Journal of Innovative Technology and Exploring Engineering

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 678

International Journal of Innovative

Technology and Exploring Engineering

ISSN : 2278 - 3075


Website: www.ijitee.org
Volume-9 Issue-1, NOVEMBER 2019
Published by:
Blue Eyes Intelligence Engineering and Sciences Publication

xploring Eng
dE ine
an
er
y
e Technolog

ing

IjItEe
ativ

Inte
ov
EX

N
rn

O
P

OR TI ati
L

ING VA nn
INNO on
al Journal of I
www.ijitee.org
Exploring Innovation
Editor-In-Chief Chair
Dr. Shiv Kumar
Ph.D. (CSE), M.Tech. (IT, Honors), B.Tech. (IT), Senior Member of IEEE
Blue Eyes Intelligence Engineering & Sciences Publication, Bhopal (M.P.), India.

Associated Editor-In-Chief Chair


Prof. MPS Chawla
Member of IEEE, Professor-Incharge (head)-Library, Associate Professor in Electrical Engineering, G.S. Institute of Technology &
Science Indore, Madhya Pradesh, India, Chairman, IEEE MP Sub-Section, India

Dr. Vinod Kumar Singh


Associate Professor and Head, Department of Electrical Engineering, S.R.Group of Institutions, Jhansi (U.P.), India

Dr. Rachana Dubey


Ph.D.(CSE), MTech(CSE), B.E(CSE)
Professor & Head, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence (LNCTE),
Bhopal (M.P.), India

Associated Editor-In-Chief Members


Dr. Hai Shanker Hota
Ph.D. (CSE), MCA, MSc (Mathematics)
Professor & Head, Department of CS, Bilaspur University, Bilaspur (C.G.), India

Dr. Gamal Abd El-Nasser Ahmed Mohamed Said


Ph.D(CSE), MS(CSE), BSc(EE)
Department of Computer and Information Technology , Port Training Institute, Arab Academy for Science ,Technology and Maritime
Transport, Egypt

Dr. Mayank Singh


PDF (Purs), Ph.D(CSE), ME(Software Engineering), BE(CSE), SMACM, MIEEE, LMCSI, SMIACSIT
Department of Electrical, Electronic and Computer Engineering, School of Engineering, Howard College, University of KwaZulu-
Natal, Durban, South Africa.

Scientific Editors
Prof. (Dr.) Hamid Saremi
Vice Chancellor of Islamic Azad University of Iran, Quchan Branch, Quchan-Iran

Dr. Moinuddin Sarker


Vice President of Research & Development, Head of Science Team, Natural State Research, Inc., 37 Brown House Road (2nd Floor)
Stamford, USA.

Prof. (Dr.) Nishakant Ojha


Principal Advisor (Information &Technology) His Excellency Ambassador Republic of Sudan& Head of Mission in New Delhi, India

Dr. Shanmugha Priya. Pon


Principal, Department of Commerce and Management, St. Joseph College of Management and Finance, Makambako, Tanzania, East
Africa, Tanzania

Dr. Veronica Mc Gowan


Associate Professor, Department of Computer and Business Information Systems,Delaware Valley College, Doylestown, PA, Allman,
China.

Dr. Fadiya Samson Oluwaseun


Assistant Professor, Girne American University, as a Lecturer & International Admission Officer (African Region) Girne, Northern
Cyprus, Turkey.

Dr. Robert Brian Smith


International Development Assistance Consultant, Department of AEC Consultants Pty Ltd, AEC Consultants Pty Ltd, Macquarie
Centre, North Ryde, New South Wales, Australia

Dr. Durgesh Mishra


Professor & Dean (R&D), Acropolis Institute of Technology, Indore (M.P.), India

Special Issue Section Editor


Mr. Siddth Kumar
Founder and Managing Director, IFERP, Technoarete Groups, India
Mr. Rudra Bhanu Satpathy
Founder and Managing Director, IFERP, Technoarete Groups, India

Dr. Mahdi Esmaeilzadeh


Founder & Chairman, of Scientific Research Publishing House (SRPH), Mashhad, Iran

Executive Editor Chair


Dr. Deepak Garg
Professor & Head, Department Of Computer Science And Engineering, Bennett University, Times Group, Greater Noida (UP), India

Executive Editor Members


Dr. Vahid Nourani
Professor, Faculty of Civil Engineering, University of Tabriz, Iran.

Dr. Saber Mohamed Abd-Allah


Associate Professor, Department of Biochemistry, Shanghai Institute of Biochemistry and Cell Biology, Shanghai, China.

Dr. Xiaoguang Yue


Associate Professor, Department of Computer and Information, Southwest Forestry University, Kunming (Yunnan), China.

Dr. Labib Francis Gergis Rofaiel


Associate Professor, Department of Digital Communications and Electronics, Misr Academy for Engineering and Technology,
Mansoura, Egypt.

Dr. Hugo A.F.A. Santos


ICES, Institute for Computational Engineering and Sciences, The University of Texas, Austin, USA.

Dr. Sunandan Bhunia


Associate Professor & Head, Department of Electronics & Communication Engineering, Haldia Institute of Technology, Haldia
(Bengal), India.

Dr. Awatif Mohammed Ali Elsiddieg


Assistant Professor, Department of Mathematics, Faculty of Science and Humatarian Studies, Elnielain University, Khartoum Sudan,
Saudi Arabia.

Technical Program Committee Chair


Dr. Mohd. Nazri Ismail
Associate Professor, Department of System and Networking, University of Kuala (UniKL), Kuala Lumpur, Malaysia.

Technical Program Committee Members


Dr. Haw Su Cheng
Faculty of Information Technology, Multimedia University (MMU), Jalan Multimedia (Cyberjaya), Malaysia.

Dr. Hasan. A. M Al Dabbas


Chairperson, Vice Dean Faculty of Engineering, Department of Mechanical Engineering, Philadelphia University, Amman, Jordan.

Dr. Gabil Adilov


Professor, Department of Mathematics, Akdeniz University, Konyaaltı/Antalya, Turkey.

Dr.Ch.V. Raghavendran
Professor, Department of Computer Science & Engineering, Ideal College of Arts and Sciences Kakinada (Andhra Pradesh), India.

Dr. Thanhtrung Dang


Associate Professor & Vice-Dean, Department of Vehicle and Energy Engineering, HCMC University of Technology and Education,
Hochiminh, Vietnam.

Dr. Wilson Udo Udofia


Associate Professor, Department of Technical Education, State College of Education, Afaha Nsit, Akwa Ibom, Nigeria.

Manager Chair
Mr. Jitendra Kumar Sen
Blue Eyes Intelligence Engineering & Sciences Publication, Bhopal (M.P.), India

Editorial Chair
Dr. Arun Murlidhar Ingle
Director, Padmashree Dr. Vithalrao Vikhe Patil Foundation’s Institute of Business Management and Rural Development, Ahmednagar
(Maharashtra) India.
Editorial Members
Dr. Wameedh Riyadh Abdul-Adheem
Academic Lecturer, Almamoon University College/Engineering of Electrical Power Techniques, Baghdad, Iraq

Dr. T. Sheela
Associate Professor, Department of Electronics and Communication Engineering, Vinayaka Mission’s Kirupananda Variyar
Engineering College, Periyaseeragapadi (Tamil Nadu), India

Dr. Manavalan Ilakkuvan


Veteran in Engineering Industry & Academics, Influence & Educator, Tamil University, Thanjavur, India

Dr. Shivanna S.
Associate Professor, Department of Civil Engineering, Sir M.Visvesvaraya Institute of Technology, Bengaluru (Karnataka), India

Dr. H. Ravi Kumar


Associate Professor, Department of Civil Engineering, Sir M.Visvesvaraya Institute of Technology, Bengaluru (Karnataka), India

Dr. Pratik Gite


Assistant Professor, Department of Computer Science and Engineering, Institute of Engineering and Science (IES-IPS), Indore (M.P),
India

Dr. S. Murugan
Professor, Department of Computer Science and Engineering, Alagappa University, Karaikudi (Tamil Nadu), India

Dr. S. Brilly Sangeetha


Associate Professor & Principal, Department of Computer Science and Engineering, IES College of Engineering, Thrissur (Kerala),
India

Dr. P. Malyadri
Professor, ICSSR Senior Fellow Centre for Economic and Social Studies (CESS) Begumpet, Hyderabad (Telangana), India

Dr. K. Prabha
Assistant Professor, Department of English, Kongu Arts and Science College, Coimbatore (Tamil Nadu), India

Dr. Liladhar R. Rewatkar


Assistant Professor, Department of Computer Science, Prerna College of Commerce, Nagpur (Maharashtra), India

Dr. Raja Praveen.N


Assistant Professor, Department of Computer Science and Engineering, Jain University, Bengaluru (Karnataka), India

Dr. Issa Atoum


Assistant Professor, Chairman of Software Engineering, Faculty of Information Technology, The World Islamic Sciences & Education
University, Amman- Jordan

Dr. Balachander K
Assistant Professor, Department of Electrical and Electronics Engineering, Karpagam Academy of Higher Education, Pollachi
(Coimbatore), India

Dr. Sudhan M.B


Associate Professor & HOD, Department of Electronics and Communication Engineering, Vins Christian College of Engineering,
Anna University, (Tamilnadu), India

Dr. T. Velumani
Assistant Professor, Department of Computer Science, Kongu Arts and Science College, Erode (Tamilnadu), India

Dr. Subramanya.G.Bhagwath
Professor and Coordinator, Department of Computer Science & Engineering, Anjuman Institute of Technology & Management
Bhatkal (Karnataka), India

Dr. Mohan P. Thakre


Assistant Professor, Department of Electrical Engineering, K. K. Wagh Institute of Engineering Education & Research Hirabai
Haridas Vidyanagari, Amrutdham, Panchavati, Nashik (Maharashtra), India

Dr. Umar Lawal Aliyu


Lecturer, Department of Management, Texila American University Guyana USA.

Dr. K. Kannan
Professor & Head, Department of IT, Adhiparasakthi College of Engineering, Kalavai, Vellore, (Tamilnadu), India
Volume-9 Issue-1, November 2019, ISSN: 2278-3075 (Online)
S. No Published By: Blue Eyes Intelligence Engineering & Sciences Publication Page No.

Authors: A. Sengupta, V. Varma, M. Sai Kiran, A. Johari, Marimuthu R

Paper Title: Cost-Effective Autonomous Garbage Collecting Robot System using Iot and Sensor Fusion
Abstract: Waste collection and management is a subject undergoing extensive study, and solutions are being
proposed meticulously. Thanks to an exponential rise in population, there is an increased production of waste,
and also a significant amount of litter consisting of plastic, paper, and other such products carelessly thrown
about and scattered in public. Thus, the need for a more robust waste management strategy is essential.
Presently, waste management techniques either lack efficiency, or incur high costs. Several Governmental as
well as Non-Governmental Organizations have made efforts to clean public spaces. Collection of the
unorganized and scattered garbage is the preliminary and most vital step of waste management, following proper
segregation and disposal. This paper proposes, explains, and implements an original concept of making a
modular, scalable and cost effective system for garbage collection. Making an efficient use of Internet of Things
to maintain a constant connection between a central server and a network of garbage processing and collecting,
independent, autonomous robots, we rely upon such a system to produce accurate results, as well as considerably
reduce the cost, hence providing a feasible solution to minimize human effort and costs during waste collection.
It provides a gateway towards implementing garbage collecting robots in smart cities. Rather than describing the
design of a single robot, we propose an entire system of robots interconnected in a network, to optimize time,
energy and overall speed. There is always a trade-off between accuracy, efficiency and cost of garbage
collection, especially when robots get into the picture. Our purpose is to find the perfect balance between these
factors.

Index Terms : autonomous, image processing, IoT, garbage collector, low-cost, sensor fusion.
References:
1. S. Watanasophon, and S. Ouitrakul, “Garbage Collection Robot on the Beach using Wireless Communications” In Proc. 3rd
International Conference on Informatics, Environment, Energy and Applications IPCBEE, vol.66 (2014).
2. J. Bai, S. Lian, Member, IEEE, Z. Liu, K. Wang, D. Liu, “Deep Learning Based Robot for Picking up Garbage on the Grass
Automatically” In Proc. IEEE Transaction on Consumer Electronics TCE.2018.2859629.
3. S. Kulkarni, S. Junghare, “Robot Based Indoor Autonomous Trash Detection
1. Algorithm using Ultrasonic Sensors”, presented at 2013 International Conference on Control, Automation, Robotics and Embedded
Systems(CARE).
4. T. Takeshita, T. Tomizawa, “A house Cleaning Robot System - path indication and Position estimation using ceiling camera” presented 1-8
at SICE-ICASE International Joint Conference2006 in Bexco, Busan, Korea.
5. S. Nolfi, “Evolving non-Trivial Behaviors on Real Robots: a garbage collecting robot” , Institute of Psychology, National Research
Council, Rome, Italy. Technical Report 96-04, March 1996.
6. S. Apoorva, Chaithanya, R. S. Prabhu, S.B. Shetty, D. D’Souza, “Autonomous Garbage Collector Robot”, presented at Internation al
Journal of Internet of Things 2017, 6(2): 40-42.
7. Technomentis, “Automated Garbage Collector”, instructables.com.[Online].Available: https://www.instructables.com/id/Automated-
Garbage-Collector/ . [Accessed April 10, 2019].
8. S. Khandare, S. Badak, Y. Sawant, S. Solkar, “Object Detection Based Garbage Collection Robot”, International Research Journal of
Engineering and Technology (IRJET), Volume 05, Issue 03. March 2018.
9. Y. Kim, J. Jefferson, Dr. A. Bovik, R. Chen, S. Chu, B. Nguyen, K. Tan, “Automated Garbage Collecting Robot”, EEE464 Senior
Design Project, Electrical and Computer Engineering Department, University of Texas at Austin, Spring 2017.
10. K. Kamal, S. Mukesh, S. S. Ganesh Kumar, M. Sudhakaran, “Design of Garbage Collection Robot using Wireless Technology”,
International Research Journal in Advanced Engineering and Technology, Vol 3, Issue 2(2017), pp. 1901-1911.
11. Rama Prabha D, S. Mahindru, A. Srivastava, P. Nilalohita, “Autonomous Garbage Collector-Robodumpster”, International Journal of
Civil Engineering and Technology(IJCIET), Volume 9, Issue 12(December 2018), pp. 545-552
12. S. Parashar, P. Tomar, “Waste Management by a robot- A Smart and Autonomous Technique”, IOSR Journal of Electronics and
Communication Engineering(IOSR-JECE), Volume 13, Issue 3, Ver. 2(May-June 2018), pp. 31-36
13. G. Ferri, A. Manzi, P. Salvini, B. Mazolai, C. Laschi, P. Dario, “DustCart, an autonomous robot for door-to-door garbage
collection:from DustBot project to the experimentation in the small town of Peccioli”, presented at the 2011 IEEE International
Conference on Robotics and Automation, May 2011, Shanghai, China .
14. G. Sivasankar, B. Durgalakshmi, K. Seyatha, “Autonomous Trash Collecting Robot”, International Journal of Engineering Research
and Technology(IJERT), Volume 6, Issue 04, April 2017.
15. K. Satish, “Autonomous Plastic Trash Disposal Drone- The Trash-Bot”,instructables.com,[Online].
Available:https://www.instructables.com/id/AUTONOMOUSPLASTICTRASH-DISPOSALDRONE-THE-TRASH-B/ [Accessed April
15, 2019].
16. A. Hamlet, Arroyo, Schwartz , “Robo-Dumpster: The Autonomous Garbage Truck”, EEL5666, Intelligent Machine Design Lab,
University of Florida
17. G S Kanna, S S Kumar, R Ragavan, M Balakrishnan, “Automatic Garbage Separation Robot Using Image Processing Technique”,
International Journal of Scientific and Research Publications, Vol 6,Issue 4(2016).
18. Gupta, R.K., Balamurugan, S., Aroul, K., Marimuthu, R, “IoT based door entry system,” Indian Journal of Science and Technolog y,
9(37), pp. 1-5
19. Singh, A.K., Balamurugan, S., Aroul, K., Marimuthu, R, “Design of universal module for personal security,” Indian Journal of Science
and Technology, 9(30),99031.

Authors: Ishan Yash, Hemprasad Yashwant Patil, Usha Rani Seshasayee


Paper Title: Juxtaposition of Different Machine Learning Techniques for Improved Time Series Classification
2.
Abstract: An essential type of TS analysis is classification, which can, for instance, advance energy load
forecasting in smart grids by discovering the varieties of electronic gadgets based totally on their strength 9-17
expenditure profiles recorded by way of computerized sensors. Such applications are very often characterised by
using (a) very lengthy TS and (b) extensive TS datasets needing classification. but, current techniques to time
series classification (TSC) cannot deal with such facts volumes at desirable accuracy. WEASEL (Word
ExtrAction for time SEries cLassification), a novel TSC method which is each rapid and unique. Like different
today's TSC techniques, WEASEL modifies time collection into characteristic vectors, the use of a sliding-
window approach, which is then surpassed via a device getting to know classifier. Our approach here is the
amalgamation of Distance-specific approaches such as DTW alongwith feature-specific approaches namely
SAX and WEASEL and hence, this method may be effortlessly prolonged to be used in aggregate with different
strategies. specially, we show that once blended with the space measures which include Minkowski distance
measures, DTW, SAX and PAA, it outperforms the previously known methods.

Keywords : WEASEL, Symbolic Aggregate approximation (SAX), Piecewise Aggregate Approximation


(PAA), Distance-time warping(DTW).

References:
1. Kate, Rohit J. "Using dynamic time warping distances as features for improved time series classification." Data Mining and Kn owledge
Discovery 30.2 (2016): 283-312.
2. Abanda, Amaia, Used Mori, and Jose A. Lozano. "A review on distance based time series classification." Data Mining and Knowle dge
Discovery 33.2 (2019): 378-412.
3. Dau, Hoang Anh, et al. "The UCR time series archive." arXiv preprint arXiv:1810.07758 (2018).
4. Krause EF. Taxicab geometry: An adventure in non-Euclidean geometry. Courier Corporation; 1986.
5. Berndt, Donald J., and James Clifford. "Using dynamic time warping to find patterns in time series." KDD workshop. Vol. 10. No. 16.
1994.
6. Ishan Yash. (2019, July 19). ishanyash/DTW-Example: Test release of my work (Version v1.0.0). Zenodo.
http://doi.org/10.5281/zenodo.3343058
7. Scholkopf B, Smola AJ. Learning with kernels: support vector machines, regularization, optimization, and beyond. MIT press; 2001
Dec 1.
8. Hoang Anh Dau, Eamonn Keogh, Kaveh Kamgar, Chin-Chia Michael Yeh, Yan Zhu, Shaghayegh Gharghabi , Chotirat Ann
Ratanamahatana,Yanping Chen, Bing Hu, Nurjahan Begum, Anthony Bagnall , Abdullah Mueen and Gustavo Batista (2018). The
UCR Time Series Classification Archive. URL https://www.cs.ucr.edu/~eamonn/time_series_data_2018/
9. Chen, Tianqi, and Carlos Guestrin. "Xgboost: A scalable tree boosting system." Proceedings of the 22nd acm sigkdd international
conference on knowledge discovery and data mining. ACM, 2016.
10. Hastie, Trevor, Robert Tibshirani, and Jerome Friedman. "The elements of statistical learning: data mining, inference, and prediction,
Springer Series in Statistics." (2009): xxii-745.
11. Lin, J., Keogh, E., Patel, P., and Lonardi, S., Finding Motifs in Time Series, The 2nd Workshop on Temporal Data Mining, the 8th
ACM Int' l Conference on KDD (2002)
12. Patel P, Keogh E, Lin J, Lonardi S. Mining motifs in massive time series databases. In2002 IEEE International Conference on D ata
Mining, 2002. Proceedings. 2002 Dec 9 (pp. 370-377). IEEE.
13. Keogh, E., Lin, J. and Fu, A., 2005, November. Hot sax: Efficiently finding the most unusual time series subsequence. In Fifth IEEE
International Conference on Data Mining (ICDM'05) (pp. 8-pp). Ieee.
14. Keogh E, Chakrabarti K, Pazzani M, Mehrotra S. Dimensionality reduction for fast similarity search in large time series databases.
Knowledge and information Systems. 2001 Aug 1;3(3):263-86.
15. Schäfer, Patrick, and Ulf Leser. "Fast and accurate time series classification with weasel." Proceedings of the 2017 ACM on
Conference on Information and Knowledge Management. ACM, 2017.

Authors: Pawan S, Maneeth Pd, Brijbhushan S


Paper Title: Impact of Alccofine on M50 Grade of Concerte Along with Ggbs
Abstract: Concrete is the most widely used construction material in civil engineering industry because of its
high structural strength and stability. Leaving the waste materials to the environment directly can cause
environmental problem. Waste can be used to produce new products or can be used as admixtures so that natural
resources are used more efficiently and the environment is protected from waste deposits. Hence the reuse of
waste material has been emphasized. The overall performance of reinforced concrete composite material is
affected then the individual performance of the concrete itself. This led to the search for new material.
In this research the mechanical properties of concrete is studied by replacing cement with GGBS and addition of
Alccofine with different weight fractions with respect to cement. The concrete industry is constantly looking for
supplementary material with the objective of reducing the solid waste disposal problem. In this paper Alccofine
is replaced by cement, the research is carried out by using M50 grade concrete with replacement of
0%,5%,10%,15%,20% Alccofine by cement by keeping GGBS as 30%,constant and is carried out to determine
3. the optimum percentage of replacement at which maximum C S, S Tand also F S is achieved, the properties of
the material are analyzed.
18-27
Keywords: : Ground Granulated Blast Furnace Slag, Compressive strength, Split tensile strength, Flexural
strength, Coarse Aggregate, Fine aggregate, World Health Organization..

References:
1. A. Oner, S.Akyuz. “An Experiment on Optimum Usage of GGBS For The Compressive Strength Of Concrete”Cement & Concrete
Composite 29,2006,510- 514
2. Venu Malagavelli. “High Performance Concrete With GGBS and Robo Sand” International Journal of Engineering Scienc e and
Technology Vol.2 {10},2010, 5107-5113.
3. A.H.L Swaroop, K. Venkateswararao, Prof P Kodandaramaro “Durability Studies on Concrete with Fly Ash and GGBS”
International Journal of Engineering Research and Application, Vol. 3, Issue 4, 2013, 285- 289.
4. Deval Soni, Suhasini Kulkarni, Vilin Parekh “Experimental On High Performance Concrete With Mixing Of Alccofine And Fly
Ash” Indian Journal Of Research, Vol. 3, Issue. 4, 2013, 84-86.
5. Yatin H Patel, P.J Patel, Prof Jingnesh M Patel, Dr. H S Patel “Experiment On Durability Of High Performance Concrete With
Alccofine & Fly Ash” IJAERS.
6. P.j.Patel & H S,Patel “Effect Of Compressive And Flexural Strength Of High Performance Concrete Incorporating Alccofine
And Fly Ash” IJCSEIERD, Vol. 3, Issue 2, 2013,109-114.
7. Praveen Nayak S, H. S. Narashimhan, Raghunandan V. Kadaba “Hardened Properties of Concrete Made With Micro Alccofine
and Silica - A Performance Optimization Based revision” International Journal Of Engineering Research And Development, Vol. 10,
Issue 8, 2014, 01-09. Dr. Sanjay Sharma, Saurabh Gupta, Er. Devinder Sharma “A rearch On Alccofine. A Supplementary
Cementitous Material” International Journal Of Modern Trends In Engineering And Research, 2015, 114-118.
8. IS: 10262- 2009 Concrete Mix Design Manual
9. IS: 516- 1959 Code for testing compressive strength of concrete
10. IS: 5816- 1970 Code for testing split tensile strength of concrete
11. IS: 383- 1970 Code for specification for coarse aggregate and fine aggregate 44.
12. IS: 456- 2000 plain and reinforced concrete code of practice manual
13. IS: 8112- 1989 Specification for ordinary Portland cement.
14. Concrete technology theory & practice by MS Shetty.
15. IS -383:1970 Code Book for Grading Of Aggregate.
16. IS-12269:1987 Code Book to Conforming 53 Grade Cement.
17. M.Adams Joe et.al Kumar Shantveerayya1 , Vikas Nikkam2 “An Experiment on the Properties of Glass Fibre Reinforced and
Ground Granulated Blast Furnace Slag Concrete”
18. "Advances in Structural Engineering", Springer Nature, 2015.
19. Ground granulated blast furnace slag chemical composition collected from Vijayanagar Bellary Karnataka.
20. FOSROC SP-430 test certification from forsroc chemicals Pvt. Ltd Bangalore.

Authors: Bambang Leo Handoko, Edwin Hendra, Benedikta Anandita


Paper Title: Factors Affecting Fraudulent Statement in Forensic Accounting Perspective
Abstract: Nowadays the awareness of loss from fraud has been shifted from blue collared employee theft to
white collared management fraudulent statement. Forensic accounting becomes one of the solutions to detect
this fraudulent statement. On the basic of our premise, the purpose of research to explore empirical evidence
regarding financial statement fraud detection factors with net worth method as control variable. Our independent
variables were debt to equity ratio, change in net assets, and return on asset. The research was quantitatively on
food and beverage manufacturing companies listed on the Indonesia Stock Exchange. We use financial
statement year end audited from 2013-2017. We used purposive sample, when selecting the samples. Total of 55
company reports samples were used in this research. We analyzed the data using statistical multiple linear
regression analysis. We used statistical software to do the regression, in order to answer the research questions
and test the hypothesis. Fraudulent reporting fraud was examined using proxies Beneish M-score. After the
statistical test, this research concludes that financial distress factor proxy Debt to Equity Ratio (DER) has no
significant effect on fraud detection. Other factor that is financial stability was proxies by changes in total assets
(ACHANGE), and financial targets in the proxy of Return on Assets (ROA) both have significant impact on the
detection of financial statement fraud.

Keywords : Beneish M Score, fraudulent, statement, forensic, factor, detection

References:
1. ACFE, “Report to the Nations 2018 Global Study on Occupational Fraud and Abuse,” 2019.
2. ACFE, “Survai Fraud di Indonesia,” Indones. Chapter#111, 2017.
3. R. Hamdani, Kumalahadi, and D. Urumsah, “The Classification of Corruption in Indonesia: A Behavioral Perspective,” SHS
Web Conf., 2017.W. Economic and F. Surveys, World Economic and Financial Surveys Global Financial Stability Report, no
April. 2014.
4. 4. B. L. Handoko, D. L. Warganegara, and S. Ariyanto, “Perception Of Financial Auditor On Usage Of Computer Assisted Audit
Techniques,” in 2018 3rd IEEE International Conference on Computational Intelligence and Application, 2018.
5. R. Kumari Tiwari and J. Debnath, “Forensic accounting: a blend of knowledge,” Journal of Financial Regulation and
28-32
Compliance. 2017.
6. E. I. Okoye, Fiia, and F. Fsm, “Forensic Accounting: A Tool for Fraud Detection and Prevention in the Public Sector. (A Study of
Selected Ministries in Kogi State),” Int. J. Acad. Res. Bus. Soc. Sci., 2013.
7. K. Salleh and R. A. Aziz, “Traits, Skills and Ethical Values of Public Sector Forensic Accountants: An Empirical Investigation,”
Procedia - Soc. Behav. Sci., 2014.
8. C. Albrecht, D. Holland, R. Malagueño, S. Dolan, and S. Tzafrir, “The Role of Power in Financial Statement Fraud Schemes,” J.
Bus. Ethics, vol. 131, no. 4, pp. 803–813, 2015.
9. N. A. Aris, S. Maznah, M. Arif, R. Othman, and M. M. Zain, “Fraudulent Financial Statement Detection Using Statistical
Techniques: The Case Of Small Medium Automotive Enterprise,” vol. 31, no. 4, pp. 1469–1478, 2015.
10. M. Vadoodparast, A. R. Hamdan, and Hafiz, “Fraudulent Electronic transaction detection using KDA Model,” IJCSIS) Int. J.
Comput. Sci. Inf. Secur., vol. 13, no. 2, 2015.
11. R. Elkamhi, J. Ericsson, and C. A. Parsons, “The cost and timing of financial distress,” J. financ. econ., 2012.
12. E. I. Altman, E. K. Laitinen, and A. Suvas, “Financial Distress Prediction in an Interna- tional Context : A Review and Empirical
Analysis of Altman ’ s Z- Score Model,” 2017.
13. Tarjo and N. Herawati, “Application of Beneish M-Score Models and Data Mining to Detect Financial Fraud,” Procedia - Soc.
Behav. Sci., 2015.
14. S. L. Indarto and I. Ghozali, “Fraud Diamond: Detection Analysis on the Fraudulent Financial Reporting,” Risk Gov. Control
Financ. Mark. Institutions, vol. 6, no. 4, pp. 116–123, 2016.
15. B. L. Handoko, “THE EFFECT OF INSTITUTIONAL OWNERSHIP AND LEVERAGE TOWARDS PROFIT MANAGEMENT
IN CONSUMER GOODS INDUSTRY LISTED IN BEI Teori Keagenan ( Agency Theory ) Manajemen Laba,” Binus Bus. Rev.,
vol. 6, no. 3, pp. 414–423, 2015.
16. R. C. Rosli, L. M. Ling, and R. Embi, “Tax malfeasance of high net-worth individuals in Malaysia: Tax audited cases,” in Journal
of Financial Crime, 2018.
17. D. Bogdanov, M. Jõemets, S. Siim, and M. Vaht, “How the Estonian tax and customs board evaluated a tax fraud detection system
based on secure multi-party computation,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial
Intelligence and Lecture Notes in Bioinformatics), 2015.
18. M. D. Beneish, “The Detection of Earnings Manipulation,” Financ. Anal. J., vol. 55, no. 5, pp. 24–36, 1999.
19. H. Sulistiyo and I. Ghozali, “The role of religious control in dysfunctional audit behavior: An empirical study of auditors of public
accounting firm in Indonesia,” J. Appl. Bus. Res., 2017.
20. U. Sekaran and R. Bougie, “Research Methods For Business. A Skill Builing Approch. 7th Edition,” Book, 2016.
21. I. Ghozali and L. Sulistyani, “Firm capabilities role as mediator of relationship between levers of control and firm performance
(empirical study on financial institutions in Indonesia),” Inf., 2016.
22. S. B. Jackson, T. M. Keune, and L. Salzsieder, “Debt, equity, and capital investment,” J. Account. Econ., 2013.
23. D. T. H. Manurung and A. L. Hardika, “Analysis of Factors that Influence Financial Statement Fraud in the Perspective Fraud
Diamond: Empirical study on Banking Companies Listed on The Indonesia Stock Exchange year 2012 to 2014,” Int. Conf.
Account. Stud., no. August, 2015.
24. N. M. Zaki, “The Appropriateness of Fraud Triangle and Diamond Models in Assessing the Likelihood of Fraudulent Financial
Statements - An Empirical Study on Firms Listed in the Egyptian Stock Exchange.,” Int. J. Soc. Sci. Econ. Res., vol. 02, no. 02, pp.
2403–2433, 2017.

Authors: K.Poongodi, P.Murthi, R.Gobinath, A.Srinivas, G.Sangeetha

Paper Title: Mechanical Properties of Pavement Quality Concrete using Recycled Aggregate
Abstract: The mechanical properties of pavement quality concrete using recycled concrete aggregate (RCA)
obtained from the concrete debris as coarse aggregate (CA) are experimentally determined and presented in this
paper. M40 grade concrete was tested with conventional granite CA before adding RCA and then CA was
replaced by RCA at the rate of 10, 20, 30, 40 and 50%. The concrete was tested in fresh state by slump and
compaction factor (CF) value to evaluate variations in workability. The compressive strength and flexural
strength of concrete were conducted to ascertain performance in hardened state. The water absorption test was
conducted as a part of durability test. The gradual reduction of slump value was noticed after adding RCA as
aggregate in concrete. The slump value had been maintained by substituting the superplastizer without varying
the w/c ratio. The strength properties were calculated after 3, 7 and 28 days curing. No significant reduction of
strength was observed up to the 30% replacement of RCA and the strength was reduced by adding more than
30% of RCA. From the results obtained in this investigation, it was concluded that the RCA could be used up to
40% as CA for pavement quality concrete.

Key words: Recycled aggregate, Pavement quality concrete, Mechanical properties, Water absorption

References:
1. K. Naveenkumar, M. Rohith, S.R. Sagar, and Hemalatha S Bandre, “Properties of Pavement Quality Concrete for Partial Replacement
of Natural Coarse Aggregates with Coconut Shell Aggregates”, International Journal of Applied Engineering Research, Vol.13, No. 7,
2018, pp. 146 -149.
2. B.J. Panditharadhya, T. Sowmyashree, C.S. Manjunath, and C.S. Siddu Karthik,“Properties of Pavement Quality Concrete with
Partial Replacement of Fine Aggregates by Iron Ore Tailings”, International Journal of Innovative Research in Science, Engine ering
and Technology, Vol.5, 2016, pp.7392 - 7409
3. M. Sivaraja, and K. Poongodi,“Lightweight self-compacting concrete at high temperatures”, GRAĐEVINAR, Vol.67, No.4, 2015,
pp.329 - 338
4. M. Veerapathran, and P. Murthi, “High performance concrete with steel slag aggregate”, GRAĐEVINAR, Vol.66 Issue: 7, 2014,
pp.605-612.
5. 5. Alan Sekaran, Murthi Palaniswamy & Sivagnanaprakash Balaraju, “A study on suitability of EAF oxidizing slag in concrete; An
eco-friendly and sustainable replacement for Natural coarse aggregate”, The scientific world Journal, Vol.1, 2015, pp.1-8
6. P.Murthi, S.Alan, C.Chkkaravarthi & N.Raguraman,“Sustainable replacement of steel slag as coarse aggregate in concrete” 33-38
International Journal of Applied Engineering Research, Vol.10, no.53, 2015, pp.341 - 345.
7. P.Gunasekaran, S. Kumar, and M. Lakshmipathy. “Mechanical and Bond properties of Coconut shell concrete”, Construction and
Building Materials, Vol. 25, No.1, 2011, pp. 92-98.
8. V.SenthilKumar, P.Jayabharath, G.Kesavan, V. Karthikeyan, “Experimental Study on Replacing Aggregates in Concrete”,
International Research Journal of Engineering and Technology, Vol.5, No.5, 2018, pp. 1057 - 1073.
9. Ashraf M. Wagih, Hossam Z. El-Karmoty, Magda Ebid, Samir H. Okba, “Recycled construction and demolition concrete waste as
aggregate for structural concrete”, HBRC Journal, Vol.9, 2013, pp.193 - 200.
10. Binod Kumar, “Properties of pavement quality concrete and dry lean concrete with copper slag as fine aggregate”, International
Journal of Pavement Engineering, Vol. 14, No.8, 2013, pp.746 -752.
11. H.C. Puneeth, S.P. Mahendra, B. Sachin, and V, Subbaiah, “Replacement of Recycled Construction and Demolition Waste Coarse
Aggregates in Pavement Quality Concrete”, International Journal of Applied Engineering Research, Vol.13, No.7, 2018, pp.139-145.
12. Shodolapo Oluyemi Franklin, Mmasetlhomo Tommy Gumede, “Studies on Strength and Related Properties of Concrete Incorporating
Aggregates from Demolished Wastes: Part 1-A Global Perspective”, Open Journal of Civil Engineering, 2014, Vol.4, pp.311-317.
13. M.Etxeberria E.Vázquez A.Marí M.Barra, “Influence of amount of recycled coarse aggregates and production process on
properties of recycled aggregate concrete”, Cement and Concrete Research, Vol.37, No. 5, 2007, pp. 735-742
14. Jianzhuang Xiaoa,, Jiabin Lia, Ch. Zhangb, “Mechanical properties of recycled aggregate concrete under uniaxial loading”, Cement
and Concrete Research, Vol. 35, 2005, pp. 1187 - 1194
15. P.J. Nixon, “Recycled concrete as an aggregate for concrete - a review”, Materials and Structures, Vol.11, No.65, 1978, pp. 371 - 378.
16. T.C. Hansen, “Recycled aggregate and recycled aggregate concrete, second state-of-the-art report, developments from 1945-1985”,
Materials and Structures, Vol.19, No.111, 1986, pp. 201 - 246
17. Caijun Shi, Yake Li, Jiake Zhang, Wengui Li, Linlin Chong, Zhaobin Xie , “Performance enhancement of recycled concrete aggregate
- A review”, Journal of Cleaner Production, Vol. 112, 2016, pp.466-472
18. Sallehan Ismail, Mahyuddin Ramli, “Engineering properties of treated recycled concrete aggregate (RCA) for structural
applications”, Construction and Building Materials, Vol. 44, 2013, pp. 464 - 476.
19. IS:2386 (Part 3) - 1963, Methods of test for aggregates for concrete (specific gravity, density, voids, absorption and bulking)
20. IS:2386 (Part 4) - 1963, Methods of test for aggregates for concrete
21. IS: 269-2015 Ordinary Portland cement - specification (Sixth revision)
22. IRC: 15-2011 Standard Specification and code of practice for construction of Concrete Roads (Fourth Revision)
23. IS: 1199-1959 Method of Sampling and Analysis of Concrete (Eleventh edition 2004)
24. IS: 516–1959 Method of tests for strength of concrete (Eighteenth edition 2006)
25. ASTM C1585 - 13 Standard Test Method for Measurement of Rate of Absorption of Water by Hydraulic-Cement Concretes
26. G.S. Yadav, N. Prabhanjan, G. Sahithi, G. Sangeetha, A.Srinivas, and A.S. Krishna, “Strength Investigation of Fly Ash Based
Concrete Waste Steel Fibre and Polypropylene Fibre as Reinforcing Materials”. International Conference on Emerging Trends in
Engineering (ICETE) 2019, pp. 155-161. Springer, Cham.
27. IS: 456-2000 Plain and Reinforced Concrete - Code of Practice
28. N.K.Amudhavalli, and P.Murthi, “Relationship between Compressive Strength and Flexural Strength of Rice Husk Ash and Silica
fume Based Polypropylene Fibre Reinforced Blended Concrete”, Australian Journal of Basic and Applied Sciences Vol.8, No.15,
2014, pp.113-119.
29. Mohamed. Alsheltat, “Modeling Suggestion on Relationship between Compressive Strength and Tensile Strength of High Strength
Concrete”, International Research Journal of Engineering and Technology, Vol.5, No.5, 2018, pp.2332 – 2338.
30. Chamroeun Chhorn, Seong Jae Hong, Seung Woo Lee, Relationship between compressive and tensile strengths of roller-compacted
concrete, Journal of Traffic and Transportation Engineering, Vol.5, No.3, 2018, pp.215-223.

Authors: P. Surya Chandra, V. Revathi, A. Sireesha, N. Suresh Kumar

Paper Title: Development of DTMF Centred Remotely Located Fire Extinguishing Robot
Abstract: The hazardous situation such as conflagration makes the humans’ life most inconvenient and risky. It
is an unavoidable situation and it is very difficult for humans to face such situations. But mechanical devices can
handle such situations without Human intervention. Sometimes it is also difficult to reach fire place at remote
location. A robot can easily handle such situations and can efficiently work in hazardous units. The robot can
easily reach the places where man cannot reach. In the present paper a fire extinguisher robot is developed to
detect fire and the robot smidgens water on flames. The robot is operated and controlled with mobile phone.
Dual Tone Multi Frequency tones are produced to control the movement of the robot. In the present work an
Arduino UNO microcontroller is interfaced with fire sensors and generates sequence of steps to control robot
movements, direction, and pumping of water. The robot movement and other operations are controlled from
remote location.

Keywords: Arduino, fire extinguisher, flame sensor, IoT, DTMF


6. References:
1. Kristi Kosasis e al., “The Intelligent Fire Fighting Tank Robot”, Electrical Engineering Journal Vol.No. 1, pp. 73-80, 2010. 39-43
2. V. Mangayarkarasi, “Remote Controlled Fire Fighting Robot”, International Journal of Trend in Scientific Research and Development,
Vol 2, No 5, 2018, pp 820.
3. N. Suresh Kumar et. al. / International Journal of Engineering Science and Technology., “Virtual Software to Design and Interface
peripherals with different Microprocessors” Vol. 2(5), 2010, 1143-1146.
4. Samantha Cardoso et al., “Literature Survey on Fire Fighter Robot”, International Journal for Scientific Research & Developme nt,
Vol. 5, Issue 01, 2017
5. N. Suresh Kumar et al., “Multi-dimensional parametric assessment with IoT in acquaintance of digital pipeline”, International Journal
of Electrical and Computer Engineering (IJECE), Vol. 9, No. 6, December 2019, pp. 4649~4656.
6. AH Sale et al., “Fire Fighting Robotic Vehicle”, International Research Journal of Engineering and Technology, Volume: 06 Issue: 04,
Apr 2019
7. Kuchi N S S S S Utpala et al., “Authenticated IoT Based Online Smart Parking System with Cloud”, Pramana Research Journal, Vo l 9
no 4, 2019
8. B.Swetha Sampath, “Automatic fire extinguisher robot”, 8th international conference on ubiquitous robots and ambient intelligent, nov
23-26, 2011 songdo conventia, Incheon, Korea
9. N. Suresh Kumar et al., “Digital frequency meter using DMA Terminal Count Stop method”, International Journal of Engineering and
Technology (IJET), vol2 (2), 2010, 34-37.
10. Tushar Nandkishor Satbhai et al., “Fire Fighting Robot”, International Journal on Recent and Innovation Trends in Computing a nd
Communication,Volume: 4 Issue: 4.

Authors: V. M. Sounthararajan, S. Sivasankar, S. Dinakaran, Nabajyoti Modak, R. Gopalakrishnan


Paper Title: Performance in Binary Characteristics of Sisal Fibre Reinforced Concrete
Abstract: This research study has experimentally performed on the compressive strength, split tensile flexural
strength and durability test method also emphasized in various mixes of high-performance concrete. The
maximum compressive strength of concrete was noted for different curing days, while the addition of fly ash
20% with 15% of slag along with1% of sisal fiber reinforced concrete than compared to Plain Portland cement
content up to 100%. Further, increasing the cementitious binder content there is a drastic fall in strength gain
was observed than that of other mixes. On the contrary, the best mix was identified that's 10% fly ash along with
15% of slag produced the highest compressive strength, split tensile strength and flexural strength for different
days of cured the concrete specimens. Also, the durability test performed as prescribed in ATMC 1202, based on
the lab test results, it is concluded that the electrical charge passed over all the concrete specimen at 28 and 56
days presents the lesser values 1000 (coulombs) this is the evidently proved that the high resistance towards the
corrosions and drastically reduced the chloride ions permeability except for plain cement concrete.
7.
Keywords: Compressive strength, Fly ash, Flexural strength, Rapid chloride permeability test, Slag, Split tensile
strength, Quarry dust, 44-47

References:
1. J. Tao and X. Wei, “Effect of ground granulated blast-furnace slag on the hydration and properties of cement paste,” Advances in
Cement Research, 31(6), 251–260, 2019.
2. V.M. Sounthararajan, “Effect of Accelerated Curing on the Furnace Slag Based Polypropylene Fibre Reinforced Concrete,”
Advanced Material Research 2018. vol. 1150, pp. 91-102, 2018
3. V.M. Sounthararajan “Empirical prediction models for strength gain properties of fly ash based concrete subjected to accelerated
curing,” Advanced Material Research 2018. vol. 1150, pp. 73-90, 2018
4. Tarannum, Rameshwari, Shruti, Kalappa. M. Sutar, “Experimental Studies on Pozzolanic Acton of GGBS and Strength
Properties of GGBS Concrete,” International journal for Innovative Research in Science & Technology, 1(12), 69-74, 2015.
5. M.Prathap Kumar, Vaddi Srinivas and M,Zoheb Nawaz, “ Experimental Investigation on High Strength Concrete using GGBS,
Fly ash & SP-430 Super Plasticizer,” International of Civil Engineering and Technology, 8(9), 2017.
6. Sivakumar and VM. Sounthararajan, “Strength Properties of Processed Fly Ash Concrete,” Journal of Engineering and
Technological Sciences, vol. 47, no. 3, pp. 320-334, 2015.
7. K. V. Schuldyakov, L. Y. Kramar, and B. Y. Trofimov, “The properties of slag cement and its influence on the structure of the
hardened cement paste,” Procedia Engineering, 150, 1433–1439, 2016.
8. V.S. Tamilarasan, P. Perumal, J. Mahaswari, “Workability Studies on Concrete with GGBS As A replacement for cement With
and Without Superplasticiser,” International Journal of Advanced research in Engineering and Technology, 3(2), 13-17, 2012.
9. Nwofor, T.C. and Sule, S., Investigating geometric characteristics of cement concrete materials. International Journal of
Innovative Research in Advance Engineering, 1(9), 74-82, 2012.
10. Gurpreet S. and Rafat S., Effect of waste foundry sand (WFS) as partial replacement of sand on strength. Journal of Construction
and Building Material 26, 416-422, 2012.
11. Nwofor, T.C., Sule, S. and Eme, D.B. “A comparative study of the methods of concrete mix design using crushed and uncrushed
coarse aggregates,” International Journal of Scientific and Engineering Research, 6(8), 1182-1194, 2015.
12. K Ganesh Babu and V. Sree Rama Kumar, "Efficiency of GGBS in Concrete”, Cement and Concrete Research, 30, 1031 -1036,
2000.
13. M. Collepardi, "Admixtures used to enhance placing characteristics of concrete", Cement and Concrete Composite, 20,103-112,
1998.
Authors: Peruri Venkata Anusha, Ch.Anuradha, Patnala S.R. Chandra Murty, Ch. Surya Kiran

Paper Title: Detecting Outliers in High Dimensional Data Sets Using Z-Score Methodology
Abstract: Outlier detection is an interesting research area in machine learning. With the recently emergent tools
and varied applications, the attention of outlier recognition is growing significantly. Recently, a significant
number of outlier detection approaches have been observed and effectively applied in a wide range of fields,
comprising medical health, credit card fraud and intrusion detection. They can be utilized for conservative data
analysis. However, Outlier recognition aims to discover sequence in data that do not conform to estimated
performance. In this paper, we presented a statistical approach called Z-score method for outlier recognition in
high-dimensional data. Z-scores is a novel method for deciding distant data based on data positions on charts.
The projected method is computationally fast and robust to outliers’ recognition. A comparative Analysis with
extant methods is implemented with high dimensional datasets. Exploratory outcomes determines an enhanced
accomplishment, efficiency and effectiveness of our projected methods.

Keywords: Outliers, Ionosphere, Z-score Method, Clusters, High Dimensional Data.

References:
1. K. Shim, R. Rastogi and S. Ramaswamy "Efficient Algorithms for Mining Outliers from Large Data Sets", ACM SIGMOD
Conference Proceedings, 2000.
8. 2. P. Yu. And C. C. Aggarwal "Finding Generalized Projected Clusters in High Dimensional Spaces", ACM SIGMOD Conference
Proceedings, 2000.
3. D. A. Keim, C. C. Aggarwal, and A. Hinneburg "What is the nearest neighbor in high dimensional spaces?” , VLDB Conference
48-53
Proceedings, 2000.
4. A.Swami, T. Imielinski and R. Agrawal "Mining Association Rules between Sets of Items in Large Databases". ACM SIGMOD
Conference Proceedings, 1993.
5. P. Raghavan., R. Agrawal, and A. Arning "A Linear Method for Deviation Detection in Large Databases", KDD Conference
Proceedings, 1995.
6. T. Lewis. and V. Barnett "Outliers in Statistical Data", John Wiley and Sons, NY 1994.
7. U. Shaft., R. Ramakrishnan, J. Goldstein, and K. Beyer "When is Nearest Neighbors Meaningful?” , ICDT Conference
Proceedings, 1999.
8. J. Sander., R. T. Ng, H.-P. Kriegel, and M. M. Breunig "LOF: Identifying Density-Based Local Outliers", ACM SIGMOD
Conference Proceedings, 2000.
9. P. Yu. and C. C. Aggarwal “Fast Algorithms for Projected Clustering", ACM SIGMOD Conference Proceedings, 1999.
10. S. Mehrotra and K. Chakrabarti "Local Dimensionality Reduction: A New Approach to Indexing High Dimensional Spaces",
VLDB Conference Proceedings, 2000.
11. X. Xu., J. Sander, H.-P. Kriegel and M. Ester "A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases
with Noise", KDD Conference Proceedings, 1996.
12. R. P. Tai., J. B. Orlin and C. C. Aggarwal "Optimized Crossover for the Independent Set Problem", Operations Research 45(2),
March 1997.
13. R. Ng. E and Knorr "Algorithms for Mining Distance-based Outliers in Large Data Sets", VLDB Conference Proceedings,
September 1998.
14. P. Raghavan., D. Gunopulos, J. Gehrke and R. Agrawal “Automatic Subspace Clustering of High Dimensional Data for Data
Mining Applications", ACM SIGMOD Conference Proceedings, 1998.

Authors: S.Dhanasekar, G.Kanimozhi, A.Manivannan


Solving Fuzzy Assignment Problems with Hexagonal Fuzzy Numbers by using Diagonal Optimal
Paper Title:
Algorithm
Abstract: In this article, an approach involving diagonal optimal method has been proposed to solve
Hexagonal fuzzy assignment problem(HxFAP). To order the hexagonal fuzzy numbers Yager’s Ranking
technique is applied. To understand the algorithm two numerical examples are illustrated.Mathematics Subject
Classification: 90C08, 90C70, 90B06, 90C29, 90C90.

9. Keywords: Fuzzy number, Hexagonal Fuzzy Numbers, Arithmetic operations on Hexagonal fuzzy numbers,
Hexagonal Fuzzy assignment problems, Hexagonal Fuzzy optimal solution, Diagonal Optimal method.
54-57
References:
1. Amitkumar and Anilgupta, Assignment and travelling salesman problems with coefficients as LR fuzzy parameters, International
journal of applied science and engineering, 10(3) (2012) 155-170.
2. A. Arockiaswamy and S. Nithya, Solving Fuzzy Assignment For Hexagonal Fuzzy number using ones assignment method and
robust’s ranking technique, International Journal of mathematics and its application, 4(4) (2016) 397-405.
3. K. Arumugam, R. Abdul Saleem and S.Arunvasan, Solving fuzzy assignment problem using symmetric Hexagonal fuzzy number,
International Journal of mathematics and its application, 6(1) (2018) 741-746.
4. M.L.Balinski and R.E.Gomory, A primal method for the assignment and transportation problems, Management science, 10 (1964)
578-593.
5. S.Chanas and D.Kuchta, A concept of the optimal solution of the transportation problem with fuzzy cost, Fuzzy sets and syste ms,
82 (3) (1996) 299-305.
6. M.S.Chen, On a fuzzy assignment problem, Tamkang journal of mathematics, 22 (1985) 407-411.
7. C.F. Chien, J.H.Chen and C.C. Wei, Constructing a comprehensive modular fuzzy ranking framework and illlustration, Journal of
quality, 18(4) (2011) 333-349.
8. S. Dhanasekar and S.Hariharan, Haar Hungarian algorithm to solve fuzzy assignment problem, International journal of pure and
applied mathematics, 113(7) (2017) 58-66.
9. D.Dubios and P. Fortemps, Computing improved optimal solutions to max -min flexible constraint satisfaction problems, European
journal of Operations research, 143 (1999) 305-315.
10. L.S.Huang and G.H.Xu, Solution of Assignment problem of restriction of qualification, Operation research and Management
Science, 14 (2005) 28-31.
11. G.J. Klir. G.J and B.Yuan, Fuzzy sets and logic: Theory and application Prentice Hall, 1995.
12. M.Khalid, Mariam Sultana and Faheem Zaidi, A new diagonal optimal approach for assignment problem, Applied mathematical
sciences, 8(160) (2014) 7979-7986.
13. C.J.Lin and U.P.Wen, A Labeling algorithm for the fuzzy assignment problem, Fuzzy sets and systems, 142(3) (2004) 373-379.
14. S.Mukherjee and K. Basu, Application fuzzy ranking method for solving assignment problems with fuzzy costs, International
journal of computational and applied mathematics, 5 (2010) 359-368.
15. C.S.Ramakrishnan, An improvement to Goyal's modified VAM for the unbalanced transportation problem, Journal of operational
research society, 39(6) (1988) 609- 610.
16. H.H.Shore, The transportation problem and the Vogel approximation method, Decision sciences, 1(3 -4) (1970) 441–457.
17. X. Wang, Fuzzy optimal assignment problems, Fuzzy math, 3 (1987) 101-108.
18. X.Wang and E.E.Kerre., Reasonable properties for the ordering of fuzzy quantities-I, Fuzzy sets and systems, 118(3) (2001) 375-
385.
19. X.Wang and E.E.Kerre, Reasonable properties for the ordering of fuzzy quantities-II, Fuzzy sets and systems, 118(3) (2001) 387-
405.
20. R.R.Yager, Procedure for ordering fuzzy subsets of the unit interval, Information sciences, 24(2) (1981) 143 -161.
21. Y.Yuan, Criteria for evaluating fuzzy ranking methods, Fuzzy sets and systems, 43(2) (1991) 139-157.
22. L.A.Zadeh, Fuzzy sets: Information and control, 8(3) (1965) 338-353.

Authors: Johan Ihsan Mahmood, Muhamad Safwan Hilmi, Pranesh Krishnan


Design and Development of a Modular Computer Numerical Control (CNC) Machine Manipulator
Paper Title:
for Automation
Abstract: In small and medium enterprise industry the usage of automation machine is not entirely applied in
this sector. This is because of the initial cost to setup automation machine is higher than employed a worker to
do the task. The main problem by using human workforce is worker need to do the repetitive task every single
day. Human incline to start boring also the productivity of the worker is decreasing. By producing this portable
Mini CNC Machine, the problem can be solved. This machine is going through the design development process
from data comparison to product fabrication. The detailed design development process ensures that the final
result of the machine is achieving the objective to reduce and eliminate repetitive task perform by human
resources. The machine control by the new concept of the controller with an open-source controller that makes
the machine more flexible and easier to handle. The machine is tested the machining tolerance to ensure the
machine provides high accuracy result. Although, the machine still limited to perform the heavy-duty process,
this machine can help small and medium enterprise industry increasing productivity by eliminating and reducing
10. human error.
58-62
Keywords: Arduino, portable mini CNC machine.

References:
1. Anil Kumar, A., Sai Krishna, K. & K., Sai Reddy, R.B.G. (2017). Mini CNC 2d Sketcher for Accurate Building
Drawing.International Journal of Civil Engineering and Technology (IJCIET) Volume 8, Issue 6, June 2017, pp. 543–549, Article
ID: IJCIET_08_06_060
2. Anil Kumar, A., Sai Krishna, K., Sai Reddy, R.B.G. and Shakti Prasad, V. CNC Machine for Drawing, B.Tech. Project Report,
MLR Institute of Technology, 2017.pp. 801–808.
3. Benhabib, Beno. (2003). Manufacturing: Design, Production, Automation, and Integration. New York: Marcel Dekker.
4. Kajal J. Madekar1, Kranti R. Nanaware2, Pooja R. Phadtare3, Vikas S. Mane4. (2016). Automatic mini CNC machine for PCB
drawing and drilling. International Research Journal of Engineering and Technology (IRJET) Volume: 03 Issue: 02.
5. Kornel F. Ehmann, Rechard E. DeVor, Shiv G. Kapoor. (2002). Micromesh-scale Mechanical Manufacturing Opportunities and
Challenges. JSME/ASME International Conference on Materials and Processing.
6. Markku. S. (2015). Planning of an electric system for a small CNC machine. Seinäjoki University of Applied Sciences.
7. Pabla. B. S., Adithan. M. (1994). CNC Machines. New Delhi, India. New Age International (P) Limited.

Authors: Johan Ihsan bin Mahmood, Muhammad Farhan Daud, Pranesh Krishnan
Paper Title: Design and Fabrication of Flood Barrier for Domestic Usage at the Doorframe
Abstract: There are many types of flood barrier, but commonly used are sandbags as it is the easiest to get as
well fixed type of flood barrier. The problem with sandbags and fixed type flood barrier is sandbagged will get
messy, and a hassle after the flood water has been receding while fixed type flood barrier only can be used on
11. one side of doorframe. Therefore, this project tries to create a new design that will solve both problems by using
Solidworks software. Result of this project showed what the effect on the structure design when the maximum
force was applied. Some of parts in the invented flood barrier are working as intended. 63-67

Keywords: Design, doorframe, flood barrier, structure analysis, self-locking threads.


References:
1. Ă, A. P. U. Ş. C., Bobancu, Ş., & Ţă, A. D. U. (2010). MECHANICAL PROPERTIES OF RUBBER - AN OVERVIEW. 3(52).
2. Çengel, Y. ., & Cimbala, J. (2006). Fluid Mechanics, Fundamentals and Applications. The McGraw-Hill Companies, Inc.
3. Data, P. P., Examiner, P., Alejandro, R., & Laurentano, A. A. (2009). PORTABLE FLOOD BARRIER SECTION AND FLOOD
BARRIER. 2(12). https://doi.org/10.1016/S0141
4. Hylton, P., & Otoupal, W. (2005). Mechanical Advantage. American Society for Engineering Education, 10. Retrieved from
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0ahUKEwjAgeWV3dDLAhXKGY4KHeF6Av
AQFggcMAA&url=http%3A%2F%2Fwww.asee.org%2Fdocuments%2Fconferences%2Fk12%2FWorkshopDocuments%2FTeac
hingMathematicswithRealWorldCorrelation.doc&usg=AFQjCNGvCq

Authors: Arun Kumar Tripathi, Shweta Singh


Paper Title: Mobile IPv6 Security Performance Metrics for WIMAX Roaming Environment
Abstract: To provide uninterrupted communication services the IETF standardized the various communication
protocols. Mobile Internet Protocol is first standard protocol and responsible for secure and reliable
communication, while the mobile user switches from one geographical area to another. For such a scenario, two
or more devices are permissible to exchange information, while one or more devices changing the geographical
location. The implementation of mobility management protocols suffers from various challenges, such as, delay
to reach data packet to its destined device, load on network, long queuing delays to data packets and it results the
time out error and packet loss, reduced throughput etc. To reduce these parametric factors, concept of encryption
and proxy are enabled in the proposed simulation scenarios, and new measurement to these parametric values is
taken. The comparative performance needs to be measured through OPNET Modeler and results show that the
proposed scheme is better than the existing one.

Keywords: Mobile Internet Protocol; WIMAX; Handover; Load; Delay; Throughput.

References:
1. D. Johnson, C. Perkins, and J. Arkko, "Mobility Support in IPv6", RFC 3775, June 2004.
2. C. Perkins, D. Johnson and J. Arkko, "Mobility Support in IPv6", RFC 6275, July 2011.
3. Koodli, Rajeev. "Fast handovers for Mobile IPv6", RFC-4068, 2005.
4. C. Perkin, “IP Mobility Support for IPv4”, RFC-3220, August 2002.
5. Arun Kr. Tripathi, and Shweta Singh: “Ensuring Reliability in Cloud Computing and Comparison on IPv6 encouraged with protocols”,
International Conference on Science, Technology, Humanities and Business Management (ICSTHBM-16), 2016, pp. 9-14.
6. Seid, Howard A., and Albert Lespagnol. "Virtual private network." U.S. Patent No. 5, 16 Jun. 1998.
7. Chaehwan Kim, Hyunwoo Hwang, Jung-Woo Baik and Kyung-GeunLee, "Multicast based Proxy Mobile IPv6 for inter-domain
handover", Mathematical and Computer Modelling, Vol. 57, Issues 11–12, June 2013, pp. 2863-2872.
8. Luigi Atzori, Antonio Iera, Giacomo Morabito, "The Internet of Things: A survey", Computer Networks: The International Journa l of
Computer and Telecommunications Networking, Vol. 54 Issue 15, October 2010, pp. 2787-2805.
9. S. Kong, W. Lee, Y. H. Han, M. K. Shin and H. You, “Mobility management for all-IP mobile networks: Mobile IPv6 vs. Proxy
Mobile IPv6, IEEE Wireless Communications Vol. 15, Issue 2, pp. 36–45, April 2008.
10. Arun Kumar Tripathi, J. S. Lather and R. Radhakrishnan, “Secure and Optimized Authentication Scheme in Proxy Mobile IPv6
(SOAS-PMIPv6) to reduce Handover Latency”, I. J. Computer Network and Information Security, Vol. 9, Issue 10, pp. 1-12, October
2017.
12. 11. Montavont, Nicolas, and Thomas Noel. "Handover management for mobile nodes in IPv6 networks", IEEE Communications magazine
Vol. 40, Issue. 8, August 2002, pp. 38-43.
12. McNair, Janise, and Fang Zhu. "Vertical handoffs in fourth-generation multinetwork environments." IEEE Wireless communications 68-72
Vol. 11, Issue. 3, June 2004, pp: 8-15.
13. Allan Borges Pontes, Diego dos Passos Silva, Jose Jailton, Otavio Rodrigues and Kelvin Lopes Dias, "Handover management in
integrated WLAN and mobile WiMAX networks" IEEE Wireless Communications, Vol. 15, Issue. 5, 2008, pp. 86-95.
14. Ruidong Li, Jie Li, Kui Wu, Yang Xiao, and Jiang Xie, “An enhanced fast handover with low latency for Mobile IPv6, IEEE
Transactions on Wireless Communications, Vol. 7, no. 1, pp. 334-342, January 2008.
15. N. Montavont and T. Noel, "Handover management for mobile nodes in IPv6 networks”, IEEE Communications Magazine, Vol. 40,
Issue 8, pp. 38-44, August 2002.
16. Fei Shi, Keqiu Li, Yanming Shen, "Seamless handoff scheme in Wi-Fi and WiMAX heterogeneous networks", Future Generation
Computer Systems, Vol. 26, Issue 8, pp. 1403-1408, October 2010.
17. Ing-Chau Chang, Yi-Ting Mai, "The end-to-end QoS guarantee framework for interworking WiMAX PMP and mesh networks with
Internet" Computers & Electrical Engineering, Vol. 39, Issue 6, pp. 1905-1934, August 2013.
18. Y. Ahmet Şekercioğlu, Milosh Ivanovich, Alper Yeğin, "A survey of MAC based QoS implementations for WiMAX networks",
Computer Networks, vol. 53, Issue 14, pp. 2517-2536, September 2009.
19. P. Taaghol et al, "Seamless Integration of Mobile WiMAX in 3GPP networks", IEEE Commun. Mag., Vol. 46, pp 74–85, 2008.
20. Andrews, Jeffrey G., Arunabha Ghosh, and Rias Muhamed. Fundamentals of WiMAX: Understanding Broadband Wireless
Networking, Pearson Education, 2007.
21. A. Ghosh, D.R. Wolter, J.G. Andrews, R. Chen, "Broadband wireless access with WiMax/802.16: current performance benchmarks
and future potential", IEEE communications magazine, Vol. 43. Issue. 2, 2005, pp. 129-136.
22. Silva, Ricardo, Jorge Sa Silva, and Fernando Boavida. "A proposal for proxy-based mobility in WSNs", Computer Communications,
Vol. 35, Issue 10, June 2012 pp. 1200-1216.
23. Jianfeng Guan, Huachun Zhou, Zhiwei Yan, Yajuan Qin and Hongke Zhang, "Implementation and analysis of proxy MIPv6." Wireless
Communications and Mobile Computing Vol. 11, Issue 4, 2011, pp. 477-490.
24. Shweta Singh and Arun Kumar Tripathi, “Analyzing for Performance Factors in Cloud Computing”, International Conference on
Sustainable Computing Techniques in Engineering, Science and Management, International Journal of Control Theory and
Applications (IJCTA), Vol. 9, Issue 21, Sept 2016, pp. 87-96.
25. Shweta Singh and Arun Kr. Tripathi: “Analysis of Delay and Load Factors in Wired and Wireless Environment”, Second International
Conference on Recent Trends in Science, Technology, Management & Social Development (RTSTMSD-15), International Journal of
Science, technology and Management (IJSTM), 2015, pp. 1-8.
26. Olusegun O. Omitola, Segun O. Olatinwo, and O. Shoewu: “Evaluation and Investigation of Throughput and Delay on Ethernet and
FDDI Technologies using OPNET”, The Pacific Journal of Science and Technology, Vol. 15. No 1, 2014, pp. 125-128.
27. Shweta Singh and Arun Kr Tripathi: “A Comparative Study of Internet Protocols in MANET”, International Conference on “Advance s
in Computer Sciences” (ICACDS-16) in Book Series on Communications in Computer and Information Science, Springer Singapore,
Vol. 721, 2017, pp. 221-231
28. Arun Kumar Tripathi, Akash Rajak, Ajay Kumar Shrivastava, “Role of 5G Networks: Issues, Challenges and Applications”,
International Journal of Engineering and Advanced Technology, Vol. 8, Issue 6, August 2019, pp. 3172-3178.
29. Javier Carmona-Murillo José-Luis González-Sánchez David Cortés-Polo Francisco-Javier and Rodríguez-Pérez, "QoS in Next
Generation Mobile Networks: An Analytical Study", Resource Management in Mobile Computing Environments, Vol. 3, pp. 25-41,
2014.
30. H. Petander, E. Perera, K. C. Lan, and A. Seneviratne, “Measuring and improving the performance of network mobility managemen t in
IPv6 networks,” IEEE Journal on selected areas in communications, Vol. 24, No. 9, September 2006, pp. 1671–1681.

Authors: K.Hemalatha, T.Srinivas, G.Swetha, V.Haripan


Effect of Air Quality Parameters in Hyderabad and Mapping Using QGIS and Detection
Paper Title:
Management Software
Abstract: This paper mainly focuses on determination of particulate matter (PM), carbon dioxide and Carbon
monoxide, relative humidity (RH), temperature, volatile organic compounds (VOC) and dew point in eleven
most polluted areas in Hyderabad using equipment (3MTM EVM series) environmental monitor. In this paper
we represented above parameters in the form of graph using Detection Management software in the duration of
readings taken in a day and also we have done mapping using QGIS software.

Keywords : Environmental monitor, Detection management software, QGIS mapping, pollution contaminants.

References:
1. Vandanapu, Swamy, and K. Muthumani. "Heat of Hydration and Alkali-Silicate Reaction in Oil Palm Shell Structural
Lightweight Concrete." Silicon (2019): 1-7.
2. M. Senthil Kumar et.al, Experimental investigations on mechanical and microstructural properties of Al 2 O3 /SiC
reinforced hybrid metal matrix composite, IOP Conference Series: Materials Science and Engineering, Volume
402, Number 1, PP 012123.(https://doi.org/10.1088/1757899X/402/1/012123)
3. L.Natrayan et al. Optimization of squeeze cast process parameters on mechanical properties of Al 2 O3 /SiC reinforced
hybrid metal matrix composites using taguchi technique. Mater. Res. Express; 5: 066516. (DOI: 10.1088/2053 -
1591/aac873,2018)
13. 4. Krishnamurthy, Muthumani, and Swamy Nadh Vandanapu. "Micro-structural and interfacial transition zone investigation on
oil palm shell lightweight concrete." International Journal of Microstructure and Materials Properties 14.5 (2019): 448-461.
5. S.Yogeshwaran, R.Prabhu, Natrayan.L, Mechanical Properties of Leaf Ashes Reinforced Aluminum Alloy Metal Matrix 73-80
Composites, International Journal of Applied Engineering Research ISSN 0973 -4562 Volume 10, Number 13, 2015.
6. L. Natrayan, V. Sivaprakash, M.S.Santhosh, Mechanical, Microstructure and wear behavior of the material AA6061
reinforced SiC with different leaf ashes using advanced stir casting method. International Journal of Engineering and
Advanced Technology. Volume-8, Issue-2S, December 2018, 366-371.
7. Swamynadh, V., and K. Muthumani. "Properties of structural lightweight concrete containing treated oil palm shell as coarse
aggregate." Asian Journal of Civil Engineering 19.6 (2018): 673-678.
8. Kumar, M. S., Mangalaraja, R. V., Kumar, R. S., and Natrayan, L. (2019). Processing and Characterization of
AA2024/Al2O3/SiC Reinforces Hybrid Composites Using Squeeze Casting Technique. Iranian Journal of Materials Science &
Engineering, 16(2) 55-67.
9. Natrayan, L., M. Senthil Kumar, and Mukesh Chaudhari. "Optimization of Squeeze Casting Process Parameters to Investigate
the Mechanical Properties of AA6061/Al2O3/SiC Hybrid Metal Matrix Composites by Taguchi and Anova Approach."
Advanced Engineering Optimization Through Intelligent Techniques. Springer, Singapore, 2020. 393-406.
10. L. Natrayan and M. Senthil Kumar. Study on Squeeze Casting of Aluminum Matrix Composites-A Review. Advanced
Manufacturing and Materials Science. Springer, Cham, 2018. 75-83. (https://doi.org/10.1007/978-3-319-76276-0_8.)
11. Gauderman, W. J. et al. (2000).Association Between Air Pollution and Lung Function Growth İn Southern California
Children. American Journal of Respiratory and Critical Care Medicine, 162:pp.1383 –1390.
12. M. S. Santhosh, R. Sasikumar, L. Natrayan, M. Senthil Kumar, V. Elango and M. Vanmathi. (2018). Investigation of
mechanical and electrical properties of kevlar/E-glass and basalt/E-glass reinforced hybrid Composites. . Inter J Mech Prod
Engi Res Develop., 8(3): 591-598.
13. L.Natrayan, MS Kumar, Mukesh Chaudhari, Characterization of Al6061 Reinforced Al 2O3 Hybrid Metal Matrix Composites
with Variable Squeeze Pressure, Journal of Advanced Research in Dynamic and Control Systems 11 (03), 1636-1642.

Authors: K L V Ramana Kumari, M Asha Rani, N Balaji, B Niharika Goud


Paper Title: Fpga Implementation of Active Neighborhood Pattern Sensitive Fault Testing using Tiling Method
Abstract: Test structure for Active Neighborhood Pattern Sensitive Fault (ANPSF) in memories with high
switching speed is modeled in this paper. Algorithm for ANPSF testing is developed using type-1 neighborhood
approach. The type-1 neighborhood, also known as tiling method has one victim and four aggressor cells. It is
used to identify the ANPSF effect on base cell by the switching of patterns in the corresponding deleted
neighborhood cells. The required test pattern can be generated using a Binary counter, Hamiltonian or Gray
pattern generator where the two successive values differ in only one binary digit. The BIST architecture allows
to incorporate the hardware required by the user to select the victim and corresponding aggressor cells to test the
complete memory. It helps in application of test pattern for the memory circuit under test on user’s choice. The
main objective of this model is to develop the architecture for tiling methodology with test pattern generator to
14. detect the transitions in aggressor cells with edge detection technique. The proposed work enables to verify the
response of victim cell which may cause a change in value resulting in an active neighborhood pattern sensitive
fault scenario. The complete ANPSF model architecture for memory testing is developed using Verilog 81-86
hardware descriptive language. The process of simulation and synthesis report is validated using Xilinx 14.2 and
implemented on Nexys 4 DDR Artix 7 FPGA board.

Keywords: Active Neighborhood Pattern Sensitive Fault (ANPSF), Tiling method, Type-1 neighborhood,
Binary counter, Hamiltonian, Gray pattern generator, Xilinx ISE 14.2, Nexys 4 DDR Artix 7 FPGA.
References:
1. V. D. A. Michael Lee Bushnell, Vishwani D. Agrawal, “Essentials of Electronic Testing for Digital, Memory, and Mixed -Signal
VLSI Circuits”. New York: Kluwer Academic Publishers, 2nd ed., 2002
2. M. A. Miron Abramovici, Melvin A. Breuer, Arthur D. Friedmaan, “Digital Systems Testing and Testable Design ”Jaico
Publishing House, 2002
3. C. Huzum, P. Cascaval, “A Multibackground March Test for Static Neighborhood Pattern-Sensitive Faults in Random-Access
Memories” 2012.
4. Anu Samanta, Mousumi Saha, Ajay Kumar Mahato “BIST Design for Static Neighborhood Pattern Sensitive Fault Test ”,
International Journal of Computer Applications, iC3S-2012.
5. K.-L. Cheng, M.-F. Tsai, and C.-W. Wu, “Neighborhood pattern-sensitive fault testing and diagnostics for random access
memories,” IEEE Trans. Computer-Aided Design of Integrated Circuits and Systems, vol. 21, no. 11, pp. 1328– 1336, Nov. 2002
6. K. Cheng and C.-W. Wu, " Efficient neighborhood pattern-sensitive fault test algorithms for semiconductor memories", in Proc.
IEEE VLSI Test Symp(VTS), Marina Del Rey, California, Apr 2001, pp. 225-237
7. S.V. Yarmolik and Mrozek, "Multi Background Memory Testing", In Proc. Th MIXDES 14 International Conference,
Ciechocinek, Poland, June 2000
8. AJ. van de Goor, Testing Semiconductor Memories: Theory and Practice, John Wiley & Son, Chichester, England,1991.
9. M Parvathi, " Novel Test Methods for NPSF Faults in SRAM”, CCTES 2018.
10. Nexys4 DDR FPGA xilix user guide , in xilinx provided web page.

Authors: Ashutosh Kumar Dubey


An Efficient Variable Distance Measure K-Means [VDMKM] Algorithm for Cluster Head Selection
Paper Title:
in WSN
Abstract: Wireless sensor networks (WSNs) provide an empirical and explorative ways to handle and
collection of the data in the centralized way. In this paper an efficient variable distance measure k-means
[VDMKM] algorithm for cluster heads (CHs) selection in WSN has been presented and analyzed. This approach
is divided into two phases. In the first phase data preprocessing has been performed. In this phase size-based
weight and threshold assignment have been done on the scaling factor of 1-10. In the second phase VDMKM
approach has been applied. The main benefit of this approach is the capability of smaller distance assignments
automatically based on different distance measures. The distance measures used here are Euclidean, Pearson
coefficient and Manhattan correlation. The complete cluster correlated delay has been calculated along with the
packet delivery time. Our distance measure based automatic distance adjustment approach provides better suited
distance-based packet delivery in less time. The results are more prominent in the case of Euclidean and
Manhattan.

Keywords: WSN, VDMKM, Euclidean, Pearson coefficient and Manhattan correlation.

References:
1. Altoaimy L, Kurdi H, Alromih A, Alomari A, Alrogi E, Ahmed SH. Enhanced distance-based gossip protocols for wireless
sensor networks. In annual consumer communications & networking conference 2019 (pp. 1-4). IEEE.
2. Kwiatkowska M, Norman G, Parker D. Analysis of a gossip protocol in PRISM. ACM SIGMETRICS Performance Evaluation
Review. 2008;36(3):17-22.
3. Norouzi A, Babamir FS, Zaim AH. A novel energy efficient routing protocol in wireless sensor networks. Wireless Sensor
Network. 2011;3(10):341.
4. Khandelwal A, Jain YK. An efficient k-means algorithm for the cluster head selection based on SAW and WPM. International
Journal of Advanced Computer Research. 2018;8(37):191-202.
5. Iyengar SS, Brooks RR, editors. Distributed Sensor Networks: Sensor Networking and Applications (Volume Two). CRC press;
15. 2016.
6. Alromih A, Al-Rodhaan M, Tian Y. A Randomized watermarking technique for detecting malicious data injection attacks in
heterogeneous wireless sensor networks for internet of things applications. Sensors. 2018; 18(12):4346. 87-92
7. Olasupo TO, Olasupo KO. Investigation of factors that determine the performance of wireless sensor systems for large-scale on
demand deployment. Universal Journal of Communications and Network. 2017;5(1):1-22.
8. Irandegani M, Bagherizadeh M. Designing an asynchronous multi-channel media access control protocol based on service quality
for wireless sensor networks. International Journal of Advanced Computer Research. 2017; 7(32):190.
9. Hammoudeh M, Newman R. Adaptive routing in wireless sensor networks: QoS optimisation for enhanced application
performance. Information Fusion. 2015; 22:3-15.
10. Bharti D, Nainta N, Monga H. Performance analysis of wireless sensor networks under adverse scenario of attack. In
international conference on signal processing and integrated networks 2019 (pp. 826-828). IEEE.
11. Dahda N, Sindhwani M, Singh C. Energy efficient hybrid technique based on dynamic clustering in wireless sensor network. In
international conference on intelligent circuits and systems 2018 (pp. 229-234). IEEE.
12. Sharma HG, Sharma R. A study of static and random sink node in wireless sensor network. In international conference and
workshops on recent advances and innovations in engineering 2018 (pp. 1-4). IEEE.
13. Habib A, Saha S, Nur FN, Razzaque A, Mamun-Or-Rashid M. An efficient mobile-sink trajectory to maximize network lifetime
in wireless sensor network. In international conference on innovation in engineering and technology 2018 (pp. 1-5). IEEE.
14. Sandhu JK, Verma AK, Rana PS. A data-driven framework for survivable wireless sensor networks. In international conference
on contemporary computing 2018 (pp. 1-6). IEEE.
15. Muruganantham N, El-Ocla H. Genetic algorithm-based routing performance enhancement in wireless sensor networks. In
international conference on communication and information systems 2018 (pp. 79-82). IEEE.
16. Rubel MS, Kandil N, Hakem N. Priority management with clustering approach in wireless sensor network (WSN). In
international conference on digital information, networking, and wireless communications 2018 (pp. 7-11). IEEE.
17. Singh AK, Kumar P. Advancement in quality of services in wireless sensor networks. In international conference on internet of
things: smart innovation and usages 2018 (pp. 1-5). IEEE.
18. Zhang C, Fei S. A data collection algorithm with mobile elements in wireless sensor networks. In youth academic annual
conference of Chinese association of automation 2018 (pp. 1040-1044). IEEE.
19. Zhou L, Shan Y, Chen X. An anonymous routing scheme for preserving location privacy in wireless sensor networks. In
information technology, networking, electronic and automation control conference 2019 (pp. 262-265). IEEE.
20. Dubey AK, Gupta U, Jain S. Analysis of k-means clustering approach on the breast cancer Wisconsin dataset. International
Journal of Computer Assisted Radiology and Surgery. 2016;11(11):2033-47.
21. Dubey AK, Gupta U, Jain S. Comparative study of k-means and fuzzy c-means algorithms on the breast cancer data. International
Journal on Advanced Science, Engineering and Information Technology. 2018;8(1):18-29.

Authors: K. Arun Kumar, J.Karthikeyan


Wireless Sensor Networks of PEGASIS-Based Communication Protocol Classification in
16. Paper Title:
Environmental Monitoring
Abstract: A comparative research includes a protocol comparison based on certain parameters of performance.
93-97
It allows researchers to gain insight into the different appropriate parameters with the protocols which ultimately
lead to further advancement in the field. In the wireless sensor networks sector, improvements are taking place
day after day. PEGASIS is a bond-oriented protocol for WSN routing. Some significant protocols based on
PEGASIS architecture are studied in this document; PEGASIS, EEPB, IEEPB, PDCH, PEG-Ant, PEGASIS-
PBCA, PEGASIS-IBCA, MH-PEGASIS, Multi-bond PEGASIS and Modified-PEGASIS are explored and
comparison is made based on parameters that are essential to consider when selecting methodology for a specific
implementation of WSNs.

Keywords : PEGASIS ; networks of wireless sensors ; TOKEN ; chain formation ; node of the leader ; data
transmission
References:
1. Akkaya, Kemal, and Mohamed Younis. "A survey on routing protocols for wireless sensor networks." Ad hoc networks 3.3(2005):
325-349.
2. S. Lindsey, and C. Raghavendra, “PEGASIS : Power-efficientgathering in sensor information systems,” IEEE Aerospace Conferenceb
Proceedings, 2002, pp.1125-1130.
3. YU Yong-chang, WEI Gang, “An Improved PEGASIS Algorithmin Wireless Sensor Network,” Acta Electronica Sinica,
vol.36,pp.1309-1313, July 2008.
4. Feng Sen, Qi Bing and Tang Liangrui, “An Improved Energy-Efficient PEGASIS-Based Protocol in Wireless Sensor
Networks,”Eighth International Conference on Fuzzy Systems and KnowledgeDiscovery (FSKD), 2011, pp.2230-2233.
5. WANG Lin-ping, BI Wu, CAI Zhen and WANG Zu-feng,“Improved algorithm of PEGASIS protocol introducing doublecluster heads
in wireless sensor network,” International Conferenceon Computer, Mechatronics, Control and Electronic Engineering,2010, pp .148-
151.
6. GUO Wen-yu, ZHANG Wei, and LU Gang, “PEGASIS protocol in wireless sensor network based on an improved ant colony
algorithm,” Second International Workshop on Education Technology and Computer Science, 2010, pp.64-67.
7. Young-Long Chen, Neng-Chung Wang, Chin-Ling Chen and Yu-Cheng Lin, ” A Coverage Algorithm to Improve the Performance of
PEGASIS in Wireless Sensor Networks,” 12th ACIS
8. International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing,20 11,
pp.123-127.
9. Young-Long Chen, Yu-Cheng Lin and Neng-Chung Wang, “an intersection-based coverage algorithm for pegasis architecture in
10. wireless sensor networks,” Proceedings of the 2012 International Conference on Machine Learning and Cybernetics, Xian, 15-17 July,
2012, pp.1727-1731.
11. Zibouda Aliouat and Makhlouf Aliouat,” Efficient Management of Energy Budget for PEGASIS Routing Protocol,” 6th International
12. Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), 2012, pp.516-521.
13. Mohsin Raza Jafri, Nadeem Javaid, Akmal Javaid and Zahoor Ali Khan,” Maximizing the Lifetime of Multi-Chain PEGASIS Using
14. Sink Mobility,” World Applied Sciences Journal 21, 2013, pp.1283-1289.
15. Madhuri Gupta and Laxmi Saraswat,” Energy Aware Data Collection in Wireless Sensor Network Using Chain Based PEGASIS,”
IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014), May 09-11, 2014,Jaipur, India.
16. R. K. Yadav and Arpan Jain, “CHATSEP: Critical Heterogeneous Adaptive Threshold Sensitive Election Protocol for Wireless Sensor
Networks,” IEEE International Conference on Advances inComputing, Communications and Informatics (ICACCI), 2014,pp.81 -86.
17. Lewis, Franck L. "Wireless sensor networks." Smart environments:technologies, protocols, and applications (2004): 11-46.[14].
Akyildiz, Ian F., et al. "Wireless sensor networks: asurvey." Computer networks 38.4 (2002): 393-422.
18. Akkaya, Kemal, and Mohamed Younis. "A survey on routingprotocols for wireless sensor networks." Ad hoc networks 3.3(2005): 325-
349.

Authors: Wafa Zubair AL-Dyani, Farzana Kabir Ahmad, Siti Sakira Kamaruddin
Paper Title: Event Detection Model for Facebook News Posts
Abstract: Abstract: Event detection has wide application especially in the area of news streams analyzing
where there is a need to monitor what events are emerging and affecting people’s lives. This is crucial for public
administrations and policy makers to learn from their previous mistakes to make better decisions in the future.
Different researchers have introduced several event detection models for Facebook news posts in. However,
majority of these models have not provided adequate information about the discovered news events such as
location, people and activity. In addition, existing models have ignored the problem of high dimensional feature
space which affects the overall detection performance of the models. This research presents a conceptual event
detection model for mining events from large volume of short text Facebook news posts and summarize their
valuable information. This is crucial for public administrations and policy makers to learn from their previous
mistakes to make better decisions in the future. The proposed model includes pre-processing, feature selection,
event detection and summarization phases. The pre-processing phase involves several steps to convert
unstructured text news posts into structure data. Feature selection phase to select the optimal feature subset.
17. Meanwhile, event detection phase uses these features to construct undirected weighted graph and apply dynamic
graph technique to identify the clusters from the graph and then annotate each cluster to its corresponding event.
At the end of this paper, several unresolved problems in the construction of event detection model from 98-102
Facebook news posts are reported to be used as future work for the current study.

Keywords: Event detection, Facebook, Feature selection, graph, news, text clustering.

References:
1. F. Wanner, A. Stoffel, D. Jäckle, B. C. Kwon, A. Weiler, and D. A. Keim, “State-of-the-Art Report of Visual Analysis for Event
Detection in Text Data Streams,” pp. 1–15, 2014.
2. F. Abdullah, K. R. Ku-Mahamud, F. Ahmad, N. F. A Ghani, and M. M Kasim, “Relative efficiency assessment of projects using data
envelopment analysis: A case study,” Int. J. Digit. Content Technol. its Appl., vol. 6, no. 9, pp. 310–318, 2012.
3. M. H. Singh, “Clustering of text documents by implementation of K-means algorithms,” Streamed Info-Ocean, vol. 1, no. 1, pp. 53–63,
2016.
4. A. Goswami and A. Kumar, “A survey of event detection techniques in online social networks,” Soc. Netw. Anal. Min., vol. 6, no. 1, p.
107, 2016.
5. N. Sormanen, J. Rohila, E. Lauk, T. Uskali, J. Jouhki, and M. Penttinen, “Chances and challenges of computational data gathering and
analysis: The case of issue-attention cycles on Facebook,” Digit. Journal., vol. 4, no. 1, pp. 55–74, 2016.
6. L. C. Passaro, A. Bondielli, and A. Lenci, “FB-NEWS15: A Topic-Annotated Facebook Corpus for Emotion Detection and Sentiment
Analysis,” in Proceedings of the Third Italian Conference on Computational Linguistics CLiC-it 2016., 2016.
7. S. A. Salloum, C. Mhamdi, M. Al-Emran, and K. Shaalan, “Analysis and Classification of Arabic Newspapers’ Facebook Pages using
Text Mining Techniques,” Int. J. Inf. Technol., vol. 1, no. 2, pp. 8–17, 2017.
8. G. Leban, B. Fortuna, and M. Grobelnik, “Using News Articles for Real-time Cross-Lingual Event Detection and Filtering.,” in
NewsIR@ ECIR, 2016, pp. 33–38.
9. Ahmed Al-Rawi, “News values on social media: News organizations’ Facebook use,” Journalism, pp. 1–19, 2016.
10. M. Allahyari et al., “A brief survey of text mining: Classification, clustering and extraction techniques,” arXiv Prepr.
arXiv1707.02919, 2017.
11. B. Xue, M. Zhang, W. N. Browne, and X. Yao, “A survey on evolutionary computation approaches to feature selection,” IEEE Trans.
Evol. Comput., vol. 20, no. 4, pp. 606–626, 2016.
12. T. R. Chandran, A. V Reddy, and B. Janet, “Text Clustering Quality Improvement using a hybrid Social spider optimization,” Int. J.
Appl. Eng. Res., vol. 12, no. 6, pp. 995–1008, 2017.
13. N. Panagiotou, I. Katakis, and D. Gunopulos, “Detecting events in online social networks: Definitions, trends and challenges,” in
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
vol. 9580, Springer, 2016, pp. 42–84.
14. R. Hassanian-esfahani and M. Kargar, “A survey on web news retrieval and mining,” in Web Research (ICWR), 2016 Second
International Conference on, 2016, pp. 90–101.
15. Q. H. Ramadan and M. Mohd, “A review of retrospective news event detection,” in Semantic Technology and Information Retrieval
(STAIR), 2011 International Conference on, 2011, pp. 209–214.
16. X. Dai, Y. He, and Y. Sun, “A Two-layer text clustering approach for retrospective news event detection,” in Artificial Intelligence and
Computational Intelligence (AICI), 2010 International Conference on, 2010, vol. 1, pp. 364–368.
17. J. Deng, F. Qiao, H. Li, X. Zhang, and H. Wang, “An Overview of Event Extraction from Twitter,” in Cyber-Enabled Distributed
Computing and Knowledge Discovery (CyberC), 2015 International Conference on, 2015, pp. 251–256.
18. F. Zarrinkalam and E. Bagheri, “Event identification in social networks,” Encycl. with Semant. Comput. Robot. Intell., vol. 1, no. 01,
p. 1630002, 2017.
19. C. S. Cracs and P. Porto, “A Three-Step Data-Mining Analysis of Top-Ranked Higher Education Institutions ’ Communication on
Facebook,” 2018.
20. A. Alsaeedi, M. A. Fattah, and K. Aloufi, “A hybrid feature selection model for text clustering,” in System Engineering and
Technology (ICSET), 2017 7th IEEE International Conference on, 2017, pp. 7–11.
21. S. Arora and P. Anand, “Binary butterfly optimization approaches for feature selection,” Expert Syst. Appl., vol. 116, pp. 147–160,
2019.
22. B. Manaskasemsak, B. Chinthanet, and A. Rungsawang, “Graph Clustering-Based Emerging Event Detection from Twitter Data
Stream,” in Proceedings of the Fifth International Conference on Network, Communication and Computing, 2016, pp. 37–41.
23. S. . Abdulsahib, A.K., Kamaruddin, “Graph based text representation for document clustering,” J. Theor. Appl. Inf. Technol., vol. 76,
no. 1, pp. 1–13, 2015.
24. A. Edouard, “Event detection and analysis on short text messages,” 2018.
25. S. Katragadda, R. Benton, and V. Raghavan, “Framework for real-time event detection using multiple social media sources,” 2017.
26. B. S. Khan and M. A. Niazi, “Network Community Detection : A Review and Visual Survey,” 2016.
27. Q. Chen, X. Guo, and H. Bai, “Semantic-based topic detection using Markov decision processes,” Neurocomputing, vol. 242, pp. 40–
50, 2017.
28. Y. Zhang, C. Szabo, and Q. Z. Sheng, “Sense and focus: towards effective location inference and event detection on Twitter,” in
International Conference on Web Information Systems Engineering, 2015, pp. 463–477.
Authors: Deep Tripathi, Rakesh Kumar, P. K. Mehta, Amrendra Singh

Paper Title: Optimum Dose of Binary Admixtures in Self Compacting Concrete


Abstract: Self Compacting Concrete (SCC) is a high performance concrete and is becoming popular day by
day in the field of construction. Generally, the quantity of binder is more in SCC than the normal concrete. The
application of pozzolanic material is found successful in such type of concrete. Generally, Ordinary Portland
Cement (OPC) is replaced with Fly Ash (FA). In this paper, the results of an experimental programme to
evaluate the performance of SCC are presented and optimum dose of binary admixture was found. For the
determination of the optimum dose, concrete cubes of 100mm sizes were cast. The replacement level of OPC by
FA was varied as- 5, 10, 15 and 20%, by mass. The OPC was also replaced separately by Metakaolin (MK) - 5,
10, 15 and 20%, by mass. Further, the OPC was replaced by the binary admixture (FA+MK). The workability
and strength of SCC of grade M25 (Referral concrete- RC) and the concrete using the binary admixtures were
studied. All SCC mixes were tested for workability as recommended by EFNARC i.e. Slump flow, T50 time
flow, V-funnel, L-box, U-box and J-ring. The workability of SCC mix increases with FA and decreases
gradually as MK content is increased. The optimum replacement level of OPC by binary admixture is 25% (FA-
15% + MK-10%) with respect to compressive strength. The water absorption of cubes was also examined. It is
18. concluded that a high strength and economical SCC could be developed by incorporation of FA and MK.
103-108
Index Terms: Binary Admixtures, Fly ash (FA), Metakaolin (MK), Self Compacting Concrete (SCC).

References:
1. Yahia A., Tanimura M., Shimabukuro A. and Shimoyama Y.: Effect of rheological parameters on self compactability of concrete
containing various mineral admixtures. In Proceedings of the first RILEM International symposium on self-compacting concrete, pp.
523-35, Stockholm, (1999).
2. Kurita M. and Nomura T.: Highly-flowable steel fiber-reinforced concrete containing fly ash. Special Publication 178, 159-176 (1998).
3. Duan, Ping, Chunjie Yan, and Wei Zhou.: Influence of partial replacement of fly ash by metakaolin on mechanical properties and
microstructure of fly ash geopolymer paste exposed to sulfate attack. Ceramics International 42 (2), 3504-3517 (2016).
4. Sabir B.B., Wild S. and Bai J.: Metakaolin and calcined clays as pozzolans for concrete: a review. Cement and concrete composites 23
(6), 441-454 (2001).
5. Madandoust R., and Mousavi S.Y.: Fresh and hardened properties of self-compacting concrete containing metakaolin. Construction
and building materials 35, 752-760 (2012).
6. Kavitha O. R., Shanthi V.M., Arulraj G.P., and Sivakumar P.: Fresh, micro-and macrolevel studies of metakaolin blended self-
compacting concrete. Applied Clay Science 114, 370-374 (2015).
7. Caldarone M.A., Gruber K.A., and Burg R.G.: High reactivity metakaolin (HRM): a new generation mineral admixture for high
performance concrete. Concrete International 16 (11), 37-41(1994).
8. Frıas M., Rojas M.I.S., and Cabrera J.: The effect that the pozzolanic reaction of metakaolin has on the heat evolution in me takaolin-
cement mortars. Cement and Concrete Research 30 (2), 209-216 (2000).
9. Hassan A.A.A., Lachemi M., and Hossain K.M.A.: Effect of metakaolin on the rheology of self-consolidating concrete: In Design,
production and placement of self-consolidating concrete, pp. 103-112. Springer, Dordrecht, (2010).
10. Chopra, Divya, and Rafat Siddique.: Strength, permeability and microstructure of self-compacting concrete containing rice husk ash.
Biosystems engineering 130, pp. 72-80 (2015).
11. IS: 8112 (1989). : Specification for 43 grade ordinary Portland cement. Bureau of Indian standards, New Delhi, India (1989).
12. IS: 383 (1987). : Specification for coarse and fine aggregate from natural sources for concrete. Bureau of Indian Standards, New
Delhi, India (1987).
13. IS: 3812- 2000.: Specification for Pulverized Fuel Ash, Part 1: For Use as Pozzolana in Cement. Cement Mortar and Concrete (2002).
14. EFNARC.: Specification and guidelines for self-compacting concrete. UK: EFNARC; (2005).
15. IS: 14858- 2000.: Requirements for compression testing machine used for testing of concrete and mortar. Bureau of Indian Standards,
New Delhi, India (2002).
16. IS: 516 (1959).: Specification for methods of test for strength of concrete. Bureau of Indian standards, New Delhi, India (19 59).
17. Brabha H Nagaratnam, Ahmed Faheem, Muhammad Ekhlasur Rahman, Mohammad: Mechanical and Durability Properties of
Medium Strength Self Compacting Concrete with High-Volume Fly Ash and Blended Aggregates. R Periodica Polytechnica Civil
Engineering 59(2), pp. 155-164 (2015).
18. Lenka, S., and K. C. Panda.: Effect of metakaolin on the properties of conventional and self compacting concrete. Advances in
concrete construction.5 (1), pp. 31-48 (2017).

Authors: A.Rama, A.Gayathri, S.Christy

Paper Title: Fine Tuning Data Mining Algorithm for an Efficient Classification of E-Coli
Abstract: E. coli is the first organisms to be sequenced as genome and the classification within the DEC
pathotypes has epidemiologic and clinical implications for managing diarrheal diseases. In many developing
countries E.coli leads to cause of diarrhea in children. where the mode of transmissions takes place via food and
water. based on their pathogenic phenotype and diseases they cause it can be classified into 6 groups.
consequently, our awareness of the spectrum of diseases and syndromes that they cause is quite limited. Also,
because we cannot readily identify infected patients, there are many complexities in defining the modes of
attainment, prevention and treatment strategies, and estimating the burden of infectious squealed. These
infections create many challenges, and no progress will take place until the diagnostic potential for these agents
got improved. Identifying E. coli isolate co-express LA reiterates the difficulty of assigning bacteria to groups on
the basis of their adherence phenotype or genotype. Therefore the analysis of E -coli with molecular methods
demonstrates that strains carry will represent more characteristics of typical EPEC and also the lack of AggR
regulon, we propose a novel classification approach for classifying E-coli therefore to recognize pathogens. In
addition, the ability to simultaneously induce attaching effacing lesions and biofilm production may enhance the
potential of the strains to cause diarrhea and prolong bacterial residence in the intestines, thus worsening
19. malnutrition in the patients.
Keywords: Ecoli , classification , BayesNet, Navie Bayes, RBFNetwork, SMO. 109-113

References:
1. Qiang Yang and Xindong Wu, (2006) "10 Challenging Problems In Data Mining Research", International Journal of Information
Technology & Decision makingvol. 05, No. 04, pp. 597-604 ,https://doi.org/10.1142/S0219622006002258.
2. Norouzi, Monire & Souri, Alireza & Zamini, Majid. (2016). A Data Mining Classification Approach for Behavioral Malware Detection.
Journal of Computer Networks and Communications. 2016. 1-9.
3. (https://doi.org/10.5120/ijca2017915922) Jindal, Rajni & Taneja, Shweta. (2017). A Novel Weighted Classification Approach using
Linguistic Text Mining. International Journal of Computer Applications. 180. 9-15. 10.5120/ijca2017915922.
4. Coenen, F., Leng, P., Zhang, L.: Threshold Tuning for Improved Classification Association Rule Mining, pp. 216 –225. Springer,
Heidelberg (2005)
5. Han, J., Kamber, M.: Data Mining: Concept and Techniques, 2nd edn., pp. 285–311. Morgan Kaufmann Publishers, San Francisco (2006)
6. Ismaeel, A. G., & Mikhail, D. Y. (2016),”Effective data mining technique for classification cancers via mutations in gene using neural
network”, arXiv preprint arXiv:1608.02888.
7. Nilashi, M., Ibrahim, O., Ahmadi, H., &Shahmoradi, L. (2017), “A knowledge-based system for breast cancer classification using fuzzy
logic method”, Telematics and Informatics, 34(4), 133-144.
8. Mahapatra, R., Majhi, B., & Rout, M. (2012),”Reduced feature based efficient cancer classification using single layer neural network”,
Procedia Technology, 6, 180-187.
9. Nguyen, T., Khosravi, A., Creighton, D., &Nahavandi, S. (2015), “Hidden Markov models for cancer classification using gene ex pression
profiles”, Information Sciences, 316, 293-307.

Authors: Maftuna Kurbanova, Feruza Atavullaeva


Peculiarities of Digital Economy and Its Development Tendencies in the Banking System of
Paper Title:
Uzbekistan
Abstract: The article is devoted to the discussion of recent trends and reformation in digital economy and
banking system in Uzbekistan. The object of the research is the PJSCB “RAVNAQ-BANK”, while
implementing and developing of digital economy in the financial sector of the Republic of Uzbekistan is the
subject of this article. The actuality of the research consists of increasing the number of scholars who are
interested in how to develop digital economy in several developing countries and by this to achieve economic
20. effectiveness in both the scope of country and company. For example, regardless of the reformations and
development in this sphere, there is a row of problems unsolved. Nowadays, population seems not to be satisfied
114-125
with the supply of banking services; hence the number of complaints on the work of service providers is
increasing. Besides, the problems in the sphere of banking services also arise from the lack of the mechanism of
monthly taking measurements from the counters and the absence of central database of consumers. The analysis
of the main approaches determining the contribution of digital economy to the banking sphere, formulation of
recommendations relating to the prior directions to achieve the step-by-step digital transformation of the sphere
of banking make up the scientific novelty of the research. The research consists of four parts. Firstly, the role of
digital economy in the banking sphere is explored. Secondly, the application of mobile system to the banking
services is investigated. Thirdly, reformation processes of digital economy by developing banking system of
PJSCB “RAVNAQ-BANK” are examined. Lastly, introduction of digital economy to the sphere of banking and
banking services for integration with e-government are discussed.

Keywords : digitalization, digital economy, digital transformation, e-government, information technologies,


bank, banking system, commercial banks, finance, Uzbekistan, PJSCB “RAVNAQ-BANK”.

References:
1. Aaron Orendorff, Global Ecommerce, 2017, September 1
2. Ajeet Khurana, Advantages of E-commerce Over Traditional Retail, 2017, November 19)
3. Darren DeMatas, 5 Types of Ecommerce Business Models That Work Right Now, 2018, February 3
4. Digital Russia. New reality. Research by McKinsey Global Inc. July 2017. [Electronic resource] URL:
http://www.tadviser.ru/images/c/c2/Digital-Russiareport.pdf (accessed 19.10.18).
5. Dobrynin A. P., To Black.Yu, Chuprynousky.P., Chuprynousky P. V., Sinyakov.A. the Digital economy-the different ways to the
effective use of technology (BIM, PLM, CAD, IoT, Smart City, Big Data, etc.) / / INTERNATIONAL JOURNAL of OPEN
INFORMATION TECHNOLOGIES. - 2016. - № 4. - From 4-11
6. Guskova M. N., Frolova T. V., Isaeva E. A. the Current state of the Russian financial market // In the collection: Institutional and
infrastructure aspects of the development of various economic systems collection of articles of the International scientific and
practical conference. - 2016. - Pp. 145-151.
7. Korovkina E. V. Creation of a digital ecosystem of a commercial Bank: main ways and predicted results. Scientific notes of
young researchers. - 2017. - № 3. -P. 68-71.
8. Maslennikov V. V., Fedotov M. A., Sorokin A. N. New technologies are changing our world // Bulletin of the financial
University. - 2017. - № 3. - P. 6-11
9. Miroshnichenko M. A., Trenevska A. I. Innovations in the banking sector as a vector of development of the ecosystem of the
digital economy. Knowledge economy in Russia: from the generation of knowledge and innovation to cognitive of
industrialization: proceedings of the IX Intern. science.-prakt. Conf./ OTV. the editorship of V. V. Ermolenko, M. R. Zakaryan.
Krasnodar: Kuban. state UN-T. - 2017. – № 313. - P. 267-280.
10. Miroshnichenko M. A., Trenevska K. A., Mamykina, E. V. Study of the process of "digitalization" of the banking sector in the
broader ecosystem of the digital economy of Russia // Polythematic network electronic scientific journal of the Kuban state
agrarian University. - 2017. - № 133. - P. 434-447
11. Petrov A. R., Rodionova E. V. Creation of digital ecosystem as a key element of functioning of modern commercial banks.
Innovative development. -2017. - № 12. - Pp. 136-138
12. Rudakova O. S. Banking ecosystems in the digital economy // Proceedings of the International scientific and practical Internet
conference. - 2018. - P. 232-238.
13. Yakushenko K. V., Shimanskaya A.V. Digital transformation of information support of economic management of the EAEU
member States// news of science and technology. -2017. - № 2. - P. 11-20.
14. Yusupova O. A. Internet banking as a direction of digitalization of banking business: state, problems, prospects // Financial
Analytics: problems and solutions. -2016. - № 34. - P. 12-25.
Authors: Sathiskumar S, Dhavaneeswaran N, Dhanush Guru R.
Performance and Emission Testing of Methyl Ester of Aloe Vera using Metal Oxide as Additive in
Paper Title:
CI Engine
Abstract: This experimental research evaluate the performance and emission characteristics of a single
cylinder 4 – stroke multi-fuel VCR engine, we obtained gel from the aloe vera as the raw material for biodiesel
production in the transesterification process. We blended the obtained biodiesel in various ratios with the diesel
and it was named B10, B20, and B30. The properties of the biodiesel were tested before it was used as a fuel.
The performance and emission testing were done in a single cylinder 4 – stroke multi-fuel VCR engine with an
eddy current dynamometer. The biodiesel played a major role in reducing hydrocarbon and carbon monoxide
emissions. But it resulted in certain disadvantages of using aloe vera biodiesel in CI engines i.e., it emits more
nitrous oxide than diesel and also it has more fuel consumption. To eliminate these drawbacks, aluminum oxide
(Al2O3) was used as a nano additive. Based on the performance and emission results obtained, we chose the best
blend using a design optimization software called "design expert". The performance and emission results were
used in the software which will offer comparative tests, screening, and optimization to choose the best biodiesel
blend. B20 was chosen as the best blend and aluminum oxide nano additive was used in two percentages as 50
ppm and 100 ppm with the B20 blend. These nanoparticles added to the biodiesel reduced the ignition delay
21. during the combustion process which resulted in improved thermal efficiency, brake specific fuel consumption
and reduction in nitrogen oxide emissions to meet the objectives of this research.
Keywords: Fossil fuels, biodiesel, aloe vera, emission, nano additives, aluminum oxide, ignition delay 126-133

References:
1. Marcelo Silva, Andre E Machado, Ana Carolina R de Castro, Bruno Carvalho, (2015), biodiesel production process starting from aloe
vera: A paper presented in the international conference on engineering and computer education
2. Marcelo Silva, Andre E Machado, Ana Carolina R. de Castro, Bruno Carvalho, Barbara C.A.da Rocha, Thaiane de Castro Mello, Lorran
Santana, Rayanne Murras(2015) Technical aspects of the production of aloe vera gel biodiesel: A paper presented in the international
conference on safety, Health, and Environmental world congress
3. P.Vidhya, Dr.S. Sunil Kumar Reddy, V. Govind Naik (2014): Investigation on the performance and emissions of Aloe vera blends with
EGR system: International journal of innovative research in science, engineering, and technology (ISSN:2319- 8753)
4. Marcelo Silva, Barbara C.A .da Rocha, Lorran Santana, Rayanne Murras, Thaiane Mello (2015): The importance of pre-treatment with
alkaline wash for the obtaination of biodiesel from vegetable oil aloe vera: A paper presented in the international conference on
engineering and computer education
5. P.J Ayanthi, Srinivasa RAO M, (2016): Effects of nanoparticles additives on performance and emissions characteristics of a DI Diesel
engine fuelled with biodiesel: International journal of advances in engineering & technology (ISSN: 22311963)
6. Ajay Kumar Gupta, Mona Gupta (2004): Synthesis and surface engineering of iron oxide nanoparticles for biomedical application s:
ELSEVIER:- Applied catalysis
7. Soner Gumus, Hakan Ozcan, Mustafa Ozbey, Bahattin topaloglu (2016): Aluminium oxide and copper oxide nano diesel fuel properties
and usage in a compression ignition engine: ELSEVIER: Applied catalysis
8. Ali M.A. Attia, Hesham M. El-Batsh and Ahmed I. El-Seesy, Mohamed S. Shehata (2014): Effects of alumina nanoparticles additives
into jojoba methyl ester-diesel mixture on diesel engine performance: International Mechanical Engineering Congress & Exposition
(IMECE2014-39988).
9. A.M. Ashrafu, H.H. Masjuki, M.A. Kalam, H.K. Rashedul, H. Sajjad, M.J. Abedin (2014): Influence of anti-corrosion additive on the
performance, emission and engine component wear characteristics of an IDI diesel engine fueled with palm biodiesel: ELSEVIER:
Applied catalysis
10. M. Akmal Adzmi, Adam Abdullah and Afif Naqiuddin (2019): Combustion characteristics of biodiesel blended with Al2O3 and SiO2
nanoparticles: AIP Conference Proceedings
11. Praveen Anchupogu1 & Lakshmi Narayana Rao2 & Balakrishna Banavathu (2018): Effect of alumina nano additives into biodiesel-
diesel blends on the combustion performance and emission characteristics of a diesel engine with exhaust gas recirculation:
Environmental Science and Pollution Research (DOI-10.1007)
12. L. Jeryrajkumar, G. Anbarasu, T. Elangovan (2016): Effects on Nano Additives on Performance and Emission Characteristics of
Calophyllim inophyllum Biodiesel: International Journal of Chem Tech Research (ISSN: 0974-4290)
13. Krishnan, Anbarasu, (2017): A Review on Emission Control Strategy by Adding Nano Additives in CI Engine: International Resear ch
Journal of Engineering and Technology (e-ISSN: 2395 -0056)
14. Vasudevan Raghavan, S. Rajesh, Shintre Paraga & V. Avinash, (2009): Investigation of Combustion Characteristics of Biodiesel and Its
Blends: Combustion Science and Technology
15. Vivek W. Khond, V.M. Kriplani, (2016): Effect of nanofluid additives on performances and emissions of emulsified diesel and biodiesel
fuelled stationary CI engine: A comprehensive review: Renewable and Sustainable Energy Reviews
16. Nagarajan Jeyakumar & N Bose (2019): Effect of Pentanol-biodiesel blends on performance and emission characteristics of diesel
engine: International Journal of Ambient Energy
17. H.M. Mahmudula, F.Y. Hagosa, R. Mamata, A. Abdul Adama, W.F.W. Ishakb, R. Alenezic (2017): Production, characterization, and
performance of biodiesel as an alternative fuel in diesel engines – A review: ELSEVIER: Journal of science and technology
18. K. Sureshkumar, R. Velraj, R. Ganesan (2008): Performance and exhaust emission characteristics of a CI engine fueled with Pongamia
pinnata methyl ester (PPME) and its blends with diesel: ELSEVIER: Journal of environmental engineering
19. S Padmanabhan, T Vinoth Kumar, M Chandrasekaran & S Ganesan (2018): Investigation of Sapindus seed biodiesel with nano additive
on single-cylinder diesel engine: International Journal of Ambient Energy
20. Vishal Saxena, Niraj Kumar, Vinod Kumar Saxena (2017): A comprehensive review of combustion and stability aspects of metal
nanoparticles and its additive effect of diesel and biodiesel fuelled C.I. Engine: ELSEVIER: Applied catalysis
21. Cenk Sayin (2010): Engine performance and exhaust gas emissions of methanol and ethanol–diesel blends: ELSEVIER: Journal of
science and technology
22. Thiyagarajan Subramanian & Edwin Geo Varuvel & Saravanan Ganapathy & S. Vedharaj & R. Vallinayagam (2018): Role of fuel
additives on the reduction of NOX emission from a diesel engine powered by camphor oil biofuel: Environmental Science and Pollution
Research

Authors: Neunghoe Kim


Paper Title: Requirement Validation Method using Social Network Service (SNS)
Abstract: Low quality requirements contribute to many problems throughout the software development life
cycle. For this reason, requirements validation step, a last step of the requirements development, is a very
important activity for finding potential problems of requirements and preventing failures. However, in practice,
there are a lot of cases that omitted or simply processed. It causes scheduling delays and over-costs, and result in
fail in software project. In the requirement validation step, the various aspects of the specific requirements are
reviewed, and the one important factor is "Are the functions the user wants included in the specification?" at that
time. This can be verified by the opinions of a lot of various users, and the appropriate method is the method to
use social network services where users freely post and share their opinions. Interviews, questionnaires that are
methods to identify user needs for a long time required a lot of time and costs, but, contrary to that, the
identifying user needs through social network services have a characteristics that can identify the needs of a
large number of different people at a relatively low cost and time. Therefore, this paper suggested a systematic
method of requirements validation using social network services that can identify the needs of a large number of
and various users with low cost and time relatively. It is available to check whether the functions desired by user
22. are included in the software requirement specification correctly through this method and, also, prevent the
problems caused by low quality requirement.
134-136
Keywords : Requirement validation, Social network service, Software requirement development, Software
requirement specification.

References:
1. M. Felderer, A. Beer, “Using defect taxonomies for requirements validation in industrial projects,” In Proceedings of the 21st
IEEE International Requirements Engineering Conference, Rio de Janeiro, Brasil, July 2013, pp. 296-301.
2. S. Nazir, Y. H. Motla, T. Abbas, A. Khatoon, J. Jabeen, M. Iqra, K. Bakhat, “A process improvement in requirement verification
and validation using ontology,” In Proceedings of the 1st Asia-Pacific World Congress on Computer Science and Engineering,
Nadi, Fiji, November 2014, pp. 26-33.
3. I. Sommerville. (2016, March, 01). Software engineering (10th ed.).
4. D. Boyd, N. B. Ellison, “Social network sites: definition, history, and scholarship,” Journal of Computer-Mediated
Communication, vol.13, no.1, December 2007, pp. 210-230.
5. Y. Jeong, G. Bae, The trends and perspectives of the social networking service (SNS), Emerging Issue Report, Korea Institute of
Science and Technology Information, 2007.
6. S. Ko, B. Hwang, Y. Ji, “A study on social network service and online social capital: focusing on a korean and chinese case,”
Journal of Society for e-Business Studies, vol.15, no.1, February 2010, pp. 103-118.
7. S. Hong, J. Oh, “Comparative analysis on twitter, facebook and kakaostory user access factor,” In Proceedings of the 3rd
International Conference on ICT Convergence, Jeju island, South korea, October 2012, pp. 248-252.

Authors: Dipti Khairkar, Mrunal N. Annadate


Measurement of Circulation of Blood Volume(CBV) and Total Blood Volume(TBV) in Heart using
23. Paper Title:
Doppler Color Flow Imaging in Ultrasound Videos
Abstract: Total blood volume (TBV) analysis is key to manage the patients with cardiopulmonary bypass (CPB) 137-141
cardiac surgery. Circulation of blood volume (CBV) is essential because the processes that maintain the connection
between red cell volume (RCV), plasma volume (PV) and CBV may not be measured. The differences in significant
surgery in patients do not always work efficiently and changes in CBV and need intensive care. The visible physiological
clinical shock require urgent methods to regulate CBV because the current method is complicated and involves
intervention.
The current approaches to estimating blood quantity are labor-intensive, complex, and time-consuming. Severe
depletion of quantity leads to selective vasoconstriction masking. Last decade, science has introduced different techniques
for estimating blood quantity. So the scheme that can offer a precise assessment of blood quantity in the human body
needs to be implemented. In this paper, a system is proposed where color flow imaging is used to measure TBV and CBV.
The videos used are Doppler 2d echocardiogram which shows the color Doppler flow in the heart. The method used in
this paper can be an alternative to the present methods of calculating the TBV and CBV as it is easy to measure the
parameters with the help of Doppler velocity.
Keywords : Blood volume, Blood flow, Velocity, Doppler Effect.

Keywords:
References:
1. Timothy A. Manzone, Hung Q. Dam, Daniel Soltis, and Vidya V. Sagar, “Blood Volume Analysis: A New Technique and New Clinical
Interest Reinvigorate a Classic Study,” J Nucl Med Technol. 2007 Jun;35(2):55-63; quiz 77, 79. Epub 2007 May 11.
2. Ryosuke Murakia, Arudo Hiraokab, Kazuyuki Nagataa, Kosuke Nakajimaa, Tomoya Oshitaa, Masahisa Arimichia,Genta Chikazawab,
Hidenori Yoshitakaband Taichi Sakaguchi, “Novel method for estimating the total blood volume: the importance of adjustment using
the ideal body weight and age for the accurate prediction of haemodilution during cardiopulmonary ypass,” Interact Cardiovasc Thorac
Surg. 2018 Dec 1;27(6):802-807.
3. Prathap Moothamadathil Baby, Pramod Kumar, Rajesh Kumar, Sanu S. Jacob, Dinesh Rawat, V. S. Binu, and Kalesh M. Karun , “A
novel method for blood volume estimation using trivalent chromium in rabbit models,” Indian J Plast Surg. 2014 May-Aug; 47(2): 242–
248
4. J. G. Jones and C. A. J. Wardrop, “Measurement of blood volume in surgical and intensive care practice,” BJA: British Journal of
Anaesthesia, Volume 84, Issue 2, Feb 2000, Pages 226–235
5. E. Pirnia, A. Jakobsson, E. Gudmundson,, and J. A. Jensen,"DATA ADAPTIVE ESTIMATION OF TRANSVERSAL BLOOD FLOW
VELOCITIES",2014 IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP).
6. Jonathan Pore, Thomas Deffieux, Mathieu Pernot, Charlie Demene, Jerome Baranger, Mickael Tanter ,"H igh-resolution vector Doppler
for cerebral blood flow estimation", 2017 IEEE International Ultrasonics Symposium (IUS).
7. D. Vray, A. Needles, V.X.D. Yang, F.S. Foster ,"High frequency B-mode ultrasound blood flow estimation in the microvasculature",
IEEE Ultrasonics Symposium, 2004.
8. L. Loevstakken, S. Bjaerum, D. Martens, H. Torp ,"Real-time blood motion imaging a 2D blood flow visualization technique", IEEE
Ultrasonic Symposium, 2004.
9. F. Karnangar, M.A. Masnadi-Shirazi, K. Behbehani, R. Zhang, N. Nazeran, B.D. Levine ,"A model of cerebral blood flow velocity as a
function of mean arterial blood pressure using Kalman filter estimation techniques", Proceedings of the Second Joint 24th Annual
Conference and the Annual Fall Meeting of the Biomedical Engineering Society] [Engineering in Medicine and Biology.
10. Dimple Modgil, David S. Rigie, Michael D. Bindschadler, Adam M. Alessio, Patrick J. La Rivire ,"Vectorial total variation d enoising
for myocardial blood flow estimation in dynamic CT", 2014 IEEE Nuclear Science Symposium and Medical Imaging Conference
(NSS/MIC).
11. Aditi Kathpalia, Ycel Karabiyik, Bente Simensen, Eva Tegnander, Sturla EikNes, Hans Torp, Ingvild Kinn Ekroll, Gabriel Kiss,"A
Robust Doppler Spectral Envelope Detection Technique for Automated Blood Flow Measurements ",2015 IEEE.
12. A.C. Santos ; S.S. Furuie ,"Estimation of coronary blood flow by contrast propagation using X-ray cineangio graphic images",
Computers in Cardiology 2001. Vol.28 (Cat. No.01CH37287).
13. K. Marasek and A. Nowicki, "Comparison of the performance of three maximum Doppler frequency estimators coupled with different
spectral estimation methods.," Ultrasound Med. Biol., vol. 20, no. 7, pp. 629-638, 1994.
14. JN Hilberath, ME Thomas, T Smith, C Jara, DJ Fitzgerald, K Wilusz, X Liu, and JD Muehlschlegel, "Blood volume measurement by
hemodilution: association with valve disease and re-evaluation of the Allen Formula" ,June 24, 2015.
15. B. H. Su, T. Watanabe, M. Shimizu, and M. Yanagisawa, “Echocardiographic assessment of patent ductus arteriosus shunt flow pattern
in premature infants,” Archives of Disease in Childhood: Fetal and Neonatal Edition, vol. 77, no. 1, pp. F36–F40, 1997.
16. Koert A. deWaal, "The Methodology of Doppler-Derived Central Blood Flow Measurements in Newborn Infants",International Journal
of Pediatrics Volume 2012.
17. M. Kluckow and N. Evans, “Superior vena cava flow in newborn infants: a novel marker of systemic blood flow,” Archives of Dis ease
in Childhood: Fetal and Neonatal Edition, vol. 82, no. 3, pp. F182–F187, 2000.
18. Burns PN, Simpson DH (1998) Pulse inversion Doppler: a new ultrasound technique for nonlinear imaging of microbubble contrast
agents and tissue. Radiology 209(P):190
19. N. Evans, V. Gournay, F. Cabanas et al., “Point-of-care ultrasound in the neonatal intensive care unit: international perspectives,”
Seminars in Fetal and Neonatal Medicine, vol. 16, no. 1, pp. 61–68, 2011.
20. K. de Waal and M. Kluckow, “Functional echocardiography; from physiology to treatment,” Early Human Development,vol. 86, no. 3,
pp. 149–154, 2010.

Authors: Wang Chen Xi, Sara Ravan Ramzani, Imran Ahmed Shahzad
Paper Title: The Effects of Organisational Cultures on Supply, Chain Performance
Abstract: The purpose of this study was to examine the relationship between organizational culture and supply
chain performance. Data were collected with the help of structured questionnaire and then analyzed with the help
of PLS SEM technique. The Results showed that there is a positive and significant impact of organization culture
24. on supply chain performance. Study is useful for both the future researchers and practioners as it highlighted the
newly adopted methodology in the area of supply chain management in specific while logistics in general and
142-148
insight out that the cultural impact is significant while going to green supply chain paradigm.

Keyword: PLS SEM highlighted the newly adopted methodology


References:
1. K. S. Cameron and R. E. Quinn, Diagnosing and changing organizational culture: Based on the competing values framework. John
Wiley & Sons, 2011.
2. D. Marshall, R. Metters, and M. Pagell, “Changing a leopard’s spots: A new research direction for organizational culture in the
operations management field,” Prod. Oper. Manag., vol. 25, no. 9, pp. 1506–1512, 2016.
3. M. Oz, F. Kaya, and I. Ciftci, “Evaluating the Organizational Culture Types of the 5-Star Hotel’s in Istanbul in terms of the Cameron &
Quinn Competing Values Model.,” J. Yasar Univ., vol. 10, no. 40, 2015.
4. C. J. Gelderman and A. J. Van Weele, “Handling measurement issues and strategic directions in Kraljic’s purchasing portfolio model,”
J. Purch. supply Manag., vol. 9, no. 5–6, pp. 207–216, 2003.
5. J. C. Smart and R. E. Hamm, “Organizational culture and effectiveness in two-year colleges,” Res. High. Educ., vol. 34, no. 1, pp. 95–
106, 1993.
6. D. R. Denison, “What is the difference between organizational culture and organizational climate? A native’s point of view on a decade
of paradigm wars,” Acad. Manag. Rev., vol. 21, no. 3, pp. 619–654, 1996.
7. H. M. Trice and J. M. Beyer, The cultures of work organizations. Prentice-Hall, Inc, 1993.
8. S. Giorgi, C. Lockwood, and M. A. Glynn, “The many faces of culture: Making sense of 30 years of research on culture in organization
studies,” Acad. Manag. Ann., vol. 9, no. 1, pp. 1–54, 2015.
9. R. A. Dowty and W. A. Wallace, “Implications of organizational culture for supply chain disruption and restoration,” Int. J. Prod. Econ.,
vol. 126, no. 1, pp. 57–65, 2010.
10. J. M. Howell and C. A. Higgins, “Champions of technological innovation,” Adm. Sci. Q., pp. 317–341, 1990.
11. A. Gunasekaran, C. Patel, and R. E. McGaughey, “A framework for supply chain performance measurement,” Int. J. Prod. Econ., vol.
87, no. 3, pp. 333–347, 2004.
12. V. V Sople, Supply chain management: text and cases. Pearson Education India, 2011.
13. A. Azadegan and K. J. Dooley, “Supplier innovativeness, organizational learning styles and manufacturer performance: An empirical
assessment,” J. Oper. Manag., vol. 28, no. 6, pp. 488–505, 2010.
14. P. Hoffmann, H. Schiele, and K. Krabbendam, “Uncertainty, supply risk management and their impact on performance,” J. Purch.
supply Manag., vol. 19, no. 3, pp. 199–211, 2013.
15. T. Cadden, D. Marshall, and G. Cao, “Opposites attract: organisational culture and supply chain performance,” Supply Chain Manag. an
Int. J., vol. 18, no. 1, pp. 86–103, 2013.
16. G. Hofstede, B. Neuijen, D. D. Ohayv, and G. Sanders, “Measuring organizational cultures: A qualitative and quantitative study across
twenty cases,” Adm. Sci. Q., pp. 286–316, 1990.
17. J. A. A. van der Veen, “Cultuur (verandering) bij Ketensamenwerking: Handvatten voor logistiek & supply chain managers,” Nyenrode
White Pap., 2016.
18. B. M. Beamon, “Measuring supply chain performance,” Int. J. Oper. Prod. Manag., vol. 19, no. 3, pp. 275–292, 1999.
19. J. F. Hair Jr, G. T. M. Hult, C. Ringle, and M. Sarstedt, A primer on partial least squares structural equation modeling (PLS-SEM). Sage
Publications, 2016.
20. M. Farrukh, C. W. Ying, and S. Mansori, “Organizational commitment: an empirical analysis of personality traits,” J. Work. Manag.,
vol. 9, no. 1, pp. 18–34, 2017.
21. M. Farrukh, W. Y. Chong, S. Mansori, and S. Ravan Ramzani, “Intrapreneurial behaviour: the role of organizational commitment,”
World J. Entrep. Manag. Sustain. Dev., vol. 13, no. 3, pp. 243–256, 2017.
22. M. Farrukh, A. A. Khan, M. Shahid Khan, S. Ravan Ramzani, and B. S. A. Soladoye, “Entrepreneurial intentions: the role of family
factors, personality traits and self-efficacy,” World J. Entrep. Manag. Sustain. Dev., vol. 13, no. 4, pp. 303–317, 2017.
23. M. Farrukh, H. Ting, I. A. Shahzad, and Z. Hua, “Can incivility impede knowledge sharing behaviour?,” Int. J. Inf. Syst. Change
Manag., vol. 10, no. 4, pp. 295–310, 2018.
24. I. A. Shahzad, M. Farrukh, N. O. Ahmed, L. Lin, and N. Kanwal, “The role of transformational leadership style, organizational structure
and job characteristics in developing psychological empowerment among banking professionals,” J. Chinese Hum. Resour. Manag., vol.
9, no. 2, pp. 107–122, 2018.
25. M. Farrukh, Y. Alzubi, I. A. Shahzad, A. Waheed, and N. Kanwal, “Entrepreneurial intentions: The role of personality traits in
perspective of theory of planned behaviour,” Asia Pacific J. Innov. Entrep., vol. 12, no. 3, pp. 399–414, 2018.
26. N. Y. Ansari, S. H. Siddiqui, and M. Farrukh, “Effect of High Performance Work Practices on Job Embeddedness and Employee
Innovative Behavior,” Int. J. Contemp. Econ. Adm. Sci., vol. 8, no. 2, pp. 64–88, 2018.
27. T. Anjum, N. Nazar, S. Sharifi, and M. Farrukh, “DETERMINANTS OF ENTREPRENEURIAL INTENTION IN PERSPECTIVE OF
THEORY OF PLANNED BEHAVIOUR,” Manag. Theory Stud. Rural Bus. Infrastruct. Dev., vol. 40, no. 4, pp. 429–441, 2018.
28. M. Farrukh, J. W. C. Lee, and I. A. Shahzad, “Intrapreneurial behavior in higher education institutes of Pakistan: The role of leadership
styles and psychological empowerment,” J. Appl. Res. High. Educ., 2019.
29. M. Farrukh, J. W. C. Lee, M. Sajid, and A. Waheed, “Entrepreneurial intentions: The role of individualism and collectivism in
perspective of theory of planned behaviour,” Educ. Train., 2019.
30. M. Farrukh, J. W. C. Lee, M. Sajid, and A. Waheed, “Entrepreneurial intentions,” Educ. Train., 2019.
31. A. Zreen, M. Farrukh, N. Nazar, and R. Khalid, “The Role of Internship and Business Incubation Programs in Forming Entrepreneurial
Intentions: an Empirical Analysis from Pakistan,” J. Manag. Bus. Adm. Cent. Eur., vol. 27, no. 2, pp. 97–113, 2019.
32. M. Farrukh, M. Sajid, A. Zreen, and R. Khalid, “Knowledge sharing in higher education institutes,” J. Appl. Res. High. Educ., 2019.
33. M. Farrukh, M. Sajid, J. W. C. Lee, and I. A. Shahzad, “The perception of corporate social responsibility and employee engage ment:
Examining the underlying mechanism,” Corp. Soc. Responsib. Environ. Manag.
34. Q. Riaz, M. Farrukh, S. U. Rehman, and A. Ishaque, “Religion and entrepreneurial intentions : an empirical investigation,” Int. J. Adv.
Appl. Sci., vol. 3, no. 9, pp. 31–36, 2016.
35. D. Compeau, C. A. Higgins, and S. Huff, “Social cognitive theory and individual reactions to computing technology: A longitudinal
study,” MIS Q., pp. 145–158, 1999.
36. C. Fornell and D. F. Larcker, “Structural equation models with unobservable variables and measurement error: Algebra and statistics,” J.
Mark. Res., pp. 382–388, 1981.
37. H. Fekete and E. Bocskei, “Cultural waves in company performance,” Res. J. Econ. Bus. ICT, vol. 3, 2011.
38. R. Deshpandé, J. U. Farley, and F. E. Webster Jr, “Corporate culture, customer orientation, and innovativeness in Japanese firms: a
quadrad analysis,” J. Mark., vol. 57, no. 1, pp. 23–37, 1993.
39. J. C. Naranjo-Valencia, D. Jiménez-Jiménez, and R. Sanz-Valle, “Studying the links between organizational culture, innovation, and
performance in Spanish companies,” Rev. Latinoam. Psicol., vol. 48, no. 1, pp. 30–41, 2016.

Authors: Faiyaz Ahmad, Sahil


Music Genre Classification using Spectral Analysis Techniques with Hybrid Convolution-
Paper Title:
Recurrent Neural Network
25. Abstract: In this work, the objective is to classify the audio data into specific genres from GTZAN dataset
which contain about 10 genres. First, it perform the audio splitting to make it signal into clips which contains
homogeneous content. Short-term Fourier Transform (STFT), Mel-spectrogram and Mel-frequency cepstrum 149-154
coefficient (MFCC) are the most common feature extraction technique and each feature extraction technique has
been successful in their own various audio applications. Then, these feature extractions of the audio fed to the
Convolution Neural Network (CNN) model and VGG16 Neural Network model, which consist of 16
convolution layers network. We perform different feature extraction with different CNN and VGG16 model with
or without different Recurrent Neural Network (RNN) and evaluated performance measure. In this model, it has
achieved overall accuracy 95.5\% for this task.

Keywords : GTZAN, Short-term Fourier Transform (STFT), Mel-spectrogram, Mel-frequency cepstrum


coefficient (MFCC), Convolution Neural Network, VGG16, Recurrent Neural Network (RNN)

References:
1. Caifeng Liu, Lin Feng, Guochao Liu, Huibing Wang, Shenglan Liu,” Bottom-up Broadcast Neural Network For Music Genre
Classification”, ScienceDirect,Elsevier,Pattern Recognition, Jan, 2019.
2. Prasenjeet Fulzele, Rajat Singh, Naman Kaushik, Kavita Pandey,” A Hybrid Model For Music Genre Classification”,
Proceedings of 2018 Eleventh International Conference on Contemporary Computing (IC3), Aug, 2018.
3. Nilesh M. Patil, Dr. Milind U. Nemade,” Music Genre Classification Using MFCC, K-NN and SVM Classifier”, International
Journal Of Computer Engineering In Research Trends, Vol. 4, Issue. 2, Feb, 2017.
4. Ahmed Elbir, Hilmi Bilal Cam, Mehmet Emre lyican, Berkay Ozturk, Nizamettin Aydin,” Music Genre Classification and
Recommendation by using Machine Learning Techniques“,Innovations in Intelligent Systems and Applications Conference, Oct,
2018.
5. Pradeep Kumar D, Sowmya B. J., Chetan, and K. G. Srinivasa ,” A Comparative Study of Classifiers for Music Genre
Classification based on Feature Extractors”, IEEE Distributed Computing, VLSI, Electrical Circuits and Robotics, Aug, 2016.
6. Anshuman Goel, Mohd. Sheezan, Sarfaraz Masood, Aadam Saleem,” Genre Classification of Songs Using Neural Network”,
International Conference on Computer and Communication Technology (ICCCT), Sept, 2014.
7. Jan Jakubik,” Evaluation of Gated Recurrent Networks in Music Classification Tasks”, Information System Arxhitecture and
Technology: Proceedings of 38th International Conference on Information Systems Architecture and Technology, 2017.
8. George Tzanetakis,” Musical Genre Classification of Audio Signals”, IEEE Transactions on Speech and Audio Processing, July,
2002.
9. Lin Feng, Shenlan Liu, Jianing Yao,” Music Genre Classification with Paralleling Recurrent Convolutional Neural Network”,
arXiv, Dec, 2017.
10. Jont B. Allen and Lawrence R. Rabiner,” A Unified Approach to Short Time Fourier Analysis and Synthesis”, Proceeding of the
IEEE, VOL 65, No.11, Nov, 1977.
11. Rikiya Yamashita, Mizuho Nishio, Richard Kinh Gian Do, Kaori Togashi,” Convolution Neural Network: an overview and
application in radiology”, Springer, Volume 9, Issue 4, Aug, 2018.
12. Keren Simonyan and Andrew Zisserman,” Very Deep Convolution Networks For Large Scale Image Recognition”, ICLR 2015.
13. Alex Graves and Navdeep Jaitly,” Towards End-to-End Speech Recognition with Recurrent Neural Networks”, Proceedings of
the 31st International Conference on Machine Learning, vol 32, 2014.
14. Yoshua Bengio, Patrica Simard and Paolo Fransconi,” Learning Dependencies with Gradient Descent is Difficult”, IEEE
Transactions On Neural Networks, Vol 5, No 2, Mar, 1994.
15. Sepp Hochreiter, Jurgen Schmidhuber,” Long Short-term Memory”, Neural Computation, 1997.
16. Yoshua Bengio, Cho et. al,” Learning Phase Representation using RNN Encoder-Decoder for Statistical Machine Transalation”,
arXiv, Sept, 2014.
17. Mike Schuster and Kuldip K. Paliwal,” Bidirectional Recurrent Neural Networks”, IEEE Transactions on Signal Processing, vol
45, no. 11, 1997.
18. Bob L. Strum,” The GTZAN dataset: Its contents, its faults, their effects on evaluation, and its future use”, arXiv, Jun, 2013
19. Understanding LSTM network, Available at: https://colah.github.io/posts/2015-08-Understanding-LSTMs/
20. Mel Frequency Ceptral Coefficient (MFCC) tutorial, Available at: http://practicalcryptography.com/miscellaneous/machine-
learning/guide-mel-frequency-cepstral-coefficients-mfccs/

Authors: Anil Kumar, Deepam Goyal, B.S. Pabla


Paper Title: Thermal Image Based Fault Diagnosis of Gears using Support Vector Machines
Abstract: Condition monitoring and fault diagnosis of working machines have gained significant attention due
to their prospective benefits, such as enhanced productivity, decreased repair and maintenance costs and
enhanced machine operation. In this paper, a thermal image based non-contact methodology has been proposed
to diagnose the gear faults using support vector machines (SVM). The thermal images acquired from gearbox
simulator were preprocessed using 2D-discrete wavelet transform to decompose the thermal images. The
relevant features were extracted from converted thermal gray-scaled images followed by selecting the strongest
feature using Mahalanobis distance criteria. Finally, the selected features were given to a SVM classifier for
classifying the different gear faults. The experimental findings indicate that fault diagnosis using thermography
for rotary machinery can be put into practice to industrial fields as a new smart fault diagnostic method with
excellent prediction performance.
26. Keywords: Rotating machines, Thermal imaging, Support vector machines, Fault diagnosis.
155-160
References:
1. Goyal, D. and Pabla, B.S., 2016. The vibration monitoring methods and signal processing techniques for structural health monitoring: a
review. Archives of Computational Methods in Engineering, 23(4), pp.585-594.
2. Randall, R.B. and Antoni, J., 2011. Rolling element bearing diagnostics-A tutorial. Mechanical systems and signal processing, 25(2),
pp.485-520.
3. Waqar, T. and Demetgul, M., 2016. Thermal analysis MLP neural network based fault diagnosis on worm gears. Measurement, 86,
pp.56-66.
4. Goyal, D., Pabla, B.S. and Dhami, S.S., 2017. Condition monitoring parameters for fault diagnosis of fixed axis gearbox: a re view.
Archives of Computational Methods in Engineering, 24(3), pp.543-556.
5. Lei, Y., Lin, J., He, Z. and Zuo, M.J., 2013. A review on empirical mode decomposition in fault diagnosis of rotating machine ry.
Mechanical systems and signal processing, 35(1-2), pp.108-126.
6. Wang, J., Gao, R.X. and Yan, R., 2014. Multi-scale enveloping order spectrogram for rotating machine health diagnosis. Mechanical
Systems and Signal Processing, 46(1), pp.28-44.
7. Osman, S. and Wang, W., 2013. An enhanced Hilbert–Huang transform technique for bearing condition monitoring. Measurement
Science and Technology, 24(8), p.085004.
8. Goyal, D., Pabla, B.S. and Dhami, S.S., 2019. Non-contact sensor placement strategy for condition monitoring of rotating machine-
elements. Engineering Science and Technology, an International Journal, 22(2), pp.489-501.
9. Prabhakaran, A. and Jagga, C.R., 1999. Condition monitoring of steam turbine-generator through contamination analysis of used
lubricating oil. Tribology International, 32(3), pp.145-152.
10. Bagavathiappan, S., Lahiri, B.B., Saravanan, T., Philip, J. and Jayakumar, T., 2013. Infrared thermography for condition monitoring–A
review. Infrared Physics & Technology, 60, pp.35-55.
11. Maldague, X., 2001.Theory and Practice of Infrared Technology for Non-Destructive Testing, John Wiley-Interscience, pp. 684.
12. Ring, E.F.J. and Ammer, K., 2012. Infrared thermal imaging in medicine. Physiological measurement, 33(3), p.R33.
13. Janssens, O., Schulz, R., Slavkovikj, V., Stockman, K., Loccufier, M., Van de Walle, R. and Van Hoecke, S., 2015. Thermal ima ge
based fault diagnosis for rotating machinery. Infrared Physics & Technology, 73, pp.78-87.
14. Jardine, A.K., Lin, D. and Banjevic, D., 2006. A review on machinery diagnostics and prognostics implementing condition -based
maintenance. Mechanical systems and signal processing, 20(7), pp.1483-1510.
15. Lim, G.M., Bae, D.M. and Kim, J.H., 2014. Fault diagnosis of rotating machine by thermography method on support vector machin e.
Journal of Mechanical Science and Technology, 28(8), pp.2947-2952.
16. Younus, A.M. and Yang, B.S., 2012. Intelligent fault diagnosis of rotating machinery using infrared thermal image. Expert Systems with
Applications, 39(2), pp.2082-2091.
17. Garcia-Ramirez, A.G., Morales-Hernandez, L.A., Osornio-Rios, R.A., Benitez-Rangel, J.P., Garcia-Perez, A. and de Jesus Romero-
Troncoso, R., 2014. Fault detection in induction motors and the impact on the kinematic chain through thermographic analysis. Electric
Power Systems Research, 114, pp.1-9.
18. Nunez, J.A.R., Velazquez, L.M., Hernandez, L.A.M., Troncoso, R.J.R. and Osornio-Rios, R.A., 2016. Low-cost thermographic analysis
for bearing fault detection on induction motors, 75, pp. 412-415.
19. Glowacz, A. and Glowacz, Z., 2017. Diagnosis of the three-phase induction motor using thermal imaging. Infrared physics &
technology, 81, pp.7-16.
20. Klein, R., Masad, E., Rudyk, E. and Winkler, I., 2014. Bearing diagnostics using image processing methods. Mechanical systems and
signal processing, 45(1), pp.105-113.
21. Widodo, A. and Yang, B.S., 2007. Support vector machine in machine condition monitoring and fault diagnosis. Mechanical systems
and signal processing, 21(6), pp.2560-2574.

Authors: Archana Bhaskar, Rajeev Ranjan

Paper Title: Enhhanced and Efficient Memory Model For Hadoop Mapreduce
Abstract: Usage of high-performance computing (HPC) infrastructure adopting cloud-computing environment
offers an efficient solution for executing data intensive application. MapReduce (MR) is the favored high
performance parallel computing framework used in BigData study, scientific, and data intensive applications.
Hadoop is one of the significantly used MR based parallel computing framework by various organization as it is
freely available open source framework from Apache foundation. The existing Hadoop MapReduce (HMR)
based makespan model incurs memory and I/O overhead. Thus, affecting makespan performance. For
overcoming research issues and challenges, this manuscript presented an efficient parallel HMR (PHMR)
makespan model. The PHMR includes a parallel execution scheme in virtual computing worker to reduce
makespan times using cloud computing framework. The PHMR model provides efficient memory management
design within the virtual computing workers to minimize memory allocation and transmission overheads. For
evaluating performance of PHMR of over existing model experiment are conducted on public cloud environment
using Azure HDInsight cloud platform. Different application such as bioinformatics, tex mining, stream, and
non-stream application is considered. The overall result obtained shows superior performance is attained by
PHMR over existing model in term of makespan time reduction and correlation among practical and theoretical
makespan values.
Keywords— Big data, Data intensive application, Caching, Cloud computing, high-performance computing,
HMR, Scientific application.

References:
27. 1. K. Taura, T. Endo, K. Kaneda, and A. Yonezawa, “Phoenix: a parallel programming model for accommodating dynamically
joining/leaving resources,” in SIGPLAN Not., vol. 38, no. 10, pp. 216–229, 2003. 161-168
2. B. He, W. Fang, Q. Luo, N. K. Govindaraju, and T. Wang, “Mars: a MapReduce framework on graphics processors,” in Proceedings of
the 17th international conference on Parallel architectures and compilation techniques - PACT ’08, p. 260, 2008.
3. M. Isard, M. Budiu, Y. Yu, A. Birrell, and D. Fetterly, “Dryad: distributed data-parallel programs from sequential building blocks,”
ACM SIGOPS Oper. Syst. Rev., vol. 41, no. 3, pp. 59–72, Mar. 2007.
4. M. Zaharia, M. Chowdhury, M. J. Franklin, S. Shenker, and I. Stoica,“Spark: Cluster Computing with Working Sets,” in Proceedings of
the 2nd USENIX Conference on Hot topics in Cloud Computing, (Boston,MA), June 2010.
5. J. Dean and S. Ghemawat, “MapReduce: Simplified Data Processing on Large Clusters,” ACM Commun., vol. 51, no. 1, pp. 107–113,
Jan. 2008.
6. “Apache Hadoop.” [Online]. Available: http://hadoop.apache.org/. [Accessed: 21-july-2018].
7. U. Kang, C. E. Tsourakakis, and C. Faloutsos, “PEGASUS: Mining Peta-scale Graphs,” Knowl. Inf. Syst., vol. 27, no. 2, pp. 303–325,
May 2011.
8. X. Shi et al., "Mammoth: Gearing Hadoop Towards Memory-Intensive MapReduce Applications," in IEEE Transactions on Parallel and
Distributed Systems, vol. 26, no. 8, pp. 2300-2315, Aug. 1 2015.
9. J. Zhu, J. Li, E. Hardesty, H. Jiang and K. C. Li, "GPU-in-Hadoop: Enabling MapReduce across distributed heterogeneous platforms,"
Computer and Information Science (ICIS), 2014 IEEE/ACIS 13th International Conference on, Taiyuan, pp. 321-326, 2014.
10. M. Zaharia, A. Konwinski, A.D. Joseph, R.H. Katz and I. Stoica, &ldquo,Improving Mapreduce Performance in Heterogeneous
Environments,&rdquo, Proc. Eighth USENIX Conf. Operating Systems Design and Implementation (OSDI), pp. 29-42, 2008.
11. D. Dahiphale et al., "An Advanced MapReduce: Cloud MapReduce, Enhancements and Applications," in IEEE Transactions on
Network and Service Management, vol. 11, no. 1, pp. 101-115, March 2014.
12. E. Deelman, G. Singh, M. Livny, B. Berriman and J. Good, "The cost of doing science on the cloud: The Montage example," 2008 SC -
International Conference for High Performance Computing, Networking, Storage and Analysis, Austin, TX, pp. 1-12, 2008.
13. N. Chohan, C. Castillo, M. Spreitzer, M. Steinder, A. Tantawi, and C. Krintz, “See spot run: using spot instances for mapreduce
workflows,” in Proc. 2010 USENIX Conference on Hot Topics in Cloud Computing, ser. HotCloud’10. USENIX Association, pp. 7 –7,
2010.
14. X. Lin, Z. Meng, C. Xu, and M. Wang, “A Practical Performance Model for Hadoop MapReduce,” in Cluster Computing Workshops
(CLUSTER WORKSHOPS), 2012 IEEE International Conference on, pp. 231–239, 2012.
15. X. Cui, X. Lin, C. Hu, R. Zhang, and C. Wang, “Modeling the Performance of MapReduce under Resource Contentions and Task
Failures,” in Cloud Computing Technology and Science (CloudCom), 2013 IEEE 5th International Conference on, vol. 1, pp. 158–163,
2013.
16. W. Xiao, W. Bao, X. Zhu and L. Liu, "Cost-Aware Big Data Processing Across Geo-Distributed Datacenters," in IEEE Transactions on
Parallel and Distributed Systems, vol. 28, no. 11, pp. 3114-3127, 2017.
17. M. Khan, Y. Liu and M. Li, "Data locality in Hadoop cluster systems," 2014 11th International Conference on Fuzzy Systems and
Knowledge Discovery (FSKD), Xiamen, pp. 720-724, 2014.
18. M. Xu, S. Alamro, T. Lan and S. Subramaniam, "CRED: Cloud Right-Sizing with Execution Deadlines and Data Locality," in IEEE
Transactions on Parallel and Distributed Systems, vol. 28, no. 12, pp. 3389-3400, 2017.
19. H. Alshammari, J. Lee and H. Bajwa, "H2Hadoop: Improving Hadoop Performance using the Metadata of Related Jo bs," in IEEE
Transactions on Cloud Computing, vol. PP, no. 99, pp. 1-1, 2016.
20. Daria Glushkova, Petar Jovanovic, Alberto Abelló, “MapReduce Performance Models for Hadoop 2.x”, in Workshop Proceedings of the
EDBT/ICDT 2017 Joint Conference, ISSN 1613-0073, 2017.
21. M. Ehsan, K. Chandrasekaran, Y. Chen and R. Sion, "Cost-Efficient Tasks and Data Co-Scheduling with AffordHadoop," in IEEE
Transactions on Cloud Computing, vol. PP, no. 99, pp. 1-1, 2017.
22. M. Khan, Y. Jin, M. Li, Y. Xiang and C. Jiang, "Hadoop Performance Modeling for Job Estimation and Resource Provisioning," in
IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 2, pp. 441-454, 2016.
23. Khan, M., Huang, Z., Li, M., Taylor, GA., – Optimizing Hadoop parameter settings with gene expression programming guided PSO.
Concurrency Computation: Practice and Experience, DOI: 10.1002/cpe.3786, 2016.
24. Apache, Centralized Cache Management in HDFS. Update date 2014.
25. Y. Huang, Y. Yesha, M. Halem, Y. Yesha and S. Zhou, "YinMem: A distributed parallel indexed in-memory computation system for
large scale data analytics," 2016 IEEE International Conference on Big Data (Big Data), Washington, DC, pp. 214-222, 2016.
26. Zhang, J., et al., A Distributed Cache for Hadoop Distributed File System in Real-Time Cloud Services, in Proceedings of the 2012
ACM/IEEE 13th International Conference on Grid Computing. 2012, IEEE Computer Society. p. 12-21.
27. Longbin, L., et al. ShmStreaming: A Shared Memory Approach for Improving Hadoop Streaming Performance. in Advanced
Information Networking and Applications (AINA), 2013 IEEE 27th International Conference on. 2013.
28. J. Kim, H. Roh and S. Park, "Selective I/O Bypass and Load Balancing Method for Write-Through SSD Caching in Big Data
Analytics," in IEEE Transactions on Computers, vol. 67, no. 4, pp. 589-595, April 1 2018.
29. L. G. Valiant. A bridging model for parallel computation. Communications of the ACM, 33(8):103–111, August 1990
30. G. Malewicz, M. Austern, A. Bik, J. Dehnert, J. Horn, I. Leiser, N. Czajkowski, “Pregel: a system for largescale graph processing,”. In
Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data, pages 135–146, Indianapolis, Indiana, USA,
2010.
31. T. White, Hadoop: The Definitive Guide. O’Reilly Media, 2009.
32. Saccharomyces genome database (SGD). (2015). [Online] Available: http://www.yeastgenome.org/
33. Influenza Virus Resource. (2015). [Online] Available: http://www.ncbi.nlm.nih.gov/genomes/FLU/FLU.html.
34. Amazon product dataset “http://jmcauley.ucsd.edu/data/amazon/”, last accessed sep 2, 2018.
35. Changjian Wang; Yuxing Peng; Mingxing Tang; Dongsheng Li; Shanshan Li; Pengfei You, "MapCheckReduce: An Improved
MapReduce Computing Model for Imprecise Applications," Big Data (BigData Congress), 2014 IEEE International Congress on , vol.,
no., pp.366,373, June 27 2014-July 2 2014.
36. S. Dooms, T. De Pessemier, and L. Martens, “Movietweetings: a movie rating dataset collected from twitter,” in Workshop on
Crowdsourcing and Human Computation for Recommender Systems, CrowdRec at RecSys, vol. 13, 2013.

Authors: Rishabh Jain, Satyam Gupta, Shahzeb Rizvi, Nitin Arora


Paper Title: Image to Text conversion in Foreign Language using Document Image Processing Technique
Abstract: Every country has their own native languages such France has French, Japan has Japanese, India has
Hindi and other local languages like Gujrati, Marathi, Telugu, Tamil, Bengali, etc. When a person who does not
know the English Language travel to a country whose local language is English will face many problems like
understanding road sign texts, shop’s name, Instructions Boards etc. So, in this paper we are proposing a model
with the help of which user can take snap of the scene containing text of which he/she want to translate it, upload
that photo, choose the language and the software will provide us the output in text of User’s native language.
This model will use Convolutional Neural Network (CNN) to identify the characters, Efficient and Accurate
Scene Text Detector (EAST) for detecting the text in the image, Digital Image Processing methods are used to
segment the text in the detected text, googletrans for translating the text to other language and Tkinter for
creating Graphical user Interface (GUI) for software.
28.
Keywords : GUI, CNN, EAST Detector, Googletrans.
169-173
References:
1. Zhou, X., Yao, C., Wen, H., Wang, Y., Zhou, S., He, W., & Liang, J. (2017). EAST: An Efficient and Accurate Scene Text
Detector. 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1–1, 2017.
2. Albawi, S., Mohammed, T. A., & Al-Zawi, S. (2017). Understanding of a convolutional neural network. 2017 International
Conference on Engineering and Technology (ICET). Doi:10.1109/icengtechnol.2017.8308186
3. Shin, H.-C., Roth, H. R., Gao, M., Lu, L., Xu, Z., Nogues, I., Summers, R. M. (2016). Deep Convolutional Neural Networks for
Computer-Aided Detection: CNN Architectures, Dataset Characteristics and Transfer Learning. IEEE Transactions on Medical
Imaging, 35(5), 1298.doi:10.1109/tmi.2016.2528162
4. Lin, Tsung-Yu, et al. "Bilinear cnn models for fine-grained visual recognition." Proceedings of the IEEE international conference
on computer vision. 2015.
5. Sun, Baohua, et al. "SuperTML: Two-Dimensional Word Embedding and Transfer Learning Using ImageNet Pretrained CNN
Models for the Classifications on Tabular Data." arXiv preprint arXiv:1903.06246 (2019).
6. Dürichen, Robert, et al. "Binary Input Layer: Training of CNN models with binary input data." arXiv preprint
arXiv:1812.03410 (2018).
7. Yann LeCun et al.,1998, "Gradient-Based Learning Applied to Document Recognition."
8. Jianxin Wu, 2017, "Introction to Convolutional Neural Networks."
9. Rob DiPiertro, 2016, s "A Friendly Inroduction to Cross-Entropy Loss."
10. C.-C. Jay Kuo, 2016, "Understanding Convolutional Neural Networks with A Mathematical Model."
11. Michael K. Buckland, 1992, "Emanuel Goldberg, Electronic Document Retrieval, And Vannervar Bush’s Memex." Translated by
Banca Fiagicm January 2019.
12. Kakde A. , Arora N., Sharma D, 2019, “A COMPARATIVE STUDY OF DIFFERENT TYPES OF CNN AND HIGHWAY
CNN TECHNIQUES” Global Journal of Engineering Science and Research Management 6(4):18-31
DOI: 10.5281/zenodo.2639265

Authors: Rajiv Banerjee, J.B. Srivastava

Paper Title: Determination of Optimum Position of Shear Wall in an Irregular Building for Zone III & IV
Abstract: Stiffness is the property of the structure that is responsible for absorbing the external forces. For the
case a multistory building, when the height of the building increases, the lateral stiffness of the building
decreases. With low lateral stiffness, the building becomes more vulnerable to lateral forces like wind and
earthquake. In order to prevent the structure from damage from the lateral forces, lateral stiffness is induced in
the structure by means of shear walls. With the introduction of shear wall, we observe a considerable decrement
in lateral displacement and increase in base shear. The resistance of lateral forces in terms of magnitude by shear
wall depends on its location in the building. In this paper, a G+15 storey building is considered. The building is
irregular in nature (T shaped). A comparative study is done to obtain the optimum position of shear wall in the
structure. For optimization, the total length of the shear wall in the structure is kept constant. The whole
modeling and analysis is done by ETABS v. 2016. The comparative study is done on the basis of base shear,
storey displacement & storey drift. The above values are calculated by the dynamic approach of analysis of
building subjected to seismic loading.
Keywords: Shear Wall, Response Spectrum Analysis, Time History Analysis, Irregular Buildings

References:
1. C.V.R.Murthy, Rupen Goswami, A.R. Vijaynarayanan, Vipul V. Mehta, Some Concepts in Earthquake Behaviour of Buildings, Gujarat
State Disaster management Authority.
2. ETABS reference guide by CADD CENTRE.
3. IS 1893(Part 1): 2016.
4. IS 456:2000
5. IS 875 (Part 1 & Part 2): 1967
6. Romy Mohan & C. Prabha, “Dynamic Analysis of RCC Buildings with Shear Wall”, International Journal of Earth Sciences and
Engineering, ISSN 0974-5904, Volume 04, No 06 SPL, October 2011.
7. Bulent Erkmen & Arturo E. Schultz, “Self-Centering Behavior of Unbonded, Post-Tensioned Precast Concrete Shear Walls” , Journal
of Earthquake Engineering,13:1047–1064, 2009,ISSN: 1363-2469 print / 1559-808X online, DOI: 10.1080/13632460902859136.
8. Mario De Stefano & Barbara Pintucchi, “A review of research on seismic behavior of irregular building structures since 2002”, Bull
29. Earthquake Eng (2008) 6:285–308 ,DOI 10.1007/s10518-007-9052-3
9. Varsha R. Harne, “Comparative Study of Strength of RC Shear Wall at Different Location on Multi-storied Residential Building”,
International Journal of Civil Engineering Research. ISSN 2278-3652 Volume 5, Number 4 (2014), pp. 391-400. 174-183
10. J. C. D. Hoenderkamp, “Second Outrigger at Optimum Location on High-Rise Shear Wall, The Structural Design Of Tall And Special
Buildings”, Struct. Design Tall Spec. Build. 17, 619–634 (2008), published online 27 July 2007 in Wiley Inter-science
(www.interscience.wiley.com). DOI: 10.1002/tal.369.
11. Ashish S. Agrawal, S.D. Charkha, “Effect of Change in Shear Wall Location on Storey Drift of Multistorey Building Subjected to
Lateral Loads” , International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622, Vol. 2, Issue 3, May-Jun
2012, pp.1786-1793.
12. Ravikanth Chittiprolu, Ramcharla Pradeep Kumar, “Significance of shear wall in high rise irregular buildings”, Earthquake Engineering
Research Centre.
13. J.V. Sunil Ganesh, Mallikarjun S. Bhandiwad, “Seismic Analysis of Irregular Multistoried Structure with Shear Wall”, The International
Journal of Science & Technology, Vol. 2, 2014, ISSN: 2321 – 919X.
14. R.S. Malik. S.K. Madan, V.K. Sehgal, “Effect of height on Seismic Response Of Reinforced Cement Concrete Framed Buildings With
Curtailed Shear Wall”, Journal of Engineering & Technology, Vol. 1, 2011, DOI : 10.4103/0976-8580.74549
15. M.S. Ainawala, Dr. P.S. Pajgade, “Design of Multistoried RCC Building with and Without Shear Wall”, International Journal of
Engineering Sciences & Research Technology, ISSN: 2277-9655.
16. Wakchaure M.R, Ped S.P, “Earthquake Anlysis Of High Rise Buildings With And Without In Filled Walls”, International Journal of
Engineering and Innovative Technology, Vol. 2, 2012 ISSN ; 2277-3754.
17. Mohamed A. Dahesh, Ahmet Tuken, Nadeem A. Siddique, “Controlling The Earthquake Induced Lateral displacement Of Tc Buildings
Using Shear Walls: Parametric Study”, Springer, DOI: 10.1007/s12517-015-1903-7.
18. P.P Chandukar, Dr. P.S. Pajgade, “Sesmic Analysis of RCC Buildings with and without shear wall”, International Journal Of Modern
Engineering Research, Vol. 3,2013 .ISSN : 2249-6645
19. Ehasn Salimi Firzabad, Dr. K. Rama Rao, Bahador Bagheri, “Effect of shear wall configuration on Seismic Performance of Buildings”,
ACEE, DOI: 02.AETACE.2012.3.7
20. Suchta Tuppad, R.J. Fernandes, “Optimum Location of Shear Wall in a multi-story building subjected to seismic behavior using genetic
algorithm”, International Research Journal of Engineering and Technology, Vol. 2, 2015, ISSN 2395-0056.
21. Abhija Moha, Arathi S, “Comparison of RC Shear Wall with openings in Regular and Irregular Building”, International Journal of
Engineering Research & Technology, Vol. 6, June 2017, ISSN : 2278-0181.
22. S.K Hirde and N.K. Shelar, “Effect of position of RC Shear Wall on Seismic Performance of Buildings on Plain and Sloping Grounds”,
International Journal of Current Engineering and Technology, Vol. 5, 2015 ISSN : 2277-4106.
23. Poornima D, Sajay S J, Yajnobhavi HM, “Seismic Analysis of RC Residential Multistorey Buildings for different locations of sh ear
wall”, International Journal of Science Technology & Engineering, Vol. 3, 2017. ISSN : 2349-784X
24. Lakshmi K.O., Prof. Jayshree ramanujan, Mrs. Bindu Sunil, Dr. Taju Koltali, Prof. Mercy Joseph, Poweth, “Effect of Shear Wall
location in buildings subjected to seismic loads”, ISOI Journal of Engineering and Computer Science, Vol.1, 2017
Farida Smolnikova, Zhayik Tokhtarov, Nadezhda Kenijz, Elena Nelyubina, Igor Grigoryants,
Authors:
Elena Bobkova, Olga Orlovtseva, Alla Konobeeva, Natalia Nikolaeva
30. Technological Process of Germination of Wheat Grain under the Water Tincture of Aloe and ITS
Paper Title:
Physical-Chemical Properties
Abstract: Germination of wheat grain promotes the transition of hardly digestible nutrients into an easily
accessible form with increasing the amount of vitamins and minerals. This paper presents the technological
process of wheat grain germination under the water tincture of aloe. The germinating power and ability of wheat
grain grown in 25% solution of water tincture of aloe are 95% and 95%, respectively. The analysis of the data
shows that the amount of all nutrients decreases, since the destruction of the protein-carbohydrate complex. The
activity of enzymes increases, and the cellular destruction of the endosperm occurs. Carbohydrates reduction is
associated with intensive grain respiration. Germination is also associated with a decrease in fat from 2.45% to
1.25%.
Index Terms: rumen, treatment, alkaline, sodium hydroxide, protein loss, water-binding capacity

References:
1. Tretyak, L., Rebezov, M., Toshev, A., Zalilov, R., Prokhasko, L., Abuova, A., Loretts, O., Okuskhanova, E., Zaitseva, T., 201 7. The use
of ozone-air mixture for reduction of microbial contamination in grain brewing raw material. Annual Research and Review in Biology,
14 (6), pp. 1-9.
2. Osintseva, D., Osintsev, E., Rebezov, M., Prokhasko, L., Seilgazina, S., Kurmanbayev, S., Nurzhumanova, Z., Yessimbekov, Z.,
Voytsekhovskiy, V., Maksimiuk, N., Zalilov, R., 2017. Ozonation and microwave treatments as new pest management methods for 184-187
grain crop cleaning and disinfection. Annual Research and Review in Biology. 20 (5).
3. Morita, N., Miyake, K., Maeda, T., Van Hung, P., 2013. Germinated buckwheat for functional foods, Advances in cereal and
pseudocereal research for functional foods, pp. 75-90.
4. Safronova, T.N., Kazina, V.V., Safronova, K.V., 2017. Development of technological parameters of wheat germination. Technique and
technology of food production, (44:1), pp. 37-43.
5. Kulushtayeva, B., Nurymkhan, G., Smolnikova, F., Okuskhanova, E., Kozubayeva, L., Abilova, M., Khayrullin, M., Kisimov, B., 2019.
Technology of production, nutritional value and food safety of gluten free bread. International Journal of Recent Technology and
Engineering, 7 (6), pp. 1338-1344.
6. Khoneva, M.S., Rudenko, O.V., Usatikov, S.V., Bugayets, N.A., Tamova, M.Y.U., Fedorova, M.A., Mogilny, M.P., 2018. Optimizing
technological process of hydroponic germination of wheat grain by graphic method. Journal of Pharmaceutical Sciences and Research,
10 (2), pp. 381-390.
7. Bastrikov, D., Pankratov, G., 2006. Change in the biochemical properties of grain during watering. Bakery products, (1), pp. 40-41.
8. Rumyantsev, A. V., Glukhovtsev, V. V., Kukushkina, L. A., 2015. Scientific advances in the selection of varieties of spring soft wheat.
Legumes and cereals, (2 (14), pp. 58-63.
9. National Standard GOST 9404-88. Flour and bran. Method of moisture content determination. 1990.
10. Zhurba, O.V., Dmitriev M.Ya., 2005. Medicinal, poisonous and harmful plants. Moscow: KolosS.
11. Olennikov, D.N., Zilfikarov, I.N., Ibragimov, T.A., 2010. A study of the chemical composition of aloe tree. Chemistry of plant
materials, 3, pp. 77–82.
Authors: Savitha C, D. Ramesh
Paper Title: Distribution Based Crowd Abnormality Detection
Abstract: The complications of abnormal behavior and behavior identification are very eminent problems in
the video processing. Abnormal behavior detector can be designed by choosing the region of interest through
feature detector and by tracking them over the short time period. Therefore, the detector shows the trade-off
among the object tracking and optical flow. Since, various regions normally display the various types of motion
pattern, we introduce Distribution Based Crowd Abnormality Detection (DCAD) which catches the statistics of
object trajectories which are passing via the Spatio-temporal cube. This technique directly provides the
distribution to define the frame. Also clustering is not required to build the dictionary. Besides, we exploited the
motion trajectories to calculate the “power potentials” in the pixel space which defines the amount of
interaction among the people. Furthermore, utilize the standard method for classification by considering SVMs
(Support Vector Machines) discriminative learning method to recognize the abnormalities.

Keywords: Detection, Tracking, Template Detector, Distribution Based Crowd Abnormality Detection
(DCAD), UMN Dataset.

References:
31. 1. Saurabh Maheshwari, Surbhi Heda, “A Review on Crowd Behavior Analysis Methods for Video Surveillance”, ACM, pp.1 -5, March
2016
2. Sjarif, Nilam & Shamsuddin, Siti Mariyam & Mohd Hashim, Siti. (2012). “Detection of abnormal behaviors in crowd scene: A review”. 188-195
International Journal of Advances in Soft Computing and its Applications. 4.
3. Min Sun, Dongping Zhang, Leyi Qian, Ye Shen, “Crowd Abnormal Behavior Detection on Label Distribution Learning”, 8th
International Conference on Intelligent Computation Technology and Automation (ICICTA), Nanchang, pp. 345-348. IEEE-2015
4. Zhao T, Nevatia R "Bayesian human segmentation in crowded situations", vol 2. Computer Vision Pattern Recognition 2003 IEEE
Computer Society Conference, pp 459–466
5. Rabaud V, Belongie S (2006) "Counting crowded moving objects", 2006 IEEE Computer Society Conference on Computer Vision
Pattern Recognition (CVPR’06), pp 705–711
6. Krausz B, Bauckhage C "Analyzing pedestrian behavior in crowds for automatic detection of congestions", 2011 IEEE Internatio nal
Conference on Computer Vision Workshops (ICCV workshops), Barcelona, 2011, pp 144–149
7. H. Fradi, B. Luvison and Q. C. Pham, "Crowd Behavior Analysis Using Local Mid-Level Visual Descriptors," in IEEE Transactions on
Circuits and Systems for Video Technology, vol. 27, no. 3, pp. 589-602, March 2017
8. Rittscher J, Tu PH, Krahnstoever N (2005) "Simultaneous estimation of segmentation and shape", 2005 IEEE Computer Society
Conference on Computer Vision Pattern Recognition (CVPR’05), pp 486–493
9. Y. Hao, J. Wang, Y. Liu, Z. Xu and J. Fan, "Extracting Spatio-Temporal Texture signatures for crowd abnormality detection," 2017
23rd International Conference on Automation and Computing (ICAC), Huddersfield, IEEE 2017, pp. 1-5
10. Solmaz B, Moore BE, Shah M (2012) "Identifying behaviors in crowd scenes using stability analysis for dynamical systems". IEEE
Transactions On Pattern Analysis And Machine Intelligence 34:2064–2070
11. Hu M, Ali S, Shah M (2008) "Detecting global motion patterns in complex videos". 2008 19th International Conference on Pattern
Recognition, IEEE Tampa, FL, 2008, pp.1-5.
12. Kratz L, Nishino K (2009) "Anomaly detection in extremely crowded scenes using spatio-temporal motion pattern models". Computer
Vision Pattern Recognition CVPR 2009 IEEE Conference, pp 1446–1453
13. Kratz L, Nishino K (2010) "Tracking with local spatio-temporal motion patterns in extremely crowded scenes". Computer Vision
Pattern Recognition (CVPR) 2010 IEEE Conference, pp 693–700
14. L. Lazaridis, A. Dimou and P. Daras, "Abnormal Behavior Detection in Crowded Scenes Using Density Heatmaps and Optical Flow,"
2018 26th European Signal Processing Conference (EUSIPCO), Rome, 2018, pp. 2060-2064.
15. Shaoci Xie, B. Xiaohong Zhang, Jing Cai, " Video crowd detection and abnormal behavior model detection based on machine learning
method," in Springer, Neural computing and applications January 2019, Volume 31, Supplement 1, pp 175–184
16. Mengshi Qi, Yunhong Wang, “Stag-Net: "An Attentive Semantic RNN for Group Activity and Individual Action Recognition” IEEE
Transactions On Circuits And Systems For Video Technology 2019. DOI 10.1109/TCSVT.2019. 2894161
17. Aggarwal, J.K., Ryoo, M.S.: “Human Activity Analysis: a Review”. ACM 43, 3 (2011).
18. Mehran,R, Oyama.A, Shah,M.: "Abnormal Crowd Behavior Detection Using Social Force Model. In: Computer Vision and Pattern
Recognition”, IEEE Conference on CVPR 2009, pp.935–942.
19. Kim,S.,Guy,S.J.,Manocha,D.”Velocity-based modeling of physical interactions in multi-agent simulations”. In: Proceedings of the 12th
ACM SIGGRAPH/Eurographics Symposium on Computer Animation, pp. 125–133 (2013)
20. Yang,W.,Wang,Y., Lan,T., Robinovitch,S.N., Mori,G.: "Discriminative Latent Models For Recognizing Contextual Group Activities".
IEEE Trans. Pattern Anal. Mach. Intell. 34(8), 1549–1562 (2012)
21. Chen, D.Y., Huang, P.C.: "Motion-based unusual event detection in human crowds".Elsevier, Journal of. Visual. Communication and.
Image Representation. 22(2), 178–186 (2011).
22. Shao,J.,Chen,C.L.,Wang,X.: "Learning scene-independent group descriptors for crowd understanding". IEEE Trans. Circuits Syst.
Video Technol. 27(6), 1290–1303 (2017).
23. Mahadevan V, Li W, Bhalodia V, Vasconcelos N (2010) "Anomaly detection in crowded scenes". CVPR, p 250.
24. Hu X, Hu S, Huang Y, Zhang H, Wu H (2016) "Video anomaly detection using deep incremental slow feature analysis network". IET
Comput Vis 10:265.
25. Mousavi H, Nabi M, Kiani H, Perina A, Murino V (2015) “Crowd motion monitoring using tracklet-based commotion measure”. In:
Image Processing (ICIP), 2015 IEEE International Conference, pp 2354–2358.
26. Ravanbakhsh M, Nabi M, Mousavi H, Sangineto E, Sebe N ”Plug-and-play CNN for crowd motion analysis: an application in abnormal
event detection”. arXiv:1610.00307v3 27 Jan 2018.
27. Zhou S, Shen W, Zeng D, Fang M, Wei Y, Zhang Z (2016) “Spatial–temporal convolutional neural networks for anomaly detection and
localization in crowded scenes”. Signal Process: Image Communication Volume 47, September 2016, Pages 358-368
28. Rabiee H, Haddadnia J, Mousavi H, Nabi M, Murino V, Sebe N (2016) “Emotion-based crowd representation for abnormality
detection”. preprint: arXiv:1607.07646.
29. Rabiee H, Haddadnia J, Mousavi H (2016) "Crowd behavior representation: an attribute-based approach”, Springer Plus 5:1179.
30. Chen K, Gong S, Xiang T, Change Loy C (2013) “Cumulative attribute space for age and crowd density estimation” IEEE conference
on computer vision and pattern recognition, pp 2467–2474.
31. Wang H, Kläser A, Schmid C, Liu C-L (2011) “Action recognition by dense trajectories”, Computer Vision Pattern Recognition
(CVPR) 2011 IEEE Conference, pp 3169–3176.
32. W. Ge, R. T. Collins, and R. B. Ruback, “Vision-based analysis of small groups in pedestrian crowds”, IEEE Transactions on Pattern
Analysis and Machine Intelligence, vol. 34, no. 5, pp. 1003–1016, 2012
33. H. Fradi; B. Luvison; Q. C. Pham, "Crowd Behavior Analysis Using Local Mid-Level Visual Descriptors," in IEEE Transactions on
Circuits and Systems for Video Technology, vol.PP, no.99, 2017.
34. T. Bai and J. Tan, "Automatic detection and removal of high-density impulse noises," in IET Image Processing, vol. 9, no. 2, pp. 162-
172, 2015
35. Anna Yankovskaya, Yury Dementyeve, Artem Yamshanovb", Application of Learning and Testing Intelligent System with Cognitive
Component Based on Mixed Diagnostics Tests," in Procedia - Social and Behavioral Sciences 206 ( 2015 ) 254 – 261
36. V. Saligrama and Z. Chen, “Video anomaly detection based on local statistical aggregates,” in IEEE Conference on Computer Vis ion
and Pattern Recognition, CVPR, 2012, pp. 2112–2119.
37. Octavio Camarena, Erik Cuevas , MarcoPérez-Cisneros, Fernando Fausto, Adrián González, and Arturo Valdivia “LS-II: An Improved
Locust Search Algorithm for Solving Optimization Problems”, Mathematical Problems in Engineering, Volume 2018, Article ID
4148975.
38. Y. Cong, J. Yuan, and J. Liu, “Sparse reconstruction cost for abnormal event detection.” in Computer Vision and Pattern Recog nition,
CVPR, 2011, pp. 3449–3456
39. S.Wu, B. E. Moore, and M. Shah, “Chaotic invariants of lagrangian particle trajectories for anomaly detection in crowded scenes,” in
IEEE Conference on Computer Vision and Pattern Recognition, CVPR, 2010, pp. 2054–2060.
40. Raghavendra, R. & Del Bue, Alessio & Cristani, Marco & Murino, Vittorio. (2011). “Abnormal Crowd Behavior Detection by Social
Force Optimization”. Springer 134-145. 10.1007/978-3-642-25446-8_15.
41. W. Li, V. Mahadevan, and N. Vasconcelos, “Anomaly detection and localization in crowded scenes,” IEEE Trans. Pattern Analysis and
Machine Intelligence, vol. 36, no. 1, pp. 18–32, 2014.
42. V. Kaltsa, A. Briassouli, I. Kompatsiaris, L. J. Hadjileontiadis, and M. G. Strintzis, “Swarm intelligence for detecting interesting events
in crowded environments,” IEEE Transactions on Image Processing, vol. 24, no. 7, pp. 2153–2166, 2015.
Authors: Babji Prasad Chapa, Sasibhushana Rao Gottapu, Suresh Dannana
Paper Title: Performance Analysis of CBSS for CR Based 5G
Abstract: With the rapid and continuous growth of mobile users and services across the world, 5G is
anticipated to be the next step in the development of the cellular network. The conceptualized architecture for
5G uses a dynamic spectrum sharing (DSS) approach to include a common spectrum resources that is shared by
a multitude of varied network entities and systems. While this proposed solution would vitally enhance the entire
efficiency of spectrum. In this situation, the unique function of spectrum sensing (SS) that belongs to the
cognitive radio (CR) paradigm is recently being introduced as one of the primary facilitators for effective DSS
with less interference. The dissemination of the testing criteria for the detection problem is examined in this
32. paper to get the precise formulas for probability false alarm (Pf) and detection probability (Pd). The performance
of the covariance detector can be evaluated by using pd and pf expressions. Finally, theoretical Pd, Pf expressions 196-200
are verified with simulations.
Index Terms: Cognitive radio, Detection probability, Dynamic spectrum access, False alarm probability,
Spectrum sensing.

References:
1. Panwar N, Sharma S, Kumar Singh A, “A survey on 5G: the next generation of mobile communication,” Elsevier Phys Commun
18(2), 2016 pp. 64–84.
2. Andrews JG , “What will 5G be?,” IEEE J Sel Areas Commun 32(6), 2014, pp.1065–1082.
3. Mitola J, Maguire GQ, “Cognitive radio: making software radio more personal,” IEEE Pers Commun 6(4), 1999, pp. 13-18.
4. Yucek T, Arslan H, “A survey of spectrum sensing algorithms for cognitive radio applications,” IEEE Commun Surv Tutorials
11(1), 2009, pp. 116–130.
5. Ali A, Hamouda W, “Advances on spectrum sensing for cognitive radio networks: theory and applications,” IEEE Commun Surv
Tutorials, 2016, PP(99):
6. ASonneschein & P. M. Fishman, “Radiometric detection of spread spectrum signals in noise of uncertain power,” IEEE Trans.
Aerosp. Electron. Syst., 1992, vol. 28, no. 3, pp. 654–660.
7. Mariani, A. Giorgetti, & M. Chiani, “Effects of noise power estimation on energy detection for cognitive radio applications,”
IEEE Trans. Commun., 2011, vol. 59, no. 12, pp. 3410–3420.
8. V. Rakovic, D. Denkovski, V. Atanasovski, P. Mähönen, & L. Gavrilovska, “Capacity-aware cooperative spectrum sensing based
on noise power estimation,” IEEE Trans. Commun., 2015, vol. 63, no. 7, pp. 2428–2441.
9. A.Taherpour, M. Nasiri-Kenari, & S. Gazor, “Multiple antenna spectrum sensing in cognitive radios,” IEEE Transactions on
Wireless Communications, 2010, vol. 9, no. 2, pp. 814–823.
10. Y. Zeng, & Y. C. Liang, “Spectrum sensing algorithms for cognitive radio based on statistical covariance,” IEEE Trans. Veh.
Technol., 2009, vol. 58, no. 4, pp. 1804–1815.
11. Y. Zeng, Y. Laing, E. Peh, & A. T. Hoang, “Cooperative Covariance and Eigenvalue Based Detections for Robust Sensing,” in
IEEE Global Telecommunications Conference(GLOBECOM), IEEE, 2009, pp. 1–6.
12. Z. D. Bai, “On the distribution of largest eigenvalue in principle components analysis,” Anal. Statist., 2001, vol. 29, no. 2, pp.
295–327
13. Z.D. Bai, “Methodologies in spectral analysis of large dimensional random matrices, a review,” Statist. Sinica, 1999, vol. 9, pp.
611–677.
14. Y. Zeng and Y.C. Liang, “Eigenvalue-based spectrum sensing algorithms for cognitive radio,” IEEE Trans. Commun., 2009, vol.
57, no. 6, pp. 1784–1793.
15. F. Penna, R. Garello, D. Figliloli, & M. A. Spirito, “Exact nonasymptotic threshold for eigenvalue based spectrum sensing,” in
Proc. 4th Int. Conf. Cognitive Radio Oriented Wireless Netw. Commun., Hannover, Germany, 2009.
16. M. Chaini & A. Zanella , “Joint distribution of an arbitrary subset of the ordered eigenvalues of Wishart matrices,” in IEEE 19th
International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2008, pp.1–6.

Authors: Jasdeep Kaur


Personality and Skill Development Programs under Family Based Care and Role of Media among
Paper Title:
SOS Children
Abstract: SOS children’s village helps to enlarge their children’s individual abilities, interests, recognition
and talents. The aim of SOS village is to focus on the provision of quality care to children in villages and to
prevent abandonment of children in the community. Under its roof, children enjoy a real sense of security and
belonging and use all the facilities provided by SOS Children’s Villages such as food, shelter, clothing, health
services and media needs television, newspapers, radio, internet and computer lab etc. In every house one
newspaper, one television is available for SOS children and mobile phone for those children who are studying in
under- graduation and post- graduation courses. Here, we can say that the journey of mankind started expansion
of vocal chords, development of spoken language and then the written language. Finally, when we experimented
with printing machines, we set ourselves on the path of progress through mass media. Eventually we got audio –
visual expression of our ideas and thoughts through electronic media. Today we are in the midst of new media
which has led us to the virtual space. This study is an attempt to understand and explain how the personality
33. development programs and vocational training courses along with the media exposure have been contributing in
their capacity building.
201-211

Keyword : personality, skill, development, media, SOS children.


References:
1. Stover John, Bollinger Lori & Monasch Roland (2007) Resource needs to support orphans and vulnerable children in sub-Saharan
Africa. Health Policy and Planning, Vol 22(1), P. 21–27.
2. Melil Mbeba Benjamin (2015) Provision of Vocational Skills Education to Orphans: Lessons from Orphanage Centres in Dar es Salaam
City, Tanzania. Journal of Education and Practice. Vol. 6 (15), p. 65-75.
3. Rodrigues Daniels, Padezl & Machado M Aristides (2017) the importance of parental organized physical activity in children’s
extracurricular sport participation. Journal of Child Health Care. Vol. 22(1), p 159-170.
4. Kaur Ravneet, Vinnakota, Panigrahi Sanjibani & Manasa RV (2018) A descriptive study on behavioral and emotional problems in
orphans and other vulnerable children staying in institutional homes. The Indian Journal of Psychological Medicine.vol.40 (2), p 161-
168.
5. SOS Children’s Villages India: https://www.soschildrensvillages.in/where-we-work/sos-children-s-village-rajpura. ( Accessed on March
2019)

Authors: Vishwanath.C.Burkapalli, Priyadarshini.C.Patil

Paper Title: Fine Grained Food Image Segmentation through EA-DCNNs


Abstract: The recognition of Indian food can be considered as a fine-grained visual recognition due to the
same class photos may provide considerable amount of variability. Thus, an effective segmentation and
classification method is needed to provide refined analysis. While only consideration of CNN may cause
limitation through the absence of constraints such as shape and edge that causes output of segmentation to be
34. rough on their edges. In order overcome this difficulty, a post-processing step is required; in this paper we
proposed an EA based DCNNs model for effective segmentation. The EA is directly formulated with the
DCNNs approach, which allows training step to get beneficial from both the approaches for spatial data 212-218
relationship. The EA will help to get better-refined output after receiving the features from powerful DCNNs.
The EA-DCNN training model contains convolution, rectified linear unit and pooling that is much relevant and
practical to get optimize segmentation of food image. In order to evaluate the performance of our proposed
model we will compare with the ground-truth data at several validation parameters.
Keyword : Deep Convolutional Neural Networks (DCNNs); Rectified Linear Unit (ReLu); Edge Adaptive
(EA); Pooling; Convolution.
References:
1. W. Min, B. K. Bao, S. Mei, Y. Zhu, Y. Rui, and S. Jiang, “You are what you eat: Exploring rich recipe information for cross-region
food analysis,” IEEE Transactions on Multimedia, vol. PP, no. 99, p. 1, 2017.
2. W. Min, S. Jiang, J. Sang, H. Wang, X. Liu, and L. Herranz, “Being a supercook: Joint food attributes and multimodal content
modeling for recipe retrieval and exploration,” IEEE Transactions on Multimedia, vol. 19, no. 5, pp. 1100–1113, 2017.
3. Dr.Vishwanath.C.Burkapalli*,Priyadarshini.C.Patil**,“Segmentation and Identification of Indian food items from Images”, Int.
Journal of Engineering Research and Application www.ijera.com ISSN: 2248-9622, Vol. 8, Issue3,( Part -1) march2018, pp.49-52.
4. G. Camps-Valls and L. Bruzzone, “Kernel-based methods for hyperspectral image classification,” IEEE Transactions on Geoscience
and Remote Sensing, vol. 43, no. 6, pp. 1351–1362, 2005.
5. M. Fauvel, Y. Tarabalka, J. Benediktsson, J. Chanussot, and J. Tilton, “Advances in spectral-spatial classification of hyperspectral
images,” Proceedings of the IEEE, vol. 101, no. 3, pp. 652–675, 2013.
6. N. Kruger, P. Janssen, S. Kalkan, M. Lappe, A. Leonardis, J. Piater, A. Rodriguez-Sanchez, and L. Wiskott, “Deep hierarchies in the
primate visual cortex: What can we learn for computer vision?,” IEEE Transactions on Pattern Analysis and Machine Intelligenc e,
vol. 35, no. 8, pp. 1847–1871, 2013.
7. E. Shelhamer, J. Long, and T. Darrell, “Fully convolutional networks for semantic segmentation,” in Proceedings of the IEEE
Conference on Computer Vision and Pattern Recognition, 2015, pp. 3431–3440.
8. F. Perazzi, P. Kr¨ahenb¨uhl, Y. Pritch, and A. Hornung, “Saliency filters: Contrast based filtering for salient region detection,” in
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. IEEE, 2012, pp. 733–740.
9. X. Shen and Y. Wu, “A unified approach to object detection via low rank matrix recovery,” in Proceedings of the IEEE Conference on
Computer Vision and Pattern Recognition. IEEE, 2012, pp. 853–860.
10. S. Goferman, L. Zelnik-Manor, and A. Tal, “Context-aware object detection,” IEEE transactions on pattern analysis and machine
intelligence, vol. 34, no. 10, pp. 1915–1926, 2012.
11. Y. Jia and M. Han, “Category-independent object-level detection,” in Proceedings of the IEEE international conference on computer
vision, 2013, pp. 1761–1768.
12. G. Li and Y. Yu, “Deep contrast learning for salient object detection,” in Proceedings of the IEEE Conference on Computer Vision
and Pattern Recognition. IEEE, 2016, pp. 478–487.
13. Y. Li, X. Hou, C. Koch, J. M. Rehg, and A. L. Yuille, “The secrets of object segmentation,” in Proceedings of the IEEE Conference
on Computer Vision and Pattern Recognition, 2014, pp. 280–287.
14. J. Long, E. Shelhamer, and T. Darrell, “Fully convolutional networks for semantic segmentation,” in Proceedings of the IEEE
Conference on Computer Vision and Pattern Recognition. IEEE, 2015, pp. 3431–3440.
15. R. Zhao, W. Ouyang, H. Li, and X. Wang, “Saliency detection by multicontext deep learning,” in Computer Vision and Pattern
Recognition. IEEE, 2015, pp. 1265–1274.
16. G. Li and Y. Yu, “Visual saliency based on multi-scale deep features,” in Proceedings of the IEEE Conference on Computer Vision
and Pattern Recognition. IEEE, 2015, pp. 5455–5463.
17. L. Wang, L. Wang, H. Lu, P. Zhang, and X. Ruan, “Saliency detection with recurrent fully convolutional networks,” in Proceedings
of the European Conference on Computer Vision, 2016, pp. 825–841.
18. J. Pan, C. Canton, K. McGuinness, N. E. O’Connor, J. Torres, E. Sayrol, and X. Giro-i Nieto, “Salgan: Visual prediction with
generative adversarial networks,” Conference on Computer Vision and Pattern Recognition Scene Understanding Workshop, 2017.
19. Q. Hou, M.-M. Cheng, X. Hu, A. Borji, Z. Tu, and P. H. Torr, “Deeply supervised salient object detection with short connections,”
IEEE Transactions on Pattern Analysis and Machine Intelligence, 2018.
20. S. Xie and Z. Tu, “Holistically-nested edge detection,” in Proceedings of the IEEE international conference on computer vision, 2015,
pp. 1395– 1403.
21. S. He, J. Jiao, X. Zhang, G. Han, and R. W. Lau, “Delving into object subitizing and detection,” in The IEEE International Conference
on Computer Vision (ICCV), Oct 2017.
22. G. Lee, Y.-W. Tai, and J. Kim, “Eld-net: An efficient deep learning architecture for accurate detection,” IEEE transactions on pattern
analysis and machine intelligence, vol. 40, no. 7, pp. 1599– 1610, 2018.
23. T. Wang, L. Zhang, S. Wang, H. Lu, G. Yang, X. Ruan, and A. Borji, “Detect globally, refine locally: A novel approach to objec t
detection,” in The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), June 2018.
24. S. Horiguchi, S. Amano, M. Ogawa and K. Aizawa, "Personalized Classifier for Food Image Recognition," in IEEE Transactions on
Multimedia, vol. 20, no. 10, pp. 2836-2848, Oct. 2018.
25. W. Zhang, D. Zhao, W. Gong, Z. Li, Q. Lu and S. Yang, "Food Image Recognition with Convolutional Neural Networks," 2015 IEEE
12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and
2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), Beijing,
2015, pp. 690-693.
26. Weiqing Min, Bing-Kun Bao, Shuhuan “Supplementary Material You Are What You Eat: Exploring Rich Recipe Information for
Cross-Region Food Analysis” 2018.
27. Hossin, M and Sulaiman, M.N., “A review on evaluation metrics for data classification evaluations”, International Journal of Data
Mining & Knowledge Management Process (IJDKP) Vol.5, No.2, March 2015.

Authors: Arokiaraj David, Kattepogu Nagarjuna, Moiz Mohammed, Jegadesan Sundar

Paper Title: Determinant Factors of Environmental Responsibility for the Passenger Car Users
Abstract: The main aim of this study is to find out the demographic variables and their driving factors
influencing the environmental responsibility of passenger car users. There are around 73.85 million passenger
car was produced (OICA, 2018), and it is forecasted that 2 billion of car expected on the road before the end of
2040. Vehicles are the primary generator of emission per liter of fuel exhausts around 140-210 Co2/km released
in the air. The people who are using the vehicles are to be held responsible for the vulnerability which is resulted
35. because of emission from the tailpipe. According to the Japan Automobile Manufacturer Association (JAMA),
80% of tailpipe emission was released by the vehicle users and the remaining 20% by the vehicle manufacturers.
Therefore this paper understands the factors influencing the environmental responsibility of the passenger car 219-224
users.

Keyword : Environmental Responsibility, Passenger Car Users, Eco-friendly practice.


References:
1. Arokiaraj, D. (2015). A Study on Environmental Responsibility of the Stakeholders of Auto Industry in Chennai (Doctoral
dissertation). http://dspace.pondiuni.edu.in/xmlui/bitstream/handle/1/2040/T5889.pdf?sequence=1
2. Arokiaraj, D., & Banumathi, M. A Study on the Environmental Concern of the Passenger Car User in Chennai. International Resea rch
Journal of Business and Management (IRJBM), ISSN: 2322:083X, Vol.8, Iss.5, pp.64-70
http://irjbm.org/irjbm2013/April2015/Paper8.pdf
3. Arokiaraj, D., R. Srivel, M., & R.Arthie Reena, M. (2018). The Eco-Driving Behaviour: A Strategic Way to Control Tailpipe
Emission. International Journal of Engineering & Technology, 7(3.3), 21-25. doi:http://dx.doi.org/10.14419/ijet.v7i3.3.14474
4. Arokiaraj David, Ganeshkumar Chandirasekaran, Victer Paul Pascal, (2019a), “Innovative Management System for Environmental
Sustainability Practices among Indian Auto-Component Manufacturers, International Journal of Business Innovation and Research
(IJBIR), ISSN (E): 1751-0260, ISSN (P): 1751-0252.
5. Arokiaraj David, Yamuna Devi Thangavel & Ramanarayan Sankriti (2019b), “Recover, Recycle and Reuse: An Efficient Way to
Reduce the Waste” International Journal of Mechanical and Production Engineering Research and Development (IJMPERD), ISSN
(P): 2249-6890; ISSN (E): 2249-8001, vol. 09, iss.03, pp.31-42.
6. Arokiaraj David, Ramyar Rzgar Ahmed, Chandirasekaran Ganeshkumar, & Jeganthan Gomathi Sankar, (2019c) “Consumer
Purchasing process of organic food product: An Empirical Analysis” Quality-Access to Success, Journal of Management System,
ISSN: 1582-2559.
7. Aurora’s, P. G. (2018). The Eco-Driving Behaviour: A Strategic Way to Control Tailpipe Emission. International Journal of
Engineering & Technology, 7 (3.3), 21-25.
8. Boriboonsomsin, K., Vu, A., & Barth, M. (2010). Eco-Driving: Pilot Evaluation of Driving Behavior Changes among us Drivers.
9. Bushan D. Sudhakar, Kattepogu Nagarjuna & D. Arokiaraj (2017), “Marketing Assistance and Digital Branding - An Insight for
Technology Up-gradation for MSME’s”, AGU International Journal of Management Studies & Research, Vol. No.5, e-ISSN: 2455-
1562; Print-ISSN: 2455-6092, ISBN: 978-93-86171-56-6. P415-421 http://www.aguijmsr.com/currentissue.php
10. D. Arokiaraj & R. Srivel, (2017) “The Direness of Cultivable Land Spotted on Agricultural: A Special Reference to Rice Production
in South India” Abhinav National Monthly Refereed Journal of Research in Commerce & Management, ISSN-2277-1166, Vol. 06,
issue 09 pp. 55-59. http://abhinavjournal.com/journal/index.php/ISSN-2277-1166/article/view/1496
11. D.Arokiaraj, (2011), “The Greenmarket: The Way to Save the World”, Business Strategies, ISBN: 978-81-920303-6-4, pp. 41-44.
12. David, A., & Banumathi, M. (2014a). Factors Influencing the Purchase Decision of Passenger Cars in Puducherry.
http://ijemr.in/April%202014.htm
13. David, A., & Banumathi, M. (2014b). A Study on Eco-Driving Behaviour of Passenger Car Users in Chennai.
http://www.theinternationaljournal.org/ojs/index.php?journal=tij&page=article&op=view&path%5B%5D=2757
14. Eswaraiah Thummula, Ravi Kant Yadav & Arokiaraj David, 2019, “A Cost-Effective Technique to Avoid Communication and
Computation Overhead in Vehicle Insurance Database for Online Record Monitoring” International Journal of Mechanical and
Production Engineering Research and Development (IJMPERD), ISSN(P): 2249-6890; ISSN(E): 2249-8001, vol. 09, iss.02, pp.711-
722.
15. Faiz, A. (1993). Automotive Emissions in Developing Countries Relative Implications for Global Warming, Acidification, and Urban
Air Quality. Transportation Research Part A: Policy and Practice, 27(3), 167-186.
16. Kageson, P. (2009). Environmental Aspects of Inter-City Passenger Transport (No. 2009-28). OECD/ITF Joint Transport Research
Centre Discussion Paper.
17. Kim, H. S., & Damhorst, M. L. (1998). Environmental Concern and Apparel Consumption. Clothing and Textiles Research
Journal, 16(3), 126-133.
18. M.Banumathi & D.Arokiaraj, (2011), “Eco-labeling–The Need for Sustainable Marketing”, National Conference in the era of Global
Recovery-2011(SGEGR2011) ISBN: 978-93-80530-39-0, pp.511-515.
19. Major R.N. Wahal. (2006). Environmental Pollution-its Impact on Humans and Non-Human
20. Ngo, A. T., West, G. E., & Calkins, P. H. (2009). Determinants of Environmentally Responsible Behaviors for G reenhouse Gas
Reduction. International Journal of Consumer Studies, 33(2), 151-161.
21. P.Pratheepkumar, J.Josephine Sharmila & D.Arokiaraj, (2017), “Towards Mobile Opportunistic in Cloud Computing” Indian Journal
of Scientific Research (IJSR), Iss.02 vol.17, ISSN: 0976-2876 (Print) ISSN: 2250-0138 (Online), 536 - 540.
https://www.ijsr.in/article-description.php?id=b2hLd0trRmcyS3BHQ0dwME90Q3VsQT09
22. Ramachandra, T. V., Aithal, B. H., & Sreejith, K. (2015). GHG Footprint of Major Cities in India. Renewable and Sustainable Energy
Reviews, 44, 473-495.
23. Sagar, A. D. (1995). Automobiles and Global Warming: Alternative Fuels and other Options. Environ Impact Assess Rev, 15(34),
374.
24. Srivel Ravi, R.P.Singh & D.Arokiaraj, (2018), “FPGA implementation of power-on self-test towards combo card”, International
Journal of Engineering and Technology (IJET-UAE), Science Publishing Corporation-Publisher of International Academic Journals,
ISSN: 2227-524X, Vol.07, Iss.3.3, pp.156-161.
25. Srivel, D. Arokiaraj & Mohammed Imaduddin, 2018 “Controlling & Calibrating Vehicle-Related Issues Using RFID Technology”
International Journal of Mechanical and Production Engineering Research and development (IJMPERD), ISSN (P): 2249-6890; ISSN
(E): 2249-8001, Vol. 8, Issue 2, pp. 1125-1132, DOI: 10.24247/ijmperdapr2018130. http://www.tjprc.org/publishpapers/2-67-
1521714530-130.ijmperdapr2018130.pdf
26. Van Mierlo, J., Maggetto, G., Van de Burgwal, E., &Gense, R. (2004). Driving Style and traffic measures-Influence on Vehicle
Emissions and Fuel Consumption. Proceedings of the institution of Mechanical Engineers, Part D: Journal of Automobile
Engineering, 218(1), 43-50.
27. Wang, H., Fu, L., & Bi, J. (2011). CO2 and Pollutant Emissions from Passenger Cars in China. Energy Policy, 39(5), 3005-3011.

Authors: Sahaya Sakila, Sanyam Garg, Tanay Yeole , Hrithik Yadav

Paper Title: Earthquake Time Prediction using CatBoost and SVR


Abstract: Seismic tremors everywhere throughout the globe have been a noteworthy reason for decimation
and death toll and property. The following context expects to recognize earthquakes at a beginning time utilizing
AI. This will help individuals and salvage groups to make their errand simpler. The information in this manner
comprises of these seismic acoustic signals and the time of failure. The model is then prepared utilizing the
CatBoost model and the utilization of Support Vector Machines. This will help foresee the time at which a
36. Seismic tremor may happen. CatBoost Regression Algorithm gives a Mean Absolute Error of about 1.860. The
Cross Validation (CV) Score for the Support Vector Machine (SVM) approach is -2.1651. The datasets metrics
are not reliable on any outer parameter in this manner the variety of exactness is constrained, and high accuracy 225-229
is accomplished.

Keyword : CatBoosting, Support Vector Regression, Acoustic signals, Earthquake, Exploratory Data
Analysis, Skew, RMS, Peak.
References:
1. V.M> Zobin, Introduction to volcanic seismology. Elsevier,2011.
2. W.H. Lee, P. Jennings ,C. Kissinger and H.Kanamori. International handbook of earthquake and engineering seismology. Academic
Press,@002,Vol.81.
3. Y. Peng, R. Lahusen, B. Shriazi and W.Song, “Design of smart sensing component for volcano monitoring.” in IET 4th Internatio nal
Conference on Intelligent Environments,July 2008,pp.1-7.
4. R.P.Duin,M.Orozoo-Alzate and J.M. Londono-Bornilla, “Classi-~ fication of volcano events observed by multiple seismic stations,” in
2-0th International Conference on Pattern Recgnition(ICPR),2010,pp.1052-1055.
5. R. Lara-ueva, P. Bernal, M.G. Saltos,D. Ben’itez and J.L Roiolvarez. “Time and frequency feature selection for seismic events from
cotopaxi volcano.” in Asia-Pacific Conference on Computer Aided System Engineering(APCASE).2014,2015,pp.129-134.
6. D. Cardenas-Pe’na,M. Orozoo-Alzate, and G. Castellanos-Dominguez,”Selection of time-variant features for earthquake classification at
the nevado-del-ruiz volcano, “Computers & Geosciences,vol. 51,pp.293-304,2013
7. B.J. Restrepo, M. Alvarez , and R.Henao, “Comparison between gen- ‘ erative and discriminative approaches for seismic events
classification- Comparaioin entre enfoques generativos y discrimativos para la’ classification de eventos s ‘’ ismicos, “Scientia et
Technica,vol.1,no.37,2007.
8. R.A. Lara-cueva,D.S Bentez E.V. Carrera,M.Ruiz, and J.L> Roig-Ivarez,”Automatic recognition of long period events from volcano
earthquakes at cotopaxi volcano, “IEEE Transactions on Geoscience and Remote Sensing,vol.54,no.9.pp.5247-5257,2016.
9. G.Curilem,J. Vergara,G. Fuentealba, G.Agnua and M.Chag “on ‘ “Classification of seismic signals at Villarrica volcano(Chile) using
neural networks and genetic algorithms, “Journal of Volcanology and Geothermal research,vol.180,no.1,pp.1-8,2009.
10. R.Lara-cueva,D.Ben’itez,E.Carrera,M.Ruiz,an d J.Roig-Alvaraz,’ “Feature selection of seismic waveforms for long period event
detection at cotopaxi volcano, “Journal of Volocanlogy and Geothernal research, vol.316,pp.34-49,2016.
11. Precursory Pattern based Feature Extraction Techniques for Earthquake Prediction. Lei Zhang, LangchunSi, Haipeng yang, Yuanzh i Hu,
Jianfeng Qiu.

Authors: G. Ganesh Naidu, M. Sri Durga Vara Prasad, E. Mani

Paper Title: Mechanical Behaviour of Fibre Reinforced Concrete using Shape Memory Alloys
Abstract: Usage of smart materials in concrete is extensively increasing. This study focuses on behavior of
fiber reinforced concrete, using shape memory alloys (SMA) fibers. SMA adopted for this study is NiTi shape
memory alloy crystals. Concrete is tested for slump and mechanical properties tested are compressive strength
for 7 and 28 days. Flexural strength is tested for 28 days. Constant rates of 1% of SMA fibers are added to the
concrete mix. Also regular steel fiber reinforced is prepared and test values are compared with SMA fiber
reinforced concrete.

Keyword : shape memory alloy (SMA), fiber reinforced concrete, mechanical properties, steel fibers.
References:
1. Yamen Ibrahim Elbahy, Maged A. Youssef, Flexural behaviour of superelastic shape memory alloy reinforced concrete beams during
loading and unloading stages, Engineering Structures,
Volume 181,2019,Pages 246-259, ISSN 0141-0296,
37. https://doi.org/10.1016/j.engstruct.2018.12.001.
2. Abdulsamee M. Halahla, Yazan B. Abu Tahnat, Amin H. Almasri, George Z. Voyiadjis, The effect of shape memory alloys on the
ductility of exterior reinforced concrete beam-column joints using the damage plasticity model, Engineering Structures, 230-232
Volume 200,2019,109676, ISSN 0141-0296,
https://doi.org/10.1016/j.engstruct.2019.109676.
3. Qiwen Chen, Moochul Shin, Bassem Andrawes,Experimental study of non-circular concrete elements actively confined with shape
memory alloy wires,Construction and Building Materials,
Volume 61,2014,Pages 303-311, ISSN 0950-0618,
https://doi.org/10.1016/j.conbuildmat.2014.02.076.
4. B. Mas, D. Biggs, I. Vieito, A. Cladera, J. Shaw, F. Martínez-Abella, Superelastic shape memory alloy cables for reinforced concrete
applications, Construction and Building Materials,Volume 148, 2017, Pages 307-320, ISSN 0950-0618,
https://doi.org/10.1016/j.conbuildmat.2017.05.041.
5. Joan M. Rius, Antoni Cladera, Carlos Ribas, Benito Mas,Shear strengthening of reinforced concrete beams using shape memory alloys,
Construction and Building Materials,Volume 200,2019,
Pages 420-435,ISSN 0950-0618,
https://doi.org/10.1016/j.conbuildmat.2018.12.104.
6. Farhad Aslani, Yinong Liu, Yu Wang,The effect of NiTi shape memory alloy, polypropylene and steel fibres on the fresh and
mechanical properties of self-compacting concrete,Construction and Building Materials,Volume 215,2019,Pages 644-659,ISSN 0950-
0618,
https://doi.org/10.1016/j.conbuildmat.2019.04.207.

Authors: N. Venkata Ramana, Siddu Shivaraj Dana, K.Yuva Pallavi

Paper Title: Performance of Recycled Aggregate in Pervious Concrete


Abstract: Pervious concrete can be noticed as a gap-graded concrete. This type of concrete treats a new way
to control or manage of storm water. The pervious concrete is important to address bionomical issues and
confirmable growth. In beside, demand for aggregate to producing concrete is still high while natural resources
are reducing. In this connection at attempts has been made for utilization of recycled aggregate in the concrete
mix, by replace the natural coarse aggregate in the ratio of 0, 25, 50, 75 and 100%. To obtain the behavior of
38. pervious concrete compressive, split and bearing strength are evaluated. In the addition to those strengths,
coefficient of permeability also found. In this experimental work total five mixes are taken to evaluate strengths.
233-238
A regression model has developed to assess the split tensile strength and ANSYS software has been used to
know the stress and strain variation for the cube specimens. From experimental work, it is noticed that, the
pervious concrete with recycled aggregate is viable for pavement works.

Keyword : Recycled aggregate (RA), Pervious concrete, Compressive strength, Split Tensile strength, Bearing
strength and ANSYS Software
References:
1. Alalea Kia, Hong S. Wong, Christopher R. Cheeseman, “Defining clogging potential for permeable concrete”, “Journal of
Environmental Management”, page no 44-53, 2018
2. Dang Hanh Nguyen, Mohamed Boutouil, Nassim Sebaibi, Fabienne Baraud, Lydia Leleyter, “Durability of pervious concrete using
crushed seashells”, “Construction Building Materials”, page no 137-150, 2017
3. Iveta Novakova, Karel Mikulica, “Properties of concrete with partial replacement of natural aggregate by recycled concrete aggregate
from precast production”, “Procedia Engineering”, page no 360-367, 2016
4. Jigar J. Anghan , Harsh V. Gevariya, Jugal Mistry, “A Review Paper on Permeable Concrete as A Road Pavement for a Storm Water”,
“International Journal for Scientific Research & Development” Vol. 6, Issue 02, 2018 ISSN (online): 2321-0613.
5. Memery Serifou, Z.M.Sbrtai, S.Yotte, M.O.Boffoue, E.Emeruwa, F.Bos, “A Study of concrete made with fine and coarse aggregates recycled
from fresh concrete waste”, “Hindawi Publishing Corporation Journal of construction Engineering”, Vol. 5, pages 1-5, Article ID 317182,
2013
6. Neetu B. Yadav, Jayesh A. Shah, Rushabh A. Shah, “Pervious Concrete: Solution for Low Cost Construction”, “International Journal of
Innovative Science and Modern Engineering”, Vol.1, Issue-10, September 2013, ISSN: 2319–6386
7. P. Saravana Kumar; and G. Dhinakaran, “Effect of Admixed Recycled Aggregate Concrete on Properties of Fresh and Hardened Concrete”,
“Journal of Materials in Civil Engineering”, Vol.24 Issue 4 - April 2012.
8. Prachi Sohoni and Vaishali Sahu, “Comparative Strength studies of Recycled aggregate concrete and Fresh Concrete”, “Civil
Engineering urban planning: An International journal”, Vol.2 No.3, 2015
9. Suraya Hani Adnan, Lee Yee Loon ,Ismail Abdul Rehman, Hamidah Mohd Saman, Mia Wimala Soejoso, Fakulti Kejuruteraan Awam
dan Alem Sektiar, “Compressive strength of recycled aggregate concrete with various percent of recycled aggregate”, “National Seminar
on Civil Engineering Research (SEPKA 2007), 11-12 December 2007”, Universiti Teknologi Malaysia, Skudai.

Authors: Kavita Goyal, Moin Uddin, Vikas Jindal


A Simulation Model for Interaction between Cyclic Variation of Brain Tissue Temperature and
Paper Title:
Intracranial Pressure
Abstract: The brain responds with high sensitivity in case of cerebral damage. Brain temperature (BT),
cerebral blood flow (CBF), cerebral blood volume (CBV) and intracranial pressure (ICP) are essential
parameters for brain revival in case of cerebral damage. For this reason, the coordinated learning of BT, CBF
and ICP is required for improving the remedial impacts. Thus, in this exploration, a simulation model has been
developed for association between brain tissue temperature (BTT), CBF, CBV and ICP to improve the
apprehensions of the ICP. It includes the cardiac output, partial pressures of oxygen and carbon dioxide in
cerebral artery and vein, temperature variations of brain tissue, cerebral metabolic process and pressure-volume
relationship for cranial cavity. The model simulates the interaction between arterial blood pressure, BTT,
produced amount of CO2 from brain tissue, changes in CBV and changes in ICP. The results show that the ICP
and CBV will increase with an increase in brain tissue temperature. This model elaborates the physiology of
BTT and ICP with less complexity.

Keyword : Simulation modeling, intracranial pressure, brain tissue temperature, MATLAB, hyperthermia,
cerebral blood volume
References:
16. . H. Ropper, R. H. Brown, “Adams and Victor’s principles of neurology”, 8 th ed. New York, NY:McGraw-Hill; 2005, pp: 529-545.
17. R. G. Geocadin, P. N. Varelas, D. Rigamonti, and M. A. Williams, “Continuous intracranial pressure monitoring via the shunt reservoir
to assess suspected shunt malfunction in adults with hydrocephalus,” Neurosurg. Focus, vol. 22, no. 4, 2007, p. E10.
18. C. Hamani, M. V. Zanetti, F. C. Pinto, A. F. Andrade, O. Ciquini Jr., and R. Marino Jr., “Intraventricular pressure monitorin g in patients
with thalamic and ganglionic haemorrhages,” Arq Neuropsiquiatr, vol. 61, no. 2B, 2003, pp. 376-380.
19. W. R. Gowers, “A Manual of Diseases of the Nervous System. Philadelphia”, PA: P. Blakiston Son and Co., 1895.
39. 20. J. Guillaume, P. Janny, “Manometrie intracranienne continue interest de la method et premiers resultants”, Rev Neu rol 84: 131-142,
1951.
21. R. Aaslid, T. M. Markwalder, H. Nornes, “Noninvasive transcranial Doppler ultrasound recording of flow velocity in basal cere bral 239-246
arteries”, J Neurosurg., Dec; 57(6), 1982, pp:769–74.
22. J. Bellner, B. Romner, P. Reinstrup, K. A. Kristiansson, E. Ryding, and L. Brandt, “Transcranial Doppler sonography pulsatility index
(PI) reflects intracranial pressure (ICP),” Surgical Neurology, vol. 62, no. 1, 2004, pp. 45–51.
23. S. G. Voulgaris, M. Partheni, H. Kaliora, N. Haftouras, I. S. Pessach, and K. S. Polyzoidis, “Early cerebral monitoring using the
transcranial Doppler pulsatility index in patients with severe brain trauma,” Medical Science Monitor, vol. 11, no. 2, 2005, pp. CR49–
CR52.
24. J. A. Moreno, E. Mesalles, J. Gener et al., “Evaluating the outcome of severe head injury with transcranial Doppler ultrasonography”,
Neurosurgical Focus, vol.8, no.1, articlee8, 2000.
25. A. Behrens, N. Lenfeldt, K. Ambarki, J. Malm, A. Eklund, and L. O. Koskinen, “Transcranial Doppler pulsatility index: not an accurate
method to assess intracranial pressure,” Neurosurgery, vol. 66, no. 6, 2010, pp. 1050–1057.
26. M. Ursino, M. Iezzi, and N. Stocchetti, “Intracranial pressure dynamics in patients with acute brain damage: a critical analy sis with the
aid of a mathematical model”, IEEE Trans. Biomed. Eng. 42: 529–540, 1995.
27. M. Ursino, C. A. Lodi, S. Rossi, and N. Stocchetti, “Intracranial pressure dynamics in patients with acute brain damage”, J. Appl.
Physiol. 82: 1270–1282, 1997.
28. Y. Nakagawa, M. Tsuru, and K. Yada, “Site and mechanism for compression of the venous system during experimental intracranial
hypertension”, J. Neurosurg. 41: 427–434, 1974.
29. J. D. Michenfelder, Cerebral Blood Flow and Metabolism, In: Cucchiara RF, Michenfelder JD(ed) Clinical neuroanesthesia . Churchill
Livingstone, New York, pp: 1-40, 1990.
30. L. Leenders, et al, “Cerebral Blood Flow, Blood Volume and Oxygen Consumption”, Brain 113, 113:27-47, 1990.
31. A. Jung, “Statistical analysis of biomedical data”, PhD Thesis, 2003.
32. F. J. W. Roughton and J. W. Severinghaus, “Accurate determination of O 2 dissociation curve of human blood above 98.7% saturation
with data on O2 solubility in unmodified human blood from 0° to 37 °C”, Journal of Applied Physiology, 35(6):861-869, December
(1973).
33. J. W. Severinghaus, “Simple, accurate equations of human blood O 2 dissociation computations”, Journal of Applied Physiology, 46:
599-602, January-June (1979).
34. A. Zwart, G. Kwant, B. Oeseburg and W. G. Zijlstra, “Human whole body oxygen affinity: effect of temperature”, Jour nal of Applied
Physiology, 57:429-434, July-December (1984).
35. A. V. Hill, “The possible effects of the aggregation of the molecules of haemoglobin on its dissociation curve”, Journal of Physiology,
XL:iv-vii, 1910.
36. G. A. Truskey, F. Yuan, and D. F. Katz, “Transport Phenomena in Biological Systems”, chapter Oxygen-Haemoglobin Equilibria,
Prentice Hall, 2004.
37. J. G. Stone, R. R. Goodman, K. Z. Baker, C. J. Baker, and R. A. Solomon, “Direct intraoperative measurement of human brain
temperature”, Neurosurgery, vol. 41, no. 1, 1997, pp. 20–24.
38. M. S´egol`ene, V. Fanny, and G. Thomas, “Review Article: Brain Temperature: Physiology and Pathophysiology after Brain Injury ”,
Hindawi Publishing Corporation, Anesthesiology Research and Practice, Volume 2012, Article ID 989487, 13 pages, doi:
10.1155/2012/989487.
39. M. Cabanac, “Adjustable set point: to honor Harold T. Hammel,” Journal of Applied Physiology, vol. 100, no. 4, 2006, pp. 1338 –1346.
40. W. J. Greeley, et al, “The Effect of Hypothermic Cardiopulmonary Bypass and Total Circulatory Arrest on Cerebral Metabolism in
Neonates, Infants and Children”, Journal of Thoracic and Cardiovascular Surgery, vol. 101, 1991, pp: 783-794.
41. W. J. Thoman, et al., “A Computer Model of Intracranial Dynamics”, 19 th International Conference-IEEE/EMBS, Oct. 30-Nov. 2, 1997,
pp: 2197-2200, Chicago, IL. USA.
42. L. D. Mishra, “Cerebral blood flow and anaesthesia: a review”, Indian J. Anaesth. 2002; 46(2): 87-95.
43. A. Lumb, “Carbon dioxide. In: Nunns Applied Respiratory Physiology”, 6th ed. Oxford: Butterwoth Heineman, 2005: Chapter 10,
222-48.
44. C. Geers, G. Gros, “Carbon dioxide transport and carbonic anhydrase in Blood and muscle”, Physiological Reviews 2 000; 80(2):
681-15.
45. G. J Arthurs, M. Sudhakar, “Carbon dioxide transport”, Continuing

Education in Anaesthesia Critical Care & Pain, Volume 5, Issue 6, 1 December 2005, pp: 207–210, doi: 10.1093/bjaceaccp/mki050
46. H. Chris, “Calculated and measured bicarbonate: is there a difference?”, The Biomedical Scientist, November 2008, pp: 959-961.
47. T. Alifia, K. Hari, “Cerebral Physiology, Continuing Education in Anaesthesia”, Critical Care & Pain, Vol. 13, No. 4, 2013.
48. K. Goyal, M. Uddin, S. K. Salwan, “Modeling and simulation study of cerebrospinal fluid circulation in human brain”, IEEE 4 th
International conference (SPIN 2017), pp: 104-108.

Authors: Diksha Panwar, Monika Bangari, Sandeep Kumar Thakur

Paper Title: A Structural Equation Modeling on Analysis of Preference Advertisement in Building Brand Equity
Abstract: Preference advertisement is a promotional system in which marketer claims the superiority of their
product or brand over competing product(s) or brand, directly or indirectly. Preference advertisement helps in
comparing alternative brands on bases of features, price, and other distinctive information. Brand equity is the
total worth of the brand. Brand equity can be measured in two different perspective i.e. cognitive psychology is
the attribute perception that is related to the awareness regarding the brand features and associations whereas
another information economics is associated towards strong brand name which is created through the quality of
the product and good quality generates a premium prices for the brand. In the monetary terms it’s the value that
the organization expects from the brand. Preference advertisement can either be transferred directly to the brand.
The objective of this study is to analyze the impact of preference advertisement in building the brand equity.
Therefore to achieve the objective, different analysis tools used in the study are: mean, confirmatory factor
analysis and structural equation modeling technique. The finding shows that preference advertisement has a
significantly positive impact on building the brand equity.

Keyword : Preference advertisement, brand equity, sponsored brand, alternative brand.


References:
1. Aaker, D. A., & Biel, A. L. (1993). Brand equity and advertising: Advertising’s role in building strong brands. Hillsdale, NJ: Lawrence
Erlbaum Associate
2. Arti d. Kalro (2015), the ad format-strategy effect on comparative advertising effectiveness, European journal of marketing volume 51,
issue 1
3. Awang, Z. (2012). Structural equation modeling using AMOS graphic. Penerbit Universiti Teknologi MARA.
40. 4. Barigozzi, F., Garella, Paolo G. and Peitz, M. (2012). With a Little Help from my Enemy: Comparative Advertising as a Signal of
Quality. University of Mannheim, 68131 Mannheim (Germany)
5. Byrne, B. M. (2010). Structural equation modeling with AMOS, (2nd ed.). New York: Routledge. 247-252
6. Emons, W., & Fluet, C. (2012). Non-comparative versus comparative advertising of quality. International Journal of Industrial
Organization, 30(4), 352-352. Retrieved from doi:10.1016/j.ijindorg.2012.01.004
7. Forza & Filippini, R. (1998). Tqm impact on quality conformance and customer satisfaction: a causal model. International journal of
production economics, 55(1), pp.1–20.
8. Greenspoon & Saklofske, D.H. (1998). Confirmatory factor analysis of the multidimensional students life satisfaction scale. Personality
and Individual Differences, 25(5), pp. 965–971
9. Hair, J.F., Black, W.C., Babin, B.J., & Anderson, R.E. (2010). Multivariate Data Analysis. Seventh Edition. Prentice Hall, Up per Saddle
River, New Jersey.
10. Hill, M. E., & King, M. (2001). Comparative vs. noncomparative advertising: Perspectives on memory. Journal of Current Issues &
Research in Advertising, 23(2), 33-52
11. Kumar, S., & Patra, S. (2017). Prevalent advertising media & its role to build brand equity: A review. Asian Journal of Research in
Business Economics and Management, 7(7), 78-87.
12. Kumar, S., & Patra, S. (2017). Does promotion mix really help to enhance brand equity: A literature review. Indian Journal of
Commerce and Management Studies , 8(2).
13. Romano, C. (2005). ‘Comparative Advertising in the United States and France’, 25 Nw. J. Int’l L. & Bus, 371 (2005).
14. Schermelleh-Engel, K., & Moosbrugger, H. (2003). Evaluating the fit of structural equation models: tests of significance and descriptive
goodness-of-fit measures. Methods of Psychological Research Online, 8(2), 23-74.
15. Schumacker, R. E., & Lomax, R. G. (2004). A beginner's guide to structural equation modeling, Second edition. Mahwah, NJ: Lawrence
Erlbaum Associates.
16. Selvakumar, J. J., & Vikkraman, P. (2011). The impact of advertising and price promotions on brand equity in the serv ice sector. Journal
of Contemporary Research in Management, 6(3), 51.
17. Sun, Y., Lim, K., Jiang, C., & Sun, J. (2010). Do Males and Females Think in the Same Way? An Empirical Investigation on the Gender
Differences in the Web Advertising Evaluation. Journal of Computers in Human Behavior, 26(6), 1614-1625.
18. Soscia, I., Girolamo, S., & Busacca, B. (2010). The Effect of Comparative Advertising on Consumer Perceptions: Similarity or
Differentiation? Journal of Business Psychology, 25, 109-118.
19. Pechmann, C. & Stewart, D. W. (1990). The effects of comparative advertising on attention,memory, and purchase intentions. Journal of
Consumer Research, 17(2), 180-191.
20. Tong, X., & Hawley, J. M. (2009). Creating brand equity in the Chinese clothing market: The effect of selected marketing activities on
brand equity dimensions. Journal of Fashion Marketing and Management: An International Journal, 13(4.), 566-581.
21. Wright, B., and Morgan, F. (2002). ‘Comparative Advertising in the European Union and the United States: Legal a nd Managerial
Issues’, Journal of Euromarketing, 11(3), 7-31.

Authors: Deepak Sharma, Aaisha Jameel

Paper Title: Enhancement of Security in Flying AD-HOC Network Using a Trust Based Routing Mechanism
Abstract: Security is one of the most vital aspect for implementing FANETs in adverse environments. Hence,
research in this area has emerged as an important FANETs field in the recent past. Compared to wired networks,
FANETs are more vulnerable to security attacks due to lack of a trusted centralized authority and easy
eavesdropping. Further, as nodes in flying ad-hoc networks are susceptible to attacks, a trust model based on
direct, as well as indirect trust degrees from similar trusted neighbors is integrated in order to overcome the
vulnerability due to attacks by malicious/selfish nodes and to provide reliable packet transmissions. Fading away
of trust is incorporated with a perspective to ensure the uncertainty of trust with time until it is updated. Also,
AODV algorithm is used for routing in combination with calculated trust values so that efficient transmission of
messages can take place.

Keyword : Mobile Adhoc Network (MANET), AODV Protocol, FANET, Network Security.
41.
References:
1. Mentari Djatmiko, Roksana Boreli, Aruna Seneviratne, Sebastian Ries, “Trust Based Content Distribution for Mobile Ad Hoc 253-257
Networks” in 2011 IEEE 19th Annual International Symposium on Modelling, Analysis, and Simulation of Computer and
Telecommunication Systems.
2. Dilraj Singh, Amardeep Singh, “Trust Based Routing Protocols in Mobile Ad Hoc Networks” in 2014, 4th IEEE International
Conference on wireless communications, networking and mobile computing.
3. Ilker Bekmezci and Ozgur Koray Sahingoz and Samil Temel, “Flying Ad-hoc Networks (FANETs): A survey” in Ad Hoc Networks
journal, vol. 11, pp. 1254-1270, Jan 2013.
4. Sumathy Subramaniam, R. Saravanan and Pooja K. Prakash, “Trust Based Routing to Improve Network Lifetime of Mobile Ad Hoc
Networks” in Journal of Computing and Information and Technology, Volume 18, Issue 5, October 2013, pages 666-677.
5. Su Bing, Ma Zheng hua and Sun Yu-qiang, “A trusted based encryption mechanism for efficient communication over wireless
networks”, in 2008, 14th IEEE International conference on Computer Science and Technology and Cloud Computing.
6. http://www-rp.lip6.fr/ns-doc/ns226-doc/html/aodv_8cc_source.htm\
7. http://www.cs.binghamton.edu/~kliu/research/ns2code/
8. C. E. Perkins and E. M. Royer, “The ad hoc on-demand distance vector protocol,” in Ad hoc Networking, Addison-Wesley, pp. 173–
219, 2000.
9. S.Bhimla, N.Yadav,”Comparison between AODV protocol and DSR protocol in MANET”, IJAERS, Vol 2, issue 1, 2012.
10. https://www.researchgate.net/figure/Figure-FANET-Applications-In-Sensor-NetworksDifferent-sensor-devices-can-be-used-
to_fig1_317446275.

Authors: Deepak Sharma, Priti Sharma


Rain Fall Prediction using Data Mining Techniques with Modernistic Schemes and Well-Formed
Paper Title:
Ideas
Abstract: Weather forecasting is essential because it helps to deal with the environment related future
anomalies. Accurate and timely predications can contribute largely for taking safety measures in the ongoing
projects such as agriculture tasks, flight operations, transportation tasks and many others. There are large number
of meteorologist all over the world who are trying their level best to predict the aspects of environment using
data mining techniques. This paper contains some of the best work done in rain fall prediction using data mining
techniques. This paper helps the researchers to study the literature of this field in a crisp, summarized and
encapsulated way.

Keyword : Data mining, Bayesian Classifier, Clustering, Rain fall prediction, Linear Regression Technique,
K-fold, Weather predictions, Multiple Regression Technique.
References:
1. Aswini.R, Kamali.D, Jayalakshmi.S, R.Rajesh, “Predicating Rainfall and forecast weather sensitivity using data mining techniq ues”,
42. International Journal of Pure and Applied Mathematics, Vol. 119 No. 14 2018.
2. Chowdari K.K, Dr. Girisha R, Dr. K C Gouda, “A study of rainfall over India using data mining”, International Conference on
Emerging Research in Electronics, Computer Science and Technology – 2015. 258-263
3. Sandeep Kumar Mohapatra, Anamika Upadhyay, Channabasava Gola, “Rainfall prediction based on 100 years of Meteorological
Data”, IEEE-2017.
4. Tharun V.P, Ramya Prakash, S. Renuga Devi, “Prediction of Rainfall Using Data Mining Techniques”, 2nd International Conference
on Inventive Communication and Computational Technologies, IEEE-2018.
5. Abishek.B, R.Priyatharshini, Akash Eswar M, P.Deepika, “Prediction of Effective Rainfall and Crop Water Needs using Data Mining
Techniques”, International Conference on Technological Innovations in ICT For Agriculture and Rural Development, IEEE-2017.
6. Chandrasegar Thirumalai, M Lakshmi Deepak, K Sri Harsha, K Chaitanya Krishna, “Heuristic Prediction of Rainfall Using Machine
Learning Techniques”, International Conference on Trends in Electronics and Informatics ICEI 2017.
7. Minghui Qiu, Peilin Zhao, Ke Zhang, Jun Huang, Xing Shi, Xiaoguang Wang, Wei Chu, “A Short-Term Rainfall Prediction Model
using Multi-Task Convolutional Neural Networks”, International Conference on Data Mining, IEEE-2017.
8. Valmik B Nikam, B.B.Meshram, “Modeling Rainfall Prediction Using Data Mining Method: A Bayesian Approach”, Fifth
International Conference on Computational Intelligence, Modelling and Simulation, IEEE-2013.
9. A.Geetha, Dr. G.M.Nasira, “Data Mining for Meteorological Applications: Decision Trees for Modeling Rainfall Prediction”,
International Conference on Computational Intelligence and Computing Research, IEEE-2014.
10. Soo-Yeon Ji, Sharad Sharma, Byunggu Yu, Dong Hyun Jeong, “Designing a Rule-Based Hourly Rainfall Prediction Model, IEEE IRI
August 8-10, 2012.
11. R. Sukanya, K. Prabha,” Comparative Analysis for Prediction of Rainfall using Data Mining Techniques with Artificial Neural
Network”, International Journal of Computer Sciences and Engineering, ISSN: 2347-2693, IJCSE-2017.
12. Fahad Sheikh, S. Karthick, D. Malathi, J. S. Sudarsan, C. Arun, “Analysis of Data Mining Techniques for Weather Prediction”, Indian
Journal of Science and Technology, Vol 9(38), ISSN (Print): 0974-6846, IJST-2016.
13. Ramsundram N, Sathya S, Karthikeyan S, “Comparison of Decision Tree Based Rainfall Prediction Model with Data Driven Model
Considering Climatic Variables”, Irrigation Drainage Sys Eng, an open access journal ISSN: 2168-9768, 2016.
14. Bhaskar Pratap Singh, Pravendra Kumar, Tripti Srivastava, Vijay Kumar Singh, “Estimation of Monsoon Season Rainfall and
Sensitivity Analysis Using Artificial Neural Networks”, Indian Journal of Ecology (2017) 44 (Special Issue-5): 317-322.

Authors: S.Krishnaraj, A.Ravinthiran, S.Ganapathy, A.G.S.Siddharth, K.Karan,

Paper Title: Automatic Solar Panel Tracking System


Abstract: Solar Energy is the one of best renewable source of alternative energy. The efficiency of the solar
panel can be improved more by tracking it in such way that it always faces perpendicular to the sun-rays
throughout the day rather than it is kept fixed at an angle. At present, there are three methods for solar tracking,
out of which refrigerant method is found to be more efficient as it is of a passive type and requires no external
power source for its operation. In this project we have used R-134a [Tetrafluoroethene (CF3CH2F)] as the
refrigerant medium for tracking the panel. To store the refrigerant, we have made use of two canisters and a
copper conduit for connecting the canisters. The tracking system works on the principle of Differential Pressure
Controlled system where high-pressure refrigerant from one canister to other flows and due to imbalance in the
weight of canisters, the panel will tilt in the direction of the side where the weight is high due to gravity. Thus,
our main objective is to harvest more solar energy at a much lower cost than the available trackers.

Keyword : Passive tracking, Differential Pressure Controlled system, R-134a, Canister, Conduit.
References:
1. Mostefa Ghassoul, “Single axis automatic tracking system based on PILOT scheme to control the solar panel to optimize solar e nergy
extraction”, Energy Reports, Volume 4, November 2018, Pages 520-527.
2. R.G. Vieira, F.K.O.M.V. Guerra, M.R.B.G. Vale, M.M. Araújo, “Comparative performance analysis between static solar panels and
single-axis tracking system on a hot climate region near to the equator”, Renewable and Sustainable Energy Reviews, Volume 64,
October 2016, Pages 672-681.
3. S.A. Sharaf Eldin, M.S. Abd-Elhady, H.A. Kandil, “Feasibility of solar tracking systems for PV panels in hot and cold regions”,
Renewable Energy, Volume 85, January 2016, Pages 228-233.
4. Ali H. ALmukhtar, “Design of Phase Compensation for Solar Panel Systems for Tracking Sun”, Energy Procedia, Volume 36, 2013,
Pages 9-23.
5. H. Bentaher, H. Kaich, N. Ayadi, M. Ben Hmouda, A. Maalej, U. Lemmer, “A simple tracking system to monitor solar PV panels”,
43. Energy Conversion and Management, Volume 78, February 2014, Pages 872-875.
6. S. Aziz, S. Hassan, “On Improving the Efficiency of a Solar Panel Tracking System”, Procedia Manufacturing, Volume 7, 2017, Pages
218-224. 264-269
7. Hyuna Kang, Taehoon Hong, Seunghoon Jung, Minhyun Lee, “Techno-economic performance analysis of the smart solar photovoltaic
blinds considering the photovoltaic panel type and the solar tracking method”, Energy and Buildings, Volume 193, 15 June 2019 , Pages
1-14.
8. M.A. Abdelghani-Idrissi, S. Khalfallaoui, D. Seguin, L. Vernières-Hassimi, S. Leveneur, “Solar tracker for enhancement of the thermal
efficiency of solar water heating system”, Renewable Energy, Volume 119, April 2018, Pages 79-94.
9. Kee-Hoon Kim, Sung-Bae Cho, “An efficient concentrative photovoltaic solar system with Bayesian selection of optimal solar tracking
algorithms”, Applied Soft Computing, Volume 83, October 2019, 105618.
10. Chao-Kai Yang, Tsung-Chieh Cheng, Chin-Hsiang Cheng, Chi-Chia Wang, Chang-Chun Lee, “Open-loop altitude-azimuth
concentrated solar tracking system for solar-thermal applications”, Solar Energy, Volume 147, 1 May 2017, Pages 52-60.
11. Nadia AL-Rousan, Nor Ashidi Mat Isa, Mohd Khairunaz Mat Desa, “Advances in solar photovoltaic tracking systems: A review”,
Renewable and Sustainable Energy Reviews, Volume 82, Part 3, February 2018, Pages 2548-2569.
12. Hao Zhong, Guihua Li, Runsheng Tang, Wenli Dong, “Optical performance of inclined south–north axis three-positions tracked solar
panels”, Energy, Volume 36, Issue 2, February 2011, Pages 1171-1179.
13. Wafa Batayneh, Ahmad Bataineh, Ibrahim Soliman, Saleh Abed Hafees, “Investigation of a single-axis discrete solar tracking system
for reduced actuations and maximum energy collection”, Automation in Construction, Volume 98, February 2019, Pages 102 -109.
14. Junbin Zhang, Zhuojun Yin, Peng Jin, “Error analysis and auto correction of hybrid solar tracking system using photo sensors and
orientation algorithm”, Energy, Volume 182, 1 September 2019, Pages 585-593.
15. Zhengcao Hua, Chao Ma, Mancang Ma, Lingling Bin, Xiulan Pang, “Operation characteristics of multiple solar trackers under typical
weather conditions in a large-scale photovoltaic base”, Energy Procedia, Volume 158, February 2019, Pages 6242-6247.
16. Masoumeh Abdollahpour, Mahmood Reza Golzarian, Abbas Rohani, Hossein Abootorabi Zarchi, “Development of a machine vision
dual-axis solar tracking system”, Solar Energy, Volume 169, 15 July 2018, Pages 136-143.
17. A.Z. Hafez, A.M. Yousef, N.M. Harag, “Solar tracking systems: Technologies and trackers drive types – A review”, Renewable and
Sustainable Energy Reviews, Volume 91, August 2018, Pages 754-782.
18. Yasser M. Safan, S. Shaaban, Mohamed I. Abu El-Sebah, “Performance evaluation of a multi-degree of freedom hybrid controlled dual
axis solar tracking system”, Solar Energy, Volume 170, August 2018, Pages 576-585.
19. Jose A. Carballo, Javier Bonilla, Lidia Roca, Manuel Berenguel, “New low-cost solar tracking system based on open source hardware
for educational purposes”, Solar Energy, Volume 174, 1 November 2018, Pages 826-836.
20. Jerin Kuriakose Tharamuttam, Andrew Keong Ng, “Design and Development of an Automatic Solar Tracker”, Energy Procedia,
Volume 143, December 2017, Pages 629-634.

Authors: K. Indupriya, Anna Saro Vijendran


Image Denoising with Recurrent Polak-Ribière-Polyak Conjugate Gradient-Based Neuro-Fuzzy
Paper Title:
Edge-Preserving Segmentation Based on OAMNHA
Abstract: The most essential process in image processing applications is eliminating the noisy pixels from the
44. images and acquiring the noise-free images with better reconstructed quality. This process has high complexity
due to the segmentation of image patches from the noisy images. To simplify this process, Neuro-Fuzzy filtering
with Optimum Adaptive parameterized Mask Non-Harmonic Analysis in Curvelet Transform domain (NF- 270-276
OAMNHA-CT) has been proposed for image denoising. It uses NF edge detector instead of canny edge detector
for segmenting and preserving the edge regions including homogeneous texture boundaries with minimized edge
distortion. However, it requires gradient information about the error function with respect to the parameter
measures during training of NF for optimizing their parameters. Also, it often affects with the fixed local
minima. Therefore in this article, Recurrent Polak- Ribière-Polyak Conjugate Gradient-Based Neuro-Fuzzy
(RPCGNF-OAMNHA-CT) technique is proposed to enhance the edge-preserving segmentation in image
denoising. At first, the noisy images are defined in the CT domain and fed to the RPCGNF edge detector as
edge-preserving segmentation that segments and extracts the edge regions as well as homogeneous texture
regions. In this RPCGNF technique, recurrent mechanism is applied to construct PCGNF as an updated edge-
preserving segmentation technique that learns their parameters with high efficiency and speeding up the
convergence. As a result, the edge regions and homogeneous textures are synchronously segmented as noisy
pixels until either the PCGNF converges to the desired accuracy of segmentation or a termination criterion is
reached. Further, OAMNHA is applied on each segment to remove the noisy pixels from the images and obtain
the noise-free images accurately. Finally, the experimental results illustrate the proposed RPCGNF-OAMNHA-
CT technique achieves higher efficiency than the NF-OAMNHA-CT technique in terms of Peak Signal-to-Noise
Ratio (PSNR), Mean Absolute Error (MAE) and Structural Similarity (SSIM).

Keyword : Image denoising, Edge-preserving segmentation, NF-OAMNHA-CT, Polak-Ribière-Polyak


Conjugate Gradient method, Recurrent mechanism, Convergence
References:
1. F. Hosotani, Y. Inuzuka, M. Hasegawa, S. Hirobayashi and T. Misawa, “Image Denoising With Edge-Preserving and Segmentation
Based on Mask NHA,” IEEE Trans. Image Process., vol. 24, no. 12, pp. 6025-6033, 2015.
2. K. Indupriya and G. P. R. Kumar, “An Optimum Adaptive Parameterized Mask NHA Based Image Denoising,” Int. J. Eng. Technol.,
vol. 9, no. 3, pp. 2389-2399, 2017.
3. A. S. Vijendran and K. Indupriya, “Image Denoising by Optimum Adaptive Parameterized Mask NHA in Various Frequency
Domains,” Int. J. Pure Appl. Math., vol. 119, no. 18, pp. 3405-3413, 2018.
4. K. Indupriya and A. S. Vijendran, “An enhancement of edge preservation in OAMNHA denoising using texture boundaries,” in
Kalasalingam Global Conference, International Conference on Sustainable Development, 2019.
5. X. Y. Wang, Y. C. Liu, N. Zhang, C. J. Wu and H. Y. Yang, “An edge-preserving adaptive image denoising,” Multimed. Tools Appl.,
vol. 74, no. 24, pp. 11703-11720, 2015.
6. X. Fu, Y. Wang, L. Chen and J. Tian, “An image despeckling approach using quantum-inspired statistics in dual-tree complex wavelet
domain,” Biomed. Signal Process. Control, vol. 18, pp. 30-35, 2015.
7. M. B. Abdallah, J. Malek, A. T. Azar, H. Belmabrouk, J. E. Monreal and K. Krissian, “Adaptive noise-reducing anisotropic diffusion
filter,” Neural Comput. Appl., vol. 27, no. 5, pp. 1273-1300, 2016.
8. J. Xu, Y. Jia, Z. Shi and K. Pang, “An improved anisotropic diffusion filter with semi-adaptive threshold for edge preservation,” Signal
Process., vol. 119, pp. 80-91, 2016.
9. H. K. Rafsanjani, M. H. Sedaaghi and S. Saryazdi, “An adaptive diffusion coefficient selection for image denoising,” Digit. Signal
Process., vol. 64, pp. 71-82, 2017.
10. V. Fedorov and C. Ballester, “Affine non-local means image denoising,” IEEE Trans. Image Process., vol. 26, no. 5, pp. 2137-2148,
2017.
11. H. R. Shahdoosti and S. M. Hazavei, “Image denoising in dual contourlet domain using hidden Markov tree models,” Digit. Signal
Process., vol. 67, pp. 17-29, 2017.
12. F. Guo, C. Zhang and M. Zhang, “Edge-preserving image denoising,” IET Image Process., vol. 12, no. 8, pp. 1394-1401, 2018.
13. http://live.ece.utexas.edu/research/quality/subjective.htm

Authors: P. Vijaya Rajan, T. Babu, G.KarthikPandiyan, D. Venkatragavan, R. Shanmugam

Paper Title: Auxillary Safety Locking System of Vehicle Doors using Arduino
Abstract: The main aim of the project is to prevent the Dooring accidents and to provide safety for the
passengers and pedestrians. We are eliminating this problem by the use of Auxiliary Safety locking system
connected to each door of the vehicle using Arduino. To prevent accident due to passenger’s carelessness, the
upcoming vehicle is sensed using an ultrasonic sensor and the doors of the vehicle are locked automatically. Due
to this, the passengers can’t open their car door from inside while the vehicle is moving towards the car. After
the vehicle is passed, the doors are unlocked.

Keyword : Arduino IDE, Fritzing, Motor drive L298N


References:
1. Otte D, Pund B, Jänsch M"A new approach of accident causation analysis by seven steps", ACASS 21st International Technical
45. Conference on the Enhanced Safety of Vehicles (ESV), 2009, Stuttgart, Germany.
2. M. Jänsch, D. Otte, H. Johannsen," Investigation of bicycle accidents involving collisions with the opening door of parking vehicles and
demands for a suitable driver assistance system”, Journal of Safety Research. 8 (4): 126-139. 277-281
3. YoungK.John Abraham ,"Reduce Risk: Be Alert: Doors Are Dangerous". Cambridge Street Code - Rules & Etiquette for GettingThere
Together (Report). Massachusetts, USA: City of Cambridge. December 2016. p. 9. Retrieved June 25, 2018
4. The World staff (September 27, 2016). "This easy maneuver, borrowed from the Dutch, could be life-saving for cyclists". The World.
Public Radio International. Retrieved July 13,2018.
5. Macmillan, Thomas (August 5, 2013). "Danger: Drivers Dooring Cyclists". New Haven, CT: New Haven Independ ent. Retrieved June
28, 2018.
6. S. Peter Olsen "7th International Cycling Safety Conference 2018". ICSC 2018. International Cycling Safety Community. October 10,
2018. Retrieved July 10, 2018.
7. Lott, D. F.; Lott, D. L. (1976). "Effect of Bike Lanes on Ten Classes of Bicycle-Automobile Accidents in Davis, California". Journal of
Safety Research. 8 (4): 171–179.
8. Brain.W. Evans, Digital I/O, Arduino Programming Notebook
9. Michael McRoberts, Chapter14, Ultrasonic Rangefinders, Beginning Arduino, 2nd edition
10. Alan. G. Smith, Sensors Galore, Introduction to Arduino, 2011 Edition
Authors: Ashwini Kore, Shailaja Patil
Internet of Things (IoT) Enabled Wireless Sensor Networks Security Challenges and Current
Paper Title:
Solutions
Abstract: Nowadays Internet of Things (IoT) is emerging and effective technology along with Wireless
Sensor Networks (WSNs) in a few constant applications in which the human intervention significantly reduced
along with better human life. In IoT enabled WSNs, the sensor nodes used to assemble the fragile data and
communicate towards the sink hub and actuators for automotive remote monitoring process. However as the
WSNs operating at free frequency band, it is powerless against different attacks at various layers of WSNs
protocol stack in which attackers may try to hack and compromise the user’s personal information. There are
different types of attacks in WSNs and several research works conducted to protect from these attacks in WSNs.
Majority of security methods proposed are based layered technique. However, the layer approach is not enough
to protect the WSNs effectively as the many attackers used the cross-layer information to perform the attacks.
This paper presents the study over the layered security solutions and their research problems at first to justify the
importance of cross-layer solutions. The review of different ways of designing the cross-layer security
techniques for WSNs with their behaviour presented as well. The challenges of IoT enabled WSNs single
layered security solutions presented and then the various cross-layer solutions reviewed in this paper. The
comparative study of different cross-layer techniques to demonstrate the layers and their parameters involved to
detect of security threats. The outcome of this review work is the research challenges noticed from the present
cross-layer solutions.

Keyword : Attacks, cross-layer attacks, cross-layer solutions, layered solutions, Internet of Things, wireless
sensor networks.
References:
1. G Sarita A., Manik L. D.: Internet of Things –A Paradigm Shift of Future Internet Applications. Institute of technology Nirma
University, 1–7 (2011).
2. Al-Fuqaha, Ala, Mohsen Guizani, Mehdi Mohammadi, Mohammed Aledhari, and Moussa Ayyash. “Internet of things: A survey on
enabling technologies, protocols, and applications.”Communications Surveys & Tutorials, IEEE 17, no. 4 (2015): 2347 –2376.
3. Markus Schumacher, Eduardo Fernandez-Buglioni, Duane Hybertson, Frank Buschmann, Peter Sommerlad, Security Patterns-
Integrating Security and System Engineering, John Wiley & Sons, Ltd., 2006.
4. William Stallings, Cryptography and Network Security Principles and Practices, Fourth Edition, Prentice Hall, 2005
5. Sliman, Jamila Ben, Ye-Qiong Song, Anis Koubâa, and Mounir Frikha. “A three-tiered architecture for large-scale wireless hospital
sensor networks.” In Workshop Mobi Health Infin conjunction with BIOSTEC, p. 64. 2009.
6. Kirby, Karen K. “Hours per patient day: not the problem, nor the solution.”Nursing Economics 33, no. 1 (2015): 64.
7. Prakash, R., Ganesh, A. B. and Girish, S. V., 2016. Cooperative wireless network control based health and activity monitoring system.
46. Journal of medical systems, 40(10), p. 216.
8. Prakash, R., Ganesh, A. B. and Sivabalan, S., 2017. Network Coded Cooperative Communication in a Real-Time Wireless Hospital
Sensor Network. Journal of medical systems, 41(5), p. 72. 282-290
9. Rabaey J, Ammer J, Silva JL, Patel D (2000). PicoRadio: Ad hoc Wireless Networking of Ubiquitous Low-Energy Sensor/Monitor
Nodes. Workshop on VLSI: pp. 9-14.
10. Ray Hunt, Network Security: The Principles of Threats, Attacks and Intrusions, part1 and part 2, APRICOT, 2004.
11. Ehab Al-Shaer, “Network Security Attacks I: DDOS”, DePaul University, 2007.
12. Idrees SK, Chee-Onn C, Hiroshi I, Tanveer AZ (2010). Threat Models and Security Issues in Wireless Sensor Networks ''proc. (ICINC
2010), 1: 384-389. Kuala Lumpur, Malaysia.
13. Yang H, Luo H, Ye F, Lu S, Zhang L (2004). Security in Mobile Ad Hoc
14. Networks: Challenges and Solutions. IEEE Wireless Communications, 11(1): 38-47
15. Ganeriwal, S.; Srivastava, M.B. Reputation-based framework for high integrity sensor networks ACM Trans. Sens. Netw. 2008, 4, 1–
37.
16. Momani, M.; Subhash, C. GTRSSN: Gaussian trust and reputation system for sensor networks. Adv. Comput. Inform. Sci. Eng. 2008,
2008, 343–347.
17. Shaikh, R.A.; Jameel, H.; D’Auriol, B.J.; Lee, H.J.; Lee, S.Y.; Song, Y.-J. Group based trust management scheme for clustered wireless
sensor networks. IEEE Trans. Parallel. Distrib. Syst. 2009, 20, 1698–1712.
18. Feng, R.; Xu, X.; Zhou, X.; Wan, J. A trust evaluation algorithm for wireless sensor networks based on node behaviors and d -s
evidence theory. Sensors 2011, 11, 1345–1360.
19. Daojing, H.; Chun, C.; Chan, S.; Bu, J.; Vasilakos, A.V. ReTrust: Attack-resistant and lightweight trust management for medical sensor
networks. IEEE Trans. Inform. Technol. Biomed. 2012, 16, 623–632.
20. Wu, R.; Deng, X.; Lu, R.; Shen, X. Trust-based anomaly detection in wireless sensor networks. In Proceedings of the 1st IEEE
International Conference on Communications in China: Communications Theory and Security, Beijing, China, 15–17 August 2012; pp.
203–207.
21. Marzi, H.; Li, M. An enhanced bio-inspired trust and reputation model for wireless sensor network. Procedia Comput. Sci. 2013, 19,
1159–1166.
22. Shao, N.; Zhou, Z.; Sun, Z. A Lightweight and Dependable Trust Model for Clustered Wireless Sensor Networks. In Proceedings of the
International Conference on Cloud Computing and Security, Nanjing, China, 13–15 August 2015; pp. 157–168.
23. Ganeriwal, S.; Balzano, L.K.; Srivastava, M.B. Reputation based framework for high integrity sensor networks. In Proceedings of the
2nd ACM Workshop Security Ad Hoc Sensor Network, Washington, DC, USA, 25–29 October 2004; pp. 66–77.
24. Luo, W.; Ma, W.; Gao, Q. A dynamic trust management system for wireless sensor networks. Sec. Commun. Netw. 2016, 9, 613–621.
25. Atakli, I.M.; Hu, H.; Chen, Y.; Ku,W.S.; Su, Z. Malicious node detection in wireless sensor networks using weighted trust eva luation.
In Proceedings of the Symposium on Simulation of Systems Security, Ottawa, ON, Canada, 14–17 April 2008; pp. 836–843.
26. Ishmanov, F.; Malik, S.A.; Kim, S.W.; Begalov, B. Trust management system in wireless sensor networks: Design considerations and
research challenges. Trans. Emerg. Telecomun. Technol. 2013, 2013, doi:10.1002/ett.2674
27. Yao, Z.; Kim, D.; Doh, Y. PLUS: Parameterized and localized trust management scheme for sensor networks security. In Proceedings
of the IEEE International Conference on Mobile Ad hoc & Sensor System, Vancouver, BC, Canada, 9–12 October 2006; pp. 437–446.
28. Li, X.; Zhou, F.; Du, J. A lightweight and dependable trust system for clustered wireless sensor networks. IEEE Trans. Inf. Forensics
Secur. 2013, 8, 924–935.
29. Jiang, J.; Han, G.; Wang, F.; Shu, L.; Guizani, M. An efficient distributed trust model for wireless sensor networks. IEEE Trans.
Parallel Distrib. Syst. 2015, 26, 1228–1237.
30. Ishmanov, F.; Kim, S.W.; Nam, S.Y. A robust trust establishment scheme for wireless sensor networks. Sensors 2015, 15, 7040–7061.
31. Bao, F.; Chen, I.R.; Chang, M.; Chao, J.H. Trust-based intrusion detection in wireless sensor networks. In Proceedings of the IEEE
International Conference on Communications, Kyoto, Japan, 5–9 June 2011; pp. 1–6.
32. Bao, F.; Chen, I.R.; Chang, M.; Chao, J.H. Hierarchical trust management for wireless sensor networks and its applications to trust-
based routing and intrusion detection. IEEE Trans. Netw. Serv. Manag. 2012, 9, 169–183.
33. Zhang, T.; Yan, L.; Yang, Y. Trust evaluation method for clustered wireless sensor networks based on cloud model. Wirel. Netw. 2016.
34. Rajeshkumar, G.; Valluvan, K.R. An Energy Aware Trust Based Intrusion Detection System with Adaptive Acknowledgement for
wireless sensor network. Wirel. Pers. Commun. 2016.
35. U. Ghugar, J. Pradhan, S. K. Bhoi, R. R. Sahoo, and S. K. Panda, “PL-IDS: physical layer trust based intrusion detection system for
wireless sensor networks,” International Journal of Information Technology, vol. 10, no. 4, pp. 489–494, 2018.
36. Aslam J, Li Q, Rus D, “Three power-aware routing algorithms for sensor networks,” WCMC, 2 (3): 187-208, 2003.
37. Madden SR, Franklin MJ, Hellerstein JM, and Hong W, “TAG: a Tiny Aggregation service for ad-hoc sensor networks,” Proc. OSDI,
2002.
38. Yu Z, and Guan Y, “A robust group-based key management scheme for wireless sensor networks,” IEEE WCN C, 4: 13-17, 2005.
39. Mingbo X, Xudong W, and Guangsong Y, “Cross-Layer Design for the Security of Wireless Sensor Networks,” Proceedings of the 6 th
WCICA, 2006.
40. Slijepcevic S, and Potkonjak M, “On Communication Security in Wireless Ad-Hoc Sensor Networks,” Eleventh IEEE International
WETICE, 1(1): 139-144, 2002.
41. Qi X, and Ganz A, “Runtime security composition for sensor networks (SecureSense),” VTC 2003-Fall, 5: 2976-2980, 2003.
42. G. Thamilarasu, A. Balasubramanian, S. Mishra, and R. Sridhar, “A Cross-Layer Based Intrusion Detection Approach for Wireless Ad
Hoc Networks,” in Proc. of IEEE International Conference on Mobile Adhoc and Sensor Systems,Washington, DC, USA, Nov. 2005.
43. X. Liu, G. Noubir, R. Sundaram, and S. Tan, “SPREAD: Foiling Smart Jammers Using Multi-Layer Agility,” in IEEE International
Conference on Computer Communications (INFOCOM), Anchorage, AK, USA, May. 2007, pp. 2536–2540.
44. V. Toubiana and H. Labiod, “A Cross Layer Attack against MANET Cooperation Enforcement Tools,” in IEEE
InternationalConference on Networks, Dec. 2008, pp. 1–5.
45. Kalpana S, and Ghose MK, “Cross Layer Security Framework for Wireless Sensor Networks”, IJSA, 5(1): 39-52, 2011.
46. Gandhimathi, L., and G. Murugaboopathi ”Cross layer intrusion detection and prevention of multiple attacks in Wireless Sensor
Network using Mobile agent,” Information Communication and Embedded Systems (ICICES), 2016 International Conference on.
IEEE, 2016.
47. K. Hasan, S. Shetty, and T. Oyedare, “Cross Layer Attacks on GSM Mobile Networks Using Software Defined Radios,” in IEEE
Annual Consumer Communications Networking Conference (CCNC), Las Vegas, NV, USA, Jan 2017, pp. 357–360.
48. Sathya, D, and Krishneswari, K, “Cross –Layer Intrusion Detection System for Wireless Sensor Networks,” Journal of Scientific &
Industrial Research, Vol. 75, April 2016, pp. 213-220.
49. S Aryai, and Govind Binu, “Cross layer approach for detection and prevention of Sinkhole Attack using a mobile agent,” 2nd
International Conference on Communication and Electronics Systems (ICCES), 2017, pages=359-365.
50. Reema Kumari and Kavita Sharma, “Cross-Layer Based Intrusion Detection and Prevention for Network,” Handbook of Research on
Network Forensics and Analysis Techniques, 2018, Pages: 19.
51. Amira Ben Ammar, Ali Dziri, Michel Terre, and Habib Youssef, “Cross-Layer Approach Based Energy Minimization for Wireless
Sensor Networks,” Wireless Personal Communications: An International Journal, Volume 98 Issue 2, January 2018, Pages 2211-2221.
52. Md. Motaharul Islam, Ali Alzahrani, Mohammad Raihan Kabir, and Rifat Rahma, “Honeypot based Cellular Cross-layer Intrusion
Detection and Response,” IJCSNS International Journal of Computer Science and Network Security, VOL.18 No.6, June 2018.
53. Jiawei Tan, Anfeng Liu, Ming Zhao, Hailan Shen, and Ming Ma, “Cross-layer design for reducing delay and maximizing lifetime in
industrial wireless sensor networks,” EURASIP Journal on Wireless Communications and Networkingvolume 2018, Article number:
50 (2018).
54. Imen Bouabidi1 and Pr. Mahmoud Abdellaoui, “Cross layers security approach via an implementation of data privacy and by
authentication mechanism for mobile WSNs,” Advances in Science, Technology and Engineering Systems Journal Vol. 2, No. 1, 97-
107 (2017).
55. Nabil Ali Alrajeh, Shaullah khan, Jaime Lloret, and Jonathan Loo, “Secure Routing Protocol Using Cross-Layer Design and Energy
Harvesting in Wireless Sensor Networks,” Hindawi Publishing Corporation, International Journal of Distributed Sensor Networks,
Volume 2013, Article ID 374796,11 page.
56. Amar Amouri, Salvatore D. Morgera, Mohamed A. Bencherifm and Raju Manthena, “A Cross-Layer, Anomaly-Based IDS for WSN
and MANET,” Sensors 2018, 18, 651; doi:10.3390/s18020651.
57. Liyang Zhang, Francesco Restuccia, Tommaso Melodia, and Scott M. Pudlewski, “Taming Cross-Layer Attacks in Wireless Networks:
A Bayesian Learning Approach,” IEEE Transactions on Mobile Computing, Volume: 18, Issue: 7, July 1 2019.
58. ARYA I S, Dr. BINU G S, “Cross Layer Approach For Detection and Prevention Of Sinkhole Attack Using A Mobile Agent,”
Proceedings of the 2nd International Conference on Communication and Electronics Systems (ICCES 2017), IEEE Xplorer.
59. Davi Resner, Gustavo Medeiros de Araujo, and Antônio Augusto Fröhlich, “Design and implementation of a cross-layer IoT protocol,”
Science of Computer Programming, Volume 165, 1 November 2018, Pages 24-37.
60. P. T. Sharavanan & D. Sridharan, & R. Kumar, “A Privacy Preservation Secure Cross Layer Protocol Design for IoT Based Wireless
Body Area Networks Using ECDSA Framework,” Journal of Medical Systems (2018) 42:196.
61. JianWang, Shuai Jiang, and Abraham O. Fapojuwo, “A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor
Networks,” Sensors 2017, 17, 1227; doi:10.3390/s17061227.
62. Umashankar Ghugar, Jayaram Pradhan, Sourav Kumar Bhoi , and Rashmi Ranjan Sahoo, “LB-IDS: Securing Wireless Sensor Network
Using Protocol Layer Trust-Based Intrusion Detection System,” Hindawi Journal of Computer Networks and Communications,
Volume 2019, Article ID 2054298, 13 pages.

Authors: Idawati, Anna Fatchiya, Dafit Ariyanto


Sustainable Cocoa Farming Strategies in Overcoming the Impact of Climate Change Through SEM
Paper Title:
PLS 2
Abstract: Most cocoa plantations have undergone changes and sustained damage due to climate change. The
objectives of the present study were to identify sustainable cocoa farming strategies in the effort to overcome
climate change effects in regencies; and to analyze sustainable business strategies in overcoming the effects of
climate change; This study was conducted from June to August 2018 in Luwu and North Luwu Regencies, South
47. Sulawesi Province. Data collection was carried out through interviews with 282 farmers and interviews
conducted on five key informants. Descriptive statistical analysis was conducted in the form of a frequency
291-297
distribution table using Excel program and SPSS version 24. Model implementation strategies in overcoming
climate change effects were designed based on the SEM PLS 2. The results revealed that the effort to overcome
climate change effects in the development of the cocoa agribusiness and the farmers’ social relationships were
high, while preservation of environmental conditions was in the low category. Conclusion : Sustainable cocoa
farming strategies in the effort to overcome climate change effects consisted of adaptation climate
accompaniment extension strategies, increasing government support strategies, and farmer character
improvement strategies in overcoming climate change effects.

Keyword : climate change, cocoa, farmer


References:
1. Agricultural Ministry. Adaptation to Climate Change in the Agriculture Sector. Agricultural Research and Development Agency,
Ministry of Agriculture. Agricultural Research and Development Agency, Agricultural Ministry; 2011. 73 p.
2. Feola G, Lerner AM, Jain M, Montefrio MJF, Nicholas KA. Researching farmer behaviour in climate change adaptation and sustainable
agriculture: Lessons learned from five case studies. J Rural Stud [Internet]. 2015;39:74–84. Available from:
http://dx.doi.org/10.1016/j.jrurstud.2015.03.009
3. Gallopín GC. Linkages between vulnerability, resilience, and adaptive capacity. Glob Environ Chang. 2006;16(3):293–303.
4. Stirling C, J H, J C, E S-B, T T, H N, et al. Shaping Sustainable Intensive Production Systems - Improved Crops and Cropping Systems
in the Developing World. In: Climate Change Impact and Adaptation in Agricultural Systems. Fuhrer J,. Wallingford, United Kingdom:
CABI; 2008. 1–298 p.
5. Ruhimat SI. Sustainability Status of Agroforestry in Private Lands: A Case Study in Rancah, Ciamis Regency , West Java. J Pen elit Sos
dan Ekon Kehutan. 2015;12(2):99–110.
6. Basiago AD. Economic, social, and environmental sustainability in development theory and urban planning practice. Environmentalist.
1998;19(2):145–61.
7. FAO. The State of Agricultural Commodity Markets: Agricultural Trade, Climate Change and Food Security. Rome; 2018. 1–112 p.
8. Asante WA, Acheampong E, Kyereh E, Kyereh B. Farmers’ perspectives on climate change manifestations in smallholder cocoa farm s
and shifts in cropping systems in the forest-savannah transitional zone of Ghana. Land use policy. 2017;66:374–
81.http://dx.doi.org/10.1016/j.landusepol.2017.05.010
9. Idawati, Fatchiya, Tjitropranoto. Kapasitas Adaptasi Petani Kakao terhadap Perubahan Iklim. J Tabaro. 2018;2(1):178 –90.

Authors: Georg Rockel, Linard Barth

Paper Title: IT Requirements in The Real Estate Sector


Abstract: Digitalization has reached the German real estate market. IT requirements have to be defined and
followed. The state, companies and private households must implement appropriate requirements and take
measures to jointly guarantee data protection and data security to be armed against cybercrime, and thus promote
digitalization. Suitable measures will be examined here. IT facilitates many things but is also an instrument that
can be abused also exploited, as it is operated by people. To be able to implement constant and secure overall
solutions and concepts, this paper examines individual aspects in more detail and provides appropriate
recommendations.

Keyword : GDPR, data protection, data security, cybercrime, real estate, IT security, threats of the Internet.
References:
1. R. Dobler, and D. Ittstein, “Digitalisierung. Interdisziplinär,“ p. 2, 2018
2. G. Vornholz, “Digitalisierung der Immobilienwirtschaft,“ page25, 2019
3. Statista GmbH, (2019. September 20). Umfrage zum zukünftigen Einfluss von Megatrends auf den Immobilienmarkt in Deutschland
[Online] Available: https://de.statista.com/statistik/daten/studie/797769/umfrage/umfrage-zum-zukuenftigen-einfluss-von-megatrends-
auf-den-deutschen-immobilienmarkt/
4. General Data Protection Regulation GDPR, (2019. September 20). [Online] Available: https://gdpr-info.eu/
5. W. Lassmann, “Wirtschaftsinformatik, Nachschlagewerk für Studium und Praxis“ vol. 1, p 400, 2006
6. Statista GmbH, (2019. September 20). DSGVO Konformität von Unternehmen in Deutschland [Online] Available
https://de.statista.com/infografik/13651/dsgvo-konformitaet-von-unternehmen-in-deutschland/
7. General Data Protection Regulation GDPR, (2019. September 20). [Online] Available: https://gdpr-info.eu/
8. Bundesverband Informationswirtschaft, Telekommunikation und neue Medien e. V. (Bitkom), (2019. September 02). DSGVO
48. Aufwand im laufenden Betrieb [Online] Available: https://www.bitkom.org/Presse/Presseinformation/Kaum-Fortschritt-bei-der-
Umsetzung-der-Datenschutz-Grundverordnung.html#item-385
9. Statista GmbH, (2019. September 20). Meinungen zum Thema Datenschutz im Internet nach Geschlecht in Deutschland 2018 [Online] 298-308
Available https://de.statista.com/statistik/daten/studie/911174/umfrage/meinungen-zum-thema-datenschutz-im-internet-nach-
geschlecht-in-deutschland/
10. Statista GmbH, (2019. September 20). Umfrage zur Zuständigkeit für den Schutz von persönlichen Daten im Internet [Online]
Available https://de.statista.com/infografik/16771/umfrage-zur-verantwortung-beim-thema-datenschutz/
11. Statista GmbH, (2019. September 20). Umfrage zum Schutz persönlicher Daten von Jugendlichen im Netz in Deutschland 2018
[Online] Available https://de.statista.com/statistik/daten/studie/505798/umfrage/schutz-persoenlicher-daten-von-jugendlichen-im-netz/
12. Statista GmbH, (2019. September 20). Umfrage zum Datenschutzverhalten von Jugendlichen in Deutschland 2018 [Online] Available
https://de.statista.com/statistik/daten/studie/867410/umfrage/umfrage-zum-datenschutzverhalten-von-jugendlichen-in-deutschland/
13. A. Sodtalbers, C. Commerce, and A. Heise, “IT-Recht – Software-Recht, E-Commerce-Recht, Datenschutz-Recht“ p. 271, 2010
14. A. Sodtalbers, C. Commerce, and A. Heise, “IT-Recht – Software-Recht, E-Commerce-Recht, Datenschutz-Recht“ p. 271, 2010
15. Bundesamt für Sicherheit in der Informationstechnik, “Leitfaden Informationssicherheit – IT-Grundschutz kompakt,“ p. 11. 2011
[Online] Available: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Grundschutz/Leitfaden/GS-
Leitfaden_pdf.pdf?__blob=publicationFile&v=3
16. Statista GmbH, (2019. September 20). Einschätzung der Sicherheit von Daten im Internet in Deutschland bis 2018 [Online] Available
https://de.statista.com/statistik/daten/studie/217842/umfrage/sicherheit-von-persoenlichen-daten-im-internet/
17. Statista GmbH, (2019. September 20). Einschätzung der Sicherheit von persönlichen Daten im Internet in Deutschland 2019 [Online]
Available https://de.statista.com/statistik/daten/studie/872116/umfrage/einschaetzung-der-sicherheit-von-persoenlichen-daten-im-
internet-in-deutschland/
18. Bürgerliches Gesetzbuch Civil Law Book (2019. September 20), “Definition Verbraucher,“Vol 83 § 13 Verbraucher, 2019 [Online]
Available https://www.gesetze-im-internet.de/bgb/BJNR001950896.html
19. Startpage BV, (2019. September 20). The world's most private search engine [Online] Available https://www.startpage.com/
20. Statista GmbH, (2019. September 20). Einsatz von Maßnahmen zum Schutz vor Datenmissbrauch im Internet 2017 [Online] Available
https://de.statista.com/statistik/daten/studie/28771/umfrage/haltung-zu-sicherheitsrisiken-im-internet/
21. Produkthaftungsgesetz Product liability law (2019. September 20), “Definition Herrsteller, ProdHaftG § 4 Herrsteller, p. 2 [Online]
Available www.gesetze-im-internet.de/prodhaftg/ProdHaftG.pdf
22. Produkthaftungsgesetz Product liability law (2019. September 20), “Definition Produkt, ProdHaftG § 2 Produkt, p. 1 [Online]
Available www.gesetze-im-internet.de/prodhaftg/ProdHaftG.pdf
23. A. Yunlong Z. Zedtwitz, and D. Assimakopoulos, “Responsible Product Innovation: Putting Safety First” p. 289, 2017
24. R. Stair, and G. Reynolds, ”Principles of Information Systems”, p. 283, 2015
25. Quality management systems - Requirements (ISO 9001:2015), (2019. September 20) [Online] Available https://www.din.de/de/wdc-
beuth:din21:235671251
26. Bundesamt für Sicherheit in der Informationstechnik, (2019. September 20), „“ISO 27001 Zertifizierung auf Basis von IT-
Grundschutz“ [Online] Available
https://www.bsi.bund.de/DE/Themen/ZertifizierungundAnerkennung/Managementsystemzertifizierung/Zertifizierung27001/GS_Zertifi
zierung_node.html
27. E. Lauterschlag, (2019. September 20), “WLAN Verschlüsselung: Welche Methoden gibt es und welche ist am sichersten?“ [Online]
Available http://www.was-ist-malware.de/it-sicherheit/wlan-verschluesselung/
28. L. Nielsen, “ERP-Software in kleinen und mittelständischen Unternehmen: Ein optimiertes Vorgehensmodell,“ p. 11, 2014
29. Disha Experts “Olympiad Champs Cyber Class 7 with Past Olympiad Questions,” p. 138, 2018
30. HowStuffWorks, (2019. September 20), “How Web Servers Work” [Online] Available https://computer.howstuffworks.com/web-
server3.htm
31. Weka Medie publishing, (2019. September 20), “SpeedPort-Router zur Fritzbox machen” [Online] Available https://www.pc-
magazin.de/ratgeber/speedport-fritzbox-hack-firmware-modding-download-anleitung-tutorial-2309816.html
32. Heise Medien GmbH & Co. KG, (2019. September 20), “Facebook-Datenskandal” [Online] Available
https://www.heise.de/thema/Facebook_Datenskandal
33. Statista GmbH, (2019. September 20). Umfrage zur Nutzerreaktion auf Datenschutzvorwürfe gegen Facebook in Deutschland 2018
[Online] Available https://de.statista.com/statistik/daten/studie/821263/umfrage/nutzerreaktion-auf-datenschutzvorwuerfe-gegen-
facebook-in-deutschland/
34. Bundesamt für Sicherheit in der Informationstechnik, (2019. September 20), “ Datendiebstahl - BSI fordert verantwortungsvolles
Handeln der Betreiber“ [Online] Available
https://www.bsi.bund.de/DE/Presse/Kurzmeldungen/Meldungen/news_yahoo_BSI_fordert_verantwortungsvolles_Handeln_23092016.
html
35. Statista GmbH, (2019. September 20). Umfrage zu organisatorischen IT-Sicherheitsmaßnahmen in Unternehmen 2018 [Online]
Available https://de.statista.com/statistik/daten/studie/444794/umfrage/umfrage-zu-technischen-it-sicherheitsmassnahmen-in-
unternehmen/
36. Bundesverband Informationswirtschaft, Telekommunikation und neue Medien e. V. (Bitkom), (2019. September 20). “Datenschutz im
Internet – Eine repräsentative Untersuchung zum Thema Daten im Internet aus Nutzersicht,“ p. 23, 2011 [Online] Available
https://www.bitkom.org/sites/default/files/file/import/BITKOM-Publikation-Datenschutz-im-Internet.pdf
37. Compendio-Autorenteam, “Informatik für technische Kaufleute und HWD, Grundlagen mit Beispielen, Repetitionsfragen und
Antworten sowie Übungen,“ vol. 1, p. 167, 2009
38. Statista GmbH, (2019. September 20). Ausgaben für IT-Sicherheit in Deutschland bis 2019 [Online] Available
https://de.statista.com/statistik/daten/studie/1041736/umfrage/ausgaben-fuer-it-security-in-deutschland/
39. TechTarget Germany GmbH, (2019. September 20). “Data Center Infrastructure Management (DCIM),” [Online] Available
https://www.computerweekly.com/de/definition/Data-Center-Infrastructure-Management-DCIM
40. Research International Data Corporation, Inc. [Online] Available https://www.idc.com/about
41. TechTarget Germany GmbH, (2019. September 20). “Definition Zettabyte,” [Online] Available

42. https://www.computerweekly.com/de/definition/Zettabyte
43. Statista GmbH, (2019. September 20). Prognose zum weltweit generierten Datenvolumen 2025 [Online] Available
https://de.statista.com/statistik/daten/studie/267974/umfrage/prognose-zum-weltweit-generierten-datenvolumen/
44. Bundesverband Informationswirtschaft, Telekommunikation und neue Medien e. V. (Bitkom), (2019. September 20).“Datenschutz im
Internet – Eine repräsentative Untersuchung zum Thema Daten im Internet aus Nutzersicht,“ p. 21, 2011 [Online] Available
https://www.bitkom.org/sites/default/files/file/import/BITKOM-Publikation-Datenschutz-im-Internet.pdf
45. Statista GmbH, (2019. September 20). Polizeilich erfasste Fälle von Cyberkriminalität in Deutschland bis 2017 [Online] Available
https://de.statista.com/statistik/daten/studie/295265/umfrage/polizeilich-erfasste-faelle-von-cyberkriminalitaet-im-engeren-sinne-in-
deutschland/
46. Statista GmbH, (2019. September 20). Umfrage zu den Vorfällen von Cybercrime in Unternehmen weltweit 2017 [Online] Available
https://de.statista.com/statistik/daten/studie/499324/umfrage/vorfaelle-von-cybercrime-in-unternehmen-weltweit/
47. Bibliographisches Institut GmbH, „Duden - Deutsches Universalwörterbuch: Das umfassende Bedeutungswörterbuch der deutschen
Gegenwartssprache,“ vol. 8, p. 1159, 2016
48. Bibliographisches Institut GmbH, „Duden - Deutsches Universalwörterbuch: Das umfassende Bedeutungswörterbuch der deutschen
Gegenwartssprache,“ vol. 8, p. 1346, 2016
49. Bibliographisches Institut GmbH, „Duden - Deutsches Universalwörterbuch: Das umfassende Bedeutungswörterbuch der deutschen
Gegenwartssprache,“ [Online] Available https://www.duden.de/rechtschreibung/Social_Engineering
50. ITservice Sustemhaus, (2019. September 20). ”Webbasierte Angriffe steigt weiter an” [Online] Available http://www.pc-doktor-
blog.de/webbasierte-angriffe-steiger-weiter-an-mehr-als-4-500-angriffe-pro-tag/
51. Bibliographisches Institut GmbH, „Duden - Deutsches Universalwörterbuch: Das umfassende Bedeutungswörterbuch der deutschen
Gegenwartssprache,“ [Online] Available https://www.duden.de/rechtschreibung/Botnet
52. Kaspersky Labs GmbH, (2019. September 20). “What is Malicious Code?” [Online] Availablehttps://www.kaspersky.com/resource-
center/definitions/malicious-code
53. TechTarget Germany GmbH, (2019. September 20). “Definition Denial of Service (DoS),” [Online] Available
https://www.computerweekly.com/de/definition/Denial-of-Service-DoS
54. PINNOW & Partner Unternehmens- und Technologieberatungsgesellschaft mbH., (2019. September 20). “ Unterschätztes Risiko
Insider-Angriff,” [Online] Available https://www.datensicherheit.de/aktuelles/unterschaetztes-risiko-insider-angriff-27834
55. TechTarget Germany GmbH, (2019. September 20). “Definition Ransomware,” [Online] Available
https://www.computerweekly.com/de/definition/Ransomware
56. I. Sommerville, “Software Engineering“, vol. 8, p. 556, 2007
57. M. Hesseler, and M. Görtz, Marcus, “Basiswissen ERP-Systeme – Auswahl, Einführung & Einsatz betriebswirtschaftlicher
Standardsoftware“, vol. 1, p. 362, 2007
58. Statista GmbH, (2019. September 20). Umfrage in Deutschland zu Schutzmaßnahmen gegen Internetkriminalität 2018 [Online]
Available https://de.statista.com/prognosen/952937/umfrage-in-deutschland-zu-schutzmassnahmen-gegen-internetkriminalitaet
59. M. Wind, and D. Kröger, “Handbuch – IT in der Verwaltung“ p. 276,2006
60. Research International Data Corporation, Inc., (2019. September 20). “Mehr Mobilität erfordert bessere Lösungen für mehr Sicherheit
beim Einsatz mobiler Endgeräte“ [Online] Available https://www.it-times.de/news/idc-mehr-mobilitat-erfordert-bessere-losungen-fur-
mehr-sicherheit-beim-einsatz-mobiler-endgerate-12763/

Authors: N.Satyavathi, B.Rama,A.Nagaraju

49. Paper Title: Present State-of-The-ART of Dynamic Association Rule Mining Algorithms
Abstract: Association Rule Mining (ARM) is a data mining approach for discovering rules that reveal latent 309-316
associations among persisted entity sets. ARM has many significant applications in the real world such as
finding interesting incidents, analyzing stock market data and discovering hidden relationships in healthcare data
to mention few. Many algorithms that are efficient to mine association rules are found in the existing literature,
apriori-based and Pattern-Growth. Comprehensive understanding of them helps data mining community and its
stakeholders to make expert decisions. Dynamic update of association rules that have been discovered already is
very challenging due to the fact that the changes are arbitrary and heterogeneous in the kind of operations. When
new instances are added to existing dataset that has been subjected to ARM, only those instances are to be used
in order to go for incremental mining of rules instead of considering the whole dataset again. Recently some
algorithms were developed by researchers especially to achieve incremental ARM. They are broadly grouped
into Apriori-based and Pattern-Growth. This paper provides review of Apriori-based and Pattern-Growth
techniques that support incremental ARM.

Keyword : Data mining, incremental association rule mining, apriori-based, Pattern-Growth ARM algorithms.
References:
1. D. Cheung, J. Han, V. Ng, and C. Y. Wong. Maintenance of Discovered Association Rules in Large Databases: An Incremental
Updating Technique. Proceedings of the 12th International Conference on Data Engineering pages 106—114, February 1996.
2. D. Cheung, S. D. Lee, and B. Kao. A General Incremental Technique for Updating Discovered Association Rules. Proceedings of t he
Fifth International Conference On Database Systems for Advanced Applications pages 185—194, April 1997.
3. N. F. Ayan, A. U. Tansel, and M. E. Arkun. An Efficient Algorithm to Update Large Itemsets with Early Pruning. Proceedings of the 5th
ACM SIGKDD International Conference on Knowledge Discovery and Data Mining pages 287—291, August 1999.
4. S.D.Lee, David W.Cheung and Ben Kao, Is Sampling Useful in Data Mining? A Case in the Maintenance of Discovered Association
Rules, Data Mining and Knowledge Discovery, Volume 2 Issue 3, September 1998 Pages 233-262 Kluwer Academic Publishers
Hingham, MA, USA.
5. S.Thomas, S. Bodagala, K.Alsabti and S. Ranka. An Efficient Algorithm for the Incremental Updation of Association Rules in Large
Databases. In KDD’97, New Port Beach, California, Aug.1997.
6. Z. Zhou and C. I. Ezeife. A Low-Scan Incremental Association Rule Maintenance Method based on the Apriori property. Proceedings of
the 14th Canadian Conference on Artificial Intelligence, June 2001.
7. Ezeife C.I., Su Y. (2002), “Mining Incremental Association Rules with Generalized FP-Tree”, In: Cohen R., Spencer B. (eds) Advances
in Artificial Intelligence. AI 2002. Lecture Notes in Computer Science, vol 2338. Springer, Berlin, Heidelberg.
8. Cheung W, Zaiane OR (2003), “Incremental mining of frequent patterns without candidate generation or support constraint”, In: Desai
BC, Ng W (eds) Proceedings of the IDEAS 2003.IEEE Computer Society Press, Los Alamitos, CA, pp 111–116.
9. C. K. Leung, Q. I. Khan and T. Hoque. “ CanTree: A Tree Structure for Efficient Incremental Mining of Frequent Patterns”, Pro ceedings
of the Fifth IEEE International Conference on Data Mining (ICDM’05), 2005.
10. Tanbeer S.K., Ahmed C.F., Jeong BS. Lee YK. (2008) , “CP-Tree: A Tree Structure for Single-Pass Frequent Pattern Mining”, In:
Washio T., Suzuki E., Ting K.M., Inokuchi A. (eds) Advances in Knowledge Discovery and Data Mining. PAKDD 2008. Lecture Notes
in Computer Science, vol 5012. Springer, Berlin, Heidelberg.
11. Totad, S.G., Geeta, R.B. & Prasad Reddy, P.V.G.D, “Batch incremental processing for FP-tree construction using FP-Growth
algorithm”, Knowledge and Information Systems, November 2012, Volume 33, Issue 2, pp 475–490 .https://doi.org/10.1007/s10115-
012-0514-9.
12. Lydia Nahla, Driff & Drias, Habiba. (2017). An Efficient Incremental Mining Algorithm for Dynamic Databases. 1 -12. 10.1007/978-3-
319-58130-9_1.
13. S¸ erban, G., Campan, A., Czibula, I.G.. A programming interface for finding relational association rules. ˆ International Journal of
Computers, Communications & Control 2006;I(S.):439–444.
14. Diana-Lucia Miholca, Gabriela Czibula, Liana Maria Crivei,A new incremental relational association rules mining approach, Procedia
Computer Science,Volume 126,2018,Pages 126-135,ISSN 1877-0509, https://doi.org/10.1016/j.procs.2018.07.216.
15. Genomics, C.C... Eukaryothic promoter database. 2017.
16. Archana Gupta, Sanjeev Jain, Akhilesh Tiwari, “COMVAN: A Novel Data Structure for Storing Large Database for Incremental
Association Mining”, TECHNIA – International Journal of Computing Science and Communication Technologies, VOL.9 NO. 2,
January. 2017 (ISSN 0974-3375), pp 1110- 1113.
17. Archana Gupta, Akhilesh Tiwari and Sanjeev Jain,Computer Science IJCSIS, Journal of. “A System for Incremental Association Ru le
Mining without Candidate Generation.” IJCSIS July Vol 17 No 7, 2019.
18. Satyavathi N., Rama B., Nagaraju A.,“Research Travelogue-Performance Evaluation of Index support Item Set Mining
Algorithms”,International Journal of Pure and Applied Mathematics,Volume 120 No. 6 2018, 3641-3651,ISSN: 1314-3395 (on-line
version),url: http://www.acadpubl.eu/hub/Special Issue.
19. Satyavathi N., Rama B., Nagaraju A. (2017) Incremental Updating of Mined Association Rules for Reflecting Record Insertions. In:
Satapathy S., Prasad V., Rani B., Udgata S., Raju K. (eds) Proceedings of the First International Conference on Computational
Intelligence and Informatics. Advances in Intelligent Systems and Computing, vol 507. Springer, Singapore

Authors: Irina Bulakh, Margaryta Didichenko, Olena Kozakova

Paper Title: The Innovative Trends in Architecture and Urban Planning of Health Care Institutions
Abstract: The article depicts and systematizes innovative global trends in the field of architecture and urban
planning of healthcare institutions taking as the example leading countries in the field of healthcare (Hong Kong,
Singapore, and the United Arab Emirates). The territorial, administrative and demographic features that
significantly affect the formation and functioning of the architecture and urban planning network of medical
institutions are analyzed. The features, indicators, and structure of the public and private sectors of the medical
50. organization of the listed countries are examined in detail. The main innovative trends in the architecture and
urban planning of the healthcare network that put the considered countries on the top of the world leaders in the
317-323
efficiency of healthcare organization rapidly are identified. The trends are considered in urban planning,
architecture, medical, economic, environmental, technological and innovative aspects.

Keyword : innovations, trends, design of medical institutions, hospitals, architecture, urban planning.
References:
1. I. V. Bulakh, “The main trends in organization of architectural environment of medical institutions”. Web of Scholar. Warszawa, 2018,
No 5 (23), Vol. 1, pp. 59−62.
2. I. V. Bulakh, “Common Features of Architectural Design of the Medical Purpose Building. Science & Technique. Minsk, 2019, No 18
(4), pp. 311−318. DOI:10.21122/2227-1031-2019-18-4-311-318
3. I. V. Bulakh, “Complex public health institutions as a complex urban development system”. Сolloquium-journal. Warszawa, 2019, No
1 (25), pp. 4−6. DOI: 10.24411/2520-6990-2019-00001
4. Rating of the countries of the world by level of healthcare in 2018. Available: https://www.bloomberg.com/news/articles/2018-09-
19/u-s-near-bottom-of-health-index-hong-kong-and-singapore-at-top
5. I. V. Bulakh, “Energy efficiency use of bioclimatic facades in medical buildings”. Development of modern science: the experience of
European countries and prospects for Ukraine: monograph / edited by authors. 3rd ed. Riga, Latvia: Baltija Publishing, 2019, pp.
597−616.
6. I. V. Bulakh, “New approaches to the functional planning of hospitals and entrance groups of medical institutions”. Сolloquium-
journal. Warszawa, 2019, No 9 (33), Vol. 1, pp. 4−6. DOI: 10.24411/2520-6990-2019-10213
7. I. V. Bulakh, “Artistic-aesthetic formation and evolution of architectural and urban planning space”. Science and Innovation. Kyiv,
2019, 15(5), https://doi.org/10.15407/scin15.05.038.
8. G. Kovalska, I. Merylova, I. Bulakh, “Urban improvement of comprehensive schools and out of school educational establishments in
Ukraine”. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 2019, Vol.8, Issue 12, submitted for
publication.
9. I. Bulakh, V. Timokhin, G. Kovalska, I. Merylova, Y. Tretiak, “Urban environment as a phenomenon and object of architectural and
urban aesthetics”. Architectural Science Review, submitted for publication.
10. I. V. Bulakh, “Dynamics of architectural and urban planning hospital system`s evolution”. Science & Technique, submitted for
publication.
11. P. M. Ivanov, Hong Kong: history and modernity. Moscow: Science, 1990, 281 p.
12. Group for Child Mortality Estimation. UNICEF. Available:
https://www.un.org/en/development/desa/population/publications/mortality/child-mortality-report-2018.asp
13. V. P. Gusterin, Cities of the Arab East. Moscow: East-West, 2007, 352 p.
14. Clusters, Hospitals & Institutions: Hong Kong. Available:
http://www.ha.org.hk/visitor/ha_visitor_index.asp?Content_ID=10036&Lang=ENG&Dimension=100&Ver=HTML
15. Queen Mary Hospital. Available: https://www.legco.gov.hk/yr13-14/english/fc/pwsc/papers/p14-08e.pdf
16. Gleneagles Hong Kong Hospital. Available: https://www.p-t-group.com/en/project-detail.php?projects_id=41
17. Hong Kong Children's Hospital. Available: http://greenbuilding. hkgbc. org.hk/ projects/view/22
18. Lee Kuan Yu, From the Third World to the First. History of Singapore 1965-2000. Moscow: Mann, Ivanov and Ferber, 2013, 165 p.
19. Malaysia and Singapore. Guide. Moscow: Astrel, 2017, 368 p.
20. World Mortality Report. Department of Economic and Social Affairs. Population Division. New York, 2013, 106 р.
21. Healthcare and Healthy Lifestyle Services. Available: https://www.healthhub.sg/directory/clinics-and-polyclinics
22. Parkway Hospitals Singapore: For uncompromising quality health care. Available: https://www.bworldonline.com/ parkway-hospitals-
singapore-for-uncompromising-quality-health-care/
23. Biopolis Singapore. Available: https://surbanajurong.com/perspective/surbana-jurongs-journey-one-north/
24. Ng Teng Fong General Hospital & Jurong Community Hospital. Available: https://www.aia.org/showcases/76821-ng-teng-fong-
general-hospital--jurong-commun
25. Listing of Licensed Healthcare Institutions. Available:
http://hcidirectory.sg/hcidirectory/hospital.do?JSESSIONID=SDMmdS3bhkp3jwnT0nnDh2GtYm1F2c5pBDJw1bm4nvGsLqzTV51G
!2085494145!171391194
26. P. Vine, I. Al Abed. United Arab Emirates: A New Perspective. Publisher: Trident Press, 2001, 320 р.
27. Modern UAE health care: From a mud hut to skyscraper hospitals. Available: https://www.thenational.ae/uae/health/modern-uae-
health-care-from-a-mud-hut-to-skyscraper-hospitals-1.300036
28. UAE. Healthcare providers. Available: https://government.ae/en/information-and-services/health-and-fitness/healthcare-providers
29. Brightpoint Royal Women's Hospital. Available: https://www.nmcroyalwomenshospital.ae/nmc-royal-womens-hospital-womens-
hospital-abu-dhabi-uae.html
30. Al Jalilah Hospital. Available: https://www.aljalilachildrens.ae/
31. Rashid Medical Complex. Available: https://www.greshamsmith.com/ project/rashid-medical-complex/
32. Emirates Space Hospital. Available: https://www.thenational.ae/uae/health/space-clinic-being-developed-to-treat-emirati-astronauts-
1.700621
33. M. O. Didichenko, “Definition and rating of the morphology landmarks of the urban planning system”. Urban planning and territorial
planning, 2018, Issue 68, pp. 130-139. Available: http://nbuv.gov.ua/UJRN/MTP_2018_68_19

Authors: Surinder Paul, Manokamna, ShubhpreetKaur , P.S. Malhi, Anupinder Singh, Arvind Kumar
Effect of Fe Substitution on the Structural, Electrical and Dielectric Properties of
Paper Title:
LA0.70CA0.30MNO3 Cathode for Sofcs
Abstract: Perovskite solid solutions (La0.70Ca0.30)(FexMn1-x)O3 where x = 0.01, 0.20, 0.30 and 0.40
ceramics were synthesized by solid state reaction route. The structural studies were carried by X-Ray diffraction
method and the observed results have indicated that all the prepared samples were crystallized into single phase.
The surface morphology was studied by Scanning Electron Microscopy and the images have revealed that grain
size has increased with the increasing concentration of Fe. Archimedes principle was used to calculate the
density of all the sintered samples and the density values were observed to be in increasing order. The
impedance and dielectric properties have been characterized at different ranges of temperature and frequency.
The value of electrical conductivity were found to be more than 100 S cm-1, which indicate that the synthesized
51. material is suitable material for cathode of Solid Oxide Fuel Cell.
324-328
Keyword : Solid Oxide Fuel Cell, Cathode Material, XRD, Conductivity, Magnites
References:
1. J.E.O’Brein, C.M.Stoots, J.S.Herring, J.J. Hartvigsen, “J. Fuel Cell Sci.Technol”.;2006; Vol -3; 213–219.
2. A. Hauch, S.H. Jensen, S. Ramousse, M. Mogensen, “J. Electrochem. Soc”.; 2006 Vol- 153; Pp A1741–A1747.
3. R. Rivera-Tinoco, C. Mansilla, C. Bouallou, “Energy Convers. Manag.” 2010 ; Vol- 51, Pp 2623–2634
4. S.C.Singhal, “Solid State Ionics” 135 (2000) 305.
5. N.Q. Minh, Ceramic fuel cells, “J. Am. Ceram. Soc.”1993; Vol.- 76, Pp 563–588 .
6. M. Dokiya,” Solid State Ionics”, 2002; 152–153, 383–392.
7. S.C. Singhal, “Solid State Ionics”, 2002; 152–153, 405–410.
8. N.P. Brandon, S. Skinner, B.C.H. Steele,” Annu. Rev. Mater. Res.” 2003; 33, 183–213 .
9. K.C. Wincewicz, J.S. Cooper, “Journal of Power Sources” 2005, Vol.- 140, Pp 280–296 .
10. C.Sun, R.Hui, J. Roller, “Journal of Solid State Electrochem.” 14 (2010) 1125.
11. H.H. Mobius, “ Journal of Solid State Electrochem.”1997; Vol- 1, Pp 2–16.
12. S. Carter, A. Selcuk, R.J. Chater, J. Kajda, J.A. Kilner, B.C.H. Steele, “Solid State Ion” 1992;.Vol 53–56, Pp 597–605.
13. R.A. De Souza, J.A. Kilner, J.F. Walker, “Material. Letter”2000 . Vol -43, Pp 43–52.
14. V.V. Srdic, R.P. Omorjan, J. Seydel, “Material Science and Engg”2005. Vol- 116, Pp 119–124.
15. H. Ullmann, N. Trofimenko, F. Tietz, D. Strover, A. Ahmad-Khanlou, “Solid State Ion”2000; Vol- 138, Pp 79–90 .
16. Y. Takeda, Y. Sakaki, T. Ichikawa, N. Imanishi, O. Yamamoto; “Solid State Ion” 1994: Vol -72, Pp 257–264 .
17. Z. Jie, L.I. Chen, K. Linglong, W.U. Xuewei, M.A. Yongchang; “journal of Rare Earths”2011 ; Vol -29, Pp 1066–1069.
18. T.Badapanda, S. Sarangi, B. Behra , S.Anwar ; “Current applied Physics” 2014 , 14: 1192-1200.
19. U. Dash , S. Sahoo , P. Chaudhuri ., S.K.S. Parashar , K. Parashar ; “Journal of Advanced ceramics”2014, 3:89-97.
20. B. Tiwari, R.N.P. Choudhary, “ IEEE transactions on dielectric and electrical insulation 2010, 17: 5-17.
21. R. Ranjan , R. Kumar , B.Behra , R.N.P.Choudhary ;2009; Physica B, 404: 3709-3716.
22. M.R. Biswal. J. Nanda , N.C. Mishra ,S. Anwar, A. Mishra “ Advanced Materials Letter” 2014 5: 531-537.
23. M. Kumar, K. L. Yadav, J. Phys.: Condensed Matter (2002) 19:242202.
24. K.S. Cole and H.Robert. ;1941; “ Journal of Chemical Physics” 9:341-351
25. S. Havriliak and S.Negami , 1967. Polymer 8: 161-210.

Authors: Kumud Tiwari, Sachin Kumar, R.K Tiwari


Disruptive Technology Enabled Healthcare 4.0 Model for Lesion Identification with Reduced
Paper Title:
Latency
Abstract: Advancement and innovations in technology have resulted in ease of accessibility and availability
of resources, resulting in an increased liability on health-care services. However, the application of healthcare
services in rural and undeveloped areas remains a foremost challenge, despite the investments made, largely due
to unreliable communication infrastructures. Machine learning (ML) has witnessed a terrific amount of attention
over the last few years in the field of medical imaging research for the lesion detection through a biomedical
application such as Magnetic Resonance Images (MRI), CT scan, X-rays and Ultrasound etc. Normally, an MRI
or CT scan are used by the experts to produce images of the soft tissue of the human body. Early detection of the
lesion is a crucial part of follow-up care after completion of primary treatment. The goal is to reduce the
mortality rate by early detection and treating the disease while it is still curable assuming a more effective
salvage surgery and treatment. This paper presents a comprehensive review of the automated classification
learning algorithms to identify lesion; indicates how learning algorithms have been applied to biomedical
applications from data acquisition to image retrieval and from segmentation to disease prediction. This paper
provides a brief overview of recent innovations and challenges associated with learning algorithms applied to
medical image processing and analysis. Lastly, the paper concludes with a concise discussion and tries to predict
direction for upcoming trends on more advanced research studies on lesion detection.

Keyword : Lesion, Pattern Recognition, Machine learning, Medical Image Analysis.


References:
1. N.J. Kassebaum, M. Arora, R.M. Barber, Z.A. Bhutta, J. Brown, A. Carter, ... & L. Cornaby, "Global, regional, and national disability-
adjusted life-years (DALYs) for 315 diseases and injuries and healthy life expectancy (HALE), 1990â 2015: a systematic analysis for
the Global Burden of Disease Study 2015," The Lancet, vol. 388, no. 10053, pp. 1603-1658, 2016.
2. K. Tiwari, S. Kumar and R.K. Tiwari, "A Relational Hypothesis Analysis For Cell Death Mechanism," ARPN Journal of Engineering
and Applied Sciences , vol. 14, no. 14, pp. 2630-2642, 2019.
52. 3. P. Jha, B. Jacob, V. Gajalakshmi, P. Gupta, N. Dhingra, R. Kumar, et al., "A nationally representative case -control study of smoking
and death in India," New England Journal of Medicine , vol. 358, no. 11, pp. 1137-1147, 2008.
4. D. Saranath and A. Khanna, "Current status of cancer burden: global and Indian scenario," Biomed Res J, vol. 1, no. 1, pp. 1 -5, 2014.
5. CI5plus, I. A. R. C., "Cancer Incidence in Five Continents Time Trends," 2017. [Online]. Available: http://ci5.iarc.fr. [Accessed 15 8
329-343
2019].
6. Dandona, Lalit, et al. , "Nations within a nation: variations in epidemiological transition across the states of India, 1990 –2016 in the
Global Burden of Disease Study," The Lancet, vol. 390, no. 10111, pp. 2437-2460, 2017.
7. Globocan, W. H. O., "International Agency for Research on Cancer, World Health Organization. GLOBOCAN 2012 —estimated
cancer incidence, mortality and prevalence worldwide in 2012," 2012. [Online]. Available: http://globocan.iarc.fr/ Default.aspx.
[Accessed 30 7 2019].
8. C.S. Pramesh, et al., "Delivery of affordable and equitable cancer care in India," The Lancet Oncology, vol. 15, no. 6, pp. e23-e233,
2014.
9. Rajaraman, Preetha, et al., " Recommendations for screening and early detection of common cancers in India," The Lancet Oncology,
vol. 16, no. 7, pp. e352-e361., 2015.
10. Ferlay, Jacques, et al., "GLOBOCAN 2012 v1. 0, cancer incidence and mortality worldwide: IARC CancerBase No. 11.," Lyon,
France: International agency for research on cancer 2016, 2013.
11. Bray, Freddie, et al., "Global estimates of cancer prevalence for 27 sites in the adult population in 2008.," International journ al of
cancer, vol. 132, no. 5, pp. 1133-1145, 2013.
12. Jemal, A., et al., "Global cancer statistics," CA: a cancer journal for clinicians, vol. 61, no. 2, pp. 69-90., 2011.
13. S. M. Pattanshetty, "Problem of Breast cancer in South India-A Record based study," Australasian Medical Journal (Online), vol. 3, no.
13, p. 972, 2010.
14. Jones, S. Spencer, et al., "Health information technology: an updated systematic review with a focus on meaningful use," Annals of
internal medicine, vol. 160, no. 1, pp. 48-54., 2014.
15. K.M. Cresswell, D.W. Bates, & A. Sheikh, "Ten key considerations for the successful implementation and adoption of large -scale
health information technology," Journal of the American Medical Informatics Association, vol. 20, no. e1, pp. e9-e13, 2013.
16. A.L. Kellermann, & S.S. Jones, "What it will take to achieve the as-yet-unfulfilled promises of health information technology," Health
affairs, vol. 32, no. 1, pp. 63-68, 2013.
17. I. Kononenko, "Machine learning for medical diagnosis: history, state of the art and perspective," Artificial Intelligence in medicine,
vol. 23, no. 1, pp. 89-109., 2001.
18. A. Emam, A. Mtibaa, K.A. Harras, & A. Mohamed, "On the shortcoming of DTN solutions in rural mhealth applications," In 2017 13th
International Wireless Communications and Mobile Computing Conference (IWCMC), IEEE, pp. 1502-1507, 2017.
19. J.A. Cruz, & D.S. Wishart, "Applications of machine learning in cancer prediction and prognosis," Cancer informatics, vol. 2, p.
117693510600200030, 2006.
20. C. M. Bishop, Pattern recognition and machine learning, Springer, 2006.
21. T. M. Mitchell, The discipline of machine learning, vol. 9, Pittsburgh: PA: Carnegie Mellon University, School of Computer Science,
Machine Learning Department, 2006.
22. Y. Drier & E. Domany, " Do two machine-learning based prognostic signatures for breast cancer capture the same biological
processes?," PloS one, vol. 6, no. 3, p. e17795, 2011.
23. A. Niknejad, & D. Petrovic, "Introduction to computational intelligence techniques and areas of their applications in medicin e," Med
Appl Artif Intell, vol. 51, 2013.
24. Y. LeCun, Y. Bengio, & G. Hinton, "Deep learning," nature, vol. 521, 2015.
25. G. Hinton, "Deep learning—a technology with the potential to transform health care," Jama, vol. 320, no. 11, pp. 1101-1102, 2018.
26. I.H. Witten, E. Frank, M.A. Hall, & C.J. Pal, Data Mining: Practical machine learning tools and techniques, Morgan Kaufmann, 2016.
27. D. Castelvecchi, "Can we open the black box of AI?," Nature News, vol. 538, no. 7623, p. 20, 2016.
28. A. Kharrat, N. Benamrane,M.B. Messaoud, & M. Abid, "Detection of brain tumor in medical images," In 2009 3rd International
Conference on Signals, Circuits and Systems (SCS), IEEE, pp. 1-6, 2009.
29. S. Ahmed, K.M. Iftekharuddin, & A. Vossough, "Efficacy of texture, shape, and intensity feature fusion for posterior-fossa tumor
segmentation in MRI," IEEE Transactions on Information Technology in Biomedicine, vol. 15, no. 2, pp. 206-213., 2011.
30. N. Nabizadeh, N. John, & C. Wright, "Histogram-based gravitational optimization algorithm on single MR modality for automatic
brain lesion detection and segmentation," Expert systems with applications, vol. 41, no. 17, pp. 7820-7836, 2014.
31. K. Tiwari, S. Kumar & R.K Tiwari, "Real time mobile phone aided melanoma skin lesion detection using triangulation technique,"
IJEHMC, vol. 11, no. 3, 2020.
32. N.K. Mishra, & M.E. Celebi, "An overview of melanoma detection in dermoscopy images using image processing and machine
learning," arXiv preprint arXiv:1601.07843., 2016.
33. N.C. Codella, et al., "Skin lesion analysis toward melanoma detection: A challenge at the 2017 international symposium on biomedical
imaging (isbi)," 2018 IEEE 15th International Symposium on Biomedical Imaging (ISBI 2018). IEEE, pp. 168-172, 2018.
34. R. Takiar, & A. Srivastav, "Time Trend in Breast and Cervix Cancer of Women in India–," Asian Pacific Journal of Cancer Prevention
, vol. 9, pp. 777-780, 2008.
35. 35. M. Chaturvedi, et al., "Time trends in breast cancer among Indian women population: an analysis of population based cancer
registry data," Indian journal of surgical oncology, vol. 4, pp. 427-434, 2015.
36. 36. S. Grover, et al., "Radiation oncology in India: challenges and opportunities," In Seminars in radiation oncology, vol. 2 7, no. 2, pp.
158-163, 2017.
37. 37. S. Krishnan, et al., "Using implementation science to advance cancer prevention in India," Asian Pacific journal of cancer
prevention: APJCP, vol. 16, no. 9, pp. 3639-3644., 2015.
38. 38. M.S. Lopez, et al., "Project ECHO: a telementoring program for cervical cancer prevention and treatment in low-resource settings,"
Journal of global oncology, vol. 5, pp. 658-665., 2016.

Authors: Kapil Joshi, N.K.Joshi, Manoj Diwakar, A.N. Tripathi, Himanshu Gupta

Paper Title: Multi-Focus Image Fusion using Non-Local Mean Filtering and Stationary Wavelet Transform
Abstract: Today’s research era, image fusion is a actual step by step procedure to develop the visualization of
any image. It integrates the essential features of more than a couple of images into a individual fused image
without taking any artifacts. Multi-focus image fusion has a vital key factor in fusion process where it aims to
increase the depth of field using extracting focused part from different multiple focused images. In this paper
multi-focus image fusion algorithm is proposed where non local mean technique is used in stationary wavelet
transform (SWT) to get the sharp and smooth image. Non-local mean function analyses the pixels belonging to
the blurring part and improves the image quality. The proposed work is compared with some existing methods.
The results are analyzed visually as well as using performance metrics.

Keyword : Image Fusion, Stationary Wavelet Transforms (SWT), Non-Local Mean Filter (NLM).
References:
1. Yang, B., Luo, J., Guo, L., & Cheng, F. (2016).Simultaneous image fusion and demosaicing via compressive sensing. Information
Processing Letters, 116(7), 447-454.
2. Xu, X., Wang, Y., & Chen, S. (2016). Medical image fusion using discrete fractional wavelet transform. Biomedical Signal Processing
and Control, 27, 103-111.
3. Liu, C., Long, Y., & Mao, J. (2016). Energy-efficient multi-focus image fusion based on neighbor distance and morphology. Optik-
International Journal for Light and Electron Optics, 127(23), 11354-11363.
4. Zhang, B., Lu, X., Pei, H., Liu, Y., Zhou, W., & Jiao, D. (2016).Multi-focus image fusion based on sparse decomposition and
53. background detection. Digital Signal Processing, 58, 50-63.
5. Xiao, J., Liu, T., Zhang, Y., Zou, B., Lei, J., & Li, Q. (2016).Multi-focus image fusion based on depth extraction with inhomogeneous
diffusion equation. Signal Processing, 125, 171-186.A339:A355 344-350
6. Kaplan, N. H., Erer, I., &Ersoy, O. (2016).Fusion of multifocus images by latticestructures. Journal of Visual Communication and
Image Representation, 38, 848-857.
7. Meng, F., Song, M., Guo, B., Shi, R., & Shan, D. (2017).Image fusion based on object region detection and Non -Subsampled Contourlet
Transform. Computers & Electrical Engineering, 62, 375-383.
8. Ghassemian, H. (2016). A review of remote sensing image fusion methods. Information Fusion, 32, 75-89.
9. James, A. P., &Dasarathy, B. V. (2014). Medical image fusion: A survey of the state of the art. Information Fusion, 19, 4-19.
10. El-Gamal, F. E. Z. A., Elmogy, M., &Atwan, A. (2016).Current trends in medical image registration and fusion. Egyptian Informatics
Journal, 17(1), 99-124.
11. Yang, Y., Park, D. S., Huang, S., &Rao, N. (2010).Medical image fusion via an effective wavelet-based approach. EURASIP Journal on
Advances in Signal Processing, 2010(1), 579341.
12. Sarker, S., Chowdhury, S., Laha, S., &Dey, D. (2012). Use of non-local means filter to denoise image corrupted by salt and pepper
noise. Signal & Image Processing, 3(2), 223.
13. Singh, A., &Verma, R. S. (2017).An efficient non-local approach for noise reduction in natural images.International Journal of
Advanced Research in Computer Science, 8(5).
14. Buades, A., Coll, B., & Morel, J. M. (2005, June).A non-local algorithm for image denoising.In 2005 IEEE Computer Society
Conference on Computer Vision and Pattern Recognition (CVPR'05) (Vol. 2, pp. 60-65).IEEE.
15. Raghuvanshi, D., Singh, H., Jain, P., &Mathur, M. (2012). Comparative Study of Non-Local Means and Fast Non-Local Means
Algorithm for Image Denoising. International Journal of Advances in Engineering & Technology, 4(2), 247.
16. S., Aggarwal, S., & Kumar, P. (2016).Analysis of Various Issues in Non-Local Means Image DenoisingAlgorithm.International Journal
of Advanced Research in Computer and Communication Engineering, 5(5), 740.
17. Ravi, P., & Krishnan, J. (2018).Image Enhancement with Medical Image Fusion using Multiresolution Discrete Cosine
Transform. Materials Today: Proceedings, 5(1), 1936-1942.
18. Farid, M. S., Mahmood, A., & Al-Maadeed, S. A. (2019).Multi-focus image fusion using Content Adaptive Blurring. Information
Fusion, 45, 96-112.
19. Rajini, K. C., &Roopa, S. (2017, March). A review on recent improved image fusion techniques. In Wireless Communications, Sig nal
Processing and Networking (WiSPNET), 2017 International Conference on (pp. 149-153). IEEE.
20. Joshi, K., Kirola, M., Chaudhary, S., Diwakar, M., & Joshi, N. K. (2019). Multi-Focus Image Fusion Using Discrete Wavelet Transform
Method. Available at SSRN 3383141.
21. Vaqur, M., & Joshi, K. A REVIEW: IMAGE FUSION USING DCT AND DWT.Gupta, H., Chauhan, H., Bijalwan, A., & Joshi, K.
(2019). A Review on Image Denoising. Available at SSRN 3385374.

Authors: Usha Verma, Neelam Sharma

Paper Title: Hybrid Mode of Medical Image Watermarking To Enhance Robustness and Imperceptibility
Abstract: In Modern healthcare systems, diagnostic information of patients is managed digitally.
Watermarking strategies plays a significant role to ensure the security, authenticity and management of
biomedical images and related patient information. This paper explores different invisible Digital watermarking
methods both in spatial and transform / frequency domain and then Hybrid method by combining two techniques
to justify better results for medical images. Here, host image considered is a medical image and patient’s
information is a watermark which is embedded into it. The embedded watermark is hidden in medical host
image and its quality should not be degraded to avoid misdiagnosis by doctors. In this paper, LSB, SVD, DCT,
DWT and Hybrid techniques (DWT+SVD) are implemented for embedding and extraction process of invisible
medical image watermarking. The performance is evaluated based on PSNR as a measure of imperceptibility
and CRC & SSIM as a check of robustness. The attacks introduced are cropping, rotating, and noise like
Gaussian, Salt & Paper, Speckle and Poisson. Results reveal that DWT provides higher PSNR values but it is
robust for few attacks only. On the other side, SVD provides consistent SSIM for all attacks, although PSNR
values are less than that of DWT. Hence a hybrid technique is implemented by incorporating benefits of DWT
and SVD both and achieved optimal values of PSNR as well as SSIM to provide better security to medical
images by preserving the quality as well.

Keyword : Hybrid, Medical Image Watermarking, PSNR, SSIM.


References:
1. A.Z.Tirkel, G.A. Rankin, R.M. Van Schyndel, W.J.Ho, N.R.A.Mee and C.F.Osborne. “Electronic Water Mark”, in DICTA 93,
Macquarie University, 1993, pp.666-673.
2. A. Soualmi, A. Alti and L. Laouamer, “Toward a Secure and Robust Medical Image Watermarking in Untrusted Environment”, in
International Conference on Advanced Machine Learning Technologies and Applications (AMLTA), 2018, Springer International
Publishing, pp. 693-703.
3. K. J. Kavitha and P. B. Shan, “Joint Digital Water Marking for Medical Images for Improving Security”, in Biomedical &
Pharmacology Journal, Vol. 11(2), June 2018, pp. 863-870.
4. Atta-ur-Rahman, K. Sultan, N. Aldhafferi, A. Alqahtani and M. Mahmud, “Reversible and Fragile Watermarking for Medical Images”,
in Computational and Mathematical Methods in Medicine Journal, Volume 2018, pp. 1-7.
5. A. Soualmi, A. Alti and L. Laouamer, “A New Blind Medical Image Watermarking Based on Weber Descriptors and Arnold Chaotic
54. Map”, in Arabian Journal for Science and Engineering, vol. 43, Springer, 2018, pp. 7893-7905.
6. Swaraja K, “Medical image region based watermarking for secured telemedicine”, in Multimedia Tools and Applications, vol. 77,
Springer, 2018, pp. 28249-28280. 351-359
7. A. Kunhu, H. Al-Ahmad and F. Taher, “Medical Images Protection and Authentication using hybrid DWT-DCT and SHA256-MD5
Hash Functions.”, in 24th IEEE International Conference on Electronics, Circuits and Systems (ICECS), 2017, pp. 397-400.
8. S. D. Mashalkar and S S Shirgan, “Design of Watermarking Scheme in Medical Image Authentication using DWT and SVD
Technique”, in IEEE International conference on Computing Methodologies and Communication (ICCMC), 2017, pp. 955-960.
9. M. Ghadi, L. Laouamer, L. Nana and A. Pascu, “A novel zero-watermarking approach of medical images based on Jacobian matrix
model”, in Security and Communication Networks (2016), Published online 2017 in Wiley Online Library, pp. 5203-5218.
10. A. Mehto and N. Mehra, “Adaptive Lossless Medical Image Watermarking Algorithm Based on DCT & DWT”, in Procedia Computer
Science (2016), Elsevier B. V., pp. 88-94.
11. A. Al-Haj and N. Hussein, “Combining Cryptography and Digital watermarking for Secured Transmission of Medical Images”, in
IEEE 2nd International Conference on Information Management (ICIM), 2016.
12. M. Butman and H. Z Hel-Or, “Multi-Level Watermarking with Independent Decoding”, in IEEE International Conference on Image
Processing, 2001, pp. 514-517.
13. E. G. Mansoori and S. S. Soltani, “A new semi-blind watermarking algorithm using ordered Hadamard transform”, in The Imaging
Science Journal, vol. 64, issue 4, 2016, pp. 204–214.
14. Y. AL-Nabhani, H. A. Jalab, A. Wahid and R. Md Noor, “Robust watermarking algorithm for digital images using discrete wavelet and
probabilistic neural network”, in Journal of King Saud Univ.- Computer and Information Sciences, vol. 27, 2015, pp. 393–401.
15. M. Arsalan, A. S. Qureshi, A. Khan and M. Rajarajan, “Protection of Medical Images and Patient Related Information in Healthc are
Using an Intelligent and Reversible Watermarking Technique”, in Applied Soft Computing Journal, vol. 51, 2017, pp. 168-179.
16. A. K. Singh, M. Dave and A. Mohan, “Hybrid technique for robust and imperceptible multiple watermarking using medical images” , in
Multimedia Tools and Applications, vol. 75 (14), 2015, pp. 8381–8401.
17. D. Singh and S. K. Singh, “DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection”, in Multimedia
Tools and Applications, vol. 76 (11), 2016, pp. 13001-13024.
18. W. Puech, “An Efficient Hybrid Method for Safe Transfer of Medical Images”, in E-MEDISYS'08: E-Medical Systems, Sfax, Tunisia.
2008, pp. 1-5.
19. A. Umamageswari, U. Ferni, and G. Suresh, “A Survey on Security in Medical Image Communication”, in International Journal of
Computer Applications, Vol. 30, No.3, 2011, pp. 41-45.
20. D. Bouslimi, and G. Coatrieux, “A joint Watermarking/Encryption Algorithm for Verifying Medical Image Integrity and Authenticity
in Both Encrypted and Spatial Domains”, in 33rd Annual international Conference of the IEEE EMBS Boston, Massachusetts USA,
2011, pp. 8066-8069.
21. P. Viswanathan and P. Venkata Krishna, “Randomized Cryptographic Fusion Watermarking Medical Image with Reversible
Property”, in International Journal of Computer Information Systems, vol. 2, No. 2, 2011, pp. 26-33.
22. Liew S, Zain J, “Tamper localization and lossless recovery watermarking scheme”, in ICSECS 2011, Communications in Computer
and Information Science, vol. 179, Springer, 2011, pp. 555–566.
23. Liew S, Way S, Zain J, “Tamper localization and lossless recovery watermarking scheme with ROI segmentatio n and multilevel
authentication”, in Journal of Digital Imaging, vol. 26, Springer, 2012, pp. 316-325.
24. A. Sharma, A. K. Singh and S. P. Ghrera, “Robust and secure multiple watermarking technique for medical images” in Wireless Pers
Communication, Springer, 2016, pp. 1611–1624.
25. A. Zear, A. K. Singh and P. Kumar, “A proposed secure multiple watermarking technique based on DWT, DCT and SVD for
application in medicine”, in Multimedia Tools and Applications, vol. 77, 2016, pp. 4863–4882.
26. A S Kapse, S. Belokar, Y. Gorde, R. Rane and S. Yewtkar, “ Digital Image Security Using Digital Watermarking”, in International
Research Journal of Engineering and Technology (IRJET), vol.5, issue 3, 2018, pp. 163-166.
27. L. Gahalod and S. K. Gupta, “A Review on Digital Image Watermarking using 3-Level Discrete Wavelet Transform”, in IJSRSET, vol
4, issue 1, 2018, pp. 930-936.
28. J. B. Pandya and R. V. Gupta, “A Study of ROI based Image Watermarking Techniques”, in International Journal of Scientific
Research in Computer Science, Engineering and Information Technology, vol.3, issue 1, 2018, pp. 1213-1217.
29. S. M. Mousavi, A. Naghsh and S. A. R. Abu-Bakar, “Watermarking Techniques used in Medical Images: a Survey”, in Journal of Digit
Imaging, Springer, 2014.
30. F. Taher, A. Kunhu and H. AlAhmad, “A New Hybrid Watermarking Algorithm for MRI Medical Images using DWT and Hash
Functions”, in 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 2016, pp.
1212-1215.
31. V. Kaya and E. Elbasi, “Robust Medical Image Watermarking Using Frequency Domain and Least Significant Bits Algorithms”, in
International Conference on Computing Sciences and Engineering (ICCSE), 2018.
32. C. Kumar, A K Singh, P Kumar, R. Singh and S. Singh, “SPIHT-based multiple image watermarking in NSCT domain” in
Concurrency Computat Pract Exper.2018, pp. 1-9.
33. S. Singh, V. S. Rathore, R. Singh and M. K. Singh, “Hybrid semi-blind image watermarking in redundant wavelet domain”, in
Multimed Tools Appl, Springer, 2017.
34. D. G. Savakar and A. Ghuli, “Robust Invisible Digital Image Watermarking Using Hybrid Scheme”, in Arabian Journal for Science
and Engineering, Springer, 2019.
35. A. K. Abdulrahman and S. Ozturk, “A novel hybrid DCT and DWT based watermarking algorithm for color images ”, in Multimedia
Tools and Applications, Springer Science+Bussiness Media, LLC, part of Springer Nature 2019.
36. H. V. Singh and A. Rai, “Medical Image Watermarking in Transform Domain”, in Smart Innovations in Communication and
Computational Sciences, Springer Nature Singapore Pte Ltd. 2019, pp. 485-493.
37. R. A. Sadek, “SVD Based Image Processing Applications: State of The Art, Contributions and Research Challenges”, in International
Journal of Advanced Computer Science and Applications, Vol. 3, No. 7, 2012, pp. 26-34.

Authors: V Loganathan, S Godfrey Winster


A Reliable Friedman Hypothesis-Based Detection and Adaptive Load Balancing Scheme for
Paper Title:
Mitigating Reduction of Quality DDoS Attacks in Cloud Computing
Abstract: The computing resource availability in a cloud computing environment is considered as the vital
attribute among the security essentialities due to the consequence of on its on demand service. The class of
adversaries related to the Distributed Denial of Service (DDoS) attack is prevalent in the cloud infrastructure for
exploiting the vulnerabilities during the implementation of their attack that still make the process of providing
security and availability at the same time as a challenging objective. In specific, The in cloud computing is the
major threat during the process of balancing security and availability at the same time. In this paper, A Reliable
Friedman Hypothesis-based Detection and Adaptive Load Balancing Scheme (RFALBS-RoQ-DDOS) is
contributed for effective detection of RoQDDoS attacks through Friedman hypothesis testing. It also inherited an
adaptive load balancing approach that prevents the degree of imbalance in the cloud environment. The
simulation results of the proposed RFALBS-RoQ-DDoS technique confirmed a superior detection rate and a
adaptive load balancing rate of nearly 23% and 28% predominant to the baseline DDoS mitigation schemes
considered for investigation.

Keyword : Cloud, Security, attack .router, traffic. Kruskal-Wallis, malicious.


References:
1. Sattar, I., Shahid, M., & Abbas, Y. (2015). A Review of Techniques to Detect and Prevent Distributed Denial of Service (DDoS) Attack
in Cloud Computing Environment. International Journal of Computer Applications, 115(8), 23-27.
2. Gupta, S., Horrow, S., & Sardana, A. (2012). A Hybrid Intrusion Detection Architecture for Defense against DDoS Attacks in Cl oud
55. Environment. Communications in Computer and Information Science, 1(1), 498-499.
3. Osanaiye, O., Choo, K. R., & Dlodlo, M. (2016). Distributed denial of service (DDoS) resilience in cloud: Review and conceptu al cloud
DDoS mitigation framework. Journal of Network and Computer Applications, 67, 147-165. 360-366
4. Vissers, T., Somasundaram, T. S., Pieters, L., Govindarajan, K., & Hellinckx, P. (2014). DDoS defense system for web services in a
cloud environment. Future Generation Computer Systems, 37(1), 37-45.
5. Somasundaram, T. S., & Govindarajan, K. (2014). CLOUDRB: A framework for scheduling and managing High-Performance
Computing (HPC) applications in science cloud. Future Generation Computer Systems, 34(1), 47-65.
6. Saini, B., & Somani, G. (2014). Index Page Based EDoS Attacks in Infrastructure Cloud. Communications in Computer and Information
Science, 1(1), 382-395.
7. Daffu, P., & Kaur, A. (2016). Mitigation of EDoS attacks in cloud: A review. Communication and Computing Systems, 1(1), 34 -49.
8. Khan, M. A. (2016). A survey of security issues for cloud computing. Journal of Network and Computer Applications, 71(1), 11-29.
9. Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Ne twork and
Computer Applications, 34(1), 1-11.
10. Şimşek, M. (2015). A new metric for flow-level filtering of low-rate DDoS attacks. Security and Communication Networks, 8(18),
3815-3825.
11. ]Li, H., & Wu, Q. (2012). A distributed intrusion detection model based on cloud theory. 2012 IEEE 2nd International Conferen ce on
Cloud Computing and Intelligence Systems, 1(1), 45-56.
12. Singh, S., Jeong, Y., & Park, J. H. (2016). A survey on cloud computing security: Issues, threats, and solutions. Journal of Network and
Computer Applications, 75(1), 200-222.
13. Daffu, P., & Kaur, A. (2018). Energy Aware Supervised Pattern Attack Recognition Technique for Mitigation of EDoS Attacks in Cloud
Platform. International Journal of Wireless and Microwave Technologies, 8(1), 42-49.
14. Wang, B., Zheng, Y., Lou, W., & Hou, Y. T. (2015). DDoS attack protection in the era of cloud computing and Software-Defined
Networking. Computer Networks, 81(1), 308-319.
15. Osanaiye, O., Choo, K. R., & Dlodlo, M. (2016). Change-point cloud DDoS detection using packet inter-arrival time. 2016 8th
Computer Science and Electronic Engineering (CEEC), 1(1), 23-34.
16. Shevtekar, A., & Ansari, N. (2008). A router-based technique to mitigate reduction of quality (RoQ) attacks. Computer Networks, 52(5),
957-970.
17. Xiang, Y., Li, K., & Zhou, W. (2011). Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics. IEEE
Transactions on Information Forensics and Security, 6(2), 426-437.
18. Zhang, C., Cai, Z., Chen, W., Luo, X., & Yin, J. (2012). Flow level detection and filtering of low-rate DDoS. Computer Networks,
56(15), 3417-3431.
19. Thaper, R., & Verma, A. (2015). Adaptive Pattern Attack Recognition technique (APART) against EDoS attacks in Cloud Computing.
2015 Third International Conference on Image Information Processing (ICIIP), 1(2), 12-24.
20. Thaper, R., & Verma, A. (2015). Enhanced-Adaptive Pattern Attack Recognition Technique (E-APART) Against EDoS Attacks in
Cloud Computing. Journal of Cases on Information Technology, 17(3), 41-55.
21. Deka, R. K., & Bhattacharyya, D. K. (2016). Self-similarity based DDoS attack detection using Hurst parameter. Security and
Communication Networks, 9(17), 4468-4481
22. Hoque, N., Bhattacharyya, D. K., & Kalita, J. K. (2016). FFSc: a novel measure for low-rate and high-rate DDoS attack detection using
multivariate data analysis. Security and Communication Networks, 1(1), 45-56.
23. Nathiya, T. (2017). Reducing DDOS Attack Techniques in Cloud Computing Network Technology. International Journal of Innovative
Research in Applied Sciences and Engineering, 1(1), 23.
24. Bhushan, K., & Gupta, B. (2018). Hypothesis Test for Low-rate DDoS Attack Detection in Cloud Computing Environment. Procedia
Computer Science, 132(1), 947-955.
25. Shamsolmoali, P., Zareapoor, M., & Alam, M. (2019). Multi-Aspect DDOS Detection System for Securing Cloud Network. Cloud
Security, 1(2), 1952-1983. doi:10.4018/978-1-5225-8176-5.

Authors: Lovepreet Singh, Harjot gill

Paper Title: Performance Parameters in FDM 3D Printed Parts


Abstract: Rapid changes and evolutionary market has demanded the new ways of production such as adaptive
manufacturing techniques. In this research work different response characteristics such as ultimate tensile
strength, surface roughness and energy consumed have been investigated from the work piece fabricated using
of three dimensional printing. Taguchi based L27 orthogonal array was used to carry out the investigation study
using Minitab software. From experimental investigation it has been depicted that layer resolution is the most
significant parameter.
Keyword : production such as adaptive manufacturing techniques. In this research work different
References:
1. Bruns, R., “Knowledge-argumented genetic algorithm for production scheduling”, Workshop Notes IJCAI-93, Workshop on
56. Knowledge-Based Production Planning, Scheduling and Control (Chambery, 1993) ed N. Sadeh, pp.49-58
2. Cha, S.K. and J.H. Park. 1996, “An object-oriented model for FMS control”. Journal of Intelligent Manufacturing, Vol.7, No. 5, pp.387-
391 367-370
3. Davidor, Y. et al., “The Ecological Framework II: improving GA performance at virtually zero cost”. Proc 5th International Conference
on Genetic Algorithms (UrbanaChampaign, IL, July 1993) ed SForrest (San Mateo, CA: Morgan Kaufmann), 1993, pp 171 -176
4. Davis, L., “Handbook of Genetic Algorithms, ITP”, ISBN 1850328250, USA, 1991
5. Fang, H-L. et al 1993, “A promising genetic algorithm approach to job-shop scheduling, rescheduling and open-shop scheduling
problems”. Proc 5th International Conference on Genetic Algorithms (Urbana-Champaign, IL, July 1993) ed
6. Thomas, D. S. and Gilbert, S.W. 2014, Costs and Cost Effectiveness of Additive Manufacturing- A Literature Review and Discussion,
NIST Special Publication 1176 - December 2014
7. Swift, K.G. and Booker, J. D, 2013, Manufacturing Process Selection Handbook Page No. 234 & 235 Chapter 8, Elsevier Ltd, 2013
8. Surel, A. 2008, Direct Metal Laser-Sintering (DMLS), Avec l’EOSINT M 270, Eighteenth International Conference & Exhibit –
Molding 2008, Feb 18-20, 2008, San Francisco, California, USA
9. Slotwinski, J.A. 2013, Materials Standards for Additive Manufacturing. PDES, Inc. Workshop March 14, 2013 NIST Engineering
Laboratory
10. Kruth, J.P. et al 2010, Part and material properties in selective laser melting of metals, 16th International Symposium on
Electromachining (ISEM XVI) Shanghai, China 2010

Authors: Gaurav Aggarwal, Harshal Chaukse, Ali Sualeh

Paper Title: IoT Implementation in Manufacturing using Data Analysis and Data Managemnt
Abstract: Since The Mechanical Miracle Happened In Light Of The Fact That Most Of The Calculations And
Estimations Of The Segments Required For The Collecting And Limit Of A Particular Thing Has Been Done
Physically But At This Point This Example Has Changed With The Introduction Of Iot Devices In
Organizations. These Gadgets Impart And Share Information With One Another Over Web To Make The Way
Toward Assembling Less Confounds And Efficient. For Instance, A Sensor Has Been Appended To The
Machine Which Estimates The Measure Of Vibrations Which Are Delivered While The Machine Is Working.
This information is then moved to a server over WLAN which can be viewed to or by any individual who is
working in the organization and after that be examinations to know the state of the said machine. Along the lines
57. any meltdown or breakage in system or in process that can occur because of unseemly use of the machine can be
avoided. This information can be seen by individuals who work for the organization, who has a login id and
secret key and has a gadget with a working web association as this information is visible or displayed on a site 371-375
that can be gotten to on any gadget utilizing any working framework.
The server that stores the information is kept running on MS Windows and the webpage from which the
information can be gotten to is made utilizing different web improvement dialects.

Keyword : IOT, Industry 4.0, Data Science, Data Management, Networking, Machine Learning
References:
1. A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment
2. Smart Factories in Industry 4.0: A Review of the Concept and of Energy Management Approached in Production Based on the Inter net
of Things Paradigm
3. Training a Hidden Markov Model-Based Knowledge Model for Autonomous Manufacturing Resources Allocation in Smart Shop Floors
4. An Efficient Web Authentication Mechanism Preventing Man-In-The-Middle Attacks in Industry 4.0 Supply Chain
5. Establishing and improving manufacturing performance measures
6. Implementation of A Production-Control System using Integrated AutomationML and OPC UA
7. Establishing and improving manufacturing performance measures
8. Software-Defined Industrial Internet of Things in the Context of Industry 4.0
9. Using Smart Edge IoT Devices for Safer, Rapid Response With Industry IoT Control Operations
10. Real-Time Manufacturing Machine and System Performance Monitoring Using Internet of Things
11. Development of a simulation-based decision support system for controlling stochastic flexible job shop manufacturing systems.

Authors: Ved Prakash Bhardwaj, Piyush Chauhan, Nitin

Paper Title: Mobile Based Multi-Factor Authentication Algorithm for Secure Online Transaction
Abstract: In today’s world, online payment system is one of the essential requirements of people. Security in
online transactions is still a major challenge for the researchers. This work is emphasizing on providing highly
secure environment for online transactions to user. One time password is one of the mechanisms to reduce online
fraud, still many cases of fake transactions are happening frequently. It requires more attention to establish the
faith in E-banking services. The present research article is proposing a multi-factor based secure algorithm
which enhances the security for the online transaction services. To increase the authenticity, the proposed
algorithm is working on two strategies: a) One Time Password Based Authentication and b) Dedicated Hardware
Based Authentication.

Keyword : IMEI, Encryption, Decryption, OTP, Transaction


References:
1. W.Jansen, Authenticating Users on Handheld Devices, in Proceedings of the Canadian Information Technology Security Symposium,
2003, pp. 1–12.
2. R. Madhusudhan, R.C. Mittal, Dynamic ID-based Remote User
58. Password Authentication Schemes using Smart Cards: A Review,
In Journal of Networks and Computer Applications,Volume 35,
Issue 4, 2012, pp.1235-1248. 376-380
3. H. Al-Assam, H. Sellahewa, S. Jassim, On Security of Multi-Factor Biometric Authentication, Internet Technology and
SecuredTransactions, in International Conference of Internet Technology, 2010, pp. 1-6.
4. X. Huang, Y. Xiang, A. Chonka, J. Zhou, R.H. Deng, A Generic
Framework for Three Factor Authentication: Preserving Security
and Privacy in Distributed Systems, in IEEE Transactions on
Parallel and Distributed Systems,Volume 22, Issue 8, 2011, pp.
1390-1397.
5. 3rd Generation Partnership Project. 3GPP TS 23.040 - Technical realization of the Short Message Service (SMS).
http://www.3gpp.org/ftp/Specs/html-info/23040.htm, September 2004.
6. Google Inc. SMS Verification for App Creation. https://developers.google.com/appengine/kb/sms.
7. Google Inc. Verifying your account via SMS or Voice Call. http://support.google.com/mail/bin/answer.py?hl=en&answer=114129.
8. Mulliner C., Borgaonkar R., Stewin P., Seifert JP, SMS-Based One-Time Passwords: Attacks and Defense. In: Rieck K., Stewin P.,
Seifert JP. (eds) Detection of Intrusions and Malware, and Vulnerability Assessment. DIMVA 2013. Lecture Notes in Computer
Science, Volume 7967. Springer, Berlin, Heidelberg.
9. L. Koot. Security of mobile TAN an smartphones. Master’s thesis, Radboud University Nijmegen, Feb. 2012.
10. D. Zhao, W. Luo., One-Time Password Authentication Scheme
Based on the Negative Database. In Engineering Applications of
Artificial Intelligence Volume 62, 2017, pp. 396-404.
11. T. K. Chang, A Secure Operational Model for Mobile Payments, in The Scientific World Journal, Volume 2014, Hindwai Publishing
Corporation, 2014, pp. 1-14.

Authors: Anil Kumar K R, Noushira K I, Meenakshy K

Paper Title: Classification of Diabetic Retinopathy Features using Bag of Feature Model
Abstract: Deep learning (DL) as well as feature learning by unsupervised methods have made tremendous
consideration in the past decades because of its great and dynamic capacity to change input data into high level
depictions by means of various machine learning (ML) methods and approaches. Therefore these interests have
also showed a fast and steady growth in the arena of medical image analysis, especially in Diabetic Retinopathy
(DR) classification. On contradiction, manual interpretation involves excessive processing time, large amount of
expertise and work. Sternness of the DR is analyzed relative to the existence of Microaneurysms (MAs),
Exudates (EXs) and Hemorrhages(HEs). Spotting of DR in its early stage is crucial and important to avoid
blindness. This paper proposes an algorithm to build an automated system to extract the above mentioned DR
59. features which are the elemental and initial signs of diabetic retinopathy. Initial step in this algorithm is
preprocessing of the original image. The next step in this features extraction algorithms is elimination of optic
disc (OD) and blood vessels which have similar characteristic with these features. Blood vessels are segmented 381-385
using Multi-Level Adaptive Thresholding. OD is segmented using morphological operations. Feature extraction
and classification is achieved by using deep Bag of Feature (BoF) model which uses Speeded Up Robust
Features Our method achieved 100% acuuracy in DRIVE database and over 90% accuracy for e-OPTHA
database. Thus, the proposed methodology represents a track towards precise and highly automated DR
diagnosis on a large substantial scale along with better sensitivity and specificity.

Keyword : Bag of Feature model, microaneurysms, Diabetic Retinopathy, haemorrhages and exudates.
References:
1. Spencer, T., Olson, J.A., McHardy, K.C., Sharp, P.F., Forrester, J.V. “An image processing strategy for the segmentation and
quantification of microaneurysms in fluorescein angiograms of the ocular fundus.” Computers in Biomedical Research 29, 284–
302,1996.
2. A. D. Fleming, S. Philip, K. A. Goatman, J. A. Olson and P. F. Sharp, "Automated microaneurysm detection using local contrast
normalization and local vessel detection," in IEEE Transactions on Medical Imaging, vol. 25, no. 9, pp. 1223-1232, Sept. 2006.
3. Zhang, B., Wu, X., You, J., Li, Q. and Karray, F. “Detection of microaneurysms using multi-scale correlation coefficients.” Pattern
Recognition, 43(6), pp.2237-2248, 2010.
4. Lazar and A. Hajdu, "Retinal Microaneurysm Detection Through Local Rotating Cross-Section Profile Analysis," in IEEE
Transactions on Medical Imaging, vol. 32, no. 2, pp. 400-407, Feb. 2013.
5. D. Kavitha and S. S. Devi, ―Automatic detection of optic disc and exudates in retinal images,‖ in Intelligent Sensing and Information
Processing, 2005. Proceedings of 2005 International Conference on. IEEE, 2005, pp. 501–506.
6. P. H. Princye and V. Vijayakumari, ―Detection of exudates and feature extraction of retinal images using fuzzy clustering method,”
Computational Intelligence and Information Technology, 2013.
7. Mizutani, A., Muramatsu, C., Hatanaka, Y., Suemori, S., Hara, T. and Fujita, H., 2009, March. Automated microaneurysm detection
method based on double ring filter in retinal fundus images. In Medical Imaging 2009: Computer-Aided Diagnosis(Vol. 7260, p.
72601N). International Society for Optics and Photonics.
8. A. Osareh, M. Mirmehdi, B. Thomas, and R. Markham, “Comparative exudate classification using support vector machines and neural
networks”, in International Conference on Medical Image Computing and Computer-Assisted Intervention. Springer, 2002, pp. 413–
420.
9. L. Xu and S. Luo, “Support vector machine based method for identifying hard exudates in retinal images,” in Information, Compu ting
and Telecommunication, 2009. YC-ICT’09.IEEE Youth Conference on. IEEE, 2009, pp. 138–141.
10. V. V. Kumari and N. Suriya Narayanan, “Diabetic retinopathy-early detection using image processing techniques,” International
Journal on Computer Science and Engineering, vol. 2, no. 02, pp. 357–361, 2010
11. S. Roychowdhury, D. D. Koozekanani, and K. K.Parhi, “Dream: diabetic retinopathy analysis using machine learning,” IEEE journal of
biomedical and health informatics, vol. 18, no. 5, pp. 1717–1728, 2014.
12. Anil Kumar K.R and Meenakshy K, “ Retinal Vasculature Extraction using Non-Subsampled Contourlet Transform and Multi-structure
Element Morphology by Reconstruction,” International Journal of Recent Technology and Engineering (IJRTE), Vol-8 Issue-2, July
2019. Page No.: 116-125.
13. Dutta, Suvajit, et al. "Classification of diabetic retinopathy images by using deep learning models." International Journal of Grid and
Distributed Computing 11.1 (2018): 89-106.
14. 14. K. Adem, “Exudate detection for diabetic retinopathy with circular hough transformation and convolutional neural networks,”
Expert Systems with Applications, vol. 114, pp.289–295, 2018.

Authors: Solikha N. Allayarova


Implementation of Modern Information Communication Technologies (ICT) in Higher Education
Paper Title:
Sector: International Experience and The Example of Uzbekistan
Abstract: The Information and Communication Technology (ICT) is the powerful tool for the successful
delivery of quality education in higher institutions. A range of countries understanding the full benefit of it have
already implemented and developing the usage of ICT in higher education sector, though in Uzbekistan still can
be faced some challenges on this regard. The purpose of this study is therefore to contribute to the growing
evidence on the use and acceptance of ICT by higher institutions of learning in Uzbekistan. The paper critically
analyzes the current students’ and teachers’ perceptions on ICT usage, involving 23 higher educational
institutions in Uzbekistan and provides some recommendations on improvement through studying international
experience.

Keyword : Information communication technology (ICT), e-resources, e-learning, distance learning systems,
cloud technologies.
References:
1. Mohammed Mansur Ibrahim and Muesser Nat. Blended learning motivation model for instructors in higher education institutions
(2019) International Journal of Educational Technology in Higher Educationhttps://doi.org/10.1186/s41239-019-0145-2
2. Bates, A. W. T., &Sangrà, A. (2011). Managing technology in higher education: Strategies for transforming teaching and learning.
Hoboken: Wiley.
3. Buabeng-Andoh Charles, YidanaIssifu. Innovations in education: Students’ perceptions of implementing ICT in learning in second -
60. cycle institutions in Ghana. 7th World Conference on Educational Sciences, (WCES-2015), 05-07 February 2015, NovotelAthens
Convention Center, Athens, Greece
4. Tezci, E. (2012). Factors that influence pre-service teachers’ ICT usage in education. European Journal of Teacher Education, 34(4), 386-392
483-499.
5. Moore, M. G., &Kearsley, G. (2011). Distance Education: A Systems View of Online Learning, 3rd edn. Michigan: CengageLearning.
6. Gikas, J., & Grant, M. M. (2013). Mobile computing devices in higher education: Student perspectives on learning with cellpho nes,
smartphones & social media. The Internet & Higher Education, 19, 18–26.
7. Moore, J. L., Dickson-Deane, C., &Galyen, K. (2011). e-learning, online learning, and distance learning environments: Are they the
same? The Internet and Higher Education, 14(2), 129–135.
8. Ng’ambi, D., &Bozalek, V. (2015). Massive open online courses (MOOCs): Disrupting teaching and learning practices in higher
education. British Journal of Educational Technology, 46(3), 451–454.
9. Porter, W. W., Graham, C. R., Spring, K. A., & Welch, K. R. (2014). Blended learning in higher education: Institutional adoption and
implementation. Computers & Education, 75, 185–195.
10. Natalia P. Nikonova, Larisa N. Gorina, Linar G. Akhmetov (2019). The use of cloud technologies in the Modern Educational Proc ess.
International journal of Innovative technology and Exploring Engineering. Vol:8 Issue 9S3.
11. Measuring the Information society report, Volume 1, 2018, ITU Publications, p.2
12. Adriana Denisa MANEA. Educational Values within the Scope of the Technological Revolution. Astra Salvensis. VII(2019), no.14,
p.31-37.
13. Anchalee Ngampornchai and Jonathan Adams. Students’ acceptance and readiness for E-learning in Northeastern Thailand.
InternationalJournalofEducational technologyinHigherEducation (2016)
14. Arnold and Sangrà. Dawn or dusk of the 5th age of research in educational technology? A literature review on (e-)leadership for
technology-enhanced learning in higher education (2013-2017).
InternationalJournalofEducationalTechnologyinHigherEducation(2018)
15. “Measuring the Information society report” Volume 1, 2018, ITU Publications.
16. McLachlan, C., Craig, A., & Coldwell, J., (2010). Student perceptions of ICT: A Gendered Analysis, in ACE 2010 : Proceedings of the
Twelfth Australasian Computing Education Conference, Australian Computer Society, Sydney South, N.S.W.
17. Wigfield, A., & Eccles, J.S. (2000). Expectancy-value theory of achievement motivation. Contemporary Educational Psychology, 25,
116-119.
18. Adi Suyani. ICT in Education: Its benefits, difficulties and organizational development issues. Jurnal Sosial Humaniora. Vol 3 no.1,
2010
Salhana Ismail, Aizat Mohd Taib, Norinah Abd. Rahman, Dayang Zulaika Abang Hasbollah,
Authors:
Ahmad Bukhari Ramli
Paper Title: Slope Stability of Landfill with Waste Degradation
Abstract: Nowadays, a large amount of municipal solid waste (MSW) is generated due to the rapid
urbanisation in developing countries leads to the demand for larger and higher capacity landfills. Bioreactor
landfill technology has been introduced to accelerate the stability of landfill and to solve the issue of limited
landfill area. However, the accelerated degradation of the refuse in bioreactor landfills also considerably changes
the geotechnical characteristics of the waste in the landfill and thereby increases the concern for waste stability.
Hence, this study aims to analyse the stability of both conventional and bioreactor landfill slope with the effects
of waste degradation. Finite element method has been used in the slope stability analysis and the stability is
presented by the factor of safety. The objectives of this study are i) to determine and assess the main parameter
which influences the stability of the waste slope, ii) to determine the effects of waste degradation to the waste
properties and iii) to obtain the factor of safety of the landfill slope using numerical analysis by finite element
method. From the literature review, it is found that slope stability of a landfill mainly depends on the
geotechnical properties of waste, such as moisture content, unit weight, shear strength parameters and hydraulic
conductivity of waste. After the degradation process, engineering properties of field refuse are affected which
includes the increased pore-water pressure and unit weight, decreased strength and lower hydraulic conductivity.
Based on the analysis of conventional landfill slope stability by using Plaxis software, slope ratio of 1:3, 1:4 and
1:5 calculated safe with 1.69, 2.3 and 2.8 whereas the analysis of bioreactor landfill slope stability calculated
safe only for slope ratio of 1:4 and 1:5 with 1.60 and 1.97. Moreover, the factor of safety for steeper slopes is
lower and vice versa. From the parametric analysis, it is found that the full height of slope and unit weight of
waste input affect the result analysis. This study is significant to evaluate the landfill slope stability with the
effects of waste degradation and to ensure both conventional and bioreactor landfill slope stability for long
periods.

Keyword : Landfill, bioreactor, waste degradation, finite element analysis, factor of safety.
References:
1. M. Warith, “Solid waste management: new trends in landfill design,” Emirates Journal for Engineering Research, 8.1, 2003, pp. 61-70.
2. Y. Huang and G. Fan, “Engineering geological analysis of municipal solid waste landfill stability,” Natural Hazards, 84, 2016.
3. G.S. Babu, K.R. Reddy, and A. Srivastava, “Influence of spatially variable geotechnical properties of MSW on stability of lan dfill
slopes,” Journal of Hazardous, Toxic, and Radioactive Waste, 18(1), 2012, pp. 27-37.
61. 4. A. Jahanfar, B. Gharabaghi, E.A. McBean, and B.K. Dubey, “Municipal solid waste slope stability modeling: a probabilistic
approach.,” Journal of Geotechnical and Geoenvironmental Engineering, 143(8), 2017, 04017035.
5. W. Gao, X.-C. Bian, W.-J. Xu, and Y.-M. Chen, “Storage capacity and slope stability analysis of municipal solid waste landfills,” 393-398
Journal of Performance of Constructed Facilities, 32(4), 2018, 04018036.
6. F. Koelsch, K. Fricke, C. Mahler, and E. Damanhuri, “Stability of landfills - The Bandung dumpsite disaster,” in Proceedings Sardinia,
2005.
7. Q. Xu, T. Tolaymat, and T.G. Townsend, “Impact of pressurized liquids addition on landfill slope stability,” Journal of Geote chnical
and Geoenvironmental Engineering, 138(4), 2011, pp. 472-480.
8. D. Zekkos, E. Kavazanjian,J. D. Bray, N. Matasovic, and M. Riemer, “Physical Characterization of Municipal Solid Waste for
Geotechnical Purposes,” Journal of Geotechnical and Geoenvironmental Engineering - J GEOTECH GEOENVIRON ENG, 136, 2010.
9. G. Blight, “Slope failures in municipal solid waste dumps and landfills: a review,” Waste Management & Research, 26(5), 2008, pp.
448-463.
10. K.R. Reddy, H. Hettiarachchi, R.K. Giri, and J. Gangathulasi, “Effects of degradation on geotechnical properties of municipal solid
waste from Orchard Hills Landfill, USA,” International Journal of Geosynthetics and Ground Engineering, 1(3), 24, 2015.
11. F. Pohland, W. Cross, J. Gould, and D. Reinhart. “Behavior and assimilation of organic and inorganic priority pollutants codi sposed
with municipal refuse,” Volume 2. Appendices. Final report, Pittsburgh Univ., PA (United States). Dept. of Civil Engineering, 1993.
12. M.S. Hossain and K.K. Penmethsa, “Changes in geotechnical properties of Municipal Solid Waste (MSW) in bioreactor landfill with
degradation,” International Journal of Environmental Engineering, 3(3-4), 2011, pp. 349-370.
13. M. Hossain, M. Haque, and L. Hoyos, “Dynamic properties of municipal solid waste in bioreactor landfills with degradation,”
Geotechnical and Geological Engineering, 28(4), 2010, pp. 391-403.
14. K.R. Reddy, H. Hettiarachchi, J. Gangathulasi, and J.E. Bogner, “Geotechnical properties of municipal solid waste at differen t phases
of biodegradation,” Waste Management, 31(11), 2011, pp. 2275-2286.
15. A. Mohd Taib, M.R. Taha, and D.Z. Abang Hasbollah, “Validation of Numerical Modelling Techniques in Unsaturated Slope
Behaviour,” Jurnal Kejuruteraan, 5(Special Issue 1), 2018, pp. 29-35.
16. M. Mukhlisin, S.J. Matlan, M. Ahlan, and M. Taha, “Analysis of Rainfall Effect to Slope Stability in Ulu Klang, Malaysia,” Jurnal
Teknologi, 72, 2015.
17. E. Altalhea, M. Taha, and F. Abdrabbo, “Bearing Capacity of Strip Footing on Sand Slopes Reinforced with Geotextile and Soil Nails,”
Jurnal Teknologi, 65, 2013.
18. M. Mukhlisin, M.R. Baidillah, M.R. Taha, and A. El-Shafie, “Effect of soil water retention model on slope stability analysis,”
International Journal of Physical Sciences, 6(19), 2011, pp. 4629-4635.
19. M. Mukhlisin, I. Idris, W.Z. Yaacob, A. ElShafie, and M. Taha, “Soil slope deformation behavior in relation to soil water interaction
based on centrifuge physical modeling,” International Journal of Physical Sciences, 6, 2011, pp. 3126-3133.
20. R. Harianto, S. Alfrendo, W.C. Looi, W.J.L. Heng, and L.V. Han, “Effects of unsaturated properties on stability of slope covered with
Caesalpinia crista in Singapore,” Environmental Geotechnics, 0(0), 2018, pp. 1-11.
21. C. Kristo, H. Rahardjo, and A. Satyanaga, “Effect of variations in rainfall intensity on slope stability in Singapore,” International Soil
and Water Conservation Research, 5(4), 2017, pp. 258-264.
22. C.-C. Fan and R.-Y. Zeng, “Effect of characteristics of unsaturated soils on the stability of slopes subject to rainfall,” Japanese
Geotechnical Society Special Publication, 2(29), 2016, pp. 1060-1064.
23. M. Datta, “Stability of Slopes for Closure of Old Waste Dumps,” in GeoCongress 2008: Geotechnics of Waste Management and
Remediation, 2008, pp. 184-191.
24. T. Matsui and K.-C. San, “Finite element slope stability analysis by shear strength reduction technique,” Soils and foundations, 32(1),
1992, pp. 59-70.
25. R.K. Giri and K.R. Reddy, “Slope stability of bioreactor landfills during leachate injection: effects of heterogeneous and an isotropic
municipal solid waste conditions,” Waste Management & Research, 32(3), 2014, pp. 186-197.
26. N. Norsyahariati, N. Daud, A. Nurul Ayunie, I. Siti Aisyah, and A. Amimul, “The Stability Evaluations of Municipal Landfill i n
Malaysia for Future Land Use,” in Advanced Materials Research. Trans Tech Publ., 2014.
27. A. Omari, “Slope stability analysis of industrial solid waste landfills,” 2012.
28. M. Hossain and M. Haque, “Stability analyses of municipal solid waste landfills with decomposition,” Geotechnical and Geologi cal
Engineering, 27(6), 659, 2009.

Authors: K. Ruth Evangelin, G. Arul Freeda Vinodhini, V. Vidhya

Paper Title: Simulation Analysis of a Liver Transplantation Queueing System


Abstract: Liver transplantation is done widely across the world. Every year, many people are waiting for a
donor liver. Depending on the blood group and MELD score, the priority is given to the waiting patients. Here,
we have presented the quasi birth death process of the liver transplantation model and analysis of its parameters
are done using simulation technique. Simulation results are presented for different values of the threshold.

Keyword : M/M/1 queue; switching policy; Simulation Techniques; Steady state probabilities
62.
References:
1. Banks J. Handbook of Simulation. Wiley Online Library, 1998. 399-403
2. D. Gross, Fundamentals of QueuingTheory, JohnWiley & Sons, Hoboken, NJ, USA, 4th edition, 2008.
3. G. Arul Freeda Vinodhini, V.Vidhya, Computational Analysis of Queues with Catastrophes in a Multiphase Random Environment,
Mathematical Problems in Engineering, Volume 2016, Article ID 2917917, 7 pages, http://dx.doi.org/10.1155/2016/2917917.
4. Huang Qing, S.R.Chakravarthy, Analytical and simulation modeling of a multi-server queue with Markovian arrivals and priority
services, Simulation Modelling Practice and Theory, Volume 28, November 2012, Pages 12-26.
5. Leonard Cleinrock, Queueing System, Volume 2, Computer Application(1976), 324-628.
6. Yael Perlman , Amir Elalouf , Uri Yechiali, Dynamic allocation of stochastically-arriving flexible resources to random streams of
objects with application to kidney cross-transplantation, European Journal of Operational Research 265 (2018) 169–177.
7. Katsaliaki K, Mustafee N. Applications of simulation within the healthcare context. J Oper Res Soc 2011;62:1431–51.
8. Zhang Ying,Guo Jingtian, Simulation of Queuing Disciplines Based on EXTEND, Journal of WUT(Information&Management
Engineering), 2007(5), pp. 20-24.

Authors: A.Vidhyavani, P.V.Sumanth,U.Surendra,V.Chakradhar

Paper Title: Kiiling Media Piracy by using Artificial Intelligence


Abstract: Now a day’s Artificial intelligence is very important. To eradicate the media piracy on the internet
we are going to implement the technique called the page replacement algorithm by using the artificial
intelligence. Detecting and stopping by manually it is not possible to remove manually. The page replacement
algorithm will help to detect the media piracy on the internet. Internet means that any of the social media
platforms like gmail ,youtube,drives etc. By using this page replacement algorithm we are going to achieve.
This algorithm will helps to detect it will divide into the number of frames each page has the several frames
.Each frame in the page get scanned by the page replacement algorithm . Based on this technique replaces the
page that used for the long period of time. This page replacement algorithm has to work very fastlly and
consumes the less memory. This technology has controlled by the any government companies. The government
has specified companies to detect such piracy. The LRU technique maintains the backward of the page. This
LRU helps within seconds to detect the piracy on the internet.

Keyword : PAGE REPLAEMENT ALGORITHMARTIFICIAL INTELLIGENCE, TECHNIQUE, LRU.


63
References:
1. D. Leporini, “Architectures and Protocols Powering Illegal Content Streaming over the Internet,” Proc. Int. Broadcasting Convention, 404-407
p. 7, 2015.
2. A. Karpathy et al., “Large-Scale Video Classification with
Convolution Neural Networks,” Proc. IEEE Conf. Comput. Vision Patt. Recogn., pp. 1725–1732, 2014.
3. O. M. Parkhi, A. Vedaldi, and A. Zisserman, “Deep Face Recognition,” Proc. Bri. Mach. Vision Conf., 2015.
4. O. Russakovsky et al., “ImageNet Large Scale Visual Recognition Challenge,” Int. J. Comput. Vision, 115(3):211–252, 2015.
5. A. S. Razavian, H. Azizpour, J. Sullivan, and S. Carlsson, “CNN Features Off-the-Shelf: An Astounding Baseline for Recognition,”
Proc. IEEE Conf. Comput. Vision Patt. Recogn.
Workshops, pp. 512–519, 2014.
6. J. Yosinski et al., “How Transferable Are Features in Deep Neural Networks?,” Proc. Conf. Neur. Inform. Process. Syst.,
pp. 3320–3328, 2014.
7. S. C. H. Hoi et al., “Logo-Net: Large-Scale Deep Logo Detection and Brand Recognition with Deep Regi99on-Based
Convolution Networks,” 2015. [Online]. Available: http://arxiv.org/ abs/1511.02462
8. G. Zhu and D. Doermann, “Automatic Document Logo Detection,” Proc. Conf. Doc. Analysis Recogn., Vol. 2,
pp. 864–868, 2007.
9. D. G. Lowe, “Object Recognition from Local Scale-Invariant Features,” Proc. Conf. Comput. Vision, Vol. 2, pp. 1150–1157,
1999.
10. R. Boia et al., “Logo Localization and Recognition in Natural Images using Homographic Class Graphs,” Mach. Vision Appl.,
27(2):287–301, 2016.
11. K. Li et al., “Logo Detection with Extendibility and Discrimination,” Multimed Tools Appl., 72(2):1285–1310, 2014.

Authors: Ahmad A. Alahmadi


64
Paper Title: New Design of An Intelligent, Secure and Dependable Garage system.
Abstract: This work introduces the design and development plan of a reliable, smart, secure, automation
solution, applying modern design methodology, for solving real-life problems faced by many residents and
related to the process of car parking inside a home garage, as well as, security and economy issues. The
suggested solution is intended for achieving comfort, security and economy as a part of home automation. The
solution consists of two main subsystems; security identification subsystem and the automated garage
subsystem. The security identification subsystem is suggested to be placed inside the car on front tableau. The
two subsystems are communicating with each other wirelessly, the whole automated garage system are activated
from sleep mode and waiting for further actions, when a vehicle or a human is detected in the front of the gate
by means of two sensors, or when identification signal is send from security identification subsystem. For
maximum reliability and depending on customer needs, the security subsystem is designed to identify the
residents, to have a permission to enter the garage by matching all of the following; face image, fingerprint,
voice print, written password, specified oral password word, specially designed remote control board or radio
frequency identification (RFID) card along with a alarm features. When the residents identified, the garage
subsystem is activated in terms of controlling the garage gate open/close process and controlling electrical
408-413
components including lighting, ventilation and surveillance camera. Each of the two subsystems, as well as
overall system, was physically prototyped, tested in real situation successfully.

Keyword : Design, Smart system, Garage system, Automation system, Security, Safety.
References:
1. Afaz Uddin Ahmed , Taufiq Mahmud Masum , Mohammad Mahbubur Rahman , Design of an Automated Secure Garage System
Using License Plate Recognition Technique, I.J. Intelligent Systems and Applications, 2014, 02, 22-28.
2. Poonamsakhare, Gajala Shaikh, Satya Balaji and Rashmi Mahajan. Article: Implementation of Smart Garage. IJCA Proceedings on
National Conference on Advances in Computing, Communication and Networking ACCNET 2016(5):26-29, June 2016. Full text
available. BibTeX.
3. Ramneet Kaur, Balwinder Singh, design and implementation of car parking system on FPGA, International Journal of VLSI design and
Communication Systems (VLSICS) Vol.4, No.3, June 2013.
4. Ahidur, Md , Islam, Rahabul, Depiction of IoT Based Smart Vehicles Garage System. International Journal of Innovative Science and
Research Technology, Volume 3, Issue 8, August – 2018 3. 1-3, 2018.
5. https://www. Northshorecommercialdoor .com/lik2gadoopmo .html [accessed 19/02/2019]

Authors: Shakti Arora, Surjeet Dalal

Paper Title: DDoS Attacks Simulation in Cloud Computing Environment


Abstract: Cloud Computing Is Increasing Its Reach To The Edge Of The Computing Devices. Day By Day
Dependency Of The Users Is Increasing On Cloud. Infrastructure As A Service Model Is The Widely Adopted
And Used Model Of Cloud Computing Where Storage Is The Primary Concern To Be Shared And Used.
Security Of The Shared Storage Is The Major Challenge, A Number Of Techniques And Security Algorithms
Are Designed To Provide The Security And Accuracy Of The Data. We Designed A One Strong Integrity
Security Algorithm That Provides The Integrity Verification Of The Stored Data Without The Intervening The
Role Of Tpa. The Data Stored On The Server Can Be Compromised With Number Of Security Attacks; We
Studied The Major Security Attacks That Are Affecting The Data. In This Paper We Will Demonstrate The
Attack Simulation Of Ddos Attack And Calculated The Effects Of Attacks On Running System And
Performance Of The System Under Critical Timings Of Attack. The Result Of The Attack Simulation Shows
That The Designed System Is Stable And Working Efficiently After The Attack. The Trust Level Achieved Is
Approximately Similar To The Original Trust Achieved Without Injecting The Attack.

Keyword : attack, Virtualization,Poly1305, Integrity, hybrid

65 References:
1. Salman iqbal,liana mat kian, bubak dhaghighi, muzammil hussain, suleman khan, Muhammad khurra khan, kim kwang, Raymond choo,
“ On cloud security attacks: A taxanomy and intrusion detection and prevention as a service, “ in journal of network and computer 414-417
applications , volume -74, PP. No 98-120, 2016.
2. Priyanka Chauhan, Rajender Singh, “ Security attacks on cloud computing with possible solutions,”, in international journal of
advanced research in computer science and software engineering,” vol-6, issue 1, PP.No 92-96, 2016.
3. Ardian J Duncan, Sadie Creese, Michal Goldsmith, “ Insider attacks in cloud computing,” in IEEE 11 th national conference on Trust
security and privacy in computing and communication, 2012.
4. Meiko Jensen, joy chwenk, nibs gruksha, lugi lo lacano, “ on technical security issues in cloud computing in “IEEE international
conference on cloud computing,”,PP. No. 2009
5. Ajey singh,, manesh Shrivastav, “ Overview of attacks on cloud computing,” in international journal of engineering and innovative
technology, vol-1, issue-4 , 2012.
6. Rashmi V. Deshmukh, Kailas K. Devadkar, Understanding DDoS Attack & Its Effect In Cloud Environment, in Procedia Computer
Science, volume -49, PP.No. 202 – 210, 2015.
7. A.M lonea, D.E. Popescu,H. Tianfiekd,” Detecting DDos attacks in cloud computing environment,” in International journal compute
communication, Vol-8, issue-, PP.No 70-78, 2013,
8. Victoria, NSW,”EDOS-shield- A two step mitigation technique against DDos attacks in cloud computing”, in IEEE international
conference on utility and cloud computing, PP.No 49-56 , 2011.
9. Miami, Florida, “Attack surfaces: A taxonomy for attacks on cloud services,” in IEEE international conference on cloud computing,
PP.No-276-279, 2010
10. Poonam Yadav, and Sujata, Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier CAPTCHA, In
International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol.3, No.3, PP.No. 25-41,2013.
11. Qiao Yan, F. RichardYu, Qingxian Gang, Jianqiang li, “Software defined networking and distributed denial of service(DDOS) attacks in
cloud environment: A Survey, some research issues and challenges,” in IEEE communication Survey & Tutorial, Vol-18, issue-1,2016
12. Naseer amara, Hang Zhiqui, Awais ali, “Cloud computing security threats and attacks with their mitigation techniques,” in International
conference on cyber enabled distributed computing and knowledge discovery, PP.No. 244-252, 2017.
13. Akhilesh kumar, “Handling DDoS attacks in Cloud computing based on SDN system,”in International journal of science computer
science engineering and information technology,volume-2, issue-2, PP.No. 62-68, 2017.
14. Vidhya V, “A review of DoS attack in Cloud computing,” in IOSR journal of computer engineering, volume-16, issue-5,PP.No. 32-35,
2017.
15. Shakti Arora and Surjeet Dalal, “A variant of secret Sharing with Poly 1305,” Recent development of computational intelligenc e,
(Springer Series of computational intelligence), ISBN 978-3-03012500-4, Doi/10.1007/978-3-030-12500-4–C-CTP-05/2016.
16. Shakti Arora and Surjeet Dalal, “Hybrid algorithm designed for handling remote integrity check mechanism over dynamic cloud
environment,” International journal of Engineering & Technology (Scopus), vol. 7 no.2.4, pp.161-164, 2018,.
17. Shakti Arora and Surjeet Dalal, “Enhanced privacy preserving access control in the cloud,” International Journal of Recent Research
Aspects, vol. 4, pp. 66-70, 2016.
18. Shakti Arora and Surjeet Dalal, “Study of Integrity Based Algorithms in Decentralized Cloud Computing Environme nt,” International
Journal of Institutional and Industrial Research, vol.1, no.1, pp. 15-17, 2016.
19. Shakti Arora and Surjeet Dalal, “Novel approach for Integrity Verification in Dynamic Cloud environment,” International journ al of
science and information security, vol.14, no. 8, 2016.

Authors: Aruna Varanasi, SSK Teja Madduri, Alekya Malka, Vineeth Chepuri

Paper Title: Automated Fluid Transfuser


Abstract: In hospitals, Saline/Fluids is/are injected into the patient’s body to treat dehydration/diseases in
order to improve their health. Monitoring the fluid level and regulating its flow manually has always been a
typical problem as it involves much attention by nurse constantly. Any kind of negligence or preoccupied states
might invoke a possibility of backflow of blood (and swelling) from the concerned patient. Also blood
transfusion using traditional method has a drawback regarding the accuracy in transfusing blood from one
patient’s body to another. Considering all these affordable health monitoring systems should be made available
to every hospital in the days to come. AUTOMATED FLUID TRANSFUSER deals with these problems. This
will accurately assimilate the advised portion of saline/fluid/blood into the patient’s body. It alerts the nurse by
sending notifications regarding the status of fluid level and in parallel regulates the flow, thereby averting the
chance of backflow of blood and reducing the swelling. Automated fluid transfuser can be used in hospitals and
homes for the bed ridden patients. It is not complex in operating to nurse or guardians.
66.
Keyword : Accurate, Backflow, Healthcare, Pressure, Cloud, Regulation, Transfusion, Patient, Supervision, 418-420
IV Tube.
References:
1. “Design of Family Health Care Monitoring System Using Wireless Communication Technology” International Journal of Advanced
Research in Computer and Communication Engineering Volume 2, Issue 9, September 2013 Pg.no: 3667-3670
2. “Smart Hospital based on Internet of Things” , JOURNAL OF NETWORKS, VOL.7, NO. 10, OCTOBER 2012,Page No.1-8
3. “Wireless Saline Bottle Level Indicator for Hospitals” ,Compo soft an International Journal of Advanced computer Technology
4. “Designing a portable monitoring device to measure the drips rate” International Journal of Biotechnology Trends and Technology
(IJBTT) volume1 Issue 3 Nov-Dec 2011 Pg.no:29-35.
5. “Design and Development of versatile saline flow rate measuring system and GSM based remote monitoring device”, International
Journal Of Pharmaceutical Applications ISSN 0976-2639.
6. “Design of family health monitoring system using wireless communication”, International Journal of Advanced Research in Compu ter
and Communication Engineering Vol. 2, Issue 9, September 2013
7. “Embedded patient monitoring system” International Journal of Embedded Systems and Applications (IJESA) Vol.1, No.2, December
2011
8. “Wireless Saline Bottle Level Indicator for Hospitals”, Compo soft an International Journal of Advanced computer Technology.

Authors: D.Nethra Pingala Suthishni, Anna Saro Vijendran


Grid Based Clustering with Intrusion Detection System to Extend Network Lifetime in Mobile
Paper Title:
ADHOC Network
Abstract: The key determination of researches on cluster-based Mobile Ad-hoc Networks (MANETs) and the
election of consistent energy holding Cluster Head (CH) is to improve the lifetime of the network. Both in real-
time as well as non-real-time basis data are collected and spread accordingly. Energy efficiency is said to be the
major concern in MANET. Every node in the network supplied with preferred node energy and it will get
exhausted whenever node transmits the data. When node runs out of energy transmission may be failed. In order
to avoid transmission failure, energy-efficient methods are incorporated in data transmission. In this paper, a
clustering method is proposed which is grounded by the Grid-based model. Static sinks in the MANET transmit
the data to the transmission area which is distant to the destination that may lead to the energy-hole problem.
67. Hence, an efficient approach is proposed wherein a centralized cluster configuration by the mobile sink is used
for Grid-Based Clustering (GBC) and Verification algorithm to achieve improved energy balance to thereby
extending network lifetime in the network. The simulation results depict that the GBC and Verification method 421-430
can effectively increase the network lifetime and energy dissipation.

Keyword : Mobile Ad-hoc Network, Centralized Cluster Configuration, Grid-Based Clustering, Verification
Algorithm, Wireless Network, Network Lifetime.
References:
1. Bi .Y, Sun .L, Ma .J, Li .N, Khan .I.A and Chen .C, “HUMS: An autonomous moving strategy for mobile sinks in data-gathering sensor
networks,” Eurasia Journal of Wireless Communication and Networking, Special Issue on Novel Techniques for Analysis and Desig n,
December 2007.
2. Chandrakala .C.B, Prema .K.V and HAREESHA .K.S, “Energy Efficient and Entropy based Clustering for MANET”, Indian Journal of
Science and Technology, Vol. 9(S1), pp.1-7, December 2016.
3. Kotishwaran Thanigaivelu and Krishnan Murugan,” Grid-based Clustering with Predefined Path Mobility for Mobile Sink Data
Collection in WSN”, IETE TECHNICAL REVIEW, Vol.29 (2), pp. 133-147, MAR-APR 2012.
4. Li .J and Mohapatra .P, “Analytical modelling and mitigation techniques for the energy hole problem in sensor networks,” Else vier
Pervasive and Mobile Computing, Vol.3 (8), pp.233-254, 2007.
5. Lin .K, Chen .M, Zeadally .S and Rodrigues .J.J.P.C, “Balancing energy consumption with mobile agents in wireless sensor networks”,
Elsevier Journal of Future Generation Computer Systems, Vol. 28(2), pp.446-456, February 2012.
6. Martaa .M and Cardei .M, “Improved sensor network lifetime with multiple mobile sinks,” Elsevier Pervasive and Mobile Computing,
Vol. 5(5), pp. 542-55, Oct. 2009.
7. Sandeep Singh, Rajinder Singh, “Detection and Isolation of Selective Packet Drop Attack in MANET” International Advanced
Research Journal in Science, Engineering and Technology, Vol.4 (7), pp.94-99, July 2017.
8. Sherin Joy C.” Grid Based Energy Efficient Multipath Routing Protocol In Wireless Sensor Network Using Fuzzy Approach”.
International Journal of Engineering Research & Technology (IJERT), Vol. 3(4), pp.1122-1126, April 2014.
9. Thanigaivelu .K and Murugan .K, “Impact of Sink mobility on network performance in wireless sensor networks” in proc of IEEE
International conference on Networks and Communications, (NetCoM-2009), pp. 7-11, 27-29, Dec- 2009.
10. Wu .X, Chen .G, and Das .S.K, “Avoiding energy holes in wireless sensor networks with non -uniform node distribution”, IEEE
Transactions on Parallel and Distributed System, Vol.19 (5), pp. 710-200, May 2008
11. Younis .O and Fahmy .S, “HEED: A hybrid, energy-efficient, distributed clustering approach for Ad Hoc sensor networks”, IEEE
Transactions on Mobile Computing, Vol. 3(4), pp. 366-79, Oct-Dec. 2004.
12. Received from https://en.wikipedia.org/wiki/Neighbourhood_components_analysis
13. https://www.igi-global.com/dictionary/probability-of-false-alarm-/46090
14. https://en.wikipedia.org/wiki/Probability_of_error
15. https://www.igi-global.com/dictionary/miss-detection-probability/46227
16. https://en.wikipedia.org/wiki/Packet_loss

Authors: Mohammed Zakee Ahmed, Ajij D. Sayyad

Paper Title: Designing a Novel PTS Method to Reduce Peak to Average Power Ratio in OFDM
Abstract: Most of the wireless standards used these days, heavily rely on Orthogonal Frequency Division Multiplexing
(OFDM). Peak to Average Power Ratio (PAPR) is one of the known key acknowledged confines of OFDM. Reduced PAPR
at OFDM transmitter helps power amplifier to operate in stable mode and reduction in complexity of digital to analog
converter (DAC). Several PAPR reduction techniques have been evolved from different principles such as signal scrambling
techniques, such as Partial Transmit Sequence (PTS), signal distortion techniques such as Clipping, etc. Reducing PAPR
degrades bit error rate (BER) or computational complexity. PTS is one of the best methods of PAPR reduction. There is large
scope of betterment of PTS to get a best PAPR reduction technique. In this paper we have concentrated on PTS scheme by
exploring PTS and its variants evolved over a period of time. We proposed a novel PTS with best performance balancing
PAPR and BER performance. Design and development of scheme is done using a graphical programming environment
LabVIEW (Laboratory Virtual Instrumentation Engineering Workbench) and real time environment validation is done with
software defined radio – NIUSRP2922, which is National Instruments Universal Software Radio Peripheral. The paper has
three sections in first section, Introduction, the OFDM fundamentals and PAPR are defined in design perspective, in second
section conventional and proposed PTS schemes have been explained. The third section consists of result and conclusion.

Keyword : OFDM, PAPR, PTS, ACF, LabVIEW, NI-USRP


References:
1. K. Lee and J. No, "Efficient PTS scheme with adaptive selection method for dominant samples in OFDM systems," 2017 Ninth
International Conference on Ubiquitous and Future Networks (ICUFN), Milan, 2017, pp. 387-392. doi: 10.1109/ICUFN.2017.7993814
2. Nan Shi and Shouming Wei, "A partial transmit sequences based approach for the reduction of peak-to-average power ratio in FBMC
68. system," 2016 25th Wireless and Optical Communication Conference (WOCC), Chengdu, 2016, pp. 1-3. doi:
10.1109/WOCC.2016.7506550
3. R. Iwasaki and K. Ohuchi, "PAPR Reduction in OFDM Signal by Combining Partial Transmit Sequences with Precoding Matrix," 431-435
2018 12th International Conference on Signal Processing and Communication Systems (ICSPCS), Ca irns, Australia, 2018, pp. 1-6. doi:
10.1109/ICSPCS.2018.8631723
4. H. Liang, C. Chen and H. Chu, "A Modified PTS Scheme with Monte Carlo Method for PAPR Reduction in OFDM Systems," 2018
IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW), Taichung, 2018, pp. 1-2. doi: 10.1109/ICCE-
China.2018.8448571
5. H. Chu and T. Shimamura, "A new PTS method for OFDM signals without side information based on constellation reshaping," 2016
Annual Conference on Information Science and Systems (CISS), Princeton, NJ, 2016, pp. 216-221.doi: 10.1109/CISS.2016.7460504
6. K. Kim, "On the Shift Value Set of Cyclic Shifted Sequences for PAPR Reduction in OFDM Systems," in IEEE Transactions on
Broadcasting, vol. 62, no. 2, pp. 496-500, June 2016. doi: 10.1109/TBC.2016.2529292
7. G. Rashwan, S. Kenshi and M. Matin, "Analysis of PAPR hybrid reduction technique based on PTS and SLM," 2017 IEEE 7th Annual
Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, 2017, pp. 1-4. doi:
10.1109/CCWC.2017.7868482
8. K. Lee, Y. Cho, J. No and D. Lim, "A low-complexity PTS scheme using adaptive selection of dominant time-domain samples in
OFDM systems," 2016 URSI Asia-Pacific Radio Science Conference (URSI AP-RASC), Seoul, 2016, pp. 1897-1900. doi:
10.1109/URSIAP-RASC.2016.7601212
9. A. Joshi, S. Bali and H. Tiwari, "PAPR reduction of coded OFDM system using low complexity PTS," 2016 International Conferenc e
on Signal Processing and Communication (ICSC), Noida, 2016, pp. 203-207. doi: 10.1109/ICSPCom.2016.7980576
10. S. Ku, "An improved low-complexity PTS scheme for PAPR reduction in OFDM systems," 2016 IEEE International Conference on
Signal Processing, Communications and Computing (ICSPCC), Hong Kong, 2016, pp. 1-5. doi: 10.1109/ICSPCC.2016.7753598
11. M. Wang, J. Xiao, C. Yuan, Y. Tian and L. Zhang, "A new low-complexity subblock segmentation method for PTS OFDM," 2017
IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Chongqing, 2017, pp. 2408 -
2411. doi: 10.1109/IAEAC.2017.8054454
12. Z. He, L. Zhou, Y. Chen and X. Ling, "Low-Complexity PTS Scheme for PAPR Reduction in FBMC-OQAM Systems," in IEEE
Communications Letters, vol. 22, no. 11, pp. 2322-2325, Nov. 2018. doi: 10.1109/LCOMM.2018.2871263
13. D. C. Park and S. C. Kim, "Partial Transmit Sequence Scheme for Envelope Fluctuation Reduction in OFDMA Uplink Systems," in
IEEE Communications Letters, vol. 22, no. 8, pp. 1652-1655, Aug. 2018.doi: 10.1109/LCOMM.2018.2840542

69. Authors: Richa Khera, Anita Khosla, Dheeraj Joshi


Paper Title: Additional Series Positive Output Superlift LUO Converter using Particle Swarm Optimization
Abstract: Due to the advancement in the semiconductor technology DC-DC converters are gaining the
importance in several industrial applications. They form the core of the switched mode power supplies used in
real time applications. But the conventional DC -DC converter contains the voltage ripples due to the effect of
the parasitic elements which is undesirable. The derived topologies of DC –DC converters from the
conventional pumps eradicates this effect. In this paper the superlift LUO DC-DC converter will be presented
which can replace the conventional converters. The effect of the parasitic elements is eradicated in superlift
converter and range of the boosting the voltage level is high which will reduce the charging time and can be
applicable for charging of o electric vehicles. The optimized proportional and integral controller using particle
swarm optimization is applied to the presented converters.

Keyword : DC-DC converter, superlift luo converter, proportional and integral controller ,Particle Swarm
Optimization
References:
1. K. Sundareswaran, Kiran Kuruvinashetti, P.S. Nayak,Application of Particle Swarm Optimization for Output Voltage Regulation of
Dual Input Buck-Boost Converter ,International Conference on Green Computing Communication and Electrical Engineering
(ICGCCEE), 6-8 March 2014
2. B. G. Dobbs and P. L.Chapman (2003), "A Multiple-Input DC-DC Converter Topology," IEEE Trans. Power Electron., vol. 1, no. 1, 436-440
pp. 6-9.
3. M. Namnabat, M. Bayati Poodeh, S. Eshtehardiha, “Comparison the Control Methods in Improvement the Performance of the DC-DC
Converter”, International Conference on Power Electronics 2007, (ICPE’07), pp.246-251, 2007
4. Fang Lin Luo, Hong Ye, “Advanced DC-DCconverters”, CRC Press.
5. Luo ,F.L, “Positive output Luo- converter voltage lift Technique”, IEE-EPAprocessdings,146(4),July 1999,pp.415-432.
6. J.F.HUANG, F.B.DONG, “Modelling and Control on Isolated DC-DC Converter”, Power Electronics, voI.44, pp.87-89, April 2010.
7. Kennedy J, and Eberhart, R " Particle Swarm Optimization,"Proceddings IEEE International Conference on Neural Networks,Vol 41 ,
November/December 1995,PP942-1948
8. R.Suresh Kumar, J.Suganthi, “Improving the Boost Converter PID Controller Performance Using Particle Swarm
Optimization”,EuropenJournal of Scientific Research, Vol.85 No3 September,2012,pp.327 – 335.
9. Y.Li and Z.C.Duan,”Optimization for parameter of PID based on PSO”, Machinery & Electronics, Issue: 9 pp. 26-28, 2004.
10. [B.Nagaraj, P. Vijayakumar “A comparative study of PID controller tuning using GA, EP, PSO, and ACO”, Journal of Automation,
Mobile Robotics & Intelligent Systems, volume 5, 2011.
11. Ashish Grover, Anita Khosla, Dheeraj Joshi “Study of different simulation software’s for optimization and economic analysis of
photovoltaic system” international journal of advanced research (ijar), Vol 7, Issue 05,2019.
12. Luo, F.L. and H. Ye, 2001. DC/DC conversion techniques and nine series Luo converters. In: Power Electronics Handbook, Rashid,
M.H. (Ed.), CA, Academic, San Diego, pp: 17-17.
13. Ibrahim Alhamrouni , M. K. Rahmat, F. A. Ismail , Mohamed Salem , Awang Jusoh , T. Sutikno, “Design and development of SEPIC
DC-DC boost converter for photovoltaic application” International Journal of Power Electronics and Drive System (IJPEDS) Vol. 10,
No. 1, March 2019, pp. 406~413

Authors: Ahmad Fauzan Zakki, Aulia Windyandari, Deddy Chrismianto, Iqbal Habib
Development of Monohull Fish Processing Vessel Hullform to Support Domestic Fishing Activities in
Paper Title:
Indonesia
Abstract: This research is focused on the development of the design and prototype of monohull fish
processing vessel hullform to support fishing activities such as catching fish, collecting fish from the smaller
boats and processing fish catches. The extensive on-board facilities in the fish processing vessel are maintaining
the freshness of the catch and improving the quality of catch fish than traditional fishing boat. The initial stage of
this study is determining the principal dimension and exploring of the configurations of monohull hull forms.
Furthermore, the investigation of resistance characteristics, intact stability and seakeeping behavior was carried
out using strip theory and computational fluid dynamic methods. Regarding the performance of the hulls
resistance, the analysis indicates that the hull form with smaller block coefficients showed better resistance
characteristics. In the case of intact stability, the results of the analysis showed that the model 2 of monohull hull
form showed better intact stability characteristics compared to the other models.

Keyword : Monohull, Fish Processing Vessel, Domestic Fishing.


70.
References:
1. Dahuri, R. “The Root of the Fishermen's Poverty Problem and Its Solution.” Accessed on 19th September 2019 , 2015. Available: 441-447
https://dkptendri01.wordpress.com/2015/02/03/akar-masalah-kemiskinan-nelayan-dan-solusinya/.
2. Sayli, A., Alkan, A. D., Nabergoj, R., Uysal, A. O. “Seakeeping assessment of fishing vessels in conceptual design stage.” Ocean
Engineering, 2007, pp. 724-738.
3. Sayli, A., Alkan, A. D., Ganiler, O. “Nonlinear meta-models for conceptual seakeeping design of fishing vessels.” Ocean Engineering,
2010, pp. 730-741.
4. Mantari, J.L.,Silva, S. R., Soares, C. G. “Intact stability of fishing vessels under combined action of fishing gear, beam wa ves and
wind.” Ocean Engineering, 2011, pp. 1989-1999.
5. Gammon, M. A. “Optimization of fishing vessels using a Multi-Objective Genetic Algorithm.” Ocean Engineering, 2011, pp. 1054-
1064.
6. Gonzalez, E. A. “Fishing vessel stability assessment system.” Ocean Engineering, 2012, pp. 67-78.
7. Tello, M., Silva, S. R., Soares, C. G. “Seakeeping performance of fishing vessels in irregular waves Studies.” Ocean Engineering, 2011,
pp. 763-773.
8. Santullano, F. M. A., Iglesias, A. S. “Stability, safety and operability of small fishing vessels.” Ocean Engineering, 2014, pp. 81-91.
9. Holtrop, J., “A Statistical Analysis of Performance Test Results” International Shipbuilding Progress, 1977.
10. Holtrop, J., “Statistical Data for the Extrapolation of Model Performance Tests.” Netherlands Ship Model Basin (NSMB) Paper 588,
1978.
11. Holtrop, J. and G.J. Mennen., “A Statistical Power Prediction Method”
NSMB Paper 603, 1978.
12. Holtrop, J. and G.G.J. Mennen., “An Approximate Power Prediction Method” NSMB Paper 689, 1982.
13. Holtrop J., “A Statistical Re-analysis of Resistance and Propulsion Data” International Shipbuilding Progress, Volume 31, No. 363,
1984.

Authors: Angeline R, Rudra Dev Mishra, Lingaraj Gopalakrishnan, Saravanan B

Paper Title: An GPS Based Online Blood Bank Management using Database Management System
Abstract: Blood is one of the main components of our body helping in some of the major functions and its presence in
right quantity is very important for proper functioning. Therefore, blood need is going increasingly and in great demand
because of so increase in the numbers of accidents, surgery or diseases where blood production is very less resulting in loss
of blood from the victim’s body. So, it is becoming a great need to propose a system which is very much efficient and time
friendly and currently proposed system of online blood donation system is not much efficient and non-real time service. We
have introduced our system where hospitals can directly contact the persons who have registered themselves having blood
type same as required within their local area or person can donate blood himself to the nearest blood banks and his blood
type updated in along with the total quantity of blood of different types available in the different blood banks. The time
requirement of the blood by the needed has been improved effectively in our system.

