologies for three phase high power applications,” Int. J. Power Electron., vol. 2, no. 2, pp. 107– 124, Feb. 2010.

27.       Y. Pal, A. Swarup, and B. Singh, “A comparative analysis of three-phase four-wire UPQC topologies,” in Proc. Joint Int. Conf. PEDES Power India, Dec. 2010, pp. 1–6.

28.       B. Singh, P. Jayaprakash, and D. Kothari, “A T-connected transformer and  three-leg  VSC  based  DSTATCOM  for  power  quality  improve- ment,”  IEEE Trans. Power Electron., vol. 23, no. 6, pp. 2710–2718, Nov. 2008.

29.       T. Zhili, L. Xun, C. Jian, K. Yong, and Z. Yang, “A new control strategy of UPQC in three-phase four-wire system,” in Proc. IEEE PESC, Jun. 2007, pp. 1060–1065.

30.       M. K. Mishra and K. Karthikeyan, “Design and analysis of voltage source inverter for active compensators to compensate unbalanced and non-linear loads,” in Proc. IPEC, 2007, pp. 649–654.

31.       S. Sasitharan and M. Mishra, “Design of passive filter components for switching band controlled DVR,” in Proc. TENCON, Nov. 2008, pp. 1–6.

32.       N. Mohan, T. M. Undeland, and W. Robbins, Power Electronics: Converters, Applications, and Design.   Hoboken, NJ: Wiley, 2003.

33.       R. Stala, “Application of balancing circuit for dc-link voltages balance in a single-phase diode-clamped inverter with two three-level legs,” IEEE Trans. Ind. Electron., vol. 58, no. 9, pp. 4185–4195, Sep. 2011.

34.       U. K. Rao, M. K. Mishra, and A. Ghosh, “Control strategies for load compensation using instantaneous symmetrical component theory un- der different supply voltages,” IEEE Trans. Power Del., vol. 23, no. 4, pp. 2310–2317, Oct. 2008.

35.       D. M. Brod and D. W. Novotny, “Current control of VSI-PWM inverters,” IEEE Trans. Ind. Appl., vol. IA-21, no. 3, pp. 562–570, May 1985.

36.       S. Pattanaik and K. Mahapatra, “Power loss estimation for PWM and soft- switching inverter using RDCLI,” in Int. Multi Conf. Eng. Comput. Sci., 2010, pp. 1401–1406.


83-89

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

17.

Authors:

Ashish Negi, Himanshu Saini

Paper Title:

An Overview of Intrusion Detection System in Computer Networks

Abstract:  the world has seen an era of advanced changes in networking field. This has been results in development of information exchange across all over the world. It leads to dependency on network for files transaction and valuable data. During past decades a numerous security attacks has been attempted on these networks. To ensure these networks safety Intrusion Detection System has been designed to prevent from such security attacks. Intrusion detection is a type of security management system for computer networks which gathers and analyzes information from various areas within networks to identify possible security contravention. This paper is intended to provide an overview of intrusion detection system and to give a brief idea about network protection against theft and threat.

Keywords:
 Intrusion detection system, fuzzy logic, artificial intelligence.


References:

1.       Khattab M. Alheeti, “Intrusion Detection System and Artificial Intelligent”, ISBN 978-953-307-167-1, Published: March 22, 2011.
2.       Shaik akbar, K.Nageswara Rao, J.A. Chandulal, “ Intrusion Detection System Methodology Based on Data Analysis”, International Journal of Computer Applications (0975-8887), Vol. 5, No. 2, Auguest 2010.

3.       Peyman Kabiri, Ali A. Ghorbani, “Research on Intrusion Detection and Response: A Survey”. International Journal of Network Security, Vol.1, No.2, PP.84–102, Sep. 2005.

4.       Bharanidharan Shanmugam and Norbik Bashah Idris, “Hybrid Intrusion Detection Systems (HIDS) using Fuzzy Logic”, ISBN 978-953-307-167-1, Published: March 22, 2011

5.       Shilpa Batra, Pankaj Kumar, Sapna Sinha,” Review: Soft Computing Techniques (Data-Mining) On Intrusion”, International Journal of Computational Engineering Research|, vol.3, issue. 4, April 2013.

6.       A.A.Ojugo, A.O.Eboka, O.E. Okonta, R.E.Yoro, F.O.Aghware,” Genric Algorithm Rule Based Intrusion Detection System”, journal of Emegering Trends in Computing and Information Sciences, Vol. 3, No.8, Auguest 2012.

7.       Mahak Chowdhary, Shrutika Suri, Mansi Bhutani,” Comparative Study of Intrusion Detection System”, Journal of Computer Science International Journal of Computer Science International Journal of Computer Sciencesand Engineering and Engineering, Vol.2, No. 4, pp. (197-200), April 2014.

8.       N. Puketza, K. Zhang, M. Chung, B. Mukherjee and R. A. Olsson “A methodology for testing intrusion detection systems," Proc. IEEE Transactions on Software Engineering, vol. 22, pp. 719 -729, 1996. 


90-92

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

18.

Authors:

Salman Khan B. R, Arun Patro, Siva S. Yellampalli

Paper Title:

Design of UART Protocol with Interrupt Logic and Status Register

Abstract: Universal Asynchronous Receiver Transmitter (UART) is used in data communication process especially for its advantages of high reliability, long distance and low cost. This paper targets the interrupt logic and Status register to UART. The 8-bit UART with status register and Interrupt module is coded in Verilog HDL and synthesized and simulated using Xilinx ISE version 12.2 and Modelsim. 9600bps Baud Rate is used for Proposed Architecture. 207.220MHZ maximum frequency is obtained from Spartan 3e Xc3s400.In Proposed Architecture 25MHZ is used as system clock.

Keywords:
  Universal Asynchronous Receiver Transmitter, Status Register , Asynchronous Serial Communication


References:

1.       Fang Yi-yuan and Chen Xue-jun, “Design and Simu lation of UART Serial Communication Module Based on VHDL”, in the proceedings of 3rd International Workshop on Intelligent Systems and Applications (ISA), IEEE, May 2011, DOI: 10.1109/ISA.2011.5873448, pp.1-4.
2.       Naresh, Vatsalkumar and Vikaskumar Patel, “VHDL Implementation of UART with Status Register”, in the proceedings of International Conference on Communication Systems and Network Technologies, IEEE Computer Society, 11-13th May 2012, DOI: 10.1109/CSNT.2012.164, pp.750-754.

3.       Dr. Garima Bandhawarkar Wakhle, Iti Aggarwal and Shweta Gaba, “Synthesis and Implementation of UART using VHDL Co des”, in the proceedings of International Symposium on Computer, Consumer and Control, IEEE June 2012, DOI: 10.1109/IS3C.2012.10.

4.       Mohd Yamani Idna Idris, Mashkuri Yaacob and Zaidi Razak, “A VHDL Implementation of UART Design with BIST Capability”, in the proceedings of Malaysian Journal of Computer Science, June 2006, Vol. 19(1), pp. 73-86.

5.       Norhuzaimin J and Maimun H.H, “The design of hi gh speed UART”, in the proceedings of Asia-Pacific Conference on Applied Electromagnetics, APACE 05, IEEE, 20-21st Dec. 2005, DOI: 10.1109/APACE.2005.1607831, pp.5-8.
6.       Chun-zhi, He; Yin-shui, Xia; Lun-yao, Wang; , "A universal asynchronous receiver transmitter design,"Electronics, Communications and Control (ICECC),   International Conference on , vol., no., pp.691-694, 9-11 Sept. 2011.
7.       Mahat N.F, “Design of a 9-bit UART module based on Verilog HDL”, in the proceedings of 10th IEEE International Conference on Semiconductor Electronics (ICSE), 19-21st Sept. 2012, DOI: 10.1109/SMElec.2012.6417210, pp. 570-573.

8.       Gallo, R.; Delvai, M.; Elmenreich, W.; Steininger, A.; , "Revision and     verification of  an enhanced UART," Factory Communication Systems, 2004. Proceedings. 2008 IEEE International Workshop on ,vol., no., pp. 315- 318, 22 Sept.2008.

9.       Idris, M.Y.I.; Yaacob, M.; , "A VHDL implementation of BIST technique in UART design," TENCON 2003. Conference on Convergent Technologies for  Pacific Region , vol.4, no., pp. 1450- 1454 Vol.4, 15-17 Oct. 2003.


93-96

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

19.

Authors:

Thirupathi Naidu P, Ashok Kumar V, Kranthi R

Paper Title:

High Speed RC4 Algorithm Based on True Dual Port RAM by using Verilog HDL

Abstract: This paper presents high speed hardware implementation and an area efficient of the RC4 algorithm based on True Dual Port (TDP) RAM. The proposed architecture uses Block RAM (BRAM) implementation to reduce the area and to increase the speed of operation hence throughput. The proposed design uses only one 256 bytes True Dual Port RAM for key stream generation and it needs two clock cycles per one byte. It supports 1 byte to 256 bytes of variable key length and it achieves 71.39 MB/s throughput at 142.78 MHz maximum operating frequency. The True Dual Port RAM RC4 algorithm is implemented in Verilog HDL. The Proposed design is targeted on XC4VFX12-12SF363 Xilinx FPGA and met the operating frequency of 142.78 MHz.

Keywords:
True Dual Port RAM, BRAM, CPLD, FPGA, RC4 Algorithm and Stream Cipher.


References:

1.       P.Hamalainen , M.Hannikainen,T.Hamalainen and J.Saarinen, “Hardware Implementation of the Improved WEP and RC4 Encryption Algorithm for Wireless Terminals”, the European Signal Processing Conference (EUSIPCO’2000), pp.2289-2292, September 5-8, 2000.
2.       B.Schneier, D.Whiting, “Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium processor” Fast Software Encryption workshop (FSE97), LNCS, Vol, 1267, pp.242-259, Springer-Verlag, Haifa, Israel, January 20-22, 1997.

3.       P.D. Kundarewich, S.J.E Wilton, A.J.Hu. “A CPLD-Based RC-4 Cracking System”, the 1999 Canadian Conference on Electrical and Computer Engineering, May 1999, Vol.1, pp.397-402.

4.       P.Kitsos, G.Kostopoulos, N. Sklavos and O.Koufopavlou, “HardwareImplementation of the RC4 Stream Cipher”, IEEE 46th Midwest Symposium on Circuits & Systems, Vol.3, pp.1363-1366, 2003.