Keyword : Blood , Blood Donation System , Hospitals , Blood Banks


References:
1. A new concept of blood bank management system using cloud computing for rural area (india) - javed akhtar khan and m.r. alony
2. A cloud based decision making system for blood donation service. - aditya srikar , ajay henry , and dr. vigneshwari
3. A geo-location based mobile service that dynamically locates and notifies the nearest blood donors for blood donation during medical
71. emergencies. - yashesh vaghela, harit shah, darshan dholakiya
4. Design of sms based automated blood bank using embedded system - pavitra h v, dr. g.f. ali ahammed
5. Online blood bank using cloud computing - sagar shrinivas vasaikar,vijay suresh yennam,krupa manoj patel,prof. trupti shah 448-452
6. The optimization of blood donor information and management system by technopedia - p. priya,v. saranya, s. shabana,kavitha
subramani
7. A survey on blood bank management system - prof. animesh tayal,harshad gahare, akshay patel,sagar jog ,pratik jain,jaya dhawale
8. Android blood donor life saving application in cloud computing -t.hilda jenipha, r.backiyalakshmi
9. A secure cloud computing based framework for the blood bank. -mr. shreyas anil chaudhari, ms. shrutika subhash walekar,ms.
khushboo ashok ruparel,ms. vrushali milind pandagale
10. A framework for a smart socialblood donation system basedon mobile cloud computing -almetwally m. mostafa, ahmed e. youssef,
gamalalshorbagy
11. A novel technique for online blood bank management -selvamani k, ashok kumar rai
12. Bloodbank ph: a framework for an android based application for the facilitation of blood services in the philippines -abigail casabuena,
raylene caviles, jeremy adrian de vera, karina gayle flores, annaliza catacutan-bangit, rosauro manuel, jayson raymund bermudez, ryan
richard guadaña
13. Integrated system for health services management -m. padoca calado, ana ramos, dikiefu fabiano
14. Design and implementation of e-blood donation system using location tracking -deeptha hegde, agnus kuriakose, amitha mariya mani,
anju philip, annamma p abraham
15. An extended research on the blood donor community as a mobile application -a bhowmik, n a nabila, m a imran, m a u rahman and d
karmaker
16. Blood bag: a web application to manage all blood donation and transfusion processes -rehab s. ali, tamer f. hafez, ali badawey ali ,
nadia abd-alsabour
17. Blood donation and life saver app -annish brislin m , albert mayan , aroul canessane , anish hamlin m .
18. Data warehouse based analysis with integrated blood donation management system -giridhar maji , narayan c debnath ,soumya sen

Authors: K. Suganyadevi, N.SaravanaSelvam

Paper Title: Effective Traffic Management System for Vehicular Network


Abstract: Vehicular ad hoc networks are becoming the promising research topic in Intelligent transportation
system. VANET enable the collaboration amongst multiple vehicle communication which supports by their
arrangement and infrastructure for consistent data delivery services. Due to high mobility of vehicles, the data
cannot be delivered between vehicles with change in their topologies and its becoming an emerging high area
in the field of research. However, the ideal characteristics of vanet routing protocols make proper connectivity
for reliable and effective data delivery in traffic scenarios. This article starts with traffic congestion and
dissemination of the information to nearby vehicles for making smart city into a very smarter one. As a result of
miscommunication between the vehicles , severe accidents happened scores of times especially in the traffic
prevailing areas. In order to mitigate terrible accidents, We then focus on (traffic light aware routing protocol)
72. TLRC with (Soft Reservation Multiple Access with Priority Assignment) SRMA/PA routing protocols at
intersections and traffic light signals under traffic congestion. In Sum, this article enriches the performance of
data delivery ratio and end to end delay in exchanging data between Vanet equipped vehicles. 453-457

Keyword : Vanet, Traffic Congestion, Traffic lights, routing Protocols, SRMA/PA.


References:
1. Jin-Jia Chang,Yi-Hua Li,Wanjiun Liao and Ing-Chau Chang,” Intersection based Routing for Urban Vehicles communication with
Traffic light considerations”, IEEE Wireless Communication,1536-1284,Fabraury 2012.
2. Kartik Pandit,Dipak Ghosal, IEEE , H.Micheal Zhang, and Chen-Nee Chuah,Senior member IEEE,“Adaptive Traffic signal control
with Vehicular Adhoc networks”,Vol.62.No.4.00018-9545, IEEE May 2013.
3. Juan(Susan)Pan,Iulian Sandu Popa, and Cristian Borcea,” DIVERT: A Distributed vehicle traffic routing system for Congestion
avoidance”,1536-1253, IEEE 2015.
4. Joy Chandra Mukherjee,Arobinda Gupta, and Ravella Chaitanya Sreenivas,” Event notification in Vanet with capacitated Roadside
Units (RSU)”, 1524-9050, IEEE 2016.
5. Chang Guo,Demin Li,Guanglin Zhang and Zhaoyuan Cui,” Data Delivery delay reduction for Vanets on Bidirectional Roadways”,
2169-3536, IEEE 2016.
6. Qing Ding,Bo Sun,Ximming Zhang Member,IEEE, “A traffic light Aware Routing Protocol based on street connectivity for urban
vehicular adhoc networks”, 1089-7798, IEEE 2016.
7. Amjad Mehmood,Akbar Khanan,Abdul Hakim H.M.Mohamed,Houbing Song,” ANTSC: An intelligent naïve Bayesian Probabilistic
estimation practice for traffic flow to form stable clustering in VANET”,2169-3536,IEEE 2017.
8. Chang Guo,Demin Li, Guanglin Zhang and Menglin Zhai.” Real Time Path Planning Urban area via VANET assisted traffic
information sharing”, 0018-9545, IEEE 2018.
9. Armir Bujari,Mauro Conti,Carla De Francecco,Claudio E.Palazz,” Fast Multihop Broadcast of alert messages in Vanet: An Analytical
Model”, 1570-8705,IEEE 2018.
10. Jeferson Campos Nobre , Allan M.de Souza,Denis Rosario,Cristiano Both,Leandro A.Villas,Eduardo Cerqueira,Torsten Braun,Mario
Gerla,” Vehicular software defined networking and fog computing integration design principles”, 1570-8705, Elsevier 2018.
Roslizawati Che Aziz, Nik Alif Amri Nik Hashim, Raja Norliana Raja Omar, Abdullah Muhamed
Authors: Yusoff, Nur Hafizah Muhammad, Derweanna Bah Simpong, Tahirah Abdullah, Siti Afiqah
Zainuddin, Fauzan Hafiz Muhammad Safri
Paper Title: Teaching and Learning in Higher Education: E-Learning as a Tool
Abstract: Recently, the market of E-Learning is soaring and is known as a new paradigm in modern
education. E-Learning acts as a medium, consisting of several types of computers and electronic media that are
communication tools as well as the Internet, which provides training and informative access on certain subjects.
By using E-Learning students can attend online classes anywhere, regardless of time and place. Generally, E-
Learning is more geared towards self-training and is ideal for individuals who work full-time but desire to
further their studies. Thus, this study has been developed and integrated with factors leading towards the
effectiveness of E-Learning as a tool in Teaching and Learning (T&L) approach. A quantitative approach was
applied by using a self-administered distribution of questionnaire targeted at higher education students.
Therefore, the outcomes of this research will help to provide insightful information to the current education
system in Malaysia, particularly in crafting strategies to enhance the learning education for the country in
general.

Keyword : E-Learning; Effectiveness of Teaching; Teaching and Learning Tools, New Education.
References:
1. Arkorful, V., & Abaidoo, N. (2014). The role of eLearning, the advantages and disadvantages of its adoption in Higher Education.
International Journal of Education and Research, 2(12).
2. Adebisi. J. F. (2013). Time management practices and its effect on business performance. Canadian Social Science, 9(1),165-168.
3. Al-Adwan, A., & Smedley, Jo. (2012). Implementing eLearning in the Jordanian Higher Education System: Factors affecting impact.
International Journal of Education and Development using Information and Communication Technology (IJEDICT), 8(1), 121-135.
4. Bora, U. J. & Ahmed, M. (2013). ELearning using Cloud Computing. International Journal of Science and Modern Engineering
(IJISME), 1(2).
5. Chen, X., Jin, R., Suh, K., Wang, B. & Wei, W. (2012). Network Performance of Smart Mobile Handhelds in a University Campus
WiFi Network.
73. 6. Clark, R. C., & Mayer, R. E. (2016). E-learning and the science of instruction: Proven guidelines for consumers and designers of
multimedia learning: John Wiley & Sons.
7. Ecclesfield, N., & Garnett, F. (2015). ELearning and Public Value. Innovation in Teaching and Learning in Information and Computer
Sciences, 5(4), 1-7. 458-463
8. Gilakjani, A. P. (2012). A match or mismatch between the learning styles of the learners and teaching styles of th e teachers.
International Journal of Modern Education and Computer Science, 11, 51-60.
9. Hair, J. F., Celsi, M., Money, A. H., Samouel, P., & Page, M. (2015). The essentials of business research methods. Third edition. New
York: Routledge.
10. Huang, E. Y., Lin, S. W. & Huang, T. K. (2012). What type of learning style leads to online participation in the mixed-mode eLearning
environment? A study of software usage instruction. Journal of Computers & Education, 58, 338-349.
11. Jethro, O. O., Grace, A. M., & Thomas, A. K. (2012). ELearning and its effect on teaching and learning in global age. International
Journal of Academic Research in Business and Social Sciences, 2(1).
12. Lukman, R. & Krajnc, M. (2012). Exploring non-traditional learning methods in virtual and real-world environments. Article in
Educational Technology & Society, 15(1), 237-247.
13. Lumadi, M. W (2013). ELearning’s impact on the academic performance of student-teachers: a curriculum lens. Mediterranean Journal
of Social Sciences, 4(14).
14. Mann, A. S. (2014). Science Teachers‘ Experience in integrating Information and Communication Technology (ICT) into their teaching
practices. Degree of Master of Teaching Department of Curriculum, Teaching and Learning Ontario Institute for Studies in Education of
the University of Toronto.
15. Masoumi, D., & Lindström, B. (2012). Quality in E‐Learning: A Framework for Promoting and Assuring Quality in Virtual Institutions.
Journal of Computer Assisted Learning, 28(1), 27-41.
16. Osuafor, A. M. & Emeji, E. O. (2015). Utilization of ELearning Facilities by Science Teacher Educators for Teaching Pre-Service
Teachers in Nigerian Colleges of Education. Asian Journal of Education and E-Learning, 3(2).
17. Parry, D. C. L., Marwood, S., & Walsh, C. (2015). Realizing E-Learning matters in a Bioscience. Bioscience Education Journal, 10.
18. Sekaran, U., Bougie, R. (2017). Research Methods for Business: A Skill Building Approach. United Kingdom: John Wiley & Sons, Ltd,
Publication
19. Sclater, N. (2012). E-Learning in the Cloud. International Journal of Virtual and Personal Learning Environments, 1(1), 10-19.
20. Umar, I. N., & Jalil, N. A. (2012). ICT Skills, Practices and Barriers of Its Use Among Secondary School Students. Procedia – Social
and Behavioral Sciences, 46, 5672-5676.
21. Venkataraman, S. & Sivakumar, S. (2015). Engaging Students in Group Based learning through eLearning techniques in Higher
Education System. International Journal of Emerging Trends in Science and Technology, 2(1), 1741-1746.
22. Verhoeven, J. C., Heerwegh, D., & Kurt, D. W. (2012). First year university students’ self-perception of ICT skills: Do learning styles
matter? Education and Information Technologies, 17 (1), 109-133.
23. Wit, K.D., Heerwegh, D.& Verhoeven, J.C. (2012). Do ICT Competences Support Educational Attainment at University? Journal of
Information Technology Education, 11.

74. Authors: Chyntia Jaby ak Entuni, Tengku Mohd Afendi Zulcaffle


Paper Title: Simple Screening Method of Maize Disease using Machine Learning
Abstract: Plant leaf diseases are significant issue in agriculture field. Some of the common plant leaf diseases
are powdery mildew, dark spot and rust. They are a noteworthy wellspring of an immense number of dollar
worth of setbacks to farmers on a yearly premise. Plant breeders frequently need to screen countless number of
plant leaves to find the stage of diseases of their crops to perform an early treatments. Therefore, a robust
method for field screening is needed in order to spare the farmers and the environment as well. Inappropriate
used of treatments such as impulsive pesticides can imperil the environment. Hence, this paper present a simple
and efficient machine learning method which is Fuzzy C-Means algorithm to screen leaf disease severity in
maize. Fuzzy C-Means is a new algorithm and very efficient to be used in object detection. Therefore, it is
applicable to detect disease spot in plant leaf and measure the diseases severity. This field screening method help
the farmer to identify the progression of the diseases in their crops quicker and easier than the other field
screening techniques.

Keyword : Plant leaf disease, Field screening, Machine learning, Fuzzy C-Means, Maize.
References:
1. R. Kumar, K. Srinivas, and M. A. M. Miah, “12th Asian Maize Conference and Expert Consultation on Maize for Food, Feed,
Nutrition and Environmental Security,” no. October, 2014.W.-K. Chen, Linear Networks and Systems (Book style). Belmont, CA:
Wadsworth, 1993, pp. 123–135.
2. L. Ahirwar, “Assessment of system productivity of rice-maize cropping system under irrigated ecosystem,” no. March, pp. 0–4, 2019.
3. S. Bashir and N. Sharma, “Remote Area Plant Disease Detection Using Image Processing,” vol. 2, no. 6, pp. 31 –34, 2012.
4. A. R. Ram, “Plant Disease Detection Using Leaf Pattern : A Review,” vol. 2, no. 6, pp. 774–780, 2015.
5. B. N. Prasad, M. Rathore, G. Gupta, and T. Singh, “Performance Measure of Hard c-means, Fuzzy c-means and Alternative c-means
Algorithms,” vol. 7, no. 2, pp. 878–883, 2016.
464-467
6. J. D. K, R. Ganesan, and A. Merline, “Fuzzy-C-Means Clustering Based Segmentation and CNN-Classification for Accurate
Segmentation of Lung Nodules,” vol. 18, pp. 1869–1874, 2017.
7. P. A. S. Bhide, “Brain Segmentation using Fuzzy C means clustering to detect tumour Region,” vol. 1, no. 2, pp. 85–90, 2012.
8. V. Radhika, “Segmentation of Oil Spill Images using Improved FCM and Level Set Methods,” vol. 3, no. 7, pp. 2786–2791, 2011.
9. M. Rameez et al., “ScienceDirect Vehicle Vehicle Classification Based on Multiple Fuzzy C-Means Clustering Using Dimensions and
Speed Features Using Dimensions and Speed Features,” Procedia Comput. Sci., vol. 126, pp. 1344–1350, 2018.
10. M. Premasundari and C. Yamini, “A Violent Crime Analysis using Fuzzy C-Means Clustering Approach,” vol. 6956, no. April, pp.
1939–1944, 2019.
11. R. Suganya and R. Shanthi, “Fuzzy C- Means Algorithm- A Review,” vol. 2, no. 11, pp. 1–3, 2012.
12. A. Srivastava, B. Hazela, P. Khanna, and D. Arora, “Application of Fuzzy C-Means (FCM) Algorithm in Image Apportionment,” pp.
4–8, 2019.
13. C. Kanan and G. W. Cottrell, “Color-to-Grayscale : Does the Method Matter in Image Recognition,” vol. 7, no. 1, 2012.
14. K. Padmavathi and K. Thangadurai, “Implementation of RGB and Grayscale Images in Plant Leaves Disease Detection – Comparative
Study,” vol. 9, no. February, pp. 4–9, 2016.
15. R. V Yampolskiy, “Efficiency Theory : a Unifying Theory for Information, Computation and Intelligence,” vol. 1, no. 21, pp. 1–3,
2014.
16. A. N. Patil, “Survey on Detection and Classification of Plant Leaf Disease in Agriculture Environment,” vol2, no. 3, November, 2017.
17. V. Singh and A. K. Misra, “Detection of plant leaf diseases using image segmentation and soft computing techniques,” Inf. Process.
Agric., vol. 4, no. 1, pp. 41–49, 2017.
18. J. Garcia and A. Barbedo, “Digital image processing techniques for detecting, quantifying and classifying plant diseases,” pp. 1–12,
2013.
19. N. J. Cunniffe, F. F. Laranjeira, F. M. Neri, R. E. Desimone, and C. A. Gilligan, “Cost-Effective Control of Plant Disease When
Epidemiological Knowledge Is Incomplete : Modelling Bahia Bark Scaling of Citrus,” vol. 10, no. 8, 2014.
20. C. Schmitz, S. Bartsch, and A. Meyer, “Mobile App Usage and Its Implications for Service Management – Empirical Findings from
German Public Transport,” Procedia - Soc. Behav. Sci., vol. 224, no. August 2015, pp. 230–237, 2016.

Authors: Viktor Glaz, Yuliya Glaz, Aleksander Zbritskiy, Tatiana Ivchik, Alexey Tolmachev

Paper Title: Development of Systematic Methods for Managing Socio-Economic Systems


Abstract: This article presents the results of the development of scientifically based mechanisms for the
adaptation of Russian organizations to the conditions of the global market economy. The basis for this was the
study of the management system, its organizational structures, mechanisms that ensure a balanced management
system and meet modern market requirements. In this regard, one of the important factors, or rather, one of the
fundamental conditions, is the formation of a qualitatively new mobile management system that adequately
responds to external and internal changes, forming new forms of managerial decisions and well-reasoned plans
for their implementation..
75.
Keyword : socio-economic systems, management, management objects, controls
468-472
References:
1. Sukhodolov A.P., Marchenko V.A. 2018. System analysis, modeling, mathematical modeling. Irkutsk, Russia: Publishing House of the
Baikal University.
2. Mamchenko O.P. The optimal combination of centralization and decentralization of management and production of structurally
complex industrial companies (article). News of ASU, 2012; 2/1 (74): 294-299.
3. Fedorova E.A, Boldyreva R.Yu. Ways of development and efficient use of the mineral resource base of the region. Bulletin of Tula
State University. Earth sciences; # 2: 128-133.
4. Kononova E.S. Features of sustainable socio-economic development of the northern territories of the regions and a system for assessing
the sustainability of their socio-economic development. Economic sciences; # 135: 71-73.
5. Perov G.O. Management of socio-economic development of the Russian regions: innovative approaches. Current trends in regional
development, 2017: 69-75.
6. Berezhnaya Olga, Ivchik Tatiana, Zbritskiy Aleksander, Berezhnaya Elena, Pavlenko Vladimir. Industrial production as a factor of
sustainable development of the territory. Indo American Journal of Pharmaceutical Sciences, 2019; 06(04): 7034-7037.

Authors: Shabana Tabassum, SanjayKumar C. Gowre

Paper Title: DE-Mosaicing using Matrix Factorization Iterative Tunable Method


Abstract: A color image is captured though the single image sensor and it is named as the mosaicked image
and this is obtained through the CFA where the pixels are arranged such that any one of the color from the given
color component is recorded at every pixel. De-mosaicingis absolute reverse of mosaicking, where the process is
to reconstruct the full color image from the given incomplete color samples. In past several methods of de-
mosaicing have been proposed however, they have many shortcomings such as computational complexity and
high computational load, not matching the original images. Hence we have proposed a methodology named as
MFIT i.e. Matrix factorization Iterative Tunable approach, the main aim of this methodology is to improvise the
reconstruction quality. In order to achieve the better reconstruction quality we have used the MFIT algorithm at
each iteration this helps in avoiding the image artifacts and it is achieved through the image block adjustment
also it reduces the computational load. Moreover in order to evaluate the proposed algorithm we have compared
it with nearly 12 algorithm based on the value of PSNR and SSIM, the theoretical results and comparative
analysis shows that our algorithm excels compared to the other existing method of de-mosaicing.
Keyword : De-mosaicing, MFIT, Matrix Factorization, Iterative Tunable.
References:
1. R. Reulke and A. Eckardt, "Image quality and image resolution," 2013 Seventh International Conference on Sensing Technology
(ICST), Wellington, 2013, pp. 682-685.
2. R. Lukac and K. N. Plataniotis, "Color filter arrays: design and performance analysis," in IEEE Transactions on Consumer Electronics,
vol. 51, no. 4, pp. 1260-1267, Nov. 2005.
3. D. Su and P. Willis, "De-mosaicing of color images using pixel level data-dependent triangulation," Proceedings of Theory and
Practice of Computer Graphics, 2003., Birmingham, UK, 2003, pp. 16-23.
4. C. Chang, J. D. Segal, A. J. Roodman, R. T. Howe and C. J. Kenney, "Multiband charge-coupled device," 2012 IEEE Nuclear Science
Symposium and Medical Imaging Conference Record (NSS/MIC), Anaheim, CA, 2012, pp. 743-746.
5. D. Wang, G. Yu, X. Zhou and C. Wang, "Image demosaicking for Bayer-patterned CFA images using improved linear interpolation,"
2017 Seventh International Conference on Information Science and Technology (ICIST), Da Nang, 2017, pp. 464-469.
6. Chung-Yen Su, "Highly effective iterative de-mosaicing using weighted-edge and color-difference interpolations," in IEEE
Transactions on Consumer Electronics, vol. 52, no. 2, pp. 639-645, May 2006.
7. Petrova, Xenya&Glazistov, Ivan &Zavalishin, Sergey &Kurmanov, Vladimir &Lebedev, Kirill &Molchanov, Alexander
&Shcherbinin, Andrey &Milyukov, Gleb&Kurilin, Ilya. (2017). Non-iterative joint de-mosaicing and super-resolution framework. In
Proc. Electronic Imaging'2017.
8. X. Li and M. Orchard, “New edge directed interpolation,” IEEE Trans. Image Process., vol. 10, no. 10, pp. 1521–1527, Oct. 2001.
9. J. F. Hamilton Jr. and J. E. Adams, “Adaptive color plane interpolation in single color electronic camera,” U.S. Patent 5 629 734, May
1997.
76. 10. S.-C. Pei and I.-K. Tam, “Effective color interpolation
11. inCCDcolor filter arrays using signal correlation,” IEEE Trans. Circuits Systems Video Technol., vol. 13, no. 6, pp. 503 –513, Jun.
2003. 473-480
12. R. Kimmel, “De-mosaicing: Image reconstruction from CCD samples,” IEEE Trans. Image Process., vol. 8, no. 9, pp. 1221–1228, Sep.
1999.
13. Zhang C, Li Y, Wang J, Hao P (2016) Universal demosaicking of color filter arrays. IEEE Trans Image Process 25(11):5173–5186.
14. Duran J, Buades A (2015) A demosaicking algorithm with adaptive inter-channel correlation. Image Process Line 5:311–327.
https://doi.org/10.5201/ipol.2015.145. http://demo.ipol.im/demo/145/.
15. Pei SC, Tam IK (2003) Effective color interpolation in ccd color filter arrays using signal correlation.IEEE Trans CircSyst V id
Technol 13(6):503–513.
16. Chung KH, Chan YH (2010) Low-complexity color de-mosaicing algorithm based on integrated gradients. J Electr Imaging
19(2):021104–021104.
17. Baek M, Jeong J (2014) De-mosaicing algorithm using high-order interpolation with sobel operators. In:Proc. of the World Congress
on engineering and computer science
18. Wang YQ, Limare N (2015) A fast C++ implementation of neural network backpropagation training
19. algorithm: application to Bayesian optimal image de-mosaicing. Image Process Line 5:257–266. https://doi.org/10.5201/ipol.2015.137.
http://demo.ipol.im/demo/137/.
20. Prakash VS, Prasad KS, Prasad TJC (2016) Color image de-mosaicing using sparse based radial basis function network. Alexandria
Eng J
21. Wu J, Timofte R, Van Gool L (2016) De-mosaicing based on directional difference regression and
22. efficient regression priors IEEE transactions on image processing: a publication of the IEEE signal
23. processing society
24. Lee K, Jeong S, Choi Js, Lee S (2014) Multiscale edge-guided demosaicking algorithm. In: The 18th IEEE International symposium on
consumer electronics (ISCE 2014). IEEE, pp 1–3.
25. Pekkucuksen I, Altunbasak Y (2013) Multiscale gradients-based color filter array interpolation. IEEE Trans Image Process 22(1):157–
165.
26. Wu J, AnisettiM,Wu W, Damiani E, Jeon G (2016) Bayer demosaicking with polynomial interpolation.IEEE Trans Image Process
25(11):5369–5382
27. Wang J, Wu J, Wu Z, Jeon G (2017) Filter-based bayer pattern cfademosaicking. Circ, Syst, Signal
28. Process, 1–24
29. Sung DC, Tsao HW (2015) De-mosaicing using subband-based classifiers. Electron Lett 51(3):228–230
30. Gao D, Wu X, Shi G, Zhang L (2012) Color demosaicking with an image formation model and adaptive pca. J Vis Commun Image
Represent 23(7):1019–1030.
31. L. Zhang and X. Wu, “Color demosaicking via directional linear minimum mean square-error estimation,” IEEE Trans. Image
Processing, vol. 14, no. 12, pp. 2167–2178, 2005.
32. I. Pekkucuksen and Y. Altunbasak, “Gradient based threshold free color filter array interpolation,” in Proceedings of the International
Conference on Image Processing, ICIP, September 26-29, 2010, pp. 137–140.
33. J. Mairal, F. R. Bach, J. Ponce, G. Sapiro, and A.
34. Zisserman, “Nonlocal sparse models for image restoration,” in IEEE 12th International Conference on Computer Vision, ICCV,
September 27 - October 4, 2009, pp. 2272–2279.
35. L. Zhang, X. Wu, A. Buades, and X. Li, “Color demosaickingbylocal directional interpolation and nonlocal adaptive thresholding,” J.
Electronic Imaging, vol. 20, no. 2, p. 023016, 2011.
36. Y. M. Lu, M. Karzand, and M. Vetterli, “Demosaicking by alternating projections: Theory and fast one -step implementation,” IEEE
Trans. Image Processing, vol. 19, no. 8, pp. 2085–2098, 2010.
37. Y. Wang, “A multilayer neural network for image demosaicking,” in IEEE International Conference on Image Processing, ICIP,
October 27-30, 2014, pp. 1852–1856.
38. J. Duran and A. Buades, “A demosaicking algorithm with adaptive interchannel correlation,” IPOL Journal, vol. 5, pp. 311 –327, 2015.
39. M. Gharbi, G. Chaurasia, S. Paris, and F. Durand, “Deep joint demosaicking and denoising,” ACM Trans. Graph., vol. 35, no. 6, pp.
191–191, 2016.
40. Beyond color difference: Residual interpolation for color image demosaicking,” IEEE Trans. Image Processing, vol. 25, no. 3, pp.
1288– 1300, 2016.
41. J. Wu, R. Timofte, and L. J. V. Gool, “De-mosaicing based on directional difference regression and efficient regression priors,” IEEE
Trans. Image Processing, vol. 25, no. 8, pp. 3862–3874, 2016.
42. K. Hua, S. C. Hidayati, F. He, C. Wei, and Y. F. Wang, “Contextaware joint dictionary learning for color image demosaicking,” J.
Visual Communication and Image Representation, vol. 38, pp. 230–245, 2016.
43. D. S. Tan, W. Chen and K. Hua, "DeepDemosaicking: Adaptive Image Demosaicking via Multiple Deep Fully Convolutional
Networks," in IEEE Transactions on Image Processing, vol. 27, no. 5, pp. 2408-2419, May 2018.

Authors: R. Ezhil Pavai, P. Sangeetha, L. Balu


Compositional Effect of Barium Ions (Ba2+) on Ultrasonic, Structural and Thermal Properties of
Paper Title:
LeadBorate Glasses
Abstract: Glasses of the formula 68B2O3-(32-x)PbO-xBaO (0≤ x ≤ 12) were synthesized by standard melt
quench technique and investigated their properties using XRD, ultrasonic, FT-IR and DTA studies. No sharp
peaks are existing in the XRD spectra and the broad halo appeared around 2θ≈30o, which reflects the
characteristics of amorphous nature. Density decreases due to the replacement of higher molar mass by lower
molar mass. The ultrasonic velocity varies with the gradual substitutions of barium ions in leadborate host glass
matrix. The variations in elastic moduli such as L, G, K and E), Poisson’ sratio( ), acoustic impedance(Z),
microhardness (H) and Debye temperature (θD)were observed which resulted in compact glasses. The functional
groups of prepared glasses were studied by FTIR analysis and BO4 structural units enhanced with decreasing
BO3 structural units. Characteristic temperatures of DTA increase because of the higher bond strength of barium
ions and also strength of the glasses.

Keyword : BPBa glasses, DTA, FTIR, Ultrasonic velocity


References:
1. K. El-doweidar, , Y.M. Moustafa, I. Abbas, “Structure and some physical properties of PbO–P2O5 glasses,” Physica B. vol 339,
(2003) pp.237–245.
2. S. Rada, P. Pascuta, M. Culea, V. Maties, M. Rada, M. Barlea and E. Culea, “The local structure of europium-lead-borate glass
ceramics,” J. Mol. Structure. vol 924–926 (2009) pp.89-92.
3. S. Rada, P. Pascuta, M. Bosca, M.. Culea, L. Pop, E. Culea, “Structural properties of the borobismuthate glasses containing g adolinium
ions,” Vibrational Spectros copy. Vol 48, issue 2 (2008) pp.255-258.
4. M. Abid, M. Et-Tabirou, M. Taibi, “Structure and DC conductivity of lead Sodium ultraphosphate glasses,” Mater. Sci. Eng. B: vol
97 (2003) pp.20–24.
5. Andersson, L.P, E. Grusell and S.Berg, 1979. The prarallel-plate electrin multiplier. J. Phys. E: Sci. Instrum., 12:1015.
6. Paul W. Wang and Lipeng Zhang, 1996. Structural role of lead in lead silicate glasses derived from XPS spectra. J. Non -Cryst. Sol.,
194(1-2): 129-134.
77. 7. M.A. Ghauri, C.A. Hogarth, M.M. Ahmed, “X-ray diffraction density and electrical conductivity studies of some zinc borate glasses,”
J. Mater. Sci. Lett., vol 3 (1984) pp.341-344.
8. C.P. Kaushik, R.K. Mishra, P. Sengupta, D. Das, G.B. Kale, K. Raj, “Structural aspects of barium borosilicate glasses contain ing 481-485
thorium and uranium oxides,” J. Nucl. Mater. Vol 358 (2006) pp.129-138.
9. D. Singh K. Singh, G. Singh, Manupriya, S. Mohan, M. Arora, G. Sharma, “Optical and structural roperties of ZnO -PbO-B2O3 and
ZnO-PbO-B2O3-SiO2 glasses,” J. Phys.Condens. Matt., vol 20 (2008) pp.1-6.
10. O.V. Mazurin, M.V. Streltsina, T. Shvaiko- Shvaikovskaya, “The properties of the glasses and glass forming melts,” Nauka,
Leningrad, vol 5 (1987).
11. A. Armenak, Osipav, M. Leyla Osipova, “Raman scattering study of barium borate glasses and melts,” J. Phys & Chem. Solids, vol 74
(2013) pp.971-978.
12. Priyanka Goyal, Yogesh Kumar Sharma, Sudha Pal, Umesh Chandra Bind, Shu-Chi Huang, Shyan-Lung Chung. “The effect of SiO 2
content on structural, physical and spectroscopic properties of Er 3+doped B2O3-SiO2-Na2O-PbO-ZnO glass systems,” J. Non-
Cryst.Solids, vol 463 (2017) pp.118-127.
13. B. Yasser, Sadeek. “Ultrasonic study and physical properties of some borate glasses,” Mat. Chem. Phy. Vol 83 issue 2 (2004) p p.222-
228.
14. S. Rada, P. Pascuta, M. Culea, V. Maties, M. Rada, E. Barlea, M. Culea. “The local structure of europium- lead glass ceramics,” J.Mol.
Struct. Vol 924–926 (2009) pp. 89 – 92.
15. A. Abd El-Moneim. “Interpretation of elastic Properties and structure of TiO 2-CaO-Al2O3-B2O3 glasses,” Mater.Phys.Chem. Glasses.
Vol 45 (2004) pp. 15-20.
16. A. Abd El-Moneim, AM Abd El-Daiem, IM Youssof. “Ultrasonic and structural studies on TiO 2-doped CaO–Al2O3–B2O3 glasses,”
Phys.Stat.Sol. (2003) pp.192-201.
17. A. Abd El-Moneim, “Quantitative analysis of ultrasonic attenuation in TiO2-doped CaO–Al2O3–B2O3 glasses,” Mater.Chem.Phys. vol
98 (2006) pp. 261-266.
18. K.J. Singh, S.S. Bhatti, Elastic Moduli of Ferric Oxide Doped Zinc Oxide Borate Glasses, Acoustica, vol 81 issue 3 (1995) pp.285-287.
19. SP. Yawale, S.V. Pakede, C.S. Adgaonkar. “A New Type of Behaviour in Physical and Ultrasonic Properties of Bi 2O3-B2O3 Glasses,"
Acoustica, vol 81 (1995) pp.184-186.
20. A.A. Higacy, B. Bridge, “Elastic constants of the vitreous system Co 3O4- P2O5,” J. Non .Cryst. Solids, vol 72 issue 1(1985) pp. 81-
108.
21. M.A. Sidkey, A.M. Abd-El Fattah, L. Abd-El Latah, R.I. Nakhla, “Ultrasonic studies on some sodium borate glasses,” J. Pure & Appl
Ultrason, vol 12 (1990) pp.93-97.
22. G. Vamsi Priya, M. Upender, Prasad, “FTIR and EPR studies of VO2+ and B2O3-10 As2O3 – (30-x) PbO – x BaO Glass,” Phys and
Chem,vol 40 (2014) pp.144-150.
23. Gurinder Pal Singh, Simranpreet Kaur, Parvinder Kaur and Sunil Kumar, D.P. Singh, “Structural and optical properties of WO 3-ZnO-
PbO-B2O3 glasses,” Physica B: vol 406 (2011) pp.1890-1893.
24. Lakhwant Singh, Vanita Thakur, R. Punia, R.S. Kundu, Anupinder Singh, “Structural and optical properties of barium titnate mo dified
bismuth borate glasses,” Solid state Scis, vol 37 (2014) pp.64-71.
25. Gaafar M.S., Marzouk, S.Y., Zayed, H.A., Soliman, L.I., Serag El-Deen, A.H., “Structural studies and mechanical properties of some
borate glasses doped with different alkali and cobalt oxides,” Curr. Appl. Phys., vol 13 (2013) pp.152 -158.
26. Manisha Pal, Baishakhi Roy, Mrinal Pal, “Structural characterization of borate glasses containing zinc and manganese oxides,” J. Mod.
Phys., vol 2 (2011) pp.1062-1066.
27. Shelby, J.E., (1997) Introduction to Glass Science and Tcchnology. The Royal Society of Chemistry, UK.
28. M.A. Abdel-Rahim, A. El-Korashy, M.M. Hafiz, A.Z. “Mahmoud, Kinetic study of non-isothermal crystallization of BixSe 100− x
chalcogenide glasses,” Physica B: Vol 403 Issue 18 (2008) PP.2956-2962.
29. S.A. Reduan, S. Hashim, Z. Ibrahim, Y.S.M. Alajerami, M.H.A. Mhareb, M. Maqableh, R.S.E.S. Dawaud, N. Tamchek, “Physical and
optical properties of Li2O–MgO–B2O3 doped with Sm3+,” J. Mole Struc., Vol 1060 (2014) PP. 6–10.

Authors: A. Anbarasi, S. Ravi, J. Vaishnavi, S. V. Suresh Babu Matla

Paper Title: An Efficient Techniques used for Diagnosis of Mitral Valve Regurgitation Severity
Abstract: Mitral valve diseases are more common nowadays and might not show up any symptoms. The
earlier diagnosis of mitral valve abnormalities such as mitral valve stenosis, mitral valve prolapses and mitral
valve regurgitation is most important in order to avoid complex situation. Many existing methodologies such as
heart sound investigation model, 3-layered artificial neural network (ANN) of phonocardiogram recordings, 3-
layer artificial neural network (ANN) of phonocardiogram recording, echocardiography techniques and so on are
there for Mitral Valve diagnosis, but still most of the methods suffer from inefficient image segmentation and
misclassification problems. In order to address this issue, this paper proposes two techniques namely 1) Deep
Learning based Convolutional Neural Network (CNN) model for Mitral Valve classification model meant for
diagnosis and edge detection-based segmentation model to enhance the classifier accuracy. 2) Watershed
Segmentation for Mitral Valve identification and image segmentation and Xception model with Random Forest
(RF) classifier for training and classification. The proposed models are evaluated in terms of three parameters
namely accuracy, sensitivity and specificity, which proved that the proposed models are efficient and appropriate
for Mitral Valve diagnosis.

Keyword : Deep Learning based Convolutional Neural Network (CNN) model, Edge detection-based
segmentation model, Watershed Segmentation, Xception model with Random Forest (RF) classifier.
References:
1. B. Ericson, Heart Sounds and Murmurs: A Practical Guide, Mosby-Year Book Inc., 1997.
2. Ulrich, C., Jensen, M., Oberlin, R., Tavakolian, K., Khosrow-Khavar, F., Blaber, A., Sørensen, K. and Schmidt, S., 2018, September.
Determining the Respiratory State from a Seismocardiographic Signal-A Machine Learning Approach. In 2018 Computing in
Cardiology Conference (CinC) (Vol. 45, pp. 1-4). IEEE.
3. Ahmad, S.A., Chavan, C., Badhani, R., Diwan, A., Periasamy, M. and Wankhade, V., 2019. Epidemiology of frequent admitters of
cardiovascular diseases in urbanizing Pune population. Australasian Medical Journal (Online), 12(7), pp.189-199.
4. Mayr, A., Pamminger, M., Reindl, M., Greulich, S., Reinstadler, S.J., Tiller, C., Holzknecht, M., Nalbach, T., Plappert, D.,
Kranewitter, C. and Klug, G., 2019. Mitral annular plane systolic excursion by cardiac MR is an easy tool for optimized progn osis
assessment in ST-elevation myocardial infarction. European Radiology, pp.1-10.
5. DeGroff, Curt G., Sanjay Bhatikar, Jean Hertzberg, Robin Shandas, Lilliam Valdes-Cruz, and Roop L. Mahajan. "Artificial neural
78. network–based method of screening heart murmurs in children." Circulation 103, no. 22 (2001): 2711-2716.
6. H. Nygaard, L. Thuesen, J.M. Hasenkam, E.M. Pedersen, P.K. Paulsen, Assessing the severity of aortic valve stenosis by spectr al
analysis of cardiac murmurs (spectral vibrocardiography). Part I. Technical aspects, Journal of Heart Valve Disease 2 (July (4)) (1993) 486-491
454–467.
7. J.E. Hebden, J.N. Torry, Identification of aortic stenosis and mitral regurgitation by heart sound analysis, Computers in Cardiology 24
(1997) 109–112.
8. Bijvoet, G.P., Teske, A.J., Chamuleau, S.A.J., Hart, E.A., Jansen, R. and Schaap, J., 2019. Global longitudinal strain to predict left
ventricular dysfunction in asymptomatic patients with severe mitral valve regurgitation: literature review. Netherlands Heart Journal,
pp.1-8.
9. M. Brusco, H. Nazeran, Development of an intelligent PDA-based wearable digital phonocardiograph, in: Proceedings of the 2005
IEEE Engineering in Medicine and Biology 27th Annual Conference, 4, 2005, pp. 3506–3509.
10. J. Herold, R. Schroeder, F. Nasticzky, V. Baier, A. Mix, T. Huebner, A. Voss, Diagnosing aortic valve stenosis by correlation analysis
of wavelet filtered heart sounds, Medical and Biological Engineering and Computing 43 (2005) 451–456.
11. A. Voss, A. Mix, T. Huebner, Diagnosing aortic valve stenosis by parameter extraction of heart sound signals, Annals of Biomedical
Engineering 33 (September (9)) (2005) 1167–1174.
12. K. Higuchi, K. Sato, H. Makuuchi, A. Furuse, S. Takamoto, H. Takeda, Automated diagnosis of heart disease in patients with he art
murmurs: application of a neural network technique, Journal of Medical Engineering and Technology 30 (March–April (2)) (2006) 61–
68.
13. C. Ahlstrom, P. Hult, P. Rask, J.E. Karlsson, E. Nylander, U. Dahlstrom, P. Ask, Feature extraction for systolic heart murmur
classification, Annals of Biomedical Engineering 34 (November (11)) (2006) 1666–1677.
14. S. Pavlopoulos, A. Stasis, E. Loukis, A decision tree-based method for he differential diagnosis of aortic stenosis from mitral
regurgitation using heart sounds, Biomedical Engineering OnLine (June (3)) (2004) 1–5.
15. S. Chauhan, P. Wang, C.S. Lim, V. Anantharaman, A Computer Aided MFCC based HMM system for automatic auscultation,
Computers in Biology and Medicine 38 (2) (2008) 221–233.
16. I. Turkoglu, A. Arslan, E. Ilkay, An expert system for diagnosis of the heart valve diseases, Expert Systems with Applications 23
(2002) 229–236.
17. H. Uguz, A. Arslan, I. Turkoglu, A biomedical system based on hidden Markov model for diagnosis of the heart valve diseases, Pattern
Recognition Letters 28 (2007) 395–404.
18. E. Comak, A. Arslan, I. Turkoglu, A decision support system based on support vector machines for diagnosis of the heart valve
diseases, Computers in Biology and Medicine 37 (2007) 21–27.
19. Martin, Sébastien, Vincent Daanen, Olivier Chavanon, and Jocelyne Troccaz. "Fast segmentation of the mitral valve leaflet in
echocardiography." In International Workshop on Computer Vision Approaches to Medical Image Analysis, pp. 225 -235. Springer,
Berlin, Heidelberg, 2006.
20. Costa, Eva, Nelson Martins, Malik Saad Sultan, Diana Veiga, Manuel João Ferreira, Sandra da Silva Mattos, and Miguel Tavares
Coimbra. "A Preliminary Approach for the Segmentation of Mitral Valve Regurgitation Jet in Doppler Ecocardiography Images." I n
BIOIMAGING, pp. 47-54. 2017.
21. Dukler, Yoni, Yurun Ge, Yizhou Qian, Shintaro Yamamoto, Baichuan Yuan, Long Zhao, Andrea L. Bertozzi, Blake Hunter, Rafael
Llerena, and Jesse T. Yen. "Automatic valve segmentation in cardiac ultrasound time series data." In Medical Imaging 2018: Im age
Processing, vol. 10574, p. 105741Y. International Society for Optics and Photonics, 2018.
22. Pouch, Alison M., Hongzhi Wang, Manabu Takabe, Benjamin M. Jackson, Joseph H. Gorman III, Robert C. Gorman, Paul A.
Yushkevich, and Chandra M. Sehgal. "Fully automatic segmentation of the mitral leaflets in 3D Transesophageal echocardiographic
images using multi-atlas joint label fusion and deformable medial modeling." Medical image analysis 18, no. 1 (2014): 118-129.
23. Burlina, Philippe, Chad Sprouse, Daniel DeMenthon, Anne Jorstad, Radford Juang, Francisco Contijoch, Theodore Abraham, David
Yuh, and Elliot McVeigh. "Patient-specific modeling and analysis of the mitral valve using 3D-TEE." In International Conference on
Information Processing in Computer-Assisted Interventions, pp. 135-146. Springer, Berlin, Heidelberg, 2010.
24. P. Abdul Khayum, R. Sudheer Babu. Severity Analysis of Mitral Regurgitation Using Multi-Objective Firefly Optimization Method
International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8 Issue-4S2 March,
2019 P. Abdul
25. Villard, Pierre‐Frederic, Peter E. Hammer, Douglas P. Perrin, Pedro J. del Nido, and Robert D. Howe. "Fast image‐based mitral valve
simulation from individualized geometry." The International Journal of Medical Robotics and Computer Assisted Surgery 14, no. 2
(2018): e1880.
26. Saito, Ken, Hiroyuki Okura, Nozomi Watanabe, Kikuko Obase, Tomoko Tamada, Terumasa Koyama, Akihiro Hayashida, Yoji Neishi,
Takahiro Kawamoto, and Kiyoshi Yoshida. "Influence of chronic tethering of the mitral valve on mitral leaflet size and cooptation in
functional mitral regurgitation." JACC: Cardiovascular Imaging 5, no. 4 (2012): 337-345.

Authors: S. Ismail Kalilulah, B. Justus Rabi, Vidhya V

Paper Title: Secure Data Performance Analysis with OLSR and AODV Routing Protocols in MANET
Abstract: MANETs are vigorous network to obligate node links due to the wireless frequency affect the
network performance. It evaluates the link constancy by redefining the link availability that connected
throughout a specific time period. MANETs have an identical status to acquaintance by the node resources with
any other network. In this work, network is able to deal with vital reform that competent, consistent, and
accessible network to perform enhance network protocol along with data security. AODV network nodes need
connections broadcast forward the message that requested a connection that create a series of impermanent
routes back to the requesting node. In this work, a link state protocol is calculated an alternative and fragmented
path from source to destination by re-routing traffic through it, regardless of the locations of failure and the
number of failed links. Also, the purpose of this research work is to provide secure bit data networking and
occupy bit-memory address to enhance the node data capacity size, hence it reduces packets loss, delay time, and
improve throughput when re-join the nodes while failure. OLSR generate a control overhead to maintain routing
table to consume data traffic bandwidth. This study reduces the control overhead to improve the performance of
OLSR by optimizing control messages intervals to have enhanced and secure data transmission. In this work, a
secure and reliable bit-data is presented which have a memory address search process between two data address
as simulated in this work.

Keyword : AODV, MANET, OLSR, Routing Protocols, Intervals


References:
1. Abolhasan M., T. Wysocki, and E. Dutkiewicz, “A review of routing protocols for mobile adhoc networks”, Elsevier Journal of Ad
Hoc Networks, 2004.
2. Asma Ahmed, A. Hanan, Izzeldin Osman, “AODV Routing Protocol Working Process”, Journal of Convergence Information
Technology, Vol. 10, No. 02, pp. 1-8, March 2015.
3. Chen Y., Y. Tseng, J. Sheu, and P. Kuo, “On-Demand, Link-State, Multipath QoS Routing in a Wireless Mobile Ad-Hoc Network”,
79. Proceedings of European Wireless, pp. 135-141, February 2002.
4. Geetika Sharma, Anupam Mittal, Ruchi Aggarwal, “Attacks on Ad hoc On-Demand Distance Vector Routing in MANET”,
International Research Journal of Engineering and Technology, Vol. 03, No. 06, June 2016. 492-497
5. Harsimran kaur, Jasvir Singh, “A Brief Review: Routing Protocols AODV and DSDV for MANET”, International Journal of
Advanced Research in Computer Science, Vol. 8, No. 5, pp. 630-635, May-June 2017.
6. Joshi S., Kurundkar S. and Waghmare L., “Performance Analysis of Routing Protocol with Mobility Constraint”, IJCA Proceedings on
International Conference and workshop on Emerging Trends in Technology, Vol. 7, pp. 13-16, 2012.
7. Karamjeet Kaur, Sukhjeet Singh, Rahul Malhotra, “Design of open shortest path first Protocol –a link state protocol using OPNET
modular”, Vol. 1, No. 1, pp. 21 – 31, December 2012.
8. Kurkowski S., T. Camp, and M. Colagrosso, “MANET Simulation Studies: The Incredibles”, ACM SIGMOBILE Mobile Computing
and Communications Review, pp. 50-61, October, 2005.
9. Lakshman Naik. L., R.U. Khan and R.B. Mishra, “MANETs: QoS and Investigations on Optimized Link State Routing Protocol”,
International Journal of Computer Network and Information Security, Vol. 10, pp. 26-37, 2018.
10. Md. Niaz Imtiaz, Md. Mohidul Hasan, Md. Imran Ali and Md. Mostak Shaikh, “Performance Evaluation of Routing Protocols (AODV,
DSR, OLSR and DYMO) in MANET Considering Mobility Factor”, International Journal of Scientific & Engineering Research, Vol.
6, No. 12, pp. 714-720, December 2015.
11. Me´rindol P., P. Francois, O. Bonaventure, S. Cateloin, and J.J. Pansiot, “An efficient algorithm to enable path diversity in link state
routing networks”, Computer Networks, 2010.
12. Mounir Benzaid, Pascale Minet, Khaldoun Al Agha, “Integrating fast mobility in the OLSR routing protocol”, Mobile and Wireles s
Communication Networks, 2002.
13. Mueen Uddin, Azizah Abdul Rahman, Abdul Rahman Alarifi, Muhammad Talha, Asadullah Shah, Mohsin Iftikhar, “Improving
Performance of Mobile Ad-Hoc Networks Using Efficient Tactical on Dmand Distance Vector Routing Algorithm”, International
Journal of Innovative Computing, Information and Control, Vol. 8, No. 6, pp. 4375-4389, June 2012.
14. Navaid Akhter, Ammar Masood, Irfan Laone, “Performance Improvement of Optimized Link State Routing Protocol”, Semantic
Scholar, ICOMP’12, WorldComp, Las Vegas, Nevada, USA, 19 th July 2012.
15. Perkins C.E. and Royer E.M., “Ad-hoc On-Demand Distance Vector Routing”, Proceedings of the second IEEE Workshop o Mobile
Computing Systems and Applications, New Orleans, L.A., pp. 90-100, 1999.
16. Preeti Sachan and Pabitra Mohan Khilar, “Securing AODV Routing Protocol in MANET Based on Cryptographic Au thentication
Mechanism”, International Journal of Network Security and Its Applications, Vol. 3, No. 5, pp. 229-241, September 2011.
17. Radwan S. Abujassar and Mohammed Ghanbari, “Efficient Algorithms to Enhance Recovery Schema in Link State Protocols”,
International Journal of UbiComp, Vol. 2, No. 3, pp. 53-67, July 2011.
18. Renuka Sharma, Pankaj Kumar, Devottam Gaurav, “The Comprehensive Performance Evaluation of AODV and OSPF in WiMAX”,
International Journal of Computer Applications, Vol. 160, No. 6, pp. 29-36, February 2017.
19. Selladevi M., Duraisamy S., “Survey Paper on Various Security Attacks In Mobile Ad Hoc Network”, International Journal of
Computer Sciences and Engineering, Vol. 6, No. 1, pp. 156-160, 2018.
20. Yufei Cheng, “Performance Analysis of Transactional Traffic in Mobile Ad-hoc Networks”, Department of Electrical Engineering &
Computer Science, School of Engineering, University of Kansas, 2014.
21. Yu-Doo Kim, IL-Young Moon, Sung-Joon Cho, “A Comparison of Improved AODV Routing Protocol based on IEEE 802.11 and
IEEE 802.15.4”, Journal of Engineering Science and Technology, Vol. 4, No. 2, pp. 132 – 141, 2009.
22. Zhang L., H. Sun, Q. Sun, X.-Y. Hu and C. J. Guo, “Improvement of routing protocols AODV in wireless Ad-Hoc network”, World
Congress on Software Engineering, Hefei, China, 2009.
23. Zuhi Subedar, Satish Deshpande, “Hybrid Cryptography Approach for Securing MANETs – A Survey”, International Journal of
Innovative Research in Computer and Communication Engineering, Vol. 6, No. 1, pp. 166-172, January 2018.

Authors: Sakshi Kapoor, Rabina Verma, Surya Narayan Panda

Paper Title: Detecting Kidney Disease using Naïve Bayes and Decision Tree in Machine Learning
Abstract: Chronic Kidney Disease (CKD) mostly influence patients suffered from difficulties due to diabetes
or high blood pressure and make them unable to carry out their daily activities. In a survey , it has been revealed
that one in 12 persons living in two biggest cities of India diagnosed of CKD features that put them at high risk
for unfavourable outcomes. In this article, we have analyzed as well as anticipated chronic kidney disease by
discovering the hidden pattern of the relationship using feature selection and Machine Learning classification
approach like naive Bayes classifier and decision tree(J48). The dataset on which these approaches are applied is
taken from UC Irvine repository. Based on certain feature, the approaches will predict whether a person is
diagnosed with a CKD or Not CKD. While performing comparative analysis, it has been observed that J48
decision tree gives high accuracy rate in prediction. J48 classifier proves to be efficient and more effective in
detecting kidney diseases.

Keyword : Chronic Kidney disease (CKD), Classification Techniques- J48, machine learning, naïve Bayes.
References:
1. https://www.healthline.com/human-body-maps/kidney
2. https://kidney.org.au/your-kidneys/support/kidney-disease/types
80. 3. Abeer, Ahmad, ‘Diagnosis and Classification of Chronic Renal failure Utilizing Intelligent Data Mining Classification’, International
Journal of Information Technology and Web Engineering, Volume 9 Issue 4, Pages 1-12, October 2014
4. Z. Sedighi, H. Ebrahimpour-Komleh, and S. J. Mousavirad, ‘Feature selection effects on kidney disease analysis’, International 498-501
Congress on Technology, Communication and Knowledge (ICTCK), pp. 455–459, 2015.
5. Manish Kumar, ‘Prediction of Chronic Kidney Disease Using Random Forest Machine Learning Algorithm’, International Journal of
Compute Science and Mobile Computing, Vol 5, Issue 2, pp. 24-33, Feb-2016.
6. S. Ramya ,Dr. N. Radha, ‘Diagnosis of Chronic Kidney Disease Using Machine Learning Algorithms’, International Journal of
Innovative Research in Computer and Communication Engineering, Vol 4, Issue 1, January 2016.
7. D. S.Vijayarani, Mr. S. Dhayanand, ‘Data Mining Classification Algorithms for Kidney Disease Prediction’, International journal of
Cybernetics and informatics (IJCI), Vol 4, August 2015.
8. Lambodar Jeena, Narendra Ku. Kamila, ‘Distributed Data Mining Classification Algorithms for Prediction of Chronic Kidney Disease’,
International Journal of Engineering Research in management and Technology, Vol 4, Issue 11, Nov 2015
9. Jurlin Rubini, “Generating Comparative Analysis of Early Stage Prediction of Chronic Kidney Disease”, International Journal o f
Modern Engineering Research, Vol 5, Issue 7, July 2015
10. P. Swathi baby, T. Panduranga Vital, ‘Statistical Analysis and Predicting Kidney Disease Using Machine Learning Algorithms’,
International Journal of Engineering Research and Technology (IJERT), Vol 4, Issue 07, pp. 206-210, July -2015.
11. P. Panwong and N. Iam-On, ‘Predicting transitional interval of kidney disease stages 3 to 5 using data mining method’, Second Asian
Conference on Defence Technology (ACDT), Vol 12, Issue 2, pp. 145–150, 2016
12. K. R. A. Padmanaban and G. Parthiban, ‘Applying Machine Learning Techniques for Predicting the Risk of Chronic Kidney Disease’,
Indian Journal of Science and Technology, vol. 9, pp. 29, Aug. 2016.
13. Boukenze, A. Haqiq, and H. Mousannif, ‘Predicting Chronic Kidney Failure Disease Using Data Mining Techniques’, in Advances in
Ubiquitous Networking 2, Springer, Vol 8, pp. 701–712, Singapore, 2017.
14. https://archive.ics.uci.edu/ml/datasets/chronic_kidney_disease#
15. http://dataaspirant.com/2017/02/06/naive-bayes-classifier-machine-learning
16. http://shodhganga.inflibnet.ac.in/bitstream/10603/21206/14/14_chapter%205.

Authors: Vijayakumari G, Ganga Holi

Paper Title: Assessment of Joint Space in Knee Osteoarthritis using Particle Swarm Optimization Technique
Abstract: Osteoarthritis (OA) is one of the most common joint disorder which is debility seen in elderly &
overweight people which affects the cartilage of bone joints like knee, feet, hip, and spine. In OA usually,
cartilage is ruptured due to the kneading of bones with each other which will end up causing severe pain. In this
condition, it is necessary to analyze the severity of OA which involves various medical imaging and clinical
examination techniques. In this paper, automated analysis and detection of OA are proposed by calculating the
thickness of cartilage which also helps to effectively detect and analyze the abnormalities in bone structures.
81. Where we have considered various knee X-ray images. Initially, preprocessing and noise removal is performed.
Further by implementing Particle Swarm Optimization (PSO) segmentation and thresholding, the specified knee
region is cropped and analyzed to calculate the thickness of cartilage to detect the presence of OA. 502-507

Keyword : Osteoarthritis (OA), Articular Cartilage, X-ray images, Segmentation, Particle Swarm Optimization.
References:
1. Kazam JK, Nazarian LN, Miller TT, Sofka CM, Parker L, Adler RS, “Sonographic evaluation of femoral trochlear cartilage in patients
with knee pain”, Journal of Ultrasound in Medicine. Volume 30, Issue 6, pp: 797-802, Jun 2011.
2. Lilik Anifah, Ketut Eddy Purnama, Moch Hariadi, Mauridhi Hery Purnomo “Automatic Segmentation of Impaired Joint Space Are a for
Osteoarthritis Knee X-ray Image using Gabor Filter based Morphology Process”, The Journal of Technology & Science, Volume
22,Issue 3, pp:159-165,Aug 2011.
3. Mahima Shanker Pandey, Rajitha Suneeta Agarwal “ Computer Assisted Automated Detection of Knee Osteoarthritis using X-ray
Images”, Science& technology The International Quarterly Journal, ISSN 2394-3769, Volume 1, Issue 2,pp:74-79, April 2015.
4. Shivanand S. Gornale, Pooja U. Patravali, Ramesh R. Manza “A Survey on Exploration and Classification of Osteoarthritis Using Image
Processing Techniques”, International Journal of Scientific and Engineering Research (IJSER), ISSN 2229-5518, Volume 7, Issue 6,July
2016.
5. Bindushree R, Sanjeev Kubakaddi, Nataraj Urs “ Detection of Knee Osteoarthritis by Measuring the Joint Space Width in Knee X ray
Images”, International Journal of Electronics & Communication, ISSN 2321-5984, Volume 3, Issue 4, pp:18-21,April 2015.
6. Subramonium.M and Rajini.V “Support Vector Machine Approach for the Diagnosis of Arthritis from Digital X-ray Images Using Local
Ternary Pattern”, Indian Journal of Applied Research, Volume 3, Issue 9, Sept 2013.
7. G.W. Stachowiak, M. Wolski, and T. Woloszynski, P. Podsiadlo, “Detection and prediction of osteoarthritis in knee and hand jo ints
based on the X-ray image analysis”, Biosurface and Biotribology, Volume 2, Issue 4, pp: 162-172, Dec 2016.
8. Shamir L, Ling SM, Scott Jr WW, Bos A, Orlov N, Macura TJ, Eckley DM, Ferrucci L, Goldberg IG, “Knee X-ray image analysis
method for automated detection of osteoarthritis” IEEE Transactions on Biomedical Engineering Volume 56, Issue 2, pp:407-415, 2009.
9. N. Alamelumangai, Dr. J. Devishree, “PSO Aided Fuzzy Inference System for Ultrasound Image Segmentation”, International Journ al of
Computer Applications, Volume 7, Issue 14, pp. 16-20, 2010.
10. M.G.H. Omran, A. Salman, A.P. Engelbrecht, “Dynamic Clustering using PSO with Application in Image Segmentation”, Pattern
Analysis and Applications, Springer, Volume 8, Issue 4, pp. 332-344, 2006.
11. F. Yi, Z. Chongxun, P. Chen, L. Li, “White Blood Cell Image Segmentation using On-Line Trained Neural Network”, 27th Annual
International Conference of the Engineering in Medicine and Biology (IEEE-EMBS), pp. 6476-6479, 2005.
12. B.Jyothi, Y.Madhavee Latha, P.G.Krishna Mohan, V.S.K.Reddy “Medical Image Retrieval Using Moments”, International Journal of
Application or Innovation in Engineering & Management (IJAIEM), ISSN 2319 – 4847, Volume 2, Issue 1, Jan 2013.
13. Snekhalatha U, Anburajan M, Sowmiya V, Venkatraman B, and Menaka M “Automated hand thermal image segmentation and feature
extraction in the evaluation of rheumatoid arthritis”. Journal of engineering in medicine. 229. 319-31, 2015.
14. Shivanand S. Gornale, Pooja U. Patravali, Ramesh R. Manza, “Detection of Osteoarthritis using Knee X-Ray Image Analyses: A
Machine Vision Based Approach”, International Journal of Computer Applications (IJCA), ISSN-0975-8887, Volume 145, Issue 1,
pp.20-26, July 2016.
15. D E T Shepherd and B. B. Seedhom “Thickness of human articular cartilage in joints of the lower limb” Annals of the rheumatic
diseases, Volume 58, Issue 1, pp: 27-34, 1999.

Authors: Neha Munjal, Shiv Singh, Agnibha Das Majumdar, Gopal Rizal

Paper Title: Biophysics Research Trends in India: Special Reference to Indian Universities
Abstract: Biophysics is an effervescent scientific field where scientists from many areas including chemistry,
physics, zoology etc, use their skills to explore and develop new tools for understanding how the life sciences
work. The objective of this paper is to present the preliminary results and to identify the growth and
development of Indian research in Biophysics. The data was collected from Online Union Catalogue of Indian
Universities [1]. The catalogue has 4,36,967 Ph.D theses from 317 Indian universities. Indicators regarding the
distribution records of Biophysics thesis, as well as the subject, supervisor, top University, state wise, keywords
was analyzed with modular Scientometrics information system. The data comprises of 569 theses out of which
the majority was from West Bengal followed by Karnataka. The most contributor departments were Biophysics
followed by Physics.

Keyword : Biophysics, Indian Universities, Bibliometric, Physics, IndCat


References:
82. 1. https://indcat.inflibnet.ac.in/index.php/main/theses (Access on 25 Jan 2018)
2. Anonymous. “Doctoral dissertation in Library and Information Science.” PEARL- A journal of Library and Information Science, vol.
1(3), pp.53-79, 2007. 508-511
3. Jain A. and Garg K.C. “Laser research in India: scientific study and model projection.” Scientometerics vol. 23(3), pp.395 -415, 1992.
4. Mahapatra, R..K. and Sahoo, Jyotshna. “Doctoral dissertation in Library and Information Science in India 1997-2003: a study.” Annals
of Library and Information Studies, vol. 51(1), pp.58-63, 2004
5. Mohan, Brij, Singh, H.P. and Singh, S. “Education, Research and Practice in Remote Sensing and GIS: a study of Ph.D researche s
conducted in Indian Universities and Institutions from 1980 to 2016.” International Journal of Applied Business and Economic
Research 15(21, Part 2) pp. 509-519, 2017
6. Nandi, A., and Bandyopadhyay, A. K. “Research productivity of the Mathematics Department, the University of Burdwan during 1960-
2000: A bibliometric Study.” IASLIC Bulletin, vol.56 (1), pp.23-40, 2011
7. Singh, Shiv “Education, Research and Practice in Gandhian: a study of Ph.D researches conducted in Indian Universities and In stitution
from 1942 to 2016” University News, vol. 56(5), pp.12-16, Jan29- Feb 04, 2018
8. Hsieh PN., Chuang TM., Wang ML. “A Bibliometric Analysis of the Theses and Dissertations on Information Literacy Published in the
United States and Taiwan.” In: Chang RS., Jain L., Peng SL. (eds) Advances in Intelligent Systems and Applications - Volume 1.
Smart Innovation, Systems and Technologies, vol 20. Springer, Berlin, Heidelberg 2013
9. Huang,Ya-Li., Ho, Yuh-S. and Chuang, K.Y. “Bibliometric analysis of nursing research in Taiwan 1991-2004.” Journal of Nursing
Research, vol. 14(1), pp.75-80, 2006
10. Camps D1, Recuero Y, Samar ME, Avila RE. “Bibliometric analysis of doctorate thesis on the health sciences area: first part,
odontology” Rev Fac Cien Med Univ Nac Cordoba. vol. 62(3) pp. 53-66.2005
11. Skinner, Jason. "Bibliometrics and Social Network Analysis of Doctoral Research: Research Trends In Distance Learning."
(2016).http://digitalrepository.unm.edu/oils_etds/32

Authors: G.V.R.Seshagiri Rao, Vadnala Priyanka, V V S H Prasad

Paper Title: Design and Analysis of Automobile Bumper

83. Abstract: An automobile’s bumper is the front-most or rear-most part, ostensibly designed to allow the car to
sustain an impact without damage to the vehicle’s safety systems. They are not capable of reducing injury to
vehicle occupants in high-speed impacts, but are increasingly being designed to mitigate injury to pedestrians 512-516
struck by cars. The automobile bumper weight is reduced by the utilization of composite and high- strength
gilded sheet of a skinny material. Once the motor vehicle is hit from the front or behind, the bumper beam
collapses. The impact force is transmitted to the left and right front frames on the bumper beam and bumper
stays. The impact energy created throughout the crash is absorbed by plastic deformation on the bumper beam
and bumper stays that square measure the specified elements of bumper For characteristic the foremost effective
material, varied analysis like static analysis, impact or crash analysis, dynamic and modal analysis area unit
required the target of the work is to counsel the foremost effective material for bumper that is ready to ensure
rider safety, with high strength to weight quantitative relation through the static and dynamic analysis.

Keyword : Bumper, dynamic and modal analysis,


References:
1. RM Hosseinzadeh, M Shokrieh, and LB Lessard, “Parametric study of automotive composite bumper beams subjected to low -velocity
impacts”, J. Composite Stuct., 68 (2005):419-427.
2. S. Mohapatra “Rapid Design Solutions for Automotive Bumper Energy Absorbers using Morphing Technique”, Altair CAE users
Conference 2005, Bangalore, India.
3. JM Marzbanrad, M, Alijanpour, and MS Kiasat “Design and analysis of automotive bumper beam in low speed frontal crashesh”, Th in
Walled Struct., 47 (2009): 902- 911.
4. M Butler, Wycech J, Parfitt J, and Tan E, “Using Terocore Brand Structural Foam to Improve Bumper Beam Design”, SAE Technical
Paper, 2002,
5. R Andersson Schedin E, Magnusson C,Ocklund J, “The Applicability of Stainless Steel for Crash Absorbing Components”, SAE
Technical Paper, 2002.
6. Carley ME, Sharma AK, Mallela V, “Advancements in expanded polypropylene foam energy management for bumper systems”, SAE
Technical Paper, 2004.
7. Evans D and Morgan T, “Engineering Thermoplastic Energy for Bumpers”, SAE Paper, 1999.
8. A Masoumi, Mohammad Hassan Shojaeefard, Amir Najibi,“Comparison of steel, aluminum and composite bonnet in terms of
pedestrian head impact” College of Engineering, University of Tehran, Tehran, Iran, 2011: 1371–1380.
9. WJ Witteman “Improved Vehicle Crashworthiness Design by Control of the Energy Absorption for Different Collision Situations”,
Doctoral dissertation, Eindhoven University of Technology, 200 0.

Authors: Daniel C, Arunraj E, Vincent Sam Jebadurai S, Joel Shelton J, Hemalatha G

Paper Title: Dynamic Analysis of Structure using Fluid Viscous Damper for Various Seismic Intensities
Abstract: The Dynamic analysis for 5 Storey RC Structure with various seismic intensities are carried out in
the present work. SAP 2000 Software considered the structure for modeling. Six ground acceleration for various
intensities on MMI Scale to relate seismic response and seismic intensities. In the result, similar variation in
storey displacement and base shear with intensities V, VI, VII, VIII, IX and X was witnessed. Through this we
can conclude that RC Building using Time History analysis is essential to know if the structure is safe against
seismic force or not.

Keyword : RC buildings, Scaling, Seismic responses, Time History Analysis


References:
1. Pastia, Cristian, et al. "Seismic response of building structures with passive fluid dampers." the 5th international conferen ce on
Advanced Materials and Systems. 2014.
2. Patil, A. S., and P. D. Kumbhar. "Time history analysis of multistoried RCC buildings for different seismic intensities." International
Journal of Structural and Civil Engineering Research 2.3 (2013): 194-201.
3. Khan, Salman I., and Ashoke R. Mundhada. "COMPARATIVE STUDY OF SEISMIC PERFORMANCE OF MULTISTORIED RCC
BUILDINGS WITH FLAT SLAB AND GRID SLAB." International Journal of Structureal and Civil Engineering Research (IJSCER)
84. 4 (2015).
4. Mohan, Romy, and C. Prabha. "Dynamic analysis of RCC buildings with shear wall." International Journal of Earth Sciences and
Engineering 4.06 (2011): 659-662. 517-520
5. Wilkinson, S. M., and R. A. Hiley. "A non-linear response history model for the seismic analysis of high-rise framed buildings."
Computers & structures 84.5-6 (2006): 318-329.
6. Umachagi, Vajreshwari, et al. "Applications of dampers for vibration control of structures: an overview." International Journal of
Research in Engineering and Technology. EISSN (2013): 2319-1163.
7. Aye, Su Myat, and DR KYAW MOE AUNG. "Comparative Study on Seismic Response of RC Structure Using Viscous Dampers and
Viscoelastic Dampers." International Journal of Scientific Engineering and Technology Research, ISSN (2014): 2319-8885.
8. Parmar, Abhijitsinh, et al. "Seismic Response Control of Asymmetric Building Using VISCOUS DAMPER." International Journal of
Civil Engineering & Technology (IJCIET) 5.12 (2014): 267-276.
9. Miyamoto, H. Kit, et al. "Limit states and failure mechanisms of viscous dampers and the implications for large earthquakes."
Earthquake engineering & structural dynamics 39.11 (2010): 1279-1297.
10. Marano, Giuseppe Carlo, Francesco Trentadue, and Rita Greco. "Stochastic optimum design criterion for linear damper devices for
seismic protection of buildings." Structural and Multidisciplinary Optimization 33.6 (2007): 441-455.
11. Chang, Kuo-Chun, Yu-Yuan Lin, and Chang-Yu Chen. "Shaking table study on displacement-based design for seismic retrofit of
existing buildings using nonlinear viscous dampers." Journal of structural engineering 134.4 (2008): 671-681.
12. Ou, J. P., X. Long, and Q. S. Li. "Seismic response analysis of structures with velocity-dependent dampers." Journal of Constructional
Steel Research 63.5 (2007): 628-638.
13. Dicleli, Murat, and Anshu Mehta. "Seismic performance of chevron braced steel frames with and without viscous fluid dampers a s a
function of ground motion and damper characteristics." Journal of Constructional Steel Research 63.8 (2007): 1102-1115.
14. Tubaldi, Enrico, and Ioannis A. Kougioumtzoglou. "Nonstationary stochastic response of structural systems equipped with nonli near
viscous dampers under seismic excitation." Earthquake Engineering & Structural Dynamics 44.1 (2015): 121-138.

Authors: Dhananjaya, Balasubramani R

85. Paper Title: Accelerating Information Security in Cloud Computing using a Novel Holomorphic Scheme
Abstract: In the past decades, many security algorithms are invented and used in many applications for
521-529
encryption and decryption of information or data. All the secure algorithms were uses the security key of size
8bit, 16bit, 32bit, 64bit and 128bits for encryption and decryption but literature survey says that higher the key
size, higher the security. But the higher key size has number more bits and its requires more memory for storage
and also to perform each and every bit through computational operations leads to more delay. To address these
issues, the key and plain text are of 128bits and converted into integer. The converted integer values of key and
plaintext are encrypted and decrypted using Holomorphic through Advanced Encryption Standard (AES). The
research method is sophisticated and more protected through meaning fully lesser key in size and is
accomplished for encryption in terms integer key and plaintext moderately than binary bits, therefore larger size
of key and plaintext can be minimized and reduced the computational complexities. Finally the cipher text is
uploaded into cloud through Real Time Transport Protocol (RTP) and Real Time Transport Control Protocol
(RTCP) for storage. The main problem with continuous sharing of information into cloud is security attacks so
in this research work, three different multimedia signals such as ECG, EEG and biomedical images are
converted into integer and encrypted using AES. The stored data can access by the authorized users and can
decode the information after decryption using AES.

Keyword : Multimedia data, AES, Cloud, IOT, thingspeack and RTP-RTCP.


References:
1. C. Gentry, “A fully homomorphic encryption scheme”, Ph.D Thesis, Stanford University, 2009
2. C. Gentry, “Fully homomorphic encryption using ideal lattices”, In STOC, pp 169-178, ACM, 2009.
3. N. P. Smart, F. Vercauteren, “Fully homomorphic encryption with relatively small key and ciphertext sizes” In Public Key
Cryptography - PKC'10, Vol. 6056 of LNCS, pp. 420-443,Springer, 2010
4. M. V. Dijk, C. Gentry, S. Halevi, V. Vaikuntanathan, “Fully homomorphic encryption over the integers”, Proceedings of Eurocry pt,
5. Vol. 6110 of LNCS, pp. 24-43, Springer, 2010.
6. C. Gentry, “Computing arbitrary functions of encrypted data”, Communications of the ACM, 53(3), pp.97-105, 2010.
7. D. Stehlé, R. Steinfeld, “Faster fully homomorphic encryption. ASIACRYPT’2010, Vol. 6477 of LNCS, pp.377-394, Springer, 2010
8. N. Ogura, G. Yamamoto, T. Kobayashi, S. Uchiyama, “An improvement of key generation algorithm for Gentry’s homomorphic
9. encryption scheme”, Advances in Information and Computer Security - IWSEC 2010, Vol. 6434 of LNCS, pp. 70–83, Springer, 2010.
10. J. S. Coron, A. Mandal, D. Naccache and M. Tibouchi, “Fully homomorphic encryption over the integers with shorter public keys”,
CRYPTO 2011, P. Rogaway (Ed.), Vol. 6841 of LNCS, pp. 487-504, Springer, 2011.
11. Z. Brakerski, V. Vaikuntanathan, “Efficient fully homomorphic encryption from (standard) LWE”, Electronic Colloquium on
Computational Complexity (ECCC) 18: 109, 2011.
12. Z. Brakerski, V. Vaikuntanathan, “Fully homomorphic encryption from ring-LWE and security for key dependent messages. CRYPTO
2011, pp.505-524.
13. Z. Brakerski, C Gentry, V. Vaikuntanathan, “Fully homomorphic encryption without bootstrapping”, Electronic Colloquium on
Computational Complexity (ECCC) 18: 111, 2011.
14. P. Scholl, N.P. Smart, “Improved key generation for Gentry’s fully homomorphic encryption Scheme”, Cryptology ePrint Archive:
Report 2011/471, http://eprint.iacr.org/2011/471
15. Y Govinda Ramaiah.et.al, "Efficient Public key Homomorphic Encryption Over Integer Plaintexts", 978-1-4673-2588-2/12, 2012 IEEE.
16. Naveen Ghorpade.et.al, "Towards Achieving Efficient and Secure way to Share the Data", 2017 IEEE 7th International Advance
Computing Conference, 978-1-5090-1560-3/17, 2017 IEEE, DOI 10.1109/IACC.2017.10.
17. Hongchao Zhou.et.al, "Efficient Homomorphic Encryption on Integer Vectors and Its Applications", This work was supported in p art by
Draper Laboratory through the UR&D Program and by AFOSR under Grant No. FA9550-11-1-0183.
18. Tianying Xie.et.al, "Efficient Integer Vector Homomorphic Encryption Using Deep Learning for Neural Networks",Springer Nature
Switzerland AG 2018, L. Cheng et al. (Eds.): ICONIP 2018, LNCS 11301, pp. 83–95, 2018. https://doi.org/10.1007/978-3-030-04167-
0_8.
19. Pramod Kumar Siddharth,et.al, "A Homomorphic Encryption Scheme Over Integers Based on Carmichael’s Theorem",2016
International Conference on Electrical, Electronics, Communication, Computer and Optimization Techniques (ICEECCOT),978-1-
5090-4697-3/16,2016 IEEE.
20. Pan Yang.et.al, "An Efficient Secret Key Homomorphic Encryption Used in Image Processing Service",Hindawi Security and
Communication Networks Volume 2017, Article ID 7695751, 11 pages https://doi.org/10.1155/2017/7695751.
21. Hao Chen.et.al, "Logistic regression over encrypted data from fully homomorphicencryption",BMC Medical Genomics 2018, 11(Supp l
4):81, 10.1186/s12920-018-0397-z.
22. XunWang, et.al, "A More Efficient Fully Homomorphic Encryption Scheme Based on GSW and DM Schemes", Hindawi Security and
Communication Networks Volume 2018, Article ID 8706940, 14 pages https://doi.org/10.1155/2018/8706940.
23. Roger A. Hallman.et.al, "Homomorphic Encryption for Secure Computation on Big Data",In Proceedings of the 3rd International
Conference on Internet of Things, Big Data and Security (IoTBDS 2018), pages 340-347, ISBN: 978-989-758-296-7, 2018 by
SCITEPRESS – Science and Technology Publications.
24. Jheng-Hao.et.al, "Low-Complexity VLSI Design of Large Integer Multipliers for Fully Homomorphic Encryption", IEEE
TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 26, NO. 9, SEPTEMBER 2018, 1063-
8210,2018 IEEE.
25. Zekeriya Erkin.et.al, "Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing", IEEE
TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 3, JUNE 2012, 1556-6013, 2012 IEEE.
26. Mohanad Dawoud.et.al, "Privacy-Preserving Search in Data Clouds Using Normalized HomomorphicEncryption",Euro-Par 2014
Workshops, Part II, LNCS 8806, pp. 62–72, 2014.Springer International Publishing Switzerland 2014.
27. G. Dinesh Kumar.et.al,An Efficient Watermarking Technique for Biometric Images", Procedia Computer Science 115 (2017) 423–430,
1877-0509, 2017 Published by Elsevier B.V.

Authors: S. Jaya, M. Latha

Paper Title: Diagnosis of Cervical cancer using CLAHE and SGLDM on RGB Pap smear Images through ANN
Abstract: Cervical cancer is one of the most preventable Cancers in the present day. PAP and HPV tests are
86. followed for early diagnosis for screening procedure. In medical field, it is difficult to detect Pap smear images
through microscope. Image processing is a vital role to take right decision by using various technique and
algorithms. In this paper, the proposed technique is used to enhance the Pap smear images by comparing 530-534
Histogram Equalization in Contrast Stretching algorithm, Power Law Transformation for Gamma Correction,
Shading Correction, Contrast Limited Adaptive Histogram Equalization (CLAHE). The Quality measurement
MSE, PSNR, SC and NAC value has been calculated to find performance analysis of enhanced Pap smear
images. Then proposed four different feature extraction algorithms SGLDM- Spatial Gray Level Difference
Method, RDM- Run Difference Method, LBP- Local Binary Pattern and HOG-Histogram of Oriented Gradients
are used to extract features of Pap images. Experimental results are obtained for a data set of 215 Pap images
taken from the Management and Decision Engineering Laboratory (MDE-LAB) database. MATLAB R2016a
used as a programming tool. ANN Classification is used for each feature extraction algorithm to evaluate the
accuracy level. Thus, CLAHE achieved the good result for enhancement and SGLDM feature extraction
algorithm reached 93% accuracy using ANN.

Keyword : Cervical cancer, Pap smear image, Enhancement, Feature Extraction.


References:
1. Akinrotimi Akinyemi Omololu, Olugbebi Muyiwa Adeolu, ‘Modelling and Diagnosis of Cervical Cancer Using
2. Adaptive Neuro Fuzzy Inference System’, World Journal of Research and Review (WJRR) ISSN:2455-3956, Volume-6, Issue-5, Pages
01-03 May 2018.
3. Kashyap, D., Somani, A., Shekhar, J., Bhan, A., Dutta, M. K., Burget, R., & Riha, K. ‘Cervical cancer detection and classification using
Independent Level sets and multi SVMs’ 39th International Conference on Telecommunications and Signal Processing (TSP)
IEEE.doi:10.1109/tsp.2016.7760935- 2016,.
4. Teeyapan, K., Theera-Umpon, N., & Auephanwiriyakul, S. Application of support vector based methods for cervical cancer cell
classification, IEEE International Conference on Control System, Computing and Engineering
(ICCSCE).doi:10.1109/iccsce.2015.7482239, 2015.
5. Wasswa William,Andrew Ware, Annabella Habinka Basaza‑Ejire and Johnes Obungoloch, ‘A pap‑smear analysis tool (PAT)
for detection of cervical cancer from pap smear images’ BioMed Eng OnLine https://doi.org/10.1186/s12938-019-0634-5 BioMedical
Engineering OnLine, 2019.
6. B. Ashok, Dr. P. Aruna, ‘Comparison of Feature selection methods for diagnosis of cervical cancer using SVM classifier’, Int. Journal of
Engineering Research and Applications, ISSN: 2248-9622, Vol. 6, Issue 1, (Part - 1), pp.94-99, January 2016.
7. Shetty, A., & Shah, V. Survey of Cervical Cancer Prediction Using Machine Learning: A Comparative Approach.9th International
Conference on Computing, Communication and Networking Technologies (ICCCNT).doi:10.1109/icccnt.2018.8494169, 2018.
8. Ayubu Hassan Mbaga, Pei ZhiJun, ‘Pap Smear Images Classification for Early Detection of Cervical Cancer’, International Journ al of
Computer Applications (0975 – 8887) Volume 118 – No. 7, May 2015.
9. 8.m.k. Soumya, k. Sneha And c. Arunvinodh, Cervical Cancer Detection and Classification Using Texture Analysis, from Biomedical &
Pharmacology Journal Vol. 9(2), 663-671, 2016.
10. 9.Panagiotis Tsikouras, Stefanos Zervoudis, Bachar Manav, Eirini Tomara, George Iatrakis, Constantinos Romanidis, Anastasia Bothou,
George Galazios, ‘Cervical cancer: screening, diagnosis and staging’ Article in Journal of B.U.ON.: official journal of the Balkan
Union of Oncology, March 2016 ISSN: 1107-0625, online ISSN: 2241-6293.
11. Austin, R. M., Onisko, A., & Zhao, C. (2018). Enhanced Detection of Cervical Cancer and Precancer Through Use of Imaged Liquid-
Based Cytology in Routine Cytology and HPV Cotesting. American Journal of Clinical Pathology.doi:10.1093/ajcp/aqy114 -2018.
12. Janney.J, B., G, U., Divakaran, S., Mary Jo, S., & Basilica.S, N. ‘Classification of Cervical Cancer from MRI Images using Multiclass
SVM Classifier’. International Journal of Engineering & Technology, 7(2.25 .doi:10.14419/ijet.v7i2.25.12351, 2018.
13. Rajesh Kumar, Rajeev Srivastava, and Subodh Srivastava, ‘Detection and Classification of Cancer from Microscopic Biopsy Images
Using Clinically Significant and Biologically Interpretable Features’, Hindawi Publishing Corporation, Journal of Medical Eng ineering,
Volume 2015, Article ID 457906, 14 pages, http://dx.doi.org/10.1155/2015/457906, Received 11 May 2015; Revised
3 July 2015; Accepted 12 July 2015.
14. Sulaiman, S. N., Mat-Isa, N. A., Othman, N. H., & Ahmad, F. (2015). Improvement of Features Extraction Process and Classification of
Cervical Cancer for the NeuralPap System. Procedia Computer Science, Elsevier 60, 750–759.doi:10.1016/j.procs.2015.08.228.
15. Ms.M.S.Priya, Dr. G.M.Kadhar Nawaz, Department of Computer Science,’ Matlab Based Feature Extraction And Clustering Images
Using K-Nearest Neighbour Algorithm’ under IJAICT Volume 2, Issue 11, March 2016 Doi:01.0401/ijaict.2016.11.11 Published on 05
(04) 2016.

Authors: Sunil B. Ingole

Paper Title: Cooling Heat Transfer Analysis using Multiple Inline Inclined Air Jet Impingement
Abstract: Air cooling has its own advantages in packaging technology and such many applications. The
analysis of multi-jet impingement cooling process is performed. Air is used as fluid in present system. A
simulated component with heater plate is cooled with four jets. All jets are placed inline or considered in a row.
The jets are inclined to base and reference target to be cooled. The inclination of each jet is changed according to
various configurations from 60 and 120 Degree to make packaging as compact as possible. Different
configurations are examined and best combination is selected for study of variation of target to jet distance.
Interface of flow from one jet with other is creating turbulence and effect of this on cooling target plate is
studied experimentally. The graphs are plotted giving variations of Nusselt number as per Reynolds number in
laminar range up to 2000. Jet inclination combination with first jet -inside, second jet - outside, third jet -
outside, and fourth jet – inside is considered as giving best results with inclinations as 60-120-60-120 degree
87. respectively. The laminar flow, with jet position inline, in which jet fluid flow lines gets mixed and creating
turbulence gives higher average Nusselt number indicating better cooling performance. Further experiments 535-540
using various fluids and various jet combinations / inclinations may be performed. The correlation is presented
showing variation between Nusselt number and Reynolds number for typical case.

Keyword : Packaging, Cooling, Jet impingement, Inclined Jet, Average Nusselt number.
References:
1. Ingole S. B., "Heat transfer analysis for multiple jet cooling of high temperature electronics target," in IEEE International Conference
on Intelligent Computing and Control Systems, 2017.
2. Jung-Yang San, Wen-Zheng Shiao, "Effects of jet plate size and plate spacing on the stagnation Nusselt number for a confined circular
air jet impinging on a flat surface," International Journal of Heat and Mass Transfer , vol. 49, pp. 3477 - 3486, 2006.
3. E. Baydar, Y. Ozmen, "An experimental investigation on flow structures of confined and unconfined impinging air jets," Heat Mass
Transfer, vol. 42, pp. 338-346, 2006.
4. Jung-Yang San, Yi-Ming Tsou, Zheng-Chieh Chen, "Impingement heat transfer of staggered arrays of air jets confined in a channel,"
International Journal of Heat and Mass Transfer, vol. 50, pp. 3718-3727, 2007.
5. D. Rundström, B. Moshfegh, "Investigation of Heat Transfer and Pressure Drop of an Impinging Jet in a Cross-Flow for Cooling of a
Heated Cube," ASME Journal of Heat Transfer, vol. 130, 2008.
6. Ingole S. B., Sundaram K. K., "Review of Experimental Investigation In Heat Transfer For Jet Impingement Cooling," International
Review of Mechanical Engineering,, vol. 6, no. 3, pp. 346-356, 2012.
7. Mao-Yu Wen, "Flow structures and heat transfer of swirling jet impinging on a flat surface with micro-vibrations," International
Journal of Heat and Mass Transfer, vol. 48, pp. 545-560, 2005.
8. P. A. Dellenback, J. L. Sanger, "Heat Transfer in Coaxial Jet Mixing With Swirled Inner Jet," ASME Journal of Heat Transfer, vol.
116, pp. 864-870, 1994.
9. Sung Kook Hong, Dong Hyun Lee, Hyung Hee Cho, "Heat/Mass transfer measurement on concave surface in rotating jet
impingement," Journal of Mechanical Science and Technology, vol. 22, pp. 1952-1958, 2008.
10. F. Gori, I. Petracci, V. Tedesco, "Cooling of two smooth cylinders in row by a slot jet of air with low turbulence," Applied Thermal
Engineering, vol. 27, pp. 2415-2425, 2007.
11. A. M. Iluber, R. Viskanta, "Cornvective Heat Transfer to a Confined Impinging Array of Air Jets With Spent Air Exits," ASME Journal
of Heat Transfer, vol. 116, p. 571, 1994.
12. Jemmy S. Bintoro , Aliakbar Akbarzadeh, Masataka Mochizuki, "A closed-loop electronics cooling by implementing single phase
impinging jet and mini channels heat exchanger," Applied Thermal Engineering, vol. 25, pp. 2740-2753, 2005.
13. Colin Glynn, Tadhg O’Donovan, Darina B. Murray, "Jet Impingement Cooling," Unknown Source.
14. K. M. Graham, S. Ramadhyani, "Experimental and Theoretical Studies of Mist Jet Impingement Cooling," ASME Journal of Heat
Transfer, vol. 118, pp. 343-349, 1996.
15. Cemil Y, Nedim Sozbgr, S. C. Yao, Hasan Rıza Guven, "Experimental Measurements And Computational Modeling For The Spray
Cooling of A Steel Plate," Journal of Thermal Science and Technology, vol. 31, no. 1, pp. 27-36, 2011.
16. Giuseppe Di Lorenzo, OronzioManca, Sergio Nardini, Daniele Ricci, "Numerical Study of Laminar Confined Impinging Slot Jets wi th
Nanofluids," Hindawi Publishing Corporation Advances in Mechanical Engineering, pp. 1-15, 2012.
17. Weiwei Deng, Alessandro Gomez, "Electro spray cooling for microelectronics," International Journal of Heat and Mass Transfer, vol.
54, pp. 2270-2275, 2011.
18. Roy J. Issa, "Heat Transfer Performance of an Oil Jet Impinging on a Downward-Facing Stainless Steel Plate," Thermal Science, vol.
15, no. 2, pp. 397-408, 2011.
19. Jivtesh Garg, Mehmet Arik, Stanton Weaver, "Meso Scale Pulsating Jets for Electronics Cooling," Journal of Electronic Packaging,
vol. 127, pp. 503-511, 2005.
20. Yogen Utturkar, Mehmet Arik, "An Experimental and Computational Heat Transfer Study of Pulsating Jets," ASME Journal of Heat
Transfer, vol. 130, 2008.
21. Anna Pavlova, Michael Amitay, "Electronic Cooling Using Synthetic Jet Impingement," ASME Journal of Heat Transfer, vol. 128, pp.
897-907, 2006.
22. Dan S. Kercher, Jeong-Bong Lee, Oliver Brand, Mark G. Allen, Ari Glezer, "Microjet Cooling Devices for Thermal Management of
Electronics," IEEE Transactions on Components and Packaging Technologies , vol. 26, no. 2, pp. 539-546, 2003.
23. S. C. Arjocu, J. A. Liburdy, "Identification of Dominant Heat Transfer Modes Associated With the Impingement of an Elliptical Jet
Array," ASME Journal of Heat Transfer, vol. 122, pp. 240-247, May 2000.
24. Bertrand P.E. Dano, James A. Liburdy, Koonlaya Kanokjaruvijit, "Flow characteristics and heat transfer performances of a semi
confined impinging array of jets: effect of nozzle geometry," International Journal of Heat and Mass Transfer, vol. 48, pp. 6 91-701,
2005.
25. Brian P. Whelan, Anthony J. Robinson, "Nozzle geometry effects in liquid jet array impingement," Applied Thermal Engineering, vol.
29, pp. 2211-2221, 2009.
26. Azusa Kanamori, Munehiko Hiwada, Kenyuu Oyakawa, Izuru Senaha, "Effect of Orifice Shape on Flow Behavior and Impingement
Heat Transfer," The Open Transport Phenomena Journal, vol. 3, pp. 9-16, 2011.
27. Ingole S. B., K. K. Sundaram, "Heat Transfer Enhancement Factor Characteristics for Collective Cooling Using Inclined Air Jet," 17th
IEEE Electronics Packaging Technology Conference, pp. 1-6, 2015.
28. H. S. Sheriff , D. A. Zumbrunnen, "Effect of Flow Pulsations on the Cooling Effectiveness of an Impinging Jet," ASME Journal of
Heat Transfer, vol. 116, pp. 886-895, 1994.
29. Luis A. Brignoni, Suresh V. Garimella, "Experimental Optimization of Confined Air Jet Impingement on a Pin Fin Heat Sink," IEEE
Transactions On Components And Packaging Technology, vol. 22, no. 3, pp. 399-404, 1999.
30. D. H. Lee, Y. S. Chung, "Jet Impingement Cooling of Chips Equipped With Multiple Cylindrical Pedestal Fins," ASME Journal of
Electronic Packaging, vol. 129, pp. 221-228, 2007.
31. Seok Pil Jang, Sung Jin Kim, "Microchannel Heat Sink Subject to an Impinging Air Jet," ASME Journal of Heat Transfer, vol. 127,
pp. 770-779, 2005.
32. Sunil B Ingole, Kalyan K Sundaram, "Investigation of maximum Nusselt number with inclined and non-confined offset jet
impingement cooling," International Journal of Heat and Technology, vol. 36, no. 3, pp. 869-876, 2018.
33. Ingole S. B., Sundaram K. K., "Experimental average Nusselt number characteristics with inclined non-confined jet impingement of air
for cooling application," Experimental Thermal and Fluid Science, vol. 77, pp. 124-131, 2016.
34. Ali A. Al Mubarak, Syed M. Shaahid, Luai M. Al-Hadhrami , "Heat Transfer in a Channel with Inclined Target Surface Cooled By
Single Array of Centered Impinging Jet," Thermal Science, vol. 17, no. 4, pp. 1195-1206, 2013.
35. A.S. Cavadas, F.T. Pinho, J.B.L.M. Campos, "Laminar flow field in a viscous liquid impinging jet confined by inclined plane w alls,"
International Journal of Thermal Sciences , vol. 59, pp. 95-110, 2012.
36. Hakan F. Oztop ,Yasin Varol, Ahmet Koca, Mujdat Firat, Betul Turan, Ilhan Metin, "Experimental investigation of cooling of heated
circular disc using inclined circular Jet," International Communications in Heat and Mass Transfer, vol. 38, pp. 990-1001, 2011.
37. Naresh R., Ravinarayana Bhat N., "Experimental Investigation of Heat Transfer on an Inclined Plate Impinged with Cold Air Jet,"
International Journal of Science, Engineering and Technology Research, vol. 3, no. 6, pp. 1843-1849, 2014.
38. Haydar Eren, Nevin Celik, "Cooling of a heated flat plate by an obliquely impinging slot jet," International Communications in Heat
and Mass Transfer , vol. 33, pp. 372-380, 2006.
39. Jiwoon Song, Jang Woo Lee,Man Sun Yu,Sangwoo Shin,Beom Seok Kim, Hyung Hee Cho, "Thermal characteristics of inclined plate
impinged byunderexpanded sonic jet," International Journal of Heat and Mass Transfer, vol. 62, pp. 223-229, 2013.
40. Kyosung Choo, Tae Yeob Kang, Sung Jin Kim, "The effect of inclination on impinging jets at small nozzle-to-plate spacing,"
International Journal of Heat and Mass Transfer, vol. 55, pp. 3327-3334, 2012.
41. C. F. Ma, Q. Zheng, K. Wu, "Local characteristics of impingement heat transfer with oblique round free surface jets of large Prandtl
number liquid," Pergamon - International Journal of Heat and Mass Transfer, vol. 40, no. 10, pp. 2249-2259, 1997.
42. Mizuki Kito, "Effect of Inclination of Impinging Jets on Flow and Heat Transfer Characteristics," International Journal of Science and
Engineering Investigations, vol. 1, no. 9, pp. 42-47, 2012.
43. Kazuyoshi Nakabe, Elzbieta Fornalik, Jens F. Eschenbacher, Yu Yamamoto, Tomoyasu Ohta, Kenjiro Suzuki, "Interactions of
longitudinal vortices generated by twin inclined jets and enhancement of impingement heat transfer," International Journal of heat and
fluid flow, vol. 22, pp. 287-292, 2001.
44. S B Ingole, K K Sundaram, "Cold Zone Exploration Using Position of Maximum Nusselt Number for Inclined Air Jet Cooling,"
Archive of Mechanical Engineering, vol. 64, no. 4, pp. 533-549, 2017.
45. Sagar Chirade, S. B. Ingole, K K Sundaram, "Review of Correlations on Jet Impingement Cooling," International Journal of Science
and Research, vol. 4, no. 4, pp. 3107-3111, 2015.
46. Yue-Tzu Yang, Yong-Xun Wang, "Three-dimensional numerical simulation of an inclined jet with cross-flow," International Journal
of Heat and Mass Transfer , vol. 48, pp. 4019-4027, 2005.
47. B.Q. Li b, T. Cader, J. Schwarzkopf, K. Okamoto, B. Ramaprian, "Spray angle effect during spray cooling of microelectronics :
Experimental Measurements and comparision with Inverse Calculations," Applied Thermal Engineering , vol. 26, p. 1788–1795, 2006.
48. Carlo Bartoli, "Free convection enhancement between inclined wall and air in presence of expired jets at temperature differen ce of 40
K," Experimental Thermal and Fluid Science , vol. 35, pp. 283-290, 2011.
49. D. Benmouhoub, A, Mataoui, "Inclined Plane Jet Impinging a Moving Heated Wall," Fluid Dynamics and Materials Processings, vol.
10, no. 2, pp. 241-260, 2014.

Authors: Shaik Jhani Bhasha, Sunita P

Paper Title: An IoT-Based Body Area Network in Medical Care System: Related Challenges and Issues
Abstract: The Internet of Things (IoT) is the collection of open intelligent devices. The fast development of
IoT and the huge expansion of mobile technology are unveiling fresh growth opportunities in several areas,
including education, transport, and farming and, in particular, healthcare. Introduction of IoT via medical
applications has several advantages including cost savings by dropping hospital costs, health care costs, and
transportation costs, costs of human resources and costs of insurance. Recently, the academic world has
produced major progress in research and security development for IoT-based applications, particularly on IoT-
based healthcare devices. It contributes to an additional benefit of enhanced healthcare quality. However, the
increased use of IoT facilities in e-health applications, particularly in the insurance field, has resulted in
increased security and privacy issues. Medical applications are prone to data violations and widening security
problems due to the increase in access points to sensitive data through electronic medical records and the
increasing popularity of wearable technology. So there is a need of an efficient lightweight, secure verification
system, providing important security levels against various attacks, such as attacks by impersonation, a man in
the middle attack and unidentified key-sharing attacks for IoT foundation E-health. This article presents a survey
of problems, difficulties, and challenges a short analysis of multiple problems and problems suggested by
different authors using different techniques and methods.

Keyword : Authentication, Light weight, IoT, medical care system, Wireless body area network .
References:
1. Chiou, S.Y.; Ying, Z.; Liu, J. Improvement of a privacy authentication scheme Based on cloud for medical environment. J. Med. Syst.
2016, 40, 101.
2. He, D.; Kumar, N.; Chen, J. Robust anonymous authentication protocol for healthcare applications using wireless medical sensor
networks. Multimed. Syst. 2015, 21, 49–60.
3. Xin Liu,Ruisheng Zhang, Qidong Liu; A Temporal Credential-Based Mutual Authentication with Multiple-Password Scheme for
Wireless Sensor Networks, special issue Climate Change And Health, January 2017.
4. Li, C.T.; Lee, C.C.; Weng, C.Y. A secure cloud-assisted wireless body area network in mobile emergency medical care system. J. Med.
Syst. 2016, 40, 117.
88. 5. K. Vasanth and J. Sbert. Creating solutions for health through technology innovation. Texas Instruments. [Online]. Available:
http://www.ti.com/lit/wp/sszy006/sszy006.pdf, accessed Dec. 7, 2014.
6. University of Bristol. SPHERE 2015. Available online: http://www.irc-sphere.ac.uk/about 541-546
7. M. H. Riaz, U. Rashid, M. Ali L. Li, “Internet of Things Based Wireless Patient Body Area Monitoring Network”, 2017 IEEE
International Conference on Internet of Things (iThings), : 970-973.
8. Jie Wan , Munassar A. A. H. Al-awlaqi, MingSong Li, Michael O’Grady, Xiang Gu, Jin Wang and Ning Cao, “Wearable IoT enabled
real-time health monitoring system”, EURASIP Journal on Wireless Communications and
Networking, Dec 2018.
9. FarahNasri, Adel atif Mtibaa.” Smart Mobile Healthcare System Based on WBSN And 5G,” International Journal of Advanced
Computer Science and Applications, Vol. 8, No. 10, 2017.
10. OlutayoBoyinbode.” A Cloud-Based Body Area Sensor Network Mobile Healthcare System,” International Journal of Advanced
Research in Computer Science and Software Engineering Volume 7, Issue 5, May 2017.
11. Higinio Mora ID, David Gil ID, Rafael Muñoz Terol D, Jorge Azorín, D AndjulianSzymanski.” An IoT-Based Computational
Framework for Healthcare Monitoring In Mobile Environments, “Sensors 2017.
12. Kavitha.Y, Lavanya.M, Mounika.A, Sasirekha.KN.VignaVinod Kumar.” A Secure IoT-Based Modern Healthcare system Using Body
Sensor Network,” International Journal Of Innovative Research In Science, Engineering And Technology, Volume 6, Special Issue 3,
March 2017.
13. Yuwen Chen, Lourdes López, José-Fernán Martínez, and Pedro Castillejo, “A Lightweight Privacy Protection User Authentication and
Key Agreement Scheme Tailored for the Internet of Things Environment: LightPriAuth”, Journal of Sensors, September 2018.
14. V.Sethupathi and E.George Dharma Prakash Raj, “ESHCMA: Enhanced Secure Health Care Monitoring Algorithm using One-Time
Password in Wireless Body Area Networks”, International journal of Computer Science & Network Solutions Jun.2016 -Volume 4.No.6.
15. Jia-Li Hou and Kuo-Hui Yeh, “Novel Authentication Schemes for IoT Based Healthcare Systems”, International Journal of Distributed
Sensor Networks, August 2015.
16. Zisang Xu , Cheng Xu1, Wei Liang, Jianbo Xu, and Haixian Chen, “A Lightweight Mutual Authentication and Key Agreement Schem e
for Medical Internet of Things”, IEEE Transactions, volume 7, 2019.
17. Chien-Ming Chen, Bing Xiang, Tsu-Yang Wu, and King-Hang Wang’ “An Anonymous Mutual Authenticated Key Agreement Scheme
for Wearable Sensors in Wireless Body Area Networks”, Appl. Sci. 2018, 8, 1074.
18. Chen Wang, Wenying Zheng, Sai Ji, Qi Liu, and Anxi Wang, “Identity-Based Fast Authentication Scheme for Smart Mobile Devices in
Body Area Networks”, Wireless Communications and Mobile Computing, August 2018.
19. Jingwei Liu, Qian Li, Rui Yan and Rong Sun, “Efficient authenticated key exchange protocols for wireless body area networks”,
EURASIP Journal on Wireless Communications and Networking (2015) 2015:188.
20. C.-T. Li, C.-C. Lee, C.-Y. Weng, and S.-J. Chen, “A secure dynamic identity and chaotic maps based user authentication and key
agreement scheme for e-healthcare systems,” Journal of Medical Systems, vol. 40, no. 11, article 233, 10 pages, 2016.
21. C. Li, T. Wu, C. Chen, C. Lee, and C. Chen, “An efficient user authentication and user anonymity scheme with provably security for
IoT-based medical care system,” Sensors, vol. 17, no. 7, 1482, 18 pages, 2017.
22. Y. Park and Y. Park, “A selective group authentication scheme for IoT-based medical information system,” Journal of Medical Systems,
vol. 41, no. 4, article 48, 8 pages, 2017.

89. Authors: Sushanta K. Kamilla, Farida A. Ali


Experimental and Simulation Analysis of Thermal Vertical Directional Solidification Grown Ni
Paper Title:
Doped Bulk GASB
Abstract: Due to high hole mobility, p-GaSb is an attractive III-V semiconducting material for high
performance p-channel metal-oxide semiconductor field effect transistor (p-MOSFET). For that growth of
undoped and Ni doped GaSb bulk crystal by thermal vertical directional solidification has been reported in this
paper. Both structural and electrical characterization was carried out for both the samples. X-ray diffraction
(XRD) analysis confirms that the compound grown is polycrystalline in nature which has been supported by
scanning electron microscope (SEM) image. The carrier charge density and mobility were measured by Hall
Effect measurement in the temperature range 78K and 300K. From the sign of Hall co-efficient the grown
material was confirmed p-type. The Current-Voltage (I-V) characteristic was studied for the sample i.e.
experimentally grown and also simulated using TCAD at 78K and 300K. The temperature dependence of the
hole mobility were also investigated by TCAD tool using the models Auger recombination, Shockley-Read-Hall
(SRH) and Band-gap narrowing (BGN). Comparison of experimental and simulated temperature dependencies
of mobility shows good agreement, while their difference at some points suggests the contribution of
compensating impurities.

Keyword : -I-V study, p-GaSb, SILVACO, Thermal Vertical Directional Solidification (TVDS).
References:
1. Akiba, N., Chiba, D., Nakata, K., Matsukura, F., Ohno, Y., & Ohno, H. (2000). Spin-dependent scattering in semiconducting
ferromagnetic (Ga,Mn)As trilayer structures. Journal of Applied Physics. https://doi.org/10.1063/1.372730.Ali, F. A., Pattnaik, P., &
Kamilla, S. K. (2011).
2. Characterisation of bulk GaSb using TCAD. TechSym 2011 - Proceedings of the 2011 IEEE Students’ Technology Symposium.
https://doi.org/10.1109/TECHSYM.2011.5783847
3. Ancona, M. G., Bennett, B. R., & Boos, J. B. (2010). Scaling projections for Sb-based p-channel FETs. Solid-State Electronics.
https://doi.org/10.1016/j.sse.2010.06.022 547-550
4. Brongersma, M. L., Shalaev, V. M., Brongersma, M. L., Fleischmann, M., Hendra, P. J., McQuillan, A. J., … Engheta, N. (2010) .
Applied physics. The case for plasmonics. Science (New York, N.Y.). https://doi.org/10.1126/science.1186905
5. Communication, R., & Communication, R. (2008). Chinese Physics B. Ultramicroscopy. https://doi.org/10.1088/1674-1056/18/7/053
6. Dutta, P. S., Bhat, H. L., & Kumar, V. (1997). The physics and technology of gallium antimonide: An emerging optoelectronic material.
Journal of Applied Physics. https://doi.org/10.1063/1.365356
7. Ganesan, K., Rao, S. S., Bhat, S. V., & Bhat, H. L. (2011). Electron paramagnetic resonance studies on Mn doped GaSb. Journal of
Applied Physics. https://doi.org/10.1063/1.3543983
8. Hársy, M., Görög, T., Lendvay, E., & Koltai, F. (1981). Direct synthesis and crystallization of GaSb. Journal of Crystal Grow th.
https://doi.org/10.1016/0022-0248(81)90070-1
9. Hidalgo, P., Méndez, B., Piqueras, J., Plaza, J., & Diéguez, E. (1999). Scanning tunneling spectroscopy study of erbium doped GaSb
crystals. Journal of Applied Physics. https://doi.org/10.1063/1.370910
10. Kamilla, S. K., Ali, F. A., Samantaray, B. K., Basu, S., & Mohanty, M. (2014). Crystal growth of bulk Ga1-xNixSb ternary alloy and it’s
characterization between 78 K to 300 K. Advanced Science Letters. https://doi.org/10.1166/asl.2014.5437
11. Kamilla, S. K., Hazra, S. K., Samantaray, B. K., & Basu, S. (2011). Electrical and magneto resistance studies of bulk Ga1-xNi xSb
ternary alloys. Solid State Sciences. https://doi.org/10.1016/j.solidstatesciences.2010.11.020
12. Kamilla, Sushanta K., Samantaray, B. K., & Basu, S. (2006). Effect of Ni concentrations on the microhardness of GaNiSb ternary alloys.
Journal of Alloys and Compounds. https://doi.org/10.1016/j.jallcom.2005.06.074
13. Karar, N., & Basu, S. (1999). Synthesis and growth of Ga1-xFexSb, a new III-V diluted magnetic semiconductor. Materials Science and
Engineering B: Solid-State Materials for Advanced Technology. https://doi.org/10.1016/S0921-5107(99)00018-5
14. Roy, U. N., & Basu, S. (1988). Etch pit density variation and electrical properties of GaSb single crystals grown by the Brid gman
method. Materials Letters. https://doi.org/10.1016/0167-577X(88)90029-8
15. Šestáková, V., & Štěpánek, B. (1995). Doping of GaSb single crystals with various elements. Journal of Crystal Growth.
https://doi.org/10.1016/0022-0248(94)00485-4
16. Stollwerck, G. (2000). Characterization and simulation of GaSb device-related properties. IEEE Transactions on
17. Electron Devices. https://doi.org/10.1109/16.822293
18. Yuan, Z., Kumar, A., Chen, C. Y., Nainani, A., Bennett, B. R., Boos, J. B., & Saraswat, K. C. (2013). Antimonide-based heterostructure
p-channel MOSFETs with Ni-alloy source/drain. IEEE Electron Device Letters. https://doi.org/10.1109/LED.2013.2280615

Authors: Duangjai Puttasem


Development of Blended Learning Management to Improve 21st Century Learning Skills of
Paper Title:
Students in Computer and Educational Technology Program at Nakhon Sawan Rajabhat University
Abstract: The objectives of this research are to enhance the capability of blended learning model used in
Methodology in Teaching Computer course to develop 21st century learning skills, to compare students’ 21st
Century learning skill score before and after attending the course, which was for third-year students in Computer
Education Department, and to study the students’ level of satisfaction in the blended learning course. The Addie
Model was used in this research. In this study, 30 third-year Computer Education students in the first semester of
the academic year 2019 were selected as samples using the purposive sampling method. The tools used in this
90. research were teaching management plan stating models and methods for managing science learning areas, 21st
Century learning skill assessment for students and satisfaction survey for students attending the blended learning
course. The statistical tools used were average, standard deviation and t-Test. 551-553
The research of this result revealed that blended learning process consist of three stages, which were 1)
introduction 2) teaching and 3) conclusion. The result of expert evaluation showed that the teaching management
plan which employed blended learning approach was highly suitable (𝒙̅ = 4.70). After attending the
Methodology in Teaching Computer course which employed blended learning, the students’ 21st Century
learning skills improved significantly at the 0.05 level. The students’ satisfaction in the blended learning
activities was high.
Keyword : Blended Learning, 21st Century learning skills
References:
1. Anukulvej, A. (2012) Blended Learning. Retrieved from http://www.chontech.ac.th
2. Driscoll, M.. 2002. Web-based training: creating e-learning experiences. SanFrancisco:
3. Jossey-Bass, P., Johnson, K., McHugo, C., & Hall., T. 2006. Analysing the efficacy of blended learning using technology enhanced
learning (TEL) and m-Learning delivery technologies Retrieved. from http://www.
ascilite.org.au/conferences/sydney06/proceeding/pdf_paper/p73.pdf
4. Panich, V. (2012) The Way to Created Learning of Students in 21 st Century. Bangkok, Sodsree-Salit Foundations.
5. Wannapirun, P. & Nilsook, P. (2011) The Effectiveness of Blended Learning by Using Cognitive Tools for Developing Analytics
Thinking of Postgraduate Students, Department of Technical Education, the Faculty of Industrial Education, King’s Mongkut University
of Technology North Bangkok. Service Science Journal 22, 3 (September – December)

Authors: P.Kaliappan, Fabiyola Kavitha

Paper Title: Effect of OD Interventions on Building High Performing Teams


Abstract: Od Interventions Have Become Mandatory In The Current Scenario Of Organizations. Effective
Od Interventions Aims To Improve The Performance Of The Organizations. These Od Interventions Involve
Employees Trust And Support, They Respect The Opinions Of People And Confronts The Issues. There Are
Different Types Of Interventions To Be Followed For Different Issues In The Organisation. Od Professionals
Have Defined Which Interventions To Be Followed Against Each Type Of Issues. Sometimes Mix And Match
Of The Interventions Will Lay A Successful Role. This Paper Describes Few Types Of Interventions And
Dependency Of The Team Building On Od Interventions.
91.

Keyword : Effective Intervention, Team Building, Od Interventions, Types Of Interventions. 554-556

References:
1. Bridges, W (1991, 2003) Managing Transitions: Making the Most of Change. Cambridge, MA: Da Capo Press
2. Cummings, T & Worley, C (2001). Organization Development and Change, Mason, OH: South Western.
3. Corporate Leadership Council. (2001). The Leadership Imperative: Strategies for Increasing Leadership Bench Strength . Washington,
DC. Corporate Executive Board.
4. Robbins, S.P. (1994). Essentials of Organizational Behaviour (6th ed.) Upper Saddle River, NJ: Pearson Prentice Hall.
5. Schein, E. (1992), Organization Culture and Leadership (2nd Ed.) San Francisco, CA. Jossey-Bass Publishers.
6. https://sol.du.ac.in/mod/book/view.php?id=1803&chapterid=1752
7. http://corporatetrainingindia.net/odintervention.php

Authors: Korrapati Pratyusha, Doredla Nagaraju, K Dinesh Kumar

Paper Title: Effect of Soil Structure Interaction on Multi-Storeyed Building with Raft Foundation
Abstract: This paper addresses the behaviour of multi storey structure considering soil structure interaction
i.e. interaction between substructure of the building and soil. For this purpose a sample of 5 storey RC frames is
analysed in conventional method with incremental static analysis for various load combinations and determines
the parameters displacement, shear force and bending moment. Then a same 5 storey RC frame is analysed in
numerical analysis using Finite Element Method (FEM) with raft foundation by assigning the soil properties to
substructure and determine the parameters displacement, shear force and bending moment. According to the
analysis results the parameters displacements, shear force and bending moment varies from conventional
analysis to numerical analysis. Displacements of the structure increases, shear forces of the structure decreases
and bending moment of the structure decreases at some points and increases at some points from conventional
method of analysis to numerical method of analysis.

92. Keyword : Soil Structure interaction, Conventional Method of Analysis, Numerical Method of Analysis,
Displacement, Shear Force, Bending Moment..
557-570
References:
1. K. Natarajan and B. Vidivelli 2009 : Effect of column spacing on the behaviour of frame raft and soil systems.
2. Haytham Adnan Sadeq, Mohammed saleem Taha 2009: Structural design of raft foundation with soil structure interaction.
3. H.S Chore , V.A Sawant and R.K Ingle 2012: Non-linear analysis of pile groups subjected to lateral loads.
4. Sushma Pulikanti and Pradeep kumar Ramancharla 2013: SSI Analysis of framed structures supported on pile foundations
5. Vivek Garg and M.S Hora 2012: A review on interaction behavior of structure foundation soil system.
6. R. R. Chaudhari, Dr K. N. Kadam 2013: Effect Of Piled Raft Design On High-Rise Building Considering Soil Structure Interaction.
7. Gaikwad M.V, Ghogare R.B, Vagessha S. Mathada 2015: Finite element analysis of frame with soil structure interaction.
8. Lou Menglin, Wang Huaifeng, Chen Xi Zhai Yongmei 2011: Structure soil Structure interaction: literature review.
9. Dr. M. Reza Emami Azadi, Ali Akbar Soltani 2010: Effect of soil structure interaction on dynamic response of Delijan cement storage
silo under earthquake loading.
10. D. Daniel Thangaraj and L Ilampathi 2012: Numerical analysis of soil raft foundation and space frame system.
11. Eduardo Kausel 2010: Early history of soil structure interaction.
12. IS 875 (Part-3)-1987 Indian Standard Code of Practice for “Design of Wind Loads for Buildings and Structures”.
13. IS 456:2000 Indian Standard Code of Practice for “Plain and Reinforced concrete design”.
14. IS 1893 (Part-4)-2002 Indian Standard “Criteria for Earthquake Resistant Design of Structures”.

Authors: Omnia Hamdy, Remon A. Mankarious, M. A. Radwan, M. A. Sadek, Hany A. Elazab

93. Paper Title: Composite Materials Based on Twaron and Nano Materials
Abstract: This research aims to participate in producing body shield that can overcome pervious drawbacks 571-575
using behaviour of shear thickening fluid. Initially, the rheological behaviour of silica-polyethylene glycol shear
thickening fluid is examined at different concentrations. Then, ballistic fabric samples are impregnated into
silica-polyethylene glycol shear thickening fluid at various concentrations of silica and tested using gas gun
simulating real ballistic threat. After that, the impact of rubbery hot water pack filled with around 66.67 wt%
starch in water is tested using gas gun. Results showed as the concentration of silica increases, the indentation
depth in the impregnated fabric decreases which may result in improving performance of ballistic fabric to 12.5
% in case of using 60 wt% silica, 7.35 % in case of using 30 wt% silica and 3.31 % in case of using 7.5 wt%
silica with respect to plain sample. As it showed that no indentation depth is formed in modelling clay when
rubbery hot water pack filled with around 66.67 wt% starch in water is tested using gas gun causing
improvement percentage to be 100% compared to plain sample of Twaron (CT 714).

Keyword : Composite materials, Twarone, Nanomaterials.


References:
1. Baruwati, B., Magnetically recoverable supported ruthenium catalyst for hydrogenation. Tetrahedron Letters, 50(11): p. 1215 -1218,
2009.
2. Tarek M. Aboul-Fotouh, Sherif K. Ibrahim, M. A. Sadek, Hany A. Elazab, International Journal of Innovative Technology and
Exploring Engineering (IJITEE), 2019.
3. Yan, J.M., Magnetically recyclable Fe-Ni alloy catalyzed dehydrogenation of ammonia. Journal of Power Sources, 194(1): p. 478-481,
2009.
4. Hany A. Elazab, Tamer T. El-Idreesy, Bulletin of Chemical Reaction Engineering and Catalysis, 2019.
5. Hany A. Elazab, The Canadian Journal of Chemical Engineering, 2019.
6. Hany A. Elazab, Mamdouh Gadall, M. A. Sadek, Tamer T. El-Idreesy, , Biointerface Research in Applied Chemistry, 2019.
7. M. A. Radwan, Mohamed Adel Rashad, M. A. Sadek, Hany A. Elazab, Journal of Chemical Technology and Metallurgy, 2019.
8. W. Mohsen, M. A. Sadek, H. A. Elazab International Journal of Applied Engineering Research, 12, 14927-14930.
9. R. A. Mankarious, M. A. Radwan, M. Shazly, H. A. Elazab Journal of Engineering and Applied Sciences, 12, 2697-2701.
10. Marwa M. Naeem, M. A. Radwan, M. A. Sadek, H. A. Elazab Journal of Engineering and Applied Sciences, 12, 1179-1185.
11. Hany A. Elazab, S. Moussa, B. Gupton, M. El-Shall Journal of Nanoparticle Research. 2014, 16, 1-11.
12. Hany A. Elazab, S. Moussa, A. Siamaki, B. Gupton, M. El-Shall Catalysis Letters, 147, 1510-1522.
13. Hany A. Elazab, A. R. Siamaki, S. Moussa, B. F. Gupton, M. S. El-Shall Applied Catalysis A: General. 2015, 491, 58-69.
14. Hany A. Elazab, S. Moussa, K. W. Brinkley, B. Frank Gupton, M. Samy El-Shall Green Processing and Synthesis, 6, 413-424.
15. Hany A. Elazab, Mamdouh Gadall, M. A. Sadek, Tamer T. El-Idreesy, Biointerface Research in Applied Chemistry, 2019.
16. M. A. Radwan, Mohamed Adel Rashad, M. A. Sadek, Hany A. Elazab, Journal of Chemical Technology and Metallurgy, 2019.
17. Hany A. Elazab, S. A. Hassan, M. A. Radwan, M. A. Sadek, International Journal of Innovative Technology and Exploring Engineering
(IJITEE), 2019.
18. Hany A. Elazab, M. M. Seleet, Said M. A. Hassanein, M. A. Radwan, M. A. Sadek, International Journal of Innovative Technology and
Exploring Engineering (IJITEE), 2019
19. Hany A. Elazab, M. M. Seleet, Said M. A. Hassanein, M. A. Radwan, M. A. Sadek, International Journal of Innovative Technology and
Exploring Engineering (IJITEE), 2019.
20. Hany A. Elazab, M. M. Seleet, Said M. A. Hassanein, M. A. Radwan, M. A. Sadek, International Journal of Innovative Technology and
Exploring Engineering (IJITEE), 2019.
21. Hany A. Elazab, M. A. Sadek, Tamer T. El-Idreesy, Journal of Chemical Technology and Metallurgy, 2019.
22. Sherif Elbasuney, M. A. Radwan, Hany A. Elazab, Journal of Chemical Technology and Metallurgy, 2019.
23. Sherif Elbasuney, M. A. Radwan, Hany A. Elazab, Journal of Chemical Technology and Metallurgy, 2019.

Authors: Bassant Hussein, Yaser M. Asal, M. A. Radwan, M. A. Sadek, Hany A. Elazab

Paper Title: Decorative Articles Based on Polymeric Materials


Abstract: The aim of the research is to create decorative articles based on polymeric materials, study the
effects of fillers and the type of moulds that it can cope with the exothermic reaction nature of resin to create a
scientific background on the usage of the resins in daily life products. The polymeric materials that will be
concentrated on are the unsaturated polyester resins and epoxy resins. The unsaturated polyester is of many
types and chemical constituents, the used experimentally is a general-purpose type and the epoxy also have
different types and the used is a commercially 3D floor coating type. The resulted articles that were achieved in
the research from unsaturated polyester resins are two tables with different dimensions, vase, candle, decorative
articles and bricks. As for Epoxy, two different dimensions 3D tiles with artificial flower immersed within it.

Keyword : Decorative articles, Polymers.


94.
References:
1. M. Malik, V. Choudhary and I. K. Varma, “Current Status of Unsaturated Polyester Resins,” Journal of Macromolecular Science, vol. 576-579
40, pp. 139-165, 2000.
2. J. Scheirs and T. Long, Modern Polyesters: Chemistry and Technology of Polyesters and Copolyesters, West suss: John Wiley & Sons,
2006.
3. R. O. Ebewele, Polymer Science and Technology, CRC Press, 2000.
4. Baruwati, B., Magnetically recoverable supported ruthenium catalyst for hydrogenation. Tetrahedron Letters, 50(11): p. 1215 -1218,
2009.
5. Tarek M. Aboul-Fotouh, Sherif K. Ibrahim, M. A. Sadek, Hany A. Elazab, International Journal of Innovative Technology and
Exploring Engineering (IJITEE), 2019.
6. Yan, J.M., Magnetically recyclable Fe-Ni alloy catalyzed dehydrogenation of ammonia. Journal of Power Sources, 194(1): p. 478-481,
2009.
7. Hany A. Elazab, Tamer T. El-Idreesy, Bulletin of Chemical Reaction Engineering and Catalysis, 2019.
8. B. Ashraf, M. A. Radwan, M. A. Sadek, H. A. Elazab International Journal of Engineering and Technology(UAE), 2018, 7, 1295-1298.
9. Hany A. Elazab, Ali R. Siamaki, B. Frank Gupton, M. Samy El-Shall, Bulletin of Chemical Reaction Engineering and Catalysis, 2019.
10. N. S. Samir, M. A. Radwan, M. A. Sadek, H. A. Elazab International Journal of Engineering and Techn ology(UAE), 2018, 7, 1290-
1294.
11. H. A. Elazab, M. A. Sadek, T. T. El-Idreesy Adsorption Science & Technology, 2018, 36, 1352-1365.
12. F. Zakaria, M. A. Radwan, M. A. Sadek, H. A. Elazab, International Journal of Engineering and Technology, 2018, 7, 4, 1983 -1988.
13. R. Nasser, M. A. Radwan, M. A. Sadek, H. A. Elazab, International Journal of Engineering and Technology, 2018, 7, 4, 1989 -1994.
14. M. Ghobashy, M. Gadallah, T. T. El-Idreesy, M. A. Sadek, H. A. Elazab, International Journal of Engineering and Technology, 2018, 7,
4, 1995-1999.
15. H. A. Elazab, M. A. Sadek, T. T. El-Idreesy Adsorption Science & Technology, 2018, 36, 5-6, 1352-1365.
16. H. A. Elazab, Biointerface Research in Applied Chemistry, 2018, 8, 3314-3318.
17. H. A. Elazab, Biointerface Research in Applied Chemistry, 2018, 8, 3278-3281.
18. H. A. Elazab, M. A. Radwan, T. T. El-Idreesy International Journal of Nanoscience, 2018, 17, 3, 1850032.
19. Tarek M. Aboul-Fotouh, Eslam Alaa, M. A. Sadek, Hany A. Elazab, International Journal of Innovative Technology and Exploring
Engineering (IJITEE), 2019.
20. Hany A. Elazab, The Canadian Journal of Chemical Engineering, 2019.
21. Hany A. Elazab, Mamdouh Gadall, M. A. Sadek, Tamer T. El-Idreesy, , Biointerface Research in Applied Chemistry, 2019.
22. M. A. Radwan, Mohamed Adel Rashad, M. A. Sadek, Hany A. Elazab, Journal of Chemical Technology and Metallurgy, 2019.
23. W. Mohsen, M. A. Sadek, H. A. Elazab International Journal of Applied Engineering Research, 12, 14927-14930.
24. R. A. Mankarious, M. A. Radwan, M. Shazly, H. A. Elazab Journal of Engineering and Applied Sciences, 12, 2697-2701.
25. Marwa M. Naeem, M. A. Radwan, M. A. Sadek, H. A. Elazab Journal of Engineering and Applied Sciences, 12, 1179-1185.
26. Hany A. Elazab, S. Moussa, B. Gupton, M. El-Shall Journal of Nanoparticle Research. 2014, 16, 1-11.
27. Hany A. Elazab, S. Moussa, A. Siamaki, B. Gupton, M. El-Shall Catalysis Letters, 147, 1510-1522.
28. Hany A. Elazab, A. R. Siamaki, S. Moussa, B. F. Gupton, M. S. El-Shall Applied Catalysis A: General. 2015, 491, 58-69.
29. Hany A. Elazab, S. Moussa, K. W. Brinkley, B. Frank Gupton, M. Samy El-Shall Green Processing and Synthesis, 6, 413-424.
30. Hany A. Elazab, Mamdouh Gadall, M. A. Sadek, Tamer T. El-Idreesy, Biointerface Research in Applied Chemistry, 2019.
31. M. A. Radwan, Mohamed Adel Rashad, M. A. Sadek, Hany A. Elazab, Journal of Chemical Technology and Metallurgy, 2019.
32. Hany A. Elazab, S. A. Hassan, M. A. Radwan, M. A. Sadek, International Journal of Innovative Technology and Exploring Engineering
(IJITEE), 2019.
33. Hany A. Elazab, M. M. Seleet, Said M. A. Hassanein, M. A. Radwan, M. A. Sadek, International Journal of Innovative Technology and
Exploring Engineering (IJITEE), 2019
34. Hany A. Elazab, M. M. Seleet, Said M. A. Hassanein, M. A. Radwan, M. A. Sadek, International Journal of Innovative Technology and
Exploring Engineering (IJITEE), 2019.
35. Hany A. Elazab, M. M. Seleet, Said M. A. Hassanein, M. A. Radwan, M. A. Sadek, International Journal of Innovative Technology and
Exploring Engineering (IJITEE), 2019.
36. Hany A. Elazab, M. A. Sadek, Tamer T. El-Idreesy, Journal of Chemical Technology and Metallurgy, 2019.
37. Sherif Elbasuney, M. A. Radwan, Hany A. Elazab, Journal of Chemical Technology and Metallurgy, 2019.
38. Sherif Elbasuney, M. A. Radwan, Hany A. Elazab, Journal of Chemical Technology and Metallurgy, 2019.
Abdelrahman Mostafa Kamal,Sherif Bahgat, Mohamed Hammam, M. A. Radwan, M. A. Sadek,
Authors:
Hany A. Elazab
Paper Title: Microwave Assisted Synthesis of Binary Metallic Oxides for Catalysis Applications
Abstract: Herein, versatile, and reproducible method to prepare binary metal oxides via microwave assisted
synthesis. Catalysts are substances that basically speeds up chemical reactions. Ideally, bonds are formed
between the catalysts and the reactants. Also, catalysts permits formation of products from the reactants. These
formed products, splits off the catalyst without affecting or changing it. Catalytic kinetics studies the correlate
chemical reaction rate with some properties of reactants and/or products for instance; temperature, concentration
and pressure. The aim of the project is to prepare pure and bi-metal iron based catalyst by co-precipitation
method and to characterize the prepared sample using X-ray diffraction .Metal oxides nanoparticles is a field of
interest in catalysis, such that these oxides are used to oxidize carbon monoxide. The samples were prepared
through co-precipitation method in laboratory scale. The metals used was copper, iron and cobalt. After
preparing pure sample of each metal a mix of two metals were introduced in different ratios. The samples were
characterized via X-ray diffraction (XRD) and then the results were compared to exist data introduced from
others research, the prepared samples XRD was having a great matching with the data retrieved from internet
and we found that the metal could exist in two form of oxides and even could exist as pure metal. Each peak in
the XRD figure could indicate one or more phase of the metal.

Keyword : Hydrothermal, Palladium, Fe3O4, Nanotechnology.


95.
References:
1. Baruwati, B., Magnetically recoverable supported ruthenium catalyst for hydrogenation. Tetrahedron Letters, 50(11): p. 1215-1218, 580-582
2009.
2. Xu, M.H., et al., Synthesis and Properties of Magnetic Composites of Carbon Nanotubes/Fe Nanoparticle. Chinese Physics Letters,
26(11), 2009.
3. Yan, J.M., Magnetically recyclable Fe-Ni alloy catalyzed dehydrogenation of ammonia. Journal of Power Sources, 194(1): p. 478-481,
2009.
4. Yang, D.P., Microwave Rapid Synthesis of Nanoporous Fe(3)O(4) Magnetic Microspheres. Current Nanoscience, 5(4): p. 485-488,
2009.
5. B. Ashraf, M. A. Radwan, M. A. Sadek, H. A. Elazab International Journal of Engineering and Technology(UAE), 2018, 7, 1295-
1298.
6. A. R. Mostafa, H. A.-S. Omar, A. E. Hany Agricultural Sciences, 2016, Vol.08No.02, 11.
7. N. S. Samir, M. A. Radwan, M. A. Sadek, H. A. Elazab International Journal of Engineering and Technology(UAE), 2018, 7, 1290-
1294.
8. H. A. Elazab, M. A. Sadek, T. T. El-Idreesy Adsorption Science & Technology, 2018, 36, 1352-1365.
9. F. Zakaria, M. A. Radwan, M. A. Sadek, H. A. Elazab, International Journal of Engineering and Technology, 2018, 7, 4, 1983 -1988.
10. R. Nasser, M. A. Radwan, M. A. Sadek, H. A. Elazab, International Journal of Engineering and Technology, 2018, 7, 4, 1989-1994.
11. M. Ghobashy, M. Gadallah, T. T. El-Idreesy, M. A. Sadek, H. A. Elazab, International Journal of Engineering and Technology, 2018,
7, 4, 1995-1999.
12. H. A. Elazab, M. A. Sadek, T. T. El-Idreesy Adsorption Science & Technology, 2018, 36, 5-6, 1352-1365.
13. H. A. Elazab, Biointerface Research in Applied Chemistry, 2018, 8, 3314-3318.
14. H. A. Elazab, Biointerface Research in Applied Chemistry, 2018, 8, 3278-3281.
15. H. A. Elazab, M. A. Radwan, T. T. El-Idreesy International Journal of Nanoscience, 2018, 17, 3, 1850032.
16. M. A. Radwan, Omar Al-Sweasy, M. A. Sadek, Hany A. Elazab, International Journal of Engineering and Technology(UAE), Volume
7, No 4.29, 168-171, November 2018.
17. Hany A. Elazab, The Canadian Journal of Chemical Engineering, 2019.
18. Hany A. Elazab, Mamdouh Gadall, M. A. Sadek, Tamer T. El-Idreesy, , Biointerface Research in Applied Chemistry, 2019.
19. M. A. Radwan, Mohamed Adel Rashad, M. A. Sadek, Hany A. Elazab, Journal of Chemical Technology and Metallurgy, 2019.
20. W. Mohsen, M. A. Sadek, H. A. Elazab International Journal of Applied Engineering Research, 12, 14927-14930.
21. R. A. Mankarious, M. A. Radwan, M. Shazly, H. A. Elazab Journal of Engineering and Applied Sciences, 12, 2697-2701.
22. Marwa M. Naeem, M. A. Radwan, M. A. Sadek, H. A. Elazab Journal of Engineering and Applied Sciences, 12, 1179-1185.
23. Hany A. Elazab, S. Moussa, B. Gupton, M. El-Shall Journal of Nanoparticle Research. 2014, 16, 1-11.
24. Hany A. Elazab, S. Moussa, A. Siamaki, B. Gupton, M. El-Shall Catalysis Letters, 147, 1510-1522.
25. Hany A. Elazab, A. R. Siamaki, S. Moussa, B. F. Gupton, M. S. El-Shall Applied Catalysis A: General. 2015, 491, 58-69.
26. Hany A. Elazab, S. Moussa, K. W. Brinkley, B. Frank Gupton, M. Samy El-Shall Green Processing and Synthesis, 6, 413-424.
27. Hany A. Elazab, Mamdouh Gadall, M. A. Sadek, Tamer T. El-Idreesy, Biointerface Research in Applied Chemistry, 2019.
28. M. A. Radwan, Mohamed Adel Rashad, M. A. Sadek, Hany A. Elazab, Journal of Chemical Technology and Metallurgy, 2019.
29. Hany A. Elazab, S. A. Hassan, M. A. Radwan, M. A. Sadek, International Journal of Innovative Technology and Exploring
Engineering (IJITEE), 2019.
30. Hany A. Elazab, M. M. Seleet, Said M. A. Hassanein, M. A. Radwan, M. A. Sadek, International Journal of Innovative Technology and
Exploring Engineering (IJITEE), 2019
31. Hany A. Elazab, M. M. Seleet, Said M. A. Hassanein, M. A. Radwan, M. A. Sadek, International Journal of Innovative Technology and
Exploring Engineering (IJITEE), 2019.
32. Hany A. Elazab, M. M. Seleet, Said M. A. Hassanein, M. A. Radwan, M. A. Sadek, International Journal of Innovative Technology and
Exploring Engineering (IJITEE), 2019.
33. Hany A. Elazab, M. A. Sadek, Tamer T. El-Idreesy, Journal of Chemical Technology and Metallurgy, 2019.
34. Sherif Elbasuney, M. A. Radwan, Hany A. Elazab, Journal of Chemical Technology and Metallurgy, 2019.
35. Sherif Elbasuney, M. A. Radwan, Hany A. Elazab, Journal of Chemical Technology and Metallurgy, 2019.
36. Hany A. Elazab, Tamer T. El-Idreesy, Bulletin of Chemical Reaction Engineering and Catalysis, 2019.
37. Hany A. Elazab, Ali R. Siamaki, B. Frank Gupton, M. Samy El-Shall, Bulletin of Chemical Reaction Engineering and Catalysis, 2019.
38. Tarek M. Aboul-Fotouh, Eslam Alaa, M. A. Sadek, Hany A. Elazab, International Journal of Innovative Technology and Exploring
Engineering (IJITEE), 2019.
39. Tarek M. Aboul-Fotouh, Sherif K. Ibrahim, M. A. Sadek, Hany A. Elazab, International Journal of Innovative Technology and
Exploring Engineering (IJITEE), 2019.

Authors: S. P. Maniraj, Harie Krishnan G, Surya T, Pranav R

Paper Title: Fake Account Detection using Machine Learning and Data Science
Abstract: Nowadays, Online Social Media is dominating the world in several ways. Day by day the number
of users using social media is increasing drastically. The main advantage of online social media is that we can
connect to people easily and communicate with them in a better way. This provided a new way of a potential
attack, such as fake identity, false information, etc. A recent survey suggest that the number of accounts present
in the social media is much greater than the users using it. This suggest that fake accounts have been increased in
the recent years. Online social media providers face difficulty in identifying these fake accounts. The need for
identifying these fake accounts is that social media is flooded with false information, advertisements, etc.
Traditional methods cannot distinguish between real and fake accounts efficiently. Improvement in fake account
creation made the previous works outdated. The new models created used different approaches such as
automatic posts or comments, spreading false information or spam with advertisements to identify fake accounts.
Due to the increase in the creation of the fake accounts different algorithms with different attributes are use.
Previously use algorithms like naïve bayes, support vector machine, random forest has become inefficient in
finding the fake accounts. In this research, we came up with an innovative method to identify fake accounts. We
96.
used gradient boosting algorithm with decision tree containing three attributes. Those attributes are spam
commenting, artificial activity and engagement rate. We combined Machine learning and Data Science to 583-585
accurately predict fake accounts.

Keyword : Data science, Fake account detection, Machine learning, Online social media
References:
1. ”Detection of Fake Twitter accounts with Machine Learning Algorithms” Ilhan aydin,Mehmet sevi, Mehmet umut salur.
2. ”Detection of fake profile in online social networks using Machine Learning” Naman singh, Tushar sharma, Abha Thakral, Tanupr iya
Choudhury.
3. ”Detecting Fake accounts on Social Media” Sarah Khaled, Neamat el tazi, Hoda M.O. Mokhtar.
4. ”Twitter fake account detection”, Buket Ersahin, Ozlem Aktas, Deniz kilinc, Ceyhun Akyol.
5. ” a new heuristic of the decision tree induction” ning li, li zhao, ai-xia chen, qing-wu meng, guo-fang zhang.
6. ” statistical machine learning used in integrated anti-spam system” peng-fei zhang, yu-jie su, cong wang.
7. ” a study and application on machine learning of artificial intellligence” ming xue, changjun zhu.
8. ” learning-based road crack detection using gradient boost decision tree” peng sheng, li chen, jing tian.
9. ” verifying the value and veracity of extreme gradient boosted decision trees on a variety of datasets” aditya gupta, kunal gusain,
bhavya popli.
10. ” fake account identification in social networks” loredana caruccio, domenico desiato, giuseppe polese.

Authors: Elena Vladimirovna Ponomarenko

Paper Title: Tradition in the Architecture of Wooden Churches in the South Urals
Abstract: The subject of this paper seems to be important due to the ever-increasing interest in architectural
97. traditions of Russia’s regions. The purpose of the article is to identify the characteristic features of the
architecture of modern wooden temples in the territory of the South Urals. The key approach I chose for this
586-592
study was historical architectural analysis and integration of data from archives and field surveys. A novel
systematic analysis of the evolution of church design in the region since ancient times till nowadays is offered.
For the first time, a study is made of churches building based on ‘model church design projects for Orenburg the
Orenburg defence lines’ and exemplary albums. Descriptions and analyses of the region’s lesser known little
known specimen of religious architecture are introduced for the scientific use based on the author’s own in situ
investigations. Many archival materials from Russia's central and regional repositories are considered and
published at for the first time. Key properties of modern region Eastern Orthodox churches built in different
architecture styles are formulated and classified.

Keyword : architectural solutions and concepts in church building - church architecture in XVIII and XIX
centuries - modern features of church architecture.
References:
1. Chernavskiy, N.M., (1900). Orenburgskaya eparkhiya v proshlom eya i nastoyashchem. Vypusk 1. [The Orenburg Eparchy in its past
and present. Issue 1] Orenburg: Typography of the Ecclesiastical Consistory.
2. Chernavskiy, N.M., (1901 - 1902). Orenburgskaya eparkhiya v proshlom eya i nastoyashchem. Vypusk 2. [The Orenburg Eparchy in
its past and present. Issue 2] Orenburg: Typography of the Ecclesiastical Consistory.
3. Krechetovich, I.P., (1901). Uchrezhdenie v g. Orenburge arkhiereyskoy kafedry (po dannym arkhiva kantselyarii byvshego
Orenburgskogo general-gubernatorstva) [Setting up of the Eparchy in Orenburg (according to the archives of the office of Orenburg’s
ex-Governorate General]. Orenburg.
4. Rychkov, P.I., (1887). Topografiya Orenburgskoy gubernii [The Orenburg Province Topographies]. Orenburg: Orenburg Province
Statistical Committee.
5. Pallas, P.S., (1786). Puteshestvie po raznym provintsiyam Rossiyskogo gosudarstva. Chast' 2 [Travels in different provinces of the
Russian State. Part 2]. St.-Petersburg: Typography of the Imperial Academy of Sciences.
6. Sukhodol'skiy, L.S., (1854). Rasprostranenie khristianstva v Ural'skom krae [The spread of Christianity in the Urals Region].
Orenburgskie eparkhial'nye vedomosti [The Orenburg Eparchial News], 14: 53-54; 15: 58-59; 16: 61-62; 18: 65-66; 19: 69.
7. Arkhangelskiy, I.I., (1900). Materialy dlya istorii goroda Troitska [Materials for the history of the Troitsk town]. Proceedings of the
Orenburg Archival Research Committee. VI (29): 5-51.
8. Cheremshanskiy, V.M., (1859). Opisanie Orenburgskoy gubernii. Ufa: Izd. Uchenogo komiteta ministerstva gos. imushchestva
[Description of the Orenburg Province]. Ufa: Publication of the Research Committee under the Ministry of State Assets.
9. Ignatev, R.G., (1873). Pamyatnaya knizhka Ufimskoy gubernii. Chast 2. [The Ufa Province’s Memorandum Book. Part 2]. Ufa.
10. Starikov., F.M., (1891). Istoriko-statisticheskiy ocherk Orenburgskogo kazach'ego voyska [Essays on the history and statistics of the
Orenburg Cossack Host]. Orenburg: Breslin Typography.
11. Budrina, R.A., (1904). Chelyabinskiy Odigitrievskiy zhenskiy monastyr [The Hodegetria Nunnery in Chelyabinsk]. Moscow:
I.Efimov’s Typolithography.
12. Daft of a wooden church for the Orenburg Defence Line, (Unpublished). Russian State Historical Archive, collection 1488, Plans and
drawings of civil architecture, inventory 3. Orenburg - Simbirsk province 1747-1916, folder 12.
13. Plan and facade of a stone foundation of a wooden church for the Orenburg Defence line, (Unpublished). Russian State Historical
Archive, collection 1488, Plans and drawings of civil architecture, inventory 3. Orenburg - Simbirsk province 1747-1916, folder 1.
14. Street map of Chelyabinsk (Unpublished). Russian State Military History Archive, collection 846, Military Science Archive, inventory
16, folder 22796.
15. Synod decrees in 1826 and 1828, (Unpublished). Russian State Historical Archive, collection 797, Office of the Procurator of the
Synod, inventory 3, Cases in the department of religious affairs of the Orthodox confession, folder 11869, sheet 12, turnover.
16. Russian State Archive of Ancient Documents. (n.d.a). Fund 171, register 3, d.3207 [In Russian].
17. Degtyarev, I.V. and Bozhe, V.S., (1992). Kupola nad gorodom [Domes over the City]. Chelyabinsk: Chelyabinsk Regional Centre for
Slavic Cultures.
18. Konyuchenko, V. I., (1993). Dukhovenstvo Chelyabinska nakanune revolyutsii [Chelyabinsk clergymen before the Revolution]. The
Urals cities and towns in the context of Russian culture. Regional science conference. Chelyabinsk: History and culture heritage
center of Chelyabinsk. Pp. 88-90.
19. Olenkov, V.D., (2008). Pravoslavnye khramy Chelyabinskoy oblasti. Istoriya i arkhitektura [Eastern Orthodox churches in the
Chelyabinsk Region. History and Architecture]. Chelyabinsk: JSC Autograph Publishing.
20. Gorlov, G.E. and O.Yu. Bobrov, Spiritual Vineyard of the Orenburg Region (Dukhovnaia niva Orenburzh'ia). Orenburg, Orenburg
Book Publishers, 2009, p.264 [In Russian].
21. N.E. Stremskiy, Martyrs, confessors and churches of the Orenburg Diocese of 20 th c. (Mucheniki, ispovedniki i khramy Orenburgskoj
eparkhii XX v.), part 2. Saraktash, 1999, p.415 [In Russian].

Authors: Is’haqov Mirsodiq, Alimova Rahima, Karimov Nodir, Sulaymonov Jasur, Madalimov Timur

Paper Title: Contribution of Abu Isa Tirmidhi to the Science of Hadith


Abstract: Indeed, the hadiths are one of the topics that have been causing extensive discussions in the West
since the 19th century. Many western scholars believe that the hadiths were fabricated and they have no
historical significance. At the same time, there are many researchers who totally reject these views. Most
researchers, in particular, Ignaz Goldziher, Schacht denied most hadiths and they claimed that hadiths have no
historical significance. According to them, rulers and jurists all fabricated ḥadiths to reinforce their legal views
or to validate already-existing practices. Other groups of scholars, such as John Burton, Motzki, and N.Abbot,
admit the hadiths as reliable sources after the Qur'an. The superficial conclusions of Western scholars have been
98. denied by Muslim researchers by F.Sezgin, Abu Shuhba, al-Marsafi, al-A’zami, Maloush on the basis of
historical facts. However, scholars on both sides have not seriously objected to “al-Kitab as-Sitta” which
593-599
translates as “The Authentic Six”. The six major hadith collections (“Sahih Bukhari”, collected by Imam
Bukhari , “Sahih Muslim, collected by Muslim b. al-Hajjaj, “Sunan Abu Dawood”, collected by Abu Dawood ,
“Jami al-Tirmidhi”, collected by al-Tirmidhi, Sunan al-Sughra, collected by al-Nasa'i, Sunan ibn Majah,
collected by Ibn Majah have been considered as valuable source on the history of Islam. “Jami al-Tirmidhi”
plays an important role among them. Some researchers think this work second or third vital source after “Sahih
Bukhari”. In the article, the life of hadith scholars, his scientific legacy, structure and importance of “Jami al-
Tirmidhi”, special style of Abu Isa Tirmidhi in hadith methodology, opinions of other scholars on this work,
differences between Imam Bukhari and Imam Tirmidhi on writing and selecting hadiths and legal issues of them
will be discussed.
Keyword : Imam Tirmidhi’s “Sahih”, hadith, “fake” hadith, sahih, hasan and weak.
References:
1. A.A. Abdurazzakov and N.R. Karimov, Some brief information on Al -Sihah Al –Sitta, ISJ Theoretical & Applied Science, 05 (73),
2019, pp.611-620,
2. N.R. Karimov, Some Researches on Abu Isa Tirmidhi in European Countries, International Journal of Current Research, Vol.10, Issue
12, 2019, pp.76170-76175
3. U.Uvatov, Role of the scholars of Maveraunnahr and Khurasan in the science of hadith (Al-Bukhari, Muslim, al-Tirmidhi).
Dissertation, Tashkent, 2001. p.227.
4. J.Brown, The Canonization of al-Bukhari and Muslim: The formation and function of the Sunni Hadith Canon, Leiden, Brill, 2007,
pp.345.
5. https://en.wikipedia.org/wiki/Al-Tirmidhi#cite_note-4
6. https://sunnah.com/tirmidhi/1
7. N.R. Karimov, The contribution of Muhammad Mansur Ali to the study of the scientific heritage of Abu Isa Tirmidhi, science and
innovation in the xxi century: topical issues, discoveries and achievements: collection of articles of the XI International scientific and
practical conference, Volume 3, Part 1, Penza, ICSN “Science and Enlightenment”, 2018, pp.198-201.
8. Obaid Ahmed Khan, ZafarAlam, Imam Tirmidhi as a muhaddith and faqih in the light of internal evidences, Ma’arif Research Journal,
2012, .pp.25-38,
9. A.K.Hoosen, Imam Tirmidhi’s contribution towards Hadith, Thesis, Newcastle, 1990, .pp.75.
10. S.А.Abdul Mawjood, The Biography of Imam at-Tirmidhi, Translated by Abu BakribnNasir (1st ed.), Riyadh, Darussalam, 2007,
pp.372.
11. J.Robson, "The Transmission of Tirmidhi's Jami‘", Bulletin of the School of Oriental and African Studies, University of London,
Cambridge University Press on behalf of School of Oriental and African Studies, 16(2), 1954, .pp.258–270.
12. A.J. Wensinck, "al-Tirmidhi", Encyclopaedia of Islam, First Edition, 1913-1936.8. Leiden: E. J. Brill, 1993, pp.796–797,
13. J. Hamroqulov Imom Аbu Iso Muhammad Termiziy, Tashkent, Movarounnahr, 2017, pp.220.

Authors: C Surya Prakash


Performance of Boost Converter with Fuzzy Logic Controller to Increase the DWIG Speed Range in
Paper Title:
Wind Power System
Abstract: In this paper the wind energy conversion with a variable speed of wind turbine connected to the
grid which is based on dual stator induction generator (DWIG) which is excited by Static Excitation Controller
(SEC) on the Control winding side which utilized by Control –Winding Voltage Oriented Control (CWVOC),
and followed by Step up converter at the power winding side which utilized Fuzzy Logic Controller in its control
strategy to increase the speed range of DWIG. The performance of boost converter with FLC in increasing the
wide range of speeds can be executed by using mat lab/Simulink.

Keyword : Control –Winding Voltage Oriented Control (CWVOC), Dual Stator Winding Induction Generator
99. (DWIG), Fuzzy Logic Controller (FLC), Semiconductor Excitation Capacitor (SEC)
References: 600-606
1. REN21, “Renewables 2016: Global status report,” 2016. [Online]. Available: http://www.ren21.net.
2. F. Blaabjerg and K. Ma, "Future on Power Electronics for Wind Turbine Systems," IEEE Journal of Emerging and Selected Topics in
Power Electronics, vol. 1, no. 3, pp. 139-152, Sept. 2013.
3. Z. Chen, J. M. Guerrero, and F. Blaabjerg, "A Review of the State of the Art of Power Electronics for Wind Turbines," IEEE
Transactions on Power Electronics, vol. 24, no. 8, pp. 1859-1875, Aug. 2009.
4. V. Yaramasu, B. Wu, P. C. Sen, S. Kouro and M. Narimani, "High-power wind energy conversion systems: State-of-the-art and
emerging technologies," Proceedings of the IEEE, vol. 103, no. 5, pp. 740-788, May 2015.
5. H. Nian and Y. Song, "Direct Power Control of Doubly Fed Induction Generator Under Distorted Grid Voltage," IEEE Transactions on
Power Electronics, vol. 29, no. 2, pp. 894-905, Feb. 2014.
6. H. Li, and Z. Chen, “Overview of different wind generator systems and their comparisons,” IET Renew. Power Gener., vol. 2, no. 2, pp.
123-138, Jun. 2008.
7. S. M. Muyeen, R. Takahashi, and J. Tamura, "Operation and Control of HVDC-Connected Offshore Wind Fa

Authors: Georg Rockel, Linard Barth

Paper Title: App Launch for Customer Processes of a Real Estate Company
Abstract: A paperless office is not only environmentally friendly but also advantageous in many aspects. The
digitalisation of documents and corresponding processes saves time, reduces mistakes and therefore realizes cost
savings for companies. This time can be invested in better customer management. Real estate companies work
with thousands of rented apartments and as many customers and thus have to maintain and manage a lot of
customer related data. IT has already created manifold remedies with Enterprise-Resource-Planning (ERP) and
Customer- Relationship-Management (CRM) systems and models, but there is still plenty of development
100. potential to be exploited by integrating mobile solutions into the IT architecture.
The main challenge thereby is not the programming of an app but the seamless integration into customer 607-616
processes and the creation of customer acceptance and thus value. Therefore, it is investigated how mobile
applications can better control customer processes and whether such an implementation is profitable. For this
purpose, typical work and customer processes of real estate companies must be analysed, understood and
transferred to appropriate mobile solutions. This paper examines the details which need to be considered in such
projects.

Keyword : App, mobile processes, IT processes, customer processes, apartment rent, utility values analyses.
References:
1. M. Marchionini, J. Hohmann, and P. Prischl, “IT im Facility Management erfolgreich einsetzen – Das CARM-Handbuch“, vol. 2, p. 14,
2006
2. S. Toman, A. Köppe, and J. Lukowsky, Jan: “Immobilienmanagement mit SAP“, vol. 1 p. 80, 2010.
3. J. Nävy, “Facility Management: Grundlagen, Informationstechnologie, Systemimplementierung, Anwendungsbeispiele“, vol. 5, p. 1 50,
2018
4. PROMOS consult, PRO POTSDAM GmbH (2019. September 20), “Vom Aktenberg zum elektronischen Schreibtisch“, [Online]
Available https://www.openpromos.de/download.3402be133c654947599e2eda2f4be21e_1/
5. SAP AG (2019. September 20), “SAP NetWeaver“, [Online] Available https://www.sap.com/products/netweaver-platform.html
6. PROMOS consult, REdesk , (2019. September 20)., “Verwalten ohne Aktenberge“ [Online] Available
https://www.openpromos.de/download.79bc3e11bafd704f6b80d7dde6421a77_1/
7. PROMOS consult, PRO POTSDAM GmbH (2019. September 20), “Vom Aktenberg zum elektronischen Schreibtisch“, [Online]
Available https://www.openpromos.de/download.3402be133c654947599e2eda2f4be21e_1/
8. PROMOS consult, PRO POTSDAM GmbH (2019. September 20), “Vom Aktenberg zum elektronischen Schreibtisch“, [Online]
Available https://www.openpromos.de/download.3402be133c654947599e2eda2f4be21e_1/
9. PROMOS consult, PRO POTSDAM GmbH (2019. September 20), “Vom Aktenberg zum elektronischen Schreibtisch“, [Online]
Available https://www.openpromos.de/download.3402be133c654947599e2eda2f4be21e_1/
10. SAP-Bibliothek (2019. September 20), “Flexibles Immobilienmanagement (RE-FX) “, [Online] Available
https://help.sap.com/viewer/f3edde02b7534becaa98da530af2aa1b/1709%20001/de-DE/8f76d7531a4d424de10000000a174cb4.html
11. Cideon Software (2019. September 20), “Software für das Engineering, AutoCAD Integration für SAP Real Estate Management (RE-
FX)“, [Online] Available https://www.cideon.com/solutions/sap-plm-solutions/sap-engineering-control-center-interfaces/sap-ectr-
interface-to-autocad/?cookie=accept&cHash=bab8e70b1c31f7d36880a36d453ea092
12. M. Amberg, M. Lang, “Innovation durch Smartphone & Co., Die neuen Geschäftspotenziale mobiler Endgeräte“, vol.1, p. 32, 2011
13. Statista GmbH, (2019. September 20). “Gesamtumsatz mit apps in Deutschland“ [Online] Available
https://de.statista.com/infografik/18297/gesamtumsatz-mit-apps-in-deutschland/
14. Statista GmbH, (2019. September 20). “Annual number of global mobile app downloads 2016-2018“ [Online] Available
https://www.statista.com/statistics/271644/worldwide-free-and-paid-mobile-app-store-downloads/ and
“Total global mobile app revenues 2014-2023“ [Online] Available https://www.statista.com/statistics/269025/worldwide-mobile-app-
revenue-forecast/
15. M. Amberg, M. Lang, “Innovation durch Smartphone & Co., Die neuen Geschäftspotenziale mobiler Endgeräte“, vol.1, p. 30, 2011
16. Bundesverband Informationswirtschaft, Telekommunikation und neue Medien e. V. (Bitkom), (2019. September 02). “Mobile
Anwendungen in der ITK-Branche, Umfrage-Ergebnisse, p.5, 2011“ [Online] Available:
https://www.bitkom.org/noindex/Publikationen/2011/Studie/Apps-Mobile-Anwendungen-in-der-ITK-Branche/App-Studie-20110511-
einzel.pdf .
17. Bundesverband Informationswirtschaft, Telekommunikation und neue Medien e. V. (Bitkom), (2019. September 02). “Mob ile
Anwendungen in der ITK-Branche, Umfrage-Ergebnisse, p.6, 2011“ [Online] Available:
https://www.bitkom.org/noindex/Publikationen/2011/Studie/Apps-Mobile-Anwendungen-in-der-ITK-Branche/App-Studie-20110511-
einzel.pdf
18. PROMOS consult, (2019. September 20)., “Easysquare app“[Online] Available https://www.easysquare.com/ueber-uns
19. PROMOS consult, Easysquare, (2019. September 20)., “Easysquare workflow“, [Online] Available
https://www.openpromos.de/workflows_services/prd.61.easysquare-workflow/
20. E. Gutenberg, “Einführung in die Betriebswirtschaftslehre“, vol. 1, p. 31, 1990
21. H. Wieczorrek, and P. Mertens, “Management von IT-Projekten“, vol. 3, p.225, 2008
22. C. Zangemeister, “Nutzwertanalyse in der Systemtechnik, Eine Methodik zur multidimensionalen Bewertung und Auswahl von
Projektalternativen“ vol. 4, p. 45, 1976
23. R. Brugger, “Der IT Business Case – Kosten ermitteln und analysieren, Nutzen erkennen und quantifizieren, Wirtschaftlichkeit
nachweisen und realisieren“, p. 89, 2009
24. R. Brugger, “Der IT Business Case – Kosten ermitteln und analysieren, Nutzen erkennen und quantifizieren, Wirtschaftlichkeit
nachweisen und realisieren“, p. 91, 2009

Authors: Suresh Kumar Sahu


Occupational Mobility and Economic Development in the Dhobis of Dibrugarh and Duliajan Towns
Paper Title:
of Assam
Abstract: The Dhobis in Assam is passing through gradual economic development due to occupational
mobility since independence. The traditional economic way of life of Dhobis has been changing gradually.
Therefore, this paper aims to study pattern of occupational mobility and analyse its role for their economic
development. The data were collected on 25th Oct to 3rd Dec 2015 by administering structured interview
schedule to a random sample of Dhobi respondents in Dibrugarh and Duliajan towns in upper Assam.
101.
Keyword : Dhobis, Occupational mobility, Economic Development, Social change.
617-623
References:
1. Das, Bhakta. 1986. A glimpse of the scheduled caste and their socio-economic development in Assam. New Delhi: Omsons
Publications.
2. Lipset, S.M. and Bendix, R. 1959. Social mobility in industrial society, California: University of California Press.
3. Lynch, O.M. 1969. The politics of untouchability: Social mobility and social change in a city of India. New York : Columbia University
Press.
4. Singh, K.S. 1995. The Scheduled castes, Peoples of India (vol. II), Anthropological survey of India. Delhi: Oxford University Press.
5. Statistical Hand book Assam. 2014. Directorate of Economics and Statistics,
6. Government of Assam, Guwahati-28. Western, B. 2006. Punishment and inequality in America. New York: Russell Sage foundation.

Authors: P. T. Supriya, R. Prakash

Paper Title: Optimization of Power system with Automatic Voltage Regulator using Soft Computing Techniques
102. Abstract: In an interconnected power system, if a load demand changes randomly, both frequency and tie line
power varies. The main aim of automatic voltage controller is to minimize the transient variations in these
624-628
variables and also to make sure that their steady state errors is zero. Many modern control techniques are used to
implement a reliable controller. The objective of these control techniques is to produce and deliver power
reliably by maintaining voltage within permissible range. When real power changes, system frequency gets
affected while reactive power is dependent on variation in voltage value. That’s why real and reactive power is
controlled separately. Our objective is here for to study and analyze the Genetic algorithms and their application
to the problems of Function Optimization and System Identification. Since there are other methods traditionally
adopted to obtain the optimum value of a function (which are usually derivative based), the project aims at
establishing the superiority of Genetic Algorithms in optimizing complex, multivariable and multimodal
function. The Genetic Algorithm is a popular optimization technique which is bio-inspired and is based on the
concepts of natural genetics and natural selection theories proposed by Charles Darwin.

Keyword : Genetic Algorithm, AVR, PID, ACO, ITAE, IAE


References:
1. A. Khodabakhshian (Ph.D.) N. Golbon M.Sc.) Uniified PID Design for Load Frequency Control” Proceedings of the 2004 IEEE
International Conference on Control Applications Taipei, Taiwan, September 2-4, 2004.
2. Kothari and Nagrath, “Power System Engineering”2nd edition, Tata McGraw-Hill Education, 2008.
3. Phillip David Power, “Non Linear Multi Layer Perceptron Channel Equalization”, and Genetic Algorithm Optimization‟, in IEEE
Transactions,The Queen University of Belfast, April 2001.
4. Jacob D. Griesbach and Delores M. Etter, “Fitness-Based Exponential Probabilities for Genetic Algorithms Applied to Adaptive IIR
Filtering”, in IEEE Transactions, Department of Electrical and Computer Engineering University of Colorado Boulder.
5. H. Demuch and M. Beale, “Neural network toolbox manual for MATLAB”, User's Guide, Version 9, 2011.
6. F. M. Elkady and A. Y. Abdelaziz A. Y., “Voltage Stability Assessment of Electrical Power Systems Using Artificial Neural
Networks”, Journal of Engineering and Applied Science, Faculty of Engineering, Cairo University, Vol. 48, No. 4, pp. 727 -743, 2005.
7. Z. S. Elrazaz, I. Yassin, A. Hegazy and H. Mostafa , “Voltage Stability Indicators Via Artificial Neural Networks”, Proceedings of the
Sixth Middle East Power Systems Conference MEPCON’98, Mansoura, Egypt, Dec. 2009.
8. R.Dhivya and Dr.R.Prakash, “Edge detection of Images using improved Fuzzy C-means and Artificial Neural Network Technique”
Journal of Medical Imaging and Health Informatics , AMER scientific Publishers. ISSN:2156-7018, 2019, cited in science citation
Index , JCR, Impact factor : 0.54
9. Prakash.R and Muruganandham.A , “A Novel model reference Intelligent Adaptive comtrol using Neural Network and Fuzzy logic
controller” , Journal of Theoretical and Applied Information Technology (ISSN 1992-8645), april 2014 H Index : 9, SJR score:0.15,
SNIP:0.592, cited in Scopus.

Authors: Meenu Sharma, Rafat Parveen

Paper Title: Prior Detection of a Person’s Risk Level of Getting Suffered from Liver Cancer
Abstract: Liver Cancer becomes a major problem globally because it is responsible for the majority of death.
Identification of various Risk factors which can be either genetic or environmental becomes necessary for early
detection of Liver Cancer. To solve this problem, the data has been collected from various diagnostic centres, the
data consists of 100 cancerous and 100 non-cancerous/healthy persons, then significant frequent patterns are
identified by using the Apriori Algorithm. By employing significant frequent pattern, a prediction technique has
been developed which identify the person susceptibility toward Liver Cancer by using the Risk Factors. Most
peoples do not know that they are suffering from Liver Cancer at the early stage of cancer, and when they knew,
that time it becomes impossible to cure. So, for proper cure Early detection of Liver Cancer acquires a necessary
step in its diagnosis process, and for making a powerful preventive approach. This prediction system can
effectively and successfully predict the Liver Cancer Risk, and it has been predicted in the form of three stages
that is low Risk, medium Risk or high Risk. This approach can be used in hospitals for diagnosis of Liver
103. Cancer patients.
629-637
Keyword : Apriori Algorithm, Data Mining, Liver, and Liver Cancer.
References:
1. Y. Upadhyay and V. Wasson, “Analysis of Liver MR Images for Cancer Detection using Genetic Algorithm,” vol. 2, no. 4, pp. 730 –
737, 2014.
2. K. Ahmed, A.-A.-E. Abdullah-Al-Emran, T. Jesmin, R. F. Mukti, M. Z. Rahman, and F. Ahmed, “Early Detection of Lung Cancer
Risk
3. Using Data Mining,” Asian Pacific J. Cancer Prev., vol. 14, no. 1, pp. 595–598, 2013.
4. A. Raj and M. Jayasree, “Automated Liver Tumor Detection Using Markov Random Field Segmentation,” Procedia Technol., vol. 24,
pp. 1305–1310, 2016.
5. J. Balogh, D. V. Iii, S. Gordon, X. Li, R. M. Ghobrial, and H. P. M. Jr, “Hepatocellular carcinoma : a review,” pp. 41 –53, 2016.
6. J. Ferlay et al., “Cancer incidence and mortality worldwide : Sources , methods and major patterns in GLOBOCAN 2012,” vol. 386,
2015.
7. T. Jayalakshmi, “A Novel Classification Method for Diagnosis of Diabetes Mellitus Using Artificial Neural Networks,” 2010.
8. Y. Ben-haim, “A Streaming Parallel Decision Tree Algorithm,” vol. 11, pp. 849–872, 2010.

Authors: Haslin Hasan, Hamdzun Haron

Paper Title: Religious Online Information Behaviour Among the Malays in the Digital Era
Abstract: Seeking knowledge is among the most important virtuein Islam. The Internet era offers more
104. sources and new ways in gaining and producing information including religious information. However, the
perception that the religious information behaviour among the Malays is not yet being studied empirically. A
framework has been developed based on theories, previous related studies and interviews with Internet users. 638-644
Three main aspects of behaviour being studied: usage, information seeking and verification. Data is collected
using printed and electronic questionnaires. There are 616 usable data successfully gathered and analyzed
through SPSS. Related to usage, the result shows that the Malays have adapted well with the Internet medium
for searching the religious information. The results also show that there are changes on the technical aspect of
information acquisition and delivery via the new media. However from the procedural aspect, the information
behaviour among Malays are still traditional in nature based on their seeking information methods. The results
suggest that the religious offline behaviour continues online, demonstrating their conservative nature. Analyzing
the beahviour against the users’ background suggests that there is a statically relationship between them. A high
percentage of users claimed that the verify online religious information, even though they differ on this in
practice. This paper ends with recommendations to improve the information behaviour among the masses.

Keyword : Religious, Online Information, Malays, Digital Era.


References:
1. Athique, A. Digital Media and Society: An Introduction. Cambridge: Polity Press. 2013.
2. Bunt, G.R. 2009. iMuslims: Rewiring The House Of Islam. ASEAN Edition. North Carolina: University of North Carolina Press.
3. Campbell, H. Internet and Religion. In Consolva, M. & Ess, C. (eds.). The Handbook of Internet Studies, pp.232 -250. London: Wiley-
Blackwell. 2013.
4. Chua Yan Piaw. Asas Statistik Penyelidikan, Analisis Data Skala Likert. Kuala Lumpur: Mc Graw Hill. 2013.
5. Chua Yan Piaw. Ujian Regresi, Analisis Faktor dan Analisis SEM. Kuala Lumpur: Mc Graw Hill. 2014.
6. Demeulenaere, P. Conformity: Sociological Aspects. In Wright, J.D. (ed.) International Encyclopedia of the Social & Behaviora l
Sciences, pp. 644-648. 2nd ed. vol. 4. Florida: Elsevier. 2015.
7. Haron, H., Yusof, N. A. & Mutalib, N. A., Factors influence on personal practical artwork. 1 Dec 2014, In: Mediterranean Jour nal of
Social Sciences. 5, 27, p. 1482-1494 13 p.
8. Haron, H., Hanafi, J., Ahmad, Z., Zainal, K., Mamat, M. & Yussof, A. S., The reasons concerning teachers’ attitude toward computer in
education at primary level. In: International Journal of Civil Engineering and Technology. May 20189, 5, p. 326-335 10 p.
9. Hasan, H. & Haron, H. Technology and Religion: Information Seeking Behavior of Online Religious Information among Malays. World
Applied Sciences Journal. 2013, 28(8): 1082-1088.
10. Hoover, S., Clark, L.S. & Raine, L. Faith online: 64% of wired Americans have used the Internet for spiritual or religious information.
http://www.pewtrusts.org/en/about/news-room/press-releases/2004/04/07/64-of-online-americans-have-used-the-internet-for-spiritual-
or-religious-purposes [last accessed 1/10/2017]. 2004.
11. Kasmo, M. A., Hamdi Usman, A., Haron, H., Yussof, A. S., Idris, F., Yunos, N. & Abd. Khafidz, H., The compatibility between the
Quran and modern science: A comparative study among Malaysian. 10 May 2015, In: Asian Social Science. 11, 10, p. 299 -306 8 p.
12. Kasmo, M. A., Usman, A. H., Mohamad Said, M. M., Haron, H., Idris, F. & Alias, J., The interest in science among Malaysian: A
comparative study between gender, age group and ethnics. 30 Apr 2015, In: Asian Social Science. 11, 12, p. 174-180 7 p.
13. Larsson, G. Muslims and the New Media: Historical and Contemporary Debates. England: Ashgate. 2011.
14. Mansur Aliyu, Murni Mahmud, Abu Osman Md Tap & Rasheed Mohammad Nassr. An Empirical Investigation of Factors Influencing
Islamic Websites Use and Their Positive Impact from Muslim User Perception. Jurnal Teknologi Maklumat dan Multimedia Asia-
Pasifik. 2013, 2(2):13-12.
15. Rita Wan-Chik, Clough, P. & Ford, N. Searching for Islamic and Qur'anic Information on the Web: A Mixed-Methods Approach. In
M.V.M. Salem et al. (ed.). AIRS 2011, LNCS 7097, pp. 181-192. Berlin: Springer. 2011.
16. Rose, C. SEO 101: How the Google Search Algorithm Works. https://www.seomechanic.com/google-search-algorithm-work [last
accessed 15/12/2017]. 2017.
17. Turner, J.C. The Analysis of Social Influence. In Rediscovering Social Identity: Key Readings, pp. 273-286. New York: Psychology
Press. 2010.

Authors: Vinod V Rampur, Sachhidanand Reur


Compilation of Step Ap-214 Data to Generate Computer Aided Process Planning for Automotive
Paper Title:
Parts
Abstract: The current manufacturing scenario feature technology which supports the integration of various
systems of CAD with CAM then CAM with CAPP or any other computer aided systems.
The most important function supported by feature technology the transfer of product and process data. Product
model data is the standard for exchange of product information from one CAD system to different systems for
seamless integration with CAM. Most of the CAD systems are developing the software’s are using STEP AP-
214 product model data. AP-214 is a systematic neutral data format for developing a feature-based process
planning. In this paper, collection of STEP AP-214 based product model data as stated by ISO 10303 to identify
the features of the product for manufacturing of prismatic part and generating a standard process plan. Further,
this process planning is used to generate computer numerical control (NC) codes for CAM system to complete
105. the manufacturing of part.
645-653
Keyword : CAD, CAPP, CAM, CNC, STEP, AP-214.
References:
1. T. C. Chang and R. A. Wysk. An introduction to automated process planning systems. Prentice Hall Professional Technical Reference,
1984.
2. P. Gu and D. H. Norrie. Intelligent Manufacturing Planning. London, UK: Chapman & Hall, 1995.
3. H. C. Zhang and L. Alting. Computerized Manufacturing Process Planning Systems. London, UK: Chapman & Hall, 1994.
4. Suh, S. H., Cho, J. H., and Hong, H. D., “On the Architecture of Intelligent STEP-Compliant CNC,” International Journal of Computer
Integrated Manufacturing, 15(2), pp. 168–177. January 2002.
5. Li-Hong Qiao, Zhi-Bing Yang, H.-P. Ben Wang, “A computer-aided process planning methodology” Computers in Industry, pp. 83-94.
1994
6. Roller, D.: Design by features: an approach to high level manipulations, Computers in Industry, 12, 1989, 185- 191.
7. Shah JJ, Mantyla M “Parametric and feature-based CAD/ CAM: concepts, techniques, and applications”. Wiley, New York, 1995.

Authors: Salaki Reynaldo Joshua, Tini Mogea

106. Paper Title: Reliability Management: Setting-up Cloud Server in Higher Education
Abstract: This article shows the reliability plan and reliability manual for setting up two cloud servers for 654-661
Higher Education. These two servers are used for Primary Operation Services and Standby Operation Services.
This reliability plan shows what activities can be performed while setting up servers and at what reliable timings.
It also shows the tools and techniques that will be used for designing, analysis and testing services during project
development. It has the different management strategies for suppliers and specific standards and policies for
setting up a server and for quality assurance and product maintainability. This plan and manual shows how to
provide a full backup system of servers and a recovery unit in case of emergencies. This also shows how to setup
a security control system, supported by firewalls with adequate warranty

Keyword : reliability manual, reliability plan, cloud servers, security system, recovery system.
References:
1. Al-Zyoud M. F. Social Media Marketing Functional Branding Strategy and Intentional Branding. Journal of Problems and Perspectives
in Management. 16 (3), 102-116, 2018.
2. Ash J., Anderson B., Gordon R. & Langley P. Digital Interface Design and Power: Friction, Threshold, Transition. SAGE Journal
36(6), 1136-1153, DOI: 10.1177/026377581876426, 2018.
3. Bartin B., Ozbay K., Gao J. & Kurkcu. Calibration and Validation of Larfe-scale traffic simulation networks: a case study. Procedia
Computer Science, 130, 844-849, 2018
4. Bauer, E. Design for Reliability. 1st ed. Chicester: Wiley, 2011.
5. Beldick.com. Probability of failure on Demand (POFOD) Calculation, 2017.
6. Dar A. R., & Ravindram R. A Comprehensive Study on Cloud Computing Paradigm. International Journal of Advance Research in
Science and Engineering. 7(4), 235-242, 2018.
7. Entsog. Implementation Monitorig and Baseline Effect Monitoring of The Tariff Network Code. Europan Network of Transmission
System Operators for gas. Implementation and Effect Monitoring, 2018
8. Fauzi S. S. M., Suali A. J .& Sobri W. A. W. M. A Stateof the Art: Software Configuration Management Tools for Global Software
Development. Journal of Physics: Conference Series. DOI: 1088/1742-6596/1049/1/01/2006, 2017.
9. Gokulakrishnan S. Gnanasekar J. M. Efficient and Privacy for Data Integrity and Data Replication in Cloud Computing. International
Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN : 2278-4075,pp.333-336 Volume-8 Issue-12, October,
2019.
10. Hadzhikoleva S., Hadzhikolev E., Cheresharov S., & Yovkov L. Towards Building Cloud Education Networks. TEM Journal 7(1),
219-224, DOI:10.18421/TEM71-27, 2018.
11. Iso.org. ISO/IEC 27000/270001 Information security management, 2017.
12. Jayaraj T. J., Samath A. Process Optimization of Big Data Centre Using Nature Inspired Firefly Algorithm and K-Means Clustering.
International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN : 2278-4075,pp.311-320 Volume-8 Issue-
12, October, 2019.
13. Manoj K. A. Mrudula K., Srinivas K. P. Risk Factors and Security Issues in Various Cloud Storage Operations. International Journal of
Innovative Technology and Exploring Engineering (IJITEE), ISSN : 2278-4075,pp.48-52 Volume-8 Issue-12, October, 2019.
14. Mathur M., Madan M. Software Defined Cloud Mini Data Centers-An Effort Towards Reduction in Latency of Cloud Traffic Delivery.
International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN : 2278-4075,pp.20-26 Volume-8 Issue-12,
October, 2019.
15. Micosoft. Testing for Reliability, Msdn.microsoft.com. 2017
16. Neufelder. Revised IEEE 1633 Recommended Practices for Software Reliability,2017.
17. O'Connor, P. and Kleyner, A. Practical Reliability Engineering, 5 th Edition. 1st ed. John Wiley & Sons, 2012.
18. Peroli M., De Meo F., Vigano L & Guardini D. MobSTer: A model-based security testing framework for web applications. Journal of
Software Testing, Verification, and Reliability. 28(8), e1685, 2018.
19. Perreault M. C. & Mosconi E. Social Media Engagement: Content Strategy and Metrics Research Opportunities. Proceedings of the
51st Hawaii International Conference on System Science, 2018.
20. Raj C. Jacob A. Performance Evaluation of SUMEGHA Cloud Computing Environment: Methodologies & Tool. Towards Reduction
in Latency of Cloud Traffic Delivery. International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN :
2278-4075,pp.875-880 Volume-8 Issue-12, October, 2019.
21. Ramos P. L., Nascimento D. C., Cocolo C., Nicola M. J., Alonso C., Ribeiro L. G.M., Ennes A., & Louzada F. Reliability -Centered
Maintenance: Analyzing Failure in Harvest Surgence Machine Using some Generalizations of Weibull Distribution. Journal of
Modelling and Simulation in Engineering. DOI: 10.115/2018/1241856, 2018.
22. Sahin C. Social Media Addiction Scale – Student Form: The Reliability and Validity Study. Journal of Educational Technology, 17 (1),
169-182, 2018.
23. Salaki R. J. Analysis and Design of Service Oriented Architecture Based in Public Senior High School Academic Information Sys tem.
5th International Conference on Electrical, Electronics and Information Engineering (ICEEIE), 180-186 Publisher IEEE, 2017.
24. Salaki R. J., C. R. Kawet., R Manoppo., & F. Tumimomor. Decision Support System Major Selection Vocational High School in Using
Fuzzy Logic Android-Based. International Conference on Electrical Engineering, Informatics, and Its Education, C1-C6, 2015
25. Salaki R. J., Mogea T., & Oroh E. Z. Design Mobile Learning (M- Learning) Android Englihs For Young Learner. International
Conference on Electrical Engineering, Informatics, and Its Education, 2015.
26. Salaki R. J & Mogea T. Online Learning as A Paradigm of Learning in Higher Education. 7th International Conference on Psychology,
Language and Teaching (ICPLT), 2016.
27. Shimizu H., Otsuka Y. & Noguchi H. Design review based on failure mode to visualise reliability problems in the development stage
of mechanical products. International Journal of Vehicle Design, vol. 53, pp. 149- 165, 2010.
28. Sutherland, K., Davis, C., Terton, U., & Visser., I. University Student Social Media Use and Its Influence on Offline Engagement in
Higher Educational Communities. Student Success, 9(2), 13-24. DOI: 10.5204/ssj.v9i2.400, 2018.

Authors: D. Vengatesan, Santha Govind, P. Ramesh , M. Kavaskar , T. Kalidasan

Paper Title: Technological Needs of Farm Women in Varied Farming Systems of Tamil Nadu.
Abstract: Technological base for improving productivity and income of the rural population in the field of
agriculture has broadened with the success of Green revolution. As a result of this research and transfer of
107. technology programmes, the national production has increased over time in the decades, thus balancing the
population growth and food production of our country. There is a serious and valid criticism that the modern
technologies served only male farmers and not the resource poor small farm women who account for nearly 662-665
89.00 per cent of the women farmers. It has now been realised that participation of all sections of the farming
community in particular the farm women, can be brought by developing appropriate technologies, keeping other
issues of stability, sustainability, equity and productivity. The study was taken up in three districts of Tamil
Nadu viz., Nagapattinam, Cuddalore and Perambalur districts comprising of maximum area under three
different farming systems viz., wet land, garden land and dry land respectively. The respondent of 60 small farm
women was selected from each of the selected farming systems by using proportionate random sampling
technique. The technological needs of small farm women in farm operations were measured with the help of a
specially constructed schedule, which was prepared by discussing with experts. The collected data were
tabulated and analysed using statistical tools viz., percentage analysis, mean and analysis of variance. The
majority of the farm women expressed high level of technological need in dairy farming, goat rearing and
poultry farming with the overall mean score (2.752, 2.554 and 2.516) respectively.

Keyword : Technological Needs, Farm Women and Innovation.


References:
1. D. Vengatesan, A. Arulraj and P. Ramesh, 2019. “Suitability of banana growers technologies as perceived by banana growers in
cuddalore district of Tamil Nadu’”, Multilogic in Science, vol. IX, issue XXX, July 2019, pp. 203-205.
2. S. S. Deshpande and N. Ali. 2002. “Gender issues in technology development and dissemination”, Kurukshetra, vol.50, issue.9, pp. 24-
27.
3. Umarani, K. 2002. “Technological needs of women in dairying”, MANAGE Extension Research Review,vol. 3, issue. 1, pp. 117 -122.

Authors: A. Sharmila Agnal, M. Balaji, D. Adinarayana Reddy, P. Vikas

Paper Title: Heavy Eyed Driver Detection System


Abstract: Driver fatigue is a great element in a massive variety of car accidents. Drowsy driver warning
gadgets can form the foundation of the machine to maybe minimize the accidents associated with drowsiness.
This paper uses a web cam for picture capturing. A web camera is connected to PC, and images are received and
processed with the aid of mat lab using image processing. By setting the camera interior the car, we can monitor
the face of the driver and look for the eye actions that say whether the driver is in a situation to drive. If the
gadget detects that the driver is drowsy, a warning alert is issued. If eyes are detected as shut for too lengthy a
beep sound is produced and as a result alerting the driver.

Keyword : Drowsiness, Eye detection, SVM(Support Vector Machine), Classification.


References:
1. R. Jimenez Moreno, «Sistema de detección de nivel de cansancio en conductores mediante técnicas de visión por computador,»
Universidad Nacional de Colombia , Bogotá , 2011.
2. S. Ribarić, J. Lovrenčić, and N. Pavešić, “A neural-network-based system for monitoring driver fatigue,” Proc. Mediterr. Electrotech.
Conf. - MELECON, pp. 1356–1361, 2010.
3. Q. He, Z. Fei, X. Fan, and W. Li, “Driver fatigue evaluation model with integration of multi-indicators based on dynamic Bayesian
network,” IET Intell. Transp. Syst., vol. 9, no. 5, pp. 547–554, 2015.
4. J. He, S. Roberson, B. Fields, J. Peng, S. Cielocha, and J. Coltea, “Fatigue Detection using Smartphones,” vol. 3, no. 3, 2013.
5. AkalyaChellappa, R.Ezhilarasie “FATIGUE DETECTION TECHNIQUES: A REVIEW”, Volume 117 No. 16 2017, 503-510.
6. C. Zhao and J. Lian, “Recognition of Driver Fatigue Expressions by Gabor Wavelet Transform and Multilayer Perceptron Classifier,”
Ieee, pp. 617–620, 2011.
108. 7. B. Cyganek and S. Gruszczyński, “Hybrid computer vision system for drivers’ eye recognition and fatigue monitoring,”
Neurocomputing, vol. 126, pp. 78– 94, 2014.
8. S.-J. Jung, W.-Y. Chung, and B.-G. Lee, “Realtime physiological and vision monitoring of vehicle driver for non-intrusive drowsiness 666-669
detection,” IET Commun., vol. 5, no. 17, pp. 2461–2469, 2011.
9. C. Zhao and J. Lian, “Recognition of Driver Fatigue Expressions by Gabor Wavelet Transform and Multilayer Perceptron Classifier,”
Ieee, pp. 617–620, 2011.
10. L. Jia, D. Zhao, K. Zheng, Z. Li, G. Sun, and F. Zhang, “Smartphone-based fatigue detection system using progressive locating method,”
IET Intell. Transp. Syst., vol. 10, no. 3, pp. 148–156, 2016.
11. J. D. Wu and T. R. Chen, “Development of a drowsiness warning system based on the fuzzy logic images analysis,” Expert Syst. Appl.,
vol. 34, no. 2, pp. 1556–1561, 2008.
12. J. F. Xie, M. Xie, and W. Zhu, “Driver fatigue detection based on head gesture and PERCLOS,” 2012 Int. Conf. Wavelet Act. Media
Technol. Inf. Process. ICWAMTIP 2012, pp. 128–131, 2012.
13. R. Toufiq and M. R. Islam, “Face recognition system using PCA-ANN technique with feature fusion method,” Electr. Eng. Inf.
Commun. Technol. (ICEEICT), 2014 Int. Conf., pp. 1–5, 2014.
14. M. Saradadevi, “Driver Fatigue Detection Using Mouth and Yawning Analysis,” Int. J. Comput. Sci. Netw. Secuirity, vol. 8, no. 6, pp.
183–188, 2008.
15. Y. Zhang and C. Hua, “Driver fatigue recognition based on facial expression analysis using local binary patterns,” Opt. - Int. J. Light
Electron Opt., vol. 126, no. 23, pp. 4501–4505, 2015.
16. R. Toufiq and M. R. Islam, “Face recognition system using PCA-ANN technique with feature fusion method,” Electr. Eng. Inf.
Commun. Technol. (ICEEICT), 2014 Int. Conf., pp. 1–5, 2014.
17. N. E. S. and H. H. IssamDagher, “Face Recognition using the most Representative Sift Images,” Int. J. Signal Process. Image Process.
Pattern Recognit., vol. 7, No.1, pp. 225–236, 2014.
18. F. Wang, X. Chen, D. Wang, and B. Yang, “An improved image-based iris-tracking for driver fatigue detection system,” pp. 11521–
11526, 2017.
19. W.-B. Horng and C.-Y. Chen, “A real-time driver fatigue detection system based on eye tracking and dynamic template matching,”
Tamkang J. Sci. Eng., vol. 11, no. 1, pp. 65–72, 2008.
20. N. Alioua, A. Amine, M. Rziza, and D. Aboutajdine, “Driver’s fatigue and drowsiness detection to reduce traffic accidents on road,”
Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 6855 LNCS, no. PART 2, pp.
397–404, 2011.

Authors: Suresh. M, Babu. T, Ravinthiran. A, A. Dhanalakshmi, S. Ganapathy


109.
Paper Title: Effect of Sea Water Environment Exposure on Glass Fiber Reinforced Polymer Composites
Abstract: Glass fiber reinforced polymer(GFRP) composites are currently used in large numbers of diverse
applications ranging from tip and engine strut fairings in aircrafts, building panels and dash boards in automotive
vehicles, boat hulls in ocean vehicle structures, golf clubs and race helmets in sports equipment, etc. The service
life of composite materials are influenced by the different adverse environment which leads to various failures
like corrosion, fatigue, fracture, etc., results in loss of structural integrity due to environmental conditions. The
investigations involved are to study the mechanical behaviour of these materials when subjected to various
adverse conditions of the environment at different intervals of exposure due to change in moisture and
temperature. Experiments were conducted on GFRP composites with and without exposing to different
environment conditions of sea water. Tensile and flexural tests are conducted to predict the mechanical
behaviour of both normal specimens and specimens exposed with sea water. Reduction in mechanical properties
found due to maximum absorption of any liquid by the material. When temperature increases better in
mechanical properties are noticed and at low temperature the composite behaves like a brittle.

Keyword : GFRP, Environmental Exposure, Sea water


References: 670-674
1. Joannie W. Chin, Tinh Nguyen and Khaled Aouadi, “Effect of environmental exposure on Fiber reinforced plastic (FRP) material used
in conditions”, 1997, pp 205-213.
2. Moe Moe Thwn, Kin Liao “Effect of environmental aging on the mechanical properties of bamboo-glass fiber reinforced polymer matrix
hybrid composites”, Part A(33) 2001, pp 43-52.
3. Shan Li, Jiyue Hu, and Huitao Ren “The combined effects of environmental conditioning and sustained load on mechanical properties of
wet lay-up fiber reinforced polymers”2017, 9,244, pp 1-15.
4. A. Agarwal, S. Garg, P K Rakesh, I Singh, and BK Mishra, “Tensile behaviour of glass fiber reinforced plastics subjected to different
environmental conditions”, Vol.17, December 2010, pp. 471-476.
5. Arash Afshar, Dorina Mihut, Pengyu Chen “Effects of environmental exposures on carbon fiber epoxy composites protected by metallic
thin films” 2019 pp 1-10.
6. Adams R.D and Singh M.M, “The effect of immersionin sea water on the dynamic properties of fibre-reinforced flexibilised epoxy
composites”, Composite Structures, Volume 31, Issue 2, 1995.
7. A.J.Brunner, B.R.K.Blackman, P.Davies, “A status report on delamination resistance testing of polymer-matrix composites”,
Engineering Fracture Mechanics, ELSEVIER, vol 75(9), June 2008, pp.2779-279.
8. Bin Wei, Hailin Cao and Shenhua Song, “Degradation of basalt fibre and glass fibre/epoxy resin composites in seawater”, Corrosion
Science, Volume 53, Issue 1, January 2011, pp 426-431,
9. Dionysis E. Mouzakis, Helen Zoga and Costas Galiotis. “Accelerated environmental ageing study of polyester/glass fiber reinfo rced
composites”, Composites Part B: Engineering, Volume 39, Issue 3, April 2008, Pages 467-475.
10. Gellert E.P and Turley D.M, “Seawater immersion ageing of glass-fibre reinforced polymer laminates for marine application”,
Composites Part A: Applied Science and Manufacturing, Volume 30, Issue 11, November 1999.

Authors: Nisitaa Karen, Anuja TR, Amirtha P, R. Angeline

Paper Title: Physiological Stress Prediction using Machine Learning Classifiers


Abstract: The aim of this study is to predict the stress of a person using Machine Learning classifiers. This
system classifies the stress of a person as either High or Low. There are various classification algorithms
present, out of which 9 classification algorithms have been chosen for this study. The algorithms implemented
are K-Nearest Neighbor classifier, Support Vector Machine with an RBF kernel, Decision Tree algorithm,
Random Forest algorithm, Bagging Classifier, Adaboost algorithm, Voting classifier, Logistic Regression and
MLP classifier. The different algorithms are applied on the same dataset. The dataset is obtained from a GitHub
repository labelled Stress classifier with AutoML. The different accuracies of each algorithm are found, and the
classification algorithm with the best accuracy is determined. On comparison, it was found that the K-Nearest
Neighbor algorithm has the best accuracy with an accuracy rate of 79.3% for physiological stress prediction.
While other algorithms had varying accuracies, K-Nearest Neighbor algorithm was the most consistent.

Keyword : KNN, Machine Learning Classification, Stress Prediction.


110. References:
1. Rodney Karlo C. Pascual, John Paul D. Serrano, Jamie Mitchelle A. Soltez, John Christopher D. Castillo, Jumelyn L. Torres, an d Febus
Reidj G. Cruz, “Artificial Neural Network Based Stress Level Detection System using Physiological Signals”. IEEE, 2018. 675-677
2. Munla, N, “Driver stress level detection using HRV analysis”. International Conference on Advances in Biomedical Engineering
(ICABME),2015.
3. Fernandez, A., et al., “Determination of stress using Blood Pressure and Galvanic Skin Response”. International Conference on
Communication and Network Technologies (CCNT), 2014.
4. Karthikeyan, P., et al., “ECG signals based mental stress assessment using wavelet transform”. IEEE International Conference on
Control System, Computing and Engineering (ICCSCE), 2012.
5. Hu, B, “Signal Quality Assessment Model for Wearable EEG Sensor on Prediction of Mental Stress”. IEEE Transactions on
NanoBioscience, 2015.
6. Atlee Fernandes, Rakesh Helawar, R. Lokesh, Tushar Tari and Ashwini V. Shahapurkar, “), Determination of Stress using Blood
Pressure and Galvanic Skin Response”. International Conference on Communication and Network Technologies (ICCNT), 2014.
7. Caya, M.V.C., et al., “). Basal body temperature measurement using e-textile”. 9th International Conference on Humanoid,
Nanotechnology, Information Technology, Communication and Control, Environment and Management, 2018.
8. Gandhi, S, “Mental stress assessment – a comparison between HRV based and respiration based techniques”. Computing in Cardiology
Conference (CinC), IEEE Conferences, 2016.
9. S Ward, M Brickleg, J Shany, G McDarby, C Heneghan, “Assessment of Heart Rate and Electrodermal Activity during Sustained
Attention to Response Tests”. IEEE 2004.
10. Jennifer A. Healey, “Wearable and Automotive Systems for Affect Recognition from Physiology”. Massachusetts Institute of
Technology, 2000.
Authors: P. Adlene Ebenzer, Rishikesh bhattalwar, Harshit Patel, Rupesh Kumar

Paper Title: Patient Readmission Prediction Due to Diabetes using Machine Learning Classification
Abstract: Diabetes mellitus is a general illness of body caused due to a group of metabolic disorders and
conditions where the sugar level readings over a prolonged period are very high. It affects different organs of the
human body which thus harm a large number of the body's system and tissues to micro level, particularly blood
veins, nerves and also skin. It usually occurs when body has malfunctioned pancreas or there is insulin
resistance. As there have been huge advancements in machine learning field which is widely used in solving
different real life community level problems including health care and also due to presence of vast data from
different medical care centres and hospitals which can play an important role in building a machine learning
model which can predict weather a person is suffering from diabetes by using data sets from different hospitals
and medical care centres. We have collected data from different hospitals over past 10 years where we consider
different factors that determine whether admission of a person into hospital is required or not. Depending upon
the previous medical history of the person, it can be determined that weather or not the person is readmitted into
111. the hospital and within what time period. Hence in this paper we try to construct a model where we predict
weather a person is readmitted to hospital or not .Main focus is to help health care professionals, medicine 678-681
practitioners and people who suffer from its symptoms improve their treatment process by predicting the chance
of the person having diabetes, here by decreasing cost of treatment and enabling the concerned person to be self-
aware of their medical condition.

Keyword : machine learning, logistic regression, data classification, diabetes.


References:
1. Comparison of machine learning approaches towards assessing the risk of developing cardiovascular disease as a long-term diabetes.
(https://www.ieee.org)
2. Type 2 Diabetes Screening Test by Means of a Pulse Oximeter. (https://www.ieee.org)
3. Association Clustering and Time Series Based Data Mining in Continuous Data for Diabetes Prediction. (https://www.ieee.org)
4. The EM algorithm for a linear regression model with application to a diabetes data. (https://www.ieee.org)
5. Application of data mining methods in diabetes prediction. (https://www.ieee.org)
6. Diabetestestshttps://www.mayoclinic.org/diseases-conditions/diabetes/diagnosis-treatment/drc-20371451

Authors: Saidakbarova Saodat Parhadjanovna

Paper Title: Equivalency of English and Uzbek Idioms with Dairy Products (Milk, Cheese, Butter and Egg)
Abstract: This paper discusses the analysis of English diary idioms and their Uzbek counterparts establishing
the level of equivalency, or non-equivalency in some cases. In order to succeed in my attempt I bring forth
theoretical input on idioms and equivalency as a process of translation. I also exhibit a clear overview of the
observed idioms by undertaking a report analysis.

Keyword : dairy, equivalency, English, idiom, language, Uzbek.


References:
112. 1. Baker, M. (2001). In other words a course book on translation. London: Taylor & Francis e-Library.
2. Đorđević, J. (2010 ). EQUIVALENCE AND THE COGNO-CULTURAL DIMENSION IN SCIENTIFIC, PROFESSIONAL AND
OFFICIALTRANSLATIONS. Linguistics and Literature , 35 - 46. 682-685
3. Ivanovska, B. (2011). On the Macedonian equivalency of English plant idioms. Procedia .
4. Joanna, S. (2007). Idioms as a reflection of ethnic and cultural identity. In Humanities in Europe 2 (pp. 439-447). Vytautas Magnus
University .
5. Linda and Roger Flavell. (2006). Dictionary of word origins. London: Kyle Cathie Limited.
6. Linda and Roger Flavell. (1999). The Chronology of words and phrases.
7. Great Britain: Silverdale Books.
8. Panou, D. (2013, January). Equivalence in Translation Theories: A Critical. Theory and Practice in Language Studies , 1-6.
9. Shotursun Shomaqsudov, Subitoy Dolimov. (2018). Qayroqi so'zlar. Tashkent: San'at.
10. W.R. Gibbs, N.P. Nayak, C. Cutting. (1989). How to kick the bucket and not decompose: Analyzability and idiom processing. Journal
of Meomory and Language , 576-593.
11. Zahra Fotovatnia, M. G. (2014). Idiom Comprehension in English as a Foreign language: Analysability in Focus. Procedia Social and
Behavioral Sciences , 499-503.

Authors: V. Yegnanarayanan, S. B. Pravallika, Mokkala Mounika

Paper Title: Computation of Pseudocoloring of Graphs through Python


Abstract: In the task of coloring the vertices of a simple graph G one come across innumerable number of
challenges. There are various graph coloring parameters available in the literature. The concept of pseudo
113. coloring is quite interesting. In this type of coloring, we can allot same color to the adjacent vertices. The
maximum number of colors used in a pseudocoloring where for any two distinct colors, one can always find at
least one edge between them is called pseudo achromatic number, ѱ(G) of G. In the paper we determine this 686-690
coloring parameter for some classes of graphs through python code.

Keyword : Graphs, pseudocoloring, pseudo achromatic number.


References:
1. V. Yegnanarayan and B. Logeshwary, “On vertex coloring of graphs”, International journel of Mathematical Analysis, vol. 9, no. 17,
2015, pp. 857−868.
2. V. Yegnanarayan and P.K. Thirupurasundari, “On some graph operations and related applications”, Electronic notes in Discrete
Mathematics, vol. 33, 2009, pp. 123−130.

Authors: Nawaf Rasheed Alharbe


A Fuzzy Analytic Network Process for Security Risk Assessment of Web based Hospital
Paper Title:
Management System
Abstract: Software applications have revolutionized human lives. As healthcare industry becomes digitalized,
more and more hospitals are now dependent on effective and user-friendly software applications for efficacious
management. However, this progressive increase in the use of software applications has led to several security
issues. Security risk has probably become the biggest and most sensitive concern in this era for hospital
management systems. Assessment of security risk may help in acquiring the level of security that the end user
wants. Security assessment needs identification and prioritization of its attributes for publishing guidelines to
maintain that level, as security risk is a multidimensional problem. This study has used the Fuzzy ANP
methodology to solve this multi criteria based problem. This work also emphasizes on increasing security by
assessing the security risk in hospital management system. A real time case study of hospital management
system has also been used for validating the results. The acquired results will help in mapping the guidelines and
developing new mechanism as per the high prioritized attributes of security risk.

Keyword : Security Risk; Web Applications; Fuzzy Logic; Analytic Network Process.
References:
1. Davis, Noopur., Samuel T. Redwine Jr., GerlindeZibulski, Gary McGraw, Watts Humphrey“Processes for Producing Secure Software –
Summary of US National Cyberscevurity Summit subgroup Report” IEEE Security & Privacy May/June 2004
2. Saaty, T. L. (2004). Fundamentals of the analytic network process—Dependence and feedback in decision-making with a single
network. Journal of Systems science and Systems engineering, 13(2), 129-157.
3. Boran, Semra&Yazgan, Harun&Goztepe, Kerim. (2011). A fuzzy ANP-based approach for prioritising projects: A Six Sigma case
study. Int. J. of Six Sigma and Competitive Advantage. 6. 133 - 155. 10.1504/IJSSCA.2011.039715.
4. Dağdeviren, M., &Yüksel, İ. (2010). A fuzzy analytic network process (ANP) model for measurement of the sectoralcompetititon level
(SCL). Expert systems with applications, 37(2), 1005-1014.
5. Chang, B., Kuo, C., Wu, C. H., &Tzeng, G. H. (2015). Using fuzzy analytic network process to assess the risks in enterprise r esource
planning system implementation. Applied Soft Computing, 28, 196-207.
6. Lin, C., Madu, C. N., Kuei, C. H., Tsai, H. L., & Wang, K. N. (2015). Developing an assessment framework for managing sustain ability
114. programs: A Analytic Network Process approach. Expert Systems with Applications, 42(5), 2488-2501.
7. Kumar, R., Zarour, M., Alenezi, M., Agrawal, A., & Khan, R. A. (2019). Measuring Security Durability of Software through Fuzz y-
Based Decision-Making Process. International Journal of Computational Intelligence Systems, 12(2), 627-642. 691-695
8. Avizienis, A., Laprie, J. C., & Randell, B. (2001). Fundamental concepts of dependability (pp. 7-12). University of Newcastle upon
Tyne, Computing Science.
9. Available online at https://www.sebokwiki.org/wiki/Reliability,_Availability,_and_Maintainability
10. Wang, C. N., Thanh, N. V., & Su, C. C. (2019). The Study of a Multicriteria Decision Making Model for Wave Power Plant Location
Selection in Vietnam. Processes, 7(10), 650.
11. Kahraman, C. (Ed.). (2008). Fuzzy multi-criteria decision making: theory and applications with recent developments (Vol. 16). Springer
Science & Business Media.
12. Sipahi, S., & Timor, M. (2010). The analytic hierarchy process and analytic network process: an overview of applications. Management
Decision, 48(5), 775-808.
13. Kumar, R., Khan, S. A., & Khan, R. A. (2016). Analytical network process for software security: a design perspective. CSI transactions
on ICT, 4(2-4), 255-258.
14. R. Kumar, S. A. Khan, R. A. Khan, Revisiting software security: durability perspective, in: inter. jour. of hyb. info. tech. (SERSC) 8(2),
(2015), pp. 311-322.
15. Alenezi, M., Kumar, R., Agrawal, A., & Khan, R. A. (2019). Usable-security attribute evaluation using fuzzy analytic hierarchy
process. ICIC Express Lett.-An Int. J. Res. Surv., 13(6).
16. Alharbe, N., Atkins, A. S., (2014). A Study of the Application of Automatic Healthcare Tracking and Monitoring System in Sau di
Arabia, International Journal of Pervasive Computing and Communications , Vol. 10, Issue 2, pp. 183-195.
17. Rajeev Kumar, Mohammad Zarour, Mamdouh Alenezi, Alka Agrawal, Khan R.A., (2019), Measuring Security-Durability through
Fuzzy Based Decision Making Process, International Journal of Computational Intelligence Systems, June, 2019.
18. Alka Agrawal, Mamdouh Alenezi, Suhel Ahmad Khan, Rajeev Kumar, Khan R.A., (2019), Multi-level Fuzzy System for Usable-
Security Assessment, Journal of King Saud University - Computer and Information Sciences, April 2019.
19. Kavita Sahu, R. K. Srivastava, Revisiting Software Reliability, Advances in Intelligent Systems and Computing, Springer, 2019.
20. R. Kumar, S. A. Khan, R. A. Khan, (2016) Durability Challenges in Software Engineering, Crosstalk-The Journal of Defense Software
Engineering, pp. 29-31.
21. R. Kumar, S. A. Khan, R. A. Khan, (2015) Revisiting Software Security Risks, British Journal of Mathematics & Computer Science,
Volume 11, Issue 6, 2015.
22. Kavita Sahu, Rajshree, Rajeev Kumar, (2014) Risk Management Perspective in SDLC”, International Journal of Advanced Research in
Computer Science and Web based healthcare management system Engineering, pp. 1247-1251.
23. R. Kumar, S. A. Khan, R. A. Khan, (2015) Durable Security in Software Development: Needs and Importance, CSI Communication, p p.
34-36, Oct 2015.
24. Kavita Sahu, R. K. Srivastava, Soft Computing Approach for Prediction of Software Reliability, ICIC Express Letters-An International
Journal of Research and Surveys, , pp. 1213-1222, 2018.

Authors: Anastasiia Pavlovna Rudnitskaya


Fostering the Qualitative Potential of Demographic Policy in the Russian Federation: Risks and
Paper Title:
115. Areas for Effective Implementation
Abstract: Amid the latest economic and political challenges, as a major factor influencing the dynamics of
development in countries around the world, the issue of having in place an effective demographic policy is 696-699
increasingly gaining in strategic significance, especially for the Russian Federation. Relevant today as never
before is the need to investigate the area of regulation of processes related to the nation’s population dynamics.
Most of the key trends identified by scholars and experts in the literature tend to be expressive of the fact that the
serious problem is still there, with very little revealed in the way of positive outcomes from the fulfillment of
central tenets of the Concept on Russia’s Demographic Policy through to 2025. The latest dry statistical figures
indicate that, even if we are projecting high numbers for the dynamics of natural population increase, the
indicator will still have negative values, which means that the only potential factor for the increase is external
migration. Of relevance in this respect are the dynamics of migration from Africa and the Middle East to the EU.
In the case of Russia, prior to 2014 the bulk of migrants would come in from the former Soviet republics of
Central Asia, whilst today it is now Ukraine, which is quite understandable. The paper shares the findings from
the authors’ analysis of key indicators for demographic policy in present-day Russia.

Keyword : demographic policy, Russian Federation, population, population increase, population size
dynamics, Russia’s social policy.
References:
1. G.I. Avtsinova, “Uslyshat li vlasti Rossii sotsial'nyi nabat?” [Can the Russian government hear the tocsin of social justice?]. Vlast', 7,
2011, pp. 175–176.
2. G.I. Avtsinova, I.A. Supryaga, A.M. Khalbaeva, M.Y. Martynova, O.A. Nesterchuk, V.V. Yudaev, “Migration and public security:
Problem field of research”. Biosciences Biotechnology Research Asia, 12(1), 2015, pp. 961–964.
3. E.L. Motrich, “Rol' migratsii v dinamike naseleniya Dal'nego Vostoka Rossii” [The role of migration in population dynamics in the
Russian Far East]. Sotsial'naya Politika i Sotsiologiya, 16(1), 2017, pp. 45–53.
4. A.P. Rudnitskaya, P.V. Kvartnikov, “Rol' grazhdanskoi aktivnosti v stanovlenii tsennostnykh orientirov sovremennoi mo lodezhi” [The
role of civic engagement in the making of present-day youth’s value orientations]. TsITISE, 1, 2018, pp. 24.
5. Stolitsa Detstva. Prichiny kotorye chashche vsego zastavlyayut zhenshchin otkazyvat'sya ot rozhdeniya detei [Top reasons why women
refuse to have children], 2018. Available: https://stolicadetstva.com/news/1621/
6. Molodaya Sem'ya. Zhilishchnye programmy dlya molodykh semei [Housing programs for young families]. Available: http://molodaja-
semja.ru/how/gosudarstvennye-programmy/
7. International Monetary Fund. IMF annual report: Promoting inclusive growth, 2017. Available:
https://www.imf.org/external/pubs/ft/ar/2017/eng/index.htm
8. Total-rating.ru. VVP po PPS stran za 2015 god [National GDPs at purchasing power parity in 2015], 2016. Available: http://total-
rating.ru/1594-vvp-po-pps-stran-za-2015-god.html
9. Rosstat. Sem'ya, materinstvo i detstvo [Family, motherhood, and childhood]. Available:
http://www.gks.ru/wps/wcm/connect/rosstat_main/rosstat/ru/statistics/population/motherhood/#
10. A.P. Rudnitskaya, E.A. Novikov, “Osnovnye napravleniya formirovaniya, problemy i zadachi demograficheskoi politiki v sovremen noi
Rossii” [Key areas for the development of, issues in, and objectives for demographic policy in present-day Russia]. PolitBook, 1, 2015,
pp. 43–56.
11. T.V. Fomicheva, “Vzaimosvyaz' sotsiokul'turnykh tsennostei i reproduktivnogo povedeniya naseleniya Rossii: Sotsiolo go-
statisticheskii analiz” [An interrelationship between people’s sociocultural values and reproductive behavior in Russia: A so ciological-
statistical analysis]. Sotsial'naya Politika i Sotsiologiya, 16(5), 2017, pp. 157–166.

Authors: Surya Prakash DV, Meena Vangalapati , T. Mohammad Munawar


Evaluation of Anticancer Activity of Polyherbal extract of Terminalia Chebula, Phyllanthus emblica
Paper Title:
and Dimocarpus Longan on Caco-2 Colorectal Cancer Cell Lines
Abstract: Medicinal plants are the most essential wellsprings of medication or life sparing medications for
most of the World& #39;s populace for a huge number of years. Many plant species are used to treat the cancer
diseases. The ethanolic extract of composite medicinal herbs fruits of Terminalia chebula, Phyllanthus emblica
and seeds of Dimocarpus longan are used as a potent natural source of anticancer agent. The colorectal cancer
cell lines (Caco-2) are inhibited by ethanolic extract through MTT assay method. The percentage of Caco-2
colorectal cancer cell growth inhibition was increased from 1.5% to 62.9%.

Keyword : Anticancer, Caco-2 cell lines, Terminalia chebula, Phyllanthus emblica, Dimocarpus longan.
References:
1. Aarthi C and Ramesh Babu PB, Anti-Cancer activity of Phyllanthus reticulatus on Colon cancer cell line. International Journal of
Civil Engineering and Technology. Vol.8, No.1, 943-947, 2017.
2. Akila P, Chandini R, Anshu Kumar Yadav, Varun Reddy, Sowmya MN and Subbarao M, In vitro anticancer activity of ethanolic
116. extracts of Piper nigrum against colorectal carcinoma cell lines. International Journal of Applied and Basic Medical Research. Vol. 7,
No.1, 67–72, 2017.
3. Murtaza M, Jayaram M, Muniandy RK, Illzam EL, Shah MJ and Sharifa AM 2016 Colorectal Cancer: Pathogenesis, Management an d 700-706
Prevention. IOSR Journal of Dental and Medical Sciences. Vol. 15, No.5, 94-100, 2016.
4. Sumitra C and Krunal N, In vitro and in vivo Methods for Anticancer Activity Evaluation and Some Indian Medicinal Plants
Possessing Anticancer Properties. Journal of Pharmacognosy and Phytochemistry. Vol.2 No.2, 140-152, 2013.
5. Syed Kamil M and Paramjyothi S, Anticancer activity of ethanol and polyphenol extracts of Portulaca quadrifida Linn on human colon
cancer cell lines. International Journal of Pharma and Bio Sciences, Vol. 3, No.3, 488 – 498, 2012.
6. Kundlik MG, Krishnapiillai, Ranju S,Hitesh BG, Thirumoorthy N, Celecoxib Loaded Microbeads: A Targeted Drug Delivery For
Colorectal Cancer. International Journal of Current Pharmaceutical Research. 2(1): 46-55, 2010.
7. Kanakarajan VP, Vijayakumar JS, Jacob E, Gopi Lilly R, Ramachandran R, Study on the Anti-cancer Activity of Tylophora indica
Leaf Extracts on Human Colorectal Cancer Cells. International Journal of Pharmacognosy and Phytochemical Research, Vol. 6, No.2,
355-361, 2014.
8. Surya Prakash DV and Meena V, Experimental and Modelling Equation of Chebulinic acid from the composition of medicinal herbs
by using soxhlet extractor. International Journal of Innovative Research in Science, Engineering and Technolog y, Vol.4, No.7, 5217-
5220, 2015.
9. Vaibhav D Aher, Arun Kumar Wahi, Immunomodulatory effect of alcoholic extract of Terminalia chebula ripe fruits. Journal of
Pharmaceutical Science and Research, Vol. 2, No.9, 539-544, 2012.
10. Shruti Bandopadhyaya, Mani Ramakrishnan, Ramesh Puttalingaiah Thylur and Yogisha Shivanna 2015 In-Vitro Evaluation of Plant
Extracts Against Colorectal Cancer Using HCT 116 Cell Line. International Journal of Plant Science and Ecology, Vol. 1, No.3, 107-
112, 2015.
11. Shenai A, Devaraj E, Roy Anitha, Cytotoxic Effect of Caralluma fimbriata against Human Colon Cancer Cells.
Pharmacognosy Journal, Vol. 9, No.2, 204-207, 2017.
12. Sathya Narayanan PC, Kalpana Devi R, Pushpalatha M, Raveenand R and Lingathurai S, International Journal of Curren t Research in
Biosciences and Plant Biology, Vol. 1, No.3, 41-49, 2014.
13. Zhuomin Zhang, Dandan Zeng and Gongke Li, Study of the volatile profilecharacteristics of longan during storage by a combinat ion
sampling method coupled with GC/MS. Journal of the Science of Food and Agriculture, Vol. 88, 1035–1042, 2008.
14. Umadevi M, Sampath Kumar KP, Bhowmik D, Duraivel S, Traditionally Used Anticancer Herbs In India. Journal of Medicinal Plants
Studies, Vol.1, No.3, 56-74, 2013.
15. Ngamkitidechakul C, Jaijoy K, Hansakul P, Soonthorn chareonnon N and Sireerata wong S, Antitumour effects of Phyllanthus
emblica L.: induction of cancer cell apoptosis and inhibition of in vivo tumor promotion and in vitro invasion of human cance r cells.
Journal of Phytotherapy Research, Vol. 24, No.9, 1405-1413, 2010.
16. Karnati R and Nahar N, Chebulinic acid from Terminalia chebula causes cell cycle arrest and induces apoptosis in Caco-2 cells.
Bangladesh Journal of Pharmacology, Vol. 2, 432-438, 2012.
17. Sumalatha D, Antioxidant and Antitumor activity of Phyllanthus emblica in colon cancer cell lines. International Journal of Current
Microbiology and Applied Sciences, Vol. 2, No.5, 189-195, 2013.
18. Lala G, Malik M, Zhao C, He J, Kwon Y, Giusti MM and Magnuson BA, Anthocyanin rich extracts inhib it multiple biomarkers of
colon cancer in rats. Journal of Nutr. Cancer,Vol.54, 84-93, 2006.
19. Eugin Amala V and Jeyaraj M, Determination of Antibacterial, Antifungal, Bioactive Constituents of Triphala by Ft-Ir And Gc-Ms
Analysis. International Journal of Pharmacy and Pharmaceutical Sciences, Vol. 6 No.8, 123-126, 2014.
20. Singh G and Kumar P, Extraction, gas chromatography-mass spectrometry analysis and screening of fruits of Terminalia chebula Retz.
for its antimicrobial potential. Journal of Pharmacognosy Research, Vol.5, No.3, 162-168,2011.
21. Balasubramanian S, Ganesh D, Poonam Panchal, Mohammad Teimouri and Surya Narayana V. V. S, GC-MS analysis of
phytocomponents in the ethanolic extract of Emblica officinalis (Indian Gooseberry). Journal of Chemical and Pharmaceutical
Research, Vol. 6, No.6, 843-845, 2014.
22. G. O. Young, “Synthetic structure of industrial plastics (Book style with paper title and editor),” in Plastics, 2nd ed. vol. 3, J.
Peters, Ed. New York: McGraw-Hill, 1964, pp. 15–64.
23. W.-K. Chen, Linear Networks and Systems (Book style). Belmont, CA: Wadsworth, 1993, pp. 123–135.
24. H. Poor, An Introduction to Signal Detection and Estimation. New York: Springer-Verlag, 1985, ch. 4.
25. B. Smith, “An approach to graphs of linear forms (Unpublished work style),” unpublished.
26. E. H. Miller, “A note on reflector arrays (Periodical style—Accepted for publication),” IEEE Trans. Antennas Propagat., to be
published.
27. J. Wang, “Fundamentals of erbium-doped fiber amplifiers arrays (Periodical style—Submitted for publication),” IEEE J. Quantum
Electron., submitted for publication.
28. C. J. Kaufman, Rocky Mountain Research Lab., Boulder, CO, private communication, May 1995.
29. Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate
interfaces(Translation Journals style),” IEEE Transl. J. Magn.Jpn., vol. 2, Aug. 1987, pp. 740–741 [Dig. 9th Annu. Conf. Magnetics
Japan, 1982, p. 301].
30. M. Young, The Techincal Writers Handbook. Mill Valley, CA: University Science, 1989.
31. (Basic Book/Monograph Online Sources) J. K. Author. (year, month, day). Title (edition) [Type of medium]. Volume(issue).
Available: http://www.(URL)
32. J. Jones. (1991, May 10). Networks (2nd ed.) [Online]. Available: http://www.atm.com
33. (Journal Online Sources style) K. Author. (year, month). Title. Journal [Type of medium]. Volume(issue), paging if given.
Available: http://www.(URL)

Authors: K.Jeevitha, A.Iyswariya, V.RamKumar, V.Praveen Kumar

Paper Title: IoT Based Horn Control and Oil Purity Monitoring System in Vehicles
Abstract: Nowadays, we use intelligent devices in every part of our lives mainly in automobiles. Horn is one
of the important parts of the vehicle but at the same time, it creates excess noise to the surroundings. To use it
wisely, we have restricted the number of the horn to be pressed. The driver can only use a certain number of
horns per hour. If the horn exceeds, then fine will be charged from the concerned and also the duration of the
horn is limited. During the emergency time, the fine amount is relaxed. To make sure we use a camera which
will closely watch the situation of the person. The cautions will be given to the driver through the help of LCD
display and speaker. If the additional cost is not paid then the car will be locked automatically by blocking the
engine so after paying the charge it will be released. This all details will be uploaded in both companies as well
as in the government's server. One more feature is, a sensor will be used to sense the purity of the oil and will be
updated in the server for the change of oil.

Keyword : Wi-fi module, LCD display, Speaker, Arduino.


117.
References:
1. Lekshmi Ajaykumar, Rose Merlin Jose and Sarath Nair, “A Study on Vehicular Horn Noise Limiter,” International Journal of 707-710
Innovative Research in Computer and Communication Engineering, Vol. 4, Issue 4, April 2016.
2. P. Pavithra, P. RamPriya and V. MohanaPriya, “Monitoring And validating the expiry of non-fc vehicles using GSM Technology,”
International Journal of Advanced technology in engineering and science. Vol. 4, Issue no 6, June 2016.
3. S. K. Poornesh and T.V. Harsha, “Automatic vehicle accident detection and messaging system using GPS and GSM GSM modems,”
International Journal of Scientific & Engineering Research, vol. 4, pp. 1937–1940, 2013.
4. G.Rupa, K.Sangeetha, A.Sowmiya and J.Shri saranya, “EMI Due And Alcohol Detection Based Automatic Vehicle Locking System,”
International Research Journal of Engineering and Technology (IRJET) Volume: 05 Issue: 02, Feb-2018.
5. C.Viji, R.Gokul, N.Hari Krishnan and BP.Kathiresan, “Smart Vehicle Authentication and Due Date Monitoring System using IoT,”
Asian Journal of Applied Science and Technology (AJAST) Volume 1, Issue 2, Pages 265-267, March 2017.
6. Angel Torres Pérez and Mark Hadfield, “Low-Cost Oil Quality Sensor Based on Changes in Complex Permittivity,” Sensors 2011, 11,
10675-10690; doi:10.3390/s111110675.
7. A. Agoston, C.Otsch and B.Jakoby," Viscosity sensors for engine oil condition monitoring-Application and interpretation of results,"
sensor and actuators A 121(2005) 327-332.
8. K.Vinoth Kumar, R.Siva Sankar, and M.Raghul,” Reduction Of Engine Contamination And Improvements In Engine Efficiency,” IOSR
Journal of VLSI and Signal Processing (IOSR-JVSP).
9. Mr.Aravindhan.R and Dr.Jayanthi.S,“Oil Flow Control And Monitoring System,” IJETST- Vol.03 Issue 05 Pages 656-6 6May 2016
ISSN 2348-9480.
10. G. Naveen Balaji,, N.V. Hari Suriya, S. Anand
Vikash, S. Arun Kumar and R.Arun,”Gasoline Purity Meter Using Peripheral Interface Controller for Automobile Applications,”
International Journal of Engineering and Technical Research (IJETR) Volume-7,Issue-10, October 2017.

Authors: G. Durga Prasad, V. Mohan Manoj, K. Ravi Prakash Babu, B. Raghu Kumar

Paper Title: Estimation of Reduced Stiffness under the Influence of Crack in a Beam
Abstract: Machine components with cantilever boundary conditions are most prominently used in
mechanical engineering applications. When such components are subjected to fatigue loading, crack may get
initiated and failure may occur. In order to prevent catastrophic failure and safe guard these components one has
to condition monitor the dynamic behavior under fatigue loading condition. Vibration based condition
monitoring is one of the most effective method to assess the fatigue failure of the component. In this paper, a
cantilever beam is analyzed for its dynamic behaviour under the influence of crack. The cantilever beam
considered for the analysis is of rectangular cross section and is uniform throughout its length. The characteristic
equation was derived for the Euler-Bernoulli cantilever beam to obtain the relationship between the location of
the crack and stiffness of the beam because the stiffness of the beam influences the natural frequency. It is found
that the stiffness of the cantilever beam is varying for varying locations of the crack in different modes of
vibration. It is clearly understood from the analysis that the vibration response of the cracked cantilever beam in
its modes of vibration is affected by the corresponding stiffness reduction based upon the location of the crack.
So, it can be inferred that the natural frequency of the cracked cantilever beam may have different values for
different locations of the crack.

118. Keyword : Stiffness, natural frequency, Euler-Bernoulli beam, crack location.


References: 711-714
1. A.D. Dimarogonas, “Vibration of cracked structures: a state of the art review”, in Engineering Fracture Mechanics, 55 (5), 19 96, pp.
831–857.
2. P.G. Kirmsher, “The effect of discontinuity on natural frequency of beams”, Proceedings of the American Society of Testing and
Materials, 44, 1944, pp. 897–904.
3. W.J. Thomson, “Vibration of slender bars with discontinuities in stiffness”, Journal of Applied Mechanics, 17, 1943, 203–207.
4. S. Orhan, “Analysis of free and forced vibration of a cracked cantilever beam”, NDT&E International, 40, 2007, pp. 443–450.
5. T. Zheng, and T. Ji, “An approximate method for determining the static deflection and natural frequency of a cracked beam”, Jo urnal of
Sound and Vibration, 331, 2012, pp. 2654–2670.
6. M. Behzad, A. Ghadami, A. Maghsoodi, and J.M. Hale, “Vibration based algorithm for crack detection in cantilever beam containing
two different types of cracks”, Journal of Sound and Vibration, 332, 2013, pp. 6312–6320
7. M. Donà, A. Palmeri, and M. Lombardo, “Dynamic analysis of multi-cracked Euler–Bernoulli beams with gradient elasticity”,
Computers and Structures, 161, 2015, pp. 64–76
8. J. Liu, W.D. Zhu, P.G. Charalambides, Y.M. Shao, Y.F. Xu, and X.M. Fang, “A dynamic model of a cantilever beam with a closed,
embedded horizontal crack including local flexibilities at crack tips”, Journal of Sound and Vibration, 382, 2016, pp. 274–290.
9. S.H. Gawande, and R.R. More, “Effect of Notch Depth & Location on Modal Natural Frequency of Cantilever Beams”, Structures, 8,
2016, pp. 121–129.
10. Md. Shumon Miaa, Md. Shahidul Islamb, and Udayan Ghosh, “Modal Analysis of Cracked Cantilever Beam by Finite Element
Simulation”, Procedia Engineering, 194, 2017, pp. 509 – 516.
11. A.C. Altunışık, F.Y. Okur, V. Kahya, “Modal parameter identification and vibration based damage detection of a multiple cracked
cantilever beam”, Engineering Failure Analysis, 79, 2017, pp. 154–170
12. A. Yashar, N. Ferguson, and M.G. Tehrani, “Simplified modelling and analysis of a rotating Euler-Bernoulli beam with a single cracked
edge”, Journal of Sound and Vibration, 420, 2018, pp. 346–356.

Authors: Badekara Sooryanarayana, Chandrakala Sogenahalli Boraiah, Gujar Ravichandra Roshini

Paper Title: On Realization and Characterization of Topological Indices


Abstract: In chemical graph theory, topological index is one of the graph invariants which is a fixed number
based on structure of a graph. Topological index is used as one of the tool to analyze molecular structures and
for proper and optimal design of nanostructure. In this paper we realize the real numbers that are topological
indices such as Zagreb indices, Randic index, NK-index, multiplicative F-index and multiplicative Zagreb
indices along with some characterizations.
119.
Keyword : multiplicative F-index, multiplicative Zagreb indices, Narumi-Katayama index, Randic index,
Zagreb indices. 715-718

References:
1. Frank Harary, Graph theory, Narosa Publishing House, New Delhi, (1969).
2. S. L. Hakimi, On Realizability of a Set of Integers as Degrees of the Vertices of a Linear Graph I, SIAM, 10( 3), (1962), 496-506.
3. Ivan Gutman, Degree-Based Topological Indices, Croat. Chem. Acta, 86 (4), (2013) 351-361.
4. G.R.Roshini, Chandrakala.S.B, B. Sooryanarayana, Randic index of transformation graphs, Int. J. Pure Appl. Math., 120(6), 2018,
6229-6241.
5. Chandrakala Sogenahalli Boraiah, Roshini Gujar Ravichandra and Sooryanarayana Badekara, Topological Indices of Transformation
Graphs of aCompliment Graph, AIP Conference Proceedings 2112, 020022 (2019).

Authors: Aniq Asyranie Zahidy, Muslich Hartadi Sutanto, Madzlan Napiah, Zahidy Abd Hamid

120. Paper Title: Measuring the Relationships of Road Service Quality and Road Traffic Accidents
Abstract: As with the most of middle-income countries, road traffic accidents (RTAs) in Malaysia constitute
719-725
a serious public health challenge to the nation. Despite the fact that great efforts have been made to understand
the causation factors of RTAs, little is known about how road service quality (RSQ) impacted road safety. The
primary objective of the current study was to explore the relationships of RSQ and RTAs from the viewpoint of
the Malaysian road users. The study employed a quantitative research approach with the use of a self-
administered questionnaire instrument to survey a group of road users. In particular, this paper reports the first
phase of the study, that is, to develop and administer an instrument to measure the relationships of RSQ and
RTAs. A two phased approach was undertaken to determine face and content validity, and reliability of this
instrument. The face and content validity were achieved by assembling a panel of academia and industry
practitioners to ensure that wording of the items, and the development of the scale, were comprehensible for data
inquiries. Reliability and internal consistency testing were achieved by employing the exploratory factor analysis
(EFA) to model the interrelationships among items, and Cronbach’s alpha to evaluate the extent to which the
items measure the same construct. Then, the instrument was pilot-tested by administration to a convenience-
quota sample of 24 road users who stopped at the rest and service areas along the case study expressway. The
results have pointed to the indication that the measurement instrument reached the accepted levels of internal
reliability. Thus, it can be concluded that the developed instrument able to collect sound quality survey data and
could enable the next stage of the study draws a valid and generalized conclusion. This paper highlighted the
value of pilot testing in terms of improving the design of research studies that contributes to the development of
best practices in RTAs research. Finally, the outcomes of the study should become a source for policy makers or
local authorities to have better understanding of the safety outcomes of road service quality from which the
prevention measures of RTAs could be improved.

Keyword : Road service quality, road traffic accidents, measurement constructs, pilot study.
References:
1. WHO, Global status report on road safety 2018: Summary, 2018, Geneva: World Health Organization.
2. K. M. Yap, “Road accidents – human’s fault?,” Jurutera, October, 2008, pp. 17-19.
3. Ministry of Transport Malaysia, Road Safety Plan of Malaysia 2014-2020, 2014, Putrajaya: Ministry of Transport Malaysia.
4. ASEAN Secretariat, ASEAN regional road safety strategy, 2016, Jakarta: The ASEAN Secretariat, Community Relations Division.
5. R. Sarani, S. A. S. M. Rahim, J. M. Marjan, and W. S. Voon, Predicting Malaysian road fatalities for year 2020, MRR 06/2012, 2012,
Kuala Lumpur: Malaysian Institute of Road Safety Research.
6. A. Abdelfatah, “Traffic fatality causes and trends in Malaysia”, Malaysia Sustainable Cities Program, Working Paper Series,
Massachusetts Institute of Technology, 2016. Available: https://scienceimpact.mit.edu/sites/default/files/documents/Abdelfatah _0.pdf.
7. Ministry of Transport Malaysia, Road Safety Plan of Malaysia 2006-2010, 2015, Putrajaya: Ministry of Transport Malaysia.
8. MIROS, General statistics 1998–2016, Malaysian Institute of Road Safety Research. Available: https://www.miros.gov.my/1/page.php?
id=17.
9. WHO, Global status report on road safety 2015, 2015, Geneva: World Health Organization,
10. OECD, OECD health data 2018 - questionnaire definitions for all indicators. Organization for Economic Co-operation and
Development, 2018. Available: http://www.oecd.org/els/health-systems/OECD- Health-data-2018-Questionnaire-DEFINITIONS.pdf.
11. Y. Darma, M. R. Karim, and S. Abdullah, “An analysis of Malaysia road traffic death distribution by road environment,” Sādhanā,
42(9), 2017, pp. 1605-1615.
12. Malaysian Highway Authority, Annual Report 2016. Available: http;//www.llm.gov.my/documents/PublishDoc/pub_ 483412202.pdf.
13. L. Abdullah and N. Zamri, “Ranking of the factors associated with road accidents using correlation analysis and fuzzy TOPSIS,”
Australian Journal of Basic and Applied Sciences, 4(2), 2010, pp. 314-320.
14. A. A. Redhwan and A. J. Karim, “Knowledge, attitude and practice towards road traffic regulations among university students,
Malaysia,” The International Medical Journal Malaysia, 9(2), 2010, pp. 29-34.
15. A. Ismail, G. S. Yi, G.S., and M. K. I. M. Zain, “Study on drivers’ behaviour relationships to reduce road accidents in Puchong,
Selangor Darul Ehsan,” Jurnal Kejuruteraan, 27, 2015, pp. 81-85.
16. Z. Sultan, N. I. Ngadiman, F. D. A. Kadir, N. F. Roslan, and M. Moeinaddin, M. (2016). “Factor analysis of motorcycle crashes in
Malaysia,” Planning Malaysia: Journal of the Malaysian Institute of Planner, Special Issue IV, 2016, pp. 135-146.
17. F. F. Mohamad, J. Mohamad, and A. S. Abdullah, “Do young Malaysian drivers involve in speeding behaviour: An investigation at
selected accident hotspots in peninsular Malaysia,” Journal of Advanced Research in Social and Behavioural Sciences, 9(1), 2017, pp.
75-83.
18. M. M. Abdul Manan, A. Várhelyi, A. K. Ҫelik, and H. H. Hashim, “Road characteristics and environment factors associated with
motorcycle fatal crashes in Malaysia,” IATSS Research, Article in Press, 2017. Available: https://doi.org/ 10.1016/j.iatssr.2017.11.001.
19. L. Najib, L. Abdullah, I. Abdullah, and Z. Salleh, “Weights of road accident causes using analytic hierarchy process,” ARPN Journal of
Science and Technology, 2(2), 2011, 39-44.
20. N. W. M. Junus, M. T. Ismail, Z. Arsad, and R. A. Rahman, “Malaysia road accidents influences based on structural time series
analysis,” Applied Mathematics and Information Sciences: An International Journal. 11(4), 2017, pp. 1029-1039.
21. P. Forsythe, “Monitoring customer perceived service quality and satisfaction during the construction process,” Construction Economics
and Building, 15(1), 2015, pp. 19-42.
22. J. J. Jr. Cronin and S. A. Taylor, “Measuring service quality: A reexamination and extension,” Journal of Marketing, 56(3), 1992, pp.
55-68.
23. Roads Australia, Building the case for customers – how the expectation of a transport experience is driving change. Melbourne: Roads
Australia, 2018. Available: https://www.roads.org.au/Portal/3/ Building%20the%20Case%20for% 20Customerts.pdf.
24. ERTRAC, European roadmap: Road user behaviour and expectations. ERTRAC Working Group on Urban Mobility, European Road
Transport Research Advisory Council, Brussels, Belgium, 2011. Available: https://www.ertrac.org/uploads/documents_publications/
Roadmap/Road%20User%20Behaviour%20and%20 Expectations.pdf.
25. T. Calvert, G. Parkhurst, and J. Perkin, User and community expectations of the major road network (MRN), The Center for Transport
and Society, University of the West of England, Bristol, 2015. Available: http://www.reesjeffreys.co.uk/wp-content/uploads /2017/10/
RJRFMRNStudyTask1cFinalReport.pdf.
26. T. H. Poister and J. C. Thomas, “The effect of expectations and expectancy confirmation/ disconfirmation on motorists’ satisfaction
with State Highways,” Journal of Public Administration Research and Theory, 21(4), 2011, pp. 601-617.
27. A. Hartmann, and M. Hietbrink, “An exploratory study on the relationship between stakeholder expectations, experiences and
satisfaction in road maintenance,” Construction Management and Economics, 31(4), 2013, pp. 345-358.
28. M. Dhurup, C. Mafini, and L. A. Masitenyane, “Factors influencing customer-service quality in the pre-cast concrete industry: An
exploratory factor analysis,” Mediterranean Journal of Social Sciences, 5(8), 2014, pp. 115-123.
29. P. Forsythe, “Monitoring customer perceived service quality and satisfaction during the construction process,” Construction Economics
and Building, 15(1), 2015, pp. 19-42.
30. CIDB, CIS 19:2011 – Quality assessment system for completed road work, 2011, Kuala Lumpur: Construction Industry Development
Board Malaysia.
31. A. Tortum, M. Y. Çodur, and B. Kılınc, “Modeling traffic accidents in Turkey using linear regression analysis,” Iğdır University
Journal Institute Science and Technology, 2(3), 2012, pp. 69-78.
32. J.-R. Chang, P.-J. Liu, and G.-C. Chen, “The service quality of roads in Taiwan from the point of view of road users and drivers,”
Journal of Marine Science and Technology, 23(3), 2015, pp. 344-352.
33. H. T. Zuna, S. P. Hadiwardoyo, and H. Rahadian, “Developing a model of toll road service quality using an artificial neural n etwork
approach,” International Journal of Technology, 4, 2016, pp. 562-570.
34. N. Pilaka, O. R. S. Rao, and P. K. Samanta, “An analysis of roadway service indicators: A comparative study of six toll roads in Pune
Region,” The IUP Journal of Operations Management, 26(3), 2017, pp. 7-22.
35. N. Che-Him, R. Roslan, M. S. Rusiman, K. Khalid, M. Kamardan, F. A. Arobi, and N. Mohamad, “Factors Affecting Road Traffic
Accident in Batu Pahat, Johor, Malaysia”, IOP Conf. Series: Journal of Physics: Conf. Series, 995 (2018) 012033. Available:
https://www.doi.org/10. 1088/1742-6596/995/1/012033
36. M. Sørensen and M. Mosslemi, Subjective and objective safety: The effect of road safety measures on subjective safety among
vulnerable road users. TØI report 1009/2009, 2009. Available:
https://www.toi.no/getfile.php/1311745/Publikasjoner/T%C3%98I%20rapporter/2009/1009-2009/1009-2009-Sum.pdf.
37. L. Eboli, G. Mazzulla, and G. Pungillo, “How to define the accident risk level of car drivers by combining objective and subjective
measures of driving style,” Transportation Research Part F: Traffic Psychology and Behaviour, 49, 2017, pp. 29-38.
38. M. Saunders, P. Lewis, and A. Thornhill, Research methods for business students, 5th ed., 2014, New Delhi: Dorling Kindersley.
39. A. Fink, The survey handbook, 2nd ed., 2003, Thousand Oaks: SAGE Publications, Inc.
40. I. Etikan, S. A. Musa, and R. S. Alkassim, “Comparison of convenience sampling and purposive sampling,” American Journal of
Theoretical and Applied Statistics, 5(1), 2016, pp. 1-4.11.
41. I. Etikan and K. Bala, “Sampling and sampling methods,” Biometrics and Biostatistics International Journal, 5(6): 00149, 2017.
Available: https://www.doi.org/10.15406/bbij.2017.05.00149.
42. J. F. Hair, W. C. Black, B. J. Babin, R. E. Anderson, and R. L. Tatham, Multivariate data analysis, 6th ed., 2006, New Jersey: Prentice
Hall International.
43. L. C. Menches and A. S. Hanna, “Quantitative measurement of successful performance from the project manager’s perspective,”
Journal of Construction Engineering and Management, 132, 2006, 1284-1293.
44. M. Tavakol and R. Dennick, “Making sense of Cronbach’s alpha,” International Journal of Medical Education, 2, 2011, pp. 53-55.
45. D. George and P. Mallery, SPSS for Windows: step by step. 10th ed., 2010, Boston: Allyn and Bacon.

Authors: Shaik Abdul Mazeed, P. Sai Rani, R. Raveendranath, P. Divya, Telugu Sudharani

Paper Title: Effectiveness of Capital Structure on Profitability- IT Companies Perspective


Abstract: Every company needs money or capital not only for its establishment but also for day to day
operations. In order to acquire the money or capital a company will have its own variety sources that can be
elucidated by capital structure. There are two ways or sources for financing a firm i.e. debt finance and equity
finance also known as debt and equity capital. Debt Capital comes from bonds, debentures, long term notes
payable etc. whereas equity capital comes from stock/shares may be equity or preference, retained earnings etc.
Working capital is also a part of capital structure. Each category has its own pros and cons. Decisions related to
finance is the integral element of any company. In this connection, the finance manager plays a vital role in
arriving at a decision. He is always in dilemma that which proportion of capital leads to optimum utilization of
funds. The widely accepted solution is a combination of equity capital and debt capital. Generally capital
structure is formulated as per the interest of equity share holders. Hence rather than collecting funds totally from
share holders, it is better to have a long term loan also, even though it is an expense to the company, this method
is followed by many companies. This research paper primarily focuses on effectiveness of capital structure on
profitability of Information Technology (IT) firms in India.
121.
Keyword : Capital structure, Profitability, Debt, Equity, Working capital 726-728
References:
1. Allen, D. E. 1991. ‘The Determinants of the Capital Structure of Listed Australian Companies’ Australian Journal of Management 16
(2): 103–28.
2. Ang, J. S. 1991. ‘Small Business Uniqueness and the Theory of Financial Management.’ Journal of Small Business Finance 1 (1): 1–
13.1992.
3. Antoniou, A., Y. Guney, and K. Paudyal. 2002. ‘Determinants of Corporate Capital Structure: Evidence from European Countries.’
Working Paper 1-17, University of Durham, Durham.
4. Azhagaiah, R., and J. Premgeetha. 2004. ‘A Study on Capital Structure in Select Companies.’ Management Insight 7 (1): 17–27.
5. Barnea, A., R. A. Haugen, and L. W. Senbet. 1985. Agency Problems and Financial Contracting. Englewood Cliffs, nj: Prentice Hall.
6. Barton, S. L., and P. J. Gordon. 1988. ‘Corporate Strategy and Capital Structure.’ Strategic Management Journal 9 (6): 623–32.
7. Berger, A. N. 2002. ‘Capital Structure and Firm Performance: A New Approach to Testing Agency Theory and an Application to the
Banking Industry.’
8. Bhaduri, S. N. 2002. ‘Determinants of Capital Structure Choice: A Study of the Indian Corporate Sector.’ Applied Financial Economics
12 (9): 655–65.
9. Bhattacharya, S. 1979. ‘Imperfect Information, Dividend Policy, and the “Bird in the Hand” Fallacy.’ Bell Journal of Economics 10 (1):
259–70.
10. Booth, L., V. Aivazian, A. Demirgue-Kunt, and V. Maksimovic. 2001. ‘Cap-ital Structure in Developing Countries.’ The Journal of
Finance 56 (1): 87–130.

Authors: Zulkifli Mohamad, Nazri Muslim, Wan Zulkifli Wan Hassan, Azizi Umar, Maharam Mamat

Paper Title: Migration from Traditional Village to Group Settlement Area: AN Analysis of Felda Experience
122.
Abstract: At the time the country gained independence, most Malays were still living in traditional village
and in poverty. In order to overcome this problem, the government had introduced a form of well-planned 729-736
migration. This migration was established with specific goals such as offering land to people without one,
eradicating poverty, eliminating communist’s hide-outs and boosting country’s economic growth. By allocating
some amount of fund, the government cleared-up forest land and provided basic facilities such as houses, roads,
worshipping places and schools. This well-planned migration was top-down, locating only qualified migrants
through process of interview. In order for this migration to be successful, the government introduced the motto
best land for the best people. The first settlement of this agricultural migration is in Lurah Bilut, Bentong
Pahang. A total of 616 migrants of all races and religions, from all over the country were located in FELDA of
Lurah Bilut. The programme was then expanded to the whole country following its success. After 50 years of
operation, there are now 317 settlements, dwelt by 112,653 families. FELDA agricultural migration programme
is the only well-planned and most successful in the world. Currently, in average, participants of settlement enjoy
higher standard of living than before, whereas their children benefit from highest education standard.

Keyword : FELDA, Malaysia, migration, group settlement, land


References:
1. Sulong Mohamad. Petempatan Felda: Perspektif Perancangan Bandar dan Desa. Kuala Lumpur: Dewan Bahasa dan Pustaka. 1985
2. Tunku Shamsul Bahrin, P.D.A. Parera dan Lim Heng Kow. Kemajuan Tanah dan Penempatan Semula di Malaysia. Kuala Lumpur:
Dewan Bahasa dan Pustaka. 1992.
3. Nazri Muslim, Wan Zulkifli Wan Hassan, Jamsari Alias, Norazila Mat and Abdullah Ibrahim. Malaysia Federal Perlembagaan From
Constitutional Sociology Contexts. Journal of Engineering and Applied Sciences. 14(11) 2019: 3761-3770.
4. Sanusi Osman. Dasar Ekonomi Baru dan Pencapaian Orang Melayu di Kota, Kuala Lumpur: University Malaya Press. 1984.
5. Nazri Muslim and Azizi Umar. Melayu Royal Institution According to the Federal Constitution Within the Context of Ethnic Relations
In Malaysia. Akademika. 87(1) 2017: 35-48.
6. Zulkifli Mohamad, Ruzman Md Noor, Suwaid Tapah, Wan Zulkifli Wan Hassan, Khalim Zainal, Nazri Muslim, Azizi Umar, Aminudin
Basir, Abdul Salam Yusuff, Nasruddin Yunus and Jamsari Alias. The Implementation Of The Milk Almanfaah Concept In Malaysia:
Reference To The Group Settlement Area Land Act (1960). International Journal of Civil Engineering and Technology. 9(6) 2018:
1378-1387.
7. Ramlah Hamzah. “Sejarah Penubuhan dan Perkembangan Felda Yang Pertama di Negeri Pahang: Felda Lurah Bilut, Bentong” (Latihan
Ilmiah Sarjana Muda yang tidak diterbitkan, Jabatan Sejarah, Fakulti Sains Kemasyarakatan dan Kemanusiaan, Universiti Kebangsaan
Malaysia). 1991.
8. Nik Mohd Zain Nik Yusof. “Pembangunan Hartanah Mengikut Perspektif Islam”, dalam Ahmad Ibrahim et al. (eds), al-Ahkam. j. 3,
Kuala Lumpur: Dewan Bahasa dan Pustaka. 1991.
9. Nazri Muslim, Nik Yusri Musa dan Ahmad Hidayat Buang. Hubungan Etnik Di Malaysia Dari Perspektif Islam. Kajian Malaysia. 29(1 )
2011: 1-28.
10. Nazri Muslim. Implikasi Peruntukan Islam dan Orang Melayu Dalam Perlembagaan Persekutuan Terhadap Ethnic relations di Malaysia.
Kemanusiaan: The Asian Journal of Humanities. 19(2) 2012: 19-62.

Authors: Kota Venkateswara Rao, M. Shyamala Devi


Disquisition of Sentiment Inquiry with Hashing and Counting Vectorizer using Machine Learning
Paper Title:
Classification
Abstract: With the rapid growth in technology, analysis of feedback and reviews by the customers in
companies and industries becomes a major challenge. The profit of the company mainly depends on the
customer satisfaction. The view of the customer can be analyzed only through feedback. The review analysis can
be utilized for the prediction of current sales and future sales of the company. With this overview, the paper aims
in performing the sentiment analysis of the movie review. The Type of comment given by the customer is
predicted and categorized into classes. The sentiment Analysis on movie Review dataset taken from the
KAGGLE leading Dataset repository is used for implementation. The categorization of sentiment classes is
achieved in five categories. Firstly, the target count for each sentiment is portrayed. The Resampling is done for
equalizing the target sentiment count. Secondly, the extraction of sentiment feature words for each target is
displayed and the data cleaning is done with Term Frequency Inverse document Frequency method. Thirdly, the
resampled dataset is then fitted with the various classifiers like Multinomial Naives Bayes Classifier, Logistic
Regression Classifier, KNearest Neighbors Classifier, Bernoulli Naives Bayes Classifier, Complement Naives
Bayes Classifier, Nearest Centroid Classifer, Passive Aggressive Classifier, SGD Classifier, Ridge Classifier,
Perceptron Classifier. Fourth, the feature extraction is done with Hashing Vectorizer and Counting Vectorizer.
123. The vocabulary features are also displayed from the dataset. Fifth, the Performance analysis of clasifier is done
with metrics like Accuracy, Recall, FScore and Precision. The implementation is carried out using python code
in Spyder Anaconda Navigator IP Console. Experimental results shows that the sentiment prediction and 737-743
classification done by Ridge classifier is found to be effective with Precision of 0.89, Recall of 0.88, FScore of
0.87 and Accuracy of 89%.

Keyword : Accuracy, Recall, FScore, Sentiment and Precision


References:
1. B. Liu, ``Sentiment analysis and opinion mining,'' Synth. Lectures Hum.Lang. Technol., vol. 5, no. 1, pp. 1_167, May 2012.
2. Z. Y. Yan, Q. Bin, S. Q. Hui, and L. Ting, ``Large-scale sentiment lexicon collection and its application in sentiment classification,'' J.
Chin. Inf. Process., vol. 31, no. 2, pp. 187-193, 2017.
3. Odbal and Z. F. Wang, ``Emotion analysis model using Compositional
4. Semantics,'' Acta Automatica Sinica, vol. 41, no. 12, pp. 2125_2137, 2015.
5. P. Li,W. Xu, C. Ma, J. Sun, and Y. Yan, ``IOA: Improving SVM based sentiment classification through post processing,'' in Proc. 9th
Int. Workshop Semantic Eval., Jun. 2015, pp. 545_550.
6. J. Xu, D. Chen, X. Qiu, and X. Huang, ``Cached long short-term memory neural networks for document-level sentiment classification,''
in Proc. Conf. Empirical Methods Natural Lang. Process., Nov. 2016, pp. 1660_1669.
7. D. Tang, B. Qin, X. Feng, and T. Liu, ``Effective LSTMs for target dependent sentiment classification,'' in Proc. COLING 26th Int.l
Conf.
8. Comput. Linguistics, Tech. Papers, Dec. 2015, pp. 3298_3307.
9. K. S. Tai, R. Socher, and C. D. Manning, ``Improved semantic representations from tree-structured long short-term memory
networks,'' in Proc. 53rd Annu. Meeting Assoc. Comput. Linguistics, 7th Int. Joint Conf. Nat-ural Lang. Process., Jul. 2015, pp.
1556_1566.
10. P. Zhou et al., ``Attention-based bidirectional long short-term memory
11. networks for relation classification,'' in Proc. 54th Annu. Meeting Assoc.
12. Comput. Linguistics, Aug. 2016, pp. 207_212.
13. A. Galassi, M. Lippi, and P. Torroni. (Feb. 2019). ``Attention, please!Acritical review of neural attention models in natural language
processing.'' [Online]. Available: https://arxiv.org/abs/1902.02181
14. S. Sabour, N. Frosst, and G. E. Hinton. (2017).``Dynamic routing between capsules.'' [Online]. Available:
https://arxiv.org/abs/1710.09829
15. W. Zhao, J. Ye, M. Yang, Z. Lei, S. Zhang, and Z. Zhao. (2018). ``Investigating capsule networks with dynamic routing for text
classification.'' [Online]. Available: https://arxiv.org/abs/1804.00538
16. J. Kim, S. Jang, S. Choi, and E. Park. (2018). ``Text classification using
17. capsules.'' [Online]. Available: https://arxiv.org/abs/1808.03976
18. N. Zhang, S. Deng, Z. Sun, X. Chen, W. Zhang, and H. Chen, ``Attention based capsule networks with dynamic routing for relati on
extraction,'' in Proc. Conf. Empirical Methods Natural Lang. Process. (EMNLP), Nov. 2018, pp. 986_992.
19. B. Zhang, X. Xu, M. Yang, X. Chen, and Y. Ye, ``Cross-domain sentiment classification by capsule network with semantic rules,''
IEEE Access, vol. 6, pp. 58284_58294, Oct. 2018
20. M. Shyamala Devi, Shakila Basheer, Rincy Merlin Mathew, “Exploration of Multiple Linear Regression with Ensembling Schemes
for Roof Fall Assessment using Machine Learning”, International Journal of Innovative Technology and Exploring Engineering, v ol. 8,
no.12, October 2019.
21. Shakila Basheer, Rincy Merlin Mathew, M. Shyamala Devi, “Ensembling Coalesce of Logistic Regression Classifier for Heart
Disease Prediction using Machine Learning”, International Journal of Innovative Technology and Exploring Engineering, vol. 8,
no.12, October 2019, pp. 127-133.
22. Rincy Merlin Mathew, M. Shyamala Devi, Shakila Basheer,” Exploration of Neighbor Kernels and Feature Estimators for Heart
Disease Prediction using Machine Learning”, International Journal of Innovative Technology and Exploring Engineering, vol. 8, no.12,
October 2019, pp. 597-605.
23. M. Shyamala Devi, Shefali Dewangan, Satwat Kumar Ambashta, Anjali Jaiswal, Nariboyena Vijaya Sai Ram, “Backward Eliminated
Formulation of Fire Area Coverage using Machine Learning Regression”, International Journal of Innovative Techno logy and
Exploring Engineering, vol. 8, no.12, October 2019, pp.1565-1569
24. M. Shyamala Devi, Ankita Shil, Prakhar Katyayan, Tanmay Surana, “Constituent Depletion and Divination of Hypothyroid
Prevalance using Machine Learning Classification”, International Journal of Innovative Technology and Exploring Engineering, vol. 8,
no.12, October 2019, pp. 1607-1612
25. M. Shyamala Devi, Shefali Dewangan, Satwat Kumar Ambashta, Anjali Jaiswal, Sairam Kondapalli, “Recognition of Forest Fire
Spruce Type Tagging using Machine Learning Classification”, International Journal of Recent Technology and Engineering, Volume-8
Issue-3, pp. 4309 – 4313, 16 September 2019.
26. M. Shyamala Devi, Usha Vudatha, Sukriti Mukherjee, Bhavya Reddy Donthiri, S B Adhiyan, Nallareddy Jishnu, “ Linear Attribute
Projection and Performance Assessment for Signifying the Absenteeism at Work using Machine Learning”, International Journal of
Recent Technology and Engineering, Volume-8 Issue-3, pp. 1262 – 1267, 16 September 2019.
27. M. Shyamala Devi, Mothe Sunil Goud, G. Sai Teja, MallyPally Sai Bharath, “Heart Disease Prediction and Performance Assessment
through Attribute Element Diminution using Machine Learning”, International Journal of Innovative Technology and Exploring
Engineering, vol. 8, no.11, pp. 604 – 609, 30 September 2019.
28. M. Shyamala Devi, Rincy Merlin Mathew, R. Suguna, ” Regressor Fitting of Feature Importance for Customer Segment Prediction
with Ensembling Schemes using Machine Learning”, International Journal of Engineering and Advanced Technology, Volume -8
Issue-6, pp. 952 – 956, 30 August 2019.
29. R. Suguna, M. Shyamala Devi, Rincy Merlin Mathew, “Integrating Ensembling Schemes with Classification for Customer Group
Prediction using Machine Learning”, International Journal of Engineering and Advanced Technology, Volume-8 Issue-6, pp. 957 –
961, 30 August 2019.
30. Rincy Merlin Mathew, R. Suguna, M. Shyamala Devi, “Composite Model Fabrication of Classification with Transformed Target
Regressor for Customer Segmentation using Machine Learning”, International Journal of Engineering and Advanced Technology,
Volume-8 Issue-6, pp. 962 – 966, 30 August 2019.
31. M. Shyamala Devi, Rincy Merlin Mathew, R. Suguna, “Feature Snatching and Performance Analysis for Connoting the Admittance
Likelihood of student using Principal Component Analysis”, International Journal of Recent Technology and Engineering, Volume-8
Issue-2, 30 July 2019. pp. 4800-4807.
32. R. Suguna, M. Shyamala Devi, Rincy Merlin Mathew, “Customer Segment Prognostic System by Machine Learning using Principal
Component and Linear Discriminant Analysis”, International Journal of Recent Technology and Engineering, Volume-8 Issue-2, 30
July 2019. pp. 6198-6203.
33. R.Suguna, M. Shyamala Devi, Rupali Amit Bagate, Aparna Shashikant Joshi, “Assessment of Feature Selection for Student Academic
Performance through Machine Learning Classification”, Journal of Statistics and Management Systems, Taylor Francis, , vol. 22, no. 4,
25 June 2019, pp. 729-739. DOI: 10.1080/09720510.2019.1609729ISSN: 0972-0510 (Print), 2169-0014 (Online).
34. R.Suguna, M. Shyamala Devi, Rupali Amit Bagate, Aparna Shashikant Joshi, “Assessment of Feature Selection for Student Academic
Performance through Machine Learning Classification”, Journal of Statistics and Management Systems, Taylor Francis, vol. 22, no. 4,
25 June 2019, pp. 729-739. DOI: 10.1080/09720510.2019.1609729ISSN: 0972-0510 (Print), 2169-0014 (Online).
35. Shyamala Devi Munisamy, Suguna Ramadass Aparna Joshi, “Cultivar Prediction of Target Consumer Class using Feature Selection
with Machine Learning Classification”, Learning and Analytics in Intelligent Systems, LAIS, Springer, vol. 3, pp. 604-612, June 2019.
36. Suguna Ramadass, Shyamala Devi Munisamy, Praveen Kumar P, Naresh P, “Prediction of Customer Attrition using Feature
Extraction Techniques and its Performance Assessment through dissimilar Classifiers”, Springer’s book series entitled “Learning and
Analytics in Intelligent Systems, Springer, LAIS vol. 3, pp. 613-620, June 2019.
37. M. Shyamala Devi, Rincy Merlin Mathew, R. Suguna, ”Attribute Heaving Extraction and Performance Analysis for the Prop hesy of
Roof Fall Rate using Principal Component Analysis”, International Journal of Innovative Technology and Exploring Engineering, vol.
8, no.8, June 2019, pp. 2319-2323.
38. R. Suguna, M. Shyamala Devi, Rincy Merlin Mathew, ”Customer Churn Predictive Analysis by Component Minimization using
Machine Learning”, International Journal of Innovative Technology and Exploring Engineering, vol. 8, no.8, June 2019, pp. 232 9-
2333.

Authors: Shaher Dwik, Natarajan Somasundaram

Paper Title: Modeling and Simulation of Two-Dimensional Position Sensitive Detector (PSD) Sensor

124. Abstract: This paper presents Modeling and Simulation of Two-Dimensional Position Sensitive Detector
(PSD) using MATLAB. PSD is an Optical Position Sensor (OPS) that can measure a position of a radiation spot
in one or two-dimensions on a sensor surface. Unlike discrete elements such as Charge-Coupled Device (CCD), 744-753
it provides continuous position data, features high position resolution and high-speed response which give this
paper its importance. The sensor used consists of two-dimensional array of photodiodes. The sensor has four
output photocurrents that change according to the position of incident radiation on the surface. The work is
divided into three parts of Modeling and Simulation; the first part is a single photodiode, Second part is one-
dimensional array of photodiodes and the third one is two-dimensional array of photodiodes. The tool used to do
the simulation is MATLAB software because it is professional and accurate tool, it has photodiode element and
it is possible to control the beam of incident light. This research can be useful for Acquisition; Pointing and
Tracking (APT) systems where this sensor will give the necessary data to do tracking operation. Proteus
software was also been used as a secondary tool.

Keyword : MATLAB, Photocurrent, Photodiode, Position Sensitive Detector (PSD).


References:
1. M.F.Heweage, X.Wen and A. Eldamarawy, “Developing Laser Spot Position Determination Circuit Modeling and Measurements with
a Quad Detector”, International Journal of Modelling and Optimization, Vol. 6, No. 6, pp.310-316, December 2016.
2. Y.Kaymak et.al, “A Survey on Acquisition, Tracking, and Pointing Mechanisms for Mobile Free-Space Optical Communications”,
IEEE Communications Surveys & Tutorials, Vol. 20, No. 2, pp.1104-1123, 2018.
3. Silicon Photodiode Handbook. [available online]: https://www.hamamatsu.com/resources/pdf/ssd/e02_handbook_si_photodiode.pdf
4. L.Lin, Z.Sitong, T.Luyang and W.Dong, “Sun sensor design and test of a micro satellite”, Journal of Measurements in Engineeri ng”,
Vol. 4, No. 3, pp.148-155, September 2016.
5. I.A.Ivan, M.Ardeleanu and G.J.Laurent, “High Dynamics and Precision Optical Measurement Using a Position Sensitive Detector
(PSD) in Reflection-Mode: Application to 2D Object Tracking over a Smart Surface”, Sensors, Vol. 12, pp.16771-16784, 2012.
6. L.Xiaohong et.al, “Design of Double PSDs mounting plate on the tracing measurement system”, Journal of Advanced Mechanical
Design, Systems, and Manufacturing, Vol. 11, No. 1, pp.1-10, January 2017.
7. https://mathworks.com

Authors: Mohit Kumar Agarwal, Vineet Kumar


Experimental Analysis of Mechanical Properties, Wear and Corrosion Characteristics of IS500/7
Paper Title:
Grade Ductile Iron Casting
Abstract: In the present research investigation, ductile iron castings conforming to IS500/7 grade casting
were produced using green sand moulds. The castings were produced in a regular production foundry using
1.25T Induction Furnace. The molten metal was subjected to standard desulphurisation and modularisation to get
graphite in the nodular form. Based on the earlier investigation by the above group the castings were austenitised
at 900oC for 120minutes and quenched in a salt bath consisting of potassium nitrate and sodium nitratein the
ratio of 55:45 and maintained at 310oC for 120 minutes to bring about austempering treatment. The result in
austempered ductile iron will consist of graphite nodules in a matrix of bainite[1,2].
The effect of austempering heat treatment on microstructure, mechanical properties[13,14] andwear
characteristics were studied and compared with the as-cast condition. Mechanical properties such as ultimate
tensile strength, % elongation, hardness and impact strength were determined. Wear tests were carried out to
determine the weight loss of specimens; using pin on disc type machine. Wear test was held for different loads
viz. 300 gm, 400 gm and 500 gm and different speeds conditions viz. 950 r.p.m, 1430 r.p.m and 2130 r.p.m.
Corrosion tests were carried out to determine corrosion rate at different viz. 35°C & 45°C temperature for
increasing duration viz. 2 hours to 24 hours.
The results of the research investigation indicate that the heat treated castings shows higher Ultimate Tensile
Setength values (54.86% increase), elongation values (64.32% increase) and Brinell hardness values (19.03%
increases) as compared to the ascast condition of casting. From the dry sliding wear studies, it is seen that heat
treated specimen’s shows higher resistance to wear compared to the ascast specimens and corrosion rate &
weight loss due to corrosion in heat treated condition is less compared to ascast ones.
125.
Keyword : Austempered Ductile Iron (ADI), Corrosion, Ductile Iron (DI), Heat Treatment (HT), Wear, 754-760
References:
1. N. D. Prasanna, March, Effect of processes variables on the structure mechanical properties and wear characteristics of Austempred
Ductile Iron, Ph.D thesis, submitted to Bangalore University, 2000.
2. R. Grundy,July , The development and introduction of spheroidal graphite irons into an established range of malleable irons to meet
current engineering requirements, Transactions of Foundrymen, Vol.72, Part-7, 1979, p141-151.
3. Shakir K.A, Ahamed Aahraf, Vijay Kumar, “Analysis of Tensile strength and Hardness of IS 500/7 Grade Ductile Iron Subjected to
Austempering Heat treatment”,International Journal of Science, Engineering and Technology Research (IJSETR), Volume 4, Issue
5, May 2015.
4. TFH Mohamed, SS Abd El Rehim, “Improving the Corrosion Behavior of Ductile Cast Iron in Sulphuric Acid by Heat
Treatment”,Pelagia Research Library Der Chemica Sinica, 8(6), 2017,p513-523.
5. Olasupo Ogundare, Babaniyi Babatope, “Atmospheric Corrosion Studies of Ductile Iron and Austenitic Stainless Steel in an Extreme
Marine Environment”,Journal of Minerals and Materials Characterization and Engineering, 914-918 Published Online, September
2012 (http://www.SciRP.org/journal/jmmce).
6. Shuai Han, Qingmin Li, “Electrical and Mechanical Properties of the Oil- paper Insulation under Stress of the Hot Spot
Temperature”, IEEE Transactions on Dielectrics and Electrical Insulation Vol. 21, No. 1, February 2014.
7. V. D. Shinde, B. Ravi and K. Narasimhan,“Solidification behaviour and mechanical properties of ductile iron castings with varying
thickness”,International Journal of Cast Metals Research ijc1158.3d 8/6/12 12:56:27.
8. C. Labrecque, M. Gagné, “Optimizing the Mechanical Properties of Thin-Wall Ductile Iron Castings”,AFS Transactions 2005 ©
American Foundry Society, Schaumburg, IL USA, 2005, .
9. Mohit Kumar Agrawal, Dr.Vineet Kumar “A REVIEW OF AUSTEMPERED DUCTILE IRON, MECHANICAL PROPERTIES,
WEAR AND CORROSION CHARACTERISTICS” 2019 JETIR June 2019, Volume 6, Issue 6 www.jetir.org (ISSN-2349-516).
10. HaMiD PourAsiabi, and Hamed PourAsiabi“MICROSTRUCTURE AND TRIBOLOGICAL BEHA VIOUR OF AUSFERRITIC
MN-NI-CU-MO ALLOYED DUCTILE IRON”,International Iron & Steel Symposium, 02-04 April 2012, Karabük,Türkiye.
11. Siddaraju C, Dr. N. D. Prasanna and Dr. M. K. Muralidhara,. Abrasive wear studies on austempered ductile iron castins, International
Journal of Emerging Technology and Advanced Engineering, Vol 03, Issue 06, June 2013, pp124-130.
12. Mohammad BabaZadesh, HaMiD PourAsiabi and Hamed Pour asiabi, Wear characteristics of ADI; A comprehensive review on
mechanisms and effective parameters, Journal of Basic and Applied Scientific Research, Vol 03, Issue 02, 2013,pp 646 -656.
13. Yogesha K. B and Joel Hemanth, Mechanical properties of metallic and non-metallic chilled austempered ductile iron, International
Journal of Advanced Engineering Research and Studies, Vol.I, Issue II, March 2012, pp240-243.
14. Amar Kumar Das, Ranjit Kumar Panda, Jyoti Prakash Dhal, Subash Chandra Mishra and Sudipta Sen, Variation of mechanical
properties of austempered ductile iron with prosessing parameters, International Journal of Current Research, Vol.4, Issue, 08,August
2012, pp.012-016.
15. Ukoba, O. K and Ibegbulam, M. C, Corrosion behaviour of ductile iron in different environment, International Journal of Science and
Technology, Vol. 02, No. 09, Sept. 2012, pp618-621.

Authors: Agustina Ampuni, Adi Fitrianto, Renaldy Indrajaya

Paper Title: E-Voting Infrastructure System for Indonesia


Abstract: In digital era, Indonesia as democratic country needs to implement e-voting for presidential and
governor election. Some countries have implement e-voting and two of them are more populated than Indonesia.
E-voting can make voting process and vote distribution better. In this paper we proposed IT infrastructure for e-
voting using load balancing, cryptography, and block chain. Also this proposed model can be discussed further
about application and system replication to produce similar data from all servers.

Keyword : E-voting, Infrastructure, Security, System


References:
1. “KPU - Portal Publikasi Pemilihan Umum 2019.” [Online]. Available: https://infopemilu.kpu.go.id/. [Accessed: 19-May-2018].
2. “Population Clock: World.” [Online]. Available: https://www.census.gov/popclock/world/id. [Accessed: 19-May-2018].
126. 3. D. Gritzalis, “Secure Electronic Voting: New trends, new threats, new options,” 7th Comput. Secur. Incidents Response Teams Work.,
2002.
4. A. Riera and P. Brown, “Bringing Confidene to Electronic Voting,” Electron. J. e-Government, vol. 1, no. 1, pp. 43–50, 2003. 761-763
5. M. K. Wisnu, Dyah A. M. G., Aswin Suharsono, S.T., M.T., M.Kom., Denny S. R., S.Kom., “Rancang Bangun Sistem E-Voting
Dengan Menerapkan Hash Dan Digital Signature Untuk Verifikasi Data Hasil Voting,” Progr. Stud. Inform. Progr. Teknol. Inf. dan Ilmu
Komput. Univ. Brawijaya Malang, 2012.
6. A. Rokhman, “Prospek dan tantangan penerapan e-voting di indonesia,” Semin. Nas. Peran Negara dan Masy. dalam Pembang. dan
Masyrakat Madani di Indones., pp. 1–11, 2011.
7. H. T. Liaw, “A secure electronic voting protocol for general elections,” Comput. Secur., vol. 23, no. 2, pp. 107–119, 2004.
8. O. Cetinkaya and D. Cetinkaya, “Verification and validation issues in electronic voting,” Electron. J. e-government, vol. 5, no. 2, pp.
117–126, 2007.
9. Β. ΜΕΛΠΟΜΕΝΗ, Γ. ΘΟΔΩΡΗΣ, and Κ. ΣΠΥΡΟΣ, “Procedural Security and Social Acceptance in E-Voting,” Proc. 38th Annu.
Hawaii Int. Conf. Syst. Sci., vol. 00, no. C, p. 118a–118a, 2005.
10. Kundiana, “Tinjauan Implementasi Teknologi E-Voting di US dengan di India.” 2004.
11. M. L. Anistiawati, “Implementasi Kebijakan Penerapan Elektronik Voting Dalam Pemilihan Kepala Desa,” Citiz. Chart., vol. 1, no. 2,
2012.
12. Y. Mu and V. Varadharajan, “Anonymous secure e-voting over a network,” Proc. - Annu. Comput. Secur. Appl. Conf. ACSAC, vol.
Part F1347, pp. 293–299, 1998.

Authors: Narendra Kumar Sharma, Shahnaz Fatima, Swati Saxena

Paper Title: Three-Dimensional Healthcare Model for Effective Decision Making


Abstract: Healthcare is the right of every human being but shortage of medical professional, healthcare
institutions and use of modern information technology, it is not possible to provide high-quality healthcare
services to facilitate them. In the developing country like India greater part of peoples are living in rural areas
and face principal disaster due to insufficiency of ideal healthcare institutions as well as medical professionals.
The rural clinical health centre might also have medicines to grant first aid, but may not have the expertise.
People of India in rural areas have to journey long distances to access suitable healthcare which can be the
difference between life and death in the case of emergency. It shows that the immense gap between doctor and
patient or people and health care system. We attempt to fulfill that gap and proposed a healthcare model to
improve healthcare quality and take effective decisions. The proposed healthcare model will capable to take
effective decisions for health related issues specially for people of rural India.
127.
Keyword : Rural Healthcare, Data Mining, Healthcare Model, Decision Making. 764-767
References:
1. Bikash Kanti Sarkar, Shib Sankar Sana, “A conceptual framework for improved and secured healthcare system”, International Journal of
healthcare management, Taylor & Francis 2018, http://doi.org/10.1080/20479700.2017.1422338
2. Ashwinkumar.U.M, Dr Anandakumar.K.R, “A Web-based Patient Support System Using Artificial Intelligence to Improve Health
Monitoring and Quality of Life”, Second International Conference on Advanced Computing & Communication Technologies. ISBN 978 -
0-7695-4640-7/12. 2012 IEEE, DOI 10.1109/ACCT.2012.16
3. Anand Sharma, Vibhakar Mansotra, “Data mining Based Decision making: A Conceptual Model for Public Healthcare”. International
Conference for Sustainable Global Development. ISBN 978-9-3805-4421-2/16/ 2016, IEEE.
4. Margaret H. Dunham (2009), Data Mining: Introductory and Advanced Topics, Pearson Education, ISBN 978-81-7758-785-2
5. Boyi Xu, Ling Li, Daiping Hu, Bin Wu, Congcong Ye, and Honming Cai, “ Healthcare data analysis system for regional medical un ion in
smart city” Journal of Management Analytics, Taylor & Francis 2018, http://doi.org/10.1080/23270012.2018.1490211
6. Narendra Kumar Sharma, Dr. Shahnaz Fatima, Dr. Swati Saxena, “Issues and Challenges in Healthcare Decision Support System: A
Review” International Journal of Management, IT & Engineering, May 2018, Vol. 8 Issue 5(1), May 2018, ISSN: 2249-0558
7. Sumon Biswas, Anisuzzaman, Tanjina Akhter, Sumon Biswas, Anisuzzaman, Tanjina Akhter, “Cloud Based Healthcare Application
Architecture and Electronic Medical Record Mining: An Integrated Approach to Improve Healthcare System”. 17th International
Conference on Computer and Information Technology, ISBN 978-1-4799-6288-4/14/ 2014 IEEE.

Authors: Askarov Abror Davlatmirzayevich


Monitoring: Predictions of the Effectiveness of Educational Processes in Higher Educational
Paper Title:
Institutions
Abstract: In the period of globalization new requirements of the level of teachers’ preparation for their
pedagogical career have significantly increased. Consequently, it demands higher educational institutions the
necessity to draw special attention to enhance the efficiency of educational processes in preparing future
teachers. In this article, the mechanism of implementation monitoring processes on improvement of the system
of preparation teachers for pedagogical career in the high educational institutions has revealed. In this
monitoring the distributional parameters of the corresponding processes according to the direction has taken into
consideration and provided prognoses of them on the basis of interrelation and impact between indicators. On
this purpose, the algorithmic model of interrelations between indicators of argumentative, procedural and
productive directions of a process has developed. This model gives the chance to obtain the predicted
information on educational process based on certain evidence, to define necessary organizational and
pedagogical measures by comparison with the expected results, corrections, specifications and modernizations of
teaching and learning processes.

Keyword : effective training, monitoring of the educational process, quality of education, predictions, an
indicator, algorithmic model, ratio of interrelations, ratio of impact.
References:
1. L. N. Khilchenko et al, Monitoring of the higher professional education’s quality: issues and prospects. Modern Research of Social
Problems. (2015) №9 (53), pp. 757-770.
2. R. Sh. Ahliddonov, The art of school management. Monograph. Tashkent: Fan, (2006) Page 303.
3. Sh. E Kurbonov, E. A. Seytkhalilov, Control the quality of education. Tashkent: Turon-Iqbol, (2006) Page 592.
4. A. D. Askarov, Enhancement distance learning professional development system of public education personnel. Abstract of the
dissertation of doctor of philosophy (PhD) in pedagogical Sciences. (2017) Page 50.
5. M. V. Alyushin, L. V. Kolobashkina, Monitoring of the current status of students as a means of increasing the effectiveness of
128. educational process. The Education and science journal. (2019) № 21(2), pp.176-197.
6. A. Oduaran, Influence of Students’ Feedback on the Quality of Adult Higher Distance Education Service Delivery. Turkish Online
Journal of Distance Education. (2017) № 18, pp. 160-176. 768-774
7. Yu Chen et al, Testing a Cognitive Control Model of Human Intelligence. Scientific Reports. (2019) № 9:2898.
8. O. Müller at al, Utilizing big data analytics for information systems research: challenges, promises and guidelines. European Journal of
Information Systems. (2016) № 25, pp.289-302.
9. Shahbaz at al, Investigating the adoption of big data analytics in healthcare: the moderating role of resistance to change. Journal Big
Data. (2019) № 6:6, pp. 289-302.
10. Zh. V. Smirnova, Teaching Package Development for Engineering Training Programs. IOP Conf. Series: Materials Science and
Engineering 483 (2019) №01.
11. O. S. Andreeva at al, Comprehensive Diagnosis of Components of Pedagogical Students’ Research Competency. The Education and
science journal. (2019) № 21(1), pp. 37-58.
12. E. Y. Levina еt al, Quality Control Optimization of University Students Training. Asian Social Science. (2015) № 2:11.
13. E. V. Petrova at al, Diagnostic Methodics of Personal Development of University Students in Studying the Humanities. Journal of
Sustainable Development. (2015) № 3:8.
14. Sh. Rama, Professor’s performance for effective teaching (Kosovo case). Procedia - Social and Behavioral Sciences. (2011) № 12, pp.
117-121.
15. M. H. Sagasser at al, How do postgraduate GP trainees regulate their learning and what helps and hinders them? A qualitative study.
BMC Medical Education. (2012) № 12:67.
16. S. U. Zalutskaya at al, A Lecturer and New Quality of Russian Professional Education. Mediterranean Journal of Social Sciences.
(2015) №3:6.
17. N. V. Seregin, The Basics of Monitoring the Process of Musical Pedagogy. Problems of musical science. (2018) № 3, pp. 144-148.
18. P. P. Gusev, Methodical readiness of teachers to create an integrated educational and methodological support of the educational
process. Secondary professional education. (2013) № 3, pp. 22-25.
19. T. M. Litvinova at al, The internal system for quality assessment of education results at a medical university. Electronic Journal of
General Medicine (2018) № 15(4):em70.
20. P. Kislyakov at al, Monitoring of Education Environment according to the Social-Psychological Safety Criterion. Asian Social Science
Archives. (2014) №17:10, pp.285-291.
21. S. V. Khokhlova, Monitoring the quality of school education. The author's abstract dis.kand. ped. sciences. (2003). Page 27.
22. E. Yu. Gorkaeva, Features of teaching and methodological support in college. Young scientist. (2014) №18, pp. 538-539.
23. R. K. Johan at al, Upper Secondary School Teachers’ Digital Competence: Analysed by Demographic, Personal and Professional
Characteristics. Nordic Journal of Digital Literacy. (2016) № 3:11.

Authors: Sharath Kumar A J, T P Surekha

Paper Title: Development of Compact UWB Antenna for Wireless Communication


Abstract: n the following article a spline based ultrawideband (UWB) antenna is described. The antenna
129. has a small size of 25mm x 25mm x 1mm and operates in the frequency range 3.1GHz-13GHz. Reduction in
size of the antenna is achieved by 63%. The performances are illustrated using ANSYS HFSS capability to
analyse the antenna system. The antennas are manufactured and tested. The findings obtained are in consistent 775-778
with the simulations.
Keyword : Ultra wideband (UWB)
References:
1. L. Lizzi, G. Oliveri and A. Massa, "Exploitation of spline-based geometries for the time-domain synthesis of UWB
antennas," Proceedings of the 5th European Conference on Antennas and Propagation (EUCAP) , Rome, 2011,
pp. 2382-2385.
2. Apaydin, N., K. Sertel, and J. L. Volakis, \Nonreciprocal and magnetically scanned leaky-waveantenna using coupled CRLH lines,"
IEEE Transactions on Antennas and Propagation, Vol. 62,No. 6, 2954{2961, 2014.
3. Ali, T., A. W. Mohammad Saadh, S. Pathan, and R. C. Biradar, \A miniaturized circularlypolarized coaxial fed superstrate slot antenna
for L-band application," Internet Technology Letters,2017, doi: 10.1002/itl2.21.
4. Ali, T., M. M. Khaleeq, and R. C. Biradar, \A multiband recon_gurable slot antenna for wirelessapplications," AEU-International
Journal of Electronics and Communications, Vol. 84, 273{280,2018.
5. Ali, T., and R. C. Biradar, \A compact hexagonal slot dual band frequency recon_gurable antenna for WLAN applications," Microwave
and Optical Technology Letters, Vol. 59, No. 4, 958{964, 2017.
6. Kunwar, A., A. K. Gautam, and K. Rambabu, \Design of a compact U-shaped slot triple band antenna for WLAN/WiMAX
applications," AEU-International Journal of Electronics and Communications, Vol. 71, 82{88, 2017.
7. Anguera, J., C. Puente, C. Borja, and J. Soler, Fractal Shaped Antennas: A Review, Encyclopedia of RF and Microwave Engineering,
2005.
8. Ali, T. and R. C. Biradar, \A triple-band highly miniaturized antenna for WiMAX/WLAN applications," Microwave and Optical
Technology Letters, Vol. 60, No. 2, 466{471, 2018.
9. Reddy, B. R. and D. Vakula, \Size miniaturization of slit-based circular patch antenna with defected ground structure," Microwave and
Optical Technology Letters, Vol. 57, No. 10, 2410{2413, 2015.
10. T. Ali, S. B K, and R. C. Biradar, "A Miniaturized Decagonal Sierpinski UWB Fractal Antenna," Progress In Electromagnetics
Research C, Vol. 84, 161-174, 2018.
11. Saraswat, R. K., A. K. Chaturvedi, and V. Sharma, \Slotted ground miniaturized UWB antenna metamaterial inspired for WLAN and
WiMAX applications," 2016 8th International Conference on Computational Intelligence and Communication Networks (CICN),
213{216, IEEE, 2016.

Authors: D.Nagaraju, RJ Ramasree, M.Sri Poojitha, K Nikhitha, M Swetha

Paper Title: Design and Development of Telugu Diphone Database


Abstract: Diphone database plays a vital role in text to speech system. In this paper, we present the design
and development of Telugu diphone database which supports the MBROLA. In the previous article of the same
author generation of diphone database for Telugu presents generation of Telugu diphone database [01]. This is
the second Telugu diphone database developed by the same author. This database is the upgraded version of first
database and few problems are rectified in this version.

Keyword : diphone database – Telugu - MBROLA


References:
1. D.Nagaraju, Dr.R.J.Rama Sree .: Generation of diphone database for Telugu. International Journal of Computational Intelligence
130. Research volume 13, Issue 5, 2015 page no891-898 ISSN:0973-1873research India publications.
2. Aymen El Kadhi, Fadhila Gherri, Hamid Amiri “Building diphone database
for Arabic text to speech synthesis system ”http://ieeexplore.ieee.org/documen 779-781
t/ 7233151/
3. Dragos Burileanu, A. Neagu, C. Burileanu ,Diphone database development for a Romanian language TTS system, Ieee 2002
4. N. G. J. Dias, MBROLA Formatted Diphone Database for Sinhala Language, University of Kelaniya 2015
5. Jolanta Bachan, Efficient_ Diphone_ Database_Creation_for_MBROLA, IEEE 2010
6. Kyuchul Yoon, A prosodic diphone database for Korean text-to-speech synthesis system ,springer 2005
7. Pijus Kasparaitis, Diphone_ Databases _for_Lithuanian_Text-to-Speechsynthesis, inform- atics 2013
8. Wafa Barkhoda Bahram Zahirazami anvar Baharampour Keyvan Shahryari, A comparison between allophone, syllable, and diphone
based TTS systems for Kurdish language, Ieee 2010
9. http://kathak.sourceforge.net/diphone.htm
10. D.Nagaraju, Dr.R.J.Rama Sree .: Text to Pho algorithm for Telugu. International Journal of Research in Engineering & Advanced
Technology, Volume 4, Issue 1, Feb - March, 2016. ISSN: 2320 – 8791 26-28.
11. LDCIL, Linguistic Data consortium for Indian Languages, A linguistic resource repository of all Indian languages for AI/NLP projects.
https://data.ldcil.org/.
12. D.Nagaraju, Dr.R.J.Rama Sree .:Extraction of diphones for Telugu : Issues and solutions International Journal of Advanced Scientific
Technologies ,Engineering and Management Sciences (IJASTEMS-ISSN: 2454-356X) Volume.3,Special Issue.1,March.2017.

Authors: Amir Rajaei, Mahshid Sedighi


Pregnancy Leave Wages Compensation based on Data Mining: Clients of Iran’s Social Security
Paper Title:
Organization
Abstract: Data mining is an interdisciplinary science which exploits different methods including statistics,
pattern recognition, machine learning, and database to extract the knowledge hidden in huge datasets. In this
paper, we sought to develop a model for paying pregnancy period wages compensation to the Social Security
Organization (SSO) clients by using data mining techniques. The SSO is a public insurance organization, the
131. main mission of which is to cover the stipendiary workers (mandatory) and self-employed people (optional). In
order to develop the proposed model, 5931 samples were selected randomly from 11504 clients. Then the K-
782-794
Means clustering algorithm was employed to divide data into cluster 1, consisting of 2732 samples, and cluster
2, consisting of 3199 samples. In each cluster, the data were divided into training and test sets with a ratio of 90
to 10. Then a multi-layer perceptron neural network was trained separately for each cluster. This paper utilized
the MLP network model. The tanh transfer function was used as the activation function in the hidden activation
layer. Numerous tests were conducted to develop the best neural network structure with the lowest error rate. It
consisted of two hidden layers. There were 5 neurons in the first layer and 4 neurons in the second. Therefore,
the neural network structure was in the 5-4-1 format. Finally, the best model was selected by using the error
evaluation method. The MAPE and R2 criteria were employed to evaluate the proposed model. Regarding the
test data, the result was 0.96 for cluster 1 and 0.95 for cluster 2. The proposed method produced a lower error
rate than the other existing models.

Keyword : -Means Clustering, Particle Swarm Optimization, Neural Network, Social Security Organization,
Data Mining
References:
1. H. Hassani, X. Huang, and E. Silva, “Digitalisation and Big Data Mining in Banking”, Big Data and Cognitive Computing, vol.2,
no.18, pp.1-13, 2018.
2. B. Minaie and F. Asghari, “Applying Data Mining to Discover the Rating Model and Behavioural Analysis Bank Customers”,
Proceedings of the Second Conference of Data Mining, Iran, 2008.
3. Office of Law and Regulations of the Social Security Organization Legal Aid, “Complete Set of Social Security Laws and
Regulations”, Jangal Publisher, 2015.
4. E. Khoshnoud, “The Effect of Main Dimension of Job on Organization Commitment of Social Security Staff”, MSc Dissertation in
Management, Islamic Azad University of Sanandaj, 2011(In Persian)
5. A. Farahi, A. Esaei, T. Majidi and M.R. Kangavari, “Using Data Mining to Estimate the Retirement Life of Social Security
Organization Insureds by Creating a Data Warehouse”, Proceedings of 5th International Conference of Information and Communication
Technology Management, 2008.
6. D., Olson, D., Delen, and Y., Meng, “Comparative Analysis of Data Mining Methods for Bankruptcy Prediction”, Decision Support
Systems, vol. 52, pp.464-473, 2012.
7. C.W., Cheng, S.S., Leu, Y.M., Cheng and T.C., Wu, “Applying Data Mining Techniques to Explore Factors Contributing to
Occupational
8. Injuries in Taiwan's Construction Industry”, Accident Analysis and Prevention, vol.48, pp.214-222, 2012.
9. W., Boulila, I.R., Farah, K.S., Ettabaa, and B., Solaiman, “A Data Mining Based Approach to Predict Spatiotemporal Changes in
Satellite Images”, International Journal of Applied Earth Observation and Geo-information, vol. 13, pp. 83-92, 2011.
10. K., Dejaeger, F.G., Goethals, A., Giangreco, and L., Mola, “Gaining Insight into Student Satisfaction using Comprehensible Data
Mining Techniques”, European Journal of Operational Research, vol.218, pp. 548-562, 2012.
11. M.H.A., Hijazi, F., Coenen, and Y., Zheng, “Data Mining Techniques for the Screening of Age-Related Macular Degeneration”,
Knowledge-Based Systems, vol.29, pp. 83-92, 2012.
12. D.C., Yen, Y.H., Lu, and C.F., Tsai, “Determinants of Intangible Assets Value: The Data Mining Approach”, Knowledge-Based
Systems, vol.31, pp.67-77, 2012.
13. A., Tavakoli, S., Mortazavi, Z., Hosseini, and M., Kahani, “Applying Data Mining Process to Predict Customer Turnover Pattern s in
Insurance”, Journal of Business Management Perspective, vol.4, no. 37, pp.41-55, 2010.
14. H. DanieFard, S.M. Alvani, and A. Azar, “Quantitative Research in Management: A Comprehensive Approach”, Saffar Publisher,
2009.
15. J., Kennedy, and R.C., Eberhart, “Particle Swarms Optimization”, Proceedings of the IEEE International Conference on Neural
Networks, PP.1942-1948,1995.
16. C., Bishop, “Neural Networks for Pattern Recognition”, Oxford University Press, 1995.
17. U.M., Fayad, G., Piatetsky-Shapiro, P., Smyth, and R., Uthurusamy, “Advances in Knowledge Discovery and Data Mining”, MIT
Press, 1996.
18. A., Amidi, “Sampling Methods1”, 5th Edition, PayamNoor University Press, 2002.
19. M., Kargari, and M., Sepehri, “Stores Clustering using a Data Mining Approach for Distributing Automotive Spare -parts to Reduce
Transportation Costs”, Expert Systems with Applications, vol.39, pp.474-478, 2012.
20. [19] M.J.A., Berry, and G.S., Linoff, “Data Mining Techniques for Marketing, Sales and Customer Relationship Management”, 2nd
Edition, Willey, 2004.
21. E., Hadavandi, H., Shavandi, A., Ghanbari, and S., Abbasian-Naghneh, “Developing a Hybrid Artificial Intelligence Model for
Outpatient Visits Forecasting in Hospitals”, Applied Soft Computing, vol.12, pp. 700-711, 2012.
22. K., Kumar, and G.S.M., Thakur, “Advanced Applications of Neural Networks and Artificial Intelligence: A Review”, Internationa l
Journal of Information Technology and Computer Science, vol.6, pp. 57-68, 2012.
23. S., Nabavi-Kerizi, M., Abadi, and E., Kabir, “A PSO-based Weighting Method for Linear Combination of Neural Networks”,
Computers and Electrical Engineering, vol.36, pp. 886-894, 2010.
24. J., Shahrabi, A., ZolghadrShojaei, “Advanced Data Mining: Concepts and Algorithms”, 2nd Edition, Iranian Students Booking Agency,
Academic Jihad Press, 2011.
25. J., Behbodian, “Statistics and Preliminary Probability”, 25 th Edition, ImamReza University Press, 2005(In Persian).

Authors: Runumi Das


The Determinants of Women Workforce Participation among the Rabha women in Rabha Hasong
Paper Title:
Autonomous Council Area of Assam
Abstract: Workforce participation of women is considered as a major factor in the progression of their
economic independence and usually it has been considered as an indicator of their overall wellbeing status in the
society. Higher participation of women in workforce is symbolised for their autonomy status and social and
economic empowerment. But there are many determinants related to women entering into the workforce. The
purpose of this study is to examine the main determinants of women workforce participation among the Rabha
women in Rabha Hasong Autonomous Council (RHAC) area of Assam. The data from the socio-economic
132. survey of Rabha women undertaken in four blocks of RHAC area during January to March 2019, are analysed
by the logistic regression model. A number of potential variables are used in the model as independent variables.
The results suggest that Marital status of Women, Education of Women, Age of Women, Number of earning 795-799
members of the family and Number of existing children between the age group 0-6 affect significantly; and
Occupation of Head of the household, Types of family, Age of Head of the household and Household income (in
Rs. 1000) does not significantly affect the Rabha women entering into the workforce. It is suggested that in order
to improve the working condition of female labor force, the economy will need to create more appealing
working opportunities and government policies will have to create higher quality jobs which will encourage the
women to enter into the job market.
Keyword : Assam, Determinants, Rabha Hasong Autonomous Council, Rabha Women, Women Workforce
Participation.
References:
1. Anbreen, B., & Afzal, A. (2012). Determinants of Married Women's Labour Force Participation in Wah Cantonment: A Descriptive
Analysis. Academic Research International, II(1), 599-622.
2. Chishti, S., Lodhi, A., & Rashid, S. (1989). Female Labor Participation Behaviour: A Case Study of Karachi. Pakistan Journal of
Applied Economics, VIII(2), 157-165.
3. Elkin, F. (1972). The Child sand Society: The process of socialization. New York: Random House.
4. Faridi, Z. M., Chaudhury, I. S., & Mumtaz, A. (2009). The Socio Economic and Demographic Determinants of Women Work
Participation in Pakistan: Evidence from Bahawalpur District. South Asian Studies, XXIV(2), 351-367.
5. Hamid, S. (1991). Determinants of the Supply of Women in the Labor Market: A Micro Analysis. The Pakistan Development Review,
XXX(4), 775-766.
6. Kozel, V., & Alderman, H. (1990). Factors Determing Work participation and Labour Supply Decisions in Pakistan's Urban Area. The
Pakistan Development Review, XXIX(1), 1-18.
7. Maecoby, E. (1966). The Development of Sex Difference. Stanford University Press.
8. Majumder, R. (2011). Female Labour Supply in India: Proximate Determinants. MPRA Paper No. 43250.
9. Massod, T., & Ahmad, I. (2009). An Economic Analysis of Inter-state Variation in Women Labour Force Participation in India. Online
http://mpra.ub.unimuenchen.de/19376/MPRA Paper No. 19376, posted 14, December.
10. Naqvi, F., & Lubna. (2002). How do Women Decide to Work in Pakistan. The Psakistan Development Review, XXXXI(4), 495-513.
11. Ostry, J. (2014). Redistribution, Inequality and Growth. IMF Staff discussion note.
12. Psacharopoulos , G., & Tzannatos, Z. (1991). Female Labour Force Participation and Education . Oxford: Pergamon Press for the
World Bank.
13. Shah, J., Kruglanski, A. & Ryan, R. (1976). Intrinsic and Extrinsic Motivation: The Search for Optimal Motivation and Performance.
Academic Press, New York

Authors: N. Venkata Subramanian, N. Saravanan, S.Bhuvaneswari

Paper Title: K- Means Based Probabilistic Neural Network (KPNN) For Designing Physical Machine – Classifier
Abstract: Cloud Computing necessitates virtual machines that can deploy users to a machine in a sub-
optimal fashion for effective and maximum utilization of resources conserving overall energy within the
specified duration. PNN is an effective probabilistic classifier which has been applied for a wide variety of
computer application problems. However, for big data applications, we need either pre-processing algorithms for
efficient classification with lower computing time or Mathematical tracking operators to speed up a parametric
approach. This paper focuses to combine the traditional K means algorithm and a PNN to process the data
obtained from Google cluster to classify them into pre-specified groups so as to implement PM classifier design
to monitor the Cloud usage pattern. It is found after validation of KPNN with different data sets that KPNN
works better than PNN in terms of accuracy even when the number of classes increases and turns out to be a
computationally attractive tool.

Keyword : classification, clustering, PNN Probabilistic Neural Network


References:
1. M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, M. Zaharia, “ A
view of cloud computing” Commun. ACM, 53 (4) (2010), pp. 50-58.
2. S. Chaisiri, B.S. Lee, D. Niyato, “Optimization of resource provisioning cost in cloud computing”, IEEE Trans. Serv. Comput., 2012,
5, (2), pp. 164–177.
3. J.-H. Liu, J. Chen, Y.-C. Tai, and C.-H. Shih, “Aces-application cloud for embedded systems,” in Applications and the Internet
(SAINT), 2011 IEEE/IPSJ 11th International Symposium on. IEEE, 2011, pp. 145–151.
4. Z. Tang, Y. Mo, K. Li, and K. Li, “Dynamic forecast scheduling algorithm for virtual machine placement in a cloud computing
133. environment,” The Journal of Supercomputing, vol. 70, no. 3, pp. 1279–1296, 2014.
5. R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, I. Brandic, “Cloud computing and emerging {IT} platforms: Vision, hype, and re ality
for delivering computing as the 5th utility”, Future Gener. Comput. Syst., 25 (6) (2009), pp. 599-616. 800-804
6. Ahmed Amokrane, Mohamed Faten Zhani, Rami Langar, Raouf Boutaba, Guy Pujolle Greenhead, “Virtual data centre embedding
across distributed infrastructures”, IEEE Trans. Cloud Comput., 1 (1) (2013).
7. Hao Jin, Deng Pan, Jing Xu, Niki Pissinou, “Efficient VM placement with multiple deterministic and stochastic resources in
datacenters”, in IEEE GLOBECOM, 2012, pp. 2505–2510.
8. J.A. Hartigan, M.A. Wong, Algorithm AS 136, “K-means clustering algorithm”, J. R. Stat. Soc. Ser. C Appl. Stat., 28 (1) (1979), pp.
100-108.
9. A.K. Jain, R.C. Dubes, “Algorithms for Clustering Data”, Prentice Hall (1988) .
10. L. Kaufman, R.J. Rousseeuw, “Finding Groups in Data: An Introduction to Cluster Analysis”, John Wiley & Sons (1990).
11. J. Han, M. Kamber, “Data Mining: Concepts and Techniques”, Morgan Kaufmann (2001).
12. A.K. Jain, “Data clustering: 50 years beyond k-means”, Pattern Recognit. Lett., 31 (8) (2010), pp. 651-666.
13. K. Alsabti, S. Ranka, V. Singh, “An efficient k-means clustering algorithm”, Proc. First Workshop on High-Performance Data Mining
(1998), pp. 35-43.
14. J.Grabmeier, and A. Rudolph, "Techniques of cluster algorithms in data mining", Data Mining and knowledge discovery,
2002, pp. 303-360.
15. P.A. Kowalski, P. Kulczycki, Interval probabilistic neural network, Neural Comput. Appl. 28 (4) (2017) 817–834,
doi:10.1007/s00521-015-2109-3.
16. M. Kusy, J. Kluska, Assessment of prediction ability for reduced probabilistic neural network in data classification problem, Soft.
Comput. 21 (1) (2017) 199–212.
17. J. Iounousse, S. Er-Raki, A. El Motassadeq, H. Chehouani, Using an unsupervised approach of probabilistic neural network (pnn) for
land use classification from multitemporal satellite images, Appl. Soft Comput. 30 (2015) 1–13.
18. E. Parzen, “On estimation of a probability density function,” Annals of Mathematical Statistics, vol. 33, pp. 1065-1076, 1962.
19. Chu et al., "Numerical conditional probability density function and its application in jitter analysis", Proc. IEEE Int. Symp .
Electromagn. Compat. Signal/Power Integrity, pp. 427-432, 2017.
20. Piotr A. Kowalski et al,“Sensitivity Analysis for Probabilistic Neural Network Structure Reduction”, IEEE TRANSACTIONS ON
NEURAL NETWORKS AND LEARNING SYSTEMS, VOL. 29, NO. 5, MAY 2018, pp. 1919-1932.
21. Harry C. Powell Jr., John Lach, and Ma¨ıte Brandt-Pearce,“SYSTEMATIC ESTIMATION OF ANN CLASSIFICATION
PERFORMANCE EMPLOYING SYNTHETIC DATA”, IEEE International Workshop on Machine Learning for Signal Processing
(MLSP 2010) August 29 – September 1, 2010.
22. J.C. Bezdek, J.M. Keller, R. Krishnapuram, L.I. Kuncheva, and N.R. Pal. “Will the real iris data please stand up?”, IEEE Transactions
on Fuzzy Systems, 7(3):368-369, 1999.
23. https://archive.ics.uci.edu/ml/machine-learning-databases/iris/iris.data
24. A. Bhattacharjee, et al, “Classification of human lung carcinomas by mRNA expression profiling reveals distinct adenocarcinom a
subclasses”, Proc.Natl.Acad.Sci.USA 98, 13790 - 13795, 2001.
25. M.I. Jordan, R. A. Jacobs,”Hierarchical mixtures of experts and the EM algorithm”, Neural Comput, 6, 181 - 214, 1994.
26. Pradeep U. Kurup et al, “Prediction of soil composition from CPT data using General Regression Neural Network”, Journal of
Computing in Civil Engineering, ASCE, 281 - 289, 2006.
27. M. T. Tumay and A. Kebede, “PClass-CPT program, Version 3.0”, Louisiana State University, 2003. (http://www.coe.1su.edu/cpt/).
28. A. Ozmen., et al,” Finding the composition of gas mixtures by a phthalocyanine-coated QCM sensor array and an artificial neural
network”, Sensors and Actuators B, 115, 450 - 454, 2005.
29. Robi Polikar, “Algorithms for enhancing pattern reparability, feature selection and incremental learning with applications to gas
sensing electronic nose system”,Ph. D. thesis, Iowa State University, 2000.
30. A.Sivakumar, “Development of Soft Computing Techniques for Estimation and Analysis of Boiler Flue Gases”, Ph. D. thesis,
SASTRA University, 2016.
Arni Rizqiani Rusydi, Sukri Palutturi, Noer Bahry Noor, Syahrir A. Pasinringi, Andi Multazam,
Authors:
Zuardin, Andriana Wiranto, Ahmad Yani
Application of Good Corporate Governance Principles in Public Regional Hospital of Haji,
Paper Title:
Makassar
Abstract: The newest development proves that hospital management is not sufficient to ensure that hospital
management is efficient. A new instrument is needed to be called Good Corporate Governance to ensure that
hospital management is implemented well. Public Regional Hospital of Haji is state-owned hospital type B. This
hospital applied Hospital By-law, which is the internal regulation compiled in implementing Good Corporate
Governance in a hospital. To analyze the application of Good Corporate Governance principals in RSUD Haji
Makassar. This research is quantitative research through descriptive approach. Samples used are all staffs
involved in organization structure of RSUD Haji Makassar, as many as 61 people. Sampling used was
exhaustive sampling. Data collection was performed using questionnaire, completed with secondary data in the
forms of hospital document and literature review. The research data was processed and analyzed using SPSS
software. Transparency principle indicated that 47 people (76.48%) from the total respondents of 61 people
obtained positive value. Accountability showed that 50 people (82.38%) from the total respondents of 61 people
stated positive value, while in the fairness principle, most of the respondents, as many as 45 people (70.81)
people also stated positive value. GCG principles have been applied well in RSUD Haji Makassar. The Good
Corporate Governance needs to be maintained in order to increase the performance of RSUD Haji Makassar.
There were still big intervention in this hospital, making the independency principal in this research could not be
reviewed in depth.

134. Keyword : Good Corporate Governance, Public Hospital.


References: 805-808
1. Mutamimah P. Analysis of Good Corporate Governance Implementation on HR Performance through Organizational Commitment.
Ecobic. 2014; Volume 15 (No.2): 55-70.
2. Partakusuma LG. Evaluation of Governance of Public Service Agency Hospitals in 4 Class A Vertical Hospitals in Java and Bali. ARSI
Journal. 2014; Volume 1 (No.1): 32-41.
3. Sitohang E. Legal Principles in Hospital Governance. Yuridika. 2014; Volume 29 (1).
4. Listiyono RA. Descriptive Study of Service Quality at the General Hospital Dr. Wahidin Sudiro Husodo City of Mojokerto Post Became
a Type B Hospital. Journal of Policy and Public Management. 2015; 1 (1): 2-7.
5. Aprilia R, DP EN, Rofika R. Effects of Good Corporate Governance, Organizational Culture and Internal Control on Organizational
Performance with Public Accountability as Variable Interventions (Survey of Hospitals in Padang City). Online Journal of the Faculty of
Economics, University of Riau Students. 2016; 3 (1): 565-79.
6. Fatoni M. Understanding the Principles of Good Corporate Governance and Organizational Commitment to Public Sector Performance.
Scientific Journal of Management Economics "Multi Science Scientific Journal". 2017; 8 (01).
7. Sahidu H. Luwuk Regional Hospital Performance Analysis Based on Organizational Culture, Organizational Commitment and Public
Accountability (Case Study at Luwuk Regional General Hospital). Scientific Journal of Information Management and Computerized
Accounting Systems. 2019: 1-8.
8. Creswell JW. A brief introduction to mixed methods research: SAGE publication; 2014
9. Nur Y, Ardyanto TD, PK S, Wajdi MF. Analysis of the Effect of Implementation of Good Corporate Governance (GCG) on
Remuneration for the Employees' Performance of the UNS Hospital Surakarta: Muhammadiyah University Surakarta; 2017
10. Hasan M, Ayuningtyas D, Misnaniarti M. Implementation of Good Corporate Governance and Performance of Civil Servants. Public
Health: National Journal of Public Health. 2016; 11 (1): 20-5.
11. AW AN, Hamzah A, Arifin A. Relationship between Principles of Good Corporate Governance and Employee Performance in Wajo
District Health Office in 2012 Correlation between Good Corporate Governance Principles and Performance of Officials in the Wajo
District Health Department AT. 2012
12. Nyoto CC. Corporate governance. Agora 2016; 4 (2): 394-8.

Authors: Arun.V, Bhooveshwaran.B, Rakkesh.M.P

Paper Title: Water Pollution Monitoring using IOT


Abstract: Activities performed by humans is one of the major reasons for the increase in pollution. This
135. increase in the pollution of earth unfairly influenced the water bodies that is a need for eternity. Asia has the
most number of contaminated water bodies which is mainly composed of Bacteria through Human waste. Even
if we side with treating water instead of prevention of pollution, identifying the extent to which the water body is 809-811
contaminated is an essential problem that needs to be addressed. Factoring BOD and dissolved oxygen which are
the prime causes of biological contamination of a water body is essential for a system monitoring water
pollution. This paper addresses the issue of contamination magnitude through the use of IOT components.
Monitoring and presenting data is the main scope of this system.

Keyword : Dissolved Oxygen, IOT, Water Pollution.


References:
1. Doug Hamilton - Organic Matter Content of Wastewater and Manure
OCES - BAE 1750.
2. Weldan Kusuf - “Embedded Web Server using Arduino Ethernet Shield” SPE STA SMSCP 2013.
3. Navarajan, B. Aswin kumar, S.Venkatesh , T. Jayachandran - ”Detection of Water Pollution and Water Management Using Smart
Sensors with IOT” IRJET 2017.
4. Himadri Nath Saha, Supratim Auddy, Avimita Chatterjee - Pollution Control using Internet of Things (IoT)
5. A Jeyasekar, Siddharth Nanda, Annie Uthra. "Green SDN: Trends of Energy Conservation in Software Defined Network" , International
Journal of Engineering & Technology, 2018

Authors: J. Jagadeesan, M Azhagiri, Maheshraj RP, Sanjay B, T Srikanth

Paper Title: Control System for Smart Traffic Signal using LTE, GPS, RFID for Ambulance
Abstract: Nowadays, Ambulance services are the most affected by the Traffic Jams. This can threaten
the health state of the person within the ambulance. It can be resolved by using the Control System for Smart
Traffic Signal using LTE, GPS, RFID for Ambulance. This system creates a connection between the ambulance
and the traffic signal. So, as to assist the ambulance for a stop free travel to the destination. This system uses
Radio Frequency Identification (RFID), Global Positioning System (GPS), Long Term Evolution (LTE) as its
key components to implement the control system. The GPS helps in live tracking the ambulance movement in
order to change the traffic signal only when the ambulance is nearby the traffic signal. Once the GPS confirms
the ambulance is nearing a traffic signal, the cloud instructs the change in traffic signal’s mode and the
ambulance’s lane is granted green signal. Once, the ambulance crosses the signal, it reverts back to its original
flow. The RFID tag assists in confirming the passage of ambulance from the traffic signal. Also, this method
warns the upcoming signal and changes their signal time based on factors such as ambulance speed, distance and
expected arrival time which helps in clearing out the traffic in advance. This is continued until the ambulance
reaches its destination hospital. All these processes happen without any human intervention.

136. Keyword : Ambulance, emergency service, navigation, traffic signal


References: 812-815
1. Chattaraj, A., Bansal, S., & Chandra, A., “An intelligent traffic control system using RFID”, IEEE Potentials, vol 28(3), 2009, pp 40–
43.
2. Latha, J. R., Suman, U., “Intelligent Traffic Light Controller”, International Journal of Emerging Engineering Research and
Technology, vol 3(3), 2015, pp 38-50.
3. Nandini Kiran P, Suraya Mubeen., “A New Approach for Intelligent Traffic Control System using Raspberry pi”, International Journal
of Innovative Research in Technology, vol 4(6), 2017, pp 394-399.
4. Poulton, M., Noulas A., Weston D., & Roussos, G., “Modelling Metropolitan-area Ambulance Mobility under Blue Light Conditions”,
IEEE Access, vol 7, 2018, pp 1390-1403.
5. Preradovic, S, & Karmakar, N., “Chipless RFID for intelligent traffic information system”, 2011 IEEE International Symposium on
Antennas and Propagation, 2011.
6. Priyanka Nalawade, Prajakta Waghere, Nisha Vanare, Prajakta Kalbhor, Jadhav, A. J., “Dynamic Traffic Control System using RFI D
Technology”. International Journal of Advanced Research in Computer and Communication Engineering, vol 6(1), 2017, pp 66-68.
7. Rajeshwari S, Santhoshs Hebbar, Varaprasad Golla, “Implementing Intelligent Traffic Control System for Congestion Control,
Ambulance Clearance, and Stolen Vehicle Detection”. IEEE Sensors Journal, vol 15(2), 2015, pp 1109-1113.
8. Janani Saradha, B., Vijayshri, G., & Subha, T., “Intelligent traffic signal control system for ambulance using RFID and cloud ”, 2017
2nd International Conference on Computing and Communications Technologies, 2017.
9. Salama, A. S., Saleh, B. K., & Eassa, M. M. “Intelligent cross road traffic management system”, 2010 2nd International Conference on
Computer Technology and Development, 2010.
10. Zhang, Y., “RFID-Based Tracking in Supporting Real-Time Urban Traffic Information”, 2009 Fifth International Joint Conference on
INC, IMS and IDC, 2009.

Authors: B. Lalithadevi, Akash Yadav, Aditya Pandey, Mahesh Adhikari


IoT Based WSN Ground Water Monitoring System with Cloud-Based Monitoring as a Service
Paper Title:
(Maas) and Prediction using Machine Learning
Abstract: The main source of water in the Indian Subcontinent is Groundwater. It is also the most rapidly
depleting resource due to various reasons such as rampant unchecked irrigation and exploitation of groundwater
by industries and other organizations. The current system is limited by short communication range, high power
consumption and the system monitors only the water level and the report is available only to the consumer i.e. it
is a single-user system. Due to the unavailability of a centralized system to monitor and prevent overuse of water
137. resources, sudden water crises have become a major issue in India. This project aims at implementing an IoT
(Internet of things) based water monitoring system that monitors the water level and the quality of groundwater
816-821
and updates real-time data to the database. This system is designed to monitor the groundwater level of an entire
village or a town. It updates the people and the concerned government authorities in case of any decrease in
water level and water quality below the threshold value, and also monitors the water consumption during a
period and predicts exhaustion time. This system predicts the availability of water in the future based on current
demand and usage and the recharge rate using machine learning algorithms. The data collected and the analysis
of the data is made available in a Public Cloud. The modules are based on Raspberry Pi Zero, sensor nodes and
LoRa (Long Range) Module or Wi-Fi module according to the network requirement for connectivity.
Keyword : Internet of Things, Water Resource Monitoring, Agriculture, Smart village, Smart city, Wireless
sensors net- work, Environmental monitoring, Cloud.
References:
1. Enabling communication networks for water quality monitoring applications: a survey. By Segun O. Olatinwo and Trudi-H, Joubert,
(Senior Member, IEEE), Feb2019.
2. IoT Based water level monitoring system for smart village. By TimothyMalche,PritiMaheshwari,AISECTUniversity,2018.
3. Groundwater: Characteristics, qualities, pollutions and treatments: An overview by Olumuyiwa Idowu Ojo, Fred Otieno George,
Ochieng.
4. A New Multi level Ground Water Monitoring System Using Multichannel Tubing by MurrayD, Einarson, John A. Cherry, NGWA.
5. A Multilevel Device for Ground-Water Sampling and Piezo metric Monitoring by J.F.Pickens, J.A.Cherry.
6. IoT based smart agriculture, Nikesh Gondchwar, Prof. Dr. R.S. Kawitkar.
7. Automated ground water monitoring and analysis system, US Patent, Pat. No. 7247278B2.
8. The real time monitoring of Water quality IoT Environment.
N.Vijaykumar, R. Ramya.KSR College of technology, India
9. WSN Based reconfigurable water quality monitoring system In IoT environment, Cho Zyin Myint, Lenin Gopal, Curtin University.
10. Water level monitoring system by Taksham Shetty, Prathamesh Wag, Dr. Asawari Dudwadkar, VES Institute of Technology.

Authors: R. Priyadharsini, R. Senjudarvannan


Subdued Intensity Variation of Graphite Peaks and Variation of Raman Shift in the Synthesis and
Paper Title:
Characterization of Carbon Nanotubes
Abstract: Carbon Nanotube (CNT) is a new form of carbon, have aroused huge interest in the research
community because of their interesting electronic structure. The CNTs are possibly handy in an extensive variety
of solicitations. They unveil phenomenal asset, strange electrical properties and efficient heat conductors.
Currently Chemical Vapour Deposition (CVD) has been widely used for the preparing carbon nanotubes because
of its simplicity, high throughput and low running cost. It is also easy to control the growth parameters compared
to other methods. In the present work methane is used as the source of carbon and ferric nitrate is used as a
catalyst. Also, zeolites are used as absorbents and support for catalysts. The growth is carried out in a tubular
furnace.
The surface morphology, vibrational and structural properties were studied by using FESEM, laser
Raman. FESEM micrograph shows the growth of carbon nanotube with different shapes. The length of the tube
is ~1.08µm while its diameter is ~70nm. Raman spectra shows the absence of radial breathing mode (RBM) at
lower Raman shift and the D and G- band evidence the presence of multi walled carbon nanotubes. XRD pattern
reveals that, the intensity of graphite peaks are very subdued because the presence of higher content of
zeolite.TGA curve shows, the as grown CNT has a weight gain due to oxidation or oxygen pickup by zeolite.
Carbon nanotubes is an advance developing field in research. Carbon nanotubes are the strongest and stiffest
materials in terms of tensile strength and elastic modulus. The present work focuses on the growth of Carbon
nanotubes using chemical vapour deposition. Although there are many methods, the chemical vapour deposition
is chosen because of its simplicity, high throughput and low running cost. Also it is very easy to control the
growth parameters compared to other methods. . Carbon nanotubes has a wide application range in the field of
Gas sensors, medical science for drug delivery system, field emission, energy storage and solar cells.

138. Keyword : CNT, Zeolite, FESEM, Laser Raman


References: 822-825
1. S. Iijima, Nature 1991, 354, 56– 58.
2. R. H. Baughman, A. Zakhidov, W. A. de Heer, Science 2002, 297, 787 – 792.
3. P. M. Ajayan, Chem. Rev. 1999, 99, 1787 – 1799.
4. J. Wang, Electroanalysis 2005, 17, 7 –14.
5. R. S. Chen, W. H. Huang, H. Tong, Z. L. Wang, J. K. Cheng, Anal. Chem. 2003, 75, 6341 –6345.
6. C. E. Banks, T. J. Davies, G. G. Wildgoose, R. G. Compton, Chem. Commun. 2005, 829 – 841.
7. Z. H. Wang, J. Liu, Q. L. Liang, Y. M. Wang, G. Luo, Analyst 2002, 127, 653 –658.
8. G. Zhao, S. Q. Zang, K. Z. Liu, S. Lin, J. Liang, X. Y. Guo, Z. J. Zhang, Anal. Lett. 2002, 35, 2233 –2244.
9. J. Wang, M. Musameh, Analyst 2003, 128, 1382 – 1385.
10. M. Musameh, J. Wang, A. Merkoci, Y. H. Lin, Electrochem. Commun. 2002, 4, 743 –746.
11. J. Wang, G. Chen, M. P. Chatrathi, M. Musameh, Anal. Chem. 2004, 76, 298 –302.
12. Y. D. Zhao, W. D. Zhang, H. Chen, Q. M. Luo, Talanta 2002, 58, 529 – 534.
13. J. Wang, M. Musameh, Anal. Chem. 2003, 75, 2075 –2079.
14. J. Wang, M. Musameh, Analyst 2004, 129, 1–2.
15. G. Chen, L. Y. Zhang, W. Wang, Talanta 2004, 64, 1018 –1023.
16. J. Wang, G. Chen, M. Wang, M. P. Chatrathi, Analyst 2004, 129, 512 – 515.
17. H. Luo, Z. Shi, N. Li, Z. Gu, Q. Zhuang, Anal. Chem. 2001, 73, 915 – 920.
18. F. H. Wu, G. C. Zhao, X. W. Wei, Electrochem. Commun. 2002, 4, 690 – 694.
19. J. Wang, M. Musameh, Y. Lin, J. Am. Chem. Soc. 2003, 125, 2408 –2409.
20. M. Zhang, A. Smith, W. Gorski, Anal. Chem. 2004, 76, 5045 –5050.
21. X. L. Luo, J. J. Xu, J. L. Wang, H. Y. Chen, Chem. Commun. 2005, 2169 – 2171.
22. M. L. Guo, J. H. Chen, J. Li, B. Tao, S. Z. Yao, Anal. Chim. Acta 2005, 532, 71–77.
23. Xiao Yao, Huixia Wu, Joseph Wang,Song Qu, and Gang Chen, Chem. Eur. J. 2007, 13, 846 – 853.
24. Christopher M. Whitea, Richard Banks, Ian Hamertonc, John F. Watts, Progress in Organic Coatings 90 (2016) 44–53.
25. Cher Ming Tan, Charles Baudot, Yongdian Han and Hongyang Jing, Tan et al. Nanoscale Research Letters 2012, 7:183.
26. Shrikant S. Raut, Babasaheb R. Sankapal, Md. Shahriar A. Hossain, Subrata Pradhan, Rahul R. Salunkhe, and Yusuke Yamauchi, Eu r.
J. Inorg. Chem. 2018, 137–142.
27. Brock Marrs, Rodney Andrews, Terry Rantell, David Pienkowski, Wiley InterScience 3 January 2006.
28. Xitong Liu, Mengshu Wang, Shujuan Zhang, Bingcai Pan, Journal of Environmental Sciences 2013, 25(7) 1263–1280.
29. Rodney Andrews, David Jacques, Dali Qian, and Terry Rantell, Acc. Chem. Res. 2002, 35, 1008-1017.
30. Jiang Xu , Zhen Cao, Yilin Zhang, Zilin Yuan, Zimo Lou, Xinhua Xu , Xiangke Wang, Chemosphere 195 (2018) 351e364.
31. Mohammad S. Islam, Yan Deng, Liyong Tong, Shaikh N. Faisal, Anup K. Roy, Andrew I. Minett, Vincent G. Gom es, Accepted
Manuscript, CARBON 10385, 1 October 2015.
32. Hassan Karimi-Maleh, Fahimeh Tahernejad-Javazmi, Necip Atar, Mehmet Lütfi Yola, Vinod Kumar Gupta, and Ali A. Ensafi, Ind. Eng.
Chem. Res. 2015, 54, 3634−3639.
33. Ali Eatemadi, Hadis Daraee, Hamzeh Karimkhanloo, Mohammad Kouhi, Nosratollah Zarghami, Abolfazl Akbarzadeh, Mozhgan Abasi,
Younes Hanifehpour and Sang Woo Joo, Eatemadi et al. Nanoscale Research Letters 2014, 9:393.
34. Linping Xu, Yan-Ling Hu, Candice Pelligra, Chun-Hu. Chem. Mater. 21 (2009) 2875.
35. S S Islam, Khurshed Ahmad Shah, H S Mavi, A K Shaukla, S Rath and Harsh. Bull Mater, 30 (2007) 295-299.
36. Abdel-Nasser A. El-Hendawy, Robert J. Andrews, Andrew J. Alexander, Applied surface science, 255 (2009) 7446-7450.

Authors: Pooja Pathak, Vijay Kumar Dwivedi,


Using a Fuzzy Logic-Based Emotional Intelligence Framework for Testing Satisfaction of Faculty in
Paper Title:
an Outcomes-Based Educational System
Abstract: Workplace distress, a common manifestation in different profession has been seen in all over the
world. Occupation pressure among faculty has been documented to impact job satisfaction and job performance,
thereby undermining student teacher relationship leads to the future of student at risk. The purpose of this study
to get satisfaction index of faculty in an outcome based education system by using fuzzy based emotional
intelligence (EI). Emotional expression is essential for survival. One can give his emotional expression in
language (linguistic) only. As per literature the fuzzy logic is much more capable to handle linguistic variable in
uncertain environment. Therefore, to analyze the satisfaction index of faculty fuzzy logic is used. Research
findings indicate that emotional literacy plays an important role in thinking, learning, exhaustion,
depersonalization and a sense of low personal adjustment that can occur among individuals who work with other
139. people in some capacity in a University. In this study, 450 faculty satisfaction data are taken and analyzed,
needing further investigation more data and more comparative analysis. Fuzzy based emotional intelligence was
not as distinctive as previous literature has indicated. 826-831

Keyword : Emotional Intelligence, fuzzy logic, linguistic variable, satisfaction index


References:
1. S. Jensen, C.Kohn, R. Rilea, R. Hannon, G. Howells, “Emotional Intelligence: A Literature Review”, University of the Pacific
Department of Psychology, 2007.
2. A. Cartwright, A. Solloway, A. “Emotional Intelligence: Activities for developing you and your business”, New York, Routledge. 2009
3. D. Goleman. “Emotional Intelligence: Why It Can Matter More than IQ”, Proceedings of Annual Meeting of the Society for Industrial
and Organizational Psychology, New Orleans, LA, April 15, 2000.
4. R. A. Fabes, N. Eisenberg, N.(1997) “Regulatory control and adults' stress-related responses to daily life events”, Journal of Personality
and Social Psycology, Vol. 73, No.5, , 1997 pp. 1107-1117.
5. J. Alam, M. K. Pandey, “A Soft Computing Model for Evaluating Teachers’ Overall Performance using Fuzzy Logic”. Journal of
Information Technology &Software Engineering, Vol. 7, No.3, 2017, pp. 02-09.

Authors: Sevar Neamat

Paper Title: A Developed Framework for Energy Technology Sustainability Assessment


Abstract: Technology assessment has reformed in nature over the last four decades from an analytical tool
for technology evaluation, which relies extensively on quantitative and qualitative modelling methods to
strategic plan tool for policy creation regarding satisfactory new technologies, that based on participative policy
problematic investigation. The aim of assessing technology today is to make policy choices for solutions to
organizational and social problems. which, at the workable level, use innovative technologies which considered
publicly acceptable, that is, practical policy decisions.
This paper concentrates on the progressing of a framework that joins a technology valuation method, namely,
system dynamics, inside the larger opportunity of technology growth for sustainability. The framework, called
system method to technology sustainability assessment (SATSA), joining three main fundamentals: technology
progress, sustainable progress, and dynamic systems method. The article after that determines the framework of
integrating the system dynamics procedure in energy technology assessment philosophy and exercise inside the
framework of sustainable growth. The framework offers for technology sustainability assessment, which can
140. direct the upgrade of sustainable energy technologies at a policy class. Additionally, it can support the
technology inventors to understand the possible effects of technology, therefore allowing them to decrease
832-838
technology transmission hazards.

Keyword : Technology sustainability assessment; Organization dynamics; Supportable development;


Workable technology; Sustainable technology.
References:
1. A. D. Sagar and J. P. Holdren, “Assessing the global energy innovation system: some key issues,” Energy Policy, vol. 30, no. 6, pp.
465–469, 2002.
2. M. P. Hekkert, R. A. Suurs, S. O. Negro, S. Kuhlmann, and R. E. Smits, “Functions of innovation systems: A new approach for
analysing technological change,” Technol. Forecast. Soc. Change, vol. 74, no. 4, pp. 413–432, 2007.
3. R. Ibrahim, S. Zeebaree, and K. Jacksi, “Survey on Semantic Similarity Based on Document Clustering,” Adv. Sci. Technol. Eng.
Syst. J., vol. 4, no. 5, pp. 115–122, 2019.
4. N. Nakicenovic, N. Nakićenović, A. Grubler, A. Grübler, and A. McDonald, Global energy perspectives. Cambridge University Pre ss,
1998.
5. W. D. Nordhaus and A. Grübler, Technological change and the environment. Resources for the Future, 2002.
6. K.-H. Robèrt et al., “Strategic sustainable development—selection, design and synergies of applied tools,” J. Clean. Prod., vol. 10, no.
3, pp. 197–214, 2002.
7. K. Jacksi, “Design and Implementation of E-Campus Ontology with a Hybrid Software Engineering Methodology.”
8. T. A. Tran and T. Daim, “A taxonomic review of methods and tools applied in technology assessment,” Technol. Forecast. Soc.
Change, vol. 75, no. 9, pp. 1396–1405, 2008.
9. K. Jacksi, S. R. M. Zeebaree, and N. Dimililer, “LOD Explorer: Presenting the Web of Data,” Int. J. Adv. Comput. Sci. Appl. IJACSA,
vol. 9, no. 1, 2018.
10. S. Neamat and I. Yitmen, “Factors Affecting the Innovation and Competitiveness in Kurdistan Region of Iraq Construction Indus try,”
Int J Adv Eng Res Sci IJAERS, vol. 4, no. 2, pp. 157–162, 2017.
11. S. D. Salahaddin, “Factors Affecting the Competitiveness and Innovation in Northern Iraq Construction Industry,” 2016.
12. A. D. P. Henriksen, “A technology assessment primer for management of technology,” Int. J. Technol. Manag., vol. 13, no. 5, pp. 615–
638, 1997.
13. K. Jacksi and S. M. Abass, “Development History of the World Wide Web.”
14. A. D. P. Henriksen, “A technology assessment primer for management of technology,” Int. J. Technol. Manag., vol. 13, no. 5, p p.
615–638, 1997.
15. A. Hasso, K. Jacksi, and K. Smith, “Effect of Quantization Error and SQNR on the ADC Using Truncating Method to the Nearest
Integer Bit,” presented at the 2019 International Conference on Advanced Science and Engineering (ICOASE), 2019, pp. 112–117.
16. J. K. Musango and A. C. Brent, “Assessing the sustainability of energy technological systems in Southern Africa: A review and way
forward,” Technol. Soc., vol. 33, no. 1–2, pp. 145–155, 2011.
17. M. S. Abdel-Wahab, A. R. Dainty, S. G. Ison, P. Bowen, and G. Hazlehurst, “Trends of skills and productivity in the UK construction
industry,” Eng. Constr. Archit. Manag., vol. 15, no. 4, pp. 372–382, 2008.
18. D. Naidoo, “The Technology Innovation Agency (TIA): a public support mechanism for technological innovation in a developing
country: research notes/commentaries,” Afr. J. Sci. Technol. Innov. Dev., vol. 1, no. 2_3, pp. 235–242, 2009.
19. K. Jacksi, “Design and Implementation of Online Submission and Peer Review System: A Case Study of E-Journal Of University Of
Zakho,” Int. J. Sci. Technol. Res., vol. 4, no. 8, pp. 83–85, 2015.
20. S. D. Salahaddin, “Factors Affecting Project Performance in Kurdistan Region of Iraq,” vol. 4, no. 5, p. Page No: 001 -005, 2017.
21. S. Neamat, “The Development of Management Control Systems Framework in Public-Private Partnerships,” Int. J. Sci. Technol. Res.,
vol. 8, no. 10, pp. 299–305, 2019.
22. G. Assefa and B. Frostell, “Technology assessment in the journey to sustainable development,” PUBLIC Adm. PUBLIC POLICY -N.
Y.-, vol. 118, p. 473, 2006.
23. S. W. S. WCED, “World commission on environment and development,” Our Common Future, vol. 17, pp. 1–91, 1987.
24. T. B. Johansson and J. Goldemberg, Energy for a Sustainable World. Wiley Eastern, 1988.
25. E. F. Wolstenholme, “The use of system dynamics as a tool for intermediate level technology evaluation: three case studies,” J. Eng.
Technol. Manag., vol. 20, no. 3, pp. 193–204, 2003.
26. G. H. Johnson, D. Powars, T. Bruce, T. Beach, M. Harris, and B. Goodwin, “Post-impact effects of the Eocene Chesapeake Bay
impact, lower York-James Peninsula, Virginia,” presented at the Virginia Field Conference, 2001, vol. 31, p. 40.
27. J. M. Mog, “Struggling with sustainability—a comparative framework for evaluating sustainable development programs,” World Dev.,
vol. 32, no. 12, pp. 2139–2160, 2004.
28. A. Kemmler and D. Spreng, “Energy indicators for tracking sustainability in developing countries,” Energy Policy, vol. 35, no . 4, pp.
2466–2480, 2007.
29. A. I. Gaziulusoy, “A critical review of approaches available for design and innovation teams through the perspective of sustainability
science and system innovation theories,” J. Clean. Prod., vol. 107, pp. 366–377, 2015.
30. K. Auerhahn, “Dynamic systems simulation analysis: A planning tool for the new century,” J. Crim. Justice, vol. 36, no. 4, pp. 293–
300, 2008.
31. M. B. Sterman, “Basic concepts and clinical findings in the treatment of seizure disorders with EEG operant conditioning,” Clin.
Electroencephalogr., vol. 31, no. 1, pp. 45–55, 2000.
32. G. P. Richardson and A. L. Pugh, Introduction to system dynamics modeling with DYNAMO, vol. 48. MIT press Cambridge, MA,
1981.
33. J. J. Dolado and S. Bentolila, Who are the insiders?: Wage setting in Spanish manufacturing firms. Banco de España, Servicio de
Estudios, 1992.
34. E. Gadioli and P. E. Hodgson, Pre-equilibrium nuclear reactions. Oxford University Press, USA, 1992.
35. O. Eriksson and B. Frostell, “An approach to sustainability assessment of energy systems,” Build. Sustain. Energy Syst. Swed. Exp.
Stockh. Swed. Swed. Natl. Energy Adm., 2001.
36. A. D. P. Henriksen, “A technology assessment primer for management of technology,” Int. J. Technol. Manag., vol. 13, no. 5, p p. 615–
638, 1997.
37. S. Johnson, T. Taylor, and D. Ford, “Using system dynamics to extend real options use: Insights fro m the oil & gas industry,”
presented at the International system dynamics conference, 2006, pp. 23–27.
38. R. Chambers, Room for maneuver: reading (the) oppositional (in) narrative. University of Chicago Press, 1991.
39. R. W. Kates et al., “Sustainability science,” Science, vol. 292, no. 5517, pp. 641–642, 2001.
40. P. Nijkamp and R. Vreeker, “Sustainability assessment of development scenarios: methodology and application to Thailand,” Eco l.
Econ., vol. 33, no. 1, pp. 7–27, 2000.
41. R. K. Singh, S. K. Garg, and S. Deshmukh, “Strategy development by SMEs for competitiveness: a review,” Benchmarking Int. J., vol.
15, no. 5, pp. 525–547, 2008.
42. R. B. Norgaard, “Coevolutionary development potential,” Land Econ., vol. 60, no. 2, pp. 160–173, 1984.
43. P. Hjorth and A. Bagheri, “Navigating towards sustainable development: A system dynamics approach,” Futures, vol. 38, no. 1, pp.
74–92, 2006.
44. A. Hughes, “University-industry links and UK science and innovation policy,” Univ. Promote Econ. Growth, p. 71, 2007.
45. R. B. Norgaard and P. Ekins, “Development Betrayed: The End of Progress and a Coevolutionary Revisioning of the Future,”
presented at the Economic Journal-Including Annual Conference Paper Supplement, 1995, vol. 105, pp. 1030–1031.
46. T. Daim, D. Yates, Y. Peng, and B. Jimenez, “Technology assessment for clean energy technologies: The case of the Pacific
Northwest,” Technol. Soc., vol. 31, no. 3, pp. 232–243, 2009.
47. A. Hesen and J. Faber, “Innovation capabilities of European nations: Cross-national analyses of patents and sales of product
innovations,” Res. Policy Elsevier, 2004.
48. A. Chan, R. Hoffman, and B. McInnis, “The role of systems modeling for sustainable development policy analysis: the case of b io-
ethanol,” Ecol. Soc., vol. 9, no. 2, 2004.

Authors: Elluru Jayapal, S. Varadarajan


Design and Analysis of Sierpinski Carpet Fractal Antenna for UHF Spaced Antenna Wind Profiler
Paper Title:
Radar
141. Abstract: This paper emphasizes the design of Sierpinski carpet fractal antenna to miniaturize the antenna
array of UHF Spaced antenna Wind profiler radar that operates at 445 MHz. The proposed antenna is designed
839-842
using High Frequency Structure Simulator (HFSS) where aluminium is used as a patch and ground with air as
dielectric substrate due to it’s zero loss tangent .patch is separated from ground with help of hinges and fed with
50 ohm coaxial probe. The Sierpinski fractal antenna is designed till third iteration so as to reduce its size and
weight by 33 percent.

Keyword : Sierpinski carpet, fractal antenna, wind profiler Radar, HFSS, UHF.
References:
1. D. H. Werner and S. Ganguly, “An overview of fractal antenna engineering research,” IEEE Ant. Propagat. Mag., vol. 45, no. 1, pp. 38-
57, February 2003
2. L.K.Balaji Vignesh and .K.Kavitha, “A Survey on Fractal Antenna Design” International Journal of Pure and Applied Mathematics ,
Volume 120 No. 6 ,10941-10959, 2018
3. Vaisala, Inc. Wind Profiling, The History, Principles, and Applications, 2004.
4. B. Lindseth, William O.J. Brown, J. R. Jordan, D. Law, T. Hock, S. A. Cohn and Z. Popovic, "A New Portable 449 MHz Spaced
Antenna Wind Profiler Radar." IEEE Trans. on Geoscience and Remote Sensing, vol. 50, no. 9, pp. 3544-3553, September 2012.
5. A. Chatterjee, T.Mondal, Deven G.Patanvariya, Ravi Prasad K. Jagannath “, Fractal-based design and fabrication of low-sidelobe
antenna array” , International Journal of Electronics and Communications, vol. 83,pp. 549-557, January 2018.
6. B.T.P.Madhav, T.Anilkumar, S.K.Kotamraju “Transparent and Conformal Wheel-shaped Fractal Antenna forVehicular
Communication Applications” International Journal of Electronics and Communications, 2018
doi: https://doi.org/10.1016/j.aeue.2018.04.028
7. J. Anguera” Metallized foams for antenna design: application to fractal-shaped sierpinski-carpet monopole” Progress In
Electromagnetics Research, PIER 104, 239-251, 2010
8. D.H. Werner, R.L. Haupt, and P.L. Werner, “Fractal antenna engineering: The theory and design of fractal antenna arrays,” IEEE Ant.
Propagat. Mag., vol. 41, no. 5, pp. 37-59, 1999.
9. S. Ullah, F.Faisal, A.Ahmad, U. Ali, F.A.Tahir and J. A. Flint “Design and Analysis of Novel Triband flower- shaped planer antenna
for GPS and WiMAX applications” Journal of Electromagnetic waves and applications, vol. 31, no.9, pp. 927-940, April 2017.
10. Mohd G. Siddiqui, Abhishek K.Saroj, Devesh, and Jamshed A.Ansari “Multi-Band Fractaled Triangular Microstrip Antenna for
Wireless Applications” Progress In Electromagnetics Research M, Vol.65, pp. 51-60, January 2018.
11. Arpan Desai, Trushit Upadhyaya, Riki Patel, Sagar Bhatt, and Parthesh Mankodi “Wideband High Gain Fractal Antenna for Wireless
Applications” Progress In Electromagnetics Research Letters , Vol. 74, pp. 125-130, 2018.
12. Balanis C. A. Antenna Theory: Analysis and Design, John Wiley & Sons, (2005)
13. Ramesh G, Prakash B, Inder B, and Ittipiboon A. Microstrip antenna design handbook, Artech House, (2001).

Authors: J.Joselin Jeya Sheela.S.Rosaline,M.Aswini,V.Praveen Kumar

Paper Title: Triangular UWB Antenna with Reduced Ground Plane Effect
Abstract: This article gives brief view of UWB microstrip antenna characteristic without a slot and with a
triangular slot on the patch of the MSA. Nowadays UWB antenna is a must for wireless communication with the
narrow pulses in the series of nanoseconds, for the application of ultra- wideband in frequency domain for very
short distance and minimum power densities. The research in this field has become more sought-after and
therefore the demand on UWB microstrip antenna is rising rapidly. The currents along the verge of the slot
initiates additional resonance, it concords with the main patch resonance, which result in the production of
overall frequency response characteristics, ultimately leads to wideband. Thus a crisp novel ultra-wideband
configuration with and without a triangular slot have been proposed. And the radiation is in the broadside of
antenna with small variation along the entire bandwidth. Thus improving the robustness of the MSA and cost
reduction. Due to the potential of UWB antennas,they are significant to improve the performance of wireless
communication systems. The MSA (microstrip antenna) is designed with FR-4 substrate. There is increase in
bandwidth due to the introduction of triangular slot in the patch and the variation in the antenna parameters are
briefed below. This document can be used as guide to design small MSA for mobile communication.

142. Keyword : MSA, return loss, slot, UWB, bandwidth


References: 843-847
1. Ali Araghi and Gholamreza Dadashzadeh (2012) ‘Oriented design of an antenna for MIMO Applications using Theory of characteristic
modes’IEEE antennas and wireless propagation letters, Vol 11.pp1040-1043.
2. Debatosh Guha and Jawad Y.Siddiqui (2004) ‘Resonant Frequency of equilateral triangular Microstrip antenna with and without air
gap’, IEEE transactions on antennas and propagation,Vol. 52, No.8,pp.174-2177.
3. Iti Saha Misra and Chowdary.S.K(1998)’Study of Impedence and Radiation Properties of a Concentric Microstrip Triangular-Ring
Antenna and its Modelling Techniques Using FDTD Method’,IEEE transactions on antennas and propagation,Vol. 46,No. 4,pp.531-
537.
4. Jeen-Sheen Row and Yen-Yu Liou (2006) ‘Broadband Short-Circuited Triangular Patch Antenna’,IEEE transactions on antennas and
propagation, Vol. 54,No.7,pp.237-2141.
5. Jieh-Sen Kuo and Gui-bin Hsieh (2003) ‘Gain Enhancement of a Circularly Polarized Equilateral- Triangular Microstrip Antenna with
a slotted ground plane’IEEE transactions on antennas and propagation,Vol. 51, No.7,pp.1652-1656.
6. Jui-han Lu,Chia-Luan Tang and Kin-Lu Wong(2000) ‘Novel Dual-Frequency and Broad-Band Designs of Slot-Loaded Equilateral
Triangular Microstrip Antennas’,IEEE transactions on antennas and propagation, Vol.48,No.7,pp.1048-1054.
7. Jui-han Lu,Chia-Luan Tang,and Ki-lu Wong(1999) ‘Single-Feed Slotted Equilateral-Triangular Microstrip Antenna for Circular
Polarization’,IEEE transactions on antennas and propagation, Vol.47,No.7,pp.1174-1178.
8. Jui-Han Lu and Kin-Lu Wong (2000) ‘Single-Feed Circularly Polarized Equilateral-Triangular Microstrip Antenna with a Tuning
Stub’ IEEE transactions on antennas and propagation, Vol.48, No.12, pp.1869-1872.
9. Lim.E.G,Korolkiewicz.E,Scott.S,Sambell .A and Aljibouri .B (2002) ‘An Efficient Formula for the input Impedence of a Microstrip
Right- Angled Isosceles Triangular Patch Antenna’IEEE antenna and wireless propagation,Vol.1,pp.18-21.
10. Lin,Y.-C. Kuo and H-R .Chuang (2005) ‘A Planar Triangular Monopole Antenna for UWB Communication’,IEEE microwave and
wireless components,Vol.15,No.10,pp.624-626.

Authors: Manoj Kumar, Suresh .G. Patil


143.
Paper Title: Behaviour of Fiber Reinforced Geopolymer Concrete
Abstract: This paper presents the behavior of geopolymer concrete with small and big fibers. The
aluminosilicate materials used for geopolymer concrete are fly ash and GGBS. For this study standard cube,
cylinder and beam specimens are casted and tested to investigate compressive, split tensile and flexural
strengths. The experimental results shows that incorporation of steel fibers for the geopolymer mixes improve
the strength properties. Few models are generated to estimate the strengths with alliance of cube compressive
strength.

Keyword : Small fibers, big fibers, geopolymer, compressive, split tensile, flexural strength.
References:
1. Davidovits, J (1988), “Geopolymer chemistry and properties” Proceedings of the First European Conference on Soft Mineralogy,
Compiegne, France, pp. 25-48.
2. H. R. Hamilton (2016), “Comparison of Labortory and Field environmental conditioning on FRP concrete bond durability”,
3. Construction and Building Materials, Vol. 122, 30 Sep. 2016, pp. 525-536.
4. Hadigheh, S A, Gravina, R J & Smith, S T (2017), “Effect of acid attack on FRP-to-concrete bonded interfaces”, Construction and 848-852
Building Materials, vol. 152, pp. 285-303.
5. Shafqat Ali, Saeed Mirza, M & Larry Lessard (2017), “Durability assessment of hybrid FRP composite shell and its application to
prestressed concrete girders”, Construction and Building Materials, vol. 150, pp. 114-122.
6. Yue Li, Xiongfei Liu & Miaoke Wu (2017), “Mechanical properties of FRP- strengthened concrete at elevated temperature”,
Construction and Building Materials, vol. 134, pp. 424-432.
7. Alam, MS & Hussein, A (2017), “Relationship between the shear capacityand the flexural cracking load of FRP reinforced concrete
beams” , Construction and Building Materials, vol. 154, pp. 819-828
8. Kim Hung Mo, Johnson Alengaram, U & Mohd Zamin Jumaat 2016, “Structural performance of reinforced geopolymer concrete
members: A review, Construction and Building Materials”, vol. 120, pp. 251-264.
9. Albitar, M, Mohamed Ali, MS & Visintin, P 2017, “Experimental study on fly ash and lead smelter slag-based Geopolymer
Concrete columns”, Construction and Building Materials, vol. 141, pp. 104-112.
10. Thangaraj Sathanandam, Paul Awoyera, O, Venkudusamy Vijayan,& Karupannan Sathishkumar 2017, “Low carbon building:
Experimental insight on the use of fly ash and glass fibre for making geopolymer concrete”, Sustainable Environme nt Research,
vol. 27, no. 3, pp. 146-153.
11. Kolli Ramujee & PothaRaju, M 2017, “Mechanical properties of geopolymer concrete composites, Materials Today:
Proceedings”, vol. 4, no. 2, pp. 2937-2945.
12. B.Vijaya Rangan, (2008) “Mix design and production of flyash based geopolymer concrete, the Indian concrete journal”, Vol 82,pp 7-15

Authors: K Jyothi, R Karthik, B. Anusha, B Annapurna, A Kiran, K Soumya, N Harini

Paper Title: Design and Implementation of RFID Based Attendance System


Abstract: Attendance is taken at various places like schools, colleges for students and login logout time for
employees in industries and offices. The existing system is done on paper and it consumes lots of papers and it is
of manual work. It has less accuracy. In order to reduce the usage of paper RFID based attendance system is
used. It is an automated attendance system where Rfid tags are used. This is the easy way to take the attendance
without any physical contact. In this project we use RFID Reader, RFID Tags, LCD display, which are
interfaced withATMEGA8 Microcontroller. The Rfid tags are given to the students, with their roll numbers as
their tags. When the tag is placed near the reader, the data is transferred to reader due to the radio frequencies.
Reader then transfers data to the microcontroller. Microcontroller checks for the data continuously, if any data is
received, microcontroller compares the data in data base. It eliminates the duplicate entry of data and reduces
errors in time and entries.

Keyword : RFID, Attendance based system, LCD


144.
References:
1. Raj Kumar Mistri, “RFID Based Attendance System”, Volume 6, IJRASET, (2018). 853-855
2. Snehal V. Baviskar, “Review of RFID Based Attendance System”, IJARIIE, Vol-3, pp. 116 to 123, (2017).
3. R Karthik, K Jyothi, “Novel Design of Full Adders using QCA Approach”, International Journal of Advanced Trends in Computer
Science and Engineering, Vol. 8, No. 3, pp. 501-506, (2019).
4. K Jyothi, R Karthik, “Cloud Connectivity for Embedded Systems”, International Journal of Advanced Trends in Computer Science and
Engineering, Vol. 8, No. 3, pp. 731-733, (2019).
5. K Jyothi, R Karthik, “Design and Implementation of Vehicle Over Speed Warning System”, International Journal of Recent
Technology and Engineering, Vol. 7, Issue 5, pp. 266-268, (2019).
6. Madhuri Baswa, R Karthik, P B Natarajan, K Jyothi, B Annapurna, “Patient Health Management System using e -Health Monitoring
Architecture”, IEEE International Conference on Intelligent Sustainable Systems 2017, Paladam, December 2017.
7. K Jyothi, Thottempudi Pardhu, R Karthik, T S Arulananth, “Design Methodology to check the Quality of the Image in a Mobile
Environment – State of the Art”, IEEE International Conference on Intelligent Sustainable Systems 2017, Paladam, December 2017.
8. P Haribabu, Sankit R Kassa, J Nagaraju, R Karthik, N Shirisha, M Anila, “Implementation of an Smart Waste Management system
using IoT”, IEEE International Conference on Intelligent Sustainable Systems 2017, Paladam, December 2017.
9. R Karthik, Dharma Reddy Tetali, Susmitha Valli Gogula, G Manisha, “Enhancement of Disciples Cognition levels using Bloom's
Taxonomy in Data Mining”, Journal of Advanced Research in Dynamical and Control Systems, Vol. 3S, pp. 1225-1237, (2018).
10. R Karthik, T Dharma Reddy, K H Vijaya Kumari, Susmitha Valli Gogula, “Design And Development Of Intelligent Programmed Tool
For Medical Diagnosis”, International Journal of Pharmaceutical Research, Vol. 10, Issue 2, (2018).

Authors: Anulekha Dey, Malika Sharma


Influence of Structured Aquatic Training Program on Endurance and Tone of Children with
Paper Title:
145. Cerebral palsy
Abstract: This study is pursued to find the effectiveness of Structured Aquatic Training Program for children
with Cerebral Palsy. Sensory profile was used to assess the effectiveness of endurance and tone, of14 Children 856-861
with CP average of age nine years, purposively selected from Asha AWWA school at Delhi, India. Participants
were divided into Experimental and Control groups. Result of Two Way ANOVA reflects positive accelerated
transformation only in experimental group, showing moderate to considerable benefits through the 9 weeks
training program. In addition, individualized scale of improvement was also studied, which resulted into minor
to major enhancement of endurance and tone among all the experimental group participants. Hence a prolonged
Structured Aquatic Training Program (intervention) is off paramount to get the best results. These findings also
enhance the preceding research work based on aquatic intervention.

Keyword : Cerebral palsy, structured aquatic training program.


References:
1. Aleksandrovic, M. J. (2016). The effects of aquatic activities on physical fitness and aquatic skills in children with autism spectrum
disorders: A systematic review. Facta Universitatis, Series: Physical Education and.
2. Allen-Collinson, E. A. (2016). Women’s embodied experiences of recreational aquatic activity with pre-school children. In ‘just a
swimmer’ to a ‘swimming mother’ (pp. 35(2), 141-156). Leisure studies.
3. Anttila H, A.-R. I. (2008). Effectiveness of physical therapy interventions for children with cerebral palsy: A systematic review. BMC
Pediatr, 8:14 doi:10.1186/1471-2431-8-14.
4. Bax M, G. M. (2005). Proposed definition and classification of cerebral palsy. Dev Med Child Neurol, 47(8): 571-576.
5. Benda, D. H. (2015). Acupuncture. Retrieved from No medicine and no side effect: http://acupuncture.co.in/
6. Čoh M, J.-G. D. ( 2004). Motor learning in sport. . Facta Univ Phys Educ Sport, 2(1).
7. Darrah, M. K. (2005). Aquatic exercise for children with cerebral palsy. Developmental Medicine and Child Neurology, vol. 47, no. 12,
pp. 838–842. dey, a. (2019). aquatics. tyshdjas, 2 - 5. dictionary, o. (n.d.).
8. Dubois, M. (may 2011). Aquatic Theory for Children with an Autism Spectrum Disorder: . Occupational Therapists perspectives, 1 -
49.
9. Dunn, W. (1999). sensory profile . User Manual. Green Vally, Bloomington, Missouri-Kansas, American : NSC Pearson.
10. Faigenbaum A. D., K. W. (2009). Youth resistance training: updated position statement paper from the national strength and
conditioning association. Journal of Strength and Conditioning Research, vol. 23, no. 5, pp. S60–S79.
11. Fink, R. (Nov 6,2017). The warning signs of Mental illness in children. Parentaing POD.
12. Gerter JW, C. S. (2011). Aquatic exercise programs for children and adolescents with cerebral palsy: what wedo know and where do
we go? pubmed, 10.1155/2011/712165.
13. GorterJ.W., S. J. (2011). Aquatic Exercise Programs for Children and Adolescents with Cerebral Palsy: What Do We Know and Where
Do We Go. International Journal of Pediatrics, 7.
14. Haak Peterson, L. M. (2009). Cerebral palsy and aging. Developmental Medicine & Child Neurology, October.
15. Hall, j. G. (2013). aquatic strategies and techniques and their benefit on children with autism. election theses and dissertations, 6.
16. Hall, J. J. (2013). AQUATIC STRATIGES AND TECNIQUES AND THEIR BENEFITS ON THE CHILDREN WITH AUTISM.
UNI scholar work.
17. Hillary A. Reinhold, M. P. (2014). Nervous system. In Acute care Handbook for Physical Therapists (p. Edition 4).
https://www.sciencedirect.com/topics/medicine-and-dentistry/muscle-tone.
18. Iliana. (2013, February 23). The CP Dairy. Retrieved from https://www.thecpdiary.com/health-and-wellbeing/sensory-problems-cp
19. İlker Yılmaz, N. E. (2009). The Effects of Water Exercises and Swimming on Physical Fitness of Children with Mental Retardation.
20. Ki-Hyeon Kim, B.-A. L.-J. ( 2018). effect of aquatic exercise on health-related physical fitness, blood fat, and immune functions of
children with disabilities. Journal of Exercise Rehabilitation, 14(2): 289-293.
21. kumar, l. (2019). wecapable. Retrieved 2011, from Disable population in india: https://wecapable.com/disabled-population-india-data/
22. Lidija Dimitrijevic, M. A. (2012 ). the effect of Aquatic Intervention on gross motor function and aquatic skill in children with cerebral
palsy. journal of human kinetics, 32: 167 - 174.
23. Lidija Dimitrijević, M. A. (2012). The Effect of Aquatic Intervention on the Gross Motor Function. Journal of Human Kinetics,
32/2012, 167-174.
24. M Peterson, P. Z. (2015). Greater adipose tissue distribution and diminished spinal musculoskeletal density in adults with ce rebral
palsy. ArchPhys Med Rehabil., 96,1828–1833.
25. M. Kelly and J.Darrah. (2005). Aquatic exercise for children with cerebral palsy. Developmental Medicine and Child Neurology, vol.
47, no. 12, pp. 838–842.
26. Marandi SM, N. V. (2013). A COMPARISION OF 12 WEEKS OF PILATES AND AQUATIC TRAINING ON THE DYNAMIC
BALANCE OF WOMEN WITH MULTITPLE SCLEROSIS. Int J Prev Medical, 110-7.
27. Maria A. Fragala Pinkham, S. M. (August 2011). Group swimming and aquatic exercise programme for children with Autism Spectru m
Disorders: A pilot study. Developmental Neurorehabilitation, 14(4): 230-241.
28. MD Peterson, H. H. (2012). Predictors of cardiometabolic risk among adults with cerebral palsy. Arch Phys Med Rehabil, 93:816–821.
29. MN Eek, R. T. (2011). Muscle strength and kinetic gait pattern in children with bilateral spastic CP. Gait Posture, 33:333–337.
30. NIH. (2017). Cerebral Palsy: Overview. National Institutes of Health.
31. NINDS. (2013, July). Cerebral Palsy: Hope Through Research. Retrieved from National Institute of Neurological Disorders and Stroke
and National Institutes of Health: https://www.ninds.nih.gov/Disorders/Patient-Caregiver-Education/Hope-Through-
Research/Cerebral-Palsy-Hope-Through-Research
32. O. VerschuAdaen, L. ,. (2011). , “Muscle strengthening in children and adolescents with spastic cerebral palsy: considerations for
future resistance training protocols. Physical Therapy, vol. 91, no. 7, p 1130 - 1139. oxford dictionary. (n.d.).
33. pan, c. y. ( 2019). Effects of water exercise swimming program on aquatic skills and social behaviors in children with autism spectrum
disorders. the national autisum socity, Feb 2.
34. Rosenbaum P., P. N. (2007). A report: the definition and classification of cerebral palsy April 2006. Developmental Medicine and
Child Neurology, vol. 109, pp. 8–14.
35. SLCarlon, N. T. (2013). Differences in habitual physical activity levels of young people with cerebral palsy and their typically
developing peers: a systematic review. Disabil Rehabil, 35:647–655.
36. Sultana, I. (2018, March 9). Daily Sun. Retrieved from Sensory Integration Difficulties in Children with Cerebral Palsy:
https://www.daily-sun.com/arcprint/details/293956/Sensory-Integration-Difficulties-in-Children-with-Cerebral-Palsy/2018-03-09
37. WB Strong, R. M. (2005). Evidence based physical activity for school-age youth. J Pediatric, 146:732–737.
38. Weaver, J. A. (2013). Effect of a Cardio Kickboxing Program on Balance, Muscular sterength, Muscular endurance, Flexibility and
Mood in Adultd with Developmental Disability. Reasearch Gate.

Authors: Peter Oyekola, Aezeden Mohamed, John Pumwa

Paper Title: Robotic Model for Unmanned Crack and Corrosion Inspection
146.
Abstract: After prolonged usage of materials, the formation of cracks and corrosion initiates due to stress,
loading condition, the environment of operation, etc. and this affects the structural integrity of structures. 862-867
Periodic inspection of structures is usually planned, especially in industries where the impact of failure could be
devastating, such as oil and gas pipelines, storage tanks, vessels, and airplanes, etc. which are just a few amongst
others. This inspection is often aimed at detecting cracks and corrosion of internal and external components
using several forms of non-destructive testing mechanism usually performed by a specialist at a high rate.
To reduce the cost of inspection as well as downtime due to inspections and maintenance, deployments of
mobile robots with fault tracking and identification purpose are steadily increasing. This paper, therefore, details
the implementation of an image processing technique using MATLAB to identify defects of structural elements.

Keyword : Crack, Corrosion, Image Processing, Inspection, MATLAB, Robot.


References:
1. G. A. Gratsos, H. N. Psaraftis, and P. Zachariadis, “Life cycle cost of maintaining the effectiveness of a ship’s structure a nd
environmental impact of ship design parameters: An update,” in RINA, Royal Institution of Naval Architects - International Conference
on Design and Operation of Bulk Carriers 2009 - Papers, 2009.
2. P. R. Roberge, Corrosion Inspection and Monitoring. 2006.
3. Corrosion: Fundamentals, Testing, and Protection. 2018.
4. L. Liu, E. Tan, Y. Zhen, X. J. Yin, and Z. Q. Cai, “AI-facilitated coating corrosion assessment system for productivity enhancement,” in
Proceedings of the 13th IEEE Conference on Industrial Electronics and Applications, ICIEA 2018, 2018.
5. D. J. Atha and M. R. Jahanshahi, “Evaluation of deep learning approaches based on convolutional neural networks for corrosion
detection,” Struct. Heal. Monit., 2018.
6. V. Bondada, D. K. Pratihar, and C. S. Kumar, “Detection and quantitative assessment of corrosion on pipelines through image a nalysis,”
in Procedia Computer Science, 2018.
7. P. A. Schweitzer, Fundamentals of Corrosion-Mechanisms, Causes, and Preventative Methods. 2013.
8. V. Sharma and T. Thind, “Techniques for Detection of Rusting of Metals using Image Processing : A Survey,” Int. J. Emerg. Sci. Eng.,
2013.
9. D. Itzhak, I. Dinstein, and T. Zilberberg, “Pitting corrosion evaluation by computer image processing,” Corros. Sci., 1981.
10. E. N. Codaro, R. Z. Nakazato, A. L. Horovistiz, L. M. F. Ribeiro, R. B. Ribeiro, and L. R. O. Hein, “An image processing meth od for
morphology characterization and pitting corrosion evaluation,” Mater. Sci. Eng. A, 2002.
11. K. Y. Choi and S. S. Kim, “Morphological analysis and classification of types of surface corrosion damage by digital image
processing,” Corros. Sci., 2005.
12. F. N. S. Medeiros, G. L. B. Ramalho, M. P. Bento, and L. C. L. Medeiros, “On the evaluation of texture and color features for
nondestructive corrosion detection,” EURASIP J. Adv. Signal Process., 2010.
13. H. P. Castilho, J. R. C. Pinto, and A. L. Serafim, “NN automated defect detection based on optimized thresholding,” in Lecture Notes in
Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2006.
14. A. Kumar and H. C. Shen, “Texture inspection for defects using neural networks and support vector machines,” in IEEE International
Conference on Image Processing, 2002.
15. X. Zhang, R. Liang, Y. Ding, J. Chen, D. Duan, and G. Zong, “The system of copper strips surface defects inspection based on
intelligent fusion,” in Proceedings of the IEEE International Conference on Automation and Logistics, ICAL 2008, 2008.
16. J. L. Sobral, “Optimised filters for texture defect detection,” in Proceedings - International Conference on Image Processing, ICIP, 2005.
17. P. Subirats, J. Dumoulin, V. Legeay, and D. Barba, “Automation of pavement surface crack detection using the continuous wavelet
transform,” in Proceedings - International Conference on Image Processing, ICIP, 2006.
18. H. Zhang, Y. He, B. Gao, G. Y. Tian, L. Xu, and R. Wu, “Evaluation of Atmospheric Corrosion on Coated Steel Using K-Band Sweep
Frequency Microwave Imaging,” IEEE Sens. J., 2016.
19. L. Tao, S. Song, X. Zhang, Z. Zhang, and F. Lu, “Image analysis of atmospheric corrosion of field exposure high strength alum inium
alloys,” Appl. Surf. Sci., 2008.
20. L. Liu and G. Meng, “Crack detection in supported beams based on neural network and support vector machine,” in Lecture Notes in
Computer Science, 2005.
21. T. Yamaguchi and S. Hashimoto, “Automated crack detection for concrete surface image using percolation model and edge
information,” in IECON Proceedings (Industrial Electronics Conference), 2006.
22. S. Sorncharean and S. Phiphobmongkol, “Crack detection on asphalt surface image using enhanced grid cell analysis,” in Proceedings -
4th IEEE International Symposium on Electronic Design, Test and Applications, DELTA 2008, 2008.
23. M. Sharifzadeh, S. Alirezaee, R. Amirfattahi, and S. Sadri, “Detection of steel defect using the image processing algorithms,” in IEEE
INMIC 2008: 12th IEEE International Multitopic Conference - Conference Proceedings, 2008.
24. S. Ghanta, T. Karp, and S. Lee, “Wavelet domain detection of rust in steel bridge images,” in ICASSP, IEEE International Conference
on Acoustics, Speech and Signal Processing - Proceedings, 2011.
25. E. Protopapadakis, A. Voulodimos, A. Doulamis, N. Doulamis, and T. Stathaki, “Automatic crack detection for tunnel inspection using
deep learning and heuristic image post-processing,” Appl. Intell., 2019.

Authors: M. Sundarrajan, A.E. Narayanan

Paper Title: An Authentication Scheme for an IoT Environment using Advanced Multiple Encryption System
Abstract: Internet of Things (IoT) has become one of the most important fields of research as it plays a vital
role in performing an assigned task with various smart devices. These connected devices work together to
achieve a common goal. Numerous researchers have been working in various sectors of IoT for obtaining a
betterment in the entire function of an IoT environment. Securing the data being transmitted or stored in these
smart devices in one of the major fields of research. Some of the security challenges faced in an IoT
environment are in the areas of user authentication, user privacy, access control, information confidentiality,
147. trust, mobile security and policy enforcement. To overcome all these challenges. In this paper, we have proposed
a system called AMES (Advanced Multiple Encryption System) which also secures the overall communication
868-874
of the network. The paper briefs an overview of an IoT environment, consisting of some hackers where the user
connection with the controller is blocked without the presence of integrity and confidentiality. The paper also
discusses the various security benefits of RSA and SHA. The proposed AMES system is based on Hardy Wall
Algorithm and MQTT protocol. The differentiation of the proposed protocol and HTTP protocol is stated clearly
The experimental results are obtained for the proposed authentication scheme using NS3 simulator by showing
the comparison between existing hybrid security system with our proposed authentication system. The results
also state that the designed AMES authentication system using MQTT protocol can minimize the level of
security threats and other complications in transmission of the data in IoT environment.
Keyword : Advanced multiple encryption System, MQTT, Internet of Things, Authentication, Security
References:
1. Alcaraz, C. (2019). Security and Privacy Trends in the Industrial Internet of Things. Springer.
2. Zhang, J., Rajendran, S., Sun, Z., Woods, R., & Hanzo, L. (2019). Physical Layer Security for the Internet of Things: Authentication
and Key Generation. IEEE Wireless Communications.
3. Jan, M. A., Khan, F., Alam, M., & Usman, M. (2019). A payload-based mutual authentication scheme for Internet of Things. Future
Generation Computer Systems, 92, 1028-1039.
4. Rivera, D., García, A., Martín-Ruiz, M. L., Alarcos, B., Velasco, J. R., & Oliva, A. G. (2019). Secure Communications and Protected
Data for a Internet of Things Smart Toy Platform. IEEE Internet of Things Journal, 6(2), 3785-3795.
5. Malik, M., Dutta, M., & Granjal, J. (2019). A Survey of Key Bootstrapping Protocols Based on Public Key Cryptography in the
Internet of Things. IEEE Access, 7, 27443-27464.
6. Zeadally, S., Das, A. K., & Sklavos, N. (2019). Cryptographic Technologies and Protocol Standards for Internet of Things. Internet of
Things, 100075.
7. Khattak, H. A., Shah, M. A., Khan, S., Ali, I., & Imran, M. (2019). Perception layer security in Internet of Things. Future Generation
Computer Systems, 100, 144-164.
8. Khari, M., Garg, A. K., Gandomi, A. H., Gupta, R., Patan, R., & Balusamy, B. (2019). Securing Data in Internet of Things (IoT) Using
Cryptography and Steganography Techniques. IEEE Transactions on Systems, Man, and Cybernetics: Systems.
9. Liu, J., Ren, A., Zhang, L., Sun, R., Du, X., & Guizani, M. (2019). A Novel Secure Authentication Scheme for Heterogeneous In ternet
of Thing. arXiv preprint arXiv:1902.03562.
10. Ferrag, M. A., Maglaras, L., & Janicke, H. (2019). Blockchain and its role in the internet of things. In Strategic Innovative Marketing
and Tourism (pp. 1029-1038). Springer, Cham.
11. M. Sundarrajan, & A.E. Narayanan (2019). A Hardy Wall Encrypted System for Securing Iot Device Id
International Journal of Recent Technology and Engineering (IJRTE), Vol 8, 586-590.
12. Elhoseny, M., Shankar, K., Lakshmanaprabu, S. K., Maseleno, A., & Arunkumar, N. (2018). Hybrid optimization with cryptography
encryption for medical image security in Internet of Things. Neural computing and applications, 1-15.
13. Ammar, M., Russello, G., & Crispo, B. (2018). Internet of Things: A survey on the security of IoT frameworks. Journal of Info rmation
Security and Applications, 38, 8-27.
14. Conti, M., Dehghantanha, A., Franke, K., & Watson, S. (2018). Internet of Things security and forensics: Challenges and opportunities.
15. Sfar, A. R., Natalizio, E., Challal, Y., & Chtourou, Z. (2018). A roadmap for security challenges in the Internet of Things. Digital
Communications and Networks, 4(2), 118-137.
16. Cheng, C., Lu, R., Petzoldt, A., & Takagi, T. (2017). Securing the Internet of Things in a quantum world. IEEE Communications
Magazine, 55(2), 116-120.
17. Trappe, W., Howard, R., & Moore, R. S. (2015). Low-energy security: Limits and opportunities in the internet of things. IEEE Security
& Privacy, 13(1), 14-21.
18. He, D., & Zeadally, S. (2014). An analysis of RFID authentication schemes for internet of things in healthcare environment using
elliptic curve cryptography. IEEE internet of things journal, 2(1), 72-83.
19. Lee, J. Y., Lin, W. C., & Huang, Y. H. (2014, May). A lightweight authentication protocol for internet of things. In 2014 International
Symposium on Next-Generation Electronics (ISNE) (pp. 1-2). IEEE.
20. Li, F., & Xiong, P. (2013). Practical secure communication for integrating wireless sensor networks into the internet of things. IEEE
Sensors Journal, 13(10), 3677-3684.
21. Ning, H., Liu, H., & Yang, L. T. (2013). Cyberentity security in the internet of things. Computer, 46(4), 46-53.
22. Vučinić, M., Tourancheau, B., Rousseau, F., Duda, A., Damon, L., & Guizzetti, R. (2015). OSCAR: Object security architecture for the
Internet of Things. Ad Hoc Networks, 32, 3-16.
23. Yaqoob, I., Ahmed, E., ur Rehman, M. H., Ahmed, A. I. A., Al-garadi, M. A., Imran, M., & Guizani, M. (2017). The rise of
ransomware and emerging security challenges in the Internet of Things. Computer Networks, 129, 444-458.
24. Sahraoui, S., & Bilami, A. (2015). Efficient HIP-based approach to ensure lightweight end-to-end security in the internet of things.
Computer Networks, 91, 26-45.
25. Kim, H., Wasicek, A., Mehne, B., & Lee, E. A. (2016, August). A secure network architecture for the internet of things based on local
authorization entities. In 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud) (pp. 114-122).
IEEE.
26. Triantafyllou, A., Sarigiannidis, P., & Lagkas, T. D. (2018). Network protocols, schemes, and mechanisms for internet of thin gs (iot):
Features, open challenges, and trends. Wireless communications and mobile computing, 2018.
27. Hernandez-Ramos, J. L., Pawlowski, M. P., Jara, A. J., Skarmeta, A. F., & Ladid, L. (2015). Toward a lightweight authentication and
authorization framework for smart objects. IEEE Journal on Selected Areas in Communications, 33(4), 690-702.
28. Chaimae, E., & Rahal, R. (2016, May). ECC certificate for authentication in cloud-based RFID. In 2016 2nd International Conference
on Cloud Computing Technologies and Applications (CloudTech) (pp. 200-203). IEEE.
29. Ning, H., Liu, H., & Yang, L. T. (2014). Aggregated-proof based hierarchical authentication scheme for the internet of things. IEEE
Transactions on Parallel and Distributed Systems, 26(3), 657-667.
30. Liu, Z., Huang, X., Hu, Z., Khan, M. K., Seo, H., & Zhou, L. (2016). On emerging family of elliptic curves to secure internet of things:
ECC comes of age. IEEE Transactions on Dependable and Secure Computing, 14(3), 237-248.
31. Kawamoto, Y., Nishiyama, H., Kato, N., Shimizu, Y., Takahara, A., & Jiang, T. (2015). Effectively collecting data for the location-
based authentication in Internet of Things. IEEE Systems Journal, 11(3), 1403-1411.

Authors: Peter Oyekola, Aezeden Mohamed, John Pumwa

Paper Title: Renewable Energy: Dynamic Modelling of a Wind Turbine


Abstract: Recently, much attention has shifted to a renewable source of energy, as depletion of existing
source hovers significantly. The wind turbine has become one of the preferred alternatives of power generation
as it poses less risk as well as its economic and environmental benefits, which has prompted renewed effort in
148. designing the optimum system.
This work details the operation of a horizontal axis wind turbine along with the complexities of various parts, for
example, streamlined transformation, drive train, and generator representation. Additionally, the conditions 875-880
portraying its dynamic conduct were successfully simulated using MATLAB/SIMULINK, which is necessary to
understand its behaviour over specific regions of operations, which differs significantly. The result of this
modelling helps in the development of a comprehensive controlling algorithm to aid the performance of the
system. This project, therefore, entails the design of a suitable wind energy conversion framework used as an
independent, stand-alone energy generator for remote communities in Nigeria. The result of this modelling will
be useful in designing better-performing turbines at a reduced cost to ensure economic viability.

Keyword : MATLAB, Renewable Energy, Simulation, Wind turbine.


References:
1. V. Okolobah and Z. Ismail, “On The Issues , Challenges and Prospects of Electrical Power Sector in Nigeria,” Int. J. Econ. Manag. Soc.
Sci., 2013.
2. G. Boroumandjazi, R. Saidur, B. Rismanchi, and S. Mekhilef, “A review on the relation between the energy and exergy efficienc y
analysis and the technical characteristic of the renewable energy systems,” Renewable and Sustainable Energy Reviews. 2012.
3. “Sustainable Development Goals .:. Sustainable Development Knowledge Platform,” 2015. [Online]. Available:
https://sustainabledevelopment.un.org/?menu=1300. [Accessed: 24-Sep-2019].
4. V. Quaschning, Understanding renewable energy systems. 2014.
5. Jean-Daniel Pitteloud, “Global Statistics 2018 (preliminary) – Wind Energy International Platform,” 2018. [Online]. Available:
https://library.wwindea.org/global-statistics-2018-preliminary/. [Accessed: 24-Sep-2019].
6. Z. R. Shu, Q. S. Li, and P. W. Chan, “Statistical analysis of wind characteristics and wind energy potential in Hong Kong,” Energy
Convers. Manag., 2015.
7. P. Wais, “A review of Weibull functions in wind sector,” Renewable and Sustainable Energy Reviews. 2017.
8. C. Stout et al., “Efficiency Improvement of Vertical Axis Wind Turbines with an Upstream Deflector,” in Energy Procedia, 2017.
9. “Wind Turbine Control Systems,” in Wind Turbine Technology: Fundamental Concepts in Wind Turbine Engineering, Second Edition,
2010.
10. J. Wang, J. Hu, and K. Ma, “Wind speed probability distribution estimation and wind energy assessment,” Renewable and Sustainable
Energy Reviews. 2016.
11. L. M. Fernández, J. R. Saenz, and F. Jurado, “Dynamic models of wind farms with fixed speed wind turbines,” Renew. Energy, 2006.
12. J. F. Herbert-Acero, O. Probst, P. E. Réthoré, G. C. Larsen, and K. K. Castillo-Villar, “A review of methodological approaches for the
design and optimization of wind farms,” Energies. 2014.
13. L. M. Fernández, F. Jurado, and J. R. Saenz, “Aggregated dynamic model for wind farms with doubly fed induction generator wind
turbines,” Renew. Energy, 2008.
14. F. Wu et al., “Transfer function based equivalent modeling method for wind farm,” J. Mod. Power Syst. Clean Energy, 2019.
15. K. Dykes and R. Meadows, “Applications of systems engineering to the research, design, and development of wind energy systems,” in
Wind Power: Systems Engineering Applications and Design Models, 2012.
16. J. D. K. Bishop and G. A. J. Amaratunga, “Evaluation of small wind turbines in distributed arrangement as sustainable wind energy
option for Barbados,” Energy Convers. Manag., 2008.

Authors: Aymen Awad

Paper Title: Utilizing Of Wastewater and Biomass Generated In Jordanian Sewage Treatment Plants
Abstract: This paper aims to produce and transfer data to a decision-maker so as to help within the creation
of correct property sewer water biosolids management and utilization in Jordan. Jordan has around 31
wastewater treatment plants with annual total capacity of 350 Mm3. The deficiency of water demand in the
country could be reduced by treating this quantity of wastewater. Treatment will produce a total amount of
sludge waste around 20000 tons annually. Wastewater sludge could be utilized in different usages such as;
biogas production (methane gas), organic fertilizers, additives in material construction and other applications.
Considering these amounts of reclaimed water and biomass produced, they require an extremely high budget to
operate different equipment to treat wastewater, utilize the sludge and finally to dispose of residual in landfills.
This study will provide and help to adopt best practice technologies (BPT) and related techniques to generate
energy from sludge in different wastewater treatment plants efficiently and economically while taking
environmental impacts into consideration. It is concluded that the high percentage of the energy can be produced
and reused, while the transportation cost and the disposal cost of the unwanted sludge will be reduced. A total
amount of reclaimed water of 240-260 Mm3 may be achieved by 2025, while daily electricity of 57128804 kWh
will be generated from wastewater sludge. Wastewater utilization and management will reduce the
environmental pollutions as well as providing economic value for the waste material as well. The results of
suggested techniques and methodology for utilizing wastewater and sludge in this study will save about
149. 10,683,086 JOD /Year ( 15 million $/Year).

Keyword : Wastewater, Sludge, Biogas, Utilization, Management, Jordan. 881-886

References:
1. Abdel-Khaleq, R., (2007). "Key challenges to ensure environmental security and sustainable development in the OSCE area". Land
degradation, soil contamination, and water management. Prague, 21–23 May 2007.
2. Ahmed Ali Ulimat., (2012) “Wastewater Production, Treatment, and Use in Jordan”. Ministry of Water & Irrigation Water Authority of
Jordan”. Second Regional Workshop ‘Safe Use of Wastewater in Agriculture’, 16-18 May 2012, New Delhi, India.
3. Diane Huybrechts., (2016). ”Best Available Techniques For The Treatment, Use, And Disposal Of Waste Water Treatment Sludge".
diane.huybrechts@vito.be.
4. Fayez A. Abdulla, Amani Alfarra, Hani Abu Qdais, and Ben Sonneveld., (2016). “Evaluation of Wastewater Treatment Plants in Jordan
and Suitability for Reuse". Academia Journal of Environmental Science 4(7): 111-117, July 2016, DOI: 10.15413/ajes.2016.0305, ISSN:
2315-778X, ©2016 Academia Publishing.
5. Gabriela Neata, Razvan Teodorescu, Liviu Dinca, Adrian Basaraba., (2015). “Physico-chemical and microbiological composition of
composts from Bucharest municipal waste “. International Conference, Agriculture for Life, Life for Agriculture, Elsevier Applied
Science- Agriculture and Agricultural Science Procedia 6 ( 2015 ) 486 – 491.
6. Lettinga, G., L.W. Hulshoff-Pol, and G. Zeeman., (1999). “Biological Wastewater Treatment; Part I Anaerobic Wastewater Treatment”.
(Lecture Notes). Wageningen University and Research: Wageningen, The Netherlands.
7. Maha Alqam, Ahmad Jamrah, and Haya Daghlas., (2011). “Utilization of Cement Incorporated with Water Treatment Sludge”. Jordan
Journal of Civil Engineering, Volume 5, No. 2, 2011© 2011 JUST. All Rights Reserved.
8. Metcalf Eddy (1991). Wastewater treatment disposal and reuse 3rd. Ed., McGraw Hill.
9. Ministry of Water and Irrigation, (2016). “National Water Strategy in Jordan 2016-2025”. Ministry of Water and Irrigation, United
Kingdom of Jordan, 2016.
10. Monteiro, S., Vieira, C., Ribeiro, M. and Silva, F., (2006). “Red Ceramic Industrial Products Incorporated with Oily Wastes”.
Construction and Building Materials, 21: 2007-2011.
11. Mufeed I. Batarseh., (2011). “Polynuclear Aromatic Hydrocarbons (PAH) and Heavy Metals in Dry andWet Sludge from As-Samra
Wastewater Treatment Plant, Jordan". Prince Faisal Center for the Dead Sea, Environmental and Energy Research, Department of
Chemistry, Faculty of Science, Mutah University, Karak, Jordan. Soil and Sediment Contamination, 20:535–549, 2011, Taylor & Francis
Group, LLC.
12. Nathalie Bachmann., (2015)” Sustainable biogas production in municipal wastewater treatment plants”. Technical Brochure, Copy right
© 2015 IEA Bioenergy. First electronic edition 2015 - British Library. ISBN 978-1-910154-22-9.
13. Parul Kumar., (2014). “Sludge and Solid Wastes: Treatment and Disposal”. http://www.biologydiscussion.com/waste-
management/solid-wastes treatment. 11021.
14. Qasim, S., Motley, E. and Zhu, G., (2000). Water Works Engineering, Prentice Hall, India.
15. Salam B.A., (1985). “The contribution of the oil palm by-products towards the national energy policy – an economist point of view”. In:
Proceedings of the National Symposium on Oil Palm by- Products for Agro-based Industries, Kuala Lumpur, Malaysia. Bangi: Palm Oil
Research Institute of Malaysia. pp 133-145.
16. Schomaker, A., (2001). “Extra vergistingsstap van zuiveringsslib veelbelovend voor grotere rioolwaterzuiveringen”. 2001, Royal
Haskoning.
17. Townsend, T., Jang, Y., Jain, P. and Tolaymat, T., (2001). “Characterization of Drinking Water Sludge for Beneficial Reuse and
Disposal”. Report Published by State University System of Florida and Florida Center for Solid and Hazardous Waste.
18. T.Z.D. de Mes, A.J.M. Stams, J.H. Reith and G. Zeeman., (2003). “ Methane production by anaerobic digestion of wastewater and solid
wastes “. MES–Chapter 4–pages58-102.
19. Valentin Feodorov., (2016). “Modern technologies of treatment and stabilization for sewage sludge from water treatment plants “. 5th
international conference “Agriculture for Life, Life for Agriculture “. Elsevier Applied Science - Agriculture and Agricultural Science
Procedia 10 (2016) 417 – 430.
20. William W. Nazaroff and Lisa Alvarez-Cohen, (2001). “Environmental engineering science”. New York: John Wiley & Sons, Inc.,
[2001].
21. Yasser K. Nazzal, Mohammed Mansour, Mohammad Al Najjar, and Peter McCormick., (2000). “Wastewater Reuse Law and Standards
in the Kingdom Of Jordan”. The Ministry Of Water and Irrigation, Amman, Jordan, March 2000.
22. Youichi Koga, Hiroshi Oonuki, Takeshi Amari, Yuuki Endo, Kazuaki Kakurata and Kimitoshi Ose. (2007). “Biomass Solid Fuel
Production from Sewage Sludge with Pyrolysis and Co-Firing in Coal Power Plant”. Mitsubishi Heavy Industries, Ltd. Technical
Review Vol. 44 No. 2 (Jul. 2007).
23. Yucel, D., Yucel, C., Aksakal, E., Barik, K., Khosa, M., Aziz, I., and Islam, K., (2015) “Impacts of Biosolids Application on Soil
Quality under Alternate Year No-Till Corn-Soybean Rotation”. Water, Air & Soil Pollut., 226, 1-11.

Authors: C. Karthika Pragadeeswari, G.Yamuna, G. Yasmin Beham

Paper Title: A Robust Algorithm for Real Time Tracking With Optical Flow
Abstract: Object tracking is a troublesome undertaking and significant extent in data processor perception
and image handling community. Some of the applications are protection surveillance, traffic monitoring on
roads, offense detection and medical imaging. In this paper a recent technique for tracking of moving object is
intended. Optical flow information authorizes us to know the displacement and speed of objects personate in a
scene. Apply optical flow to the image gives flow vectors of the points to distinguishing the moving aspects.
Optical flow is accomplished by Lucas canade algorithm. This algorithm is superior to other algorithms. The
outcomes reveals that the intend algorithm is efficient and accurate object tracking method. This paper depicts a
smoothing algorithm to track the moving object of both single and multiple objects in real time. The main issue
of high computational time is greatly reduced in this proposed work.

Keyword : Computer Vision, Lucas Canade Algorithm, Object Tracking Optical Flow Technique.
References:
1. Amandeep, Er. Monica Goyal, a Review: "Moving Object Detection Techniques", a Monthly Journal of Computer Science and
Information Technology IJCSMC, vol. 4, Issue. 9, September 2015,pp. .345 – 349.
2. N. Prabhakar, V. Vaithiyanathan, Akshaya Prakash Sharma, Anurag Singh and Pulkit Singhal, "Object Tracking Using Frame
Differencing and Template Matching," Research Journal of Applied Sciences, Engineering and Technology vol. 4 Issue. 24, 2012,pp.
5497-5501.
150. 3. Massimo Piccardi, “Background subtraction techniques: a review,” in Proceedings of the IEEE International Conference on Systems,
Man and Cybernetics (SMC ’04), October 2004,pp. 3099–3104.
4. B.K.P.Horn and B. G. Schunck, ”Determining optical flow”,.Artificial Intelligence, vol. 17, Issue. 1-3, 1981,pp. 185-203 .
887-892
5. Bors A G,Pitas I “Prediction and tracking of moving objects in image sequences” IEEE Transactions on Image Processing, vol.9,Issue.
8, 2000,pp. 1441-1445.
6. Aslani, Sepehr, and Homayoun Mahdavi-Nasab. ”Optical flow based moving object detection and tracking for traffic surveillance”
International Journal of Electrical, Electronics, Communication, Energy Science and Engineering vol.7, Issue.9, 2013, pp. 789-793.
7. Muhammad Kamal Hossen and Sabrina Hoque Tuli," A Surveillance System Based on Motion Detection and Motion Estimation
using Optical Flow"5th International Conference on Informatics, Electronics and Vision (ICIEV) on IEEE ,2016.
8. Jaiganes Kanawathi, Siti Salasiah Mokri, Norazlin Ibrahim,Aini Hussain, Mohd Marzuki Mustafa." Motion Detection Using Horn
Schunck Algorithm and Implementation" International Conference on Electrical Engineering and Informatics on IEEE ,2009.
9. Kale, Kiran, Sushant Pawar, and Pravin Dhulekar. ”Moving object tracking using optical flow and motion vector estimation.”
Reliability, Infocom Technologies and Optimization (ICRITO)(Trends and Future Directions), 2015 4th International Conference on
IEEE, 2015.
10. J. L. Barron, D.J. Fleetand S.S. Beauchemin, “Performance of Optical Flow Techniques” IJCV 12:1, 1994,pp 43-77.
11. M.Bala Krishna, G.V.S.Praneeth, Ch.Soundarya, P.Himabindhu," Segmentation of Vehicles Based on Motion Estimation"International
Journal of Creative Research Thoughts(IJCRT),2018,pp 461-468.
12. Neha S. Sakure, Rushikesh T. Bankar, Suresh S. Salankar" Comparative Analysis of Face Tracking" International Journal of
Advanced Research in Electronics and Communication Engineering (IJARECE),vol5,issue 3,march 2016.
13. Andrey A. Mukhtarov, Sergey V. Porshnev, Vasiliy V. Zyuzin, Anastasia A. Labutina, and Anastasia O. Bobkova ," The Usage of
Optical Flow Algorithm to the Problem of Recovery Contour of the Left Ventricle of the Human Heart on the Ultrasound Image Data",
on IEEE ,march 2017.
14. C.Karthika Pragadeeswari and G. Yamuna “Improved Optical Flow for Better Object Tracking” in the proceedings of the International
Conference on Advanced Concepts in Computational Engineering and Science (ICACCES 19), Bharathiyar College of Engineering
and Technology, Karaikal, 15th March 2019.

Authors: A. Leo, V. Bastin Jerome


The Grasp and Consumer Insight Apropos Gauge of Online Sales Promotion Techniques Via Online
Paper Title:
Shopping
Abstract: In Tiruchirappalli has its paved a way for many shoppers to access higher online shopping due to
various factors such as convivence includes the huge benefits, best prices, different variety, possibly send the
gifts more easily, easy price comparison, no crowds and no pressures. The present study examines the stress
driven compulsive online spending among the inbound shoppers. In online shopping compulsive buyers have
high levels of both positive and negative impacts. The existing research in the area of compulsive spending
shows that most of the time it affects the buyers that may lead to serious problems. It aims to make a study on
perception and spread awareness regarding online sales promotion techniques. In order to sense the retort of
rural people through offline advertisements with regard of sales promotion techniques. To measure the grasp and
insight of online shoppers. To recognize the contend of promotion techniques. To estimate the outreach of social
media advertisement.
151.
Keyword : awareness, e-commerce, online shopping, perception.
893-899
References:
1. Andrew, J. R and Vanitha, S. (2004). A typology of online shoppers based on shopping motivations, Journal of Business Research Vol.
57 PP. 748–757
2. Amit, B. Sanjoy, Ghose. (2004). A latent class segmentation analysis of e-shoppers, Journal of Business Research. Vol.57, PP.758-767.
3. Andrew, J. R & Vanitha, S. (2004). A typology of online shoppers based on shopping motivations. Journal of Business Research. Vol.
57 (2004) PP.748– 757
4. Creswell, J. (1994) Research design: Qualitative and quantitative approaches, London Press
5. K. Gautam, B. (2004). The impacts of quickness, price, payment risk, and delivery issues on on-line shopping, Journal of Socio-
Economics, Vol.33, PP.241–251.
6. 37 Eccromania (2010), “Consumers: Online shopping increasingly popular in the EU, but development "held back" by barriers to cross
border trade”
7. Forsythe, S. M. and Shi, B. (2003). Consumer patronage and risk perceptions in internet shopping.
8. Goldsmith, R. E. & Bridges, E. (2000). Using attitudes to predict online buying behavior.
9. Icek, A. (1991). The Theory of Planned Behavior: Organizational behavior and human resource processes. J., Rogers, J.D. (1998). s
10. Kent, R. (2007) Marketing research approaches, methods and applications in Europe, Italy:

Authors: M. Rahman, P. Sarma, M.P. Bhuyan, A. Das, D. Dutta

Paper Title: Image To Speech Synthesizer with Reference to Assamese Numerals


Abstract: In this research work we have shown the methodology for converting printed Assamese numerals
to its corresponding utterance. We have implemented as an initial effort which will read only four digit
numerals. We are using Image processing techniques to convert an image of Assamese numerals into
textual/digital form. In the second phase the numerals will be pronounced as a number by Google speaker. In
this system, images are stored in a dataset and then inputted data is compared with the dataset image using
template matching technique. After recognition of the text output will be displayed as a speech waveform. This
work has many applications in today’s digital world.

Keyword : OCR, Image processing, Template matching, Synthesizer, Segmentation, Recognition.


References:
1. “Assamese Language,” 2nd October 2019, Accessed On 3 rd October 2019

Available At Https://En.Wikipedia.Org/Wiki/Assamese_Language.
2. “Nefamese,” 9th September 2019, Accessed On 3 rd October 2019 Available At Https://En.Wikipedia.Org/Wiki/Nefamese.
3. “Nagamese Creole,” 2 nd September 2019, Accessed On 3 rd October 2019 Available At
152. Https://En.Wikipedia.Org/Wiki/Nagamese_Creole.
4. “Assamese Alphabet,” 24 th September 2019, Accessed On 3 rd October 2019 Available At
Https://En.Wikipedia.Org/Wiki/Assamese_Alphabet. 900-905
5. J. Kalita, D. Talukdar, M. Bora, And M. Barua, “Assam Portal: Assamese Alphabet,” 1997, Accessed On 3 rd October Available At
Https://Assam.Org/Node/2330.
6. M. P. Bhuyan And S.K. Sarma, “An N-Gram Based Model For Predicting Of Word-Formation In Assamese Language,” Journal Of
Information And Optimization Sciences, 40:2, 427-440, 2019, DOI: 10.1080/02522667.2019.1580883.
7. “Assamese Numbers (অসমীয়া সংখ্য়া),” Accessed On 4th October 2019 Available At
Https://Www.Omniglot.Com/Language/Numbers/Assamese.Htm
8. P. Sarma, M. Mitra, M.P. Bhuyan, V. Deka, S. Sarmah, And S.K. Sarma, “Automatic Vowel Recognition From Assamese Spoken
Words,” International Journal Of Innovative Technology And Exploring Engineering, Vol. 8, Issue-10, 2019, Pp. 2297-2304.
9. K. Kalaivani, R. Praveena, V. Anjalipriya, And R. Srimeena, “REAL TIME IMPLEMENTATION OF IMAGE RECOGNITION
AND TEXT TO SPEECH CONVERSION,”International Journal Of Advanced Engineering Research And Technology, Vol. 2, Issue 6,
2014, Pp. 171-175.
10. B.B. Chaudhuri And U. Pal, “A COMPLETE PRINTED BANGLA OCR SYSTEM,” Pattern Recognition, Vol. 31, No. 5, 1998, Pp.
531-549.
11. Md. A. Hasnat, M. Rahman Chowdhury, M. Khan, “An Open Source Tesseract Based Optical Character Recognizer For Bangla Script,”
10th International Conference On Document Analysis And Recognition, 2009, Pp. 671-675.
12. S. Vijayarani And A. Sakila, “TEMPLATE MATCHING TECHNIQUE FOR SEARCHING WORDS IN DOCU MENT IMAGES,”
International Journal On Cybernetics & Informatics, Vol. 4, No. 6, 2015, Pp. 25-35.
13. R.V. Adhvaryu, “OPTICAL CHARACTER RECOGNITION USING TEMPLATE MATCHING (ALPHABETS & NUMBERS),”
International Journal Of Computer Science Engineering And Information Technology Research, Vol. 3, Issue 4, 2013, Pp. 227-232.
14. S. Malakar, P. Ghosh, R. Sarkar, N. Das, S. Basu, And M. Nasipuri, “An Improved Offline Handwritten Character Segmentation
Algorithm For Bangla Script,” Proceedings Of The Fifth Indian International Conference On Artificial Intelligence, 2011, Pp.71-90.
15. M.P. Bhuyan And S.K. Sarma, “A Statistical Model For Automatic Error Detection And Correction Of Assamese Words,” International
Journal Of Recent Technology And Engineering, Vol. 8, Issue 2, 2019, Pp. 6111-6116.
16. M.P. Bhuyan And S.K. Sarma, “A Higher-Order N-Gram Model To Enhance Automatic Word Prediction For Assamese Sentences
Containing Ambiguous Words,” International Journal Of Engineering And Advanced Technology, Vol. 8, Issue 6, 2019, Pp. 29 21-2926.
17. M.P. Bhuyan, R. Purkayastha, S.K. Sarma, S. Sarmah, P. Sarma, And V. Deka, “Information Retrieval In Assamese Using Wordnet &
Assamese Wikipedia,” International Journal Of Scientific & Technology Research, Vol. 8, Issue 9, 2019, Pp. 1887-1891.

Authors: Panchagnula Sai Harish, S Sridhar


AN Adaptive Neuro Fuzzy Inference System Control For A Bearingless Induction Motor Based On
Paper Title:
A Disturbance Observer
Abstract: There is some poor performance regarding controlling capacity of the bearing-less induction motor
(BIM) when there are deviations in the parameters, outer disturbances and changes in the loads. So to solve this
issue design of an adaptive exponential sliding-mode (AESM) controller and an observer for extended SM
disturbance for finding system disturbance variables while operating are done. This adaptive exponential control
is explained by combining order one norm and switching function law into regular control strategy. We can
adjust the conjuction speed time adaptively as per variation of the SM switch surface and the system status. The
controller used in this control strategy is Adaptive Neuro-Fuzzy Inference System (ANFIS). The observer used
senses the speed and outer disturbances of the bearing-less induction motor. As feed forward contribution for
system speed, the response of DSMO is utilized. The disturbance in the motor can be reduced by adjusting error
in the speed by this feedback speed. From simulation output it can be seen that proposed system with ANFIS
control strategy has good strength to control disturbances and to find the uncertain disturbances accurately.
153. Hence the controlling capacity of the bearing-less induction motor (BIM) when there are deviations can be
improved by using this proposed system.
906-912
Keyword : Adaptive exponential sliding mode (AESM), Bearing-less Induction Motor (BIM), Disturbance
sliding mode observer (DSMO), Sliding mode (SM)
References:
1. Sun X, Chen L, Yang Z. Overview of bearingless permanent magnet synchronous motors[J]. IEEE Transactions on Industrial
Electronics, 2013.
2. SINERVO A, ARKKIO A. Rotor radial position control and its effect on the total efficiency of a bearingless induction motor with a cage
rotor[J]. IEEE Transactions on Magnetics, 2014.
3. Mobayen S. Chaos synchronization of uncertain chaotic systems using composite nonlinear feedback based integral sliding mode
control[J]. ISA Transactions, 2018.
4. Liu Y, Zhou B, Fang S. Sliding mode control of PMSM based on a novel disturbance observer[J]. Proceedings of the CSEE, 2010.
5. Zhang X, Sun L, Zhao K. Sliding mode control of PMSM based on a novel load torque sliding mode observer[J]. Proceedings of th e
CSEE, 2012.
6. Lu W, Lin H, Han J. Position Sensorless Control of Permanent Magnet Synchronous Machine Using a Disturbance Observer[J].
Proceedings of the CSEE, 2016.

Authors: Manikandan G, Srinath R, Ayush Jaiswal, Akshay Naramshettiwar, Sushant Malik

Paper Title: Fabrication and Analysis of EPDM-Buffing Dust Composite


Abstract: Wastes generated during the tanning process can be categorized as buffing wastes, shaving wastes,
keratin waste (mainly from the nails and hair) and skin trimmings. The main component of all these wastes is
protein.in fact keratin is one type of protein. Leather waste from chrome tanned leather, which is proteinous,
impregnated with chromium, synthetic fat, oil, tanning agents and dye chemicals is one of the difficult tannery
wastes to manage.
In this project, various leather- polymer- EPDM composites have been made and their properties have been
analyzed. polymer-leather composite modified with filler material has showed good performance with high
decomposition temperature, good bonding between the constituents and low density (Hence, low weight). The
strong mechanical phase interaction brought by the chemical bonding with leather interface was confirmed by
FTIR analysis. Thermal Gravimetric Analysis revealed the higher decomposition temperature for the
composites.
154.
Keyword : Composites, EPDM, Glacier, Leather waste 913-919
References:
1. Lorne W. Gold (2004), “Building ships from ice: Habakkuk and after”, Vol.29, Issue No: 4, pp. 373-384.
2. C.M. Bhuvaneswari, S.D.Kakade, V.D. Deuskar, A.B. Dange and Manoj Gupta(2008), “Filled Ethylene-propylene Diene Terpolymer
Elastomer as Thermal Insulator for Case-bonded Solid Rocket Motors”, Defense science journal, Vol. 58, Issue No: 1, pp.94-102
3. S. Swarnalatha , T. Srinivasulu , M. Srimurali , G. Sekaran (2008) , “ Safe disposal of toxic chrome buffing dust generated from
leather industries”, journal of hazardous materials, Vol. 150, Issue :2, pp.290-299
4. K. Dinesh Kumar, B. Kothandaraman (2008), “Modification of (DGEBA) epoxy resin with maleated depolymerised natural rubber”,
eXPRESS Polymer Letters, Vol. 2, pp.302-311
5. Ganjoo, R. K. , Koul, M.N. (2010), “Impact of inter- and intra-annual variation in weather parameters on mass balance and
equilibrium line altitude of Naradu Glacier (Himachal Pradesh), NW Himalaya, India”, Climatic Change, Vol. 99, Issue No: 1-2, pp.
119-139
6. Belis, Arno Pronk, Kenny Martens, Bert Van Lancker (2015), “Experimental construction of a temporary church in rein forced ice”,
advances in structural engineering and mechanics, pp. 34-34
7. Ghulam Rasul, Qin Dahe, Q. Z. Chaudhry (2008),” Global Warming and melting Glaciers along southern slopes of hkh ranges”,
Pakistan Journal of Meteorology, Vol. 5, Issue No. 9, pp.10-15
Authors: Gagana B E, S Usha, Rajesh K S
Design and Implementation of Secure Communication using Elliptic Curve Cryptograph between
Paper Title:
Wireless Sensor Nodes
Abstract: Wireless Sensor Networks is an emerging trend and has become gradually popular across wide
range. A key distributional protocol is intended to safely provide authentic motes with secret keys system using
Elliptic Curve Cryptography functions. The convention is a variation of the Diffie_Hellman convention utilizing
Elliptic Curve Cryptography. It’s agreement of a key convention that permits pair of gatherings, both having a
elliptic open and closed key, to build up a mutual secret key over an uncertain channel. This shared secret key
may be either utilized as key or used to determine another key which would then be able to be utilized to
subsequent correspondences utilizing a cipher of symmetric key. The use of advanced encryption standard for
the encrypt and decrypt of the data also ensures that security is never flawed. Therefore Elliptic curve
cryptograph is a best candidate for providing secure communication between Wireless Sensor Networks.

Keyword : Advance encrypt algorithm (AES), cipher text key, Diffie_Hellman convention, elliptic curve
cryptographic (ECC), Wireless or remote sensor network (WSN).
References:
1. NejmeddineAlimi, YounesLahbib, Mohsen Machhout And RachedTourkiOn Elliptic Curve Cryptography Implementations And
Evaluation 2016 2nd International Conference on Advanced Technologies for Signal and Image Processing.
2. NajmusSaqib and UmmerIqbal Security in Wireless Sensor Networks using ECC 2016 IEEE International Conference on Advances in
Computer Applications.
3. J. Louw, G. Niezen , T.D. Ramotsoela and A.M. Abu-Mahfouz A Key Distribution Scheme using Elliptic Curve Cryptography in
Wireless Sensor Networks 2016 IEEE.
155. 4. AsmaChaouch, BelgacemBouallegue and OuniBouraoui Software Application for Simulation-Based AES, RSA and Elliptic-Curve
Algorithms 2nd International Conference on Advanced Technologies for Signal and Image Processing 2016.
5. Darrel Hankerson, Scott Vanstone ,AlfredMenezes, Guide To Elliptic Curve Cryptography, ©Springer-Verlag New York, Inc 2004 920-925
6. SudipMisra, Isaac Zhang and Subhas Chandra Misra Guide to wireless sensor networks, ©Springer-Verlag New York, Inc 2009
7. Joan Daemen, Vincent Rijmen, The Design Of Rijndael- Advanced Encryption Standard, ©Springer - Verlag Berlin Heidelberg 2002
8. Ian F. Blake, GadielSeroussi, and Nigel P. Elliptic Curves in Cryptography .Smart London Mathematical Society Lecture Note Se ries
Cambridge University Press, Cambridge, 1999
9. Raghavendra CS, Krishna M, Sivalingam, TaiebZnati. Wireless Sensor Networks ©Springer US 2004
10. On Elliptic Curve Cryptography implementations and evaluation: http://ieeexplore.ieee.org/document/7523058/
11. A key distribution scheme using elliptic curve cryptography in wireless sensor http://ieeexplore.ieee.org/document/7819342/
12. EllipticCurveCryptography: https://en.wikipedia.org/wiki/Elliptic_curve_cryptography
13. Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks: https://link.springer.com/chapter/10.1007/11964254_3/
14. EllipticCurveDiffie-Hellman: https://en.wikipedia.org/wiki/Elliptic_curve_Diffie%E2%80%93Hellman
15. Results of Asymmetric Performance testing (RSA) https://people.cs.uct.ac.za/~pbrittan/privacy_brittan_petzer/results_shelley.html
16. Elliptic curve cryptography https://people.cs.uct.ac.za/~pbrittan/privacy_brittan_petzer/results_shelley.html
17. Design of Secure Group Key Agreement Protocol using Elliptic Curve Cryptography: http://doi.ieeecomputersociety.org/
18. A. Kumar and G.P. Hancke, "Energy Efficient Environment Monitoring System Based on the IEEE 802.15.4 Standard for Low Cost
Requirements.," IEEE Sensors Journal, vol. 14, no. 8, pp. 2557-2566
19. Gura,N., Patel,A., Wander,A.S, Eberle,H. and Chang Shantz,S. “Comparing elliptic curve cryptography and RSA on 8 -bit CPUs”.
Cryptographic Hardware and Embedded Systems, vol. 3156, pp. 119–132. Springer ,2004
20. Levis,P., and Gay.D, TinyOS Programming. Cambridge University Press, 2009
21. Adrian Perrig, John Stankovic, David Wagner ,”Security in wireless sensor networks” Communications of the ACM June 2004 vol
47,no. 6, pp53-57.
22. Gura,N., Patel, A., et .al 2004 ” Comparing Elliptic Curve Cryptography and RSA on 8 bit CPU,” Workshop on cryptographic
hardware and embedded systems.
23. Gura,N., Patel,A., Wander,A.S, Eberle,H. and Chang Shantz,S.,2004 “Comparing elliptic curve cryptography and RSA on 8-bit CPUs”.
Cryptographic Hardware and Embedded Systems, vol. 3156, pp. 119–132. Springer.
24. D. S. Kumar, C. Suneetha, and A. Chandrasekhar, “Encryption of data using elliptic curve over finite fields,” arXiv preprint
arXiv:1202.1895, 2012.

Authors: Varsha , Manju Bala , Manoj Kumar, Neeraj Kumar


Development of QoS optimized routing using Artificial bee colony and TABU-GA with a mobile base
Paper Title:
station in Wireless Sensor Network
Abstract: Routing in Wireless Sensor Networks (WSNs) have been playing an important and progressive role
in different scenarios like the environment and traffic monitoring. In this research paper, extensive contributions
have been explored concerning the routing mechanisms involving WSN. Enhancing the critical attributes like
network lifetime and reliability are prime areas of research in this field. To obtain the desired results,
optimizations have been performed using Swarm Intelligence (SI) based routing mechanism like the Artificial-
Bee Colony (ABC) optimization and TABU-GA routing technique. Although, since the past decade, the Ant-
156. Colony Optimization (ACO) and Particle Swarm Optimization (PSO) have been introduced and applied in this
field, but the ABC and TABU-GA approach is relatively novel and considered a prominent choice as compared
to other methods. However, a lot of scope for further enhancement of the ABC optimization and TABU-GA 926-933
problem. This paper highlights and explains the comparison between RZLEACH (Rendezvous LEACH), ABC
and TABU-GA algorithm based routing mechanisms. The simulation results obtained show that the TABU-GA
have significant result over the ABC and RZLEACH and found 6% improvement when compared with the
RZLEACH approach in terms of Remaining Energy and 9% lesser in case of First node dead (FND) with
comparison to RZLEACH.

Keyword : Wireless sensor network, Artificial Bee Colony, TABU-GA, LEACH, RZLEACH, First node
dead, Packet Delivery Ratio.
References:
1. Bala, V. M., Kumar, M., & Sharma, V. A survey on swarm intelligence techniques.
2. Luo, J., & Hubaux, J. P. (2005, March). Joint mobility and routing for lifetime elongation in wireless sensor networks. In Pr oceedings
IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies. (Vol. 3, pp. 1735-1746). IEEE.
3. Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000, January). Energy-efficient communication protocol for wireless
microsensor networks. In Proceedings of the 33rd annual Hawaii international conference on system sciences(pp. 10-pp). IEEE.
4. Liang, W., Luo, J., & Xu, X. (2010, December). Prolonging network lifetime via a controlled mobile sink in wireless sensor ne tworks.
In 2010 IEEE Global Telecommunications Conference GLOBECOM 2010 (pp. 1-6). IEEE.
5. Liu, B., Brass, P., Dousse, O., Nain, P., & Towsley, D. (2005, May). Mobility improves coverage of sensor networks. In Procee dings of
the 6th ACM international symposium on Mobile ad hoc networking and computing (pp. 300-308). ACM.
6. Gu, Y., Ji, Y., Li, J., & Zhao, B. (2012). ESWC: Efficient scheduling for the mobile sink in wireless sensor networks with delay
constraint. IEEE Transactions on Parallel and Distributed Systems, 24(7), 1310-1320.
7. Konstantopoulos, C., Pantziou, G., Gavalas, D., Mpitziopoulos, A., & Mamalis, B. (2011). A rendezvous-based approach enabling
energy-efficient sensory data collection with mobile sinks. IEEE Transactions on parallel and distributed systems, 23(5), 809-817.
8. Mottaghi, S., and Zahabi, M. R., 2015. Optimizing LEACH clustering algorithm with mobile sink and rendezvous nodes. AEU-
International Journal of Electronics and Communications, 69(2), 507-514.
9. Liu, W., Lu, K., Wang, J., Xing, G., & Huang, L. (2012). Performance analysis of wireless sensor networks w ith mobile sinks. IEEE
Transactions on Vehicular Technology, 61(6), 2777-2788.
10. Xing, G., Wang, T., Xie, Z., & Jia, W. (2007, December). Rendezvous planning in mobility-assisted wireless sensor networks. In 28th
IEEE International Real-Time Systems Symposium (RTSS 2007) (pp. 311-320). IEEE.
11. Kumar, G. S., Vinu, P. M., & Jacob, K. P. (2008, December). Mobility metric based leach-mobile protocol. In 2008 16th International
conference on advanced computing and communications (pp. 248-253). IEEE.
12. Liu, B., Brass, P., Dousse, O., Nain, P., & Towsley, D. (2005, May). Mobility improves coverage of sensor networks. In Proceedings of
the 6th ACM international symposium on Mobile ad hoc networking and computing (pp. 300-308). ACM.
13. Hussain, K., Abdullah, A. H., Awan, K. M., Ahsan, F., & Hussain, A. (2013). Cluster head election schemes for WSN and MANET: a
survey. World Applied Sciences Journal, 23(5), 611-620.
14. Narendran, M., & Prakasam, P. (2017, February). Optimized lowest ID in wireless sensor network using Invasive Wee d Optimization
(IWO)-genetic algorithm (GA). In 2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging
Technologies (ICAMMAET) (pp. 1-6). IEEE.
15. Karaboga, D., Okdem, S., and Ozturk, C., 2012. Cluster based wireless sensor network routing using artificial bee colony algorithm.
Wireless Networks, 18(7), 847-860.
16. Zorzi, M., and Rao, R. R.,2003. Geographic random forwarding (GeRaF) for ad hoc and sensor networks: energy and latency
performance. IEEE transactions on Mobile Computing, 2(4), 349-365.
17. El-Basioni, B. M. M., El-Kader, S. M. A., Eissa, H. S., and Zahra, M. M., 2011. An optimized energy-aware routing protocol for
wireless sensor network. Egyptian Informatics Journal, 12(2), 61-72.
18. Misra, S., and Thomasinous, P. D., 2010. A simple, least-time, and energy-efficient routing protocol with one-level data aggregation for
wireless sensor networks. Journal of systems and software, 83(5), 852-860.
19. Karaboga, D., and Ozturk, C., 2011. A novel clustering approach: Artificial Bee Colony (ABC) algorithm. Applied soft computing,
11(1), 652-657
20. Okdem, S., Karaboga, D., and Ozturk, C., 2011, June. An application of wireless sensor network routing based on artificial be e colony
algorithm. In 2011 IEEE Congress of Evolutionary Computation (CEC) (pp. 326-330). IEEE.
21. Karaboga, D., and Akay, B., 2009. A comparative study of artificial bee colony algorithm. Applied mathematics and computation ,
214(1), 108-132.
22. Nayyar, A., & Singh, R. (2015). A comprehensive review of simulation tools for wireless sensor networks (WSNs). Journal of Wireless
Networking and Communications, 5(1), 19-47.
23. Ali, Q. I. (2012). Simulation framework of wireless sensor network (WSN) using matlab/simulink software. In MATLAB-A
Fundamental Tool for Scientific Computing and Engineering Applications-Volume 2. IntechOpen.
24. Kumar, N., Kumar, A., & Chaudhry, D. (2011). A Novel Approach to use Nano-Sensor in WSN Applications. International Journal of
Computer Applications, 975, 8887.
25. Pandey, A., Kumar, N., & Tripathi, R. C. A Framework to Prevent Mobile Sinks Accessing by Unauthorized Nodes in WSN, Special
issue on MANET, IJCA (USA), pp.-13-17, 2010.
26. Kumar, N., & Khan, R. A. (2017). Emergency Information System Architecture for Disaster Management: Metro City Perspective.
International Journal of Advanced Research in Computer Science, 8(5).
27. Kumar N., Agrawal A., Khan R.A. (2018) Smartphone with Solar Charging Mechanism to Issue Alert During Rainfall Disaster. In:
Panda B., Sharma S., Roy N. (eds) Data Science and Analytics. REDSET 2017. Communications in Computer and Information Science,
vol 799. Springer, Singapore.
28. Kumar, N., Agrawal, A., & Khan, R. A. (2019). Cost estimation of cellularly deployed IoT-enabled network for flood detection. Iran
Journal of Computer Science, 1-12.

Authors: Vasudeva Naidu Pudi, Srinivasa Rao Sura, Prasad Bolla

Paper Title: Performance Analysis of Three-Phase DVR with Modified Switching Band Controller
Abstract: This paper deals with the mitigation of voltage related PQ issues by using three phase neutral
clamped VSI topology is used to realize the DVR and the design of DVR for the selection of suitable interface
inductor, DC capacitor storage series resistance and the capacitance. Here three-phase four wire DVR with
modified switching band controller topology is proposed, which overcome the frequent band violation, poor
controllability and heavy filter currents, and compared to three-phase four wire DVR with conventional filter
157. topology. The compensation capability of the proposed topology is analyzed based on simulation studies and
corresponding results are compared with different switching control strategies. The consequent merits and
demerits switching loss in VSI, ripple in compensated load voltages and error between reference injected 934-941
voltages and actual injected voltages in different switching control strategies are discussed.

Keyword : Dynamic Voltage Restorer (DVR), Neutral Clamped VSI,Switching Band Controller, Synchronous
Reference Theory (SRF) and Power Quality (PQ).
References:
1. M. Bollen, “What is power quality?” Electric Power Systems Research, vol.
2. 66, no. 1, pp. 5–14, Jul. 2003
3. T. S. Key, “Diagnosing power quality-related computer problems,” IEEE
4. Transactions on Industry Aplications, vol. IA-15, no. 4, pp. 381–393, Jul.1979.
5. M. H. J. Bollen, Understanding power quality problems: Voltage sags and
6. interruptions. Piscataway, NJ: IEEE Press, 2002.
7. A. Ghosh and A. Joshi, “The concept and operating rinciples of a mini custom power park,” IEEE Trans. Power Del., vol. 19, no. 4,
pp.1766–1774, Oct. 2004.
8. W. Reid, “Power quality issues-standards and guidelines,” IEEE Transactions on Industry Applications, vol. 32, no. 3, pp. 625–632,
May–Jun. 1996.
9. O. Anaya-Lara and E. Acha, “Modeling and analysis of custom power systems by PSCAD/EMTDC,” IEEE Trans. Power Del., vol. 17,
no. 1,pp. 266–272, Jan. 2002.
10. Ray Arnold “Solutions to Power Quality Problems” power engineering Journal, Volume 15; Issue: 2 April 2001, pp: 65-73.
11. John Stones and Alan Collision “Introduction to Power Quality” power engineering journal, Volume 15; Issue 2, April 2001, pp: 58-
64.
12. Hague, M.H.” Compensation of distribution system voltage sag by DVR and D-STATCOM”, IEEE Porto Power Tech Conference,
Volume: 1, 10th-13th Sept. 2001.
13. P. Rodríguez, J. Pou, J. Bergas, J. I. Candela, R. P. Burgos, and D. Boroyevich, “Decoupled double synchronous reference fram e PLL
for power converters control,” IEEE Trans. Power Electron.
14. Kesler,M.,Ozdemir,E.:‘Synchronous-reference-frame based control method for UPQC under unbalanced and distorted load conditions’,
IEEE Trans.Ind. Electron.,2011,5,(9),pp.3967–3975.
15. Sng,E.K.K.,Choi,S.S.,Vilathgamuwa,D.M.:‘Analysis of series compensation and DC-link voltage controls of atransformer less self-
charging dynamic voltage restorer’, IEEE Trans.Power Deliv., 2004, 19,(3),pp.1511–1518.
16. G. de Almeida Carlos, E. dos Santos, C. Jacobina, and J. Mello, “Dynamicvoltage restorer based on three-phase inverters cascaded
through an open-end winding transformer,” IEEETrans.PowerElectron., vol. 31, no. 1,pp. 188–199, Jan. 2016.
17. P. Kanjiya, B. Singh, A. Chandra, and K. Al-Haddad, “SRF theory
18. re-visited to control self-supported Dynamic Voltage Restorer for unbalanced and nonlinear loads,” IEEETrans.Ind.Appl., vol. 49,
no. 5,
19. pp. 2330–2340, Sep./Oct. 2013.

Authors: G.V.Ashwini, S. Chenthur Pandian, D.Ruth Anita Shirley

Paper Title: Mitigating the Effects of ESD using ESD Capacitor and TVS Diode
Abstract: Electrostatic discharge (ESD) can extremely damage and affect the operation of the electronic
devices which is mainly due to the discharge of static electricity through the human or an object contact to the
electronic devices. Though ESD protection has been made in many ICs internally, it can only sustain a certain
level of voltage surge. To withstand high voltage surge mainly above 4kV, external ESD protection devices such
as ESD capacitor and TVS (Transient Voltage Suppressor) are used for signal integrity considerations. For
automotive application using 12V battery, a circuit model which has the capability to explain the behaviour of
the ESD protection device for 8kV is proposed. Comparison between simulation by LTspiceXVII and calculated
results are shown and also presents the pros and cons of two different approaches. When comparing ESD
capacitor to TVS diode, the result shows 32.8 percentage reduce in voltage, 1 percentage increase in current and
1.43 percentage reduce in power dissipation. In addition to the theoretically calculated capacitor value, other
capacitors are used and its results were presented

Keyword : About four key words or phrases in alphabetical order, separated by commas.
References:
1. T. Yoshida, "A Study on Transmission Line Modeling Method for s
system-level ESD Stress Simulation", Proc. APEMC2015 SS13–1.2, 2015.
158. 2. N. Kimura, T. Yoshida, "A Study on Response Characteristics Modeling
Method for ESD Protection Device by Vector Network Analyzer", Proc. of APEMC2017 WE-PM-4-2, 2017.
3. Takahiro Yoshida, Manabu Endo, “A study on ESD protection
characteristics difference measurement of TVS diodes by VNA”, IEEE Symposium on Electromagnetic Compatibility, Beijing,
942-946
China, 2017.
4. M. Honda, "A Review of EMI Problem Caused by ESD Phenomena",
13th RCJ Reliability Symposium, pp. 183-186, 2003.
5. J.R.Barnes, “Designing Electronic Systems for ESD”, Conformity
Magazine, Vol. 8, pp. 18-27, Feb. 2003.H. Poor, An Introduction to Signal Detection and Estimation. New York: Springer-Verlag,
1985, ch. 4.
6. Ram Chundru, “An Evaluation of TVS Devices for ESD Protection”, IEEE International Symposium on Electromagnetic
Compatibility, Long Beach, CA, USA, pp. 62-67, 2011.
7. Che Hao Chuang, “System-Level ESD Protection for Automotive Electronics by Co-Design of TVS and CAN Transceiver Chips”,
IEEE Transactions on Device and Materials Reliability,Volume: 17, Issue: 3,Sept. 2017.
8. IEC/TS 62228 ed1.0 “Integrated circuits - EMC evaluation of CANtransceivers”, 2007.
9. T. Maloney and N. Khurana, "Transmission line pulsing techniques forcircuit modelling of ESD Phenomena", EOS/ESD
ymposiumProceedings (1985), pp. 49.
10. Kleveland.B., Maloney. TJ, Morgan.I.; Madden. L, Lee. T.H, Wong,S.S., "Distributed ESD protection for high-speed integrated
circuits,"Electron Device Letters, IEEE, vol.21, no.8, pp.390-392, Aug. 2000.
11. ‘TVSDevicesandPrinciples’,http://www.littelfuse.com/data/en/Application_Notes/an9768.pdf
12. Ruth Anita Shirley.D and Dr..Sasipriya.S, “Electromagnetic interference and its effect on the printed circuit board”, in Jour of Adv
Research in Dynamical & Control Systems, Vol. 10, 12-Special Issue, 2018.
13. IEC 61000-4-5 Ed.2.0, Electromagnetic Compatibility(EMC)– Part4-5:Testing and Measurement Techniques –SurgeImmunity Test,
2005.
14. IEC 61000-4-2 Ed.2.0, Electromagnetic Compatibility(EMC)– Part4-2:Testing and Measurement Techniques –ESD Immunity Test,
2008.
15. ‘System – level ESD protection guide’, http://www.ti.com/lit/sg/sszb130c/sszb130c.pdf
Authors: Gopireddy Sirisha, Parmar Harshdeepsinh, Konduri Subrahmanya Hemanth Sathiya Narayanan

Paper Title: Intelli-Car with Auto-Pilot for Accident Prevention


Abstract: Temporary auto pilot mode can help in saving lives, especially those of drivers. Using sensors,
one can continuously monitor a driver’s biological attributes, collect and process the obtained biological data
with algorithm to get the physical status of the driver and decide whether he is fit to drive. In this work, we
propose an intelli-car with auto-pilot mode. In intelli-car, if the driver found unfit to drive, the car takes the
responsibility by switching to a temporary auto pilot mode with the support of various sensors and algorithms. In
addition, it will find a safer way to stop while sending its location along with the data obtained using Global
Positioning System and Global System for Mobile Communication modules to the concerned authorities. A
hospital nearby to that incident will be notified when the driver's biological condition is found unstable.

Keyword : Car Control System, Fuzzy Bayesian Network, Internet-of-Things, Self-localisation and Map
Matching
References:
1. Dada Emmanuel Gbenga, Hamit Isseini Hamed, Adebimpe Adekunle Lateef and Ajibuwa Emmanuel Opeyemi, “Alcohol Detection
of Drunk Drivers with Automatic Car Engine Locking System,” Nova Journal of Engineering and Applied Sciences, Vol. 6 (1), pp. 1-
15, September 2017.
2. M. Malathi, R. Sujitha, M. R. Revathy, “Alcohol Detection and Seat Belt Control System using Arduino,” Proceedings of 2017
International Conference on Innovations in Information, Embedded and Communication Systems, March 2017.
3. A. R. Varma, S. V. Arote, C. Bharti and K. Singh, "Accident prevention using eye blinking and head movement," Proceedings of
Emerging Trends in Computer Science and Information Technology-2012(ETCSIT2012), 2012.
159. 4. Charlotte Jacobé de Naurois, Christophe Bourdin, Anca Stratulat, Emmanuelle Diaz and Jean-Louis Vercher, “ Detection and
prediction of driver drowsiness using artificial neural network models,” 10th International Conference on Managing Fatigue:
Managing Fatigue to Improve Safety, Wellness, and Effectiveness, Vol. 126, pp. 95-104, May 2019. 947-951
5. Koneti Sandeep, Ponnam Ravikumar and Sura Ranjith, “Novel drunken driving detection and prevention models using Internet of
things,” International Conference on Recent Trends in Electrical, Electronics and Computing Technologies, pp. 145-149, 2017.
6. José Vicente, Pablo Laguna, Ariadna Bartra and Raquel Bailón, “Drowsiness detection using heart rate variability,” Medical &
Biological Engineering & Computing, Vol. 56, Issue 6, pp. 927-937, 1st June,2016.
7. S Aravind Student, T. Karthick and Usha Sakthivel, “E-Eyanthra Perspiration based drunken driving prevention system”, 4th
International Conference on New Trends in Information Science and Service Science, May 2010.
8. Lavanya J, Essaki Raj R, Kamalakannan C, Suresh L, Dash S, Panigrahi B, “A Mobile Based Novice Detection of Driver’s Fatigue
Level and Accident Reporting Solution,” Power Electronics and Renewable Energy Systems, Lecture Notes in Electrical Engineering,
Vol. 326, Springer, New Delhi.
9. Boon-Giin Lee and Wan-Young Chung, “A Smartphone-Based Driver Safety Monitoring System Using Data Fusion,”
Sensors(Basel), Vol. 12 (12), pp. 17536–17552, December 2012.
10. Vennela Priyadarshni, P. Gopi Krishna and K. Sreenivasa Ravi, “GPS and GSM Enabled Embedded Vehicle Speed Limiting Device,”
Indian Journal of Science and Technology, Vol 9(17), May 2016.
11. D. Sommer and M. Golz, “Evaluation of PERCLOS Based Current Fatigue Monitoring Technologies,” In Proceedings of Annual
International Conference of the IEEE Engineering in Medicine and Biology Society 2010, pp. 4456-4459, 21 August–4 September
2010.
12. Fernando Bobillo and Umberto Straccia, “A Fuzzy Description Logic with Product T-norm,” In Proceedings of IEEE International
Fuzzy Systems Conference 2007,pp. 1-6, July 2007.
13. Sara taghipour, Mohammad Reza Meybodi and Ali Taghipour, “An Algorithm for Map Matching For Car Navigation System,” 2008
3rd International Conference on Information and Communication Technologies: From Theory to Applications, April 2008.
14. Pooja Singal and R.S.Chhillar, “Dijkstra Shortest Path Algorithm using Global Positioning System”, International Journal of
Computer Applications (0975 – 8887), Volume 101, No.6, September 2014.
15. Hao Zhu, Ka-Veng Yuen, Lyudmila Mihaylova, and Henry Leung, Fellow, IEEE, “Overview of Environment Perception for
Intelligent Vehicles,” IEEE Transactions on intelligent transportation systems, Vol. 18, No. 10, October 2017.
16. Jianfeng Zhao, Bodong Liang and Qiuxia Chen, “The key technology toward the self-driving car,” International Journal of Intelligent
Unmanned Systems, Vol. 6, No. 1, pp. 2-20, January 2008.

Authors: Shine Let G, Christina V P F, Sam Prince T, Benin Pratap C

Paper Title: Rectangular Loop UHF Antenna for utilization of TVWS for Cognitive Radio Application
Abstract: To utilize the TV white space 470MHz to 806MHz, several wideband antennas are designed in
ultra-high frequency (UHF) band. This paper presents the monopole antenna with resonant structures arranged in
rectangular loop shape. The overall dimension of the antenna is 160mm x 100mm x 1.6mm. The performance of
the antenna in the operating frequency band 596MHz to 733MHz is evaluated using HFSS software. The overall
peak gain of the antenna is 1.653dB. In both elevation and azimuth plane, radiation pattern is omnidirectional
and the radiation efficiency is 81.79%

160.
Keyword : Cognitive Radio, Monopole antenna, TV white-space, UHF antenna.
952-955
References:
1. Federal Communications Commission Spectrum Policy Task Force,
2002. doi:10.1136/tc.1.1.73.
2. G. Staple, K. Werbach, The end of spectrum scarcity, IEEE Spectr. 41 (2004) 48–52. doi:10.1109/MSPEC.2004.1270548.
3. A.B. Flores, R.E. Guerra, E.W. Knightly, IEEE 802.11af, IEEE Commun. Mag. (2013) 92–100.
4. J.M. III, G.Q. Maguire, Cognitive Radio: Making Software Radios More Personal, IEEE Pers. Commun. 6 (1999) 13–18.
5. G.A. Raza, G. Saini, A Review on Antennas for TV White Space Spectrum Communication, Int. J. Electr. Electron. Eng. (2016) 17–20.
6. H. Wang, H. Xu, Resonant structures for handset antenna design, 2016 IEEE 5th Asia-Pacific Conf. Antennas Propagation, Conf. Proc.
(2017) 187–188. doi:10.1109/APCAP.2016.7843161.
7. M. John, M. Ammann, A Compact Shorted Printed Monopole Antenna for TV White Space Trials, 7th Eur. Conf. Antennas Propag.
(2013) 3713–3715. doi:10.21427/D7B01P.
8. M.H. JAMALUDDIN, T.A. RAHMAN, H. MOHAMAD, N. RAMLI, M.T. ISLAM, Wideband Planar U-shaped Monopole Antenna
with Meandering Technique for TV White Space Application, Radioengineering. 22 (2013) 708–713.
9. Q. Zhang, Y. Gao, C.G. Parini, Compact U-shape ultra-wideband antenna with characteristic mode analysis for TV white space
communications, in: 2016 IEEE Antennas Propag. Soc. Int. Symp. Proc., 2016: pp. 17–18. doi:10.1109/APS.2016.7695717.
10. N. Wang, Y. Gao, Q. Zeng, Compact wideband omnidirectional UHF antenna for TV white space cognitive radio application, AEU - Int.
J. Electron. Commun. 74 (2017) 158–162. doi:10.1016/j.aeue.2017.02.011.
11. A.K. Singh, M. Ranjan Tripathy, M Shaped Ultra Wide Band Monopole Antenna for TVWS CPE, in: 2018 5th Int. Conf. Signal
Process. Integr. Networks, 2018: pp. 240–243. doi:10.1109/SPIN.2018.8474241.
12. A.K. Singh, M.R. Tripathy, Planar Trapezoidal Monopole Antenna for TVWS CPE, in: 2018 3rd Int. Conf. Converg. Technol. I2CT
2018, 2018: pp. 6–8. doi:10.1109/I2CT.2018.8529689.
13. M.Y. Abou Shahine, M. Al-Husseini, Y. Nasser, K.Y. Kabalan, A. El-Hajj, A Reconfigurable Miniaturized Spiral Monopole Antenna
for TV White Spaces, in: PIERS Proc., 2013: pp. 1026–1029.

Authors: C.Arunabala, M.Rambabu Naik, Shaik Khamuruddeen, P.Jwalitha

Paper Title: Single Image Super Resolution by Directionally Structured Coupled Lexicon Learning
Abstract: In this paper, a alternative algorithmic software is deliberate supported coupled wordbook gaining
knowledge of with mapping perform for the problem of single-photograph extremely good solution. Dictionaries
rectangular degree designed-group of the carry out for clustered facts. The coaching information is based into 9
clusters supported correlation between the info patches and already evolved directional templates. The
unchanging ness of the distributed representations is thought for the mission of wonderful-resolution. For each
cluster, a integrate of high-decision and low-decision dictionaries rectangular measure designed in conjunction
with their mapping-capabilities. This is a coupled word e book learning with a mapping performs enables in
strengthening, the unchangingness of disbursed example coefficients for diverse resolution stages. throughout
the reconstruction section, for a given low-decision patch a collection of directional clustered dictionaries square
measure used, and also the cluster is chosen which elements the smallest amount allotted instance errors. The
161. planned algorithmic application is as
compared with in advance paintings in addition to the presently pinnacle-ranked incredible-decision algorithmic
program. by the deliberate mechanism, the healing of directional fine options becomes extremely good. 956-958

Keyword : In this paper Dictionaries rectangular degree designed-group of the carry out for clustered facts.
References:
1. M Elad, M Aharon, Image denoising via distributed and redundant representations over learned dictionaries. IEEE Trans. Image method.
(TIP). 15, 3736–3745 (2006)
2. DL Donoho, Compressed sensing. IEEE Trans. Inf. Theory. 52, 1289–1306 (2006)
3. Harvesting Of Organs Through Aero drone by Shaik Khamuruddeen, S. V. Devika in International Journal of Innovative Technology
and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8 Issue-8, June, 2019
4. Intelligent Pesticide Spraying System using Quad Copter by Shaik.Khamuruddeen in International Journal of Recent Techno logy and
Engineering (IJRTE) ISSN: 2277-3878, Volume-7, Issue-5S4, February 2019.
5. Triple Frequency U-Slot Antenna for 5G and Satellite Communications by Shaik.Khamuruddeen in International Journal of Recent
Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-7, Issue-5S4, February 2019.

Authors: Harjinder Singh, Harjot gill


Performance Assessment of 3d Printed Parts Fabricated By Fdm
Paper Title:
using Three Different Materails
Abstract: A tremendous research has been notices in the field of three dimensional printing. An
experimental study has been carried out for three dimensional printing to analyses the surface roughness and
ultimate tensile strength of three different materials. The study has been conducted using Taguchi design of
experiment. from the study it has been depicted that the infill percentage has a significant effect on the output.

Keyword : Infill percentage, Layer thickness, Tensile strength


References:
1. "ABS vs PLA." BotFeeder. BotFeeder, 02 Oct. 2013. Web. 02 Aug. 2015.
162. 2. Anisotropic material properties of fused deposition modeling ABS Sung‐ Hoon Ahn, Michael Montero, Dan Odell, Shad Roundy, Pau l
K. Wright Rapid Prototyping Journal 2002 8:4 , 248
3. Barclift, M., & Williams, C. (2012). Examining Variability in the Mechanical Properties of Parts Manufacturered Via Polyjet Direct 959-962
3D Printing. Rerived September 7, 2015.
4. D’Aveni, Richard. "The 3-D Printing Revolution." Harvard Business Review May (2015): 40-48. Print.
5. K. Komvopoulos, Mechanical Testing of Engineering Materials, (USA: University Readers, Inc., 2011).
6. 3D Printing a 3D Honeycomb Infill concept. (2015, July 24). Retrieved September 18, 2015, from
http://engineerdog.com/2015/03/08/3d-printing-a-3d-honeycomb-infill-concept/
7. Mechanical Testing 3D Printed Parts: Results and Recommendations. (2015, September 2). Retrieved September 18, 2015, from
http://engineerdog.com/2015/09/02/mechanical- testing-3d-printed-parts-results-and-recommendations/
8. 3D Printing Infill. (2014). Retrieved September 18,2015, http://triplaxis.deviantart.com/art/3D-Printing-Infill-433183209
9. Wright, P., Ahn, S., Montero, M., Odell, D., & Roundy,S. (2002). Anisotropic Properties of Fused Deposition Modeling. Rapid
Prototyping Journal, 2002(8), 248-248. Retrieved Sptember 30, 2015,
http://www.ewp.rpi.edu/hartford/~sayrer/Master'sProject/other/Research/Anisotropic material propertiesof fused deposition
modeling.pdf
10. Rodríguez, J.F., Thomas, J.P. and Renaud, J.E. (2003), “Mechanical behavior of acrylonitrile butadiene styrene fused deposition
materials modeling”, Rapid Prototyping Journal, Vol. 9 No. 4, pp. 219-230.

163. Authors: Dikshita Buragohain


Paper Title: Social Media and the Electoral Politics of India
Abstract: the use of social media has become a new strategy for the political parties during election
campaign. The social media is playing a significant role in changing people’s perception towards politics,
politicians and modes of political participation. The advent of budget smart phones and affordable data packages
has given greater scope for people to voice their opinion on social and political issues. With accounts in every
social media platforms, the political parties and their leaders are using it as a new space to mobilize people.
Since 2014 Lok Sabha election, the social media is playing a pro-active role in deciding which party will win the
election. While this has led to increased speed of spread of information and news, it has also left the ordinary
people vulnerable to fake news and exposed them to ‘hate speech’. One hand, the social media is making Indian
democracy more inclusive thereby giving citizens the space to express their opinion. On the other hand, it is also
creating a gap between different communities by spreading fake news and propaganda. Hence, there should be
some kind of restrictions to using it. The misuse can lead to chaos and instability in a democracy.

Keyword : internet, social media, political party, election, campaign


References: 963-967
1. Lokniti CSDS report on Social Media and Political Behaviour, 2019.
2. Mahapatra, Sangeeta and Johannes Plagemann (2019): “Polarisation and Politicisation: The Social Media Strategies of Indian Political
Parties”, GIGA Focus Asia, Number 3, March.
3. Neyazi, Taberez Ahmed (2019): ‘The Politics of the Social Media’ in NirajaGopalJayal (ed) Re-forming India: The Nation Today,
Penguine, pp. 524-536.
4. Palshikar,Suhas (2014): “Modi, Media and the Middle class”, Seminar 656, April.
5. Verma, Rahul ,ShreyasSardesai, (2014), “Does Media Exposure Affect Voting Behaviour and Political Preferences in India?”
Economic and Political Weekly, Vol XLIX No 39.
6. https://www.cjr.org/the_media_today/india_election_facebook_f ake_news.php
7. http://epub.sub.uni- hamburg.de/epub/volltexte/2019/89510/pdf/gf_asien_1903_en.p df
8. https://thewire.in/politics/amit-shah-bjp-fake-social-media- messages
9. https://www.theatlantic.com/international/archive/2019/04/india
-misinformation-election-fake-news/586123/
10. Ullekh, NP, and Amita Shah (2018), The Pitch Update, in: Open, www.openthemagazine.com/article/politics/the-pitch- update (1 July
2018).
11. Editorial, The Assam Tribune, 26 september 2019.
https://www.indiatoday.in/technology/features/story/whatsapp-is-banning- 2-million-accounts-every-month-and-will-ban-yours-if-you-do-any-of- these-things-1450211-2019-02-07

Authors: Monalisa Mohapatra, Srikanta Charana Das, B. C. M.Patnaik, Ipseeta Satpathy

Paper Title: Role of Information Technology in Education and Skill Based Learning for Employability
Abstract: Today India is one of the fastest growing economies in the world and with liberalisation,
privatisation and globalisation it is poised to grow further. But the question arises whether we are really ready
for this growth? Whether our students are skilled enough to compete worldwide and be a partner in this growth
mechanism? The answer is big ‘No’. It is a fact that education, lifelong learning and training are essential, but by
themselves inadequate to help individuals gain good and decent jobs. The employability scenario of graduates in
India is undoubtedly an area of great concern. In recent times information Communication Technology plays an
important role for the employability scenario in India. The old concepts of literate and illiterate society have
been replaced by digital divided. Considering the growing demand of industry it is high time for all the students
to be part of ICT driven education and training system. Further the growing demand of artificial intelligence and
data analytics put the students in more challenging position to obtain a job. The present paper is a conceptual one
and it will be an addition to the existing literature related to employability issues.

Keyword : Employability, skills development, training, quality, ICT, digital divide


164. References:
1. Abrol, M. (2016). Emerging Trends of Privatization of Education in India. International Journal of Educational Administration, 8(1), 1-
6. 968-973
2. All India Survey On Higher Education 2017-18, Ministry Of Human Resource Development, Department Of Higher Education, New
Delhi, 2018.
3. All India Survey On Higher Education 2016-17, Ministry Of Human Resource Development, Department Of Higher Education, New
Delhi, 2017.
4. Agarwal, P., & Kamalakar, G. (2013). Indian higher education: Envisioning the future. The Indian Economic Journal, 61(1), 151-155.
5. Anderson, J., & Mitchell, H. (2004). Education students, employers and employability: a report on a small scale project in 20 04.
6. Bansal, A. (2018). A STUDY ON EMPLOYABILITY SKILLS OF MBA STUDENTS: EMPLOYERS AND STUDENTS
PERSPECTIVE. GURUKUL BUSINESS REVIEW-GBR, 14, 47-51.
7. Bapna, A., & Sharma, N. (2015). School Education in India: A Handbook.
8. Bargsted, M. (2017), Impact Of Personal Competencies and Market Value Of Type Of Occupation Over Objective Employability And
Perceived Career Opportunities Of Young Professionals, Journal of Work and Organizational Psychology 33 (2017) 115–123.
9. Basu, A. N. (1947). Education in modern India. Calcutta: Orient Book Co.
10. Bennett, T. (2006), Defining the Importance of Employability Skills in Career/Technical Education, Auburn, Alabama, December 15,
2006.
11. Bhola, S. S., & Dhanawade, S. (2013). Higher education and employability-A review.
12. Blades, R., Fauth, B., & Gibb, J. (2012). Measuring employability skills. A rapid review to inform development of tools for p roject
evaluation. London National Children’s Bureau.
13. Boffo, V., Federighi, P., & Torlone, F. (2015). Educational Jobs: Youth and Employability in the Social Economy: Investigatio ns in
Italy, Malta, Portugal, Romania, Spain, United Kingdom (Vol. 2). Firenze University Press.
14. Brent, G., Sanger, G. & John, R. (2017), A framework to embed employability initiatives in undergraduate Science, Technology,
Engineering and Maths programs. In R.G. Walker & S.B. Bedford (Eds.), Research and Development in Higher Education: Curriculum
Transformation, 40 (pp 38 - 49). Sydney, Australia, 27–30 June 2017.
15. Cotton, K. (1993), Developing Employability Skills, School Improvement Research Series, Educational Research and Improvement
(OERI), U.S. Department of Education, under Contract Number RP91002001.
16. Final Report of DEHEMS Project (2012), Employability of Graduates and Higher Education Management Systems, University of
Ljubljana, Faculty of Social Sciences, Project Number: 502890-LLP-1-2009-1-SI-ERASMUS-ENWS.
17. Forsythe, A. (2017), I doubt very seriously whether anyone will hire me; factors predicting employability perceptions in higher
education, Cogent Psychology(2017), 4: 1385131.
18. Fugate, M. et al. (2004), Employability: A psycho-social construct, its dimensions, and applications, Journal of Vocational Behavior 65
(2004), 14–38.
19. Garrido, M., Sullivan, J., & Gordon, A. (2010, December). Understanding the links between ICT skills training and employability: an
analytical framework. In Proceedings of the 4th ACM/IEEE International Conference on Information and Communication Technologies
and Development (p. 15). ACM.
20. Gogoi, L. (2016). Education with ICT for developing employability in higher education institutions. Techno Learn, 6(2), 45.
21. Gupte, M. Role Of Research And Higher Education In India.
22. Hamid, A. S., et al. (2014), Employability Skills Development Approaches: An Application Of The Analytic Network Process, Asi an
Academy of Management Journal, Vol. 19, No. 1, 93–111, 2014.
23. Harrison, S. S. (2015). India: The most dangerous decades. Princeton University Press.
24. Harvey, L. (2001). Defining and measuring employability. Quality in higher education, 7(2), 97-109.
25. Hayes, C., Fulton, J., Devlin, S., Westwood, D., Garfield, I., Beardmore, P., ... & Bingle, L. (2016). Perception of academic learning
environments and perceived impact on articulation of employability; a mixed methods study. Journal of Learning Development in
Higher Education, (10).
26. Heslop, L. (2014). Understanding India: The future of higher education and opportunities for international cooperation. British Council.
27. Hinton, C. (2012), The Relationship between Employability and Hope, College of Education Theses and Dissertations, 27,
https://via.library.depaul.edu/soe_etd/27.
28. Higher education in India: Moving towards global relevance and competitiveness, FICCI Higher Education Summit, 2014.
29. Hiremath, S. S., & Albal, D. R. (2016). Current scenario of higher education in India: Reflections on some critical issues. International
research Journal of Social Science and Humanities, 1(1).
30. Holford, A. (2016). Youth employment and academic performance: production functions and policy effects.
31. Husain, Y.M.,et al. (2010), Importance of Employability Skills from Employers’ Perspective, International Conference on Learn er
Diversity 2010, Procedia Social and Behavioral Sciences 7(C) (2010) 430–438.

Authors: Raja Adnan Khan,Punit verma,Sandeep singla

Paper Title: Use of Bottom Ash as a Partial Replacement of Fine Aggregates in Flexible Pavement
Abstract: A survey of ongoing research on bottom ash appears to demonstrate it has the ability to improve
asphalt pavement performance when used to supplant a segment of the aggregate in asphalt mixes. Bottom ash
can be utilized as an aggregate substitution, giving a considerable reserve funds to both highway organizations
and service organizations. Bottom ash has been utilized as fine aggregates in flexible pavements since the mid
1970's. The American Coal Ash Association detailed that, more than 17,200 metric huge amounts of bottom ash
was utilized in flexible pavements clearing during 2006.
The research is centered around examination of properties of bottom ash, which is the byproduct of Budgam
coal power plant and attainability investigation of utilization of bottom ash in flexible pavements of indian
roads. As indicated by the outcomes got, the best blends are delivered by mixing bottom ash with well-graded,
angular, rough textured aggregate and restricting the level of bottom ash to 25% for wearing and 16% for binder
course. Marshall Stability and flow values have been found to diminish as the level of Wet bottom ash is
increased in the blend.
Further, high level of bottom ash substitution increases ideal bitumen content, which primarily influences to high
production cost. In spite of the fact that the expense per 1 Mt of bottom ash mixed blend is higher than the
conventional mix for both surface courses, its low density increases overlay zone. In light of that the expense per
1 m2 is lower than the conventional mix. The fruitful utilization of bottom ash in black topped pavements in
165.
Jammu and kashmir would give huge monetary investment funds as well as an ecological inviting solution for a
waste material. 974-981

Keyword : Bottom ash, Binder coarse , wearing coarse


References:
1. Ahmed, Imtiaz, and C.W. Lovell, “Use of waste materials in highway construction” in Transportation Research Rec.1345, Washing ton
DC: Nat. Academy Press 1992, pp19 -54.American Coal Ash Association. (1983).Ash at work. Vol. XV [Online].
Available:http://www.acaa-usa.org.
2. American Society for Testing and Materials (ASTM), Annual book of ASTM standards, Volume 04.03, West Conshohocken,
Pennsylvania, 1994.
3. Hot-mix asphalt paving handbook, American Association of State Highway and Transportation Officials (AASHTO), Washington,
D.C., 1991.
4. D.A. Anderson, M. D. Usmen, and L.K. Moulton,“Use of power plant aggregate in bituminous construction” in 55th Annu.,
Transportation Research Board,Washington, 1976, pp 151-169.
5. Asphalt Institute, “Performance graded asphalt binder specifications and testing”, Superpave Ser. 1, Lexington, Kentucky, 1995.
6. Asphalt Institute,“Superpave level 1 mix design”,Superpave ser. 2, Lexington, Kentucky, 1995.
7. Federal highway administration, Dept. of transportation. (2012 Apr.). “User guidelines for waste and byproduct materials in
pavementconstruction”. [Online].Available:http://www.fhwa.dot.gov/publications/research/infrastructure /structures/97148/cbabs2.cfm.
8. Q.D. Hunsucker, Design and performance of a bituminous surface mixture containing bottom ash aggregate, Research Report KTC 92-
14, Lexington, Kentucky: Kentucky Transportation Center, 1992, pp 1-25.
9. K. Ksaibati and J. Stephen, Utilization of bottom ash in asphalt mixes. Dept. of Civil and Architectural Eng., Uni.Wyoming, Laramie,
WY. 1999, pp1-87.
Authors: Yogini C. Kulkarni, S. D. Joshi

Paper Title: Security Modeling for Web Based Visitor’s Login System for Pursuance of Security Design Pattern
Abstract: In recent years because of the widespread use of internet and other communication media security
occurrences have broken all the barricades. System gets attacked by malicious attackers and various cyber
criminalities. Every system should be built by taking security as a main priority while building a system so as to
make it reliable, safety and also it should be enhanced with other quality parameters. Hence since beginning at
every phase of software development till the implementation of the software, security aspect is needed to take
into consideration before making the final design decision to avoid the expenses which may incur while
recovering of the system after the damage. For attainment of this, it is must to integrate the security at each
phase of the software development. The software developers insists on incorporating the software safeguards at
the design phase which may wind up in identifying the architecture restrictions related with the security which in
fact may not be necessary. To reduce this problem, this paper intends a structure for security development
activities. These activities consist of security requirements identification and threats analysis which are to be
converted into design decisions to lessen the risks to identified important assets. The recognized design
parameters are then manually prioritized using VOSREP and CRAMM and accordingly Security design pattern
is to be developed to incorporate security in the software. By manually calculating values of assets and
prioritizing will help to identify the security requirements at the early stage of the software development life
cycle. Accordingly the decisions for developing the security design pattern are to be taken for building the
software system
166. Keyword : Security Engineering process, Security Requirement Elicitation, Security modeling
References: 982-991
1. Aayush Gulati , Shalini Sharma, and Parshotam MMehmi. 2012.PROPOSING SECURITY REQUIREMENT PRIORITIZATION
FRAMEWORK., International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.3
2. Donald G. Firesmith, (2003) “Engineering Security Requirements”, Journal of object technology, vol 2, no.1, pp.53-68.
3. Zeki Yazar. A Qualitative Risk Analysis and Management Tool – CRAMM. SANS Institute Reading Room site
4. Ramchandran., 2002 .Designing Security solutions,Wiley Computer Publishing
5. Dermott JM and Fox C (1999) Using abuse case models for security requirements analysis. Department of Computer Science, James
Madison University, pp 55–64
6. Alexander IF (2003) Misuse cases, use cases with hostile intent’’. IEEE Software, pp. 58–66
7. Guttorm S, Opdahl AL (2005) Eliciting security requirements with misuse cases. RequirEng 10:34–44
8. Jacob Bergvalloch Louise Svensson .2015.Report on ‘Risk analysis review’ Linköpingsuniversitet https://www.diva-
portal.org/smash/get/diva2:821842/FULLTEXT01.pdf
9. NURIDAWATI MUSTAFA,MASSILA KAMALRUDIN,SAFIAH SIDEK. 2018. SECURITY REQUIREMENTS ELICITATION
AND CONSISTENCY VALIDATION: A SYSTEMATIC LITERATURE REVIEW ., Journal of Theoretical and Applied Information
96(16).ISSN: 1992-8645
10. Ashish Agarwal, Dr. Daya Gupta. Security Requirements Elicitation Using View Points for Online System First Internatio nal
Conference on Emerging Trends in Engineering and Technology
11. Security Requirements, http://www.dwheeler.com/secure-programs/Secure-ProgramsHOWTO/requirements.html
12. Mohamed Ghazouani, Sophia Faris, Hicham Medromi, Adil Sayouti.2014. Information Security Risk Assessment — A Practical
Approach with a Mathematical Formulation of Risk ., International Journal of Computer Applications (0975 – 8887) Volume 103(8),
13. Kakali Chatterjee ,Daya Gupta ,Asok De. 2013 .A framework for development of secure software.,CSIT., 1(2):143–157
14. Shams Tabrez Siddiqui.2017. Significance of Security Metrics in Secure Software Development.,International Journal of Applied
Information Systems (IJAIS) – ISSN : 2249-0868 Foundation of Computer Science FCS, New York, USA Volume 12 – No. 6, August
2017 – www.ijais.org 10

Authors: Ms. Visnudharsini M. E, Abhimanyu Wadhwa, Nikhil Chopra, Sikander Zeb Ansari

Paper Title: Healthcare Industry


Abstract: Now a day enhancement of technology Today world is changing very fast and generation large
volume of data Be that as it may, DBMS would be wasteful and tedious when performing information
examination on tremendous informational indexes.Hadoop appeared as of late and beats the constraints of
existing DBMS by giving streamlined devices to effective information stockpiling and quicker preparing
occasions for information investigation. The motivation behind this work is to think about various function of
Hadoop in social insurance to recommend to client . A health care industry collect information including client
record are use for investigation, use java library file and also use Hadoop map reduce ,hive and Pig function
167.
Keyword : Hadoop, java library file , Big data, healthcare industry 992-995
References:
1. Chitra Pasupathi, Vijaya Kalavakonda “Evidence Based Health Care System Using Big Data for Disease Diagnosis”- 2016
2. Purva Grover and Rahul Johari "Review of Big Data Tools for HealthCare System with case study on patient database storage
methodology”-2016
3. Rahul Johari and - Priyanka Dhaka” Big Data Application: Study and Archival of Mental Health Data, using MongoDB”- 2016
4. Bijan Raahemi and Mohammad Hossein Tekieh “Importance of Data Mining in Healthcare: A Survey” 2015
5. Rita Chauhan” A Robust Model for Big Healthcare Data Analytics”- 2016
6. Delina Dogaru” Holistic Perspective of Big Data in Healthcare”-2017
7. Mohamed Abou zahra, Kamran Sartipi, David Armstrong, Joseph Tan “Integrating Data from EHRs to Enhance Clinical Decision
Making: The Inflammatory Bowel Disease Case” Proceedings of 27th,2012 Wikipedia.com

168. Authors: Reni Suryanti, Sumardjo, Syahyuti, Prabowo Tjitropranoto


The Role of Private Extension Agents in Broiler Farmer Business Capacity Building using a SEM
Paper Title:
Lisrel
Abstract: The low business capacity of broiler farmers is the reason behind the failure to achieve a
sustainable farming business. Efforts for capacity building could be conducted by private extension agents who
are the technical personnel of core companies in the broiler partnership pattern. The purpose of this study was to
analyze the private extension agents’ strategies in strengthening the farmers’ capacity. The study was conducted
in Bogor Regency and Sukabumi Regency, West Java Province using a survey approach on 247 farmers who run
poultry-raising businesses using the partnership pattern based on Slovin’s equation out of the partner farmer
population of 646 people. The sample selection used cluster random sampling with farmer clusters from the two
regencies. Data were collected through questionnaires completed by farmers and in-depth interviews of key
informants. Data were collected from July to October 2018. The data were analyzed using descriptive analysis
and inferential analysis with SEM. The study results revealed that the farmers’ capacity and private extension
agents’ competence and role were weak. The farmers’ low capacity was influenced by the private extension
agents' weak role. The weak private extension agents’ role was influenced by the private extension agents’
competence which was also weak. Strategies to increase the role of private extension agents are by strengthening
their competence through strong collaborations between the government and partner companies so that they
may, in turn, strengthen the farmers’ capacity.

Keyword : business capacity, poultry farmer, private extension agents’ role.


References:
1. Mehdi Y, Létourneau-Montminy MP, Gaucher M Lou, Chorfi Y, Suresh G, Rouissi T. "Use of antibiotics in broiler production:
Global impacts and alternatives". Anim Nutr. 2018;4(2):170–8.
2. Suwarta S, Hanafie R. " The Influence of Business Management on Income and the Risk of Income in the Broiler Chicken Farming."
J Socioecon Dev. 2018;1(1):25–31.
3. Kalio GA, Okafor BB. "Response of Broilers to Two Management Systems of Housing in Etche Response of Broilers to Two
Management Systems of Housing in Etche Local Government Area of Rivers State , Nigeria." Asian J Agric Rural Dev. 996-1001
2012;2(2):184–8.
4. Bounds M, Zinyemba O. Poultry farming: lessening poverty in rural areas." South African J Agric Ext. 2018;46(1):98 –101.
5. Henderson SR. "Managing Land-Use conflict around urban centres: Australian poultry farmer attitudes towards relocation." Appl
Geogr. 2005;25(2):97–119.
6. Gebrehiwot KG. "The impact of agricultural extension on households’ welfare in Ethiopia." Int J Soc Econ. 2015;42(8):733 –48.
7. Yassin H, Velthuis AGJ, Giesen GWJ, Oude Lansink AGJM." Comparative analysis as a management tool for broiler breeder farms:
Simulated individual farm analysis (IFAS)". Poult Sci. 2012;91(3):744–57.
8. Bahua MI. "Managerial competencies in agriculture." Eur Res Stud J. 2018;21(2):623–9.
9. Ucbasaran D, Shepherd DA, Lockett A, Lyon SJ." Life After Business Failure: The Process and Consequences of Business Failure for
Entrepreneurs." J Manage. 2013;39(1):163–202.
10. Awotoye Y, Singh R. Entrepreneurial Resilience, "High Impact Challenges, and Firm Performance." J Manag Policy Pract.
2017;18(2):28–37.
11. Shah JA, Asmuni A, Ismail A. "Roles of Extension Agents Towards Agricultural Practice in Malaysia." Int J Adv Sci Eng Inf
Technol. 2013;3(1):59.
12. Kristoffersen I. "Great expectations: Education and subjective wellbeing." J Econ Psychol. 2018;66:64–78.
13. Hubackova S, Semradova I. "Research Study on Motivation in Adult Education." Procedia - Soc Behav Sci. 2014;159:396–400.
14. Lee K, Choi H, Cho YH. "Becoming a competent self: A developmental process of adult distance learning." Internet High Educ.
2019;41:25–33.
15. Manolescu M, Tâlvan LM, Bozon AC. "Evaluative Strategies in Adult Education." Procedia - Soc Behav Sci. 2014;142:459–65.
16. Margrett JA, Lee K. "Adult Education and Lifelong Learning: The US Experience and Beyond." Second Edition. Vol. 1, International
Encyclopedia of the Social & Behavioral Sciences: Second Edition. Elsevier; 2015. 148–152 p.
17. Akareem HS, Hossain SS. "Determinants of education quality: what makes students’ perception different?". Open Rev Educ Res.
2016;3(1):52–67.
18. Thivierge MN, Parent D, Bélanger V, Angers DA, Allard G, Pellerin D." Environmental sustainability indicators for cash -crop farms
in Quebec, Canada: A participatory approach. Ecol Indic. 2014;45:677–86.
19. Suryanti, R, Sumardjo, Syahyuti, Tjitropranoto, P.”

The business capacity of broiler farmers in the partnership business pattern.” J. Indonesian Trop. Anim. Agric. 2019. 44(3):314-322.

Authors: Praveen Shukla, R. K. Chaurasiya, Shrish Verma

Paper Title: A Brain Computer Interface–Based P300 Speller for Home Appliances Control System
Abstract: Enviourment control is one of the critical difficulties for handicapped individuals who experience
the ill effects of neuromuscular ailments. Brain computer interface systems empower a subject to communicate
with a PC machine without drawing down any solid action. This communication does not depend in light of any
ordinary medium of correspondences like physical developments, talking, and motion and so forth. The most
vital desire for a home control application is high accuracy and solid control. In this study, row column–based (2
169. Row, 3 columns) P300 paradigm for home appliances control was designed. In this article we analyse a real time
EEG data for P300 speller using support vector machine and artificial neural network for high accuracy. Using 1002-
this proposed method we are able to find the target appliance in a correct and fastest way. Four healthy subjects 1007
were participating in this study. Artificial neural network gives 85% accuracy within 10 flashes. The results
shows this paradigm can be used for select option of a home appliances control application for healthy subjects
with user convenient and reliable.

Keyword : Brain computer interface, P300 signal, Classification, Home appliances


References:
1. L. A. Farwell and E. Donchin, "Talking off the top of your head: toward a mental prosthesis utilizing event-related brain potentials,"
Electroencephalography and clinical Neurophysiology, vol. 70, pp. 510-523, 1988.
2. R. Fazel-Rezai, et al., "P300 brain computer interface: current challenges and emerging trends," Frontiers in neuroengineering, vol. 5 ,
p. 14, 2012.
3. J. D. Bayliss, "Use of the evoked potential P3 component for control in a virtual apartment," IEEE transactions on neural systems and
rehabilitation engineering, vol. 11, pp. 113-116, 2003.
4. U. Hoffmann, et al., "An efficient P300-based brain–computer interface for disabled subjects," Journal of Neuroscience methods, vol.
167, pp. 115-125, 2008.
5. C. Guan, et al., "High performance P300 speller for brain-computer interface," in IEEE International Workshop on Biomedical
Circuits and Systems, 2004., 2004, pp. S3/5/INV-S3/13.
6. G. Townsend, et al., "A novel P300-based brain–computer interface stimulus presentation paradigm: moving beyond rows and
columns," Clinical neurophysiology, vol. 121, pp. 1109-1120, 2010.
7. L. Acqualagna and B. Blankertz, "Gaze-independent BCI-spelling using rapid serial visual presentation (RSVP)," Clinical
neurophysiology, vol. 124, pp. 901-908, 2013.
8. B. Blankertz, et al., "A note on brain actuated spelling with the Berlin brain-computer interface," in International Conference on
Universal Access in Human-Computer Interaction, 2007, pp. 759-768.
9. M. S. Treder, et al., "Gaze-independent brain–computer interfaces based on covert attention and feature attention," Journal of neural
engineering, vol. 8, p. 066003, 2011
10. R. Corralejo, et al., "A P300-based brain–computer interface aimed at operating electronic devices at home for severely disabled
people," Medical & biological engineering & computing, vol. 52, pp. 861-872, 2014.
11. F. Aloise, et al., "Asynchronous P300-based brain-computer interface to control a virtual environment: initial tests on end users,"
Clinical EEG and neuroscience, vol. 42, pp. 219-224, 2011.
12. E. A. Aydin, et al., "Region based Brain Computer Interface for a home control application," in Engineering in Medicine and B iology
Society (EMBC), 2015 37th Annual International Conference of the IEEE, 2015, pp. 1075-1078.
13. N. Wahy and W. Mansor, "EEG based home lighting system," in 2010 International Conference on Computer Applications and
Industrial Electronics, 2010, pp. 379-381.
14. W. Alrajhi, et al., "Smart home: toward daily use of BCI-based systems," in Informatics, Health & Technology (ICIHT), International
Conference on, 2017, pp. 1-5.
15. M. Wang, et al., "A Fan Control System Base on Steady-State Visual Evoked Potential," in Computer, Consumer and Control (IS3C),
2016 International Symposium on, 2016, pp. 81-84.
16. K. C. Tseng, et al., "Brain computer interface-based multimedia controller," in Intelligent Information Hiding and Multimedia Signal
Processing (IIH-MSP), 2012 Eighth International Conference on, 2012, pp. 277-280.
17. A. M. Chowdhury, et al., "Brain controlled assistive buzzer system for physically impaired people," in Electrical, Computer a nd
Communication Engineering (ECCE), International Conference on, 2017, pp. 666-669.
18. C.-T. Lin, et al., "Brain computer interface-based smart living environmental auto-adjustment control system in UPnP home
networking," IEEE Systems Journal, vol. 8, pp. 363-370, 2014.

Authors: Oeng Anwarudin, Sumardjo Sumardjo, Arif Satria, Anna Fatchiya

Paper Title: Factors Influencing the Entrepreneurial Capacity of Young Farmers for Farmer Succession
Abstract: The entrepreneurial capacity of young farmers is an important indicator for realizing farmer
succession. The research aimed to analysis descriptively entrepreneurial capacity and the factors influencing the
entrepreneurial capacity of young farmers. The study was conducted in Cianjur and Majalengka Regencies, West
Java, Indonesia. The study population was young farmers in Cianjur and Majalengka Regencies. A sample of
220 people consisted of 110 farmers in Cianjur and 110 farmers in Majalengka. Samples were selected using a
cluster random sampling technique. Data were collected by interview using a questionnaire. Research variables
consisted of individual characteristics (X1), access to information and communication technology (X2), external
support (X3), the role of agricultural instructors (X4), and entrepreneurial capacity (Y). Data analysis techniques
used were descriptive statistical techniques and multiple regression. The results of the study concluded that
youth entrepreneurship capacity mostly belonged medium classification. Majority of young farmers had junior
and senior high school education, the average length time of business was 5.8 years, majority of farmers had
never attended training, had high and easy access to information and communication technology, perceptions
and motivations was mostly classified as medium. The entrepreneurial capacity of young farmers was influenced
by education, motivation, access to information and communication technology, external factors and the role of
agricultural extension agents.
170.
1008-
Keyword : Entrepreneurial capacity, young farmers, community. 1014
References:
1. S. Wiyono, M. Sangaji, M. Ahsan, Ulil, and S. Abdullah, “Regenerasi petani, faktor-faktor yang mempengaruhi minat menjadi petani
pada keluarga petani padi dan hortikultura,” Lap. Kaji. Koalisi Rakyat untuk Ketahanan Pangan, pp. 1–46, 2015.
2. O. Anwarudin, “Opini: Peluang Agropreneur Muda,” Harian Republika, p. 6, Jan-2017.
3. H. Harniati and O. Anwarudin, “The interest and action of young agricultural entrepreneur on agribusiness in Cianjur Regency, West
Java,” J. Penyul., vol. 14, no. 1, pp. 189–198, 2018.
4. M. Leino and S. Mullola, “Temperament-Conscious Humanistic Pedagogy,” Psychology, vol. 05, no. 07, pp. 753–761, 2014.
5. F. Liani, D. Sulistyowati, and O. Anwarudin, “Perspektif gender dalam partisipasi petani pada Kawasan Rumah Pangan Lestari
(KRPL) tanaman sayuran di Kecamatan Kersamanah Kabupaten Garut Provinsi Jawa Barat,” J. Penyul. Pertan., vol. 13, no. 1, pp. 21–
32, 2018.
6. C. Saputra, O. Anwarudin, and D. Sulistyowati, “Persepsi dan adopsi pengendalian hama terpadu lalat buah pada tanaman mangga di
Kecamatan Greged Kabupaten Cirebon Provinsi Jawa Barat,” J. Penyul. Pertan., vol. 13, no. 2, pp. 49–60, 2018.
7. C. A. Putri, O. Anwarudin, and D. Sulistyowati, “Partisipasi petani dalam kegiatan penyuluhan dan adopsi pemupukan padi sawah di
Kecamatan Kersamanah Kabupaten Garut,” J. Agribisnis Terpadu, vol. 12, no. 1, pp. 103–119, 2019.
8. W. Wardani and O. Anwarudin, “Peran penyuluh terhadap penguatan kelompok tani dan regenerasi petani di Kabupaten Bogor
Jawa Barat,” J. TABARO, vol. 2, no. 1, pp. 191–200, 2018.
9. M. Khatib, S. N. Sarem, and H. Hamidi, “Humanistic education: concerns, implications and applications,” J. Lang. Teach. Res., vol. 4,
no. 1, pp. 45–51, 2013.
10. O. Anwarudin and A. Maryani, “The effect of institutional strengthening on farmers participation and self-reliance in Bogor
Indonesia,” Int. J. Res. Soc. Sci., vol. 7, no. 4, pp. 409–422, 2017.
11. A. Warya and O. Anwarudin, “Factors affecting farmer participation in paddy - special efforts program at Karawang, Indonesia,” Int. J.
Soc. Sci. Econ. Res., vol. 3, no. 8, pp. 3857–3867, 2018.
12. N. Nazaruddin and O. Anwarudin, “Pengaruh penguatan kelompok tani terhadap partisipasi dan motivasi pemuda tani pada usaha
pertanian di Leuwiliang, Bogor,” J. Agribisnis Terpadu, vol. 12, no. 1, pp. 1–14, 2019.
13. A. L. A. Latopa and N. S. A. A. Rashid, “Identifying the causes of decline in youth participation in agricultural empowerment program
of youth integrated training farm, Malete, Kwara State,” Res. Humanit. Soc. Sci., vol. 5, no. 7, pp. 2225–484, 2015.
14. A. L. A. Latopa and N. S. A. A. Rashid, “The impacts of integrated youth training farm as a capacity building center for yout h
agricultural empowerment in Kwara State, Nigeria,” Mediterr. J. Soc. Sci., vol. 6, no. 5, pp. 524–532, 2015.
15. A.-L. Ayinde, L. 1 , S. Norazizan, S. A. Rashid, A. A. Samah, and H. Abdullah, “Examining the extent of youth participation in
agricultural training program in Malete Youth Farm Kwara State,” IOSR J. Humanit. Soc. Sci., vol. 20, no. 4, pp. 65–71, 2015.
16. I. Setiawan, S. Sumardjo, P. Tjitropranoto, and A. Satria, “Study of role of agribusiness young actors on optimalization of p rivate
agricultural extension in West Java Province , Indonesia,” Int. J. Humanit. Soc. Sci., vol. 5, no. 9, pp. 161–169, 2015.
17. O. Anwarudin and Y. Haryanto, “The role of farmer-to-farmer extension as a motivator for the agriculture young generation,” Int. J.
Soc. Sci. Econ. Res., vol. 3, no. 1, pp. 428–437, 2018.
18. D. Prawiranegara, S. Sumardjo, D. P. Lubis, and S. Harijati, “Strengthening role of farmer institution in enhance of innovation
capability based on ICT in West Java Province, Indonesia,” Int. J. Humanit. Soc. Sci., vol. 5, no. 12, pp. 128–136, 2015.
19. D. Prawiranegara, S. Sumardjo, D. P. Lubis, and S. Harijati, “Effect of information quality based on cyber toward vegetable f armers
capability to manage innovation in west java,” Sosiohumaniora, vol. 18, no. 2, pp. 166–172, 2016.
20. C. W. M. Yu, “Capacity building to advance entrepreneurship education: Lessons from the teen entrepreneurship competition in Hong
Kong,” Educ. Train., vol. 55, no. 7, pp. 705–718, 2013.
21. S. F. Conway, J. McDonagh, M. Farrell, and A. Kinsella, “Cease agricultural activity forever? Underestimating the importance of
symbolic capital,” J. Rural Stud., vol. 44, pp. 164–176, 2016.
22. S. Joosse and A. Grubbstrom, “Continuity in farming - Not just family business,” J. Rural Stud., vol. 50, pp. 198–208, 2017.
23. Ó. González-Benito, J. González-Benito, and P. A. Muñoz-Gallego, “Role of entrepreneurship and market orientation in firms’
success,” Eur. J. Mark., vol. 43, no. 3–4, pp. 500–522, 2009.
24. H. N. Nasution, F. T. Mavondo, M. J. Matanda, and N. O. Ndubisi, “Entrepreneurship: Its relationship with market orientation and
learning orientation and as antecedents to innovation and customer value,” Ind. Mark. Manag., vol. 40, no. 3, pp. 336–345, 2011.
25. Y. Sato, T. Tabuchi, and K. Yamamoto, “Market size and entrepreneurship,” J. Econ. Geogr., vol. 12, no. 6, pp. 1139–1166, 2012.
26. B. Cohen and M. I. Winn, “Market imperfections, opportunity and sustainable entrepreneurship,” J. Bus. Ventur., vol. 22, no. 1, pp.
29–49, 2007.
27. O. M. Lehner and J. Kaniskas, Opportunity recognition in social entrepreneurship: A thematic meta analysis, vol. 21, no. 1. 2012.
28. H. Hansson, R. Ferguson, C. Olofsson, and L. Rantamäki-Lahtinen, “Farmers’ motives for diversifying their farm business - The
influence of family,” J. Rural Stud., vol. 32, pp. 240–250, 2013.
29. J. C. Pinho and E. S. de Sá, “Personal characteristics, business relationships and entrepreneurial performance: Some empirica l
evidence,” J. Small Bus. Enterp. Dev., vol. 21, no. 2, pp. 284–300, 2014.
30. M. Bouette and F. Magee, “Hobbyists, artisans and entrepreneurs: Investigating business support and identifying entrepreneurial
profiles in the Irish craft sector,” J. Small Bus. Enterp. Dev., vol. 22, no. 2, pp. 337–351, 2015.
31. S. Amanah and D. Sadono, “Motivation , job satisfaction and job performance of forestry extension workers in Cianjur District West
Java Province,” J. Penyul., vol. 11, no. 1, pp. 11–22, 2015.
32. A. Maryani, Y. Haryanto, and O. Anwarudin, “Strategy of agricultural extension to improve participation of the farmers in spe cial
effort in increasing rice production,” Int. J. Sci. Basic Appl. Res., vol. 36, no. 4, pp. 163–174, 2017.
33. A. Fatchiya and T. Hernanda, “The level of agri-extension worker performance in South Ogan Komering Ulu (OKU) District,” J.
Penyul., vol. 11, no. 1, pp. 79–90, 2015.
34. M. Hauser, M. Lindtner, S. Prehsler, and L. Probst, “Farmer participatory research: Why extension workers should understand a nd
facilitate farmers’ role transitions,” J. Rural Stud., vol. 47, pp. 52–61, 2016.
35. O. Anwarudin and D. Dayat, “The effect of farmer participation in agricultural extension on agribusiness sustainability in Bogor ,
Indonesia,” Int. J. Multicult. Multireligious Underst., vol. 6, no. 3, pp. 1061–1072, 2019.
36. T. Tambunan, “Women entrepreneurship in Asian developing countries: Their development and main constraints,” J. Dev. Agric.
Econ., vol. 1, no. 2, pp. 27–40, 2009.
37. B. Okpukpara, “Strategies for effective loan delivery to small scale enterprises in rural Nigeria,” J. Dev. Agric. Econ., vol. 1, no. 2, pp.
041–048, 2009.
38. M. Frese and M. M. Gielnik, “The psychology of entrepreneurship,” Annu. Rev. Organ. Psychol. Organ. Behav., vol. 1, no. 2014, pp.
413–438, 2014.
39. V. Vardhini, P. Raja, and K. Devi, “Social media as the mext mrend in social business marketing, social media as the next tre nd in
solar business marketing,” Int. J. Innov. Technol. Explor. Eng., vol. 8, no. 11, pp. 760–763, 2019.
40. I. Bečicová and J. Blažek, “Is there a credit-gap in a periphery? The perception of this problem by small entrepreneurs,” J. Rural Stud.,
vol. 42, pp. 11–20, 2015.
41. V. Ledwith and K. Reilly, “Fringe bene fi ts ? Educational experiences of migrant and non-migrant youth in the urban-rural fringe of
Galway City , Ireland,” J. Rural Stud., vol. 36, no. 2014, pp. 219–225, 2014.
42. M. Arsyad, M. Muis, and Y. Sabang, “Government expenditure and private investment on the value of agricultural sector in labor
absorption,” Int. J. Innov. Technol. Explor. Eng., vol. 8, no. 7, pp. 496–501, 2019.
43. K. Sankaran and C. Demangeot, “Conceptualizing virtual communities as enablers of community-based entrepreneurship and
resilience,” J. Enterprising Communities, vol. 11, no. 1, pp. 78–94, 2017.
44. G. Secundo, G. Schiuma, and G. Passiante, “Entrepreneurial learning dynamics in knowledge intensive enterprises,” Int. J. Entrep.
Behav. Res., vol. 23, no. 3, pp. 1–17, 2017.
45. J. Lepoutre, R. Justo, S. Terjesen, and N. Bosma, “Designing a global standardized methodology for measuring social entrepren eurship
activity: The Global Entrepreneurship Monitor social entrepreneurship study,” Small Bus. Econ., vol. 40, no. 3, pp. 693–714, 2013.
46. L. Zagata and L. Sutherland, “Deconstructing the ‘ young farmer problem in Europe ’ : Towards a research agenda,” J. Rural Stud.,
vol. 38, no. 2015, pp. 39–51, 2015.
47. P. Stenholm and U. Hytti, “In search of legitimacy under institutional pressures: A case study of producer and entrepreneur farmer
identities,” J. Rural Stud., vol. 35, pp. 133–142, 2014.
48. A. Grubbström, S. Stenbacka, and S. Joosse, “Balancing family traditions and business: Gendered strategies for achieving future
resilience among agricultural students,” J. Rural Stud., vol. 35, no. 2014, pp. 152–161, 2014.
49. S. Sumardjo and L. Radjabaycolle, “Community participation of Cikapundung Watershead Management Activities in Dago Village
Bandung,” J. Penyul., vol. 10, no. 1, pp. 43–58, 2015.

Authors: Meesala Shobha Rani, Sumathy. S


Opinion Mining on Social Media Transit Tweets using Text Pre-Processing and Machine Learning
Paper Title:
171. Techniques
Abstract: Capturing public insights related to transit systems in social media has gained huge popularity
1015-
presently. The regional transportation agencies use social media as a tool to provide information to the public
1025
and seek their inputs and ideas for meaningful decision making in transportation activities. This exploratory
study attempts to gauge the impact of social media use in transportation planning that in turn would help
transportation administration in identifying the day-to-day challenges faced by the customers and to suggest a
suitable solution. This paper presents the effect of pre-processing techniques on transit opinion analysis to
improve the performance. Performance of different pre-processing methods namely stop word removal,
stemming, lemmatization, negation handling and URL removal using feature representation models namely TF-
IDF with unigram, TF-IDF with bigram on three feature selection techniques including information gain,
standard deviation and chi-square on social media transit rider’s opinion is carried out. The experimental results
are evaluated using four different classifiers such as Support vector machine, Naïve Bayes, Decision Tree, K-
Nearest Neighborhood in terms of accuracy, precision, recall, and f-measure. On analyzing the social media
related transit opinion data, it is observed that pre-processing with bigram technique performs better than the
other approaches specifically with Support Vector Machine and Naïve Bayes.

Keyword : Feature selection, Machine learning, Opinion mining, Text pre-processing, Twitter, Transit
opinion analysis, Social media.
References:
1. A. Gal-Tzur, A. Rechavi, D. Beimel, and S. Freund, “An improved methodology for extracting information required for transport-
related decisions from Q&A forums: A case study of TripAdvisor,” Travel Behav. Soc., vol. 10, no. September 2017, pp. 1 –9, 2018.
2. Z. Zhang, Q. He, J. Gao, and M. Ni, “A deep learning approach for detecting traffic accidents from social media data,” Transp. Res.
Part C Emerg. Technol., vol. 86, no. May 2017, pp. 580–596, 2018.
3. F. Ali, D. Kwak, P. Khan, S. M. R. Islam, K. H. Kim, and K. S. Kwak, “Fuzzy ontology-based sentiment analysis of transportation and
city feature reviews for safe traveling,” Transp. Res. Part C Emerg. Technol., vol. 77, pp. 33–48, 2017.
4. A. Huang, L. Gallegos, and K. Lerman, “Travel analytics: Understanding how destination choice and business clusters are conne cted
based on social media data,” Transp. Res. Part C Emerg. Technol., vol. 77, pp. 245–256, 2017.
5. C. Cottrill, P. Gault, G. Yeboah, J. D. Nelson, J. Anable, and T. Budd, “Tweeting Transit: An examination of social media strategies for
transport information management during a large event,” Transp. Res. Part C Emerg. Technol., vol. 77, pp. 421–432, 2017.
6. I. Casas and E. C. Delmelle, “Tweeting about public transit — Gleaning public perceptions from a social media microblog,” Case Stud.
Transp. Policy, vol. 5, no. 4, pp. 634–642, 2017.
7. K. Kim, O. joung Park, S. Yun, and H. Yun, “What makes tourists feel negatively about tourism destinations? Application of hybrid
text mining methodology to smart destination management,” Technol. Forecast. Soc. Change, vol. 123, pp. 362–369, 2017.
8. T. Kuflik, E. Minkov, S. Nocera, S. Grant-Muller, A. Gal-Tzur, and I. Shoor, “Automating a framework to extract and analyse transport
related social media content: The potential and the challenges,” Transp. Res. Part C Emerg. Technol., vol. 77, pp. 275–291, 2017.
9. X. Lv and N. M. El-Gohary, “Stakeholder Opinion Classification for Supporting Large-Scale Transportation Project Decision Making,”
in Computing in Civil Engineering 2017, 2017, pp. 333–341.
10. J. Yin, T. Tang, L. Yang, J. Xun, Y. Huang, and Z. Gao, “Research and development of automatic train operation for railway
transportation systems: A survey,” Transp. Res. Part C Emerg. Technol., vol. 85, pp. 548–572, 2017.
11. S. R. Majumdar, “The case of public involvement in transportation planning using social media,” Case Stud. Transp. Policy, vo l. 5, no.
1, pp. 121–133, 2017.
12. T. H. Rashidi, A. Abbasi, M. Maghrebi, S. Hasan, and T. S. Waller, “Exploring the capacity of social media data for modelling travel
behaviour: Opportunities and challenges,” Transp. Res. Part C Emerg. Technol., vol. 75, pp. 197–211, 2017.
13. M. Thelwall, “TensiStrength: Stress and relaxation magnitude detection for social media texts,” Inf. Process. Manag., vol. 53, no. 1, pp.
106–121, 2017.
14. Z. Zhang, Q. He, and S. Zhu, “Potentials of using social media to infer the longitudinal travel behavior: A sequential model-based
clustering method,” Transp. Res. Part C Emerg. Technol., vol. 85, no. October, pp. 396–414, 2017.
15. E. Aria, J. Olstam, and C. Schwietering, “Investigation of Automated Vehicle Effects on Driver’s Behavior and Traffic Performance,”
Transp. Res. Procedia, vol. 15, pp. 761–770, 2016.
16. D. E. Brown, “Text Mining the Contributors to Rail Accidents,” IEEE Trans. Intell. Transp. Syst., vol. 17, no. 2, pp. 346 –355, 2016.
17. G. T. Giancristofaro and A. Panangadan, “Predicting Sentiment toward Transportation in Social Media using Visual and Textual
Features,” IEEE Conf. Intell. Transp. Syst. Proceedings, ITSC, pp. 2113–2118, 2016.
18. D. Gregor et al., “A methodology for structured ontology construction applied to intelligent transportation systems,” Comput. Stand.
Interfaces, vol. 47, pp. 108–119, 2016.
19. R. M. Fleming, K. M. Feldmann, and D. M. Fleming, “Comparing a high-dose dipyridamole SPECT imaging protocol with dobutamine
and exercise stress testing protocols. Part III: Using dobutamine to determine lung-to-heart ratios, left ventricular dysfunction, and a
potential viability marker,” Int. J. Angiol., vol. 8, no. 1, pp. 22–26, 1999.
20. H. J. Parkinson, G. Bamford, and B. Kandola, “The Development of an Enhanced Bowtie Railway Safety Assessmen t Tool using a Big
Data Analytics Approach,” Int. Conf. Railw. Eng. (ICRE 2016), pp. 1 (9 .)-1 (9 .), 2016.
21. D. Ulloa, P. Saleiro, R. J. F. Rossetti, and E. R. Silva, “Mining social media for open innovation in transportation systems,” IEEE Conf.
Intell. Transp. Syst. Proceedings, ITSC, pp. 169–174, 2016.
22. J. Yang and A. M. Anwar, “Social Media Analysis on Evaluating Organisational Performance: A Railway Service Management
Context,” Proc. - 2016 IEEE 14th Int. Conf. Dependable, Auton. Secur. Comput. DASC 2016, 2016 IEEE 14th Int. Conf. Pervasive
Intell. Comput. PICom 2016, 2016 IEEE 2nd Int. Conf. Big Data, pp. 835–841, 2016.
23. D. Efthymiou and C. Antoniou, “Use of Social Media for Transport Data Collection,” Procedia - Soc. Behav. Sci., vol. 48, pp. 775–
785, 2012.
24. N. N. Haghighi, X. C. Liu, R. Wei, W. Li, and H. Shao, “Using Twitter data for transit performance assessment: a framework fo r
evaluating transit riders’ opinions about quality of service,” Public Transp., vol. 10, no. 2, pp. 363–377, Aug. 2018.
25. S. Narayanaswami, “Digital social media: Enabling performance quality of Indian Railway services,” J. Public Aff., vol. 18, no. 4, p.
e1849, Nov. 2018.
26. A. Nikolaidou and P. Papaioannou, “Utilizing Social Media in Transport Planning and Public Transit Quality: Survey of Literature,” J.
Transp. Eng. Part A Syst., vol. 144, no. 4, p. 04018007, Apr. 2018.
27. S. Symeonidis, D. Effrosynidis, and A. Arampatzis, “A comparative evaluation of pre-processing techniques and their interactions for
twitter sentiment analysis,” Expert Syst. Appl., vol. 110, pp. 298–310, 2018.
28. D. Effrosynidis, S. Symeonidis, and A. Arampatzis, “A Comparison of Pre-processing Techniques for Twitter Sentiment Analysis,”
2017, pp. 394–406.
29. Z. Jianqiang and G. Xiaolin, “Comparison research on text pre-processing methods on twitter sentiment analysis,” IEEE Access, vol. 5,
pp. 2870–2879, 2017.
30. G. Angiani et al., “A comparison between preprocessing techniques for sentiment analysis in Twitter,” CEUR Workshop Proc., vo l.
1748, 2016.
31. Y. Bao, C. Quan, L. Wang, and F. Ren, “The Role of Pre-processing in Twitter Sentiment Analysis,” Int. Conf. Intell., pp. 615–624,
2014.
32. U. Farooq, H. Mansoor, A. Nongaillard, Y. Ouzrout, and M. Abdul Qadir, “Negation Handling in Sentiment Analysis at Senten ce
Level,” J. Comput., vol. 12, no. 5, pp. 470–478, 2017.
33. B. Ma, H. Yuan, and Y. Wu, “Exploring performance of clustering methods on document sentiment analysis,” J. Inf. Sci., vol. 4 3, no.
1, pp. 54–74, 2017.
34. T. Singh and M. Kumari, “Role of Text Pre-processing in Twitter Sentiment Analysis,” Procedia Comput. Sci., vol. 89, pp. 549–554,
2016.
35. V. J. Nirmal and D. I. G. Amalarethinam, “Parallel Implementation of Big Data Pre-Processing Algorithms for Sentiment Analysis of
Social Networking Data,” Intern. J. Fuzzy Math. Arch., vol. 6, no. 2, pp. 149–159, 2015.
36. R. Duwairi and M. El-Orfali, “A study of the effects of preprocessing strategies on sentiment analysis for Arabic text,” J. Inf. Sci., vol.
40, no. 4, pp. 501–513, 2014.
37. E. Haddi, X. Liu, and Y. Shi, “The Role of Text Pre-processing in Sentiment Analysis,” First Int. Conf. Inf. Technol. Quant. Manag.,
vol. 17, pp. 26–32, 2013.
38. R. Parikh and M. Movassate, “Sentiment analysis of user-generated twitter updates using various classification techniques,” Bus.
Mark., pp. 1–18, 2009.
39. M. A. Saloot, N. Idris, and R. Mahmud, “An architecture for Malay Tweet normalization,” Inf. Process. Manag., vol. 50, no. 5, pp.
621–633, 2014.
40. M. Oussalah, F. Bhat, K. Challis, and T. Schnier, “A software architecture for Twitter collection, search and geolocation services,”
Knowledge-Based Syst., vol. 37, pp. 105–120, 2013.
41. J. Fürnkranz, “A Study Using n\ngram Features for Text Categorization,” Austrian Res. Inst. Artifical Intell., no. 1998, pp. 1–10, 1998.
42. D. Jurafsky and J. H. Martin, “Slp4-1,” Speech Lang. Process., pp. 2–7, 2014.
43. M. Thelwall, “TensiStrength: Stress and relaxation magnitude detection for social media texts,” Inf. Process. Manag., vol. 53, no. 1, pp.
106–121, 2017.
44. M. T. AL-Sharuee, F. Liu, and M. Pratama, “Sentiment analysis: An automatic contextual analysis and ensemble clustering approach
and comparison,” Data Knowl. Eng., vol. 115, pp. 194–213, 2018.
45. S. L. Lo, R. Chiong, and D. Cornforth, “An unsupervised multilingual approach for online social media topic identification,” Expert
Syst. Appl., vol. 81, pp. 282–298, 2017.
46. K. Ogada, W. Mwangi, and C. Wilson, “N-gram Based Text Categorization Method for Improved Data Mining,” J. Inf. Eng. Appl.,
vol. 5, no. 8, pp. 35–44, 2015.
47. T. Parlar, S. A. Özel, and F. Song, “QER: a new feature selection method for sentiment analysis,” Human-centric Comput. Inf. Sci.,
vol. 8, no. 1, pp. 1–19, 2018.
48. A. Yousefpour, H. N. A. Hamed, U. H. H. Zaki, and K. A. M. Khaidzir, “Feature subset selection using mutual standard d eviation in
sentiment mining,” 2017 IEEE Conf. Big Data Anal. ICBDA 2017, vol. 2018-Janua, pp. 13–18, 2018.
49. Y. Gupta and A. Saini, “A novel Fuzzy-PSO term weighting automatic query expansion approach using combined semantic filtering,”
Knowledge-Based Syst., vol. 136, pp. 97–120, 2017.
50. B. Trstenjak, S. Mikac, D. D.-P. Engineering, and undefined 2014, “KNN with TF-IDF based Framework for Text Categorization,”
researchgate.net.
51. Jiawei, Data Mining : Concepts and, vol. 05. 2012.
52. J. Quinlan, C4. 5: programs for machine learning. 2014.

Authors: Umar Daeng Palallo, Muhammad Syafar, Ridwan Amiruddin, Indar, Ahmad Yani

Paper Title: The Effect of Life Skill Education on Cigarette Control in Adolescents
Abstract: Cigarettes are one of the leading causes of death in the world and are the only legal product that
kills up to half of its use. Smoking habit causes at least 30 types of diseases in humans. The purpose of this study
was to determine the effect of life skill education models on cigarette control in adolescents in Tellulimpoe
District, Sinjai Regency. The population in this study were all adolescents living in Tellulimpoe District, Sinjai
Regency. A sampling of research with selected purposive sampling and selected cluster sampling techniques.
Selected purposive sampling uses qualitative methods, with teenage informants aged 11 years to 15 years.
Selected cluster Sampling uses quantitative methods with teenage respondents. The selected sample was 318
respondents. The study was conducted for three months, namely 1 July to 30 October 2019. The results of the
study were that adolescent attitudes were good with the formation of a good smoking cessation category of 6
people (2.7%) and a category of less 217 people (97.3%) ; adolescent attitudes less with the formation of the
intention to stop smoking with a good category of 2 people (2.1%) and less categories of 93 people (97.3%).
Subjective norms are good with the formation of quitting intentions with good categories of 0 people (0%) and
fewer categories of 89 people (100%); subjective norms less with the formation of the intention to stop smoking
with a good category of 8 people (3.5%) and the category of less than 221 people (96.5%). Adolescent beliefs
are good with the formation of the intention to stop smoking with a good category of 0 people (0%) and 21
172. people fewer categories (100%); adolescent confidence is less with the formation of the intention to stop
smoking with a good category of 8 people (2.7%) and 289 people less (97.3%). The conclusions of the study are
adolescent attitudes, subjective norms, and beliefs to stop smoking form the intention to stop smoking. Research 1026-
1030
suggestions are needed for life skill education to control smoking behavior.

Keyword : Life Skills, Education, Smoking, Adolescent.


References:
1. S. hee Park, “Smoking and adolescent health,” Korean Journal of Pediatrics. 2011.
2. V. Maralani, “Understanding the links between education and smoking,” Soc. Sci. Res., 2014.
3. WHO, “Skills for Health, Skills-based health education including life skills: An important component of a Child-Friendly/Health-
Promoting School,” Inf. Ser. Sch. Heal., 2001.
4. V. Velasco et al., “Preventing Adolescent Substance Use Through an Evidence-Based Program: Effects of the Italian Adaptation of
Life Skills Training,” Prev. Sci., 2017.
5. B. Xi et al., “Tobacco use and second-hand smoke exposure in young adolescents aged 12-15 years: data from 68 low-income and
middle-income countries,” Lancet Glob. Heal., 2016.
6. S. E. Guo, P. A. Ratner, J. L. Johnson, C. T. C. Okoli, and S. Hossain, “Correlates of smoking among adolescents with asthma, ” J.
Clin. Nurs., 2010.
7. G. Zhao and C. Pechmann, “The impact of regulatory focus on adolescents’ response to antismoking advertising campaigns,” J. Mark.
Res., 2007.
8. R. M. Viner et al., “Adolescence and the social determinants of health,” Lancet, 2012.
9. R. Hanewinkel, B. Isensee, J. D. Sargent, and M. Morgenstern, “Cigarette Advertising and Adolescent Smoking,” Am. J. Prev. Med.,
2010.
10. J. E. James, Á. L. Kristjánsson, and I. D. Sigfúsdóttir, “Adolescent substance use, sleep, and academic achievement: Evid ence of harm
due to caffeine,” J. Adolesc., 2011.
11. J. A. Ladapo et al., “Tobacco use and smoking intentions among U.S. fifth-grade students,” J. Adolesc. Heal., 2014.
12. R. J. Hill, M. Fishbein, and I. Ajzen, “Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research.,” Contemp.
Sociol., 1977.
13. P. Kotier and G. Zaltman, “Social marketing: An approach to planned social change,” Soc. Mar. Q., 1996.
14. A. Loukas, M. Batanova, A. Fernandez, and D. Agarwal, “Changes in use of cigarettes and non -cigarette alternative products among
college students,” Addict. Behav., 2015.
15. A. W. Stacy, P. M. Bentler, and B. R. Flay, “Attitudes and Health Behavior in Diverse Populations: Drunk Driving, Alcohol Use ,
Binge Eating, Marijuana Use, and Cigarette Use,” Heal. Psychol., 1994.
16. S. Hall, D. P. French, and T. M. Marteau, “Do Perceptions of Vulnerability and Worry Mediate the Effects of a Smoking Cessation
Intervention for Women Attending for a Routine Cervical Smear Test? An Experimental Study,” Heal. Psychol., 2009.
17. M. Mason, J. Mennis, T. Way, and L. F. Campbell, “Real-Time Readiness to Quit and Peer Smoking within a Text Message
Intervention for Adolescent Smokers: Modeling Mechanisms of Change,” J. Subst. Abuse Treat., 2015.
18. C. A. Patten et al., “Web-based intervention for adolescent nonsmokers to help parents stop smoking: A pilot feasibility study,” Addict.
Behav., 2012.
19. S. R. Kim, H. K. Kim, J. Y. Kim, H. Y. Kim, S. H. Ko, and M. Park, “Smoking Cessation Failure Among Korean Adolescents,” J. Sch.
Nurs., 2016.
20. R. M. E. Huver, R. C. M. E. Engels, and H. De Vries, “Are anti-smoking parenting practices related to adolescent smoking cognitions
and behavior?,” Health Educ. Res., 2006.
21. S. Fernández-Artamendi, J. R. Fernández-Hermida, G. García-Fernández, R. Secades-Villa, and O. García-Rodríguez, “Motivation for
change and barriers to treatment among young cannabis users,” Eur. Addict. Res., 2013.

Authors: Ilavalagan P

Paper Title: Storage, Handling and Safety Procedure for Fuel in Oil & Gas Industry
Abstract: After Finding the oil & gas occurrences in the subsurface using various methods and tools that
were available in Upstream Oil and Gas Industry. Further reaching the reservoir and taking out the Oil & Gas
from those to the surface the fuel have to transport and store to get purify for supply to the required user. Here
the Midstream peoples plays a vital role in it. The drilled Oil and Gas have to transport from the occurrence to
the destination Refinery so it have to be planned well and many safety procedure have to be done to avoid any
problem in those transportation and after transporting to the destination it must be maintained in perfect
temperature condition and perfect storage tanks either above the ground or the underground .Again there are
173. some safety procedures to be followed which were approved by the Government safety norms. This article deal
about the process and procedures in transporting and storage of fuels from upstream to midstream to
downstream .Also about the safety precaution and procedure to be followed to have a safe storage and handling. 1031-
1032

Keyword : Fuel Storage, Fuel Supply, Fuel Safety etc..


References:
1. A.P.SZILAS Production and Transportation of Oil and Gas pp 87-104
2. ELTON SIMMONS Oil and Gas Transportation pp 172-177
3. MIKHAI Modeling of oil product and gas pipeline transportation pp182-184
4. http://www.jetir.org/papers/JETIR1807576.pdf
5. http://www.jetir.org/papers/JETIR1807798.pdf
6. http://www.jetir.org/papers/JETIR1807995.pdf

Authors: Arif Ahmed, Asma Ul Hosna, Syed Masrur Ahmed


Enhancement of Heat Transfer using Combination of Perforated Co-Swirl Twisted Tape Insert and
Paper Title:
Nanofluids
Abstract: This analysis was carried out for enhancing tube side heat transfer performance by co-swirl
twisted tape insert with ethylene glycol-water base TiO2 Nano-fluids. The test section consists of a long copper
tube of 26.6 mm internal diameter and 30mm outer diameter and 900 mm effective length. Each stainless steel
insert was 850 mm in length, 10 mm in width, 1.5 mm thickness and the twisted ratio was 4.25. For measuring
the bulk temperature two thermometers were used at the inlet and outlet section of the circular tube. Four K-
thermocouples were used in the experiment section to determine the temperature of the outer surface. From
rotameter, a definite amount of mass flow rate was measured for the calculation of flow velocity. As well as
from manometer reading, pressure head was measured for determining pressure difference of the flow section. A
nichrome wire was surrounded around the pipe for uniform heat flux. Nusselt numbers for i) combination of
174. perforated co-swirl twisted tape insert and 0.03% volume fraction of Nanofluids (TiO2/Ethylene Glycol/Water),
ii) combination of perforated co-swirl twisted tape insert and 0.01% volume fraction of Nanofluids 1033-
(TiO2/EG/Water), and iii) combination of perforated co-swirl twisted tape insert and water were increased by 1036
56.72%, 61.52%, 77.98% respectively than the plain tube.

Keyword : Co-swirl twisted tape, nanofluids, Nusselt number, twist ratio.


References:
1. M. A. Agung Tri Wijayanta, Pranowo, Mirmanto, Budi Kristiawan, “Internal Flow in an Enhanced Tube Having,” Energies 2019, 12,
306, pp. 1–12
2. S. Xie, J. Feng, and G. Zhang, “Study on simulation traction load with regenerative braking,” Energy Procedia, vol. 14, pp. 1299–1304,
2012
3. S. Tabatabaeikia, H. A. Mohammed, N. Nik-Ghazali, and B. Shahizare, “Heat Transfer Enhancement by Using Different Types of
Inserts,” Adv. Mech. Eng., vol. 2014, 2014.
4. M. K. Abdolbaqi, W. H. Azmi, R. Mamat, N. M. Z. N. Mohamed, and G. Naja, “Experimental investigation of turbulent heat transfer
by counter and co-swirling flow in a flat tube fitted with twin twisted tapes ☆,” vol. 75, pp. 295–302, 2016.
5. Y. Zeng, X. Zhong, Z. Liu, S. Chen, and N. Li, “Preparation and Enhancement of Thermal Conductivity of Heat Transfer Oil-Based
MoS2 Nano-fluids,” 2013.
6. W. Yu, H. Xie, Y. Li, L. Chen, and Q. Wang, “Experimental investigation on the heat transfer properties of Al 2O3 nanofluids using the
mixture of ethylene glycol and water as base fluid,” Powder Technol., vol. 230, pp. 14–19, 2012
7. K. V Sharma, S. K. Vandrangi, K. Habib, and S. Kamal, “Influence of Ethylene Glycol and Water Mixture Ratio on Al 2O3 Nanofluid
Turbulent Forced Convection Heat Transfer,” vol. 7, no. 6, pp. 123–128, 2016
8. M. C. S. Reddy and V. V. Rao, “Experimental studies on thermal conductivity of blends of ethylene glycol-water-based TiO2
nanofluids ☆,” Int. Commun. Heat Mass Transf., vol. 46, pp. 31–36, 2013.
Bambang Leo Handoko, Archie Nathanael Mulyawan, Josephine Samuel, Klara Karlita Rianty,
Authors:
Steven Gunawan
Paper Title: Facing Industry Revolution 4.0 for Millennial Accountants
Abstract: The background of this research is to give an overview to millennial accountants of various
challenges that will be faced by the accounting profession in the future. The background of writing this essay is
because Indonesia will be affected by the Industrial Revolution 4.0 which will cause jobs to disappear, emerge
and change. This research is directed to solve the solutions that occur in millennial accountants in making
strategies to deal with these changes by paying attention to conditions in the 4.0 era where technology has
developed rapidly and is living side by side with humans. Technology that has developed rapidly is certainly not
an obstacle for millennial generation accountants to get a job. One technology that is booming is Artificial
Intelligence (AI). AI Began to become a part of work activities at the start of the Industrial Revolution 4.0. With
this advanced technology, all things can be handled well and is a helper for today's companies in processing
large amounts of data. Therefore, many people assume that the role of accountants will be replaced by machines.
But if you look further, it is the lack of skills and information regarding the operation of the technology that
causes new accountants such as millennial generation to feel threatened by the presence of technology. By
learning more about the accounting profession in the future, accountants can collaborate with machines to
advance life as a unit of valuable assets. All of this was done so that they could remain competitive and not be
left behind in the rapid development of technology.

Keyword : Millennial, industry revolution 4.0, artificial intelligence, professional, accountant


References:
1. L. Sommer, “Industrial revolution - Industry 4.0: Are German manufacturing SMEs the first victims of this revolution?,” J. Ind. Eng.
Manag., vol. 8, no. 5, pp. 1512–1532, 2015.
2. M. Hermann, T. Pentek, and B. Otto, “Design principles for industrie 4.0 scenarios,” Proc. Annu. Hawaii Int. Conf. Syst. Sci., vol.
2016-March, pp. 3928–3937, 2016.
3. World Economic Forum, “The Future of Jobs Employment, Skills and Workforce Strategy for the Fourth Industrial Revolution,”
175. Growth Strateg., no. january, pp. 2–3, 2016.
4. M. Piccarozzi, B. Aquilani, and C. Gatti, “Industry 4.0 in management studies: A systematic literature review,” Sustain., vol. 10, no. 1037-
10, pp. 1–24, 2018. 1042
5. N. Sivakumar and R. Balasubramanian, “Fraud Detection in Credit Card Transactions: Classification, Risks and Prevention
Techniques,” Int. J. Comput. Sci. Inf. Technol., vol. 6, no. 2, pp. 1379–1386, 2015.
6. C. Jaslove, “The rise of artificial intelligence : An analysis on the future of accountancy,” no. April, pp. 1–20, 2017.
7. B. L. Handoko, D. L. Warganegara, and S. Ariyanto, “Perception Of Financial Auditor On Usage Of Computer Assisted Audit
Techniques,” in 2018 3rd IEEE International Conference on Computational Intelligence and Application, 2018.
8. J. Dai and M. A. Vasarhelyi, “Imagineering audit 4.0,” J. Emerg. Technol. Account., vol. 13, no. 1, pp. 1–15, 2016.
9. J. Lachman, M. Gerstein, and H. H. Friedman, “The Millennial Accountant.,” Proc. Northeast Reg. Decis. Sci. Inst., no. July, pp. 269–
289, 2014.
10. R. Widuri, B. L. Handoko, and I. E. Riantono, “Perception of Accounting Student on Learning of Generalized Audit Software,” 2019.
11. R. Rahayu and J. Day, “Determinant Factors of E-commerce Adoption by SMEs in Developing Country: Evidence from Indonesia,”
Procedia - Soc. Behav. Sci., vol. 195, pp. 142–150, 2015.
12. B. Des Yaninen, “Artificial Intelligence and the Accounting Profession in 2030,” 2017.
13. S. Russell and P. Norvig, “인공지능 ( Artificial Intelligence ),” Artif. Intell. Futur. Account., 2009.
14. B. L. Handoko and R. Widuri, “The impact of auditor communication and due professional care on client responses to inquiries for
successful audit process,” in Proceedings of 2016 International Conference on Information Management and Technology, ICIMTech
2016, 2017.
15. A. Gui, Y. Fernando, A. Septiani Wiwoho, B. Leo Handoko, and H. Haron, “The Influence of Internal Control, Leadership Style, and
Teamwork to Information System Project Success,” KnE Soc. Sci., 2019.
16. R. ’u Abdullahi and N. Mansor, “Fraud Triangle Theory and Fraud Diamond Theory. Understanding the Convergent and Divergent For
Future Research,” Int. J. Acad. Res. Account. Financ. Manag. Sci., vol. 5, no. 4, pp. 38–45, 2015.
17. C. Chiu, S. Chen, and C. Chen, “An Integrated Perspective of TOE Framework and Innovation Diffusion in Broadband Mobile
Applications Adoption by Enterprises,” Int. J. Manag. Econ. Soc. Sci., vol. 6, no. 1, pp. 14–39, 2017.
18. B. L. Handoko, R. Widuri, and H. Sarjono, “The effect of third party auditor and quality of service through c loud storage security to
cloud user trust,” 2017 9th IEEE Int. Conf. Commun. Softw. Networks, ICCSN 2017, vol. 2017-Janua, pp. 1397–1401, 2017.
19. E. I. Okoye, Fiia, and F. Fsm, “Forensic Accounting: A Tool for Fraud Detection and Prevention in the Public Sec tor. (A Study of
Selected Ministries in Kogi State),” Int. J. Acad. Res. Bus. Soc. Sci., 2013.
20. T. Supriadi, S. Mulyani, E. M. Soepardi, and I. Farida, “Influence of Auditor Competency in Using Information Technology on the
Success of E-audit System Implementation,” vol. 15, no. 10, 2019.
21. B. L. Handoko, Meiryani, S. Sabrina, and N. Ayuanda, “Admission of Information Technology in External Audit Profession: Impac t of
Organizational, Social and Individual Factors,” 2019.

Authors: Santhosha Rao, Varun S Tilekar, Niranjana Sampathila

176. Paper Title: Homecare System for Demented People using IoT
Abstract: Internet of Things (IoT) provides many homecare systems and makes an easier life for humans. 1043-
Some homecare systems are really useful for aged people. In our society, many aged people are suffering from a 1046
disease called dementia. Dementia word describes the set of symptoms that may contain memory loss and
difficulty with thinking. The demented people are unable to recognize their family members. Also they have
difficulty to deal with day to day activities. Taking care of such people is not a dominant task if assigned to a
caretaker, but some people may not afford these much of expenses. Even if it is assigned to the caretaker, they
may be burdened with the amount of care required. In this work, to reduce the burden on the caretakers, a
homecare system using IoT is designed. An android camera phone installed at the door recognizes the face of the
arrived person and sends an unique identifier wirelessly to an android watch wore by the demented person. The
android watch alerts the user with vibration. Also, it opens the locally stored image using the unique identifier
and announces the name of the arrived person. Reminder application is also used to remind the day to day
activities with voice commands.

Keyword : Internet of Things (IoT), OpenCV, LBPH, Face Recognition.


References:
1. S.Saranya, JesuJayarin, “An efficient tracking device for alzheimer patient using MiWi”, International Research Journal of
Engineering and Technology (IRJET), Volume 04, Issue 04, April 2017.
2. Dawadi R , Asghar, Zeeshan, Pulli, Petri, “Internet of Things Controlled Home Objects for the Elderly”, In Proceedings of the 10th
International Joint Conference on Biomedical Engineering Systems and Technologies, pages 244-251, 2017.
3. Majumder S, Aghayi E, Noferesti M, Memarzadeh-Tehran H, Mondal T, Pang Z, Deen MJ, “Smart Homes for Elderly Healthcare -
Recent Advances and Research Challenges”, Sensors, volume 17, issue 11, 2017.
4. Ashfaq Amir Shaikh, Rashida Wasiullah Ansari, Sabaah Amin Navlekar, Shubham Dinesh Singh, “Internet of Things (IoT) Based
Smart Healthcare System”, International Journal of Advance Engineering and Research and Development, Volume 5, Issue 1, January
2018.
5. Ashfaq Amir Shaikh, Nitin Santosh Gupta, Abid Din Mohammed Khan, Husain Taha Artist, “Android and Internet of Things (IOT)
Based Alzheimer Care/Rehabilitation System to Monitor and Progress Patient Health Condition”, International Journal of Innovative
Research in Computer and Communication Engineering, Vol. 5, Issue 3, March 2017.
6. Jean F. Coppola, Marc A. Kowtko, Christina Yamagata, Shannon Joyce, “Applying Mobile Application Development to Help
Dementia and Alzheimer Patients”, Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 2013.
7. Frank Sposaro, Justin Danielson, Gary Tyson, “iWander: An Android Application for Dementia Patients”, Proceedings of Annual
International Conference of the IEEE Engineering in Medicine and Biology Society, Buenos Aires, Argentina, August 31 - September
4, 2010.
8. Mohammed Hayyan ALSIBA, Hadi Bin Manap, Abdul Adam Bin Abdullah, “Enhanced face recognition method performance on
android vs windows platform”, ARPN Journal of Engineering and Applied Sciences, Vol 10, No 23, December 2015.
9. Website: https://docs.opencv.org/3.3.1/da/d60/tutorial_face_main.html
10. Website:https://towardsdatascience.com/face-recognition-how-lbph-works 90ec258c3d6b

Authors: Puspanjali Hazarika

Paper Title: Language Technology and Computational Linguistics


Abstract: In the present world information technology is predominant which has the ability to change the
future of this Globe. Being a Futuristic Technology. Computational linguistics can change communication
models among human beings. Due to the changing context and development of Natural Language Processing
various new doors are open in the fields of computational linguistics. Computational Linguistics (CL) increases
the applicability of Language Technology towards man-machine interactions. Globalization can convert the
world into a small village. For interchange human knowledge among various communities, Auto language
processing play a vital role. In this paper, it is tried to discuss the various dimension of language technology and
computational linguistics.
177.
Keyword : Language Technology, Natural Language Processing, Machine Translation Computational 1047-
linguistics, Human language, Assamese. 1049

References:
1. E. Stabler. Notes on computational linguistics. UCLA, winter 2003
2. Iman Muwafaq Muslim Muwafaq Al-Ghabra. An Introduction to Computational Linguistics Advantages& Disadvantages. J. OF COL.
OF B .ED. NO.51 2007
3. Karen Sparck Jones Computational linguistics: what about the linguistics? Computational Linguistics, 2007.
4. Hausser. Ronald. Foundation of Computational Linguistics: Human-computer communication in natural language. Springer. 2001
5. Reiter. Ehud & Dale, Robert. Building Natural Language Processing System. 2000
6. Bailly, Gerard (ed). AudioVisual Speech Processing. 2012
7. Jurafsky, Daniel & Martin, James H. Speech and Language Processing. 2000
8. Ranta, Aarne. Grammatical Framework: Programming with Multilingual Grammars. 2011.

Authors: G.Jose Moses, N.Supriya

Paper Title: A Novel Multicast Routing Protocol for Mobile Ad-Hoc Networks
Abstract: We present a novel approach multicast routing protocol using Ant Colony Optimization and Cross
Layer Technique. This protocol is an enhancement of the existing on-demand multicast routing protocol
178. (ODMRP). Establishing communication through portable devices without any central infrastructure is possible
in Ad-hoc networks. This feature of the absence of a central infrastructure and the random mobility of the 1050-
devices give rise to multiple problems involving in security and routing. The challenges encountered by these 1054
multicast routing protocols are to provide a secured and efficient routing in these networks. In this paper we
intend to present a novel approach of on-demand multicast routing protocol using Ant Colony Optimization and
Cross Layer Technique. With this enhanced feature of cross layer technique and by applying ant colony
optimization the proposed protocol performs more efficient with minimal overhead. The performance levels of
the proposed algorithm at higher traffic load in comparison to the existing algorithms are evident from the
simulations performed using NS-2.

Keyword : Ant Colony Optimization, Cross Layer Technique, Multicast Routing Protocol, ODMRP.
References:
1. E.M.Royer.,Chai-Keong.Toh., April 1999. A review of current routing protocols for ad hoc mobile wireless networks, IEEE Personal
Communications, Vol.6(2), pp. 46–55.
2. Freebersyser, J.A., and Barry Leiner, 2001. A DoD perspective on mobile ad hoc networks, Charles E. Perkins (Ed.), Ad Hoc
Networking, Addison Wesley, pp. 29 - 51.
3. G.Jose Moses, Dr.P.Suresh varma, N.Supriya, 2012.’A Review on routing protocols in mobile adhoc networks’. IJARCS;
Vol.3,No.1,Jan-Feb,pp.59-64.
4. Asis Nasipuri, Samir R.Das, Oct.1999.‘On-demand multipath routing for mobile ad hoc networks’. Proc. Eighth Int. Conf. on
Computer Communications and Networks,; pp. 64–70.
5. Zhang, B., Mouftah, H.T., 2006.‘Destination-driven shortest path tree algorithms’, J. High Speed Network.,Vol.15, (2), pp. 123– 130.
6. Misra, S., Obaidat, M.S., Dhurandher, S.K., Verma, K., Gupta, P., 2009 ‘Using ant-like agents for fault-tolerant routing in mobile ad-
hoc networks’. ICC, pp. 1–5.
7. P. Venkata Krishna, V. Saritha, G. Vedha, A. Bhiwal and A.S. Chawla, 2012 “Quality-of-service-enabled ant colony-based
multipathrouting for mobile ad hoc networks”, IET Commun., Vol. 6, Iss. 1, pp. 76– 83.
8. G.Jose Moses, Dr.P.Suresh varma, N.Supriya, 2012.‘CL-S-ODMRP- A Cross Layered Secure ODMRP for Achieving High-
Throughput in Wireless Networks’, European Journal of Scientific Research,Vol. 87, No 2, pp.251-260.
9. Misra, S., Obaidat, M.S., Dhurandher, S.K., Verma, K.,,2009.‘Using ant-like agents for fault-tolerant routing in mobile ad-hoc
networks’. ICC, 2009; pp. 1–5.
10. P. Venkata Krishna and Iyengar, 2007. “A Cross Layer Based Qos Model For Wireless And Mobile Networks” Journal of Mobile
Communication. Iss.1 (4), pp. 114-120.
11. Sivakumar, D.; Suseela, B.; Varadharajan, R, 2012, "A survey of routing algorithms for MANET," Advances in Engineering, Science
and Management (ICAESM), International Conference, vol.30,pp.625-640.
12. NS-2, the NS Manual (formally known as NS Documentation) available at http://www.isi.edu/nsnam/ns/doc.

Authors: T. Mohanasundaram, P. Karthikeyan, V. Krishnamoorthy


Do Technology Advanced Modern Banks Outperform Traditional Banks in India? - an Empirical
Paper Title:
Insight
Abstract: This research paper examined whether modern banks viz., foreign origin banks in India and the
Indian new generation private banks outperform the conventional banks viz., public sector banks and old
generation private banks. The modern banks are technology driven and have a upper hand in offering ancillary
services vis-à-vis traditional banks. The study explores theperformance of different banking groups by analysing
the interconnections among asset quality, financial soundness, profitability and credit growth of different bank
groups in India since 2005 to 2018. Asset quality signifies an important role in the financial health of the banks.
Reserve Bank of India (RBI) levied severe asset quality measures on banks operating in India during 2015-
16.This unfolds the long hidden financial miseries. The regulators and central banks across the world worked
persistently towards enhancing the banks’ ability to observe the inherent and external risks. As a result of this,
stringent capital norms based on risk-weighted classification of assets were implemented to ensure financial
soundness of the banks. These two policy measures brought a drastic changes in the Indian banking sphere.
These changes perhaps lead to interesting research questions viz., do they affect profitability and credit growth
of the banks? We addressed this research question through empirical analysis. Further, to identify whether the
technology-based modern banks performs better in comparison to traditional banks, the paper measures the
effect of these norms on different bank groups viz., public sector banks, private old sector banks, private new
generation banks and banks from foreign origin by drawing comparisons between pre-implementation period
and post-implementation period of these norms. The study comprised all banks in different banking groups
179. which were operating since 2005. The data were collected from CMIE prowess IQ and various Reserve Bank
(RBI) reports. The study outcome is expected to disclose possible nexus among the chosen variables with 1055-
reference to different bank groups and also reveals whether modern banks better than traditional banks. 1063

Keyword : Technology, Asset quality, Financial soundness, Profitability, Credit growth, Risk
References:
1. Ameur, I.G.B., and Mhiri, S.M., (2013). Explanatory Factors of Bank Performance Evidence from Tunisia.International Journal o f
Economics, Finance and Management, Vol. 2, No. 1, pp. 143-152
2. Anbar, A and Alper, D (2011). Bank Specific and Macroeconomic Determinants of Commercial Bank Profitability: Empirical
Evidence from Turkey.Business and Economics Research Journal, Vol. 2, No. 2, pp. 139-152
3. Borio, C., Gambacorta, L and Hofmann, Boris (2015). The influence of monetary policy on bank profitability, BIS Working Papers No.
514, Monetary and Economic Department
4. Boudriga, A, Boulila, Neila, Jellouli and Sana, “Does Bank Supervision Impact Nonperforming Loans: Cross-Country Determinants
Using Aggregate Data”, MPRA Paper No. 18068
5. Bukhaari and Quodous (2012). Internal and external determinants of profitability of banks; evidence from Pakistan, Interdisciplinary
Journal of Contemporary Research in Business, Vol. 3, No. 9, pp. 1037-1058
6. Claessens, S., Coleman, N and Donnelly, M (2017). Low-For-Long’ Interest Rates and Banks’ Interest Margins and Profitability: Cross
Country Evidence, Board of Governors of the Federal Reserve System, International Finance Discussion Paper Number 1197
7. Djiogap, Fouopi and Ngomsi, Augustin (2012). Determinants of Bank Long-term Lending Behavior in the Central African Economic
and Monetary Community (CEMAC), Review of Economics & Finance, Vol.2, pp 107-114
8. Godlewski, C.J. (2005). Bank capital and credit risk taking in emerging market economies.Journal of Banking Regulation, Vol. 6, No.
2, pp. 128-145
9. Gyamerah, I.A., and Benjamin, A (2015). Determinants of Bank Profitability in Ghana. International Journal of Accounting and
Financial Reporting, Vol. 5, No. 1, pp.173-187
10. Kasana, S.I. and Naveed, Q.M. (2016). The Determinants of Credit Risk in Commercial Banks of Pakistan.Journal of Poverty,
Investment and Development, Vol. 25, 65-72
11. Kohlscheen, E., Murcia, A., and Contreras, J. (2018). Determinants of bank profitability in emerging markets.BIS Working Papers No.
686, Monetary and Economic Department
12. Laveena and Guleria, K.S. (2016). A Study of Non-Performing Assets of Public Sector Banks in India.International Journal of
Research in Engineering, IT and Social Sciences, Vol. 6, Issue. 4, pp 26-34
13. Nachane, D.M., Narain, Aditya, Ghosh, Saibal, and Sahoo, S (2001). Bank response to capital requirements: Theory and Indian
evidence.MPRA Paper No. 17453
14. Owoputi, J.A., Kayode, O.F and Adeyefa, F.A., (2014). Bank specific, Industry specific and Macroeconomic determinants of bank
profitability in Nigeria.European Scientific Journal, Vol.10, No.25, pp. 408-423
15. Pausch, Thilo and Welzel, Peter. (2002).Credit Risk and the Role of Capital Adequacy Regulation.Discussion Paper Series 224,
Universitaet Augsburg, Institute for Economics
16. Petria, Nicolae, Capraru, Bogdan and Ihnatov, Iulian (2015).Determinants of Banks’ Profitability: Evidence from EU 27 Banking
Systems. Procedia Economics and Finance, Vol. 20, pp. 518-524
17. Poudel, S.R. (2018). Assessment of credit risk in Nepali commercial banks.Journal of Applied and Advanced Research, Vol. 3, No.3,
pp 65-72
18. Reserve Bank of India Bulletin (2018). Volume LXXII Number 5,
https://rbidocs.rbi.org.in/rdocs/Bulletin/PDFs/0BULLMAY20188E3D1D64EF46402A9141C9DBA570066F.PDF
19. Sahoo, Satyananda. (2013). Financial Structures and Economic Development in India: An Empirical
Evaluation.https://www.researchgate.net/publication/260255801_Financial_Structures_and_Economic_Development_in_India_An_Em
pirical_Evaluation
20. Seth, Gaurav (2016).Does Global Capital Adequacy Regulation Hamper Credit Growth? Evidence from Indian Banks. The India
Finance Conference 2016, Indian Institute of Management, Ahmedabad
21. Sheefeni, P J (2015). The Macroeconomic Determinants of Profitability among Commercial Banks in Namibia.Journal of Emerging
Issues in Economics, Finance and Banking (JEIEFB) An Online International Research Journal, Vol. 4 No. 1, pp. 1414 -1431
22. Sing and Chaudhary (2009). Profitability Determinants of Banks in India.International Journal of Global Business, Vol. 2, No. 1, pp.
163-180
23. Sufian (2011). Profitability of the Korean Banking Sector: Panel evidence on bank-specific and Macroeconomics Determinants.Journal
of Economics and Management, Vol. 07, No. 1, pp.43-72.
24. Swamy, V. (2012). Impact of macroeconomic and endogenous factors on nonperforming bank assets.International Journal of Bankin g
and Finance, Vol.9, No. 1(2), pp 27-47
25. Vishwanathan, N.S. (2016). Asset Quality of Indian Banks: Way Forward. National Conference of ASSOCHAM, New Delhi,
https://rbi.org.in/scripts/BS_SpeechesView. aspx?Id=1023
26. Wanjohi, F.M. and Njeru, A (2016). Effect of Management Efficiency on Credit Risk in Deposit Taking Saccos in Kenya. The
Strategic Journal of Business and Change Management, Vol.3, Issue. 2 (41), pp 920-933.
27. Neha Chhabra Roy and Viswanathan, T (2018). Impact of Technological Disruption on Workforce Challenges of Indian Banks –
Identification, Assessment & Mitigation. Report - Indian Institute of Banking and Finance.
28. Tulasi Rao, G. and Lokeswara Rao, T (2015). Role of Information Technology in Indian Banking Sector. IOSR Journal of Busines s
and Management, Vol.17, No. 5, pp. 80-84.
29. Parameswar, Nakul., Dhir, Swati., andDhir, Sanjay (2016). Banking on Innovation: Innovation on Banking at ICICI Bank, Global
Business and Organisational Excellence, Wiley Periodicals Inc., DOI: 10.1002/joe, pp. 7-10
30. Alt, R., and Puschmann, T. (2016). Digitalisierung der Finanzindustrie–Grundlagen der Fintech-Evolution. Springer, Berlin/
Heidelberg.

Authors: D. Prabu, A. Giriprasath, V. Prasanna, G. Mohanakrishnan, S. Viknesh

Paper Title: Mechanical Behaviour of Palm Fiber (Palmyra Spout) – Basalt Fiber - Hybrid Composites
Abstract: In general the natural fibers are taken out from the sources of animals and plants. In recent days
the natural fibers play an important role in engineering applications like automotive, aerospace and marine
industries due to abundant availability, less in cost and zero percentage environment harmless in nature. In this
paper the investigation of various mechanical properties of hybrid reinforced composite (Palm fiber Basalt S-
glass fiber) is been done on the fabricated samples. The different mechanical property includes tensile, hardness
and impact tests etc... The fabrication comprises three layers of Palm and Basalt fibers outer laminated by two
layers of S-glass fibers using injection molding method. From the various testing and investigation against the
test sample it is been concluded that the fibers in the hybrid set took a major role in determining the important
mechanical properties. Thus the fibers present in the hybrid composite increases the strength, stiffness and
weight ratio of the composite materials. The various forms and structural analysis of the hybrid composite
material are processed by using scanning electron microscope for attaining the better results and application
basis.
180.
Keyword : Natural palm and Basalt fibers, glass fibers, Composite Fabrication, Injection moulding, 1064-
Mechanical properties. 1070
References:
1. Stamboulis A, Baillie C and Peijs T. Effects of environmental conditions on mechanical and physical properties of flax fibers.
Composites: Part A 2001; 32: 1105-1115.
2. Biagiotti J, Puglia D and Kenny JM. A Review on Natural Fiber-Based Composites-Part I. Journal of Natural Fibers 2004; 1, 2: 37-68.
3. K.Raju, M.Balakrishnan ‘’Evaluation of mechanical properties of palm fiber/glass fiber and epoxy combined hybrid composite
laminates’’ Materials today proceedings doi: 10.1016/j.matpr.2019.05.359
4. Amir Asadi, Ferdinand Baaij, Hendrik Mainka, Michael Rademacher, Jeffrey Thompson, KyriakiKalaitzidou, “Basalt fibers as a
sustainable and cost-effective alternative to glass fibers in sheet molding compound (SMC)”, Composites Part B 123 (2017).
5. D. Prabu, T. Babu, K. Pradeep & S. Sanjayarun (2018) A review on mechanical properties of intra-layer palm fiber (palmyra spout) –
flax – s-glass fiber reinforced composite. Vol. 8, Issue 3, Jun 2018, 489-498 © TJPRC Pvt. Ltd
6. Bin Hao, Theresa Förster, Edith Mäder, Peng-Cheng Ma “Modification of basalt fiber using pyrolytic carbon coating for sensing
applications” Composites: Part A 101 (2017) 123–128
7. P. Pradeep., J. Edwin Raja Dhas. 2015. Evaluation of Mechanical Property on Palm/Coir Based Polymer Matrix Composites.
Advances in Materials Science and Engineering: An International Journal. 2: 9-16.
8. V. Fiore, T. Scalici, G. Di Bella, A. Valenza , “A review on basalt fiber and its composites”, Composites Part B 74 (2015) 74e94.
9. K.L.Pickering, M.G. AruanEfendy, T.M.Le, (2016) A review of recent developments in natural fibre composites and their mechanical
performance. Part A 83 (2016) 98–112.
10. Summerscales J, Dissanayake N PJ, Virk A S and Hall W. A review of basalt fibers and their composites. Part 1 – Fibres as
reinforcements, and their composites. Part 1 – Fibres as reinforcements. Composites: Part A, 2010; 41: 1329–1335.

Ruqaya Gilal, Mazni Omar, Abdul Rehman Gilal, Mawarny Md Rejab, Ahmed Waqas, Kamal
Authors:
Imran Mohd Sharif
Paper Title: Can Time Pressure and Personality Make any Sense together in Software Engineering?
Abstract: Nowadays, software development failure has become a very serious problem. Inaccurate time
estimation is one of the major causes of the software development failure. Inaccurate time estimation mostly
creates time pressure that causes several negative impacts on software developers’ mental and physical health.
The past studies had also believed that burnouts and job turnover problems happened due to time pressure.
Therefore, the objective of this study is to explore time pressure with human behavior to see if they can make
any relation. By this way, one can explore the hidden patterns between time pressure and human behavior in
software engineering. In order to carry out the study, personality and time pressure studies are explored in
general to see if past studies had ever made any space for software domain. Moreover, based on the limited
selected studies, the literature review identifies that several authors had correlated the time pressure with
personality. Unfortunately, time pressure and software developer personality are not specifically studied
together in software engineering. For that reason, this study leaves some recommendations for researchers to
contribute in the very topic to make software development better.

Keyword : Time pressure; Software engineering; Personality; Gender


References:
1. The Standish Group, “Big Bang Boom,” Web, p. 12, 2014.
2. A. R. Gilal, J. Jaafar, L. F. Capretz, M. Omar, S. Basri, and I. A. Aziz, “Finding an effective classification technique to d evelop a
software team composition model,” J. Softw. Evol. Process, vol. 30, no. 1, 2018.
3. R. R. Nelson, “IT Project Management: Infamous Failures, Classic Mistakes, and Best Practices,” MIS Q. Exec., vol. 6, pp. 67–78,
2007.
4. M. K. Wright and C. J. Capps, “Information systems development project performance in the 21st century,” ACM SIGSOFT Softw.
Eng. Notes, vol. 35, p. 1, 2010.
5. I. Silla and N. Gamero, “Shared time pressure at work and its health-related outcomes: Job satisfaction as a mediator,” Eur. J. Work
Organ. Psychol., 2014.
6. C. L. Cooper, C. P. Cooper, P. J. Dewe, M. P. O’Driscoll, M. P. O’Driscoll, and P. J. Dewe, Organizational stress: A review and
critique of theory, research, and applications. Sage, 2001.
7. M. Baer and G. R. Oldham, “The curvilinear relation between experienced creative time pressure and creativity: moderating effects of
openness to experience and support for creativity.,” J. Appl. Psychol., vol. 91, no. 4, p. 963, 2006.
8. G. Labianca, H. Moon, and I. Watt, “When is an hour not 60 minutes? Deadlines, temporal schemata, and individual and task group
181. performance,” Acad. Manag. J., vol. 48, no. 4, pp. 677–694, 2005.
9. S. Ohly and C. Fritz, “Work characteristics, challenge appraisal, creativity, and proactive behavior: A multi-level study,” J. Organ.
Behav., vol. 31, no. 4, pp. 543–565, 2010. 1071-
10. S. Gilboa, A. Shirom, Y. Fried, and C. Cooper, “A meta-analysis of work demand stressors and job performance: examining main and 1075
moderating effects,” Pers. Psychol., vol. 61, no. 2, pp. 227–271, 2008.
11. M. V Mäntylä, K. Petersen, T. O. A. Lehtinen, and C. Lassenius, “Time pressure: a controlled experiment of test case development
and requirements review,” in Proceedings of the 36th International Conference on Software Engineering, 2014, pp. 83–94.
12. L. F. Capretz, F. Ahmed, A. Ain, and U. A. Emirates, “Why Do We Need Personality Diversity in Software Engineering ? ACM
SIGSOFT Software Engineering Notes,” vol. 35, no. 2, 2010.
13. jan Francis-smythe and Roberston Ivan, “Time related individual differences,” Hisp. J. Behav. Sci., vol. 9, no. 2, pp. 183–205, 1999.
14. M. Z. Tunio et al., “Impact of Personality on Task Selection in Crowdsourcing Software Development: A Sorting Approach,” IEEE
Access, 2017.
15. M. De Paola and F. Gioia, “Who performs better under time pressure? Results from a field experiment,” J. Econ. Psychol., vol. 53, pp.
37–53, 2016.
16. P. Verdonk, V. Räntzsch, R. De Vries, and I. Houkes, “Show what you know and deal with stress yourself: A qualitative intervi ew
study of medical interns’ perceptions of stress and gender,” BMC Med. Educ., vol. 14, no. 1, 2014.
17. M. Kuutila, M. Mäntylä, U. Farooq, and M. Claes, “Time Pressure in Software Engineering: A Systematic Literature Review,” arXiv
Prepr. arXiv1901.05771, 2019.
18. A. J. Kinicki and R. P. Vecchio, “Influences on the quality of supervisor--subordinate relations: The role of time-pressure,
organizational commitment, and locus of control,” J. Organ. Behav., vol. 15, no. 1, pp. 75–82, 1994.
19. M. Raby and C. D. Wickens, “Strategic workload management and decision biases in aviation,” Int. J. Aviat. Psychol., vol. 4, no. 3,
pp. 211–240, 1994.
20. J. M. George and G. R. Jones, “The experience of work and turnover intentions: Interactive effects of value attainment, job
satisfaction, and positive mood.,” J. Appl. Psychol., vol. 81, no. 3, p. 318, 1996.
21. L. F. Capretz, “Personality types in software engineering,” Int. J. Hum. Comput. Stud., vol. 58, no. 2, pp. 207–214, Feb. 2003.
22. A. R. Gilal, J. Jaafar, M. Omar, and M. Z. Tunio, “Impact of Personality and Gender Diversity on Software Development Teams’
Performance,” in International Conference on Computer, Communication, and Control Technology (I4CT 2014), 2014, no. 2014
IEEE 2014, pp. 261–265.
23. J. A. Francis-Smythe and I. T. Robertson, “The importance of time congruity in the organisation,” Appl. Psychol., vol. 52, no. 2, pp.
298–321, 2003.
24. “EFFECT OF TIME PRESSURE ON ORGANIZATIONAL CITIZENSHIP BEHAVIOR : MODERATING ROLE OF,” vol. 1, no. 1,
pp. 1–14, 2017.
25. T. Kelly, L. Margheim, and D. Pattison, “Survey on the differential effects of time deadline pressure versus time budget pressure on
auditor behavior,” J. Appl. Bus. Res., vol. 15, no. 4, pp. 117–128, 1999.
26. M. D. Back, S. C. Schmukle, and B. Egloff, “Who is late and who is early? Big Five personality factors and punctuality in attending
psychological experiments,” J. Res. Pers., vol. 40, no. 5, pp. 841–848, 2006.
27. K. A. Byrne, C. D. Silasi-Mansat, and D. A. Worthy, “Who chokes under pressure? The Big Five personality traits and decision-
making under pressure,” Pers. Individ. Dif., vol. 74, pp. 22–28, 2015.
28. S. H. Costello, “Software engineering under deadline pressure,” ACM SIGSOFT Softw. Eng. Notes, vol. 9, no. 5, pp. 15–19, 1984.
29. P. N. Pepinsky, H. B. Pepinsky, and W. B. Pavlik, “The effects of task complexity and time pressure upon team productivity,” J. Appl.
Psychol., vol. 44, no. 1, pp. 34–38, 1960.
30. F. M. Andrews and G. F. Farris, “Time pressure and performance of scientists and engineers: A five-year panel study,” Organ. Behav.
Hum. Perform., vol. 8, no. 2, pp. 185–200, 1972.
31. H. Ben Zur and S. J. Breznitz, “The effect of time pressure on risky choice behavior,” Acta Psychol. (Amst)., vol. 47, no. 2, pp. 89–
104, 1981.
32. A. R. Gilal, J. Jaafar, M. Omar, S. Basri, A. Aziz, and I. Din, “A Set of Rules for Constructing Gender-based Personality types ’
Composition for Software Programmer,” Lect. Notes Electr. Eng. by Springer, 2015.
33. M. Ibanez, S. Czermak, and M. Sutter, “Searching for a better deal - On the influence of group decision making, time pressure and
gender on search behavior,” J. Econ. Psychol., vol. 30, no. 1, pp. 1–10, 2009.
34. T. Vehko et al., “Experienced time pressure and stress: electronic health records usability and information technology competence
play a role,” BMC Med. Inform. Decis. Mak., vol. 19, no. 1, pp. 1–9, 2019.
35. A. R. Gilal, J. Jaafar, M. Omar, S. Basri, and A. Waqas, “A Rule-Based Model for Software Development Team Composition: Team
Leader Role with Personality Types and Gender Classification,” Inf. Softw. Technol., vol. 74, pp. 105–113, 2016.
36. A. R. Gila, J. Jaafa, M. Omar, and M. Z. Tunio, “Impact of personality and gender diversity on software development teams’
performance,” I4CT 2014 - 1st Int. Conf. Comput. Commun. Control Technol. Proc., no. I4ct, pp. 261–265, 2014.

Authors: A. B. Jagadale, S. S. Sonavane, D. V. Jadhav

Paper Title: Active Shape Model based Correlative Assessment of Statistical Parameters to Detect Cataract
Abstract: The lens opacity acquired due to clouding of eye lens causing blindness is called a cataract, its
detection is challenge. Based on positional occurrence of opacity in a lens it is categorized as nuclear sclerotic,
posterior sub-capsular, and cortical cataract. Excessive use of steroids medicines, smoking, ageing, or eye injury
lens cause cataract. Gradual and progressive growth of opacity is occurring in lens due to agglomeration of water
and protein molecules. The maximum reflected rays form object, that focusing at retina lead to clear
understanding of object image. Opacity inside lens causes refraction, reflection and diffraction of reflected light
from object. This affects interpretation of image due to poor retinal reception. The patient may be advised
treatment or change in lifestyle to prohibit the further growth of cataract or to improve vision. Researches are
suggesting methods for detection of cataract from lens images by analysis of color, structural, and optical
parameters. The research work presented uses wide slit illumination lens images for analysis to detect cataract.
Due to elliptical shape of lens proposed system prefers active shape model with region properties to segment
lens structure. Mean pixel value and uniformity are parameters used to distinguish lens without cataract from
lens with cataract. The statistical parameters are dependent on probability of pixel values. Hence, using these
parameters, system can be made invariant to source illumination. Correlation is performed between parameter
vector of input image, and that of known images from database to identify and classify cataract type.
182.
Keyword : cataract, lens image, Active shape model, statistical parameters, correlation. 1076-
1079
References:
1. “Prevalence of cataract and pseudophakia/aphakia among adults in the United States”, The Eye Diseases Prevalence Research Group,
Archives of Ophthalmology, vol. 122, 2004, pp. 488-494.
2. “The World Health Report: Life in the 21st Century – A Vision for All”, World Health Organization, Geneva, 1998.
3. L. T. Chylack, J. K. Wolfe, D. M. Singer, M. C. Leske, “The lens opacities classification system III” Archives of Ophthalmology, vol.
111, 1993, pp. 831-836.
4. B. E. K. Klein, R. Klein, K. L. P. Linton, Y. L. Magli, M. W. Neider, “Assessment of Cataracts from Photographs in the Beaver Dam
Eye Study”, Ophthalmology, vol. 97, 11, 1990 pp. 1428-1433.
5. J.Nayak, “Automated Classification of Normal, Cataract and Post Cataract Optical Eye Images using SVM Classifier”, Proceedings of
the World Congress on Engineering and Computer Science 2013, vol. 1, 2013.
6. Y. Xu, X.Gao, S.Lin, D.Wing, K.Wong, J.Liu, D.Xu, C.Y. Cheng, C.Y. Cheung, T.Y.Wong , “Automatic Grading of Nuclear Cataract
from Slit-Lamp Grading Images Using Group Sparsity”, Regression Medical Image Computing and Computer-Assisted Intervention-
MICCAI 2013, Lecture Notes in Computer Science, vol. 8150, 2013, pp. 468-475.
7. X. Gao, D.W.K. Wong, T. T. Ng, C.Y. L. Cheung, C.Y. Cheng, T. Y. Wong, “Automatic Grading of Cortical and PSC Cataracts Using
Retroillumination Lens Images”, Computer Vision –ACCV 2012, Lecture Notes in Computer Science, vol. 7725, 2013, pp. 256-267.
8. R. Supriyanti, Y. Ramadhani, “ Consideration of Iris Characteristic for Improving Cataract Screening Techniques Based on Digital
Image” 2nd International Conference on Biomedical Engineering and Technology IPCBEE-2012, vol. 34, 2012, pp. 126-129.
9. R. Supriyanti, Y. Ramadhani, “The Achievement of Various Shapes of Specular Reflections for Cataract Screening System Based on
Digital Images”, International Conference on Biomedical Engineering and Technology IPCBEE 2011, vol. 11, 2011, pp. 75-79.
10. W.Huang, K. L.Chan, H.Li, J.H.Lim, J.Liu, And T.Y.Wong, “A Computer Assisted Method for Nuclear Cataract Grading From Slit-
Lamp Images Using Ranking”, IEEE Transactions On Medical Imaging, vol. 30, 1, 2011, pp. 94-107.

Authors: Sandeep Kumar K J, Lokesh M, Mohan N, A.D.Kulkarni


Placement of Fixed Size Diesel Generators in IEEE 12 Bus Radial Distribution System to Improve
Paper Title:
Voltage Stability
Abstract: Distributed Generation (DG) is small capacity generating units directly associated to the
distributed system. With the penetration of distributed generators nearby the consumer load center support to the
distribution system will be enhanced. The Distributed Generation involves both Renewable & sustainable
183. sources of energy to engender power in order to appease the ever increasing energy requirement. Suitable
location and capacity of DG units will benefit the achievement of active power system network. The voltage
profile and Real power line loss and Reactive power line loss reduction can also be improved with suitable 1080-
location and allocation of DG. This work proposes a new Simulation method for the placement of fixed Size 1086
Diesel Generator in IEEE 12 bus radial distribution system stationed on Voltage stability index and
Transmission line losses. This index is progressed by acknowledging steady state node voltages cited in Per
Unit.
Keyword : Voltage Stability, ABVSI, IEEE 12BUS & MATLAB/SIMULINK
References:
1. T. Ackermann, G. Andersson, and L. Soder, “Distributed generation: a definition,” Electric Power Systems Research, vol. 57, pp. 195-
204, 2001.
2. P. Chidareja and R. Ramakumar, “An approach to quantify technical benefits of distributed generation,” IEEE Trans. Energy, vol. 19,
no. 4, pp. 764-773, 2004.
3. H. A. Gil and G. Joos, “Models for quantifying the economic benefits of distributed generators,” IEEE Trans. Power Systems, vol. 23,
pp. 327-335, 2008
4. S. Khushalani, J. M. Solanki, and N. N. Schulz, “Development of three-phase unbalanced power flow using PV and PQ models and
study the impact of DG models,” IEEE Trans. Power Systems, vol. 22, no. 3, pp. 1019-1025, 2007.
5. P. Chidareja, “Benefits of distributed generation: A line loss reduction analysis,” Transmission and Distribution Conference and
Exhibition: Asia and Pacific, 2005.
6. L. A. Freeman and R .E. Brown, “Analyzing the reliability impact of distributed generation”, Proc. of the IEEE Summer Meeting, pp.
1013-1018, 2001 .
7. F.Gubina and B.Strmcnik, “A simple approach to voltage stability assessment in radial networks,” IEEE Trans.Power Syst., vol.12, no.
3, pp.1121–1128, Aug.1997.
8. T.Rambabu, P. Venkata Prasad,”Optimal Placement and Sizing of DG Based on Power Stability Index in Radial Distribution System”,
in IEEE 978-1-4799-4103-2/14/$31.00©2014 IEEE.
9. Almoataz Y. Abdelaziz, Ehab S. Ali, Sahar M. Abdelazim, “flower pollination algorithm for optimal capacitor placement and sizing in
distribution systems”, Electrical Power Components Systems, Volume 44, Issue 5, 2016, pp. 544-555,.
10. K. Prakash, M. Sydulu, “Particle swarm optimization based capacitor placement on radial distribution system”, Proc eedings of IEEE
Power Engineering Society General Meeting (2007), pp. 1–5.
11. T. Kerdphol, Kiyotaka Fuji, Y. Mitani, M. Watanabe and Yaser Qudaih “Optimization of a battery energy storage system using pa rticle
swarm optimization for stand-alone microgrids” Electrical Power and Energy Systems 81, 2016, pp. 32–39.
12. A. Elsheikh, Y. Helmy, Y. Abouelseoud, A. Elsherif, “Optimal capacitor placement and sizing in radial electric power systems” ,
Alexandria Eng J, 53 (4) (2014), pp. 809–816.
13. Sydulu M, Reddy VVK, “Index and GA based optimal location and sizing of distribution system capacitors”, IEEE power engineering
society general meeting 2007; 24th–28th June, pp. 1–4.
14. Sneha Sultana, Provas Kumar Roy, “Optimal capacitor placement in radial distribution systems using teaching learning-based
optimization”, Elsevier Int. J. Electr. Power Energy Syst., 54 (2014), pp. 387–398.
15. R.V. Rao, V.K. Patel, “Optimization of mechanical draft counter flow wet-cooling tower using artificial bee colony algorithm”, Energy
Convers Manage, 52 (7) (2011), pp. 2611–2622.
16. Attia A. El-Fergany, Almoataz Y. Abdelaziz, “Cuckoo Searchbased Algorithm for Optimal Shunt Capacitors Allocations in
Distribution Networks”, Electrical Power Components and Systems. Issue 16, Volume 41, 2016, pp. 1567-1581.

Authors: Omar Bourass, Aziz Et-Tahir

Paper Title: The Impact of Building Orientation on Energy Consumption in a Domestic House in Desert Climate
Abstract: Morocco has set the goal of introducing new methods of construction and positioning among the
leaders in the African continent in the field of renewable energy and sustainable buildings, efforts are therefore
focused on developing an energy efficiency policy. Orientation is one of the key factors that impact building’s
energy consumption, it’s a very important factor to consider in order to avoid summer overheating and limit
winter losses. The purpose of this scientific article is to study the impact of the orientation of a house on its
annual energy needs in terms of heating and cooling essentially, but also its internal and solar energy gains and
its losses in relation with infiltration, transmission and ventilation. In this regard, simulations were carried out
with eight different possible orientations on a small house, located in one geographical area known by its desert
climate. The final purpose is to determine the suitable orientation for dwellings in this geographical area for
energy saving while guaranteeing the thermal comfort. Based on our analysis, it was revealed that a well-
orientated house can save a considerable amount of energy throughout its life cycle.

184. Keyword : Building energy consumption, Building orientation, Energy Efficiency, energy saving,
Sustainability. 1087-
References: 1096
1. International Energy Agency, “Energy Policies Beyond IEA Countries - Morocco 2014”, 10 October 2014, 132 Pages, ISBN PDF: 978-
92-64-21148-3, All rights reserved.
2. International Energy Agency, “Energy Policies Beyond IEA Countries - Morocco 2019”, 7 Mai 2019, 158 Pages, ISBN PDF: 978-92-
64-21148-3, All rights reserved.
3. International Energy Agency, The United Nations Environment Programme (2018), The
Global Alliance for Buildings and Construction (GlobalABC). “2018 Global Status Report: Towards a zero-emission, efficient and
resilient buildings and construction sector”, 2018, ISBN No: 978-92-807-3729-5, Copyright © United Nations Environment
Programme, 2018.
4. Agence Nationale Pour le Développement des Energies Renouvelables Et De L’efficacité Energétique « Les bonnes pratiques de
l’Efficacité Énergétique dans le bâtiment»
5. The Solar Energy Laboratory, University of Wisconsin-Madison “Trnsys 16 a Transient System Simulation Program, Volume 1
Getting Started”, 2007.
6. Meteotest: Jan Remund, Stefan Müller, Stefan Kunz and Christoph Schilter “Meteonorm: Global Meteorological Database” Handbook
Part I, Software Version 7/ May 2012“©Meteotest.
7. Services of Windfinder.com GmbH & Co. KG. Version: 2019-03-13,
https://fr.windfinder.com/windstatistics/errachidia_moulay_ali_cherif. 2019
8. Benoit Beckers, “Le Diagramme Solaire” 2004, http://www.heliodon.net/downloads/Beckers_2004_Ir_Le_diagramme_solaire.pdf.

Authors: Ch.RamaKrishna,G.A.E. Satish Kumar, P. Chandrasekhar Reddy

185. Paper Title: Integrated Triple Notch Bands Compact UWB Antenna for Wireless Communications
Abstract: To Suppress Conventional Narrow Band Communication Technologies From The UWB 1097-
Frequency Band An Integrated Triple Notch Bands Compact UWB Antenna Is Proposed. Band Notches Are 1100
Wimax (3.1-3.8 Ghz) ,WLAN(4.8-5.825 Ghz) And X Band (6.5-7.5 Ghz).To Attain UWB Frequency Band 2.9-
14.5 Ghz From Compact UWB Antenna Introduced Slots In A Rectangular Patch With DGS. The Projected
Compact UWB Antenna Arrangement Is Made-Up On FR4 Substrate With VSWR Is Less Than 2 Except For
Selected Notched Bands. The Proposed UWB Design Is Suitable For Impenetrable Surroundings For
Wimax/WLAN/X Band Dense. The Partial Defective Ground Structure Is Proposed To Improve Impedance
Matching And Impedance Bandwidth Is Utilized.

Keyword : DGS, Operating Bandwidth VSWR, UWB Antenna


References:
1. Wen Tao Li, Xiao Wei Shi, Senior Member, IEEE, and Yong Qiang Hei “Novel Planar UWB Monopole Antenna With Triple Band -
Notched Characteristics” ieee antennas and wireless propagation letters, vol. 8, 2009.
2. R. Kumar, Y. Kamatham, Fork Shaped with Inverted L-Stub Resonator UWB Antenna for WiMAX/WLAN Rejection Band,
International Journal of Electronics and Communications (2019), doi: https:// doi.org/10.1016/j.aeue.2019.152881
3. Mehdi rahanandeh, amir saman noor amin, matin hosseinzadeh, pejman rezai, and mohammad sadegh rostami “a compact elliptical
slot antenna for covering bluetooth/wimax/wlan/itu” ieee antennas and wireless propagation letters, vol. 11, 2012
4. zhijun tang , xiaofeng wu, jie zhan, shigang hu, zaifang xi, and yunxin liu3 “Compact UWB-MIMO Antenna with High Isolation and
Triple Band-Notched Characteristics” ieee Access, vol. 10, 2017
5. y. sung” uwb monopole antenna with two notched bands based on the folded stepped impedance resonator” ieee antennas and
wireless propagation letters,vol.11,2012
6. Mohammad mehdi samadi taheri, student member, ieee, hamid reza hassani, and sajad mohammad ali nezhad “uwb printed slot
antenna with bluetooth and dual notch bands” ieee antennas and wireless propagation letters, vol. 10, 2011
7. srinivas doddipalli1, (student member, ieee) and ashwin kothari1, (member, ieee)” compact uwb antenna with integrated triple notch
bands for wban applications” ieee access, volume 4, 2016
8. Z.l. zhou, l. li and j.s. hong” compact uwb printed monopole antenna with dual narrow band notches for wimax/ wlan bands”
lectronics letters 29th september 2011 vol. 47 no. 20
9. Srinivas doddipalli, and ashwin kothari “compact uwb antenna with integrated triple notch bands for wban applications” ieee a ccess,
volume 4, 2016
10. h. hosseini, h.r. hassani✉ and m.h. amini” miniaturised multiple notched omnidirectional uwb monopole antenna” electronics letters
19th april 2018 vol. 54 no. 8 pp. 472–474

Authors: Nirav J. Suthar, Ankit R. Bhavsar

Paper Title: Leaving Habitat of Wild Animals in Gir National Park : a Critical Scenario and a Possible Solution
Abstract: Wild animals are the ecosystem's main link. Wildlife is important to humans because it maintains
a balance between the active environment and biotic factors. It plays an important role in making the various
natural processes of nature stable. The tradition of protecting wildlife species and their ecosystems is wildlife
conservation. In India the Asiatic lion is the wild animals species which has lowest population in the world. The
government established Gir National Park to protect the Asiatic lion and start various programs through in which
the population of Asiatic lion should increase. Even other such programs this wild animals faces lots of problem
in the national park. This paper addresses the wild animals in India relevant issues and concerns. After the
problems we have found, we have suggested a potential solution to these problems. The system uses the
Wireless Sensor Network (WSN) platform. This shows how WSN can be seamlessly integrated into the wildlife
habitats / national park located in India to enhance the wildlife design.

Keyword : WSN, Sensors, Wild Animals, National park.


References:
1. E.S. Nadimi, et al., ZigBee-based wireless sensor networks for monitoring animal presence and pasture time in a strip of new grass,
Elsevier, computers and electronics in agriculture 61,79–87, 2008
2. Tim Wark, et al., The Design and Evaluation of a Mobile Sensor/Actuator Network for Autonomous Animal Control
186. 3. Tsung Ta Wu, Swee Keow Goo, Kae Hsiang Kwong, Craig Michie, Ivan Andonovic, GIL Jahrestagung, “Wireless Sensor Network
for Cattle Monitoring System”, Vol. 142 GI
(2009) PP 173 – 176
1101-
4. Andrew Markham, On a Wildlife Tracking and Telemetry System: A Wireless Network Approach, A thesis submitted to the 1105
Department of Electrical Engineering, University of Cape Town, August 2008.
5. Antonio-Javier G S, et al., Wireless Sensor Network Deployment for Monitoring Wildlife Passages
6. Bobins, A. (2018). "Did The Failure To Set Up A 'Second Home' For In Madhya Pradesh Cause Lion Deaths In Gir?". India Times.
Retrieved 2018-10-05.
7. Breitenmoser, U., Mallon, D. P., Ahmad Khan, J. and Driscoll, C. (2008). "Panthera leo ssp. persica". The IUCN Red List of
Threatened Species.
8. Dr. Prabhat Ranjan, Prabhat K. Saraswat, Ashish Kumar, Swetha Polana, Amit Singh,
“wildCENSE – GPS based animal tracking system”
9. H. T. Kung and D. Vlah, Efficient Location Tracking Using Sensor Networks, Proceedings of IEEE Wireless Communications and
Networking Conference, 2003.
10. H. Yang and B. Sikdar, A Protocol for Tracking Mobile Targets using Sensor Networks, Rensselaer Polytechnic Institute Troy, N Y
12180
11. Jennifer Yick, Biswanath Mukherjee, Dipak Ghosal, Wireless sensor network survey, Elsevier, Computer Networks 52, 2292–2330,
2008.
12. Juang P., Oki H., Wang Y., Martonosi M., Peh L Rubenstein D., “Energy-efficient computing for wildliftracking: design tradeoffs and
early experiences witzebranet”, SIGOPS Oper. Syst. Rev., 36(5), 2002, 96107.
13. Kazem Sohraby, Daniel Minoli and TaiebZanti “Wireless Sensor Networks – Tehnology, Protocols and Applications”,Publisher –
WILEY
14. Ruwini Edirisinghe, et al., WI-ALERT: A Wireless Sensor Network Based Intrusion Alert Prototype for HEC, International Journal of
Distributed and Parallel Systems, Vol.4, No.4, July 2013
15. Singh, H. S.; Gibson, L. (2011). "A conservation success story in the otherwise dire megafauna extinction crisis: The
Asiatic lion (Panthera leo persica) of Gir forest" (PDF). Biological Conservation. 144 (5): 1753–1757.
doi:10.1016/j.biocon.2011.02.009.
16. Zhengming Tang, et al., PetTracker – Pet Tracking System Using Motes, University of California, Irvine.
17. Asiatic lions in Gujarat's Gir forest dying of Canine Distemper Virus: ICMR". The Hindustan Times. New Delhi. 2018. Retrieved
2018-10-05.

Authors: J.Gowthamy, Seeram Kiran Swamy, M.P.Shaam Kumar, M.Dhanush Kumar


Computation of Person Re-identification using Self-Learning Anomaly Detection Framework in
Paper Title:
Deep-Learning
Abstract: This paper proposes an application of a self-Learning anomaly detection framework in Deep-
learning. In this application, both hybrid unsupervised and supervised machine learning schemes are used.
Firstly, it takes metadata of the unsupervised data clustering module (DCM). Data clustering module (DCM)
analyses the pattern of the monitoring data and enables the self-learning capability that eliminates the
requirement of the prior knowledge of the abnormal network behaviors and also has the potential to detect the
unforeseen anomalies. Next, we use the self-learning mechanism that transfer pattern learned by the DCM to a
supervised data regression and classification module (DRCM) it’s Complexity is mainly related to scalability of
supervised learning module. It is more measurable and less time consuming for online anomalies by avoiding
excessively usage of the original dataset. It has a density-based clustering algorithm and deep learning, neural
network structure-based DCM and DRCM. We are also using an anti-spoofing-based approach for presentation
187. attack detection (PAD). In these approaches, we are mainly detecting a person reidentify and computing without
having any false anomalies.
1106-
1109
Keyword : Anomaly Detection Framework, Clustering module, Data Clustering Module (DCM), Data
Regression Clustering Module (DRCM), Multi-channel sensors, Anti-spoofing.
References:
1. “Self-Taught Anomaly Detection using Hybrid Supervised & Unsupervised Machine Learning in Optical Networks”. Xiaoliang
chen,Baoji Li.
2. “Multiple-Shot People Re-identify Based On Feature Selection with Sparsity” J. zhang and B. mukheriee.
3. Fault And Attack management in all-optical networks,” R. Rejeb, M. Leeson, and R. Green, IEEE Community Nov.2006.
4. “A Survey Of Distance And Similarity Measures Used Within Network Intrusion Anomaly Detection,” D. Weller-Fahy, B. Borghetti,
and A. Sodemann IEEE Community 2015.
5. “Person Re-Identification”. Shaogang Gong,.Cristani,shuicheng, Chen Change.
6. “Deep-learning- assisted network orchestration for on-demand and cost-effective vNF service chaining in inter-DC elastic optical
networks,” B. Li, W. Lu, S. Liu, and Z. Zhu Oct.2018.
7. “Anomaly detection for discrete sequences” . V. Chandola, A. Banerjee, and V. Kumar.
Authors: Kiruthiga.V

Paper Title: Clout of Colours on Consumer Food Choices


Abstract: Colour is a phenomenon that is stimulated by light. It is considered as a source of information.
Generally it has been observed that 62-90 per cent of the assessment of people or object is through colour, as it
paves way in making judgment within 90 seconds. Product colours not only help in differentiating it from the
competitors but also in influencing the people mood in a positive and negative aspect. Colour plays a major role
in influencing people emotion and mood because generally the mood of people is unstable. Colour helps in
influencing the attitude of the customers. Marketers should select the right colour as it results in enormous sales.
The consumer behavior is dynamic and although many factors influence the food choices, colour also plays a
crucial role in influencing the purchase. The study was conducted to study the impact of colour on the food
choices of people across the Chennai city. Primary data was collected through questionnaire and analysed using
188. statistical tool. Results indicate that colour helps identifying the flavor of the food correctly.
1110-
Keyword : Colour, food, consumer, flavor 1111
References:
1. Devismes, P. (2000), Packaging, mode d’emploi, Dunod, Pari
2. Elm, N (2012), ―How colour affects customer perception‖. Iran’s industrial design. Farzad, B (2012), ―Product features and
consumer perception
3. Garber, L. L., Jr., Hyatt, E. M. & Starr, R. R. Jr. (2001). Placing food color experimentation into a valid consumer context. Journal of
Food Products Marketing, 7(3), 3–24.
4. SCHUMANN, S. P. A.; POLÔNIO, M. L. T.; GONÇALVES, E. C. B. A. Avaliação do consumo de corantes artificiais por lactan tes,
pré-escolares e escolares. Ciência e Tecnologia de Alimentos, v. 28, n. 3, p. 534-539, 2008
5. Wichmann, F., Sharpe, L and Gegenfurtner, K. (2002). The Contributions of Color to Recognition Memory for Natural Scenes.
Journal of Experimental Psychology: Learning, Memory, and Cognition, 28 (3), 509–520
6. Zellner, D. A., Strickhouser, D., & Tornow, C. E. (2004). Disconfirmed hedonic expectations produce perceptual contrast, not
assimilation. American Journal of Psychology, 117, 363-387

Authors: Deeba K, RA.K. Saravanaguru

Paper Title: Contextualization using Context-Aware Publish and Subscribe (CAPS) based on IoT
189. Abstract: The Internet of Things (IoT) activates massive data flow in the real world. Each computer can
presently be linked to the internet and supply useful decision-making information. Virtually sensors are 1112-
implemented in every aspect of life. From different sources of sensors can produce raw data. Due to the various 1119
data sources, the method of extracting information from the flow of data is mostly complicated, networks
inadequate and criteria for real-time processing. In addition, an issue of context-aware data processing and
architecture also present, despite the fact that they are essential criteria for stronger IoT structure. In order to
meet this issue, we recommend a Context-aware Internet of Things Middleware (CAIM) architecture. This
enables the incorporation of highly diverse IoT application context information by using light weigh protocol
MQTT (Message Queue Telemetry Transport) for transmitting basic data streams from sensors to middleware
and applications. In this paper, we propose a contextualization which means that obtain data from sensors of
different sources. First have to create a context profile with the help of context type like user, activity, physical,
and environment context. Then also is create a profile by using attributes. Finally, raw data can be change into
contextualized data through CAPS (context-aware Publish-Subscribe) hybrid approach. This paper discusses the
current context analysis strategies that use either rational models or probabilistic methods exclusively. The
evaluation of identifying contextualization methods shows the shortcomings of IoT sensor data processing as
well as offers alternative ways of identifying the context.

Keyword : CAIM, CAPS, Context acquisition, Context-aware, Contextualization, IoT.


References:
1. B. Schilit and M. Theimer, “Disseminating active map information to mobile hosts,” Network, IEEE, vol. 8, no. 5, pp. 22 –32, sep/oct
1994. [Online]. Available: http://dx.doi.org/10.1109/65.313011.
2. Perera, C., Zaslavsky, A., Christen, P., & Georgakopoulos, D. (2013). Context-aware computing for the internet of things: A
survey. IEEE communications surveys & tutorials, 16(1), 414-454.
3. Bettini, C., Brdiczka, O., Henricksen, K., Indulska, J., Nicklas, D., Ranganathan, A., & Riboni, D. (2010). A survey of context
modelling and reasoning techniques. Pervasive and Mobile Computing, 6(2), 161-180.
4. A. Dey, Understanding and using context, Personal Ubiquitous Comput. 5 (1) (2001) 4–7
5. Giusto, D. (2010). A. lera, G. Morabito, l. Atzori (Eds.) The Internet of Things.
6. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications
magazine, 40(8), 102-114.
7. Ashton, K. (2009). That ‘internet of things’ thing. RFID journal, 22(7), 97-114.
8. Vermesan, O., Friess, P., Guillemin, P., Gusmeroli, S., Sundmaeker, H., Bassi, A., ... & Doody, P. (2011). Internet of things strategic
9. research roadmap. Internet of things-global technological and societal trends, 1(2011), 9-52.
10. Sundermann, C. V., Domingues, M. A., Conrado, M. da S., & Rezende, S. O. (2016). Privileged contextual information for context-
aware recommender systems. Expert Systems with Applications, 57, 139–158. https://doi.org/10.1016/j.eswa.2016.03.036.
11. Van der Veen, J.S.; Van der Waaij, B.; Meijer, R.J. Sensor data storage performance: SQL or NoSQL, physical or virtual. In
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, Honolulu, HI, USA, 24–29 June 2012; pp. 431–
438.
12. Gomez, C.; Oller, J.; Paradells, J. Overview and evaluation of Bluetooth low energy: An emerging low-power wireless technology.
Sensors 2012, 12, 11734–11753.
13. Kale SD, Kulkarni SR, Lubree HG, Meenakumari K, Deshpande VU, Rege SS, et al. Characteristics of gestational diabetic mothers
and their babies in an Indian diabetes clinic. J Assoc Physicians India. 2005;53:857–63.
14. Haver MC, Locksmith GJ, Emmet E. Irregular menses: An independent risk factor for gestational diabetes mellitus. Am J Obstet
Gynecol. 2003;188:1189–91. [PubMed] [Google Scholar]
15. 5. Berkowitz GS, Lapinski RH, Wein R, Lee D. Race/Ethnicity and Other Risk Factors for Gestational Diabetes. Am J
Epidemiol. 1992;135:965–73.
16. Keshavarz M, Cheung NW, Babaee GR, Moghadam HK, Ajami ME, Shariati M. Gestational diabetes in Iran: Incidence, risk factors
and pregnancy outcomes. Diabetes Res Clin Pract. 2005;69:279–86.
17. Shaw JE, Sicree RA, Zimmet PZ 2010 Global estimates of the prevalence of diabetes for 2010 and 2030. Diabetes Res Clin Pract 87:4
–14.
18. Bevier WC, Fischer R, Jovanovic L 1999 Treatment of women with an abnormal glucose challenge test (but a no rmal oral glucose
tolerance test) decreases the prevalence of macrosomia. Am J Perinatol 16:269 –275
19. Acciaroli, G.; Vettoretti, M.; Facchinetti, A.; Sparacino, G. Calibration of minimally invasive continuous glucose monitoring sensors:
State-of-the-art and current perspectives. Biosensors 2018, 13, 24.
20. Lane, N. D., Miluzzo, E., Lu, H., Peebles, D., Choudhury, T., & Campbell, A. T. (2010). A survey of mobile phone sensing. IEEE
Communications magazine, 48(9), 140-150.
21. Horrocks, I., Patel-Schneider, P. F., Boley, H., Tabet, S., Grosof, B., & Dean, M. (2004). SWRL: A semantic web rule language
combining OWL and RuleML. W3C Member submission, 21(79), 1-31.
22. Román, M., Hess, C., Cerqueira, R., Ranganathan, A., Campbell, R. H., & Nahrstedt, K. (2002). A middleware infrastructure for
active spaces. IEEE pervasive computing, 1(4), 74-83.
23. Ko, K. E., & Sim, K. B. (2008, October). Development of context aware system based on Bayesian network driven context reasoning
method and ontology context modeling. In 2008 International Conference on Control, Automation and Systems (pp. 2309-2313).
IEEE.
24. McBride, B. (2004). The resource description framework (RDF) and its vocabulary description language RDFS. In Handbook on
ontologies (pp. 51-65). Springer, Berlin, Heidelberg.
25. Heflin, J. (2007). An introduction to the OWL web ontology language. Lehigh University. National Science Foundation (NSF).
26. mqtt-v3.1.1-plus-errata01, Organization for the Advancement of Structured Information Standards (OASIS), 2015, 81 p. Available
(referred 13.1.2017): http://docs.oasis-open.org/mqtt/mqtt/v3.1.1/mqtt-v3.1.1.pdf.
27. Publish & Subscribe, MQTT Essentials, dc-square GmbH, Available (referred 13.1.2017): http://www.hivemq.com/blog/mqtt-
essentials-part2-publish-subscribe.
28. MQTT Publish, Subscribe & Unsubscribe, MQTT Essentials, dc-square GmbH, Available (referred 13.1.2017):
http://www.hivemq.com/blog/mqtt-essentials-part-4-mqtt-publish-subscribe-unsubscribe

Authors: K .Hema Latha, Kamran Ahmed Khan, Syed Asim Minhaj, Mohd Shais Khan

Paper Title: Design and Fatigue Analysis of Shot Peened Leaf Spring
Abstract: The paper handles the fatigue and failing analysis of serial shot-peened leaf springs of
190. cumbersome vehicles emphasizing on the impact of shot peening on fatigue life, coping with automotive leaf
springs, the shot peening method turns into an important step in production.In the situation of leaf spring 1120-
suspensions, however, asystematic research of the effect of shot peening about fatigue life isstill required. 1126
Experimental stress-life curves are determined with the aid of the usage of investigating clean specimen
subjected to shot peening. those test consequences are as compared to corresponding ones identified from cyclic
three-point test on shot peened serial leaf springs in order to show the influence of applied heat treatment and
shot peening approach on fatigue existence of high-strength used to get leaf spring manufacturing, reliant on the
load level. Analyses are performed to explain the effects resulting from shot peening practice on the surface
features of the high-strength spring steel under examination. The evaluation of fatigue results shows that almost
no life improvement due to production highlighting the importance for mutual variation in parameters of shot
peening and thermal treatment so that there is sufficient progress in life.

Keyword : shot peening; fatigue life; automotive leaf springs; high strength
References:
1. Renzhi Wang, Ru Jilai. On the Same Problems In the Surface Strengthening Treatment of Valve Sping for the Automobile
Combustion [J]. China Surface Engineering, 2000, 13(2):38-41 (in Chinese)
2. Wuyan Chu, et al. Stress Corrosion Cracking in Mild Steel Under Compressive Stress [J]. ScriptaMetalurgica, 1984,18:579-582
3. Renzhi Wang. Residual Stress and Fatigue Properties of Spring [J]. Physical Testing and Chemical Analysis Part A: Physical Testing.
2005,41 (11)
4. M.T.Todinov. Proceedings of 10 th National Spring Scientific Report, 8th National .
5. Spring Failure Analysis and Symposium of Spring Specialities Across the Taiwan Straits, Gueiling China. 2004:94-104
6. Zhang Yinghuai, et al. Spring Handbook [M]. Mechanical Industrial Press.1997:87
7. MargerelO’molley BSC. Stress Relaxation of Spring [J]. Wire Industry. 1988, 12: 88
8. SuDeda, Low Temperature Heat Treatment and Stabilized Treatment of Springs [J]. Spring Engineering, 2002, 3: 4-10
9. Renzhi Wang. Yao Mei, et al. Micro-Meso-Process Theory of Fatigu Crack Initiation and Theory of Internal Fatigue Limit [J].
Transactions of Metals and Heat Treatment, 1995,16(4):26
10. Liu Suo (Renzhi Wang). Fatigue Property of Metals and Shot Peening Strengthening Technology [M]. Defence Industry Press, 1977:
79
11. Xu Jiazhi, et al. The Fatigue Strength and Fracture Morfbology of Leaf Spring Steel After Prestressed Shot Peening [C]. Proce edings
of 1th International Conference on Shot Peening, Paris, France, 1981.
12. R.L.Mattson, J.G.Roberts. Internal Stress and Fatigue of Materials [M]. 1959

Authors: Heema Rani Borah


Attitude Among the Mising Speech Community of Assam for Maintenance and Development of the
Paper Title:
Mising Language in Terms of Bilingualism
Abstract: Mising tribe is an important speech community of Assam, the meeting ground of various
communities and tribes. This community coexists in a limited geographical area along with the different
communities and tribes with their unique languages and cultures. They speak Mising language in their
households and communicate mostly in Assamese with other people. Therefore, socially the Mising people are
bilingual. The community do not have any script or written tradition and although an effort has been going on to
write in their language with modified Roman scripts, the literature of the language is yet to reach a developed
stage. So the backwardness in terms of literature is restricting the language to spread and establish it as a
medium of education in the respective society. Used only as a spoken language Mising has been included in the
UNESCO endangered language category in its report (2011) and it has become almost certain that the practical
field of this language will get shrink within a short period. So in such a crucial linguistic situation it has become
an important matter of discussion from the socio-linguistic perspective how an integrated language planning is
the need of the hour for maintenance and development of the Mising language. In this case it is very important to
have a conscious and positive perspective of the respective Mising language speakers towards maintenance and
development of the language. This study covers the perspective of the Mising community towards maintenance
and development of their language. Respective people’s standpoint towards choosing another language for
communication is also observed. Moreover, in the perspectives of language situation in Assam, it also discusses
the real scenario of bilingual situation of the Mising speech community. Information is collected through the
methods like field observation, questionnaire and stratified and purposive sample survey method. The subjects
191. have been formatted on the basis of quantitative perception and analysed with SPSS software and Descriptive
Statistical method. As per study it is decided that majority of the Mising population has shown positive 1127-
perspective towards maintenance of the language which can be very helpful in near future. The people of the 1136
Mising community should also put effort on regular basis to enrich their language and literature as well.

Keyword : language attitude, speech community, language maintenance, language development, language
situation, bilingualism, language use, perception.
References:
1. Appel, R. and P. Muysken. 1987. Language Contact and Bilingualism. Language in Society. Cambridge University Press, London and
Baltimore, MD: Edward Arnold. Pp. 403-454.
2. Baishya, Ajit Kumar. 2008. Bilingualism and North-East India, Silchar: Assam University, 1 stPublished.
3. Bloomfield, Leonard. 1935. Language, Motilal Banarsidass Publications, Delhi-110007.
4. Boruah, Bhimkanta. 2003. Asamar Bhasa, Dibrugarh: Banalata Publication, 4 th Edition.
5. Chaklader, Snehamoy. 1990. Sociolinguistics a Guide to Language Problem in India, New Delhi: Mittal Publication, First Edition.
6. Crystal, David. 1997. A Dictionary of Linguistics and Phonetics. Blackwell Publishing, 9600 Garsington Road, Oxford OX4 2DQ,
UK.
7. Dittmar, Norbart. 1976. Sociolinguistics a Critical Survey of Theory and Applications, University of Konstanz,Adward Arnold
(Publishers) Ltd., London.
8. Eagly, A. H. & Chaiken, S. 2005. Attitude Research in the 21 st Century: The Current State of Knowledge. In D. Albarrecin, B. T.
Johnson, & M. P. Zanna (Eds.), The Handbook of Attitudes (pp. 743-
9. 767). Mahwah, NJ, US:Lawrence Erlbaum Associates Publishers.
10. Fasold, Ralph W. 1987. The Sociolinguistics of Society. Oxford: England, New York: NY, USA, Blackwell Publishing.
11. Fishman, Joshua A., Ed. 1976. Advances in the Sociology of Language, Vol - I, Paris: Yeshiva University, 2 nd Edition.
12. Goswami, S. N. 1994. Studies in Sino-Tibetan Language, Guwahati: Published by Mondira Goswami, 1st Edition.
13. Griearson, G. A. 1967. Linguistic Survey of India, Vol. III, Part: II, New Delhi, Monital Banersidas.
14. Hall, Christepher J. 2008. An Introduction to Language and Linguistics Breaking the Language Spell, Continuum International
Publishing Group, New York.
15. Hakacham, Upen Rabha. 2003. Asamiya aru Asamar Bhasa-Upabhasa, Jyoti prakashan, Guwahati, First edition.
16. Hudson, R.A. (1980). Sociolinguistics, Cambridge University Press, New York.
17. Hymes, Dell. 1977. Foundations in Sociolinguistics An Ethnographic Approach, London.
18. Tavistock Publication Limited, First Published.
19. Kerlinger and Neuman. 1973. Foundations of Behavioural Research. New York: Holt, Rinehart and Winston.
20. Labov, William. 1985. Sociolinguistic Patterns, UK: Basil Blackwell Ltd., Oxford OX4 1JF.
21. Lamlert, Wallece E. 1967. A Social Psychology of Bilingualism, Journal of Social Issue, Vol. 23, Issue 2, McGill University.
22. Lightbown, P. M., Spada, N. 2006. How Languages are Learned. Oxford University Press.
23. Lyons, John. 2007. Language and Linguistics An Introduction, United Kingdom: Cambridge University Press, Cambridge CB2 2RU.
24. Newmeyer, Frederick J. Ed. 1988. Linguistics: The Cabridge Survey, Vol-IV, Language : The Socio-Cultural Context, Cambridge
University Press, Cambridge.
25. Miri, Mrinal. Ed. 2003. Linguistic Situation in North-East India, New Delhi: Concept Publishing Company, 2 nd Edition.
26. Mohanty, Ajit K. 1994. Bilingualism in a Multilingual Society: Psycho-Social and Pedagogical Implications. Mysore: Central Institute
of Indian Languages, First Published.
27. Oestreicher J. P. 1974. The Early Teaching of Modern Language and Education and Culture, Europe:Review of the Council for
Cultural.
28. Pattanayak, Debi Prasanna. Ed. 2007. Multilingualism in India, Orient Longman, 1st Edition.
29. Petty, E. Richard and Cacioppo, John T. 1981. Personal Involvement as a Determinant of Argument Based Persuasion, Journal of
Personal and Social Psychology, American Psychological Association. Vol. 41, No. 5, pp. 847-855.
30. Romaine, Suzanne. 1995 Bilingualism (2nd Ed.). Oxford: Blackwell. Pp. xvi+384.
th
31. Spolsky, Bernard. 2003. Sociolinguistics, Oxford University Press, 4 Impression.
32. Trudgill, Peter. 1995. Sociolinguistics : An Introduction to Language and Society, London: Published by Penguin Group, Revised
Edition.

Authors: Tini Mogea, Salaki Reynaldo Joshua

Paper Title: ICONS: a Mobile Application for Introduction Culture of North Sulawesi
Abstract: Indonesia has a very artistic and cultural diversity. Currently the lack of knowledge about the
culture and art of their own country is an issue that is being experienced. Now the lack of means of support in
getting information about Indonesian art and culture, thereby lowering the curiosity about the culture and art of
Indonesia itself. North Sulawesi is a province in Sulawesi islands where lies the province on the northern tip of
Sulawesi island directly adjacent to the Philippines Country. North Sulawesi as an area that has a lot of cultural
diversity begins from historic sites, traditional houses, traditional clothing, to the beautiful tourism place in
North Sulawesi. With provided a means of education in the information provider will provide a media to share
information about the culture in North Sulawesi. Therefore, it is necessary to develop applications Introduction
to Cultural North Sulawesi, which is the application of information systems to the concept mobile based
application that is expected to attract interest in giving and receiving information about the cultures that exist in
North Sulawesi. In the development of this application using methods developed Multimedia Development Life
Cycle (MDLC) which starts from the concept phase to the distribution phase.

Keyword : Culture, Application, Mobile, MDLC


References:
1. Anikulmar C. S., Suhas G., Sushma S. A Smart Dustbin Using Mobile Application. International Journal of Innovative Technology and
Exploring Engineering (IJITEE), ISSN: 3964-3967,Volume -8, Issues 11, September, 2019.
2. Anisyah. Analisa dan Desain Sistem Informasi, Yogyakarta, Penerbit Andi, 2000.

3. Anwari. Pengembangan Modul Pembelajaran Biologi Berbasis Kearifan Lokal di Taman Nasional Gunung Merapi Untuk SMA/MA
192. Kelas X Materi Keanekaragaman Hayati. Skripsi Program studi Biologi, Fakultas Sains dan Teknologi, UIN Kalijaga Yogyakarta,
2015. 
 1137-
4. Al S., V. R. Secured and Dynamic Decentralized Computational Offloading Framework for Mobile Cloud Computing. International
Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN: 2589-2593,Volume -8, Issues 11, September, 2019.
1144
5. Buyens, J. Web Database Development. Elex Media Komputindo. Jakarta, 2001. 

6. Cahyanti A. D. Pengembangan Media Pembelajaran Modul Interaktif Berbasis Adobe Flash CS 6 Pada Kompetensi Jurnal Penyesuaian
untuk Siswa Kelas XI IPS SMA N 1 Tempel. Skripsi Program Studi Akuntansi, Fakultas Ekonomi, Universitas Negeri Yogyakarta,
2017.
7. Dhanta R. Pengantar Ilmu Komputer. Surabaya: INDAH, 2009. 

8. Fajar, Karyawan. Tutorial Step by Step Full Color: Membedahkan Kehebatan Android. Jakarta: Grasindo, 2011. 

9. Gurumoorthy K., Suresh P. A Novel Method of an Online Opinion Mininge Motions by Comparing Various Mobile Gadgets.
International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN : 2278-3075,1076-1082, Volume -8, Issues-
11 S, Septemberr, 2019.
10. Hanuman A.S., Rao P. S. V. S., Kiran J. S., Babu G. C., Babu B. S. An Efficient and secured Framework for Mobile Cloud Computing.
International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN: 2278-3075, 2315-2319,Volume -8, Issues
11, September, 2019.
11. Herlambang, I. Pengembangan Media Berbasis Android Menggunakan App AIR 3.2 For Android pada Mata Pelajaran Mekanika
Teknik Jurusan Teknik Gambar Banguna di SMK Negeri 1 Sayegan. JPTK FT UNY, 2015. 

12. Izham, D. Cara Cepat Belajar Adobe Flash, 2012. 

13. Kaur A., Kaur B., Pasricha R. Planar Antenna Covering Sub-6 GHZ for Enabled Mobile Devices. International Journal of Innovative
Technology and Exploring Engineering (IJITEE), ISSN: 2278-3075, 1549-1554,Volume -8, Issues 11, September, 2019.
14. Maria U., Rusilowati A., & Hardyanto W. Interactive Multimedia Development in The Learning Process of Indonesian Culture
Introduction Theme for 5-6 Year Old Children. Journal of Primary 
Education, 8 (3), 344-353, 2018. 

15. Master. Langsung Inget: Mengupas Lengkap All About AndroidPutra. Jakarta: Kuncikom, 2012.
16. Nurfuadi I. Rancang Bangun Media Pembelajaran Pengenalan 
Budaya Indonesia Berbasis Android Menggunakan Phonegap. Skripsi
Jurusan Teknik Informatika, Fakultas Sains dan Teknologi, UIN Alauddin Makassar, 2017. 

17. Patalbansi V., Laxmi G. P. Protecting Data on Mobile Cloud Computing. International Journal of Innovative Technology and
Exploring Engineering (IJITEE), ISSN: 3453-3459,Volume -8, Issues 11, September, 2019.
18. Patil R. M. A Design of The Design & Development of Safety Features In Stationary & Mobile Robots In The Industrial. International
Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN : 2278-3075,172-178, Volume -8, Issues-11 S,
Septemberr, 2019.
19. Salaki R. J., Mogea T., & Oroh E. Z. Design Mobile Learning (M- Learning) Android Englihs For Young Learner. International
Conference on Electrical Engineering, Informatics, and Its Education, 2015. 

20. Salaki R. J. Membangun Karakter Generasi Muda Melalui Budaya Mapalus Suku Minahasa. Jurnal Studi Sosial No. 1, 2014. 

21. Sirisha Y, Reddy D. R. Shiny Gross Defended Reports Dsitribution Pattern for Mobile Smog Calculation. International Journal o f
Innovative Technology and Exploring Engineering (IJITEE), ISSN : 2278-3075, 888-893, Volume -8, Issues-11 S, Septemberr, 2019.
22. Suseto B., Othan Z., and Razalli F. M.The Need to Reform Indonesia’s Maritime Startegy: A review. Indonesia Journal of Geography,
50 (2), 145-153, 2018. 

23. Sutopo A. H. Teknologi Informasi dan Komunikasi dalam Pendidikan. pp 128-129,175-176, Yogyakarta: Graha Ilmu, 2012.
24. Thamilarasan Y., Ikram R. R. R. MyMUET: A Design of a Mobile Based Crowdsourced Assesment for Malaysia University Engligh
Test with Non-Sysnchronous Participant Interaction. International Journal of Innovative Technology and Exploring Engineering
(IJITEE), ISSN: 2278-3075, 2971-2977,Volume -8, Issues 11, September, 2019.
25. Wakhid Wijatmaka, Aris Rakhmadi, Hasyim Asy’ari. Java Based Learning Application Android. Final Project in Bachelor of
Informatics, Universitas Muhammadiyah Surakarta. 2012.
26. Zia A., Hashmi A. R. Exploring the Factors Affecting Service Quality of Zain Mobile Subscribers in Albaha, Saudi Arabia.
International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN: 2278-3075, 2400-2405,Volume -8, Issues
11, September, 2019.

Authors: Rafi Akbar Widyatama, Seng Hansun

Paper Title: Expert System for Chili Plants Disease Detection using Certainty Factor Method
Abstract: This paper describes the creation of an expert system that is used to diagnose diseases in chili
plants using a web-based certainty factor method. This expert system is made based on the weight of symptoms
by experts so that users can find out the disease suffered by chili plants based on symptoms that arise. The
symptom weight was calculated using the certainty factor method. This method is used to accommodate
uncertainties that are often expressed by experts when detecting a disease. The design and manufacture of this
expert system are done using the PHP programming language, MySQL database, CSS and the CodeIgniter
framework. The results of the analysis between expert and expert systems have 87.09% compatibility level, and
based on the calculation of the feasibility of the system with the Delone and McLean model shows that 77.58%
of respondents agree Pakarcabaiku.com is a successful system for detecting chili disease.

Keyword : Certainty Factor, Chili Plants, Delone and McLean Model, Disease, Expert System.
References:
1. Kurniawan, H., & Rahmad, I. F. (2012). Perancangan Sistem Pakar Untuk Mendeteksi Penyakit Pada Tanaman Cabe Dengan Metode
Certainty Factor. CCIT Journal, 5(2), 186-206.
2. Rahayu, E. M. (2018). Membangun Smart City dengan Kecerdasan Buatan | SWA.co.id. Retrieved September 13, 2019, from
https://swa.co.id/swa/trends/membangun-smart-city-dengan-kecerdasan-buatan
3. Kusrini, S. (2006). Sistem Pakar Teori dan Aplikasi. Yogyakarta: Andi Offset.
193. 4. Ibrahim, H. (2015). Menanam Cabai di Musim Kemarau | hortikultura. Retrieved October 3, 2019, from
http://hortikultura.pertanian.go.id/?p=333 1145-
5. Syukur, M., Yunianti, R., & Dermawan, R. (2016). Budidaya cabai panen setiap hari: In Budidaya cabai panen setiap hari (p. 154). 1151
Penebar Swadaya Grup.
6. Turban, E., E. Aronson, J., & Liang, T.-P. (2007). Decision Support Systems and Business Intelligence. Decision Support and Business
Intelligence Systems, 7/E, 1–35. https://doi.org/10.1017/CBO9781107415324.004
7. Surya, R. (2017). Rancang Bangun Sistem Pakar Untuk Deteksi Penyakit Tuberkulosis Paru Menggunakan Metode Certainty Factor
Berbasis Web. Thesis. Universitas Multimedia Nusantara.
8. Halim, S. (2014). Rancang Bangun Sistem Pakar Pendeteksi Resiko Osteoporosis dan Osteoarthritis dengan Metode Certainty Factor
Berbasis Android. Thesis. Universitas Multimedia Nusantara.
9. Winanto, T. (2016). Sistem pakar diagnosa hama dan penyakit tanaman cabai besar menggunakan metode certainty factor. Skripsi.
STMIK Sinar Nusantara Surakarta.A. Karnik, “Performance of TCP congestion control with rate feedback: TCP/ABR and rate
adaptive TCP/IP,” M. Eng. thesis, Indian Institute of Science, Bangalore, India, Jan. 1999.
10. Husna, E. (2010). Implementasi certainty factor dalam sistem pakar berbasis web untuk mendiagnosa penyakit cerebrovaskular disease
(cvd) atau stroke. Thesis. Universitas Islam Negeri Sultan Syarif Kasim Riau.
11. Windhamia, K. (2017). Apa itu sistem pakar? Retrieved from https://students.warsidi.com/2017/06/pengertian-sistem-pakar-
adalah.html
12. Sutojo, T., Mulyanto, E., & Suhartono, V. (2011). Kecerdasan buatan.
13. Halim, S., Hansun, S. (2015). Penerapan Metode Certainty Factor dalam Sistem Pakar Pendeteksi Resiko Osteoporosis dan
Osteoarthritis. ULTIMA Computing, 7(2), 59-69.
14. Puspitasari, D. (2012). Sistem Pakar Diagnosa Diabetes Nefropathy Dengan Metode Certainty Factor Berbasis Web dan Mobile.
Politeknik Elektronika Negeri Surabaya ITS.
15. Jayawardanu, I.H.W., Hansun, S. (2015). Rancang Bangun Sistem Pakar untuk Deteksi Dini Katarak Menggunakan Algoritma C4.5.
ULTIMA Computing, 7(2), 48-58.
16. Veronica, O., Hansun, S. (2015). Web Based Gastric Cancer Expert System Detection Using Forward Chaining. Proc. of International
Conference on New Media – Global Society and New Media (CONMEDIA 2015), Tangerang, Indonesia.

Authors: Malathi Eswaran, P. Balasubramanie, M. Jotheeswari

Paper Title: Hadoop based Parallel Machine Learning Algorithms for Intrusion Detection System
Abstract: Web use and digitized information are getting expanded each day. The measure of information
194. created is likewise getting expanded. On the opposite side, the security assaults cause numerous security dangers
in the system, sites and Internet. Interruption discovery in a fast system is extremely a hard undertaking. The
1152-
Hadoop Implementation is utilized to address the previously mentioned test that is distinguishing interruption in
1156
a major information condition at constant. To characterize the strange bundle stream, AI methodologies are used.
Innocent Bayes does grouping by a vector of highlight esteems produced using some limited set. Choice Tree is
another Machine Learning classifier which is likewise an administered learning model. Choice tree is the stream
diagram like tree structure. J48 and Naïve Bayes Algorithm are actualized in Hadoop MapReduce Framework
for parallel preparing by utilizing the KDDCup Data Corrected Benchmark dataset records. The outcome
acquired is 89.9% True Positive rate and 0.04% False Positive rate for Naive Bayes Algorithm and 98.06% True
Positive rate and 0.001% False Positive rate for Decision Tree Algorithm.

Keyword : Big data, Decision Tree, Hadoop Framework, Intrusion Detection, Machine Learning, Naïve
Bayes.
References:
1. M. Usha and P. Kavitha, "Anomaly based intrusion detection for 802.11 networks with optimal features using SVM classifier",
Wireless Networks, vol. 23, no. 8, 2016, pp. 2431-2446.
2. T. Abbes, A. Bouhoula and M. Rusinowitch, "Efficient decision tree for protocol analysis in intrusion detection", International Journal
of Security and Networks, vol. 5, no. 4, 2010, p. 220.
3. A. Kaur, S. Pal and A. Singh, "Hybridization of K-Means and Firefly Algorithm for intrusion detection system", International Journal
of System Assurance Engineering and Management, vol. 9, no. 4, 2017, pp. 901- 910.
4. W. Yu and H. Lee, "An Incremental-Learning Method for Supervised Anomaly Detection by Cascading Service Classifier and ITI
Decision Tree Methods", Intelligence and Security Informatics, 2009, pp. 155-160.
5. S. Lim and Y. Choi, "Malicious Node Detection Using a Dual Threshold in Wireless Sensor Networks", Journal of Sensor and
Actuator Networks, vol. 2, no. 1, 2013, pp. 70-84.
6. E. Shams and A. Rizaner, "A novel support vector machine based intrusion detection system for mobile ad hoc networks", Wireless
Networks, vol. 24, no. 5, 2017, pp. 1821-1829.
7. P. Natesan, R. Rajalaxmi, G. Gowrison and P. Balasubramanie, "Hadoop Based Parallel Binary Bat Algorithm for Network Intrusion
Detection", International Journal of Parallel Programming, vol. 45, no. 5, 2016, pp. 1194-1213.
8. I. Krontiris, T. Giannetsos and T. Dimitriou, "LIDeA", Proceedings of the 4th international conference on Security and privac y in
communication netowrks - SecureComm '08, 2008.
9. M. Sun and J. Chen, "Research of the traffic characteristics for the real time online traffic classification", The Journal o f China
Universities of Posts and Telecommunications, vol. 18, no. 3, 2011, pp. 92-98.
10. M. Zhao, B. Jia, J. Wang, M. Wu and H. Yu, "Performance Optimization on Dynamic Adaptive Streaming over HTTP in Multi-User
MIMO LTE Networks", IEEE Transactions on Mobile Computing, vol. 17, no. 12, 2018, pp. 2853-2867.

Authors: M. Prabu, Pooja Patil, Mallika Yadav, Nidhi Ranjan

Paper Title: Automated Traffic Sign Recognition System using Computer Vision
Abstract: There are many existing companies who are developing cars on the autonomous driving
technology. With the help of GPS and internet connectivity they create a dynamic map which helps the cars to
navigate. This technology is still new and undergoing rigorous changes. There are many shortcomings to this
existing technology. They are capable of navigating through those areas which are accounted for and surveyed
but when the car enters in any unchartered terrain or there is any internet connectivity issues, the updation in the
map is not possible, which leaves the car to navigate on its own. This can cause many troubles like you can get
late or maybe lost. So to overcome these problems we need such an intelligent system with the help of camera
feeds can monitor and identify the traffic signals dynamically. Traffic sign recognition is based on Advanced
Driving Assistance System (ADAS) which is used by vehicles to recognise various traffic signs ahead. The
system takes continuous video input from the dashboard camera or the camera mounted on the bonnet of the car.
The underlying algorithm extracts the features of the input image and matches them with an existing library of
traffic sign. The output is fed to the driving assistance system and it in turn drives the car accordingly. This
intelligent system uses computer vision. This device will take camera feeds and upgrade the ADA system
instantaneously. The algorithm has been implemented using Python language.

Keyword : Traffic signal recognition, Support vector machine, ADA, image segregation.
195. References:
1. An Automatic Traffic Sign Detection and Recognition System Based on Colour Segmentation, Shape Matching, and SVM,Safat B.
Wali, Hannan M A, Aini Hussain, Salina Abdul Samad, Department of Electrical, Electronic & Systems Engineering, 2015
1157-
2. Kernel based automatic traffic sign detection and recognition using SVM, AnjanGudigar, B. N. Jagadale, Mahesh P.k., 1160
RaghavendraU, Department of Instrumentation andControl Engineering, Manipal Institute of Technology, Manipal, 2012
3. Vision-Based Traffic Sign Detection and Analysis for Intelligent Driver Assistance Systems: Perspectives and Survey, Publisher:
IEEE, Andreas Mogelmose; Mohan Manubhai Trivedi; Thomas B. Moeslund
4. Traffic Sign Recognition Using Visual Feature toward Driver Assistance System, springer, Juan Cao, Lu Lou, Yingchun Zhang, 20 12.
5. Traffic Sign Classification with a Convolutional Network, A. Staravoitau, 2018
6. K. GUAN. B. AI. M. NICOLAS. R.GIESE. A.MOLLER. Z. ZHONG, and T. Kurner, “On the influence of scattering from traffic
signs in vehicle-to-X communications,” IEEE Trans. Veh. Technol. Aug 2016
7. Duan, J. and Viktor,”Real time road edges detection and road signs recognition”. In international Conference on Control, Automation
and Information Sciences (2015).
8. Ren , S. , Girshick , R., Girshick , R., and Sun , J .,“Towards real time object detection with region proposal networks” , I EEE trans.
Pattern Analysis & Machine Intelligence(2017).
9. Zeng, Y., Xu., Shen, D., Fang, Y., and Xiao, Z.,” Traffic sign recognition using kernel extreme learning machines with deep
perceptual features”, IEEE Trans. Intelligent Transportation Systems(2017).
10. Zhu, Z., Liang, D. Zhang, S., Huang, X., Li, B., and HU, H. ,” Traffic sign detection and classification in wild”, in Compute r Vision
and Pattern Recognition(2018)
11. S. Houben. J.Stalkamp, J.Dsalmen,M.Schlipsing, and C.Igel,” Detection of traffic signs in real world images:The German traffic sign
detection
12. 12. M.Tan. B. Wang, Zu, j. Wang. And G.Pan, “Weakly supervised metric learning for traffic sign recognition in a LIDAR-equipped
vehicle,” IEEE Trans. Intell. Transp. Syst. (2016)
13. Color Balance and Fusion for Underwater Image Enhancement Codruta O. Ancuti; Cosmin Ancuti; Christophe De Vleeschouwer;
Philippe Bekaerthttps://ieeexplore.ieee.org/document/8058463/authors#authors
14. Deep Convolutional Neural Network for Inverse Problems in Imaging Kyong Hwan Jin; Michael T. McCann; Emmanuel Froustey;
Michael Unser https://ieeexplore.ieee.org/document/7949028
15. ConnNet: A Long-Range Relation-Aware Pixel-Connectivity Network for Salient Segmentation Michael Kampffmeyer, Nanqing
Dong, Xiaodan Liang, Yujia Zhang, Eric P. Xing
16. T. Ben-Bassat and D. Shinar, ‘‘The effect of context and drivers’ age on highway traffic signs comprehension,’’ Transp. Res. F,
Traffic Psychol. Behav., vol. 33, pp. 117–127, Aug. 2015.

Authors: Caroline El Fiorenza, Sandeep Kumar Barik, Ankit Prajapati, Sagar Mahesh

Paper Title: Hand Gesture Recognition using Convexity Defect


Abstract: Gestures are the simplest way of conveying a message, rather simpler than verbal means. It is the
most primitive way of conversation. Gestures can also be the easiest and intuitive way of communicating with a
computer, they can be used to communicate or convey information to computers, robots, smart appliances and
many other pieces of machinery. It can eliminate the use of mouse and keyboard to some extent. The gestures
cited are basically the variable positions as well as orientations of the hand. They can be detected by a simple
webcam attached to the computer. The image is first changed into its corresponding RGB values and then to
HSV values for better handling and feature recognition. The hand is segregated from the background using
feature extraction. Then the values are matched in proximity of the coded values. Then the region of interest is
calculated using the concept of convexity and background subtraction. The convex defect helps to define the
contour efficiently. This method is invariant for different positions or direction of the gesture. It is able to detect
196. the number of fingers individually and efficiently.
1161-
1165
Keyword : RGB, HSV, hand gesture, background subtraction, detection, feature extraction, convexity defect.
References:
1. Mahmoud Elmezain, Ayoub Al-Hamadi, Bernd Michaelis, A Robust Method for Hand Gesture Segmentation and Recognition Using
Forward Spotting Scheme in Conditional Random Fields, 2010 International Conference on Pattern Recognition.
2. Tasnuva Ahmed, A Neural Network based Real Time Hand Gesture Recognition System, International Journal of Computer
Applications (0975 – 8887) Volume 59– No.4, December 2012
3. Lihua Tian, Liguo Han and Xiujuan Guo, Dynamic Gesture Recognition based on Image Sequence, International Journal of u- and e-
Service, Science and Technology Vol.8, No. 12 (2015), pp.171-182.
4. Qinghe Zheng, Xinyu Tian, Shilei Liu, Mingqiang Yang, Hongjun Wang and Jiajie Yang, Static Hand Gesture Recognition Based on
Gaussian Mixture Model and Partial Differential Equation, IAENG International Journal of Computer Science, 45:4, IJCS_45_4_09
(Advance online publication: 7 November 2018).
5. ChetnaNaidu1, ArchanaGhotkar2, Hand Gesture Recognition Using Leap Motion Controller, International Journal of sqcience and
Research (IJSR) ISSN (Online): 2319-7064 Index Copernicus Value (2013): 6.14 | Impact Factor (2015): 6.391

Authors: J.T. Ramalingeswar, K. Subramanian

Paper Title: A New Plug in EV Strategy for Mitigation of Power Variations in Distribution systems
Abstract: Increasing penetration levels of renewable energy sources in electrical grid distribution systems
causes raped power variations drawing from the penetration levels variation in electrical vehicle charging creates
the problem in the unity grid. In this paper a new artificial intelligence control technique is introduced in
electrical vehicles in order to reduce the power variations caused by the solar power and high low demand. The
fluctuations in electrical vehicle scheduling with energy storage has been studied the main effort is the
minimizing of power variations in slack bus from the specified value and high utilization storage capability.
Energy forecasting and renewable power generation are major considerations in electrical vehicle scheduling.
The fuzzy technique is used to define power storage rate of electrical vehicles. Buttery life time was taken as key
aspect and parameters that cause buttery degradation are considered while prioritizing PEVs for grid support.
However, primary purpose of PEV (to travel) is given highest priority by ensuring maximum energy level before
starting a trip.

197. Keyword : PEV, ESU, Fuzzy controller, load scheduling and flattening.
1166-
References: 1171
1. N. Rotering and M. Ilic, “Optimal charge control of plug-in hybrid electric vehicles in deregulated electricity markets,” IEEE Trans.
Power Syst..,vol. 26, no. 3, pp. 1021-1029, Aug. 2011.
2. 2. F. Guo, E. Inoa, W. Choi, and J. Wang, “Study on global optimization and control strategy development for a PHEV charging
facility,” IEEE Trans. Veh. Technol., vol. 61, no. 6, pp. 2431-2441, Jul. 2012.
3. Basha, CH Hussaian, C. Rani, and S. Odofin. "A review on non-isolated inductor coupled dc-dc converter for photovoltaic grid-
connected applications." International Journal of Renewable Energy Research (IJRER) 7.4 (2017): 1570-1585.
4. S. Kushalini, J. M. Solanki, and N. N. Schulz, “ Development of 3-phase unbalanced power flow using PV and PQ models for DG and
study of impact of DG models,” IEEE Trans. Power Syst., vol. 22. No. 3, pp. 1019-1025, Aug. 2007.
5. Global, E. V. “Outlook 2016, Beyond one million electric cars.” International Energy Agency: France (2016).
6. S. Deilami, A. S. Masoum, P. S. Moses, and M. A. S. Masoum, “ Real-time coordination of plug-in electric vehicle charging in smart
grids to minimize power losses and improve voltage profile,” IEEE Trans. Smart Grid, vol. 2, no. 3, pp. 456-467, Sep. 2011.
7. K. Clement-Nyns, E. Heasen, and J. Driesen, “The impact of charging hybrid plug-in electric vehicles on a residential distribution grid,”
IEEE Trans Psys., vol. 25, no. 1, pp. 371-380, Feb. 2010.
8. H. Sikai and D. Infield, “The impact of domestic plug-in hybrid el;ectric vehicles on power distribution system loads,” in Proc. Int.
Conf. Power syst. Technol. (POWERCON), Hangzhou, chaina, 2010, pp. 1-7.
9. Padiha-Feltrin, Antanio, Darwin Alexis Quijano Rodezno, and Roberto Asnches Mantovani. “Volt-VAR Multi objective Optimization to
peak-load relief and energy efficiency in distribution networks.” IEEE Transactions on Power Delivery 30.2 (2015): 618-626.

Authors: Sai Bharadwaj B, Ch. Sumanth Kumar


198. Classification of the Third and Fourth Heart Sounds using Intrinsic Time-Scale Decomposition and
Paper Title:
Support Vector Machine Technique
Abstract: The two diastolic heart sounds reflecting the malfunctionality of heart are third and fourth
heartsounds(S3 and S4). Early detection of heart failures can decrease the risk by identifying the abnormal heart
sounds through Phonocardiogram (PCG) signal analysis. In this paper abnormal heart sounds are identified and
classified using Intrinsic time scale decomposition (ITD) and Support vector machine (SVM). The proposed
framework has been tested on authenticated database signals under abnormal conditions. The success rate is
really conquering for the SVM classifier with an accuracy over 94% in the S3 detection and 91% for the S4,
which reveals the effectiveness and high efficiency of the proposed work

Keyword : PCG signal, Intrinsic timescale decomposition, Support vector machine.


References:
1. Johnson, A. M., Rose, K. M., Elder, G. H., Chambless, L. E., Kaufman, J. S., & Heiss, “Military Combat and Risk of Coronary H eart
Disease and Ischemic Stroke in Aging Men: The Atherosclerosis Risk in Communities (ARIC) Study,” Annals of Epidemiology,
vol.20,no.2,pp.143–150,2010. “doi:10.1016/j.annepidem.2009.10.006”
2. Redlarski, G., Gradolewski, D., & Palkowski, A, “A System for Heart Sounds Classification,” PLoS ONE, vol.9,no.11,e112673,2014.
“doi:10.1371/journal.pone.0112673”
3. A. K. Dwivedi, S. A. Imtiaz and E. Rodriguez-Villegas, "Algorithms for Automatic Analysis and Classification of Heart Sounds–A
Systematic Review," in IEEE Access, vol. 7, pp. 8316-8345, 2019 “doi: 10.1109/ACCESS.2018.2889437”
4. D. Boutana, M. Benidir and N. Kouras, “The empirical mode decomposition and the SVD for abnormal heart sound signals detection
and time-frequency analysis,” 2nd IET International Conference on Intelligent SignalProcessing2015(ISP),London,pp.1-5,2015. “doi:
10.1049/cp.2015.1780”
5. C. Zhao, Z. Chen, J. Meng and X. Xiang, “Electrocardiograph compression based on sifting process of empirical mode
decomposition,” in Electronics Letters, vol. 52, no. 9, pp. 688-690,April 2016. “doi: 10.1049/el.2015.3391”
6. H. Sharma and K. K. Sharma, “Baseline wander removal of ECG signals using Hilbert vibration decomposition,”in
ElectronicsLetters,vol.51,no.6,pp.447-449,March 2015. “doi: 10.1049/el.2014.4076” 1172-
7. S. Barma, B. Chen, K. L. Man and J. Wang, “Quantitative Measurement of Split of the Second Heart Sound (S2),” IEEE/ACM 1177
Transactions on Computational Biology and Bioinformatics, vol. 12, no. 4, pp. 851-86,July-Aug.2015. “doi:
10.1109/TCBB.2014.2351804”
8. Jin, F., Sugavaneswaran, L., Krishnan, S., & Chauhan, V. S, “ Quantification of fragmented QRS complex using intrinsic time -scale
decomposition,” Biomedical Signal Processing and Control, vol.31, pp.513–523,2017. “doi:10.1016/j.bspc.2016.09.015”
9. Frei, M. G., & Osorio, I., “ Intrinsic time-scale decomposition: time–frequency–energy analysis and real-time filtering of non-
stationary signals,” Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences, vol.463,no.2078,pp. 321 –
342,2006. “doi:10.1098/rspa.2006.1761”
10. Yaseen, Son, G.-Y., & Kwon, S. “ Classification of Heart Sound Signal Using Multiple Features,” Applied Sciences, vol.8,no.12,
pp.2344,2017. “doi:10.3390/app8122344”
11. Tseng, Y.-L., Ko, P.-Y., & Jaw, F.-S, “Detection of the third and fourth heart sounds using Hilbert-Huang transform,” BioMedical
Engineering OnLine, vol.11,no.1,pp. 8,2012. “doi:10.1186/1475-925x-11-8”
12. C. Venkatesan, P. Karthigaikumar, A. Paul, S. Satheeskumaran and R. Kumar, “ECG Signal Preprocessing and SVM Classifier-Based
Abnormality Detection in Remote Healthcare Applications,” in IEEE Access, vol.6,pp.9767-9773,2018. “doi:
10.1109/ACCESS.2018.2794346”
13. M. Mishra, S. Banerjee, D. C. Thomas, S. Dutta and A. Mukherjee, “Detection of Third Heart Sound Using Variational Mode
Decomposition,”in IEEE Transactions on Instrumentation and Measurement, vol. 67, no. 7,pp.1713 -1721,July2018.
“doi:10.1109/TIM.2018.2805198”
14. Debbal, S. M., & Bereksi-Reguig, F, “Analysis and study of the variation of splitting in the second heartbeat sound of wavelet
transform,” Journal of Medical Engineering & Technology, vol.30,no.5,pp. 298–305,2006. “doi:10.1080/03091900500256164”
15. A.Bouril,D.Aleinikava,M.S.Guillem and G.M.Mirsky, “Automated classification of normal and abnormal heart sounds using support
vector machines,” 2016 computing in Cardiology Conference (CinC), Vancouver,BC,pp,549-552,2016. “doi:10.1155/2018/4205027.
16. S. Barma, B. Chen, W. Ji, S. Rho, C. Chou and J. Wang, “Detection of the Third Heart Sound Based on Nonlinear Signal
Decomposition and Time–Frequency Localization,” in IEEE Transactions on Biomedical Engineering,vol.63,no.8,pp.1718-
1727,Aug.2016. “doi: 10.1109/TBME.2015.2500276”
17. Mishra, M., Singh, A., Dutta, M. K., Burget, R., & Masek, J, “Classification of normal and abnormal heart sounds for automatic
diagnosis,” 2017 40th International Conference on Telecommunications and Signal Processing (TSP).
“doi:10.1109/tsp.2017.8076089”

Authors: Monika Saxena, C.K. Jha, Deepika Saxena

Paper Title: A New Pattern Mining Algorithm for Analytics of Real-Time Internet of Things Data
Abstract: The rise of IoT Real time data has led to new demands for mining systems to learn complex
models with millions to billions of parameters, which promise adequate capacity to digest massive datasets and
offer powerful predictive analytics. To support Big Data mining, high-performance powerful computing
platforms are required, which impose regular designs to unleash the full power of the Big Data. Pattern mining
poses a lot of interesting research problems and there are many areas that are still not well understood. The
specifically very elementary challenges are to understand the meaningful data from the junk data that anticipated
into the internet, refer as “Smart Data”. Eighty-five percent of the entire data are noisy or meaningless. It is a
199. very tough often assigned to verify and separate to refine the data from the noisy junk. Researchers’ are
proposing an algorithm of distributed pattern mining to give some sort of solution of the heterogeneity, scaling 1178-
and hidden Big Data problems. The algorithm has evaluated in parameters like cost, speed, space and overhead. 1183
Researchers’ used IoT as the source of Big Data that generates heterogeneous Big Data. In this paper, we are
representing the results of all tests proved that; the new method gives accurate results and valid outputs based on
verifying them with the results of the other valid methods. Also, the results show that, the new method can
handle the big datasets and decides the frequent pattern and produces the associate rule sets faster than that of
the conventional methods and less amount of memory storage for processing. Overall the new method has a
challenging performance as regard the memory storage and the speed of processing as compared to the
conventional methods of frequent pattern mining like Apriori and FP-Growth techniques.
Keyword : Internet of Things, Pattern Mining, Real time analytics, Big data
References:
1. De Francisci Morales, G. (2013, May). SAMOA: A platform for mining big data streams. In Proceedings of the 22nd internation al
conference on World Wide Web companion (pp. 777-778). International World Wide Web Conferences Steering Committee.,
2. Sun, Y., & Han, J. (2013). Mining heterogeneous information networks: a structural analysis approach. ACM SIGKDD Explorations
Newsletter, 14(2), 20-28.
3. Paul, Sujni. "Parallel and distributed data mining." New Fundamental Technologies in Data Mining. InTech, 2011.
4. Da Silva, J. C., Giannella, C., Bhargava, R., Kargupta, H., & Klusch, M. (2005). Distributed data mining and agents. Engineering
Applications of Artificial Intelligence, 18(7), 791-807.
5. Qian, M., & Zhai, C. (2014, November). Unsupervised Feature Selection for Multi-View Clustering on Text-Image Web News Data. In
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management (pp. 1963 -1966).
ACM. Xiao Cai, Feiping And Nie and Heng Huang, “Multi View K-Means Clustering On Big Data Proceedings of the Twenty Third
International Joint Conference On Artificial Intelligent
6. Motegaonkar, V. S., & Vaidya, M. V. (2014). A Survey on Sequential Pattern Mining Algorithms. International Journal of Computer
Science and Information Technologies (IJCSIT), 5(2), 2486-2492.
7. R. Ahmed and G. Karypis, “Algorithms for Mining the Evolution of Conserved Relational States in Dynamic Networks,” Knowledge
and Information Systems, vol. 33, no. 3, pp. 603-630, Dec. 2012.
8. M.H. Alam, J.W. Ha, and S.K. Lee, “Novel Approaches to Crawling Important Pages Early,” Knowledge and Information Systems,
vol. 33, no. 3, pp 707-734, Dec. 2012.
9. S. Aral and D. Walker, “Identifying Influential and Susceptible Members of Social Networks,” Science, vol. 337, pp. 337 -341, 2012.
10. A. Machanavajjhala and J.P. Reiter, “Big Privacy: Protecting
11. Confidentiality in Big Data,” ACM Crossroads, vol. 19, no. 1,pp. 20-23, 2012.
12. R. Agrawal, T. Imielinski, and A. Swami. Database Mining: A Performance Perspective. IEEE Transactions on Knowledge and Data
Engineering, 5(6), pp. 914–925, 1993.
13. Nasreen, S., et al., (2014) " Frequent Pattern Mining Algorithms for Finding Associated Frequent Patterns for Data Streams: A
Survey", Procedia Computer Science,37: p. 109-116.
14. Motegaonkar, V. S., & Vaidya, M. V. (2014). A Survey on Sequential Pattern Mining Algorithms. International Journal of Computer
Science and Information Technologies (IJCSIT), 5(2), 2486-2492.
15. Fan, W., &Bifet, A. (2013). Mining big data: current status, and forecast to the future. ACM SIGKDD Explorations Newsletter, 14(2),
1-5.
16. Park, B. H., &Kargupta, H. (2002). Distributed data mining: Algorithms, systems, and applications.
17. Wu, X., Zhu, X., Wu, G. Q., & Ding, W. (2014). Data mining with big data. Knowledge and Data Engineering, IEEE Transactions on,
26(1), 97-107. (LR).
18. Gupta, R. (2014). Journey from Data Mining to Web Mining to Big Data. arXiv preprint arXiv:1404.4140.
19. Renjit, J. A., &Shunmuganathan, K. L. (2010). Mining the data from distributed database using an improved mining algorithm. arXiv
preprint arXiv:1004.1677.
20. Tsai, C. W., Lai, C. F., Chiang, M. C., & Yang, L. T. (2014). Data mining for internet of things: A survey. Communications Su rveys &
Tutorials, IEEE, 16(1), 77-97.

Authors: R.M. Magomedov


Digital Technologies for Competitive Analysis and Evaluation of Competitive Capacity of a Business
Paper Title:
Entity
Abstract: Along with examining the theory of competition and competitiveness, the economists have been
showing great interest in the assessment of competitiveness in practice [1, 2, 3, 7, 11, 14]. Surely, there are
certain achievements in product competitiveness evaluation, i.e. the availability of trusted methods to evaluate
the competitive performance of identical products and services. However, this is not the case for business
competitiveness. Despite many efforts made in this field, there is still no generally accepted and integrated
method for assessing an entity’s ability to compete.
The dynamic method of evaluation of competitive capacity is based on a clear and universally applicable
understanding of business competitiveness and takes into account the competitive performance of both the
company’s products and the company’s operations. The methodological framework of this approach is very
simple and can be applied to both the current period and/or any previous periods, delivering time series of data
to be further used for deep impact analysis and/or forecasting business competitiveness.

Keyword : digital technologies, competitiveness, price policy, competitive analysis, competitiveness


200.
References:
1. Kevorkova, Z.A., Petrov, A.M., Savina N.V. Towards liabilities of corporate systems. International Journal of Civil Engineering and 1184-
Technology. Volume 10, Issue 2, February 2019, Pages 1582-1593 1189
2. Lymar, M.P., Kevorkova, Z.A., Petrov, A.M. The convergence of national and international accounting standards: Chinese
experience. International Journal of Civil Engineering and Technology. Volume 9, Issue 13, December 2018, Pages 82 -94
3. Karpova T.P., Petrov A.M., Antonova O.V., Directions of Accounting Development in the Conditions of Digitalization. Jour of Adv
Research in Dynamical & Control Systems, Vol. 10, 07-Special Issue, 2018, pp. (117-125)
4. Chernysheva Natalia A., Perskaya Victoria V., Petrov Alexander M., Bakulina Anna A. Green Energy for Belt and Road Initiative :
Economic Aspects Today and in the Future / International Journal of Energy Economics and Policy. 2019, 9(5), 178 -185
5. Petrov A.M., Nikiforova E.V., Kiseleva N.P., Grishkina S.N., Lihtarova O.V., Creation of the reporting on sustainable develop ment of
companies based on socioeconomic measurement statistics / International Journal of Recent Technology and Engineering. Volume-8
Issue-2, July 2019, p. 4005-4012
6. Alexander M. Petrov, Marina V. Kosolapova, Igor G. Yshanov, Nataliya K. Muravitskaya, Hursheda Nurmuhamedova The Economic
Significance of Statistical Research Activities of Representative Offices of Companies Abroad / International Journal of Inno vative
Technology and Exploring Engineering(TM). Volume-8 Issue-10, August 2019 p. 2713-2722
7. Lyudmila V. Sotnikova, Svetlana N. Polenova, Nataliya A. Mislavskaya, Alexander M. Petrov, Mariya M. Basova. Sustainable
development, macro and micro level: Russian and foreign model / International Journal of Recent Technology and Engineering.
Volume-8 Issue-2, July 2019, p. 4524-4532
8. Nikiforova E.V. PARADIGM OF PUBLIC REPORTING OF ECONOMIC ENTITIES // World Applied Sciences Journal. 2014. V.
29, No. 5, pp. 667 — 670.
9. Nobes C., Parker R. Comparative International Accounting. 13th Edition. Pearson, 2016. 640 p.
10. Mita, A.F., Utama, S., Fitriany, F., Wulandari, E.R. The adoption of IFRS, comparability of financial statements and foreign
investors’ ownership. Asian Review of Accounting, 26(3), pp. 391-411.
11. Danrimi, M.L., Abdullah, M., Alfan, E. Investors’ herding practice: do IFRS and national economic culture matter? Managerial
Finance, 44(9), pp. 1117-1133.
12. Riccardi, L. China Accounting Standards: Introduction and Effects of New Chinese Accounting Standards for Business
Enterprises. 2015. 337 p.
13. L. B. Trofimova, "Evolutional Stages of Financial Accounting in the Russian Federation," L. B. Trofimova // International
Accounting, 2014, No. 39 (237), pp. 14 — 23.
14. Suleymanov M.M., Magomedov R.M., Savina S.V., Fomicheva T.L.Basic models of tax federalism in global practice: Specific
characteristics and structural and functional organization. Academy of Accounting and financial studies journal.- 2018. - Vol. 22. -
Issue 3. – С. 1-9.
15. Decree No. 497 of the Russian Federation Government dated May 23, 2015, Concerning the Federal Dedicated Program of Education
Development for 2016 — 2020.
16. Petrov, A. Modern Accounting Concepts: Textbook. M.: Vuzovsky Uchebnik: INFRA-M, 2018.
17. A. M. Petrov, "issues of Standardization of Accounting Policies inside an Enterprise System of the Services Sector," International
Accounting, 2012, No. 31, pp. 10 — 16.
18. A. M. Petrov, Problems of Preparing Consolidated Statements at the Automation Stage. International Accounting, 2011, No. 33, pp. 2
— 10.
19. A. M. Petrov, "Theoretical and Methodological Background to Organization of Accounting and Tax Planning in the Enterprise
Systems of the Services Sector. Monograph", A. M. Petrov, Saint-Petersburg, 2008, Ser. Library of the Eurasian International
Scientific and Analytic Journal Problems of Modern Economy.
20. Petrov, A and Konyakhin, A., Methods and Practice of First IFRS Reporting at a Group of Companies. Monograph, Moscow, 2015.

Authors: P Raja Sekhar Reddy, K Ravindranadh

Paper Title: An Exploration on Privacy Concerned Secured Data Sharing Techniques in Cloud
Abstract: Cloud service is the most popular environment utilized by millions of users for different kind of
service utilization. Cloud services needs to be provided with the concern of satisfying user requirements to
increase their popularity level. The main issues associated with cloud service handling are maintaining integrity
of data, user management, secured data transmission and so on. These issues are addressed by various authors by
introducing the different methodologies. In this analysis work, discussion about those research techniques has
been given with the detailed explanation. This paper provides the overview about the different research
techniques whose main goal is to achieve the increase the data integrity level of the shared data. This paper also
provides the discussion about various dynamic grouping techniques which tends to provide more flexible access
to the user revocation. Different research techniques proposed by various authors has been described and
compared their performance in terms of merits and demerits each research technique. The overall evaluation of
the research technique is done based on numerical outcome present in each research technique and best research
technique has been found

Keyword : Cloud services, data integrity, user privacy requirements, authentication, user revocation, dynamic
grouping
References:
1. Rittinghouse,, J. W., & Ransome, J. F. (2017). Cloud computing: implementation, management, and security. CRC press.
2. Ren, Y. J., Shen, J., Wang, J., Han, J., & Lee, S. Y. (2015). Mutual verifiable provable data auditing in public cloud
storage. 網際網路技術學刊, 16(2), 317-323.
3. Yang, H. L., & Lin, S. L. (2015). User continuance intention to use cloud storage service. Computers in Human Behavior, 52, 219-232.
4. Mazrekaj, A., Shabani, I., & Sejdiu, B. (2016). Pricing schemes in cloud computing: an overview. International Journal of Advanced
201. Computer Science and Applications, 7(2), 80-86.
5. Aldossary, S., & Allen, W. (2016). Data security, privacy, availability and integrity in cloud computing: issues and current
solutions. International Journal of Advanced Computer Science and Applications, 7(4), 485-498. 1190-
6. Yu, Y., Au, M. H., Ateniese, G., Huang, X., Susilo, W., Dai, Y., & Min, G. (2016). Identity-based remote data integrity checking with 1198
perfect data privacy preserving for cloud storage. IEEE Transactions on Information Forensics and Security, 12(4), 767-778.
7. Tan, S., Jia, Y., & Han, W. H. (2015). Research and development of provable data integrity in cloud storage. Chinese Journal of
Computers, 38(1), 164-177.
8. Zhu, H., Tan, Y. A., Zhang, X., Zhu, L., Zhang, C., & Zheng, J. (2017). A round-optimal lattice-based blind signature scheme for cloud
services. Future Generation Computer Systems, 73, 106-114.
9. Yu, Y., Au, M. H., Ateniese, G., Huang, X., Susilo, W., Dai, Y., & Min, G. (2016). Identity-based remote data integrity checking with
perfect data privacy preserving for cloud storage. IEEE Transactions on Information Forensics and Security, 12(4), 767-778.
10. Song, W., Wang, B., Wang, Q., Peng, Z., Lou, W., & Cui, Y. (2017). A privacy-preserved full-text retrieval algorithm over encrypted
data for cloud storage applications. Journal of Parallel and Distributed Computing, 99, 14-27.
11. Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., & Ren, K. (2016). A privacy-preserving and copy-deterrence content-based image
retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security, 11(11), 2594-2608.
12. Salam, M. I., Yau, W. C., Chin, J. J., Heng, S. H., Ling, H. C., Phan, R. C., ... & Yap, W. S. (2015). Implementation of search able
symmetric encryption for privacy-preserving keyword search on cloud storage. Human-centric Computing and Information
Sciences, 5(1), 19.
13. Sohal, A. S., Sandhu, R., Sood, S. K., & Chang, V. (2018). A cybersecurity framework to identify malicious edge device in fog
computing and cloud-of-things environments. Computers & Security, 74, 340-354.
14. Hao, Z., Zhong, S., & Yu, N. (2011). A privacy-preserving remote data integrity checking protocol with data dynamics and public
verifiability. IEEE transactions on Knowledge and Data Engineering, 23(9), 1432-1437
15. Wang, B., Li, B., & Li, H. (2014). Oruta: Privacy-preserving public auditing for shared data in the cloud. IEEE transactions on cloud
computing, 2(1), 43-56.
16. Wang, B., Li, H., Liu, X., Li, F., & Li, X. (2014). Efficient public verification on the integrity of multi-owner data in the cloud. Journal
of Communications and Networks, 16(6), 592-599.
17. Wang, H., He, D., & Tang, S. (2016). Identity-based proxy-oriented data uploading and remote data integrity checking in public
cloud. IEEE Transactions on Information Forensics and Security, 11(6), 1165-1176.
18. Yu, Y., Au, M. H., Ateniese, G., Huang, X., Susilo, W., Dai, Y., & Min, G. (2016). Identity-based remote data integrity checking with
perfect data privacy preserving for cloud storage. IEEE Transactions on Information Forensics and Security, 12(4), 767-778.
19. Shao, B., Bian, G., Wang, Y., Su, S., & Guo, C. (2018). Dynamic Data Integrity Auditing Method Supporting Privacy Protection in
Vehicular Cloud Environment. IEEE Access, 6, 43785-43797.
20. Shen, W., Qin, J., Yu, J., Hao, R., & Hu, J. (2018). Enabling identity -based integrity auditing and data sharing with sensitive
information hiding for secure cloud storage. IEEE Transactions on Information Forensics and Security, 14(2), 331-346.
21. Arshad, M. U., Kundu, A., Bertino, E., Ghafoor, A., & Kundu, C. (2018). Efficient and scalable integrity verification of data and query
results for graph databases. IEEE Transactions on Knowledge and Data Engineering, 30(5), 866-879.
22. Lu, Y., & Hu, F. (2019). Secure Dynamic Big Graph Data: Scalable, Low-Cost Remote Data Integrity Checking. IEEE Access, 7,
12888-12900.
23. Liu, A., Fu, H., Hong, Y., Liu, J., & Li, Y. (2019). LiveForen: Ensuring Live Forensic Integrity in the Cloud. IEEE Transactions on
Information Forensics and Security.
24. Zhang, X., Liu, C., Nepal, S., Pandey, S., & aayvusdcf u,.\’Chen, J. (2012). A privacy leakage upper bound constraint-based approach
for cost-effective privacy preserving of intermediate data sets in cloud. IEEE Transactions on Parallel and Distributed Systems, 24(6),
1192-1202.
25. Rahulamathavan, Y., Phan, R. C. W., Veluru, S., Cumanan, K., & Rajarajan, M. (2013). Privacy-preserving multi-class support vector
machine for outsourcing the data classification in cloud. IEEE Transactions on Dependable and Secure Computing, 11(5), 467-479.
26. Cao, N., Wang, C., Li, M., Ren, K., & Lou, W. (2013). Privacy-preserving multi-keyword ranked search over encrypted cloud
data. IEEE Transactions on parallel and distributed systems, 25(1), 222-233.
27. Zhang, G., Liu, X., & Yang, Y. (2014). Time-series pattern based effective noise generation for privacy protection on cloud. IEEE
Transactions on Computers, 64(5), 1456-1469.
28. Zhang, X., Dou, W., Pei, J., Nepal, S., Yang, C., Liu, C., & Chen, J. (2014). Proximity-aware local-recoding anonymization with
mapreduce for scalable big data privacy preservation in cloud. IEEE transactions on computers, 64(8), 2293-2307
29. Liu, H., Ning, H., Xiong, Q., & Yang, L. T. (2014). Shared authority based privacy-preserving authentication protocol in cloud
computing. IEEE Transactions on parallel and distributed systems, 26(1), 241-251.
30. Zhang, H., Zhou, Z., Ye, L., & Du, X. (2015). Towards privacy preserving publishing of set-valued data on hybrid cloud. IEEE
Transactions on cloud computing, 6(2), 316-329.
31. Islam, S., Ouedraogo, M., Kalloniatis, C., Mouratidis, H., & Gritzalis, S. (2015). Assurance of security and privacy requirements for
cloud deployment models. IEEE Transactions on Cloud Computing, 6(2), 387-400.
32. Shen, M., Ma, B., Zhu, L., Mijumbi, R., Du, X., & Hu, J. (2017). Cloud-based approximate constrained shortest distance queries over
encrypted graphs with privacy protection. IEEE Transactions on Information Forensics and Security, 13(4), 940-953.
33. Cheng, H., Rong, C., Qian, M., & Wang, W. (2018). Accountable Privacy-Preserving Mechanism for Cloud Computing Based on
Identity-Based Encryption. IEEE Access, 6, 37869-37882.
34. Zhu, Z., & Jiang, R. (2015). A secure anti-collusion data sharing scheme for dynamic groups in the cloud. IEEE Transactions on
parallel and distributed systems, 27(1), 40-50.
35. Chen, W., da Silva, R. F., Deelman, E., & Fahringer, T. (2015). Dynamic and fault-tolerant clustering for scientific workflows. IEEE
Transactions on Cloud Computing, 4(1), 49-62.
36. Lingwei, S., Fang, Y., Ru, Z., & Xinxin, N. (2015). Method of secure, scalable, and fine-grained data access control with efficient
revocation in untrusted cloud. The Journal of China Universities of Posts and Telecommunications, 22(2), 38-43.
37. Raghavendra, S., Meghana, K., Doddabasappa, P. A., Geeta, C. M., Buyya, R., Venugopal, K. R., & Patnaik, L. M. (2016). Ind ex
generation and secure multi-user access control over an encrypted cloud data. Procedia Computer Science, 89, 293-300
38. Xu, S., Yang, G., Mu, Y., & Deng, R. H. (2018). Secure fine-grained access control and data sharing for dynamic groups in the
cloud. IEEE Transactions on Information Forensics and Security, 13(8), 2101-2113.
39. Yuan, H., Chen, X., Jiang, T., Zhang, X., Yan, Z., & Xiang, Y. (2018). DedupDUM: Secure and scalable data deduplication with
dynamic user management. Information Sciences, 456, 159-173
40. Cui, J., Zhou, H., Zhong, H., & Xu, Y. (2018). AKSER: Attribute-based keyword search with efficient revocation in cloud
computing. Information Sciences, 423, 343-352.
41. Luo, Y., Xu, M., Huang, K., Wang, D., & Fu, S. (2018). Efficient auditing for shared data in the cloud with secure user revocation and
computations outsourcing. Computers & Security, 73, 492-506.
42. He, Q., Zhang, N., Wei, Y., & Zhang, Y. (2018). Lightweight attribute based encryption scheme for mobile cloud assisted cyber -
physical systems. Computer Networks, 140, 163-173.
43. Peng, S., Zhou, F., Li, J., Wang, Q., & Xu, Z. (2019). Efficient, dynamic and identity-based Remote Data Integrity Checking for
multiple replicas. Journal of Network and Computer Applications, 134, 72-88.

Authors: Sayeda A Rahila, Shraddha Khonde

Paper Title: SAAS: Attack Detection and Prevention with Forensic in cloud environment
Abstract: Basically cloud computing security is essential nowadays, it has arisen as a technology to allow
users as well as clients to access communications, data storage, software as well as exploitation Environment
according to pay-as-what-use structure. Conventional digital forensic can’t be investigated due to some technical
challenges like environmental as well as technical. The vibrant nature of cloud computing provides massive
opportunities to identify malicious request using various security algorithms in cloud environment. Proposed
research work identifies the current issues and provides solutions to reduce some challenges in the cloud
environment. In this paper system proposed forensic investigation of cloud security for trusted and untrusted
environments. System illustrated the various machine learning algorithms for eliminate the malicious request,
and investigate the malicious user also. Proposed method generate the user log base snapshot during the active
session and manual investigator can verify all logs and identify the malicious user. We offer a skilled technique
202. for forensic examination in the cloud with the help of virtual machine (VM) and generate snapshots. The
experimental analysis shows illustration of proposed security of system.
1199-
1203
Keyword : Software as Services, Snapshot generation, Cloud Computing, VM, Cloud Service Provider.
References:
1. Mr. DigambarPowar, Dr. G. Geethakumari “Digital Evidence Detection in Virtual Environment for Cloud Computing” ACM, 2012.
2. Saibharath S, Geethakumari G “Cloud Forensics: Evidence Collection and Preliminary Analysis” IEEE, 2015
3. Mr. Chandrashekhar S. Pawar, Mr. Pankaj R. Patil, Mr. Sujitkumar V. Chaudhari “Providing Security and Integrity for Data Stored In
Cloud Storage” ICICES, 2014.
4. DeeviRadha Rani, G. Geethakumari “An Efficient Approach to Forensic Investigation in Cloud using VM Snapshots” International
Conference on Pervasive Computing (ICPC), 2015.
5. BKSP Kumar RajuAlluri, Geethakumari G“A Digital Forensic Model for Introspection of Virtual Machines in Cloud Computing”
IEEE, 2015.
6. Hubert Ritzdorf, NikolaosKarapanos, SrdjanCapkun “Assisted Deletion of Related Content”ACM, 2014.
7. Liang X, Zhao J, Shetty S, Liu J, Li D. Integrating blockchain for data sharing and collaboration in mobile healthcare applic ations.
InPersonal, Indoor, and Mobile Radio Communications (PIMRC), 2017 IEEE 28th Annual International Symposium on 2017 Oct 8
(pp. 1-5). IEEE.
8. Manoj R, Alsadoon A, Prasad PC, Costadopoulos N, Ali S. Hybrid secure and scalable electronic health record sharing in hybrid cloud.
In2017 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud) 2017 Apr 6 (pp.
185-190). IEEE.
9. Khan SI, Hoque AS. Privacy and security problems of national health data warehouse: a convenient solution for developing coun tries.
InNetworking Systems and Security (NSysS), 2016 International Conference on 2016 Jan 7 (pp. 1-6). IEEE.
10. Shrestha NM, Alsadoon A, Prasad PW, Hourany L, Elchouemi A. Enhanced e-health framework for security and privacy in healthcare
system. InDigital Information Processing and Communications (ICDIPC), 2016 Sixth International Conference on 2016 Apr 21 (pp.
75-79). IEEE.

Authors: A L Siridhara, Mahendra V, P Yakaiah, T Vijetha, Suman Nayak

Paper Title: A Robust Fish Feeding System


Abstract: Fish in the hatcheries are sold by weight. For making the fish gain weight the fish need to swim
(exercise) when the feed is provided which is thrown at specific place in the pond randomly. The problem is how
to distribute the fish feed around the pond and develop such device that feed should be evenly distributed in
pond which enable the fish to swim across the pond to gain maximum weight Our approach to the problem is to
make a robotic boat comprising of SONAR & Ultrasonic sensors which detects the fish in the water on which it
is floating .After detecting the fish, the robotic boat drops the feed while moving away from it. This makes the
fish to move and follow the boat in order to eat the feed. With this the fish gains additional weight and become
healthy.

Keyword : SONAR, Ultrasonic Sensors, Robotic boat etc.


203.
References: 1204-
1. Crespi V, Coche A (2008). Glossary of Aquaculture. Rome, FAO.
2. Belton B, Little CD (2011). Immanent and Interventionist Inland Asian Aquaculture Development and its Outcomes. Development
1206
Policy Review 29(4):459-484.
3. Beveridge CM, Thilsted H, Phillips MJ, Metian M, Troell M and Hall SJ (2013). Meeting the Food and Nutrition Needs of the Poor:
The Role of Fish and the Opportunities and Challenges Emerging from the Rise of Aquaculture. Journal of Fish Biology 83(4):1067-
84.
4. Rutaisire J, Bwanika G, Walekhwa P, Kahwa D (2009). Fish Farming as a Business. Makerere University. Kampala: Fountain
Publishers.
5. Kumar N, Quisumbing AR (2011). Access, Adoption, and Diffusion: Understanding the Long-term Impacts of Improved Vegetable and
Fish Technologies in Bangladesh. Journal of Development Effectiveness 3(2):193-219.
6. Food and Agricultural Organisation (2016). The State of World Fisheries and Aquaculture 2016. Contributing to Food Security and
Nutrition for All. 1-190.
7. Nagel JU (1997). Alternative Approaches to Organizing Extension. in Improving Agricultural Extension: A Reference Manual, edited
by Burton E Swanson, Robert P Bentz, Andrew J Sofranko. Rome: Food and Agricultural Organisation (FAO) 22-34.
8. A L Siridhara, , Reddy, M.S., “Study of typical signal in a Global Positioning System's receiver”, (2018) Journal of Engineering and
Applied Sciences, 13 (6), pp. 1523-1525

Authors: P Ilanchezhian, K Thangaraj, J Jeba Emilyn, S Vasanthi, JL Aldo Stalin

Paper Title: Design of Nanotechnology Based Hazard Free Digital Circuit using Quantum Dot Cellular Automata
Abstract: Currently digital circuits have a high flying role in most communications applications. In this
Paper, a successful approach to risk-free circuit analysis and design using quantum dot cellular automata is
explored at the Nano level. This paper, which we use for both integrated and continuous digital circuits, is a
basic component of QCA circuit operation. The Quantum Dot Cellular Automata Designer Tool is very useful
for designing a large risk-free circuit. So the proposed risk-free circuit is designed and simulated using this
designing software utensil for three input stages. The proposed framework for the risk-free circuit requires only
a small number of major gate operations compared to previous structures because of its three input levels.

Keyword : Combinational logic circuit, Sequential logic circuits, QCA, Majority gate.
References:
204. 1. Ganesh,EN, Lal Kishore and Rangachar, MJS, ”Implementation of Quantum cellular automata combinational and sequential circuits
using Majority logic reduction method”, International Journal of Nanotechnology and Applications. Volume 2,1, 2008.
2. Townsend, WJ, and Abraham,JA, “Complex gate implementations for quantum dot cellular automata,” in Proceedings of 4th IEEE 1207-
Conference of. Nanotechnology, pp. 625–627, 2004. 1210
3. Walus,K, Schulhof,G and Jullien,GA, “High level exploration of quantum-dot cellular automata (QCA),” in Conference proceedings
of 38th Asilomar Conference on Signals, Systems and Computers, vol. 1, pp. 30–33, 2004.
4. Walus,K, Dysart,T, Jullien,G and Budiman,R, “QCADesigner: A rapid design and simulation tool for quantum-dot cellular
automata,”, IEEE Transaction on Nanotechnology., vol. 3, 1, pp. 26–29, 2004.
5. Heumpil Cho, and Swartzlander,EE, “Adder Design and Analyses for Quantum-Dot Cellular Automata”, IEEE Trans.
Nanotechnology., Vol.6,3, 2007.
6. Walus,K, Jullien, G.A. and Dimitrov,V, “Computer arithmetic structures for quantum cellular automata”,. Asilomar Conference on
Signals, Systems, and Computers, 2003.
7. Walus,K, Schulhof, G, Jullien,GA, Zhang,R and Wang,W, “Circuit design based on majority gates for applications with quantum-dot
cellular automata,” in Conference Proceedings of 38th Asilomar Conf. Signals, Systems and Computers, vol. 2, pp. 1354 –1357, 2004.
8. Walus,K, Jullien,GA, Dimitrov,VS, “Computer Arithmetic Structures for Quantum Cellular Automata”, Asilomar Conference on
Signals, Systems and Computers, Pacific Grove, 2003.
9. Wang, W, Walus,K, Jullien,GA, "Quantum-Dot Cellular Automata Adders" Copyright IEEE Nanotechnology Conference, , 2003.
10. Zhang,R, Walus,K, Wang,W and Jullien,GA, “A method of majority logic reduction for quantum cellular automata,” IEEE
Trans.Nanotechnol., vol. 3,4, pp. 443–450, 2004.
11. Lilly Beaulah,H,Thangaraj,K and Chitra,M, “Design of a New Energy Efficient L4 Leach Protocol based Visual Sensor Network for
Forest Monitoring System”, Asian Journal of Research in Social Sciences and Humanities (AJRSSH), Vol 6, issue 7, pp. 662-671,
2016
12. Gomathi,M, Shanmugaraja,P, Ilanchezhian,P, Thangaraj,K, and Komalavalli,D, “Analysis of Social Media Community Using
Optimized Clustering Algorithm “,Proceedings of the International Conference on Intelligent Computing Systems , 2017

Authors: Mounir M. El Khatib, Gouher Ahmed


Management of Artificial Intelligence Enabled Smart Wearable Devices for Early Diagnosis and
Paper Title:
Continuous Monitoring of CVDS
Abstract: Cardiovascular diseases are often sudden and deadly. Every year, world over, there are millions of
CVD deaths, not due to timely detection and treatment and continuous monitoring of patient situations. In the
medical field, Artificial intelligence enabled/driven wearable devices are a new, and welcome development. This
study is addressed to the cure and management of CVDs for timely diagnosis detection, treatment and
monitoring CVDs. It is found that the wearable devices are effective means of meeting the challenges of CVDs.
However, it is a just picking up technology, which needs to be generally known and cost effective, for which
certain suggestions are made such as solar powered batteries in the device for their ever fully working capability.

Keyword : Pervasive health, wearable devices, health informatics


References:
1. Ahmed, G., Al Amiri, N. Khan, W. (2018) “Outward Medical Tourism: A Case of UAE”, Theoretical Economics Letters, 8 (7) 1368 -
1390.
2. Ahmed, G. (2018) “Transforming the UAE from Desert to Developed Economy” Forbes Middle East, April, No. 70, p.29.
3. Alzoubi, H. & Ahmed, G. (2019) “Do TQM Practices Improve Organisational Success? A Case Study of Electronics Industry in the
UAE” International Journal of Economics and Business Research, 17 (4), 459-472.
4. Amponsah, C. & Ahmed, G. (2018) “New Global Dimensions of Business Excellence” International Journal of Business Excellence,
13 (1), 60-78.
5. Andreu-Perez, J., Leff, D. R., Ip, H. M., & Yang, G-Z. (2015). “From wearable sensors to smart implants-–towards pervasive and
personalized healthcare”. IEEE Transactions on Biomedical Engineering, 62(12), 2750-2762.
6. Appelboom, G., Camacho, E., Abraham, M. E., Bruce, S. S., Dumont, E. L., Zacharia, B. E., ... & Connolly Jr, E. S. (2014). “Smart
wearable body sensors for patient self-assessment and monitoring”. Archives of Public Health, 72 (28) 1-9.
7. https://doi.org/10.1186/2049-3258-72-28
8. Boursalie, O., Samavi, R., & Doyle, T. E. (2015). “M4CVD: Mobile machine learning model for monitoring cardiovascular
disease”. Procedia Computer Science, 63, 384-391.
9. Castelli, W. P. (1984). Epidemiology of coronary heart disease: the Framingham study. The American Journal of Medicine, 76(2), 4-
205. 12.
10. Chan, M., Estève, D., Fourniols, J. Y., Escriba, C., & Campo, E. (2012). Smart wearable systems: Current status and future 1211-
challenges. Artificial intelligence in medicine, 56(3), 137-156. doi: 10.1016/j.artmed.2012.09.003
11. El Khatib, M. Al-Nakeeb, A. & Ahmed, G. (2019) “Integration of Cloud Computing with Artificial Intelligence and Its Impact on 1215
Telecom Sector-A Case Study” iBusiness 11 (1), 1-10.
12. Golembiewski, L. (2019) How Wearable AI Will Amplify Human Intelligence, Harvard Business Review, April 30, 1-5.
13. Kakria, P., Tripathi, N. K., & Kitipawang, P. (2015). A real-time health monitoring system for remote cardiac patients using
smartphone and wearable sensors. International journal of telemedicine and applications, Vol. 2015 (Article ID 373474), pp. 1-11.
http://dx.doi.org/10.1155/2015/373474
14. Miyashita, M. & Brady, M. (2019) “The Health Care Benefits of Combining Wearables and AI” Harvard Business Review, May 29, 1-
5.
15. Oresko, J. J., Jin, Z., Cheng, J., Huang, S., Sun, Y., Duschl, H., & Cheng, A. C. (2010). A wearable smartphone -based platform for
real-time cardiovascular disease detection via electrocardiogram processing. IEEE Transactions on Information Technology in
Biomedicine, 14(3), 734-740.
16. Otoom, A. F., Abdallah, E. E., Kilani, Y., Kefaye, A., & Ashour, M. (2015). Effective diagnosis and monitoring of heart
disease. heart, International Journal of Software Engineering 9(1), 143-156.
17. Pantelopoulos, A., & Bourbakis, N. G. (2010). A survey on wearable sensor-based systems for health monitoring and prognosis. IEEE
Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 40(1), 1-12.
DOI: 10.1109/TSMCC.2009.2032660
18. Puri, A. (2017). Acceptance and Usage of Smart Wearable Devices in Canadian Older Adults (Master's thesis, University of Waterloo).
Retrieved on 31 August, 2019 from https://uwspace.uwaterloo.ca/handle/10012/11861
19. Shortsleeve, C. (2018). This Apple Watch Feature Helped Save a Man’s Life. Men’s Journal. Retrieved 31 August, 2019 from
https://www.mensjournal.com/health-fitness/how-this-apple-watch-feature-saved-a-mans-life/
20. Sufi, F., Han, F., Khalil, I. and Hu, J., (2011). “A chaos‐based encryption technique to protect ECG packets for time critical
telecardiology applications”. Security and Communication Networks, 4(5), pp.515-524. https://doi.org/10.1002/sec.226
21. Tuna, G., & Gungor, V. C. (2015) “Energy harvesting and battery technologies for powering wireless sensor networks”.
In Industrial Wireless Sensor Networks Budampati, R. & Kolavennu, S. (eds.) Woodhead Publishing Series in Electronics &
Optical Materials, pp. 25-38. DOI: 10.1016/B978-1-78242-230-3.00002-7
22. Tunnell, C. D., Mitchell, J., Pereira, G., & Zurasky, J. (2017). U.S. Patent Application No. 15/252,468. Retrieved from
https://patentimages.storage.googleapis.com/f2/74/67/9b364b493448d7/US20170132613A1.pdf
23. Weng, M. (2016). “The acceptance of wearable devices for personal healthcare in China”, Master’s Thesis Submitted to University of
Oulu, Finland.
24. World Health Organization (WHO) (2017). Cardiovascular diseases (CVDs), World Health Organization. Retrieved on 31 August
2019 from https://www.who.int/en/news-room/fact-sheets/detail/cardiovascular-diseases-(cvds)

Authors: Babu Pandipati, R. Praveen Sam

Paper Title: Speaker Identification using Machine Learning


Abstract: Whatever the modern achievement of deep learning for several terminology processing tasks,
206. single-microphone, speaker-independent speech separation remains difficult for just two main things. The rest
point is that the arbitrary arrangement of the goal and masker speakers in the combination (permutation 1216-
problem), and also the following is the unidentified amount of speakers in the mix (output issue). We suggest a 1218
publication profound learning framework for speech modification, which handles both issues. We work with a
neural network to project the specific time-frequency representation with the mixed-signal to a high-dimensional
categorizing region. The time-frequency embeddings of the speaker have then made to an audience around
corresponding attractor stage that is employed to figure out the time-frequency assignment with this speaker
identifying a speaker using a blend of speakers together with the aid of neural networks employing deep
learning. The purpose function for your machine is standard sign renovation error that allows finishing
functioning throughout both evaluation and training periods. We assessed our system with all the voices of users
three and two speaker mixes and also document similar or greater performance when compared with another
advanced level, deep learning approaches for speech separation.

Keyword : Source separation, multi-talker, deep clustering, attractor network.


References:
1. Z. Chen, Y. Luo, and N. Mesgarani, “Deep attractor network for single-microphone speaker separation,” pp. 246–250.
2. R Praveen Sam, P. Dileep Kumar Reddy, C. Shobha Bindu published a paper “A Tripartite Partite Key Assignment Scheme For
Security Of Cloud Data classes” Vol 95 Issue-13, pp-3116-3126.
3. R. M. Toroghi, F. Faubel, and D. Krakow, "Multi-channel speech separation with soft time-frequency masking," 2012
4. Z. Chen, S. Watanabe, H. Erdo˘gan, and J. R. Hershey, “Speech enhancement and recognition using multi-task learning of long short
term memory recurrent neural networks,” pp. 3274–3278.
5. A. Narayanan and D. Wang, “Ideal ratio mask estimation using deep neural networks for robust speech recognition,” in Acoustics,
Speech, and Signal Processing (ICASSP), 2013 IEEE International Conference on. IEEE, 2013, pp. 7092–7096.
6. K. Hu and D. Wang, “An unsupervised approach to cochannel speech separation,” vol. 21, no. 1, pp. 122–131.
7. 9. R Praveen Sam, P. Dileep Kumar Reddy, C. Shobha Bindu published a paper “Tri-Partite graph: a novel security scheme for
cloud data” Vol 21 Issue-2, pp-41-47.
8. Y. Wang and D. Wang, “Towards scaling up classification-based speech separation,” vol. 21, no. 7, pp. 1381–1390,
9. D. S. Brungart, “Informational and energetic masking effects in the perception of two simultaneous talkers,” vol. 109, no. 3, pp. 1101–
1109, 2001."
10. N. Mesgarani and E. F. Chang, “Selective cortical representation of attended speaker in multi-talker speech perception,” Nature, vol.
485, no. 7397, pp. 233–236, 2012."

Authors: Ahmed Y. Zakaria, Dalia A. Ali, Islam M. Al-Akraa, Hoda A. Elsawy, Hany A. Elazab

Paper Title: Novel Adsorbent for Industrial Wastewater Treatment Applications


Abstract: In this study, the hydroxyapatite powder is investigated for both of methylene blue and thymol
blue in aqueous solution. The physical and chemical properties of the adsorbent were evaluated systematically
using the different techniques including Microsoft Excel programming, linear regression model and also the
coefficient of determination. Batch adsorption experiments were conducted to determine the effect of contact
time, solution pH, initial dye concentrations, and also the adsorbent dosage on adsorption. The adsorption kinetic
parameters confirmed the better fitting of pseudo-second order kinetic model for both of methylene blue and
thymol blue. The isotherm data of methylene blue and thymol blue could be well described by the Freundlich
isotherm model which means the adsorption is multilayer adsorption with non-uniform distribution of adsorption
heat and affinities over the heterogeneous surface. The maximum adsorption capacity (KF) of methylene blue
and thymol blue is found to be 0.2736 (L/mg) and 11.18407 (L/mg) respectively. The high specific surface area
and the porous structure with some acidic functional groups on the surface were obviously responsible for high
dyes adsorption onto hydroxyapatite (HA). Adsorption kinetics data were modeled with the application of
Pseudo first order, Pseudo second order and Intraparticle diffusion models. The results revealed that the Pseudo
second order model was the best fitting model. Which means that, the adsorption mechanism followed two
stages in which the first one was fast and the other was slower step. Which means the adsorption of dye
molecules was limited by intra particle diffusion and film diffusion, as well as, the adsorption rate in both of
adsorption system are depends only on the slower step.The Boyd plot exposed that the intra-particle diffusion
was the rate controlling step of the adsorption process of both of methylene blue and thymol blue molecules by
207. HA powder. However, the adsorption of methylene blue molecules (basic solution) using of HA as adsorbent
particles is found to be extremely preferable than thymol blue molecules. 1219-
1225
Keyword : Hydrothermal, Palladium, Fe3O4, Nanotechnology.
References:
1. Lu, H.Y., et al., Magnetic Fe(3)O(4) Nanoparticles as New, Efficient, and Reusable Catalysts for the Synthesis of Quinoxaline s in
Water. Australian Journal of Chemistry. 63(8): p. 1290-1296.
2. Elazab, H., et al., Microwave-assisted synthesis of Pd nanoparticles supported on FeO, CoO, and Ni(OH) nanoplates and catalysis
application for CO oxidation. Journal of Nanoparticle Research, 2014. 16(7): p. 1-11.
3. Elazab, H., et al., The Effect of Graphene on Catalytic Performance of Palladium Nanoparticles Decorated with FeO, CoO, and Ni
(OH): Potential Efficient Catalysts Used for Suzuki Cross-Coupling. Catalysis Letters. 147(6): p. 1510-1522.
4. Elazab, H.A., et al., The continuous synthesis of Pd supported on Fe3O4 nanoparticles: A highly effective and magnetic cataly st for
CO oxidation. Green Processing and Synthesis. 6(4): p. 413-424.
5. Elazab, H.A., et al., Highly efficient and magnetically recyclable graphene-supported Pd/Fe3O4 nanoparticle catalysts for Suzuki and
Heck cross-coupling reactions. Applied Catalysis A: General, 2015. 491: p. 58-69.
6. Mankarious, R.A., et al., Bulletproof vests/shields prepared from composite material based on strong polyamide fibers and epoxy resin.
Journal of Engineering and Applied Sciences. 12(10): p. 2697-2701.
7. Mohsen, W., M.A. Sadek, and H.A. Elazab, Green synthesis of copper oxide nanoparticles in aqueous medium as a potential efficient
catalyst for catalysis applications. International Journal of Applied Engineering Research. 12(24): p. 14927-14930.
8. Mostafa, A.R., H.A.-S. Omar, and A.E. Hany, Preparation of Hydrogel Based on Acryl Amide and Investigation of Different Factors
Affecting Rate and Amount of Absorbed Water. Agricultural Sciences. Vol.08No.02: p. 11.
9. Radwan, M.A., et al., Mechanical characteristics for different composite materials based on commercial epoxy resins and different
fillers. Journal of Engineering and Applied Sciences. 12(5): p. 1179-1185.
10. Ashraf, B., et al., Preparation and characterization of decorative and heat insulating floor tiles for buildings roofs. International Journal
of Engineering and Technology(UAE). 7(3): p. 1295-1298.
11. Samir, N.S., et al., Preparation and characterization of bullet-proof vests based on polyamide fibers. International Journal of
Engineering and Technology(UAE). 7(3): p. 1290-1294.
12. Elazab, H.A., Laser vaporization and controlled condensation (LVCC) of graphene supported Pd/Fe3O4 nanoparticles as an efficient
magnetic catalysts for Suzuki Cross – Coupling. Biointerface Research in Applied Chemistry. 8(3): p. 3314-3318.
13. Elazab, H.A., The catalytic activity of copper oxide nanoparticles towards carbon monoxide oxidation catalysis: microwave assisted
synthesis approach. Biointerface Research in Applied Chemistry. 8(3): p. 3278-3281.
14. Elazab, H.A., M.A. Radwan, and T.T. El-Idreesy, Facile Microwave-Assisted Synthetic Approach to Palladium Nanoparticles
Supported on Copper Oxide as an Efficient Catalyst for Heck and Sonogashira Cross-Coupling Reactions. International Journal of
Nanoscience.
15. Elazab, H.A., M.A. Sadek, and T.T. El-Idreesy, Microwave-assisted synthesis of palladium nanoparticles supported on copper oxide in
aqueous medium as an efficient catalyst for Suzuki cross-coupling reaction. Adsorption Science & Technology. 36(5-6): p. 1352-1365.
16. B. Sun, Advances in three-dimensional nanofibrous macrostructures via electrospinning,. Prog. Polym. Sci. , 2014. 39 : p. 862-890.
17. K.B. Tan et al., Adsorption of dyes by nanomaterials:. recent developments and adsorption mechanisms, Sep. Purif. Technol., 2 015.
150 : p. 229-242.
18. Ahmad, M. M. (2017). Versatile nature of hetero-chitosan based derivatives as biodegradable adsorbent for heavy metal ions;
International Journal of Biological Macromolecules, 2017. 105 (Pt 1) : p. 190-203.
19. Ashok et al, Chitosan Modifications and Applications From Dosage Design : Chitosan Functionalization, Chitosan Manufacture,
Properties and Usage. New York: Hauppauge, N.Y. , 2011. P. 85-89.
20. Fatma et al., Insulating material based on shredded used tires and inexpensive polymers for different roofs, International Journal of
Engineering and Technology(UAE), 2018. 7(4): p. 1983-1988.
21. Reem et al., Preparation of insulating material based on rice straw and inexpensive polymers for different roofs, International Journal
of Engineering and Technology(UAE), 2018. 7(4): p. 1989-1994.
22. M. Ghobashy et al., Kinetic study of hydrolysis of ethyl acetate using caustic soda, International Journal of Engineering and
Technology(UAE), 2018. 7(4): p. 1995-1999.
23. Hany, Investigation of Microwave-Assisted Synthesis of Palladium Nanoparticles Supported on Fe3O4 as Efficient Recyclable
Magnetic Catalysts for Suzuki-Miyaura Cross-Coupling, The Canadian Journal of Chemical Engineering, 2019. 97: p. 1545-1551.
24. M. A. Radwan et al., SYNTHESIS, CHARACTERIZATION AND SELECTED APPLICATION OF CHITOSAN-COATED
MAGNETIC IRON OXIDE NANOPARTICLES, Journal of Chemical Technology and Metallurgy, 2019. 54(2): 303-310.
25. Hany et al., Optimization of the catalytic performance of Pd/Fe3O4 nanoparticles prepared via microwave-assisted synthesis for
pharmaceutical and catalysis applications, Biointerface Research in Applied Chemistry, 2019. 9(1): 3794-3799.
26. Hany et al., Hydrothermal synthesis of graphene supported Pd/Fe3O4 nanoparticles as efficient magnetic catalysts for Suzuki Cross –
Coupling, Biointerface Research in Applied Chemistry, 2019. 9(2): 3906-3911.
27. Hany et al., Facile Microwave-Assisted Synthetic Approach to Palladium Nanoparticles Supported on Copper Oxide as an Efficient
Catalyst for Heck and Sonogashira Cross-Coupling Reactions, International Journal of Nanoscience, 2019. 18(5): 1850032.
28. Hany et al., FACILE SYNTHESIS OF REDUCED GRAPHENE OXIDE-SUPPORTED
29. Pd/CuO NANOPARTICLES AS AN EFFICIENT CATALYST FOR CROSS-COUPLING REACTIONS, Journal of Chemical
Technology and Metallurgy, 2019. 54(5): 934-946.
30. Sherif et al., Steric stabilization of colloidal aluminium particles for advanced metalized- liquid rocket propulsion systems, Journal of
Chemical Technology and Metallurgy, 2019. 54(6).
31. Sherif et al., Novel thermoset nanocomposite intumescent coating based on hydroxyapatite nanoplates for fireproofing of steel
structures, Journal of Chemical Technology and Metallurgy, 2020. 55(1).
32. Tarek et al., High Octane Number Gasoline-Ether Blend , International Journal of Innovative Technology and Exploring Engineering
(IJITEE), 2019. 8(9): 732-739.
33. Tarek et al., Physico-Chemical Characteristics of Ethanol–Diesel Blend Fuel , International Journal of Innovative Technology and
Exploring Engineering (IJITEE), 2019. 8(9): 742-747.
34. Hany et al., 3,7-Dinitro-1,3,5,7-Tetraazabicyclo[3,3,1]Nonane (DPT): An Important Intermediate in the Synthesis Route of one of the
Most Powerful Energetic Materials (RDX/HMX) , International Journal of Innovative Technology and Exploring Engineering
(IJITEE), 2019. 8(4S2): 88-95.
35. Hany et al., Follow-up and Kinetic Model Selection Of Dinitro Pentamethylene Tetramine (DPT), International Journal of Innovative
Technology and Exploring Engineering (IJITEE), 2019. 8(8): 2862-2866.
36. Hany et al., SYNTHESIS AND CHARACTERIZATION OF DINITRO PENTAMETHYLENE TETRAMINE (DPT), Jour of Adv
Research in Dynamical & Control Systems, 2019. 11(5S): 310-318.
37. Hany et al., Hydrothermal Preparation of Palladium Supported on Magnetite for Catalysis Applications, International Journal of
Innovative Technology and Exploring Engineering (IJITEE), 2019.
38. Hany et al., Microwave-assisted synthesis of graphene supported hexagonal magnetit
39. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 2019.
40. Abdelrahman et al., Microwave Assisted Synthesis of Binary Metallic Oxides for Catalysis Applications, International Journal of
Innovative Technology and Exploring Engineering (IJITEE), 2019.
41. Basant et al., DECORATIVE ARTICLES BASED ON POLYMERIC MATERIALS, International Journal of Innovative Technology
and Exploring Engineering (IJITEE), 2019.
42. Omnia et al., COMPOSITE MATERIALS BASED ON TWARON AND NANO MATERIALS, International Journal of Innovative
Technology and Exploring Engineering (IJITEE), 2019.
43. Hany et al., Polyvinylpyrrolidone - Reduced Graphene Oxide - Pd Nanoparticles as An Efficient Nanocomposite for Catalysis
Applications in Cross-Coupling Reactions, Bulletin of chemical reaction engineering and catalysis, 2019. 14(3): 490-501.
44. Hany et al., Pd-Fe3O4/RGO: a Highly Active and Magnetically Recyclable Catalyst for Suzuki Cross Coupling Reaction using a
Microfluidic Flow Reactor, Bulletin of chemical reaction engineering and catalysis, 2019. 14(3): 478-489.

Authors: K.Pushpa Rani, Manusha Reddy, B.Anjaneyulu, B.Hari Chandana

Paper Title: A Formal Assessment Paper on EDUSET-MBA Universities Custom Search


Abstract: Smartphones and tablets are steadily changing the way we look after our education. Today
penetrating further deep into the market study of mobiles require application related to educare. EDUSET team
wants to develop a mobile application on MBA university guidance which provides the user with basic
208. university information. A person’s usage of this application helps him/her to begin a good career. Firebase is
used as database and android studio as a platform to develop the app. There are many apps regarding MBA 1226-
learning but there will be no app like EDUSET. This application of this Android Platform is capable of guiding 1228
and suggesting the user with university information based on his/her probe. This application also enables
individuals to become aware of different universities and its activities. The user will be provided with search
option where he/she can probe according to university name or any of the MBA courses. The main vision of this
paper is to give a new user-friendly app which is nowhere present in the mobile application development history.
Keyword : MBA Universities, Mobile Application, Firebase, Android Platform.
References:
1. Pushpa Rani K., Roja G ,” A new approach for converse binary tree traversals”,In International Journal of Engineering and
Technology(UAE),2018.
2. Roja G., Pushpa Rani K.,” IOT based novel session payment system”,In International Journal of Engineering and
Technology(UAE),2017.
3. Lakshmi B.,” Comparative study on modern approaches of recommender system”,In International Journal of Engineering and
Technology(UAE),2018.
4. https://collegedunia.com
5. https://bschool.careers360.com

Authors: Susmitha Valli Gogula, K.Shekar, P.Purushotham , Y Teja Sai Bhavani

Paper Title: Android Based Image Processor For Blind


Abstract: This Paper ‘The Android Based Image Processor For Blind’ is developed to make the daily
routine of blind people better. It is a camera based application which scans the objects present in the image and
gets the information about the objects which can be reflected as a voice message. This is extremely helpful for
discovering the items before the visually impaired individuals. So as to utilize this application, all that the client
needs to do is simply capture the picture before him in the cell phone which at that point settles the items present
in the picture. In this way, this application truly helps dazzle and outwardly hindered individuals by making their
work of recognizing objects simple.
209.
1229-
Keyword : Blind’ is developed to make the daily routine of blind people better. 1232
References:
1. RitendraDatta, Dhiraj Josh, Jia Li and James, Wang, “Image Retrieval : Ideas, Influences and Trends of the New Age”.
2. Mr. Manoj K.Vairalkar1 and Mrs.Sonali.Nimborkar.
3. Thomas Deselars, vittorio,”Visual and semantic similarity in Image”, IEEE 2010
4. C. Gallegullos, A. Rabinovic,S. Belongie “Object categorization using co-occurrence, location and appearance in Computer Vision and
Pattern Recognition”.
5. Susmitha Valli G. " Bioinformatics and image processing—Detection of plant diseases " In Advances in Intelligent Systems and
Computing , 2019.
6. Divya Jyothi G "Design and implementation of an android application for management of event " IJET (UAE),2018

Authors: M M Venkata Chalapathi

Paper Title: Self-Learning Based Emotion Recognition using Data Analytics


Abstract: An outward appearance feeling acknowledgment based human-robot collaboration analytic
framework used for which a layered framework structure is planned. This analytic framework empowers the
robots not exclusively to perceive human feelings, yet additionally to create outward appearance for adjusting to
human feelings. A facial feeling acknowledgment strategy dependent on multiclass extraordinary learning
machine classifier is introduced, which is connected to ongoing outward appearance acknowledgment for robots.
Here, a half and half component descriptor based technique is proposed perceive human feelings from facial
articulations. Blend of spatial sack of highlights with spatial scale-invariant component change, and with spatial
speeded up hearty change are used to enhance the capacity to perceive outward appearances. For arrangement of
feelings, K-closest neighbor and bolster vector machines with direct, polynomial, and spiral premise work bits
are connected. Descriptor produces a settled length include vector for all example pictures independent of their
measure. Spatial SIFT and SURF highlights are free of scaling, turn, interpretation, projective changes, and
mostly to brightening changes. An altered type of pack of highlights is utilized by including highlight's spatial
data for facial feeling acknowledgment. The proposed strategy varies from ordinary techniques that are utilized
for basic item categorization without utilizing spatial data. Tests have been performed on expanded muk–ken
210.
(MK+) and Japanese female outward appearance informational indexes. SVM brought about an
acknowledgment precision of 98.5% on MK+ and 98.3% on informational index. Pictures are resized through 1233-
specific pre-handling, in this way holding just the data of intrigue and decreasing calculation time. 1235

Keyword : Spatial SIFT and SURF, Here, SVM


References:
1. M Bianchi, G Valenza, A Greco, M. Nardelli, E. Battaglia, A. Bicchi and E. P. Scilingo “Towards a novel generation of haptic and
robotic interfaces: integrating affective physiology in human-robot interaction,” in 25th IEEE International Symposium on Robot and
Human Interactive Communication (RO-MAN), 2016. IEEE, 2016, pp. 125–131.
2. C M Ranieri, R A Romero “An emotion-based interaction strategy to improve human-robot interaction,” in Robotics Symposium and
IV Brazilian Robotics Symposium (LARS/SBR), 2016 XIII Latin American. IEEE, 2016, pp. 31–36
3. M Bellantonio, M A Haque, Rodriguez, K. Nasrollahi, Telve, Escarela, J Gonzalez, T B Moeslund, Rasti, and G Anbarjafari,
“Spatiotemporal pain recognition in cnn-based super-resolved facial images,” in International Conference on Pattern Recognition
(icpr). Springer, 2016.
4. Pantic, Rothkrantz, L J M. “Automatic analysis of facial expressions: the state of the art” IEEE Trans. Pattern Anal. Mach. Intell.,
2000, 22, (12), pp.1424–1445
5. Cornelius and R R: “Theoretical approaches to emotion” ISCA Tutorial and Research Workshop on Speech and Emotion, 2000.
6. Busso C Deng Z Yildirim: “ACM”. Analysis of Emotion Recognition Using Facial Expressions, Speech and Multimodal Information,
2004, pp. 205–211
7. Vijayakumari ”Face recognition techniques: a survey”, World J. Comput. Appl. Technol., 2013, 1, (2), pp. 41–50
8. Mishra, B, Fernandes, SL, Abhishek, K, “Facial expression recognition using feature based techniques and model based techniques: a
survey” 2015 2nd Int. Conf. Electronics and Communication Systems (ICECS), 2015, pp. 589–594
9. M Bianchi, G Valenza, A. Greco, M. Nardelli, E Battaglia, A. Bicchi, and E. P. Scilingo, “Towards a novel generation of haptic and
robotic interfaces: integrating affective physiology in human-robot interaction,” in 25th IEEE International Symposium on Robot and
Human Interactive Communication (RO-MAN), 2016. IEEE, 2016, pp. 125–131.
10. C M Ranieri and R A Romero, “An emotion-based interaction strategy to improve human-robot interaction” in Robotics Symposium
and IV Brazilian Robotics Symposium (LARS/SBR), 2016 XIII Latin American. IEEE, 2016, pp 31–36.
11. M Bellantonio, M A Haque, Rodriguez, K Nasrollahi, T Telve, Escarela, J Gonzalez, T B Moeslund, P Rasti, and Anbarjafari,
“Spatiotemporal
12. pain recognition in cnn-based super-resolved facial images,” in International Conference on Pattern Recognition (icpr). Springer, 2016.
13. Noroozi, Marjanovic, Njegus, Escarela, “Fusion of classifier predictions for audio-visual emotion recognition,” in International
Conference on Pattern Recognition (icpr). Springer, 2016.
14. N B Kar, K S Babu, A K Sangaiah, and S. Bakshi, “Face expression recognition system based on ripplet transform type ii and least
square svm,” Multimedia Tools and Applications, pp. 1–24, 2017.
15. A Bolotnikova, H. Demirel, and G. Anbarjafari, “Real-time ensemble based face recognition system for nao humanoids using local
binary pattern,” Analog Integrated Circuits and Signal Processing, pp. 1–9, 2017.
16. R Bowden, A Zisserman, T Kadir, and M. Brady, “Vision based interpretation of natural sign languages,” in 3rd International
Conference on Computer Vision Systems - ICVS 2003, April-2003.

Authors: Mohit Kumar Kakkar, Jasdev Bhatti*, Reetu Malhotra, Manpreet Kaur, Deepika Goyal
Availability Analysis of an Industrial System under the Provision of Replacement of a Unit using
Paper Title:
Genetic Algorithm
Abstract: The main aim of this research work is to present a reliability and availability analysis of a three-
unit system (A, As, B) under the provision of replacement of a unit using the Genetic algorithm. One unit is in
standby mode so that after the failure of one unit it can be active. But one unit which is dissimilar to the previous
one can be replaced with the new one after the failure. It has been considered that there is only one repair man
availability within the organization. Here in this paper we have used the Genetic algorithm for finding out the
optimized availability of the system and also with the assistance of numbers of graphs we have analyzed
reliability characteristics, availability of the framework, so the result of the paper will be very useful for the
industry people.

Keyword : Availability, Genetic Algorithm.


References:
1. F. Barbera, H. Schneider, and E. Watson, “A condition based maintenance model for a two-unit series system”, European Journal of
Operational Research, vol. 116(2), pp. 281-290, 1999.
2. M. D. Berrade, P. A. Scarf, C. A. V. Cavalcante, and, R. A. Dwight, “Imperfect inspection and replacement of a system with a
defective state: A cost and reliability analysis,” Reliability Engineering & System Safety, vol. 120, pp. 80-87, 2013.
3. J. Bhatti, A. K. Chitkara, and M. K. Kakkar, “Stochastic analysis of parallel system with two discrete failures,” Mode l assisted
statistics and applications, vol. 9(3), pp. 257-265, 2014.
4. R. K. Bhardwaj and K. Kaur, “Reliability and profit analysis of a redundant system with possible renewal of standby subject t o
inspection,” International Journal of Statistics and Reliability Engineering, vol. 1(1), pp. 36-46, 2014.
5. J. Bhatti, A. Chitkara, and N. Bhardwaj, “Profit analysis of two unit cold standby system with two types of failure under ins pection
policy and discrete distribution,” International Journal of science and engineering research, vol. 2(2), pp. 1-7, 2011.
6. B. S. Dhillon and Y. Liu, “Human error in maintenance: a review,” Journal of quality in maintenance engineering, vol. 12(1), pp. 21-
36, 2006.
211. 7. L. R. Goel, G. C. Sharma and P. Gupta, “Reliability analysis of a system with preventive maintenance, inspection and two types of
repair,” Microelectronics Reliability, vol. 26(3), pp. 429-433, 1986.
8. J. Jansen and V. D. D. Schouten, “Maintenance optimization on parallel production units,” IMA Journal of Management Mathematics, 1236-
vol. 6(1), pp. 113-134, 1995. 1241
9. A. K. S. Jardine, D. Banjevic and V. Makis, “Optimal replacement policy and the structure of software for condition -based
maintenance,” Journal of Quality in Maintenance Engineering, vol. 3(2), pp. 109-119, 1997.
10. M. Kakkar and J. Bhatti, “Reliability and Profit analysis of a standby unit system with correlated life time in an industry,” Advanced
Studies in Contemporary Mathematics, vol 25(3), pp. 333-340, 2015.
11. M. Kakkar, A. K. Chitkara, and J. Bhatti, “Reliability analysis of two unit parallel repairable industrial system,” Decision Science
Letters, vol. 4(4), pp. 525-536, 2015.
12. M. Kakkar, A. K. Chitkara, and J. Bhatti, “Reliability analysis of two dissimilar parallel unit repairable system with failure during
preventive maintenance,” Management Science Letters, vol. 6(4), pp. 285-296, 2016.
13. M. D. Pandey, X. Yuan and J. M. Van Noortwijk, “Gamma process model for reliability analysis and replacement of aging structu ral
components,” Proceed. ICOSSAR, Rome, Italy, Paper, (311), 2005.
14. E. Papageorgiou and G. Kokolakis, “Reliability analysis of a two-unit general parallel system with (n-2) warm standbys,” European
Journal of Operational Research, vol. 201(3), pp. 821-827, 2010.
15. B. Parashar and G. Taneja, “Reliability and profit evaluation of a PLC hot standby system based on a master-slave concept and two
types of repair facilities,” IEEE Transactions on reliability, vol. 56(3), pp. 534-539, 2007.
16. S. M. Rizwan, V. Khurana and G. Taneja, “Reliability analysis of a hot standby industrial system,” International Journal of Modelling
and Simulation, vol. 30(3), pp. 315-322, 2010.
17. S. K. Srinivasan and R. Subramanian, “Reliability analysis of a three unit warm standby redundant system with repair,” Annals of
Operations Research, vol. 143(1), pp. 227, 2006.
18. R. K. Tuteja, and G. Taneja, “Cost-benefit analysis of a two-server, two-unit, warm standby system with different types of failure,”
Microelectronics reliability, vol. 32(10), pp. 1353-1359, 1992.
19. K. H. Wang, J. B. Ke and W. C. Lee, “Reliability and sensitivity analysis of a repairable system with warm standbys and R unreliable
service stations,” The International Journal of Advanced Manufacturing Technology, vol. 31(11-12), pp. 1223-1232, 2007.
20. J. M. Van Noortwijk and D. M. Frangopol, “Two probabilistic life-cycle maintenance models for deteriorating civil
infrastructures,” Probabilistic Engg. Mechanics, vol. 19(4), pp. 345-359, 2004.
21. M. Xie and C. D. Lai, “Reliability analysis using an additive Weibull model with bathtub-shaped failure rate function,” Reliability
Engineering & System Safety, vol. 52(1), pp. 87-93, 1996.
22. L. Yuan and X. Y. Meng, “Reliability analysis of a warm standby repairable system with priority in use,” Applied Mathematical
Modelling, vol. 35(9), pp. 4295-4303, 2011
23. Castro H.F., Cavalca K. (2003), Availability optimization with Genetic Algorithm; International Journal of Quality and Reliability
Management 20(7); 847-863
24. Goldberg D.E. (2001), Genetic Algorithm in Search; Optimization and Machine Learning, Pearson Edition; Asia.
25. Kalyanmoy Deb (1995), Optimization for Engineering Design: Algorithms and examples; Prentice Hall of India, New Delhi; India.

Authors: K.G Sri Durga Priya, C. Renuga

Paper Title: Dowry Death Cases With Special Reference to Kamlesh Singh VS Vishwaraj Singh
Abstract: The present study is about inhuman crimes which has its origin from dowry. It enables a detailed
discussion on the timely interference of a judiciary which was considered as a new dimension in developing
women's rights against exploitation in the name of dowry. The objective of this paper was to study about the
aftermath ill effects on the victims of dowry offences and continued significance of such draconian practice
even in modern era. The word dowry is almost synonyms with indian women. Dowry is considered as a
sacramental and indispensable custom of marriage especially in Hindu religion which turned into an illegal
practices of the society due to its inhuman nature.According to manu shastra ,women were regarded as lower
class of people which denotes that they were undeclared slaves of such patriarchal society and such society
never let women for observance of equality in marital relationship. In addition to that women's dignity is
oppressed and questioned by such draconian practices like dowry. Shortcut of dowry indicating low status for
women. Ineffective implementation of stringent laws which curbs death deaths indicates the deficiency of
government machineries in protecting women’s life. It also makes an attempt to investigate the legal instruments
which related to the prohibition of dowry in India. The information acquired from this study show that Dowry
Prohibition Act, 1961 took its significance and authority from section 498-A and section 304-B which was
enumerated in Indian penal code, but Article 51-A of the constitution remains ineffective because such
provisions were never considered as an enforceable before a court of law as it was lies in directive principles of
state policy which will not bind any government machineries and it was merely a discretionary provision .In
recent trends, education is considered as a tool for increasing their bargaining power in dowry negotiations
instead of providing social awareness.Judiciary should ensure effective government machinery to implement the
stringent laws along with the legal punishment, to do away with this evil practice. the purpose of this study
random sampling method has been used There are a total of 1489 samples collected with regard to this study .
212.
Keyword : custom, dignity, government machinery, judicial activism, inequality, stringent laws. 1242-
1246
References:
1. Al-Turki, H.A., 2015. Effect of smoking on reproductive hormones and semen parameters of infertile Saudi Arabians. Urology annals,
7(1), pp.63–66.
2. Anon, Dowry. In SpringerReference.
3. Basu, S., 2005. Dowry and inheritance,
4. Bradley, T., Tomalin, E. & Subramaniam, M., 2010. Dowry: Bridging the Gap Between Theory and Practice,
5. Chancey, L. & Dumais, S.A., 2009. Voluntary childlessness in marriage and family textbooks, 1950 -2000. Journal of family history,
34(2), pp.206–223.
6. Cowan, A., 2010. Marriage and Dowry: Oxford Bibliographies Online Research Guide, Oxford University Press.
7. Goody, J. & Tambiah, S.J., 1973. Bridewealth and Dowry, CUP Archive.
8. Grossmann, I. & Varnum, M.E.W., 2015. Social structure, infectious diseases, disasters, secularism, and cultural change in Am erica.
Psychological science, 26(3), pp.311–324.
9. http://shodhganga.inflibnet.ac.in/bitstream/10603/52350/12/12_chapter%206.pdf
10. Hooja, S.L., 1969. Dowry System in India: A Case Study, Delhi] : Asia Press.
11. Katib, A.A. et al., 2014. Secondary infertility and the aging male, overview. Central European journal of urology, 67(2), pp.184–188.
12. Manning, W.D., Fettro, M.N. & Lamidi, E., 2014. Child Well-Being in Same-Sex Parent Families: Review of Research Prepared for
American Sociological Association Amicus Brief. Population research and policy review, 33(4), pp.485–502.
13. Paul, M.C., 1986. Dowry and Position of Women in India: A Study of Delhi Metropolis,
14. https://indiankanoon.org/doc/123123670/
15. Sarda, M., 2011. The Concept of “Dowry” and “Dowry Death” - a Study in the Light of Supreme Court Decision in Ashok Kumar’s
Case. SSRN Electronic Journal
16. http://dx.doi.org/10.2139/ssrn.2711605.
17. Teja, M.K., 1993. Dowry: A Study in Attitudes and Practices, South Asia Books.
18. Verma, M.P., 2017. “An analysis of dowry and dowry offences in India.” VIDHIGYA: The Journal of Legal Awareness, 12(1), p.1.
19. Walters, S., 2018. Becoming and Belonging in African Historical Demography, 1900–2000. In P. Kreager & A. Bochow, eds. Fertility,
Conjuncture, Difference: Anthropological Approaches to the Heterogeneity of Modern Fertility Declines. New York: Berghahn Books.
20. Wise, P., 2017. [Claude Bernard - then and now]. Biologie aujourd’hui, 211(2), pp.157–160.
21. Wyatt, R., 2011. Broken Mirrors: The “Dowry Problem” in India, SAGE Publications Pvt. Limited.

Authors: M. Deepthi, M. Dhinesh

Paper Title: Public Opinion on Partnership under the Indian Partnership ACT 1932
Abstract: Partnership is considered as the relation between the persons who have agreed to share the profits
of a business carried on by all or any of them acting all . Section 4 of the Indian Partnership Act, 1932 deals
about Partnership.In this papaper it is analysed that the division of profits is considered to be a essential element
213. for the existence of partnership which also includes the sharing of profit and losses . A Partnership Agreement is
defined as an arrangement that is agreed by all parties to the transaction and is a successful method of helping 1247-
each of the partners to set up mutually acceptable goals, to share all the profits earned in the business equally. 1251
Partnership is a specific application of the principles of agency. Agreement of partnership need not be express ,
but can be inferred from the course of conduct of the parties to the agreement. Registration of the company is not
mandatory it’s an option according to the Indian Partnership Act ,1932. Partnership is one of the oldest forms of
business relationships and it is also a special kind of contract , which is created out of an agreement. An
empirical study is done where the samples are collected by using probability sampling and random sampling
method. Samples of approximately 1592 respondents are collected . Using the spss tool the value of the chi
square is found and the output of the research is chi square is that there is no significant association between the
there is no association between the awareness of the rights and duties of partners and age and there is no
association between partners entitled to share all the profits earned in business equally and gender. It is
concluded that Partnership is a good form of doing business by making partners and achieving big goals .
Nowadays Partnerships are still preferred by professionals , small trading and business enterprises.

Keyword : Partnership, 2persons, Agreement, Partnershipfirm, Profit.


References:
1. Clarke, Amelia, and Andrew Crane. 2018. “Cross-Sector Partnerships for Systemic Change: Systematized Literature Review and
Agenda for Further Research.” Journal of Business Ethics: JBE 150 (2): 303–13.
2. “Contracts for Partnership Agreements.” n.d. Accessed August 23, 2019. https://smallbusiness.chron.com/contracts-partnership-
agreements-68446.html.
3. Demirag, Istemi, Iqbal Khadaroo, Pamela Stapleton, and Caral Stevenson. 2012. “The Diffusion of Risks in Public Private Partne rship
Contracts.” Accounting, Auditing & Accountability Journal 39 (October): 88.
4. Encyclopedic. 2013. “Cox V. Hickman.” Free Online Dictionary of Law Terms and Legal Definitions, April.
https://legaldictionary.lawin.org/cox-v-hickman/.
5. “Error - Cookies Turned Off.” n.d. Accessed August 23, 2019. https://onlinelibrary.wiley.com/doi/full/10.1111/j.1740-
3324.2004.00497.x.
6. Latimer, Paul. 2016. “Repudiation of Partnership Contracts,” February. https://papers.ssrn.com/abstract=2964695.
7. “[No Title].” n.d. Accessed August 23, 2019a. http://irep.ntu.ac.uk/id/eprint/12983/1/186865_304%20Berry%20Publisher.pdf.
8. ———. n.d. Accessed August 23, 2019b. https://wcer.wisc.edu/docs/working-papers/Working_Paper_No_2008_03.pdf.
9. ———. n.d. Accessed August 23, 2019c. http://www.pearsoned.ca/highered/divisions/virtual_tours/lee/sample.pdf.
10. ———. n.d. Accessed August 23, 2019d. https://www.tandfonline.com/doi/abs/10.1080/01900692.2018.1426012.
11. ———. n.d. Accessed August 23, 2019e. https://ascelibrary.org/doi/abs/10.1061/(ASCE)CO.1943-7862.0001465.
12. ———. n.d. Accessed August 23, 2019f. https://ascelibrary.org/doi/10.1061/%28ASCE%29CO.1943-7862.0000937.
13. ———. n.d. Accessed August 23, 2019g. https://www.worldscientific.com/doi/abs/10.1142/S1363919616500055.
14. ———. n.d. Accessed August 23, 2019h. https://digitalcommons.law.yale.edu/cgi/viewcontent.cgi?article=4126&context=ylj.
15. ———. n.d. Accessed August 23, 2019i. https://www.tandfonline.com/doi/full/10.1080/15693430701526336.
16. Opawole, Akintayo. 2018. “Penalty Mechanisms for Enforcing Concessionaire Performance in Public–private Partnership Contracts in
Nigeria.” Journal of Engineering, Design and Technology 39 (February): 88.
17. “Regulatory Competition in Partnership Law on JSTOR.” n.d. Accessed August 23, 2019.
https://www.jstor.org/stable/25622245?seq=1#page_scan_tab_contents.
18. “Restrictive Covenants and Partnership Agreements.” 2013. LawJournalNewsletters.com. November 1, 2013.
http://www.lawjournalnewsletters.com/sites/lawjournalnewsletters/2013/11/01/restrictive-covenants-and-partnership-agreements/.
19. Seucan, Andreea. 2015. “Specific Aspects Related to the Partnership Agreement,” September. https://doi.org/10.2139/ssrn.2657988.
20. Wasserman, Elizabeth. 2010. “How to Structure a Partnership.” Inc.com. Inc. February 24, 2010.
https://www.inc.com/guides/structuring-partnerships.html.
21. “Website.” n.d. Accessed August 23, 2019a. https://indiankanoon.org/doc/1324656/.
22. ———. n.d. Accessed August 23, 2019b.
https://www.researchgate.net/publication/291300642_The_theory_of_partnership_Why_have_partnerships.

Authors: Mylapalli Ramesh, Venkata Kishore Kumar Rejeti

Paper Title: System and Also Network Control using Virtual Machine Migration
Abstract: Virtualization of computing information has actually been actually a more and more conventional
approach lately, solely in pertinent information resource settings. This has in fact assisted in the surge of cloud
computing, where information location motorists can conveniently over-subscribe their physical internet hosting
servers with using virtual devices in order to enhance the roi for their resources. In a similar technique, the
system locations in cloud records centres are actually also considerably over-subscribed, alongside the web
hyperlinks in the crucial finishings of the system being in fact simply amongst the complete really most over-
subscribed as well as crammed of all, however, furthermore being actually the most effective costly to update.
This provides supplies a history on reports resource concepts, as well as the houses of the website visitor traffic
that perform over them. Command trivialities for handling international efficiency within records facilities seek
that gone over, coming from sending methods to migration units.
214.
Keyword : System control, Network Control, Virtual Machine Migration 1252-
1255
References:
1. C. Guo, H. Wu, K. Tan, L. Shi, Y. Zhang, and also S. Lu, "DCell: a scalable and also mistake- flexible system framework for info
centers," in Procedures of the ACM SIGCOMM 2008 meeting on Information interaction, August 2008, pp. 75-- 86.
2. C. Guo, G. Lu, D. Li, H. Wu, X. Zhang, Y. Shi, C. Tian, Y. Zhang, as well as S. Lu, "BCube: a higher efficiency, server-centric system
style for modular records locations," in Procedures of the ACM SIGCOMM 2009 seminar on Details interaction, August 2009, pp. 63-
- 74.
3. M. Al-Fares, A. Loukissas, and also A. Vahdat, "A scalable, product data center network architecture," SIGCOMM Comput. Commun.
Rev., vol. 38, pp. 63-- 74, August 2008.
4. A. Greenberg, J. R. Hamilton, N. Jain, S. Kandula, C. Kim, P. Lahiri, D. A. Maltz, Patel, and additionally S. Sengupta, "VL2: a
scalable as well as likewise adjustable data facility network," in Pro- ceedings of the ACM SIGCOMM 2009 conference on
Information communication, August 2009, pp. 51-- 62.
5. S. Kandula, S. Sengupta, A. Greenberg, P. Patel, and likewise R. Chaiken, "The nature of data location traffic: dimensions & analysis,"
in Methods of the 9th ACM SIGCOMM workshop on Net size conference (IMC '09), September 2009, pp. 202-- 208.
6. J. Dean and also S. Ghemawat, "MapReduce: streamlined information dealing with on big assortments," Commun. ACM, vol. 51, no.
1, pp. 107-- 113, January 2008.

215. Authors: Brijesh Kumar Bhardwaj


Paper Title: Cloud Computing Environment with Security Issues
Abstract: Security is a significant subject of a few software systems. Cloud computing continue to be
assertion as a most important innovation in IT management. The objective of this paper is to make available the
recent advancement and a wide impression of the obtainable literature cover an assortment of dimensions of the
Cloud security. In addition to the efforts of the paper industry, it also concludes the directions created at various
levels for future research in cloud security base on related work. This possibly will be extremely useful,
predominantly for the entrance level researchers, who desire to behavior the research in these connected areas.

Keyword : Cloud Environment, Security Factors, Challenges


References:
1. H. Abbas, O. Maennel, S. Assar, “Security and privacy issues in cloud computing”, Institut Mines-Télécom and Springer-Verlag
France, (2017).
2. B. Duncan, M. Whittington (2016), “Enhancing Cloud Security and Privacy: The Power and the Weakness of the Audit Trail”,
CLOUD COMPUTING: The Seventh International Conference on Cloud Computing, GRIDs, and Virtualization,.
3. Abdul Muttalib Khan , Dr. Shish Ahmad , Mohd. Haroon, “A Comparative Study of Trends in Security in Cloud Computing”, Fifth
International Conference on Communication Systems and Network Technologies, IEEE (2015).
4. R. Kaur ,S. Kinger, “Analysis of Security Algorithms in Cloud Computing”, international Journal of Application or Innovation in
Engineering & Management (IJAIEM), Volume 3, Issue 3, March (2014).
5. Casola, V., Cuomo, A., Rak, M. and Villano, U., “The Cloud Grid approach: Security analysis and performance evaluation”, Futu re
Generation Computer Systems, 29, 387-401, (2013).
6. Chen D and Zhao H, "Data Security and Privacy Protection Issues in Cloud Computing," International Conference on Computer
Science and Electronics Engineering, Hangzhou, pp. 647-651, (2012).
7. Lombardi F, Pietro R.D, Secure virtualization for cloud computing, In Journal of Network and Computer Applications, Volume 34,
Issue 4, (2011).
8. Shahin Fatima, “SECURITY ISSUES IN CLOUD COMPUTING: A SURVEY”, IJARCS, (2018).
9. R. L Grossman, “The Case for Cloud Computing”, IT Professional, Vol. 11(2), 23-27, (2009).
10. Teneyuca, D, “Internet cloud security: The illusion of inclusion”, Information Security Technical Report, 16, 102-107, (2011).
11. Nagarjuna, Kalyan Srinivas, S.Sajida, Lokesh, “Security Techniques for Multitenancy Applications in Cloud”, International Journal of
Computer Science and Mobile Computing, Vol.2 Issue. 8, 248-251, 2013.
12. Yunchuan Su, “Data Security and Privacy in Cloud Computing”, International Journal of Distributed Sensor Networks, (2014).
13. Kashif Munir and Prof Dr. Sellapan Palaniappan," Framework for Secure Cloud Computing ", International Journal on Cloud
Computing: Services and Architecture (IJCCSA), Vol.3, No.2, April (2013).
14. Krešimir Popović, Željko Hocenski,”Cloud computing security issues and challenges”, MIPRO, May 24-28, Opatija, Croatia (2010).
15. K. Jakimoski, “Security Techniques for Protecting Data in Cloud Computing,” Int. J. Grid Distrib. Comput., vol. 9, no. 1, pp. 49–56,
(2016).
16. A. N. Khan, M. L. Mat Kiah, S. U. Khan, and S. A. Madani, “Towards secure mobile cloud computing: A survey,” Futur. Gener.
Comput. Syst., vol. 29, no. 5, pp. 1278–1299, (2013).
17. A. M.-H. Kuo, “Opportunities and Challenges of Cloud Computing to Improve Health Care Services,” J. Med. Internet Res., vol. 13,
no. 3, p. e67, (2011).
1256-
18. M. B. Mollah, M. A. K. Azad, and A. Vasilakos, “Security and privacy challenges in mobile cloud computing: Survey and way ahe ad,” 1260
Journal of Network and Computer Applications, vol. 84. pp. 38–54, (2017).
19. H. Rasheed, “Data and infrastructure security auditing in cloud computing environments,” Int. J. Inf. Manage., vol. 34, no. 3, pp. 364–
368, (2014).
20. M. Alhomidi and M. Reed, “Security Risk Analysis as a Service,” in 2013 8th International Conference for Internet Technology and
Secured Transactions, ICITST, pp. 156– 161, (2013).
21. Ateniese, G., et al., Provable data possession at untrusted stores, in Proceedings of the 14th ACM conference on Computer and
communications security, ACM: Alexandria, Virginia, USA. p. 598- 609, (2007).
22. Erway, C., et al., Dynamic provable data possession, in Proceedings of the 16th ACM conference on Computer and communications
security, ACM: Chicago, Illinois, USA. p. 213-222, (2009).
23. Shen, Y., Li, K., Yang, L.T., “Advanced Topics in Cloud Computing” Journal of Network and Computer Applications 12, Springer,
301–310 (2010).
24. Casola, V., Mazzeo, A., Mazzocca, N., Victoriana, V, “A Security Metric for Public key Infrastructures”, Journal of Computer
Security, Springer, 15(2), 78–85 (2007).
25. Sharma, P., Sood, S.K., Kaur, S.: Security Issues in Cloud Computing. In: Mantri, A., Nandi, S., Kumar, G., Kumar, S. (eds.) HPAGC.
CCIS, vol. 169, pp. 36–45. Springer, Heidelberg (2011).
26. Jamil, D., Zaki, H.:, “Cloud Computing Security”, International Journal of Engineering Science and Technology 3(4), 3478–3483
(2011).
27. Dinh, H.T.; Lee, C.; Niyato, D.; Wang, P.: A survey of mobile cloud computing: architecture, applications, and approaches. Wirel.
Commun. Mob. Comput. 13(18), 1587–1611 (2013).
28. Doukas, C.; Maglogiannis, I.: Bringing iot and cloud computing towards pervasive healthcare. In: Proceedings of the Sixth
International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 922–926. IEEE, Palermo,
Italy (2012).
29. Li Yan, “Cloud Computing Security and Privacy”, Proceedings of the International Conference on Big Data and Computing, ACM,
Pages 119-123, (2018).
30. Ashish Singh et. al. “Cloud security issues and challenges: a survey”, Journal of Network and Computer Applications, (2017).
31. Mihir Manavati, Cloud Security: A Gathering Storm”, ACM, (2017).
32. Ainul Azila Che Fauzi. Et.al., “On Cloud Computing Security Issues”, Springer-Verlag Berlin Heidelberg (2012).
33. Prachi Deshpande et. al., “Security and service assurance issues in Cloud environment”, The Society for Reliability Engineering,
Quality and Operations Management (SREQOM), Springer, (2016).
34. Vieira K, Schulter A, Westphall C, Westphall C,”Intrusion detection techniques for Grid and Cloud computing environment”, IT Prof
12(4):38–43, (2011).
35. Qusay Kanaan Kadhim et.al., “A Review Study on Cloud Computing Issues”, International Conference on Big Data and Cloud
Computing (ICoBiC) ( 2017).
36. A. N. Khan, M. L. Mat Kiah, S. U. Khan, and S. A. Madani, “Towards secure mobile cloud computing: A survey,” Futur. Gener.
Comput. Syst., vol. 29, no. 5, pp. 1278–1299, (2013).
37. D. Huang, Z. Zhou, L. Xu, T. Xing, Y. Zhong, Secure data processing framework for mobilecloud computing, in: Proc. IEEE
INFOCOM Workshop on Cloud Computing, INFOCOM ’11, Shanghai, China, June (2011).
38. Z. Zhou, D. Huang, “Efficient and secure data storage operations for mobile cloud computing”, IACR Cryptology ePrint Archive: 185,
(2011).
39. D. Zissis, D. Lekkas, Addressing cloud computing security issues, Future Generation Computer Systems 28 (3) 583 –592, (2012).
40. Anshul Mishra, Devendra Agarwal, MH Khan, “Confidentiality Estimation Model: Fault Perspective”, International Journal of
Advanced Research in Computer Science, Vol 8, Issue 5, May, 2017.

Authors: H. Krishnaveni, V. Sinthu Janita

Paper Title: PE2 - A Service Oriented Meta Task Scheduling Framework in Cloud Environment
Abstract: Cloud computing is an emerging computing environment which facilitates on demand services.
As it contributes a large pool of computing resources, scheduling of tasks in an efficient manner is one of the
main problems. Poor allocation of tasks affects the performance of the whole system. Hence it is very important
to schedule the tasks for better utilization of resources by allocating them properly to particular resources in
particular time. Efficient scheduling algorithms fulfill the user requirements and also satisfy the needs of the
cloud service providers without affecting the performance of the environment. Execution Time based Sufferage
Algorithm (ETSA), Cost and Completion Time based Sufferage Algorithm (CCTSA) and Modified Artificial
Fish Swarm(MAFSA) Algorithm are efficient task scheduling approaches developed in cloud environment.
These algorithms considered the parameters such as makespan, cost and resource utilization while scheduling
the tasks and produced better performance. This paper presents a scheduling framework which converts the
above said algorithms in to services and deployed in the cloud. Depends on the user’s requirements, the services
will be delivered.

Keyword : cloud computing, task scheduling, cost, resource utilization, makespan


References:
1. Vijayalakshmi A. Lepakshi, Prashanth C. “A Study on Task Scheduling Algorithms in Cloud Computing”, International Journal of
Engineering and Innovative Technology (IJEIT), Vol. 2, Iss.11, 2013
2. Gawali M., Shinde S. "Task scheduling and resource allocation in cloud computing using a heuristic approach", Journal of Cloud
Computing, Springer, Vol.7, Pp. 1-16, 2018.
3. Armbrust M, Fox A, Griffith R, Joseph AD. “A view of cloud computing”, Communication of ACM, Vol. 53, Iss.4, Pp.50–58, 2010.
216. 4. Parsa S., Entezari-Maleki R. ” RASA: A New Task Scheduling Algorithm in Grid Environment”, World Applied Sciences
Journal, Vol. 7, Pp.152-160, 2009. 1261-
5. Chawda, P., Chakraborty, P.S. "An improved min-min task scheduling algorithm for load balancing in cloud computing", Internal
Journal on Recent Innovation and Trends in Computing and Communication, Vol.4, Pp.60–64, 2016.
1267
6. J.K Konjaang, J.Y Maipanuku and K.K Kubuga. "An Efficient Max-Min Resource Allocator and Task Scheduling Algorithm in
Cloud Computing Environment", International Journal of Computer Applications, Vol. 142, Iss.8, Pp. 25 –30, 2016.
7. Su S, Li J, Huang Q, Huang X, Shuang K, and Wang J. "Cost efficient task scheduling for executing large programs in the cloud",
Parallel Computing, Vol. 39, Iss. 4-5, Pp. 177–188, 2013.
8. Naseem A.AL-Sammarraie, Mohammed .F. Al-Rahmawy and Magdi Z. Rashad. "A scheduling algorithm to enhance the performance
and the cost of Cloud Services", Computer Engineering and Intelligent Systems, Vol. 6, Iss.8, 2015.
9. Mosleh M. A. S., Radhamani G, Mohamed A. G. Hazber, and Syed Hamid Hasan. "Adaptive Cost-Based Task Scheduling in Cloud
Environment", Scientific Programming, vol. 2, Article ID 8239239, 2016
10. Awad A.I., El-Hefnawy N.A., Abdel_kader H.M. "Enhanced Particle Swarm Optimization For Task Scheduling In Cloud Computing
Environments", International Conference on Communication, Management and Information Technology (ICCMIT2015), Elsevier,
Science Direct, Procedia Computer Science, Vol. 65, Pp. 920 – 929, 2015.
11. Saleh H, Nashaat H, Saber W, and Harb H.M. "IPSO task scheduling algorithm for large scale data in cloud computing environmen t".
IEEE Access, Vol. 7, Pp.5412–5420, 2019.
12. Dordaie N., and Navimipour N. J. "A hybrid particle swarm optimization and hill climbing algorithm for task scheduling in the cloud
environments", ICT Express, Vol. 4, Issue. 4, Pp. 199–202, 2017.
13. Xu Y, Li K, Hu J, Li K. "A genetic algorithm for task scheduling on heterogeneous computing systems using multiple priority queues",
Information Sciences Vol.270, Pp. 255–287, 2014.
14. B.Keshanchi, A.Souri, N.Jafari Navimipour. "An improved genetic algorithm for task scheduling in the cloud environments using the
priority queues: Formal verification, Simulation,and statistical testing", Journal of Systems and Software, Vol.124, Pp.1–21, 2017.
15. Krishnaveni H., Sinthu Janita V. "Execution Time based Suffrage Algorithm for Static Task Scheduling in Cloud", Advances in B ig
Data and Cloud Computing,Springer,Vol.750, Pp. 61-70, 2018.
16. Krishnaveni H, George Amalarethinam D.I., Sinthu Janita V. "Cost and Completion Time based Sufferage Algorithm for Task
Scheduling in Cloud Environment", International Journal of Research in Electronics and Computer Engineering (IJRECE), Vol. 7,
Iss.2, Pp.2807-2812, 2019.
17. Krishnaveni H., Sinthu Janita V. "Modified Artificial Fish Swarm Algorithm for Efficient Task Scheduling in Cloud Environment",
International Journal of Computer Sciences and Engineering (IJCSE), Vol.7, Iss.5, Pp.1363-1371, 2019.

Authors: Kuruvilla John, Abimanyu M, Rishi Raj, Aravind M Pillai, Shahana Samad

Paper Title: A Novel Technique of Gesture Recognition for Car Infotainment Control
Abstract: This paper details the development of a gesture recognition technique for car infotainment
control. Nowadays, in highway due to heavy traffic or twist and turns along the road the drivers cannot afford to
take their eyes of the road. One of the prominent human-machine interface (HMI) technology is gesture
recognition. Gesture can be used in the automotive industry to provide a secure and luxurious control interface
that will limit driver distraction. Human-machine interfaces permit working vehicle gadgets without changing
217.
the driver's consideration. A complete framework for controlling the infotainment hardware through hand
motions is clarified in this paper. 1268-
1271
Keyword : Gesture, Infotainment, Radar, Sensors.
References:
1. Pickering C, Burnham K, and Richardson M (2007), “A research study of hand gesture recognition technologies and applications for
human vehicle interaction,” in 2007 IET 3rd Institution of Engineering and Technology Conference on Automotive Electronics,
Warwick, UK.
2. Young K, Regan M (2007), “Driver distraction: a review of the literature,” Distracted Driving, Sydney, Australia: Australasia n College
of Road Safety, 2007, pp. 379-405.
3. Wachs J P, Kolsch M, Stern H, and Edan Y (2011), “Vision based hand gesture applications,” Communications of the ACM, vol. 54, no.
2, pp. 60-71
4. Breuer P, Eckes C, and Müller S (2007), “Hand gesture recognition with a novel IR time-of-flight range camera–a pilot study”, in
MIRAGE 2007, LNCS 4418, pp. 247– 260
5. Keskin C, Kırac F, Kara Y E, and Akarun L (2011), “Real time hand pose estimation using depth sensors”, in IEEE International
Conference on Computer Vision Workshops, pp 1228-1234,
6. Molchanov P, Gupta S, Kim K, and Pulli K (2015), “Multi-sensor system for driver’s hand-gesture recognition,” IEEE 11th
International Conference and Workshops on Automatic Face and Gesture Recognition, Ljubljana, Slovenia, pp. 1-8
7. Riener A, Rossbory M, and Ferscha M (2011), “Natural DVI based on intuitive hand gestures,” INTERACT Workshop User
Experience in Cars, pp. 62-66.
8. Molchanov P, Gupta S, Kim K, and Kautz J (2015), “Hand gesture recognition with 3D convolutional networks,” IEEE Conference on
Computer Vision and pattern Recognition Workshops, Boston, MA, USA, pp. 1-7.
9. Kuruvilla John, Vinod Kumar R.S., and Kumar S.S., “A Novel Design of Synchronous Counter for Low Power and High-Speed
Applications,” International Journal of Engineering and Advanced Technology, vol. 8, issue. 4, pp. 779-783, 2019.
10. Kuruvilla John, Vinod Kumar R.S., and Kumar S.S., “Effect of clock gating in conditional pulse enhancement flip-flop for low power
applications,” International Journal of Electrical Engineering and Informatics, vol. 7. no. 2, pp. 357-365, 2019.
11. Kuruvilla John, Vinod Kumar R.S., and Kumar S.S., “ Design of conditional pulse enhancement flip-flop embedded with clock gating
and signal feed-through mechanism, ”Journal of Engineering Science and Technology, vol. 14, no. 4, pp. 2000-2012, 2019.
12. Kuruvilla John, Vinod Kumar R.S., and Kumar S.S., “Impact of Pulse-Triggered Flip-Flops in Low Power Applications,” Journal of
Advance Research in Dynamical and Control Systems, vol. 10, issue. 1, pp. 298-306, 2018.
13. Kuruvilla John, Vinod Kumar R.S., and Kumar S.S., “Design of low power and high speed implicit pulse flip-flop and its application,”
International Journal of Engineering and Technology, vol. 7, no. 3, pp. 1893-1898, 2018.
14. Kuruvilla John, Vinod Kumar R.S., and Kumar S.S., “Performance Comparison of Explicit Pulsed Flip-Flops in Low Power and High-
Speed Application,” in Proceedings of International Conference on Circuits and Systems in Digital Enterprise Technology
(ICCSDET), Kottyam, Kerala, India, Dec. 2018.

Authors: B Kanthamma, P.V. Sridevi

Paper Title: Design and Simulation of Horizontally placed H-shaped Fractal Antenna
Abstract: The design and simulation of horizontally placed H-Shaped Fractal Antenna is presented in this
paper using CST Microwave Studio simulation software and the excitation is provided by using Nickel material
for feeding in Y direction, wave guide port feeding method is used.. The simulated result shows that by edge
cutting the directivity increases, return loss is very less and the voltage standing wave ratio is nearly equal to
unity as the number of iterations increases. In generating multiple frequencies., the horizontally placed H shape
fractal structure is advantageous. This antenna can be used in the Wi-Fi due to its better performance in Return
loss, VSWR and directivity. In this paper four stages of this antenna is designed and simulated, the third
iteration of this antenna is fabricated for Return loss and VSWR. The observations are conducted on antenna
parameters such as the return loss for the frequency of 9.5 GHz is -27.6 dB and observed nearly equal value for
measured results. The VSWR of both simulated and measured results are also same.

Keyword : CST, returnloss, F-shaped, Fractal.


References:
1. “Fractal antennas: design, characterization and applications”, by J. Gianvittorio, Master’s Thesis, University of California, Los
218. Angeles, 2000.
2. “Small Koch fractal antennas for wireless local area network”, by A. Jamil, M. Z. Yusoff and N. Yahya IEEE 978 -1-4244-7006-8/10,
pp. 104-108, 2010.
1272-
3. “Multiband E-shaped Fractal Microstrip Patch Antenna with DGS for Wireless Applications. By I A. Nagpal, S. S. Dhillon JETAE 1276
International Journal of Emerging Technology and Advance Engineering, Vol. 2, pp 241244.
4. “Koch curve fractal antenna for Wi-Max and C-Band wireless applications” by S. Yadav, R. Choudhary, U. Soni, A. Dadhich and M.
M. Sharma, IEEE 5th International Conference- Confluence The Next Generation Information Technology Summit, pp. 490-494, 2014.
5. “Microstrip Antenna,” Antenna Theory, Analysis and Design, Third Edition, John Wiley and Sons by C.A.Balanis, pp. 811 -876, 2010.
6. “Miniaturized UWB monopole microstrip antenna design by the combination of Giusepe peano and Sierpinski carpet fractals,” by
H. Oraizi and S. Hedayati, IEEE Antennas and Wireless Propagation Letters , vol. 10, pp. 67–70, 2011.
7. “Design of Simple Multiband Patch Antenna for Mobile Communication Applications Using New E-shape Fractal.” by N. Bayatmaku,
P. Lotfi and M. Azarmanesh IEEE Antenna And Wireless Propagation Letters ,vol .10,2011.
8. “A Dual Band Star Fractal Antenna with Slot for Wireless Applications,” by S. Yadav, R. Choudhary, U. Soni, A. Dadhich and M. M.
Sharma, International Conference on Signal Propagation and Computer Technology (ICSPCT), IEEE, pp. 738-740, 2014
9. “Design of fractal based micro-strip rectangular patch antenna for multiband applications,” by J. S. Sivia and S. S. Bhatia IEEE
International Advance Computing Conference (IACC), pp. 712-715.
10. “Analysis and design of triple band compact micro-strip patch antenna with fractal elements for wireless applications,” by Bharti, S.
Bhatia and J. S. Sivia International Conference on Computational Modeling and Security (CMS 2016).
11. “A quad band circular patch antenna with fractal elements for S-band and C-band applications,” by Elsevier Procedia Computer
Science, Vol. 85, pp. 380-385, 2016.A. Kaur and N. Sharma , International Journal of Computer Applications, Vol. 144, No. 3, pp. 1-4,
2016.
12. “A Design of E-shaped Rectangular fractal antenna by using line feeding technique by Ramandeep Kaur and Narinder Sharma
International Journal of Computer Applications(0975 – 8887)Volume 147 – No.3, August 2016G. Ramesh, B. Prakash, B. Inder and I.
Apisak, Microstrip Antenna Design Handbook, Artech House, Boston, London.

Authors: A. Murugan, S. Ganesan

Paper Title: Hybrid LRU Algorithm for Enterprise Data Hub


219. Abstract: In the computing theory, cache is key concept to process the in memory data from slow storage
layer into faster. Key objective is to speed up the end user requests from cache storage. As cache is limited in 1277-
size, it is essential to build the efficient algorithm to replace the existing unused content from faster memory. 1281
Enterprise Data Hub makes a single golden storage to produce any kind of reports at any point of time from the
various sources of any system. Data integrity and governance parameters add the credibility to this centralized
data. In general, Big Data processing uses the disk based technique to handles the business logic processing.
This research paper is to leverage the in memory processing for the business use case of Enterprise Data Hub.
This paper provides an algorithm to handle Enterprise Data Hub in efficient design using prioritized Least
Recently Used algorithm. This paper depicts about the experimental advantage of execution time optimization
and efficient page/cache hit ratio, using hybrid Least Recently Used algorithm with priority mechanism. It
helps the industry Enterprise Data Hub for the faster execution model.

Keyword : Prioritization, Least Recently Used, Big Data, Enterprise Data Hub, Cache Algorithm, Hybrid
LRU, Cache Hit Ratio, etc.
References:
1. Ronald J. Dovich and Peter J. Eppele, "Metadata-driven data presentation module for database system", US6308168B1, February 1999
2. Yan, Ling-Ling, Renée J. Miller, Laura M. Haas and Ronald Fagin, "Data-Driven Understanding and Refinement of Schema
Mappings", SIGMOD 2001
3. Mo Chen, Rezaul Alam Chowdhury, Vijaya Ramachandran, David Lan Roche and Lingling Tong, "Priority Queues and Dijkstra's
Algorithm", UTCS Technical Report TR-07-54, October 2007, [Online] Available:
https://www.researchgate.net/publication/250152101
4. Priyanka Yadav, Vishal Sharma and Priti Yadav, "Cache Memory – Various Algorithm", International Journal of Computer Science
and Mobile Computing, Vol. 3, Issue. 9, September 2014
5. Nathan Beckmann and Daniel Sanchez of Massachusetts Institute of Technology, "Modeling Cache Performance Beyond LRU", 2016,
Online https://people.csail.mit.edu/sanchez/papers/2016.model.hpca.pdf
6. Jaafar Alghazo, Adil Akaaboune and Nazeih Botros of Illinois University at Carbondale, "SF-LRU Cache Replacement Algorithm",
2004, Online https://www.researchgate.net/publication/4088265_SF-LRU_cache_replacement_algorithm
7. R. L. Mattson, J. Gecsei and D. R. Slutz, “Evaluation techniques for storage hierarchies,” IBM Sys. J., vol. 9, no. 2, 1970
8. M. Qureshi, A. Jaleel and Y. Patt, “Adaptive insertion policies for high performance caching,” in ISCA-34, 2007
9. A. Pan and V. S. Pai, “Imbalanced cache partitioning for balanced data-parallel programs,” in MICRO-46, 2013
10. G. Keramidas, P. Petoumenos and S. Kaxiras, “Cache replacement based on reuse-distance prediction,” in ICCD, 2007
11. A. Jaleel, K. Theobald and S. Steely, “High performance cache replacement using re-reference interval prediction,” in ISCA-37, 2010.
12. O’Neil E. J., O’ Neil P. E., Weikum G., "An optimality proof of the LRU-k page replacement algorithm", ACM, vol. 46, no. 1, 1999

Authors: S. Beski Prabaharan, Saira Banu, Monika Sethi

Paper Title: Metaheuristic Technique for Dynamic and Energy Efficient Routing (METDEER) in MANET
Abstract: The Metaheuristic Technique in Mobile Ad-hoc Network (MANET) is an experiment based
model for improving lifetime of the MANET. This contribution proposes a Balanced Network Monitoring and
Routing-Based on Ant Colony Optimization Technique (BNMR-ACOT) that enhances the lifetime of the
network by providing a balanced selection of nodes during the routing process. Experiments were conducted
with various parameters – packet delivery ratio, energy consumption of node and total overhead were compared
with existing models with BNMR, which exhibits two times better route selection levels and twenty times faster
route selection times. Node usage levels and randomization levels in the path selection component were
observed to exhibit effective performances.

Keyword : MANET, Packet delivery ratio, Energy consumption, Routing, Network Monitoring,
Randomization.

220. References:
1. Beski Prabaharan S., Ponnusamy. R, “Trust Based Random Energy Efficient Routing (TRER) in MANET”, International Journal of
Applied Engineering Research(2015), 11 (1), 448-455, Print ISSN 0973-4562, Online ISSN 0973-9769. 1282-
2. Beski Prabaharan S., Ponnusamy. R, “Energy Aware Ant Colony Optimization based Dynamic Random Routing Strategy for 1289
MANET”, International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) ,Volume 5,
Issue 2, on 22nd February, 2016. Pg. 143-147; ISSN(Online), 2278-021; ISSN(Print) 2319- 5940.
3. S Beski Prabaharan, R Ponnusamy, “Energy Aware Secure Dynamic Multipath Routing using ACO with Modified Local Selection
using SA”, International Advanced Research Journal in Science, Engineering and Technology (IARJSET), Vol 3, Issue 5, May
2016. ISSN(Online) 2393-8021; ISSN(Print), 2394-1588.
4. Forgy, E.W., "Cluster analysis of multivariate data: efficiency versus interpretability of classifications". Biometrics. 21: 768–769.
JSTOR 2528559, 1965.
5. Dorigo, M., Maniezzo, V., and Colorni, A., “The ant system: An autocatalytic optimizing process.” (No. 91 -016, pp. 163-183).
Technical report, 1991.
6. Dorigo, M., Maniezzo, V., and Colorni, A. (1996). Ant system: optimization by a colony of cooperating agents. IEEE Transa ctions
on Systems, Man and Cybernetics, Part B (Cybernetics), 26(1), 29-41. doi:10.1109/3477.484436.
7. Dorigo, M., and Gambardella, L. (1997). “Ant colony system: a cooperative learning approach to the traveling salesman pro blem”,
IEEE Transactions on Evolutionary Computation, 1(1), 53-66. doi:10.1109/4235.585892.
8. Kirkpatrick, S., Gelatt, C. D., and Vecchi, M. P. (1983), “Optimization by Simulated Annealing”. Science, 220(4598), 671-680.
doi:10.1126/science.220.4598.671
9. Khan, K., and Goodridge, W. (2015), “ Fault Tolerant Multi-Criteria Multi-Path Routing in Wireless Sensor Networks”,
International Journal of Intelligent Systems and Applications, 7(6), 55-63. doi:10.5815/ijisa.2015.06.06

Authors: U. Mahesh Kumar, Suraj Baraik, Venu Malagavelli

Paper Title: Strength Properties of Concrete by using Flyash, Quarry Dust and Crumb Rubber
221. Abstract: As construction in India and other developing countries are increasing, the consumption of energy
and resources are also increasing in same alarming way. Due to urbanization many industries are developed and 1290-
the industrial wastage is also increasing day by day which is a serious concern to the environment. Many 1294
industries produce various end products, which may be used in construction industry at various places. So we
focused on some of the waste materials which can be replaced in conventional concrete, and by then cost of
construction can be reduced and is economical, also damage caused to the environment can also be reduced, at
the same time landfills can also be reduced. So, we focused on reducing the virgin materials in concrete like
cement, fine aggregate and coarse aggregate by replacing them with some waste materials which have same
properties of cement, fine aggregate and coarse aggregate. The objective of the present work is to find out the
effectiveness of fly ash, quarry dust and crumb rubber by replacing them in varied percentages. Here, cement is
replaced by fly ash with percentages as 30%, 40%, 50%, 60% and quarry dust as fine aggregate with percentages
of 20%, 30%, 40%, 50% along with crumb rubber as coarse aggregate with percentages as 5%, 10%, 15%, 20%.
The results in this study have shown a gradual reduction of compressive strength as we kept on adding the
crumbed rubber. Even though the strength obtained for 5% usage of crumbed rubber was quite satisfactory.

Keyword : Fly ash, Quarry dust, Crumb Rubber, Compressive strength.


References:
1. K. Lakshmidevi and A.V. Narasimha Rao(2015), “Effect of Fly Ash and Quarry Dust on Properties of Concrete”, International Jo urnal
of Innovative Research in Science Engineering and Technology, Vol. 4 (9), Pp. 8343-8350.
2. A. Vinodh Kumar, G. Madhusudhan and P. Vijay kumar (2019), “An Experimental Investigation on Strength Properties of Concrete by
Partial Replacement of Cement With Fly Ash and Fine Aggregate with Stone Dust “, International Journal of Engineering and
Advanced Technology, Vol. 8 (2S2), Pp. 87-89
3. Biswaprakash Das and Mahendra Gattu (2018), “Study on Performance of Quarry Dust as Fine Aggregate in Concrete”, Internationa l
Conference on Advances Construction Materials and Structures,
4. A. Sivakumar and M.Prakash.(2011),”Characteristic Studies on the Mechanical Properties of Quarry Dust in Conventional Concrete”,
Journal of Civil Engineering and Construction Technology, Vol. 2(10), Pp. 218-235
5. Arfat Saiyad, Daxesh Chaudhari, Krunal Prajapathi and Tausif Kauswala (2016),”Experimental Study on Use of Quarry Dust and Fly
Ash With Partial Replacement of Fine Aggregates and Cement in concrete”, Global Research and Development Journal for
Engineering, Vol. 1(6), Pp. 92-96.
6. M. Venu (2016), “Thermal conductivity and impact resistance of concrete using partial replacement of coarse aggregate with rubbe r,”
Jordan journal of Civil Engineering, vol. 12(2),pp. 145-162.
7. S. P. Singh and S. K. Kaushik (2001), “Flexural fatigue analysis of steel fiber reinforced concrete”, American concrete institute, vol.
98(4), pp. 306–312.
8. M. Venu (2011), “Thermal conductivity and impact resistance of concrete using partial replacement of coarse aggregate with rubber,”
Jordan journal of Civil Engineering, vol. 12(2),pp. 145-162.
9. K. B Sankeerthan Reddy, J.S.R Prasad, Venu Malagavelli (2019), “Durability and Physical Properties of Glass Fiber Reinforced
Concrete Subjected to Elevated Temperatures”, International Journal of Innovative Technology and Exploring Engineering, Vol. 8(11),
Pp. 3845-3848.
10. IS: 10262-2009, Guidelines for Concrete Mix Proportioning.

Authors: K.Koteswara Chari, M.Chinna babu, Sarangarm Kodati

Paper Title: Classification of Diabetes using Random Forest with Feature Selection Algorithm
Abstract: Diabetes has become a serious problem now a day. So there is a need to take serious precautions
to eradicate this. To eradicate, we should know the level of occurrence. In this project we predict the level of
occurrence of diabetes. We predict the level of occurrence of diabetes using Random Forest, a Machine Learning
Algorithm. Using the patient’s Electronic Health Records (EHR) we can build accurate models that predict the
presence of diabetes.

Keyword : Electronic Health Records, Random Forest with Feature Selection, Machine Learning Algorithm.
References:
1. RaksehMotka,ViralParmar, “Diabetes Mellitus Forecast Using Different Data mining Techniques” IEEE International Conference on
Computer and Communication Technology (ICCCT),2013.
222. 2. Veena Vijayan V., AswathyRavikumar, “Study of Data Mining algorithms for Prediction and Diagnosis of Diabetes Mellitus”,
International Journal of Computer Application, Vol 94,pp .12-16,June 2014.
3. C.kalaiselvi, G.M.Nasira, “A New Approach of Diagnosis of Diabetes and Prediction of Cancer using ANFIS”, IEEE Computing an d 1295-
Communicating Technologies, pp 188-190, 2014. 1300
4. S.Sapna, A.Tamilarasi ,M.Pravin Kumar, “Implementation of Genetic Algorithm in Predicting Diabetes” International journal of
computer science issues,Vol.9,pp.234-240.
5. GunasekarThangarasu, P.D.D.Dominic, “Prediction of Hidden Knowledge from Clinical Database using Data mining Techniques”
International Conference on Computer and Information Sciences (ICCOINS),pp.1-5,2014.
6. SavvasKaratsiolis,Christos N. Schizas ,“ Region based Support Vector Machine Algorithm for Medical Diagnosis on Pima Indian
Diabetes Dataset”, IEEE conference on Bioinformatics and Bioengineering, pp.139-144,2012.
7. Velu C.M, K. R. Kashwan, “Visual Data Mining Techniques for Classification of Diabetic Patients”, IEEE International Advance
Computing Conference (IACC), pp-1070-1075,2013.
8. Asma A. AlJarullah , “Decision discovery for the diagnosis of Type II Diabetes”, IEEE conference on innovations in informatio n
technology,pp-303-307,2011.
9. Peter Harrington “Machine Learning in Action”,Manning Publications,2013.
10. Nirmala Devi M., Appavu alias Balamurugan S.,Swathi U.V., “An amalgam KNN to predict Diabetes Mellitus”, IEEE International
Conference on Emerging Trends in Computing ,Communication and anotechnology(ICECCN),pp 691-695,2013.
11. 2001. Random forests. Machine Learning 45(1):5–32.Breiman, L., J. H. Friedman, R. A. Olshen, and C. J. Stone. 1984. Classification
and regression trees. Monterey, CA: Wadsworth.

Authors: Keerthan Kumar T G, Shubha C, Sushma S A

223. Paper Title: Random Forest Algorithm for Soil Fertility Prediction and Grading Using Machine Learning
Abstract: In society the population is increasing at a high rate, people are not aware of the advancement of 1301-
technologies. Machine learning can be used to increase the crop yield and quality of crops in the agriculture 1304
sector. In this project we propose a machine learning based solution for the analysis of the important soil
properties and based on that we are dealing with the Grading of the Soil and Prediction of Crops suitable to the
land. The various soil nutrient EC (Electrical Conductivity), pH (Power of Hydrogen), OC (Organic Carbon),
etc. are the feature variables, whereas the grade of the particular soil based on its nutrient content is the target
variable. Dataset is preprocessed and regression algorithm is applied and RMSE (Root Mean Square Error) is
calculated for predicting rank of soil and we applied various Classification Algorithm for crop recommendation
and found that Random Forest has the highest accuracy score.

Keyword : Crop Recommendation, Fertility Grading, Machine Learning, Prediction, Random Forest, Linear
Regression
References:
1. Hai-Yang Jia, Juan Chen,"Soil fertility grading with Bayesian network transfer learning, presented at the Proceedings of the Ninth
International Conference on Machine Learning and Cybernatics, Qingdao, 2010.
2. E. Manjula, S. Djodiltachoumy, “A Model for Prediction of Crop Yield” (International Journal of Computational Intelligence and
Informatics, March 2017).
3. A. Kumar & N. Kannathasan, (2011), “A Survey on Data Mining and Pattern Recognition Techniques for Soil Data Mining “, IJCSI
International Journal of Computer Science Issues, Vol. 8, Issue 3.
4. Gholap, Jay. “Performance Tuning of J48 Algorithm for Prediction of Soil Fertility.” ArXiv abs/1208.3943 (2012): n. pag.
5. “Prediction of Crop Yield using Machine Learning” Rushika Ghadge, Juilee Kulkarni, Pooja More, Sachee Nene, Priya R,
IJARCSE,vol. 5, Issue 8,2017.
6. Shivnath Ghosh, Santanu Koley (2014) “Machine Learning for Soil Fertility and Plant Nutrient Management using Back Propagatio n
Neural Networks” International Journal on Recent and Innovation Trends in Computing and Communication, Volume: 2 Issue: 2,
ISSN: 2321-8169, pp 292 – 297.
7. Gorthi, Swathi and Huifang Dou. “PREDICTION MODELS FOR ESTIMATION OF SOIL MOISTURE CONTENT.” (2011).
8. http://dataverse.icrisat.org/dataset.xhtml?persistentId=d oi:10.21421/D2/K3BPKW
9. Oyen, D. & Lane, T. Knowl Inf Syst (2015) 43: 1. https://doi.org/10.1007/s10115-014-0775-6
10. Shah A., Dubey A., Hemnani V., Gala D., Kalbande D.R. (2018) Smart Farming System: Crop Yield Prediction Using Regression
Techniques. In: Vasudevan H., Deshmukh A., Ray K. (eds) Proceedings of International Conference on Wireless Communication.
Lecture Notes on Data Engineering and Communications Technologies, vol 19. Springer, Singapore
11. A. Arooj, M. Riaz and M. N. Akram, "Evaluation of predictive data mining algorithms in soil data classification for optimized crop
recommendation," 2018 International Conference on Advancements in Computational Sciences (ICACS), Lahore, 2018, pp. 1-6. doi:
10.1109/ICACS.2018.8333275
12. Vaneesbeer Singh,Abid Sarwar, “Analysis of soil and prediction of crop yield (Rice) using Machine Learning approach” IJARCSE,vol.
5, Issue 8,2017.
13. Miss.Snehal, S. D. (2014). Agricultural Crop Yield Prediction Using Artificial. International Journal of Innovative Research in
Electrical,Electronic, 1 (1).
14. Kajol R, Akshay Kashyap K, Keerthan Kumar T G," Automated Agricultural Field Analysis and Monitoring System Using IOT",
International Journal of Information Engineering and Electronic Business(IJIEEB), Vol.10, No.2, pp. 17-24, 2018. DOI:
10.5815/ijieeb.2018.02.03
15. Shriya Sahu, Meenu Chawla, Nilay Khare, "An efficient analysis of crop yield prediction using Hadoop framework based on random
forest approach", Computing Communication and Automation (ICCCA) 2017 International Conference on, pp. 53-57, 2017.
16. Rashmi Priya, Dharavath Ramesh, Ekaansh Khosla, "Crop Prediction on the Region Belts of India: A Naïve Bayes Map Reduce
Precision Agricultural Model", Advances in Computing Communications and Informatics (ICACCI) 2018 International Conference on ,
pp. 99-104, 2018.

Authors: Irina E. Kashekova, Ekaterina A. Kononova

Paper Title: Cognitive Factors of "Art+" Cross-Cultural Pedagogical Technology


Abstract: The authors believe that the strategy of modern education should be aimed at updating the content
of education and developing mechanisms for its mastering in accordance with the realities of the modern world
and the psychology of present-day childhood. The article reveals the ways of finding answers to the issues,
which are topical for modern education, namely, how to convey to pupils the necessary amount of fundamental
and most modern knowledge, how to ensure knowledge acquisition, how to spark children's interest in learning
the world, and teach them to apply acquired knowledge in practice. Based on the research in the field of
cognitive psychology and pedagogy of art, the authors distinguish the factors of creative cognition, describing
the "ART+" cross-cultural pedagogical technology and its principles, as well as provide guidelines on the
application of technology in the educational process of secondary school to make the learning process fun and
creative.
224.
Keyword : culture, art, science, education, cognition, creativity, perception, scientific and artistic cognition, 1305-
emotions, creative work, artistic creativity, image, imaginative models of the world, educational process, 1311
semantics, sign-and-symbolic systems.
References:
1. M.A. Dikovitskaya, “Look at visual studies”, After image, vol. 29(5), 2002, p. 4.
2. W.J.T. Mitchell, “The pictorial turn”, Art Forum, 1992, pp. 89-94.
3. A. Toffler, Third Wave, Moscow: AST, 2002.
4. E.B. Morgunov (Ed.), “Modeli i metody upravleniya personalom”, [Models and methods of personnel management] Russian-British
textbook. Moscow: Business School Intel-Synthesis, CJSC, 2001.
5. J.S. Bruner, “Beyond the information given: Studies in the psychology of knowing”, Trans. from English by K.I. Babitsky. Moscow:
DirectMedia Publishing, 2008.
6. W.M. Rivers, “Desyat' principov izucheniya i obucheniya inostrannym yazykam na osnove vzaimodejstviya obuchaemogo i
prepodavatelya” [Ten principles of studying and teaching foreign languages based on the interaction of the student and the teacher].
Proceedings of the First Soviet-American Symposium on theoretical problems of teaching and learning foreign languages, Moscow:
Moscow State University, 1992, pp. 99-119.
7. N. Bohr, “Atomic Physics and Human Knowledge”, Trans. from English, 1961.
8. B.M. Velichkovsky, “Kognitivnaya nauka: Osnovy psihologii poznaniya” [Cognitive science: Fundamentals of cognition psychology],
Moscow: Sense, Academy, 2006.
9. Yu.M. Lotman, “Ob iskusstve” [About the art], S.-Pb.: Art, 1998.
10. A.Ya. Danilyuk, “Teoriya integracii obrazovaniya” [Integration theory of education], Rostov-on-Don: Rostov Pedagogical University,
2000.
11. E.V. Sokolov, “Kul'turologiya. Ocherki teorii kul'tury” [Culturology. Essays on the theory of culture], Moscow: Interpraks, 1994.
12. V.N. Ageev, “Semiotika” [Semiotics], Moscow: The Whole World, 2002.
13. I.E. Kashekova, T.V. Temirov, “Koncepciya razvitiya gumanitarizacii obrazovaniya na osnove kul'turologicheskogo podhoda” [The
development concept of humanization of education based on culturological approach], Humanitarian Space. International almanac,
vol. 2(1), 2013, pp. 31-45.
14. V.V. Nalimov, “Veroyatnostnaya model' yazyka” [Probabilistic model of language] [Text], Moscow, 1979.
15. I.E. Kashekova, “Sozdanie integracionnogo obrazovatel'nogo prostranstva shkoly sredstvami iskusstva” [Creating integration
educational space of the school by means of art], Monograph, Moscow: Publishing House of the Russian Academy of Education, 2006.
16. Yu.M. Lotman, “Proiskhozhdenie syuzheta v tipologicheskom osveshchenii” [The origin of the plot in the typological coverage],
[Text]. Tartu: Articles on the Culture Typology, 1973.
17. S.R. Maddi, “Theory of personality”, Moscow: Speech, 2002.
18. B.N. Abramov, “Grani Agni Yogi” [The verge of Agni Yoga], Novosibirsk: Polygraphist, vol. 13(7), 1995.
19. E.P. Kabkova, “Razvitie sposobnosti shkol'nikov k hudozhestvennomu obobshcheniyu na urokah iskusstva” [Development of the
ability of pupils to the artistic generalization at art lessons], Higher Doctorate thesis in pedagogical sciences, Moscow, 2005.
20. E. Knyazeva, S. Kurdyumov, “Sinergetika: nachalo nelinejnogo myshleniya” [Synergetics: The beginning of nonlinear thinking].
Available at: https://philocv.files.wordpress.com/2012/07/.pdf
21. L.P. Pechko, “Esteticheskaya rezonansnost' kak sostoyanie i central'noe kachestvo pedagogicheskoj sredy uroka iskusstva” [Aesthetic
resonance as a state and key quality of the pedagogical environment of the art lesson], Humanities and Art Education: Problems and
Approaches, edited Volume, Moscow: Arzamas, 2002, pp. 53-63.
22. I.E. Kashekova, “Interdisciplinary concept of Image in the cross-cultural pedagogical technology of «ART+»”, The European
Proceedings of Social and Behavioral Sciences, EpSBS, pp. 300-306.
23. M. Basadur, “Basadur Simplex Manual”, Toronto: Center for Research in Applied Creativity, 1997.
24. J.P. Guilford, “Three Faces of Intellect”, Amer. Psychol., vol. 14, 1959, pp. 469-479.
25. J.B. Carroll, “Human cognitive abilities: A survey of factor-analytic studies”, Cambridge, England, Cambridge University Press, 1993.
26. E. De Bono, Six Thinking Hats. Trans. from English, 2006.
27. M. Wertheimer, “Productive thinking”, Moscow, 1987.
28. K.B. Selchenok, “Psihologiya hudozhestvennogo tvorchestva” [Psychology of artistic creativity]. Harvest, 1999.
29. E.B. Finkelstein, “Issledovatel'skaya deyatel'nost' shkol'nikov i integraciya (Priglashenie k issledovaniyu)”, [Research activity of
schoolchildren and integration (Invitation to research)], Moscow: Teachers' Club "Living to see Monday", 2006.

Authors: S.Sankar, M.Jeyakumaran

Paper Title: Influence of Human Relations on Organizational Performance in Automobile Industry


Abstract: The paper attempts to understand the perception of human relations among employees and
relationship between employer and employee and its impact on desirable behavior and performance over getting
a job. Number of orientation programs from reputed institutions enhances the planning and execution to handle
tasks in the future. The working condition encourages the workers to work more and ensure safety both at
physical and mental level. The study has been conducted in an automobile industry in Chennai. It offers
extensive study on the relationship between employee and employer with statistics. It uses Multi-stage sampling
method to examine 400 respondents and Surveying method for data collection. In the end, the study offers a
perspective that the relationship among employee is categorical on the basis of their designation. It dents the
performance among employees.
225.
Keyword : Human Relations, organizational performance Automobile Industry. 1312-
1314
References:
1. BaldevR.Sharma and G.S. Das, (1981). “Organizational Determinants of Human Relations in the Bank Industry”, Indian Journal of
Industrial Relations, pp-513-530.
2. Jack Halloran, (1978). Applied Human Relation an Organizational Approach, Prentice Hall of India Pvt Ltd, New Delhi.
3. Kulshreshtha, Suresh K (2000). "Human Relations-Principles and Practice." Applied Management for Government Departments. Vol.
I1 Lucknow: Indian Management Academy, 1 5 5- 1 5 8
Osama Jannadi (1995) Impact of human relations on the safety of construction workers, International Journal of Project Management
Vol. 13, Issue 6, 383-386
4. Shoookla, (2004). A Hand Book Of Human Relations, Macmillan Publication India Ltd New Delhi.
5. Nayereh Shahmohammadia (2015) The Relationship between Management Style with Human Relations and Job Satisfaction among
Guidance Schools’ Principals in District 3 of Karaj, Procedia - Social and Behavioral Sciences ,247 – 253
6. SsubbaRao, “Personnel and Human Resource Management”, Himalya Publications House Pvt Ltd.
7. Divivedi, (2001), Human Relation and Organizational Behavior, 5 th end, Macmillan Publication India Ltd New Delhi.

Authors: Mohd Hakimi Bin Zohari, Mohamad Farid Bin Johari

Paper Title: Weather Monitoring System using Blynk Application


Abstract: The Internet of Things (IoT) is a latest concept of relating physical computing devices or any
other objects to internet and can communicate with each other. Each object is provided with unique identifiers
226. and the ability to transfer data over internet network without human intervention and machine interaction. The
project targets on a simple microcontroller, Arduino UNO with connection to the wireless weather monitoring 1315-
system, WiFi-WeMos ESP8266 which monitor weather condition using three sensors such as temperature, rain 1319
and carbon monoxide sensor. It then displays all data in the Blynk application. The project have been developed
by using Arduino UNO Microcontroller, WiFi-WeMos ESP8266, DHT 11 temperature and humidity sensor,
rain sensor and MQ-7 Carbon monoxide sensor. It is suitable for monitoring weather in any place and any time.
Keyword : Internet of Things (IoT), Blynk Application, Weather Monitoring.
References:
1. T. Murugun, Azha.Periasamy, S.Muruganand, “Embedded Based Industrial Temperature Monitoring System Using GSM”,
International Journal of Computer Applications, vol. 58, p. 0975-8887 ,2012.
2. Prof. S.B. Kamble, P.Ramana P. Rao, Anurag S. Pingalkar, Ganesh S. Chayal, “IoT Based Weather Monitoring System”, IJARIIE-
ISSN(O)-2395-4396 Vol-3 Issue-2 2017.
3. Adil Hamid Malik, Aaqib jalal, Bilal Ahmed Parray, Meena kohli, “Smart City IoT Based Weather Monitoring System”, Model
Institute of Engineering and Technology Jammu, India, Volume 7 Issue No.5, 2017.
4. Bulipe Srinivas Rao, Prof. Dr. K. Srinivasa Rao, Mr. N. Ome, Internet of Things (IOT) Based Weather Monitoring system”, IJARCCE
Journal, vol. 5, no. 9, September 2016.
5. KarishmaPatil, Mansi Mhatre, Rashmi Govilkar, Shraddha Rokade, Prof.Gaurav Gawas, Weather Monitoring System using
Microcontroller, International Journal on Recent and Innovation Trends in Computing and Communication Volume: 4 Issue: 1.
6. Karthik Krishnamurthi, Suraj Thapa, Lokesh Kothari, Arun Prakash, Arduino Based Weather Monitoring System, International
Journal of Engineering Research and General Science, Volume 3, Issue 2, ISSN 2091-2730, March-April, 2015.
7. Gowrishankar, S. IoT based Heart Attack Detection, Heart Rate and Temperature Monitor. International Journal o f Computer
Applications, 170(5), 26–30. 2017.
8. Kiranmayi, G. R. Internet of things for smart citeis 1, 51–54. 2017.
9. Ome, N., & Rao, G. S. Internet of Things (IoT) based Sensors to Cloud system using ESP8266 and Arduino Due, 337 –343. 2016.
10. Pasha, S. Thingspeak Based Sensing and Monitoring System for IoT with Matlab Analysis. International Journal of New Technology
and Research (IJNTR), 2(6), 19–23. 2016
11. Bedogni, L. Arduino and ESP8266. Sunrom Technologies. (2011). DHT11 - Humidity and Temperature Sensor. Datasheet, 1–7. 2016
12. Prof. S.B. Kamble, P.Ramana P. Rao, Anurag S. Pingalkar, Ganesh S. Chayal, “IoT Based Weather Monitoring System”, IJARIIE-
ISSN(O)-2395-4396 Vol-3 Issue-2 2017.

Authors: Joseph Christian P. Oliquino


Development and Acceptability of the Mobile Workstation for Electronic Products Assembly and
Paper Title:
Servicing Training Program
Abstract: The advancement of the Philippine Education System specifically the implementation of the new
Philippine Qualification Framework which aims to address the challenges of the 4th Industrial Revolution and
21st-century education, necessitates that materials of instruction should be at par with 21st-century technologies.
Thus, there is a need for teachers to be innovative and resourceful enough, and to develop instructional/training
materials that will yield good effects on students. In the case of TESDA and the Senior High School TVL Track,
workstations are in demand since it used to develop more competencies and give hands-on experiences to
students. The primary objective of this study was to develop a Mobile Workstation for Electronic Products
Assembly and Servicing (EPAS) NC II. It has specific objectives such as to make the design for the workstation;
to identify the materials and procedures; and to evaluate its acceptability in terms of functionality, cost-
effectiveness, safety, and workmanship. The Research and Development Process and Descriptive Method were
used for the attainment of these objectives. Mean was used to compute the results of the evaluation of electronics
Instructors and Assessor; private electronics practitioner; and students enrolled in Electronics Product Assembly
Servicing NC II for the school year 2016-2017. The result of the evaluation of its acceptability showed that the
workstation is highly acceptable with the over-all weighted mean of 4.79. It is recommended that this
workstation should be used in the classroom and community-based training as instructional material for
227. developing competencies in EPAS NC II. This can also be reproduced by TVET institutions and DepEd schools
that offer EPAS NC II. 1320-
1324
Keyword : 4th Industrial Revolution, 21st Century Education, Mobile Workstation, Electronics Program
References:
1. Technical Education and Skills Development Act of 1994 (Republic Act 7796). Retrieved from www.tesda.gov.ph.
2. Technical Education and Skills Development. (2013). Training Regulations –Electronic Products Assembly and Servicing NC II.
Retrieved from www.tesda.gov.ph.
3. Domingo L. Raganit Jr., Modified Vehicle Alarm System with Trainer, Unpublished Master’s Thesis, CSPC-Naga Campus, Naga City,
2011.
4. Oriel R. Dicen, Single/Polyphase Motor Generator, Unpublished Master’s Thesis, CSPC-Naga Campus, Naga City, 2011.
5. Ely Kherwin V. Valencia, Design and Fabrication of Multi-Function Cylinder Head Service Platform, Unpublished Master’s Thesis,
BISCAST, Naga City, 2015.
6. Abril Q. Mamansag, Multi-Function Valve Set and Guide Kit, Unpublished Master’s Thesis, BISCAST, Naga City, 2016.
7. Joey S.J. Pardiñas, Development of Single Phase Three Phase Motor Generator Converter Trainer, Unpublished Master’s Thesis,
BISCAST, Naga City, 2013.
8. Antonio Ricardo T. Ayen, Educational Motor Control Workstation, Unpublished Master’s Thesis, Bicol State College of Applied
Sciences and Technology, Naga City, 2014.
9. Mariano L. Roxas, Handy Wiring Board for Lighting Circuits, Unpublished Master’s Thesis, Bicol State College of Applied Sciences
and Technology, Naga City, 2015.
10. Victorino E. Francisco, AC Motor Stator Winding Trouble Simulator, Unpublished Master’s Thesis, Bicol State College of Applie d
Sciences and Technology, Naga City, 2015.
Sonia Singla, Aswath S, Dr. Vimal Kamleshkumar Bhatt, Bhuvanesh Kumar Sharma, Vinod Kumar
Authors:
Pal
Paper Title: Virtual Reality in Non-Communicable diseases
228. Abstract: Virtual Reality (VR) is often associated with the gaming business, the advancement isn't just
about gaming. Increased reality has been around for quite a while now and there have been new VR applications 1325-
in different fields. It is ordinary that in excess of 500 million VR headsets will be sold always 2025 and the 1333
entire VR development would be worth over $30 billion consistently 2020. This gigantic advancement can't be
solely from the gaming business, anyway, accounts from various industry zones which are viably using this
impacting development. Virtual reality is utilized more in health care such as for learning skills, treatments, and
robotic surgery. It is utilized with other medical tests like that of x-rays, scans to reduce the risk of surgery and
understand the medical condition of the patient. A head-mounted device, both contracted HMD, is a presentation
gadget, worn on the head or as a component of a protective cap, that has a little showcase optic before one or
each eye. An HMD has numerous utilizations, incorporating into gaming, aeronautics, designing, and
prescription lift. A head-mounted showcase is the essential part of computer-generated reality headsets. There is
likewise an optical head-mounted presentation, which is a wearable showcase that can reflect anticipated
pictures and enables a client to see through it. Human services are one such industry in which there are various
utilizations of VR and the potential is open - finished. Medicinal experts and researchers have been at the
planning phase creating and actualizing VR applications for quite a while now and have concocted of the most
exceptional utilizations of VR in human services. Today, human services associations need to see how VR is
changing social insurance and join best practices in their everyday tasks.
Non-communicable disease (NCD) which are leading cause of death worldwide such as Diabetes,
Cardiovascular disease, Alzheimer. Virtual reality is found to play a vital role in the NCD treatment. Recently,
NHS England diabetes group has joined forces with Oxford Medical Simulation to prepare specialists utilizing
computer generated reality. Specialists would now be able to rehearse in augmented reality restorative crises, to
improve care for patients with diabetes.

Keyword : Virtual Reality, Diabetes, medicines, obesity, cardiovascular disease, non-communicable disease.
References:
1. Doniger GM, Beeri MS, Bahar-Fuchs A, Gottlieb A, Tkachov A, Kenan H, et al. Virtual reality-based cognitive-motor training for
middle-aged adults at high Alzheimer’s disease risk: A randomized controlled trial. Alzheimers Dement (N Y). 2018 Mar 27;4:118–29.
2. Manera V, Chapoulie E, Bourgeois J, Guerchouche R, David R, Ondrej J, et al. A Feasibility Study with Image -Based Rendered
Virtual Reality in Patients with Mild Cognitive Impairment and Dementia. PLoS ONE. 2016 Mar 18;11(3):e0151487.
3. García-Betances RI, Arredondo Waldmeyer MT, Fico G, Cabrera-Umpiérrez MF. A succinct overview of virtual reality technology use
in Alzheimer’s disease. Front Aging Neurosci. 2015 May 12;7:80.
4. Alzheimer’s News Today Home - Alzheimer’s News Today [Internet]. [cited 2019 Apr 7]. Available from:
http://alzheimersnewstoday.com
5. Tarnanas I, Schlee W, Tsolaki M, Müri R, Mosimann U, Nef T. Ecological validity of virtual reality daily living activities screening for
early dementia: longitudinal study. JMIR Serious Games. 2013 Aug 6;1(1):e1.
6. Neuropsychiatry Indexed Journal - Psychiatry Open Access Journal [Internet]. [cited 2019 Apr 7]. Available from:
http://www.jneuropsychiatry.org
7. Ong CS, Krishnan A, Huang CY, Spevak P, Vricella L, Hibino N, et al. Role of virtual reality in congenital heart disease. Congenit
Heart Dis. 2018 May;13(3):357–61.
8. Virtual Reality Reporter | VR News, 360 Video, VR Camera, 3D VR Porn, Game Blog News Report! [Internet]. [cited 2019 Apr 7].
Available from: http://virtualrealityreporter.com
9. Ikbali Afsar S, Mirzayev I, Umit Yemisci O, Cosar Saracgil SN. Virtual reality in upper extremity rehabilitation of stroke patients: A
randomized controlled trial. J Stroke Cerebrovasc Dis. 2018 Dec;27(12):3473–8.
10. Neugebauer M, Tautz L, Hüllebrand M, Sündermann S, Degener F, Goubergrits L, et al. Virtual downsizing for decision support i n
mitral valve repair. Int J Comput Assist Radiol Surg. 2019 Feb;14(2):357–71.
11. http://heart.insight.heart.org [Internet]. [cited 2019 Apr 7]. Available from: http://heart.insight.heart.org
12. Schuster-Amft C, Eng K, Suica Z, Thaler I, Signer S, Lehmann I, et al. Effect of a four-week virtual reality-based training versus
conventional therapy on upper limb motor function after stroke: A multicenter parallel group randomized trial. PLoS ONE. 2018 Oct
24;13(10):e0204455.
13. Shin J, Truong QA. Manufacturing better outcomes in cardiovascular intervention: 3D printing in clinical practice today. Curr Treat
Options Cardiovasc Med. 2018 Oct 25;20(12):95.
14. Cardiology News, Research Articles | Heart Disease, Disorder Studies [Internet]. [cited 2019 Apr 7]. Available from:
http://thecardiologyadvisor.com
15. Cardiovascular Disease (CVD) - Types, Causes & Symptoms - British Heart Foundation [Internet]. [cited 2019 Apr 7]. Available from:
https://www.bhf.org.uk/informationsupport/conditions/cardiovascular-disease
16. Morie JF, Chance E. Extending the reach of health care for obesity and diabetes using virtual worlds. J Diabetes Sci Technol. 2011 Mar
1;5(2):272–6.
17. Talbot TB. Virtual reality and interactive gaming technology for obese and diabetic children: is military medical technology
applicable? J Diabetes Sci Technol. 2011 Mar 1;5(2):234–8.
18. Riva G. The key to unlocking the virtual body: virtual reality in the treatment of obesity and eating disorders. J Diabetes Sci Technol.
2011 Mar 1;5(2):283–92.
19. Grewal G, Sayeed R, Yeschek S, Menzies RA, Talal TK, Lavery LA, et al. Virtualizing the assessment: a novel pragmatic paradigm to
evaluate lower extremity joint perception in diabetes. Gerontology. 2012 May 10;58(5):463–71.
20. Freeman D, Reeve S, Robinson A, Ehlers A, Clark D, Spanlang B, et al. Virtual reality in the assessment, understanding, and treatment
of mental health disorders. Psychol Med. 2017 Oct;47(14):2393–400.
21. Diabetes Community, Support, Education, Recipes & Resources [Internet]. [cited 2019 Apr 7]. Available from:
https://www.diabetes.co.uk/
22. Klaassen R, Bul KCM, Op den Akker R, van der Burg GJ, Kato PM, Di Bitonto P. Design and evaluation of a pervasive coaching and
gamification platform for young diabetes patients. Sensors Basel Sensors. 2018 Jan 30;18(2).
23. Ruppert B. New directions in virtual environments and gaming to address obesity and diabetes: industry perspective. J Diabetes Sci
Technol. 2011 Mar 1;5(2):277–82.
24. NCDs | Noncommunicable diseases and their risk factors [Internet]. [cited 2019 Apr 7]. Available from: https://www.who.int/ncds/en/
25. Increasing burden of non-communicable diseases -- ScienceDaily [Internet]. [cited 2019 Apr 7]. Available from:
https://www.sciencedaily.com/releases/2015/06/150610093211.htm
26. Number of people with diabetes reaches 4.7 million | Diabetes UK [Internet]. [cited 2019 Apr 7]. Available from:
https://www.diabetes.org.uk/about_us/news/new-stats-people-living-with-diabetes
27. Roglic G, Organization WH. Global Report On Diabetes. Geneva, Switzerland: World Health Organization,; 2016.
28. Diabetes [Internet]. [cited 2019 Apr 7]. Available from: https://www.who.int/news-room/fact-sheets/detail/diabetes
29. Thomas JG, Bond DS. Review of innovations in digital health technology to promote weight control. Curr Diab Rep. 2014;14(5):485.
30. Thomas JG, Bond DS. Review of innovations in digital health technology to promote weight control. Curr Diab Rep. 2014;14(5):485.
31. Thomas JG, Spitalnick JS, Hadley W, Bond DS, Wing RR. Development of and feedback on a fully automated virtual reality system
for online training in weight management skills. J Diabetes Sci Technol. 2015 Jan;9(1):145–8.
32. Mirza RA, Yaqoob I. Effects of Combined Aerobic and Virtual Reality-Based Cognitive Training on 76 Years Old Diabetic Male with
Mild Cognitive Impairment. J Coll Physicians Surg Pak. 2018 Sep;28(9):S210–S212.
33. Miserez S, Chinet L, Guardia A, Matthys F, Hagon-Traub I. [Virtual reality: a tool that can be used in outpatient diabetes services].
Rev Med Suisse. 2018 Jan 10;14(588-589):111–3.
34. Calle-Bustos A-M, Juan M-C, García-García I, Abad F. An augmented reality game to support therapeutic education for children with
diabetes. PLoS ONE. 2017 Sep 28;12(9):e0184645.
35. Deutsch JE. Using virtual reality to improve walking post-stroke: translation to individuals with diabetes. J Diabetes Sci Technol. 2011
Mar 1;5(2):309–14.
36. Ruppert B. New directions in the use of virtual reality for food shopping: marketing and education perspectives. J Diabetes Sci
Technol. 2011 Mar 1;5(2):315–8.
37. Grewal GS, Sayeed R, Schwenk M, Bharara M, Menzies R, Talal TK, et al. Balance rehabilitation: promoting the role of virtual reality
in patients with diabetic peripheral neuropathy. J Am Podiatr Med Assoc. 2013 Dec;103(6):498–507.
38. Reagan L, Pereira K, Jefferson V, Evans Kreider K, Totten S, D’Eramo Melkus G, et al. Diabetes Self-management Training in a
Virtual Environment. Diabetes Educ. 2017 Jun 23;43(4):413–21.
39. Lee S, Shin S. Effectiveness of virtual reality using video gaming technology in elderly adults with diabetes mellitus. Diabetes Technol
Ther. 2013 Jun;15(6):489–96.

Authors: Iswanto, Prisma Megantoro, Elinda Prima Fitryana Dewi

Paper Title: PH Meter Based Raspberry Pi and User Interface using Python
Abstract: The article about pH meter based on Raspberry Pi 3 has been created. This instrument serves as a
measure of acid base levels of solution capable of displaying a GUI ( Graphic User Interface ) based interface
programmed in the Raspberry Pi 3 System On Chip with the Python programming language. The purpose of this
research is to innovate Raspberry Pi 3 based pH measuring device, to create interfaces and store pH
measurement data based on Raspberry Pi 3 and Python programming language, find out the results of heuristic
analysis on pH meter measuring instrument innovations, and determine the accuracy of the pH meter based on
Raspberry Pi 3. The method used to pH sensor chararacterization in making this measuring instrument is
heuristic method.The characterization sensor result show that the accuracy value of the pH sensor is 99,97%, the
precision value of the pH sensor is 99,99%, the sensitivity value of pH sensor is 6,45 mV/pH, the correlation
value of the pH meter is 99,89%. Based on the result of the analysis that has been carried out, it can be conclude
the innovation in pH measuring device that are made have a good accuracy and can measure well.

Keyword : ph meter, measurement, raspberry pi.


References:
1. Anjasmara, A. N.2016.Verifikasi larutan Buffer Kadaluarsa untuk Kalibrasi pH meter. Tugas Akhir. Universitas Gadjah Mada
2. Drijarkara,A.P, dan Zaid, G.2008. Metrologi:Sebuah Pengantar. Pusat Penelitian Kalibrasi, Instrumentasi dan Metrologi. LIPI. Serpong
3. Harismawan, A.F, Kharisma, A.P, dan Afirianto, T. 2018. Analisis Perbandingan Performa Web Service Menggunakan Bahasa
Pemrograman Python, PHP, dan Perl pada Client berbasis android. Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol.
2, No. 1, hlm. 237 - 245.
4. KAN.2003. Komisi Akreditasi Nasional: Pedoman Evaluasi dan Pelaporan Ketidakpastian Pengukuran. Jakarta.
5. Karastogianni, S, Sotiropoulos, S, dan Girousi, S.T.2016. pH : Principle and Measurement. Oxford : Academic Pre ss. The
Encyclopedia of Food and Health Vol. 4.
6. Kurniawan, Deni,, 2008, Regresi Linier, R Developement Core Team, Austria. Maulana, Y.2006.Metrologi Industri.Skripsi.
Universitas Negeri Malang.
229. 7. Morris, Alan , 2001, Measurement and Instrumentation Principles, (Third Edition), Butterworth-Helnemann, India.
8. Murti,S.2017. Pembuatan Dan Analisis Alat Ukur Arus - Tegangan Listrik Dc Beserta Data Logger Berbasis Arduino Uno Pada Sistem
Kontrol Turbin Angin PLTH Pandansimo. Tugas Akhir. Universitas Gadjah Mada. 1334-
9. Nurrishahal,Y.S.,2015.Alat Ukur pH dengan Kontroler Atmega16. Tugas Akhir. Universitas Gadjah Mada. 1338
10. Pecsok, R. I.1951.An Experiment for the pH meter. University of California, Los Angels, California. Journal of Chemical Education
11. Perkasa, T.R, Widyantara, H, Susanto,P. 2014. Rancang Bangun Pendeteksi Gerak menggunakan Metode Image Subtaction pada
Single Board Computer (SBC). Journal of Control and network Systems Vol. 3, No. 2, hlm 90 - 97.
12. Raghavendra, N, V,, dan L, Khrisnamurthy. 2013. Engineering Metrology and Measurement. Oxford University Press. India.
13. Ramadhan., W.A.2016. Purwarupa Monitoring pH Air pada PDAM Berbasis Arduino Uno R3. Tugas Akhir. Universitas Gadjah Mada.
14. Respati.1986. Dasar – Dasar Ilmu Kimia untuk Universitas. Aksara Baru. Jakarta.
15. Sastrohamidjojo,H.2005. Kimia Dasar.Gadjah Mada University Press. Yogyakarta.
16. Senzas, D.V.2018. Pembuatan Kalibrator Suhu dengan Memanfaatkan Daur Ulang OHP ( Over Head Projector ) Berbasis Raspberry PI
3. Tugas Akhir. Universitas Gadjah Mada.
17. Serway,R. A, dan Jewett J. W., Jr., 2010, Physics for Scientists and Engineers with Modern Physics eight edition,BROOKS/COLE
CENGAGE Learning, United State of Amerika.
18. Shidiq,M dan Panca M Rahardjo.2008.Pengukur Suhu dan pH Air Tambak Terintegrasi dengan Data Logger. Jurna l EECCIS Vol. II,
No. 1.
19. Suryanto.2007.Karakterisasi Elektroda Referensi. Prosisding Pertemuan Ilmiah Nasional Rekayasa Perangkat Nuklir. Tanggerang.
20. Sutresna,N.2006.Kimia Dasar.Grafindo: Bandung.
21. Tahir, I.2008. Arti Penting Kalibrasi Pada Proses Pengukuran Analitik : Aplikasi pada Penggunaan pH meter dan Spektrofoto meter
UV – Vis. Paper Seri Manajemen Laboratorium
22. Iswanto, S. Suripto, F. Mujahid, K. T. Putra, N. P. Apriyanto, and Y. Apriani, “Energy Harvesting on Footsteps Using Piezoele ctric
based on Circuit LCT3588 and Boost up Converter,” Int. J. Electr. Comput. Eng., vol. 8, no. 6, 2018.
23. Iswanto, A. Maarif, O. Wahyunggoro, and A. I. Cahyadi, “Artificial Potential Field Algorithm Implementation for Quadrotor Path
Planning,” Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 8, pp. 575–585, 2019.
24. A. N. N. Chamim, M. E. Fawzi, I. Iswanto, R. O. Wiyagi, and R. Syahputra, “Control of Wheeled Robots with Bluetooth -Based
Smartphones,” Int. J. Recent Technol. Eng., vol. 8, no. 2, pp. 6244–6247, Jul. 2019.
25. Iswanto, J. Syaftriadi, A. Nur, N. Chamim, R. O. Wiyagi, and R. Syahputra, “LED and Servo Motor Control Via Bluetooth Based on
Android Applications,” Int. J. Recent Technol. Eng., vol. 8, no. 2, pp. 6227–6231, Jul. 2019.
26. K. Purwanto, Iswanto, T. K. Hariadi, and M. Y. Muhtar, “Microcontroller-based RFID, GSM and GPS for motorcycle security
system,” Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 3, 2019.
27. D. Hardiyanto, I. Iswanto, D. A. Sartika, and M. Rojali, “Pedestrian Crossing Safety System at Traffic Lights based on Decision Tree
Algorithm,” Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 8, pp. 375–379, 2019.
28. I. Iswanto, K. Purwanto, W. Hastuti, A. Prabowo, and M. Y. Mustar, “Smart Smoking Area based on Fuzzy Decision Tree Algorithm ,”
Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 6, pp. 500–504, 2019.
29. A. Maarif, A. I. Cahyadi, S. Herdjunanto, Iswanto, and Y. Yamamoto, “Tracking control of higher order reference signal using
integrators and state feedback,” IAENG Int. J. Comput. Sci., vol. 46, no. 2, 2019.
30. Iswanto, A. Nurjanah, I. Prasojo, F. Anindiyahadi, and N. M. Raharja, “Application of Nurse Calling Device at Sewon 1 Health Cente ,”
Int. J. Innov. Technol. Explor. Eng., vol. 8, no. 11, pp. 2721–2723, Sep. 2019.
31. I. Iswanto, W. S. Agustiningsih, F. Mujaahid, R. Rohmansyah, and A. Budiman, “Accumulator Charging Control with Piezoelectric
Based on Fuzzy Algorithm Scheduling,” TELKOMNIKA (Telecommunication Comput. Electron. Control., vol. 16, no. 2, p. 635, Apr.
2018.

Authors: Lydia D Isaac, I. Janani

Paper Title: Integrating Feature Selection and Multiclass Classification for Sport Result Prediction
Abstract: Machine learning (ML) has become the most predominant methodology that shows good results
in the classification and prediction domains. Predictive systems are being employed to predict events and its
results in almost every walk of life. The field of prediction in sports is gaining importance as there is a huge
community of betters and sports fans. Moreover team owners and club managers are struggling for Machine
learning models that could be used for formulating strategies to win matches. Numerous factors such as results
of previous matches, indicators of player performance and opponent information are required to build these
models. This paper provides an analysis of such key models focusing on application of machine learning
algorithms to sport result prediction. The results obtained helped us to elucidate the best combination of feature
selection and classification algorithms that render maximum accuracy in sport result prediction.

Keyword : Machine Learning, Prediction, Supervised learning, Classification, Feature Selection, Sport Result
Prediction
References:
1. Rory P. Bunker, Fadi Thabtah, “A machine learning framework for sport result prediction”, Applied Computing and
Informatics,Vol.15,Issue 1,January 2019.
2. A. McCabe, J. Trevathan, "Artificial intelligence in sports prediction", Information Technology: New Generations 2008. ITNG 2008.
Fifth International Conference on, pp. 1194-1197, 2008.
230. 3. Tianqi Chen, Carlos Guestrin, “XGBoost: A Scalable Tree Boosting System”, KDD ’16, August 13-17, 2016, San Francisco, CA,
USA c 2016 ACM.
4. Ramraj S, Nishant Uzir, Sunil R, Shatadeep Banerjee, “Experimenting XGBoost Algorithm for Prediction and Classification of 1339-
Different Datasets”, International Journal of Control Theory and Applications, Vol.9,2016. 1342
5. Nicholas I. Sapankevych, Ravi Sankar, “Time Series Prediction Using Support Vector Machines: A Survey IEEE Computational
Intelligence Magazine ,Volume: 4 , Issue: 2 , May 2009.
6. Janmenjoy Nayak, Bighnaraj Naik, H. S. Behera, “A Comprehensive Survey on Support Vector Machine in Data Mining Tasks:
Applications & Challenges”, International Journal of Database Theory and Application Vol.8, No.1 (2015), pp.169-186.
7. Yashima Ahuja & Sumit Kumar Yadav, “Multiclass Classification and Support Vector Machine”, Global Journal of Computer Science
and Technology Interdisciplinary Volume 12 Issue 11 Version 1.0 Year 2012.
8. Neha Mehra, Surendra Gupta, “Survey on Multiclass Classification Methods”, International Journal of Computer Science and
Information Technologies, Vol. 4 (4) , 2013, 572 – 576.
9. G. Malik , M. Tarique, “On Machine Learning Techniques For Multi-class Classification”, International Journal of Advancements in
Research & Technology, Volume 3, Issue 2, February-2014
10. S. Khalid, T. Khalil and S. Nasreen, "A survey of feature selection and feature extraction techniques in machine learning," 2014
Science and Information Conference, London, 2014, pp. 372-378.
11. Cai, Jie & Luo, Jiawei & Wang, Shulin & Yang, Sheng. “ Feature selection in machine learning: A new perspective.”(2018)
Neurocomputing. 300. 10.1016/j.neucom.2017.11.077.
12. D. Prasetio and D. Harlili, "Predicting football match results with logistic regression," 2016 International Conference On Advanced
Informatics: Concepts, Theory And Application (ICAICTA), George Town, 2016, pp. 1-5.
13. Schumaker R.P., Solieman O.K., Chen H. (2010) Predictive Modeling for Sports and Gaming. In: Sports Data Mining. Integrated
Series in Information Systems, vol 26. Springer, Boston, MA.
14. https://hub.packtpub.com/predicting-sports-winners-decision-trees-and-pandas/
15. Che Mohamad Firdaus Che Mohd Rosli et al 2018 J. Phys.: Conf. Ser. 1020012003.
16. Maral Haghighat, Hamid Rastegari and Nasim Nourafza , “A Review of Data Mining Techniques for Result Prediction in Sports”,
ACSIJ Advances in Computer Science: an International Journal, Vol. 2, Issue 5, No.6 , November 2013.
17. Min-Ling Zhang and Zhi-Hua Zhou, "A k-nearest neighbor based algorithm for multi-label classification”, IEEE International
Conference on Granular Computing, Beijing, 2005, pp. 718-721 Vol. 2.

Authors: G. T. Thiru Arooran, S. Anthony Raj, B. Kalpana Sai, O. Joji Chandran


Retail Investment Influencing and Decision Making factors Among Information Technology
Paper Title:
Professionals: Evidence from Tamil Nadu, India
Abstract: Savings and investments from Individuals and households is one among the indicator of a nation’s
economic development. More income results in both higher spendable income and higher savings and
investments. The individual income is increasing in one side and on the other side the investment options too
have increased from bank and post office savings to financial assets, options, forward, currency derivatives.
Software industry has revolutionized the employment pattern in India. They are noted for higher pay and
231. providing employment opportunity to young graduates. Therefore this paper focuses on the investment
preference and investment options of individual investor among information technology professionals in Tamil 1343-
Nadu, South India. Findings are drawn from the analysis of the primary data collected form 600 employees of 1347
top ten software companies based on their market capitalization and also operating in Tamil Nadu. ANOVA,
Garrett rank, factor analysis, inter correlation, path coefficient and regression analysis were applied to measure
the extent of influencing factors for investment and investment options.

Keyword : Investment awareness, investment influence


References:
1. Arvid OI Hoffmann & Wander Jager. (2005). The effect of different needs, decision-making processes and network-structures on
investor behavior and stock market dynamics: A simulation approach. The ICFAI Journal of Behavioral Finance, 49-64.
2. Bandar, P. K. (2011). A study of middle class investor's preference for financial instruments in great Bombay. Finance India, 14(2),
574-576.
3. Bange, M. M. (2000). Do the portfolios of small investors reflect positive feedback trading? The Journal of Financial and
Quantitative Analysis, 35(2), 239. doi:10.2307/2676192
4. Barber, B. M., & Odean, T. (n.d.). The behavior of individual investors. SSRN Electronic Journal. doi:10.2139/ssrn.1872211
5. Batten, J. A., & Vo, X. V. (2010). The determinates of equity portfolio holdings. Applied Financial Economics, 20(14), 1125-1132.
doi:10.1080/09603101003761879
6. Chaarlas, L. J., & R Lawrence, A. D. (2012). Behavioral finance a boon to investors. Journal of Finance, Accounting and
Management, 3, 32-44. Retrieved from http://www.gsmi-ijgb.com/Pages/JFAM.aspx
7. Geetha, S., & Vimala, K. (2014). Perception of Household Individual Investors towards Selected Financial Investment Avenues (With
Reference to Investors in Chennai City). Procedia Economics and Finance, 11, 360-374. doi:10.1016/s2212-5671(14)00204-4
8. Lee, K. C., Chung, N., & Kang, I. (2008). Understanding individual investor's behavior with financial information disclosed on the
web sites. Behaviour & Information Technology, 27(3), 219-227. doi:10.1080/01449290601138146

Authors: R.Sangeetha, M. Mary Shanthi Rani

Paper Title: Tomato Leaf Disease Prediction using Convolutional Neural Network
Abstract: Plant diseases are the common cause of the reduction in yield eventually resulting in low income
to farmers. Researchers are at their best efforts to find a solution for the detection of plant diseases to increase
farm productivity. In this paper, a novel approach of disease detection and prediction for tomato plant leaves has
been proposed using deep learning techniques. Training of the models was performed with the use of an open
database of 13,848 images, which included 7 distinct classes of [plant, disease] combinations, including healthy
tomato crops. Convolution Neural Network which is well-suited for detection and prediction problems has been
used for predicting healthy and unhealthy leaves affected by two types of diseases septoria spot and bacteria
spot. Experiments are conducted using plant village dataset comprising of 4930 images including healthy and
unhealthy leaves. The performance of the model is evaluated using precision, recall and F1-score and the model
has achieved the highest accuracy 94.66 %. The significantly high success rate makes the model a very useful
advisory or early warning tool.

Keyword : Plant diseases, Prediction, Tomato leaves


232.
References:
1. Dheeb Al Bashish, Malik Braik, and SuliemanBani- Ahmad, "A Framework for Detection and Classification of Plant Leaf and Stem 1348-
Diseases”, IEEE International Conference on Signal and Image Processing (ICSIP), Chennai 2010, pp.113-118. 1352
2. KeyvanAsefpourVakilian and JafarMassah, “An artificial neural network approach to identify fungal diseases of cucumber
(Cucumissativus L.) Plants using digital image processing”, Archives of Phytopathologyand Plant Protection, Vol. 46, Issue 13,
Taylor & Francis 2013, pp.1580-1588.
3. MrunmayeeDhakate and Ingole A. B, “Diagnosis of Pomegranate Plant Diseases using Neural Network”, IEEE 5th National
Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG), Patna2015.
4. Ramakrishnan M. and SahayaAnselinNisha A., “Groundnut Leaf Disease Detection and Classification by using Back Propagation
Algorithm”. IEEE International Conference on Communications and Signal Processing (ICCSP), Melmaruvathur 2015, pp. 0964 –
0968.
5. RashmiPawar and AmbajiJadhav, “Pomegranate Disease Detection and classification", IEEE International Conference on Power,
Control, Signals, and Instrumentation Engineering (ICPCSI), Chennai 2017, pp.2475-2479.
6. SrdjanSladojevic, Marko Arsenovic, AndrasAnderla, DubravkoCulibrk and DarkoStefa-novice, "Deep Neural Networks Based
Recognition of Plant Diseases by Leaf Image Classification”, Computational Intelligence and Neuroscience, Article ID 3289801,
2016.
7. Sharada P. Mohanty, David P. Hughes, and Marcel Salathe, “Using Deep Learning for Image-Based Plant Disease Detection”,
Frontiers in Plant Science, Vol. 7, Article 1419,2016.
8. SeraworkWallelign, MihaiPolceanu, and Cedric Buche, "Soybean Plant Disease Identification Using Convolutional Neural Network”,
International Florida Artificial Intelligence Research Society Conference (FLAIRS-31), Melbourne, United States 2018, pp. 146- 151.
9. Konstantinos P. Ferentinos, “Deep learning models for plant disease detection and Diagnosis”, Computers and Electronics in
Agriculture, Vol. 145, Elsevier 2018, pp. 311-318.

Authors: Mahesh D S, Chandramouli H, Sanjay R Chitnis

Paper Title: Optimized Uplink Scheduling Model through Novel Feedback Architecture for Wimax Network
Abstract: Broadband Wireless Access has drawn the fine attention due to the wide range of data
requirement and user mobility all the time. Moreover, WiMAX provides the best QoE (Quality of Experience)
which is based on the IEEE 802.16 standards; this includes several services such as data, video and audio.
However, in order to provide the effective and smooth experience i.e. QoS scheduling plays one of the critical
part. In past several mechanism has been proposed for effective scheduling however, through the research it is
233. observed that it can be furthermore improvised hence in this we propose a mechanism named as OUS
(Optimized Uplink Scheduling) which helps in improvising the QoS. In here, we have proposed a novel 1353-
feedback architecture and proposed optimized scheduling which helps in computing the bandwidth request this 1359
in terms helps in reducing the delay as well as jitter. Moreover, the performance evaluation is performed through
extensive simulation by varying the different SS and frequency and the results analysis confirms that our
mechanism performs way better than the existing algorithm.

Keyword : Wi-MaX, Scheduling, QoE, MUS, Feedback.