5.       K.H Tsoi, K H Lee and P.H.W Leong, “A Massively Parallel RC4 Key Search Engine”, Proc. Of the 10th Annual IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM02), September 22-24, 2002 Napa, California, pp.13-21.  

6.       S.S.Gupta, K Sinha, S.Maitra and. B.P.Sinha, “One Byte per Clock: A Novel RC4 Hardware”, 11th International Conference on cryptography-Indo crypt  2010 Dec. 2010, India.

7.       William Stallings, “Cryptography and Network Security- Principles and Practice”, Fifth Edition, Prentice Hall, 2011.

8.       R.Chandra Mouli, K.R.K Sastry, “Hardware Implementation of High Speed RC4 Algorithm in   FPGA”, the International Journal of Computer Applications, December-2013, volume 4, 0975-8887.


97-99

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

20.

Authors:

Sanjay H. Dabhole, Sharad T. Jadhav

Paper Title:

An Efficient Codec of 2D Adaptive Directional Lifting based SPL5/3 with Improved SPIHT Algorithm for Lossless Image Coding

Abstract:  Lifting is an efficient algorithm to implement the discrete wavelet transform in order to overcome the drawbacks of the conventional wavelet transform that does not provide a compact representation of edges which are not in horizontal and vertical directions. The lifting scheme provides a general and flexible tool for the construction of wavelet decompositions and perfect reconstruction filter banks. It has been adopted in JPEG 2000. The paper follows this research line, novel 2 D Adaptive Directional Lifting based on SPL 5/3 has analyzed, structured and tuned with improved SPIHT based on adaptive coding for lossless JPEG 2000 image coding. The proposed 2D-ADL scheme incorporates the directionally spatial prediction into the conventional lifting based on 5/3 wavelet transform and forms a novel, efficient and flexible lifting structure with proposed scaling coefficients.  In order to obtain better compression on image edge, an improved Set Partitioning In Hierarchical Trees (ASPIHT) algorithm based on prior scanning the coefficients around which there were more significant coefficients was replaced with conventional SPIHT. Although, the proposed 2D-ADL based on SPL5/3 scheme followed by ASPIHT codec significantly reduce edge artifacts and ringing and outperforms the conventional 1D lifting scheme followed by SPIHT upto 8.4 dB as reported.

Keywords:
 Adaptive Directional Lifting, SPL 5/3, JPEG 2000, Image Coding, ASPIHT, SPIHT, Compression, PSNR, MSE.


References:

1.          D.S.Taubman et al., JPEC2000 Image Compression: F. S. & P., Chinese Edition, section 6.4, 6.5, 10.3 and 10.
2.          Wang Tianhui., Self-contained 2-D image decomposition and reconstruction based on lifting wavelet algorithm from Matlab file Exchange website

3.          Claypool, R.L... Baraniuk R., and Novak R., (1998) “Adaptive wavelet transform via lifting,” International Conference on Acoustics, Speech and Signal Processing, , vol. 3, pp. 1513– 1516.

4.          Claypool, R.L Davies, G. Sweldens, and. Baraniuk, R. (1999)“Lifting for nonlinear image processing,” Wavelet Applications in Signal and Image Processing VII, , vol. Proc. SPIE 3813,pp. 372– 383.

5.          Claypool, R.L... Davis, G. M. Sweldens, W.and Baraniuk, R. G. (2003) “Nonlinear wavelet transforms for image coding via lifting,” IEEE  Transactions on .Image Processing, vol.12, no. 12, pp.1449–1459,

6.          Said and W. A. Pearlman, “A new, fast, and efficient image codec based on set partitioning in hierarchical trees,” IEEE Trans. Circuits Syst. Video Technol., vol. 6, no. 3, pp. 243-250, June 1996

7.          Daubechies I. and. Sweldens, W. (1997.) “Factoring wavelet transform into      lifting steps,” Journal of Fourier analysis and Applications vol.4, no. 3, pp.    245–267,

8.          R. L. Claypoole Jr., J. M. Davis, W. Sweldens, and R. Baraniuk,“B-spline signal processing: Part II—Efficient design and applica- tions,” IEEE Trans. Signal Processing, vol. 41, pp. 834–848, Feb. 1993.

9.          Omer N.Gerek and Enis Cetin. A,(2006) ,” A 2-DOrientation Adaptive- Prediction Filter in Lifting Structures for Image Coding”, IEEE Transactions on Image Processing, vol.15,No 1 pp.106- 111

10.       Piella G.and Heijmans, H. J. A. M. ( July. 2002) “Adaptive lifting Schemes with perfect reconstruction,” IEEE Transactions on Sign Processing, vol. 50, no. 7, pp 1620– 1630,.

11.       Said A. and William A. Pearlman.,(1996), “A New, Fast Efficient Image Codec Based Set Partitioning Hierarchical Trees”, IEEE Transaction on Circuit and Systems for Video Technology,vol.6 No.3,pp 243-250

12.       Shaoyu Zheng, Fang Xu, Deqing Wang (2009) “An Improved Adaptive Lifting Scheme Combining Gradient Operator for Image Coding 1st International conference on information science and engineering vol.1, pp-1133-1136.

13.       V.  A.  Zheludev,  “Local  spline  approximation  on  a  uniform  grid,”U.S.S.R. Comput. Math. & Math. Phys., vol. 27, pp. 8–19, 1987.

14.       Danyali H, Mertins “A family of polynomial spline wavelet transforms,” Signal Processing, vol. 30, pp. 141–162, 1993.

15.       Xiaoyuan Yang, Zhipin Zhu, Bo Yang,(2008) "Adaptive Lifting Scheme for Image Compression, Fifth International Conference on Fuzzy  Systems and Knowledge Discovery, vol. 1, pp.547-551

16.       Said, W.A. Pearlman: A New, Fast and Efficient Image Codec     based on Set Partitioning in Hierarchical Trees, IEEE Transaction on Circuits and Systems for Video Technology, Vol. 6, No. 3, June 1996, pp. 243 – 250.

17.       Sanjay H. Dabhole, , Johan Potgieter, An efficient modified structure of SPL 5/3 wavelet based on adaptive lifting with spiht for  lossless image compression. IEEE explore digital library of Signal Processing, Image Processing and Pattern Recognition -2012.

18.       Sanjay H. Dabhole, Johan Potgieter, Performance evaluation of traditional and adaptive lifting based wavelets with spiht for lossy image compression, IEEE explore digital library  of Signal Processing, Image Processing and Pattern Recognition-2012.

19.       "Huang Ke-kun. Improved Set Partitioning in Hierarchical Trees Algorithm Based on Adaptive Coding Order [J], Journal of Computer Application-china, 2012, 32(3):732-735.

20.       Y. Y. Zeevi and R. Coifman, Eds.,San Diego,“Periodic splines, harmonic analysis, and wavelets,” in Signal and Image Representation in Combined Spaces, Wavelet Anal. Appl., , CA: Academic, 1998, vol. 7, pp. 477–509.


100-107

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

21.

Authors:

Sharad T. Jadhav, Sanjay H. Dabhole

Paper Title:

An Optimal Detection of Polyp and Ulcer in WCE Images using Fast BEMD with DLac Analysis

Abstract:  the main contribution of this paper is the presentation of a novel tool for WCE image analysis and classification by exploiting color-texture features. The proposed scheme has based on the ingenious combination of BEEMD and DLac, applied on the green/red component of WCE images in order to identify ulcerations. BEEMD, apart from an adaptive image denoising tool, was exploited to reveal the intrinsic components (IMFs) of the images in order to achieve data driven, Coefficient of Variance (CV), boost the distinctness between polyp and ulcer regions and facilitate DLac analysis to extract efficient texture characteristics. Optimum IMF selection based on the structure patterns of IMFs disclosed by DLac. The optimum IMFs are used to reconstruct a new refined image. The proposed approach has evaluated on selected WCE images, captured from patients, depicting ulcer and polyp tissue. The optimum image components (IMFs) that contain the majority of texture information include IMFs 5 and 8. Individual IMFs score up to 85.8% classification accuracy, while their exploitation as a group enhances the detection rate up to 94.3% for ulcer and polyp tissue.

Keywords:
  IMF, DLAC, CV, POLYP, Ulcer, WCE, EMD, BEEMD,GI,


References:

1.       Adler, S.N. & Metzger, Y.C. (2011). PillCam COLON capsule endoscopy: recent advances and new insights, Therapeutic Advances in        Gastroenterology, Vol.4, No.4, pp. 265-268
2.       Allain, C. & Coitre, M. (1991). Characterizing the lacunarity of random and deterministic fractal sets, Physical Review a, Vol.44, No.6, pp. 3552-3558 

3.       Ameling, S.; Wirth, S.; Paulus, D.; Lacey, G. & Vilarino, F. (2009). Texture-based polyp detection in colonoscopy, Proc. of Bildverarbeitung fur die Medizin 2009, pp. 364-350,

4.       Aronott, I.D.R. & Lo, S.K. (2004). The clinical utility of wireless capsule endoscopy, Digestive Diseases and Sciences, Vol.49, No.6, pp. 893-901Berlin, Germany, March 22-25, 2009

5.       Barkin, J.S. & Friedman, S. (2002). Wireless capsule endoscopy requiring surgical intervention: the world's experience, The American Journal of Gastroenterology, Vol.97, No.9, pp. S298

6.       Belvin, ML.; Voderholzer, WA. & Loch, S. (2003). Diagnosing small intestinal strictures: first experience with the M2A patency capsule, Endoscopy, Vol.35, Suppl. II, pp. A184

7.       Berlin, B. & Kay, P. (1969). Basic Color Terms: Their Universality and Evolution, University of California Press, ISBN 1-57586-162-3, Berkeley, California

8.       Bourbakis, N. (2005). Detecting abnormal patterns in WCE images, Proc.  of 5th IEEE Symposium on Bioinformatics and Bioengineering, pp. 232-238, Minneapolis, U.S.A., October 19-21, 2005

9.       Capri, F.; Galbiati, S. & Capri, A. (2007). Controlled navigation of endoscopic capsules: Concept and preliminary experimental investigations, IEEE Trans. on Biomedical Engineering, Vol.54, No.11, pp. 2028-2036

10.    Capri, F.; Kastelein, N.; Talcott, M. & Pappone, C. (2011). Magnetically Controllable Gastrointestinal Steering of Video Capsules, IEEE Trans. on Biomedical Engineering, Vol.58, No.2, pp. 231-234

11.    Carta, R.; Thone, J. & Puers, R., Wireless power and data transmission for robotic endoscopic capsules, Proc. of 12th Mediterranean Conference on Medical and Biological Engineering and Computing, pp. 232-235, Chalkidiki, Greece, May 27-30

12.    Cauendo, A.; Rodriquez- Teilez, M.; Hernandez- Duran, M. et al. (2003). Evaluation of M2A patency capsule in the gastrointestinal tract: one-capsule preliminary data from a multicentre prospective trial, Endoscopy, Vol.35, Suppl.II, pp. A182 aCharisis, V. et al. (2010).

13.    Abnormal Pattern Detection in Wireless Capsule Endoscopy

14.    Images Using Nonlinear Analysis in RGB Color Space, Proc. of 32nd International Conference of IEEE Engineering in Medicine and Biology Society, pp. 3674-3677, Buenos Aires, Argentina, August 31- September 4

15.    bCharisis, V. et al. (2010).

16.    Ulcer Detection in Wireless Capsule Endoscopy Images Using

17.    Bidimensional Nonlinear Analysis, Proc. of 12th Mediterranean Conference on Medical and Biological Engineering and Computing, pp. 236-239, Chalkidiki, Greece, May 27-30

18.    Charisis, V.; Hadjileontiadis, L.J.; Liatsos, C.N.; Mavrogiannis, C.C. & Sergiadis, G.D. (2011). Capsule Endoscopy Image Analysis Using Texture Information from Various Color Models, Computer Methods and Programs in Biomedicine, under revision.

19.    Cheifetz, A.S. et al. (2006). The risk of retention of the capsule endoscope in patients with known or suspected Crohn's disease, The American Journal of Gastroenterology, Vol.101, No.10, pp. 2218-2222

20.    Coimbra, M. & Silva Cunha, J.P. (2006). MPEG-7 visual descriptors-contributions for automated feature extraction in capsule endoscopy, IEEE Trans. on Circuits and Systems for Video Technology, Vol.16, No.5, pp. 628-637

21.    Cristianini, N. & Shawe-Taylor, J. (2000). An Introduction to Support Vector Machines and Other Kernel-based Learning Methods, Cambridge University Press, ISBN 0-52-178019-5, Cambridge, UK

22.    Dong, P. (2000). Test of a new lacunarity estimation method for image texture analysis,  International Journal of Remote Sensing, Vol.21, No.17, pp. 3369-3373

23.    Fireman, Z. (2010). Capsule endoscopy: Future horizons, World Journal of Gastrointestinal Endoscopy, Vol.2, No.9, pp. 305-307

24.    Foster, D.H. et al. (1997). Four issues concerning colour constancy and relational colour constancy, Vision Research, Vol.37, No.10, pp. 1341-1345

25.    Foucault, M. (1973). The Birth of the Clinic: An Archaeology of Medical Perception, ISBN 0-415-30772-4, Pantheon Books, New York, USA

26.    Friedman, S. (2004). Comparison of capsule endoscopy to other modalities in small bowl, Gastrointestinal Endoscopy Clinics of North America, Vol.14, No.1, pp. 51-60

27.    Gao, M.; Hu, C.; Chen, Z.; Zhang, H. & Liu, S. (2010). Design and Fabrication of a Magnetic Propulsion System for Self-Propelled Capsule Endoscope, IEEE Trans. on Biomedical Engineering, Vol.57, No.12, pp. 2891-2902

28.    Gefen, Y.; Meir, Y.; Mandelbrot, B.B. & Aharony, A. (1983). Geometric implementation of hypercubic lattices with noninteger dimensionality by use of low lacunarity fractal lattices, Physical Review Letters, Vol.50, No.3, pp. 145-148

29.    Hadjileontiadis, L.J. (2009). A texture-based classification of crackles and squawks using lacunarity, IEEE Trans. on Biomedical Engineering, Vol.56, No.3, pp. 718-732

30.    Haralick, R.M.; Shanmugam, K. & Dinstein, I. (1973). Textural features for image classification, IEEE Trans. on Systems, Man and Cybernetics, Vol.3, No.6, pp. 610-621

31.    Huang, N.E. et al. (1998). The empirical mode decomposition and the Hilbert spectrum for nonlinear and non-stationary time series analysis, Proc. of Royal Society of London a, Vol.454, No.1971, pp. 903-995

32.    Iakovidis, D.K.; Maroulis, D.E. & Karkanis, S.A. (2006). An intelligent system for automatic detection of gastrointestinal adenomas in video endoscopy, Computers in Biology and Medicine, Vol.26, No.10, pp. 1084-1103

33.    Iddan, G.; Meron, G.; Glukhovsky, A. & Swain, P. (2000). Wireless capsule endoscopy, Nature, Vol.405, No.6785, pp. 417-417

34.    Julesz, B. (1975). Experiments in the visual perception of texture, Scientific American, Vol. 232, No.4, pp 34-43

35.    Karkanis, S.A.; Iakovidis, D.K.; Maroulis, D.E.; Karras, D.A. & Tsivras, M. (2007). Computer- aided tumor detection in endoscopic video using color wavelet features, IEEE Trans. on Information Technology in Biomedicine, Vol.7, No.3, pp. 142-151

36.    aKodogiannis, V.S.; Boulougoura, M.; Lygouras, J.N. & Petrounias, I. (2007). A neuro-fuzzy- based system for detecting abnormal patterns in wireless-capsule endoscopic images, Neurocomputing, Vol. 70, No.4-6, pp. 704-717

37.    Kodogiannis, V.S.; Boulougoura, M.; Wadge, E. & Lygouras, J.N. (2007). The usage of soft- computing methodologies in interpreting capsule endoscopy, Engineering Applications of Artificial Intelligence, Vol.20, No.4, pp. 539-553

38.    Krzanowski, W.J. (2000). Principles of multivariate analysis: A user's perspective, Oxford University Press, ISBN 0-19-850708-9, New York, USA

39.    Li, B. & Meng, M.Q.-H. (2007). Analysis of the gastrointestinal status from wireless capsule endoscopy images using local color feature, Proc. of 2007 International Conference on Information Acquisition, pp. 553-557,

40.    bLi, B. & Meng, M. Q.-H. (2009). Texture analysis for ulcer detection in capsule endoscopy images, Image and Vision Computing, Vol.27, No.3, pp. 1336-1342

41.    Liao, Z.; Gao, R.; Xu, C. & Li, ZS. (2010). Indications and detection, completion, and retention rates of small-bowel capsule endoscopy: a systematic review, Gastrointestinal Endoscopy, Vol.71, No.2, pp. 280-286


108-114

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

22.

Authors:

P. A. Bhalge, S. Y. Amdani

Paper Title:

Fast Block Based Motion Estimation using Various Search Patterns

Abstract:   Accurate  motion  estimation  is  a  key  factor  for  achieving  enhanced  compression  ratio.  It  is  the  process  of  determining  an  offset  to  a  suitable  reference  area  in  previously  coded  frame  and  has  a  significant  effect  on  performance  of  coders and  decoders  (CODEC).This paper is survey paper for block based motion estimation. This paper describes the classical Full search motion estimation algorithm, diamond search, hexagonal search and octagon with square pattern search algorithm for motion estimation.

Keywords:
 Block matching, Diamond Search, Hexagonal Search, Motion Estimation, Video Coding.


References:

1.       Yue Chen, Yu Wang, Ying Lu, A New Fast Motion Estimation Algorithm ,  Literature     Survey       October (1998).
2.       Fulvio Moschetti, A Statistical Approach to Motion Estimation, École Polytechnique Fédérale  De Lausanne, a  Thesis  report, Lausanne, EPFL (2001).

3.       Abdelrahman Abdelazim, Fast Motion Estimation Algorithms for Block-Based    Video Coding        Encoders, thesis University of Central Lancashire , ( 2011).

4.       Shan Zhu and Kai-Kuang Ma ,A New Diamond Search Algorithm for Fast Block Matching Motion Estimation ,IEEE Transactions on Image Processing,  Vol. 9,    No. 2,    ( 2000 ).

5.       Chi-Wai Lam ,, Lai-Man Po , and Chun Ho Cheung ,A New       Cross-Diamond  Search  Algorithm        For Fast Block  Matching

6.       Motion   Estimation ,Hong Kong  Sar,    China.   [Project No.7001385].

7.       Chun-Ho Cheung, Lai-Man Po, Novel  Cross-Diamond-Hexagonal      

8.       Search Algorithms for Fast       Block Motion Estimation,IEEE Transactions On Multimedia,  Vol. 7, No. 1, ( 2005 ).

9.       Lai-Man Po,  Chi-Wang Ting  and  Ka-Ho Ng, Enhanced Diamond Search Using Four-Corner-     Based Inner Search  For Fast Block Motion Estimation, City University of Hong Kong, Hong Kong, China,(2006).

10.    M K Pushpa, S.Sethu Selvi, Adaptive Square-Diamond Search(ASDS) Algorithm for Fast Block Matching Motion Estimation, International Journal of Computer Science and Information Technologies, Vol. 3(5) , (2012).

11.    B. Kasi Viswanatha Reddy & Sukadev Meher, Three Step Diamond Search Algorithm for  Fast Block-Matching Motion Estimation International Journal of Advanced Electrical and Electronics Engineering, Volume-2, Issue-5, (2013).

12.    Yuan Gao, Peng-yu Liu and Ke-bin Jia,” A Fast Motion Estimation Algorithm Based on Motion Vector Distribution Prediction”, Journal of Software, Vol. 8, No. 11, November 2013.

13.    S. Sowmyayani , P. Arockia Jansi Rani,” Block based Motion Estimation using Octagon and Square Pattern”, International Journal of Signal Processing, Image Processing and Pattern Recognition, Vol.7, No.4 (2014), pp.317-324.

14.    Ismael Daribo, Dinei Florencio, Gene Cheung,” Arbitrarily Shaped Motion Prediction for Depth Video Compression Using Arithmetic Edge Coding”, IEEE Transactions On Image Processing, Vol. 23, No. 11, November 2014.

15.    Jongho Kim, Jong-Hyeok Lee, Byung-Gyu Kim, Jin Soo Choi,” Fast mode decision scheme using sum of the absolute  difference-based Bayesian model for the H.264/AVC video standard”, IET Signal Process., 2014, Vol. 8, Iss. 5, pp. 530–539

16.    Yong Guo, Li Chen, Zhiyong Gao, and Xiaoyun Zhang,” Frame Rate Up-Conversion Method for Video Processing Applications”, IEEE TRANSACTIONS ON BROADCASTING, 2014.


115-118

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

23.