References:
1. S. More and D. K. Mishra, "4G Revolution: WiMAX technology," 2012 Third Asian Himalayas International Conference on Internet,
Kathmandu, 2012, pp. 1-4.
2. D. R. Selvarani and T. N. Ravi, "Comparative analysis of Wi-Fi and WiMAX," International Conference on Information
Communication and Embedded Systems (ICICES2014), Chennai, 2014, pp. 1-7.
3. J. M. Westall and J. J. Martin, "Performance Characteristics of an Operational WiMAX Network," in IEEE Transactions on Mobile
Computing, vol. 10, no. 7, pp. 941-953, July 2011.
4. Seyedzadegan, Mojtaba & Othman, Mohamed. (2013). IEEE 802.16: WiMAX overview, WiMAX architecture. International Journal
of Computer Theory and Engineering. 5. 784-787. 10.7763/IJCTE.2013.V5.796.
5. Al-Sherbaz, Ali & Adams, Chris & Jassim, Sabah. (2008). Private synchronization technique for heterogeneous wireless network
(WiFi and WiMAX). 6982. 10.1117/12.777580.
6. H. Lin, Y. Lin, W. Chang and R. Cheng, "An Integrated WiMAX/WiFi Architecture with QoS Consistency over Broadband Wireless
Networks," 2009 6th IEEE Consumer Communications and Networking Conference, Las Vegas, NV, 2009, pp. 1-7.
7. V. Richter, R. Radeke and R. Lehnert, "QoS concept for IEEE 802.16-2012 based WiMAX networks," 2014 IEEE 10th International
Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Larnaca, 2014, pp. 371-377.
8. Smart C. Lubobya, Mqhele E. Dlodlo, Gerhard De Jager, Ackim Zulu, Throughput Characteristics of WiMAX Video Surveillance
Systems, Procedia Computer Science, Volume 45, 2015, Pages 571-580, ISSN 1877-0509.
9. M. S. Arhaif, “Comparative Study of Scheduling Algorithms in WiMAX”, International Journal of Scientific & Engineering Research,
v. 2, February, 2011.
10. [A.Sayenko, O. Alenan, J. Karhula, and T. Hamalainen " Ensuring the QoS requirements in 802.16 scheduling", Proceedings of the
9th ACM international symposium on Modeling analysis and simulation of wireless and mobile systems, pp. 108 - 117, 2006.
11. J. Lakkakorpi, A. Sayenko, and J. Moilanen, "Comparison of Different Scheduling Algorithms for WiMAX Base Station: Deficit
Round-Robin vs. Proportional Fair vs. Weighted Deficit Round-Robin ", IEEE Wireless Communications and Networking Conference,
WCNC, pp. 1991-1996, 2008.
12. H. Kaur and G. Singh, “Implementation and Evaluation of Scheduling Algorithms in Point-to-Mutipoint Mode in WiMAX
Networks”, International Journal of Computer Science and Technology (IJCST), vol. 2, pp. 540-546, 2011.
13. Limouchi, Elnaz & Pourmina, Mohammadali & Salajaghe, Afshin & Zehni, Ashkan. (2011). An Intra Class Channel-Aware
Scheduling In IEEE 802.16e. WCSIT Journal. 1. 321-323
14. Z. Ahmed and S. Hamma, "Analytical model of two level scheduling algorithm for WiMAX networks," 2015 International Conference
on Wireless Networks and Mobile Communications (WINCOM), Marrakech, 2015, pp. 1-8.
15. H.Safa, H.Artail, M. Karam, R. Soudah, S. Khyat “New Scheduling Architecture for IEEE 802.16 Wireless Metropoliton Area
Network”, American university of Beirut, Lebanon IEEE (2007).
16. S. Y. You, A. Sali, N. K. Noordin and C. K. Ng, "An Enhanced Weighted Fair Queuing Scheduling for WIMAX Using QualNet," 2012
Fourth International Conference on Computational Intelligence, Modelling and Simulation, Kuantan, 2012, pp. 387-392.
17. Z. Patel and U. Dalal, "Implementation and evaluation of dynamically weighted low complexity fair queuing (DWLC-FQ) algorithm
for packet scheduling in WiMAX networks," in China Communications, vol. 13, no. 5, pp. 128-140, May 2016.
18. Goswami S., Mukherjee S., Misra I.S., Mukherjee D., Chakraborty B. (2019) A Novel Hybrid Resource Allocation Scheme for
Maximum Fairness Among Multiple Services. In: Nath V., Mandal J. (eds) Proceeding of the Second International Conference on
Microelectronics, Computing & Communication Systems (MCCS 2017). Lecture Notes in Electrical Engineering, vol 47 6.
Springer, Singapore.
19. Iera, Antonio & Molinaro, Antonella & Pizzi, Sara. (2007). Channel-Aware Scheduling for QoS and Fairness Provisioning in IEEE
802.16/WiMAX Broadband Wireless Access Systems. IEEE Network. 21. 34-41. 10.1109/MNET.2007.4305171.
20. Hui-Tang Lin, Chia-Lin Lai and Yu-Chih Huang, "Dynamic bandwidth allocation with QoS support for integrated EPON/WiMAX
networks," 2013 IEEE 14th International Conference on High Performance Switching and Routing (HPSR), Taipei, 2013, pp. 74-79.
21. M. Abdolrazzaghi, M. H. Zarifi and M. Daneshmand, "Wireless Communication in Feedback-Assisted Active Sensors," in IEEE
Sensors Journal, vol. 16, no. 22, pp. 8151-8157, Nov.15, 2016.

Authors: Tanuj Wala, Narottam Chand, Ajay K. Sharma

Paper Title: Efficient Data Collection using Mobile Sink Scheme in IoT
Abstract: Wireless sensor networks (WSNs) have become increasingly important in the informative
development of communication technology. The growth of Internet of Things (IoT) has increased the use of
WSNs in association with large scale industrial applications. The integration of WSNs with IoT is the pillar for
the creation of an inescapable smart environment. A huge volume of data is being generated every day by the
deployment of WSNs in smart infrastructure. The collaboration is applicable to environmental surveillance,
health surveillance, transportation surveillance and many more other fields. A huge quantity of data which is
obtained in various formats from varied applications is called big data. The Energy efficient big data collection
requires new techniques to gather sensor-based data which is widely and densely distributed in WSNs and
spread over wider geographical areas. In view of the limited range of communication and low powered sensor
nodes, data gathering in WSN is a tedious task. The energy hole is another considerable issue that requires
attention for efficient handling in WSN. The concept of mobile sink has been widely accepted and exploited,
234. since it is able to effectively alleviate the energy hole problem. Scheduling a mobile sink with energy efficiency
is still a challenge in WSNs time constraint implementation due to the slow speed of the mobile sink. The paper
1360-
addresses the above issues and the proposal contains four-phase data collection model; the first phase is the
1371
identification of network subgroups, which are formed due to a restricted range of communication in sensor
nodes in a wide network, second is clustering which is addressed on each identified subgroup for reducing
energy consumption, third is efficient route planning and fourth is based on data collection. The two time-
sensitive route planning schemes are presented to build a set of trajectories which satisfy the deadline constraint
and minimize the overall delay. We have evaluated the performance of our schemes through simulation and
compared them with the generic enhanced expectation-maximization (EEM) mobility based scenario of data
collection. Simulation results reveal that our proposed schemes give much better results as compared to the
generic EEM mobility approach in terms of selected performance metrics such as energy consumption, delay,
network lifetime and packet delivery ratio.

Keyword : Wireless Sensor Network, Internet of Things, Mobile Sink Scheme, Big Data, Grouping,
Clustering.
References:
1. Z. Sheng, C. Mahapatra, C. Ghu and V.C.M. Leung, “Recent Advances in Industrial Wireless Sensor Networks Toward Efficient
Management in IoT,” IEEE Access, Vol. 19, No. 3, pp. 622 -637, May 2015.
2. E.P.K. Gilbert, B. Kaliaperumal and E.B. Rajsingh, “Research Issues in Wireless Sensor Network Applications: A Survey,”
International Journal of Information and Electronics Engineering, Vol. 2, No. 5, pp. 702-706, September 2012.
3. D.J. Cook and S.K. Das, Smart Environments: Technologies, Protocols and Applications. John Wiley, 2004.
4. D.J. Cook and S.K. Das, “How Smart are our Environments? An Updated Look at the State of the Art,” Journal of Pervasive and
Mobile Computing, Vol. 3, No. 2, pp. 53-73, March 2007.
5. K.L.M. Ang, J.K.P. Seng and A.M. Zungeru, “Optimizing Energy Consumption for Big Data Collection in Large -Scale Wireless
Sensor Networks With Mobile Collectors,” IEEE Systems Journal, Vol. 12, No. 1, pp. 616 -626, March 2018.
6. I.A.T. Hashem, N.B. Anuar, A. Gani and E. Ahmed, “The Role of Big Data in Smart City,” Article in International Journal of
Information Management, Vol. 36, No. 5, pp. 748-758, October 2016.
7. S. Boubiche, D.E. Boubiche and B. Azzedine, “Integrating Big Data Paradigm in WSNs,” International Conference on Big Data
and Advanced Wireless Technologies, November 2016.
8. A. Siddiqa, I.A.T. Hashem, I. Yaqoob, M. Marjani, S. Shamshirb, A. Gani and F. Nasaruddin, “A Survey of Big Data
Management:Taxonomy and State-of-the-Art,” Journal of Network and Computer Applications, Vol. 71, pp. 151-166, August 2016.
9. L.G. Rios and J.A.I. Diguez, “Big Data Infrastructure for Analyzing Bata Generated by Wireless Sensor Networks,” IEEE
International Congress on Big Data, pp. 816–823, July 2014.
10. N. Chand, R.C. Joshi and M. Misra, “A Zone Co‐operation Approach for Efficient Caching in Mobile Ad Hoc
Networks,” International Journal of Communication Systems, Vol. 19, No. 9, pp. 1009 -1028, January 2006.
11. A. Kumar, V. Kumar and N. Chand, “Energy Efficient Clustering and Cluster Head Rotation Scheme for Wireless Sensor
Networks,” International Journal of Advanced Computer Science and Applications, Vol. 3, No. 5, pp. 129 -130, December 2011.
12. M. Ma, Y. Yang and M. Zhao, “Tour Planning for Mobile Data-Gathering Mechanisms in Wireless Sensor Networks,” IEEE
Transactions on Vehicular Technology, Vol. 62, No. 4, pp. 1472-1783, May 2013.
13. N. Chand, “Cooperative Data Caching in WSN,” World Academy of Science, Engineering and Technology, Vol. 6, No. 3, pp. 90-
94, 2012.
14. S.S. Jawaligi and G.S. Biradar, “Reliability and Load Sensitive Data Gathering Protocol for WSNs Using Single Mobile Sink
Node,” International Conference on Emerging Technological Trends, pp. 1-10, October 2016.
15. S. Soni and N. Chand, “Energy Efficient Multi-Level Clustering to Prolong the Lifetime of Wireless Sensor Networks,” Journal of
Computing, Vol. 2, No. 5, pp. 158-165, May 2010.
16. R.N. Sharma, N. Chand, V. Sharma and D. Yadav, “Decision Support System for Operation, Scheduling and Optimization of
Hydro Power Plant in Jammu and Kashmir Region,” Renewable and Sustainable Energy Reviews, Vol. 43, No. 1, pp. 1099 -1113,
January 2015.
17. R.C. Shah, S. Roy, S. Jain and W. Brunette, “Data MULEs: Modeling a Three-Tier Architecture for Sparse Sensor Networks,”
IEEE Conference on Sensor Network Protocols and Applications, pp. 215 -233, June 2003.
18. J. Luo and J. Hubaux, “Joint Mobility and Routing for Lifetime Elongation in Wireless Sensor Networks,” IEEE Conference on
Computer and Communication Societies, pp. 1735- 1746, March 2005.
19. V. laxmi, “An Efficient Way to Gather Big data in WSN using Mobile Sink Routing,” International Journal of Advanced Research
in Computer and Communication Engineering, Vol. 4, No. 8, pp. 43-45, August 2015.
20. A. Kaswan, K. Nitesh and P.K. Jana, “Energy Efficient Path Selection for Mobile Sink and Data Gathering in Wireless Sensor
Networks,” International Journal of Electronics and Communications, Vol. 73, No. 1, pp. 110 -118, March 2017.
21. K.R.R. Babu, G.J. Suja, P. Samuel and S. Jos, “Performance Analysis of Big Data Gathering in Wireless Sensor Network Using an
EM Based Clustering Scheme,” International Conference on Advances in Computing and Communications, pp. 109 -113,
September 2015.
22. J. Du, H. Wang and Y. Wu, “A Data Collection Approach Based on Mobile Sinks for Heterogeneous Sensor Networks,”
International Conference on Wireless Communications & Signal Processing, pp. 1-6, October 2016.
23. Y. Zhang, Z. Zhou, D. Zhao, M. Barhamgi and T. Rahman, “Graph-Based Mechanism for Scheduling Mobile Sensors in Time-
Sensitive WSNs Applications,” IEEE Access, Vol. 5, pp. 1559-1569, February 2017.
24. C. Gherbi, Z. Aliouat and M. Benmohammed, “ Distributed Energy Efficient Adaptive Clustering Protocol with Data Gathering for
Large Scale Wireless Sensor Networks,” IEEE International Symposium on Programming and Systems, pp. 1-7, April 2015.
25. J.W. Kim, J.S. In, K. Hur, J.W. Kim and D.S. Eom, “An Intelligent Agent-based Routing Structure for Mobile Sinks in WSNs,”
IEEE Transactions on Consumer Electronics, Vol. 56, No. 4, pp. 2310-2316, November 2010.
26. C. Konstantopoulos, G. Pantziou, D. Gavalas, A. Mpitziopoulos and B. Mamalis, “A Rendezvous-Based Approach Enabling
Energy-Efficient Sensory Data Collection with Mobile Sinks,” IEEE Transaction on Parallel and Distributed Systems, Vol. 23, No.
5, pp. 809-817, May 2012.
27. L. He, J. Pan and J. Xu, “A Progressive Approach to Reducing Data Collection Latency in Wireless Sensor Networks with Mobile
Elements,” IEEE Transaction on Mobile Computing, Vol. 12, No. 7, pp. 1308-1320, July 2013.
28. C. Zhu, S. Wu, G. Han, L. Shu and H. Wu, “A Tree-Cluster-Based Data-Gathering Algorithm for Industrial WSNs With a Mobile
Sink,” IEEE Access, Vol. 3, No.1, pp. 381-396, May 2015.
29. A.A. Safia, Z. Aghbari and I. Kamel, “Efficient Data Collection by Mobile Sink to Detect Phenomena in Internet of
Things,” Information, Vol. 8, No. 4, pp. 123-140, October 2017.

Authors: Asha M, T.P.Surekha

Paper Title: Hybrid Cross Layer Mechanism For High Reliability In Under Water Wireless Sensor Network
Abstract: Underwater sensor network finds lot of applications in sea environment monitoring. Tsunami like
conditions can be monitored and reported earlier so that people on shores can be safe. Due to nature of medium,
the data delivery ratio in under water sensor networks is very low. The various problems in the underwater
sensor networks are crucial delay, Double side spreading, multipath induced fading, bandwidth limitation,
Doppler effects. These problems reduce the data delivery ratio, network lifetime and other parameters.In order to
235. increase the performance of the underwater communication system,Reed Solomon encoding technique with
hybrid cross layer methodis used in physical, data link and routing layer . The proposed method increase the 1372-
reliability of underwater wireless sensor networks. 1376

Keyword : Underwater sensor network, WSN, Reed-Solomon, Super Cluster


References:
1. Manal Al-Bzoor,et.al, “Adaptive power controlled routing for underwater sensor networks” ,in Proceedings of the 7th International
Conference on Wireless Algorithms, Systems, and Applications , pp 549 —560.
2. Prasad Anjangi et.al , “Scheduling algorithm with transmission power control for random underwater acoustic net works”,in
Proceedings of OCEANS 2015—Genova, pp 1-8.
3. Weigang Bai , et.al, “Link scheduling method for underwater acoustic sensor networks based on correlation matrix” , IEEE
Sensors Journal 16,11, pp 4015-4022.
4. Rodolfo W.L, et. al, ” Modeling and Analysis of Opportunistic Routing in Low Duty-Cycle Underwater Sensor Networks”
,Proceedings of the 18th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile,systems,
November 02-06, 2015, Cancun, Mexico
5. Rodolfo W. L, et.al, “ Local maximum routing recovery in underwater sensor networks: Performance and trade -offs”, in
Proceedings of the IEEE 22nd International Symposium on Modelling, Analysis, and Simulation of Compute r and
Telecommunication Systems.
6. Rodolfo W. L. et.al, “ EnOR: Energy balancing routing protocol for underwater sensor networks”, in Proceedings of the IEEE
International Conference on Communications , pp 3293--3298.
7. Rodolfo W. L, et.al, “GEDAR: Geographic and opportunistic routing protocol with depth adjustment for mobile underwater sensor
networks”, in Proceedings of the IEEE International Conference on Communications, pp 251 --256.
8. Rodolfo W. L,et.al , “ DCR: Depth-controlled routing protocol for underwater sensor networks” ,in Proceedings of the IEEE
Symposium on Computers and Communications , pp 453--458.
9. Fatemeh Fazel, “ Random access compressed sensing for energy -efficient underwater sensor networks”, IEEE Journal on Selected
Areas in Communications 29, 8, pp 1660—1670
10. Leandro Villas, et.al ,”DRINA: A Lightweight and Reliable Routing: Approach for in-Network Aggregation in wireless sensor
networks” , IEEE Transactions on Computers, v.62 n.4, pp.676 -689, April 2013
11. M. Sammer Srouji ,”A Reliable Erasure-Coding Based Data Transfer Scheme for Wireless Sensor Networks” , proceedings of
IEEE 17th International Conference on Parallel and Distributed Systems, 481-488, December 07-09, 2011.
12. W. Lou and Y. Kwon., “H-SPREAD: A hybrid multipath scheme for secure and reliable data collection in wireless sensor
networks”, IEEE Transactions on Vehicular Technology 55, 4, pp 1320-1330.
13. Roee Diamant, et.al , "Robust spatial reuse scheduling in underwater acoustic communication networks", Oceanic Engineering
IEEE Journal of, vol. 39, no. 1, pp. 32-46, 2014
14. Said Lmai, et.al ,"Tdma-based mac transmission schedules in multihop grid ad hoc underwater acoustic networks", Underwater
Communications and Networking , pp. 1-5,2014.

Authors: S.Ilavarasan, P.Latha

Paper Title: Detection and Elimination of Black Hole Attack in WSN


Abstract: Wireless Sensor Network has become one of the most emerging areas of research in recent days.
WSNs have been applied in a variety of application areas such as military, traffic surveillance, environment
monitoring and so on. Since WSN is not a secure network and each sensor node can be compromised by the
intruder. There are plenty of security threats in sensor networks like Black hole Attack, Wormhole attack,
Sinkhole attack. Recently, there are so many algorithms are proposed to detect or to prevent attack by the
researchers. Still, the research is continuing to evaluate sensor nodes' trust and reputation. At present to monitor
nodes’ behavior direct and indirect trust values are used and most of the detection method uses additional nodes
to detect an attack. These method increases the cost and also overhead. This paper proposed a method which
detects the Black hole attack without using any additional node to monitor the network. The proposed work uses
Attacker Detection metric (AD metric) to detect malicious node based on the average sequence number, time
delay and reliability. OLSR protocol is used for routing which improves the network lifetime by minimizing the
packet flooding. Besides, to ensure reliable data transmission Elliptical Curve Digital Signature Algorithm is
used. Simulation results are obtained and show malicious nodes are eliminated using AD metrics

Keyword : AD metrics, OLSR, Black hole attack, ECDSA Algorithm


236. References:
1. Elham Bahmanih , Aso Mohammad Darwesh , Mojtaba Jamshidi , Somaieh Bali “ Restricted Multipath Routing Algorithm in 1377-
Wireless Sensor Networks Using a Virtual Cylinder: Bypassing Black hole and Selective Forwarding Attacks ”,UHD Journal of 1382
Science & Technology 2019.
2. Gagan Singla, Sourav Garg, Jagbir Singh Gill et al. “Multi BaseStation optimized positioning for Black Hole Attacks in Wirele ss
Sensor Networks,” Recent Trends in Sensor Research & Technology 2018; :
3. An Improved Hierarchical Black hole Detection Algorithm in wireless sensor networks”, A.Babu Karuppiah, J.Dalfiah,
K.yuvashri,S.RajaRam (2015)
4. “Prachi Dewal,Gagandeep Singh Narula, Vishal jain”, Detection and Prevention of Black Hole Attack in cluster based Wireless sensor
networks, 3rd International Conference on computing for sustainable global development (2016).
5. “Visali bansal, Krishnan Kumar saluja “, Anomaly based detection of block hole attack on leach protocol in wireless sensor network
March 2016, in IEEE conference.
6. Black hole Entropic fuzzy clustering, Jiefang Liu, FU-Lai chung, Shitong Wang 2017
7. A survey on Human centric communications in Non cooperative wireless relay Networks, feng xia, Zhalong Nisg, (2018)
8. Deng H, Li W, Agrawal DP: Routing Security in Wireless Ad-hoc Networks. IEEE Communications Magazine 2002,40(10):70–75.
9. Mustafa KocaKulak, Ismail Butun, “An Overview of wireless sensor Networks towards Internet of Things”, IEEE-2017
10. Tapiwa M.Chiwewe, Colman F.Mbuya, Gerhard P.Hancke, “Using Cognitive Radio for Interference -Resistant Industrial Wireless
Sensor Networks:An Overview”, IEEE-2015
11. Minimization of Black Hole Attacks in Adhoc Networks using Aware response Mechanism”,D.John Aravindhar, S.G. Gino Sophia,
Padmaveni Krishnan, D.Praveen Kumar, IEEE-2019
12. Security Issues of Black hole attacks in MANET”,Rakesh Ranjan, Nirnemesh Kumar Singh, Ajay singh, “, IEEE-2015
13. Pritam Gajkumar Shah, “An Empirical Study of Elliptic Curve Cryptography for the Resource Constrained Wireless Sensor Network”,
'Australian Journal Of Wireless Technologies, Mobility and Security (2019)'.
14. Darshana Pritam Shah, Namita Pritam Shah,”Implementation of Digital Signature Algorithm by using Elliptical Curve p -192”,
Australian Journal of Wireless Technologies, Mobility and Security (2019).

Authors: Vimala M, Rajeev Ranjan

237. Paper Title: Energy Efficient Clustering using MMHC (Modified Multi-Hop Clustering)
Abstract: In recent years, the WSN has been widely used for building the DSS (Decision Support System) 1383-
for solving the real-world problem. Moreover, out of several fields, one of the interesting field that requires DSS 1388
is monitoring of agriculture environment. Nowadays, Monitoring agriculture environment has become one of the
essential field. A smart WSN system is capable of collecting as well as processing the huge data by monitoring
the soil conditions, weather situation and others. Hence, IoT (Internet of Things) is employed in order to enhance
the productivity and efficiency in the agriculture sector. IoT integrates the various technology such as RFI
(Radio Frequency Identification), cloud computing, end-user applications and middleware system. Hence, it is
obvious to obtain the higher efficiency for DC (Data Collection). In this paper shared based algorithm known as
MMHC (Modified Multi-Hop Clustering) is proposed , this algorithm has three stage i.e. assembling , coupling
and removing the redundant nodes. In this modified more than one node can be selected in the other two stage
and the more than one node can be removed in third stage, this in terms helps in achieving higher efficiency.
Later in order to evaluate the algorithm and prove the efficiency of our proposed algorithm, Comparative
analysis is done with the Leach protocol based on the several parameter and it clearly shows that our model
outperforms the Existing i.e. Leach algorithm.

Keyword : Clustering, Shared Algorithm, MMHC, Wireless networks.


References:
1. http://www.economicsdiscussion.net/articles/importance-of-agriculture-in-indian-economy/2088..
2. E. Fernando, S. Assegaff and A. H. H. Rohayani, "Trends information technology in E-agriculture: A systematic literature review,"
2016 3rd International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE), Semarang,
2016, pp. 351-355.
3. S. R. Prathibha, A. Hongal and M. P. Jyothi, "IOT Based Monitoring System in Smart Agriculture," 2017 International Conference
on Recent Advances in Electronics and Communication Technology (ICRAECT), Bangalore, 2017, pp. 81-84.
4. M. T. Lazarescu, "Design of a WSN Platform for Long-Term Environmental Monitoring for IoT Applications," in IEEE Journal on
Emerging and Selected Topics in Circuits and Systems, vol. 3, no. 1, pp. 45-54, March 2013.
5. R. Nukala, K. Panduru, A. Shields, D. Riordan, P. Doody and J. Walsh, "Internet of Things: A review from ‘Farm to Fork’," 2016
27th Irish Signals and Systems Conference (ISSC), Londonderry, 2016, pp. 1-6.
6. E. Quesada, M. V. Maigler, A. Barbado, J. Valverde, J. Portilla and T. Riesgo, "Environmental wireless sensor network deployment
in food industry: From theory to practice," Design of Circuits and Integrated Systems, Madrid, 2014, pp. 1-6.
7. M. R. M. Kassim and A. N. Harun, "Applications of WSN in agricultural environment monitoring systems," 2016 International
Conference on Information and Communication Technology Convergence (ICTC), Jeju, 2016, pp. 344-349.
8. W. Naruephiphat and C. Charnsripinyo, "Clustering Techniques in Wireless Sensor Networks," 2009 International Conference on
New Trends in Information and Service Science, Beijing, 2009, pp. 1273-1278.
9. Wendi B.Heinzelman, Anantha P. Chandrakasan, Hari Balakrishnan, e for Wireless Microsensor Networks[J]. IEEE
TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 1, NO. 4, OCTOBER 2002.660-670.
10. Bajaber F, Awan I. Dynamic/Static Clustering Protocol for Wireless Sensor Network, In Second UKSIM European Symposium on
Computer Modeling and Simulation, 2008. EMS '08, 2008; 524-529.
11. Younis O., Fahmy S., HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks[J]. IEEE
Transactions on Mobile Computing,2004, 3( 4) : 366- 379.
12. CHEN Guihai, LI Chengfa, YE Mao, et al. EECS: an energy-efficient clustering scheme in wireless sensor networks. Journal of
Frontier s of Computer Science and Technology, 2007, 1(2) : 170- 179.
13. Lindsey S,Raghavendra C S., PEGASIS: Power-Efficient gathering in sensor information systems[C], Proc.Of the IEEE Aerospace
Conference Montana:IEEE Aerospace and Electronic Systems Society. 2002: 1125-1130.
14. ZHANG Changsen, XING Juan, ZHAO Shangqing. Energy-efficient uneven clustering algorithm Computer Engineering and
Applications [J], 2016,52(7)06-109.
15. W.R. Heinzelman, A. Chandrakasan, H. Balakrishnan, "Energy-Efficient Communication Protocol for Wireless Microsensor
Networks", In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, pp. 10–19, 2000.
16. Taheri, H., Neamatollahi, P., Younis, O. M., Naghibzadeh, S., & Yaghmaee, M. H. (2012). An energy -aware distributed clustering
protocol in wireless sensor networks using fuzzy logic. Ad Hoc Networks, 10(7), 1469–1481.
https://doi.org/10.1016/j.adhoc.2012.04.004.
17. Manjunatha, P., Verma, a. K., & Srividya, a. (2008). Multi- Sensor Data Fusion in Cluster based Wireless Sensor Networks Using
Fuzzy Logic Method. 2008 IEEE Region 10 and the Third International Conference on Industrial and Information Systems, 1–6.
https://doi.org/10.1109/ICIINFS.2008.4798453.

Authors: Hind R’bigui, Mohammed Abdulhakim Al-Absi, Chiwoon Cho

Paper Title: Detecting Complex Control-Flow Constructs for Choosing Process Discovery Techniques
Abstract: Process models are the analytical illustration of an organization’s activity. They are very
primordial to map out the current business process of an organization, build a baseline of process enhancement
and construct future processes where the enhancements are incorporated. To achieve this, in the field of process
mining, algorithms have been proposed to build process models using the information recorded in the event logs.
However, for complex process configurations, these algorithms cannot correctly build complex process
structures. These structures are invisible tasks, non-free choice constructs, and short loops. The ability of each
discovery algorithm in discovering the process constructs is different. In this work, we propose a framework
238. responsible of detecting from event logs the complex constructs existing in the data. By identifying the existing
constructs, one can choose the process discovery techniques suitable for the event data in question. The proposed 1389-
framework has been implemented in ProM as a plugin. The evaluation results demonstrate that the constructs 1393
can correctly be identified.

Keyword : Process models, process discovery, event log, process structure, recommendation.
References:
1. H. R’bigui and C. Cho, “An Industrial Application of Process Mining for Analyzing a Real Order Fulfillment Process of a Shipbuilding
industry,” Proc. Of the Korean Institute of Industrial Engineers, vol.2018, no. 11, 2018, pp. 368-375.
2. W.M.P. Van der Aalst, “Process Mining: Discovery, Conformance and Enhancement of Business Processes”, 1st ed., Berlin
Heidelberg: Springer-Verlag, 2011.
3. W.M.P. van der Aalst, A.J.M.M. Weijters, and L. Maruster, “Workflow Mining: Discovering Process Models from Event Logs, ” IEEE
T. Knowl. Data En., vol.16, no.9, pp. 1128-1142, 2004.
4. S. Leemans, D. Fahland, and W. M. P. van der Aalst, “Discovering block-structured process models from event logs containing
infrequent behavior,” Int. Conf. BPM, LNBIP, vol. 171, Cham/Springer, pp. 66–78, 2014.
5. H. R’bigui, and C. Cho, “Heuristic Rule-based Process Discovery Approach from Events Data,” Int. J. Technology Policy and
Management, Special Issue on: Knowledge Management. System, vol.19, no. 4, in press, 2019.
6. H. R’bigui and C. Cho, “Customer Oder Fulfillment Process Analysis with Process Mining: An Industrial Application in a Heavy
Manufacturing Company, ” Proc. of the ACM Int. Con on Computer Science and Artificial Intelligence, pp. 247-252, Jakarta,
Indonesia, Dec 05-07, 2017.
7. D. Vazquez Barreiros, M. Chapela, M. Mucientes, Lama, and D. Berea, “Process Mining in IT Service Management: A Case Study,”
Int. Worshop on Algorithm & Theory for the Analysis of Event Data (Toruń, Poland), CEUR-WS.org, pp. 16-30, 2016.
8. H. R’bigui and C. Cho, “Purchasing Process Analysis with Process Mining of a Heavy Manufacturing Industry,” IEEE Proc. of the 9th
Int. Conf. on Information and Communication Technology, pp. 495-498, Jeju Island, Korea, Oct 17-19, 2018.
9. L. Wen, J. Wang and J. Sun, “Mining Invisible Tasks from Event Logs, ” LNCS 4505, Springer, Berlin, Heidelberg, pp. 358-365,
2007a.
10. Q. Guo, L. Wen, J. Wang, Z. Yan and P S. Yu, “Mining invisible tasks in non-free-choice constructs, ” LNCS 9253, Motahari-Nezhad
., Recker J, Weidlich M (eds.), Springer, Cham, pp. 109–125, 2015.
11. L. Wen, W M P. Van der Aalst, J. Wang, and J. Sun, “Mining process models with non-free-choice constructs, ” Data Mining and
Knowledge Discovery, vol.15 no.2., pp. 145-180, 2007b.
12. H. R’bigui and C. Cho, "Complex Control-Flow Constructs Detection from Process Related Data," 2019 21st Int. Conf. on Advanced
Communication and Technology (ICACT), PyeongChang Kwangwoon_Do, Korea (South), 2019, pp. 579-582.

Authors: Smita Sharma, R.P.Singh

Paper Title: Data Centric Access Security- an Improvised Technique to Achieve Security in Cloud Environment
Abstract: Cloud computing innovation has now turned into a good substitute to traditional computing
technological developments This advancement of technology offers a new concept of a charge-per-use access
resource model based primarily on virtualization technology. Because of the numerous advantages they offer,
cloud computing concepts are achieving rapid adoption. This would comprise price-efficiency, time involved,
and effective use of assets in computation. Given these advantages, there are many barriers to the widespread
acceptance of this emerging technology, particularly data privacy and security issues. In extension to the
conventional security hazards faced by internet-connected computer systems, cloud systems have relevant
privacy and security problems due to the virtualization and multi-tenancy environment of the cloud. A further
research target is focused on principles of Trust Computing (TC). Although these techniques offer users with
mechanisms for evaluating and assessing security, they do not yield enough controlling functionality for users.
In addition, Data Centric Security (DCS) is an evolving strategy intended to protect the data itself against
migration towards the cloud.

Keyword : Cloud Computing , Data Security , Data Centric Security, Encryption ,Trusted Computing , CRT .
References:
1. L. Chen and D. Hoang, "Active data-centric framework for data protection in cloud environment," in ACIS 2012: Proceedings
of the 23rd Australasian Conference on Information Systems 2012, Geelong, Australia, 2012, pp. 1-11.
239. 2. S. Ransom and C. Werner, "Towards Data-Centric Security in Ubiquitous Computing Environments," in Database and Expert
Systems Application, 2009. DEXA '09. 20th International Workshop on, 2009, pp. 26-30.
3. O. Knill, "A multivariable Chinese remainder theorem," arXiv preprint arXiv:1206.5114, 2012. 1394-
4. S. Ransom and C. Werner, "Towards Data-Centric Security in Ubiquitous Computing Environments," in Database and Expert Systems 1399
Application, 2009. DEXA '09. 20th International Workshop on, 2009, pp. 26-30.
5. T. J. Lehman and S. Vajpayee, "We've Looked at Clouds from Both Sides Now," in SRII Global Conference (SRII), 2011 Annual,
2011, pp. 342-348.
6. Y. Chen, V. Paxson, and R. H. Katz, "What’s new about cloud computing security?," University of California,
Berkeley Report No. UCB/EECS-2010-5 January, vol. 20, pp. 2010-5, 2010.
7. B. Grobauer, T. Walloschek, and E. Stocker, "Understanding Cloud Computing Vulnerabilities," Security & Privacy, IEEE, vol. 9 , pp.
50-57, 2011.
8. T. Dillon, W. Chen, and E. Chang, "Cloud Computing: Issues and Challenges," in Advanced Information Networking and Applicatio ns
(AINA),
9. 2010 24th IEEE International Conference on, 2010, pp. 27-33.
10. [9] Y. Chen, V. Paxson, and R. H. Katz, "What’s new about cloud computing security?," University of California,
Berkeley Report No. UCB/EECS-2010-5 January, vol. 20, pp. 2010-5, 2010.
11. K. Popovic and Z. Hocenski, "Cloud computing security issues and challenges," in MIPRO, 2010 Proceedings of the 33rd
International Convention, 2010, pp. 344-349.
12. S. Iftene, "General secret sharing based on the Chinese remainder theorem," ed: Citeseer, 2006.
13. S. A. Almulla and Y. Chan Yeob, "Cloud computing security management," in Engineering Systems Management and Its
Applications (ICESMA), 2010 Second International Conference on, 2010, pp. 1-7.
14. F. Rocha, S. Abreu, and M. Correia, "The Final Frontier: Confidentiality and Privacy in the Cloud," Computer, vol. 44, pp . 44-50,
2011.
15. R. K. L. Ko, M. Kirchberg, and B. S. Lee, "From system centric to datacentric logging - Accountability, trust & security in cloud
computing," in Defense Science Research Conference and Expo (DSR), 2011, 2011, pp. 1-4.
16. A.-R. Sadeghi, "Trusted Computing — Special Aspects and Challenges SOFSEM 2008: Theory and Practice of Computer Science."
vol. 4910, V. Geffert, J. Karhumäki, A. Bertoni, B. Preneel, P. Návrat, and M. Bieliková, Eds., ed: Springer Berlin / Heidelb erg, 2008,
pp. 98-117.

Authors: Abey Jacob, Cyril Raj

Paper Title: Performance Enhancement of Cloud Computing: Methodology & Tool


240.
Abstract: This paper describes the testing process employed for testing the in-house developed cloud by
1400-
using the Google open source tool PerfKit and employing techniques for increasing the performance. Though
1405
new tools for testing cloud are emerging into the market, there are aspects which are suited for manual testing
and some which can be speeded up using automatic testing tools for various cloud environments for
Infrastructure, Platform and Software services. This paper brings out the techniques best suited to test different
features of Cloud computing environment and to figure out the lacuna in performance of cloud services. The
authors also try to bring out solutions to improve the performance of cloud (recommend) by using various tools
to figure out the debugging and analysis process guidelines to follow while fine tuning the performance of
private clouds.

Keyword : Cloud Computing, Testing tools.


References:
1. http://www.sumegha.in/
2. SuMegha Cloud Kit: Create Your Own Private Scientific Cloud by Vineeth S Arackal, Arunachalam B, Kalasagar, Sumit Kumar,
Mangala N, Sarat Chandra Babu, Prahlada Rao, Sukeshini. https://pos.sissa.it /270/024/pdf
3. https://pdfs.semanticscholar.org/533f/d669ab5e0fa925dab55bca2d43c936f9a9b3.pdf?_ga=2.204569424.1593676386.15 61018071-
691968923.1558962402
4. Yatendra Singh Pundhir , “Cloud Computing Applications And Their Testing Methodology”, Bookman International Journal of
Software Engineering, Vol. 2 No. 1, Jan-Feb-Mar 2013
5. Michael Lynch, Thomas Cerqueus, Christina Thorpe, “Testing a cloud application: IBM SmartCloud inotes: methodologies and tools”,
International Workshop on Testing the Cloud, IISTA, July 2013, Switzerland.
6. William Jenkins, Sergiy Vilkomir, Puneet Sharma, “Framework for Testing Cloud Platforms and Infrastructures ”, 2011 International
Conference on Cloud and Service Computing
7. Sue Poremba, "Open Source Cloud Computing Testing Tools", Cloud Expo, 25 April 2013,
http://www.cloudcomputingexpo.com/node/2625872
8. Alexandru Iosup,Simon Ostermann,Nezih Yigitbasi,Radu Prodan, Thomas Fahringer,Member and Dick Epema “Performance
Analysis of Cloud Computing Services for Many-Tasks Scientific Computing” IEEE published in 2010
9. Dhivya, Padmaveni “Dynamic Resource Allocation using Virtual Machines for cloud computing Environment” IJREAT (International
Journal of Research in Engineering & Advanced Technology), Volume 2,2014.
10. Rupali Shelke, Rakesh Rajani “Dynamic resource allocation in Cloud Computing” International Journal of Engineering Research &
Technology (IJERT) Vol. 2 Issue 10, October – 2013
11. www.Google Perfkit Benchmarker
12. Pillutla Harikrishna ; A. Amuthan, “A survey of testing as a service in cloud computing”, 2016 International Conference on Co mputer
Communication and Informatics (ICCCI) 2016, Pages: 1 – 5
13. Wei Wang ; Ningjing Tian; Sunzhou Huang; Sen He; Abhijeet Srivastava; Mary Lou Soffa; Lori Pollock, “Testing Cloud Applications
under Cloud-Uncertainty Performance Effects”, IEEE 11th International Conference on Software Testing, Verification and Validation
(ICST) 2018, Pages: 81 - 92
14. HongHui Li; XiuRu Li; Huan Wang; Jie Zhang; ZhouXian Jiang, “Research on Cloud Performance Testing Model”, IEEE 19th
International Symposium on High Assurance Systems Engineering (HASE) 2019, Pages: 179 - 183
15. Charles McDowell and David Helmbold. - Debugging Concurrent Programs. ACM Computing Surveys 21(4):593 { 622 December
1989.
16. Globus project 〈http://www.globus.org〉
17. Karl Czajkowski Ian Foster Nicholas Karonis Carl Kesselman Stuart Martin Warren Smith Steven Tuecke - A Resource Management
Architecture for Metacomputing Systems - GRAM - Globus Resource Allocation and Manager.
18. http://clds.sdsc.edu/sites/clds.sdsc.edu/files/wbdb2012/papers/WBDB2012 Paper40Jost.pdf.
19. Net-dbx-G: A Web-Based Debugger of MPI Programs Over Grid Environments.
www.cs.pitt.edu/~panickos/publications/conference/Net-dbx-G.pdf
20. R Hood G Jost - A debugger for computational grid applications - p2d2 - Heterogeneous Computing Workshop 2000.(HCW 2000)
21. N. Karonis B. Toonen and I. Foster - MPICH-G2: A Grid-Enabled Implementation of the Message Passing Interface - Journal of
Parallel and Distributed Computing (JPDC) Vol. 63 No. 5 pp. 551-563 May 2003
22. MohanRam N Prahlada Rao B. B Mangala N Sridharan R Asvija B Shamjith K.V A method and system for Debugging and/or run time
analyzing of heterogeneous computational grids and/or geographically distributed systems Indian Patent Office- 02610/CHE/2007
November 09 2007.
23. Honghui Li, Xiuru Li, Huan Wang, Jie Zhang and Zhouxian Jiang: Research on Cloud Performance Testing Model”, 19 th IEEE
International Symposium on High Assurance Systems Engineering (HASE), 2019.
24. What’s Inside the Cloud? An Architectural Map of the Cloud Landscape,
http://www.di.ufpe.br/~redis/intranet/bibliography/middleware/lenk-what-2009.pdf
25. B. Asvija, K. Kalaiselvan, M. Ateet, R. Sridharan, S.R.Krishnamurthy. "A Performance Based QoS Aware Resource Brokering
Framework for the Grid", 2012 Ninth International Conference on Information Technology – New Generations, 2012
26. Cyril Raj, Abey Jacob: Performance Evaluation of SUMEGHA Cloud Computing Environment: Methodologies & Tool, International
Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8 Issue-12, October 2019.
27. Christoph Laaber. "Continuous software performance assessment: detecting performance problems of software libraries on every
build", Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis - ISSTA 2019, 2019
28. Sonam Srivastava, Sarv Pal Singh. "A Survey on Latency Reduction Approaches for Performance Optimization in Cloud Computing",
2016 Second International Conference on Computational Intelligence & Communication Technology (CICT), 2016
29. Akshay R. Rele, Sudhir N. Dhage. "Towards the performance measurements of private cloud", 2015 International Conference on
Communication, Information & Computing Technology (ICCICT), 2015
30. Harikrishna Pillutla, A. Amuthan. "Recursive Self Organizing Maps and Software Defined Networking Cloud - A Survey", 2019
International Conference on Computer Communication and Informatics (ICCCI), 2019
31. S. Jagannatha, N. S. Shravan, S Kavya. "Cost performance analysis: Usage of resources in cloud using Markov -chain model", 2017 4th
International Conference on Advanced Computing and Communication Systems (ICACCS), 2017
32. W. K. Daniel. "Challenges on privacy and reliability in cloud computing security", 2014 International Conference on Information
Science, Electronics and Electrical Engineering, 2014
33. D.J. Miller. "Integrating Web service and grid enabling technologies to provide desktop access to high-performance cluster-based
components for large-scale data services", 36th Annual Simulation Symposium 2003 SIMSYM-03, 2003
34. Alam, Md. Imran, Manjusha Pandey, and Siddharth S Rautaray. "A Comprehensive Survey on Cloud Computing ", International
Journal of Information Technology and Computer Science, 2015.
35. William Jenkins, Sergiy Vilkomir, Puneet Sharma, George Pirocanac. "Framework for testing cloud platforms and infrastructures ",
2011 International Conference on Cloud and Service Computing, 2011
36. Mohamed Firdhous, Osman Ghazali, Suhaidi Hassan. "Trust Management in Cloud Computing: A Critical Review", International
Journal on Advances in ICT for Emerging Regions (ICTer), 2012

241. Authors: Md. Abdul Muqsit Khan


Paper Title: Agent-Based Ergonomic User Interface Development Environment: Analysis Phase
Abstract: Internet around the world has become the prime source to satisfy the requirement of
Entrepreneurs, customer and end users. As user comfort is the primary goal of all the entrepreneurs, the end user
interacts through the internet to mine the knowledge. The user interacts the internet by apps and web. To attract
the users, the user interface (UI) designers focus on Visual presentations to abet users to interact, comprehend,
and navigate to the information. The work presents that how visual perceptions of Web page intricacy by
perceptive users' behavior, the indispensable cognitive effort for interaction with the UI can be understood. The
work presents an extension of current methods for designing UI using model-based technics, with the methods
essential for the design of adaptive capacities required in different phases of development. These developments
can be fused in Agent-Based Ergonomic User Interface Development Environment. This technique is bolstered
by a solution based on Multi-Agent System (MAS) which offer adaptive capabilities to users, designed using the
anticipated technique of Agent-Based Ergonomic User Interface Development Environment (AB-EUIDE). In
[27] author has presented the various phases of the AB-EUIDE Framework. In this article author presents the
analysis phase of the AB-EUIDE and explains how a compromise is done between Adaptation and Ergonomics
while designing the user interface.

Keyword : Adaptation, Analysis phase, Ergonomic user interface (EUI), and Multi-Agent System (MAS).
References:
1. Brad A. Myers, “Why are HCI difficult to design and implement?”, Technical Report, CMU-CS-93-183, Computer Science Dept.,
Carnegie Mellon University Pittsburgh, July 1993.
2. Francois Bodart, Jean Vanderdonckt, A. Hennebert, Isabelle Sacre, and J. Leheureux, “Architecture Elements for Highly-Interactive
Business-Oriented Applications,” In 3rd International Conference on HCI. EWHCI 1993. Lecture Notes in Computer Science,
Volume: 753. Springer, Berlin, pp. 83-104.
3. A. Puerta. “A Model-Based Interface Development Environment”. In IEEE Software, V0 lume: 14, Issue: 4, Jul/Aug 1997, pp. 40-47.
DOI: 10.1109/52.595902
4. Michael E. Bratman; “Intention, Plans and Practical Reason”. CSLI Publications, 1987.
5. Chandra S. k, J. Ram, & Abdul Muqsit Khan, “The Peculiarities of Software Composition Models”, J. of Digital Information
Management, Volume: 3, Issue: 3, September 2005, pp.181-187.
6. Francois Bodart, J. Vanderdonckt Anne-Marie Hennebert, and J. Leheureux, “Towards a Dynamic Strategy for Computer-Aided Visual
Placement,” in Proceedings of Workshop on Advanced Visual Interfaces AVI94, ACM, NY, Jan. 1994, pp.78-87.
7. Donald A. Norman, and Stephen W. Draper, “User centered system design: New perspectives on human-computer interaction,” L.
Erlbaum Associates Inc. Hillsdale, NJ, USA, 1986.
8. Md. Abdul Muqsit Khan, and Chandra S.K., “Ergonomics for web applications development,” in Proceedings of 4th Int. Conf., IETET, 1406-
India, 2013, pp. 62-72. 1410
9. Ben Shneiderman, “Designing the User Interface Strategies for Effective HCI,” 5th edition, publisher Pearson, 2009.
10. Sidney L. Smith and Jane N. Mosier. “Design Guidelines for Designing User Interface Software”. Tec. Rep. MTR-10090, The MITRE
Corporation, Bedford, Massachusetts, USA, Aug.1986.
11. International Business Machines Corporation. “Object–oriented interface design: IBM common user access guidelines,” QUE, Carmel,
1992.
12. D. V. Duyne, Jason I. Hong and James A. Landay, “The Design of Sites: Patterns, Principles and Processes for Crafting a Customer-
Centered Web,” Addison Wesley Professional Publication. 2003.
13. Jenifer Tidwell, “Common Ground: A Pattern Language for HCI Design”, http://www.mit.edu/~jtidwell/interaction_patterns.html,
1999.
14. J.M.C. Bastien, D.L. Scapin, “Evaluating a user interface with ergonomic criteria,” International J. of HCI, Volume: 7, Issue: 2, pp.
105- 121, 1995.
15. Quentin Limbourg, B. Michotte, J. Vanderdonckt, L. Bouillon, and V.L Jaquero, “UsiXML: a Language Supporting Multi-Path
Development of UIs”, in Proc. IFIP Int. Conf. on Engg. for HCI LNCS, Volume: 3425, Springer, 2005, pp. 200-220.
16. www.cs.toronto.edu/km/GRL
17. Eric Yu, “Towards Modelling and Reasoning Support for Early-Phase Requirements Engineering”, In Proceedings of ISRE 97, the 3rd
IEEE Intrnational Symposium on Requirements Eng., at Annapolis, MD. USA. 1997, pp. 226-235.
18. Chandra K. S., Md Abdul Muqsit Khan, and Gopal, “Obstacles to Machine Translation,” Int. J. of Translation, Vol. 18(1-2), Aug.
2006, pp. 89-102.
19. Chandra Sekharaiah. K., and Md Abdul Muqsit Khan, “Affective Computing: Next Generation AI Software Systems”, The IUP J. of
Information Tech., Volume: 3(4), Decmber 2007, pp. 61-74.
20. Chandra S.K., and Md Abdul Muqsit Khan, “Towards Metrics for Social Computing,” Proceedings of W0 rld Academy of Science,
Eng. and Tec. 37, January 2009, pp 1086-1090.
21. Chandra S.K., and Md. Abdul Muqsit Khan, “Computer Ergonomics: Relooking at Machines vs. Environment,” The IUP J. of
Information Tech., Volume: 2, Issue 3, 2006, pp. 19-27.
22. Md. Abdul Muqsit Khan, and Chandra S.K., “Perspective of MAS Modeling Through Roles and Ontology,” in Int. J. of Recent
Trends in Eng., Volume:1(2), 2009, pp. 294-298.
23. Chandra S.K., and Md. Abdul Muqsit Khan. “Computer Ergonomics: Relooking at Machines vs. Environment,” in ch. 21 of
Environmental Protection, Daya Publishing House, 2007, pp.104-112.
24. Chandra S. K., and Md. Abdul Muqsit Khan, “The Patents Act and Related Issues: Indian Scenario,” in Proceedings of the National
Workshop on IPR Curriculum for Eng. and Science Students, IIT Roorkee, India, 2005, pp. 18-19.
25. Md. Abdul Muqsit Khan, “Ergonomic User Interface: System Assessment and Design Process “, Int. J. of Eng. Tech. Management
and Applied Sci., Volume: 4(11), Nov. 2016, pp. 79-84.
26. Md. Abdul Muqsit Khan, “Ergonomic User Interface: System Logical Analysis and Design Process,” in Int. Journal of Eng.
Technology Sci. and Research, Volume: 4(11), Nov. 2016, pp. 64-71.
27. Md. Abdul Muqsit Khan, “Framework for Multi-Agent Based Intelligent Ergonomic User Interface System: Requirements Phase” in
Int. J. of Advanced Research in Computer Science. Vol. 8(7), Jul-Aug. 2017, pp. 599-603.

Authors: Majmaa Huda Khalid Hameed, Sheshin E.P.

242. The Effect of Silicon-Organic Modifier of CdZnS/ZnS (GT) Quantum Dot with Wavelength 390 nm
Paper Title:
on cathodoluminescent mode
Abstract: Surface modification of quantum Dots is very demanding to improve the optical properties of 1411-
quantum Dots and it is generally carried out by depositing an organic or an inorganic layer on the quantum Dots. 1413
In this study the behavior of CdZnS/ZnS and CdZnS/ZnS (GT), both emitting at 390 nm, differ by silicon-
organic additives studying in a vacuum chamber to find out their feature and to identify the luminescent of
quantum Dots, under the action of electron bombardment to assess the capability of quantum Dots as phosphors
for further use in vacuum electronics

Keyword : quantum dots, core/shell quantum dots, light sources, cathodoluminescence, passivation,
CdZnS/ZnS, CdZnS/ZnS (GT)
References:
1. Bondarenko B.V., Rybakov Yu.L., Shakhovskoi A.G., Sheshin E.P., //Some features of the process of stabilization of field emission
characteristics of carbon fibers. //Theses of the reports of the XIX All Union Conference on Emission Electronics. Tashkent. 1984. P.
31. ( Russian).
2. Levshin V.L. et al. Researching cathodoluminescence of ZnS and some other phosphors // Works of P.N. Lebedev’s Institute of
Physics. 1963. pp. 64–135.
3. Klimov V.I., Ed. Nanocrystal Quantum Dots (2nd Ed.). // CRC Press, 2010.
4. Ozol D.I. Preliminary study of cathode ray tube phosphors on the basis of nanocrystal quantum dots // 29th International Vacuum
Nanoelectronics Conference (IVNC), 2016, Vancouver, BC, 2016, pp. 1-2.
5. Dezhurov S.V. et al. Synthesizing highly stable colloid quantum dots CDTESE/CDS/CDANS/ZNS, exhibiting fluorescence in 650-750
nm range // Russian nanotechnology, 2016, #5-6 pp. 69-74.
6. Majmaa Huda k.,Sheshin E.P.// Researching CdZnS/ZnS (GT) Quantum Dots in Cathodoluminescent Mode// International Journal of
Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8, Issue- 9S2, July 2019

Authors: A. Vidyavani , K. Dheeraj, M. Rama Mohan Reddy, KH. Naveen Kumar

Paper Title: Object Detection Method Based on YOLOv3 using Deep Learning Networks
Abstract: Object Detection is being widely used in the industry right now. It is the method of detection and
shaping real-world objects. Even though there exist many detection methods, the accuracy, rapidity, and
efficiency of detection are not good enough. So, this paper demonstrates real-time detection using the YOLOv3
algorithm by deep learning techniques. It first makes expectations crosswise over 3 unique scales. The
identification layer is utilized to make recognition at highlight maps of three distinct sizes, having strides 32, 16,
8 individually. This implies, with partner contribution of 416 x 416, we will in general form location on scales
13 x 13, 26 x 26 and 52x 52. Meanwhile, it also makes use of strategic relapse to anticipate the jumping box
article score, the paired cross-entropy misfortune is utilized to foresee the classes that the bounding box may
contain, the certainty is determined and afterward the forecast. It results in perform multi-label classification for
objects detected in images, the average preciseness for tiny objects improved, it's higher than quicker RCNN.
MAP increased significantly. As MAP increased localization errors decreased.

243.
Keyword : (YOLOv3, deeplearning, dimensional clustering, object detection)
1414-
References: 1417
1. Vermesan,O.,&Bacquet,J.(2017).Cognitive Hyper connected Digital transformation. Cognitive Hyperconnected Digital
Transformation, 1–310. doi: 10.13052/rp-9788793609105
2. Dimiccoli, M. (2018). Computer Vision for Egocentric (First-Person) Vision. Computer Vision for Assistive Healthcare, 183–
210. doi: 10.1016/b978-0-12-813445-0.00007-1
3. Khanna, S., Rakesh, N., & Chaturvedi, K. N. (2017). Operations on Cloud Data (Classification and Data Redundancy). Advances in
Computer and Computational Sciences Advances in Intelligent Systems and Computing, 169–179. doi: 10.1007/978-981-10-3773-
3_17
4. Ketkar, N. (2017). Training Deep Learning Models. Deep Learning with Python, 215–222. doi: 10.1007/978-1-4842-2766-4_14
5. Berg, A. C., & Malik, J. (2006). Shape Matching and Object Recognition. Toward Category-Level Object Recognition Lecture Notes
in Computer Science, 483–507. doi: 10.1007/11957959_25
6. He, X., & Deng, L. (2018). Deep Learning in Natural Language Generation from Images. Deep Learning in Natural Language
Processing, 289–307. doi: 10.1007/978-981-10-5209-5_10
7. Li, C.-S., Darema, F., Kantere, V., & Chang, V. (2016). Orchestrating the Cognitive Internet of Things. Proceedings of the
International Conference on Internet of Things and Big Data. doi: 10.5220/0005945700960101
8. Nagaraj, B., & Vijayakumar, P. (2012). Tuning of a PID Controller using Soft Computing Methodologies Applied to Moisture
Control in Paper Machine. Intelligent Automation & Soft Computing, 18(4), 399–411. doi: 10.1080/10798587.2012.10643251
9. Sathi, A. (2016). Cognitive Things in an Organization. Cognitive (Internet of) Things, 41– 59. doi: 10.1057/978-1-137-59466-2_4

Authors: Yudi Rustandi, Setya Handayani, Indah Listiana, Dafit Ariyanto


Agribusiness Activity at Islamic Boarding School Al Ittifaq Ciwidey-Bandung using Interactive
Paper Title:
Models
Abstract: Islamic boarding school is one of the islamic educational institutions that grow fastly with
diversity method in Indonesia This study is aimed to describe the effort to grow young entrepreneur at Islamic
Boarding School al Ittifaq Ciwidey Bandung through agribusiness activity with a focus on student
244. empowerment. The study was done at Al-Ittifaq Ciwidey Bandung by applying qualitative research approach.
Informants were selected by means of purposive sampling and snowball sampling which were further classified
1418-
into three groups (triangulation). Furthermore, data collection technic was conducted through in-depth interview,
1424
direct observation, documentation, and FGD (Focus Group Discussion). Data analysis technic was performed
using interactive model. Regarding the effort to grow young entrepreneurs, result of the study shows that student
at al Ittifaq Ciwidey Bandung involve in agribusiness activities such as: (1) the formation of Executive Board of
Agribusiness Unit, (2) conducting technical practices directly in the field, (3) establishing Agribusiness
Incubation Center (PIA), (4) establishing cooperation/partnership with various institutions, and (5) setting up
agribusiness groups of students.

Keyword : Development Mode, Empowerment, Agribusiness, student, islamic Boarding School


References:
1. Abdurrachim RFH. Reza Fahmi Haji Abdurrachim Abstract The Islamic Boarding School is always connected to the institution whic h
produces the rebellions behavior and building radicalism in many Muslim countries , i . e Pakistan , Afghanistan , and Indone sia . The
radicalism. Islam Realitas J Islam Soc Stud. 2016;2(1):34–44.
2. Thahir M. The Role and Function of Islamic Boarding School : An Indonesian Context. Int J Hist Stud. 2014;5(2):197 –208.
3. Sulaiman AI, Chusmeru C, Masrukin M. Strategy of Cooperative Islamic Boarding School As Economic Empowerment Community.
Inferensi J Penelit Sos Keagamaan. 2018;12(1):25.
4. Carolina ES. Are Islamic Boarding Schools Ready? The Use of the Computer-Based Test in the National Exam Policy for English
Subject. Ta’dib J Islam Educ. 2017;22(2):44–53.
5. Das W, Halik A, Amaluddin A. Paradigm of Islamic Education in the Future: The Integration of Islamic Boarding School and Favo rite
School. Inf Manag Bus Rev. 2016;147(4):11–40.
6. Wang F, Chich-jen S, Mei-ling T. Effect of leadership style on organizational performance as viewed from human resource
management strategy. African J Bus Manag. 2010;4(18):3924–36.
7. Wichenje KM, Simatwa EMW, Okuom HA, Kegode EA. Human resource management : challenges for head teachers in Public
Secondary Schools in Kenya , a case study of Kakamega East District. 2012;3(2):159–71.
8. Patton M. Book Review Evaluation Methods ( 3rd ed .) Qualitative Research and. In 2002. p. 83.
9. Bastas A, Liyanage K. Integrated quality and supply chain management business diagnostics for organizational sustainability
improvement. Sustain Prod Consum. 2019;17:11–30. Available from: https://doi.org/10.1016/j.spc.2018.09.001
10. Zhao M, Dong C, Cheng TCE. Quality disclosure strategies for small business enterprises in a competitive marketplace. Eur J Oper
Res. 2018;270(1):218–29. https://doi.org/10.1016/j.ejor.2018.03.030
11. Bohner C, Minner S. Supplier selection under failure risk, quantity and business volume discounts. Comput Ind Eng. 2017;104:145–55.
Available from: http://dx.doi.org/10.1016/j.cie.2016.11.028
12. Kato M, Charoenrat T. Business continuity management of small and medium sized enterprises: Evidence from Thailand. Int J Disaster
Risk Reduct. 2018;27:577–87. https://doi.org/10.1016/j.ijdrr.2017.10.002
13. Sehnem S, Oliveira GP. Analysis of the supplier and agribusiness relationship. J Clean Prod [Internet]. 2017;168:1335 –47.
http://dx.doi.org/10.1016/j.jclepro.2017.08.240
14. Gunderson MA, Boehlje MD, Neves MF, Sonka ST. Agribusiness Organization and Management. Encycl Agric Food Syst. 2014;1:51–
70.

Authors: D.PrasannaVenkatesh, P.Shanmughasundaram


The Influence of Deep Cryogenic Treatment (DCT) on the Mechanical Behaviour of Aluminium
Paper Title:
Metal Matrix Composites
Abstract: The outcome of cryogenic treatment (CTT) on the mechanical behaviour of Al alloy LM 25,
LM25+5% fly ash and LM25+10%fly ash composites was investigated. Cryogenic treatments were performed
with threedifferent soaking periods (0 hr (Untreated), 12hr, 24hr) ata constant cryogenic temperature of -196°C.
After the CTT, the mechanical behaviour of the materials was measured. It is obvious that LM25+10% fly ash
composites exhibitbetter mechanical properties than the LM25 and LM25+10% fly ash composites.As cryogenic
soaking period increases mechanical properties of the MMCs tend to increase too. The effect of fly ash mass
percentage and cryogenic soaking period on the mechanical behaviour of materials was studied by using
Taguchi and Analysis of Variance (ANOVA).

Keyword : cryogenic treatment, fly ash reinforced LM 25 composites, cryogenic soaking period, mechanical
behaviour, Taguchi, ANOVA.
References:
1. R. Rajesh, “Effect of Chemical Treatment on the Mechanical Properties of Palm Fiber Reinforced Polymer composites”, Research
Journal of Science and Engineering Systems, vol.1, 2017, pp.8-18.
2. Volker Franco Steier, Edgar SobralAshiuchi, Lutz Reißig, and José Alexander Araújo, “Effect of a Deep Cryogenic Treatment on Wear
and Microstructure of a 6101 Aluminum Alloy,” Advances in Materials Science and Engineering, vol. 2016.
245. 3. K. Gu, J. Wang, and Y. Zhou, “Effect of cryogenic treatment on wear resistance of Ti-6Al-4V alloy for biomedical applications,”
Journal of the Mechanical Behavior of Biomedical Materials, vol. 30, 2014, pp. 131–139.
4. F.Bouzada, M. Cabeza, P. Merino, and S.Trillo, “Effect of Deep Cryogenic Treatment on the Microstructure of an Aerospace 1425-
Aluminum Alloy,” Advanced MaterialsResearch, vol.445, 2012, pp.965– 970.doi:10.4028/www.scientific.net/amr.445.9, (2012). 1431
5. Susheel Kalia, “Cryogenic Processing: A Study of Materials at Low Temperatures,”Journal of Low Temperature Physics,
vol.158, 2010, pp 934–945.
6. K. E. Lulay, Khan, Khalid; and D.Cyaaya, "The Effect of Cryogenic Treatments on 7075 Aluminum Alloy,"Engineering Faculty
Publications and Presentations, 2002. http://pilotscholars.up.edu/egr_facpubs/2
7. A.K.Singla, J.Singh and V. S. Sharma, “Processing of materials at cryogenic temperature and its implications in manufacturing : A
review”, Materials and Manufacturing Processes,2018,pp.1–38.doi:10.1080/10426914.2018.1424908, (2018).
8. X.Q.Jiang, N. Li, H.He, X. J.Zhang, C.C.Li, and H.Yang, “Effect of Cryogenic Treatment on Mechanical Properties and
Microstructures of 3102 Al-Alloy,” MaterialsScienceForum,vol.546-549,2007,pp.845–848.doi:10.4028/www.scientific.net/msf.546-
549.845.
9. J. J. Wang, X. D Xue, Z. Q. Yang, H. Zhang, , and Y.Zhou, “ Effect of Cryogenic Treatments on Mechanical Properties of 2A11
Aluminum Alloy,”AdvancedMaterialsResearch,vol.146-147,2010,pp.1646–1650.doi:10.4028/www.scientific.net/amr.146-147.1646.
10. A. Taskesen , S. Aksoz , A. T. Ozdemir , “The effect of cryogenic treatment on ageing behaviour of B4C reinforced 7075 aluminium
composites,” Kovove Mater, vol. 55 ,2017,pp. 57–67 DOI: 10.4149/km 2017 1 57.
11. S.Kumar, M. Nagaraj, N.K. Khedkar and A.Bongale, “Influence of deep cryogenic treatment on dry sliding wear behaviour of AISI
D3 die steel,”Materials Research Express,vol.5,2018, doi:10.1088/2053-1591/aadeba.
12. M. S.Rasool, M. S. M. Aripin, S.Thamizhmanii, S. B.Hasan and D.Sathiaraj, “Deep Cryogenic Treatment on Aluminum Silicon
Carbide (Al-SiC) Composite,”AdvancedMaterialsResearch,vol.383-390,2011,pp.3320–3324.doi:10.4028/www.scientific.net/amr.383-
390.3320, (2011).
13. K. E. Lulay ,K. Khan,D. Chaaya , “The effect of cryogenic treatments on 7075 aluminum alloy,” Journal of Materials Engineering and
Performance, Vol. 11(5) , 2002, pp 479–480.
14. W.Zhang, P. Bai, J.Yang, H. Xu, J.Dang and Z.Du, “Tensile behavior of 3104 aluminum alloy processed by homogenization and
cryogenic treatment,”Transactions of Nonferrous Metals Society of China, vol.24(8),2014,pp.2453–2458.doi:10.1016/s1003-
6326(14)63370-7.
15. T.Slatter and R.Thornton, “Cryogenic Treatment of Engineering Materials,” Comprehensive Materials Finishing, vol.2, 2017, pp.421–
454. doi:10.1016/b978-0-12-803581-8.09165-7.
16. R.Thornton., T.Slatter and H.Ghadbeigi, “Effects of deep cryogenic treatment on the dry sliding wear performance of ferrous
alloys,”Wear, vol.305 (1-2), 2013, pp.177–191.doi:10.1016/j.wear.2013.06.005.
17. Anil Kumar Singla, Jagtar Singh and Vishal S. Sharma, “Processing of materials at cryogenic temperature and its implications in
manufacturing: A review,”Materials and Manufacturing Processes, 2018, pp.1-38,. DOI: 10.1080/10426914.2018.1424908.
18. M.Araghchi, H. Mansouri, and R.Vafaei, “Influence of cryogenic thermal treatment on mechanical properties of an Al–Cu–Mg
alloy,”Materials Science and Technology, Vol.34 (4), 2017,pp.468–472.doi:10.1080/02670836.2017.1407553.
19. Shanmughasundaram, Palanisamy, “Investigation on the Wear Behaviour of Eutectic Al-Si Alloy- Al2O3 - Graphite Composites
Fabricated through Squeeze Casting,” Materials Research, Vol.17 (4), 2014, pp.940-946.

Authors: M.Zemamou , A.Toumi , K.Mrigua, M.Aggour

Paper Title: Modified Design of Savonius Wind Turbine Blade for Performance Improvement
Abstract: In the context of worldwide energetic transition, wind energy shows up as one of the most
prominent renewable energy to provide an alternative for the conventional energy source. Therefore, new
technologies of a wind turbine are developed, horizontal axis wind turbines have been extensively investigated
and evolved. However, the development of vertical axis wind turbines is still an open and area of research, The
main objective is to develop a more efficient type of wind turbines able to operate at low wind speeds to take
hold maximum wind potential, The Savonius rotor goes with such conditions, however, it faces critical
drawbacks, in particular, the low performance in comparison with horizontal axis wind turbines, as well, the
blade in return of savonius wind turbine generates a negative torque leading to a decrement of turbine
performance. The present work aims to investigate a modified model of the conventional Savonius rotors with a
focus on improving the coefficient of power, transient computational fluid dynamics (CFD) simulations are
carried out in an effort to perform a validation of numerical results according to experimental data, also to
conduct a comparative analysis of both savonius models.

Keyword : Blade design, Power coefficient, Savonius rotor , Wind turbines.


References:
1. S. S. Alam, N. Fariza, M. Nor, M. Ahmad, N. Hazrul, and N. Hashim, “A Survey on Renewable Energy Development in Malaysia :
Current Status, Problems and Prospects,” Environmental and Climate Technologies pp. 5–17, doi: 10.1515/rtuect-2016-0002,2016.
2. M. H. Mohamed, G. Janiga, E. Pap, and D. Thévenin, “Optimal blade shape of a modified Savonius turbine using an obstacle shielding
the returning blade,” Energy Convers. Manag., vol. 52, no. 1, pp. 236–242, 2011.doi:10.1016/j.enconman.2010.06.070.
3. F. Jamati, “Étude Numérique d’une Éolienne Hybride Asynchrone Étude 2011.
4. M. Medaglia ,M. D’Ambrosio, “Vertical Axis Wind Turbines: History, Technology and Applications,” Master thesis in Energy
Engineering. May, 2010.
5. L. Gulbe, N. Jekabsons, and A. Traskovs, “Parametric Studies for Vertical Axis Wind Turbine Simulations,” pp. 23 –30, 2011,
Environmental and Climate Technologies, doi: 10.2478/v10145-011-0003-5,2011.
6. A.Al-Faruk, A.Sharifian, “Flow field and performance study of vertical axis Savonius type SST wind turbine”, Energy Procedia.2017,
doi.org/10.1016/j.egypro.2017.03.133
7. B. D. Altan, M. Atilgan, and A. Özdamar, “An experimental study on improvement of a Savonius rotor performance with curtaining,”
246. Exp. Therm. Fluid Sci., vol. 32, no. 8, pp. 1673–1678, 2008.doi:10.1016/j.expthermflusci.2008.06.006.
8. H. Gad, and A.Abd El-Hamid, “A New Design of Savonius Wind Turbine: Numerical Study” Vol. 6(4) 2014. 1432-
9. Y.X. Yao, Z.. Tang, “Design based on a parametric analysis of a drag driven VAWT with a tower cowling,” Journal of Wind
Engineering
1437
10. and Industrial Aerodynamics, doi.org/10.1016/j.jweia.2012.11.001.
11. A.Sanusi et al., “Experimental Study of Combined Blade Savonius Wind Turbine” International journal of renewable energy
research,Vol. 6, No. 2,2016.
12. M. Tartuferi, V. D’Alessandro, S. Montelpare, and R. Ricci, “Enhancement of savonius wind rotor aerodynamic performance: A
computational study of new blade shapes and curtain systems,” Energy, vol. 79, no. C, pp. 371 –384, 2015.
doi.org/10.1016/j.energy.2014.11.023.
13. A. Al-Faruk and A. Sharifian, “Geometrical optimization of a swirling Savonius wind turbine using an open jet wind tunnel,”
Alexandria Eng. J., vol. 55, no. 3, pp. 2055–2064, 2016, doi.org/10.1016/j.aej.2016.07.
14. J. V. Akwa, G. Alves Da Silva Júnior, and A. P. Petry, “Discussion on the verification of the overlap ratio influence on perf ormance
coefficients of a Savonius wind rotor using computational fluid dynamics,” Renew. Energy, vol. 38, no. 1, pp. 141 –149, 2012,
doi.org/10.1016/j.renene.2011.07.013
15. Roy and U. K. Saha, “Review of experimental investigations into the design, performance and optimization of the Savonius rotor,”
Proc. Inst. Mech. Eng. Part A J. Power Energy, vol. 227, no. 4, pp. 528–542, 2013,doi: 10.1177/0957650913480992
16. M. Zemamou, M. Aggour, and A. Toumi, “Review of savonius wind turbine design and performance,” Energy Proc edia, vol. 141, pp.
383–388, 2017, doi 10.1016/j.egypro.2017.11.047
17. K.K. Sharma, R. Gupta, A.Biswas,"Performance Measurement of a Two-Stage Two-Bladed Savonius Rotor",Mechanical Engg. NIT
Silchar, Assam, India,Vol.4, No.1, 2014.
18. Le Gourières D. Énergie éolienne. Eyrolles; Paris; 1980.
19. M. H. Nasef, W. A. El-Askary, A. A. AbdEL-hamid, and H. E. Gad, “Evaluation of Savonius rotor performance: Static and dynamic
studies,” J. Wind Eng. Ind. Aerodyn., vol. 123, pp. 1–11, 2013, doi.org/10.1016/j.aej.2012.07.003
20. M. H. Mohamed, et al., Optimal blade shape of a modi_ed Savonius turbine using an obstacle shielding the returning blade,Energy
Conversion and Management. doi:10.1016/j.enconman.2010.06.070
21. J.-L. . MENET a, T. DE REZENDE Static and dynamic study of a conventional Savonius rotor using a numerical simulation. 21ème
Congrès Français de Mécanique, Bordeaux, 26 au 30 août 2013
M. Bhutta, N. Hayat, Vertical axis wind turbine- A review of various configurations and design techniques. , Renewable and
Sustainable Energy Reviews, Elsevier, vol. 16(4), pages 1926-1939.
22. Z. Mao, J. Bai, Numerical investigation of a small water turbine used for the power supply of underwater vehicles, Advances i n
Mechanical Engineering 10 (6) (2018) 1-10. doi:10.1177/1687814018783654.
23. Ujjwal K. Saha,A.Banerjee ,S.RoyUnsteady flow analysis around an elliptic-bladed Savonius-style wind turbine. Proceedings of the
ASME Gas Turbine India Conference GTINDIA2014 December 15-17, 2014.
24. A.Rezaeihaa,, I.Kalkmana, B.Blockena. Effect of pitch angle on power performance and aerodynamicsof a vertical axis wind turbine,
Applied Energy, 2017, doi.org/10.1016/j.apenergy.2017.03.128
25. A. Banerjee,S.Roy Unsteady flow analysis around an elliptic-bladed
26. Savonius-style wind turbine, Proceedings of the ASME 2014 Gas Turbine India Conference,GTINDIA2014 December 15-17, 2014.
27. W.Tian, Z.Mao, Shape optimization of a Savonius wind rotor with different convex and concave sides,Renewable Energy 117 (201 8)
287e299, doi.org/10.1016/j.renene.2017.10.067.

Authors: P.Sunitha, K.L.Shunmuganathan,


Extended Distributed Suboptimal Channel Assignment Algorithm Based Channel Assignment for
Paper Title:
Wireless Local Area Networks in a Multi Agent Environment
Abstract: Due to the universal use of IEEE 802.11 – based networks, the systematic positioned of Wireless
Local Area Networks (WLANs) come to be a Challenge. With the intense admiration and stationed of WLANs,
well organized administration of wireless bandwidth is elegantly a major progressive. The advanced techniques
upgrade the utilization of wireless bandwidth in the factors of wireless local area networks (WLANs) employing
advanced channel allocation techniques between Interfering Access Points (Aps). This work formalizes the
channel assignment as a multiagent hampering optimization problem in a multi agent environment and intend a
latest collective medium assignment procedure called Extended Distributed Suboptimal Channel Assignment
(EDSCA), which utilizes Distributed Pseudo tree optimization (DPOP).

Keyword : Wireless local area network, multi agent, access point, distributed constraint optimization problem,
Extended Distributed Suboptimal Channel Assignment.
References:
1. Jim Geier, “Assigning 802.11b access point channels,” Wi-Fi Planet.
2. Chen, J. K., de Veciana, G. and Rappaport, T. S. (2009). Site-Specific Knowledge and Interference Measurement for Improving
Frequency Allocations in Wireless Networks. IEEE Transactions on Vehicular Technology, vol. 58, no. 5, 2366-2377.
3. Yue, X., Wong, C.-F. and Chan, S.-H.G. (2011). CACAO: Distributed Client-Assisted Channel Assignment Optimization for
Uncoordinated WLANs. IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 9, 1433-1440.
4. Nie, N. and Comaniciu, C. (2006). Adaptive channel allocation spectrum etiquette for cognitive radio networks. Journal of Mobile
Networks and Applications, vol. 11, no. 6,779-797.
5. Huang, J., Berry, R. A. and Honig, M. L. (2006).Auction-based spectrum sharing. Journal of Mobile Networks and Applications, vol.
11, no. 3, 405-418.
6. Cao, L. and Zheng, H. (2005). Distributed spectrum allocation via local bargaining. 2nd Annual IEEE Communications Society
Conference on Sensor and Ad Hoc Communications and Networks, 475-486.
7. Peng, C., Zheng, H. and Zhao, B. Y. (2006). Utilization and fairness in spectrum assignment for opportunistic spectrum access , Journal
of Mobile Networks and Applications, vol.11, 555-576.
247. 8. Youngseok Lee, Kyoungae Kim, and Yanghee Choi, “Optimization of ap placement and channel assignment in wireless lans,” in
Proceedings of 27th Annual IEEE Conference on Local Computer Networks (LCN), 2002. 1438-
9. T. Rappaport, Wireless Communications: Principle and Practice, Prentice Hall, 1996. 1441
10. Bhaskar Krishnamachari, Stephen Wicker, Ramon Bejar, and Cesar Fernandez, “On the complexity of distributed selfconfiguration in
wireless networks,” Journal of Telecommunication Systems, 2003.
11. Filipe Mazzini, Geraldo Mateus, and James Macgregor Smith, “Lagrangean based methods for solving large-scale cellular network
design problems,” Journal of Wireless Networks, 2003.
12. Balakrishnan. S and K L Shunmuganathan. Article: A JADE Implementation of Integrated Agent System for E-Mail Coordination
(IASEC). International Journal of Computer Applications 58(5): 5-9, November 2012.
13. P.Arivazhagan, Balakrishnan. S and K L Shunmuganathan. “An Agent Based Centralized Router with Dynamic Connection
Management Scheme Using JADE”, International Journal of Applied Engineering Research, ISSN 0973-4562, Volume 11, Number 3
(2016) pp 2036-2041.
14. Balakrishnan. S and K L Shunmuganathan, R. Sreenevasan, “Amelioration of Artificial Intelligence using Game Techniques for an
Imperfect Information Board Game Geister” International Journal of Applied Engineering Research (IJAER). ISSN 0973-4562. Vol 9,
Number 22 (2014) pp. 11849-11860.
15. Balakrishnan. S and K L Shunmuganathan, An Agent Based Collaborative Spam Filtering Assistance Using JADE”, International
Journal of Applied Engineering Research, ISSN 0973-4562, Volume 10, Number 21 (2015) pp 42476-42479.
16. S.Balakrishnan, “An Overview of Agent Based Intelligent Systems and Its Tools”, CSI Communications magazine, Volume No. 42,
Issue No. 10, January 2019, pp. 15-17.
17. S. Balakrishnan, B. Persis Urbana Ivy and S. Sudhakar Ilango, “A Novel And Secured Intrusion Detection System For Wireless Sensor
Networks Using Identity Based Online/Offline Signature”, ARPN Journal of Engineering and Applied Sciences. November 2018, Vol.
13 No. 21, pp. 8544-8547.
18. S.Balakrishnan, Vinod K, B. Shaji. (2018). “Secured and Energy Efficient AODV Routing Protocol For Wireless Sensor Network”,
International Journal of Pure and Applied Mathematics, Vol. 119, No. 10c, 2018, pp. 563-570.
19. S.Balakrishnan, J.P.Ananth, L.Ramanathan, S.P.Premnath, (2018). “An Adaptive Energy Efficient Data Gathering In Wireless Sensor
Networks”, International Journal of Pure and Applied Mathematics, Volume 118 No. 21, 2018, pp. 2501-2510.
20. J.P.Ananth, S.Balakrishnan, S.P.Premnath, (2018). “Logo Based Pattern Matching Algorithm for Intrusion Detection System in
Wireless Sensor Network”, International Journal of Pure and Applied Mathematics, Volume 119, No. 12, 2018, pp. 753 -762.
21. Ranjeethapriya K, Susila N, Granty Regina Elwin, Balakrishnan S, “Raspberry Pi Based Intrusion Detection System”, International
Journal of Pure and Applied Mathematics, Volume 119, No. 12, 2018, pp.1197-1205.
22. Chen, J. K., de Veciana, G. and Rappaport, T. S. (2009). Site-Specific Knowledge and Interference Measurement for Improving
Frequency Allocations in Wireless Networks. IEEE Transactions on Vehicular Technology, vol. 58, no. 5, 2366-2377.
23. Mishra, A., Banerjee, S. and Arbaugh, W. (2005). Weighted coloring based channel assignment for WLANs, ACM SIGMOBILE Mob .
Comput. Commun. Rev., vol. 9, no. 3, 19-31.

Authors: D.Saravanan

Paper Title: Issues and Considerations for Effective Text Data Retrieval
Abstract: Text data retrieval is one of the major domain for extracting knowledge from the stored data sets.
248. Within the text information, the text meaningful numerical codes extracted unstructured process information is
to make the free text associated with the unstructured nature of data mining in a different stream. Number of 1442-
procedure is constructed to Performing this operations most effectively. This paper focuses one of the text 1445
retrieval process, experimental results verified proposed methods works well with most of the documents.
Keyword : Text Mining, Clusters, Text Clusters, Grouping of words, Text extraction.
References:
1. D.Saravanan, ”Clustering of video in formations using BRICH Methodology” Pak journal of biotechnology, Vol 14(Special Issue -II-
2017), Pages 377-380, Dec- 2017
2. G. Slaton and C. Buckley, "Term-weighting approaches in automatic text retrieval", Information Processing & Management, vol. 24,
1988.pp 513-523.
3. D.Saravanan, Dr.S.Srinivasan, (2013). , Matrix Based Indexing Technique for video data, Journal of computer science, 9(5), 20 13,
534-542.
4. D.saravanan, Dr.S.Srinivasan (2012). Video image retrieval using data mining Techniques, Journal of computer applications (JCA),
Vol V,Issue 01, 2012. 39-42.
5. R. Amarasiri, D. Alahakoon, M. Premaratne, and K.Smith, "Enhancing Clustering Performance of Feature Maps Using Randomness",
presented at Workshop on Self Organizing Maps (WSOM) 2005, France, 2005.pp 463-470
6. R. Amarasiri, D. Alahakoon, M. Premaratne, and K.Smith, "HDGSOMr: A High Dimensional Growing Self Organizing Map Using
Randomness for Efficient Web and Text Mining", presented at IEEE/ACM/WIC Conference on Web Intelligence (WI) 2005, Paris,
France, 2005.pp
7. D.Saravanan, A.Ramesh Kumar, “ContentBased Image Retrieval using Color Histogram”, International journal of computer science
and information technology (IJCSIT), Volume 4(2), 2013, Pages 242-245, ISSN: 0975-9646.
8. D.Saravanan “ Effective text data extraction using Hierarchical clustering technique” Int. Journal of Engg., and Advanced
Technology(IJEAT),Feb 2019, Vol. 8, Issue 3-S, Pages 741-743(ISSN 2249 8658)June 2019
9. P. Srinivasan and A. K. Sehgal, "Mining MEDLINE for Similar Genes and Similar Drugs", Department of Computer Science, The
University of Iowa TR# 03- 02, July 2003.
10. M. A. Hearst, "Untangling Text Data Mining", presented at 37th Annual Meeting of the Association for Computational Linguistics,
University of Maryland, USA, 1999.pp
11. .R. Agrawal, T. Imielinski, and A. Swami, "Mining Association Rules between Sets of Items in Large Databases", presented at 1 993
ACM SIGMOD International Conference on Management of Data, Washington, D.C.,1993.pp 207-216.
12. D.Saravanan, ”Various Assorted Cluster Performance Examination using Vide Data Mining Technique” , Global journal of pure and
applied Mathematics , Volume 11, No.6(2015), Nov 2015,ISSN 0973-1768, Pages 4457-4467
13. D D.Saravanan, “Text Information Retrieval using Data mining clustering Technique” International journal of Applied Engineering
Research , ISSN:0973-4562, Volume10, No3(2015) ,May2015,Pages 7865-7873
14. 14.D.Saravanan,V.Somasundaram “MATRIX BASED SEQUENTIAL INDEXING TECHNIQUE FOR VIDEO DATA MINING
Journal of Theoretical and Applied Information Technology 30th September 2014. Vol. 67 No.3
15. 15. Amarasiri, D. Alahakoon, and K. Smith, "HDGSOM: A Modified Growing Self-Organizing Map for High Dimensional Data
Clustering", presented at Hybrid Intelligent Systems 2004, Japan, 2004.pp 216 – 221

Authors: Masalsky Nikolay


Influence of Self-Heating Effect on I-V Dates of Party Depleted Submicron Silicon-on-Insulator
Paper Title:
CMOS Transistors at High Ambient Temperatures
Abstract: To solve the problems of high temperature microelectronics the influence of the self heating effect
on the I-V dates partially depleted submicron silicon–on-insulator CMOS transistor in the ambient temperature
range from 525 K to 650 K is discussed. Approach consists in combination of experimental data and of
computational simulating results. For simulation of electrothermal characteristics of SOI CMOS transistor is
considered three-layered structure. Temperature distribution is calculated numerically using iterative algorithm
in conjunction with software COMSOL Multiphysics. I-V dates of SOI CMOS transistors are calculated by
means of two-dimensional models for n-and p-channel transistors of Sentaurus TCAD developed in the system
of instrument and technological modelling. TCAD models are calibrated on experimental characteristics for 525
K. It is shown that with growth of ambient temperature the self-heating mechanism contribution consistently
decreases. By results of modeling it is established that self-heating contributions at supply voltages 5.5 V to
decreases for n-transistor in 2.8 times, p-transistor in 2.2 times. The relative decline of current n-type transistor
for reduced from 11.6% to 5.5% and for p-type with 15% to 9%. However, different dynamics of current
recession for n-and p-transistors is significant for analog applications that need to be considered at high-
temperature circuit design. The proposed methodology allows to critically assess the contribution of the self-
heating mechanism on the I-V dates for a wide range of high temperatures and supply voltages. Underestimating
this fact leads to unreasonable values for the maximum temperature and limit of thermal stability for the separate
249. SOI CMOS transistor. In total this can be a prerequisite for a significant simplification of the design of not only
the chip construction but also the whole electronic Board. 1446-
1450
Keyword : high-temperature electronics, the “silicon on insulator” technology, SOI CMOS transistor, self-
heating, simulation
References:
1. D. Wolpert, and P. Ampadu, “Managing temperature effects in nanoscale adaptive system,” New York, USA: Springer-Verlag,
2012.
2. S. Makovejev, J.-P. Raskin, M.K. Md Arshad, D. Flandre, S. Olsen, F. Andrieu, and V. Kilchytska, "Impact of self-heating and
substrate effects on small-signal output conductance in UTBB SOI MOSFETs", Solid-State Electronics, vol. 71, 2012, pp. 93-99.
3. J. Watson, and G. Castro, “High temperature electronic pose design and reliability challenge”. [Online].Available:
http://www.analog.com/, access data 03.12.2018.
4. L.T. Su, J.E. Chung, D.A. Antoniadis, K.E. Goodson, and M.I. Flik, ”Measurement and modeling of self-heating in SOI
NMOSFET's,” IEEE Trans Electron Device, vol. 41, 1994, pp. 69-75.
5. 5. L. Wang, T. Fjeldly, B. Iniguez, H. Slade, and M. Shur. “Self-heating and kink effects in a-Si:H thin film transistors, IEEE Trans
Electron Device, vol. 47, 2000, pp. 387-397.
6. 6. W. Jin, W. Liu, S. Fung, P. Chan, and C. Hu, “SOI thermal impedance extraction methodology and Its significance for circuit
simulation,” IEEE Trans Electron Device, vol. 48, 2001, pp. 730-736.
7. 7. C. Fiegna, Y. Yang, E. Sangiorgi, and A.G. O'Neill, “Analysis of self-heating effects in ultra thin body SOI MOSFETs by device
simulation,” IEEE Trans. Electron Devices, vol. 55, 2008, pp. 233-244, 2008.
8. 8. J.-P. Colinge, “Silicon Insulator Technology: Materials to VLSI,” Boston-Dordrecht-London: Кluwer Acad. Publ., 1997.
9. 9. B.M. Tenbroek, M.S.L. Lee, W. Redman-White, J.T. Bunyan, and M.J. Uren, “Self-heating effects in SOI MOSFET and their
measurement by small signal conductance techniques,” IEEE Trans. Electron Devices, vol. 43, 1996, pp. 2240-2248.
10. 10. F. Kreith, and M.S. Bohn, “Principles of heat transfer,” Boston, MA: PWS, 1997.
11. 11. A. Vassighi, and M. Sachdev, ”Thermal and power management of integrated circuits,” New York, USA: Springer-Verlag, 2006.
12. 12. TCAD Sentaurus Device [Online].Available: https://www.synopsys.com/silicon/tcad/device-simulation/sentaurus-device.hlmt,
access data 11.02.2019.
13. 13. C. M. Orfanidou, and J. Giapintzakis, ”Heat channeling in extremely thin silicon-on-insulator devices: A simulation study,” IEEE
Trans. Electron Devices, vol. 60, 2013, pp. 3330-3334.
14. 14. R. Marani, and A.G. Perri, “Analytical electro thermal modeling of multi layer structure electronic devices, ”The Open Electrical &
Electronic Engineering Journal, 4, 2010, pp. 32-39.
15. 15. S. Makovejev, S.H. Olsen, V. Kilchytska, and J.-P. Raskin, “Time and frequency domain characterization of transistor self-
heating,” IEEE Trans. Electron Devices, vol. 60, 2013, pp. 1844-1851.
16. 16. Rinku Rani Das, Santanu Maity, Deboraj Muchahary, Chandan Tilak Bhunia, "Temperature dependent study of Fin-FET drain
current through optimization of controlling gate parameters and dielectric material", Superlattices and Microstructures, vol. 103, 2017,
pp. 262-271.
17. 17. COMSOL Multiphysics 4.2a [Online].Available: http://www.comsol.com, access data 11.05.2018.

Authors: D. Dakshin, V.R. Rupesh, S. Praveen Kumar

Paper Title: Water Hazard Prediction using Machine Learning


Abstract: Water is the most essential need of all life forms. This essential need can also create hazards to us
which comes in the form of water hazards (flood and drought). Catastrophic events, for example, flood is
respected to be brought about by outrageous climate conditions just as changes in worldwide and territorial
atmosphere. If precautions are not taken beforehand it becomes more and more difficult to control when it
occurs. This study aimed to forecast both flood and drought using Machine Learning (ML). So as to have a clear
and precise forecast of flood and drought hazard is fundamental to play out a specific and multivariate analysis
among the various kinds of data sets. Multi variate Analysis means that all measurable strategies will
concurrently analyses manifold variables. Among multi variate investigation, ML will give expanding levels of
exactness, accuracy, and productivity by finding designs in enormous and variegated data sets. Basically, ML
methods naturally acquires proficiency data from dataset. This is finished by the way toward learning, by which
the calculation can sum up past the models given via preparing information in info. AI is intriguing for forecasts
since it adjusts the goal methodologies to the highlights of the data set. This uniqueness can be utilized to foresee
outrageous from high factor information, as on account of the risks. This paper proposes systems and contextual
analysis on the application on ML calculations on water hazard occurrence forecast. Especially the examination
will concentrate on the utilization of Support Vector Machines and Artificial Neural Networks on a multivariate
arrangement of information identified with water level of lakes in and around Chennai and measurement of
rainfall in the lakes.

Keyword : Machine Learning, Artificial Neural Network, Support Vector Machine, Flood, Drought,
Prediction.
250.
References: 1451-
1. Mohamed I. Alhajri, Nazar T. Ali, M. Shubair,” Classification of Indoor Environments for Iot, Applications: A Machine Learnin g
Approach”, citation Information: Doi 10.1109/lawp. 2018.2869548, IEEE Antennas and Wireless Propagation Letters. 1457
2. Sulafa Hag Elsafi,” Artificial Neural Networks (Anns) For FloodForecasting At Dongola Station in The River Nile, Sudan”,
Alexandria Engineering Journal (2014) 53, 655–66.
3. Tuoyuan Cheng, Fouzi Harrou, Member,” Monitoring Influent Measurements at Water Resource Recovery Facility Using Data -driven
Soft Sensor Approach”, IEEE, Ying Sun And Torove Leiknes. Doi 10.1109/jsen.2018.2875954, IEEE Sensors Journal.
4. Anteneh Belayneh, Jan Adamowski, “Drought Forecasting Using New Machine Learning Methods”, Belayneh A., Adamowski J. 2013.
Drought Forecasting Using New Machine Learning Methods. Journal of Water and Land Development. No. 18 P. 3–12.
5. Amir Mosavi, Pinar Ozturk And Kwok-wing Chau, “Flood Prediction Using Machine Learning Models: Literature Review”, Water
2018, 10, 1536; doi:10.3390/w10111536
6. K. F. Fung, Y. F. Huang, C. H. Koo And Y. W. Soh,” Drought Forecasting: A Review of Modelling Approaches 2007–2017”.
7. D. Vito, Politecmico Di Milano, “Use of Multivariate Machine Learning Analysis Techniques for Flood Risk Prevention”,
https://doi.org/10.5194/isprs-archives-XLII-3-W4-549-2018.
8. Fi-john Chang , Kuolin Hsu And Li-chiu Chang ,” Flood Forecasting Using Machine Learning Methods”, Water 2019
,11,9;doi10.3390 / W11010009 , www.mdpi.com/journal/water.
9. A. L. E. Abreu And A. Chaves Neto, “Machine Learning Model for Predicting Evaporation Losses in Reservo irs”, IEEE Latin
America Transactions, Vol. 16, No. 7, July 2018.
10. Dongjun Suh And Hyunyoung Kim, Jinsul Kim,” Estimation of Water Demand in Residential Building Using Machine Learning
Approach”, 978-1-4673-6537-6/15/$31.00 ©2015 IEEE.
11. Ali Saremi, Kiarash Saremi , Amin Saremi And Mohsen Sadeghi ,” Spatial Artificial Neural Network (SANN) Based Regional
Drought Analysis”,978-0-7695-4821-0/12 $26.00 © 2012 IEEE DOI 10.1109/CICSyN.2012.11 .
12. Naman Satiya, Vinit Varu, Aakanksha Gadagkar And Darshan Shaha, “Optimization of Water Consumption Using Dynamic Quota
Based Smart Water Management System”, 978-1-5090-6255-3/17/$31.00 ©2017 IEEE.
13. Li-li Sheng, Wu-qun Cheng, Hui Xia, Xian-bing Wu And Xi-ping Zhang,” Prediction of Annual Precipitation Based on Fuzzy and
Grey Markov Process”, 978-1-4244-6527-9/10/$26.00 ©2010 IEEE.
14. Xili Wang, Lei Ma and Xilin Wang,” Apply Semi-supervised Support Vector Regression for Remote Sensing Water Quality Retrieving”,
978-1-4244-9566-5/10/$26.00 ©2010 IEEE.
15. Lingling Zhang And Yanfu Wei,” Prediction on Ecological Water Demand Based on Support Vector Machine”, 978-0-7695-3336-0/08
$25.00 © 2008 IEEE DOI 10.1109/CSSE.2008.44

Authors: Adigun J. O., Okikiola F. M., Aigbokhan, E. E., Rufai M. M.

251. Paper Title: Automated System for Grading Apples using Convolutional Neural Network
Abstract: Fruit grading is a process that affect quality control and fruit-processing industries to meet the 1458-
efficiency of its production and society. However, these industries have suffered from lack of standards in 1464
quality control, higher time of grading and low product output because of the use of manual methods. To meet
the increasing demand of quality fruit products, fruit-processing industries must consider automating their fruit
grading process. Several algorithms have been proposed over the years to achieve this purpose and their works
were based on color, shape and inability to handle large dataset which resulted in slow recognition accuracy. To
mitigate these flaws, we develop an automated system for grading and classification of apple using
Convolutional Neural Network (CNN) used in image recognition and classification. Two models were
developed from CNN using ResNet50 as its convolutional base, a process called transfer learning. The first
model, the apple checker model (ACM) performs the recognition of the image with two output connections
(apple and non-apple) while the apple grader model (AGM) does the classification of the image that has four
output classes (spoiled, grade A, grade B & grade C) if the image is an apple. A comparison evaluation of both
models were conducted and experimental results show that the ACM achieved a test accuracy of 100% while the
AGM obtained recognition rate of 99.89%.The developed system may be employed in food processing
industries and related life applications.

Keyword : Convolutional Neural Network, ResNet50, Artificial Neural Network, Machine learning,
Computer vision.
References:
1. Agriinfo (2015). Grading of fruits and vegetables. Retrieved September 30, 2018. From
http://agriinfo.in/default.aspx?page=topic&superid.
2. Arjenaki O., Moghaddam P. & Motlagh A.(2013).
3. Online tomato sorting based on shape, maturity, size, and surface defects using machine vision, Turkish Journal of Agriculture and
Forestry, 37, pp. 62-68. http://doi.org/10.3906/tar-1201-10
4. Bensaeed et al (2017). Oil palm fruit grading using a hyperspectral device and machine learning algorithm, IOP Conf. Ser.: Earth
Environ. Sci. 20 012017, pg 1-29. https://doi.org/10.1088/1755-1315
5. Dr. Usha, Dr Karthik & Jenifer (2017). Automated Sorting And Grading of Vegetables Using Image Processing, International Journal
of Engineering Research and General Science Volume 5, Issue 6, pg 53-61. ISSN 2091-2730
6. Giacomo Capizzi et al. (2015). "Automatic Classification of Fruit Defects based on Co-OccurrenceMatrix and Neural Networks",
Proceedings of the Federated Conference on Computer Science and Information Systems, 5, pp. 861– 867. http://doi.org/10.15439/
7. Harpreet Kaur, Baljit Singh (2013). Classification and Grading Rice Using Multi-Class SVM, International Journal of Scientific and
Research Publications, 3(4). ISSN 2250-3153
8. Hosein et al. (2017). Design, development and evaluation of an online grading system for peeled pistachios equipped with machine
vision technology and support vector machine, INFORMATION PROCESSING IN AGRICULTURE, 4, pg. 333–341.
http://dx.doi.org/10.1016/j.inpa.
9. Ishikawa et al. (2018). Classification of strawberry fruit shape by machine Learning, the international archives of the photogrammetry,
remote sensing and spatial information sciences, volume xlii-2, pg. 463-470.https://doi.org/10.5194/isprs-archives-XLII-2-463-2018
10. Mandeep & Reecha (2015). Quality Detection of Fruits by Using ANN Technique, IOSR Journal ofE lectronics and Communication
Engineering, 10. ISSN:2278-8735 PP 35-41
11. Muhammad, Ghulam (2015). "Date fruits classification using texture descriptors and shape-size features.", Engineering Applications of
Artificial Intelligence361-367.
12. Olaniyi et al (2017). Automatic System for Grading Banana Using GLCM Texture Feature Extraction and Neural Network
Arbitrations, Journal of Food Processing Engineering, 40.http://doi.org/10.1111/jfpe.12575
13. Pragati Ninawe, Shikha Pandey (2014). A Completion on Fruit Recognition System Using K-NearestNeighbors Algorithm,
International Journal of Advanced Research in Computer Engineering &Technology (IJARCET), 3(7). ISSN: 2278 – 1323
14. Rosli B. Razak1, Mahmod B. Othman, Mohd Nazaribin Abu Bakar (2012). Mango Grading By UsingFuzzy Image Analysis,
International Conference on Agricultural, Environment and Biological Sciences (ICAEBS'2012), pp 18-22.
15. Sajad S., Yousef A., Gines G. (2017). A new approach for visual identification of orange varieties using neural networks and
metaheuristic algorithms, Information Processing in Agriculture 5 (2018) 162–172. https://doi.org/10.1016/j.inpa.2017.09.002
16. Suresha M., Shilpa N.A, Soumya B. (2012). Apples Grading Based On SVM Classifier, International Journal of Computer Applications
(0975–8878) On National Conference on Advanced Computing and Communications - NCACC, April 2012

Authors: Renu Chaudhary, Swarg Deep Sharma, Nigam Kumar, Sudhanshu Aggarwal

Paper Title: Connections between Aboodh Transform and Some Effective Integral Transforms
Abstract: Integral transforms are the most useful techniques of the mathematics which are used to finding
the solution of heat transfer problems, mixing problems, electrical networks, bending of beams, signal
processing problems, which generally appears in the various disciplines of engineering and sciences. In this
research paper, connections between Aboodh transform and some effective integral transforms (Laplace
transform, Kamal transform, Elzaki transform, Sumudu transform, Mahgoub transform, Mohand transform and
Sawi transform) are discussed and integral transforms of some typical functions are given in table form in
application section to signify the fruitfulness of connections between Aboodh transform and some effective
mention integral transforms.
252.
Keyword : Laplace transform; Kamal transform; Elzaki transform; Sumudu transform; Mahgoub transform; 1465-
Mohand transform; Sawi transform; Aboodh transform. 1470

AMS Subject Classification 2010: 44A15, 44A10, 44A05.


References:
1. Aggarwal, S. and Chaudhary, R., A comparative study of Mohand and Laplace transforms, Journal of Emerging Technologies and
Innovative Research, Vol. 6, No. 2, Feb. 2019, pp. 230-240.
2. Aggarwal, S. and Singh, G.P., Kamal transform of error function, Journal of Applied Science and Computations, Vol. 6, No. 5, May
2019, pp. 2223-2235.
3. Aggarwal, S., Gupta, A.R. and Kumar, A., Elzaki transform of error function, Global Journal of Engineering Science and Resear ches,
Vol. 6, No. 5, May 2019, pp. 412-422.
4. Aggarwal, S. and Sharma, S.D., Sumudu transform of error function, Journal of Applied Science and Computations, Vol. 6, No. 6, June
2019, pp. 1222-1231.
5. Aggarwal, S., Gupta, A.R., Sharma, S.D., Chauhan, R. and Sharma, N., Mahgoub transform (Laplace-Carson transform) of error
function, International Journal of Latest Technology in Engineering, Management & Applied Science, Vol. 8, No. 4, April 2019, pp.
92-98.
6. Aggarwal, S., Gupta, A.R. and Kumar, D., Mohand transform of error function, International Journal of Research in Advent
Technology, Vol. 7, No. 5, May 2019, pp. 224-231.
7. Mahgoub, Mohand M. Abdelrahim, The new integral transform ''Sawi Transform'', Advances in Theoretical and Applied Mathematics,
Vol. 14, No. 1, 2019, pp. 81-87.
8. Aggarwal, S. and Singh, G.P., Aboodh transform of error function, Universal Review, Vol.10, No. 6, June 2019, pp. 137-150.
9. Singh, G.P. and Aggarwal, S., Sawi transform for population growth and decay problems, International Journal of Latest Techno logy in
Engineering, Management & Applied Science, Vol. 8, No. 8, August 2019, pp. 157-162.
10. Aggarwal, S. and Gupta, A.R., Dualities between Mohand transform and some useful integral transforms, International Journal of
Recent Technology and Engineering, Vol.8, No. 3, September 2019, pp. 843-847.
11. Aggarwal, S. and Gupta, A.R., Dualities between some useful integral transforms and Sawi transform, International Journal of Recent
Technology and Engineering, Vol.8, No. 3, September 2019, pp. 5978-5982.
12. Chauhan, R., Kumar, N. and Aggarwal, S., Dualities between Laplace-Carson transform and some useful integral transforms,
International Journal of Innovative Technology and Exploring Engineering, Vol.8, No. 12, October 2019, pp. 1654-1659.
13. Aggarwal, S., Bhatnagar, K. and Dua, A., Dualities between Elzaki transform and some useful integral transforms, Internationa l Journal
of Innovative Technology and Exploring Engineering, Vol.8, No. 12, October 2019, pp. 4312-4318.
14. Aggarwal, S., Gupta, A.R., Singh, D.P., Asthana, N. and Kumar, N., Application of Laplace transform for solving population gr owth
and decay problems, International Journal of Latest Technology in Engineering, Management & Applied Science, Vol. 7, No. 9,
September 2018, pp. 141-145.

Authors: Addanki Purna Ramesh, Manukonda Dheeraj

Paper Title: Dual Image Signature Method using DWT and SVD in YCbCr Colour Space
Abstract: The digital data can be easily modified and copied, so it is not secure, so owner authentication is
required to prevent this unauthorised access of digital data. Image signature (water mark) is required to embed
with digital data. The Discrete Wavelet Transform (DWT) supports image signature algorithms possess dual
resolution attaining imperceptibility. The Singular Value Decomposition (SVD) supports to achieving the
robustness in order to add the signature information to the singular values of the diagonal matrix.. In this work
implementing dual image signature method using DWT and SVD in YCbCr colour space. The cover image is
embedded with dual images to achieve better security from unauthorized persons. The proposed method
253. improves the robustness and imperceptibility of the cover image.
1471-
Keyword : . DWT, SVD, Imperceptibility, Robustness 1476
References:
1. B.Chandra Mohan, et al., “A robust digital image watermarking scheme using SVD, quantization and edge detection,” ICGST GVIP
Journal, Vol. 8-1, 2008.
2. Satyanarayana Murty.P, et al., “Towards Robust Reference Image Watermarking Using DWT SVD and Edge Detection” Int. Journal
of Computer Applications, Volume 68– No.9, April 2013.
3. G. Bhatnagar, “A new robust reference watermarking scheme based on DWT SVD,” Computer Standards & Interfaces, vol.31, no. 5,
pp. 1002-1013, 2009.
4. Liu Liang, “A new SVD DWT composite watermarking,” ICSP proceedings of IEEE Int. conference on signal processing, 2006.
5. Yahya AL-Nabhani, et.al, “Robust watermarking algorithm for digital images using discrete wavelet and probabilistic neural network”
Journal of King Saud University – Computer and Information Sciences, vol. 27, pp.393–401, 2015.

Authors: Ekta Dixit, Vandana Jindal

Paper Title: Recent Techniques And Protocols For Data Transmission In Wireless Sensor Network
Abstract: Currently, the wireless sensor networks are hugely demanded in every field instead of due to its
vast applications specifically for the security purposes and for monitoring. Basically, the wireless sensor
networks are the infrastructure less networks which consist of mobile nodes that have memory for storage and to
process the data. There can be small networks or large networks. These days, due to the advancement of
technology, several kinds of new challenges even though the technology change life, offering a lot of facilities.
The most common problem in the atmosphere is the pollution and air pollution is hazardous for health. The
wireless sensor networks (WSNs) are utilized for controlling and managing the air pollution. In WSN, the
routing protocols are playing out a major role for the best communication of nodes to enhance the security in the
network. In the present research work, the classification of different routing protocols is discussed in detail. The
254. major routing protocols are SPIN, DD, RR, LEACH, PEGASIS, TEEN, APTEEN, HEED, GAF and so on. All
these routing protocol come under different categories as namely as flat, hierarchical, location based and the
1477-
hybrid. Additionally, a comparison is made to clarify different routing protocols with its relevant merits,
1484
demerits and classification. In this way, the current research is being more fascinating to work in the monitoring
applications such as for the air pollution monitoring systems.

Keyword : . LEACH, PEGASIS, HEED, TEEN and WSN.


References:
1. Zhang, S., Zhang, H. ,”A review of wireless sensor networks and its applications”, In Automation and Logistics (ICAL), 2012 IEEE
International Conference on (pp. 386-389),2012, IEEE.
2. Indu, S. D. ,”Wireless sensor networks: Issues & challenges”, International Journal of Computer Science and Mobile Computing
(IJCSMC), 3, 681-85, 2014.
3. Yick, J., Pasternack, G., Mukherjee, B., and Ghosal, D.” Placement of network services in a sensor network”, International Journal of
Wireless and Mobile Computing, 1(2), 101-112,2006.
4. Zheng. J and Jamlipour, A. “Introduction to wireless sensor networks”,. Institute of electrical and electronics engineers, 2009.
5. Al-Karaki, J. N., and Kamal, A. E. “Routing techniques in wireless sensor networks: a survey”, IEEE wireless communications, 11(6),
6-28, 2004.
6. Bhawna, Pathak, T., and Ranga, V., “A Comprehensive Survey of Clustering Approaches in Wireless Sensor Networks”, Second
International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA), 2014.
7. Gnanasekaran, T., and Francis, S. A. J., “Comparative analysis on routing protocols in Wireless Sensor Networks”, In Computer
Communication and Informatics (ICCCI), 2014 International Conference on (pp. 1-6). IEEE, 2014.
8. Singh, S. P and Sharma, S.C., “A survey on Cluster Based Routing Protocols in Wireless Sensor Networks”, International Conference
on Advanced Computing Technologies and Applications (ICACTA), 687-695,2015.
9. Chaudhary, R., and Vatta, D. S. “A Tutorial of routing protocols in wireless sensor networks”, International Journal of Computer
Science and Mobile Computing, 3(6), 2014.
10. Akkaya, K., and Younis, M. ,”A survey on routing protocols for wireless sensor networks”, Ad hoc networks, 3(3), 325-349,200
11. Intanagonwiwat, C., Govindan, R., and Estrin, D. ,”Directed diffusion: A scalable and robust communication paradigm for sensor
networks”, In Proceedings of the 6th annual international conference on Mobile computing and networking (pp. 56-67). ACM,2000.
12. Braginsky, D., and Estrin, D. ,”Rumor routing algorthim for sensor networks”, In Proceedings of the 1st ACM international workshop
on Wireless sensor networks and applications (pp. 22-31). ACM,2002.
13. Usman, M. J., Xing, Z., Chiroma, H., Gital, A. Y. U., Abubakar, A. I., Usman, A. M., and Herawan, T. “Modified Low Energy
Adaptive Clustering Hierarchy Protocol for Efficient Energy Consumption in Wireless Sensor Networks”,. International Review on
Computers and Software (IRECOS), 9(11), 1904-1915,2014.
14. Heinzelman, W. R., Chandrakasan, A., and Balakrishnan, H. “Energy-efficient communication protocol for wireless microsensor
networks”, In System sciences, 2000. Proceedings of the 33rd annual Hawaii international conference on (pp. 10-pp). IEEE, 2000.
15. Jain, P., and Chaudhary, A. ,”The Comparison between Leach Protocol and Pegasis Protocol based on Lifetime of Wireless Sensor
Networks”, 2017.
16. Younis, O., and Fahmy, S, ”Distributed clustering in ad-hoc sensor networks: A hybrid, energy-efficient approach”,. In INFOCOM
2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies (Vol. 1). IEEE, 2004.
17. Roychowdhury, S., and Patra, C. ,”Geographic adaptive fidelity and geographic energy aware routing in ad hoc routing”,
In International Conference (Vol. 1, pp. 309-313), 2010.
18. Pavani, M., and Rao, P. T. ,”Urban Air Pollution Monitoring Using Wireless Sensor Networks: A Comprehensive
Review”, International Journal of Communication Networks and Information Security (IJCNIS), 9(3), 2017.
19. Khedo, K. K., and Chikhooreeah, V. ,”Low-Cost Energy-Efficient Air Quality Monitoring System Using Wireless Sensor Network”,
In Wireless Sensor Networks-Insights and Innovations. InTech, 2017.
20. Boubrima, A., Bechkit, W., and Rivano, H. ,”A new WSN deployment approach for air pollution monitoring”, In CCNC 2017-14th
IEEE Consumer Communications & Networking Conference, 2017.
21. Murugun, C.A., Raja, N.I.S.., Ramanaa, M.S., Prasath, S.P.S., and Sakthivel, K. ,”Air Quality Meter Using Wireless Sensor Networks”,
International journal of pure and applied mathematics, 118 (20), 527-531, 2018.
22. Simbeye, D. S.,”Industrial Air Pollution Monitoring System Based on Wireless Sensor Networks”, Journal of Information Sciences and
Computing Technologies, 6(2), 612-624,2018.
23. B. Ren, J. Ma, C. Chen, "The hybrid mobile wireless sensor networks for data gathering," in proceedings of the ACM International
Conference on wireless communications and mobile computing, IWCMC 2006, Vancouver,pp: 1085-1090, 2006.
24. Chatzigiannakis, A. Kinalis, S. Nikoletseas, J. Rolim, "Fast and energy efficient sensor data collection by multiple mobile sinks," in
proceedings of the 5th ACM international workshop on mobility management and wireless access, China, pp 25-32, 2007.
25. T. Banerjee, B. Xie, J.H. Jun, D.P. Agrawal, "Increasing lifetime of wireless sensor networks using controllable mobile cluster heads,"
A manuscript, 2008.
26. S. Basagni, A. Carosi, E. Melachrinoudis, C. Petrioli, Z.M. Wang, "Controlled sink mobility for prolonging wireless sensor ne tworks
lifetime," ACM/Springer Journal on Wireless Networks (WTNET), Vol. (14) No. (6), 831-858,2008.
27. A.P. Azad, A. Chockalingam, "Mobile base station placement and energy aware routing in wireless sensor networks ", In proceeding of
the IEEE wireless communications and networking conference," ECNC 2006, Las Vegas,NV, Vol. (I), pp 264-269, 2006.
28. Wu, X. and Chen, G, "Dual-sink: using mobile and static sinks for lifetime improvement in wireless sensor networks," Proceedings of
the 16th International Conference on Computer Communications and Networks. ICCCN'07, Honolulu, pp: 1297-1302,2007.
29. Nesrine, K., and Ben Jemaa, M. (2012, June). HEERP: Hierarchical energy efficient routing protocol for Wireless Sensor Networks. In
Communications and Information Technology (ICCIT), 2012 International Conference on (pp. 308-313). IEEE.
30. Yu, J., Qi, Y., Wang, G., and Gu, X. (2012). A cluster-based routing protocol for wireless sensor networks with nonuniform node
distribution. AEU-International Journal of Electronics and Communications, 66(1), 54-61.
31. Kumar, N., Bhutani, P., and Mishra, P. (2012, October). U-LEACH: A novel routing protocol for heterogeneous Wireless Sensor
Networks. In Communication, Information & Computing Technology (ICCICT), 2012 International Conference on (pp. 1-4). IEEE.
32. Zhang, R., Zhao, H., and Labrador, M. A. (2006, May). The anchor location service (ALS) protocol for large-scale wireless sensor
networks. In Proceedings of the first international conference on integrated internet ad hoc and sensor networks (p. 18). ACM.
33. Lajevardi, A., Haghighat, A. T., and Eghbali, A. N. (2009, December). Extending directed diffusion routing algorithm to support sink
mobility in wireless sensor networks. In Communications (MICC), 2009 IEEE 9th Malaysia International Conference on (pp. 541 -546).
IEEE.

Authors: Zamli, Muhammad Syafar, Sukri Palutturi, Suriah, Andi Arsunan Arsin, Hatta, Ridwan Amiruddin
Potential of Rainfall, Humidity and Temperature, Against the Increasing of larvae in Makassar City,
Paper Title:
Indonesia
Abstract: Cases of dengue hemorrhagic fever are associated with the potential for rainfall, temperature, and
humidity. In a month mosquitoes can lay eggs approximately four times. In a month mosquitoes can lay eggs
between 400 to 600 eggs. Mosquito eggs can survive, do not hatch, for six months because they do not touch the
water. The existence of rainfall, humidity, and the appropriate temperature can accelerate the process of hatching
mosquito eggs. Secondary data analysis research methods on BMKG data and Makassar City Health Department
255. data in 2014, 2015, 2016, 2017 and 2018. The data analysis was carried out on 1–8 October 2019. The
observation results revealed that high rainfall occurred in January, February, March, April, May and June. In
July, August, September the rainfall is very low. Then entering November and December, the rainfall starts to 1485-
high again. Air temperature does not occur significantly or not too extreme a difference every month. Humidity 1487
in the rainy season tends to be high. The incidence of dengue fever in the rainy season tends to increase. The
number of mosquito larvae also tends to increase in the rainy season. It is recommended that before entering the
rainy season, it should increase awareness of the incidence of dengue fever by reducing mosquito breeding sites
through draining, closing, stockpiling. Drain and close the bathtub, and bury cans, plastic, and objects that can
become mosquito breeding grounds.
Keyword : Humidity, Temperature, Rainfall, larvae.
References:
1. P. Widyorini, K. A. Shafrin, N. E. Wahyuningsih, R. Murwani, and Suhartono, “Dengue hemorrhagic fever (DHF) cases in
semarang city are related to air temperature, humidity, and rainfall,” Adv. Sci. Lett., 2017.
2. C. R. Angelina and R. Windraswara, “Factors Related with Dengue Hemorrhagic Fever Incidence in 2008-2017,” Unnes J. Public
Heal., 2019.
3. Tien Zubaidah, “Climate change impact on dengue haemorrhagic fever in Banjarbaru South Kalimantan between 2005-2010,” J.
BUSKI, 2012.
4. O. Rössler, P. Froidevaux, U. Börst, R. Rickli, O. Martius, and R. Weingartner, “Retrospective analysis of a nonforecasted rain-on-
snow flood in the Alps-A matter of model limitations or unpredictable nature?,” Hydrol. Earth Syst. Sci., 2014.
5. S. E. Lindberg et al., “Increases in mercury emissions from desert soils in response to rainfall and irrigation,” J. Geophys. Res. Atmos.,
1999.
6. A. Vlasenko, A. M. MacDonald, S. J. Sjostedt, and J. P. D. Abbatt, “Formaldehyde measurements by Proton transfer reaction - Mass
spectrometry (PTR-MS): Correction for humidity effects,” Atmos. Meas. Tech., 2010.
7. J. Lee et al., “Characteristics of aerosol types from AERONET sunphotometer measurements,” Atmos. Environ., 2010.
8. S. Rasul, A. M. Kajal, and A. Khan, “Quantifying Uncertainty in Analytical Measurements,” J. Bangladesh Acad. Sci., 2018.
9. A. Tawang, T. A. T. Ahmad, and Y. Abdullah, “Stabilization of upland agriculture under El Nino induced climatic risk: Impact
assessment and mitigation measures in Malaysia,” 2001.
10. Q. Yang et al., “Rainfall effects on the sap flow of Hedysarum scoparium,” Chinese J. Appl. Ecol., 2016.
11. I. Isnawati, B. W. Otok, S. Suharto, and A. Wibowo, “Structural Equation Modeling Based on Variance The Density Index of Larvae of
The Rainy Season in the City of Banjarbaru,” CAUCHY, 2018.
12. N. E. A. Murray, M. B. Quam, and A. Wilder-Smith, “Epidemiology of dengue: Past, present and future prospects,” Clinical
Epidemiology. 2013.
13. M. A. Stewart-Ibarra et al., “Spatiotemporal clustering, climate periodicity, and social-ecological risk factors for dengue during an
outbreak in Machala, Ecuador, in 2010,” BMC Infect. Dis., 2014.
14. S. P. M. Wijayanti et al., “The Importance of Socio-Economic Versus Environmental Risk Factors for Reported Dengue Cases in Java,
Indonesia,” PLoS Negl. Trop. Dis., 2016.
15. O. M. Sessions et al., “Discovery of insect and human dengue virus host factors,” Nature, 2009.
16. B. P. Yawn and D. Gilden, “The global epidemiology of herpes zoster,” Neurology, 2013.
17. A. A. Arsin, “BUKU: EPIDEMIOLOGI DEMAM BERDARAH DENGUE (DBD) DI INDONESIA.” Masagena Press, 2013.
18. F. J. Lardeux, R. H. Tejerina, V. Quispe, and T. K. Chavez, “A physiological time analysis of the duration of the gonotrophic cycle of
Anopheles pseudopunctipennis and its implications for malaria transmission in Bolivia,” Malar. J., vol. 7, no. 1, p. 141, 2008.

Authors: Shreenath, Rajendrakumar Harsoor

Paper Title: Effect of Infill Wall on Vertical Irregular Tall Structure


Abstract: In reinforced concrete (RC) frames, the masonry infill walls are used to fill the gaps between the
two columns and one horizontal beam which form the single bay. Stiffness of this bay or reinforced concrete
frame structure increases by filling the gap between the bays of a structure. The present study investigates that
the influence of the infill wall in the vertical irregular tall structure with bottom soft storey and the behavior of
(G+14) storey building subjected to seismic load. The study carries different type of models which are regular
frame, regular full infilled frame, regular infilled with 15% central opening frame and regular infilled with 15%
corner opening frame are analysed. Similarly the same study has been extended for vertical irregular bare frame,
inverted vertical irregular bare frame. This study is made for a case applicable to earthquake zone (III), soil type
(II) with importance factor (1) and M20 grade of concrete. The analysis is performed using the equivalent static
method and response spectrum method as per IS 1893-2016 using E-Tabs 2015 commercially available
software. The parameters considered for study are storey displacement, storey drift and base shear. The results
obtained for storey displacement and storey drift, in the infilled frame are reduced due to presence of infill wall.
However, as expected, the base shear is increased from bare frame to infilled frame.

Keyword : bare frame, Infill wall, storey displacement, storey Drift.


256. References:
1. C V R murty, Sudhir k jain” Beneficial influence of masonry infill walls on seismic performance of frame building” 2000 1488-
2. Luis decanini, Fabrizio mollaioli,” Seismic performance of masonry infilled reinforced concrete frames” 2004 1495
3. Saimak satter, Abbie B. liel,” Seismic performance of reinforced concrete frame structures with and without infill walls” 2010
4. Haroon Rasheed Tamboli, Umesh karadi,” Seismic analysis of RC frames structure with and without infill walls” ISSN 976-0977,
volume 3 October- 2012.
5. Nikhil agrawal,prof.P.B Kulkarni,pooja Raut, ”Analysis of masonry infilled R.C frame with and without opening including soft
storey of symmetric building” ISSN 2320-3153,Volume 8,issue 1,2013.
6. Nikhil agrawal,prof.P.B Kulkarni,pooja Raut, ”Static Analysis of masonry infilled R.C frame with and without opening including
soft storey by using Equivalent Diagonal Strut Method” ISSN 2250-3153,Volume 3,issue 9,2013.
7. Lila M.Abdel-Hafez, A.E.Y Abouelezz, “Behavior of masonry strengthened infilled reinforced concrete frames under in-plan
load” 2014
8. Ayman Abd-Elhamed, Sayed Mahmud, “Effect of Infill Walls on Response of Multi Storey Reinforced Concrete Structure”
Volume: 9, No: 5, 2015.
9. Raj Paudel1, Santosh Kumar Adhikari, “Effect of Masonry Infill’s on Seismic Performance of RC Frame Building” Volume. 4,
Issue 8, August 2015.
10. Oman Sayyed, Suresh Singh Kushwah, Aruna Rawat “Effect of Infill and Mass Irregularity on RC Building under Seismic
Loading” e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | p-ISSN: 2395-0072, Feb -2017.
11. Tanushri Mahajan, Prathamesh Musale, Shivkumar Hallale, Vaishnavi Mahajan, Snehal Barapatre, “Seismic analysis of plan and
vertical irregularity of building with and without infill action using ETABS” ISSN: 2454-132X ,Impact factor: 4.295 ,Volume 4,
Issue 3,2018.
12. Dr.satish B.Allampallewar, Shubham M.Adkar,” Impact of masonry infill walls on the seismic response of G+7 RC building”
ISSN 2394-3386,volume-5,iissue-3,2018.
Authors: Erkan Yalcinkaya, Daniel T. Semere, Antonio Maffei, Mauro Onori
Taguchi’s Experimental Design Model Inspired IT Infrastructure Security Risk Assessment
Paper Title:
Methodology
Abstract: Taguchi’s experimental design model is extensively applied by the manufacturing and production
industries to systematically simulate different system states through altering controllable and uncontrollable
variables to ensure system reliability and robustness. Managing an IT infrastructure complexity in a systematic
way to assess the risks is a major challenge. This research paper proposes a novel IT infrastructure security risk
assessment methodology inspired by the Taguchi’s experimental design model. The proposed methodology is
capable of rating and ranking impact of controllable and uncontrollable infrastructure parameters in the form of
threats against the system. The result of the assessment is fed into a mitigation process where the system is
hardened by eliminating the highest ranking risks.

Keyword : Taguchi’s experimental design model, cybersecurity, risk assessment, system hardening
257.
References: 1496-
1. G. Taguchi, “Taguchi methods in LSI fabrication process,” in Proc. IEEE Int. Workshop Stat. Methodology, pp. 1–6, 2001.
2. G. Taguchi, S-C. Tsai, “Quality engineering (Taguchi methods) for the development of electronic circuit technology,” IEEE
1501
Transactions on Reliability, Vol. 44, No. 2, pp. 225–229, 1995
3. C. Longbottom, S. J. Bigelow, “What is IT Infrastructure? Definition from WhatIs.com”, [Online]. Available:
https://searchdatacenter.techtarget.com/definition/infrastructure [Accessed: 7 - Aug - 2019], 2017
4. M. Endrei, J. Ang, A. Arsanjani, S. Chua, P. Comte, P. Krogdahl, M. Luo, T. Newling, “Patterns: Service Oriented Architecture and
Web Services”, IBM Redbooks, p 11, 2004
5. J.Z. Zhang, J.C. Chen, E.D. Kirby, "Surface roughness optimization in an end-milling operation using the Taguchi design method",
Journal of Material Processing Technology, 184(1-3), pp 233-239, 2007
6. D. T. Semere, “Robust Design Module III”, FMG3915 Disturbance and Variation Analysis in Manufacturing Systems course material,
KTH, 2017
7. J.L. Hintze, “Taguchi Designs”, [Online]. Available: https://ncss-wpengine.netdna-ssl.com/wp-content/uploads/2012/09/PASSUG1.pdf
[Accessed: 18 - Aug - 2019], NCSS, Chapter 887, pp 887-1, 2008
8. A. Sfakianakis, C. Douligeris, L. Marinos, M. Lourenço, O. Raghimi, “ENISA Threat Landscape Report 2018, 15 Top Cyberthreats
and Trends”, ENISA, 2018
9. P. Katsumata, J. Hemenway, W. Gavins, “Cybersecurity Risk Management”, IEEE, 2010

Authors: Rohit Mohan, Rai R. S., Sonali P. Banerjee

Paper Title: Service Quality and Its Role in Upselling/Cross-Selling


Abstract: At this point, we are quite sure that we have understood the value of this idea if Servqual as well
as in market research. It is expected that the contextual research shared in this article will provide you with a
practical understanding of the use of this idea in the exam. Cross selling and up selling from the bottom up are
one of the most used distinctive features in the marketing technique of any organization.SERVPERF and
SERVQUAL are two service quality assessment tools that are commonly used in the assessment of quality of
service in different service areas, for example, banking, hospital, tourism, insurance and so forth. In any case,
quality literature of the service shows that there is a significant difference in the principle of estimation of the
quality of service in these two matrices, and in addition, results using these two matrices actually do not require
coordination.Therefore, the quality of service is rich in literary models, hypotheses and criticisms, the way
dynamic research has progressed in the last two decades. The recognized issue in this research is this: Do both of
these metrics agree in their results or there is a significant difference in their results for a given telecom service
sector. The exam extracts between the results of these two metrics, and how to improve the service quality and
service performance in the telecommunications industry, while examining the possibility of suggesting tips and
suggestions based on a consolidated outcome.

258.
Keyword : Service Quality, Service Performance, Up-selling, Cross-selling, Telecom Retail
1502-
References: 1509
1. "Trai Telecom Subscription Data as on 31st July, 2018" (PDF). TRAI. Retrieved 20 September 2018.
https://main.trai.gov.in/sites/default/files/PRNo01Eng02012019.pdf
2. Govt will soon make Aadhaar-driving licence linking mandatory: Ravi Shankar Prasad, Indian Express, 7 Jan 2019.
3. "The Internet and Mobile Association of India". www.iamai.in. Retrieved 2018-05-03.
4. "Yearly Performance Indicators of Indian Telecom Sector (Second Edition) 2017" (PDF). TRAI. Retrieved 11 September 2018.
5. Parasuraman, A., Zeithaml, V.A. and Berry, L.L. (1988). SERVQUAL: A Multiple-Item Scale for Measuring Consumer Perceptions of
Service Quality. Journal of Retailing. 64 (1): 12- 40.
6. Bolton, R. N., & Drew, J. H. (1991). A multistage model of customers assessments of service quality and value. Journal of Con sumer
Research, 17: 375-384.
7. Cronin Jr J.J, Taylor S.A. Measuring service quality (1992). A re-examination and extension. Journal of Marketing; 56(July):55 68.
8. Shepherd C.D. Service quality and the sales force: A tool for competitive advantage. Journal of Personal Selling & Sales Management
1999;19(3):73 82.
9. Bitner, M.J. and Hubert, A.R. (1994), Encounter satisfaction versus overall satisfaction versus quality, in Rust, R.T. and Oliver, R.L.
(Eds), Service Quality: New Directions in Theory and Practice, Sage Publications, London, pp. 72-94.
10. Tsoukatos, E. and Rand, G.K. (2006), Path analysis of perceived service quality, satisfaction and loyalty in Greek insurance, Managing
Service Quality, Vol. 16 No. 5, pp. 501-19.
11. Bose, K. and Bansal, H.S , (2010).Regain Management :Issues and Strategies, In Sheth, J. N., Parvatiyar, A. &Shainesh. G (Eds.)
Customer Relationship Management, Emerging Concepts, Tools and Applications, Tata McGraw Hill Education Private Limited,
pp.63-70.
12. Hennig , T., Klee, A.: The impact of customer satisfaction and relationship quality on customer retention: A critical Reassessment and
Model Development, Psychology and Marketing, Vol. 14, No. 8, 1997, pp.737-764.
13. Parasuraman A., Zeithaml V. A. and Berry L. L. (1985) “A Conceptual Model Of Service Quality And Its Implications For Future
Research,” Journal Of Marketing, Vol.49, Pg No. 41-50
14. Peter, P.J., Churchill, G.A. & Brown, T.J. (1993). Caution in the use of difference scores in consumer research. Journal of C onsumer
Research, 19(3), 655-662.
15. Annual Report 2014-15, Cellular Operators Association of India. Retrieved from: http://www.coai.com/media-
room/news..../coaiin.../coai-annual-report-2014-15...
16. Annual Report 2014-15, Department of Telecommunications, New Delhi. Retrieved from:
http://www.dot.gov.in/reportsstatistics/annual-report-2014-15-0.
17. Annual Report 2011-12, Telecom Regulatory Authority of India, New Delhi. Retrieved
from:http://www.trai.gov.in/..../201301150318386780062Annual%20Report%20En.
18. Annual Report 2012-13, Telecom Regulatory Authority of India, New Delhi. Retrieved
from:http://www.trai.gov.in/.../AnnualReports/TRAI-English-Annual-Report-10032
19. Annual Report 2013-14, Telecom Regulatory Authority of India, New Delhi. Retrieved
from:http://www.trai.gov.in/.../AnnualReports/TRAI-Annual-Report-(English)=010420...
20. Miller Heiman, Special edition Best of sales performance tips: Find hidden revenue by cross selling and up selling © 2006 Miller
Heiman, Inc. All Rights Reserved | 10509 Professional Circle, Suite 100, Reno, NV 89521 | 775-827-411

Authors: Jeswin Roy Dcouth, R Jaichandran

Paper Title: An Adaptive Secret QR Code Message Passing Method Using Video Steganography
Abstract: Steganography is covert communication between the sender and the intended receiver with no
evidence to the outer world that the communication has happened. The paper proposes an multi-layer protection
approach in steganography to adaptively embed the message in the cover medium and exploit the efficiency of
the Diffie-Hellman key exchange method to be passed on to a secure channel and to be extract the secret data
without being detected. Hence the proposed system has a shade of hybrid crypto stego scehme. The study
proposes a new and adaptive steganography method that provides multiple layers of security and adaptiveness in
passing secret data which emphasizes on Imperceptibly and robustness.

Keyword : Steganography, Diffie-Hellman, QR code


References:
1. P. Lin and Y. Chen, "QR code steganography with secret payload enhancement," 2016 IEEE International Conference on Multimedia
& Expo Workshops (ICMEW), Seattle, WA, 2016, pp.
2. A. Sankara Narayanan, ―QR codes and security solutions, International Journal of Computer Science and Telecommunication,
Volume 3, Issue 7, July 2012.
3. Ashwini Warang, Dr. Archana Patankar. "QR Code Based Image Steganography." International Journal of Advance Research, Ideas
259. and Innovations in Technology 3.3 (2017).
4. Hajduk, Vladimír & Broda, Martin & Kováč, Ondrej & Levicky, Dusan. (2016). Image steganography with using QR code and 1510-
cryptography 10.1109/RADIOELEK.2016.7477370.
1514
5. Wu, W.-C & Lin, Z.-W & Wong, W.-T. (2013). Application of QR-Code Steganography Using Data Embedding Technique. Lecture
Notes in Electrical Engineering. 253. 597-605. 10.1007/978-94-007-6996-0-63.
6. Yugeshwari Kakde, Priyanka Gonnade, Prashant Dahiwale, Audio- Video steganography, in IEEE Sponsored 2nd International
Conference on Innovations in Information Embedded and Communication Systems [Online]. pp. 1-6. 2015.
7. Liao Y-C, Chen C-H, Shih TK, Tang NC (2009) Data hiding in video using adaptive LSB. In: Joint Conferences on Pervasive
Computing (JCPC) 185190
8. J. C. Chuang, Y. C. Hu and H. J. Ko, “A novel secret sharing technique using QR code,” International Journal of Image Processing,
vol. 4, pp.468-475, 2010
9. W. Luo, F. Huang, J. Huang, Edge adaptive image steganography based on LSB matching revisited, IEEE Trans Inform Forensics
Secure, 5 (2) (2010), pp. 201214.
10. Sadek, M.M., Khalifa, A.S. & Mostafa, M.G.M. Multimed Tools Appl (2015) 74: 7063. https://doi.org/10.1007/s11042-014-1952-z
11. X. P. Zhang and S. Z. Wang, “Efficient steganographic embedding by exploiting modification direction,” IEEE Communications
Letters, vol. 10, no. 11, pp. 781-783,2006
12. R. M. Bani-Hani, Y. A. Wahsheh and M. B. Al-Sarhan, "Secure QR code system," 2014 10th International Conference on Innovations
in Information Technology (IIT), Al Ain, 2014, pp. 1-6. doi: 10.1109/INNOVATIONS.2014.6985772
13. Nan Li, "Research on Diffie-Hellman key exchange protocol," 2010 2nd International Conference on Computer Engineering and
Technology, Chengdu, 2010, pp. V4-634-V4-637. doi: 10.1109/ICCET.2010.5485276
14. S. Goyal, S. Yadav and M. Mathuria, "Exploring concept of QR code and its benefits in digital education system," 2016 International
Conference on Advances in Computing, Communications and Informatics (ICACCI), Jaipur, 2016, pp. 1141-1147. doi:
10.1109/ICACCI.2016.7732198

Authors: Devendra Kumar, Dhirendra Mathur

Paper Title: Dual Band Wearable Antenna for IOT Applications


Abstract: A dual band wearable antenna operating on 2.6 GHz (2570-2620 MHz FDD/TDD) and 5.2 GHz
(802.11a) bands for Body Area Network (BAN) application is presented. The stack substrates of Felt and
ethylene-vinyl acetate (EVA) foam are used to make the structure flexible. Maximum gain of 2.75 and front to
260. back ratio of 8.35 is achieved on industrial scientific and medical (ISM) band. Additional bandwidth
enhancement has been achieved by creating slots on partial ground plane. The calculated specific absorption rate
(SAR) value is 1.33 W/kg for 1 g of body tissue. Simulated and measured results are presented for the proposed 1515-
1518
structure.

Keyword : BAN, EVA, Gain, ISM, Multiband, SAR, Wearable


References:
1. . L.Volakis, L.Zhang,Z .Wang,and ayram ,“Embroidered flexible RF electronics,” presented at the IEEE Int.Workshop on Anten na
Tech., Tucson AZ, USA, 2012.
2. L. Zhang, Z. Wang, and J. L. Volakis, “Textiles antennas and sensors for body-worn applications,” IEEE Antennas Wireless
Propagation. Lett., vol. 11, pp. 1690–1693, 2012
3. N. H .Mohd Rais, P.J.Soh, M.F.A.Malek, and G.A.E.Vandenbosch, “Dual-band suspended- plate wearable textile antenna,” IEEE
Antennas Wireless Propag. Lett., vol. 12, pp. 583–586, 2013.
4. G. Monti, L. Corchia, and L. Tarricone, “UHF wearable rectenna on textile materials,” IEEE Trans. Antennas Propag., vol. 61, no. 7,
pp. 3869–3873, Jul. 2013.
5. A .Dierck, H.Rogier, and F.Declercq , “A wearable active antenna for global positioning system and satellite phone,” IEEE Tr ans.
Antennas Propag., vol. 61, no. 2, pp. 532–538, Feb. 2013.
6. Zheyu Wang, Student Member , IEEE, Lanlin Z. Lee, Member, IEEE, Dimitris Psychoudakis, Senior Member, IEEE, and John L.
Volakis, Fellow, IEEE, Embroidered Multiband Body-Worn Antenna for GSM/PCS/WLAN Communications”. IEEE
TRANSACTIONS ON ANTENNAS AND PROPAGATION, VOL.62, NO.6, JUNE 2014.
7. Albert Sabban, " Low visibility Antennas for communication Systems", TAYLOR & FRANCIS, 2015, USA.
8. Albert Sabban, "Wideband RF Technologies and Antenna in Microwave Frequencies” Wiley Sons, 2016, USA.
9. A. Sabban, “New wideband printed antennas for medical applications, " I.E.E.E Journal, Trans. on Antennas and Propagation, Vol. 61,
No. 1, pp. 84-91, January 2013.
10. Albert Sabban, ” Small Wearable Antennas for Wireless Communication and Medical Systems”, 978-1-5386-0710-7/18/$31.00 ©
2018 IEEE.
11. M. N. Shakib, M. Moghavvemi, and W. N. L. Mahadi, “Design of a Triband Off-body Antenna for WBAN Communication , ” IEEE
Antennas and Wireless Progagation Letters, vol. 16 , pp. 210-213, 2017.
12. A. Sharma, E. Kampianakis, and M. S. Reynolds, “A Dual-Band HF and UHF Antenna System for Implanted Neural Recording and
Stimulation Devices, '' IEEE Antennas and Wireless Progagation Letters, vol. 16, pp. 493-496, 2017.
13. Z. Duan, L.-J. Xu, and W. Geyi, “Metal frame repeater antenna with partial slotted ground for bandwidth enhancement of wristband
devices, ”IET Microwave, Antennas & Propagation, vol. 11, no. 10, pp. 1438-1444, 2017.
14. L.J. Xu, Y.-X. Guo, and W. Wu, “ Miniaturized Circularly Polarized loop Antenna for Biomedical Applications,'' IEEE Transaction
on Antennas and Propagation, vol. 63, no. 3, pp. 922 - 930, March 2015.
15. C. Liu, Y.-X. Guo, X. Liu, and S. Xiao, “An Integrated On-chip Implantable Antenna in 0.18 μm CMOS Technology for Biomedical
Applications, '' IEEE Transaction on Antennas and Propagation, vol. 63, no. 3, pp. 1167-1172, March 2016.
16. [S. Xiao, C. Liu, Y. Li, X. M. Yang, and X. Liu, “Small-Size Dual- Antenna Implantable System for Biotelemetry Devices, '' IEEE
Antennas and Wireless Progagation Letters, vol. 15, pp 1723 - 1726, 2016.

Authors: Sangeeta Sahu, Byamakesh Nayak

Paper Title: Harmonics and THD in Five Phase Inverters


Abstract: Now-a-days most of the appliances and machine works on AC power. If AC power is unavailable
for a short period of time, then during that period we need to supply AC power by converting the stored DC
power. This can be possible using an Inverter. Inverters can be of multi-phase i.e. 3phase, 5phase, 6phase and so
on. Since inverters have wide application in industries and HVDC transmission lines, the improvement in the
output voltage and the reduction in harmonics are of utmost importance. In this paper a detailed analysis of
harmonics and THD in a five phase inverter with different conduction angle along with the derived mathematical
equations has been presented. A comparative study between three phase and five phase inverters at different
conduction angle has been presented.

Keyword : Harmonics, Five Phase Inverter, Phase Voltage, THD


References:
261. 1. Abhishek M. Patel, “THD Comparison for 180, 120 & 150 Degree Conduction Mode of Three Phase Inverter,” in International
Journal for Scientific Research & Development, vol. 6, pp. 145 – 149, 2018
2. Jaimin Trivedi, Manori Shah, Jui Shah and Ruchit Soni, “Three Phase 150 Degree Mode of Conduction Voltage Source Inverter using 1519-
Arduino,” International Journal of Engineering Research & Technology, vol. 5, pp. 272-275, 2016. 1523
3. Hamid A. Toliyat, “Analysis and Simulation of Multi-Phase Variable Speed Induction Motor Drives Under Asymmetrical
Connections,” in Proc. IEEE Applied Power Electronics Conf (APEC), 1996, vol. 2, pp. 586 – 592.
4. Bheemaiah Ch, Utkal Ranjan Muduli and Ranjan Kumar Behera, “Performance Comparison of Five-Phase Three-Level NPC to Five-
Phase Two-Level Voltage Source Inverter,” IEEE International Conference on Power Electronics, Drives and Energy Systems, 2019.
5. M.A Inayathullaah and Dr. R. Anita, “Simulation of Five Phase Voltage Source Inverter with Different Excitation for Star Conn ected
Load,” International Journal of Engineering and Technology, vol. 6, no. 3, 2014, pp. 1573 – 1580.
6. K. P. Prasad Rao, B. Krishna Veni and D. Ravithej, “Five-Leg Inverter for Five-Phase Supply,” International Journal of Engineering
Trends and Technology, vol. 3, pp. 144 - 152, 2012.
7. Qijun Deng, Ziyi Wang, Cheng Chen, Dariusz Czarkowski, Marian K. Kazimierczuk, Hong Zhou , and Wenshan Hu, “Modeling and
Control of Inductive Power Transfer System Supplied by Multiphase Phase-Controlled Inverter,” IEEE Trans. on Power Electronics,
vol. 34, no. 9, pp. 9303 – 9315, 2019.
8. Chen Yong and Huang Qiu-Liang, “Four-Dimensional Space Vector PWM Strategy for Five-Phase Voltage Source Inverter,” in IEEE
Access, vol. 7, pp. 59013 – 59021, 2019.
9. Keng-Yuan Chen, “Space-vector pulse-width modulation for multiphase voltage source inverters considering reference order,” IET
Power Electronics, vol. 9, pp. 81 – 94, 2016.
10. Zicheng Liu, Zedong Zheng, Lie Xu, Kui Wang and Yongdong Li, “Current Balance Control for Symmetrical Multiphase Inverters ,”
IEEE Trans. on Power Electronics, vol. 31, no. 6, pp. 4005 – 4012, 2016

Authors: Suman Sourav Prasad, Jyoti Prakash Mishra, Sambit Kumar Mishra

Paper Title: Performance Evaluation and Implementation of Tasks in Virtual Machines


Abstract: In the present situation, it may be essential to build a simple data sharing environment to monitor
262. and protect the unauthorized modification of data. In such case, mechanisms may be required to develop to
focus on significant weakened networking with proper solutions. In some situations, block chain data 1524-
management may be used considering the cloud environment. It is well understood that in virtual environment, 1527
allocating resources may have significant role towards evaluating the performance including utilization of
resources linked to the data center. Accuracy towards allocation of virtual machines in cloud data centers may be
more essential considering the optimization problems in cloud computing. In such cases, it may also be desirable
to prioritize on virtual machines linked to cloud data centers. Consolidating the dynamic virtual machines may
also permit the virtual server providers to optimize utilization of resources and to focus on energy consumption.
In fact, tremendous rise in acquiring computational power driven by modern service applications may be linked
towards establishment of large-scale virtualized data centers. Accordingly, the joint collaboration of smart
connected devices with data analytics may also enable enormous applications towards different predictive
maintenance systems. To obtain the near optimal as well as feasible results in this case, it may be desirable to
simulate implementing the algorithms and focusing on application codes. Also, different approaches may also be
needed to minimize development time and cost. In many cases, the experimental result proves that the
simulation techniques may minimize the cache miss and improve the execution time. In this paper, it has been
intended towards distribution of tasks along with implementation mechanisms linked to virtual machines.

Keyword : Data Center, Virtual machine, Blockchain, Data analytics, Metaheuristic


References:
1. Wajid U, Cappiello, C., Plebani, P., Pernici, B., Mehandjiev, N., Vitali, M., Gienger, M., Kavoussanakis, K., Margery, D., Garcia-
Perez, D., Sampaio, P. On achieving energy efficiency and reducing CO2 footprint in cloud computing. 2016., IEEE Trans. Cloud
Comput. 4 (2), 138–151.
2. Calheiros R.N., Ranjan, R., Beloglazov, A., Rose, C.A.F.D., Buyya, R., Cloudsim: a toolkit for modeling and simulation of cloud
computing environments and evaluation of resource provisioning algorithms. 2011., Softw. Pract. Exper., 41 (4), 23–50.
3. Paya A., Marinescu, D.C., Energy-aware load balancing and application scaling for the cloud ecosystem. 2017, IEEE Trans. Cloud
Comput. 5 (1), 15–27.
4. Corradi A., Fanelli, M., Foschini, L., VM Consolidation: a real case based on openstack cloud. 2014, Future Gener. Comput. Syst. 32,
118–127.
5. Xu X., Dou, W., Zhang, X., Chen, J., Enreal: an energy-aware resource allocation method for scientific workflow executions in cloud
environment. 2016, IEEE Trans. Cloud Comput. 4 (2), 166–179.
6. Dai X., Wang, J.M., Bensaou, B., Energy-efficient virtual machines scheduling in multi-tenant data centers. 2016, IEEE Trans. Cloud
Comput. 4 (2), 210–221.
7. Li K., Tang, X., Li, K., Energy-efficient stochastic task scheduling on heterogenous computing systems. 2014, IEEE Trans. Parallel
Distrib. Syst. 25 (11), 2867–2876.
8. Yu L.; Chen, L.; Cai, Z.; Shen, H.; Liang, Y.; Pan, Y. Stochastic load balancing for virtual resource management in datacenters. IEEE
Trans. Cloud Comput. 2016. [CrossRef]
9. Zhang P.; Zhou, M. Dynamic cloud task scheduling based on a two-stage strategy. IEEE Trans. Automation Science Eng. 2018, 15,
772–783. [CrossRef]
10. Kumar A.S.; Venkatesan, M. Task scheduling in a cloud computing environment using HGPSO algorithm. Cluster Comput. 2018, 1 –7.
[CrossRef]
11. Arabi E. keshk, Ashraf B. El-Sisi and Medhat A. Tawfeek , Cloud Task Scheduling for Load Balancing based on Intelligent Strategy‟,
International Journal of Intelligent System and Applications,2014.
12. Shagufta Khan and Niresh Sharma Effective Scheduling Algorithm for Load balancing (SALB) using Ant Colony Optimization in
Cloud Computing”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 4, 2014.
13. Vidhya M. and Sadhasivam N. Parallel Particle Swarm Optimization for Task Scheduling in Cloud Computing‟, International Journ al
of Innovative Research in Science, Engineering and Technology, Vol. 4, 2015.
14. Jemina Priyadarsini R. and Arockiam L. An Improved Particle Swarm Optimization Algorithm for Meta Task Scheduling In Cloud
Environment‟, International Journal of Computer Science Trends and Technology,Vol.3, 2015.
15. R. N. Calheiros, R. Ranjan, A. Beloglazov, C. A. F. Rose and R. Buyya, "CloudSim: A toolkit for modelling and Simluation of c loud
Computing Environment and Evaluation of resource provisioning algorithms," pp. 23-50, 2010.
16. E Feller, L. Rilling and C. Morin, "Energy Aware Ant Colony Based Workload Placement in Clouds," in The 12th IEEE/ACM
International Conference on Grid Computing, Lyon, France, 2011.
17. Y. Gao, H. Guan, Z. Qi and Y. Hou, "A multiobjective ant colony system algorithm for virtual machine placement in cloud
computing," Journel of Computer and System Sciences, ELSEVIER, pp. 1230-1242, 2013.
18. M Tang and S. Pan, "A Hybrid genetic Algorithm for the Energy-Efficien Virtual Machine Placement in Data Centers," Springer, pp.
211-221, 2014.
19. X F Liu, Z.-H. Zhan, K.-J. Du and W.-N. Chen, "Energy Aware Virtual Machine Placement Scheduling in Cloud Computing Based on
Ant Colony Optimization Approach," in Annual Conference on Genetic and Evolutionay Computation, New York, USA, 2014.

Authors: R. Delhi Babu, V. Yuvaraj, S. Hemanth Kumar


Magnetohydrodynamic Viscous Fluid Flow Between Parallel Plates with Base Injection and Top
Paper Title:
Suction With an Angular Velocity
Abstract: In this article manages the issue of stable electrically lead laminar progression of a gooey
incompressible liquid stream associating two parallel permeable plates of a divert in the event of a transverse
attractive field through base infusion and top suction. Dependable vertical stream is made and controlled by a
weight slope. Vertical speed is enduring everywhere in the field stream. It implies v=vw=constant. Answer for
little and huge Reynolds number is talk about and the diagram of speed profile for stream including parallel
permeable plate with base infusion and top suction through a rakish speed Ω has been considered.
263.
Keyword : Magnetohydrodynamic flow, fluid flow, parallel plates, angular velocity. 1528-
1530
References:
1. S. Berman, “Laminar flow in channels with porous walls”, Journal of Applied Physics, Vol.24(9), 1953, pp. 1232-1235.
2. J.R. Sellars, “Laminar flow in channels with porous walls at high suction Reynolds numbers”, Journal of Applied Physics, vol. 26(4),
1955, pp. 489-490.
3. S.W. Yuan, “Further investigation of laminar flow in channels with porous walls”, Journal of Applied Physics, vol. 27(3), 1956, pp.
267-269.
4. V,M. Soundalgekar, N.V. Vighnesam & H.S. Takhar, “Effects of suction and injection on MHD heat transfer in stagnation point flow
with variable body temperature”, Plasma and space research, vol. 11(4), 20, pp. 309-348.
5. H.A. Attia, “The effect of suction and injection on the unsteady flow between two parallel plates with variable properties”, Tamkang
Journal of Science and Engineering, vol. 8(1), 2005, pp. 17-22.
6. H.A. Attia, “Unsteady flow of a dusty conducting fluid between parallel porous plates with temperature dependent viscosity”, Turkish
Journal of Physics, vol. 29(4), 2005, pp. 257-267.
7. S. Ganesh & S. Krishnambal, “Magnetohydrodynamic flow of viscous fluid between two parallel porous plates”, Journal of Applied
Sciences, vol. 6(11), 2006, pp. 2420-2425.
8. S. Ganesh & S. Krishnambal, “Unsteady Magnetohydrodynamic stokes flow of viscous fluid between two parallel porous
plates”, Journal of Applied Sciences, vol. 7, 2007, pp. 374-379.
9. S. Krishnambal & S. Ganesh, “Unsteady stokes flow of viscous fluid between two parallel porous plates”, Mathematical Modeling,
2008, pp. 225.
10. H. Y. Hafeez & C. E. Ndikilar, “Flow of Viscous fluid between two parallel porous plates with bottom injection and top
suction”, Progress in Physics, vol. 10(1), 2014, pp. 49.
11. S. Ganesh, R. Delhi Babu, V. W. J. Anand & P. Chandrasekar, “Magnetohydrodynamic flow of viscous fluid between two parallel
porous plates with bottom injection and top suction”, International Journal of Ambient Energy, 2018, pp. 1-4.
12. R. Delhi Babu, & S. Ganesh, “The mathematical model for steady magnetohydrodynamic flow between parallel porous plates with a n
angular velocity”, International Journal of Ambient Energy, 2018, pp. 1-9.
13. R. Delhi Babu & S. Ganesh, “The Effects of Steady Magneto Hydrodynamic Flow between two parallel porous plates with an angula r
Velocity”, Journal of Advanced Research in Dynamical Control Systems, Institute of Advanced Scientific Research, vol. 10 03, ,2018,
pp. 1362-1367.
14. J. Charles Prem Anand, V. Yuvaraj and R. Delhi Babu, “Magnetohydrodynamic effects on steady blood flow in a stenosis under
angular velocity”, AIP Conference Proceedings, Vol. 2112, Issue 1, 2019, pp. 020093 https://doi.org/10.1063/1.5112278

Authors: Angeline R, Riddhi Dutta, Rajesh Kumar Yadav, Mohit Sharma

Paper Title: Password Authentication System using Coordinates & Location


Abstract: Password authentication system is a very important factor for every system which needs to be
secure. Every password is easy to crack and people are looking for a strong password to their systems. Here we
use a password authentication system that is designed for high security and could be easily put into old system.
In our frame work we are using cryptographic representation for converting location point into coordinates. Our
primary aim is to prevent hacking through all kinds of brute force algorithms. It is concerned with including
client’s geographical location as an important authentication factor to enhance security. Techniques to integrate
location as an authentication factor as well as techniques to generate location based cryptographic keys are
reviewed and discussed .Most importantly our system combine graphical user authentication and location
coordinates .Existing system was vulnerable to dictionary attack algorithm and salt data algorithm ,so efforts are
been taken to generate non repeatable graphical user interface system using coordinates .

Keyword : Authentication, Coordinates, Graphical, Location, Security, User Interface.


264.
References: 1531-
1. M. A. S. Gokhale and V. S. Waghmare, “The shoulder surfing resistant graphical password authentication technique,” Procedia 1535
Comput. Sci., vol. 79, pp. 490–498, Jan. 2016.
2. J. Ma, W. Yang, M. Luo, and N. Li, “A study of probabilistic pass- word models,” in Proc. IEEE Symp. Secur. Privacy (SP), May
2014, pp. 689–704.
3. A. Adams and A. M. Sasse, “Users are not the enemy,” Commun. ACM, vol. 42, pp. 40–46, Apr. 1999.
4. E. H. Spafford, “OPUS: Preventing weak password choices,” Comput. Secur., vol. 11, no. 3, pp. 273–278, 1992.
5. Y. Li, H. Wang, and K. Sun, “Personal information in passwords and its security implications,” IEEE Trans. Inf. Forensics Security,
vol. 12, no. 10, pp. 2320–2333, Oct. 2017.
6. D. Florencio and C. Herley, “A large-scale study of Web pass- word habits,” in Proc. 16th Int. Conf. World Wide Web,
2007, pp. 657–666.
7. R. Shay et al., “Designing password policies for strength and usability,”
8. ACM Trans. Inf. Syst. Secur., vol. 18, no. 4, pp. 13-1–13-34, 2016.
9. D. Wang, D. He, H. Cheng, and P. Wang, “fuzzyPSM: A new password strength meter using fuzzy probabilistic context-free
grammars,” in Proc. 46th Annu. IEEE/IFIP Int. Conf. Dependable Syst. Netw., Jun. 2016, pp. 595–606.
10. H.-M. Sun, Y.-H. Chen, and Y.-H. Lin, “oPass: A user authentication protocol resistant to password stealing and password reuse
attacks,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 651–663, Apr. 2012.
11. M. Zviran and W. J. Haga, “Password security: An empirical study,”
12. J. Manage. Inf. Syst., vol. 15, no. 4, pp. 161–185, 1999.

Authors: Rinku Borah

Paper Title: Medical Specialization, Technological Innovation and Women Doctors


Abstract: In medical profession, most of the women doctors are interested to confine themselves in some
less risky and less time consuming specialities. Though there are various technological innovations are going on
in medical field, they are underrepresented in most surgical fields, with the exception of obstetrics and
gynaecology. In this study, researcher has made an attempt-
1. To find out the specialization of women Doctors in Govt. Hospitals of Assam
2. To examine the factors behind their choice of specialization.
265. This study has been conducted in four district of upper Assam, i.e., Dibrugrah, Jorhat, Sivasagar and Golaghat.
This study is based on both primary and secondary data. For collection of primary data, two methods were used, 1536-
i.e. Observation and Interview. Findings of the study reveal that most of the women doctors were keen to engage 1541
themselves especially in non-clinical and Para-clinical speciality. Various technological inventions in medical
science have no effects in their choosing of particular specialization.

Keyword : (Women Doctors, Specialization, Technology, Role)


References:
1. A. Tait and M. J. Platt, “Women consultants, their background and training some myth explored”, Journal of Medical Education,
1995, Pg-372-6.
2. J.M.Gray, “The effect of the doctor's sex on the doctor-patient relationship”, Journal of the Royal College of General Practitioners,
1982, Pg-168.
3. A. S. Chatterji, “The Indian women’s search for an identity”, New Delhi: Gyan Publishing House, 1988, Pg 24.
4. S. Geurts, C. Rutte, & M. Peeters, “Antecedents and consequences of work-home interference among medical residents”, Journal of
Social Science & Medicine, 489, 1999, Pg 1135-1148.
5. A. E. Weilepp, “Female Mentors in short Supply”, Journal of American Medical Association; 267739, 1992, Pg 742.
6. D.G. Ducker, “The professional context for women physicians collegial relations, role models and mentors”, Journal of American
Medical Association, 43, 1988, Pg 106-108.
7. J. Bickell, “Women in medical education; a status report”, New England Journal of Medicine, 319, 1988, Pg 1579-1584.
8. Baidya, , Banerjee, Kumar, Mondal and Chowdhuri, “Specialty Preference among newly passed medical graduates and factors
affecting it”, Journal of Evolution of Medical and Dental Science, Vol. 3, Issue 20, 2014, Pg 5434

Authors: Aripov Mersaid Mirsiddikovich, Sayfullaeva Maftukha Zafrullayevna

Paper Title: On the New Nonlinear Properties of the Nonlinear Heat Conductivity Problem
Abstract: In this article, we discuss one problem of nonlinear thermal conductivity with double
nonlinearity; an exact analytical solution has been found for it, the analysis of which allows revealing a number
of characteristic features of thermal processes in nonlinear media. The following nonlinear effects have been
established: the inertial effect, the finite propagation velocity of thermal disturbances, the spatial localization of
heat, and the effect of the finite time of the existence of a thermal structure in an absorption medium.

Keyword : degenerate nonlinear, parabolic equation, not divergent, exact solution, new effects, localization,
estimate.
References:
1. Kurdyumov S.P., Zmitrenko N.V. PMTF, 1977, No. 1, p. 3.
2. Kurdyumov S.P. Dis. for the competition Art. Doct. Phys.-Math. sciences. M .: IPM AN USSR 1979, 302 p.
3. Martinson L.K., Pavlov K. B. ZhVM and MF, 1972, v. 12, No. 4, p. 1048.
4. Samarsky A.A., Zmitrenko I.V., Kurdyumov S.P., Mikhailov A.P. DAN USSR, 1975, v. 223, No. 6, p. 1344.
266. 5. Samarsky A.A., Elenin G.G., Kurdyumov S.P. and others. DAN USSR, 1977, v. 237, No. 6, p. 1330.
6. Martinson, L.K. Evolution of a heat pulse in a nonlinear medium with volumetric heat absorption, TVT, 1983, v. 21, No. 4, 801 -803. 1542-
7. Angar Jungel, Cross-Diffusion systems with entropy structure. arXiv: 1710.01623v1 [math.AP] 4 Oct 2017. Proceedings of 1543
EQUADIFF 2017pp.1-10.
8. Aripov M. Abdullaeva Z., On the bottom of the exact solution of a nonlinear problem with absorption or a source. Bulletin of the
TATU, №4 2016, 107-113.
9. Mersaid Aripov, Shakhlo A. Sadullaeva. Properties of solutions to reaction-diffusion equation with double nonlinearity wih distributed
parameters. Log SFU. Ser. Mat and Phys., 6: 2 (2013), 157-167
10. Zeldovich B. V., Raizer Yu. P. Physics of shock waves and high-temperature hydrodynamic phenomena. M.: Science, 1966. 686 s.
11. Wang M., Wei Y. Blow-up properties for a degenerate parabolic system with nonlinear localized sources // J. Math. Anal. Appl. 343
(2008), 621--635.
12. Raimbekov J.R. The Properties of the Solutions for Cauchy Problem of Nonlinear Parabolic Equations in Non-Divergent Form with
Density // Journal of Siberian Federal University. Mathematics & Physics 2015, 8(2), 192--200.
13. Mersaid Aripov, Shakhlo A. Sadulaeva, “To properties of solutions to reaction diffusion equation with double nonlinearity with
distributed parameters”, Jour. of Siberian Fed. Univer. Math. & Phys. 6(2013), pp. 157-167
14. P. Cianci, A. V. Martynenko, and A. F. Tedeev, “The blow-up phenomenon for degenerate parabolic equations with variable
coefficients and nonlinear source,” Nonlinear Analysis: Theory, Methods & Applications A, vol. 73, no. 7, pp. 2310 –2323, 2010.
15. C. S. Chen and R. Y. Wang, “Global existence and L1 estimates of solution for doubly degenerate parabolic equation,”Acta
Mathematica Sinica ,vol.44,no.6,pp.1089–1098,2001.
16. M. Tsutsumi, “On solutions of some doubly nonlinear degenerate parabolic equations with absorption,”
17. Journal of Mathematical Analysis and Applications, vol. 132, no. 1, pp. 187–212, 1988.

Authors: N.G. Sapozhnikova, Y.E. Putihin, Y.N. Akimova, L.A. Melnikova, O.V. Antonova

Paper Title: Technology for Implementing Corporate Social Responsibility


Abstract: Currently ethics assessment and reputation have no small part in dealing, selecting business
partners, sanctions implied by regulatory bodies, etc. Social responsibility concept is a relatively new principle
in the modern business ethics.
Active and successful implementation of social responsibility of business has started throughout the world.
Companies do not just try to resolve social problems, investing into development of education, healthcare,
science and industry, supporting socially disadvantaged groups and taking care of environmental safeguards;
they also get certain benefits from these activities.

267.
Keyword : account, social responsibility, financial accountability, financial status, financial performance
1544-
result, consolidated reporting
1548
References:
1. Kevorkova, Z.A., Petrov, A.M., Savina N.V. Towards liabilities of corporate systems. International Journal of Civil Engineering and
Technology. Volume 10, Issue 2, February 2019, Pages 1582-1593
2. Lymar, M.P., Kevorkova, Z.A., Petrov, A.M. The convergence of national and international accounting standards: Chinese experience.
International Journal of Civil Engineering and Technology. Volume 9, Issue 13, December 2018, Pages 82-94
3. Karpova T.P., Petrov A.M., Antonova O.V., Directions of Accounting Development in the Conditions of Digitalization. Jour of Adv
Research in Dynamical & Control Systems, Vol. 10, 07-Special Issue, 2018, pp. (117-125)
4. Chernysheva Natalia A., Perskaya Victoria V., Petrov Alexander M., Bakulina Anna A. Green Energy for Belt and Road Initia tive:
Economic Aspects Today and in the Future / International Journal of Energy Economics and Policy. 2019, 9(5), 178 -185
5. Petrov A.M., Nikiforova E.V., Kiseleva N.P., Grishkina S.N., Lihtarova O.V., Creation of the reporting on sustainable develop ment of
companies based on socioeconomic measurement statistics / International Journal of Recent Technology and Engineering. Volume -8
Issue-2, July 2019, p. 4005-4012
6. Alexander M. Petrov, Marina V. Kosolapova, Igor G. Yshanov, Nataliya K. Muravitskaya, Hursheda Nurmuhamedova The Economic
Significance of Statistical Research Activities of Representative Offices of Companies Abroad / International Journal of Inno vative
Technology and Exploring Engineering(TM). Volume-8 Issue-10, August 2019 p. 2713-2722
7. Lyudmila V. Sotnikova, Svetlana N. Polenova, Nataliya A. Mislavskaya, Alexander M. Petrov, Mariya M. Basova. Sustainable
development, macro and micro level: Russian and foreign model / International Journal of Recent Technology and Engineering.
Volume-8 Issue-2, July 2019, p. 4524-4532
8. Nikiforova E.V. PARADIGM OF PUBLIC REPORTING OF ECONOMIC ENTITIES // World Applied Sciences Journal. 2014. V.
29, No. 5, pp. 667 — 670.
9. Nobes C., Parker R. Comparative International Accounting. 13th Edition. Pearson, 2016. 640 p.
10. Mita, A.F., Utama, S., Fitriany, F., Wulandari, E.R. The adoption of IFRS, comparability of financial statements and foreign investors’
ownership. Asian Review of Accounting, 26(3), pp. 391-411.
11. Danrimi, M.L., Abdullah, M., Alfan, E. Investors’ herding practice: do IFRS and national economic culture matter? Managerial
Finance, 44(9), pp. 1117-1133.
12. Riccardi, L. China Accounting Standards: Introduction and Effects of New Chinese Accounting Standards for Business
Enterprises. 2015. 337 p.
13. L. B. Trofimova, "Evolutional Stages of Financial Accounting in the Russian Federation," L. B. Trofimova // International Accounting,
2014, No. 39 (237), pp. 14 — 23.
14. Suleymanov M.M., Magomedov R.M., Savina S.V., Fomicheva T.L.Basic models of tax federalism in global practice: Specific
characteristics and structural and functional organization. Academy of Accounting and financial studies journal.- 2018. - Vol. 22. -
Issue 3. – С. 1-9.
15. Decree No. 497 of the Russian Federation Government dated May 23, 2015, Concerning the Federal Dedicated Program of Education
Development for 2016 — 2020.
16. Petrov, A. Modern Accounting Concepts: Textbook. M.: Vuzovsky Uchebnik: INFRA-M, 2018.
17. A. M. Petrov, "issues of Standardization of Accounting Policies inside an Enterprise System of the Services Sector," International
Accounting, 2012, No. 31, pp. 10 — 16.
18. A. M. Petrov, Problems of Preparing Consolidated Statements at the Automation Stage. International Accounting, 2011, No. 33, pp. 2
— 10.
19. A. M. Petrov, "Theoretical and Methodological Background to Organization of Accounting and Tax Planning in the Enterprise Systems
of the Services Sector. Monograph", A. M. Petrov, Saint-Petersburg, 2008, Ser. Library of the Eurasian International Scientific and
Analytic Journal Problems of Modern Economy.
20. Petrov, A and Konyakhin, A., Methods and Practice of First IFRS Reporting at a Group of Companies. Monograph, Moscow, 2015.

Authors: D.Manish chowdary, R.Karthikeyan

Paper Title: Optimization of Process Parameters in MIG Welding of Two Dissimilar Materials
Abstract: MIG welding is used in automotive industries which helps in good opportunity to reduce
production costs, decrease vehicle weight and improve the strength of sheet metal joining. In this project, the
objective is to study welding parameters used in joining two dissimilar metals. Aluminum 6 series and aluminum
7 series with thickness both 6 mm was weld together using MIG welding with tailor welded blanks method. In
this project the voltage(V), wire feed(F) and gas pressure(P) are maintained according to the material used for
MIG welding. By using design expert software MIG welding parameters are optimized to obtain good tensile
strength. Response surface methodology type is used to optimization to study the parameters of MIG
WELDING.
268.
Keyword : Tensile strength, dissimilar metal welding, Metal Inert Gas Welding, aluminum 6-series and 7-
1549-
series, MIG welding, Response surface methodology
1553
References:
1. Rakesh Kumar1* and Gurinder Singh Brar(PhD Candidate, IKGPTU, Kapurthala) Department of Mechanical Engineering, North
West Institutions Group, Dhudike (Moga)-142001, Punjab, India. Mechanical Engineering Department, Guru Nanak Dev Engineering
College, Ludhiana, Punjab, India-141006. Corresponding author-e-mail address: hod me@northwest.ac.in Box, G. E. P., & D. W.
(1960). Some recent three-level models for quantitative variables analysis. Engineering, 2, 455–475.
2. Chen, W., Huang, Y., Qi, J., Tang, M., Zheng, Y., Zhao, and others (2012). Optimizing the extraction of phenolic compounds from
areca husk aided by ultrasound. Food Treatment and Conservation Paper, http:/dx.doi.org/10.1111/j.1745-4549.2012.00748.x
3. Dawson, P. L., & Dawson, R. R. (1998). Use surface reaction analysis to maximize the performance of the whole egg of
ultrapasteurized water. Science of poultry, 77, 468–474.
4. Box–Behnken development and surface response methodology to model some Turkish coals N. Aslan*, Department of Engineering
CebeciMining, University of Cumhuriyet, 58140 Sivas, Turkey Received on 21 February 2006; received in revised form on 1 June
2006

Authors: B. P. Santosh Kumar, K. Venkata Ramanaiah

Paper Title: Efficient Region of Interest Extraction Methods for Multiple Medical Images
Abstract: Medical images do contain important and unimportant spatial regions. Compression methods
which are capable of reconstructing the image with high quality are required to compress the medical images.
For these images, only a portion of it is useful for diagnosis hence a region based coding techniques are
significant for compressing and transmission. Extracting a significant region is of great demand since a slighter
269.
mistake may leads to wrong diagnosis. This paper is focused on investigating multiple image processing
algorithms for medical images. All the images may not contain the same region of interest, so different 1554-
approaches are supposed to apply for different images. In this three types of medical images were considered 1559
like magnetic resonance (MR) brain images, computer tomography (CT) abdomen images and X-ray lung
images. In this paper three automatic region of interest extraction algorithms were proposed for different types
of images.
Keyword : Medical image compression, Region of interest, CT, MRI, abdominal image compression
References:
1. Ansari M. A., Anand R. S., "Context based medical image compression for ultrasound images with contextual set partitioning in
hierarchical trees algorithm", Advances in Engineering Software, vol. 40 no.7, pp.487-496, Jan. 2009.
2. AssafHoogi, Christopher F. Beaulieu, Guilherme M. Cunha, ElhamyHeba, Claude B. Sirlin, Sandy Napel, and Daniel L. Rubin ,
“Adaptive Local Window for Level Set Segmentation of CT and MRI Liver Lesions”, Medical Image Analysis ,2017, doi:
10.1016/j.media.2017.01.002
3. Said and W. A. Pearlman, "A new, fast, and efficient image codec based on set partitioning in hierarchical trees," in IEEE Transactions
on Circuits and Systems for Video Technology, vol. 6, no. 3, pp. 243-250, June 1996.
4. Ahmet M Eskicioglundpaul S Fisher , “ Image quality measures and their performances “, IEEE transactions on communications V ol
43, No 12
5. Baeza. I, Verdoy. A, “ROI-based procedures for progressive transmission of digital images: a comparison” Journal of Math. Comput.
Model, 2009, 50
6. Kumar, S. B. Kumar and C. Kumar, "Development of improved SSIM quality index for compressed medical images," 2013 IEEE
Second International Conference on Image, Information Processing (ICIIP-2013), Shimla, 2013
7. D. Creusere, "Robust image coding using the embedded zerotree wavelet algorithm," Proceedings of Data Compression Conference -
DCC '96, Snowbird, UT, USA, 1996
8. Maglogiannis, C. Doukas, G. Kormentzas and T. Pliakas, "Wavelet-Based Compression With ROI Coding Support for Mobile Access
to DICOM Images Over Heterogeneous Radio Networks," in IEEE Transactions on Information Technology in Biomedicine, vol. 13,
no. 4, pp. 458-466, July 2009.
9. JavidAli.T, Akhtar, P, “Significance of region of interest applied on MRI and CT images in tele-radiology-telemedicine”, Springer-
Verlag, Berlin, Heidelberg, 2008
10. Kaur, Manpreet, and Vikas Wasson. ”ROI Based Medical Image Compression for Telemedicine Application.” Procedia Computer
Science 70, 2015
11. Keita Nakagomi, Akinobu Shimizu, HidefumiKobatake, Masahiro Yakami, Koji Fujimoto, Kaori Togashi,” Multi -shape graph cuts
with neighbor prior constraints and its application to lung segmentation from a chest CT volume”, Medical Image Analysis, Volume
17, Issue 1,2013,
12. Martin bernas ,” Image quality evaluation “, VIpromCom 2002, 4th Eurisp-IEEE region 8th international symposium on video image
processing and multi- media communication 16-19 june 2002
13. M. Kass, A. Witkin, and D. Terzopoulos, “Snakes: Active contour models,” International Journal of Computer Vision, vol. 1, no. 4,
1988.
14. P. Arbelaez, “Boundary Extraction in Natural Images Using Ultra metric Contour Maps,” in IEEE Conference on Computer Vision
and Pattern Recognition Workshop (CVPRW'06) 2006
15. Pennebaker, William B., and Joan L. Mitchell, JPEG: Still Image Data Compression Standard, Van Nostrand Reinhold, 1993.
16. Placidi. G, “Adaptive compression algorithm from projections: application on medical grayscale images”, Journal of Comput. Biol.
Med.2009, 39.
17. P. Soille, Morphological Image Analysis: Principles and Applications, 2nd ed.: Springer, Berlin Heidelberg, 2004
18. Ravi Kiran and Chandrasekhar kamargaonkar, "Region Separation Techniques for Medical Images", International Journal of
Innovative Research in Science, Engineering and Technology, vol. 5, issue 2, February 2016.
19. Ravi Kiran and Chandrasekhar kamargaonkar, “Region Based Medical Image compression using Block-Based PCA”, nternational
Conference on Computation of Power, Energy Information and Communication (ICCPEIC)-2016
20. S. Miaou, F. Ke and S. Chen, "A Lossless Compression Method for Medical Image Sequences Using JPEG-LS and Inter frame
Coding," in IEEE Transactions on Information Technology in Biomedicine, vol. 13, no. 5, pp. 818-821, Sept. 2009.
21. Shuo Wang, Mu Zhou, Zaiyi Liu, Zhenyu Liu, DongshengGu, YaliZang, Di Dong, Olivier Gevaert, Jie Tian,” Central focused
convolutional neural networks: Developing a data-driven model for lung nodule segmentation”, Medical Image Analysis, Volume 40,
2017,
22. Sonja Grgic, MislavGrgic , Marta mrak , “ reliability of objective picture quality measures”, journal of electrical enginee ring Vol 55
No 1-2, 2004
23. Standard Lossy Compression”, Canadian Association of Radiologists, Ottawa, ON, 2011
24. Toshiko Kaneda and Kristin Bietsch, "2016 World population data sheet with a special focus on human needs and sustainable
resources," Population reference bureau, 1875- Connecticut Ave, NW, Suite 520, Washington DC 20009, ISSN 0085-8315, 2016.
25. Toshiyuki Okada, Marius George Linguraru, Masatoshi Hori, Ronald M. Summers, Noriyuki Tomiyama, Yoshinobu Sato,” Abdominal
multi-organ segmentation from CT images using conditional shape–location and unsupervised intensity priors” ,Medical Image
Analysis, Volume 26, Issue 1, 2015,
26. W. Yang et al., "Lung Field Segmentation in Chest Radiographs From Boundary Maps by a Structured Edge Detector," in IEEE
Journal of Biomedical and Health Informatics, vol. 22, no. 3, pp. 842-851, May 2018.
27. Z. Liu, J. Ha, Z. Xiong, Q. Wu, and K. Castleman, “Lossy-to-lossless ROI coding of chromosome images using modified SPIHT and
EBCOT,” in Proc. IEEE Int. Symp. Biomedical Imaging, Washington, DC, p. 317. Jul. 2002.
28. http://www.waiting.com/brainanatomy.html
29. http://braintumorsegmentation.org/
30. http://db.jsrt.or.jp/eng.php
31. Somasundaram, K.; Kalaiselvi, T., "Brain extraction method for T1-weighted magnetic resonance scans," Signal Processing and
Communications (SPCOM), 2010 International Conference on, vol., no., pp.1-5, 18-21 July 2010

Authors: Sandeep Kumar Panda, Sathya AR, Manoranjan Mishra, Suneeta Satpathy

Paper Title: A Supervised Learning Algorithm to Forecast Weather Conditions for Playing Cricket
Abstract: Now days, Machine learning is considered as the key technique in the field of technologies, such
as, Internet of things (IOT), Cloud computing, Big data and Artificial Intelligence etc. As technology enhances,
lots of incorrect and redundant data are collected from these fields. To make use of these data for a meaningful
purpose, we have to apply mining or classification technique in the real world. In this paper, we have proposed
270. two nobel approaches towards data classification by using supervised learning algorithm
1560-
Keyword : Machine learning, Classification, Supervised learning. 1565

References:
1. A.M. Turing: On computable numbers, with an application to the entscheidungsproblem. Gödel, uber formal unentscheidhare satze der
principia Mathematica and verwandter systeme, monatshefic math.phys.,38, 173-198 (1931).
2. Abramoff, M.D., Magal, H., Ram, S.: Image processing with image j. Biophotonics international, 11, 36-42 (2004).
3. Adam, C., Honglak, L., Andrew, Y.: An analysis of single layer networks in unsupervised feature learning. Appearing in proceeding of
the 14th international conference on artificial intelligence and statics (AISTATS), USA (2011).
4. Baye’s portrait, The IMS Bulletin, news from the institute of mathematical statistics (1998).
5. Bernand, M.: A short history of machine learning. Forbes report February 19, (2016).
6. Brijesh, B., Saurabh, P.: Data mining: A prediction for performance improvement using classification. International journal o f
computer science and information security, 9(4), 136-140 (2011).
7. Ethem, A.: Introduction of machine learning. second edition, The MIT press Cambridge, Massachusetts London, England (2010).
8. Foster, P., Ron, K.: Guest Editors introduction on applied research in machine learning. Machine learning, Kluwer Academic
publisher, Boston (1998).
9. G.Keerthika, D.sarvana, P.: Feature subset Evaluation and classification using Naive Bayes classifier. Journal of Network
communications and Emerging Technologies (JNCET),1, (2015).
10. George, F.: An extensive Empirical study of feature selection metrics for text classification. Journal of machine learning research, 3,
(2003).
11. Gurneet, K., Er.Neelam O.: A review article on naive bays classifier with various smoothing techniques. International journal of
computer science and mobile computing, 3(10), 864-868 (2014).
12. Jan, F., Tomas, s.: Pattern recognition by Affine moment invariants. Pergamon press ltd, 26, 167-174 (1993).
13. Jayashri, K., Mayura, K.: Machine learning algorithms for opinion mining and sentiment classification. International journal of
scientific and research publications, 3, 724-729 (2013).
14. Kalyani,M.R.: Data mining techniques. International journal of advanced research in computer science and software engineering , 2,
(2011).
15. Kanu, P., Jauvala, Jaymit, P.: Comparison of various classification algorithms on iris datasets using weka. International journal of
advance engineering and research development (IJAERD), 1, 2348-4470 (2014).
16. Kelvin P.M.: Naive Bayes classifier. Department of computer science, university of British Columbia (2006).
17. S.B.Kotsiants.: Supervised machine learning: A review of classification techniques. Informatica 249-268 (2007).
18. Tommi J., Satinder P.S., Michael, I.J.: Reinforcement Learning algorithm for partially observable markov decision problems.
Department of brain and cognitive science, Bid. E10 Mass achusetts institute of technology Cambridge, MA 02139.
19. V.Metsis, I. Androutsopoulos, G. Paliouras: Spam filtering with Naïve byes – which naïve bayes. 3rd conference on email and anti-
spam (CEASA) (2006).
20. Xiaojin, Z., Zoubin, G., John, L.: Semi supervised learning using Gaussian fields and harmonic functions. In: 12th Internatio nal
conference on machine learning, Washington DC (2003).
21. M Ramzan Talib, Toseef Ullah, M Umer Sarwar, M Kashif Hanif and Nafees Ayub : Application of Data Mining Techniques in
Weather Data Analysis, IJCSNS International Journal of Computer Science and Network Security, 17(6), (2017).
22. Sayali D. Jadhav , H. P. Channe: Comparative Study of K-NN, Naive Bayes and Decision Tree Classification Techniques, International
Journal of Science and Research (IJSR),5 (1), (2016).
23. LunganZhang,LiangjunYu,DianhongWang,Class-specific attribute weighted naive Bayes, Pattern Recognition ,88 ,321-330(2019).
24. David Charte,Francisco Charte,Salvador García,Francisco Herrera:A snapshot on nonstandard supervised learning problems:
taxonomy, relationships, problem transformations and algorithm adaptations Progress in Artificial Intelligence,8(1),1–14,(2019).
25. Richard B. Alley,Kerry A. Emanuel,Fuqing Zhang: Advances in weather prediction,Science,363(6425),342-344,(2019).

Authors: Rahul Rastogi, Ravi S. Shukla

Paper Title: Modified AODV with Power Efficiency and Priority in WiMAX Network
Abstract: Many applications have developed for networks that are ad hoc in nature. Various routing
protocols are suggested, of which routing protocols on-demand in nature is the most widespread protocol
because they are simple to figure it out and they don’t’ use priority and power for communication of data in
routing. Routing protocol has an essential role in VANETs. In the latest decade, AODV routing protocol turns
into the consideration of concentrated research on VANETs. Several protocols were formulated to upgrade and
improve AODV in order to attain the maximum in the pursuit of consistent protocol.
Here, our proposal to improve ad-hoc distance vector suggests various points. I-AODV, our suggested protocol,
improved AODV in Power consumption and Priority models. We also evaluate performance pointers for some
metrics, like packet delivery ratio, energy, end-to-end delay, and routing overhead, in WiMAX ad hoc network.

Keyword : Routing Protocol, AODV, I-AODV, Mobility, WiMAX, VANET, Priority, Power Consumption.
References:
1. Md. Arafatur Rahman, , Md. SaifulAzad,MohammadMoshee Uddin,FarhatAnwar, “Performance Analysis of Ad hoc Routing
Protocols in Mobile WiMAX Environment”, IAENG, 35:3, IJCS_35_3_13.2010.
271. 2. RiriFitriSari,AbdusySyarif, “Performance Analysis of AODV-UI Routing Protocol With Energy Consumption Improvement Under
Mobility Models in Hybrid Ad hoc Network”, International IJCSE, ISSN : 0975-3397 Vol. 3 No. 7 July 2011, pp2904-2918
3. Dr. P. Chandrasekhar Reddy, Dr.P. C. Reddy , “Performance Analysis of Adhoc Network Routing Protocols”, Academic Open 1566-
Internet Journal, ISSN 1311-4360, Volume 17,2006. 1571
4. Wendi .B.Heinzelman, ,Lei Chen, “A Survey of Routing Protocols that Support QoS in Mobile Ad hoc Networks”, IEEE
Communication Society Networks, Vol. 21,2007
5. P.S.Sastry, M.A.L. Thathacar“Varietes of Learning Automata: An Overview”, IEEE Transactions on Systems, Man, and Cybernetics
Part: B, Cybernetics, Vol. 32, No. 6, December,2002
6. Request For Comment (RFC) AODV, http://www.ietf.org/rfc/rfc3561.txt
7. AminHamidian, “Performance of Internet Access Solutions in Mobile Ad hoc Networks”, Master Thesis, Lund University, 2001
8. WibergB.,”Porting AODV-UU Implementation tons-2 and Enabling Trace-based Simulation”, Master Thesis, Uppsala University,
2002
9. Nordstrom E. ,”APE-a Large Scale Ad hoc Network Testbed for Reproducible Performance Test”, Master Thesis, Uppsala
University,2002
10. Byoungchul. Ahn ,Chonggun. Kim, Elmurod. Talipov, “A Reverse AODV Routing Protocol in Ad hoc Mobile Networks”, IFIP,
Seoul, Korea, August2006
11. YJ Choi, C, E. Talipov, D. Jin, J. Jung, I. Ha, Kim,”Path Hopping based on Reverse AODV for Security”, APNOMS, Busan, Korea,
September2006
12. M. Zarei,“Reverse AODV Routing Protocol Extension Using Learning Automata in Ad hoc Networks”, Computer, Control and
Communication, IC4, Karachi, 5 May2009
13. M. Dave, A. Rani, “Performance Evaluation of Modified AODV for Load Balancing”, Journal of Computer Science 3, Science
Publication,2007
14. M. Portmann, Asad Amir Pirzada, “High Performance AODV Routing Protocol for Hybrid Wireless Mesh Networks”, 4rd Annual
International Conference on Mobile and Ubiquitous System: Networking & Services, MobiQuitous, Philadelphia, USA, 6-10 August,
2007
15. M. Portmann, Asad Amir Pirzada, R. Wishart, “Multi-Linked AODV Routing Protocol For Wireless Mesh Networks”, IEEE Global
Telecommunications Conference, Globecom, Washington, DC, USA, 26-30 November,2007
16. J Indulekha, Asad Amir Pirzada, M. Portmann, “Evaluation of Multi-Radio Extensions to AODV for Wireless Mesh Networks”, in
Proceedings of the 4rd ACM International Workshop on Mobility Management and Wireless Access (MobiWac), Torremolinos,
Spain, 2 October,2006
17. M. Romoozi, H. Babaei, “Multi Objective AODV Based On a Realistic Model”, International Journal of Computer Science Issues,
Vol 7, Issue 3, No. 3, May 2010
18. L. M. Gambardella, G. Di Caro, F. Ducatelle, “Special Issue on Self-Organization in Mobile Networking. AnthocNet : An Adaptive
Natured-Inspired Algorithm for Routing in Mobile Ad hoc Networks”, European Transactions and Communications, Vol. 16,2005
19. G. Einicke, J. Homer, HY. Zhang, M.E Bialkowski, “An Extended AODV Protocol for VoIP Application in Mobile Ad hoc
Network”, ECTI Transactions on Electrical Eng., Electronics, and Communications Vol.7, No.2, August,2009
20. L. Wan, L. Ding,” Improvement Suggestions to the AODV Routing Protocol”, International Conference on Wireless Networks and
Information Systems, WNIS, pp. 370, 28-29 December,2009
21. MJ Lee, X. Jing,”Energy-Aware Algorithms for AODV in Ad hoc Networks”, Proceeding of International Conference on Mobile
Computing and Ubiquitous, ICMU, Japan, 8-9 January,2004
22. P. Lorenz, F.D. Tolba, D. Magoni,”Energy Saving and Connectivity Tradeoff byAdaptative Transmission Range in 802.11g
VANETs”, International Conference on Wireless and Mobile Communication, ICWMC, IEEE Conference, pp. 45, 29-31 July,2006
23. P. Lorenz, F. D. Tolba, D. Magoni,” Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad hoc Networks”,
Global Telecommunications Conference, GlobeCom IEEE, pp. 2786-2790, 26-30 Nov,2007
24. L M. Feeney,” An Energy Consumption Model for Performance Analysis of Routing Protocols for Mobile Ad hoc Networks’, Mobile
Networks and Applications, pp. 239-249,2001
25. P. Manzoni, J.C. Carlos,”A Performance Comparison Energy Consumption for Mobile Ad hoc Routing Network Protocols”, In
Proceedings of the 8th International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication
Systems, San Francisco, CA,2000
26. K. Ramli, R. F. Sari, A. Syarif,B. Budiardjo,“Performance Evaluation Of AODV Routing Protocol On Adhoc Networks Testbed
Using PDA”, IEEE Malaysia International Conference On Communications And IEEE International Conference On Networks, Kuala
Lumpur, Malaysia,16 -18 November,2005
27. J.H Zygmunt, B. Liang,”Predictive Distance Based Mobility Management for PCs Networks”, in Proceedings of IEEE Infocom -99,
New York, March, 21-25,1999
28. The BonnMotion Software, http://net.cs.uni-bonn.de/wg/cs/applications/bonnmotionM.A. Sayid, H. Suhaidi, G. Osman, M.M
Kadhum,”Pause Time Optimal Setting for AODV Protocol on RPGM Mpbility Model in VANETs”, International Journal of
Advanced Computer Science and Applications, Vol 1, No.6, December2010
29. Zygmunt B. Haas, Liang B.,”Predictive distance-based mobility management for PCS networks”. In: Proc. of the IEEE Infocom, S.
1377-1384,1999
30. MobilityUserManual,http://nile.cise.ufl.edu/important/mobility-user- manual.pdf
31. AbdusySyarif et al. / International Journal on Computer Science and Engineering(IJCSE)
32. Charles E. Perkins, 2001. Ad Hoc Networking: Addison Wesley,USA.
33. J. SauvolaandSun, J.Z. 2002. On Fundamental Concept of Mobility for Mobile Communications: Proc. Of 13th IEEE International
Symposium on Personal, Indoor and Mobile Radio Communication, Lisbon, Portugal, 2:799-803.
34. M. T. Wysocki, E. Dutkiewicz,andAbolhasan, 2001. A Review of Current On-demand Routing Protocols: ICN 2001, LNCS 2094,
pp:186-195.
35. Samir R. Das and Nishant Gupta, “Energy-Aware On- Demand Routing for Mobile Ad Hoc Networks”, Proceedings of the 4th
International Workshop on Distributed Computing, Mobile and Wireless Computing pp164-173.
36. Tamilarasi M. , Palanivelu T. G., “Integrated Energy- Aware Mechanism for VANETs using On-demand Routing”, International
Journal of Computer and Information Engineering , 2008, pp212-216.
37. Kaushik Mahata , Jamil Y. Khan andAliaAsheralieva, “Traffic Prediction Based Packet Transmission Priority Technique in an
Infrastructure Wireless Network”, published in Wireless Communications and Networking Conference (WCNC), 2011 IEEE, pp 404-
409
38. Shinsuke Tanaka ,Siuli Roy, SomprakashBandyopadhyay, Tetsuro Ueda andDolaSaha in IEEE Communication Society, 2004, pp4172-
4176
39. R. Tafazolli, L. Hanzo, “A Survey of QoS Routing Solution For Mobile Ad hoc Networks”, IEEE Communications Surveys &
Tutorials, Vol. 9, Issue: 2, 2007
40. Draft Amendment for Wireless Access in Vehicular Environments (WAVE), IEEE Std. P802.11p/D3.0, Jul.2007.
41. Boukerche, R. W. N. PazziandK. Abrougui, ,“Design and evaluation of context-aware and location-based service discovery protocols
for vehicular networks,” IEEE Trans. Intell. Transp. Syst., vol. 12, no. 3, pp. 717–735, Sep.2011

Authors: Bhagyshree M Bhoir, Sapna Suri


“Impact of Emotional Intelligence on Emotional Maturity of Employees at Resin Manufacturing
Paper Title:
Organizations”
Abstract: The present study investigated the Emotional Intelligence Impact on Emotional Maturity of
Employees in the Manufacturing Industry. 100 employees from the Manufacturing Industry from Munbai and
Navi Mumbai area were chosen for the present study. Simple Random Sampling Technique was used to select
the samples for the study. The findings of the study reported that there is positive Association among Emotional
Intelligence and Emotional Maturity of Employee in manufacturing organizations. The Employees who are
emotionally mature show high level of self-confidence while Employees who are Emotionally Immature show
low level of self-confidence. There are three psychological dimension related to Emotional Intelligence which
272. include Emotional Competency, Emotional Sensitivity as well as Emotional Maturity. All these three factors
guide a person in handling the complex dynamics of human behaviour in a better way. For the present study an 1572-
extensive well designed questionnaire was used to collect the primary data from the manufacturing industry 1575
employees. Also various HR departments from the same manufacturing industries were approached in order to
collect the secondary data.

Keyword : Emotional competency, Emotional immature, Emotional Intelligence Emotional Maturity, Self
Confidence.
References:
1. Arya, A (1997).Emotional Maturity and Value of Superior Children in Family .Fourth Survey of Research in Education Vol.11,New
Dehi, NCERT.
2. C.R. Kothari (2004) .Research Methodology book published by New Age International (p) Ltd.
3. Goleman, D (1998). “What Makes a Leader” Publish in best of Harvard Business Review 1998.
4. Gaulin , Steven J.C and Donlad H. Mc. Buney. Evolutionary Psychology. Prentic Hall.2003.ISBN 978-0-13-111529-3,Chapter 6,p121-
142.
5. Geeta Ranga and Santosh Ranganekar 2009 “Knowledge of Management and Emotional intelligence Predicator of Managerial
Effectiveness.” Journal of Gurukul Business Review Vol 1,pp 55-62.
6. Handel, Steven. “Classification of Emotion”. Retrieved 30Aprial 2012.
7. Hume, D. Emotions and Moods. Organizational Behaviour, Page. No 258-297.
8. James, William (1884). “What is an Emotio?”.Mind 9(34):1888-205.
9. Jerrell,C Cassady & Mourad Ali Eissa 2008, Emotional Intelligence, Perspectives on Emotional and Positive Psychology, Peter Lang
Publishing, New York.
10. Journal of Gurukul Business Review 2009, “Knoweldge of Management and Emotional Intelligence predicator of Managerial
Effectiveness” Vol 5,pp,55-62.
11. Plutchik, Robert (1980), Emotion: Theory Research and Experience:Vol.1.Theories of emotion ,1 ,New York Academic.
12. Plutchik, Robert (2002),Emotion and Life :- Perspective from Psychology,Biology,and Evolution, Washington ,DC: American
Psychology Association.
13. Singh Dalip(2003) “Emotional Intelligence at Work –A professional Guide”. Response Book, New Delhi.
14. Singh D (2001) Emotional Intelligence at Work –A Professional Guide.New Delhi: Respose Book.
15. Jorfi H, Jorfi S & Moghadam K .Impact of emotional Intelligence on performance of Employee. Postmodern Opening,4(1),63 -74
(2010).

Authors: P Gopala Krishna, D Lalitha Bhaskari

Paper Title: Clustering of the Multi-Value Documents based on Probabilistic Features Association Mechanism
Abstract: It is becoming increasingly difficult to cluster multi-valued data in data mining because of the
multiple data interval values of individual functions. Identifying a clustering model that is appropriate for these
disguised multi-valued data deployments in data analysis applications is an open problem. To answer this
question, this paper proposes a feature selection based on the probabilistic features association mechanism
(PFAM). The problem is mainly due to the difficulty in identifying the class information and the multiple values
for each individual features. This work explores the problem of unsupervised feature selection through
computing the probabilistic association score and multi-value data reformation for effective clustering in
multivariate datasets. By minimizing a reformation clustering error, it can conserve together the degree of
similarity and the categorization information of the actual data contents. The proposed approach is evaluated the
clustering purity and Normalized Mutual Information on multivariate document datasets. The experimental
evaluation shows the improvisation of the proposed approach.

Keyword : Feature selection, Probability Association, Clustering, Multi-value document


References:
1. M. Almalawi, A. Fahad, Z. T., Muhammad A. Cheema, I. Khalil "k-NNVWC: An Efficient k-Nearest Neighbors Approach Based
on Various-Widths Clustering," IEEE Transactions On Knowledge And Data Engineering, Vol. 28, No. 1, Jan. 2016.
2. J. Wang, J. Wang, J. Song, X.-S. Xu, H. T. Shen, S. Li, "Optimized Cartesian K-Means," IEEE Transactions On Knowledge And Data
Engineering, Vol. 27, No. 1, Jan. 2015
3. H. Jaber, F. Marle, M. Jankovic, "Improving Collaborative Decision Making in New Product Development Projects Using Clusterin g
Algorithms" IEEE Transactions On Engineering Management, Vol. 62, No. 4, Nov. 2015.
4. T.-Hien T. Nguyen, V.-N. Huynh, "A k-Means-Like Algorithm for Clustering Categorical Data Using an Information Theoretic-
Based Dissimilarity Measure," Springer International Publishing Switzerland, 10.1007/978-3-319-30024-5, pp. 115-130, 2016.
273. 5. Z. Li, Jing Liu, Yi Yang, X. Zhou, and H. Lu, "Clustering-Guided Sparse Structural Learning for Unsupervised Feature Selection,"
IEEE Transactions On Knowledge And Data Engineering, Vol. 26, No. 9, Sept. 2014.
6. Y. Yang, H. T. Shen, Z. Ma, Z. Huang, and X. Zhou, "L2, 1-norm regularized discriminative feature selection for unsupervised 1576-
learning," In Proc. Int. Joint Conf. Artif. Intell., Vol. 22, p. 1589, 2011. 1581
7. J. Wu, H. Liu, H. Xiong, J. Cao, J. Chen, "K-Means-Based Consensus Clustering: A Unified View," IEEE Transactions On
Knowledge And Data Engineering, Vol. 27, No. 1, Jan. 2015.
8. B. Jiang, J. Pei, Y. Tao, X. Lin, "Clustering Uncertain Data Based on Probability Distribution Similarity," IEEE Transactions On
Knowledge And Data Engineering, Vol. 25, No. 4, April 2013.
9. L. Chen, Q. Jiang, S. Wang, "Model-Based Method for Projective Clustering," IEEE Transactions On Knowledge And Data
Engineering, Vol. 24, No. 7, July 2012.
10. Natthakan, T. Boongoen, S. Garrett, C. Price, "A Link-Based Cluster Ensemble Approach for Categorical Data Clustering," IEEE
Transactions On Knowledge And Data Engineering, Vol. 24, No. 3, March 2012.
11. F. Nie, H. Huang, X. Cai, and C. Ding, "Efficient and robust feature selection via joint L2, 1-norms minimization," In Proc. Adv.
Neural Inf. Process. Syst., vol. 23, pp. 1813-1821, 2010.
12. R. O. Duda, P. E. Hart, and D. G. Stork, "Pattern Classification," New York, NY, USA: Wiley, 2012.
13. O. M. San, Huynh, V.N., Nakamori Y., "An alternative extension of the k-means algorithm for clustering categorical data," Int.
Journal Application Math. Computation Science. 14, 241- 247, 2004.
14. D. Ienco, R. G. Pensa, R. Meo, "From context to distance: learning dissimilarity for categorical data clustering," ACM Trans.
Knowledge Discovery Data, 6(1),1-25, 2012.
15. J. Pei, B. Jiang, X. Lin, and Y. Yuan, "Probabilistic Skylines on Uncertain Data," Proc. 33rd Int'l Conf. Very Large Data Bases
(VLDB), 2007.
16. Z. Li, Y. Yang, J. Liu, X. Zhou, and H. Lu, "Unsupervised feature selection using nonnegative spectral analysis," In Proc. AAAI,
2010.
17. W. Fan, N. Bouguila, D. Ziou, "Unsupervised hybrid feature extraction selection for high-dimensional non-Gaussian data clustering
with variation inference," IEEE Tran. Know. Data Eng.., Vol. 25, No. 7, pp. 1670-1685, Jul. 2013.
18. L. Wolf and A. Shashua, "Feature selection for unsupervised and supervised inference: The emergence of sparsity in a weight-based
approach," J. Mach. Learn. Res., vol. 6, pp. 1855-1887, 2005.
19. Y. Tao, R. Cheng, X. Xiao, W.K. Ngai, B. Kao, and S. Prabhakar, "Indexing Multi-Dimensional Uncertain Data with Arbitrary
Probability Density Functions," Proc. Int'l Conf. Very Large Data Bases (VLDB), 2005
20. D. Cai, C. Zhang, and X. He, "Unsupervised feature selection for multi-cluster data," In Proc. 16th ACM SIGKDD Int. Conf. Knowl.
Discovery Data Mining, pp. 333-342, 2010.
21. D. Tao, X. Li, X. Wu, and S. J. Maybank, "General averaged divergence analysis," In Proc. 7th IEEE Int. Conf. Data Mining, pp. 302 -
311, 2007.
22. X. He, D. Cai, and P. Niyogi, "Laplacian score for feature selection," In Proc. Adv. Neural Inf. Process. Syst., vol. 186, p . 189, 2005.
23. S. Boutemedjet, D. Ziou, and N. Bouguila, "Unsupervised feature selection for the accurate recommendation of high -dimensional
image data," in Proc. Advanced Neural Inf. Process. Syst., 2007.
24. J. L. Rodgers and W. A. Nicewander, "Thirteen ways to look at the correlation coefficient," The Am. Statist., vol. 42, no. 1, pp. 59-66,
1988.
25. Z. Zhao and H. Liu, "Spectral feature selection for supervised and unsupervised learning," in Proc. 24th Int. Conf. Mach. Lea rn., pp.
1151-1157, 2007.
26. B. Krishnapuram, A. J. Hartemink, L. Carin, and M. A. T. Figueiredo, "A Bayesian approach to joint feature selection and classifier
design," IEEE Trans. Pattern Anal. Mach. Intell., vol. 26, no. 9, pp. 1105-1111, Sept. 2004.
27. X. Li and Y. Pang, "Deterministic column-based matrix decomposition," IEEE Trans. Knowl. Data Eng., vol. 22, no. 1, pp. 145-149,
Jan. 2010.
28. W. Liu, D. Tao, and J. Liu, "Transductive component analysis", In Proc. 8th IEEE Int. Conf. Data Mining, pp. 433-442, 2008.
29. F. Nie, S. Xiang, Y. Jia, C. Zhang, and S. Yan, "Trace ratio criterion for feature selection", In Proc. AAAI, 2008, vol. 2, pp. 671-676,
2008.
30. X. He, M. Ji, C. Zhang, and H. Bao, "A variance minimization criterion to feature selection using Laplacian regularization", IEEE
Trans. Pattern Anal. Mach. Intell., vol. 33, no. 10, pp. 2013-2025, Oct. 2011.
31. Y. Guan, M. I. Jordan, and J. G. Dy, "A unified probabilistic model for global and local unsupervised feature selection", in Proc. 28th
Int. Conf. Mach. Learn., pp. 1073-1080, 2011.
32. J. Tang, X. Hu, H. Gao, and H. Liu, "Discriminant analysis for unsupervised feature selection", SDM, SIAM, pp. 938-946, 2014.
33. Z. Zhao and H. Liu, "Semi-supervised feature selection via spectral analysis", in Proc. SDM, 2007.
34. H. Liu and L. Yu, "Toward integrating feature selection algorithms for classification and clustering", IEEE Trans. Knowl. Data Eng.,
vol. 17, no. 4, pp. 491-502, Apr. 2005.
35. A. Jain and D. Zongker, "Feature Selection: Evaluation, application, and small sample performance", IEEE Trans. Pattern Anal.
Mach. Intell., vol. 19, no. 2, pp. 153-158, Feb. 1997.
36. A. E. Brodley and J. G. Dy, "Feature selection for unsupervised learning", International Journal Machine Learning Res., vol. 5, pp.
845-889, Dec. 2004.
37. R. Cheng, D.V. Kalashnikov, and S. Prabhakar, "Evaluating Probabilistic Queries over Imprecise Data", Proc. ACM SIGMOD Int'l
Conf. Management of Data (SIGMOD), 2003.
38. S. B. Kotsiantis, P.E. Pintelas, "Recent Advances in Clustering: A Brief Survey", WSEAS Trans. Information Science and
Applications, vol. 11, no. 1, pp. 73-81, 2004.

Authors: Amit Arora

Paper Title: Simulation of Wave Propagation in Waveguide Tee Junctions


Abstract: In order to understand the behaviour of any microwave component, knowledge of
electromagnetic (EM) field distribution inside the component is necessary. In this paper simulation of wave
propagation in waveguide tees at X- band is presented in dominant mode. Pattern of electric field from front
view, side view, and front and top view of magnetic field for dominant mode in rectangular waveguide is
presented. Configuration of electric, magnetic field and power distribution at different time instants in
microwave tees is explained. Power distribution and isolation property in E-H plane tee are also described.
274.
1582-
Keyword : E-plane tee, H-plane tee, Magic tee, Waveguide. 1587
References:
1. CST Studio Suite—User’s Manual, Computer Simulation Technology, Darmstadt, Germany, 2018.
2. Robert E. Collin, Foundations for Microwave Engineering, 2nd ed., John Wiley & Sons (ASIA) Pte. Ltd., 2002.
3. David M. Pozar, Microwave Engineering, 3rd ed., Wiley India Pvt. Ltd., 1989.
4. Peter A. Rizzi, Microwave Engineering Passive Circuits, Prentice-Hall International, 2003.
5. S. Y. Liao, Microwave Devices and Circuits, 3rd ed., Prentice-Hall of India Pvt. Ltd., 2004.
6. A. Das, and S. Das, Microwave Engineering, 10th ed., Tata McGraw-Hill publishing company Ltd., 2000.
7. M.L. Sisodia, and G.S. Raghuvanshi, Microwave circuits and Passive devices, 1st ed., Wiley Eastern Limited, 1987.

Authors: Aravind B N, K V Suresh

Paper Title: Denoising: A Dual Domain Method


Abstract: Image has an important role to play in our daily life. It has its applications from simple
documentation to complicated surveillance and medical applications. In the area of image processing, denoising
is one among the most studied areas. Many a times the captured image will be degraded. This can happen at the
time of acquisition and/or transmission. Noise is one such degrading agent. The presence of noise will affect the
performance of the applications like segmentation, recognition, object detection and medical as well as general
applications. Hence denoising is a prerequisite in these applications. The proposed method utilizes both
transform and spatial domains. Shrinkage technique is applied in wavelet domain and in spatial domain, non-
local means is used. Simulation is conducted on standard test images. The tabulated results shows that, the
275.
proposed method performs comparatively better.
1588-
1592
Keyword : Dual domain, Image denoising, Nonlocal means, Shrinkage.
References:
1. Jong-Sen. Lee, “Digital image enhancement and noise filtering by use of local statistics,” IEEE trans. on PAMI, Volume 2, pp. 165–
168, 1980.
2. F. Jin, Paul Fieguth, L. Winger, and Ed Jernigan, “Adaptive wiener filtering of noisy images and image sequences,” IEEE conference
on image processing, Volume 3, pp. 349–352, 2003.
3. Carlo Tomasi and Roberto Manduchi, “Bilateral filtering for gray and color images,” IEEE international conference on computer
vision, pp. 839–846, 1998.
4. Michael Elad, “On the origin of the bilateral filter and ways to improve it,” IEEE trans. on image processing, Volume 11, pp. 1141–
1151, 2002.
5. Tony F. Chen, Stanley Osher, and Jianhong Shen., “The digital TV filter and nonlinear denoising,” IEEE trans. on image processing,
Volume 10, pp. 231–241, 2001.
6. Antoni Buades, Bartomeu Coll, and Jean-Michel Morel, “Image denoising methods, a new non-local principle,” SIAM Review, Volume
52, pp. 113–147, 2010.
7. Antoni Buades, Bartomeu Coll, and Jean-Michel Morel, “Image denoising by non-local averaging,” IEEE conference on acoustics,
speech and signal processing, Volume 2, pp. 25–28, 2005.
8. Antoni Buades, Bartomeu Coll, and Jean-Michel Morel, “Non-local image and movie denoising,” Springer International journal of
computer vision, Volume 76, No. 2, pp. 123–139, 2008.
9. Mona Mahmoudi and Guillermo Sapiro, “Fast image and video denoising via nonlocal means of similar neighborhoods,” IEEE signal
processing letters, Volume 12, No. 12, pp. 830–842, 2005.
10. Aravind B. N and K. V. Suresh, “A discontinuity adaptive prior for image denoising,” International journal of computer applications,
Volume 110,No. 2, pp. 13–19, 2015.
11. David L. Donoho, “Denoising by soft thresholding,” IEEE transaction on information theory, Volume 41, No. 3 pp. 613–627, 1995.
12. Ronald Raphael Coifman and David L. Donoho, “Translation invariant denoising,” Wavelet and statistics, LNCS, Springer, Volume
103, pp. 125–150, 1995.
13. Tien D. Bui and Guangyi Chen, “Translation invariant denoising using multiwavelets,” IEEE transaction on signal processing,
Volume 46, No. 12, pp. 3414–3420, 1998.
14. T. Tony Cai and Bernard Walter Silverman, “Incorporating information on neighboring coefficients into wavelet estimation,” Sankhya,
Volume 63, No. 2, pp. 127–148, 2001.
15. Guang-Yi Chen and Tien D. Bui, “Multiwavelet denoising using neighboring coefficients,” IEEE signal processing letters, vol. 10, pp.
211–214, 2003.
16. Zhou Dengwen and Cheng Wengang, “Image denoising with an optimal thresholding and neighboring window,” Elsevier, PRL,
Volume 29, No. 11, pp. 1694–1697, 2008.
17. Levent Sendur and Ivan W. Selesnick, “Bivariate shrinkage functions for wavelet-based denoising exploiting interescale dependency,”
IEEE transaction on signal processing, Volume 50, No. 11, pp. 2744–2756, 2002.
18. Levent Sendur and Ivan W. Selesnick, “Bivariate shrinkage with local variance estimation,” IEEE signal processing letters, Volume 9,
No. 12 pp. 438–441, 2002.
19. Aravind B. N and Suresh K V, “Multispinning for image denoising,” de Gruyter, International journal of intelligent systems, Volume
21, No.3. pp 271-291, 2012.
20. B. N. Aravind and Suresh K. V, “Wavelet based image denoising using multi-Spinning”, National conference on computer vision,
Pattern recognition, image processing and graphics (NCVPRIPG 2011), BVB, Hubli, Karnataka, pp 118-121, December 15-17, 2011.
21. B. N. Aravind and Suresh K. V, “Hybrid image denoising,” IEEE International conference on electronics, communication, computer
technologies and optimization techniques (ICEECCOT 2017), Mysuru, India, pp 46-49, December 15-16, 2017.
22. Zhou Wang, Alan Conrad Bovik, Hamid Rahim. Sheikh and Eero P. Simoncelli, “Image quality assessment: From error visibility to
structural similarity”, IEEE transactions on image processing, Volume 13, No. 4, April 2004.

Authors: Gelena Kovalska, Vladyslav Smilka

Paper Title: Construction Management in Ukraine


Abstract: The main course of urban planning activities and land use in Ukraine is to ensure the sustainable
development of locality. Legislation in Ukraine defines the main directions, tasks and contents of urban
development activities, subjects and their powers, functions. the emergence of many owners of real estate
property, including the land, a large number of economic entities, who make their own decisions and have
moved to the local territory planning level the focus of the managerial impacts on the operation and development
of urban planning systems. In this regard, the local territory planning and management of buildings have
problems that are associated with opposite views on local development of potential investors and the public. The
management of the city, in particular its construction, should be implemented based on a spatial complex model.
The article presents the problematic issues connected with the implementation of city-planning policy in the
country. The ways of solving these problems are proposed, by improving the existing model of building
management. Effective management of urban development involves knowledge of complete and reliable
information about the processes taking place in the city, the availability of mechanisms for balanced
consideration of the proposals of investors and the public during urban planning.

Keyword : management, city, urbanplanning, building, powers.


276.
References:
1. Aleksandrovich, Ja. M. (2002) Strategic goals and directions of sustainable development of the Republic of Belarus. Belorussk ij 1593-
jekonomicheskij zhurnal. № 4, pp. 4-9. 1600
2. Trukhachov Yu. N. (2006) The general theory of urban systems (methodological concept). Rostov-na-Donu, Russia.
3. Elohov A.M. (2011) City as a control object. Bulletin of Perm State University, Economy Series. Perm, Russia: № 3 (10), pp. 7 8-86.
4. Kabalnov, Yu. S., Mokrushin, A. M., Gorbachev, V. G. (1999) Socio-economic monitoring of urban areas, based on technology for
obtaining knowledge. Management in complex systems. http://www.ict.edu.ru/ft/004936/15.pdf accessed 20th Sept 2018.
5. Demin N.M. (1991) Management of development of urban systems. Kyiv, Ukraine: Budivelnyk.
6. Zavyalov A.Y. et al. (2015) Information-analytical system for complex analysis of urban. International electronic scientific and
educational magazine "Architecture and Modern Information Technologies", № 2 (31) http://elima.ru/articles/index.php?id=92
accessed 21th Sept 2018.
7. Petrakovskaya O. S. (2007) Methodology of management of the land use system of major cities. Extended abstract of Doctor’s th esis
Kyiv.
8. Law of Ukraine «On regulating urban planning activities» №3038-VI (2011). http://zakon2.rada.gov.ua/laws/show/3038-17 accessed
20th Sept 2018.
9. Peter, W. G. Newman. (1993) Sustainable development and urban planning: Principles and applications in an Australian context.
Sustainable development. Vol. 1, № 1., pp. 25-40.
10. Meshcheryakov V. V. (2012) Town planning as a component of management territorial development of the city.
http://www.dy.nayka.com.ua/?op=1&z=469 accessed 20th Sept 2017.
11. Building Control Performance Standards – Department for Communities & Local Government : London, 2006.
12. Allmendinger, P. (2001) Planning Theory. London: Palgrave.
13. Faludi, A. (2003) Unfinished Business, European Spatial Planning in the 2000s. Town Plannnig Review, Volume 74, Number 1/2003 .,
pp. 121-140.
14. Petrovic M. (2009) Transformacija gradova, ka depolitizaciji urbanog pitanja. Beograd: Institut za socioloska.
15. Denhardt, R.B. (2010) Theories of Public Organization. Belmont: Thomson.
16. Government The Future of Building Control - Department for Communities and Local : London, 2008.
17. Sewell, W.R.D., Coppock, J.T. (eds.) (1977) Public Participation in Planning. London: John Wiley & Sons.
18. Moiseev Y.M. (2012) Urban planning in the face of new challenges. International electronic scientific and educational journal "AMIT"
http://www.marhi.ru/AMIT/2012/4kvart12/moiseev/abstract.php accessed 20th Sept 2018.
19. Mayerson, M., Banfield, E.C. (1969) Politics, Planning, & the Public Interest. New York: The Free Press.

Authors: Sri Murni Dewi, Endah Tri Puspitasari, Miftakhul Jannah, Chairita
The Use of Lightweight Brick and Bamboo on Lightweight Reinforced Concrete Panel Subject To
Paper Title:
Horizontal In-Plane Loading
Abstract: The lightweight panel is widely use in building infilled wall to reduce the building mass in lieu of
brick walls. The present innovation works use bamboo and aerated concrete blocks into precast concrete panel.
The average weight of the panel was 1650 kg/m3 compare to ordinary reinforced concrete 2200 kg/m3. Two
type of panel dimension were used 40 cm x 80 cm x 3 cm and 60 cm x 120 cm x 4 cm. Bamboo reinforcement
act as a structural framework of the panel and aerated concrete block (AAC block) functioning as infilled wall or
cladding. Panels were loaded at the in- plane panels at two position, namely at the peak and at the middle panel
height. When the load position was at the peak the average failure loads were120 N for small and large panel,
the failure occurred at compression at top diagonal frame. when the load position was at mid panel, the average
failure loads were140N for small panel and 260N for large panel, the failure occurred as shear cracks on the
panel.
The failure load of panel without aerated concrete blocks were130N for small panel and 215N for large panel.

277. Keyword : bamboo reinforced concrete, aerated concrete block, lightweight panel.
References: 1601-
1. Yushun Li, Huangying Shen, Wei Shan, Tianshi Han, Flexural behavior of lightweight bamboo –steel composite slabs, Thin-Walled 1603
Structures 53 (2012) 83–90.
2. J.G Moroz SL. Lissel. MD Hagel. Performance of bamboo reinforced concrete masonry shear walls, Construction and Building
Materials 61 (2014) pp125-137
3. SM Dewi, D Nuralinah, A Munawir,MN Wijaya, Crack Behaviour Study of Bamboo Reinforced Concrete Beam with Additional Pegs
in Reinforcing, International Journal of Civil Engineering and Technology (IJCIET) Volume 9, Issue 7, July 2018, pp. 1632–1640,
4. Muhtar, SM Dewi, Wisnumurti, A Munawir, The Stiffness and Cracked Pattern of Bamboo Reinforced Concrete Beams Using a Hose
Clamp, International Journal of Civil Engineering and Technology (IJCIET) Volume 9, Issue 8, August 2018, pp. 273–284,
5. SM. Dewi and D. Nuralinah. The Recent Research on Bamboo Reinforced Concrete. MATEC Web of Conferences. 103, 02001 2017.
6. Muhtar, S M Dewi, Wisnumurti, A.Munawir, Enhancing Bamboo Reinforcement Using a Hose-Clamp to Increase Bond Stress and
Slip Resistance, Journal of Building Engineering 26 (2019) 100896
7. SM Dewi, RM Simatupang, I Waluyohadi, The Use of Bamboo and Autoclaved Aerated Concrete Block to Reduce the Weight of
Precast Concrete Beam, AIP Conference Proceedings 1887, 020012 (2017).
8. Ari Wibowo, Indradi Wijatmiko, and Christin Remayanti Nainggolan, Structural Behavior of Lightweight Bamboo Reinforced
Concrete Slab with EPS Infill Panel, AIP Conference Proceedings · September 2017.
9. Wisnumurti, SM Dewi, A Soehardjono, Strength reduction factor ( R) and displacement amplification factor (Cd) of confined masonry
wall with local brick in Indonesia, 2nd International Conference on Sustainable Civil Engineering Structures and Construction
Materials 2014 (SCESCM 2014), Procedia Engineering 95 ( 2014 ) 172 – 17

Authors: Zuardin, Amran Razak, M. Alimin Maidin, Muhammad Tamar, Ahmad Yani

Paper Title: Patterns of Family Support in Cervical Cancer Survivors with High Resilience
Abstract: This study is aimed to explore the patterns of family support in cervical cancer survivors. This
study is focused on explaining the kinds of patterns of family support received by cervical cancer survivors who
had experienced high-resilience. It implements qualitative methods with descriptive research design. Data is
collected by screening using resilience scale and interview. The analysed data include interview results obtained
from cervical cancer survivors who had experienced high resilience. Research results showed that high resilience
among the three cervical cancer survivors is related to family support. The patterns of family support received by
the three participants include closeness, receptors, and durability. The three participants also received at least
three out of four patterns of family supports concrete support, emotional support, informative support, and award
support. Types of support most needed by the three participants are concrete support and emotional support.

278. Keyword : Cervical cancer; Resilience; Family support.


1604-
References: 1606
1. J. Ferlay et al., “Estimating the global cancer incidence and mortality in 2018: GLOBOCAN sources and methods,” Int. J. Cancer, vol.
144, no. 8, pp. 1941–1953, 2019.
2. S. P. Kanker, “Situasi penyakit kanker 4.”
3. A. P. Macmillan, “Depression and anxiety in patients with cancer consultant liaison psychiatrist, senior clinical lecturer in psychiatry
Sources and selection criteria How common are depression and anxiety in patients with cancer?,” Bmj, vol. 1415, no. April, pp. 1–6,
2018.
4. M. Eicher, M. Matzka, C. Dubey, and K. White, “Resilience in adult cancer care: An integrative literature review,” Oncol. Nurs.
Forum, vol. 42, no. 1, pp. E3–E16, 2015.
5. L. M. Sippel, R. H. Pietrzak, L. C. Mayes, and S. M. Southwick, “How does social support enhance resilience in the trauma-exposed
individual ?,” vol. 20, no. 4, 2015.
6. J. W. Creswell, “Research design.”
7. A. J. Mitchell, D. W. Ferguson, J. Gill, J. Paul, P. Symonds, and L. Royal, “Depression and anxiety in long-term cancer survivors
compared with spouses and healthy controls : a systematic review and meta-analysis,” Lancet Oncol., vol. 2045, no. 13, pp. 1–12, 2013.
8. J. C. Holland and Y. Alici-evcimen, “Depression in Cancer Patients.”
9. L. Sand, M. Olsson, and P. Strang, “Coping Strategies in the Presence of One ’ s Own Impending Death from Cancer,” J. Pain
Symptom Manage., vol. 37, no. 1, pp. 13–22, 2009.
10. R. Laidsaar-powell et al., “Patient Education and Counseling Family involvement in cancer treatment decision-making : A qualitative
study of patient , family , and clinician attitudes and experiences,” Patient Educ. Couns., no. 2015, 2016.
11. F. Chino et al., “Self-Reported Financial Burden and Satisfaction With Care Among Patients With Cancer,” Oncologist, vol. 19, no. 4,
pp. 414–420, 2014.
12. J. Totman, N. Pistrang, S. Smith, S. Hennessey, and J. Martin, “‘You only have one chance to get it right’: A qualitative stu dy of
relatives’ experiences of caring at home for a family member with terminal cancer,” Palliat. Med., vol. 29, no. 6, pp. 496–507, 2015.
13. S. Saso et al., “Gynecological cancers: An alternative approach to healing,” Futur. Sci. OA, vol. 3, no. 3, 2017.
14. G. Desbordes et al., “Moving Beyond Mindfulness : Defining Equanimity as an Outcome Measure in Meditation and Contemplative
Research,” 2014.
15. L. C. Rispel, P. De Jager, and S. Fonn, “Exploring corruption in the South African health sector,” Health Policy Plan., vol. 31, no. 2,
pp. 239–249, 2016.
16. A. Hasanpour-Dehkordi, “Self-care concept analysis in cancer patients: An evolutionary concept analysis,” Indian J. Palliat. Care, vol.
22, no. 4, pp. 388–394, 2016.
17. S. S. Coughlin, “A review of social determinants of prostate cancer risk, stage, and survival,” Prostate Int., no. xxxx, pp. 1–6, 2019.
18. C. R. Meeker et al., “Relationships Among Financial Distress, Emotional Distress, and Overall Distress in Insured Patients With
Cancer,” J. Oncol. Pract., vol. 12, no. 7, pp. e755–e764, 2016.
19. L. Haynes-Maslow, M. Allicock, and L. S. Johnson, “Cancer Support Needs for African American Breast Cancer Survivors and
Caregivers,” J. Cancer Educ., vol. 31, no. 1, pp. 166–171, 2016.
20. B. Park et al., “Prevalence and predictors of anxiety and depression among family caregivers of cancer patients: A nationwide survey
of patient-family caregiver dyads in Korea,” Support. Care Cancer, vol. 21, no. 10, pp. 2799–2807, 2013.
21. R. Thanan et al., “Oxidative stress and its significant roles in neurodegenerative diseases and cancer,” Int. J. Mol. Sci., vol. 16, no. 1,
pp. 193–217, 2014.
22. T. Thompson et al., “HHS Public Access,” pp. 134–142, 2018.
23. I. Hasson-Ohayon, R. Tuval-Mashiach, G. Goldzweig, R. Levi, N. Pizem, and B. Kaufman, “The need for friendships and information:
Dimensions of social support and posttraumatic growth among women with breast cancer,” Palliat. Support. Care, vol. 14, no. 4, pp.
387–392, 2016.
24. W. Burns et al., “Cancer-related effects on relationships, long-term psychological status and relationship satisfaction in couples whose
child was treated for leukemia: A PETALE study,” PLoS One, vol. 13, no. 9, pp. 1–20, 2018.

Authors: Samsunnahar Khandakar, Jahirul Islam Babar, Anup Majumder, Md. Imdadul Islam

Paper Title: Complexity Analysis and Accuracy of Image Recovery Based on Signal Transformation Algorithms
Abstract: In this paper we compare and analyze the complexity of three functions: Fast Fourier transform
(FFT), Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT), used in image
transformation. The purpose of all the algorithms is to shift the signal from space or time domain to frequency
domain for de-noising or compression. We compare the simulated process time of both one and two dimensional
FFT, DCT and DWT (Symlet and Debauches 1) using image and speech signal. The process time is found
lowest for FFT and highest for DWT, provided its basis function governs the process time and DCT provide the
moderate result. Finally the quality of compressed image under the three mathematical functions are compared,
where DWT is found as the best and FFT yields worst result.

Keyword : Basis function, MSE, Butterfly algorithm, process time, confidence level.
References:
1. Teddy Mantoro and Fifit Alfiah, ‘Comparison methods of DCT, DWT and FFT techniques approach on lossy image compression,’
2017 International Conference on Computing, Engineering, and Design (ICCED), 23-25 Nov 2017, Kuala Lumpur, Malaysia
279. 2. Fifit Alfiah, Saepudin, Sutarya, Indra Purnama and Ryan Anggara, ‘Comparison Methods of DCT, DWT and FFT Techniques
Approach on Lossy Image Compression,’ International Journal of Computer Techniques, vol. 5, Issue 1, pp.20-24, Feb 2018
3. Hamed Hakkak and Mahdi Azarnoosh, ‘Analysis of lossless compression techniques time-frequency-based in ECG signal 1607-
compression,’ Asian Journal of Biomedical and Pharmaceutical Sciences, vol. 9, Issue 66, pp.16-25, Jan 2019 1612
4. Priyanka, R. Bhonde and R. D. Ghongade, ‘A Review Paper on Design and Simulation Analysis of 32 and 64 Point FFT Using
Multiple Radix Algorithm,’ IJCSMC, vol. 5, Issue. 1, pp.198-201, January’ 2016
5. Kavita Tewari and Renu L. Kalakoti, ‘Fingerprint Recognition and Feature Extraction Using Transform Domain Techniques,’ 2014
International Conference on Advances in Communication and Computing Technologies, 0-11 Aug. 2014, Mumbai, India
6. M. P. Dale and M. A. Joshi, ‘Fingerprint Matching Using Transform Features,’ TENCON 2008, 2008 IEEE Region 10 Conference, 19-
21 Nov. 2008, Hyderabad, India
7. Ravinder Singh, Manish Mathuria, Kailash Rathore, Santosh Kumar, ‘A Robust Color Image Watermarking using Combination of
DWT and DCT,’ International Journal of Computer Applications (0975 – 8887), pp.11-14, 4th International IT Summit Confluence
2013.
8. Nawaf Hazim Barnouti, Zaid Saeb Sabri, Khaldoun L. Hameed, ‘Digital Watermarking Based on DWT (Discrete Wavelet Transform)
and DCT (Discrete Cosine Transform),’ International Journal of Engineering & Technology, volume 7(4), pp. 4825-4829, 2018
9. Shivang Ghetia, Nagendra Gajjar, Ruchi Gajjar, ‘Implementation of 2-D Discrete Cosine Transform Algorithm on GPU,’ International
Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, vol. 2, pp. 3024-3030, July 2013
10. Mayura Patrikar and Vaishali Tehre , ‘Design and Power Measurement of 2 And 8 Point FFT Using Radix-2 Algorithm for FPGA
Implementation,’ IOSR Journal of VLSI and Signal Processing (IOSR-JVSP), vol. 7, Issue 1, pp. 44-48, Feb. 2017
11. K. Jayaram and C. Arun, ‘Survey Report for Radix 2, Radix 4, Radix 8 FFT Algorithms,’ International Journal of Innovative Research
in Science, Engineering and Technology, vol. 4, Issue 7, pp. 5149-5154, July 2015
12. Aniket Shukla and Mayuresh Deshmukhm, ‘Comparative Study of Various FFT Algorithm Implementation on FPGA,’ vol.1, Issue 1,
pp.19-22, November 2012.

Authors: Victor Fursov, Alexander Rudnev, Olga Malinina, Ekaterina Alekhina, Inna Kushnareva

Paper Title: Development of a Methodology to Assess the Regional Labor Potential in Modern Russia
280. Abstract: The article presents the results of the development of a methodology for assessing the structural
structure of the labor potential of a region and its role in socio-economic development, territorial and 1613-
environmental features of labor resources and mechanisms of reproduction of labor potential. The development 1618
of the methodology was based on a conceptual and methodological review of foreign and domestic scientific
sources. Promising markers of labor resources in foreign science have been identified, which are manifested in
the assessment of migration risks, the impact of globalization factors, forecasting the dependence of labor
productivity at the regional level on market factors, climatic conditions, insurance mechanisms, etc. A high level
of scientists' interest in the problem of labor potential on micro-, meso and macro levels in Russia. The authors
pay special attention to the assessment of existing approaches to the methods for assessing the labor potential of
the region proposed by domestic researchers and applied in the Russian Federation; The features of the main
methodological approaches are evaluated; their classification is given, as well as the technology for conducting
the assessment, depending on the research tasks of scientists. The article describes the methodology developed
by the authors for measuring the labor potential of the region based on the index method, which allows taking
into account the specific conditions of its reproduction and use at the regional level, as well as conducting
reasonable comparative assessments. The calculations are presented according to the proposed methodology of
the state and level of development of labor potential for the regions of the North Caucasus and Southern Federal
Districts and the Russian Federation as a whole.

Keyword : labor potential, assessment, migration risks, globalization


References:
1. V. V. Adamchuk, O. V. Romashov, M. E. Sorokina, Economics and sociology of labor. M.: UNITY, 1999, 407.
2. S. M. Bukhonova, Yu. A. Doroshenko. Theoretical and methodological foundations, economic assessment of labor potential. Russian
Entrepreneurship, 2004, (6), pp. 68–73.
3. A. Davletbaeva, K. Yusupov, Risks in using the labor potential of regions. RISK: resources, information, supply, competition , 2010,
(1), pp. 132–135.
4. A. Zinoviev, E. Schetinin, Methodological approaches to determining a comprehensive assessment of the labor potential of a re gion.
Bulletin of Altai science, (2–3), pp. 210–214.
5. V. A. Ilyin, K. A. Gulin, G. V. Leonidova, V. V. Davydova, The labor potential of the region: state and development. Vologda:
VNKTS CEMI RAS, 2004, 107 pp.
6. E. I. Krivokora, V. A. Fursov, A. I. Pyanov, E. A. Astakhova, Geopolitical factors of personnel security // Human Resources and
Intellectual Resources Management in Russia, (3), 2018, pp. 14–27.
7. T. Yu. Kryshtaleva, Methodology for assessing the state of the labor potential of the regions of the Russian Federation. World of
Economics and Management, 2017, 17 (3), pp. 35–46.
8. G. G. Melikyan, R. P. Kolosova, Labor Economics and Labor Relations: A Textbook. M. Chero. Moscow University Press, 1996, 623.
9. L. Migranova, M. Toksanbaeva, The quality of the labor potential of Russian regions. Population, 2014, (2), pp. 102–120.
10. Yu. G. Odegov, T. V. Nikonova, Audit and controlling of personnel: Textbook. M. Alfa-Press, 2010, 672.
11. Yu. G. Odegov, G. G. Rudenko, Personnel Economics. Part I. Theory: Textbook. M. Alfa-Press, 2009, 1056.
12. A. V. Popov, Comprehensive assessment of the labor potential of territories (on the example of constituent entities of the Russian
Federation) Belarusian Economic Journal, 2016, (1), pp. 83–94.
13. L. A. Popova, M. A. Terentyeva, A Comparative Assessment of the Labor Potential of the Northern Territories of Russia. Region :
Economics and Sociology, 2014, (1), pp. 29–45.
14. Regions of Russia. Socio-economic indicators: Stat. Sat M. Rosstat. Available: http://www.gks.ru/bgd/regl/B05_14p/Main.htm.
15. Regions of Russia. Socio-economic indicators: Stat. Sat M. Rosstat. Available: http://www.gks.ru/bgd/regl/B10_14p/Main.htm.
16. Regions of Russia. Socio-economic indicators: Stat. Sat M. Rosstat. Available: http://www.gks.ru/bgd/regl/B15_14p/Main.htm.
17. L. A. Tretyakova, M. A. Bessonova, E. N. Trofimenko, Essence of the category “labor potential”: socio -economic aspect. Regional
Economics: Theory and Practice, 2014, (34), pp. 2–10.
18. N. R. Khadasevich, Assessment of labor potential: approaches and methods. The online journal "Science of Science", 2014, (6).

Authors: Anna Balykina, Ilya Nikonov, Yuri Kuznetsov, Alexander Lunegov, Alesia Bakhta
Technology Development to Suppress the Campylobacter Jejuni in Intestinal Microflora of The
Paper Title:
Broilers by Lactobacilli
Abstract: This article presents a method for determining the microflora of the blind processes of the
intestines of broiler chickens receiving heterologous lactobacilli with anti-C.jejuni activity as a feed additive in
comparison with intact chickens. In the course of a scientific and production experiment on the Cobb 500 cross
broilers, an experiment was carried out to determine the total number of bacteria in the intestinal contents by
quantitative PCR. Sequencing was performed on a MiSeq genomic sequencer (Illumina, Inc., USA) using the
MiSeq Reagent Kit v3 kit (Illumina, Inc., USA). Data were obtained on the total number of bacteria and their
taxonomic diversity. As a result of the studies, it was shown that the microflora of broilers throughout the entire
maintenance period corresponded to the norm. The use of feed additives based on lactobacilli in general had a
positive effect on the state of microflora of the blind processes of the intestine..

281.
Keyword : probiotics, lactobacilli, broilers, Campilobacter jejuni antagonism, NGS, real-time quantitative
PCR. 1619-
1622
References:
1. Nikonov I., Yildirim E., Gorfunkel E., Ilina L., Laptev G., Novikova N., Fisinin V., Dubrovin A. Мetagenomic profiles of the
gastrointestinal tract in chicken embryos. The Proceedings of XXV World's Poultry Congress Abstracts. 2016. P. 529.
2. Ilyina L., Yildirim E., Nikonov I., Filippova V., Dubrovin A., Laptev G., Novikova N., Grozina A., Fisinin V. Bacterial commu nity in
broiler intestinal caeca in connection with nutritive diets of different composition. The Proceedings of XXV World's Poultry Congress
Abstracts. 2016. P. 87.
3. Ilina L.A., Yildirim E.A., Nikonov I.N., Filippova V.A., Laptev G.Y., Novikova N.I., Grozina A.A., Lenkova T.N., Manukyan V.A .,
Egorov I.A., Fisinin V.I. Metagenomic bacterial community profiles of chicken embryo gastrointestinal tract by using T-RFLP analysis.
Doklady Biochemistry and Biophysics. 2016. Т. 466. № 1. P. 47-51.
4. Ilyina L.A., Yildirim E.A., Nikonov I.N., Filippova V.A., and others. Gastrointestinal metagenomic landscape of chicken embryos using
the T-RFLP method. Reports of the Academy of Sciences, 2016; 466 (4): 482.
5. Park Y.H., Abdullah W.N., Liong M.T. Application of probiotics for the production of safe and high-quality poultry meat. Korean J food
Sci Anim Resour, 2016; 36:567-576.
6. Oakley B.B., Lillehoj H.S., Kogut M.H., and others. The chicken gastrointestinal microbiome. Author Notes. FEMS Microbiology
Letters, 2014; 360(2): 100–112.
7. Zaki M.M., Reda W.W. Campylobacter in poultry. Vet. Med. J., 1995; 43(1): 71–76,
8. Sundaresan N.R., Saxera V.R., Rani S., PreetiJain K.P. and others. Expression profile of myostatin mRNA during the embryonic
organogenesis of domestic chicken (Gallus gallusdomesticus). Research in Veterinary Science, 2008; 85(1): 86-91.
9. Rossi D.A., Fonseca B.B.; de Melo R.T., and others. Transmission of Campylobacter coli in chicken embryos. Braz. J. Microbiol., 2012;
43(2): 535-543.
10. Stanely D., Denman S.E., Hughes R.J., et al. Intestinal microbiota associated with differential feed conversion efficiency in chickens.
Appl. Microbiol. Biotechnol., 2012; 96: 1361-1369.
11. Mottet A., Tempio G. Global poultry production: current state and future outlook and challenges. WorldsPoultSci J., 2017; 73:245–256.
12. Ellis R.J., McSweeney C.S. Animal gut microbiomes. In Manual of environmental microbiology, 4th edn. American Society of
Microbiology. 2016. 4.4.3-1–4.4.3-7
13. Borda-Molina D., Seifert J., Camarinha-Silva A. Current perspectives of the chicken gastrointestinal tract and its microbiome. Comput
Struct Biotechnol J., 2018; 16:131–139.
14. Clavijo V., Flórez M.J.V. The gastrointestinal microbiome and its association with the control of pathogens in broiler chicken
production: a review. Poult Sci., 2018; 97:1006–1021.
15. Medvecky M., Cejkova D., Polansky O., Karasova D., Kubasova T. 2018. Whole genome sequencing and function prediction of 133 gut
anaerobes isolated from chicken caecum in pure cultures. BMC Genom 19:561.
16. Choi K.Y., Lee T.K., Sul W.J. 2015. Metagenomic analysis of chicken gut microbiota for improving metabolism and health of
chickens—a review. Asian Australas J AnimSci 28:1217–1225.
17. Humphrey S., Chaloner G., Kemmett K., Davidson N., Williams N., Kipar A., Humphrey T., Wigley P. 2014. Campylobacter jejuni i s
not merely a commensal in commercial broiler chickens and affects bird welfare. MBio 5:e01364-14.
18. Blake D.P., Hillman K., Fenlon D.R., Low J.C. Transfer of antibiotic resistance between commensal and pathogenic members of the
Enterobacteriaceae under ileal conditions. J Appl Microbiol., 2003; 95:428–436.
19. Xiao Y., Xiang Y., Zhou W., Chen J., Li K., Yang H. Microbial community mapping in intestinal tract of broiler chicken. Poult Sci.,
2016; 96:1387–1393.
20. Lu J., Idris U., Harmon B., Hofacre C., Maurer J.J., Lee M.D. Diversity and succession of the intestinal bacterial community of the
maturing broiler chicken. Appl Environ Microbiol., 2003; 69:6816–6824.
21. Rinttilä T., Apajalahti J. Intestinal microbiota and metabolites—implications for broiler chicken health and performance. J Appl Poult
Res., 2013; 22:647–658.

Authors: Anzhelika Dosenko, Oksana Gerachkovska, Viktoria Shevchenko, Аnastasiia Bessarab

Paper Title: Media as a Tool for Forming the President's Image (On the Example of the 2019 Election Process)
Abstract: The article deals with notion of the a politician image, in particular the president, as well as the
tools of forming it through the media in Ukraine using the example of the president’s elections 2019. His
benevolent attitude and increasing confidence of Ukrainians in his activities and extrapolated them to the events
of 2019. The article deals with the technology of comparative analysis of portrait representation on television
and Internet portals of influential Ukrainian media. The authors selected powerful Ukrainian television media,
such as 1 + 1 (TSN), ICTV (Facts), Channel 5 (news), STB (News windows), 112 (news112) for the study. On
each TV channel and site, the content not only contributed to the formation of a portrait of the president, but
gave his own attitude to it. A pilot sociological research has been conducted by the authors revealed the level of
Ukrainians’ confidence in the newly elected President of Ukraine. The survey covered the period from the 1-st
of April till the 5-th of July 5, 2019. The survey was conducted from the 11-th till the 17-th of June 2019. A total
of 1,100 recipients participated in the survey.

282. Keyword : presidential image, media, image forming tools, image communication, confidence level,
television media. 1623-
References: 1628
1. Denisyuk S. (2003) The formation of a positive image of Ukraine in the conditions of globalization. State and Law: Coll. Sciences. BC
Legal and Political Science. - Kiyv, State and Law department, Ukraine. P. 648–654.
2. Denisyuk S. (2005) Political Image as a Reflection of the Political Consciousness of Ukrainian Citizens in the Conditions of Social and
political transformations New Paradigm: Journal of Scientific Works. Kyiv, Publishing house of NPU by M.P. Drahomanov. P. 133 -
140
3. Denysyuk S. (2007) The image of a political leader in the context of the development of Ukrainian political culture: peculiarities of
formation and mechanisms of implementation: author. diss. for the sciences. degree of Doctor of Economics. Sciences: Special.
23.00.03 - «Political Culture and Ideology» Kyiv. P. 18
4. Gackowski T. (2013) Poland Political Image as the Substance of the Political Communication in the Era of PostPoliticsю Online
Journal of Communication and Media Technologies. P. 43- 45
5. Lalancette M., Raynauld V. (2017) The Power of Political Image: Justin Trudeau, Instagram, and Celebrity Politics. American
Behavioral Scientist. P. 112-121
6. McNair B. (2011) An Introduction to Political Communication, fifth edition; Routledge: London and New Yorkp. P. 274
7. Ogilvy D. (1955) The image of the brand – a new approach to creative operations, Reprinted by Courtesy of Ogilvy & Mather. P. 345
8. Pocheptsov G. (2004) From Pharaoh to President. Kiyv, Adef-Ukraine. P. 328
9. Sharlamanov K., Jovanoski F. (2014) The Role of Image in the Political Campaigns // International Journal of Scientific & Engineering
Research, Vol. 5, p. 599-60

Authors: Chandrashekar D K, Srikantaiah K C, Venugopal K R,

Paper Title: Big Data Analytics for Deriving Business Intelligence Rules
Abstract: Big data is a large volume of data pool and processing and analyzing these data is tedious jobs.
283. The aim of fulfilling huge information storage needs is that the structural transformation of repository system
using traditional approaches to NoSQL technology. However, the existing technologies for storage are
1629-
inefficient since, they do not generated data that are scalable, consistent and solutions for rapidly evolving
1637
diversified data. The primary method for storing huge amounts of data is used for analytics in real time
applications like healthcare, scientific experiments, e-business and networks. In this paper, it is in sighted the
characteristics, application, tools of big data, Technologies, Big data analytics, challenges and issues in Big data.
Keyword : Big Data Analytics, Hadoop, Map Reduce Structured Data, Semi Structured and Unstructured
Data
References:
1. A. Alexandrov“The Stratosphere platform for big data analytics,”VLDB J., vol. 23, no. 6, pp. 939–964, 2014.
2. R. Sellami, S. Bhiri, and B. Defude“Supporting multi data stores applications in cloud environments,” IEEE Trans. Services Co mput.,
vol. 9, no. 1, pp. 59–71, Jan./Feb. 2016.
3. D. Wu, S. Sakr, L. Zhu, and Q. Lu “Composable and efficient functional big data processing framework,” in Proc. IEEE Int. Conf.
Big Data, 2015, pp. 279–286.
4. S. Ji, W. Li, S. Yang, P. Mittal, and R. Beyah “On the relative de-anonymizability of graph data: Quantification and evaluation,” in
IEEE INFOCOM 2016—The 35th Ann. IEEE Int. Conf. Comput. Commun., 10-14 Apr. 2016, doi: 10.1109/
INFOCOM.2016.7524585.
5. Y. Zhu, H. Jiang, J. Wang, and F. Xian “HBA: Distributed metadata management for large cluster-based storage systems,” IEEE
Trans. Parallel Distrib. Syst., vol. 19, no. 6, pp. 750–763, Jun. 2008.
6. L. Chen “Optimizing Map Reduce for GPUs with effective shared memory usage,” in Proc. 21st Int. Symp. High -Performance
Parallel Distrib.Comput., 2012, pp. 199–210.
7. L. Zhao, Z. Chen, Z. Yang, and Y. Hu, “A hybrid method for incomplete data imputation,” in Proc. 17th IEEE Int. Conf. High
Performance Comput. Commun., 2015, pp. 1725–1730.
8. Hagras T, Janecek J. A simple scheduling heuristic for heterogeneous computing environments[C]//Proceedings of the Second
international conference on Parallel and distributed computing. IEEE Computer Society, 2003: 104-110.
9. S. Hoch Reiter, J.“Long short-term memory.Neural Computation, 9(8), p. 1735-1780, 1997.
10. A. Sheth“Transforming big data into smart data: Deriving value via harnessing volume, variety, and velocity using semantic
techniques and technologies,” in Proc. 30th IEEE Int. Conf. Data Eng.,2014, Art. no. 2.
11. Xuhong Zhang World economic forum, “Big data, big ImpactNew possibilities for international development,” 2012.[Online].
Available: http:// www3.weforum.org/docs/WEF_TC_MFS_BigDataBigImpact_Briefing_2012.pdf
12. Liang Zhang“Big data across the Federal government”, 2014.[Online].
Available:http://www.whitehouse.gov/sites/default/files/microsites/ ostp/big_data_fact_sheet_final_1.pdf
13. H. Giersch “Urban Agglomeration and Economic Growth”. Berlin, Germany: Springer, 2012.
14. R. B. EkelundJr and R. F. Hbert “A History of Economic Theory and Method”. Long Grove, IL, USA: Waveland Press, 2013.
15. B. Liddle“The energy, economic growth, urbanization nexus across development: Evidence from heterogeneous panel estimates robust
to cross-sectional dependence,” Energy J., vol. 34, no. 2, pp. 223–244, 2013.
16. S. Ghosh and K. Kanjila“Long-term equilibrium relationship between urbanization, energy consumption and economic activity:
Empirical evidence from India,” Energy, vol. 66, no. 3, pp. 24–331, 2014.
17. S. H. Law and N. Singh “Does too much finance harm economic growth?” J. Banking Finance, vol. 41, no. 4, pp. 36–44, 2014.
18. D. Baglan and E. Yoldas “Non-linearity in the inflation-growth relationship in developing economies: Evidence from a semiparametric
panel model,” Econ. Lett., vol. 125, no. 1, pp. 93–96, 2014.
19. Q. Ashraf and O. Galor“The ‘Out of Africa’ hypothesis, human genetic diversity, and comparative economic development,” Amer.
Econ. Review, vol. 103, no. 1, pp. 1–46, 2013.
20. V. Bol_on-Canedo, N. S_anchez-Marono, and A. Alonso-Betanzos “A review of feature selection methods on synthetic data,”
Knowl.Inf. Syst., vol. 34, no. 3, pp. 483–519, 2013.
21. S. Alelyani, J. Tang, and H. Liu “Feature selection for clustering: A review,” Data Clustering: Algorithms Appl., Florida, USA: CRC
Press, 2013.
22. M. A. Hall “Correlation-based feature selection for machine learning,” Ph.D. dissertation, Dept. Comput. Sci., Univ. Waikato,
Hamilton, New Zealand, 1999.
23. M. Dash and H. Liu“Consistency-based search in feature selection,” Artificial Intell., vol. 151, no. 1, pp. 155–176, 2003.
24. M. A. Hall and L. A. Smith “Practical feature subset selection for machine learning,” in Proc. 21st Australian Comput. Sci. Conf.,
1998, pp. 181–191.
25. L. Beretta and A. Santaniello “Implementing ReliefF filters to extract meaningful features from genetic lifetime datasets,” J.
Biomed.Informat., vol. 44, no. 2, pp. 361–369, 2011.
26. Q. Gu, Z. Li, and J. Han “Generalized Fisher score for feature selection,” in Proc. 27th Conf. Annu. Conf. Uncertainty Artif.Intell.,
2011, pp. 266–273.
27. H. Peng, F. Long, and C. Ding “Feature selection based on mutual information criteria of max-dependency, max-relevance, and
minredundancy,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 27, no. 8, pp. 1226–1238, Aug. 2005.
28. I. H. Witten and E. FrankData Mining: Practical Machine Learning Tools and Techniques. SanMateo,CA, USA:Morgan Kaufmann,
2005.
29. J. G. Dy and C. E. Brodley“Feature subset selection and order identification for unsupervised learning,” in Proc. Int. Conf. Mach.
Learn., 2000, pp. 247–254.
30. P. S. Bradley and O. L. Mangasarian “Feature selection via concave minimization and support vector machines,” in Proc. Int. Conf.
Mach. Learn., 1988, pp. 82–90.
31. A. Rakotomamonjy “Variable selection using SVM based criteria,” J. Mach. Learn. Res., vol. 3, no. 3, pp. 1357–1370, 2003.
32. M. Mejła-Lavalle, E. Sucar, and G. Arroyo“Feature selection with a perceptron neural net,” in Proc. Int. Workshop Feature Selection
Data Mining, 2006, pp. 131–135.
33. G. C. Cawley, N. L. C. Talbot, and M. Girolami “Sparse multinomial logistic regression via Bayesian L1 regularisation,” in Proc.
Advances Neural Inf. Process. Syst., 2007, pp. 209–216.
34. https://www.sas.com/en_in/insights/big-data/hadoop.html

Authors: Pradip Kumar Nanda, Shiva Prasad Das, Soumya Ranjan Panda, Debabrata Singh

Paper Title: Impact of Structural Aspect, Metal Gate and Channel Material on UTB-SOI-MOSFET
Abstract: Ultra Thin Body Silicon on Insulator Metal Oxide Semiconductor Field Effect Transistors (UTB-
SOI-MOSFETs) provide better immunity to Short Channel Effects (SCEs). But the behaviour changes at
miniaturization and still the many unexplored effects need to be analysied. Here in this paper, Drain Induced
284. Barrier Lowering (DIBL) and sub-threshold Slope (SS) variation of a n-channel UTB-SOI-MOSFET have been
analyzed by changing the device structural aspects like gate length (LG), BOX thickness (tBOX) and Silicon 1638-
film thickness (tSi). Also, the effect of intrinsic parameters as metal gate work function and channel material 1642
variation on DIBL and sub-threshold Slope (SS) variation has been analyzed.

Keyword : UTB-SOI-MOSFETs, SCEs, DIBL, Sub-threshold Slope, BOX thickness


References:
1. Kushwaha, Pragya, Navid Paydavosi, Sourabh Khandelwal, Yogesh Singh Chauhan. "Modeling the impact of substrate depletion in
FDSOI MOSFETs." Solid-State Electronics 104 (2015): 6-11.
2. Loan, Sajad A., S. Qureshi, and S. Sundar Kumar Iyer. "A novel partial-ground-plane-based MOSFET on selective buried oxide: 2-D
simulation study." IEEE Transactions on Electron Devices 57, no. 3 (2010): 671-680.
3. Roy, Kaushik, and Kiat Seng Yeo. "Low voltage, low power VLSI subsystems." McGraw-Hill Professional. Fig 2 (2004): 44.
4. Kumar, M. Jagadesh, and Anurag Chaudhry. "Two-dimensional analytical modeling of fully depleted DMG SOI MOSFET and
evidence for diminished SCEs." IEEE Transactions on Electron Devices 51, no. 4 (2004): 569-574.
5. Colinge, J-P. Silicon-on-insulator technology: materials to VLSI: materials to Vlsi. Springer Science & Business Media, 2004.
6. Colinge, J. P. "The new generation of SOI MOSFETs." Rom. J. Inf. Sci. Technol 11, no. 1 (2008): 3-15.
7. Chang, Leland, Kevin J. Yang, Yee-Chia Yeo, Igor Polishchuk, Tsu-Jae King, and Chenming Hu. "Direct-tunneling gate leakage
current in double-gate and ultrathin body MOSFETs." IEEE Transactions on electron devices 49, no. 12 (2002): 2288-2295.
8. Wong, H-SP, David J. Frank, and Paul M. Solomon. "Device design considerations for double-gate, ground-plane, and single-gated
ultra-thin SOI MOSFET's at the 25 nm channel length generation." In International Electron Devices Meeting 1998. Technical Digest
(Cat. No. 98CH36217), pp. 407-410. IEEE, 1998.
9. Sahu, Chitrakant, Jawar Singh, and P. N. Kondekar. "Investigation of ultra-thin BOX junctionless transistor at channel length of 20
nm." In 2013 IEEE International Conference of Electron Devices and Solid-state Circuits, pp. 1-2. IEEE, 2013.
10. K. P. Pradhan, D. Singh, S. K. Mohapatra, and P. K. Sahu, “Assessment of III-V FinFETs at 20 nm node : A Process variation
analysis,” vol. 57, pp. 454–459, 2015.
11. K. Biswas, A. Sarkar, and C. K. Sarkar, “Impact of barrier thickness on Analog, RF & Linearity performance of Nanoscale DG
Heterostructure MOSFET,” Superlattices Microstruct., 2015.
12. Atlas User Manual. SILVACO Int., SantaClara, 2008.
13. H. A. El Hamid, J. R. Guitart, and B. Iñíguez, “Two-dimensional analytical threshold voltage and subthreshold swing models of
undoped symmetric double-gate MOSFETs,” IEEETrans.ElectronDevices, vol. 54(6), pp. 1402–1408., 2007.
14. Arden, Wolfgang M. "The international technology roadmap for semiconductors—perspectives and challenges for the next 15
years." Current Opinion in Solid State and Materials Science 6, no. 5 (2002): 371-377.
15. Mohapatra, S. K., K. P. Pradhan, and P. K. Sahu. "Temperature dependence inflection point in Ultra-Thin Si directly on Insulator
(SDOI) MOSFETs: An influence to key performance metrics." Superlattices and Microstructures 78 (2015): 134-143.
16. Chakraborty, Saurav, Abhijit Mallik, and Chandan Kumar Sarkar. "Subthreshold performance of dual-material gate CMOS devices
and circuits for ultralow power analog/mixed-signal applications." IEEE Transactions on Electron Devices 55, no. 3 (2008): 827-832.
17. Shockley, W. T. R. W., and W. T. Read Jr. "Statistics of the recombinations of holes and electrons." Physical review 87, no. 5 (1952):
835.
18. Hall, Re N. "Electron-hole recombination in germanium." Physical review 87, no. 2 (1952): 387.
19. Lombardi, Claudio, Stefano Manzini, Antonio Saporito, and Massimo Vanzi, "A physically based mobility model for numerical
simulation of nonplanar devices." IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 7, no. 11 (1988):
1164-1171.
20. Selberherr, Siegfried. Analysis and simulation of semiconductor devices. Springer Science & Business Media, 2012.
21. TD Das, R Pradhan, D Singh, A Rath, S Pattnaik, “ Performance Analysis of Devices in Double Gate MOSFET”, International
Journal of Engineering and Advanced Technology (IJEAT) 7,4(2017) ,131-136.

Authors: CMAK Zeelan Basha, G Swetha , A Likhitha , J Bhargavi

Paper Title: Service Now Based Course Registration System


Abstract: In the past few decades, Course Registration for a particular student in an university is a very
difficult task. It consumes lot of time and man power to complete the task manually. This is because of the
increase in the number of students in the university every year. So to reduce all the effort we implemented this
project using a cloud based platform called Servicenow. The main theme of the project Course Registration
System is to develop a registration system that will completely automate the process of a new student
registration in an university.The system will be cloud based and will have two implementations i.e client
side(Student) and server side(Admin). The server side implementation can be accessed over the university only
when the student starts registration for the particular course.Johnson and Manning (2010) explicit that the two
biggest variations between registering on-line and mailing in your work square measures time and technology. It
will take time once users ought to fill in the form manually, and then submit it in other places. Rather than
taking time, technology has helped us to create the registration procedure into the next level. You will be able to
notice additional data regarding the courses you wish to acquire and in the same time fill up the form, pay the
fees, etc. The management that receives registration data most probably will process the information in same
system, so by using online course registration and management system, we can save time.
285.
Keyword : Service Portal, Client Scripts(onChange), UI policies, Notifications. 1643-
1646
References:
1. J.selvakumar,A.Lakshmi,T.Arivoli. IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -
2012) March 30, 31, 2012 .“Brain Tumor Segmentation and Its Area Calculation in Brain MR Images using K-Mean Clustering and
Fuzzy C-Mean Algorithm”
2. Vinay Parameshwarappa, Nandish S (2014) “A Segmented
Morphological Approach to Detect Tumour in Brain Images“ International Journal of Advanced Research in Computer Science and
Software Engineering.vol 4.
3. Jay Patel and Kaushal Doshi. Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 3 (2014),“A Study
of Segmentation Methods for Detection of Tumor in Brain MRI”.
4. Vishal B. Padole, D. S. Chaudhari, International Journal of Electronics, Communication & Soft Computing Science and Engineering
(IJECSCSE) Volume 1, “A Review of Segmentation Methods for Detection of Brain Tumor in MRI”.
5. Sudipta Roy,Sanjay Nag,Indra Kanta Maitra, International Journal of Electronics, Communication & Soft Computing Science and
Engineering (IJECSCSE) Volume 3, Issue 6.
6. Rohan Kandwal, Ashok Kumar( 2014) “An Automated System for Brain Tumor Detection and Segmentation”
7. Jobin Christ M.C. 1, Dr. Parvathi R.M.S. IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, July 2012”Brain
Tumors: An Engineering Perspective”.
8. C M A K. Zeelan Basha, Maruthi Padmaja, and G.N.Balaji,“Computer Aided Fracture Detection System” Journal of Medical Imaging
and Health Informatics Vol. 8, 526–531, 2018.
9. Azmira Krishna, CMAK Zeelan Basha, Pradeep Raj Savarapu, Soumya Ranjan Nayak, S. Sivakumar ” Multi Target Tracking Access
with Data Association in Distributed Camera Networks”, International Journal of Recent Technology and Engineering
(IJRTE),vol.8,412-417.
10. Cmak Zeelan basha, Azmira Krishna, Pradeep Raj Savarapu “Automatic Detection of Lung Infection”, International Journal of Recent
Technology and Engineering (IJRTE), Volume-8,200-203.

Authors: Cmak Zeelan Basha, S. Srinivasa Rao, P Lavanya Lahari, B Navya, SVS Divya

Paper Title: An Effective And Robust Computerized Library Management System


Abstract: Earlier Librarian needs to keep the track of books manually which consumes more time. With
the advancement of new technology, Library Management System which aims in developing a computerized
system that manages and stores the books information electronically. In this paper we provide an efficient access
over library system application that was developed through ServiceNow platform. In ServiceNow platform we
can easily develop the applications and automate the things in very less time.[1]The main purpose of this paper
is to provide an easy access to library. And also to provide the details of library books, issue of books and notify
the user about due dates of book being issued. This application helps the user to access the information of the
books which saves time and energy. Errors are also avoided by allowing the system to keep the track of
information such as issue date, due date to return the book by sending notifications to the user. In this
application we have used the concepts like Form Designer,Service portal, Client Scripts, Notifications, Events
and Scheduled scripts.[2]Thus, this application reduce manual work to a great extent and allows smooth flow of
library activities.

286. Keyword : Form Designer, Service portal, Client Scripts, Notifications, Events, and Scheduled scripts.
1647-
References: 1649
1. Songsak Channarukul and Nattachai Saejiem “Social-aware automated course planner: An integrated recommender system for
university registration system” IEEE [Feb. 1, 2017].
2. Amer Al-Badarenah, Jamal Alsakran, "An Automated Recommender System for Course Selection", International Journal of Advanced
Computer Science and Applications (ijacsa), vol. 7, no. 3, 2016.
3. Calhoun, Vince D., and Tulay Adali. "Feature-based fusion of medical imaging data." IEEE Transactions on Information Technology in
Biomedicine 13.5 (2009): 711-720.
4. Petkov N. Biologically motivated computationally intensive approaches to image pattern recognition. Future Generation Computer
Systems. 1995 Aug 1;11(4-5):451-65.
5. C M A K. Zeelan Basha, Maruthi Padmaja, and G.N.Balaji,“Computer Aided Fracture Detection System” Journal of Medical Imaging
and Health Informatics Vol. 8, 526–531, 2018.
6. Azmira Krishna, CMAK Zeelan Basha, Pradeep Raj Savarapu, Soumya Ranjan Nayak, S. Sivakumar ” Multi Target Tracking Access
with Data Association in Distributed Camera Networks”, International Journal of Recent Technology and Engineering
(IJRTE),vol.8,412-417.
7. Cmak Zeelan basha, Azmira Krishna, Pradeep Raj Savarapu “Automatic Detection of Lung Infection”, International Journal of Recent
Technology and Engineering (IJRTE), Volume-8,200-203.
8. Azmira Krishna, Cmak Zeelan Basha, Syed Karimunnisa
” Computerized Face Detection and Tracking” International Journal of Innovative Technology and Exploring Engineering (IJITEE) ,
Volume-8 Issue-12, October 2019

Authors: L.Sujihelen, C.Senthilsingh, M.PavithraJyothi

Paper Title: Secure Bus Ticket Generation


Abstract: For the past years, using of public transport especially local buses has lost the number of
passengers getting into the buses due to lack of bus availability, time constraints and change(Rupees) constraint.
The objective of this application is to attract passengers by implementing new technologies like Android and
Secure Key Generation instead of using old technologies like QR Scanners and RFID readers which has some
security problems. It totally has two android applications one is Passenger application and another is for
Conductor. Through Passenger application he/she has to generate a unique four digit code which will be valid
for 3 minutes. The unique four digit code will be generated automatically in a Passenger application after
logging in with details which they used while registering in the application. Whereas in Conductor application,
Conductor has to enter the 4 digit code generated in an Passenger application in order to identify the passenger.
Now conductor has to enter the Source and Destination location of the passenger and Number of passengers. The
Fare will be calculated based on Number of passengers and Price from the source to destination which is the
287. value already stored in a database by an administrator. This fare will be debited automatically from Passenger
application wallet and Ticket will be generated with a ID which will be sent to passenger via a notification and 1650-
an SMS. 1653

Keyword : Bus Ticketing System, Conductor, OTP, Passenger, Secure code.


References:
1. K.Seibenhandl , “Bus Tracking & Ticketing using USSD Real-time application of USSD Protocol in Traffic Monitoring”, Journal of
Emerging Technologies and Innovative Research (JETIR), Volume 1 Issue 7, 2014.
2. Naveen Kumar G, Pavithra S, Pallavi J, Kalpana P, Hari Kumar P, “Smart Bus Ticketing System using QR code in android
application”, International Journal Of Advancement In Engineering Technology, Management and Applied Science (IJAETMAS),
Volume 05, Issue 02, 2018, PP. 80-89.
3. Monalisa Lopes, Grishma Shah, Saloni Sheyte, Sohagani Shah, “Secure Bus- Ticketing System using NFC”, Int. Journal of
Engineering Research and Applications, Vol. 5, Issue 4, 2015, pp.43-45.
4. Nikhitha Patil, Adarsh K, “Android Bus Ticketing System”, International Journal Of Electrical, Electronics And Data Communication,
Volume 5, Issue 10, 2017.
5. Sulis Sandiwarno, “Design model of Bus Ticketing System by Seating at PT. XYZ”, International Journal of Computer Science and
Mobile Computing, Vol. 7, Issue. 3, 2018, pg.1 – 7.
6. Sana Khoja, Maithilee Kadam, “Android suburban railway ticketing with GPS as ticket checker”, 2012 IEEE International Conference
on Advanced Communication Control and Computing Technologies (ICACCCT) , 2012.
7. Paul Hamilton, Suresh, “Mobile enabled bus tracking and ticketing system”, 2nd International Conference on Information and
Communication Technology (ICoICT), 2014.
8. Ahmed K. Ibrahim and Azman B Ta'a, “Mobile enabled bus tracking and ticketing system”, 2014 2nd International Conference on
Information and Communication Technology (ICoICT), 2014.
9. U. Biader , C.M Medaglia , A. Marino, “Mobile ticketing with NFC management for transport companies”, 2013 5th International
Workshop on Near Field Communication (NFC), 2013.
10. Sivakumar Duraisamy, Jamilu Umar Abuhuraira, “Android Mobile Application for Online Bus Booking System”, International Journa l
of Information System and Engineering, Vol. 6 (No.1), 2018.
11. K Haripriya, G Harshini, L.Sujihelen,“Survey on Efficient Automated Toll System for License Plate Recognition Using Open CV”,
2018 International Conference on Emerging Trends and Innovations In Engineering And Technological Research (ICETIETR),
2018,pp.1-6.
12. Suji Helen, Venkada Naarayanan, Thiagarajan, “Large Scale Collaborative Wildlife Monitoring Using Raspberry Pi”, Internationa l
Journal of Pure and Applied Mathematics, 2017.

Authors: Mukesh Kumar Solanki, K. R. Aharwal


Thermo-Hydraulic Performance of a Rectangular Duct With Staggered Inclined Discrete Rib
Paper Title:
Arrangement
Abstract: Artificial roughness in the form of ribs is a beneficial strategy to improve the thermal
performance of solar air heaters (SAHs). In the present research work, experimental examinations have been
conducted on heat transfer and friction characteristics in the rectangular channel, which is roughened through the
inclined discrete ribs. The inclined ribs were discretized by creating gaps at the different positions (not inline) on
trailing and leading edges in consecutive ribs The rib roughness has relative roughness pitch as 8.0, rib
combination of relative gap position is varied from 0.3 & 0.1 to 0.3 & 0.4, and mass flow rate varies between
3000 -14,000 and rib gap width as 1. The higher improvement in the Nusselt number and factor of friction
coefficient is obtained to be 2.92 and 3.33 times respectively, as compared with that of the smooth duct. The
higher thermo-hydraulic performance parameter (THPP) is obtained for the combination of relative gap position
of 0.3 & 0.3.

Keyword : Combination of relative gap position, Friction factor, Gap width, Nusselt Number, Reynolds
number, and Thermo hydraulic performance (THP).
References:
1. Han JC, Glicksman LR, Rosenow WM, (1978). Investigation of heat transfer and friction for rib-roughened surfaces. International
288. journal of heat mass transfer; 21:1143–56.
2. Lau SC, McMillin RD, Han JC, (1991). Turbulent heat transfer and friction in a square channel with discrete rib turbulators.
Transactions of the ASME, Journal of Turbomachinery; 113 (3): 360–366. 1654-
3. Lau SC, McMillin RD, Han JC, (1991). Heat transfer characteristics of turbulent flow in a square channel with angled rib. Transactions 1658
of the ASME, Journal of turbomachinery; 113 (3): 367–374.
4. Han JC, Park JS, (1988). Developing heat transfer in rectangular channels with rib turbulators. International journal of heat mass
transfer; 3 (1): 183–195.
5. Han JC, Zhang YM, (1992). High performance heat transfers ducts with parallel broken and V-shaped broken ribs. International
journal of heat mass transfer; 35 (2): 513–523.
6. Cho HH, Wu SJ, Kwon HJ, (1999). Local heat/mass transfer measurement in a rectangular duct with discrete ribs. Transaction of the
ASME Proceeding, Heat transfer, Volume 3, ISBN: 978–07918–7860–6.
7. Cho HH, Kim YY, Rhee DH, Lee SY, Wu SJ, Choi CK, (2003). The effect of gap position in discrete ribs on local heat/mass transfer
in a square duct. Journal of enhanced heat transfer; 10 (3): 287–300.
8. Aharwal KR, Gandhi BK, Saini JS, (2008). Experimental investigation of heat-transfer enhancement due to a gap in an inclined
continuous rib arranged in a rectangular duct of solar air heater. Renewable energy; 33 (4): 585–596.
9. Aharwal KR, Gandhi BK, Saini JS, (2009). Heat transfer and friction characteristics of solar air heater ducts having integral inclined
discrete ribs on absorber plate. International journal of heat mass transfer; 52 (25-26): 5970–5977.
10. Duffie JA, Beckman WA, (1980). Solar energy, thermal processes. New York: Wiley and Sons, p. 211.
11. Saini JS, (2004). Use of artificial roughness for enhancing performance of solar air heater. Proceedings of XVII National and VI
ISHME/ ASME, Heat and mass transfer, conference, January 05–07, 2004. IGCAR, Kalpakkam, India.
12. Karwa R, Solanki SC, Saini JS, (2001). Thermo-hydraulic performance of solar air heaters having integral chamfered rib roughness on
absorber plates, Energy, 26 (2), 161–76.
13. Varun, Saini RP, Singal SK, (2008). Investigation of thermal performance of solar air heater having roughness elements as a
combination of inclined and transverse ribs on the absorber plate, Renewable Energy, 33 (6), 1398-405.
14. Lewis MJ, (1975). Optimizing the thermo hydraulic performan ce of rough surface. International journal of heat mass transfer;
18 (11): 1243–1248.

Authors: Aneesh V Bhat, Sunil Kumar Tengli


Behaviour of Ground Granulated Blast Furnace Slag Concrete in Marine Environment under
Paper Title:
Chloride Attack
Abstract: In conventional concrete, one of the ingredients Cement is partially replaced by Ground
Granulated Blast Furnace Slag and its nature is studied in this project.. In the present paper, a comparison of
289. Chloride ion penetration is been done on Concrete specimens with partial GGBS replacement. Two tests have
been performed on the concrete specimens in both normal environment and artificial marine environment. One is
1659-
the conventional RCPT and the other one is the chloride ion penetration test using silver nitrate. Comparison of
1664
both the tests under normal and marine environment is the main aim of this paper. After compiling the data both
RCPT and the Chloride ion penetration test goes hand in hand and this proves the compatibility of the new
chloride ion penetration test using silver nitrate. This work has the comparison of the concrete specimens in
normal and marine environments as well with different levels of GGBS replacement.
Keyword : RCPT, GGBS, present paper,
References:
1. Saravanan Ramalingam and Manu Santhanam, “Environmental exposure classifications for concrete construction – A relook”, The
Indian Concrete Journal MAY 2012
2. Kohei Eguchi, Koji Takewaka, Toshinobu Yamaguchi and Naomichi Ueda, “A Study on Durability of Blast Furnace Slag Cement
Concrete Mixed With Metakaolin-Based Artificial Pozzolan in Actual Marine Environment” Third international conference on
construction materials
3. B.S. Dhanya, Manu Santhanam, Vijay Kulkarni, Prakash Nanthagopalan, Shashank Bishnoi, S.P. Singh, G. Indu Siva Ranjani, P.
Dinakar, and S. Bhaskar, “Round robin testing of durability parameters – Towards identification of suitable durability tests for
concrete”, The Indian concrete journal July 2017
4. S. Sahoo, P.K. Parhi and B.C. Panda, “Strength and durability characteristics of cement mortar” The Indian concrete journal July 2017
5. Arun K. Chakraborty and Sandip Mondal, “Bacterial concrete: A way to enhance the durability of concrete structures” The India n
concrete journal July 2017
6. Saarthak Surana, Radhakrishna G. Pillai and Manu Santhanam, “Performance evaluation of field curing methods using durability index
tests” The Indian concrete journal July 2017
7. Aditya S. Rajput and Umesh K. Sharma, “Durability and serviceability performance of GFRP rebars as concrete reinforcement” The
Indian concrete journal July 2017
8. Naveena M.P., G. Narayana and Ravichandra R., “Study on strength and durability properties of fly ash aggregates concrete” Th e
Indian concrete journal July 2017
9. Vinayak Awasare, Prof. M. V. Nagendra, “ANALYSIS OF STRENGTH CHARACTERISTICS OF GGBS CONCRETE”,
International Journal of Advanced Engineering Technology E-ISSN 0976-3945
10. Anand V R, Prof. Dr. A. V. Pradeep Kumar, Aneesh V Bhat, “An experimental investigation on theperformance of hig h volume
ground granulated blast furnace slag concrete” International Journal of Civil Engineering and Technology (IJCIET) Volume 8, Issue 2,
February 2017, pp. 328–337
11. SHAHAB SAMAD, ATTAULLAH SHAH and MUKESH C LIMBACHIYA, “Strength development characteristics of concrete
produced with blended cement using ground granulated blast furnace slag (GGBS) under various curing conditions”, Sa¯dhana¯ Vol.
42, No. 7, July 2017, pp. 1203–1213
12. RAJESH KUMAR, AMIYA K. SAMANTA2 AND D. K. SINGHA ROY, “Characterization and development of eco-friendly concrete
using industrial waste – A Review”, Journal of Urban and Environmental Engineering, v.8, n.1 p. 98-108, 2014
13. KELIANG LI, “Ocean Engineering Concrete using High-volume GGBS”, Applied Mechanics and Materials Vol. 238 (2012) pp 71-74
14. J. WAWRZEŃCZYK, T. JUSZCZAK, and A. MOLENDOWSKA “Determining equivalent performance for frost durability of
concrete containing different amounts of ground granulated blast furnace slag”, Bulletin of the polish academy of sciences technical
sciences, vol. 64, no. 4, 2016
15. RAFAT SIDDIQUE “Utilization (recycling) of iron and steel industry by-product (GGBS) in concrete: strength and durability
properties”, J Mater Cycles Waste Manag (2014) 16:460–467
16. CHITHRA D , NAZEER M “Strength and Chloride Permeability Studies on Ground Granulated Blast Furnace Slag Admixed Medium
Strength Concrete”, ©2012 IEEE
17. GÉRALDINE VILLAIN, RAELIZE DU PLOOY, AMINE IHAMOUTEN, SERGIO PALMA-LOPES, BENOIT THAUVIN3,
XAVIER DÉROBERT “Use of electromagnetic non-destructive techniques for monitoring the chloride ingress into concrete”,©2013
IEEE
18. SANTOSH KUMAR KARRI, G.V.RAMA RAO, P.MARKANDEYA RAJU “Strength and Durability Studies on GGBS Concrete”,
SSRG International Journal of Civil Engineering (SSRG-IJCE) – volume 2 Issue 10 October 2015
19. S. PAVÍA AND E. CONDREN “Study of the Durability of OPC versus GGBS Concrete on Exposure to Silage Effluent” Journal of
materials in civil engineering © asce / april 2008
20. M. VIJAYA SEKHAR REDDY AND M.C. NATARAJA, “Performance of standard and high strength concrete mixes consisting of
different combination of supplementary cementing materials based on RCPT”, The Indian Concrete Journal, December 2017, Vol. 91,
Issue 12, pp. 19-26.

Authors: V Yegnanarayanan, Veena Narayanan, R Srikanth

Paper Title: On Infinite Number of Solutions for one type of Non-Linear Diophantine Equations
Abstract: In this article, we prove that the non-linear Diophantine equation 𝑦 = 2𝑥1𝑥2 …𝑥𝑘 + 1; 𝑘 ≥ 2, 𝑥𝑖
∈ 𝑃 − {2}, 𝑥𝑖′𝑠 are distinct and P is the set of all prime numbers has an infinite number of solutions using the
notion of a periodic sequence. Then we also obtained certain results concerning Euler Mullin sequence.

Keyword : Prime number; Diophantine equation; Periodic sequence, Periodic function.

290. References:
1. D. A. Cohen and T. M. de Karz, Prime numbers and the first digit phenomenon, J. Number Theory. 18 (1984) 261–268.
2. T. M. Apostol, Introduction to Analytic number theory, Springer International student edition, Fifth reprint, Narosa Publishing house, 1665-
(1995) pp. 146-156. 1669
3. J. W. Porrars Ferreira, The pattern of prime numbers, Applied Mathematics. 8 (2017) 180–192.
4. Smarandache, article prime conjecture, Collected papers Vol.2, Moldova State university press, Kishinev, (1997) pp.190.
5. A. A. Mullin, Recursive function theory (a modern look at a Euclidean idea), Bull. Amer. Math. Soc. 69 (1963) 737.
https://doi.org/10.1090/S0002-9904-1963-11017-4
6. C. D. Cox and A. J. Van der Poorten, On a sequence of prime numbers, J. Austral. Math. Soc. 8 (1968), 571– 574.
https://doi.org/10.1017/S1446788700006236
7. D. Shanks, Euclid’s primes, Bull. Inst. Combin. Appl. 1 (1991) 33–36.
8. A. Booker, On Mullin’s second sequence of primes, Integers, 12A (2012), available at http://www.integers-ejcnt.org/vol12a.html.
https://doi.org/10.1515/integers-2012-0034
9. A. Deitmer, A First course in Harmonic Analysis, 2 nd edition, (2005), Springer, New York.

Authors: Parul Goyal, Ashok Sahoo, Vrince Vimal

291. Paper Title: A Roadmap towards Connected Living: 5G Mobile Technology


Abstract: Internet of things connecting everyone requires vast networking connection. Trillions of devices 1670-
are supposed to be connected due to IoT. The growing need of connectivity resulted in development of mobile 1685
networks from 1G towards 5G. Digitally connected world demands enormous bandwidth & flexible network.
They need superior throughput, increased data rate, improved network capacity and less delay in the system. The
expectations from 5G are getting high. With capacity a thousand times greater and data rates up to 20 Gbps. 5G
contribute novel radio frequency band like 6 GHz. 5G has advanced features which helps to resolve many
problems. Audio video streaming, mobility, switching network, slow network connection, buffering & loading
problems were sorted with 5G. It enables cloud based services with its accessibility and flexibility features. The
aim of 5G is to provide very low latency, improvement in QoS & increased rate of data. All features of 5G such
as speed, cell distribution, mm wave, latency, spectrum, MIMO, slicing are discussed. Literature Survey on 5G
wireless communication technology provides an analysis of recent advances towards 5G, their limitations,
challenges, countermeasures and future research areas. All stakeholders, such as industry, academics,
researchers, mobile operators, vendors, standardization authorities, regulatory bodies are working together for
deployment of 5G. The data and information related to 5G which is accumulated from all stakeholders provides
an overview of 5G and anticipated 5G technologies. There is significant research & developments going on in
5G networks by different research groups. Their work is highlighted in this paper. This will give new directions
in research and will pave the way to new applications. 5G will be supporting different kind of services required
by the user. OFDM (Cyclic-Prefix) is not good enough for such kind of services. To fulfill these service
requirements, an improved waveform is needed. This paper provides performance comparison of the candidate
waveforms like GFDM, BFDM, FBMC, UFMC, NOMA and different variants of OFDM. Based on above result
analysis and discussions a new waveform is proposed which overcomes the disadvantages of previous
waveforms in use. An improved alternative waveform and multiple access technique proposed is a good
initiative. Better results are possible by combining these two methods Windowed & Filtered OFDM. WFOFDM
supports MQAM modulation. Hybrid WFOFDM is a good waveform contender resulting in improved
performance, reduced OOB emission in shorter (6 or 8) window length, increased spectrum efficiency. This
proposed new improved waveform is flexible and is also compatible with new multiple access technique and
new modulation scheme.

Keyword : 5th Generation, Beamforming, BDMA, BFDM, Cellular, Cloud, D2D, FBMC, GFDM, Latency,
Multi carrier, MIMO, mmWave, NOMA, OFDM, Radio Access Network, Spectrum, UFMC, Variants of
OFDM, Wireless networks
References:
1. Zaidi A., Athley F., Medbo J., Gustavsson U., Durisi Gi., Chen X., (2018), 5G physical layer: principles, models and technology
components
2. Internet Resource, Ericsson, http://www.ericsson.com/openarticle/mwc-connected-devices 1686565587c
3. Mehta H., Patel D., Joshi B., Modi H., 0G to 5G Mobile Technology, A Survey, Journal of Basic and Applied Engineering Researc h,
Volume 1, Number 6, PP 56-60, October, 2014
4. Mir M. M., Kumar S., Evolution of Mobile Wireless Technology from 0G to 5G, International Journal of Computer Science and
Information Technology, Volume 6 (3), PP 2545-2551, 2015
5. Ms. Anju Uttam Gawas, an Overview on Evolution of Mobile Wireless Communication Networks, 1G-6G, JRITCC, Volume 3, Issue
5, 2015
6. Meenal G. Kachhavay, International Journal of Computer Science and Mobile Computing, Volume 3, Issue 3, 2014
7. J.G. Andrews, What will 5G be?, IEEE, J. Sel. Areas Comm. 32, PP 1065–1082,2014
8. Satinder, Babbar V., 3G, 4G & 5G wireless mobile networks, A comparative study, ICSTM, PP 2381-2390, 2015
9. Akhil Gupta, Rakesh Kumar Jha, A Survey of 5G Network, Architecture and Emerging Technologies, IEEE, 2169-3536 (c), 2015
10. Kwadwo, P. Agyapong, Design considerations for 5G network architecture. IEEE Comm. Mag. 52(11), 65, 2014
11. DMC R&D Center, 5G Vision White Paper, http://www.samsung.com/global/business images/insights/2015/samsung5GVision0.pdf,
2015
12. Bego Blanco, technology architecture of future pillars in the 5G mobile networks: NFV, MEC and SDN, November 2017
13. R. Henderson, M. Langridge, What is 5G?, When is it coming and why do we need it?, http://www.pocket-lint.com/news/128938-
what-is-5g-when-is-it-coming-and-why-do-we-need-it, Jan 2017
14. Chaudhary R. R., A Network Overview of Massive MIMO for 5G Wireless Cellular System Model and Potentials, International
Journal of Engineering Research and General Science, Volume 2, Issue 4, PP 338 – 347, 2014
15. Kwadwo P.A., Iwamura M., Staehle D., Kiess W., Design Considerations for a 5G Network Architecture, IEEE Communications
Magazine, PP 65 - 75, November 2014
16. Larsson E.G., Edfors O., Tufvesson F., Marzetta T. L., Massive MIMO for Next Generation Wireless Systems, IEEE Communications
Magazine, (52), PP 186-195, February 2014
17. Eduardo Castaneda, Adao Silva, Atılio Gameiro, and Marios Kountouris, an Overview on Resource Allocation Techniques for Multi-
User MIMO Systems, IEEE, 1553-877X (c), 2016
18. Carolina Fortuna, Software interfaces for control, optimization and update of 5G machine type communication networks, December
2017
19. Zoraida Frias, 5G networks, Will technology and policy collide?, July 2017
20. Jing Wang, Chih Lin, Recent advances and future challenges for massive MIMO channel measurements and models, science china,
Vol. 59 021301:1–021301:16, February 2016
21. Erik Dahlman, New 5G Radio Access Technology, 2016
22. Garg S., A New Wireless Communication Technology, Radio over Fiber, KIET International Journal of Communica tions &
Electronics, Volume No. 3, Issue No.1, PP 24-27, March 2015
23. Ian F. Akyildiz, 5G roadmap, 10 key enabling technologies, September 2016
24. Shahid Mumtaz, A survey of 5G technologies, regulatory, standardization and industrial perspectives, September 201 7
25. Pablo Salva Garcia, 5G-UHD, Design prototyping and empirical evaluation of adaptive Ultra High Definition video streaming based
on scalable H.265 in virtualized 5G networks, December 2017
26. Jiasong Muan, Improved AODV routing for the ZigBee heterogeneous networks in 5G environment, April 2017
27. S. Zhang, 5G towards energy-efficient, low-latency and high reliable communications networks, IEEE, ICCS, PP 197–201, 2014
28. Akhil Gupta, Rakesh Kumar Jha, A Survey of 5G Network, Architecture and Emerging Technologies, IEEE, 2169-3536(c), 2015
29. Gaikwad, Vaibhav Vitthal, Bhor Pooja Vijay, Review of Light fidelity, International Journal for Scientific Research & Develo pment,|
Volume 4, Issue 02, ISSN (online): 2321-0613, 2016
30. S. Jia, Analyzing and relieving the impact of FCD traffic in LTE-VANET heterogeneous network, in: IEEE Int. Conference on
Telecommunications, PP 88–92, 2014
31. Mamun A.A., Anwar S., Ali H., 4G and 5G Mobile Communication Networks, Features, Analysis, Comparison and Proposed
Architecture”, IJCST, Volume 7, Issue 2, PP 154-160, 2016
32. Farris, Federated IoT services leveraging 5G technologies at the edge, January 2018
33. A. Osseiran, F. Boccardi, V. Braun, K. Kusume, P. Marsch, M. Maternia, O. Queseth, M. Schellmann, H. Schotten, H. Taoka, H.
Tullberg, M. Uusitalo, B. Timus, Fallgren, Scenarios for 5G mobile and wireless communications: the vision of the METIS project,
IEEE Commun. Mag. 52 (5), PP 26–35, 2014 doi: 10.1109/ MCOM.2014.6815890.
34. Additional Knowhow on FP7 Internet Resource, http://ec.europa.eu/research/fp7/index en.cfm
35. FP7 Integrating Project METIS (ICT 317669). [Online] Available: https://www.metis 2020.com/documents/deliverables
36. D.S. Baum, J. Hansen, J. Salo, An interim channel model for beyond 3G systems: extending the 3GPP spatial channel model (SCM),
in: 2005 IEEE 61st Vehicular Technology Conference, Volume 5, IEEE, PP 3132–3136, 2005
37. Y.J. Bultitude, T. Rautiainen, IST-4-027756 WINNER II D1. 1.2 V1. 2 WINNER II Channel Models
38. J. Medbo, K. Borner, K. Haneda, V. Hovinen, T. Imai, J. Jarvelainen, T. Jamsa, Karttunen, K. Kusume, J. Kyrolainen, P. Kyosti, J.
Meinila, V. Nurmela, Raschkowski, A. Roivainen, J. Ylitalo, Channel modeling for the fifth generation mobile communications, in:
2014 8th European Conference on Antennas and Propagation (EuCAP), PP 219–223, 2014, doi:10.1109/ EuCAP.2014. 6901730
39. The Institute of Electrical and Electronics Engineers (IEEE), IEEE Standard for Information technology–Telecommunications and
information exchange between systems–Local and metropolitan area networks–Specific requirements-Part 11: Wireless LAN Medium
Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 3: Enhancements for Very High Through-put in the 60
GHz Band, IEEE Std 802.11ad-2012 (Amendment to IEEE Std 802.11-2012, as amended by IEEE Std 802.11ae-2012 and IEEE Std
802.11aa-2012) PP 1–628, 2012, doi:10.1109/IEEESTD.2012.6392842
40. METIS II Project, Preliminary Views and Initial Considerations on 5G RAN Architecture and Functional Design, 2015, https://metis-
ii.5g-ppp.eu
41. mmMAGIC Project, mmMAGIC: Millimetre-Wave Based Mobile Radio Ac-cess Network for Fifth Generation Integrated
Communications, 2015, https://5g-ppp.eu/mmmagic
42. The 5G Infrastructure Public Private Partnership [Online]. Available: http://5g-ppp.eu
43. G. Wunder, P. Jung, M. Kasparick, T. Wild, F. Schaich, Y. Chen, S. Brink, I. Gas-par, N. Michailow, A. Festag, L. Mendes, N.
Cassiau, D. Ktenas, M. Dryjanski, S. Pietrzyk, B. Eged, P. Vago, F. Weidman, 5GNOW: non-orthogonal, asynchronous waveforms for
future mobile applications, IEEE Commun. Mag. 52(3), PP 97–105, 2014 doi:10.1109/MCOM.2014.6736749.
44. Internet Resource, 5GNOW Deliverable2.2: http://www.5gnow.eu/download/5GNOW D2.2 v1.0.pdf
45. 5th Generation Public Private Partnership, mmMAGIC: Millimeter-Wave Based Mobile Radio Access Network for Fifth Generation
Integrated Communications, 2015 http://5g-ppp.eu.
46. 5th Generation Public Private Partnership, mmMAGIC: Millimeter-Wave Based Mobile Radio Access Network for Fifth Generation
Integrated Communications, 2015 http://5g-ppp.eu.
47. Internet Resource, EMPhAtiC Deliverable 4.1: http://www.ictemphatic.eu/ images/ deliverables/deliverable d4.1 final.pdf
48. M. Olsson, C. Cavdar, P. Frenger, S. Tombaz, D. Sabella, R. Jantti, 5G Green: towards green 5G mobile networks, in: 2013 IEEE 9th
International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob, PP 212–216, 2013,
doi:10.1109/WiMOB.2013.6673363
49. Internet Resource, NEWCOM Deliverable 23.3: http://www.newcomproject.eu/ images/deliverable/D23.3
secondreportontoolsandtheirintegration on the experimentalsetups.pdf
50. T.S. Rappaport, Millimeter wave mobile communications for 5G cellular, It will work, IEEE, Access 1, 335–349, 2013
51. Internet Resource, 5GIC: http://www.surrey.ac.uk/5gic
52. Internet Resource: https://www.etri.re.kr/eng/sub6/sub6 0101.etri? DepartCode=6
53. .S. Bae, Architecture and performance evaluation of MmWave based 5G mobile communication systems, IEEE, ICTC 2014, PP 847–
851, 2014
54. T. Rappaport, S. Sun, R. Mayzus, H. Zhao, Y. Azar, K. Wang, G. Wong, J. Schulz, M. Samimi, F. Gutierrez, Millimeter wave mobile
communications for 5G cellular: it will work!, IEEE Access 1 (2013) 335–349, doi: 10.1109/ACCESS.2013. 2260813
55. A. Alkhateeb, O. El Ayach, G. Leus, R. Heath, Channel estimation and hybrid precoding for millimeter wave cellular systems, IEEE J.
Sel. Topics Signal Process. 8 (5) (2014) 831–846, doi: 10.1109/JSTSP.2014.2334278
56. I.F. Akyildiz, P. Wang, S.C. Lin, Soft Air, Software defined networking architecture for 5G wireless systems, Computer Networks 85
(C), PP 1–18, 2015
57. Qualcomm, 5G - Vision for the next generation of connectivity, White Paper, 2015, https://www.qualcomm.com/
invention/technologies/5g
58. Samsung Electronics, Samsung Electronics Sets 5G Speed Record at 7.5Gbps, Over 30 Times Faster Than 4G LTE, 2014,
http://www.samsung.com/ global/ business/networks/insights/news
59. AT&T, AT&T Unveils 5G Roadmap Including Trials In 2016. http://about.att.com/ story/unveils 5G roadmap.html
60. Huawei, 5G: New Air Interface and Radio Access Virtualization, Technical Report, 2015
61. NTT DoCoMo, 5G – Future Core Network, Presentation at GSMA Mobile World Congress 2016, Barcelona, 2016, Available at:
https://www.nttdocomo.co.jp/english/info/ media center/event/mwc2016/pdf/about future core network.pdf
62. C. L. I. C. Rowell, S. Han, Z. Xu, G. Li, Z. Pan, Toward green and soft: a 5G perspective, IEEE Commun. Mag. 52 (2) (2014) 66–73,
doi: 10.1109/MCOM.2014. 6736745
63. Pekka Pirinen, A brief overview of 5G research activities, IEEE, International Conference on 5G for Ubiquitous Connectivity, PP 17–
22, 2014
64. T. Rappaport, S. Sun, R. Mayzus, H. Zhao, Y. Azar, K. Wang, G. Wong, J. Schulz, M. Samimi, F. Gutierrez, Millimeter wave mobile
communications for 5G cellular, it will work!, IEEE Access 1, PP 335–349, 2013 doi:10.1109/ACCESS.2013. 2260813
65. T. Levanen, Radio interface design for ultra low latency millimeter wave communications in 5G era, Globecom Workshop, Ultra -Low
Latency and Ultra-High Reliability in Wireless Communications, PP 1420–1426, 2014
66. J.S. Bae, Architecture and performance evaluation of MmWave based 5G mobile communication system, in: IEEE ICTC 2014, 2014,
pp. 847–851.
67. L. Baochun, X. Hong, Resource allocation with flexible channel cooperation in cognitive radio networks, IEEE Transactions, Mobile
Computing, 12 (5), PP 957–970, 2013
68. F. Schaich, T. Wild, Waveform contenders for 5G-OFDM vs. FBMC vs. UFMC, 6th International Symposium on Communications,
Control and Signal Processing, ISCCSP, 2014, PP 457–460, 2014
69. 5GNow Deliverables online resources: http://www.5gnow.eu/wp-content/uploads/ 2015/04/5GNOW D3.2 v1.3. pdf
70. G. Fettweis, M. Krondorf, S. Bittner, GFDM-generalized frequency division multiplexing, 69th Vehicular Technology Conference,
IEEE, PP 1–4, 2009
71. M. Mukherjee, reduced out of band radiation based filter optimization for UFMC systems in 5G, Wireless Communications and
Mobile Computing Conference, IWCMC, 2015, PP 1150–1155, 2015
72. N. Vander Neut, PAPR reduction in FBMC systems using a smart gradient project active constellation extension method, 21st
International Conference on Telecommunications, ICT 2014, PP 134–139, 2014
73. G. Wunder, S.A. Gorgani, S.S. Ahmed, Waveform optimization using trapezoidal pulses for 5G random access with short message
support, IEEE, 16th International Workshop on Signal Processing, Advances in Wireless Communications, PP 76–80, 2015
74. D. Sabella, Energy efficiency benefits of RAN-as-a-service concept for a cloud-based 5G mobile network infrastructure, IEEE, Access
2, PP 1586–1597, 2014
75. V. Jungnickel, Software-defined open architecture for front- and backhaul in 5G mobile networks, in: IEEE International Conference
on Transparent Optical Networks, ICTON, PP 1- 4, 2014
76. J. Costa-Requena, Software defined 5G mobile backhaul, in: IEEE International Conference on SG for Ubiquitous Connectivity, PP
258 - 263, 2014
77. S. Tombaz, K.W. Sung, J. Zander, Impact of densification on energy efficiency in wireless access networks, in: The 8th Broadband
Wireless Access Workshop, PP 57 - 62, 2012
78. S. Zhang, 5G: towards energy-efficient, low-latency and high reliable communications networks, in: Proceedings of the IEEE ICCS,
2014, pp. 197–201
79. M. Olsson, 5G Green: towards green 5G mobile networks, in: International Workshop on Green Optimized Wireless Networks, PP
212–216, 2013
80. B. Li, H. Xu, Anchor: A Versatile and efficient framework for resource management in the cloud, IEEE Trans. Parallel Distrib. Syst.
24 (6), PP 1066–1076, 2013
81. A. Gohil, 5G technology of mobile communication: A Survey, in: International Conference on Intelligent Systems and Signal
Processing, PP 288–292, 2013
82. LTE Direct Workshop White Paper- Qualcomm Inc.
83. J. Qiao, Enabling device-to-device communications in millimeter wave 5G cellular networks, IEEE Comm. Mag. 209–215, 2015
84. T. Abdelzaher, Media Scope: Selective on-demand media retrieval from mobile devices, in: IEEE IPSN, PP 289–300, 2013
85. J. Domme, 5G in space: PHY-layer design for satellite communications using non-orthogonal multi-carrier transmission, in: Advanced
Satellite Multimedia Systems Conference and the 13th Signal Processing for Space Communications Workshop, ASMS/SPSC, PP
190–196, 2014
86. J. Bingham, Multicarrier modulation for data transmission, an idea whose time has come, IEEE Commun. Mag. 28 (5), PP 5–14, 1990
87. M. Schwartz, Mobile Wireless Communications, Cambridge University Press, 2004
88. Bellanger M., (2011), FBMC physical layer-principle. www.ict-phydyas.org
89. Vakilian V. (2013), Universal-filtered multi-carrier technique for wireless systems beyond LTE”. In: Globecom 2013 workshop
90. Fettweis G., Krondorf M., Bittner S,. (2009), GFDM - generalized frequency division multiplexing In: 2009 IEEE 69th vehicular
technology conference, VTC Spring 2009, Barcelona, pp 1–4
91. Abdoli J., Jia M., Ma J., (2015), Filtered OFDM: a new waveform for future wireless systems. In: 2015 IEEE 16th international
workshop on IEEE signal processing advances in wireless communications (SPAWC), pp 66–70
92. Zayani R., Medjahdi Y., Shaiek H., Roviras D., (2016), WOLA-OFDM: a potential candidate for asynchronous 5G. In: 2016 IEEE
Globecom workshops (GC Wkshps), Washington, DC, pp 1–5
93. An C., Kim B., Ryu H., (2017), WF-OFDM (windowing and filtering OFDM) system for the 5G new radio waveform. In: 2017 IEEE
XXIV international conference on electronics, electrical engineering and computing (INTERCON), Cusco, pp 1–4

Authors: Valentyna Rusavska, Taras Melikh, Olena Melikh, Tetyana Chala, Svitlana Babushko, Maiia Halyt
Estimation of the Influence of the Seasonality Factor in the Strategic Activity of Tourism and
Paper Title:
Hospitality Enterprises
Abstract: Seasonality in the modern interpretation is presented in the form of dynamic oscillatory processes
that determine the periods of growth and decline of various kinds of economic phenomena and processes.
Among all industries, tourism and hospitality are most clearly affected by the seasonality factor, since it directly
depends on periodic changes in climatic conditions during the calendar year. The tour operator, as an active
participant in the tourism market and the main producer of tourist products, must take into account the fact that
the possibilities of production and consumption within certain tourist destinations are limited by seasonal
climatic conditions.
This study offers a methodology that is based on the Holt-Winter method, which takes into account the
seasonality factor in calculating forecast values. A methodology for calculating forecast values using the MS
Excel tool was also developed. The proposed methodology is very simple to implement in practice, which will
allow all organizations, when building forecast data, to easily access and use large volumes of data.

Keyword : Enterprise, Hospitality, Seasonality Factor, Strategic Activity, Tourism.


References:
1. Vladimir Korobov, Boris Kochurov, Theory and practice of expert methods, April 2019, DOI:
292. 10.12737/monography_5caee0067f1835.43206494
2. Bashynska I.O. Using the method of expert evaluation in economic calculations, Actual Problems of Economics, 7 (169), 2015, pp.
408-412. 1686-
3. V.I. Zhmachinskii, R.I. Cherneva, Analysis and assessment of poverty parameters by expert methods, June 2018, DOI: 1691
10.24891/ea.17.6.1088
4. William A. Barletta, Strategy, Forecasting, and Technological Risk, In book: Strategic Management of Research Organizations,
August 2019, DOI: 10.1201/9780429288548-4
5. Svitlana Bondarenko, Liudmyla Verbivska, Natalia Dobrianskа, Ganna Iefimova, Valentyna Pavlova, Oksana Mamrotska,
Management of Enterprise Innovation Costs to Ensure Economic Security, International Journal of Recent Technology and
Engineering (IJRTE), Volume-8 Issue-3, September 2019, pp. 5609-5613 DOI:10.35940/ijrte.C6203.098319
6. Svitlana Bondarenko, Olena Laburtseva, Оlena Sadchenko, Vira Lebedieva, Oleksandra Haidukova, Tetyana Kharchenko, Modern
Lead Generation in Internet Marketing for the Development of Enterprise Potential, International Journal of Innovative Technology
and Exploring Engineering (IJITEE), Volume-8 Issue-12, October 2019, pp. 3066-3071 DOI: 10.35940/ijitee.L2477.1081219
7. Dr. Jörg Thomas Dickersbach, Production Strategies & Forecast Consumption, In book: Supply Chain Management with APO, January
2004, DOI: 10.1007/978-3-662-10145-2_5
8. I. Bashynska, I. Lytovchenko, D. Kharenko, Sales tunnels in messengers as new technologies for effective Internet-marketing in
tourism and hospitality, International Journal of Innovative Technology and Exploring Engineering, Volume-8 Issue-12, October
2019, pp. 594-598 DOI: 10.35940/ijitee.L3470.1081219
9. Islam E Hussein, Mohamed Abou-Shouk, Gamal S. A. Khalifa, Evaluating Tourism and Hospitality Graduates: Perceptions of
Stakeholders in Egypt, Conference: The 3rd Regional Conference on Tourism Research, 29-31 Oct, 2013At: Langkawi, Malaysia,
October 2013
10. Abraham Pizam, Taylor Ellis, Customer satisfaction and its measurement in hospitality enterprises, International Journal of
Contemporary Hospitality Management, 11(7), pp. 326-339 DOI: 10.1108/09596119910293231
11. Frank Mcgroarty, Emmanouil Platanakis, Athanasios Sakkas, Andrew Urquhart, A Seasonality Factor in Asset Allocation, SSRN
Electronic Journal, January 2018, DOI: 10.2139/ssrn.3266285

Authors: Ms.Juliot Sophia, Nettra S, Akshay Kumar, Divya


293.
Paper Title: Root for a Phishing Page using Machine Learning
Abstract: Phishing alludes of the mimicking of the first website. To infiltrate this sort of con,the
correspondence claims will a chance to be starting with an official illustrative of a website alternately another
institutional Furthermore starting with the place an individual need a probable benefits of the business with. (eg.
PayPal,Amazon,UPS,Bank for america etc). It focuses those vunariblities Toward method for pop ups ,ads,fake
login pages and so on. Web clients are pulled in Eventually Tom's perusing method for leveraging their trust on
acquire their delicate data for example, such that usernames,passwords,account numbers or other data with open
record on acquire loans or purchase all the merchandise through e-commerce locales. Upto 5% for clients appear
on make lured under these attacks,so it might remain calm gainful for scammers-many about whom who send a
large number for trick e-mails An day. In this system,we offer an answer with this issue Toward settling on those
client mindful of such phishing exercises Eventually Tom's perusing identifying the trick joins Furthermore urls
Toward utilizing the blending of the The majority powerful calculations for machine learning, Concerning
illustration An result, we infer our paper with correctness from claiming 98.8% What's more mix from claiming
26 offers. The best algorithm being ,the logistic regression model. 1692-
1695

Keyword : Regression model,URL, machine learning, phishing websites, phishing offers.


References:
1. O. Adam, Y. C. Lee, and A. Y. Zomaya, “Stochastic resource provisioning for containerized multi-tier web services in clouds,” IEEE
Transactions on Parallel and Distributed Systems, vol. 28, no. 7, pp. 2060–2073, 2017.
2. T. Bujlow, V. Carela-Espanol, J. Sole-Pareta, and P. Barlet-Ros, “A survey on web tracking:
3. Mechanisms, implications, and defenses,” Proceedings of the IEEE, vol. 105, no. 8, pp. 1476–1510, 2017.
4. H.-C. Huang, Z.-K. Zhang, H.-W. Cheng, and S. W.
5. Shieh, “Web application security: Threats, countermeasures, and pitfalls,” The Computer Journal, vol. 50, no. 6, pp. 81–85, 2017.
6. Rekouche, Early phishing, 2011.
7. Microsoft, “20% Indians are victims of online phishing attacks: Microsoft,” IANS, 2014.
8. L. Wu, X. Du, and J. Wu, “Effective defense schemes for phishing attacks on mobile computing platforms,” IEEE Transactions on
Vehicular Technology, vol. 65, no. 8, pp. 6678–6691, 2016.

Authors: Amit Chandak, Neeraj Kumar, A. Dalpati


Statistical Analysis of Impact of Strategy & Flexibility on Supply Chain Performance in the
Paper Title:
Perspective of Indian Automobile Manufactures
Abstract: Today’s business under competitive environment, the organizations must be integrated and
maintain their business deliberately within the supply chain network. With the intention to indentified the impact
of supply chain strategy (SCS) and supply chain flexibility (SCF)) on performance in a sample of the automobile
industry and investigate the direct influence of dimensions of SCS and SCF on performance. With the help of
quantitative research, a survey was conducted. Statistical tools were used to investigate the information. The
structural equation path modeling approach is used to assess the relationship of the hypothesis. The findings
analyzed that SCS and SCF positively influence performance. The result finds an encouraging relationship
between SCS and SCF with supply chain performance (SCP) and the result indicate that effective and efficient
supply chain flexibility has a positive impact on the firm’s performance. The result also shows that supply chain
strategies are related to performance.

Keyword : Supply Chain Management (SCM), Supply Chain Strategy (SCS), Supply Chain Flexibility
294. (SCF).
References: 1696-
1. Bhasin, S. (2008). Lean and performance measurement. Journal of Manufacturing Technology Management, 19(5), 670-684. 1699
2. Braunscheidel, M. J., & Suresh, N. C. (2009). The organizational antecedents of a firm’s supply chain agility for risk mitiga tion and
response. Journal of operations Management, 27(2), 119-140.
3. Chikán, A. (2008). National and firm competitiveness: a general research model. Competitiveness Review: An International Business
Journal, 18(1/2), 20-28.
4. Morash, E. A. (2001). Supply chain strategies, capabilities, and performance. Transportation journal, 37-54..
5. Frohlich, M. T., & Westbrook, R. (2001). Arcs of integration: an international study of supply chain strategies. Journal of operations
management, 19(2), 185-200.
6. Mentzer, J. T., DeWitt, W., Keebler, J. S., Min, S., Nix, N. W., Smith, C. D., & Zacharia, Z. G. (2001). Defining supply chain
management. Journal of Business logistics, 22(2), 1-25.
7. Lee, H. L. (2002). Aligning supply chain strategies with product uncertainties. California management review, 44(3), 105-119.
8. Narasimhan, R., & Jayaram, J. (1998). Causal linkages in supply chain management: an exploratory study of North American
manufacturing firms. Decision sciences, 29(3), 579-605.
9. Nunnally, J. C. (1978). Psychomettic theory McGraw Hill Book Company. INC New York.
10. Russell, R. S., & Taylor, B. W. (2009). Operations Management: Along the Supply Chain International Student Version. John Wiley
& Sons.
11. Qrunfleh, S. M. (2010). Alignment of information systems with supply chains: Impacts on supply chain performance and
organizational performance (Doctoral dissertation, University of Toledo).
12. Upton, D. M. (1994). The management of manufacturing flexibility. California management review, 36(2), 72-89.

Authors: Iston Dwija Utama, Dian Kurnianingrum, Ivan Diryana, Mulyani

Paper Title: Understanding Digital Era through Entrepreneurship Readiness Level


295. Abstract: There are several factor that influence students to become an entrepreneur such as motivation,
resource capabilities, opportunity discovery, and entrepreneurial skills. The aim of these research is to identify 1700-
the entrepreneurship readiness level of student at millennial generation in West Java, Indonesia, then help them 1704
to develop their skills and knowledge to compete in digital era. By using quantitative approach with simple
random sampling method we get number of sample are 370 college students in West Java, Indonesia. Result of
these research showed that that students motivation, entrepreneurship skills, and resources capabilities are the
most influencing factors to the level of entrepreneurship readiness level with coefficients score 0.4 p<0.005;
0.26 p<0.005; and 0.17 p<0.005. Other variable, opportunity discovery is not significant with score 0.12,
p>0.005. Based on these research, students already realized about the importance of highly motivate and develop
the entrepreneurial skills if they want to become an entrepreneur. The implication of these research, for formal,
informal institution, government, and private sector have to develop the basic foundation, concept, and
knowledge about critical thinking of how to generating an ideas and discover opportunity in entrepreneurship
process for their students.
Keyword : Digital era, Entrepreneur readiness, Quantitative method, West Java.
References:
1. Seun Azeez Olugbola, “Exploring Entrepreneurial Readiness of Youth and Start-up Success Components: Entrepreneurship Training as
a Moderator,” Journal of Innovation and Knowledge, 2(3), 2017, pp 155-171
2. Alicia Coduras, Saiz-Alvarezb, José Manuel, Jesús Ruiz, “Measuring Readiness for Entrepreneurship: An Information Tool Proposal,”
Journal of Innovation & Knowledge, 1, 2016, pp 99–108
3. Donald F. Kuratko and Richard M. Hodgetts, “Entrepreneurship: Theory, Process, Practice,” Thomson South Western, 06, 2004
4. B. R. Barringer and R. D. Ireland, “Entrepreneurship: Successfully Launching New Ventures,” 05, Pearson Education, 2016
5. Neil Bosma & Donna Kelly, “Global Entrepreneurship Monitor, 2018/2019 Global Report”, Global Entrepreneurship Research
Association, 2019, pp. 20
6. A. A. Gibb & J. Ritchie, “Understanding the Process of Starting Small Businesses,” European Small Business Journal, 1(1), 1982, pp
26–45
7. Jesús Ruiz, Domingo R. Soriano, & Alicia Coduras, “Challenges in measuring readiness for entrepreneurship,” Management Decision,
54 (5), 2016, pp. 1022-1046
8. Gerry Segal, Dan Borgia, & Jerry Schoenfeld, “The Motivation To Become an Entrepreneur,” International Journal of Entrepreneurial
Behaviour & Research, 11(1), 2005, pp. 42-57
9. Peter Drucker, “Innovation and Entrepreneurship: Practice and Principles”, Harper & Row, 1985.
10. Sharon A. Alvarez & Jay B. Barney, “Entrepreneurial Resources,” Wiley encyclopedia of management. John Wiley& Sons, Ltd. 2015
11. Jay B. Barney, “Looking inside for competitive advantage,” Academy of Management Perspective, 9(4), 1995, pp. 49-61
12. Shaker A. Zahra, “Entrepreneurial Capability: Opportunity Pursuit and Game Changing,” Paper to be presented at the DRUID 2011 on
innovation, strategy, and structure – Organizations, institutions, systems, and regions at Copenhagen Business School, 2011
13. Chao C. Chen, Patricia G. Greene, & Ann Crick, “Does entrepreneurial self-efficacy distinguish entrepreneurs from managers?”
Journal of business venturing, 13(4), 1998, pp. 295-316
14. Uma Sekaran & Roger Bougie, “Research Methods for Business: A Skill Building Approach,” 06, John Wiley & Sons Ltd, 2013
15. Muhamad Nasharudin, Nurfazreen Aina., Redzuan, Ma’rof., and Abdul Rahman, Abdul Razak. “Factors contributing to individual
capacity building levels among women entrepreneurs,” Pertanika journal of social sciences & humanities, 21 (2), 2013, pp. 435-448
16. Scott Shane & Sankaran Venkataraman, “The distinctive domain of entrepreneurship research,” Seminal Ideas for the Next Twenty-
Five Years of Advances, 21, Emerald publishing limited, 2019, pp. 5-20
17. Stanley Kaish & Benjamin Gilad, “Characteristic of opportunities search of entrepreneurs versus executives: sources, interests, general
alertness,” Journal of business venturing, 6 (1), 1991, pp. 45-61

Authors: Mahruy Saidalieva, Mohiniso Bahromovna Hidirova


Innovative Technology for Modeling Cancer Grow Regulatory Mechanisms with Taking into
Paper Title:
Account Micro-RNA Action
Abstract: This article is devoted to modeling regulatory mechanisms of human molecular-genetic systems
activity during cancer origin and development with taking into account non-coding circulating regulators. The
paper draws on results made by using methods of quantitative and qualitative analysis of functional-differential
equations. Computational experiments have shown that for certain values of internal and external states there are
the following regimes: programmed cell death (apoptosis), stationary state, self-oscillations, irregular behavior
(cancerous growths) and a sharp destructive change - the “black hole” effect (metastasis) in depending on
various concentrations of micro-RNA. The paper provides a new mathematical and computer models able to
describe regulatory mechanisms of cancer taking into account spatial and temporal relations.

Keyword : Mathematical modeling, functional-differential equations, chaos, nonlinear systems, qualitative


analysis, living systems, cancer, micro-RNA.
References:
296. 1. M. L. Yeung, M. Benkirane, and K. T. Jeang, “Small non-coding RNAs, mammalian cells, and viruses: regulatory
interactions?” Retrovirology. 2007, Т. 4, P. 74. 1705-
2. J. Cursons, K. A. Pillman, K. G. Scheer, P. A. Gregory, M. Foroutan, S. Hediyeh-Zadeh, J. Toubia, E. J. Crampin, G. J. Goodall, C. P. 1709
Bracken, and M. J. Davis, “Combinatorial Targeting by MicroRNAs Co-ordinates Post-transcriptional Control of EMT,” Cell Syst.
2018, Jul 25, vol. 7(1), pp. 77-91.
3. J. Zhang, L. Liu, J. Li, and T.D. Le, “LncmiRSRN: identification and analysis of long non-coding RNA related miRNA sponge
regulatory network in human cancer,” Bioinformatics, 2018, Jun 28, doi: 10.1093/bioinformatics/bty525.
4. M. T. Munir, C. Ponce, C. A. Powell, K. Tarafdar, T. Yanagita, M. Choudhury, L.S. Gollahon, S. M. Rahman, “The contribution o f
cholesterol and epigenetic changes to the pathophysiology of breast cancer,” J. Steroid Biochem. Mol. Biol, 2018, May 4, P. 96.
5. L. E. Mullany, J. S. Herrick, L. C. Sakoda, W. Samowitz, J. R. Stevens, R. K. Wolff, M. L. Slattery, “miRNA involvement in cell cycle
regulation in colorectal cancer cases,” Genes Cancer, 2018, Jan, vol. 9(1-2), pp.53-65.
6. G. Zhang, C. Pian, Z. Chen, J. Zhang, M. Xu, L. Zhang, and Y. Chen, “Identification of cancer-related miRNA-lncRNA biomarkers
using a basic miRNA-lncRNA network,” PLoS One, 2018, May 1, vol. 13(5), p. 13.
7. X. Chen, D. Xie, L. Wang, Q. Zhao, Z. H. You, and H. Liu, “BNPMDA: Bipartite Network Projection for MiRNA-Disease
Association prediction,” Bioinformatics, 2018, Apr 25, p.78.
8. H. Zhao, L. Kuang, L. Wang, P. Ping, Z. Xuan, T. Pei, and Z. Wu, “Prediction of microRNA-disease associations based on distance
correlation set,” BMC Bioinformatics, 2018, Apr 17, vol. 19(1), p. 141.
9. K. Sachse, K. S. Rahman, C. Schnee, E. Müller, M. Peisker, T. Schumacher, E. Schubert, A. Ruettger, B. Kaltenboeck, and R. Eh richt,
“A novel synthetic peptide microarray assay detects Chlamydia species-specific antibodies in animal and human sera,” Sci Rep. 2018,
Mar 16, vol. 8(1), p. 4701.
10. F. Asghari, N. Haghnavaz, D. Shanehbandi, V. Khaze, B. Baradaran, and T. Kazemi, “Differential altered expression of let-7a and
miR-205 tumor-suppressor miRNAs in different subtypes of breast cancer under treatment with Taxol,” Adv. Clin. Exp. Med. 2018, Jul
18, p. 10.
11. X. Zhao, S. Zhou, D. Wang, W. He, J. Li, and S. Zhang, “MicroRNA-205 is downregulated in hepatocellular carcinoma and inhibits
cell growth and metastasis via directly targeting vascular endothelial growth factor A,” Oncol. Lett. 2018, Aug, vol. 16(2), pp. 2207-
2214.
12. P. Chu, A. Liang, A. Jiang, and L. Zong, “miR-205 regulates the proliferation and invasion of ovarian cancer cells via suppressing
PTEN/SMAD4 expression,” Oncol. Lett. 2018, May, vol. 15(5), pp. 7571-7578.
13. J. Zhang, B. Wei, H. Hu, F. Liu, Y. Tu, and F. He, “The association between differentially expressed micro RNAs in breast can cer cell
lines and the micro RNA-205 gene polymorphism in breast cancer tissue,” Oncol. Lett. 2018, Feb, vol. 15(2), pp. 2139-2146.
14. Z. Wang, Z. Wu, and P. Huang, “The function of miRNAs in hepatocarcinogenesis induced by hepatitis B virus X protein,” Oncology
Reports, 2017, vol. 38(2), pp. 652-664.
15. B. N. Hidirov, Selected works on mathematical modeling of the regulator of living systems. Moscow – Izhevsk, 2014, p. 304.
16. M. Saidalieva, and M. B. Hidirova, “Mathematical Modelling Living Systems Regulatory Mechanisms at the Norm and Anomalies,”
Software Engineering, vol. 5, No. 6, 2017, pp. 88-93.
17. J. Hale, Theory of functional differential equations. M.: World, 1984, pp. 1-166.
18. B. N. Hidirov, “Study of the regulation of living systems,” Questions of cybernetics. T., 1986, Issue. 132. p.

Authors: Sanjay Singh, M Prabhahar, R Venkatesh,


Performance and Emission Characteristics of Chlorella Algae Methyl Ester Fuelled Diesel Engine
Paper Title:
with Varying Injection Pressure
Abstract: In the present scenario when the world is facing severe problem related to continuous decrease in
the level of fossil fuels and increasing level of green house gases due to their uses in industries and automobiles,
there is a high demand from all technologists and environmentalists to find and develop some alternative fuel
especially manufactured from biomass like chlorella algae due to its presence in abundance. The mentioned
algae is readily available and is being used as a dietary source in many countries especially in Japan due to its
rich protein lipids and starch content and highly suitable for extraction of oil that can be used as an alternative to
the existing fossil fuel diesel. The blend of B20 chlorella algae methyl ester or biodiesel is tested for its
suitability with respect to its combustion performance and emissions characteristics in a variable compression
ratio engine at 180 bar, 200 bar and 220 bar injection pressures. The performance data obtained are compared
and analyzed for optimum performance with reference to mechanical, combustion properties and emissions of
exhaust gases and a comparison is made with the properties obtained for pure diesel in similar conditions.

Keyword : Chlorella, Biodiesel, Brake Power, Emissions, Fuel, Green House Gas, Injection Pressure,
Mechanical Efficiency, Methyl Ester, Microalgae etc.
References:
1. Saravanakumar M, Prabhahar M, Krishnamoorthi S, Sendilvelan S, Emission characteristics of biodiesel derived from used cooking
oil blended with diesel in the presence of potassium hydroxide (KOH) catalyst as alternative fuel for diesel engines , Rasayan Journal
of Chemistry, 11 (2018).
2. V Naresh and S Prabhakar, Performance and Emission Characteristics of Algae Oil on VCR Diesel Engine, Journal of Chemical and
Pharmaceutical Research, 2018, 10(4).
3. A. S. Sarpal, C. R. Ingrid et al., Investigation of Biodiesel Potential of Biomass of Microalgaes Chlorella, Spirulina and Tetraselmis by
NMR and GC-MS Techniques, J. Biotechnol., 6, 1 (2016).
4. Krishnamoorthi S, Prabhahar M, Saravanakumar M, Sendilvelan S, Yield characteristic of biodiesel derived from used vegetable oil
methyl ester (UVOME) blended with diesel, in the presence of sodium hydroxide (NAOH) and potassium hydroxide (KOH) cataly st,
297. as alternative fuel for diesel engines, International Journal of Mechanical and Production Engineering Research and Developme nt
(IJMPERD), 2018. 1710-
5. Y. P. Nagaraj et al., Production of Biofuel by using Micro Algae, Int. J. Curr. Microbiol. App. Sci., 3(4) (2014).
6. Bhaskar K, Sassykova L. R, Prabhahar M, Sendilvelan S, Effect of dimethoxy-methane (C3H8O2) additive on emission characteristics
1719
of a diesel engine fueled with biodiesel, International Journal of Mechanical and Production Engineering Research and Development
(IJMPERD), 2018.
7. Benemann, J. R., R. P. Goebel, J. C. Weissman, and D. C. Augenstein. 1982. Microalgae as a source of liquid fuels. Final tech nical
report. (No. DOE/ER/30014-T1). EnBio, Inc.: Fairfield, CA.
8. Jale Yanik, Ralph Stahl, Nicole Troeger and Ali Sinag, Pyrolysis of Algal Biomass, J. Anal. Appl. Pyrolysis, 103, 134-141 (2013).
9. [9] K. Chaiwong et al., Study of Biofuel and Biochar Production from Algae by Slow Pyrolysis, Biomass and Bioenergy, 56, 600-
606 (2013).
10. Prakash S, Prabhahar M, Sendilvelan S, Singh S, Bhaskar K, Experimental studies on the performance and emission characteristics of
an automobile engine fueled with fish oil methyl ester to reduce environmental pollution, Energy Procedia, 2019.
11. S. P. Anne, E. Harman-Wave et al., Micro Algae as a Renewable Fuel Source-Fast Pyrolysis of Scenedesmes, Renew. Energy, 60, 625-
632 (2013).
12. R. Velappan, S. Sivaprakasam and M. Kannan, Study the Performance of Algae Oil in Diesel Engine with Various Injection Pressu re,
IRJET, 2(5) (2015).
13. Mata, T. M., A. A. Martins, and N. S. Caetano. 2010. “Microalgae for biodiesel production and other applications: a review.”
Renewable and Sustainable Energy Reviews 14 (1): 217–32.
14. J. Kuberan and N. Alagumurthi: Performance and Emission Characteristics of Algae Bio-fuelled Diesel Engine, Int. J. Chem. Sci.:
14(4), 2016.
15. Ramachandra, T.V., M. Durga Madhab, S. Shilpi, N.V. Joshi. 2013. “Algal biofuel from urban wastewater in India: scope and
challenges.” Renew. Sustain. Energy Review; 21: 767–77.
16. R. Velappan et al., Investigation of Single Cylinder Diesel Engine using Biodiesel from Marine Algae, IJISTE, 1(4) (2014).
17. Prabhahar M, Sendilvelan S, Sassykova L.R, Studies on pongamia oil methyl ester fueled direct injection diesel engine to reduce
harmful emissions .
18. Ponnusamy, S., H. K. Reddy, T. Muppaneni, C. M. Downes, and S. Deng. 2014. “Life cycle assessment of biodiesel production fro m
algal bio-crude oils extracted under subcritical water conditions.” Bioresource Technology 170: 454–61.
19. T. Varghese, J. Raj, E. Raja and C. Thamotharan, Performance and Emission Testing on Algae Bio-fuel using Additives, IJEAT, 4(5)
(2015).
20. G. Nagane and C. Choudhari, Emission Characteristics of Diesel Engine Fueled with Algae Biodiesel –Diesel Blends, IRJET, 2(4)
(2015).
21. Kumar M.S, Prabhahar M, Sendilvelan S, Venkatesh R, Bhaskar K, Combustion, performance and emission analysis of a diesel engine
fueled with methyl esters of Jatropha and fish oil with exhaust gas recirculation, Energy Procedia, 2019.
22. J. Jayaprabakar, A. Karthikeyan, Aashwin Josiah and Anushajan, Experimental Investigation on the Performance and Emission
Characteristics of a CI Engine with Rice Bran and Micro Algae Biodiesel Blends, JCHPS Special Issue, 7 (2015).
23. R. Velappan, S. Sivaprakasam and M. Kannan, Study the Performance of Algae Oil in Diesel Engine with Various Injection Pressure,
IRJET, 2 (5) (2015).
24. Sanjay Singh, Experimental Investigation on Performance of Pre-Mixed Charge Compression Ignition Engine, IJISRT, 4 (8) (2019).

Authors: T. Harikala, R.V.S. Satyanarayana

Paper Title: Adaptive Energy Efficiency Based Power Allocation for MIMO Radar Network
Abstract: Multiple-input multiple-output (MIMO) radar is used extensively due to its application of
simultaneous transmission and reception of multiple signals through multiple antennas or channels. MIMO radar
receives enormous attention in communication technologies due to its better target detection, higher resolution
and improved accurate target parameter estimation. The MIMO radar has several antennas for transmitting the
information and also the reflected signals from the target is received by the multiple antennas and it mainly used
in military and civilian fields. But sometimes the performance of the MIMO radars is degraded due to its limited
power. So the optimum power allocation is required in the communication systems of MIMO radar to improve
its performance. In this paper, an Energy Efficiency based Power Allocation (EEPA) is used to allocate the
power to a user of the clusters and also across the clusters. Here, the MIMO radars are clustered by using a naive
bayes classifier. Subsequently, an efficient target detection is achieved by using Generalized Likelihood Ratio
Test (GLRT) and then the clusters are divided into primary and distributive clusters based on the distance from
the target. Here, the proposed methodology is named as EEPA-GLRT and the implementation of this MIMO
radar system with an effective power allocation is done by Labview. The performance of the EEPA-GLRT
methodology is analyzed in terms of the power consumption of various clusters. The performance of the EEPA-
GLRT methodology is compared with Generalized Nash Game (GNG) method and it shows the power
consumption of EEPA-GLRT is 0.0549 for cluster 1 of scenario 1, which is less when compared to the GNG
method.

Keyword : Multiple-input multiple-output radar, generalized likelihood ratio test, Naive Bayes classifier,
power allocation and power consumption.
References:
1. Y. Yu, S. Sun, R.N. Madan, and A. Petropulu, “Power allocation and waveform design for the compressive sensing based MIMO
radar,” IEEE Transactions on Aerospace and Electronic Systems, Vol.50, No.2, pp.898-909, 2014.
2. W. Xia, Z. He, and Y. Liao, “On the maximum likelihood method for target localization using MIMO radar,”. Science China
Information Sciences, Vol.53, No.10, pp.2127-2137, 2010.
298. 3. N. Garcia, A.M. Haimovich, M. Coulon, and M. Lops, “Resource allocation in MIMO radar with multiple targets for non-coherent
localization,” IEEE Transactions on Signal Processing, Vol.62, No.10, pp.2656-2666, 2014. 1720-
4. X. Lan, W. Li, X. Wang, J. Yan, and M. Jiang, “MIMO radar and target Stackelberg game in the presence of clutter,” IEEE Sensors 1727
Journal, Vol.15, No.12, pp.6912-6920, 2015.
5. Y.X. Wang, G.C. Huang, W. Li, and J.L. Li, “Colocated MIMO radar waveform-design based on two-step optimizations in spatial and
spectral domains,” Frontiers of Information Technology & Electronic Engineering, Vol.18, No.7, pp.1021-1032, 2017.
6. A. Khawar, A. Abdelhadi, and T.C. Clancy, “QPSK waveform for MIMO radar with spectrum sharing constraints,” Physical
Communication, Vol.17, pp.37-57, 2015.
7. X. Song, P. Willett, S. Zhou, and P.B. Luh, “The MIMO radar and jammer games,” IEEE Transactions on Signal Processing, Vol.60 ,
No.2, pp.687-699, 2011.
8. X. Wang, Y. Xiong, B. Tang, and Y. Li, “An approach to the modulation recognition of MIMO radar sign als,” In Communications,
Signal Processing, and Systems, New York, pp. 343-351, 2012.
9. S. Liu, G. Zhang, J.D. Zhang, M. Yang, and Y. Tao, “Transmit and Receive Gain Optimization for Distributed MIMO Radar,”
Wireless Personal Communications, Vol.85, No.4, pp.1969-1986, 2015.
10. B. Ma, H. Chen, B. Sun, and H. Xiao, “A joint scheme of antenna selection and power allocation for localization in MIMO radar
sensor networks,” IEEE communications letters, Vol.18, No.12, pp.2225-2228, 2014.
11. Y. Yuan, W. Yi, T. Kirubarajan, and L. Kong, “Scaled accuracy based power allocation for multi-target tracking with colocated MIMO
radars,” Signal Processing, Vol.158, pp.227-240, 2019.
12. M. Arulraj, and T.S. Jeyaraman, “MIMO radar waveform design with peak and sum power constraints,” EURASIP Journal on
Advances in Signal Processing, Vol.2013, No.1, p.127, 2013.
13. H. Chen, S. Ta, and B. Sun, “Cooperative game approach to power allocation for target tracking in distributed MIMO radar sensor
networks,” IEEE Sensors Journal, Vol.15, No.10, pp.5423-5432, 2015.
14. H. Godrich, A.P. Petropulu, and H.V. Poor, “Power allocation strategies for target localization in distributed multiple-radar
architectures,” IEEE Transactions on Signal Processing, Vol.59, No.7, pp.3226-3240, 2011.
15. J. Yan, W. Pu, H. Liu, B. Jiu, and Z. Bao, “Robust chance constrained power allocation scheme for multiple target localization in
colocated MIMO radar system,” IEEE Transactions on Signal Processing, Vol.66, No.15, pp.3946-3957, 2018.
16. A. Abtahi, M. Modarres-Hashemi, F. Marvasti, and F. Tabataba, “Power allocation and measurement matrix design for block CS-based
distributed MIMO radars,” Aerospace Science and technology, Vol.53, pp.128-135, 2016.
17. X. Song, N. Zheng, and T. Bai, “Resource allocation schemes for multiple targets tracking in distributed MIMO radar systems,”
International Journal of Antennas and Propagation, 2017.
18. A. Deligiannis, A. Panoui, S. Lambotharan, and J.A. Chambers, “Game-theoretic power allocation and the Nash equilibrium analysis
for a multistatic MIMO radar network,” IEEE Transactions on Signal Processing, Vol.65, No.24, pp.6397-6408, 2017.
19. L. Wang, L. Wang, Y. Zeng, and M. Wang, “Jamming power allocation strategy for MIMO radar based on MMSE and mutual
information,” IET Radar, Sonar & Navigation, Vol.11, No.7, pp.1081-1089, 2017.
20. X. Song, N. Zheng, S. Yan, and H. Li, “A joint resource allocation method for multiple targets tracking in distributed MIMO r adar
systems,” EURASIP Journal on Advances in Signal Processing, Vol. 2018, No.1, p.65, 2018.

Authors: Herry Sulendro Mangiri, Herminarto Sofyan, Adhi Susanto, Didik Rohmantoro.

299. The Contribution of Teacher’s Digital Competency to Teacher’s Professionalism at Vocational High
Paper Title:
School
Abstract: Teacher professionalism is the ability of teachers to perform basic tasks as educators. The 1728-
teaching profession as educators faces challenges that require a new set of competencies and broader 1731
competencies. The development of science and technology has changed many things and in various fields are
switching in digital technology. The study aimed to analyze the contribution of teacher’s digital competency to
teacher’s professionalism at vocational high school. This study was ex-post facto research, and The data were
collected using a questionnaire with the content validity testing used construct validity. The research subjects
were 33 teachers from 3 vocational high schools in Sleman Regency. Samples were determined using
proportional random sampling. Data analysis techniques used in this study are descriptive analysis techniques
and regression methods. The result of this study showed that the digital competency and professionalism of
teachers were in the high category. Teacher’s digital competency had a positive and significant contribution to
teacher’s professionalism, with the value of contribution was 16,5%, while 83,5% was explained by the other
variables that do not investigate.

Keyword : Teacher’s digital competency, teacher’s professionalism, vocational high school.


References:
1. K. Schwab, “World Economic Forum: The Global Competitiveness Report,” 2017.
2. N. I. A. Larocque, “Summary of Indonesia’S Education Sector Assessment,” 2015.
3. Norman I.A. LaRocque, “SUMMARY OF INDONESIA’S EDUCATION SECTOR ASSESSMENT,” 2015.
4. F. S. Sundaryani, “Teacher quality remains poor: OECD. Teacher Quality Remains Poor: OECD,National,” 2017.
5. Mustofa, “Upaya Pengembangan Profesionalisme Guru Di Indonesia. Jurnal Ekonomi & Pendidikan,” 2007.
6. Ec.europa.eu, “No Title,” 2018. [Online]. Available: https://ec.europa.eu/jrc/en/digcompedu.
7. M. Svensson and R. Baelo, “Teacher students ’ perceptions of their digital competence,” Procedia - Soc. Behav. Sci., vol. 180, no.
November 2014, pp. 1527–1534, 2015.
8. Riduwan, Belajar mudah penelitian untuk guru-karyawan dan peneliti pemula. Bandung: Alfabeta, 2011.

Authors: Priyanka Patsariya, Rajni Ranjan Singh


Classifier Rank Identification using Multi-Criteria Decision Making Method for Intrusion Detection
Paper Title:
Dataset
Abstract: Network intrusion detection system (NIDS) tracks network traffic for suspicious activity and
policy violations. It generates alerts whenever such activity found. The objective is to detect and report
anomalies. Further intrusion prevention system can take action such as blocking traffic from suspected IP
addresses. Classification of network traffic as is a tedious task. Existing classifiers are suffered by generating
many/false alerts. It is paramount important to select best classification approach among set of available
approaches.
KDD 99 is the benchmark dataset utilized to test the classification capabilities of classifiers. However, many
classifiers generate similar results by measuring performance on various criteria. Technique for Order of
Preference by Similarity to Ideal Solution (TOPSIS) is a traditional multi-criteria decision making (MCDM)
approach which is widely used to rank classifiers from number of options that are assessed on various criteria.
In this work, KDD 99 dataset is applied as input to bayes net, naive bayes, NB updateable, random forest, oneR,
zeroR, adaboostM1, decision stump, J48 and decision table classifiers. The performance of each classifier is
measured using 10 different criteria’s such as accuracy, misclassification, RA error, RMS error, false positive
rate, f- measure, precision, RRS error, mean absolute error and recall. In order to test the effectiveness of
proposed approach weka utility is utilized for classification and classifier performance result are supplied to the
TOPSIS. An application is designed to implement TOPSIS method using python. It is observed that J48 secured
at the top position with performance score 0.5829.

300.
Keyword : negative ideal solution (NIS), The Technique for Order of Preference by Similarity to Ideal
Solution (TOPSIS), KDD99, positive ideal solution (PIS), , multi-criteria decision making (MCDM). 1732-
1738
References:
1. Ravipati Rama Devi and MuntherAbualkibash “Intrusion Detection System Classification using different machine learning algorithms
on KDD-99 and NSL-KDD datasets - A Review Paper” International Journal of Computer Science & Information Technology
(IJCSIT) Vol 11, No 3, June 2019.
2. RanjitPanigrahia,Samarjeet Borah, “Rank Allocation to J48 Group of Decision Tree Classifiers using Binary and Multiclass Intrusion
Detection Datasets”International Conference on Computational Intelligence and Data Science (ICCIDS 2018).
3. EwaRoszkowska, “Multi-Criteria Decision Making Models By Applying TheTopsis Method To Crisp And Interval Data”.
4. Saad Mohamed Ali, Mohamed Gadal, Rania A. Mokhtar, “Anomaly Detection Approach using Hybrid Algorithm of Data Mining
Technique”2017 International Conference on Communication, Control, Computing and Electronics Engineering (ICCCCEE),
Khartoum, Sudan.
5. Raman Singh, Harish Kumar, R.K. Singla, “TOPSIS Based Multi-Criteria Decision Making of Feature Selection Techniques for
Network Traffic Dataset ”International Journal of Engineering and Technology (IJET).
6. Renato A.Krohlinga,AndréG.C.Pacheco, “A-TOPSIS-An approach Based on TOPSIS for Ranking Evolutionary
Algorithms”Information Technology and Quantitative Management (ITQM 2015).
7. RajniRanjan Singh, Deepak Singh Tomar,”Network forensics: detection and analysis of stealth port scanning attack”, International
Journal of Computer Networks and Communications Security, 3 (2), February 2015.
8. Shrikantupadhyay, rajniranjansingh, “Comparative Analysis based Classification of KDD’99 Intrusion Dataset” (IJCSIS) International
Journal of Computer Science and Information Security, Vol. 13, No. 3, March 2015.
9. BhavnaDharamkar, RajniRanjan Singh “A Review of Cyber Attack Classification Technique Based on Data Mining and Neural
Network Approach” International Journal of Computer Trends and Technology (IJCTT) – volume 7 number 2– Jan 2014.
10. Megha Jain Gowadiya, Anurag Jain, “Intrusion Detection in KDD99 Dataset: A Review”International Journal of Scientific &
Engineering Research, Volume 6, Issue 11, November-2015 ISSN 2229-5518.
11. S. SobinSoniya,Maria Celestin Vigila, “Intrusion Detection System: Classification and Techniques”,2016 International Conference on
Circuit, Power and Computing Technologies [ICCPCT].
Authors: Satyanarayana Talam, Rambabu Busi, Supraja V.N.L.

Paper Title: Modeling and Simulation of MEMS based Pressure Sensor for Industrial Applications
Abstract: This paper presents an overview of design, modeling and simulation of MEMS pressure sensor is
using COMSOL Multiphysics V4.3b. An attempt has been made to achieve high sensitivity by providing
different structures for membrane (Circular, square, rectangle & triangle) with uniform surface area and
thickness. Further, simulations have been carried out with various loads ranging from 0.1 to 1MPa assigning
three materials viz., InP, GaAs and Silicon. From the analyses of simulation results, it has been observed that the
pressure sensor with circular membrane provided InP material found to exhibit more deformation and high
sensitivity of 17.3×10-12 for 10 µm thickness and 50.8×10-12 for 7 µm thickness. The reasons for enhancement
in the sensitivity are discussed in detail as function of input load, dimensional changes of diaphragm and
materials addition. These studies are highly useful to check and compute pressure in various industrial and
environmental conditions.

Keyword : Pressure sensor; Displacement; Diaphragm; Stress; COMSOL.


References:
1. Vidhya Balaji and K.N.Bhat, “A Comparison of Burst Strength and Linearity of Pressure Sensors having thin Diaphragms of Diffe rent
301. Shapes”, Journal of ISSS, India, 2, (2012), 18-26.
2. Suja K J, E Surya Raveendran and Rama Komaragiri, “Investigation on better Sensitive Silicon based MEMS Pressure Sensor for High 1739-
Pressure Measurement”, International Journal of Computer Applications, 8(72), (2013),40-47. 1743
3. Ashish, T.Shanmuganantham, “Design of MEMS Pressure Sensors for Environmental Applications”, IEEE, 2(3), (2014), 10-16.
4. A. Nallathambi and T.Shanmuganantham, “Design of Diaphragm based MEMS Pressure Sensor with Sensitivity Analysis for
Environmental Applications”, Sensors & Transducers, 188(5), (2015), 48-54.
5. Berns A, Buder U, Obermeier E, Wolter A, Leder A and Aer Berns, “Aero MEMS Sensor array for high-resolution wall Pressure
measurements”, Sensors and Actuators A, 132, (2006), 104–111.
6. Tingzhong, Xu & Lu, Dejiang & Zhao, Libo & Jiang, Zhuangde & Wang, Hongyan & Guo, Xin & Li, Zhikang & Zhou, Xiangyang &
Zhao, Yulong., “Application and Optimization of Stiffness Abruption Structures for Pressure Sensors with High Sensitivity and Anti-
Overload Ability”., Sensors. 17(9) (2017), 10.3390/s17091965.
7. A.Nallathambi and T.Shanmuganantham, “Design and Analysis of MEMS based Piezoresistive Pressure sensor for Sensitivity
Enhancement”, Materials Today, Proceedings 5, (2018), 1897-1903.
8. Samitier, J. Puig-Vidal, M, Bota, S.A. Rubio, C. Siskos, S.K. Laopoulos, “A current-mode interface circuit for a piezoresistive pressure
sensor”, IEEE Transactions on Instrumentation and Measurement, 47(3) (1998), 708-710.
9. Bariian.A.A. Park, W.-T. Mallon, J.R.; Rastegar, AJ. Pruitt, B.L, “Semiconductor Piezoresistance for Microsystems”, IEEE
Proceedings, 97(3), (2009), 513-552.
10. N. Ahmadzadeh, J.Karamdel, “Simulation and Analysis different MEMS Pressure sensor uses Comsol Multiphysics5.2”, Inter
disciplinary Researches in Computer, Electric, Mechanic and Mechatronic Engineering, (2016), 1-14.
11. Krutideepa Bhol, “Highly Sensitive MEMS based Capacitive pressure sensor Design using COMSOL Multiphysics& its application in
Lubricating system”, Science PG-Engineering Applied Science, 2(4), (2017), 66-71.
12. Hugo Chambon, Pascal Nicolay, Gudrun Bruckner and Ayech Benjeddou, “Analysis of the sensitivity to pressure and temperature o f a
membrane based SAW Sensor”, International Journal of smart and nano materials,8 (2-3), (2017), 95-109.

Authors: Shibashis Pradhan, Deepak Kumar Barik, M Vamshi Krishna, Sujatarani Raut

Paper Title: Generation of Spreading Codes with Minimum Correlation using Sorting Genetic Algorithm-II
Abstract: In a code division multiple access (CDMA) system, multiple access interference (MAI) and
Inter-symbol interference (ISI) appears if generated spreading codes are not maintained orthogonally and the
communication channel is taken as multi-path communication channel. When generated spreading codes are
multi-path spread and then channel delay occurs, it shows that ortho-gonality of the spreading codes is not
maintained. The effect of MAI can be mitigated by maintaining low cross-correlation values as much as low
between the large numbers of spreading codes. The code division multiple technique spreading codes must
maintain absolutely impulsive autocorrelation at origin and very low cross correlation other than origin to avoid
false synchronisation. i.e autocorrelation must be maximum at origin and cross correlation must be minimum at
non origin point. In this paper, we propose multi-objective Genetic Algorithm approach –Genetic Algorithm-II
(NSGA-II) to reduce the out-of-phase average mean-square aperiodic autocorrelation and average mean-square
aperiodic cross-correlation value of randomly initialized binary spreading code set.
302.
Keyword : Inter symbol interference (ISI), multiple access interference (MAI), code division multiple access 1744-
(CDMA), Non-dominated Sorting Genetic Algorithm-II (NSGA-II) 1749

References:
1. Kohno, R., Meidan, R., & Milstein, L. B. (1995). Spread spectrum access methods for wireless communications .IEEE
Communications Magazine, 33(1), 58–67.
2. Amayreh, A. I., and Farraj, A. K. (2007), Minimum autocorrelation spreading codes,Springer Wireless Personal Communications,
vol. 40, no. 1, pp. 107–115.
3. Farraj, A. K., and Amayreh, A. I. (2009), Minimum Cross Correlation Spreading Codes, Springer Wireless Personal
Communications, vol. 48, no. 3,pp. 385–394.
4. Zitzler, E., and Thiele, L. (1999), Multiobjective evolutionary algorithms: A comparative case study and the strength Pareto approach,
IEEE Transaction on Evolutionary Computation, vol. 3, no. 4, pp. 257-271.
5. Boyd, S., Vandenberghe, L. (2004), Convex Optimization, Cambridge University Press.
6. Natarajan, B., Das, S., and Stevens, D. (2005), An Evolutionary Approach to designing Complex Spreading Codes for DS-CDMA,
IEEE Transaction on Wireless Communications, vol. 4, no. 5.
7. Oppermann and Vucetic, B. S. (1997), Complex spreading sequences with wide range of correction properties, IEEE Transaction on
Communication, vol. 45, no. 3, pp. 365–375.
8. Oppenheim, A. V., Schafer, R. W., & Buck, J. R. (1999). Discrete-time signal processing (2nd Ed.).Prentice Hall.
9. Proakis, J. G., and Manolakis, D. G. (1996), Digital Signal Processing:
10. Principles, Algorithms, and Applications, 3rd Edition, Prentice Hall.
11. Pratap, R. (2006), Getting Started with MATLAB 7: A Quick Introduction for Scientists and Engineers, Indian Edition, Oxford
University Press.

Authors: Sumit Chopra, V. K. Banga


Classification of Digital Mammograms Into Masses and Non-Masses using Texture Combination
Paper Title:
Features and SVM
Abstract: This paper presents a framework for grouping of mammogram images into carcinogenic and
non- carcinogenic images. In this paper, image is enhanced using nonlinear contrast enhancement algorithm and
then segmented using internal and external mask segmentation. The features used in the proposed work are
based on the texture feature which means that the segmentation results will have minimal impact on the
classification results of mammograms into masses and non – masses. The features used are Contrast, Energy,
Homogeneity, Entropy, Mean Intensity, Standard Deviation, Taxonomic distinctness, Taxonomic distance and
learning takes place by Support Vector Machine. The algorithm was applied on Mammographic Image Analysis
Society database and when compared with contemporary techniques , the results were improved.

Keyword : Mammograms, Content Based Image Retrieval (CBIR), Support Vector Machine(SVM),
Segmentation.
References:
1. P. Autier, M. Boniol , "Mammography screening: A major issue in Medicine," Procedia - European Journal of Cancer , vol. 90, 2018
pp. 34-62. doi.org/10.1016/j.ejca.2017.11.002
2. W. Galit, M. S. Green , K. B. Lital , "Routine screening mammography in women older than 74 years: A review of available data,"
Maturitas, vol. 57, 2007, pp. 109-119. doi.org/10.1016/j.maturitas.2007.01.010
3. K. Akila, L. S. Jayashree, A. Vasuki, "Mammogram image enhancement using indirect contrast enhancement techniques – A
comparative study," Procedia - Procedia Comput. Sci. , vol. 47, 2015, pp. 255–261. doi:10.1016/j.procs.2015.03.205
4. J. Scharcanski, C. R. Jung, "Denoising and enhancing digital mammographic images for visual screening,", Comput. Med. Imagin g
Graph., vol. 30, 2006. pp. 243–254. doi:10.1016/j.compmedimag.2006.05.002
5. A. Oliver, J. Freixenet, J. Marti, E. Perez , J. Pont, E.R.E. Denton, R. Zwiggelaar, "A review of automatic mass detection and
segmentation in mammographic images," Med. Image Anal., vol. 14,2009. pp. 87–110. doi:10.1016/j.media.2009.12.005
6. J. Padayachee, M. J. Alport, W.I.D. Rae , "Identification of the breast edge using areas enclosed by iso-intensity contours," Comput.
Med. Imaging Graph., vol. 31, 2007. pp. 390–400. doi:10.1016/j.compmedimag.2007.02.019
7. C. Varela, P.G. Tahoces, A. J. Méndez, M. Souto, J.J. Vidal, "Computerized detection of breast masses in digitized mammograms,",
Comput. Biol. Med., vol. 37, 2007. pp. 214–226. doi:10.1016/j.compbiomed.2005.12.006
303. 8. A. R. Domínguez, A.K. Nandi, "Detection of masses in mammograms via statistically based enhancement, multilevel-thresholding
segmentation, and region selection,", Comput. Med. Imaging Graph., vol. 32, 2008. pp. 304–315.
doi:10.1016/j.compmedimag.2008.01.006 1750-
9. J. E. E. D. Oliveira, A. M. C. Machado , G. C. Chavez , A. Paula, B. Lopes, T. M. Deserno, A. D. A. Araújo , "MammoSys : A 1758
content-based image retrieval system using breast density patterns," Computer methods and programs in biomedicine , vol. 99, 2010.
pp.289–297. doi:10.1016/j.cmpb.2010.01.005
10. T. S. Subashini, V. Ramalingam, S. Palanivel, "Automated assessment of breast tissue density in digital mammograms,", Comput. Vis.
Image Underst., vol. 114, 2010. pp. 33–43. doi:10.1016/j.cviu.2009.09.009
11. M. A. Mazurowski, J. Y. Lo, B. P. Harrawood, G. D. Tourassi, "Mutual information-based template matching scheme for detection of
breast masses : From mammography to digital breast tomosynthesis," J. Biomed. Inform., vol. 44, 2011 pp. 815–823.
doi:10.1016/j.jbi.2011.04.008
12. C. Wei, Y. Li, P. Jung, "Mammogram retrieval through machine learning within BI-RADS standards,", Jour. of Biomedical
Informatics, vol. 44, 2011, pp. 607–614. doi:10.1016/j.jbi.2011.01.012
13. 13. C. Wei, S. Y. Chen, X. Liu, "Mammogram retrieval on similar mass lesions,", Comput Methods Programs Biomed., vol. 6,
2010. pp. 234–248. doi:10.1016/j.cmpb.2010.09.002
14. J. Dheeba, N. Albert Singh, S. Tamil Selvi, "Computer-aided detection of breast cancer on mammograms: A swarm intelligence
optimized wavelet neural network approach," J. Biomed. Inform., vol. 49, 2014 pp. 45–52. doi:10.1016/j.jbi.2014.01.010
15. Y. Hsieh , M. Su, P. Wang, " A PSO-based rule extractor for medical diagnosis," J. Biomed. Inform., vol. 49, 2014 pp. 53–60.
doi:10.1016/j.jbi.2014.05.001
16. C. C. Liu, C. Y. Tsai , J. Liu , C. Y. Yu, S. S. Yu, "A pectoral muscle segmentation algorithm for digital mammograms using Otsu
thresholding and multiple regression analysis," Comput. Math. with Appl., vol. 64, 2012 pp. 1100 –1107.
doi:10.1016/j.camwa.2012.03.028
17. K. Seetharaman, S. Sathiamoorthy, "A unified learning framework for content based medical image retrieval using a statistical model,",
J. King Saud Univ. - Comput. Inf. Sci., vol. 28, 2016. pp. 110–124. doi:10.1016/j.jksuci.2014.10.006
18. S.S. d. Oliveira F., O. d. C. Filho A., C. Silvia A. , C. Silvia A., C.d. Paiva A. , Gattass ,M., "Classification of breast regions as mass
and non-mass based on digital mammograms using taxonomic indexes and SVM," Comput. Biol. Med., vol. 57, 2015. pp. 42 –53.
doi:10.1016/j.compbiomed.2014.11.016
19. M. M. Pawar, S. N. Talbar, "Genetic Fuzzy System (GFS) based wavelet co-occurrence feature selection in mammogram classification
for breast cancer diagnosis,", Perspect. Sci., vol. 8, 2016.. pp. 247–250. doi:10.1016/j.pisc.2016.04.042
20. F. J. P. Richard, "Analysis of Anisotropic Brownian Textures and Application to Lesion Detection in Mammograms,", Procedia
Environ. Sci., vol. 27, 2015. pp. 16–20. doi:10.1016/j.proenv.2015.07.100
21. D. Rodrigues, A. Corrêa, A. Cardoso, D. Paiva, M. Gattass, "Detection of masses based on asymmetric regions of digital bila teral
mammograms using spatial description with variogram and cross-variogram functions,",Comput. Biol. Med., vol. 43, 2013. pp. 987–
999. doi:10.1016/j.compbiomed.2013.04.019
22. W. Borges , E. Moraes, A. C. De, Paiva, M. Gattass, "Detection of masses in mammogram images using CNN , geostatistic functions
and SVM," Comp. Biol. Med. , vol. 41, Aug, 2011 pp. 653–664. doi:10.1016/j.compbiomed.2011.05.017

Authors: Naresh Thoutam, Neha M. Visal

304. Paper Title: Towords Secure Data Management using Blockchain in Iot Enabled Environment.
Abstract: The Internet of Things (IoT) is continuously a reality nowadays. By and by, some key difficulties 1759-
still must be constrained to run express consideration all together that IoT arrangements extra help the 1763
developing interest for associated gadgets and furthermore the administrations advertised. Because of the
potential importance and affectability of administrations, IoT arrangements should address the security and
protection issues enveloping these gadgets and furthermore the data they gather, create, and process. As of late,
the Blockchain innovation has increased much consideration in IoT arrangements. Its essential utilization
circumstances ar inside the cash space, where Blockchain makes a promising applications world and may be
utilized to tackle security and protection issues. Be that as it may, this developing innovation has an incredible
potential inside the most various mechanical territories and may impressively encourage achieve the Internet of
Things read in a few angles, expanding the limit of decentralization, encouraging connections, empowering new
exchange models, and permitting self-sufficient coordination of the gadgets. The paper aims to provide ideas
about Blockchain’s structure and activity and, for the most part, to examine how this innovation is used to
provide security and protection in IoT

Keyword : Blockchain, IOT, firebase Cloud.


References:
1. Charalampos S. Kouzinopoulos1, Georgios Spathoulas2, Konstantinos M. Giannoutakis1(B) , Konstantinos Votis1, Pankaj
Pandey2, Dimitrios Tzovaras1, Sokratis K. Katsikas2, Anastasija Collen3,and Niels A. Nijdam3
2. Atzori, L., Iera, A., Morabito, G.: The Internet of Things: a survey. omput. Netw. 54(15), 27872805 (2010)
3. Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the Internet of Things. IEEE Access 4, 22922303 (2016)
4. Conoscenti, M., Vetro, A., Martin, J.C.D.: Blockchain for the Internet of Things: a systematic literature review. In: 2016
IEEE/ACS 13th Inter- national Conference of Computer Systems and Applications (AICCSA), pp. 16, November 2016
5. Worner, D., von Bomhard, T.: When your sensor earns money: ex- changing data for cash with Bitcoin. In: Proceedings of the
2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication, UbiComp 2014
Adjunct, pp. 295298. ACM, New York (2014)
6. Zhang, Y., Wen, J.: The IoT electric business model: using blockchain technology for the Internet of Things. Peer-to-Peer Netw.
Appl. 10(4), 983994 (2017)
7. Blanco-Novoa, T. M. Fernndez-Carams, P. Fraga-Lamas, and M. A. VilarMontesinos, A practical evaluation of commercial
industrial aug- mented reality systems in an industry 4.0 shipyard, IEEE Access, vol. 6, pp. 82018218, 2018.
8. S. J. Barro-Torres, T. M. Fernndez-Carams, H. J. Prez-Iglesias, and C. J. Escudero, Real-time personal protective equipment
monitoring system, Comput. Commun., vol. 36, no. 1, pp. 4250, 2012.
9. F. Tschorsch and B. Scheuermann, Bitcoin and beyond: A technical survey on decentralized digital currencies, IEEE Commun.
Surveys Tuts., vol. 18, no. 3, pp. 20842123, 3rd Quart., 2016.
10. M. Siddiqi, S. T. All, V. Sivaraman, Secure lightweight context-driven data logging for bodyworn sensing devices, in Proc. 5th Int.
Symp. Digit. Forensic Secur. (ISDFS), Tirgu Mures, Romania, 2017, pp. 16.
11. T. Gui, C. Ma, F. Wang, and D. E. Wilkins, Survey on swarm intelligence based routing protocols for wireless sensor networks: An
extensive study, in Proc. IEEE Int. Conf. Ind. Technol. (ICIT), Taipei, Taiwan, Mar. 2016, pp. 19441949.
12. Markets and Markets; Statista Estimates. Market for Blockchain Technology Worldwide. Accessed: Apr. 10, 2018. [Online].
Available:https://www.statista.com/statistics/647231/worldwide- blockchaintechnologymarket-size
13. T. Bocek, B. B. Rodrigues, T. Strasser, and B. Stiller, Blockchains everywhereA use-case of blockchains in the pharma supply-
chain, in Proc. IFIP/IEEE Symp. Integr. Netw. Service Manage. (IM), Lisbon, Portugal, May 2017, pp. 772777.
14. S. Nakamoto. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. [Online]. Available: https://bitcoin.org/bitcoin.pdf
15. E Y. Chen, Y. Pei, S. Chen, Y. Tian, R. Kotcher, P. Tague, OAuth demystified or mobile application developers, Proceedings of the
2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 892-903, 2014.
16. E Chin, A. P. Felt, K. Greenwood, D. Wagner, Analyzing Inter- application Communication in Android, Proceedings of the 9th
Inter- national Conference on Mobile Systems Applications and Services, pp. 239-252, 2011.
17. T Denning, T. Kohno, H. M. Levy, Computer security and the modern home, Commun. ACM, vol. 56, no. 1, pp. 94-103, Jan.
2013.
18. A P Felt, E. Chin, S. Hanna, D. Song, D. Wagner, Android permissions demystified, Proceedings of the 18th ACM Conference on
Computer and Communications Security, pp. 627-638, 2011.
19. A P Felt, S. Egelman, M. Finifter, D. Akhawe, D. Wagner, How to ask for permission, Proceedings of the 7th USENIX Conference
on Hot Topics in Security, pp. 7-7, 2012.
20. A Hesseldahl, A Hackers-Eye View of the Internet of Things, [online] Available: http://recode.net/2015/04/07/a-hackers-eye-view-
of- the-internet-of-things/.
21. L Lu, Z. Li, Z. Wu, W. Lee, G. Jiang, CHEX: Statically vetting Android apps for component hijacking vulnerabilities, Proceedings of
the 2012 ACM Conference on Computer and Communications Security, pp. 229- 240, 2012.
22. T Oluwafemi, T. Kohno, S. Gupta, S. Patel, Experimental Security Analyses of Non-Networked Compact Fluorescent Lamps: A Case
Study of Home Automation Security, Proceedings of the LASER 2013 (LASER 2013), pp. 13-24, 2013.
23. F Roesner, T. Kohno, A. Moshchuk, B. Parno, H. J. Wang, C. Cowan, User-driven access control: Rethinking permission granting in
modern operating systems, Proceedings of the 2012 IEEE Symposium on Security and Privacy, pp. 224-238, 2012.
24. B Ur, E. McManus, M. Pak Yong Ho, M. L. Littman, Practical trigger- action programming in the smart home, Proceedings of the
SIGCHI Conference on Human Factors in Computing Systems, pp. 803-812, 2014.
25. R Valle-Rai, P. Co, E. Gagnon, L. Hendren, P. Lam, V. Sundaresan, Soot a java bytecode optimization framework, Proceedings of
the 1999 Conference of the Centre for Advanced Studies on Collaborative Research, pp. 13, 1999.
26. B Ur, J. Jung, S. Schechter, The current state of access control for smart devices in homes, Workshop on Home Usable Privacy and
Security (HUPS). HUPS 2014, July 2013.
27. Zyskind, G., Nathan, O., Pentland, A.: Enigma: decentralized computa- tion platform with guaranteed privacy. arXiv preprint
arXiv:1506.03471 (2015)
28. Bahga, A., Madisetti, V.K.: Blockchain platform for industrial Internet of Things. J. Softw. Eng. Appl. 9(10), 533 (2016)
29. Dorri, A., Kanhere, S.S., Jurdak, R., Gauravaram, P.: Blockchain for IoT security and privacy: the case study of a smart home. In:
2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 618623,
March 2017.
30. Kshetri, N.: Can blockchain strengthen the Internet of Things? IT Prof. 19(4), 6872 (2017)
31. Ouaddah, A., Elkalam, A.A., Ouahman, A.A.: Towards a novel privacy- preserving access control model based on blockchain
technology in IoT. In: Rocha, A., Serrhini, M., Felgueiras, C. (eds.) Europe and MENA Co- operation Advances in Information and
Communication Technologies, pp. 523533. Springer, Cham (2017). https:// doi.org/10.1007/978-3-319- 46568-5 53

Authors: S.S.Aravinth, J.Senthilkumar, V.Mohanraj, Y.Suresh,


305. An Improved Artificial Bees Colony Algorithm to Solve Minimal Exposure Problem in Wireless
Paper Title:
Sensor Networks
Abstract: The problem of exposure, which is associated with the quality of coverage, is a basic issue faced
in wireless sensor networks. Search for the Minimum Exposure Path (MEP) is one among the crucial problems
in Wireless Sensor Networks (WSNs). The exposure with respect to the MEP is one of the indicators used for
measuring the coverage quality of a WSN, depicting the efficiency with which the monitoring of a mobile target
is done all along the sensing field. The available hybrid technique does not have sufficient accuracy to get the
MEP, which is too complicated, and is not suitable to networks having heterogeneous sensor nodes, or in large
number, or an all-sensor field intensity function. In order to get over these problems, an Improved Artificial Bee
Colony (IABC) model is introduced for the MEP problem associated with getting the optimal shortest path in
this research work. The IABC model exhibits an extensive use of energy and data congestion will happen. In
order to have an efficient resolution to the data congestion problem, Prim’s algorithm has introduced the link
level congestion scenario. Also for effective solving of this issue, in accordance with the features of the node, a
semi Hidden Markov Model is developed to solve the problem of energy efficiency in WSN model. A number of
experiments were carried out, and the results show that the proposed model and the designed IABC can help in
increasing the solution accuracy and can be useful to not just the heterogeneous sensors’ case but also the
scenario in where there are a big number of sensor nodes and also an all-sensor field intensity function.

Keyword : Minimal Exposure Problem (MEP), Wireless Sensor Network (WSN), Semi Hidden Markov
Model, Prims Algorithm, and Improved Artificial Bee Colony (IABC).
References:
1. Wang, B. Coverage Problems in Sensor Networks: a Survey. ACM Computing Surveys October 2011; 43(4), pp.1-53.
2. Feng, H., Luo, L., Wang, Y., Ye, M. and Dong, R., 2016. A novel minimal exposure path problem in wireless sensor networks and its
solution algorithm. International Journal of Distributed Sensor Networks, 12(8), p.1550147716664245.
3. Ye, M., Wang, Y., Dai, C. and Wang, X., 2015. A hybrid genetic algorithm for the minimum exposure path problem of wireless se nsor
networks based on a numerical functional extreme model. IEEE Transactions on Vehicular Technology, 65(10), pp.8644-8657.
4. Binh, H.T.T., Binh, N.T.M., Ngoc, N.H., Ly, D.T.H. and Nghia, N.D., 2019. Efficient approximation approaches to minimal expos ure
path problem in probabilistic coverage model for wireless sensor networks. Applied Soft Computing, 76, pp.726-743.
5. Yang, T., Jiang, D., Fang, H., Tan, M., Xie, L. and Zhao, J., 2018. Target guiding self-avoiding random walk with intersection 1764-
algorithm for minimum exposure path problem in wireless sensor networks. EURASIP Journal on Wireless Communications and
Networking, 2018(1), pp.1-14.
1771
6. Miao, Y., Wang, Y. and Jing–Xuan, W., 2015. Hybrid particle swarm algorithm for minimum exposure path problem in heterogeneous
wireless sensor network. International Journal of Wireless and Mobile Computing, 8(1), pp.74-81.
7. Song, Y., Liu, L. and Ma, H., 2012, “A physarum-inspired algorithm for minimal exposure problem in wireless sensor networks”,
In IEEE Wireless Communications and Networking Conference (WCNC) ,pp. 2151-2156.
8. Liu, L., Song, Y., Ma, H. and Zhang, X., 2012, Physarum optimization: A biology-inspired algorithm for minimal exposure path
problem in wireless sensor networks. In 2012 Proceedings IEEE INFOCOM , pp. 1296-1304.
9. Song, Y., Liu, L., Ma, H. and Vasilakos, A.V., 2014. A biology-based algorithm to minimal exposure problem of wireless sensor
networks. IEEE Transactions on Network and Service Management, 11(3), pp.417-430.
10. Liu, L., Han, G., Wang, H. and Wan, J., 2017. Obstacle-avoidance minimal exposure path for heterogeneous wireless sensor
networks. Ad Hoc Networks, 55, pp.50-61.
11. Liu, L., Zhang, X. and Ma, H., 2014. Minimal exposure path algorithms for directional sensor networks. Wireless Communications and
Mobile Computing, 14(10), pp.979-994.
12. Ferrari, S. and Foderaro, G., 2010, A potential field approach to finding minimum-exposure paths in wireless sensor networks. In 2010
IEEE International Conference on Robotics and Automation, pp. 335-341.
13. Djidjev, H.N., 2010. Approximation algorithms for computing minimum exposure paths in a sensor field. ACM Transactions on
Sensor Networks (TOSN), 7(3), pp.23.
14. Wang, R., Gao, Y., Wan, W. and Mao, S., 2010, Fuzzy information exposure paths analysis in wireless sensor networks.
In International Conference on Audio, Language and Image Processing , pp. 1619-1623.
15. Liu, L., Zhang, X. and Ma, H., 2013. Percolation theory-based exposure-path prevention for wireless sensor networks coverage in
internet of things. IEEE Sensors Journal, 13(10), pp.3625-3636.
16. Xia, Na, Khuong Vu, and Rong Zheng. "Sensor placement for minimum exposure in distributed active sensing networks." In 2010
IEEE Global Telecommunications Conference GLOBECOM 2010, pp. 1-6, 2010.
17. Liu, X., Kang, G. and Zhang, N., 2015. Percolation Theory-Based Exposure-Path Prevention for 3D-Wireless Sensor Networks
Coverage. KSII Transactions on Internet & Information Systems, 9(1), pp.126-148.
18. Ye, M., Zhao, M. and Cheng, X., 2015, A New Minimum Exposure Path Problem and Its Solving Algorithm. In 2015 11th International
Conference on Computational Intelligence and Security (CIS) , pp. 420-423.
19. Sudhakar T D, & Sakthivel, B & Hussain, N.S.N.. (2014). Loss minimization in distribution network using prim’s algorithm.
International Journal of Applied Engineering Research. 9. 24033-24046.
20. Yu, B., Zhu, H., Cai, W., Ma, N., Kuang, Q. and Yao, B., 2013. Two-phase optimization approach to transit hub location–the case of
Dalian. Journal of Transport Geography, 33, pp.62-71.
21. Yao, B., Hu, P., Zhang, M. and Wang, S., 2013. Artificial bee colony algorithm with scanning strategy for the periodic vehicle routing
problem. Simulation, 89(6), pp.762-770.

Authors: E. Venu Madhavi, M.Srinivasa Sesha Sai


“Perception of Employees on Organizational Culture of Singareni Collieries Company Limited
Paper Title:
(With Special Reference to Kothagudem Mines, Khammam District, Telangana State)”
Abstract: Singareni Collieries Company Limited (SCCL) is the second largest coal mining company in
India after Coal India Limited (CIL) with a total man power of 56,282 during 2016-17. It is a public sector coal
mining company jointly owned by Telangana State Government (51 Percent share capital) and the Government
306. of India (49 percent share capital). The company’s accredited function is to explore and exploit coal deposits in
the Godavari Valley coal field area covering the four districts of Telangana State namely Adilabad, Karimnagar, 1772-
Khammam and Warangal. The company markets its coal to diverse industries such as thermal power plants, 1775
cement, steel, paper, textiles, tobacco, ceramics, pharmaceuticals, distilleries etc. With spurt in industrial growth
and the resultant increase in demand for electricity, the company has been playing a key role in the growth and
development of the nation. Further, the new Electricity Act providing opportunities for independent power
production and distribution, the demand for coal has increased phenomenally. In short, the demand for its coal is
more than what it can supply to the market. Hence the company has to take measures to increase its coal
production and productivity, which in turn to a large extent depends upon positive organizational culture. In a
dynamic and changing environment, culture’s flexibility, adaptiveness and responsiveness create organizational
capabilities. Organizational culture plays a vital role in the survival and success of organizations. Hence, the
present article focuses on the perception of employees of SCCL on the Organizational Culture that is prevailing
and whether the present Organizational culture is conducive to the productive performance or not. Certain
Statistical tools like Chi-Square test, ANOVA and T-test have been applied to validate the perception of
employees.
Keyword : Godavari Valley, Karimnagar, Khammam
References:
1. Denison Daniel, R, “Corporate Culture and Organizational Effectiveness”, New York, John Wiley & Sons, 1990.
2. Amin Nikpouv,“ The Impact of Organizational Culture on Organizational Performance: The mediating role of Employees’
organizational commitment”, international Journal of organizational leadership, 2017,pp.65-72.
3. Jerald Greenberg and Robert A. Baron, “Behavior in Organizations: Understanding and Managing the Human side of work”, Pearson
Education 2004, pp. 513-525.
4. Joby Jose, ” Influencers of Organizational culture on IT Industry” , thesis submitted to Annamalai University, Annamalai Naga r,
Tamilnadu, 2014.
5. Pretty Bhalla, “A Study of Organizational Culture, Job Satisfaction and Organizational Role Stress in Retail Sector “, Thesis submitted
to I.K. Gujral Punjab Technical University, Jalandhar, 2015.
6. G.Sivachander, “A Study on Organizational Culture and Industry Compatibility - With special reference to Selected Industries located
in Chennai City”, Thesis submitted to the Univesity of Madras, 2016.
7. Shyam Narayan and Rangnekar, S. “Organizational Culture and Job Involvement as Predictors of Managerial Effectiveness: An
Empirical Study of Power Sector in India, Indian Journal of Training and Development, July-September 2009, Vol. XXXIX, No.3,
pp.35-43.
8. Rakesh Kumar Agarwal and ArchanaTyagi, “Organizational Culture in Indian Organizations: An empirical study”, International
Journal of Indian Culture and Business Management, January, 2010, Vol.3, No.1, pp 68-87.
9. Daniel Fischer, Monitoring Educational Organizations ‘Culture of Sustainable Consumption: Initiating and Evaluating Cultural Change
in schools and Universities,”Journal of Social Sciences, 2011, PP.63-75.
10. Elanngovan A and Mala Jayashree J. “A Study on Organizational Culture with reference to SAIL, Salem”, International Journal o f
Social Science & Interdisciplinary Research, June, 2013, Vol.2, No.6, pp. 73-83.
11. Sulakshna Dwivedi, Sanjay Kaushik, and Luxmi, “Impact of Organizational Culture on Commitment of Employees: An Empirical
Study of BPO Sector in India”,Vikalpa , volume 39, No 3, July - September 2014,pp 77-92.
12. Muzaffar Ahmad Sofi,K. Devanadhen,Impact of Organizational Culture on Organizational Performance: an Empirical Assessment of
Banking Sector in Jammu and Kashmir India”, International Journal of Innovative Research and development, Vol 4 Issue
9,August,2015 ,pp.34-44.
13. Yoginder Singh Kataria, Rajbir Singh, Bhajan Lal, “Measurement of Culture & Organizational Effectiveness – A Study of Firms in
India”, IOSR Journal of Business and Management, Volume. 48, Issue 12, Ver. I (December 2016), pp. 37-43.
14. R. Vandhana andA. Chandra Mohan , , “A conceptual study in understanding the impact of organizational culture on organizational
performance”, Indian Journal of Scientific Research, 2017,pp.46-50
15. Khadar Bassam Mohammad Abu , “ The Impact of Organizational Culture on Employees satisfaction at the Jordanian company of
Investments “Safeway”, American Journal of Industrial and Business Management, January ,2018, PP .13-25.

Authors: A. Lakshmi Tanuja, J. Rajani Kanth

Paper Title: Multi Labeled Imbalanced Data Classification Based on Advanced Min-Max Machine Learning
Abstract: Some true applications, for example, content arrangement and sub-cell confinement of protein
successions, include multi-mark grouping with imbalanced information. Different types of traditional
approaches are introduced to describe the relation of hubristic and undertaking formations, classification of
different attributes with imbalanced for different uncertain data sets. Here this addresses the issues by utilizing
the min-max particular system. The min-max measured system can break down a multi-mark issue into a
progression of little two-class sub-issues, which would then be able to be consolidated by two straightforward
standards. Additionally present a few decay procedures to improve the presentation of min-max particular
systems. Trial results on sub-cellular restriction demonstrate that our strategy has preferable speculation
execution over customary SVMs in settling the multi-name and imbalanced information issues. In addition, it is
additionally a lot quicker than customary SVMs

307. Keyword : Data classification, Imbalanced data, Machine learning, min-max calculation and sub class
implementation.
1776-
References: 1778
1. V. Lopez, A. Fernandez, S. Garcia, V. Palade, F. Herrera, “An Insight into Classification with Imbalanced Data: Empirical Resu lts
and Current Trends on Using Data Intrinsic Characteristics,” Information Sciences, 2013.
2. S. Wang, Z. Li, W. Chao, and Q. Cao, “Applying Adaptive Oversampling Technique Based on Data Density and Cost-Sensitive SVM
to Imbalanced Learning,” IEEE Int’l Joint Conf. on Neural Networks IJCNN-2012, doi: 10.1109IJCNN.2012.6252696, 2012.
3. P. Yang, P. D. Yoo, J. Fernando, B. B. Zhou, Z. Zhang, and A. Y. Zomaya, “Sample Subset Optimization Techniques for Imbalanced
and Ensemble Learning Problems in Bioinformatics Applications,” IEEE Trans. on Cybernetics, 2014.
4. B. Das, N. C. Krishnan, and D. J. Cook, “RACOG and wRACOG: Two Probabilistic Oversampling Techniques,” IEEE Trans. On
Knowledge and Data Engineering, 2015.
5. C. L. Castro and A. P. Braga, “Novel Cost-Sensitive Approach to Improve the Multilayer Perceptron Performance on Imbalanced
Data,” IEEE Trans. on Neural Networks and Learning Systems, 2013.
6. B. Krawczyk, “Cost-Sensitive One-vs-One Ensemble for Multi- Class Imbalanced Data,” IEEE Int’l Joint Conf. on Neural Networks
IJCNN-2016, doi: 10.1109IJCNN.2016.7727503, 2016.
7. C. Zhang, K. C. Tan, and R. Ren, “Training Cost-sensitive Deep Belief Networks on Imbalance Data Problems,” IEEE Int’l Joint
Conf. on Neural Networks IJCNN-2016, doi:10.1109IJCNN.2016.7727769, 2016.
8. Y. Fong, S. Datta, I. S. Georgiev, P. D. Kwnong, and G. D. Tomaras, “Kernel-based Logistic Regression Model for Protein Sequence
without Vectorialization,” Biostatistics, 2015.
9. X. Wang, E. P. Xing, and D. J. Schaid, “Kernel Methods for Largescale Genomic Data Analysis,” Briefings in Bioinformatics, 20 15.
10. V. Balasubramanian, S. S. Ho, and V. Vovk, “Conformal Prediction for Reliable Machine Learning: Theory, Adaptations and
Applications,” Elsevier, 2014.

Authors: J.S.V.G.Krishna, M.Venkateswara Rao, Kattupalli Sudhakar


Enormous Information Examination using Big Data in a Distributed Environment with Profound
Paper Title:
Learning of Next Generation Interruption Identification Framework Enhancement
Abstract: With the developing utilization of data innovation in all life areas, hacking has turned out to be
more contrarily powerful than any other time in recent memory. Additionally, with creating advances, assaults
numbers are developing exponentially like clockwork and become progressively refined so conventional I.D.S
ends up wasteful recognizing them. We accomplish those outcomes by utilizing Networking Chabot, a profound
intermittent neural system: Long Short Term Memory (L.S.T.M) [2]over Apache Spark Framework that has a
contribution of stream traffic and traffic conglomeration and the yield is a language of two words, typical or
strange.
The new and proposed blending ideas of the language are preparing, relevant examination, circulated profound
adapting, huge information, and oddity discovery of stream investigation. We propose a model that portrays the
system dynamic typical conduct from an arrangement of a great many parcels inside their unique circumstance
and examines them in close to constant to identify point, aggregate and relevant inconsistencies. The
examination shows lower false positive, higher identification rate and better point abnormalities location. With
respect to demonstrate of relevant and aggregate oddities identification, we talk about our case and the
308. explanation for our speculation. Be that as it may, the investigation is done on arbitrary little subsets of the
dataset as a result of equipment restrictions, so we offer examination and our future vision musings as we wish 1779-
that full demonstrate will be done in future by other intrigued specialists who have preferable equipment 1784
foundation over our own.

Keyword : I.D.S, L.S.T.M, R.N.N, M.A.W.I, M.A.W.ILAB, A.G.U.R.IM.


References:
1. Managing Security with Snort & I.D.S Tools: Intrusion Detection with Open by Kerry J. Cox, Christopher Gerg
2. Deep Learning by Ian Goodfellow, YoshuaBengio, Aaron Courville
3. Intrusion Detection Systems edited by Roberto Di Pietro, Luigi V. Mancini
4. DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance ByDhruba Kumar Bhattacharyya, Jugal Kumar Kalita
5. Web Services Essentials: Distributed Applications with XML-RPC, SOAP, UDDI ... By Ethan Cerami
6. Managing Next Generation Networks and Services: 10th Asia-Pacific Network ... edited by Shingo Ata, Choong Seon Hong
7. Foundations of Statistical Natural Language Processing By Christopher D.. Manning, Christopher D. Manning, HinrichSchütze
8. Machine Learning Mastery With Python: Understand Your Data, Create Accurate ... By Jason Brownlee
9. Neural Networks with R: Smart models using CNN, R.N.N, deep learning, and ... By Giuseppe Ciaburro, Balaji Venkateswaran
10. Information Systems Design and Intelligent Applications: Proceedings of ... edited by Vikrant Bhateja, Bao Le Nguyen, Nhu Gia
Nguyen, Suresh Chandra Satapathy, Dac-Nhuong Le
Brahim Darraj, Bouchra Gourja, Abderrazak Faiq Soufiane Zerraf, El Mostafa Tace and Said
Authors:
Belaaouad
Paper Title: The Use of Concept Maps to Evaluate Learning Strategies for Nursing Students
Abstract: Context: This work is a part of the evaluation of learning for nursing students at the My Youssef
hospital center in Casablanca The purpose of this study was to evaluate student learning strategies using the
concept map technique for learning the concept of Therapeutic Education of the Diabetic Patient (TEDP) among
nursing students..
Method: As part of the training of nursing students, we suggested that they make 2 concept maps based on the
concept of TEDP, a map before the clinic internship and a second map after 2 months of internship. The concept
maps were analyzed by calculating the complexity index of the first and the second map by counting the number
of concepts on the map and the number of links. The Wilcoxon test was used to describe the differences between
the first and second cards produced by the students.
Results: 40 concept maps made by 40 participants were analyzed with the corresponding comments. The
evolution of the concept maps of the 40 participants shows a real appropriation of this concept; the knowledge is
309. enriched and organized progressively. The students produce several links between the concepts, which can make
think of deep learning.
1785-
Conclusion: the concept map is an interesting technique for learning a new concept during a self-training activity
1788
because it encourages, simultaneously with its development, a metacognitive reflection.

Keyword : concept maps, learning strategies, nursing students, assessment.


References:
1. D. C. West and al., (2002, October 01). Concept mapping assessment in medical education: a comparison of two scoring
systems.Medical Education. Vol. 36, pp. 820-826. Available:
https://doi.org/10.1046/j.1365-2923.2002.01292.x
2. A. Demeester, D. Vanpee, C. Marchand, C. Eymard. (2010, December 13). Formation au raisonnement clinique: perspectives
d’utilisation des cartes conceptuelles. Pédagogie Médicale. Vol. 11(2), pp. 81-95. Available: https://doi.org/10.1051/pmed/2010013
3. A. Harouchi, Pour un enseignement efficace, l’approche par compétences. Guide à l’usage des enseignants et des formateurs. Rabat,
Editions le Fennec, 2010, pp. 58-62.
4. B. Tribollet, F. Langlois, L. Jacquet, Protocoles d’emploi des cartes conceptuelles au lycée et en formation des maîtres. Montpellier :
TREMA – IUFM, 2000, pp. 18-61.
5. M. Mac Neil.(2007, May ).Concept mapping as a means of course evaluation. J Nurs Educ. Vol. 46, pp. 232-234.
6. M. Philipp , M. Romainville, B. Willocq, (1997). Comment les étudiants anticipent-ils leur apprentissage à l’université ? Revue des
sciences de l’éducation. Vol. 23(2), pp. 309-326. Available: https://doi.org/10.7202/031918ar
7. F. Marton, R. Säljo. (1976). Outcome as a function of the learner’s conception of the task. British Journal Education of Psychology.
Vol. 46(2), pp. 115-127.
8. N. Entwistle, Motivational factors in students’ approaches to learning. dans R.R. Schmeck (Ed.), Learning Styles and Learning
Strategies, New York, Plenum Press, 1988, pp. 21-51.
9. G. Romano, (1991). Étudier… en surface ou en profondeur ? Pédagogie collégiale, Vol. 5(2), pp. 6-11. Available:
http://aqpc.qc.ca/sites/default/files/revue/romano_05_2.pdf
10. P. Rosário, (2007). Voix d’élèves sur l’apprentissage à l’entrée et à la sortie de l’université : un regard phénoménographique. Revue
des sciences de l’éducation. Vol. 33(1), pp. 237–251.Available: https:// doi.org/10.7202/016196ar
11. C. Larue, M. Hrimech. (2019, September 14). Analyse des stratégies d’apprentissage dans une méthode d’apprentissage par
problèmes : le cas d’étudiantes en soins infirmiers. Revue internationale de pédagogie de l’enseignement supérieur. Vol.25-2, pp.3-4
Available: http://ripes.revues.org/221
12. J. B. Biggs, (1987). Student approches to learning and studing, Melbourne: australian council for educational research. Available:
https://files.eric.ed.gov/fulltext/ED308201.pdf
13. DP. Ausubel. Educational psychology: A cognitive view. New York: Holt, Reinhart & Winston, 1968
14. Novak J. D. (1990, January). Concept maps and Vee diagrams: Two metacognitive tools for science and mathematics education.
Instructional Science. Vol. 19, pp. 29-52.
15. C . Marchand, JF.d'Ivernois.( 2004, November). Les cartes conceptuelles dans les formations en santé. Pédagogie Médicale. Vol. 5, pp.
230-400.
Available: https://doi.org/10.1051/pmed:2004031
16. C. Marchand, R. Gagnayre (2004, February). Utilisation de la carte conceptuelle auprès de formateurs en santé pour l'apprentissage
de concepts pédagogiques. Pédagogie Médicale. Vol. 5(1), pp. 13-23. Available:
https://doi.org/10.1051/pmed:2004002
17. H. Barras, E. Dayer. “Comment faire appel à une carte conceptuelle pour évaluer les apprentissages ?”, [in] J. Demougeot-Lebel
(dir.), comment évaluer les apprentissages dans l’enseignement supérieur professionnalisant ?, Louvain-la-Neuve, De Boeck
Supérieur, 2017, pp. 184-196.
18. C. Marchand, J-F. D’Ivernois (2004, November). Les cartes conceptuelles dans les formations en santé. Pédagogie médicale, EDP
sciences. Vol.5(4), pp.230-240. Available:
https://doi.org/10.1051/pmed:2004031
19. P. Chastragnat, C. Marchand (2012, September 3). Les cartes conceptuelles : un outil au service de l’évaluation des compétences.
Pédagogie Médicale. Vol. 13 (4): pp. 257–272. Available: https://doi.org/10.1051/pmed/2012025

Authors: Haslinah Ahmad, Indar, Sukri Palutturi, Suriah, Ahmad Yani


Health City Collaboration Model Through the Program No Gross City (Kotaku) in Coastal Areas
Paper Title:
Makassar City, Indonesia
Abstract: Slums are a problem faced by almost all major cities in Indonesia and even large cities in other
developing countries. The study of slum settlements (slum) generally covers three aspects, first the physical
condition, the other socio-economic conditions of the community living in the agreement, and the three impacts
by the two states. These physical conditions, among others, can be seen from the very stable state of the building
with low-quality construction, non-patterned, and non-hardened road network, public sanitation, and non-
functioning drainage, and waste that has not been adequately managed. (1) (2) The study aimed to form a
collaboration model for Healthy Cities through a Program of No Slum Cities in the Coastal Area of Makassar
City. Method This study uses a quantitative descriptive research method as an approach to Secondary Data
Analysis (ADS). ADS is a method using secondary data as the primary data source. Utilizing the secondary data
in question is to use a statistical test technique that is appropriate for obtaining the desired information from a
mature body of material derived from certain agencies or institutions (such as PUPR, departments, or
educational institutions) to be systematically and objectively processed. Observations found that the tendency
towards collaboration with various sectors to reduce the number of slums in settlements. As for the indicators
used, there are 7 + 1 from the City program without slums. The conclusions of the study were to reduce the
number of slums in Makassar, especially in the coastal areas of Makassar City with an approach, namely by
improving housing, environmental roads, drainage, garbage, fire fighting, and green open space by involving
310. various sectors.
1789-
Keyword : collaboration, healthy cities, and cities without slums. 1791

References:
1. M. N. Kamel Boulos and N. M. Al-Shorbaji, “On the Internet of Things, smart cities and the WHO Healthy Cities,” International
Journal of Health Geographics, 2014.
2. J. Jackisch, G. Zamaro, G. Green, and M. Huber, “Is a healthy city also an age-friendly city?,” in Health Promotion International,
2015.
3. J. K. Brueckner, “Slums in developing countries: New evidence for Indonesia,” J. Hous. Econ., 2013.
4. P. McCarthy, “Urban slums reports: the case of Jakarta, Indonesia,” Glob. Rep. Hum. Settlements 2003, Chall. Slums, 2003.
5. B. Supriyatno, “Role of Government in Jakarta Organize Slum Area,” Sci. Res. J., 2014.
6. J. Pratomo, M. Kuffer, J. Martinez, and D. Kohli, “Coupling uncertainties with accuracy assessment in object-based slum detections,
case study: Jakarta, Indonesia,” Remote Sens., 2017.
7. J. Minnery et al., “Slum upgrading and urban governance: Case studies in three South East Asian cities,” Habitat Int., 2013.
8. B. Surya, M. Ruslan, and H. Abubakar, “Inequility of space reproduction control and urban slum area management sustainability (Case
study: Slum area of Buloa Urban Village in Makassar City),” J. Eng. Appl. Sci., 2018.
9. D. Febrianty and F. H. Kusumartono, “Kemampuan Adaptasi Masyarakat di Permukiman Kumuh Terhadap Banjir Rob: Studi Kasus
Kelurahan Kemijen Kota Semarang,” J. Sosek Pekerj. Umum, 2011.
10. M. Irwansyah, I. Caisarina, and D. Solehati, “Model of slums rejuvenation in Telaga Tujuh village: The case of Langsa city, Aceh,
Indonesia,” in IOP Conference Series: Materials Science and Engineering, 2018.
11. G. Mavromatidis, K. Orehounig, and J. Carmeliet, “Evaluation of photovoltaic integration potential in a village,” Sol. Energy, 2015.
12. R. A. Dixon and J. S. Thompson, “Base-line village health profiles in the E.Y.N rural health programme area of north-east Nigeria.,”
Afr. J. Med. Med. Sci., 1993.

311. Authors: L.Sujihelen, C.Senthilsingh, M.PavithraJyothi


Paper Title: Automation Petrol Bunk Management using Postpaid Cards
Abstract: This paper shows the improvisation of manually operated petrol bunks, as of this process the
automated petrol bunks using cloud communications and Arduino along with RFID reader is proposed. Every
step is made user friendly,where computerized RFID reader is installed at the bunk and postpaid cards are issued
to every person along with vehicle registration certificate.It is that when the user approaches the petrol bunk and
swipes the card at the RFID reader, it shows therespective user details. Then, after verifying the details and
password is entered just to verify the user and then the required amount of fuel is entered,then the relay sensor
gets activated and fuel gets released. When the quantity assigned is filled the filling gets stopped automatically,
after this process the message of transaction details is automatically sent to registered mobile number of theuser.

Keyword : Arduino c, python, RFID, cloud communications, Arduino.


References:
1. KulkarniAmrut M., TawareSachinS, “Embedded Security System Using RFID & GSM Module”, International Journal of Computer
Technology & Electronic Engg., Volume 2 (Issue 1), 2015, Page No.164-168.
2. BeheraSusanta.K& Ali Farida.A, “Automobile Fuel Pump Control System Using Embedded System”, International Journal Of
Computer Technology & ElectronicEngg.,Volume3, Issue2,2013,PageNo.41- 47. 1792-
3. Csencsits, M., Jones, B.A., McMahan, W., and Walker, I.D., User Interfaces for Continuum Robot Arms, Proceedings IEEE/RSJ 1795
International Conference on Intelligent Robots and Systems, Edmonton, Canada,2005, pp. 3011-301.
4. Gupta Anisha, Punit Gupta, JasmeetChhabra, "IoT based power efficient system design using automation for classrooms", Third
International Conference on Image Information Processing (ICIIP),2015.
5. Z. Alkar, J. Roach, D. Baysal, "IP based home automation system", IEEE Transactions on Consumer Electronics, vol. 56, no. 4, 2010.
6. Al-Ali A.R., M AL-Rousan, "Java-based home automation system", IEEE Transactions on Consumer Electronics, vol. 50, no. 2, 2004.
7. MoosaviSanazRahimi, "End-to-end security scheme for mobility enabled healthcare Internet of Things", Future Generation
ComputerSystems,2016.
8. [8] Velandia Diana, M. Segura, "Towards industrial internet of things: Crankshaft monitoring traceability and tracking using RFID",
Robotics and Computer-Integrated Manufacturing, vol. 41, 2016, pp. 66- 77.
9. Velandia Diana, M. Segura , "Towards industrial internet of things: Crankshaft monitoring traceability and tracking usin g RFID",
Robotics and Computer-Integrated Manufacturing, vol. 41, 2016, pp. 66- 77.
10. FerdousRaquib, Md Ahmed, Wasif Reza, Muhammad Faisal Siddiqui, "Renewable energy harvesting for wireless sensors using
passive RFID tag technology: A review", Renewable and Sustainable Energy Reviews, vol. 58, 2016, pp. 1114- 1128.
11. K Haripriya, G Harshini, L.Sujihelen,“Survey on Efficient Automated Toll System for License Plate Recognition Using Open CV”,
2018 International Conference on Emerging Trends and Innovations In Engineering And Technological Research
(ICETIETR),2018,pp.1-6.
12. Suji Helen, VenkadaNaarayanan, Thiagarajan, “Large Scale Collaborative Wildlife Monitoring Using Raspberry Pi”, International
Journal of Pure and AppliedMathematics,2017.

Authors: Kalaiarasi.S, Sriram.S, Rahul.T.M, Dheepak.G

Paper Title: Hand Motion Based Voice Declaration Framework


Abstract: Micro controller essentially based representing muted one and hard of hearing is intended to
offer the signs that are preloaded inside the gadget. it's microcontroller-based gadget, which gives the alarm
sounds essentially by utilizing Hand motion gadget, that are given some reclassified messages like mentioning
water, wash territory and so forth.., here the individual will basically offer the predefined motion that shows the
indication of Water(example) at that point the gadget sounds steady with some yield volume. Microcontroller is
that the core of the gadget. It stores the data of needs of the individual. All together that it will manufacture
utilization of learning keep at whatever point the individual uses this gadget. This gadget helps tragically
challenged people to declare their necessities. By this the one that is near will see their need and encourage
them. This ensures an opportunity to get a handle on each other and simplicity in correspondence. This gadget is
intended to create with a bigger preferred position assembling voice-based declaration for the clients i.e., the
client gets the voice that articulates his need as and once it's required. "Discourse" and "signals" are the
articulation that are to a great extent used in correspondence between humans. Learning of their utilization starts
with the essential long periods of life. In human correspondence, the utilization of discourse and signals is
312. completely planned. Machine motion and language acknowledgment is concerning acknowledgment of motions
and language utilizing gloves.
1796-
1799
Keyword : Arduino Uno, MEMS Sensor, Speaker.
References:
1. N. P. Bhatti, A. Baqai, B. S. Chowdhry, M. A. Unar, "Electronic Hand Glove for Speech Impaired and Paralyzed Patients", EIR
Magazine, May 2009, pp. 59-63, Karachi, Pakistan
2. B. B. Edin, L. Ascari, L. Beccai, S. Roccella, J. J. Cabibihan, M. C. Carrozza, "Bio-Inspired Sensorization of a Biomechatronic Robot
Hand for the Grasp-and-Lift Task", Brain Research Bulletin, Volume 75, Issue 6, 15 April 2008, pp. 785-795
3. M. Wald, "Captioning for Deaf and Hard of Hearing People by Editing Automatic Speech Recognition in Real Time", Proceedings of
10th International Conference on Computers Helping People with Special Needs ICCHP 2006, LNCS 4061, pp. 683-690
4. L. K. Simone, E. Elovic, U. Kalambur, D. Kamper, "A Low-Cost Method to Measure Finger Flexion in Individuals with Reduced
Hand and Finger Range of Motion", 26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society
2004 (IEMBS '04), Volume 2, 2004, pp. 4791-4794
5. Jingdong Zhao, Li Jiang, Shicai Shi, Hegao Cai, Hong Liu, G. Hirzinger, "A Five-fingered Underactuated Prosthetic Hand
System", Proceedings of the 2006 IEEE International Conference on Mechatronics and Automation, June 2006, pp. 1453 -1458
6. Flex Point Inc. USA, http://www.flexpoint.com ... LastAccessed on September 06, 2010
7. Magnevation SpeakJet Inc. USA, http://www.speakjet.com ... Last Accessed on September 06, 2010
8. Kekre, M., and Vaishali, K. “Speaker identification by using vector quantization,” IEEE Transactions on mechatronics, V ol. 15,
No. 1, pp. 1034-1620, 2010.
9. Kouji, M., Kazuya, M., Tsutomu, H., and Ryo, K. “A decision method for placement of tactile elements on a sensor glove for the
recognition

Authors: Nagari Vikas, Gude Rama Krishna, N. Sateesh

Paper Title: Flexural Strength Behavior of T-Shaped Beam-Column Joint with Varying Polypropylene Fibre
Abstract: In times like this earthquakes are most commonly occurring phenomenon in every part of the
world. It’s crucial to make sure ductility of the structure is high, which is it should seamlessly distort non-
elastically and diffuse forces with no major destruction. For any structural frames shear forces and bending
moments are concentrated at the intersecting area. One of such areas is beam-column (B-C) joint. These are the
most effected failure zones. The present work deals with experimental study of a T-shaped beam-column joint.
From the literature, Polypropylene fibre have improved many desired properties of concrete such as flexural
strength, breaking point etc. Therefore introduction of this fibre material into beam-column joint can improve
joint properties. Previous studies on this fibre do not convey any important work that has been done on beam-
column joint using this fibre, specifically pinned under axial force. In this study, 1/3rd scaled specimens of
reinforced concrete (plane RC and RC fibres) T-shaped beam-column joint casted and tested for incremental
loadings. All the specimens have been detailed by the provisions of IS: 13920, IS: 456. These specimens were
tested by applying sequentially incremented repeated loads using Universal Testing Machine (UTM) of 100kN
capacity. The results were correlated in different ways such as, flexural strength, hardness, force dissipation and
ductility. Hence, in the present research this fibre material is used in T-shaped B-C joint to see the changes
occurred in stiffness and flexural strength, of the joint.
313.
Keyword : Ductility, Beam-column joint, Polypropylene Fibre, Axial load, Failure zone. 1800-
1805
References:
1. Romanbabu M. Oinam, Choudhury.A.M, and Laskar A I, “Experimental Study on Beam-Column Joint with Fibres under Cyclic
Loading,” IOSR Journal of Engineering (IOSRJEN), vol. 3(7), 2013, pp. 13-23.
2. Milind V. Mohod, “Performance of Polypropylene Fibre Reinforced Concrete,” IOSR Journal of Mechanical and Civil Engineering
(IOSR-JMCE), vol. 12(1), 2015, pp. 28-36.
3. Divya Dharan, Aswathy Lal “Study the Effect of Polypropylene Fiber in Concrete” International Research Journal of Engineering and
Technology, vol. 3(6), 2016, pp.616-619.
4. Madhavi, Swamy Raju, Deepak Mathur “Polypropylene Fiber Reinforced Concrete-A Review” International Journal of Emerging
Technology and Advanced Engineering, vol. 4(4), 2014, pp.114-119.
5. Riley, V.R. and Reddaway, J.L., 1968, Tensile strength and failure mechanics of Fibre composites, J. Materials Science.
6. P. Rajaram, A. Murugesan and G. S. Thirugnanam, “Experimental Study on behavior of Interior RC Beam Column Joints
Subjected to Cyclic Loading,”International Journal of Applied Engineering Research, Dindigul, vol. 1(1), 2010, pp. 49-58.
7. G.A.Lakshmi, Anjan Dutta and S.K.Deb, “Numerical studies of strengthening of beam column joint under cyclic excitation using
FRP composites” Journals of structural Engineering, Vol 35,No 1, 2008, pp 59-65
8. K.R. Bindhu, P.M. Sukumar and K.P. Jaya, “Performance of Exterior Beam-Column Joints Under Seismic Type Loading,” ISET Journal
of Earthquake Technology, vol. 46,(2)
9. IS 12269:1987 Specification for OPC 53 Grade.
10. IS 383:1970, Specification for Coarse and Fine Aggregate from Natural Source for Concrete.
11. IS 456:2000, Plain and Reinforced Concrete-Code of Practice.
12. IS 516:1959, Method of Tests for Strength of Concrete.
13. IS 10262:2009, Concrete Mix Proportioning.

Authors: J.Srinivas, B.Sesha sreenivas, D.Rama Seshu


The Effect of Alkaline Solution of Varying Molarity and Hookedend Steel Fibres on Split Tensile
Paper Title:
Strength(SPTS)(fct) of Fibre Reinforced Geopolymer Concrete(FRGPC)
Abstract: This article mainly aims the study the effect of alkaline solution of varying molarity [1]” and
the percentage of volume fraction of steel fibres[2]” of 0%, 0.5%, 0.7%, 0.9% and 1.1% (R0, R5, R7, R9 and
R11),different ratios of GGBS to Flyash on Split Tensile Strength of GPC is studied. The combination of
Sodium Hydraxide (NaoH) of different molarity (8M,10M and 12M) and Sodium Silicate (Na2Sio3) used are
alkaline activators. The Modified Binder Index(Bmi) [3]” is introduced to express the effect of Binder Index(Bi)
[4]” and hooked end Steel Fibre Effect on Split Tensile Strength (fct) of SFRGPC. In the experimental
program total 180 cylinders of its size 100mm dia and 200mm length for each variation were cast and tested
after 7days and 28days of ambient curing for average strength. The effect of Molarity, GGBS to Flyash ratio and
Steel Fibres on the SPTS (fct) of SFRGPC is presented in this paper.
314.
1806-
Keyword : Fly ash, Steel fibres, Ground Granulated Blast furnace slag (GGBS), Split Tensile
1811
Strength(fct)(SPTS) (fct), Modified Binder Index (Bmi).
References:
1. S. Selva Kumar, Jose Ravindra raj. B , “ Strength and Durability of 8m 12m and 10m Geopolymer Concrete“ International
Journal of Innovations in Engineering and Technology ( IJIET )volume 8 Issue 3 , June 2017 , ISSN 2319- 1058.
2. Rekha.K.P, Hazeena R “Strength and Durability of Fibre Reinforced Geopolymer Concrete”, (International Journal of Scientific and
Engineering Research), Volume5, Issue7, july2014.
3. D. Rama seshu, R. Shankaraiah, B.Sesha Sreenivas, 2017, “Astudy on the effect of Binder index on compressive strength of
Geopolymer concrete”, CWB-3/2017, pages 211-215.
4. Mc Caffrey R. Climate change and the cement industry, Global cement and lime Magazine (Environmental special issue), 8 (2002) 15-
9.
5. Davidovits J. et al. Process for obtaining geopolymeric alumina-silicate and product thus obtained, US patent USA 5, 342(1994) 595.
6. Rohith Zende, Mamatha. A, “ Study and Fly Ash GGBS Based Geopolymer Concrete under Ambient al of Engineering
Technology’s and Innovative Research ) (JETIR) Volume 2, Issue 7 July 2015.
7. V.Bhikshma, M.koti Reddy, and T.Srinivas Rao, “An Experimental Investigation on Properties of Geopolymer Concrete”, (Asian
journal of civil engineering -Building and Housing) V0l 13, No.6 (2012).
8. Is 3812(part-1) 2003,(pulverized Fuel Ash ) –Specification For use As Pozzolana on Cement Mortar and Concrete.
9. Is 2386-1963, “Methods of testing for aggregate for concrete”
10. Is 383-1970, Specification for Coarse and fine Aggregate from Natural sources for Concrete .Bureau of Indian Standards, New Delhi.
11. Is 516-1956Indian Standard methods of test for Strength of Concrete.
12. Madheswaram C.K, Gnanasundar.G, Gopalakrishnan .N “Effect of Molarity in Geopolymer Concrete” (International Journal of Civil
and Structural Engineering) Volume4, No.2, 2013.
13. C.D. Budh and N.R Warhade, “Effect of Molarity on Compressive strength Geopolymer Motor” “International Journal of Civil
Engineering Research”. Volume 5 November 2014 Issn. 2278- 3652.

Authors: Sudha H.Thimmaiah, Mahadevan.G

Paper Title: An Efficient Technique for Minimizing Localization Errors in Wireless Sensor Networks
Abstract: Wireless Sensor Networks (WSNs) has become one of the huge research topics and numerous
researchers are working on numerous areas encircling WSNs. Wireless sensor networks comprise of low-cost
sensors that are deployed in the network for transmission of messages within the network. Though the use of
wireless sensor networks has gained an intensive response in the digital environment, there still exists some sorts
of issues that need to be improvised. One such problem that affects most of the transmissions in a WSN is
localization error. Finding the exact location of a particular sensor in a wireless network is one of the major
issues. In this paper, we propose a technique for minimizing the localization error by making use of the Time of
Arrival (TOA) technique. The proposed technique is efficiently compared with the existing techniques and the
performance analysis is done. The experimental setup was done by making use of Matlab 2018b and the same
was used to obtain efficient results. Some of the parameters used for finding the efficiency of the system was
the calculation of the distance error between the proposed and the existing technique. The analysis shows the
accuracy rate of finding the location of the sensors and also portrays the minimization of localization error in a
given WSN.

Keyword : Network, Wireless, Sensor, Efficiency, Localization Error, ToA


References:
1. P Bergamo and G Mazzini. “Localization in sensor networks with fading and mobility”. In Proc. IEEE Int. Symp. Personal, Indoo r
Mobile Radio Conf. 2002: 750–754
2. A Nasipuri and K Li. “A directionality based location discovery scheme for wireless sensor networks”. In Proc. ACM Int. Workshop
Wireless Sensor Netw. Appl. 2002: 105–111
3. P Bahl and VN Padmanabhan. “RADAR: An in-building RF-based user location and tracking system”. In Proc. IEEE Joint Conf. IEEE
315. Comput. Commun. Soc. 2000: 775–784
4. D Niculescu and B Nath. “Ad hoc positioning system (APS) using AoA”. In Proc. IEEE Joint Conf. IEEE Comput. Commun. Soc.
2003: 1734–1743 1812-
5. A Savvides, H Park and M Srivastava. “The bits and flops of the Nhop multilateration primitive for node localization problems”. In 1815
Proc. ACM Int. Workshop Wireless Sensor Netw. Appl. 2002: 112– 121.
6. Savvides, A., Han, C. C., & Strivastava, M. B. (2001, July). Dynamic fine-grained localization in ad-hoc networks of sensors.
In Proceedings of the 7th annual international conference on Mobile computing and networking (pp. 166-179). ACM.
7. D Niculescu and B Nath. “DV based positioning in ad hoc networks”. Telecommun. Syst. 2003; 22(1):
267–280.
8. T Van Haute, E De Poorter, I Moerman, F Lemic, V Handziski, A Wolisz, N Wirstr¨om and T Voigt.
“Comparability of RF-based Indoor Localization Solutions in Heterogeneous Environments: An Experimental Study”. Inderscience
Publishers. 2015.
9. D Niculescu and B Nath. “Ad hoc positioning system (APS)”. In Proc. of IEEE Global Telecommunications Conf. (GLOBECOM01).
2001; 5: 2926-2931.
10. Kegen Yu, Hedley M, Sharp I and Guo YJ. “Node Positioning in AdHoc Wireless Sensor Networks”. In Proc. of IEEE International
Conference on Industrial Informatics (INDIN’06). 2006: 641-646.
11. Wang JS and Shen ZX. “An improved MUSIC TOA estimator for RFID positioning”. RADAR 2002. 2002: 478-482.
12. Min Yin, Jian Shu, Linlan Liu and Hengfeng Zhang, “The influence of beacon on DV-Hop in wireless sensor networks”. In Proc. of
Fifth International Conference on Grid and Cooperative Computing
Workshops (GCCW '06). 2006: 459-462.
13. Mohammed Farrag, Mohammed Abo-Zahhad, MM Doss and Joseph V Fayez. “Different Aspects of Localization Problem for Wireless
Sensor Networks: A Review”. International Journal of Computer Networks and Communications Security. 2016; 4(5): 130–140.
14. Benkic, K., Malajner, M., Planinsic, P. and Cucej, Z.. Using RSSI value for distance estimation in wireless sensor networks b ased on
ZigBee, Proceedings of the 15th International Conference on Systems, Signals and Image Processing, IWSSIP 2008, Bratislava,
Slovakia, 2008, pp. 303–306.
15. Akyildiz, I. and Vuran, M. Wireless Sensor Networks, John Wiley & Sons, West Sussex, 2010.
16. Sivakumar, S., & Venkatesan, R. (2015). Meta-heuristic approaches for minimizing error in localization of /wireless sensor
networks. Applied Soft Computing, 36, 506-518.
17. Kumar, A., Khosla, A., Saini, J. S., & Singh, S. (2012, June). Meta-heuristic range based node localization algorithm for wireless
sensor networks. In 2012 International Conference on Localization and GNSS (pp. 1-7). IEEE.
18. SH Thimmaiah and G Mahadevan. "An adaptive localization error minimization approach for wireless
sensor network". 2016 3rd International Conference on Devices, Circuits and Systems (ICDCS), Coimbatore. 2016: 170-173.

Authors: Ajaybhaskar Reddy, Y. Ramalinga Reddy


Grade Card Method of Ground Water Health Evaluation of Mustoor Sub-Watershed Chikballapur
Paper Title:
Taluk Karnataka
316. Abstract: Ground water occurs commonly and is widely distributed and is the most reliable resource the
quality of ground water needs to be monitored and preserved. In this study, as a part of the research work an 1816-
attempt is made to assess the health of ground water in Mustoor sub-watershed. 11 Samples are selected from 1821
the influencing major villages and villages with surface waterbody in the sub watershed. A water grade card is
an aid to educate and remind about the conditions of naturally available water resource around the users with the
help of Water Quality Index method in comparison with Indian Standards IS 10500. Multi-metric indicators and
indices aid to build a water grade card, in this study 11 samples of ground water are tested for eight selected
Physico-chemical parameters (pH, turbidity, iron, fluoride, chloride, nitrate, total dissolved solids and total
hardness) in March and October months, 2018 as Pre and Post Monsoon months. GWQI method helps in
assigning the grades. It is intended for diverse users: like any individuals and institutions to policymakers and
planners. The indicators collectively provide the overall health that is scored and is graded to report the
condition or quality of the groundwater in the sub watershed in a better understanding way to the common
people with the help of grades.

Keyword : Grade card; Score card; Water Quality; Water Quality Index; Ground Water Quality.
References:
1. Sajal Singh & Athar Hussian, “Water quality index development for groundwater quality assessment of Greater Noida sub-basin, Uttar
Pradesh, India”, Cogent Engineering, Vol.3, (2016), available online:
https://www.cogentoa.com/article/10.1080/23311916.2016.1177155.pdf
2. Ramakrishnaiah, C. R., Sadashivaiah, C., &Ranganna, G,” Assessment of water quality index for the groundwater in Tumkur Taluk,
Karnataka State, India.”, E- Journal of Chemistry, Vol.VI, No.2, (2009), pp:523–530, online:
http://www.indiaenvironmentportal.org.in/files/water%20quality%20index.pdf
3. Indian Standard Drinking Water — Specification (Second Revision). New Delhi: Bureau of Indian Standards(2012)
4. Gupta, M., patil, J. P. & Goyal, V. C. (2017, December 11 – 13). Assessment of ground water quality for drinking purpose in a
watershed of Bundelkhand region. Paper presented at the 7th international ground water conference on groundwater vision 2030: water
security, challenges & climate change adaption, New Delhi.
5. K. Yogendra and E. T. Puttaiah (2008), “Determination of water quality index and suitability of an Urban waterbody in Shimoga town,
Karnataka.” Proceedings of Taal 2007: The 12th World Lake conference: 342-346.
6. Kosha A. Shah and Geeta S. Joshi (2015), “Evaluation of water quality index for river Sabarmati, Gujrat, India.” Appl Water Sci
(2017) vol.7:1349–1358
7. Krishan G, Singh S, Kumar CP, Gurjar S, Ghosh NC (2016) Assessment of Water Quality Index (WQI) of Groundwater in Rajkot
District, Gujarat, India. J Earth Sci Clim Change. 7: 341. doi:10.4172/2157-7617.1000341

Authors: Kamatchi Preethi V, Selvakumar D.S

Paper Title: Technology Adoption with respect to various Brands of Smart Phones
Abstract: The new technology has led the development of the economic growth of the nation. The
creators of the new technology keep in mind the need of the people and comes out with most reliable and
feasible technology which is mostly diffused and used by the new technology adopters. The technology
developed are innovative and user-friendly in the smart phone industry. Every aspect that is considered to build
and develop a smart phone are through the research and development. This study focuses on the audience who
adopt to use the new technology with respect to the smartphones. There are few studies to show the technology
adoption life cycle and its types of adopters. Various smartphone brands keep updating the technology to give its
users the best features, the technology adopters also keep up with the updated technology to adopt to the new
developments. The smartphones not only develop the hardware but also keep updating their software as well.
This study also concentrates and brings out the views about brands and technology adoption. The data collection
for this study was conducted in Chennai city. The sampling technique used was judgmental sampling. The
questionnaire was distributed to nearly 123 respondents. The study reveals that how the various technology
adopters have to be targeted and to market the brand strategically, so the consumers can purchase the
smartphones as per their requirement and social status.

317.
Keyword : Brand, Innovation, Technology Adoption, Marketing strategies, Smartphones, Brand Preference.
1822-
References: 1826
1. BHATTACHERJEE, A. and PREMKUMAR, G., 2004. Understanding changes in belief and attitude toward information technology
usage: a theoretical model and longitudinal test. MIS Quarterly, 28(2), pp. 229-254.
2. Flipkart.com, (2014). Mobiles Store Online - Buy Mobiles Products Online at Best Price in India - Flipkart.com. [online] Available at:
http://www.flipkart.com/mobiles?otracker=hp_nmenu_sub_electronics_0_Mobiles [Accessed 18 May. 2014].
3. Karjaluoto, H., Karvonen, J., Kesti, M., Koivum˜Aki, T., Manninen, M., Pakola, J., Ristola, A., & Salo, J. (2005). Factors af fecting
consumer choice of mobile phones: Two studies from Finland. Journal of Euro marketing 14(3) (2005).
4. Keller, K. L. (1993). Conceptualizing, measuring, and managing customer-based brand equity. Journal of Marketing, 57 (January), 1-
22.
5. Kim, E., Lin, J.-S., & Sung, Y. (2013). To App or Not to App: Engaging Consumers via Branded Mobile Apps. Journal of Interactive
Advertising, 13(1), 53-65
6. Kotler and Armstrong, 2010. Principle of marketing. 3th Edn., Pearson Education
7. Kotler, P. and Keller, K. (2009). Marketing management. 1st ed. Upper Saddle River, N.J.: Pearson Prentice Hall.
8. López-Nicolás, C., Molina-Castello, F. J. & Bouwman, H. (2008). An assessment of advanced mobile services acceptance:
Contributions from TAM and diffusion theory models. Information & Management 45(2008), 359-364.
9. Rogers, A., 2013. What is the difference? A new critique of adult learning and teaching, Leicester. s.l.:NIACE
10. Rogers, A., 2013. What is the difference? A new critique of adult learning and teaching, Leicester. s.l.:NIACE
11. Verkasalo, H. L., “Analysis of users and non-users of smartphone applications”, Telematics and Informatics, Vol. 27, No. 3,
November, 2010, pp. 242-255
12. VENKATESH, V., MORRIS, M.G., DAVIS, G.B., and DAVIS, F.D., 2003. User acceptance of information technology: toward a
unified view. MIS Quarterly 27(3), pp. 425-478

Authors: A. Leo, V. Bastin Jerome


318. The Vantage Point Operation of Collision on Online Shopping Via Social Media amid Shoppers and
Paper Title:
Assessments of Shopping
Abstract: Tiruchirappalli has covered a path for a large number of online shoppers by including factors
such as convenience, best prices, different varieties of the same product, flexibility in delivery location of a good
and easy comparison of prices. The social media covers the entire decision-making process of the consumers on
the basis of the reviews and feedbacks from the social media users. The ultimate aim of social media marketing
is to boost the online shopping business and improve the profits. But sometimes the social media users are not
realising that their decision-making process psychologically changed. The consumer behaviour entirely changes
because of the systematic and the proper way of social media advertisements towards the usage of promotion
techniques. The objectives of this paper are to determine the attitude of buying behaviour of shoppers towards
social media networks. To analyse the influence of social media on shoppers. To know the level of satisfaction
and the most preferred product from social media advertisement. To check out the beneficial and favour form of
social media.

Keyword : buying behavior, social media, advertisement, attitude. 1827-


1833
References:
1. Roger Clarke. (2004). A typology of online shoppers based on shopping motivations, Journal of Business Research Vol. 57 PP. 748 –
757
2. Philip Kohler. (2004). A latent class segmentation analysis of e-shoppers, Journal of Business Research. Vol.57, PP.758-767.
3. Hawk pursuit (2004). A typology of online shoppers based on shopping motivations. Journal of Business Research. Vol. 57 (2004)
PP.748– 757
4. R. E. & Bridges, E. (2000) Research design: Qualitative and quantitative approaches, London Press
5. 5.) K. Gautam, B. (2004). The impacts of quickness, price, payment risk, and delivery issues on on-line shopping, Journal of Socio-
Economics, Vol.33, PP.241–251.
6. Creswell, J. (1994), “Consumers: Online shopping increasingly popular in the EU, but development "held back" by barriers to cross
border trade”
7. 7 Amit, B. Sanjoy, Ghose. (2004). Consumer patronage and risk perceptions in internet shopping.
8. 8. Goldsmith, R. E. & Bridges, E. (2000). Using attitudes to predict online buying behavior.
9. 8. Rogers, J.D. (1998). (1991). The Theory of Planned Behavior: Organizational behavior and human resource processes. J., Rogers,
J.D. (1998). s
Anatolii Gennadievich Maklakov, Sergey Vasilievich Marikhin, Lev Victorovich Shabanov, Irina
Authors:
Borisovna Gaivoronskaia, Alexey Anatolyevich Dyachkov
Paper Title: Innovation in Education: Tools and Technologies
Abstract: The article presents a summary of the analytical research into the development of individual
cognitive maps among two categories of students — students of civil and military higher education institutions.
The purpose of the research was to study the vision of their own career prospects after graduation from the
university. The researchers focused on the behavioral reactions and self-evaluation patterns reflected in
individual cognitive maps of reality, the socio-psychological analysis of which was tested with the methodology
developed by G.N. Malyuchenko and V.M. Smirnova. It has been established that the “chaotic” model is
dominant among students of civil higher education institutions, while the “organismic” model is more typical of
military students. It has been found that individual cognitive maps are largely dependent on the self-evaluation
of a particular individual, which indicates the possibility of correction of the relationship between individual
world view and personal self-evaluation. Cognitive maps and mindsets can become more productive, whereas
latent or potential needs for self-fulfillment are likely to transform into active aspirations for self-study and
forming an image of the future.

Keyword : cognitive maps, individual models of the world, patterns, personal development, self-evaluation.
References:
319. 1. G.N. Malyuchenko, and V.M. Smirnov, “Sotsialno-psikhologicheskii analiz tselostnykh predstavlenii o mire” [“Socio-psychological
analysis of comprehensive ideas of the world”]. Saratov, 2006.
2. P.D. Nikitenko, “Vzaimosvyaz sotsialnykh predstavlenii o mire i smyslozhiznennykh orientatsii v razlichnykh usloviyakh sotsializatsii 1834-
molodezhi” [“The interconnection between social ideas about the world and life-purpose orientations under different conditions of 1835
youth socialization”]. Izvestiya Saratovskogo universiteta, Novaya seriya. Seriya Akmeologiya obrazovaniya. Psikhologiya razvitiya,
vol. 2, 3(7), 2013, pp. 250–257.
3. I.B. Gaivoronskaya, V.A. Gubin, and D.Yu. Kanbolatov “Osobennosti motivatsionnoi napravlennosti na voenno-professionalnuyu
deyatelnost v protsesse obucheniya kursantov voennoi obrazovatelnoi organizatsii” [“Specific features of motivational activities in the
course of training of students of a military educational institution”]. Vestnik Sankt-Peterburgskogo universiteta MVD Rossii, vol. 1(73),
2017, pp. 210–213.
4. A.G. Maklakov, N.V. Goloveshkina, I.D. Goloveshkin, A.A. Sidorova, and E.N. Yakhudina, “Sovremennye zakonomernosti i
tendentsii psikhicheskogo razvitiya cheloveka v period shkolnogo obucheniya [“Modern trends in mental development of a person
throughout school education”]. Vestnik of Pushkin Leningrad State University, vol. 4-1, 2016, pp. 97–112.
5. A.A. Dyachkov, and L.V. Shabanov, “K voprosu ob otsenke voenno-professionalnoi napravlennosti voennosluzhashchikh po prizyvu”
[“To the question of assessment of military professional motivation of conscripts”]. Proceedings of the IX International research and
practice conference. Penza, MTSNS “Nauka i Prosveshchenie”, 2018.
6. A.G. Maklakov, and E.V. Pavlova, “Osobennosti formirovaniya professionalno-psikhologicheskikh kharakteristik u budushchikh
uchitelei-predmetnikov raznykh profilei obucheniya v kontekste kompetentnostnogo podkhoda” [“Specific features of development of
professional and psychological characteristics in subject teachers of various areas within the framework of competency -based
approach”]. Vestnik of Pushkin Leningrad State University, vol. 2, 2017, pp.84–95.
7. S.V. Marikhin, and L.V. Shabanov, “Aktualnye problemy organizatsii i razvitiya uchebnoi deyatelnosti slushatelei dopolnitelnykh
professionalnykh programm” [“Current issues of organization and development of the learning activity of students attending additional
professional programs”]. Volsk, vol. 12(7), 2018, pp. 86.
8. L.V. Shabanov, “Obshchaya konfliktologiya” [“General conflictology”]. St. Petersburg: NITS ART, 2017.
9. Е.A. Ivanov, and L.V. Shabanov, “Osobennosti formirovaniya konfliktologicheskoi kompetentnosti v usloviyakh vuza voisk
natsionalnoi gvardii” [“Specific features of develoing conflictological competencies in a national guard higher education institution”].
Konfliktologiya. Fond razvitiya konfliktologii, vol. 13(3), 2018, p. 234.
10. S.V. Marikhin, and L.V. Shabanov, “Dinamika smyslozhiznennykh orientatsii kursantov voennykh vuzov (I i V kursy obucheniya)”
[“Dynamics of life-purpose orientations of students of military higher education institutions (Ist and Vth years)”]. Collection of
scientific papers. Penza: MTSNS “Nauka i Prosveshchenie”, 2018.

Authors: S.Pandikumar, S.Malathi, K.Sathiesh Kumar, M.Arun, R.Kalpana


Secured Policy based Resource Access and User Authentication in Ubiquitous Computing
Paper Title:
Environment
Abstract: Policy-based resource access and data sharing are the most specific in context-aware
computing. Granting authentication to the wireless and ad hoc users is usually difficult because the system has
got to take into account several context factors whereas authoring access. During this epoch, the mobile phone
plays a significant role in info access in a ubiquitous environment. Wireless technologies, significantly the
GSM-SMS is efficient and efficient to access shared data around the world with fewer security issues. The
shared resources like printers, scanners, databases, books, email, etc. are liable to the users once they try and
access with proper authentication. The proposed system provides systematic access policy schemes and creates
the access mechanism to remote users. These policies and mechanisms are entirely supported context info. The
user should satisfy the defined context and defined the user level. This mechanism provides the facilities to users
to request and access control through SMS.

Keyword : SBAC, Ubiquitous Computing, Policy based, Resource Access.


References:
1. J. L. V. Barbosa, "Ubiquitous computing: Applications and research opportunities," 2015 IEEE International Conference on
Computational Intelligence and Computing Research (ICCIC), Madurai, 2015, pp. 1-8.
2. S.Pandikumar, “A Model for GSM Based Intelligence PC Monitoring System”, International Journal of Advanced Computer Science
and Technology, 2012.
3. V. J. Silva, M. A. S. Rodrigues, R. Barreto and V. Ferreira de Lucena, "UbMed: A ubiquitous system for monitoring medication
adherence," 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom), Munich, 2016,
320. pp. 1-4.
4. Alessandra Toninelli, Rebecca Montanari, Lalana Kagal, and Ora Lassila: “A Semantic Context-Aware Access Control Framework for 1836-
Secure Collaborations in Pervasive Computing Environments”, 5th International Semantic Web Conference, 2006.
1841
5. M. Anisetti, C.A. Ardagna, V. Bellandi, E. Damiani, S. De Capitani di Vimercati, P. Samarati , “OpenAmbient: a Pervasive Access
Control Architecture”, Co-located with the International Conference on Emerging Trends in Information and Communication Security
(ETRICS’06), Freiburg, Germany, June 6-9, 2006.
6. Kui Ren and Wenjing Lou: “Privacy Enhanced Access Control in Pervasive Computing Environments”
7. Ran Yang, “Trust Based Access Control in Infrastructure-Centric Environment”, IEEE International Conference on Communications
(ICC), 2011.
8. A. Basu, R. Xu, M. S. Rahman and S. Kiyomto, "User-in-a-context: A blueprint for context-aware identification," 2016 14th Annual
Conference on Privacy, Security and Trust (PST), Auckland, 2016, pp. 329-334.
9. V. Rathod, S. Narayanan, S. Mittal and A. Joshi, "Semantically Rich, Context Aware Access Control for Openstack," 2018 IEEE 4th
International Conference on Collaboration and Internet Computing (CIC), Philadelphia, PA, 2018, pp. 460-465.
10. A. S. M. Kayes, J. Han and A. Colman, "OntCAAC: An Ontology-Based Approach to Context-Aware Access Control for Software
Services," in the Computer Journal, vol. 58, no. 11, pp. 3000-3034, Nov. 2015.
11. B. Shebaro, O. Oluwatimi and E. Bertino, "Context-Based Access Control Systems for Mobile Devices," in IEEE Transactions on
Dependable and Secure Computing, vol. 12, no. 2, pp. 150-163, 1 March-April 2015.
12. S. Kumar, R. Shanker and S. Verma, "Context Aware Dynamic Permission Model: A Retrospect of Privacy and Security in Android
System," 2018 International Conference on Intelligent Circuits and Systems (ICICS), Phagwara, 2018, pp. 324-329.
13. Sanket Prabhu, Vaibhav Shah “Authentication Using Session Based Passwords” in proc. International Conference on Advanced
Computing Technologies and Applications, Volume 45, pp. 461-464, 2015.
14. N. Saxena, B. J. Choi and R. Lu, "Authentication and Authorization Scheme for Various User Roles and Devices in Smart Grid," in
IEEE Transactions on Information Forensics and Security, vol. 11, no. 5, pp. 907-921, May 2016.
15. R. Bhatti, E. Bertino and A. Ghafoor, "A trust-based context-aware access control model for Web-services," Proceedings. IEEE
International Conference on Web Services, 2004., San Diego, CA, USA, 2004, pp. 184-191.
16. Pandikumar, & Vetrivel, R. (2014). Internet of Things Based Architecture of Weband Smart Home Interface Using GSM.
17. Fabian van den Broek, “Catching and UnderstandingGSM-Signals”. Master thesis, Radboud University Nijmegen, March 22, 2010.
18. Agarwal, N., Chandran-Wadia, L., & Apte, V. “Capacity Analysis of the GSM Short Message Service”.

Authors: Himabindu Veldurthi, S.Saraswathi, T.Anil Kumar


H-Bridge Hybrid Modular Converter (HBHMC) For Grid Application by using Fuzzy Logic to
Paper Title:
Controlling and Voltage Balancing of System
Abstract: In this archive, the H-bridge hybrid modular converter (HBHMC) with fluffy rationale controller
for Grid applications is proposed. HBHMC work modes, FBSM voltage balance adjustment procedure and
HBHMC-based HVDC framework control for arrange application. It utilizes a waveform circuit (WSC)
comprising of full scaffold submodules (FBSM) at yield of main H bridge converter (MHBC). A nitty gritty
examination is made among HBHMC and other half and half procedures dependent on the quantity of switches
321. and capacitors among PI and the diffuse controller. The activity of the HVDC framework dependent on
HBHMC for adjusted and lopsided three-stage system conditions. This article shows the similar investigation 1842-
among PI and the FUZZY controller. This archive was actualized in MATLAB/SIMULATOR. 1850

Keyword : H-bridge hybrid modular converter (HBHMC) ,HVDC, matrix, secluded staggered converter ,
MATLAB programming.
References:
1. A. Lesnicar and R. Marquardt, "A dynamic geography of multinivel measured convertidor custom fitted to an amplia gama de
potencias", inProc. Power Tech Conf., 2003, vol. 3, p. 1-6.
2. S. Allebrod, R. Hamerski and R. Marquardt, "New convertible multi-arrange lifts and elevators for HVDC transmission", inProc. IEEE
Power Electron. Experts Conf., 2008, p. 174-179.
3. J. Dorn, H. Huang and D. Retzmann, "Nuevos de convertio de volta de voltae para aplicaciones y hechos HVDC", inProc. CIGRE,
Osaka, Japón, 2007.
4. R. Marquardt, "Secluded staggered converter: a typical idea for hvdc arranges and broadened ceaseless bundles", Proc. In t. Power
Electron Conf., 2010, p. 502-507. [5] L. X. Tang y B. T. Ooi, "Ubicación y aislamiento de defectos
de CC in multi-terminal CC sistemas", IEEE Trans. Power Del., Volumen 22, no. 3, páginas 1877-1884, julio of 2007
5. R. Marquardt, "Topologies of multinivel particular convertior con hindrance of cortocircuito corriente de CC", Proc. IEEE Powe r
Electron. Y ECCE Asia, 2011, p. 1425-1431.
6. J. Yang, J. Fletcher, J. Furthermore, O. Reilly, "Análisis y ubicación de cortocircuitos y fallas a tierra in CC redraded links in VSC",
IEEE Trans. Indiana Electron., Volumen fifty nine, no. 10, p. 3827-3837, octubre of 2012.
7. K. Friedrich, "Application moderne de VSC HVDC PLUS dans l. A. Topologie de convertisseur modulaire à plusieurs niveaux", dans
Proc. IEEE Int. Symp. Indiana Electron., 2010, pages 3807 à 3810
8. C. Franck, "Disjoncteurs CCHT: une dissect pour identifier les futurs besoins de recherche", IEEE Trans. Power Delivery, vol. 26, non.
2, pages 998-1007, avril 2011.
9. X. Li, Song Q, Liu W. H, Xao R, Xu X Li, "Protección de falla no everlasting en líneas aereas corriente persevered in MMC basado in
sistemas HVDC, "IEEE Trans. Entrega de Potencia, Vol. 28, no. 1, pp. 483-490, enero de 2013
10. Q. Tu, Z. Xu and L. Xu, "Decreased Switching Frequency Modulation and Circulation Suprasion for Modular Multilevel Converters",
IEEE Trans. Power Del., Volume 23, no. 3, pp. 2009-2017 2011.
11. R. Picas, J. Pou, S. Ceballos, VG Agelidis and M. Saeedifard, "Minimización de las fluctaciones de voltaje del condensador de a
secluded multinivel convertidor mediante el tráfico flujo de fluo", in proc. IEEE Industrial Elect. Conf. (IECON), Montreal, June 2012,
p. 25-28.
12. P. Josep, S. Ceballos, G. Konstantinou, V. Agelidis, R. Picas and J. aragoza, "Metodos of inyección de corriente circulante basados en
información instantánea para el convertidor measured multinivel", IEEE trans. In Indust. Choose., Volumen 2, páginas 777-788, 2015.
CH. Lokesh, Chandan Kumar. Patnaikuni, Balaji, K. V. G. D, Santhosh Kumar.B,
Authors:
E. V. Raghava Rao
Paper Title: Shear Wall Effect on G+9 and G+5 Storey Buildings in Hilly areas
Abstract: The design of building in hilly areas is a typical criteria since the base of the foundation levels
are varying due to availability of sloped terrain only. For better safety shear walls design can give the better
safety against the Earthquake damages. This paper elucidate the variation of internal parameters for G+9 and
G+5 storey buildings with shear walls on 30o sloping ground. Earthquake analysis was made in E- tabs 17.0.1
software with soft and hard soil strata. The analysis for comparing internal parameters. G+9 storey building with
core shear wall have higher story capacity while G+5 storey building have higher drift resistance.

Keyword : Shear walls,hilly areas , E-tabs soft ware ,. Internal parameters,


References:
1. Mohammed Umar Farooque Patel., A. V. Kulkarni., Nayeemulla Inamdar. “A Performance Study. and Seismic Evaluation of RCC
Frame Buildings. on Sloping Ground”, IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE), e-ISSN: 2278-1684,
2. A.S.Swathi., G.V. Rama Rao., R.A.B.Depaa.(2015), “Seismic Performace of Buildigs on Sloping Grounds”, International Journal. of
Innovative Research .in Science”., vol. 4, special issue 6, May 2015.
3. Prashant D., Jagadish Kori G(2013), " Seismic Response .of One Way Slope. RCC Frame Building With Soft Storey”, International
322. Journal of Emerging Trends in Engineering and Development, Issue 3, Vol.5.
4. Sujith Kumar, VivekGarg, Abhay Sharma,(2014) “Effect of Sloping. Ground on Structural Performance. of RCC Building.Under
Seismic Load”, International Journal Of Science, Engineering And Technology, Volume 2 Issue 6
1851-
5. S.A. Halkude., M.G. Kalyanshetti,.V.D. Ingle,(2013) “Seismic Analysis of Buildings. Resting on Sloping Ground. with Varying 1857
Number of Bays. and Hill Slopes”, International Journal of Engineering Research & Technology (IJERT)ISSN: 2278-0181Vol. 2 Issue
12,
6. N.Jitendra Babu, K.V.G.D. Balaji, S.S.S.V Gopala Raju (2012), “Pushover Analysis. of Unsymmetrical Framed Structures.. on Sloping
Ground”, International Journal of Civil, Structural, Environmental and Infrastructure Engineering Research and Development
(IJCSEIERD). ISSN 2249-6866 Vol. 2 Issue 4 45-54.
7. Ravikumar C M., Babu Narayan K S, Sujith B V, Venkat Reddy D,(2012)., “Effect. of Irregular. Configurations on Seismic.
Vulnerability. of RC Buildings”, Architecture Research, vol (2), 2012.
8. R. B. Khadiranaikar, ArifMasali, (2014) “Seismic. Performance of Buildings Resting on Sloping Ground- A Review”, IOSR Journal of
Mechanical and Civil Engineering (IOSR-JMCE), e-ISSN: 2278-1684, p-ISSN: 2320-334X, Volume 11, Issue 3 Ver. III (May-Jun.
2014).
9. Rayyan-Ul-Hasan Siddiqui, H.S. Vidyadhara,(2013) “Seismic Analysis of Earthquake. Resistant Multi Bay Multi Storeyed 3D – RC
Frame”, International. Journal of Engineering Research. & Technology (IJRET), ISSN: 2278-0181, Vol. 2 Issue 10, October-2013.
10. S.M. Nagargoje, K.S. Sable,(2012) “Seismic. Performance of Multi-Storeyed. Building on Sloping Ground”, Elixir International.
Journal, Keyvan Ramin, Foroud Mehrabpour, “Study of Short Column Behavior Originated from the level Difference on Sloping lots
during Earthquake”, Open Journal of Civil Engineering, volume. 4, March-2014.
11. Devesh. P. Soni, Bharat B. Mistry,(2006) “Qualitative Review Of Seismic Response Of Vertically Irregular Building Frames”, ISET
Journal Of Earthquake Technology, Vol. 43, No. 4.
12. Indian Standard IS 1904-1998( Re affirmed 2006), Code Of Practice For Design And Construction of Foundations In Soils: General
Requirements,

Authors: Balkrushna Shah, Shivam Dwivedi, Ath Singhal

Paper Title: Energy Saving in Split Air Conditioner using Evaporative Cooling Pad at the ODU
Abstract: The objective of the study is to investigate the performance improvement in a split air
conditioning system using evaporative cooling pads at ODU (outdoor unit) and to determine optimum thickness
323. and material of the cooling pad. For this purpose experiments were conducted on 0.8 TR capacity split air
conditioner charged with refrigerant R-22. For comparison experiments were performed with and without 1858-
evaporative cooling pad. The effect of the different cooling pad material and thickness on the overall 1862
performance of split air conditioner is experimentally found by measuring cooling capacity and the power
consumption of the system including water circulation pump. From the experimental work it is found that the
cellulose cooling pad gives the best results among the selected materials. Split air conditioner coupled with
cellulose cooling pad of 100 mm thickness at ODU results in to 13.8% increase in overall COP, 9.5 % reduction
in power consumption and 5.1 % increase in cooling capacity at 35°C DBT and 32% relative humidity outdoor
air condition.

Keyword : Evaporative cooling pad, COP, Split AC


References:
1. L. Pérez-Lombard, J. Ortiz, and C. Pout, “A review on buildings energy consumption information,” Energy Build., vol. 40, no. 3, pp.
394–398, Jan. 2008.
2. M. Youbi-Idrissi, H. Macchi-Tejeda, L. Fournaison, and J. Guilpart, “Numerical model of sprayed air cooled condenser coupled to
refrigerating system,” Energy Convers. Manag., vol. 48, no. 7, pp. 1943–1951, Jul. 2007.
3. J. Yang, K. T. Chan, X. Wu, X. Yang, and H. Zhang, “Performance enhancement of air-cooled chillers with water mist: Experimental
and analytical investigation,” Appl. Therm. Eng., vol. 40, pp. 114–120, Jul. 2012.
4. M. R. Islam, K. A. Jahangeer, and K. J. Chua, “Experimental and numerical study of an evaporatively-cooled condenser of air-
conditioning systems,” Energy, vol. 87, pp. 390–399, Jul. 2015.
5. E. Hajidavalloo, “Application of evaporative cooling on the condenser of window-air-conditioner,” Appl. Therm. Eng., vol. 27, no. 11–
12, pp. 1937–1943, Aug. 2007.
6. E. Hajidavalloo and H. Eghtedari, “Performance improvement of air-cooled refrigeration system by using evaporatively cooled air
condenser,” Int. J. Refrig., vol. 33, no. 5, pp. 982–988, Aug. 2010.
7. T. Wang, C. Sheng, and A. G. A. Nnanna, “Experimental investigation of air conditioning system using evaporative cooling cond enser,”
Energy Build., vol. 81, pp. 435–443, Oct. 2014.
8. P. Martínez, J. Ruiz, C. G. Cutillas, P. J. Martínez, A. S. Kaiser, and M. Lucas, “Experimental study on energy performance of a split
air-conditioner by using variable thickness evaporative cooling pads coupled to the condenser,” Appl. Therm. Eng., vol. 105, pp. 1041–
1050, Jul. 2016.
9. K. Harby, D. R. Gebaly, N. S. Koura, and M. S. Hassan, “Performance improvement of vapor compression cooling systems using
evaporative condenser: An overview,” Renew. Sustain. Energy Rev., vol. 58, pp. 347–360, May 2016.
10. F. W. Yu and K. T. Chan, “Simulation and electricity savings estimation of air-cooled centrifugal chiller system with mist pre-cooling,”
Appl. Ener
11. N. I. Ibrahim, A. A. Al-Farayedhi, and P. Gandhidasan, “Experimental investigation of a vapor compression system with condenser air
pre-cooling by condensate,” Appl. Therm. Eng., vol. 110, pp. 1255–1263, Jan. 2017.

Authors: Ikhlass Sydnaoui, Roslli Bin Noor Mohamed, Mariyana Aida Binti Ab.Kadir

Paper Title: The Thermal Response of Multi-Storeies Concrete Frame Building in the Arabic Area
Abstract: In this paper, there will be an analysis study to figure out the impact of the environment
thermal loads, shrinkage and creep at multi-storeies reinforced concrete frame buildings in the Arabic area.
Etabs models will be prepared considering time dependent properties of concrete and non-time dependent
properties, considering two columns heights as 3m and 6m, and two supports conditions as fixed and hinged to
define the major aspects affect the thermal response of multi-storey concrete frame buildings concentrating at
the thermal deformations and the columns reactions, then it will be compared with the thermal response of
existing concrete building considering both methodologies of time dependent properties and non-time dependent
properties of concrete to define the optimum methodology to be recommended and followed The generated
Etabs models confirmed that the time dependent properties method is the optimum with a clear conversion
between time dependent properties model and the existing parking thermal deformations. The increment in
324. horizontal reactions under thermal loads due to column support condition is accompanied with a reduction in
horizontal slabs deformations. Column height is inversely proportional to horizontal reaction values, finally, the 1863-
importance of analyzing thermal loads fluctuation at columns reactions for multi storeies buildings whereas the 1869
reactions of multi storeies cannot be predicted from single storey analysis.

Keyword : time dependent, thermal; diversion; strains


References:
1. Delsaute, J. Torrenti, J. and Staquet, S. Modelling basic creep of concrete since setting time. Cement and concrete composites, 2017.
83: 239-250.
2. Comite Euro-INTERNATIONAL DU BETON. CEB-FIP MODEL CODE 1990, 1990: 1-461.
3. Aboumoussa, W., and Iskandar, M. Thermal movement in concrete: case study of multi- storey underground car park. Materials in
civil engineering, 2012. 109- M07: 63-70.
4. ACI Committee 318. 2014. Buildings code requirements for structural concrete. 1-479.
5. DAILY TEMPERTURE, https://weatherspark.com/history.
Raudhah Ahmadi, Dora Ediba Lucas, Mohd Syukry Saiful, Mohammad Abdul Mannan, Idawati
Authors:
Ismail
Paper Title: Effect of Fibre (Polypropylene) Volume in Mortar Mixed With POFA
Abstract: High strength fibre reinforced concrete is envisaged to exhibit high compressive and tensile
strength under loadings. In this study, experimental studies are conducted to assess the mechanical behavior of
fibre reinforced mortar and comparing them with normal concrete. For this experiment, the aspect ratio of fibre
325. (polypropylene) volume inclusion is fixed to 33. Palm Oil Fuel Ash (POFA) is also included as partial cement
replacement. The compressive strength and split tensile strength tests are conducted. This paper presents the 1870-
results of mechanical strength for fibre reinforced mortar mixed with POFA. It is indicated that the volume of 1873
fibre inclusion in concrete have significant impact in compressive and tensile strength. In this study, the
optimum fibre dosage inclusion is 20 kg/m3 that exhibit 82.4MPa and 78.7 MPa stresses at 56 days of curing for
both 100% OPC and 40%POFA inclusion samples, respectively. The findings of this study can be applied to
construction in coastal areas.
Keyword : Fibre reinforced mortar, palm oil fuel ash (POFA), flexural and tensile strength
References:
1. Al -mulali, M. Z., Awang, H., Khalil, H. P. S. A., & Shaker, Z. (2015). Cement & Concrete Composites The incorporation of oil palm
ash in concrete as a means of recycling : A review. Cement and concrete composites, 55: 129–138.
2. Awal, A. A. A. A. A., & Abubakar, S. I. (2011). Properties of concrete containing high volume palm oil fuel ash: a short-term
investigation. Malaysian Journal of Civil Engineering, 23(2): 54-66.
3. Bright Hub engineering. (2016). Basics of Fibre Reinforced Concrete. Retrieved from:
http://www.brighthubengineering.com/concrete-technology/47712-basics-of-fiber-reinforced-concrete/
4. Ibnul, I., Alengaram, U. J., Zamin, M., Islam, A., Santhi, H., & Sharmin, A. (2016). Engineering properties and fracture beha viour of
high volume palm oil fuel ash based fibre reinforced geopolymer concrete. Construction & building materials, 111: 286–297
5. Islam, M. M. U., Mo, K. H., Alengaram, U. J., & Jumaat, M. Z. (2016). Mechanical and fresh properties of sustainable oil palm shell
lightweight concrete incorporating palm oil fuel ash. Journal of Cleaner Production, 115: 307-314.
6. Karim, M. R., Hashim, H., & Razak, H. A. (2016). Assessment of pozzolanic activity of palm oil clinker powder. Construction and
Building Materials, 127: 335–343
7. Lee, S. C., Oh, J. H., & Cho, J. Y. (2015). Compressive behavior of fiber-reinforced concrete with end-hooked steel fibers. Materials,
8(4): 1442-1458
8. Neves, R. D., & De Almeida, J. F. (2005). Compressive behaviour of steel fibre reinforced concrete. Structural Concrete, 6(1): 1-8.
9. Ramli, M., & Dawood, E. (2011). High-strength flowable mortar reinforced by steel fiber. Slovak Journal of civil engineering, 19(3): 10-
16.
10. Skariah, B., Kumar, S., & Sahan, H. (2017). Sustainable concrete containing palm oil fuel ash as a supplementary cementitious material
– A review. Renewable and Sustainable Energy Reviews, 80: 550–561.
11. Sujivorakul, C., Jaturapitakkul, C., & Taotip, A. (2011). Utilization of fly ash, rice husk ash, and palm oil fuel ash in glass fiber–
reinforced concrete. Journal of materials in civil engineering, 23(9): 1281-1288.
12. Tangchirapat, W., Saeting, T., Jaturapitakkul, C., Kiattikomol, K., & Siripanichgorn, A. (2007). Use of waste ash from palm oil industry
in concrete. Waste Management, 27(1): 81-88.
13. Yu, R., Song, Q., Wang, X., Zhang, Z., Shui, Z., & Brouwers, H. J. H. (2017). Sustainable development of Ultra-High Performance
Fibre Reinforced Concrete (UHPFRC): Towards to an optimized concrete matrix and efficient fibre application. Journal of Cleaner
Production, 162: 220–233.

Authors: Shilpi Singh, Preetish Ranjan, Raj Shree


Improving Fault Detection Rate using Similarity-based Test Case Prioritization in Regression
Paper Title:
Testing
Abstract: Rapid evolution in software requires regression testing to be performed as an essential activity
which validates the software before the next release. Where software developer may add or removes intended
features to maintain the software according to the customer requirements. In that case, complete test cases
execution is nearly infeasible due to limited time and resources. So, the main aim of prioritization is to test any
software with minimal time and maximum efficiency in terms of fault coverage rate. This paper proposed
different similarity-based prioritization techniques to provide ranking to the test cases based on their influence
level which is computed as similarity degree in three levels for the software to be tested. Each level represents
the integration of selected coverage criteria’s. In order to validate our proposed technique, we have conducted a
case study to measure its effectiveness in prioritizing the test cases. We experimentally observed that by
incorporating a similarity-based approach with more than one coverage criteria; results for similarity-based
prioritization are promising than any other conventional coverage based approaches in terms of Average
Percentage of Faults Detected.

Keyword : Software Testing, Regression Testing, Test case prioritization, APFD.


References:
1. Elbaum, Sebastian, Alexey G. Malishevsky, and Gregg Rothermel. "Test case prioritization: A family of empirical studies." IEEE
326. transactions on software engineering 28.2 (2002): 159-182.
2. Andrews, James H., et al. "Using mutation analysis for assessing and comparing testing coverage criteria." IEEE Transactions on
Software Engineering 32.8 (2006): 608-624. 1874-
3. Chen, Tsong Yueh, and Man Fai Lau. "A simulation study on some heuristics for test suite reduction." Information and Software 1880
Technology 40.13 (1998): 777-787.
4. Harrold, Mary Jean, and Alessandro Orso. "Retesting software during development and maintenance." 2008 Frontiers of Software
Maintenance. IEEE, 2008.
5. Elbaum, Sebastian, Alexey G. Malishevsky, and Gregg Rothermel. Prioritizing test cases for regression testing. Vol. 25. No. 5. ACM,
2000.
6. Marick, Brian. The craft of software testing: subsystem testing including object-based and object-oriented testing. Prentice-Hall, Inc.,
1994.
7. Yoo, Shin, et al. "Clustering test cases to achieve effective and scalable prioritisation incorporating expert knowledge." Proceedings of
the eighteenth international symposium on Software testing and analysis. ACM, 2009.
8. Jiang, Bo, et al. "Adaptive random test case prioritization." Proceedings of the 2009 IEEE/ACM International Conference on
Automated Software Engineering. IEEE Computer Society, 2009.
9. Ledru, Yves, et al. "Prioritizing test cases with string distances." Automated Software Engineering 19.1 (2012): 65-95.
10. Hemmati, Hadi, and Lionel Briand. "An industrial investigation of similarity measures for model-based test case selection." 2010 IEEE
21st International Symposium on Software Reliability Engineering. IEEE, 2010.
11. Hemmati, Hadi, Andrea Arcuri, and Lionel Briand. "Achieving scalable model-based testing through test case diversity." ACM
Transactions on Software Engineering and Methodology (TOSEM) 22.1 (2013): 6.
12. Singh, Shilpi, and Raj Shree. "A combined approach to optimize the test suite size in regression testing." CSI transactions on ICT 4.2-4
(2016): 73-78.
13. Sharma, Chetna, and Shilpi Singh. "Mechanism for identification of duplicate test cases." International Conference on Recent
Advances and Innovations in Engineering (ICRAIE-2014). IEEE, 2014.
14. Cartaxo, Emanuela G., Patrícia DL Machado, and Francisco G. Oliveira Neto. "On the use of a similarity function for test case
selection in the context of model‐based testing." Software Testing, Verification and Reliability 21.2 (2011): 75-100.
15. Singh, Shilpi, and Raj Shree. "A New Similarity-Based Greedy Approach for Generating Effective Test Suite." International Journal of
Intelligent Engineering and Systems, Vol.11, No.6, 2018
16. Singh, Shilpi, and Raj Shree. "An Analysis of Test Suite Minimization Techniques." International Journal of Engineering Sciences and
Research Technology 5 (2016): 252-260.
17. Singh, Shilpi, and Raj Shree. "Different Similarity Measures for Test Suite Optimization." Advanced Science, Engineering and
Medicine 10.7-8 (2018): 833-836.
18. Singh, Shilpi, Chetna Sharma, and Udai Singh. "A simple technique to find diverse test cases." International Journal of Computer
Applications 975 (2013): 8887.

Authors: Mohd Akbar, K. E. Balachandrudu, Prasadu Peddi

Paper Title: Data Deduplication with Encrypted Parameters Using Big Data and Cloud
Abstract: Distributed computing empowers organizations to devour a figure asset, for example, a virtual
machine (VM), stockpiling or an application, as a utility simply like power as opposed to building and keep up
registering frameworks in house. In distributed computing, the most significant part is server farm, where
client's/client's information is put away. In server farms, the information may be transferred various time or
information can be hacked along these lines, while utilizing the cloud benefits the information should be
encoded and put away. With the consistent and exponential increment of the quantity of clients and the size of
their information, information deduplication turns out to be increasingly more a need for distributed storage
suppliers. By putting away a one of a kind duplicate of copy information, cloud suppliers significantly decrease
their stockpiling and information move costs. As a result of the approved information holders who get the
symmetric the encoded information can likewise be safely gotten to. Keys utilized for unscrambling of
information. The outcomes demonstrate the predominant productivity and viability of the plan for huge
information deduplication in distributed storage. Assess its exhibition dependent on broad examination and PC
re-enactments with the assistance of logs caught at the hour of deduplication.

327. Keyword : big information, distributed computing, information deduplication, intermediary re-encryption.
References: 1881-
1. Shobana, R., K. ShanthaShalini, S. Leelavathy V. Sridevi (2016), “De-Duplication Of Data In Cloud”, Int. J. Chem. Sci., ISSN: 0972- 1884
768X, Volume: 14, Issue: 4, PP: 2933-2938
2. Wu, T. Y (2015) J. S. Pan, and C. F. Lin, Improving accessing efficiency of cloud storage using deduplication and feedback schemes,
IEEE Syst. J., Volume: 8, Issue: 3, PP: 1-10
3. Shweta D. Pochhi, Prof.Pradnya V. Kasture (2014), “Encrypted Data Storage with De-Duplication Approach on Twin Cloud”,
International Journal of Innovative Research in Computer and Communication Engineering, Volume: 3, Issue: 2, PP: 22-31
4. Puzio.P., R. Molva, M. Onen, and S. Loureiro (2013), “ClouDedup: Secure deduplication with encrypted data for cloud storage,” in
Proc. IEEE Int. Cof. Cloud Comput. Technol. Sci., Volume: 5, Issue: 3, PP: 363–370.
5. Deepak Mishra, Dr. Sanjeev Sharma, “Comprehensive study of data de-duplication”, International Conference on Cloud, Big Data and
Trust, Nov 2013.
6. Zhang, D., Liao, C., Yan, W., Tao, R., & Zheng, W. (2017, August). Data Deduplication Based on Hadoop. In Advanced Cloud and
Big Data (CBD), 2017 Fifth International Conference, PP: 147-152.
7. Ajay Jangra, Vandna Bhatia, UpasanaLakhinazand, NiharikaSinghx (2015), “An Efficient Storage Framework design for Cloud
Computing: Deploying Compression on De-duplicated No-SQL DB using HDFS” 2015 1st International Conference on Next
Generation Computing Technologies, Dehradun, India, 4-5 September 2015
8. Wang, C., Z. Qin, J. Peng, and J. Wang (2010), “A novel encryption scheme for data deduplication system,” Proc. International
Conference on Communications, Circuits and Systems (ICCCAS), PP: 265–269.
9. YAN, Zheng; DING, Wenxiu; YU, Xixun; ZHU, Haiqi; and DENG, Robert H (2016), “Deduplication on encrypted big data in cloud”,
IEEE Transactions on Big Data, Volume: 2, Issue: 2, PP: 138-150.
10. Liu, C. Y., X. J. Liu, L. Wan (2013), “Policy-based deduplication insecure cloud storage,” in Proc. Trustworthy Comput. Serv.,
Volume: 8, Issue: 3, PP: 250–262.

Authors: V.Saravanan, Sathya Charanya.C,

Paper Title: E-Commerce Product Classification using Lexical Based Hybrid Feature Extraction and SVM
Abstract: At present, online shopping has become a growing process, in which the profit statistics are
posted by familiar e-commerce corporations like Amazon, Flipkart, Snapdeal, etc. However, this kind of online
shopping unkindly omits the touch and feel of the products that can be used to estimate the product quality as the
main factor while buying the commodities from the shops. The estimation of product quality is more significant
during the purchasing of online products. Therefore, many opinion mining and sentiment classification methods
were introduced to purchase the best products through online shopping. But, these classification methods
haven’t attained the effective product classification with best reviews and ratings. In this paper, we propose a
hybrid feature extraction method PCA (Principle Component Analysis) and t-SNE (t-Distributed Stochastic
328. Neighbor Embedding ) with SVM (Support Vector Machine) using lexicon-based method to classify and
separate the products from the large set of different products depending on their features, best product ratings 1885-
and positive reviews. In this process, the online products will be isolated and listed according to their high 1891
positive reviews. The data preprocessing is applied to the dataset to get the data accuracy before the execution
of feature extraction and classification. The dimensionality reduction and best visualization of large data set are
executed by applying the PCA and t-SNE method. The sentiments are also been extracted by this hybrid feature
extraction method to acquire the best neighboring product ratings. The polarity of words is discovered using a
lexical based approach to extract positive reviews for obtaining the best products. Finally, the SVM is exploited
to the classification of products. The performance of the proposed method is estimated with precision, recall,
accuracy and complexity that can provide the entire accurateness of the system.

Keyword : Product classification, Feature Extraction, Dimensionality reduction, PCA, t-SNE, Lexical based
approach
References:
1. Wei Zhao, Ziyu Guan, Long Chen, Xiaofei He, Deng Cai, Beidou Wang and Quan Wang, “Weakly-Supervised Deep Embedding for
Product Review Sentiment Analysis”, IEEE Transactions on Knowledge and Data Engineering”, vol.30, no.1, pp. 185 – 197, 2018.
2. Jingbo Zhu, Huizhen Wang, Muhua Zhu, Benjamin K. Tsou and Matthew Ma, “Aspect-Based Opinion Polling from Customer
Reviews”, IEEE Transactions on Affective Computing, vol.2, no.2, pp. 1211 – 1224, 2011.
3. Jia Chen and Gang Kou, “How Online Review Valance Affect on Consumer Opinion Evaluation?”, Procedia Computer Science,
vol.91, pp. 635-641, 2016.
4. Yuan Zuo, unjie Wu, Hui Zhang, Deqing Wang and Ke Xu, “Complementary Aspect-Based Opinion Mining”, IEEE Transactions on
Knowledge and Data Engineering, vol.30, no.2, pp. 249 – 262, 2018.
5. Wan-I. Lee, Shan-Yin Cheng and Yu-Ta Shih, “Effects among product attributes, involvement, word-of-mouth, and purchase
intention in online shopping”, Asia Pacific Management Review, vol.22, no.4, pp. 223-229, 2017.
6. Shenghua Liu, Xueqi Cheng, Fuxin Li and Fangtao Li, “TASC:Topic-Adaptive Sentiment Classification on Dynamic Tweets”, IEEE
Transactions on Knowledge and Data Engineering, vol.27, no.6, pp. 1696 – 1709, 2015.
7. Lin Sun, “Research on Product Attribute Extraction and Classification Method for Online Review”, International Conference on
Industrial Informatics - Computing Technology, Intelligent Technology, Industrial Information Integration (ICIICII), pp.117-121,
2017.
8. Upma Kumari, Arvind K Sharma and Dinesh Soni, “Sentiment analysis of smart phone product review using SVM classification
technique”, International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), 2017.
9. Tejasvini Patil and Sachin Patil, “Automatic generation of emotions for social networking websites using text mining”, Fourth
International Conference on Computing, Communications and Networking Technologies (ICCCNT), Vol.4, pp.1-6, 2013.
10. Doaa Mohey El-Din Mohamed Hussein, “A survey on sentiment analysis challenges”, Journal of King Saud University - Engineering
Sciences, vol.30, no.4, pp. 330-338, 2018.
11. Zhang, Z, Ye, Q, Zhang, Z and Li, Y (2011), “Sentiment classification of Internet restaurant reviews written in Cantonese,” Expert
Systems with Applications, vol. 38, no. 6, pp. 7674–7682,
12. Chen, J, Huang, H, Tian, S and Qu, Y (2009), “Feature selection for text classification with Naïve Bayes,” Expert Systems wi th
Applications, vol. 36, no. 3, pp. 5432–5435.
13. Dan Li, Jiang Qian (2016), “Text Sentiment Analysis Based on Long Short-Term Memory”, First IEEE International Conference on
Computer Communication and the Internet, pp. 471 – 475.
14. Zhang H, Yu Z, XU M and Shi Y (2011), “Feature-level Sentiment Analysis for Chinese Product Reviews”, IEEE International
Conference on Computer Research and Development, Vol.2, pp. 135 – 140.
15. Xing Mou and Yajun Du (2016), “Sentiment Classification of Chinese Movie Reviews in Micro-Blog Based on Context”, IEEE
International Conference on Cloud Computing and Big Data Analysis, pp.313-318.

Authors: Shyamala C, Geetha Priya M, Sumithra Devi K A

Paper Title: Proactive Fault Tolerant Routing Protocol for Mobile WSN
Abstract: In Wireless Sensor Network when the sensory nodes are mobile, it is called Mobile WSN. Since
the sensors are on the move, the topology of a MWSN is perpetually dynamical. So, finding an optimal routing
path from the start node (where the event takes place) to the base station in Mobile WSN is highly complicated.
Recent research works have resulted in the design of many innovative protocols for MWSN, however there are
many unresolved issues like fault tolerance, connectivity, reducing the energy consumption, enhancing coverage,
improving security etc. This work aims at proposing a proactive FT routing scheme for Mobile WSN using a
dynamic routing table PFTP and then simulating in MATLAB for evaluating the various performance metrics.

Keyword : Mobile wireless sensor network; fault tolerance; proactive routing table; clustering.
References:
1. Shyamala C, Geetha Priya M and Sumithra Devi K A, Mobile Wireless Network: A Survey, Journal of Wireless Communication,
Network and Mobile Engineering Technology, Volume 3 Issue 2, 2018.
2. Arslan Munir et al, Modeling and Analysis of Fault Detection and Fault Tolerance in Wireless Sensor Networks, ACM Transactions on
Embedded Computing Systems (TECS), Vol 14, Issue 1, January 2015.
3. Rajeswari and Neduncheliyan, Genetic algorithm-based fault tolerant clustering in wireless sensor network, in IET Communications,
vol. 11, no. 12, pp. 1927-1932, 24 8 2017.
329. 4. Begum and Nandury, Interference-Fault Free Data Aggregation in Tree-Based WSNs, 2016 International Conference on Information
Technology (ICIT), Bhubaneswar, 2016, pp. 180-187. 1892-
5. P. Garg and M. Kaur, Improved Distributed Fault Tolerant Clustering Algorithm for Fault Tolerance in WSN, 2016 International
Conference on Micro-Electronics and Telecommunication Engineering (ICMETE), Ghaziabad, 2016, pp. 197-201. 1896
6. Kakamanshadi et al, A survey on fault tolerance techniques in Wireless Sensor Networks, 2015 International Conference on Green
Computing and Internet of Things (ICGCIoT), Noida, 2015, pp. 168-173.
7. J. Lakhotia and R. Kumar, Fault tolerant and mobility aware routing protocol for mobile wireless sensor network, 2014 International
Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), Kanyakumari, 2014, pp. 584-
590.
8. XiongQi Zheng et al, Energy efficient and Fault Tolerant Routing Protocol for Mobile Wireless Sensor Networks, 2014 International
Conference on Information and Communications Technologies (ICT 2014), Nanjing, China, 2014, pp. 1-5.
9. R. R. Panda et al, Efficient fault node detection algorithm for wireless sensor networks, 2014 International Conference on High
Performance Computing and Applications (ICHPCA), Bhubaneswar, 2014, pp. 1-5.
10. S. Trab et al, Application of distributed fault detection in WSN to dangerous chemical products based on Bayesian approach, 2013
International Conference on Advanced Logistics and Transport, Sousse, 2013, pp. 129-134.
11. Pileggi, Palau and Esteve, Multimode WSN: Improving Robustness, Fault Tolerance and Performance of Randomly Deployed Wireless
Sensor Network, 2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks, Liverpool,
2010, pp. 112-117.
12. Alwan and Agarwal, A Survey on Fault Tolerant Routing Techniques in Wireless Sensor Networks, 2009 Third International
Conference on Sensor Technologies and Applications, Athens, Glyfada, 2009, pp. 366-371.
13. Kumar Rout et al, SFTP: A Secure and Fault-Tolerant Paradigm against Blackhole Attack in MANET, International Journal of
Computer Applications, Vol. 64, issue 4, pp. 27-32.
14. A. J. Jara et al, HWSN6: Hospital Wireless Sensor Networks Based on 6LoWPAN Technology: Mobility and Fault Tolerance
Management, Computational Science and Engineering, 2009. International Conference, Vancouver, BC, 2009, pp. 879-884.
15. L. Karim and N. Nasser, Reliable location-aware routing protocol for Mobile Wireless Sensor Network, IET Communications, vol. 6,
no. 14, pp. 2149-2158, September 25 2012.
16. Karim and Nasser, Energy Efficient and Fault Tolerant Routing Protocol for Mobile Sensor Network, 2011, (ICC) IEEE International
Conference on Communications, Kyoto, 2011, pp. 1-5.

Authors: Nita Pankaj Shende, G.V.S.Rajkumar

Paper Title: Performance Evaluation of Various Machine Learning Techniques Applied on UCI Data set
Abstract: Data mining techniques are used in vast fields one of them is healthcare analysis. The present
research is aimed to do the experimental analysis of multiple data mining classification /prediction techniques
using three different machine learning classification and prediction tools over the online healthcare datasets. In
this research, we have analyze different data mining classification and prediction techniques have been tested on
four different online healthcare datasets. The standards used are a percentage of accuracy and error rate of every
applied classifier technique. The experimental analysis are performed using the 10 fold cross-validation
technique. Best suitable classification technique for a particular online dataset is selected based on the highest
classification accuracy and the least error rate as performance measurement indicators.

330.
Keyword : Healthcare, Data Mining 10 fold Cross-validation, Classification techniques.
1897-
References: 1900
1. A Comparative Study of Supervised Machine Learning Algorithms for Stock Market Trend Prediction, Indu Kumar Etl, ICICCT,
IEEE, 2018.
2. Application of machine learning in recommendation systems, Agata Nawrocka etl, IEEE, 2018.
3. Comparative Performance Analysis Of Machine Learning Techniques For Software Bug Detection, Saiqa Aleem,Etl, Itcs, Cst,2015.
4. A Machine Learning Approach for the Classification of Cardiac Arrhythmia, Prajwal Shimpi etl, ICCMC,2017.
5. Performance Evaluation of the Machine Learning Algorithms Used in Inference Mechanism of a Medical Decision Support System,
Mert Bal etl, Scientific World Journal,2014.
6. Machine Learning Techniques for Data Mining: A Survey, Seema Sharma etl,IEEE,2013.
7. Performance Analysis of Machine Learning Algorithms for Gender Classification, Laxmi Narayana Pondhu etl, ICICCT ,IEEE,2018
8. A Framework For Decision Making & Quality Improvement By Data Aggregation Techniques On Private Hospitals Data, Syed
Ahmed Yasin, Dr.P.V.R.D.Prasad Rao,ARPN,July ,2018.
9. Analysis Of Single And Hybrid Data Mining Techniques For Prediction Of Heart Disease Using Real Time Dataset, Syed Ahmed
Yasin, Dr.P.V.R.D.Prasad Rao,IJET,2018.

Authors: Sharmila Agnal, Rakshit Baranwal, Sai Krishna Varun Kumar Rai, Aviraj Gupta

Paper Title: Sentimental Analysis using Neural Networks


Abstract: Sentimental Analysis is to learn about opinion of the consumer that analyzes the understanding
of a person or crew of people about a product and present day trends. This task pursuits to learn about the
thoughts in a text that leads to a sentimental evaluation by imposing an algorithm to classify opinion. The
algorithm that has been used is applied the use of R Language. Social media is one of the biggest elements that
we stay with. Twitter is one of the social media that is in the public eye. The undertaking intends to design a
sentimental evaluation by using extracting a huge number of tweets. Sentimental Analysis is then employed on
this data, which recognizes and distinguishes the wonderful and bad critiques from the impartial tones on the
involved topic. This model even extracts the information from newspaper blogs. The data mentioned about any
subject matter in the newspaper blogs is precise. The records retrieved from the blogs are additionally analyzed
and opinion is acquired. Using this model we gain the most excellent notion.
331.
Keyword : Sentiment Analysis, Text Analysis, R- Studio 1901-
1904
References:
1. Aliza Sarlan, Chayanit Nadam, Shuib Basri University Technology Petronas, “Twitter Sentiment Analysis”,ICIMU, 2014.
2. Pooja Khanna, Sachin Kumar, Sumita Mishra, Anant Sinha, Amity University, “Sentimental Analysis: An approach to opinion
mining from twitter data using R”,IJARCS, 2017.
3. Neeti Sangwan, Vinita Malik, Sunesh, Sukhdip Sangwan, “A survey of text analytics using R language” Advances in
Computational Sciences and Technology,2017.
4. Ravendra Ratan Singh Jandail, Pradeep Sharma, Chetan Agarwal, “A Survey on Sentiment Analysis and Opinion Mining”,
IJETAE, 2014.
5. Madhav Geetha Bhargav, Duvvada Rajeswara Rao, “Sentimental analysis on social media data using R programming”,
IJET,2018.
6. Zhoa Jianqiang, Gui Xiaolin, “Deep Convolution Neural Networks for Twitter Sentiment Analysis”, IEEE, 2017.
7. Chloe Clavel, Zoraida Callejas, “Sentiment analysis: from opinion mining to human-agent interaction”, IEEE,2015.
8. Guixian Xu, Yueting Meng, Xiaoyu Qiu, Ziheng Yu, Xu Wu, “Sentiment Analysis of Comment Texts based on BiLSTM”,
IEEE, 2019.

Authors: Puspanjali Hazarika

Paper Title: Construction Technology of Namghar of Assam, India


Abstract: Namghar is the identity of the Assamese Community. Namghar tried to make unity among people.
332. It is a part and parcel of the Ek Xaran Nava Vaishnava religion promoted by Srimanta Sankardeva. Sankardeva
tried to establish a powerful community by eliminating all the differences regarding cast and creed and 1905-
distributing the light of education among the people at a time when Assam had faced a pathetic condition on 1908
religion. Namghar and Satra’s were established aiming at promoting literature, music, dance, drama, sculpture,
and architecture along with promoting religion. According to prominent scholar Dr. Maheswar Neog, Nam,
Deva, Guru, and Bhakat are the base of Nava-vaishnava religion. The bhakats from the rural areas follow their
life along with serving the God and the Guru. They were able to promote the Nava- Vaishnava religion among
the people while living a strict spiritual life. Therefore to Nurture Vhaisnav’s culture and worship the God
Namghar was established. The impact of the rules and regulation followed in the Namghar have certain impacts
on the villages all over Assam. Different festivals are celebrated in Assamese society. In the same way, there are
different festivals that are celebrated in the Namghar. They were originated with the root relating to
Navavahsinava religion. For example- Tithi of Sankardeva and Madhavdeva, Ankiya Nat, Rash, Janmastami,
Fakuwa, Pal Nam, Bar Sabah, Gokhai Bihu are Celebrated in the namghar. And namghar plays a vital role in
Assamese social life from various perspective. These include- establishing equality and promoting dignity to
everyone, Acting as a village parliament, solving dispute, centre for planning and reform, preserving ethnic
culture, etc. Besides it works as a forum for shelter during different hazards.
From the constructional point of view, it is a very unique method used, which is traditionally dispatched among
the Assamese community. This paper tried to discuss various technology and constructional system of Namghar.

Keyword : Technology, Nmaghar, Assam, Architecture, Sankardeva, Monikut. Society. Lay-Out.


References:
1. Gogoi, Lila, Assomr Sanskriti, Banalata, Guwahati. 2011.
2. Choudhury, Rabindra Narayan Mahapurush Shrimanta Sankareva, Shrimanata Sankaredev Sangha..2000
3. Devagoswami, Pitambar, Assomor Satriya Utsav Anusthan aru E bilakar Tatpaya Bichar, Banimandir, Dibrugarh. 2005
4. Devagoswami, Pitambar, Sankardeva Adhyan Prasanga –Aitihya aru Parampara, Banimandir, Dibrugarh. 2005
5. Devagoswami, Ranjit Kumar Anunad- Shriamnta Sanakrdeva aru Assomiya Sanskriti, Bhabani Print Publication, Dibruagrh.
2012
6. Borgohain, Jatindarnath Assomar Sanskritik Itihash, Bhagawati Prakashan.1989
7. Bormudoi, Ananda Yoganayak Sankardeva, Assam publishing Company.2014
8. Baruah, Birinchi Kumar Nirbachita Prabandha, Sahitya Academy.2014
9. Bora, Prafulla Chandra Sankardev Adhyan, Jyoti Prakashan, Guwahati. 2016
10. Baruah, Birinchi Kumar .Assomiya Bhakha aru Sanskriti, Puberun, Guwahati. 2000
11. Mahanta, Prafulla (Samaj-Sanskritui- Itihash Ityadi, Srijan Prakash.2016
12. Sarmah, Nabinchandar Mahapurush Shrimanta Sankardeva, Banalata, Guwahati.2014

Authors: Vishwanath G, Lokesh M, A D Kulkarni


The Impact of Location and Size of the Wind Technology on Power Quality in a Distribution System
Paper Title:
with Different Loads
Abstract: The impact of wind technology on power quality for a distribution system is emphasized in this
paper. The Power Quality of a Distribution system depends on voltage and Frequency quality. The pros of
integrating the wind turbine to the system are loss reduction and voltage profile improvement but the cons of
adding renewable energy to the distribution system are represented in this paper. such as voltage unbalance,
flicker, power factor, and the impact of voltage and current harmonics are measured. The performed analysis
results indicated the importance of the integration of DG based on Power quality Parameters.

Keyword : Total Harmonic Distortion (THD), loss Minimization, Power quality and sizing , RMF- Rotating
Magnetic field , Load flow analysis -LFA , DG-Distribution Generation .

References:
333. 1. Oecd Environment Directorate International Energy Agency “International Energy Technology Collaboration And Climate Change
Mitigation,” Rue André Pascal. France, April 2016 . 1909-
2. D. Srinivas 1, M. Rama Sekhara Reddy , Power Quality Improvement in Grid Connected Wind Energy System Using Facts Device 1914
and PID Controller, vol. 2, issue 11 e-ISSN: 2250-3021,November 2012.
3. Vahid Helać, Selma Hanjalić, “Modeling and the Impact on Power Quality of Hybrid Solar,” 978-1-5090-6409-0/17, 2017
4. Mr.Ramesh Daravath and E.Deepika, “Power Quality Improvement In Grid Connected Wind Energy System,” Gitam University,
Hyderabad,India.
5. Rishabh Jain, Yingchen Zhang, “Investigating the Impact of Wind Turbines on Distribution System ,” National Renewable Energy
Laboratory Golden.2017.
6. Aleksandar Nikolic and Branka Kostic, “Influence of Wind Generator Different Operating Regimes to the Power Quality in Supply
Network,” 2nd International Symposium on Environment-Friendly Energies and Applications (EFEA), 2012.
7. GanesanRamua,b, Abraham Alem Kebedea and Tafera Mekonena , “Performance Analysis of Power Quality Impact of Adama-One
Wind Farm in Ethiopia ,”International Conference on Control, Instrumentation, Communication and Computational Technologies
(ICCICCT), 2016.
8. AH.Polinder, F. Vander Pijl and et al, “Comparison of Direct-Drive and Geared Generator Concepts for Wind Turbines,” Energy
Conversion, pp. 725-733, 2001.
9. J.Arrilaga, D.A.Bradley and et al, “Power System Harmonics,” John Willey and Sons, 1985.
10. A. A. P. Bíscaro ,R. A. F. Pereira and M. Kezunovic, “Integrated Fault Location and Power Quality Analysis in Electric Power
Distribution Systems,”2014].

Authors: Aviraj Patel, Navnit Kumar Jha, S.Muthamilselvan A.P, Diwakar Kumar Jha.

Paper Title: An Advance Task Manager Application for Android Devices

334. Abstract: The huge growth of the mobile industry leads to more efficient software to be developed in a
mobile phone or android platform. the mobile software and games are now powerful to compete with computer’s
1915-
software but as it seems the problems will also to be carried out from this enhancement.problems in the sense
1918
bug or misbehave of any software that can hang your device.so the Task manager would be needed for mobile
devices too, where we can monitor what are all the applications are running and the complete package of
informa- tion in one single Application. The Task Manager application shows all the device’s active
applications, along with information about:task manager will show how much processor power and cores the app
is consuming, and the RAM item shows how much memory of RAM the app occupies. You can use Task
Manager to end or turn off tasks that are taking too much CPU time or memory or that any bug containing app.
You can click applications you want to stop and then click End Apps button. This project will provide the Active
applications ( Applications that are currently running on the device), Installed (Applications that have been
installed from the Play Store or any third party provider) RAM manager (Random Access Memory), Storage
(Available memory storage), Network uses(Amount of internet data used), GPU ( graphics processing unit),
Screen time (time spend on app in day), Internet Speed(speed of connected in- ternet source) and
Temperature(temperature of the whole device).

Keyword : RAM manager (Random Access Memory),


References:
1. Google android studio documentation https://developer.android.com/guide
2. Advanced Confighuration and Power Interface,[available On- line]:http;//www.acpi.info/
3. Don Domingo,”Power Management Guide”,Linux Whitepa- pers[Available Online:]https://www.linux.com/learn/whitepapers
4. IBM Developer Works,”power Management”,[Available Online:] https://www.ibm.com/developerworks/cn/linux/l-power

Authors: Ikhlass Sydnaoui, Roslli Bin Noor Mohamed, Mariyana Aida Binti Ab.Kadir

Paper Title: The Effects of Seasonal Thermal Loads at Expansion Joints Locations in Arabic Area Buildings
Abstract: Concrete buildings are subjected to fluctuation in seasonal temperature loads between summer
and winter in the Arabic area. The long-term effects on buildings of such temperatures, along with the frequent
fluctuation in the seasonal temperatures impose overall structural deformation, displacements, and alteration of
stresses in concrete elements. The thermally induced deformations affect the serviceability conditions of
buildings with time. Concrete creep and shrinkage will increase the cracks widths and the imposed stresses too.
To eliminate this phenomenon effects, expansion joints should be provided. However, as per the buildings
functions and trend to develop unique buildings by designers, joint-less buildings are usually the preferred
option. When using this option, the structural engineer has to consider the effects of thermal loads changes in the
design. Clear rules and standards must be provided to define the maximum joints spacing’s allowed length in
addition to thermal study procedures. Different approaches are provided by researchers, each methodology
provide different value for required joints spacing considering different aspects in design. In this paper I shall try
to present three methods with comparison study for considered aspects and gaps for each method analysis to
propose the most appropriate methodology as a tool helps engineers in calculating the maximum allowed
spacing between expansion joints.

335.
Keyword : fluctuation, long-term; expansion joints; thermally
1919-
References: 1925
1. ACI Committee 209R. 1997. Prediction of creep, shrinkage, and temperature effects in concrete structures. 1-31.
2. Bazant, Z.1997. Prediction of concrete creep and shrinkage: past, present and future.
3. Nuclear engineering and design, Vol203: 27-38.
4. ACI Committee 224.3R. 2001. Joints in concrete construction. 1-43.
5. Zhao, C.,Yu,G.and Zhu,B. 2014. Analysis on mechanical characteristics of important components in our long frame structure under
over all cooling, , Vol123: 770-774.
6. Pfeiffer, M., and Darwin, D.1987. Joint design for reinforced concrete buildings, Structural engineering and engineering material, SM
report NO.20:1-73.
7. SCSE Committee, 2000. Expansion joints in buildings 1974, Technical report No 65: 1-43.
8. Liu, K. and Dang, Y.2013. Deformation of overlong isolated buildings caused by thermal and concrete shrinkage. Mathematical
problems in engineering, ID 139159:7p.
9. Badrah, M.,and Jadid,N. 2013. Investigation of developed thermal forces in long concrete frame structuresbenthamscience.net. Open
civil engineering journal: Vole 7:210-217.
10. Chiyun, Z., Yu, G. and Zhu, B.2014. Analysis on Mechanical Characteristics of Important Components in Overlong Frame Structure
under Overall Cooling Temperature. Advanced material research, vole 1020:270-274.
11. Aboumoussa, W., and Iskandar, M. Thermal movement in concrete: case study of multi- storey underground car park. Materials in
civil engineering, 2012. 109- M07: 63-70.
12. DAILY TEMPERTURE, https://weatherspark.com/history.
13. Comite Euro-INTERNATIONAL DU BETON. CEB-FIP MODEL CODE 1990, 1990 : 1-461.
14. ACI Committee 318. 2014. Buildings code requirements for structural concrete. 1-479.

Authors: Inumula Veeraraghava Rao,V. Malleswara Rao

Paper Title: Transmit Antenna Optimization in Massive MIMO Technology with EE, SE Trade off
Abstract: Massive MIMO Technology showed its unique characteristics and capabilities for future wireless
communications where high data transmission rates are desired for fast growing 5G applications. High data
336. transmission rates need more number of antennas at base station which comprised of increased system
complexity and hardware cost. A proven method for reducing number of RF (radio frequency) chains at base 1926-
station is Transmit Antenna Selection algorithm. In this paper an effective approach for TAS and optimizing the 1929
number of antennas at base station for desired data rates have been proposed and a Tradeoff between SE
(Spectral Efficiency), EE (energy Efficiency) are discussed. MVGSA (modified velocity Gravitational Search
algorithm) discussed for optimization of Transmit Antennas along with Improved SE and EE other effective
algorithms are compared with multi objectives and data transmission rates. MVGSA proved with Improved SE
and EE with Effective TAS.
Keyword : Massive MIMO, Transmit Antenna Selection, Energy Efficiency, Spectrum Efficiency, MVGSA
References:
1. I.V. Rao, “Optimal Transmit Antenna Selection Using Improved GSA in Massive MIMO Technology”, WPC
2. Aritra Konar “A Simple and Effective Approach for Transmit Antenna Selection in Multi-user Massive MIMO Leveraging Sub-
modularity”, IEEE Transactions on Signal Processing
3. Xian Gao, “Massive MIMO Performance Evaluation Based On Measured Propagation Data “, IEEE TRANSACTIONS ON
WIRELESS COMMUNICATIONS, VOL. 14, NO. 7.
4. Manish Mandloi, “Error Recovery Based Low-Complexity Detection for Uplink Massive MIMO systems”, IEEE Wireless
Communications Letters
5. Wan A.W.M. Mahyiddin, “Massive MIMO Systems in Time-Selective Channels”, IEEE Communications Letters
6. Said. E. Khamy, “Performance of Enhanced Massive Multiuser MIMO Systems Using Transmit Beam forming and Transmit Antenna
Selection Techniques”, Wireless Personal Communication
7. Huimin Zhao, Zujun Liu, Yongjun Sun, “Energy efficiency optimization for SWIPT in K-user MIMO interference channels”
,Physical Communication, vol. 27, pp. 197-202, April 2018.
8. Jiang Jing, Cheng Xiaoxue, Xie Yongbin, “Energy-efficiency based downlink multi-user hybrid beamforming for millimeter wave
massive MIMO system”, The Journal of China Universities of Posts and Telecommunications, vol. 23, no. 4, pp. 53 -62, August 2016.
9. Long Zhao, Ke Li, Kan Zheng, “ An Analysis of the Trade Off Between The Energy & Spectrum Effeciences in An Uplin k Massive
MIMO-OFDM System”, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS, VOL. 62, NO. 3, MARCH 2015.
10. Z. Liu, W. Du and D. Sun, "Energy and Spectral Efficiency Tradeoff for Massive MIMO Systems With Transmit Antenna Selection,"
IEEE Transactions on Vehicular Technology, vol. 66, no. 5, pp. 4453-4457, May 2017.
11. Y. Gao, H. Vinck and T. Kaiser, "Massive MIMO Antenna Selection: Switching Architectures, Capacity Bounds, and Optimal
Antenna Selection Algorithms," IEEE Transactions on Signal Processing, vol. 66, no. 5, pp. 1346-1360, March1, 1 2018.
12. Piya Patcharamaneepakorn, ShangbinWu, Cheng-XiangWang, “Spectral, Energy, and Economic Efficiency of 5G Multicell Massive
MIMO Systems With Generalized Spatial Modulation” IEEE

Authors: Cmak Zeelan Basha ,K.Olive Sharon, K.L.S.Susmitha,N.Sai Sri

Paper Title: Advanced Event Attendance Monitoring System


Abstract: The main objective of developing this system is to automate the process of providing attendance
to the students who are a part of the event. Here, the student’s work gets easier. There is no more wandering for
permissions. This system follows the college rules and it is more reliable. Student can view his details. He can
track his permission details. He can also view at any point of time. This would reduce the present pen and paper
based manual method of taking attendance. Replacing the old traditional method, this system will reduce the use
of piles of paper and hardcopies. It will save time, reduces the amount of manual work done by students and
teachers. This is replaced by a computer based system developed using Servicenow. Students fill their details in
the form by logging into the portal and some validations are done while filling the form using client scripts and
ui policies. Here all the process is automated using workflows. Event managers, Head of the Department and
Class Incharge analyse the students details which are maintained in the system. Thus, faculty provide attendance.

Keyword : Service Now, Portal, Client scripts, UI Policies, Workflow, Record, Analysis, Attendance.

337.
References:
1. J.selvakumar,A.Lakshmi,T.Arivoli. IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -
2012) March 30, 31, 2012 .“Brain Tumor Segmentation and Its Area Calculation in Brain MR Images using K-Mean Clustering and 1930-
Fuzzy C-Mean Algorithm” 1933
2. Vinay Parameshwarappa, Nandish S (2014) “A Segmented
3. Morphological Approach to Detect Tumour in Brain Images“ International Journal of Advanced Research in Computer Science and
Software Engineering.vol 4.
4. Jay Patel and Kaushal Doshi. Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 3 (2014),“A Study
of Segmentation Methods for Detection of Tumor in Brain MRI”.
5. Vishal B. Padole, D. S. Chaudhari, International Journal of Electronics, Communication & Soft Computing Science and Engineering
(IJECSCSE) Volume 1, “A Review of Segmentation Methods for Detection of Brain Tumor in MRI”.
6. Sudipta Roy,Sanjay Nag,Indra Kanta Maitra, International Journal of Electronics, Communication & Soft Computing Science and
Engineering (IJECSCSE) Volume 3, Issue 6.
7. Rohan Kandwal, Ashok Kumar( 2014) “An Automated System for Brain Tumor Detection and Segmentation”
8. Jobin Christ M.C. 1, Dr. Parvathi R.M.S. IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, July 2012”Brain
Tumors: An Engineering Perspective”.
9. C M A K. Zeelan Basha, Maruthi Padmaja, and G.N.Balaji,“Computer Aided Fracture Detection System” Journal of Medical Imaging
and Health Informatics Vol. 8, 526–531, 2018.
10. Azmira Krishna, CMAK Zeelan Basha, Pradeep Raj Savarapu, Soumya Ranjan Nayak, S. Sivakumar ” Multi Target Tracking Access
with Data Association in Distributed Camera Networks”, International Journal of Recent Technology and Engineering
(IJRTE),vol.8,412-417.
11. Cmak Zeelan basha, Azmira Krishna, Pradeep Raj Savarapu “Automatic Detection of Lung Infection”, International Journal of Recent
Technology and Engineering (IJRTE), Volume-8,200-203.

Authors: Rituparna Kalita


Is the Traditional Handloom Industry in Assam in Trouble? Evidence from the Weavers in Barpeta
Paper Title:
District
338. Abstract: The handloom industry, one of the largest traditional unorganised economic activities after
agriculture, occupies an integral part of the rural livelihood. Growth and sustainability of this industry is based
1934-
on the transfer of skill from one generation to the next as well as their ability to adapt to market requirements. As
1937
per the Third Handloom Census of India (2009-2010), about 2.38 million handloom units provided employment
to 4.33 million persons of which, 3.63 million workers are in rural areas and .698 million workers in urban areas,
respectively. In Assam, by providing livelihood to millions of weavers and craftsmen in rural areas, a vital role
has been being played by this industry in the economic development of the rural masses. However, over the last
couple of years, it has been noticed that the situation has changed and this age-old tradition of handloom
weaving as an activity is in deep crisis. Considering such a critical juncture faced by both the industry and the
weavers alike, this paper aims at exploring the present situation of the handloom industry in Assam. An attempt
of in-depth primary study of 200 weavers in Barpeta district has been performed and descriptive statistics has
been used to analyse the primary data. Results show that the continuation of this tradition in future is under
question in the district. A very less percentage of weavers’ children are interested in continuing their hereditary
occupation of weaving in future.

Keyword : Conditions, Economy, Handloom industry, Trouble, Weavers, Weaving


References:
1. Aggarwal, A., Sharma, A., Tripathi, A., Wadhawan, A., Chongtham, E., Gupta, H. et al. (2015). Static or dynamic - The analysis of
handloom industry of Assam. DU Journal of Undergraduate Research and Innovation, 1(2), 1-19.
2. Ansari, I. A. (2014). Handloom: An endangered industry. Mainstream Weekly. LII (25).
3. Bankers Institute of Rural Development (BIRD). (2016). Problems and Prospects of Handloom Sector in Employment Generation in
the Globally Competitive Environment. Lucknow: Bankers Institute of Rural Development.
4. Basha, A. N. (1991, October 10). Problem of handloom industry in Andhra Pradesh. Udayam The Daily News Paper, p. 3.
5. Boruah, R. R. & Kaur, S. (2015). A study on the handloom weavers belonging to weavers’ cooperative societies of Assam.
International Journal of Multidisciplinary Research and Development, 2(5), 361-363.
6. Devi, A. K. R. (1983, January). Plight of handlooms: A study of Kurukshetra. Kurukshetra, 1, 17-22.
7. Ministry of Textiles. (2015). Note on Handloom Sector (Ministry of Textiles). Government of India.
8. Narasaiah, M. L., & Krishna, C. H. T. (1999). Crisis of handloom industry. New Delhi: Discovery publishing House.
9. National Council of Applied Economic Research (NCAER). (2010). Handloom Census of India 2009-2010. New Delhi.
10. National Council of Applied Economic Research (NCEAR). (1987-88). Census Report of Hand-looms, 1987-88. New Delhi.
11. Rao, K. R. M., & Kumar, K. K. (2018). Impact of integrated handloom cluster development scheme (IHCDS) on working conditions
of weavers: A Study of working weavers in Andhra Pradesh. International Journal of Novel Research and Development, 3(2), 42-47.
12. Reddy, D. N. (2006). Women handloom weavers: Facing the brunt. Gender and Trade Policy, Centre for Handloom Information and
Policy Advocacy (CHIP).
13. Saikia, S. K. (2004, February). Strategy for handloom products in North Eastern Region. Souvenir: National Handloom Expo-2004
Tezpur-Assam, p. 13.

Authors: Pabitra Das Mohapatra, Siba Prasad Mishra, Sipalin Nayak, Mohammad Siddique
Optimized Structural Performance of Paver Blocks of Bajri Concrete: NRM Partly Substituting
Paper Title:
Cement
Abstract: The discarded object dart during alumina extraction from bauxite ores in Bayers process is Red
Mud. The solid/ liquid insoluble by-product dumped in exposed red mud ponds which are radioactive, highly
alkaline and environmental contaminant to soil, surface water and ground water and possess disposal threats.
Recent trend in increased urbanization and modernization has plenty of use of exterior flooring by concrete
pavers block depending upon traffic load and volume. Present work is to know whether this red mud can be
reused as a sustainable construction material to replace cement. The XRF spectroscopic advantage is taken to
determine the composition identities between red mud and OPC cement. The study reveals the optimized
percentage of red mud blend with cement after neutralization normalization. It cannot be disposed of easily.
Attempt has been made to use bajri as the coarse aggregate instead of 12mm chips. The crusher by-product is
having less use as construction materials. So the spare of cement by compensating with red mud and use of bajri
shall be cost effective, environmentally sustainable and convenient disposal of the harmful waste. The
mechanical characteristics like compressive, flexural, and split tensile strength etc., at 0%, 10%, 20%, 30% and
40% replacement of cement by red mud is found by using compressive testing machine (CTM) and universal
testing machine (UTM) adhering to IS : 15658 (2006) and amended in 2011. The 20% OPC cement substitution
by red mud is found to be adequate and will maintain sustainability.
339.
Keyword : Mechanical Strength, Concrete, Red mud; Bajri, Pavers block. 1938-
1949
References:
1. Sutar H. K., Mishra S. C., Sahoo S. K., Chakraverty A P., Maharana H. S., 2014, Progress of Red Mud Utilization: An Overview” ,
American Chemical Science Journal. Science domain international, Vol-4(3), 255-279, www.sciencedomain.org
2. Dodoo-Arhin D., Rania A., Nuamaha A., Agyei B., David T., Obadac O., Yayaa A., 2017, Awaso bauxite red mud -cement based
composites:
3. Characterisation for pavement applications,Case Studies in Construction Materials, Elsevier,Vol-7, PP- 45-55, https://doi.org/10.1016
/j.cscm .2017. 05.003
4. Wyatt Pontius, 2018, Environmental and Radiation Concerns of Red Mud, PH241, Stanford Univ., Winter 2018,
http://large.stanford.edu/courses/2018/ph 241/ pontius1/
5. Sawant R. A. B., Kumthekar M. B., Diwan V. V., Hiraskar K. G., 2012, Experimental Study on Partial Replacement of Cement by
Neutralized Red Mud in Concrete” , International Journal of Engineering and Advanced Technology (IJEAT).
6. Sarode D., Deshmukh M. P., Pendhari S. S., Alam I., 2015, Partial Replacement of Cement in Mortar with Red Mud and Ultra fines,
Conference: 2nd R N Raikar Memorial International Conference and Bantia- Basheer International Symposium on Advances in
Science and Technology of ConcreteAt: Mumbai, IndiaVolume: Volume II, ISBN No.81-86876-16-2
7. Gowsalya. R, Bhagyalakshmi. A, 2015, Experimental Study on Partial Replacement of Cement by Red Mud, International Journal of
Engineering Research & Technology (IJERT), ISSN: 2278-0181, Vol -3(4), pp-1-4
8. Bishetti P. N., Pammar L., (2014) “Experimental study on utilization of industrial aste in concrete”, Int. Jr. of Technical Research and
Applications, Vol-2(4), pp-49-52
9. Pujar S. M., Prakash K.B., 2014, Effect of Replacement of Cement by Red mud on the Properties of Concrete, Int. Jr of Sc. & E ng.
Research, Vol- 5 (9), pp- 805-814
10. Deepika K., Ananthakumar S., Mariadoss R, Nanthagopal J., Saravanakumar V., 2017, Experimental Investigation of Concrete by
Red Mud as Replacement of Cement and Using Strengthening Admixture, International Journal of Innovative Researc h in Science,
Vol-6 (3), pp- 3928-3933, DOI:10.15680/IJIRSET.2017.0603164
11. Varghese M., 2017, Partial Replacement of Cement using Red Mud in SCC, Int. Jr. of Innovative Research in Sc., Eng. and
Technology, Vol. 6 (5), pp- 8333-8338, http:/ /www.ijirset.com/upload/2017/may/175_Partial.pdf
12. Deelwal K., Dharavath K., Kulshreshtha M. (2014) “Evaluation of characteristic properties of red mud for possible use as a
geotechnical material in civil construction”, International Journal of Advances in Engineering & Technology, Vol-7(3), PP-1053-59.
13. Tauber, T., Hill, R. K., Crook, D. N. and Murray, M. J., 1971, Red mud residues from alumina production as a raw material for heavy
clay products. J. Austr. Ceram. Soc., 7 (1), pp. 12-17
14. Knight, J.C., Wagh A. S., Reid W.A., 1986, The Mechanical Properties of Ceramics from Bauxite Waste, Journal of Materials
Science, 21, pp. 2179-2184
15. Bhat P.N., Ghosh D.K., Desai M.M., 2002, Immobilisation of beryllium in solid waste (red-mud) by fixation and vitrification, Waste
Management, 22, pp. 549–556
16. Lima M. S. S., Thives L. P., Haritonovs V., Bajars K., 2017, Red mud application in construction industry:review of benefits and
possibilities, IOP Conf. Ser.: Mater. Sci. Eng. 251 012033, 251 PP- 1-10, doi:10.1088/1757-899X/251/1/012033
17. Prasad P. M., Kachawha J. S., Gupta R. C., Mankhand T. R., Sharma, J. M., 1985,Light metal science and technology, Switzerla nd:
Trans. Tech. Publication Ltd.; PP- 31,
18. Kumar R, Srivastava J. P., Prem Chand,1998, Utilisation of iron values of red mud for metallurgical application, Envir. waste
management in non-ferrous metallurgical industries, In: Bandopadhyay A, Goswami N. G., Rao R. P, editors. Jamshedpur: NML, PP-
108–19
19. DmitrievAndrey, 2018, The Comprehensive Utilisation of Red Mud Utilisation in Blast Furnace, Open access peer-reviewed chapter,
Open access peer-reviewed chapter, Intech open, pp-1-14 DOI: 10.5772/intechopen.80087
20. Kara M., Emrullahoglu, O. F., 1995, Study of Seydisehir red mud wastes as brick and rooing tiles. In Fourth Euroceramics , Vol. 12,
ed. I. Braga, S. Cavallini and G. F. Di Cesare, Faenza Editrice,, Italy, PP- 155-162,
21. Snigdha S.,.Batra V. S. 2008, Catalytic applications of red mud, an aluminium industry waste: A review, Elsevier, Applied Catalysis
22. B:Environmental,Vol-81(1–2),PP-64-77, https://www.sciencedirect.com/science/article/pi/S0926337307004468
23. Busto R. V., Gonçalves M., Coelho L. H., 2016, . Assessment of the use of red mud as a catalyst for photodegradation of bisph enol A
in wastewater treatment, Pubmed, Water Sci Technol. Vol-74(6), PP-1283-1295..
24. Velumani P., Senthil Kumar S., 2017, Production of sludge incorporated paver blocks for efficient waste management, Taylor an d
Francis, Journal of the Air & Waste Management, DOI: 10.1080/10962247.2017.1395373To link to this article:
25. BathamGeeta, 2018, Strength enhancement of paver block using red mud, International Research Journal of Engineering and
Technology (IRJET), Vol- 05(7), pp-585-589
26. Deshmukh M. P., Sarode D.D., Avijit C., 2014, Effect of Partial Replacement of Crushed Fine Aggregates with an Industrial Waste
(Red Mud) on Chloride Penetration of Concrete, Inpresco, International Journal of Current Engineering and Technology, Vol 4(6 ),
pp- 4026-4029
27. KulkarniSupriya, 2018, Experimental Study on Red Mud, Fly Ash and GGBFS based Geopolymer Concrete, A Green Substitute to
Conventional Concrete, International Journal of Engineering Research & Technology (IJERT), Vol-7 (2),pp- 107-111
28. IEA Green House gas R & D Programme, (IEA GHG), 2008, CO2 capture in cement Industry , 2008/3,
https://ieaghg.org/docs/General_Docs/Reports/2008-3.pdf
29. Power, G., Grafe, M., and Klauber, C., (2009), Review of Current Bauxite Residue Management, Disposal and Storage:Practices,
Eng. and Sc.. CSIRO Document DMR-3609
30. Venkatesh C.,Madduru S. Rama Chand, Nerella, Ruben, 2019, A State of the Art on Red Mud as a Substitu-tional Cementitious
Material, Annales de Chimie: Science des Materiaux, Vol. 43(2), April, 2019, pp. 99-106
31. Parekh, B. K., Goldberger W. M., 1976, An assessment of technology for possible utilization of Bayer process Muds, EPA 600/2-76-
301, Washington D.C. (1976),
32. Lakshmi T.D.V., Prasad DSV, M Anjan Kumar, Raju GVR Pr., 2015, Stabilization of Industrial Waste Red-Mud with Cement,
International Journal of Research and Innovations in Earth Science, Vol- 2 (1), pp- 5-9
33. Majumdar P. and Mishra S. P., 2017. “Management of Pumice Crete as LWC/LWA construction material with Fly Ash as part
cement substitute”, International Journal of Development Research, 7, (07), 13978-13984.
34. FengYanbo., Yang C., 2018, Analysis on Physical and Mechanical Properties of Red Mud Materials and Stockpile Stability after
Dilatation, Adv. In material S. and Eng, Vol-2018, Article ID 8784232, 14 pages, https://doi.org/10.1155/2018/8784232
35. Rathod R. R., Suryawanshi N. T., , Memade P. D.,2012, Evaluation of the properties of Red Mud Concrete, IOSR Journal of
Mechanical and Civil Engineering (IOSR-JMCE), PP: 31-34
36. Ashok P, Suresh kumar M. P., 2014, Experimental Studies On Concrete Utilising Red Mud As a Partial Replacement Of Cement With
Hydrated Lime, IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE), PP- 01-10
37. Metilda D. L. Selvamony C., Anandakumar R., Seeni A., 2015, Investigations on optimum possibility of replacing cement partially by
red mud in concrete ,. Academic journals. Vol-10(4), PP.137-143.
38. Nayak S., Mishra S P., Panda S., 2017, Red Mud, the cutting edge of self-compacting concrete, INPRESSCO, International Journal of
Current Eng. and Technology, Vol 7(2), pp.390 -396
39. P. SyamSai and ChandanaSukesh, Strength Properties of Concrete By Using Red Mud as a Replacement of Cement with Hydrated
Lime. Int. Jr. of Civil Engineering and Technology, 8(3), 2017, pp. 38–49
40. Peter J. Ruksana C. M, Peter A., Mohan S., 2018, Strength Characteristics Study on Red Mud Concrete, International Journal of
Research in Engineering, Science and Management, Vol-1(9), PP – 259-263
41. Thangamani K, 2018, Constant replacement of cement with red mud and partial replacement of sand with m. sand in concrete, JETIR
May 2018, Vol 5 ( 5), PP- 1065-1070
42. Juned M. , Ahmad A., 2019, Experimental Study of Concrete Strength Properties Using Red Mud (bauxite residue) as a partial
replacement of binder content for M25 grade of Concrete Int. Jr. of Tech. Innovation in Modern Eng. & Sc. (IJTIMES), Vol-5 (4).

Authors: S.Anitha, M.Vanitha

Paper Title: Imputation Methods for Missing Data for a Proposed VASA Dataset
Abstract: Preprocessing is the presentation of raw data before apply the actual statistical method. Data
preprocessing is one of the most vital steps in data mining process and it deals with the preparation and
transformation of the initial dataset. It is prominent because the investigating data which is not properly
340. preprocessed could lead to the result which is not accurate and meaningless. Almost every research have missing
data and introduce an element into data analysis using some method. To consider the missing values that need to
1950-
provide an efficient and valid analysis. Missing imputation is one of the process in data cleaning. Here, four
1953
different types of imputation methods are compared: Mean, Singular Value Decomposition (SVD), K-Nearest
Neighbors (KNN), Bayesian Principal Component Analysis (BPCA). Comparison was performed in the real
VASA dataset and based on performance evaluation criteria such as Mean Square Error (MSE) and Root Mean
Square Error (RMSE). BPCA is the best imputation method of interest which deserve further consideration in
practice.
Keyword : Data Preprocessing, Missing Data, Imputation Methods, BPCA, RMSE.
References:
1. K. Manimekalai and A. Kavitha, “Missing Value Imputation And Normalization Techniques in Myocardial Infarction”, ICTACT
Journal on Soft Computing,Vol.08 Issue:03,April 2018.
2. Peter Schmitt, J Biomet Biostat ,Jonas Mandel et al,”A Comparison of Six Methods for Missing Data Imputation”, in Journal of
Biometrics & Biostatistics, 2015.
3. V.B. Kambie and S.N. Deshmukh ,“Comparision between Accuracy and MSE, RMSE by using Proposed Method with Imputation
Technique”, Oriental Journal of Computer Science and Technology, ISSN: 0974-6471, Vol. 10, No. (4) 2017
4. Dr.Durairaj.M, Sivagowry.S , “A Pragmatic Approach of Preprocessing the Data Set for Heart Disease Prediction”, International
Journal of Innovative Research in Computer and Communication Engineering, ISSN(Online): 2320-9801, Vol. 2, Issue 11, November
2014
5. Qinbao Song, Martin Shepperd et al, “Can k-NN Imputation Improve the Performance of C4.5 With Small Software Project Data
Sets? A Comparative”, JSS ,December 2008.
6. Shigeyuki Oba, Masa-aki Sato, Ichiro Takemasa, MoritoMonden, Ken-ichi Matsubara and Shin Ishi, “A Bayesian missing value
estimation method for gene expression profile data”, Bioinformatics, Vol. 19 no. 16, pages 2088–2096,2003.
7. Gustavo E. A. P. A. Batista and Maria Carolina ,“An Analysis of Four Missing Data Treatment Methods for Supervised Learning”,
2014.
8. Bjorn Grung , Rolf Manne ,“Missing values in principal component analysis”, Chemometrics and Intelligent Laboratory
Systems,1998.
9. Julian Luengo, Salvador Garcia,Francisco ,“On the choice of the best imputation methods for missing values considering three groups
of classification methods”, KnowlInfSyst, 2012.
10. Folch-Fortuny, F.Arteaga et al, “PCA model building with missing data: new proposals and a comparative study”, Chemometrics and
Intelligent Laboratory Systems,2015.
11. Kristen A. Severson, Mark C. Molaro † and Richard D. Braatz,“Principal Component Analysis of Process Datasets with Missing
Values”,MDPI Processes,2017.
12. Arjun Puri, Dr. Manoj Gupta, “Review on Missing Value Imputation Techniques in Data Mining”, International Conference on
Machine Learning and Computational Intelligence-2017.
13. Dan Li, JitenderDeogun et al,“Towards Missing Data Imputation: A Study of Fuzzy K-means Clustering Method”, Springer-Verlag
Berlin Heidelberg 2004.
14. SowmyaChandrasekaran et al, ”Data Preprocessing: A New Algorithm for Univariate Imputation Designed Specifically for Industrial
Needs”, Technology Arts Science,Workshop Computational Intelligence, 2016.
15. Z. Mahesh Kumar , R. Manjula ,”Regression model approach to predict missing values in the Excel sheet databases”, Internation al
Journal of Computer Science & Engineering Technology (IJCSET), ISSN : 2229-3345, 2012.
16. Cosmin Lazar, Laurent Gatto, Myriam Ferro, Christophe Bruley and Thomas Burger, “Accounting for the Multiple Natures of
Missing Values in Label-Free Quantitative Proteomics Data Sets to Compare Imputation Strategies”,American Chemical Soceity
2016.
17. Min-Wei Huang,Wei-Chao Lin,Chih-Wen Chen,Shih-Wen Ke,Chih-Fong Tsai,WilliamEberie,“Data preprocessing issues for
incomplete medical datasets”,Wiley Online Library,2016.
18. R. Manimaran, Dr.M.Vanitha,”Novel Approach to Prediction of Diabetes using Classification Mining Algorithm “, International
Journal of Innovative Research in Science, Engineering and Technology,July 2017.

Authors: CMAK Zeelan Basha, G Kalyan Jaya Simha, Y Vamsi Krishna

Paper Title: An Efficient and Robust Fracture Detection in Femur Bones


Abstract: There are several bones in the body but the femur is especially the important bone in the body
which is from the hip to knee. The Red blood cells(RBC) are created because of bone called femur. In this paper
we have given a method to know where the bone has broken by the methods of image processing..We will
preprocess the image in order to show the interested domain . In this paper, foreground is taken as our interested
domain in order to hide the background details. There are many mathematical and morphological operations
which are used for this process, by using these methods and operations we highlight the foreground and the
objects in the foreground will be highlighted by using edge detection. The support vector machine in the
preprocessed image to know where the bone has fractured and where the bone was not fractured.

Keyword : Average filtering, Median flitering ,Sobel Edge detection, Canny Edge detection
References:
341. 1. J.selvakumar,A.Lakshmi,T.Arivoli. IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM
-2012) March 30, 31, 2012 .“Brain Tumor Segmentation and Its Area Calculation in Brain MR Images using K-Mean Clustering and
Fuzzy C-Mean Algorithm” 1954-
2. Vinay Parameshwarappa, Nandish S (2014) “A Segmented 1957
Morphological Approach to Detect Tumour in Brain Images“ International Journal of Advanced Research in Computer Science and
Software Engineering.vol 4.
3. Jay Patel and Kaushal Doshi. Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 3 (2014),“A Study
of Segmentation Methods for Detection of Tumor in Brain MRI”.
4. Vishal B. Padole, D. S. Chaudhari, International Journal of Electronics, Communication & Soft Computing Science and Engineering
(IJECSCSE) Volume 1, “A Review of Segmentation Methods for Detection of Brain Tumor in MRI”.
5. Sudipta Roy,Sanjay Nag,Indra Kanta Maitra, International Journal of Electronics, Communication & Soft Computing Science and
Engineering (IJECSCSE) Volume 3, Issue 6.
6. Rohan Kandwal, Ashok Kumar( 2014) “An Automated System for Brain Tumor Detection and Segmentation”
7. Jobin Christ M.C. 1, Dr. Parvathi R.M.S. IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, July
2012”Brain Tumors: An Engineering Perspective”.
8. C M A K. Zeelan Basha, Maruthi Padmaja, and G.N.Balaji,“Computer Aided Fracture Detection System” Journal of Medical Imaging
and Health Informatics Vol. 8, 526–531, 2018.
9. Azmira Krishna, CMAK Zeelan Basha, Pradeep Raj Savarapu, Soumya Ranjan Nayak, S. Sivakumar ” Multi Target Tracking Access
with Data Association in Distributed Camera Networks”, International Journal of Recent Technology and Engineering
(IJRTE),vol.8,412-417.
10. Cmak Zeelan basha, Azmira Krishna, Pradeep Raj Savarapu “Automatic Detection of Lung Infection”, International Journal of Recent
Technology and Engineering (IJRTE), Volume-8,200-203.

Authors: CMAK Zeelan Basha,Tahaseen Rabab, Y.Sravanthi,Y.Anila

Paper Title: Servicenow based Advanced and Robust Leave Management System
Abstract: Leave Management is an interface that makes it easier for faculty / staff to apply for leave at
universities or organizations. The application allows the registered user to log in and the new user is allowed to
register. The application makes it convenient for the user applying for leave. In today's time, we need to wait for
higher authorities to sanction leave. To order to reduce the period that we use this form, the status of approval or
denial of leave will be notified immediately by e-mail. This application also provides the flexibility to delegate
our duties to the other Staff on the date of leave.

Keyword : Sanction, Higher authorities,E-mail,Delegate our duties.


References:
1. J.selvakumar,A.Lakshmi,T.Arivoli. IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -
2012) March 30, 31, 2012 .“Brain Tumor Segmentation and Its Area Calculation in Brain MR Images using K-Mean Clustering and
342. Fuzzy C-Mean Algorithm”
2. Vinay Parameshwarappa, Nandish S (2014) “A Segmented
Morphological Approach to Detect Tumour in Brain Images“ International Journal of Advanced Research in Computer Science and
1958-
Software Engineering.vol 4. 1961
3. Jay Patel and Kaushal Doshi. Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 3 (2014),“A Study
of Segmentation Methods for Detection of Tumor in Brain MRI”.
4. Vishal B. Padole, D. S. Chaudhari, International Journal of Electronics, Communication & Soft Computing Science and Engineering
(IJECSCSE) Volume 1, “A Review of Segmentation Methods for Detection of Brain Tumor in MRI”.
5. Sudipta Roy,Sanjay Nag,Indra Kanta Maitra, International Journal of Electronics, Communication & Soft Computing Science and
Engineering (IJECSCSE) Volume 3, Issue 6.
6. Rohan Kandwal, Ashok Kumar( 2014) “An Automated System for Brain Tumor Detection and Segmentation”
7. Jobin Christ M.C. 1, Dr. Parvathi R.M.S. IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, July 2012”Brain
Tumors: An Engineering Perspective”.
8. C M A K. Zeelan Basha, Maruthi Padmaja, and G.N.Balaji,“Computer Aided Fracture Detection System” Journal of Medical Imaging
and Health Informatics Vol. 8, 526–531, 2018.
9. Azmira Krishna, CMAK Zeelan Basha, Pradeep Raj Savarapu, Soumya Ranjan Nayak, S. Sivakumar ” Multi Target Tracking Access
with Data Association in Distributed Camera Networks”, International Journal of Recent Technology and Engineering
(IJRTE),vol.8,412-417.
10. Cmak Zeelan basha, Azmira Krishna, Pradeep Raj Savarapu “Automatic Detection of Lung Infection”, International Journal of Recent
Technology and Engineering (IJRTE), Volume-8,200-203.

Authors: Khonaboina Sandeep Kumar, J.S.R. Prasad, Venu Malagavelli

Paper Title: Non-Linear Static Analysis of RCC Framed Structures with and Without Infill Walls
Abstract: The concept of an earthquake is becoming an exceptional study in our use because no longer a
particular area can be targeted as an earthquake-resistant area. So, the main motif of any structural engineer
during the design is to design a structure that could cope with seismic pressure successfully. On this note, non-
linear static pushover analysis has become a prominent tool for the structural design and evaluation of RC
elements. In this project G + 5, G + 9, G + 5 with infill walls and G + 9 with infill walls RCC framed structures
have been analyzed by the use of SAP 2000 v19. The structures are designed as in keeping with IS 1893(Part 1):
2002 for earthquake forces in seismic zone IV. The use of the equivalent strut approach for modeling the infill
walls is adopted and strut is designed in accordance with FEMA-356. Non-linear Static pushover analysis is
performed on the designed RCC framed structures with and without infill walls. And pushover results are used
to evaluate structural performance under design earthquake load, and code requirements are discussed.

Keyword : Structural Elements, Pushover Analysis, Infill Walls and Failure Mechanism.
References:
343. 1. Rajeshwari Patil, Shweta Anoor, Shweta Desai, Sudha, Gajendra, Mithun Kumar, “Analysis and design of residential building by using
sap-2000,” International Research Journal of Engineering and Technology (IRJET), vol. 4(5), 2017. 1962-
2. Vijay Namdev Khose, Analysis and Four storey RCC building using SAP2000 v12, Department of earthquake Engineering, IIT
Roorkee, 2008.
1967
3. M Sainath and Dr. J S R Prasad, “Analysis and Design of Low, Medium & High-rise RC buildings,” International Journal of Civil
Engineering and Technology (IJCIET),vol. 9(8), 2018.
4. Chung- Yue Wang and Shaing-Yung Ho. “Pushover Analysis for Structure Containing RC Walls,” The 2nd International Conference
on Urban Disaster Reduction, Taipei, Taiwan, pp. 27-29, 2007.
5. Eng Makar Nageh, - “How to Model and Design High rise Building using ETABS Program”.
6. Habibullah, Ashraf. and Stephen, Pyle, “Practical Three-Dimensional Nonlinear Static Pushover Analysis,” Structure Magazine,
U.S.A. , pp.1-2, 1998.
7. Kadid and A. Boumrkik, “Pushover Analysis of Reinforced Concrete Frame Structures”, Asian Journal of
Civil Engineering (Building and Housing) vol.9(1), pp. 75-83, 2008.
8. M.J.N Priestly, “Displacement Based Seismic Assessment of Reinforced Concrete Buildings”, Journal of earthquake engineering,
vol.1, pp.157-192, 1997.
9. R PARK, ISET Journal of Earthquake Technology, paper no. 444, vol.41,no.1,march 2004, pp.141-158.
10. Pankaj Agarwal, Manish Shrikhande, Earthquake Resistant Design of Structures.
11. IS 1893: Part 1 (2002); “Criteria for earthquake resistant design of structures”, Bureau of Indian Standards, New Delhi.
12. ATC 40, Volume 1 (1996) “Seismic evaluation and retrofit of concrete buildings”, Applied Technology Council, Seismic Safety
Commission, State of California.
13. Effect of Infill stiffness on Seismic Performance of Multi-Storey RC Framed Structures 13th World Conference on Earthquake
Engineering by Prof.Devdas Menon, Robin Davis, Meher Prasad.
14. IS 456:2000; “Plane and Reinforced Concrete-Code of Practice”, Bureau of Indian Standards, New Delhi.
15. FEMA 356, “Federal Agency Management Agency”, Pre standard and commentary for the Seismic rehabilitation of Buildings.
16. S.K. Duggal- Earthquake resistant design of Structures
17. W.F. Chen, E.M. Lui - Earthquake Engineering for Structural Design.
18. http://www.sefindia.org/, Structural Engineering Forum of India (SEFI).
19. Design aids (for Reinforced Concrete) to IS 456:1978, Special Publication SP:16, Bureau of Indian Standards, New Delhi, 1980.

Authors: Velmathi Guruviah, Felix Augustin

Paper Title: IC Fabrication Process Steps Analysis using Fuzzy DEMATEL Method
Abstract: Semiconductor industry and the process involved in fabrication play a major role in a modern
technology whatever the field may be. In this paper, the study discusses about the complete process flow of the
IC fabrication and the interdependence of each steps involved. Seven important process flow steps have been
considered and explained throughout this study. In particular, the present work inspects comprehensively the
correlation between each process steps by using fuzzy DEMATEL technique. The fabrication steps have been
separated as cause and effect groups, for the readers to get a good understanding of a inter relationship between
the seven process steps. The result has proved that the market requirement (C1), the complexity of the
fabrication process (C3) and the streamline of supply chain and time to market (C7) fall under causal group and
cost to customer , design , customization , testing yield , packaging fall under effect group. The research analysis
by fuzzy DEMATEL method has been demonstrated as an efficient approach in the inter relationship studies.

Keyword : DEMATEL, IC fabrication, yield ,process steps


References:
1. Araz, C., &Ozkarahan, I. (2007). Supplier evaluation and management system for strategic sourcing based on a newmulticriteria
344. sorting procedure, International Journal of Production Economics, 106(2), 585–606.
2. Devadoss AV., Felix, A., (2013). A new Fuzzy DEMATEL method in an uncertain linguistic environment, Advances in Fuzzy Sets 1968-
and Systems, 16(2), 93-123.
1973
3. Gabus A, Fontela E, (1972). World problems an invitation to further thought within the framework of DEMATEL, Battelle Geneva
Research Centre, Geneva.
4. Gabus A, Fontela E, (1973). Perceptions of the world problematique: communication procedure, communicating with those bearing
collective responsibility (DEMATEL Report no.1). Battelle Geneva Research Centre, Geneva.
5. International technology roadmap for semiconductor: http://public.itrs.net.in , 2005.
6. Lin, W, (2004). A fuzzy extension of the dematel method for group decision-making. McGraw Hill, New York, USA.
7. Lin, W, (2008). A causal analytical method for decision making under fuzzy environment, Expert System with Applications, 34, 205-
213.
8. Opricovic, S & Tzeng G.H. (2003). Defuzzification within a Multi criteria Decision Model. Journal of Uncertainty, Fuzziness and
Knowledge-based Systems, 11(5), 635- 652.
9. Sevkli. M, Koh. S.C.L, Zaim. S, Demirbag. M and Tatoglu. E (2008). Industrial Management & Data Systems, 108(1), 122-142.
10. Tseng ML, (2009). A causal and effect decision making model of service quality expectation using grey-fuzzy DEMATEL approach.
Expert System with Applications 36(4):7738–7748.
11. Tzeng GH, Chen WH, Yu RC, Shih ML, (2010). Fuzzy decision maps: a generalization of the DEMATEL methods, Soft Computing
14(11):1141–1150.
12. Zadeh LA, (1965). Fuzzy sets, Information Control 8(3):338–353.
13. Zadeh LA, (1975). The concept of a linguistic variable and its application to approximate reasoning (Part II), Information Science, 8,
301–357.

Authors: Chebrolu Phaneendra Kumar, Bandi Kiran Kumar

Paper Title: A Novel Channel Access Mechanism for IEEE 802.15.4e to Promote Internet of Things
Abstract: IEEE 802.15.4e defines the specification of PHY layer and MAC layer. Although distinguished
by its popularity and strength for Wireless Sensor Networks (WSNs), it still suffers from several limitations that
deteriorates its performance. One such restriction is a high collision probability that degrades the performance of
a dense network. In this article, we develop a Slotted Access Window (SAW) mechanism, a medium access
technique to mitigate high collision probability and energy consumption in dense and battery constrained
networks. An accurate analytical model is presented to assess the effectiveness of SAW mechanism and
validated using the ns-3 simulator. Finally, results show that the SAW mechanism significantly improves the
throughput, energy efficiency, and delay in contrast to the default medium access mechanism.
345.
Keyword : Wireless Sensor Network, IEEE 802.15.4e, LLDN, Internet of Things, Slot Allocation Window, 1974-
MAC Layer. 1978

References:
1. D. De Guglielmo, G. Anastasi, and A. Seghetti, From IEEE 802.15.4 to IEEE 802.15.4e: A Step Towards the Internet of Things.
Cham: Springer International Publishing, 2014, pp. 135–152.
2. J. Y. X. G. C. L. S. U. Shuguang Chen, Tingting Sun and M. A. Alnuem, Performance Analysis of IEEE 802.15.4e Time Slotted
Channel Hopping for Low-Rate Wireless Networks. Cham: KSII Transactions on Internet and Information Systems, 2013, pp. 1–21.
3. A. Berger, A. Entinger, A. Po¨tsch, and A. Springer, “Improving ieee 802.15.4e lldn performance by relaying and extension of
combinatorial testing,” in Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA), Sept 2014, pp. 1 –4.
4. G. Patti, G. Alderisi, and L. L. Bello, “Introducing multi-level com- munication in the ieee 802.15.4e protocol: The multichannel-
lldn,” in Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA), Sept 2014, pp. 1–8
5. L. Dariz, M. Ruggeri, and G. Malaguti, “A proposal for enhancement towards bidirectional quasi-deterministic communications using
ieee 802.15.4,” in 2013 21st Telecommunications Forum Telfor (TELFOR), Nov 2013, pp. 353–356.
6. A. Berger, M. Pichler, W. Haselmayr, and A. Springer, “Energy- efficient and reliable wireless sensor networks - an extension to
ieee 802.15.4e,” EURASIP Journal on Wireless Communications and Networking, vol. 2014, no. 1, p. 126, Aug 2014. [Online].
Available: https://doi.org/10.1186/1687-1499-2014-126
7. G. Bianchi, “Performance analysis of the ieee 802.11 distributed coor- dination function,” IEEE Journal on Selected Areas in
Communications, vol. 18, no. 3, pp. 535–547, March 2000.
8. P. Chatzimisios, V. Vitsas, and A. C. Boucouvalas, “Throughput and delay analysis of ieee 802.11 protocol,” in Proceedings 3rd IEEE
International Workshop on System-on-Chip for Real-Time Applications, Oct 2002, pp. 168–174.
9. P. Chatzimisios, A. C. Boucouvalas, and V. Vitsas, “Ieee 802.11 packet delay-a finite retry limit analysis,” in GLOBECOM ’03. IEEE
Global Telecommunications Conference (IEEE Cat. No.03CH37489), vol. 2, Dec 2003, pp. 950–954 Vol.2.
10. M. Maadani, “Saturated distributed coordination function markov model for noisy soft-real-time industrial wireless networks,” IET
Communications, vol. 8, pp. 1724–1735(11), July 2014
11. M. Maadani and S. A. Motamedi, “A comprehensive dcf performance analysis in noisy industrial wireless networks,” International
Journal of Communication Systems, vol. 29, no. 11, pp. 1720–1739
12. P. Park, P. D. Marco, C. Fischione, and K. H. Johansson, “Modeling and optimization of the ieee 802.15.4 protocol for r eliable and
timely com- munications,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 3, pp. 550–564, March 2013.
13. P. Park, C. Fischione, and K. H. Johansson, “Modeling and stability analysis of hybrid multiple access in the ieee 802.15.4 protocol,”
ACM Trans. Sen. Netw., vol. 9, no. 2, pp. 13:1–13:55, Apr. 2013
14. P. D. Marco, C. Fischione, F. Santucci, and K. H. Johansson, “Modeling ieee 802.15.4 networks over fading channels,” IEEE
Transactions on Wireless Communications, vol. 13, no. 10, pp. 5366–5381, Oct 2014.

Authors: Gangu Naidu Mandala, Suguna Tentu, S.Anjani Devi, Venkata Ramakrishna Rao Gandreti
E-Banking in India: with Reference of Consumers Perception of Internet Banking in
Paper Title:
Visakhapatnam District.
Abstract: Objective: As of late, Internet Banking has turned into a useful stage to effectively get to banking
administrations. The banking business has experienced emotional changes utilizing the idea of internet banking.
Internet banking is characterized a technique for banking through internet entry in which clients can use various
types of banking administrations.
Methodology: The essential goal of this research is to recognize the central point that impact internet banking
discernment in Visakhapatnam District, Andhra Pradesh, India.
Result: In this paper we dissect the customers' attributes of internet banking utilizations in Visakhapatnam
District and likewise found that internet banking is impacted by its Perceived reliability, Perceived ease of use
and Perceived usefulness.
Conclusion: The discoveries checked the research theories and affirmed that perceived usefulness, Perceived
346. ease of use and Perceived Reliability, all effect mentality towards the goal of internet banking observation in
Visakhapatnam District. 1979-
1982
Keyword : Customers, Factors, Internet banking, Perception, Technology acceptance.
References:
1. Anouze, A.L.M., Alamro, A.S., Awwad, A.S., Customer satisfaction and its measurement in Islamic banking sector: a revisit and update,
Journal of Islamic Marketing, Volume 10, Issue 2, 10 June 2019, Pages 565-588.
2. Lakshman, K., Sulaiman, N., A study on dynamics and challenges on traditional banking and E-banking services among senior citizen's
at Bangalore city, International Journal of Advanced Trends in Computer Science and Engineering, Volume 8, Issue 3, May-June 2019,
Pages 931-935
3. Shankar, A, Jebarajakirthy, C, The influence of e-banking service quality on customer loyalty: A moderated mediation approach,
International Journal of Bank Marketing ,Volume 37, Issue 5, 1 July 2019, Pages 1119-1142.
4. Sobiya, S.L., Thangavel, N., An impact of technology on E-banking dimension in banking sector, International Journal of Recent
Technology and Engineering, Volume 8, Issue 1, May 2019, Pages 340-342.

Authors: J. Indra, R. Kiruba Shankar, N. Ilakkiya, S. Indujha, S. Guhan

Paper Title: Design and Development of Z-Robot for industrial Applications


Abstract: The last few decades have demonstrated the benefit of fast, vast and inexpensive robots in
production sectors. Robots in the industry can be cooperative or supportive to the workers. Some significant
tasks such as, industrial automation, painting, welding, package loading and unloading, cutting and application
specific tasks can be performed using industrial robotic arm. The aim of the project is to pick and place the
objects in industries using robot arms. Z-Robot is a double arm robot. The robot arms follow the loop in a
program to run the servo motors. Arduino program stores the position of each motor. When the pick command is
received servo motors fixed with the robot arms start rotating based on the program and picks up the object.
347. When the drop command is received the robot arms drops down the object. The pick and place operations can be
done in any direction. End effectors connected with arm setup is used to pick and place the object. 1983-
1989
Keyword : robot, arm, pick and place
References:
1. "Bill" Griffith P.Taylor, ‘The Robot Gargantua’, Meccano Magazine, March 1938.
2. Francis Bourbonnais, Pascal Bigras, and Ilian A. Bonev, ‘Minimum-Time Trajectory Planning and Control of a Pick-and-Place Five-
Bar Parallel Robot’, IEEE/ASME Transactions On Mechatronics, 2014.
3. https://www.elprous.com/stepper-motor-types-advantages-applications/
4. https://circuitdigest.com/article/stepper-motor-basics
5. https://www.electronicshub.org/stepper-motors/%3famp
6. Leo Louis, “Working principle of arduino and using it as a tool for study and research”, International Journal of Control, Au tomation,
Communication and Systems (IJCACS), Vol.1, No.2, April 2016
7. https://whatis.techtarget.com/arduino-uno-basics/
8. https://www.techopedia.com/arduino-pin-configurations
9. Kathy ceceri, ‘Making Simple robots’, Maker Media, Incorporated, 2016.
10. MC Zhou, ‘Modeling and deadlock avoidance of automated manufacturing systems with multiple automated guided vehicles’, IEEE
Transactions on Systems, 2010.
11. Renato M.E. Sabbatini. ‘Sabbatini, RME: An Imitation of Life: The First Robots’, Journal of Mechanical Design, 2008.
12. Richard C Dorf, ‘Robotics And Automated Manufacturing’, Reston Publishing Co, 2017.
13. Sfakiotakis; et al. (1999). ‘Review of Fish Swimming Modes for Aquatic Locomotion’, IEEE Journal of Oceanic Engineering, 2007.
14. Tian Huang, Zhanxian Li, Meng Li, ‘Conceptual Design and Dimensional Synthesis of a Novel 2-DOF Translational Parallel Robot
for Pick-and-Place Operations’, Journal of Mechanical Design, 2004.

Authors: G. Ignisha Rajathi, R. Vedhapriyavadhana, L. R. Priya

Paper Title: Robotic Dustbin on Wheels


Abstract: A serene environment is mandatory for habitation, not only for luxury, but for the girdling
environment to be a healthy one. The overflowing garbage bins left unattended are the root cause of unhygienic
environment and it leads to plethora of diseases. Various awareness initiatives are executed by the government
for a hygienic atmosphere. On such flow, this research focuses on unfolding a new technological upgradation, to
keep the surrounding unsoiled by introducing a system where the dustbin comes along a way in a lined path and
blows out a buzzer when it stops at some check points so that the trash can be thrown inside it. The dustbin is
loaded with ultrasonic sensors that will detect the garbage level and a notification will be sent to the corporation
to empty the dustbin when it is full and also the status of the dustbin is uploaded in the webpage using a Wi-Fi
module. This system pledges a tidy place for inhabitants.

Keyword : Robotics, Ultrasonic Sensors, IR Sensors, Wi-Fi Module, Waste Management .

348. References:
1. Jayshree Ghorpade, Anagha Wadkar, Janhvi Kamble, Utkarsha Bagade, Vijayendra Pagare, “Smart Dustbin: An Efficient Garbage
Management Approach for a Healthy Society”, International Conference on Information, Communication, Engineering and 1990-
Technology, 2018. 1993
2. Surendran D, “Rare Disease Detection and Alerting System to the Health Department”, International Journal of Advanced Research
Trends in Engineering and Technology, Vol.4, Specila Issue 7, Pg. 4-8.2017.
3. Aksan Surya Wijaya, Zahir Zainuddin, Muhammad Niswar, “Design a Smart Waste Bin for Smart Waste Management”, IEEE 2017.
4. Poonguzhali.A, Soundarya. R,Priyanka, Tejaswini.A, Pavithra.M, “Smart Garbage Detection System Using IOT Through Mobile
App”, Vol 5, Issue 5, 2018, International Journal of Engineering Research in Electronics and Communication Engineering.
5. Balamurugan S, Abhishek Ajith, Snehal Ratnakaran, S.Balaji, R.Marimuthu, “Design of Smart Waste Managemen t System”, IEEE
2017.
6. Vincenzo Catania, Daniela Ventura, “An Approach for Monitoring and Smart Planning of Urban Solid Waste Management Using
Smart-M3 Platform ”,15th Conference of Fruct Association.
7. Suresh Kumar A, Surendran D, Keerthana S, Kiruthika, “Inertial measurement sensor for accurate detection and notification using
internet of things”, Pakistan Journal of Biotechnology, Vol.13, Pg.375-378,2016.
8. Krishna Nirde, Prashant S. Mulay, Uttam M.Chaskar, “IOT Based Solid Waste Management System For Smart City”, ICICCS 2017.
9. Dr.N. SathishKumar, B.Vijayalaksmi, R. Jenifer Prarthana, A. Shankar,“IOT based Smart Garbage alert system using Arduino UNO” ,
IEEE, 2016.
10. Sateesh Reddy Avutu, Dinesh Bhatia, B. Venkateshwara Reddy, “Design of Touch Screen Based Robot with Obstacle Detection
Module for Autonomous Path Navigation”, 2017 IEEE Region 10 Conference.

Authors: N. Jeyanthi, Gopishetti Venkatesh, R. Thandeeswaran, K. Brindha

Paper Title: Smart Security Algorithm: Ensured Confidentiality and Integrity


Abstract: The main aim of this paper is to provide confidentiality, integrity to the message. It Encrypts the
message when it is passing from the sender side to the receiver side. If we take the Caesar cipher it is weak
against the brute force attack, dictionary attack but this algorithm is stronger against the brute-force attack and
dictionary attack. It has both private and public key encryption which is unlikely for other encryption algorithms
like hill cipher, play fair cipher etc. Some Encryption algorithms will prone to be attacked with man-in-the-
middle attack but this will be overcome with using hash code concept. This proposal encrypts the message with
the novel algorithm at the client side and does the counterpart at the server side. Algorithm implemented using
python programming and proves our algorithm is stronger against brute force and dictionary attacks.
349.
Keyword : Confidentiality, integrity, security attacks, smart algorithm. 1994-
References: 1998
1. N. Veeraragavan, S. S. Manikandasaran, L.Arockiam, Enhanced Encryption Algorithm for Protecting Users’ Credentials in Public
Cloud, IEEE, 2017, pp.1-6.
2. Diala Kahil, Maya Abou Lebdeh, Mohamad. Saad El Dine, Ahmad. El Rafhi, Innovation of a secured transmitter/ receiver chain by
creating a new encryption algorithm, IEEE, 2017, pp.1-3.
3. Daniar Heri Kurniawan, Rinaldi Munir, Double Chaining Algorithm Secure Symmetric-key Encryption Algorithm, IEEE, 2016, pp.1-6
4. Nigam Sangwan, Combining Huffman text compression with new Double Encryption Algorithm, IEEE, 2013, pp.1-6
5. Hadia M. E Hennawy, Alaa E. Omar, Salah M. Kholaif, C. Design of LEA: Link Encryption Algorithm, IEEE, 2014, pp.82 -91.
6. Hu Lihong, Research on Improved Algorithm Based on Encryption Algorithm of Hill, IEEE, vol.8, pp.659-662.
7. Azza Zayed Alshamsi; Ezedin Salem Barka, Implementation of Energy Efficient/Lightweight Encryption Algorithm for Wireless Bod y
Area Networks, IEEE, 2017, pp.1-7.
8. Alexandr N. Gerasimov; Anna V. Epishkina; Konstantin G. Kogos, Research of Homomorphic Encryption Algorithms over Integers,
IEEE, 2017, pp.398-403.
9. B r i n d h a .K, J e y a n t h i. N, Secured Document Sharing using Visual Cryptography to protect cloud data storage, Cybernetics and
Information Technologies, vol. 15, no. 4, 2015, pp. 111–123..
10. B r i n d h a. K, J e y a n t h i.N, DOVC : Data Obfuscation Visual Cryptography to protect Cloud Storage, International Journal of Soft
Computing, 11(6), 2016, 374-381..
11. J e y a n t h i, N., & I y e n g a r, N. C. S. N. An Entropy Based Approach to Detect and Distinguish DDoS Attacks from Flash
Crowds in VoIP Networks,. IJ Network Security, 14(5), 2012, 257-269.
12. Rama Prabha K P, N. Jeyanthi, Intelligent Intrusion Detection Techniques for Secure Communications in Wireless Networks: A
Survey, International Journal of Advanced Intelligence Paradigms, Special Issue on Green Mobile Computing for Energy -Efficient
Next-Generation Wireless Communication, Vol.12, No.,1 -2, pp. 134 – 146.
13. B. Prabadevi, N. Jeyanthi, Nur Izura Udzir and Dhinaharan Nagamalai, Lattice Structural Analysis on Sniffing to Denial of Service
Attacks, International Journal of Computer Networks & Communications, Vol.11, No.4, 2019, pp. 101-119.
14. K. P. Rama Prabha, N. Jeyanthi, A Trust and Fuzzy Cluster based Dynamic Secure Routing Algorithm for Mobile Ad-hoc Networks,
Wireless Personal Communications, Springer, Vol. 98, No. 3, 2959 – 2974, 2018.
15. B. Prabadevi, N. Jeyanthi, A framework to mitigate ARP Sniffing attacks by Cache Poisoning, International Jou rnal of Advanced
Intelligence Paradigms, Vol.10, No.1/2, pp. 146-159, 2018.
16. Rama Prabha K P, N. Jeyanthi, Intelligent Intrusion Detection System Using Temporal Analysis and Type-2 Fuzzy Neural
Classification, International Journal of Internet Technology and Secured Transactions, Vol.8, No.2, pp. 167 – 184, 2018.
17. B. Prabadevi, N. Jeyanthi, TSCBA-A Mitigation System for ARP Cache Poisoning Attacks, Cybernetics and Information
Technologies, 2018, Vol.18, No.4, pp.75-93.
18. N. Jeyanthi, B. Prabadevi, A Review on Various Sniffing Attacks and its Mitigation Techniques, Indonesian Journal of Electrical
Engineering and Computer Science, 2018, vol.12, No.3, 2018.
19. K P Rama Prabha, N. Jeyanthi. An intelligent neuro-genetic framework for effective intrusion detection, International Journal of
Reasoning-based Intelligent Systems, Vol. 10.3-4, 224-232, 2018.
20. Jeyanthi N, R. Thandeeswaran, Gokulnath BV, A complete survey on blood pressure monitoring devices and applications, Biomedic al
Research, Vol. 29, No. 21, 2018, pp.3751-3765.

Authors: G.Prabhakara Reddy, O.Ramesh, M.Mahesh Kumar ,Pothuluri Naga Sunayana

Paper Title: Sentiment Analysis On Tweets


Abstract: In this current era, social media plays a vital role in information exchange, sharing their thoughts.
Emotional result of an individual maintains a vital role on their day-to day life. Sentiment Analysis could be a
procedure of analysing the opinions and polarity of thoughts of the person. Twitter could be a main platform on
sharing the thought's, opinion and sentiments on completely different occasions.
Twitter Sentimental Analysis is methodology of analysing the emotions from tweets (message denote by user in
twitter). Tweets are useful in extracting the Sentimental values from the user. the info offering the Polarity
indication like positive, negative or unbiased values. it's targeted on the person’s tweets and also the hash tags
for understanding the things in every facet of the standards. The paper is to analyse the famed person’s id’s or
hash tags for understanding the mind-set of individuals in every scenario once the person has tweeted or has
acted upon some incidents. When the person has tweeted or has acted upon some incidents.
350.
Keyword : Sentiment Analysis could be a procedure of analysing the opinions and polarity of thoughts of 1999-
the person. 2004

References:
1. Srinivasa Rao M ” Sentiment trends on natural disasters using location based twitter opinion mining” In International Journal of Civil
Engineering and Technology,2017
2. Sai Prasad K. “Secure k-NN query on encrypted cloud data with multiple keys”In International Journal of Advanced Trends in
Computer Science and Engineering 2019.
3. Karthik R., Tetali D.R., Gogula S.V., Manisha G.” Enhancement of disciples cognition levels using bloom's taxonomy in data
mining”In Journal of Advanced Research in Dynamical and Control Systems 2018.
4. Geetanjali “A Survey Paper on Twitter Opinion Mining
5. J. I. Sheeba “A Fuzzy Logic Based On Sentiment Classification.
6. Usage of the piechart from the GitHub.
7. Wikipedia to learn about the importance of opinion of the people and the sentimental analysis.
8. Android studio developers website to understand various concepts used in the project.

Authors: N., Omar, Z. Jano, A. Ahamat, Samer Ali Al-shami, A., Mat Aris

Paper Title: Work-Life Balance of Women Entrepreneurs (Wlbwe): a Model


Abstract: Today’s women are contributing to family and nation’s economy. This study proposed a new
conceptual framework that incorporates the importance of the work-life balance and implication on health for
women entrepreneurs in Small Medium Enterprises (SMESs). Survey questionnaire was used to gather
information on variables that are pertinent to the development of the model. The survey questionnaires were
analyzed using multiple regression. The samples for this study consisted of 278 women entrepreneurs. The
351. findings revealed that work-life balance women entrepreneurs model (WLBWE model) is suitable for women
entrepreneurs to enhance their life well – being and gain profit in their business. Finally, the alert of health
2005-
affected only significant in the contribution between work demands and family demands to enhance profit in
organization and maintain with happy life with family and doesn’t give a direct impact to personal and annual 2011
turnover performance. The study is beneficial for policy makers and Human Capital Development units in
organizations to embed essential concepts in their organizations’ strategic planning.

Keyword : Work-life balance model, Well-being, Women challenges, Women entrepreneurs


References:
1. Al-shami, Sayed Sameer Ali, I. B. Majid, and N. Rashid. 2014. “Conceptual Framework: The Role of Malaysian Microfinance on the
Wellbeing of User’s Services from the Perspective of Aim and Tekun.” In , Retrieved from www.idosi.org/ wasj/was30(icmrp)14/.
2. Al-shami, Sayed Samer Ali, Muhammad Razali Muhammad, and Nurulizwa Rashid. 2018. “The Effect of Microcredit on Women
Household Decisions Making and Resource Controlling in Malaysia.” Social Indicators Research 121(3): 21.
3. Alam, Syed Shah, Mohd Fauzi Mohd Jani, and Nor Asiah Omar. 2011. “An Empirical Study of Success Factors of Wome n
Entrepreneurs in Southern Region in Malaysia.” International Journal of Economics and Finance 3(2): 166–75.
4. Clark, S. C. 2000. “Work/Family Border Theory: A New Theory of Work/Family Balance.” Human Relations 53(6): 747–70.
5. Cohen, J. 1998. Statistical Power Analysis for the Behavioral Sciences, 2ndEdition. ed. J. Cohen. New York, NY: Routledge
Academic: Routledge.
6. Grzywacz, J. G., and D. S. Carlson. 2007. “Conceptualizing Work Family Balance: Implications for Practice and Research.” Advances
in Developing Human Resources 9(4): 455–71.
7. Hobfoll, S E. 1989. “Conservation of Resources. A New Attempt at Conceptualizing Stress.” The American psychologist 44(3): 513–
24.
8. Lockwood, Nancy R. 2003. Work/Life Balance: Challenges and Solution.
9. Muley S. S. 2006. “Problems of Women Entrepreneurs in India.” Golden Research Thoughts 3(12).
10. Reddy, N Krishna et al. 2010. “Work-Life Balance among Married Women Employees.” Indian journal of psychological medicine
32(2): 112–18.
11. Robinson, Laura D., Christopher a. Magee, and Peter Caputi. 2016. “Work-to-Family Profiles, Family Structure and Burnout in
Mothers.” Journal of Managerial Psychology 31(7): 1167–81.
12. Samer, Sayed, Izaidin Majid, Syaiful Rizal, and M.R. Muhamad. 2015. “The Impact of Malaysian Microfinance on Women
Livelihood.” American Scientific Publishers Advanced Science Letters 2049(4): 2046–49.
13. Yaacob, mohd rafi. 2013. SPSS 20 for Business and Social Science Student. First Publ. ed. Mohd Rafi Yaacob. Eduserve Resources.

Authors: Mohammed Zakir Hussain,PVS Vara Prasad,Yamini S Verma

Paper Title: Possibility on Contamination of Upper MUSI Ground Water for Flow Water at River End
Abstract: The musi river historically provided farmers downstream of hyderabad with irrigation water for
the cultivation of paddy for the duration of and after the monsoon rains. Through the construction of weirs, river
water is retained in large and small reservoirs on the river from wherein it is diverted thru irrigation canals to
village tanks and agricultural fields. This paper focuses on the sample description and corrective requirements
after the survey samples at unique black points alongside musi. The presence heavy metals and microbiological
pollutants have made the groundwater dangerous for consuming at diverse places in hyderabad. It has also
proved that there is large issue of city groundwater recharge in this region. The internet urban recharge factor of
groundwater in this region changed into anticipated to be about 567. 51 mm/a and natural recharge element
turned into observed to be 52. 78 mm/a. The combination of tools carried out, the outcomes received and the
recommendations provided in this have a look at will be helpful for neighborhood planners and selection makers
to shield and restore the water assets on this location. The existing work also makes a speciality of the scope of
infection by float water immersion at 2d part of musi river in ground as nicely agriculture. The consequences
taken into consideration from 2017 june to may additionally 2019 for the actual identifications, the parameters
are y18 and y19 for graphical enter.

352. Keyword : Musi, water quality assessment, ground water


2012-
References: 2021
1. Adewuyi, Y.G., (2001). Sonochemistry: Environmental Science and Engineering Applications. Ind. Eng. Chem. Res., 41, 4681.
2. Albertutier., (2010). Soil and Ground Water Remediation Guidelines Alberta Environment. ISBN:978-0-7785-9949-4,
http://environment.gov.ab.ca/info.
3. Arie.; Grostash.; Elizabeth A, Edwards., (2006). A1, 1, 1-trichloroethane-degrading Anaerobic Mixed Microbial Culture Enhances
Bio Transformation of Mixtures of Chlorinated Ethenes & Ethanes. Applied microbial. 72(12): 7849-7856.
4. Barth, J. and Hahne, W., (2002). Review article. Aliment. Pharmacol. Ther. 16:suppl. 1, pp. 31-33.
5. Butler, R.; Ehrenberg, S.; Godley, A R.; Lake, R., Lytton, L.; Cartmell, E., (2006). Remediation of bromate -contaminated
groundwater in an ex situ fixed-film bioreactor. Science of The Total Environment Volume: 366, Issue: 1, Pages: 12-20.
6. Hadjer, K., T. Klein., M. Schopp., Water consumption embedded in its social context, north-western Benin.Physics and Chemistry of
the Earth, 30, 357-64 (2005)
7. Sujatha T., Shatrugna V., Vidyasagar P., Begum N., Padmavathy N.S., Reddy G.C.K. and Rao. G.V.N. Timed activity studies for
assessing the energy expenditure of women from an urban slum in South India. In Food and Nutrition Bulletin 24(2), 193-99 (2003)
8. Chen, X. and Chen, X. 2003. Sensitivity Analysis and Determination of streambed leakance and Aquifer Hydraulic properties Journal
of Hydrology, Vol.284, pp.270-284
9. Abdullah and Tamer Al-Assa’d 2006. ―Modelling of Groundwater flow for Mujib aquifer in Jordon‖, p. 289-297. Brodie, R.S. 1998.
10. Integrating GIS and RDBMS technologies during construction of a regional groundwater model. Environ Modell Software 14:119–
128.
11. Xu, X., Huang, G.H. and Qu, Z.Y. 2009. Integrating MODFLOW and GIS technologies for assessing impacts of irrigation
management and groundwater use in the Hetao Irrigation water flow process. US Geological Survey OpenFile Report 00 -92.
12. Mahesh kumar 2004. Ground water flow model of north east musi basin, Ranga Reddy district, Andhra Pradesh using finite difference
method. M. Tech thesis Submitted to Osmania University, Hyderabad, India.

Authors: Nandita Sikari, K. Harikrishnan


Comprehension of Reliability of Internet Connectivity and clients' Inclination towards Intention to
Paper Title: Use EFT/PoS has been Analysed by the Technology Acceptance Model on Plastic Money on Indian
aspect.
353. Abstract: Internet access is the course toward interfacing with the web using PCs, laptops and mobiles by
customers and how internet works as reliable source to transact funds from one account to another or e-
transaction on online purchase through EFTPOS. It depends upon internet speed and based on that how 2022-
consumers trust online transaction while purchase called reliability on internet connectivity. Plastic money is a 2027
medium of cashless transaction where credit, debit, gift and, smart (EMV) cards etc. are considered to use in
every day’s life to small scale businesses. Plastic money is used in purchasing any trading items instead of using
paper currency which is not always available in any situation of one’s life. India is struggling with its
acceptability only by showing 33.45% enhancement according to 2016-2017 data-bases. As of June 2018, there
were 3.93 crore master cards and 94.4 crore Visa cards being used in India, which joins individual and corporate
cards. The estimation of master and visa card trades in the extended length of June 2018 reached more ₹46,629
crore, almost increasing from a year earlier. Platinum card trades in the period went up by 33 percent to ₹3,
15,627 crores. This project proposal is to address the reason behind such diminished acceptability in India or its
relatively high increment in comparison to the previous years’ database. The project also aims the effect of the
industrialization of information technology (IT) on plastic money users in India.

Keyword : Digitalization, Euro-pay Master Visa, Electronic Fund Transfer, Point of Sale, Technology
Acceptance Model (TAM).
References:
1. Abdul. M., (2010), Transaction size effects on consumers’ retail payment mode choice, International Journal of Retail & Distribution
Management, 38(6), 460-478.
2. Bennett, B, Conover, D, O’Brien, S, & Ad vincula, R, (2014), Cash continues to play a key role in consumer spending: Evidence from
the diary of consumer payment choice, San-Francisco Board of Governors of the Federal Reserve System.
3. Browne, F., X., & Cronin, D., (1997), Payment technologies, financial innovation, and Laissez-Faire banking: A further discussion of
the issues, In: Dorn, J.A. The Future of Money in the Information Age, Washington: Cato Institute, 15-20.
4. Bachas, P., Gertler, P., Higgins, S., & Seira, E., (2016), banking on trust: How debit cards help the poor to save more, Conn ecticut:
Yale University, NBER Working Paper No. 22463.
5. Caskey, J., P., & Sellon, G., H., (2005), Is the Debit Card Revolution Finally Here? Economic Review: Federal Reserve Bank of
Kansas City, 79(4), 79-95.
6. Complementary Currency Resource Centre (2013), online database of complementary currencies worldwide: Public area,
http://www.complementarycurrency.org/ccDatabase/, accessed 7th January 2015.
7. Dewan, S., G., & Chen, L., (2005), Mobile payment adoption in the US: A cross industry cross-platform solution, Journal of
Information Privacy & Security, 1-26.
8. Economy Watch, (2010), Malaysia Debit Card, Consumer Base Expanding, http://www.economywatch.com/debit-
card/international/Malaysia-DebitCard.html, accessed 7th January 2015.
9. Giulio, D., & Milani, C., (2013), Plastic money diffusion and usage: An empirical analysis on Italian households, Economic Notes,
42(1), 47-74.
10. Hall, J., Kilbank, S., Barbeau, M., & Kranakis, E., (2001), WPP: A secure payment protocol for supporting credit- and debit-card
transactions over wireless networks, Proceedings of the IEEE International Conference on Telecommunications (ICT), June,
Bucharest, Hong Leong Bank (2013).
11. Jonker, N., (2005), Payment instruments as perceived by consumers – A public survey Netherlands, Netherlands Central Bank, DNB
No. 053.
12. Kim, W., & Kim, H., (2004), Smart cards: Status, issues, and US adoption, Journal of Object Technology 3(5), 25-30.
13. Klee, E., (2006), Paper or plastic? The effect of time on check and debit card use at grocery stores, Washington D.C.: Board of
Governors of the Federal Reserve System.
14. López, L., E., & Roberts, E., B., (2002), First-mover advantages in regimes of weak appropriability: The case of financial services
innovations, Journal of Business Research, 55, 997–1005.
15. Noorazam, N., (2012), Malaysia's debit card revolution, New Straits Times.
16. Rochet, J., C., & Tirole, J., (2008), Tying in two-sided markets and the honour all cards rule, International Journal of Industrial
Organization, 26, 1333-1347.
17. Scholnick, B., Massoud, N., Saunders, A., Carbo-Valverde, S., & RodríguezFernández, F., (2008), the economics of credit cards,
debit cards and ATMs: A survey and some new evidence, Journal of Banking & Finance, 32, 1468-1483.
18. VisaEurope,(2013),Ourfees.http://www.visaeurope.com/en/about_us/our_business/fees_and_interchang e.aspx.
19. Wenninger, J., & Laster, D., (1995), the electronic purse. Current Issues in Economics and Finance, 1(1), 1-5
20. Worthington, S., (1995), The cashless society, International Journal of Retail and Distribution Management, 23, 31-41,
21. Wright, J., (2003), optimal card payment systems, European Economic Review 47, 587-612.

Authors: N., Omar, A., Ahamat, S., Sidek, Samer Ali Al-shami, M. A. Aripin, A., Mat Aris

Paper Title: The Benefits and Challenges of Practicing Work-Life Balance Among Women Entrepreneurs
Abstract: In Today’s Fast Paced Business World, The Ability To Achieve Work Life Balance (WLB) Is
Becoming More And More Difficult As People Are Constantly Pushed To Work Faster To Cope With An
Increasing Workload. This Paper Presents A Review Of The Challenges And Contribution (Benefit) Of Practice
Work – Life Balance. Women Entrepreneurial Success In Their Life And Business Always Being Connected
With The Excellent Management Of WLB. An Overview Of The Issues Surrounding Women Entrepreneur
Development Draw To The Extension Of More Literature Reviews. Therefore, 34 Articles Have Been Selected
And Analysed. There Was Found That Applying Of Work – Life Balance Was Increase Dual Earner For Family
Economy And Improving Productivity In The Business. Meanwhile The Main Challenges Of WLB
354. Implementation Among Woman Entrepreneurs Has Always Related To Time Management And Busy Schedule
At Work Place. Based On The Issues Identified, Work – Life Balance Strategies Are Proposed To Increased 2028-
Malaysian Woman Entrepreneurial Potential, Enhance Their Wellbeing In Life And Encourage Them To Part In 2033
Business.

Keyword : Work-Life Balance, Wellbeing, Women Challenges, Women Entrepreneurship


References:
1. Al-shami, Samer Ali et al. 2017. “Assessment the Wellbeing Effects of Microfinance in Malaysia.” Advance Science letters 23(8):
7634–36.
2. Al-shami, Sayed Sameer Ali, I. B. Majid, and N. Rashid. 2014. “Conceptual Framework: The Role of Malaysian Microfinance on the
Wellbeing of User’s Services from the Perspective of Aim and Tekun.” In , Retrieved from www.idosi.org/ wasj/was30(icmrp)14/.
3. Al-Shami, Sayed Samer Ali, Izaidin Majid, Mohd Razali Mohamad, and Nunulizwa Rashid. 2017. “Household Welfare and Women
Empowerment through Microcredit Financing: Evidence from Malaysia Microcredit.” Journal of Human Behavior in the Social
Environment 27(8): 894–910
4. Al-shami, Sayed Samer Ali, Muhammad M R, Izaidin Majid, and Nurulizwa Rashid Syaiful Rizal. 2016. “The Effect of Microfinance
on Women’s Empowerment: Evidence from Malaysia.” Asian Journal of Women’s Studies 22(3): 318–337.
5. Appelbaum, Steven H., Neveen Asham, and Kamal Argheyd. 2011. “Is the Glass Celiling Cracked in Information Technology.”
Industrial and Commercial Training 43(6): 354–61.
6. Carlson, D., Grzywacz, j., & Zivnuska, S. 2009. “Is Work-Family Balance More than Conflict and Enrichment?” : Human Relations,
62,1459-1486.
7. Davis, Paul J. 2012. “The Global Training Deficit: The Scarcity of Formal and Informal Professional Development Opportunities for
Women Entrepreneurs.” Industrial and Commercial Training 44(1): 19–25.
8. Hornung, Severin, Denise M Rousseau, and Jürgen Glaser. 2008. “Creating Flexible Work Arrangements through Idiosyncratic Deals.”
Journal of Applied Psychology 93(3): 655–64.
9. ILO. 2016. 42 Women at Work: Trends 2016 - Executive Summary.
10. Lockwood, Nancy R. 2003. Work/Life Balance: Challenges and Solution.
11. Noor, Noraini M. 1999. “Roles and Women’s Well-Being: Some Preliminary Findings from Malaysia.” Sex Roles.
12. M.A Aripin and R Hamzah. 2018. "Developing Highly Skill Human Resource in Prison: Holistic Characters of Vocational Instructo rs in
a Unique Environment." International Journal of Pure and Applied Mathematics 119 (18), 617-626
13. Noraini, M. Noor. 2006. “Malaysian Women’s State of Well-Being: Empirical Validation of a Conceptual Model.” The Journal of social
psychology 146(1): 95–115.
14. O’Driscoll, Michael P et al. 2003. “Family-Responsive Interventions, Perceived Organizational and Supervisor Support, Work-Family
Conflict, and Psychological Strain.” International Journal of Stress Management 10(4): 326–44.
15. Poroli, Stephanie Chasserio;;Philippe Pailot; Corinne. 2014. “When Etrepreneurial Identity Meets Multiple Social Identities Interplays
and Identitiy Work of Women Entrepreneurs.”
16. Reddy, N Krishna et al. 2010. “Work-Life Balance among Married Women Employees.” Indian journal of psychological medicine
32(2): 112–18.
17. Rey-Martí, Andrea, Ana Tur Porcar, and Alicia Mas-Tur. 2015. “Linking Female Entrepreneurs’ Motivation to Business Survival.”
Journal of Business Research 68(4): 810–14.
18. Robinson, Laura D., Christopher a. Magee, and Peter Caputi. 2016. “Work-to-Family Profiles, Family Structure and Burnout in
Mothers.” Journal of Managerial Psychology 31(7): 1167–81.
19. Samer, Sayed, Izaidin Majid, Syaiful Rizal, and M.R. Muhamad. 2015. “The Impact of Malaysian Microfinance on Women
Livelihood.” American Scientific Publishers Advanced Science Letters 2049(4): 2046–49.
20. Sandberg, Karl W. 2003. “An Exploratory Study of Women in Micro Enterprises: Gender-Related Differences.” Journal of Small
Business and Enterprise Development 10: 408–17.
21. Taylor, Robert. 2001. An ESRC Future of Work Programme Seminar Series The Future of Work-Life Balance The Future of Work-Life
Balance -Media Fellow on the ESRC Future of Work Programme.
22. Wilson, Fiona. 2007. “Gender, Entrepreneurial Self-Efficacy, and Entrepreneurial Career Intentions: Implications for Entrepreneurship
Education.” (617): 387–406.

Authors: Marrynal S Eastaff, V Saravaan


Tanimoto Coefficient Similarity based Mean Shift Gentle Adaptive Boosted Clustering for Genomic
Paper Title:
Predictive Pattern Analytics
Abstract: Gene expression data clustering is a significant problem to be resolved as it provides functional
relationships of genes in a biological process. Finding co-expressed groups of genes is a challenging problem.
To identify interesting patterns from the given gene expression data set, a Tanimoto Coefficient Similarity based
Mean Shift Gentle Adaptive Boosted Clustering (TCS-MSGABC) Model is proposed. TCS-MSGABC model
comprises two processes namely feature selection and clustering. In first process, Tanimoto Coefficient
Similarity Measurement based Feature selection (TCSM-FS) is introduced to identify relevant gene features
based on the similarity value for performing the genomic expression clustering. Tanimoto Coefficient Similarity
Value ranges from ‘ ’ to ‘ ’ where ‘ ’ is highest similarity. The gene feature with higher similarity value is taken
to perform clustering process. After feature selection, Mean Shift Gentle Adaptive Boosted Clustering
(MSGABC) algorithm is carried out in TCS-MSGABC model to cluster the similar gene expression data based
on the selected features. The MSGABC algorithm is a boosting method for combining the many weak clustering
results into one strong learner. By this way, the similar gene expression data are clustered with higher accuracy
with minimal time. Experimental evaluation of TCS-MSGABC model is carried out on factors such as clustering
accuracy, clustering time and error rate with respect to number of gene data. The experimental results show that
the TCS-MSGABC model is able to increases the clustering accuracy and also minimizes clustering time of
355. genomic predictive pattern analytics as compared to state-of-the-art works.
2034-
2042
Keyword : Genomic, Mean Shift Gentle Adaptive Boosted Clustering, Strong Learner, Tanimoto Coefficient
Similarity, Weak Cluster, Weight
References:
1. Xiaojun Chen, Joshua Z. Huang, Qingyao Wu, Min Yang, “Subspace Weighting Co-Clustering of Gene Expression Data”, IEEE/ACM
Transactions on Computational Biology and Bioinformatics, Volume 16, Issue 2, Pages 352 – 364, March-April 2019
2. Animesh Kumar Paul, Pintu Chandra Shill, “Incorporating gene ontology into fuzzy relational clustering of microarray gene exp ression
data”, Biosystems, Elsevier, Volume 163, Pages 1-10, January 2018
3. Chun-Pei Cheng, Kuo-Lun Lan, Wen-Chun Liu, Ting-Tsung Chang, Vincent S. Tseng, “DeF-GPU: Efficient and effective deletions
finding in hepatitis B viral genomic DNA using GPU architecture”, Methods, Elsevier, Volume 111, Pages 56-63, December 2016
4. Luigi Leonardo Palese, “A random version of principal component analysis in data clustering”, Computational Biology and Chemistry,
Elsevier, Volume 73, Pages 57-64, April 2018
5. Inti A. Pagnuco, Juan I. Pastore, Guillermo Abras, Marcel Brun and Virginia L. Ballarina “Analysis of genetic association using
hierarchical clustering and cluster validation indices” Genomics, Elsevier, Volume 109, Issue 5-6, Pages 1-8, July 2017
6. Yunli Wang, Youlian Pan, “Semi-supervised consensus clustering for gene expression data analysis”, BioData Mining, Volume 7, Issue
7, Pages 1-13, December 2014
7. Pradipta Maji, Sushmita Paul, “Rough-Fuzzy Clustering for Grouping Functionally Similar Genes from Microarray Data”, IEEE/ACM
Transactions on Computational Biology and Bioinformatics, Volume 10, Issue 2, Pages 286 – 299, March-April 2013
8. Huihui Chen, Yusen Zhang, Ivan Gutman, “A kernel-based clustering method for gene selection with gene expression data”, Journal of
Biomedical Informatics, Volume 62, Pages 12-20, August 2016
9. Abhay Kumar Alok, Sriparna SahaAsif Ekbal, “Semi-supervised clustering for gene-expression data in multiobjective optimization
framework”, International Journal of Machine Learning and Cybernetics, Volume 8, Issue 2, Pages 421–439, April 2017
10. Zhiwen Yu, Hongsheng Chen, Jane You, Hau-San Wong, Jiming Liu, Le Li, Guoqiang, “Double Selection Based Semi-Supervised
Clustering Ensemble for Tumor Clustering from Gene Expression Profiles”, IEEE/ACM Transactions on Computational Biology and
Bioinformatics, Volume 11, Issue 4, Pages 727 – 740, 2014
11. Ankita Bose, Kalyani Mali, “Gradual representation of shadowed set for clustering gene expression data”, Applied Soft Computing,
Elsevier, Volume 83, Volume 105614, Pages 1-34, 2019
12. Anirban Mukhopadhyay, Monalisa Mandal, “Identifying Non-Redundant Gene Markers from Microarray Data: A Multiobjective
Variable Length PSO-Based Approach”, IEEE/ACM Transactions on Computational Biology and Bioinformatics, Volume 11, Issue 6,
Pages 1170 – 1183, 2014
13. Lu Yin, Yongguo Liu, “Ensemble biclustering gene expression data based on the spectral clustering”, Neural Computing and
Applications, Springer, Volume 30, Issue 8, Pages 2403–2416, October 2018
14. Rui Fa, Asoke K. Nandi, “Noise Resistant Generalized Parametric Validity Index of Clustering for Gene Expression Data”, IEEE/ACM
Transactions on Computational Biology and Bioinformatics, Volume 11 , Issue4 , Pages 741 – 752, 2014
15. Ozan Cinar, Ozlem Ilk, Cem Iyigun, “Clustering of short time-course gene expression data with dissimilar replicates”, Annals of
Operations Research, Springer, Volume 263, Issue 1–2, Pages 405–428, April 2018
16. Pradipta Maji, “Mutual Information-Based Supervised Attribute Clustering for Microarray Sample Classification”, IEEE Transactions on
Knowledge and Data Engineering, Volume 24, Issue 1, Pages 127 – 140, 2012
17. Xianxue Yu, Guoxian Yu, Jun Wang, “Clustering cancer gene expression data by projective clustering ensemble”, PLoS ONE, Volum e
12, Issue 2, Pages 1-21, 2017
18. Shweta Srivastava, Nikita Joshi, “Clustering Techniques Analysis for Microarray Data”, International Journal of Computer Science and
Mobile Computing, Volume 3 Issue 5, Pages 359-364, May- 2014
19. Bikram Karmakar, Sarmistha Das, Sohom Bhattacharya, Rohan Sarkar & Indranil Mukhopadhyay, “Tight clustering for large datasets
with an application to gene expression data”, Scientific Reports, Volume 9, Article number: 3053, Pages 1-12, 2019
20. Atakan Erdem, Taflan_Imre GUNDEM, “E-MFDBSCAN: an evolutionary clustering algorithm for gene expression time series”,
Turkish Journal of Electrical Engineering & Computer Sciences, Volume 25, Pages 3443-3454, 2017
21. Gene expression cancer RNA-Seq Dataset:
22. https://archive.ics.uci.edu/ml/datasets/gene+expression+cancer+RNA-Seq

Authors: M.Sarada, Avula Damodaram

Paper Title: An Insight of Backoff Algorithms in Wireless Networks


Abstract: The IEEE 802.11 MAC is liable for the scheme of channel accessing. It decides the performance
of the WLAN and DCF is the central strategy. Stations that need to get to the divert may partake in a
disseminated manner by means of CSMA/CA in the MAC layer. Packet collision can’t be totally avoided
because of the nodes which are in scattered manner. MAC layer uses a BEB scheme for CA (collision
avoidance).. Nodes are experiencing a collision in common channel in IEEE 802.11 and must have to backoff
for a arbitrary time and selected consistently from CW. The contention window is maintained dynamically by
BO algorithms. Network performance is decreased due to a sudden change in window size. Different existing
algorithms for backoff and comparision among the algorithms are shown in the manuscript.

Keyword : DCF, Backoff algorithm, Contention window


References:
1. Marek. N etal., “An analysis of the Back-Off Mechanism Used in IEEE 802.11 Networks”, Proceedings of the Fifth IEEE Symposium
on Computers and Communications (ISCC 2000).
2. Bianchi.G “Performance analysis of the IEEE 802.11 distributed coordination function”, IEEE Journal on Selected Areas in
Communications, Vol. 18. No. 3, March 2000.
3. Wu.H etal., “IEEE 802.11 Distributed Coordination Function (DCF): Analysis and Enhancement”, Proc. IEEE International
Conference on Communications, vol. 1, pp. 605-609, Apr. 2002.
4. Yang.X etal “Pipelined Packet Scheduling in Wireless LANs”, Technical report, Coordinated Science Laboratory, Univ. of Illino is at
Urbana-Champaign,2002
356. 5. Song.N etal “Enhancement of IEEE 802.11 distributed coordination function with exponential increase exponential decr ease backoff
algorithm,” Proc. IEEE VTC 2003-Spring, vol.4, pp.2775–2778, 2003. 2043-
6. Deng.J etal, “A new backoff algorithm for the IEEE 802.11 distributed coordination function”, Proc. CNDS 2004, Sandiego, CA, Jan. 2049
2004.
7. Chonggang etal , “A new collision resolution mechanism to enhance the performance of IEEE 802.11 DCF”, IEEE Transactions on
Vehicular Technology , Volume 53, Issue 4, July 2004 Page(s): 1235 – 1246.
8. Chatzimisios.P etal. “A simple and effective backoff scheme for the IEEE 802.11 MAC protocol”, In CITSA, Orlando, Florida, USA,
July 2005.
9. Nakjung Choi etal “P-DCF: Enhanced Backoff Scheme for the IEEE 802.11 DCF”, IEEE VTC 2005-Spring, Stockholm, Sweden,
May, 2005.
10. Mahmoud Taifour etal, “Neighbourhood Backoff Algorithm for Optimizing Bandwidth in Single Hop Wireless Ad -Hoc Networks”,
LIFL/IRCiCA Lab -INRIA POPS Project, 2005.
11. Manaseer.S etal “A New Backoff Algorithm for MAC Protocol in MANETs”, 21st Annual UK Performance Engineering Workshop,
pp 159-164, 2005.
12. Ye.R etal , “A Multichain Backoff Mechanism for IEEE 802.11 WLANs”, IEEE Trans. on Vehicular Technology, vol. 55, Issue 5, pp.
1613 –1620, Sep. 2006.
13. Manaseer.S etal “Pessimistic Backoff for Mobile Ad hoc Networks”. Al-Zaytoonah University, the International Conference on
Information Technology (ICIT'09), Jordan, 2009.
14. Ki. H etal “Performance evaluation of Binary Negative-Exponential Backoff Algorithm in IEEE 802.11 WLAN”. Lecture Notes in
Computer Science, Springer-Verlag Berlin Heidelberg, vol. 4325, pp. 294–303, 2006.
15. Pudasaini.S etal “An Intelligent Contention Window Control Scheme for Distributed Medium Access”. 7th Annual IEEE Consumer
Communications & Networking Conference (CCNC), Las Vegas, Nevada, USA, 2010.
16. Balador.A etal “History Based Contention Window Control in IEEE 802.11 MAC Protocol in Error Prone Channel”. Jou rnal of
Computer Science, 6 (2), pp. 205-209, 2010.
17. Muneer O etal Journal Of Emerging Technologies In Web Intelligence, Vol. 4, No. 2, May 2012.
18. Shruti etal , “A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network” International Journal of Computer
Science and Mobile Computing, IJCSMC Vol.3 Issue.7, July- 2014 , pg.771 – 777
19. Aditi Harugade, etal “Comparative Study Of Different Backoff Algorithms In Ieee 802.11 Dcf Mac Protocol” International Journa l
of Technical Research and Applications e-ISSN: 2320-8163 , special Issue 43 March 2017 , PP. 20-24
20. Varsha Pandey etal., “Survey Paper on Achieving MAC Layer Fairness using Back off Schemes in Wireless Ad hoc Networks”
International Journal of Computer Science and Mobile Computing IJCSMC, Vol. 3, Issue. 9, September 2014, pg.728 – 731
21. Devipriya.M etal., “Hashing Based Distributed Backoff (HBDB) Mechanism for IEEE 802.11 Wireless Networks” Journal of
Internet Services and Information Security (JISIS), volume: 5, number: 3 (August 2015), pp. 1-18
22. Kadhim.D.J etal., “A Balanced Backoff Algorithm for IEEE 802.11 wireless network”. Iraqi Journal of Applied Physics, 8(1):27 –33,
January 2012
23. Alekya.T etal. “A Waiting-time based BackOff Algorithm in the IEEE 802.11 based Wireless Networks. In Proc. of the 2012 National
Conference on Communications (NCC’12), Kharagpur, India, pages 1–5. IEEE, February 2012.
24. Yassein,M.O.B. etal “Adaptive Backoff Algorithm for Wireless Internet. Journal of Emerging Technologies in Web Intelligence,
4(2):155–163, May 2012.
25. Lee.Y etal ”A Traffic Adaptive Backoff Approach for Wireless Networks. In Proc. of the 5th International Conference on Advanc es
in Human-oriented and Personalized Mechanisms, Technologies, and Services (CENTRIC’12), Lisbon, Portugal, pages 34–37. Think
Mind, November 2012.
26. Kuo.C.Y etal.,. “Performance Enhancement of IEEE 802.11 DCF using Novel BackOff Algorithm. EURASIP Journal on Wireless
Communications and Networking, 2012(1):274–285,December 2012.
27. Balador.A etal “A Novel Contention Window Control Scheme for IEEE 802.11 WLANs. IETE Technical review, 29(3):202–212,
May 2012.
28. Nithya.B etal., “Simulation and Performance Analysis of Various IEEE 802.11 Backoff Algorithms” 2nd International Conference on
Communication, Computing & Security [ICCCS-2012]
29. Momani Ahmad etal., “Intelligent Paging Backoff Algorithm for IEEE 802.11 MAC Protocol” Network Protocols and Algorithms
ISSN 1943-3581 2012, Vol. 4, No. 2

Authors: D.Govindarajan, V.Uma Shankar

Paper Title: Structural and Morphological Charactrization of Nd Doped V2o5 Nanorods

Abstract: V2O5 And Nd:V2O5 Nanorods Were Prepared By Using Low Cost Sol-Gel Method And The Synthesized
Samples Were Analyzed Through XRD, SEM And HRTEM Techniques. The Structural Analysis Of The Processed V 2O5
And Nd:V2O5 Samples Are Exhibited In The Form Of Orthorhombic V2O5 Phase. The SEM And HRTEM Images Of The
Nd:V2O5 Sample Are Shown That The V2O5 Nonoparticles Appeared As Nonorods With Smooth Surface In Which Nd
Spherical Particles Are Decorated.

Keyword : V2O5 And Nd:V2O5 Nanorods, Sol-Gel Method, XRD, SEM And HRTEM Techniques.
References:
1. Y. Zhao, Z. Zhang, H. Dang and W. Liu, Synthesis of tin sulfide nanoparticles by a modified solution dispersion method, Mater ials
Science and Engineering B, 113, 2004, 175-178.
2. A. Venkatesan, N. R. K. Chandar, A. Kandasamy, M. K. Chinnu, K. N. Marimuthu, R. M. Kumara and R. Jayavel, Luminescence and
Electrochemical Properties of Rare Earths (Gd, Nd) Doped V 2O5 Nanostructures Synthesized By Non-Aqueous Sol-Gel Route, RSC
Adv., 5, 2015, 21778-21785.
357. 3. S. Sohila, M. Rajalakshmi, C. Muthamizhchelvan, S. Kalavathi, C. Ghosh, R. Divakar, C.N. Venkiteswaran, N.G. Muralidharan, A. K.
Arora and E. Mohandas, Synthesis and characterization of SnS nanosheets through simple chemical route, Materials Letters, 65, 2011, 2050-
1148-1150.
2052
4. A. Liu, M. Ichihara, I. Honma and H. Zhou, Vanadium-oxide nanotubes: Synthesis and template-related electrochemical properties,
Electrochemistry Communications, 9, 2007, 1766-1771.
5. B. Li, Y. Xu, G. Rong, M. Jing and Y. Xie, Vanadium pentoxide nanobelts and nanorolls: from controllable synthesis to investigation
of their electrochemical properties and photocatalytic activities, Nanotechnology, 17, 2006, 2560-2566.
6. M. Li, G. Sun, P. Yin, C. Ruan and K. Ai, Controlling the Formation of Rodlike V2O5 Nanocrystals on Reduced Graphene Oxide for
High-Performance Supercapacitors, ACS Appl. Mater. Interfaces, 5, 2013, 11462-11470.
7. S. A. Hakim, Y. Liu, G. S. Zakharova and Chen, Wen, Synthesis of vanadium pentoxide nanoneedles by physic al vapour deposition
and their high sensitive behavior towards acetone at room temperature, RSC Adv, 5, 2015, 23489-23497.
8. J. Zhu, L. Cao, Y. Wu, Y. Gong, Z. Liu, H. E. Hoster, Y. Zhang, S. Zhang, S. Yang, Q. Yan, P. M. Ajayan and R. Vajtai, Building 3D
Structures of Vanadium Pentoxide Nanosheets and Application as Electrodes in Supercapacitors, Nano Lett., 13, 2013, 5408−5413.
9. G. Vijayaprasath, R. Murugan, S. Palanisamy, N. M. Prabhu, T. Mahalingam, Y. Hayakawa and G. Ravi, Structural, optical and
antibacterial activity studies of neodymium doped ZnO nanoparticles, Journal of Materials Science: Materials in Electronics, 26,
2015, 7564–7576.
10. S. B. Satpal and A. A. Athawale, Synthesis of ZnO and Nd Doped ZnO Polyscales for Removal of Rhodamine 6G Dye under UV
Light Irradiation, Mater. Res. Express, 5, 2018, 85501.
11. D. Govindarajan, V. Uma Shankar and R. Gopalakrishnan, Supercapacitor behavior and characterization of RGO anchored V 2O5
nanorods, Journal of Materials Science: Materials in Electronics, 30, 2019, 16142-16155.

Authors: C. Poongothai, K. Gayathri

Paper Title: Ann based Shortcoming Area in HVDC Transmission Line


Abstract: This paper is to ponder the use of Neural systems for shortcoming discovery and area in HVDC
framework. The proposed Neural system learns examples and relationship on transient information. The Back-
propagation algorithm has the ability to match map complex and nonlinear input - output behavior. A MATLAB
model was created for the 500kv,1000MW,12 pulse-based converter-based distribution system and various fault
358. events were simulated. The limitations of AC over long transmission lines has led to the use of DC for bulk
transmission over long distances. Fault condition like rectifier fault, inverter faults and transmission line faults 2053-
are discussed in this paper. 2059

Keyword : HVDC, Wavelet, ANN, Faults, Rectifier, Inverter..


References:
1. M. Jamil, S. Kumar Sharma and R. Singh, “Fault detection and classification in electrical power transmission system using artificial
neural network” Springer,Plus, pp. 1- 13, 2015.
2. I.Baqui, I. Zamora, J. Mazon, and G. Buigues,“High impedance fault detection methodology using wavelet transform and
artificial neural networks” Elsevier, pp. 1325–1333, 2011.
3. M Ramesh and A. Jaya Laxmi, “Fault Identification in HVDC using Artificial Intelligence – Recent Trends and Perspective”
IEEE, pp. 1-6, 2012.
4. Xiangning Lin, Peng Mao , Hanli Weng, Bin Wang, Z Q Bo and A Klimek, “Study on Fault Location for High Voltage Overhead
Transmission Lines Based on Neural Network System”, IEEE, International Conference on Intelligent Systems Applications to
Power Systems, 2007, pp. 1-5.
5. Preeti Gupta, R. N. Mahanty, “Artificial Neural Network based Fault Classifier and Locator for Transmission Line Protection”, IOSR-
JEEE, Vol. 11, Issue 1 Ver. I (Jan – Feb. 2016), PP 41-53.
6. F.Dehghani, H. Nezami, “A New Fault Location Technique on Radial Distribution Systems Using Artificial Neural Network”, 22nd
International Conference on Electricity Distribution, CIRED2013, pp. 1-4.
7. H. Khorashadi-Zadeh, M. R. Aghaebrahimi, “A Novel Approach to Fault Classification and Fault Location for Medium
Voltage Cables Based on Artificial Neural Network”, World Academy of Science, Engineering and Technology, 2008, pp. 110 0-
1103.
8. Mr. Shrishail H. Patale, Prof. M. S. Potdar, “A Review on HVDC Transmission Line Protection with Different Techniques”
International Journal of Engineering Sciences & Research Technology, ISSN: 2277-9655, pp. 820-824.
9. L. L. Lal, F Wdeh-Che, Tejedo Chari, “HVDC Systems Fault Diagnosis with Neural Networks”, 1993 The European Power
Electronics Association, pp. 145-150.
10. A. Swetha, P. Krishna Murthy, N. Sujatha and Y. Kiran, “A Novel Technique for the Location of Fault on A HVDC Transmission
Line”, ARPN Journal of Engineering and Applied Sciences VOL. 6, NO. 11, NOV. 2011 ISSN 1819-6608, pp. 62-67.
11. S.N. Sivanandam, S. Sumathi, S. N. Deepa, “Introduction to Neural Networks using MATLAB 6.0.”, The McGrw- Hill Companies
Sherin Tom, Jaimol Thomas, “A New Fault Identification Method for HVDC Transmission Line”, International Journal of Science
and Research (IJSR) Volume 4 Issue 11, November 2015, ISSN (Online): 2319-7064, pp. 729-734.
12. S. M. Mangalge, S. D. Jawale, “A Review on Fault Location Techniques in Long HVDC Transmission Lines”, International Journal
of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 5, Issue 5, May 2016, pp. 4220-4226.
[14]Pannala Krishna Murthy, J.Amarnath, S. Kamakshiah, B.P. Singh, “Wavelet Transform Approach for Detection and Location of
Faults in HVDC System”, Third international Conference on Industrial and Information Systems, 2008. ICIIS 2008, IEEE, pp. 1-6.
13. L. wen-li, S. li-qun, “The Review of High Voltage DC Transmission Lines Fault Location”,International Journal of Computer,
Consumer and Control (IJ3C), Vol. 3, No.4 (2014), pp. 21-28.
14. A. Abu-Jasser, M. Ashour, “A Backpropagation Feedforward NN for Fault Detection and Classifying of Overhead Bipolar
HVDC TL Using DC Measurements”, Journal of Engineering Research and Technology, Vol. 2, Issue 3, September 2015, pp. 197 -
202.
15. A. Mokhberdoran, N. Silva, H. Leite, and A. Carvalho, “A directional protection strategy for multi-terminal vsc-hvdc grids,” in
Environment and Electrical Engineering (EEEIC), 2016 IEEE 16th International Conference on, pp. 1–6, IEEE, 2016.
16. J.Yang, J. E. Fletcher, and J. O’Reilly, “Short-circuit and ground faultanalyses and location in vsc-based dc network cables,”
IEEE Transactions on Industrial Electronics, vol. 59, pp. 3827–3837, Oct 2012.
17. S. Le Blond, R. B. Jr, D. V Coury, and J. C. M. Vieira, “Design of protection schemes for multi-terminal HVDC systems,” Renew.
Sustain. Energy Rev., vol. 56, pp. 965–974, 2016.
18. S. P. L. Blond, Q. Deng, and M. Burgin, “High frequency protection scheme for multi- terminal hvdc overhead lines,” in 12th
IET International Conference on Developments in Power System Protection(DPSP 2014), pp. 1–5, March 2014.
19. V. Venkatasubramanian and K. Chan, “A neural network methodology for process fault diagnosis,” AIChE J., vol. 35, pp. 1993 -
2002, 1989.
20. K. M. Silva, B. A. Souza and N. S. D. Brito.Fault Detection and Classification in Transmission Lines Based on Wavelet Transform
and ANN. In: Proceedings of IEEE Trans. power deliver. vol. 21(4) October 2006.
21. Xiao-Ru Wang, Si-Tao Wu and Qing-Quan Qian.Neural networks Approach Power Transmission Line Fault Classification. In:
Proceedings of International Conference on Information, Communications and Signal Processing, vol.3, Singapore, 9 -12 September;
1997 .p 1737-1740. F. Mo and W.O Kinsner .Probabilistic neural networks for power Line Fault Identification,IEEE Trans. on Signal
Processing, 1998, vol. 11 3575,
22. Z.E. Aygen, S. Seker, M. Bagriyanik, E. Ayaz,.Fault Section estimation in electrical power systems using artificial neural ne tworks
approach. IEEE Trans. Power Deliv, 1999.
23. Arturo Suman Bretas & Nouredine Hadjsaid.Fault diagnosis in a deregulated distribution systems using an artificial neural networks.
In: Proceedings of 2001 IEEE.

Authors: G. Natarajan, K. Jeyalakshmi, M. Thangaraj

Paper Title: SEM Analysis o Archaeological Pottery Samples from Karur, Tamilnadu, India
Abstract: The aim of the present study is to find out the presence of minerals, raw materials used and the
ceramic technology of the past in the selected pottery samples from the important archeological site Karur of
Karur district, Tamil Nadu, India. Two Pottery samples of the period 250BC are collected from different depths
of the excavated site are used for the present analysis. Scanning Electron Microscopy (SEM) has been used for
the analysis. Examination of pottery samples under SEM is an excellent micro analytical technique used for the
study of clay mineral configuration, fabric, texture and growth mechanisms. The presence of quartz, feldspar,
montmorillonite, kaolinite, mullite in the selected pottery samples has been identified. Firing the pottery samples
in the reducing atmosphere technique is also brought out.

359.
Keyword : SEM, mullite, feldspar, kaolinite, montmorillonite, quartz.
2060-
References: 2062
1. Adams, P.J., Geology and ceramics, London Her Majesty’s stationary office, (1961)
2. Gopal Renjan and Rao A.S.R. Basic and Applied Soil Mechanics.
3. Maniatis, Y., Tite, M.S., Thera and Aegean world I, London (1978).
4. Krishnamurthy, R.,”Sangam age Tamil Coins”, Garnet Publications, Madras (1977)
5. Karur Excavations-Report by State department of Archaeology, Government of Tamilnadu, Chennai, India.
6. Herbert Insley and Van Derck Frechette, Academic Press Inc., Publishers, NewYork (1955)
7. Tite, M.S., Maniatias, Y., Nature. 257 (5522), 122 (1975).
8. Wenk, H.R.,”Electromicroscopy in Mineralogy”, Springer-Verlog-Berlin-Heidelberg, New York (1976)
9. Maniatias,Y.,Tite,M.S.Thera and the Aegean World I, London(1978)
10. Cheettan, A.K; Peter Day, “Solid state Chemistry Techniques” 74(1987).
11. Banfield, F.Eggleton,A.,Clay and Clay minerals,38(1),77 (1990)
12. N. Ravishankar and C. Barry Carter Revista Latinoamericana de Metalurgia y Materiales, Vol 19, 1999, 7-12
13. M. Garcıa-Heras Journal of Archaeological Science 24, 1003–1014, (1997)
14. Luminita Moraru and Florica Szendrei European Journal of Science and Theology, June Vol.6, No.2, 69-78, 2010.
15. Mansour Shqiarat, Fawzi Abudanh, Hani Alnawafleh Mediterranean Archaeology and Archaeometry, Vol. 11, No. 2, pp. 99 -106, 2011
16. Gürsel Yanik, Rüstem Bozer, Muharrem Çeken, Fahri Esenli, Hasan Gocmez Ceramics – Silikáty 56 (3) 261-268 (2012)
17. F.Matau et al Journal of advanced research in Physics4 (1), 011304(2013).

Authors: Mayank Arya Chandra, S S Bedi, Shashank Chandra, Suhail Javed Quraishi

Paper Title: Phishing Website Classification using Least Square Twin Support Vector Machine
Abstract: Phishing is one among the luring procedures used by phishing attackers in the means to abuse the
personal details of clients. Phishing is earnest cyber security issue that includes facsimileing legitimate website
to apostatize online users so as to purloin their personal information. Phishing can be viewed as special type of
classification problem where the classifier is built from substantial number of website's features. It is required to
identify the best features for improving classifiers accuracy. This study, highlights on the important features of
websites that are used to classify the phishing website and form the legitimate ones by presenting a scheme
Decision Tree Least Square Twin Support Vector Machine (DT-LST-SVM) for the classification of phishing
website. UCI public domain benchmark website phishing dataset was used to conduct the experiment on the
proposed classifier with different kernel function and calculate the classification accuracy of the classifiers.
Computational results show that DT-LST-SVM scheme yield the better classification accuracy with phishing
websites classification dataset.

Keyword : Least square, SVM, Twin SVM, Phishing, kernel, Classification, Machine Learning.
References:
1. Z. Ramzan and C. Wuest, “Phishing Attacks: Analyzing Trends in 2006,” CEAS 2207- 4th Conference on Email and Anti-spam,
Mountain View, California USA, 2007.
2. H. Zuhir, A.Selmat and M. Salleh, “The Effect of Feature Selection on Phish Website Detection an Empirical Study on Robust Feature
Subset Selection for Effective Classification,” International Journal of Advanced Computer Science and Applications, vol.6, no.10, pp.
221-232, 2015.
3. N. Abdelhamid, A. Ayesh and F. Thabtah, “Phishing Detection based Associative Classification Data Mining,” Expert System with
Applications, vol.41(13), pp.5948-5959, 2014.
4. M. Al-diabat, “Detection and Prediction of Phishing Websites using Classification Mining Techniques,” International Journal of
Computer Applications, vol.147, no.5, pp.5-11, 2016.
5. A. A. Akinyelu and A. O. Adewumi, “Classification of Phishing Email Using Random Forest Machine Learning Technique,” Journal
of Applied Mathematics, vol.2014, pp.6, 2014.
6. M. A. Chandra and S. S. Bedi, “Survey on SVM and their application in image classification,” International Journal of Information
Technology, 2018. https://doi.org/10.1007/s41870-017-0080-1.
7. A. Jøsang, B. AlFayyadh, T. Grandison, M. AlZomai and J. McNamara, "Security Usability Principles for Vulnerability Analysis and
360. Risk Assessment," Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), Miami Beach, FL, pp. 269-278,
2007. 2063-
8. A. Hodzic, J. Kevric and A. Karadag, “Comparison of Machine Learning Technique in Phishing Website Classification,” International
Conference of Economic and Social Studies (ICESoS), pp.249-256, Sarajevo, 2016. 2068
9. Gartner, Incorporated. Available at, http://www.gartner.com/technology/home.jsp.
10. Lennon, M. Security Week. Available at, http://www.securityweek.com/cisco-targeted-attacks-cost-organizations-129-billion-annually,
2011.
11. "APWG Phishing Attack Trends Reports," 1st Quarter July 31, 2018.
12. "APWG Phishing Attack Trends Reports," 2 nd Quarter October 18, 2018.
13. "APWG Phishing Attack Trends Reports," 3 rd Quarter December 11, 2018.
14. "APWG Phishing Attack Trends Reports," 4 th Quarter Published March 4, 2019
15. "APWG Phishing Attack Trends Reports" 1st Quarter May 15, 2019.
16. "APWG Phishing Attack Trends Reports" 2nd Quarter Sept 12, 2019
17. C. Cortes and V. Vapnik, “Support Vector Network,” Machine Learning, vol. 20 (3), pp.273-297, 1995.
18. I. Guyon, J. Weston, S. Barnhill and V. Vapnik, “Gene Selection for Cancer Classification using Support Vector Machines,” Machine
Learning, vol. 46 (1-3), pp.389-422, 2002.
19. G. L. Prajapti and A. Patle, “On performing Classification using SVM with Radial Basis and Polynomial Kernel Functions,” 3rd
International Conference of Emerging Trends in Engineering and Technology, Goa, India, pp. 512-515, 2010.
20. J. A. K. Suykens and J. Vandewalle, “Least Square Support Vector Machine Classifiers,” Neural Processing Letters, vol. 9 (3), pp.
293-300, 1999.
21. J. A. K. Suykens, T. V. Gestel, J. D. Brabanter, B.D. Moor and J .Vandewalle, “ Least Square Support Vector Machines,” World
Scientific publishing Co., Singapore, ISBN 981-238-151-1, 2002.
22. G. Fung and O. L. Mangasarian, “Proximal Support Vector Machine Classifiers,” Proceedings KDD 01, 7th ACM SIGKDD
International Conference on Knowledge Discovery and Data Mining, pp.77-86, San Francisco, California, 2001.
23. M. A. Kumar and M. Gopal, “Least Square Twin Support Vector Machines for Pattern Classification,” Expert Systems with
Applications, vol. 36 (4), pp. 7535-7543, 2009.
24. M. A. Kumar and M. Gopal, “Least Squares Twin Support Vector Machines for Text Categorization,” 2015 39th National Systems
Conference (NSC), pp.1-5, Noida, 2015.
25. M. A. Chandra and S. S. Bedi, “Survey on Support Vector Machine (SVM) and Their Application in Technical Diagnostics,” JUET
Research Journal of Science and Technology, vol.4, no.1, 2017.
26. M. A. Chandra and S. S. Bedi, “Benchmarking Tree based Least Squares Twin Support Vector Machine Classifiers” International
Journal of Business Intelligence and Data Mining, 2018, DOI: 10.1504/IJBIDM.2018.10009883.
27. M. A. Chandra and S. S. Bedi, “A Twin Support Vector Machine Based Approach to Classifying Human Skin,” 2018 4th International
Conference on Computing Communication and Automation (ICCCA), Greater Noida, India, 2018, pp. 1-5.
28. UCI Machine Learning Repository: Phishing Websites Data Set, from https://archive.ics.uci.edu/ml/datasets/Phishing+Websites,
Retrieved May 9, 2019.
29. R. M. Mohammad, F. Thabtah and L. McCluskey, “Intelligence Rule Based Phishing Website Classification,” IET Information
Security, vol. 8, no. 3, pp. 153-160, 2014.

Authors: Sh.H.Behbudov, A.Dj.Djuraev, A.R.Amonov, D.X.Qodirova


361. Teoretiko-Experimental Method of Definition of Parameters of the Roller with the Rubber Plug of
Paper Title:
the Device for Drawing of the Polymeric Composition on Lines of Sewed Materials
Abstract: In article the device for drawing of a polymeric composition on lines of ground off materials is
resulted. Dynamics of the machine unit is considered, laws of movement of rollers of the device are defined, to a
basis of the analysis of graphic dependences recommended parameters of system are proved. On a basis full
factorial experiments parameters of the device for various sewed materials are recommended.

Keyword : device, a roller, the elastic plug, a polymeric composition, durability, the machine unit, the
movement law, parameters, full factor, rigidity, frequency, the expense.
References:
1. V.V.Veselov, I.D.Gorbunov, I.V.Molkova. The device for drawing liquid phase polymer on cuts of details of a cut. News of high
schools. Technology of the textile industry.- 2007, №3.
2. V.V.Veselov, G.V.Kolotilova. Chemicalixation of technological processes of the sewing enterprises: the Textbook / Under 2069-
V.V.Veselov's edition. - Ivanovo: ИГТА, 1999. 2074
3. Mansurov M. A, Djuraev А,Dj Miraminova Z. Comparative characteristics of seams of products from knitted materials. The
international scientific forum of "Progress-2013", Russia, Ivanovo. May, 27-29th 2013.
4. Mansurova M.А., Djapanpaizova V.M., Mamatova D.А., Maxmudova М.А., Toreboyev B.P. Reception of two threads of a chain stitch
of new type 401 with the help rotate a loop. Science and world International scientific journal № 3(19), 2015.
5. Behbudov S.H., Tashpulatov S.S., Djuraev А.Dj., Isroilova B. G. The device for drawing of a polymeric composition on ground o ff
details of clothes//R.Uzb's Patent. № FАР 00917.. №6. 5/21/2014
6. Mansurova M.A., Djurayev A. Dj., Behbudov Sh. H., Tashpulatov S.Sh. Mathematical model of dynamics of device for applying
polymer composition on grind parts of the clothes. European Sciences review Scientific journal № 11–12 2016 (January–February)
129-131
7. Baubekov S.D., Djurayev A.Dj Dynamics of cars and mechanisms. Almaty 2012.
8. Theory of machines. R.S. KYURMI., J.K.GURTA., NEWDEHLI-110055// Reprint-2011
9. Tikhomirov of Century B. Mathematical methods of planning of experiment [Text] / V.B.Tikhomirov. - TH.: the Easy industry, 1968.
10. Sebastiyanov A.G.method and research means mexanik technological processes. М: MGTU. 2007.

Authors: V. Yegnanarayanan, S.B. Pravallika

Paper Title: On Laplacian and Normalized Laplacian of a Social Network


Abstract: In the task of structural identification of a network a vital tool is the underlying spectrum
associated with the normalized graph Laplacian. To comprehend such spectrum, we need to determine the
eigenvalues. In this paper we have found certain useful bounds involving the eigenvalues of both combinatorial
Laplacian and normalized Laplacian and applied the same on a collaboration graph obtained from a social
network.

Keyword : Graph, Eigen Value, Spectrum, Laplacian, Normlized Laplacian, Social Network.
References:
1. I. Chavel, Isoperimetric inequalities, Differential geometric and analytic perspectives, Cambridge Tracts in Mathematics, vol. 145,
Cambridge University Press, Cambridge, 2001.
2. S.T. Yau and R.M. Schoen, Differential Geometry, International Press, Cambridge, Massachusetts, 1994.
3. P. Diaconis, “Group representations in probability and statistics”, Institute of Mathematical Statistics Lecture Notes — Monograph
Series, 11, Institute of Mathematical Statistics, Hayward, CA, 1988.
4. F. Kirchhoff, “Uber die Aufl¨osung der Gleichungen, auf welche man bei der Untersuchung der
linearenVerteilunggalvanischerStr¨omegef¨uhrtwird”, Ann. Phys. Chem., vol. 72, 1847, 497−508.
5. W.E. Donath and A.J. Hoffman, “Algorithms for Partitioning of Graphs and Computer Logic Based on Eigenvectors of Connection
Matrices”, IBM Technical Disclosure Bulletin, vol. 15(3), 1972, 938–944.
6. W.E. Donath and A.J. Hoffman, “Lower Bounds for the Partitioning of Graphs”, IBM Journal of Research and Development, vol.
17(5), 1973, 420–425.
362. 7. S.T. Barnard and H.D. Simon, “A Fast Multilevel Implementation of Recursive Spectral Bisection for Partitioning Unstructured
Problems”, In Proceedings of the 6th SIAM Conference on Parallel Processing for Scientific Computing, 1993, 711–718.
8. R.B. Boppana, “Eigenvalues and Graph Bisection: An Average-Case Analysis (Extended Abstract),” In Proceedings of the 28th 2075-
Symposium on Foundations of Computer Science, 1987, 280–285. 2081
9. M. Fiedler, “A Property of Eigenvectors of Nonnegative Symmetric Matrices and its Application to Graph Theory”, Czechoslovak
Mathematical Journal, vol. 25(4), 1975, 619–633.
10. B. Hendrickson and R. Leland, “An Improved Spectral Graph Partitioning Algorithm for Mapping Parallel Computations”, SIAM
Journal on Scientific Computing, vol. 16(2), 1995, 452–469.
11. A. Pothen, H.D. Simon and K.P. Liou, “Partitioning Sparse Matrices with EigenvectorsofGraphs”,
SIAMJournalonMatrixAnalysisandApplications, vol. 11(3), 1990, 430–452.
12. H.D. Simon, “Partitioning of Unstructured Problems for Parallel Processing”, Computing Systems in Engineering, vol. 2(2), 1991, 135–
148.
13. L.A.N. Amaral and J.M. Ottino, “Complex networks - augmenting the framework for the study of complex systems”, European
Physical Journal B, vol. 38(2), 2004, 147−162.
14. F.M. Atay and T. Biyikoglu, “Graph operations and synchronization of complex networks”, Physical Review E, vol. 72(1), 2005.
15. F.M. Atay, T. Biyikoglu and J. Jost, “Synchronization of networks with prescribed degree distributions”, IEEE Transactions On
Circuits and Systems I-Regular Papers, vol. 53(1), 2006, 92−98.
16. A. Banerjee and J. Jost, “Spectral plots and the representation and interpretation of biological data”, Theory in Biosciences, vol. 126(1),
2007, 15−21.
17. P.S. Bearman, J. Moody and K. Stovel, “Chains of affection: The structure of adolescent romantic and sexual networks”, American
Journal of Sociology, vol. 110(1), 2004, 44−91.
18. J. Berg, M. Lassig and A. Wagner, “Structure and evolution of protein interaction networks: a statistical model for link dyna mics and
gene duplications”, Bmc Evolutionary Biology, vol. 4(51), 2004.
19. G. Caldarelli, A. Erzan and A. Vespignani, Preface on “applications of networks”, European Physical Journal B, vol. 38(2), 2004, 141.
20. G. Chen, G. Davis, F. Hall, Z. Li, K. Patel and M. Stewart, “An interlacing result on normalized laplacians”, Journal on Discrete
Mathematics, vol. 18(2), 2005, 353−361.
21. F.R. Chung and L. Lu, Complex graphs and networks, Providence, RI: American Mathematical Society, 2006.
22. L.H. Greene and V.A. Higman, “Uncovering network systems within protein structures”, Journal of Molecular Biology, vol. 334(4),
2003, 781−791.
23. R. Guimera, S. Mossa, A. Turtschi and L.A.N. Amaral, “The worldwide air transportation network: Anomalous centrality, community
structure, and cities’ global roles”, Proceedings of the National Academy of Sciences of the United States of America, vol. 102(22),
2005, 7794−7799.
24. J. Jost, “Formal aspects of networks: what perspectives can mathematics offer to biology and neurobiology”, In J.F. Feng, J. J ost &
M.P. Qian (Eds.), Networks: from biology to theory, 2007, p. 37, Springer.
25. M.E.J. Newman, “Scientific collaboration networks. i. network construction and fundamental results”, Physical Review E, vol. 64(1),
2001a.
26. M.E.J. Newman, “Scientific collaboration networks. ii. shortest paths, weighted networks, and centrality”, Physical Review E, vol.
64(1), 2001b.
27. M.E.J. Newman, “The structure of scientific collaboration networks”, Proceedings of the National Academy of Sciences of the United
States of America, vol. 98(2), 2001c, 404−409.
28. M.E.J. Newman, “The structure and function of complex networks”, SIAM Review, vol. 45(2), 2003, 167−256.
29. M.E.J. Newman, “Coauthorship networks and patterns of scientific collaboration”, Proceedings of the National Academy of Sciences of
the United States of America, vol. 101, 2004, 5200−5205.
30. C. Song, S. Havlin and A.H. Makse, “Self-similarity of complex networks”, Nature, vol. 433(27), 2005, 392−395.
31. T. Bıyıkoglu, Leydold and P. Stadler, “Laplacian eigenvectors of graphs”, Lecture Notes in Mathematics, vol. 1915, 2007, Springer,
Library of Congress Control Number: 2007929852, Springer Berlin Heidelberg New York.
32. P. Zhu and R. Wilson, “A study of graph spectra for comparing graphs”, In P. T. William Clocksin Andrew Fitzgib bon (Ed.),
Proceedings of the british machine vision conference, 2005, Oxford, U.K.
33. M. Ipsen and A.S. Mikhailov, “Evolutionary reconstruction of networks”, Physical Review E, vol. 66(4), 2002.
34. H. Liu, S.K. Al-Khafaji and A.E. Smith, “Prediction of wireless network connectivity using a Taylor Kriging approach”, International
Journal of Advanced Intelligence Paradigms, vol. 3(2), 2011, 112–121.
35. V.K. Murthy and E.V. Krishnamurthy, “Learning to capture the functions of genetic regulatory networks using graph mo tifs”,
International Journal of Advanced Intelligence Paradigms, vol. 4(2), 2012, 185–197.
36. V. Yegnanarayanan and G.K. Umamaheswari, “On Rolf Nevalinna Prize winners collaboration graph”, Proceedings of International
Conference on Mathematics and Computer Science, Loyola College, Chennai, 2010, 42–50.
37. V. Yegnanarayanan and G.K. Umamaheswari, “On Rolf Nevanlinna Prize winners collaboration graph”, The Journal of Combinatorial
Mathematics and Combinatorial Computing, JCMCC, vol. 79, 2011, 43–58.
38. V. Yegnanarayanan and G.K. Umamaheswari, “On Rolf Nevanlinna Prize winners collaboration graph II”, International Journal of
Scientific and Research, India Publications, vol. 2(4), 2012, 354–367.
39. V. Yegnannarayanan, E.B. Valentina and G. Chitra, “On certain graph domination numbers and applications”, International Journal of
Advanced Intelligence Paradigms, vol. 6(2), 2014, 122–135.
40. V. Yegnanarayanan, A. Renuka Lakshmi and Valentina E. Balas, “On domination and total domination number of a collaboration
graph”, Int. J. Advanced Intelligence Paradigms, vol. 9(5/6), 2017.

Authors: Syaromi Ramli, Zainal Abidin Mohamed


Understanding of CSFs in the application of Public-Private Partnership (PPP) Toll expressway in
Paper Title:
Malaysia
Abstract: Expressways are extremely expensive to build and maintain. A major infrastructure project and
services involve massive public investments starting from planning, land acquisition, grading, paving and other
expenditure. As an alternative, Public Private Partnership (PPP) is a popular tool for the government to cope and
meet the increasingly demand by capitalising on private sectors ‘resource and expertise. Given the inherent
advantages of PPP model over conventional model, the PPP model was highly favoured and adopted for toll
expressway development in Malaysia. Many studies have been made on PPP in the literature but very few have
been conducted to investigate factors affecting adoption of PPP toll expressway in Malaysia. Thus, this paper
attempts to register all these Critical Success Factors (CSFs) from available journal articles published since
2012. Twenty (20) articles were identified and all the CSFs in them were registered in one list. A two stage
exploratory sequential mixed method design was adopted. The first stage was to list all the 161 CSFs that
illustrated in the articles and qualitatively analysed them (using thematic analysis) and this resulted in reducing
the number to 77. Then these 77 themes of CSFs went through of consolidating exercise into grouping them
under the relevant Clusters. Overall, there are nine (9) clusters of criteria of CSFs that can be consolidated as
factors affecting on adoption of PPP namely;(1) risks cluster, (2) governmental influence cluster, (3)project
viability cluster, (4)organisational cluster, (5)economic and financial cluster, (6)legal framework cluster,
(7)technology and innovation cluster, (8) social and environment cluster, and (9) trust cluster. The consolidated
363.
nine (9) clusters of CSFs list then went through a final stage of analysis for validation. A set of questionnaire to
validate the degree of importance of these nine (9) clusters of factor affecting was prepared and sent to thirty 2082-
(30) experts in PPP from three (3) main sectors; public, private and academic. The descriptive analysis was done 2087
by using Statistical Package for Social Sciences (SPSS) Version 23.0 to differentiate these nine (9) clusters of
factor affecting through their mean score. Finally, based on the group mean score value higher than 3.95, three
(3) clusters of CSFs were selected as the most factor affecting in adoption of PPP namely; governmental
influence, project viability and trust. This list is recommended to be considered in future studies of the
influencing factors of involvement private sectors into PPP particularly on expressway projects.

Keyword : Toll Expressways; Public-Private Partnership (PPP); Critical Success Factors (CSFs); Trust;
Governmental Influence; Project Viability.
References:
1. Abawi, K. (2013). Data collection instruments (questionnaire & interview). Geneva: Geneva Foundation for Medical Education and
Research.
2. Aerts, G., Grage, T., Dooms, M., & Haeendonck, E. (2014). Public Private Paertnership for the provision of port Infrast ructure: An
Explorative Multi-Actor Perspective on Critical Success Factors. Asian Journal of Shipping and Logistic,, 273-298.
3. Akhtar, M. I. (2016). Research in Social Science: Interdisciplinary Perspectives. Research Design.
4. Akintola Akintoye, Matthias Beck & Cliff Hardcastle (2003). Public Private Partnership: Managing Risks and Opportunities.
Blackwell Publishing Ltd.
5. Akintola, A., Matthias, B., & Cliff, H. (2003). Public Private Partnership: Managing Risks and Opportunities. Blackwell Publishing.
6. Alaaraj, S., Mohamed, Z. A., & Ahmad Bustamam, U. S. (2018). External Growth Strategies and Organizational Performance in
Emerging Markets: The Mediating Role of Inter-Organizational Trust. Review of International Business and Strategy, 28(2), 206–222.
https://doi.org/10.1108/RIBS-09-2017-0079
7. Alaarj, S., Abidin-Mohamed, Z., & Bustamam, U. S. B. A. (2016). Mediating Role of Trust on the Effects of Knowledge Management
Capabilities on Organizational Performance. Procedia - Social and Behavioral Sciences, 235(2016), 729–738.
https://doi.org/10.1016/j.sbspro.2016.11.074
8. Ameyaw, E. E., & PC, C. A. (2016). Critical success factors for public-private partnership in water supply projects. . Facilities, 34(3/4),
124-160.
9. Babatunde , S. O., Perera, S., Zhou, L., & Udeaja, C. (2016). Stakeholder perceptions on Critical Success Factors For Public-Private
Partnership Projects In Nigeria. Built Environment Project and Asset Management, 74-91.
10. Bernardino, Joao, Z., & Carlos, M. (2010). Applying Social Marginal cost pricing in rail PPPs:Present state, drawbacks and ways
forward. Research in Transportation economics 30, 59-73.
11. Burns, N., & Grove, S. K. (2003). The Practice of Nursing Reseaarch: Conduct, critique and utilization. Toronto: WB Saunders.
12. Chua, Y. P. (2006). Research Statistic. Shah Alam: McGraw-Hill Education.
13. Creswell, J. W. (2012). Educational research: planning. Conducting, and Evaluating.
14. Fahim, Thaheem , M. J., & Ullah. (2016). Six Sigma in construction: a review of critical success factors. International Journal of Lean
Six Sigma, 171-186.
15. Hashim, H. A., Low, S. T., & Sapri, M. (2016). Public private partnership (PPP) facilities management for healthcare services in
Malaysia: the challenges of implementation. Journal of Facilities Managemen, 350-362.
16. Hwang, B. G., & NG, H. B. (2016). Project network management: risks and contributors from the viewpoint of contractors and sub -
contractors. Technological and Economic Development of Economy, 631-648.
17. Ismail, S. (2013). Critical Success Factor of Public Private Partnership (PPP) Implementation In Malaysia. Asian-Pacific Journal of
Business Administration, 6-19.
18. J, L., TingTing, Wang, Y., & Wilkinson, S. (2016). Identifying critical factors affecting the effectiveness and efficiency of tendering
processes in Public–Private Partnerships (PPPs): A comparative analysis of Australia and China. . International Journal of Project
management, 701-716.
19. Jin, X. H. (2012). Factor analysis of partners' commitment to risk management in public-private partnership projects. Construction
Innovation, 297-316.
20. Mota , J., & Moreira, A. C. (2015). The Importance of Non-Financial Determinants on Public-Private Partnerships in Europe.
International Journal of Project Management, 33(7), 1563-1575.
21. OECD. (2010). Dedicated Public Private Partnership UUnits: A Survey of Institutional and Governance Structure. Organization for
Economic Co-operation and Development.
22. Osei-Kyei, R., & Chan A, P. C. (2015). Review of Studies On The Critical Success Factors For Public-Private Partnership (PPP)
Projects from 1990 to 2013. Science Direct JPMA, 1335-1346.
23. Alaarj, S., Mohamed, Z. A., & Bustamam, U. S. A. (2017b). The Effect of Knowledge Management Capabilities on Performance of
Companies : A Study of Service Sector. International Journal of Economic Research, 14(15), 457–470.
24. Osei-Kyei, R., Chan A, P. C., & Ameyaw, E. E. (2017). A Fuzzy Synthetic Evaluation Analysis of Operational Management Critical
Success Factors For Public-Private Partnership Infratructure Projects. Bencmarking: An International Journal 24(7), 2092-2112.
25. Alaarj, S., Zainal, A. M., & Bustamam, U. (2015). The Effect of Knowledge Management Capabilities on the Performance of
Malaysian Large-Scale Organizations: An Empirical Study. Advances in Global Business Research, 12(1), 1024–1038.
26. Panayides, P. M., Parola, F., & Lam J, S. L. (2015). The Effect ofInstitutional Factors on Public-Private Partnership Success in Ports.
Transportation Research Part A: Policy and Practice , 71, 110-127.
27. Perić Hadžić, A., Jugović, A., & Perić, M. (2015). Criteria for the management partnership model in Croatian seaports. Economic
research-Ekonomska istraživanja,, 226-242.
28. Sarvari, H., Valipour, A., Nordin, Y., & Norhazilan , M. N. (2014). Risk ranking of Malaysian public private partnership projects. .
Applied Mechanics and Materials (Vol. 567, pp. 613-618) In Trans Tech Publications., 613-618.
29. Sinisammal, J., Leviakangas, P., Autio, T., & Hyrkas, E. (2016). Entrepreneurs Perspectives on Public-Private Partnership in Health
Care and Social Services. J Health Organ Manag, , 174-191.
30. Squires, D., & Tabor, S. (1991). Technical Efficiency and Future Production. The developing economies 29, 3.
31. Alaarj, S., Mohamed, Z. A., & Bustamam, U. S. A. (2017a). Do Knowledge Management Capabilities Reduce the Negative effect of
Environment Uncertainties on Organizational Performance? A Study of Public Listed Companies in Malaysia. International Journal of
Economic Research, 14(15), 443–456.
32. The World Bank. (2006). India: "Building Capacities for Public Private Partnership",Energy and Infrastructure Unit and Financ e and
Private Sector DevelopmentUnit South Asia Region.
33. Trangkanont, S., & Charoenngam, C. (2014). Critical failure factors of public-private partnership low-cost housing program in
Thailand. Engineering, Construction and Architectural Management, 421-443
34. Warsen, R., Nederhand, J., Klijin, E. H., Grotenberg, S., & Koppenjan , J. (2018). What makes public-private partnerships work?
Survey research into the outcomes and the quality of cooperation in PPPs. Public Management Review, 20(8), 1165-1185.
35. Zhang, S., Chan, A. P., Feng, Y., Duan, H., & Ke, Y. (2016). Critical review on PPP research - A search from the chinese and
International Journals. International Journal of Project Management, 597-612.
36. (Journal Online Sources style) K. Author. (year, month). Title. Journal [Type of medium]. Volume(issue), paging if given.
Available: http://www.(URL)

Authors: Jacob John, Mariam Sunil Varkey, Selvi M

Paper Title: Security attacks in S-WBANs on IoT based Healthcare Applications


Abstract: The internet exists as a global interconnection network for information sharing, commerce, and
entertainment. The usage of internet has grown tremendously over the past decade in the field of E- health care
monitoring system. In E- health care monitoring systems, Smart Wireless Body Area Networks (S-WBANs) is
one among such technologies and is being explored. S-WBANs are primarily used as a smart object with
computer-assisted rehabilitation. They serve as a remote monitoring service in smart electronic healthcare to
364. continuously measure the vital parameters like heart rate, insulin level, body temperature, etc. They are thereby
providing doctors with early detection of a patient’s medical conditions. However, sharing of sensitive personal 2088-
data over a wireless network requires a high level of security. Since any breach in the system security will lead 2097
to a direct violation of the patient’s privacy. In order to address the security vulnerability of the existing system,
in this paper a block chain based Smart Wireless Body Area Networks has been proposed to provide better
security with enhanced privacy and access control for E- health care monitoring system. Moreover, the
proposed system enhances the scalability and provides mitigation against all the security attacks in IoT
Environment.
Keyword : Block Chain, IoT, E-Health monitoring system, security threats, Smart Wireless Body Area
Networks.
References:
1. Pavel Marceux, "Special report: the telecom consumer in 2020." Euromonitor International Blog. Euromonitor International, 27 Aug.
2013. Web. 29 Aug. 2018.
2. A. Ramachandran, C. Snehalatha, A. Kanpur, V. Vijay, V. Mohan, A. K. Das, et al. “High prevalence of diabetes and impaired glucose
tolerance in India: national urban diabetes survey.” Diabetologia, vol. 44, no. 9, , pp. 1094–1101., 2001.
3. World Health Organization and World Bank. “Tracking universal health coverage, first global monitoring report”, 2015. Web. 29 Aug.
2018.
4. Dheeraj Rathee, Savita Rangi, S.K. Chakarvarti, V.R.Singh. “Recent trends in wireless body area network (WBAN) research and
cognition based adaptive WBAN architecture for healthcare.” Health and Technology, vol. 4, no. 3, pp. 239–244, 2014.
5. Jonathan Goldberg. “IEEE 802.15.6-2012 - IEEE standard for local and metropolitan area networks - part 15.6: wireless body area
networks.” Standards.ieee.org, IEEE, 6 Feb. 2012.
6. Sherali Zeadally, Jesus Tellez Isaac, Zubair Baig. “Security attacks and solutions in electronic health (E-health) Systems.” Journal of
Medical Systems, vol. 40, no. 12, p. 263., 11 Oct. 2016.
7. Saeideh Sadat Javadi, M. A. Razzaque. “Security and privacy in wireless body area networks for health care applications.” Sig nals and
Communication Technology Wireless Networks and Security, pp. 165–187, 2013.
8. Ndibanje Bruce, Mangal Sain, Hoonjae Lee. “A support middleware solution for e-healthcare system security.” 16th International
Conference on Advanced Communication Technology, pp. 44–47., 16 Feb. 2014
9. “Wearable & Implantable Technologies.” Engineering in Medicine and Biology Society, IEEE.
10. Chunxiao Li, Anand Raghunathan, Niraj K. Jha. “Hijacking an insulin pump: security attacks and defenses for a diabetes therap y
system.” 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services, pp. 150–156, June 2011.
11. Ninad Desai, Hamid Shahnasser. “A light review of data security and privacy approaches applicable to e-health systems.” Proceedings
of the International Conference on Computing Technology and Information Management (ICCTIM), pp. 362–367, Apr. 2014.
12. Ansaf Ibrahem Alrabady, Syed Masud Mahmud. “Analysis of attacks against the security of keyless-entry systems for vehicles and
suggestions for improved designs.” IEEE Transactions on Vehicular Technology, vol. 54, no. 1, pp. 41–50, 2005.
13. Xiaohui Liang, Xu Li, Qinghua Shen, Rongxing Lu, Xiaodong Lin, Weihua Zhuang et al. “Exploiting prediction to enable secure a nd
reliable routing in wireless body area networks.” 2012 Proceedings IEEE INFOCOM, pp. 388–396, 2012.
14. Shucheng Yu, Kui Ren, Wenjing Lou, Jin Li. “Defending against key abuse attacks in KP-ABE enabled broadcast systems.” Lecture
Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Security and Privacy in
Communication Networks, pp. 311–329, 2009.
15. C. H. Hima Bindu, G. Surekha. “a novel approach for preventing jamming attacks in wireless sensor networks”. International Journal
of Computer Science and Technology, 4(4), 13–16, 2013.
16. Kanika Grover, Alvin Lim, Qing Yang, “Jamming and anti-jamming techniques in wireless networks: a survey.” International Journal
of Ad Hoc and Ubiquitous Computing, 17(4), 197-215, 2014.
17. Lifeng Lai, Yingbin Liang, H. Vincent Poor, H. “A unified framework for key agreement over wireless fading channels.” IEEE
Transactions on Information Forensics and Security, 7(2), 480-490, 2011.
18. Xiang He, Aylin Yener. “Secure communication with a byzantine relay.” 2009 IEEE International Symposium on Information Theory ,
pp. 2096-2100. IEEE, June 2009.
19. Lun Dong, Zhu Han, Athina P. Petropulu, H. Vincent Poor. “Cooperative jamming for wireless physical layer security.” 2009 IEE E/SP
15th Workshop on Statistical Signal Processing, pp. 417-420. IEEE, August 2009.
20. Dina Katabi, Shyamnath Gollakota. “iJam: jamming oneself for secure wireless communication.”, 2010.
21. R. Negi, S. Goel. “Secret communication using artificial noise.” IEEE vehicular technology conference, Vol. 62, No. 3, p. 190 6, IEEE;
1999, September 2005.
22. A. D. Wood, J. A. Stankovic, S. H. Son. “JAM: A jammed-area mapping service for sensor networks.” RTSS 2003. 24th IEEE Real-
Time Systems Symposium, 2003, pp. 286-297. IEEE, December 2003.
23. Sushil Kumar Jain, Kumkum Garg. “A hybrid model of defense techniques against base station jamming attack in wireless sensor
networks.” 2009 First International Conference on Computational Intelligence, Communication Systems and Networks, pp. 102 -107.
IEEE, July 2009.
24. Shu-Di Bao, Lian-Feng Shen, Yuan-Ting Zhang. “A novel key distribution of body area networks for telemedicine.” IEEE
International Workshop on Biomedical Circuits and Systems, 2004, pp. 1-17. IEEE, December 2004.
25. Ke Wan Ching, Manmeet Mahinderjit Singh. “Wearable technology devices security and privacy vulnerability analysis.” International
Journal of Network Security & Its Applications, 8(3), 19-30. 2016.
26. Ari Juels, John Brainard. "Client puzzles: a cryptographic countermeasure against connection depletion attacks" Kent, S. (ed.).
Proceedings of NDSS '99 (Networks and Distributed Security Systems). pp. 151–165. 1999.
27. Fawaz Alassery, Waliz K. M. Ahmed, Mohsen Sarraf, Victor B. Lawrence. “Collision detection in wireless sensor networks throu gh
pseudo-coded ON-OFF pilot periods per packet: a novel low-complexity and low-power design technique.” Computer and Information
Science, 8(3), 13. 2005.
28. Prachi Korgaonkar, Ashish Patil, Nilesh Khochare. “NetSHIELD: countermeasure tool for network layer attacks.” International Journal
of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE), 1, 91-94. 2012.
29. Jaspreet Kaur, Bhupinder Kaur. “BHDP using fuzzy logic algorithm for wireless sensor network under black hole attack.” International
Journal of Advance Research in Computer Science and Management Studies, 2(9), 142-151. 2014.
30. Maan Younis Abdullah, Gui Wei Hua, Naif Alsharabi, N. (2008, June). “Wireless sensor networks misdirection attacker challenge s
and solutions.” 2008 International Conference on Information and Automation, pp. 369-373. IEEE, June 2008.
31. Djallel Eddine Boubiche, Azeddine Bilami, “A defense strategy against energy exhausting attacks in wireless sensor
networks.” Journal Of Emerging Technologies In Web Intelligence, 5(1). 2013.
32. Ping Yi, Zhoulin Dai, Shiyong Zhang, Yiping Zhong. “A new routing attack in mobile ad hoc networks.” International Journal of
Information Technology, 11(2), 83-94. 2005.
33. Tuomas Aura, Pekka Nikander, Jussipekka Leiwo. “DOS-resistant authentication with client puzzles.” International workshop on
security protocols, pp. 170-177. Springer, Berlin, Heidelberg, April 2000.
34. R. K. C. Chang. “Defending against flooding-based distributed denial-of-service attacks: a tutorial.” IEEE communications
magazine, 40(10), 42-51. 2002.
35. Laure A. Linn, Martha B. Koo. “Blockchain for health data and its potential use in health it and health care related research.”
ONC/NIST Use of Blockchain for Healthcare and Research Workshop. Gaithersburg, Maryland, United States: ONC/NIST, pp. 1 -10.
2016.
36. Kamanashis Biswas, Vallipuram Muthukkumarasamy. “Securing smart cities using blockchain technology.” 2016 IEEE 18th
international conference on high performance computing and communications; IEEE 14th international conference on smart city; IEEE
2nd international conference on data science and systems (HPCC/SmartCity/DSS), pp. 1392-1393. IEEE, December 2016.
37. Ali Dorri, Salil S. Kanhere, Raja Jurdak, Praveen Gauravaram. “Blockchain for IoT security and privacy: The case study of a s mart
home.” 2017 IEEE international conference on pervasive computing and communications workshops (PerCom workshops), pp. 618-
623. IEEE, March 2017.
38. Jie Zhang, Nian Xue, Xin Huang. “A secure system for pervasive social network-based healthcare.” Ieee Access, 4, 9239-9250. 2016.
39. Asaph Azaria, Ariel Ekblaw, Thiago Vieira, Andrew Lippman. “Medrec: Using blockchain for medical data access and permission
management.” 2016 2nd International Conference on Open and Big Data (OBD), pp. 25-30. IEEE, August 2016.
40. Nabil Rifi, Elie Rachkidi, Nazim Agoulmine, Nada Chendeb Taher. “Towards using blockchain technology for eHealth data access
management.” 2017 Fourth International Conference on Advances in Biomedical Engineering (ICABME), pp. 1-4. IEEE, October
2017.
41. Nir Kshetri. “Can blockchain strengthen the internet of things?.” IT professional, 19(4), 68-72. 2017.
42. Arshdeep Bahga, Vijay Madisetti. “Blockchain platform for industrial internet of things.” Journal of Software Engineering and
Applications, 9(10), 533. 2016.
43. Alvaro Diaz, Pablo Sanchez. “Simulation of attacks for security in wireless sensor network.” Sensors, 16(11), 1932. 2016.
44. Seyedmostafa Safavi, Zarina Shukur. “Improving Google glass security and privacy by changing the physical and software structure.”
Life Science Journal, 11(5), 109-117. 2014.
45. S. Geran. “Is Google glass a security risk?” (cited 19 Oct, 2015). 18 April 2014. [Online]
46. Engin Leloglu. “A review of security concerns in internet of things.” Journal of Computer and Communications, 5(1), 121-136. 2016.
47. Kim Thuat Nguyen, Maryline Laurent, Nouha Oualha. “Survey on secure communication protocols for the internet of things.” Ad Hoc
Networks, 32, 17-31. 2015.
48. Rwan Mahmoud, Tasneem Yousuf, Fadi Aloul, Imran Zualkernan. “Internet of things (IoT) security: current status, challenges an d
prospective measures.” 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 336-341.
IEEE, December 2015.
49. Pamela Rentz. “OWASP releases latest top 10 IoT vulnerabilities.”, 17 January 2019. Available: https://www.techwell.com/techwell-
insights/2019/01/owasp-releases-latest-top-10-iot-vulnerabilities
50. K Thangaramya, K Kulothungan, R Logambigai, M Selvi, Sannasi Ganapathy, A Kannan, "Energy aware cluster and neuro-fuzzy
based routing algorithm for wireless sensor networks in IoT", Computer Networks, Elsevier, Vol. 151, pp.211-223, 2019.
51. M Selvi, K Thangaramya, Ganapathy Sannasi, K Kulothungan, H Khannah Nehemiah, A. Kannan, "An Energy Aware Trust Based
Secure Routing Algorithm for Effective Communication in Wireless Sensor Networks", Wireless Personal Communications, Springer,
pp.1–16, 2019.

Authors: Prema S., Ramesh Kumar S.

Paper Title: Breaking The Silence to Accentuate Ostracism: an Audacious Response of Anupama
Abstract: Contemporary Indian English fiction has occupied the dynamic place in modern times. Indian
English fiction blossomed rapidly due to the emergence of women writers. These women writers tried to express
the abhorrent facets of human life. The twenty first century women writers try to awaken the readers about the
existing realities of contemporary social values. Sudha Murty is one such proficient writer, who tries to instill
many social values of life through her writings. Mahashweta is one such noteworthy novel by Mrs. Murty. It is
an inspiring tale about a courageous woman, Anupama, who travels in the world of marriage which is full of
illusions, betrayals and the social stigma. This paper analyses the hidden veracities behind Anupama’s fairy-tale
365.
marriage, and her hardships in facing the society because of leukoderma. Murty explored the outrageous effects
of ostracism - the existing social exploitation- in this novel so diligently through her protagonist Anupama and 2098-
her daring revolt in overcoming the atrocities of mankind in order to survive in this world as a mere human 2100
being.

Keyword : Barbs, Leukoderma, Ostracism, Social stigma


References:
1. murty, sudha. mahashweta. new delhi: penguin books.2007. print.
2. barry, peter. beginning theory: an introduction to literary and cultural theory. 3rd ed. new delhi: manchester university p ress. 2010.
print.

Authors: Garina E.P., Garin A.P., Romanovskaya E.V., Andryashina N.S., Chelnokova E.A.

Paper Title: Efficiency Assessment of Modern Technologies in Technical Re-Equipment of Production


Abstract: In conditions of competitive environment and technological progress requirements for rational
organization of enterprise activity and its technological development are tightened.The purpose of the study is to
analyze a production technology and determine directions for increasing production efficiency in terms of
economic and environmental efficiency.
Object of study — Production Association of Polished Glass JSC AGC “Borsky Glass Factory”.
Subject of the study — workshop organization in the enterprise management system.
Research methods — method of comparison and analogy, method of economic analysis.
The practical significance lies in the possibility of using research results to improve organization of the
enterprise and its production sites.
366. These studies allow to draw conclusions about used technology of production on the example of a separate
business unit, main technological parameters of processing raw materials, and output of products. Identified 2101-
problems relate to the issues of economic efficiency of production of its environmental consequences, and 2106
directions of improvement are aimed at their solution.

Keyword : product production, technological process, process parameters, environmental performance


References:
1. Andryashina N.S. Analysis of the best practices of development in domestic machine-building enterprises // Bulletin of Saratov State
Socio-Economic University. 2014. № 1 (50). PP. 24-27
2. Aleksandrovsky S.V., Shushkin M.A. Model of implementation of strategies of imitation by companies // Innovations. 2015. №1 (195).
P. 108-114
3. Ahmad, Sohel R.; Mallick, Debasish N.; and Schroeder, Roger G., “New Product Development: Impact of Project Characteristics and
Development Practices on Performance” (2013). Operations and Supply Chain Management Faculty Publications.20.
http://ir.stthomas.edu/ocbopmtpub/20
4. Garina E.P., Garin A.P. The use of modern methods of quality management to improve production efficiency of complex product / /
Bulletin of NGIEI. 2017. № 11 (78). P. 111-119.
5. Garina E.P., Kuznetsova S.N., Garin A.P., Romanovskaya E.V., Andryashina N.S., Suchodoeva L.F. Increasing productivity of
complex product of mechanic engineering using modern quality management methods. Academy of Strategic Management Journal.–
2017. – 16 (4), 8 p.
6. Gruzdeva M.L., Smirnova Z.V., Tukenova N.I. Application of Internet services in technology training // Bulletin of Minin University.
2018. V.6. NO. 1 (22). P. 8
7. Eckert, Claudia; Albers, Albert; Bursac, Nikola; Chen, Hilario Xin; Clarkson, John; Gericke, Kilian; Gladysz, Bartosz; Maier, Jakob;
Rachenkova, Galina; Shapiro, Daniel and Wynn, David (2015). Integrated product and process models: towards an integrated
framework and review. In: 20th International Conference on Engineering Design (ICED 2015), 27-30 July 2015, Milan
8. Hackman, J.R., Wageman, R., Total quality management: Empirical, conceptual, and practical issues, Administrative Science
Quarterly, Vol. 40, June, 2015, 309 pp.
9. Mizikovsky I.E., Bazhenov A.A., Garin A.P., Kuznetsova S.N., Artemeva M.V. Basic Accounting and Planning Aspects of the
Calculation of Intra-Factory Turnover of Returnable Waste// International Journal of Economic Perspectives. Volume 10, Issue 4,
December, 2016
10. Markova S.M. Narkoziev A.K. Industrial training as an integral part of professional training of future workers // Bulletin of Minin
University. 2018. Volume 6. #1 — URL: https://doi.org/10.26795/2307-1281-2018-6-1-4 (accessed 12.12.2018)
11. Prasad, B. (1997), Concurrent Engineering Fundamentals, Vol. II: Integrated Product Development, Prentice-Hall PTR, New Jersey.
http://brianprasad.weebly.com/uploads/2/4/3/9/24393270/designing_products_for_variety_and_how_to_manage_complexity.pdf
12. Potashnik Y.S., Garina E.P., Romanovskaya E.V., Garin A.P., Tsymbalov, S.D. Determining the value of own investment capital o f
industrial enterprises (2018) Advances in Intelligent Systems and Computing, 622, pp. 170-178
13. Romanovskaya E.V. Development of production and technologies: Teaching and Methodological Manual / Minin University. Nizhny
Novgorod, 2018. 84 p. Schätz C. A Methodology for Production Development: doctoral thesis. Norwegian Unive rsity of Science and
Technology, 2016, 126 p.

Authors: Shaik Abdul Mazeed, Ravi Prakash Kodumagulla


Effectiveness of Social Media Marketing on
Paper Title:
Customer Purchase Intention
Abstract: Social media marketing has become an inseparable part of human life. It allows customers and
prospects to communicate directly about various products/services with their friends. This is just a replacement
of word of mouth, which place a vital role and cheapest way of promoting product in traditional marketing. The
other important and unique feature of social media marketing is immediacy, which allows the customers to
approach directly with the business people. Indeed it is helpful to both business people and customers as they
can get the solutions with in no time unless it is a big damage. With the process, business people can maintain a
sound relationship with the customers very easily as they are responding to their queries instantly. It is nothing
but customer relationship management. It is another pivotal element in marketing. All these features will
influence the customers a lot in making their purchase or buying decisions. Customer behavior is the study of
when, why, how, and where people do or do not buy product. It blends elements from psychology, sociology,
social anthropology and economics. It attempts to understand the buyer decision making process, both
individually and in groups. The customer purchase intention is an evergreen marketing concept despite ample
research has been done on the topic over last few decades. It would be an exaggeration, if we say without
covering this concept no marketing text book will complete, that’s the significance of this particular concept.
One cannot imagine a marketing book without finding a concept of customer purchase intention. Usually a
customer purchase intention will be influenced by a set of internal and external factors like social, economical or
financial, cultural, demographic, psychological and of course personal factors. In this day and age, online
marketing, social media marketing, digital marketing are buzz words and strongly influencing the customer
behavior and in making purchase decisions subsequently.
367.
Keyword : Social Media marketing, customer purchase intention, Purchase decisions, Word of mout 2107-
2109
References:
1. Aksoy, L. and Cooil, B. (2006) A Multivariate and Latent Class Analysis of Consumer Decision Quality Measures in an E-Service
Context, SSRN [online] http://ssrn.com/abstract=916566 (accessed 8 March 2016).
2. Arndt, J. (1967) ‘Role of product-related conversations in the diffusion of a new product’, Journal of Marketing Research, Vol. 4, No.
3, pp.291–295.
3. Ashman, R., Solomon, M.R. and Wolny, J. (2015) ‘An old model for a new age: consumer decision -making in participatory digital
culture’, Journal of Customer Behaviour, Vol. 14, No. 2, pp.127–146.
4. Bronner, F. and Hoog, R. (2010) ‘Consumer-generated versus marketer-generated websites in consumer decision making’,
International Journal of Market Research, Vol. 52, No. 2, pp.231–248.
5. Chu, S.C. and Kim, Y. (2011) ‘Determinants of consumer engagement in electronic word-of-mouth (eWOM) in social networking
sites’, International Journal of Advertising. The Review of Marketing Communications, Vol. 30, No. 1, pp.47–75.
6. Constantinides, E. (2014) ‘Foundations of social media marketing’, Procedia – Social and Behavioral Sciences, Vol. 148, pp.40–57.
7. Darley, W.K., Blankson, C. and Luethge, D.J. (2010) ‘Toward an integrated framework for online consumer behavior and decision -
making process: a review’, Psychology and Marketing,Vol. 27, No. 2, pp.94–116.
8. Du Plessis, P.J., Rousseau, G.G. and Blem, N.H. (1991) Consumer Behaviour. A South African Perspective, Sigma, Pretoria.
9. Engel, J.F., Blackwell, R.D. and Kollat, D.T. (1978) Consumer Behavior, 3rd ed., The Dryden Press, Chicago.
10. Engel, J.F., Blackwell, R.D. and Miniard, P.W. (1990) Consumer Behavior, 6th ed., The Dryden Press, Chicago.
11. Goh, K.Y., Heng, C.S. and Lin, Z. (2013) ‘Social media brand community and consumer behavior. quantifying the relative impact of
user-and marketer-generated content’, Information Systems Research, Vol. 24, No. 1, pp.88–107.
12. Goodrich, K. and De Mooij, M. (2014) ‘How ‘social’ are social media? A cross-cultural comparison of online and offline purchase
decision influences’, Journal of Marketing Communications, Vol. 20, Nos. 1–2, pp.103–116.
13. Grant, R., Clarke, R.J. and Kyriazis, E. (2007) ‘A review of factors affecting online consumer search behaviour from an infor mation
value perspective’, Journal of Marketing Management, Vol. 23, Nos. 5–6, pp.519–533.
14. Hayes, A.F. (2012) PROCESS: a Versatile Computational Tool for Observed Variable Mediation, Moderation, and Conditional
Process Modelling [online] http://www.afhayes.com/public/ process2012.pdf (accessed 15 October 2016).

368. Authors: Kuruvilla John, Saiju Paulose, Priya. M. Tony, Aleena Thomas, Lija Rachel Mathew
Paper Title: Design of Precrash System for Smart Cars by using Li-Fi
Abstract: In this paper we proposed a system to avoid collision between vehicles by using light fidelity (Li-
Fi) technology. The data transmission from one vehicle to another is facilitate with the help of car to car
communication (C2C). The model consists of Li-Fi circuit, Arduino UNO, Ultrasonic Range Sensor, Servo
Motor. The transmitter section will be placed on the rear light of the leading car and the receiver section will be
placed on the front of the following car. The transmitter section placed on the leading car will sent the calculated
speed to the receiver section placed on the following car and according to the data received the speed of the
following car will change such that it avoids collision. The system makes use of the visible light spectrum for
communication between vehicles. Hence the collision detection system become cheaper.

Keyword : Collision, Detection, Li-Fi, Car to Car Communication, Visible Light Spectrum.
References:
1. Chnusheng Zhu., Victor C.M. Leung, Lei Shu Edith C.-H. Ngai., “Green Internet of Things for Smart World.”, IEEE. Access, Special
Section On Challenges for Smart Worlds.”, vol.3, pp.2151-2162., November .2015.
2. Mahadevappa Harish., “A study on air pollution by automobiles in Bangalore city”, Management Research and practice, vol.4., issue
3, pp.25-36., 2012.
3. Tao Jiang., Uma Ayyer., Anand Tolani,, Sajid Hussain., “Self-driving Cars: disruptive or incremental.?”, Applied Innovation Review.,
Issue 1., June 2015. 2110-
4. Harald Haas, Liang Yin., Yunlu Wang and Cheng Chen, “What is Li-Fi?”, Journal of Lightwave Technology.”, vol.34, Issue. 6, pp. 2114
1533-1544, 2016.
5. Pooja Bhately and Ratul Mohindra., “Smart vehicular communication system using Li Fi Technology.”, in proc. International
Conference on Computation of Power, Energy Information and Communication(ICCPEIC.),.2016.
6. Rahul Sharma, Raunak and Akshay Sanganal, “Li-Fi Technology Transmission of data through light,”, Int.J.Computer Technology.&
Applications, vol.5,pp. 150-154, 2014.
7. M.A Berlin and S. Muthusundari, “Safety Distance Calculation for Collision Avoidance in Vehicular ad hoc-Networks.”, .Scholars
Journal of Engineering and Technology.(SJET)., Volume 4,Issue. 1,pp.63-69,2016.
8. Kuruvilla John, Vinod Kumar R.S., and Kumar S.S., “A Novel Design of Synchronous Counter for Low Power and High-Speed
Applications,” International Journal of Engineering and Advanced Technology, vol. 8, issue. 4, pp. 779-783, 2019.
9. Kuruvilla John, Vinod Kumar R.S., and Kumar S.S., “Effect of clock gating in conditional pulse enhancement flip-flop for low power
applications,” International Journal of Electrical Engineering and Informatics, vol. 7. No. 2, pp. 357-365, 2019.
10. Kuruvilla John, Vinod Kumar R.S., and Kumar S.S., “ Design of conditional pulse enhancement flip-flop embedded with clock gating
and signal feed-through mechanism,” Journal of Engineering Science and Technology, vol. 14, no. 4, pp. 2000-2012, 2019.
11. Kuruvilla John, Vinod Kumar R.S., and Kumar S.S., “Impact of Pulse-Triggered Flip-Flops in Low Power Applications,” Journal of
Advance Research in Dynamical and Control Systems, vol. 10, issue. 1, pp. 298-306, 2018.
12. Kuruvilla John, Vinod Kumar R.S., and Kumar S.S., “Design of low power and high speed implicit pulse flip-flop and its application,”
International Journal of Engineering and Technology, vol. 7, no. 3, pp. 1893-1898, 2018.
13. Kuruvilla John, Vinod Kumar R.S., and Kumar S.S., “Performance Comparison of Explicit Pulsed Flip-Flops in Low Power and High-
Speed Application,” Proceedings of International Conference on Circuits and Systems in Digital Enterprise Technology, Kerala, India,
Dec. 2018.

Authors: P. Ravikanth Raju, Somagani Upendar, P. Chinna Srinivas Rao


Preparation and Characterization of Hybrid Composite Laminated Plates with Variation of
Paper Title:
Sawdust
Abstract: From past two-three decades there has been a gradual shift from monolithic to composite
materials in order to meet the increasing demand for lighter, high performance, environment friendly, corrosion
and wear resistant materials. Composite materials are majorly used in massive production like boats, automotive
and air craft Industry etc. in order to improve hardness and impact strength. The manufacturing of hybrid
composite laminates is difficult to handle by traditional methods and gives size restrictions, wetting, poor
surface finish, more number of moulding required for manufacturing. The Hand lay-up chosen as the fabrication
technique when product needs smooth finish slight variations in thickness and number of moldings required is
less. The moulding made from materials like plastics, wood, clay, plaster or plywood depending on the
availability. Hand lay-up technique has been adopted to manufacture the hybrid composite laminated plate
(sawdust with 1%, 2% and 3% variation) and impact strength and hardness is to be calculated.

369.
Keyword : Fiber Glass, Epoxy resin LY-556, Hardener HY-55, Teflon sheets
2115-
References: 2118
1. .S.K.Prasad, “Hardy Composites’’ publication and information direct irate (CSIR) New Delhi, 5(1992).
2. J.Varma, and L.A.Berguland, “Mechanics of Fiber composite materials”, 1996.
3. K.Guduri, A.Varadarajula and A.S.Luyt, “Effect of alkali treatment on the flexural properties of Hildegardia fabric composite s”,
Journal of Applied Polymer Science, Vol.102, PP 1297-1302 (2006).
4. G. Sebe, N.S. Cetin, C.A.S. Hill, and M. Hughes, “RTM hemp fiber-reinforced polyester”, Appl. Compos. Mater., 7: 341- 349 (2000).
5. W. Thielemans, E. Can, S.S. Morye, and R.P. Wool, “Novel applications of lignin in composite materials”, J. Appl. Polym. Sci., 83:
323-331 (2002).
6. Annual Book of ASTM Standards (ASTM Publishers, Philadelphia), 8: D3039, PP. 59 (1993).
7. M.V.D. Sousa, S. N. Monteiro, and J.R.M.D. Almeida, “Evaluation of pre- treatment, size and molding pressure on flexural
mechanical behavior of chopped bagasse–polyester composites”, Polym. Test., 23: 253–258 (2004).
8. R.V. Silva, E.M.F. Aquino, L.P.S. Rodrigues and A.R.F. Barros, “Curaua/glass hybrid composite: The effect of water aging on the
mechanical properties, J. Reinf. Plast. Compos., 28: 1857-1868 (2009).
9. J.C. Lynn, “Polymer composite characterization for automotive structural applications”, J. Comp. Tech. Rese., 12: 229–231(1990).
10. E. Habak, “Mechanical behaviour of woven glass fiber reinforced composites under impact compression load”, Composites, 22:129–
134 (1991).

370. Authors: V.Pandyaraj, A.Ravinthiran


Paper Title: Development of Flapping Panel Vertical Axis Wind Turbine
Abstract: In a developing nation like India, electricity has become one of the most important basic needs
nowadays. Coal and gasoline based power generation capacity stands at 71% in India, which contributes to a
considerable part of air pollution. There are various renewable energy sources which are pollution free, one
among them is the wind energy. So the main objective of the project is to facilitate pollution free power
generation for individual purpose. In order to understand the problem and working, a flapping panel vertical axis
wind turbine was designed. The main advantage of using a vertical axis wind turbine is that it need not pointed
towards the wind and also vertical axis wind turbine is more comfortable to erect for domestic purposes. The
flapping panel wind turbine is designed using solidworks software and analysed using Ansys Fluent. By making
use of the wind, the flapping panels attached to the shaft rotate and the rotor is connected to the permanent
magnet electricity generator (PMG). The PMG converts the Kinetic energy of the rotor shaft into electrical
energy. The PMG we have used has the capacity of producing maximum power at 1200rpm. On calculating
theoretically, the power output is found to be 8W for the rotation of 76.39 rpm and for 1200rpm the power
output is calculated to be 125W. The entire wind turbine setup is compact in size and can be easily mounted and
erected.

2119-
Keyword : Renewable energy, Flapping Panel, Permanent Magnet Generator, 2122
References:
1. Dag Herman Zeiner-Gundersen, “A novel flexible foil vertical axis turbine for river, ocean, and tidal applications”, Applied
Energy, Volume 151, 1 August 2015, Pages 60-66
2. Fons Huijs, Rogier de Bruijn, Feike Savenije, “Concept Design Verification of a Semi-submersible Floating Wind Turbine Using
Coupled Simulations”, Energy Procedia, Volume 53, 2014, Pages 2-12
3. D. J. Willis, C. Niezrecki, D. Kuchma, E. Hines, M. Rotea, “Wind energy research: State-of-the-art and future research directions”
Renewable Energy, Volume 125, September 2018, Pages 133-154
4. Wei Li, Hongbin Zhou, Hongwei Liu, Yonggang Lin, Quankun Xu, “Review on the blade design technologies of tidal current turbine
Renewable and Sustainable Energy Reviews”, Volume 63, September 2016, Pages 414-422
5. Pongpak Lap-Arparat, Thananchai Leephakpreeda “Real-time maximized power generation of vertical axis wind turbines based on
characteristic curves of power coefficients via fuzzy pulse width modulation load regulation” Energy, Volume 182, 1 September
2019, Pages 975-987
6. Arian Hosseini, Navid Goudarzi “Design and CFD study of a hybrid vertical-axis wind turbine by employing a combined Bach-type
and H-Darrieus rotor systems” Energy Conversion and Management, Volume 189, 1 June 2019, Pages 49-59
7. Sahishnu R. Shah, Rakesh Kumar, Kaamran Raahemifar, Alan S. Fung “Design, modeling and economic performance of
a vertical axis wind turbine” Energy Reports, Volume 4, November 2018, Pages 619-623
8. Jia Guo, Pan Zeng, Liping Lei “Performance of a straight-bladed vertical axis wind turbine with inclined pitch axes by wind tunnel
experiments” Energy, Volume 174, 1 May 2019, Pages 553-561

Authors: Asha R, Rahul Jain, Gourav Das, Pranjnay Bharadwaj

Paper Title: Sentimental Analysis and Detection of Rumours for Social Media Data using Logistic Regression
Abstract: Over the last decade ,the Internet has become an ubiquitous and enormous suffuse medium of
the user generated content and self-opinionated knowledge. Users currently have the facility to specify their
views, opinions and ideas publically. Victimizing social media platform is a place where people can express
their mindsets and feelings in a well associated manner and hence is productive and economical . These ever-
growing subjective knowledge are doubtless, an especially made for supply of data of any reasonably method
process. The Sentiment Analysis aims at distinctive self-opinionated knowledge during an Internet and
classifying them in line with their polarity whether or not they contain positive ,negative or neutralizing
references. Sentiment Analysis could be a drawback of text based mostly analysis however there are difficulties
which are needed to be pondered upon that would create a tough parameter as compared to ancient text based
analysis. It depicts the state where it has a desire of trial to figure out these issues and it's spread out many
371. chances for further analysis for handling negative sentences, hidden emotions , slangs and sentence sarcasm.
The project also proposes additional features compared to other previous model projects by enabling the 2123-
detection of rumor , identifying and analyzing whether message given via user belongs to rumor category or not 2126
using Logistic Regression process in Machine Learning domain.

Keyword : Machine Learning , Sentiment Analysis , Rumor Detection, Slang , Social Media Data
References:
1. Rehana Moin ,Zahoor- ur- Rehman, Khalid Mahmood,”Framework for Rumors Detection in Social Data”,[2018]
2. Walaa Mehdat, Ahmed Hasan ,Hoda Korashy “Sentimental Analysis algorithms and applications”,[2014] .
3. Oscar Araque,Ignacio Corcuera-Platas, ”Enhancing Deep Learning Sentimental Analysis with ensemble techniques in social
applications” ,[2012].
4. Z, “Enquiring Minds: Early Detection of Rumors in Social Media from Enquiry Posts,” [2015].
5. Liu B. Sentiment Analysis and Opinion mining. Synth Lect Human Lang Technology [2012].
6. Tao Chen, Improving Sentimental Analysis via Sentence Classification”.[2017].

Authors: J Caroline El Fiorenza, Revanth Kumar Lokku, Kirthika Sivakumar, M Reene Stephanie
Versatile Exploitation Techniques: Drone Hacking and Jamming with Raspberry-Pi and Wi-Fi
372. Paper Title:
Pineapple
Abstract: The utilization of Internet-of-Things (IoT) innovation is developing exponentially as more 2127-
shoppers and organizations recognize the benefits offered by the savvy and shrewd gadgets. The major purpose 2134
of this paper arose due to the reason that since drone innovation is a quickly rising segment inside the IoT and
the danger of hacking couldn't just purpose an information break, it could likewise represent a noteworthy
hazard to the open well-being. On account of their flexible applications and access to ongoing data, commercial
drones are used across a wide variety of smart city applications. However, with many IoT devices, security is
frequently an untimely idea, leaving numerous drones helpless against programmers. What is being done in this
paper is that this paper examines the present condition of automation security and exhibits a lot of Wi-Fi
empowered drone vulnerabilities. Five distinct sorts of assaults, together with the capability of robotization of
assaults, were identified and connected to two unique kinds of scientifically accessible drones. For the execution,
the methodologies and techniques used are the correspondence connections that are researched for the assaults,
for example Disavowal of Service, De-authentication Methods, Man-in-the-Middle, Unauthorized Root Access
and Packet Spoofing. Ultimately, the unapproved root access was computerized using a Raspberry-Pi 3 and Wi-
Fi Pineapple. Besides, the strategy for each assault is laid out, also the test part diagrams the findings and
procedures of the assaults. The Basic Intrusion Detection Systems and Intrusion Protection System so as to avoid
the UAV (unmanned aerial vehicles) from entering the confined airspace are discussed. At long last, the paper
tends to the present condition of automaton security, the executives, control, flexibility, protection concerns by
using GPS spoofing as a method to secure the target which is the drone from being vulnerable to the attacker.

Keyword : Cybersecurity, Hacking, GPS spoofing, Raspberry-Pi, Wi-Fi Pineapple


References:
1. Ethical Hacking and Penetration Testing using Raspberry-Pi, Maryna Yevdokymenko, Elsayed Mohamed, Paul Onwuakpa Arinze
Infocommunication Engineering department Kharkiv National University of Radio Electronics Kharkiv, Ukraine
2. Early Detection of Cybersecurity Threats Using Collaborative Cognition, Sandeep Narayanan, Ashwinkumar Ganesan, Karuna Joshi,
Tim Oates, Anupam Joshi and Tim Finin Department of Computer Science and Electrical Engineering University of Maryland,
Baltimore County, Baltimore, MD 21250, USA
3. A Cyber-Defensive Industrial Control System with Redundancy and Intrusion Detection, Dayne Robinson and Charles Kim Electrical
Engineering and Computer Science Howard University Washington, DC: USA
4. PENTOS: Penetration Testing Tool for Internet of Thing Devices, Vasaka Visoottiviseth, Phuripat Akarasiriwong, Siravitch
Chaiyasart, Siravit Chotivatunyu Faculty of Information and Communication Technology Mahidol University, Nakhonpathom,
Thailand
5. Ethical Hacking and Network Defense: Choose Your Best Network Vulnerability Scanning Tool, Yien Wang, Jianhua Wang, TSYS
School of Computer Science Columbus State University Columbus, GA 31907, USA
6. Securing the Positioning Signals of Autonomous Vehicles, Shahab Tayeb*, Matin Pirouz*, Gabriel Esguerra1, Kimiya Ghobadi1,
Jimson Huang1, Robin Hill2, Derwin Lawson2, Stone Li3, Tiffany Zhan3, Justin Zhan*, Shahram Latifi* *University of Nevada -Las
Vegas, 1AEOP UNITE, 2RET, 3UNLV STEM Las Vegas, Nevada
7. Drone Hacking with Raspberry-Pi3 and Wi-Fi Pineapple: Security and Privacy Threats for the Internet-of-Things. Ottilia Westerlund1
and Rameez Asif2.

Authors: V.R. Shamji

Paper Title: Field Validation of GEBCO Data in the Red Sea


Abstract: A comprehensive field data were collated analyzed and processed for the validation of open
source bathymetry data GEBCO 30 sec arc resolution data in the selected location of the Red sea. Different
software and techniques were used to verify the quality of GEBCO data in the field conditions. The image
analysis using different software proves the poor quality and resolution of the GEBCO data in the nearshore
areas. The analyses also brought out the complex topographical nature of the Red sea and precautions for the
usage of open source bathymetric data in the nearshore areas of the Red sea, where high quality and fine
resolution data required. The different statistical analyses also verified the results of image analysis. The
statistical analysis also shows the poor quality and course resolution of the GEBCO 30sec resolution data in the
Red sea especially nearshore areas. The study recommends hydrographic survey data for the nearshore areas,
where high quality and resolution data are needed.

373.
Keyword : GEBCO, Bathymetric data, Hydrographic survey
2135-
References: 2137
1. Rifaat Abdalla and Salim Al-Harbi (December 27th 2018). Lessons Learned from the Establishments of the First Hydrographic
Surveying Program in the Middle East, Trends in Geomatics - An Earth Science Perspective
2. Smith, W. H. F., and D. T. Sandwell, Global seafloor topography from satellite altimetry and ship depth soundings, Science, v . 277, p.
1957-1962, 26 Sept. 1997
3. Sandwell, D. T., W. H. F. Smith, Marine gravity anomaly from Geosat and ERS 1 satellite altimetry, Journal of Geophysical Research,
v. 102 , No. B5, p. 10039-10054, 1997.
4. Smith WHF (1993) On the accuracy of digital bathymetric data. J Gephys Res 98(B6):9591–9603. doi:10.1029/93JB00716
5. Marks, K. & Smith, Walter & Sandwell, David. (2010). Evolution of errors in the altimetric bathymetry model used by Google Ea rth
and GEBCO. Mar. Geophys. Res.. 31. 223-238. 10.1007/s11001-010-9102-0.
6. Jakobsson M, Macnab R, Mayer L, Anderson R, Edwards M, Hatzky J, Schenke H-W, Johnson P (2008) An improved bathymetric
portrayal of the Arctic Ocean: implications for ocean modeling and geological, geophysical and oceanographic analysis. Geophy s Res
Lett 35:L07602. doi:10.1029/2008GL033520
7. Shamji V. R. , and T.C. Vineesh, 2016. Shallow-water tidal analysis at Sharm Obhur, Jeddah, Red Sea, Arabian Journal of Geosciences
10(3).
8. GEBCO data accessed on October 20, 2016, www.gebco.net/data_and_products.

Authors: Amani Ayeb, Abderrazak Chatti


374.
Paper Title: Indirect Neural Adaptive Control for Wheeled Mobile Robot
Abstract: For a precise trajectory tracking of a wheeled mobile robot, accurate control of the position along
a reference trajectory is essential. Therefore, this paper proposes an indirect neural adaptive controller for a
nonholonomic mobile robot based on its dynamical model. This controller takes into account the approximation
error. The use of the Lyapunov stability theorem and dynamical neural networks is indeed for deriving
respectively stable learning laws for control and identification of a complex nonlinear dynamics system. The
global tracking error is incorporated to adjust the neural weight learning laws to ensure the robustness of the
system against approximation inaccuracy. Hence, the designed intelligent controller guarantees the convergence
of both tracking and identification errors to zero. Simulation results illustrate the ability of the intelligent
controller to assure the asymptotic stability of the closed-loop nonlinear uncertain system.

Keyword : wheeled mobile robot, Lyapunov stability, indirect neural adaptive control, tracking error,
approximation error
References:
1. Vu Thi Yen, Wang Yao Nan, Pham Van Cuong, Robust Adaptive Sliding Mode Neural Networks Control for Industrial Robot
Manipulators, Int. J. of Control, Automation and Systems March 2019.
2. Francisco G., Rossomando Carlos Soria, Ricardo Carelli, Sliding Mode Neuro Adaptive Control in Trajectory Tracking for Mobile
Robots, J. Intell Robot Syst., June 2014.
3. Anh Tuan Vo, Hee-Jun Kang, An adaptive Neural Non-Singular Fast-Terminal Sliding – Mode Control for Industrial Robotic
Manipulators, Applied Sciences, Decembre 2018.
4. H. Huang, J. Zhou, Q. Di, J. Zhou, J. Li, Robust Neural Network-Based Tracking Control and Stabilization of a Wheeled mobile Robot
with Inputs Saturation, Int. J. of Robust and Nonlinear Control, 31 October 2018.
5. Ching-Long Shih, Li-Chen Li, Trajectory and Tracking Control of a Differential-Drive Mobile Robot in a Picture Drawing Application,
Robotics, 2017.
6. S. Karakaya, G. Kucukyildiz, H. Ocak, A New Mobile Robot Toolbox for Matlab, J. of Intelligence and Robotic Systems, July 201 7.
2138-
7. Luis J. Ricale, Edgar N. Sanchez, R. Langari, D. Shahmirzadi, Rollover Control Heavy Vehicles via Recurrent High Order Neural 2145
Networks, Recurrent Neural Networks, September 2008.
8. Sanchez, E.N., Ricalde, L. J., Trajectory Tracking via adaptative recurrent control with input saturation, Proceedings of the
International Joint Conference on Neural Networks, July 2003.
9. Sanchez, E.N., RPezez, J. P. Ricalde, L. J., Guanrong Chen, Trajectory Tracking via adaptative dynamic neural control, Proceedings of
IEEE Int. Sumposium on Intelligent Control, 2001.
10. Yen, V. T., Nan, W. Y., & Van Cuong, P., Recurrent fuzzy wavelet neural networks based on robust adaptive sliding mode control for
industrial robot manipulators, Neural Computing and Applications, May 2018.
11. Wu, H.-M., & Karkoub, M., Hierarchical Fuzzy Sliding-Mode Adaptive Control for the Trajectory Tracking of Differential-Driven
Mobile Robots. Int. J. of Fuzzy Systems, October 2018.
12. G., Mao, J., Wang, Y., Guo, S., & Miao, Z., Adaptive Tracking Control of Nonholonomic Mobile Manipulators Using Recurrent
Neural Networks. Int. J. of Control, Automation and Systems, June 2018.
13. Y. Hu, H. Su, L. Zhang, S. Miao, G. Chen, A. Knoll, Nonlinear Model Predictive Control for Mobile Robot Using Varying -Parameter
Convergent Differential Neural Network, Robotics and Automation Engineering, July 2019.
14. Tresna Dewi, Pola Risma, Yurni Oktarina, and M. Taufik Roseno, Neural Network Controller Design for a Mobile Robot Navigation ;
A case study, 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), 2017.
15. Pandey, A., Kumar, S., Pandey, K. K., & Parhi, D. R., Mobile robot navigation in unknown static environments using ANFIS
controller. Perspectives in Science, 2016.
16. Huang, H., Zhou, J., Di, Q., Zhou, J., & Li, J., Robust neural network-based tracking control and stabilization of a wheeled mobile
robot with input saturation, International Journal of Robust and Nonlinear,2018.
17. Zhu, Q., Han, Y., Liu, P., Xiao, Y., Lu, P., & Cai, C., Motion Planning of Autonomous Mobile Robot Using Recurrent Fuzzy Neural
Network Trained by Extended Kalman Filter, Computational Intelligence and Neuroscience, 2019.
18. Hu, Y., Su, H., Zhang, L., Miao, S., Chen, G., & Knoll, A., Nonlinear Model Predictive Control for Mobile Robot Using Varying-
Parameter Convergent Differential Neural Network. Robotics, 2019.
19. Gao, X., & Zhang, T., Unsupervised learning to detect loops using deep neural networks for visual SLAM system, Autonomous
Robots, 2015.
20. M. Boukens, A. Noukabou, M. Chadli, Robust adaptive neural network-based trajectory tracking control approach for nonholonomic
electrically driven mobile robots, Robotics and Autonomous Systems, June 2017.

Authors: Julia V. Nagrebetskaya, Vladimir G. Panov

Paper Title: Joint Action of Binary Factors in the Sufficient Causes Theory and Its Classification
Abstract: We consider a problem of formal definition of joint action in the binary sufficient causes
framework based on the theory of Boolean algebras. This theory is one of the general causality concepts in
epidemiology, environmental sciences, medicine and biology. Its correct mathematical form allows us to regard
the binary version of this theory as a specific application of Boolean functions theory. Within the formalism of
Boolean functions, a strict definition of the joint action is given and various criteria for the presence of joint
action of factors in a Boolean function are obtained. The methods previously developed for analyzing joint
action in binary sufficient causes framework allows us to split all the Boolean functions into disjoint equivalence
375. classes. The relationships among these classes however remain uncertain. In the present paper, an integer
invariant is introduced which allows one to order joint action types in a certain way. We consider examples of 2146-
two- and three-factor theories of sufficient causes with the ordinary epidemiological symmetry group. 2153
Estimation of the time complexity of determining the type of joint action are considered as well.

Keyword : Boolean algebra, Boolean function, joint action, group action on a set, integer-valued invariant,
sufficient causes theory, time complexity.
References:
1. M. L. Brusseau, I. L. Pepper, Ch. P. Gerba, Environmental and Pollution Science. 3rd ed. Academic Press, Elsevier, 2019.
2. F. R. Spellman, The Science of Environmental Pollution. CRC Press, 2017.
3. J. Peterson, Environmental Pollution Caused by Factories. https://sciencing.com/environmental-pollution-caused-by-factories-
12071269.html.
4. Taxonomy of Environmental Pollution. https://www.reference.com/science/explore/pollution?qo=categoryTaxonomyLeft.
5. E. J. Calabrese, Multiple Chemical Interactions (Toxicology and Environmental Health Series). CRC Press, 1991.
6. M. A. Subramanian, Toxicology: Principles and Methods. 2nd ed. MJP Publishers, 2015.
7. W. B. Pratt, P. Taylor, Principles of Drug Action: The Basis of Pharmacology. 3rd ed. Churchill Livingstone, 1990.
8. G. Pöch, Combined Effects of Drugs and Toxic Agents. Modern Evaluation in Theory and Practice. Vienna: Springer, 1993.
9. W. R. Greco, G. Bravo, J. C. Parsons, “The Search for Synergy: A Critical Review from a Response Surface Perspective”.
Pharmacological Review. Vol. 47 (2), pp. 331–385.
10. Combined Actions and Interactions of Chemicals in Mixtures The Toxicological Effects of Exposure to Mixtures of In dustrial and
Environmental Chemicals. Danish State Information Centre. Danish Veterinary and Food Administration. Federal Report. 2003.
11. Assessment of Combined Exposures to Multiple Chemicals: Report of a WHO/IPCS International Workshop on Aggregate/Cumulative
Risk Assessment. WHO, 2009.
12. M. Doble, A. Kumar, Biotreatment of Industrial Effluents. Elsevier Inc., 2005.
13. Edetate calcium disodium. Cerner Multum, Inc. 2018. Available: https://www.drugs.com/mtm/edetate-calcium-disodium.html.
14. K. J. Rothman. “Causes”. Am. J. of Epidemiology, 1976, vol. 104(6), pp. 587–592.
15. O. S. Miettinen. “Causal and preventive interdependence: Elementary principles”. Scand. J. Work. Environ. Health, 1982, vol. 8, pp.
159–168.
16. O. S. Miettinen. Theoretical Epidemiology. John Wiley & Sons Inc., 1985.
17. S. Greenland, C. Poole. “Invariants and noninvariants in the concept of interdependent effects”. Scand. J. Work. Environ. Health, 1988,
vol. 14, pp. 125–129.
18. S. Greenland, B. Brumback. “An overview of relations among causal modelling methods”. Int. J. Epidemiol., 2002, vol. 31, pp. 1030–
1037.
19. T. J. VanderWeele. “Sufficient cause interactions and statistical interactions”. Epidemiology. 2009, vol. 20(1), pp. 6–13.
20. T. J. VanderWeele, T. S. Richardson. “General theory for interactions in sufficient cause models with dichotomous exposures”. Ann.
Statistics. 2012, vol. 40, pp. 2128–2161.
21. T. J. VanderWeele, J. M. Robins. “The identification of synergism in the sufficient-component-cause framework”. Epidemiology.
2007, vol. 18(3), pp. 329–339.
22. V. G. Panov, J. V. Nagrebetskaya. “An algebraic treatment of two-factor binary sufficient causes theory”. Proceed. SPIIRAN. 2013,
vol. 26, pp. 277–296. (in Russian).
23. V. G. Panov, J. V. Nagrebetskaya. “Boolean algebras and classification of interactions in sufficient-component cause model”. Int. J.
Pure Appl. Math. 2015, vol. 98(2), pp. 239–259.
24. V. G. Panov, J. V. Nagrebetskaya. “Classification of combined action of binary factors and Coxeter groups”. J. Discrete Math. Sci. &
Crypt. 2018, vol. 21(3), pp. 661–677.
25. S. L. Morgan, Ch. Winship. Counterfactuals and Causal Inference. Cambridge University Press, 2007.
26. “Handbook of Boolean algebras”. Vols 1–3. J. D. Monk, R. Bonnet, Eds. Amsterdam: Elsevier, 1989.
27. Y. Crama, P. L. Hammer. “Boolean functions. Theory, Algorithms, and Applications”. Cambridge: Cambridge University Press, 2011.
28. R. Lidl, G. Pilz. “Applied abstract algebra”. 2nd ed. New York: Springer, 1998.
29. N. Christofides. Graph Theory. An Algorithmic Approach. 3rd ed. London: Academic Press, 1978.
30. T. J. VanderWeele, J. Robins. (2006). A Theory of Sufficient Cause Interactions. COBRA Preprint Series, Article 13, Available:
http://biostats.bepress.com/cobra/ps/art13.
31. T. J. VanderWeele, J. Robins. “Empirical and counterfactual conditions for sufficient cause interactions”. Biometrika, 2008, vol. 95,
pp. 49–61.
32. B. Steinbach, Ch. Posthoff. “Boolean Differential Calculus”. Synthesis Lectures on Digital Circuits and Systems. Morgan&Clayp ool
Publishers. 2017.
33. G. J. Howard, T. Webster. “Contrasting Theories of Interaction in Epidemiology and Toxicology”. Environ. Health Perspect., 2013,
vol. 121, 1–6.
34. U.S. EPA (U.S. Environmental Protection Agency). Supplementary Guidance for Conducting Health Risk Assessment of Chemical
Mixtures. Washington, DC: U.S. EPA, 2000. Available: http://cfpub.epa.gov/ncea/cfm/recordisplay.cfm?deid=20533#Download.
35. M. C. Berenbaum. “What is synergy?” Pharmacol. Rev., 1989, vol. 41(2), pp. 93–141.

Authors: PL. Chithra, K. Sathya,

Paper Title: Color Channel CAPTCHA: A Secure Scheme for Cloud Environment
Abstract: Abuse of cloud services consequently unauthorized access to cloud data by malicious software
automation is prevented by CAPTCHA. The secure usable mechanism is mandatory for resilience to automate
attacks accordingly to create pleasant challenges. In this paper, we propose a novel image-based graphical Color
Channel CAPTCHA scheme to distinguish between malware and humans for data security in the cloud
environment. This color channel CAPTCHA is designed with 2 X 2 grids of different color channels with micro
invisible circles or less visible moving circles. This simple challenge is completed by click on the specified
circles in the given order with very less solving time, while compared to the state of the art. The experimental
study has been conducted among 41 participants on both usability and performance of color channel CAPTCHA.

Keyword : Color channel, graphical, micro, invisible.


376.
References: 2154-
1. I. J. Goodfellow, Y. Bulatov, J. Ibarz, S. Arnoud, V. D. Shet, Multi-digit number recognition from street view imagery using deep
convolutional neural networks, CoRR abs/1312.6082. arXiv: 1312.6082. URL http://arxiv.org/abs/1312.6082
2158
2. Google Inc., recaptcha: Easy on humans, hard on bots (January 2018). URL https://www.google.com/recaptcha/intro/
3. M. Guerar, M. Migliardi, A. Merlo, M. Benmohammed, B. Messabih, A completely automatic public physical test to tell computers
and humans apart: A way to enhance authentication schemes in mobile devices, in: 2015 International Conference on High
Performance Computing Simulation (HPCS), 2015, pp. 203–210. doi:10.1109/HPCSim.2015.7237041.
4. Carnegie Mellon University, (2010), captcha: Telling humans and computers apart automatically, http://www.captcha.net.
5. Bursztein E., Martin M., Mitchell J., Text-based captcha strengths and weaknesses. Proceedings of the 18th ACM conference on
Computer and communications security - CCS11, (2011) 125.
6. Von Ahn L., Maurer B., McMillen C., Abraham D., Blum M., recaptcha: Human-based character recognition via web security
measures. Science, 321 (2008) 1465–1468.
7. Elson J., Douceur J., Howell J., Saul J., Asirra: a captcha that exploits interest-aligned manual image categorization, CCS, 7 (2007)
366–374.
8. I. J. Goodfellow, Y. Bulatov, J. Ibarz, S. Arnoud, V. D. Shet, Multi-digit number recognition from street view imagery using deep
convolutional neural networks, CoRR abs/1312.6082. arXiv:1312.6082. URL http://arxiv.org/abs/1312.6082
9. B.Pinkas, T. Sander, Securing passwords against dictionary attacks, in: Proceedings of the 9th ACM Conference on Computer and
Communications Security, CCS ’02, ACM, New York, NY, USA, 2002, pp.161–170.doi:10.1145/586110.586133.
URLhttp://doi.acm.org/10.1145/586110.586133
10. H.-T. Yeh, B.-C. Chen, Y.-C. Wu, Mobile user authentication system in cloud environment, Security and Communication Networks 6
(9) (2013)1161–1168.doi:10.1002/sec.688.
11. URL http://dx.doi.org/10.1002/sec.688
12. D. Pequegnot, L. Cart-Lamy, A. Thomas, T. Tigeon, J. Iguchi Cartigny, J. L. Lanet, A security mechanism to increase confidence in m-
transactions, in: 2011 6th International Conference on Risks and Security of Internet and Systems (CRiSIS), 2011, pp. 1–8.
doi:10.1109/CRiSIS.2011.6061836
13. I. A. Althamary, E. S. M. El-Alfy, A more secure scheme for captcha based authentication in cloud environment, in: 2017 8th
International Conference on Information Technology (ICIT),2017,pp.405–411.
14. doi:10.1109/ICITECH.2017.8080034.
15. Z. Xu, K. Bai, S. Zhu, Taplogger: Inferring user inputs on smartphone touchscreens using on-board motion sensors, in: Proceedings of
the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC ’12, ACM, New York, NY, USA,
2012,pp.113–124.doi:10.1145/2185448.2185465.URL http://doi.acm.org/10.1145/2185448.2185465
16. Ogiela MR, Krzyworzeka N, Ogiela L. Application of knowledge-based cognitive CAPTCHA in Cloud of Things
security.ConcurrencyComputatPractExper.2018;e4769.https://doi.org/10.1002/cpe.4769
17. Narges R, James M, ADAMAS: Interweaving Unicode and color to enhance CAPTCHA security. In: Future Generation Computer
Systems,2016,55.p.289-310.
18. Guido S, Gerit W, Alexander S, Development of two novel face-recognition CAPTCHAs: A security and usability study. In:
Computers and security, 2016, 60. p.95-116.
19. Gaurav G, Brain M.P, Mayank V, Richa S, Afzal N, FaceDCAPTCHA: Face detection based color image CAPTCHA. In: Future
Generation Computer Systems, 2014, 31.p59-68.
20. Confident Technologies. Confident CAPTCHA.
21. <http://http://confidenttechnologies.com/confident-captcha//>;2019.
22. A. Buriro, S. Gupta, B. Crispo, Evaluation of motion-based touch typing biometrics for online banking, in: 2017 International
Conference of the Biometrics Special Interest Group (BIOSIG), 2017, pp. 1–5. doi:10.23919/BIOSIG.2017.8053504.
23. P.L.Chithra, K.Sathya, PixCaptcha A Novel Genre Captcha For User Dexterity, fourth International Conference on parallel, distributed
grid computing(PDGC),IEEE,2016.pp.301-305.
24. P.L.Chithra, K.Sathya, Pristine PixCaptcha as Graphical Password for Secure eBanking Using Gaussian Elimination and Cleaves
Algorithm, 2nd International Conference on Computer, Communication, and Signal Processing (ICCCSP),IEEE,2018.

Authors: P Suganya, Pradeep Reddy Ch


Integration of 6LOWPAN and Cloud Data Centers: The Role of Link Capacity between Sensor
Paper Title:
Networks and Cloud Data Centers
Abstract: Internet of Things (IoT) and Internet of Mobile Things (IoMT) acquired widespread popularity
by its ease of deployment and support for innovative applications. The sensed and aggregated data from IoT and
IoMT are transferred to Cloud through Internet for analysis, interpretation and decision making. In order to
generate timely response and sending back the decisions to the end users or Administrators, it is important to
select appropriate cloud data centers which would process and produce responses in a shorter time. Beside
several factors that determine the performance of the integrated 6LOWPAN and Cloud Data Centers, we analyze
the available bandwidth between various user bases (IoT and IoMT networks) and the cloud data centers.
Amidst of various services offered in cloud, problems such as congestion, delay and poor response time arises
when the number of user request increases. Load balancing/sharing algorithms are the popularly used
techniques to improve the performance of the cloud system. Load refers to the number of user requests (Data)
from different types of networks such as IoT and IoMT which are IPv6 compliant. In this paper we investigate
the impact of homogeneous and heterogeneous bandwidth between different regions in load balancing
algorithms for mapping user requests (Data) to various virtual machines in Cloud. We investigate the influence
of bandwidth across different regions in determining the response time for the corresponding data collected from
data harvesting networks. We simulated the cloud environment with various bandwidth values between user
base and data centers and presented the average response time for individual user bases. We used Cloud- Analyst
an open source tool to simulate the proposed work. The obtained results can be used as a reference to map the
mass data generated by various networks to appropriate data centers to produce the response in an optimal time.
377.
2159-
Keyword : IoT, IoMT, Data Centers, Virtual Machines, Load Balancing, Cloud Computing 2164
References:
1. Shang-Liang ChenYun-Yao Chen Suang-HongKuo, “CLB: A novel load balancing architecture and algorithm for cloud services,
Computers & Electrical Engineering, Volume 58, Pages 154-160, February 2017.
2. Minxian Xu Wenhong Tian Rajkumar Buyya, “A survey on load balancing algorithms for virtual machines placement in cloud
computing”, Concurrency and computation Practice and Experience, Wiley Online Library, Volume 29, Issue 12, march 2017.
3. Einollah Jafarnejad Ghomia Amir Masoud RahmaniaNooruldeenNasih Qaderb, “Load-balancing algorithms in cloud computing: A
survey”, Journal of Network and Computer Applications, Volume 88, , Pages 50-71, June 2017
4. Seyed Ebrahim Dashti & Amir Masoud Rahmani , “Dynamic VMs placement for energy efficiency by PSO in cloud computing”,
Journal of Experimental & Theoretical Artificial Intelligence, Volume 28, Issue 1-2: Advances and Applications of Swarm
Intelligence, 2016
5. M. H. Ghahramani, MengChu Zhou,Chi Tin Hon, “Toward cloud computing QoS architecture: analysis of cloud systems and cloud
services”, EEE/CAA Journal of Automatica Sinica, Volume 4, Issue 1, PP:6-18, Jan 2017
6. Jianhua Peng, Ming Tang, Ming Li & Zhiqin Zha,, “A Load Balancing Method For Massive Data Processing Under Cloud Computing
Environment”, Intelligent Automation & Soft Computing, Issue 4, PP: 547-553, 2017.
7. Yao, J.H., Ju-hou, Load Balancing Strategy of Cloud Computing Based On Artificial Bee Algorithm in Computing Technology and
Information Management (ICCM), IEEE: Seoul. p. 185 - 189. 2012
8. Kumar P.J., Ilango P., “MQRC: QoS aware multimedia data replication in cloud”, International Journal of Biomedical Engineering and
Technology, Vol.No:25, Issue.No:2/3/4, PP:250-266, 2017
9. cloudsim.cloudbus;Available from: http://www.cloudbus.org/cloudsim/.
10. https://sourceforge.net/projects/cloudanalystnetbeans/
11. Kumar P.J., Ilango P., “BMAQR: Balanced multi attribute QoS aware replication in HDFS”, International Journal of Internet
Technology and Secured Transactions, Vol.No:8, Issue.No:2, PP:195-208,2018.
12. P.J.Kumar, P.Ilango, “An Optimized Replica Allocation Algorithm Amidst of Selfish Nodes in MANET”, Wireless Personal
Communications,Vol.No:94, Issue.No:4, PP:2719-2738,2017.
13. Pakize, S.R., S.M. Khademi, and A. Gandomi, Comparison Of CloudSim, CloudAnalyst And CloudReports Simulator in Cloud
Computing. International Journal of Computer Science And Network Solutions, 2: p. 19-27, 2014
14. Ray, S. and A. De Sarkar, Execution Analysis of Load Balancing Algorithms In Cloud Computing Environment. International Journ al
on Cloud Computing: Services and Architecture (IJCCSA), 2(5): p. 1-13,2012..
15. Hafiz Jabr Younis, Alaa Al Halees, Mohammed Radi, “Hybrid Load Balancing Algorithm in Heterogeneous Cloud Environment”,
International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-5 Issue-3, July 2015 PP: 61-65
16. Hayder A. A. Al-Kashoash, Yaarob Al-Nidawia and Andrew H. Kempa, “Congestion-Aware RPL for 6LoWPAN Networks”, in
Proc.of Wireless Telecommun. Symp.(WTS), London ,U.K, 2016 PP:1-6
17. T. Winter, P. Thubert, A. Brandt, J. Hui, and R. Kelsey, “RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks,” RFC
6550, 2012.
18. O. Gaddour, A. Koubaa, N. Baccour, and M. Abid, “OF-FL: QoS-Aware Fuzzy Logic Objective Function for The RPL Routing
Protocol,” in Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), 2014 12th International Symposium on.
IEEE, 2014, pp. 365–372.
19. J.-P. Vasseur, M. Kim, K. Pister, N. Dejean, and D. Barthel, “Routing Metrics Used for Path Calculation in Low-Power and Lossy
Networks,” RFC 6551, 2012.
20. T. Tsvetkov, “RPL: IPv6 Routing Protocol for Low Power and Lossy Networks,” Sensor Nodes–Operation, Network and Application
(SN), vol. 59, p. 2, 2011.

Authors: Beena A L, Humayoon Kabir S

Paper Title: Machine Learning and Security Applications in Digital Library


Abstract: This paper presents the applications of machine learning machine learning applications in the
digital library. Using machine learning it is possible to search and retrieve non-textual information. The paper
also discusses the machine learning applications in security aspects. A systematic review of literature is also
done and with the help of citation mapping in Web of Science citation network analysis is presented.

Keyword : machine learning, digital library, knowledge base, citation network analysis(CNA).
References:
1. X. Lin, Y. Xiong, "Detection and analysis of table of contents based on content association", International Journal of
Document Analysis, vol. 8, no. 2, pp. 132-143, 2006. DOI 10.1007/s10032-005-0149-4
2. R. Fox, "Digital libraries: the systems analysis perspective machine erudition", Digital Library Perspectives, vol. 32,
no. 2, pp.62-67, 2016. http. s://doi.org/10.1108/DLP-02-2016-0006
3. Y. B. Wu, Q. Li, R. S. Bot and X. Chen, "Finding Nuggets in Documents: A Machine Learning Approach",
Journal of the American Society For Information Science And Technology, vol. 57, no. 6, pp. 740–752, 2006.
4. S. A. Babar and P. D. Patil, "Improving Performance of Text Summarization", Procedia Computer Science, vol. 46 no.
2015, pp. 354 – 363, International Conference on Information and Communication
Technologies(ICICT2014), doi: 10.1016/j.procs.2015.02.031.
5. F. Ciravegna, S. Chapman, A. Dingli, Y. Wilks , "Learning to Harvest Information for the Semantic Web", pp. 312-326, 2004, doi:
10.1007/978-3-540-25956-5_22.
6. S. Mukherjee, I.V. Ramakrishnan and A. Singh, "Bootstrapping Semantic Annotation for Content-Rich HTML Documents,
Proceedings of the 21st International Conference on Data Engineering (ICDE 2005). 1084-4627/05.
7. Y.L. Chi, T.Y. Hsu and W.P. Yang, "Building Ontological Knowledge Bases For Sharing Knowledge In Digital Archive",
Proceedings of the Fourth International Conference on Machine Learning and Cybernetics, Guangzhou, 18-21 August
2005, IEEE. 0-7803-9091-1/05
8. S. Wang, J. Wang, B. Wang and X. Z. Wang, "Study On The Content- Based Image Retrieval System By Unsupervised Learning",
Proceedings of the Eighth International Conference on Machine Learning and Cybernetics, Baoding, 12-15 July 2009
378. . IEEE. 978-1-4244-3703-0/09/
9. I. H. Witten, "Learning Structure from Sequences, with Applications in a Digital Library", in ALT 2002, LNAI 2533 N. C. 2165-
Bianchi, Ed. Heidelberg: Springer-Verlag, 2002, pp. 42–56.
10. X. Xu, K. Wang, Y. Deng, T. Li, "REPDL: Research-oriented e-learning platform based on digital library", 2017 IEEE
2168
International Conference on Teaching, Assessment, and Learning for Engineering (TALE), 12-14 December 2017, The
Education University of Hong Kong, pp. 139-142. 978-1-5386-0900-2/17
11. P. Xiu and H. S, Baird, "Whole-Book Recognition", IEEE Transactions on Pattern Analysis and Machine Intelligence", vol. 34, no.
12, pp. 2467-2480, 2012.
12. B. Zhu, L. Yang, X. Wu and T. Guo, "Automatic Recognition of Books Based on Machine Learning", 3rd International Symposium
on Computational and Business Intelligence, IEEE 978-1-4673-8501-5/15, 2015. DOI 10.1109/ISCBI.2015.20
13. X. Zhang, “The statistical learning theory and support vector machine,” Acta Automatica Sinical, vol.26, no.1, pp.32-42, 2000.
14. F. Tang, Z. Wang and M. Chen, “The study of multi-class classification based on support vector machine algorithm,” Control and
Decision, vol.20, no.7, pp.746-754, 2005.
15. S. Mitchell, "Machine Assistance in Collection Building: New Tools, Research, Issues, and Reflections", Information Technology
And Libraries, pp. 190-216, Dec 2006.
16. M. Krapivin, M. Marchese, A. Yadrantsau and Y. Liang, "Unsupervised Key-Phrases Extraction from Scientific Papers Using Domain
and Linguistic Knowledge", 2008 Third International Conference on Digital Information Management, London, 2008, pp. 105-112,
IEEE 978-1-4244-2917-2/08,2008,doi: 10.1109/ICDIM.2008.4746749.
17. G. Pant, K. Tsioutsiouliklis, J. Johnson and C. L. Giles, "Panorama: Extending Digital Libraries with Topical Crawlers",
Proceedings of the 2004 Joint ACM/IEEE Conference on Digital Libraries (JCDL’04), ACM, 1-58113-832-6/04,
2004.
18. S. Ferilli, M. Biba, T. M. A. Basile, and F. Esposito, "Incremental Machine Learning Techniques for Document Layout
Understanding", IEEE. 978-1-4244-2175-6/08, 2008.
19. Y. Hu, H. Li, Y. Cao, D. Meyerzon, Q, Zheng "Automatic Extraction of Titles from General Documents using Machine Learning",
Information Processing and Management, vol.42, no. 5, pp. 1276-1293 doi: 10.1016/j.ipm.2005.12.001.
20. X. Lu, P.Mitra, J. Z. Wang, C. L. Giles, "Automatic Categorization of Figures in Scientific Documents" JCDL ’06 June 11–15,
2006, Chapel Hill, North Carolina, USA, pp. 129-138.
21. I. G. Councill, H. Li, Z. Zhuang amd S. Debnath, "Learning Metadata from the Evidence in an On-Line Citation Matching Scheme",
Proceedings of the ACM/IEEE Joint Conference on Digital Libraries. 2006. pp. 276 - 285, doi: 10.1145/1141753.1141817.
22. S. Kim, and Y. Liu, "Functional-based Table Category Identification in Digital Library", IEEE Computer Society, pp. 1364-1368,
2011 International Conference on Document Analysis and Recognition. IEEE 1520-5363/11, DOI:
10.1109/ICDAR.2011.274
23. F. Esposito, D.Malerba, G.Semeraro, S.Ferilli, O. Altamura, T. M. A. Basile, M. Berardi, M. Ceci, and N.
D Mauro, "Machine Learning methods for automatically processing historical documents:from paper acquisition to XML
transformation, Proceedings of the First International Workshop on Document Image Analysis for Libraries
DIAL’04) IEEE 0-7695-2088-X/04. IEEE Computer Society
24. S. B. Shirude and S. R. Kolhe, "Classifying library resources in Library Recommender Agent using PU learning approach," 2016
International Conference on Data Mining and Advanced Computing (SAPIENCE), Ernakulam, 2016, pp. 79-83.
25. V. Mahesh, and K. A. Sumithra Devi, "Spyware Detection and Prevention using Deep Learning AI for user applications",
International Journal of Recent Technology and Engineering, pp. 345-349, vol. 7, no. 5, 2019.
26. P. Bradley, Risk management standards and the active management of malicious intent in artificial superintelligence. AI & Society,
Springer, DOI: https://doi.org/10.1007/s00146-019-00890-2
27. N. Nissim, A. Cohen, J. Wu, A. Lanzi, L. Rokach, Y. Elovaci, L. Giles, "Sec-Lib: Protecting Scholarly Digital Libraries
From Infected Papers Using Active Machine Learning Framework," in IEEE Access, vol. 7,
pp.110050-110073, 2019. doi: 10.1109/ACCESS.2019.2933197

Authors: Vipul, P Vinoth Kumar, Divyansh Dimri, Mayank pathak

Paper Title: Expenditure Predicting using Machine Learning


Abstract: As we know in today’s world managing expenses is a very challenging thing. By analyzing our
previous expenses, we can predict our upcoming expenses. Now digitalization is everywhere so we can get bank
transaction history easily, just by getting the data from transaction history we can predict the estimation of
upcoming expense. We can do this using machine learning, machine learning is used in many things one of them
is prediction. We are using linear regression algorithm, it is a machine learning algorithm used in prediction. The
main aim of this project is to build a system that helps in managing personal finances of the user. This project
has mainly three modules, first is to collect the data and prepare it to be used in algorithm, next is to build a
network between the algorithm and the dataset. The last one is prediction in which system is going to predict the
379. expenses. Particularly we are predicting the expense of next month. We can also use this system in stock market
for predicting the next step if stocks of a company will rise or fall do, this can help us in making money from 2169-
stock market and manage our expense. 2172

Keyword : By analyzing our previous expenses, we can predict our upcoming expenses.
References:
1. V. Singh, L. Freeman, B. Lepri, and A. Pentland, “Predicting spending behavior using socio-mobile features,”.
2. KIM Zi Won Comparison between different reinforcement learning algorithms on open AI Gym environment (Cart-Pole v0) 2017.
3. 3.Ankit Choudhary A Hands-On Introduction to Deep Q-Learning using Open AI Gym in Python IIT Bombay EEE.
4. Andrew NG Machine Learning Course Coursera. Available: https://www.coursera.org/learn/machine-learning
5. J. Filliben et al., “Introduction to time series analysis,” in NIST/SEMTECH Handbook of Statistical Methods, National Institute of
Standards and Technology, 2003

Authors: Nilavathy. K, Dunstan Rajkumar. A


Exploration of Road Accidents Severity and Inquiry of Reason for Road Accidents in National
Paper Title:
Highways in Tamil Nadu
Abstract: Recent day’s government of India is more particular about the Road transportation development as
it leads to the economic development of the nation. With the improvement of road, the risk of road accidents,
injuries and fatalities has also outstretched to the extreme extent. Road accident severity has been recorded to
31.8% in 2017 in India. Among this more than 30% of the accidents are befalling in National Highways. Among
the total Indian roads, 1.8% is National Highways which carry about 40% of the Indian traffic. Huge volume of
traffics on national highways and the attitude of the driver towards driving on National Highways are the
important reason for National Highways road accidents. The researchers in the recent study are going to analyse
about the severity of road accidents in National and in state level by calculating the number of deaths to every
100 road accidents. The researchers are also going to analyse the reasons for National highways road accidents
from people’s perspective.
380.
2173-
Keyword : Road accidents, accident severity, National Highways and reason for road accidents . 2177
References:
1. Pawan Deshpande, ‘Road safety and accident prevention in India: A Review’, “International Journal of Advanced Engineering
Technology’’, E-ISSN 0976-3945, /Vol. V/Issue II/April-June, 2014, 64-68.
2. Krishnan.S, Geetha. K, Rabiya Basri, ‘Road accidents and road safety measures in Tamil Nadu - An Analysis’, 140318.
3. Sanjay Kumar Singh ‘Road Traffic Accidents in India: Issues and Challenges’, ‘Transportation Research procedia’ (2017), 4708-4719
4. Gopala Krishnan.S ‘A Public Health perspective of Road traffic Accidents’, ‘Journal of Family medicine and primary care’, July-Dec
2012, 144-150.
5. Jain.S.S, Singh P.K, and parida.M , ‘Road safety audit for four lane National Highways’, onlinepubs, conferences, 2011, RSS,3.
6. Singh, A.P, Agarwal P.K, Sharma A, ‘Road safety improvement: a challenging issue on Indian roads, ‘International Journal of
Advanced Engineering Technology’, E-ISSN 0976-3945, /Vol.II/ Issue II/April-June, 2011/363-369
7. Dinesh Mohan, Omes Tsimhoni, Michael Sivak, Michael J Flannagan, ‘Road safety in India challenges and opportunities’, ‘UMTRI’,
2009.
8. Sanjay K. Singh, ‘Review of urban transportation in India’, ‘Journal of public transportation, volume 8, 2005.

Authors: Cmak Zeelan Basha, Sofia Tasneem, Preethi Miriyala, Syed Saleem Basha

381. Paper Title: Enhanced Technique For Placement Monitoring using Servicenow Portal
Abstract: Placement Monitoring System is a part University placement cell which plays a crucial role in 2178-
providing job opportunities to the under graduated and post graduates passing out from the college by having 2181
collaboration with many reputed industries and firms. The opportunities for the students being ready to be placed
are increasing continuously. There is a lot to monitor for the placement cell authorities where they need to
manage the student profile and documents related for their training and placement. They also need to collect the
information about various companies that are ready to recruit students and notify the students time to time about
them.[1] The background work that the placement cell needs to monitor is more. They need to maintain various
platforms, large data and also they need to modify and update the data who are yet too placed and who are to be
placed. And for this the updating and modification need to be done manually which is a time taking process.
This project facilitates the placement monitoring system to communicate with the students and give a clear list
of students who are placed and who are not. And the students who are not placed can only receive about the
campus recruitment drives and the students who are placed need not receive these notifications. ServiceNow is
one such platform which provides a single system/platform where every detail of the student can be monitored
and send the notification emails to the students who are to be placed making the management cell their work
easier. The total data can be monitored with the artifacts present in the ServiceNow itself, which includes client
scripts, UI policies, notifications, workflows and service portal.

Keyword : UI policies, Roles, Access controls, Notifications, workflow and service portal.
References:
1. Vinay Parameshwarappa, Nandish S (2014) “A Segmented
2. Morphological Approach to Detect Tumour in Brain Images“ International Journal of Advanced Research in Computer Science and
Software Engineering.vol 4.
3. Jay Patel and Kaushal Doshi. Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 3 (2014),“A Study
of Segmentation Methods for Detection of Tumor in Brain MRI”.
4. Vishal B. Padole, D. S. Chaudhari, International Journal of Electronics, Communication & Soft Computing Science and Engineering
(IJECSCSE) Volume 1, “A Review of Segmentation Methods for Detection of Brain Tumor in MRI”.
5. Sudipta Roy,Sanjay Nag,Indra Kanta Maitra, International Journal of Electronics, Communication & Soft Computing Science and
Engineering (IJECSCSE) Volume 3, Issue 6.
6. Rohan Kandwal, Ashok Kumar( 2014) “An Automated System for Brain Tumor Detection and Segmentation”
7. Jobin Christ M.C. 1, Dr. Parvathi R.M.S. IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, July
2012”Brain Tumors: An Engineering Perspective”.
8. C M A K. Zeelan Basha, Maruthi Padmaja, and G.N.Balaji,“Computer Aided Fracture Detection System” Journal of Medical Imaging
and Health Informatics Vol. 8, 526–531, 2018.
9. Azmira Krishna, CMAK Zeelan Basha, Pradeep Raj Savarapu, Soumya Ranjan Nayak, S. Sivakumar ” Multi Target Tracking Access
with Data Association in Distributed Camera Networks”, International Journal of Recent Technology and Engineering
(IJRTE),vol.8,412-417.
10. Cmak Zeelan basha, Azmira Krishna, Pradeep Raj Savarapu “Automatic Detection of Lung Infection”, International Journal of Recent
Technology and Engineering (IJRTE), Volume-8,200-203.

Authors: Syed Riyaz Ahammed, Bachina Harish Babu, Saam Prasanth Dheeraj, Aleligne Yohannes Shiferaw

Paper Title: Development of Sensors by 3D Printing Technology-Fused Deposition Modelling


Abstract: In present days the most commonly used methodology for making structures in three
dimensional views is 3D printing technology. This technology is also referred as an additive manufacturing
technology. This technology is being broadly used to improve functionality. Advances in utilization of this
technology lead to sensing applications in monitoring health parameters. But, in general this type of
multifunctional sensor involves with developments in better sensitivity and specificity. This paper mainly
focusses a review about the work done on development of 3D printed sensors. Utilization of these techniques has
increased in the domain of applications related to sensors as per the advances of being quickly fabricated and the
high probability of processing different conductive materials. Representing the need and importance of 3D
printing methodology in fabricating sensors, this article summarizes different 3D printing technologies and
explains the utilization of fused deposition modelling method to fabricate sensing prototype. Advantages,
disadvantages, materials that are being currently processed and case studies has been summarized in this paper.
Chosen case studies review the importance of developing sensors with advanced performance.

382.
Keyword : 3D printing, Sensors
2182-
References: 2185
1. KV Wong, Hernandez, Aldo, “A Review of Additive Manufacturing”, ISRN Mechanical Engineering, 2012, p1-10.10p
2. David Espalin, Danny W. Muse, Eric MacDonald, Ryan B. Wicker, “3D Printing multifunctionality: structures with electronics”, The
International Journal of Advanced Manufacturing Technology, May 2014, Volume 72, Issue 5–8, pp 963–978
3. Morteza Amjaadi et al. “Stretchable, skin mountable, and wearable strain sensors and their potential applications: A Review”,
Advanced functional materials, 2016, Vol.26, 1678-1698.
4. Alpuim, P.; Correia, V.; Marins, E.S.; Rocha, J.; Trindade, I.; Lanceros-Mendez, S. Piezoresistive silicon thin film sensor array for
biomedical applications. Thin Solid Films 2011, 519, 4574–4577.
5. Su Ryon Shin et al. “A Bioactive Carbon Nanotube‐Based Ink for Printing 2D and 3D Flexible Electronics”, Advanced materials, 24
February 2016|
https://doi.org/10.1002/adma.201506420|
6. Kevin Chen et al. “Printed carbon nano tube electronics and sensor systems”, advanced materials, 16 February 2016,
ttps://doi.org/10.1002/adma.201504958
7. Esther Garcia et al. “Printing in Three Dimensions with Graphene”, advanced materials, 21 January 2015.
8. Minpyo Kang et al. “Graphene-Based Three-Dimensional Capacitive Touch Sensor for Wearable Electronics”, ACS publications, Vol.
8, issue 7, July 2017
9. SorooshDerakhshanfar, “3D bioprinting for biomedical devices and tissue engineering: A review of recent trends and advances”,
Science Direct, Bioactive Materials, Volume 3, Issue 2, June 2018, Pages 144-156
10. Tao Han et al. “3D Printed Sensors for Biomedical Applications: A Review”, sensors,MPDI, Published online 2019 April 10.
11. Yuanyuan Xu, “The Boom in 3D-Printed Sensor Technology”, sensors,MPDI, Published online 2017 May 19. doi:
10.3390/s17051166.
12. Sen Wai Kwok et al. “Electrically conductive filament for 3D-printed circuits and sensors”, Applied Materials Today, Elsevier, Vol. 9,
July 2017, 167-175

Authors: Mariam Abouhadid, Rania Shafik


Effects of Design on Motivational Climate and Achievement Goals of Users: Environmental
Paper Title:
Psychology Research Towards an ultimate Design of Sports Facilities in Egypt
Abstract: Sports facilities design has not been subject to much research and development. It has been made
in a specific design with not much analysis. Different types of sports and wellness requires different design. This
research aims at setting guidelines for designing sports facilities in Egypt.
The research investigates the problem with a survey that was conducted on around 200 respondents from
different age groups and fitness levels. The Questionnaire was constructed of 18 items that cover some
demographic data and then spatial aspects and their effect on respondents. The respondents had to choose their
preferences in terms of emotional comfort and focus, and he setting that keeps them motivated and focused to
reach their fitness goals. The results show the different settings that each category of respondents prefer and get
motivated in their workout environment depending on their gender, age, fitness level, type of sports, and their
workout goals.
The research uses social science study methodology to investigate a sample of population to get an overview
of the larger population. And the results show how the design of the built environment can affect human
performance in sports and affect their mental and psychological health.
The results showed that in fact the workout environment affects the users and makes them more committed to
achieve their health goals when they are in line with their preferences and make them feel comfortable, secure
and welcomed.

Keyword : Environmental Psychology; Sports facility design; Human comfort; Motivational Climate.
References:
1. Sallis J., “Measuring physical Activity Environments”, American Journal of Preventive Medicine, Elsevier, Volume 36,, Numbe r 4S,
p. 86-92, 2009.
383. 2. Janetius, S.T. , “Architectural Psychology”, Art, Culture & Gender: The Indian Psyche, , Mishil & Js Publishers, Thrissur, p 67- 73,
2016. 2186-
3. Biscaia et al, “The effect of emotions on football spectators’ satisfaction and behavioral intentions”, European Sports management 2193
quarterly, 12(3):227-242, 2012.
4. Uphill et al, “The influence of in-game emotions on basketball performance”, European Journal of Sport science, 2012.
5. CollishawM. Et al, “The authenticity of Positive Emotional Displays: Client Responses to Leisure Service Employees”, Journal of
Leisure Research, 40(1): 23-46, 2008.
6. Sabiston C., “The Role of body-related self-conscious emotions in motivating women’s physical activity”, Journal of sport and exercise
psychology, 32(4): 417-437, 2010.
7. Kang et al., “Semantic analysis does not occur in the absence of awareness induced by interocular suppression”, The journal of
Neuroscience , 31:13535–13545, 2011.
8. Roessler K., “Healthy Architecture: Can environments evoke emotional responses?”, Global Journal of Health Science, Volume 4, p.
83-89, 2012.
9. Rossler K. et al, “Arkitektur, Kvinder Og Idraet”,2007.
10. Roessler K., “Environmental Psychology , The interaction between movement and Environment- Environmental Psychology and the
Sporting Space”, 2007.
11. Yalom I., “Existential Psychotherapy”, Basic Books, 1980.
12. Rossler et al, “Riding the wave of an expert: A Successful Talent Environment in Kayaking”, Sport Psychologist 25(3):341 -362, 2011.
13. Sibley B. et al., “What Keeps athletes in the gym?, Goals, Psychological needs, and motivation of crossfit participants”, Internationa
joutrnal of sport and exercise psychology”, p.1-20, , 2017.
14. Ryan et al, “ Self-determination theory and the facilitation of intrinsic motivation, social development, and well-being”, American
Psychologist, 55, 68-78, 2000.
15. Ryan et al, “Active human nature: Self-determination theory and the promotion and maintenance of sport, exercise, and health”,
Intrinsic motivation and self-determination in exercise and sport (pp. 1-19). Champaign, IL: Human Kinetics, 2007.
16. Gunnel et al, “Psychological Needs as Mediators? The relationship between leisure time physical activity and well being in people
diagnosed with osteoporosis”, Research quarterly for exercise and sport , 82:4, 794-798 , 2011.
17. Gunnel et al, “Psychological need satisfaction and thwarting : A test of basic Psychological Needs Theory in physical activity
contexts”, Psychology of Sport and Exercise 14 :599-607, 2013.
18. Edmunds et al, “Examining Exercise Dependence Symptomatology from a Self-determination Perspective”, Journal of Health
Psychology, 11(6), 887-903, 2006.
19. Sebire et al.,” Examining Intrinsic versus Extrinsic Exercise Goals: Cognitive, Affective, and Behavioral Outcomes”, Journal of Sport
& Exercise Psychology 31(2):189-210, 2009.

Authors: Daulat Kumar Sharma, Mileend Sharma, Gautam Upadhyay

Paper Title: Boron Carbide (B4C) Reinforced Aluminum Matrix Composites (AMCs)
Abstract: Aluminum matrix composites (AMCs) demonstrating a good combination of properties that are
hard to acquire by a monolithic aluminum material. Since the last few decades, investigators have shown their
384. keen interest to advance these materials for complex applications. Homogeneous reinforcement distribution,
defect-free microstructure, and improved resultant properties depends on the fabrication method along with 2194-
matrix and reinforcement materials and size. Two-step melt stirring technique and K2TiF6 flux enhanced the 2203
wettability and improve the particle distribution of boron carbide (B4C) in AMCs. The mechanical properties of
the AMCs were enriched by either extrusion process or thermal treatment. Hybrid composites exhibited better
characteristics than mono composites. Surface composites manufactured by incorporation of reinforcement in
the surface layer; offer good surface properties without losing toughness and ductility. The B4C-Al interfacial
reactions produce different precipitates in AMCs and damaged the composite's age-hardening ability. B4C
reinforced friction stir processed surface composites exhibits refined structure and better properties compared to
the aluminum matrix. The strength, hardness, and wear resistance of AMCs increased with rising fraction and
reducing the size of B4C up to a certain level. Wear rate increases with rising applied load, sliding time and
speed. A review of effect of B4C reinforcement on different properties of mono and hybrid AMCs with
summarized results attained and concluded by different investigators is presented in this paper to help
researchers in the field. At the end of this paper a position given to conclusions and future directions.

Keyword : Aluminum matrix, B4C, composites, reinforcement.


References:
1. Idusuyi N, Olayinka JI. Dry sliding wear characteristics of aluminium metal matrix composites: a brief overview. Journal of Materials
Research and Technology. 2019.
2. Miracle D. Metal matrix composites–from science to technological significance. Composites science and technology. 2005;65(15-
16):2526-40.
3. Chen H, Wang W, Li YL, Zhang P, Nie H, Wu Q. The design, microstructure and tensile properties of B4C particulate reinforced
6061Al neutron absorber composites. Journal of Alloys and Compounds. 2015;632:23-9.
4. Chen H, Wang W, Nie H, Zhou J, Li Y, Liu R, et al. Microstructure evolution and mechanical properties of B4C/6061Al neutron
absorber composite sheets fabricated by powder metallurgy. Journal of Alloys and Compounds. 2018;730:342-51.
5. Kannan C, Ramanujam R. Comparative study on the mechanical and microstructural characterisation of AA 7075 nano and hybrid
nanocomposites produced by stir and squeeze casting. Journal of advanced research. 2017;8(4):309-19.
6. Sharma VK, Kumar V, Joshi RS. Experimental investigation on effect of RE oxides addition on tribological and mechanical properties
of Al-6063 based hybrid composites. Materials Research Express. 2019.
7. Padmavathi K, Ramakrishnan R. Tribological behaviour of aluminium hybrid metal matrix composite. Procedia Engineering.
2014;97:660-7.
8. Rana H, Badheka V, Kumar A, Satyaprasad A. Strategical parametric investigation on manufacturing of Al–Mg–Zn–Cu alloy surface
composites using FSP. Materials and Manufacturing Processes. 2018;33(5):534-45.
9. Mishra RS, Ma Z. Friction stir welding and processing. Materials science and engineering: R: reports. 2005;50(1-2):1-78.
10. Shorowordi KM, Laoui T, Haseeb A, Celis J-P, Froyen L. Microstructure and interface characteristics of B4C, SiC and Al2O3
reinforced Al matrix composites: a comparative study. Journal of Materials Processing Technology. 2003;142(3):738-43.
11. Toptan F, Kilicarslan A, Karaaslan A, Cigdem M, Kerti I. Processing and microstructural characterisation of AA 1070 and AA 60 63
matrix B4Cp reinforced composites. Materials & Design. 2010;31:S87-S91.
12. Ramesh M, Ravichandran M. Investigation on Mechanical Properties and Wear Behaviour of Titanium Diboride Reinforced
Composites. FME Transactions. 2019;47:873-9.
13. Auradi V, Rajesh G, Kori S. Preparation, Characterization and Evaluation of Mechanical Properties of 6061Al-Reinforced B4C
Particulate Composites via Two-Stage Melt Stirring. Materials and Manufacturing Processes. 2014;29:194–200.
14. Uthayakumar M, Aravindan S, Rajkumar K. Wear performance of Al–SiC–B4C hybrid composites under dry sliding conditions.
Materials & Design. 2013;47:456-64.
15. Poovazhagan L, Kalaichelvan K, Sornakumar T. Processing and performance characteristics of aluminum-nano boron carbide metal
matrix nanocomposites. Materials and Manufacturing Processes. 2016;31(10):1275-85.
16. Amirkhanlou S, Niroumand B. Synthesis and characterization of 356-SiCp composites by stir casting and compocasting methods.
Transactions of nonferrous metals society of china. 2010;20:s788-s93.
17. Aussavy D, Costil S, El Kedim O, Montavon G, Bonnot A-F. Metal matrix composite coatings manufactured by thermal spraying:
Influence of the powder preparation on the coating properties. Journal of Thermal Spray Technology. 2014;23(1-2):190-6.
18. Lai S-W, Chung D. Consumption of SiC whiskers by the Al–SiC reaction in aluminium-matrix SiC whisker composites. Journal of
Materials Chemistry. 1996;6(3):469-77.
19. Al-Aqeeli N, Mohammad K, Laoui T, Saheb N. The effect of variable binder content and sintering temperature on the mechanical
properties of WC–Co–VC/Cr3C2 nanocomposites. Materials and Manufacturing Processes. 2015;30(3):327-34.
20. 20. Azam MU, Ahmed BA, Hakeem AS, Irshad HM, Laoui T, Ehsan MA, et al. Tribological behaviour of alumina-based
nanocomposites reinforced with uncoated and Ni-coated cubic boron nitride. Journal of Materials Research and Technology. 2019:14.
21. Gyansah L, Tariq N, Tang J, Qiu X, Feng B, Huang J, et al. Cold spraying SiC/Al metal matrix composites: effects of SiC conte nts and
heat treatment on microstructure, thermophysical and flexural properties. Materials Research Express. 2018;5(2):026523.
22. Pantelis D, Tissandier A, Manolatos P, Ponthiaux P. Formation of wear resistant Al–SiC surface composite by laser melt–particle
injection process. Materials science and technology. 1995;11(3):299-303.
23. Sharma DK, Patel V, Badheka V, Mehta K, Upadhyay G. Fabrication of hybrid surface composites AA6061/(B4C+ MoS2) via friction
stir processing. Journal of Tribology. 2019;141(5):052201.
24. Selvam JDR, Dinaharan I, Philip SV, Mashinini P. Microstructure and mechanical characterization of in situ synthesized
AA6061/(TiB2+ Al2O3) hybrid aluminum matrix composites. Journal of Alloys and Compounds. 2018;740:529-35.
25. David Raja Selvam J, Dinaharan I, Rai RS, Mashinini P. Role of zirconium diboride particles on microstructure and wear behaviour of
AA7075 in situ aluminium matrix composites at elevated temperature. Tribology-Materials, Surfaces & Interfaces. 2019:1-9.
26. Ubaid F, Matli P, Shakoor R, Parande G, Manakari V, Mohamed A, et al. Using B4C nanoparticles to enhance thermal and mechanical
response of aluminum. Materials. 2017;10(6):621.
27. Gao M, Kang H, Chen Z, Guo E, Peng P, Wang T. Effect of reinforcement content and aging treatment on microstructure and
mechanical behavior of B4Cp/6061Al composites. Materials Science and Engineering: A. 2019;744:682-90.
28. Singh R, Shadab M, Dash A, Rai R. Characterization of dry sliding wear mechanisms of AA5083/B 4 C metal matrix composite.
Journal of the Brazilian Society of Mechanical Sciences and Engineering. 2019;41(2):98.
29. Wu C, Ma K, Wu J, Fang P, Luo G, Chen F, et al. Influence of particle size and spatial distribution of B4C reinforcement on the
microstructure and mechanical behavior of precipitation strengthened Al alloy matrix composites. Materials Science and Engineering:
A. 2016;675:421-30.
30. Chen H-s, Wang W-x, Nie H-h, Zhou J, Li Y-l, Zhang P. Microstructure and mechanical properties of B4C/6061Al laminar composites
fabricated by power metallurgy. Vacuum. 2017;143:363-70.
31. Dou Y, Liu Y, Liu Y, Xiong Z, Xia Q. Friction and wear behaviors of B4C/6061Al composite. Materials & Design. 2014;60:669-77.
32. Zhou Y, Zan Y, Zheng S, Wang Q, Xiao B, Ma X, et al. Distribution of the microalloying element Cu in B4C-reinforced 6061Al
composites. Journal of Alloys and Compounds. 2017;728:112-7.
33. Li Y, Wang Q, Wang W, Xiao B, Ma Z. Interfacial reaction mechanism between matrix and reinforcement in B4C/6061Al composites.
Materials Chemistry and Physics. 2015;154:107-17.
34. Zan Y, Zhang Q, Zhou Y, Wang Q, Xiao B, Ma Z. Enhancing high-temperature strength of B4C–6061Al neutron absorber material by
in-situ Mg (Al) B2. Journal of Nuclear Materials. 2019:151788.
35. Yuvaraj N, Aravindan S. Fabrication of Al5083/B4C surface composite by friction stir processing and its tribological cha racterization.
Journal of materials research and technology. 2015;4(4):398-410.
36. Tonelli L, Morri A, Toschi S, Shaaban M, Ammar H, Ahmed M, et al. Effect of FSP parameters and tool geometry on microstructure,
hardness, and wear properties of AA7075 with and without reinforcing B 4 C ceramic particles. The International Journal of Advanced
Manufacturing Technology. 2019;102(9-12):3945-61.
37. Thirumalai Kumaran S, Uthayakumar M, Aravindan S. Analysis of dry sliding friction and wear behaviour of AA6351 –SiC–B4C
composites using grey relational analysis. Tribology-Materials, Surfaces & Interfaces. 2014;8(4):187-93.
38. Thirumalai Kumaran S, Uthayakumar M, Aravindan S, Rajesh S. Dry sliding wear behavior of SiC and B4C-reinforced AA6351 metal
matrix composite produced by stir casting process. Proceedings of the Institution of Mechanical Engineers, Part L: Journal of
Materials: Design and Applications. 2016;230(2):484-91.
39. Baradeswaran A, Vettivel S, Perumal AE, Selvakumar N, Issac RF. Experimental investigation on mechanical behaviour,
modelling and optimization of wear parameters of B4C and graphite reinforced aluminium hybrid composites. Materials & Design.
2014;63:620-32.
40. 40. Das S, Chandrasekaran M, Samanta S, Kayaroganam P, Davim P. Fabrication and tribological study of AA6061 hybrid metal
matrix composites reinforced with SiC/B4C nanoparticles. Industrial Lubrication and Tribology. 2019.
41. Hariprasad T, Varatharajan K, Ravi S. Wear characteristics of B4C and Al2O3 reinforced with Al 5083 metal matrix based hybrid
composite. Procedia Engineering. 2014;97:925-9.
42. Kumar NS, Shankar GS, Basavarajappa S, Suresh R. Some studies on mechanical and machining characteristics of Al2219/n -
B4C/MoS2 nano-hybrid metal matrix composites. Measurement. 2017;107:1-11.
43. Yuvaraj N, Aravindan S. Wear characteristics of Al5083 surface hybrid nano-composites by friction stir processing. Transactions of
the Indian Institute of Metals. 2017;70(4):1111-29.
44. Pol N, Verma G, Pandey R, Shanmugasundaram T. Fabrication of AA7005/TiB2-B4C surface composite by friction stir
processing: Evaluation of ballistic behaviour. Defence Technology. 2019;15(3):363-8.
45. Patle H, Mahendiran P, Sunil BR, Dumpala R. Hardness and sliding wear characteristics of AA7075-T6 surface composites reinforced
with B4C and MoS2 particles. Materials Research Express. 2019;6(8):086589.

Authors: CMAK Zeelan Basha, Chandra Sekhar Maganty, G Deva Raju, Y Divya, Y Spoorthy

Paper Title: Improved Method for Computerized Leave Supervision


Abstract: This project is aimed at developing an online leave management system which is important for
any organization. Employee (Faculty) Portal is an interface used to associate with the employee in an
organization. The application permits the enrolled user to login and a new user is allowed to enroll.[1] This
system can be used to automate the flow of work for leave applications and their approvals. The periodic
crediting of leave is also automated. There are several features like email notifications, automatic approval of
leave, report generators, etc. in this system. Leave Management application will reduce paperwork and maintains
a record more efficiently.

Keyword : : Employee (faculty), Leave, Adjustment, Approved, Rejected.


References:
1. J.selvakumar,A.Lakshmi,T.Arivoli. IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -
385. 2012) March 30, 31, 2012 .“Brain Tumor Segmentation and Its Area Calculation in Brain MR Images using K-Mean Clustering and
Fuzzy C-Mean Algorithm”
2. Vinay Parameshwarappa, Nandish S (2014) “A Segmented 2204-
3. Morphological Approach to Detect Tumour in Brain Images“ International Journal of Advanced Research in Computer Science and 2207
Software Engineering.vol 4.
4. Jay Patel and Kaushal Doshi. Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 3 (2014),“A Study
of Segmentation Methods for Detection of Tumor in Brain MRI”.
5. Vishal B. Padole, D. S. Chaudhari, International Journal of Electronics, Communication & Soft Computing Science and Engineering
(IJECSCSE) Volume 1, “A Review of Segmentation Methods for Detection of Brain Tumor in MRI”.
6. Sudipta Roy,Sanjay Nag,Indra Kanta Maitra, International Journal of Electronics, Communication & Soft Computing Science and
Engineering (IJECSCSE) Volume 3, Issue 6.
7. Rohan Kandwal, Ashok Kumar( 2014) “An Automated System for Brain Tumor Detection and Segmentation”
8. Jobin Christ M.C. 1, Dr. Parvathi R.M.S. IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, July 2012”Brain
Tumors: An Engineering Perspective”.
9. C M A K. Zeelan Basha, Maruthi Padmaja, and G.N.Balaji,“Computer Aided Fracture Detection System” Journal of Medical Imaging
and Health Informatics Vol. 8, 526–531, 2018.
10. Azmira Krishna, CMAK Zeelan Basha, Pradeep Raj Savarapu, Soumya Ranjan Nayak, S. Sivakumar ” Multi Target Tracking Access
with Data Association in Distributed Camera Networks”, International Journal of Recent Technology and Engineering
(IJRTE),vol.8,412-417.
11. Cmak Zeelan basha, Azmira Krishna, Pradeep Raj Savarapu “Automatic Detection of Lung Infection”, International Journal of Recent
Technology and Engineering (IJRTE), Volume-8,200-203.

Authors: Badal Soni, Anji Reddy. V, Naresh Babu Muppalaneni, Candy Lalrempuii

Paper Title: Image Forgery Detection using AKAZE Keypoint Feature Extraction and Trie Matching
Abstract: Image Forgery is an illegal activity in the society as per cyber laws. There are various types of
forgeries in which forgery on images is considered as an illegal activity. Image forgery may take place in
different ways. One way for doing forgery on images is copy and move forgery which may result in loss of
image integrity or authenticity. There are number of popular detection techniques exist such as SIFT, SURF etc.,
386. but have high complexity in detection of forgery. Here we have proposed a method to detect the forgery on
images which results in loss of integrity or authenticity. In our proposed method we have used descriptor 2208-
matching using Trie Data Structure The descriptor matching method of implementation using Trie data structure 2213
made the complexity of the problem to reduce to O (n log n). Using Key points approach we can verify the
integrity of the image. Extracting the features with key points approach is computational expensive task. But
there is KAZE method which overcomes this situation. KAZE’s method of using non-linear diffusion filtering
requires it to solve a series of PDEs. This cannot be done analytically forcing KAZE to use a numerical method
called an AOS scheme to solve the PDEs. However, this process is computationally costly and therefore an
accelerated version of KAZE was created. The Accelerated KAZE or AKAZE which creates non-linear scale
space through Fast Explicit Diffusion for reduce the complexity in extracting the features.

Keyword : KAZE, AKAZE, SIFT, SURF, FED


References:
1. A. C. Popescu and H. Farid,Exposing digital forgeries by detecting duplicated imageregions. 2004.
2. J. Friedrich, B. D. Soukal, and A. J. Lukas,Detection of copy-move forgery indigital images. 2003.
3. S. Kumar, J. V. Desai, and S. Mukherjee,Copy Move Forgery Detection in ContrastVariant Environment using Binary DCT Vectors.
2015.
4. Y. Cao, T. Gao, L. Fan, and Q. Yang, “A robust detection algorithm for copy -move forgery in digital images,”Forensic
science international, vol. 214, no. 1-3,pp. 33–43, 2012.
5. E. Mohebbian and M. Hariri, “Increase the efficiency of dct method for detection ofcopy-move forgery in complex and smooth
images,” inKnowledge-Based Engineer-ing and Innovation (KBEI), 2015 2nd International Conference on, pp. 436–440,IEEE, 2015.
6. D. G. Lowe,Detection of copy-move forgery in digital images. 2004.
7. X. Leng and J. Yang, “Research on improved sift algorithm,”Journal of Chemicaland Pharmaceutical Research, vol. 6, no. 7, pp. 2589–
2595, 2014.
8. L. G. Xu Bo, Wang Junwen and D. Yuewei,Detection of copy-move forgery indigital images. 2010.
9. C. S. M. Calonder, V. Lepetit and P. Fua,BRIEF: binary robust independentelementary features. 2010 and P. Fua,BRIE F: binary
robust independentelementary features. 2010.
10. Soni, Badal, Pradip K. Das, and Dalton Meitei Thounaojam, "CMFD: a detailed review of block based and key feature based
techniques in image copy-move forgery detection" IET Image Processing 12.2 (2017): 167-178.
11. Soni, Badal, Pradip K. Das, and Dalton Meitei Thounaojam, "Blur invariant block based copy-move forgery detection technique using
FWHT features" Proceedings of the International Conference on Watermarking and Image Processing. ACM, 2017.
12. Soni, Badal, Pradip K. Das, and Dalton Meitei Thounaojam, "Copy-move tampering detection based on local binary pattern histogram
fourier features" Proceedings of the 7th International Conference on Computer and Communication Technology. ACM, 2017.

Authors: Bambang Leo Handoko, Kevin Deniswara, Christy Nathania

Paper Title: Effect of Profitability, Leverage, Audit Opinion and Firm Reputation toward Audit Report Lag
Abstract: audit report lag has become a phenomenon that cannot be denied is one of the problems that is
quite disturbing. Audit report lag is detrimental to users of financial statements. Users of financial statements
take longer to receive financial statements, even though they want to use the financial statements as a decision-
making tool. This study aims to provide empirical evidence of the influence of profitability, leverage, audit
opinion, and reputation of public accounting firms on audit delay in listed manufacturing companies in the
Indonesia Stock Exchange. This research is quantitative, using secondary data. The population of this study is
the food and beverage sub-sector manufacturing companies listed on the Indonesia Stock Exchange in 2014-
2017. The testing of the hypothesis used in this study is multiple linear regression analysis. After passing the
data processing process that is processed in SPSS, the results of the study show that leverage affects audit delay,
while profitability, audit opinion, and the reputation of public accounting firms do not significantly influence
audit delay. In this study, the authors did not test together the effect of all variables on audit delay.

Keyword : audit delay, profitability, leverage, audit opinion, reputation of firm


References:
1. [B. L. Handoko and R. Widuri, “The impact of auditor communication and due professional care on client responses to inquiries for
successful audit process,” in Proceedings of 2016 International Conference on Information Management and Technology, ICIMTech
2016, 2017.
2. R. Widuri, B. L. Handoko, and I. C. Prabowo, “Adoption of Information Technology in Public Accounting Firm,” 2019.
387. 3. D. T. H. Manurung and A. L. Hardika, “Analysis of Factors that Influence Financial Statement Fraud in the Perspective Fraud
Diamond: Empirical study on Banking Companies Listed on The Indonesia Stock Exchange year 2012 to 2014,” Int. Conf. Account.
Stud., no. August, 2015. 2214-
4. H. Li, J. Dai, T. Gershberg, and M. A. Vasarhelyi, “Understanding usage and value of audit analytics for internal auditors: An 2219
organizational approach,” Int. J. Account. Inf. Syst., vol. 28, no. November 2017, pp. 59–76, 2018.
5. H. A. Skaife and D. D. Wangerin, “Target financial reporting quality and M&A deals that go bust*,” Contemp. Account. Res., 2013.
6. M.-I. R. Mousa Jaradat and M. S. Al Rababaa, “Assessing Key Factor that Influence on the Acceptance of Mobile Commerce Based on
Modified UTAUT,” Int. J. Bus. Manag., vol. 8, no. 23, pp. 102–112, 2013.
7. K. Hanafi and A. Usman, “Company Size , Profitability , and Auditor Opinion Influence to Audit Report Lag on Registered
Manufacturing Company in Indonesia Stock Exchange,” pp. 353–367, 2017.
8. S. L. Indarto and I. Ghozali, “Fraud Diamond: Detection Analysis on the Fraudulent Financial Reporting,” Risk Gov. Control Financ.
Mark. Institutions, vol. 6, no. 4, pp. 116–123, 2016.
9. Rusmin and J. Evans, “Audit quality and audit report lag: Case of Indonesian listed companies,” Asian Rev. Account., vol. 25, no. 2,
pp. 1–30, 2017.
10. A. T. A. Nasser, E. A. Wahid, S. N. F. S. M. Nazri, and M. Hudaib, “Auditor-client relationship : the case of audit tenure and auditor
switching in Malaysia,” Manag. Audit. J., 2006.
11. D. Avramov, T. Chordia, G. Jostova, and A. Philipov, “Anomalies and financial distress,” J. financ. econ., 2013.
12. M. Mckinnie, “Cloud Computing: TOE Adoption Factors By Service Model In Manufacturing,” p. 131, 2016.
13. H. Rusman, “The Effect of Audit Accountability and Audit Quality on Audit Opinion,” no. 97, 2018.
14. H. Kim, H. Lee, and J. E. Lee, “Mandatory audit firm rotation and audit quality,” J. Appl. Bus. Res., 2015.
15. M. L. Defond and C. S. Lennox, “Do PCAOB Inspections Improve the Quality of Internal Control Audits?,” J. Account. Res., vol. 55,
no. 3, pp. 591–627, 2017.
16. D. M. Mohamed and M. H. Habib, “Auditor independence, audit quality and the mandatory auditor rotation in Egypt,” Educ. Bus. Soc.
Contemp. Middle East. Issues, 2013.
17. J. Peterson, “Auditor Independence,” Bus. Prof. Ethics J., 2018.
18. U. Sekaran and R. Bougie, “Research Methods For Business. A Skill Builing Approch. 7th Edition,” Book, 2016.
19. Sugiyono, Metode Education Research. Approach Quantitative, Qualitative, and R & D. Bandung: Alfabeta, 2011.
20. M. Krzywinski and N. Altman, “Multiple linear regression,” Nat. Publ. Gr., vol. 12, no. 12, pp. 1103–1104, 2015.
21. Y. M. Hassan, “Determinants of audit report lag: evidence from Palestine,” J. Account. Emerg. Econ., vol. 6, no. 1, pp. 13–32, 2016.
I. Lawrence, A. Ph, and A. Elijah, “Corporate Attributes and Audit Delay in Emerging Markets : Empirical Evidence from
Nigeria,” Int. J. Bus. Soc. Res., vol. 05, no. 03, pp. 1–10, 2015.

Authors: Rispiningtati, Rudy Soenoko

Paper Title: Multi Reservoir Water Price and Allocation Model


Abstract: Many water planning, researches have been done but water pricing has not been considered as
the prime factor. Cost allocation is required whenever a project deals with multi-purpose groups. An
optimization model which is accommodating the water allocation and water price must be developed in
Indonesia. The new linear optimization model is developed to present a method for the determination of
equitable impact fees and optimal water allocation for single reservoir. The proposed method is demonstrated on
a river system with 4 major reservoirs. Each reservoir system serves 5 uses (irrigation, hydroelectric and flood
control, industrial and domestic need). Using optimization with the cost of the reservoir and its facilities as
targets and the objective function is maximization of total net benefit of user income, water allocation as x
variable and water price as the y variable will produce the optimal result. The result is the optimal water
allocation with a minimal water price which is present on 3 simulation analysis. The result of the model is in a
graphic and table presentation, which can be used easily to determine the water allocation and water price per
m3 in all reservoir systems.

Keyword : Allocation, Model, Optimization, Water Price.


References:
1. H. Cooley, N. Ajami, M. L. Ha, V. Srinivasan, J. Morrison, K. Donnelly, and J. C. Smith, “Global water governance in the twenty-first
century. The World’s Water Volume 8. 2013.
2. J. J. Pigram, “Economic instrument in the management of australia’s water resources: A Critical View. International Journal of Water
Resources Development. vol. 15 Issue 4, 2010, pp. 493-509; Published online: 21 Jul 2010.
3. D. Mc. Neill, “Water as an economic good”. Water Resources Update USA. 2000
4. J. A. Beecher, “Sustainable Water Pricing”, Water Resources Update 114: pp. 26-33. 1999.
5. D. Zaccaria, R. Maia, E. Vivas, M. Todorovic, A. Scardigno, “ Improving water-efficient irrigation: Prospects and difficulties of
innovative practices”, Agricultural Water Management 146 (2014), pp. 84–94.
6. DWR. Utah , “ The cost of water in Utah-Why are our water costs so low?“, Prepared by Utah Division of Water Resources, Salt Lake
City, Utah 84114-6201, October 27, 2010.
7. EUWI, “Pricing water resources to finance their sustainable management”, A think-piece for the EUWI Finance Working Group. May
2012.
8. J. A. Beecher, “ Primer on water pricing”, Michigan State University; Institute of Public Utilities Regulatory Research and Education;
November 1, 2011; ipu.msu.edu.
9. US, EPA. Planning for sustainability. A Handbook for Water and Wastewater Utilities, Prepared by Ross & Associates Environmental
Consulting, Ltd. 1218 3 rd Avenue, Suite 1207, Seattle, WA 98101 (206) pp. 447-1805, February 2012, EPA-832-R-12-001.
388. 10. J.W. Labadie, Reservoir system optimization models. Water Resources Update, 2001, USA.108: pp. 83-110
11. M. L. Kansal and G. Arora, “Explore hybrid expert system for water network management”, American Society of Civil Engineers, 2220-
ISSN (print): 0733-9496; ISSN (online): 1943-5452. 2001.
12. C. Leon, (2000). “Explore-hybrid expert system for water network management”, Journal of Water Resources Planning and
2227
Management, 126(2): 2000, pp. 65-75.
13. Rispiningtati, R. Soenoko, “Regulation of Sutami Reservoir to have a Maximal Electrical Energy”, International Journal of Applied
Engineering Research. 10(12), 2015, pp. 31641-31648
14. P. D. Jankar, S. S. Kulkarni, “A case study of watershed management for Madgyal Village”, International Journal of Advanced
Engineering Research and Studies, E-ISSN2249–8974, Int. J. Adv. Eng. Res. Studies/II/IV/July-Sept. 2013/69-72.
15. B. Sarah, The role of water pricing and water allocation in agriculture in delivering sustainable water use in Europe. Final Report,
European Commission, Project number 11589, February 2012.
16. UNEP, Integrated water resources management planning approach for small island developing states. UNEP, 130 + xii, 2012.
17. L. A. M. John, The opportunity of crisis: A water reform agenda October 2012. The Australian Water Project, Volume 2. 2012.
18. F. Panahi, I. Malekmohammadim, M. Chizari, Jamal, M.V. Samani, “The role of optimizing agricultural water resource management to
livelihood poverty abolition in rural Iran”, Australian Journal of Basic and Applied Sciences, 2009, 3(4): 3841-3849, ISSN 1991-8178.
19. U. K. Shanwad, V.C. Patil, H. H. Gowda, G. S. Dasog and K.C. Shashidhar, “Generation of water resources action plan for Medak
Nala watershed in India using remote sensing and GIS technologies”, Australian Journal of Basic and Applied Sciences, 5(11): 2209-
2218, 2011, ISSN 1991-8178.
20. P. H. Gleick, Water planning and management under climate change. The World’s Water, 2000, 112: pp. 25-32.
21. M. A. S. Tabieh, J. Suliman, A. Al-Horani, “Pricing mechanism as a tool for water policy using a Linear Programming Model”.
Australian Journal of Basic and Applied Sciences, 4(8): 3159-3173, 2010 ISSN 1991-8178.
22. S. P. Saravanan, and R. Gobinath, “Drinking water safety through bio sand filter - A case study of Kovilambakkam Village, Chennai”,
International Journal of Applied Engineering Research, ISSN 0973-4562 Vol. 10 No.53 (2015).
23. D. K. Nagesh, “Optimal reservoir operation for Irrigation of multiple crops using genetic algorithms”, Journal of Irrigation and
Drainage Engineering © ASCE / March/April 2006 / 123.
24. M. J. Brown, Priority based reservoir optimization using Linear Programming: Application to the flood operation of the Iowa/Des
Moines River System. B.S. (The Pennsylvania State University) 1995 Thesis Submitted in partial satisfaction of the requirements for
the degree of Master of Science in Civil and Environmental Engineering; Committee in Charge 2005.
25. H. A. Taha, Operation Research. Second Edition. Department of Industrial Engineering of University of Arkansas. USA. 1996.
26. Rispiningtati, R. Soenoko, “Optimization Operation of jo Reservoir to Maximize Irrigation Allocation”, International Journal of
Applied Engineering Research. 10(13),2015, pp. 33197-33201.
27. L. Lasdon, Microsoft Excel Solver uses the Generalized Reduced Gradient Non linear Optimization. University of Texas Austin
Cleveland State University. 1998.
28. T. D. Tilahun Derib Asfaw, A. M. Hashim, “Reservoir Operation Analysis Aimed to Optimize the Capacity Factor of Hydroelectric
Power Generation”, 2011 International Conference on Environment and Industrial Innovation; IPCBEE vol.12 (2011) © (2011)
IACSIT Press, Singapore
29. I. Lippai, “Efficient and Equitable Impact Fees for Urban Water System”. Journal Of Water Resources Planning and Management,
2000. 126(2): pp. 75-84.
30. Mac. Donald, A. “Water Resources in Twenty First Century, A Global Challenge”. Journal of Comission Water Engineering
Management, 2001, 15: pp. 157-161.
31. D. Mc. Neill, Water as an Economic Good. Water Resources Update USA. 2000.
Authors: Deepika Jain, Bikram Pal Kaur, Ruchi Pasricha

Paper Title: Design of Microcontroller Based Cost Effective Portable Detection Circuit for Pesticide Recognition
Abstract: Excessive use of pesticides for better agricultural productivity poses serious threats to human
health. Depending upon the duration and dose of exposure, deleterious effects may be intense or moderate,
which may be one of the root causes of several diseases such as diabetes, asthma, cancer, cardiac attack, fertility
defects etc. Inhibition of an acetylcholinesterase enzyme activity is commonly associated with pesticide
exposure and as a result acetylcholine levels are elevated in blood of an exposed person. Common tools for
detection of pesticide exposure measure an enzyme activity for acetylcholinesterase (ACHE), an important
enzyme that regulates the neuro transmission functions in the human body. Proposed work includes an electronic
design and simulation of microcontroller based portable detection circuit using electrochemical amperometric
instrumentation for measurement of an acetylcholinesterase concentration in human blood. Handheld detection
circuit consists of AT89C51 microcontroller, Analog to digital converter ADC0804 and Liquid Crystal Display
Module LM016L.To program the microcontroller, Embedded C is used, due to their inherent characteristics of
adaptability and portability across a wide assortment of hardware platforms. The developed detection circuit for
biomonitoring of pesticides is cheap, flexible and covers wide range as compared to commercially available
ones.

Keyword : Amperometric, Analog to digital converter, Biosensor, Liquid Crystal Display, Pesticides.
References:
1. Hayo M.G.van der Werf, “Assessing the impacts of pesticides on the environment”, Agr. Ecosyst. Environ., vol. 60, no. (2-3), 1996,
pp. 81-96.
2. Md.W. Akhtar, D. Sengupta and A. Chowdhury, “Impact of pesticides use in agriculture: their benefits and hazards”, Interdiscip.
Toxicol., vol. 2, Issue 1, 2009, pp.1-12.
3. E. Selcen Darcin and Murat Darcin, “Health effects of agricultural pesticides”, Biomed Res-2017 Complex World of Neuroscience.
389. 4. V. Dhananjayan and B. Ravichandran, “Occupational health risk of farmers exposed to pesticides in agricultural activities”, Current
Opinion in Environmental Science & Health, vol. 4, 2018, pp.31-37.
5. A. Samsidar, S. Siddiquee and S. Md. Shaarani, “A review of extraction, analytical and advanced methods for determination of
2228-
pesticides in environment and foodstuffs”, Trends Food Sci. Technol., vol. 71, 2018, pp.188–201. 2232
6. R. Monosik, M. Stredansky and E. Sturdik, “Biosensors - classification, characterization and new trends”, Acta Chimica Slovaca, vol.
5, no. 1, 2012, pp. 109-120.
7. F. Faridbod, V.K. Gupta and H.A. Zamani, “Electrochemical Sensors and Biosensors”, Int. J. Electrochem., vol. 2011, 2011.
8. Niina J. Ronkainen, H. Brain Halsall and William R. Heineman, Electrochemical Biosensors, Chem. Soc. Rev., vol. 39, Issue 5, 2010,
pp. 1747-1763.
9. C. Ionescu, P. Svasta, C. Tamaş, C. Bala and L. Rotariu, “Portable measuring and display unit for Electrochemical Sensors, In : 2010
16th International Symposium for Design and Technology in Electronic Packaging (SIITME), IEEE, 2010, pp. 215-218.
10. Mirjana B Colovic, Danijela Z Krstic, Tamara D Lazarevic-Pasti, Aleksandra M Bondzic and Vesna M Vasic, “Acetylcholinesterase
Inhibitors: Pharmacology and Toxicology”, Curr Neuropharmacol, vol. 11, Issue 3, 2013, pp. 315-335.
11. S. Stepankova and K. Vorcakova, “Cholinesterase based biosensors”, J. Enzym. Inhib. Med. Che., vol. 31, 2016, pp. 180-193.
12. X. Sun and X. Wang, “Organophosphorus pesticides detection system based on amperometric enzyme biosensor”, In: 2nd Internatio nal
conference on Information Science and Engineering (ICISE), 2010, pp. 391-394.
13. D. Semenova, A. Zubov, Yuliya E. Silina, L. Micheli, M. Koch, Ana C. Fernandes and Krist V. Gernaey, “ Mechanistic modeling o f
cyclic voltammetry: A helpful tool for understanding biosensor principles and supporting design optimization”, Sens. Actuators B
Chem., vol. 259, 2018, pp. 945-955.
14. Binu B. Narakathua, W. Guob, Sherine O. Obareb and M. Atashbar, “Novel approach for detection of toxic organophosphorus
compounds”, Sens. Actuators B Chem., vol. 158, Issue 1, 2011, pp. 69-74.
15. A. Chen, D. Du, and Y. Lin, “Highly sensitive and selective immuno-capture/electrochemical assay of acetylcholinesterase activity in
red blood cells: a biomarker of exposure to organophosphorus pesticides and nerve agents”, Environ. Sci. Technol, vol. 46, 2012,
pp.1828-1833.
16. V. Perumal and U. Hashim, “Advances in biosensors: principle, architecture and applications”, J. Appl. Biomed., vol. 12, no.1 , 2014,
pp.1-15.
17. S.P. Mohanty and E. Kougianos, “Biosensors-a tutorial review”,
18. IEEE Potentials, vol. 25, Issue 2, 2006, pp. 35-40.
19. Kenneth J. Ayala, The 8051 Microcontroller, CENGAGE Learning, third ed., 2004.
http//www.keil.com/dd/docs/datashts/atmel///at89c51_ds.pdf.
20. Muhammad Ali Mazidi and Janice Gillispie Mazidi, The 8051 Microcontroller and Embedded Systems, Pearson education, Prentice
Hall, 1999.
21. E. Balguruswamy, Programming in ANSI C, TATA McGraw-Hill Education, 7th ed., 2017

Authors: Kung-Teck, Wong; Kuan Nien Tan, Chia Ying Lin


Innovative Improvised Low-Cost Wiimote Interactive Whiteboard (IW-IWB) Learning Tool For
Paper Title:
Teaching Chinese As A Second Language (TCSL)
Abstract: The aim of this study is to understand the effectiveness of Improvised Low-cost Wiimote
Interactive Whiteboards (Iw-IWB) as educational technology learning tool for Teaching Chinese as Second
Language (TCSL) for lower primary pupils in government schools in Malaysia settings. This study are to design
390. and develop an improvised Wiimote IWBs and to identify how far the new innovation leaning tool, the
improvised version of interactive whiteboards, could improve pupils’ achievement and their learning motivation
2233-
in learning Chinese as a Second Language (TCSL). A total number of 46 lower primary pupils study in
2237
government schools have involved in this study. The participants were split into two groups (treatment and
control). The treatment group used the new developed improvised low-cost Wiimote interactive whiteboards
(IWBs) to teach and learn Chinese characters, while the control group used traditional pedagogy. In this study,
researchers have design and develop the improvised version of interactive whiteboard and thereafter using pre-
test and post-test to identify the effectiveness of the new developed learning tool to enhanced pupils achievement
and learning motivation in learning TCSL. The outcomes of the study showed that there has no difference in the
students’ achievement and level of motivation between the classes with and without the use of improvised low-
cost Wiimote IWB. However, the students’ achievement did show significant improvement before and after the
use of Wiimote interactive whiteboard. Implication, improvised low-cost Wiimote IWB is a low-cost alternative
which has potential to replace the expensive interactive whiteboard that many schools and teachers could not
afford.

Keyword : Improvised Low-cost Wiimote IWB, Educational Technology, Chinese Language, Motivation.
References:
1. Boyce, C. J., Mishra, C., Halverson, K. L., & Thomas, A. K. (2014). Getting students outside: Using technology as a way to stimulate
engagement. Journal of Science Education and Technology, 23(6), 815-826.
2. Dell, A. G., Newton, D. A., & Petroff, J. G. (2016). Assistive technology in the classroom: Enhancing the school experiences of
students with disabilities. Pearson.
3. Rosen, L., Carrier, L. M., & Cheever, N. A. (2010). Rewired. Understanding the i Generation an the Way They Learn, Nowy Jork.
4. Ting, K. Y. (2014). Multimodal Resources to Facilitate Language Learning for Students with Special Needs. International Education
Studies, 7(8), 85.
5. Eriksson, T., & Axelsson, M. (2014). Implementing interactive whiteboards into teaching practice at University of Gothenb urg.
6. Xu, H.L. and Moloney, R. (2011). Perceptions of interactive whiteboard pedagogy in the teaching of Chinese language. Australa sian
Journal of Educational Technology, 27(2), 307-325.
7. Levy, P. (2002). Interactive whiteboards in learning and teaching in two Sheffield schools: a developmental study. University of
Sheffield.
8. BECTA (British Educational Communications and Technology Agency). (2004). Getting the most from your interactive whiteboard: A
guide for primary schools. Coventry: BECTA.
9. Smith, S. M., & Chen, C. (2015). MSLQ: Instrument Validation of Motivation And Learning Strategies For Acquiring Computer
Software Application Skills. Issues in Information Systems, 16(3).
10. Al-Faki, I. M., & Khamis, A. H. A. (2014). Difficulties Facing Teachers in Using Interactive Whiteboards in Their Classes. American
International Journal of Social Science, 3(2), 136–158.
11. Blau, I. (2011). Teachers for" Smart Classrooms": The Extent of Implementation of an Interactive Whiteboard -based Professional
Development Program on Elementary Teachers' Instructional Practices. Interdisciplinary Journal Of E-Learning & Learning Objects, 7.
12. Türel, Y. K., & Johnson, T. E. (2012). Teachers' belief and use of interactive whiteboards for teaching and learning. Educational
Technology & Society, 15(1), 381-394.
13. Hennessy, S., Deaney, R., Ruthven, K. & Winterbottom, M. (2007). Pedagogical strategies for using the interactive whiteboard to
foster learner participation in school science. Learning, Media and Technology, 3(32), 283-301.
14. Pintrich, P. R., Smith, D. A., & McKeachie, W. J. (1989). A manual for the use of the motivated strategies for learning questionnaire
(MSLQ). Ann Arbor, Michigan: The University of Michigan, National Center for Research to Improve Postsecondary Teaching and
Learning.
15. Bybee, R. W., Taylor, J. A, Gardner, A., Van, P., Powell, J. C., Westbrook, A., Landes, N. (2006). The BSCS 5E Instructional Model:
Origins, Effectiveness, and Applications. Bscs, 1–19.
16. Eccles, J. S. (1983). Expectancies, values, and academic behaviors.
17. Schunk, D. H., Meece, J. R., & Pintrich, P. R. (2012). Motivation in education: Theory, research, and applications. Pearson Higher Ed.
18. Liebert, R. M., & Morris, L. W. (1967). Cognitive and emotional components of test anxiety: A distinction and some initial data.
Psychological reports, 20(3), 975-978.
19. Wong, K., Teo, T., Swee, P., & Goh, C. (2014). Development of the Interactive Whiteboard Acceptance Scale (IWBAS): An Initial
Study. Educational Technology & Society, 17(4), 268–277.
20. Wong, K.-T., Russo, S., & McDowall, J. (2013). Understanding early childhood student teachers’ acceptance and use of interactive
whiteboard. Campus-Wide Information Systems, 30(1), 4-16.
21. Wong, K. T., Teo, T., & Russo, S. (2013). Interactive Whiteboard Acceptance: Applicability of the UTAUT Model to Student
Teachers. Asia-Pacific Education Researcher, 22(1), 1-10.
22. Wong, K.T., Rosma Osman, Goh, S. C., Mohd Khairezan Rahmat. (2013). Understanding Student Teachers’ Behavioural Intention to
Use Technology: Technology Acceptance Model (TAM) Validation and Testing. International Journal of Instruction, 6(1), 90-102.

Authors: B. Venkateswarlu, K.Vaisakh


Adaptive Unified Differential Evolution Algorithm for Optimal Operation of Power Systems with
Paper Title:
Static Security, Transient Stability and SSSC Device
Abstract: The environmental degradation and increased power demand has forced modern power systems
to operate at the closest stability boundaries. Thereby, the power systems operations mainly focus for the
inclusion of transient stability constraints in an optimal power flow (OPF) problem. Algebraic and differential
equations are including in non-linear optimization problems formed by the transient stability constrained based
OPF problem (TSCOPF). Notably, for a small to large power systems solving these non-linear optimization
problems is a complex task. In order to achieve the increased power carrying capacity by a power line, the
Flexible AC transmission systems (FACTS) devices provides the best supported means a lot. As a result, even
under a network contingency condition, the security of the power system is also highly improved with FACTS
391. devices. The FACTS technology has the potential in controlling the routing of the line power flows and the
capability of interconnecting networks making the possibility of trading energy between distant agents. This 2238-
paper presents a new evolutionary algorithm for solving TSCOPF problems with a FACTS device namely 2253
adaptive unified differential evolution (AuDE). The large non-convex and nonlinear problems are solved for
achieving global optimal solutions using a new evolutionary algorithm called AuDE. Numerical tests on the
IEEE 30-bus 6-generator, and IEEE New England 10-generator, 39-bus system have shown the robustness and
effectiveness of the proposed AuDE approach for solving TSCOPF in the presence of a FACTS device such as
the SSSC device. Due to the page limitation only 30-bus results are presented.

Keyword : Adaptive unified differential evolution, power system transient stability, power system operation,
power system security, optimal power flow
References:
1. Carpentier J., “Optimal power flows”, Int J Electr Power Energy Syst ;1 (1):3–15, 1979.
2. Dommel HW, and Tinney WF., “Optimal power flow solutions”, IEEE Trans Power Apparat Syst PAS-87(10):1866–76,1968.
3. Xue Y, Pavella M., “Extended equal-area criterion: an analytical ultra-fast method for transient stability assessment and preventive
control of power systems”, Int J Electr Power Energy Syst 11(2):131–49,1989.
4. Alejandro Pizano-Martínez, Claudio R. Fuerte-Esquivel, and Daniel Ruiz-Vega, “Global transient stability-constrained optimal power
flow using an OMIB reference trajectory,” IEEE Trans. Power Syst, vol. 25, no. 1, pp.392-403, Feb. 2010.
5. Y. Sun, Y. Xinlin, and H. F. Wang, “Approach for optimal power flow with transient stability constraints,” Proc. Inst. Elect. Eng.,
Gen., Transm., Distrib., vol. 151, no. 1, pp. 8–18, Jan. 2004.
6. D. Ruiz-Vega and M. Pavella, “A comprehensive approach to transient stability control. I. Near optimal preventive control,” IEEE
Trans. Power Syst., vol. 18, no. 4, pp. 1446–1453, Nov. 2003.
7. K.karoui, L.platbrood, H. Crisciu, and R. A. Waltz, “new large-scale security constrained optimal power flow program using a new
interior point algorithm,” 5 th international conference, European electricity Market, pp.1-6, 28-30 May 2008.
8. A A. Fouad and T. Jianzhong, “Stability constrained optimal rescheduling of generation,” IEEE Trans. Power Syst., vol. 8, no. 1, pp.
105–112, Feb. 1993.
9. A. L. Bettiol, L. Wehenkel, and M. Pavella, “Transient stability-constrained maximum allowable transfer,” IEEE Trans. Power Syst.,
vol. 14, no. 2, pp. 654–659, May 1999.
10. Yan Sun and Thomas J. Overbye “Visualization for power system Contingency analysis data,” IEEE transactions on power systems,
Vol.19, No. 4, pp.1859-1866, November 2004.
11. Xia Y, Chan KW, Liu M., “Direct nonlinear primal-dual interior-point method for transient stability constrained optimal power flow,”
IEE Proc Gener Transm Distrib 152(1):11–6, 2005.
12. Jiang Q, Geng G., “A reduced-space interior point method for transient stability constrained optimal power flow,” IEEE Trans Power
Syst 25(3):1232–40, 2010.
13. Jiang Q, Huang Z., “An enhanced numerical discretization method for transient stability constrained optimal power flow,” IEEE Trans
Power Syst 25 (4):1790–7, 2010.
14. Pizano-Martinez A, Fuerte-Esquivel CR, Ruiz-Vega D., “A new practical approach to transient stability-constrained optimal power
flow,” IEEE Trans Power Syst 2011;26(3):1686–96, 2011.
15. Xu Y, Dong ZY, Meng K, et al., “A hybrid method for transient stability constrained optimal power flow computation ,” IEEE Trans
Power Syst 27 (4):1769–77, 2012.
16. Geng G, Jiang Q., “A two-level parallel decomposition approach for transient stability constrained optimal power flow,” IEEE Trans
Power Syst 27(4):2063–73, 2012.
17. Tangpatiphan K, Yokoyama A., “Adaptive evolutionary programming with neural network for transient stability constrained optim al
power flow,” Proc 15th int conf on intelligent system applications to power systems (ISAP ’09), Curitiba, November 8–12. p. 1–6, 2009.
18. Aparajita Mukherjee, Provas Kumar Roy, and V. Mukherjee, “Transient stability constrained optimal power flow using opposition al
krill herd algorithm”, Electrical Power and Energy Systems,83 283–297, (2016). .
19. Rautray SK, Choudhury S, Mishra S, et al., “A particle swarm optimization based approach for power system transient stability
enhancement with TCSC”, Procedia Technol 6:31–8,2012.
20. Joel R Sutter , John N Nderu and Christopher M Muriithi, “Power system oscillations damping and transient stability enhancement with
application of SSSC FACTS devices “, European Journal of Advances in Engineering and Technology, 2(11): 73-79, 2015..
21. Chan KY, Ling SH, Chan KW, Iu HHC, and Pong GTY., “Solving multi-contingency transient stability constrained optimal power
flow problems with an improved GA,” IEEE congress on evolutionary computation; p. 2901–8,2007.
22. Mo N, Zou ZY, Chan KW, and Pong TYG., “Transient stability constrained optimal power flow using particle swarm optimization,”
IET Proc Gener Transm Distrib 1(3):476–83,2007.
23. Cai HR, Chung CY, Wong KP. Application of differential evolution algorithm for transient stability constrained optimal power flow.
IEEE Trans Power Syst ;23(2):719–28, 2008.
24. Rainer Storn and Kenneth Price, “Differential evolution – a simple and efficient heuristic for global optimization over continuous
spaces,” Journal of Global Optimization 11: 341–359, 1997
25. J. Vesterstrom ; R. Thomsen, A comparative study of differential evolution, particle swarm optimization, and evolutionary algorithms
on numerical benchmark problems,” Proceedings of the Congress on Evolutionary Computation (IEEE Cat. No.04TH8753), 19-23 June
2004.
26. F. Neri and V. Tirronen, “Recent advances in differential evolution: a survey 285 and experimental analysis,” Artif. Intell. Rev. 33, p.
61, 2010.
27. K. Price and R. Storn, “Minimizeing the real functions of the ICEC’96 contest by differential evolution,” IEEE International
Conference on Evolutionary Computation, 1996, pp.842-844..
28. P. Kessel, and H. Glavitsch, “Estimating the voltage stability of a power system,” IEEE Transactions on Power Delivery PER-6(3):346
– 354, August 1986
29. N. Yorino, E. E. El-Araby, H. Sasaki, and S. Harada, “A new formulation for FACTS allocation for security enhancement against
voltage collapse,” IEEE Trans. Power Syst., vol. 18, no. 1, pp. 3–10, Feb. 2003.
30. M. Eghbal, N. Yorino, E. E. El-Araby, and Y. Zoka, “Multi load level reactive power planning considering slow and fast VAR devices
by means of particle swarm optimization,” IET Trans. Gen., Transm., Distrib., vol. 2, no. 5, pp. 743–751, 2008.
31. R. Zárate-Miñano, A. J. Conejo, and F. Milano, “OPF-Based security re-dispatching including FACTS devices,” IET Trans. Gen.,
Transm., Distrib., vol. 2, no. 6, pp. 821–833, 2008.
32. G. N. Taranto, L. M. V. G. Pinto, and M. V. F. Pereira, “Representation of FACTS devices in power system economic dispatch,” IEEE
Trans. Power Syst., vol. 7, no. 2, pp. 572–576, May 1992.
33. X.P.Zhang, ‘Advanced modelling of multi-control functional static synchronous series compensator (SSSC) in Newton-Raphson power
flow’, IEEE Trans.Power Syst.18(4), 1410-1416, 2003.
34. Ghadir Radman, Reshma S. Raje, ‘Power flow model/calculation for power systems with multiple FACTS controllers’, Electric Power
Systems Research 77, 1521-1531, 2007.
35. Enrique Acha, Claudio R. Fuerte-Esquivel , Hugo Ambriz-Pérez , César Angeles-Camacho, “FACTS: Modelling and Simulation in
Power Networks ,” Wiley, ISBN: 978-0-470-85271-2, pages.420 February 2004.
36. Thukaram Dhadbanjan, Lawrence Jenkins, H.P. Khincha, B. Ravikumar and K.Visakha”, Fuzzy logic application for network
contingency ranking using composite criteria”, International journal of engineering intelligent systems for electrical engineering and
communications 15(4):205-212
37. Storn R (1996b), “On the usage of differential evolution for function optimization”, Proceedings of the IEEE biennial conference of the
North American fuzzy information processing society, pp 519-523.
38. E. Mezura-Montes, J. Velazquez-Reyes, and C. A. Coello Coello, “A comparative study of differential evolution variants for global
optimization,” pp. 485- 492.1996
39. K. Price and R. Storn, “Minimizing the real functions of the ICEC’96 contest by differential evolution,” IEEE International Conference
on Evolutionary Computation, pp.842-844,1996.
40. Q. K. Pan, P. N. Suganthan, L. Wang, L. Gao, and R. Mallipeddi, “A 315 differential evolution algorithm with self-adapting strategy
and control parameters,” Computers & Operations Research, vol. 38, no. 1, pp. 394-408, 2011.
41. A. K. Qin, V. L. Huang, and P. N. Suganthan, “Differential evolution algorithm with strategy adaptation for global numerical
optimization,” IEEE Transactions on Evolutionary Computation, vol. 13, no. 2, pp. 398-417, 2009.
42. Y. Wang, Z. Cai, Q. Zhang, “Differential evolution with composite trial vector generation strategies and control parameters,” IEEE
transactions on Evolutionary Computation, vol. 15, no.1, p. 55, 2011.
43. K. V. Price, ”An introduction to differential evolution,” New Ideas in Optimization, D. Corne, M. Dorigo, and V. Glover, Eds. London,
U.K.: McGraw-Hill, pp. 79-108. 305, 1999.
44. M. M. Ali and A. Torn, “Population set based global optimization algorithms: Some modifications and numerical studies,” Comput.
Oper. Res., vol. 31, no. 10, pp. 1703-1725, 2004.
45. J. Brest, S. Greiner, B. Bovskovic, M. Mernik, and V. Zumer, “Self adapting control parameters in differential evolution: A comparative
study on numerical benchmark problems,” IEEE Transactions on Evolutionary Computation, vol. 10, no. 6, pp. 646-657, 2006.
46. J. Zhang and A. C. Sanderson, “JADE: adaptive differential evolution with optional external archive,” IEEE Transactions on
Evolutionary Computation, vol. 13, no. 5, pp. 945-958, 2009.
47. J. Liu and J. Lampinen, “A fuzzy adaptive differential evolution algorithm,” Soft Computing, A Fusion of Foundations, Methodologies
and Applications, vol. 9, no. 6, pp. 448-642, 2005.
48. W. Gong, Z. Cai, C. X. Ling, and H. Li, “Enhanced differential evolution with adaptive strategies for numerical optimization,” IEEE
Transactions on Systems, Man, and Cybernetics - Part B, vol. 41, no. 2, pp. 397-413, 2011.
49. D. Corne, M. Dorigo, and F. Glover, New ideas in optimization, London, U.K.:McGraw-Hill Education, 102,1999.
50. Giovanni Iacca, Ferrante Neri, and Ernesto Mininno, “Opposition-Based Learning in Compact Differential Evolution”, European
Conference on the Applications of Evolutionary Computation Evo Applications 2011: Applications of Evolutionary
Computation pp 264-273.
51. O. Alsac and B.Stott “Optimal load flow with steady state security”, IEEE PES Summer Meeting and EHV/UHV Conference,
Vancouver, Canada, T73 484-3.
52. S. Kalyani and K. Shanti Swarup, “ Study of neural network models for security assessment in power systems”, International Journal of
Research and Reviews in Applied Sciences, Vol. 1, Issue 2, , pp. 104-117, November 2009.
53. R. D. Zimmerman and D. Gan, “MATPOWER, a MATLAB power system simulation package,” Power System Engineering Research
Center, Cornell Univ., Ithaca, NY, 1997. [Online]. Available: http://www.pserc.cornell.edu/Matpower.
54. A. A. Fouad and V. Vittal, “Power system transient stability analysis using the transient energy function method”, Englewood Cliffs,
NJ: Prentice-Hall, 1992.
55. T. Nguyen and M. A. Pai, “Dynamic security-constrained rescheduling of power systems using trajectory sensitivities,” IEEE Trans.
Power Syst., vol. 18, no. 2, pp. 848–854, May 2003.

Authors: Eduard Zhalnin, Alexander Orlyansky, Sultan Kapov, Irina Orlyanskaya, Alexey Bobryshov

Paper Title: Development of Parameters for the Use of Rotary and Wheel-Finger Rakes for Grass Harvesting
Abstract: This article presents the results of the development of the operation parameters of the rotor and
wheel-finger rakes of different designs and working widths. To select efficient machine units for raking grasses,
field studies and computer experiments on computers with simulation models of the processes of harvesting hay
and haylage were performed. The results of studies of the specific total and energy costs made it possible to
establish that of all the compared models, the most effective in raking grasses are the wheel-finger rake with a
working width of 6.5-7.5 m.

Keyword : rotary rake, wheel-rake, efficiency, productivity, total costs, specific energy consumption.
References:
1. V.I. Trukhachev, A.V. Orlyansky, I.A. Orlyanskaya. Justification of rational parameters of the process of harvesting haylage in rolls
using simulation. Stavropol: AGRUS, 2018.176 p.
2. A.V. Orlyansky, A.N. Petenev, I.A. Orlyanskaya, A.A. Magpie. To the selection of a rake when harvesting grass feeds. Actual
392. problems of scientific and technological progress in the agricultural sector. Stavropol, 2013. p. 308-313.
3. A.V. Orlyansky, A.N. Petenev, I.A. Orlyanskaya. The dynamics of grass drying in modeling the process of harvesting haylage. A ctual 2254-
problems of the scientific and technological process in the agricultural sector. Stavropol, 2018, p. 254-257. 2257
4. A.V. Orlyansky. Approaches to the simulation of technological operations of the forage harvesting process. Bulletin of the ag ricultural
industry of Stavropol, 2016; # 2 (22): 24-27.
5. A.V. Orlyansky, I.A. Orlyanskaya. Generalized simulation model of the process of harvesting haylage. Proceedings of the Kuban State
Agrarian University. Krasnodar, 2008: # 8: 75-79.
6. A.V. Orlyansky. Designing resource-saving forage harvesting systems using simulation modeling. Modernization of agricultural
production based on innovative machine technologies and automated systems. Moscow: VIM, 2012, p. 779-786.
7. S.N. Kapov, A.V. Orlyansky, I.A. Orlyanskaya, A.A. Kojukhov, V.A. Bogomyagkih. Analysis of the structure the technological
process of harvesting haylage in rolls, packed in film. Research Journal of Pharmaceutical, Biological and Chemical Sciences Journal,
2018; # 9 (6): 1779-1788.
8. A.V. Orlyansky, I.A. Orlyanskaya, S.N. Kapov, A.N. Petenev, N.I. Shabanov Choice Of Transport Units For The Transportation Of
Haylage In Rolls. Research Journal of Pharmaceutical, Biological and Chemical Sciences Journal, 2018; # 9 (6): 1839-1844.
9. A.V. Orlyansky, E.V. Kulaev, I.A. Orlyanskaya, A.N. Petenev. AgroProfi - A program for calculating the efficiency of forage
harvesting equipment based on simulation. Certificate of state registration of computer programs No. 2008610015. No. 2007614054;
stated on 10/16/07; registered 01.01.08.
10. V.I. Trukhachev, A.V. Orlyansky, E.V. Zhalnin, E.V. Kulaev, A.N. Petenev, I.A. Orlyanskaya. A simulation program for the selection,
loading, and transportation of ground grass feeds. Certificate of official registration of the computer program No. 2019619390.
Application No. 2019618141 of July 3, 2019. Registered on July 16, 2019.

Authors: Cho Do Xuan, Hoa Dinh Nguyen, Tisenko Victor Nikolaevich

Paper Title: A Framework for Vietnamese Email Phishing Detection


Abstract: Currently, the attacks on network information systems are increasing rapidly in number and
level of danger. Phishing email distribution method is widely used by hackers today. This is an attacking
393. technique that exploits human behaviors in the system. This type of attack, though it is not too complicated,
becomes very effective for attackers if users are unaware of information security and unable to identify phishing
2258-
emails. This attack is particularly more commonly effective in developing countries where the information
2264
security is still overlooked. As a result, email phishing detection problem has become a hot topic for information
security researchers. There have been some published methods to detect phishing emails on given email
attacking datasets. However, one of the important issues in email phishing detection relates to the language used
in emails. Each particular language used in different emails may lead to a different phising detection approach.
In this article, a Vietnamese email phishing detection system is investigated. The research includes a feature
selection method and a combination of machine learning algorithms to improve the performance of phishing
email detection in Vietnamese language. The proposed method is evaluated using two datasets. The first dataset
includes phishing emails from Vietnamese collected from Vietnamese volunteers. The second dataset is the
widely used English emails as introduced in [16,17]. The experimental results show that our method is
applicable for real Vietnamese email phishing detection systems.

Keyword : Email phishing detection, Vietnamese language, feature selection, machine learning .
References:
1. Mahmoud Khonji, Youssef Iraqi.: Phishing Detection: A Literature Survey. IEEE Communications Surveys & Tutorials 15 (4), 2091 -
2121 (Fourth Quarter 2013).
2. Ammar Almomani, B. B. Gupta, Samer Atawneh, A. Meulenberg, and Eman Almomani.: A Survey of Phishing Email Filtering
Techniques. IEEE communications surveys & tutorials 15 (4), 2070 – 2090 (fourth quarter 2013).
3. APWG Phishing Activity Trends Report, 1st 2rd Quarters 2019. https://docs.apwg.org/reports/apwg_trends_report_q2_2019.pdf. Last
accessed 26 Oct 2019
4. Spam and phishing in Q2 2019. https://securelist.com/spam-and-phishing-in-q2-2019/92379/. Last accessed 26 Oct 2019.
5. Việt Nam among top targets for phishing in Southeast Asia, https://vietnamnews.vn/society/535097/viet-nam-among-top-targets-for-
phishing-in-southeast-asia.html#3obGRzMAbOJfEPDv.97. Last accessed 26 Oct 2019.
6. A Vietnamese Text Processing Toolkit. https://github.com/phuonglh/vn.vitk. Last accessed 26 Oct 2019.
7. Chandrasekaran, M., Narayanan, K., Upadhyaya.: Phishing email detection based on structural properties. 9th Annual NYS Cyber
Security Conference, pp 1-7, Albany, (14 June 2006).
8. Fergus Toolan, Joe Carthy.: Phishing detection using classifier ensembles. eCrime Researchers Summit, pp. 1-9, USA (21 Oct. 2009).
9. Noor Ghazi Mohammed Jameel, Loay Edwar George.: Detection of phishing emails using feed forward neural network. International
Journal of Computer Applications 77 (7), 10- 16, (2013).
10. Sarwat Nizamani, Nasrullah Memon, Mathies Glasdam;, Dong Duong Nguyen.: Detection of fraudulent emails by employ ing
advanced feature abundance, Egyptian Informatics Journal 15 (3), 169-174, (2014).
11. T. Kathirvalavakumar, K. R. Kavitha, Rathinasamy Palaniappan.: Efficient Harmful Email Identification Using Neural Network,
British Journal of Mathematics & Computer Science 7 (1), 58- 67, (2015).
12. Mahmoud Khonji, Youssef Iraqi, Andrew Jones.: Enhancing Phishing E-Mail Classifiers: A Lexical URL Analysis Approach,
International Journal for Information Security Research 2 (1), 236- 245, 2012.
13. Detecting Phishing Emails Using Machine Learning Techniques. https://www.meu.edu.jo/libraryTheses/590422b4d5dd8_1.pdf.
https://monkey.org/~jose/phishing/. Last accessed 26 Oct 2019.
14. Leo Breiman.: Random Forests. Machine Learning 45 (1), pp. 5- 32, (2001).
15. Thomas G. Dietterich. Ensemble Methods in Machine Learning. International Workshop on Multiple Classifier Systems, pp 1-15,
Cagliari, Italy, 2000.
16. Index of /~jose/phishing. https://monkey.org/~jose/phishing/. Last accessed 26 Oct 2019.
17. Enterprise Open-Source Spam Filter. http://spamassassin.apache.org/publiccorpus/. Last accessed 26 Oct 2019.

Authors: J. Krishna Chaithanya, A. Saiakhila, Y. Pandu Rangaiah


Design a Prototype for Detecting Abnormalities in Heart Rhythm by Applying Technological
Paper Title:
Interventions
Abstract: This paper demonstrates the basic dialogue for heart rhythm examination of arrhythmia patients
who’s heart beat is conventionally irregular. In this approach, designed a device which supervises and record the
heart beat by evaluating the PQRS complexes. Despite the fact as alone, there are many ECG devices which
examine the heart rhythm but they are little precise because, firstly they are not taking the live data for analysis
of PQRS complexes inspite many hospital clinic’s are taking pre-loaded heart rhythm from few days and months
and analysis is done on the data either by mathematical theorems or else by using other techniques like wavelet
theorem, matlab etc. Here, focus is mainly on analysis of pqrs complexes from live data. Internet of things is
been far-flung technology in extant days. So by IoT the heart rhythm and PQRS values are been displaying on
web so that doctor monitor patient data up-to-date from anywhere and at any time. The device has been
implemented and evaluated by using the Heart beat sensor AD8232, Raspberry Pi 3 b board, Arduino Uno,
Python programming.