Authors:

Nganthoi Naorem, Th. Kiranbala Devi

Paper Title:

Estimation of Potential Evapotranspiration using Empirical Models for Imphal

Abstract:    Estimation of evapotranspiration of an area is highly essential for irrigation scheduling and design of irrigation project. It is the basic parameter for estimating the crop water requirements. In this study, Potential evapotranspiration (PET) were computed using 10 empirical models viz. Blaney-Criddle, Thornthwaite, Hargreaves, Penman, Penman-Monteith, Jensen-Haise, Turc, Priestley-Taylor, Makkink and Open pan method with the help of climatological data for the year 2012 for Imphal, Manipur. The missing climatic data to be used in the empirical models are computed according to the guidelines given in FAO Irrigation and Drainage paper, 56.FAO Rome, Italy. The empirically estimated PET from all these models were validated with the actual measured mesh covered pan evaporation value using calibration co-efficients. From the study, Hargreaves method was found to be the most suitable method for the region with least biasness and minimum error. The calibration co-efficients developed in this study can be used for reducing the error of estimating evapotranspiration by these empirical models for the area under study.

Keywords:
Calibration co-efficients, Error analysis, Missing Climatic data, Pan evaporation, Potential Evapotranspiration. 


References:

1.          Allen, R.G., L.S.Pereira, D.Raes and M.Smith, (1998). Crop Evapotranspiration-Guidelines for computing crop water requirements. FAO Irrigation and Drainage paper, 56.FAO Rome, Italy.
2.          Allen, R.G., Smith, M., Pereira, L.S. and Perrier, A. (1994). An update for the calculation of reference evapotranspiration. ICID Bulletin, 43 (2): 1-34.

3.          Allen, R.G. and Brockway, C.E. (1983). Estimating consumptive use on a statewide basis.(In) Proc. (1983) Irrig. and Drain. Specialty Conf. at Jackson, WY.ASCE, New York, pp.79-89.

4.          Arun Kumar. Geo-Environmental Studies of Manipur River Basin. Ministry of Environment & Forests.

5.          Bastiaanssen, W.G.M,  M.J.M. Cheema, W.W. Immerzeel, I.J.Miltenburg & H.Pelgrum (2012).Surface energy balance and actual evapotranspiration of the transboundary Indus Basin estimated from satellite measurements and the ETLook model. Water Resources Research, 48, W11512, doi: 10. 1029/2011 WR010482.

6.          Blaney H.F. and Criddle W.B. (1950). Determining water requirements in irrigated areas from climatological and irrigation data. USDA Agr. SCS-TP 96.

7.          Chowdhury, S, M.K.Nanda, G.Saha and N.Deka (2010). Evaluation of different methods for evapotranspiration estimation using automatic weather station data. Journal of Agrometeorology 12(1): 85-88.

8.          Doorenbos, J. and Pruitt, W.O. (1977). Guidelines for predicting crop water requirements. FAO Irrigation and Drainage paper, 24.FAO Rome, Italy.

9.          Dr. P. Jaya Rami Reddy. A Textbook of Hydrology. University Science Press, Laxmi Publications Pvt. Ltd. Pp. 235-239.

10.       Gunston, H. and Batchelor, C.H. (1983). A comparison of the Priestley - Taylor and Penman methods for estimating reference crop evapotranspiration in tropical countries. Agric. Water Manage., 6: 65-77.

11.       Hajare, H.V., Dr Raman, N.S., Dharkar, J.M., (2008). New Technique for Evaluation of Crop Water Requirement. WSEAS transactions on Environment and Development. ISSN: 1790-5079. Issue 5, volume 4: 436-446

12.       . Hargreaves G.H. and A. Samani (1982). Estimating potential evapotranspiartion. Journal of the Irrigation and Drainage Division, proc. of the American Society of Civil Engg. 108 (IR3): 225-230.

13.       Ingle, P.M. (2007). Estimation of Water Requirement for Seasonal and Annual Crops using Open Pan Evaporation Method. Karnataka Journal of Agricultural Sciences 20(3): 676-679.

14.       Jensen M.E. (1973). Consumptive use of water and irrigation water requirements, A report, New York: American Society of Civil Engineers.

15.       Jensen M.E., Haise H.R. (1963). Estimation of evapotranspiration from solar radiation. Journal of Irrigation and Drainage Division, Proceedings of the American Society of Civil Engineers 89: 15-41.

16.       Kingra, P.K., and Hundal S.S. (2005). Estimating potential evapotranspiration in relation to pan evaporation at Ludhiana, Punjab. Journal of Agrometeorology 7(1): 123-125.

17.       Makkink G.F. (1957). Testing the Penman formula by means of lysimeters. Journal of the Institution of Water Engineers 11: 277-288.

18.       Meshram, D.T., S.D. Gorantiwar, H.K. Mittal and R.C. Purohit (2010). Comparison of reference crop evapotranspiration methods in western part of Maharashtra state. Journal of Agrometeorology 12(1): 44-46.

19.       Modi, P.N. Textbook of Irrigation Water Resources and Water Power Engineering. Rajsons Publications Pvt. Ltd.

20.       National Institute of Hydrology (2000). Crop Water Requirements for Krishnai Irrigation Project (Medium) of Assam. CS/AR-9/99-2000.

21.       Penman H.L. (1956). Estimating evapotranspiration. Trans Am. Geophs. Union 37, pp. 43-46.

22.       Penman H.L. (1948). Natural evaporation from open water, bare soil and grass. Proc. Royal soc. of London, Series A:193, 120-146.

23.       Priestley, C.H.B., Taylor, R.J. (1972). On the assessment of the surface heat flux and evaporation using large-scale parameters. Monthly Weather Review 100: 81-92.

24.       Rambabu, A. and B. Bapuji Rao. (1999). Evaluation and calibration of some potential evapo- transpiration estimating methods. J. Agrometeorol, 1(2): 155-162.

25.       Rao, B.B., Sandeep, V.M., Rao, V.U.M. and Venkateswarlu, B. (2012). Potential Evapotranspiartion estimation for Indian conditions: Improving accuracy through calibration coefficients.Tech. Bull. No. 1/2012. All India Co-ordinated Research  Project on Agrometeorology, Central Research Institute for Dryland Agriculture, Hyderabad. 60p.

26.       Sharma, R.G., and Dastane, N.G., (1968). Use of screened evaporimeters in evapotranspirametry. proc. water management symposium, Udaipur.

27.       Saikia U.S., K.K. Satapathy, B. Goswami and T.D. Lama (2005). Estimation of  PET by empirical models for north eastern hill region of Meghalaya. Journal of Agrometeorology 7(2): 268-273.

28.       Smith, M., Allen, R.G., Monteith, J.L., Pereira, L. and Segeren, A. (1991). Report of the expert consultation on procedures for revision of FAO guidelines for prediction of crop water requirements. UN-FAO, Rome, Italy, 54p.

29.       Turc L. (1961). Estimation of irrigation water requirements, potential evapotranspiration: a simple climatic formula evolved up to date. Annals of Agronomy 12: 13-49.

30.       Thornthwaite C.W. (1948). An approach towards a national classification of climate. Geo. Rev. 38: 55-94.

31.       Xu C-Y, Singh V.P. (2000). Evaluation and generalization of radiation-based methods for calculating evaporation. Hydrological Processes 14: 339-349.

   

119-123

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

24.

Authors:

K. Harinadha Reddy

Paper Title:

Study and Analysis of LFC with Wind Plant in Two Area Power System through Fuzzy Inference Technique

Abstract: The proposed work is mainly about the study and analysis of load frequency control (LFC) of two area power system consisting thermal power plant and wind power plant. Output of wind plant connected in interconnected power system is regulated with help of Fuzzy Inference Technique. Three Adaptive Neuro-Fuzzy Inference System (ANFIS) controllers are used in proposed work. Gain of speed regulation is controlled by first ANFIS. Two Adaptive Neuro-Fuzzy Inference System’s are   used to obtain control over the wind and thermal power plant gains. Inputs for FLC are obtained from change in frequency and derivative of change in frequency of interconnected power system. Fuzzy logic Controller (FLC) inputs are properly and carefully taken for obtaining control vector from defuzzified output of FLC. The output of self tuned FLC with all ANFIS’s in two plants are shown their performance under test conditions. 

Keywords:
 Load Frequency Control, Interconnected Power System, Wind Power Plant, Fuzzy Logic Controller and Adaptive Neuro-Fuzzy Inference System


References:

1.          Shashi KantPandey, Soumya R.Mohanty, NandKishor, “A literaturesurveyonload – frequency control for conventional and distribution generation power systems”, Renewable and Sustainable Energy Reviews, No.25, pp.318–334, 2013
2.          Wen Tan, Unified tuning of PID load frequency controller for power system via IMC,IEEE Trans. Power Systems, vol. 25, no. 1, pp. 341-350, 2010.

3.          Esmaeil Rezaei, Ahmadreza Tabesh, Member, IEEE, and Mohammad Ebrahimi, “Dynamic Model and Control of DFIG Wind Energy Systems Based on Power Transfer Matrix”, IEEE transactions on Power Delivery, pp. 1485-1494, vol. 27, no. 3, 2012.

4.          Aldeen, M. and Marah, J.F., “Decentralized Proportional – Plus-Integral Design Method for Interconnected Power Systems”, IEE Proceedings-C, Vol. 138, No. 4, 1991.

5.          Yamashika, K., and Miyagi, H., “Multivariable self-Tuning Regulator for Load Frequency Control System with Interaction of Voltage on Load Demand”, IEEE Proceedings-D, Vol. 138, NO. 2, March 1999.

6.          Dr.K.Harinadha Reddy, Member IEEE, Fellow IETE, “Analysis of Load Frequency Control in Power System with GA Computational data to Fuzzy Logic Controller”,  International Journal of Engineering and Technical Research (IJETR), Vol.2, No.11, 2014 

7.          MATLAB Supplement to Fuzzy & Neural approach in Engineering, John Wiley NY.

8.          Spooner J. T., Maggiore M., Ordonez R., Passino K. M., “Stable adaptative control and estimation for nonlinear system, Neural and fuzzy approximator techniques”, Willey-Interscience, 2002.

9.          Dr.K.Harinadha Reddy., “Power Control using Fuzzy Logic Controller in DFIG Wind Farm”, IJST, vol 2,issue 11, pp 47-51, 2014.

10.       Ross T.J. 1995. Fuzzy logic with engineering application. Mc Gro Hill, International Edition.

11.       Shayeghi H., Shayanfar H.A. “Power system load frequency control using RBF neural network based on μ-Synthesis theory”, Proceeding of IEEE conference on cybernatics and intelligent system Singapore, 1-3 Dec 2004, pp 93-98.

12.       L. Fan, H. Yin, and Z. Miao, “On active/reactive power modulation of DFIG-based wind generation for interarea oscillation damping,” IEEE Trans. Energy Convers., vol. 26, no. 2, pp. 513–521, Jun. 2011.

13.       S. Muller, M. Deicke, and R. De Doncker, “Doubly fed induction generator systems for wind turbines,” IEEE Ind. Appl. Mag., vol. 8, no. 3, pp. 26–33, May/Jun. 2002.

14.       E. Tremblay, S. Atayde, and A. Chandra, “Comparative study of control strategies for the doubly fed induction generator in wind energy conversion systems:ADSP-based implementation approach,” IEEE Trans. Sustain. Energy, vol. 2, no. 3, pp. 288–299, Jul. 2011.

15.       M. Mohseni, S. Islam, and M. Masoum, “Enhanced hysteresis-based current regulators in vector control of DFIG wind turbines,” IEEE

16.       Trans. Power Electron., vol. 26, no. 1, pp. 223–234, Jan. 2011.

17.       Z.Wang, G. Li, Y. Sun, and B. Ooi, “Effect of erroneous position measurements in vector-controlled doubly fed induction generator,” IEEE Trans. Energy Convers.,
vol. 25, no. 1, pp. 59–69, Mar. 2010.

18.       Nanda J., Kakkarum J.S., “Automatic Generation Control with Fuzzy logic controllers considering generation constraints”, In Proceeding of 6th Int Conf on Advances in Power System Control Operation and managements” Hong Kong, 2003.

19.       Ozkop Emre, H Ismail. Altas, M Adel. Sharaf. 2010. Load Frequency Control in Four Area Power Systems Using Fuzzy Logic PI Controller , 16th National Power Systems Conference, 15th-17th December, Department of Electrical Engineering, Univ. College of Engg., Osmania University, Hyderabad, A.P, India page No,233-236

20.       Panna-Ram, Jha A.N. 2010. Automatic Generation control of interconnected hydro-thermal system in deregulated environment considering generation rate constraints, International Conference on Industrial Electronics, Control and Robotics, pp 148-158.

21.       Shayeghi H., Shayanfar H. A., Jalili A. 2009. Load frequency control strategies: A state-of-the- art survey for the researcher, Energy Conversion and Management 50, pp 344-353, ELSEVIER.

22.       Kundur, P., Power System Stability and Control, McGraw – Hill Book Company, New York, 1994.

23.       Saadat, H., Power system Analysis, McGraw – Hill Book Company, New York, 1999.

24.       Pan, C. I., and Liaw L.M. “AN Adaptive Controller for Power System Load – Frequency Control”, IEEE on Power System. Vol. 4, No. 1, Feb. 1989, Pp 122 – 128.

25.       Dyukanovic, M., “Two-Area Load Frequency Control with Neural Networks,: Proc. 1993. North American Power Symposium, Pp. 161 – 169.

26.       Brich, A. P, et.al, “Neural Network Assisted Load Frequency Control”, 28th University Power Engineering Conf. Proc. Vol. 2, 1993, Pp. 518 – 521.

27.       Hsu, Y., and Cheng, C., “Load Frequency Control using Fuzzy Logic,” Int. Conf. on High Technology in the Power Industry, 1991, Pp. 32 – 38.

28.       Indulka, C. S., and Raj, B., “Application of Fuzzy Controller to Automatic Generation Control,” Electric Machines and Power Systems, Vol. 23, No. 2, Mar- Apr. 1995, pp. 209 – 220.

29.       Fuzzy Logic Toolbox user’s Guide.

30.       Cirstea N., Dinu A., Khor J.G., McCormick M., “Neural and fuzzy logic control of drives and power systems”, Oxford,Newnes, 2002.

31.       Masiala M., Ghnbi M., Kaddouri A. 2004. An Adaptive Fuzzy Controller Gain Scheduling for Power System Load-Frequency Control, IEEE International Conference on Industrial Technology, (ICIT).pp.1515-1520.Mines J. N. 1997.

32.       Bose B. K., “Expert system, fuzzy logic, and neural network applications in power electronics and motion control”, Proceedings of the IEEE, vol. 82, NO. 8,pp, 1303-1321, August 1994.

33.       Dadios Elmer P., “Fuzzy logic – controls, concepts, theories and applications”, Croatia, InTech, ISBN 978-953-51-0396-7.

34.       Aldeen M., “A Fresh Approach to the LQR Problems with Application to Power Systems”, Proc. of Int. Power Engineering Conf., Singapore Vol. 1, 1993, Pp. 374 – 379.

35.       Randy L. Haupt Sue Ellen Haupt, “Practical Genetic Algorithms”, Second Edition, John Wiley & Sons, 2004.

36.       Simoes, M.G. Bose, B.K. Spiegel, R.J., “Design and performance evaluation of a fuzzy-logic-based variable speed wind generation system” IEEE Trans. On Industry Applications, Vol. 33, no. 4, pp. 956 – 965, July-Aug.1997.

37.       Bor-Sen Chen, Chung-Shi Tseng, Huey-Jian Uang, “Robustness Design of Nonlinear Dynamic Systems via Fuzzy Linear Control,” IEEE Fuzzy Systems, vol. 7, no. 5, pp. 571-585, Oct. 1999.


124-133

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

25.

Authors:

Issa Najafi

Paper Title:

E-Trust Assessment on E-commerce

Abstract:  The E-Commerce, as to the nature of the transaction between both parties, is represented in various classifications and includes a framework of computer programs and systems that undertake services in the internet, which are search for information, exchange management, study of rating condition, provision of rating, online payment mode, summary of report and account management. These are the foundations which insure the internet organized activities, increasing the efficiency of transacting parties. For these transactions, system security must be provided and create the necessary ground for mutual trust between the parties, trust towards the system operation, as well as trust towards the relevant product, brand or service[1]. In Internet or electronic environment the trust concept is represented as ‘e-trust or electronic trust ’ formulation. The E-Trust , whose concept is the willingness of the truster ( one party ) to accept the risks and vulnerability against an internet vendor based on positive expectations about the characteristics and future behaviors of the trustee ( other party ) , is created with difficulties for an online seller[1]. In this research firstly , we survey the concept of trust , e-Trust , trust factors , trust life cycle and  then, identify and introduce the e-trust building models , methods and enhancing in the context of E-commerce .

Keywords:
  Trust, E-Trust, E-Commerce, E-Trust Building, E- Environment, Assessment


References:

1.          Najafi , I, (2013) , “Evaluation of trust factors in management and commerce fields during electronically carried out transactions”, Dissertation presented in partial Fulfillment of the Requirements for the Degree of doctor of Philosophy (Ph.D) in Information Technologies , National Agrarian University of Armenia , Publication: Yerevan, 2013 . 140 p. : Date:2013 Availability: Copies available: ANAU library [35 N-14] (1)
2.          Olmedilla, D., Rana, O., Matthews, B. & Nejdl, W. (2005). Security and trust issues in semantic grids. In Proceedings of the Dagsthul Seminar, Semantic Grid: The Convergence of Technologies, volume 05271

3.          Laudon, K.C. & Laudon J.P. (2005), Management Information Systems: Managing the Digital Firm. New Jersey: Pearson Education, Inc.

4.          Head, M., and Hassanein, K. (2002). “Trust in e-Commerce: Evaluating the Impact of  Third-Party Seals”, Quarterly Journal of EC, 3(3), 307-325.

5.          Florian Skopik, (2010),Dynamic Trust in Mixed Service-oriented Systems ,Technischen Universität Wien, 2010 ,p17-20

6.          Richters, O., Peixoto. T.P. (2011) Trust Transitivity in Social Networks. PLoS ONE 6(4): e18384. doi:10.1371/journal.pone.0018384

7.          Chang, E., Dillion, T., and Hussain, F. K. (2006) Trust and Reputation for Service-Oriented Environments: Technologies for Building Business Intelligence and Consumer Confidence. John Wiley & Sons, Ltd.

8.          Hosmer, R.T. (1995) “Trust: The connecting link between organizational theory and philosophical ethics”, The Academy of Management Review, Vol. 20 No. 2, pp. 379-403.

9.          Mui, L., Mohtashemi, M., and Halberstadt, A. (2002). A computational model of trust and reputation. In Proceedings of the 35th International Conference on System Science, pages 280–287.

10.       Grandison, T. and Sloman, M. (2000). A survey of trust in internet applications. IEEE Communications Surveys and Tutorials, 4(4):2–16.

11.       La Londe, B. (2002) "Who Can You Trust These Days?", Supply Chain Management Review,May-June 2002, pp. 9-10.

12.       Sherman, S. (1992) "Are Strategic Alliances Working?" Fortune, September, pp. 77-78. Sheth, J. N. and Sisodia, R. (2005) “Does marketing need a reform?”, Journal of Marketing, Vol.69, No. 4, pp. 10-12.

13.       Egger, F.N. (2003). From Interactions to Transactions: Designing the Trust Experience for Business-to-Consumer Electronic Commerce. PhD Thesis, Eindhoven University of Technology (The Netherlands). ISBN 90-386-1778-X.

14.       Nielsen, M., Krukow, K.,(2007) , "On the Formal Modelling of Trust in Reputation-Based Systems", BRICS,University of Aarhus,Denmark, http://cs.au.dk/~krukow/research/publications/online_papers/nielsen-krukow.pdf

15.       Harrison McKnight D., and Norman, L., Chervany, (2002), What Trust Means in E-Commerce Customer Relationships: An Interdisciplinary Conceptual Typology, International Journal of Electronic Commerce / Winter 2001– 2002, V ol. 6, No. 2, pp. 35–59.

16.       American Marketing Association, 2008, New Definition of Marketing, Chicago, http://www.marketingpower.com

17.       Kotler, P. (2003), Marketing Management.USA: Prentice-Hall International, Inc.

18.       Rousseau, D. M., Sitkin, S. B., Burt, R. S., & Camerer , C. (1998). Not so different after all: a cross-discipline view of trust. Academy of Management Review, 23(3), 393-404

19.       Lewis, J. D. Weight. A. (1985), Trust as a social reality. Social Forces, 63(4), 967-985

20.       Kautonen T., Elgar, E., (2008), ” Trust and new Technologies: Marketing and Management on the Internet “, Business & Economics, ISBN 978 1 84720 568 1, P 6

21.       Child, J. (2001), Trust – The fundamental bond in global collaboration. Organization Dynamics, 29(4), 274-288.

22.       Zucker, L. 1986, 'Production of trust: institutional sources of economic structure 1840-1902', Research in Organisational Behavior, vol. 8, no. 53-111.