394. Keyword : Heart beat Sensor, Arduino Uno, Raspberry Pi, Heart Rhythm, Python.
References: 2265-
1. W.H.Organization, “Global status report on non communication diseases”, by WHO [Online; accessed 19-July-2013] Avaliable:, 2268
http://www.who.int/nmh/publications/ncd_report2010/en/
2. Drawn ,Sri hartai, Retantyo wardoyo, Budi vuli setianto , “The Feature Extraction to Determine the Wave ‘s Peaks in the
Electrocardiogram graphic image”, ISSN: 2074-9074 (Print), ISSN: 2074-9082 (Online)
3. Published By: MECS Press IJIGSP Vol.9, No.6, Jun. 2017
4. (Computer’s in Biology and Medicine ), Author's Accepted Manuscript Heart monitoring systems Puneet Kumar Jain, Anil Kumar
Tiwari Nov 24 volume 54. Available: https:// www.science direct .com // science / article/pii/S0010482514002169?vi a%3Dihub
5. Hussian A,Jaber. AL-Ziarjawey, and Ilas Cankaya, “Heart Rate Monitoring and PQRST Detection Based on Graphical User Interface
with Matlab” – Journal Volume .5,No.4, 2015
6. Muhammad Umer, Bilal Ahmed Bhatti, Muhammad Hammad Tariq,Muhammad Zia-ul-Hassan, Muhammad Yaqub Khan, Tahir Zaidi,
“Electrocardiogram Feature Extraction and Pattern Recognition Using a Novel Windowing Algorithm”, Centre for Advanced Research
in Engineering (CARE), Islamabad, Pakistan
7. Mehak Chhabra,Manik Kalsi ,” Real Time ECG monitoring system based on Internet of Things (IoT)”, Volume 7, Issue 8, ISSN 2250-
3153,2017
8. Jasti Sowmya Sree, Mohammed Ali Hussain (2019)” An Efficient Body Line Health Monitoring System with Alerts Triggered Through
Predictive Data Analytics’ Journal ISSN: 2278-3075, Volume-8 Issue-6, April 2019
9. Deepshikha Goyal, Jai Bhaskar, Parvinder Singh, "Designing the Low Cost Patient Monitoring Device (LCPMD) & Ubiquitous Based
Remote Health Monitoring and Health Management System Using Tablet Pc”, 2012 2 nd IEEE International Conference on Parallel
Distribution And Grid Computing.
Authors: Kiran Arora, Savina Bansal, Rakesh Kumar Bansal
Fault-Tolerant Energy-Aware Task Scheduling on Multiprocessor System for Fixed-Priority Real-
Paper Title:
Time Tasks
Abstract: Energy-aware real-time scheduling is gaining attention in recent years owing to environmental
concerns and applications in numerous fields. System reliability also gets affected adversely with increasing
energy dissipations posing serious challenges before the researchers. Keeping these in view, in recent times
researchers have diverted to combining issues of fault-tolerance and energy efficiency. In literature, DVFS and
DPM, most commonly used techniques for power management in task scheduling, are often combined with
Primary/Backup technique to achieve fault tolerance against transient and permanent faults. Optimal algorithms,
Earliest deadline first (EDF) and Rate-Monotonic (RM), meant for scheduling dynamic and fixed priority tasks
respectively, have mainly been analyzed using a dual-processor approach for fault-tolerance and energy
efficiency. In this paper, to handle higher workload of fixed-priority real-time tasks, energy-aware fault-tolerant
scheduling algorithms are proposed for multiprocessor systems with balanced and unbalanced number of main
and auxiliary processors. Simulations over extensive task-sets indicate that balanced approach is more energy-
efficient than the unbalanced one.

Keyword : energy-aware, fault-tolerance, fixed-priority, rate-monotonic, task scheduling


References:
1. R. K. Bansal, Fault-Tolerant Real-Time Scheduling for Multiprocessor Systems. United Kingdom: LAP Lambert Academic Publishing,
2011.
2. “5 Key Trends for Embedded Systems in 2019,” 2018. [Online]. Available: https://news.thomasnet.com/featured/5 -key-trends-for-
embedded-systems-in-2019/. [Accessed: 02-Mar-2019].
3. K. Arora, S. Bansal, and R. K. Bansal, “Schedulability and Energy Consumption Analysis of Energy-Aware Fixed-Priority Task
Scheduling Schemes,” Int. J. Res. Electron. Comput. Eng., vol. 7, no. 1, pp. 1254–1259, 2019.
4. N. Kaur, S. Bansal, and R. K. Bansal, “Duplication-controlled static energy-efficient scheduling on multiprocessor computing system,”
Concurr. Comput. , vol. 29, no. 12, 2017.
5. N. Kaur, S. Bansal, and R. K. Bansal, “Energy efficient duplication-based scheduling for precedence constrained tasks on
heterogeneous computing cluster,” Multiagent Grid Syst., vol. 12, no. 3, pp. 239–252, 2016.
6. V. Swaminathan and K. Chakrabarty, “Energy-Conscious, Deterministic I/O Device Scheduling in Hard Real-Time Systems,” IEEE
Trans. Comput. Des. Integr. Circuits Syst., vol. 22, no. 7, pp. 847–858, 2003.
7. V. Devadas and H. Aydin, “On the interplay of voltage/frequency scaling and device power management for frame-based real-time
embedded applications,” IEEE Trans. Comput., vol. 61, no. 1, pp. 31–44, 2012.
8. D. K. Pradhan, Ed., Fault-tolerant Computer System Design. Upper Saddle River, NJ, USA: Prentice-Hall, Inc., 1996.
9. D. Zhu, R. Melhem, and D. Moss, “The Effects of Energy Management on Reliability in Real-Time Embedded Systems,” IEEE/ACM
Int. Conf. Comput. Des. 2004, pp. 35–40, 2004.
395. 10. V. Moghaddas, M. Fazeli, and A. Patooghy, “Reliability-oriented scheduling for static-priority real-time tasks in standby-sparing
systems,” Microprocess. Microsyst., vol. 45, pp. 208–215, 2016.
11. D. Zhu, R. Melhem, and D. Mossé, “The effects of energy management on reliability in real-time embedded systems,” in Proceedings 2269-
of the 2004 IEEE/ACM International conference on Computer-aided design, 2004, pp. 35–40. 2275
12. D. Zhu and H. Aydin, “Reliability-aware energy management for periodic real-time tasks,” IEEE Trans. Comput., vol. 58, no. 10, pp.
1382–1397, 2009.
13. M. A. Haque, H. Aydin, and D. Zhu, “Energy-aware standby-sparing for fixed-priority real-time task sets,” Sustain. Comput.
Informatics Syst., vol. 6, pp. 81–93, 2015.
14. C. L. Liu and J. W. Layland, “Scheduling Algorithms for Multiprogramming in a Hard-Real-Time Environment,” J. ACM, vol. 20, no.
1, pp. 46–61, Jan. 1973.
15. M. A. Haque, H. Aydin, and D. Zhu, “Energy-aware task replication to manage reliability for periodic real-time applications on
multicore platforms,” in 2013 International Green Computing Conference Proceedings, 2013, pp. 1–11.
16. D. Zhu, “Reliability-Aware Dynamic Energy Management in Dependable Embedded Real-Time Systems,” ACM Trans. Embed.
Comput. Syst., vol. 10, no. 2, p. 27, 2010.
17. D. Zhu and H. Aydin, “Energy Management for Real-Time Embedded Systems with Reliability Requirements,” in Proceedings of the
2006 IEEE/ACM international conference on Computer-aided design, 2006, pp. 528–534.
18. B. Zhao, H. Aydin, and D. Zhu, “Energy management under general task-level reliability constraints,” in 2012 IEEE 18th Real Time
and Embedded Technology and Applications Symposium, 2012, pp. 285–294.
19. B. Zhao, H. Aydin, and D. Zhu, “On maximizing reliability of real-time embedded applications under hard energy constraint,” IEEE
Trans. Ind. Informatics, vol. 6, no. 3, pp. 316–328, 2010.
20. B. Zhao, H. Aydin, and D. Zhu, “Enhanced reliability-aware power management through shared recovery technique,” in Proceedings
of the 2009 International Conference on Computer-Aided Design, 2009, pp. 63–70.
21. B. Zhao, H. Aydin, and D. Zhu, “Shared Recovery for Energy Efficiency and Reliability Enhancements in Real-time Applications with
Precedence Constraints,” ACM Trans. Des. Autom. Electron. Syst., vol. 18, no. 2, pp. 23:1–23:21, 2013.
22. Q. Han, L. Niu, G. Quan, S. Ren, and S. Ren, “Energy efficient fault-tolerant earliest deadline first scheduling for hard real-time
systems,” Real-Time Syst., vol. 50, no. 5–6, pp. 592–619, 2014.
23. O. S. Unsal, I. Koren, and C. M. Krishna, “Towards Energy-Aware Software-Based Fault Tolerance in Real-Time Systems,” in
Proceedings of the 2002 international symposium on Low power electronics and design, 2002, pp. 124–129.
24. M. A. Haque, H. Aydin, and D. Zhu, “On Reliability Management of Energy-Aware Real-Time Systems Through Task Replication,”
IEEE Trans. Parallel Distrib. Syst., vol. 28, no. 3, pp. 813–825, 2017.
25. M. Salehi et al., “DRVS: Power-efficient reliability management through Dynamic Redundancy and Voltage Scaling under variations,”
in 2015 IEEE/ACM International Symposium on Low Power Electronics and Design (ISLPED), 2015, pp. 225–230.
26. S. Aminzadeh and A. Ejlali, “A Comparative Study of System-Level Energy Management Methods for Fault-Tolerant Hard Real-Time
Systems,” Computers, IEEE Transactions on, vol. 60, no. 9. pp. 1288–1299, 2011.
27. A. Ejlali, B. M. Al-Hashimi, and P. Eles, “A Standby-sparing Technique with Low Energy-overhead for Fault-tolerant Hard Real-time
Systems,” in Proceedings of the 7th IEEE/ACM International Conference on Hardware/Software Codesign and System Synthesis,
2009, no. ACM, pp. 193–202.
28. A. Ejlali, B. M. Al-hashimi, and P. Eles, “Low-Energy Standby-Sparing for Hard Real-Time Systems,” IEEE Trans. Comput. Des.
Integr. Circuits Syst., vol. 31, no. 3, pp. 329–342, 2012.
29. Y. Guo, D. Zhu, H. Aydin, J.-J. Han, and L. T. Yang, “Exploiting primary/backup mechanism for energy efficiency in dependable real-
time systems,” J. Syst. Archit., vol. 78, pp. 68–80, 2017.
30. M. Bambagini, M. Marinoni, H. Aydin, and G. Buttazzo, “Energy-Aware Scheduling for Real-Time Systems,” ACM Trans. Embed.
Comput. Syst., vol. 15, no. 1, pp. 1–34, 2016.
31. Dakai Zhu, R. Melhem, and D. Mosse, “The effects of energy management on reliability in real-time embedded systems,” in
IEEE/ACM International Conference on Computer Aided Design, 2004. ICCAD-2004., 2004, pp. 35–40.
32. J. J. Chen and T. W. Kuo, “Procrastination determination for periodic real-time tasks in leakage-aware dynamic voltage scaling
systems,” in 2007 IEEE/ACM International Conference on Computer-Aided Design, 2007, pp. 289–294.
33. S. Saewong and R. Rajkumar, “Practical voltage-scaling for fixed-priority rt-systems,” in The 9th IEEE Real-Time and Embedded
Technology and Applications Symposium, 2003. Proceedings., 2003, pp. 106–114.
34. R. Davis and A. Wellings, “Dual priority scheduling,” in Proceedings 16th IEEE Real-Time Systems Symposium, 2002, pp. 100–109.

Authors: Prilenskaya, Elena Ruppel, Vladimir Churin SpaceAlexander Ogorodnikov, Irina

Paper Title: The Integrity of the Territorial Identification of a Person in the Russian Social Space
Abstract: Purpose of the study: To investigate the sociological dimension of social space structuring under
the influence of territorial movements in the era of globalization based on the example of modern Russia.
As the methodology for the study, the synthesis of E. Giddens’ theory was structured, its provisions on the
topography of social space in the geographical plane. The paradigm of structuralist constructivism of P.
Bourdieu was used as well, in which it was relevant for us to analyze habitus as a socio-geographical
environment for the formation of institutional strategies of agents of social relationship. Factors that contribute
to and hinder the adaptation of personality in the new social environment, were examined based on works by O.
Toffler, U. Beck, V.I. Chuprov and Yu.A. Zubok. To determine the mechanism of the genesis and functioning of
meanings in the new communicative environment, the authors relied on N. Luman's approach to self-
identification and self-conference. In the process of analyzing the nature of trust in the institutional order in the
context of globalization, the authors used works by A.V. Ivanov and S.A. Danilova who analyze the mechanisms
of formation. The empirical basis for the article was a sociological study conducted on the basis of the
Sociological Center of Kutafin Moscow State Law University.
The article reveals the features of personality identification in a dynamic environment of interethnic and
cross-cultural interactions, structured under the influence of territorial factors. The degree of conformity of the
scale, the nature and depth of self-identification in various territorial planes of the social space are determined by
the example of modern Russian society. Factors of social integration in the process of the formation of territorial
identity both at the institutional level and in everyday life when constructing informal social ties are disclosed.
396. The restrictions of social identification in the regions of Russia are found that prevent the formation of civic
identity and responsibility for the reproduction of the social order. The values that determine social integration in
cross-cultural interaction are revealed. 2276-
2286
The results of the study make a significant contribution to the development of methods for determining the
causes of the genesis of separatist sentiments and the conditions for designing constructive social participation in
various regions. The article is relevant for undergraduate and graduate students, as well as lecturers, involved in
the problems of the sociological study of globalization, social space and group identity.
The work uses an integral methodology for measuring social processes from the perspective of the subject of
action, constructing strategies in the new social environment, and from the perspective of a system that ensures
the reproduction of the institutional order.

Keyword : personal self-identification, structuring of social space, interethnic interaction, regional policy,
territorial identity, socialization of an individual, values.
References:
1. P.A. Sorokin, “Moya filosofiya – integralism” [My philosophy is integralism]. Sotsiologicheskie issledovaniya. [Sociological research],
10, 1992, pp. 134-139.
2. B. Latour, “Peresborka sotsial'nogo: vvedenie v aktorno-setevuyu teoriyu” [Reassembling the Social. An Introduction to Actor-Network-
Theory]. Moscow, Izd. dom Vysshei shkoly ekonomiki, 2014.
3. E. Giddens, “Ustroenie obshchestva: ocherk teorii strukturatsii” [The organization of society: an essay on the theory of structuration].
Moscow, Akademicheskii Proekt, 2003.
4. P. Bourdieu, “Sotsiologiya politiki” [Sociology of politics]. Moscow, Socio-Logos, 1993.
5. Social analysis of Pierre Bourdieu. Almanakh Rossiisko-frantsuzskogo tsentra sotsiologii i filosofii Instituta sotsiologii Rossiiskoi
Akademii nauk. [Almanac of the Russian-French Center for Sociology and Philosophy of the Institute of Sociology of the Russian
Academy of Sciences]. Moscow, Institut eksperimentalnoi sotsiologii, 2001.

Authors: E. V. Barcaeva, N. V. Ryabova

Paper Title: Readiness of Senior Preschool Children to Adapt to Social and Everyday Conditions
Abstract: Based on the analysis of the relevant psychological and pedagogical literature, the article defines
the concept of "one's readiness to adapt to social and everyday conditions" and substantiates its structural
components, including personal, cognitive and activity-based. The authors of the article have described each
component with due regard to the distinctive features of senior preschool children: personal (values-based
397. orientations, motivation, emotional well-being, integrative qualities of an individual); cognitive (basic ideas
about oneself and the world around them, basic socio-cultural ideas, basic ideas about social and everyday 2287-
activities, basic ideas about the norms and rules of social behavior); activity-based (general thinking, general 2297
labor, social and everyday, communication skills). The article presents methods for studying the readiness of
senior preschool children to adapt to social and everyday conditions. The authors have developed a diagnostic
tool to determine the formation of the above-mentioned readiness: high, average, low and unformed. To
determine the formation of readiness components, the authors have distinguished criteria and indicators for
evaluation and selected the following methods: the method of case problems (for studying the personal
component), a survey (for studying the cognitive component) and practice-oriented tasks (for studying the
activity-based component). Using the above-mentioned methods, the authors have conducted an ascertaining
experiment aimed at studying the readiness of senior preschool children to adapt to social and everyday
conditions. The experiment was carried out in institutions of additional education in the city of Saransk, the
Republic of Mordovia. The authors have described the results obtained after studying the readiness of senior
preschool children to adapt to social and everyday conditions. They have revealed that components common to
the readiness of senior preschool children are undeveloped, which proves that it is necessary to organize specific
activities in the system of additional education to form the readiness of senior preschool children to adapt to
social and everyday conditions. This article studying the readiness of senior preschool children to adapt to social
and everyday conditions is relevant since its results can be used for the formation of the above-mentioned
readiness in the system of additional education, which will contribute to the social adaptation of these children.

Keyword : Readiness of senior preschool children to adapt to social and everyday conditions; structure of
readiness to adapt to social and everyday conditions; personal, cognitive and activity-based components of
readiness; constituent parts of readiness components; research methods and methodology; criteria and indicators
to evaluate one's readiness; development levels of the readiness of senior preschool children to adapt to social
and everyday conditions.
References:
1. Federalnyi gosudarstvennyi obrazovatelnyi standart doshkolnogo obrazovaniya № 1155 [The Federal State Educational Standard of
Preschool Education № 1155]. (2013). Available: http://www.rg.ru/2013/11/25/doshk-standart-dok.html
2. L.S. Vygotsky, Pedagogicheskaya psikhologiya [Pedagogical psychology]. Moscow: Pedagogika, 1991.
3. M.I. Lisina, Formirovanie lichnosti rebenka v obshchenii [Forming the child's personality in communication]. Saint Petersburg: Piter,
2008.
4. V.S. Mukhina, Vozrastnaya psikhologiya. Fenomenologiya razvitiya [Developmental psychology. The phenomenology of development],
12th ed. Moscow: Akademiya, 2012.
5. D.B. Elkonin, Psikhicheskoe razvitie v detskikh vozrastakh [The mental development of children]. Moscow: In-t prakt. Psikhologii,
1995.
6. N. Veraksa, “Development of cognitive capacities in preschool age”, International Journal of Early Years Education, 1, 2011, pp. 79-
88.
7. E. Bespanskaya. (2007). Regulation of behavior and formation of leading psychic functions in preschool age. ECP2007 (10th Eur opean
Congress of Psychology). Prague: List of Abstracts. Available:
http://www.ordinepsicologi.piemonte.it/DocsImgs/docs/Congresso%20Praga/files/abstract-2184.html
8. J. Haynes, “Children's readiness for school: perspectives and evidence”, Community practitioner: the journal of the Community
Practitioners' & Health Visitors' Association, 1, 2013, p. 12.
9. H. Lenira, “An Integrated Approach to Early Childhood Education and Care”, UNESCO Early Childhood and Family Policy, 3, 2002, p.
67.
10. S. Schoonmaker, “Kids in Context: The Sociological Study of Children and Childhoods”, Contemporary Sociology, 35(6), 2006, pp.
579-580.
11. N.V. Ryabova, Didakticheskaya sistema formirovaniya deyatelnosti pedagoga po sotsialnobytovoi orientatsii uchashchikhsya [The
didactical system of forming the teacher's activity aimed at developing social and everyday skills of pupils]. Saransk: Mordovian State
Pedagogical Institute named after M. E. Evseveva, 2008.
12. T.A. Parfenova, Formirovanie gotovnosti k sotsialno-bytovoi orientatsii mladshikh shkolnikov [Forming the readiness of junior pupils
to adapt to social and everyday conditions]. (PhD Thesis). Saransk: Mordovian State Pedagogical Institute named after M. E. Evseveva,
2016.
13. N.V. Ryabova, & T.A. Parfyonova, “Study of personal and social adjustment ability of the disabled pupils”, International Education
Studies, 8, 2015, p. 5.
14. E.V. Bartsaeva, “Gotovnost k sotsialno-bytovoi orientatsii: sushchnost ponyatiya [Readiness to adapt to social and everyday
conditions”], in Sotsialnoe partnerstvo v obrazovanii: tendentsii, praktiki [Social partnership in education: trends, practices]: the
proceedings of the 11th International scientific conference dedicated to the memory of N.V. Goryunov, in three parts, part 2. Saransk:
GBPOU RM "Saranskii gosudarstvennyi promyshlenno-ekonomicheskii kolledzh", 2018, pp. 42-45.
15. E.V. Bartsaeva, “Teoreticheskie osnovy struktury gotovnosti k sotsialno-bytovoi orientatsii doshkolnikov [Theoretical foundations of
the readiness of preschool children to adapt to social and everyday conditions]”, Samarskii nauchnyi vestnik, 7(3(24)), 2018, pp. 299-
302.
16. E.V. Bartsaeva, “Sushchnost lichnostnogo komponenta gotovnosti k sotsialno-bytovoi orientatsii doshkolnikov [The personal
component of the readiness of preschool children to adapt to social and everyday conditions]”, in Problemy sovremennogo
pedagogicheskogo obrazovaniya [Problems of modern teacher education]. The collection of scientific works. Yalta: RIO GPA, 2018.
17. C.R. Rogers, Freedom to learn: a view of what education might become, C.E. Merrill Pub. Co., 1969.
18. M. Rokeach, The Nature of Human Values. Free Press, 1973.
19. G.W. Allport, Becoming: Basic Considerations for a Psychology of Personality. New Haven: Yale University Press, 1955.
20. E. Fromm, The Forgotten Language: An Introduction to the Understanding of Dreams, Fairy Tales, and Myths. New York: Grove
Press, 1957.
21. M.S. Komarov, Vvedenie v sotsiologiyu [Introduction into sociology]. Moscow: Nauka, 1994.
22. L.I. Bozhovich, Izbrannye psikhologicheskie trudy: Problemy formirovaniya lichnosti [Selected psychological works: the personality's
formation]. Moscow: Mezhdunarodnaya pedagogicheskaya akademiya, 1995.
23. A.N. Leontev, Deyatelnost. Soznanie. Lichnost [Activity. Consciousness. Personality]. Moscow: Politizdat, 1975.
24. V.D. Shadrikov, Psikhologiya deyatelnosti i sposobnosti cheloveka [The psychology of the person's activity and skills], 2nd ed.
Moscow: Logos, 1996.
25. K.A. Vologdina, “Razvitie mezhlichnostnykh otnoshenii detei kak uslovie formirovaniya emotsionalnogo blagopoluchiya
doshkolnikov” [“The development of the child's interpersonal relationships as a condition for forming the emotional well-being of
preschoolers”], in Sovremennye problemy i usloviya sotsializatsii lichnosti [Modern problems and conditions of personality
socialization], A.M. Skotnikova, S.A. Minyurova, Eds. Yekaterinburg: Ural State Pedagogical University, 2012, pp. 37-41.
26. G.A. Uruntaeva, Doshkolnaya psikhologiya [Preschool psychology]. Moscow: Akademiya, 2001.
27. E.V. Bartsaeva, “Soderzhanie kognitivnogo komponenta gotovnosti k sotsialno-bytovoi orientatsii doshkolnikov [The cognitive
component of the readiness of preschool children to adapt to social and everyday conditions]”, in Sovremennye nauchnye issledovaniya
[Modern scientific research], issue 9, the collection of articles written by participants of the All-Russian scientific competition
"Luchshaya molodezhnaya nauchnaya statya – 2018" held by ANO DPO "MTsITO", Kirov (August 2017 – May 2018, Kirov: Izd-vo
MTsITO, 2018.
28. S.A. Kozlova, & T.A. Kulikova, Doshkolnaya pedagogika [Preschool pedagogy], 3rd ed. Moscow: Akademiya, 2001.
29. L.A. Golovchits, Doshkolnaya surdopedagogika: Vospitanie i obuchenie doshkolnikov s narusheniyami slukha [Preschool
surdopedagogy: the upbringing and education of hearing-impaired children]. Moscow: Vlados, 2001.
30. E. A. Ekzhanova, & E.A. Strebeleva, Korrektsionno-razvivayushchee obuchenie i vospitanie [Special education and upbringing].
Moscow: Prosveshchenie, 2005.
31. T.I. Babaeva, & L. Rimashevskaya, Kak razvivat vzaimootnosheniya i sotrudnichestvo doshkolnikov v detskom sadu [How to develop
the relationship and cooperation of preschool children in kindergartens?]. Saint Petersburg: DETSTVO-PRESS, 2012.
32. E.O. Smirnova, & V.M. Kholmogorova, Mezhlichnostnye otnosheniya doshkolnikov: diagnostika, problemy, korrektsiya [Interpersonal
relationships of preschool children: diagnostics, problems and reformation]. Moscow: Vlados, 2005.
33. I.N. Kurochkina, “Etiket v sotsiokulturnom prostranstve detstva [Etiquette in the socio-cultural context of childhood]”, Detskii sad ot A
do Ya. 5(71), 2014, pp. 48-53.
34. E.V. Bartsaeva, M.A. Demina, A.S. Kharlampova, “K probleme soderzhaniya deyatelnostnogo komponenta gotovnosti k sotsialno -
bytovoi orientatsii doshkolnikov [The activity-based component of the readiness of preschool children to adapt to social and everyday
conditions]”, Vestnik obrazovatelnogo konsortsiuma Srednerusskii universitet. Seriya: Gumanitarnye nauki, 11, 2018, pp. 12-14.
35. L.F. Fatikhova, Metodika formirovaniya obshcheintellektualnykh umenii u doshkolnikov s narusheniem intellekta [Methods for forming
general thinking skills of mentally challenged preschool children]. Ufa: Vagan, 2007.
36. B.I. Pinskii, Korrektsionno-vospitatelnoe znachenie truda dlya psikhicheskogo razvitiya uchashchikhsya vspomogatelnoi shkoly [The
disciplinary and educational meaning of labor for the mental development of children in the framework of additional education ].
Moscow: Pedagogika, 1985.
37. E.A.Mileryan, Psikhologiya formirovaniya obshchetrudovykh politekhnicheskikh umenii [The psychology of forming general labor and
polytechnic skills]. Moscow: Pedagogika, 1973.
38. N.F. Golovanova, Sotsializatsiya i vospitanie rebenka [The socialization and upbringing of children]. Saint Petersburg: Rech, 2004.
39. S.V. Pronyaeva, Formirovanie kommunikativnykh umenii u detei doshkolnogo vozrasta [Forming communicative skills of preschool
children]. (PhD Thesis). Yekaterinburg, 1999.
40. Е.V. Barcaeva, & N.V. Ryabova, The components of successfully adapting child with health limitations. Biology and Medicine
(Aligarh), 7(4), 2015, p. 5.
41. E.V. Barcaeva, N.V. Ryabova, E.V. Zolotkova, “Scientific and Methodological Basics of Formation of Preschoolers' Readiness fo r
Social and Personal Orientation”. International Journal of Engineering & Technology, 7(4.38), 2018, pp. 54-59 Available:
https://www.sciencepubco.com/index.php/ijet/article/view/24320
42. E.V. Ezhovkina, & N.V. Ryabova, “Psychological and pedagogic support of children with health limitations”, International Education
Studies, 8, 2015, p. 4.
43. Bartsaeva, E.V. “Issledovanie gotovnosti k sotsialno-bytovoi orientatsii detei doshkolnogo vozrasta” [“Studying the readiness of
preschool children to adapt to social and everyday conditions”], in Teoriya i praktika obrazovaniya doshkolnikov s ogranichennymi
vozmozhnostyami zdorovya [Theory and practice of education for preschool children with disabilities]. Saransk: Mordovian State
Pedagogical Institute named after M. E. Evseveva, 2018, pp. 28-50.

Authors: Yury P. Garmaev, Yury V. Kharmaev, Diana A. Stepanenko, Alexandr V. Rudenko


On the Issue of Enhancing the Social and Political Activity of Young Generation at The Present
Paper Title:
Stage
Abstract: Purpose of the study: The article considers the scientific research and analysis of the current
state of social and political activity of the young generation in the electoral process, as well as the possibilities to
stimulate more active behaviour of the young in the current historical period. In this context, the primary
importance belongs to higher educational institutions, which, besides preparing highly qualified professionals,
must provide the students with good knowledge and skills in social and political life, develop their active public
stance on the destiny of the city, region and the entire country. Solving the problems in this area would be
impossible without accounting for both, historical and positive international experience. Empirical methods of
comparison, description, interpretation; theoretical methods of formal and dialectical logic.
Main Findings: During the research, the authorsidentified the most remarkable trends typical for students in
regard to political and electoral procedures, noted their strengths and weaknesses and defined the perspective
areas for improving and increasing the role of young people in the election process.
Originality of this study: The society has indeed grown up to the urgent need to create conditions, incentives and
alternatives for realizing the labour, socio-political, social and cultural needs of young people. To be able to do
this in near future, the real, scientifically based methods are necessary to study the situation among youth and
students.
398.
Keyword : Constitution, youth, social and political activity, electoral process, rights and freedoms,
2298-
perspectives, needs.
2301
References:
1. Kharmaev Yu.V. “Observance of the rights and freedoms of a person and a citizen in the operational-search activity”, Bulletin of the
Ammosov North-Eastern Federal University. Series: History. Political science. Law, 2(10), 2018, pp. 44-47.
2. Balynin I.V. “Political culture of the younger generation of Russians: the results of the 2014 survey”, Theoretical & Applied Science,
3(23), 2015, pp.25-32.
3. The Mentality of the Russian youth: political landmarks and idols. Electronic resource: http://gefter.ru/archive/8369. Date of access
12.02.2019.
4. Morozova G.A., Zimin V.A. “Political and legal culture in the period of election campaigns in Russia”, Bulletin of modern science, 1-
1(13), 2016, pp.144-148.
5. Public youth movements in Russia. Electronic resource: https://fishki.net/1578616-obwestvennye-molodyozhnye-dvizhenija-v-
rossii.html. Date of access 12.02.2019.
6. Suntsov A.P. “Aktual'nye voprosy sovershenstvovaniya deyatel'nosti izbiratel'nyh komissij po povysheniyu pravovoj kul'tury
izbiratelej”, Academic Law Journal, 2(48), 2012, pp. 13-16.
7. Maslova I.I., Sadyrova M.Yu., Shaldybin S.G., Maslov A.D. “In: Proceedings of the conferences at the State Scientific Research
Institute “National Development”, Collection of selected articles, Ed. L.A. Pavlov, 2016, pp. 131-137.
8. Garmaev Yu. P., Gantulga N., KharmaevYu.V. “ Mongolian Trace in the Criminal Penalties Institute in Buryat Society of the Russian
Empire in XIX Century”, International Journal of Engineering & Technology, 7(4.38), 2018, pp. 174-178.
9. Garmaev Yu. P., Kharmaev Yu.V., Chumakova L.P. “Inter-branch concept of protecting the rights and legitimate interests of the
citizens of Mongolia in the territory of the Russian Federation and the citizens of Russia in the territory of Mongolia”, Espacios, 39(18),
2018b, p.35.
10. Badmaev A.Z. “Youth organizations of the Republic of Buryatia at the present stage, 1985-1995”.
Authors: B. Manjula Josephine, K. V. Raja Shekar, G. Meghana, K.V.S.N Rama Rao, Ch. Rajesh

Paper Title: Forensic Analysis of Social Media Apps


Abstract: Social networks in any form, specifically online social networks (OSNs), are becoming a part of
our everyday life in this new kind of millennium especially with the advanced and simple communication
technologies through easily accessible devices such as smartphones and laptops and desktops. The data
generated through the use of these technologies need to be analyzed for forensic purposes when criminal and
terrorist activities are involved. And is useful to analyze and come to an understanding about their further
intentions. In order to deal with the forensic implications of social networks, current research on both digital
forensics and social networks need to be incorporated and understood. In this paper we are conducting forensic
analysis on different networking sites such as Twitter, Skype, and WhatsApp on famous search engine called
Firefox.

Keyword : Artifacts, Decryption, Encryption, Skype, Twitter, WhatsApp.


References:
399. 1. Majeed, A., Zia, H., Imran, R., & Saleem, S. (2015, December). Forensic analysis of three social media apps in windows 10. In 2015
12th International Conference on High-capacity Optical Networks and Enabling/Emerging Technologies (HONET) (pp. 1-5). IEEE. 2302-
2. Al Mutawa, N., Baggili, I., &Marrington, A. (2012). Forensic analysis of social networking applications on mobile devices. Digital 2305
Investigation, 9, S24-S33.
3. Awan, F. A. (2015, December). Forensic examination of social networking applications on smartphones. In 2015 conference on
information assurance and cyber security (ciacs) (pp. 36-43). IEEE.
4. Cloyd, T., Osborn, T., Ellingboe, B., Glisson, W. B., & Choo, K. K. R. (2018, August). Browser Analysis of Residual Facebook Data.
In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE
International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) (pp. 1440-1445). IEEE.
5. Walnycky, D., Baggili, I., Marrington, A., Moore, J., &Breitinger, F. (2015). Network and device forensic analysis of android social-
messaging applications. Digital Investigation, 14, S77-S84.
6. Shaw, Urjashee, Dolly Das, and Smriti Priya Medhi. "Social Network Forensics: Survey and Challenges." International Journal of
Computer Science and Information Security 14.11 (2016): 310.
7. NorouzizadehDezfouli, F., Dehghantanha, A., Eterovic-Soric, B., & Choo, K. K. R. (2016). Investigating Social Networking
applications on smartphones detecting Facebook, Twitter, LinkedIn and Google+ artefacts on Android and iOS platforms. Australian
journal of forensic sciences, 48(4), 469-488.
8. Taylor, M., Haggerty, J., Gresty, D., Almond, P., & Berry, T. (2014). Forensic investigation of social networking application s. Network
Security, 2014(11), 9-16.
9. Umair, A., Nanda, P., & He, X. (2017, August). Online social network information forensics: A survey on use of various tools and
determining how cautious facebook users are?. In 2017 IEEE Trustcom/BigDataSE/ICESS (pp. 1139-1144). IEEE.
10. Thakur, N. S. (2013). Forensic analysis of WhatsApp on Android smartphones.

Authors: Pariniti Singh, Chinmaya Padhy


Tribological Effects of H-Bn Nano Cutting Fluid - Minimum Quantity Lubrication (Nf-Mql) on
Paper Title:
Machining Inconel 625
Abstract: Minimum quantity lubrication (MQL) is currently a widely used lubricating technique during
machining, in which minimum amount of lubricant in the form of mist is delivered to the machining interface,
thus helps to reduce the negative effects caused to the environment and human health. Further, to enhance the
productivity of machining process specifically for hard-to-cut materials, nano cutting fluid (suitably mixed nano
materials with conventional cutting fluid) is used as an alternative method to conventional lubrication (wet) in
MQL. In the current paper, h-BN nano cutting fluid was formulated with 0.1% vol. concentration of h-BN in
conventional cutting fluid for NF-MQL technique and its tribological effects on machining performance of
Inconel 625 were compared with other lubricating conditions (dry, wet, MQL conventional). The tribological
effects were analyzed in terms of tool wear analysis, chip morphology along with statistical analysis for surface
roughness and cutting forces. The optimal input machining parameters for experiments were defined by the use
of Taguchi and Grey relational based multi response optimization technique. The tribological effects of h-BN
NF-MQL shows that it is a viable and sustainable option for improving the machining performance of hard- to-
400. cut material like Inconel 625.
2306-
Keyword : Hexagonal Boron Nitride (h-BN), Nano Fluid Minimum Quantity Lubrication (NF-MQL), 2315
Tribological behavior
References:
1. Khan MMA, Mithu MAH, Dhar NR, Effects of minimum quantity lubrication on turning AISI 9310 alloy steel using vegetable oil -
based cutting fluid. J Mater Process Technol, Vol-209, no.15–16, 2009, pp.5573–5583.
2. Rahim EA, Sasahara H, A study of the effect of palm oil as MQL lubricant on high speed drilling of titanium alloys. Tribol Int,
Vol-44, no.3,2011, pp.309–317.
3. Y. Kamata T. Obikawa, High speed MQL finish- turning of Inconel 718 with different coated tools, Journal of Materials Processing
Technology, vol-192,2007, pp.281-286.
4. Y. J. Hwang, C. G. Lee, Y. M. Choi, An Investigation on Tribological Properties and Lubrication Mechanism of Graphite
Nanoparticles as Vegetable Based Oil Additive, Vol-25, no. 11, 2011, pp. 2853–2857.
5. H. D. Huang, J. P. Tu, L. P. Gan, and C. Z. Li, An investigation on tribological properties of graphite nanosheets as oil add itive, Wear,
vol. 261, no. 2, 2006, pp. 140–144.
6. Nam JS, Lee PH, Lee SW., Experimental characterization of micro-drilling process using nanofluid minimum quantity lubrication.
International Journal of Machine Tools and Manufacture, Vol-51, 2011, pp.649-652.
7. Shen, B.; Malshe, A.P.; Kalita, P.; Shih, A.J., Performance of novel MoS2 nanoparticles-based grinding fluids in minimum quantity
lubrication grinding. Transactions of NAMRI=SME, Vol-36, 2008 pp.357–364.
8. Phl Ho Lee, Jung Soo Nama, Sang Won Lee., Experimental characterization of micro-drilling process using nanofluid minimum
quantity lubrication, International Journal of Machine Tools and Manufacture, Vol- 51, no.7–8, 2011, 649-652.
9. Puneet Sharma, Blawinder Singh Sindhu, Jagdeep Sharma, Investigation of effects of nanofluids on turning of AISI D2 steel using
minimum quantity lubrication, Journal of Cleaner Production,Vol-108, Part A, 2015, 72-79.
10. Dinesh Setti Manoj Kumar Sinha Sudarsan Ghosh, P. Venkateswara Rao., International Journal of Machine Tools and
Manufacture,Vol-88, 2015, 237-248.
11. M. S. Charoo ,M. F. Wani.,Tribological properties of h‐BN nanoparticles as lubricant additive on cylinder liner and piston ring,
Lubrication Science, Vol-29, no 4, 2017, 241-254.
12. Qingming Wan,Yi Jin, Pengcheng Sun,Yulong Din., Ribological behaviour of a lubricant oil containing boron nitride nanoparticles,
Procedia Engineering, Vol-102, 2015, pp.1038 – 1045.
13. Cho DH, Kim JS, Kwon SH, Lee C, Lee YZ. Evaluation of hexagonal boron nitride nano-sheets as a lubricant additive in water.
Wear,Vol- 302, 2013, pp.981–986.
14. Çelik, O.N.; Ay, N.; Göncü, Y. E_ect of nano hexagonal boron nitride lubricant additives on the friction and wear properties of AISI
4140 steel. Part. Sci. Technol, Vol-31, 2013, pp. 501–506.
15. Sourabh Paul, Amitava Ghosh, Grinding of WC-Co cermets using hexagonal boron nitride nano-aerosol,
International Journal of Refractory Metals and Hard Materials, Vol-78, 2019, pp-264-272.
16. S. Khandekar, M. Ravi Sankar, V. Agnihotri, and J. Ramkumar, Nano-Cutting Fluid for Enhancement of Metal Cutting Performance,
Materials and Manufacturing Processes, Vol-27, 2012, pp.1–5.
17. Satish Chinchanikar, A.V. Salve, P.Netake, A.More, S Kendre, R Kumar, Comparative evaluations of surface roughness under dry and
water based and vegetable oil based cutting fluid, Procedia Materials Science, Vol-5, 2014 , pp.1966 – 1975.
18. Lipp A, Schwetz K A, Hunold K., Hexagonal Boron Nitride: Fabrication, Properties and Applications. J Eur Ceram Soc, Vol-5, no.1,
1989, pp 3-9.
19. Singh, P., and Padhy, C. P., Study on the rheological properties of h-BN nano cutting fluid in MQL machining of Inconel 625. i-
manager’s Journal on Material Science, Vol-6, no.4,2019, pp. 59-66.
20. Tsao CC.,Grey- Taguchi method to optimize the milling parameters of alluminium alloy, Int J Adv Manuf Technol, Vol-40,2009,pp.
41-18.
21. Ng David KW., Grey system and grey relational model, ACM SIGICE Bulletin, Vol-20, no.2, 1994, pp.1–9.
22. Lin JL, Wang KS, Yan BH, Tarng YS, Optimization of the electrical discharge machining process based on the Taguchi method with
fuzzy logics. “J Mater Process Technology”, Vol-102, 2000, pp.48–55.
23. Poulachon, G., Bandyopadhyay, B.P., Jawahir, I.S., Pheulpin, S., Seguin, E., Wear behavior of CBN tools while turning various
hardened steels, Wear, Vol- 256, 004, pp.302-10.
24. S. Hernandez, J. Hardell, H. Winkelmann, M. Rodriguez Ripoll, B. Prakash, Influence of temperature on abrasive wear of boron steel
and hot forming tool steels, Wear, vol.338-339, 2015, pp. 27-35.

Authors: Sreedevi B, V.Sellam

Paper Title: Secure Social Network Based Healthcare


Abstract: Healthcare system holds a huge amount of data due to the number of tests taken by the patients
and are maintained in physical files or digital files in form of records. At the end of the treatment, a discharge
summary of the files will be sent along with the patients. All the records of the patients are maintained in the
hospital by MRD (Medico Record Department). Maintanence of records are of very high cost and data security,
integrity should be maintained. When patients migrate from one hospital to another, they ought to provide their
past records to the doctor for diagnosis. There is a very high probability for the patients to miss their records
after many years. A social network based system can be developed in which the patient’s data is stored in cloud
and can be shared among the healthcare centres. Each hospital can send requests regarding a patients’s past
records to other hospital and records can be retrieved. This helps doctors to have a greater incite on the reports,
and repeated tests are avoided for the search of the missing information. As medical records are very sensitive,
security and privacy concerns are high. To secure data, blockchain is used in which the data are stored in off-
chain and their hashes are stored on-chain. The data in off-chain are encrypted using Advanced Encryption
Standard(AES).

Keyword : Advanced Encryption Standard, Blockchain, Cloud, Digital files, Medico Record Department.

401. References:
1. C. Esposito, A. De Santis, G. Tortora, H. Chang, and K.-K. R. Choo, ‘‘Blockchain: A panacea for healthcare cloud-based data security
and privacy?’’ IEEE Cloud Comput., vol. 5, no. 1, pp. 31–37, Jan./Feb. 2018. 2316-
2. Hao Jin, Yan Luo, Peilong Li and Jomol Mathew, “A Review of Secure and Privacy-Preserving Medical Data Sharing” IEEE, p. May 2319
14, 2019.]
3. Nikita Sanghi, Rupali Bhatnagar, Gaganjot Kaur and Vinay Jain, “BlockCloud: Blockchain with Cloud Computing”, International
Conference on Advances in Computing, Communication Control and Networking, p. 2018.
4. Asaph Azaria, Ariel Ekblaw, Thiago Vieira, Andrew Lippman, “MedRec: Using Blockchain for Medical Data Access and Permission
Management”2016 2nd International Conference on Open and Big Data (OBD), p.25-30, 2016.
5. Navya M S, A Nihitha, Anjan K Koundinya, “Cloud Based Application for Health Monitoring System Using Wearable Sensors, 2016
International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS), 2016.
6. Ming Li, Shucheng Yu, Yao Zheng, Kui Ren, Wenjing Lou, “Scalable and Secure of Personal Health Records in Cloud Computing
Using Attribute Based Encryption”, IEEE Transactions on Parallel and Distributed Systems, vol.24, 2013.
7. Valentina Casola, Aniello Castiglione, Kim-Kwang Raymond Choo, Christian Esposito,“Healthcare-Related Data in the Cloud:
Challenges and Opportunities”, IEEE Cloud Computing, vol. 3, 2016
8. Quratulain Alam, Saif U. R. Malik, Adnan Akhunzada, Kim-Kwang Raymond Choo, Saher Tabbasum, Masoom Alam, “A Cross Tenant
Access Control Model for Cloud Computing: A Formal Specification and Verification”, IEEE Transactions on Information Forensics
and Security, vol. 12, 2017.
9. (2016). General Data Protection Regulation. [Online]. Available: https://eugdpr.org/the-regulation/
10. W. Raghupathi and V. Raghupathi, ‘‘Big data analytics in healthcare: Promise and potential,’’ Health Inf. Sci. Syst., vol. 2, no. 1, p. 3,
2014.
11. BlockChain, https://en.wikipedia.org/wiki/Blockchain
12. (2018). Healthcare Industry Ranks 8th for Cybersecurity but Poor DNS Health and Endpoint Security of Concern. [Online]. Available:
https://www.hipaajournal.com/healthcare-data-breach-statistics/
13. (2017). Summary of the HIPAA Security Rule. [Online]. Available: https://www.hhs.gov/hipaa/for-professionals/security/laws-
regulations/
14. Coindesk,‖What is BlockChain Technology‖,
https://www.coindesk.com/information/what-is-blockchain-technology
15. Advanced Encryption Standard. [Online]. Available:https://www.tutorialspoint.com/cryptography/advanced_encryption_standard.htm
16. Erl-Huei Lu, Kuo -Tsang Huang and Jung-Hui, “Word-Based AES Encryption Without Data Expansion” Journal of information science
and engineering 32, p. 2016.
Mikhail Mikhailovich Turkin, Maria Aleksandrovna Volkova, Pavel Valerievich Zhesterov, Georgij
Authors:
Nikolaevich Kuleshov
Paper Title: Civil Action as One of The Ways of Damage Compensation
Abstract: This article is devoted to damage compensation, as exemplified by administrative law through
the filing of a civil lawsuit. The paper attempts to conduct a comprehensive analysis of ways to compensate for
damages caused by unlawful conduct during an administrative offense. For example, a certain parallel has been
drawn between the sources of criminal procedural law and administrative law in filing a civil lawsuit for damage
reparation. In addition, the norms of the current legislation of the Russian Federation governing the filing of a
civil lawsuit in the framework of proceedings on administrative offenses are analyzed. As an example, petty
hooliganism was chosen as one of the most common offenses in Russia. The article also reflects the existence of
differences in the concepts of “harm”, “loss” and “damage”. At the same time, loss is considered to be a more
common form of expression of property (material) harm in civil law relations.

Keyword : administrative responsibility, administrative offense, civil action, criminal process.


References:
1. A.L. Shilovskaya, S.J. Starodumova, M.A. Volkova, P.V. Zhesterov, “The judicial practice of the European Court in the sphere of non-
material reputational harm”, Man in India, vol. 96(12), 2016, pp. 5635-5645.
2. N.S. Degtyareva, “The concept of damage, its differences from harm and loss. Types of damage and procedure for compensation”,
ConsultantPlus, 2018. Available: http://www.consultant.ru/cons/cgi/online.cgi?req=doc&base=CJI&n=106794#05614019314163996
402. 3. S.J. Starodumova, M.A. Volkova, A.A. Neznamova, G. N. Kuleshov, R.R. Lenkovskaya, “The Problems of Responsibility for
Violation of Legislation Regulating the Information Security on the Internet,” Revista Espacios, vol. 39(45), 2018, p. 25. 2320-
4. A.S. Kurbanov, R.R. Lenkovskaya, N.V. Lutovinova, A.E. Zolotareva, P.V. Zhesterov, “Information Security and the Internet”, 2322
International Journal of Engineering & Technology, vol. 7(3.15), 2018, pp. 273-276.
5. Y.A. Svirin, A.A. Mokhov, V.A. Gureev, S.N. Shestov, A.L. Shilovskaya, “Proof and evidence in cases involving compensation for
damage caused to health or life of a citizen as a result of the use of drugs for medical use”, Journal of Advanced Research in Law and
Economics, vol. 8(1), 2017, pp. 250-260.
6. M.A. Soynikov, “Civil lawsuit in criminal proceedings: history, modernity, prospects”, ConsultantPlus. Available:
http://www.consultant.ru/cons/cgi/online.cgi?req=doc&base=CJI&n=109459#02209341413980772
7. D.V. Osintsev, “Administrative responsibility: legal construction and the realities of legal practice”, Electronic Supplement to the
Russian Law Journal, vol. 4, 2015, pp. 32-51.
8. V.A. Malcev, G.N. Kuleshov, A.A. Neznamova, N.V. Lutovinova, A.A. Guryleva, “Civil liability insurance of vehicle owners in
European Union countries and the Russian federation: Comparative legal analysis”, Man in India, vol. 96(12), 2016, pp. 5565-5574.
9. A.L. Shilovskaya, M.A. Volkova, S.J. Starodumova, R.R. Lenkovskaya, A.A. Neznamova, “On Correlation between the Means of
Protection of Rights in Family Law and Civil Law”, International Journal of Civil Engineering and Technology, vol. 9(10), 2018, pp.
1686-1694.
10. O. Kaurova, A. Maloletko, O. Yumanova, “Ways to counter retrieval of "shadow income" from businesses with fixed assets in
hospitality”, Middle East Journal of Scientific Research, vol. 15(5), 2013, pp. 757-762.
11. V.I. Kataeva, O.V. Kaurova, S.V. Koludarova, T.V. Fomicheva, E.M. Kryukova, “Barriers of inequality in social institutions of
Russia”, Biosciences Biotechnology Research Asia, vol. 12(3), 2015, pp. 2813-2820.
12. I. Zaytsev, “Administrative law suits”, Russian Justice, vol. 4, 1996.
13. M.G. Avdyukov, D.D. Averin, S.V. Anosova, A.A. Dobrovolsky, A.F. Kleinman, E.N. Kovaleva, P.V. Loginov, P.V. Smyshlyaev,
“Soviet Civil Proceedings. Textbook. Features of the proceedings and resolution of a civil action in the criminal process under the
legislation of the late XIX century”, Bulletin of the Kostroma State Technological University; State and Law: Theoretical and
Practical Issues, Legal Science, vol. 1(2), 1970, p. 57.

Authors: Amit Pratap Singh, Maitreyee Dutta

Paper Title: An Efficient Classifier for Spam Detection in Social Network


Abstract: The way to stay connects users with their friends provided by the Social networks. The
popularity of social networks has been increasing day-by-day and enables users to collect huge volume of
information about their friends. Various social networking sites are available among them, Twitter is fastest
growing website. Due to its popularity various spammers are attracted towards it to utilized large amounts of
spam to modify authorised users accounts. In this paper, the “Spam detection system in social sites” is developed
for detection of spammer through the technique of machine learning. The work is initiated towards collection of
data from H-Spam 14 site and then applied pre-processing mechanism such as conversion of data into lowercase
403. and, removal of stop words etc. After this phase, the pre-processed data comes into the phase of feature
extraction, which involves process of tokenization that used to split the entire sentences into a word-group and
2323-
so the best features has been extracted from the raw data. To select the optimized value from extracted set of
2328
features, the optimization algorithm, Artificial Bee Colony (ABC) has utilized here to obtain the optimal sets of
feature from spam along with non-spam data. The next process has to be done through Artificial Neural Network
(ANN) to differentiate the spam and non-spam data. In the final process, the parameters for performance
measure and compare the proposed and existing work to check the improvement in proposed work. In this
proposed work the spam detection system gained higher accuracy, precision, recall and F-measure as compare to
the previously utilized classifiers named as naïve Bayes and Support vector machine (SVM).

Keyword : Spam detection, Twitter, ABC , AN, tokenization.


References:
1. Grier, C., Thomas, K., Paxson, V., & Zhang, M. (2010, October). @ spam: the underground on 140 characters or less. In Proceedings of
the 17th ACM conference on .Computer and communications security (pp. 27-37). ACM.
2. Wang, A. H. (2010, June). Detecting spam bots in online social networking sites: a machine learning approach. In IFIP Annual
Conference on Data and Applications Security and Privacy (pp. 335-342). Springer, Berlin, Heidelberg.
3. Wu, T., Liu, S., Zhang, J., & Xiang, Y. (2017, January). Twitter spam detection based on deep learning. In Proceedings of the
Australasian Computer Science Week Multiconference (p. 3). ACM.
4. Zheng, X., Zeng, Z., Chen, Z., Yu, Y., &Rong, C. (2015). Detecting spammers on social networks. Neurocomputing, 159, 27-34.
5. Alsaleh, M., Alarifi, A., Al-Salman, A. M., Alfayez, M., &Almuhaysin, A. (2014, December). Tsd: Detecting sybil accounts in twitter.
In 2014 13th International Conference on Machine Learning and Applications (pp. 463-469). IEEE.
6. Verma, M., &Sofat, S. (2014). Techniques to detect spammers in twitter-a survey. International Journal of Computer
Applications, 85(10).
7. Wang, D., Irani, D., &Pu, C. (2011, September). A social-spam detection framework. In Proceedings of the 8th Annual Collaboration,
Electronic Messaging, Anti-Abuse and Spam Conference (pp. 46-54). ACM.
8. Cao, C., &Caverlee, J. (2015, March). Detecting spam urls in social media via behavioral analysis. In European Conference on
Information Retrieval Springer, Cham, pp. 703-714.
9. Jain, G., Sharma, M., &Agarwal, B. (2018). Spam detection on social media using semantic convolutional neural network. International
Journal of Knowledge Discovery in Bioinformatics (IJKDB), 8(1), 12-26.
10. Ezpeleta, E., Iturbe, M., Garitano, I., de Mendizabal, I. V., &Zurutuza, U. (2018, June). A Mood Analysis on Youtube Comments and a
Method for Improved Social Spam Detection. In International Conference on Hybrid Artificial Intelligence Systems Springer, Cham,
pp. 514-525.
11. Dwyer, C., Hiltz, S., &Passerini, K. (2007). Trust and privacy concern within social networking sites: A comparison of Facebo ok and
MySpace. AMCIS 2007 proceedings, 339.
12. Dutta, S., Ghatak, S., Dey, R., Das, A. K., &Ghosh, S. (2018). Attribute selection for improving spam classification in online social
networks: a rough set theory-based approach. Social Network Analysis and Mining, 8(1), 7.
13. Ala’M, A. Z., Faris, H., &Hassonah, M. A. (2018). Evolving Support Vector Machines using Whale Optimization Algorithm for spam
profiles detection on online social networks in different lingual contexts. Knowledge-Based Systems, 153, 91-104.
14. Aslan, Ç. B., Sağlam, R. B., & Li, S. (2018). Automatic Detection of Cyber Security Related Accounts on Online Social Networks:
Twitter as an example.
15. Sedhai, S., & Sun, A. (2018). Semi-supervised spam detection in the Twitter stream. IEEE Transactions on Computational Social
Systems, 5(1), 169-175.
16. http://shodhganga.inflibnet.ac.in/bitstream/10603/183741/7/07_chapter%201.pdf.

Authors: Kiefer Stefano Ranti, Kelvin Salim, Andary Dadang Yuliyono, Abba Suganda Girsang

Paper Title: Clustering Behavioral Data for Advertising Purposes using K-Prototypes Algorithm
Abstract: Understanding the customer sentiment is very important when it comes to advertising. To appeal to
their current and potential customers, a company must understand the market interests. Companies can segment
their customers by using surveys and telemetry data to get to know the customer’s interests. One way of segmenting
the customer is by grouping or clustering them according to their interests and behaviors. In this study, the k-
prototypes clustering algorithm, which is an improved combination of k-means and k-modes algorithm, will be used
to cluster a behavioral data that contains both numerical and categorical attribute, obtained from a survey conducted
on teenagers into clusters of 4, 5, and 6. Each cluster will contain teenagers with certain behavior different from other
clusters. And then by analyzing the results, advertisers will be able to define a profile that indicates their interests
regarding the internet, social media and text messaging, effectively revealing the kind of ad that would be relatable
for them.

Keyword : Behavioral data, Cluster Analysis, Interest, K-Prototypes.

References:
1. A. Lenhart, “Mobile access shifts social media use and other online activities,” Teens, Social Media & Technology Overview, 2015.
[Online]. Available: http://www.pewinternet.org/2015/04/09/mobile-access-shifts-social-media-use-and-other-online-activities/.
2. E. Wright, N. M. Khanfar, C. Harrington, and L. E. Kizer, “The Lasting Effects Of Social Media Trends On Advertising,” J. Bus.
Econ. Res., vol. 14, no. 3, pp. 75–82, 2016.
3. A. Farahat, “How effective is targeted advertising?,” Proc. Am. Control Conf., pp. 6014–6021, 2013.
404. 4. Y. K. Dwivedi, K. K. Kapoor, and H. Chen, “Social media marketing and advertising,” Mark. Rev., vol. 15, no. 3, pp. 289–309, Oct.
2015. 2329-
5. D. S. Rajagopal, “Customer Data Clustering using Data Mining Technique,” Int. J. Database Manag. Syst., vol. 3, no. 4, Dec. 2011. 2334
6. C. A. Summers, R. W. Smith, and R. W. Reczek, “An audience of one: Behaviorally targeted ads as implied social labels,” J. Consum.
Res., vol. 43, no. 1, pp. 156–178, 2016.
7. J. Yan, N. Liu, G. Wang, W. Zhang, Y. Jiang, and Z. Chen, “How much can Behavioral Targeting help online advertising?,” WWW’09
- Proc. 18th Int. World Wide Web Conf., pp. 261–270, 2009.
8. B. Ur, P. G. Leon, L. F. Cranor, R. Shay, and Y. Wang, “Smart, useful, scary, creepy: Perceptions of online behavioral advertising,”
SOUPS 2012 - Proc. 8th Symp. Usable Priv. Secur., vol. 2012, 2012.
9. G. Chicco, R. Napoli, and F. Piglione, “Comparisons among clustering techniques for electricity customer classification,” IEEE Trans.
Power Syst., vol. 21, no. 2, pp. 933–940, 2006.
10. D. Zakrzewska and J. Murlewski, “Clustering algorithms for bank customer segmentation,” Proc. - 5th Int. Conf. Intell. Syst. Des.
Appl. 2005, ISDA ’05, vol. 2005, pp. 197–202, 2005.
11. R. Sifa, A. Drachen, and C. Bauckhage, “Large-scale cross-game player behavior analysis on steam,” Proc. 11th AAAI Conf. Artif.
Intell. Interact. Digit. Entertain. AIIDE 2015, vol. 2015-Novem, pp. 198–204, 2015.
12. Z. Huang, “Extensions to the k-means algorithm for clustering large data sets with categorical values,” Data Min. Knowl. Discov., vol.
2, no. 3, pp. 283–304, 1998.
13. P. Awasthi, M. Charikar, R. Krishnaswamy, and A. K. Sinop, “The Hardness of Approximation of Euclidean κ -Means,” Leibniz Int.
Proc. Informatics, LIPIcs, vol. 34, pp. 754–767, 2015.
14. A. K. Jain, “Data clustering: 50 years beyond K-means,” Pattern Recognit. Lett., vol. 31, no. 8, pp. 651–666, 2010.
15. C. Slamet, A. Rahman, M. A. Ramdhani, and W. Dharmalaksana, “Clustering the verses of the holy qur’an using K-means algorithm,”
Asian J. Inf. Technol., vol. 15, no. 24, pp. 5159–5162, 2016.
16. G. Gan and M. K. P. Ng, “K-Means Clustering With Outlier Removal,” Pattern Recognit. Lett., vol. 90, pp. 8–14, 2017.
17. F. Jiang, G. Liu, J. Du, and Y. Sui, “Initialization of K-modes clustering using outlier detection techniques,” Inf. Sci. (Ny)., vol. 332,
pp. 167–183, 2016.
18. Y. Qian, F. Li, J. Liang, B. Liu, and C. Dang, “Space Structure and Clustering of Categorical Data,” IEEE Trans. Neural Networks
Learn. Syst., vol. 27, no. 10, pp. 2047–2059, 2016.
19. Q. Duan, Y. L. Yang, and Y. Li, “Rough K-modes clustering algorithm based on entropy,” IAENG Int. J. Comput. Sci., vol. 44, no. 1,
pp. 13–18, 2017.
20. R. S. Sangam and H. Om, “An equi-biased k-prototypes algorithm for clustering mixed-type data,” Sadhana - Acad. Proc. Eng. Sci.,
vol. 43, no. 3, pp. 1–12, 2018.
21. J. Li, X. Gao, and L. C. Jiao, “A GA-based clustering algorithm for large data sets with mixed and categorical values,” Proc. - 5th Int.
Conf. Comput. Intell. Multimed. Appl. ICCIMA 2003, pp. 102–107, 2003.
22. J. Ji, T. Bai, C. Zhou, C. Ma, and Z. Wang, “An improved k-prototypes clustering algorithm for mixed numeric and categorical data,”
Neurocomputing, vol. 120, pp. 590–596, 2013.
23. P. Arora, Deepali, and S. Varshney, “Analysis of K-Means and K-Medoids Algorithm for Big Data,” Phys. Procedia, vol. 78, no.
December 2015, pp. 507–512, 2016.

Authors: Reem Alnanih

Paper Title: Characterizing Traffic Context-based User Experience for Public Safety
Abstract: The modern interconnected digital world is a result of the rapid growth of information and
communication technology (ICT.) A smart city aims to provide a single technological platform through
integrating all its services, devices, interfaces, and infrastructure, allowing the city to operate in an intelligent
way that can support social and benefit from the user experience. In this context, one of the critical issues
associated with fast urbanization is traffic management, which needs intelligent infrastructures. In this paper,
aiming to enhance public security, improve user experience, and ensure smooth traffic flow, a road traffic signal
control mechanism is proposed to automatically control the duration of a green light signal at the signalized road
intersections by using an intelligent fuzzy rule-based system (FRBS). This can assist traffic signal plan, which
dynamically adjusts the time required for switching between green and red lights. For this purpose, the concept
of traffic context based on user experience is proposed to define the context in terms of the number of vehicles,
the number of pedestrians, time of day, and the weather conditions as the inputs for the fuzzy control system.
The proposed system was designed keeping in view the busy junctions joining important and busy areas; the
system is effective for traffic congestion control, energy saving, and enhancing public security and comfort.
Also, the FRBS-assisted system is very flexible and not limited to the defined antecedents; consequently, it can
be easily extended to accommodate other variables on demand, making it adaptive to any road intersection
scenario.

Keyword : Fuzzy Rule-Based System, Intelligent Transportation Systems, Traffic Context, User Experience.
References:
1. Fend, S.; Setoodeh, P.; Haykin, S. Smart Home: Cognitive Interactive People-Centric Internet-of-Things. IEEE Communications
Magazine, 2017, 55, 34-39.
2. Weng. T.; Agarwal, Y. From Buildings to Smart Buildings-Sensing and Actuation to Improve Energy Efficiency. IEEE Design and
Test of Computers, 2012, 29, 36-44.
3. Chiwewe, T.M.; Mbuya, C.F.; Hancke, G.P. Using Cognitive Radio for Interference-Resistant Industrial Wireless Sensor Networks:
An Overview. IEEE Transactions on Industrial Informatics, 2015, 11, 1466-1481.
4. Vlacheas, P.; Glaffreda, R.; Stavroulakl, V.; Kelaidonis, D.; Foteinos, V.; Poulios, G.; Demestichas, P. Enabling Smart Cities through
405. a Cognitive Management Framework for the Internet of Things. IEEE Communication Magazine, 2013, 51, 102-111.
5. Foschini, L.; Taleb, T.; Corradi, A.; Bottazzi, D. M2M based Metropolitan Platform for IMS-enabled Road Traffic Management in 2335-
IoT. IEEE Communications Magazine, 2011, 49, 50-57.
6. Amendola, S.; Lodato, R.; Manzari, S.; Occhiuzzi, C.; Marrocco, G. RFID technology for IoT-based Personal Healthcare in Smart
2343
spaces. IEEE Internet of Things Journal, 2014, 1, 144-152.
7. Fonesca, L.M. Industry 4.0 and the Digital Society: Concepts, Dimensions and Envisioned Benefits. Proceedings of the 12th Int.
Conf. on Business Excellence, Sciendo, 2018, 12, 386-397.
8. Sultan, K. Fuzzy Rule Based System (FRBS) assisted Energy Efficient Controller for Smart Streetlights: An Approach Towards
Internet-of-Things (IoT). Journal of Communications, 2018, 13, 518-523.
9. Patil, R.; Srinivasaraghavan, A. Smart Traffic Controller Using Fuzzy Inference System (STCFIS), in Proceedings of the 2nd
International Conference on Next Generation Computing Technologies, Dehradun, India, Oct. 14-16, 2016.
10. ISO. Road Vehicles – Transportation information and control system – Detection Response Task (DRT) for assessing attentional
effects of cognitive load in driving. International Standard, ISO 17488, 2016.
11. Perrin, J.; Martin, P; Hansen, B. Modifying Signal Timing during Inclement Weather, in Proceedings of the ITE Annual Meeting and
Exhibit, Philadelphia, PA, USA, 2002.
12. Pisano, P.; Goodwin, L. Surface Transportation Weather Applications, in Proceedings of the ITE Annual Meeting and Exhibit,
Philadelphia, PA, USA, 2002.
13. Bhanja, U.; Kumar, R.; Routroy, A.; Behura, S.; Mahapatra, S. Dynamic Traffic Congestion Detection in VANETS using a Fuzzy
Rule-Based System and K-means Clustering, in Proceedings of the IEEE International Conference on Advanced Networks and
Telecommunications Systems (ANTS), Bhubaneswar, India, Dec. 17-20, 2017, 1-6.
14. Zaid, A.; Suhweil, Y.; Yaman, M. Smart Controlling for Traffic Light Time, in Proceedings of the IEEE Jordan Conference on
Applied Electrical Engineering and Computing Technologies (AEECT), Aqaba, Jordan, Oct. 11-13, 2017, 1-5.
15. Cueva-Fernandez, G.; Pascual Espada, J.; García-Díaz, V.; Gonzalez-Crespo, R. Fuzzy Decision Method to Improve the Information
Exchange in a Vehicle Sensor Tracking System. Appl. Soft Comput. 2015, 35, 708-716.
16. Blond, S.L.; Aggarwal, R. A Review of Artificial Intelligence Techniques as Applied to Adaptive Autoreclosure, with Particula r
Reference to Deployment with Wind Generation, in Proceedings of the Universities Power Engg. Conference, 2009.
17. Jiang, J.; Syue, C.; Wang, C.; Wang, J.; Shieh, J. An Interval Type-2 Fuzzy Control System for Stock Index Forecasting based on
Fuzzy Time Series and A Fuzzy Logical Relationship Map. IEEE Access, 2018, 6, 69107-69119.
18. Yang, C.; Jiang, Y.; Na, J.; Li, Z.; Cheng, L.; Su, C. Finite-time Convergence Adaptive Fuzzy Control for Dual-Arm Robot with
Unknown Kinematics and Dynamics. IEEE Trans. Fuzzy Systems, 2019, 27, 574-588.
19. Qinghua, H.; Minghai, P.; Wucai, Z.; Zhiheng, L. Time Resource Management of OAR Based on Fuzzy Logic Priority for Multiple
Target Tracking. J. Systems Engineering and Electronics, 2018, 29 (4), 742-755.
20. Sultan, K.; Qureshi, I.M.; Atta-ur-Rahman, Zafar, B.A.; Zaheer, M. CSI Based Multiple Relay Selection and Transmit Power Saving
Scheme for Underlay CRNs Using FRBS and Swarm Intelligence. Int. J. Applied Metaheuristic Computing, 2019, 10, 2.
21. Soleymani, S.A.; Abdhullah, A.H.; Zareeri, M.; Anisi, M.H.; Rosales, C.V.; Khan, M.K.; Goudarzi, S.A. Secure Trust Model based
on Fuzzy Logic in Vehicular Ad Hoc Networks with Fog Computing. IEEE Access, 2017, 5, 15619-15629.
22. Horng, G.J.; Li, J.P.; Cheng, S.T. Traffic Congestion Reduce Mechanism by Adaptive Road Routing Recommendation in Sm art City,
in Proceedings of the 3rd Int. Conf. on Consumer Electronics, Communications and Networks, Xianning, China, Nov. 20 -22, 2013.
23. Dhajel, S.; Smith, N.; Wang, S.; Murphy, J. Reducing Emergency Services Response Time in Smart Cities: An Advanced Adaptive
and Fuzzy Approach, in Proceedings of the IEEE 1st Int. Smart Cities Conference, Guadalajara, Mexico, Oct. 25-28, 2015.
24. Pau, G.; Campisi, T.; Canale, A.; Severino, A.; Collotta, M.; Tesoriere, G. Smart Pedestrian Crossing Management at Traffic Light
Junctions through a Fuzzy-Based Approach. Future Internet, 2018, 10, 1-19.
25. Alkestrup, R. Smart City Traffic Management. Department of Applied Mathematics and Computer Science, 2017.
26. Kumar, T.; Gupta, S.; Kushwaha, D.S. An Efficient Approach for Automatic Number Plate Recognition for Low Resolution Images,
in Proceedings of the 5th Int. Conference on Network, Communication and Computing, Kyoto, Japan, Dec. 17-21, 2016.
27. Muralidharan, A.; Coogan, S.; Flores, C.; Varaiya, P. Management of Intersections with Multi-modal High-Resolution Data. Transp.
Res. Part C Emerg. Technol., 2016, 68, 101-112.
28. Wadi, M.; Shobole, A.; Tur, M.; Baysal, M. Smart Hybrid Wind-Solar Street Lighting System Fuzzy Based Approach: Case Study
Istanbul-Turkey, in Proceedings of the 6th International Istanbul Smart Grids and Cities Congress and Fair (ICSG), Istanbul, Turkey,
April 25-26, 2018.
29. Giuffre, T.; Campisi, T.; Tesoriere, G. Implications of Adaptive Traffic Light Operations on Pedestrian Safety. IOSR J. Mech. Civ.
Eng., 2017, 13, 58-63.
30. Fang, G. A Survey on Analysis and Design of Model-based Fuzzy Control Systems. IEEE Trans. Fuzzy Systems, 2006, 14, 676-697.
31. Mamdani, E.H. Application of Fuzzy Logic to Approximate Reasoning using Linguistic Synthesis. IEEE Transactions on Computers,
C-26, 1977, 1182-1191.
32. Keneni, B.M.; Kaur, D.; Bataineh, A.; Devabhaktuni, V.K.; Javaid, A.Y.; Zaientz, J.D.; Marinier, R.P. Evolving Rule -Based
Explainable Artificial Intelligence for Unmanned Aerial Vehicles. IEEE Access, 2019, 7, 17001-17016.

Authors: B.M. Azimov, L.F. Sulyukova, M.B. Azimov

Paper Title: Modeling and Research of the Controllability of Wheeled Tractors


Abstract: In this paper we considered the issues of controllability and stability of wheeled tractors on the
slopes with the help of mathematical modeling and optimal control. The well-known methods of modeling and
research for improving the stability of the tractor do not allow solving the problem of stable motion of the tractor
on the slopes, as they do not provide sufficient correction of the moving direction, which depends on the
character of external disturbances. The application of modern optimal control methods allows to investigate this
problem at the design phase of the machine with using mathematical models. To solve the problem, we created
the equations of motion of a wheeled tractor using the Lagrange equations of the second kind. On the basis of
the equations of motion we developed models and algorithms for optimal control of a wheeled tractor. The
necessary conditions for optimal control of the motion using the Pontryagin maximum principle were
investigated. With the help of auxiliary functions of Hamilton-Pontryagin, we have determined the coefficients
of stiffness and viscous resistance of wheel tractor tires. The boundary value problem of the maximum principle
to determine the transient process motion of the tractor is formulated and on its basis the equations of horizontal
and vertical oscillations of the tractor were solved at an uneven distribution of mass between the front and rear
driven wheels and the coefficient of adhesion of the wheels and the lateral slip of the tractor in turning were
calculated.

Keyword : wheeled tractor, modeling, optimal control, wheel adhesion, lateral slip.
References:
1. B.M. Azimov, Sh.A. Akhmedov, A.R. Ruzikulov, M.B. Azimov, “Modeling and optimal control of the movement of a four-wheel
406. universal tractor with a continuously adjustable ground clearance”, Journal Computational and Applied Mathematics, Vol. 6. Tashkent,
2018, pp.22-35. 2344-
2. B.M. Azimov, D.K. Yakubjanova, “Imitation modeling and calculation of the parameters of Lateral forces components of guide wheels
of Cotton-picker MH-1.8”, International journal of advanced research in science, engineering and technology, vol.5, Issue 1, 2018, 2351
pp.5024-5032.
3. V.V. Guskov and others, Tractors: Theory, Moskow: Mashinostroenie, 1988, pp.33−35.
4. G.A. Smirnov, Theory of the movement of wheeled vehicles, Moskow: Mashinostroenie, 1990, pp.145-230.
5. Mc.L. John Bennett, Nathan P. Woodhouse, Thomas Keller, Troy A. Jensen, and L. Diogenes, “Advances in Cotton Harvesting
Technology: a Review and Implications for the John Deere Round Baler Cotton Picker”, Journal of Cotton Science, vol.19, 2015,
pp.225-249. http://journal.cotton.org,
6. Z. L. Zhou, J.Q. Ding, L.Y. Xu, M.X. Xing, Y.T. Liu, “ Optimal Control for Tractor Automatic Transmission Shift Process”, Advanced
Materials Research, vol. 468-471, pp. 2241-2247, 2012. https://www.scientific.net/AMR.468-471.2241.
7. Fl. Loghin, T.A. Ene, V. Mocanu, I.Capatîna, “Dynamic modeling of technical system tractor - seed drill. Bulletin of the Transilvania
University of Brasov”, Series II: Forestry • Wood Industry • Agricultural Food Engineering , Vol. 5 (54) , No. 1, 2012, pp. 155-160.
8. Marco Bietresato, Dario Friso, Luigi Sartori, “Assessment of the efficiency of tractor transmissions using acceleration tests”,
Biosystems Engineering, vol. 112(3), pp. 171–180, July 2012.
9. C.G. Masi, “Simulation Software in Motion Control”, Control Engineering, 2010. https://www.controleng.com/search/search-single-
display/simulation-software-in-motion-control/5bfbdfb975.html
10. V.M. Sharipov, M.I. Dmitriev, A.S. Zenin, “The Mathematical Model of Gear Shifting in a Tractor Gearbox” SCIENCE &
EDUCATION, Bauman Moscow State Technical University, 2014. http://technomag.bmstu.ru/en/doc/711329.html
11. V.N. Afanasyev, V.B. Kolmanovsky, V.R. Nosov, Mathematical theory of designing control systems. Moscow: Higher school, 1989,
pp. 162−163.
12. K.A. Babashev, M.B. Azimov, “Mathematical modeling and process control of wheeled vehicles” Proceedings of the XVIII
International Scientific and Methodological Conference "Informatics: problems, methodology, technology". Vol. 5, pp. 108-113,
Voronezh, Publishing House: Scientific Research Publications, LLC Velborn, 2018.
13. F.P. Vasiliev, Numerical methods for solving extremal problems, Moscow: Nauka, 1988, pp. 421−485.
14. A.N. Belyaev, T.V. “Trishina Study of the kinematics of the rotation of the wheeled tractor”, vol. 1 (48), Bulletin of the Voronezh State
Agrarian University, 2016, pp.115-120.
15. S.A. Dudnikov, S.V. Shchitov, “Investigation of the kinematics of turning a class 1.4 tractor”/ Vestnik KrasGAU, vol. 211(1), pp.1 58-
163.

Authors: J.Pradeep Kumar, D.S.Robinson Smart, Erick C. Jones


407. Experimental Evaluation of Mechanical, Wear and Corrosion properties of AA5083/Graphite Metal
Paper Title:
Matrix Composite Prepared using Compocasting Process
Abstract: In most of the engineering applications such as aviation, defence, marine and automotive
requires components with light weight and along with favorable mechanical properties; this demand perhaps
satisfied by metal matrix composites (MMCs) of aluminium by virtue of its distinguished achievement. Also
MMCs suffer from insufficient process stability, in-adequate economic efficiency and reliability. In the present
research work an experiment was developed to synthesize metal matrix composite adopting Aluminium Alloy
(AA) 5083 as matrix material reinforced with graphite particulates (6 wt %, 8 wt % & 10 wt %) using two stage
in-situ stir casting process. Experiments were implemented to analyze mechanical and tribological properties
like ultimate tensile strength, microhardness, wear characteristics and corrosion properties. From the above
investigations, it is revealed that microhardness increases with decrease in tensile strength with upsurge in more
wt % of reinforcement. Due to the very high self-lubricating property of graphite significant reduction in wear
can be observed with deepen in wt % of graphite. Also corrosion rate decreases with more amount of graphite
particulate when compared with base matrix material.

Keyword : AA5083, Graphite, Metal Matrix Composite, Stir casting.


References:
1. O. Bamane, S. Patil, L. Agarwal, and P. Kuppan, “Fabrication and Characterization of AA7075 Metal Matrix Composite Reinforced
with MWCNT,” Materials Today Proceedings, vol. 5, no. 2, pp. 8001–8007, 2018.
2. H. A. Al-Salihi, A. A. Mahmood, and H. J. Alalkawi, “Mechanical and wear behavior of AA7075 aluminum matrix composites
reinforced by Al2O3 nanoparticles,” Nanocomposites, vol. 0, no. 0, pp. 1–7, 2019.
3. V. Rastogi and R. Sharma, “Aluminium metal matrix composites : A retrospective investigation,” Indian Journal of Pure and App lied
Physics., vol. 56, no. 2, pp. 164–175, 2018. 2352-
4. N. Raj, and N. Radhika, “Tribological Characteristics of LM13/Si 3N4/Gr Hybrid Composite at Elevated Temperature,” Silicon, pp. 1–
14, 2018.
2357
5. V. Balaji, N. Sateesh, and M. M. Hussain, “Manufacture of Aluminium Metal Matrix Composite (Al7075-SiC) by Stir Casting
Technique,” Materials Today Proceedings, vol. 2, no. 4–5, pp. 3403–3408, 2015.
6. Norul Amierah Binti Nor Zamani, AKM Asif Iqbal, and D. M. Nuruzzaman, “Mechanical and Tribological Behavior of Powder
Metallurgy Processed Aluminum–Graphite Composite,” Russian Journal of Non-Ferrous Metals, vol. 60, no. 3, pp. 274–281, 2019.
7. K. Sekar, “Fabrication of AA2014 with B 4C and Graphite hybrid composite by Stir-casting method: study of mechanical and welding
properties,” Journal of Physics: Conference Series, vol. 1240, p. 012142, 2019.
8. V. Mohanavel, K. Rajan, S. Suresh Kumar, G. Vijayan, and M. S. Vijayanand, “Study on mechanical properties of graphite partic ulates
reinforced aluminium matrix composite fabricated by stir casting technique,” Materials Today Proceedings, vol. 5, no. 1, pp. 2945–
2950, 2018.
9. V. N. Gaitonde, S. R. Karnik, and M. S. Jayaprakash, “Some Studies on Wear and Corrosion Properties of Al5083/Al 2O3/Graphite
Hybrid Composites,” Journal of Minerals and Material Characterization and Engineering, vol. 11, no. 07, pp. 695–703, 2012.
10. Amir Hussain Idrisi, Vikas Dev Singh,Vipul Saxena, “Development and testing of Al5083 alloy reinforced by SiC particles,”
International Journal of Scientific Research Engineering and Technology (IJSRET), vol. 2, no. 11, pp. 11–697, 2014.
11. J.R.Davis, “Aluminium and Aluminium Alloys.” pp. 351–416, 2001.
12. Ram Singh and R. N. Rai, “Characterization of B4C-composite-reinforced aluminum alloy composites,” AIP Conference Proceedings,
vol. 1943, 2018.
13. Syed Nasimul Alam, Lailesh Kumar, “Mechanical properties of aluminium based metal matrix composites reinforced with graphite
nanoplatelets,” Material Science and Engineering A, vol. 667, pp. 16–32, 2016.
14. M. H. Faisal and S. Prabagaran, “Investigation on Mechanical and Wear Properties of Aluminium Based Metal Matrix Composite
Reinforced with B4C, Gr and Fly Ash,” Advanced Manufacturing and Materials Science. Lecture Notes on Multidisciplinary Industrial
Engineering Springer International Publishing, 2018.
15. N. Sharma, R. Khanna, G. Singh, and V. Kumar, “Fabrication of 6061 aluminum alloy reinforced with Si3N4/n-Gr and its wear
performance optimization using integrated RSM-GA,” Particulate Science and Technology, vol. 6351, pp. 1–11, 2016.
16. Venugopal S, Mahendran G, “Optimization of the diffusion bonding parameters on AA5083 aluminium alloy using Taguchi’s
technique,” International Journal of Advance Research, Ideas and Innovations in Technology, vol. 4, no. 2, pp. 1459 –1466, 2018.

Authors: Kanga Idé Soumaila, Naimi Mustapha, Chikhaoui Mohamed, Ada Aya Laouali

Paper Title: Development of a Computer Application for the Calculation of Water Quality Index in Morocco
Abstract: Water quality indices are generally a combination of biological, chemical, physical parameters
to form a numerical composite index that can be easily interpreted and shared. Their efficiency and usefulness in
managing and monitoring water quality have been appreciated by management organizations around the world.
The integration of these tools into computer applications can be a major asset. The main purpose of this article is
to present a computer application that integrates a water quality index developed in Morocco to facilitate its use
and avoid manual errors related to users. The application entirely developed in python language under PyCharm
(Integrated Development Environment) is executable on a computer and is presented as a GUI (Graphical User
Interface) containing two sub-interfaces to calculate the surface and groundwater quality index according to the
408. type of water analyzed.
2358-
Keyword : Computer application, Water quality index, Water quality parameters, Development, Morocco. 2362
References:
1. Abbasi T and Abbasi SA, 2012. Water Quality Indices. Elsevier. Amsterdam, Netherlands.
2. Gitau MW, Chen J and Ma Z, 2016. “Water Quality Indices as Tools for Decision Making and Management” Water Resour. Manag. 30
(8): 2591-610
3. Swamee P K and Tyagi A, 2007. “Improved Method for Aggregation of Water Quality Subindices.” J. Environ Eng -ASCE. 133:220–
225.
4. Brown RM, McClelland NI, Deininger RA and Tozer RG, 1970. “A Water Quality Index- Do We Dare?” Water & Sew. Works.
117:339–343.
5. Nabizadeh R, Amin MV, Alimohammadi M, Naddafi K, Mahvi AH and Yousefzadeh S, 2013. Development of innovative computer
software to facilitate the setup and computation of water quality index. J. Environ. Health. Sci. Eng.11:1
6. (CCME) Canadian Council of Ministers of the Environment, 2001. CCME Water Quality Index. 1.0 Technical Report. CCME,
Winnipeg, MB.
7. Dinius SH, 1987. “Design of an Index of Water Quality.” Water Resour. Bull. 23(5):833-843.
8. Said A, Stevens DK and Sehlke G, 2004. “An Innovative Index for Evaluating Water Quality in Streams.”Environ. Manage. 34:406 –
414.
9. Cude CG, 2001. “Oregon Water Quality Index: A Tool for Evaluating Water Quality Management Effectiveness.” J. Am. Water
Resour. As. 37(1):125–137.
10. Walski TM and Parker FL, 1974. “Consumers Water Quality Index” J. Environ. Eng-ASCE 100(3):593-611.
11. Smith D, 1990. “A Better Water Quality Indexing System for Rivers and Streams.” Water Res. 24(10):1237–1244.
12. Sargoankar A and Deshpande V, 2003. “Development of an Overall Index of Pollution for Surface Water Based on a General
Classification Scheme in Indian Context.” Environ. Monit. Assess.
13. Kanga IS, Niandou AS, Naimi M, Chikhaoui M, Schimmel K and Luster-Teasley S, 2019a. A Systematic Review and Meta-Analysis
of Water Quality Indices. JAST-B. 9 (2):1-14.89(1):43–67.
14. Sarkar C and Abbasi S A, 2006. Qualidex – a new software for generating water quality indice. Environ. Monit. Assess. (2006) 119:
201–231
15. Sharma A, Naidu M and Sargaonkar A, 2013.Development of computer automated decision support system for surface water quality
assessment. Comput. Geosci-UK. 51 (2013):129-134
16. Moeseneder C, Dutra M, Thebaud O, Ellis N, Boschetti F, Tickell S, Dichmont C, Mare W, Pascual R and Cannard T, 2015. A
simulation interface designed for improved user interaction and learning in water quality modelling software. Environ. Modell.
Softw. 70(2015):86-96.
17. Ewaid SH, Kadhum SA, Abed AS and Salih RM, 2018. Development and evaluation of irrigation water quality guide using IWQGV.1
software: A case study of Al-Gharraf Canal, Southern Iraq. Environ. Technol. Inno.13:224-232.
18. Brown LC and Barnwell TO, 1987. The Enhanced Stream Water Quality Models QUAL2E and QUAL2E-UNCAS (EPA/600/3-87-
007). US Environmental Protection Agency, Athens.
19. Kanga IS, Chikhaoui M and Naimi M, 2019b.Water Quality Assessment Using a New Proposed Water Quality Index: A Case Study
from Morocco. J. Environ. Agric. Biotech. 4(4):957-792.
20. Horton RK, 1965. “An Index Number System for Rating Water Quality.” J. Water Pollu. Cont. Fed. 37:300–306.
21. Lumb A, Sharma TC and Bibeault JF, 2011. “A Review of Genesis and Evolution of Water Quality Index (WQI) and Some Future
Directions.” Water Qual. Expos. Hea.3:11–24.
22. Terrado M, Borrell E, de Campos S, Barcelo D and Tauler R, 2010. Surface-water-quality indices for the analysis of data generated by
automated sampling networks. Trends Anal. Chem. 29(1):40-52.
23. Kralev VS and Kraleva RS, 2017. Methods and tools for rapid application development. In Proceedings, 3th International Scientific
and Practical Conference "Methodology of Modern Research", 21-24. March 2017. Abu-Dhabi, UAE. World Science, Vancouver,
Canada.

Authors: R. Spurgen Ratheash. M. Mohamed Sathik

Paper Title: Line Segmentation Challenges in Tamil Language Palm Leaf Manuscripts
Abstract: The process of an Optical Character Recognition (OCR) for ancient hand written documents or
palm leaf manuscripts is done by means of four phases. The four phases are ‘line segmentation’, ‘word
segmentation’, ‘character segmentation’, and ‘character recognition’. The colour image of palm leaf manuscripts
are changed into binary images by using various pre-processing methods. The first phase of an OCR might break
through the hurdles of touching lines and overlapping lines. The character recognition becomes futile when the
line segmentation is erroneous. In Tamil language palm leaf manuscript recognition, there are only a handful of
line segmentation methods. Moreover, the available methods are not viable to meet the required standards. This
article is proposed to fill the lacuna in terms of the methods necessary for line segmentation in Tamil language
document analysis. The method proposed compares its efficiency with the line segmentation algorithms work on
binary images such as the Adaptive Partial Projection (APP) and A* Path Planning (A*PP). The tools and
criteria of evaluation metrics are measured from ICDAR 2013 Handwriting Segmentation Contest.

Keyword : line segmentation, Tamil palm leaf manuscripts, connected component, historical documents,
Tamil character recognition.
References:
1. Ines Ben Messaoud, Hamid Amiri, Haikal El Abed, Volker Margner "A Multilevel Text line Segmentation Framework for Handwritten
409. Historical Documents", ICFHR, IEEE, pp. 515-520, 2012.
2. Xi Zhang, Chew Lim Tan "Text Line Segmentation for Handwritten Documents Using Constrained Seam Carving", ICFHR, IEEE, pp. 2363-
98-103, 2014.
3. MadeWindu Antara Kesiman, Dona Valy, Jean-Christophe Burie, Erick Paulus, Mira Suryani, Setiawan Hadi, Michel Verleysen,
2367
Sophea Chhun and Jean-Marc Ogier, "Benchmarking of Document Image Analysis Tasks for Palm Leaf Manuscripts from Southeast
Asia" J.Imaging, pp. 1- 27, 2018.
4. Papangkorn Inkeaw, Atcharin Klomsae, Sanparith Marukatat, "Lanna Dharma Handwritten Character Recognition on Palm Leaves
Manuscript based on Wavelet Transform", ICSIPA, IEEE, pp. 253-258, 2015.
5. Nagendra Panini Challa, R.Vasanth Kumar Mehta, "Applications of Image Processing Techniques on Palm Leaf Manuscripts - A
Survey", Helix, pp. 2013-2017, 2017.
6. Ge Peng, Pengfei Yu, Haiyan Li and Lesheng He, "Text Line Segmentation Using Viterbi Algorithm For The Palm Leaf Manuscripts of
Dai", ICALIP, IEEE, pp. 336-340, 2016.
7. Ge Peng, PengFei Yu, HaiYan Li, HongSong Li, XuDong Zhu, "A Character Segmentation Algorithm for the Palm Leaf Manuscripts",
ICCIA, IEEE, pp. 354-358, 2017.
8. Dona Valy, Michel Verleysen, and Kimheng Sok, "Line Segmentation Approach for Ancient Palm Leaf Manuscripts using Competitive
Learning Algorithm", ICFHR, IEEE, pp. 108-113, 2016.
9. Jija Das Gupta, Bhabatosh Chanda, "A Model Based Text Line Segmentation Method for Off-line Handwritten Documents", ICFHR,
IEEE, pp.125-129, 2010.
10. Vijaya Kumar Koppula, Atul Negi, "Fringe Map Based Text Line Segmentation of Printed Telugu Document Images", ICDAR, IEEE,
pp. 1294-1298, 2011.
11. N. Tripathy and U. Pal, "Handwriting Segmentation of Unconstrained Oriya Text", Sadhana, Springer, pp.755-769, 2006.
12. Rapeeporn Chamchong, Chun Che Fung, "Text Line Extraction Using Adaptive Partial Projection for Palm Leaf Manuscripts from
Thailand", ICFHR, IEEE, pp. 586-591, 2012.
13. Olarik Surinta, Michiel Holtkamp, Faik Karabaa, Jean-Paul van Oosten, Lambert Schomaker and Marco Wiering, "A* Path Planning for
Line Segmentation of Handwritten Documents", ICFHR, IEEE, pp.175-180, 2014.
14. Alexander Berennolts, Michael Lindenbaum, "On The Performance of Connected Components Grouping", IEEE, pp.189-192, 2000.
15. R.Spurgen Ratheash, and M. Mohamed Sathik, “A Detailed Survey of Text Line Segmentation Methods in Handwritten Historical
Documents and Palm Leaf Manuscripts”, IJCSE, pp 99-103 , 2019.

Authors: Sachin Kumar, Narender Kumar

Paper Title: Diagnosis of Diabetes by using Data Mining Techniques


Abstract: There are many classifiers that are used for diagnosis of diabetes but the result of this paper
shows that how logistic regression having best accuracy among the other classifiers. Logistic regression removes
the disadvantages of linear regression. There are different classifiers that are used for prediction. In the
worldwide millions of peoples are suffering from diabetes according to WHO report. In the medical region,
many researches have done with the help of data mining. The aim of this paper is to diagnosis of diabetes by
using the best classifiers and providing best parameter tuning. The study helps to find whether a patient is
enduring from diabetes or not using classification methods and it further investigate and evaluates the
functioning of different classification in relations of precision, accuracy, recall & roc.

Keyword : Diabetes, KNN, Classification, Decision tree, logistic regression, SVM.


References:
1. “Data Mining and Predictive analytics, 2nd edition” Daniel T.Larose, Chantal D.Larose.
2. Sonu Kumari et al. “A Data Mining Approach for the Diagnosis of Diabetes Mellitus” Proceedings of 7th lnternational Conferenc e on
Intelligent Systems and Control (ISCO 2013), pp.373-375, 2013.
3. Tanja Dujic , Dijana Sejdinovic et.al "Classification of Prediabetes and Type 2 Diabetes using Artificial Neural Network”, CMBEBIH
springer singapore ,pp.685-689, 2107.
4. Dr. Zubair Khan, Shefali Singh, Krati Saxena, “Diagnosis of Diabetes
5. Mellitus using K Nearest Neighbour Algorithm” ,International Journal of Computer Science Trends and Technology(IJCST) vol. 2, no.
410. 4, 2014.
6. Barakat N., Bradley A. P., & Barakat M. N. H. “Intelligible support vector machines for diagnosis of diabetes mellitus”. IEEE
transactions on information technology in biomedicine, vol.14, no.4, pp.1114-1120, 2010. 2368-
7. Ramzan, M. “Comparing and evaluating the performance of WEKA classifiers on critical diseases” In Information Processing (IICIP), 2372
2016 1st India International Conference on, vol.5, no10, pp. 1-4. IEEE.
8. Mira Kania Sabariah et al. , “Early Detection of Type II Diabetes Mellitus with Random Forest and Classification and Regression Tree
(CART)”, 2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA), pp.238-242, 2014.
9. Dr.B.L.Shivakumar, S. Alby, “A Survey on Data-Mining Technologies for Prediction and Diagnosis of Diabetes”, 2014 International
Conference on Intelligent Computing Applications, pp.167-173, 2014.
10. Asha A Aljarullah, “Decision Tree Discovery of the Diagnosis of Type II Diabetes”. Proc. of the International Conference on
Innovations in Information Technology, pp. 303 -307, 2011.
11. C M Velu, K R Kashwan, “Visual Data Mining Techniques for Classification of Diabetes Patients”. Proc. of the IEEE 3rd International
Advance Computing Conference, pp. 1070-1075, 2013.
12. K.Rajesh and V.Sangeetha. “Application of Data Mining Methods and Techniques for Diagnosis” International Journal of Engineering
and Innovative Technology (IJEIT), vol.2, no.3, pp.115-121, 2012.
13. Purushottam , Dr.Kanak Saxena , Richa Sharma, “ Diabetes Mellitus Prediction System Evaluation Using C4.5 rule and Partial Tree” ,
IEEE.
14. V.Veena, Vijayan, and C.Anjali. “Prediction and Diagnosis of Diabetes Mellitus-A machine
LearningApproach”IntelligentComputational System(RAICS),IEEE Recent Advance in , pp.122-127,IEEE 2015.
15. Kavakiotis, I., Tsave, O., Salifoglou, A., Maglaveras, N., Vlahavas, I., & Chouvarda, “Machine learning and data mining methods in
diabetes research” Computational and structural biotechnology journal. , vol.9, no.2, pp.1232-1242, 2017.
16. https://www.medicalnewstoday.com/info/diabetes.
17. Emrana Kabir Hashi, Md. Shahid Uz Zaman and Md. Rokibul Hasan, "An Expert Clinical Decision Support System to Predict Disease
Using Classification Techniques",International Conference on Electrical, Computer and Communication Engineering (ECCE),pp.396 -
400,IEEE, 2017.
18. Yoichi Hayashi, Shonosuke Yukita, " Rule ectraction usingRecursive-Rule ectraction algorithm with J48graft combined with sampling
selection techniques for the diagnosis of type2 diabetes mellitus in the Pima indian dataset", Informatic in Medicine Unlocke d, pp.92-
104, elsevier, 2016.

Authors: Mahesh B. Mane, F B Sayyad, M I Ansari


Design of Composite I-Beam Section to Prevent Web-Flange Junction Failure and Improving Its
Paper Title:
Axial Load Carrying Capacity
Abstract: Most of the chemical industries are used with Polyurethane (PU) coated steel sample which is
found that some chemical reaction and rusted in acidic bath solution becomes a problem in industry. For such
problems composite materials can be of good solution which does not possess any reaction with working fluids
(acids in our case). With composites there is complexity of manufacturing and high cost involvement, so as to
avoid those simplified approach is used to get Flat plates made of Glass fiber reinforced in epoxy which is best
solution for any acidic bath as it possesses high resistance to any reaction with itself. Glass fiber plates are cut
into the size of dimension and with the help of adhesives joint the WFJ of I-Beam, there are two different types
411. of adhesives used, araldite 2015 and Hundsman araldite are used. The hundsman araldite is found to get better
performance of Web-Flange junction (WFJ) joint. Finite element analysis (FEA) is used to get initial validation 2373-
and further it’s observed that Hundsman araldite failure strength on the web-flange junction is better. Also, 2380
additional cleat used with 4 mm, 12 mm for increasing the Web-Flange junction (WFJ) area to improve the Load
carrying capacity of the Beam. The experimental analysis results clearly indicate that the emersion of the
reinforced epoxy glass-fiber in the acidic bath solution for a certain period, there is no any reaction formed in the
acidic bath and improved the behavior of the specimen. Results from FEA and experimental test have shown
good correlations are obtained with improvement of failure strength on WFJ.

Keyword : FEA, Epoxy glass fiber composite material, tensile load, ANSYS.
References:
22. Potter K. D., Davies R., Barrett M., Godbehere A., Bateup L., Wisnom M., and Mills A., “Heavily loaded bonded composite
structure: design, manufacture and test of `I' beam specimens” Composite Structures, 2001, 51, 389-399.
23. Khalid Y. A., Sahari B. B., Ali F. A. and Saad E. M. A., “Performance of composite I-beams under axial compression and bending
load modes” Materials and Design, 2005, 26, 127-135.
24. Hadi N.S., Yuan J. S., “Experimental investigation of composite beams reinforced with GFRP I-beam and steel bars” Construction and
Building Materials, 2017, 144, 462-474.
25. Noor A. E., Al-Moubaraki A. H., “Corrosion Behavior of Mild Steel in Hydrochloric Acid Solutions”, Int. J. Electrochem. Sci., 2014,
3, 806-818.
26. Gagani A. I., Emeric P.V. M. and Echtermeyer A. T., “Immersed interlaminar fatigue of glass fiber epoxy composites using the I-beam
method”, JIJF, 2018, 4875.
27. Mariama M., Afendi M., Majid M.S.A, Ridzuan M.J.M., Azmi A.I. and Sultan M.T.H., “Influence of hydrothermal ageing on the
mechanical properties of an adhesively bonded joint with different adherends”, Composite: Part B, 2019, 165, 572-585.

Authors: Anusha Linda Kostka. J E., S. Vinila Jinny

Paper Title: Liver Segmentation Techniques of CT Images for Clinical Diagnosis


Abstract: Liver Segmentation has become one of the most efficient and systematic tasks in the case of
medical applications. Recently, the segmentation of liver has found its part in the research areas also. It has
become a common feature to hinder the accurate and the proper segmentation of the liver intensities and its
neighbor organs in the human body. Different techniques of liver segmentation can be performed with CT
images, MRI images and PET. Among these CT images have a wide application in the detection, identification
and segmentation of the liver deficiencies. Manual segmentation of the liver seems to be more time consuming
yielding less precision and robustness. Nowadays, many techniques have been developed for the segmentation of
liver that are more efficient, fast with accurate as well as better results than the traditional methods.

Keyword : Liver, Segmentation, CT, MRI


References:
1. Kaijian Xia, Hongsheng Yin, Pengjiang Qian, Yizhang Jiang, Shuihua Wang, “Liver Semantic Segmentation Algorithm Based on
Improved Deep Adversarial Networks in Combination of Weighted Loss Function on Abdominal CT Images”, IEEE Access,
VOLUME 7, 2019, pp 96349-96357.
2. Mubashir Ahmad, Danni Ai, Guiwang Xie, Syed Furqan Qadri, Hong Song, Yong Huang, Yongtian Wang, Jian Yang, “Deep Belief
412. Network Modeling for Automatic Liver Segmentation”, IEEE Access, VOLUME 7, 2019, pp 20585-20595.
3. ZhenZhou Wang , Cunshan Zhang, Ticao Jiao, MingLiang Gao, and Guofeng Zou, “Fully Automatic Segmentation and Three - 2381-
Dimensional Reconstruction of the Liver in CT Images”, Journal of Healthcare Engineering, Volume 2018, Article ID 6797102, 10
pages
2384
4. BAOCHUN HE, DEQIANG XIAO, QINGMAO HU, AND FUCANG JIA, “Automatic Magnetic Resonance Image Prostate
Segmentation Based on Adaptive Feature Learning Probability Boosting Tree Initialization and CNN-ASM Refinement”, IEEE
Access, VOLUME 6, 2018, pp 2005-2015
5. Yongchang Zheng, Danni Ai, Jinrong Mu, Weijian Cong, Xuan Wang, Haitao Zhao and Jian Yang, “Automatic liver segmentation
based on appearance and context information”, Zheng et al. BioMed Eng OnLine (2017) 16:16
6. Weiwei Wu, Shuicai Wu, Zhuhuang Zhou,Rui Zhang, and Yanhua Zhang, “3D Liver Tumor Segmentation in CT Images Using
Improved Fuzzy C-Means and Graph Cuts”, BioMed Research International Volume 2017, Article ID 5207685, 11 pages, pp 1-11.
7. Xuehu Wang, Yongchang Zheng, Lan Gan, Xuan Wang, Xinting Sang, Xiangfeng Kong, Jie Zhao, “Liver Segmentation from CT
images using a Sparse priori statistical shape model (SP-SSM)”, PLOS ONE,
https://doi.org/10.1371/journal.pone.0185249, pp 1-23.
8. Weiwei Wu, Zhuhuang Zhou, Shuicai Wu, and Yanhua Zhang, “Automatic Liver Segmentation on Volumetric CT Images Using
Supervoxel- Based Graph Cuts”, Computational and Mathematical Methods in Medicine, Volume 2016, Article ID 9093721, 14 pages
9. Lianfen Huang, MinghuiWeng, Haitao Shuai, Yue Huang, Jianjun Sun, and Fenglian Gao, “Automatic Liver Segmentation from CT
Images Using Single-Block Linear Detection”, BioMed Research International, Volume 2016, Article ID 9420148, 11 pages,
10. Mohammed Goryawala, Seza Gulec, Ruchir Bhatt, Anthony J. McGoron, and Malek Adjouadi, “A Low- Interaction Automatic 3D
Liver Segmentation Method Using Computed Tomography for Selective Internal Radiation Therapy”, BioMed Research International
Volume 2014, Article ID 198015, 12 pages, pp 1-12.
11. Huiyan Jiang, Baochun He, ZhiyuanMa, Mao Zong, Xiangrong Zhou, and Hiroshi Fujita, “Liver Segmentation Based on Snakes
Model and Improved GrowCut Algorithm in Abdominal CT Image”, Computational and Mathematical Methods in Medicine Volume
2013, Article ID 958398, 12 pages

Authors: A. Djuraev, J.Kh. Beknazarov, Sh.Sh. Kenjaboev


Development of an Effective Resource-Saving Design and Methods for Calculating the Parameters of
Paper Title:
Gears with Compound Wheels
Abstract: The article presents the design schemes and the principle of operation of the gear transmission
with composite wheels and elastic elements. The technique and the results of the analysis to determine the
degree of mobility of gears with composite wheels and elastic elements are given. The angular displacement of
the composite gears and gear ratios are obtained by the analytical method. Graphic dependencies are constructed
and the values of the system parameters are recommended.
413.
Keyword : Gear, wheel, gear, elastic elements, gear ratios, degree of mobility, shear angle, bushing 2385-
deformation, angular velocity, area, length, moment, shear modulus. 2388

References:
1. Artobolevsky I.I. Theory of mechanisms and machines.- M .: Nauka, 1988. pp-640.
2. Frolov K.V. Theory of mechanisms and machines. -M .: Higher school, 1987. pp -496.
3. A.Jurayev, R.Kh. Maksudov Machine va mekhanlar nazariyashi 1-қism (Machine va mekhanlar tuzilish asoslari va kinematikashi) Kuv
Ullanma ISBN 978-9943-11-945-1 “Fan va tehnologiya” nashirieti Toshkent 2019. pp -408.
4. A.Dzhuraev, Sh. Kenzhaboev Development of constructive schemes and the scientific basis for the analysis and synthesis of lin k
mechanisms with elastic elements and flexible links of the drives of technological machines. Monograph Ed. Namangan 2019 p.267.
ISBN 978-9943-5645-8-9.
5. A.Dzhuraev, Davidbaev B., Zulpiev S.M. Structural analysis of the lever-articulated coupling J. "FerPI ilmiy technique magazines",
Fergana, 2009, No. 2, S.30-32.
6. A.S. 1370348 USSR, MKI F16H 21/00. Rocker mechanism / Magdiev M.A., Juraev A., Kuzibaev G.S., Mukhamedov D., Alimov
P.T., Shukurov S.Z. IM and SS AN RU // B.I.-1988. Number 4.
7. A.S. 905549 USSR, MKI F16H 21/00. Rocker mechanism / Usmankhodzhaev Kh.Kh., Kuzibaev G.S., Malikov R.Kh., Magdiev M.A.
IM and SS AN RU. // B.I. -1982. No. 6.
8. A.S. 1504430 USSR, MKI F16Н 21/00, Rocker mechanism / Magdiev M.A. IM and SS AN RU // B.I.-1989. №32.
9. A.S. 1270462 USSR, MKI F16H 21/00. 06/19. Drawstring reversing mechanism / Magdiev M.A., Yuldashbekov S.A. IM and SS AN
RU // B.I.-1986. №42.
10. A.S. 1379529 USSR, MKI F16H 21/00. Rocker mechanism / Magdiev M.A., Juraev A., Kuzibaev G.S., Malikov R.Kh. IM and SS AN
RU // B.I. –1988. №9.
11. А.Djuraev, J.Kh.Beknazarov. Development of designs and methods for calculating gears with variable parameters and elastic elements.
International journal of advanced research in science, engineering and technology Vol. 5, issue 5 , may 2018
12. O. O.Sayfidinov, J.Kh. Beknazarov. New prototype theory for cear transmission. Open Access Peer-Revieweed Journal 2(9) vol I
February 2018.

Authors: S. Rajathilagam, K.Kavitha

Paper Title: Classifying the Category of Workers using Crowd-sourced Job Seekers Data
Abstract: Crowdsourcing refers to decomposing complex jobs to multiple tasks and solve those task with
multiple workers through open call in distributed networking environment. The recruitment of employees for
organization has undergone transformation from traditional method to digital domain. Online recruitment
facilitates just-in-time hiring to requesters and enables the workers to compete in the global market. This paper
proposed an Efficient Machine Learning Crowdsourced(EMLC) method for E-recruitment which uses
Crowdsourcing method to collect resumes from the workers and details of work from the requesters. The data is
collected from a private job agency through an online recruitment portal which consist of recruiters from
companies and job seekers based on qualifications and experience related to their field. The data collected from
recruitment portal is analyzed with Machine Learning Approach with decision tree algorithms like ID3, CART
and C4.5 for better selection of efficient person to complete the job. Various performance metrics such as
Accuracy, Error rate, Recall etc were used to the Crowdsourced Database to categorize the job seekers
efficiently. The proposed method gives better result for online recruiting through Crowdsourcing.

Keyword : Crowdsourcing, Online Recruitment, Machine Learning, Decision Tree.


References:
1. Abraham, I., Alonso, O., Kandylas, V., & Slivkins, A, “Adaptive crowdsourcing algorithms for the bandit survey problem”,
414. In Conference on learning theory, June 2013, pp. 882-910.
2. Deng, X. N., & Joshi, K. D, “Why individuals participate in micro-task crowdsourcing work environment: Revealing crowdworkers' 2389-
perceptions”, Journal of the Association for Information Systems, Vol 17, Issue 10, pp:648.
3. Franklin, M. J., Kossmann, D., Kraska, T., Ramesh, S., & Xin, R. CrowdDB: answering queries with crowdsourcing. In Proceedings of
2394
the 2011 ACM SIGMOD International Conference on Management of data, 2011, June, pp. 61-72.
4. Kittur, A., Nickerson, J. V., Bernstein, M., Gerber, E., Shaw, A., Zimmerman, J., & Horton, J, “The future of crowd work.
In Proceedings of the 2013 conference on Computer supported cooperative work”, 2013, pp:1301-1318.
5. Kulkarni, A., Can, M., & Hartmann, B, “Collaboratively crowdsourcing workflows with turkomatic”, In Proceedings of the acm 2012
conference on computer supported cooperative work, 2012, pp:1003-1012.
6. Venetis, P., Garcia-Molina, H., Huang, K., & Polyzotis, N. (2012, April). “Max algorithms in crowdsourcing environments”,
In Proceedings of the 21st international conference on World Wide Web, pp:989-998.
7. G. Suresh, K. Arunmozhi Arasan, S. Muthukumaran, “Perfomance Comparison of Decsion Tree Algorithms to Findout the Reason for
Student’s Absenteeism at the Undergraduate Level in a College for an Academic Year” International Conference on Computing and
Intelligence Systems Volume: 04, Special Issue: March 2015, pp: 1235 – 1241.
8. Venkatesan, N., Arasan, K. A., & Muthukumaran, S, “An ID3 Algorithm for Performance of Decision Tree in Predicting Student's
Absenteeism in an Academic Year using Categorical Datasets”. Indian Journal of Science and Technology, Vol. 8, Issue -14, pp:1-5,
2015.
9. Vesdapunt, N., Bellare, K., & Dalvi, N, “Crowdsourcing algorithms for entity resolution”, Proceedings of the VLDB Endowment, Vol
7, Issue 12, 2014, pp:1071-1082.
10. Zhang, Y., Chen, X., Zhou, D., & Jordan, M. I. (2014). Spectral methods meet EM: A provably optimal algorithm for crowdsourci ng.
In Advances in neural information processing systems, 2014, pp. 1260-1268.
11. Franklin, M. J., Kossmann, D., Kraska, T., Ramesh, S., & Xin, R. CrowdDB: answering queries with crowdsourcing. In Proceedings of
the 2011 ACM SIGMOD International Conference on Management of data, 2011, June, pp. 61-72.
12. Vengatesan N, Arunmozhi Arasan K, Muthukumaran S, “Efficiency of Decision Tree in Predicting Student’s Absenteeism in an
Academic Year using C4.5 Algorithm”, International Journal of Innovative Research in Computer Science and Engineering(IJIRCSE),
Vol.1, Issue-3, 2015.

Authors: M.S Minu, Kamagiri Mounika, N.Suhasini, Bezawada Tejaswi

Paper Title: Detecting Online Spams through Supervised Learning Techniques


Abstract: With more customers utilizing on the online review surveys to educate their administration basic
leadership, assessment of reviews which economically affect the reality of organizations. Obviously, crafty
415. people or gatherings have endeavored to manhandle or control online review spam to make benefits, etc, and
that tricky recognition and counterfeit sentiment surveys is a subject of continuous research intrigue. In this 2395-
paper, we clarify how supervised learning strategies are utilized to recognize online spam review surveys, 2400
preceding showing its utility utilizing an informational index of lodging reviews.

Keyword : online review surveys, supervised learning, unlabeled data, Naïve bayes algorithm, classifiers, EM
algorithm, Bag of Words, Stop word Filtering, Support Vector Machine classifier.
References:
1. J.K Rout et al, A.Dalmia, Kim-Kwang Raymond Choo,(Senior member ,IEEE),Sambit Bakshi,(Member,IEEE),Sanjay Kumar (Senior
Member,IEEE),”Revisiting Semi-Supervised Learning for Online Deceptive Review Detection”, in Proc.special section on security
and privacy in applications and services for future internet of things, vol 5 2017.pp.Jan 18 2017,doi:10.1109/Access.2017.265503.
2. Shafi’I Muhammad Abdulhamid,Muhammad Shafie abd latiff, Haruna chiroma, Gaddafi Abdul-Salaam (Member,IEEE), “A Review
on Mobile SMS Spam Filtering Techniques” in Proc.pp:Feb13,2017,doi:10.1109/ACCESS.2017.2666785.
3. Xin Ruan Zhenyu Wu, Member IEEE,Haining Wang, Senior Member, IEEE,and Sushil Jajodia, Fellow, IEEE, “Profiling Online
Social Behaviors for Compromised Account Detection”, in Proc. IEEE Transactions on Information Forensics and Security, DOI
10.1109/TIFS.2015.2482465.
4. Mohd Fazil and Muhammad Abulaish, Senior Member, IEEE “A Hybrid Approach for detecting Automated Spammers in Twitter” in
Proc. Transactions on Information Forensics and Security, 1556-6013© 2018 IEEE,doi:10.1109/TIFS.2018.2825958,IEEE.
5. Vedat Coskun, Member, IEEE, Erdal Cayirci, Senior Member, IEEE, Albert Levi, Member, IEEE, and Serdar Sancak “Qurantine
Region Scheme to Mitigate Spam Attacks in Wireless Sensor Networks” in Proc.IEEE Transactions on Mobile Computing, Vol 5, No.
8, August 2006,doi: 1536-1233/06/$20.00 © 2006 IEEE.
6. [6]Lourdes Araujo and Juan Martinez-Romo, IEEE,”Web Spam Detection: New Classification Features based on Qualified Link
Analysis and Language Models” in Proc.IEEE Transactions on information forensics and security, vol 5, No.3, September 2010, doi:
10.1109/TIFS.2010.2050767,IEEE.
7. [7] Fei Zhang, Student Member, IEEE, “Adversarial Feature Selection Against Evasion Attacks” in Proc.IEEE Transactions on
Cybernetics, pp 2015 IEEE.doi:10.1109/TYCB.2015.2415032.
8. [8]seGaradi, IEEE,”Email Classification Research Trends: Review and Open Issues” in Proc. IEEE, pp: Jun 18,2017, doi:
101109/ACCESS.2017.2702187
9. [9]Chao Chen, Yu Wang, Jun Zhang Senior Member IEEE,”Statistical Features-Based Real Time Detection of Drifted Twitter Spam”
in Proc. IEEE Transactions on Information Forensics and Security, vol 12, No.4 ,Apr 2017 doi: 10.1109/TIFS.2016.2621888.
10. S.Khattak,N.R. Ramay, K.Riyaz Khan, “A Taxonomy of botnet behavior, Detection, and defense” in Proc. IEEE Communications
surveys and Tutorials,Vol 16, No.2,Second Quarter 2014,doi:10.1109/SURv.2013.091213.00134.
11. Jian Zhang, Lian-Han Si-Ma, Bin-Qiang Wang, Jian-Kang Zhang and Yan-Yu Zhang, “Low-Complexity Receivers and Energy-
Efficient Constellations for SPAD VLC Systems” in Proc. IEEE Photonics and Technology Letters, 2016 IEEE,
doi:10.1109/LPT.2016.2572300.
12. Peng Zhang, Chuan Zhou, Peng Wang, Byron J.Gao,”E-Tree: An Efficient Indexing Structure for Ensemble Models on Data Streams”
in Proc.IEEE Transactions on knowledge and Data Engineering, 1041-4347©2013,doi-10.1109/TKDE.2014.2298018.
13. Kentaroh Toyoda, (Member, IEEE), Mirang Park, Tomoaki Ohtsuki(IEEE), “Novel Unsupervised SPIters Detection Scheme by
Automatically Solving Unbalanced Situation” in Proc.IEEE, pp. June 7,2017.doi:10.1109/ACCESS.2016.2642978.
14. Bartosz Kurlej and Michal Wozniak,”Active Learning Approach to concept drift problem” in Proc. Oxford University Press © The
author 2011 doi:10.1093/jigpal/jzr011.
15. Zhizhou Yin, Fei Wang, Wei Liu, Member, IEEE,” Sparse Feature Attacks in Adversarial Learning” in Proc. Transactions on
Knowledge and Data Engineering © 2017 doi:10.1109/TKDE.2018.2790928.
16. Stavros Papadopoulos, Anastasios Drosou, Senior Member, IEEE, “A Novel graph Descriptor for the Detection of Biling-related
Anomalies in Cellular mobile Networks” in Proc. IEEE Transactions on Mobile Computing,doi:10.1109/TMC.2016.2518668.
17. Chao Chen, Yu Wang, Jun Zhang, Senior Member, IEEE, “Statistical Features-Based Real-Time Detection of Drifted Twitter Spam” in
Proc.IEEE Transactions on Information Forensics and Security, vol 12, No.4, Apr 2017, doi:10.1109/TIFS.2016.2621888.
18. Yafeng Ren and Donghong ji,”Learning to Detect Deceptive Opinion Spam: A Survey” in Proc.IEEE April 13, 2019,
doi:10.1109/ACCESS.2109.2908495.
19. Adrian Lara, Byrav Ramamurthy,”OpenSec: Policy-based Security using Software-defined Netwrking” in Proc.IEEE Transactions on
Network and Service Management,© 2015 doi:10.1109/TNSM.2016.2517407.
20. Kuan Zhang, Student Member, IEEE, Xiaohui Liang, Member,IEEE, “PIF:A Personalized Fine Grained Spam Filtering Scheme With
Privacy Preservation in Mobile Social Networks” in Proc. IEEE Transactions on computational Social Systems, vol 2,No.3 Sep
2015,doi: 10.1109/TCSS.2016.2519819.

Authors: A. Appala Narasimahm, P.S.Avadhani

Paper Title: Authentication of an Image with Sha-1 and Invariant Vector Distances
Abstract: The two primary objectives of image authentication are Discrimination and Robustness. The
SHA-1 algorithm, invariant vector distance and ring division are implemented to authenticate the image by using
hash value to enhance discriminative capability and rotation robustness. The statistical features like central
moments of the picture which contains rings in homogenous CIE L*a*b* model are unwavering because the
image rotation is not linked to the ring division. Specifically, the digital operations of an image are not changed
with respect to Euclidean distance and feature vectors. This makes message digest discriminative and dense.
Several tests conducted with more than 200 color images and reveals that for common image digital operations
this algorithm for image authentication is strong to estimate the efficiency. Among all the existing hashing
algorithms, the projected technique for image authentication is demonstrated as superior.

416.
Keyword : CIE L*a*b* mode Image authentication ring partition.
2401-
References: 2408
1. Mintzer F, Braudaway G, Yeung M (1998) Effective and ineffective digital watermarks. In:Proceedings of the ICIP’97, Santa Barbara,
CA, USA
2. Yeung MM (1998) Digital watermarking introduction. Commun ACM 41(7):31–33.
3. Memon N, Poorvi V, Boon-Lock Y, Yeung M (2000) Distortion bounded authentication techniques In: Proceedings of the SPIE
international conference on security and watermarking of multimedia contents II, vol 3971, pp 164–174
4. R. Venkatesan, S.-M. Koon, M. H. Jakubowski, and P. Moulin, “Robust image hashing,” in Proc.IEEE Int. Conf. Image Process., Sep.
2000, pp. 664–666.
5. Z. Tang, X. Zhang, and S. Zhang, “Robust perceptual image hashing based on ring partition and NMF,” IEEE Trans. Knowl. Data
Eng., vol. 26, no. 3, pp. 711–724, Mar. 2014.
6. F. Ahmed, M. Y. Siyal, and V. U. Abbas, “A secure and robust hash based scheme for image authentication,” Signal Process., vol. 90,
no. 5, pp. 1456–1470, 2010.
7. Z. Tang, S. Wang, X. Zhang, W. Wei, and S. Su, “Robust image hashing for tamper detection using non-negative matrix factorization,”
J. Ubiquitous Converg. Technol., vol. 2, no. 1, pp. 18–26, 2008.
8. J. Fridrich and M. Goljan, “Robust hash functions for digital watermarking,” in Proc. IEEE Int. Conf. Inf. Technol., Coding Comput.,
Mar. 2000, pp. 178–183.
9. C.-Y. Lin and S.-F. Chang, “A robust image authentication method distinguishing JPEG compression from malicious manipulation,”
IEEE Trans. Circuits Syst. Video Technol., vol. 11, no. 2, pp. 153–168, Feb. 2001.
10. Z. Tang, S. Wang, X. Zhang, W. Wei, and Y. Zhao, “Lexicographical framework for image hashing with implementation ba sed
on DCT and NMF,” Multimedia Tools Appl., vol. 52, nos. 2–3, pp. 325– 345, 2011.
11. S. S. Kozat, R. Venkatesan, and M. K. Mihcak, “Robust perceptual image hashing via matrix invariants,” in Proc. IEEE Int. Conf.
Image Process., Oct. 2004, pp. 3443–3446.
12. F. Lefebvre,B. Macq, and J.-D. Legat, “RASH: Radon soft hash algorithm,” in Proc. 11th Eur. Signal Process. Conf., Sep. 2002,
pp. 299–302.Y. Ou and K. H. Rhee, “A key-dependent secure image hashing scheme by using Radon transform,” in Proc. IEEE Int.
Symp. Intell. Signal Process. Commun. Syst., jan. 2009, pp. 595–598.
13. Y. Li, Z. Lu, C. Zhu, and X. Niu, “Robust image hashing based on random Gabor filtering and dithered lattice vector quantization,”
IEEE Trans. Image Process., vol. 21, no. 4, pp. 1963–1980, Apr. 2012.
14. Z. Tang, X. Zhang, L. Huang, and Y. Dai, “Robust image hashing using ring-based entropies,” Signal Process., vol. 93, no. 7, pp.
2061–2069, 2013.
15. F.Lefebvre, B. Macq, and J.-D. Legat, “RASH: Radon soft hash algorithm,” in Proc. 11th Eur. Signal Process. Conf., Sep. 2002, pp.
299–302.
16. J. S. Seo, J. Haitsma, T. Kalker, and C. D. Yoo, “A robust image fingerprinting system using the Radon transform,” Signal
Process.,Image Commun., vol. 19, no. 4, pp. 325–339, 2004.
17. C. De Roover, C. De Vleeschouwer, F. Lefebvre, and B. Macq, “Robust video hashing based on radial projections of key frames,”
IEEE Trans.Signal Process., vol. 53, no. 10, pp. 4020–4037, Oct. 2005.
18. D. Wu, X. Zhou, and X. Niu, “A novel image hash algorithm resistant to print–scan,” Signal Process., vol. 89, no. 12, pp. 2415–2424,
2009.
19. Swaminathan, Y. Mao, and M. Wu, “Robust and secure image hashing,” IEEE Trans. Inf. Forensics Security, vol. 1, no. 2, pp. 215–
230, Jun. 2006.
20. V. Monga and B. L. Evans, “Perceptual image hashing via feature points: Performance evaluation and tradeoffs,” IEEE Trans. Image
Process., vol. 15, no. 11, pp. 3452–3465, Nov. 2006.
21. V. Monga, A. Banerjee, and B. L. Evans, “A clustering based approach to perceptual image hashing,” IEEE Trans. Inf. Forensics
Security, vol. 1, no. 1, pp. 68–79, Mar. 2006.
22. V. Monga and M. K. Mihçak, “Robust and secure image hashing via non-negative matrix factorizations,” IEEE Trans. Inf. Forensics
Security, vol. 2, no. 3, pp. 376–390, Sep. 2007.

Authors: Seema Bushra, Javaid Akhter

Paper Title: Did Venture Capital Promote Innovation in India?


Abstract: The study exhorts to ascertain the general perception that Venture Capitalists fund innovative
technology projects in the Indian context using primary and secondary data. A structured questionnaire was used
to elicit response from 101 (sample) out of 134 (Population) SEBI registered and active Venture Capital firms in
the recent past. The study analyses the mode of funding by Venture Capital firms and their geographical
dispersion. The study ascertains whether Venture Capital firms have enabled innovation in the Indian context
during the recent past or not. Finally, the study concludes that Venture Capital Investments have not been very
enabling for innovative technologies in the Indian context, which is contrary to the relevant literature available
in the context of USA and other developed nations.

Keyword : Innovation, Investments, Start-up, Technology, Venture Capital.


References:
1. Andrew B. Hargadon and Martin Kenny, “Misguided Policy? Following Venture Capital into Clean Technology”, California
Management Review, Vol. 54, Issue 2, December 2012, pp. 118-139.
2. Bowonder, B and Sunil Mani, “Venture Capital and Innovations: The Indian Experience”, a chapter in the book Financial Systems ,
Corporate Investment in Innovation and Venture Capital, 2004.
417. 3. Colin M. Mason and Richard T. Harrison, “Is it Worth it? The Rates of Return from Informal Venture Capital Investments”, Journal of
Business Venturing, Vol. 17, Issue 3, 2002, pp. 211-236. 2409-
4. Eduard Siemens, “Implications of Venture Capital Investments on Innovation”. Available at
https://www.researchgate.net/publication/267917566 .
2413
5. Julian Birkinshaw and Robert Nobel, “Knowledge as a Contingency Variable: Do the Characteristics of Knowledge Predict
Organization Structure?”, Organization Science, Vol. 13, Issue 3, June 2002, pp. 274–289.
6. Juanita Gonzalez-Uribe, “Venture Capital and Innovation” Thesis submitted in partial fulfillment of the requirements for the degree of
Doctor of Philosophy, Under the Executive Committee of the Graduate School of Arts and Sciences, Columbia University, 2013.
Available at https://www8.gsb.columbia.edu/programs/sites/programs/files/abstracts/Junita_dissertation.pdf.
7. Kevin Levillain, Blanche Segrestin and Armand Hatchuel, “Can venture capital foster innovation? A study of the coupling between
innovation and finance”, International Product Development Management Conference, Jun 2014, Ireland. Available at
https://www.researchgate.net/publication/278761223.
8. Masayuki Hirukaway and Masako Ueda, “Venture Capital and Innovation: Which is First?”, Pacific Economic Review, Vol. 16, Issue
4, Oct 2011 pp. 421-465.
9. Paul Gompers and Josh Lerner, “The Venture Capital Revolution”, The Journal of Economic Perspectives, Vol. 15, Issue. 2, 2001, pp.
145-168.
10. Richard L. Florida and Martin Kenney, “Venture Capital-financed Innovation and Technological Change in the USA”, Research
Policy, Vol. 17, Issue 3, 1988, pp. 119-137.
11. Roberta Dessi and Nina Yin, “ The Impact of Venture Capital on Innovation” January 2012. Available at
https://www.researchgate.net/publication/267917566.
12. Samuel Kortum and Josh Lerner, “Assessing the Contribution of Venture Capital to Innovation”, The RAND Journal of Economics,
Vol. 31, Issue 4, February 2002, pp. 674-692.
13. Cheng Cheng, Yangbin Sun, Yaqin Su & Shenggang Yang, “Venture Capital, Innovation and Growth: Evidence from Chinese
Metropolitan Data, Applied Economics Letters, Volume 26, Issue 7, June 2018, pp. 549-553.

Authors: Ekta M. Upadhyay

418. Paper Title: From 2D Sketches to Photo-Realistic Images using Generative Adversarial Networks
Abstract: With increasing technological advancements, there is a need for automation in this ever- 2414-
evolving world. This may result in improved efficiency, faster work and enhanced capabilities. Sketch-to-image 2417
translation is an image processing application that can be used as a helping hand in a variety of fields. One of
these is the utilization of Generative Adversarial Networks to guide edges to photographs, with the assistance of
image generators and discriminators who work connected to produce realistic images. We have also
incorporated Histogram of Oriented Gradients (HOG) as a feature/image descriptor. The HOG technique counts
the gradient orientations to differentiate the target and the background. Support Vector Machine (SVM) is the
classifier used for classification. This HOG and SVM model can be improved, altered and executed as multi-
program software.

Keyword : sketch, photo realistic image, Generative Adversarial Network, Histogram of Oriented Gradients
References:
1. Creswell, A. et al. “Generative Adversarial Networks: An Overview” IEEE Signal Processing Magazine, 35(1), pp.53—65, 2018.
2. H. Kazemi, F. Taherkhani, N. M. Nasrabadi,“Unsupervised Facial Geometry Learning for Sketch to Photo Synthesis,” in
International Conference of the Biometrics Special Interest Group (BIOSIG), 2018, 10.23919/BIOSIG.2018.8552937, IEEE.
3. Isola, Phillip, Jun-Yan Zhu, Tinghui Zhou, and Alexei A. Efros, "Image-to-image translation with conditional adversarial networks." In
Proceedings of the IEEE conference on Computer Vision and Pattern Recognition, pp. 1125-1134. 2017.
4. Galea, Christian, and Reuben A. Farrugia, "Matching software-generated sketches to face photographs with a very deep CNN, morphed
faces, and transfer learning." IEEE Transactions on Information Forensics and Security, vol 13, no. 6, pp: 1421-1431, 2017.
5. Kokila, R., M. S. Sannidhan, and Abhir Bhandary, "A study and analysis of various techniques to match sketches to Mugshot photos."
In 2017 International Conference on Inventive Communication and Computational Technologies (ICICCT), pp. 41-44. IEEE, 2017.
6. Wu, Xian, Kun Xu, and Peter Hall, "A survey of image synthesis and editing with generative adversarial networks." Tsinghua Science
and Technology, vol 22, no. pp: 660-674, 2017.
7. Dalal, Navneet, Bill Triggs, and Cordelia Schmid, "Human detection using oriented histograms of flow and appearance." In Eu ropean
Conference on Computer Vision, pp. 428-441. Springer, Berlin, Heidelberg, 2006.
8. Xu, Fen, and Ming Gao, "Human detection and tracking based on HOG and particle filter." In 2010 3rd International Congress on
Image and Signal Processing, vol. 3, pp. 1503-1507. IEEE, 2010.
9. Li, Yi, Timothy M. Hospedales, Yi-Zhe Song, and Shaogang Gong, "Free-hand sketch recognition by multi-kernel feature learning."
Computer Vision and Image Understanding, vol 137, pp: 1-11, 2017.
10. Ian J. Goodfellow , Jean Pouget-Abadie , Mehdi Mirza , Bing Xu , David Warde-Farley , Sherjil Ozair , Aaron Courville , Yoshua
Bengio, “Generative adversarial nets” Proceedings of the 27th International Conference on Neural Information Processing Syste ms,
p.2672-2680, December 08-13, 2014, Montreal, Canada.
11. Ronneberger O., Fischer P., Brox T, “ U-Net: Convolutional Networks for Biomedical Image Segmentation” In Medical Image
Computing and Computer-Assisted Intervention -- MICCAI 2015, Lecture Notes in Computer Science, vol 9351. Springer, Cham.
12. Tao, L. et al., “LLCNN: A convolutional neural network for low-light image enhancement”, 2017 IEEE Visual Communications and
Image Processing (VCIP).
13. Kazemi, Hadi, Mehdi Iranmanesh, Ali Dabouei, Sobhan Soleymani, and Nasser M. Nasrabadi. "Facial attributes guided deep sketch-to-
photo synthesis." In 2018 IEEE Winter Applications of Computer Vision Workshops (WACVW), pp. 1-8. IEEE, 2018.

Authors: Robin Thakur, Sunil Kumar, Kamal Kashyap, Ashwani Kumar, Sorabh Aggarwal
Selection of Erosive Wear Rate Parameters of Pelton Turbine Buckets using PSI and TOPSIS
Paper Title:
Techniques
Abstract: Hydro turbine machineries erosion due to silt is a complex issue for the effective practice of
hydropower plants. Erosion caused by silt of the Pelton turbine buckets is a compound phenomenon that
depends on size of silt particles , silt particles concentration , velocity of jet , and working time . This paper deals
with the influence of silt erosion for various silt loaded factors and effective parameters. The preference
selection index (PSI) and technique for order of preference by similarity to ideal solution (TOPSIS) approaches
has been adopted to find optimal set of parameters which offers the highest performance for the Pelton turbine.
Based up on the results obtained from both PSI and TOPSIS approaches it is found that optimal performance has
been provided by A-1 alternate with geometric and flow parameters as , 𝑺𝒑 = 𝟗𝟎 𝝁, 𝑪𝒔 = 𝟐𝟎𝟎𝟎 𝒑𝒑𝒎, 𝑽𝒋 =
𝟐𝟕. 𝟑𝟎𝟗 𝒎/𝒔 and 𝒕𝒘 = 𝟑 𝒉𝒓𝒔 , and respectively.

Keyword : Hydro energy, silt size, Pelton turbine, PSI, TOPSIS


References:
419. 1. V. K. Singh and S. K. Singal, “Operation of hydro power plants-a review,” Renew. Sustain. Energy Rev., vol. 69, November 2016, pp.
610–619, 2017.
2. D. Robb, “Hydro’s fish-friendly turbines,” Renew. Energy Focus, vol. 12, no. 2, pp. 16–17, 2011.
2418-
3. M. Bansal, D. K. Khatod, and R. P. Saini, “Modeling and optimization of integrated renewable energy system for a rural site,” in 2014 2428
International Conference on Reliability Optimization and Information Technology (ICROIT), 2014, pp. 25–28.
4. A. Pundir and A. Kumar, “Technical feasibility study for power generation from a potential mini hydro site nearby Shoolini
University,” vol. 2, no. 2, pp. 85–95, 2014.
5. D. J. Woodcock and I. Morgan White, “The application of pelton type impulse turbines for energy recovery on sea water reverse
osmosis systems,” Desalination, vol. 39, no. C, pp. 447–458, 1981.
6. R. Chattopadhyay, “High silt wear of hydroturbine runners,” Wear, vol. 162–164, no. PART B, pp. 1040–1044, 1993.
7. B. S. Mann, “High-energy particle impact wear resistance of hard coatings and their application in hydroturbines,” Wear, vol. 237, no.
1, pp. 140–146, 2000.
8. B. S. Mann and V. Arya, “Abrasive and erosive wear characteristics of plasma nitriding and HVOF coatings: Their application in
hydro turbines,” Wear, vol. 249, no. 5–6, pp. 354–360, 2001.
9. G. R. Desale, B. K. Gandhi, and S. C. Jain, “Effect of erodent properties on erosion wear of ductile type materials,” Wear, vol. 261, no.
7–8, pp. 914–921, 2006.
10. T. R. Bajracharya, B. Acharya, C. B. Joshi, R. P. Saini, and O. G. Dahlhaug, “Sand erosion of Pelton turbine nozzles and buck ets: A
case study of Chilime Hydropower Plant,” Wear, vol. 264, no. 3–4, pp. 177–184, 2008.
11. A. K. Chauhan, D. B. Goel, and S. Prakash, “Erosion behaviour of hydro turbine steels,” Bull. Mater. Sci., vol. 31, no. 2, pp. 115–120,
2008.
12. D. Agar and M. Rasi, “On the use of a laboratory-scale Pelton wheel water turbine in renewable energy education,” Renew. Energy,
vol. 33, no. 7, pp. 1517–1522, 2008.
13. [M. K. Padhy and R. P. Saini, “Effect of size and concentration of silt particles on erosion of Pelton turbine buckets,” Energy, vol. 34,
no. 10, pp. 1477–1483, 2009.
14. B. S. Thapa, B. Thapa, and O. G. Dahlhaug, “Current research in hydraulic turbines for handling sediments,” Energy, vol. 47, no. 1, pp.
62–69, 2012.
15. J. S. Anagnostopoulos and D. E. Papantonis, “A fast Lagrangian simulation method for flow analysis and runner design in Pelto n
turbines,” J. Hydrodyn., vol. 24, no. 6, pp. 930–941, 2012.
16. D. K. Goyal, H. Singh, H. Kumar, and V. Sahni, “Slurry erosive wear evaluation of HVOF-spray Cr2O3coating on some turbine
steels,” J. Therm. Spray Technol., vol. 21, no. 5, pp. 838–851, 2012.
17. M. K. Padhy and R. P. Saini, “Study of silt erosion mechanism in Pelton turbine buckets,” Energy, vol. 39, no. 1, pp. 286–293, 2012.
18. S. J. Williamson, B. H. Stark, and J. D. Booker, “Performance of a low-head pico-hydro Turgo turbine,” Appl. Energy, vol. 102, pp.
1114–1126, 2013.
19. B. R. Cobb and K. V. Sharp, “Impulse (Turgo and Pelton) turbine performance characteristics and their impact on pico -hydro
installations,” Renew. Energy, vol. 50, pp. 959–964, 2013.
20. S. Khurana and V. Goel, “Effect of jet diameter on erosion of turgo impulse turbine runner,” J. Mech. Sci. Technol., vol. 28, no. 11, pp.
4539–4546, 2014.
21. C. A. Platero, C. Nicolet, J. A. Sánchez, and B. Kawkabani, “Increasing wind power penetration in autonomous power systems th rough
no-flow operation of Pelton turbines,” Renew. Energy, vol. 68, pp. 515–523, 2014.
22. A. Židonis and G. A. Aggidis, “State of the art in numerical modelling of Pelton turbines,” Renew. Sustain. Energy Rev., vol. 45, pp.
135–144, 2015.
23. D. Kumar and P. P. Bhingole, “CFD Based Analysis of Combined Effect of Cavitation and Silt Erosion on Kaplan Turbine,” Mater.
Today Proc., vol. 2, no. 4–5, pp. 2314–2322, 2015.
24. R. kumar and S. K. Singal, “Operation and Maintenance Problems in Hydro Turbine Material in Small Hydro Power Plant,” Mater.
Today Proc., vol. 2, no. 4–5, pp. 2323–2331, 2015.
25. J. C. Chávez, J. A. Valencia, G. A. Jaramillo, J. J. Coronado, and S. A. Rodríguez, “Failure analysis of a Pelton impeller,” Eng. Fail.
Anal., vol. 48, pp. 297–307, 2015.
26. A. Židonis, A. Panagiotopoulos, G. A. Aggidis, J. S. Anagnostopoulos, and D. E. Papantonis, “Parametric optimisation of two Pelton
turbine runner designs using CFD,” J. Hydrodyn., vol. 27, no. 3, pp. 403–412, 2015.
27. A. Židonis and G. A. Aggidis, “Pelton turbine: Identifying the optimum number of buckets using CFD,” J. Hydrodyn., vol. 28, no. 1,
pp. 75–83, 2016.
28. V. B. Nguyen, Q. B. Nguyen, Y. W. Zhang, C. Y. H. Lim, and B. C. Khoo, “Effect of particle size on erosion characteristics,” Wear,
vol. 348–349, pp. 126–137, 2016.
29. V. Gupta, V. Prasad, and R. Khare, “Numerical simulation of six jet Pelton turbine model,” Energy, vol. 104, pp. 24–32, 2016.
30. C. Vessaz, L. Andolfatto, F. Avellan, and C. Tournier, “Toward design optimization of a Pelton turbine runner,” Struct. Multidiscip.
Optim., vol. 55, no. 1, pp. 37–51, 2017.
31. M. Egusquiza, E. Egusquiza, D. Valentin, C. Valero, and A. Presas, “Failure investigation of a Pelton turbine runner,” Eng. Fail. Anal.,
vol. 81, no. September 2016, pp. 234–244, 2017.
32. A. M. Morales B, I. F. Pachón, J. Loboguerrero U, J. A. Medina, and J. A. Escobar G, “Development of a test rig to evaluate abrasive
wear on Pelton turbine nozzles. A case study of Chivor Hydropower,” Wear, vol. 372–373, pp. 208–215, 2017.
33. B. Kishor, G. P. Chaudhari, and S. K. Nath, “Slurry erosion behaviour of thermomechanically treated 16Cr5Ni stainless steel,” Tribol.
Int., vol. 119, no. November 2017, pp. 411–418, 2018.
34. K. Maniya and M. G. Bhatt, “A selection of material using a novel type decision-making method: Preference selection index method,”
Mater. Des., vol. 31, no. 4, pp. 1785–1789, 2010.
35. R. Chauhan, T. Singh, N. S. Thakur, and A. Patnaik, “Optimization of parameters in solar thermal collector provided with impinging
air jets based upon preference selection index method,” Renew. Energy, vol. 99, pp. 118–126, 2016.
36. B. Vahdani, S. M. Mousavi, and S. Ebrahimnejad, “Soft computing-based preference selection index method for human resource
management,” J. Intell. Fuzzy Syst., vol. 26, no. 1, pp. 393–403, 2014.
37. R. Attri, N. Dev, K. Kumar, and A. Rana, “Selection of cutting-fluids using a novel decision-making method: preference selection
index method,” Int. J. Inf. Decis. Sci., vol. 6, no. 4, p. 393, 2014.
38. Mesran, K. Tampubolon, R. D. Sianturi, F. T. Waruwu, and A. P. U. Siahaan, Determination of Education Scholarship Recipients
Using Preference Selection Index, vol. 3, no. 6. 2017.
39. M. Madić, J. Antucheviciene, M. Radovanović, and D. Petković, “Determination of laser cutting process conditions using the
preference selection index method,” Opt. Laser Technol., vol. 89, pp. 214–220, 2017.
40. J. R. Lockwood, “On the statistical analysis of multiple-choice feeding preference experiments,” Oecologia, vol. 116, no. 4, pp.
475–481, 1998.
41. K. D. Maniya and M. G. Bhatt, “The selection of flexible manufacturing system using preference selection index method,” Int. J. Ind.
Syst. Eng., vol. 9, no. 3, p. 330, 2011.
42. E. Roszkowska, “Multi-Criteria Decision Making Models by applying the TOPSIS Method to crisp and interval data,” Mult. Criteria
Decis. Mak., vol. 6, no. Mcdm, pp. 200–230, 2011.
43. O. Management, “A review on industrial applications of TOPSIS approach Santosh Kumar Yadav *, Dennis Joseph and Nasina
Jigeesh,” vol. 30, no. 1, 2018.
44. S. Opricovic and G. H. Tzeng, “Compromise solution by MCDM methods: A comparative analysis of VIKOR and TOPSIS,” Eur. J.
Oper. Res., 2004.
45. M. Behzadian, S. Khanmohammadi Otaghsara, M. Yazdani, and J. Ignatius, “A state-of the-art survey of TOPSIS applications,”
Expert Syst. Appl., 2012.
46. K. D. Maniya and M. G. Bhatt, “An alternative multiple attribute decision making methodology for solving optimal facility
layout design selection problems,” Comput. Ind. Eng., vol. 61, no. 3, pp. 542–549, 2011.

Authors: Mohammad Abdul Waseem, A. Vimala

Paper Title: Effect of Steel Bracings on RC Building by Aligning Them at Different Positions
Abstract: Earthquake is an unexpected and expensive disaster for both livelihood and economy. In the
modern day construction there has been a lot of importance to make the structure resistive against the laterally
acting loads. Bracings are an option for lateral load resisting system in tall buildings. The concept of bracings is
420. to add more stiffness and strength to the adequate strength of the structure. Members in a braced frame are
generally made of structural steel which can work effectively both in strain and pressure.
2429-
In the present work 13 story irregular building is considered with and without bracings to evaluate the optimum 2432
bracing pattern for the structure. By changing the position of the bracings alternately in both horizontal and
vertical direction the analysis is carried out. These are the different models analyzed by pushover analysis (a)
Building with no bracing, (b) Building with alternate vertical bracing starting from bay-1, (c) Building with
alternate vertical bracing starting from bay-2, (d) Building with alternate vertical bracing starting from story-1,
(e) Building with alternate vertical bracing starting from story-1. The non linear static results were compared.
The various parameters like story drift, shear, time period, stiffness, moment, torsion, performance points are
obtained by the analysis for all the models.

Keyword : Seismic Action, pushover analysis, drifts, time period, performance points.
References:
1. Ms. Pallavi B. Gadge, Mr. Gajanan D. Dhawale, Miss. Rutuja K. Kakpure, et al., (2018), “Study of Behaviour of Steel Structure by
Push Over Analysis”, International Advanced Research Journal in Science, Engineering and Technology ISO 3297:2007 Certified Vol.
5, Issue 5, May 2018.
2. Kadidand A. Boumrkik, (2008), “Pushover analysis of reinforced concrete frame structures”, at Department of Civil Engineering, Uni-
versity of Banta, Algeria, Asian journal of civil engineering (building and housing) vol. 9, No. 1 pp 75-83.
3. ASCE, (2002), “Standard Methodology for Seismic Evaluation of Buildings”, Standard No. ASCE-31. American Society of Civil
Engineers, Reston, Virginia.
4. Ashraf Habibullah and Stephen Pyle, (1998), “Practical three dimensional non-linear static pushover analysis”, Structures Magazine,
winter.
5. Swetha Sunil, Sujith P.S, “Seismic Study of Multistory RC Building With Different Bracings”, International Journal of Innovative
Research in Science, Engineering and Technology (An ISO 3297: 2007 Certified Organization) Website: www.ijirset.com Vol. 6, Issue
5, May 2017.
6. Miss. Sayli S Kamble, Prof. Dr. D. N. Shinde, “Performance of RC Frame With and Without Bracing Pushover Analysis”,
International Journal for Research in Applied Science & Engineering Technology (IJRASET), Volume 4 Issue IX, September 2016 IC
Value: 13.98 ISSN: 2321-9653.
7. Mrugesh D. Shah, Atul N. Desai, Sumant B Patel, Performance based analysis of R.C.C. frames National Conference on Recent Tre nds
in Engineering & Technology.
8. ETABS User’s Manual, “Integrated Building Design Software”, Computer and Structure Inc. Berkeley, USA..
Thariq Khan Azizuddin Khan, Nor Fazila Abd Malek, Asmadi Ishak, Nur Haziyanti Mohamad
Authors:
Khalid & Ali Md Nadzalan
Paper Title: Effects of Imagery and Video Modelling on Self-Efficacy during Resistance Exercise
Abstract: The purpose of this study is to examine the effects of audio imagery with video modelling on
participants’ self-efficacy during resistance exercise. Forty five individuals volunteered as research participant
and were divided homogenously into imagery with modelling end instruction (EIM) or initial instruction (IIM)
groups and a modelling only (M) as control group. During the pre-test all participants employed self-efficacy
(SE) of lunges exercise. All participants were provided with the interventions (EIM, IIM, & M) during 10
minutes rest before the first post-test which, all measurements were conducted to look at the acute effects of
interventions employed. Participants’ android phones were downloaded with specific intervention according to
their group and they were advised to employ the intervention once a day for seven days. The second post-test
was conducted consist of all measurements after seven days of intervention duration. For self-efficacy,
significant results were recorded on pre-test and post-test within participants in EIM and IIM (p < 0.05),
moreover, results for post-test comparing data between groups indicates significant between EIM and M groups,
IIM and M groups (p < 0.05). No significant different results found comparing EIM with IIM groups. Results
from this study indicate that there are psychological performances improvement among participant who
employed imagery and modelling comparing to modelling alone.

Keyword : imagery, video modelling, self-efficacy


References:
1. Lesinski, M., O. Prieske, and U. Granacher, Effects and dose–response relationships of resistance training on physical performance in
421. youth athletes: a systematic review and meta-analysis. Br J Sports Med, 2016. 50(13): p. 781-795.
2. Faigenbaum, A.D., et al., Citius, Altius, Fortius: beneficial effects of resistance training for young athletes: narrative review. Br J Sports
Med, 2016. 50(1): p. 3-7. 2433-
3. Nadzalan, A.M., et al., The effects of resistance training with different focus attention on muscular strength: Application to teaching 2435
methods in physical conditioning class. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 2019. 8(8):
p. 16-19.
4. Shazana, N., et al., Electromyographical analysis and performance during bench press exercise: The influence of self-talk. International
Journal of Recent Technology and Engineering 2019. 8(1): p. 1279-1281.
5. Tajudin, A.S., M.H.N. Rosni, and J.L.F. Low, Effects of augmented feedback on squat technique among eleven years old children. Jurnal
Sains Sukan dan Pendidikan Jasmani, 2016. 5(1): p. 1-8.
6. Khan, T., T. Morris, and D. Marchant, Portable devices for delivering imagery and modelling interventions: effects on netball players’
adherence, shooting performance, and self-efficacy. Journal of Fundamental and Applied Sciences, 2017. 9(6S): p. 1334-1345.
7. Mazli, A.M., T.K.A. Khan, and A. Hashim, The effects of PETTLEP and traditional imagery interventions on netball players shooting
accuracy. Jurnal Sains Sukan dan Pendidikan Jasmani, 2018. 7(2): p. 53-60.
8. Khan, T.K.A., M. Janep, and S. Hamzah, The effects of specific and general cognitive imagery on service achievement among tekong in
sepak takraw. Jurnal Sains Sukan dan Pendidikan Jasmani, 2013. 2(1): p. 29-47.
9. Khan, T.K.A., T. Morris, and D. Marchant, Portable devices for delivering imagery and modelling among netball players, a qualitative
study Jurnal Sains Sukan dan Pendidikan Jasmani, 2015. 4(1): p. 50-64.
10. Sani, M.H.M. and T.K.A. Khan, Kesan imageri terhadap prestasi conversion kick dalam sukan ragbi. Jurnal Sains Sukan dan Pendidikan
Jasmani, 2018. 7(1): p. 53-61.
11. Sani, M.H.M. and T.K.A. Khan, Imagery and modeling-impact on rugby skill performance, single case multiple baseline assessment
across participant. Jurnal Sains Sukan dan Pendidikan Jasmani, 2017. 6(2): p. 10-27.
12. Sato, N., T.K.A. Khan, and N. Jusoh, The effects of combined self-talk, imagery and video-modelling interventions on anaerobic
performance, heart rate response and self-efficacy Jurnal Sains Sukan dan Pendidikan Jasmani, 2017. 6(1): p. 1-10.
13. Parnabas, V., et al., Internal and external imagery on sports performance among football players. International Journal of Physical and
Social Sciences, 2015. 5(4): p. 190.
14. Marshall, E.A. and A.-M. Gibson, The effect of an imagery training intervention on self-confidence, anxiety and performance in
acrobatic gymnastics–a pilot study. Journal of Imagery Research in Sport and Physical Activity, 2017. 12(1).
15. Marshall, E. and A.-M. Gibson, The effect of an imagery training intervention on self-confidence and anxiety in acrobatic gymnastics.
Journal of Science and Medicine in Sport, 2017. 20: p. e92.
16. Weibull, F., et al., Walk this way: A brief exercise imagery intervention increases barrier self-efficacy in women. Current Psychology,
2015. 34(2): p. 477-490.
17. Wesch, N., et al., Imagery and self-efficacy in the injury context. Psychology of Sport and Exercise, 2016. 24: p. 72-81.
18. Kuan, G., et al., Effects of relaxing and arousing music during imagery training on dart-throwing performance, physiological arousal
indices, and competitive state anxiety. Frontiers in psychology, 2018. 9: p. 14.
19. Asaseh, M., J.H. Azar, and E. Pishyare, The effect of motor imagery on the gross motor skills of children with developmental
coordination disorder. Bulletin de la Société Royale des Sciences de Liège, 2016. 85: p. 130-139.
20. Sachet, A.B., et al., Development of the correspondence between real and imagined fine and gross motor actions. Journal of Cognition
and Development, 2016. 17(1): p. 162-179.
21. Baert, H., Technology strategies to address grade-level outcomes: National standards 1 and 2. Journal of Physical Education,
Recreation & Dance, 2015. 86(7): p. 40-45.
22. Obrusnikova, I. and P.J. Rattigan, Using video-based modeling to promote acquisition of fundamental motor skills. Journal of Physical
Education, Recreation & Dance, 2016. 87(4): p. 24-29.
23. Nadzalan, A.M., et al., Relationship between muscle architecture and badminton-specific physical abilities. Human Movement, 2018.
19(1): p. 44-50.
24. Nadzalan, A.M., et al., Relationship between lower body muscle architecture and lunges performance. Jurnal Sains Sukan dan
Pendidikan Jasmani, 2016. 5(2): p. 15-23.
25. Nadzalan, A.M., et al., The effects of step versus jump forward lunge exercise training on muscle architecture among recreational
badminton players. World Applied Sciences Journal, 2017. 35(8): p. 1581-1587.
26. Bandura, A., Self‐efficacy. The Corsini encyclopedia of psychology, 2010: p. 1-3.
27. Watt, A.P., T. Morris, and M.B. Andersen, Issues in the Development of a Measure of Imagery Ability in Sport. Journal of Mental
Imagery, 2004.
28. Gilson, T.A. and L.E. Curnock, An examination of athletes' self-efficacy and strength training effort during an entire off-season. The
Journal of Strength & Conditioning Research, 2012. 26(2): p. 443-451.
29. Wright, C.J. and D. Smith, The effect of PETTLEP imagery on strength performance. International journal of sport and exercise
psychology, 2009. 7(1): p. 18-31.
30. Buck, D., et al., The effects of mental imagery with video-modeling on self-efficacy and maximal front squat ability. Sports, 2016. 4(2):
p. 23.
31. Debarnot, U., et al., Experts bodies, experts minds: how physical and mental training shape the brain. Frontiers in human
neuroscience, 2014. 8: p. 280.
32. Weinberg, R., Does imagery work? Effects on performance and mental skills. Journal of Imagery Research in Sport and Physical
Activity, 2008. 3(1).
33. Rymal, A.M. and D.M. Ste-Marie, Does self-modeling affect imagery ability or vividness? Journal of Imagery Research in Sport and
Physical Activity, 2009. 4(1).

Authors: Dikshita Kakoti, Runumi Das, Puja Agarwal

Paper Title: GDP and Outward Foreign Direct Investment from India: Co-Integration and Causality Test
Abstract: India’s outward foreign direct investment has experienced a Dynamic change over last decade
after the liberalisation and globalisation of Indian economy that further achieves economic expansion and
development in recent years. Approximately seven percent growth rate is witness by India from 1993-2011.This
period also witnessed upward trend of outbound investment from India. UNCTAD (2015) has also nailed India
as one of the leading outward investing economies. But a very few works have been done for exploring the long
run relationship between outward FDI and GDP in context of the emerging economies like India. With this
backdrop, the present study empirically investigates the long run and short run co –integrating relationship
between India’s GDP and OFDI. For empirical analysis various econometric tools like test of stationarity, Engle
granger co-integration ( as we have consider only two macro variables) and ECM model is used to test the
causal association between the selected variables. It is found that there is long run causal relationship among
OFDI and India’s Growth rate. The results found that no short term causal association among India’s OFDI and
GDP by reflecting the fact that there are other factors which have influence on OFDI flows.
422.
Keyword : GDP, outward FDI, Growth. 2436-
2439
References:
1. Dunning, J. H. (1981). Explaining the international investment position of countries: towards a Dynamic or Development approach.
Weltwirtschaftliches Archive , 117 (209), 30-64.
2. Dunning, j. H. (1986). The Investment Development Cycle Revisited. Weltwirtschaftliches
3. Kakoti, D. (2019). An Empirical Investigation of India’s Outward Foreign Direct Investment: A Macro Perspective. Emerging
Economy Studies 1–10 DOI: 10.1177/2394901519870764
4. Herzer, D. (2010). Outward FDI and economic growth. Journal of Economic Studies , 37 (5), 476-494.
5. Wong, N. and Goh, S. (2011). Malaysia’s outward FDI: The effects of market size and government policy. journal of policy modeling ,
33, 497-510.
6. Lee, C. G. (2010). The nexus of outward foreign direct investment and income: Evidence from Singapore. Applied Econometrics and
International Development , 10 (1)
7. Yalcinkaya, O., & Aydin, H. I. (2017). The Effects of Inward and Outward Foreign Direct Investments on Economic Growth: Evide nce
from the G-7 and Selected Emerging Market Economies (194-2015). Research in Applied Economics , ix (1), 26-41.
8. Singh, S. (2017). The Relationship between FDI outflows, Exports and GDP in India: An Application of the Autoregressive Distributed
Lag model. Economic Affairs, , 62 (3), 471-481.
9. Gujarati, D. N. (1995). Basic econometrics: Third edition. Mc-grew-Hills.

Authors: Maneesha Kushwaha, Arun Pachori

423. Paper Title: Improvement of Long Distance Transmission by Using TCSC Fact Device
Abstract: The prudent point of view of Flexible AC Transmission System (FACTS) establishment and 2440-
execution has been an essential issue since origin and expanding each day because of vital, specialized and 2444
showcase requirements. The advancement of these issues assumes a significant job in the achievement of any
utility and at last minimal effort accessibility of intensity at the client end. This paper exhibits the ideal area of
Thyristor Controlled Series Capacitor (TCSC) in control framework to limit the transmission misfortune
utilizing Particle Swarm Optimization procedure. The reenactments are performed on the IEEE-14 transport
framework, IEEE 30 transport framework and Indian 75 transport framework with Newton Raphson load flow
calculation including TCSC.

Keyword : FACTS, TCSC, Transmission Loss


References:
1. Hingorani, N. G Concepts and Technology of Flexible AC Transmission Systems, IEEE 2000
2. Y.H. Tune FACTS, IEE Power and Energy Series, 1999..
3. ManojFozdar, GA Based Optimizations of TCSC, IEEE UPEC,2007
4. ] R.NarmathaBanu Genetic Algorithm for Optimal Power Flow FACTS gadgets, IEEE Conference Intelligent Systems,2008
5. Ashkan Yousefi, Multi-Objective methodology for ideal area of TCSC, IEEE2010.
6. Sidhartha Panda, " Transformative calculation for TCSCbased controller structure", Simulation Modeling Practice 2009.
7. Bongkoj Sookananta, FACTS utilizing Differential Evolution Technique,Conference on Electrical Engineering 2009
8. C. L. Wadhwa, Electrical Power Systems, New Age International Publishers, 2009 .
9. HadiSaadat, Power System Analysis,WCB McGraw Hill, 1999.

Authors: Rajeev Raghuvanshi, Dhanraj Verma, Manojkumar Deshpande, Md. Ilyas


Designing Single Slop Single Basin Solar Water Distillation Plant Performance Monitoring and
Paper Title:
Prediction System
Abstract: the issue of the water crisis is rising day by day, due to global warming and other environmental
effects. That is not only the issue for India, but it is also for the entire world. However, the solar-based water
distillation plants are not much efficient but we can use this method for producing pure and drinkable water. In
this paper, we proposed to design a solar water distillation plant using the single slop method. In addition to that
for monitoring and measuring the performance of the distillation plant a data mining based prediction system is
implemented. The experiments are performed on the real-world implemented single slop solar water distillation
plant-based observations. The observations are collected using the IoT (Internet of things) device for each five-
minute time difference for each sample collection. The data samples are collected between 10:00 AM to 4:00
PM for 7 days. Additionally by using the collected samples the data mining model is trained and tested on the
prepared syntactic dataset. The experimental results demonstrate accurate predictions for the solar distillation
water plant. After this implementation and system model, the future directions of the research are also provided.

Keyword : machine learning, data mining, solar energy, water distillation, performance prediction and
monitoring.
References:
1. H. Turral, J. Burke, J. M. Faurès, “Climate change, water and food security”, Food and Agriculture Organization of the United Nations,
Viale delle Terme di Caracalla, 00100 Rome, Italy
2. Erach Bharucha, “Textbook for Environmental Studies”, University Grants Commission, New Delhi. 2004
3. T. Kjellstrom, M. Lodh, T. McMichael, G. Ranmuthugala, R. Shrestha, S. Kingsland, “Chapter 43: Air and Water Pollution: Burden
and Strategies for Control”, Disease Control Priorities in Developing Countries. 2nd edition.
424. 4. M. Chandrashekara, A. Yadav, “Water desalination system using solar heat: A review”, Renewable and Sustainable Energy Reviews
67 (2017) 1308–1330
5. M. T. Chaichan, H. A. Kazem, “Water solar distiller productivity enhancement using concentrating solar water heater and phase 2445-
change material (PCM)”, Case Studies in Thermal Engineering 5 (2015) 151–159 2451
6. D.B. Singh, J.K. Yadav, V.K. Dwivedi, S. Kumar, G.N. Tiwari, I.M. Al-Helal, “Experimental studies of active solar still integrated
with two hybrid PVT collectors”, Solar Energy 130 (2016) 207–223
7. A. M. Manokar, D. P. Winston, A. E. Kabeel, R. Sathyamurthy, “Sustainable fresh water and power production by integrating PV
panel in inclined solar still”, Journal of Cleaner Production 172 (2018) 2711e2719
8. F. Suarez, R. Urtubia, “Tackling the water-energy nexus: an assessment of membrane distillation driven by salt-gradient solar ponds”,
Clean Techn Environ Policy, DOI 10.1007/s10098-016-1210-3
9. R. S. Hansen, C. S. Narayanan, K. K. Murugavel, “Performance analysis on inclined solar still with different new wick materia ls and
wire mesh”, Desalination 358 (2015) 1–8
10. R. Sathyamurthy, D. G. Harris Samuel, P. K. Nagarajan, T. Arunkumar, “Geometrical variations in solar stills for improving the fresh
water yield—A review”, Desalination and Water Treatment (2016) 1–15, doi: 10.1080/19443994.2015.1136241
11. B. Gupta, R. Sharma, P. Shankar, P. Baredar, “Performance enhancement of modified solar still using water sprinkler: An experimental
approach”, Perspectives in Science (2016) 8, 191—194
12. K. H. Nayi, Kalpesh V. Modi, “Pyramid solar still: A comprehensive review”, Renewable and Sustainable Energy Reviews 81 (2018)
136–148
13. G. Xue, Q. Chen, S. Lin, J. Duan, P. Yang, K. Liu, J. Li, J. Zhou, “Highly Efficient Water Harvesting with Optimized Solar Th ermal
Membrane Distillation Device”, Global Challenges 2018, 2, 1800001, © 2018 The Authors. Published by WILEY-VCH Verlag GmbH
& Co. KGaA, Weinheim
14. H. A. Madhhachi, G. Min, “Key factors affecting the water production in a thermoelectric distillation system”, Energy Conversion and
Management 165 (2018) 459–464
15. R. Ullah, M. Khraisheh, R. J. Esteves, J. T. McLeskey Jr, M. AlGhouti, M. Gad-el-Hak, H. V. Tafreshi, “Energy efficiency of direct
contact membrane distillation”, Desalination 433 (2018) 56–67
16. L. Zhu, M. Gao, C. K. N. Peh, G. W. Ho, “Recent progress in solar-driven interfacial water evaporation: Advanced designs and
applications”, Nano Energy 57 (2019) 507–518
17. L. Zhu, M. Gao, C. K. N. Peh, X. Wang, G. W. Ho, “Self-Contained Monolithic Carbon Sponges for Solar-Driven Interfacial Water
Evaporation Distillation and Electricity Generation”, Adv. Energy Mater. 2018, 8, 1702149
18. Z. M. Omara, A. E. Kabeel, A. S. Abdullah, F. A. Essa, “Experimental investigation of corrugated absorber solar still with wick and
reflectors”, Desalination 381 (2016) 111–116
19. A. Ghosh, “Comparative study of Financial Time Series Prediction By Artificial Neural Network with Gradient Descent Learning”,
https://arxiv.org/pdf/1111.4930.pdf (URL)
20. “Chapter 4. Regression and Prediction”, O’Reilly, https://www.oreilly.com/library/view/practical-statistics-
for/9781491952955/ch04.html.(URL)

Authors: Tatyana Lenkova, Ilya Nikonov, Yuri Kuznetsov, Larisa Karpenko, Anna Balykina
Development of the Probiotic Feed Supplement Based on Lactobacillus Plantarum to Increase the
Paper Title:
Broiler Productivity
Abstract: This article reflects the results of the development of a method for testing a promising feed
supplement based on the Lactobacillus plantarum strain, with a high antagonistic activity to campylobacter. To
determine the digestibility and use of food nutrients by broilers, a physiological (balance experiment) was
conducted on three males from each group at the age of 28 days.
By the end of the growing period, there was a clear tendency to increase the live weight of 36-day-old
chickens compared with the control group in experimental group 2, which received a feed supplement, including
bacteria Lactobacillus plantarum. She was 4.0% higher.
As a result of scientific work, it was shown that feeding broiler chickens with a probiotic feed additive based on
Lactobacillus plantarum helps to increase their productivity during the entire growing cycle.

Keyword : probiotics, lactobacilli, Lactobacillus Plantarum, broilers, Campylobacter jejuni.


425.
References:
1. Y. Yang, P.A. Iji, M. Choct, Dietary modulation of gut microflora in broiler chickens: a review of the role of six kinds of a lternatives
2452-
to in-feed antibiotics. World’s Poult. Sci. J. 2009, 65(1). pp. 97–114. 2454
2. J. I. R. Castanon, History of the use of antibiotics as growth promoters in European poultry feeds. Poult. Sci. 2007, 86, pp. 2466–2471.
3. N. T. Hnung, N. Chansiripornchai, J. J. Carrique-Mas, Antimicrobial resistance in bacterial poultry pathogens: A review. Front. Vet.
Sci. 2017, 4, pp. 126.
4. Y. Ohashi, U. Ushida, Health-beneficial effects of probiotics: its mode of action. Anim. Sci. J. 2009, 80, pp. 361–371.
5. A. Saleh, K. Hayashi, Aspergillus niger reduces skeletal muscles protein breakdown and stimulates growth in broilers. Res. Opinions
Anim. Vet. Sci. 2011, 1, pp. 209–212.
6. R. Fuller, Probiotics in man and animals. Bacterol. 1989, 66, pp. 806–830.
7. E. E. O’Dea, G. M. Fasenko, G. E. Allison, D. R. Korver, G. W. Tannock, L. L. Guan, Investigating the effects of commercial
probiotics on broiler chick quality and production efficiency. Poult. Sci. 2006, 85, pp. 1855–1863.
8. A. Choudhari, S. Shinde, B.N. Ramteke, Prebiotics and probiotics as health promoters. Vet. World. 2008, 1, pp. 59–61.
9. M. K. Huang, Y. J. Choi, R. Houde, J. W. Lee, B. Lee, X. Zhao, Effects of Lactobacilli and an acidophilic fungus on the production
performance and immune responses in broiler chickens. Poult. Sci. 2004, 83, pp. 788–795.
10. S. M. Hassannein, N. K. Soliman, Effect of probiotic (Saccharomyces cerevisiae) adding to diets on intestinal microflora and
performance of Hy-Line layers hens. J. Amer. Sci. 2010, 6, pp. 159–169.
11. M. Chichlowski, J. Croom, B.W. McBride et al. Metabolic and physiological impact of probiotics or direct-fed microbials on poultry.
Intl. J. Poult. Sci. 2007, 6(10). pp. 694–704.

Authors: J C Narayana Swamy , D Seshachalam

Paper Title: Multiband Microstrip Patch Antenna for IoT Applications


Abstract: In this paper, a planar multiband microstrip patch antenna is presented for narrow band internet
of things (NB-IoT) applications. The simple planar structure covers three of the approved bands (830-840 MHz),
(850-890 MHz) and (1190-1200 MHz). The return loss at resonance frequencies is less than-20dB and radiation
pattern is omnidirectional as desired, for all the bands. Simple basic equations of microstrip patch antenna are
used for design. The simulation and performance analysis is done using HFSS tool. The design considers simple,
easily available printed circuit board (PCB) with FR4 dielectric material between the patch and ground plane.
Which is inexpensive, fulfills the basic need of the application. The optimetrics of the HFSS simulation tool are
handy, used extensively to find appropriate feed position, optimize return loss, gain and to tune the resonance
frequencies.

Keyword : Narrow band internet of things, NB-IoT, multi-band microstrip patch antenna, planar structure
426. antenna, simulation using HFSS, triple band antenna.
2455-
References: 2457
1. C. A. Balanis, Antenna Theory: Analysis and Design. Hoboken, NJ,USA: Wiley, 2005.
2. I. Dioum, A. Diallo, S. M. Farssi, and C. Luxey, A novel compact dual-band LTE antenna-system for MIMO operation, IEEE Trans.
Antennas Propag., vol. 62, no. 4, pp. 22912296, Apr. 2014.
3. M. Li, X. Q. Lin, J. Y. Chin, R. Liu, and T. J. Cui, A novel miniatur-ized printed planar antenna using split-ring resonator, IEEE
Antennas Wireless Propag. Lett., vol. 7, pp. 629631, 2008.
4. J. Pei, A.-G. Wang, S. Gao, and W. Leng, Miniaturized triple-band antenna with a defected ground plane for WLAN/WiMAX applica-
tions, IEEE Antennas Wireless Propag. Lett., vol. 10, pp. 298301, 2011.
5. S. Chamaani and A. Akbarpour, Miniaturized dual-band omnidirec-tional antenna for body area network basestations, IEEE Antennas
Wireless Propag. Lett., vol. 14, pp. 17221725, 2015.
6. [6] Y. Dong, H. Toyao, and T. Itoh, Design and characterization of miniatur- ized patch antennas loaded with complementary split-ring
res- onators, IEEE Trans. Antennas Propag., vol. 60, no. 2, pp. 772785, Feb. 2012.
7. Ansoft High Frequency Structure Simulator (HFSS). ver. 13, Ansoft Corporation, 2010.
8. Stutzman, W.L., and Thiele, G.A., Antenna Theory and Design, JohnWiley & Sons, Inc, 1998.
9. Lo, Y. T., and Lee S. W., Antenna handbook: Antenna theory, Vol.2, International Thompson Publishing, Inc, 1993.
10. M. Borhani, P. Rezaei, and A. Valizade, ”Design of a Reconfig- urable Miniaturized Microstrip Antenna for Switchable Multiband
Systems” IEEE Antennas and Wireless Propagation Letters, Vol. 15, 2016.

427. Authors: K.Dhivya, V.Mohanapriya


Paper Title: Cold Formed Steel Channel Sections with Flange Stiffeners
Abstract: In recent years the utilization of cold formed steel has been redoubled. This is because high
strength to weight ratio of the cold formed steel. The thicknesses cold formed steel members usually range from
0.3 mm to 6.35 mm. The most used cold formed sections are C and Z sections. These sections can be used as
secondary beams (purlins) for roof covering, side girts, decks, and panels. Scope of this present study is to
investigate the effect on load carrying capacity of cold formed channel sections provided with flange stiffeners.
In this project, eighteen numbers of channel sections were analysed by keeping the height to thickness ratio (h/t)
as constant and by varying flange width to thickness ratio (b/t) using Ansys 14.0. The h/t ratio and b/t ratio
considered are 50 and 25, 35, 45 respectively. The thickness and span of all specimens were kept as 2 mm and
1500 mm respectively. Simply supported boundary condition and two points loading was adopted for both the
numerical and experimental analysis. Three numbers of channel sections were fabricated and tested
experimentally to check the consistency of results with numerical analysis. The ultimate load and deformed
shape of three specimens were obtained from experimental results are compared with the analytical results
acquired from Ansys 14.0.

Keyword : Cold formed steel, Channel sections, Flange stiffeners, Load deformation curve.
References:
1. E. Pieciorak et al., “Buckling and optimal design of cold-formed thin-walled beams: Review of selected problems” in Thin-Walled 2458-
Structures 49, 2007, pp. 554–561. 2463
2. Haiming Wang et al., “Experimental and numerical investigation on cold-formed steel C-section flexural members” in Journal of
Constructional Steel Research 65, 2009, pp. 1225 – 1235.
3. Cao Hung Pham et al., “Numerical simulation of high strength cold-formed purlins in combined bending and shear” in Journal of
Constructional Steel Research 66, 2010, pp. 1205-1217.
4. Mohammad Reza Haidarali et al., “Local and distortional buckling of cold-formed steel beams with edge-stiffened flanges” in Journal
of Constructional Steel esearch 73, 2012, pp. 31–42.
5. M.Macdonald et al., “Web crippling behaviour of thin-walled lipped channel beams,” in Thin-Walled Structures 49, 2011, pp. 682–
690.
6. Asraf Uzzaman James B.P. et al., “Cold formed steel sections with web openings subjected to web crippling und er to flange loading
conditions - Part II: Parametric study and proposed design equations” in Thin walled structures 56, 2012, pp. 79-87.
7. Mohamed Salah Al-Din Soliman, Anwar Badawy Badawy Abu-Sena, Emad Emam Hassan Darwish, Mohamed Saeed Refaee Saleh,
“Resistance of cold-formed steel sections to combined bending and web crippling,” in Ain Shams Engineering Journal, 2013, pp. 435–
453.
8. P. Natário, N. Silvestre, D. Camotimaa, “Web crippling failure using quasi-static FE models” in Thin-Walled Structures 84, 2014, pp.
34–49.
9. Poologanathan Keerthan, Mahen Mahendran, Edward Steau, ”Experimental study of web crippling behaviour of hollow flange channel
beams under two flange load cases” in Thin-Walled Structures 85, 2014, pp-207–219.
10. Yu Chen et al. “Experimental and finite element analysis research on cold-formed steel lipped channel beams under web crippling” in
Thin-Walled Structures 87, 205, pp. 41–52.
11. IS : 811-1987 Specification for cold formed light gauge structural steel sections.
12. IS: 801 – 1975 Code of practice for use of Cold-formed light gauge steel Structural members in general Building construction.
13. ANSYS WORKBENCH 14.0 - User’s manual, ANSYS Inc.

Authors: Arcot Purna Prasad, Gadda Vijaya Kumar

Paper Title: Effectiveness of Social Advertisements on Attitudes & Practices


Abstract: Social Advertisements is an influential device for social change. Social advertising is a process of
changes in the behaviour is to be positive for promoting social issues through marketing and advertising
principles From Social advertising change in behaviour to the individual targeted groups, make them to accept
with a behaviour of new-fangled, discard a old behaviour, amend a present behaviour. Social advertising intends
to confines targeted customers who wants to change, mutate or reject certain practices such as smoking,
drinking, etc. and stimulate them to carry out socially desirable actions.
We can see that organizations like UNICEF, UNESCO have used Social advertising for various purposes and
with various degrees of success all across the world. Social Advertising and marketing is increasingly common
in UK, USA, Australia, Canada and Scandinavian countries, where fundraising and collaboration between
companies and NGOs happen almost every day. In a country like India which is faced with a multitude of
428. problems we can reap huge benefits from the proper usage of social advertisements.
Attitude and practices are interlinked. Actions are based on thoughts, Practices are based on Attitudes, The
2464-
people who are having favourable attitudes and they are having favourable practices. The consequences of both
2468
primary & secondary data are related to each other which determine that the attitude and practices are
interweaved to each other. Therefore the study deduces that there is association between the attitude and
practices of health and hygiene.
A sample size of 275 was considered and stratified random sampling technique was adopted for this uni-
dimensional study which has been carried out with emphasis upon three major demographic variables District,
Area and Gender. Considering these variables as strata, a sample was collected from the respondents belonging
to the different established strata in the form of questionnaires. Questionnaires were developed in consultation
with experts which are having high reliability scores. After the collection of data, the data was subjected to both
descriptive and inferential statistical analysis based on the hypotheses formulated using SPSS (version 22.0).
The inference of the study was that people who were regularly exposed to social advertisements gained a high
level of awareness about health &hygiene, and developed favourable attitude and practices through attitude and
practices.
Keyword : Social Advertisements, Health, Hygiene
References:
1. Kolar Tahmeena, Kakade Onkaragouda. (2013). "Impact of radio programme on raising awareness among farmers: A case study of
Karnataka". International Journal of Communication Studies. Volume : 7, Issue : 3.
2. Cummings K M., Sciandra.R., Markello.S. (1987). "Impact of a Newspaper Mediated Quit Smoking Program". Am J Public Health.
Vol 77, Issue11.
3. Myers M.L., Iscoe C., Jennings C., Lenox W., Minsky E., Sacks A .(1981).
4. "Public version: Federal Trade Commission staff report on the cigarette advertising investigation". Federal Trade Commission,
Washington D.C. Pg [308].
5. Amy Bleakleya, Amy B. Jordana, Michael Hennessya, Karen Glanzb, Andrew Strasserc & Sarah Vaalaa. (2015), "Do Emotional
Appeals in Public Service Advertisements Influence Adolescents’ Intention to Reduce Consumption of Sugar-Sweetened Beverages?"
Journal of Health Communication: International Perspectives, Volume 20, Issue 8.
6. Nami Ki., Seung Yeob Yu. (2015). "Effect of the Characteristics of Models of Public Service Advertisements on Public Service
Behavior Intension: Mediated Effect on Attitude of PSA". Indian Journal of Science and Technology. Vol 8(S8), 250–257.
7. Suggett, Paul (March 04, 2016) What Exactly is Public Service Advertising. Retrieved from
http://advertising.about.com/od/advertisingglossary/g/Public-Service-Advertising-A-Complete-Definition-Of-Public-Service-
Advertising.html.
8. 7. Monali Hota., Cáceres.R.C., Antoine Cousin. (2010). "Can Public-Service Advertising Change Children’s Nutrition Habits?
The Impact and Relevance of Familiarity". Journal of Advertising Research. Vol. 50, No. 4, pp.460-477.
9. Vijay Kumar Gadda (September 2019)., “Imapact of Social Advertising towards Health & Hygeine” . International Journal Recent
Technology and Engineering. Vol. 08, No. 3, pp.7056-7061.

Authors: Anand Prakash Tiwari, Achyut Pandey

Paper Title: Solar Variation and Super Geomagnetic Storm Event during March 10-31, 2015
Abstract: CMEs and solar flares are important solar ejections which are the cause of storm in Heliosphere.
These ejections are producing a change in Earth magnetic field. In this paper we have studied heliospheric
disturbance of solar cycle 24 during period from 10 March to 31 March 2015. We observed that a huge
explosion of magnetic field and plasma from the Sun’s corona on 15 March 2015 and associated solar flares
have disturbed space weather towards earth causes strongest geomagnetic storm on 17 March 2015. We found
that Dst value reached to its minimum is -223 nT and a FDs during the period on 17 March 2015.

Keyword : Coronal mass ejection, Solar cycle, Forbush decrease and Geomagnetic storm.
References:
1. Borgazzi A., Lara A., Echer E. and Alves M.V. “Dynamics of coronal mass ejections in the interplanetary medium”, Astro. and
Astrophys., pp. 885-889, 2009.
429.
2. Byrne J.P., Maloney S.A., McAteer T.J., Refojo J.M. and Gallagher P.T. “Propagation of Earth- directed coronal mass ejections in
three dimensions”, Nature Communications, 1, 74, 2010. 2469-
3. Colonnino R.C., Vourlidas A. and Wu, C.C. “Quantitative comparison of methods for predicting the arrival of coronal mass ejections 2472
at Earth based on multi view imaging”, J. Geophys. Res., pp. 6866-6879, 2013.
4. Gopalswamy N., Lara A., Lepping R.P., Kaiser M.L., Berdichevsky D. and St. Cyr O.C. “Interplanetary acceleration of coronal mass
ejections”, J. Geophys. Res., Lett., pp. 145-148, 2001.
5. Gopalswamy N., Lara A., Yashiro S., Kaiser R.P. and Howard R.A., 2001. “Predicting the 1-AU arrival times of coronal mass
ejections”, J. Geophys. Res., pp. 29207-29218, 2001.
6. Gosling J.T., Bame S.J., Mc Comas D.J. and Philips J.L. “Coronal mass ejections and geomagnetic storm”, Geophys. Res. Lett., pp.
901-904, 1990.
7. Hess P. and Zhang J. “Predicting CMEs ejecta and sheath front arrival at L1 with a Data-Constrained physical model”, J.Astrophys.,
pp. 144, 2015.
8. Mostl C., Amla K., Hall J.R., Liewer P.C., De Jong E.M., Colonnino R.C., Veronig A.M., Rollett T., Temmer M., Peinhart V., Da vies
J.A., Lugaz N., Liu Y.D., Farrugia C.J., Luhmann J.G., Vrsnak B., Harrison R.A. and Galvin A.B. “Connecting speeds, Directions and
arrival times of 22 coronal mass ejections from the Sun the Sun to 1 AU”, J. Astrophys., pp. 119, 2014.
9. Owens M. and Cargill P. “Predictions of the arrival times of coronal mass ejections at 1AU: an analysis of the causes of the errors”,
Ann. Geophys., 22, pp. 661-671, 2004.
10. Vrsnak B. and Gopalswamy N. “Influence aerodynamic drag on the motion of interplanetary ejecta”, J. Geophys. Res., pp. 1019, 2002.

Authors: Loveleen Gaur, Ravi Ramakrishnan

Paper Title: Developing Internet of Things Maturity Model (IoT-MM) for Manufacturing
Abstract: The Manufacturing sector in India is still not globally competitive (Deloitte, 2018) due to over
emphasis on labour based production, lesser automation, legacy manufacturing assets and production plants,
energy inefficient systems, usage of Information Technology to integrate the physical and cyber world for
potential benefits which other countries have adopted (Rockstorm, 2018) is almost non-existent. According to
430. sources adoption of IoT enabled Industry 4.0 can lead to decrease of production costs by up to 30%, logistics
costs by 30% and quality management costs by up to 20% (Thomas, 2016).
2473-
This study starts with a literature review of the factors that determine the manufacturing competitiveness 2479
index of India and how other developed countries are proceeding in these as compared to India. The study
proceeds with identification of key determinants or constructs (abstract dimensions) of measuring the IoT
maturity of any organization along with their relative weights and then identify the key factors (measurable)
inside each construct. These constructs are hypothesized to be the building blocks of any IoT strategy to be
adopted by Indian manufacturing concerns. By using these constructs definition, along with factors and possible
measurable states, in which the factors can exist, an excel based IoT Maturity Self-Assessment tool has been
developed which can be used by target Indian manufacturing organizations to identify their current state of
preparedness.
The objective of this study is to define an Internet of Things Maturity Model (IoT-MM) which can be used by
organizations to assess their current status. Indian manufacturing has started adopting IoT but in a disoriented
manner, with adoption being guided more by technology consideration than a holistic business drive and
consideration encompassing the benefits of productivity, energy conservation and environmental management.

Keyword : Internet of Things, Internet of Things Maturity Model, IoT, Manufacturing, Industry 4.0
References:
1. DUCKER Worldwide. (2014). India: A compelling alternate in advanced manufacturing.
2. Academic Foundation. (January 2008). Report On Conditions Of Work And Promotion Of Livelihoods In The Unorganized Sector.
Academic Foundation.
3. Al-Fuqaha, A. M. (2015). Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Communications
Surveys & Tutorials, 17(4): 2347–2376.
4. Atzori L, I. A. (2010). The Internet of Things- A Survey. Computer Networks, 54(15):2787-805.
5. Becker. (2009). Developing Maturity Models for IT Management – A Procedure Model and its Application. Business & Information
Systems Engineering. doi:10.1007/s12599-009-0044-5
6. Bedekar, A. (2017 , October 12). Opportunities& challenges for IoT in India. Retrieved from http://www.startupcity.com/ leaders-talk/-
opportunitieschallenges-for-iot-in-india-nid-3444.html
7. Berhert, V. R. (2016). Annual Report 2016. UNIDO.
8. Botta, A. W. (2016). Integration of cloud computing and internet of things: a survey. Future Generation Computer System, 684-700.
9. Christiane, G. v. (May 2010). Systematic Literature Review of Software Process Capability/Maturity Models. International Conference
on Software Process. Improvement And Capability dEtermination (SPICE). Pisa, Italy.
10. Christopher, M. (. (1998). Logistics and Supply Chain Management: Strategies for Reducing Costs and Improving Services. (2nd, Ed.)
London: Pitman.
11. Deloitte. (2018). Manufacturing Sector in India. India Brand Equity Foundation.
12. G. Lanza, P. N. (2016). Befähigungs- und Einführungsstrategien für Industrie 4.0. Karlsruhe / Hannover. Retrieved 02 01, 2016
13. Granjal, J. E. (2015). Security for the internet of things: a survey of existing protocols and open research issues. IEEE Communications
Surveys & Tutorials, 1294-1312.
14. Grant Thornton and CII. (2017). Networked Readiness Index 2016. Delhi: Grant Thornton. Retrieved from http://www.grantthornto n.in
15. Gubbi, J. R. (2014). “Internet of Things (IoT): a vision, architectural elements, and future directions. Future Generation Computer
Systems, 29(7): 1645–1660.
16. Haller, W. T. (1996). Expert choice - User Manual. PA: Expert Choice. Pittsburgh.
17. Henderson JC, V. N. (1993). Strategic alignment: leveraging information technology for transforming organizations. IBM Systems
Journal, 38(2-3), 472-484.
18. Hung, M. (2017). Leading the IoT: Gartner Insights. US: Gartner.
19. Jian Qina, Y. L. (2016). A catergorical framework of Manufacturing for Industry 4.0 and Beyond. www.sciencedirect.com. Retrieved
from https://ac.els-cdn.com/S221282711630854X/1-s2.0-S221282711630854X-main.pdf?_tid=1d8c8876-d0fc-11e7-
20. Jiří, F. A. (2014). Judgment scales and consistency measure in AHP. Enterprise and the Competitive Environment 2014 conference,
ECE, (pp. 164 – 173). Brno, Czech Republic.
21. K. Lichtblau, V. S. ( 2015). IMPULS - Industrie 4.0 Readiness Impuls-Stiftung des VDMA. Aachen-Köln.
22. Kumaran, V. (2015). IoT Challenges and Opportunities in Indian Market. COMSNETS. Bangalore, India.
23. Luthra, S. G. (2018). Analysing Challenges to Internet of Things adoption and diffusion: An Indian context. 6th Internation Conf on
Smart Computing (pp. 733-739). Kurukshetra: ScienceDirect.
24. Miorandi D, S. S. (2012). Internet of Things: vision, applications and research challenges, . Ad Hoc Netw, 10(7):1497-516.
25. Ōno, T. (1988). Toyota production system: Beyond largescale production. Cambridge, Mass: Productivity Press.
26. Pettersson, A. (2008). Measurements of efficiency in supply chain. Journal of Supply Chain Management.
27. Pušnik, M. (2007). Extending Information System Integrability Index with CMM Model. A Preliminary Proposal. 29th Int. Confere nce
on Information Technology Interfaces, (pp. 145-150).
28. Reinhard, G. (2017). Astrological Guide to Industry 4.0. EPS.
29. Rockstorm, J. (2018). The Fourth Industrial revolution: What is Means, how to respond. World Economic Forum.
30. Saaty, .. T. (2008). Decision making with the analytic hierarchy process. Int J Serv Sci, 83-98.
31. Salviano, C. F. (2008). Unified Basic Concepts for Process Capability Models. Int Conf on Sw. Eng. and Knowledge Eng. SEKE, (pp.
173-178).
32. Sheard, A. S. (Sep 1997). The Frameworks Quagmire. Crosstalk: The Journal of Defense Software Engineering, 10(3).
33. T.Stock, G. (2016). Opportunities of Sustainable Manufacturing in Industry 4.0. Science Direct. Retrieved from
https://www.sciencedirect.com/science/article/pii/S221282711600144X
34. Thomas, B. J. (2016). Wgp-Standpunkt Industrie 4.0. Wissenschaftliche Gesellschaft für Produktionstechnik .
35. Whitmore, A. A. (2015). The Internet of things—a survey of topics and trends. Information Systems Frontiers, 261-274.
36. Womack, J. P. (2007). The machine that changed the world: The story of lean production - Toyota's secret weapon in the global car
wars that is revolutionizing world industry. New York: Free Press.

Authors: Abba Suganda Girsang, Sani Muhamad Isa, Ikrar Harvy

Paper Title: Journalist System using Tweeter News Media Traffic


Abstract: Journalists have some responsibility as their duty. Besides delivering the right news to public,
they also have to deliver fast. Therefore getting the potential news fast is one important key for journalist.. This
study tries to use the information public from social media tweeter. Social media is considered as public
information which every people can be involved. This system, starts collecting tweets which mention formal
431. tweeter media. The application will group each tweets into various themes based on the cosine similarity. If
cosine similarity is big, it can be indicated as one group news. .The tweets which are more than the certain 2480-
threshold, it can be indicated as the candidate news. This candidate news is then classified into one of ten 2485
categories using support vector machine (SVM). This classification has 85% accuracy. The category classified is
used for assigning the specific journalist to cover this candidate news. This system has two important modules.
One in center server which is responsible for collecting and processing data, the other one application mobile
which is installed in journalist is called Journes. The results show the Journes give notification to journalist for
getting some candidate news.
Keyword : candidate news, journalist, classification, tweeter.
References:
1. Budiyono, M. (2017). Media Sosial Dan Komunikasi Politik: Media Sosial Sebagai Komunikasi Politik Menjelang Pilkada Dki Jakarta
2017. Jurnal Komunikasi, 11(1), 47–62. https://doi.org/10.20885/komunikasi.vol11.iss1.art4
2. Nugraha, R. P. (2013). Pengaruh New Media Terhadap Perkembangan Cyber Society. Prosiding Seminar Besar Nasional dan Kongres
ISKI VI Padang, 681-686
3. Maryulis.(2014). Pengaruh Aktivitas di Media Sosial Terhadap Rutinitas Blogger Sumatera Barat The Influence of Activity in Social
Media Toward Writing Habit to Sumatera Barat Bloggers. Padang. Jurnal Pekommas, Vol. 17 No. 2
4. Oriella PR Network. (2013). “The New Normal for News. Have Global Media Changed Forever?” The 6th Annual Oriella Digital
Journalism Survey. http://www.oriellaprnetwork.com/ research.
5. Hermida, Alfred. (2013). “#Journalism. Reconfiguring Journalism Research about Twitter, One Tweet at a Time.” Digital Journalism.
Online first version. doi:10.1080/21670811.2013.808456.
6. Zamith, R., & Lewis, S. C. (2014). From public spaces to public sphere: Rethinking systems for reader comments on online news
sites. Digital Journalism, 2, 558-574. https://doi.org/10.1080/21670811.2014.882066
7. Axel Bruns & Jean Burgess (2012) Researching News Discussion on Tweeter, Journalism Studies, 13:5-6, 801-
814, DOI: 10.1080/1461670X.2012.664428
8. Marcel Broersma & Todd Graham (2012) Social Media as Beat Journalism Practice, 6:3, 403-
419, DOI: 10.1080/17512786.2012.663626
9. Hermida, Alfred (2010) From TV to Twitter: How Ambient News Became Ambient Journalism, Media-Culture Journal, 13
10. Mackintosh, E. (2012). Twitter’s Role as the New Newswire; Why journalists should break news online.
11. Safko, L., Brake, D., David, K. (2009) The Social Media Bible: Tactics, Tools, and Strategies for Business Success, NY: Wiley
12. Antony, Mayfield 2008. What is Social Media?. London: iCrossing.
13. Zarrella, D. (n.d.) (2010). Beijing · Cambridge · Farnham · Köln · Sebastopol · Taipei · Tokyo the social media marketing book.
14. Ahmad, Ali N. (2010). “Is Twitter a Useful Tool for Journalists?” Journal of Media Practice 11 (2): 145–155.
doi:10.1386/jmpr.11.2.145_1.
15. Cozma, Raluca, and Kuan-Ju Chen. (2013). “What’s in a Tweet? Foreign Correspondents’ Use of Social Media.” Journalism Practice 7
(1): 33–46. doi:10.1080/17512786.2012.683340.
16. Schultz, B., & Sheffer, M. Lou. (2016). An Exploratory Study of How Twitter Is Affecting Sports Journalism. International Jou rnal of
Sport Communication, 3(2), 226–239.
https://doi.org/10.1123/ijsc.3.2.226
17. Marwick, A., & Boyd, D. (2011). To see and be seen: Celebrity practice on twitter. Convergence, 17(2), 139–158.
https://doi.org/10.1177/1354856510394539
18. Allan, Stuart. (2012). “Online News Reporting of Crisis Events: Investigating the Role of Citizen Witnessing.” In The Handbook of
Global Online Journalism, edited by Eugenia Siapera and Andreas Veglis, 331–352. Boston: Wiley-Blackwell.
19. Becker, Howard S. (1967). “Whose Side Are We On?” Social Problems 14 (3): 239–247.
http://www. jstor.org/stable/799147.
20. Fohringer, Dransch, Kreibich, Schröter. (2015). Social media as an information source for rapid flood inundation mapping. Nat.
Hazards Earth Syst. Sci., 15, 2725–2738, 2015.
21. Paulussen.s. dan Harder,R.(2014). Social Media References in Newspapers. London.

Authors: Faiyaz Ahmad, Yassar, Amreen Ahmad

Paper Title: Automatic Summarization of Textual Document


Abstract: In today world, there is a huge amount of information is growing every day on the internet and
from many other sources and there is lots of textual information in it. To find out the relevant information from
this large amount of data, we need an automatic mechanism that will extract the useful data. Such automatic
systems are automatic summarization systems. They categorized into extractive and abstractive summarization
system. Extractive summarization systems select the important sentences directly from the large document and
put into summary whereas abstractive methods understand semantic meaning of the document by linguistic
method to interpret and examine the text.
In the purposed method, a statistical approach is used where multiple criterions or features are discussed to
calculate the score for every sentence and then SIR (Susceptible Infected Recovered) model is used to compute
the dynamic weight for every feature. After dynamic weight computation, weighted TOPSIS (The Technique for
Order of Preference by Similarity to Ideal Solution) is used for multi-criterion analysis and aggregation. This
method is fully implemented and integrated for automated textual document summarization system.
432.
Keyword : Extractive, SIR, Weighted TOPSIS, Single document, Multi-document, Generic summaries,
2486-
Precision and Recall, Bigrams and skip-gram. 2491
References:
1. Kyoomarsi Kyoomarsi, F., Khosravi, H., Eslami, E., Dehkordy, P. K., & Tajoddin, A. (2008, May). “Optimizing Text Summarization
Based on Fuzzy Logic” In Computer and Information Science, 2008. ICIS 08. Seventh IEEE/ACIS International Conference on (pp.
347-352). IEEE.
2. Mehdi-Belguith, Imen-Touati, Mohamed-H´edi Maˆaloul, & Iskandar-Keskes (2015), “A multi-criteria Method for Automatic Web
Page Summarization” NLP-RG, MIRACL Lab. University of Sfax, Tunisia.
3. Babar, S. A, and Thorat, S. A. (2017), “ Improving text summarizationusing fuzzy logic & latent semantic analysis”, In international
journal of innovative research in advance engineering (IJIRAE). volume1 issue 4
(May 2017).
4. Suanmali, L., Salim, N., & Binwahlan, M. S. (2009), “Fuzzy logic based method for improving text summarization”, arXiv preprint
arXiv:0906.4690.
5. Ouyang Y, Li W, Li S, Lu Q (2011) , “Applying regression models to query-focused multi-document summarization”, Inf Process
Manag 47:227–237
6. Erkan, G., & Radev, D. R. (2004), “LexRank: Graph-based lexical centrality as salience in text summarization”, Journal of Artificial
Intelligence Research,22, 457-479.
7. Baralis E, Cagliero L, Mahoto N, Fiori A (2013) “GRAPHSUM : discovering correlations among multiple terms for graph-based
summarization”, Inf Sci 249:96–109 doi:10.1016/j.ins.2013.06.046
8. ZHANG Pei-ying, & LI Cun-he (2009), “Automatic text summarization based on sentences clustering and extraction”, 978-1-4244-
4520- 2/09/$25.00 @2009 IEEE.
9. Abbasi-ghalehtaki, R., Khotanlou, H., & Esmaeilpour, M. (2016), “Fuzzy evolutionary cellular learning automata model for text
summarization”, Swarm and Evolutionary Computation.
10. Erkan G, Radev D (2004), “LexRank: graph-based lexical centrality as salience in text summarization”, J Artif Intell Res 22:457–479
11. Riedhammer K, Favre B, Hakkani-Tur D (2010), “Long story short- global unsupervised models for key phrase based meeting
summarization”, Speech Commun 52:801–815s
12. Suanmali, L., Salim, N., & Binwahlan, M. S. (2009), “Fuzzy logic based method for improving text summarization”, arXiv preprint
arXiv:0906.4690.
13. Fattah MA (2014), “A hybrid machine learning model for multi-document summarization”, 592–600. doi:10. 1007/s10489-013-0490-0
14. Tsutomu HIRAO et al. (2014), “Extracting Important Sentences with Support Vector Machines”, NTT Communication Science
Laboratories 2-4, Hikaridai, Seika-cho, Soraku-gun, Kyoto 619-0237 Japan
15. Periantu Marhendri Sabuna et al. (2017), “Summarizing Indonesian Text Automatically By Using Sentence Scoring And Decision
Tree”, Universitas Atma Jaya Yogyakarta Yogyakarta, Indonesia
16. John M Conroy et al. (2001), “Text summarization via hidden Markov models”, institute of advance computer studies university of
Maryland collage park MD 20742 USA
17. Joel Larocca Neto et al. (2014), “Document Clustering and Text Summarization”, Rua Imaculada Conceic¸ ˜ao 1155 Curitiba - PR,
80215-901. Brazil
18. Jiantao Hu et al. (2015), “A modified weighted TOPSIS to identify influential nodes in complex networks”, School of Engineering,
Vanderbilt University, TN 37235, USA
19. Amreen-Ahmad, & Tanvir-Ahmad, (2018), “A game theory approach for multi-document summarization”, Arabian Journal for
Science and Engineering, Springer
Olga Voronkova, Stanislav Antonov, Evgeny Lamanov, Fedor Sterlikov,
Authors:
Chulpan Shafranskaya, Denis Yashin
Paper Title: Entrepreneurial Activity as an Important Factor in the Development of the "Green" Economy
Abstract: Organic production as a global trend in progressive socio-economic development and the
guarantor of the food and environmental security of countries and regions is becoming an attractive field for
entrepreneurs. However, in Russia, only a few entrepreneurs currently consider organic production as the main
type of business. The article analyses the factors that favour and impede the development of entrepreneurship in
the field of organic agriculture and substantiates the basic mechanisms to encourage entrepreneurship in organic
production. The results of the analysis can be used in the development and implementation of regulatory policies
on entrepreneurial activity in organic agriculture. The purpose of this study is to substantiate the mechanisms of
entrepreneurial activity and the organizational and economic prerequisites for the development of organic
agriculture in Russia. The basic objectives include the development of mechanisms to stimulate entrepreneurial
activity in the organic production sector, as well as the socio-economic assessment of the effectiveness of
organic agriculture in the context of the formation and development of a "green" economy.

Keyword : entrepreneurial activity, organic agriculture, "green" economy, government regulation, incentive
mechanisms
References:
1. Altukhov A.I. 2008. Food security - an important factor in the stability of Russia. Economics of agriculture of Russia, 12, 13-16.
2. Akhmetshin, E. M., Pavlyuk, A. V., Hasanov, E. L., Sverdlikova, E. A., & Kadyrov, M. A. (2018 a). Institutional mechanisms for
implementation of entrepreneurial potential of the population of the region. Journal of Applied Economic Sciences, 13(7), 2052-2075.
3. Akhmetshin, E. M., Kovalenko, K. E., Ling, V. V., Erzinkyan, E. A., Murzagalina, G. M., & Kolomeytseva, A. A. (2018 b). Individual
entrepreneurship in russia and abroad: Social and legal aspects. Journal of Entrepreneurship Education, 21(Special Issue 2)
4. Arniati, T., Puspita, D. A., Amin, A., & Pirzada, K. (2019). The implementation of good corporate governance model and audito r
433. independence in earnings' quality improvement. Entrepreneurship and Sustainability Issues, 7(1), 188-200.
doi:10.9770/jesi.2019.7.1(15)
5. Bozhkova, G. N., Shastina, E. M., Kalimullina, O. V., & Shatunova, O. V. (2019). Study of literary images of gifted characters in 2492-
optional activities as a means to develop capable and talented youth. Space and Culture, India, 7(1), 264 -273. 2496
doi:10.20896/saci.v7i1.463
6. Boutelier, S. (2019). Limiting Learning Environments through Domestication. Journal of Culture and Values in Education, 2 (1), 45-55.
Retrieved from http://cultureandvalues.org/index.php/JCV/article/view/29
7. Baharuddin, B., & Dalle, J. (2019). Transforming learning spaces for elementary school children with special needs. Journal of Social
Studies Education Research, 10(2), 344-365.
8. Bužavaitė, M., Ščeulovs, D., & Korsakienė, R. (2019). Theoretical approach to the internationalization of SMEs: Future research
prospects based on bibliometric analysis. Entrepreneurship and Sustainability Issues, 6(3), 1497-1511. doi:10.9770/jesi.2019.6.3(31)
9. Bure, M., & Tengeh, R. K. (2019). Implementation of internal controls and the sustainability of SMEs in harare in zimbabwe.
Entrepreneurship and Sustainability Issues, 7(1), 201-218. doi:10.9770/jesi.2019.7.1(16)
10. Chitsaz, E., Tajpour, M., Hosseini, E., Khorram, H., & Zorrieh, S. (2019). The effect of human and social capital on entrepreneurial
activities: A case study of iran and implications. Entrepreneurship and Sustainability Issues, 6(3), 1393-1403.
doi:10.9770/jesi.2019.6.3(24)
11. Danilov-Danilian, V.I. 2003. Sustainable development. Theoretical and methodological analysis. Economics and Mathematical
Methods, 8(24), 123-135.
12. Dalevska, N., Khobta, V., Kwilinski, A., Kravchenko, S. 2019. A model for estimating social and economic indicators of sustai nable
development. Entrepreneurship and Sustainability Issues, 6(4), 1839-1860. http://doi.org/10.9770/jesi.2019.6.4(21).
13. Debbarma, R., & Purkayasthaî, S. (2019). Expansion of area under rubber plantation and its distribution in tripura, india. Sp ace and
Culture, India, 6(5), 56-70. doi:10.20896/SACI.V6I5.344
14. Dzhavatov, D.K., Sverdlikova, E.A., Sokolov, M.S., Avdeeva, O.A. & Yavkin, G.P. 2018. The influence of innovation on social a nd
economic development of the Russian regions. European Research Studies Journal, 21(S2), 767-776.
15. Dharmawan, R., Nababan, M. R., Tarjana, M. S. S., & Djatmika. (2019). Mistranslation and maltranslation in a medical website:
Evidences from dorland’s medical dictionary. Journal of Social Studies Education Research, 10(1), 219-240.
16. Dunets, A., Muhamedieva, A., Sycheva, I., Perepechkina, E., Vakhrushev, I., & Kulchytskiy, A. (2019a). Spatial tourism planning:
Using the model of functional and planning complexes. Journal of Environmental Management and Tourism, 10(4), 711 -719.
doi:10.14505/jemt.v10.4(36).01
17. Dunets, A. N., Ivanova, V. N., & Poltarykhin, A. L. (2019b). Cross-border tourism cooperation as a basis for sustainable development:
A case study. Entrepreneurship and Sustainability Issues, 6(4), 2207-2215. doi:10.9770/jesi.2019.6.4(45)
18. Fedulova, I., Ivanova, V., Atyukova, O., & Nosov, V. (2019). Inclusive education as a basis for sustainable development of so ciety.
Journal of Social Studies Education Research, 10(3), 118-135.
19. Frolova, I., Voronkova, O., Islamutdinova, D., Gordeyeva, O., Fedulova, I., & Zhminko, A. (2019a). Ecologization of agroindustrial
production: Organizational and economic transformations. Journal of Environmental Management and Tourism, 10(3), 622 -630.
doi:10.14505/jemt.v10.3(35).16
20. Frolova, I., Voronkova, O., Alekhina, N., Kovaleva, I., Prodanova, N., & Kashirskaya, L. (2019b). Corruption as an obstacle to
sustainable development: A regional example. Entrepreneurship and Sustainability Issues, 7(1), 674-689. doi:10.9770/jesi.2019.7.1(48)
21. Gabidullina, F. I., Korganbekov, B. S., Makarova, V. F., Zakirov, R. A., & Kayumova, G. F. (2019). Concept «teacher» in language
consciousness of students of philological faculty. XLinguae, 12(3), 45-54. doi:10.18355/XL.2019.12.03.04
22. Goryushkina, N. E., Gaifutdinova, T. V., Logvina, E. V., Redkin, A. G., Kudryavtsev, V. V., & Shol, Y. N. (2019). Basic principles of
tourist services market segmentation. International Journal of Economics and Business Administration, 7(2), 139-150.
23. Grakhova, S., Fayzrakhmanov, I., Zhundibayeva, A., Yakutina, M., Sharipov, R., & Stepykin, N. (2019). Information, pedagogical and
facilitation technologies in teaching a special philology class at non-specialized faculties of higher education institutions. International
Journal of Innovative Technology and Exploring Engineering, 8(12), 1613-1620. doi:10.35940/ijitee.L3154.1081219.
24. Goloshchapova, L. V., Plaskova, N. S., Prodanova, N. A., Yusupova, S. Y., & Pozdeeva, S. N. (2018). Analytical review of risk s of
loss of profits in cargo transportation. International Journal of Mechanical Engineering and Technology, 9(11), 1897-1902.
25. Ivanova, V., Poltarykhin, A., Szromnik, A., & Anichkina, O. (2019). Economic policy for country's digitalization: A case stud y.
Entrepreneurship and Sustainability Issues, 7(1), 649-661. doi:10.9770/jesi.2019.7.1(46)
26. Jones, A. (2019). Parallel Oppressions. Journal of Culture and Values in Education, 2(1), 18-33. Retrieved from
http://cultureandvalues.org/index.php/JCV/article/view/31
27. Johnson, C., & Hinton, H. (2019). Toward a Brillant Diversity. Journal of Culture and Values in Education, 2(1), 56 -70. Retrieved
from http://cultureandvalues.org/index.php/JCV/article/view/27
28. Khalikov, M. A., Maximov, D. A., & Shabalina, U. M. (2018). Risk indicators and risk management models for an integrated grou p of
enterprises. Journal of Applied Economic Sciences, 13(1), 52-64.
29. Kayumova, G., Sheymardanov, S., Akhtarieva, R., & Zhundibayeva, A. (2019). Developing creative potential of a schoolchild by
means of native language. Journal of Social Studies Education Research, 10(1), 81-92.
30. Kaluge, D. (2019). Multifactor on macroeconomic fundamentals to explain the behavior of sectoral indices in the indonesian stock
exchange. Entrepreneurship and Sustainability Issues, 7(1), 44-51. doi:10.9770/jesi.2019.7.1(4)
31. Kashirskaya, L., Voronkova, O., Sitnov, A., Shichiyakh, R., Kudinova, M., & Sycheva, I. (2019). Rural development through the
formation of zonal agro-ecological clusters. Journal of Environmental Management and Tourism, 10(3), 651-659.
doi:10.14505/jemt.v10.3(35).19
32. Kireev, B., Zhundibayeva, A., & Aktanova, A. (2019). Distance learning at higher education institutions: Results of an experiment.
Journal of Social Studies Education Research, 10(3), 387-403.
33. Korableva, O.N., Kalimullina, O.V., Mityakova, V.N. (2019) Designing a System for Integration of Macroeconomic and Statistica l
Data Based on Ontology. Advances in Intelligent Systems and Computing, 998, p. 157-165
34. Kolesova, Yu.N. 2015. Strategy of sustainable development of rural areas. Young scientist, 8, 392-394.
35. Kovaltchuk, A. P., Dedusenko, E. A., Blinova, E. A., & Miloradov, K. A. (2016). Concept and procedures of crisis management in
russian hotel enterprises. Journal of Environmental Management and Tourism, 7(3), 473-480. doi:10.14505/jemt.v7.3(15).13
36. Kryukov, V.A. 2018. The study of the economy of Siberia: continuity and complexity. Region: Economics and sociology, 2(98), 3-32.
37. Kuznetsova, I.G., Surikov, Y.N., Votchel, L. M., Aleynikova, M.Y., Voronkova, O.Y. & Shichiyakh, R.A. 2019. The methodologica l
aspect of human capital formation in the digital economy. International Journal of Mechanical Engineering and Technology, 10(2),
1020-1030.
38. Kuznetsova, I. G., Voronkova, O. Y., Nimatulaev, M. M., Ruiga, I. R., Zhuruli, G. N., & Levichev, V. E. (2019). Ensuring the national
security of agriculture in the digital era through the formation of human capital. International Journal of Economics and Business
Administration, 7, 558-569.
39. Kustati, M., & Al-Azmi, H. (2018). Pre-Service Teachers’ Attitude on ELT Research. Research in Social Sciences and Technology,
3(2), 1-13. Retrieved from http://ressat.org/index.php/ressat/article/view/47
40. Magsumov, T.A. (2019). Gender Re(e)volution of commercial schools in Russia in the early XX century. Woman in Russian Society ,
1, 133-144. doi: 10.21064/WinRS.2019.1.12
41. Melgui, A.E., Kuznetsova, O.N., Butler, Yu.A. 2018. Stimulation of socio-economic development of agriculture in Russia.
Agribusiness: Economics, management, 8, 19-26. Miloserdov, V.V. 2014. Causes of food dependence in Russia. Economy of
agricultural and processing enterprises, 3, 6-11.
42. Meier, L. (2019). Questioning the Problematic Nature of School Culture in Elementary Teacher Education. Journal of Culture an d
Values in Education, 2(1), 34-44. Retrieved from http://cultureandvalues.org/index.php/JCV/article/view/30
43. Movchan, I. B., Yakovleva, A. A., & Daniliev, S. M. (2019). Parametric decoding and approximated estimations in engineering
geophysics with the localization of seismic risk zones on the example of northern part of kola peninsula. Paper presented at the 15th
Conference and Exhibition Engineering and Mining Geophysics 2019, Gelendzhik 2019, 188-198.
44. Paptsov, A., & Nechaev, V. (2019). Towards to a single innovation space in the agrarian sector of the member states of the eurasian
economic union: A case study. Entrepreneurship and Sustainability Issues, 7(1), 637-648. doi:10.9770/jesi.2019.7.1(45)
45. Podprugin, M.O. 2012. Sustainable development of the region: the concept, the basic approaches and the factors. Journal of Russian
entrepreneurship, 24, 214-221.
46. Poltarykhin, A.L., Alekseev, А.E., Kudryavtsev, V.V., Makhanova, T.A., Voronkova, O.Yu., Aydinov, H.T. 2018. Prospects for th e
Development of the Green Economy of Russian Federation. European Research Studies Journal, 21(4), 470-479.
47. Popova, L. I., Demina, I. D., Stepanenko, Y. S., Tran, Q. N., Meshkova, G. V., & Afonasova, M. A. (2019). Regional aspects of
sectoral digitalization: Problems and prospects. International Journal of Economics and Business Administration, 7(2), 176-188.
48. Polushkina, T.M. 2012. Formation of a rational system of state regulation of agrarian sector of economy meeting the requireme nts of
cost-effective agricultural policy. Basic research, 9-4, 976-980.
49. Plaskova, N. S., Prodanova, N. A., Zatsarinnaya, Е. I., Korshunova, L. N., & Chumakova, N. V. (2017). Methodological support of
organizations implementing innovative activities investment attractiveness estimation. Journal of Advanced Research in Law and
Economics, 8(8), 2533-2539. doi:10.14505/jarle.v8.8(30).25
50. Prodanova, N., Plaskova, N., Popova, L., Maslova, I., Dmitrieva, I., Sitnikova, V., & Kharakoz, J. (2019 a). The role of IT tools when
introducing integrated reporting in corporate communication. Journal of Advanced Research in Dynamical and Control Systems, 11(8
Special Issue), 411-415.
51. Prodanova, N., Trofimova, L., Pozdeeva, S., Melekhina, T., Rustanov, A., & Guryanova, I. (2019b). Perspective of developing
software for financial reporting under IFRS in the system of national governance. Journal of Advanced Research in Dynamical a nd
Control Systems, 11(8 Special Issue), 406-410.
52. Prodanova, N. A., Trofimova, L. B., Adamenko, A. A., Erzinkyan, E. A., Savina, N. V., & Korshunova, L. N. (2019c). Methodology
for assessing control in the formation of financial statements of a consolidated business. International Journal of Recent Te chnology
and Engineering, 8(1), 2696-2702.
53. Puryaev, A. S., Puryaeva, Z. A., Kharisova, A. R., & Puryaev, A. A. (2019). Investigation and explanation of mathematical tooling for
accounting non-economic characteristics during the investment project effectiveness’ assessing process. IOP Conference Series:
Materials Science and Engineering, 570, 012074. https://doi.org/10.1088/1757-899X/570/1/012074
54. Raba’, A., & Harzallah, H. (2018). Palestinian Teachers’ Views on the Factors That Limit Students’ Creativity and Some Possib le
Strategies to Overcome Them. Research in Social Sciences and Technology, 3(2), 40-57. Retrieved from
http://ressat.org/index.php/ressat/article/view/330
55. Saenko, N., Voronkova, O., Volk, M., & Voroshilova, O. (2019). The social responsibility of a scientist: Philosophical aspect of
contemporary discussions. Journal of Social Studies Education Research, 10(3), 332-345.
56. Sagdieva, R., Husnutdinov, D., Mirzagitov, R., & Galiullin, R. (2019). Kinship terms as proof of genetic relationship. Journa l of Social
Studies Education Research, 10(3), 103-117.
57. Shatunova O., Anisimova T., Sabirova F., Kalimullina O. (2019) STEAM as an Innovative Educational Technology. Journal of Social
Studies Education Research. Vol. 10 (2), 131-144.
58. Sycheva, I., Voronkova, O., Vorozheykina, T., Yusupova, G., Semenova, A., & Ilyin, A. (2019a). The main directions of improving
the environmental and economic efficiency of regional production. Journal of Environmental Management and Tourism, 10(3), 631 -
639. doi:10.14505/jemt.v10.3(35).17
59. Sycheva, I. N., Voronkova, O. Y., Kovaleva, I. V., Kuzina, A. F., Bannikov, S. A., & Titova, S. V. (2019 b). Motivation in personnel
management of a trading enterprise. International Journal of Economics and Business Administration, 7, 570-582.
60. Trofimova, L., Prodanova, N., Korshunova, L., Savina, N., Ulianova, N., Karpova, T., & Shilova, L. (2019). Public sector entities’
reporting and accounting information system. Journal of Advanced Research in Dynamical and Control Systems, 11(8 Special Issu e),
416-424.
61. Titova, S. V., Surikov, Y. N., Voronkova, O. Y., Skoblikova, T. V., Safonova, I. V., & Shichiyakh, R. A. (2019). Formation,
accumulation and development of human capital in the modern conditions. International Journal of Economics and Business
Administration, 7(2), 223-230.
62. Vasilev, B. (2019). Analysis and improvement of the efficiency of frequency converters with pulse width modulation. International
Journal of Electrical and Computer Engineering, 9(4), 2314-2320. http://doi:10.11591/ijece.v9i4.pp2314-2320
63. Vedenin, Yu.A. 1980. Processes of development of territorial recreational systems. Socioeconomic and geographical aspects of the
study of territorial recreational systems. - M., IG Academy of Sciences of the USSR, 16-30.
64. Voronkova, O.; Yankovskaya, V.; Kovaleva, I.; Epishkin, I.; Iusupova, I.; Berdova, Y. 2019. Sustainable territorial development based
on the effective use of resource potential, Entrepreneurship and Sustainability Issues 7(1): 662-673.
https://doi.org/10.9770/jesi.2019.7.1(47)
65. Voronkova, O. Y., Iakimova, L. A., Frolova, I. I., Shafranskaya, C. I., Kamolov, S. G., & Prodanova, N. A. (2019). Sustainable
development of territories based on the integrated use of industry, resource and environmental potential. International Journ al of
Economics and Business Administration, 7(2), 151-163.
66. Yarlykapov, A.D. 2013. Assessment of regional development forecasting options. Regional economy, 2(34), 23-31.
67. Yehya, F. Y., Barbar, A., & Abou Rjeily, S. (2018). Diagnosing the barriers for integrating Educational Technology in Physics courses
in Lebanese secondary schools. Research in Social Sciences and Technology, 3(2), 14-39. Retrieved from
http://ressat.org/index.php/ressat/article/view/337
68. Ziuzya, E.V., Voronkova, O.Y., Umirzakova, D.K., Rakovskiy, V.I., Qurbanov, P.A. & Kazakov, A.V. 2019. A methodological
approach to assessing the efficiency of the economic mechanism for formation and development of intersectoral linkages. International
Journal of Civil Engineering and Technology, 10(2), 920-929

Authors: Deepanshu

Paper Title: Performance of Classifiers on Newsgroups using Specific Subset of Terms


Abstract: Text Classification plays a vital role in the world of data mining and same is true for the
classification algorithms in text categorization. There are many techniques for text classification but this paper
mainly focuses on these approaches Support vector machine (SVM), Naïve Bayes (NB), k-nearest neighbor (k-
NN). This paper reveals results of the classifiers on mini-newsgroups data which consists of the classifies on
mini-newsgroups data which consists a lot of documents and step by step tasks like a listing of files,
preprocessing, the creation of terms(a specific subset of terms), using classifiers on specific subset of datasets.
Finally, after the results and experiments over the dataset, it is concluded that SVM achieves good classification
output corresponding to accuracy, precision, F-measure and recall but execution time is good for the k-NN
approach.

Keyword : Classifiers, k-NN, NaïveBayes, Text Classification, SVM.


References:
1. M.Ruiz, W.Lam and P. Srinivasan, “Automatic text categorization and its application to text retrivel,” IEEE Transaction Knowl. Data
Engineering, Volume-11, November-Dec,1999, pp-865-879.
2. F.Sebastiani, “Machine Learning in automated text categorization,” ACM Computational Surveys, volume-34, 2002, pp. 1-47.
3. G.Forman, “An Extensive empirical study of feature selection metrics for text classification,” The Journ. Of Mc. Learn.(ML) Res.,
434. 2003, vol-3, pp-1289-1305.
4. Deepanshu, Dr. Ramesh Kait, “Document Classification using Svm combined with optimal feature selection,” Int. Journ. of Compu ter
Engg. & Tech.(IJCET), may-june-2018, volume-9, issue-3, p.pages-250-258. 2497-
5. Semih E.,Serkan Gunal., M.Bilginer G., and O. Nezih G., “On feature extraction for spam e-mail detection”, In MM. Content Rp., 2500
Classification and security, Springer, 2006,pp-635-642.
6. Jianhua Guo, Guozhong Feng, Bing-Yi Jing and Lizhu hao, “A Bayesian feature selection paradigm for text classification,” Info.
Processing & Mgt., 2012, 48,2,pp-283-30.
7. Yuefen Wang, Songbo T. and Gaowei W.,” Adapting centroid classifier for document categorization”, Expert system with app. 38,8,
2011, 10264-10273.
8. Alper Kursat Uysal and Serkan Gunal, “The impact of preprocessing on text classification”, Info. Processing & mgt. 50,1, pp -104-112,
2014.
9. JJ. Webster and Chunyu Kit, “Tokenization as the initial phase in NLP”, In Proc. of the 14 th conf. on Computational Ling., Volume-4,
Association for computational linguistics, 1992, p.p-1106-1110.
10. Miriam F., Hassan Saif, Yulan H. and Harith A., “On stopwords, filtering and data sparsity for sentiment analysis of twitter,” 2014.
11. David A hull et al., “Stemming algorithms: A Case study for detailded evaluation”, JASIS, 1996, 47,1, pp.-70-84, 2005.
12. Andreas N., Andreas Hotho and Gerhard PaaB, “A Brief Survey of Text Mining”, In Ldv Forum, ,2005, volume.-20 pp.-19-62.
13. Mike James, “Classification algorithm,” Wiley-Interscience, 1985.
14. Deepanshu, Ramesh Kait, “A Technical Review: Text Classification and Related approaches”, in proceedings of Int. Conf. on S&
Tech.: Trends and Challenges(ICSTTC-2018).
15. A.Basu and M.Shephard, C.Waters, “Support Vector Machines for Text Categorization”, Proc. of the 36 th Annual Hawaii Int. Conf. on
Sys. Sc., 2003.
16. T.Joachins, “Text categorization with support vector machines: Learning with many relevant features”, in Proc. 10 th European Conf.
Mach. Learning(ECML),1998, pp.-137-142.
17. D.Lewis, “Naïve Bayes at Forty: The Independence Assumption in Information Retrivel”, Proc. of the 10 th European Conf. on Mc.
L.(ECML-98), 1998.
18. A.K. jain and Y.H.Li, “Classification of text documents,” The Compt. Journal,1998, volume-41, no.-8, p.pages-537-546.
19. Bo.Tang and H.He, “ENN:Extended nearest neighbor method for pattern recognition,” IEEE Computational, Intell. Mag.,2015,
volume-10, no.3, pp. 52-60, 2015.
20. Bo T., Haibo H., Paul M. Baggenstoss and Steven Kay,” A Bayesian Classification Approach Using Class-Specific Features for Text
Categorization” IEEE Trans. On Knowl. And Data Engg., Vol.28, No.-6, June 2016.
21. Dino Isa, Lam H. l., V.P Kallimani, and R.Raj K., “Text Documents Processing with the Bayes Formula for Classification using the
Support vector machine,” IEEE Trans. Of Know. And Data Engg., 2008, vol.20, no.9,pp.1264-1272.
22. http: //en.wikipedia.org/w/ index.php? title=Text mining old id= 778865797
23. K.Rajeswari, VV., Kapil T., R.P. “Comparison of Different Classification Techniques using Different Datasets, Int.J. of Advances in
Engg.& Tech., 2013, ISSN: 22231-1963.

Authors: Sujan Sinha, Manoj Kr. Sarma


Effect of Radiation and Hall Current on an MHD Transient Heat and Mass Transfer Flow in
Paper Title:
Presence of Rotation
Abstract: A parametric study to inspect the effect of heat and mass transfer characteristics with Hall current
and radiation past a uniformly accelerated porous plate is prepared. The equations of motion are simplified by
using the technique of Laplace transformation. The flow characteristics with viscous drag, Nusselt number and
Sherwood number are conferred through different graphs by taking some subjective conditions given in the
present paper and physical interpretations are described. It is highlited from graphical section that the rising of
Prandtl number and heat radiation trim down the temperature profile gradually.

Keyword : MHD, heat transfer, mass transfer, Sherwood number.


References:
435. 1. Elbashbeshy E.M.A. (2003): The mixed convection along a vertical plate embedded in non-darcian porous medium with suction and
injection Applied Mathematics and Computation, 136(1), pp. 139-149.
2. Ahmed N (2010): MHD free and forced convection with mass transfer from an infinite vertical porous plate. Journal of Energy, Heat 2501-
and Mass Transfer, 32, pp. 55-70. 2504
3. Acharya M., Dash G.C. and Singh L.P. (2000): Magnetic field effects on the free convection and mass transfer flow through po rous
medium with constant suction and constant heat flux, Indian J: Pure Appl. Math, 31(1), 1-18.
4. Ahmed N. and Kalita D. (2011) Transient MHD free convection from an infinite vertical porous plate in a rotating fluid with m ass
transfer and Hall Current. Journal of Energy, Heat and Mass Transfer, 33 (1) pp 271-292.
5. Pop I., (1971) : The effect of Hall currents on Hydro Magnetic flow near an accelerated plate. Journal of Mathematical and physical
Sciences. 5 pp 375-379
6. Hussain MA and Takhar HS (1996): Radiation effect on mixed convection along a vertical plate with uniform surface temperature.
Heat Mass Transfer, 31(4), pp. 243-248.
7. Ahmed, N. and Sharma, H.K. (2009): The radiation effect on a transient MHD flow with mass transfer past an impulsively fixed
infinite vertical plate, Int. J. of Appl. Math. And Mech. 5(5), pp. 87-98.
8. Ahmed N. and Sinha S (2014): MHD effect on unsteady flow past an accelerated vertical plate. International Journal of Physics and
Mathematical Science 4 (4) pp 56-70
9. Ahmed N., Kalita H. and Barua D. P. (2010): Unsteady MHD free convective flow past a vertical porous plate immersed in a poro us
medium with Hall current, Thermal Diffusion and heat transfer. International Journal of Engineering, Science and Technology, 2(6) pp
59-74.

Authors: Kamarajugadda Kishore Kumar, Movva Pavani

Paper Title: Design of a Flexible PET Based Yagi Dipole Antenna


Abstract: In the proposed paper, a flexible Yagi Dipole Antenna based on PET Substrate is designed for
the RF system-on-package (RF SOP) applications. RF antenna as a smart sensor is designed on a Flexible
substrate Polyethylene Terephtalate (PET). It is the more popular and universally accepted thermoplastic
polymer belonging to the family of the polyester. It is generally employed in textiles, thermoforming packaging
along with glass fibers. In the proposed design Coplanar Strip line (CPS) is used as a feeder and the RF antenna
is a Yagi dipole Antenna with a single driven element i.e. director, and a single reflecting element i.e. reflector.
It is a linearly polarized antenna which means it radiates in a single direction. The antenna is designed at a
resonating frequency of 5 GHz with a return loss of -23 dB. Simulations of the flexible PET based Yagi Dipole
Antenna is carried out by using CST Studio Suite software for Return loss, Radiation plot with varied
curvatures. The results for designed flexible Yagi Dipole Antenna imprinted with a PET substrate for portable
wireless electronics are analyzed.
436.
Keyword : Yagi Dipole Antenna, Coplanar Strip Line, Polyethylene Terephtalate, Return loss. 2505-
2510
References:
28. Y. Sun and J. A. Rogers,” Inorganic semiconductors for flexible electronics," Adv. Mater., vol. 19, 2007, pp. 1897–1916.
29. S. Cheng and Z. Wu, "Microfluidic stretchable RF electronics," Lab Chip, vol. 10, no. 23,2010, pp. 3227–3234.
30. S. Nikolaou, G. E. Ponchak, J. Papapolymerou and M. M. Tentzeris, “Conformal double exponentially tapered slot antenna (DETSA)
on LCP for UWB applications, IEEE Trans. Antennas Propag., vol. 54, no. 6, 2006, pp. 1663–1668.
31. G. DeJean, R. Bairavasubramanian, D. Thompson, G. E. Ponchak, M.M. Tentzeris, and J. Papapolymerou, “Liquid crystal polymer
(LCP):A new organic material for the development of multilayer dual-frequency/dual-polarization flexible antenna arrays,” IEEE
Antennas Wireless Propagation Letters, vol. 4, 2005, pp. 22–26.
32. N. Tiercelin, P. Coquet, R. Sauleau, V. Senez, and H. Fujita, "Polydimethylsiloxane membranes for millimeter-wave planar ultra-
flexible antennas,” J. Micromech. Microeng., vol. 16, no. 11, 2006, pp. 2389–2395.
33. J. So, J. Thelen, A. Qusba, G. J. Hayes, G. Lazzi, and M. D. Dickey,"Reversibly deformable and mechanically tunable fluidic
antennas," Adv.Func. Mater., vol. 19, no. 22, 2009, pp. 3632–3637.
34. A. Ghannam, C. Viallon, D. Bourrier, and T. Parra, “Dielectric microwave characterization of the SU-8 thick resin used in an above IC
process,” in Proc. EuMC, 2009, pp. 1041–1044.
35. Jung, M., J. Kim, J. Noh, N. Lim, C. Lim, G. Lee, J. Kim,H. Kang, K. Jung, A. Leonard, J. Tour, and G. Cho, “All-printed and roll-to-
roll-printable 13.56 MHz-operated 1-bit RF tag on plastic foils," IEEE Trans. on Electron Devices, Vol. 57, No. 3,2010,pp. 571-580.
36. Wang, L., Y. Guo, B. Salam, and C. W. A. Lu,"A flexible modified dipole antenna printed on PET film," IEEE Asia-Pacific
Conference on Antennas and Propagation, 239-240, Singapore, 2012, pp. 27-29.
37. Yang, L., A. Rida, R. Vyas, and M. Tentzeris, "RFID tag and RF structures on a paper substrate using inkjet-printing technology, IEEE
Transactions on Microwave Theory and Techniques, vol. 55, No. 12, 2007, pp. 2894-2901.
38. Y. Ding, Y. C. Jiao, P. Fei, B. Li, and Q. T. Zhang, "Design of a multiband quasi-Yagi-type antenna with CPW-to-CPS transition,"
IEEE Antennas and Wireless Propagation Letters, vol. 10,2011,pp. 1120–1123.
39. S. J. Wu, C. H. Kang, K. H. Chen, and J. H. Tarng, "A multiband quasi-yagi type antenna,” IEEE Transactions on Antennas and
Propagation, vol. 58, no. 2, 2010, pp. 593–596.
40. H. D. Lu, L. M. Si, and Y. Liu,"Compact planar microstrip fed quasi-Yagi antenna,” Electronics Letters, vol. 48, no. 32, 2012, pp.140–
14.
41. Kishore K Kumar, Movva Pavani, “Design of a Compact Rectangular Patch Antenna Using Defected Ground Structure," International
Journal on Communications Antenna and Propagation, Vol 7, Issue 4, 2017, pp. 282-289.

Authors: I.Regina Mary, T.Bhagavathi Pushpa

Paper Title: An Ecofriendly Inhibitor- Influence of Mollugo pentaphylla in Reinforced Concrete


Abstract: In reinforced concrete structures corrosion is the most destructive challenging problem. Many
techniques are available to reduce corrosion. Extracts from plant have been used as a protective coating for steel
reinforcement.The corrosion inhibiting nature of the extract of Mollugo pentaphylla in M20 grade concrete was
examined in this paper.The cube casted were exposed to 3% NaCl for 56 days and it was investigated by
using gravimetric method,pH measurement, open circuit potential test and compressive strength test. The
compressive strength test was conducted after curing for 28 days. The inhibitor solution was prepared using
distilled water and extract of Mollugo pentaphylla for 0%, 50% and 100% concentration. From the results it has
been observed that the inhibiting efficiency increases with the decrease in concentration.

437.
Keyword : Mollugo pentaphylla,sodium chloride,inhibitor,open circuit potential test.
2511-
References: 2513
1. Abd El-Aziz S. Fouda, Ahmed Abdel Nazeer, Mohamed Ibrahim, and Mohamed Fakih,” Ginger Extract as Green Corrosion
Inhibitor for steel in Sulfide Polluted Salt Water”, Journal of the Korean Chemical Society, 2013, Vol 57,No 2.
2. Abdul Rahman.A.S,Mohammad Ismail,”Green plant as a Passivation- Promoting Inhibitor for Reinforced concrete,”International
Journal of Engineering Science & Technology,Aug 2011, Vol 3, No 8 .
3. K. Dahmani, M. Galai, M. Cherkaoui, A. El Hasnaoui, A. El Hessni,” Cinnamon essential oil as a novel eco-friendly corrosion
inhibitor of Copper in 0.5 M Sulfuric Acid medium”,Journal of Materials and Environmental science,2017,Vol 8,Issue 5,pp1676 -1689.
4. A.M. Al-Fakih1, M. Aziz1, H.M. Sirat1,” Turmeric and ginger as green inhibitors of mild steel corrosion in acidic medium, Journal of
Material Environmental Science,6,(5),2015,1480-1487.
5. C.A. Loto, O. O. Joseph, R.T. Loto, A.P.I. Popoola,”Inhibition Effect of Vernonia amygdalina Extract on the Corrosion of Mild
Steel Reinforcement in Concrete in 3.5 M NaCl Environment”, International Journal of Electrochemical. Science, 8 (2013) 11087 –
11100.
6. Yuli Panca Asmara, Tedi Kurniawan, Agus Geter Edy Sutjipto, Jamiluddin Jafar ,”Application of Plants Extracts as Green
Corrosion Inhibitors for Steel in Concrete -A review”,Indonesian journal of Science and Technology, 3 (2), 2018 pp 158-170.

Authors: S.Usha Kiruthika, S. Kanaga Suba Raja, V. Balaji, C.J.Raman, S. S. L. Durai Arumugam

Paper Title: Detection of Tuberculosis in Chest X-rays using U-Net Architecture


Abstract: x-rays are the most commonly performed which are costly diagnostic imaging tests ordered by
physicians. Here we are proposing an artificial intelligence system that can reliably separate normal from
abnormal would be invaluable in addressing the problem of undiagnosed disease and the lack of radiologists in
low-resource settings. The aim of this study is to develop and validate a deep learning system to detect chest x-
ray abnormalities and hence detect Tuberculosis (TB) and to provide a tool for Computer Aided Diagnosis
(CAD).In this paper by trying to explore existing systems of Image Processing and Deep learning architectures,
we are trying to achieve radiologist level detection as well as lower False Negative detection of TB by using
ensemble datasets and algorithms. The prototype of a WebApp is created and can be checked on https://parth-
patel12.github.io where one can upload the chest x-ray which give probabilities of the chest x-ray to be normal
or TB affected.

438. Keyword : Autism, Generative adversarial network, Convolutional Neural Networks, Artificial Neural
Network, Tuberculosis, Computer Aided Diagnosis. 2514-
2519
References:
1. World Health Organization. Global tuberculosis control: epidemiology, strategy, financing: WHO report 2009. World Health
Organization, 2009.
2. Jankharia, Govindji R. "Commentary-radiology in India: the next decade." The Indian journal of radiology & imaging 18, no. 3 (2008):
189.
3. Jaeger, Stefan, Alexandros Karargyris, Sema Candemir, Les Folio, Jenifer Siegelman, Fiona Callaghan, Zhiyun Xue et al. "Autom atic
tuberculosis screening using chest radiographs." IEEE transactions on medical imaging 33, no. 2 (2013): 233-245.
4. Dye, Christopher. "Global epidemiology of tuberculosis." The Lancet 367, no. 9514 (2006): 938-940.
5. Doi, Kunio. "Computer-aided diagnosis in medical imaging: historical review, current status and future potential." Computerized
medical imaging and graphics 31, no. 4-5 (2007): 198-211.
6. Xu, Yan, Tao Mo, Qiwei Feng, Peilin Zhong, Maode Lai, I. Eric, and Chao Chang. "Deep learning of feature representation with
multiple instance learning for medical image analysis." In 2014 IEEE international conference on acoustics, speech and signal
processing (ICASSP), pp. 1626-1630. IEEE, 2014.
7. Tan, Jen Hong, U. Rajendra Acharya, Collin Tan, K. Thomas Abraham, and Choo Min Lim. "Computer-assisted diagnosis of
tuberculosis: a first order statistical approach to chest radiograph." Journal of medical systems 36, no. 5 (2012): 2751-2759.
8. Badrinarayanan, Vijay, Alex Kendall, and Roberto Cipolla. "Segnet: A deep convolutional encoder-decoder architecture for image
segmentation." IEEE transactions on pattern analysis and machine intelligence 39, no. 12 (2017): 2481-2495.
9. Litjens, Geert, Thijs Kooi, Babak Ehteshami Bejnordi, Arnaud Arindra Adiyoso Setio, Francesco Ciompi, Mohsen Ghafoo rian, Jeroen
Awm Van Der Laak, Bram Van Ginneken, and Clara I. Sánchez. "A survey on deep learning in medical image analysis." Medical image
analysis 42 (2017): 60-88.
10. Cao, Yu, Chang Liu, Benyuan Liu, Maria J. Brunette, Ning Zhang, Tong Sun, Peifeng Zhang et al. "Improving tuberculosis diagnostics
using deep learning and mobile health technologies among resource-poor and marginalized communities." In 2016 IEEE First
International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), pp. 274-281. IEEE,
2016.
11. Ronneberger, Olaf, Philipp Fischer, and Thomas Brox. "U-net: Convolutional networks for biomedical image segmentation."
In International Conference on Medical image computing and computer-assisted intervention, pp. 234-241. Springer, Cham, 2015.

Authors: B. Praba, R. Sujatha

Paper Title: Return Time Probability Distribution of a Finite Markov Chain


Abstract: In this paper we have considered a finite discrete Markov chain and derived a recurrence relation
for the calculating the return time probability distribution. The mean recurrence time is also calculated. Return
time distribution helps to identify the most frequently visited states. Return time distribution plays a vital role in
the classification of Markov chain. These concepts are illustrated through an example.

Keyword : Discrete Markov Chain, Ergodic Markov Chain , Limiting distribution, Mean recurrence time,
Return time probability, Transition probability matrix.
439. References:
1. S.P. Meyn and R.L. Tweedie, Markov Chains and Stochastic Stability, London: Springer Verlag. 1993. 2520-
2. Kishore S. Trivedi, Probability and Statistics with Reliability, Queuing and Computer Science Applications, John Wiley & Sons, Inc, 2522
Second Edition, 2008.
3. Yajun Zhou, Lilei Wang, Rong Zhong, and Yulong Tan, A Markov Chain Based Demand Prediction Model for Stations in Bike
Sharing Systems, Mathematical Problems in Engineering, Volume 2018, https://doi.org/10.1155/2018/8028714.
4. E. Omey, J. Santos and S. VanGulck, “A Markov Binomial distribution”, Journal of Applicable Analysis and Discrete Mathematics,
Vol. 2, 2008.
5. Y.H. Wang, “On the limit of Markov Binomial Distribution”, Journal of Applied Probability, Vol. 18 no. 4 pp. 937-942, 1981.
6. P. Bertail and S. Clemencon, “Regenerative Block Bootstrap for Markov Chains”, Bernoulli, Vol. 12 no. 4 pp. 689-712, 2006.
7. Alexander Karalis Isaac, “The Markov Binomial Distribution : an Explicit Solution by a Regenerative Approach”, Proceedings of
World Congress on Engineering 2013, London Vol. 1.
8. Kallepalli, Chaitanya and Tian Jeff, “Measuring and modeling usage and reliability for statistical web testing”, IEEE Transac tions on
Software Engineering, Vol.27,pp.1023-1036, 2001.
9. B. Praba and R. Sujatha, “A Fuzzy Markov Model for Web Testing”, Ganita Sandesh, Vol.21, No.2, pp.111-120, 2007.

Authors: Immaculate Mercy A, Chidambaram M

Paper Title: An Enhanced Generalized Sequential Pattern Classification for Sequence Datasets
Abstract: A Niche approach for classifying sequence Datasets is achieved by the use of EGSP (Enhanced
Generalized sequential pattern) algorithm. The EGSP brings out a prediction model for working with the
Sequence Datasets in the domain of Gene and Protein datasets. The Method proceeds by the way of generalizing
the datasets of both the supervised and Semi-supervised data. The generalization brings out the candidate
sequences which paves path for a distinct component extraction. The sequences are generated based on the
threshold value which is then followed by applying the EGSP algorithm which brings out the sequential pattern
from the pruned sequences. The extracted sequential pattern is then clustered using a gene clustering algorithm.
The algorithm (MNBC) Modified Naïve Bayes Classification computes the probabilistic components for each
class. The accuracy obtained is far better than the traditional classification algorithms. The resultant
classification provides a solution for prediction methods for the selected domain and its applications. The
algorithm used gives an upper hand over the computational costs which have been drastically minimized over
the existing methods.

440. Keyword : EGSP, MNBC, Candidate sequences, Gene Clustering, Generalization,.


2523-
References: 2529
1. Devi Arockia Vanitha ,Devaraj D,Venkatesulu, “Gene Expression Data classification using support Vector Machine and Mutual
Information–based Gene selection”, Procedia Computer science 47(2015)13-21.
2. Heba Abusamra. “A comparative study of feature selection and classification methods for gene expression data of glioma”, Procedia
Science Direct, Elsevier Issue.10.1016/j.procs.2013.10.003. For Conference.
3. Hung-Yi Lin, “Gene Discretization based on EM clustering and adaptive sequential forward gene selection for molecular
classification”, Elsevier, Applied Soft Computing 48(2016) 683-690..
4. Jesus Maillo,Sergio Ramirez,Issac Triguero,Fransico Herrera, “kNN-IS: An interactive Spark-based design of the K-nearest Neighbors
classifiers for big data” Knowledge based Systems, Elsevier 000(2016)1-13.
5. Jia Lv,Qinke Peng,Xiao Chen, Zhi Sun , “A multi-objective heuristic algorithm for gene expression microarray data classification”,
Elsevier, Expert Systems with Applications 59(2016)13-19.
6. Konstantina Kourou, Costas Papaloukas,Dimitrois I.Fotiadis, “Integration of pathway Knowledge and Dynamic Bayesian Networks for
the prediction of Oral Cancer Recurrence”, IEEE 2016.
7. Krisztian Buza, “Classification of Gene Expression data: A Hubness-aware semi-supervised approach”, Elsevier, Computer Methods
and Programs in Biomedicine 127(2016) 105-113.
8. Pradeep K.Sharma, Vaibhav Sharma, Jagrati Nagdiya, “ A Proposed Method for Mining High Quality itemset with Transactional
weighted utility using Genetic algorithm Technique”, IJSRCSE, Vol -5, Issue 1, pp 31-35, 2017.
9. Sara Tarek, Reda Abd Elwahab, Mahmoud Shoman, “Gene Expression based cancer classification”, Egyptian Informatics Journal
2016.
10. T. Senthilselvi, R.Parimala, “Improving Clustering Accuracy using Feature Extraction Method “, IJSRCSE, Vol-6, Issue-2, pp 15-19,
2108.
11. Thanh Nguyen, Saeid Nahavandi, “Modified AHP for Gene Selection and Cancer Classification using Type-2 Fuzzy Logic”, IEEE
Transactions on Fuzzy Systems, Vol 24 No.2 April 2016.

Authors: V. Ramesh, P. Anand

Paper Title: Influence of Thermal Conductivity on Stacking Sequence of Hybrid Composites


Abstract: Hybrid Composites comprising of two or more reinforcement materials are finding increase in
demand in diverse field of applications such as building panels, automotive components and aero parts. There is
a need to study the thermal properties to find the suitability of hybrid laminates as insulating materials. In this
research article an attempt is made to find the thermal conductivity of laminate materials having varying
stacking sequence of its reinforcement fibers. The said laminate is produced using hand layup method. It contain
seven layers of reinforcement fibers stacked one over other in three different configurations. First the
reinforcements kevlar (K49) and basalt fibers are stacked in alternating layers. Second configuration contain
bilayers of kevlar or basalt sandwiching the inner three alternative layers. Third configuration contain tri layer of
one of the reinforcement fibers sandwiched between bilayers of another reinforcement fibers. Epoxy resin is
used as binding cum matrix element in all the hybrid laminates. The produced hybrid laminates are tested for its
thermal conductivity and coefficient of thermal expansion. It is found that increasing the number of layers of
basalt fibers increased the thermal conductivity of the hybrid laminate. On the other hand, kevlar fibers
contributed in reducing the thermal conductivity of the hybrid laminates. Thermal expansion coefficient
depended on the presence of basalt fibers as the outermost layers in the hybrid laminates. The hybrid laminates
having kevlar fibers contributed in lowering thermal conductivity and also the coefficient of thermal expansion.

Keyword : hybrid laminates, basalt fibers, kevlar fibers, thermal conductivity, coefficient of thermal
expansion.
441.
References:
1. S. Bard, F. Schönl, M. Demleitner, and V. Altstädt, “Influence of fiber volume content on thermal conductivity in transverse and fiber 2530-
direction of carbon fiber-reinforced epoxy laminates,” Materials (Basel)., vol. 12, no. 7, pp. 1–10, 2019. 2532
2. T. Behzad and M. Sain, “Measurement and Prediction of Thermal Conductivity for Hemp Fiber Reinforced Composites,” Polym. Eng.
Sci., vol. 12, pp. 977–983, 2007.
3. A. Sayyidmousavi, H. Bougherara, S. R. Falahatgar, and Z. Fawaz, “Prediction of the Effective Thermal Conductivity of Fiber
Reinforced Composites Using a Micromechanical Approach,” J. Mech., vol. 35, no. 2, pp. 179–185, 2019.
4. P. Hartlieb, M. Toifl, F. Kuchar, R. Meisels, and T. Antretter, “Thermo-physical properties of selected hard rocks and their relation to
microwave-assisted comminution,” Miner. Eng., vol. 91, pp. 34–41, 2016.
5. M. R. Islam and A. Pramila, “Thermal Conductivity of Fiber Reinforced Composites by the FEM,” J. Compos. Mater., vol. 33, no. 18,
pp. 1699–1715, 1999.
6. R. D. Sweeting and X. L. Liu, “Measurement of thermal conductivity for fibre-reinforced composites,” Compos. Part A Appl. Sci.
Manuf., vol. 35, no. 7–8, pp. 933–938, 2004.
7. Z. Javanbakht, W. Hall, and A. Ochsner, “Effective Thermal Conductivity of Fiber Reinforced Composites Under Orientation
Clustering,” Adv. Struct. Mater., vol. 92, pp. 507–519, 2019.
8. R. Osugi, H. Takagi, K. Liu, and Y. Gennai, “Thermal Conductivity Behavior of Natural Fiber-Reinforced Composites,” in Asian
Pacific Conference for Materials and Mechanics, Yokohama, Japan, November, 2009, pp. 13–16.
9. Y. K. Sahu, “Study on the Effective Thermal Conductivity of Fiber Reinforced Epoxy Composites,” 2014.
10. S. Ravichandran, “Thermal alnalysis of fiber reinforced low density poly-ethylene composites,” Int. J. ChemTech Res., vol. 9, no. 1,
pp. 308–312, 2016.
11. E. Vilchevskaya and I. Sevostianov, “Overall thermal conductivity of a fiber reinforced composite with partially debonded
inhomogeneities,” Int. J. Eng. Sci., vol. 98, pp. 99–109, 2016.
12. S. L. Chung and J. S. Lin, “Thermal conductivity of epoxy resin composites filled with combustion synthesized h -BN particles,”
Molecules, vol. 21, no. 670, pp. 1–11, 2016.
13. Z. Li, J. Ma, H. Ma, and X. Xu, “Properties and Applications of Basalt Fiber and Its Composites,” IOP Conf. Ser. Earth Environ. Sci.,
vol. 186, no. 2, pp. 1–6, 2018.
14. G. Ventura and V. Martelli, “Thermal conductivity of Kevlar 49 between 7 and 290 K,” Cryogenics (Guildf)., vol. 49, no. 12, pp. 735–
737, 2009.

Authors: Abhilash K.S, Nisam Rahman A, Shijin Kumar P.S

Paper Title: Design and Evaluation of Solar Powered Dryer System with Integrated Thermal Energy Storage
Abstract: Drying of food products in open air under sun is the most common and easiest way of drying.
However, it cannot assure the hygiene of the dried product because of the involvement of wind-borne dust, rain,
insects, rodents and birds. This will affects the quality of the product and hence may have contrary economic
effects on domestics and global markets. Some of the problems associated with open-air sun drying can be
solved through the use of a cabinet type or indirect type solar dryer. The major drawback of all these types of
442. conventional solar dryers is that they cannot be used in cloudy weather or during night time. By incorporating
Thermal Energy Storage (TES) we can make use of the dryer throughout the day or at least during late evenings.
Water is one of the best sensible TES medium within its operating range. Solar water heater is a device used to 2533-
2539
collect solar energy and heat up water without any electrical or fossil fuel aid. So the idea of this project is to
incorporate solar dryer with solar water heater so that the dryer can be used even at late evenings or in cloudy
weather, and also it can be used as water heater for hot water consumption.

Keyword : Solar Energy, Thermal Energy Storage, Solar Dryer, Design and Fabrication.
References:
1. S. H. Sengar , A. G. Mohod , Y. P. Khandetod “Experimental evaluation of solar dryer for kokam fruit” , College of Agricultural
Engineering and Technology, Global Journals Inc. (USA) 2012.
2. Mahendra S. Seveda “Performance analysis of solar water heater in NEH region of India” Central Agricultural University, India ,
Science Publishing Group, 2013.
3. Lalit M. Bal *, Santosh Satya, S.N. Naik “Solar dryer with thermal energy storage systems for drying agricultural food produc ts: A
review” Indian Institute of Technology, Science Direct, 2010.
4. R. Vidya Sagar Raju, R. Meenakshi Reddy, E. Siva Reddy “Design and Fabrication of Efficient Solar Dryer” Int. Journal of
Engineering Research and Applications, 2013.
5. Chandrakumar B Pardhi and Jiwanlal L Bhagoria “Development and performance evaluation of mixed-mode solar dryer with forced
convection”,India, Int. Journal for Energy and Environmental Engineering, 2013.
6. Alireza Mohajer a, Omid Nematollahi a, Mahmood Mastani Joybari b, Seyed Ahmad Hashemi, Mohammad Reza Assari “Experimental
investigation of a Hybrid Solar Drier and Water Heater System”, Isfahan University of Technology, Iran, Science direct, 2013.
7. Ekechukwu, O.V., 1999, Review of solar-energy drying systems I: an overview of drying principles and theory, Energy Conversion and
Management, 40, pp. 593–613.
8. Lindley, A. and H. Whitaker, 1996. Agricultural Buildings and Structures. Revised Edn., ASAE, 17:357-375.
9. H. S. Abdel-Galil, “Solar system with energy storage for drying poultry manure” Fayoum University-Egypt; 2007.
10. C.L. Hii, S.V. Jangam, S.P. Ong and A.S. Mujumdar; “Solar Drying: Fundamentals, Applications and Innovations” 2012.
11. V.V. Tyagia, N.L. Panwar, N.A. Rahima, Richa Kothari; “Review on solar air heating system with and without thermal energy sto rage
system”; University of Malaya, Kuala Lumpur 50603, Malaysia; Science Direct, 2012.
12. Drew Frank Schiavone “Development and evaluation of a natural-convection solar dryer for mango in rural Haitian communities”;
University of Florida; 2011.
13. Werner Weiss, Josef Buchinger “Solar drying” Austrian development corporation, AEE INTEC.
14. Bennamoun, L., 2011, Reviewing the experience of solar drying in Algeria with presentation of the different aspects of solar dryers,
Renewable and Sustainable Energy Reviews, 15 (7), 3371-3379.
15. Eckchukwu, O. V., Norton, B., 1999, Review of solar-energy drying systems II: an overview of solar drying technology, Energy
Conversion & Management, 40 (6), 615-655.
16. Ekechukwu, O.V., 1999, Review of solar-energy drying systems I: an overview of drying principles and theory, Energy Conversion and
Management, 40, pp. 593–613.
17. B. K. Bala, Serm Janjai “ Solar drying of fruits, vegetables, spices, medicinal plants and fish: Developments and Potentials”
International Solar Food Processing Conference 2009.
18. Mujumdar, A.S., 2007, Handbook of Industrial drying, Taylor and Francis group, U.K.
19. Sharma VK, Colangelo A, Spagna G. “Experimental investigation of different solar dryers suitable for fruit and vegetable drying.”
Department Enerzia, Divisione Ingegneria Sperimentale, Italy.

Authors: Reznik A.L., Soloviev A.A., Torgov A.V.

Paper Title: Optimal Search Parameters for A Random Pulsed-Point Source with the Required Accuracy
Abstract: The questions of creating high-speed algorithms for detecting and localizing point sources
having a random distribution and manifesting themselves by generating instantaneous delta pulses at random
times are described. The search is carried out by a system including one or more receiving devices, and is
performed taking into account the requirements for localization accuracy. It is assumed that all receivers have
freely tunable viewing windows. The optimal procedure is one that minimizes (in a statistical sense) the average
localization time. It is established that even with relatively low requirements for localization accuracy, the
optimal procedure consists of several stages (each such stage ends at the moment of the next pulse registration).
In this case, it is possible receiving system to miss some pulses generated by the source during the optimal
search. In the work, the optimal search parameters are calculated depending on the number of receiving devices
and the required localization accuracy. The possibility of using the results in a multidimensional case is shown.
443.
2540-
Keyword : search, optimal algorithms, pulsed-point source, localization. 2544
References:
1. X. Zhu, L. Wen, G. Hobbs and oth. “Detection and localization of single-source gravitational waves with pulsar timing arrays,”
Monthly
Notices of the Royal Astronomical Society, Oxford Academic Press, V. 449 (2), 2015, p.1650–1663.
2. Steven Weinberg. Cosmology. New York: Oxford University Press, 2008, 593 p.
3. R. Dorf, R. Bishop. Modern Control Systems (12th Edition), UK: Pearson, 2010, 1104 p.
4. V. S. Kirichuk, K. Y. Mokin, and A. L. Reznik. “Algorithms for Processing of Series of Digital Aerospace Images Based on Automatic
Search for the Conjugate Points,” Pattern Recognition and Image Analysis, V. 11(1), 2001, p. 192-194.
5. A. L. Reznik, V. M. Efimov, A. A. Solov'ev, A. V. Torgov. “Errorless readout of random discrete-point fields ,” Optoelectronics,
Instrumentation and Data Processing, V.48(5), 2012, p. 506-514.
6. H. Wei, Z. Cai, B. Tang, Z. Yu. “Review of the algorithms for radar single target tracking,” IOP Conference, Series Earth an d
Environmental Science, 69(1):012073, 2017
7. D. Bertsekas. Constrained optimization and Lagrange multiplier methods. New York: Academic Press, 1982. 412 p.

Authors: M. Poobalaranjani, R.Pichailakshmi

Paper Title: Dominating Cocoloring of Graphs


Abstract: A 𝐤-cocolouring of a graph 𝐆 is a partition of the vertex set into 𝐤 subsets such that each set
induces either a clique or an independent set in 𝐆. The cochromatic number 𝐳(𝐆) of a graph 𝐆 is the least 𝐤 such
444. that 𝐆 has a 𝐤-cocolouring of 𝐆. A set 𝐒 ⊆ 𝐕 is a dominating set of 𝐆 if for each 𝐮 ∈ 𝐕 − 𝐒, there exists a vertex
𝐯 ∈ 𝐒 such that 𝐮 is adjacent to 𝐯. The minimum cardinality of a dominating set in 𝐆 is called the domination
2545-
number and is denoted by 𝛄(𝐆). Combining these two concepts we have introduces two new types of 2547
cocoloring viz, dominating cocoloring and 𝛄-cocoloring. A dominating cocoloring of 𝐆 is a cocoloring of 𝐆 such
that atleast one of the sets in the partition is a dominating set. Hence dominating cocoloring is a conditional
cocoloring. The dominating co-chromatic number 𝐳𝐝 (𝐆) is the smallest cardinality of a dominating cocoloring
of 𝐆.(ie) 𝐳𝐝 (𝐆) = 𝐦𝐢𝐧{ 𝐤|𝐆 has a dominating cocoloring with 𝐤-colors}.
Keyword : cocolouring, cochromatic number, dominating cocoloring, dominating cochromatic number,
dominating cocolorable graphs.
References:
1. C. Berge, Theory of Graphs and its Applications. Methuen, London, 1962.
2. E. J. Cockayne and S. T. Hedetniemi, Towards a theory of domination in graphs.

Networks,7:247-261, 1977.
3. P.Erdos,J.Gimbel & H.J.Straight, Cohromatic Number versus Cochromatic number in Graphs with Bounded Clique Number,
Europ.J.Combinatorics (1990) 11,235-240.
4. L. Lesniak Foster & H. J. Straight, The co-chromatic number of a graph, Arc Combi. 3(1977),39-46.
5. O. Ore, Theory of Graphs. Amer. Math. Soc. Colloq. Publ., 38 (Amer. Math. Soc., Providence,RI), 1962.
6. A. M. Yaglom and I. M. Yaglom. Challenging mathematical problems with elementary solutions. Volume 1: Combinatorial Analysis
and Probability Theory, 1964

Authors: Tutik Inayati


New Perspectives on the Associations between Research Performance and International Academic
Paper Title:
Networks in Science & Engineering Fields
Abstract: International experience is seen as one factor of advancing networks for researchers, which
would lead to heighten the researchers’ performance. By searching through researchers’ past academic
publications and countries in which they pursued their higher education, the networks could be developed early
and become fruitful to identify the performance of researchers. Quality of university is also questioned when it
comes to the performance of researchers, which follows the debate of private and public universities’ quality.
Therefore, this study is intended to comprehend the association between three salient variables: type of
university, availability of international co-authors, and pursuing higher education abroad. This study takes place
in Indonesia, where top researchers whose performance is on the top 150 among all researchers and university
lecturers are collected and analyzed. We collected top 150 researchers in Indonesia according to Indonesia’s
government official research index website and partake in searching their education and academic background.
Using descriptive analysis and chi-square for test of independence, this study generates a new perspective about
relationship of performance of researchers in Indonesia with their international experience. Thus, certain policy
recommendation emphasizes in support for Indonesian researchers to undergo international experience in form
of studying abroad or short research programs abroad.

Keyword : Research, Science index, international networks, Researchers’ performance .


References:
1. P. W. Beamish, “Publishing international (joint venture) research for impact,” Asia Pacific J. Manag., vol. 23, no. 1, pp. 29–46, 2006.
2. B. Rienties and E. M. Nolan, “Understanding friendship and learning networks of international and host students using longitu dinal
Social Network Analysis,” Int. J. Intercult. Relations, vol. 41, pp. 165–180, 2014.
3. W. Eduan, “Influence of study abroad factors on international research collaboration: evidence from higher education academics in
445. sub-Saharan Africa,” Stud. High. Educ., vol. 44, no. 4, pp. 774–785, Apr. 2019.
4. L. Romero and E. Del Rey, “Competition Between Public and Private Universities: Quality, Prices and Exams,” Madrid, 04–64, 2004.
5. D. Hegde, “Public and private universities: Unequal sources of regional innovation?,” Econ. Dev. Q., vol. 19, no. 4, pp. 373 –386, Nov. 2548-
2005. 2552
6. J. D. Adams and Z. Griliches, “Research Productivity in a System of Universities,” Econ. Econom. Innov., pp. 105–140, 2000.
7. N. Halai, “Quality of private universities in Pakistan: An analysis of higher education commission rankings 2012,” Internatio nal
Journal of Educational Management, vol. 27, no. 7. pp. 775–786, 2013.
8. U. Schmoch and T. Schubert, “Are international co-publications an indicator for quality of scientific research?,” Scientometrics, vol.
74, no. 3, pp. 361–377, 2008.
9. G. Buela-Casal, P. Perakakis, M. Taylor, and P. Checa, “Measuring internationality: Reflections and perspectives on academic
journals,” Scientometrics, vol. 67, no. 1, pp. 45–65, 2006.
10. W. Glänzel and A. Schubert, “Double effort = Double impact? A critical view at international co-authorship in chemistry,”
Scientometrics, vol. 50, no. 2, pp. 199–214, 2001.
11. F. De Moya-Anegon, V. P. Guerrero-Bote, C. Lopez-Illescas, and H. F. Moed, “Statistical relationships between corresponding
authorship, international co-authorship and citation impact of national research systems,” J. Informetr., vol. 12, no. 4, pp. 1251–1262,
Nov. 2018.
12. J. C. Shin, J. Jung, G. A. Postiglione, and N. Azman, “Research Productivity of Returnees from Study Abroad in Korea, Hong Kong,
and Malaysia,” Minerva, vol. 52, no. 4, pp. 467–487, Nov. 2014.
13. M. Beine, F. Docquier, and H. Rapoport, “Brain drain and human capital formation in developing countries: Winners and losers,”
Econ. J., vol. 118, no. 528, pp. 631–652, 2008.
14. C. S. Lee, D. J. Therriault, and T. Linderholm, “On the cognitive benefits of cultural experience: Exploring the relationship between
studying abroad and creative thinking,” Appl. Cogn. Psychol., vol. 26, no. 5, pp. 768–778, 2012.
15. A. Roy, A. Newman, T. Ellenberger, and A. Pyman, “Outcomes of international student mobility programs: a sy stematic review and
agenda for future research,” Stud. High. Educ., vol. 44, no. 9, pp. 1630–1644, 2018.
16. A. Agrawal, D. Kapur, and J. McHale, “How do spatial and social proximity influence knowledge flows? Evidence from patent data,”
J. Urban Econ., vol. 64, no. 2, pp. 258–269, 2008.
17. R. B. Freeman and W. Huang, “Collaborating with people like me: Ethnic coauthorship within the United States,” J. Labor Econ., vol.
33, no. S1, pp. S289–S318, 2015.
18. S. Breschi, F. Lissoni, and E. Miguelez, “Foreign-origin inventors in the USA: Testing for diaspora and brain gain effects,” J. Econ.
Geogr., vol. 17, no. 5, pp. 1009–1038, 2017.
19. P. Almeida, A. Phene, and S. Li, “The Influence of Ethnic Community Knowledge on Indian Inventor Innovativeness,” Organ. Sci. ,
vol. 26, no. 1, pp. 198–217, Sep. 2014.
20. “SINTA - Science and Technology Index.” [Online]. Available: http://sinta2.ristekdikti.go.id/. [Accessed: 11-Aug-2019].
Ravikumar Solomon G, Hariram V, Deepak Sai Raj, Jithendra Dev, Naveen Kumar Gokulakesavan,
446. Authors:
Seralathan S
Paper Title: Evaluation of the Transesterification Process And Physio-Chemical Properties of Jojoba Biodiesel
Abstract: In this investigation, Jojoba bio-oil was converted to biodiesel through a process of
transesterification. In the present work methanol is used as an alcohol and potassium hydroxide is used as a
catalyst. Single stage transesterification process was employed as the content of free fatty acids was 1.2%.
Physiochemical properties of the biodiesel like density, specific gravity, calorific value, flash and fire point, ash
content, kinematic viscosity and acid value were found out using different methods and these properties are
compared with those of petroleum diesel.

Keyword : Jojoba bio-oil, transesterification, physio-chemical properties, density, heating value.


References:
1. Yongcheng Huang, Yaoting Li, Xudong Han, Jiating Zhang, Kun Luo, Shangsheng Yang, Jiyuan Wang. Investigation on fuel
properties and engine performance of the extraction phase liquid of bio-oil/biodiesel blends.renewable energy147 (2019) 1990-2002
2. Abu-Arabi MK, Allawzi MA, Al-Zoubi HS, Tamimi A. Extraction of Jojoba oil by pressing and leaching. Chemical Engineering
Journal (2000); 76:61–5.
3. Wisniak,.J . Jojoba oil and derivatives, prog chemfts lipids, 15 (1977) 176.
4. Staat, F. and Valet, E. Vegetable oil methyl ester as a diesel substitute, Chem,ind, (1994) 863-856.
5. Ma, F. and Hanna, M.A. Biodiesel production: A review, Bioresource Technol, (1999) 70: 1
6. Canoria, L., Alcantara. R., Garcia-Martinez, M.J. Carrasco, J. Biodiesel from jojoba oil-wax: Transesterification with methanol and
properties as a fuel, Biomass and Bioenergy, 30 (2006) 76-81.
7. Bouaid A, Bajo L, Martinez M, Aracil J. Optimization of biodiesel production from jojoba oil, 85 (2007) 378-382
8. Jiang X, N. Ellis. Upgrading bio-oil through emulsification with biodiesel: Energy Fuels (2010) 1358-1364.
9. Azad, M.G. Rasulb, C. Bhat. Combustion and emission analysis of Jojoba biodiesel to assess its suitability as an alternative to diesel
fuel, Energy procedia (2018) 159-165
10. Shailesh N. Shah, Brajendra K. Sharma, Bryan R. Moser, Sevim Z. Erhan. Preparation and Evaluation of Jojoba Oil Methyl Esters as
Biodiesel and as a Blend Component in Ultra-Low Sulfur Diesel Fuel, Bioenergy. Res., 3 (2009) 214-223 2553-
11. Gorski K, Smigins R , 2014, Impact of ether/ethanol and biodiesel blends on combustion process of compression ignition engine , 2557
Energy, 72 (2014) 760-771.
12. Al Awad AS, Selim MY, Zeibak AK, Moussa R, Jojoba ethyl ester production and properties of ethanol blends. Fuel 124 (2014) 73-75.
13. Shah NS , Sharma BK, Moser BR, Erhen SZ. Preparation and evolution of jojoba oil methyl esters as biodiesel and as blend
components in ultra low sulphur diesel fuel. Bioenergy Res 3 (2010) 214-223.
14. Huzayyin AS , Bawady AH, Rady MA, Dawood A. Experimental evolution of diesel engine performance and emission using blends of
jojoba oil and diesel fuel, Energy convers manage 45 (2004) 203-212.
15. Selim, M.Y.E.,Radwan M.S. and Elfeky, S.M.S. Combustion of jojoba methyl ester in an indirect induction diesel engine, Renewable
energy, 28 (2004) 1401.
16. Saleh HE. Experimental study on diesel engine nitrogen oxide reduction running with jojoba methyl ester by exhaust gas recirc ulation,
Fuel, 88 (2009) 1357-1364.
17. John, G., Hariram, V., Seralathan, S. Emission reduction using improved fuel properties of algal oil biodiesel and its blends . Energy
Sources, Part A: Recovery, Utilization and Environmental Effects 40 (1) (2018), pp. 45-53.
18. Hariram, V., Vasanthaseelan, S. Optimization of base catalysed transesterification and characterization of brassica napus (Canola seed)
for the production of biodiesel. International Journal of ChemTech Research. 8(9) (2015), pp. 418-423.
19. Hariram, V., John, J.G., Seralathan, S. Spectrometric analysis of algal biodiesel as a fuel derived through base-catalysed
transesterification. International Journal of Ambient Energy. 40 (2) (2019), pp. 195-202.
20. Venkatesan, H., Godwin, J.J., Sivamani, S. Data set for extraction and transesterification of bio-oil from Stoechospermum marginatum,
a brown marine algae. Data in Brief .14 (2017), pp. 623-628.
21. Venkatesan, H., John, G., Sivamani, S. Cotton seed biodiesel as alternative fuel: Production and its characterization analysis using
spectroscopic studies. International Journal of Renewable Energy Research. 7 (3) (2017), pp. 1333-1339.
22. Hariram, V., Bharathwaaj, R. Application of zero-dimensional thermodynamic model for predicting combustion parameters of CI
engine fuelled with biodiesel-diesel blends. Alexandria Engineering Journal 55 (4) (2016), pp. 3345-3354.
23. Hariram, V., Seralathan, S., Micha Premkumar and Penchala Tharun. Reduction of exhaust emission using a nano-metallic enriched
lemongrass biodiesel blend. Energy Sources, Part A: Recovery, Utilization and Environmental Effects 39 (21) (2017), pp. 2065 -2071.
24. Hariram, V., Seralathan, S., Dinesh, K M., Vasanthaseelan, S., Sabareesh, M.. Analyzing the fatty acid methyl ester profile of palm
kernel biodiesel using GC/MS, NMR and FTIR techniques. Journal of Chemical and Pharmaceutical Sciences 9 (4) (2016), pp. 3122-
3128.

Authors: Dhanya Anna Kurian, Namrata Pancholi


Qualitative research on the impact of Corporate Social Responsibility mandate in the Companies
Paper Title:
Act, 2013 (India)
Abstract: Purpose: Corporate Social Responsibility (CSR) is a buzz word and so is the CSR mandate where certain
companies in India have to mandatorily spend 2% of their Net Profit (average 3 years) in specified CSR activities from the
year 2014. This paper examines whether the mandate has had any impact in the companies (coming under the purview of the
mandate) and the areas where it has had an impact. Design/methodology/approach:
The research methodology consisted of two-step process. Step 1: Two Focus Group Discussions were conducted to explore
the areas that can be used to measure the impact of CSR mandate. Step 2: A semi-structured in-depth interview was
447. conducted with 10 CSR heads/ CXOs of companies in India. Data was analysed through qualitative analysis methodology of
identifying patterns. Findings: The results of the study indicated three major areas where the CSR mandate impacted the
maximum. 1. The CSR budget/ expenditure 2. The choice of CSR activity 3. Partnerships for implementing CSR activities 2558-
with NGO’s/ Government 4. Frequency of impact Assessments. The study showed that the Mandate has not had much 2569
impact in the budget for organisations which already had a CSR departments and activities in place but the importance of the
department increased. CSR has now become a topic in the boardroom with clear objectives and deliverables which was not
the case earlier in most of the companies. Originality/value: This study provides areas for measuring impact of the fairly new
CSR mandate in India. It explains how the CSR mandate has made companies think differently on CSR grounds. The
findings will help companies and CSR partners (NGO’s and government) to implement the requirements and the intent of the
mandate better.
Keyword : Companies Act 2013, Corporate Social Responsibility, CSR Mandate, Indian Companies
References:
1. Fang-Mei Tai, S.-H. C. (2014). Corporate Social Responsibility. iBusiness, 6(7), 117-130.
2. Dirk Matten, J. M. (2004). Corporate Social Responsibility. Journal of Business Ethics, 4(54), 323-337.
3. De, C. R. (2017). Mandatory CSR. In C. R. De, A Practical Guide to Corporate Social Responsibility Law, Accounting and Taxation
Aspects (pp. 39-85). New Delhi: Bloomsbury.
4. De, C. R. (2017). Listed Company Requirements. In C. R. De, A Practical Guide to Corporate Social Responsibility Law, Accounting
and Taxation Aspects (pp. 147-160). New Delhi: Bloomsbury.
5. De, C. R. (2017). Historical Perspective. In C. R. De, A Practical Guide to Corporate Social Responsibility Law, Accounting and
Taxation Aspects (pp. 1-7). New Delhi: Bloomsbury.
6. Cadbury, A. (2006). Corporate Social Responsibility. Journal of the Academy of Social Sciences, 1(1).
7. Adam Lindgreen, V. S. (2010). Corporate Social Responsibility. International Journal of Management Reviews, 12(1), 1-7.
8. Dhanesh, G. S. (2016). What is Corporate Social Responsibility in India? In C. R. Sun Sun Lim (Ed.), Asian Perspectives on Digital
Culture: Emerging Phenomena, Enduring Concepts (p. 129). New York: Routledge.
9. Meenaz Kassam, F. H. (2016). In Philanthropy in India: Promise to Practice (p. 121). New Delhi: Sage Publications India Pvt. Ltd.
10. Dr. Sanjit Kr. Das, S. D. (2012). Business Ethics And Society: An Insight To Arthasastra. International Journal Of Social Sciences,
1(4).
11. Pillai, R. (2006, December 18). News: Mumbai Mirror. Retrieved March 03, 2018, from
https://mumbaimirror.indiatimes.com/news/business//articleshow/15664848.cms
12. Venkatachalam, R. (2015). Thirukkural - Translation -Explanation:: A Life Skills Coaching Approach (1 ed.). Partridge Publishing.
13. Bhatia, A. (2015, January 15). Management Lessons from Thirukkural. Retrieved February 15, 2017, from
https://ashokbhatia.wordpress.com/2015/01/16/management-lessons-from-thirukkural/
14. Kim Cheng Patrick Low, S. O. (2014). Corporate Social Responsibility in Asia: Practice and Experience (1 ed.). Switzerland:
Springer.
15. Laha, K. (2016, March). Corporate Social Responsibility In Ancient Indian Wisdom: An Analysis: Law Brigade. Retrieved 2016 24,
July, from http://ijldai.thelawbrigade.com/wp-content/uploads/2016/03/kuhumita.pdf
16. Kurian, Dhanya Anna; Pancholi Namrata (2016). Does the Corporate Social Responsibility Mandate in the Company’s Act, 2013 hav e
an impact on Reliance Industries Ltd?. Imperial Journal of Interdisciplinary Research, 2(4)
17. Kurian, Dhanya. Kapoor, Shikha (2015). Evolution of Corporate Social Responsibility. International Journal Of Research In
Commerce, Economics & Management , 5(4), 21-27.
18. Maurer, M. (2007). Corporate Stakeholder Responsiveness: An Evolutionary and Learning Approach (1 ed.). Switzerland: Haupt
Verlag.
19. Leon, R.-D. (2018). Managerial Strategies for Business Sustainability During Turbulent Times (1 ed.). Hershey PA: IGI Global.
20. Steven K. May, G. C. (2007). The Debate over Corporate Social Responsibility (1 ed.). New York: Oxford University Press.
21. Samuel O Idowu, W. L. (2009). Global Practices of Corporate Social Responsibility (1 ed.). Germany: Springer.
22. McPherson, S. (2018, January 12). 8 Corporate Social Responsibility (CSR) Trends To Look For In 2018: Forbes. Retrieved April
2018, 08, from https://www.forbes.com/sites/susanmcpherson/2018/01/12/8-corporate-social-responsibility-csr-trends-to-look-for-in-
2018/#1bffcf4240ce
23. Sarma, C. R. (2017). Piramal group scales up tribal healthcare project in Araku: The Hindu Business Line. Retrieved April 16, 2018,
from https://www.thehindubusinessline.com/companies/piramal-group-scales-up-tribal-healthcare-project-in-araku/article9949365.ece
24. KPMG. (2017, October). KPMG Survey of Corporate Responsibility Reporting 2017. Retrieved October 16, 2018, from
https://assets.kpmg.com/content/dam/kpmg/xx/pdf/2017/10/kpmg-survey-of-corporate-responsibility-reporting-2017.pdf
25. VERSCHOOR, C. C. (2017). Sustainability Reporting Increases - Strategic Finance. Retrieved October 16, 2018, from
http://sfmagazine.com/post-entry/october-2017-sustainability-reporting-increases/
26. KPMG. (2016). Carrots and Sticks-2016.pdf. Retrieved October 16, 2018, from
https://www.globalreporting.org/resourcelibrary/Carrots%20and%20Sticks-2016.pdf
27. Bansal, T. (2015). Business Today: The Unintended Consequences of India's CSR Law- Business News. Retrieved November 18, 2017,
from https://www.businesstoday.in/opinion/columns/corporate-social-responsibility-tax-in-india-hidden-costs/story/214463.html
28. Porter, M. E., & Kramer, M. R. (2016). Strategy and Soceity: The link between competitive advantage and corporate social
responsibility. Harvard Business Review(12), 78-93. Retrieved from
https://www.comfama.com/contenidos/servicios/Gerenciasocial/html/Cursos/Columbia/Lecturas/Strategy-Society.pdf
29. Ernst & Young. (2013). Ernst & Young: Corporate Social Responsibility in India. Retrieved October 22, 2015, from
https://www.ey.com/Publication/vwLUAssets/EY-Government-and-Public-Sector-Corporate-Social-Responsibility-in-India/$File/EY-
Corporate-Social-Responsibility-in-India.pdf
30. Valor, C. (2015). Corporate Social Responsibility and Corporate Citizenship: Towards Corporate Accountability. In Business and
Society Review (pp. 191-212). UK: Blackwell Publishing. Retrieved from https://onlinelibrary.wiley.com/doi/pdf/10.1111/j.0045-
3609.2005.00011.x
31. Porter, M. E., & Kramer, M. R. (2011, January-February). Creating Shared Value. Harvard Business Review, pp. 1-17.
32. Elkington, J. (2018, June 25). 25 Years Ago I Coined the Phrase “Triple Bottom Line.” Here’s Why It’s Time to Rethink It: HBR.
Retrieved December 15, 2018, from Harvard Business Review: https://hbr.org/2018/06/25-years-ago-i-coined-the-phrase-triple-
bottom-line-heres-why-im-giving-up-on-it
33. Caroll, A. B. (1979). A three-dimensional conceptual model of corporate performance. Academy of Management Review, 4(4), 497-
505.
34. Agarwal, S. K. (2014). Corporate Social Responsibility in India (4 ed.). New Delhi: Sage Publications.
35. Sage. (2013). SAGE Brief Guide to Corporate Social Responsibility. New Delhi: Sage Publications.
36. Cooper, S. (2017). Corporate Social Performance: A Stakeholder Approach (2 ed.). New York: Routledge.
37. Caroll, A. B. (1991). The Pyramid of Corporate Social Responsibility: Toward the Moral Management of Organizational Stakeholders.
Business Horizons.
38. Fernando, A. C. (2010). Business Ethics and Corporate Governance (1 ed.). New Delhi: Dorling Kindersley India Pvt. Ltd.
39. Boyce, C., & Neale, P. (2006). CONDUCTING IN-DEPTH INTERVIEWS: A Guide for Designing and Conducting In-Depth Interviews
for Evaluation Input. Pathfinder International.
40. Hyde, K. F. (2000). Recognising deductive processes in qualitative research. Qualitative Market Research: An International Journal,
3(2), 82-90.
41. Showkat, N. (Aligarh). In-depth Interview. 2017: Aligarh Muslim University .
42. Adams, A. a. (2009). Questionnaires, in-depth interviews and focus groups. In: Cairns, Paul and Cox, Anna L. eds. Cambridge:
Cambridge University Press.
43. Allmark, P. J. (2009). Ethical issues in the use of in-depth interviews: Literature review and discussion. Research Ethics Review , 5(2),
48-54.
44. Kvale, S. (1996). Interviews: An Introduction to Qualitative Research Interviewing. Thousand Oaks, CA: Sage.
45. Legard, R. K. (2003). In-depth interviews. In Qualitative Research Practice (pp. 139-168). London: Sage.
46. Pathfinder International. (2016). Conducting In-Depth Interviews: A Guide for Designing and Conducting In-Depth Interviews for
Evaluation Input. Retrieved May 22, 2017, from https://pdfs.semanticscholar.org/ebd1/92df43768b41b1e0b8785ca4b5647
c983f34.pdf.
47. Rubin, H. &. (1995). Qualitative Interviewing: The Art of Hearing Data . Thousand Oaks, CA: Sage.
48. Herbert J. Rubin, I. R. (2005). Qualitative Interviewing: The Art of Hearing Data (1 ed.). Thousand Oaks, CA: Sage.
49. Greg Guest, E. E. (2013). Collecting Qualitative Data: A Field Manual for Applied Research (1 ed.). USA: SAGE Publications.
50. Kreuger, R. A. (2009). Focus Groups: A practical guide for applied research. Thousand Oaks, CA: Sage.
51. Guest, G., Bunce, A., & Johnson, L. (2012). How many interviews are enough? An experiment with data saturation and variability. In
Field Methods (pp. 59-82).
52. Bernard., H. (2000). Social Research Methods: Qualitative and quantitative approaches. Thousand Oaks, CA: Sage.
53. Creswell, J. (2006). Qualitative inquiry and research design: choosing among a few approaches. Thousand Oaks, CA: Sage.
54. Flick, U. (2009). An introduction to qualitative research: Theory, method and applications (4 ed.). Thousand Oaks, CA.
55. Patton, M. (2002). Qualitative Research and Evaluation Methods. Thousand Oaks, CA: Sage.
56. Rubin, H., & Rubin, I. (2004). Qualitative Interviewing: The art of hearing data (2 ed.). Thousand Oaks, CA: Sage.
57. Bloomberg, L. D., & Volpe, M. (2008). Completing Your Qualitative Dissertation: A Roadmap from Beginning to End. Thousand
Islands, CA: Sage.
58. Suri, H. (2011). Purposeful Sampling in Qualitative Research Synthesis. Qualitative Research Journal(11), 63-75.
59. Dworkin, S. L. (2012). Sample Size Policy for Qualitative Studies Using In-Depth Interviews. Archives of Sexual Behaviour, 41(6),
1319–1320.
60. Latham, J. (2017). Qualitative Sample Size - How Many Participants is Enough? - John Latham. Retrieved May 23, 2017, from
https://www.drjohnlatham.com/many-participants-enough/
61. Bertaux, D. (1981). From the life-history approach to the transformation of sociological practice. In Biography and Society: The life
history approach in social sciences (pp. 29-45). London, UK: Sage.
62. Bernard, H. (2000). Social Research Methods. Thousand Oaks, CA: Sage.
63. Morse, J. (1994). Designing funded qualitative research. In D. N, & L. Y (Eds.), Handbook for qualitative research (pp. 220-235).
Thousand Oaks, CA: Sage.
64. Creswell, J. (2006). Qualitative Inquiry and Research Design: Choosing among five approaches (2 ed.). Thousand Oaks, CA: Sage.
65. Kuzel, A. (1992). Sampling in qualitative inquiry. In B. Crabtree, & W. Miller (Eds.), Doing Qualitiative Research (pp. 31-44).
Newbury Park, CA: Sage.
66. Bluff, R. (1997). Evaluating Qualitative Research. British Journal of Midwifery, 5(4), 232-235.
67. Bryne, M. (2001). Evaluating the findings of qualitative research. Association of Operating Room Nurses Journal, 73(3), 703-706.
68. E Fossey, C. H. (2002). Undertsanding and Evaluating Qualitative Research. Australian and New Zealand Journal of Psychiatry, 36(1),
717-732.
69. Morse, J. (1995). The significance of saturation. Qualitative Health Research, 5, 147-149.
70. Sandelowski, M. (1995). Sample size in qualitative research. Research in Nursing and Health, 18, 179-183.
71. Mason, M. (2010). Sample Size and Saturation in PhD Studies Using Qualitative Interviews. Qualitative Social Research, 11(3).
72. Nielson, J., & Laundauer, T. K. (1993). A mathematical model of finding usability problems. 93, pp. 206-213. InterCHI.
73. Guest, G., Bunce, A., & Johnson, L. (2006). How many interviews are enough? An experiment with Data Saturation and Variabilit y.
Field Methods, 18, 59-82.
74. KPMG. (2018). India's CSR Reporting Survey 2018. KPMG India.
75. CSR Box. (2018). India CSR Outlook Report 2018. Ahamadabad: CSR Box.
76. Anant Bhagwati, A. S., Sanghavi, D., & Srinivasan, S. (2018). India Philanthropy Report 2018. Bain & Company.
77. Ministry of Corporate Affaires. (2019, March 06). National CSR. Retrieved from National CSR: https://csr.gov.in
78. Sundar, P. (2018, August 21). Five Years After CSR Became Mandatory, What Has It Really Achieved? Retrieved January 2019, from
The Wire: https://thewire.in/business/five-years-after-csr-became-mandatory-what-has-it-really-achieved
79. Ilhan-Nas, T., Emrah, K., & Tarhan, O. (2015). The effects of the CSR isomorphism on both CSP and CFP. Journal of Asia Business
Studies, 9(3).
80. Napathorn, C. (2018). How do social enterprises recruit workers? The case of social enterprises in Thailand. Journal of Asia Business
Studies, 4(12).
81. Sooampon, S. (2018). The birth of social entrepreneurship within a Thai university Type. Journal of Asia Business Studies, 12(2).
82. Najul, L. (2018). Impact of corporate sustainability reporting on firm performance: an empirical examination in Asia Type. Journal of
Asia Business Studies, 12(4).
83. National CSR Portal. (2019, March 06). National CSR Portal. Retrieved from National CSR Portal: https://csr.gov.in/CSR/index.php
84. Business Standard. (2019, February 2). Business Standard News: Budget at a glance: Key numbers from Interim Budget 2019.
Retrieved from Business Standard News: https://www.business-standard.com/article/interim-budget-2019/budget-at-a-glance-key-
numbers-from-interim-budget-2019-119020101466_1.html
85. Dharmapala, D., & Khanna, V. (2018, December). The Impact of Mandated Corporate Social Responsibility: Evidence from India’s
Companies Act of 2013. International Review of Law and Economics, 56, 92-104.
86. The Business Line. (2018, March 02). The Hindu BusinessLine: Corporates, NGOs, govt need to partner for social impact through
CSR activities. Retrieved from The Hindu Business Line : https://www.thehindubusinessline.com/news/corporates-ngos-govt-need-to-
partner-for-social-impact-through-csr-activities/article22910842.ece
87. Maurer, R. (2014, December 17). SHRM: CSR Awareness in India Raised by Legal Mandate. Retrieved from SHRM Website:
https://www.shrm.org/resourcesandtools/hr-topics/global-hr/pages/csr-awareness-india.aspx
88. Choudhury, S. B. (2017, January 17). Project Guru: Knowledge Tank: Importance of environment in the CSR mandate of India .
Retrieved from Project Guru: https://www.projectguru.in/publications/importance-environment-csr-mandate-india/
89. Chaudhry, S. (2017, October 27). Live Mint: How companies are spending on CSR projects. Retrieved from Live Mint:
https://www.livemint.com/Companies/oyHdaJdn96pnmzdIFUIFNO/How-companies-are-spending-on-CSR-projects.html
90. National Institution for Transformation of India. (2016, October 03). NITI Aayog, (National Institution for Transforming India),
Government of India: An Overview of the Sustainable Development Goals . Retrieved from NITI Aayog, (National Institution for
Transforming India): https://niti.gov.in/content/overview-sustainable-development-goals
91. Live Mint. (2016, August 12). Live Mint: CSR panel strength: the more the merrier. Retrieved from Live Mint:
https://www.livemint.com/Companies/OHcuAlTOscV5rnzc7ldE8K/CSR-panel-strength-the-more-the-merrier.html
92. CRISIL . (2019). CRISIL Foundation: CSR Year Book 2019. Retrieved from CRISIL FOUNDATION:
https://www.crisil.com/content/dam/crisil/crisil-foundation/generic-pdf/rs-50000cr-the-crisil-csr-yearbook-2019-new.pdf
93. Dutta, A. (2013, August 17). Forbes India Blog: Corporate India and CSR . Retrieved from Forbes :
http://www.forbesindia.com/blog/beyond-the-numbers/corporate-india-and-csr/
94. Times of India. (2018). Water Campaign: Times of India. Retrieved from Times of India: http://waterpositive.timesofindia.com

Authors: Ivan Diryana Sudirman, Mulyani, Iston Dwija Utama

Paper Title: Predicting Click-Through Rates using Data Mining Technique on Digital Advertisements

448. Abstract: In times of increasingly busy use of social media, placing advertisements on social media such as
Facebook is an attractive alternative. With the various advantages of advertising on social media, making it very 2570-
suitable for MSMEs. The use of video as a format for delivering advertising messages is also rife because of the 2574
faster internet speed. However, the cost of making ads in the form of videos is relatively more expensive so it
needs a lot of consideration when making it be efficient. One thing that advertisers often pay attention to on
social media is the click-through rate. This variable becomes one of the measures of the effectiveness of an
advertisement. Hence predicting click-through rate is become important nowadays for advertisers, especially to
those who have budget constraints. This research tries to predict the click-through rate using data mining
techniques. This paper use CRISP method. The dataset was taken from a Facebook advertisement from a small-
medium enterprise in Indonesia. Video watches at 25%, 50%, 75%,95% and 100% is use as predictors. The
results show that data mining can be used to predict the click-through rate using video watches percentage. Deep
learning is the most suitable model for this prediction. The interpretation of the results from data mining is done
and managed to find the variables that support the predictions and contradict the predictions.

Keyword : data mining, advertising, click-through rate, social media, deep learning
References:
1. “Indonesia: social media penetration,” Statista. [Online]. Available: https://www.statista.com/statistics/284437/indonesia-social-
network-penetration/. [Accessed: 29-Oct-2019].
2. “Facebook users by country 2019,” Statista. [Online]. Available: https://www.statista.com/statistics/268136/top-15-countries-based-on-
number-of-facebook-users/. [Accessed: 29-Oct-2019].
3. Tikno, “Measuring performance of facebook advertising based on media used: a case study on online shops in indonesia,” Procedia
Comput. Sci., vol. 111, pp. 105–112, 2017.
4. “CTR (link click-through rate),” Facebook Ads Help Centre. [Online]. Available: https://en-
gb.facebook.com/business/help/877711998984611. [Accessed: 31-Oct-2019].
5. F. Wang, P. Zhang, Y. Shang, and Y. Shi, “The Application of Multiple Criteria Linear Programming in Advertisement Clicking
Events Prediction,” Procedia Comput. Sci., vol. 18, pp. 1720–1729, 2013.
6. M. Mahdian and K. Tomak, “Pay-Per-Action Model for On-line Advertising,” Int. J. Electron. Commer., vol. 13, no. 2, pp. 113–128,
Dec. 2008.
7. “Moran & Hunt, Search Engine Marketing, Inc.: Driving Search Traffic to Your Company’s Website, 3rd Edition | Pearson.” [Online].
Available: https://www.pearson.com/us/higher-education/program/Moran-Search-Engine-Marketing-Inc-Driving-Search-Traffic-to-
Your-Company-s-Website-3rd-Edition/PGM50706.html. [Accessed: 31-Oct-2019].
8. H. Li and H.-Y. Lo, “Do You Recognize Its Brand? The Effectiveness of Online In-Stream Video Advertisements,” J. Advert., vol. 44,
no. 3, pp. 208–218, Jul. 2015.
9. Z. Gao and Q. Gao, “Ad-centric Model Discovery for Prediciting Ads’s Click-through Rate,” Procedia Comput. Sci., vol. 19, pp. 155–
162, 2013.
10. M. Richardson, E. Dominowska, and R. Ragno, “Predicting Clicks: Estimating the Click-through Rate for New Ads,” in Proceedings
of the 16th International Conference on World Wide Web, New York, NY, USA, 2007, pp. 521–530.
11. C. Gauzente and Y. Roy, “Message content in keyword campaigns, click behavior, and price-consciousness: A study of millennial
consumers,” J. Retail. Consum. Serv., vol. 19, no. 1, pp. 78–87, Jan. 2012.
12. E. Van den Broeck, K. Poels, and M. Walrave, “An experimental study on the effect of ad placement, product involvement and mo tives
on Facebook ad avoidance,” Telemat. Inform., vol. 35, no. 2, pp. 470–479, May 2018.
13. Shearer, Colin, “The CRISP-DM Model: The New Blueprint for Data Mining,” J. Data Warehous., vol. 5, no. 4, pp. 13–22, 2000.
14. R.-C. Härting and A. Sprengel, “Cost-benefit considerations for Data Analytics - An SME-Oriented Framework enhanced by a
Management Perspective and the Process of Idea Generation,” Procedia Comput. Sci., vol. 159, pp. 1537–1546, 2019.
15. Aryanto, R and Mulyani, “Website User Interface of Marine Bio-Tourism Destination for Today Digital Environment,” Int. J. Innov.
Technol. Explor. Eng., vol. 8, no. 12, pp. 2064–2067, Oct. 2019.

Authors: Rohini Diofode, Jayesh Suryawanshi

Paper Title: Control of BLDC Motor using PV fed Bridgeless Single Switch SEPIC Converter
Abstract: Brushless DC (BLDC) motors are now widely used in many industrial and domestic applications
due to their significant advantages in terms of size, weight, torque and efficiency against any other type of
motor. Most of the domestic appliances including refrigerators, fans and washing machines use BLDC motors in
them. Moreover, photovoltaic (PV) inverters are being installed in more houses than ever which in-turn make
BLDC motors more suitable in home appliances and can be seen as imminent future. However, PV due to its
inherent nature is intermittent in its operation and requires an efficient DC-DC converter to control its output for
its smooth operation. This papers proposes a bridgeless single switch single ended primary inductance converter
(SEPIC) converter which serves as a better alternative to Buck-Boost and Cuk converter as it eliminates use of
diode bridge rectifier at front end and thus lowers the conduction loss. A closed loop speed control technique is
also introduced for control of BLDC motor to make it more practical for various applications and is verified
using MATLAB/Simulink and a hardware prototype using Arduino. Results obtained from software and
449. hardware prove the usefulness of the proposed scheme.
2575-
Keyword : BLDC Motor, MATLAB/Simulink, PV System, SEPIC Converter 2580
References:
1. M. R. M. Ebadpour, S. A. KH. Mozaffari Niapour, Arshya Feizi, R. Mousavi Aghdam, “A New Single Current Strategy for High
Performance Brushless DC Motor Drives”, International Conference on Electrical and Computer Engineering, IEEE CCECE 2011, pp
419 – 424.
2. Derek Liu, “Brushless DC Motors Made Easy,” Freescale, 2008.
3. Hossam-Eldin, A. & Refaey, Mostafa & Farghly, Abdelrahman, “A review on Photovoltaic Solar Energy Technology and its
Efficiency”, 2015.
4. Y. S. Jeon, H.S.Mok, G.H.Choe, D.K.Kim and J.S. Ryu, “A New Simulation Model of BLDC Motor with Real Back EMF
waveforms”, IEEE Conference On computers in Power Electronics (COMPEL), July 2000, pp. 217- 220.
5. Q. Li, H. Huang, B. Yin, “The study of PWM methods in permanent magnet brushless DC motor speed control system,” International
conference on Electrical Machines and Systems ICEMS 2008, Oct. 2008, pp. 3897-3900.
6. M. F. Rahman, K. S. Low, and K. W. Lim, “Approaches to the control of torque and current in a brushless DC drive,” in Interna tional
Conference on Electrical Machines and Drives, 1993, pp. 594-599.
7. C. Xia, Z. Li, T. Shi, “A control strategy for four-switch three-phase brushless DC motor using single current sensor,” IEEE Trans. In
Industrial Electronics, vol. 56, no. 6, June 2009, pp. 2058-2066.
8. ;“Sensorless BLDC Motor Control and BEMF Sampling Methods with ST7MC,” ST AN1946, July, 2007.
9. Padmaraja Yedamale, “Brushless DC (BLDC) Motor Fundamentals”, Microchip Technology Inc. 2003.
10. Domenico Arrigo, “L6234 Three Phase Motor Driver,” ST AN1088, 2001.
11. K. Dubey and M. T. Shah, “Design and simulation of Solar PV system”, International Conference on Automatic Control and Dynamic
Optimization Techniques, ICACDOT, Pune 2016, pp. 568-573.
12. Ankit Varshney and Abu Tariq, “Simulink Model of Solar Array for Photovoltaic Power Generation System”, International Journal of
Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 2 (2014), pp. 115-122.
13. D. Sera, R. Teodorescu, J. Hantschel and M. Knoll, “Optimized Maximum Power Point Tracker for Fast-Changing Environmental
Conditions”, in IEEE Transactions on Industrial Electronics, vol. 55, no. 7, July 2008, pp. 2629-2637.
14. Bhubaneswari Parida, S. Iniyan, Ranko Goic, “A review of solar photovoltaic technologies”, Renewable and Sustainable Energy
Reviews, Volume 15, Issue 3, 2011, Pages 1625-1636.
15. Mohamed A. Eltawil, Zhengming Zhao, “MPPT techniques for photovoltaic applications”, Renewable and Sustainable Energy
Reviews, Volume 25, 2013, pp. 793-813.
16. Y. Jang and M. M. Jovanovi, “Bridgeless High-Power-Factor Buck Converter,” IEEE Trans. Power Elect., vol.26, no.2, Feb. 2011,
pp.602-611.
17. Y. Jang and M. M. Jovanovic, “A Bridgeless PFC Boost Rectifier with Optimized Magnetic Utilization,” IEEE Trans. Power Electron.,
vol.24, no.1, Jan. 2009, pp. 85-93.
18. V. Bist and B. Singh, “An Adjustable Speed PFC Bridgeless Buck-Boost Converter Fed BLDC Motor Drive”, IEEE Tran. Ind.
Electron., vol.61, no.6, June 2014, pp.2665-2677.
19. V. Bist and B. Singh, “A Reduced Sensor PFC BL-Zeta Converter Based VSI Fed BLDC Motor Drive”, Electric Power System
Research, vol. 98, pp. 11–18, May 2013.
20. B. Singh, B. N. Singh, A. Chandra, K. Al-Haddad, A. Pandey, and D. P. Kothari, “A review of single –phase improved power quality
ac dc converters,” IEEE Trans. Ind. Electron., vol. 50, no. 5, Oct. 2003, pp. 962–981.
21. Vashist Bist, Bhim Singh, Ambrish Chandra, Kamal Al-Haddad, “An adjustable speed PFC SEPIC fed brushless DC motor drive,”
IEEE Energy Conversion Congress and Exposition (ECCE), Canada, 20-24 Sept. 2015, pp. 4886 - 4893.
22. E. H. Ismail, “Bridgeless SEPIC Rectifier with Unity Power Factor and Reduced Conduction Losses”, IEEE Trans. Ind. Electron.,
vol.56, no.4, April 2009, pp.1147-1157.
23. M. Mahdavi and H. Farzanehfard, “Bridgeless SEPIC PFC Rectifier with Reduced Components and Conduction Losses,” IEEE Trans .
Ind. Electron, vol.58, no.9, Sept. 2011.
24. A. A. Fardoun, E. H. Ismail, A. J. Sabzali, M. A. Al-Saffar, “New Efficient Bridgeless Cuk Rectifiers for PFC Applications,” IEEE
Trans. Power Electron., vol.27, no.7, pp.3292-3301, July 2012.
25. M. R. Sahid, A. H. M. Yatim and T. Taufik, “A new AC-DC converter using bridgeless SEPIC,” Proc. of 36th IEEE Annual Conf. of
Ind. Electron. Society (IECON), 7-10 Nov. 2010, pp.286-290.
26. J. W. Yang and H. L. Do, “Bridgeless SEPIC Converter with a Ripple-Free Input Current,” IEEE Trans. Power Elect., vol.28, no.7,
July 2013, pp. 3388-3394.
27. B. Singh and V. Bist, “Power Quality Improvement in PFC Bridgeless SEPIC Fed BLDC Motor Drive”, Int. Jr. Emer. Electr. Power
Sys. (IJEEPS), vol.14, no. 3, pp. 285–296, June 2013.
28. D. S. L. Simonetti, J. Sebastian and J. Uceda, “The discontinuous conduction mode SEPIC and Cuk power actor pre -regulators:
analysis and design,” IEEE Trans. Ind. Electron, vol. 44, no. 5, Oct. 1997, pp. 630-637.
29. C. Umayal, D.Saranya Devi, “Modeling and Simulation of PFC SEPIC Converter fed PMBLDC Drive for Mining Application,”
International Journal of Advanced Trends in Computer Science and Engineering, Vol.2, year: 2013, pp: 203- 208.
30. Shiny K George, Tintu Rani Joy, “An Adjustable-Speed PFC Bridgeless Single Switch SEPIC Converter-Fed BLDC Motor,”
International Journal of Engineering Technology, Management and Applied Sciences, year: August 2015, Volume 3, pp: 2349 -4476.
31. Anju Rajan P, Divya Subramanian, “Analysis of a Sensor Based BLDC Motor with SEPIC Converter for PFC and Speed Control,”
International Journal of Science, Engineering and Technology Research (IJSETR), Volume 4, year: October 2015
32. R. Carlson, M. Lajoie -Mazenc, and C.D.S. Fagundes, “Analysis of torque ripple due to phase commutation in brushless DC
machines,” IEEE Trans. On Industry Applications 28, pp: 632–638, year: 1992.
33. M. Mahdavi and H. Farzanehfard, “Bridgeless SEPIC PFC rectifier with reduced components and conduction losses,” IEEE Trans. Ind.
Electron., vol. 58, no. 9, Sep. 2011, pp. 4153–4160.
34. A. Barkley, D.Michaud, E.Santi, A. Monti and D. Patterson , “Single stage brushless DC motor drive with high input power factor for
single phase applications”, IEEE trans on Power Electronics Specialists Conference, PESC, 2006, pp.1-10.

Authors: Shikha Chadha , Sonu Mittal ,Vivek Singhal

Paper Title: An Insight of Script Text Extraction Performance using Machine Learning Techniques
Abstract: With the evolution of huge amount of ancient and modern text available in digital format, it is
ascertain to mine for researchers, government, tourist and travelers visiting all over the world. However, it is
very challenging and costly. Further, it takes a lot of effort and time for script text mining. Therefore, the study
investigates various techniques for script text mining viz supervised and unsupervised techniques. Firstly, the
study presents a survey for various kinds of techniques adopted by the users for extraction of text from image. It
also delivers information about gaps involved in the various approaches. Furthermore, it incorporate the
quantitative comparisons based among the study of various approaches and techniques for text extraction as well
as script level comparison. The result inferred on the basis of the script comparison indicates that, the accuracy
level of ancient script was found to be 5% lesser than modern script. Again, furthermore comparison has been
450. done on standalone and hybrid machine (Combination of CNN and KNN) / deep learning techniques. The
accuracy has been found to be lower(4%) in case of standalone techniques. 2581-
2588
Keyword : Text Mining, Machine Learning, Deep Learning, Script, Image scene extraction, Convolutional
Neural Network, K-Nearest Neighbors.
References:
1. A. A. Shah and K. Rana, “A Review on Supervised Machine Learning Text Categorization Approaches,” 2018 Int. Conf. Circuits Sy st.
Digit.Enterp. Technol., pp. 1–6, 2019.
2. A. Ray, S. Rajeswar, and S. Chaudhury, “Text recognition using deep BLSTM networks,” ICAPR 2015 - 2015 8th Int. Conf. Adv.
Pattern Recognit., 2015.
3. Ȧ P. U., Ȧ U. C. J., and Ȧ K. A., “TranSish : Translator from Sanskrit toEnglish-A Rule based Machine Translation,” vol. 4, no. 5, pp.
3463–3466, 2014.
4. A. S. Kavitha, P. Shivakumara, G. H. Kumar, and T. Lu, “Text segmentation in degraded historical document images,” Egypt.
Informatics J., vol. 17, no. 2, pp. 189–197, 2016.
5. B. Trstenjak, S. Mikac, and D. Donko, “KNN with TF-IDF based framework for text categorization,” Procedia Eng., vol. 69, pp. 1356–
1364, 2014.
6. B. Su and S. Lu, “Accurate recognition of words in scenes without character segmentation using recurrent neural network,” Pattern
Recognit., vol. 63, no. June 2016, pp. 397–405, 2017.
7. B. Su, S. Lu, and C. L. Tan, “Robust document image binarization technique for degraded document images,” IEEE Trans. Image
Process., vol. 22, no. 4, pp. 1408–1417, 2013.
8. C. L. Cameras, O. Enqvist, and F. Kahl, “An End-to-End Trainable Neural Network for Image-Based Sequence Recognition and Its
Application to Scene Text Recognition,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 39, no. 7, pp. 1455–1461, 2017.
9. C. Wick and F. Puppe, “Fully convolutional neural networks for page segmentation of historical document images,” Proc. - 13th IAPR
Int. Work. Doc. Anal. Syst. DAS 2018, pp. 287–292, 2018
10. D. Sen Maitra, U. Bhattacharya, and S. K. Parui, “CNN based common approach to handwritten character recognition of multiple
scripts,” Proc. Int. Conf. Doc. Anal. Recognition, ICDAR, vol. 2015-Novem, pp. 1021–1025, 2015.
11. D . M. E. D. M. Hussein, “A survey on sentiment analysis challenges,” J. King Saud Univ. - Eng. Sci., vol. 30, no. 4, pp. 330–338,
2018.
12. D. Valy, M. Verleysen, and K. Sok, “Line segmentation approach for ancient palm leaf manuscripts using competitive learning
algorithm,” Proc. Int. Conf. Front. Handwrit. Recognition, ICFHR, pp. 108–113, 2017.
13. F. Patel and N. Soni, “Text mining: A Brief survey,” Int. J. Adv. Comput. Res., vol. 2, no. 4, pp. 243–248, 2012.
14. G. Katiyar and S. Mehfuz, “MLPNN based handwritten character recognition using combined feature extraction,” Int. Conf. Compu t.
Commun. Autom. ICCCA 2015, pp. 1155–1159, 2015.
15. Joan Pastor-Pellicer, Muhammad Zeshan Afzal, Marcus Liwicki‡ & Mar´ıa Jose Castro-Bleda “Complete Text Line Extraction with
Convolutional Neural Networks and Watershed Transform”, p.p 30-35, 2016.
16. J. Richarz, S. Vajda, R. Grzeszick, and G. A. Fink, “Semi-supervised learning for character recognition in historical archive
documents,” Pattern Recognit., vol. 47, no. 3, pp. 1011–1020, 2014.
17. I. J. Kim and X. Xie, “Handwritten Hangul recognition using deep convolutional neural networks,” Int. J. Doc. Anal. Recognit. , vol.
18, no. 1, pp. 1–13, 2014.
18. K. U. Sharma and A. A. Ugwekar, “English transcription of sanskrit characters using predefined templates,” Proc. 2017 2nd IEEE Int.
Conf. Electr. Comput. Commun. Technol. ICECCT 2017, pp. 0–3, 2017.
19. K. Chen, M. Seuret, M. Liwicki, J. Hennebert, and R. Ingold, “Page segmentation of historical document images with convolutional
autoencoders,” Proc. Int. Conf. Doc. Anal. Recognition, ICDAR, vol. 2015-Novem, pp. 1011–1015, 2015.
20. K. Indhuja, M. Indu, C. Sreejith, and P. C. R. Raj, “Text Based Language Identification System for Indian Languages Following
Devanagiri Script,” vol. 3, no. 4, pp. 327–331, 2014.
21. M. Morita, R. Sabourin, F. Bortolozzi, and C. Y. Suen, “Unsupervised feature selection using multi-objective genetic algorithms for
handwritten word recognition,” Proc. Int. Conf. Doc. Anal. Recognition, ICDAR, vol. 2003-Janua, pp. 666–670, 2003.
22. M. W. A. Kesiman, J. C. Burie, and J. M. Ogier, “A new scheme for text line and character segmentation from gray scale images of
palm leaf manuscript,” Proc. Int. Conf. Front. Handwrit. Recognition, ICFHR, pp. 325–330, 2017.
23. M. Avadesh and N. Goyal, “Optical character recognition for sanskrit using convolution neural networks,” Proc. - 13th IAPR Int.
Work. Doc. Anal. Syst. DAS 2018, pp. 447–452, 2018.
24. M. Yousefi-Azar and L. Hamey, “Text summarization using unsupervised deep learning,” Expert Syst. Appl., vol. 68, pp. 93–105,
2017
25. N. Kindo, G. Bhuyan, and R. Padhy, Computing and Network Sustainability, vol. 75. Springer Singapore, 2019.
26. N. Sridevi and P. Subashini, “Combining Zernike moments with regional features for classification of handwritten ancient tamil scripts
using extreme learning machine,” 2013 IEEE Int. Conf. Emerg. Trends Comput. Commun. Nanotechnology, ICE-CCN 2013, no.
Iceccn, pp. 158–162, 2013.
27. N. Shafiabady, L. H. Lee, R. Rajkumar, V. P. Kallimani, N. A. Akram, and D. Isa, “Using unsupervised clustering approach to train the
Support Vector Machine for text classification,” Neurocomputing, vol. 211, pp. 4–10, 2016.
28. N. S. Panyam, V. L. Vijaya, R. K. Krishnan, and K. R. Koteswara, “Modeling of palm leaf character recognition system using
transform based techniques,” Pattern Recognit. Lett., vol. 84, pp. 29–34, 2016.
29. P. Mittal, V. Singhal, and P. S. S. Jain, “ICT Enabled Vehicular Safe Distance Modeling at Indian Unmanned Railway Level
Crossings,” SSRN Electron. J., 2019.
30. R. Kumar, P. Kumar, and V. Singhal, “A Survey: Review of Cloud IoT Security Techniques, Issues, and Challenges,” SSRN Electro n.
J., 2019.
31. S. Daggumati and P. Z. Revesz, “Data mining ancient script image data using convolutional neural networks,” ACM Int. Conf.
Proceeding Ser., pp. 267–272, 2018.
32. S. Gopal and S. Raghav, “Automatic document retrieval using SVM machine learning,” Proc. 2017 Int. Conf. Smart Technol. Smart
Nation, SmartTechCon 2017, pp. 896–901, 2018.
33. S. Lu, T. Chen, S. Tian, J. H. Lim, and C. L. Tan, “Scene text extraction based on edges and support vector regression,” Int. J. Doc .
Anal. Recognit., vol. 18, no. 2, pp. 125–135, 2015.
34. S. Mirza, “Design and Implementation of Predictive Model for Prognosis of Diabetes Using Data Mining Techniques,” Int. J. Adv. Res.
Comput. Sci., vol. 9, no. 2, pp. 393–398, 2018.
35. S. Sudholt and G. A. Fink, “PHOCNet: A deep convolutional neural network for word spotting in handwritten d ocuments,” Proc. Int.
Conf. Front. Handwrit. Recognition, ICFHR, pp. 277–282, 2017.
36. S. Zhu and R. Zanibbi, “A text detection system for natural scenes with convolutional feature learning and cascaded classific ation,”
Proc. IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit., vol. 2016-Decem, pp. 625–632, 2016.
37. V. Singhal, S. S. Jain, and M. Parida, “Train sound level detection system at unmanned railway level crossings,” Eur. Transp. - Trasp.
Eur., no. 68, 2018.
38. V. Singhal and S. Jain, “Safety Information System of Indian Unmanned Railway Level Crossings,” IOSR J. Mech. Civ. Eng. Ver. III,
vol. 12, no. 4, pp. 2278–1684, 2015.
39. V. Bijalwan, V. Kumar, P. Kumari, and J. Pascual, “KNN based machine learning approach for text and document mining,” Int. J.
Database Theory Appl., vol. 7, no. 1, pp. 61–70, 2014.
40. V. Singhal and S. S. Jain, “Road driver behaviour evaluation at unmanned railway level crossings,” Eur. Transp. - Trasp. Eur., 2017.
41. W. Huang, Y. Qiao, and X. Tang, “Robust scene text detection with convolution neural network induced MSER trees,” Lect. Notes
Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 8692 LNCS, no. PART 4, pp. 497 –511,
2014.
42. X. C. Yin, W. Y. Pei, J. Zhang, and H. W. Hao, “Multi-Orientation Scene Text Detection with Adaptive Clustering,” IEEE Trans.
Pattern Anal. Mach. Intell., vol. 37, no. 9, pp. 1930–1937, 2015.
43. X. Zhang, L. Duan, L. Ma, and J. Wu, “Text extraction for historical tibetan document images based on connected component ana lysis
and corner point detection,” Commun. Comput. Inf. Sci., vol. 772, pp. 545–555, 2017.
44. Z. Lei, S. Zhao, H. Song, and J. Shen, “Scene text recognition using residual convolutional recurrent neural network,” Mach. Vis.
Appl., vol. 29, no. 5, pp. 861–871, 2018.

Authors: Rashmi R, Manju Devi


451.
Paper Title: Evolution of Wireless Communication along with Encoders
Abstract: Now a days technology drastically increasing, leads to increase in communication also. Internet
of Things (IOT) is very basic fundamental necessary to the consumers in this decade, which requires a
communication path mainly from end to end. By understanding this technology growth, took as motivation and
started a survey for turbo decoder architecture in Long Term Evolution (LTE) and 3GPP-LTE communication.
Different generation technologies adopt different kinds of encoder as well as decoder to encrypt the data which
can be sent from source devices to destination devices, which consists parameters like data rate, frequency used
to transmit and speed of transitioning i.e., encoding and decoding the data at the transmitter as well as receiver.
This paper represents a survey on different architectures of turbo decoder in LTE communication which can give
a brief idea about the communication and also the usage of turbo encoder in various applications. Initially we
look back a history and development of a communication system till LTE. Later we discuss the different
technologies and topologies on turbo decoder along with its architecture, advantage and disadvantage.

Keyword : IOT, LTE, Turbo Encoder, Communication, Encoding and Decoding


References:
1. Martın I. del Barco, Gabriel N. Maggio, Damian A. Morero, et. al., “FPGA Implementation of High-Speed Parallel Maximum A
Posteriori (MAP) Decoders”, pp no., 98-102, ISBN 978-9-8725-1029-9, IEEE Catalog number CFP0954E.
2. Ji-Hoon Kim, In-Cheol Park,” A Unified Parallel Radix-4 Turbo Decoder for Mobile WiMAX and 3GPP-LTE”, pp no., 487-490 , 978-
1-4244-4072-6/09/$25.00 ©2009 IEEE
3. Ardimas Andi Purwita, Arnaud Setio, Trio Adiono, “Optimized 8-Level Turbo Encoder Algorithm and VLSI Architecture for LTE”,
International Conference on Electrical Engineering and Informatics, Bandung, Indonesia, 17-19 July 2011, 978-1-4577-0752-
0/11/$26.00 ©2011 IEEE
4. Jing Li, Ruiyuan Zhu1, Ting Yi, Bill Liu, Zhiliang Hong,” An Energy-Efficient 5-MHz to 20-MHz, 12-bit Reconfigurable Continuous- 2589-
Time ΣΔ Modulator for 4G-LTE Application”, 978-1-4799-1235-3/13/$31.00 ©2013 IEEE
5. Andrea Dario Giancarlo Biroli, Juan Chi Wang,” A FAST ARCHITECTURE FOR FINDING MAXIMUM (OR MINIMUM) 2593
VALUES IN A SET”, IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP), 2014
6. Berrou, A. Glavieux and P. Thitimajshima, "Near Shannon Limit ErrorCorrecting Coding and Decoding: Turbo -Codes," Proceedings
of International Conference on Communication, pp. 1064-1070, 1993.
7. 3rd Generation Partnership Project; Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio
Access (E-UTRA)," Multiplexing and Channel Coding (Release 9) 3GPP Organizational Partners TS 36.212, Rev. 8.3.0, May 2008.
8. 3rd Generation Partnership Project; Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio
Access (E-UTRA)," Multiplexing and Channel Coding (Release 10) 3GPP Organizational Partners TS 36.212, Rev. 10.0.0, 2011.
9. C-C. Wong and H-C. Chang, High-Efficiency Processing Schedule for Parallel Turbo Decoders Using QPP Interleaver," IEEE
Transactions on Circuits and Systems I: Regular Papers, vol. 58, no. 6, pp. 1412-1420, June-2011.
10. C. Lin, C. Chen, E. Chang and A. Wu, \Recon¯gurable Parallel Turbo Decoder Design for Multiple High-Mobility 4G Systems,"
Journals of Signal Processing Systems (Springer US), pp. 1-14, 2013.
11. Y. Sun and J. R. Cavallaro, \E±cient Hardware Implementation of a Highly-Parallel 3GPP LTE/LTE-Advance Turbo Decoder,"
INTEGRATION, the VLSI Journal, vol. 44, pp. 305-315, 2011.
12. S. Belfanti, C. Roth, M. Gautschi, C. Benkeser and Q. Huang, \A 1Gbps LTEAdvanced Turbo-Decoder ASIC in 65nm CMOS," IEEE
Symposium on VLSI Circuits (VLSIC), pp. C284-C285, 2013.
13. T. Ilnseher, F. Kienle, C. Weis and N. Wehn, \A 2.15 GBit/s Turbo Code Decoder for LTE Advanced Base Station Applications,"
International Symposium on Turbo Codes and Iterative Information Processing (ISTC), pp. 21-25, 2012.
14. D. Talbot, A Banner Year for Mobile Devices," MIT Technology Review, COMMUNICATION NEWS, December-2012.
15. Anghel, Cristian, Cristian Stanciu, and Constantin Paleologu. "Sorting methods used in parallel turbo decoding for LTE system s." In
Signals, Circuits and Systems (ISSCS), 2015 International Symposium on, pp. 1-4. IEEE, 2015.
16. Mishra, Shivshankar, Harshit Shukla, and Suneel Madhekar. "Implementation of Turbo decoder using MAX-LOGMAP algorithm in
VHDL." In 2015 Annual IEEE India Conference (INDICON), pp. 1-6. IEEE, 2015.
17. Bahirgonde, Prabhavati D., and Shantanu K. Dixit. "Low complexity modified constant Log-Map algorithm for radix-4 turbo decoder."
In Pervasive Computing (ICPC), 2015 International Conference on, pp. 1-4. IEEE, 2015.
18. Shrestha, Rahul, and Roy Paily. "Hardware Implementation and Testing of Log-MAPP Decoder Based on Novel Un-Grouped Sliding-
Window Technique." In Electronic System Design (ISED), 2014 Fifth International Symposium on, pp. 171-175. IEEE, 2014.

Authors: Md. Jueal Mia, Al Amin Biswas, Abdus Sattar, Md. Tarek Habib
Registration Status Prediction of Students using Machine Learning in the Context of Private
Paper Title:
University of Bangladesh
Abstract: Bangladesh is a densely populated country where a large portion of citizens is living under poverty.
In Bangladesh, a significant portion of higher education is accomplished at private universities. In this twenty-first
century, these students of higher education are highly mobile and different from earlier generations. Thus, retaining
existing students has become a great challenge for many private universities in Bangladesh. Early prediction of the
total number of registered students in a semester can help in this regard. This can have a direct impact on a private
university in terms of budget, marketing strategy, and sustainability. In this paper, we have predicted the number of
registered students in a semester in the context of a private university by following several machine learning
approaches. We have applied seven prominent classifiers, namely SVM, Naive Bayes, Logistic, JRip, J48, Multilayer
452. Perceptron, and Random Forest on a data set of more than a thousand students of a private university in Bangladesh,
where each record contains five attributes. First, all data are preprocessed. Then preprocessed data are separated
into the training and testing set. Then, all these classifiers are trained and tested. Since a suitable classifier is 2594-
required to solve the problem, the performances of all seven classifiers need to be thoroughly assessed. So, we have 2600
computed six performance metrics, i.e. accuracy, sensitivity, specificity, precision, false positive rate (FPR) and false
negative rate (FNR) for each of the seven classifiers and compare them. We have found that SVM outperforms all
other classifiers achieving 85.76% accuracy, whereas Random Forest achieved the lowest accuracy which is 79.65%.

Keyword : Private University, Machine Learning, Registration Status, Prominent Classifier, Performance Evaluation
Metrics.

References:
1. "Private University," Available online: http://www.ugc-universities.gov.bd/home/university/private/75 [Last Accessed 01 October
2019]
2. "Public University," Available online: http://www.ugc-universities.gov.bd/home/university/public/120 [Last Accessed 01 October
2019]
3. E. Yukselturk, S. Ozekes, and Y. K. Türel, "Predicting dropout student: an application of data mining methods in an online education
program," European Journal of Open, Distance and e-learning, vol. 17, no. 1, pp. 118-133, 2014.
4. M. Tan and P. Shao, "Prediction of student dropout in e-learning program through the use of machine learning method," International
Journal of Emerging Technologies in Learning (iJET), vol. 10, no. 1, pp. 11-17, 2015.
5. J. Liang, C. Li, and L. Zheng, "Machine learning application in MOOCs: Dropout prediction," In 2016 11th Intern ational Conference
on Computer Science & Education (ICCSE), pp. 52-57. IEEE, 2016.
6. D. Mulyani, "Prediction of new student numbers using least square method," International Journal of Advanced Research in Artificial
Intelligence, vol. 4, no. 11, pp. 30-35, 2015.
7. A. Slim, D. Hush, T. Ojah, and T. Babbitt, "Predicting student enrollment based on student and college characteristics," Proceedings of
the 11th International Conference on Educational Data Mining, 2018.
8. J. Abelt et al. , "Predicting likelihood of enrollment among applicants to the UVa undergraduate program," In 2015 Systems and
Information Engineering Design Symposium, pp. 194-199, IEEE, 2015.
9. A. A. Biswas, A. Majumder, M. J. Mia, I. Nowrin, and N. A. Ritu, "Predicting the Enrollment and Dropout of Students in the Post-
Graduation Degree using Machine Learning Classifier," International Journal of Innovative Technology and Exploring Engineerin g
(IJITEE), vol. 8 no. 11, pp. 3083-3088, September 2019.
10. C. Burgos, "Data mining for modeling students’ performance: A tutoring action plan to prevent academic dropout," Computers &
Electrical Engineering, vol. 66, pp. 541-556, February 2018.
11. P. A. Willging and S. D. Johnson, "Factors that influence students' decision to dropout of online courses," Journal of Asynchronous
Learning Networks, vol. 13, no. 3, pp. 115-127, 2009.
12. S. K. Wanjau and G. M. Muketha, "Improving student enrollment prediction using ensemble classifiers," International Journal of
Computer Applications Technology and Research, vol. 07, no. 03, pp. 122-128, 2018.
13. M. Lestari, A Darmawan, N. W. P. Septiani, and A. Trihapsari, "Non-written enrolment system using classification methods," In
Journal of Physics: Conference Series, vol. 1175, no. 1, p. 012055, IOP Publishing, 2019.
14. B. Pérez, C. Castellanos, and D. Correal, "Predicting student drop-out rates using data mining techniques: A case study," In IEEE
Colombian Conference on Applications in Computational Intelligence, pp. 111-125, Springer, 2018.
15. M. Koutina and K. L. Kermanidis, "Predicting postgraduate students’ performance using machine learning techniques," Artificial
Intelligence Applications and Innovations, Springer, Berlin, Heidelberg, pp. 159-168, 2011.
16. L. Aulck, N. Velagapudi, J. Blumenstock, and J. West, "Predicting student dropout in higher education," arXiv preprint
arXiv:1606.06364, 2016.
17. F. Mi and D. Yeung, "Temporal models for predicting student dropout in massive open online courses," In 2015 IEEE International
Conference on Data Mining Workshop (ICDMW), pp. 256-263, IEEE, 2015.
18. S. S. Aksenova, D. Zhang, and M. Lu, "Enrollment prediction through data mining," In 2006 IEEE International Conference on
Information Reuse & Integration, pp. 510-515, IEEE, 2006.
19. J. Han, M. Kamber, and J. Pei, "Data Mining Concepts and Techniques," Elsevier, 2012.
20. "Confusion Matrix," Available online: https://www.analyticsvidhya.com/blog/2019/08/11-important-model-evaluation-error-metrics/
[Last Accessed 01 October 2019]
21. "Confusion Matrix," Available online: https://en.wikipedia.org/wiki/Confusion_matrix [Last Accessed 01 October 2019]
Mohamad Syafiq Bin Che Musa, Mohd Faizal Mat Tahir, Mohd Rasidi Mohd Rasani,
Authors:
Meor Iqram Meor Ahmad
Paper Title: Determination of Natural Frequency and Mode Shape for Hollow Thin Plates
Abstract: The determination of natural frequency and the mode shape of structures are important in
characterizing the properties or behavior of the structures. The existing hollow in solid thin plate will change the
vibration behavior in term of resonance frequency and mode behavior. A lot of structure consists of hollow
space such as inner panel of car hood and bonnet. However, simplifying the model from hollow structure with
solid thin plates only will resulting some difference in their vibration performance. This study begins with
conducting modal analysis experiment using solid thin plate under free-free boundary condition. Next, the finite
element methods were performing to compare with the experimental results. The average error of 3.96% was
obtain when compared which provide a good confident level with the simulation result. Next, the study
continued by finding the natural frequency and the mode shape for the thin plate under various position of hole,
number of holes and shape of hole by using FEM software. Finally, finite element was also being carried out on
the simplified design model of the inner panel car hood based from the real product and compared the resonance
frequency from the model with some vibration reference sources. Through this study, it is found that the
diversity of the hole position, the increasing number of holes and the change of the hole shape play a role in
changing the natural frequencies of a thin plate. Since there is a lot of hollow thin plates in the car part,
453. designing every parts are important to make sure the NVH quality is improve and not opposite of it.
2601-
2606
Keyword : natural frequency, mode shape, Modal Analysis, finite element method
References:
1. N.V.Divya & Rizman, S. 2016. Analysis of plates by using ansys. International Journal of Innovative Research in
Science,Engineering and Technology 5(12): 21211-21255.
2. Sadananda, N. 2016. Experimental study of low-mid frequency interior noise of an suv. Master’s thesis in the Master’s programme
in Sound and Vibration, Department of Applied Mechanics
3. Wellmann, T., Govindswamy, K., Braun, E. & Wolff, K. 2007. Aspects of driveline integration for optimized vehicle NVH
characteristics. SAE Technical Paper.
4. Zhang, J., Shen, G., Du, Y. & Hu, P. 2013. Modal analysis of a lightweight engine hood design considering stamping effects.
Applied Mechanics and Materials 281(2013): 364-369.
5. NC Hao, A As'arry, KAM Rezali, MZ Nuawi, 2018, Journal of Mechanical Engineering, Effect of Disc Brake Squeal with Respect to
Thickness Variation: Experimental Modal Analysis, Journal of Mechanical Engineering, Special Issue, (6) ;33-44.
6. NA Ngatiman, MZ Nuawi, S Abdullah, 2018, Z-Freq: Signal Analysis-Based Gasoline Engine Monitoring Technique using Piezo-Film
Sensor, International Journal of Mechanical Engineering and Technology, 9(5);897-910
7. MFM Tahir, MZ Nuawi, R Zulkifli, S Abdullah, MAM Sabri, 2012, Study on correlation of sound absorption coefficient for
automotive noise absorption panel material by using sabine method and Z -octave method, International Review of Mechanical
Engineering, 6 (3) ;640-643.
8. Nesaragi, V. V., Maruthi, B. H., Chandru , B. T. & Kumar, D. 2014. Design and noise, vibration, harshness analysis of engine
bonnet of the car. International Journal of Engineering Research and Applications 4(7): 05-11.
9. Owunna Ikechukwu, Ikpe Aniekan, Satope Pau & Ikpe, E. 2016. Experimental modal analysis of a flat plate subjected to vibr ation.
American Journal of Engineering Research 5(6): 30-37.
10. M.F. Mat Tahir, Stephen J. Walsh, Daniel J. O`Boy. (2015). Evaluation of The Digital Image Correlation Method for The
Measurement of Vibration Mode Shapes. - The 44th International Congress and Exposition On Noise Control Engineering Inter-Noise
2015.
11. Mohd Hilton Ahmad. 2008. Analisis Struktur Menggunakan Kaedah Unsur Terhingga. Seminar Kebangsaan Matematik &
Masyarakat 2008, hlm. 118-126.
12. František Klimenda*, Josef Soukup, 2017, Modal analysis of thin aluminium plate, XXI International Polish–Slovak Conference
"Machine Modeling and Simulations 16, Procedia Engineering 177(2017)11– 16.
13. Mohd Irman Ramli, Mohd Zaki Nuawi, Shahrum Abdullah, Mohammad Rasidi Mohammad Rasani, Hambali Boejang, Mohd Farriz
Basar, Kho Ko Seng, 2018, Comparison study on light structure modal parameter using experimental modal analysis method via
PIEZOFILM sensor, Jurnal Teknologi, 80-3.
14. Puranik, K. A., Tharewal, S. R. & Mhetre, M. S. 2017. Eigen Frequency Vibration Analysis for Thin Plate. International Journal of
Engineering Science & Research Technology 6(3): 253-257.
15. Steven Ashley, Lightweight carbon-fiber and SMC body panels under development, Technology Report, MOBILITY
ENGINEERING, AUTOMOTIVE, AEROSPACE, OFF-HIGHWAY, December 2013.
16. Sadananda, N. 2016. Experimental study of low-mid frequency interior noise of an SUV. Master’s thesis in the Master’s programme
in Sound and Vibration, Department of Applied Mechanics Division of Vehicle Engineering Autonomous Systems, Gothenburg,
Sweden. R Samin,

Authors: Оlena Rosinska, Oksana Zhuravska, Natalia Zykun, Vitaliy Gandziuk

Paper Title: Stereotyped Media Images as a Method of Forming Delusions of Ordinary Consciousness
Abstract: The article reveals the psychological foundations of the manipulative influence of the media on
the ordinary consciousness of the information consumer, analyzes the methods of manipulative influence. The
survey of respondents has determined the activity rate of information consumption, the level of interest in
various media formats, the respondent’s degree of awareness of the specificity regarding influence on their
consciousness.
Methods of media influence on ordinary consciousness include various types of fragmentation of information,
game by facts and figures, logic violations, semantics (use of metaphors, emotionally evaluated vocabulary,
language of symbols, archetypes, antitheses) of stereotypical images for attaching certain connotative
stereotypes to the consciousness in order to strengthen influence, and others. Consequently, the technologies of
influence determine the need for psychosemantic analysis to study stereotypical, mythological and archetypal
images of ordinary consciousness. The research demonstrates the relevance of the psychosemantic approach to
the study of ordinary consciousness in the modern information society, the impact of crisis processes in the
society development on the changes in certain levels of ordinary consciousness and the main tendencies of its
transformation; as well as the empirical research of the formation of the ordinary consciousness by mass media
has been demonstrated.
454.
Keyword : ordinary consciousness, mass media, manipulation, stereotype, technology. 2607-
2612
References:
1. Freeman M., Brockmeier J. “Narrative Integrity: Autobiographical Identity and the Meaning of the «Good life»”. In J. Brockme ier, D.
Carbaugh, “Narrative and Identity: Studies in Autobiography, Self and Culture,” Amsterdam; Philadelphia, 2001, pp. 75-100.
2. Kara-Murza S.G. “Manipulations by consciousness. Century XXI,” Moscow:Algoritm, 2015. (Russian)
3. Lippman, U. “Obshchestvennoe mnenie” [Public Opinion]. Moscow.: Instiut fonda “Obshchestvennoe mnenie” [Public Opinion], 2004.
(Russian)
4. McLuhan M. “Understanding me. Lectures and interviews,” Cambridge: MA: Mit press, 2003.
5. Popova V.O., & Balezina E.A. “Rol' sredstv massovoy informatsii v formirovanii stereotipov massovogo soznaniya” [The Role of
Mass Media in Formation of Mass Media Stereotypes]. Filosofiya. Psikhologiya. Sotsiologiya [Philosophy. Psychology.Sociology], no.
2, pp. 88-94, 2015. (Russian)
6. Sladkova O.B. Manipulirovanie obshchestvennym soznaniem v informatsionnom obshchestve [Manipulation of public consciousness
in the information society]. Observatoriya kul'tury [Observatory of culture], no. 6, pp. 4-12, 2006. [Online]. Available:
http://ifapcom.ru/files/Monitoring/sladkova_manipul_obsch_sozn.pdf (accessed 25 October 2019). ( Russian)
7. Tkachenko O. Ukrajina na mentaljnij mapi centaljno-skhidnoji Jevropy poshuky identychnosti [Ukraine on Mental Map of Central
Eastern Europe. Searching for Identity]. Visnyk Ljvivsjkogho universytetu [Bulletin of the University of Lviv], no. 35, pp. 277-287,
2011. [Online]. Available: http://journ.lnu.edu.ua/publications/visnyk35/Visnyk35_P3_09_Tkachenko.pdf (accessed 10 October
2019). ( Russian)
8. Čyževsʹka M. “Čy budutʹ u Lʹovi «Donbasʹki ghetto»” [Will there be “Donbas ghettoes” in Lviv]. Vgolos [Aloud], 30.01.2017.
[Online]. Available: https://vgolos.com.ua/articles/chy-budut-u-lvovi-donbaski-getto_248303.html (accessed 02 February 2019).
(Ukrainian)

Authors: T K Thivakaran, K G Mohan

Paper Title: Multimedia Signal Processing in Cloud using Content Based Copy Detection
Abstract: Nowadays making multimedia and multimedia altering has gotten simple because of effectively
accessible handling instruments. Progressively over facilitating sites are unreservedly accessible. So clearly we
455. experience circumstances wherein numerous recordings and pictures that are copyrighted are getting copied
effectively. Such duplication isn't just unlawful yet in addition it makes an enormous misfortune unique content
2613-
holder. On the off chance that at all we attempt to distinguish such copied content, process gets extremely mind
2615
boggling in light of enormous sizes and huge amount of multimedia documents present on web. So this
procedure gets perplexing and computationally costly. Content based multimedia copy detection gives a
powerful and improved instrument which can distinguish coordinating rate among tremendous multimedia
duplicates from the content itself without having any reliance on any product. In the system of content based
copy detection, marks are made from content itself before transferring on cloud like Picasa. In the proposed
framework at whatever point new Multimedia article is transferred on the cloud initially its mark is made and on
the off chance that the mark matches with put away database signature, at that point this will trap the site which
copies copyrighted copy with no rights.

Keyword : Cloud Computing, Multimedia, Content Based Copy Detection and Cryptosteganography.
References:
1. Vaishali Dewar, Priya Pise, “Content Based Multimedia Copy Protection System for the Cloud”, International Journal of Innovative
Research in Computer and Communication Engineering, Vol. 4, Issue 10, October 2016, pp.17203-17211.
2. H Mohamed , Tarek ElGamal, C Kiana A Ahmed, "Cloud-based Multimedia Content Protection System". IEEE, 1520-9210,
2015.
3. L Hong, L Hong, XiangyangXue,"A Segmentation and Graph-Based Video Sequence Matching Method for Video Copy Detection".
IEEE, 2250-1706, Volume 25, No. 8, August 2013.
4. G Vishwa, D Parisa, Langis Gagnon, B Gilles, "Content-Based Video Copy Detection using Nearest- Neighbor Mapping". 4673-
0382, Vol.1 (6), 2013.
5. Mani MalekEsmaeili, F Mehrdad, K W Rabab,"A Robust and Fast Video Copy Detection System Using Content-Based Finger
printing". Vol. 6, No. 1, March 2011.

Authors: S Balaji, S Saravanakumar

Paper Title: Accomplishment of New Protocol for Stupendous Security in Cloud Environment
Abstract: Cloud is that the rising and thirst area of analysis and advantageous in all the fields. However
security is the main disquiet for not espouse cloud for each application. Mainly of the security crisis are
connected by authentication with data protection by the respect to cloud security alliance (CSA). The projected
New (Biometric encoding and Biometric authentication) protocol can conquer every safety crisis in cloud
adjacent. In NEW protocol biometric encryption has been provided for the cloud consumer’s valuable
information and identity verification has been utilized in a unique way to scale back the problems associated
with authentication and authorization. In NEW protocol Identity verification in cloud environment has been joint
by pattern security in coincidence with four entirely dissimilar and influential encryption algorithms for
accumulated safety. This protocol improves biometric template protection by the combination of RSA and AES
encryption algorithms in proper locations and 3DES, Blowfish has been utilized in information security and
solution safety supervision. By implementing such technique can vanish out the un trustiness of adopting cloud,
specifically public and hybrid clouds. Since all the users information are hold on in off premise. Adopting this
456. protocol has given nice results when examining with existing work and all the vulnerable places has been
considered for improved security. 2616-
2619
Keyword : Cloud, Biometric Encryption, Cryptography, Authentication Protocol, Protocol, Identity
Verification.
References:
1. Lee, S., Ong, I., Lim, H. T., & Lee, H. J. (2010). Two factor authentication for cloud computing. Journal of information and
communication convergence engineering, 8(4), 427-432.
2. Jain, A. K., Ross, A., & Prabhakar, S. (2004). An introduction to biometric recognition. Circuits and Systems for Video Technology,
IEEE Transactions on, 14(1), 4-20.
3. Ratha, N. K., Connell, J. H., & Bolle, R. M. (2001). Enhancing security and privacy in biometrics-based authentication systems. IBM
systems Journal,40(3), 614-634.
4. Sudhan, S. K. H. H., & Kumar, S. S. (2015). An Innovative Proposal for Secure Cloud Authentication using Encrypted Biometric
Authentication Scheme. Indian Journal of Science and Technology, 8(35).
5. Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key
cryptosystems. Communications of the ACM,21(2), 120-126.
6. Balaji S, S. Saravanakumar., ”Performance Evaluation of Security and Privacy Challenges in Cloud Computing Services”-JARDCS
ISSN 1943-023X issue 12-2017.

Authors: S Balaji, S Saravanakumar

Paper Title: Cloud Data Security Protection Technique using Internet on Things
Abstract: The internet of things is turning into an appealing framework worldview to acknowledge inter-
connections throughout corporeal, digital as well as communal gaps. Through the connections amid the IoT,
safety concerns befall important, along with it is huge to set up improved resolutions for safety protections. The
IoT apparition of unlock data sharing is expert through using cloud registering concepts. Since IoT is depends on
the web, safety concerns of internet will similarly emerge in IoT as well as IoT enclose three layers for example
457. perception, transportation and application layers. The safety concerns, modernism along with solution
recognized by the application layer are conversed about in this Paper. The principle focal point of this 2620-
examination work is on Data Security Protection procedure for application layer. 2623

Keyword : Cloud Computing, Internet on Things, Security and OSCAR.


References:
1. D S Nikita, C S Sushama, P W Shashank, “Security Concerns for Cloud Supported IoT”, Int. Jou. of Innovative Research in Computer
and Communication Engineering, Vol. 4, Concern 9, September 2016, pp.16899-16910.
2. J Qi, V Athanasios, Vasilakos, W Jiafu, J Lu, DechaoQiu ,Security of the internet of thing : perspectives and challenges, Concern
17thJune 2014 DOI 10.1007/s11276-014-0761-7.
3. S Jatinder, P Thomas, B Jean, K Hajoon, E David,Twenty security considerations for cloud-supported internet of things, IEEE journal
concern on April 2015 DOI 10.1109/JIOT.2015.2460333.
4. R Sandip, R Arijit, The changing computing paradigm with internet of things: A tutorial introduction, IEEE journal concern on 2015
DOI 10.1109/MDAT.2016.2526612.
5. N Haunsheng, L Hong, T Laurence Yang, Aggregated proof based Hierarchical Authentication Scheme for Internet Of Things, concern
on March 2015 DOI 10.1109/TPDS.2014.2311791.

Authors: V Rajasekaran, S K Nandha Kumar, S Selvakumaran, R Karthigaivel

Paper Title: Module Integrated PV Balancer for PV Applications


Abstract: This paper presents the possibility of Module Integrated Converters (MIC) called PV balancers
for photovoltaic applications. The proposed thought enables self-governing Maximum Power Point Tracking
(MPPT) for each board, and radically decreases the requirements for power converters. The power rating of a
PV balancer is under 20% of its accomplices, and the collecting cost is as such inside and out diminished. The
proposed engineering of the PV balancer is checked through simulation results. It is foreseen that the proposed
methodology will be an ease answer for future photovoltaic power frameworks.

Keyword : Photovoltaic power systems, PV balancers, Module Integrated Converters, Maximum Power
Point Tracking.
References:
458. 1. R. Alonso, E. Roman, A. Sanz, V. Santos, and P. Ibanez, “Analysis of inverter-voltage influence on distributed MPPT architecture
performance”, IEEE Trans. Ind. Electron., vol. 59, no. 10, 2012, pp. 3900–3907.
2. Dezso Sera, L. Mathe, T. Kerekes, S. V. Spataru, R. Teodorescu, “On the Perturb-and-Observe and Incremental Conductance MPPT 2624-
Methods for PV Systems”, IEEE Journal of Photovoltaic, vol. 3, no. 3, 2013. 2628
3. Huimin Zhou, Junjian Zhao, Yehui Han, “PV balancers: Concept, architectures and realization”, in Proc. IEEE Energy Convers. Co ngr.
Expo., pp.3479-3487, 2012.
4. J. Huusari, and T. Suntio, “Dynamic properties of current-fed quadratic full-bridge buck converter for distributed photovoltaic MPP
tracking systems”, IEEE Trans. Power Electron., vol. 27, no. 11, 2012, pp. 4681–4689.
5. M. Kasper, D. Bortis, and J. W. Kolar, “Classification and comparative evaluation of the PV panel-integrated dc-dc converter concept”,
IEEE Trans. Power Electron., vol. 29, no. 5, 2014, pp. 2511–252.
6. Nicola Femia, Giovanni Petrone, “Optimization of perturb and observe maximum power point tracking method”, IEEE Trans. Power
Electron., vol. 20, no. 4, 2005, pp. 963–973.
7. C. Olalla, D. Clement, M. Rodriguez, and D. Maksimovic, “Architectures and control of sub module integrated dc–dc converters for
photovoltaic applications”, IEEE Trans. Power Electron., vol. 28, no. 6, 2013. pp. 2980–2997.
8. Omar Abdel-Rahim, HamdyRadwan, Mahrous Ahmed, “Two Stages Maximum Power Point Tracking Algorithm for PV Systems
Operating under Partially Shaded Conditions”, IEEE Trans. Power Electron., vol.25, no.5, 2010.
9. S. Ravivarman, and T. Samydurai, “Optimized Grid Power Injection with Maximum Power Point Tracking Using Cascaded SEPIC
Converter and Three Phase Inverter”, International Journal, Vol. 4, Issue 1, 2015.
10. P. S. Shenoy, K. A. Kim, B. B. Johnson, and P. T. Krein, “Differential power processing for increased energy production and reliability
of photovoltaic systems”, IEEE Trans. Power Electron., vol. 28, no. 6, 2013, pp. 2968–2979.

Authors: S Balaji, S Saravanakumar

Paper Title: Efficient Communication in Cloud using High Performance Computing System
Abstract: To build the productivity of every errand, we necessitate a framework that should furnish high
performance alongside adaptabilities and price effectiveness for client. Cloud computing, since we are for the
most part mindful, has turned out to be well known over the previous decade. So as to build up a high
performance disseminated framework, we have to use the cloud computing. In this paper, we will initially have a
presentation of high performance computing framework. Thusly inspecting them we will investigate inclines in
compute and emerald feasible computing to upgrade the routine of a cloud framework. At long last introducing
the future degree, we finish up the paper recommending a way to accomplish a emerald high performance cloud
459. framework.
2629-
Keyword : Cloud Computing, High Performance Computing, IaaS, PaaS and SaaS. 2632
References:
1. D Sasikumar, S Saravanakumar, T Saravanan, “Analysis of Security Issues and Safety Measurements in High Performance Cloud
Computing Systems”, Jour of Adv Research in Dynamical & Control Systems, Vol. 10, 14-Special Issue, 2018, pp.1688-1693.
2. D Sasikumar, S Saravanakumar, “Cozy and Safety Developments Up to Date in High Overall Performance Computing the Use of
Cloud Computing”, Journal of Computational and Theoretical Nanoscience, Vol. 16, 709–714, 2019.
3. Miettinen AP, Nurminen JK, “Energy efficiency of mobile clients in cloud computing”, ACM HotCloud'10 Proceedings of the 2nd
USENIX conference on Hot topics in cloud computing, pp 4-11,2010.
4. V Christian, P Suraj, B Rajkumar, “High-Performance Cloud Computing: A view of Scientific Applications”, Int. Sym. on Pervasive
Systems, Algorithms, and Networks, IEEE Computer Society, pp 4- 16,2009.
5. Ye Xiaotao, LvAili, Zhao Lin, “Research of High Performance Computing with Clouds”, ISBN 978-952-5726-10-7, pp 567-577, 2010.

Authors: F X Edwin Deepak, L Sahaya Senthamil, S Umamaheswari, J Punitha Nicholine, R Joseph Rathish

Paper Title: Fuzzy Logic Controlled PV Based Quasi Impedance Source Inverter for Charge Balancing
460.
Abstract: A photovoltaic power generation system based on battery-energy quasi impedance source
2633-
cascaded multi-level inverter incorporates the advantages of a quasi-impedance source inverter, a CMI, and a
2638
battery-energy storage unit. Unbalanced battery charging between cascaded H-bridge inverter modules will
degrade the efficiency of an entire system and reduce the lifetime of the battery. This paper proposed a control
method for tracking the maximum power point and balancing the SOC of the battery under the large variation of
solar input. A fuzzy based optimized linearizer for the battery charge and maximum power point tracking are
proposed. The fuzzy controller is proposed to enhance the battery state of charge regulation takes as a individual
modules as a loop to reduce over charge condition. The Proposed method validation is done by comparing it
with base work control by PI and P&O with the performance parameters. The base work and proposed work are
designed and simulated in the Matlab Simulink software.

Keyword : multilevel inverter, quasi impedance source inverter, shoots through state, solar PV panel.
References:
1. Huang, W. and Abu Qahouq, J.A., (2015), ‘Energy sharing control scheme for state-of-charge balancing of distributed battery energy
storage system,’ IEEE Trans. Ind. Electron., vol.62, no.5, pp.2764-2776.
2. Kandasamy, K., Vilathgamuwa, M. and Tseng, K.J., (2015), ‘Inter-module state of charge balancing and fault-tolerant operation of
cascaded H-bridge converter using multi-dimensional modulation for electric vehicle application’ IET Power Electron., vol. 8, no. 10,
pp.1912-1919.
3. Lu, X., Sun, K., Guerrero, J.M et al., (2015), ‘Double-quadrant state of charge-based droop control method for distributed energy
storage systems in autonomous DC microgrids,’ IEEE Trans. Smart Grid, vol.6, no.1, pp.147-157.
4. Nguyen, M.K. and Tran, T.T., (2017), ‘Quasi cascaded H-bridge five level boost inverter,’ IEEE Trans. Ind. Electron.,
doi:10.1109/TIE.2017.2701770, to be published.
5. Sun, D., Ge, B., Liang, W., Abu-Rub, H. and peng, F., (2015), ‘An energy stored Quasi-Z source cascaded multilevel inverter based
photovoltaic power generation system,’ IEEE Trans. Ind. Electron., vol.62, no.9, pp.5458-5467.

Authors: Ruby Mishra, Manoranjan Mohapatra*, Shubham Kamlesh Shah, Taniya Ghosh

Paper Title: Design of a Robotic Arm


Abstract: Cancer and tumor detection is a very important field in today’s medical profession. The medical
procedures such as radiology, biopsy, surgeries, etc. require paramount precision. Technologies such as robotic
arms have come into play these days to minimize the pain, post-operation and also to make the surgeries and
procedures much more cost-effective. A robotic arm has been experimentally designed that takes the coordinates
as input and reach the target point. The main aim of this project was to increase the precision and accuracy of the
robotic arm that has been experimentally designed. The objective of the project was to find the deviation of the
end needle caused due to the functioning of the robot and due to its self-weight. Designing of the robotic arm
was done in Solid works and analysis was carried out in ANSYS. The results for stress and strain were obtained
for static structural analysis. The vibrational analysis was done in comparison to the previous model.
461.
2639-
Keyword : Robotic arm, Vibration and structural analysis, LabVIEW, MyRIO.
2641
References:
1. Chen Yanhong, Zhu Feng, The Finite Element Analysis and The Optimization Design of The Yj3128-type Dump Truck’s Sub-
Frames Based on ANSYS, Elsevier Ltd., 2011.
2. "Robot-Assisted Real-Time Tumor Manipulation for Breast Biopsy" by Vishnu G. Mallapragada in IEEE TRANSACTIONS ON
ROBOTICS, VOL. 25, NO. 2, APRIL 2009.
3. Robotics and Computer-IntegratedManufacturing30 (2014)351–362.
4. Sorem J,Shadley R,Tipton S M. Design curves for maximum stresses in block containing pressurized bore intersections Mech
Des.Tulsa OK, USA 1991;113.
5. Mahdi Kiani, Joanne Ishak, Michael W. Keller, Steven Tipton, Comparison between nonlinear FEA and notch strain analysis for
modeling elastoplastic stress-strain response in cross bones, Elsevier Ltd., 2016.
6. Tony Burton, David Sharpe, Nick Jenkins, Ervin Bossanyi. Wind Energy Handbook. John Wiley&Sons Ltd, 2001.
7. Supriya Sahu, A vibration analysis of a 6-axis industrial robot using FEA, Materials Today: Proceedings 4 (2017) 2403–2410.

Authors: J. Martin Sahayaraj, N.Subash, S.Jaya Pratha, N. Tamilarasan


Automated Brain Tumor Detection and Segmentation from MRI Images using Adaptive Connected
Paper Title:
Component Pixel Segmentation
Abstract: Magnetic resource imaging (MRI) imagesare used in examining the soft tissues which include
brain tumors, ligament and tendon injury, spinal cord injury. Gray scale image processing is good for basic
segmentation application.The exact location of brain tumor and its length is hard to find.This paper proposes an
efficient method to segment the brain tumor. The result shows good segmentation accuracy.

Keyword : Connected component, PixelSegmentation, Image morphology, Brain tumor, Brain cancer,
462. Medical images, MRI images
References: 2642-
1. Chaddad, A., Zinn, P.O. and Colen, R.R., "Brain tumour identification using Gaussian Mixture Model features and Decision Tree s 2645
classifier.,"Information Sciences and Systems (CISS), 2014 48th Annual Conference on, vol., no., pp.1,4, 19-21 March 2014.
2. Ray, N., Saha, B.N. and Brown, M.R.G., "Locating Brain Tumours from MR Imagery Using Symmetry,"Signals, Systems and
Computers, 2007. ACSSC 2007. Conference Record of the Forty-First Asilomar Conference on, vol., no., pp.224, 228, 4-7 Nov. 2007.
3. Rajesh, T. and Malar, R.S.M., "Rough set theory and feed forward neural network based brain tumour detection in magnetic reso nance
images,"Advanced Nano materials and Emerging Engineering Technologies (ICANMEET), 2013 International Conference on , vol.,
no., pp.240,244, 24-26 July 2013.
4. Sangewar, S., Peshattiwar, A.A., Alagdeve, V. and Balpande, R., "Liver segmentation of CT scan images using K means
algorithm,"Advanced Electronic Systems (ICAES), 2013 International Conference on , vol., no., pp.6,9, 21-23 Sept. 2013.
5. Rajikha Raja, Neelam Sinha and Jitender Saini, “Characterization of White and Gray Matters in healthy brain: An in-vivo Diffusion
Kurtosis Imaging study”,IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT),
Bangalore, India, Jan.2014.
6. Zou, K.H., Wells, W.M., Kaus, M.R., Kikinis, R., Jolesz, F.A. and Warfield, S.K., Statistical validation of automated probabilistic
fractional segmentation against composite latent expert gold standard in MR imaging of brain tumours. In: Proceedings of 5th
International Conference on Medical Imaging Computing and Computer Assisted Interventions, Sept 25–28, 2002, Tokyo, Japan.
Berlin: Springer-Verilog, 315–322.
7. Zou, K.H., Wells, W.M., Kaus, M.R., Kikinis, R., Jolesz, F.A. and Warfield, S.K., Validation of partial tissue segmentation of single-
channel magnetic resonance images of the brain Nero image. 2000;12:640 –656.
8. Tao Song, Mo M. Jamshidi, Roland R. Lee and Mingxiong Huang, “A Modified Probabilistic Neural Network for Partial Volume
Segmentation in Brain MR Image”IEEE Transactions on Neural Networks,vol.18, no.5, pp.1424-1432, Sept.2007
9. Kao, Y.H., Sorenson, J.A., Bahn, M.M. and Winkler, S.S., Dual-echo MRI segmentation using vector decomposition and probability
technique: a two-tissue model. Magnetic resonance in medicine 1994; 32:342–357
10. Wenchao Lv, Yahui PengChao Yang and Xinchun Li, Reconstruction of brain tissue surface based on three-dimensional Tl-weighted
MRI images”, 8th International Congress on Image and Signal Processing (CISP), Feb.2016.
11. Smitha Sunil Kumaran Nair and K. Revathy, “Quantitative Analysis of Brain Tissues from Magnetic Resonance Images”, IEEE
international Conference on Digital Image Processing, Bangkok, Thailand, Mar.2009.
12. Warfield, S.K., Zou, K.H., Kaus, M.R. and Wells, W.M.,Simultaneous validation of image segmentation and assessment of expert
quality. International Symposium on Biomedical Imaging, July 7–10, 2002 IEEE.2002; 1494:1–4.
13. Bharatha, A., Hirose, M., Hata, N., Warfield, S.K., Ferrant, M., Zou, K.H., Suarez‐Santana, E., Ruiz‐Alzola, J., D'amico, A., Cormack,
R.A. and Kikinis, R., Evaluation of three-dimensional finite element-based deformable registration of pre- and intraoperative prostate
imaging. Med Phys. 2001; 28:2551–2560. [PubMed]
14. Jaccard, P., The distribution of the flora in the alpine zone. 1. New physiologist, 11(2), pp.37-50.
15. Russo, D., Merolla, F., Mascolo, M., Ilardi, G., Romano, S., Varricchio, S., Napolitano, V., Celetti, A., Postiglione, L., Di Lorenzo, P.
and Califano, L., 2017. A new prognostic biomarker for OSCC.International journal of molecular sciences, 18(2), p.443.
16. Zou, K.H., Warfield, S.K., Fielding, J.R., Tempany, C.M., Wells III, W.M., Kaus, M.R., Jolesz, F.A. and Kikinis, R., 2003. Statistical
validation based on parametric receiver operating characteristic analysis of continuous classification data1. Academic radiology,
10(12), pp.1359-1368.
17. Zou, K.H., Wells III, W.M., Kikinis, R. and Warfield, S.K., 2004. Three validation metrics for automated probabilistic image
segmentation of brain tumours. Statistics in medicine, 23(8), pp.1259-1282.
18. Gerig, G., Jomier, M. and Chakos, M., 2001, October. Valmet: A new validation tool for assessing and improving 3D objects
segmentation. In International Conference on Medical Image Computing and Computer-Assisted Intervention (pp. 516-523). Springer,
Berlin, Heidelberg.
19. Huttenlocher, D.P., Rucklidge, W.J. and Klanderman, G.A., 1992, June. Comparing images using the Hausdorff distance under
translation. In Proceedings 1992 IEEE Computer Society Conference on Computer Vision and PatternRecognition (pp. 654-656).

Authors: Aybek Arifjanov, Luqmon Samiev, Shamshodbek Akmalov

Paper Title: Dependence of Fractional Structure of River Sediments on Chemical Composition


Abstract: The article investigates the mechanical and chemical composition of river sediments and
analyzes studies on changes in the chemical composition of sediments by changing their mechanical
composition. Given scientific investigations about efficient use of chemical compounds in sediments. The
connections between mechanical and chemical composition of the sediments are based on correlation
coefficients. The results are based on the fact that small fractional sediments less than 0.05 mm can be used
effectively in agriculture.

Keyword : River sediments, mechanical and chemical composition, irrigated fields, mineral fertilizers, water
consumption, canals, turbidity.
463. References:
1. Arifzhanov A.M., Fathullaev A.M., Samiev L.N. Process in channels and river sediments. T.: Monograph. Noshirlik Yodusi, 2017. - 2646-
191p.
2. Mirzajonov KM, Rakhmonov R.U. Irrigation soil erosion and elements of the fight against it.-Т .: “Navruz”, 2016, -252 c. 2649
3. Аrifdjanov A.M., Samiev L.N., Hydraulic calculation of changeable irrigation sediment reservoir // European Science Review, Austria,
Vienna, 2016, November-December.-124-126r.
4. Rozanov A.N. The value of irrigation sediment for the genesis, fertility and land reclamation of irrigated soils // Soil Science.-M,
1959.- No. 2.- 8-18 c.
5. Arifzhanov A.M., Fathullaev A.M., Samiev L.N. Sediment transportation possibilities of main channels.// Irrigation and melioration
journal. 2015. No2. 41-45 p.
6. Molodtsov L.Ya. Irrigation deposits of oases of the river valley Zeravshan and river deltas Murghab. Sat The effect of irriga tion on the
soil of oases Asia, Publishing.-1963.S.-46
7. Arifzhanov A.M., Fathulloev A.M. Turbulent motion of a suspension flow in open channels // Irrigation and Land Reclamation -
Toshkent, 2017. - No. 01 (7), - 32-35 s.
8. Kovda V.A., 3akharyina G.V., Shelyakina O.A. The value of the irrigation sediments of the Amu Darya in the fertility of irrig ated soils
// Soil Science.-M, 1959. No. 4 - P. 25-35.
9. Harten A. On a class of high resolution total-variation stable finite-difference schemes // SIAM J. of Numerical Analysis. 2002. V.21.
No. 1. P.1-23.

Authors: Parveen iBerwal, iPraveen iAggarwal, iRajesh iGoel

Paper Title: Utilization Iof Irecycled Iaggregate Iin Iwet Imix Imacadam I(Wmm)
Abstract: his istudy iplanned ito ibuild iup ia isystem ifor iappropriate iuse iof irecycled iaggregate iin
iwet imix imacadam i(WMM) icourse igot ifrom iconstruction iwaste iof ihighway iduring ithe iroad
464. imaintenance iand iconstruction iThis iwill ihelp iin iaccomplishing ieconomy iin idevelopment iof iroads ijust
ias isaving imoney ion icondition idebasement iin iterm iof idiminished imining iand iless ipollution. iDifferent 2650-
ilab itests iwere iled ito idiscover ithe ilikelihood iof iutilizing irecycled iaggregate ifrom ivarious isources iin 2653
iIndia, ias ithe isubstitution iof ifresh iaggregate. iVarious itests iwas idone ito idecide ithe iproperties iof ithe
ifresh iand irecycled iaggregate. iThe itest ioutcomes idemonstrated ithat ithe ispecific igravity iof ithe irecycled
iaggregate iis i2.53 iand ielongation iindex irecord ias i12.5 i% iwhich iis iclose ito ifresh iaggregate. iThe
imaximum idry idensity i(MDD) iand ioptimum imoisture icontent i(OMC) iof irecycled iaggregate iis i2.06
iand i9% iand ifor ifresh iaggregate iit iis i2.04 iand i8 i%. iThe ipermeability ifor ithe imaterial iutilized iin
ipresent iresearch iis i3-6 iminute ifor i1 ito i10 icm idepth iand i3-7 iminute ifor i1 ito i10 icm idepth. iFrom
ithe itest iit iconclude ithat ithe irecycled iaggregate iis ialso iusable iin ivarious iapplication iof ithe iroads,
iwhere ithere iis ia irepetation iof iloads iis ilow ias icompared ito iroads iwith ihigh irepetation iof iloads ivalue.

Keyword : iRecycled iaggregate, iWet imix imacadam, iRoad iconstruction, iEconomy, iFresh iaggregate
References:
1. Limbachiya, iM. iC., iLeelawat, iT. iand iDhir, iR. iK., i“Use iof iRecycled iConcrete iAggregate iin iHigh-Strength iConcrete,”
iMaterial iand iStructure, iVol. i33, i2000, ipp. i574-580.
2. Saroj iMandal, iS.Chakrborty iLimbachiya, i“Some iStudy iOn iDurability iOf iRecycled iAggregate iConcrete” iThe iIndian iConcrete
iJournal iJune i2002.
3. Limbachiya iand iLeelawat i, i“Use iof iRecycled i iConcrete iAggregate iin iHigh iStrength iConcrete” iMaterial iand iStructure
iJournal i, iNovember i2000,
https://doi.org/10.1007/BF02480538, iISSN: i1359-5997 i(Print) i1871-6873 i(Online) i i
4. Mandal, iChakaborty iand iGupta, i“ iSome iStudy ion iDurability iof iRecycled iAggregate iConcrete i“ iResearch iGate, iJune i2002. i
5. M. iTavakoli, iP. iSoroushian, iStrengths iof irecycled iaggregate iconcrete imade iusing ifield-demolished iconcrete ias iaggregate,
iACI iMater. iJ. i93 i(2) i(1996) i182 i– i190.
6. Ahmed iIbrahim iAbu, iBehiry i“Utilization iof iCement iTreated iRecycled iConcrete iAggregate ias iBase ior iSub iBase iLaye r i“
iScience iDirect i, iVolume i4, iIssue i4 iDecember i2013, ipp. i661-673.
7. Rifat i iRustom, i iSalah i iTaha, i iAli i iBadarnah i iand i iHani i iBarahma, i“ iProperties i iof i iRecycled i iAggregate i iIn i
iConcrete i iAnd iRoad i iPavement i iApplications, i iThe i iIslamic i iUniversity iJournal i i(Series i iof i iNatural i iStudies i iand i
iEngineering) i iVol.15, i iNo. i i2, i ipp i i247-264, i2007, iISSN i1726-6807, ihttp://www.iugaza.edu.ps/ara/research.
8. Method iof itest ifor iaggregate ifor iconcrete, iIS i2386 ipart iIV i i,Aggregate iimpact ivalue itest, iBureau iof iIndian iStandards
i(BIS), iGovt. iof iIndia i,Eight ireprint iMarch i1997, iUDC i691.322 i: i531.75
9. Method iof itest ifor isoil, iIS i2720 i i(part i8), iDetermination iof iwater icontent i-Dry idensity irelation iusing iheavy icompaction,
iBureau iof iIndian iStandards i(BIS), iGovt. iof iIndia i,Second ireprint iSeptember i1994, iUDC i624.131.431.3.624.131.431.5
10. Standard itest imethod ifor iquantitative iextraction iof ibitumen ifrom ibituminous ipaving imix, iDetermination iof iBitumen iContent,
iASTM iD2172/D2172M i(American isociety ifor itesting iand imachine) istandard iand ipublication.
11. IS i2386(Part i3):1963 iMethods iof itest ifor iaggregates ifor iconcrete: iPart i3 iSpecific igravity, idensity, ivoids, iabsorption iand
ibulking.
12. S i2386(Part i1):1963 iMethods iof itest ifor iaggregates ifor iconcrete: iPart i1 iParticle isize iand ishape.
13. iIS: i2720(part-16)-1979,”Method ito itest ifor isoils: iLaboratory idetermination iof iCBR”
14. iIS: i i i2720(part-17)-1986,”Method i i ito i i itest i i ifor i i isoils: i i iLaboratory i i idetermination i i iof i ipermeability”

Authors: Hassan Ali Al- Ababneh

Paper Title: Concept of Internet Marketing as a Modern Organization Development Paradigm


Abstract: The key theoretical aspects of the formation of marketing and the use of the marketing mix in the
modern context are considered. The relevance and conceptual need for improving the marketing mix and the
development of practical recommendations taking into account the transformation of the global market and the
rapid development of innovative technologies and tools are determined. An in-depth theoretical and
methodological analysis of the theory of the marketing mix and its containing elements are carried out, which
allowed the author to classify the existing marketing concepts. Due to the lack of a unified system for
periodization of development of the marketing mix, the author has developed and proposed the structuring of the
main evolutionary stages of marketing development and it’s containing elements. Theoretical and
methodological aspects of the formulation of the organization’s Internet marketing concept using the “7P”
elements as the main paradigm of the functioning of organizations are developed. A classification of the main
elements of the concept of Internet marketing is presented with a description of their characteristics, features of
use, advantages and disadvantages, which will allow using these theoretical approaches in practice. It is proved
that the formulation of the concept of Internet marketing is impossible without the use of innovative Internet
technologies. The main trends in the development of Internet technologies in the world are investigated.
Graduation of the countries of the world by the groups of the integrated ICT index is carried out. It is proved that
465.
the use of ICT in the process of formulation the concept of Internet marketing is the most effective method in the
modern context. The risk indicators and the effectiveness of the use of the concept of Internet marketing by 2654-
banks of Jordan are assessed and analyzed. 2661

Keyword : concept, efficiency, internet marketing, market, marketing elements, marketing mix, marketing
strategy, product, price, risk.
References:
1. P. F. Drucker, Management: Tasks, Responsibilities Practices. New York: Truman Talley Books, 1986.
2. J. Alleman, and P. Rappoport, The future of communications in Next Generation Networks. The unsustainability of access competition.
Document: FoV/02. Geneva: ITU, 2007.
3. D. L. Hoffman, and T. P. Novak, “Marketing in Hypermedia Computer-Mediated Environments: Conceptual Foundations,” in Journal
of Marketing, vol. 60, 1996, pp. 50-68.
4. F. Kotler, Marketing Management. St. Petersburg: PITER Publ., 2011.
5. Y. Chen, D. Hui, and J. Seong, Click by click: How consumers are changing China’s e-commerce land-scape. Available:
https://cbsobserver.dk/sites/default/files/mckinsey-china-ecommerce-trends.pdf
6. K. H. Mentzel, and J. Hesse, “The Marketing-Information System as a Decision-Making Basis for Marketing Management,” in
Management International Review, vol. 12, no. 4/5, 1972, pp. 69-72.
7. M. Isoraite, “Marketing mix theoretical aspects,” in International Journal of Research – Grantha-alayah, vol. 4, no 6, 2016, pp. 25-27.
8. D. J. Luck, H. G. Wales, and D. A. Taylor, Marketing Research. Englewood: Prentice Hall, 1961.
9. L. V. Kuznetsova, and B. F. I. Alakidy, “Electronics marketing and its impact on the quality of banking services in Iraqi com mercial
banks,” in Bulletin of Sumy National Agrarian University, vol. 4, 2012, pp. 183-189.
10. K. J. Arrow, “The Economic Implications of Learning by Doing,” in The Review of Economic Studies, vol. 29, no 3, 1962, pp. 155-
173.
11. D. Chaffey, R. Mayer, K. Johnston, and F. Ellis-Chadwick, Internet Marketing, Strategy, Implementation and Practice. Upper Saddle
River, NJ: FT/Prentice Hall, 2000.
12. O. U. Yuldasheva, “Cognitive Marketing: from the Promotion of Products to the Promotion of Consumption Technology. Part 1, 2,” in
Market Communications, no. 5(23), 2004, pp. 36-40; no. 6(24), pp. 11-18.
13. J. F. Angel, R. D. Blackwell, and P. U. Miniard, Consumer behavior. St. Petersburg: Piter-Kom, 1999.
14. K. Anderson, and K. Kerr, Consumer-oriented management. Moscow: Fair-Press, 2003.
15. I. P. Berdnikov, PR - communications. Moscow: Dashkov i Ko, 2017.
16. S. N. Berdyshev, Information marketing. Moscow: Dashkov i Ko, 2017.
17. E. I. Mazilkina, Marketing in industries and fields of activity. Moscow: Dashkov i Ko, 2017.
18. S. L. Orlov, “Internet marketing as an element of banking business under the competitive environment,” in Actual problems of
economics and law, no. 3, 2012, pp. 136-140.
19. A. P. Kovaltchuk, E. A. Blinova, and K. A. Miloradov, “Increasing the competitiveness of the russian hotel enterprises under modern
conditions,” in Journal of Environmental Management and Tourism, vol. VIII, no. 2(18), 2017, pp. 407 - 416.
20. I. A. Krymsky, Problems and prospects for the development of the electronic economy in Russia. Murmansk: Kolskogo NTS RAN
Publ., 2007.
21. A. E. Kalinina, Internet business and e-commerce. Volgograd: VolGU Publ., 2004.
22. F. Yu. Virin, Internet-marketing. Moscow: Eksmo Publ., 2010.
23. A. F. Mukhtasarov, “Classification and promotion of various types of information product by Internet marketing methods in sma ll and
medium-sized businesses,” in MFUA bulletin, vol. 2, 2017, pp. 112-127.
24. L. Vella, and J. Kester, Handbook on E-marketing for tourism destination. Madrid: World Tourism Organization and the European
Travel commission, 2009.
25. M. A. Oklander, and T. O. Oklander, “Evolution of the marketing theory: genesis, conception, periodization,” in Marketing and
management, no. 4, 2016, pp. 92-105.
26. E. Balyberdin, Modern forms of organizing electronic commerce in Russia. PhD abstract thesis. Moscow, 2003.
27. A. Vekshinsky, “Internet marketing as a new direction in the modern concept of relationship marketing,” in Technical and
technological problems of service, vol. 2, no. 20, 2012, pp. 102-108.
28. M. Yu. Ryumin, Communication marketing concept as the basis for organizing entrepreneurial activity in the information society.
Available: http://www.p-marketing.ru/publications/applied-marketing/research-methods/.
29. N. B. Kurshakova, “Relationship marketing: the formation of demand for banking services,” in Banking services, no. 6, 2001, pp. 75-
82.
30. V. S. Golik, and S. I. Golik, “The use of Internet technology in international marketing,” in Marketing in Russia and abroad, no. 3,
2011, pp. 113-116.
31. I. V. Rozhkov, Information Systems and Technologies in Marketing. Moscow: Ru-science, 2014.
32. T. N. Chernyakhovskaya, Marketing activities of the enterprise: theory and practice. Moscow: Vysshee obrazovanie, 2008.
33. G. A. Savchuk, Enterprise Marketing Management. Moscow: FLES, 2014.
34. A. Smirnov, and Yu. Suzdal, The Battle on the Ice. Marketing Tools for Promoting an Online Business. St. Peterburg: IG Publ., 2015.
35. F. Nacgira, A. Nicolai, and P. Dini. Digital business ecosystem. Luxemburg: Office for Official Publications of the European
Communities, 2007.
36. S. Hollensen, Marketing Management: A Relationship Approach. London: Financial Times Prentice Hall, 2010.
37. D. S. Tull, Marketing Research. Measurement and Method: A Text with Cases, 3-rd ed. New York: MacMillan, 1984.
38. J. R. Evans, and B. Berman, Marketing. Moscow: Economics, 1990.
39. F. Kotler, G. Armstrong, J. Saunders, and V. Wong. Principles of marketing. Moscow: St. Petersburg; Kyiv: Williams Publ., 2001.
40. F. Kotler, Marketing-management. St. Petersburg: Piter-Kom, 1998.
41. F. Kotler, Principles of marketing: Translation from English. Moscow: Business-book; IMA-Kross. Plus, 1995.
42. Internet World Stats. Internet usage statistics. The Internet Big Picture. Available: https://www.internetworldstats.com/stats.htm
43. L. Grokhovsky, I. Sevost’yanov, and D. Ivanov, Promotion of portals and online stores. St. Petersburg: Piter, 2015.
44. A. Babaev, N. Evdokimov, M. Bode, and E. Kostin, Promotion. Secrets of effective website promotion. St. Petersburg: Piter, 2013.
45. Central Bank of Jordan. Official data on the banking system of Jordan. Available:
http://www.cbj.gov.jo/Pages/viewpage.aspx?pageID=68.

Authors: Mariia A. Abysova, Olha P. Antipova

Paper Title: Political Ideologies Language from the Perspective of Modern Western Society
Abstract: The research is aimed at revealing the linguo-discursive features of political interaction within
the framework of liberal-democratic ideological communication in the modern perspective. The task of
substantiating the key foundations for the perception of language of political ideology as a linguo-discursive
process of mutual adaptation of the state and civil society as subjects of political communication is addressed.
The study is anchored in the neoclassical scientific paradigm, within which framework critical rethinking of the
political discourse-analysis methodology is carried out. We proceed from the fact that ideology is a
representation of a certain set of language elements, so the study of the ideology language serves to reconstruct
the discursive base of ideology and the imperatives underlying it. It is shown that the study of language of
political ideologies engenders the emergence of parallel centers of power in the sphere of statehood. The growth
466. of destructive elements of communicative interactions in liberal democratic society is revealed, in particular an
increase in the discursive means that serve an effective tool of denying the democratic process is identified. his 2662-
study can be useful in the area of political science, namely in the political practice of liberal-democratic society. 2668
The findings are applicable in establishing the factors of destruction of social and political dialogue. In this
context, the research can offer solutions, provide resources for politicians and organizations in optimizing the
dialogue of political communication subjects. Drawing from Freeden’s morphological approach of studying the
ideological discourse, as well as critical discourse studies of van Dijk, the research bridges the gap between the
studies of the classical philosophical thought and neoclassical scientific paradigm in comprehending the role of
political ideologies language. The current study urges a critical rethinking of methodology of political discourse
analysis.

Keyword : civil society, liberal democracy, political communication, political ideology, political science.
References:
1. M. Freeden, “Ideology and political theory,” in Journal of Political Ideologies, vol. 11, no. 1, 2006, pp. 3 -22.
DOI: 10.1080/13569310500395834.
2. T. A. van Dijk, “Ideology and discourse analysis,” in Journal of Political Ideologies, vol. 11, no. 2, 2006, pp. 115 -140.
DOI: 10.1080/13569310600687908.
3. R. Bart, “Myth Today,” in Selected Works: Semiotics. Poetics. Moscow: Progress, 1994, pp. 72-130.
4. P. Bourdieu, Le Sens pratique. Paris: Minuit, 1980.
5. H. Marcuse, Heideggerian Marxism. Lincoln, Nebraska: University of Nebraska Press, 2005.
6. F. Skinner, Cumulative Record. New York: Appleton-Century-Crofts, 1959.
7. M. Foucault, Intellectuals and power: selected political articles, speeches and interviews: in 3 Vols. Vol. 2. Moscow: Praksis, 2005.
8. Heywood, Political Ideologies. An Introduction. Basingstoke: Palgrave Publishers, 2017.
9. L. Wati, Analyzing of political Ideologies and discourse analysis. Ideology and Discourse Analysis. INA-Rxiv, 2018. Available:
https://osf.io/preprints/inarxiv/c5dhj/
10. A. Ivin, New philosophy of history: monograph. Berlin: Direct Media, 2016.
11. Kologrivova, The language of political ideology: development trajectories. Moscow: LAP Lambert Academic Publishing, 2011.
12. L. Drotianko, and S. Yahodzinskyi, “Information environment as the intercultural communication space,” in Matec Web of
Conferences, vol. 106, 2017, 01006. doi:10.1051/matecconf/201710601006.
13. A. Tretyak, “The public sphere of politics: the anthropological dimension in contemporary communicative theory,” in Anthropological
measurements of philosophical research, vol. 12, 2017, pp. 62-71.
14. R. H. Kochesokov, L. M. Ashnokova, K. Kh. Unezhev, and B. M. Zumakulov, “Posthistorical factor in the failure of the politic of
multiculturalism,” in Humanities of the south of Russia, vol. 6, no. 4, 2017, pp. 135-146.
15. J. Skidmore, “Political language and political ideology,” in History of European Ideas, vol. 19, 1994, pp. 715-720.
16. J. Clarke, and J. Newman, “People in this country have had enough of experts’: Brexit and the paradoxes of populism,” in Critical
Policy Studies, vol. 11, no. 1, 2017, pp. 101-116. DOI: 10.1080/19460171.2017.1282376.
17. M. Freeden, “The morphological analysis of ideology,” in Oxford handbook of political ideologies. Oxford: Oxford Univ. Press, 2013,
pp. 115-137.
18. M. Freeden, “After the Brexit referendum: revisiting populism as an ideology,” in Journal of Political Ideologies, vol. 22, n o. 1, 2017,
pp. 1-11. DOI: 10.1080/13569317.2016.1260813.
19. T. A. van Dijk, Discourse, racism and ideology. La Laguna (Spain): RCEI Ediciones, 1996.
20. T. A. van Dijk, Ideology: a multidisciplinary approach. London: SAGE, 1998.
21. R. Wodak, and M. Meyer, Methods of critical discourse analysis. London: SAGE, 2001.
22. W. B. Gallie, “Essentially contested concepts,” in Proceedings of the Aristotelian Society, vol. 56, 1956, pp. 167-98.
23. M. Freeden, Ideologies and political theory: a conceptual approach. Oxford: Clarendon Press, 1996.
24. S. Ivanova, “The Elements of "Ideology": Antoine Destutt de Tracy and his Science of Ideas,” in Voprosy filosofii, vol. 8, 20 13, pp.
146-148.
25. Marx, and F. Engels, Criticizing Hegel's philosophy of law. Moscow: Politizdat, 1957.
26. Marx, and F. Engels, The German Ideology. London: Lawrence and Wishart, 1974.
27. J. Kin, Democracy and civil society. Moscow: Progress-Traditsiya, 2001.
28. K. D. Bracher, The Age of Ideologies: A History of Political Thought in the Twentieth Century. London: Methuen, 1984.
29. Manheim, Favorites. The diagnosis of our time. Moscow: Yurist, 1994.
30. M. Lerner, Ideas are Weapons: The History and Use of Ideas. New York: Viking Press, 1943.
31. D. Bell, The End of Ideology: On the Exhaustion of Political Ideas in the Fifties. New York: Free Press, 1965.
32. F. Fukuyama, “The End of History?” in The National Interest, 1989. Available:
https://www.embl.de/aboutus/science_society/discussion/discussion_2006/ref1-22june06.pdf
33. D. Shvartsmantel, Ideology and politics. Kharkiv: Gumanitarny tsentr, 2009.
34. A. Zinovev, Logical sociology. Moscow: Sotsium, 2002.
35. Aristotle, Works in 4 vols. (Series “Philosophical Heritage”). Moscow: Mysl, 1975-1983.
36. Urbinati, Distorted democracy. Opinion, truth and people. Moscow: Izd-vo Instituta Gaydara, 2016.
37. V. Glukhova, “Populism as a political phenomena and the challenge of the modern democracy,” in Polis. Political Studies, 4, 2 011, pp.
49-68.
38. F. Fukuyama, “American Political Decay or Renewal? The Meaning of the 2016 Election,” in Russia in Global Affairs, vol. 5, 20 16.
Available: https://www.foreignaffairs.eom/articles/united-states/2016-06-13/amerlcan-political-decay-or-renewal
39. S. V. Beloshitsky, Liberal democracy in the XXI century: resources, challenges, prospects. Khmelnitsky: PE Melnyk A. A., 2012 .
40. F. Fukuyama, Strong state. Governance and world order in the 21st century. Moscow: AST, 2007.

Authors: Richa Sharma, Anuradha Purohit

Paper Title: Image Feature Selection using Ant Colony Optimization


Abstract: With the enhancement in imaging technology, huge amount of information is being created
whose classification is a challenging task among researchers. The classification performance is solely dependent
on the quality of the features defining the respective images. Hence, feature extraction from images and feature
selection from this huge data is required. Image Feature Selection is a vital step which can significantly affect
the performance of image classification system. This paper proposes an efficient combination of image feature
extraction technique and feature selection strategy using Ant Colony Optimization (ACO). ACO utilizes overall
subsets performance and local feature importance to fetch problem domain finding prime solutions. For ACO
based feature selection in images most of the researchers use priori information of features. However, in this
467. work, the features are extracted separately through the detailed analytical process which carries the best suited
features for different classes of images. The performance in terms of classification accuracy has been enhanced 2669-
through the optimization of features in the dataset. For experimentation and evaluating the performance of 2674
proposed work, Corel and Caltech datasets are used. Satisfactory results have been obtained with the proposed
approach.