23.       McKnight, D.H.; Cummings, L.L.; and Chervany, N.L., (1998), Initial trust formation in new organizational relationships. Academy of Management Review, 23, 3 (1998), 473–490.

24.       Yo-Hsin Kuo, Yo-Hsin Kuo; Fan Wu, Fan Wu; Ruey-Lung Hsiao, Ruey-Lung Hsiao, (2007), “A Trust Evaluation to Help On-line Consumer to Choose the Provider in Auction Web Site “, Institute of Electrical and Electronics Engineers

25.       Lewicki R. J., Bunker B. B., (1996), Developing and Maintaining Trust in Work Relationships, in R. M. Kramer & T. R. Tyler (eds.)Trust in Organizations: Frontiers of Theory and Research, Sage Publications, Thousand Oaks, California, pp. 114-139.

26.       Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. The Academy of Management Review, 20(3), 709-734. doi:10.2307/258792

27.       Smith, P., & Chaffey, D. (2002). E-marketing excellence. Oxford: Elsevier Butterworth Heinemann

28.       Urban, G. L., Sultan, F., Qualls, W. J. (2000), Placing Trust at the Center of your Internet Strategy, Sloan Management Review, vol. 42 no. 1., pp. 39-48.

29.       Resnick, P., Zeckhauser, R., Friedman, E., Kuwabara, K., (2000), Reputation Systems, Communication of the ACM, vol. 43. 12, pp. 45-48.

30.       Smith, M. D., Bailey, J., Brynjolfsson, E., (1999), Understanding Digital Markets: Review and Assessment, Available : http://ecommerce.mit.edu/papers/ude

31.       Kollock, P. (1999), The Production of Trust in Online Markets, Advances in Groups Process, vol. 16, pp. 99-133.

32.       Deutsch, M. (1958). Trust and suspicion. Journal of Conflict Resolution, 2, 265–279

33.       http://www.verisign.com.au/repository/tutorial/digital/intro1.shtml


134-142

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

26.

Authors:

Priti Kalode, Onkar S. Kemkar, P. R. Gundalwar

Paper Title:

Computer Assisted Medical Health System for the Benefit of Hard to Reach Rural Area

Abstract:   It is a known fact that medical practitioners seldom prefer to work in rural areas. For providing medical help to rural population more particularly to people from hard to reach areas computer assisted medical health system is developed. This paper discusses the method for fast clinical assistance in hard to reach places & its applicability.

Keywords:
   EHealth, Health and medical informatics, Analysis, Management of Healthcare, IT & HIS, Knowledge Management


References:

1.    R.D.Lele, Computers in Medicine, TMH Publishing Company Limited, New Delhi, 2005, Page 261-319.
2.    Reggia J., A production rule system for Neurological localization, Proc. Second Ann. Symp. Comp. Appllic. Med. Care, IEEE, 1978, pp 254-260

3.    Smith M., “Portals: Towards an Application Framework for Interoperability”. Communications of the ACM, Volume 47, Issue 10, 2004, pp. 93-97.

143-145

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

27.

Authors:

Arifuzzaman Md, Tosikur Rahman, Ahammad Emtiaz, Islam Md. Rashedul, Nafiz Ahmed Chisty

Paper Title:

Bengali and English Vehicles Number Plate Recognition System using MATLAB

Abstract: Automatic Number Plate Localization and Recognition (ANPR) is a method that uses template matching on images to read the number plate of vehicles. This paper presents a robust method of license plate localization, segmentation and recognition of the character present in the located plate using an algorithm, which is based on pixel. The whole process has been designed in such a way that it can detect the conventional English number plate and can also detect Bengali alphanumeric number plate with adjoined Bengali letter by an easy and efficient algorithm which is robust to work and less time consuming. The ANPR systems are largely recommended for security system like traffic monitoring, electronic toll collection, and surveillance device and safety supervision. This whole system has been developed using MATLAB R2009a.

Keywords:
  ANPR, Character Recognition, Number Plate Localization, Template matching.


References:

1.       Parsi.R, Di Claudio E. D, Lucarelli. G, Orlandi. G (1998) 195-198. Car plate recognition by neural networks and image processing, IEEE International Symposium on Circuits and Systems.
2.       Clausi, D.A.2002 “K-means Iterative Fisher (KIF) unsupervised clustering algorithm applied to image texture segmentation,” Original Research Article Pattern Recognition, 35(9): 1959      1972.

3.       Javier Herrera, P., Gonzalo Pajares and María Guijarro, 2011. “A segmentation method using Otsu and fuzzy k-Means for stereovision matching in hemispherical images from forest environments” Original Research Article Applied Soft Computing, 11(8): 4738-474.

4.       Chitode. J. S, Rupali Kate( 2012), Number Plate Recognition Using Segmentation, International Journal of Engineering Research &Technology(IJERT) ,Vol. 1 Issue 9.

5.       Hegt. H. A, De la Haye. R. J, Khan. N. A (1998), A high performance license plate recognition system, in: Proceedings of IEEE International Conference on System, Man and Cybernetics, Vol. 5, pp.4357-4362.

6.       O. Martinsky, “Algorithmic and Mathematical Principles of Automatic Number Plate Recognition System”, B.Sc. Paper, BRNO University of Technology, 2007.

7.       Optical Character Recognition, Available: http://www.cc.gatech.edu/~kwatra/computer_vision/ocr/OCR.html/

8.       XU Hong-ke, YU Fu-hua, JIAO Jia-hua, SONG Huan-sheng (2004), A New Approach of the Vehicle License Plate Location.

9.       Jaya Lakshmi. CH (2008) International journal on Advanced Engineering Sciences and Technologies, Vol. No. 6, Issue No. 1, 010 – 014.

10.    Optical Character Recognition by Template Matching, Available: http://www.academia.edu/.../OpticalCharacterRecognitionbytemplate matching/

11.    Character Recognition in Matlab, Available: http://http://stackoverflow.com/questions/15183590/character-recognition-in-matlab/

12.    C. Arth, F. Limberger, H. Bischof, “Real Time Plate Recognition on an Embedded DSP Platform”, in Proc. IEEE Conf. CVPR, Jun., 2007, pp. 1–8

13.    Shapiro. V, Gluchehev. G (2004), Multinational license plate recognition system: segmentation and classification, in: ICPR, vol. 4, pp.352-355

14.    Liu Xinyu. Research on Vehicle License Plate Recognition System Application [D]. Zhengzhou: Zhengzhou University2004.

15.    Max Mignotte, 2011. “A de-texturing and spatially constrained K-means approach for image segmentation Pattern Recognition Letters,”32(2): 359-367.


146-149

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

28.

Authors:

Farooq Saeed

Paper Title:

An Interactive Design Tool for Engine Sand Separator System

Abstract:  This paper presents the details of development of an efficient interactive design tool for aircraft engine sand separator systems. The development of such a tool was felt necessary to address the problem of sand ingestion in gas turbine engines; a vital concern for the aviation and gas-turbine based electricity generation industry communities operating in desert environments as it can seriously affect the operation, performance and life cycle of a turbine engine. The design tool makes use of state-of-the-art practical geometry design and analysis technique, namely the inverse airfoil design method for the design of specific profiles for engine air intakes. The sand separator design is achieved by giving a specific contour to the intake profile, such as a highly curved bend in the duct, so that the contaminants because of their inertial momentum are forced away from the central flow. Since the sand particles can rebound of the air intake walls and enter the engine, the method takes into account sand particle rebound or restitution characteristics in the design. The design is accomplished with the aid of optimization techniques in both the inverse aerodynamic design as well as in the sand separator system design. In addition, to facilitate the analysis and design in an interactive manner, a MATLAB GUI has been developed. Details of the analysis and design tool are presented along with simple but practical design examples to demonstrate the usefulness and utility of the method and the interactive tool

Keywords:
Sand ingestion, inertial particle separator, inverse airfoil design, potential flow, sand particle trajectory


References:

[1]  W., and Hamed, A., “Installed Engine Performance in Dust Laden Atmosphere,” AIAA Paper 1984-2488, 1984.
[2]           van der Walt, J. P., and Nurick, A., “Prediction of Helicopter Engines Fitted with Dust Filters,” AIAA Journal of Aircraft, Vol. 23, No. 1, Jan.—Feb. 1995, pp.118-123.

[3]           Mann, D., “Case Studies in TRIZ: Helicopter Engine Particle Separator,” The TRIZ Journal [online], Feb. 1999, http://www.triz-journal.com/archives/1999/02/a/index.htm  (retrieved 10 April 2010).

[4]           J. Tariq, “Operating Aircraft in Gulf Environment,” presented at the Regional Aviation Symposium organized by Saudi Aramco Aviation, Nov. 6, 2007.

[5]           Hamed, A., Tabakoff, W., and Wenglarz, R., “Erosion and Deposition in Turbomachinery,” AIAA Journal of Propulsion and Power, Vol. 22, No. 2, March–April 2006.

[6]           Tabakoff, W., and Simpson, G., “Experimental Study of Deterioration and Retention on Coated and Uncoated Compressor and Turbine Blades,” AIAA Paper 2002-2373, Jan. 2002

[7]           Abedi, M., “Effect of Restitution Coefficient on Inertial Particle Separator’s efficiency,” Mechanical Engineering Master's Theses, Northeastern University, Paper 17, 2009. http://hdl.handle.net/2047/d1001925x (retrieved 10 April 2010).

[8]           Vittal, B. V. R., Tipton, D. L., and Bennett, W. A., “Development of an Advanced Vaneless Inlet Particle Separator for Helicopter Engines,” AIAA Journal of Propulsion and Power, Vol. 2, No. 5, 1986, pp. 438-444.

[9]           Breitman, D. S., Dueck, E. G., and Habashi, W. G., “Analysis of a Split-Flow Inertial Particle Separator by Finite Elements,” AIAA Journal of Aircraft, Vol. 22, No. 2, 1985, pp. 135-140.

[10]         Zedan, M., Mostafa, A., Hartman, P., and Sehra, A., “Viscous Flow Analysis of Advanced Particle Separators,” AIAA Journal of Propulsion and Power, Vol. 8, No. 4, 1992, pp. 843-848

[11]         Saeed, F., and Al-Garni, A. Z., “System for Inertial Particles Separartion,” US Patent No. 7922784, issued by the US Patent & Trademark Office on April 12, 2011.

[12]         Saeed, F., Al-Garni, A. Z., “Analysis Method for Inertial Particle Separator,” AIAA Journal of Aircraft, Vol. 44, No. 4, Jul.–Aug. 2007, pp. 1150-1158.

[13]         Al-Faris, E., and Saeed, F., “Design and Optimization Method for Inertial Particle Separator Systems,” AIAA Journal of Aircraft, Vol. 46, No. 6, Nov.-Dec. 2009, pp. 1919-1929.

[14]         Dai, L., Yu, M., and Dai, Y., “Nozzle Passage Aerodynamic Design to Reduce Solid Particle Erosion of a Supercritical Steam Turbine Control Stage,” Wear, Vol. 262, 2007, p. 104–111.

[15]         Eppler, R., Airfoil Design and Data, Springer – Verlag, New York, 1990.

[16]         Selig, M. S., and Maughmer, M., “Multipoint Inverse Airfoil Design Method Based on Conformal Mapping,” AIAA Journal, Vol. 30, No. 5, May 1992, pp. 1162-1170.

[17]         Saeed, F., and Selig, M. S., “A Multipoint Inverse Airfoil Design Method for Slot-Suction Airfoils,” AIAA Journal of Aircraft, Vol. 33, No. 5, Jul.–Aug. 1996, pp. 708-715.

[18]         Selig, Michael S., “PROFOIL – A Multipoint Inverse Airfoil Design Method, User’s Guide”, Cleveland Ohio, Feb. 1999.

[19]         Tuncer, C., An Engineering Approach to the Calculation of Aerodynamic Flows, Horizon Publishing Inc. (Springer), California, 1999. 

[20]         Saeed, F., Brette, C., Fregeau, M., Trifu, O., and Paraschivoiu, I., “A Three-Dimensional Water Droplet Trajectory and Impingement Analysis Program,” AIAA Paper 2005-4838, June 2005.

[21]         Saeed, F., “State-of-the-Art Aircraft Icing and Anti-Icing Simulation,” ARA (American Romanian Academy) Journal, Vol. 2000-2002, No. 25-27, June 2002, pp. 106-113.

[22]         Langmuir, I., and Blodgett, K. B., “A Mathmatical Investigation of Water Droplet Trajectories,” US Army Air Forces TR 5418, Feb. 1946 (Contract No. W-33-038-ac-9151 with General Electric Co.). Also US Department of Commerce Publication Board (PB) No. 27565.

[23]         Bragg, M. B., “A Similarity Analysis of the Droplet Trajectory Equation,” AIAA Journal, Vol. 20, No. 12, Dec. 1982, pp. 1681-1686.

[24]         Fehlberg, E., “Classical Eighth- and Lower-Order Runge-Kutta-Nyström Formulas with a New Stepsize Control Procedure for Special Second-Order Differential Equations,” NASA Technical Report R-381, March 1972.

[25]         Chhabra, R. P., Agarwal, L., and Sinha, N. K., “Drag on Non-Spherical Particles: An Evaluation of Available Methods,” Powder Technology, Vol. 101, No. 3, March 1999, pp. 288—295.

[26]         Taslim, M. E., Khanicheh, A., and Spring, S., “A Numerical Study of Sand Separation Applicable to Inlet Particle Separator Systems,” Journal of the American Helicopter Society, Vol. 54, No. 042001, 2009.

[27]         Taslim, M. E., and Spring, S., “A Numerical Study of Sand Particle Distribution, Density, and Shape Effects on the Scavenge Efficiency of Engine Inlet Particle Separator Systems,” Journal of the American Helicopter Society, Vol. 55, No. 022006, 2010.
[28]         Laitone, J. A., “Characterization of Particle Rebound Phenomena in the Erosion of Turbomachinery,” AIAA Journal of Aircraft, Vol. 20, No. 3, March 1983, pp. 275-281.

[29]         Tabakoff, W., and Hamed, A., “Installed Engine Performance in Dust-Laden Atmosphere,” AIAA Paper 84-2488, AISS/AHS/ASEE Aircraft Design Systems and Operations Meeting, San Diego, CA, Oct. 21–Nov. 2, 1984.

[30]         Gunn, R., and Kinzer, G. D., “The Terminal Velocity of the Fall of Water Droplets in Stagnant Air,” J. Meteor., 6, 243-248, 1949.

[31]         Chen, X., McLaury, B. S., and Shirazi, S. A., “Application and Experimental Validation of a Computational Fluid Dynamics (CFD)-Based Erosion Prediction Model in Elbows and Plugged Tees,” Computers & Fluids, Vol. 33, 2004, pp. 1251–1272.

[32]         Fair, G., and Geyer, J., Water Supply and Waste Water Disposal, John Wiley, New York, 1954.

[33]         Clift, R., Grace, J. R., and Weber, M. E., Bubbles, Drops, and Particles, Academic Press, New York, 1978.

[34]         Flemmer, R. L. C., and Banks, C. L. “On the Drag Coefficient of a Sphere,” Powder Technology, Vol. 48, No. 3, 1986, pp. 217–221.

[35]         Haider, A., and Levenspiel, O., “Drag Coefficient and Terminal Velocity of Spherical and Nonspherical Particles.’’ Powder Technology, Vol. 58, 1989, pp. 63–70.

[36]         Turton, R., and Levenspiel, O., “A Short Note on the Drag Correlation for Spheres,” Powder Technology, Vol. 47, 1986, pp. 83–86.

[37]         Khan, A. R., and Richardson, J. F., “The Resistance to Motion of a Solid Sphere in a Fluid,” Chem. Eng. Commun.,Vol.  62, 1987, pp. 135–150.

[38]         Brown, P. P., and Lawler, D. F., “Sphere Drag and Settling Velocity Revisited,” Journal of Environmental Engineering, Vol. 129, No. 3, March 2003, pp. 222-231.

[39]         Reklaitis, G. V., Ravindran, A., and Ragsdell, K. M., Engineering Optimization: Methods and Applications, Wiley-Interscience, 1983.
[40]         MATLAB 7.0, The MathWorks, Inc., Natick, MA, 2008 http://www.mathworks.com/  (retrieved 10 April 2010).

150-158

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

29.

Authors:

Sumedha Sengar

Paper Title:

Charging of Batteries and Checking their Autonomy with Variable Stand-Alone Photovoltaic Systems in Field Conditions

Abstract:   Solar energy is a vital that can make environment friendly energy more flexible and commercially widespread. As Sun is not available the whole day and during cloudy days, storage of electricity is required. Storage batteries are expensive and so are the solar photovoltaic (PV) panels. Hence, it is imperative that each stand-alone PV system is suitably designed depending on load (resistive) and autonomy requirements. In this work, 2 KW to 5 KW stand-alone photovoltaic systems for variable load requirements for charging of batteries is studied. Experiments are done to change the PV string size and number of strings to see its effect on actual charge delivery.  The experimental setup has been made in which panel string size, batteries capacity and load may be varied.

Keywords:
Batteries, Photovoltaic (PV) Panels.


References:

1.        Andreas Jossen, Juergen Garche, Dirk Uwe Sauer, “Operation conditions of batteries in PV applications”, Science Direct Solar Energy vol. 76, pp. 759-769, 2004.
2.        M.E Galvin, Paul K.W. Chan, S. Armstrong and W.G Hurley, “A Stand-alone  Photovoltaic Supercapacitor Battery Hybrid Energy Storage System”, 2008.

3.        http://www.progressivedyn.com/battery_basics.html.

4.        K.C.Divya, Jacob Ostergaad, “Battery energy storage technology for power systems- An overview”, Electrical power system research (79) 2009. Pg. 511-520.


159-162

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

30.

Authors:

Priyanka Dharane, A. S. Vibhute

Paper Title:

Literature Survey on Development of An Algorithm for Face Recognition using Wavelet Neural Network

Abstract:    Automatic face recognition system is an important component of intelligent human computer interaction systems for biometric. It is an attractive biometric approach, to distinguish one person from another. To perform Automatic face recognition system, the hybrid approach Wavelets face detection and Neural Network based Face Recognition is used. The face recognition accuracy is can be increased using a combination of Wavelet, PCA, and Neural Networks. Preprocessing, feature extraction and classification rules are three crucial issues for face recognition. For preprocessing and feature extraction steps, we apply a combination of wavelet transform and PCA. During the classification stage, the Neural Network (MLP) is explored to achieve a robust decision in presence of wide facial variations.

Keywords:
Face detection, Neural Network, PCA, Face Recognition, Wavelet


References:

1.       R. Chellappa, C. L. Wilson and S. Sirohey, "Human and machine recognition of faces: a survey," Proceedings of the IEEE, Vol. 83, No. 5, 705-740, May 2001.
2.       G. Chow and X. Li, "Towards a system for automatic facial feature detection," Pattern Recognition, Vol. 26, No. 12, 1739-1755, 1998.

3.       F. Goudail, E. Lange, T. Iwamoto, K. Kyuma and N. Otsu, "Face recognition system using local autocorrelations and multiscale integration," IEEE Trans. PAMI, Vol. 18, No. 10, 1024-1028, 2002.

4.       K. M. Lam and H. Yan, "Locating and extracting the eye in human face images", Pattern Recognition, Vol. 29, No.5 771-779, 2011.

5.       D. Valentin, H. Abdi, A. J. O'Toole and G. W. Cottrell, "Connectionist models of face processing: A Survey," Pattern Recognition, Vol. 27, 1209-1230, 2005.

6.       L. Yuille, P. W. Hallinan and D. S. Cohen," Feature extraction from faces using deformable templates," Int. J. of Computer Vision, Vol. 8, No. 2, 99-111, 2008.

7.       M. Kirby and L. Sirovich," Application of the Karhunen- Loeve procedure for the characterization of human faces, "IEEE Trans. PAMI., Vol. 12, 103-108, 2009.

8.       M. Turk and A. Pentland," Eigenfaces for recognition, "J. Cognitive Neuroscience, Vol. 3, 71-86., 2001.

9.       M. V. Wickerhauser, Large-rank "approximate component analysis with wavelets for signal feature discrimination and the inversion of complicated maps, "J. Chemical Information and Computer Sciences, Vol. 34, No. 5, 1036-1046, 1999.

10.    J. O'Toole, H. Abdi, K. A. Deffenbacher and D. Valentin, "A low-dimensional representation of faces in the higher dimensions of the space, "J. Opt. Soc. Am., A, Vol. 10, 405-411, 2012.