Keyword : Image Feature Selection; Feature Extraction; Ant Colony Optimization; MATLAB; Grey Level
Co-occurrence Matrix.
References:
1. Isabelle Guyon, Andre Elisseeff, “An Introduction to Variable and Feature Selection”, Journal of Machine Learning Research 3, 2003,
1157-1182.
2. Jović, K. Brkić and N. Bogunovic, ”A review of feature selection methods with applications” 38th International Convention on
Information and Communication Technology, Electronics and Microelectronics (MIPRO, 2015).
3. Marco Dorigo1 and Krzysztof Socha2,” An Introduction to Ant Colony Optimization”,:IRIDIA April 2006 ,Published as a chapter i n
Approximation Algorithms and Metaheuristics, a book edited by T. F. Gonzalez.
4. Ahmed Al-Ani, “Feature Subset Selection Using Ant Colony Optimization”, World Academy of Science, Engineering and Technology
17, 2008.
5. Anam Naseer, Waseem Shahzad, Arslan Ellahi, “A Hybrid Approach for Feature Subset Selection using Ant Colony Optimization and
Multi-Classifier Ensemble”. (IJACSA) International Journal of Advanced Computer Science and Applications, 2018,Vol. 9, No. 1.
6. Avrim L. Bluma “Artificial Intelligence Selection of relevant features and examples in machine learning”. Amficial Intelligence 97
School of Computer Science, Carnegie Mellon University Pittsburgh, 1997, pp. 15213-3891.
7. Bolun Chen,Ling Chen and Yixin Chen, ”Efficient ant colony optimization for image feature selection” Signal Processing 93, 20 13,
Vol. 93, Issue 6, pp. 1566-1576.
8. Farhad Samadzadegan and Tahmineh Partovi, ”Feature selection based on ant colony algorithm for hyperspectral remote sensing
images” workshop on Hyperspectral Image and Signal processing: Evolution in Remote Sensing, IEEE, 2010.
9. David Martens, Manu De Backer, Raf Haesen,” Classification With Ant Colony Optimization”,IEEE Transactions on evolutionary
computation, 2007, Vol. 11, No. 5, 651.
10. Rafael S. Parpinelli, Heitor S. Lopes, “Data Mining With an Ant Colony Optimization Algorithm” IEEE Transactions on Evolutionary
Computing, Vol. 6, No. 4, August 2002 321, Member, IEEE.
11. Xu Sun, Lina Yang, Qian Shen and Bing Zhang, “A new ant colony optimization algorithm based band selection method”,
Hyperspectral Image and Signal Processing: (WHISPERS) Lausanne, Switzerland, 2014.
12. Andrea Paoli, Farid Melgani, Edoardo Pasolli, “Swarm Intelligence for Unsupervised Classification of Hyperspectral Images”, IEEE
International Geoscience and Remote Sensing Symposium 12-17 July 2009.
13. Mohammad-Reza Feizi-Derakhshi, and Manizheh Ghaemi, “Classifying Different Feature Selection Algorithms Based on the Search
Strategies”, in International Conference on Machine Learning, Electrical and Mechanical Engineering (ICMLEME'2014) Jan. 8 -9,
2014 Dubai (UAE).
14. D. Asir, S. Appavu alias balamurugan, E. Jebamalar leavline, “A novel feature selection method for image classification”,
Optoelectronics And Advanced Materials – Rapid Communications Vol. 9, No. 11-12, Nov. – Dec. 2015,pp. 1362 – 1368.
15. Kamilia Menghour and Labiba Souici-Meslati, “Hybrid ACO-PSO Based Approaches for Feature Selection”, International Journal of
Intelligent Engineering and Systems, Vol.9, No.3, 2016.
16. Adegoke and Omotayo, ”Review of Feature Selection Methods in Medical Image Processing”, IOSR Journal of Engineering
(IOSRJEN), 2014, Vol. 04, Issue 01, pp. 2278-8719.
17. Anuradha Purohit, NS Chaudhari, A Tiwari, “Construction of classifier with feature selection based on genetic programming”, IEEE
Congress on Evolutionary Computation, 2010, pp.1-5.
18. Khushboo Jain, Anuradha Purohit ,” Feature selection using modified particle swarm optimization”, International Journal of Computer
Applications, 2017, Vol. 161, Issue 7, pp.8-12.
19. Anuradha Purohit, Priyansh Jain,” Feature Subset Selection Using Agglomerative Clustering”, International Journal of Research in
Electronics and Computer Engineering, 2018, Vol. 6, Issue 2, pp. 726-729.
20. Aruna Tiwari Swati Jain, Anuradha Purohit,” Multiclass Classifier with Feature Selection using Genetic Programming”, International
Journal on Computer Engineering and Information Technology (IJCEIT), 2010, Vol. 8, Issue 13, pp.26-30.

Authors: R. Prakash Rao, A. S. Keerthi Nayani, Aruna Kokkula, A. Abhishek Reddy

Paper Title: Implementation of Audio CODEC with a Novel Design Methodology


Abstract: Currently in the real-time audio applications fixed point CODEC is being used. But the major
disadvantage of such CODEC is the speed and accuracy. Because , as the DSP systems cannot be operated with
real-time signal ‘t’, but they can be operated with the discrete time ‘n’ , the real-time analog signal x(t) is to be
converted into discrete time signal x(n) by the analog to digital convert (ADC). The most widely used ADC in
the signal processing environment is sigma-delta ADC. But, it can operate with the maximum speed of 1MHz.
The DSP processor can give several times more speed than sigma-delta ADC. Hence, the speed of DSP system
is being limited by sigma-delta ADC, even though the DSP system has the capability to operate with great
speed. Similarly, the accuracy is being missed because the floating point samples are converted into fixed point
to get the compatibility with fixed point DSP processor. To eliminate these two bottlenecks the novel design
methodology has been proposed in which the ADC and DAC have been eliminated and the system is developed
468. by the 16 bit floating point.
2675-
2679
Keyword : fixed point CODEC, speed and accuracy, DSP systems, ADC, DAC, 16 bit floating point.
References:
1. J. Pang, S. Chauhan, “FPGA Design of Speech Compression by Using Discrete Wavelet Transform”, Proceedings of the World
Congress on Engineering and Computer Science 2008, WCECS 2008, October 22 - 24, 2008, San Francisco, USA.
2. J.-J. Charlot, N. Milet-Lewis, T. Zimmer and H. Lévi (BEAMS Association), “VHDL-AMS for mixed technology and mixed signal, an
overview”, BEAMS, c/o IXL, Université de Bordeaux 1, 351, cours de la Libération, 33405 Talence, France beams@ixl.u-bordeaux.fr
3. Hany G. Bakeer, Omar Shaheen, Haitham M. Eissa, Mohamed Dessouky, “Analog, Digital and Mixed-Signal Design Flows”, 978-1 -
4244-1 825-1/07/$25.OO ©2007 IEEE.
4. Ken Kundert, Henry Chang, Dan Jefferies, Gilles Lamant, Enrico Malavasi, Fred Sendig, “Design of Mixed-Signal Systems on Chip”,
Published in the IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol.19, no.12, pp.1561-1571,
December 2000.
5. Domine Leenaerts, Georges Gielen, Rob A.Rutenbar, “CAD Solutions and Outstanding Challenges for Mixed-Signal and RF IC
Design” Integrated Transceivers, Philips Research, The Netherlands.

Authors: V. Balaji, S. Kanaga Suba Raja S. Aparna, J. Haritha, M. Lakshmi Kanya

Paper Title: Smart Assistance for Asperger Syndrome using Raspberry Pi

469. Abstract: This paper focuses on autism people who need smart assistance for their everyday survival. One
of the most common Autism categories is Asperger syndrome. The motive of this project is to promulgate their
2680-
tasks efficiently by detecting and recognizing their faces which will be stored in the database using Raspberry
2683
Pi.The “Smart Assistant for Asperger Syndrome using Raspberry Pi” involves IoT (Internet of Things) and
Robotics. This mirror not only allows the users to plan their daily schedules, but also helps them to be updated
with the environment such as weather conditions.

Keyword : Autism, LBPH, Viola- Jones, face detection, face recognition.


References:
1. Maheshwari, Piyush, Maninder Jeet Kaur, and Sarthak Anand. "Smart Mirror: A Reflective Interface to Maximize Productivity."
International Journal of Computer Applications 166.9 (2017).
2. Vaibhav Khanna,Yash Vardhan,Dhruv Nair, Preeti Pannu “Design and Development of a Smart Mirror Using Raspberry Pi”.
International Journal Of Electrical, Electronics And Data Communication(IJEEDC) Volume05 Issue01(JAN-2017).
3. Abdullahil Kafi M, Shaikh Ashikul Alam,Sayeed Bin Hossain “Artificially Intelligent SmartMirror using Raspberry Pi” International
Journal of Computer Applications (0975 – 8887)Volume 180 – No.16, February 2018
4. Suryansh Chandel, AshayMandwarya, S.Ushasukhanya “Implementation Of Magic Mirror Using Raspberry Pi 3” International Journal
of Pure and Applied Mathematics, Volume 118 (451-455) Nov 2018.
5. D.K. Mittal, V. Verma, R. Rastogi “A Comparative Study and New Model for Smart Mirror”, International Journal of Scientific
Research in Computer Science and Engineering(IJSRCSE)-Volume-5,Issue 6,(DEC-2017).
6. Sonal, Jagdish A. Pateljayshri T. Sadgir, and D. Sangaleharshada A. Dokhale. "A Review Paper Design and Development of a Smart
Mirror Using Raspberry Pi."
7. Divyashree K J, Dr.P.A.Vijaya, Nitin Awasthi "Design And Implementation Of Smart Mirror As A Personal Assistant Using Raspberry
Pi" International Research Journal of Engineering and Technology(IRJET),Volume:05 Issue:05 | May-2018
8. Vivek.V, Homan Rajan.G, Vijay.R,Surendar.S, R.Geetha, “IOT Enabled Smart Mirror for Physically Challenged” International Journal
of Innovative Research in Science, Engineering and Technology, Volume 7 Special Issue 2, March 2018.
9. Kamineni, B.T.Sundari,A.Prakash, K.Suparna, R.KrishnaNayak “Using Raspberry Pi To Design Smart Mirror Applications”,
International Journal of Emerging Trends in Science and Technology, IJETST- Volume 5 Issue 4Pages65856589||April||ISSN2348-
9480 NOV-2018.
10. Thandekkattu, Salu George, and N. Rao Vajjhala. "Smart Mirror-Network Architecture Based on Iot and Cloud Computing
Technology." Management Challenges in a Network Economy: Proceedings of the MakeLearn and TIIM International Conference,
Lublin, Poland. 2017.
11. Prof. P Y Kumbhar, Allauddin Mulla Kanagi , Ritesh Shah “SmartMirror Using Raspberry PI” International Journal for Research in
Emerging science and Technology,Volume-5, issue-4, Apr-2018
12. [12]Patil, Sheetal, et al. "Smart Mirror Integrated With Smart Assistant." (2018).
13. Jenny Savani , Suchhanda Das, Sooryabhan Singh,Preetam Swaraj, Vijayalakshmi K, “Smart Mirror For Smart Lifestyle”, International
Journal of Advance Research and Innovative Ideas in Education , Volume 4 Issue2 2018
14. [14]S.Thiyagarajan, Dr.G.Saravana Kumar, E.Praveen Kumar, G.Sakana “Implementation of Optical Character Recognition Using
Raspberry Pi for Visually Challenged Person” International Journal of Engineering & Technology 7 (3.34) (2018) 65-67
15. Poh, Ming-Zher, Daniel McDuff, and Rosalind Picard. "A medical mirror for non-contact health monitoring, acm siggraph 2011
emerging technologies." (2011): 07-11.
16. [16]Viola Paul, and Michael Jones "Rapid Object Detection Using A Boosted Cascade Of Simple Features." Computer Vision and
Pattern Recognition, 2001. CVPR 2001. Proceedings of the 2001 IEEE Computer Society Conference on. Vol. 1. IEEE, 2001.
17. Suma S L,Sarika Raga “Real Time Face Recognition of Human Faces by using LBPH and Viola Jones Algorithm”, International
Journal of Scientific Research in Computer Science and Engineering Vol.6, Issue.5, pp.06-10, October 2018
18. R.M.B.N. Siripala, M. Nirosha,P.A.D.A.Jayaweera , N.D.A.S. Dananjaya,Ms. S.G.S.Fernando “Raspbian Magic Mirror-A
SmartMirror to Monitor Children by Using Raspberry Pi Technology", International Journal of Scientific and Research Publications,
Volume 7, Issue 12, December2017
19. Suma S L, Sarika Raga "Real Time Face Recognition of Human Faces by using LBPH and Viola Jones Algorithm", International
Journal of Scientific Research in Computer Science and Engineering Vol.6, Issue.5, pp.06-10, October (2018).

Authors: A. Praveen Kumar, L. Ponraj Sankar, D. Maneiah, Gaddam Upendra

Paper Title: Lateral Crushing and Energy Absorption Behavior of Multicellular Tube Structures
Abstract: Thin-walled metallic tubular elements are extensively employed as an impact energy attenuator in
modern vehicles owing to light weight, easy fabrication and average cost. Besides, the novel multi-cell tubular
structures have superior energy absorption characteristics related to a conventional simple cell tube. In this
research article, the finite element simulation of thin-walled aluminium alloy extruded multicellular structure
under lateral impact loading is investigated. Nonlinear impact simulations were performed on multicellular tubes
of various configurations using finite element ABAQUS/CAE explicit code. From the outcomes attained, the
energy absorption capability of various multicellular tube structures were compared and it shows that
multicellular tubes have more remarkable than that of traditional simple cell tubes. Moreover, square shaped
multicellular structure tube were retained as most prominent for higher energy absorption. This type of
multicellular tubes was found to be effective one to improve the lateral crashworthiness performance.

470. Keyword : Lateral load, multi-cell tube, crashworthiness, collision, Computation, Simulation.
2684-
References: 2687
1. A. Praveen Kumar, 2019. Experimental analysis on the axial crushing and energy absorption characteristics of novel hybrid
aluminium/composite-capped cylindrical tubular structures, Proceedings of the Institution of Mechanical Engineers, Part L: Journal of
Materials: Design and Applications; 233 (11):2234-2252.
2. Lu, G., & Yu, T. X. (2003). Energy absorption of structures and materials. Elsevier.
3. A. Praveen Kumar, S. Shrivaathsav, 2019. Influence of forming parameters on the crash performance of capped cylind rical tubes using
LS‑DYNA follow‑on simulations. International Journal on Interactive Design and Manufacturing, 13(3): pp. 1215–1232.
4. Hundley, J. M., Schaedler, T. A., Yang, S. S., & Jacobsen, A. J. (2019). U.S. Patent Application No. 16/425,566
5. A. Praveen Kumar (2019). Influence of plain end-cap on the energy absorption characteristics of cylindrical tubular structures for
lateral impact vehicle collisions. Thin-Walled Structures, 138 (C), pp. 32-45.
6. Jin, N., Wang, F., Wang, Y., Zhang, B., Cheng, H., & Zhang, H. (2019). Failure and energy absorption characteristics of four lattice
structures under dynamic loading. Materials & Design, 169, 107655.
7. A. Praveen Kumar and D. Manieah, Deformation Studies on the Significance of Combined Geometry Tubes as Energy Absorbing
Structures, International Journal of Civil Engineering and Technology 10(1), 2019, pp. 2812–2820.
8. Zheng, M., Yin, Z., Teng, H., Liu, J., & Wang, Y. (2019). Energy Absorption of Highly Ductile Materials. In Elastoplastic Beh avior of
Highly Ductile Materials (pp. 155-173). Springer, Singapore.
9. Zhang Zong-hua, LIU Shu-tian. Crashworthiness of dynamical axial crushing of polygonal thin-walled tubes SAE-C2007. Tianjin,
China, 2007: 437−443.
10. Yin, H., et al. (2019). Multi-Objective Optimization Design of Functionally Graded Foam-Filled Graded-Thickness Tube Under
Lateral Impact. International Journal of Computational Methods, 16(01), 1850088.

Authors: Abdulrahman Mohammed Hussein Obaid, Santyyosh Kumar Pani, Prasant Kumar Pattnaik
An improved PBMM Algorithm by Reduce Cloud Data Traffic and Transfer Costs in Cloud of
Paper Title:
Things
Abstract: Cloud computing has been widely studied over the recent years. Researchers have developed
different algorithms for improving the performance and minimizing the cost. This paper proposes a new
algorithm to improve and enhance the PBMM algorithm (Priority Based on Min-Min Algorithm). The proposed
algorithm works with the aid of one of the Cloud of Things (CoT) services; this service is Sensing and Actuation
as a Service (SAaaS). The proposed Algorithm works on third-party broker. However, it has two-phase: the first
phase is Sensing: in this phase, the sensor observes the throughput for all tasks and compares it with the link
capacity. The Second phase is Actuation: depending on the comparison in the first phase, the priority of all the
takes will change depending on the link capacity, all tasks will have the same priority if the throughput is low
(Green throughput). All tasks will have two priority levels (high, low) if the throughput medium (Yellow
throughput), and finally, if the throughput is high (red throughput) all tasks will have a default priority which
assigned to them when they are created. However, the efficiency and performance of the IPBMM algorithm
depend on the capacity of the link. If capacity is high (traffic in the network is high), the performance is very
good and the costly, but if the capacity is medium (traffic in the network is medium), the performance is good as
well as the cost. While if the capacity is low (traffic in the network is low), the performance is good and the cost
is free. Therefore, the outcomes of the proposed algorithm experiment given 30% better results than the PBMM
algorithm and other state-of-the-art algorithms.

Keyword : Cloud Computing, Cloud of Things, Cloud Task Scheduling, PBMM algorithm, User-Priority.
References:
1. M. Aazam, I. Khan, A. A. Alsaffar, and E.-N. Huh, "Cloud of Things: Integrating Internet of Things and cloud computing and the
issues involved," in Proceedings of 2014 11th International Bhurban Conference on Applied Sciences & Technology (IBCAST)
Islamabad, Pakistan, 14th-18th January, 2014, 2014, pp. 414-419.
2. S. Abdelwahab, B. Hamdaoui, M. Guizani, and T. Znati, "Cloud of things for sensing as a service: sensing resource discovery and
virtualization," in 2015 IEEE Global Communications Conference (GLOBECOM), 2015, pp. 1-7.
3. S. Abrishami, M. Naghibzadeh, and D. H. Epema, "Deadline-constrained workflow scheduling algorithms for infrastructure as a
service clouds," Future Generation Computer Systems, vol. 29, pp. 158-169, 2013.
471. 4. Botta, W. De Donato, V. Persico, and A. Pescapé, "On the integration of cloud computing and internet of things," in 2014 Inte rnational
Conference on Future Internet of Things and Cloud, 2014, pp. 23-30.
5. Botta, W. De Donato, V. Persico, and A. Pescapé, "Integration of cloud computing and internet of things: a survey," Future ge neration 2688-
computer systems, vol. 56, pp. 684-700, 2016. 2699
6. E.-K. Byun, Y.-S. Kee, J.-S. Kim, and S. Maeng, "Cost optimized provisioning of elastic resources for application workflows," Future
Generation Computer Systems, vol. 27, pp. 1011-1026, 2011.
7. R. N. Calheiros and R. Buyya, "Meeting deadlines of scientific workflows in public clouds with tasks replication," IEEE Transactions
on Parallel and Distributed Systems, vol. 25, pp. 1787-1796, 2013.
8. R. N. Calheiros, R. Ranjan, A. Beloglazov, C. A. De Rose, and R. Buyya, "CloudSim: a toolkit for modeling and simulation of c loud
computing environments and evaluation of resource provisioning algorithms," Software: Practice and experience, vol. 41, pp. 2 3-50,
2011.
9. S. S. Chauhan, E. S. Pilli, R. Joshi, G. Singh, and M. Govil, "Brokering in interconnected cloud computing environmen ts: A survey,"
Journal of Parallel and Distributed Computing, 2018.
10. M. Díaz, C. Martín, and B. Rubio, "State-of-the-art, challenges, and open issues in the integration of Internet of things and cloud
computing," Journal of Network and Computer applications, vol. 67, pp. 99-117, 2016.
11. S. H. H. Madni, M. S. A. Latiff, M. Abdullahi, and M. J. Usman, "Performance comparison of heuristic algorithms for task sche duling
in IaaS cloud computing environment," PloS one, vol. 12, p. e0176321, 2017.
12. Mohammed, H. Obaid, P. K. Pattnaik, and S. K. Pani, "Towards on Cloud of Things: Survey, Challenges, Open Research Issues, and
Tools," in 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), 2018, pp.
1458-1463.
13. M. H. Obaid, S. K. Pani, and P. K. Pattnaik, "A priority based on min-min algorithm for reducing make span task scheduling in cloud
computing," 2018, vol. 7, p. 5, 2018-09-07 2018.
14. G. Patel, R. Mehta, and U. Bhoi, "Enhanced load balanced min-min algorithm for static meta task scheduling in cloud computing,"
Procedia Computer Science, vol. 57, pp. 545-553, 2015.
15. R. K. Raju, P. S. Varma, M. Sundari, and G. J. Moses, "Deadline aware two stage scheduling algorithm in cloud computing," Ind ian
Journal of Science and Technology, vol. 9, pp. 1-10, 2016.
16. R. Ramakrishnan and L. Gaur, "Smart electricity distribution in residential areas: Internet of Things (IoT) based advanced metering
infrastructure and cloud analytics," in 2016 International Conference on Internet of Things and Applications (IOTA), 2016, pp. 46-51.
17. R. Ranjan, L. Wang, P. P. Jayaraman, K. Mitra, and D. Georgakopoulos, "Special issue on Big Data and Cloud of Things (CoT),"
Software: Practice and Experience, vol. 47, pp. 345-347, 2017.
18. Shanthan, A. D. V. Kumar, E. Govindrajan, and L. Arockian, "Scheduling for Internet of Things Applications on Cloud: A Review,"
Imperial Journal of Interdisciplinary Research, vol. 3, 2017.
19. M.-A. Vasile, F. Pop, R.-I. Tutueanu, V. Cristea, and J. Kołodziej, "Resource-aware hybrid scheduling algorithm in heterogeneous
distributed computing," Future Generation Computer Systems, vol. 51, pp. 61-71, 2015.
20. L. Zeng, B. Veeravalli, and X. Li, "SABA: A security-aware and budget-aware workflow scheduling strategy in clouds," Journal of
parallel and Distributed computing, vol. 75, pp. 141-151, 2015.
21. A. C. Zhou, B. He, and C. Liu, "Monetary cost optimizations for hosting workflow-as-a-service in IaaS clouds," IEEE Transactions on
Cloud Computing, vol. 4, pp. 34-48, 2015.

Authors: Mulyani, Rudy Aryanto

472. Paper Title: New Meeting Form in the Digital Working Environment Era
Abstract: Digital progress has had an impact on almost every aspect of human life, including the work 2700-
environment. The digital era gave birth to an all-digital work environment, which gave birth to new forms of 2705
work, one of which was teamwork that could be carried out without the limitation of distance that is commonly
called a virtual team through virtual meeting. This research using qualitative research method to collect data
from respondents through deep interview. Respondent are selected by purposive sampling method with several
consideration such as their engagement in virtual meeting process. The result of our study shows that quality of
communication tools really influences the quality of virtual meeting and influence all the aspect of virtual
meeting effectiveness. Our research also found that training not become significant needs because they quite
familiar with the technology and they have IT division to prepare all supporting tools to prepare all tools for
virtual meeting needs. Significant thing that must well prepare to make every virtual meeting effectively is
quality of internet connection.

Keyword : Team virtual, virtual meeting, digital work environment, human computer interaction, digital
teamwork
References:
1. F. M. Horwitz, D. Bravington, and U. Silvis, “The promise of virtual teams : identifying key factors in effectiveness and failure.”
2. W. F. Cascio, “Managing a Virtual Workplace,” Acad. Manag. Exec., vol. 14, no. 3, 2001.
3. L. Arnison and Pe. Miller, “Forum Virtual teams : a virtue for the conventional team,” J. Work. Learn., vol. 14, no. 4, pp. 166–
173, 2002.
4. B. J. Bergiel, E. B. Bergiel, W. Georgia, and P. W. Balsmeier, “Nature of virtual teams : a summary of their advantages and
disadvantages,” vol. 31, no. 2, pp. 99–110, 2008.
5. T. Succeed, D. L. Duarte, and N. T. Snyder, “Mastering Virtual Teams.”
6. L. Kimball et al., “Managing Virtual Teams,” 1997.
7. R. De Jong, “Virtual communicating , conflicts and performance in teams,” 2008.
8. L. J. Gressga, “Virtual team collaboration and innovation in organizations,” 2009.
9. P. M. Beranek and B. Martz, “Making virtual teams more effective : improving relational links,” 1998.
10. N. A. Ebrahim, S. Ahmed, and Z. Taha, “Virtual Teams : a Literature Review,” vol. 3, no. 3, pp. 2653–2669, 2009.
11. L. Delgado Piña, M., María Romero Martínez, A. and Gómez Martínez, “Teams in organizations : a review on team
effectiveness,” Team Perform. Manag., vol. 14, no. 1/2, pp. 7–21, 2008.
12. K. Prasad and K. B. Akhilesh, “Global virtual teams : what impacts their design and performance ?,” pp. 102–112.
13. A. Powell, J. Galvin, and G. Piccoli, “Antecedents to team member commitment from near and far virtual teams,” vol. 19, no. 4 ,
pp. 299–322.
14. K. Lahenius and E. Jarvenpaa, “Managing a virtual team of newspaper journalists : a case study,” Team Perform. Manag., vol.
10, no. 7, pp. 173–177, 2004.
15. M. Indiramma and K. R. Anandakumar, “Behavioral Analysis of Team Members in Virtual Organization based on Trust
Dimension and Learning,” pp. 14–19, 2010.
16. L. Lee-kelley, A. Crossman, and A. Cannings, “A social interaction approach to managing the ‘ invisibles ’ of virtual teams,” no.
June 2003, pp. 650–657, 2004.
17. A. Kankali and B. C. . Tan, “Conflict and Performance in Global Virtual Teams Atreyi Kankanhalli Forthcoming : Journal of
Management Information Systems,” J. Manag. Inf. Syst., no. 65.
18. P. L. Hunsaker and J. S. Hunsaker, “Virtual teams : a leader ’ s guide,” vol. 14, no. 1, pp. 86–101, 2008.
19. A. Gaudes, B. Hamilton-bogart, and S. Marsh, “A Framework for Constructing Effective Virtual Teams,” vol. 1, no. December,
pp. 83–97, 2007.
20. [K. M. Chudoba, M. Lu, and M. B. Watson-manheim, “How virtual are we ? Measuring Virtuality and Understanding Its Impact
in a Global Organization How virtual are we ? Measuring Virtuality and Understanding Its Impact in a Global Organization,” no.
July, pp. 1–37, 2004.
21. V. Ratcheva and S. Vyakarnam, “Exploring team formation processes in virtual partnerships,” Integr. Manuf. Syst., vol. 12, no. 7,
pp. 512–523, 2001.
22. P. L. Curseu, R. Schalk, and I. Wessel, “How do virtual teams process information ? A literature review and implications for
management,” J. Mangerial Psychol., vol. 23, no. 6, pp. 628–652, 2008.
23. P. Kenny and I. G. Johnson, “Social media use, attitudes, behaviours and perceptions of online professionalism amongst dental
students,” Br. Dent. J., 2016.
24. G. Piccoli, A. Powell, and B. Ives, “Virtual teams : team control structure , work processes , and team effectiveness,” vol. 17, no.
4, pp. 359–379.
25. F. W. Dulle and M. K. Minishi-Majanja, “The suitability of the unified theory of acceptance and use of technology (utaut) model
in open access adoption studies,” Inf. Dev., vol. 27, no. 1, pp. 32–45, 2011.
26. P. Johnson, V. Heimann, K. O. Neill, P. Johnson, V. Heimann, and K. O. Neill, “Forum The `` wonderland ’ ’ of virtual teams,”
vol. 13, no. 1, 2001.
27. J. Kratzler, R. T. A. . Leenders, and J. M. . Engelen, “Keeping Virtual R&D Teams Creative,” Res. Manag., vol. 48, no. 2, pp.
13–16, 2005.
28. Z. Jin, “innovation and virtual institutes,” vol. 3, no. 1, pp. 75–83, 1999.
29. L. M. Peters and C. C. Manz, “Identifying antecedents of virtual team collaboration,” vol. 13, no. 3, pp. 117–129, 2007.
30. A. Malhotra and A. Majchrzak, “Enabling knowledge creation in far- ¯ ung teams : best practices for IT support and knowledge
sharing,” vol. 8, no. 4, pp. 75–88, 2004.

Authors: Arvind Vishnubhatla

Paper Title: Simulating Multimedia IOT


Abstract: While working with IOT projects with camera sensor ,the cost of hardware becomes prohibitive as
it is not possible to duplicate the hardware for a large number of sensors. Here we need to have lots of
473. multimedia sensors which send image data. The image data so generated is to be compressed at the client node
suitably using some transform. To make a cost effective client we simulate it as a client process in linux. .Here a
2706-
random number generator is used to generate an image sample. In this implementation we use a wavelet
2708
transform to compress the generated image. This is then sent over a socket to the server process. On the server
side a stream socket receives the image data which is then suitably decompressed. Here a broad range of image
processing algorithms are applied to enhance the image, threshold and segment it. Here different morphological
operations are applied to isolate the region of interest. There could be multiple clients generated in several
windows. This way a cost effective client and server is implemented to simulate the IOT architecture.

Keyword : Simulate, Multimedia , IOT, Linux , Client ,Server


References:
1. Benatallah, B.; Casati, F.; Toumani, F. (2004). "Web service conversation modeling: A cornerstone for e-business automation". IEEE
Internet Computing. 8: 46–54. doi:10.1109/MIC.2004.1260703.
2. Dustdar, S.; Schreiner, W. (2005). "A survey on web services composition" (PDF). International Journal of Web and Grid Services. 1:
1. CiteSeerX 10.1.1.139.4827. doi:10.1504/IJWGS.2005.007545
3. Harper, Douglas. "server". Online Etymology Dictionary. Retrieved 30 November 2013.
4. Tolia, Niraj; Andersen, David G.; Satyanarayanan, M. (March 2006). "Quantifying Interactive User Experience on Thin Clients"
5. Otey, Michael (22 March 2011). "Is the Cloud Really Just the Return of Mainframe Computing?". SQL Server Pro. Penton Media.
Retrieved 1 December 2013.
6. Barros, A. P.; Dumas, M. (2006). "The Rise of Web Service Ecosystems". IT Professional. 8 (5): 31. doi:10.1109/MITP.2006.123
7. Nieh, Jason; Yang, S. Jae; Novik, Naomi (2000). "A Comparison of Thin-Client Computing Architectures". Academic Commons.
doi:10.7916/D8Z329VF. Retrieved 28 November 2018
8. "Distributed Application Architecture" (PDF). Sun Microsystem. Archived from the original (PDF) on 6 April 2011. Retrieved 2009-
06-16.

Authors: S. Kiruthika, I. Kaspar Raj


Liver Segmentation in Computed Tomography Abdomen Images Based on Particle Swarm
Paper Title:
Optimization and Morphology
Abstract: Segmenting liver from abdominal images is a thought-provoking task. A method for segmenting
liver region from CT abdomen is proposed in this paper. Particle Swarm Optimization (PSO) method is
employed for segmenting multiple regions in the abdomen image. Morphological operation such as Erosion and
Dilation is used for segmenting exact portion of liver. Largest connected component and filling holes operation
are applied as supporting techniques for image corrections. Experiment on our proposed segmentation approach
is carried out and the results are discussed. The quantitative validation was performed with Dice similarity co-
efficient metric.

Keyword : CT Liver, PSO, Morphology, Segmentation


References:
1. J Hu, J Huang, X Liu and Z Zuo, “Cliinical Anaatomy of Liver. In: Huang J, Liu X, Hu J (eds), Aatlas of Anatomic Hepatic Resection
for Hepatocellular Carcinoma. Springer, Singapore. 2019.
474. 2. M Moghbel, S Mashohor, R Mahmud and MI Saripan, “Automaic Liver Segmentation on Computed Tomography Using Random
Walkers Treatment Planning”, EXCLI Journal, vol.15, pp.500-517, 2016. 2709-
3. Dushyant V.Sahani and Sanjeeva P.Kalva, “Imaging the Liver”, The Oncologist Hepatobiliary, pp.385-397, 2004.
2713
4. Amita Das and SK Sabut, “Kernelized fuzzy c-means clustering with adaptive thresholding for segmenting liver tumours”, Hurs
Procedia Computer Science, vol.92, pp.389-395, 2016
5. Huiyan Jiang, He Baochun, MA Zhiyuan , Mao Zong, Xiangrong Zhou and Hiroshi Fujita, “Liver Segmentation Based on Snakes
Midel and Improved Grow cut algorithm in Abdominal CT Image”, Computational and Mathematical Methods in Medicine, vol.2013,
Article ID 958398, 12 pages, 2013.
6. Abdalla Mostafa, Mohamed Abd Elfattah, Ahmed Fouad Hassanien, and Hesham Hefny, “Enhanced Region growing segmentation for
CT Liver Images”, The 1st International Conference on Advanced Intelligent System and Informatics (AISI2015), Egypt, vol. 407 , pp.
115-127, 2015.
7. Sathya P.Duraisamy and Ramanujam Kayalvizhi, “A new multilevel thresholding method using Swarm intelligence algorithm for
Image Segmentation”, Journal of Intelligent Learning Systems & Applications, vol.2, pp.126-138,2010.
8. Kennedy J. and Eberhart R., “Particle Swarm Optimization,” in Proceedings of IEEE International Conference on Neural Networks,
Australia, vol.4, pp.1942-1948, 1995.
9. Pedram Ghamisi, Micael S. Couceiro, Jón Atli Benediktsson and Nuno M.F. Ferreira. “An Efficient Method for Segmentation of
Images Based on Fractional Calculus and Natural Selection”, Expert Systems with Applications, Elsevier,39,12407-12417, 2012.
10. J Serra, “Image Analysis and Mathematical Morphology”, Academic Press, London, 1982.
11. P Soille, “Morphological Image Analysis: Principles and Applications”, Springer-Verlag, 1999, pp. 173–174.
12. L. Dice, “Measures of the amount of ecologic association between species”, Ecology, Vol. 26, pp.297-302, 1945.

Authors: E. Chandra Blessie, R. Rekha

Paper Title: Exploring the Machine Learning Algorithm for Prediction the Loan Sanctioning Process
Abstract: Extending credits to corporates and individuals for the smooth functioning of growing
economies like India is inevitable. As increasing number of customers apply for loans in the banks and non-
banking financial companies (NBFC), it is really challenging for banks and NBFCs with limited capital to
device a standard resolution and safe procedure to lend money to its borrowers for their financial needs. In
475. addition, in recent times NBFC inventories have suffered a significant downfall in terms of the stock price. It has
contributed to a contagion that has also spread to other financial stocks, adversely affecting the benchmark in
2714-
recent times. In this paper, an attempt is made to condense the risk involved in selecting the suitable person who
2719
could repay the loan on time thereby keeping the bank’s non-performing assets (NPA) on the hold. This is
achieved by feeding the past records of the customer who acquired loans from the bank into a trained machine
learning model which could yield an accurate result. The prime focus of the paper is to determine whether or not
it will be safe to allocate the loan to a particular person. This paper has the following sections (i) Collection of
Data, (ii) Data Cleaning and (iii) Performance Evaluation. Experimental tests found that the Naïve Bayes model
has better performance than other models in terms of loan forecasting.
Keyword : Loan Prediction, Big data, Machine Learning, Logistic Regression, SVM, Decision Tree, Naïve
Bayes.
References:
1. Aboobyda Jafar Hamid and Tarig Mohammed Ahmed, “Developing Prediction Model of Loan Risk in Banks using Data Mining”,
Machine Learning and Applications: An International Journal (MLAIJ), Vol.3, No.1, pp. 1-9, March 2016.
2. S. Vimala, K.C. Sharmili, “Prediction of Loan Risk using NB and Support Vector Machine”, International Conference on
Advancements in Computing Technologies (ICACT 2018), vol. 4, no. 2, pp. 110-113, 2018.
3. Aditi Kacheria, Nidhi Shivakumar, Shreya Sawkar, Archana Gupta, “Loan Sanctioning Prediction System”, International Journal of
Soft Computing and Engineering (IJSCE), vol. 6, no. 4, pp. 50-53, 2016.
4. X. Francis Jency, V.P.Sumathi, Janani Shiva Sri, “An Exploratory Data Analysis for Loan Prediction Based on Nature of the Clients”,
International Journal of Recent Technology and Engineering (IJRTE), Vol. 7, No. 48, pp. 176-179, 2018.
5. Anchal Goyal, Ranpreet Kaur, “Loan Prediction Using Ensemble Technique”, International Journal of Advanced Research in Computer
and Communication Engineering, Vol. 5, Issue 3, pp. 523 – 526, March 2016.
6. Anchal Goyal, Ranpreet Kaur, “Accuracy Prediction for Loan Risk using Machine Learning Models”, International Journal of
Computer Science Trends and Technology (I JCST), Vol. 4, Issue 1, pp. 52-57, Jan - Feb 2016
7. Sudhamathy, “Credit Risk Analysis and Prediction Modelling of Bank Loans using R”, International Journal of Engineering and
Technology (IJET), Vol. 8, No. 5, pp. 1954-1966, Oct-Nov 2016.
8. Pidikiti Supriya, Myneedi Pavani, Nagarapu Saisushma, Namburi Vimala Kumari, K. Vikas, “Loan Prediction by using Machine
Learning Models”, International Journal of Engineering and Techniques, Vol. 5, Issue 2, pp. 144-148, Mar-Apr 2019.
9. Kumar Arun, Garg Ishan, Kaur Sanmeet, “Loan Approval Prediction based on Machine Learning Approach”, IOSR Journal of
Computer Engineering (IOSR-JCE), Vol. 18, Issue 3, pp. 79-81, Ver. I (May-Jun. 2016).
10. How Decision tree algorithm works, https://dataaspirant.com/2017/01/30/how-decision-tree-algorithm-works/
11. Naive Bayes — Probabilistic Algorithm, https://medium.com/datadriveninvestor/naive-bayes-probabilistic-algorithm-68d5a6647738
12. Loan Prediction Dataset Source, https://www.kaggle.com/uttam96/ loanpred.
13. Supervised Learning with Python, https://www.datascience.com/blog/ supervised-learning-python.
14. K. Kavitha, “Clustering Loan Applicants based on Risk Percentage using K-Means Clustering Techniques”, International Journal of
Advanced Research in Computer Science and Software Engineering, vol. 6(2), pp.162–166, 2016.

Authors: Arvind Vishnubhatla

Paper Title: Unit Testing of ETSI DECT Codec


Abstract: The low complexity communication codec (LC3Plus) plus performs audio quality tests which
are both subjective and objective ranging from narrowband to fullband are tested at clean and distorted
channels. The relevant DECT scenarios for transcoding and VOIP are investigated. In this paper we take
LC3Plus from ETSI and test the correctness by compiling the program under linux environment.
A careful planning of the test stimuli helps create useful test cases for `testing the LC3Plus encoder and
decoder. Testing is performed meticulously to verify the correctness of the standard.

476. Keyword : speech, codec, LC3Plus, stimuli , testing, linux


2720-
References: 2722
1. IETF RFC 3264: "An Offer/Answer Model with Session Description Protocol (SDP)", Rosenberg, J. and H. Schulzrinne, June 2002.
2. IETF RFC 3550: "RTP: A Transport Protocol for Real-Time Applications", STD 64, Schulzrinne, H., Casner, S., Frederick, R. and V.
Jacobson, July 2003.
3. IETF RFC 3551: "RTP Profile for Audio and Video Conferences with Minimal Control", STD 65, Schulzrinne, H. and S. Casner, July
2003.
4. IETF RFC 4855: "Media Type Registration of RTP Payload Formats", Casner, S., February 2007.
5. IETF RFC 4566: "SDP: Session Description Protocol", Handley, M., Jacobson, V., and C. Perkins, July 2006. NOTE: Available at
https://www.rfc-editor.org/info/rfc4566.
6. IETF RFC 4867: "RTP Payload Format and File Storage Format for the Adaptive Multi-Rate (AMR) and Adaptive Multi-Rate
Wideband (AMR-WB) Audio Codecs", Sjoberg, J., Westerlund, M., Lakaniemi, A., April 2007.
7. European Broadcasting Union: "Sound Quality Assessment Material recordings for subjective tests".

Authors: T. Mohankumar, K. Rajan, K. Sivakumar, V. Gopal


Performance of Heat Transfer and Friction Factor of Heat Exchanger with Al2o3/ Water Nano
Paper Title:
Fluids
Abstract: This paper summary of heat transfer characteristics and nano fluids mechanics by using single
phase convection techniques. Gas having less thermal conductivity compare than the liquids having high thermal
conductivity. The heat transfer enhancement improved by using nano fluids Al2O3 compared with base water.
The heat transfer enhancement was analysed with plain tube and twisted tape inserts with nano fluids. The
experimental investigation was analysed and reading was taken to improve the heat transfer and friction flow
characteristics. The Reynolds number varies from different ranges with plain water and Nano fluids. The
477.
experimental record of nano fluid heat transfer value was increased with 2.89 percentage compare with the
experimental record of plain water. The nano fluids has more concentration than the plain water. 2723-
2726
Keyword : Heat transfer, Nanofluids, Twisted tape, Reyolds number
References:
1. S. K. Das, Stephen U. S. Choi and H. E. Patel “Heat Transfer in Nanofluids-A Review” Heat Transfer Engineering, Taylor & Fracis,
Vol. 27 (10), 3-19, 2006.
2. J. A. Eastman, S. U. S. Choi, W. Yu and L. J. Thompson et al.“Anomalously increased effective thermal conductivities of ethyl ene
glycol-based Nanofluids containing copper nanoparticles” Applied Physics Letters, Vol. 78, February 2001.
3. C. Choi, H.S. Yoo, J. M. Oh, “Preparation and heat transfer properties of nanoparticles-in-transformer oil dispersions as advanced
energy-efficient coolants”, Current Applied Physics 8 (2008) 710-712.
4. Yulong Ding, Haisheng Chen et. al. “Heat Transfer Intensification Using Nanofluids”, KONA No.25, 23-34, 2007.
5. A. K. Singh, “Thermal Conductivity of Nanofluids”, Defence Science Journal, Vol. 58(5), 600-607, Sep.2008.
6. Yimin Xuan and Wilfried Roetzel, “Conceptions for heat transfer correlation of nanofluids”, International Journal of Heat and Mass
Transfer: Pergamon, Vol.43, 3701-3707, 2000.
7. K.Sivakumar, Dr.K.Rajan,”(2019) Experimental investigation of heat transfer and friction factor characteristics in circular tube fitted
with triangular cut twisted tape inserts(TCTT),” Proc. Natl. Acad. Sci., India, Sect. A Phys. doi.org/10.1007/s40010-018-0573-8.
8. Lazarus Godson et. al. “Enhancement of heat transfer using nanofluids” Renewable and Sustainable Energy Reviews:Elsevier, Vol. 14,
pp. 629–641, 2010.
9. K.Sivakumar,Dr.K.Rajan, “ Experimental Analysis of heat transfer Enhancement in a circular tube with different twist ratio of twisted
tube inserts,” International Journal of Heat and Technology, Vol 33, No,3, pp.158-162,2015.

Authors: Răzvan Vîlceanu, Andrei Ternauciuc, Mihai Onița

Paper Title: A Student Smart Parking Solution using Raspberry Pi


Abstract: The concept of a smart city was born out of the need to provide improved quality of life to
citizens in various fields, such as environment, governance, education, economy, infrastructure, transportation,
traffic, and parking. There are many countries, many players and many projects already finished or underway.
The city of Timisoara has already taken the first steps towards a smart city. It has high potential in this regard,
but for the moment is still lacking in some key areas. For example, Timisoara has excessive traffic and usually
overcrowded parking lots without some efficient monitoring solutions. As a result of this fact, a team made up of
a Master student in his second year of studies, and two faculty coordinating members propose a parking
management solution based on a very restrictive budget.
The low-cost prototype we developed for testing purposes contains a mockup parking platform with 8 parking
spaces, one Raspberry Pi Zero W micro-computer, and a camera module attached to the Raspberry Pi. The idea
is to broadcast live feed towards a computing platform tasked with identifying the available parking spots and
consequently transmit this information in real-time, via the Internet, to interested parties. We tested and
compared two detection algorithms based on corner detection of the parking spots, and the detection of circles
placed inside the parking spot, respectively. These algorithms were implemented using open-source technologies
such as Python version 3.6.5, OpenCV 3.4.0 specialized modules and functions, digital processing (NumPy),
chart plotting (Matplotlib) and data formatting (JSON). The main functions we used were: cv2.imread,
cv2.imshow, cv2.imwrite, cv2.VideoCapture, cv2.line, cv2.circle, cv.puttext, cv2.rectangle, cv2.elipse, cv2.blur,
cv2.gaussianblur, cv2.canny, cv2.houghlinesp, cv2.houghcircles, cv2.hough_gradient and cv2.selectROI.
The solution we proposed is focused on improving the way the Politehnica University Timisoara’s staff and
students approach parking. It can reduce traffic congestion and the level of CO2 or other pollutants around
University buildings and surrounding areas. Overall traffic would be greatly diminished because the driving
lanes would mainly be used for transportation, instead of low-speed cruising in search of a free parking space.

Keyword : Smart Parking, Smart Cities, Computer Vision, Raspberry Pi, Python, Open CV
478.
References: 2727-
1. D. Sikora, “The Concept Of Smart City in the Theory and Practice of Urban Development Management”, Romanian Journal of
Regional Science, http://rjrs.ase.ro, Vol. 10, No. 1, Summer 2016, ISSN 18423-8520 2733
2. M. Kola-Bezka, M. Czupich, A. Ignasiak-Szulc, “Smart Cities in Central and Eastern Europe: viable future or unfulfilled
dream?”, Journal of International Studies, 2016, Vol. 9, No 1, pp. 76-87. DOI: 10.14254/2071-8330.2016/9-1/6
3. J-P. Exner, “Smart Cities - Field of application for Planning Support Systems in the 21st Century?”, Proceedings of CUPUM, The
14th International Conference on Computers in Urban Planning and Urban Management, 2015, ISBN: 978-0-692-47434-1
4. N. Bawany & S. Jawwad, “Smart City Architecture: Vision and Challenges”, International Journal of Advanced Computer
Science and Applications, 2015, Vol. 6, No. 11, DOI: 10.14569/IJACSA.2015.061132
5. S.D. Prakash, A. Kumar, S. Shekhar, A. Khant, “Understanding the Concept Of Smart Cities”, Scientific Journal of Impact Factor
(SJIF): 4.14, 2016, Volume 3, Issue 3, March, e-ISSN (O): 2348-4470, p-ISSN (P): 2348-6406
6. C. Vrabie and A.M. Tirziu, “Top ten smart cities in the world. What do they have in common and how can Eastern European
cities use that?” Munich Personal RePEc Archive, Online at https://mpra.ub.uni-muenchen.de/88291/, MPRA Paper No. 88291,
posted 8 August 2018, accessed 20.08.2019
7. L. Garfield, “These 10 cities are the most prepared for the future”, https://www.businessinsider.com/smart-cities-ranking-
easypark-group-2017-11/#10-%20melbourne-australia-received-a-perfect-score-on-its-4g-connectivity-1, accessed 20.07.2019
8. A. Ahad & Z. Khan, “Intelligent Parking System”, Scientific Research Publishing Inc., World Journal of Engineering and
Technology, 2016, 4, 160-167, http://dx.doi.org/10.4236/wjet.2016.42014
9. P. Kharde, S. Pal, S. Kawle, “Smart Parking System”, International Journal of Scientific Research in Computer Science,
Engineering and Information Technology, 2018, IJSRCSEIT, Volume 3, Issue 1, ISSN : 2456-3307
10. M. Fraifer and M. Fernström, “Investigation of Smart Parking Systems and their technologies”, Thirty Seventh International
Conference on Information Systems, Dublin 2016, Volume: “IoT & Smart City Challenges and Applications” - ISCA 2016,
http://iot-smartcities.lero.ie/wp-content/uploads/2016/12/Investigation-of-Smart-Parking-Systems-and-their-technologies.pdf,
accessed 17.09.2019
11. A. Šarić and B. Mihaljević, “Smart Parking System in the City of Dubrovnik”, RIThink Multidisciplinary Online Journal,
Volume 6, 2017, http://www.rithink.hr, accessed 07.09.2018
12. G. Anusooya, C. Jackson, K. Sathyarajasekaran and K. Kumar, “RFID Based Smart Car Parking System”, Research India
Publications, International Journal of Applied Engineering Research, 2017, Volume 12, Number 17, pp. 6559 -6563, ISSN 0973-
4562
13. A. Vimal, R. Yashvanth, J. Seetha, “Smart Parking Bay Based on Image processing and Internet of Things”, Research India
Publications, http://www.ripublication.com, International Journal of Applied Engineering Research, Volume 13, Number 6
(2018), pp. 4423-4427, ISSN 0973-4562
14. A. Gupta, S. Kulkarni, V. Jathar, V. Sharma, N. Jain, “Smart Car Parking Management System Using IoT”, American Journal of
Science, Engineering and Technology, 2017; 2(4): 112-119, doi: 10.11648/j.ajset.20170204.13
15. B. Sabbea, M. Irfan, S. Karama ALtamimi, S. Mabkhot, A. H. M. Almawgani and H. Alghamdi, “Design and Development of a
Smart Parking System”, Journal of Automation and Control Engineering Vol. 6, No. 2, December 2018, doi:
10.18178/joace.6.2.66-69
16. I. D. Dhaou, A. Kondoro, A. Hamad Alsabhawi, O. Guedhami and H. Tenhunen, “A Smart Parking Management System Using
IoT Technology”, Proceeding of The 22nd Conference Of Fruct Association, 2018, pp. 309-312, ISSN 2305-7254
17. P. Kamble1, S.Chandgude, K. Deshpande, C. Kumari and K. M. Gaikwad, “Smart parking system”, International Journal of
Advance Research and Development, 2018, Volume 3, Issue 4, pp.183-186, https://www.ijarnd.com/editions/volume-3-issue-4/,
accessed 17.09.2019
18. S. D. Marcu and A. Florea, “Smart parking system - another way of sharing economy provided by private institutions”,
Proceedings of Thirteenth International Conference on Digital Information Management, 2018, ICDIM, pp. 18-23, 2018, Berlin,
Germany, ISBN 978-1-5386-5244-2
19. MagPi Magazine, “Introducing Raspberry Pi Zero W”, written in 2017 https://www.raspberrypi.org/magpi/pi-zero-w/, accessed
10.09.2019
20. W. Harrington, “Learning Raspbian”, Published by Packt Publishing Ltd., 2015, ISBN 978-1-78439-219-2
21. S. Monk, “Raspberry Pi Cookbook”, Published by O’Reilly Media, 2016, ISBN 978-1-491-93910-9, 2016
22. Raspberry Documentation, “Camera Module v1 vs. Camera Module v2”,
https://www.raspberrypi.org/documentation/hardware/camera/, accessed 05.09.2019
23. OpenCV Documentation, “API Reference”
https://docs.opencv.org/2.4/modules/refman.html, accessed in 10.09.2019
24. O. D. Suarez, “OpenCV Essentials”, Publisher: Packt Publishing, 2014, ASIN: B00N1X693A, ISBN: 978-1783984244

Authors: M. Azhagiri, Sanjesh Chevanan, John Vivin, Samuel, Paul Davis


An Economical Incorporation of IoT and Edge/ Cloud Computing for Dynamic Distribution of IoT
Paper Title:
Analytics and Organized Utilization of Network Resources
Abstract: As the Internet of Things (IoT) keeps on picking up application in telecommunication networks,
an enormous number of devices are relied upon to be associated and utilised sooner rather than later. Wide scale
Internet of Things (IoT) systems with several deployed IoT devices, such as sensors, actuators and so on, that
generate a high volume of data is expected. This means that the volume of data is foretold to increase
substantially. Customarily, cloud services have been executed in huge datacenters in the central network. Be that
as it may, this is definitely not a long-haul adaptable choice as an exceptionally enormous number of gadgets are
required to be associated and utilised sooner rather than later. An adaptable and productive arrangement is to
disperse the IoT analytics between the core cloud and the network edge. This paper uses edge IoT analytics to
viably and economically convey the information from the IoT between the core cloud and the network edge.
First analytics can be completed on the edge cloud and just the essential information or results are sent for
further investigation. We have identified an approach to make this operation increasingly affordable.
479.
2734-
Keyword : IoT, Edge Computing, Datacenter, Cloud Network, Dynamic distribution 2736
References:
1. Babatunji Omoniwa ; Riaz Hussain ; Muhammad Awais Javed ; Safdar Hussain Bouk ; Shahzad A. Malik, Fog/Edge Computing -Based
IoT (FECIoT): Architecture, Applications, and Research Issues, 2018[1].
2. Shree Krishna Sharma ; Xianbin Wang, Live Data Analytics With Collaborative Edge and Cloud Processing in Wireless IoT Networks,
2017[2].
3. Bin Cheng ; Gürkan Solmaz ; Flavio Cirillo ; Ernö Kovacs ; Kazuyuki Terasawa ; Atsushi Kitazawa, FogFlow: Easy Programming of
IoT Services Over Cloud and Edges for Smart Cities, 2017[3].
4. Hongming Cai ; Boyi Xu ; Lihong Jiang ; Athanasios V. Vasilakos, IoT-Based Big Data Storage Systems in Cloud Computing:
Perspectives and Challenges, 2016[4].
5. Byungseok Kang ; Daecheon Kim ; Hyunseung Choo, Internet of Everything: A Large-Scale Autonomic IoT Gateway, 2017[5].
6. Anne H. Ngu ; Mario Gutierrez ; Vangelis Metsis ; Surya Nepal ; Quan Z. Sheng, IoT Middleware: A Survey on Issues and Enablin g
Technologies, 2016[6].
7. https://ieeexplore.ieee.org (Internet source)[7]
8. www.ijiert.org (Internet source)[8]

Authors: Mamdouh Alenezi, Mohammed Akour, Hiba Al Sghaier


The Impact of Co-evolution of Code Production and Test Suites through Software Releases in Open
Paper Title:
Source Software Systems
Abstract: The software system evolves and changes with the time, so the test suite must be maintained
according to code changes. Maintaining test cases manually is an expensive and time-consuming activity,
especially for large test suites, which has motivated the recent development of automated test-repair techniques.
Several researchers indicate that software evolution shows a direct impact on test suites evolution, as they have
strong relationships and they should be evolved concurrently. This article aims to provide statistical evidence of
having this significant relationship between the code production and its associated test suites. Seven systems
along with releases are collected and eight metrics were calculated to be used in this study. The result shows
480. how the systems under study are evolving and have a high impact on their test suites, although two metrics
provide a negative significant relationship. 2737-
2739
Keyword : Software Testing, Software evolution, complexity, size.
References:
1. Rwemalika, R., Kintis, M., Papadakis, M., Le Traon, Y. and Lorrach, P., 2019, April. On the Evolution of Keyword -Driven Test
Suites. In 2019 12th IEEE Conference on Software Testing, Validation and Verification (ICST) (pp. 335-345). IEEE.
2. S. Levin and A. Yehudai, “The co-evolution of test maintenance and code maintenance through the lens of fine-grained semantic
changes,” in 2017 IEEE International Conference on Software Maintenance and Evolution (ICSME), Sept 2017, pp. 35–46.
3. Z. Lubsen, A. Zaidman, and M. Pinzger, ‘Using association rules to study the co-evolution of production #x00026; test code’, in 2009
6th IEEE International Working Conference on Mining Software Repositories, 2009, pp. 151–154.
4. A. Zaidman, B. V. Rompaey, S. Demeyer, and A. v Deursen, ‘Mining Software Repositories to Study Co-Evolution of Production
#x00026; Test Code’, in and Validation 2008 1st International Conference on Software Testing, Verification, 2008, pp. 220 –229.
5. A. Zaidman, B. Van Rompaey, A. van Deursen, and S. Demeyer, ‘Studying the co-evolution of production and test code in open source
and industrial developer test processes through repository mining’, Empir. Softw. Eng., vol. 16, no. 3, pp. 325–364, Jun. 2011.
6. G. K. Gill and C. F. Kemerer, ‘Cyclomatic complexity density and software maintenance productivity’, IEEE Trans. Softw. Eng., vol.
17, no. 12, pp. 1284–1288, Dec. 1991.
7. Alenezi, M., Akour, M., Hussien, A. and Al-Saad, M.Z., 2016, December. Test suite effectiveness: an indicator for open source
software quality. In 2016 2nd International Conference on Open Source Software Computing (OSSCOM) (pp. 1-5). IEEE.
8. D. Franke and C. Weise, ‘Providing a Software Quality Framework for Testing of Mobile Applications’, in Verification and Validation
2011 Fourth IEEE International Conference on Software Testing, 2011, pp. 431–434.
9. Shalini and S. I. Hassan, ‘An empirical evaluation of the impact of aspectization of cross-cutting concerns in a Smart-phone based
application’, in 2014 International Conference on Computing for Sustainable Global Development (INDIACom), 2014, pp. 448–454.
10. J. Hernandez, A. Kubo, H. Washizaki, and F. Yoshiaki, ‘Selection of metrics for predicting the appropriate application of des ign
patterns’, 2011, pp. 1–4.
11. T. Pessoa, F. Brito, M. P. Monteiro, and S. Bryton, ‘An Eclipse Plugin to Support Code Smells Detection’, p. 12.
12. IBM Corp. Released in 2013. IBM SPSS Statistics for Windows, Version 22.0. Armonk, NY: IBM Corp.

Authors: Velin Spasov Kralev, Radoslava Stankova Kraleva

Paper Title: Visual Analysis of Actions Performed with Big Graphs


Abstract: The basic concepts of using application development environments are presented in this paper.
The way of using the GraphAnalyser application and its basic functions is also presented. All results of the
experiments conducted are generated with this application. According to the experimental methodology, they
fall into two groups: the first one includes actions related to the vertices of a graph, and the second one includes
actions related to the edges and the dynamic allocation of memory to store the structure of a graph. The results
show that when the number of vertices in a graph increases linearly, the time to add and remove these vertices
also increases linearly. When the number of graph vertices increases linearly, the number of added vertices per
millisecond remains relatively constant. However, the number of vertices removed for one millisecond for
graphs containing between 10 and 70 million vertices varies. Similarly, when the number of graph edges
increases linearly, the number of added edges per millisecond remains relatively constant. The summarized
results of the two experiments show that the actions associated with adding, removing, and calculating the edge
lengths are performed much more slowly than adding and removing the vertices.

Keyword : Graph, Graph Actions Monitoring, Visualization, Software Development.


References:
1. Grytczuk, J. Thue type problems for graphs, points, and numbers. Discrete Mathematics, 2008, vol. 308 (19), pp. 4419-4429.
2. R. J. Wilson. Introduction to Graph Theory, 5th ed., Prentice Hall, 2010.
3. Alekseev, V. E., Boliac, R., Korobitsyn, D. V., Lozin, V. V. NPhard graph problems and boundary classes of graphs. Theoretica l
Computer Science, vol. 389(1), pp. 219–236.
4. Kurapov, S.V., Davidovsky, M.V., Tolok, A.V. Visual algorithm for coloring planar graphs. Scientific Visualization, 2018, vol. 10(3),
pp. 1-33.
5. Borisova N. An approach for Ontology Based Information Extraction (OBIE). Information Technologies and Control, 2015, vol. 12(1),
pp. 15-20.
6. Kurapov, S.V., Davidovsky, M.V., Tolok, A.V. A modified algorithm for planarity testing and constructing the topological draw ing of
481. a graph. The thread method. Scientific Visualization, 2018, vol. 10(4), pp. 53-74.
7. Sapundzhi, F.I., Popstoilov, M.S. Optimization algorithms for finding the shortest paths. Bulgarian Chemical Communications, 2018, 2740-
vol. 50(Special Issue B), pp. 115-120.
8. Kralev, V., Kraleva, R., Kumar, S. A modified event grouping based algorithm for the university course timetabling problem.
2744
International Journal on Advanced Science, Engineering and Information Technology, 2019, vol. 9(1), pp. 229-235.
9. Sabeen, S., Arunadevi, R., Kanisha, B., Kesavan, R. Mining of sequential patterns using directed graphs. International Journal of
Innovative Technology and Exploring Engineering, 2019, vol. 8(11), pp. 4002-4007.
10. Sapundzhi, F. Scoring functions and modeling of structure-activity relationships for cannabinoid receptors. International journal of
online and biomedical engineering, 2019, vol. 15 (11), pp. 139-145.
11. Kraleva, R. ChilDiBu - A mobile application for Bulgarian Children with special educational needs. International Journal on Advanced
Science, Engineering and Information Technology, 2017, vol. 7(6), pp. 2085-2091.
12. Sapundzhi, F. Computer simulation and investigations of the roof mount photovoltaic system. International journal of online a nd
biomedical engineering, 2019, vol. 15(12), pp. 88-96.
13. Agarwal, S., Aggarwal, A., Dixit, S. Model transformation of declarative user interface from platform specific model to platform
independent model using graphical notation. International Journal of Innovative Technology and Exploring Engineering, 2019, v ol.
8(12), pp. 2371-2377.
14. Gasparic, M., Gurbanov, T., Ricci, F. Improving integrated development environment commands knowledge with recommender
systems. Proceedings - International Conference on Software Engineering, 2018, pp. 88-97.
15. Coenen, J., Gross, S., Pinkwart, N. Comparison of feedback strategies for supporting programming learning in integrated development
environments (IDEs). Advances in Intelligent Systems and Computing, 2018, vol. 629, pp. 72-83.
16. Kraleva, R., Kralev, V., Kostadinova, D. A methodology for the analysis of block-based programming languages appropriate for
children. Journal of Computing Science and Engineering, 2019, vol. 13(1), pp. 1-10.
17. Kosar, T., Gaberc, S., Carver, J.C., Mernik, M. Program comprehension of domain-specific and general-purpose languages: replication
of a family of experiments using integrated development environments. Empirical Software Engineering, 2018, vol. 23(5), pp. 2734 -
2763.
18. Kraleva, R., Kralev, V., Sinyagina, N., Koprinkova-Hristova, P., Bocheva, N. Design and analysis of a relational database for
behavioral experiments data processing. International Journal of Online Engineering, 2018, vol. 14(2), pp. 117-132.
19. Kralev, V., Kraleva, R., Sinyagina, N., Koprinkova-Hristova, P., Bocheva, N. An analysis of a web service based approach for
experimental data sharing. International Journal of Online Engineering, 2018, vol. 14(9), pp. 19-34.
20. Donovan A, Kernighan B. The Go Programming Language (Professional Computing Series). Addison-Wesley Professional; 2015.
21. Scott ML. Programming language pragmatics. 4th Edition. Morgan Kaufmann; 2015 Dec.
22. Sebesta RW. Concepts of programming languages. Reading, Pearson; 2015 Feb.
23. Wang, Y.Z., Fan, Q. Practice and discussion on mixed teaching of c language programming. Computer Knowledge and Technology,
2017, vol. 42 (13), pp. 128-129.
Authors: Lyudmila Zubova, Anna Yakovaleva, Natalya Tregulova, Sergey Vasenev, Natalya Zibrova

Paper Title: Development of A Risk Assessment System for The Creation of Space Rocket Technology
Abstract: During the production and purchase of electronic component base (ECB) in the course of
experimental design work (EDW), various risks arise that arise due to internal and external process failures. As
practice shows, systematic breakdowns of EDW began to occur due to failure of ECB supplies by domestic and
foreign manufacturers. In the framework of this issue, the authors developed methodological approaches to
increasing the likelihood of a successful completion of the production process based on the use of preventive
management in the form of a risk-based approach. The essence of this approach includes the use of the PDCA
Deming cycle (“Plan-Do-Check-Act”), which is a cyclically repeating decision-making process used in quality
management. Regulatory and technical documentation for assessing risks in the production and procurement of
ECB will allow you to determine the level of risk in achieving the required efficiency in meeting the specified
terms for the development of RST products (component parts - CP of RST products). This study substantiates
the need to use a risk-based approach in the production and procurement of ECB in the course of development
work (hereinafter EDW) in the development of space rocket technology (RST). This study presents a
methodology for assessing risks in the production and purchase of ECBs during the implementation of EDW,
based on the consideration of possible risks based on the stages of the production life cycle and delivery of
foreign-made ECBs. The question has been raised about the need to develop regulatory and technical
documentation for assessing risks in the production and purchase of ECBs during the implementation of EDW.

Keyword : risks, life cycle, space rocket technology, electronic component base.
References:
1. Risk Management Standards of the Federation of European Risk Managers Associations (FERMA).
482. 2. COSO document (concept) “Guidelines for Monitoring the Internal Control System” (2009).
3. ISO 22000: 2018 (second edition of ISO 50001, edition 2018-08). Energy management systems
4. Zubova L.V. Definition of risk tolerance, level of risks, effect and effectiveness of their consequences, taking into account ensuring 2745-
maximum risk tolerance and necessary competitiveness. Actual issues of modern economic science. III internationa l correspondence 2750
conference: Lipetsk: "De facto", 2011. S. 109-111.
5. Zubova L.V. Methodology for substantiating entrepreneurial decisions of defense enterprises in the face of uncertainty about the
consequences of risks: a monograph. Military Space Academy named after A.F. Mozhaysky, St. Petersburg: Publishing House of St.
Petersburg State University of Economics. 2018.192 p.
6. Zubova L.V., Gotskaya N.R., Davydyants D.E., Karlik A. E., Petrov D.M. Comprehensive value of enterprise solutions and algorithm
of risk level assessment / technical sciences. Science and Society, 2018; # 3: 111-121.
7. Zubova L.V., Kolesnik A.V., Nikolaev S.P. Features of scientific and technical risks in the development of rocket and space
technology.Science and Society, 2018: 37-45.
8. Zubova L.V., Kuzmin V.N., Sherstyuk A.V. Model of administration of managerial decisions based on estimation of risk -stability of
enterprises, 2018.
9. Zubova L.V. The scheme of the model of managerial decision making based on the assessment of the risk tolerance of business entities.
Proceedings of St. Petersburg State University of Economics, 2018: 161.
10. Zubova L.V., Nikolaev S.P., Kolesnik A.V., Peculiarities of scientific and technical risks in the development of rocket and s pace
technology. Science and Society, 2018; # 3: 111-121.
11. Korovin E.V. Comprehensive assessment of the effectiveness of industrial enterprise development projects. Economics of Education,
2012; # 2: 117-122.
12. Nikitin Yu.A., Korovin E.V., Kruglov D.V. Management of assortments of services for material support of state power structures.
Monograph. SPb .: WATT. 2009.116 p.
13. Orlov A.I., Tsisarsky A.D. Features of risk assessment when creating space rocket technology. National interests: priorities and
security, 2018; 43 (232): 114-118.
14. Charushnikov A.V., Kuzmin V.N., Dreshchinsky V.A. An innovative methodological approach to modeling and evaluating the
effectiveness of space systems. Innovation, 2015; # 9 (205): 7-11.
15. Zubova L.V., Gotskaya N.R., Davydyants D.E., Karlik A. E., Petrov D.M. Comprehensive value of enterprise solutions and algorithm
of risk level assessment. Science and Society, 2018; # 3: 111-121.
16. Kolesnik A.V., Zubova L.V., Nikolaev S.P. Features of scientific and technical risks in the development of rocket and space
technology. Science and Society, 2018. # 2: 37-45.
17. Kuzmin V.N., Sherstyuk A.V. Zubova L.V., Model of administration managerial decisions based on assessment of risk -stability of
enterprises. 8th The International Conference “Social Science and Humanity”. London, 2018: 29-36.

Authors: Avinash Sharma, Aaditi Verma, Dhananjay Gupta

Paper Title: Preventing Car Damage using CNN and Computer Vision
Abstract: This research contain convolutional neural network are used to recognize whether a car on a
given image is damage or not, from where it is damage and severity of the damage. Using transfer learning to
take advantage of available models that are trained on a more general object recognition task, very satisfactory
performance has been achieved, which indicate great opportunities of this approach. Car accidents are stressful
483. and the auto claims process is ripe for disruption. Using computer vision to accurately classify vehicle damage
and facilitate claims triage.
2751-
2755
Keyword : car damage, convolutional neural network, neural network
References:
1. B. Y. Lecun Y., Bottou L. and H. P., “Gradient-based learning applied to document recognition,” Proceedings of IEEE, vol. 86, no. 11,
1998.
2. A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification with deep convolutional neural networks,” in Advances in
Neural Information Processing Systems 25, F. Pereira, C. J. C. Burges, L. Bottou, and K. Q. Weinberger, Eds. Curran Associate s, Inc.,
2012, pp. 1097–1105.
3. M. G. M. R. G. Soumalya Sarkar, Kishore K. Reddy, “Deep learning for structural health monitoring: A damage characterization
application,” in Annual Conference of the Prognostics and Health Management Society,2016.
4. Patil, Kalpesh & Kulkarni, Mandar & Sriraman, Anand & Karande, Shirish. (2017). Deep Learning Based Car Damage Classification.
50-54. 10.1109/ICMLA.2017.0-179.
5. “http://www.tractable.io/.”
6. http://www.ey.com/publication/vwluassets/ey-does-your-firm-needa-claims-leakage-study/ey-does-your-firm-need-a-claims-
leakagestudy.pdf.
7. C. Szegedy, V. Vanhoucke, S. Ioffe, J. Shlens, and Z. Wojna, “Rethinking the inception architecture for computer vision,” arX iv
preprintarXiv:1512.00567, 2015.
8. L. Yang, P. Luo, C. Change Loy, and X. Tang, “A large-scale car dataset for fine-grained categorization and verification,” in
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2015, pp. 3973–3981
9. J. Masci, U. Meier, D. Cires¸an, and J. Schmidhuber, “Stacked convolutional auto-encoders for hierarchical feature extraction,” in
International Conference on Artificial Neural Networks. Springer, 2011, pp. 52–59.
10. K. Simonyan and A. Zisserman, “Very deep convolutional networks for large-scale image recognition,” arXiv preprint
arXiv:1409.1556, 2014
11. C. Szegedy, V. Vanhoucke, S. Ioffe, J. Shlens, and Z. Wojna, “Rethinking the inception architecture for computer vision,” arX iv
preprint arXiv:1512.00567, 2015.
12. K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image recognition,” arXiv preprint arXiv:1512.03385, 2015.

Authors: Balika J. Chelliah, Arth Jain, Utkarsh Singh, Garima Mehta

Paper Title: Text and Data Formatting for Machine Learning


Abstract: Machine learning is a prominent tool for getting data from large amounts of information. Whereas
a good amount of machine learning analysis has targeted on increasing the accuracy and potency of coaching
and reasoning algorithms, there is less attention within the equally vital issues of observing the standard of
information fed into the machine learning model. The standard of huge information is far away from good.
Recent studies have shown that poor quality will bring serious errors to the result of big data analysis and this
could have an effect on in making additional precise results from the information. Advantages of data
preprocessing within the context of ML are advanced detection of errors, model-quality improves by the usage
of better data, savings in engineering hours to debug issues

Keyword : Data Science ,Dataset ,Text Preprocessing


References:
1. Data Mining Library for Big Data Processing Platforms: A Case Study-Sparkling Water Platform Elif Cansu Yıldız ; Mehmet S. Aktas
; Oya Kalıpsız ; Alper Nebi Kanlı ; Umut Orçun Turgut 2018 3rd International Conference on Computer Science and Engineering
(UBMK) Year: 2018 | Conference Paper | Publisher: IEEE
2. A Survey on Big Data Pre-processing Zhibin Guan ; Tongkai Ji ; Xu Qian ; Yan Ma ; Xuehai Hong 2017 5th Intl Conf on Applied
Computing and Information Technology/4th Intl Conf on Computational Science/Intelligence and Applied Informatics/2nd Intl Con f
484. on Big Data, Cloud Computing, Data Science (ACIT-CSII-BCD) Year: 2017 | Conference Paper | Publisher: IEEE
3. Design of a scalable data stream channel for big data processing Yong-Ju Lee ; Myungcheol Lee ; Mi-Young Lee ; Sung Jin Hur ;
Okgee Min 2015 17th International Conference on Advanced Communication Technology (ICACT) Year: 2015 | Conference Paper | 2756-
Publisher: IEEE 2760
4. Near Real-Time Big-Data Processing for Data Driven Applications Jānis Kampars ; Jānis Grabis 2017 International Conference on Big
Data Innovations and Applications (Innovate-Data) Year: 2017 | Conference Paper | Publisher: IEEE
5. Financial Data Mining Based on Support Vector Machines and Ensemble Learning Shi Lei ; Ma Xinming ; Xi Lei ; Hu Xiaohong 2010
International Conference on Intelligent Computation Technology and Automation Year: 2010 | Volume: 2 | Conference Paper |
Publisher: IEEE
6. Big Data Analysis Using Hadoop Framework and Machine Learning as Decision Support System (DSS) (Case Study: Knowledge of
Islam Mindset) Nurhayati ; Busman ; Victor Amrizal 2018 6th International Conference on Cyber and IT Service Management
(CITSM) Year: 2018 | Conference Paper | Publisher: IEEE
7. Digital Data Forgetting: A Machine Learning Approach Melike Günay ; Eyyüp Yildiz ; Yağiz Nalcakan ; Batuhan Aşiroĝlu ; Ahmet
Zencírlí ; Büşra Rümeysa Mete ; Tolga Ensarí 2018 2nd International Symposium on Multidisciplinary Studies and Innovative
Technologies (ISMSIT) Year 2018 | Conference Paper | Publisher: IEEE
8. Improving ML Training Data with Gold-Standard Quality Metric Leslie Barrett, Michael W. Sherman KDD '19: 25th ACM SIGKDD
Conference on Knowledge Discovery and Data Mining, Workshop on Data Collection, Curation, and Labeling (DCCL) for Mining and
Learning, August 05, 2019, Anchorage, AK. (to appear
9. Building Large Machine Reading-Comprehension Datasets using Paragraph Vectors Radu Soricut, Nan Ding Arxiv,
https://arxiv.org/abs/1612.04342 (2016)
10. Debiasing Embeddings for Fairer Text Classification Flavien Prost, Nithum Thain, Tolga Bolukbasi 1st ACL Workshop on Gender
Bias for Natural Language Processing (2019)
11. Text Classification with Few Examples using Controlled Generalization Abhijit Mahabal, Jason Baldridge, Burcu Karagol Ayan,
Vincent Perot, Dan Roth Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational
Linguistics: Human Language Technologies, Association for Computational Linguistics.

Authors: M. Suresh, P. Maniraj, S. Sundar, T. Logeswaran, P. Tamilarasu

Paper Title: Peak Time Load Management in Domestic Sector


Abstract: The electricity demand is increasing day by day and leads do increase in generation and power
485. transmission. India consumes about 3.4% of world energy consumption. The energy demand has grown at the
average of 3.6% per annum over the past 30 years. Usually the demand for the electricity increases abruptly
2761-
during peak hours. So it is necessary to monitor the loads during peak hours in order to provide energy
2763
sufficiently. The government has taken steps to reduce power consumption in industrial sector. Demand
reduction can also possible in domestic sector. This Paper presents a load management model for domestic
houses. Every house has a maximum demand limit for essential loads. During peak hours, if the consumer
consumes power more than the preset limit,, based on the priority of load the power supply to the load will be
turned off automatically and by using the cloud, the data can be visualized and analyzed. The power
consumption during peak time is updated in cloud using NODEMCU and Thingspeak. The information can also
be used for load forecasting .

Keyword : Demand, Essential and Non-essential loads, Load Management, Peak Hour .
References:
1. S. Ashok and Rangan Banerjee "An optimization mode for industrial load management," IEEE Transactions on Power Systems
Vol.16, No.4, November 2001
2. R. Rajarajeswari, D. Suchitra, J. Vijay Krishna and Joydeep Das Gupta "Priority based Scheduling of Residential Users Device s in
Smart Grid Including Waiting Time", International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878,
Volume-8, Issue-1S4, June 2019
3. Onur Ayan and Belgin Turkay "Domestic Electrical Load Management in Smart Grids and Classification of Residential Loads", 5th
National Conference on Electrical and Electronics Engineering, 2018
4. Amir-Hamed Mohsenian-Rad, and Alberto Leon-Garcia., "Optimal residential load control with price prediction in real-time electricity
pricing environments", IEEE Transactions on Smart Grid, Vol 1, No.2, 2010
5. Goran Strbac,"Demand side management Benefits and challenges Energy Policy", vol. 36, issue 12, 2008, pp.4419-4426
6. Mohammed Albadi and Ehab El-Saadany," A summary of demand response in electricity markets", Electric Power Systems Research
78(11):1989-1996,November 2008
7. Alpana Sinha and Mala De, "Load shifting technique for reduction of peak generation capacity requirement in smart grid", IEEE 1st
International Conference on Power Electronics, Intelligent Control and Energy Systems, 2016
8. Babu C.A and Ashok.S, "Optimal Load shifting for Peak demand management", National power systems conference, NPSC 2004.

Authors: M. N. V. R. L.Kumar, Habtamu Mitiku Feyissa, G. Kedarnath, L. Ranganath

Paper Title: Experimental analysis on Generic principles for developing Robust Designs against Casting Defects
Abstract: The world is running around invention and advancements in the existing products or components,
and this wasn’t be easy without design concepts and its principles. This paper is conferring on this facet, how the
design can be made robust against manufacturing flaws by varying the parameters such as material properties,
dimensions, shapes etc. If a design engineer compels a mistake while designing a product, results in the
following aspects: confidence, business, customers, sales, servicers, repute etc. If we modify the design, and
make it robust, some or all of these losses will be recouped., It is not an easy task to discuss all manufacturing
capabilities in one go , to have a lucidity in the concept the flaws of manufacturing during casting were focused
in this paper. Based on the theoretical study and experiment analysis conducted on a casting “+” model the
results are outlined. Based on the output, a list of generic design principles was defined, which can be considered
by a design engineer during casting design process. The paper starts with a brief introduction to robust design,
followed by a literature review, then design solutions, computer simulation analysis of a casting component
(using Solid Works) and finally the conclusions made from the results.

Keyword : casting defects, Design considerations, Generic Principles, improper design, Manufacturing
defects, reliability, Robust design.
References:
1. Serope Kalpakjian, Steven R. Schmid, Manufacturing process for Engineering Materials, fourth edition, Prentice Hall 1928,pg 4,5,
2. Benjamin W.Niebel, Alan B. Draper, Product Design and process engineering, McGraw –Hill, 1974
3. Rob Thompson, Manufacturing processes for design professionals, Thames &Hudson Ltd., 2007
486. 4. Mikel P.Groover, Automation, production systems, and computer integrated Manufacturing, 3rd Edition, Pearson Education Inc., 2008
5. Michel T. Todinov, Risk-Based Reliability Analysis and Generic Principles for Risk Reduction, First edition, Elsvier, 2007
6. Mahmoud M.Farag, Materials and Process selection for Engineering Design, CRC press, 2008 2764-
7. Nair VN. Taguchi’s parameter design: A panel discussion. Technometrics 1992; 34:127–161. 2769
8. Robinson TJ, Borror CM, Myers RH. Robust parameter design: A review. Quality and Reliability Engineering Internation al 2003;
20:81–101.
9. Park G, Lee T, Lee K, Hwang K. Robust design: An overview. AIAA Journal 2006; 10. Gunter B. A perspective on the Taguchi
methods. Quality Progress 1987; June:44–52.
10. Taguchi G, Wu Y. Introduction to Off-Line Quality Control. Central Japan Quality Control Association: Nagoya, Japan, 1979.
11. Taguchi G. Introduction to Quality Engineering—Designing Quality into Products and Processes. Asian Productivity Organization:
Tokyo, 1986.
12. Phadke MS. Quality Engineering using Robust Design. Prentice-Hall: Englewood Cliffs, NJ, 1989.
13. Taguchi G, Chowdhury S, Taguchi S. Robust Engineering—Learn How to Boost Quality While Reducing Costs and Time to Market.
McGraw-Hill: New York, 2000.
14. Hunter JS. Statistical design applied to product design. Journal of Quality Technology 1985
15. Kackar RN. Off-line quality control, parameter design, and the Taguchi method (with discussion). Journal of Quality Technology
1985;
16. Le´on RV, Shoemaker AC, Kacker RN. Performance measures independent of adjustment. Technometrics 1987; 29: 253–285.
17. Box GEP, Bisgaard S, Fung C. An explanation and critique of Taguchi’s contributions to quality engineering. Quality and Relia bility
Engineering International 1988;
18. k Raghunadh, Yakkala M., Robera DabaBededa, Basam Koteswararao, K. Ramachandra Manohar, A. Naresh, and K. Srinivas. "A
Review on the Renewable hybrid power supply for rural areas by the grouping of wind power, photo voltaic and conventional
generator." (2018): 733-738.
19. Ravi, D., B. Somanath, L. Ranganath, and B. Koteswararao. "Experimental testing of thermal house for different weather conditions in
Bale robe." Materials Today: Proceedings 5, no. 9 (2018): 18245-18250.
20. Koteswararao, B., Y. Suresh, and D. Ravi. "Analysis of Quality in Solid State Welding (Copper-Copper) by Using NDT And DT by
Altering Physical Properties at Constant Time." Materials Today: Proceedings 4.8 (2017): 7351-7356.
21. Koteswararao, B., et al. "Designing of a Coconut Chopping Machine and Making Fuel from Tender Coconut." Indian Journal of
Science and Technology 9 (2016): 34.
22. Koteswararao, B., et al. "Investigation of Machining Parameter in EDM of High Carbon Steel Alloy (EN31)." Materials Today:
Proceedings 4.2 (2017): 1375-1384.
23. Ravi, D., Koteswararao, B., & Satish, K. (2018). Structural Analysis Of Down The Hole Button Bit With Different Materials. Materials
Today: Proceedings, 5(2), 4711-4719.

Authors: Viknesh M R, J Swaminathan, Mahakaleshwar P, Anju S Pillai

Paper Title: Automatic e-ticketing and Vehicle Parking System


Abstract: Smart cities have been the vision for the country for a while, and one of the features for the
development of a smart city is to develop a good mobility for transport with efficient car parking management
systems. A good parking management system must assist people to find vacant parking slots and provide
automatic on-line payment options, to reduce the traffic and to save time. In this paper, implementation of
prototype of automatic e-ticketing and vehicle parking system is presented. The proposed system consists of
automatic gate control, e-ticketing and vacant space monitoring, implemented using Raspberry Pi. Android
application on user’s smart phone helps in easy user interface making the system, easy to use in real time
scenario.

Keyword : E-ticketing, Vehicle parking system, Raspberry Pi 3, RFID, Firebase.


References:
1. Khanna, Abhirup, and Rishi Anand. "IoT based smart parking system." International Conference on Internet of Things and
Applications (IOTA), pp. 266-270. IEEE, 2016.
2. P. Šolić, I. Marasović, M. L. Stefanizzi, L. Patrono and L. Mainetti, "RFID-based efficient method for parking slot car detection," 2015
23rd International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, 2015, pp. 108-112.
3. Y. Chang and T. K. Shih, "RFID-Based intelligent parking management system with indoor positioning and dynamic tracking," 2017
487. 10th International Conference on Ubi-media Computing and Workshops (Ubi-Media), Pattaya, 2017, pp. 1-8.
4. A. A. Khan, A. I. E. Yakzan and M. Ali, "Radio Frequency Identification (RFID) Based Toll Collection System," 2011 Third 2770-
International Conference on Computational Intelligence, Communication Systems and Networks, Bali, 2011, pp. 103-107.
5. S. S. Al-Ghawi, S. A. Hussain, M. A. A. Rahbi and S. Z. Hussain, "Automatic toll e-ticketing system for transportation systems," 2016
2773
3rd MEC International Conference on Big Data and Smart City (ICBDSC), Muscat, 2016, pp. 1-5.
6. W.A. Syafei, A. F. Listyono and Darjat, "Hardware design of queuing free environmental friendly automatic toll gate using RFID," 4th
International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE), Semarang, 2017, pp. 142-
146.
7. Balamurugan, K., S. Elangovan, R. Mahalakshmi, and R. Pavithra. "Automatic check-post and fast track toll system using RFID and
GSM module with security system." International Conference on Advances in Electrical Technology for Green Energy (ICAETGT),
pp. 83-87. IEEE, 2017.
8. Chandra, Hans, Kenny RizkyHadisaputra, HandriSantoso, and Erwin Anggadjaja. "Smart Parking Management System: An integration
of RFID, ALPR, and WSN." IEEE 3rd International Conference on Engineering Technologies and Social Sciences (ICETSS), pp. 1-6.
IEEE, 2017.
9. Pala, Zeydin, and NihatInanc. "Smart parking applications using RFID technology." 1st Annual RFID Eurasia, pp. 1-3. IEEE, 2007.
10. Wei, Lanxin, Qisheng Wu, Mei Yang, Wei Ding, Bo Li, and RongGao. "Design and implementation of smart parking management
system based on rfid and internet." International Conference on Control Engineering and Communication Technology, pp. 17 -20.
IEEE, 2012.
11. Joshi, Yadnesh, Pratik Gharate, Chetan Ahire, Nikhil Alai, and SamadhanSonavane. "Smart parking management system using RFID
and OCR." International Conference on Energy Systems and Applications, pp. 729-734. IEEE, 2015.
12. Mahendra, B. M., Savita Sonoli, Nagaraj Bhat, and T. Raghu. "IoT based sensor enabled smart car parking for advanced driver
assistance system." 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology
(RTEICT), pp. 2188-2193. IEEE, 2017.
13. M. Priya B.K., Sandeep, M. T., Chandra, M. D. Vineela, and Swarna, M. V., “Energy Efficient and Secured Smart Car Parking
System”, The International Journal Of Science &Technoledge (IJST), vol. III, no. VI, 2015.

Authors: Nor Haslinayati Abdul Ghafar, Muslich Hartadi Sutanto, Saeed Modibbo Saeed, Sri Sunarjono

Paper Title: Safe Braking Distance at Signalized Intersection


Abstract: Signalised intersection is an area where most of the drivers having dilemma in making decision
to either pass through the intersection or stop when the light turns to yellow. During this phase, a sudden
deceleration and incorrect estimate of intersection clearance time cause rear-end collision, severe right-angle
crash and left-turn head-on collision. Therefore, the aim of this study was to determine the safe braking distance
at signalised intersection by using the concept of stopping sight distance, so that a set of road marking and road
sign can be proposed to help the driver in making decision within the dilemma zone. Samples of vehicle’s
approaching speed were collected at a signalised intersection within the Ipoh-Lumut Highway in Perak Tengah.
Statistical analysis showed that the observed 15th and 85th percentile speed at the intersection were 66.2km/h
488. and 88.5km/h, with a mean and standard deviation of 77.5km/h and 9.99km/h. Goodness-of-fit tests showed that
the distribution of the approaching speed at the intersection was normally distributed with a probability of
14.4%. It was concluded that safe braking distance from the stopping line of the signalised intersection is 2774-
between 97m for lower speed limit to 152m for the upper speed limit. 2781

Keyword : Signalised Intersection, Safe Braking Distance, Yellow Light, Dilemma Zone.
References:
1. 1arber, N.J. and L.A. Hoel, Traffic and highway engineering. 2014: Cengage Learning.
2. Wu, Y., et al., Comparison of proposed countermeasures for dilemma zone at signalized intersections based on cellular automata
simulations. 2018. 116: p. 69-78.
3. Mannering, F., W. Kilareski, and S. Washburn, Principles of highway engineering and traffic analysis. 2007: John Wiley & Sons.
4. Ibrahim, M., M. Karim, and F.J.A.J.o.A.S. Kidwai, The effect of digital count-down display on signalized junction performance. 2008.
5(5): p. 479-482.
5. Devalla, J., S. Biswas, and I.J.P.C.S. Ghosh, The effect of countdown timer on the approach speed at signalised intersections. 2015. 52:
p. 920-925.
6. Wu, M., et al., Characterize dilemma zone and minimize its effect at coordinated signalized intersections. 2013. 96: p. 766-778.
7. Pathivada, B.K. and V.J.T.r.p. Perumal, Modeling driver behavior in dilemma zone under mixed traffic conditions. 2017. 27: p. 961-968.
8. Lu, G., et al., Analysis of yellow-light running at signalized intersections using high-resolution traffic data. 2015. 73: p. 39-52.
9. Zhang, Y., et al., Yellow light dilemma zone researches: a review. 2014. 1(5): p. 338-352.
10. Gazis, D., R. Herman, and A.J.O.R. Maradudin, The problem of the amber signal light in traffic flow. 1960. 8(1): p. 112-132.
11. Papaioannou, P.J.A.A. and Prevention, Driver behaviour, dilemma zone and safety effects at urban signalised intersections in Greece.
2007. 39(1): p. 147-158.
12. Hurwitz, D.S., et al., Fuzzy sets to describe driver behavior in the dilemma zone of high-speed signalized intersections. 2012. 15(2): p.
132-143.
13. Sharma, A., D. Bullock, and S.J.T.r.p.C.e.t. Peeta, Estimating dilemma zone hazard function at high speed isolated intersection. 2011.
19(3): p. 400-412.
14. Roess, R.P., Prassas, E.S and McShane, W.R., Traffic Engineering, ed. r. Ed. 2004, Upper Saddle River, NJ: Peaerson Prentice-Hall.
15. Fu, C., et al., Comparative analysis of driver’s brake perception-reaction time at signalized intersections with and without countdown
timer using parametric duration models. 2016. 95: p. 448-460.
16. Taoka, G.T.J.I.j., Brake reaction times of unalerted drivers. 1989. 59(3): p. 19-21.
17. Gates, T.J., et al., Analysis of driver behavior in dilemma zones at signalized intersections. 2007. 2030(1): p. 29-39.
18. El-Shawarby, I., A.-S.G. Abdel-Salam, and H.J.T.r.r. Rakha, Evaluation of Driver Perception–Reaction Time Under Rainy or Wet Roadway
Conditions at Onset of Yellow Indication. 2013. 2384(1): p. 18-24.
19. Li, Z., et al., Measurement and comparative analysis of driver’s perception–reaction time to green phase at the intersections with and
without a countdown timer. 2014. 22: p. 50-62.
20. Highway, A.A.o.S. and T. Officials, A policy on geometric design of highways and streets. 2011.
21. Mannering, F. and W. Kilareski, Principles of Highway Engineering and Traffic Analysis. Second. John Wiley & Sons.
22. Currin, T.R., Introduction to traffic engineering: a manual for data collection and analysis. 2012: Cengage Learning.
23. Falcocchio, J.C. and H.S. Levinson, Concentration of travel demand in space and time, in Road Traffic Congestion: A Concise Guide.
2015, Springer. p. 39-51.

Authors: M. Kumaresan, K. Kannan, P. Pandiyarajan, J. Yasin, T. Pravinprabu

Paper Title: Design and Performance Analysis of Multi-Spring Maker


Abstract: In this industrial world, wide range of power operated machines is used for the production of
springs. But this is the simple mechanism arrangement for the production of torsion and compression springs.
This machine is operated by manual method. This machine can produce both the tension and compression
springs of different Diameter and different length. It can make a spring with the help of the shaft. The wire
which is used for producing the spring moves around the shaft to make a suitable spring. This self-movement is
achieved by the keyway of the shaft. A handle is used to operate the rolling machine manually. The outer
Diameter of the shaft is the inner Diameter of the spring. The torsion and compression spring is a mechanical
489. device which is used to store energy and release it when needed.
2782-
Keyword : Rolling shaft, Tension & Compression spring, Manual method, spring wire. 2784
References:
1. Mr. Chetan P. Sable , prof. P.D.Kamble ,Mr. Dhiraj D. Dube review on” Paper Plate Making Machines” International Journal of
Research in Aeronautical and Mechanical Engineering /vol.2 issue.2,february 2014.
2. Supriya Burgul review on “Design and Fatigue Life of a Mechanical Spring” International Journal of Research in Aeronautical and
Mechanical Engineering vol.2 issue 7, july 2014.
3. Mr. Niranjan Singh review article on “General Review of Mechanical Spring used in Automobile Suspension System” International
Journal of Advanced Engineering Research and Studies December 2013 ,vol.K pgs:105-111
4. O.Vahid – Araghi and F. Golnaraghi”Frictional Induced Vibration in Lead Screw Drives” chapter 2 february 2011.
5. Mr. Desheng Li review on “Vibration of a Tapered Roller Bearing with Localized defect on Multiple Rollers” International Congress
on Sound and Vibration, July 2015.

Authors: Gouni Ritthiika Reddy, Devavarapu Sreenivasarao, Shaik Khasim Saheb

Paper Title: An Innovative Model for both Cloud Security and Privacy in Provision of Secure Cloud Services
Abstract: Because of diverse benefits such as counting services on demand, decreasing costs, computing
resources configuration, flexibility, services scalability, etc. over internet, Cloud Computing has become and is
becoming widely and hugely accepted technology to provide services. On the other hand, privacy and security of
a cloud has become an issue as this technology is tremendously emerging in the world. Many researches are
being done and even some proposed various models to identify and overcome the privacy and security issues. In
this review, for the cloud providers to use during different stages of cloud services, a layered cloud security and
490. privacy model (CSPM) will be provided. The CSPM model allows to overcome cloud security issues and thus,
providing safe and protected services. Lastly, countermeasures and security threats will be presented.
2785-
2791
Keyword : Privacy, Cloud Provider, Cloud Security and Privacy Model (CSPM), Cloud Service, Data, Cloud
Consumer, Security, Cloud Computing.
References:
1. P. Mell, T. Grance, "The NIST Definition of Cloud Computing," National Institute of Standards and Technology, U. S. Departme nt of
Commerce, September 2011.
2. A. RajaniKanth, M. Lakshmi, "A Survey on Access Control Models in Cloud Computing," Emerging ICT for Bridging the Future.
Advances in Intelligent Systems and Computing, Vol. 337. Springer International Publishing, Switzerland, pp. 653-664, 2015.
3. M. Kandias, N. Virvilis, D. Gritzalis, 'The Insider Threat in Cloud Computing," Critical Information Infrastructure Security. Lecture
Notes in Computer Science, Vol. 6983. Springer-Verlag, Berlin Heidelberg, pp. 93-103,2013.
4. Issa M. Khalil, A. Khreishah, M. Azeem, "Cloud Computing Security: A Survey," Computers, Vol, 3, pp. 1-35,2014.
5. The Cloud Services Measurement Initiative Consortium (CSMIC): Service Measurement Index Framework Version 2.1. Carnegie
Mellon University Silicon Valley Moflett Field, CA USA, July 2014.
6. K. EL MAKKAOUI, A. EZZATI, A. BENI-HSSANE, C. MOTAMED, "Data confidentiality in the word of c1oud," Journal of
Theoretical and Applied Information Technology, Vo1.84. No.3, 2016.
7. S. Sengupta, V. Kaulgud, V.S. Sharma, "Cloud computing security Trends and research directions," In Proceedings of the 2011 I EEE
World Congress on Services, Washington, DC, USA, pp.524-531, 2011.
8. S. Kamara, K. Lauter, "Cryptographic Cloud Storage," Financial Cryptography and Data Security. Lecture Notes in Computer Science,
Vol. 6054. Springer-Verlag, Berlin Heidelberg, pp. 136-149,2010.
9. N. Gruschka, M. Jensen, "Attack surfaces: A taxonomy for attacks on c10ud services," In Proceedings of the 2010 IEEE 3rd
International Conference on Cloud Computing, Miami, FL, USA, pp. 276-279, 2010.
10. O. Cangea, G. Moise, "A New Approach of the Cryptographic Attacks," Digital Information and Communication Technology and Its
Applications. Communications in Computer and Information Science, Vol. 166. Springer-Verlag, GmbH Berlin Heidelberg, pp.521-
534, 2011.
11. K. HyunHo, B. Ndibanje, L. Hoon-Jae, C. YongJe, C. Dooho, "Side Channel Attacks on Cryptographic Module: EM and PA Attacks
Accuracy Analysis," Information Science and Applications. Lecture Notes in Electrical Engineering, Vol. 339. Springer-Verlag, Berlin
Heidelberg, pp. 509-516,2015.
12. CLOUD SECURITY ALLIANCE: The Notorious Nine: Cloud Computing Top Threats m 2013.
https://c1oudsecurityalliance.org/group/top-threats.
13. M. Ogburn, C. Turner, P. Dahal, "Homomorphic Encryption," Procedia Computer Science 20, Elsevier, pp. 502 - 509, 2013.
14. Tian Xia1, Hironori Washizaki2, "Cloud Security and Privacy Metamodel Metamodel for Security and Privacy Knowledge in Cloud
Services," (MODELSWARD 2018), pages 379-386, ISBN: 978-989-758-283-7.

Authors: Nikolai Vorobyov, Ivan Kochish, Ilya Nikonov, Yuri Kuznetsov, Marina Selina
Method Development to Determine the Fractal Structures Index into the Broiler Chickens’
Paper Title:
Intestines
Abstract: Microbial communities in the intestines of birds self-organize to carry out joint biochemical
actions and extract nutrients from plant substrates. Depending on the feed entering the intestine, the
configuration of the microbial biosystem is regularly reconstructed, evenly distributing the enzymatic load
between the microbial components. To assess the qualitative and quantitative indicators of these processes, it is
proposed to calculate the index of fractal structures of microbial communities existing in the intestines of birds.
The technique is based on a fractal analysis of the frequency spectrum of operational taxonomic units (OTU) of
microbial communities obtained by the molecular genetic method. Initially, the initial OTU spectrum is
converted into an abbreviated spectrum of OTU groups, in which each group combines OTE that are similar in
frequency of occurrence. Next, a two-dimensional fractal portrait of the microbial community is constructed, on
which each OTU group is represented by a point with coordinates that depend on the frequencies of these
groups. A fractal portrait is necessary for conducting a topological analysis of the location of points on it and
isolating fractal structures in the microbial community. As a fractal measure, the analysis uses triangles with
vertices at the points of the OTU groups. At the same time, the smallest heights of the triangles are selected with
the scale of the fractal measure. The construction of triangles and their arrangement in increasing order of scale
of the fractal measure allows us to select the first triangles in a row, since they are triangles degenerate into a
segment by a straight line. OTU groups included in degenerate triangles are the sought-after determined OTU
groups belonging to fractal structures in the microbial community. Their share in the microbial community
determines the index of fractal structures (IFS), which also takes into account the uniform distribution of the
enzymatic load between OTU.
491. In the experiment, the molecular genetic method of NGS was used to study microbial communities in the
intestines of broilers of NGS using two types of probiotics. The obtained frequency-taxonomic spectra were used
2792-
to calculate the IFS. An analysis of the results showed that probiotics affect the self-organization of microbial
2795
communities.

Keyword : frequency-taxonomic spectrum, operatively taxonomic units, fractal portrait, microbial community.
References:
1. G. Abramson, H. A. Cerdeira, C. Bruschi, Fractal properties of DNA walks. Biosystems, 1999. 49: 63–70.
2. D. Stanley, R. J. Hughes, R. J. Moore Microbiota of the chicken gastrointestinal tract: influence on health, productivityand disease.
Appl. Microbiol. Biotechnol. 2014. 98. pp. 4301–4309.
3. Y. Yang, P. A. Iji, M. Choct Dietary modulation of gut microflora in broiler chickens: a review of the role of six kinds of a lternatives
to in-feed antibiotics. World’s Poult. Sci. J. 2009. 65(1) pp. 97–114.
4. J. I. R. Castanon, History of the use of antibiotics as growth promoters in European poultry feeds. Poult. Sci. 2007. 86. pp. 2466–2471.
5. N. T. Hnung, N. Chansiripornchai, J. J. Carrique-Mas, Antimicrobial resistance in bacterial poultry pathogens: A review. Front. Vet.
Sci. 2017. 4. pp. 126.
6. P. Biggs, C. M. Parsons, G. C. Fahey, The effects of several oligosaccharides on growth performance, nutrient digestibilities, and Cecal
microbial Populations in young chicks. Poultry science, 2007. 86(11), pp. 2327–2336.
7. M. Chichlowski, J. Croom, B. W. McBride, Direct-fed microbial PrimaLac and salinomycin modulate whole-body and intestinal
oxygen consumption and intestinal mucosal cytokine production in the broiler chick. POULTRY SCIENCE, 2007. 86(6), pp. 1100–
1106
8. Stanley, Dragana, Hughes, J. Robert, Moore, Microbiota of the chicken gastrointestinal tract: influence on health, productivity and
disease. Applied microbiology and biotechnology, 2014. 98(10), pp. 4301–4310.
9. E. Amit-Romach, D. Sklan, Z. Uni, Microflora ecology of the chicken intestine using 16S ribosomal DNA primers. POULTRY
SCIENCE, 2004. 83(7). pp. 1093–1098.
10. J. Apajalahti, A. Kettunen, H. Graham, Characteristics of the gastrointestinal microbial communities, with special reference to the
chicken. Конференция: 14th European Symposium on Poultry Nutrition, Lillehammer, Norway. Worlds poultry science journal,
2004. 60(2). pp. 223–232.
B. Keerthi Samhitha, Suja Cherukullapurath Mana, Jithina Jose, M. Mohith, L. Siva Chandhrahasa
Authors:
Reddy
An Efficient Implementation of a Method to Detect Sybil Attacks in Vehicular Ad hoc Networks
Paper Title:
using Received Signal Strength Indicator
Abstract: Vehicular Ad Hoc Networks (VANET) are useful in implementing a smart transportation system
by enabling ad hoc vehicle to vehicle communication. Sybil attack is considered to be one of the most
dangerous threats to VANET. Sybil aggressor can produce different phony personalities with false messages to
extremely hinder the ordinary elements of wellbeing related applications. In this paper, we are presenting an
implementation of a method to detect Sybil attack using received signal strength indicator.

Keyword : Vehicular ad hoc networks, Sybil attack, RSSI, voiceprint.


References:
1. M. S. Devi and K. Malar, "Improved Performance Modeling of Intelligent Safety Message Broadcast in Vanet: A Survey," 2014
.
International Conference on Intelligent Computing Applications, Coimbatore, 2014, pp. 95-98
2. H. Kaur, M. Devgan and P. Singh, "Sybil attackin VANET," 2016 3rd International Conference on Computing for Sustainable Global
Development (INDIACom), New Delhi, 2016, pp. 3201-3204..
3. M. S. Al-kahtani, "Survey on security attacks in Vehicular Ad hoc Networks (VANETs)," 2012 6th International Conference on Signal
Processing and Communication Systems, Gold Coast, QLD, 2012, pp. 1-9.
4. R. Lakhanpal and S. Sharma, "Detection & Prevention of Sybil attack in Ad hoc network using hybrid MAP & MAC technique," 2016
International Conference on Computation of Power, Energy Information and Commuincation (ICCPEIC), Chennai, 2016, pp. 283-287.
5. C. Kumar Karn and C. Prakash Gupta, “A Survey on VANETs SecurityAttacks and Sybil Attack Detection,” International Journal of
Sensors,Wireless Communications and Control, vol. 6, no. 1, pp. 45–62, 2016.
6. M. Mulla and S. Sambare, "Efficient analysis of lightweight Sybil attack detection scheme in Mobile Ad hoc Networks," 2015
International Conference on Pervasive Computing (ICPC), Pune, 2015, pp. 1-6.
7. M. Raya, P. Papadimitratos, and J. p. Hubaux, “Securing Vehicular Communications,” IEEE Wireless Communications, vol. 13, no. 5,
pp.8–15, 2006.
8. D. S. Reddy, V. Bapuji, A. Govardhan and S. S. V. N. Sarma, "Sybil attack detection technique using session key certificate in
vehicular ad hoc networks," 2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging
Technologies (ICAMMAET), Chennai, 2017, pp. 1-5
9. S. Chang, Y. Qi, H. Zhu, J. Zhao, and X. Shen, “Footprint: Detecting Sybil Attacks in Urban Vehicular Networks,” IEEE Transactions
onNParallel and Distributed Networks, vol. 23, no. 6, pp. 1103–1114, 2012.
10. Q. Li, H. Li, Z. Wen and P. Yuan, "Research on the P2P Sybil attack and the detection mechanism," 2017 8th IEEE International
Conference on Software Engineering and Service Science (ICSESS), Beijing, 2017, pp. 668-671..
492. 11. R. Mishra, A. Singh and R. Kumar, "VANET security: Issues, challenges and solutions," 2016 International Conference on Electrical,
Electronics, and Optimization Techniques (ICEEOT), Chennai, 2016, pp. 1050-1055.
2796-
12. H. Rasheed and O. Heekuck, “On Secure and Privacy-Aware SybilAttack Detection in Vehicular Communications,” Wireless 2800
PersonalCommunications, vol. 77, no. 4, pp. 2649–2673, 2014.
13. Bin Zeng and Benyue Chen, "SybilACO: Ant colony optimization in defending against Sybil attacks in the wireless sensor
network," 2010 International Conference on Computer and Communication Technologies in Agriculture Engineering, Chengdu, 2010,
pp. 357-360.
14. Y. Yao, B. Xiao, G. Yang, Y. Hu, L. Wang and X. Zhou, "Power Control Identification: A Novel Sybil Attack Detection Scheme in
VANETs using RSSI," in IEEE Journal on Selected Areas in Communications.
15. M. Li et al., "A Regional Statistics Detection Scheme against Sybil Attacks in WSNs," 2013 12th IEEE International Conference on
Trust, Security and Privacy in Computing and Communications, Melbourne, VIC, 2013, pp. 285-291.
16. M. Li et al., "A Regional Statistics Detection Scheme against Sybil Attacks in WSNs," 2013 12th IEEE International Conference on
Trust, Security and Privacy in Computing and Communications, Melbourne, VIC, 2013, pp. 285-291.
17. Y. Yao et al., "Multi-Channel Based Sybil Attack Detection in Vehicular Ad Hoc Networks Using RSSI," in IEEE Transactions on
Mobile Computing, vol. 18, no. 2, pp. 362-375, 1 Feb. 2019.
doi: 10.1109/TMC.2018.2833849
18. U. Sabeel, N. Chandra and S. Dagadi, "A Novel Scheme for Multiple Spoof Attack Detection and Localization on WSN-based Home
Security System," 2013 5th International Conference and Computational Intelligence and Communication Networks, Mathura, 2013,
pp. 360-367.
19. L. Zhang, H. Yang, Y. Yu and F. Peng, "A Three-Dimensional Node Security Localization Method for WSN Based on Improved
RSSI-LSSVR Algorithm," 2018 10th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA),
Changsha, 2018, pp. 182-186.
20. M. T. Garip, P. H. Kim, P. Reiher and M. Gerla, "INTERLOC: An interference-aware RSSI-based localization and sybil attack
detection mechanism for vehicular ad hoc networks," 2017 14th IEEE Annual Consumer Communications & Networking Conference
(CCNC), Las Vegas, NV, 2017, pp. 1-6.
21. Y. Yao et al., "Voiceprint: A Novel Sybil Attack Detection Method Based on RSSI for VANETs," 2017 47th Annual IEEE/IFIP
International Conference on Dependable Systems and Networks (DSN), Denver, CO, 2017, pp. 591-602.
22. S.C.Mana,”A Feature Based Comparison Study of Big Data Scheduling Algorithms”, 2018 International Conference on Computer,
Communication and Signal Processing (ICCCSP), Chennai 2018, PP1-3, doi:10.1109/ICCCSP.2018.8452837
23. Suja Cherukullapurath Mana, B.Keerthi Samhitha, Jithina Jose, Mydam Venkata Sawroop, Palagiri Chaitanya Kumar Reddy, “Traffic
Violation Detection using Principal Component Analysis and Viola Jones Algorithms” International Journal of Recent Technology
and Engineering (IJRTE) ISSN:2277-3878, Volume-8 Issue-3, September 2019
24. R.Surendran, B.Keerrthi Samhitha, “Energy Aware Grid Resource Allocation by Using a Novel Negotiation Model”, Journal of
theoretical and Applied Information Technology, 2014, ISSN:1992-8645, E ISSN: 1817-3195, Vol-68 No-3.
25. Jithina Jose, Suja Cherukullapurath Mana, B Keerthi Samhitha, “An Efficient System to Predict and Analyze Stock Data using Hadoop
Techniques” International Journal of Recent Technology and Engineering (IJRTE) ISSN:2277-3878, Volume-8 Issue-2, July 2019
26. A.Brodsky, Suja Cherukullapurath Mana, Mahmoud Awad and N. Egge, “A Decision guided advisor to maximize ROI in Local
Generation and Utility contracts, “ISGT 2011, Anaheim, CA, 2011, pp. 1-7, doi:10.1109/ISGT.2011.5759185

Authors: Manasa Ungrapalli N S, Myna A N

493. Paper Title: Classification of Pap smear images for Cervical cancer using Convolutional Neural Network
Abstract: Classification of Pap smear images for cervical cancer consists of two types namely, normal 2801-
and abnormal cancerous cells. The dataset involves 7 sets of classes of cancerous images which have 3 sets of 2807
normal cancerous images and 4 sets of abnormal cancerous images. The proposed work performs two stages of
classification. The first stage of the work is classifying the data as normal or abnormal cancerous cells. In the
second stage of the work, the class of the cancer as normal columnar, normal intermediate, normal superficial,
light dysplasia, moderate dysplasia, severe dysplasia and carcinoma_in_situ are classified. The proposed work
gives good results for classifying images for 3 sets of classes and 4 sets of classes for normal cells and is able
to classify and detect normal and abnormal cell accurately.

Keyword : Deep Learning, Convolutional Neural Network, Cervical Cancer, Pap smear images.
References:
1. Ayaka Iwai, Toshiyuki Tanaka, “Automatic Diagnosis Supporting System for Cervical Cancer using Image processing”, Proceeding of
the SICE Annual Conference 2017,Sept 19-22,Kanazawa University, Kanazawa, Japan.
2. A. Jemal, F. Bray, M.M. Center, J. Ferlay, E. Ward, D. Forman, Global cancer statistics, CA: A Cancer Journal for Clinicians 61 (2)
(2011) 69–90.
3. Pabitra Mitra, Sushmita Mitra,” Staging of Cervical Cancer using Soft Computing”, IEEE TRANSACTIONS ON BIOMEDICAL
ENGINEERING, VOL. 47, NO. 7, JULY 2000.
4. E. Bengtsson and P. Malm, “Screening for cervical cancer using automated analysis of PAP-smears,” Computational and Mathematical
Methods in Medicine, vol. 2014, 2014.
5. Rikiya Yamashita, Mizuho Nishio ,Richard Kinh Gian Do, Kaori Togashi,” Convolutional neural networks: an overview and
application in radiology”, 611, Springer Berlin Heidelberg Insights Imaging (2018) 9.
6. Erick Njoroge, Stephen R. Alty, “Classification of Cervical Cancer Cells using FITR data”, Proceedings of the 28th IEEE on EMBS
Annual Conference ,New York City, USA, Aug 30-Sept 3 2006.
7. T. Chankong, N. Theera-Umpon, and S. Auephanwiriyakul, “Automatic cervical cell segmentation and classification in pap smears,”
Computer Methods And Programs In Biomedicine, vol. 113, no. 2, pp. 539–556, 2014.
8. Miao Wu, Chuanbo Yan, Huiquiang Liu, Qian Liu, Yi Yin, “ Automatic Classification of Cervical Cancer from Cytological Images by
using Convolutional Neural Network”, Bioscience reports, Nov 2018.
9. Wasswa WILLIAM1, Annabelle Habinka BASAZA-EJIRI2, Johnes OBUNGOLOCH1,Andrew WARE,“A Review of Applications of
Image Analysis and Machine Learning Techniques in Automated Diagnosis and Classification of Cervical Cancer from Pap-Smear
images”, , IST-Africa 2018 Conference Proceedings Paul Cunningham and Miriam Cunningham (Eds) IIMC International Information
Management Corporation, 2018.
10. C. H. Lin, Y. K. Chan, and C. C. Chen, “Detection and segmentation of cervical cell cytoplast and nucleus,” Int. J. Imaging Syst.
Technol., vol. 19, no. 3, pp. 260–270, 2016.
11. Debashree Kashyap, Abhishek Somani, Jatin Shekhar, Anupama Bhan, Malay Kishore Dutta, Radin Burget, Kamil Riha, “Cervical
Cancer Detection and Classification using Independent Level Sets And Multi SVMs” , 2016, IEEE, 39 th International Conference on
Telecommunications and Signal Processing(TSP), 27-29June 2016.
12. Kasemsit Teeyapan, Nipon Theeraa-Umpon, Sansanee Auephanwiriyakul, “Application of Support Vector based Methods for Cervical
Cancer cell Classification “, 2015 IEEE International Conference on Control System, Computing and Engineering.

Authors: Padmavathi C, Veenadevi S V

Paper Title: An Optimized FPGA Based System Design for the Arrhythmia Detection using ECG
Abstract: Electrocardiogram signals are highly susceptible to interferences caused due to various kinds of
noises including artefacts’, disruptions in power lines attained from the human interferences and device
disturbances. These noise signals tend to lower the quality of signals that result in crucial environment for
detecting and diagnosing different types of arrhythmia. In order to avoid this issue, multiple filtering techniques
are being incorporated out of all Gaussian filters with Haar DWT portray better outcomes in noise elimination
and smoothening of signal. The process of ECG signal filtering allows performing the testing and validation of
in the actual world emulation. Enhancement in PSNR ratio is observed by using the ECG signal filters along the
reconstructed signal. For a given input ECG signal, the levels of the signal peak decide if the patient is suffering
from arrhythmia or not. If peak is low, patient is detected with the arrhythmia disease, if high patient is normal.
The results can be observed in simulation. FPGA prototyping of the design is carried out along the hardware
debugging in chip scope pro tool. The design is realized using Verilog coding with the technique of
morphological filtering. For the purpose of debugging the hardware device used is Artix-7. The FPGA
methodology is success full in a position to detect arrhythmia. The framework based on FPGA is structured and
executed in the paper which can detect a type of arrhythmia which indicates Atrio Ventricular block along with
494.
all the noises removed. The simulation results are obtained by taking ECG signals from MIT-BIH arrhythmia
database. The proposed FPGA based system design is proven to be optimized as it showed very less utilization 2808-
of resources when compared to previous arrhythmia detection system designs. 2818

Keyword : Arrhythmia, Atrix-7, FPGA, Haar DWT, Morphological Filtering.


References:
1. Tompkins, Willis J. “Biomedical digital signal processing,” Editorial Prentice Hall , 1993.
2. Sörnmo, Leif, and Pablo Laguna, “Electrocardiogram (ECG) signal Processing,” Wiley encyclopedia of biomedical engineering, 2006.
3. Bhateja, Vikrant, et al., “A composite wavelets and morphology pproach for ECG noise filtering,” International Conference on
Pattern Recognition and Machine Intelligence. Springer, Berlin, Heidelberg, 2013.
4. Keating, Mark T., and Michael C. Sanguinetti, “Molecular and cellular mechanisms of cardiac arrhythmia,” Cell 104.4 , 2001, pp.
569-580.
5. Parák, Jakub, and Jan Havlík, “ECG signal processing and heart rate frequency detection methods,” Proceedings of Technical
Computing Prague 8, 2011.
6. De Chazal, Philip, Maria O'Dwyer, and Richard B. Reilly, “Automatic classification of heartbeats using ECG morphology and
heartbeat interval features,” IEEE transactions on biomedical engineering 51.7, 2004, pp. 1196-1206.
7. Kazakeviciute, Margarita, Algimantas Juozapavicius, and Ruta Samaitiene, “Morphological filtering of EEG," Materials Physics and
Mechanics 9.3, 2010, pp. 185-193.
8. Zhang, Fei, and Yong Lian, “QRS detection based on multiscale mathematical morphology for wearable ECG devices in body area
networks,” IEEE Transactions on Biomedical Circuits and Systems 3.4, 2009, pp. 220-228.
9. Ghorbanian, Parham, et al. “Heart arrhythmia detection using continuous wavelet transform and principal component analysis with
neural network classifier,” Computing in Cardiology, IEEE, 2010.
10. Chan, H. L., et al. “Heartbeat detection using energy thresholding and template match,” Engineering in Medicine and Biology Society,
IEEE-EMBS, 27th Annual International Conference of the IEEE, 2006.
11. Zheng, Peijia, and Jiwu Huang, “Discrete wavelet transform and data expansion reduction in homomorphic encrypted domain,” IEE E
Transactions on Image Processing, 2013 pp. 2455-2468.
12. Audithan, S., and R. M. Chandrasekaran, “Document text extraction from document images using haar discrete wavelet transform, ”
European Journal of Scientific Research 36.4, 2009, pp.502-512.
13. Vijendra, V., and Meghana Kulkarni, “ECG signal filtering using DWT haar wavelets coefficient techniques,” Emerging Trends in
Engineering, Technology and Science (ICETETS), International Conference on. IEEE, 2016.
14. Rajpurkar, Pranav, et al. “Cardiologist-level arrhythmia detection with convolutional neural networks,” arXiv preprint, arXiv: 1707-
01836, 2017.
15. Lobodzinski, S. Suave, and Michael M. Laks, “New devices for very long-term ECG monitoring,” Cardiology journal 19.2 , 2012, pp.
210-214.
16. Nasiri, Jalal A., et al. “ECG arrhythmia classification with support vector machines and genetic algorithm,” Computer Modeling and
Simulation, EMS'09, Third UK Sim European Symposium on. IEEE, 2009.
17. Alonso-Atienza, Felipe, et al. “Detection of life-threatening arrhythmias using feature selection and support vector machines,” IEEE
Transactions on Biomedical Engineering 61.3 2014, pp. 832-840.
18. Kanhe, R. K., and S. T. Hamde, “ECG signal compression using 2-D DWT Hermite coefficients," Signal and Information Processing
(IConSIP), International Conference on. IEEE, 2016.
19. Martínez, Juan Pablo, et al. “A wavelet-based ECG delineator: evaluation on standard databases,” IEEE transactions on biomedical
engineering 51.4, 2004, pp. 570-581.
20. Meddah, Karim, HadjerZairi, and Malika Kedir Talha, “New system cardiac arrhythmia detection on FPGA,” Modelling, Identification
and Control (ICMIC), 7th International Conference on. IEEE, 2015.
21. Tripathi, Avinash, and Shahanaz Ayub, “Heart Rate Variability Detection in Arrhythmia,” Computational Intelligence and
Communication Networks (CICN), International Conference on. IEEE, 2015.
22. Besrour, Rym, ZiedLachiri, and Noureddine Ellouze, “Detection of an electrocardiogram R wave based on the multiscale products:
MIT/BIH arrhythmia and Qt databases evaluation,” Signal Processing and its Applications, ISSPA 2007, 9th International Symposium
on. IEEE, 2007.
23. Clifford, G. D., et al. “Model-based filtering, compression and classification of the ECG,” International Journal of Bio
electromagnetism 7.1. 2005, pp. 158-161.
24. Alhelal, Dheyaa, et al. “FPGA-based denoising and beat detection of the ECG signal,” Systems, Applications and Technology
Conference (LISAT), IEEE, 2015.

Authors: R. Kavitha, Sonal Singh

Paper Title: Optimizing Stock market prediction using Long Short Term Memory
Abstract: Stock market prediction has been an important issue in the field of finance, engineering and
mathematics due to its potential financial gain. Stock market prediction is a process of predicting the future
value of a company stock or other financial instrument traded in financial market. Stock market prediction
brings with it the challenge of proving whether the financial market is predictable or not, since stock market data
is of high velocity. This project proposes a machine learning model to predict stock market price based on the
data set available by using LSTM model for performing prediction by de-noising the data using wavelet
transform and performing auto-encoding on the data. The process includes removal of noise, preprocessing,
feature selection, data mining, analysis and derivations. This project focuses mainly on the use of LSTM
algorithm along with a layer of neural network to forecast stock prices and allocate stocks to maximize the profit
within the risk factor range of the stock buyers and sellers.
Keyword : prediction; LSTM; de-noise; auto encoders; feature selection
References:
1. G Applying LSTM neural network for predicting stock closingprice, tingwei gao,yieting chai,yi lie, Journal of science and technology
volume 68,jan8
2. Applied attention based LSTM neural networkin stock predictors, li chen cheng,yu hsing huang, mu enwu, Ieee explorer,10.01.11,jan14
495. 3. Stock transaction prediction Modelling and Analysis based on LSTM, siyauan liu,guangz hong,yiftan ding, hubey laboratory of
intelligent information processing and real time industrial system, Wuhan, China.
4. Prediction of Stock Market Price using Hybrid of Wavelet Transform and artificial Neural network, S.kumar, M.sumathi, 2819-
S.N.sivananda,chennai. 2823
5. Feature selection,rajajiram,Computer Science magazine,chapter .
6. Stock prediction using twitter sntiment analysis,Anshul Mittal,Arpit Goel,International conference on sience and technology,standford
university,2012.
7. Predicting stock prices using data mining techniques,qasem a. al. radaideh,adel abu assaf,eman alnagi,the internatiomal arab conference
on international technology,Dec 2013
8. Stock market prediction using artificial neural network,Bigul kutlun,Meltez Ozuran ,Bestan badus,white paper,istanbul,turkey
9. Stock market forecasting technique literature survey, international journal of computer science and mobile computing ,vol5,isue
6,june2016.
10. Using ai to make predictions on stock market ,alice zheng,jack jin,jornal of co,mputer science,2015,june.
11. Machine learning techniques and use of event information for stock market prediction: a survey and evaluation by Paul D. Yoo, Maria H.
Kim,
12. Tony Jan 2007
13. A Multi agent approach to Q-learning for daily stock trading by Jae Won Lee, Jonghun Park, Member, IEEE, Jangmin O, Jongwoo
Lee, and Euyseok Hong 2007
14. Intelligent Stock Trading System based on SVM Algorithm and Oscillation Box Prediction by Qinghua Wen, Zehong Yang, Yixu
Song,
15. Peifa Jia
16. Forecasting Intraday Stock Price Trends with Text Mining Techniques by Mittermayer, University of Bern, Institute of Information
Systems 2004.
17. Yin Hongcai, Zhao Chunyan. "Research on Stock Forecasting Based on Neural Network." Natural science journal of Harbin Normal
University 23.3(2007):47-49.
18. Fenu, Gianni, and S. Surcis. "A Cloud Computing Based Real Time Financial System. " ACM Symposium on Applied Computing
ACM, 2009:1219-1220.
19. Colah. Understanding LSTM Networks. http://colah.github.io/posts/ 2015- 08-Understanding- LSTMs/. 27.8(2015).
20. Gers F., A., J. Schmidhuber, and F. Cummins. "Learning to Forget: Continual Prediction with LSTM." Neural Computation
2.10(1999): 2451-71.
21. Sundermeyer, Martin, R. Schlüter, and H. Ney. "LSTM Neural Networks for Language Modeling." Interspeech 2012:601-608.

Authors: P. Sai Vinay Kumar, M. N. Giri Prasad

Paper Title: Design and Development of Miniaturized Planar Array Antenna for Multi Functional Radar
Abstract: Miniaturized multi functional planner array antennas are presented for both L and S bands in this
paper. A 3x8 array is proposed and the distance between antenna elements is only λ/2 so that size reduced
significantly. The two dielectric substrates FR4 and RT duriod 6010 are used for different antennas. The antenna
with FR4 substrate is fabricated and compared the results with simulated values. Coaxial feeding technique is
adopted. Dual frequency multi functional array is simulated .Better gains, return losses and radiation patterns are
obtained .The circular polarization is obtained by truncating the elements and it is useful for navigation. The
results are compared with existing multi object tracking radar (MOTR).

Keyword : Multi Frequency, Array, coaxial feed ,MOTR, circular polarization.

496. References:
1. Fu, Shiqiang, et al. "Broadband circularly polarized slot antenna array fed by asymmetric CPW for L-band applications." IEEE
Antennas and wireless propagation letters 8 (2009): 1014-1016. 2824-
2. Chauloux, Antoine, et al. "High power pattern reconfigurable phased antenna array based on a GaN HEMT." 2016 IEEE Conference 2828
on Antenna Measurements & Applications (CAMA). IEEE, 2016..
3. Fu Shi-Qiang “Broadband Circularly Polarized Slot Antenna Array Fed by Asymmetric CPW for L-Band Application,” Fu ShiQiang:
.IEEE Antennas and Wireless Propagation Letters, vol. 8, 2010, pp.1014-1016, 2009.
4. Sekhar, M., E. Kusuma Kumari, and ANV Ravi Kumar. "Wideband High-Gain Circularly Polarized Planar Antenna Array for L Band
Radar." 2017 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC). IEEE, 2017.
5. Ge, Lei, and Kwai Man Luk. "A three-element linear magneto-electric dipole array with beamwidth reconfiguration." IEEE Antennas
and Wireless Propagation Letters 14 (2014): 28-31.
6. Brookner, Eli. "Phased-array and radar breakthroughs." 2007 IEEE Radar Conference. IEEE, 2007.
7. S. Clauzier, S. M. Mikki and Y. M. M. Antar, "Design of Near-Field Synthesis Arrays Through Global Optimization," in IEEE
Transactions on Antennas and Propagation, vol. 63, no. 1, pp. 151-165, Jan. 2015.
8. Hassan Elesawy, W. Swelam, Abdalmonem Fouda, Ismail M. Hafez “Design of Microstrip Array Antenna for Wireless
Communication Application” IOSR Journal of Engineering, Vol. 3, Issue 12, December 2013.
9. Zandikiya, F., & Asadpor, L. (2017). Broadband Circularly Polarized Slot Antenna Array Fed by Asymmetric CPW for C-Band
Applications. IETE Journal of Research, 1–6.

Authors: Lakshna Arun, T. N. Ravi

Paper Title: Optimization-based Offloading Method for Mobile Cloud Computing Environment
Abstract: Mobile cloud computing (MCC) is a program that should be applied to defeat the hurdles of
computing in the mobile environment. Though developing data-intensive purposes, such as Natural Language
Processing (NLP) and face recognition, takes more difficulties on mobile cloud computing stages because of
data location and high bandwidth cost issues. To overcome these issues, this paper proposes a dynamic task
(resources) allocation model to schedule data-intensive applications on mixed resources (public cloud, cloudlets,
and mobile devices) computing environments. Efficient task allocation strategy requires to develop by
estimating the number of intentions while performing the decisions of allocation, such as fast response and
reduced consumption of energy, to obtain the most reliable task allocation providing the requirements of cloud
users and increasing the MCC environment performance. In this paper, Cultural Algorithm (CA) based
offloading strategy is proposed for obtaining the minimized task execution time by causing smart decisions for
allocation. This proposed algorithm has been implemented using a cloudsim toolkit, and the performance is
497. estimated by analyzing with Genetic and greedy algorithm allocation techniques on a collection of parameters
like throughput and makespan for scheduling the resource. 2829-
2833
Keyword : Mobile Cloud Computing, Cloudlets, Resource Allocation, Genetic Algorithm, Cultural
Algorithm, Greedy Method.
References:
1. Miettinen, Antti P., and Jukka K. Nurminen. "Energy efficiency of mobile clients in cloud computing." HotCloud 10.4-4 (2010): 19.
2. Wen, Yonggang, Weiwen Zhang, and Haiyun Luo. "Energy-optimal mobile application execution: Taming resource-poor mobile
devices with cloud clones." 2012 Proceedings Ieee Infocom. IEEE, 2012.
3. Park, JiSu, HeonChang Yu, and EunYoung Lee. "Resource allocation techniques based on availability and movement reliability for
mobile cloud computing." International Conference on Distributed Computing and Internet Technology. Springer, Berlin, Heidelberg,
263-264, 2012.
4. Chen, Min, et al. "Cloud-based wireless network: Virtualized, reconfigurable, smart wireless network to enable 5G
technologies." Mobile Networks and Applications 20.6 (2015): 704-712.
5. Wan, Jiafu, et al. "VCMIA: A novel architecture for integrating vehicular cyber-physical systems and mobile cloud computing." Mobile
Networks and Applications 19.2 (2014): 153-160.
6. Wen, Yonggang, Weiwen Zhang, and Haiyun Luo. "Energy-optimal mobile application execution: Taming resource-poor mobile
devices with cloud clones." 2012 Proceedings Ieee Infocom. IEEE, 2716-2720, 2012.
7. Cardellini, Valeria, et al. "A game-theoretic approach to computation offloading in mobile cloud computing." Mathematical
Programming 157.2 (2016): 421-449.
8. Srirama, Satish Narayana, Eero Vainikko, and Matthias Jarke. "Supporting mobile web service provisioning with cloud computing."
(2010).
9. Khan, Zaheer, Saad Liaquat Kiani, and Kamran Soomro. "A framework for cloud-based context-aware information services for citizens
in smart cities." Journal of Cloud Computing 3.1 (2014): 14.
10. Wu, Huaming, et al. "An optimal offloading partitioning algorithm in mobile cloud computing." International Conference on
Quantitative Evaluation of Systems. Springer, Cham, 2016.
11. Nandi, Enakshmi, et al. "Improved Cost-Effective Technique for Resource Allocation in Mobile Cloud Computing." Progress in
Computing, Analytics, and Networking. Springer, Singapore, 2018. 551-558.
12. Latiff, Muhammad Shafie Abd, Syed Hamid Hussain Madni, and Mohammed Abdullahi. "Fault tolerance aware scheduling technique
for cloud computing environment using dynamic clustering algorithm." Neural Computing and Applications 29.1 (2018): 279-293.
13. Tang, Chaogang, et al. "Energy-aware task scheduling in mobile cloud computing." Distributed and Parallel Databases36.3 (2018):
529-553.
14. Durga, S., S. Mohan, and J. Dinesh Peter. "A Two-Stage Queue Model for Context-Aware Task Scheduling in Mobile Multimedia
Cloud Environments." Advances in Big Data and Cloud Computing. Springer, Singapore, 2018. 287-297.
15. Fang, Weiwei, et al. "OKRA: optimal task and resource allocation for energy minimization in mobile edge computing
systems." Wireless Networks 25.5 (2019): 2851-2867.

Authors: G. Kalaimani, G. Kavitha

Paper Title: Ensembled Adaboost Learning with Id3 Algorithm for Energy Aware Data Gathering in WSN
Abstract: In this paper, data collection is the operation of gathering a lot of details from the sensor nodes
and shipping it to the sink node. The use of Network is increasingly required to perform these processes, so,
increases energy consumption. A lot of WSN architectures are designed to solve this complex problem. By using
a technique called Decision Tree Classifier using Adaboost (DTCA) algorithm, can extension that data
collection efficiency, as well as reducing the delay and Power consumption. In the proposed methodology, the
power of each sensor node should be estimated at the outset. Then the mobile sink node receives the information
from the high power sensor nodes with minimal delay. The mobile sink node classifies the data pockets using
the Decision Tree Classifier. This classifies based on the relationship between the sensor nodes in WSN. That
relationship is measure using the method of population Pearson product moment correlation coefficient.
Adaboost algorithm is a combination of several weak non-linear classifiers to create a higher classification. Then
finally, it sends classified particulars to Base Station. The operation of the DTCA system is convey out with
divergent parameters such as classification time, EC, (Network Lifetime) NL, data collection capability,
Classification Accuracy (CA), (FPR) false positive rate and delay.

Keyword : Data Collection, WSN, Classification, Energy Consumption, DTCA, Pearson Product-Moment
Correlation Coefficient
References:
1. Yongmin Zhang, Shibo He and Jiming Chen, “Near Optimal Data Gathering in Rechargeable Sensor Networks with a Mobile Sink”,
IEEE Transactions on Mobile Computing, Volume 16, Issue 6, June 2017, Pages 1718-1729
2. Cong Wang, SongtaoGuo, and Yuanyuan Yang, “An Optimization Framework for Mobile Data Collection in Energy-Harvesting
Wireless Sensor Networks”, IEEE Transactions on Mobile Computing, Volume 15, Issue 12, December 2016, Pages 2969 -2986
498. 3. Chih-Min Chao and Tzu-YingHsiao, “Design of structure-free and energy-balanced data aggregation in wireless sensor networks”,
Journal of Network and Computer Applications, Elsevier, Volume 37, January 2014, Pages 229-239
4. Jin-Tao Meng, Jian-Rui Yuan, Sheng-Zhong Feng, Yan-Jie Wei, “An Energy Efficient Clustering Scheme for Data Aggregation in 2834-
Wireless Sensor Networks”, Journal of Computer Science and Technology, Springer, Volume 28, Issue 3, 2013, Pages 564 –57 2840
5. Shusen Yang, Usman Adeel, Yad Tahir, and Julie A. McCann, “Practical Opportunistic Data Collection in Wireless Sensor Networks
with Mobile Sinks”, IEEE Transactions on Mobile Computing, Volume 16, Issue 5, May 2017, Pages 1420 – 1433
6. Chuan Zhu , Shuai Wu , Guangjie Han, Lei Shu , Hongyi Wu, “A Tree-Cluster-Based Data-Gathering Algorithm for Industrial WSNs
With a Mobile Sink”, IEEE Access , Volume 3.
7. Ping Zhong, Ya-Ting Li, Wei-RongLiu ,Gui-Hua Duan, Ying-Wen Chen, and Neal Xiong, “Joint Mobile Data Collection and Wireless
Energy Transfer in Wireless Rechargeable Sensor Networks”, Sensors, Volume 17, Issue 8, 2017, Pages 1-23
8. PrabhuduttaMohanty andManasRanjanKabat, “Energy efficient structure-free data aggregation and delivery in WSN”, Egyptian
Informatics Journal, Elsevier, Volume 17, Issue 3, 2016, Pages 273-284
9. Soobin Lee and Howon Lee, “Energy-Efficient Data Gathering Scheme Based on Broadcast Transmissions in Wireless Sensor
Networks”, the ScientificWorld Journal, Hindawi Publishing Corporation, Volume 2013, July 2013, Pages 1-7
10. Shouling Ji, Raheem Beyah, and ZhipengCai, “Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks”,
IEEE Transactions on Mobile Computing, Volume 13, Issue 3, 2014, Pages 626-637
11. Ngoc-TuNguyena, Bing-Hong Liu, Van-Trung Pham, Yi-Sheng Luo, “On maximizing the lifetime for data aggregation in wireless
sensor networks using virtual data aggregation trees”, Computer Networks, Elsevier, Volume 105, 2016, Pages 99-110
12. Liang He, Jianping Pan, and Jingdong Xu, “A Progressive Approach to Reducing Data Collection Latency in Wireless Sensor
Networks with Mobile Elements”, IEEE Transactions on Mobile Computing, Volume 12, Issue 7, 2013, Pages 1308 – 1320
13. Soo-HoonMoona, Sunju Park, Seung-jae Han, “Energy efficient data collection in sink-centric wireless sensor networks: A cluster-ring
approach”, Computer Communications, Elsevier, Volume 101, 2017, Pages 12-25
14. Ilkyu Ha, MamurjonDjuraev, and ByoungchulAhn, “An Energy-Efficient Data Collection Method for Wireless Multimedia Sensor
Networks”, International Journal of Distributed Sensor Networks, Hindawi Publishing Corporation, Volume 2014, September 2014,
Pages 1-8
15. Liangshan Jiang, Anfeng Liu, Yanling Hu, Zhigang Chen, “Lifetime maximization through dynamic ring-based routing scheme for
correlated data collecting in WSNs”, Computers & Electrical Engineering, Elsevier, Volume 41, 2015, Pages 191-215
16. Leandro Aparecido Villas, AzzedineBoukerche, HeitorSoares Ramos, Horacio A.B. Fernandes de Oliveira, Regina Borges de Araujo,
and Antonio Alfredo Ferreira Loureiro, “ DRINA: A Lightweight and Reliable Routing Approach for In-Network Aggregation in
Wireless Sensor Networks”, IEEE Transactions on Computers Volume 62, Issue 4, April 2013, Pages 676–689
17. MouloodHeidari, Akbar Nooriemamzade, Hamid Reza Naji, “Effect of using mobile sink and clustering on energy consumption in
wireless sensor networks”, Turkish Journal of Electrical Engineering & Computer Sciences, 2015, Pages 1-16
18. Weigang Wu, Jiannong Cao, HejunWu ,Jingjing Li, “Robust and dynamic data aggregation in wireless sensor networks: A cross-layer
approach”, Computer Networks , Elsevier, Volume 57, 2013, Pages 3929–3940
19. MihaelaMitici, Jasper Goseling, Maurits de Graaf, Richard J. Boucherie, “Energy-efficient data collection in wireless sensor networks
with time constraints”, Performance Evaluation, Elsevier, Volume 102, August 2016, Pages 34–52
20. Yu Lasheng, Li Jie , Liu Renjie, “An effective data collection algorithm for wireless sensor network”, Computing, Springer, Volume
95, Issue 9, 2013, Pages 723–738
21. Wei Wang, Dan Wang , Yu Jiang, “Energy efficient distributed compressed data gathering for senso

Authors: Chaymae Laoufi, Ahmed Abbou, Mohammed Akherraz, Zouhair Sadoune


dSPACE Implementation of Improved Indirect Rotor Field-Oriented Control of Asynchronous
Paper Title: Motor using Fuzzy Self-Adjustable Proportional Integral Controller for Electric Vehicle
Applications
Abstract: This paper deals with the indirect rotor field-oriented control of asynchronous motor whose
speed is controlled by a fuzzy self-adjustable proportional integral controller. This motor drive is used to propel
an electric vehicle. The designing and the implementing of the fuzzy self-adjustable proportional integral
controller are presented. This controller is proposed as a solution to compensate for the effect of the machine
parameters variation and the external conditions. The characteristic of this controller is its capacity to adapt in
real time its gains in order to reject the machine parameters disturbances. A series of measurements has been
achieved to prove the performances of the improved drive using the proposed controller. Experimental results
showed the high-speed tracking and the rejection disturbances capacity of the fuzzy self-adjustable proportional
integral controller.

Keyword : Indirect rotor-field-oriented control, fuzzy self-adjustable proportional integral controller,


standard proportional integral controller, Electric vehicle, dSPACE Package.

499. References:
1 Z. Guo, et al, “Indirect Field Oriented Control of Three-Phase Induction Motor Based on Current-Source Inverter,” Procedia
Engineering, vol. 174, pp. 588-594, 2017.
2 H. Khelif, et al, “Direct Rotor Field-Oriented Control of a dual star Induction Machine”, 2017 IEEE International Conference on Green
2841-
Energy Conversion Systems, 2017. 2847
3 C. Laoufi, A Abbou and M. Akherraz, “Comparative study between different speed controller techniques applied to the indirect field-
oriented control of an induction machine-performances and limits,” WSEAS TRANSACTIONS on SYSTEMS and CONTROL, vol 10,
pp. 360-372, 2015
4 G. Singh and G. Singh, “A fuzzy pre-compensated-PI controller for indirect field oriented controlled induction motor drive”, 2014
Innovative Applications of Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH), p p.
257-261, 2014.
5 C. Laoufi, A Abbou and M. Akherraz, “Real time comparative analysis of several intelligent speed controllers applied to the direct
torque control of asynchronous machine,” Advances in Intelligent Systems and Computing, vol 10, pp. 360-372, 2015
6 C. Laoufi, A. Abbou and M. Akherraz, “Improvement of Direct Torque Control Performance of Induction Machine by using Self Tuning
Fuzzy Logic Controller for Elimination of Stator Resistance Variation Effect,” 2016 IEEE International Renewable and Sustainable
Energy Conference (IRSEC), 2016.
7 M. Masiala, and A. Knight, “Self-tuning speed controller of indirect field-oriented induction machine drives,” 17th International
Conference on Electrical Machines, pp. 563-568, 2006.
8 C. Laoufi, A. Abbou, Y. Sayouti, and M. Akherraz, “Self tuning fuzzy logic speed controller for performance improvement of an indirect
field-oriented control of induction machine,” International Review of Automatic Control, Vol. 6, pp. 464-471, 2013.
9 C. Laoufi, A. Abbou and M. Akherraz,“Real Time Comparative Analysis of Several Intelligent Speed Controllers Applied to the Direct
Torque Control of Asynchronous Machine,” Proceeding of the Future Technologies Conference (FTC) 2018, Advances in Intelligent
Systems and Computing 881, edited by Kohei Arai, Rahul Bhatia and Supriya Kapoor, Springer Nature Switzerland AG 2019, Vol 2, pp.
797-826, 2019.

Authors: Ch. Venkateswarlu, P. Uma Maheswari

Paper Title: Implementation of Link Fingerprint Verification and Data Provenance using RSSI
Abstract: Due to constrained assets and adaptability, security protocol for Internet of Things (IoT) should
be light-weighted. The cryptographic solutions are not possible to apply on little and low-power devices of IoT
in view of their power and space impediments. In this paper, a light-weight protocol to verify the information
and accomplishing information provenance is introduced for multi-hop IoT arrange. The Received Signal
Strength Indicator (RSSI) of conveying IoT nodes are utilized to produce the connection fingerprints. The
connection fingerprints are coordinated at the server to process the relationship coefficient. Higher the
estimation of connection coefficient, higher the rates of verified information move. Lower worth gives the
recognition of ill-disposed node in the middle of a particular connection. Information provenance has
500.
additionally been accomplished by examination of pocket header with all the accessible connection fingerprints
at the server. The time unpredictability is processed at the node and server level, which is O(1). The power 2848-
scattering is determined for IoT nodes and overall network. The outcomes demonstrate that the power utilization 2854
of the framework and time complexity. Exploratory outcomes show that up to 97% connection is accomplished
when no attacker node is available in the IoT network.

Keyword : Internet of Things, Access Control Scheme, cryptography.


References:
1. Y. Yang, L. Wu, G. Yin, L. Li, and H. Zhao, “A survey on security and privacy issues in internet-of-things,” IEEE Internet of Things
Journal, vol. 4, no. 5, pp. 1250–1258, Oct 2017. [Online]. Available: http://ieeexplore.ieee.org/document/7902207/
2. S. Satpathy, S. Mathew, V. Suresh, and R. Krishnamurthy, “Ultra-low energy security circuits for iot applications,” in IEEE 34th
International Conference on Computer Design (ICCD), 2016, pp. 682–685.
3. M. N. Aman, K. C. Chua, and B. Sikdar, “Mutual authentication in iot systems using physical unclonable functions,” IEEE Internet of
Things Journal, vol. 4, no. 5, pp. 1327–1340, Oct 2017. [Online]. Available: http://ieeexplore.ieee.org/document/7924368/
4. T. Idriss, H. Idriss, and M. Bayoumi, “A puf-based paradigm for iot security,” in IEEE 3rdWorld Forum on Internet of Things (WF-
IoT), 2016, pp. 700–705.
5. S.-R. Oh and Y.-G. Kim, “Security requirements analysis for the iot,” in International Conference on Platform Technology and Service
(PlatCon), 2017, pp. 1–6.
6. M. I. M. Saad, K. A. Jalil, and M. Manaf, “Achieving trust in cloud computing using secure data provenance,” in IEEE Conferen ce on
Open Systems (ICOS), 2014, pp. 84–88.
7. S. T. Ali, V. Sivaraman, D. Ostry, G. Tsudik, and S. Jha, “Securing first-hop data provenance for bodyworn devices using wireless link
fingerprints,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 12, pp. 2193–2204, Dec 2014. [Online]. Available:
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6898844
8. K. Zhang, X. Liang, R. Lu, and X. Shen, “Sybil attacks and their defenses in the internet of things,” IEEE Internet of Things Journal,
vol. 1, no. 5, pp. 372–383, Oct 2014. [Online]. Available: http://ieeexplore.ieee.org/document/6868197/
9. G. Kecskemeti, G. Casale, D. N. Jha, J. Lyon, and R. Ranjan, “Modelling and simulation challenges in internet of things,” IEEE Cloud
Computing, vol. 4, no. 1, pp. 62–69, Jan 2017. [Online]. Available: http://ieeexplore.ieee.org/document/7879128/
10. J. Pacheco and S. Hariri, “Iot security framework for smart cyber infrastructures,” in IEEE International Workshops on Founda tions
and Applications of Self* Systems, 2016, pp. 242–247.
11. Z. Bohan, W. Xu, Z. Kaili, and Z. Xueyuan, “Encryption node design in internet of things based on fingerprint features and cc2530,” in
IEEE International Conference on Green Computing and Communications (GreenCom), Internet of Things, and IEEE Cyber, Physical
and Social Computing (iThings/CPSCom), 2013, pp. 1454–1457.
12. J.-Y. Lee, W.-C. Lin, and Y.-H. Huang, “A lightweight authentication protocol for internet of things,” in International Symposium on
Next- Generation Electronics (ISNE), 2014, pp. 1–2.
13. M. N. Aman, K. C. Chua, and B. Sikdar, “Secure data provenance for the internet of things.” ACM Press, 2017, pp. 11–14. [Online].
Available: http://dl.acm.org/citation.cfm?doid=3055245.3055255
14. J. Qian, H. Xu, and P. Li, “A novel secure architecture for the internet of things.” IEEE, Sep 2016, pp. 398–401. [Online]. Available:
http://ieeexplore.ieee.org/document/7695208/
15. Y. Xie and D. Wang, “An item-level access control framework for intersystem security in the internet of things,” vol. 548-549, Apr
2014, pp. 1430–1432. [Online]. Available: https://www.scientific.net/AMM.548-549.1430
16. Q. Wang, D. Chen, N. Zhang, Z. Qin, and Z. Qin, “Lacs: A lightweight label-based access control scheme in iot-based 5g caching
context,” IEEE Access, vol. 5, pp. 4018–4027, 2017. [Online]. Available: http://ieeexplore.ieee.org/document/7872420/
17. Z. Zhou, C. Gao, C. Xu, Y. Zhang, S. Mumtaz, and J. Rodriguez, “Social big-data-based content dissemination in internet of vehicles,”
IEEE Transactions on Industrial Informatics, vol. 14, no. 2, pp. 768–777, Feb 2018. [Online]. Available:
http://ieeexplore.ieee.org/document/7995077/
18. Z. Zhou, K. Ota, M. Dong, and C. Xu, “Energy-efficient matching for resource allocation in d2d enabled cellular networks,” IEEE
Transactions on Vehicular Technology, vol. 66, no. 6, pp. 5256–5268, Jun 2017. [Online]. Available:
http://ieeexplore.ieee.org/document/7585029/
19. Z. Zhou, H. Yu, C. Xu, Y. Zhang, S. Mumtaz, and J. Rodriguez, “Dependable content distribution in d2d-based cooperative vehicular
networks: A big data-integrated coalition game approach,” IEEE Transactions on Intelligent Transportation Systems, vol. 19, no. 3, pp.
953–964, Mar 2018. [Online]. Available: http://ieeexplore.ieee.org/document/8264740/
20. Micaz-Wireless Measurement System, Crossbow Technology, 4 2007.

Authors: M. Swetha, M. Suneel kumar, S. Muthubalaji

Paper Title: Harmonic Mitigation of PV Based Grid-Connected Hybrid System using ANFIS
Abstract: Deriving quality power is the vital problem in power system network. The main focus of the
paper is to reduce the power quality issues mainly the reduction of harmonics using source compensation
technique. This paper proposes a grid integrated hybrid system with ANFIS. This hybrid system mainly consists
of PV panel, inverters, fuel cell, batteries and filters. Based on working principle and characteristics of the
proposed hybrid system, the composite control strategy about active power, reactive power and harmonic
suppression is proposed. The composite control strategy are of two loops ie., a single closed-loop control
response active power and reactive power, double closed-loop control responses harmonics. Both balanced
source condition and unbalanced source condition for three phase system are developed by Simulink model. The
balanced and unbalanced source performance is done by using ANFIS. PI controller and ANFIS are compared
with their Simulink results. Simulation results shows the performance of ANFIS is better than PI controller.

Keyword : Power quality, ANFIS controller, Harmonics, PV, Inverter, Grid.


501.
References: 2855-
1. XianyongXu, Lu Fang, Xianghu Xu, Xinjie Lu "Control strategy of photovoltaic generation inverter grid-connected operating and
harmonic elimination hybrid system." 2017 2nd International Conference on Power and Renewable Energy (ICPRE). IEEE, 2017. 2860
2. Sen Ouyang1, Qingpai Ke1*, Wenjie Ma1 “Control Strategy for Photovoltaic Grid-connected Inverter with Harmonic Suppression
International Conference on Electric Power Equipment - Switching Technology” 14 December 2017
3. Wajahat Ullah Tareena,, Saad Mekhilefa, Mehdi Seyedmahmoudianb, Ben Horanb “Active power filter (APF) for mitigation of power
quality issues in grid integration of wind and photovoltaic energy conversion system” 4 November 2016 .
4. Nguyen Duc Tuyen, Goro Fujita. “PV-Active Power Filter Combination Supplies Power to Nonlinear Load and Compensates Utility
Current”. IEEE Power and Energy Technology Systems Journal, vol. 2, no.1, pp. 32 - 42, March 2015.
5. Zhang Lisheng, Li Quan “Design.on Photovoltaic Cell MPPT Based onFuzzy Control”. Modern Electronics Technique, vol. 32, no.15,
pp.165-167, August 2009.
6. An Luo, Zhikang Shuai, Wenji Zhu, and Z. John Shen, “Combined System for Harmonic Suppression and Reactive Power
Compensation” IEEE Transactions On Industrial Electronics, Vol. 56, No. 2, February 2009.
7. Rosa A. Mastromauro, Marco Liserre, and Antonio Dell’Aquila, “Control Issues in Single-Stage Photovoltaic Systems: MPPT, Current
and Voltage Control” IEEE Transactions On Industrial Informatics, VOL. 8, NO. 2, MAY 2012.
8. Ding Ming, Wang Min “Distributed generation technology” Electric Power Automation Equioment, vol. 24, no.7, pp. 31–36, July
2004.
9. Suresh Mikkili and Panda A.K., “ PI and fuzzy logic controller based 3-phase 4-wire shunt active filter for mitigation of current
harmonics with Id–Iq control strategy”, Power Electronics (JPE), Vol.11, pp-914–21, 2011.
10. Saad S and Zellouma L., “Fuzzy logic controller for three-level shunt active filter compensating harmonics and reactive power”,
Electronics Power System Research , Vol.79, pp- 1337–1341, 2009.
11. Rodriguez P, Candela J.I, Luna A and Asiminoaei L., “ Current harmonics cancellation in three-phase four-wire systems by using a
four-branch star filtering Topology”, IEEE Transactions on Power Electronics, Vol. 24,pp-1939–50, 2009.
12. Kirawanich P and O,Connell R.M. (2004), “Fuzzy Logic Control of an Active Power Line Conditioner”, IEEE Transactions on Power
Electronics, Vol. 19, pp1574-1585, 2004.
13. PengF.Z, OttG.WandAdamsD.J.”Harmonic and reactive power compensation on generalized instantaneous reactive power theory for
three- phase four-wire systems”, IEEE Transactions on Power Electronics,Vol.13, pp-1174-81, 1998.
14. Chin Lin Chen; Chen E. Lin; Huang, C.L.; , "An active filter for unbalanced three-phase system using synchronous detection method,"
Power Electronics Specialists Conference, PESC '94 Record., 25th Annual IEEE , vol., no., pp.1451-1455 vol.2, 20-25 Jun 1994 .

Authors: Iswanto, Nanik Prasetyoningsih, Gendroyono, Guntur Nugroho, Meiyanto Eko Sulistyo

Paper Title: Building The Village of People Become a Healthy and Productive Community
Abstract: Dusun Penggung is one of the Dusun (sub-village) located in Giripurwo village, Girimulyo
district, Kulonprogo regency. The geographical condition, dry soil nd far distance from the city are the main
factors of underdeveloped village. Most of the people work as rice and corn farmers. During the dry season,
there is a decline in agricultural activities because lack of water so that the people leave the farmer works to
raising livestock and cultivating fish. The problem that occurs is the lack of skill in utilizating cattle dung to be
used as soil fertilizer, in fish farming which has a great potential to increase income, in the health sector where
the majority of Dusun Penggung residents work from morning to evening, which should require special attention
on the health. Based on these potentials and problems, building village society to be a healthy and productive
society program was conducted. The objectives of the program are to increase the knowledge and insight on the
use of animal manure as fertilizer, increase understanding of fish farming procedures and productivity by
making proper constructed fish ponds, provide information about various plants that are beneficial to health, and
502. provide knowledge about telang flowers tea and natural dyes to maintain health. The main programs carried out
included the utilization of animal manure, counseling and training on fish farming, counseling and training on 2861-
planting, and utilization of telang flowers tea for health.
2865

Keyword : About four key words or phrases in alphabetical order, separated by commas.
References:
1. G. O. Young, “Synthetic structure of industrial plastics (Book style with paper title and editor),” in Plastics, 2nd ed. vol. 3, J.
Peters, Ed. New York: McGraw-Hill, 1964, pp. 15–64.
2. J. Syaftriadi, A. Nur, N. Chamim, R. O. Wiyagi, and R. Syahputra, “LED and Servo Motor Control Via Bluetooth Based on Android
Applications,” Int. J. Recent Technol. Eng., vol. 8, no. 2, pp. 6227–6231, Jul. 2019.
3. A. N. N. Chamim, M. E. Fawzi, R. O. Wiyagi, I. Iswanto, and R. Syahputra, “Control of Wheeled Robots with Bluetooth-Based
Smartphones,” Int. J. Recent Technol. Eng., vol. 8, no. 2, pp. 6244–6247, Jul. 2019.
4. K. Purwanto, I. Iswanto, T. Khristanto, and M. Yusvin, “Microcontroller-based RFID, GSM and GPS for Motorcycle Security
System,” Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 3, pp. 447–451, 2019.
5. A. N. N. Chamim, M. Heru Gustaman, N. M. Raharja, and I. Iswanto, “Uninterruptable Power Supply based on Switching Regulator
and Modified Sine Wave,” Int. J. Electr. Comput. Eng., vol. 7, no. 3, p. 1161, Jun. 2017.
6. A. N. N. Chamim, D. Ahmadi, and Iswanto, “Atmega16 implementation as indicators of maximum

Authors: M. Aravinthraj, J. Udayaseelan, F. Liakath Ali Khan


Molecular Interactions and Dielectric Relaxation in the Mixtures of Amines with 2 Fluorobenzoic
Paper Title:
Acid in 1, 4 Dioxane
Abstract: For the present study, the estimation of the static dielectric constants ( 0), dielectric constant
( ) at an angular frequency and dielectric loss ( ) of methyl, ethyl and propyl amines with 2-fluorobenzoic
acid in 1,4-dioxane were carried using Klystron microwave bench at frequency 9.43GHz. Using the dielectric
parameters, the overall relaxation time ( 1) and group rotation relaxation time ( 2) of the polar solute
molecules and average relaxation times ( 0) were also determined using Higasi and Gopalakrishna method
employing Debye’s equations. The obtained results revealed that, out of five different molar ratios, relaxation
time ( ) is maximum at 1:1 molar concentration for all the systems due to inter and intramolecular interactions
through hydrogen bonding. In addition, the dipole moment, activation viscous flow ( f ) and dielectric
relaxation ( f ) due to molar free energy also been discussed.

503. Keyword : Dielectric relaxation, amines, 2 fluorobenzoic acid, molecular interactions


2866-
References: 2870
1. S. Sudo, N. Shinyashiki, Y. Kitsuki, S. Yagihara, J. Phys. Chem. A, 2002, 1063, pp.458–464.
2. S. S. Kadam, K. S. Kanse, Y. S. Joshi, D. N. Rander, A. C. Kumbharkhane, Indian J Phys, 2018, 92 (11), pp 1367–1372.
3. P. Sivagurunathan, K. Dharmalingam, K. Ramachandran, B. Prabhakar Undre, P. W. Khirade, S. C. Mehrotra, J. Mol Liq, 2007, 133
(1-3), pp 139–145.
4. A. Suggett, P. A. Mackness, M. J. Tait, H. W. Loeb , G. M. Young, Nature, 1970, 228 (5270), pp 456–457.
5. S. Kumara S. Sivakumar and P. Jeevanandham, International Journal of Recent Scientific Research, 2010, 7, pp.177-181.
6. S. W. Tucker and S. Walker, Trans Faraday Soc. 1966, 62, pp 2690-2694.
7. V.V. Navarkhele, Int. J. Phar.Pharm. Sci, 2016, 8(9), pp. 102-106,
8. T. Thenappan and U. Sankar, J Mol Liq. 2006, 126, pp 8-42.
9. R. H Fattepur, N. H Ayachit, IEEE International Conference on Liquid Dielectrics, Bled, Slovenia, 2014, June 30 - July 3, 2014, pp 1-
4.
10. Philip J. Chenier, Survey of Industrial Chemistry - Topics in Applied Chemistry, Springer Science, Business Media New York, 2002.
11. M. P. Shah, K. A. Patel, S. S. Nair, A. M. Darji, Journal of Environmental Bioremediation & Biodegradation, 2013,1(2), pp 54-59.
12. A. Baiker, J. Kijenski, Catalysis Reviews,1985, 27(4), pp 653-697.
13. P. Panini, D.Chopra, Hydrogen Bonded Supramolecular Structures, Chapter 2, Lecture Notes in Chemistry, Springer, Berlin, 2015 , 87,
pp 37-67.
14. K. Müller, C. Faeh, F. Diederich, Science, 2007, 317(5846), pp 1881-1886.
15. H. R. Khavasi and N. Rahimi, Cryst. Eng. Comm, 2017, 19(10), pp 1361-1365.
16. A. Abad, C. Agulló, A.C. Cuñat, C. Vilanova, M.C. Ramírez de Arellano, Cryst Growth Des, 2006, 6(1), pp 46-57.
17. D. Chopra, T.N. Guru Row, Cryst Eng Comm, 2008, 10, pp 54- 67.
18. S. K. Nayak, M. K. Reddy, T. N. Guru Row, D. Chopra, Cryst Growth Des, 2011, 11(5), pp 1578-1596.
19. S. K. Nayak, M. K. Reddy, T. N. Guru Row, D. Chopra, Cryst. Eng. Comm, 2012, 14 (1), pp 200-210.
20. P. Panini, D. Chopra, Cryst. Eng.Comm, 2012, 14(6), 1972-1989.
21. P. Mocilac, K. Donnelly, J. F. Gallagher, Acta Crystallogr B. 2012, 68(Pt 2), pp189-203.
22. M. Perez-Torralba, M. A. García, C. Lopez, M. C. Torralba, M. R. Torres, R. M. Claramunt, J. Elguer, Cryst. Growth. Des.,
2014, 14(7), pp 3499-3509.
23. T. Kalaivani, S Krishnan, Indian Journal of Pure and Applied Physics, 2009, 43(7), pp 383-385.
24. R. J. Sengwa, Madhvi, S. Sankhla and S. Sharma, Journal of Solution Chemistry, 2006, 35(8), pp1037–1055.
25. Hui-Wen Chen, Chein-Hsiun Tu, Department of Applied Chemistry, Providence University, Shalu, 43301 Taiwan J. Chem. Eng. Data,
2006, 511 pp 261-267.
26. K. Higasi, Y. Koga and M. Nakamura, Bulletin of the Chemical Society of Japan, 1971, 44, pp 988-992.
27. A. D. Franklin, Jr. W. M. Heston, E. J. Hennelly, C. P. Smyth, J. Am. Chem.Soc.,1950, 72(8), pp 3447–3454.
28. W. F. Hassell, M. D. Magee, S. W. Tucker, S. Walker, Tetrahedron, 1964, 20, pp 2137-2155.
29. K. Higasi, Bulletin of the Chemical Society of Japan, 1966, 39, pp 2157-2160.
30. S. Glasstone, K. J. Laidler, H. Erying, The theory of rate processes: Chapter 9, McGraw-Hill, New York, 1941, pp 19.
31. K. V. Gopala Krishna, Trans. Faraday Soc. 1957, 53, pp 767-770
32. Lingyun Zhao a and Si-Shen Feng, Journal of Colloid and Interface Science, 2004, 274, pp 55–68.
33. N. E. Robinson, H. K. Welsh, Aust. J. Chem., 1969, 22, pp 1299-1301.
34. J. S. Dryden, S. Dasgupta, Trans. Faraday Soc., 1955, 51, pp 1661-1667.
35. S. M. Khameshara, M. S. Kavadia, M. S. Lodha, D. C. Mathur, V. K. Vaidya, J.Mol. Liq. 1983, 26(2), pp 77-84.
36. S. Elangovan, Int. J. Chem Tech Res., 2017, 10(6), pp 640-643.
37. L. C. Gilday, S. W. Robinson, T. A. Barendt, M. J.Langton, B. R. Mullaney and P. D. Beer, Chem. Rev. 2015, 115, 15, pp 7118-7195,
38. G. Cavallo, P. Metrangolo, R. Milani, T. Pilati, A. Priimägi, G. Resnati, G. Terraneo, Chem. Rev., 2016, 116 (4), pp 2478-2601.
39. A. Mukherjee, S. Tothadi and G. R.Desiraju, Acc. Chem. Res., 2014, 47(8), pp 2514-2524.
40. D. Chopra, Cryst. Growth Des., 2012, 12 (2), pp 541-546.
41. E. Bogdan, G. Compain, L. Mtashobya, Jean-Yves Le Questel, F. Besseau, N. Galland, B. Linclau, and J. Graton, Chem. Eur. J., 2015,
21(32), pp 11462–11474.
42. J. McMurry, Organic Chemistry, Chapter 1, 2000, pp 24-25, brooks/ cole, USA
43. F. Liakath Ali Khan, J. Udayaseelan, M. Aravinthraj, International Journal of Engineering Sciences & Research Technology, 2014,
3(7), pp738-745.
44. F. Liakath Ali Khan, J. Udayaseelan, M. Aravinthraj, International Journal of Advanced Scientific and Technical Research, 2014, 4(5),
pp 150-157.
45. T. Kalaivani, S. Kumar, S. Krishna, Indian J. Chem., 2004, 43A, pp 291-293.
46. M.Malathi, R.Sabesan, S.Krishnan, Materials Science and Engineering: B, 2003, 100(3), pp 318-322.

Authors: Shaik Salma Begum, D.Rajya Lakshmi


GLCM of Fuzzy Clustering Means for Textural Future Extraction of Brain Tumor in Probabilistic
Paper Title:
Neural Networks
Abstract: Brain tumor is one of the major causes of death among people. It is evident that the chances of
survival can be increased if the tumor is detected and classified correctly at its early stage. normal strategies
encompass obvious strategies, as an instance, biopsy, lumbar reduce and spinal faucet technique, to distinguish
and installation thoughts tumors into generous (non unstable) and threatening (adverse). A pc supported give up
calculation has been planned in order to build the precision of mind tumor region and grouping, and along the
ones strains supplant traditional intrusive and tedious techniques. This paper offers a powerful technique for
mind tumor grouping, wherein, the actual Magnetic Resonance (MR) snap shots are prepared into ordinary, non
risky (thoughtful) cerebrum tumor and damaging (risky) cerebrum tumor. The proposed approach to the pursuit
of three levels: (1) wavelet damage, (2) the texture extraction spotlight and (three) order. Discrete remodel
Wavelet first achieved by using Daubechies wavelet (DB4), to deteriorate the MR image to various ranges loud
and nitty coefficient of sand and the stage time darkness co-event lattice general, of which the insight of land, for
example, electricity, differentiate, dating, homogeneity and entropy gain. Event co-grid results are then pushed
right into probabilistic neural system for each order and identity of the tumor. The proposed technique has been
achieved in the MR image is authentic, and the accuracy of clustering using probabilistic neural system is seen
504. as roughly 100%.
2871-
Keyword : Discrete remodel Wavelet first achieved by using Daubechies wavelet (DB4), 2877

References:
1. Bahadure NB, Ray AK, Thethi HP (2017) photograph exam for MRI primarily based mind tumor place and highlight extraction using
organically encouraged BWT and SVM. Int J Biomed Imaging 2017, Article identification 9749108, 12 pages
2. Joseph RP, Singh CS, Manikandan M (2014) thoughts tumor MRI picture department and recognition in photo getting prepared. Int J
Res EngTechnol 3, eISSN: 2319-1163, pISSN: 2321-7308
3. Alfonse M, Salem M (2016) A programmed order of cerebrum tumors via MRI the use of bolster vector device. Egypt ComputSci J
40:11–21
4. Coatrieux G, Huang H, Shu H, Luo L, Roux C (2013) A watermarking-based totally completely medicinal picture honesty manage
framework and a photo minute mark for converting portrayal. IEEE J Biomed health inform 17(6):1057–1067
5. Zanaty EA (2012) willpower of darkish problem (GM) and white hassle (WM) quantity in cerebrum attractive reverberation
pics(MRI). Int J ComputAppl 45:16–22
6. Yao J, Chen J, Chow C (2009) Breast tumor exam mainly difference upgraded MRI utilising floor highlights and wavelet exchange.
IEEE J Sel pinnacle signal system 3(1):ninety 4–one hundred
7. Kumar P, Vijayakumar B (2015) thoughts tumor MR image department and affiliation utilizing by way of manner of using PCA and
RBF bit based totally completely help vector device. center East J Sci Res 23(nine):2106–2116
8. Sharma N, Ray A, Sharma S, Shukla adequate, Pradhan S, Aggarwal L (2008) Segmentation and characterization of recuperation snap
shots using ground crude highlights: usage of BAM-kind counterfeit neural device. J Med Phys 33(3):119–126
9. Cui W, Wang Y, Fan Y, Feng Y, Lei T (2013) Localized FCM grouping with spatial information for restorative photo division and
predisposition area estimation. Int J Biomed Imaging 2013, Article identity 930301,eight pages
10. Chaddad A (2015) computerized detail extraction in mind tumor with the aid of attractive reverberation imaging the use of Gau ssian
combination fashions. Int J Biomed Imaging 2015, Article ID868031, 11 pages 11. Sachdeva J, Kumar V, Gupta I, Khandelwal N,
Ahuja CK (2013) Segmentation, highlight extraction, and multi beauty thoughts tumor order. J Digit Imaging 26(6):1141–1150
11. KailashD.Kharat, PradyumnaP.Kulkarni and M.B.Nagori "mind Tumor magnificence using Neural network primarily based
completely definitely strategies" global magazine ofComputerScienceandInformatics, Vol-1, no.4, 2012
12. PankajSapra, Rupinderpal Singh and ShivaniKhurana , "thoughts Tumor Detection the usage of Neural community" ,worldwide
JournalofScienceandModern Engineering, vol.1, no.9, 2013.
13. A.P. Nanthagopal and R.Sukanesh, "Wavelet measurable floor highlights based absolutely branch and order of thoughts figured
tomography images", picture Processing, IET, vol.7, no.1 pp.25 - 32, 2013 [20] .
14. Shaik Salma Begum, Dr.D.Rajya Lakshmi "becoming a member of Wavelet actual floor and intermittent neural device for tumor
identity and order over MRI, international mag of Engineering and superior technology (IJEAT) ISSN: 2249 – 8958, quantity-8,
hassle-6, August 2019. internet page no: 3769-3778. DOI : 10.35940/ijeat.F9388.088619.

Authors: Dova.Veena Grace, B.M.S.Rani, Veeranki Naga Swapna Sri

Paper Title: A Novel Based Algorithm for the Extraction of Blood Vessels Present In Retina
Abstract: The purpose of tagging and describe about individuals, using the uniqueness and measurable
characteristics of Biometric identifiers. These characteristics are classified as Behavioral versus Physiological.
Information related to shape of body is presented in the characteristics of Physiological biometric identifiers
with example of DNA, iris recognition, hand geometry, palm print, retina, face and fingerprint. Reliable and
stable authentication is providing by the Human retina, so it is also consider as biometric system. In this paper
we proposing a modified algorithm for the measurement and detecting of blood vessels in the retina with the
uses of KNNRF classifier. Extracting the features of input retinal images are matching with the trained features
are classified byusing the KNNRF classifier. For the purpose of classifying clustered blood vessels with high
accuracy, KNNRF method is used.

Keyword : Blood Vessel Identification, Retinal Images, Biometric Authentication, Identification Methods.
References:
1. Sukhpreet Kaur, Kulwinder Singh Mann, “Optimized Technique for Detection of Diabetic Retinopathy using Segmented Retinal
505. Blood Vessels”, 2019 International Conference on Automation, Computational and Technology Management (ICACTM) Amity
University, 2878-
2. Jyotiprava Dash , Nilamani Bhoi , “ Retinal Blood Vessels Extraction from Fundus Images Using an Automated Method”, 4th Int’l
2883
Conf. on Recent Advances in Information Technology | RAIT-2018 |, 978-1-5386-3039 -6/18/$31.00 © 2018 IEEE.
3. Zahra Waheed, M. Usman Akram, Amna Waheed, Arslan Shaukat , “Robust Extraction of Blood Vessels for Retinal Recognition”,
ISBN: 978-1-4673-6988-6 ©2015 IEEE.
4. Saumitra Kumar Kuri, Md. Rabiul Hossain, “Automated Retinal Blood Vessels Extraction Using Optimized Gabor Filter”, 978 -1-
4799-5180-2/14/$31.00 ©2014 IEEE.
5. Murat Ceylan and Hüseyin Yaar , “Blood Vessel Extraction From Retinal Images Using Complex Wavelet Transform and Complex -
Valued Artificial Neural Network”, 978-1-4799-0404-4/13/$31.00 ©2013 IEEE.
6. Guedri Hichem, Jihen Malek , “Generation of New Blood Vessels in the Human Retina with L-System Fractal Construction”, 6th
International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), 978-1-4673-
1658-3/12/$31.00 ©2012 IEEE.
7. Chien-Cheng Lee and Shih-Che Ku, “Blood Vessel Segmentation in Retinal Images Based on the Nonsubsampled Contourlet
Transform”, 978-1-4673-2588-2/12/$31.00 ©2012 IEEE.
8. Emine Doğanay 1 , Sadık Kara1,2, Onur Toker1 , Aysegül Güven3 , Ayse Öztürk Öner4, “Extraction of Blood Vessel Centerlines On
Retinal Images”, 978-1-4244-6328-3/10/$26.00 ©2010 IEEE.
9. Haishun Wang, Limin Chen, “A New Approach to Extracting Boundary of Retina Blood Vessel”, 978 -1-4244-1748-3/08/$25.00 ©
2008 IEEE.
10. A. V. Kupriyanov, N. Yu. Ilyasova, M. A. Ananin , “Geometrical Parameters Estimation Of The Retina Images For Blood Vessels
Pathology Diagnostics”, 15th European Signal Processing Conference (EUSIPCO 2007), Poznan, Poland, September 3 -7, 2007,
copyright by EURASIP.

Authors: O.Sreedevi, K.Ravindhranath


Adsorption of Cr (VI) From Polluted Water using Activated Carbon Prepared from Vincarosea
Paper Title:
Apocynaceae
Abstract: The performance removal of chromium (VI) from polluted water is discussed in this paper. The
sorption characteristic of Nitric Acid activated carbon derived from Vincarosea Apocynaceae plants through
oxidation process and was proposed for the removal of Cr (VI) from polluted solutions. The surface chemistry
characteristics of the prepared adsorbent were analysis by XRD, FTIR and SEM-EDAX. The effects are
determined for removal of chromium they are initial concentration, PH level and adsorbent dose. The metal ion
removal was pH dependent and, to a lesser extent, ionic strength. Kinetics data were found to follow the pseudo-
second order kinetic model. Activation thermodynamic parameters, such as activation enthalpy (ΔH*), activation
506. entropy (ΔS*), activation Gibbs free energy (ΔG*) and activation energy(E), have been evaluated and the
possible adsorption mechanism also was suggested. 2884-
2892
Keyword : Vincarosea Apocynaceae Activated Carbon, Chromium (VI), Adsorption Isotherms and Kinetics.
References:
1 Marja E, Gonzalez R, Williams CJ, Gardiner PHE. Environmental Science & Technology, 2001, 35, 3025-3030.
2 Cossich ES, Tavares CRG, Ravagnani TMK. E. Journal of Biotechnology, 2002, 5(2), 133-140.
3 Z. Yue, S.E. Bender, J. Wang, J. Economy, J. Hazard. Mater, 2009, 166, 74.
4 Barrera H, Nunex FU, Bilyeu B, Diaz CB. Journal of Hazardous Materials, 2006, 136, 846-853.
5 J. Qiu, Z. Wang, H. Li, L. Xua, J. Peng, M. Zhai, C. Yang, J. Li, G. Wei, C. Yang, J. Li, G. Wei, J. Hazard. Mater. 166, 270, (2009).
6 J. Lakatos, S.D. Brown, C. E. Snape, Fuel 81, 691, (2002).
7 S.A. Cavaco, S. Fernandes, M.M. Quina, L.M. Ferreira, J. Hazard. Mater. 144, 634, (2007).
8 N. Kongsricharoern, C. Polpraset, Water Sci. Technol. 34, 109, (1996).
9 G.Pugazhenthi, S. Sachan, N. Kishore, A. Kumar, J. Membr. Sci. 254, 229, (2005).
10 D. Lu, Q. Cao, X. Cao, F. Luo, J. Hazard. Mater. 166, 239, (2009).
11 W. Omar, H. Al- Itawl, Am. J. Appl. Sci. 4, 502, (2007).
12 M. Nadeem, A. Mahmood, SA. Shaid, AM. Khalid, G. Mckay. J. Hazard. Mater.B138, 604-613, (2007).
13 G.S. Agarwal, H. K. Bhuptawat, S. Chaudhari, Biosorption of watery Chromium (VI) by Tamarindus indica seeds, Bioresour.
Technol. 97, 949-956(2006).
14 V.Sarin, K.K. Pant, Removal of chromium(VI) from industrial waste by using eucalyptus bark, Bioresour. Technol. 97 (1) 15 - 20
(2006).
15 E. Malkoc, Y. Nuhoglu, The evacuation of chromium(VI) from manufactured wastewater by Ulothrix zonata, Fresen. Environ. Bull.
12(4) 376-381 (2003).
16 K. Vijayaraghavan, J. Jegan, K. Palanivelu, M. Velam, Biosorption of cobalt (II) and nickel (II) via ocean growth: cluster and section
thinks about, Separ. Purif. Technol. 44, 53-59 (2005).
17 K. Kadirvelu, K.Thamaraiselvi, C. Namasivayam, Adsorption of Nickel (II) from aqueous solution onto activated carbon prepared
from coirpitch, Separ. Purif. Technol. 24, 497-505 (2001).
18 S. Ricordel, S. Taha, I. Cisse, G. Dorange, Heavy metals removal by adsorption onto peanut husks carbob: Characterization, kinetic
study and modeling, Separ. Purif. Technol. 24, 389-401 (2001).
19 A. A. Al-Haj, R. El-Bishtawi, Removal of lead and nickel particles utilizing Zeolite tuff, J. Chem. Tech. Biotechnol. 69, 27-34(1999).
20 D.Mohan, K.P. Singh, V.K. Singh, Removal of hexavalent chromium from watery arrangement utilizing minimal effort actuated
carbons got from farming waste materials and enacted carbon texture fabric, Indust. Eng. Chem. Res. (ACS) 44, 1027-1042(2005).

Authors: D. Usha Sree, P. Vidya Sagar, G.K.V. Narasimha Reddy

Paper Title: Powering the Next Billion Devices with Iot Security
Abstract: The Internet of Thing (IoT) is the connection of computing devices embedded in everyday
devices to enable them to send and retrieve data. The Internet of Things (IoT) Is an ongoing sample that
broadens the restriction of the internet to comprise a huge collection of processing devices. Associating many
unbiased IoT frameworks via the internet offers severa troubles, with safety being up the the front due to the
truth a massive part of the accrued data might be furnished to a big and regularly hard to apprehend corporation
of spectators. that allows you to make the net of things attainable, the reconciliation of numerous advances is
essential, as an instance, tool-to-tool and virtual bodily frameworks. The manner inside the direction of finding
out IoT programs gives new troubles because it does not actually incorporates ordinary take a look at systems
and strategies. attempting out an IoT framework is based totally upon its the specific setup, and it likewise needs
to think about the system diploma and the system state of affairs. At present, organisation and institute
endeavors are focusing on convenience and network tests, for example, mimicking the earth wherein the device
is to be implemented, and ensuring records is traded in a comfortable manner. in this paper, we make use of the
triumphing model of our IoT degree to perform pressure sorting out of our IoT degree below severa conditions.
507.
Keyword : IoT frameworks via the internet offers severa troubles, 2893-
2900
References:
1 WhatIs.Com, "net of factors (IoT)," IoT time desk, july sixteen. [Online]. accessible:
http://internetofthingsagenda.Techtarget.Com/definition/internet-of-subjects-IoT. [Accessed: 23-Apr-2017].
2 J. Guth, U. Breitenbucher, M. Falkenthal, F. Leymann, and L. Reinfurt, "exam of IoT level models: A subject pay intere st relying on a
reference engineering," 2016, pp. 1–6.
3 P. Scully, "IoT Analytics five topics To recognize approximately The IoT Platform environment," 26-Jan-2016. [Online]. accessible:
https://iot-analytics.Com/five-topics-knowabout-iot-diploma/. [Accessed: 09-May-2017].
4 Hong Kong Polytechnic university, "person and get admission to control (IAM)." [Online]. to be had: https://www.Polyu.Edu.Hk/ags/e-
e-e-newsletter/news0911/I AM_details.Html. [Accessed: 23-Apr-2017].
5 Symantec safety response, "IoT gadgets being gradually implemented for DDoS attacks," Symantec safety response, 22-Sep-2016.
[Online]. on hand: http://www.Symantec.Com/associate/web journals/iot-devicesbeing-progressively carried out ddos-assaults.
[Accessed: 09-May-2017].
6 Gartner Says the net of factors installed Base Will growth to 26 Billion gadgets through 2020; Gartner Inc.: Stamford, CT, americaA.,
2013.
7 MobilityFirst future net shape. to be had at the internet: http://mobilityfirst.Winlab.Rutgers.Edu/(had been given to on 19 June 2017).
8 EXpressive net shape. available at the internet: https://www.Cs.Cmu.Edu/~xia/(were given to on 19 June 2017).
9 Named statistics Networking. available at the net: http://named-facts.net/(were given to on 19 June 2017).
10 Cloud destiny net shape project. available on the internet: http://cloud fia.Org (had been given to on 19 June 2017).

Authors: S.Praveen, Suneetha Rani Tatineni

Paper Title: Impact of Merger & Acquisition on Organizations


Abstract: Merger &Acquisition are the strategies which usually companies and organizations do for
increasing their profitability. If a company wants to establish their business in new country, that company shall
have three options first option is to start from scratch setting up business, the second option is to have a strategic
tie-up with a company which is doing similar business and the third option is to acquire company which is
508. already having presence where the company shall get readymade business with customer base. The mergers and
acquisitions are happening across the globe. This paper deals with the purpose of mergers and acquisition and 2901-
the strategies along with case studies of India and international platforms. 2906

Keyword : If a company wants to establish their business in new country,


References:
1 Dash, A. (2010). Mergers and Acquisitions. New Delhi: I.K. International Pub. House.
2 Hunt, P. (2007). Structuring mergers & Acquisitions: A Guide to Creating Shareholder Value. New York: Aspen.
3 Kumar, B. (2012). Mega mergers and Acquisitions: Case Studies from Key Industries. Houndmills, Basingstoke, Hampshire New York:
Palgrave Macmillan.
4 Megginson, W. (2008). Introduction to Corporate Finance. London: Cengage Learning EMEA

Authors: Rajkumar Pillay, Mohammed Laeequddin

Paper Title: Peer Teaching: A Pedagogic Method for Higher Education


Abstract: Teaching the concepts of numerical courses is a significant challenge for engineering and the
management students with innovative teaching pedagogy. Engineering and management education requires
pedagogies that provide conceptual framework and that develop analytical and decision making skills to prepare
students to face the complex problems. Class room dynamics add values to learning among students. Activities
chosen by the professor can be central to many progressive learning experiences. Therefore, we experimented
peer teaching methodology for post graduate management students (MBA) for teaching supply chain
management concepts and application through a simulation game called “Beer game”. The Beer Game players’
experiences typical supply chain coordination problems, wherever information sharing and collaboration is
missing. As a part of the peer group learning initiative, the senior batch students were encouraged to play the
game with their juniors. Game demonstrates that communication gap and lack of collaboration can leads to an
effect called “the bull whip effect” in the supply chain due to varying inventory levels at each link in the supply
chain. Additionally, it was also intended for the students to develop their critical thinking, complex problem
solving, leadership, negotiation, collaboration and communication skills in the process. Study results
demonstrated a statistical significance in learning outcome, participant satisfaction. Learners results have shown
a greater and high learning levels for the peer teachers. This peer teaching approach can be recommended to
incorporated in teaching pedagogy for engineering and management students as one of the active learning
method.

Keyword : Peer teaching, peer to peer learning, teaching by simulation models, peer group learning, peer
teaching for higher education
509.
References: 2907-
1. Bulte, C., Betts, A., Garner, K. & During, S. (2007), “Student teaching: views of student near-peer teachers and learners”. Medical 2913
Teacher. Vol.29, No.6, pp. 583-590.
2. Gunderson.DE, and Moore. J. D (2008), “Group Learning Pedagogy and Group Selection”, International Journal of Construction
Education and Research, Vol.4, No.1, pp. 34-45
3. West, J. (2017), “Becomming an Effective Peer Assisted Learning (PAL) Leader”. Journal of Geography in Higher Education, Vol.3,
pp. 459-465.
4. Bradford-Watts, K. (2011), “Students teaching students? Peer teaching in the EFL classroom in Japan” THE LANGUAGE
TEACHER: Vol.35, No.5, September / October issue, pp. 31-35
5. Cherif. HA. (1993), “Peer Teaching in Small Group Setting” Forward to Excellence, Vol.1, pp.5-6
6. Goldschmid, Barbara, and Goldschmid, Marcel L. (1976), "Peer Teaching in Higher Education: A Review." Higher Education, Vol. 5,
No.1, pp. 9-33.
7. Elise J. Dallimore, P. J. (2017, March 27), Faculty Focus. Retrieved from https://www.facultyfocus.com/articles/effective-teaching-
strategies/students-learn-participation-class-discussion/
8. Samantha, W. (2011), “Reflections on Experiencial Teaching Methods: Linking the class room to practice”. Journal of Teaching in
Social Work,Vol. 31, No.5, pp. 493-504
9. Hall S, Stephens J, Andrade T, Davids J, Powell M, Border S. (2014), “Perceptions of junior doctors and undergraduate medical
students as anatomy teachers: investigating distance along the near-peer teaching spectrum” Anat Sci Educ, Vol 7, pp. 242-247.
10. Lockspeiser T, O’Sullivan P, Teherani A, Muller J. (2008), “Understanding the experience of being taught by peers: the value of
social and cognitive congruence”. Adv Health Sci Educ Vol.13, No.3, pp.361–372.
11. Erie A, Starkman. S, Pawlina W, Lachman N. (2013), “Developing medical students as teachers: an anatomy-based student-as-teacher
program with emphasis on core teaching competencies”. Anat Sci Educ, Vol.6, No.6, pp.385–392.
12. Davis, B. (2009). Tools for teaching. (2nd ed.) CA: Jossey-Bass.
13. Bargh, John A., and Schul, Yaakov. (1980), "On the Cognitive Benefits of Teaching." Journal of Educational Psychology, Vol. 7 2,
No. 5, pp.593 -604.
14. Benware, Carl A., and Deci, Edward L. (1984), "Quality of Learning with an Active Versus Passive Motivation Set." American
Educational Research Journal, Vol 21, No. 4, pp. 755-66.
15. Rajkumar Pillay, S. (2017), “Orchestrating Teaching Business Statistics: A Methodology for Chi-square Test”. International Journal
of Applied Business and Economics Research,Vol.15

Authors: Sunil Belladi, Shyamsunder Chitta, Hariprasad Soni

Paper Title: Social Marketing Techniques in Community Radio Practices


Abstract: The first Community Radio Station was set up in India in the year 2006, and presently there are
over 251 such operational radios in the country. The paper sets out to locate Community Radio in Indian context,
and its practices based on the conceptual definition and framework of social marketing as proposed by Philip
Kotler, Alan Andreasen and others. Historically Community Radio has evolved as an alternative to the
510. mainstream media which failed to focus and give due attention to issues and concerns of rural people in general
and marginalised sections of the society. The paper maps the practice of Namma Dhwani Community radio 2914-
which has been broadcasting for over a decade in the state of Karnataka to the Social Marketing techniques, in 2918
promoting social ideas to bring out a change in the attitudes and behaviour. The specific objectives of the paper
are to explore how Namma Dhwani draws from the theory of Social Marketing, in its implementation of
commercial marketing techniques and to understand the role of Community Radio in empowering the
community and bringing about a change in behaviour. A case study method approach has been adopted and the
paper is conceptual and descriptive in nature.
Keyword : Community Radio, Social Marketing, Namma Dhwani, India, 6Ps
References:
1. About Namma Dhwani can be accessed at http://www.communityvoices.in/directory/community-media-profile/1327/
2. Andreasen. A. R., SM in the 21st Century. Thousand Oakes, Sage Publication, CA, 2006.
3. Andreasen. A. R..,”SM Its Definition and Domain”, Journal of Public Policy & Marketing, 1994, 1st Edition, Vol. 13, pp. 108-114
4. Brenkert, G. G. “Ethical challenges of social marketing.” Journal of Public Policy and Marketing, 2002, 21 st Edition, Vol. 1, pp. 14–25
5. Chaudhuri, M. “Indian media and its transformed public. Contributions to Indian Sociology”, 2010, 44 th Edition, Vol. 1&2, pp. 57–78.
6. General. H. and Christine. D., SM Rebels with a Cause, Routledge, NY, 2018.
7. Grier, S. and Bryant, S. “Social marketing in public health”, Annual Review of Public Health, 2005, Vol. 26, pp. 319‐39.
8. Hirschman, Elizabeth, "Secular Morality and the Dark Side of Consumer Behavior: Or How Semiotics Saved My Life," Advances in
Consumer Research, 1991, Vol. 18, pp. 1-4.
9. Jeff French. “Why nudging is not enough”, Journal of Social Marketing, 2011, 1 st Edition, 2nd Volume, pp. 155-162.
10. Kotler Philip & Roberto. Social Marketing: Strategies for Changing Public Behaviour, New work, Free Press, 1990, 401 pages.
11. Kotler. P. and Zaltman. G., “SM: an approach to planned social change”, Journal of Marketing, 1971, 3rd Edition, Vol 35, pp. 3-12
12. Namma Dhwani wins Yeoman Award, the article can be accessed from the UNESCO website at
http://www.unesco.org/new/en/communication-and-information/resources/news-and-in-focus-articles/all-
news/news/unesco_supported_project_wins_yeoman_award_for_local_content/
13. Pavarala V. & Malik. K. “Other Voices. The Struggle for Community Radio in India”, ND Sage Publications, 2007.
14. Quelch. A & Jocz. K. “Greater Good: How Marketing Makes for Better Democracy”, 2007, Boston, MA: Harvard Business Scholl
Press, pp. 331.
15. Smith, W. A. “Social marketing: an evolving definition”. American Journal of Health Behavior. 2000. 24 th Edition, 1st Volume, pp. 11–
17
16. Waltz, M. “Alternative and Activist Media” 2005, UK: Edinburgh University Press.

Authors: A.Jagan.Mohan. Reddy, Ridhi Rani, Varnika Chaudhary

Paper Title: Technology for Sustainable HRM: An Empirical Research of Health Care Sector
Abstract: In a highly competitive world of today characterised by VUCA (Volatility Uncertainty
Complexity and Ambiguity) environment organizations are striving to achieve excellence with standard business
practices. Given the international mantra of cost quality & service companies need to adopt technology in a
proactive manner by collaborating with IT department. Traditionally HR and IT have operated as distinct units.
But with the changing times there is an urgent need to adopt technology for improving the productivity of human
resources thereby contributing to the sustainable organizational development. So a close collaboration between
these two departments is called for.
Some of the HR professionals assume that technology will fix all their problems i.e. By moving to cloud the
outdated HR operating model and disconnected data sourcing issues will get resolved. But HR professionals will
be committing a grave mistake if they think that the technology will be a panacea to all HR problems. In other
words, the key is about how the technology is applied and not the acquisition of technology.
In the prevailing competitive environment there is every need to understand appreciate the behaviour of the
employees so that required initiatives could be taken for obtaining outstanding performance from these valuable
human resources. In this regard technological tools like HR Analytics(HRA) Artificial Intelligence (AI) come
very handy for getting valuable insights into human behaviour. Further application of these tools helps in
effective decision making thereby contributing to the accomplishment of organization goals. Application of
HRA and AI apart from facilitating decision making also helps in integrating Human Resource with other
business activities.
The paper focusses on understanding how HR analytics helps in sustainable human resource management by
511. providing insights into elementary HR processes and behaviours. It also correlates well with current HRA/AI
trends in general and health care sector in particular. Needless to say this will be a ready reference for any future 2919-
study into role of data analytics/Artificial intelligence in Human Resource Management. 2924

Keyword : Sustainability HR Analytics Health Care Sector Data Management Artificial Intelligence
Algorithms Technology for Sustainable HRM: An Empirical Study of Healthcare Sector.
References:
1. Boudreau J.W. Ramstad P.M. (2005) Talentship talent segmentation and sustainability: a new HR decision science paradigm for a new
strategy definition. Human Resource Management 44(2):129–136
2. Marler, J. H., & Boudreau, J. W. (2017). An evidence-based review of HR Analytics. The International Journal of Human Resource
Management, 28(1), 3-26.
3. Fitz-Enz J. The new HR analytics – Predicting the economic value of your company’s human capital investments American
Management Association 2010
4. Fitz-Enz J. The ROI of Human Capital – Measuring the economic value of employee performance Amacom New York 2000
5. Davenport, T. H., & Dyché, J. (2013). Big data in big companies. International Institute for Analytics, 3.
6. https://blog.riverlogic.com/prescriptive-analytics-22-things-the-experts-are-saying-about-analytics-rising-star,Accessed on 18 October:
Time- 5:30 PM
7. https://www.dezyre.com/article/types-of-analytics-descriptive-predictive-prescriptive-analytics/209,Accessed on 18 October,2019:
Time 5:30 PM
8. Hora, M. T., Bouwma-Gearhart, J., & Park, H. J. (2017). Data driven decision-making in the era of accountability: Fostering faculty
data cultures for learning. The Review of Higher Education, 40(3), 391-426.
9. https://www.persolkelly.com/page/resources-news-platform/2019-apac-workforce-insights/Accessed on 18.9.2019 4:30 PM
10. Brewster C. (2002) Human resource practices in multinational companies. In: Martin J.G. Karen L.N. (eds) The Blackwell handbook of
cross-cultural management. Blackwell Oxford pp. 126–141
11. Gobble Mary Anne M. Research Technology Management. Sep2017 Vol. 60 Issue 5 p59-61. 3p. DOI:
10.1080/08956308.2017.1348143. Database: Entrepreneurial Studies Source
12. Kramar Robin. International Journal of Human Resource Management. 2014 Vol. 25 Issue 8 p1069-1089. 21p. 2
13. Marler Janet H. Fisher Sandra L. Human Resource Management Review. Mar2013 Vol. 23 Issue 1 p18-36. 19p. DOI:
10.1016/j.hrmr.2012.06.002
14. Robert J. Zaugg Adrian Blum Norbert Thom. Berne: Sustainability in Human Resource Management IOP-Press 2001 ISBN 3-906471-
48-9

Authors: R.Nandhakumar, Antony Selvadoss Thanamani

Paper Title: M-Denclue for Effective Data Clustering in High Dimensional Non-Linear Data
Abstract: Clustering is a data mining task devoted to the automatic grouping of data based on mutual
similarity. Clustering in high-dimensional spaces is a recurrent problem in many domains. It affects time
complexity, space complexity, scalability and accuracy of clustering methods. High-dimensional non-linear
datausually live in different low dimensional subspaces hidden in the original space. As high‐dimensional
objects appear almost alike, new approaches for clustering are required. This research has focused on developing
Mathematical models, techniques and clustering algorithms specifically for high‐dimensional data. The innocent
growth in the fields of communication and technology, there is tremendous growth in high dimensional data
spaces. As the variant of dimensions on high dimensional non-linear data increases, many clustering techniques
begin to suffer from the curse of dimensionality, de-grading the quality of the results. In high dimensional non-
512. linear data, the data becomes very sparse and distance measures become increasingly meaningless. The principal
challenge for clustering high dimensional data is to overcome the “curse of dimensionality”. This research work 2925-
concentrates on devising an enhanced algorithm for clustering high dimensional non-linear data. 2927

Keyword : Clustering, High Dimensional Non Linear Data, curse of dimensionality, Mathematical models.
References:
1. A. Hinneburg and D. A. Keim, “Optimal grid clustering: Towards breaking the curse of dimensionality in high dimensional clustering,”
In Proceedings of 25th International Conference on Very Large Data Bases (VLDB-1999), pp. 506-517.
2. Charles Bouveyron, Stephane Girard, et al., “High Dimensional Data Clustering”, Computational Statistics and Data Analysis 52, 1
(2007) 502-519.
3. E. Müller, S. Günnemann, I. Assent and T. Seidl (2009), “Evaluating clustering in subspace projections of high dimensional data”, In
Proc. of the Very Large Data Bases Endowment, Volume 2 issue 1, pp. 1270-1281.
4. P. Lance, E. Haque, and H. Liu (2004), “Subspace clustering for high dimensional data: A review”, ACM SIGKDD Explorations
Newsletter, Vol. 6 Issue 1, pp 90–105.

Authors: S.China Venkateswarlu, N.Uday Kumar, N.Sandeep Kumar, Aannam Karthik, V.Vijay

Paper Title: Implementation of Area optimized Low power Multiplication and Accumulation
Abstract: There is number of computations involved at every stage in Digital Signal Processing (DSP). At
every stage of computation we have addition and multiplication of the terms derived from previous and presents
stages. The general computation incorporates the use of normal multiplication and addition, but the circuitry of
normal multiplication and addition is lethargic i.e., it consumes more space on chip, consumes more power and
the speed of computation is also low.These drawbacks can be avoided by switching to proposed method called
Multiplication and Accumulation (MAC). Aim of this project is to develop an Area optimized Low power digital
circuit for MAC (Multiply and Accumulate) operation. We develop the Verilog Hardware Description Language
code for the various implementations of the MAC (Multiply and Accumulate) that is we try to avoid using
multipliers and prefer to use the combinational circuits like multiplexers. These Verilog HDL codes will be
simulated to check the functionality. Once we get the expected results we go for the implementation of the
digital circuits. We analyze all the MAC digital circuits to find out the best digital circuit which consumes
minimum area and power. The importance of MAC in FPGA designs is explained by some filter designs. We
also give some suggestions on the system level solutions based on the MAC.
513.
Keyword : Multiplier Accumulator Unit, Digital Signal Processing, Embedded Systems Algorithmic Noise 2928-
Tolerant , Replica Redundancy Block 2932

References:
1 Pratap Kumar Dakua, Anamika Sinha, Shivdhari&Gourab,“Hardware Implementation of MAC unit,” International Journal of
Electronics Communication and Computer Engineer ing, vol. 3, 2012.
2 M.Jeevitha, R.Muthaiah, P.Swaminathan, “Review Article: Efficient Multiplier Architecure in VLSI Design,” Journal of Theoretical and
Applied Information Technology, vol. 38, no. 2, April 2012.
3 Ravi Shankar Mishra, PuranGour, Braj Bihari Soni, “Design and Implements of Booth and Robertson’s multipliers algorithm on
FPGA,” International Journal of EngineeringResearch and Applications, Vol. 1, Issue 3, pp. 905-910, 2011.
4 Tung Thanh Hoang, Magnus Själander, Per LarssonEdefors, “A High-Speed, Energy-Efficient Two-Cycle Multiply-Accumulate (MAC)
Architecture and Its Application to aDouble-Throughput MAC Unit,” IEEE transactions on Circuits & Systems, vol. 57, no. 12, pp.
3073-3081, Dec. 2010.
5 A. Abdelgawad, MagdyBayoumi, “High Speed andArea-Efficient Multiply Ac cumulate (MAC) Unit for DigitalSignal Prossing
Applications,” IEEE International Symposium on Circuits &Systems , pp. 3199 – 3202, 2007.
6 Berkeley Design Technology, Inc., “Choosing a DSP Processor,” World Wide Web, http://www.bdti.com/articles/choose_2000.pdf,
2000.
7 Jennifer Eyre and Jeff Bier, “The Evolution of DSP Processors”, Berkeley Design Technol
ogy,Inc.,http://www.bdti.com/articles/evolution.pdf, 2000.

514. Authors: T.Thangam, T. Murugajothi, R.Rajakumari, T.Suganya Thevi, M.Thiruveni


Paper Title: Automatic Control and Alert Message System for Intra Venous Fluid Level
Abstract: The objective of this paper is to find a solution for the problem arising in IV drip bottles. We
detected glucose levels in glucose trip bottles, which are used manually in hospitals. At the point when the
glucose container is half vacant, an admonition message is given to send to the attendants working there. Three
significant modules are utilized for this reason. Level sensor that can identify fluid levels in IV trickle bottles
and is utilized as an info module used to send information to the controller. The PIC (Programmable Interface
Controller) board is utilized as a controller module that procedures the information got from the sensor. The
MGM module is utilized as a yield module dependent on the control given by the controller. It sends an alarm
message to medical attendants' telephone numbers.The another one is, automatically the liquid flow in the tube
will be stopped by using the solenoid valve, only when the liquid level in the drip bottles is about to minimum
extend.

Keyword : Programmable Interface Controller, Arduino AT mega board, IV drip bottles; 2933-
2936
References:
1 Pradeep kumar k,”Autonomous intravenous infusion system & health monitoring “published in asar international conference,may -2014.
2 Paul Bustamante,” A new wireless sensor for intravenous dripping detection”Publised in International Journal on Advances in Networks
and Services (IJANS), vol.3, 2010.
3 Ram kumar.S,”Remote monitoring the glucose bottle level in hospitals” Published in International Conference on Emerging Trends in
Application of Computing (ICETAC), 2017.
4 C.S.Sundar Ganesh, “automatic indication system of glucose level in glucose trip bottle ”Published in International Journal Of
Multidisciplinary Research and Modern Education(IJMRME) vol.3,2017.
5 Arjun udayan,”A survey on automatic flow control in drip “Published in International Journal OF Advanced Research in Electrical,
Electronics and Instrumentation Engineering (IJAREEIE), vol.5, March 2016.
6 Bailey Flynn, Matthew Matthew Nojoomi, Michael Pan, Kamal Shah, Erica Skerrett, “IV DRIP: Intravenous Dehydration Relief in
Pediatrics”, instituteof global health technology.
7 K.J. K.J. Ayala, “The 8051 Microcontroller “, 3rd Edition, Microcontrollers Pros Corporation, 2004. 5. simon monk, “programming
arduino”.
8 www.circuitstoday.com

Authors: V. Suresh Babu, K. Shanmukha Sundar


Optimized IDN-FOPD Controller based AGC Loop of a Wind-Solar-Thermal Interconnected Power
Paper Title:
System with HES and IPFC Units
Abstract: The current scenario of this version focuses on automatic generation control (AGC) exploration
to a practical power system incorporating a versatile mixture of two-area generating multi-source units under a
deregulated format. Each and every area will have two generating and distribution companies termed as Gencos
and Discos. In Gencos, area-1 is a combination of wind energy power plant along with a thermal unit while area-
2 is a solar power plant and thermal unit. In this research, the thermal plants are well thought-out with reheat
tandem compound steam turbine rather than steam turbine dynamic representation constraint is believed to be
expected. In this examination, another ID comprises filter with Fractional Order Proportional Derivative (IDN-
FOPD) controller is prearranged and carry out for the AGC scheme. The control limits of the IDN-FOPD
controller refrained using Lightning Search Algorithm (LSA) and its demonstration is dissimilarity and PI and
Fractional Order Proportional Integral Derivative (FOPID) based controllers. Further to improve AGC
execution, Hydrogen Energy Storage (HES) is included into its control area and Interline Power Flow Controller
(IPFC) is integrated to dealt with Tie line. Simulated results demonstrate that the LSA tuned IDN-FOPD
controller progress the vibrant yield reaction of the test system as far as less summit deviation, tie-line power
oscillations and settling time of area frequencies in a variety of interactions of the deregulated power system.
The implementation of HES and IPFC units successfully detain the initial descend in reappearance just as the tie
line divergences in power while an unexpected burden upsetting influence. Subsequently, the coordinated
515. activity of HES-IPFC units in the AGC circle could perk up the system implementation.
2937-
Keyword : Automatic Generation Control, Hydrogen Energy Storage, IDN-FOPD controller, IPFC, Search 2945
Algorithm.
References:
1 Kundur, Prabha, Neal J. Balu, and Mark G. Lauby. Power system stability and control. Vol. 7. New York: McGraw-hill, 1994.
2 Elgerd, O.I. Electric energy systems theory: an introduction. Tata McGraw Hill Education Pvt. Ltd, New Delhi, India, 2014.
3 Donde, Vaibhav, M. A. Pai, and Ian A. Hiskens. "Simulation and optimization in an AGC system after deregulation." IEEE transactions
on power systems, Vol.16, No.3, pp. 481-489, 2001.
4 Pardeep Nain, K.P.Singh Parmar and A.K. Singh, “Automatic Generation Control of an Interconnected Power System Before and After
Deregulation”, International Journal of Computer Applications, Vol. 61, No.15, pp.11-16, 2013.
5 Saha, Debdeep, and L. C. Saikia. "Performance of FACTS and energy storage devices in a multi area wind -hydro-thermal system
employed with SFS optimized I-PDF controller." Journal of Renewable and Sustainable Energy , Vol.9, No. 2, pp. 024103, 2017.
6 Gnanavel C and Albert Alexander S, “Experimental Validation of an Eleven Level Symmetrical Inverter Using Genetic Algorithm and
Queen Bee Assisted Genetic Algorithm for Solar Photovoltaic Applications”, Journal of Circuits, Systems and Computers, Vol.27.
No.13, pp. (185021)1-23, 2018.
7 Baskar, B., and B. Paramasivam, “FOPID controller based AGC loop of a two-area Solar-Thermal deregulated Power System with
Vanadium Redox Flow Battery”, International Journal for Research in Engineering Application & Management, Vol-04, Issue-12,
pp.245-253, 2019.
8 Saikia, Lalit Chandra, and Shashi Kant Sahu, "Automatic generation control of a combined cycle gas turbine plant with classical
controllers using firefly algorithm", International Journal of Electrical Power & Energy Systems, Vo. 53, pp. 27-33, 2013.
9 Sahu RK, Panda S, Rout UK, “ DE optimized parallel 2-DOF PID controller for load frequency control of power system with governor
dead-band nonlinearity”, International Journal of Electrical Power & Energy Systems Vol.49, pp.19-33, 2013.
10 Javad M, Kazem Z, Mehrdad TH. “Applying fractional order PID to design TCSC-based damping controller in coordination with
automatic generation control of interconnected multi-source power system”, Engineering Science and Technology, an International
Journal, Vol.20, No.1, pp.1-17, 2017.
11 Rajbongshi, R and Saikia, L.C “Combined control of voltage and frequency of multi-area multisource system incorporating solar thermal
power plant using LSA optimised classical controllers”, IET Generation, Transmission & Distribution, Vol.11, No.10, pp.2489-2498,
2017.
12 Shankar, R., Chatterjee, K. and Bhushan, R., “Impact of energy storage system on load frequency control for diverse sources of
interconnected power system in deregulated power environment”, International Journal of Electrical Power and Energy
Systems, Volume 79, pp.11-26, 2016.
13 Chidambaram, I.A. and Paramasivam, B., “Optimized load-frequency simulation in restructured power system with redox flow batteries
and interline power flow controller”, International Journal of Electrical Power & Energy Systems, Vol.50, pp.9-24, 2013.
14 Nikhil Pathak, Ashu Verma, and Terlochan Singh Bhatti, “ Automatic generation control of thermal power system under varying s team
turbine dynamic model parameters based on generation schedules of the plants”, The Journal of Engineering, Vol.24, pp.1-13, 2
15 Albert Alexander S & Manigandan T, “Reduction of Voltage Harmonics in Solar Photovoltaic fed Inverter of Single phase Stand Alone
Power System” Journal of Solar Energy Engineering - Transactions of the ASME, Vol.136, No.4, pp.044501 (1)-(4), November 2014.

Authors: Selvi S, Chandrasekar A, Dhipa M

Paper Title: A Research on an Efficient Cloud Scheduling with a Geo Microarray Data Set
Abstract: Investigations on micro-array organisms for various researches have made a non discrete dealing
of thousands of gene expressions achievable. For any applications, the results would be more accurate only when
maximum count is analyzed within a predictable time and it is one of the unseen challenges in the field of bio
medicine. The purpose of this data analysis is to regulate and control the activities of thousands of genes in our
body. This paper develops a scheduling analysis of how effectively gene molecular patterns are taken into
experimentation. This motivated our investigation in a new dimension for a cloud environment. This paper is
about applying our previous works such as Workflow Shuffling and Hole Filling Algorithm (WSHF) [13],
Agent Centric Enhanced Reinforcement learning algorithm (AGERL) [14], Heuristic Flow Equilibrium based
Load Balancing (HFEL) [15] and Dynamic Resource Provisioning and Load Balancing (DRBLHS) [16]
algorithms collaboratively for a Gene Express Omnibus dataset as a case study. The gene data’s plays an
important role in monitoring the human activities and how well, the data has been processed in the cloud with
minimum budget, time and minimum virtual machines. Finally, the efficiency of the system is analyzed in terms
of resource utilization, completion time, response time, throughput and VM Migration time.

Keyword : Cloud Provider, Execution Process, WSHF, AGERL, HFEL, DRBLHS, Gene Expression
Omnibus Dataset, Resource Utilization, Workflow Completion Time, Response Time, Throughput and VM
Migration Time
References:
1. James Broberg, Rajkumar Buyya & Zahir Tari, (2009) “MetaCDN: Harnessing ‘Storage Clouds’ for high performance content delivery”,
Journal of Network and Computer Applications, Vol. 32, No. 5, pp 1012-1022.
516. 2. Kapil Kumar Gupta, Baikunth Nath & Ramamohanarao Kotagiri, (2010) “Layered Approach using Conditional Random Fields for
Intrusion Detection”, IEEE Transactions on Dependable and Secure Computing, Vol. 7, No. 1, pp 35-49. 2946-
3. Gengbin Zheng, Esteban Meneses, Abhinav Bhatele & Laxmikant V Kale, (2010) “Hierarchical Load Balancing for Charm++
Applications on Large Supercomputers”, In Proceedings of the 2010 39th International Conference on Parallel Processing Workshops, 2952
San Diego, CA, USA, pp. 436-444.
4. Ioan Raicu, Ian Foster & Yong Zhao, (2008) “Many-Task Computing for Grids and Supercomputers”, In proceedings of 2008 Workshop
on Many-Task Computing on Grids and Supercomputers, Austin, TX, USA.
5. Ewa Deelman, Gurmeet Singh, Miron Livny, Bruce Berriman & John Good, (2008) “The Cost of Doing Science on the Cloud: The
Montage Example”, In Proceedings of the 2008 ACM/IEEE conference on Supercomputing, Austin, TX, USA, pp 1-12.
6. James Dinan, Brian Larkins D, Sadayappan P, Sriram Krishnamoorthy & Jarek Nieplocha, (2009) “Scalable Work Stealing”, In
Proceedings of the Conference on High Performance Computing Networking, Storage and Analysis, Portland, Oregon.
7. ]Ioan Raicu, (2009) “Many-Task Computing: Bridging the Gap between High Throughput Computing and High Performance
Computing”, Computer Science
Department, University of Chicago, Doctorate Dissertation.
8. Laxmikant V Kalé, (1988) “Comparing the Performance of Two Dynamic Load Distribution Methods”, In Proceedings of the 1988
International Conference on Parallel Processing, pp 8-11.
9. National Center for Biotechnology Information, U.S. National Library of Medicine 8600 Rockville Pike, Bethesda MD, 20894 USA.
10. https://www.ncbi.nlm.nih.gov/geo/info/datasets.html.
11. Suraj Pandey, William Voorsluys, Mustafizur Rahman, Rajkumar Buyya, J Dobson & Kenneth Chiu, (2009) “A Grid Workflow
Environment for Brain Imaging Analysis on Distributed Systems”, Concurrency and Computation Practice and Experience, Vol. 21, No.
16, pp 2118-2139.
12. Lavanya Ramakrishnan, Shane Canon, Krishna Muriki, Iwona Sakrejda, & Wright N J, (2011) “Evaluating Interconnect and
Virtualization Performance for High Performance Computing”, ACM SIGMETRICS Performance Evaluation Review, Vol. 40, No. 2.
13. Selvi S & Kalaavathi B, (2017) “Reducing Rejected Workflows using WSHF Algorithm in Cloud”, Asian Journal of Research in Social
Sciences and Humanities, Vol. 7, No. 3. pp 397-405.
14. Selvi S & Kalaavathi B, (2016) “AGERL Based Enhanced Map Reduce Technique in Cloud Scheduling”, SSRG International Journal of
Computer Science and Engineering (IJCSE), Vol. 3, No. 10, pp 60-65.
15. Selvi S & Kalaavathi B, (2016) “Enhanced Scheduling Approach Using Heuristics Flow Equilibrium Based Load Balancing Algorithm
in Cloud”, International Journal of Control Theory and Applications (IJCTA), Vol. 9, No. 2, pp 1023-1034.
16. Selvi S & Kalaavathi B, (2016) “Mutlilayer Intensive Resource Allocation in Cloud Using Leftist Heaps with VM Migration”,
International Journal of Printing, Packaging & Allied Sciences, Vol. 4, No. 4, pp 2763-2775.

Authors: S. Karunakaran, R RaniHemamalini

517. Paper Title: Research on Power Efficient Clock Distribution Schemes for Switching Converters
Abstract: Trends in VLSI technology represents bottleneck for the future high performance computing 2953-
architectures as the ratio of the power pins to the total package pins keeps on increasing. A viable solution to this 2957
is bottleneck is to have final power consumption on-chip. Switched Capacitor DC-DC Converters are the most
preferred for on-chip power conversion. However, as the number of power conversion modules increases and
they get distributed across the chip area, clock distribution for the switched capacitor converters becomes a non-
trivial task and the increased interconnect lengths cause clock degradation and power dissipation. This paper
presents a power efficient signaling topology for driving the clocks to higher interconnect lengths.

Keyword : VLSI, switched capacitor converters, interconnects


References:
1. [Online]- 2011 www.itrs.net.International technology roadmap for semiconductors..
2. Chandrakasan, , Jan M and AnanthaP,Rabaey and Nikolic, Borivoje. Digital integrated circuits. s.l. : Prentice hall Englewood Cliffs,
2002. Vol. 2.
3. Poulton,Dally, William J and John W. Digital systems engineering. s.l. : Cambridge University Press, 1998.
4. Zhang, Hui , Varghese and George and Rabaey, Jan M. s.l.Low-swing on-chip signaling techniques: effectiveness and robustness. :
IEEE, 2000, Very Large Scale Integration (VLSI) Systems, IEEE Transactions on, Vol. 8, pp. 264--272.
5. Sridhar, Ramalingam. A ,Narasimhan, Ashok and Kasotiya, Manish low-swing differential signalling scheme for on-chip global
interconnects. s.l. : IEEE, 2005. VLSI Design, 2005. 18th International Conference on. pp. 634--639.
6. Kulkarni, and Sylvester, Dennis Sarvesh H High performance level conversion for dual V/sub DD/design.. 2004, Very Large Scale
Integration (VLSI) Systems, IEEE Transactions on, pp. 926-936.
7. Montiel-Nelson, Juan A Garcia, Jose C and Sosa, Javier and Navarro, Hector.A direct bootstrapped CMOSlarge capacitive-load driver
circuit. s.l. : IEEE, 2004. Design, Automation and Test in Europe Conference and Exhibition, 2004. Proceedings. pp. 680--681.
8. Rjoub, A and Koufopavlou, O. Pafos, Cyprus Efficient drivers, receivers and repeaters for low power CMOS bus architectures. : IEEE,
1999. Electronics, Circuits and Systems, 1999. Proceedings of ICECS'99. The 6th IEEE International Conference on. pp. 789-794.
9. Low swing signaling using a dynamic diode-connected driver. Ferretti, Marcos and Beerel, Peter A. Villach, Austria : IEEE, 2001.
Solid-State Circuits Conference, 2001. ESSCIRC 2001. Proceedings of the 27th European. pp. 369-372.
10. Adaptive low/ high voltage swing CMOS driver for on-chip interconnects. Garcia, Jose C and Montiel-Nelson, Juan A and
Nooshabadi, Saeid. New Orleans : IEE, 2007. Circuits and Systems, 2007. ISCAS 2007. IEEE International Symposium on. pp. 881 -
888.

Authors: T. Rajesh, K.V.G.Rao

Paper Title: Time Series Clustering- Introduction to Healthcare System


Abstract: A clustering technique is an appropriate solvable approach for classifying information while no
existence of premature information pertaining to class labels, using promising techniques like cloud based
computing and big data over latest years. Investigating awareness was gradually piled up with unsupervised
methods such as clustering approaches to pull out useful information from the data set available. Time series
based clustering data was used in most of the technical domains to extract information enriched patterns to
power the data analysis which extracts useful essence from complicated as well as large data sets. It is mostly
not possible for large datasets using classification approach whereas clustering approach will resolve the
problem with aid of unsupervised techniques. In the proposed methodology, main spotlight on time series health
care datasets, one of the kind of admired data in clustering approaches. This summary will expose 4 major
components of Time series approaches.

Keyword : clustering, Time-series, Health care evaluation measure, Representation.


References:
1. AAMI, “Testing and reporting performance results of cardiac rhythm and st segment measurement algorithms.ANSI/AAMI
EC38:1998” ANSI/AAMI EC13:2002, Arlington, VA Association for the Advancement of Medical Instrumentation, 2002.
2. Database MITBIH Arrhythmia (available online) http://www.physionet.org/physio-bank/database/mitdb/
3. Llamedo Soria M, Martinez JP, “Heartbeat classification using feature selection driven by database generalization criteria". IEEE Trans
518. Biomed Eng, 58:616625, 2011
4. Park KS, Cho BH, Lee DH, Song SH, Lee JS, Chee YJ, Kim IY, Kim SI, “Hierarchical Support Vector Machine Based Heartbeat 2958-
Classification Using Higher Order Statistics and Hermite Basis Function." Proceedings of 35 Annual Computers in Cardiology 2963
Conference, IEEE Bologna,2008.
5. Mar Tanis, Zaunseder S, Martinez JP, “Optimization of ECG classi_cation by means of feature selection."
IEEE Transactions Biomedical Engineering,58, pp.2168-2177,2011.
6. Huang et al. “A new hierarchical method for inter-patient heartbeat classification using random projections and RR intervals."
Biomedical Engineering On Line 2014 13:90.doi:10.1186/1475-925X-13-90 (2014)
7. G. Huang, S. Song, J. N. D. Gupta, and C. Wu, “Semi-supervised and Unsupervised Extreme Learning Machines,” IEEE Transactions
on Cybernetics, 2014.
8. Yeh Y.C., Wang, W.J.,Chiou, C.W. “A novel Fuzzy c-means method for classifying Heartbeat cases from ECG signals"
.Measurement, 43,pp 1542-1545, 2010.
9. K. Tan, K. Chan, and K. Choi, “Detection of the QRS complex, P wave and T wave in electrocardiogram." Advances in medical signal
& information processing, pages 41-47, 2000.
10. G de Lannoy JD D Francois, Verleysen M, “Feature Relevance Assessment in Automatic Inter- patient Heart Beat Classification."
In Proceedings of the International Conference on Bio-inspired Systems and Signal Processing, Valencia, Spain, 13-20, 2010.
11. de Lannoy G, Francois D, Delbeke J, Verleysen M, “Weighted Conditional random fields for supervised inter -patient heartbeat
Classification." IEEE Transactions in Biomedical Engineering, 59:241-247,2012.
12. P. de Chazal and R. B. Reilly, ”A patient-adapting heartbeat classifier using ECG morphology and heartbeat interval features"
IEEE Transactions on Biomedical Engineering, vol. 53, no. 12, pp. 2535--2543, (2006)
13. Zhang ZC, Dong J, Luo XQ, Choi KS, Wu XJ: “Heartbeat classification using disease-specific feature selection." Comput Biol
Med, 46:79-89. (2014)
14. T. Rajesh, Y.S. Devi, K.V. Rao, Hybrid clustering algorithm for time series data-a literature survey, in: 2017 International
Conference on Big Data Analytics and Computational Intelligence, 2017, pp. 343–347.
15. Mohamed Elgendi, Mirjam Jonkman, Friso De Boer, “Premature Atrial Complexes Detection using The Fisher Linear
Discriminant." 7th IEEE International Conference on Cognitive Informatics (ICCI), pp. 83-88, Aug.2008.
P. Thirusenthil Kumaran, P. Pushpakarthick, G. V. Chidambarathanu, M. Venkatachalam, Xavier
Authors:
Raja Durai, R.Jaiganesh
Paper Title: Power Quality in Distribution Grids
Abstract: Voltage constrained DSTATCOM-based voltage controller is executed for low voltage
appropriation system. To meet grid code, unexpected investment postponing, voltage regulator is designed while
a complete arrangement could be wanted to tackle guideline issues. 3 yield voltage closed paths with dynamic
damping and 2 bus voltage closed paths are associated with control procedure. Also, two circles are incorporated
to the control architecture proposed: the idea of Tracking the Minimum Power Point then recurrence closed path.
Results demonstrate the guideline limit, the calculation of tracking point of minimum power direct recurrence
steadiness.

Keyword : facts conveying, coverage defensive, adequate-anonymization, accumulating.


References:
1. M. Mishra, A. Ghosh and A. Joshi, “Operation of a DSTATCOM in voltage control mode,” IEEE Trans. Power Del., vol. 18, no. 1,
pp. 258-264, Jan. 2003.
2. Nazar Ali. "Performance Analysis of Switched Capacitor Multilevel DC/AC Inverter using Solar PV Cells." International Journal for
Modern Trends in Science and Technology vol 3 ,104-109,2017
3. A.T.SankaraSubramanian,P.Sabarish and A.Nazar Ali” A Power factor correction based canonical switching cell converter for VSI
fed BLDC motor by using voltage follower technique”IEEE xplore Digital Library,,1-8,2017.
4. A.NazarAli, D.Sivamani, R.Jaiganesh, Pradeep” Solar powered air conditioner using BLDC motor” IOP Conference Series: Material
and Science Engineering,Vol.63,2019
5. P. Thirusenthil Kumaran and C.Kamalakannan, “Real Time Voltage Control using Genetic Algorithm”, International Journal of
Innovative Research in Advanced Engineering, Vol. 1, No. 12, pp. 31-38, 2014.
6. V.Venkatesh,A.NazarAli,R.Jaiganesh,V.Indragandhi” Extraction and conversion of exhaust heat from automobile engine in to
electrical energy” IOP Conference Series: Material and Science Engineering,Vol.63,2019
519. 7. Albert Alexander S and Brad Lehman (2018), “An Intelligent Based Fault Tolerant System for Solar Fed Cascaded Multilevel
Inverters”, IEEE Transactions on Energy Conversion, Vol.33, No.3, pp.1047-1057, September 2018
8. P.Thirusenthil Kumaran and C.Kamalakannan, “Applying Genetic Algorithm to Minimize Power Loss and Establish Voltage
2964-
Control”, International Journal of Latest Trends in Engineering and Technology, Vol. 6, No. 1, pp. 268-277, 2015. 2967
9. P. Thirusenthil Kumaran and C.Kamalakannan, “Real Power Loss Minimization and Voltage Control using Genetic Algorithm”
International Journal of Applied Engineering Research, Vol. 10, No. 6, pp. 5183-5188, 2015.
10. Albert Alexander S & Manigandan T, (2009), “Digital Switching Scheme for Cascaded Multilevel inverters”, Proceedings of the
Third International Conference on Power Systems, Indian Institute of Technology, Kharagpur, 27-29 December 2009.
11. A.Nazar Ali, R. Jayabharath, and M. D. Udayakumar” An ANFIS Based Advanced MPPT Control of a Wind-Solar Hybrid Power
Generation System” International Review on Modelling and Simulations (IREMOS)” Vol. 7.4, No. 10, pp. 638-643, 2014
12. Ali, A. Nazar, R. Jeyabharath, and M. D. Udayakumar. "Cascaded Multilevel Inverters for Reduce Harmonic Distortions in Solar PV
Applications." Asian Journal of Research in Social Sciences and Humanities ,Vol 6.11,2016
13. P. Thirusenthil Kumaran and C.Kamalakannan, “Cost Optimisation and Voltage Control of Power System using Genetic Algorithm”,
Journal of Computational and Theoretical Nanoscience, Vol. 14, No. 4, pp. 1-5, 2017.
14. P. Thirusenthil Kumaran and C.Kamalakannan, “Voltage and Reactive Power Control of Power Systems using Intelligent Control
Techniques”, World Applied Sciences Journal, Vol. 35, No. 4, pp. 541-547, 2017.
15. Albert Alexander S, (2017), “Development of High Performance Solar Photovoltaic Inverter with Advanced Modulation Techniques
to Improve Power Quality”, International Journal of Electronics (Taylor and Francis), Vol.104, Issue 2, pp.174-189.
16. P. Thirusenthil Kumaran and C.Kamalakannan, “Negative Extinction angle Method and Hysterisis Controller Method for Power
System Applications”, International Journal of Science and Innovative Engineering & Technology, Vol. 1, No. 1, pp. 221 -226, 2017.
17. L.Nagarajan, A. Nazar Ali and A.Arunkumar,” Islanding Detection Technique for Grid connected AC Distribution System” i-
manager’s Journal on Future Engineering and Technology, Vol. 13, No. 1, pp. 221-226, 2018
18. A.Nazar Ali, R. Jayabharath, and M. D. Udayakumar” A Single phase high efficient transformer less inverter for PV grid connected
power system using ISPWM Techniques”, International journal of applied engineering research, , Vol. 10, No. 10, pp.7489, 2015
19. Nazar Ali, N. Gowri, and P. G. Scholor. "Power factor correction based bridgeless single switch SEPIC converter fed BLDC motor."
Advances in Natural and Applied Sciences Vol.10.3, 190-198, 2016.
20. Prarthiv Evan Poudyal, V Vigneshwar, N K Kumar,V
Indragandhi, A.Nazar Ali” Design and simulation of
Phase shifted DC-DC full bridge converter”IOP:
Conference Series: Material and Science Engineering,
Vol.63, 2019

Authors: N. NazeeyaAnjum, M.Akshaiya, G.Alagulakshmi

Paper Title: Simulation and Design of Low Noise Amplifier


Abstract: A low-noise amplifier is an electronic amplifier that amplifies a very poor signal (in terms of its
power) without significantly degrading its SNR. An amplifier increases the power of both the signal and the
noise present at its input. A good LNA has a low Noise Figure as well as enough gain to boost the signal thereby
does the work required of it. This paper proposes a LNA designed with ATF-21170 to operate in 2.4 GHz with a
maximum gain of 18.453 dB and minimum NF 1.346.
520.
2968-
Keyword : LNA, 2.4GHz, ATF-21170, low Noise Figure, Maximum gain, ADS
2970
References:
1. Reena K. Panchal, Harsha Gupta, Design and Simulation of Low Noise Amplifier at 2.3 GHz Frequency for 4G Technology,
International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 4, Issue 6, June 2015.
2. V. M. García-Chocano, Low Noise Amplifier Basics, 24-Oct-2017.
3. S.Vimal, Dr.M.Maheshwari, Design and performance improvement of a low noise amplifier with different matching techniques and
stability network, National Conference on Information, Communication, VLSI and Embedded systems, 16 - 17 March 2016.
4. Arun Sharma, Jaikaran Singh, MukeshTiwari, Design And Simulation of 0.18 mm CMOS LNA for UWB System, 17 January 2016.
5. https://www.keysight.com/en/pc-1297113/advanced-design-system-ads?cc=IN&lc=eng
6. https://www.digikey.in/
7. http://shodhganga.inflibnet.ac.in/bitstream/10603/149765/9/ 17_chapter7.pdf

Authors: R. Mounika, Kayiram Kavitha, R V. S. Lalitha

Paper Title: An Effective System to Detect Fake Research


Abstract: Detection of spam review is an important operation for present e-commwebsites and apps.We
address the issue on fake review detection in user reviews in e-commerce application, which wasimportant for
implementing anti-opinion spam.First we analyze the characteristics of fake reviews and we apply the machine
learning algorithms on that data. Spam or fake reviews of the itemsreducing the reliability of decision making
and competitive analysis.The presence of fake reviews makes the customer cannot make the right decisions of
sellers, which can also causes the goodwill of the platform decreased. There is a chance of leaving appraisals via
web-based networking media systems whether states or harming by spammers on specific item, firm alongside
their answers by recognizing these spammers just as in like manner spams so as to understand the assessments in
the interpersonal organizations sites, we exist a stand-out structure called Netspam which uses spam highlights
for demonstrating tribute datasets as heterogeneous subtleties systems to guide spam location treatment directly
into gathering issue in such systems.

Keyword : System Spam, online informal organizations, online web based life.
References:
1. Piera. E.-P. Lim, V.-A.Nguyen, N. Jindal, B. Liu, and H, W. Lauw.Detecting product review spammers using rating behaviors.In ACM
521. CIKM, 2010.
2. A. Mukherjee, A. Kumar, B. Liu, J. Wang, M. Hsu, M. Castellanos, and R. Ghosh. Spotting opinion spammers using behavioral
footprints.In ACM KDD, 2013. 2971-
3. S. Xie, G. Wang, S. Lin, and P. S. Yu. Review spam detection via temporal pattern discovery. In ACM KDD, 2012. 2975
4. G. Wang, S. Xie, B. Liu, and P. S. Yu. Review graph based online store review spammer detection. IEEE ICDM, 2011.
5. Y. Sun and J. Han. Mining Heterogeneous Information Networks; Principles and Methodologies, In ICCCE, 2012.
6. A. Mukerjee, V. Venkataraman, B. Liu, and N. Glance. What Yelp Fake Review Filter Might Be Doing?, In ICWSM, 2013.
7. S. Feng, L. Xing, A. Gogar, and Y. Choi.Distributional footprints of deceptive product reviews.In ICWSM, 2012.
8. A. j. Minnich, N. Chavoshi, A. Mueen, S. Luan, and M. Faloutsos. Trueview: Harnessing the power of multiple review sites. In ACM
WWW, 2015.
9. B. Viswanath, M. Ahmad Bashir, M. Crovella, S. Guah, K. P. Gummadi, B. Krishnamurthy, and A. Mislove. Towards detecting
anomalous user behavior in online social networks.In USENIX, 2014.
10. H. Li, Z. Chen, B. Liu, X. Wei, and J. Shao. Spotting fake reviews via collective PU learning.In ICDM, 2014.
11. Kayiram Kavitha, Polsani Rajashree Rao, Sreeja Tummala, Gajarla Vasavi, and Dr.R.Gururaj, Dual Tree Data Routing Scheme for
Wireless Sensor Networks, Third International Conference on Advances in Information Technology and Mobile Communication, AIM
-2013, 26-27, April 2013, Bangalore, India.
12. Kayiram Kavitha, Vinod Pachipulusu, Sreeja Thummala, R.Gururaj. Article: Energy Efficient Query Processing for WSN based on
Data Caching and Query Containment, in International Journal of Computer Applications, Vol. 89, no. 19, Page no. 4 -8, March 2014,
Published by Foundation of Computer Science, New York, USA.
13. Sharma D, Kavitha K, Gururaj R. Article: Estimating Node Density for Redundant Sensors in Wireless Sensor Network, in
International Journal of Sensor Networks and Data Communications, Vol.4, Issue 2 no.127, November 2015, Published by OMICS
International.
14. R.V.S.Lalitha, K.Kavitha, N.V.Krishna Rao, G.Rama Mounika, V.Sandhya, Smart surveillance using Smart doorbell, International
Journal of Innovative Technology and Exploring Engineering, Volume-8, Issue-8 June, 2019.

Authors: P. Maniraj Kumar, P. Thirumurugan, P.Karthikeyan, S. Saravanan, J. Kumarnath

Paper Title: Image synthesis M/2D/HWT in VLSI Technology


Abstract: Image synthesis is grouping of valid information from a group of images in to unique image.
The ensuing image is an improved quality than any other images. The spectral deformation major con in
standard method. The different multiscale transforms are proposed the overcome the issue. The image is
affected by impulse noise because of satellite images, are filtered the impulse noise in the image syntehesis.
In this paper we studied the architecture of Edge preserve algorithm which good in PSNR and MSE. The
proposed technique using wavelet decomposition is implemented in Matlab for low resolution images are
multispectral image and high resolution image are panchromatic image and then we combined the synthesized
image in Altera Cyclone. The result shows the significant area and power. The synthesis image has a colour
522. combination which is effective than any other in set of images.
2976-
Keyword : Image Fusion, Haar Wavelet, Edge preserving Filter, Impulse Noise. 2982
References:
1. RD 128, F-91767 Palaiseau Cedex FRANCE, “Cognitive Situation Awareness for Information Superiority”, New York:
Academic, 2012.
2. E. O. Brigham, “The Fast Fourier transform and its Applications”, Englewood Cliffs, N.J., Prentice Hall, 2011.
3. P.Paul and P. Girija, “A Novel VLSI Architecture for Image Compression”, Proc. of the 8th IEEE International Symposium on
Multimedia, pp. 794-795, 2012.
4. G. Strang and T. Nguyen, “Wavelets and Filter Banks”, Wellesley Cambridge Pr, 2012.
5. ISO/IEC, JPEG Committee Draft 15444-1, 2012.
6. Hsu S. H., Gau P. W., I-Lin Wu I., and Jeng J. H., 2011,“Region-Based Image Fusion with Artificial Neural Network”. World
Academy of Science, Engineering and Technology, 53, pp 156 -159
7. A. Haj, “Combined DWT-DCT Digital Image Watermarking”, Journal of Computer Science, Science Publication, vol. 3, no. 9,
pp. 740-746, 2010.
8. Anjali Malviya1, S. G. Bhirud a short paper on „Image Fusion of Digital Images‟ in International Journal of Recent Trends in
Engineering, Vol 2, No. 3, November 2011 pp. 146-148.
9. Konstantinos G. Nikolakopoulos a paper on “Comparison of Nine Fusion Techniques for Very High Resolution Data”
Photogrammetric Engineering & Remote Sensing, Vol. 74, No. 5, May 2012, pp. 647–659.
10. Zhang J., 2012. “Multi-source remote sensing data fusion: status and trends”, International Journal of Image and Data Fusion, Vol. 1,
No. 1, pp. 5–24.
11. P.Thirumurugan and Dr. S.Sasikumar. “Performance Analysis of Impulse Noise Reduction using Pseudo Random Methodology”
Medwell journals publisher on Research Journal of Applied Sciences,has been accepted for publication. ISSN: 1815932X, E ISSN:
19936079.
12. P.Thirumurugan and Dr. S.Sasikumar. FPGA implementation of Impulse noise reduction Medwell journals publisher on Research on
Asian Journal of Information Technology has been initially accepted for publication. ISSN: 16823915, E ISSN: 19935994.

Authors: Muhammad Khalid Mehmood Sajid, Abdullah Al Fraidan


Effectiveness of Reading Aloud Strategies for Inferential Reading Comprehension Skills and Text
Paper Title:
Difficulties of Saudi Students at University Level
Abstract: Reading comprehension is the ability to process text. It is an essential part of learning for university
students. A lot of strategies are used for reading. Among them, reading aloud strategies are vital reading
strategies. Saudi Arabia is a country where English is to be spoken as a second language. Due to weak school
basal reading, the Saudi students have problem with reading text level where they are failed at university
learning material for high-level reading skills such as inferential, evaluative, and critical reading. However; in
this study, a survey was distributed among 27 students to know their opinion about the effectiveness of reading
aloud strategies for inferential reading comprehension skills and text difficulties of Saudi students at the
university level. Convenience sampling was used as both the researchers were from the same place. The study
was conducted at the Department of English. College of Arts, King Faisal University, Alhasa. SPSS descriptive
statistics were used for analysis by using SPSS version 21. Atlas-ti 8 reports were also used for the elaboration
of major themes during the literature review from previous research studies. The findings showed reasonable
effectiveness of these strategies. These strategies were also recommended for future research on inferential
reading comprehension skills and the solution of difficult text by having the present set up of strategies being
used by Saudi university level students.

Keyword : Read aloud strategies, reading comprehension, inferential reading skills, text difficulties .
References:
1. Al-Mansour, N. S., & Al-Shorman, R. e. A. (2011). The effect of teacher’s storytelling aloud on the reading comprehension of Saudi
elementary stage students. Journal of King Saud University - Languages and Translation, 23(2), 69-76.
doi:10.1016/j.jksult.2011.04.001
2. Al-Nujaidi, A. H. (2003). Relationship Between Vocabulary Size, Reading Strategies, and Reading Comprehension of Efl Learners in
Saudi Arabia. Oklahoma State University,
3. Alsamadani, H. A. (2008). The relationship between Saudi EFL college-level students' use of reading strategies and their EFL reading
comprehension. Ohio University,
4. Alshehri, M. (2014). Improving reading comprehension for Saudi Students by using the Reading Aloud Strategy.
5. Andersson, B. V., & Barnitz, J. G. J. J. o. r. (1984). Cross-cultural schemata and reading comprehension instruction. 28(2), 102-108.
523.
6. Berardo, S. A. J. T. r. m. (2006). The use of authentic materials in the teaching of reading. 6(2).
7. Birch, B. M. (2014). English L2 reading: Getting to the bottom: Routledge. 2983-
8. Bolos, N. J. M. S. J. (2012). Successful strategies for teaching reading to middle grades English language learners: teachers can employ 2989
a variety of classroom-tested strategies to teach reading to English language learners. 44(2), 14-20.
9. Brantmeier, C. J. T. R. M. (2002). Second language reading strategy research at the secondary and university levels: Variatio ns,
disparities, and generalizability. 2(3).
10. Eason, S. H., Goldberg, L. F., Young, K. M., Geist, M. C., & Cutting, L. E. (2012). Reader–text interactions: How differential text and
question types influence cognitive skills needed for reading comprehension. Journal of educational psychology, 104(3), 515.
11. Fareed, M., Ashraf, A., Bilal, M. J. J. o. E., & Sciences, S. (2016). ESL learners’ writing skills: Problems, factors and sug gestions. 4(2),
81-92.
12. Gibson, S. J. E. j. (2008). Reading aloud: a useful learning tool? , 62(1), 29-36.
13. Hall, C. S. J. E. P. R. (2016). Inference instruction for struggling readers: A synthesis of intervention research. 28(1), 1-22.
14. Hamouda, A. J. I. J. o. A. R. i. P. E., & Development. (2013). An investigation of listening comprehension problems encounter ed by
Saudi students in the EL listening classroom. 2(2), 113-155.
15. Hansen, J. J. T. R. T. (1981). An inferential comprehension strategy for use with primary grade children. 34(6), 665 -669.
16. Hartati, S. (2017). Self-Concept of Kindergarten Teachers about Implementation of Classroom Action Research. Paper presented at the
International Conference of Early Childhood Education (ICECE 2017).
17. Ionkov, G. M., Harding, D. H., Dykstra, A. J., Grit, L. E., Petts, J. C., Minter, S. A., . . . Xi, Y. (2014). Reading materia l suggestions
based on reading behavior. In: Google Patents.
18. Ionkov, G. M., Harding, D. H., Dykstra, A. J., Grit, L. E., Petts, J. C., Minter, S. A., . . . Xi, Y. (2019). Reading materia l suggestions
based on reading behavior. In: Google Patents.
19. Johnston, V. J. T. O. C. J. (2015). The power of the read aloud in the age of the common core. 9(1).
20. Kaliyadan, F., Thalamkandathil, N., Parupalli, S. R., Amin, T. T., Balaha, M. H., & Ali, W. H. A. B. J. A. j. o. m. (2015). E nglish
language proficiency and academic performance: A study of a medical preparatory year program in Saudi Arabia. 5(4), 140.
21. Kispal, A. (2008). Effective Teaching of Inference Skills for Reading. Literature Review. Research Report DCSF-RR031: ERIC.
22. Lane, H. B., & Wright, T. L. J. T. R. T. (2007). Maximizing the effectiveness of reading aloud. 60(7), 668-675.
23. Lotfipour-Saedi, K. J. I. J. o. L. T. R. (2015). Suggestions toward Some Discourse-Analytic Approaches to Text Difficulty: With
Special Reference to" T-Unit Configuration" in the Textual Unfolding. 3(1), 1-18.
24. Minskoff, E. (2005). Teaching Reading to Struggling Learners: ERIC.
25. Morgan, P. L., & Fuchs, D. J. E. c. (2007). Is there a bidirectional relationship between children's reading skills and reading
motivation? , 73(2), 165-183.
26. Ness, M. K. J. R. H. (2016). Reading comprehension strategies in secondary content area classrooms: Teacher use of and attitudes
towards reading comprehension instruction. 49(2), 5.
27. Pearson, P. D. J. T. R. T. (1985). Changing the face of reading comprehension instruction. 38(8), 724-738.
28. Teo, A., Jen, F. J. L. L., & Technology. (2012). Promoting EFL students’ inferential reading skills through computerized dynamic
assessment. 16(3), 10-20.
29. Trelease, J. (2013). The read-aloud handbook: Penguin.
30. Van den Broek, P., Lorch, R. F., Linderholm, T., Gustafson, M. J. M., & Cognition. (2001). The effects of readers’ goals on inference
generation and memory for texts. 29(8), 1081-1087.
31. Walczyk, J. J., Marsiglia, C. S., Bryan, K. S., & Naquin, P. J. J. J. o. E. P. (2001). Overcoming inefficient reading skills. 93(4), 750.
32. Wixson, K. K., & Valencia, S. W. J. T. R. T. (2014). CCSS‐ELA suggestions and cautions for addressing text complexity. 67(6), 430-
434.
33. Zieffler, A., Garfield, J., Delmas, R., & Reading, C. J. S. E. R. J. (2008). A framework to support research on informal infe rential
reasoning. 7(2).

Authors: Kayiram Kavitha, R.V.S Lalitha, T.V.Suneetha, D.Usha Sree

Paper Title: Counterfeiting Threats in IoT


Abstract: With the advent of digitalization the entire world is greatly connected to the digital world. The
modern gadgets are equipped with Internet-connectivity encouraging web browsing. Due to rapid mobility of
devices numerous applications are launched while these come with lot of advantages and wide spread of
information they are prone to attacks too. These attacks on IoT devices compromise the security & privacy of
the user. The attackers get entry and invade through the data, inject malware, or schedule attacks on
neighborhood. In this paper, we present the attacks and the vulnerabilities in IoT, along with the preventive and
counter measures to be adapted to safeguard from attacks. We compiled a brief outline of the security breaches
and the latest block chain application to implement security in IoT devices as work for future direction.

Keyword : security, IoT devices, Block chain, threats, preventive measures.


References:
1. O'Neill M. Insecurity by design: Today's IoT device security problem. Engineering. 2016 Apr 5;2(1):48-9.
2. Saif I, Peasley S, Perinkolam A. Safeguarding the Internet of Things: Being secure, vigilant, and resilient in the connected age. Deloitte
Review. 2015;17.
3. Stamford C. Gartner says the internet of things installed base will grow to 26 billion units by 2020. Retrieved April. 2013 Dec;15:2018.
524. 4. Margaret Rouse, "Iot security (internet of things security)," http://internetofthingsagenda.techtarget.com/definition/IoT-security-
Internet-of-Things-security, 2013.
5. Lam B, Larose C. How did the internet of things allow the latest attack on the internet. 2990-
6. Kolias C, Kambourakis G, Stavrou A, Voas J. DDoS in the IoT: Mirai and other botnets. Computer. 2017 Jul 7;50(7):80-4. 2992
7. Kasinathan P, Pastrone C, Spirito MA, Vinkovits M. Denial-of-Service detection in 6LoWPAN based Internet of Things. In2013 IEEE
9th international conference on wireless and mobile computing, networking and communications (WiMob) 2013 Oct 7 (pp. 600-607).
IEEE.
8. Shabtai A, Moskovitch R, Elovici Y, Glezer C. Detection of malicious code by applying machine learning classifiers on static features:
A state-of-the-art survey. information security technical report. 2009 Feb 1;14(1):16-29.
9. Hadar N, Siboni S, Elovici Y. A Lightweight Vulnerability Mitigation Framework for IoT Devices. InProceedings of the 2017
Workshop on Internet of Things Security and Privacy 2017 Nov 3 (pp. 71-75). ACM.
10. Kayiram Kavitha, Polsani Rajashree Rao, Sreeja Tummala, Gajarla Vasavi, and Dr.R.Gururaj, Dual Tree Data Routing Scheme for
Wireless Sensor Networks, Third International Conference on Advances in Information Technology and Mobile Communication, AIM
-2013, 26-27, April 2013, Bangalore, India.
11. Kayiram Kavitha, Vinod Pachipulusu, Sreeja Thummala, R.Gururaj. Article: Energy Efficient Query Processing for WSN based on
Data Caching and Query Containment, in International Journal of Computer Applications, Vol. 89, no. 19, Page no. 4-8, March 2014,
Published by Foundation of Computer Science, New York, USA.
12. Hodo E, Bellekens X, Hamilton A, Dubouilh PL, Iorkyase E, Tachtatzis C, Atkinson R. Threat analysis of IoT networks using artificial
neural network intrusion detection system. In2016 International Symposium on Networks, Computers and Communications (ISNCC)
2016 May 11 (pp. 1-6). IEEE.
13. Sharma D, Kavitha K, Gururaj R. Article: Estimating Node Density for Redundant Sensors in Wireless Sensor Network, in
International Journal of Sensor Networks and Data Communications, Vol.4, Issue 2 no.127, November 2015, Published by OMICS
International.
14. R.V.S.Lalitha, K.Kavitha, N.V.Krishna Rao, G.Rama Mounika, V.Sandhya, Smart surveillance using Smart doorbell, International
Journal of Innovative Technology and Exploring Engineering, Volume-8, Issue-8 June, 2019.

Authors: R. Karthikeyan, G. Nalinashini, R. Chithrakkannan, K. Mohanraj, B. UmaMaheswari

Paper Title: Implementation of GUI for Class Attendance Using Face Detection and Recognition System
Abstract: In present years, improvements are made in teaching learning process by using digital systems.
Class attendance is a indicator of student attentiveness, participation in academics and the interest the teacher
creates in a particular subject. Quantitative analysis are carried out worldwide to understand the drop out
percentage. Manual attendance may be a erroneous, time consuming process in which favour can also be done to
a certain extent marking fake attendance. In this paper we propose a cost effective method to understand the
attendance pattern of a student by use of face detection and recognition system where many features like lips,
nose, iris etc. are distinct and data captured needs good computational analysis for recognition. In this paper we
525. propose an automated class attendance system by creating a simple and user friendly GUI using LabVIEW
software. The usefulness of this system will ensure error free attendance and will improve the teaching learning 2993-
process by increase in lecture time and monitoring class attendance efficiently. 2996

Keyword : Class Attendance, Face detection, Face Recognition, GUI.


References:
1. Paul Viola and Michael J. Jones, "Robust Real-Time Face Detection," International Journal of Computer Vision, vol. 57, no. 2,
pp. 137-154, May 2004.
2. Chetan.R, Rajesh Nayak, "Automated Attendance System Based on Facial Recognition International Journal for Research Trends
and Innovation " Volume 2, Issue 6 | ISSN: 2456-3315
3. Hitesh Walia, Neelu Jain "Fingerprint Based Attendance System Using LabVIEW and GSM" International Journal of Innovative
Research in Science, Engineering and Technology Vol. 5, Issue 7, July 2016
4. T.Thaj Mary Delsy, N.M.Nandhitha, Feasibility of spectral analysis techniques for disruption analysis in Aditya tokamak.
International Journal of Engineering & Technology, [S.l.], v. 7, n. 4, p. 3843-3846, dec. 2018
5. T.Thaj Mary Delsy, N.M.Nandhitha, "Spectral statistical analysis of low frequency coefficients from diagnostic signals depicting
MHD disruptions", 978-1- 5090-4967- 7/17/$31.00 2017 IEEE,
6. Sandhya, P & Thaj Mary Delsy T. (2016). Adaptive detection of pulmonary nodules in ct images by segmentation and
classification using matlab. 8. 11980-11985.
7. H. A. Mayank Agarwal, "Face Recognition Using Eigenfac e aproach," IRCSE, vol. 2, no. 4, pp. 1793-8201, August 2010.
8. Vinay Hermath, Ashwini Mayakar, "Face Recognition Using Eigen Faces and," IACSIT, vol. 2, no. 4, pp. 1793 -8201, August
2010.
9. N.Balaji, S.Vijayalakshmi " FPGA Implementation of smart water quality monitoring system" International journal of
innovative technology and exploring engineering, vol 8,11pg 3136-3139.

Authors: J.S. Prasath, S. Jayakumar, K. Karthikeyan


Real-Time Implementation for Secure monitoring of Wastewater Treatment Plants using Internet of
Paper Title:
Things
Abstract: The scarcity and demand of water increases rapidly. The varieties of wastewater treatment
techniques are adopted to produce the quality water and recycling. Wastewater treatment is the process of
removing the contaminants present and to produce it suitable for reuse as well as to save the environment. Water
utility systems are susceptible to a variety of natural, infrastructure and man-made hazards. These threats result
in contaminating the drinking water and affect the human health as well as environment. It is essential to ensure
the smooth functioning of wastewater treatment process and to protect the water utility systems from security
attacks. This proposed work is the real-time implementation of embedded system for secure monitoring of
wastewater treatment process through the internet. The measure of Dissolved Oxygen (DO) content present in
water is essential for marine organisms and fish to breathe. The measure of pH value indicates that the amount of
chemicals dissolved in the water and whether organisms are affected by them. The High value of acidity can be
deadly to fish and other marine organisms. In this proposed work, the presence of DO content and pH value is
detected and sent to the embedded system. The content of dissolved oxygen and pH value is encrypted using
embedded system and transmitted across wireless networks. The cipher text is decrypted at the receiver using
embedded system. It protects the water security system from unauthorized access and modification of process
parameters. It ensures good quality water produced and protects the environment as well as public health.

526. Keyword : Encryption; Decryption; Industrial IoT; Embedded Systems; Wastewater Treatment.
References: 2997-
1. Hess T.G.D., Hornberger, G.M., and Worland, S. (2019) ‘Water Security in Practice: The quantity-quality-society nexus’, Water 3002
Security, Vol. 6, pp. 1-6.
2. Hellaoui, H., Koudil M., and Bouabdallah, A. (2017) ‘Energy-Efficient mechanisms in security of the Internet of Things: A Survey’,
Computer Networks, Vol. 127, pp. 173-189.
3. Zarpelao, B.B., Miani, R.S., Kawakani C.T., and Carlisto de Alvarenga, S. (2017) ‘A Survey of Intrusion detection in Internet of
Things’, Journal of Network and Computer Applications, Vol. 84, pp. 25-37.
4. Usman, M., Ahmed, I., Aslam, M.I., Khan S., and Shah, U.A. (2017) ‘SIT: A Lightweight Encryption Algorithm for Secure Interne t of
Things’, International Journal of Advanced Computer Science and Applications, Vol. 8, pp. 1-10.
5. Ouaddah, A., Mousannif, H., Elkalama A.A., and Ouahman, A.A. (2017) ‘Access control in the Internet of Things: Big challenges and
new opportunities’, Computer Networks, Vol. 112, pp. 237-262.
6. D. Aakash and P. Shanthi, (2016) ‘Lightweight Security Algorithm for Wireless Node Connected with IoT’, Indian Journal of Science
and Technology, Vol. 9, pp. 1-8.
7. Airehrour, D., Gutierrez J., and Ray, S.K. (2016) ‘Secure routing for Internet of Things: A Survey’, Journal of Network and C omputer
Applications, Vol. 66, pp. 198-213.
8. Malina, L., Hajny, J., Fujdiak R., and Hosek, J. (2016) ‘On perspective of Security and Privacy-preserving Solutions in the Internet of
Things’, Computer Networks, Vol. 102, pp. 83-95.
9. Alcaraz, C., Roman, R., Najera P., and Lopez, J. (2013) ‘Security of Industrial Sensor Network-based remote substations in the context
of the Internet of Things’, Ad-Hoc Networks, Vol. 11, pp. 1091-1104.
10. Roman, R., Zhou J., and Lopez, J. (2013) ‘On the features and challenges of Security and Privacy in distributed Internet of T hings’,
Computer Networks, Vol. 57, pp. 2266-2279.
11. Zohraa, H.F., Mahmouda, B.,and Luc, D. (2012) ‘Vulnerability Assessment of Water Supply Network’, Energy Procedia, Vol. 18, p p.
772-783.
12. Jin-cui, Y.,and Bin-xing, F. (2011) ‘Security model and Key technologies for the Internet of Things’, The Journal of China Universities
of Posts and Telecommunications, Vol. 18, pp. 109-112.

Authors: Shaik. Rahamtula, T. Jaya


Content Based Image Retrieval for Community Retrieval from Given Nationality using an Efficient
Paper Title:
Combination Algorithm
Abstract: There is tremendous requirement of such technique which can fulfill the entire requirement for
retrieval of an image from available dataset which comes under computer vision. In this paper we discussed
about the one of the application of CBIR using an efficient combination of two techniques. The application is
527. retrieval of people images from database that comes under minority. In this paper we used an efficient
combination of color image histogram technique and edge orientation histogram technique by dividing original
3003-
image into small subblocks. The feature vector is formed by combination of two features obtained by above
3007
methodologies. The final features obtained by query image will be compared with the feature vector of database
images using a new Canberra Distance classifier. Proposed method is designed for multiple self-prepared and
some collected from internet databases. Our method includes the efficient integration of features such as color,
texture, shape and orientation. The proposed method is compared with state of art techniques to prove the stable
and highest accuracy of proposed work.
Keyword : Integration of Features, Color Histogram, Edge Orientation Histogram, Canberra Distance, Content
Based Image Retrieval.
References:
1. Dana.H.Ballard and all, "Colour Indexing", IJCV-1991, Pages from 11 to 32.
2. Markus. Orengo and all, "Similarity of Colour Images", SPIE-1995, Pages from 381 to 392.
3. Justin.Miller and all, "Comparing Images Using CCV", ACMICM-1996, Pages from 65 to 73.
4. S. Ravi Kumar and all, "Image Indexing using CC", Pages from 762 to 768, Conference on CVPR in 1997.
5. P. L. Devi, T. S. Reddy, "CBIR using FCH & SOH", IJMETMR-2017, ISSN No:2348-4845.
6. ITS'HAK Dinstein and all, "Texture Feature for Image Classification", Pages from 610 to 621, Nov 1973, IEEE Transactions.
7. Topi.Maenpaa and all, "Multi-Resolution Gray-Scale & Rotation Invariant Texture Classification with LBP", 0162-8828/02,
July-2002, Volume 24.
8. Okson Chae and all, "Local Directional Pattern for Face Recognition", IJICIC-2012, ISSN No: 1349-4198, Pages from 2423 to
2437.
9. B. Divyavani, K. M. Reddy, "CBIR using Fusion of Colour Histogram and EOH", ISSN No: 2456-5083, IJIEMR-2017, Volume
06, Issue 12.
10. Andriew J. Newell and all, "Multiscale Histogram of oriented Gradient Descriptors for Robust Character Recognition", ICDAR-
2011.

Authors: Shaik. Rahamtula, T. Jaya

Paper Title: Content Based Image Retrieval Using Transform Domain Features and Algorithms
Abstract: In this paper, Content Based Image Retrieval using Transform domain features and algorithms
has been implemented. The image can be decomposed by Discrete Wavelet Transform (DWT) to extract the
features based on DC coefficients. Each sub-image is calculated by mean, variance and standard deviation to get
more efficient recognition. The database image also applied in the domain of Stationary Wavelet Transform
(SWT) and Integer Wavelet Transform (IWT) by using different distance measures. The proposed algorithm is
the combination of DWT, SWT and IWT has been implemented using COREL database. This proposed method
has more efficient recognition and less computational time over existing methods

Keyword : Content Based Image Retrieval, Discrete Wavelet Transform, Stationary Wavelet Transform and
Integer Wavelet Transform.
References:
528. 1. Mohd. Aquid Ansari, Manish Dixit. "An enhanced CBIR using HSV quantization, discrete wavelet transform and edge histogram
descriptor", 2017 International Conference on Computing, Communication and Automation (ICCCA), 2017S. 3008-
2. Yogita Mistry, D.T. Ingole, M.D. Ingole. "Content based image retrieval using hybrid features and various distance metric",
Journal of Electrical Systems and Information Technology, 2017.
3011
3. "CBIR system using color moment and color auto-correlogram with Block Truncation coding". Vandana Vinayak, Sonika Jindal,
Computer Science & Engineering, SBSSTC, Ferozepur D975-8887 Volume 161, March 2017.
4. N. S. Vhang and K. S. Fu, "Query by pictorial example, "IEEE Trans. On Software Engineering, Vol. 6, November, PP 519 -524,
1980.
5. Sumaira Muhammad Hayat Khan, Ayyaz Hussain, Imad Fakhri Taha Alshaikhli. "Comparative Study on Content-Based Image
Retrieval (CBIR)", 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT),
2012.
6. Amit Singla, Meenakshi Garg, "CBIR Approach Based On Combined HSV, Auto Correlogram, Color Moments an d Gabor
Wavelet", International Journal Of Engineering And Computer Science, 2014.
7. Bin Wang, Sheng Tang, Ruizhen Zhao, Wu Liu, Yigang Cen. "Pedestrian detection based on Region Proposal Fusion", 2015
IEEE 17th International Workshop on Multimedia Signal Processing (MMSP), 2015
8. Madhav, B.T.P, M. Venu Gopal Rao, and V.G.K.M Pisipati. "Multispectral correlations technique for finding phase transition
temperatures in 7O.Om series", Liquid Crystals Today, 2015.
9. Vipin Tyagi. "Content-Based Image Retrieval", Springer Nature, 2017.
10. Kusetogullari, Huseyin, Mark S. Leeson, Burak Kole, and Evor L. Hines. "Meta-heuristic algorithms for optimized network flow
wavelet based image coding", Applied Soft Computing, 2013.

Authors: R.S Deepak Ram, Vijayalakshmi.P, Venkataraman Padmaja, T. Jaya, V. Rajendran

Paper Title: Channel Modelling of Underwater Communication Network with AUVS


Abstract: Underwater communication network always consists of static, slow, and fast-
movingnodeslimitedto a few tens of nodes. In generally, network is governed by acoustic system as a
communication model. This makes the system as BW limited, spectrum inefficiency etc. In addition, the sensors
are autonomously put in the sea bottom is battery supported and so the energy optimization is also needed to be
addressed in this paper. The paper explains on detailed comparison on performance of different channel
529. modelling of. Ainslie and McColm Model, Ambient Noise Model, Thorp Model &. Fisher & Simmons Model.
The analysis shows that Ainslie -McColm and Fisher & Simmons gives better energy optimization.
3012-
3015
Keyword : Acoustic ocean modelling, underwater technology, wireless communication network .
References:
1. Das, A. P., & Thampi, S. M. (2017). Simulation tools for underwater sensor networks: a survey. Network Protocols and
Algorithms, 8(4), 41-55
2. Deepak, C. R., Shajahan, M. A., Atmanand, M. A., Annamalai, K., Jeyamani, R., Ravindran, M., & Schwarz, W. (2001, January),
Developmental tests on the underwater mining system using flexible riser concept. In Fourth ISOPE Ocean Mining Symposium,
International Society of Offshore and Polar Engineers.
3. Heidemann, J., Ye, W., Wills, J., Syed, A., & Li, Y. (2006, April), Research challenges and applications for underwater sensor
networking. In Wireless Communications and Networking Conference, 2006. WCNC 2006. IEEE (Vol. 1, pp. 228-235).
4. Heidemann, J., Stojanovic, M., & Zorzi, M. (2012), Underwater sensor networks: applications, advances and challenges. Phil.
Trans. R. Soc. A, 370(1958), 158-175.
5. Jiang, Z. (2008). Underwater acoustic networks-issues and solutions. International journal of intelligent control and systems,
13(3), 152-161.
6. Jones C.E, et al.;" A survey of energy efficient network protocol(I)", Wireless Networks, 7 (2001), pp 343-358
7. Kong, J., Cui, J. H., Wu, D., & Gerla, M. (2005, October), Building underwater ad-hoc networks and sensor networks for large
scale real-time aquatic applications. In Military Communications Conference, 2005. MILCOM 2005, IEEE (pp. 1535-1541).
8. Ludvigsen, M., Johnsen, G., Lagstad, P. A., Sorensen, A. J., & Odegard, Ø. (2013, June), Scientific operations combining
9. ROV and AUV in the Trondheim Fjord. In OCEANS-Bergen, 2013 MTS/IEEE (pp. 1-7).
10. Ma, W., Chai, F., Xiu, P., Xue, H., & Tian, J. (2013). Modeling the long-term variability of phytoplankton functional groups and
primary productivity in the South China Sea, "Journal of oceanography", 69 (5), 527-544.
11. Nayak, S., & Kumar, S. (2009), Handbook on "Tsunami Early Warning Centre: Systems. Operations & Procedures", published
by INCOIS, 1-78.
12. Rattaro, C., Larroca, F., Bermolen, P., & Belzarena, P. (2017). Estimating the medium access probability in large cognitive radio
networks. Ad Hoc Networks, 63, 1-13.
13. P. Vijayalakshmi and V. Rajendran, "Performance Analysis of Fast and Slow Moving Vehicles Using CDMA Techniques for
Underwater Wireless Communication Network, Advances in Natural and Applied Sciences, 2016, Special 10(14): pages 92 -96.
14. P. Vijayalakshmi, N. Noorunnisa, and V. Rajendran, "Performance Analysis of VBF Protocol for Position Tracking of Moving
Nodes in Underwater Communications, Proceeding of International Conference on Communication and Signal Processing, IEEE
Xplore, 1813-1817, Feb 2018. doi/10.1109/ICCSP.2017.8286708.
15. R. Rajamohamed, V. Rajamani, 2012, A modified variable bit rate source routing energy efficient protocol for Wireless Mobile
adhoc networks, IJEIT, vol.2, Issue 5,177-182
16. Sehgal, A., Tumar, I., & Schonwalder, J. (2009, May). Variability of available capacity because of depth and temperature in the
underwater acoustic communication channel. In OCEANS 2009-EUROPE (pp. 1-6). IEEE.
17. Sehgal, A., Cernea, D., & Birk, A. (2010). Simulating underwater acoustic communications in a high-fidelity robotics simulator.
IFAC Proceedings Volumes, 43 (16), 587-592.
18. Sozer, E. M., Stojanovic, M., & Proakis, J. G. (2000), Underwater acoustic networks. IEEE journal of oceanic engineering, 25(1),
72-83
19. The manual published by Kongsberg Simrad, Norway Simrad HiPAP High Precision Acoustic Positioning - Product description.
20. Van Heddeghem, W. (2009). Cross layer link estimation for Contiki based wireless sensor networks. Free University Brussels,
Faculty Engineering Sciences.

Authors: R.S Deepak Ram, Vijayalakshmi.P, Venkataraman Padmaja, T. Jaya, V. Rajendran

Paper Title: Research of Channel Capacity of Acoustic Communication Network for Oceanographic Applications
Abstract: In comparison with terrestrial wireless network, underwater communication network for any
oceanographic applications have only a few tens of communication nodes. Researchers recently discussed
elaborately on network parameters like SNR, throughput, Power optimization etc. However, the variation in
finding the optimal frequencies and related bandwidth and its channel capacity with different modelling
technique needs specific attention. From the detailed analysis, the optimization of system model also depends on
location & distance. Therefore, the research aims to realize a research model in line with the above challenges.
Summary relieves that results are very encouraging for any underwater acoustic applications.

Keyword : Channel capacity, UWACN, SNR, Attenuation Noise.


References:
1. Bharadwaj N, Muralidharan H, Sujata B.R. 2017.Design and Implementation of short range Underwater acoustic Communication
channel using UNET, IJERT, Vol.6, issue 5, pp 721-725
530. 2. Sehgal, A., Tumar, I., & Schönwälder, J. (2010, May). AquaTools: An underwater acoustic networking simulation toolkit. In
IEEE, Oceans. 3016-
3. Sehgal, A. (2013). "Analysis & Simulation of the Deep Sea Acoustic Channel for Sensor Networks. Lulu. com.
4. Thorp, W. H. (1967). Analytic description of the low?frequency attenuation coefficient. The Journal of the Acoustical Society of 3019
America, 42(1), 270-270.
5. Ainslie, M. A., & McColm, J. G. (1998). A simplified formula for viscous and chemical absorption in sea water. The Journal of
the Acoustical Society of America, 103(3), 1671-1672.
6. Prasanth, K. P. (2004). Modelling and simulation of an underwater acoustic communication channel. Master, Electronic
Engineering University of applied sciences, Bremen, Germany.
7. Stojanovic, M. (2007). On the relationship between capacity and distance in an underwater acoustic communication channel.
ACM SIGMOBILE Mobile Computing and Communications Review, 11(4), 34-43.
8. Xie, P., Zhou, Z., Peng, Z., Yan, H., Hu, T., Cui, J. H. & Zhou, S. (2009, October). Aqua-Sim: An NS-2 based simulator for
underwater sensor networks. In OCEANS 2009, MTS/IEEE biloxi-marine technology for our future: global and local challenges
(pp. 1-7). IEEE.
9. Sahu, S. K., & Shanmugam, P. (2018). A theoretical study on the impact of particle scattering on the channel characteristic s of
underwater optical communication system. Optics Communications, 408, 3-14.
10. P. Vijayalakshmi and V. Rajendran, "Performance Analysis of Fast and Slow Moving Vehicles Using CDMA Techniques for
Underwater Wireless Communication Network, Advances in Natural and Applied Sciences, 2016, Special 10(14): pages 92-96.
11. P. Vijayalakshmi, N. Noorunnisa, and V. Rajendran, "Performance Analysis of VBF Protocol for Position Tracking of Moving
Nodes in Underwater Communications, Proceeding of International Conference on Communication and Signal Processing, IEEE
Xplore, 1813-1817, Feb 2018. doi/10.1109/ICCSP.2017.8286708.

Authors: Mohammad Javeed, C Fathima Jabeen

Paper Title: Linking of Cell Tracks Using Segmentation


531. Abstract: In maximum of image processing algorithms Segmentation is a key technique. It splits a digital
image into several regions so as to examine them. Once segmentation is done, linking of frames is additionally is 3020-
very important task. Several image segmentation techniques are developed by the researchers so as to form 3026
pictures swish and simple to judge. It is troublesome to process parallel algorithms in serial processors. This
paper presents a literature review of basic image segmentation techniques, linking algorithms and want to
process in hardware tools.

Keyword : Segmentation, Matlab, Verilog, linking, computer vision.


References:
1. Akhilesh Arora, Tayeba Qazi” Computer Vision Based Tracking Of Biological Cells-A Review” International Conference of Advance
Research and Innovation (ICARI-2014). ISBN 978-93-5156-328-0.
2. Klas E. G. Magnusson*, Student Member, IEEE, Joakim Jaldén, Senior Member, IEEE, Penney M. Gilbert, and Helen M. Blau,
“Global Linking of Cell Tracks Using the Viterbi Algorithm”, IEEE TRANSACTIONS ON MEDICAL IMAGING, VOL. 34, NO. 4,
APRIL 2015
3. K. S. Arunlal1 and Dr. S. A. Hariprasad2” An Efficient Viterbi Decoder”, International Journal of Advanced Information Techno logy
(IJAIT) Vol. 2, No.1, February 2012.
4. T. Kanade, Z. Yin, R. Bise, S. Huh, S. Eom, M. Sandbothe, F. M. Chen, “Cell Image Analysis : Algorithms, System and
Applications,” pp. 374– 381, 2010
5. K. L. K. Li, E. D. Miller, L. E. Weiss, P. G. Campbell, T. Kanade, “Online Tracking of Migrating and Proliferating Cells Imaged with
Phase-Contrast Microscopy,” 2006 Conf. Comput. Vis. Pattern Recognit, Work. pp. 0–7, 2006
6. R. Chatterjee, M. Ghosh, A. S. Chowdhury, N. Ray, “Cell tracking in microscopic video using matching and linking of bipartite
graphs” Comput. Methods Programs Biomed, 112(3), pp. 422–31, Dec. 2013
7. R. Bise, Yin. Zhaozheng, T. Kanade, "Reliable cell tracking by global data association," Biomedical Imaging: From Nano to Ma cro,
2011 IEEE International Symposium on, pp.1004,1010, March 30 2011-April 2011
8. Padfield, , J. Rittscher, B. Roysam, “Coupled minimum-cost flow cell tracking for highthroughput quantitative analysis.,” Med.
Image Anal., 15(4), pp. 650–68, Aug. 2011
9. Smal, K. Draegestein, N. Galjart, W. Niessen, E. Meijering,Particle filtering for multiple object tracking in dynamicfluorescence
microscopy images: application to microtubulegrowth analysis, IEEE Transactions on Medical Imaging 27 (6)(2008) 789–804.
10. K. L. K. Li, E. D. Miller, M. C. M. Chen, T. Kanade, L. E. Weiss, P. G. Campbell, “Computer vision tracking of stemness,” 2008 5th
IEEE Int. Symp. Biomed. Imaging from Nano to Macro, pp. 0–3, 2008
11. X. Zhou, Y. Lu, Efficient mean shift particle filter for spermcells tracking, International Conference on ComputationalIntelligence and
Security (2009) 335–339
12. N. Ray, G. Dong, S.T. Acton, Tracking multiple cells bycorrespondence resolution in a sequential bayesianframework, Proceedin gs of
IEEE Conference on ImageProcessing (2005) 705–708.
13. D. Chetverikov, J. Veresto’y, “Feature point tracking forincomplete trajectories, computing”, Devoted Issue on Digital Image
Processing 62 (1999) 321–338
14. O. Al-Kofahi, R. Radke, S. Goderie, Q. Shen, S. Temple, B. Roysam, “Automated cell lineage construction: A rapid method to
analyze clonal development established with murine neural progenitor cells,” Cell Cycle, 5(3), pp. 327-335, 2006
15. Liu et al., “Mitosis Sequence Detection using Hidden Conditional Random Fields,” IEEE International Symposium on Biomedical
Imaging (ISBI), 2010
16. L. Vincent, P. Soille, “Watersheds in digital spaces: an efficient algorithm based on immersion simulations”, IEEE Trans. Pattern
Anal. (1991) 13(6) 583-598
17. R. Bise, K. Li, S. Eom, T. Kanade, “Reliably Tracking Partially Overlapping Neural Stem Cells in DIC Microscopy Image
Sequences,” pp. 67–77, 2009.
18. K. L. K. Li, T. Kanade, “Cell Population Tracking and Lineage Construction Using Multiple-Model Dynamics Filters and
Spatiotemporal Optimization,” Proc. 2nd Work. Microsopic Image Anal with Appl. Biol. Piscataway, NJ, USA, pp. 1–8, 2007.
19. Yang, Huei-Fang, Y. Choe, "Cell tracking and segmentation in electron microscopy images using graph cuts," Biomedical Imaging:
From Nano to Macro, 2009, ISBI '09. IEEE International Symposium on, pp.306, 309, June 28 2009-July 1 2009.
20. S. Huh, S. Eom, , R. Bise, Z. Yin, T. Kanade, “Mitosis Detection for Stem Cell Tracking in Phase-contrast microscopy images,”
Robotics Institute, Carnegie Mellon University,” pp. 2121– 2127, 2011.
21. Y. Park, A. R. Buxbaum, R. H. Singer, “Single mRNA Tracking in Live Cells”, 1st ed., vol. 472, no. 10. Elsevier Inc., 2010, pp. 387–
406
22. N. Scherf, K. Franke, I. Glauche, I. Kurth, M. Bornh, “On the symmetry of siblings : automated single-cell tracking to quantify the
behavior of hematopoietic stem cells in a biomimetic setup,” pp. 119–130, 2012
23. S. Kang, C. A. Giurumescu, A. D. Chisholm, P. Cosman, "Automated nuclei tracking in C. elegans based on spherical model fitting
with multiple target tracking," Image Analysis and Interpretation (SSIAI), 2012 IEEE Southwest Symposium on, pp.17,20, 22-24
April 2012
24. L. Yuan, S. Member, Y. F. Zheng, J. Zhu, L. Wang, A. Brown, “Object Tracking With Particle Filtering in Fluorescence Microscopy
Images: Application to the Motion of Neuro fi laments in Axons,” 31(1), pp. 117–130, 2012
25. K. Jaqaman, D. Loerke, M. Mettlen, H. Kuwata, S. Grinstein, S.Schmid, and G. Danuser, “Robust single-particle tracking in live-cell
time-lapse sequences,” Nature Methods, 5(8), pp. 1212– 1221, 2008.
26. G. Yang, A. Matov, G. Danuser, “Reliable tracking of large scale dense antiparallel particle motion for fluorescence live cell
imaging,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., San Diego, CA, 2005, pp. 9–17
27. M. E. Sargin, A. Altinok, K. Rose, B. S. Manjunath, “Deformable trellis: Open contour tracking in bio-image sequence,” in Proc.
IEEE Int. Conf. Acoustics, Speech, Signal Process., Las Vegas, NV, 2008, pp. 561–564
28. P. Kougli, M. E. Sargin, K. Rose, B. S. Manjunath, “Graphical model-based tracking of curvilinear structures in bio-image
sequences,” in Proc. IEEE Int. Conf. Pattern Recognit., Istanbuk, Turkey, 2010, pp. 2596–2599
29. Huang, S. Sankaran, D. Racoceanu, S. Hariharan, S. Ahmed, “Online 3-D Tracking of Suspension Living Cells Imaged with Phase-
Contrast Microscopy,” 59(7), pp. 1924–1933, 2012
30. G. Magnusson, E. Klas, J. Jald, “A Batch Algorithm Using Iterative Application of the Viterbi Algorithm to track cells an d construct
cell lineages” access Linnaeus Center, Signal Processing Lab , KTH Royal Institute of Technology, Stockholm , Sweden,” pp. 38 2–
385, 2012
31. S. Huh, S. Eom, Fei, E. Ker, L. Weiss, T. Kanade, “Mitosis Detection of Hematopoietic Stem cell populations in time-lapse
phasecontrast microscopy images Robotics Institute , 2 Department of Biological Sciences and Biomedical Engineering, Carnegie
Mellon University,” pp. 390–393, 2012.
32. K. Mkrtchyan, A. Chakraborty A. K. R. Chowdhury, "Automated registration of live imaging stacks of Arabidopsis," Biomedical
Imaging (ISBI), 2013 IEEE 10th International Symposium on, pp.672, 675, 7-11 April 2013
33. R. M. Baker, M. E. Brasch, J. H. Henderson, M. L. Manning, “Contour-Based Algorithm for Tracking Cells and Cell-Material
Analyses,” 2013 39th Annu. Northeast Bioeng. Conf., pp. 96–97, Apr. 2013
34. R. Konda, R. Chakravorthy, S. Challa, “Design and analysis of an Event Indicator Function classifier for immune cell tracking
applications,” 2013 IEEE/ASME Int. Conf. Adv, Intell Mechatronics, pp. 199–205, Jul. 2013
35. C. Hagwood, J. Bernal, M. Halter, J. Elliott, "Evaluation of Segmentation Algorithms on Cell Populations Using CDF Curves,"
Medical Imaging, IEEE Transactions on, 31(2), pp.380, 390, Feb. 2012
36. Y. H. Kwak, S. M. Hong, S. S. Park, “A single cell tracking system in real-time.,” Cell. Immunol, 265(1), pp. 44–9, Jan. 2010.
37. F. Chan and D. Haccoun, “Adaptive viterbi decoding of convolutional codes over memory less channels” IEEE Trans. Commun. , vo l.
no. 45, 11, pp. 1389–1400, Nov. 1997. “Bandwidth- efficient modulations” Consultative Committee For Space Data System,
Matera, Italy, CCSDS 401(3.3.6) Green Book, Issue 1, Apr. 2003.
38. J. B. Anderson and E. Offer, “Reduced-state sequence detection with convolutional codes” IEEE Trans. Inf. Theory , vol. 40, no. 3,
pp. 965–972, May 1994.
39. C. F. Lin and J. B. Anderson, “ T-algorithm decoding of channel convolutional codes,” presented at the Princeton Conf. Info. Sci.
Syst., Princeton, NJ, Mar. 1986.
40. S. J. Simmons, “Breadth-first trellis decoding with adaptive effort”IEEE Trans. Commun. , vol. 38, no. 1, pp. 3–12, Jan. 1990.
41. J. Jin and C.-Y. Tsui, “Low-power limited-search parallel state viterbi decoder implementation based on scarece state transition”
IEEE Trans. Very Large Scale Integr. (VLSI) Syst. , vol. 15, no. 11, pp. 1172–1176, Oct. 2007.
42. F. Sun and T. Zhang, “Low power state-parallel relaxed adaptive viterbi decoder design and implementation,” in Proc. IEEE ISCAS,
M ay 2006, pp. 4811–4814.
43. J. He, H. Liu, and Z. Wang, “A fast ACSU architecture for viterbi de-coder using T-algorithm,” in Proc. 43rd IEEE Asilomar Conf.
Signals,Syst. Comput. , Nov. 2009, pp. 231–235.
44. Md.Javeed, B.Sri Lakshmi,” Low power Viterbi decoder for Trellis coded Modulation using T-algorithm”, international
journal of scientific & engineering research, volume 3, issue 9, september-2012 .
45. First MD. JAVEED, Second B. HARI KRISHNA, Jr., and Third M.V.S.R KISHORE, “low power viterbi decoder design for tcm
decoders using t-algorithm”,CIIT international journal of programmable devices, November,2012.
46. Mohammad Javeed1 and Battula Swapna2, ”High speed Convolution encoder and Viterbi decoder using dynamic shift register”
International Journal of Electronic and Electrical Engineering”, ISSN 0974-2174, Volume 7, Number 5 (2014), pp. 483-490.
47. Abdul Manan, “Implementation of Image Processing Algorithm on FPGA”, Department of Electronics and Communication
Engineering, Ajay Kumar Garg Engineering College, PO Adhyatmic Nagar.

Authors: Varsha Prem, B.Gurugnanam, Sulochana Shekhar and Sorna Chandra Devadass C
Spectral Library Creation of Garnet in Kadavur Basin, Karur District, Tamil Nadu, India – A Lab-
Paper Title:
Based Spectral Library Creation
Abstract: The significance of the study is to create a spectral library for the mineral Garnet. The spectra for
Garnet created in the darkroom environment for the study. The laboratory spectra created matched with the
USGS spectral library and made confirmation for the spectra. For the spectral resampling and spectral matching,
ASTER data used as the reflectance file. The wavelength of the laboratory spectra is between 0.556 to 2.4
micrometres. The highest reflectance spectral curve of the laboratory spectra shows 1.00 reflectance value and
the wavelength is 0.807 μm. The USGS spectra also indicate the same value and wavelength. The absorption
value changes in lab spectra at 0.57 reflectance value at the wavelength of 1.65 μm. The USGS spectra display
0.506 absorption value at the same wavelength of the laboratory spectra. The USGS spectra of the Garnet shows
that the Garnet collected from the study area is Spessartine garnet. The laboratory spectral library thus created
can be used for the mineral identification and also the spectral library thus created can use for further studies.

Keyword : Garnet, USGS Spectral Library, Laboratory spectral library, spectral library, spectral resampling.

532.
References:
1. Kumara Ganesh, U & Thamarai Kannan, S. 2017, "Creation of hyperspectral library and lithological discrimination of granite rocks
using SVCHR - 1024: lab-based approach", Journal of Hyperspectral Remote Sensing, vol.7, no.3 (2017), pp, 168-177. 3027-
2. Aarthy, R.S., and Sanjeevi, S. 2008, "Relating VNIR spectra and mineralogy of anorthosites", 29th Asian Conference on Remote 3030
Sensing 2008, ACRS 2008. 2. 8181-823.
3. Rajasimman Balasubramanian, U.A.B., Saravanavel, J., and Gunasekaran, S. 2013, "Ore mineral discrimination using hyperspectra l
remote sensing - a field-based spectral analysis", Arabian Journal of Geoscience, vol.6, pp.4709-4716.
4. Enton Bedini. 2018, "Application of Advanced Spaceborne Thermal Emission and reflectance Radiometer (ASTER) multispectral
imagery to mineral and lithological mapping in Southern West Greenland", Journal of Remote Sensing, vol.8, no.2, pp. 47-59.
5. Bhadra, B.K., Suparn Pathak, Karunakar, G. & Sharma, J.R. 2013, "ASTER Data Analysis for Mineral Potential Mapping Around
Sawar-Malpura Area, Central Rajasthan", Journal of Indian Society of Remote Sensing, vol. 41, no.2, pp. 391-404.
6. Feizollah Masoumi, Taymour Eslamkish, Mehdi Honarmand & Ali Akbar Abkar. 2017, "Utilization of ASTER Data and Spectral
Analysis to Discriminate Hydrothermally Altered Areas over Rabor, South of Kerman, Iran", Journal of Indian Society of Remote
Sensing, vol. 45, no. 6, pp. 1039-1055.
7. William E. Ford. 2002, "Dana's Textbook of Mineralogy" Fourth Edition, CBS Publishers, ISBN: 81-239-0809-1.
8. Subramanian, A.P., 1956, "Petrology of the Anorthosite - Gabbro mass at Kadavur, Madras, India", Geol.mag, 93, pp. 287-30.
9. Vinoth Kumar, M., Kumar, R.S., Rajaprian, K. & Singh Kuldeep. 2013, "Petrography and Major Geochemical Studies of Anorthosite ,
Kadavur and Adjoining Area, Tamilnadu, India", International Research Journal of Earth Science, vol. 1, no. 5, pp. 15-22.
10. (Vinoth Kumar, M., Kumar, R.S., Rajaprian, K. & Kuldeep Singh. 2014, "Mineralogical studies of Plagioclase Feldspar in Kadavu r
Anorthosite Complex, Tamilnadu", International Journal of Advanced Geoscience, vol.2, no. 2, pp. 31-37.
11. Vinod Kumar, M., Kumar, R.S., Rajaprian, K. & Kuldeep Singh. 2013, "Geological and Petrological Studies of Pegmatites Rocks o f in
and around Kadavur Area, Karur District, Tamilnadu", vol. 2, no. 3, pp. 182-191.
12. Ravi Gupta, P. 2002, "Remote Sensing Geology" Second Edition, Springer, ISBN: 3-540-43185-3.

Authors: Vishnu Narayanan and Geetha Mani


Energy Management And Safety Trends In Mechanical Analogous Thermal Model of Building
Paper Title:
System
Abstract: With the advent of increase in scientific gadgets and technological intervention in almost all the
working sectors, utilization of energy has become a prime mandate in deciding the economy and growth.
Moreover with urbanization at its peak, sophisticated building technology is also developing which is now one
533. of the major consumers of the generated energy, especially for its Heating Ventilation and Air Conditioning
(HVAC) systems. This current scenario has urged to find a holistic way to improve energy management in
2931-
buildings for a sustainable future resulting in Building Energy Management System (BEMS).This paper aims at
2939
developing an energy management platform for the building model; where-in a mechanical analogous thermal
model of a building system is framed. Model Predictive Control (MPC) algorithm is employed with the
integration of Building Management System (BMS), wherein the simulation was conducted to ensure the vigour
of MPC to be employed as a supervisory control strategy. Safety aspects of this energy management
methodology along with emerging trends is also been discussed in detail in this paper.
Keyword : BMS, Energy Management System, MPC, HVAC.
References:
1. Joao Figueiredo, Jose Sa da Costa, “A SCADA system for energy management in intelligent buildings”, Energy and Buildings
2012, vol.49, pp 85–98
2. Kolokotsa D, Niachou K, Geros V, “Implementation of an integrated indoor environment and energy management system”,
Energy and Buildings 2009, vol.37(1), pp 93–99
3. Jerome Henry Kampf, Darren Robinson, “A simplified thermal model to support analysis of urban resource flows”, Energy and
Buildings vol.39, pp 445–453, 2011S. Joe Qin, Thomas A. Badgwell, "A survey of industrial model predictive control
technology", Control Engineering Practice, 2003, Vol. 23, pp. 733-764
4. Kun Deng, PrabirBarooah, Prashant G. Mehta, “Building Thermal Model Reduction via Aggregation of States”, Journal of Heat
Transfer, 1999, vol.111(1), pp 5–12
5. X. Xu and S. Wang, “A simplified dynamic model for existing buildings using CTF and thermal network models,” International
Journal of Thermal Sciences, 2008, vol.47(9),pp 1249-1262
6. Lin, Yashen, Prabir, “Identification of control-oriented thermal models of rooms in multi-room buildings”, IEEE Transaction on
Control Systems Technology, 2009, vol.54(2), pp 31-39
7. YounghoonKwak, Jung-Ho Hu, “Development of a model predictive control framework through real-time building energy
management system data”, Applied Energy, 2015, vol.155,pp 1–13
8. Giles Fraisse, Olivier Lafabrie, Gilbert Achard, Viardot, "Development of a simpliefied and accurate building model based on
electrical and mechanical analogy”, Energy and buildings, 2005, vol.34, pp 1017-1031
9. Kolokotsa, A Pouliezos, C Lazos, Stevi “Predictive control techniques for energy and indoor environmental quality management
in buildings”, Building and Environment, 2009, vol.44, pp 1850-1863
10. M.Gwerdr, B.Lehman, V.Dorer, “Control of Thermal Activated Building System (TABS)” Applied Energy, 2008, vol.85, pp
565–581
11. Vangelis Marinakis, HarisDoukas, CharikleiaKarakosta, John Psarras, “An integrated system for buildings’ energy-efficient
automation: Application in the tertiary sector”, Applied Energy, 2013, vol.101, pp 6–14
12. Vangelis Marinakis , CharikleiaKarakosta, HarisDoukas, StylianiAndroulaki, John Psarras, “A building automation and control
tool for remote and real time monitoring of energy consumption” , Sustainable Cities and Society, 2013, vol. 41, pp 11–15
13. D.B.Crawley,J.W.Hand,M.Kummert,B.T.Griffith,Contrasting the capabilities of building energy performance simulation
programs, 2008, Build.Environ.43, 661673.
ConferencePapers
14. Kummert M, Andre P., “Simulation of a model-based optimal controller for heating systems under realistic hypotheses”,
Proceedings of building simulation,9th conference of international building performance simulation association, 2005, pp 555-
562 Book, book chapter and manual
15. Keith.J.Moss, “Energy Management in Buildings”, 2nd Edition published by Taylor and Francis, UK, 2002
16. Shengwei Wang, “Intelligent Buildings and Building Automation”, published by Spon press, New York, USA, 2010
17. J A Clarke, “Energy Simulation in Building Design”, 2nd Edition published by Butterworth-Heinemann, 2001
18. Elena V.M. Papadopoulou, “Energy Management in Buildings using Photovoltaics, published by Springer-Verlag London
Limited, 2012
Thesis
19. Michael Wetter, “Simulation Based Building Energy Optimization”, PhD Thesis, University of California, Berkeley, 2004
Release Notes
20. “Advanced Energy Design Guide for Small Office Buildings”, released by American Society of Heating, Refrigerating and Air-
Conditioning Engineers (ASHRAE), North America, 2000
21. “Residential and Commercial Building energy survey”, European Union, 2012.

Authors: M Arvind Balaji, A.Sengole Rayan, V.Kumar

Paper Title: Performance and Emission Test using Biobutanol on a CI Engine


Abstract: Original biofuels are delivered from sugars, starches, or vegetable oils. Despite what might be
expected, the second era biofuels are delivered from cellulosic materials, agrarian squanders, switch grasses and
green growth instead of sugar and starch. By not utilizing nourishment crops, second era biofuel creation is
significantly more reasonable and has a lower effect on sustenance generation. Otherwise called progressed
biofuels, the second-age biofuels are still in the advancement arrangement. Joining higher vitality yields, bring
down necessities for manure and arrive, and the nonappearance of rivalry with sustenance, second era biofuels,
when accessible at costs comparable to oil determined items, offer a really economical option for transportation
energizes.
There are principle four issues identified with alternative energizes: creation, transportation, stockpiling, taking
care of and use. This section exhibits a survey of late writing identified with the elective energizes utilization
and the effect of these powers on fuel infusion frameworks, and fuel atomization and splashes for both start and
534. pressure start motors. Impact of these inexhaustible energizes on both interior stream and outside stream
attributes of the fuel injector will be introduced. Right now ethanol is the most generally utilized sustainable fuel 2940-
in the Assembled States with up to 10% by volume mixed into gas for customary start motors or up to 85% for 2946
use in Flex-Fuel vehicles intended to keep running with higher centralizations of ethanol. Biodiesel is likewise
utilized with 5-20% by volume mixed into oil based diesel for pressure start motors. Biodiesel fuel is methyl or
ethyl esters got from a wide assortment of sustainable sources, for example, vegetable oils, creature fats and
cooking oil.

Keyword : Otherwise called progressed biofuels, the second-age biofuels are still in the advancement
arrangement.
References:
1. Banapurmath NR, , Chandrashekar TK, Khandal SV, Swamy RL(2015) ‗Impact of Diesel-butanol Blends on Performance and
Emission of Diesel Engine. Oil Gas Res 1: 101‘.
2. Banapurnath NR & Khandal SV(2009) ‗Impact of diesel-butanol blends on performance and emission of diesel engine‘ Simulation"
International Journal of Mechanical and Materials Engineering (IJMME), Vol. 2 (2007), No. 1, 1-7.
3. Andrei Kolesnikov, Akos Bereczky, CS Kristo, Lennox Siwale , Luka and Makame Mbarawa (2013) ‗Normal Butanol Additive in
Methanol-Gasoline Blends Fired in a Spark Ignition Single Cylinder Engine: Effects on Combustion and Emission Characteristics‘.
4. Gottekere KN, Lamani VT, Yadav AK (2017) ‗Performance, emission, and combustion characteristics of twin-cylinder common rail
diesel engine fuelled with butanol-diesel blends‘.
5. Angel Ramos, Octavio Armas, Reyes Garcia, (2012) ‗Pollutant emissions from engine starting with ethanol and butanol blends fr om
fuel processing technology‘.
B.Abhishek Reddy, Kayiram Kavitha, Ashoka Deepthi Manukonda, R.V.S.Lalitha, N.V.Krishna
Authors:
Rao
Paper Title: Semi-Equalizing Load in Multi-hop Wireless Networks
Abstract: Scheduling transmissions in a well-organized and fair manner in multi hop wireless network
[MWN] is very crucial and challenging .For semi equalizing the load a distributed node scheduling algorithm is
used through slot reallocation based on local information swap . The algorithm helps to find the delay or
shortest delivery time is achieved when the load is semi-equalized throughout the network. We have simulated
the Local voting algorithm and found that the system converges asymptotically toward the optimal schedule. In
this paper we propose a congestion free scheme to schedule the node transmissions conflict free. The proposed
algorithm achieves better performance than the other distributed algorithms in terms of fairness, average delay,
and maximum delay in simulation results.

Keyword : Multi-hop wireless networks, node scheduling algorithm, wireless mesh networks, load balancing.
References:
1. C. Bettstetter and C. Hartmann, “Connectivity of wireless multihop networks in a shadow fading environment,” Wireless Netw., vol.
11, no. 5, pp. 571–579, 2005.
2. Tian, Di, and Nicolas D. Georganas. "A coverage-preserving node scheduling scheme for large wireless sensor networks." In
Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications, pp. 32-41. ACM, 2002.
535. 3. Rhee, Injong, Ajit Warrier, Jeongki Min, and Lisong Xu. "DRAND: Distributed randomized TDMA scheduling for wireless ad hoc
networks." IEEE Transactions on Mobile Computing 8, no. 10 (2009): 1384-1396.
4. Hammond, Joseph L., and Harlan B. Russell. "Properties of a transmission assignment algorithm for multiple-hop packet radio 3047-
networks." IEEE Transactions on Wireless Communications 3, no. 4 (2004): 1048-1052. 3051
5. B. J. Wolf, J. L. Hammond, and H. B. Russell, “A distributed load-based transmission scheduling protocol for wireless ad hoc
networks,” in Proc.of Int. Conf. on Wireless Comm. and Mobile Comp., 2006, pp. 437–442.
6. Dimakis and J. Walrand, “Sufficient conditions for stability of longest-queue-first scheduling: Second-order properties using fluid
limits,” Ad-vances in Applied probability, pp. 505–521, 2006.orks,” in Proc.of Int. Conf. on Wireless Comm. and Mobile Comp.,
2006, pp. 437–442.
7. Vergados, Dimitrios J., Natalia Amelina, Yuming Jiang, Katina Kralevska, and Oleg Granichin. "Toward optimal distributed node
scheduling in a multihop wireless network through local voting." IEEE Transactions on Wireless Communications 17, no. 1 (2017):
400-414.
8. C.-T. Chiang, H.-C. Chen, W.-H. Liao, and K.-P. Shih, “A decentralized minislot scheduling protocol (DMSP) in TDMA-based
wireless mesh networks,” J. Netw. Comput. Appl., vol. 37, pp. 206–215, Jan. 2014
9. Kayiram Kavitha, Polsani Rajashree Rao, Sreeja Tummala, Gajarla Vasavi, and Dr.R.Gururaj, Dual Tree Data Routing Scheme for
Wireless Sensor Networks, Third International Conference on Advances in Information Technology and Mobile Communication,
AIM -2013, 26-27, April 2013, Bangalore, India.
10. Kayiram Kavitha, Vinod Pachipulusu, Sreeja Thummala, R.Gururaj. Article: Energy Efficient Query Processing for WSN based on
Data Caching and Query Containment, in International Journal of Computer Applications, Vol. 89, no. 19, Page no. 4-8, March 2014,
Published by Foundation of Computer Science, New York, USA.
11. Sharma D, Kavitha K, Gururaj R. Article: Estimating Node Density for Redundant Sensors in Wireless Sensor Network, in
International Journal of Sensor Networks and Data Communications, Vol.4, Issue 2 no.127, November 2015, Published by OMICS
International.
12. R.V.S.Lalitha, K.Kavitha, N.V.Krishna Rao, G.Rama Mounika, V.Sandhya, Smart surveillance using Smart doorbell, International
Journal of Innovative Technology and Exploring Engineering, Volume-8, Issue-8 June, 2019.

Authors: I Made Putrawan


Employees’ Performance Based on Leadership Styles and Big-Five Personality Mediated by
Paper Title:
Integrity
Abstract: This research was aimed at finding out the information about the mediated role of integrity (IN)
between leadership styles (LS) and big-five personality (BFP) with employees’ performance (CB). A causal
survey method used by involving 231 employees of private university in Jakarta. There were four instruments
developed for measuring CB (32 items, rel. 0.894), LS (27 items, reliability was 0.951), BFP (28 items, rel.
0.953), and IN (26 items, rel. 0.943). Data analyzed by path analysis. Findings revealed, it was significant
influence of leadership styles, big-five environmental personality (BFP), and integrity on employees’
performance. Employees’ integrity was good and strong mediated factor. Leadership and personality were two
536. factors which is undoubted its effect on employees’ CB, especially dealing with transformational leadership
styles and personality as well. Moreover, integrity dimension of honesty and consistency needed to be taken into 3052-
account when employees performance would be changed. This result implied that those variables are strongly 3055
support the organizational behavior model in achieving organizational goal.

Keyword : big-five personality, citizenship behavior, path analysis


References:
1. Woods, et.al., Organizational Behavior, Pearson, 2013.
2. Kreitner, Robert & Angelo Kinicki, Organizational Behavior, Irwin: McGraw Hill, 2011.
3. Mullins, Laurie J. Management and Organizational Behavior, London: Prentice Hall, 2010.
4. Hoy, Wayne K. dan Cecil G. Miskel, Educational Administration, theory, research and practice Ninth Edition. New York:
McGraw-Hill, 2013.
5. Ivancevich, John M., Robert Konopaske, M.T.Matteson, Organizational Behavior and Management, Irwin: McGraw Hill, 2014.
6. Newstrom, J.W., Organization Behavior, New York : McGraw Hill, 2015.
7. Gibson, James L. et.al. Organization: Behavior, Structure, Process, Boston: McGraw-Hill, 2012.
8. Podsakoff, P. M. et.al., “Transformational leader behaviors and their effect on followers’trust in leader, satisfaction, and OCB,”
The Leadership Quarterly, vol. 1, no. 2, 1990, pp. 107-142.
9. Organ, Dennis W., “The motivational basis of organizational citizenship behavior,” In B. M. Staw & L. L. Cummings (Eds.),
Research in organizational behavior, vol. 12, 1990, pp. 43–72.
10. Ryan, J., “Work Values and Organizational Citizenship Behaviors Values That Work For Employees and Organizations,” Journal
of Business and Psychology, vol. 17, no. 1, 2002, pp. 1 – 16.
11. Ebru, Ogus, ”The relationship between the leadership styles of the school administrator and the OCB of teachers,” Procedia
Social and Behavioral Sciences, vol. 9, 2010, pp. 1188-1193.
12. Podsakoff, P. M. et.al., “OCB: A critical review of the theoretical and empirical literature and suggestion for future research,”
Journal of Management, vol. 26, no. 3, 2000, pp. 513-563.
13. Bass, B. and R. E. Riggio, Transformational Leadership. New Jersey: Lawrence Erlbaum Associates, 2006.
14. Lapidot, Y., R. Kark, and B. Shamir, “The impact of situational vulnerability on the development and erosion of followers’ trust
in their leader”, Leadership Quarterly, vol. 18, no. 1, 2007, pp. 16-34.
15. Organ, Dennis W. “The motivational basis of organizational citizenship behavior”. In B. M. Staw & L. L. Cummings (Eds.),
Research in organizational behavior, vol. 12, 1990, pp. 43–72.
16. Cho, Y. J. and E. J. Ringquist, “Managerial trustworthiness and organizational outcomes”, Journal of Public Administration
Research and Theory, vol. 21, 2010, p. 5386.
17. Hooijberg, Robert and Nancy Lane Albert Diverse, "Leader effectiveness and integrity: wishful thinking?", International Journal
of Organizational Analysis, vol. 18, no. 1, 2010, pp. 59 – 75.
18. Meltem Akin Ko¨ STERELIOG˘ LU, ”The effect of teachers’ shared leadership perception on academic optimism and
organizational citizenship behavior: a Turkish case,” International Journal of Leadership Education, 2015,
http://dx.doi.org/10.1080/13603124.2015.1066868
19. Nguni, Samuel, et.al., “Transformational and Transactional Leadership Effects on Teachers’ Job Satisfaction, Organizational
Commitment and Organizational Citizenship Behavior in Primary Schools The Tanzanian Case, School Effcetiveness and School
Improvement,” International Journal of Research, Policy and Practice, vol. 17, no. 2, 2006, pp. 145-177.
20. Çoğalta, Nazim and Engin Karadağ, “The Effect of Educational Leadership on Organizational Variables: A Meta–Analysis Study
in the Sample of Turkey,” Educational Science: Theory & Practice, vol. 6, no. 2, 2016, pp.603-646.
21. Ahmet AVCI, “Effect of Leadership Styles of School Principals on Organizational Citizenship Behaviors ,” Educational Research
& Review, vol. 11, no. 11, 2016, pp. 1008-1024.
22. Zhang, Gang, Yuntao Bai, Arran Caza, and Lu Wang, “Leader Integrity and Organizational Citizenship Behaviour in China,”
Management & Organization
Review, vol. 10, no. 2, 2014, pp. 299-319.
23. Jin, Xiu, Sang-Woo Hahm and Hyungwoo Park, “The Effect of Employee's Cognition of Leader's Ability, Justice, and Integrity
on Organizational Citizenship Behavior: Focusing on the Mediating Effect of Trust in Leader,” International Journal of Business
Policy and Strategy Management, vol. 3, no. 1, 2016, pp. 33-40, http://dx.doi.org/10.21742/ijbpsm.2016.3.06
24. Appelbaum, A., et.al., “Organizational Citizenship Behavior: a case study of culture, leadership and trust,” Management
Decision, vol. 42, no. 1, 2004, pp. 13-40.
25. Bolino, M. C. and W. H. Turnley, “Going the Extra Mile: Cultivating and Managing Employee Citizenship Behavior,” Academy
of Management Executive, vol. 17, no. 3, 2002, pp. 60 - 71.
26. Organ, Dennis W., “Personality and Organizational Citizenship Behavior,” Journal of Management, vol. 20, no. 2, 1994, pp. 465-
478.
27. Palanski, Michael e. and Francis J. Yammarino, ”Impact of Behavioral Integrity on Follower Job Performance: A thre-Study
Examination,“ The Leaderhsip Quartely, vol. 22, 2011, pp. 765-786.
28. Marcus, Bern, et.al., “A Note on the Invremental Validity of Integrity Test Beyond Standard Personality Inventories for the
Criterion of Counterproductive Behavior,” Canadian Journal of Administrative Sciences, vol. 30, 2013, pp. 18-25,
doi:10.1002/CJAS.125.
29. Westerhoft, Gerben J., et.al., “The Relation of Ego Integrity and Despair to Personality Traits and Mental Health, “Journal of
Gerontology, vol. 00, 2015, pp. 1-9.

Authors: Sumit Kumar Mishra, V.K. Singh


Location Coder-Decoder Android Application using Init Agent Specific Ontology for Agile Software
Paper Title:
Development
Abstract: In the present era application based system become more popular in comparison to desktop
application, Based on functionality and model, application based system categorized in two different phases:
normal application & Intelligent application . to design such application there are lot of technology avaible in the
market like android ,java ,python and provide extra features in these application certain supported technology
also available like semantic web, Multi Agent System , AOG(action On Google) , Android wearable etc. In this
paper author proposed a model and design application which track user information and provide support and
guidelines through Agent for navigating people as well as provide a support system using mobile platform.
In this model author used semantic information features like ontology with the help of ontology based agent
information tracking is more easily in compare to non supporting ontology tracker system.
537.
3056-
Keyword : Ontology, Semantic, GPS,MAS, Agile, Scrum , Protocol. 3059
References:
1. Wooldridge, Michael, Jennings, Nicholas R., Kinny, David. A methodology for agent-oriented analysis and design, AGENTS
'99Proceedings of the third annual conference on Autonomous Agents(1999)
2. Sukhvir Singh, Prachi, Richa Setiya, Evaluation of Agent Oriented Software Engineering (AOSE) Methodologies-A review
International Journal of Latest Research in Science and Technology Vol.1,Issue2:PageNo.94 9July.August(2012)
3. Sumit Kumar Mishra,V.K.Singh Intergrating Extended GAIA Semantic Information Retrival Model With Android Based System
Using Native API International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8 Issue-3,
September 2019
4. .A.Bawa S.Bhatia A REVIEW ON AGENT ORIENTED SOFTWARE ENGINEERING International Journal of Advanced Research
in Computer and Communication Engineering Vol. 4, Issue 4, April 2015
5. Sumit kumar Mishra,V.K.Singh Building semantic information mediator runtime application using native API from heterogeneous d ata
sources International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8 Issue-11,
September 2019
6. Gaurav Kant Shankhdhar. "Introducing Two Level Verification Model for Reduction of Uncertainty of Message Exchange in Inter
Agent Communication in Organizational-Multi-Agent Systems Engineering, O-MaSE." IOSR Journal of Computer Engineering
(IOSR-JCE)IOSR Journal of Computer Engineering (IOSR-JCE) 19.4 (2017): 08-18.
7. Sumit Kumar Mishra,V.K. SinghBuilding Semantic Information Retrieval System for Legal Cases from Heterogeneous Adapted and
Diverse Data Sources Using Extended GAIA Methodology for Multi Agent System Proceedings - 2018 3rd International Conference
On Internet of Things: Smart Innovation and Usages, IoT-SIU 2018
8. Opijnen, Marc van, The European Legal Semantic Web :Completed Building Blocks and Future Work (November 22, 2012). Eu ropean
Legal Access Conference, November 2012.
9. Sumit Kumar Mishra,V.K. Singh Developing a multi agent system model in GAIA for court case management system as a case study
and providing an extension to GAIA Proceedings - 2017 3rd International Conference on Advances in Computing, Communication and
Automation (Fall), ICACCA 2017
10. Huang,W.,El-Darzi,E, Chountas,P& Liu.,P, “Agent based Models for Community Care Systems Analysis and Design”, paper in
conference proceedings of the 3rd IEEE International Conference on Intelligent Systems(IEEE-IS2006),London,U.K, 2006. IEEE's
Eproceedings Catalogue Number: 06EX1304C,pp273-283.

Authors: Naganagouda Patil, P V Rao, Preethi N Patil


Hybrid CNN assisted Computer Aided Diagnosis System for Glaucoma Detection and Classification:
Paper Title:
GlaucoNet+
Abstract: The exponential rise in technologies has revitalized academia-industries to achieve more efficient
computer aided diagnosis systems. It becomes inevitable especially for Glaucoma detection which has been
increasing with vast pace globally. Most of the existing approaches employs morphological features like optical
disk and optical cup information, optical cup to disk ratio etc; however enabling optimal detection of such traits
has always been challenge for researchers. On the other hand, in the last few years deep learning methods have
gained widespread attention due to its ability to exploit fine grained features of images to make optimal
classification decision. However, reliance of such methods predominantly depends on the presence of deep
features demanding suitable feature extraction method. To achieve it major existing approaches extracts full-
image features that with high dimensional kernel generates gigantically huge features, making classification
computationally overburdened. Therefore, retaining optimal balance between deep features and computational
overhead is of utmost significance for glaucoma detection and classification. With this motive, in this paper a
novel hybrid deep learning model has been developed for Glaucoma detection and classification. The proposed
Hybrid CNN model embodies Stacked Auto-Encoder (SAE) with transferable learning model AlexNet that
extracts high dimensional features to make further two-class classification. To achieve computational efficiency,
In addition to the classical ReLu and dropout (50%), we used Principle Component Analysis (PCA) and Linear
Discriminant Analysis (LDA) algorithms. We applied 10-fold cross validation assisted Support Vector Machine
classifier to perform two-class classification; Glaucomatous and Normal fundus images. Simulation results
affirmed that the proposed Hybrid deep learning model with LDA feature selection and SVM-Poly classification
achieves the maximum accuracy of 98.8%, precision 97.5%, recall 97.5% and F-Measure of 97.8%.

Keyword : Glaucoma detection, Deep Learning, Transferable Convolutional Neural Network, GalucoNet+,
Computer Aided Diagnosis System.

538. References:
1. Y.-C. Tham, X. Li, T. Y. Wong, H. A. Quigley, T. Aung, and C.-Y. Cheng, “Global prevalence of glaucoma and projections of
glaucoma burden through 2040: A systematic review and meta-analysis,” Ophthalmology, vol. 121, no. 11, pp. 2081–2090, 2014. 3060-
2. S. Y. Shen, T. Y. Wong, P. J. Foster, J.-L. Loo, M. Rosman, S.-C. Loon, W. L. Wong, S.-M. Saw, and T. Aung, “The prevalence and 3072
types of glaucoma in malay people: The singaporemalay eye study,” Investigative Ophthalmology and Visual Science, vol. 49, no . 9, p.
3846, 2008.
3. Pederson JE and Anderson DR, “The mode of progressive disc cupping in ocular hypertension and glauco ma,” Archives of
Ophthalmology, vol. 98, no. 3, pp. 490–495, 1980.
4. H. Fu et al., "Disc-Aware Ensemble Network for Glaucoma Screening From Fundus Image," in IEEE Transactions on Medical
Imaging, vol. 37, no. 11, pp. 2493-2501, Nov. 2018.
5. J. Jonas, W. Budde, and S. Panda-Jonas, “Ophthalmoscopic evaluation of the optic nerve head,” Survey of Ophthalmology, vol. 43, no.
4, pp. 293–320, 1999.
6. J. E. Morgan, N. J. L. Sheen, R. V. North, Y. Choong, and E. Ansari, “Digital imaging of the optic nerve head: monoscopic and
stereoscopic analysis,” British Journal of Ophthalmology, vol. 89, no. 7, pp. 879–884, 2005.
7. H. Fu, Y. Xu, S. Lin, X. Zhang, D. Wong, J. Liu, and A. Frangi, “Segmentation and Quantification for Angle -Closure Glaucoma
Assessment in Anterior Segment OCT,” IEEE Trans. Med. Imag., vol. 36, no. 9, pp. 1930–1938, 2017.
8. J. B. Jonas, A. Bergua, P. SchmitzValckenberg, K. I. Papastathopoulos, and W. M. Budde, “Ranking of optic disc variables for
detection of glaucomatous optic nerve damage,” Invest. Ophthalmol. Vis. Sci., vol. 41, no. 7, pp. 1764–1773, 2000.
9. M. D. HancoxO.D., “Optic disc size, an important consideration in the glaucoma evaluation,” Clinical Eye and Vision Care, vol. 11,
no. 2, pp. 59 – 62, 1999.
10. G. D. Joshi, J. Sivaswamy, and S. R. Krishnadas, “Optic Disk and Cup Segmentation from Monocular Colour Retinal Images for
Glaucoma Assessment,” IEEE Trans. Med. Imag., vol. 30, no. 6, pp. 1192–1205, 2011.
11. F. Yin, J. Liu, S. H. Ong, Y. Sun, D. W. K. Wong, N. M. Tan, C. Cheung, M. Baskaran, T. Aung, and T. Y. Wong, “Model-based optic
nerve head segmentation on retinal fundus images,” in Proc. EMBC, 2011, pp. 2626–2629.
12. J. Cheng, J. Liu, Y. Xu, F. Yin, D. Wong, N. Tan, D. Tao, C.-Y. Cheng, T. Aung, and T. Wong, “Superpixel classification based optic
disc and optic cup segmentation for glaucoma screening,” IEEE Trans. Med. Imag., vol. 32, no. 6, pp. 1019–1032, 2013.
13. J. Cheng, D. Tao, D. W. K. Wong, and J. Liu, “Quadratic divergence regularized SVM for optic disc segmentation,” Biomed. Opt.
Express, vol. 8, no. 5, pp. 2687–2696, 2017.
14. H. Fu, J. Cheng, Y. Xu, D. Wong, J. Liu, and X. Cao, “Joint Optic Disc and Cup Segmentation Based on Multi-label Deep Network
and Polar Transformation,” IEEE Trans. Med. Imag., 2018.
15. J. Cheng, F. Yin, D. W. K. Wong, D. Tao, and J. Liu, “Sparse dissimilarity-constrained coding for glaucoma screening,” vol. 62, no. 5,
pp. 1395–1403, 2015.
16. R. Bock, J. Meier, L. G. Nyul, J. Hornegger, and G. Michelson, “Glaucoma risk index: Automated glaucoma detection from color
fundus images,” Medical Image Analysis, vol. 14, no. 3, pp. 471–481, 2010.
17. S. Dua, U. RajendraAcharya, P. Chowriappa, and S. VinithaSree, “Wavelet-based energy features for glaucomatous image
classification,” IEEE Transactions on Information Technology in Biomedicine, vol. 16, no. 1, pp. 80–87, 2012.
18. K. P. Noronha, U. R. Acharya, K. P. Nayak, R. J. Martis, and S. V. Bhandary, “Automated classification of glaucoma stages usi ng
higher order cumulant features,” Biomedical Signal Processing and Control, vol. 10, no. 1, pp. 174–183, 2014.
19. U. R. Acharya, E. Ng, W. Eugene, Lim, K. Noronha, L. Min, K. Nayak, and S. Bhandary, “Decision support system for the glaucom a
using Gabor transformation,” Biomedical Signal Processing and Control, vol. 15, pp. 18–26, 2015.
20. A. Krizhevsky, I. Sutskever, and G. Hinton, “Imagenet classification with deep convolutional neural networks,” in Proc. NIPS, 2012,
pp. 1097–1105.
21. V. Gulshan, L. Peng, M. Coram, and et.al, “Development and Validation of a Deep Learning Algorithm for Detection of Diabetic
Retinopathy in Retinal Fundus Photographs,” Journal of the American Medical Association, vol. 304, no. 6, pp. 649–656, 2016.
22. A. Esteva, B. Kuprel, R. A. Novoa, J. Ko, S. M. Swetter, H. M. Blau, and S. Thrun, “Dermatologist-level classification of skin cancer
with deep neural networks,” Nature, vol. 542, no. 7639, pp. 115–118, 2017.
23. D. Shu Wei Ting and et al., “Development and Validation of a Deep Learning System for Diabetic Retinopathy and Related Eye
Diseases Using Retinal Images From Multiethnic Populations With Diabetes,” JAMA, vol. 318, no. 22, pp. 2211–2223, 2017.
24. Q. Li, B. Feng, L. Xie, P. Liang, H. Zhang, and T. Wang, “A Cross modality Learning Approach for Vessel Segmentation in Retin al
Images,” IEEE Trans. Med. Imag., vol. 35, no. 1, pp. 109–118, 2016.
25. H. Fu, Y. Xu, S. Lin, D. W. K. Wong, and J. Liu, “DeepVessel: Retinal Vessel Segmentation via Deep Learning and Conditional
Random Field,” in Proc. MICCAI, 2016, pp. 132–139.
26. X. Chen, Y. Xu, S. Yan, D. Wing, T. Wong, and J. Liu, “Automatic Feature Learning for Glaucoma Detection Based on Deep
Learning,” in Proc. MICCAI, 2015, pp. 669–677.
27. J. I. Orlando, E. Prokofyeva, M. Del Fresno, and M. B. Blaschko, “Convolutional neural network transfer for automated glaucom a
identification,” in Proc. SPIE, 12th International Symposium on Medical Information Processing and Analysis, 2016.
28. S. Yousefi et al., "Learning From Data: Recognizing Glaucomatous Defect Patterns and Detecting Progression From Visual Field
Measurements," in IEEE Trans. on Biomedical Engg., vol. 61, no. 7, pp. 2112-2124, July 2014.
29. R. Panda, N. B. Puhan, A. Rao, D. Padhy and G. Panda, "Recurrent neural network based retinal nerve fiber layer defect detect ion in
early glaucoma," 2017 IEEE 14th International Symposium on Biomedical Imaging (ISBI 2017), Melbourne, VIC, 2017, pp. 692-695.
30. M. E. Şahı̇ n and M. R. Bozkurt, "Retinal Nerve Fiber Layer detection at Optical Coherence Tomography image for the diagnosis of
glaucoma," 2015 Medical Technologies National Conference, Bodrum, 2015, pp. 1-3.
31. Aslan, Muhammet&Ceylan, Murat &Durdu, Akif. (2018). Segmentation of Retinal Blood Vessel Using Gabor Filter and Extreme
Learning Machines. 10.1109/IDAP.2018.8620890.
32. A. Gopalakrishnan, A. Almazroa, K. Raahemifar and V. Lakshminarayanan, "Optic disc segmentation using circular hough transform
and curve fitting," 2015 2nd International Conference on Opto-Electronics and Applied Optics, Vancouver, BC, 2015, pp. 1-4.
33. T. Khalil, M. UsmanAkram, S. Khalid and A. Jameel, "Improved automated detection of glaucoma from fundus im age using hybrid
structural and textural features," in IET Image Proc., vol. 11, no. 9, pp. 693-700, 9 2017.
34. N. Kavya and K. V. Padmaja, "Glaucoma detection using texture features extraction," 2017 51st Asilomar Conference on Signals,
Systems, and Computers, Pacific Grove, CA, 2017, pp. 1471-1475.
35. S. Omid, J. Shanbehzadeh, Z. Ghassabi and S. S. Ostadzadeh, "Optic disc detection in high-resolution retinal fundus images by region
growing," 2015 8th International Conference on Biomedical Engineering and Informatics (BMEI), Shenyang, 2015, pp. 101-105.
36. M. Lotankar, K. Noronha and J. Koti, "Detection of optic disc and cup from color retinal images for automated diagnosis of glaucoma,"
2015 IEEE UP Section Conference on Electrical Computer and Electronics (UPCON), Allahabad, 2015, pp. 1-6.
37. G. Pavithra, A. Tugashetti, T. C. Manjunath and L. Dharmanna, "Investigation of primary glaucoma by CDR in fundus images," 20 17
2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT),
Bangalore, 2017, pp. 1841-1848.
38. W. Luangruangrong, K. Chinnasarn and A. Rodtook, "Polar Space Contour Detection for Automated Optic Cup Segmentation," 2018
10th International Conference on Knowledge and Smart Technology (KST), Chiang Mai, 2018, pp. 164-169.
39. P. Das, S. R. Nirmala and J. P. Medhi, "Detection of glaucoma using Neuroretinal Rim information," 2016 International Confere nce on
Accessibility to Digital World (ICADW), Guwahati, 2016, pp. 181-186.
40. H. Alghmdi, HongyingLilian Tang, M. Hansen, A. O'Shea, L. Al Turk and T. Peto, "Measurement of optical cup-to-disc ratio in fundus
images for glaucoma screening," 2015 International Workshop on Computational Intelligence for Multimedia Understanding
(IWCIM), Prague, 2015, pp. 1-5.
41. M. Aloudat and M. Faezipour, "Determination for Glaucoma disease based on red area percentage," 2016 IEEE Long Island Systems,
Applications and Technology Conference (LISAT), Farmingdale, NY, 2016, pp. 1-5.
42. M. Roslin and S. Sumathi, "Glaucoma screening by the detection of blood vessels and optic cup to disc ratio," 2016 International
Conference on Comm. and Signal Processing, Melmaruvathur, 2016, pp. 2210-2215.
43. S. M. Nikam and C. Y. Patil, "Glaucoma detection from fundus images using MATLAB GUI," 2017 3rd International Conference on
Advances in Comp. Comm. & Automation (ICACCA) (Fall), Dehradun, 2017, pp. 1-4.
44. H. Ahmad, A. Yamin, A. Shakeel, S. O. Gillani and U. Ansari, "Detection of glaucoma using retinal fundus images," 2014
International Conference on Robotics and Emerging Allied Technologies in Engineering (iCREATE), Islamabad, 2014, pp. 321-324.
45. E. Pinos-Velez, M. Flores-Rivera, W. Ipanque-Alama, D. Herrera-Alvarez, C. Chacon and L. Serpa-Andrade, "Implementation of
support tools for the presumptive diagnosis of Glaucoma through identification and processing of medical images of the human eye,"
2018 IEEE International Systems Engineering Symposium (ISSE), Rome, 2018, pp. 1-5.
46. Atheesan S. and Yashothara S., "Automatic glaucoma detection by using funduscopic images," 2016 International Conference on
Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, 2016, pp. 813-817.
47. J. K. Virk, M. Singh and M. Singh, "Cup-to-disk ratio (CDR) determination for glaucoma screening," 2015 1st International
Conference on Next Generation Computing Technologies, Dehradun, 2015, pp. 504-507.
48. D. D. Patil, R. R. Manza, G. C. Bedke and D. D. Rathod, "Development of primary glaucoma classification technique using optic cup
&amp; disc ratio," 2015 International Conference on Pervasive Computing (ICPC), Pune, 2015, pp. 1-5.
49. D. E. Kusumandari, ArisMunandar and G. G. Redhyka, "The comparison of GVF Snake Active Contour method and Ellipse Fit in
optic disc detection for glaucoma diagnosis," 2015 International Conference on Automation, Cognitive Science, Optics, Micro Electro-
Mechanical System, and Information Technology (ICACOMIT), Bandung, 2015, pp. 123-126.
50. A. M. Jose and A. A. Balakrishnan, "A novel method for glaucoma detection using optic disc and cup segmentation in digit al retinal
fundus images," 2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015], Nagercoil, 2015, pp.
1-5.
51. E. Deepika and S. Maheswari, "Earlier glaucoma detection using blood vessel segmentation and classification," 2018 2nd International
Conference on Inventive Systems and Control (ICISC), Coimbatore, 2018, pp. 484-490.
52. M. K. Dutta, A. K. Mourya, A. Singh, M. Parthasarathi, R. Burget and K. Riha, "Glaucoma detection by segmenting the super pix els
from fundus colour retinal images," 2014 International Conf. on Medical Imaging, m-Health and Emerging Comm. Systems, Greater
Noida, 2014, pp. 86-90.
53. K. Choudhary and S. Wadhwa, "Glaucoma Detection Using Cross Validation Algorithm," 2014 Fourth International Conference on
Advanced Computing & Communication Technologies, Rohtak, 2014, pp. 478-482.
54. L. Xiong, H. Li and Y. Zheng, "Automatic detection of glaucoma in retinal images," 2014 9th IEEE Conference on Industrial
Electronics and Applications, Hangzhou, 2014, pp. 1016-1019.
55. Harshvardhan G, Venkateswaran N and Padmapriya N, "Assessment of Glaucoma with ocular thermal images using GLCM techniques
and Logistic Regression classifier," 2016 International Conference on Wireless Communications, Signal Processing and Networking
(WiSPNET), Chennai, 2016, pp. 1534-1537.
56. S. Pathan, P. Kumar and R. M. Pai, "The Role of Color and Texture Features in Glaucoma Detection," 2018 International Confere nce
on Advances in Computing, Communications and Informatics (ICACCI), Bangalore, 2018, pp. 526-530.
57. S. Simonthomas, N. Thulasi and P. Asharaf, "Automated diagnosis of glaucoma using Haralick texture features," International
Conference on Information Communication and Embedded Systems (ICICES2014), Chennai, 2014, pp. 1-6.
58. Fu, Huazhu& Cheng, Jun &Xu, Yanwu& Zhang, Changqing& Wing Kee Wong, Damon & Liu, Jiang & Cao, Xiaochun. (2018). Disc-
Aware Ensemble Network for Glaucoma Screening From Fundus Image. IEEE Transactions on Medical Imaging. PP. 1-1.
10.1109/TMI.2018.2837012.
59. A. Pal, M. R. Moorthy and A. Shahina, "G-Eyenet: A Convolutional Autoencoding Classifier Framework for the Detection of
Glaucoma from Retinal Fundus Images," 2018 25th IEEE International Conference on Image Processing (ICIP), Athens, 2018, pp.
2775-2779.
60. X. Chen, Y. Xu, D. W. Kee Wong, T. Y. Wong and J. Liu, "Glaucoma detection based on deep convolutional neural network," 2015
37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), Milan, 2015, pp. 715-718.
61. F. Calimeri, A. Marzullo, C. Stamile and G. Terracina, "Optic Disc Detection Using Fine Tuned Convolutional Neural Networks,"
2016 12th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS), Naples, 2016, pp. 69-75.
62. J. Kim, S. Candemir, E. Y. Chew and G. R. Thoma, "Region of Interest Detection in Fundus Images Using Deep Learning and Blood
Vessel Information," 2018 IEEE 31st International Symposium on Computer-Based Medical Systems (CBMS), Karlstad, 2018, pp.
357-362.
63. V. Nair and G. E. Hinton. Rectified linear units improve restricted boltzmann machines. In Proc. 27th International Conference on
Machine Learning, 2010.
64. A. John, A. Sharma, H. Singh and V. Rehani, "Fuzzy based decision making for detection of Glaucoma," 2017 8th International
Conference on Computing, Communication and Networking Technologies (ICCCNT), Delhi, 2017, pp. 1-6.
65. C. Gisler, A. Ridi, M. Fauquex, D. Genoud and J. Hennebert, "Towards glaucoma detection using intraocular pressure monitoring ,"
2014 6th International Conference of Soft Computing and Pattern Recognition (SoCPaR), Tunis, 2014, pp. 255-260.
66. G. R., P. V. Rao and A. S., "Automated glaucoma detection system based on wavelet energy features and ANN," 2014 Internationa l
Conference on Advances in Computing, Communications and Informatics (ICACCI), New Delhi, 2014, pp. 2808-2812.
67. J. Ayub et al., "Glaucoma detection through optic disc and cup segmentation using K-mean clustering," 2016 International Conference
on Computing, Electronic and Electrical Engg., Quetta, 2016, pp. 143-147.
68. Y. Hatanaka et al., "Improved automated optic cup segmentation based on detection of blood vessel bends in retinal fundus images,"
2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Chicago, IL, 2014, pp. 126 -
129.
69. A. Chakravarty and J. Sivaswamy, "Glaucoma classification with a fusion of segmentation and image-based features," 2016 IEEE 13th
International Symposium on Biomedical Imaging (ISBI), Prague, 2016, pp. 689-692.
70. A. Ramzan, M. UsmanAkram, A. Shaukat, S. GulKhawaja, U. UllahYasin and W. Haider Butt, "Automated glaucoma detection using
retinal layers segmentation and optic cup-to-disc ratio in optical coherence tomography images," in IET Image Processing, vol. 13, no.
3, pp. 409-420, 28 2 2019.
71. A. Agarwal, A. Issac, A. Singh and M. K. Dutta, "Automatic imaging method for optic disc segmentation using morphological
techniques and active contour fitting," 2016 Ninth International Conference on Contemporary Computing (IC3), Noida, 2016, pp. 1-5.
72. Harini R and Sheela N, "Feature extraction and classification of retinal images for automated detection of Diabetic Retinopathy," 2016
Second International Conference on Cognitive Computing and Information Processing, Mysore, 2016, pp. 1-4.
73. E. Santos, L. Santos, R. Veras, M. Frazao and D. Leite, "A Semiautomatic Superpixel Based Approach to Cup-to-Disc Ratio
Measurement," 2018 IEEE Symposium on Comp. and Comm., Natal, 2018, pp. 00621-00626.
74. S. A. Tuncer, T. Selçuk, M. Parlak and A. Alkan, "Hybrid approach optic disc segmentation for retinal images," 2017 International
Artificial Intelligence and Data Processing Symposium, Malatya, 2017, pp. 1-5.
75. A.Agarwal, S. Gulia, S. Chaudhary, M. K. Dutta, C. M. Travieso and J. B. Alonso-Hernández, "A novel approach to detect glaucoma
in retinal fundus images using cup-disk and rim-disk ratio," 2015 4th International Work Conference on Bioinspired Intelligence
(IWOBI), San Sebastian, 2015, pp. 139-144.
76. Y. Jia, et al., “Caffe: Convolutional architecture for fast feature embedding,” in Proceedings of the ACM International Conference on
Multimedia. ACM, pp. 675–678, 2014.
77. http://www.vlfeat.org/

Authors: P. Sandeep, V. Prakasam

Paper Title: LM35 Temperature Sensor Using LabVIEW and NI myDAQ


Abstract: The NI myDAQ component consists of input and output ports. To sense the temperature is
necessary at a many places for example kitchen, refrigerators, air conditioners, storage rooms etc. At these
spaces to sense the temperature and its appropriate hint is required since it can basis serious complications
otherwise. For example, if the temperature in the food room room is greater than an accustomed threshold, it will
be damaging for all of the food objects. We can similarly consider “Fire Alarm” which is an example of
temperature sensor. This paper offers the evidence about how to use the Labview for LM35 temperature sensor
using NI myDAQ.
539.
Keyword : NI, myDAQ, Labview, Fire Alarm, LM35. 3073-
3077
References:
1. Jim Baker.How to call win32 Dynamic link Libaries(DLLs)from LabVIEW. National Instruments Notes 088. www.ni.com.
2. Integrating the Internet into Your Measurement System-Data Socket Technical Overview.USA.
3. Based on NImyDAQ Sound Processing System, College of Electronics and Information
Engineering,ChangchunUniversity,Changchun,china.
4. Using LabVIEW to Measure Temperature with a Thermistor, C. Briscoe and W. Dufee, University of Minnesota.
5. P. A. H. Vardhini, "Analysis of integrator for continuous time Digital sigma Delta ADC on Xilinx FPGA," 2016 International
Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), Chennai, 2016, pp. 2689-2693.
6. Real Time Temperature Monitoring Using LABVIEW and Arduino, Vaibhav M. Davande1, Pradeep C. Dhanawade2, Vinayak B.
Sutar3, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 4, Issue 3, March 2016.

Authors: K.Murali Chandra Babu, P.A.HarshaVardhini, N.Koteswaramma

Paper Title: Design and Implementation of Arduino based Riders Safe Guard 2.0
540.
Abstract: No matter how careful and attentive people are on road, accidents do happen. The only way to
3078-
have a safe journey is by following safety measures. To decrease the death rate of bike riders, this paper
3083
proposes a solution called Rider’s Safe Guard 2.0. Few incidents due to wrong decisions on road may cost our
precious life due to recklessness. This work automates the process and the responsibility of decision making is
given to the micro controller. Microcontroller makes sure whether the rider is wearing safety gear such as the
helmet and whether the ride is under any alcohol intake. By analyzing both these condition the motor starts
running and the circuit gets connected to the vehicle ignition switch. Micro controller Arduino Nano and Uno
based system insists the rider to wear helmet to ride the bike as long as the motor is on. As there is no
declination in road accidents, this system can be made mandatory in every two wheeler and the same can be
extended for fourwheelers for wearing seat belts and doesnot allow if the rider is alcoholic.

Keyword : This work automates the process and the responsibility of decision making is given to the micro
controller.
References:
1. NiravThakor , TanmayVyas , Divyang Shah “Automatic Vehicle Accident Detection System Based on ARM &GPS”, International
Journal for Research in Technological Studies, Vol-1, Issue - 1, pp :17-19, Dec 2013.
2. S.Sonika, Dr.K.Sathiyasekar, S.Jaishree “Intelligent accident identification system using GPS, GSM modem”, International Journal of
Advanced Research in Computer and Communication Engineering Vol.3,Issue-2,Feb 2014.
3. D. B. Tushara and P. A. H. Vardhini, "Wireless vehicle alert and collision prevention system design using Atmel
microcontroller," 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), Chennai, 2016,
pp. 2784-2787.
4. K.Murali Chandra Babu, P.A.Harsha Vardhini, “Advanced Vehicle Security System with Spartan FPGA”, International Journal of
Engineering Research in Electronics and Communication Engineering (IJERECE), pp.86-88 ,Vol 5, Issue 4, April 2018.

Authors: M.Balamurugan, Periasamy J.K, C.Gnanapriya, K.Vijiyalakshmi, E.Vanitha

Paper Title: Efficient Healthcare Framework for Senior Benefaction


Abstract: The Internet of Things (IoT) has been broadly used to interconnect the accessible restorative
assets and offer shrewd, dependable, and successful social insurance administration to the older people. Health
checking for dynamic and helped living is one of the ideal models that can utilize the IoT preferences to improve
the old way of life. An IoT engineering is altered for social insurance applications. The proposed design gathers
the information and transfers it to the cloud where it is prepared and dissected. Criticism activities dependent on
541. the examined information can be sent back to the user. The proposed framework plan theory target is having a
low-control framework that can be worn during the day and be turbo charged as necessary. The framework is
executed utilizing minimal effort segments, which makes it a moderate framework. 3084-
3086

Keyword : Physical sensor, indoor positioning module, sensor interface circuit.


References:
1. S. Jaiswal 2017, ‘Survey of Health Monitoring Management Using Internet of Things (IOT),’ Int. J. Sci. Res., vol. 5, no. 11, pp.
2243–2246.
2. D. Kajaree 2017, ‘A Survey on Healthcare Monitoring System Using Body Sensor Network’, Int. J. Innov. Res. Comput.Commun.
Eng., vol. 5, no. 2, pp. 1302–1309.

Authors: S.Narasimhan, Rajendran


Application of Data Mining Techniques for Sensor Drift Analysis to Optimize Nuclear Power Plant
Paper Title:
performance
Abstract: The Power Plants are engineered and instrumented to ensure safety in all modes of operation.
Hence they should be continuously monitored and maintained with necessary Instrumentation to identify
performance degradation and the root causes to avoid calling for frequent maintenance. The degraded
performance of Instrumentation & Control systems may also lead to plant outages.
Different studies have suggested that a well maintained instrumentation with errors and response times within
the permissible limits may increase the availability minimizing outages.
The I&C systems are designed for monitoring, control and safety actions in case of an event in a power plant.
The sensors used are single, redundant, triplicated or diverse based on the type of application. Where safety is of
prime concern, triplicated and 2/3 voting logic is employed for initiating safety actions. Diverse instruments are
provided for protecting the plant from any single abnormal event. Redundant sensors are used to improve plant
542. availability.
Wherever 2/3 logics are used, the sensors shall uniformly behave and the drifts across the sensor may lead to 3087-
crossing the threshold, initiating a protective action. Instead of waiting for the regular preventive maintenance 3095
schedule for recalibrating the sensors, the drift in the sensors are analyzed by developing a combined overall
online monitoring parameter which will give an early warning to the operator the need for recalibration of the
redundant sensors.
This paper deals with development of one such parameter through data mining techniques for a representative
process in a nuclear power plant.

Keyword : Calibration/Drift Measurement, Data-driven models, Data Collection, Data Mining, Data Pre-
processing, Knowledge Discovery in Database, Mahalanobis Distance, Summary Statistics ,Z-score
normalization, ,covariance matrix.
References:
1. IEC-61226 : International Standard, Edition 3.0, 2009-07, Nuclear Power Plants --- Instrumentation & Control Important to Safety ---
Classification of Instrumentation & Control Functions.
2. IAEA Safety Glossary, 2007.
3. IEC-61508 : Standard for Functional Safety of Electrical/ Electronic/ /Programmable Electronic Safety Related Systems.
4. Kadlec, P., Gabrys, B., & Strandt, S., Data-driven Soft Sensors in the Process Industry, Computers and Chemical Engineering (2008).
5. Optimal Calibration Parameters for Process Instrumentation, white paper on calibration, Beemex, www.beemex.com.
6. Ana Sofia Ramos Brásio,”Industrial process monitoring methodologies”, University of Coimbra, PhD thesis in Chemical
Engineering,2015.
7. Mahalanobis, Prasanta Chandra , "On the generalised distance in statistics". Proceedings of the National Institute of Sciences of India. 2
(1): 49–55,(2016).
8. Generic Qualification of the Rosemount 3051N Pressure Transmitter, EPRI, June 2001
9. Alexander Wiegand, WIKA Handbook : Pressure & Temperature Measurement, Wika Alexander Wiegand GmbH & Co., Caruna
Druck, Mittenberg, 1995
10. Douglus M. Considine, Process/Industrial Instruments & Controls Handbook, 4th Edition, McGraw Hill Inc. 1993
11. Ernest O. Doebelin, Measurement Systems, Applications & Design, McGraw Hill, 1990
12. IAEA. (2008). On-Line Monitoring for Improving Performance of Nuclear Power Plants Part 1: Instrument Channel Monitoring,
International Atomic Energy Agency, Vienna.
13. Hashemian, H.M. (2006). Maintenance of Process Instrumentation in Nuclear Powerplants, Chapter 6, Springer, Berlin.
14. Hashemian, H.M. (2011). Measurement of Dynamic Temperatures and Pressures in Nuclear Power Plants, the University of Western
Ontario, Ontario, Canada.
15. Wikipedia article on mahalanobis distance: https://en.wikipedia.org/wiki/Mahalanobis_distance
16. 16.Analytics India, Magazine https://www.analyticsindiamag.com/understanding-mahalanobis-distance-and-its-use-cases/,
ABHISHEK SHARMA, JUL 10, 2018
17. Jiawei Han and Micheline Kamber,”Data Mining: Concepts and Techniques,”
18. Juha Juselius, Lappeenranta University of Technology , LUT School of Energy Systems,”Advanced condition monitoring methods in
thermal power plants”, master’s thesis, 2018
19. D. Flynn, J. Ritchie and M. Cregan,”Data Mining Techniques Applied to Power Plant Performance Monitoring”, The Queen’s
University of Belfast, N. Ireland, 16th Triennial World Congress, Prague, Czech Republic,2005
20. Li J., Niu C., Liu J., Zhang L. “Research and Application of Data Mining in Power Plant Process Control and Optimization.” In: Yeung
D.S., Liu ZQ., Wang XZ., Yan H. (eds) Advances in Machine Learning and Cybernetics. Lecture Notes in Computer Science, vol
3930. Springer, Berlin, Heidelberg ,2006.
21. 21. Tony Ogilvie, B W Hogg, “Use of data mining techniques in the performance monitoring and optimization of a thermal power
plant”, IEEE Colloquium on Knowledge Discovery and Data Mining, 1998.

Authors: Hanumanthu Bhukya, M.Sadanandam

Paper Title: Rough Sets Base Associative Classification Rules Extraction from Big Data
Abstract: Big Data is a current burning challenge for the data analytics research community. Many
conventional data analytics techniques have been extended to the MapReduce framework to process Big Data.
But in our literature review, we find that for the MapReduce system there is an absolute lack of rough set-based
technique. To facilitate this and recognize the importance of the rule-based classification techniques, we suggest
a rough-set associative classification rules extraction process for the MapReduce framework. The
implementation and evaluation of the Big Data Standard data set demonstrated the efficiency of our suggested
approach.

Keyword : in our literature review, we find that for the MapReduce system
References:
1. PawlakZ, Rough Sets “Theoretical Aspects of Reasoning about Data”, Dordrecht Kluwer, 1991.
2. WangG,WuY,ChangL, “An approach for attribute reduction and rule generation based on rough set theory”, Journal of Software 10
(11) (1999) 1206–1211.
3. Z.Pawlak,Roughsets, International Journal of ComputerInfSci11(1982)341–356.
4. M.Kryszkiewicz,Roughsetapproachtoincompleteinformationsystems,Info.Science112(1998)39–49.
5. TsoukisA, StefanowskiJ, “On the extension of rough sets under in complete information, in: New Directions in rough sets ,Data Mining
543. , and Granular-Soft Com- puting,vol.1711,SpringerBerlinHeidelberg,1999,pp.73–81.
6. GrecoS, SlowinskiJ and BlaszczynskiJ, “Multi-criteria classification–a new scheme for application of dominance-based decision rules, 3096-
Eur.J.Oper.Res.181 (2007) 1030–1044.
7. ZhuW, Generalized rough sets based on relations,Info.Science177(2007)4997–5011.
3102
8. BryniarskiE, WybraniecU and Bonikowski Z, , -Skardowska, Extensions and intentions in the rough set
theory,Info.Science107(1998)149–167.
9. XWuC,HuHQ,YuDR&LiuJF, “Neighbor hood rough set based heterogeneous feature sub set
selection”,Info.Science178(18)(2008)3577–3594.
10. YaoYY “Decision-theoretic roughest models”, in Proceeding of the Second Int.Conf. on Rough Sets and Knowledge Technology,
2007, pp.1–12.
11. HerbertJ, YaoJT & AgameJ “theoretic perspective on roughest analysis”, JChongqing University Posts Telecommunications.20
(2008)291–298.
12. PradeH and DuboisD, “Rough fuzzy sets and fuzzy rough sets, International. J. General Syst.17 (1990)191–209.
13. ZhangWX, WuWZ and LeungY, “Knowledge acquisition in incomplete information systems: A rough set approach, Eur. Journal.
Oper. Res. 168 (2006)164–180.
14. WangXZ, He.Q and ChenDG, “FRSVMs:fuzzy rough set based support vector machines, Fuzzy Sets Systems.161(2010)596–607.
15. Wang WT, Dai JH, Tian HW, , Liu L,Decision rule mining using classification consistency rate,Knowl.BasedSyst.43(2013)95–102.
16. Skowron A and Swiniarski RW, “Rough set methods in feature selection and recognition, Pattern Recognition Lett.24 (2003)833–849.
17. ShenQ and JensenR, “New approaches to fuzzy-rough feature selection”, IEEETrans. Fuzzy Systems17(4)(2008)824–838.
18. Liao XW, Xu WH, Li Y, , “Approaches to attribute reductions based on rough set and matrix computation in inconsistent ordered
information systems”, Knowl.BasedSystems.27(2012)78–91.
19. QinYK and haoH.Z, , “Mixed feature selection in incomplete decision table”, Knowledge Based Systems57(2014)181–190.
20. MatarazzoB, Slowinski R,& Greco S, “Rough sets in decision making, Encycl.Com-plex.Syst.Sci.(2009)7753–7787.
21. Shen LX, Tay F, , “Fault diagnosis based on rough set theory”, Eng. Appl. Artif. Intelligence.16 (1)(2003)39–43.
22. WakulicA Deja and PaszekP, “Applying roughest theory to medical diagnosing, Rough Sets” Intelligent. Syst. Paradig.
4585(2007)427–435.
23. Cao CG Jiang F, Sui YF, “A rough set approach to outlier detection”, International J.Gen.Syst.37 (2008)519–536.
24. Chen YS, “Classifying credit ratings for Asian banks using integrating feature selection and the CPDA-based rough sets approach,
Knowledge Based Syst. 26(2012) 259–270.
25. ZPawlak, “Rough Sets” International J. Computer Information Science. 198211 (5), 341– 356.
26. Z.Pawlak, “Rough Sets: Theoretical Aspects of Reasoning about Data”, Kluwer Academic Publishing, Dordrecht, 1991.
27. PawlakZ, “Rough set approach to knowledge-based decision support”. Eur. J. Operation 1997 Res. 99, 48–57.
28. Busse Grazymala, ZPawlak SlowinskiJW and ZiarkoW “Rough sets”, Communications of the ACM, Vol. 38, pp.88–95, 1995.
29. Rybinski H. and KryszkiewiczM, (1996b). “Reducing information systems with uncertain real value attributes”. In 6th Internati onal
Conferences, Information Processing and Management of Uncertainty in Knowledge- Based Systems, Proceedings (IPMU’96), Vol. II.
July 1–5, Grenada. pp. 1165.
30. PawarBV and Dhande Varda C, “A Survey on Parallel Method for Rough Set using MapReduce Technique for Data Mining”,
International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064.
31. ImielinskiT, R Agrawal, & ASwami. “Mining association rules between sets of items in large databases”, Proceedings of 1993 AC M
SIGMOD, ACM, New York, NY, USA,1993, pp.207–216.
32. PK Reddy & RU Kiran, “Mining rare association rules in the datasets with widely varying items” frequencies Lecture Notes in
Computer Science, Vol. 5981, 2010,pp.49–62.
33. NCercone and J Li “A rough set based model to rank the importance of association rules”, Lecture Notes in Computer Sc ience,
2005,Vol. 3642, pp.109–118.
34. SOFalaki, AOAdetunmbi, OSAdewale, and BKAlese, ‘Network intrusion detection based on rough set and knearest neighbour’,
International Journal of Computing and ICT Research, 2008, Vol. 2, pp.60–66.
35. RamannaS, PetersJF, SurajZ, ShanS and N. Pizzi, “Classification of meteorological volumetric radar data using rough set methods”,
Pattern Recognition Letters 24 (6) (2003) 911–920.
36. Brodley CE and Dy J.G, “Feature selection for unsupervised learning”, The Journal of Machine Learning Research archive 5, 2004,
845–889.
37. KusiakA, “Decomposition in data mining: An industrial case study”, IEEE Transaction on Electronics Packaging Manufacturing 23
(4), 2000 345–353.
38. ChanCC, “A rough set approach to attribute generalization in data mining”, Information Sciences 107, 1998, 177–194.
39. Xu Y & T Li, “A generalization rough set approach to attribute generalization in data mining”, Journal of Southwest Jiaotong
University 8 (1), 2000 69–75.
40. KamberM & JHan “Data Mining: Concepts and Techniques”, Morgan Kaufmann Publishers, San Francisco, 2001,CA.
41. Huang J, Nie P, SaiY, and Xu R ‘A rough set approach to mining concise rules from inconsistent data’, Proceedings of IEEE GR C
2006, IEEE, Atlanta USA, pp.333–336.
42. R Brause and PaetzJ ‘Rule generation and model selection used for medical diagnosis’, Journal of Intelligent & Fuzzy Systems:
Applications in Engineering and Technology – Challenges for future intelligent systems in biomedicine, 2002 Vol. 12, No. 1, pp.69–
78.
43. AAbraham & C Grosan ‘Stock market modeling using genetic programming ensembles’, Genetic Systems Programming: Theory and
Experiences, 2006,Vol. 13, pp.133–148.
44. BT Nath & A Ghosh ‘Multi-objective rule mining using genetic algorithms’, Information Sciences: an International Journal, 2004, Vol.
163, pp.123–133.
45. Ma HF, ZhaoWZ and HeQ, “Parallel k-means clustering based on mapreduce,” in Proc. 1st Int. Conf. Cloud Comput., 2009, pp. 674–
679.
46. Wang GY, LiangZ,YangY and ChenRZ “Attribute reduction for massive data based on rough set theory and mapreduce ,” in Proc.
Rough Set Knowl. Technol., 2010, pp. 672–678.
47. ZhaoCB, ZhangBJ, RTLi, Ruan, and GaoZ, “A parallel method for computing rough set approximations,” Inf. Sci., vol. 194, pp. 2 09–
223, 2012.
48. GhemawatS and DeanJ “Mapreduce: simplified data processing on large clusters”, Commun. ACM 51 (1) 2008, 107–113.
49. Hadoop Apache-2013, “Hadoop Apache Project”, <http://hadoop.apache.org/> accessed December-2013.
50. Hadoop, WhiteT, “The Definitive Guide”, O’Reilly Media, Inc., 2012.
51. Apache Mahout-2013 “Apache Project Mahout”, <http://mahout.apache.org/> accessed December- 2013.
52. DunningT, OwenS, AnilR, FriedmanE, “Mahout in Action”, Manning Publications Company, 2012.
53. Spark-2013 <http://spark-project.org/> accessed December-2013.
54. Storm-2013 <http://storm-project.net/>accessed December-2013.
55. Romer.G, S.Melnik, J.Long,A.Gubarev, ShivakumarS, and Vassilakis DremelT, MTolton,: interactive analysis of web -scale datasets,
in: Proc. of the 36th International Conference on Very Large Data Bases, 2010, pp. 330–339.
56. Apache Drill-2013 <http://incubator.apache.org/drill/> accessed December-13.
57. Dean J, GSanjay, “MapReduce: Simple Data Processing on Large Clusters” Proceedings To appear in OSDI 2004.
58. Zdzisław Pawlak, Andrzej S “Rudiments of rough sets” Proc. Elsevier accepted in 7 June 2006.
59. T Li, Zhang J, pan Yi “Parallel Rough Set Based Knowledge Acquisition Using MapReduce from Big Data” Proceedings ACM Big
Mine, August 12th , 2012 Beijing, China.
60. J Zang, T Li, Da Rausan “A parallel method for rough set approximations” Proc. Elsevier accepted in 11 January 2012.
61. B.Raghuram, and Gyani J “Fuzzy Associative Classification Driven MapReduce Computing Solution for Effective Learning from
Uncertain and Dynamic Big Data” International Journal of Database Theory and Application, Vol. 11, No.1 2018.
62. Data Set (URL): https:/archive.ics.uci.edu/ml/datasets/census+income.

Authors: Shavkat Imomov, Nargiza Kholikova, Zebo Alimova, Ikrom Nuritov, Nargiza Temirkulova

Paper Title: Oil Purification Devices Used in Internal Combustion Engines


Abstract: The article presents, developed operating modes and substantiates the parameters of a device that
cleans motor oils from oxidation products and the resulting analytical relationships representing the movement
544. of a mixture of acetone and used motor oil in viscosity states and the process of evaporation of the solvent from
the oil during processing. It also substantiates the speed of movement of motor oil on a cone-shaped surface 3103-
based on its effect on refining and substantiates the dependence of the quality of refined oil on the temperature 3107
indicator of the mixture and the availability of the evaporation process and it was also found that motor oils are
intensively contaminated with oxidation products during processing, thereby accelerating the friction process.
During agricultural work, tractor engines due to congestion and oxidation of carbon, the content of carbine,
carbide and asphalt products increases by 1.2%. Oxidizing products accelerate the deterioration of the quality of
oils, which leads to an increase in the power consumption of the engine KShM and CPG by 15%. In addition,
analytical relationships were obtained representing the movement of a mixture of acetone and used motor oil in
viscosity states and the process of evaporation of the solvent from the oil during processing. The speed of motor
oil on a cone-shaped surface is substantiated based on its effect on refining, and the dependence of the quality of
refined oil on the temperature of the mixture and the availability of the evaporation process is justified.

Keyword : Technology, method, oils, environmental protection, regeneration, cleaning, problem, disposal,
membrane, filter, oil collection.
References:
1. Sh.Zh.Imomov. Engineering design calculation of a biogas unit recuperator. Applied Solar Energy, 2007, 43(3), pp. 196-197.
2. Sh.Zh.Imomov. Heat transfer process during phase back-and-forth motion with biomass pulse loading. Applied Solar Energy,
2009, 45(2), pp. 116-119.
3. Sh.Imomov Technological foundations of the recuperation of heat wastes in biogas installations. ?ashkent, 2011. 136 p.
4. K.A.Sharipov, N.A.Holikova. Optimization installation performance for nanofiltration technics. AGRO-ILM. Tashkent, 2009.
?3(10). pp.56.
5. P V.N.Rokopyev, R.I.Sinyanskaya, E.V. Mishchenko. The method of regeneration of used lubricating oil. Pat. 2076898 Russia,
MPK6S 10 M 175/02. 93026982/04.3.
6. A.E. Monastic. Regeneration, drying and degassing of transformer oil. St. Petersburg: PEIPK, 2002, 40 p.
7. A.IO.Evdokimov, A.Yu.Evdokimov, I.G.Fuchs, T.N.Shabalina, L.N.Bagdasarov. Lubricants and problems of chemotology.
Russia, 2000. 424 p.
8. M.V.Seleznev, A.A.Mainntsev. Dynamics of changes in the density of gear oils in the conditions of operation of KamAZ
automobiles. Theoretical and applied aspects of modern science. 2014, ?2-1. p.83-85.
9. L.R.Rudnik. Additives to lubricants. Properties and application: "Profession", 2013. 928 p
10. K.A.Sharipov, N.A.Halikova. Optimization Installation performance for nanofiltration technics. AGRO ILM. Tashkent, 2009,
?3(10), pp.56
11. N. Khalikova, O. Mukhiddinov. Membrane plants refined oil. Sustainable Agriculture ?1 (1) 2018 ???, 21-28 pages.
12. K.A.Sharipov, N.A.Halikova. Establishing patterns of flow of a viscous fluid on the lateral surface of the rotating cone. European
science review, ? 1-2 2018 ???, 260-262 pages.

Authors: Abdulov Damir Rustamovich, Abdurakhmanov Olim Kalandarovich

Paper Title: System of Forms and Methods of Tax Administration in Uzbekistan


Abstract: The article considers the main tendencies of tax administration development and reveals the
questions of assessment criteria of tax administration quality, use in scientific literature and in the practice of tax
authorities; the emphasis is made on the influence of factors of entrepreneurial activity on regional aspects of tax
administration; the possibility of using some indicators of tax administration quality are summed up; the
conclusion is made about the need to assess the quality of tax administration directly and indirectly Introduction
of tax administration in the Republic of Uzbekistan in the conditions of digital economy transition.

Keyword : tax administration, quality of tax administration, assessment criteria of tax administration, tax
collection.
545.
References: 3108-
1. Textbook for students studying at the specialty "Finance and credit", "Taxes and taxation" Tax administration
2. Final Report of the OECD (2015) "Addressing Tax Problems of the Digital Economy", event. 3110
3. Eurodad (2015) Fifty shades of tax evasion: the role of the EU in supporting an unfair global tax system, p.58.
4. Register, French Minister: Hit Netflix, Google, Apple, etc. With capacity tax, 11 February 2015 (http://www.theregister.co.uk
/2015/02/11/french_minister_hit_google_facebook_apple_netflix_et_al_with_bandwidth_tax).
5. The term was first introduced by IBM CEO Luis Gerstner at a briefing by the Advertising Department in 1996.
6. Bolyshev M. Digitalization of the economy. // BIT. 26.06.2017. [Electronic resource] URL:http://bit.samag.ru/uart/more/67.
7. Kurnikova, L.P. Digital factor of optimization of the system of the customs and tax administration of foreign economic activity
(in Russian) // State and municipal administration. Scientific notes by SKAGS. 2014. https://cyberleninka.
ru/journal/n/gosudarstvennoe-i-munitsipalnoe-upravlenie-uchenye-zapiski-skags.
8. Resolution of the President of Uzbekistan No. PP-3832 dated July 3, 2018 "On measures to develop the digital economy in the
Republic of Uzbekistan".
9. Oxfam, SwissLeaks Scandal one year on: political response to tax dodging is sluggish, says Oxfam, 5 February 2016
(https://www.oxfam.org /en/pressroom / reactions/swissleaks-scandal-one-year-political-response-taxdodging -sluggish -sluggish
-says-oxfam).

Authors: Xikmatov Fatkhulla

Paper Title: Is Democracy a Strategic Goal or a Means of Achieving It?


Abstract: The article focuses on the theoretical significance of the strategy doctrine on the formation and
analysis of the foreign policy of today's countries, its strategic thinking and analysis. On the basis of the same
theoretical approaches, the actions of strategic players in the region of Central Asia analyzed the actions of this
546. state on the basis of democracy in the Kyrgyz Republic and its principles, which in particular declared itself the
“island of democracy ” in the region. 3111-
3118
Keyword : strategy, strategic analysis, strategic thinking, foreign policy formation mechanism, democracy,
Central Asian region, Kyrgyz Republic, Eurasian Economic Union, political conflict, ethnic conflict, strategic
analysis of political conflict, geopolitical games.
Strategic thinking predetermines our capabilities in creating optimal strategy options
T.Oshannasiy
References:
1. Morris D. The New Prince: Machiavelli Updated for the Twenty-First Century. - M., 2003. -P. 40
2. Northrop Grumman's analysis center: thinking through issues // www.northgrum.com
3. Tsigankov P.A. Mezhdunarodnie otnoshenia. Uchebnoe posobie. - M.: Novaya shkola, 1996. P. 120
4. Mirovaya politika i mezhdunarodnie otnoshenia na poroge novogo tsyacheletiya. Edited by Lebedeva M.M. M.: P.56. (The series
"Nauchnie doklady", issuance ? 104.)
5. Tsigankov P. Mezhdunarodnie otnoshenia. Uchebnoe posobie. - M.: Novaya shkola, 1996. P.124
6. V.N.Spitsnadel. Teoriya i praktika prinyatiya optimalnyx resheniy. Sank-Petersburg. 2002, p.114
7. Spencer H. Sotsialnaya statistika / Per. s angl. - Kyev: Gama - Print, 2013. - P. 244
8. Miloslavsky G.V. Centralnaya Aziya v evraziyskoy perspektive. // Vostok / Eriens. 1996, ? 5 p.8.
9. Builder C. H. Keeping the strategic flame. - Joint Force Quaterly. - 1996-1997. - Winter
10. Messner E. Fenomen myatejovoyni // Nezavisimoe voennoe obozrenie. -2001. ?35.

Authors: Shakhnoza Madaeva, Khojiev Tunis

Paper Title: Socio-Philosophical Bases of Research of Modernization Processes in Uzbekistan


Abstract: Large-scale reforms and complex modernization carried out in the country after independence
are studied from the positions of various social sciences and humanities. However, the history of modernization
processes in our country has not been paid sufficient attention to the problem of chronological cycles. This
chapter examines the philosophical and historical foundations of the complex state of modernization in the
republic, and they are divided into specific chronological stages. At the same time, the comprehensive
development programs ("Uzbek Model" of Development, the Concept of Intensification of Democratic Reforms
and Formation of Civil Society in the Country, Strategy of Action for the Further Development of the Republic
of Uzbekistan) for the reform of the Republic of Uzbekistan are taken as a determinant. Accordingly, the
peculiarities of the stages of modernization in the Republic of Uzbekistan will be determined and the
transformation model of the republic will be opened.

Keyword : Uzbek Model, “Reformation and Bukhara", state ruled by law, Uzbekistan's latest history,
modernization, democratization, law policy, Strategy of Actions along Five Priority Directions of the
Development of the Republic of Uzbekistan in 2017-2021, national legislation, lawmaking.
References:
1. Juraev N. The concept of renewal: creation, evolution and practice. - Tashkent: Spirituality. 2002. P. 214
2. Zhakbarov M. Historical and philosophical foundations of the idea of a perfect human being. - Tashkent: Tafakkur. 2011. P. 256.
3. Kadyrov A. Traditional society and strategies for its modernization. - Tashkent: TSU. 2006.
547. 4. Azizkhodjaev A.A. Statehood and spirituality. -T .: "Sharq", 1997;
5. Nazarov K.N. Axiology. The philosophy of values. Tashkent. 2004; 3119-
6. Boboev H. About national statehood. Tashkent. 1999;
7. Jumaev R. The state and society: on the way to democratization. - Tashkent. East 1998;
3123
8. Musaev F.A. Philosophical and legal bases of building a democratic state. - Tashkent: Uzbekistan, 2007;
9. Otamurotov S.O., Spiritual and spiritual revival in Uzbekistan. - Tashkent: The New Generation, 2003;
10. Ergashev I. The philosophy of development. Tashkent: Academy, 2000;
11. Kyrgyzbaev M. Civil society: political parties, ideologies, cultures. Tashkent. East, 1998;
12. Abdullaeva M.N. Philosophical and methodological analysis of the process of modernization. Tashkent: Institute of Philosophy
and Law. 2010. - 169 p.
13. Omonov B. Models of political modernization and the experience of Uzbekistan. Monograph. Tashkent: Science and Technology.
2012. P-112.
14. Omonov B. Models of political modernization and the experience of Uzbekistan. Monograph. T: Science and Technology. 2012.
P-112.
15. Kokarev K. On the evolution of political reform in China / K. Kokarev // Problems of the Far East. - 2004. - No. 5. P. 91.
16. Balchindorzhieva O.B. Methodological features of the study of modernization // Bulletin of the East Siberian University of
Management and Technology. 2014, No. 1 (46). – P. 134.
17. Berger P. Facing upto Modernity - New York. - 1977 - P. 127- 128.
18. Berger P. Facing upto Modernity - New York. - 1977 - P. 128- 132.
19. Parsons T. System of modern societies. 1970. // Name of the resource: Digital Library on Philosophy. Access
mode:http://filosof.historic.ru/books/item/f00/s01/z0001064/st000.shtml
20. Berger P. Facing upto Modernity - New York. - 1977 - P. 128- 132.
21. Madaeva Sh.O. Features of formation of democratic thinking in the Uzbek mentality 09.00.11 - Social Philosophy Thesis for the
degree of Doctor of Philosophy. Tashkent. 2009. B-121.
22. Toyganbaeva Agina Erkinovna “Experience of modernization of the countries of Southeast Asia and its adaptation in the
conditions of modern Kazakhstan” The dissertation for the degree of Doctor of Philosophy (PhD). P-42.
23. The Authors Team. The modern history of Uzbekistan. T .: East NMK. 2000. B-440-441.
24. Authors' Team. The modern history of Uzbekistan. T .: East NMK. 2000. B-525-526.

Authors: Shakhnoza Madaeva, Khurshid Toshov

Paper Title: The Need for the Factor Hermeticism in the Renaissance Thinking
Abstract: It is well known that after the collapse of the Soviet Union, the interest in studying the culture
548. and philosophy of the Renaissance in the post-Soviet area grew even more. This article discusses the
controversial aspects of the study of the Renessas era and shows the need for a hermetic tradition in 3124-
understanding it. This is because humanistic ideas of the Renaissance display many elements of esoteric 3130
traditions. With the collapse of the ideological monopoly of the former Soviet Union, a pluralistic principle from
the paradigmatic point of view in various fields of science, particularly in the social and humanitarian field,
began to dominate. In particular, the study of the Renaissance focused on the influence of various esoteric
traditions. Our aim is to identify the causes of the same relationship by analyzing two overlapping views on the
tradition of hermeticism in the Renaissance. At the same time, special attention is paid to the peculiarities of
hermetic ideas as a paradigm.

Keyword : Hermeticism, Hermes, Poimander, God=Mind=Father=Light, Son=Word, Um=Demiurge, Ficino,


Asclepius, God-man, paganism, Tot, Christianity.
References:
1. Zelinsky F. F. Hermes Three times Greatest // Onzhe. From the life of ideas: In 4 vols. St. Petersburg., 1907. Moscow: Logos,
1995 6. T. 3. P.312 P. 88-152;
2. D. Strandden, “Hermetism, its Origin, and Basic Teachings,” (The Secret Philosophy of the Egyptians), 1914, edition by A. I.
Voronets, St. Petersburg, 85 pp.
3. Francis A. Yates Rosencrucian education. Translation by A. Cavtaskinapod. T. Baskakova. –Moscow: Aletheia, Enigma, 1999. P.
496-476.
4. Maye J.-P. On the philosophical meaning of the “Definitions” of Hermes Trismegist // Yearbook of the Armenian Branch of the
Philosophical Society of the USSR, 1985. - Yerevan, 1986. - P. 202-214 In the army. lang Res. In Russian
5. Fetugiere A.-J. Corpus Hermeticum. T. 1-4 - Paris, 1945-1954.
6. Scott Walter (and A. S. Ferguson). Hermetica. The Ancient Greec and Latin Writings, which Contain Religious and Philosoph ic
Teachings Ascribed to Hermes Trismegistus. 4 vols. - Oxford, 1924-1936.
7. Panin S. Discussions on the methodology of the study of esotericism in the works of European and North American authors in th e
journal Religious Studies, No. 1-2 (9-10), p. 60-73
8. Shaburov N.V. The Perception of Hermeticism by the Ideologists of Early Christianity (Lactantius and Augustine) The Meroe
Collection. Vol. 3. M., 1985. P. 243-252.
9. Kudryavtsev O.F. The "learned religion" of the Florentine Academy // Renaissance Culture and the religious life of the era.
Moscow: Nauka, 1997.P. 186.P. 88-96.
10. Erasmus Desiderius. Opus epistolarumDes.ErasmiRoterodami / Rec. per P.S. et H.M. Allen, Oxford, 1906, t. I, No. 118, p. 274.
11. Colet J. Enarratio in Epistulam Primam B. Pauli ad Corinthianos. A new edition of the latin text / Trans. and introd. By B.
O'Kelly and C. A. Jarrott, New York 2005, P-486. P-216.
12. Colet J. Opus de caelesti Dionysii Hierarchia. Opus de ecclesiae Dionysii Hierarchia / Ed. and trans. by J.H. Lupton, London,
1999, p. Xxv.
13. Seebohm F. The Oxford Reformers. Colet, Erasmus and T. More. LONGMANS, GREEN, AND CO. LONDON, NEW YORK,
AND BOMBAY. 1896. P-548. P-324.Lupton J.H. A. life of John Colet, D. D., dean of St. Paul's and founder of St. Paul's school.
With an appendix of some of his English writings. London: G. Bellandsons., 1909.P 352. Mason A.J. Lectures On Colet, Fisher,
And More At St. Paul's Cathedral, 1894 ....
London, NabuPress 2011.P 136.
14. Jaine S.R. John Colet and MarsilioFicino, London, Oxford University Press. 1963. P 212.P 63.
15. Yates F.A. Giordano Bruno and the Hermetic Tradition / Per.sang. G. Dashevsky, -M: New Literary Review, 2000. - 528 p. S-88.
Ilya Kasavin Hermeticism, magic, natural philosophy in European culture of the 13th-19th centuries, Moscow: Canon + ROOI
"Rehabilitation", 1999. - 864 p. C 253.
16. Walker D.P. Spiritual and Demonic Magic from Ficino to Campanella, The Pennsylvania State University Press, 2000. P-256. p.
1-24.Yates F.A. Giordano Bruno and the Hermetic Tradition / Per.sang. G. Dashevsky, -M: New Literary Review, 2000. - 528 p.,
P -24-78.
17. Pico J. Speech on the dignity of man. Per. with lat. L.M. Bragina // History of aesthetics. Monuments of world aesthetic thou ght,
Moscow: Academy of Arts of the USSR, 1962, v. 1, C 512., P. 507-509.
18. Bragina L.M. Socio-ethical views of the Italian humanists. The second half of the XV century. Moscow: Moscow State
University, 1983.- 303 p. 270.
19. Thorndike L. A History of Magic and Experimental Science, New York, Macmillan, 1923. P-892. p. 494.
20. Yates F.A. Giordano Bruno and the Hermetic Tradition / Transl. G. Dashevsky, -Moscow: New Literary Review, 2000. - 528 p.
C-101.
21. Thorndike L. A History of Magic and Experimental Science, New York, Macmillan, 1923. P- 892. p. 494.
22. Clutton G. Termaximus: A Humanist Jest // Journal of the Warburg Institute, II, 1938-1939, p. 266-268.
23. Parks G.R. Pico della Mirandola in Tudor translaition // Philosophy and Humanism. Renaissans Essays in honor of P. O.
Kristeller, Leiden, 1976, P. 352. P-199.
24. Colet J. Enarratio in Epistulam Primam B. Pauli ad Corinthianos. A new edition of the latin text / Trans. and introd. By B.
O'Kelly and C. A. Jarrott, New York 2005, P-486. P-216.
25. Pico J. Speech on the dignity of man. Per. with lat. L.M. Bragina // History of aesthetics. Monuments of world aesthetic thought,
Moscow: Academy of Arts of the USSR, 1962, v. 1, C 512. S-508-509.
26. Rebrik V.V. Hermeticism and Christianity: common ground // Measure, 1994, No. 2, p. 14.
27. Shaburov N.V. Perception of hermeticism by the ideologists of early Christianity (Lactantius and Augustine) // Meroe, vol. 3,
Moscow, 1985, P. 243-252.
28. Colet J. Enarratio in Epistulam Primam B. Pauli ad Corinthianos. A new edition of the latin text / Trans. and introd. By B.
O'Kelly and C. A. Jarrott, New York, 2005, P-486.p. 216-217.
29. Erasmus of Rotterdam. The weapons of a Christian warrior / Per. with lat. Yu.M. Kagan // Erasmus of Rotterdam. Philosophical
works. M.Nauka, 1987 .-- 702. P-101-102.
30. Jerome. (340-420 years). The messages. Lxx. To Magnus, the great orator of the city of Rome. 397 g. 1-6. Per. with lat. under the
editorship of I.P. Strelnikova. - Monuments of medieval Latin literature of the 4th – 9th centuries. Moscow, 1970, pp. 45–47.
31. Popkin R.H. The history of skepticism from Erasmus to Spinoza. London University of California Press. 1953.P-360.P-121.
32. Yates F.A. Giordano Bruno and the Hermetic Tradition / Transl. G. Dashevsky, -Moscow: New Literary Review, 2000. - 528 p.
S-150-158.
33. Yates F.A. Giordano Bruno and the Hermetic Tradition / Transl. G. Dashevsky, -Moscow: New Literary Review, 2000. - 528 p.
S-150-158.
34. Thorndike L. A History of Magic and Experimental Science, New York, Macmillan, 1923. P- 892. p. 127.
Umurzakov Akhmadjon, Azimov Ulugbek, Ergashev Ulugbek, Akhmedalieva Rano, Khoshimov
Authors:
Sanjarbek
Paper Title: Research of the Category of Belief
549.
Abstract: Today we are building a democratic, secular state based on the Constitution and laws, which is a
3131-
reflection of the will of our people. At the same time, we must not forget that secularism does not mean atheism.
3137
We know well from yesterday's history of how human life would be bad when religion and religious beliefs
were completely rejected. The danger of this ideology is that it rejects all these centuries-old values that have
become an integral part of people's lives - be it written or oral, material or spiritual heritage, ethics or traditions,
national outlook or way of life. As a result, human beings are deprived of their inner worlds, feelings and
opinions, with which they can rely. As the "Soviet bosses" say, it becomes a "screw" of a huge state machine. In
the end, such a person becomes so disgusted that he doesn't know his parents, his own nation, his people and his
homeland. [1]

Keyword : "belief", "itaqada", "trust,", "belief", "faith", as “knowledge based on beliefs”, “beliefs that
regulate behavior”, “political beliefs”, “people's beliefs”, “personal beliefs,” “beliefs.”.
References:
1. Karimov I.A. High spirituality is an invincible force. - Tashkent: Spirituality, 2010. -P. 93.
2. V. Soloviev. Dispute about justice. -Moscow-Kharkov: “EXMO-PRESS”, “FOLIO”, 1999. -P. 807-808.
3. G. Skirbekk, N. Gile. History of Philosophy. -Moscow: “GIC Vlados”, 2000.
4. G. Skirbekk, N. Gile. History of Philosophy. -Moscow: “GIC Vlados”, 2000.
5. Anselm von Canterbury. Cur deus homo? Munchen, 1937.
6. Abelard P. The story of my disasters. -Moscow: 1959.
7. Kant I. Treatises and letters. -Moscow: 1980.
8. F. Schelling. Op. T. 1. -Moscow: Thought, 1987.
9. V.S. Soloviev. Dispute about justice. -Moscow - Kharkov: “EXMO-PRESS”, “FOLIO”, 1999.
10. Kimelev Yu.A. Modern Western philosophy of religion. -Moscow: 1989.
11. Fundamentals of religious studies. Edited by I.N. Yablokov. -Moscow: High School, 1998.
12. Abu Nasr Farabi The City of Virtuous People. - Tashkent: Heritage, 1993.
13. Beruni, Abu Rayhan. Monuments from ancient peoples // Beruni A.R. Selected works, Volume I, - Tashkent: 1968.
14. N. Siraisi. Avicenna in Renaissance Italy: The Canon and Medical Teaching in Italian Universities after 1500. -Prisenton, 1987.
15. Ibn Arabi. Gems of wisdom (chapters). Translation A.V. Smirnova. V.Kn. M. Stepanyants. Philosophical aspects of Sufism. –
Moscow: “Science”, 1987.
16. G.F.Hourani. Averroes on the Harmony of Religion and Philosophy. London, 1961.
17. Ghazali, Muhammad Abu Hamid. Ihyo-ul-ulum / Translation by A. Mansur from Arabic // Kamalak. Literary and Critical Annual
Collection. - Tashkent: Young Guard, 1990.
18. Muhammad ibn AbdulKareem ibn Ahmad Al-Shahrastani. Al-Milal va-Nihal. —Egypt: 1977.
19. Alikulov Ҳ.A. Ethical views of philosophers of Central Asia and Khorasan (XIV-XV centuries). –T.: Fan, 1992.
20. Mansurov A. Aqoid texts. - Tashkent: Publishing and Publishing Association "Tashkent Islamic University", 2006.
21. Sheikh Muhammad Sodiq Muhammad Yusuf. Sunni doctrines. - Tashkent: "Sharq", 2008.
22. Nizomiddinov N.G. Ancient history, religious beliefs, culture of the peoples of South, Southeast and East Asia. (Chrestomatia). -
Tashkent: 2010.
23. Abdusamedov A.E. Philosophy of Religions. - Tashkent: 2010.
24. Munavvarov Z. Secular state and religion. - Tashkent: 2003.
25. Shakhnoza Kakhharova. Global spirituality is the ideological basis of globalization. - Tashkent: Tafakkur, 2009.
26. Ahmedova M. Fundamentals of Philosophy - Tashkent: Uzbekistan, 2006.
27. Erkaev A. Spirituality and development. - Tashkent: “Spirituality”, 2009.
28. Karimov Ibrohim. Faith as a spiritual state. -Toshkent: “Fan”, 1991.
29. Khairullaev M.M. Renaissance and Eastern philosophers. - Tashkent: "Fan", 1971.
30. Yovkochev Sh. et al. History of religions of Central Asia. —Tashkent: Oriental Studies, 2006.
31. Choriev Anvar. From knowledge to idea, from idea to belief. // J. Communication. - Tashkent: 2002.
32. Achildiev A. National Ideas and Interethnic Relations. —Tashkent: Uzbekistan, 2004.
33. The World of Thought: Aphorisms and Wise Words of Our Motherland and Foreign Authors / Vorontsov Composition; Sh
Translate Abdurazzoqova. —Tashkent: Literature and Art Publishing House, 1981. —p. 126–128.
34. "Middle Ages" - medium aevum - the name is retrospectively given by those who have viewed the time period between the
Ancient ("ancient") and the Renaissance ("revival" of antique culture) as the Age of Ignorance. // Gunnar Skirbekk. Nils Gile.
History of Philosophy: A Handbook for Higher Education Institutions / Translation. A. Deletroz, Z. Tursunova and V. Kuznetsov .
-Tashkent: East, 2002. -P. 169.
35. Tertullian. Selected Works. -Moscow: 1994; History of Philosophy. -Moscow: “GIC Vlados”, 2000, p. 178.
36. Fundamentals of Philosophy. Text of lectures. - Tashkent: Publishing and Publishing Association "Tashkent Islamic University",
2005. pp. 89-91.
37. History of philosophy. –Moscow: 1941. Volume-1, pp. 427-429.
38. Abelard P. The story of my disasters. –Moscow: 1959. –P. 96-103.
39. History of philosophy. –Moscow: 1941. Volume – 1, p. 472.
40. The encyclopedic dictionary of philosophy. - Tashkent: "Sharq", 2004. -P. 309.
41. Philosophy: Textbook for universities / Ed. prof. V.N. Lavrinenko, prof. V.P. Ratnikova. –Moscow: UNITY, 2000, p. 286.

Authors: Holmahmatov Azim, Toshov Khurshid, Khojiev Tunis


Steps of the Development and Formation of Regulatory and Legal Framework for State Youth
Paper Title:
Policy in Uzbekistan
Abstract: The article analyzes the problem of rounding the processes of formation of the state youth policy
in Uzbekistan as a theoretical source of the legislative and legislative acts of the Republic of Uzbekistan in this
field. This is due to the fact that these normative documents define the content of a number of concepts that
serve as a category system for research in the field. It also reveals that the period of formation of the state youth
550. policy in Uzbekistan is considered as a determinant of the date of adoption of the Law and other legislative acts.
3138-
Keyword : Youth Policy, Youth Social Movement of Kamolot, Law Educators, Thinking Tests, Youth 3143
Union, Fund for Development, determinand, State Youth Policy Act.
References:
1. Slutsky, E.G. How does politics matter? / E.G. Slutskiy // Molodej: digits, facts, mneniya. -SPb., 2006.-No.1-S. 18-19.
2. Shiryaev EB Novoe v ideyno-politicheskom vospitanii molodeji. Комсомол и развитие молодежного движения in the USSR:
sushchnost, problematic and modern tendency / EBShiryaev, А.V. Aleynikov. - L., 2000. - p. 54.
3. Alimardoniov T. “The Generation of Freedom” http://www.biznes-daily.uz
4. Karimov I.A. Further deepening of democratic reforms and development of civil society is the main principle of the country's
development. - T. 19. - Tashkent: Uzbekistan, 2011. - 292 b; Uzbekistan is on the threshold of gaining independence. - Tashkent:
Uzbekistan, 2011. - 383 b.
5. Mirziyoev Sh.M. Together we will build a free and prosperous, democratic Uzbekistan. - Tashkent: Uzbekistan, 2016; The rule of
law and the protection of
human interests are the key to the country's development and prosperity. - Tashkent: Uzbekistan, 2017; Critical analysis, strict
discipline and personal accountability should be the daily routine of each leader's activities. –Tashkent: Uzbekistan, 2017; We
build our great future with our brave and noble people. - Tashkent: Uzbekistan, 2017.
6. Law of the Republic of Uzbekistan No. 429-XII "On the basis of the state youth policy in the Republic of Uzbekistan"
http://www.lex.uz/search/all?form_id=3968&fyear=1991
7. Article 1 of the Law No. 429-XII “On the basis of the state youth policy in the Republic of Uzbekistan”
http://www.lex.uz/acts/140894
8. Karimov I.A. High spirituality is an invincible force. –T .: Spirituality. 2008.P - 119.
9. Karimov I.A. It is our highest goal to ensure gradual and sustainable development of our country. - T .: NUU “Uzbekistan”, 2009.
T.17. - B.131.
10. Article 7 of the Law of the Republic of Uzbekistan “On the Principles of Youth Policy in the Republic of Uzbekistan”
http://www.lex.uz/acts/140894
11. Karimov I.A. "Uzbekistan seeks for 21st century." - Tashkent: Uzbekistan, 1999, p.23
12. Tangriev K. Candidate's dissertation on "Youth policy subject: employment problem". Auto-abstract. Tashkent: 2001.
13. www.parliament.gov.uz
14. Juraev N. The concept of renewal: creation, evolution and practice. - T .: Spirituality, 2002. - P. 43.
15. Karimov I.A. Box 20, Our Way - The Way to Deepen and Enhance Democratization Reforms. T:, “Uzbekistan” 2012, page 140.
16. Stormova D. “Youth Policy in Uzbekistan: Basic Principles and Their Meaning” - T .: Gafur Gulom, 2008. p. - 82
17. “Kamolot” Youth Fund of Uzbekistan. Decree of the President of the Republic of Uzbekistan // Public speech. April 18, 1996.
18. “Kamolot” Youth Social Movement of the Republic of Uzbekistan. Collection of documents related to the decision of the
Cabinet of Ministers of the Republic of Uzbekistan from May 30, 2001 № 240. –T .: 2001.
19. Resolution of the President of the Republic of Uzbekistan No. PP-486 dated October 10, 2006 "On support and further increase of
efficiency of the Kamolot Youth Social Movement" // Public speech, October 10, 2006.
20. Regulatory and legal documents on the activities of the Youth Union of Uzbekistan (Part I). - T: “Uzbekistan” NMIU, 2017.P -
32.
21. Regulatory documents on the activities of the Youth Union of Uzbekistan (Part I). - T: “Uzbekistan” NMIU, 2017.P - 32.
22. Regulatory documents on the activities of the Youth Union of Uzbekistan (Part I). - T: “Uzbekistan” NMIU, 2017.P - 59.
23. Comment on the Decree of the President of the Republic of Uzbekistan “On Enhancement of Effectiveness of the State Youth
Policy and Support of the Youth Union of Uzbekistan” http://lex.uz/docs/3255680
24. Regulatory and legal documents on the activities of the Youth Union of Uzbekistan (Part I). - T: “Uzbekistan” NMIU, 2017.P -
58.
25. Decree of the President of the Republic of Uzbekistan dated February 7, 2017 “On the strategy of further development of the
Republic of Uzbekistan” // Public speech, February 8, 2017.
Djuraev Abdukakhar, Djuraev Jamolbek, Akhmadaliev Nusrat, Botirov Abdurasul, Shoumarov
Authors:
Azizkhon
Some Features of Clinical Laboratory and Instrumental Research in Chronic Inflammatory Diseases
Paper Title:
of the Nose and Paranasal Sinuses in Patients with Myocarditis
Abstract: The issues of diagnosis and adequate treatment of rhinosinusitis (RS) remain very relevant
today, since this disease is one of the most widespread in the whole world. So, up to 15% of the adult population
suffers from various forms of RS; in children this disease is even more common. Otorhinolaryngologists and
primary care physicians face RS in their practice on a daily basis. It should be noted that in most European
countries and in America, it is the general practitioner who plays the main role in the treatment of uncomplicated
forms of the disease. It is important to note that both acute and chronic RS lead to a significant decrease in the
quality of life index, comparable with data on cardiological diseases and obstructive pulmonary disease.