11.    Pentland, B. Moghaddam and T. Starner," View-based and modular eigenspaces for face recognition," Proc. IEEE Conf. Computer vision and Pattern Recognition, Seattle, June, 84-91, 1998.

12.    H. A. Rowley, S. Baluja and T. Kanade, "Neural network- based face detection," IEEE Transaction on PAMI, Vol. 20, No. 1,23-38, 2002.

13.    E.M.-Tzanakou, E. Uyeda, R. Ray, A Sharma, R. Ramanujan and J. Dong, "Comparison of neural network algorithm for face recognition," Simulation, 64, 1, 15-27, 2009.

14.    D. Valentin, H. Abdi and A. J. O'Toole, "Principal component and neural network analyses of face images: Explorations into the nature of information available for classifying faces by sex," In C. Dowling, F. S. Roberts, P. Theuns, Progress in mathematical psychology, Hillsdale: Erlbaum, (in press, 2000)

15.    Y. Meyer, "Wavelets: Algorithms and Applications," SIAM Press, Philadelphia, 2011.

16.    Jigar M. Pandya, Devang Rathod, Jigna J. Jadav,” A Survey of Face Recognition approach”, International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.632- 635.

17.    Jyoti S. Bedre ,Shubhangi Sapkal, ”Comparative Study of Face Recognition Techniques: A Review”, Emerging Trends in Computer Science and Information Technology 2012(ETCSIT2012) Proceedings published in International Journal of Computer Applications® (IJCA) 12 

18.    M. Berthold & D. Hand, Intelligent Data Analysis, 2nd ed., Springer, 2013.

19.    E. C. Cho & Vir V. Phoha S. Sitharama Iyengar, Foundations of Wavelet Networks and Applications, Chapman & Hall/CRC, 2012.

20.    L.Sirovich and M. Kirby, "Low-dimensional procedure for the characterization of human faces," J. Opt. Soc. Am. A, Vol. 4, No. 3, 519-524, 1998.

21.    D. L. Swets and J. J. Weng, "Using discriminant eigenfeatures for image retrieval," IEEE Trans. PAMI., Vol. 18, No. 8, 831-836, 1996

22.    S. Tolba, A.H. El-Baz, and A.A. El-Harby, ” Face Recognition: A Literature Review”, International Journal of Signal Processing 2:2 2006.

23.    Sushma Jaiswal, Dr. (Smt.) Sarita Singh Bhadauria, Dr. Rakesh Singh Jadon,” COMPARISON BETWEEN FACE RECOGNITION ALGORITHM-EIGENFACES, FISHERFACES AND ELASTIC BUNCH GRAPH MATCHING”, Volume 2, No. 7, July 2011 Journal of Global Research in Computer Science

24.    Mohammed Javed,  Bhaskar Gupta, ”Performance Comparison of Various Face Detection Techniques” ,International Journal of Scientific Research Engineering & Technology (IJSRET) Volume 2 Issue1 pp 019-0027 April 2013 www.ijsret.org ISSN 2278 – 0882 IJSRET @2013

25.    R. A. Fisher, “The Use of Multiple Measurements in Taxonomic  Problems”, 1996.

26.    Belhumeur, V., Hespanda, J., Kiregeman, D., 1997,” Eigenfaces vs. fisherfaces: recognition using class specific linear pojection”, IEEE Trans. on PAMI, V. 19, pp. 711-720 

27.    Hong Duan, Ruohe Yan, Kunhui Lin, “Research on Face Recognition Based on PCA”, 978-0-7695-3480-0/08 2008 IEEE.

28.    Ming-Hsuan Yang, David J. Kriegman and NarendraAhuja, “Detecting Faces in Images: A Survey,”  IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 24, NO. 1, JANUARY 2012.

29.    KIRBY, M. AND SIROVICH, L. 1999. “Application of the Karhunen-Loeve procedure for the characterization of human faces”. IEEE Trans. Patt. Anal. Mach. Intell. 12.

30.    Li X. and Areibi S.,―”A Hardware/Software codesign approach for Face Recognition”, The 16th,International Conference on Microelectronics, Tunisia,2004.

31.    Lin-Lin Huang, Akinobu Shimizu, Yoshihiro Hagihara, Hidefumi Kobatake ,”Face detection from cluttered images using a polynomial neural network”, Elsevier
Science 2010 .

32.    U. KreQel, J. SchRurmann, “Pattern classification techniques based on function approximation, in: H.Bunke, P.S.P. Wang (Eds.),

33.    Handbook of Character Recognition and Document Image Analysis”, World Scienti5c, Singapore, 2000, pp. 49–78.

34.    Yue Ming, Qiuqi Ruan, Xiaoli Li, Meiru. Mu, ” Efficient Kernel Discriminate Spectral Regression for 3D Face Recognition”, Proceedings Of ICSP 2010.

35.    R. Bruneli and T. Poggio, “Face recognition: features versus templates,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 15, pp. 1042-1052, 1993. \

36.    R.J. Baron, “Mechanism of human facial recognition,”  Int'l J. Man Machine Studies, vol. 15, pp. 137-178, 2001.

37.    Muhammad Sharif, Research Journal of Applied Sciences, Engineering and Technology 4(23): 4979-4990, 2012,ISSN: 2040- 7467.


163-168

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

31.

Authors:

P. Venkata Narayana, K. H. Phani Sree

Paper Title:

Small Signal Stability Analysis of a Wind Penetrated Electricity Distribution System

Abstract: The new types of generating systems such as wind generators, PV based static generators, diesel generators,  and power from cogeneration plants have been introduced in to the system resulting in new challenges to stability, operation and control of the power system and its components. The reason being intermittent nature of the such types of generation. Due to their unregulated operation, the generators may impose a serious threat to the small signal stability.  This paper analyses the small signal stability of the test distribution system at various penetration levels of wind generation in to the test system. For this purpose, eigen values and participation factor approaches have been chosen for analysis.

Keywords:
Distributed generation, small signal stability, eigen value analysis, participation factor, Power System Analysis Toolbox (PSAT)


References:

1.          S. Dahal, N. Mithulananthan, T. Saha , “Investigation of Small Signal Stability of a Renewable Energy based Electricity Distribution System”, in Power and Energy Society General Meeting, 2010 IEEE.
2.          F. P. de Mello, J. W. Feltes, L. N. Hannett, and J. C. White, "Application of Induction Generators in Power Systems," Power Apparatus and Systems, IEEE Transactions on, vol. PAS-101, pp. 3385-3393, 1982.

3.          Slootweg, J. G. and Kling, W. L. “Modelling and Analysing Impacts of Wind Power on Transient Stability of Power Systems”, Wind Engineering. Vol. 26, no. 1, 2002,
pp. 3-20.

4.          P. Kundur, “Power System Stability and Control,” New York: Mc.Graw-Hill, 1994.

5.          J. G. Slootweg, “Wind Power: Modelling and Impact on Power System Dynamics”, PhD thesis, Technische Universiteit Delft, December 2003.

6.          R. D. Fernández, R. J. Mantz, and P. E. Battaiotto, "Impact of wind farms on a power system. An eigenvalue analysis approach," Renewable Energy, vol. 32, pp. 1676-1688, 2007.

7.          Mendonca, and J.A.P. Lopes, “Impact of large scale wind power integration on small signal stability”, International Conference on Future Power Systems, Nov. 2005.

8.          P. Kundur, J. Paserba, V. Ajjarapu, G. Andersson, A. Bose, C. Cañizares, N. Hatziargyriou, D. Hill, A. Stankovic, C. Tylor, T. Van Custem, and V. Vittal, “Definition and Classification of Power System Stability”, IEEE Transactions on Power Systems, Vol. 19, No. 2, pp. 1387 – 1401, May 2004.

9.          G. Andersson, P. Donalek, R. Farmer, N. Hatziargyriou, I. Kamwa, P. Kundur, N. Martins, J. Paserba, P. Pourbeik, J. Sanchez-Gasca, R. Schulz, A. Stankovic, C. Taylor, and V. Vittal, “Causes of the 2003 Major Grid Blackouts in North America and Europe, and Recommended Means to Improve System Dynamic Performance”, IEEE Transactions on Power Systems, Vol. 20, No. 4, Nov. 2005, pp. 1922 – 1928.

10.       Erlich, J. Kretschmann, J. Fortmann, S. Mueller-Engelhardt, and H. Wrede. “Modeling of Wind Turbines Based on Doubly-Fed Induction Generators for Power System Stability Studies”, IEEE Transactions on Power Systems, Vol. 22, No. 3, Aug. 2007, pp. 909 - 919.

11.       Milano F. Power System Analysis Toolbox (PSAT). Documentation for PSAT version 2.0.0,  March 24, 2006.

12.       Milano F. Power System Analysis Toolbox (PSAT). Documentation for PSAT version 1.3.4,  July 14, 2005.

13.       Slootweg, Han. De Vries, Eize. “Inside wind turbine. Fixed vs. Variable speed. Renewable energy world”, January 2003.

14.       Slootweg, J.G.. “Wind Power Modelling And Impact On Power System Dynamics”, PROEFSCHRIFT. PhD Thesis. Delft University of Technology. 2003.

15.       Lynch, Stephen. “Dynamical Systems with Applications using Matlab”, Birkhauser. 2004.

16.       J. G. Slootweg. S. W. H. De Haan, H. Polinder, And W. L. Kling, “General Model For Representing Variable Speed Wind Turbines In Power System Dynamics Simulations”, IEEE Transactions On Power Systems, Vol. 18, No. 1, February 2003.

17.       IEEE PES Working Group on System Oscillations, “Power System Oscillations”, IEEE Special Publication 95-TP-101, 1995.

18.       Ong, Chee Mun. “Dynamic simulations of Electric Machinery Using Matlab – Simulink”, Purdue University. Prentice Hall.

19.       R. Thresher, M. Robinson, and P. Veers, “To Capture the Wind”, IEEE Power and Energy Magazine, Vol. 5, No. 6, Nov.-Dec. 2007, pp. 34 –46.
20.       Shearer, J.L. Kulakowski, B. Gardner John. “Dynamic Modelling and control of engineering systems”, 2e. Prentice Hall. 1997.
21.       Lynch, Stephen. “Dynamical Systems with Applications using Matlab”, Birkhauser. 2004.

22.       Kothari. Nagrath. Modern Power systems Analysis. 3e. Mc-Graw Hill. 2004.

23.       Kazachkov, Yuri., Stapleton, Steve. “Modeling wind farms for power systems stability studies”, Power technology magazine. 95. April 2004.

169-173

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html