Keyword :PNS – paranasal sinuses, ENT – ear, nose and throat, CT – computed tomography, KFK – creatine
kinaseLDH – lactate deh, ydrogenase , CIC – circulating immunocomplex.
References:
1. Bachert C., Tomassen P. Endotype-Driven Approach for Chronic Rhinosinusitis //Implementing Precision Medicine in Best
Practices of Chronic Airway Diseases. - Academic Press, 2019. - ?. 51-57. https://doi.org/10.1016/B978-0-12-813471-9.00013-X
2. Bengtsson C. et al. Incident Chronic Rhinosinusitis Is Associated With Impaired Sleep Quality: Results of the RHINE Study
551. //Journal of Clinical Sleep Medicine. - 2019. - ?. 15. - ?. 06. - ?. 899-905. http://dx.doi.org/10.5664/jcsm.7846
3. Bergmark R.W., Pynnonen M. Diagnosis and First-Line Treatment of Chronic Sinusitis. JAMA. 2017 Dec 19;318(23):2344- 3144-
2345. https://doi:10.1001/jama.2017.18196
4. Buggey J., ElAmm C.A. Myocarditis and cardiomyopathy. Curr Opin Cardiol. 2018 May;33(3):341-346.
3151
https://doi.org/10.1097/HCO.0000000000000514
5. Calus L. et al. Twelve-year follow-up study after endoscopic sinus surgery in patients with chronic rhinosinusitis with nasal
polyposis //Clinical and Translational Allergy. - 2019. - ?. 9. - ?. 1. - ?. 30. https://doi.org/10.1186/s13601-019-0269-4
6. Carter A., Dattani N., Hannan S. A. Chronic rhinosinusitis //BMJ. - 2019. - ?. 364. - ?. l131. https://doi.org/10.1136/bmj.l131
7. Cattano D., Citardi M. J. Chronic rhinosinusitis with nasal polyps //Journal of Head and Neck Anesthesia. - 2019. - ?. 3. - ?. 3. - ?.
e20. https://doi:10.1097/HN9.0000000000000020
8. Chandy Z., Ference E., Lee J. T. Clinical Guidelines on Chronic Rhinosinusitis in Children //Current allergy and asthma reports. -
2019. - ?. 19. - ?. 2. - ?. 14. https://doi.org/10.1007/s11882-019-0845-7
9. Deosthale N.V., Khadakkar S.P., Harkare V.V., Dhoke P.R., Dhote K.S., Soni A.J., Katke A.B. Diagnostic Accuracy of Nasal
Endoscopy as Compared to Computed Tomography in Chronic Rhinosinusitis. Indian J Otolaryngol Head Neck Surg. 2017
Dec;69(4):494-499. https://doi.org/10.1007/s12070-017-1232-0
10. Drago L., Pignataro L., Torretta S. Microbiological aspects of acute and chronic pediatric rhinosinusitis //Journal of clinic al
medicine. - 2019. - ?. 8. - ?. 2. - ?. 149. https://doi.org/10.3390/jcm8020149
11. Ghogomu N., Kern R. Chronic rhinosinusitis: the rationale for current treatments. Expert Rev Clin Immunol. 2017
Mar;13(3):259-270. https://doi.org/10.1080/1744666X.2016.1220833
12. Grayson J. W., Harvey R. J. Topical corticosteroid irrigations in chronic rhinosinusitis //International forum of allergy &
rhinology. - 2019. - ?. 9. - ?. S1. - ?. S9-S15. https://doi.org/10.1002/alr.22331
13. Ho J. et al. Atopy in chronic rhinosinusitis: impact on quality of life outcomes //International forum of allergy & rhinology. -
2019. - ?. 9. - ?. 5. - ?. 501-507. https://doi.org/10.1002/alr.22272
14. Hong P., Pereyra C.A., Guo U., Breslin A., Melville L. Evaluating Complications of Chronic Sinusitis. Case Rep Emerg Med.
2017; 8743828. https://doi.org/10.1155/2017/8743828
15. Hopkins C. Chronic rhinosinusitis with nasal polyps //New England Journal of Medicine. - 2019. - ?. 381. - ?. 1. - ?. 55-63.
https://doi/full/10.1056/NEJMcp1800215
16. Kristjansson R. P. et al. A loss-of-function variant in ALOX15 protects against nasal polyps and chronic rhinosinusitis //Nature
genetics. - 2019. - ?. 51. - ?. 2. - ?. 267. https://doi.org/10.1038/s41588-018-0314-6
17. Marcus S. et al. The relationship between allergy and chronic rhinosinusitis //Laryngoscope Investigative Otolaryngology. - 2019.
- ?. 4. - ?. 1. - ?. 13-17. https://doi.org/10.1002/lio2.236
18. Mertz L. E., Divekar R., Rank M. A. Managing Frontal Sinusitis from Systemic Inflammatory Disease //Frontal Sinus Surgery. -
Springer, Cham, 2019. - ?. 273-310. https://doi.org/10.1007/978-3-319-97022-6_19
19. Pandrangi V., Reiter E. R. Impact of Sinus Surgery on Hospital Utilization for Complications of Sinusitis //Ear, Nose & Throa t
Journal. - 2019. - ?. 0145561319853786. https://doi.org/10.1177%2F0145561319853786
20. Raheja A. Endoscopic sinus surgery in sinusitis-induced intracranial abscess: concepts and controversies //Neurosurgical focus. -
2019. - ?. 47. - ?. 2. - ?. E13. https://doi.org/10.3171/2019.5.FOCUS19374
21. Rom D. et al. The Association Between Disease Severity and Microbiome in Chronic Rhinosinusitis //The Laryngoscope. - 2019.
- ?. 129. - ?. 6. - ?. 1265-1273. https://doi.org/10.1002/lary.27726
22. Seo M. Y. et al. Clinical pattern of fungal balls in the paranasal sinuses: our experience with 70 patients //European Archives of
Oto-Rhino-Laryngology. - 2019. - ?. 276. - ?. 4. - ?. 1035-1038. https://doi.org/10.1007/s00405-018-5258-z
23. Wu J., Jain R., Douglas R. Effect of paranasal anatomical variants on outcomes in patients with limited and diffuse chronic
rhinosinusitis. Auris Nasus Larynx. 2017 Aug;44(4):417-421. https://doi.org/10.1016/j.anl.2016.08.009
24. Yang S. F., Patel C. R., Stankiewicz J. A. Complications of Frontal Sinusitis //Frontal Sinus Surgery. - Springer, Cham, 2019. - ?.
329-338. https://doi.org/10.1007/978-3-319-97022-6_22
25. Zhang L., Zhang L.H. Comparison of different endoscopic scoring systems in patients with chronic rhinosinusitis: reliability,
validity, responsiveness and correlation. Rhinology. 2017 Dec 1;55(4):363-368. https://doi.org/10.4193/Rhin17.109.

Authors: Guzal A. Bekmurodova

Paper Title: Effective Use of Digital Marketing Technologies in Commercial Banks


Abstract: This article describes how commercial banks use digital marketing technology.
The purpose of the research is to study effective methods of digital marketing technologies in commercial
banks of Uzbekistan.
However, the following problems in the provision of remote banking services by commercial banks in our
country affect the quality of commercial banks' services:
-non-delivery of banking services to consumers of bank services with effective use of marketing technologies;
-Actual segmentation of the client base by static and dynamic attributes;
- Increase in sales due to the preparation of personal offers and marketing campaigns in various
552. communication channels;
- Increasing control over sales performance due to relevant marketing analytics. 3152-
3155
Keyword : commercial banking, remote banking, digital marketing technology, I-banking, I-mobile.
References:
1. Gayurov G.Kh. (2017) Perfection and development of banking services in the conditions of the Republic of Tajikistan / Gayurov
G.Kh. // Bulletin of TNU. - 2017. No. 2/2 - S. 148-152.
2. Titarenko G.A. (2005) Computerization of banking operations: a training manual / G.A. Titarenko. - M .: High school textbook,
2005 .-- 140 p. /
3. Usoskin V.M. (2009). "Everything is for you". - M.: Publishing. 2009 .-- 340 s
4. Rudakova O.S.(2010). Banking electronic services. Moscow 2010
5. Digital transformation: how can the banks of Uzbekistan switch to digital banking. https://kommersant.uz/digital-transformation/
6. Statistical Bulletin of the Central Bank of the Republic of Uzbekistan // 2018 http://cbu.uz/upload/statistics/dks
7. National database of legislation of the Republic of Uzbekistan. http://lex.uz/.

Authors: Babadjanov Atabek


Improving Political Party Participation in the Activities of Representative Bodies of Local
Paper Title:
Government Organizational and Legal Issues
Abstract: In the context of democratic reforms in all spheres of public life in the world, the issue of
expanding the participation of political parties in local representative bodies is becoming increasingly important.
In particular, more than a dozen universal and regional international legal documents state that increasing the
role of political parties in local authorities, including representative power, is one of the most important and
prerequisites for democratic and legal development at national, regional and international levels. The provisions
of the Universal Declaration of Human Rights, the International Covenant on Civil and Political Rights and
other international legal instruments concerning the accession of citizens to political parties and the exercise of
553. their will at the level of power determine the urgency of improving legislation in this area.
Scientific researches are being carried out to improve the efficiency of local representative bodies in the world, 3156-
to introduce new democratic forms of political parties' participation in them. In this regard, the strengthening of 3159
political parties' influence in local representative bodies, the widespread use of parliamentary oversight in the
implementation of state and regional programs and further improvement of legislation in this area are of great
scientific and practical significance in the socio-economic development of the regions.

Keyword : Legal democratic state, civil society, Political party, party concept, multiparty system, Communist
party.
References:
1. Constitutional Law of the Republic of Uzbekistan. Authors' Team. - T .: Finance, 2002 -p.643
2. Civil Society Fundamentals / A. Jalilov, U.Muhammadiev, K.Juraev and others. - Tashkent, Baktria Press, 2015 -p.199.
3. https://www.cia.gov/library/publications/the-world-factbook. US National Database.
4. Kyrgyzbaev M Civil society: Political parties, ideologies, cultures. - Tashkent: East, 1998. - p. 90.
5. Program of the Democratic Party of Uzbekistan National Revival. - Tashkent. 2008.
6. Charter and Program of the National Democratic Party of Uzbekistan. - Tashkent: Gafur Gulom, 2004. - B. 32-33.
7. Charter "Movement of Entrepreneurs and Businessmen - Liberal Democratic Party of Uzbekistan" - Tashkent, 2006. - p.4-5.
8. National Database Database, No. 06/19/5635/2502 dated 18.01.2019.
9. Bekov I.R. Legislative Chamber of Oliy Majlis of the Republic of Uzbekistan and political parties: Monograph. - T .: Publishing
house TSIU, 2010. - p. 6.
10. Mahmudov AA Improving the oversight activities of local representative bodies in the Republic of Uzbekistan: Jurid. science. ...
fal. doc. diss. autoref. - Tashkent: 2019 - p. 16.
11. Yuldashev A. Some theoretical and legal issues of strengthening deputy control in Uzbekistan // Society and Management, 2014.
- ?2. -p. 48.
12. Rajabova M. Constitution of the Republic of Uzbekistan - the legal basis of building a civil society // Materials of the round table
on the theme: "The Constitution of the Republic of Uzbekistan - the basis of legal reform". - T., 2007. -p.9.
Mazlitdinova Dilnoza, Suyunova Maftuna, Khaydarova Guzalkhon, Saibnazarova Makhliyo,
Authors:
Kodirova Maftuna
Paper Title: Modular Training System as a Factor of Improving Educational Process
Abstract: At present, a new concept of industrial production is being implemented in Uzbekistan. The
continuous process of updating equipment and technology places high demands on the training of specialists in
the field of preparing future foreign language teachers. In modern scientific, technical and socio-economic
conditions, the main requirement for professional training of a specialist is the guarantee of the formation of a
clearly defined level of professional competence. This inevitably entails a change in traditional educational
technologies, in which it is impossible to assess the potential learning outcome. As a fundamental one, we accept
the provision that the main, achievable goal of the functioning of the professional education system is to build
the competence of a specialist, which also includes the development of professional qualities of his personality.
Thus, the formulated goal of vocational training, in our opinion, is more consistent with the real requirements
and conditions of production. The universally noted goal-setting as an orientation to the training of highly
qualified specialists who are fluent in their chosen profession remains at the level of declarations, without
changing the real situation in practice.
The article on modular training analyzes the integration of the principles of modularity, self-organization and
context that can guarantee the formation of a certain level of professional competence of future specialists,
which determines the relevance of the chosen scientific direction of research.

Keyword : The module; the principle of activity; the principle of listening and equality; the principle of
problem; the principle of cognitive visualization; the principle of reliance; the principle of motivation; the
principle of modularity; technology; modular training; module training program.
References:
554. 1. Bespalko A.P. Programmed Learning: Didactic Fundamentals. M., 1970, p. 300.
2. Gareev V.M., Kulikov S.I., Durko E.M. Principles of modular education // Bulletin of higher education. 1987. No. 8. P. 9 17.
3. General course of higher mathematics for economists: a textbook / Ed. IN AND. Ermakova. M., 2007. P.656 3160-
4. Kupisevich Ch. Fundamentals of general didactics // Transl. from Polish, M., 1986. p. 367 3166
5. Landshaer V. The concept of "minimum competence" // Prospects: educational issues. 1988, No. 1. - P. 27 - 34.
6. Lapchinskaya V.P. Secondary school of modern England, M., 1977-216 p.
7. Lavrentiev G.V., Lavrentiev N.B. Components of modular learning technology Barnaul Publishing House of Altai University,
1994. p. 128.
8. Lavrentieva N.B. On the introduction of modular education in the university pedagogical system // Abstracts of reports of the
interuniversity conference "Modern problems of activating creative abilities in the process of training engineers." Barnaul, 1993 .-
- P. 34 - 42.
9. Lavrentieva NB From the experience of introducing a modular training system at the faculty of engineering // Bulletin of the
UNMO of Russian universities in engineering and pedagogical education. Yekaterinburg, 1993.P. 34-48.
10. Lavrentieva NB The pedagogical foundations of the development of modular training technology. Barnaul, Alt.GTU Publishing
House, AltAEP, 1998 .-- 252 p.
11. Mamrak A.V. Programmed teaching in the Russian language classes in the context of the restructuring of higher education //
Republican Interdepartmental Scientific Collection. Programmed training. Issue No. 27.1. Kiev, 1990. P. 7.-12.
12. Martsinkovsky I.B. University education in capitalist countries. Tashkent, 1981. 190 p.
13. Mikhailova I.G. Mathematical training of an engineer in a professional orientation of intersubject communications: Diss. . Ph.D.
Tobolsk, 1998. P.221
14. Moroz O.V. Professionally oriented design of didactic support of a mathematics course for the specialty "Regional Studies": D iss.
. Ph.D. Krasnodar, 2007. P.235
15. Nemov P.C. Practical Psychology: Knowing Yourself: Influencing People: A Manual for Students. M., 2001. P.320
16. Nikandrov N.D. Modern higher school of the capitalist countries. The main issues of didactics M., 1978. 279 p.
17. Pedagogy. Study Guide for Stud. ped universities and ped. colleges / Ed. P.I. Fagot. M., 2004. P. 608
18. Pidkasisty P.I. Independent cognitive activity of schoolchildren in learning. M., 1980.240s.
19. Prigogine I. Nature, science and new rationality. M., 1983 p. 243.
20. Theory and practice of pedagogical experiment / Ed. A.I. Piskuno-va, G.V. Vorobyov. M .: Pedagogy, 1979.- 208 p.
21. Vazina K.Ya. Human self-development and modular support. N. Novgorod, 1991. -174 p.
22. Woolridge D. Mechanisms of the brain. M .: Mir, 1965. P.148.
23. Yub. Sennovsky I.B. Modular pedagogical technology at school: analysis of the conditions and results of development, M., 1995 .
P.123.

Authors: Kadirova Halima Buvabaevna, Akhmedova Feruza Medetovna


555. Sociological Analysis of the Nation's Identity, the Levels of Feeling the National Identity in
Paper Title:
Uzbekistan
Abstract: This article deals with issues related to sociological analysis of the distinctive lifestyle, customs
and traditions of the Uzbek and Karakalpak peoples in Uzbekistan. Determining the attitude of the respondents
to the history, culture, spiritual heritage of the people, as well as the spirituality of the nation is presented by the
results of research on its history, customs, traditions and life values.

Keyword : lifestyle, customs, culture, spirituality, identity, traditions, values, self-consciousness, historical
memory, mentality, historical monuments, spiritual heritage, historical monuments, national consciousness,
thought.
References: 3167-
1. From national revival to national development "Youth Publishing House". Tashkent -2019. [1.p, 144], [5.B, 146], [1.p, 144], [5.p, 3171
146]
2. Kurbanov T.H. The role of cultural heritage in the formation of national pride in young people. Philosophy Science. Candidate
diss. NUU. Tashkent. 2005. p.139
3. Madaeva Sh. Anthropology of Identity. - Tashkent,
Publishing House, 2015. p.154
4. Tulenov J. The philosophy of values. -Tashkent. Uzbekistan, 1998. [4.p, 61], [11.p, 235].
5. Idirov U., Tashkhodjaev S. Deepening internationalization globalization.-T: Journal of Society and Governance, 2007, No.2
6. Otamuratov S. Globalization and the nation. Tashkent., "New Generation Generation", 2008., p-137
7. Mirziyoev Sh.M. We will continue with determination and take to a new level. - Tashkent.: Uzbekistan, No. 1, 2017. [8.p, 298],
[12.p, 94], [13.p, 124].
8. Ubaidullaeva R., Ota-Mirzaev. Uzbekistan in the mirror of public opinion. Tashkent: Iqtisod-Moliya, 2016.-P.98
9. Karimov I.A. High spirituality is an invincible force. Spirituality, Tashkent: -2010. p.-90.

Authors: Kurbanov Daniyar Rozumbayevich

Paper Title: Problems and solutions of water sector in Uzbekistan


Abstract: This article presents the main challenges of using water resources in Uzbekistan. Including:
- The problem of secondary use of water resources;
- The problem of developing an economic and financial mechanism for water use;
- The problem of rising prices for water use and water rent.
In order to solve the above problems the following are proposed:
- Create a legal and organizational-economic infrastructure adequate to the modern economic system of
Uzbekistan;
- To carry out measures to rationalize water use in industry, agriculture and utilities, to reduce pollution of
water bodies, to reduce damage from floods and other harmful effects of water.
- Carry out promising activities that ensure effective integrated use of water resources and their reproduction.
556.
Keyword : improving water use efficiency, water rent, water tax, is the rationalization of water use, water 3172-
resources. 3175
References:
1. The experience of Uzbekistan in the rational use of water resources was highly appreciated at the Astana Conference
http://xs.uz/uzkr/post/suv-resurslaridan-oqilona-fojdalanish-bojicha-ozbekiston-tazhribasi-ostona-konferentsiyasida-yuqori-
baholandi
2. Bespalov, N.F. (1992). etc. Reclamation and irrigation of crops of cotton crop rotation (hydro-modular zoning and irrigation
regimes of agricultural crops in the regions of the Republic of Uzbekistan) Uzbek Academy of Agricultural Sciences. Tashkent-
1992.
3. Bocharin, A.V., Gaipnazarov N.A., Laktaev N.T., Yakubov H.E. (2000) Handbook of hydraulic engineering of shirkats and
Water Users Associations. Kituvchi, Tashkent -2000
4. WATER - A Vital Resource for Uzbekistan.
http://wash.earthforever.org/lib/uz/water_critical%20resource_Uzbekistan_en_ru_uz/Uzbek/Water_uz_part_02[1].pdf
5. THE LAW OF THE REPUBLIC OF UZBEKISTAN ON WATER AND WATER USE. No. 837-XII 05/06/1993.
http://lex.uz/docs/93202
6. Danilov - Danilyan, V.I. Rationale for water management strategies. - M.: Scientific World, 2006 - 336 p.

Authors: Kurbanov Daniyar Rozumbayevich

Paper Title: Foreign Experience of Financial Mechanism in Water Use


Abstract: This article presents Israel's experience of effective use of water resources. During the research,
the following was investigated:
- Israeli government policies aimed at the rational use of water resources;
- the essence of Israeli policy on the rational use of water resources in agriculture;
557. - Use Israel's strategy to grow its water use and price;
- Long-term forecasting system for water use. 3176-
The study concluded that: 3179
Prudent water management, reuse of wastewater and desalination of sea water, as well as the construction of the
All-Israel Water Pipeline, a consistent economic policy in the water sector against the background of effective
integrated management of limited water resources, aimed at combating their scarcity, allowed to solve the
problem of water shortage on a national scale and take the country out of the water crisis, reduce climate
dependence and preserve the Lake of Kineret
Keyword : Israel, water resources, rational use of water resources, Israeli water model, water resources.
References:
1. Goldreich, Y. (2003). The climate of Israel observation, research and application. New York: Springer Science and Business;
2003. 264.
2. Oziransky, Y., Kalmakova A., G., Margolina, I. L. (2014)Integrated Management of limited Water Resources for sustainable
water supply of arid regions. (Experience of Israel). Arid Ecosystems. 2014; 20(4):57-65
3. Becker, Nir (1995). Value of moving from central planning to a market system: lessons from the Israeli water sector//
Agricultural Economics//Volume 12, Issue 1, April 1995, Pages 11-21
4. Yaron, Dan. (1979). Economics of irrigation and the institutional and pricing systems of water in Israel// Agricultural Water
Management Volume 2, Issue 3, November 1979, Pages 203-216
5. Tsur, Y. (2014). Closing the (widening) gap between natural water resourses and water needs in the Jordan River Basin: A long
term percpective. Departament of Agricultural Economics and Management, The Hebrew University of Jerusalem, Discussion
Paper. 2014;2(14): 28.
6. Weinberger, G., Livshitz Y., Givati A., Zilberbrand M., Tal A., Weiss M., and Zurieli A. (2012). The natural water resources
between the Mediterrarean Sea and the Jordan River. Israel Hydrological Servise, Israel’s Authority for Water Sewage. 2012;1:
71.
7. Stanhill, G. (1992). Irrigation in Israel: past achievements, present challenges and future possibilities. In: Shalhevet J. et. Aii.
(Eds.). Water Use Efficiency in Agriculture. Rehovot: Priel Publisher; 1992. P. 63–77.)
8. Central Bureau of Statistics. (2016) . Israel in Fugures. Available from: http://www.cbs.gov.il/www/publications/isr_in_n16e.pdf
9. Tal, A., Katz, D. (2012). Rehabilitating Israel;s streams and rivers. Int. Jour. River Basin Management. 2012;10(4): 317–330.
10. Long-Term Master Plan for the National.(2012). Water Sector, Part A — Policy Document. Israel Water Authority: 2012;4:102.
11. Orlovsky, N.S., Zonn, I.S. (2018). Water Resources of Israel: Trackrecord of the Development. Post-Soviet Issues. 2018;5(1):8-
36. (In Russ.) https://doi.org/10.24975/2313-8920-2018-5-1-8-36.

Authors: Usmonov Bahriddin

Paper Title: Ferghana in the Period of Amir Timur's Struggle for Power (1360-1370)
Abstract: The article analyzes the political processes that occurred in the Ferghana Valley during the years
of the struggle for the power of Amir Temur. During the analysis, by comparative and critical study of the
information available in historical sources, the role and importance of the Ferghana Valley in the political life of
Maverannakhr were highlighted. As for the studied period of the history of the Ferghana Valley, sources only
contain information on Khojend, the analysis was carried out using the example of this property. Attention is
drawn to the fact that the neighborhood with the nomadic state Mogolistan had a great influence on the political
reality of the Ferghana Valley. Also, on the basis of a critical review of the historical and political events
described in the sources, the author provides new conclusions.

Keyword : Maverannakhr, Mogolistan, Ferghana, Khojend, Amir Temur, Bayazid Jalayir, Zafarname.
References:
1. Amir Timur in the world history. Ed. Editor: H. Karamatov. Authors: S. Saidkosimov (leader), A. Akhmedov, B. Akhmedov and
others. Enhanced and revised second ed. Tashkent, 2001.
558. 2. Aҳmedov B. Tarihdan saboqlar. - T .: Kituvchi, 1994.
3. Aҳmedov B. Amir Temurni yod etib. - T .: Uzbekistan. 1996.
4. Bartold V.V. Compositions. T. 2. Part 2. M., 1964. [Bartold V.V. Sochineniya (Writings). Vol.2. P.2. Moscow, 1964. 3180-
5. Yazdi, Sharafiddin Ali. Zafarname. Authors of the preface, comments and indexes A. Ahmad and H. Bobobekov. Tashkent, 1997 3187
6. Mirkhond. Ravzat al-safo fi siyrat al-anbiyo val mulk val hulofo. Electronic version of the manuscript from the library of the
University of Michigan.
7. Natanzi, Muiniddin. Muntakhab ut-tavorikhi Muiny. Author of trans. from Persian, preface and comments Ghulam Karimi.
Tashkent, 2011.
8. Samarkandi, Abdurazzak. Matla as-sadayn va majma al-bakhrain. Electronic version of the manuscript from the library of the
University of Michigan].
9. Khavafi, Fasikh. Mudjmal-I Fasikhi. Trans., preface, notes and indexes by D. Yu. Yusupova. Tashkent, 1980.
10. Khaydar Mirzo, Mukhammed. Tarikh-i Rashidi. Preface, translation from Persian by A. Urunbayev, R.P. Djalilova, L. M.
Yepifanova, comments and indexes by R.P. Djalilova and L. M. Yepifanova. Tashkent, 1996.
11. Khaydar Mirzo, Mukhammed. Tarikh-i Rashidi. Preface, translation from Persian by V.Rakhmanov and Ya.Egamova. Tashkent,
2010.
12. Khondamir, Giyasiddin. Khabib us-siyar fi akhbori afrodi bashar. Preface, translation from Persian by Jalil Khazratkulov, Ismail
Bekjonov, comments by Ashraf Akhmedov, Ismoil Bekjonov. Tashkent, 2013.
13. Shami, Nizamiddin. Zafarname. Trans. from Persian by Y. Khakimjonov, processing and preparing the translation for publication
and the responsible editor A.Urinbaev, compiler of comments and vocabulary H.Karamatov (comments to geographical names O.
Buriev), trans. from the Persian “Zail” (“Appendix”) of Khafiz Abru to “Zafarname” by A. Buriev. Tashkent, 1996.
14. Yazdi, Sharafuddin Ali. Zafarname (Events in Maverannakhr (1360-1370). Released. Ed., preface and preparation for publication
by A. Urunbaev, translated by O. Buriev. Tashkent, 1994.
15. Yakubovsky A.Yu. Timur (Experience of brief characteristics). // Voprosy istorii (Issues of history). 1946. No. 8-9. P. 42-74.

Authors: P.A.Harsha Vardhini, N.Koteswaramma, K.Murali Chandra Babu

Paper Title: IoT based Raspberry Pi Crop Vandalism Prevention system


Abstract: Agriculture is a major source of food production in our country. Growth in population increase
559. the demand for food production and agriculture is the main source. Irrigation in agriculture is an important
process that affects the development of crops. In particular, farmers visit their agricultural fields regularly to 3188-
check the level of soil moisture and water is pumped by motors to irrigate their respective fields on the basis of 3192
requirements. But the limitation of protecting crops from animals becomes a major concern for yield. This works
presents the protection system in addition to the automated irrigation system.
Keyword : an important process that affects the development of crops.
References:
1. P.A.Harsha Vardhini, K.Murali Chandra Babu, D.Swarupa Rani, “Raspberry pi based Automated and Efficient Irrigation System
with Add-On Field Security”, International Journal of Mechanical and Production Engineering Research and Development
(IJMPERD), pp.322-326, Vol. 8, Spl Issue 2, Nov 2018.
2. N.Koteswaramma, P.A.Harsha Vardhini, “Implementation of Arduino based Object Detection System”, International Journal of
Modern Electronics and Communication Engineering (IJMECE), pp.2018-211, Vol. 7, Issue.3, May 2019.
3. R. Hussain, J. Sehgal, A. Gangwar, M. Riyag “Control of irrigation automatically by using wireless sensor network” International
journal of soft computing and engineering, vol.3, issue 1, march 2013, pp. 324-328.
4. 4. P.A.Harsha Vardhini, “Efficient Irrigation System powered by Solar Panel Setup with Tracking Mechanism” pp.238-241, Vol. 4,
Issue 3, March 2017.

Authors: Umida Tukhtasheva

Paper Title: Judicial System in the Criminal Proceedings in Some CIS Countries
Abstract: This article examines the system of review of court decisions in criminal proceedings in some
CIS (Commonwealth of Independent States) countries. The peculiarities of the verification of legality, validity
and fairness of court decisions and the procedure for organizing the activities of higher courts are analyzed. The
author also draws attention to recent changes in the criminal procedure legislation of such countries as Ukraine,
Kazakhstan and Kyrgyzstan. Based on the results of the analysis of the system of methods of revision of court
decisions functioning in foreign countries, the author makes conclusions about the similarities and distinctive
features of the institute of revision of court decisions and puts forward proposals to improve the system.

Keyword : criminal proceedings, review of court decisions, cassation proceedings, appeal proceedings,
supervisory proceedings, resumption of criminal proceedings in view of new or newly discovered circumstances,
courts of higher instances, appeal of decisions, miscarriage of justice.
References:
1. Исаева К.А., Абдукаримова Н.Э., Воронцова И.Н. — К вопросу об отдельных тенденциях и реформирования уголовно-
процессуального законодательства в странах СНГ // Полицейская и следственная деятельность. – 2018. – № 2. – С. 9 - 15. –
С.9. Ibid.
2. Апелляция, кассация, надзор: новеллы ГПК РФ, УПК РФ. Первый опыт критического осмысления / под ред.Н.А.Колоколова.
– М.: Юрист, 2011; Головко Л.В. Новеллы УПК РФ (закон от 29 октября 2010 года): прогресс или институционный хаос? //
Апелляция, кассация, надзор: новеллы ГПК РФ, УПК РФ. Первые результаты применения. В 2 ч. Ч.1. / под
общ.ред.Н.А.Колоколова. – М.: Юрлитинформ, 2015. – С. 487-503; Колоколов Н.А. Апелляция: лиха беда начало! //
Юридическая газета. – 2011. - № 10. – С.12-13. и др.
3. This is also evidenced by Kolokolov's observation that the analysis of appeals (representations) filed with the courts shows that the
participants of the process, first of all, lawyers and prosecutors, are not able to write them // См. об этом: Апелляция, кассация,
надзор: применение УПК РФ: монография / под общ.ред. докт.юрид.наук Н.А.Колоколова. – М.: Юрлитинформ, 2018. – 464 с.
– С. 6.
4. Победкин А.В. ibid – С. 46-50.
5. Уголовный процесс: учебник / С.В.Зуев, К.И.Сутягин. - Челябинск: Издательский центр ЮУрГУ, 2016. – 563 с. – С.19.
560. 6. Указ. работа. – С.431.
7. For information, in the criminal procedure legislation of the Kyrgyz Republic and the Republic of Kazakhstan these decisions are 3193-
called "judicial acts", and in Ukraine - "judicial decisions". 3208
8. Уголовный процесс: учебник / С.В.Зуев, К.И.Сутягин. - Челябинск: Издательский центр ЮУрГУ, 2016. – 563 с. – С.439.
9. Уголовный процесс: учебник / С.В.Зуев, К.И.Сутягин. - Челябинск: Издательский центр ЮУрГУ, 2016. – 563 с. – С.439.
10. Романова А.А. Современное апелляционное производство в уголовном процессе России: диссертация ... кандидата
юридических наук: 12.00.09 / Романова Анастасия Андреевна; [Место защиты: ФГКОУВО Нижегородская академия
Министерства внутренних дел Российской Федерации], 2017. // http://www.dslib.net/kriminal-process/sovremennoe-
apelljacionnoe-proizvodstvo-v-ugolovnom-processe-rossii.html
11. The data obtained during the interviews with judges of the courts of the constituent entities of the Russian Federation indicate that
judges simply cannot physically reconsider the volume of criminal cases that come to the appeal instance. Most of the judges
interviewed agreed with the maintenance of a kind of "procedural filter" that would allow them to select those criminal cases in which
a full-fledged appeal procedure should actually be conducted. // Романова Анастасия Андреевна. Современное апелляционное
производство в уголовном процессе России: диссертация ... кандидата юридических наук: 12.00.09 / Романова Анастасия
Андреевна; [Место защиты: ФГКОУВО Нижегородская академия Министерства внутренних дел Российской Федерации],
2017. // http://www.dslib.net/kriminal-process/sovremennoe-apelljacionnoe-proizvodstvo-v-ugolovnom-processe-rossii.html
12. They are limited by both the available staff capacity and the budget ceiling for resources // Скляренко М.В. Система
правоохранительных органов, адвокатуры и судов, гарантирующих деятельность механизма обжалования, проверки и
пересмотра судебных решений в уголовном процессе // См. об этом: Апелляция, кассация, надзор: применение УПК РФ:
монография / под общ.ред. докт.юрид.наук Н.А.Колоколова. – М.: Юрлитинформ, 2018. – 464 с. – С. 17.
13. Апелляция, кассация, надзор: применение УПК РФ: монография / под общ.ред. докт.юрид.наук Н.А.Колоколова. – М.:
Юрлитинформ, 2018. – 464 с. – С. 17-18.
14. Уголовный процесс: учебник / С.В.Зуев, К.И.Сутягин. - Челябинск: Издательский центр ЮУрГУ, 2016. – 563 с. – С.469.
15. Свиридов М.К. Вопросы совершенствования кассационного производства в российском уголовном процессе // Вестник
Томского государственного университета. Право. – 2017. - № 23.- С. 73. // https://cyberleninka.ru/article; Червоткин А.С.
Апелляция и кассация: пособие для судей. – М.: Проспект, 2010. – 336 с. – С. 30-31.
16. Червоткин А.С. Апелляция и кассация: пособие для судей. – М.: Проспект, 2010. – 336 с. – С. 32.
17. Уголовный процесс: учебник / С.В.Зуев, К.И.Сутягин. - Челябинск: Издательский центр ЮУрГУ, 2016. – 563 с. – С.469.
18. Свиридов М.К. Вопросы совершенствования кассационного производства в российском уголовном процессе // Вестник
Томского государственного университета. Право. – 2017. - № 23. – С. 73. // https://cyberleninka.ru/article.
19. 1Дикарев И.С. Надзорно-кассационная форма пересмотра судебных решений в уголовном процессе. -Волгоград: Изд-во

ВолГУ, 2016. - 400 с. – С. 30.


20. Свиридов М.К. Вопросы совершенствования кассационного производства в российском уголовном процессе // Вестник
Томского государственного университета. Право. – 2017. - № 23. – С. 75. // https://cyberleninka.ru/article.
21. Апелляция, кассация, надзор: применение УПК РФ: монография / под общ.ред. докт.юрид.наук Н.А.Колоколова. – М.:
Юрлитинформ, 2018. – 464 с. – С. 427.
22. If a court finds that a law or other regulatory legal act to be applicable infringes on the human and civil rights and freedo ms enshrined
in the Constitution of the Republic of Kazakhstan, it is obliged to suspend proceedings and apply to the Constitutional Counc il of the
Republic of Kazakhstan with a view to declaring the act unconstitutional (article 10, paragraph 2, of the Code of Criminal Procedure).
23. Уголовный процесс: учебник / С.В.Зуев, К.И.Сутягин. - Челябинск: Издательский центр ЮУрГУ, 2016. – 563 с. – С.477.
24. Уголовный процесс: учебник / С.В.Зуев, К.И.Сутягин. - Челябинск: Издательский центр ЮУрГУ, 2016. – 563 с. – С.479.
25. Свиридов М.К. Вопросы совершенствования кассационного производства в российском уголовном процессе // Вестник
Томского государственного университета. Право. – 2017. - № 23. – С. 79. // https://cyberleninka.ru/article.
26. Сухова О.А. Институт кассации в уголовном процессе России и Франции: генезис и сравнительно -правовой анализ
современного состояния в контексте соответствия международному стандарту. // Вестник Удмуртского университета. – 2014.
– Выпуск 2. - С. 190-191.
27. Сухова О.А. Институт кассации в уголовном процессе России и Франции: генезис и сравнительно -правовой анализ
современного состояния в контексте соответствия международному стандарту. // Вестник Удмуртского университета. – 2014.
– Выпуск 2. - С. 197.; а также: Международный пакт о гражданских и политических правах. Принят резолюцией 2200 А (XXI)
Генеральной Ассамблеи от 16 декабря 1966 года. // https://www.un.org/ru/documents/decl_conv/conventions/pactpol.shtml.
28. Ведищев Н.П. Возобновление производства по уголовному делу ввиду новых или вновь открывшихся обстоятельств в
системе уголовного судопроизводства (российский опыт и международная практика): автореферат дисс. канд. юрид наук. –
Саратов, 2012. // http://dissers.ru/avtoreferati-kandidatskih-dissertatsii1/a1007.php
29. In the Russian Federation - Resumption of criminal proceedings in view of new or newly discovered circumstances, chapter 49 of the
Code of Criminal Procedure; in Kazakhstan - Resumption of criminal proceedings in respect of newly discovered circumstances,
chapter 53 of the Code of Criminal Procedure; in the Kyrgyz Republic - Resumption of proceedings in respect of newly discovered or
exceptional circumstances, chapter 34 of the Code of Criminal Procedure; in Ukraine - Resumption of cases in respect of new or newly
discovered circumstances, chapter 53 of the Code of Criminal Procedure.
30. Уголовный процесс: учебник / С.В.Зуев, К.И.Сутягин. - Челябинск: Издательский центр ЮУрГУ, 2016. – 563 с. – С.487.
31. Ведищев Н.П. Возобновление производства по уголовному делу ввиду новых или вновь открывшихся обстоятельств в
системе уголовного судопроизводства (российский опыт и международная практика): автореферат дисс. канд. юрид наук. –
Саратов, 2012. // http://dissers.ru/avtoreferati-kandidatskih-dissertatsii1/a1007.php
32. Давыдов В.А. Возобновление уголовного судопроизводства ввиду новых или вновь открывшихся обстоятельств: автореферат
дис.... докт. юрид. наук. - М., 2011. – С.1. // https://www.dissercat.com/content/ vozobnovlenie-ugolovnogo-sudoproizvodstva-
vvidu-novykh-ili-vnov-otkryvshikhsya-obstoyatelstv.
33. Ведищев Н.П. Возобновление производства по уголовному делу ввиду новых или вновь открывшихся обстоятельств в
системе уголовного судопроизводства (российский опыт и международная практика): автореферат дисс. канд. юрид наук. –
Саратов, 2012. // http://dissers.ru/avtoreferati-kandidatskih-dissertatsii1/a1007.php
34. Уголовный процесс: учебник / С.В.Зуев, К.И.Сутягин. - Челябинск: Издательский центр ЮУрГУ, 2016. – 563 с. – С.487.
35. В порядке, установленном пунктом 2) части второй статьи 335 УПК Республики Казахстан.
36. Давыдов В.А. Возобновление уголовного судопроизводства ввиду новых или вновь открывшихся обстоятельств: автореферат
дис.... докт. юрид. наук. - М., 2011. – С.5. // https://www.dissercat.com/content/ vozobnovlenie-ugolovnogo-sudoproizvodstva-
vvidu-novykh-ili-vnov-otkryvshikhsya-obstoyatelstv.
37. Refusal is possible before the start of the trial and subsequently the person who refused the application does not have the right to re-
apply to the court on the same grounds.
38. Жиноят ишлари бўйича суд амалиёти(Crimes of criminal court operation) // Журнал Правосудие. – 2019. - № 7. – С. 19-21.
39. Crimes of criminal court operation Жиноят ишлари бўйича суд амалиёти (Crimes of criminal court operation) // Журнал
Правосудие. – 2019. - № 7. – С. 21, 27

Authors: U.F. Sabirova, S.V. Gusenina, M.V. Sukhomlinova, V.I. Safyanov

Paper Title: Humanization as a Sociocultural Component of the Higher Education Quality


Abstract: “The third-generation universities are the multicultural organizations with a wide and diverse
staff and students. In this regard they are close to medieval universities.”
“Trying to find a way out of this situation universities are forced to experiment offering specialized programs
to the best and brightest students thereby returning scientifically oriented education to the ideals of the
Renaissance and Enlightenment. This can be seen as the sixth driving force behind change. ”
Johan Wissemah. "The Third Generation University" [3]
Introduction. In recent years the sociocultural trends of the modern educational system undergone significant
transformations, thus making the question of studying them relevant. The concept of “humanity” is interpreted
today in meaning close to the category of “personality”, the quality of the life and the benefits which are
becoming the main criteria for evaluating the activities of social institutions. The purpose of the article is a
practical definition of the semantic and qualitative content of the concept of “humanization of the modern higher
education” in accordance with the educational standards of the third generation.
561. Materials and methods. The methodological base included the systemic, synergetic, communicative, personal
activity approaches as well as general theoretical methods (analysis, synthesis, comparison, generalization
3209-
studies of sociological and social science literature); comparative analysis; empirical methods (observation,
3218
conversation, questionnaire, analysis of the results of the survey).
Results. It was established that “humanity” as a competence can be attributed to the motivational resources of
the personality. A number of scientifically correct sociological parameters, characteristics, descriptors and
indicators has been formed in accordance with the third generation Russian Federation the State Educational
Standards (FSES). This allows them to be distinguished using the method of the “social portrait” and to
characterize the conditional level of the competence “humaneness” formed among university graduates
according to the universal scale of the competencies formation, approved by these standards (“high” -
“satisfactory” - “good”).
The analysis of the experimental work data revealed a “good” level of the formed conditional competence - “a
person humanity” among the respondents - the University graduates in the Tambov region, Russia. Moreover the
competency formation is considered by this study's authors as a criteria not for the person assessing itself, but
the effectiveness and quality of the modern higher education.
Discussion and conclusions. The results and conclusions of the author's empirical research can serve as:
a theoretical and practical basis to investigate the organization features of the students educating process in
various educational organizations and also for different training levels in a changing multicultural environment;
the development of training courses, programs, alternative educational technologies, including the modern
electronic educational resources using.
The material may be interesting to students, teachers and heads of educational institutions, and also the
researchers interested in the humanization problems and the higher education quality.

Keyword : humanism; the quality of higher education; humanization of education; humanity; personality.
References:
1. Berdyaev N. Soul of Russia / N. Berdyaev .- M .: T8RUGRAM, 2018.-140p.
2. Bryzgalina E.V. Humanization and humanitarization of education: from school to university [Electronic resource] / Е.V.
Bryzgalina. - Access mode http://lib.teacher.msu.ru/pub/2303.
3. Wissema, Johan G. University of the third generation. - M.: Olympus - Business, 2016 .- 432 p.
4. Gordashnikov V.A., Osin A.Ya. Education and health of students of a medical college.- M .: Academy, 2009.- 395 p.
5. 5.Gorshkov M.K. Russian society in the conditions of transformation (sociological analysis). - M.: “Russian Political
Encyclopedia” (ROSSPEN), 2000. - 384 p.
6. Dobruskin M.E. Humanization as a strategy of higher education. - Journal: Philosophy and Society. Issue No. 3 (40) / 2005.
[Electronic resource] / E.M. Dobruskin. - Access mode https: // www. socionauki. com / journal / articles / 126657.
7. Ivanko V.Yu. Problems of humanization of vocational education [Electronic resource] / V.Yu. Ivanko.- Access mode
https://nsportal.ru/npo-spo/sotsialnye-nauki/library/2016/02/12.
8. Karavanov A.A., Ustinov I.Yu. Actual problems of humanization and humanization of military engineering education // Scientific
Review. Pedagogical sciences. - 2016. - No. 3. - P. 57-85.
9. Kravets, A.S. Humanization and humanitarization of higher education. [Electronic resource] / A.S. Kravets // Voronezh State
University. - Access mode: http://www.rciabc.vsu.ru/irex/pubs/kravets2.htm.
10. Kravchenko S.A. The formation of a complex society: for a humanist turn // Humanitarian of the South of Russia .2013. V. 0. No.
3. P. 141-146.
11. Culture as the basis of the content of education // Site of Academician RAO Novikov AM [Electronic resource]. - Access mode:
http: // anovikov. com / artikle / kult_osn.htm
12. Likhachev D. S. Book of worries / Articles, conversations, memories /. - M.: Publishing house "News", 1991. [Electronic
resource] / D.S. Likhachev. - Access mode: http://svitk.ru/004_book_book/ 16b / 3559.
13. Lopatin A.R. The formation of social maturity among schoolchildren in the context of a humanistic approach // Bulletin of
Kostroma State University. ON. Nekrasov. - 2013. - V. 19. - No. 4. P.7-9.
14. Marshak A.L. Cultural identity as a factor in strengthening the integrity of Russia // Humanitarian of the South of Russia. 2014.
No. 4. P. 50-54.
15. Naletova I.V. Research analytics of higher education as a culture-forming constant of our time Specialty 24.00.01 - Theory and
history of culture: abstract of a dissertation for the degree of Doctor of Philosophy. - Tambov.-2005. 44p.
16. Problems and prospects of spiritual and moral education of adolescents and youth in the context of the introduction of federa l
state education: materials of the All-Russian scientific and practical conference (March 18, 2011). - Tambov: TOGAU DPO
“Tambov Regional Institute for Advanced Training of Education Workers”, 2011.– 187 p.
17. Problems of modern teacher education. - Collection of scientific papers: - Yalta: RIO GPA, 2018. - Issue. 61. - Part 4. - 334 p.
18. Romanyuk L.V. Humanistic pedagogy. [Electronic resource] / L.V. Romanyuk. - Access mode file: / C: / Users / user /
Downloads. /pdf.
19. GEF // Official site of the National Association for the Development of Education and Science. [Electronic resource]. - Access
mode: https: //fgos.ru/.
20. Chernitskaya A.L. Humanization of higher education: the nature and prospects of development: an abstract of a dissertation for
the degree of candidate of Philosophical sciences: 09.00.11 / Chernitskaya Anna Leonidovna; [Place of protection: Moscow State
reg. Un-t]. - Moscow, 2008 .- 23 p.

Authors: Tulaganova Gulchehra, Tadjibaeva Albina

Paper Title: The Role and Importance of Anti-Corruption Researching


Abstract: This article intends to elaborate the significance of a public control on counteracting the
legalization of criminal incomes in developing legal democratic country. End of article includes suggestions and
recommendations. Proper analysis of compliance with criminal law, including criminal procedure and
procedural rules, to eliminate all forms of corruption.

Keyword : corruption, public opinion, anti-corruption researching


References:
1. L. N. Mazur. The definition of the concept is quoted in ed.: Theory and methodology of historical science. Terminological dictionary.
OTV. edited by A. O. Chubaryan. [M.], 2014, pp. 146-147.
562. 2. Law of the Republic of Uzbekistan" On combating Corruption " dated January 3, 2017, no. ZRU-419
3. Resolution of the President of the Republic of Uzbekistan on Measures to Implement the Provisions of the Law of the Republic of
Uzbekistan "on Combating Corruption" on February 2, 2017, No. PP-2752 3219-
4. ZalehaOthmanRohamiShafieFathilatul Zakimi AbdulHamid Corruption – Why do they do it? Procedia - Social and Behavioral 3221
Sciences. https://doi.org/10.1016/J.SBSPRO.2014.11.074
5. Petra Koudelkováa, *, Valery Senichev Mix Research Approach towards Corruption – Experts’ Perception: Challenges and
Limitations Procedia - Social and Behavioral Sciences 175 ( 2015 ) 39 – 47
6. YelenaFeoktistova, Corruption in Higher Education and Government Measures for its Prevention Procedia - Social and Behavioral
Sciences 2014, Pages 167-172
6. MarinaZaloznayaaWilliam M.ReisingerbVicki HesliClaypool When civil engagement is part of the problem: Flawed anti-
corruptionism in Russia and Ukraine Communist and Post-Communist Studies
7. 2018, Pages 245-255
8. Nur ShafiqaKapeliaNafsiahMohamed. Insight of Anti-Corruption Initiatives in Malaysia Procedia Economics and Finance 2015,
Pages 525-534
9. ZhenyaTangaLeidaChenbZhongyunZhoucMerrillWarkentinaMark L.Gillenson. The effects of social media use on control of corruption
and moderating role of cultural tightness-looseness Government Information Quarterly 2019,
10. Chandan KumarJhaaSudiptaSarangi. Does social media reduce corruption? Information Economics and Policy. 2017, Pages 60-71
11. BeatrizG.López-ValcárcelaJuan LuisJiménezbJordiPerdiguero Danger: Local corruption is contagious! Journal of Policy Modeling
2017, Pages 790-808
12. YantingChen QijunLiu. Public-sector wages and corruption: An empirical study. European Journal of Political Economy 2018, Pages
189-197
13. JordanGans-MorseaMarianaBorgesaAlexeyMakarinbTheresaMannah-BlanksoncAndreNickowdDongZhang Reducing bureaucratic
corruption: Interdisciplinary perspectives on what works. World Development 2018, Pages 171-188
14. RosaLombardiaRaffaeleTrequattrinibBenedettaCuozzobMyriamCano-Rubio Corporate corruption prevention, sustainable governance
and legislation: First exploratory evidence from the Italian scenario. Journal of Cleaner Production. 2019, Pages 666-675.

Authors: Мatluba А. Khadjimukhametova, Avaz M. Merganov

Paper Title: Method for Calculating the Injection Effect to Create Air Circulation Inside Containers
Abstract: The paper investigates the process of air circulation inside the container due to the effect of
injection by an external stream. It is shown in the paper that injection can be created using the open hatch of the
container, which is fixed at a certain angle. To calculate the emerging turbulent flow, a new effective
mathematical model is used. The obtained numerical results of the hydrodynamic equations show that by a
simple structural change in a simple container, air circulation inside the container can be significantly improved.
This phenomenon gives a good perspective for the use of containers in the transportation of food.

Keyword : air circulation, container, injection, mathematical model, air flow, air injection
563.
References:
1. Dzyuba I.S. transportation of perishable goods./P.1., Gomel 1999.
3222-
2. Malikov Z.M., Khadjimukhmaetova М.А. Methods for modifying simple containers for the transport of perishable goods . №1, 2017, 3224
page.58.
3. Abramovich G.N. Theory of turbulent jets/Moscow «Scienсe», 1984.
4. Spalart P. R., Allmaras S. R. “A one-equation turbulence model for aerodynamic flows”// AIAA Paper 1992-0439.
5. Menter F. R. “Zonal two-equation k-ω turbulence models for aerodynamic flows”// AIAAPaper 1993- 2906.
6. Menter F. R., Kuntz M., and Langtry R. “TenYears of Industrial Experience with the SST Turbulence Model”// Turbulence, Heat and
Mass Transfer 4, ed: K. Hanjalic, Y. Nagano, and M. Tummers, Begell House, Inc., 2003, pp. 625 - 632.
7. Anderson D., Tannehill J., Pletcher R. Computational fluid mechanics and heat transfer. -Moscow: Mir, 1990, Vol.1
8. Patankar S. Numerical heat transfer and fluid flow./Hemiphere Publishing Corporation, New York, 1980.
9. Merganov A. M. Model of search for the placement of warehouses of tarnet-and-string cargo depending on the cargo //Journal of
TIRE. – 2018. – Т. 14. – №. 2. – С. 129-133.
10. Avaz M. Merganov, Daurenbek I. Ilesaliev , Alexander A. Svetashev, Method of accommodation of tarned-piece cargoes in auto-
vehicle // Innotrans. 2019, #3 (33), 32-37 pp. DOI:10.20291/2311-164X-2019-3-32-36

Authors: Aziz Zikriyoev, Sokhibmalik Khomidov, Ravshan Nurimbetov, Tokhir Khasanov, Zebo Abdullayeva
Improving the School Quality Through Winning Education Turbulence in Uzbekistan
Paper Title:
(Evidence from the Ministry of Secondary Education Uzbekistan, Gijduvan Region 65 Schools)
Abstract: This research discusses current status of secondary education quality and prospective
development outcomes from the testable research area in 65 school quality parameters of Gijduvan district
Bukhara region in Uzbekistan. The authors try to discover the problem in which relating improvement of
education system at schools far from the capital. By sorting out 60 variables authors come across final decision
and demonstrate the feasibility of economic and social effectiveness of each school. Current article opens up a
new field in preconditions, causes and consequences of influenced education quality variables in which selected
secondary schools. Authors excluded 10 variables from the research analyses of major schools due to collected
data are the same results. Specific area of interest in cases of Gijduvan are distributed and analyzed in Eviews
9.0. Perhaps, paper work offers a solution for the of relationship of school quality by winning turbulence
education via empirical analyses. Main findings have been distributed in forms of the least square method. An
objectivity of discussion is concentrating on turbulence trajectory as a total loses of quality at schools and
winning it’s directions by conceptual figure which offered by authors. The authors also made an attempt to
provide reasons for raising visibility of schools through quality education by calculating efficiency in three
ways. Finally, conclusion of paper suggests that each selected variable efficiency calculated in detail coefficients
564. and presented marble model of obtained results for testing secondary school quality of other regions in
Uzbekistan. 3225-
3231
Keyword : Gijduvan, secondary education, education quality, turbulence education, pupil, reforms.
References:
1. Angrist, J.D., Lavy, V., 1999.Using Maimonides' rule to estimate the effect of class size on scholastic achievement. Q. J. Econ.
114, 533–575.
2. Australian Principals Associations Professional Development Office (APAPDC) (2000).
3. Chetty, R., Friedman, J.N., Rockoff, J.E., 2014.Measuring the impacts of teachers I: Evaluating bias in teacher value-added
estimates. Am. Econ. Rev. 104 (9), 2593–2632.
4. Christopher Day and Pamela Sammon, Successful school leadership, 1999, p48.
5. Clark, D., 2010.Selective schools and academic achievement. BE J. Econ. Anal. Policy 10 (1935–1682).
6. Coleman, J.S., Campbell, E.Q., Hobson, C.J., Mc. Partland, J., Mood, A.M., Weinfeld, F.D., York, R.L., 1966.Equality of
Educational Opportunity. U.S. Government Printing Office, Washington, D.C.
7. Cullen, J.B., Jacob, B.A., Levitt, S.D., 2005.The impact of school choice on student outcomes: an analysis of the Chicago public
schools. J. Public Econ. 89 (5),
8. Currie, J., Thomas, D., 1999.Early Test Scores, Socioeconomic Status, and Future Out-comes. NBER Working Paper No. 6943.
9. Dynarski, S., Hyman, J.M., Schanzenbach, D.W., 2013.Experimental evidence on the effect of childhood
investments on postsecondary attainment and degree completion.
10. European ideas for better learning: the governance of school education systems Produced by the ET 2020 Working Group
Schools The final report and thematic outputs of the ET2020 Working Group Schools, 2018, p 4.
11. Goldhaber, D.D., Brewer, D.J., 2000.Does teacher certification matter? High school teacher certification status and student
achievement. Educ. Eval. Policy Anal. 22 (2), 129–145.
12. Hanushek, E.A., Rivkin, S., 2006.Teacher Quality. In: Hanushek, E., Welch, F. (Eds.), Hand-book of the Economics of Education
Volume 2. Elsevier North Holland, Oxford, pp. 1051–1078.
13. Hastings, J.S., Weinstein, J.M., 2007.No Child Left Behind: Estimating the Impact on Choices and Student Outcomes. NBER
Working Paper No. 13009.
14. Jackson, C. Kirabo, 2013.Match quality, worker productivity, and worker mobility: Direct evidence from teachers. Rev. Econ.
Stat. 95 (4), 1096–1116.
15. Pop-Eleches, C., Urquiola, M., 2013.Going to a better school: Effects and behavioral responses. Am. Econ. Rev. 103 (4), 1289–
1324.
16. Quality assurance for school development Guiding principles for policy development on quality assurance in schoo l education
Produced by the ET 2020 Working Groups, EUROPEAN COMMISSION, 2017, p3.
17. Rivkin, Steven G., Hanushek, Eric A., Kain, John F., 2005.Teachers, schools and academic achievement. Econometrica 73 (2),
417–458.
18. Rockoff, Jonah E., 2004.The impact of individual teachers on student achievement: Evidence from panel data. Am. Econ. Rev. 94
(2), 247–252
19. Rockoff, Jonah E., Jacob, Brian A., Kane, Thomas J., Staiger, Douglas O., 2011.Can you recognize an effective teacher when you
recruit one? Education. Finance. Policy 6 (1), 43–74.
20. Successful school leadership, copyright education development trust 2016. the views and opinions expressed in this publicatio n
are those of the authors and do not necessarily represent the views of education development trust, 2014 report 978-1-909437-76-
0, p7.

Authors: Abdullaeva Dilfuza, Sobirov Bobur, Sarimsakova Gulnar, Burkhankhadjaeva Khurshida


Foreign Experience and Current Legal Prospects Related to the Termination of a Labor Contract on
Paper Title:
the Initiative of an Employee and Agreement of Parties
Abstract: This article studies foreign experience (France, Germany, Great Britain, USA, Japan, CIS) and
current legal prospects related to the termination of the labor contract on the initiative of an employee and with
the agreement of parties. The research analyzes the international standards and mechanisms in termination of the
labor contract, legal regulations of termination of the labor contract on the initiative of an employee and with
the agreement of parties in foreign countries. This legal institution is of great importance in the CIS, and it
differs from the European model of contractual regulation of labor relations. The issues in the Republic of
Uzbekistan dealing with a draft, amendment, termination of an employment contract have been investigated,
and a number of proposals and recommendations to improve the legislation have been developed.

Keyword : labor contract, on the initiative of an employee, termination of labor contract, amending
employment contracts, foreign experience, employee rights, employer obligations, employer rights, electronic
labor contracts, automated system.
References:
1. 1.Abaeva T.V. Legal regulation of termination of an employment contract by agreement of the parties and at the initiative of the
employee: the dissertation ... PhD of legal sciences: 12.00.05 / Abaeva Tatyana Viktorovna; [Place of defence: Moscow State
Law Academy named after O.E. Kutafina] .- Vladikavkaz, 2011.- 152 p.
2. International Labor Organization’s major conventions and recommendations. // The editor in charge of the Uzbek edition -
A.Saidov. - T .: National Center for Human Rights of the Republic of Uzbekistan, 2008. p. 12.
3. 3.Pirmatov O. Aspects of development of general principles of labor relations in international private law. Labor Code of the
Republic of Uzbekistan: Achievements and Prospects // Collection of Materials of the Republican Scientific and Practical
Conference. –T .: TSUL, 2016. – p. 89.
565. 4. International Labor Organization Convention 158 “On Termination of an Employment Agreement at the Employer’s Initiative”//
www.ilo.org сайти манбаси. http://www.ilo.org/dyn/normlex.
5. Alimov N. In the conditions of a market economy, it is necessary to protect employees. The newspaper is a Norma consultant. 3232-
2013. https://gazeta.norma.uz/publish/doc/text91917. 3238
6. M.Mahamatov. International Labor Organization and Uzbekistan // Executive Editor: A.Kh.Saidov.-T .: National Center for
Human Rights of the Republic of Uzbekistan,
2011. – p. 46.
7. Dorokhina J.Yu. An employment contract under the laws of the Russian Federation and individual CIS member states: for
example, the Republic of Belarus and the Republic of Kazakhstan: dis. ... PhD of legal sciences. - M., 2009.
8. Tomashevsky K.L. Codification of legislation on changes to an employment contract in Belarus, Kyrgyzstan and Russia / K.L.
Tomashevsky // Man and Labor. - 2000. - No. 4.
9. Sannikova L.V. Employment agreement in Russia. / L.V. Sannikova. - M.: MT-Press, 1999.
10. Chikanova L.A. Labor contract / L.A. Chikanova // Labor law. - 2004. - No. 4 - 5.
11. Stephan Hardly, Mark Butler. Europan Employment Laws: A comprative guide
(3rd edition). Great Britain. Ltd by: Short Run Press, 2016. – P. 133.
12. Treu T. Labour Law in Italy. Alphen aan Den Rijn, 2011. P. 110.
13. Jacobs A. Labour and the Law in Europe. Nijmegen, 2011. P. 92
14. Filipova I.A. Features of the legal regulation of labor under the laws of Russia and France. Reasonable matters. Monograph. - M.,
2016. - P. 12.
15. Filipova I.A. Features of the legal regulation of labor under the laws of Russia and France. Reasonable matters. Monograph. - M.,
2016. - P. 8.
16. Employment law overview Germany 2019-2020 Pusch Wahlig Workplace Law / Proud Member of L&E Global. P 18.
https://knowledge.leglobal.org/wp-content/uploads/sites/2/LEGlobal_Memo_Germany.pdf
17. “Labor law: the experience of comparative legal research: Monograph. (Lebedev V.M., Melnikova V.G., Nazmetdinov R.R.
Norma, Infra-M, 2018. 294 p.
18. Rakhimov M.A. Labor law is an example of Germany. Law and Duty // # 1/2018. P.35.
19. Giving Notice and Notice Pay // The Official Web-Site of Advisory, Conciliation and Arbitration Service (ACAS). URL
http://www.acas.org.uk/index.aspx?articleid=4095.
20. Atsushi Tsuneki and Manabu Matsunaka. Labor relations and labor law in Japan. Compilation © 2011 Pacific Rim Law & Policy
Journal Association. http://workspace.unpan.org/sites/Internet/Documents/UNPAN93857.pdf
21. Rakhimov M.A. Comparative overview of ways to protect workers' labor rights in Uzbekistan, Germany and the United States of
America. 4 (75) -2017. p. 59.
22. K. Lucassen, S. Sluter, M. Shul, M. Wang. Corporate Law. Employment Law in Switserland // Journal of the International
Institute for Law and Medicine. Editor Dennis Campbell. Р. 172.
23. M.Yu.Gasanov. Prospects for the development of labor legislation in market relations. Materials of the roundtable. TSUL, 2015. -
p. 6.
24. https://mehnat.uz/statistika/view/8.
25. www.pravo.ru.
26. Matrasulov DR Dynamics of Labor Code of the Republic of Uzbekistan. // Prospects for the development of labor legislation in
market relations. Materials of the roundtable. TSUL, 2015. - p. 22.
27. M.Yu.Gasanov. Bridging the gaps in the legal regulation of public relations in the field of wage labor and further improving the
Labor Code of the Republic of Uzbekistan. TSUL, 2016. - p. 18.
28. Pantyukhina A.P. Termination of the employment contract at the initiative of the employer on the grounds associated with the
guilty behavior of the employee (theoretical and practical problems). Abstract of diss. PhD of legal sciences. M., 2013 .- p. 6-7.

Authors: Makhmatkulov Shakhobiddin, Ilesaliev Daurenbek

Paper Title: Stage of Development of the Railway Section


Abstract: Railway infrastructure (in this article it is considered as a public way, railway stations and
railway tracks) - as a logistics object increases discretely due to the application of technical and technological
solutions. The aim of the study is to substantiate the most rational way of gradual development of the
Ahangaran-Tukimachi-Syrdarya railway section. The research methodology is based on the theory of phased
development of railway networks. Results of the research: variants of the schemes of stage-by-stage
development of the Ahangaran-Tukimachi-Syrdarya section were obtained. Conclusions: Based on the results
obtained, conclusions were drawn about the need for a more in-depth analysis of possible project solutions.

Keyword : railway transport, railway section, carrying capacity, cargo transportation, stage of development
566.
References:
1 Park, B., & Kim, C. On the Railway Line Planning Models Considering the Various Halting Patterns. Proceedings of the 3239-
International MultiConference of Engineers and Computer Scientists, 2010, pp.2146–2151. 3245
2 Goossens J, van Hoesel CPM, Kroon LG On solving multi-type railway line planning problems. Eur J Oper Res 168(2): 2006,
pp.403–424
3 Chuang, M. Y. and Johnson, W. H. A. Hop on board: the importation and future development of high -speed rail (HSR) in China,
Journal of Technology Management in China, 6 (3), 2011, pp.232 – 241.
4 Gercek, H., Karpak, B., Kilncaslan, A multiple criteria approach for the evaluation of the rail transit networks in Istanbul.
Transportation 31, T., 2004, pp.203–228.
5 Kuby, M. J., Xu, Z., & Xie, X. Railway network design with multiple project stages and time sequencing. Journal of Geographical
Systems, 3, 2001. pp.25–47
6 M.R. Bussieck, P. Kreuzer, and U.T. Zimmermann. Optimal lines for railway systems. Technical report, TU Braunschweig, 1995. to
appear in European J. Oper. Res
7 S. Lepreux, M. Abed and C. Kolski, “A human-centred methodology applied to decision support system design and evaluation in a
railway network context,” Cogn Tech Work, 2003 (5), pp.248-271
8 8. Cervero, R., & Murakami, J. (2010). Rail and property development in Hong Kong: Experiences and extensions. Urban Studies,
46, pp.2019–2043.

Authors: R. Mohandas, D. John Aravindhar, D. Praveenkumar


Enhanced Bandwidth Allocation Technique and Protocol Standards to Improve QoS in Internet of
Paper Title:
Things
Abstract: Internet of Things (IoT) is efficiently plays vital role in development of several sectors by
offering many opportunities to grow the economy and improve the life standard through connecting billions of
“Things” which provides business opportunities in different sectors and encounter many technical and
application challenges. This paper emphasizes the role of Dynamic bandwidth allocation and protocols standards
in various IoT sectors such as healthcare, education, agriculture, industrial, transportation, smart cities etc., and
focuses on the challenges in providing uninterrupted bandwidth to all IoT devices with existing infrastructure,
which depends on standardized protocols and network devices to establish connection with heterogeneous IoT
devices. This paper covers Enhanced Dynamic Bandwidth Techniques, protocol standards and policies in IoT
network technologies to Improve QoS in IoT devices.

567. Keyword : BLE, IoT, NFC, RFID, Zigbee, EBAT, QoS.


References: 3246-
1. https://www.ibm.com/internet-of-things/ resources/ library/ what-is-iot/ 3251
2. P. Bellavista, G. Cardone, A. Corradi, and L. Foschini, “Convergence of MANET and WSN in IoT urban scenarios,” IEEE Sens. J.,
vol. 13, no. 10, pp. 3558–3567, Oct. 2013
3. Shanzhi Chen, HuiXu, Dake Liu, Bo Hu, and Hucheng Wang, “A Vision of IoT: Applications, Challenges, And Opportunities With
China Perspective” IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 4, AUGUST 2014
4. http://www.livemint.com/Industry/tF2p8P7BF39r1e1S8Xd2SJ/Indian-Internet-of-Things-market-value-to-touch-9-billion-b.html
5. http://meity.gov.in/sites/upload_files/dit/files/Draft-IoT-Policy%20(1).pdf
6. Phillip A. Laplante, Jeffrey Voas, Nancy Laplante, “Standards for the Internet of Things: A Case Study in Disaster Response” IEEE
Computer Society May 2016
7. https://iot-analytics.com/iot-infrastructure-providers-iot-hype/
8. http://www.businesstoday.in/opinion/columns/role-of-internet-of-things-in-india-digital-transformation/story /227415.html
9. https://www2.deloitte.com/content/dam/Deloitte/in/Documents/technology-media-telecommunications/in-tmt-digital-india-unlock-
opportunity-noexp.pdf
10. https://www.microsoft.com/en-in/internet-of-things/ transportation
11. http://www.digikey.com/en/articles/techzone/2015/nov/powering-iot-how-next-generation-of-external-power-supplies-will-help-
minimize-energy-consumption
12. R.Mohandas Dr. D. John Aravindhar” A Survey on IoT: Business Perspective Predictions, Trends and Marketing” Advances in
natural applied sciences MAY 2017.
13. Luca Catarinucci, Danilo de Donno, Luca Mainetti, Luca Palano, Luigi Patrono, Maria Laura Stefanizzi, and Luciano Tarricone” An
IoT-Aware Architecture for Smart Healthcare Systems”, IEEE INTERNET OF THINGS JOURNAL, VOL. 2, NO. 6, DECEMBER
2015.
14. https://www.politesi.polimi.it/bitstream/ 10589/126134/ 3/thesis.pdf
15. https://www.ibm.com/developerworks/library/iot-lp101-connectivity-network-protocols/index.html.
Authors: Bishwajit Pal, Samitha Khaiyum
Low Memory Footprint CNN Models for end-to-end Driving of Autonomous Ground Vehicle and
Paper Title:
Custom Adaptation to Various Road Conditions.
Abstract: The Idea presented in this paper is to establish that different types of Convolution Neural
Network (CNN) model are required to be used for different types of terrains, to optimally drive the vehicle. The
Layers and the trainable variables required to be configured as per the road conditions. For simpler roads, lighter
and simpler networks and for complicated road, a CNN model with heavier network is required. Existing CNN
models were used to build the performance baseline with respect to simple and complicated road conditions. In
the proposed CNN models, layers and trainable parameters are adjusted according to the road conditions. The
objective of the proposed solution is to successfully drive with minimum number of convolution layers and
trainable variables, fit for deployment on computer consuming less than 100 watts, without GPU, for moderate
speed autonomous vehicle. These new sets of proposed CNN models are either equal or smaller in network size
and trainable parameters, memory footprint and refresh rate compared to Alexnet and Nvidia model. The overall
requirement of computational power, cost, and size is also reduced. In this paper, we recommend designing AV
software with multiple CNN models to address different road conditions instead of on one Model for all road
conditions. Finally, we establish that when the terrain is more complex and requires more features to be
extracted then the CNN layers need to be tweaked to extract more features and the speed of the vehicle needs to
be reduced.

Keyword : Autonomous driving, camera, convolution neural network, deep neural network, machine
learning.
References:
1 D., Ling H., Kar A., Fidler S. Efficient Interactive Annotation of Segmentation Datasets with Polygon-RNN++; Proceedings of the
2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition; Salt Lake City, UT, USA. 18–23 June 2018; pp. 859–868
2 Aggarwal C.C. Neural Networks and Deep Learning. Springer International Publishing; Cham, Switzerland: 2018.
3 Amodei D., Ananthanarayanan S., Anubhai R., Bai J., Battenberg E., Case C., Chen J. Deep speech 2: End-to-end speech recognition
in English and Mandarin; Proceedings of the 33rd International Conference on Machine Learning; New York, NY, USA. 19 –24 June
2016; pp. 173–182.
4 Bojarski M., Del Testa D., Dworakowski D., Firner B., Flepp B., Goyal P., Jackel L., Monfort M., Muller U., Zhang J., et al. End to
end learning for self-driving cars. arXiv. 2016. 1604.07316
568. 5 Bojarski M., Yeres P., Choromanska A., Choromanski K., Firner B., Jackel L., Muller U. Explaining how a deep neural network
trained with end-to-end learning steers a car. arXiv. 2017. 1704.07911
6 Buehler M., Iagnemma K., Singh S. Springer Tracts in Advanced Robotics. Springer; Berlin/Heidelberg, Germany: 2009. The 3252-
DARPA Urban Challenge: Autonomous Vehicles in City Traffic. 3259
7 Chen Y., Wang J., Li J., Lu C., Luo Z., Xue H., Wang C. LiDAR-Video Driving Dataset: Learning Driving Policies Effectively;
Proceedings of the 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition; Salt Lake City, UT, USA. 18–23 June
2018; pp. 5870–5878.
8 Chen Z., Zhang T., Ouyang C. End-to-End Airplane Detection Using Transfer Learning in Remote Sensing Images. Remote
Sens. 2018;10:139. doi: 10.3390/rs10010139
9 Chollet F. Deep Learning with Python. Manning Publications; Shelter Island, NY, USA: 2018.
10 He K., Zhang X., Ren S., Sun J. Deep residual learning for image recognition; Proceedings of the IEEE Conference on Computer
Vision and Pattern Recognition; Las Vegas, NV, USA. 27–30 June 2016; pp. 770–778
11 Kocić J., Jovičić N., Drndarević V. Driver behavioral cloning using deep learning; Proceedings of the 17th International Symp osium
INFOTEH-JAHORINA (INFOTEH); East Sarajevo, Republika Srpska. 21–23 March 2018; pp. 1–5
12 Krizhevsky A., Sutskever I., Hinton G.E. Imagenet classification with deep convolutional neural networks. In: Pereira F., Burges
C.J.C., Bottou L., Weinberger K.Q., editors. Advances in Neural Information Processing Systems. Neural Information Processing
Systems Foundation, Inc.; Vancouver, BC, Canada: 2012. pp. 1097–1105.
13 LeCun Y., Bottou L., Bengio Y., Haffner P. Gradient-Based Learning Applied to Document Recognition. ; Available
online: http://yann.lecun.org/exdb/publis/pdf/lecun-01a.pdf.
14 Mehta A., Adithya S., Anbumani S. Learning end-to-end autonomous driving using guided auxiliary supervision. arXiv. 2018.
1808.10393
15 Orponen P. Computational complexity of neural networks: A survey. Nord. J. Comput. 1994;1994:94–110
16 Raghu M., Poole B., Kleinberg J., Ganguli S., Sohl Dickstein J. On the expressive power of deep neural networks; Proceedings of the
34th International Conference on Machine Learning; Sydney, Australia. 6–11 August 2017; pp. 2847–2854.
17 Ravankar A., Ravankar A.A., Kobayashi Y., Hoshino Y., Peng C.-C. Path Smoothing Techniques in Robot Navigation: State-of-the-
Art, Current and Future Challenges. Sensors. 2018;18:3170. doi: 10.3390/s18093170.
18 Russakovsky O., Deng J., Su H., Krause J., Satheesh S., Ma S., Berg A.C. Imagenet large scale visual recognition challenge. Int. J.
Comput. Vis. 2015;115:211–252. doi: 10.1007/s11263-015-0816-y.
19 Shalev-Shwartz S., Shammah S., Shashua A. Safe, multi-agent, reinforcement learning for autonomous driving. arXiv. 2016.
1610.03295
20 Silver D., Hubert T., Schrittwieser J., Antonoglou I., Lai M., Guez A., Lillicrap T. Mastering chess and shogi by self-play with a
general reinforcement learning algorithm. arXiv. 2017. 1712.01815.
21 Silver D., Schrittwieser J., Simonyan K., Antonoglou J., Huang A., Guez A., Hubert T., Baker L., Lai M., Bolton A. Mastering the
game of go without human knowledge. Nature. 2017;550:354. doi: 10.1038/nature24270.
22 Simard D., Steinkraus P.Y., Platt J.C. Best practices for convolutional neural networks applied to visual document analysis;
Proceedings of the Seventh International Conference on Document Analysis and Recognition; Edinburgh, UK. 6 August 2003; pp.
958–963.
23 Simonyan K., Zisserman A. Very deep convolutional networks for large-scale image recognition. arXiv. 2004. 1409.1556
24 Sung Y., Jin Y., Kwak J., Lee S.-G., Cho K. Advanced Camera Image Cropping Approach for CNN-Based End-to-End Controls on
Sustainable Computing. Sustainability. 2018;10:816. doi: 10.3390/su10030816.
25 Sutton R.S., Barto A.G. Reinforcement Learning. 2nd ed. The MIT Press; Cambridge, MA, USA: 2018. p. 552.
26 Sze V., Chen Y., Yang T., Emer J.S. Efficient Processing of Deep Neural Networks: A Tutorial and Survey. Proc.
IEEE. 2017;105:2295–2329. doi: 10.1109/JPROC.2017.2761740.
27 Szegedy C., Liu W., Jia Y., Sermanet P., Reed S., Anguelov D., Erhan D., Vanhoucke V., Rabinovich A. Going deeper with
convolutions; Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition; Boston, MA, USA. 7–12 June 2015;
pp. 1–9.
28 Teti M., Barenholtz E., Martin S., Hahn W. A Systematic Comparison of Deep Learning Architectures in an Autonomous
Vehicle. arXiv. 2018. 1803.09386
29 Thrun S., Montemerlo M., Dahlkamp H., Stavens D., Aron A., Diebel J., Fong P., Gale J., Halpenny M., Hoffmann G., et al. Stanley:
The Robot That Won the DARPA Grand Challenge. J. Field Robot. 2006;23:661–692. doi: 10.1002/rob.20147
30 Udacity, Inc. Self-Driving Car Simulator. [(accessed on 5 November 2018)]; Available online: https://github.com/udacity/self-
driving-car-sim.
31 Visin F., Kastner K., Cho K., Matteucci M., Courville A., Bengio Y. Renet: A recurrent neural network based alternative to
convolutional networks. arXiv. 2015. 1505.00393
32 Wang T.C., Liu M.Y., Zhu J.Y., Liu G., Tao A., Kautz J., Catanzaro B. Video-to-video synthesis; Proceedings of the 32nd
International Conference on Neural Information Processing Systems; Montreal, QC, Canada. 3–8 December 2018; pp. 1152–1164.
33 Xu D., Jain A., Anguelov D. PointFusion: Deep Sensor Fusion for 3D Bounding Box Estimation; Proceedings of the 2018 IEEE/CVF
Conference on Computer Vision and Pattern Recognition; Salt Lake City, UT, USA. 18–23 June 2018; pp. 244–253.
34 Yao Y., Wang H., Li S., Liu Z., Gui G., Dan Y., Hu J. End-To-End Convolutional Neural Network Model for Gear Fault Diagnosis
Based on Sound Signals. Appl. Sci. 2018;8:1584.
35 Zoph B., Vasudevan V., Shlens J., Le Q.V. Learning Transferable Architectures for Scalable Image Recognition; Proceedings of the
2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition; Salt Lake City, UT, USA. 18–23 June 2018; pp. 8697–
8710.

Authors: G. Arul Freeda Vinodhini, R. Ravikumar

Paper Title: Numerical of A Call Centre with Two Types of Queue


Abstract: Call centre is modelled as a queue system with invisible queue and virtual queue. It forms a
special type of structured level dependent matrix. Matrix geometric method is used to find the time independent
joint distribution of number of invisible customers and visible customers. Through numerical examples we have
given the comparison between the existing call centre queue model and the model that we have proposed.

Keyword : M/M/1 queue – Steady State Probabilities – Matrix Geometric method – Call centre with
invisible queue and virtual queue.
Mathematics subject Classification (2010) Primary 60K25, 90C40 – Secondary 68M20
References:
1 Aguir M. S, Aksin .O. Z, Karaesmen. F and Dallery. Y, “On the interaction between retrials and sizing of call centres”, European
569. Journal of Operational Research 191, issue 2, 398-408, 2008.
2 Arul Freeda Vinodhini. G and Vidhya. V.,(2014), Transient solution of multi-server queue with catastrophes and Impatient customers 3260-
when system is down, Applied Mathematical Sciences, 8:92, 4585- 4592.
3 Chakravarthy. S. R, Krishnamoorthy. A and Joshua V. C, “Analysis of a multiserver retrial queue with search of customers from the
3262
orbit, Performance Evaluation, 63, 776- 798, 2006.
4 Choi B. D, Han D. H and Falin G. I, “On the virtual waiting time for an M/G/1 retrial queue with two types of calls”, Journal of applied
mathematics and Stochastic analysis, 6, 11-23, 1993.
5 Gomez- Corral. A, “A matrix geometric approximation for tandem queues with blocking and repeated attempts”, Operations research
letters 30, 360-374, 2002.
6 Han D. H and Lee Y. W, “MMPP, M/G/1 retrial queue with two class of customers”, Communication of the Korean Mathematical
Society, 11, 481-493, 1996.
7 Lee Y. W, “The M/G/1 feedback retrial queue with two types of customers”, Bulletin of Korean Mathematical society, 42, 875- 887,
2005.
8 Neuts M.F, “Matrix Geometric solutions in Stochastic models: An algorithmic Approach”, The Johns Hopkins University Press,
Baltimore (1981).
9 Renganathan. N, Kalyanaraman. R and Srinivasan. B, “A finite capacity single server retrial queue with two types of calls”,
International Journal of Information and Mathematical Sciences, 13, No. 3, 47-56, 2002.
10 Vidhya.V, (2013), Disasters and Customer Impatience In Bulk Queueing Systems, Asia Pacific Journal of Research, Volume: I, Issue:
VIII, 78-83.

Authors: Hariharan S, Nagappan G, Vijayanand M, Vidhya Sri S, Sree Ranjhani R S

Paper Title: Efficient Eye Detection and Tracking Using Smart Sensors
Abstract: Smart sensing enables applications with lots of computer-based techniques and algorithms to
work in a finer way. We are in era with intelligent machines around us and there sometimes provides a situation
of spending of large amount of time due to lack of understanding of those devices. In this paper, we attempt on
to find a new interaction method which ease the use of computers or increase interaction efficiency. The most
interesting approach that enhances the best way of to find communication between machines and human beings.
570. This enhances the way of communication with the digital devices. Our project enables to have communication
using our eye in the desktop environment. This study focus on using eye gazing techniques that allows user to 3263-
move the mouse cursor using his eye with interpretation of control commands. The desktop environment which 3267
has the inbuilt camera enables to achieve the goal in simple and efficient way. The study includes analysis of
features using face detection and template matching which have presented promising results.

Keyword : Detection, Eye Tracking, Scrolling, Smart sensing, Sensors, Human Computer Interaction.
References:
1 Starner, T., Weaver, J., Pentland, A.: A wearable computer based American sign language recognizer. Assist. Technol. Artif.
Intell. 84–96 ,1998.
2 F. Lu, T. Okabe, Y. Sugano, and Y. Sato, “A head pose-free approach for appearance-based gaze estimation,” in Proc. Brit.
Mach. Vis. Conf., pp. 1–11,2011.
3 Ghaoui, C “Encyclopedia of Human Computer Interaction” Idea Group Reference, 2006.
4 Thoumies, P., Charlier, J.R., Alecki, M., d’Erceville, D., Heurtin, A., Mathe, J.F., Nadeau, G., Wiart, “Clinical and functional
evaluation of a gaze controlled system for the severely handicapped Spinal Cord “. 36, 104–109, 1998.
5 Gips, J., DiMattia, P., Curran, F., Olivieri, P. ”Using Eagle Eyes an electrodes based device for controlling the computer with
your eyes-to help people with special needs”. In: Proceedings of the 5th International Conference on Computers Helping People
with Special Needs, vol. 1, pp. 77–83, 1996.
6 Kocejko, T., Bujnowski, A., Wtorek, J.: “Eye mouse for disabled. Conference on Human System Interactions”, p p. 199–202,
2008.
7 Magee, J.J., Scott, M.R., Waber, B.N., Betke, “A real-time vision interface based on gaze detection from a lowgrade video
camera. Conference on Computer Vision and Pattern Recognition Workshop”, pp. 159–159, 2004.
8 Yuille, A.L., Cohen, D.S., Hallinan, P.W “Feature extraction from faces using deformable template” In: Proceedings of IEEE
Conference on Computer Vision and Pattern Recognition, pp. 104–109, 1989.
9 Bradski, G., Keahler, A., Pisarevsky, V.: Learning-based computer vision with intel’s open source computer vision library. Intel
Technol. J. 9(2), 119–130, 2005.
10 J. Zhu and J. Yang, “Subpixel eye gaze tracking,” in Proc. 5th IEEE Int. Conf. Autom. Face Gesture Recog., pp. 124 –129, 2002.
11 R.Valenti,N.Sebe,andT.Gevers,“Combining head pose and eye location information for gaze estimation,” IEEE Trans. Image
Process., vol. 21, no. 2, pp. 802–815, 2012.
12 D. Torricelli, S. Conforto, M. Schmid, and T. DAlessio, “A neural-based remote eye gaze tracker under natural head motion,”
Comput. Methods Programs Biomed., vol. 92, no. 1, pp. 66–78, 2008.
13 I. F. Ince and J. W. Kim, “A 2D eye gaze estimation system with low resolution webcam images,” EURASIP J. Adv. Signal
Process., vol. no. 1, pp. 1–11, 2011.
14 Y.Sugano,Y.Matsushita,Y.Sato,andH.Koike,“Anincrementallearning method for unconstrained gaze estimation,” in Proc.
Comput. Vis., pp. 656–667, 2008.
15 F. Lu, T. Okabe, Y. Sugano, and Y. Sato, “Learning gaze biases with head motion for head pose-free gaze estimation,” Image
Vis. Comput., vol. 32, no. 3, pp. 169–179, 2014.
16 B. L. Nguyen, “Eye gaze tracking,” in Proc. Int. Conf. Comput. Commun. Technol., pp. 1–4, 2009.
17 O.Williams,A.Blake,andR.Cipolla,“Sparseandsemi-supervised visual mapping with the S3GP,” in Proc. IEEE Int. Conf. Comput.
Vis. Pattern Recog.,pp. 230–237,2006.
18 H.-C. Lu, G.-L. Fang, C. Wang, and Y.-W. Chen, “A novel method for gaze tracking by local pattern model and support vector
regressor, ”Signal Process., vol. 90, no. 4, pp. 1290–1299, 2010.
19 F. Lu, Y. Sugano, T. Okabe, and Y. Sato, “Adaptive linear regression for appearance-based gaze estimation,” IEEE Trans. Pattern
Anal. Mach. Intell., vol. 36, no. 10, pp. 2033–2046, Oct. 2014.

Authors: V. Sahaya Sakila, Debin Jose, Abhijith K P, Adith R Babu

Paper Title: Secure Online E-voting Protocol Based on Voters Authentication


Abstract: Although there are many e-voting systems present by analysis it is found that they all are
vulnerable to privacy risk and weakness of unreliable protocols and denial of service attacks. Here is the need to
implement the public key encryption e-voting system. The primary objective of this system is to make ensure
reliability, privacy and security of the protocol and voting is convenience to users. As a result of the
specification requirements, the system was summarized into three parts: access control process which limit
access to a system or to any other resource. Secondly, voting process was done by encrypting voter's electronic
ballot before submitting to the server. Finally, the final result was sorted through deciphering the received
encrypted information. The System is more efficient than other E-Voting systems, since voters can vote from
their devices without extra cost and effort, and encryption ensures the security. A pseudo random number is
generated using the OTP principle, is used by the voter for authentication purpose while casting the vote. These
techniques provide a secure platform, thus exceeding vulnerabilities of the traditional voting system.

Keyword : Pseudo algorithm (false name), time based One Time Password algorithm (TOTP), Security
algorithm (RSA).
571. References:
1. Himanshu Agarwal, G.N.Pandey “Online Voting System for India Based on AADHAAR ID” Indian Institute of Information 3268-
Technology.
2. Smitha B. Khairnar, P. Sanyasi Naidu, Reena Kharat “Secure Authentication for Online Voting System” Pimpri Chinchwad College
3270
of Engineering, Pune.
3. Himanshu Vinod Purandre, Akash Ramswaroop Saini, Freddy Donald Pereira “Application For Online Voting System Using Android
Device “ St.John College of engineering and Management,Palghar.
4. Hayam, Ketal “The Patchwork of Internet Voting in Canada”.
5. B. Rashidi, C. Fung, and E. Bertino, ‘‘Android resource usage risk assessment using hidden Markov model and online learning,’’
Comput. Secure., vol. 65, pp. 90–107, Mar. 2017.
6. M. Gregory. (2016). Electronic Voting May be Faster but Carries Security Risks. [Online].
7. J. Lavelle and D. Kozaki. (2016). Electronic Voting has Advantages but Remains Vulnerable to Security, Software Problems.
[Online]. Available: http://www.abc.net.au/news/2016-07-11/electronic-voting-hassupport-but-security-fears-remain/7587366
8. S.J.BramsandP.C.Fishburn,‘‘Goingfromtheorytopractice:Themixed success of approval voting,’’ in Handbook on Approval Voting
(Studies in Choice and Welfare). Springer-Verlag, 2005, pp. 19–37
9. T. ElGamal, ‘‘A public key cryptosystem and a signature scheme based on discrete logarithms,’’ IEEE
10. K. E. Lauter, ‘‘Practical applications of homomorphic encryption,’’ in Proc. ACM Workshop Cloud Comput. Secure., 2012, pp. 57–
58.
11. X. Yang et al., ‘‘A verifiable ranked choice Internet voting system,’’ in Proc. Int. Conf. Web Inf. Syst. Eng. (WISE), 2017, p p. 490–
501.
12. M. Hirt and K. Sako, ‘‘Efficient receipt-free voting based on homomorphic encryption,’’ in Advances in Cryptology—EUROCRYPT.
Bruges, Belgium: Springer, 2000, pp. 539–556. [Online]. Available: http://www.springer.com/us/book/9783540675174Trans. Inf.
Theory, vol. IT-31, no. 4, pp. 469–472, Jul. 1985.
13. X. Yi and E. Okamoto, ‘‘Practical remote end-to-end voting scheme,’’ in Electronic Government and the Information Systems
Perspective. Toulouse, France: Springer, 2011, pp. 386–400. [Online]. Available: http://www.springer.com/us/book/9783642229602
14. B.Adida,‘‘Helios:Web-basedopen-auditvoting,’’inProc.USENIXSecur. Symp., vol. 17. 2008, pp. 335–348.

Authors: M.Meenakshi, R.Naresh, S.Pradeep

Paper Title: Smart Home: Security and Acuteness in Automation of IOT Sensors
Abstract: Smart home provides a well secured surroundings and a quality by utilizing the energy resources
in an efficient manner. Looking at the worldwide energy crisis, home automation should be made common
globally as aquintes sential element in overcoming loss of energy and using renewable resources. One of the
basic problems in home automation is the amount of costit demands to get operated. Hence reducing the cost of
automation is a factor to be concerned in the world. In this research study, an affordable home automation
system based on Arduino microcontroller has been launched that operates with Modbus protocol. A Bluetooth
module has been interfaced with Arduino, thus weeding out the deployment of desktops and laptops. The whole
system has been tested and observed to run favourably and perform the desired functions like switching
ON/OFF, speed regulation of fan, temperature control of AC and light acuteness management (Via Voltage
Regulation). A computer-programmed app is designed in the proposedsetup which enables the operators to
manage up to 20 devices incorporating various electrical appliances and sensors via Bluetooth technology. In the
present world, a majority of home automation systems are designed for specific purposes while proposed system
is built to fulfil typical objectives which can be operated in a home without much difficulty. The recommended
apparatus exhibits more characteristics than the usual home automation systems as it incorporates an ultrasonic
sensor and soil moisture sensor for water table detection and automatic plant irrigation system respectively. The
recommended model of this automation system is applied and examined on gadgets and it produced desired
results.
572.
3271-
Keyword : Security, Sensor, Bluetooth, complexity.
3274
References:
1. M. Asadullah and K. Ullah, “Smart Home Automation using Bluetooth Technology”, in Innovations in Electrical Engineering and
Computational Technologies (ICIEECT), International Conference on 2017, pp. 1-6.
2. S. Das, S. Ganguly, S. Ghosh, R.Sarker and D. Sengupta ,“A Bluetooth-based sophisticated Home Automation System using
Smartphone” , in Intelligent Control Power and Instrumentation (ICICPI), International Conference on 2016, pp. 236-240.
3. K. Baraka, M. Ghobril, S. Malek, R. Kanj and A. Kayssi ,”Low cost Arduino/Arduino-based Energy-efficient Smart Home
Automation System with Smart Task Scheduling”, in Computational Intelligence, Communication Systems and Networks (CICSyN),
Fifth International Conference on 2016, pp. 296-301.
4. K. Mandula, R. Parupalli, C.A.Murty, E.Magesh and R. Lunagariya ,“Mobile-based Home Automation using Internet Of Things
(IoT)”, in Control, Instrumentation, Communication and Computational Technologies (ICCICCT), International Conference on 2015 ,
pp. 340-343.
5. V. Hassanpour, S. Rajabi, Z. Shayan, Z. Hafezi and M. M. Arefi ,”Low-cost Home Automation using Arduino and Modbus
protocol”, in Control, Instrumentation and Automation (ICCIA), Fifth International Conference on 2017, pp. 284-289.
6. A. R. Behera, J. Devi and D. S. Mishra ,”A Comparative Study And Implementation of Real-time Home Automation System “, in
Energy Systems and Applications, International Conference on 2015, pp. 28-33.
7. S. Gunputh, A. Prakash Murdanand V.Oree ,”Design and Implementation of a Low-Cost Arduino-based Smart Home System”, in
Communication Software and Networks (ICCSN), IEEE 9 th International Conference on 2017, pp. 1491-1495.
8. S. S. Harsha and S Chakrapani Reddy,”Enhanced Home Automation System using Internet of Things (IOT)”, in I-SMAC (IoT in
Social, Mobile, Analytics and Cloud), International Conference on 2018, pp. 89-83.
9. M. N. N. A. Asghar, M.H., “Principle application and vision in internet of things (iot),” in Communication Technologies (GCCT),
2015 Global Conference on, may 2015.
10. A. R. . C. Y. . O. K. Withanage, C., “A comparison of the popular home automation technologies,” pp. 1 – 11, may 2014.
Omar Md Salleh, Nor Fazila Abd Malek, Azali Rahmat, Nur Ikhwan Mohamad, Zulakbal Abd
Authors:
Karim, Ali Md Nadzalan
Repeated Sprint Ability with Ball Performance among University Soccer Players:
Paper Title:
The Influence of Direction
Abstract: The aim of this study was to determine and compare the effects of directions on the repeated sprint
ability (RSA) with ball performance among university soccer players. Twenty soccer players representing a
public university team compete in Malaysian Intervarsity tournament was recruited as study participants.
Participants were assigned to two RSA tests with two different directions; i) Right-left-right (RLR) and ii) Left-
right-left (LRL). Sprints time, fatigue index and strength of decrement score (Sdec) were compared between the
two drills. Repeated measure analysis of variances (ANOVA) was conducted to determine the differences.
Results showed no significant differences of were found for each sprints time and total time. However, FI and
Sdec were found to be significantly lower during LRL. Future research is suggested to stress on the influences of
573. ball controlling during the slides and turns at the markers on RSA performance.
3275-
3278
Keyword : RSA, agility, soccer, specificity
References:
1. Bloomfield, J., R. Polman, and P. O'Donoghue, Physical demands of different positions in FA Premier League soccer. Journal of sports
science & medicine, 2007. 6(1): p. 63.
2. Doncaster, G., et al., Analysis of physical demands during youth soccer match-play: Considerations of sampling method and epoch
length. Research Quarterly for Exercise and Sport, 2019.
3. Datson, N., et al., Match physical performance of elite female soccer players during international competition. The Journal of Strength
& Conditioning Research, 2017. 31(9): p. 2379-2387.
4. Stølen, T., et al., Physiology of soccer. Sports medicine, 2005. 35(6): p. 501-536.
5. Little, T. and A. Williams, Specificity of acceleration, maximum speed and agility in professional soccer players . 2003: Routledge
London, UK:.
6. Salleh, O.M., et al. Repeated sprint ability with inclusion of changing direction among veteran soccer players . in Journal of Physics:
Conference Series. 2018. IOP Publishing.
7. Gambetta, V., In a blur: How to develop sport-specific speed. Sports Coach, 1996. 19: p. 22-24.
8. Chapman, S., E. Derse, and J. Hansen, Soccer coaching manual. Los Angeles: LA84 Foundation, 2008.
9. Pearson, A., Soccer fitness: more than 100 drills for speed, agility, and quickness. 2001: Contemporay Books.
10. Dahlan, N.D. and T.A. Muhamad, Mental toughness and academic achievement among footballers at National University of Malaysia
Jurnal Sains Sukan dan Pendidikan Jasmani, 2017. 6(1): p. 21-35.
11. Yusoff, N.H., Motivation and women involvement as football supporter in Malaysia. Jurnal Sains Sukan dan Pendidikan Jasmani,
2017. 6(1): p. 36-44.
12. Yusoff, N.H., Kepentingan kawalan sosial dalam menangani salah laku membabitkan penyokong bola sepak di Malaysia. Jurnal
Sains Sukan dan Pendidikan Jasmani, 2018. 7(1): p. 34-45.
13. Yusof, Z.M., S.A.E. bin Syed Ambon, and J. bin Mohamad, Physical fitness assessment of MSKPPM Kedah veteran football
players. Jurnal Sains Sukan dan Pendidikan Jasmani, 2016. 5(1): p. 49-64.
14. Pavlova, E. and G. Uzunova, A comparison of the PWC170 between volleyball and soccer players from adapted Margaria aerobic step
test. Jurnal Sains Sukan dan Pendidikan Jasmani, 2014. 3(1): p. 34-44.
15. Salleh, O.M., et al., Repeated sprint ability depending on the level of condition among university soccer players. International Journal
of Academic Research in Business and Social Sciences, 2017. 7(6): p. 506-514.

Authors: S.Arul Kumar, Krithika.M


Influence of Online Shopping Cart Abandonment: The Moderating Effect of Perceived Waiting
Paper Title:
Time
Abstract: Purpose –This research explores the moderating impact of perceived waiting time with regard to
the hedonic motivation and utilitarian motivation of the discarding online shopping cart without making any
purchase.
Research design, data, and methodology – The data was collected from the study respondents through online
structured questionnaire. The study used the Hayes process to analyse the influence of perceived waiting time
concerning online shopping cart abandonment.
Results – This study demonstrates the most important association between hedonic motivation, utilitarian
motivation and the rate of online shopping cart dropout.
Conclusions- Results from this study reveals that the perceived waiting time between hedonic motivation,
utilitarian motivation and frequency of cart abandonment has a moderating impact. The hedonic shoppers will
not wait for registration and page uploads, even if they search online portals for entertainment purposes.

Keyword : Online Shopping, Shopping cart abandonment, Online Behaviour, perceived waiting time,
Hedonic motives, Utilitarian motives.
References:
1. Arulkumar, S., & Kannaiah, D. (2015). Predicting purchase intention of online consumers using discriminant analysis approach.
European Journal of Business and Management, 7(4).
2. Arnold, M. J., & Reynolds, K. E. (2003). Hedonic shopping motivations. Journal of retailing, 79(2), 77-95.
3. Balabanis, G., & Vassileiou, S. (1999). Some attitudinal predictors of home-shopping through the Internet. Journal of Marketing
management, 15(5), 361-385.
4. Babin, B. J., Darden, W. R., & Griffin, M. (1994). Work and/or fun: measuring hedonic and Utilitarian shopping value. Journal of
consumer research, 20(4), 644-656.
574. 5. Childers, J. B., & Tomasello, M. (2001). The role of pronouns in young children's acquisition of the English transitive
construction. Developmental psychology, 37(6), 739. 3279-
6. Close, A. G., & Kukar-Kinney, M. (2010). Beyond buying: Motivations behind consumers' online shopping cart use. Journal of
3284
Business Research, 63(9), 986-992.
7. Davis, M. M., & Heineke, J. (1998). How disconfirmation, perception and actual waiting times impact customer
satisfaction. international Journal of Service industry Management, 9(1), 64-73.
8. Davis, M. M., & Vollmann, T. E. (1990). A framework for relating waiting time and customer satisfaction in a service
operation. Journal of Services Marketing, 4(1), 61-69.
9. Davis, M. M., & Heineke, J. (1998). How disconfirmation, perception and actual waiting times impact customer
satisfaction. international Journal of Service industry Management, 9(1), 64-73.
10. Maister, D. (1985). The one-firm firm. Sloan Management Review, 27(1), 3-13.
11. Kuhlmann-Wilsdorf, D. (1989). Theory of plastic deformation:-properties of low energy dislocation structures. Materials Science
and Engineering: A, 113, 1-41.
12. Overby, J. W., & Lee, E. J. (2006). The effects of Utilitarian and hedonic online shopping value on consumer preference and
intentions. Journal of Business research, 59(10), 1160-1166.
13. Pruyn, A., & Smidts, A. (1998). Effects of waiting on the satisfaction with the service: Beyond objective time
measures. International journal of research in marketing, 15(4), 321-334.
14. Rigby, D., & Bilodeau, B. (2011). Management tools & trends 2011. London: Bain & Company.
15. Rajamma, R., Ball, R. J., Tarelho, L. A., Allen, G. C., Labrincha, J. A., & Ferreira, V. M. (2009). Characterisation and use of biomass
fly ash in cement-based materials. Journal of hazardous materials, 172(2), 1049-1060.
16. Rajini, G., & Krithika, M. (2017). Risk Factors Discriminating Online Metropolitan Women Shoppers: A Behavioural
Analysis. International Journal of Cyber Behaviour, Psychology and Learning (IJCBPL), 7(1), 52-64.
17. Selvidge, P. R., Chaparro, B. S., & Bender, G. T. (2002). The world wide wait: effects of delays on user performance. International
Journal of Industrial Ergonomics, 29(1), 15-20.
18. Su, K. P., Chiu, T. H., Huang, C. L., Ho, M., Lee, C. C., Wu, P. L.,... & Pariante, C. M. (2007). Different cutoff points for different
trimesters? The use of Edinburgh Postnatal Depression Scale and Beck Depression Inventory to screen for depression in
pregnant Taiwanese women. General Hospital Psychiatry, 29(5), 436-441.
19. Tielsch, J. M., Sommer, A., Katz, J., Royall, R. M., Quigley, H. A., & Javitt, J. (1991). Racial variations in the prevalence of primary
open-angle glaucoma: the Baltimore Eye Survey. Jama, 266(3), 369-374.
20. Wolfinbarger, M., & Gilly, M. C. (2001). Shopping online for freedom, control, and fun. California Management Review, 43(2),
34-55.
21. Wildeboer, D., & Donkers, S. (2014). The Consumers Behind Online.
22. Wolfinbarger, M., & Gilly, M. C. (2001). Shopping online for freedom, control, and fun. California Management Review, 43(2),
34-55.

Authors: Rahul Kumar Ghosh, Jayanta Kumar Das, Anirban Das


Blueprint of Permanent Education Number (PEN) Card for Reducing Paper Usage Ratio in
Paper Title:
Education and Job Sector
Abstract: Several decades ago, it was a thought that usage of paper will reduce with the advancement of
technology but rather it has been increased through the printing/photocopying of different documents
specifically in education and job sector, as there is a much need of paper consumption, which in turn leading a
perceptible environmental impacts like air pollution, deforestation, greenhouse gas emissions, etc. This study
intends to develop a concept where entire documents (education and job sector) will be digitalized. Furthermore,
this study aims to propose a framework that will be ensuring the reduction of paper consumption as well as
condense the negative environmental impacts. Besides, this paper focuses to study the paper usage estimation in
the education sector (enrolment of various levels) and job recruitment process as well as the effect of the paper
industry on the environment. It is observed that the average paper used yearly 659078400 by an Indian. This
study adopted a qualitative approach by embracing some case studies moreover observation methods have been
used to obtain the outcomes. This study concludes that using the PEN (Permanent Education Number) of an
induvial, fetching data will be erased as the data will remain digitalized, which furnishes several advantages i.e.
reducing fraud, increase the data lifespan, reducing of manual paperwork, saving the environment, etc.
Henceforth, the digitalization of enrolment in the education sector and recruitment in the service sector is
indispensable to restraint the upsurge of paper used along with decrease the subsequent environmental impact.

Keyword : PEN, Environmental Impact, Paper Consumption, Digitalization, Education Sector.


References:
1. Hendry, M. (2001). Smart card security and applications. Boston, Mass.: Artech House.
2. Finkenzeller, K. (2003). RFID handbook: Fundamentals and applications in contactless smart cards and identification (2nd ed.).
Chichester, England: Wiley.
575. 3. Rankl, W., & Effing, W. (2007). Smart card handbook (3rd ed.) (K. Cox, Trans.). Chichester: John Wiley & Sons.
4. Ghosh, R. K., & Ghosh, M. (2016, June). A Conceptual Framework for Adoption of Education Card in India - Student's Perception.
Pacific Business Review International, 1(1), 35-43. Retrieved from http://www.pbr.co.in/2016/2016_month/June/4.pdf 3285-
5. Ghosh, R. K. (2018). Exploration of Perception Model for Acceptance of Digitalizing Education Credentials in Indian Education 3290
System. Tech Vistas A Quarterly Online Journal, 1(1), 55-70. Retrieved June 13, 2019, from http://techvistas.wbut.ac.in/paper5.php
6. Behl, A. (2017, March 20). Four held in Gurgaon for selling fake university degrees, marksheets. Retrieved July 19, 2019, fro m
https://www.hindustantimes.com/gurugram/four-held-in-gurugram-for-selling-fake-university-degrees-marksheets/story-
1frqeDBKVwcrVuJNYJv4YP.html
7. Tnn. (2016, June 17). 122 students paid Rs 30L for fake degrees: Rajkot News - Times of India. Retrieved July 19, 2019, from
http://timesofindia.indiatimes.com/city/rajkot/122-students-paid-Rs-30L-for-fake-
degrees/articleshow/52788630.cms?TOI_browsernotification=true
8. Ghosh, R. K., Das, A., & Bandyopadhyay, S. K. (2019). A Study to Identify the Adoption Intention of PEN Card amongst Diverse
Groups. International Journal of Recent Technology and Engineering, 8(1C2), 1190-1197. Retrieved July 31, 2019, from
https://www.ijrte.org/wp-content/uploads/papers/v8i1C2/A12110581C219.pdf. Retrieval Number: A12110581C219/19©BEIESP
9. How Much Information 2003? (2003, October 30). Retrieved July 19, 2019, from http://groups.ischool.berkeley.edu/archive/how-
much-info-2003/
10. Wilfred. (2005, October 07). Grams/square meter to pounds/ream. Retrieved July 19, 2019, from
http://www.onlineconversion.com/forum/forum_1118773419.htm
11. Paper density. (2015, January 12). Retrieved July 19, 2019, from
https://en.wikipedia.org/w/index.php?title=Paper_density&oldid=643195757
12. Paper size. (2015, January 6). Retrieved July 19, 2019, from http://en.wikipedia.org/w/index.php?title=Paper_size&oldid=641280319
13. 17 facts: Why you should NOT use paper. Retrieved July 19, 2019, from https://moreapp.com/en/blog/paper-facts/
14. Martin, S. (2011, November 15). Paper Chase. Retrieved July 19, 2019, from http://www.ecology.com/2011/09/10/paper-chase
15. Paper Waste Facts. (2014, May 13). Retrieved July 20, 2019, from http://www.theworldcounts.com/stories/Paper-Waste-Facts
16. 7 The Pulp and Paper Industry. National Academy of Engineering and National Research Council. 1999. Industrial Environmental
Performance Metrics: Challenges and Opportunities. Washington, DC: The National Academies Press. https://doi.org/10.17226/9458
17. Lee, C., Cheng, Y., and Depickere, A. (2003). Comparing smart card adoption in Singapore and Australian universities. Int. J.
Human-Computer Studies, 58 (3), 307-325.
18. Aubert, B. A. and G. Hamel (2001). Adoption of smart cards in the medical sector: the Canadian experience. Social Science &
Medicine 53 (7): 879-894.
19. Ghosh, R. K., & Adhikary, R. (2018). Design of E-Government Framework for Acceptance of Education Card in Indian Education
System. International Journal of Research in Management & Social Science, 6(1), 128-137. Retrieved June 13, 2019, from
http://empyreal.co.in/downloads/ijrmss-volume6-issue1-x-january-march-2018.pdf ISSN 2322 – 0899

Authors: Uma Mageswari T, Bhuvaneswari. G


A Research on the Opportunities Available for SMEs in Tamil Nadu in Procuring Funds for their
Paper Title:
Business Operations
Abstract: SME, synonym for the Small & Medium Scale Industries, considered as backbone for our
Country for the simple reason that it contributes to the tune of 40% of the overall industrial production and of
576. course 34% of national exports, to the Indian economy. The Indian Economy’s annual rate shall grow up to
7.8% in 2019 and 8 % in 2020. SMEs play an important and dynamic role in developing the Indian Economy.
3291-
As per MSMED Act 2006, SMEs are classified as Manufacturing Enterprises according to their investments in
3294
plant as well as machinery and service enterprises according to their investments in equipment respectively. Any
enterprise engaged in manufacturing of goods by employing plant and machinery comes under manufacturing
enterprises category whereas enterprise which is engaged in rendering services comes under service enterprise.
Manufacturing enterprises are categorized as micro firms, small firms and medium scale enterprises according to
their investments in plant as well as machinery. Similarly, service enterprises are also classified as above based
on investments in equipment. Since 2007, registered units under SME have risen to 217981 from 27209 units in
Tamil Nadu offering employment opportunities to 1378544 as against 242855 during 2006-07. The SME
industries are enjoying various subsidy schemes namely Generator subsidy, Capital subsidy, LT power tariff
subsidy, back ended interest subsidy, etc. As per the Govt. of Tamil Nadu notification, there is a credit flow of
46.57% exclusively to MSME industries out of the total disbursements by the banks during the period between
April 2017 and December 2017. Their role in Indian Economy is very vital as they provide huge employment
opportunities. In fact, India is a country facing unemployment problems for which SME industries have become
a great boon as they provide 9 times of employment opportunities in comparison to large industries. SMEs have
all merits on their side like adding significant GDP in the manufacturing sector, mitigating imbalance in balance
of payment problem in case of exports, increasing the capable entrepreneurs, helping equal distribution of
income and wealth etc., However, on the other side, lack of adequate finance is a major issue for SMEs for
various reasons attributed like lack of cash flow consistency, inadequate collaterals, non-availability of timely
and sufficient credit, huge credit costs, restricted access to equity Capital etc. This article is trying to analyze the
blockage of getting adequate finance for SMEs since its inception.

Keyword : SME; MSMED; Cash flow adequacy; Indian Economy;


References:
1. “Interim Report.” DCMSME, http://www.dcmsme.gov.in/publications/comitterep/gupta.html. Accessed 15 Jan. 2019.
2. “Q.1. What Is the Definition of MSME?” Ministry of Micro, Small & Medium Enterprises, https://msme.gov.in/faqs/q1-what-
definition-msme. Accessed 15 Jan. 2019.
3. “Cabinet Approves Proposal for Amendment to the Micro, Small and Medium Enterprises Development Act, 2006 to Change the
Criteria of Classification and to Withdraw the MSMED (Amendment) Bill, 2015 – Pending in Lok Sabha.” Press Information Bureau,
2018, http://www.pib.nic.in/Pressreleaseshare.aspx?PRID=1519587.
4. Micro, Small and Medium Enterprises in India: An Overview. http://dcmsme.gov.in/ssiindia/msme_overview09.pdf. Accessed 21 Jan.
2019.
5. “UN MSME Day to Be Celebrated on 27th June 2018.” Press Information Bureau, 2018,
http://pib.nic.in/newsite/PrintRelease.aspx?relid=180179.
6. Bhavan, Udyog. Ministry of Micro, Small and Medium Enterprises. https://msme.gov.in/sites/default/files/MSME-AR-2017-18-
Eng.pdf. Accessed 02 Feb. 2019.
7. Siti Sarah bt. Omar, Lawrence Arokiasamy & Maimunah Ismail (2009). The Background and Challenges Faced by the Small Medium
Enterprises. A Human Resource Development Perspective‖, International Journal of business and management, vol. 4, issue. 10, PP
95-102.
8. N. Aruna (2015). Problems Faced By Micro, Small and Medium Enterprises – A Special Reference to Small Entrepreneurs in
Visakhapatnam, IOSR Journal of business and management, vol 14, issue 4, PP 43-49
9. Prasad (1995) Financing Small Scale Industries: Some Recent Changes, in the Yojana, pp.8-10.
10. Suresh A.S (2012). A Study on Assessing the Performance of Micro, Small and Medium enterprise of Canara Bank, IJEMR vol 2,
issue 7, PP 1-8
11. Rating Criteria For Small and Medium Enterprises Background. http://www.careratings.com/upload/NewsFiles/GetRated/SME
Rating(Methodology).pdf. Accessed 24 Feb. 2019.
12. Kala Vijayraghavan. “Digital Technology Has Opened Avenues for Small Businesses; Innovation Essential - The Economic Times.”
ET Rise, 2017, https://economictimes.indiatimes.com/small-biz/sme-sector/digital-technology-has-opened-avenues-for-small-
businesses-innovation-essential/articleshow/57415530.cms.
13. The Manufacturing Plan Strategies for Accelerating Growth of Manufacturing in India in the 12 Th Five Year Plan and Beyond .
http://www.planningcommission.nic.in/aboutus/committee/strgrp12/str_manu2703.pdf. Accessed 05 Feb. 2019.
14. Pricing a Product Definition - Entrepreneur Small Business Encyclopedia. https://www.entrepreneur.com/encyclopedia/pricing-a-
product. Accessed 14 Feb. 2019.
15. WILL KENTON. “Gross Value Added – GVA Definition.” Investopedia, 2019, https://www.investopedia.com/terms/g/gross-value-
added.asp.
16. MSME- 110 Announcement Made by the Hon’ble Chief Minister - Tamil Nadu State Startup and Innovation Policy 2018-2023 -
Introduction of New Scheme - Orders - Issued. http://cms.tn.gov.in/sites/default/files/go/msme_e_7_2019.pdf. Accessed 30 Jan. 2019.
17. National Skill Development Policy. 2009, https://msde.gov.in/assets/images/NationalSkillDevelopmentPolicyMar09.pdf.
18. “Year End Review 2018--M/o MSME MSME Support and Outreach Programme Launched by PM Success Story of PMEGP Khadi
– The Back Bone Of Rural India’s Economy.” Press Information Bureau, 2018,
http://pib.nic.in/PressReleaseIframePage.aspx?PRID=1556025.
19. Shayan Ghosh. “RBI Allows Restructuring of MSME Loans up to ₹25 Crore.” Live Mint, 2019,
https://www.livemint.com/Companies/rgl4JNpnGsE7rKerrpaNJJ/RBI-issues-norms-for-restructuring-loans-to-MSMEs.html.
20. Government of Tamil Nadu : Government Orders | Tamil Nadu Government Portal. http://www.tn.gov.in/go_view/dept/29. Accessed
24 Feb. 2019.

Authors: Sethukumarasamy K, Ambrose Prabhu R, Vijayaraju P, Bhaskaran S

Paper Title: Certain Aspects of Mittag-Leffler Functions in Kober Operator


Abstract: Motivated by the triumph of the applications of Mittag-Leffler functions in various fields of
engineering sciences, we present the effect ofg Kober operator and extended Kober operator of first kind on the
Mittag-Leffler function with three parameters E_(α,β)^γ(z). An effort has been made to investigate the properties
of E_(α,β)^γ(z) due to application of Kober fractional integral operator of the first kind of order α We also
577.
provide certain results pertaining to the special cases of in the extended Kober operator of first kind.
3295-
3297
Keyword : Primary 33E12, 26A33 Mittag-Leffler function, Kober operator, Fractional integral operator
References:
1. Agrawal, O., Fractional variational calculus and the transversality conditions, J. Phys. A 39, 10375-10384, (2006).
2. Almeida, R., Torres, D., Necessary and suffcient conditions for the fractional calculus of variations with Caputo derivatives,
Commun. Nonlinear Sci. Numer. Simul. 16(3), 1490-1500, (2011).
3. Chen, W., Ye, K., Sun, H, Fractional diffusion equations by the Kansa Method. Comput. Math. Appl. 59, 1614-1620, (2010).
4. Diethelm, K., the Analysis of Fractional Differential Equations, Springer, Heidelberg (2004).
5. Ferreira R., Torres, D., Isoperimetricproblems of the calculus of variations on time scales, Nonlinear Anal. Optim. II Contem p.
Math. 514, 123-131, (2010).
6. Gorenflo, R., Kilbas, A. A., Mainardi, F., Rogosin, S.V., Mittag-Leffler Functions, Related Topics and Applications. Ser.
Springer Monographs in Mathematics, Springer, (2014).
7. Podlubny, I., Fractional Differential Equations, Academic Press, San Diego, CA, (1999).
8. Kober, H., On a fractional integral and derivative, Quart. J. Math. Oxford, 11, 193-211, (1940).
9. Luchko, Y., Initial-boundary-value problems for the one-dimensional time-fractional diffusion equation, Fract. Calc. Appl. Anal.
15, 141-160, (2012).
10. Masaeva, O., Dirichlet problem for the generalized Laplace equation with the Caputo derivative, Differ. Equ., 48(3), 449-454,
(2012).
11. Mathai, A.M., Saxena R.K., Hans J. Haubold, H-Function: Theory and Application, Springer, (2009).
12. Meerschaert, M., Tadjeran, C., Finite difference approximation for fractional advection-dispersion flow equations, J. Comput.
Appl. Math. 172, 65-77, (2004).
13. Mittag-Leffler,G.M., Sur la nouvelle fonction 𝐸𝛼 (𝑥). C.R. Acad. Sci. Paris, 137, 554-558 (1903).
14. Özarslan, M.A. Yılmaz, B. The extended Mittag-Leffler function and its properties, J. Inequal. Appl. 85, 1-10, (2014).
15. Prabhakar, T. R., A singular integral equation with a generalized Mittag-Leffler function in the kernel, Yokohama. Math. J., 19,
7–15, (1971).
16. Ramachandran,C., Ambrose Prabhu, R., Certain properties of analytic functions with an integral operator, Global J. Pure Appl.
Math. 12, 16-18, (2016).
17. Samko, S. G., Kilbas, A. A., and Marichev, O. I., Fractional Integrals and Derivatives: Theory and Applications., Gordon and
Breach, Yverdon et alibi, (1993).
18. Vijayaraju, R., Sethukumarasamy K., Ambrose Prabhu, R., Certain aspects of analyticity in view of integral operator, Global J .
Pure Appl. Math. 114, 37-42, (2017).
19. Wang, J., Lv, L., Zhou, Y., Boundary value problems for fractional differential equations involving Caputo derivative in Banach
spaces, J. Appl. Math. Comput. 38, 209-224 (2012).
20. Wiman, A., Über den Fundamental satz in der Theorie der Functionen 𝐸𝛼 (𝑥). Acta Math., 29, 191-201 (1905).

Authors: Shanawaz Patil, Mohamed Haneef

Paper Title: Effect of Beryl Addition on Mechanical Properties of Al7075 Using a Stir Casting Technique
Abstract: In present study, Al7075-Beryl synthesized by using a stir casting technique. The different
weight percentage of Beryl incorporated are 2Wt.% to 8 Wt.% in steps of 2 Wt.%. The effect of Beryl particles
integration on hardness and tensile strength response on Al7075 were investigated. It is demonstrated that Beryl
particles distributed homogeneously in the Al7075 matrix acts as effective reinforcement to enhance the
mechanical properites. Compared to base Al7075 matrix, Al7075- 6 wt.% Beryl composites exhibited higher
yield strength of 47.42%, ultimate tensile strength of 44.08% and Al7075-8Wt.% enhancement in hardness of
27.71% when compared to momlithic Al7075. As cast Al7075 alloy and Al7075-Beryl composites were
microstructurally characterized with scanning electron microscopy (SEM), Energy dispersive spectrum (EDS)
and X-ray diffraction (XRD). Microstructure study through scanning electron microscope study reveals that the
uniform distribution reinforcement Beryl into Al7075 matrix. The Al7075-Beryl.

Keyword : Al7075, Beryl, Hardness, SEM, Tensile strength


References:
1. Sambit KumarMohapatra, Kalipada Maity, “Synthesis and characterization of hot extruded aluminum-based MMC developed by
powder metallurgy route:, International Journal of Mechanical and Materials Engineering, 2017, 12:2,2017, pp.-1-9
2. Sajjadi, S. A., Ezatpour, H. R., & Beygi, H. (2011). Microstructure and mechanical properties of Al – Al 2 O 3 micro and nano
composites fabricated by stir casting. Materials Science & Engineering A, 528(29–30), 8765–8771.
https://doi.org/10.1016/j.msea.2011.08.052
3. Sajjadi, S. A., Ezatpour, H. R., & Parizi, M. T. (2012). Comparison of microstructure and mechanical properties of A356 aluminum
578. alloy / Al 2 O 3 composites fabricated by stir and compo-casting processes. Materials and Design, 34, 106–111.
https://doi.org/10.1016/j.matdes.2011.07.037 3298-
4. Soltani, S., Khosroshahi, R. A., Mousavian, R. T., & Jiang, Z. (2015). Stir casting process for manufacture of Al – SiC composites. 3303
Rare Metals. https://doi.org/10.1007/s12598-015-0565-7
5. Shanmughasundaram, P., & Ramanathan, S. (2011). Some Studies on Aluminium – Fly Ash Composites Fabricated by Two Step Stir
Casting Method, (November 2014).Amirkhanlou, S., & Niroumand, B. (2010). Synthesis and characterization of 356 -SiC p
composites by stir casting and compocasting methods, 20, 788–793.
6. Balaji, V., Sateesh, N., & Hussain, M. M. (2015). Manufacture of Aluminium Metal Matrix Composite ( Al7075-SiC ) by Stir Casting
Technique. Materials Today: Proceedings, 2(4–5), 3403–3408. https://doi.org/10.1016/j.matpr.2015.07.315
7. Baradeswaran, A., & Perumal, A. E. (2013). Composites : Part B Influence of B 4 C on the tribological and mechanical properties of
Al 7075 – B 4 C composites. COMPOSITES PART B, 54, 146–152. https://doi.org/10.1016/j.compositesb.2013.05.012
8. Bhushan, R. K., Kumar, S., & Das, S. (2010). Effect of machining parameters on surface roughness and tool wear for 7075 Al alloy
SiC composite, 459–469. https://doi.org/10.1007/s00170-010-2529-2
9. Kumar, R., & Dhiman, S. (2013). A study of sliding wear behaviors of Al-7075 alloy and Al-7075 hybrid composite by response
surface methodology analysis. Materials & Design, 50, 351-359.
10. Kalkanli, A., & Yilmaz, S. (2008). Synthesis and characterization of aluminum alloy 7075 reinforced with silicon carbide particulates.
Materials & Design, 29(4), 775-780.
11. Reza, H., Abolkarim, S., Haddad, M., & Huang, Y. (2014). Investigation of microstructure and mechanical properties of Al6061 -
nanocomposite fabricated by stir casting. Journal Of Materials & Design, 55, 921–928. https://doi.org/10.1016/j.matdes.2013.10.060
12. Rahman, H. et al., Characterization of silicon carbide reinforced aluminum matrix composites. Procedia Engineering, 90, 103 –109.
https://doi.org/10.1016/j.proeng.2014.11.821
13. L. Yuan, J. Han, J. Liu, and Z. Jiang, Mechanical properties and tribological behavior of aluminum matrix composites reinforced with
in-situ AlB2 particles, Tribology International, 98, (2016) 41-47.
14. A. K. Bodukuri, K. Eswaraiah, K. Rajendar, and V. Sampath, Fabrication of Al–SiC–B4C metal matrix composite by powder
metallurgy technique and evaluating mechanical properties, Perspectives in Science, 8, (2016) 428-431.
15. S. Zhang and F. Wang, Comparison of friction and wear performances of brake material dry sliding against two aluminum matrix
composites reinforced with different SiC particles, Journal of Materials Processing Technology, 182, (2007) 122-127.
16. A. Canakci, T. Varol, S. Ozsahin, and S. Ozkaya, Artificial Neural Network Approach to Predict the Abrasive Wear of AA2024 -B4C
Composites, Universal Journal of Materials Science, 2, (2014) 111-118.
17. E. E. Zaki, Z. H. Ismail, J. A. Daoud, and H. F. Aly, Extraction equilibrium of beryllium and aluminum and recovery of beryll ium
from Egyptian beryl solution using CYANEX 921, Hydrometallurgy, 80, (2005) 221-231.
18. K.R. Suresh, H.B. Niranjan, P.Martin Jabraj and M.P. Chowdaiah, “Tensile and Wear Properties of Aluminum Composites, Wear,
Vol. 225, No. 1-6, 2003, pp. 638-642. DOI: 10.1016/S0043-1648 (03) 00292-8
19. Hosur Nanjireddy Reddappa, Kitakanur Ramareddy Suresh, Hollakere Basavaraj Niranjan, Kestur Gundappa Satyanarayana et al., “
Studies on mechanical and wear properties of Al6061/Beryl Composites,” Journal of minerals and materials Characterization and
Engineering, 2012, 11, 704--708

Authors: V.Sivakumar, R.Ruthramathi


Challenges and Features of Warehousing Operations With Respect to Logistics Warehouse
Paper Title:
Companies in Chennai
Abstract: Supply chain processes involved in this like sourcing, transportation, warehousing, inventory
management, replenishment, cold chain management. Warehousing is the segment of enterprise logistic
functions responsible for the storage space and managing of the inventories beginning with suppliers receipt and
ending with the consumption point. Warehouse operations cover a number of significant areas, from the
receiving, organization, fulfillment, and supply processes and areas including Receiving of goods, integrating
and maintaining tracking software. Goal of warehouse operations is to satisfy customer’s desires and necessities
whereas utilizing house, equipment, and labor effectively. The current trends and pressures on provide chain and
logistics-forever increasing client examine levels, inventory optimization, time solidity and cost minimization
have predictably changed the structure of supply chains and the location site and working of warehouses within
the supply chains network .Supply Chain Management encompasses scheduling and organization of all activities
involved in sourcing, procurement, conversion, and logistics managing activities. The business contains each
variety of warehouses and the trendy multi-purpose supply centers furthermore because the ancient storage
facilities called godowns.

Keyword : Logistics, Security, Storage Facilities, logistics services, Warehousing Management, Warehouse
operations.
References:
1. Augusto da Cunha Reis(2017) , distribution center plan, an orderly writing survey, Brazilian Journal of Operations and Produc tion
Management 14 (2017), pp 542-555, ABEPRO DOI: 10.14488/BJOPM.2017.v14.n4.a10
2. Knight Frank (2014), India Logistics and Warehousing Report, http://content.knightfrank.com/inquire about/677/archives/en/india-
579. warehousing-and-coordinations report2326.pdf
3. Jan Kara's (2013), An Overview of Warehouse Optimization, International Journal of Advances in Telecommunication Electro
methods, Signals and Systems, Volume No.2, issue No.3.
3304-
4. Felix T.S. Chan, H.K. Chan (2011), Improving the efficiency of request picking of a manual-pick and staggered rack dissemination 3308
distribution center through the execution of class-based stockpiling, Expert Systems with Applications, Volume No. 38, Issue No.3,
PP. 2686–2700
5. Jochem Springer's (2010), Planning and control in stockroom frameworks, Bachelor Thesis Organization and Strategy, Premaster
Operations the executives and Logistics. ANR: 860755, http://arno.uvt.nl/show.cgi?fid=121828
6. Sahar Elbarky (2016) , Warehousing Risk Management in Different Industrial sixth International Conference on Information
Systems, Logistics and Supply Chain (ILSInternational Conference)
7. Augusto da Cunha Reis(2017) WAREHOUSE DESIGN: A SYSTEMATIC LITERATURE REVIEW Brazilian Journal of
Operations and Production Management 14 (2017), pp 542-555 , DOI: 10.14488/BJOPM.2017.v14.n4.a10
8. Juri Kondratjev (2015) Logistics. Transportation and distribution center in store network
9. Baker, P. (2004), "Adjusting Distribution Center Operations to Supply Chain Strategy", The International Journal of Logistics
Management, Vol. 15, No. 1, pp. 111-123.
10. Chow, H. K. H. et al. (2005), "Structure of an information based coordinations procedure framework", Expert Systems with
Applications, Vol. 29, No. 2, pp. 272-290.
11. Gill, A. (2009), "Deciding stacking dock prerequisites underway conveyance offices under vulnerability", Computers and Industrial
Engineering, Vol. 57, No. 1, pp. 161-168.
12. Koster, R. et al. (2007), "Structure and Control of Warehouse Order Picking: A Literature Review", European Journal of Operational
Research, Vol. 182, No. 2, pp. 481-501.
13. Tompkins, J. A. et al. (1996), Facilities Planning, 2th ed., Jonh Willey, New York.
14. Cordeau, J. F. et al. (2006), A coordinated model for coordinations arrange structure, Annals of Operations Research, Vol. 144, No.
1, pp. 59-82
15. Demirel, T. et al. (2010), "Multi-criteria distribution center area choice utilizing Choquet fundamental", Expert Systems with
Applications, Vol. 37, No. 5, pp. 3943-3952.
16. http://iosrjournals.org/iosr-jbm/papers/Vol15-issue6/I01566066.pdf
17. https://www.researchgate.net/production/50946316_UNDERSTANDING_OF_SUPPLY_CHAIN_A_LITERATURE_REVIEW
18. https://www.academia.edu/27435107/Supply_Chain_Management_Literature_Review_and_Some_Issues
19. https://www.researchgate.net/production/322820208_A_Literature_Review_on_Performance_Measures_of_Logistics_Management
_An_Intellectual_Capital_Perspective

Authors: P.Venkatesh, A.Krishna Sudheer, D.Sathya Prasad Kumar, Senthil Murugan.P

Paper Title: A Research on Profitability and Dividend using Arima Model with Reference to Steel Sector
Abstract: In India Indian, Iron and Steel Industry plays significantly for the overall growth and
580. development of the country. Based on the budget of Ministry of Steel declares that steel industry contributes 2%
of the Indias GDP, and its weight is 6.2% in the Index of Industrial Production(IPP). The sector able to grow by
3309-
itself globally. In India steel production in one Million Tones in 1947, now its become the world's 2nd largest
3313
producer next to China. India's GDP declines 5% in 2019 on account of rising Inflation, GST and strict monetary
control. This medium made the domestic demand weeker which grew 3.3% in 2019, Despite the rise in last
Quater.
Keyword : Steel, Production, Inflation, Demand....etc.,
References:
1. Venkatesh.P (2017) An Evaluation of Liquidity and Profitability of Selected Pharmaceutical Companies in India, Journal of Advanced
Research in Dynamical & Control Systems ISSN: 1943-023X, 07-Special issue on Management Studies.
2. Venkatesh.P (2017) “A Descriptive Analysis of Short Term Solvency and Profitability of Selected Pharmaceutical Companies in India”
Journal of Advance Research in Dynamical & Control Systems, ISSN: 1943-023X, 07-Special issue on Management Studies.
3. Venkatesh.P (2018) “A Study on Impact of Profit, Earning Per Share And Dividend On Equity Performance On Select Steel Sector
Using Discriminant Function Analysis” International Journal of Mechanical and Production Engineering Research and Development
(IJMPERD),, ISSN (P): 2249-6890; ISSN (E): 2249-8001 Vol. 8, Special Issue 3, PP: 998-1007
4. Venkatesh.P (2018) “A Study On Customer Perception Towards Mugi Ultra Liquid Detergent” International Journal of Mechanical a nd
Production Engineering Research and Development (IJMPERD), ISSN (P): 2249-6890; ISSN (E): 2249-8001 Vol. 8, Special Issue 3,
PP: 978-984.
5. Venkatesh.P (2018) “Saving Habit And Investment Preference Of Government School Teachers In Vellore District” International
Journal of Mechanical and Production Engineering Research and Development (IJMPERD), ISSN (P): 2249-6890; ISSN (E): 2249-
8001 Vol. 8, Special Issue 3, PP: 922-926.

Authors: Prabu Baskar, Kumutha Rathinam, Vijai Kanagarajan


Effect of Aspect ratio and Volume Fraction of Steel Fibers in Strength Properties of Geopolymer
Paper Title:
Concrete
Abstract: In this present study, a trail has been conducted to examine the influence of dissimilar aspect
ratio and diverse volume fractions of steel fibers in GPC under various curing exposures on the fresh and
mechanical properties. Meanwhile, the major strength performance of concrete such as compressive strength,
split tensile, flexural, workability and microstructure properties were also studied. From the test results, it was
revealed that in the heat curing method, there was just a low augmentation in the compressive strength at 28
years old days when compared with ambient curing condition. Then again, a radical increment in the
compressive strength was recognized at 3 days on account of thermal curing because of the elevated
polymerization process. The microstructure investigation illustrated that the FA and GGBS particles reacted with
the alkaline activator solution and formed a denser structure in the heat curing process when compared with the
room-cured specimens because of the unreacted particles present in it. The X-ray diffraction pattern shows that
the geopolymer particles are crystalline in nature. It was observed that the strength properties were increases
with the augment in aspect ratio (Ar) and high percentage volume of steel fibers.

Keyword : Fibers, Mechanical properties, Microstructure, Polymerization.


References:
1. Abdollahnejad, Z., Pacheco-Torgal, F., Félix, T., Tahri, W., & Aguiar, J. B. (2015). Mix design, properties and cost analysis of
fly ash-based geopolymer foam. Construction and Building Materials, 80, 18-30.
2. Abdulkareem, O. A., Al Bakri, A. M., Kamarudin, H., Nizar, I. K., & Ala’eddin, A. S. (2014). Effects of elevated temperatures on
the thermal behavior and mechanical performance of fly ash geopolymer paste, mortar and lightweight concrete. Construction and
building materials, 50, 377-387.
3. Aliabdo, A. A., Elmoaty, A. E. M. A., & Salem, H. A. (2016). Effect of cement addition, solution resting time and curing
characteristics on fly ash based geopolymer concrete performance. Construction and building materials, 123, 581-593.
4. Davidovits, J. (1989). Geopolymers and geopolymeric materials. Journal of Thermal Analysis and Calorimetry, 35(2), 429-441.
581. 5. Deevasan, K. K., & Ranganath, R. V. (2010). Geopolymer concrete using industrial byproducts. Proceedings of the Institution of
Civil Engineers-Construction Materials, 164(1), 43-50. 3314-
6. Ganesan, N., Abraham, R., & Raj, S. D. (2015). Durability characteristics of steel fibre reinforced geopolymer
concrete. Construction and Building Materials, 93, 471-476.
3320
7. Hardjito, D., Wallah, S. E., Sumajouw, D. M. J., & Rangan, B. V. (2005, August). Introducing fly ash-based geopolymer
concrete: manufacture and engineering properties. In 30th conference on our world in concrete & structures (pp. 23-24).
8. Ilkentapar, S., Atiş, C. D., Karahan, O., & Avşaroğlu, E. G. (2017). Influence of duration of heat curing and extra rest period after
heat curing on the strength and transport characteristic of alkali activated class F fly ash geopolymer mortar. Construction and
Building Materials, 151, 363-369.
9. Islam, A., Alengaram, U. J., Jumaat, M. Z., Ghazali, N. B., Yusoff, S., & Bashar, I. I. (2017). Influence of steel fibers on the
mechanical properties and impact resistance of lightweight geopolymer concrete. Construction and Building Materials, 152, 964-
977.
10. Khan, M. Z. N., Hao, Y., & Hao, H. (2016). Synthesis of high strength ambient cured geopolymer composite by using low
calcium fly ash. Construction and Building Materials, 125, 809-820.
11. Kusbiantoro, A., Nuruddin, M. F., Shafiq, N., & Qazi, S. A. (2012). The effect of microwave incinerated rice husk ash on the
compressive and bond strength of fly ash based geopolymer concrete. Construction and Building Materials, 36, 695-703.
12. Reed, M., Lokuge, W., & Karunasena, W. (2014). Fibre-reinforced geopolymer concrete with ambient curing for in situ
applications. Journal of materials science, 49(12), 4297-4304.
13. Memon, F. A., Nuruddin, M. F., Demie, S., & Shafiq, N. (2011). Effect of curing conditions on strength of fly ash-based self-
compacting geopolymer concrete. Int. J. Civ. Environ. Eng, 3, 183-186.
14. Al-mashhadani, M. M., Canpolat, O., Aygörmez, Y., Uysal, M., & Erdem, S. (2018). Mechanical and microstructural
characterization of fiber reinforced fly ash based geopolymer composites. Construction and Building Materials, 167, 505-513.
15. Nath, S. K., Maitra, S., Mukherjee, S., & Kumar, S. (2016). Microstructural and morphological evolution of fly ash based
geopolymers. Construction and Building Materials, 111, 758-765.
16. Nguyen, K. T., Ahn, N., Le, T. A., & Lee, K. (2016). Theoretical and experimental study on mechanical properties and flexural
strength of fly ash-geopolymer concrete. Construction and Building Materials, 106, 65-77.
17. Nikolić, V., Komljenović, M., Baščarević, Z., Marjanović, N., Miladinović, Z., & Petrović, R. (2015). The influence of fly ash
characteristics and reaction conditions on strength and structure of geopolymers. Construction and Building Materials, 94, 361-
370.
18. B. Prabu, A. Shalini, J.S. Kishore Kumar, “Rice husk ash based geopolymer concrete - A Review”, Chemical Science Review and
Letters, 2014, 3(10), pp. 288-294.
19. B. Prabu, R. Kumutha, K. Vijai, “Effect of fibers on the mechanical properties of fly ash and GGBS based geopolymer concrete
under different curing conditions”, Indian Journal of Engineering and Materials Sciences, 2017, 24: pp. 5-12.
20. Singh, B., Rahman, M. R., Paswan, R., & Bhattacharyya, S. K. (2016). Effect of activator concentration on the strength, ITZ and
drying shrinkage of fly ash/slag geopolymer concrete. Construction and Building Materials, 118, 171-179..
21. Soutsos, M., Boyle, A. P., Vinai, R., Hadjierakleous, A., & Barnett, S. J. (2016). Factors influencing the compressive streng th of
fly ash based geopolymers. Construction and Building Materials, 110, 355-368.
22. P. Surendra Shah, “Measurements of properties of fiber reinforced concrete”. ACI Materials Journal, 1988, 85: pp. 583-593.
23. Vijai, K., Kumutha, R., & Vishnuram, B. G. (2012). Effect of inclusion of steel fibres on the properties of geopolymer concrete
composites.
24. S.E. Wallah, B.V. Rangan, “Low-Calcium Fly Ash-Based Geopolymer Concrete: Long-Term Properties”, Research Report GC 2,
Curtin University of Technology, Australia, 2006.
25. Wardhono, A., Gunasekara, C., Law, D. W., & Setunge, S. (2017). Comparison of long term performance between alkali
activated slag and fly ash geopolymer concretes. Construction and Building materials, 143, 272-279.
26. Li, W., & Xu, J. (2009). Mechanical properties of basalt fiber reinforced geopolymeric concrete under impact loading. Materials
Science and Engineering: A, 505(1-2), 178-186.
27. Li, Z., Zhang, Y., & Zhou, X. (2005). Short fiber reinforced geopolymer composites manufactured by extrusion. Journal of
materials in civil engineering, 17(6), 624-631.

Authors: Carmen F. Rey -Benguría

Paper Title: Using Extended Compact Sets to Cluster Educational Data


Abstract: The pedagogical orientation to the families of children with behavioral deficiencies needs a
differentiated approach, accorded to the particular characteristics of each family. To accomplish this task, the
personnel in charge of family orientation in the Schools for children with affective-behavioral maladies,
diagnose the families, to obtain the peculiarities of the familiar dynamics. After that, they need to obtain groups
of similar families, in order to carry out a better orientation. The data of the familiar dynamics are mixed an
incomplete, and the desired group number is not given. In this paper we extend the 0-compact sets
structuralization to cluster the families according to their characteristics. We found five groups, each of them
with distinctive familiar dynamics. With the five groups, the family orientation specialists designed a
personalized strategy with a more coherent and adequate orientation.

Keyword : clustering, education, family orientation, mixed data.


References:
1. Shih, M.-Y., J.-W. Jheng, and L.-F. Lai, A two-step method for clustering mixed categorical and numeric data. Tamkang Journal of
Science and Engineering, 2010. 3(1): p. 11-19.
2. Ahmad, A. and L. Dey, A k-means type clustering algorithm for subspace clustering of mixed numeric and categorical data. Pattern
Recognition Letters, 2011. 32: p. 1062-1069.
3. Barroso, E., Y. Villuendas, and C. Yanez, Bio-inspired algorithms for improving mixed and incomplete data clustering. IEEE Latin
America Transactions, 2018. 16(8): p. 2248-2253.
4. Villuendas-Rey, Y., M. García-Borroto, and J. Ruiz-Shulcloper. Selecting features and objects for mixed and incomplete data. in
Iberoamerican Congress on Pattern Recognition. 2008. Springer.
5. García-Borroto, M., et al. Finding small consistent subset for the nearest neighbor classifier based on support graphs. in Iberoamerican
Congress on Pattern Recognition. 2009. Springer.
6. Medina-Pérez, M.A., et al. Selecting objects for ALVOT. in Iberoamerican Congress on Pattern Recognition. 2006. Springer.
7. Villuendas-Rey, Y., et al. Simultaneous features and objects selection for Mixed and Incomplete data. in Iberoamerican Congress on
Pattern Recognition. 2006. Springer.
582. 8. García-Borroto, M., et al. Using maximum similarity graphs to edit nearest neighbor classifiers. in Iberoamerican Congress on Pattern
Recognition. 2009. Springer. 3321-
9. Villuendas-Rey, Y., Y. Caballero-Mota, and M.M. García-Lorenzo. Intelligent feature and instance selection to improve nearest 3327
neighbor classifiers. in Mexican International Conference on Artificial Intelligence. 2012. Springer.
10. Villuendas-Rey, Y. and M.M. Garcia-Lorenzo, Attribute and case selection for nn classifier through rough sets and naturally inspired
algorithms. Computación y Sistemas, 2014. 18(2): p. 295-311.
11. Antón-Vargas, J.A., et al., Improving the performance of an associative classifier by Gamma rough sets based instance selection.
International Journal of Pattern Recognition and Artificial Intelligence, 2018. 32(01): p. 1860009.
12. Villuendas-Rey, Y., et al., Medical Diagnosis of Chronic Diseases Based on a Novel Computational Intelligence Algorithm. J. UCS, 2018.
24(6): p. 775-796.
13. Naija, Y., et al. Extension of Partitional Clustering Methods for Handling Mixed Data. in IEEE International Conference on Data mining
Workshops ISDMW. 2008.
14. Roy, D.K. and L.K. Sharma, Genetic k-means clustering algorithm for mixed numeric and categorical datasets. International Journal of
Artificial Intelligence & Applications (IJAIA), 2010. 1(2): p. 23-28.
15. Brun, M., et al., Model-based evaluation of clustering validation measures. Pattern Recognition, 2007. 40: p. 807-824.
16. Ruiz-Shulcloper, J. and J.J. Montellano-Ballesteros. A new model of fuzzy clustering algorithms. in 3th European Congress on Fuzzy and
Intelligent Technologies and Soft Computing. 1995. Aachen, Germany.
17. Villuendas-Rey, Y., et al., Simultaneous instance and feature selection for improving prediction in special education data. Program,
2017. 51(3): p. 278-297.
18. Villuendas-Rey, Y., et al., The naïve associative classifier (NAC): a novel, simple, transparent, and accurate classification model
evaluated on financial data. Neurocomputing, 2017. 265: p. 105-115.
19. Villuendas-Rey, Y., M.M. Garcia-Lorenzo, and R. Bello. Support Rough Sets for decision-making. in Fourth International Workshop on
Knowledge Discovery, Knowledge Management and Decision Support. 2013. Atlantis Press.
20. López-Yáñez, I., L. Sheremetov, and C. Yáñez-Márquez, A novel associative model for time series data mining. Pattern Recognition
Letters, 2014. 41: p. 23-33.
21. Martínez-Trinidad, J.F. and J. Ruiz-Shulcloper. Fuzzy semantic clustering. in 4th European Congress on Intelligent Techniques and Soft
Computing. 1996. Aachen, Germany.
22. Ahmad, A. and L. Dey, A k-means clustering algorithm for mixed numerical and categorical data. Data & Knowledge Engineering,
2007. 63: p. 503-527.
23. Roy, D.K. and L.K. Sharma, Genetic k-means clustering algorithm for mixed numeric and categorical datasets. International Journal of
Artificial Intelligence & Applications (IJAIA), 2010. 1(2).
24. Jain, A.K. and R.C. Dubes, Algorithms for clustering data. 1988, New Jersey, USA: Prentice Hall.
25. Wilson, R.D. and T.R. Martinez, Improved Heterogeneous Distance Functions. Journal of Artificial Intelligence Research, 1997. 6: p. 1-
34.
26. Villuendas-Rey, Y., et al., Simultaneous features and objects selection for Mixed and Incomplete data. Lecture Notes in Computer
Science, 2006. 4225: p. 597-605.
27. Villuendas-Rey, Y., et al., Selecting features and objects for mixed and incomplete data. Lecture Notes in Computer Science, 2008.
5197: p. 381-388.
28. García-Floriano, A., et al., Support vector regression for predicting software enhancement effort. Information and Software
Technology, 2018. 97: p. 99-109.
29. González-Patiño, D., Y. Villuendas-Rey, and A.J. Argüelles-Cruz, The potential use of bioinspired algorithms applied in the
segmentation of mammograms. 2018.
30. Hernández-Castaño, J.A., et al., Experimental platform for intelligent computing (EPIC). Computación y Sistemas, 2018. 22(1): p. 245-
253.
31. Serrano-Silva, Y.O., Y. Villuendas-Rey, and C. Yáñez-Márquez, Automatic feature weighting for improving financial Decision Support
Systems. Decision Support Systems, 2018. 107: p. 78-87.
32. González-Patiño, D., et al., A Novel Bio-Inspired Method for Early Diagnosis of Breast Cancer through Mammographic Image Analysis.
Applied Sciences, 2019. 9(21): p. 4492.
33. Moreno-Moreno, P., C. Yanez-Marquez, and O.A. Moreno-Franco, The new informatics technologies in education debate.
International Journal of Technology Enhanced Learning, 2009. 1(4): p. 327-341.
34. Acevedo, M.E., C. Yáñez-Márquez, and M.A. Acevedo, Associative models for storing and retrieving concept lattices. Mathematical
Problems in Engineering, 2010. 2010.
35. Lytras, M.D., et al., The Social Media in Academia and EducationResearch R-evolutions and a Paradox: Advanced Next Generation
Social Learning Innovation. J. UCS, 2014. 20(15): p. 1987-1994.
36. López-Yáñez, I., et al., Collaborative learning in postgraduate level courses. Computers in Human Behavior, 2015. 51: p. 938-944.
37. Cerón-Figueroa, S., et al., Instance-based ontology matching for e-learning material using an associative pattern classifier. Computers
in Human Behavior, 2017. 69: p. 218-225.
38. Cerón-Figueroa, S., et al., Instance-based ontology matching for open and distance learning materials. The International Review of
Research in Open and Distributed Learning, 2017. 18(1).
39. García-Floriano, A., et al., Social Web Content Enhancement in a Distance Learning Environment: Intelligent Metadata Generation for
Resources. International Review of Research in Open and Distributed Learning, 2017. 18(1): p. 161-176.
40. Ortiz-Ángeles, S., et al., Electoral Preferences Prediction of the YouGov Social Network Users Based on Computational Intelligence
Algorithms. J. UCS, 2017. 23(3): p. 304-326.
41. Yáñez-Márquez, C., et al., Theoretical Foundations for the Alpha-Beta Associative Memories: 10 Years of Derived Extensions, Models,
and Applications. Neural Processing Letters, 2018. 48(2): p. 811-847.
42. Villuendas-Rey, Y., Maximal similarity granular rough sets for mixed and incomplete information systems. Soft Computing, 2019.
23(13): p. 4617-4631.
43. Villuendas-Rey, Y., et al., NACOD: A Naïve Associative Classifier for Online Data. IEEE Access, 2019. 7: p. 117761-117767.
44. Villuendas-Rey, Y., et al., An Extension of the Gamma Associative Classifier for Dealing With Hybrid Data. IEEE Access, 2019. 7: p.
64198-64205.
45. Villuendas-Rey, Y., Y. Caballero-Mota, and M.M. García-Lorenzo. Using rough sets and maximum similarity graphs for nearest
prototype classification. in Iberoamerican Congress on Pattern Recognition. 2012. Springer.
46. Villuendas-Rey, Y., Y. Caballero-Mota, and M.M. García-Lorenzo. Prototype selection with compact sets and extended rough sets. in
Ibero-American Conference on Artificial Intelligence. 2012. Springer.

Authors: Arvind Vishnubhatla

Paper Title: Simple IoT simulation


Abstract: While analyzing iot projects it is very expensive to buy a lot of sensors , corresponding processor
boards, power supplies etc. Moreover the entire process is to be replicated to cater to large topologies. The
whole experiment is to be planned at a large scale before we can actually start to see analytics working. At a
smaller scale this can be implemented as a simulation program in linux where the sensor data is created using a
random number generator and scaled appropriately for each type of sensor to mimic representative data. This is
them encrypted before sending it over the network to the edge nodes. At the server a socket stream now
continuously awaits sensor data Here the required sensor data is retrieved and decrypted to give true time series
data. This time series is now given to an analytics engine which calculates the trends and cyclicity and is used to
train a neural network. The anomalies so found are properly deciphered. The multiplicity of the nodes can be
characterized by having several client programs running in separate terminals. A simple client server
architecture is thus able to simulate a large iot infrastructure and is able to perform analytics on a scaled model
583.
3328-
Keyword : Simulate,Sensors,IOT,encryption,decryption,Linux,Client,Server,Analytics. 3330
References:
1. Benatallah, B.; Casati, F.; Toumani, F. (2004). "Web service conversation modeling: A cornerstone for e-business automation". IEEE
Internet Computing. 8: 46–54. doi:10.1109/MIC.2004.1260703.
2. Dustdar, S.; Schreiner, W. (2005). "A survey on web services composition" (PDF). International Journal of Web and Grid Services. 1:
1. CiteSeerX 10.1.1.139.4827. doi:10.1504/IJWGS.2005.007545
3. Harper, Douglas. "server". Online Etymology Dictionary. Retrieved 30 November 2013.
4. Tolia, Niraj; Andersen, David G.; Satyanarayanan, M. (March 2006). "Quantifying Interactive User Experience on Thin Clients"
5. Otey, Michael (22 March 2011). "Is the Cloud Really Just the Return of Mainframe Computing?". SQL Server Pro. Penton Media.
Retrieved 1 December 2013.
6. Barros, A. P.; Dumas, M. (2006). "The Rise of Web Service Ecosystems". IT Professional. 8 (5): 31. doi:10.1109/MITP.2006.123
7. Nieh, Jason; Yang, S. Jae; Novik, Naomi (2000). "A Comparison of Thin-Client Computing Architectures". Academic Commons.
doi:10.7916/D8Z329VF. Retrieved 28 November 2018
8. "Distributed Application Architecture" (PDF). Sun Microsystem. Archived from the original (PDF) on 6 April 2011. Retrieved 2009-
06-16.

584. Authors: Fathullayeva Zilola, Usmonova Shakhodat, Aripova Mavjuda, Alimov Maruf
Paper Title: Geological and Structural Positions of Ore Fields and Deposits of Ore Area Auminzatau-Beltau
Abstract: Review the examination geologic-structural position gold mine location of Auminzatau-Beltau is
mine of district Central of Kizilkum. Everybody location placement in seven structural of position formations
north-lasterly, north-westerly, full-scale systems fractures and theirs is combine Find inosreslarch recommended
using how criterion search gold mines manifestation.

Keyword : Useful fossil the golden, region, golden, structural position, textbook, arrangement mountain the
gold.
References:
1. Korolev А.V., Shekhtman P.A. “Structural conditions of positioning after magmatic ores” M; Nedra.,1965, p.506.
2. Korolev V.A. “Structural types of ore fields and deposits of Central Asia” M; Nedra. 1983. p.215. 3331-
3. Akbarov Kh.А. and others “Theoretical and methodological aspects of local forecasting of endogenous mineralization” Tashkent,
TashSTU, 2011, p.455.
3338
4. Akbarov Kh.А., and others. Geological and structural types of polymetallic ore fields and deposits in Central Asia and some issues of
their search and exploration. – Tashkent: The science, 1975. p.200.
5. Akbarov Kh.А. Structural typification of polymetallic ore fields and deposits of various genesis for the development of initial models
in experiments // Experiment and modeling in structure-forming processes of ore genesis // Тр. Institute of Geol. and geophysis. SB
USSR Academy of Sciences. - Novosibirsk; The science, 1976. – Rele. 293. pp.178-189.
6. Golovanov I.M. Ore deposits of Uzbekistan. Tashkent, IMR, 2001.
7. I.T.Toshpulatov, M.N. Yuldashev, T.Sh.Shayakubov. (1987). Atlas of ore fields and deposits of western Uzbekistan (gold -silver).
8. Turapov М.К.(1990). and others. Modelling structures of one of objects of Eastern Kurama. Naukovadumka, p.89.
9. Janibekov B.О. (2017) and others. Structural positions and geodynamical conditions of gold mineralization occurrence in
Auminzatau-Beltau ore region. Gorniy vestnik No.3, 80.
10. Dulapova N.Yu. (2010) “Patterns of gold mineralization positioning in mountain structures of Bukantau and estimation of
perspectives of surrounding closed territories” Abstract of dissertation for candidate degree, 24.

Authors: Yusupov Sardorbek, Dildora Abdusattarova


Improvement of Organizational and Judicial Frameworks of State Bodies with Appeals of Legal and
Paper Title:
Physical Entities
Abstract: The aim of the research is to develop proposals and recommendations aimed at improving the
organizational and legal framework for the work of state bodies with appeals from individuals and legal entities.
The object of the research is considered to be the system of social relations connected with the organizational
and legal bases of the work of state bodies with appeals of individuals and legal entities in the Republic of
Uzbekistan.
The scientific novelty of the research is as follows:
in order to clarify the scope of the Law of the Republic of Uzbekistan «On Appeals of Individuals and Legal
Entities», as well as when dealing with state authorities, one person submitted several appeals of the same
content several times, accepting appeals through video communication and legal assessment, clarifying copies of
the appeals of exactly the same content. Such legal concepts as «repeated appeal», «duplicate appeal», «video
conferencing»;
justified the need for the government body reviewing the appeal, the decision to terminate the consideration of
the appeal, if new reasons are not given new reasons or newly discovered circumstances, if the previous
materials of the appeal contain comprehensive verification materials and the appellant answers in the prescribed
manner;
The necessity of the announcement on official websites of the relevant state bodies of references (comments),
compiled on the basis of the results of the association and analysis of appeals;
585. when clarifying the scope of the Law «On Internal Affairs Agencies», as well as when dealing with appeals of
individuals and legal entities, the necessity of a report by an employee of the internal affairs bodies of their 3103-
positions, titles, surnames, first names and patronymic when they are addressed to a citizen, the obligation to 3107
listen carefully.

Keyword : law, appeals, organizational and legal framework, repeated appeal, duplicate appeal.
References:
1. Vasilyeva C.B. The right of citizens and organizations to appeal: standard model and practice of realization // Law and Econo mics,
2005, number 5.
2. Lyskova E.I. "Formation and development of the institute of citizens' // Law and Policy, 2007, № 3.
3. Shtyrov E.P. The constitutional right of man and citizen to apply to international bodies for the protection of human rights and
freedoms: Cand. dis ... cand. jurid. Sciences. - Saratov 2007;
4. Polievktov A.M. Problems of protection of citizens' rights lawyer when applying to the Constitutional Court: Cand. dis ... cand. jurid.
Sciences. -M., 2007;
5. Kharajiev M. F. Constitutional and legal support of the Head of State Administration of the President of the Russian Federation in the
field of accounting and analysis of citizens' complaints: dis ... cand. jurid. – М., 2008
6. A. Dvorak The implementation of the constitutional right of citizens to appeal to the Russian Federation: Cand. dis ... cand. jurid.
Sciences. – М., 2003;
7. Mironov M.A. Circulation of citizens as an element of the protection of human rights and fundamental freedoms in law and practice.
М., 2002;
8. Rudakova N.A. The constitutional right of citizens to appeal to the state bodies and local self-government: Author. dis ... cand. jurid.
Sciences. – М., 2002;
9. D.V. Zamyshlyaev Implementation of the citizens' right to appeal to the state authorities and local self-government // The state power
and local self-government. - 2003. - № 4. - P. 43-47.
10. Chashykov A.V. Subjects of the right to petition the Constitutional Court of the Russian Federation: problems of theory and practice. -
Tomsk, 2007;

Authors: S. Sadhana, S. Bhuvaneswari

Paper Title: A Research on International Commercial Arbitration with reference to the Brexit
Abstract: International commercial arbitration is an alternative method of dispute resolution. It is
regarding disputes arising out of commercial transactions conducted across national boundaries and it allows the
parties to bypass litigation in their national courts. The aim of the researcher is to understand how the position of
London as the favoured seat of Arbitration will change after Brexit. Secondly, the paper also focuses on the use
of international arbitration as a tool to solve investor-state disputes.
The present paper was analysed through the non-doctrinal research methodology and empirical and
descriptive method of research was used. The present analysis was made through random sampling method
where the survey was taken from common public, professionals, etc through a structured questionnaire. The
sample size in the present analysis is 1669 samples. The research tools used in the present paper are cross
tabulation, chi-square and frequency.
It can be concluded that the position of London as the popular seat of arbitration will not be affected as the
English Law is generally considered as the immediate choice of law for around most of the commercial
586. contracts. Secondly, as far as investor-state dispute resolution is considered, arbitration can become a popular
choice in future after the amendments were made in 2017 to make it more transparent and cost efficient. 3344-
3347
Keyword : Arbitration, Brexit, Confidentiality, Investor-State Disputes, Jurisdiction, Settlement
References:
1. Al-Nuemat, Ahmed, and Abdullah Nawafleh. “Brexit, Arbitration and Private International Law.” Journal of Politics and Law, vol.
10, no. 5, 2017, p. 116, doi:10.5539/jpl.v10n5p116.
2. Born, Gary. International Commercial Arbitration: Commentary and Materials. Transnational Pub Incorporated, 2001.
3. “Contracts: Validity of Arbitration Agreement.” Michigan Law Review, vol. 23, no. 8, 1925, p. 911, doi:10.2307/1278877.
4. Friedland, P. D. “The Law and Practice of International Commercial Arbitration by Alan Redfern and Martin Hunter.” Arbitration
International, vol. 4, no. 1, 1988, pp. 76–79, doi:10.1093/arbitration/4.1.76.
5. “London Will Remain Seat of Arbitration, despite Brexit.” The Peninsula Qatar, 3 Apr. 2019,
https://thepeninsulaqatar.com/article/03/04/2019/London-will-remain-seat-of-arbitration,-despite-Brexit.
6. Noussia, Kyriaki. Confidentiality in International Commercial Arbitration. 2010, doi:10.1007/978-3-642-10224-0.
7. The Economist. “The Arbitration Game.” The Economist, The Economist, 2014, https://www.economist.com/finance-and-
economics/2014/10/11/the-arbitration-game.
8. Unctad-Ictsd, and UNCTAD-ICTSD. “Dispute Settlement.” Resource Book on TRIPS and Development, pp. 651–704,
doi:10.1017/cbo9780511511363.034.

Authors: Gowri Manohari P, Sreeya B

Paper Title: Public Opinion on Problem Solving Skills


Abstract: Problem Solving may incorporate scientific or deliberate tasks and can be a measure of a person's
basic reasoning aptitudes. Critical thinking in brain science alludes to the way toward discovering answers for
issues experienced in life. Solutions to these issues are typically circumstance or setting particular. Problem
solving enables people to take a gander at circumstances from numerous sides, and after that envision a few
distinctive approaches to react. This open procedure of reasoning presents thoughts and arrangements that grow
the open doors for progress. The main objective of this study is to know about the problem-solving skills among
the people. For the purpose of this study descriptive research is used to portray accurately the public opinion on
problem solving skills. Convenient sampling method is used to collect the samples. 1859 samples - sample size.
Independent variables are gender, educational qualification, age. Dependent variables are Problem solving
process, choice of overcoming the problem, mean of level of agreeability towards Problem solving skills.
Independent sample t test, chi square and ANOVA are the research tools used in this research. The findings of
this study suggests that Problem solving ability is fundamental for everybody to prevail in their day to day life. It
587. is concluded that each and every person should develop problem solving skill in them in order find solution for
the problems they face in their life. Solving our problems then and there will help us to lead a peaceful life.
3348-
3350
Keyword : problems, problem solving, skill, evaluation, overcoming, solution.
References:
1. Arma?an, Fulya Öner, ?afak Uluç?nar Sa??r, and Ay?e Yalç?n Çelik. 2009. "The Effects of Students' Problem Solving Skills on
Their Understanding of Chemical Rate and Their Achievement on This Issue." Procedia - Social and Behavioral Sciences 1 (1):
2678-84.
2. Baird, Leonard L. 1982. "Review of Problem Solving Skills," November. https://onlinelibrary.wiley.com/doi/pdf/10.1002/j.2330 -
8516.1983.tb00016.x.
3. Bernik, Mojca, and Jasmina Žnidarši?. 2012. "Solving Complex Problems with Help of Experiential Learning." Organizacija 45
(3): 117-24.
4. Brockman, Julie l. 2003. "The Problem with Problem-Solving Training in Industry."
https://core.ac.uk/download/pdf/46954952.pdf.
5. Hämäläinen, Raija, Bram De Wever, Kari Nissinen, and Sebastiano Cincinnato. n.d. "Understanding Adults' Strong Problem -
Solving Skills Based on PIAAC." Journal of Workplace Behavioral Health, 537-53.
6. Heppner, P. Paul, and P. Paul Heppner. 1978. "A Review of the Problem-Solving Literature and Its Relationship to the
Counseling Process." Journal of Counseling Psychology 25 (5): 366-75.
7. Ji Young Kim , Dae Soo Choi, Chang-Soo Sung and Joo Y. Park. n.d. "The Role of Problem Solving Ability on Innovative
Behavior and Opportunity Recognition in University Students." Journal of Open innovation:Technology,Market and Complexity.
https://doi.org/10.1186/s40852-018-0085-4.
8. Karakaya, Abdullah, and Kasim Y?lmaz. 2013. "Problem Solving Approach at Organizational Development Activities: A
Research at Karabuk University." Procedia - Social and Behavioral Sciences 99 (November): 322-31.
9. Knippen, Jay T., and Thad B. Green. 1997. "Problem Solving." Journal of Workplace Learning 9 (3): 98-99.
10. Lisa Gueldenzoph Snyder Mark. 2008. "Teaching Critical Thinking and Problem Solving Skills." The Delta Pi Epsilon Journal.
https://www.google.co.in/url?sa=t&source=web&rct=j&url=http://reforma.fen.uchile.cl/Pape.
11. Marquardt, Michael, and Roland K. Yeo. 2012. Breakthrough Problem Solving with Action Learning: Concepts and Cases.
Stanford University Press.

Authors: Jyotsna Roja, Sreeya B

Paper Title: Public Opinion on Women Empowerment in Chennai


Abstract: Women play a very significant role from their birth till the end of their life in the Society. It is
greatly stated that “To awaken the society, it is women who have to be awakened”. Empowerment of women is
considered as empowering the whole society. Though there are many measures women are still subjected to
various societal violence and are not given proper education and freedom. The Government has taken great
initiative in empowering women through schemes like Women Helpline Scheme, Ujjawala Scheme, STEP,
Manila Sakthi Kendras. The objective of this study is to analyze the association between Government schemes
for women and educational qualifications, and to examine the level of agreement towards factors for women
empowerment among the age groups. Descriptive Research is used for the purpose of study. Convenient
sampling method is used to collect the samples. Sample size is 1540. Educational qualification, marital status
and age are the independent variables used for the purpose of the study. Government schemes, awareness on
government schemes, skill enhancement and job opportunities are the dependent variables. Chi square,
Independent sample t-test, ANOVA are used for the statistical analysis. It is observed that the opinion on
Government schemes for women depends on the educational status of the respondents, and the agreeability
towards the factors for women empowerment differs based on the age of the respondents. The society should
become open minded to change the mindset against women together with the constitutional and other legal
provisions.

588.
Keyword : Women Empowerment, Entrepreneurs, Education Awareness, Government Schemes, Challenges.
3351-
References: 3354
1. Arma?an, Fulya Öner, ?afak Uluç?nar Sa??r, and Ay?e Yalç?n Çelik. 2009. "The Effects of Students' Problem Solving Skills on
Their Understanding of Chemical Rate and Their Achievement on This Issue." Procedia - Social and Behavioral Sciences 1 (1):
2678-84.
2. Baird, Leonard L. 1982. "Review of Problem Solving Skills," November. https://onlinelibrary.wiley.com/doi/pdf/10.1002/j.2330-
8516.1983.tb00016.x.
3. Bernik, Mojca, and Jasmina Žnidarši?. 2012. "Solving Complex Problems with Help of Experiential Learning." Organizacija 45
(3): 117-24.
4. Brockman, Julie l. 2003. "The Problem with Problem-Solving Training in Industry."
https://core.ac.uk/download/pdf/46954952.pdf.
5. Hämäläinen, Raija, Bram De Wever, Kari Nissinen, and Sebastiano Cincinnato. n.d. "Understanding Adults' Strong Problem -
Solving Skills Based on PIAAC." Journal of Workplace Behavioral Health, 537-53.
6. Heppner, P. Paul, and P. Paul Heppner. 1978. "A Review of the Problem-Solving Literature and Its Relationship to the
Counseling Process." Journal of Counseling Psychology 25 (5): 366-75.
7. Ji Young Kim , Dae Soo Choi, Chang-Soo Sung and Joo Y. Park. n.d. "The Role of Problem Solving Ability on Innovative
Behavior and Opportunity Recognition in University Students." Journal of Open innovation:Technology,Market and Complexity.
https://doi.org/10.1186/s40852-018-0085-4.
8. Karakaya, Abdullah, and Kasim Y?lmaz. 2013. "Problem Solving Approach at Organizational Development Activities: A
Research at Karabuk University." Procedia - Social and Behavioral Sciences 99 (November): 322-31.
9. Knippen, Jay T., and Thad B. Green. 1997. "Problem Solving." Journal of Workplace Learning 9 (3): 98-99.
10. Lisa Gueldenzoph Snyder Mark. 2008. "Teaching Critical Thinking and Problem Solving Skills." The Delta Pi Epsilon Journal.
https://www.google.co.in/url?sa=t&source=web&rct=j&url=http://reforma.fen.uchile.cl/Pape.
11. Marquardt, Michael, and Roland K. Yeo. 2012. Breakthrough Problem Solving with Action Learning: Concepts and Cases.
Stanford University Press.

Authors: Kavya Pradeep, Sreeya B

Paper Title: Personal Preference in Choosing a Job


Abstract: Work preferences are the foundation of job satisfaction generally. People will select or confront
enhancements or decreases in essential occupation attributes. Consider the type of working environment you
want. Employees who find their job fulfilling are more likely to. Perform better at their job. Pick up new tasks
quickly and enthusiastically. Think about the nature of the work, the hours, location, job security, rate of pay,
benefits, size, type of organization, and so on. To look for some kind of employment that is the best fit for you,
589. you'll have to comprehend your work inclinations. These preferences will reflect your most important skills,
interests, and. values. Individual preference for employments has just been impressively examined in the 3355-
sociologies amid the most recent decades. Think about the skills you want to use or develop. Consider both your 3358
specific skills for work and the skills you can transfer from other parts of your life, such as organization or
strength. This research investigates about the personal preference in choosing a job . The research has collected
data from 1850 respondents by simple sampling method. The research is a descriptive research. The research
tools are independent t test, chi square, and ANOVA. Independent variables are gender, educational
qualification, and age respectively. It is concluded that most of young people choose their job through their
passion or interests, job security and reasonable salary or pay.
Keyword : Preferences, job satisfaction, organization, work environment, security, salary.
References:
1. Browne, Beverly A. 1997. "Gender and Preferences for Job Attributes: A Cross Cultural Comparison." Sex Roles 37 (1 -2): 61-71.
2. Cannata, Marisa Ann, and Roberto Penaloza. 2012. "Who Are Charter School Teachers? Comparing Teacher Characteristics, Job
Choices, and Job Preferences." Education Policy Analysis Archives 20 (0): 29.
3. "EmeraldInsight." n.d. Accessed November 9, 2018a. https://www.emeraldinsight.com/doi/abs/10.1108/JMD-09-2013-
0106?journalCode=jm.
4. ---. n.d. Accessed November 9, 2018b. https://www.emeraldinsight.com/doi/abs/10.1108/17538351111172608.
5. "Kailing Shen." n.d. Accessed November 9, 2018. http://www.nber.org/people/teddyhoney.
6. McGraw, Katherine, Jennie S. Popp, Bruce L. Dixon, and Doris J. Newton. 2012. "Factors Influencing Job Choice among
Agricultural Economics Professionals." Journal of Applied Agricultural Economics 44 (02): 251-65.
7. Meyerding, Stephan G. H. 2016. "Job Satisfaction and Preferences Regarding Job Charactereistics of Vocationals and Master
Craftsman Scholars and Horticulture Students in Germany." Review of Agricultural and Applied Economics 19 (01): 30 -49.
8. "[No Title]." n.d. Accessed November 9, 2018a. https://ageconsearch.umn.edu/bitstream/254149/2/RAAE_1_2016_Meyerding.pdf.
9. ---. n.d. Accessed November 9, 2018b. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.418.8395&rep=rep1&type=pdf.
10. ---. n.d. Accessed November 9, 2018c. http://zeynepaycan.net/doc/j20.pdf.
11. Rothe, Peggie, Anna?liisa Lindholm, Ari Hyvönen, and Suvi Nenonen. 2012. "Work Environment Preferences - Does Age Make a
Difference?" Facilities 30 (1/2): 78-95.
12. "SAGE Journals: Your Gateway to World-Class Journal Research." n.d. SAGE Journals. Accessed November 9, 2018a.
http://journals.sagepub.com/doi/abs/10.1177/0950017012451633.
13. ---. n.d. SAGE Journals. Accessed November 9, 2018b. http://journals.sagepub.com/doi/abs/10.2466/pr0.1987.61.3.983.
14. "ScienceDirect." n.d. Accessed November 9, 2018. https://www.sciencedirect.com/science/article/pii/S2212567115004864.
15. Taylor, Dorceta. 2007. "Employment Preferences and Salary Expectations of Students in Science and Engineering." Bioscience 57
(2): 175-85.
16. "Website." n.d. Accessed November 9, 2018a. https://journals.aom.org/doi/abs/10.5465/255637?journalCode=amj.
17. ---. n.d. Accessed November 9, 2018b. https://repositories.iscte-
iul.pt/bitstream/10071/13705/1/Disserta%C3%A7%C3%A3o%20de%20Mestrado%20-%20Marta%20Almeida.pdf.
18. ---. n.d. Accessed November 9, 2018c. http://www.educationforhealth.net/article.asp?issn=1357-
6283;year=2008;volume=21;issue=3;spage=164;epage=164;aulast=Modipa.
19. ---. n.d. Accessed November 9, 2018d.
https://www.researchgate.net/publication/236651468_Job_Selection_Preferences_Of_Business_Students.
20. ---. n.d. Accessed November 9, 2018e. http://psycnet.apa.org/record/1968-16189-001.

Authors: Keerthana Ganapathy, Sreeya B

Paper Title: Public Opinion on Involvement of Youngsters in Drug Abuse


Abstract: This study uses a functional overview to examine the reasons why young people consume
drugs. Drug conception were found to differ by age and gender. Targeting substances that are concluded to fulfil
similar problems and addressing issues treating the substitution of one substance for another may also strengthen
education and prevention efforts. Drug abuse has been a topic of interest to many professionals in the area of
physical health and mental health. This research paper is to analyse the difference between the helpline for drug
abuser’s and gender and to find the association between major reason for drug abuse and age of the respondents.
It examines research in India regarding drug abuse among youngsters and related disorders. The objective of the
study is to understand the involvement of youngsters in drug abuse and to analyse the difference between the
helpline for drug abuser’s and the gender. For the purpose of this study is descriptive research is used to portray
accurately the public opinion on involvement of youngsters in drug abuse. Convenient sampling method is used
to collect the samples. 1640 samples-sample size. Independent variables are gender, age, marital status,
Educational qualification, occupation, and monthly income. The dependent variables are helpline for drug
abuser, reason for drug abuse, emotional problems, accidents, brain damage, risky sex, and diseases.
Independent sample t test, chi square, and ANOVA are the research tools used in this research. It was found that
drug abuse is increasing in todays scenario. It is better to create awareness and helplines regarding drug abuse
590. and its recovery.
3359-
Keyword : drug, youngsters, issues, research, reason, alcohol, substance abuse, India. 3361
References:
1. Abuse, U. S. Department of Health And Human Services; National Institute on Drug, and US Department of Health and Human
Services; National Institute on Drug Abuse. 2004. "Prevention Program Curbs Drug Abuse Among Middle-School Youth."
PsycEXTRA Dataset. https://doi.org/10.1037/e493042006-003.
2. Abuse, U. S. Department of Health &. Human Services; National Institute on Drug, and US Department of Health & Human
Services; National Institute on Drug Abuse. 2002. "Inhalant Abuse Among Young People." PsycEXTRA Dataset.
https://doi.org/10.1037/e300492003-013.
3. Ashery, Rebecca Sager, Elizabeth B. Robertson, and Karol Linda Kumpfer. 1998. Drug Abuse Prevention Through Family
Interventions. DIANE Publishing.
4. Baratvand, Mahmood, Mansour Soodani, Eghbal Zarei, and Abdolrahim Asadollahi. 2013. "Sexual Abuse and Drug Abuse
Among Homeless Children in Ahvaz, Iran." Child Abuse Review. https://doi.org/10.1002/car.2263.
5. Beatty, Lula A., and US Department of Health and Human Services; National Institute on Drug Abuse. 1997. "Introduction: Drug
Abuse Among Rural Ethnic and Migrant Populations." PsycEXTRA Dataset. https://doi.org/10.1037/e495612006-019.
6. Beschner, George M. 1979. Youth Drug Abuse: Problems, Issues, and Treatment. Free Press.
7. Beschner, George M., and Alfred S. Friedman. 1986. Teen Drug Use. Free Press.
8. Brizer, David A. 1993. "Religiosity and Drug Abuse among Psychiatric Inpatients." The American Journal of Drug and Alcohol
Abuse. https://doi.org/10.3109/00952999309001623.
9. Burt, Marvin R. 1981. "Prevalence and Consequences of Drug Abuse among U.S. Military Personnel: 1980." The American
Journal of Drug and Alcohol Abuse. https://doi.org/10.3109/00952998109016928.
10. Castillo, Kassandra. 2009. The Causes That Lead Teenagers to Drug and Alcohol Abuse. GRIN Verlag.
11. Cox, Terrence Charles, and Addiction Research Foundation of Ontario. 1983. Drugs and Drug Abuse: A Reference Text.
12. Dhawan, B. N., and US Department of Health and Human Services; National Institute on Drug Abuse.1987. "Drug Abuse in
India: Progress in Research." PsycEXTRA Dataset. https://doi.org/10.1037/e496672006-016.
13. Dube, K. C. 1972. "Patterns of Drug Abuse in India." Drug Abuse. https://doi.org/10.1007/978-1-4684-3210-7_13.
14. Fodor Miklós, and Sófi Gyula. 2015. "[The dangers of drug career in young people]." Orvosi hetilap 156 (46): 1843-46.
15. Global Youth Network, United Nations Office on Drugs and Crime, and World Health Organization. 2006. Monitoring and
Evaluating Youth Substance Abuse Prevention Programmes. United Nations Publications.
16. Grabowski, John. 1994. Cocaine: Pharmacology, Effects, and Treatment of Abuse. DIANE Publishing.
17. Institute of Medicine, and Committee on Opportunities in Drug Abuse Research. 1996. Pathways of Addiction: Opportunities in
Drug Abuse Research. National Academies Press.
18. Md, National Institute on Drug Abuse Div of Resource Development Hew Alcohol Drug Abuse &. Mental Health Administration
Rockville, National Institute on Drug Abuse, Div of Resource Development, HEW, Alcohol, Drug Abuse & Men tal Health
Administration, and Rockville. 1978. "Phencyclidine Use among Youths in Drug Abuse Treatment." PsycEXTRA Dataset.
https://doi.org/10.1037/e447212004-001.
19. Nelson, David Erik. 2010. Teen Drug Abuse. Greenhaven Press, Incorporated.
20. Schydlower, Manuel, and Rodolfo M. Arredondo. 2006. Substance Abuse Among Adolescents. W B Saunders Company.
21. "Smoking Habit among Youngsters." 2018. Journal of Addiction and Prevention. https://doi.org/10.13188/2330-2178.1000042.
22. Trevino, Roberto A., and Alan J. Richard. 2002. "Attitudes towards Drug Legalization among Drug Users." The American
Journal of Drug and Alcohol Abuse. https://doi.org/10.1081/ada-120001283.
23. United Nations Office on Drugs and Crime. 2004. Schools: School-Based Education for Drug Abuse Prevention. United Nations
Publications.
24. Waters, Rosa. 2014. Alcohol & Tobacco. Simon and Schuster.

Authors: Samrin Sulaiman, Sreeya B

Paper Title: Public Awareness on Cyber Crime with Special Reference to Chennai
Abstract: With the rapid advancements in technology, our lives have become completely digitalised. We sit
in the comfort of our home, and carry out our day-to-day activities like grocery shopping, education, banking,
through the Internet. However, this has given rise to several threats to our security, called the cyber-crime which
has become a global concern. Cybercrimes affect the lives of millions of people all around the world, including
businesses, organisations and governments of different nations. This paper aims to determine the association
between cybercrime awareness and the age, and to identify the difference between main cause of cybercrime and
the gender. Descriptive research has been carried out which helps us to understand the characteristics of an
individual or a group. The sampling method used here is convenient sampling where the samples have been
chosen based on ease of access of availability. The sample size is 1540. Age, Gender and Occupation are the
independent variables. Cyber-crime awareness, the main cause of cybercrime and the most popular cyber-crime
are the dependent variables used here. The tools used here are Chi-Square, Independent Sample t test and
ANOVA. It was found that there is a significant association between the cyber-crime awareness and the age of
the respondent and that there is no significant difference between the main cause of cyber-crime and gender.
With the rapid rise in the rate of cyber-crimes, it is imperative that the government provide the people with more
effective ways of cyber security in order to protect the society.

Keyword : Cyber-crime, Cyber terrorism, Cyber Security, Cyber Laws, Public awareness.
References:
591. 1. Hannarae Lee, Hyeyoung Lim, Awareness and Perception of Cyber Crimes and Cyber Criminals, International Journal of
Cybersecurity Intelligence & Cybercrime, 2019, Vol 2, Issue 1, Page 1-3 (Hannarae Lee 2019) 3362-
2. Er. Navneet Kaur, Introduction of Cyber Crime and its Type, International Research Journal of Computer Science, ISSN: 2393 -
9842, 2018, Vol 5, Issue 8, Page 435- 439(Kaur 2018) 3364
3. Muhammad Dharma Tuah Putra Nasution, Andysah Putera Utama Siahann, Yossie Rossanty, Solly Aryza, The Phenomenon of
Cyber Crime and Fraud Victimisation In Online Shop, International Journal of Civil Engineering and Technology, ISSN: 0976-
6316, 2018, Vol 9, Issue 6, Page 1583- 1592 (Siahaan and Muhammad Dharma Tuah, n.d.)
4. Kyung-Shick Choi, Claire Seunguen Lee, The Present and Future of Cybercrime, Cyberterrorism and Cybersecurity, International
Journal of Cybersecurity Intelligence & Cybercrime, 2018, Vol 1, Issue 1, Page 1-4(Kyung-Shick Choi 2018)
5. K. Jaishankar, Cyber Criminology as an Academic Discipline: History, Contribution and Impact, International Journal of Cyber
Criminology, ISSN: 0973-5089, 2018, Vol 12, Issue 1, Page 1-8(Jahankhani 2018)
6. Juneed Iqbal, Bilal Maqbool Beigh, Cybercrime in India: Trends and Challenges, International Journal of Innovation &
Advancement in Computer Science, ISSN: 2347-8616, 2017, Vol 6, Issue 12, Page 187- 196(Juneed Iqbal 2018)
7. Dambo Itari, Ezimora Okezie Anthony, Nwanyanwu Mercy, Cyber Space Technology: Cyber Crime, Cyber Security and Models
of Cyber Solution, a Case Study of Nigeria, International Journal of Computer Science and Mobile Computing, ISSN: 2320 -
088X, 2017, Vol 6, Issue 11, Page 94- 113(Dambo Itari, Ezimora Okezie Anthony, Nwanyanwu Mercy 2017)
8. Johannes Xingan Li, Cyber Crime and Legal Countermeasures: A Historical Analysis, Official Journal of the South Asian Society
of Criminology and Victimology, ISSN: 0973- 5089, 2017, Vol 12, Issue 2, Page 196- 207(Li 2017)
9. Animesh Sarmah, Roshmi Sarmah, Amlan Jyothi Baruah, A brief study on Cyber Crime and Cyber Laws of India, International
Research Journal of Engineering and Technology, ISSN: 2395- 0056, 2017, Vol 4, Issue 6, Page 1633- 1641(Animesh Sarmah,
Roshmi Sarmah, Amlan Jyothi Baruah 2017)
10. Michael L. Gross, Daphna Canetti, Dana R. Vashdi, Cyber Terrorism: It's Effects on Psychological Well- Being, Public
Confidence and Political Attitude, Journal of Cyber Security, DOI: 10.1093, 2017, Vol 3, Issue 1, Page 49-58(Gross, n.d.)
11. Aparna Srivastava, Analyzing Cyber Crime & Cyber Laws in India, VSRD International Journal of Technical & Non- Technical
Research, ISSN: 0976- 7967, 2017, Vol 3, Issue 2, Page 44- 46(Srivastava 2017)
12. Anuraj Singh, Studies Report on Cyber Law in India & Cybercrime Security, International Journal of Innovative Research in
Computer and Communication Engineering, ISSN: 2320- 9801, 2017, Vol 5, Issue 6, Page 11273- 11279(Singh 2017)
13. Jitender Kumar, Cyber Crime in India: An Overview, Imperial Journal of Interdisciplinary Research, ISSN: 2454? 1362, 2017,
Vol 3, Issue 4, Page a963- 967(Kumar 2017).

Authors: A. Thamilmaran, M. Kowsalya


592. Voltage Control using Artificial Neural Network in A DC/AC Microgrid with Distributed
Paper Title:
Generation
Abstract: Microgrid is gaining importance and attraction by researchers all over the world as a replacement
for conventional grid especially in the remote areas. But due to the continuously varying nature of the
renewable energy sources as well as the load, the control of microgrid is a vital task both in standalone mode and
grid connected mode. This paper investigates the application of Artificial Neural Network (ANN) for Voltage
control in a DC/AC microgrid. The system considered consists of PV, boost converter and an Inverter. The
triggering pulse for the boost converter connected to the PV system is obtained by the ANN which is trained to
track the maximum power point (MPP) under variable insolation as well as variable temperature conditions.
Compared to other conventional methods, ANN trained MPPT is able to track the changes in the load with lesser
oscillations and peak overshoot. Also this paper investigates the control of inverter in the grid forming mode by
applying ANN. The performance and the stability of the microgrid is enhanced by adopting additional control
strategies like getting the reference current signal also from the AC grid, feeding the integration of error signals
along with the error themselves as well as by giving the disturbance voltage at the ANN output for better control.
The result shows that the ANN controlled inverter is able to maintain the voltage at the required nominal value
following the disturbance..

Keyword : Microgrid, PV, ANN, MPPT, Inverter control.


References:
42. Lasseter RH. Microgrids distributed power generation. IEEE Power Engineering Society Winter Meeting, Vol. 1, Columbus, Ohio,
2001; pp 146–149.
43. Ali Bidram and Ali Davoudi. Hierarchical Structure of Microgrids Control System IEEE Transactions on Smart Grid, Vol. 3, No. 4,
2012; pp 1963 – 1973.
44. Magdi S. Mahmoud and S. Azher Hussain. Adaptive PI secondary control for smart autonomous microgrid systems. Int. J. Adapt.
Control Signal Process. Vol. 29. 2015; pp. 1442–1458
45. Vasquez JC, Guerrero JM, Miret J, Castilla M, De Vicuna LG. Hierarchical control of intelligent microgrids. IEEE Industrial Electronics
Magazine. Vol.4, No.4, 2010; pp. 23-29
46. M.S. Mahmoud, S.Azher Hussain, M.A.Abido. Modeling and control of microgrid: An overview. Journal of the Franklin Institute. Vol.
351, 2014; pp. 2822–2859
47. S. Li, T. A. Haskew, Y. Hong, and L. Xu. Direct-current vector control of three-phase grid-connected rectifier-inverter. Electric Power 3365-
Syst. Res., Vol. 81, No. 2, 2011; pp. 357–366. 3371
48. S. Li, T. A. Haskew, and L. Xu. Control of HVDC light systems using conventional and direct-current vector control approaches. IEEE
Trans. Power Electronics, Vol. 25, No. 12, 2010; pp. 3106–3118.
49. T. Noguchi, H. Tomiki, S. Kondo, and I. Takahashi. Direct power control of PWM converter without power-source voltage sensors.
IEEE Transactions on Industrial Applications, Vol. 34, No. 3, 1998; pp. 473–479.
50. J. C. Moreno, J. M. Espí Huerta, R. G. Gil, and S. A. González. A robust predictive current control for three-phase grid-connected
inverters. IEEE Transactions on Industrial Electronics, Vol. 56, No. 6, 2009; pp. 1993–2004.
51. J. M. Espí Huerta, J. Castelló-Moreno, J. R. Fischer, and R. García-Gil, “A synchronous reference frame robust predictive current
control for three-phase grid-connected inverters,” IEEE Trans. Ind. Electron., vol. 57, no. 3, pp. 954–962, Mar. 2010.
52. H. Bevrani, F. Habibi, P. Babahajyani, M. Watanabe, and Y. Mitani. Intelligent Frequency Control in an AC Microgrid: Online PSO-
Based Fuzzy Tuning Approach, IEEE Transactions on Smart Grid. Vol.3, No. 4, 2012; pp 1935 – 1944.
53. Messalti S, Harrag AG, Loukriz AE. A new neural networks MPPT controller for PV systems. The Sixth International Renewable
Energy Congress 2015 Mar 24; pp. 1-6.
54. Haji D, Genc N. Fuzzy and P&O Based MPPT Controllers under Different Conditions. 7th International Conference on Renewable
Energy Research and Applications, 2018 Oct 14 pp. 649-655.
55. Hsiao YT, Chen CH. Maximum power tracking for photovoltaic power system. IEEE Industry Applications Conference. 37th IAS
Annual Meeting, 2002 Oct 13 , Vol. 2, pp. 1035-1040
56. Femia N, Petrone G, Spagnuolo G, Vitelli M. Optimization of perturb and observe maximum power point tracking method. IEEE
transactions on power electronics. 2005 Jul 5;20(4):963-73
57. Hohm DP, Ropp ME. Comparative study of maximum power point tracking algorithms using an experimental, programmable,
maximum power point tracking test bed. Twenty-Eighth IEEE Photovoltaic Specialists Conference-2000, Sep 15; pp. 1699-1702.
58. Rajani SV, Pandya VJ. Simulation and comparison of perturb and observe and incremental conductance MPPT algorithms for solar
energy system connected to grid. Sadhana. Feb 2015, Vol. 40, No.1; pp. 139-153.
59. Messalti S, Harrag AG, Loukriz AE. A new neural networks MPPT controller for PV systems. The Sixth International Renewable
Energy Congress 2015 Mar 24 ;pp. 1-6.
60. Arnold Reynaldi, Samuel Lukas, Helena Margaretha. Backpropagation and Levenberg Marquardt Algorithm for Training Finite Element
Neural Network. UKSim-AMSS 6th European Modelling Symposium, 2012; pp. 89-94.
61. J. Rocabert, G. M. S. Azevedo, A. Luna, J. M. Guerrero, J. I. Candela, and P. Rodíguez. Intelligent connection age nt for three-phase
grid connected microgrids. IEEE Trans. Power Electronics, vol. 26, no. 10, 2011; pp. 2993–3005.
62. A. Timbus, R. Teodorescu, F. Blaabjerg, and M. Liserre. Synchronization methods for three phase distributed power generation systems
- An overview and evaluation. 36th IEEE Power Electron. Specialists Conf., Jun. 2005, pp. 2474–2481.
63. Li S, Fairbank M, Johnson C, Wunsch DC, Alonso E, Proao JL. Artificial neural networks for control of a grid -connected
rectifier/inverter under disturbance, dynamic and power converter switching conditions. IEEE transactions on neural networks and
learning systems. Vol. 25, No. 4, 2013; pp 738-750.

Authors: K.S.Aishwarya Lakshmi, Aruna A.R

Paper Title: An Empirical Research on Influence of Quality in Product Purchase


Abstract: Customers perceive that quality is a significant property in products and providers perceive that
quality can be a significant differentiator between their own contributions and those contenders. The main
593. objective of the study if to identify whether the quality has bearing on purchase of products and reputation of the
company. The data for the study is collected through the primary and secondary sources. . Questionnaire is used
3372-
as the primary data collection and the article, journals, reports, newsletter are considered as the secondary
3374
sources .Convenience sampling method is used and the sample size is 926. The data collected are analyzed using
SPSS. From analysis, it was found that quality plays a key role in product purchase and also maintaining
company reputation. Also, it is found that there is a significant difference between the reputation of a company
depends on the quality of the product and the educational qualification and there is a significant association
between the person who is responsible for the defect of quality and age. Thus, quality products make a
significant commitment to long haul income and benefit

Keyword : Quality, Product, Manufacturing, Customers, Perceptions


References:
1 “CHAPTER III. TRANSPORTATION COSTS AND MANUFACTURING INDUSTRIES.” Location Theory and the Shoe and
Leather Industries, doi:10.4159/harvard.9780674498624.c5.
2 Creese, Robert, and M. Adithan. Estimating and Costing for the Metal Manufacturing Industries. CRC Press, 1992.
3 Duncanson, L., et al. “The Importance of Consistent Global Forest Aboveground Biomass Product Validation.” Surveys in
Geophysics, vol. 40, no. 4, May 2019, pp. 979–99.
4 Gumprecht, R. O. Plutonium Product Quality. 1954, doi:10.2172/87792.
5 Guo, Hongye, et al. “Quality Evaluation of Based on PUFAs Using HPLC Fingerprint Techniques Combined with Chemometric
Methods.” Foods (Basel, Switzerland), vol. 8, no. 8, Aug. 2019, doi:10.3390/foods8080322.
6 Hansen, Teis, and Lars Winther. “Manufacturing in the Knowledge Economy: Innovation in Low-Tech Industries.” Handbook of
Manufacturing Industries in the World Economy, pp. 439–50, doi:10.4337/9781781003930.00040.
7 Information Technology. Software Product Quality. doi:10.3403/02304484.
8 Jhang, Kwang-Soo. Productivity Performance in Korean Manufacturing Industries. doi:10.31274/rtd-180817-6600.
9 Keel, Keith. Occupational Employment in Manufacturing Industries. 1991.
10 Kenyon, George N., and Kabir C. Sen. The Perception of Quality: Mapping Product and Service Quality to Consumer
Perceptions. Springer, 2014.
11 Kincade, Doris H. Sewn Product Quality: A Management Perspective. Prentice Hall, 2007.
12 Manyeula, F., et al. “Partial Replacement of Soybean Products with Canola Meal in Indigenous Chicken Diets: Size of Internal
Organs, Carcass Characteristics and Breast Meat Quality.” Poultry Science, Aug. 2019, doi:10.3382/ps/pez470.
13 Martynova, Olha. “Aspects Of Product Quality Control: Determination Of Quality Components And Product Quality Factor.”
Social and Natural Sciences Journal, vol. 2, 2011, doi:10.12955/snsj.v2i0.271.
14 Okada, Yosuke. Competition and Productivity in Japanese Manufacturing Industries. 2005, doi:10.3386/w11540.
15 Pastor-Moreno, Guadalupe, et al. “Intimate Partner Violence During Pregnancy and Risk of Fetal and Neonatal Death: A Meta-
Analysis with Socioeconomic Context Indicators.” American Journal of Obstetrics and Gynecology, Aug. 2019,
doi:10.1016/j.ajog.2019.07.045.
16 Secretariat, Commonwealth, and Commonwealth Secretariat. An Overview of Manufacturing Industries. 1979,
doi:10.14217/9781848592889-8-en.
17 Shewhart, Walter Andrew. Economic Control of Quality of Manufactured Product. ASQ Quality Press, 1931.
18 Shimbun, Nikkan Kogyo. Poka-Yoke: Improving Product Quality by Preventing Defects. CRC Press, 1989.
19 Xu, Wenxuan, et al. “Understanding the Spatial-Temporal Patterns and Influential Factors on Air Quality Index: The Case of
North China.” International Journal of Environmental Research and Public Health, vol. 16, no. 16, Aug. 2019,
doi:10.3390/ijerph16162820.
20 Yadav, Vibhu, et al. “Regulatory Approval Process for Advanced Dressings in India: An Overview of Rules.” Journal of Wound
Care, vol. 28, no. Sup8, Aug. 2019, pp. S32–42.

Authors: S. Selvaraju, Asha Sundaram

Paper Title: Research on Causes of Job Stress for Workers of Non-Public Sector Banks
Abstract: The most important and critical organizational factor that affects the performance of workers of
banking business is Job stress. The role conflict, role ambiguity, role overload, job difficulty, role stagnation
and lack of group cohesiveness are significantly and moderately correlated with the level of job stress of workers
in non-public sector banks. Hence, the non-public sector banks should provide needed information to their
workers to carry out their responsibilities and workers must prioritize their role. The non-public sector banks
should clearly define the role of each and every employee and must make interactions among roles of all the
workers and the work load of workers should be reduced through additional recruitment of workers or sharing
workload among bank workers.

Keyword : Workers, Job stress, non-public sector banks

594. References:
1 Vishal Samartha, Vidyavathi, and Mustiary Begum, (2013), “Regression Analysis of Stress - A eomparative Study of Workers in
Public and Non-public sector Banks”, EXCEL International Journal of Multidisciplinary Management Studies, 3(7):pp.68-76. 3375-
2 Sharmin Akther, Silvia Akter, and Md. Kafil Uddin,(2017), “Factors Influencing Job Stress in Privatized Banks of Bangladesh”, 3379
Sona Global Management Review, 11(1):pp. 1-17.
3 Shavita Dhankar,(2015), “Job stress in Banking Sector”, International Journal of Applied Research, 1(8): pp. 132-135.
4 Sharmila, A., and Poornima, J.,(2012), “A Study on Employee Stress Management in Selected Private Banks in Salem”, Elixir
International Journal of Business Management, 42(1): pp. 6555-6558.
5 Rajeshwari, T.R., (1992), “Employee Stress: A Study with Reference to Bank Workers”, Indian Journal of Industrial Relations,
27(4): pp. 419-429.
6 Niharika, and Kiran, U.V.,(2014), “Job stress among Bank Workers”, European Academic Research, 2(4):pp.5404 -5411.
7 Manshor, A. T., Fontaine, R., and Choy Chong Siong,(2003), “Job stress among Managers: A Malaysian Survey”, Journal of
Managerial Psychology, 18(6): pp 622-628.
8 Khan, A., Ramzan, M., and Butt, M.S.,(2013), “Is Job Satisfaction of Islamic Banks Operational Staff Determined through
Organizational Climate, Job stress, Age and Gender”, Journal of Business Studies Quarterly,4(3):pp.14-36.
9 Crandall, R., and Perrewe, P. L., (1995), “Job stress: A Handbook”, CRC Press, New York, pp. 19-21.
10 Bano, B., and Jha, R., (2012), “Organizational Role Stress among Public and Private sector Workers”, The Lahore journal of
business, 12(1):pp. 23-26.
11 Anamika, (2016), “Stress and Job Satisfaction level among Government and Non-public sector Bank Workers: a Study on Urban
Area in Patna India”, The International Journal of Indian Psychology, 4(1):pp. 120-127.

Authors: K.Sukraj, T.Yuvaraj, R. Hariharan, M. Thirumalai


595.
Paper Title: Optimization of the Size of Dstatcom System Based on Data – Driven Control Design
Abstract: This paper elaborates on a Distributed Static Synchronous Compensator (DSTATCOM). It
renders a setup of hardware which provides compensation of power along with the optimization of the size of
DSTATCOM set up. This DSTATCOM hardware set up reduces the power loss through compensation of
power, regulates the voltage profile and increases the power factor. The performance of the DSTATCOM for
linear and non-linear loads was simulated.

Keyword : DSTATCOM, Optimization Data Driven Control, Linear and Non-linear Loads.
3380-
References: 3381
1. Yuvaraj, T., K. Ravi, and K. R. Devabalaji. “DSTATCOM allocation in distribution networks considering load variations using
bat algorithm”, Ain Shams Engineering Journal 8.3 (2017): 391-403.
2. Yuvaraj, T., K. R. Devabalaji, and K. Ravi “Optimal placement and sizing of DSTATCOM using harmony search algorithm”,
Energy Procedia 79 (2015): 759-765.
3. N. N. V. Surendra Babu, and B.G. Fernandes, " Cascaded Two Level Inverter- Based Multilevel ST ATCOM for High-Power
Applications," IEEEE Trans. Power Delivery., vol. 29, no. 3, pp. 993-1001, June. 2014.
4. Hirofumi Akagi, Shigenori Inoue and Tsurugi Yoshii, "Control and Performance of a Transformerless Cascade PWM STATCOM
With Star Contiguration," IEEE Trans. Ind. Appl., vol. 43, no. 4, pp. 1041-1049, July/ August 2007.
5. Devabalaji, K. R., et al. “Power loss minimization in radial distribution system”, Energy Procedia 79 (2015): 917-923.

Authors: A. George Maria Selvam, R. Janagaraj, Mary Jacintha

Paper Title: Stability, Bifurcation, Chaos : Discrete Prey Predator Model with Step Size
Abstract: In this work titled Stability, Bifurcation, Chaos: Discrete prey predator model with step size, by
Forward Euler Scheme method the discrete form is obtained. Equilibrium states are calculated and the stability
of the equilibrium states and dynamical nature of the model are examined in the closed first quadrant with the
help of variation matrix. It is observed that the system is sensitive to the initial conditions and also to parameter
values. The dynamical nature of the model is investigated with the assistance of Lyapunov Exponent, bifurcation
diagrams, phase portraits and chaotic behavior of the system is identified. Numerical simulations validate the
theoretical observations.

Keyword : Population Dynamics, Discrete Time, Fixed points, Stability, Bifurcation theory, Lyapunov
Exponent, Chaos.
References:
1. T.Agrawal, M.Saleem, “Complex dynamics in a ratio-dependent two-predator one-prey model,” Comput. Appl. Math., vol.34, 2015,
596. pp.265-274.
2. H. Baek, “Complex Dynamics of a Discrete-Time Predator-Prey system with Ivlev Functional Response,” Mathematical Problems in
Engineering, vol.2018, Article ID 8635937, 2018, 15 pages. 3382-
3. E. A. Bender, “An Introduction to Mathematical Modeling.” University of California, San Diego. 3387
4. Carmen Chicone, “An invitation to Applied Mathematics: Differential Equations, Modeling, and Computation,” Academic Press,
London, UK.
5. J. David Logan, “A First Course in Differential Equations,” Second Edition, Springer, New York, 2011.
6. Q. Din, “Complexity and chaos control in a discrete-time preypredator model,” Communications in Nonlinear Science and Numerical
Simulation, vol. 49, 2017, pp. 113–134.
7. S. Elaydi, “An Introduction to Difference Equations,” Third Edition, Springer International Edition, First Indian Reprint, 2008.
8. A. Elsadany, “Dynamical complexities in a discrete-time food chain,” Computational Ecology and Software, vol.2, no. 2, 2012,
pp.124-139.
9. A. Elsadany, H. A. EL-Metwally, E. M. Elabbasy, H. N. Agiza, “Chaos and bifurcation of a nonlinear discrete prey-predator system,”
Computational Ecology and Software, vol. 2, no.3, 2012, pp.169-180.
10. George Maria Selvam, R. Janagaraj and P. Rathinavel, “A Discrete Model of Three Species Prey – Predator System,” International
Journal of Innovative Research in Science, Engineering and Technology(IJIRSET), Vol.4, no.1, 2015, pp.18576 – 18584.
11. X. Liu, D. Xiao, “Complex dynamic behaviors of a discrete-time predator - prey system,” Chaos, Solitons and Fractals, vol.32, 2007,
pp.80 – 94.
12. J. D. Murray, “Mathematical Biology I: An Introduction,” 3-e, Springer International Edition, 2004.
13. M. Reni Sagaya Raj, A. George Maria Selvam and R. Janagaraj, “Stability in a Discrete Prey - Predator Model,” International Journal
of Latest Research in Science and Technology, vol. 2, no.1, 2013, pp.482-485.
14. B.D.Zheng, L.J.Liang, C.R.Zhang, “Extended Jurt criterion,” Science China Math., vol.53, no.4, 2010, pp.1133-1150.

Authors: Dasharathraj K Shetty, B.H.S. Thimmappa, Namesh Malarout


Software Architecture System to Automate the Admission Process in the Higher Education
Paper Title:
Institutions
Abstract: The admission process in the higher education system is one of the most tedious methods for
parents and their wards. The common issues faced by them include confusion in the choice of the curriculum,
equal care of individuals and the opportunities before them. The development of simple, scalable, and
economical methods for admission process is the first step to realize their potential applications. Rational design
597. and scalable approaches will enable an integrated system with multiple functionalities and broader applications.
This paper proposes a software architecture model with several productivity features that uses the latest 3388-
technologies to reduce inconveniences faced by applicants and their parents during the admission process. The 3393
application of this alternate model, adopting artificial intelligence-based technologies and its proper
implementation can also minimize workforce and accelerate the admission process.

Keyword : Internet of Things (IoT); Near Field Communication (NFC); Radio-frequency Identification
(RFID); Automatic Identification and Data Capture (AIDC); Biometrics; Virtual Reality (VR); Internet Protocol
version 6 (IPv6)
References:
1. Augello, A., Pilato, G., Vassallo, G., & Gaglio, S. (2014). Chatbots as Interface to Ontologies. Advances in Intelligent Systems And
Computing, 285-299. doi: 10.1007/978-3-319-03992-3_20.
2. Bricken, M., & Byrne, C. (1993). Summer Students in Virtual Reality. Virtual Reality, 199-217. doi: 10.1016/b978-0-12-745045-
2.50019-2.
3. Finkenzeller, K. (2003). RFID Handbook (3rd ed.). Newark: Wiley.
4. Gopikrishnan, M., & Santhanam, T. (2012). Improved Biometric Recognition and Identification of Human Iris Patterns Using
Neural Networks. Journal of Algorithms & Computational Technology, 6, 411-420. doi: 10.1260/1748-3018.6.3.411.
5. Government of India. (2017). All India Survey on Higher Education 2016-17, 1-45. New Delhi, Ministry of Human Resource
Development.
6. Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future
directions. Future Generation Computer Systems, 29(7), 1645-1660. doi: 10.1016/j.future.2013.01.010.
7. Jain, A., Bolle, R., & Pankanti, S. (2006). Biometrics. New York: Springer.
8. Madakam, S., Ramaswamy, R., & Tripathi, S. (2015). Internet of Things (IoT): A Literature Nigam, S., Shukla, R., & Pratap Singh,
A. (2016). Introduction and need of IPv6. International Journal of Innovative Computer Science & Engineering, 3(2), 35-37.
9. Review. Journal of Computer and Communications, 03(05), 164-173. doi: 10.4236/jcc.2015.35021.
10. Pradhan, A., B. Nanjappa, S., K. Nallasamy, S., & Esakimuthu, V. (2010). Raising Enterprise Applications: A Software Engineering
Perspective (1st edn.). Wiley India Pvt. Ltd.
11. Reddy, V. P., P., Mohammed Imran Ali, K., Sandeep, B., & Ravi, T. (2012). Importance and Benefits of IPV6 over IPV4: A Study.
International Journal of Scientific and Research Publications, 2(12), 517-518.
12. Reitmayr, G., & Schmalstieg, D. (2001). An open software architecture for virtual reality interaction. In ACM symposium on virtual
reality software and technology (pp. 47-54). Banff: ACM. Retrieved from https://dl.acm.org/citation.cfm?id=505018
13. Liang, J., Doermann, D., & Li, H. (2005). Camera-based analysis of text and documents: a survey. International Journal of
Document Analysis and Recognition (IJDAR), 7(2-3), 84-104. doi: 10.1007/s10032-004-0138-z
14. Manwatkar, P., & Yadav, S. (2015). Text recognition from images. 2015 International Conference on Innovations in Information,
Embedded and Communication Systems (ICIIECS). doi: 10.1109/iciiecs.2015.7193210
15. Su, X., Chu, C., Prabhu, B., & Gadh, R. (2007). On The Creation of Automatic Identification and Data Capture Infrastructure v ia
RFID. The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems, 1-19. Retrieved from
https://pdfs.semanticscholar.org/4551/8902ca4e297e3aa96310c353caf2e5b5403e.pdf.
16. Turcu, C., & Turcu, C. (2012). RFID-based Solutions for Smarter Healthcare. International Workshop Fostering Innovation in
Healthcare Services, 1-4.
17. Want, R. (2011). Near Field Communication. IEEE Pervasive Computing, 10(3), 4-7. doi: 10.1109/mprv.2011.55.
18. Wexelblat, A. (2015). Virtual Reality. Saint Louis: Elsevier Science.

Authors: Suja Cherukullapurath Mana, T. Sasipraba


Highly Parallel Map Reduce Process and Efficient Job Scheduling Methodologies of Big Data
Paper Title:
Systems.
Abstract: This paper studies about various job scheduling methodologies used in big data systems. Map
reduce is a highly efficient distributed job processing strategy for big data systems. Job scheduling is a critical
task of any big data system as the volume of jobs need to be processed is tremendous. This study will go over
the map reduce process in detail. It also reviews various job scheduling methodologies and tries to perform an
efficient comparison among these methodologies.

Keyword : Big data, job scheduling, resource allocation.


References:
1. Honeem, Mohammad & Kulkarni, Lalit. (2017). An Adaptive MapReduce Scheduler for Scalable Heterogeneous Systems.
10.1007/978-981-10-1678-3_57.
2. Jia-Chun Lin and Ming-Chang Lee, “Performance evaluation of job schedulers on Hadoop YARN,” Concurrency and Computation:
Practice and Experience (CCPE), vol. 28, no. 9, 2016, pp. 2711–2728
598. 3. Anjana Sharma, International Journal of Computer Science and Mobile Computing, Vol.4 Issue.12, December- 2015, pg. 171-176
4. S. C. Mana, "A Feature Based Comparison Study of Big Data Scheduling Algorithms," 2018 International Conference on Computer,
Communication, and Signal Processing (ICCCSP), Chennai,2018,pp.1-3. 3394-
doi: 10.1109/ICCCSP.2018.8452837 3397
5. Arpitha HV and Shoney Sebastian “Comparative study of Job Schedulers in Hadoop Environment” , International Journal of Advanced
Research in Computer Science ,Volume 8 , No-3 March-April 2017
6. M Zaharia et al., “Improving MapReduce Performance in Heterogeneous Environments”, Operating systems design and
implementation, Pp 29-42, 2008
7. S Thakur et al., “Dynamic Capacity Scheduling in Hadoop”, International Journal of Computer Applications, vol. 125, Issue 15, 2015.
8. Ibrahim Abaker Targio Hashem, et al.” MapReduce scheduling algorithms: a review” , The Journal of Supercomputing ,December
2018
9. Zaharia M et al (2010) Delay scheduling: a simple technique for achieving locality and fairness in cluster scheduling. In: Proceedings
of the 5th European Conference on Computer Systems. ACM
10. Chang H et al (2011) Scheduling in MapReduce-like systems for fast completion time. In: 2011Proceedings IEEE INFOCOM. IEEE
11. Vavilapalli VK et al (2013) Apache Hadoop YARN: yet another resource negotiator. In: Proceedingsof the 4th Annual Symposium o n
Cloud Computing. ACM
12. Hindman B et al (2011) Mesos: a platform for fine-grained resource sharing in the data center. In:NSDI
13. Scott J (2015) A tale of two clusters: Mesos and YARN. [cited 2016 1/6/2016]. http://radar.oreilly.com/2015/02/a-tale-of-two-clusters-
mesos-and-yarn.html
14. Jithina Jose, Suja Cherukullapurath Mana, B Keerthi Samhitha , “An Efficient System to Predict and Analyze Stock Data using
Hadoop Techniques” , International Journal of Recent Technology and Engineering (IJRTE), Volume-8 Issue-2, July 2019

Authors: Garina E.P., Garin A.P., Romanovskaya E.V., Andryashina N.S., Smirnova Z.V., Mizikovsky I.E.
Development Practice of Production Systems — Systems of Product Creation in Domestic
599. Paper Title:
Production (On the Example of Reference Areas)
Abstract: The article considers modern approaches to improvement of production processes at the 3398-
enterprise, practical application of production development methods, issues of realization of production 3401
technologies in industry. A necessary condition for development of production is disclosed - increasing the
efficiency of using technological potential through realization of the potential for strengthening its control
systems. The article is devoted to studying the variability of application of adaptive methods for improvement of
processes, technologies, and systems. Also, the effectiveness of development methods is determined by the
example of their adaptation to the practice of the economic entity. Solutions to increase the competitiveness of
enterprises cover the sphere of production, development of organizational systems of management, and "Kaizen"
system. Analysis of practice and modern approaches to increase competitiveness is carried out in the context of
implementation of solutions by domestic producers. In the course of the research it is determined that to solve
tasks, it is necessary to develop the technological process of manufacturing product, as well as elements of the
production system in part maintenance and operation of equipment. It is proved that the implementation of
production development program will increase the utilization of production capacities, reduce the cost of
production, change the indicator of time maintenance of production machines and equipment, and reduce used
production area.

Keyword : production, development, efficiency, efficiency, business processes


References:
1. Romanovskaya E.V., Kuznetsov V.P., Andryashina N.S., Garina E.P., Garin A.P. (2020) Development of the System of Operational
and Production Planning in the Conditions of Complex Industrial Production. In: Popkova E., Sergi B. (eds) Digital Economy:
Complexity and Variety vs. Rationality. ISC 2019. Lecture Notes in Networks and Systems, vol 87. Springer, Cham
2. Garina E.P., Kuznetsov V.P., Andryashina N.S., Romanovskaya E.V., Kuznetsova S.N. (2019) Exploring Alternative Strategies for
Managing the Complexity of a Product. In: Popkova E. (eds) The Future of the Global Financial System: Downfall or Harmony. ISC
2018. Lecture Notes in Networks and Systems, vol 57. Springer, Cham
3. Parshina A.A., Levchuk V.V., Shpilevskaya E.V., Garina E.P., Garin A.P. (2019) The Study of Modern Approaches to Development of
Economic Systems Through Managing Their Complexity. In: Popkova E. (eds) The Future of the Global Financial System: Downfall
or Harmony. ISC 2018. Lecture Notes in Networks and Systems, vol 57. Springer, Cham
4. Kuznetsov V.P., Kozlova E.P., Garin A.P. Organization of independent work in the discipline "Feasibility study of design. a ctivities at
the enterprise ”: study guide / University of Minin. Nizhny Novgorod, 2019.74 p.
5. Features of creating a new product in engineering enterprises: Monograph. N.S. Andriashina, V.P. Kuznetsov. — Krasnodar: KSTU,
2016. 134 p.
6. Implementation of innovative projects based on the sustainable development paradigm: methodology and practice / M.A. Shushkin —
N. Novgorod: NGPU named after K. Minina, 2015. 161 p.
7. Formation of business decisions to improve the competitiveness of products (services) of enterprises / N.S. Andriashina et al. — N.
Novgorod: Ngiei, 2014. 220 p.
8. Yashin S.N., Kuznetsov V.P., Ohezina G.M., Assessment of prospects and feasibility of process innovations at the industrial e nterprise:
Monograph. Nizhny Novgorod: Minin University, 2016. 152 p.
9. Models of modern information economy conceptual contradictions and practical examples/ V. Kuznetsov, E. Garina, N. Andriashin a,
E. Romanovskaya // Emerald publishing limited. —2018. — 361 p.
10. Garina E.P., Garin A.P., Vinogradova S.A., Batsyna Y.V. Formation of a risk management system in the design practice of enterprises
// Financial Economics. 2019. №3. P.459-463

Authors: Angana Saikia, Masaraf Hussain, Amit Ranjan Barua, Sudip Paul
Performance Analysis of various Neural Network functions for Parkinson’s disease Classification
Paper Title:
using EEG and EMG
Abstract: Artificial neural network (ANN) is a significant tool for classification of various types of disease
using either Biosignals/images or may be any kind of physical parameters. Establishment of appropriate
combination of learning, transfer function and training function is a very tedious task. Here, we compared the
performance of different training parameters in feed forward neural network for differentiating of Parkinson’s
disease using human brain (Electroencephalogram) and muscle signals (Electromyogram) features as the input
vector. 3 different types of training algorithm with six training functions is used. They are Gradient Descent
algorithms (traingd, traingdm), Conjugate Gradient algorithms (trainscg, traincgp) and Quasi-Newton algorithms
(trainbfg, trainlm). Proposed work compared the mentioned algorithm in terms of mean square error,
classification rate (%),R-value and the elapsed time.
Study showed that trainlm (Levenberg-Marquardt) best fits for larger data set. It showed the highest accuracy
rate of 100% with 0 mismatch classification with a best validation mean square error of 0.0040254 in 3 epochs
with a elapsed time of 1.12 seconds. The R-value found was 0.9998 which is in nearly equals to 1. Hence,
600.
Levenberg-Marquardt can be used as a training function for the classification of any brain disorder.
3402-
3406
Keyword : Artificial neural network (ANN), Electroencephalogram (EEG), Electromyogram (EMG),
Parkinson’s disease (PD), Neural Network Classification.
References:
1. H. Checkoway, L.M. Nelson," Epidemiologic approaches to the study of Parkinson's disease etiology," Epidemiology.
1999,pp.327-36.
2. A. Saikia, V. Majhi, M.Hussain, S.Paul, A.Datta," Tremor Identification Using Machine Learning in Parkinson's Disease," Early
Detection of Neurological Disorders Using Machine Learning Systems: IGI Global, 2019,pp.128-51.
3. I. Boersma, J. Jones, C. Coughlan, J. Carter, D. Bekelman, J. Miyasaki, " Palliative care and Parkinson's disease: caregiver
perspectives," Journal of Palliative Medicine, 2017;20(9):930-8.
4. De Rijk M, Breteler M, Graveland G, Ott A, Grobbee D, Van der Meche F, et al. Prevalence of Parkinson's disease in the
elderly: the Rotterdam Study. Neurology. Vol. 45, no.12,1995, pp.2143-6.
5. G. Pfurtscheller, Da Silva FL, " Event-related EEG/MEG synchronization and desynchronization: basic principles," Clinical
neurophysiology, Vol. 110, no. 11 1999, pp.1842-57.
6. Y.Z.Huang , F.Y. Chang, W.C. Liu, Y.F.Chuang, L.L.Chuang , Y.J. Chang, "Fatigue and muscle strength involving
walking speed in Parkinson’s disease: insights for developing rehabilitation strategy for PD, "Neural plasticity. 2017.
7. R.Sathya, A. Abraham, " Comparison of supervised and unsupervised learning algorithms for pattern classification,"
International Journal of Advanced Research in Artificial Intelligence, Vol. 2, no. 2, 2013, pp.34-8.
8. C. Loconsole, G.D. Cascarano, A. Brunetti, G.F. Trotta, G. Losavio, V. Bevilacqua, " A model-free technique based on computer
vision and sEMG for classification in Parkinson’s disease by using computer-assisted handwriting analysis," Pattern
Recognition Letters, Vol.121, 2019, pp.28-36.
9. L. Berus, S. Klancnik, M. Brezocnik, M. Ficko, " Classifying Parkinson’s Disease Based on Acoustic Measures Using
Artificial Neural Networks", Sensors, Vol. 19, no.1, 2019,pp.16.
10. S.M. Srinivasan, M. Martin, A. Tripathi, " ANN based Data Mining Analysis of the Parkinson’s Disease,"
International Journal of Computer Applications, Vol.168, no.1, 2017.
11. O. Er, O. Cetin , M.S. Bascil, F.A. Temurtas, " Comparative study on parkinson's disease diagnosis using neural networks
and artificial immune system," Journal of Medical Imaging and Health Informatics, Vol. 6, no.1, pp. 264-8.
12. M.K.S. Alsmadi, K.B. Omar, S.A.Noah, "Back propagation algorithm: the best algorithm among the multi-layer perceptron
algorithm," International Journal of Computer Science and Network Security,Vol.9, no.4, 2009, pp. 378-83.
13. S. Ali, K.A. Smith," On learning algorithm selection for classification," Applied Soft Computing, Vol. 2, no, 2,pp.
119-38.
14. M.H. Beale, M.T. Hagan, H.B. Demuth, "Neural network toolbox," User’s Guide, MathWorks, Vol. 2, 2010, pp. 77-81.
15. W.W. Hager, H.A. Zhang, " Survey of nonlinear conjugate gradient methods," Pacific journal of Optimization, Vol. 2, no. 1,
2006, pp. 5-58.
16. M.F. Møller," A scaled conjugate gradient algorithm for fast supervised learning. Neural networks, Vol. 6, no. 4, 1993,
pp. 525-33.
17. M.H. Beale, M.T. Hagan, H.B. Demuth," Neural network toolbox user’s guide," The MathWorks Inc, 1992.
18. A. Saikia, M. Hussain, A.R. Barua, S.Paul, " EEG-EMG correlation for parkinson’s disease," International Journal of
Engineering and Advanced Technology, Vol. 8, no.6,2019, pp.1179-85.
19. A. Saikia, M. Hussain, A.R. Barua, S. Paul, " Significance of Lyapunov Exponent in Parkinson's Disease Using
Electroencephalography,", 2019 6th International Conference on Signal Processing and Integrated Networks (SPIN); 2019:
IEEE.
20. A. Andrews, E. Morin, L. McLean, " Finger movement classification using forearm EMG signals," 2008.

Authors: Aripov M., Mukimov A., Sayfullayeva M.


To Asymptotic of the Solution of the Heat Conduction Problem with Double Nonlinearity, Variable
Paper Title:
Density, Absorption at a Critical Parameter
Abstract: In this work we have established asymptotic behavior (for t →  ) of solutions of the Cauchy
problem for a nonlinear heat equation with variable density describing the diffusion of heat with nonlinear heat
absorption at the critical exponent of the parameter  . For numerical computations as an initial approximation
we used founded the long time asymptotic of the solution. Numerical experiments and visualization were carried
for one and two dimensional case.

Keyword : critical value of parameter, heat conduction problem, maximum principle, numerical computation,
variable density.

601. References:
u = u + u1+
1. H. Fujita, “On the blowing up of solutions of the Cauchy problem for t ”, University of Tokyo, Journal of the Faculty of 3407-
Science, vol. 16, 1966, pp. 105-113.
2. M.Aripov, “Method of standard equation for solving nonlinear boundary value problems”, Tashkent, 1986, p. 137. 3412
3. J. L. V'azquez and V. A. Galaktionov, “Asymptotic behavior of solutions of the nonlinear absorption diffusion equation at a c ritical
exponent”, report of the Academy of Sciences of USSR 1989, no., p.p
4. V. A. Galaktionov and S. A. Posashkov, “Asymptotics of nonlinear heat conduction with absorption under the critical exponent”,
Preprint no. 71, Keldysh Inst. Appl. Math., Acad. Sci. USSR, 1986 (Russian). pp
5. V.A.Galaktionov, S.P. Kurdyumov, A.A. Samararskiy, “On asymptotic "eigenfunctions" of the Cauchy problem for a nonlinear
parabolic equation”, mathematical collection, 1985, vol. 126 (168), no. 4, p.p 435-472.
6. A.A. Samararskiy, A.V. Gulin, “Numerical methods”, “Nauka”, 1989, p. 432.
7. A.A. Samararskiy, introduction to the theory of difference schemes, “Nauka”, 1971, p. 553.
8. Aripov M., “Applied mathematics in science and technology”,”Tashkent”, 2008, p.166.
u =  pu m
9. Diana Stan and Juan Luis Vazquez, “Asymptotic behavior of the doubly nonlinear equation t on bounded domains”, Elseiver,
Nonlinear analysis, 2013, vol. 77, pp. 1-32.
10. Aripov M., Mukimov A., “An asymptotic solution radially symmetric self-similar solution of nonlinear parabolic equation with source
in the second critical exponent case “, National university of Uzbekistan, ACTA NUUz, 2017, vol.2, n.2, p.p. 21-30.

Authors: Somu Parande, Jayashree D. Mallapur

Paper Title: Research Trends in Secure Routing Protocols and Communication System in WSNs
Abstract: At present, Wireless Sensor Networks (WSNs) is fastest growing technology which extensively
adopting for various application services including; weather monitoring, traffic prediction, surveillance, research
and academic fields etc. As the sensor nodes are randomly deployed in wireless environment, security metrics
becomes most promising challenge where communication wirelesses networks facing today. In WSNs, sensor
nodes acquires various security concern i.e. vulnerabilities, threats and malicious attacks. Due to the limited
602. resource constraints like bandwidth demand, limited memory, computational cost and minimum energy
consumption of sensor nodes makes the network security protocols unachievable. In this context, this 3413-
comprehensive study provides extensive review of WSNs, various challenges mainly related to security attacks 3421
and their solution strategies to strengthen the network performance. The significant contribution of this survey
study is to provide the comprehensive report on standard secure routing schemes introduced in the literature and
pertaining them to secure and non-secure routing protocols for strengthening the WSNs lifetime. Furthermore,
the study considers the most frequently used security protocols published between 2010 to 2019, and
investigates the major issues towards the security provisions in WSN, which may help for designing a futuristic
routing protocol for any WSNs.
Keyword : Cryptography Algorithms; LEACH; Security Attack; Secure Routing Protocol; Wireless Sensor
Network..
References:
1. S.K. Singh, M. P. Singh, and D. K. Singh, “Routing protocols in wireless sensor networks–A survey”, International Journal of
Computer Science & Engineering Survey (IJCSES), Vol.1, no. 2, pp.63-83, 2010
2. I.S. Hammoodi, B. G. Stewart, A. Kocian and S. G. McMeekin, “A comprehensive performance study of OPNET modeler for ZigBee
wireless sensor networks”, In 2009 Third International Conference on Next Generation Mobile Applications, Services and
Technologies, pp. 357-362, 2009.
3. A.M. El-Semary, M.M. Abdel-Azim, “New trends in secure routing protocols for wireless sensor networks”, Int J Distrib Sens Netw,
16, 2013
4. M.R. Ahmed, X. Huang, and D. Sharma, "A taxonomy of internal attacks in wireless sensor network”, Memory (Kbytes), 128, pp.48 ,
2012
5. S. Omar, O. E. Ghandour, and A. M. A. E-Haleem, “Multipath Active Based Routing Protocol for Mobile cognitive Radio AdHoc
Networks”, Wireless Communications and Mobile Computing, 2017.
6. G. Nandini, J. Anitha, “Performance Chronicles of Multicast Routing Protocol in Wireless Sensor Network”, International Journal of
Advanced Computer Science and Applications, vol. 8, no. 9, pp.284-293, 2017
7. H. Singh and D. Singh, “Taxonomy of routing protocols in wireless sensor networks: A survey”, In 2nd International Conference on
Contemporary Computing and Informatics (IC3I), pp. 822-830, 2016.
8. E.Hassan, K. Bourgba, and M. Ouzzif, "A survey on flat routing protocols in wireless sensor networks", In International Sympo sium
on Ubiquitous Networking, Springer, pp. 311-324, 2015..
9. El-A. Mohamed, and M. M. A-Azim, “New trends in secure routing protocols for wireless sensor networks”, International Journal of
Distributed Sensor Networks 9, no. 5 , 2013
10. M. Khalid, Z. Ullah, N. Ahmad, M. Arshad, B. Jan, Y. Cao, and A. Adnan, “A survey of routing issue s and associated protocols in
underwater wireless sensor networks”, Journal of Sensors, 2017
11. H. Echoukairi, K. Bourgba, and M. Ouzzif. "A survey on flat routing protocols in wireless sensor networks." In Advances in
Ubiquitous Networking, pp. 311-324. Springer, Singapore, 2016.
12. S.P. Singh, and S. C. Sharma, "A survey on cluster-based routing protocols in wireless sensor networks", Procedia computer science 45
(2015): 687-695.
13. J. Kumar, S. Tripathi, and R. K. Tiwari, "A survey on routing protocols for wireless sensor networks using swarm intelligence."
International Journal of Internet Technology and Secured Transactions 6, no. 2 (2016): 79-102.
14. H.D.E. Al-Ariki, M.N. S. Swamy, "A survey and analysis of multipath routing protocols in wireless multimedia sensor networks",
Wireless Networks 23, no. 6 (2017): 1823-1835.
15. E. Stavrou, A. Pitsillides, "A survey on secure multipath routing protocols in WSNs”, Computer Networks, vol.54, no. 13, pp. 2215-
2238, 2010
16. M. Za. Hassan, H.A-Rizzo, and F. A-Turjman. "A survey on multipath routing protocols for QoS assurances in real-time wireless
multimedia sensor networks." IEEE Communications Surveys & Tutorials 19, no. 3 (2017): 1424-1456.
17. S. Sathyadevan, S. Prabhakaranl, and K. Bipin. "A Survey of Security Protocols in WSN and Overhead Evaluation”, In Proceedings of
the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, pp. 729-738, 2015.
18. F. Ishmanov and Y. B. Zikria, "Trust mechanisms to secure routing in wireless sensor networks: current state of the research and open
research issues." Journal of Sensors, 2017
19. J. Kaur, S.S. Gill, and B.S. Dhaliwal, "Secure trust based key management routing framework for wireless sensor networks”, Jo urnal of
Engineering, 2016
20. T.M. Rahayu, S-G. Lee, and H-J. Lee, "A secure routing protocol for wireless sensor networks considering secure data aggregation."
Sensors 15, no. 7 (2015): 15127-15158.
21. F. E-Hajji, C. Leghris, and K. Douzi, "Adaptive Routing Protocol for Lifetime Maximization in Multi-Constraint Wireless Sensor
Networks”, Journal of Communications and Information Networks 3, no. 1 (2018): 67-83.
22. K.A. Kumar, A.V.N Krishna, and K. S. Chatrapati, “New secure routing protocol with elliptic curve cryptography for military
heterogeneous wireless sensor networks”, Journal of Information and Optimization Sciences38, no. 2 (2017): 341-365.
23. L. Li, and D. Li. "An Energy-Balanced Routing Protocol for a Wireless Sensor Network." Journal of Sensors, 2018
24. M.K. Khan, M. Shiraz, K. Z. Ghafoor, S. Khan, A. S. Sadiq, and G. Ahmed, "EE-MRP: Energy-efficient multistage routing protocol
for wireless sensor networks”, Wireless Communications and Mobile Computing, 2018
25. S-K. Lee, J-G. Koh, and C-R. Jung. "An energy-efficient QoS-aware routing algorithm for wireless multimedia sensor networks."
International Journal of Multimedia and Ubiquitous Engineering 9, no. 2 (2014): 245-252.
26. B-Y. Li, and P-J. Chuang "Geographic energy-aware non-interfering multipath routing for multimedia transmission in wireless sensor
networks." Information Sciences 249 (2013): 24-37.
27. K. Saleem, N. Fisal and J. Al-Muhtadi, "Empirical Studies of Bio-Inspired Self-Organized Secure Autonomous Routing Protocol," in
IEEE Sensors Journal, vol. 14, no. 7, pp. 2232-2239, July 2014.
28. D. Qin, S. Yang, S. Jia, Y. Zhang, J. Ma and Q. Ding, "Research on Trust Sensing Based Secure Routing Mechanism for Wireless
Sensor Network," in IEEE Access, vol. 5, pp. 9599-9609, 2017.
29. S. Li, S. Zhao, X. Wang, K. Zhang and L. Li, "Adaptive and Secure Load-Balancing Routing Protocol for Service-Oriented Wireless
Sensor Networks," in IEEE Systems Journal, vol. 8, no. 3, pp. 858-867, Sept. 2014.
30. S. Ganesh and R. Amutha, "Efficient and secure routing protocol for wireless sensor networks through SNR based dynamic clustering
mechanisms," in Journal of Communications and Networks, vol. 15, no. 4, pp. 422-429, Aug. 2013.
31. A. Liu, Z. Zheng, C. Zhang, Z. Chen and X. Shen, "Secure and Energy-Efficient Disjoint Multipath Routing for WSNs," in IEEE
Transactions on Vehicular Technology, vol. 61, no. 7, pp. 3255-3265, Sept. 2012.
32. G. Zhan, W. Shi and J. Deng, "Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs," in IEEE
Transactions on Dependable and Secure Computing, vol. 9, no. 2, pp. 184-197, March-April 2012.
33. M. Taherian, H. Karimi, A. M. Kashkooli, A. Esfahanimehr, T. Jafta, and M.Jafarabad. "The design of an optimal and secure rou ting
model in wireless sensor networks by using PSO algorithm." Procedia Computer Science 73 (2015): 468-473.
34. X. Zhenghong, C. Zhigang, and H. Changqin. "Secure routing protocol with anomaly detection in heterogeneous wireless sensor
networks." International Journal of Mobile Network Design and Innovation 4, no. 3 (2012): 157-163.
35. L. Chen, X. Qi, L. Liu, and G. Zheng. "A security routing protocol based on convergence degree and trust." International Journal of
Grid and Utility Computing 8, no. 1 (2017): 38-45.
36. A. Ahmed, K. A. Bakar, M. I. Channa, and A. W. Khan. "A secure routing protocol with trust and energy awareness fo r wireless sensor
network." Mobile Networks and Applications 21, no. 2 (2016): 272-285.
37. M. G-Otero, T. Zahariadis, F. Álvarez, H. C. Leligou, A. P-Hernández, P. Karkazis, and F. J. C-Quirós. "Secure geographic routing in
ad hoc and wireless sensor networks." EURASIP Journal on Wireless Communications and Networking 2010 (2010): 10.
38. L.H. Long and E. Choi. "Energy-Efficiency Protocol for Securing the Wireless Sensor Networks." In IFIP International Conference on
Network and Parallel Computing, pp. 589-598. Springer, Berlin, Heidelberg, 2012.
39. T. Maitra, Su. Barman, and D. Giri. "Cluster-Based Energy-Efficient Secure Routing in Wireless Sensor Networks." In Information
Technology and Applied Mathematics, pp. 23-40. Springer, Singapore, 2019.
40. T. Wang, G. Zhang, X. Yang, and A. Vajdi. "A trusted and energy efficient approach for cluster-based wireless sensor networks."
International Journal of Distributed Sensor Networks 12, no. 4 (2016): 3815834.
41. S. S. Jawaligi and G. S. Biradar. "QoS oriented and delay tolerant WSN routing protocol for data gathering in IoT ecosystem."
International Journal of Internet Technology and Secured Transactions 8, no. 3 (2018): 469-487.
42. G. Gulhane and N. V. Mahajan, "Securing multipath routing protocol using authentication approach for wireless sensor network." In
Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on, pp. 729-733, 2014.

Authors: Gobi Krishna Subramanian, Chindamani Meyyappan

Paper Title: PLC Based Industrial Trash Barrel


Abstract: The Expeditious rise in the magnitude and kind of solid trashes deposited on the earth due to
increase in the economic growth, industrialization and urbanization, is becoming a burgeoning problem for
national and local governments to fortify protective and tenable management of waste. The segregation,
Handing, Transport and disposal of waste needs to be properly managed inorder to minimise the risk to the
health and safety of the public and the environment. The recessional value of waste is well accomplished only
when it is segregated. In India the government spends over 25% of their budget on solid waste management.
When the waste is segregated into multiple streams such as glass, metal, paper, plastic then it becomes more
easy to recycle them and reuse them. Our intention is to separate the recyclable solid waste and collecting them
in individual bins which could be used accordingly as per the applications. Programmble Logical Controller
helps us just doing that under hard conditions. We use IR sensor, Capacitive and Inductive proximity sensors to
detect each object which is moving on a conveyor belt and is segregated and collected in various bins with the
help of gates, which is controlled by Programmable Logical Controller. The dust bin employs the sensing
603. mechanism to distinguish between the wastes.
3422-
Keyword : Programmable Logical Controller, Infra Red sensor, Automated Waste Segregator, Central 3425
Processing Unit.
References:
1. Fachmin Folianto, Yong Sheng Low, Wai Leong Yeow,“Smartbin: Smart Waste Management System”, IEEE Tenth International
Conference on Intelligent Sensors, Sensor Networks and Information Processing Demo and Video, 2015.
2. M. I. W. D. O. D. L. B. a. C. R. Santi Phithakkitnukoon, "Tracking Trash," IEEE Pervasive Computing, vol. 12, no. 2, pp. 38-48, 2013.
3. S.M .Dudhal, B. S. Jonwal, Prof. H. P. Chaudhari, “Waste Segregation Using Programmable Logic Controller”, International Jour nal
For Technological Research In Engineering, Volume 1, Issue 8, April-2014
4. Subhasini Dwivedi, Michael Fernandes, Rohit D’souza, “A Review on PLC based Automatic Waste Segregator”, International Journa l
of Advanced Research in Computer Engineering & Technology (IJARCET), Volume 5, Issue 2, February 2016.
5. M .Dudhal, B. S. Jonwal, Prof. H. P. Chaudhari, “Waste segregation using programmable logic controller”, International Journal for
Technological Research in Engineering, Volume 1, Issue 8, April-2014.
6. Shubham Bagga, Gurnayan Gujral, Shubham Kathepuri, Hem Shah, “Smart Dustbin The Future of Waste Management”, ELK Asia
Pacific Journals , 2017
7. Akshay Bandal, Pranay Nate, Rohan Manakar, Rahul Powar, “Smart Wi-Fi Dustbin System”, International Journal of Advance
Research, Ideas and Innovations in Technology, Volume2, Issue no.5, 2016

Authors: Chinmay C, Mahantesh S Kenchannavar, Tejaswini A, Kariyappa B S

Paper Title: VTEAM Model Based In-Memory Computation using Memristors


Abstract: The recent applications in the computing field deals with huge data processing operations,
which involves a lot of data transfer from the memory to processing unit and vice versa. If these data transfers
between the CPU and memory are reduced, a lot of time could be saved along with advantage of getting
desirable outputs at a lower latency. One of the ways to achieve this is to adopt In-memory computational
techniques, where most of the computations happen inside memory itself. Memristive crossbar architecture is a
memory architecture which makes use of memristors as memory cells to store data with some added
computational capabilities. The need for power efficient computing in the present days motivates the search for
new nonvolatile universal memories like memristors. In this paper, we present an optimal way of implementing
basic ALU operations in the memristive memory block. A detailed description for simulating this is given,
which includes the creation of memristor symbol, choosing a suitable memristive logic to implement basic
digital logics, creation of memory crossbar and the way to realize basic ALU operations.
604.
Keyword : Memristor, IMPLY, MAGIC, memory crossbar, Memristive Processing Unit. 3426-
3432
References:
1. L. O. Chua, “Memristor-the missing circuit element,” IEEE Trans. Circuit Theory, vol. CT-18, no. 5, pp. 507–519, Sep. 1971.
2. S. Kvatinsky et al., “MAGIC—Memristor-aided logic,” IEEE Trans. Circuits Syst. II, Exp. Briefs, vol. 61, no. 11, pp. 895–899, Nov.
2014
3. S. Kvatinsky et al., “Logic Design Within Memristive Memories Using Memristor-Aided loGIC (MAGIC)” IEEE Transactions on
Nanotechnology, Vol 15, no/ 4, pp 635-650, July 2016.
4. Hsin-Pei Wang , Chia-Chun Lin, Chia-Cheng Wu , Yung-Chih Chen , and Chun-Yao Wang, “On Synthesizing Memristor-Based Logic
Circuits With Minimal Operational Pulses”, IEEE Transactions on Very Large Scale Integration Systems, Volume: Pp, Issue: 99,2018.
5. Rotem Ben Hur , Shahar Kvatinsky , “Memristive Memory Processing Unit (MPU) Controller for In-Memory Processing”, ISCEE
International Conference on the Science of Electrical Engineering, 2016.
6. Shahar Kvantisky, Dmitry Belousov, Slavik Liman, Guy Satat, Nimrod Wald, Eby G. Fredman, AvinoamKolodny, and Uri C. Weiser,
“Magic-Memristor Aided Logic”, IEEE Transactions On Circuits And Systems-II, 11 Nov 2014.
7. M Moris Mano, Digital Logic and Computer Design, 2016 Pearson India Education Services Pvt. Ltd .
8. L.ChuaandS.M.Kang, “Memristive devices and systems,” Proc. IEEE, vol. 64, pp. 209–223, Feb 1976.
9. S. Paul and S. Bhunia, “A scalable memory-based reconfigurable computing framework for nanoscale crossbar,” IEEE Trans.
Nanotechnol., vol. 11, pp. 451–462, May 2012.
10. E. Linn et al., “Beyond von Neumann–logic operations in passive crossbar arrays alongside memory operations,” Nanotechnology, vol.
23, pp. 305205:1–6, July 2012.
11. S. Kvatinsky et al., “Memristor-based material implication (IMPLY) logic: Design principles and methodologies,” IEEE Trans. Very
Large Scale Integr. Syst., vol. 22, no. 10, pp. 2054–2066, Oct. 2014.
12. S. Kvatinsky, E. G. Friedman, A. Kolodny, and U. C. Weiser, “TEAM: ThrEshold adaptive memristor model,” IEEE Trans. Circuits
Syst. I: Reg. Papers, vol. 60, no. 1, pp. 211–221, Jan. 2013.
13. S. Kvatinsky, M. Ramadan, E. Friedman, and A. Kolodny, “VTEAM: A general model for voltage-controlled memristors,” IEEE
Trans. Circuits Syst. II, Exp. Briefs, vol. 62, no. 8, pp. 786–790, Aug. 2015.
14. Teimoori, M., Amirsoleimani, A., Ahmadi, A., & Ahmadi, M. (2018). A 2M1M Crossbar Architecture: Memory. IEEE Transactions
on Very Large Scale Integration (VLSI) Systems, 26(12), 2608–2618. doi:10.1109/tvlsi.2018.2799951.
15. Naman S Kumar, Sudhanva N G, Shreyas Hande V, Mallikarjun V Sajjan, Hemanth Kumar C S, and Kariyappa B S, “SRAM design
using Memristor and Self-controllable Voltage (SVL) Technique” International Conference on Computational Intelligence & Data
Engineering (ICCIDE 2017) Vijayawada, Andhra Pradesh, 978-981-10-6318-3, July 2017, Springer.

Authors: Tanusree Chaudhuri, Vidya N, A H Manjunatha Reddy, Varun S


Taxonomical Annotation of Whole Genome Metagenomic Data to identify Microbiome in Indian TB
Paper Title:
Patients
Abstract: Till date, Tuberculosis is a major health problem especially in India. Though, Mycobacterium
tuberculosis is the causative agent of tuberculosis (TB) and it kills approximately about 1.3 million people every
year according to WHO, yet the role of complex microbial community favoring the growth of Mycobacterium
complex is immense. There are several studies that have already been reported that there exists a strong
association between the complex microbial interactions in the community and the disease condition for majority
of the diseases that are caused by different microorganisms.Our present analysis aims to characterize up-till
species level abundance in Mycobacterial tuberculosis metagenome. In our study we have taken a total of 100
whole genome sequenced Indian Tuberculosis patient samples. These 100 samples were analyzed to obtain
taxonomical abundance. It was seen that South Indian samples had 54 unique species whereas North Indian
samples had only 13 unique species. Our study revealed that Achromobacter, Nocardia, Chromobacterium,
Staphylococcus, Xanthomonas, Bacillus, Sanguibacter and Bordetella are mostly abundant in Indian tuberculosis
patients and we are able to classify all these till species level, which other 16s rRNA studies have failed to do.
Knowing the species present during the tuberculosis infection it will be of great importance to treat the patients
with right antibiotics for the microbiome present.

Keyword : M.Tuberculosis; Metagenome; WGS; Taxonomical abundance; Microbiome


References:
1. Breitwieser FP, Lu J, Salzberg SL. A review of methods and databases for metagenomic classification and assembly. Brief Bioin form.
2017;(September).
2. https://doi.org/10.7717/peerj.585.
3. https://www.who.int/tb/publications/global_report/tb18_ExecSum_web_4Oct18.pdf?ua=1
4. https://www.tbfacts.org/tb-statistics-india/
5. Hargreaves JR, Boccia D, Evans CA, Adato M, Petticrew M, Porter JDH. The social determinants of tuberculosis: from evidence t o
action. Am J Public Health. 2011;101(4):654–62.
605. 6. Verma R, Khanna P, Mehta B. Revised national tuberculosis control program in India: The need to strengthen. Int J Prev Med.
2013;4(1):1–5.
7. Krishna P, Jain A, Bisen PS. Microbiome diversity in the sputum of patients with pulmonary tuberculosis. Eur J Clin Microbiol Infect 3433-
Dis [Internet]. 2016;35(7):1205–10. Available from: http://dx.doi.org/10.1007/s10096-016-2654-4 3438
8. Pédron T, Sansonetti P. Commensals, Bacterial Pathogens and Intestinal Inflammation: An Intriguing Ménage à Trois. Cell Host
Microbe. 2008;3(6):344–7.
9. Potential Of Microbiome Research In Respiratory Diseases. J Respir Res. 2015;1(1):13–4.
10. Karsch-Mizrachi I, Takagi T, Cochrane G. The international nucleotide sequence database collaboration. Nucleic Acids Res.
2018;46(D1):D48–51.
11. https://ncbi.github.io/sra-tools/
12. Andrews S.FastQC A Quality Control tool for High Throughput Sequence Data,
http://www.bioinformatics.babraham.ac.uk/projects/fastqc/.
13. Martin M.Cutadapt removes adapter sequences from high-throughput sequencing.EMBnet.journal.2015;1–3.
14. Salzberg SL, Wood DE. Kraken: ultrafast metagenomic sequence classification using exact alignments. Genome Biol [Internet].
2014;15. Available from: http://www.sciencemag.org/cgi/doi/10.1126/science.1093857
15. Nurk S, Meleshko D, Korobeynikov A, Pevzner PA. metaSPAdes: a new versatile metagenomic assembler (Supplementary Material).
Genome Res. 2017;27(5):824–34.
16. Gurevich A, Saveliev V, Vyahhi N, Tesler G. QUAST: Quality assessment tool for genome assemblies. Bioinformatics.
2013;29(8):1072–5.
17. Alneberg J, Bjarnason BS, De Bruijn I, Schirmer M, Quick J, Ijaz UZ, et al. Binning metagenomic contigs by coverage and
composition. Nat Methods. 2014;11(11):1144–6.
18. Yu-Wei Wu, Blake AS, Steven WS. MaxBin 2.0: an automated binning algorithm to recover genomes from multiple metagenomic
datasets, Bioinformatics, 2016;32(4):605–607
19. Imelfort M, Skennerton CT, Parks DH, Tyson GW, Hugenholtz P. CheckM: assessing the quality of microbial genomes recovered
from isolates, single cells, and metagenomes. Genome Res. 2015;25(7):1043–55.
20. Brady A, Salzberg S. Phymm and PhymmBL: Classification with Interpolated Markov Models. Nat Methods. 2009;6(9):673–6.
21. Breitwieser FP, Lu J, Salzberg SL. A review of methods and databases for metagenomic classification and assembly. Brief Bioin form.
2017;(June):1–15.
22. Vollmers J, Wiegand S, Kaster AK. Comparing and evaluating metagenome assembly tools from a microbiologist’s perspective - Not
only size matters! Vol. 12, PLoS ONE. 2017. 1–31 p.
23. Adami AJ, Cervantes JL. The Microbiome at the Pulmonary Alveolar Niche: How It Affects the Human Innate Response against
Mycobacterium tuberculosis HHS Public Access. Tuberc [Internet]. 2015;95(6):651–8. Available from:
https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4666774/pdf/nihms712460.pdf
24. Huson DH, Auch AF, Qi J, Schuster SC. MEGAN analysis of metagenomic data. Genome Res. 2007;17(3):377–86.
25. Eshetie S, Van Soolingen D. The respiratory microbiota: New insights into pulmonary tuberculosis. BMC Infect Dis. 2019;19(1):1–7.
26. Manimozhiyan A, Shu Y-Z, Arcuri M, Kozlowski M, Wang R, Lam KS, et al. Enterotypes of the human gut microbiome. Nature.
2011;473(7346):174–80
27. Knights D, Ward TL, Mckinlay CE, Miller H. Rethinking “Enterotypes” Dan. Cell Host Microbe. 2017;16(4):433–7.
28. Wood MR, Yu EA, Mehta S. Review article: The human microbiome in the fight against tuberculosis. Am J Trop Med Hyg.
2017;96(6):1274–84.
29. Zhang Y, Lun CY, Tsui SKW. Metagenomics: A newway to illustrate the crosstalk between infectious diseases and host mic robiome.
Int J Mol Sci. 2015;16(11):26263–79.
30. Stephen Nayfach1 2 and Katherine S. Pollard. Accurate, Toward Metagenomics, Quantitative Comparative. 2016;166(5):1103 –16.

Authors: Laxmi Math, Ruksar Fatima

Paper Title: Identification of Diabetic Retinopathy from fundus images using CNNs
Abstract: the Diabetic Retinopathy is the diabetes-mellitus to human vision that is the main cause of
vision loss. The early stage detection of diabetic retinopathy is can play eminent role in the diabetes treatment.
The fundus of retinal image is utilized to recognize the symptoms of diabetic retinopathy. Moreover, the above
phenomena led us to propose this paper; here we propose segment based learning approach for identification of
diabetic retinopathy. The segment based image level is required to obtain the identification of diabetic
retinopathy images, the classifiers and features are equally learned from the data. Then, we adapt pre-trained
CNN as the fine tune to achieve the segment level estimation of diabetic retinopathy. For identification of
diabetic retinopathy, we achieve accuracy 96.97 and 98.46% at 20 and 30% and also achieve AUC (Area under
Curve) 97.51 and 98.50 at 20 and 30% on the Kaggle dataset. Our proposed model outperforms much better than
other models.

Keyword : Diabetic Retinopathy, DL (deep learning), CNN (convolutional neural network).


References:
1. D. K. Prasad, L. Vibha, and K. Venugopal, " Early detection of diabetic retinopathy from digital retinal fundus images," 2015 IEEE
Recent Advances in Intelligent Computational Systems (RAICS), 2015.
2. S. Masood, T. Luthra, H. Sundriyal, and M. Ahmed, "Identification of diabetic retinopathy in eye images using transfer learning," 2017
International Conference on Computing, Communication and Automation (ICCCA), 2017.
3. V. Raman, P. Then, and P. Sumari, “Proposed retinal abnormality detection and classification approach: computer aided detection for
diabetic retinopathy by machine learning approaches,” pp. 636–641, 2016.
4. T. A. Soomro, J. Gao, M. A. Khan, T. M. Khan, and M. Paul, “Role of image contrast enhancement technique for ophthalmologist as
diagnostic tool for diabetic retinopathy,” in Digital Image Computing: Techniques and Applications (DICTA), 2016 International
Conference on. IEEE, 2016, pp. 1–8.
5. T. Rakshitha, D. Devaraj, and S. P. Kumar, “Comparative study of imaging transforms on diabetic retinopathy images,” in Recent
Trends in Electronics, Information & Communication Technology (RTEICT), IEEE International Conference on. IEEE, 2016, pp. 118 –
606. 122.
6. M. ur Rehman, Z. Abbas, S. H. Khan, S. H. Ghani et al., “Diabetic retinopathy fundus image classification using discrete wavelet trans- 3439-
form,” in 2018 2nd International Conference on Engineering Innovation (ICEI). IEEE, 2018, pp. 75–80. 3443
7. G. Mahendran, R. Dhanasekaran, and N. D. KN, “Identification of exudates for diabetic retinopathy based on morphological proc ess
and pnn classifier,” pp. 1117–1121, 2014.
8. P. Asha and S. Karpagavalli, “Diabetic retinal exudates detection using machine learning techniques,” pp. 1–5, 2015.
9. Kaggle. (2015). Diabetic Retinopathy Challenge. Accessed:Jul. 19, 2017. [Online]. Available: https://www.kaggle.com/c/diabetic-
retinopathy detection/
10. Wright J, Yang AY, Ganesh A, Sastry SS, Ma Y (2009) Robust face recognition via sparse representation. IEEE Trans Pattern Ana l
Mach Intell 31(2):210–227
11. An S, Liu W, Venkatesh S (2007) Face recognition using kernel ridge regression. Proc IEEE Int Conf Comput Vis 5(6):1 –7.
12. Xiang S, Nie F, Zhang C (2010) Semi-supervised classification via local spline regression. IEEE Trans Pattern Anal Mach Intell
32(11):2039–2053.
13. Huang G, Zhu Q, Siew C (2006) Extreme learning machine: theory and applications. Neurocomputing 70(1–3):489–501
14. Zhang L, Yang M, Feng X (2011) Sparse representation or collaborative epresentation: which helps face recognition? In:
Proceeding of IEEE international conference on computer vision,pp 471–478.
15. Huang G, Song S, Gupta JN, Wu C (2014) Semi-supervised and unsupervised extreme learning machines. Cybern IEEE Trans
44(12):2405–2417.
16. Zhou, Wei & Qiao, Shaojie & Yi, Yugen & Han, Nan & Chen, Yuqi & Lei, Gang. (2019). Automatic optic disc detection using low-
rank representation based semi-supervised extreme learning machine. International Journal of Machine Learning and Cybernetics.
17. Chen X, Xu Y, Wong DWK, Wong TY, Liu J. Glaucoma detection based on deep convolutional neural network. In: Engineering in
medicine and biology society (EMBC), 2015 37th annual international conference of the IEEE; 2015. p. 715–8. IEEE.
18. Chen X, Xu Y, Yan S, Wong DWK, Wong TY, Liu J. Automatic feature learning for glaucoma detection based on deep learning. In:
International conference on medical image computing and computer-assisted intervention: Springer; 2015. p. 669–77.
19. Li A, Cheng J, Wong DWK, Liu J. Integrating holistic and local deep features for glaucoma classification. In: Engineering in medicine
and biology society (EMBC), 2016 IEEE 38th annual international conference of the; 2016. p. 1328–31. IEEE.
20. Xu Y, Lin S, Wong DWK, Liu J, Xu D. Efficient reconstruction-based optic cup localization for glaucoma screening. In: International
conference on medical image computing and computer-assisted intervention: Springer; 2013. p. 445–52.
21. Fu H, Cheng J, Xu Y, Wong DWK, Liu J, Cao X. Joint optic disc and cup segmentation based on multi-label deep network and polar
transformation. CoRRabs/1801.00926. 2018;1801:00926.
22. Bajwa, Muhammad Naseer & Malik, Muhammad Imran & Siddiqui, Shoaib & Dengel, Andreas & Shafait, Faisal & Neumeier,
Wolfgang & Ahmed, Sheraz. (2019). Two-stage framework for optic disc localization and glaucoma classification in retinal fundus
images using deep learning. BMC Medical Informatics and Decision Making.

Authors: Payal Shrivastava, Chandan Kumar Verma

Paper Title: A Hybrid Forecasting Model for Option Price Prediction using Machine Learning Technique

607. Abstract: A hybrid model is presented in this paper that is aiming to forecast the option prices that are
analyzed in the data set of different banks. A new move is proposed by this paper that is forecasting the option
3444-
price with the use of ANN model which is optimizing the hybrid swarm optimization. The data set of the NSE 3450
India banking sector has been utilized for the calculation of an effective algorithm for forecasting the option
price with the help of this ANN model. For forecasting the option price, the methods which are used in this
paper are SOM (self organization map), RBF (Radial Basis Function) and the Hybrid Swarm Optimization
system. The hybrid swarm intelligence algorithm reduces the variation of prices and proceeds the data for the
prediction and used cascaded neural network-based classifier for the purification of data. Two results are
combined so that the option price prediction can be achieved. A comprehensive description of the option price is
offered with a combined forecasting model that is developing the accuracy of the option price forecasting, also
the reflection of the stock market trends are seen in this investigation and the model also has the capacity to offer
advices to the investors that are connected with the productive speculation.

Keyword : ANN model, option price, Deep neural network, PGO, ACO.
References:
1. Siddique, M., DebdulalPanda, S.D. and Mohapatra, S.K., 2017. A hybrid forecasting model for stock value prediction using soft
computing. International Journal of Pure and Applied Mathematics, 117(19), pp.357-363.
2. Xing, X., Stock Price Forecasting using RBF Neural Network and Hybrid Particle Swarm Optimization.
3. Noman, S., Shamsuddin, S.M. and Hassanien, A.E., 2009. Hybrid learning enhancement of RBF network with particle swa rm
optimization. In Foundations of Computational, Intelligence Volume 1 (pp. 381-397). Springer, Berlin, Heidelberg.
4. Foqaha, M. and Awad, M., 2017. Hybrid Approach to Optimize the Centers of Radial Basis Function Neural Network Using Particle
Swarm Optimization. JCP, 12(5), pp.396-407.
5. Di Persio, L. and Honchar, O., 2016. Artificial neural networks architectures for stock price prediction: Comparisons and app lications.
International journal of circuits, systems and signal processing, 10, pp.403-413.
6. Tsai, C.F. and Wang, S.P., 2009, March. Stock price forecasting by hybrid machine learning techniques. In Proceedings of the
International MultiConference of Engineers and Computer Scientists (Vol. 1, No. 755, p. 60).
7. Park, H., Kim, N. and Lee, J., 2014. Parametric models and non-parametric machine learning models for predicting option prices:
Empirical comparison study over KOSPI 200 Index options. Expert Systems with Applications, 41(11), pp.5227-5237.
8. Andreou, P.C., Charalambous, C. and Martzoukos, S.H., 2008. Pricing and trading European options by combining artificial neural
networks and parametric models with implied parameters. European Journal of Operational Research, 185(3), pp.1415 -1433.
9. Liang, X., Zhang, H., Xiao, J. and Chen, Y., 2009. Improving option price forecasts with neural networks and support vector
regressions. Neurocomputing, 72(13-15), pp.3055-3065.
10. Chong, E., Han, C. and Park, F.C., 2017. Deep learning networks for stock market analysis and prediction: Methodology, data
representations, and case studies. Expert Systems with Applications, 83, pp.187-205.
11. Majhi, R., Panda, G. and Sahoo, G., 2009. Efficient prediction of exchange rates with low complexity artificial neural network models.
Expert systems with applications, 36(1), pp.181-189.
12. Shen, W., Guo, X., Wu, C. and Wu, D., 2011. Forecasting stock indices using radial basis function neural networks optimized by
artificial fish swarm algorithm. Knowledge-Based Systems, 24(3), pp.378-385.
13. Adebiyi, A.A., Ayo, C.K., Adebiyi, M.O. and Otokiti, S.O., 2012. An improved stock price prediction using hybrid market indicators.
African Journal of Computing & ICT, 5(5), pp.124-135.
14. Saniee, M. and Habibi, A.J., 2010. A Hybridization of Evolutionary Fuzzy Systems and Ant Colony Optimization for Intrusion
Detection. ISeCure, 2(1).
15. Shuang, B., Chen, J. and Li, Z., 2011. Study on hybrid PS-ACO algorithm. Applied Intelligence, 34(1), pp.64-73.
16. Bies, R.R., Muldoon, M.F., Pollock, B.G., Manuck, S., Smith, G. and Sale, M.E., 2006. A genetic algorithm-based, hybrid machine
learning approach to model selection. Journal of Pharmacokinetics and Pharmacodynamics, 33(2), pp.195-221.
17. Helmy, T., Fatai, A. and Faisal, K., 2010. Hybrid computational models for the characterization of oil and gas reservoirs. Ex pert
Systems with Applications, 37(7), pp.5353-5363.
18. Liu, Y., Zheng, Q., Shi, Z. and Chen, J., 2004, August. Training radial basis function networks with particle swarms. In Inte rnational
Symposium on Neural Networks (pp. 317-322). Springer, Berlin, Heidelberg.
19. Chen, J. and Qin, Z., 2006, October. Training RBF neural networks with PSO and improved subtractive clustering algorithms. In
International Conference on Neural Information Processing (pp. 1148-1155). Springer, Berlin, Heidelberg.
20. Cui, X., Potok, T.E. and Palathingal, P., 2005, June. Document clustering using particle swarm optimization. In Proceedings 2005
IEEE Swarm Intelligence Symposium, 2005. SIS 2005. (pp. 185-191). IEEE.
21. Zhang, C., Shao, H. and Li, Y., 2000, October. Particle swarm optimisation for evolving artificial neural network. In Smc 2000
conference proceedings. 2000 ieee international conference on systems, man and cybernetics.'cybernetics evolving to systems, humans,
organizations, and their complex interactions'(cat. no. 0 (Vol. 4, pp. 2487-2490). IEEE.
22. Al-kazemi, B. and Mohan, C.K., 2002, November. Training feedforward neural networks using multi-phase particle swarm
optimization. In Proceedings of the 9th International Conference on Neural Information Processing, 2002. ICONIP'02. (Vol. 5, pp.
2615-2619). IEEE.
23. Shrivastava, P. and Verma, C.K., Optimization of the variance of attribute by hybrid swarm intelligence and option price pred ication
by cascading neural network. Bioscience Biotechnology Research Communications, Vol. 12, pp. 324-332, 2019
24. Shrivastava, P. and Verma, C.K., Prediction of Option Price using Ensemble of Machine Learning Algorithms for Indian Stock Market.
International Journal of Recent Technology and Engineering (IJRTE), Vol. 8 Issue-2, 2019, p.3231-3241.

Authors: Lijin George, D S Robinson Smart, Vishnu Haridas

Paper Title: Effect of Reinforcements on Specific Wear rate of Al 7075 / TiB2/ Cr2O3 hybrid Composites
Abstract: A composite material contains different reinforcing elements added to the major material that
forms the base matrix. In this work Aluminium 7075 matrix was reinforced with 12% TiB2and 4%, 6% and 8%
Cr2O3 and the wear behavior of this composite was studied. The composite material was prepared by the
process of stir casting. The rate of specific wear was measured for different reinforcements under varying
608. velocity and load. The Scanning Electron Microscope images of the worn-out surfaces were used to investigate
the wear pattern. The wear rate could further be extrapolated using fuzzy logic and were compared with the 3451-
experimental results. 3454

Keyword : Hybrid composites, Stir Casting, Fuzzy Logic, Specific Wear rate, Pin on disc, Micro hardness,
Impact Strength
References:
1. Gopichand Dirisenapu, Seelam Reddy, and Lingaraju Dumpala. “The effect of B4C and bn nanoparticles on the mechanical and
microstructural properties of al7010 hybrid metal matrix.” ,Materials Research Express, 6, 08 2019.
2. A. Baradeswaran, S.C. Vettivel, A. Elaya Perumal, N. Selvakumar, and R. Franklin Issac. “Experimental investigation on mechanical
behaviour, modelling and optimization of wear parameters of B 4C and graphite reinforced aluminium hybrid composites.” ,Materials
& Design, 63:620 – 632, 2014. ISSN 0261-3069.
3. S. Johny James, K. Venkatesan, P. Kuppan, and R. Ramanujam. “Hybrid aluminium metal matrix composite reinforced with SiC and
TiB2.”, Procedia Engineering, 97:1018 – 1026, 2014. ISSN 1877-7058.
4. Mahmood Khan, Muhammad Zulfaqar, Fahad Ali, and Tayyab Subhani. “Microstructural and mechanical characterization of hybrid
aluminum matrix composite containing boron carbide and Al-Cu-Fe quasicrystals.”, Metals and Materials International, 23(4):813–
822, Jul 2017. ISSN 2005-4149.
5. Basavarajappa Kuldeep, Ravikumar P, Pradeep S, and Gopi K.R. “Effect of boron nitride and zirconium dioxide on mechanical
behavior of Al 7075 metal matrix hybrid composite.” ,Materials Research Express, 6, 11 2018.
6. Senthil Kumar Marikkannan and Natrayan L. “Processing and characterization of AA2024/Al 2O3/sic reinforces hybrid composites
using squeeze casting technique.” ,Iranian Journal of Materials Science and Engineering, 16:55–67, 07 2019. doi:
10.22068/ijmse.16.2.55.
7. Balachandar Munisamy, Vijaya Ramnath Bindu Madhavan, Elanchezhian Chinnadurai, and Jeykrishnan Janardhanan. “Prediction of
mechanical properties of Al6061 metal matrix composites reinforced with zircon sand and boron carbide. “ ,Materials Testing,
61(6):537–542, Jun 2019. ISSN 0025-5300.
8. R. Palanivel, Isaac Dinaharan, R. Laubscher, and J. Davim. “Influence of boron nitride nanoparticles on microstructure and wear
behavior of AA6082/TiB2 hybrid aluminum composites synthesized by friction stir processing.”, Materials and design, 106:195–204,
06 2016.
9. Pratip Roy, Subhash Singh, and Kaushik Pal. “Enhancement of mechanical and tribological properties of SiC - and BC-reinforced
aluminium 7075 hybrid composites through friction stir processing.”, Advanced Composite Materials, 28(sup1):1–18, 2019.
10. Mahmut Can Senel, Mevlut Gurbuz, and Erdem Koc. “Fabrication and characterization of synergistic Al-SiC-gnps hybrid
composites.”, Composites Part B: Engineering, 154:1 – 9, 2018. ISSN 1359-8368.
11. Vipin Kumar Sharma and Vinod Kumar. “Development of rare-earth oxides based hybrid amcs reinforced with SiC/Al 2O3: mechanical
& metallurgical characterization.” ,Journal of Materials Research and Technology, 8(2):1971 – 1981, 2019. ISSN 2238-7854.

Authors: C.Ramakrishna, B.Venkateshwarlu , J.Srinivas , S.Srinivas

Paper Title: IoT based Smart Farming using Cloud Computing and Machine Learning
Abstract: Internet of Things (IoT) is a most emerging and advanced technology that works on computing
and communications. The survival of human beings in the world depends on the agricultural sector. The
traditional agriculture methods are to be replaced with smart technologies. In order to minimize the cost,
maintenance and monitoring the farms the technologies are used. The smart sensors sense the parameters like
temperature, humidity, water level, soil nutrition’s and PH levels are monitored. In this paper IoT methods are
used for smart farming .

Keyword : The traditional agriculture methods are to be replaced with smart technologies.

References:
1. Resh.H.M , Hydroponics food production:A definitive guide book for advanced home gardener and the commercial hydroponics
grower(7th.edu).CRC Press.
2. Miguel A.Zamora-Izuierdo, jose Santa, Juan A.Martinez,VicenteMartinez,AntonioF.Skarmete, “smart farming IoT Platform based on
609. edge and cloud computing”Bio-system Engineering,2019.
3. An, W.,Wu,D.,Ci,s. Luo,H.Adamchuk.V, Xu.Z ., “Agricultural cyber physical systems. In cyber system: Foundations, Principle and
applications ,2017. 3455-
4. MiquelA.Zamora, Izquierdo, joseSanta, Juan A,Martinez, Vicente Martinez, Antonio F.Scarmeta, " Smart farming IoT platform based 3458
on edge and cloud computing",2019.
5. Mahammad Shareef Mekala, P.Viswanathan, " CLAY-MIST:IoT-cloud enabled CMM index for smart agriculture
monitoringsystem",2018.
6. Zhao Liqiang, Yin Shouyi, Liu Leibo, Zhang Zhen, Wei Shaojun,ʊ A crop Monitoring System Based on Wireless Sensor
Network‫ۅ‬ELSEVIER,Procedia Environmental Sciences-2011.
7. Fan TongKe, “Smart Agriculture based on Cloud Computing and IoT”, Journal of convergence information Technology, vol.8
nov.2013
8. Archana and Priya, "Design and Implementation of Automatic Plant Watering System" given at International Journal of Advanced
Engineering and world technology, vol-04, Issue-01, Jan-2016.
9. S. A. Salunke,“An Overview on Wireless Sensor Technologies for the Development of Agriculture”, S. Y. Chincholikar, S. P. Kha rde,
International Journal of Computer Science and Mobile Computing, Vol.4
10. Issue.6, June- 2015, pg. 416-418.
11. Li Jianting, Zhang Yingpeng, "Design and Accomplishment of the Real- Time Tracking System of Agricultural Products Logistics
Process."EProduct E-Service and E-Entertainment (ICEEE), 2010 International Conference on , pp.1,4, 7-9 Nov. 2010.
12. Dayaker, P., Honey Diana, , Chandrasekhara Reddy, T., Mallikarjuna Reddyreddy, A.” Advancements of security and privacy of
sensitive data cloud computing” Jour of Adv Research in Dynamical & Control Systems, Vol. 10, 11-Special Issue, 2018.
13. A.Mallikarjuna, B. Karuna Sree, “ Security towards Flooding Attacks in Inter Domain Routing Object using Ad hoc Network”
International Journal of Engineering and Advanced Technology (IJEAT), Volume-8 Issue-3, February 2019.

Authors: Shreevijay S Ittannavar, Raviraj H Havaldar, Bhavaling Alias Pratima Khot

Paper Title: A Research on Breast Cancer Detection using Mammography


Abstract: The digital mammogram has developed as the standard screening approach for breast cancer
detection and further defects in human breast tissue problem. Early detection is an efficient manner to decrease
610. mortality in worldwide. In the past decades, several researchers implemented many methods to consistently
identify the breast cancer by mammogram images. Those methods were employed to produce systems to support 3459-
radiologists and physicians attain more accurate diagnosis. Accurate segmentation and classification of various 3463
tumors in the mammography plays a complex role in the early diagnosis of breast cancer. This paper defines the
research on Breast Cancer Detection (BCD) methods which includes two major steps such as segmentation and
classification. This research presented the different types of BCD methods with their main contributions.
Additionally, it assists the researchers in the area of breast cancer detection by providing the basic knowledge
and common understanding of the newest BCD methods.

Keyword : Breast cancer, Classification, Mammogram, Segmentation, and Radiologists.


References:
1. D.C. Pereira, R.P. Ramos, and M.Z.D. Nascimento, “Segmentation and detection of breast cancer in mammograms combining wavelet
analysis and genetic algorithm,” Computer methods and programs in biomedicine, vol. 114, no. 1, pp. 88-101, 2014.
2. B. Pardamean, T.W. Cenggoro, R. Rahutomo, A. Budiarto, and E.K. Karuppiah, “Transfer Learning from Chest X-Ray Pre-trained
Convolutional Neural Network for Learning Mammogram Data,” Procedia Computer Science, vol. 135, pp. 400-407, 2018.
3. P. Kaur, G. Singh, and P. Kaur, “Intellectual Detection and Validation of Automated Mammogram Breast Cancer Images by Multi -
Class SVM using Deep Learning Classification,” Informatics in Medicine Unlocked, p.100151, 2019.
4. R.W.D. Pedro, A. Machado-Lima, and F.L.S. Nunes, “Is mass classification in mammograms a solved problem?-a critical review over
the last 20 years,” Expert Systems with Applications, vol. 119, pp.90-103, 2018.
5. S.M. Badawy, A.A. Hefnawy, H.E. Zidan, and M.T. GadAllah. “Breast Cancer Detection with Mammogram Segmentation: A
Qualitative Study,” International Journal of Advanced Computer Science and Application, vol. 8, no. 10, pp. 117-120, 2017.
6. K.C. Oeffinger, E.T.H. Fontham, R. Etzioni, A. Herzig, J.S. Michaelson, Y.C.T. Shih, L.C. Walter, T.R. Church, C.R. Flowers, S.J.
LaMonte, A.M. Wolf, “Breast cancer screening for women at average risk: 2015 guideline update from the American Cancer Society,”
Jama, vol. 314, no. 15, pp. 1599-1614, 2015.
7. W.K. Moon, Y.W. Shen, M.S. Bae, C.S. Huang, J.H. Chen, and R.F. Chang, “Computer-aided Tumor Detection Based on Multi-scale
Blob Detection Algorithm in Automated Breast Ultrasound Images,” IEEE transactions on medical imaging, vol. 32, no. 7, pp.1191-
1200, 2012.
8. A. Das, U.R. Acharya, S.S. Panda, and S. Sabut, “Deep learning based liver cancer detection using watershed transform and Gau ssian
mixture model techniques,” Cognitive Systems Research, vol. 54, pp. 165-175, 2019.
9. J.M. Cochran, D.R. Busch, L. Lin, D.L. Minkoff, M. Schweiger, S. Arridge, and A.G. Yodh, “Hybrid time-domain and continuous-
wave diffuse optical tomography instrument with concurrent, clinical magnetic resonance imaging for breast cancer imaging,” Journal
of biomedical optics, vol. 24, no. 5, pp. 051409, 2019.
10. M.L. Marinovich, D. Bernardi, P. Macaskill, A. Ventriglia, V. Sabatino, and N. Houssami, “Agreement between digital breast
tomosynthesis and pathologic tumour size for staging breast cancer, and comparison with standard mammography,” The Breast, vol.
43, pp. 59-66, 2019.
11. P. Shi, J. Zhong, A. Rampun, and H. Wang, “A hierarchical pipeline for breast boundary segmentation and calcification detection in
mammograms,” Computers in biology and medicine, vol. 96, pp. 178-188, 2018.
12. H. Deng, W. Deng, X. Sun, M. Liu, C. Ye, and X. Zhou, “Mammogram enhancement using intuitionistic fuzzy sets,” IEEE
Transactions on Biomedical Engineering, vol. 64, no. 8, pp. 1803-1814, 2017.
13. H. Shah, “Automatic Classification of Breast Masses for Diagnosis of Breast Cancer in Digital Mammograms using Neural Network,”
IJSTE - International Journal of Science Technology & Engineering, vol. 1, no. 11, pp. 47-52, 2015.
14. K.L. Kashyap, M.K. Bajpai, and P. Khanna, “BCDin digital mammograms,” In IEEE International Conference on Imaging Systems
and Techniques (IST), pp. 1-6, 2015.
15. H.B. Pan, K.F. Wong, A. Yao, G.C. Hsu, C.P. Chou, H.L. Liang, J.S. Huang, H.J. Li, S.C. Wang, and T.L. Yang, “Breast cancer
screening with digital breast tomosynthesis-4 year experience and comparison with national data,” Journal of the Chinese Medical
Association, vol. 81, no. 1, pp. 70-80, 2018.
16. I.K. Maitra, S. Nag, and S.K. Bandyopadhyay, “Technique for preprocessing of digital mammogram,” Computer methods and
programs in biomedicine, vol. 107, no. 2, pp. 175-188, 2012.
17. S.S. Kumar, A. Prateek, and M. Vishu, “Breast cancer diagnosis using digital image segmentation techniques,” Indian Journal o f
Science and Technology, vol. 9, no. 28, pp. 1-5, 2016.
18. W. Xie, Y. Li, and Y. Ma, “Breast mass classification in digital mammography based on extreme learning machine,” Neurocomputing,
vol. 173, pp. 930-941, 2016.
19. M. Abdel-Nasser, J. Melendez, A. Moreno, and D. Puig, “The impact of pixel resolution, integration scale, preprocessing, and feature
normalization on texture analysis for mass classification in mammograms,” International Journal of Optics, vol. 2016, 2016.
20. S. Khan, M. Hussain, H. Aboalsamh, and G. Bebis, “A comparison of different gabor feature extraction approaches for mass
classification in mammography,” Multimedia Tools Applications, vol. 76, no. 1, pp. 33–57, 2017.
21. Z. Jiao, X. Gao, Y. Wang, and J. Li, “A parasitic metric learning net for breast mass classification based on mammography,” Pattern
Recognition, vol. 75, pp. 292-301, 2018.
22. F. Chokri, and M.H. Farida, “Mammographic mass classification according to Bi-RADS lexicon,” IET Computer Vision, vol. 11, no. 3,
pp. 189-198, 2016.
23. A. Mouelhi, H. Rmili, J.B. Ali, M. Sayadi, R. Doghri, and K. Mrad, “Fast unsupervised nuclear segmentation and classification scheme
for automatic allred cancer scoring in immunohistochemical breast tissue images,” Computer methods and programs in biomedicine,
vol. 165 pp. 37-51, 2018.
24. M.A. Al-antari, M.A. Al-masni, M.T. Choi, S.M. Han, and T.S. Kim, “A fully integrated computer-aided diagnosis system for digital
X-ray mammograms via deep learning detection, segmentation, and classification,” International journal of medical informatics, vol.
117 pp. 44-54, 2018.

Authors: Piyush G. Chandak, Anand B. Tapase, Ravindra P. Patil, Sabir S. Sayyed, Abdulrashid C. Attar

Paper Title: Utilizing different wastes in rural roads of Karad, District – Satara, India
Abstract: The rural roads in India comprise of village roads (VR) and other district roads (ODR). The
traffic intensity is taken as 2 million standard axles (msa) since traffic load has increased on the rural roads. The
design guidelines have recommended the utilization of wastes accessible in the nearby vicinity for road
construction. Effective disposal of wastes such as plastic, rubber and electronic waste is the main concern in
India. The adverse effects of these identified wastes could be put to a beneficial use if utilized in road
611. construction. Due to the increasing trend of heavy traffic on rural roads, a bituminous Macadam layer is
generally laid over granular layers of the pavement. As such, the primary objective of the research is to discover 3464-
the optimum content of using the identified wastes to replace bitumen and aggregates of rural roads. Numbers of 3469
laboratory tests have been carried out on modified mixtures to understand the aptness and optimum content of
the wastes in construction of rural roads. The strength property of the naturally available soil was studied for the
rural roads in Karad. The California bearing ratio test analysis and their outcomes were employed to assess the
strength of the subgrade in the study area. Further, based on the suitability of identified wastes in bituminous
layer, IITPave software was used to analyze the performance of rural roads of the study area. Using the IITPave
software, design charts were created based on utilizing the wastes for rural roads in Karad, District – Satara,
India.

Keyword : Marshall Stability, CBR, rural roads, wastes.


References:
1. A.R. Pasandin & I. Perez,"Fatigue performance of bituminous mixtures made with recycled concrete aggregates and waste tire rubber"
Construction & Building Materials, Elsevier, 2017, pp 26-33.
2. Abdhesh K.Sinha, Satish Chandra and Praveen Kumar,"Finite element analysis of flexible pavement with different subbase materials"
Indian Highways, 2014, New Delhi, 42(2), 53-63.
3. Adriana Vargas-Nordcbeck & David H. Timm,"Rutting characterization of warm mix asphalt and high RAP mixtures" Road Materials
and Pavement Design, 2012, 13:sup1, 1-20, doi: 10.1080/14680629.2012.657042.
4. Ali Ebrahimi , Brian R. Kootstra , Tuncer B. Edil& Craig H. Benson,"Practical approach for designing flexible pavements using
recycled roadway materials as base course" Road Materials and Pavement Design, 2012, 13:4, 731 -748,
doi.org/10.1080/14680629.2012.695234.
5. Appiah Johnson Kwabena, Berko-Boateng Victor Nana, Tagbor Trinity Ama,"Use of waste plastic materials for road construction in
Ghana" Case Studies in Construction Materials, 2017, http://dx.doi.org/10.1016/j.cscm.2016.11.001
6. ASTM Standard D 1559 "Standard Test Method for Resistance to Plastic Flow of Bituminous Mixtures Using Marshall Appara tus 4-
inch Intended for Mixes Containing Aggregate up to 1-inch", USA, 1992.
7. Davide Lo Presti,"Recycled Tyre Rubber Modified Bitumen for road asphalt mixtures: A literature review" Construction & Building
Materials, Elsevier, Vol. 49, 2013, pp 863-881, http://dx.doi.org/10.1016/j.conbuildmat.2013.09.007
8. Dr. Aditya Kumar Anupam, Dr. Praveen Kumar and Dr. G. D. Ransinchung R. N.,"Laboratory study on performance of various
agricultural and industrial waste materials in road construction" Indian Highways, volume 45, No. 5, 2017, pp 13-28.
9. Dr. Umesh Shama, Harish Kumar Giri and Ankita Khatri,"Use of recycled asphalt material for sustainable road construction" Indian
Highways, Vol. 46, No. 9, 2018, pp 29-38.
10. Gowtham C & K Ganesh,"Evaluation of rutting performance in plain and modified bituminous concrete mix using steel slag as partial
filler replacement" Indian Highways, Vol. 46, No. 12, 2018, pp 33-41.
11. IRC: 37-2012. “Guidelines for the design of flexible pavements.” Indian Roads Congress, New Delhi.
12. IRC: SP: 72-2015 (First Revision). “Guidelines for the design of flexible pavements for Low Volume Rural Roads.” New Delhi: Indian
Roads Congress.
13. IRC: SP: 98-2013 "Guidelines for the use of waste plastic in hot bituminous mixes(dry process) in wearing courses" Indian Roads
Congress, New Delhi.
14. Islam Abo El-Naga and Mohamed Ragab "Benefits of utilization the recycle polyethylene terephthalate waste plastic materials as a
modifier to asphalt mixtures" Construction & Building Materials, Elsevier, 2019, pp 81-90,
https://doi.org/10.1016/j.conbuildmat.2019.05.172
15. Jia Xiaoyang, Ye Fen & Huang Baoshan,"Utilization of construction and demolition wastes in low volume roads for rural areas in
China" Transportation Research Record: Journal of the Transportation Research Board, 2015, pp. 39–47, DOI: 10.3141/2474-05
16. K. Kranthi Kumar, R. Rajasekhar, M. Amarnatha Reddy and B. B. Pandey,"Reclaimed asphalt pavements in bituminous mixes" Indian
Highways, 2014, pp 12-18.
17. K. Sai Kubair, Shreyans R. Surana, M. Venkata Sai Krishna, Sridhar Raju and V. Vinayaka Ram,"Rutting potential of gap graded
warm mix asphalt with higher percentage of crumb rubber" Urbanization Challenges in Emerging Economies, ASCE, pp 539 -548.
18. Kranthi Kuna, Gordon Airey, Nick Thom,"Structural design of pavements incorporating foamed bitumen mixtures" Proceedings of the
Institution of Civil Engineers, 2016, doi: 10.1680/jcoma.16.00039
19. L.R. de Rezende, M.O. Marques & N.L. da Cunha,"The use of nonconventional materials in asphalt pavements base" Road Materials
and Pavement Design, 2015, 16:4, 799-814, doi: 10.1080/14680629.2015.1055334.
20. Lucas Delongui, Matheus Matuella, Washington Peres Nunez, William Fedrigo, Luiz Carlos Pinto & Jorge Augusto
Pereira,"Construction& demolition waste parameters for rational pavement design" Construction & Building Materials, 2018, pp 105-
112,doi:10.1016/j.conbuildmat.2018.02.086
21. Ministry of Road Transport and Highways (2010). Basic road statistics of India 2004–2008, Report by Transportation Research Wing,
Government of India, New Delhi.
22. Pakhare Jagjit Laxman and Bhosale Sukhanand Sopan,"Effect of Ewaste plastic as aggregate replacement on Marshall mix design of
dense bituminous macadam" Indian Highways, Vol. 45, No. 4, 2017, pp 51-60.
23. Salih Kocak& M. Emin Kutay,"Use of crumb rubber in lieu of binder grade bumping for mixtures with percentage of reclaimed asphalt
pavement" Road Materials & Pavement Design , doi: 10.1080/14680629.2016.1142466
24. Sandip Karmakar& Tapas Kumar Roy,"Effect of waste plastic and waste tires ash on mechanical behavior of bitumen" Journal of
Materials in Civil Engineering, ASCE, 2016, DOI: 10.1061/(ASCE)MT.1943-5533.0001484.
25. Srinivas F. Chitraghar & DharamveerSingh,"Laboratory performance of asphalt mixes containing recycled asphalt pavement" Indian
Highways, Vol. 45, No. 12, 2017, pp 17-22.
26. Tapase A. B. & Kadam D. B. “Performance evaluation of polymer modified bitumen in flexible pavement” Journal of Environmental
Research and Development, (2014), Vol. 8, No. 3.
27. Zhanyong Yao, Jizhe Zhang, Faliang Gao, Shengjie Liu & Tenghai Yu,"Integrated utilization of recycled crumb rubber and
polyethylene for enhancing the performance of modified bitumen" Construction & Building Materials, Elsevier, 2018, pp 217-224.

Authors: M.S Bennet Praba, Sagari Sen, Chailshi Chauhan, Divya Singh

Paper Title: Ai Healthcare Interactive Talking Agent using Nlp


Abstract: Good nutrition plays an important part in leading an active lifestyle. Combined with physical
exercises, the diet can benefit people to maintain their weight, reduce the possibility of diseases and improve
overall health. A self-help motivational tool for weight maintenance is a good option. This paper presents an
interactive talking agent that is a chatbot. A chatbot is a piece of software that operates a conversation using
textual methods. Chatbot will start communication with the user and help to solve the concern by initiating a
612. human way conversation using Language Understanding Intelligence Service (LUIS) concept. Natural language
processing (NLP) is the capability of a computer application for understanding human dialect. It is one of the 3470-
part of Artificial Intelligence (AI). Each language has a different morphology the chatbot has to be able to 3473
separate words into individual morphemes. Morphology is one of the tasks that NLP should be able to handle.

Keyword : NLP, morphology, Chabot, healthguide, python


References:
1. Luciana Benotti, Maria Cecilia Martinez, and Fernando Schapachnik, “A tool for introducing computer science with automatic
formative assessment”,InProc. IEEE transaction paper, 2017.
2. Carducci S. &R.center, “AI- Chatbot: Elderly Aid”, Former UNIVPM AI Lab, Fermo-FM, Italy, 2018.
3. Dongkeon Lee, Kyo-Joong Oh, Ho-Jin Choi, “The chatbot feels you- a counse;ing Service using emotional response generation”,
Korea Advanced Institute of Science and technology, IEEE 2017.
4. Godson Michael D’Silva, Sanket Thakare, Sharddha More, “Real world smart chatbot for customer care using a Software as a service
architecture”, St. John College of Engineering and Technology, Palghar, International conference on I-SMAC, IEEE 2017.
5. Ramya Ravi, “Intelligent chatbot for easy web analytics insights”, Tata consultancy services”, IEEE 2018.
6. Chin-Yuan Huang, Ming-Chin Yang, Chin-Yu Huang, “A chatbot- supported smart wireless interactive healthcare system for weight
control and health promotion”, Institute of Health Policy and Management, in proc. IEEE IEEM, 2018.
7. AM Rahman, Abdullah A1 Mamun, Alma Islam, “Programming challenges of chatbot: Current and future prospective”, International
Islamic University Chittagong, IEEE 2017.
8. Samuel Holmes, Anne Moorhead, Raymond Bond, and Huiru Zheng, “Weight Mentor: A new automated chatbot for weight loss
maintenance”, Ulster University, 2018.
9. Bhaumik Kohli, Tanupriya Chopudhury, Shilpi Sharma and Praveen Kumar, “A platform for human chatbot interaction using
python”, Amity University Uttar Pradesh Noida-India, IEEE 2018.
10. Md. Shahriare Satu, Md. Hasnat Parvez, Shammim-Al-Mamun, “Review of integrated applications with AIML based chatbot”,
Institute of Information technology Jahangir nagar University Dhaka, Bangladesh ,IEEE 2015.
11. Godson Michael D’Silva, Sanket Thakare, Sharddha More, “Real world smart chatbot for customer care using a Software as a service
architecture”, St. John College of Engineering and Technology, Palghar, International conference on I-SMAC, IEEE 2017.
12. Taweesaksamanchuen and Nudtaporn Rosruen, “Chatbot utilization for medical consultant system”, Technology of Information
System Management Division, Mahidol University, in Proc. TIMES-iCON2018[13] So-Young Park, Jeunghyun Byun, Hae-Chang
Rim, “Natural Language based user interface for mobile devices with limited resources”, in Proc. IEEE transaction paper, 2010.
13. https://en.wikipedia.org/wiki/Chatbot
14. http://www.cs.bham.ac.uk

Authors: Azlan, N.A.A.N., Mohamad, E., Salleh, M.R., Saptari, A.


Application of Optimization Technique in Managing Labour Productivity for an Automotive
Paper Title:
Company
Abstract: Sustaining in the new industrial revolution 4.0 requires industries in Malaysia to be dynamic in
all aspects towards handling the variations. One of the aspects is well managing their productivity throughout the
changes. Four types of elements that can be looked up as measuring the productivity such as labor, capital,
material and total factor productivity. While the labour productivity is among of three of the four types which
typically important is assessing industry performance. It computes efficiency of the labour to process input into
good value of output. Thus, accurate number of labour allocation is essential in producing high labour
productivity. Hence, this paper is to provide alternative way to managers or decision makers on managing the
labour allocation and analyzing result with the aid of optimization technique to enhance labour productivity. The
application of the optimization technique is portrayed on an automotive company situated in Melaka, Malaysia
that facing labour allocation issue. The flow of methodology is first by conducting problem identification using
Pareto chart to target area of issue. Then, formulating the problem in linear programming (LP) model and finally
solving the problem using Simplex method to generate the optimum number of labour based on the set
constraints. The generated optimum number of labour is then loaded into the labour productivity formula and the
outcome resulting to the betterment of percentage of labour productivity compared to the current approach. In
this context, the labour productivity is measured by the unit of number of working hours per number of task
perform. This application gives benefit to the industry in ensuring that involved teams in the company able to
commit with the company’s project timeline and due with consideration of all important constraints/ limitations
occurred from that involved teams. Also, with the aid of this optimization technique, the company can foresee
the result of the number of labour allocated without the need of utilizing actual resources in the actual arena.

613. Keyword : Labour productivity, linear programming problem, optimization technique, simplex method.
3474-
References: 3481
1. Nasiibah, R. and Zinatul, A.Z., “University-Industry Collaboration: Entrepreneurial University Catalyst Towards,” Prosceeding
PERKEM VIII, vol. 3, pp. 1227–1233, 2013.
2. MESTECC, “Researcher-Industry Scientific Exchange (RISE) Programme,” 2019.
3. Kapelko, M., Lansink, A.O. and Stefanou, S.E., “Effect of Food Regulation on the Spanish Food Processing Industry: A Dynamic
Productivity Analysis,” PLoS One, vol. 10, no. 6, pp. 1–16, 2015.
4. Ohueri, C.C., Enegbuma, W.I., Wong, N.H., Kuok, K.K. and Kenley, R., “Labour Productivity Motivation Framework For Iskandar
Malaysia,” Built Environment Project Asset Management, vol. 8, no. 3, pp. 293–304, 2018.
5. Siu, M.F.F., “Resource Budget For Workface Planning In Industrial-Construction,” Facilities, vol. 37, no. 5–6, pp. 292–312, 2019.
6. Chaturvedi, S., Thakkar, J.J. and Shankar, R., “Labor Productivity in The Construction Industry: An Evaluation Framework for Causal
Relationships,” Benchmarking, vol. 25, no. 1, pp. 334–356, 2018.
7. Mahamid, I., “Contractors Perspective Toward Factors Affecting Labor Productivity in Building Construction,” Engineering,
Construction and Architectural Management, vol. 20, no. 4, pp. 446–460, 2013.
8. Ghoddousi, P., Alizadeh, B.T., Hosseini, M.R. and Chileshe, N., “Implementing The International Benchmarking Labour Productivity
Theoretical Model,” Benchmarking, vol. 21, no. 6, pp. 1041–1061, 2014.
9. Shahidul, M.I., and Shazali, S.T.S., “Dynamics of Manufacturing Productivity: Lesson Learnt From Labor Intensive Industries,”
Journal Manufacturing Technology Management, vol. 22, no. 5, pp. 664–678, 2011.
10. Ugulu, R.A. and Allen, S., “Using The Learning Curve Theory In The Investigation Of On-Site Craft Gangs’ Blockwork Construction
Productivity,” Built Environment Project Asset Management, vol. 8, no. 3, pp. 267–280, 2018.
11. Islam, S. and Shazali, S.T.S., “ Determinants Of Manufacturing Productivity: Pilot Study On Labor-Intensive Industries,” International
Journal Production. Performance Management, vol. 60, no. 6, pp. 567–582, 2011.
12. Tang, C.F., “The Non-Monotonic Effect Of Real Wages On Labour Productivity: New Evidence From The Manufacturing Sector In
Malaysia,” International Journal Social Economy, vol. 39, no. 6, pp. 391–399, 2012.
13. Iqbal, N., Ahmad, M., Allen, M.M.C. and. Raziq, M.M., “Does E-HRM Improve Labour Productivity? A Study Of Commercial Bank
Workplaces In Pakistan,” Employee Relations, vol. 40, no. 2, pp. 281–297, 2018.
14. Yang, J. and Chen, H., “Can Rewards Incentives Of Non-State-Owned Enterprises Realize Co-Win Cooperation Of Workers,
Enterprises And The Society?: From The Perspective Of Labor Productivity, Profit And Labor Absorption,” Nankai Business Review
International, vol. 10, no. 2, pp. 179–206, 2019.
15. Enshassi, A., Mohamed, S., Mayer, P. and Abed, K., “Benchmarking Masonry Labor Productivity,” International Journal Production
Performance Management, vol. 56, no. 4, pp. 358–368, 2007.
16. Anggoro, B.S.R., Rosida, M., Mentari, A.M., Novitasari, C.D. and Yulista, I., “Profit Optimization Using Simplex Methods On Home
Industry Bintang Bakery In Sukarame Bandar Lampung,” Journal Physics: Conference Series, vol. 1155, no. 1, 2019.
17. Salama, T. and Moselhi, O., “Multi-Objective Optimization For Repetitive Scheduling Under Uncertainty,” Engineering, Construction
and Architectural Management, vol. 0217, no. 2, pp. 1294–1320, 2019.
18. Ugulu, R.A., Arewa, A. and Allen, S., “Project-Specific Constraints Influencing Productivity Of Tradespeople In The Nigerian
Construction Industry,” Built Environment Project and Asset Management, pp. 1-14, 2019.
19. Aulia, M.R., Putra, D.N., Murniati, S., Mustahiroh, M., Octavia, D., and Budiasih, Y., “Maksimalisasi Keuntungan Dengan Pendekatan
Metode Simpleks Studi Kasus pada Pabrik Sendai X di Ciputat, Tangerang Selatan,” Liquidity, vol. 2, no. 2, pp. 144–150, 2018.
20. Saleh, S.A., and Latif, T.I., “Solving Linear Programming Problems By Using Excel ’ s Solver,” Tikrit University ‫تﯾرﻛﺗ ﺔﻌﻣﺎﺟ‬,” vol. d,
no. April, 2019.
21. Sriwidadi, T. and Agustina, E., “Analisis Optimalisasi Produksi Dengan Linear Programming Melalui Metode Simpleks Teguh
Sriwidadi,” Binus Business Review, vol. 4, no. 2, pp. 725–741, 2013.
22. Hussain, M.R., Qayyum, M. and Hussain, M.E., “Effect Of Seven Steps Approach On Simplex Method To Optimize The Mathematical
Manipulation,” International Journal Recent Technology Engineering, vol. 7, no. 5, pp. 34–43, 2019.
23. Febres, G.L., “A Space Decomposition-Based Deterministic Algorithm For Solving Linear Optimization Problems,” Axioms, vol. 8,
no. 3, 2019.
24. Nadar, D. K., “Some Applications of Simplex Method,” RIET-IJSET International Journal Science Engineering Technology, vol. 2,
no. 2, p. 171, 2015.
25. Azlan, N.A.A.N., Saptari, A. and Mohamad, E. “Augmentation of Simplex Algorithm for Linear Programming Problem to Enhance
Computational Performance,” Journal Advanced Manufacturing Technology -Special Issue Symposium 2017, vol. 11, no. November,
pp. 31–46, 2017.
26. Tesfaye, G., Berhane, T., Zenebe, B. and Asmelash, S., “A Linear Programming Method to Enhance Resource Utilization Case,”
International Journal for Quality Research, vol. 10, no. 2, pp. 421–432, 2016.

Authors: Varsha Aithal, Roshan David Jathanna

Paper Title: Credit Risk Assessment using Machine Learning Techniques


Abstract: Analysis of credit scoring is an effective credit risk assessment technique, which is one of the
major research fields in the banking sector. Machine learning has a variety of applications in the banking sector
and it has been widely used for data analysis. Modern techniques such as machine learning have provided a self-
regulating process to analyze the data using classification techniques. The classification method is a supervised
learning process in which the computer learns from the input data provided and makes use of this information to
classify the new dataset. This research paper presents a comparison of various machine learning techniques used
to evaluate the credit risk. A credit transaction that needs to be accepted or rejected is trained and implemented
on the dataset using different machine learning algorithms. The techniques are implemented on the German
credit dataset taken from UCI repository which has 1000 instances and 21 attributes, depending on which the
transactions are either accepted or rejected. This paper compares algorithms such as Support Vector Network,
Neural Network, Logistic Regression, Naive Bayes, Random Forest, and Classification and Regression Trees
(CART) algorithm and the results obtained show that Random Forest algorithm was able to predict credit risk
with higher accuracy.

Keyword : Classification Algorithm, Credit Risk evaluation, Machine learning, supervised learning.
References:
1. A. Khashman, “Neural networks for credit risk evaluation: Investigation of different neural models and learning schemes,” Expert
Systems with Applications, vol. 37, no. 9, pp. 6233–6239, 2010.
2. S. T. Li, W. Shiue,M. H. Huang, "The evaluation of consumer loans using support vector machines." Expert Systems with
614. Applications, vol. 30, no. 4, pp. 772–782, 2006.
3. A. E. Khandani, A. J. Kim, and A. W. Lo, “Consumer Credit Risk Models Via Machine-Learning Algorithms,” SSRN Electronic
Journal, 2010. 3482-
4. C. L. Devasena, “Adeptness Evaluation of Memory-Based Classifiers for Credit Risk Analysis,” 2014 International Conference on 3486
Intelligent Computing Applications, 2014.
5. N. Gulsoy and S. Kulluk, “A data mining application in credit scoring processes of small and medium enterprises commercial
corporate customers,” Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 2019.
6. X. Huang, X. Liu, and Y. Ren, “Enterprise credit risk evaluation based on neural network algorithm,” Cognitive Systems Research,
vol. 52, pp. 317–324, 2018.
7. A. Khashman, “Credit risk evaluation using neural networks: Emotional versus conventional models,” Applied Soft Computing, vo l.
11, no. 8, pp. 5477–5484, 2011.
8. N M. Wang, J. Yu, and Z. Ji, “Personal Credit Risk Assessment Based on Stacking Ensemble Model,” IFIP Advances in Information
and Communication Technology Intelligent Information Processing IX, pp.328–333, 2018.
9. H. Zhong, C. Miao, Z. Shen, and Y. Feng, “Comparing the learning effectiveness of BP, ELM, I-ELM, and SVM for corporate credit
ratings,” Neurocomputing, vol. 128, pp. 285–295, 2014.
10. U. P. Shukla and S. J. Nanda, “Designing of a Risk Assessment Model for Issuing Credit Card Using Parallel Social Spider
Algorithm,” Applied Artificial Intelligence, vol. 33, no. 3, pp. 191–207, 2018.
11. E. Claderia, G. Brandao, H. Campos, and A. Pereira, "Characterizing and Evaluating Fraud in Electronic Transactions", Eighth Latin
America Web Congress, vol. 12, pp. 115-122, 2018.
12. M. U. Sapozhnikova, A. V. Nikonov, A. M. Vulfin, M. M. Gayanova, K. V. Mironov, D. V. Kurennov, “Anti-fraud system on the
basis of data mining technologies” International Symposium on Signal Processing and Information Technology (ISSPIT), pp. 243-248,
2017.
13. M. Soui, I. Gasmi, S. Smiti, and K. Ghédira, “Rule-based credit risk assessment model using multi-objective evolutionary algorithms,”
Expert Systems with Applications, vol. 126, pp. 144–157, 2019.
14. Y. Sahin and E. Duman, "Detecting Credit Card Fraud by ANN and Logistic Regression", IEEE, pp. 315-319, 2011.
15. A. Bahnsen, A. Stojanovic, D. Aouada and B. Ottersten, "Cost-Sensitive Credit Card Fraud Detection using Bayes Minimum Risk",
2013 12th International Conference on Machine Learning and Applications, pp. 333-338, 2013.
16. A. Srivastava, M. Yadav, S. Basu, S. Salunkhe and M. Shabad, "Credit Card Fraud Detection at Merchant Side using Neural
Networks", 2016 International Conference on Computing for Sustainable Global Development (INDIACom), pp. 667-670, 2016.
17. Lichman, Moshe, “UCI Machine Learning Repository,” http://archive.ics.uci.edu/ml, 2013
18. ttps://archive.ics.uci.edu/ml/datasets/Statlog+(German+Credit+Data)
19. Weka Machine Learning Project, https://www.cs.waikato.ac.nz/ml/weka
Kung-Teck, Wong; Hafizul Fahri Hanafi; Norazilawati Abdullah; Noraini Mohamed Noh;
Authors:
Mahizer Hamzah
A Prototype of Augmented Reality Animation (ARA) E-Courseware: An Assistive Technology To
Paper Title:
Assist Autism Spectrum Disorders (Asd) Students Master In Basic Living Skills
Abstract: The purpose of this study is to identify the e-courseware effectiveness and Special Education
(SpeEdu.) Teacher perception in using Basic Living Skills (BLS) E-courseware prototypes, namely BLS
(Augmented Reality Animation) & BLS (Static graphic). The study employed survey research design and
experimental approaches. The survey design approach was conducted in identifying the usability of the
prototype of Basic Living Skills e-courseware among Special education (SpeEdu) Teachers and for the
experimental design approach was carried out to identify the ASD’s achievements between Basic Living Skills
E-courseware (Augmented Reality Animation) & Basic Living Skills (Static graphic) for Autism Spectrum
Disorders (ASD) students master in basic living skills. A total of five (5) practising SpeEdu teachers had
participated in this study, and there was 4 total number of children involved in the study. The study used a pre-
post experimental research design. The participating in-service teachers and ASD students were selected based
on the criteria required. Pre-test and Post-test instruments were employed to gather ASD students’ achievement
scores. Analysis descriptive was carried out to understand and compare the differences between control and
treatment group. The result indicated that BLS (Augmented Reality Animation) is more effective to be used
rather than BSL (Static graphic) and respondents are more dominant and satisfied with the BLS (Augmented
Reality Animation) presentation. The implications of this study are significant contributions to the Ministry of
Education Malaysia (MOE), teachers, parents and caregivers.

Keyword : Augmented Reality, Autism Spectrum Disorder, Educational Technology, Achievement.


References:
1. Wong, K. T., MSG Hamzah, Goh, P.S.C. & Khatijah, A. (2019). Blended Learning pedagogical practices for improving students’
learning autonomy and academic results in learning. Religación. Revista de Ciencias Sociales y Humanidades 4 (17), 228 -237.
2. Wong, K.T., Abdullah N., Goh, P.S.C (2019). Cross-Examination of the Intention to Integrate MOOCs in Teaching and Learning: An
615. Application of Multi-Group Invariance Analysis. International Journal of Emerging Technologies in Learning, 14 (19),106-116
3. Alison, C., Root, J. R., Browder, D. M., & Wood, L. (2017). Technology-Based Shared Story Reading for Students with Autism Who
Are English-Language Learners. Journal Of Special Education Technology, 32(2), 91-101. 3487-
4. Austin, K. S., & Peña, E. V. (2017). Exceptional Faculty Members Who Responsively Teach Students with Autism Spectrum 3492
Disorders. Journal Of Postsecondary Education And Disability, 30(1), 17-32.
5. Eliçin, Ö., & Kaya, A. (2017). Determining Studies Conducted upon Individuals with Autism Spectrum Disorder Using High-Tech
Devices. Educational Sciences: Theory And Practice, 17(1), 27-45.
6. Yikmis, A. (2016). Effectiveness of the Touch Math Technique in Teaching Basic Addition to Children with Autism. Educational
Sciences: Theory And Practice, 16(3), 1005-1025.
7. Creer, S., Enderby, P., Judge, S., & John, A. (2016). Prevalence of people who could benefit from augmentative and alternative
communication (AAC) in the UK: determining the need. International Journal Of Language & Communication Disorders, 51(6), 639 -
653. doi:10.1111/1460-6984.12235.
8. Gevarter, C., O'Reilly, M. F., Rojeski, L., Sammarco, N., Sigafoos, J., Lancioni, G. E., & Lang, R. (2014). Comparing Acquisition of
AAC-Based Mands in Three Young Children with Autism Spectrum Disorder Using iPad Applications with Different Display and
Design Elements. Journal Of Autism & Developmental Disorders, 44(10), 2464-2474. doi:10.1007/s10803-014-2115-9
9. McLay, L., Schäfer, M. M., van der Meer, L., Couper, L., McKenzie, E., O’Reilly, M. F., & ... Sutherland, D. (2017). Acquis ition,
Preference and Follow-up Comparison Across Three AAC Modalities Taught to Two Children with Autism Spectrum Disorder.
International Journal Of Disability, Development & Education, 64(2), 117-130.
10. Wong, K.T, Teo, T., & Goh, P.S.C. (2014). Development of the Interactive Whiteboard Acceptance Scale (IWBAS): An Initial Study.
Educational Tech-nology & Society, 17(4), 268–277.
11. Wong, K. T., Teo, T., & Pauline, S.C.G. (2015). Understanding and intention to use interactive whiteboard: Model development and
testing. Interactive Learning Environments. 23(6), 731-747.
12. Chiang, T. C., Yang, S. H., & Hwang, G. (2014). An Augmented Reality-based Mobile Learning System to Improve Students'
Learning Achievements and Motivations in Natural Science Inquiry Activities. Journal Of Educational Technology & Society, 17(4),
352-365.
13. Koutromanos, G., Sofos, A., & Avraamidou, L. (2015). The use of augmented reality games in education: a review of the literat ure.
Educational Media International, 52(4), 253-271. doi:10.1080/09523987.2015.1125988.
14. Kucharczyk, S., Reutebuch, C. K., Carter, E. W., Hedges, S., El Zein, F., Fan, H., & Gustafson, J. R. (2015). Addressing the Needs of
Adolescents With Autism Spectrum Disorder: Considerations and Complexities for High School Interventions. Exceptional Children,
81(3), 329-349.
15. Wang, M. Truijens, L. Hou, Y. Wang, Zhou (2014). Integrating augmented reality with building information modeling: onsite
construction process controlling for the liquefied natural gas industry, Autom. Constr. 40, 96–105.
16. Padmadewi, N. N., & Artini, L. P. (2017). Teaching English to a Student with Autism Spectrum Disorder in Regular Classroom in
Indonesia. International Journal Of Instruction, 10(3), 159-176. doi:10.12973/iji.2017.10311a.

Authors: Ananthi N, Akshaya S, Aarthi B, Aishvarya J, Kumaran K

Paper Title: An Image Processing Based Fungus Detection System For Mangoes
Abstract: Fruits which grow with high yield in many states of India are rich in proteins. But due to
addition of excess pesticides and chemicals intake of these fruits lead to serious health problems. It is necessary
616. to identify the presence of chemical in the fruits before consuming it. In this project we have planned to develop
an image processing technique to analyze whether the fruit is free from chemicals and fungus. In our paper, we 3493-
have implemented MATLAB used as well as fungus present in the fruit. We capture the images of the fruit or 3497
we use datasets and train the database with different color-based changes that happen after adding chemicals to
the fruit. The enhancement process is carried out in the captured image. Then image is segmented to hit the
regions with affected spots in the fruit. K-means method is used to carry out the segmentation process. The input
image is compared with the given data set for training to identify the images. In this way unhealthy fruits can be
identified and the affected spots in the fruit can be detected.
Keyword : MATLAB; k-mean; image processing; segmentation.
References:
1. Yan Zhang, Jian Lian, Mingqu Fan and YuanjieZheng,"Deep indicator for fine-grained classification of banana’s ripening stages",
Zhang et al. EURASIP Journal on Image and Video Processing (2018) 2018:46 https://doi.org/10.1186/s13640-018-0284-8.
2. PaymanMoallem, Alireza Serajoddin, Hossein Pourghassem,"Computer vision-based apple grading for golden delicious apples based
on surface features", INFORMATION PROCESSING IN AGRICULTURE XXX (2016) XXX–XXX.
3. Siddharth Singh Chouhan, Ajay Kaul1, Uday Pratap Singh and Sanjeev Jain,"Bacterial foraging optimization based Radial Basis
Function Neural Network (BRBFNN) for identification and classification of plant leaf diseases: An automatic approach towards Plant
Pathology", 2169-3536 © 2017 IEEE.
4. DameshwariSahu, ChiteshDewangan, "Identification and Classification of Mango Fruits Using Image Processing", International
Journal of Scientific Research in Computer Science, Engineering and Information Technology© 2016 IJSRCSEIT | Volume 2 | Issue 2
| ISSN: 2456-3307.
5. Sandesh Raut, Amit Fulsunge,"Plant Disease Detection in Image Processing Using MATLAB",
DOI:10.15680/IJIRSET.2017.0606034.
6. AmelH.Abbas, MarwaA.Shamel,"Identify and Classify Normal and Defects of Prunus_armeniaca Using Imaging Techniques",
Kurdistan Journal of Applied Research (KJAR) | Print-ISSN: 2411-7684 – Electronic-ISSN: 2411-7706 | kjar.spu.edu.iq
7. Volume 2 | Issue 3 | August 2017 | DOI: 10.24017/science.2017.3.11.
8. Tejal Deshpande, Sharmila Sengupta, K.S.Raghuvanshi,"Grading& Identification of Disease in Pomegranate Leaf and Fruit", Tejal
Deshpande et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3) , 2014, 4638 -4645
9. www.ijcsit.
10. MrunmayeeDhakate, Ingole A. B.,"Diagnosis of Pomegranate Plant Diseases using Neural Network",978-1-4673-8564-0/15/$31.00
©2015 IEEE.
11. S. R. Dubey and A. S. Jalal, “Application of Image Processing in Fruit and Vegetable Analysis: A Review,” J. Intell. Syst., vol. 24, no.
4, pp. 405–424, 2015.

Authors: Jasmeena Tariq, A. Kumaravel

Paper Title: Brain MRI Segmentation using Cellular Automata in k-Means Algorithm
Abstract: Tumors in brain have a fast growth(malignant) and should be prevented through various
medical ways. However detecting these tumor cells accurately can help the medical professionals to provide
accurate and hassle free diagnosis and treatment. Thus we are using Cellular Automata to provide better
detection methods in an MRI(Magnetic Resonance Imaging). Cellular Automat is widely used concept with
image processing. It is a system which id discreet and dynamic and comprises of simple cellular grid and rules,
and works locally. Due to simplicity and usage in complex problems it is widely used concept in many new
emerging data science complex problems. Conway’s Game of Life is very well known cellular automata and
thus researchers are becoming more interested in CA.

Keyword : Data mining, MRI, Data science, Classifiers, cellular automata, multi-dimensional cellular
617. automata.
3498-
References: 3501
1. Tom Fawcett (Center for the Study ), “Data mining with cellular automata,” pp. 1-10, 2007.
2. M. Gardner. Mathematical games: The fantastic combinations of John Conway’s new solitaire game ”life”. Scientific American,
223:120–123, October 1970. Available: http://hensel.lifepatterns.net/ october1970.html.
3. B. Meshkboo and M. Kangavari, “Video Data Mining with Learning Cellular Automata,” pp. 1-9.
4. A. Sleit, A. Dalhoum, I. Al-dhamari, and A. Awwad, “Efficient Enhancement on Cellular Automata for Data Mining,” Technology,
pp. 616-620.
5. L. Zhou and M. Yang, “A Classifier Build Around Cellular Automata for Distributed Data Mining,” 2008 International Conference on
Computer Science and Software Engineering, pp. 312-315, 2008.
6. Mayank Arya Chandra, Vidushi, “A study and analysis of Cellular Automata based Classifier in Data Mining”, International
Conference on Advances in Computer Applications (ICACA) 2012 Proceedings published by International Journal of Computer
Applications.
7. Tugba Usta , Enes Burak Dundar,Emin Erkan Korkmaz,”A cellular automata based classification algorithm”,2018.
8. S. Wolfram. Cellular Automata and Complexity: Collected Papers. Westview Press, 1994.
9. S. Wolfram. A New K ind of Science. Wolfram Media, Inc., Champaign, IL, 2002
10. .http://atlas.wolfram.com/01/01/.

Authors: S. Geethapriya, K. Devaki, V. Murali Bhaskaran

Paper Title: Multiple Object Detection in Images using Template Matching


Abstract: Template matching is an application in computer vision for finding similar objects between the
images. Template matching is a key component in image analysis process for mapping similar patterns between
images. The detection and matching of objects has gained widespread application in quality control,
manufacturing and medical applications. The major challenges in template matching process are occlusion,
618. background noise and non-rigid transformation particularly in medical images. The present work proposes a
template matching method based on correlation analysis techniques to detect multiple objects occurrence in an 3502-
image. The method has been experimented for various real-time applications. In medical images, the proposed 3506
method gave an accuracy of 86% in detecting the nodules in lung CT images.

Keyword : Template matching, Correlation analysis, Hadoop framework, OpenCV.


References:
1. Serhat Ozekes and A. Yilmaz Camurcu, “Automatic Lung Nodule Detection Using Template Matching”; Springer-Verlag Berlin
Heidelberg 2006, pp. 247–253.
2. Dai-Duong Truong, Chau-Sang Nguyen Ngoc, “Realtime Arbitrary-Shaped Template Matching Process” ; 12th International
Conference on Control, Automation, Robotics & Vision Guangzhou, China, 5-7th December 2012, pp. 1401-1412.
3. Bohong Wei, Fan Wang, Xiaopeng Hu, "Rotation-invariant template matching based on ring projection and orientation codes",
Intelligent Control and Information Processing (ICICIP) 2014 Fifth International Conference on, pp. 192-197, 2014.
4. Hirokazu Ishizuka, Koichi Sakurai, Isao Echizen, "Evaluation of Matching Accuracy of Template Matching Using a Steganography
Algorithm", Computing and Networking (CANDAR) 2015 Third International Symposium on, pp. 457-462, 2015.
5. Xia Jun-bo, “Template Matching Algorithm Based on Gradient Search”, 2014 International Conference on Mechatronics and Co ntrol
(ICMC), pp. 1472-1475.
6. Barapatre, M.H., Nirgun, M.V., Jagtap, M.H., Ginde, “Image processing using mapreduce with performance analysis”, Int. J. Eme rg.
Technol. Innovative Eng (2015).
7. Ma, L., Sun, Y., Feng, N., & Liu, Z, “Image Fast Template Matching Algorithm Based on Projection and Sequential Similarity
Detecting”; 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 957 -960.
8. Monisha, M., & Mohan, "A real-time embedded system for human action recognition using template matching"; 2017 IEEE
International Conference on Electrical, Instrumentation and Communication Engineering (ICEICE).
9. Sha Sha ; Chen Jianer ; Luo Sanding," A fast matching algorithm based on K-degree template" ; 2009 4th International Conference on
Computer Science & Education, pp. 1967-1971.
10. Nguyen, V.-T., Le, K.-D., Tran, M.-T., & Duong, " Fast Template Matching Using Pruning Strategy with Haar-like Features"; 2012
4th International Conference on Intelligent Human-Machine Systems and Cybernetics, pp. 246-251.
11. Truong, D.-D., Nguyen, V.-T., Duong, A.-D., Ngoc, C.-S. N., & Tran, M.-T. (2012). “Realtime arbitrary-shaped template matching
process”; 2012, 12th International Conference on Control Automation Robotics & Vision.

Authors: Shubhendu Banerjee, Sumit Kumar Singh, Atanu Das, Rajib Bag
Recognition of Hindi and Bengali Handwritten and Typed Text from Images using Tesseract on
Paper Title:
Android Platform
Abstract: The concept of digitization has marked a revolution in the area of data conversion, data storage
and data sharing by converting non-editable typographic & handwritten text into editable electronic text. Though
numerous such works have been carried out across the world in various languages using Optical Character
Recognition (OCR), satisfactory output has been observed only in a few languages. This paper is an endeavor
towards taking a step ahead in the digitization of two of the most extensively spoken languages in the Indian
sub-continent – Hindi and Bengali - using Google’s open source OCR Engine, Tesseract. Working on the scripts
of these two languages of Brahmi origin has its own challenges owing to their varied traits of character
segmentation and word formation. Here, the training of Tesseract with data sets of Hindi and Bengali
typographic and handwritten characters has been integrated with an inimitable pre-processing stage involving
input image customization and image augmentation that significantly enhances the image quality allowing
Tesseract to offer more accurate results, especially in cases of handwritten texts and obscure images. Besides, it
also incorporates the features of English translation and text to speech translation which render their significance
among the non-natives and visually impaired mass. The focal idea of this paper has been to reach out to an
extended mass by enabling digitization on the Android platform. Comparative analysis carried out on three
distinctive parameters - on images with typographic texts, handwritten texts and on inferior quality images -
shows that the paper, to a certain extent, does succeed in projecting superior output in at least two cases as
compared to the most consistent Android application of today’s time.

Keyword : androids , handwriting recognition , optical character recognition, pattern recognition.


References:
619. 1. J. Mantas, “An Overview of Character Recognition Methodologies,” Pattern Recognition, vol. 19, no. 6, pp. 425 –430, 1986. doi:
10.1016/0031-3203(86)90040-3 3507-
2. S. M. Murtoza Habib, N. A. Noor and Mumit Khan, “Skew correction of Bangla script using Radon Transform”, Proc. of ICCIT’06, 3516
Dhaka, Bangladesh, December, 2006.
3. M. E. Hoque, S. Lahiri, and S. Sarkar, “Bangla Academy Byabaharik Bangla Abhidhan”, Bangla Academi Press, Dhaka,
Bangladesh, September 2003.
4. Md. A. Hasnat, S. M. M. Habib and M. Khan. "A high performance domain specific OCR for Bangla script", Proc. of CISSE’07,
2007.
5. B. B. Chaudhuri, and U. Pal, "An OCR System to Read Two Indian Language Scripts: Bangla and Devnagari(Hindi)", Proc. of 4th
ICDAR, Page(s): 1011 -1015 vol.2, Ulm, Germany, 1997.
6. B.B. Chaudhuri and U. Pal, "Skew Angle Detection Of Digitized Indian Script Documents", IEEE Trans. on Pattern Analysis and
Machine Intelligence, vol. 19, pp.182-186, 1997.
7. V. Bansal, and R. M. K. Sinha, “A Complete OCR for Printed Hindi Text in Devnagari Script”, Sixth International Conference on
Document Analysis and Recognition, IEEE Publication, Seatle USA, 2001, Page(s):800-804.
8. M.K. Jindal, R. K. Sharma, and G. S. Lehal, “A Study of Different Kinds of Degradation in Printed Gurmukhi Script”, Proceeding s
of the International Conference on Computing: Theory and Applications (ICCTA'07), 2007.
9. P. Agrawal, M. Hanmandlu, and B. Lall, “Coarse Classification of Handwritten Hindi Characters”, International Journal of
Advanced Science and Technology,Vol. 10, September, 2009.
10. A. Chaudhuri, K. Mandaviya, P. Badelia, and S. K. Ghosh, “Optical Character Recognition Systems for Different Language s with
Soft Computing,” pp. 9-41, Springer International Publishing AG, 2017.
11. U. Pal, R. K. Roy, and F. Kimura, “Multi-lingual City Name Recognition for Indian Postal Automation,” in International Conference
on Frontiers in Handwriting Recognition, 2012. doi: 10.1109/ICFHR.2012.238
12. C. Kar, and S. Banerjee, “Bangla Character Recognition by Euclidean Distance Between Center of Gravity and Endpoints,” Smart
Intelligent Computing and Applications, vol. 104, pp. 1-7, 2018. doi: https://doi.org/10.1007/978-981-13-1921-1_1
13. R. Graef, and M. M. N. Morsy, “A Novel Hybrid Optical Character Recognition Approach for Digitizing Text in Forms,” Extending
the Boundaries of Design Science Theory and Practice, vol. 11491, pp. 206-220, 2019. doi: https://doi.org/10.1007/978-3-030-
19504-5_14
14. S. S. Woo, “Design and evaluation of 3D CAPTCHAs,” Computers & Security, vol. 82, pp. 49-67, 2018. doi:
https://doi.org/10.1016/j.cose.2018.12.006
15. R. Smith, “An overview of the Tesseract OCR engine,” in International Conference on Document Analysis and Recognition, 2007.
doi: 10.1109/ICDAR.2007.4376991
16. S. Banerjee, “Identification of Handwritten Text in Machine Printed Document Images,” Advances in Intelligent Systems and
Computing, vol. 177, pp. 823-831, 2013. doi: 10.1007/978-3-642-31552-7_84
17. S. Gheorghita, R. Munteanu, and A. Graur, “An Effect of Noise in Printed Character Recognition System Using Neural Network,”
Advances in Electrical and Computer Engineering, vol. 13, no. 1, pp. 65–68, 2013. doi: 10.4316/AECE.2013.01011.
18. Q. Ye, D. Doermann, “Text Detection and Recognition in Imagery: A Survey,” IEEE Transactions on Pattern Analysis and Machine
Intelligence, vol. 37, no. 7, pp. 1480–1500, 2015. doi: 10.1109/TPAMI.2014.2366765
19. S. Singh, A. Sharma, and I. Chhabra, “A Dominant Points-Based Feature Extraction Approach to Recognize Online Handwritten
Strokes,” International Journal on Document Analysis and Recognition, vol. 20, no. 1, pp. 37 –58, 2017. doi: 10.1007/s10032-016-
0279-x
20. C. Selvaraj, and N. Bhalaji, “Enhanced Portable Text to Speech Converter for Visually Impaired,” International Journal Intelligent
Systems Technologies and Applications, vol. 17, no. 1-2, pp. 42–54, 2018. doi: 10.1504/IJISTA.2018.091586
21. S. Ukil, S. Ghosh, S. M. Obaidullah, K. C. Santosh, K. Roy, and N. Das, “Improved Word-Level Handwritten Indic Script
Identification by Integrating Small Convolutional Neural Networks,” Neural Comput & Applic, pp. 1-16. 2019. doi:10.1007/s00521-
019-04111-1
22. R. W. Smith, “The Extraction and Recognition of Text from Multimedia Document Images,” pp. 1-157, University of Bristol, 1987.
23. N. Otsu, “A Threshold Selection Method from Gray-Level Histograms,” IEEE Transactions on Systems, Man, and Cybernetics, vol.
9, no. 1, pp. 62–66, 1975. doi: 10.1109/TSMC.1979.4310076

Authors: Usha Moorthy, Usha Devi Gandhi

Paper Title: Medical Big Data Analytics Using Machine Learning Algorithms
Abstract: Artificial intelligence and expert systems plays a key role in modern medicine sciences for
disease prediction, surveillance interventions, cost efficiency and better quality of life etc. With the arrival of
new web-based data sources and systematic data collection through surveys and medical reporting, there is a
need of the hour to develop effective recommendation systems which can support practitioners in better
decision-making process. Machine Learning Algorithms (MLA) is a powerful tool which enables computers to
learn from data. While many novel developed MLA constantly evolves, there is need to develop more
systematic, robust algorithm which can interpret with highest possible accuracy, sensitivity and specificity. The
study reviews previously published series on different algorithms their advantages and limitations which shall
help make future recommendations for researchers and experts seeking to develop an effective algorithm for
predicting the likelihood of various diseases.

Keyword : Artificial intelligence, expert systems, Machine Learning Algorithms, disease prediction, future
recommendations.
References:
1. Jamison D, Breman J, Measham A. Disease Control Priorities in Developing Countries. In: The International Bank for Reconstruc tion
and Development. New York: Oxford University Press; 2006.
2. Winters-Miner LA. Seven ways predictive analytics can improve healthcare: Medical predictive analytics have the potential to
revolutionize healthcare around the world. Elsevier. 2014.
3. Omachonu VK, Einspruch NG. Innovation in Healthcare Delivery Systems: A Conceptual Framework. Innov J Public Sect Innov J.
2010;15:1–20.
4. Fatima M, Pasha M. Survey of Machine Learning Algorithms for Disease Diagnostic. J Intell Learn Syst Appl. 2017;09:1–16.
5. Assistant Secretary for Planning and Evaluation. Improving Data for Decision Making: HHS Data Collection Strategies for a
Transformed Health System. 2011.
6. Bhatt C, Dey N, Ashour AS. Internet of Things and Big Data Technologies for Next Generation Healthcare. London: Springer; 201 7.
620. 7. IBM. Decision Tree Models. 2012.
8. Srinivas S, Sarvadevabhatla RK, Mopuri KR, Prabhu N, Kruthiventi SSS, Babu RV. A Taxonomy of Deep Convolutional Neural Nets 3517-
for Computer Vision. 2016;
9. Danjuma K, Osofisan A O. Evaluation of Predictive Data Mining Algorithms in Erythemato-Squamous Disease Diagnosis. 2015;10. 3526
10. Dodek PM, Wiggs BR. Logistic regression model to predict outcome after in-hospital cardiac arrest: validation, accuracy, sensitivity
and specificity. Resuscitation. 1998;36:201–8.
11. L’Heureux A, Grolinger K, Elyamany HF, Capretz MAM. Machine Learning With Big Data: Challenges and Approaches. IEEE
Access. 2017;5:7776–97.
12. Salvador R, Radua J, Canales-Rodríguez EJ, Solanes A, Sarró S, Goikolea JM, et al. Evaluation of machine learning algorithms and
structural features for optimal MRI-based diagnostic prediction in psychosis. Hu D, editor. PLoS One. 2017;12:e0175683.
13. de Wit S, Ziermans TB, Nieuwenhuis M, Schothorst PF, van Engeland H, Kahn RS, et al. Individual prediction of long -term outcome
in adolescents at ultra-high risk for psychosis: Applying machine learning techniques to brain imaging data. Hum Brain Mapp.
2017;38:704–14.
14. Schnack HG. Improving individual predictions: Machine learning approaches for detecting and attacking heterogeneity in
schizophrenia (and other psychiatric diseases). Schizophr Res. 2017;
15. Chen M, Hao Y, Hwang K, Wang L, Wang L. Disease Prediction by Machine Learning over Big Data from Healthcare Communities.
IEEE Access [Internet]. 2017;5:8869–79. Available from: http://mmlab.snu.ac.kr/~mchen/min_paper/2017/2017-IEEE-Access-1-
DiseasePrediction.pdf
16. Zhao Y, Healy BC, Rotstein D, Guttmann CRG, Bakshi R, Weiner HL, et al. Exploration of machine learning techniques in predicting
multiple sclerosis disease course. Ramagopalan S V., editor. PLoS One. 2017;12:e0174866.
17. Abos A, Baggio HC, Segura B, García-Díaz AI, Compta Y, Martí MJ, et al. Discriminating cognitive status in Parkinson’s disease
through functional connectomics and machine learning. Sci Rep. 2017;7:45347.
18. Kim HC, Jo I-J, Sung JM, Chang H-J. Abstract P202: Cardiovascular Risk Prediction Using Machine-learning Methods in the Middle-
aged Korean Population. Circulation. 2017;135:AP202.
19. Bhatt A, Dubey SK, Bhatt AK, Joshi M. Data Mining Approach to Predict and Analyze the Cardiovascular Disease. In 2017. p. 117–
26.
20. Acharya UR, Fujita H, Adam M, Lih OS, Sudarshan VK, Hong TJ, et al. Automated characterization and classification of coronary
artery disease and myocardial infarction by decomposition of ECG signals: A comparative study. Inf Sci (Ny). 2017;377:17–29.
21. Masetic Z, Subasi A. Congestive heart failure detection using random forest classifier. Comput Methods Programs Biomed.
2016;130:54–64.
22. Weng SF, Reps J, Kai J, Garibaldi JM, Qureshi N. Can machine-learning improve cardiovascular risk prediction using routine clinical
data? Liu B, editor. PLoS One. 2017;12:e0174944.
23. Lafta R, Zhang J, Tao X, Li Y, Abbas W, Luo Y, et al. A Fast Fourier Transform-Coupled Machine Learning-Based Ensemble Model
for Disease Risk Prediction Using a Real-Life Dataset. In: Kim J, Shim K, Cao L, Lee J, Lin X, Moon Y, editors. Advances in
Knowledge Discovery and Data Mining PAKDD 2017 Lecture Notes in Computer Science. Springer, Cham; 2017. p. 654 –70.
24. Frizzell JD, Liang L, Schulte PJ, Yancy CW, Heidenreich PA, Hernandez AF, et al. Prediction of 30-Day All-Cause Readmissions in
Patients Hospitalized for Heart Failure. JAMA Cardiol. 2017;2:204.
25. Dawes TJW, de Marvao A, Shi W, Fletcher T, Watson GMJ, Wharton J, et al. Machine Learning of Three-dimensional Right
Ventricular Motion Enables Outcome Prediction in Pulmonary Hypertension: A Cardiac MR Imaging Study. Radiology.
2017;283:381–90.
26. Aljaaf AJ, Al-Jumeily D, Hussain AJ, Dawson T, Fergus P, Al-Jumaily M. Predicting the likelihood of heart failure with a multi level
risk assessment using decision tree. In: 2015 Third International Conference on Technological Advances in Electrical, Electronics and
Computer Engineering (TAEECE). IEEE; 2015. p. 101–6.
27. Zheng Y, Guo X, Qin J, Xiao S. Computer-assisted diagnosis for chronic heart failure by the analysis of their cardiac reserve and heart
sound characteristics. Comput Methods Programs Biomed. 2015;122:372–83.
28. Le-Dong N-N, Hua-Huy T, Ngoc HMN, Martinot J-B, Xuan A-TD. Detection of Interstitial Lung Disease in Systemic Sclerosis Using
a Machine Learning Approach Based on Pulmonary Function Tests. Am J Respir Crit Care Med. 2017;195:A2531.
29. Spathis D, Vlamos P. Diagnosing asthma and chronic obstructive pulmonary disease with machine learning. Health Informatics J.
2017;
30. Yip TC-F, Ma AJ, Wong VW-S, Tse Y-K, Chan HL-Y, Yuen P-C, et al. Laboratory parameter-based machine learning model for
excluding non-alcoholic fatty liver disease (NAFLD) in the general population. Aliment Pharmacol Ther. 2017;46:447–56.
31. Hashem S, Esmat G, Elakel W, Habashy S, Abdel Raouf S, Elhefnawi M, et al. Comparison of Machine Learning Approaches for
Prediction of Advanced Liver Fibrosis in Chronic Hepatitis C Patients. IEEE/ACM Trans Comput Biol Bioinforma. 2017;1–1.
32. Saritha B, Manaswini N, Hiranmayi D, Ramana SV, Priyanka R, Eswaran K. Classification of Liver Data using a New Algorithm. In t J
Eng Technol Sci Res. 2017;4:330–4.
33. Chen Y, Luo Y, Huang W, Hu D, Zheng R, Cong S, et al. Machine-learning-based classification of real-time tissue elastography for
hepatic fibrosis in patients with chronic hepatitis B. Comput Biol Med. 2017;89:18–23.
34. Guadagni F, Zanzotto FM, Scarpato N, Rullo A, Riondino S, Ferroni P, et al. RISK: A Random Optimization Interactive System Based
on Kernel Learning for Predicting Breast Cancer Disease Progression. In: Rojas I, Ortuño F, editors. Bioinformatics and Biome dical
Engineering IWBBIO 2017 Lecture Notes in Computer Science. Springer, Cham; 2017. p. 189–96.
35. Murty NVR, Babu PMSP. A Critical Study of Classification Algorithms for LungCancer Disease Detection and Diagnosis. nternatio nal
J Comput Intell Res. 2017;13:1041–8.
36. López B, Torrent-Fontbona F, Viñas R, Fernández-Real JM. Single Nucleotide Polymorphism relevance learning with Random Forests
for Type 2 diabetes risk prediction. Artif Intell Med. 2017;
37. Alghamdi M, Al-Mallah M, Keteyian S, Brawner C, Ehrman J, Sakr S. Predicting diabetes mellitus using SMOTE and ensemble
machine learning approach: The Henry Ford ExercIse Testing (FIT) project. Liu B, editor. PLoS One. 2017;12:e0179805.
38. Pouriyeh S, Vahid S, Sannino G, De Pietro G, Arabnia H, Gutierrez J. A comprehensive investigation and comparison of Machine
Learning Techniques in the domain of heart disease. In: 2017 IEEE Symposium on Computers and Communications (ISCC). Greece:
IEEE; 2017. p. 204–7.
39. Acharya A. Comparative Study of Machine Learning Algorithms for Heart Disease Prediction. Helsinki Metropolia University of
Applied Sciences; 2017.
40. Papini GB, Fonseca P, Aubert XL, Overeem S, Bergmans JWM, Vullings R. Photoplethysmography beat detection and pulse
morphology quality assessment for signal reliability estimation. In: 2017 39th Annual International Conference of the IEEE
Engineering in Medicine and Biology Society (EMBC). IEEE; 2017. p. 117–20.
41. Finkelstein J, Jeong I cheol. Machine learning approaches to personalize early prediction of asthma exacerbations. Ann N Y Ac ad Sci.
2017;1387:153–65.
42. Wiemken TL, Furmanek SP, Mattingly WA, Guinn BE, Cavallazzi R, Fernandez-Botran R, et al. Predicting 30-day mortality in
hospitalized patients with community-acquired pneumonia using statistical and machine learning approaches. J Respir Infect.
2017;1:50–56.
43. Saleh L, Mcheick H, Ajami H, Mili H, Dargham J. Comparison of Machine Learning Algorithms to Increase Prediction Accuracy of
COPD Domain. In: Mokhtari M, Abdulrazak B, Aloulou H, editors. Enhanced Quality of Life and Smart Living ICOST 2017 Lecture
Notes in Computer Science. Switzerland: Springer, Cham; 2017. p. 247–54.
44. Pouriyeh S, Vahid S, Sannino G, De Pietro G, Arabnia H, Gutierrez J. A comprehensive investigation and comparison of Machine
Learning Techniques in the domain of heart disease. In: 2017 IEEE Symposium on Computers and Communications (ISCC) [Internet].
IEEE; 2017. p. 204–7. Available from: http://ieeexplore.ieee.org/document/8024530/
45. Masih N, Ahuja S. Prediction of Heart Diseases Using Data Mining Techniques. Int J Big Data Anal Healthc [Internet]. 2018;3:1–9.
Available from: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJBDAH.2018070101
46. Haq AU, Li JP, Memon MH, Nazir S, Sun R. A Hybrid Intelligent System Framework for the Prediction of Heart Disease Using
Machine Learning Algorithms. Mob Inf Syst [Internet]. 2018;2018:1–21. Available from:
https://www.hindawi.com/journals/misy/2018/3860146/
47. Nashif S, Raihan MR, Islam MR, Imam MH. Heart Disease Detection by Using Machine Learning Algorithms and a Real-Time
Cardiovascular Health Monitoring System. World J Eng Technol [Internet]. 2018;06:854–73. Available from:
http://www.scirp.org/journal/doi.aspx?DOI=10.4236/wjet.2018.64057
48. Kumar Sen S. Predicting and Diagnosing of Heart Disease Using Machine Learning Algorithms [Internet]. International Journal Of
Engineering And Computer Science. 2017. Available from:
https://www.researchgate.net/publication/317486673_Predicting_and_Diagnosing_of_Heart_Disease_Using_Machine_Learning_Algo
rithms
49. Nikhar S, Karandikar AM. Prediction of Heart Disease Using Machine Learning Algorithms. Int J Adv Eng Manag Sci [Internet].
2016;2:617–21. Available from: https://media.neliti.com/media/publications/239484-prediction-of-heart-disease-using-machin-
4b2e96d4.pdf
50. Singh J, Kamra A, Singh H. Prediction of heart diseases using associative classification. In: 2016 5th International Conference on
Wireless Networks and Embedded Systems (WECON) [Internet]. IEEE; 2016. p. 1–7. Available from:
http://ieeexplore.ieee.org/document/7993480/
51. Patel J, Tejalupadhyay S, Patel S. Heart Disease prediction using Machine learning and Data Mining Technique [Internet]. 2016. 129 –
137 p. Available from:
https://www.researchgate.net/publication/309210947_Heart_Disease_prediction_using_Machine_learning_and_Data_Mining_Techniq
ue
52. Nnamoko N, Hussain A, England D. Predicting Diabetes Onset: An Ensemble Supervised Learning Approach. In: 2018 IEEE Congress
on Evolutionary Computation (CEC) [Internet]. IEEE; 2018. p. 1–7. Available from: https://ieeexplore.ieee.org/document/8477663/
53. Kaur H, Kumari V. Predictive modelling and analytics for diabetes using a machine learning approach [Internet]. Applied Compu ting
and Informatics. 2018 [cited 2019 Mar 6]. Available from: https://linkinghub.elsevier.com/retrieve/pii/S221083271830365X
54. Rahman T, Farzana SM, Khanom AZ. Prediction of Diabetes Induced Complications Using Different Machine Learning Algorithms
[Internet]. BRAC University; 2018. Available from:
http://dspace.bracu.ac.bd/xmlui/bitstream/handle/10361/10945/15101128_CSE.pdf?sequence=1&isAllowed=y
55. Joshi TN, Chawan PM. Logistic Regression And Svm Based Diabetes Prediction System. Int J Technol Res Eng [Internet].
2018;5:4347–50. Available from:
https://www.researchgate.net/publication/326416823_LOGISTIC_REGRESSION_AND_SVM_BASED_DIABETES_PREDICTION_
SYSTEM
56. Santhanam T, Padmavathi MS. Application of K-Means and Genetic Algorithms for Dimension Reduction by Integrating SVM for
Diabetes Diagnosis. Procedia Comput Sci [Internet]. 2015;47:76–83. Available from:
https://linkinghub.elsevier.com/retrieve/pii/S1877050915004536
57. Morton A, Marzban E, Giannoulis G, Patel A, Aparasu R, Kakadiaris IA. A Comparison of Supervised Machine Learning Techniques
for Predicting Short-Term In-Hospital Length of Stay among Diabetic Patients. In: 2014 13th International Conference on Machine
Learning and Applications [Internet]. IEEE; 2014. p. 428–31. Available from: http://ieeexplore.ieee.org/document/7033154/
58. Radha P, Srinivasan B. Predicting Diabetes by cosequencing the various Data Mining Classification Techniques. Int J Innov Sci Eng
Technol [Internet]. 2014;1:334–9. Available from: http://ijiset.com/v1s6/IJISET_V1_I6_55.pdf
59. Sudharsan B, Peeples M, Shomali M. Hypoglycemia Prediction Using Machine Learning Models for Patients With Type 2 Diabetes. J
Diabetes Sci Technol [Internet]. 2015;9:86–90. Available from: http://journals.sagepub.com/doi/10.1177/1932296814554260
60. Kumar V, Velide L. A Data Mining Approach For Prediction And Treatment Ofdiabetes Disease. Int J Sci Invent Today. 2014;3:73–9.
61. Singh A. Diabetes Disease Prediction System Using C4.5 and FCM algorithm. Int J Contemp Technol Manag [Internet]. 2018;7:1 –7.
Available from: http://www.ijctm.in/Admin/upload/ijctm-07-09-1201865.pdf
62. Bryanton M, Pathak R, Russa D La, Holmes O, Gotfrit R, Cook G, et al. Predicting lung cancer recurrence in patients within two years
of curative radiotherapy via a trained machine learning algorithm. J Nucl Med. 2017;58:113.
63. Bychkov D, Turkki R, Haglund C, Linder N, Lundin J. Abstract 5718: Outcome prediction in colorectal cancer using digitized tu mor
samples and machine learning. Cancer Res. 2017;77:5718–5718.
64. Sharma A, Karthik GS, Mittal N, Sindhu VL, Pradeep KR. A Survey o n Predictive Analysis of Cancer Survivability Rate Using
Machine Learning Algorithm. 2017;271–8.
65. Xiao L-H, Chen P-R, Gou Z-P, Li Y-Z, Li M, Xiang L-C, et al. Prostate cancer prediction using the random forest algorithm that takes
into account transrectal ultrasound findings, age, and serum levels of prostate-specific antigen. Asian J Androl. 2017;19:586.
66. Alehegn M, Joshi R. Analysis and prediction of diabetes diseases using machine learning algorithm : Ensemble approach. Int Re s J Eng
Technol. 2017;4:426–36.
67. Masih N, Ahuja S. Prediction of Heart Diseases Using Data Mining Techniques: Application on Framingham Heart Study. Int J Big
Data Anal Healthc. 2018;3:1–9.
68. Chen M, Hao Y, Hwang K, Wang L, Wang L. Disease Prediction by Machine Learning Over Big Data From Healthcare Communities.
IEEE Access [Internet]. 2017;5:8869–79. Available from: http://ieeexplore.ieee.org/document/7912315/
69. Shi F, Zhang Q, Chen J, Karimi HR. Macroscopic Expressions of Molecular Adiabatic Compressibility of Methyl and Ethyl Caprate
under High Pressure and High Temperature. Abstr Appl Anal. 2014;2014:1–10.
70. Raja M, Ali MS. An analysis of consumer perception towards retail brands in Big Bazaar Chennai. Indian J Appl Res. 2014;4:1 –3.
71. PM Kumar PM, Gandhi UD A novel three-tier Internet of Things architecture with machine learning algorithm for early detection of
heart diseases. Computers & Electrical Engineering. 2018; 65: 222-235
72. Gokulnath V, Usha Devi G. A Review on Classification Algorithms of Medical Diagnostics Research Journal of Ph armaceutical,
Biological and Chemical Sciences. 2017; 2656-2660
73. Usha Moorthy, Usha Devi Gandhi. A Survey of Big Data Analytics Using Machine Learning Algorithms, IGI Global. 2018; 95 -123
74. V Vijayakumar, MK Priyan, G Ushadevi, R Varatharajan, Gunasekaran Manogaran, Prathamesh Vijay Tarare. E-health cloud security
using timing enabled proxy re-encryption, Mobile Networks and Applications, 2019; 3: 1034-1045.

Authors: D Sukumar Varma, B Narendra Kumar


Physical and Mechanical Properties of Self-curing and Self-compacting Concrete using Nano-silica
Paper Title:
as Mineral Admixture
Abstract: The aim of this research is to investigate the effect of different proportions of nano silica and
polyethylene glycol 400 (PEG 400) on self-compacting high strength concrete. Finding out optimum content of
nano silica, concrete mixes of proportions 0%, 1%, 2%, 3% of cement content (NSSCC). By substituting the
optimum nano silica dosage in self-curing concrete mixes which contains PEG 400 in 0%, 0.5%,1%, 2%, 3%
proportions of cement (SCSCC). The physical properties are measured in time and diameter for slump flow, V-
funnel tests. Mechanical properties are performed in terms of compressive strength, split tensile strength and
flexural strength. The experimental results are almost satisfied the EFNARC guidelines. Fresh properties of
concrete has decreased as increasing nano silica proportions. Mechanical properties of SCSCC are less
compared to NSSCC.

621. Keyword : Nano silica, Polyethylene glycol, Fresh properties, Hardened properties.
References: 3527-
1. Hongjian Du, “Properties of ultra lightweight cement composites with nano silica, Construction and building materials 199(201 9). 3530
2. Mehmeth eren gulsan, “Development of fly ash /slag based self compacting geopolymer concrete using nano silica and steel fiber”,
Construction and building materials 211(2019).
3. Doha M. Al Saffer,”Effect of internal curing on behavior of high performance concrete: An Overview”, Case study in construction
materials (2108).
4. Seyed Alireza Zareei,”Performance of sustainable high strength concrete with basic oxygen steel making slag and nano silica”, Journal
of building engineering (2019).
5. Abdulkadir cuneyt aydin,”The synergic influence of nano silica and carbon nano tube on self compacting concrete”, Journal of building
engineering(2018).
6. Oveys Afzali Naniz,”Effect of colloidal nano silica on fresh and hardened properties of self compacting lightweight concrete” , Journal
of building engineering(2018).
7. Magda I.Mousa,”Self curing concrete types water retention and durability”, Alexandra engineering journal(2015).
8. Nadine Hani, “The effect of different water/binder ratio and nano silica dosage on fresh and hardened properties of self comp acting
concrete”, Construction and building materials 165(2018)
9. A. Karthik, “Investigation on mechanical properties of fly ash ground granulated blast furnace slag based self curing bio geo polymer
concrete”, Construction and building materials 149(2017).

Authors: V. S. Jagadale, S. N. Padhi


Mechanical Behavior of Coir Fiber Reinforced Polymer Resin Composites with Saturated Ash
Paper Title:
Particles
622. Abstract: This work is done in order to determine the influence of flyash on mechanical properties and
fracture analysis. The carbon (ash) particles independently integrated with coir fiber polymer composites. The
3531-
test samples were manufactured with different dimensions of coir fiber such as the powder's size, content and
3535
mesh size. Tension, compression, impact and flexural tests are carried out in the composite materials prepared
according to the ASTM techniques. Using SEM photos, the fracture faces are analyzed. It was inferred from the
final results that ash powder composite provides good flexural and tensile strength than without ash powder
composite, while ash powder composite material provides good impact strength and compressive strength with
increase in content of ash particles.

Keyword : Ash Particles, SEM, Mechanical Properties, Mesh Size.


References:
1. Gopinath, M. Senthil Kumar and A. Elayaperumal, “Experimental investigations on mechanical properties of
jute fiber reinforced composites with polyester and epoxy resin matrices”, Procedia Engineering, vol. 97,
pp. 2052-2063, 2014.
2. Madhusudan, S., Sarcar, M.M.M., Rao, N.B.R.M., “Mechanical properties of Aluminum-Copper(p) composite
metallic materials”, Journal of Applied Research and Technology, vol. 14(5), pp. 293-299, 2016.
3. Rao, T.B., “An Experimental Investigation on Mechanical and Wear Properties of Al7075/SiCp Composites:
Effect of SiC Content and Particle Size”, Journal of Tribology, vol. 140(3), pp. 1-8, 2018.
4. Sanjay, Arpitha and Yogesha, “Study on mechanical properties of natural - glass fibre reinforced polymer
hybrid composites: A review”, Materials Today: Proceedings, vol. 2, pp. 2959-2967, 2015.
5. S. Nallusamy and Gautam Majumdar, “Effect of stacking sequence and hybridization on mechanical properties
of jute-glass fiber composites”, International Journal of Performability Engineering, vol. 12(3), pp. 229 -
239, 2016.
6. Baburaja K., Kumar G.A., Venkatesh L., Yogesh M., Gowtham M.G.S., Kishore D.S.C., “Structure and property
relation of hybrid aluminium composite”, International Journal of Mechanical Engineering and Technology,
vol. 8(5), pp. 344-350, 2017.
7. Sanjay and Yogesha, “Studies on mechanical properties of jute/e-glass fiber reinforced epoxy hybrid
composites”, Journal of Minerals and Materials Characterization and Engineering, vol. 4(1), pp. 15-25,
2016.
8. Verma, Gope, Shandilya, Gupta and Maheshwari, “Coir fibre reinforcement and application in polymer
composites-A review”, Journal of Materials and Envi. Sci., vol. 4(2), pp. 263- 276, 2013.
9. S.N.Padhi, T.Rout, K.S.Raghuram, “Parametric instability and property variation analysis of a
rotating cantilever FGO beam”, International Journal of Recent Technology and Engineering,
Vol.8(1),pp:2921-2925, 2019.
10. S. Nallusamy, “A review on the effects of casting quality, microstructure and mechanical properties of
cast Al-Si-0.3Mg alloy”, Int. Journal of Performability Engg., vol. 12(2), pp. 143-154, 2016.
11. Asuke, Aigbodion, Abdulwahab, Fayomi, Popoola, Nwoyi and Garba, “Effects of bone particle on the properties
and microstructure of polypropylene/bone ash particulate composites”, Results in Physics, vol. 2, pp. 135-
141, 2012.
12. Verma, Gope, Shandilya, Gupta and Maheshwari, “Coir fibre reinforcement and application in po lymer
composites-A review”, Journal of Materials and Environmental Science, vol. 4(2), pp. 263-276, 2013.
13. S. Nallusamy, “Characterization of epoxy composites with TiO2 additives and E-glass fibers as reinforcement
agent”, Journal of Nano Research, vol. 40, pp. 99-104, 2016.
14. Manohara, Sreenivasa and Bharath, “Evaluation of tensile behavior of sea shell jute fabric reinforced
composite”, International Journal of Advanced Research in Mechanical and Production Engineering and
Development, vol. 1(3), pp. 141-147, 2014.
15. S.N.Padhi, K.S.Raghuram, T.Rout, V.Naga Sudha, Gill Santosh Kumar, “Mechanical Property Variation of a
Rotating Cantilever FGSW Beam under Parametric Excitation”, International Journal of Innovative Technology
and Exploring Engineering, Vol.8(11),pp:495-499,2019.
16. S. Nallusamy, A. Manoj Babu and N. Manikanda Prabu, “Investigation on carbon nanotubes over review on other
heat transfer nano fluids”, International Journal of Applied Engineering Research, vol. 10(62), pp. 112 -
117, 2014.
17. Patnaika, Amar, Alok Satapathyb, Navin Chandc, Barkoulad and Sandhyarani Biswasb, “Solid particle erosion
wear characteristics of fiber and particulate filled polymer composites: A review”, Wear, vol. 268(1 -2),
pp. 249-263, 2010.
18. Lawrence Fernandes, Vinay, Kiran Prakasha and Pavitra Ajagol, “Shellfish shell as a bio- filler:
Preparation, characterization and its effect on the mechanical properties on glass fiberreinforced polymer
matrix composites”, The International Journal of Engineering and Science, vol. 3(8), pp. 23-26, 2014.
19. Odusanya, Bolasodun and Madueke, “Property evaluation of hybrid seashell/snail shell filler reinforced
unsaturated polyester composite in comparison with seashell and snail shell filler reinforced unsaturated
polyester composite”, The International Journal of Engineering and Science, vol. 3(12), pp. 80-90, 2014.
20. Odusanya, Bolasodun and Madueke, “Property evaluation of sea shell filler reinforced unsaturated polyester
composite”, International Journal of Scientific and Engineering Research, vol. 5(11), pp. 1343-1349, 2014.
21. Mr. V. S. Jagadale, Dr. S. N. Padhi, “Mechanical Behavior of Coir Fiber Reinforced Epoxy Composites with
Variable Fiber Lengths”, International Journal of Innovative Technology and Exploring Engineering (IJITEE)
ISSN: 2278-3075, Volume-8 Issue-10, 2019.

Authors: Cyrus Mehra, Arvind K. Sharma, Avinash Sharma

Paper Title: Elucidating Ransomware Attacks In Cyber-Security


Abstract: Attack Detection and Prevention services or activities has distinct significance in the
623. subdomains like ‘Computer-Security’ and ‘Internet-Security’ of Networking as compare to other activities of the
same area. Major issues arise when resources get compromised with the unauthorized user(s) having adverse 3536-
effects afterward. Even though much standard security mechanism like IDS, Cryptographic Techniques available 3541
to provide security & authenticity still some attacks are un-detectable like Ransomware which force security
providing agencies to take initiative in this direction with proper conceptions.
Keyword : Adversary, Anti-Piracy, Antivirus, Bit-Coins, Cyber-Security, Dark-Web, Encryption-
Decryption, Internet-Security-Suite, Intrusion-Detection-Systems (IDS), Malware, Software;
References:
1. Stephen Cobb, ‘Ransomware: An Enterprise Perspective’, November 2018.
2. Nolen Scaife, ‘Cryptolock (And Drop It): Stopping Ransomware Attacks On User Data’, ‘2016 Ieee 36th International Conference
On Distributed Computing Systems', 2016.
3. Azad Ali, ‘Ransomware: A Research And A Personal Case Study Of Dealing With This Nasty Malware’, ‘Issues In Information
System’, Vol.14, 2017.
4. Abdulrahman Alzahrani, ‘An Overview Of Ransomware In The windows Platform’, ‘2017 International Conference On
Computational Science And Computational Intelligence’, December 2017.
5. Jagmeet Singh Aidan, ‘Comprehensive Survey On Petya Ransomware Attack’, ‘2017 International Conference On Next Generation
Computing And Information Systems (Icngcis)’, December 2018.
6. Amin Kharraz, ‘Protecting Against Ransomware: A New Line Of Research Or Restating Classic Ideas?’, ‘Ieee Security & Privacy’,
2018.
7. Sharma Divya Mukesh, ‘An Analysis Technique To Detect Ransomware Threat’, ‘2018 International Conference On Computer
Communication And Informatics (Iccci -2018)’, Jan. 04 – 06, 2018, Coimbatore, India.
8. Bathiya Lokuketagoda, ‘R - Killer: An Email Based Ransomware Protection Tool’, ‘The 13th International Conference On Computer
Science & Education (Iccse 2018)’, August 8-11, 2018, Colombo, Sri Lanka.
9. Ana Ferreira, ‘Why Ransomware Needs A Human Touch’, ‘2018 International Carnahan Conference On Security Technology (Iccst).
10. Nurfadilah Ariffin, 'A Conceptual Scheme For Ransomware Background Knowledge Construction’, ‘2018 Cyber Resilience
Conference (Crc)’, 2018.
11. Arvind, ‘A Comprehensive Study On Digital- Signatures With Hash Functions’, ‘International Journal Of Computer Sciences And
Engineering’, Vol. 07, Issue-4, April 2019.
12. Arvind, ‘Cryptography & Network Security Hash Function Applications, Attacks And Advances: A Review’, Ieee, ‘3rd International
Conference On Inventive Systems And Control (Icisc 2019), 10-11 January, 2019, Pg. 177-188.
13. Https://Www.Beckershospitalreview.Com/Healthcare-Information-Technology/First-Known-Ransomware-Attack-In-1989-Also-
Targeted-Healthcare.Html
14. Https://Phoenixnap.Com/Blog/Ransomware-Statistics-Facts
15. Https://Www.Trendmicro.Com/Vinfo/Us/Security/News/Cybercrime-And-Digital-Threats/Blacktds-Traffic-Distribution-System-For-
Malware-Offered-As-A-Service-In-The-Dark-Web
16. Https://Www.Coveware.Com/Blog/2019/4/15/Ransom-Amounts-Rise-90-In-Q1-As-Ryuk-Ransomware-Increases
17. Https://Blog.Malwarebytes.Com/Threat-Analysis/2019/05/Threat-Spotlight-Crysis-Aka-Dharma-Ransomware-Causing-A-Crisis-For-
Businesses/
18. Https://Research.Checkpoint.Com/Ryuk-Ransomware-Targeted-Campaign-Break/
19. Https://Www.Malwarebytes.Com/Gandcrab/
20. Https://Securelist.Com/It-Threat-Evolution-Q1-2019-Statistics/90916/
21. https://www.securityfocus.com/columnists/102
22. Https://Www.Tripwire.Com/State-Of-Security/Security-Data-Protection/Ransomware-Service-Raas-Works/
23. Https://Healthitsecurity.Com/News/Ransomware-Costs-On-The-Rise-Causes-Nearly-10-Days-Of-Downtime/
24. William Stallings “Cryptography And Network Security Principles”, 5th Edition.
25. Forouzan, “Data Communication And Networking”, 4 th Edition, Mcgraw Hill.

Authors: Arvind K. Sharma, Avinash Sharma, Sagar Kumar, Divya Jain, Sumit Mittal

Paper Title: Contrive a Research Event with Success


Abstract: Conferences are conducted in academics, corporates to enhance the knowledge, specifically in
academics of faculties, students and research scholars. conventional manner from educating, similar allocution,
research workshops & assignments need to be complemented to form these academic proposals attractive & to
covering present scholar's need. Planning a conference is a costly and demand huge number of tasks, we use
function analysis to create or have a good understanding or background for conference planning. i.e. to plan
national/international conference & acquirement lessons studied, & cavort an important aspect in the
improvement and employment. Using an adviser has various advantages such as reducing errors that that can
disturb the good smooth running for a conference. An integrated logistic approach focuses only on the
participants is key for success. Supporting form of apprenticeship, like conference enable scholars to study about
newest technology, appliance, process & clarification use & expanse on market. furthermore, such conferences
provide scholar/attendees to evolve soft-techniques, provide new special connection & know how to collaborate
with guest. All those aspects make possible especially for scholars to orient themselves in the possibilities of
624. study and work ahead in industry or abroad.
3542-
Keyword : Awards, Conference, Congress, Convention, Open-access, Peer-Reviews, Scholar, Sponsors, 3549
Symposium, Track, TPC, Workshop
References:
1. Janet, “Planning and Organizing an Annual Conference”, IEEE Transaction on Professional Communication, Vol. PC-26, No 3,
September 1983.
2. Malgorzata, "Contribution of International Seminar on Computer Science to Education Adjustment on European IT Industry Market”,
2012 15th International Conference on Interactive Collaborative Learning (ICL), September 26-27, Villach, Austria.
3. Zhao Shide, “A Framework for Team Cooperation in Engineering Project Management”, 5th International Conference on Computer
Sciences and Convergence Information Technology (ICCIT 2010), Vol.1, Seoul.
4. http://www.teachingenglish.org.uk/networks/what-makes-a-successful-conference
5. http://ezinearticles.com/?Top-5-Tips-to-Hold-a-Successful-Conference&id=1998805
6. http://www.geomatics2002.org/successful_conference_Planning.html
7. https://www.entrepreneur.com/article/279846
8. https://academia.stackexchange.com/questions/27647/what-are-the-benefits-of-organizing-a-conference
9. http://www.medicallaboratoryquality.com/2015/04/attending-quality-conferences.html
10. https://www.eventbrite.com/blog/seminar-planning-checklist-ds00/
11. https://billetto.co.uk/l/how-to-organise-a-conference
12. https://20bedfordway.com/news/organising-academic-conferences/
13. https://writingcenter.unc.edu/conference-papers/

Authors: S.Anandh, R.Vasuki, Raid Al Baradie


Rupture Prediction of Abdominal Aortic Aneurysm using Matlab, LabVIEW and Python in CT
Paper Title:
images
Abstract: Abdominal Aortic Aneurysm (AAA) is a substantial enlargement of the aorta that weakens the
blood vessel wall leads to atherosclerotic disease. Aneurysms are dangerous because when it rupture causing
hemorrhage. This leads to insufficient blood flow from the aorta to the different organs of the human body.
Based on the extracted features from the AAA and the demographic data of the patient, the clinical management
team will decide the optimal treatment procedure. The screening of AAA is done by ultrasound scan to know the
type of the aneurysm present. Diameter with 05.05 cm or more, it should be viewed seriously. The AAA images
were segmented using connected components labeling technique. Early detection of aneurysm can be repaired
with proper treatment so that it does not rupture. The CT images of AAA were read and denoisedto preserve the
edges using image processing software. Based on the histogram of the filtered image the AAA area was
identified and threshold the image to view clearly the dilated part. The area, major axis length, minor axis length
of the AAA images were calculated to understand the flow dynamics and to predict the rupture of the AAA wall
using MATLAB, LabVIEW and python program.

Keyword : Abdominal Aortic Aneurysm, histogram, hemorrhage, threshold.


References:
1. F.A. Lederle, G.R. Johnson, S.E. Wilson, E.P. Chute, R.J. Hye, M.S. Makaroun, G.W. Barone, D. Bandyk, G.L. Moneta, R.G. Makhou l
“The aneurysm detection and management study screening program: validation cohort and final results” Archives of internal medicine,
Vol. 160, pp.1425-30, May 2000.
625. 2. S. Loncaric, M. Subasic, E. Sorantin. “3-D deformable model for aortic aneurysm segmentation from CT images” InProceedings of the
22nd Annual International Conference of the IEEE Engineering in Medicine and Biology Society,vol. 1, pp. 398-401, July 2000.
3. K. Singh, K.H. Bønaa, B.K .Jacobsen, L. Bjørk, S. Solberg. “Prevalence of and risk factors for abdominal ao rtic aneurysms in a 3550-
population-based study: The Tromsø Study,” American journal of epidemiology, vol. 154, pp. 236-44, Aug 2001. 3553
4. F.A. Lederle, G.R. Johnson, S.E. Wilson. “Aneurysm Detection and Management Veterans Affairs Cooperative Study Abdominal
aortic aneurysm in women” J Vasc Surg., vol. 34, pp. 122-6, 2001.
5. D.C. Brewster, J.L. Cronenwett, JW Hallett Jr, K.W. Johnston, W.C. Krupski, Matsumura JS. “Guidelines for the treatment of
abdominal aortic aneurysms: report of a subcommittee of the Joint Council of the American Association for Vascular Surgery and
Society for Vascular Surgery” Journal of vascular surgery, vol. 37, pp. 1106-17, May 2003.
6. S.D Olabarriaga, J.M. Rouet, M. Fradkin, M. Breeuwer, W.J. Niessen. “Segmentation of thrombus in abdominal aortic aneurysms from
CTA with nonparametric statistical grey level appearance modeling” IEEE transactions on medical imaging, vol. 24, pp. 477 -85, Apr
2005.
7. F.Zhuge,G.D.Rubin,S.H.Sun,S.Napel,“Anabdominalaorticaneurysm segmentation method:levelsetwithregionandstatisticalinformation”
Medical Physics, vol. 33, pp.1440–1453, 2006.
8. J. Golledge, P. Wolanski, A. Parr, P. Buttner, “Measurement and determinants of infrarenal aortic thrombus volume”, EurRadiol, vol.
18, pp.1987-1994, 2008.
9. Demirci S, Lejeune G, Navab N. “Hybrid deformable model for aneurysm segmentation” IEEE International Symposium on
Biomedical Imaging: From Nano to Macro, pp. 33-36, Jun 2009.
10. Hoi SC, Jin R, Zhu J, Lyu MR. “Semisupervised SVM batch mode active learning with applications to image retrieval” ACM
Transactions on Information Systems (TOIS), vol. 27, May 2009.
11. Majd, E.M., Sheikh, U.U. and Abu-Bakar, S.A.R., “Automatic segmentation of abdominal aortic aneurysm in computed tomography
images using spatial fuzzy C-means” Sixth International Conference on Signal-Image Technology and Internet Based Systems pp. 170-
175, December 2010.
12. I. Macía, M. Graña, J. Maiora, C. Paloc, M. De Blas. “Detection of type II endoleaks in abdominal aortic aneurysms after endo vascular
repair” Computers in Biology and Medicine, vol. 41, pp. 871-80, Oct 2011.
13. T.D. Pham, J. Golledge. “Pattern analysis of imaging markers in abdominal aortic aneurysms” 6th International Conference on
Biomedical Engineering and Informatics, pp. 154-159, December 2013.
14. J. Maiora, B. Ayerdi, M. Graña. “Random forest active learning for AAA thrombus segmentation in computed tomography
angiography images” Neurocomputing, vol. 126, pp. 71-7, Feb 2014.

Authors: P.Eswaraiah, Priyanka

Paper Title: Detection of Financial Fraud using Codetect Framework


Abstract: Financial Fraud, for example, tax evasion, is known to be a genuine procedure of wrongdoing
that makes misguidedly got assets go to psychological warfare or other crime. This sort of criminal operations
include complex systems of exchange and money related exchanges, which make it hard to recognize the
extortion elements and find the highlights of fraud. Luckily, exchanging/exchange system and highlights of
elements in the system can be developed from the mind boggling systems of exchange and money related
626. exchanges. Exchanging/exchange system uncovers the association among substances and consequently
irregularity discovery on exchanging systems can uncover the elements engaged with the misrepresentation 3554-
movement; while highlights of elements are the depiction of elements and abnormality identification on
3558
highlights can reflect subtleties of the extortion exercises. In this manner, system and highlights give integral
data to extortion discovery, which can possibly improve fraud recognition execution. Nonetheless, most of
existing strategies center on systems or highlights data independently, which doesn't use both data. In this paper,
we propose a novel fraud identification framework, CoDetect, which can use both system data and highlight data
for money related extortion discovery. What's more, CoDetect can all the while identifying money related fraud
exercises and the component examples related with the extortion exercises. General examinations on both real
world information and certifiable information exhibit the productivity and the adequacy of the proposed
structure in battling monetary extortion, particularly for tax evasion.

Keyword : Financial Fraud, Anomaly Detection, Credit card fraud.


References:
1. C. Sullivan, and E. Smith, Trade-based money laundering: Risks and regulatory responses. AIC Reports Research and Public Policy
Series, 115.
2. Trade-based money laundering flourishing. United Press Internatinoal, May, 2009. http://www.upi.com/TopNews/2009/05/11/Trade -
based-money-laundering-flourishing/UPI-17331242061466.
3. L. Akoglu, M. McGlohon, and C. Faloutsos, Oddball: Spotting anomalies in weighted graphs. In PAKDD, pp:410 -421, 2010.
4. Chandola, A. Banerjee, and V. Kumar. Anomaly detection: A survey. ACM Comput.Surv, 41(3), 2009.
5. W. Eberle, and L. B. Holder. Mining for structural anomalies in graph-based data. In DMIN, pp:376-389, 2007.
6. C. C. Noble, and D. J. Cook. Graph-based anomaly detection. In KDD, pp:631-636, 2003.
7. H. Tong, and C-Y. Lin. Non-negative risidual matrix factorization with application to graph anomaly detection. In SIAM.
8. W. Suhang, J. Tang, H. Liu. Embedded Unsupervised Feature Selection. In AAAI.
9. Z. Lin, M. Chen, Y. Ma .The augmented Lagrange multiplier method for exact recovery of corrupted low-rank matrices. In arXiv
preprint arXiv:1009.5055, 2010.
10. J. Sun, H. Qu, D. Chakrabarti, and C. Faloutsos. Neighborhood formation and anomaly detection in bipartite graphs. In ICDM, p p:418-
425, 2005.
11. Patcha, and J. M. Park. An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer
Networks, 51(12):3448-3470, 2007. & Machine Intelligence, 36(1):1, 2013.
12. K. Henderson, B. Gallagher, L. Li, L. Akoglu, T. Eliassi-Rad, H. Tong, and C. Faloutsos. It’s who you know: graph mining using
recursive structural features. In SIGKDD, pp:663-671, 2011.
13. F. Keller, E. Müller, and K. Bohm. Hics: High contrast subspaces for density-based outlier ranking. In ICDE, pp.1037-1048, 2012.
14. D. Koutra, E. Papalexakis, and C. Faloutsos. Tensorsplat: Spotting latent anomalies in time. In PCI, pp:144-149, 2012.

Authors: Peter Oyekola, Aezeden Mohamed, Olufemi Aforijiku, Elizabeth Oyekola

Paper Title: Development and Evaluation of Fuel-less Power Generator


Abstract: The erratic power supply has been a growing cause for concern in developing countries. It
becomes more challenging to supply adequate energy in countries with a high population due to the increased
demand and this has led to load shedding and spreading in Nigeria. Also, emissions from power plants, impacts
of hydroelectric development, and risks associated with nuclear energy use have been targets for political action
due to the recent pursuit of sustainability development. Also, evidence of depletion of the protective ozone layer
and its impact on the environment have urged the need for rapid development of alternative power generation
method void of causing adverse environmental impact.
This paper, therefore, discusses the design and evaluation of a self-starting fuel less power generator using DC
motor as the prime mover to generate electrical energy from an alternator. The alternator armature shaft was
coupled directly with DC motor powered by a rechargeable battery. The DC motor rotates the armature of the
alternator in the field coil at high speed when activated from the starting switch, which results in alternating
current output voltages of 220V.

Keyword : Free energy, Portable Generator, Sustainable power.


References:
1. S. Onohaebi, “Power Outages in the Nigeria Transmission Grid,” Research Journal of Applied Sciences , vol. 4(1), no. 1 -9, 2009.
2. Rolando Y. Wee, “Countries With The Lowest Access To Electricity,” WorldAtlas.com, 2017. [Online]. Available:
https://www.worldatlas.com/articles/countries-with-the-lowest-access-to-electricity.html.. [Accessed 03 June 2019].
3. U. Onochie, H. Egware and T. Eyakwanor, “ The Nigeria Electric Power sector (opportunities and challenges),” Journal of
627. Multidisciplinary Engineering Science and Technology, vol. 2(4), pp. 494-502, 2015.
4. E.A. and A. I.O, “Fuel less Generating Set: Design, Construction & Performance Evaluation,” in 3rd International Conference 3559-
Proceedings on Engineering and Technology Research Ladoke Akintola University of Technology, Ogbomosho, 2014 .
5. S. Osuide, “Environmental Pollution in Nigeria,” Habitat Int’l, pp. 5-5, June 1990.
3563
6. M. Shaaban, “Renewable Energy Potentials in Nigeria: Meeting Rural Energy Needs,” Renewable and Sustainable Energy
Reviews, vol. 29, pp. 72-84, 2014.
7. S. Sambo, “Electricity generation and the present challenges in the Nigerian power sector,” Journal of Energy and Power
Engineering, vol. 6 (7) , pp. 1050-1059, 2012.
8. K. Kaygusuz, “Energy services and energy poverty for sustainable rural development,” Renewable and sustainable energy reviews,
vol. 15(2), no. 936-947, 2011.
9. S. O. Oyedepo, “Efficient energy utilization as a tool for sustainable development in Nigeria.,” International Journal of Energy and
Environmental Engineering, vol. 3(1), no. 11, 2012.
10. D. A., “Construction of 2.5KVA Self-Induced Generating Set,” Department of Agricultural Engineering, Federal College of
Agriculture, Ibadan, 2015.
11. “Toppr,” 2018. [Online]. Available: https://www.toppr.com/guides/physics/magnetic-effects-of-electric-current/electromagnetic-
induction-and-its-applications/.
12. M. Long, “Alternative Energy Sources,” 2014. [Online]. Available: http://www.top-alternative-energy-sources.com/. [Accessed
May 2019].
13. R. J.F., “Introduction to Fuel less Generator,” november 2008. [Online]. Available: www.energysource.com. [Accessed 9 March
2019].
14. S. I. Bala, D. G., K. G., K. Vidhya and P. Musthafa, “Electricity Generation System,” International Journal of Advanced Resea rch
in Electrical, Electronics and Instrumentation Engineering , vol. 3, no. 4, 2014.
15. O. Abatan, A. A and A. A, “Electricity Generation from a Fuel less Engine in an Isolated Power Generation System,” International
Journal of Emerging Technology and Advanced Engineering, vol. 3 (12), pp. 2250-2459, 2013.
16. S. Dipali, R. S. and S. M., “Fuel less Generator,” International Journal for Research in Applied Science & Engineering
Technology, vol. 5 (6), no. 2321-9653, pp. 1375-1378, 2017.
17. S. K. and R. K.K., “Stacking Effect of a Series Resonance Circuit on Asynchronous Generator in an Isolated Power Generation,” in
Unpublished IEEE conference proceeding, 2010.
18. R. K. Sreenivasula and P. R. I., “Modelling and Simulation of an Asynchronous Generator with AC/DC/AC Converter Fed RLC
Series Circuit in an Isolated Power Generation System,” vol. 3 (38), pp. 7784-7788, 2014.
19. K. P. Rajaendra, “Modeling and Simulation of an Asynchronous Generator with AC/DC/AC Converter Fed RLC Series Circuit in
an Isolated Power Generation System,” International Journal of Engineering and Technology , vol. 2 (4), 2012.
20. Adewumi, “Development of 2.5 kva Self-Induced Power Generating Set,” Sci-Afric Journal of Scientific Issues, Research and
Essays , vol. 4 (1), pp. 890-894, 2016.
21. T. J. Blalock, “Alternating Current Electrification and Classifications of DC Machines,” IEEE History Center, IEEE Milestone, 8
may 1886. [Online]. Available: https://www.electricaleasy.com/2012/12/classifications-of-dc-machines.html.
22. M. Chinchilla, S. Arnaltes and J. C. Burgos, “Control of permanent-magnet generators applied to variable-speed wind-energy
systems connected to the grid,” IEEE Transactions on energy conversion, vol. 21(1), pp. 130-135, 2006.
23. Adewumi, “Fuelless Generator: Comparison of Two Prototype Design,” International journal of Energy and Environmental
Research, vol. 4 (3), pp. 37- 44, 2016).
24. W. Bower, C. Whitaker, W. Erdman, M. Behnke and M. Fitzgerald, “Performance test protocol for evaluating inverters used in
grid-connected photovoltaic systems,” Sandia National Laboratories, 2004.
25. “Independent Media,” 2018. [Online]. Available: http://www.tech-faq.com/what-is-a-generator.html.

Authors: Gajendran Malshetty, Basavaraj Mathapati

Paper Title: WSN Clustering Based on EECI (Energy Efficient Clustering using Interconnection) Method
Abstract: in WSN, clustering gives an effective way to enhance the network lifetime. Moreover It has
been observed that the clustering algorithm utilizes the two main technique first is selection of cluster head and
cycling it periodically in order to distribute the energy among the clusters and this in terms increases the
lifetime of network. Another challenge comes with this is minimize the energy consumption. In past several
algorithm has been proposed to increase the lifetime of the network and energy consumption, however these
methodologies lacks from efficiency. In this paper, we have proposed a methodologies named as EE-CI (Energy
Efficient Clustering using Interconnection), along with the random updation. Here the networks are parted into
different clusters, the cluster updation are done based on the CHC scheme. Moreover, in proposed methodology
cluster updation and data sample is determined through the change in sensor data. Here we propose a method for
sampling sensor and CHC for selecting the cluster head to balance the energy and improvise the energy
efficiency. Moreover, the proposed methodology is evaluated and the result is demonstrated by considering the
Leach as existing methodology, experiments results shows that the proposed methodology outperforms the
existing methodology.

Keyword : WSN, Clustering, EECI.


References:
1. . Pinar, A. Zuhair, A. Hamad, A. Resit, K. Shiva and A. Omar, "Wireless Sensor Networks (WSNs)," 2016 IEEE Long Island Systems,
Applications and Technology Conference (LISAT), Farmingdale, NY, 2016, pp. 1-8.
2. Desai, S.C., Jagadeesh, K.S., & Dhruve, K.D. (2013). ELEPHANT SWARM OPTIMIZATION FOR WIRELESS SENSOR
NETWORKS -A CROSS LAYER MECHANISM.
3. U. Bilstrup, K. Sjoberg, B. Svensson and P. -. Wiberg, "Capacity limitations in wireless sensor networks," EFTA 2003. 2003 IEEE
Conference on Emerging Technologies and Factory Automation. Proceedings (Cat. No.03TH8696), Lisbon, Portugal, 2003, pp. 529-
536 vol.1.
4. Jagadeesh, K.S., & Dhruve, K.D. (2013). Enhancing Network Lifetime in Wireless Sensor Networks Adopting Elephant Swarm
Optimization.
628. 5. N. A. M. Alduais, I. Abdullah and A. Jamil, "An Efficient Data Collection Algorithm for Wearable / Mobile Tracking System in IoT
/WSN," 2018 Electrical Power, Electronics, Communications, Controls and Informatics Seminar (EECCIS), Batu, East Java, 3564-
Indonesia, 2018, pp. 250-254. 3571
6. Pushpa, S.K., Ramachandran, S., & Kashwan, K.R. (2014). A Novel Skeleton Extraction Algorithm for 3d Wireless Sensor Networks.
7. Yang, J.; Zhou, J.; Lv, Z.; Wei, W.; Song, H. A Real-Time Monitoring System of Industry Carbon Monoxide Based on Wireless
Sensor Networks. Sensors 2015, 15, 29535-29546.
8. Harms, T & Sedigh Sarvestani, Sahra & Bastianini, F. (2010). Structural Health Monitoring of Bridges Using Wireless Sensor
Networks. IEEE Instrumentation and Measurement Magazine. 13. 14-18. 10.1109/MIM.2010.5669608.
9. M. R. M. Kassim and A. N. Harun, "Applications of WSN in agricultural environment monitoring systems," 2016 International
Conference on Information and Communication Technology Convergence (ICTC), Jeju, 2016, pp. 344-349.
10. G. E. John, R. G, N. K. Thomas and R. J. Mammutil, "Application-specific WSN for precision agriculture," 2018 8th International
Symposium on Embedded Computing and System Design (ISED), Cochin, India, 2018, pp. 241-245.
11. P. Spachos and S. Gregori, "Integration of Wireless Sensor Networks and Smart UAVs for Precision Viticulture," in IEEE Internet
Computing.
12. Khan, T.H.F. & Kumar, D.S. J Ambient Intell Human Comput (2019). https://doi.org/10.1007/s12652-019-01177-6
13. G. Panda and T. Saha, "Building of Low Cost Reliable Wireless Sensor Network for Smart Indoor Agriculture Products," 2018 2nd
International Conference on Electronics, Materials Engineering & Nano-Technology (IEMENTech), Kolkata, 2018, pp. 1-5.
14. Mare Srbinovska, Cvetan Gavrovski, Vladimir Dimcev, Aleksandra Krkoleva, Vesna Borozan, Environmental parameters monitoring
in precision agriculture using wireless sensor networks, Journal of Cleaner Production, Volume 88, 2015,Pages 297 -307.
15. N. Dey, A. S. Ashour, F. Shi, S. J. Fong and R. S. Sherratt, "Developing residential wireless sensor network s for ECG healthcare
monitoring," in IEEE Transactions on Consumer Electronics, vol. 63, no. 4, pp. 442-449, November 2017.
16. N. Saleh, A. Kassem and A. M. Haidar, "Energy-Efficient Architecture for Wireless Sensor Networks in Healthcare Applications," in
IEEE Access, vol. 6, pp. 6478-6486, 2018.
17. S. R. J. Ramson and D. J. Moni, "Applications of wireless sensor networks — A survey," 2017 International Conference on
Innovations in Electrical, Electronics, Instrumentation and Media Technology (ICEEIMT), Coimbatore, 2017, pp. 325-329.
18. S. Dhiviya, A. Sariga and P. Sujatha, "Survey on WSN Using Clustering," 2017 Second International Conference on Recent Trends
and Challenges in Computational Models (ICRTCCM), Tindivanam, 2017, pp. 121-125.
19. R. Hou, L. He, S. Hu and J. Luo, "Energy-Balanced Unequal Layering Clustering in Underwater Acoustic Sensor Networks," in IEEE
Access, vol. 6, pp. 39685-39691, 2018.
20. Chhabra Anshuman, Vashishth Vidushi, and Sharma Deepak Kumar. A fuzzy logic and game theory based adaptive approach for
securing opportunistic networks against black hole attacks. International Journal of Communication Systems, 31(4):e3487. e3487
IJCS-17-0453.R1.
21. A. Chhabra, V. Vashishth, and D. K. Sharma. A game theory based secure model against black hole attacks in opportunistic networks.
In 2017 51st Annual Conference on Information Sciences and Systems (CISS), pages 1–6, March 2017.
22. R. Di Pietro, S. Guarino, N.V. Verde, and J. Domingo-Ferrer. Security in wireless ad-hoc networks ˘2013 a survey. Computer
Communications, 51:1 – 20, 2014.
23. A. Chhabra, V. Vashishth, and D. K. Sharma. Seir: A stackelberg game based approach for energy -aware and incentivized routing in
selfish opportunistic networks. In 2017 51st Annual Conference on Information Sciences and Systems (CISS), pages 1–6, March 2017.
24. V. Vashishth, A. Chhabra, D. K. Sharma. GMMR: A Gaussian mixture model based unsupervised machine learning approach for
optimal routing in opportunistic IoT networks. In Computer Communications, vol. 134, pp.138–148, 2019.
25. Matthew Ettus. System capacity, latency, and power consumption in multihop-routed ss-cdma wireless networks. In Radio and
Wireless Conference, 1998. RAWCON 98. 1998 IEEE, pages 55–58. IEEE, 1998.
26. Wendi Rabiner Heinzelman, Anantha Chandrakasan and HariBalakrishnan. Energy-efficient communication protocol for wireless
microsensor networks. In System sciences, 2000. Proceedings of the 33rd annual Hawaii international conference on, pages 10 –pp.
IEEE, 2000.
27. DC Hoang, R Kumar, and SK Panda. Fuzzy c-means clustering protocol forwirelesssensornetworks.
InIndustrialElectronics(ISIE),2010IEEE International Symposium on, pages 3477–3482. IEEE, 2010.
28. Jun Huang, Yu Meng, Xuehong Gong, Yanbing Liu, and Qiang Duan. A novel deployment scheme for green internet of th ings. IEEE
Internet of Things Journal, 1(2):196–205, 2014.
29. C. Yu, W. Guo, and G. Chen. Energy-balanced sleep scheduling based on particle swarm optimization in wireless sensor network. In
2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops PhD Forum, pages 1249–1255, May 2012.
30. Jie Jia, Jian Chen, Guiran Chang, and Zhenhua Tan. Energy efficient coverage control in wireless sensor networks based on multi-
objective genetic algorithm. Computers & Mathematics with Applications, 57(11):1756 – 1766, 2009. Proceedings of the International
Conference.

Authors: KAUP Kumarapeli, RMVS Ratnayake, TSS Jayawardena

Paper Title: Categorization of Innovation concepts for Sustainable Improvement


Abstract: Innovation is the key concept that drives creativity in to a reality. Irrespective of the field,
striving for Innovation marks the survival as well as the success of any business. Innovation can be introduced
for any stage of a supply chain in any organization, achieving the organizational strategies. It comes in different
concepts according to its application across the supply chain. Perfect knowledge in innovation concepts and their
categorization is crucial in applying them in the most effective way. Else would bring disastrous outcomes to the
company which may even go bankrupt. This paper presents different innovation concepts, based on the
literature, and attempt to establish their inter-relationship using the Graph Theory and the categorizing into main
themes, with key innovation concepts related to each theme, using the Grounded Theory. Consistency of the
categorization has been endorsed using the information collected through questionnaires. The data gathered
following the Likert Scale have been illustrated in the graphs and furthermore tested according to Independent
samples for Kruskal Wallis Test and a Hypothesis testing for all Innovation concepts. Sound knowledge on
different innovation concepts, their interrelationships and categorization are imperative in constructive decision
making, which enhances the ability of applying the most appropriate innovation concepts in the most effective
way. Further categorizing of Innovation concepts will eliminate the confusions which may arise with the
Innovations with similar concepts, but with different names. Precise application of the findings of this research
across the Supply Chain would definitely support organizations for the survival and excel in the Business world,
even bearing more opportunities in earning better ranks amongWorld’s most innovative Businesses.

Keyword : Innovation Concepts, Inter-relationships, Categorization, Sustainable Innovation.


References:
1. E. Shaver, “The Many Definitions of Innovation,” June 4, 2014, [online].Available: http://www.ericshaver.com/the-many-definitions-
629. of-innovation/, [Accessed Feb. 20, 2019].
2. A. Baregheh, J. Rowley, S. Sambrook, (2009) “Towards a Multidisciplinary Definition of Innovation”, Management Decision, 2009,
Vol. 47(8), pp. 1323-1339, DOI: 47. 10.1108/00251740910984578. 3572-
3. West, Joel & Mace, Michael. (2019) “ENTERING A MATURE INDUSTRY THROUGH INNOVATION: APPLE S IPHONE 3579
STRATEGY”.
4. M. Tohidi, M.M. Jabbari, “Innovation as a Success Key for Organizations,” (2014), Procedia Technology. pp. 560 – 564.
10.1016/j.protcy.2012.02.122.
5. World Intellectual Property Organization, “Global Innovation Index 2018”, 10 July 2018,
[online].Available:https://www.wipo.int/pressroom/en/articles/2018/article_0005.html,[Accessed Aug. 10, 2019].
6. K.H. Long, “Conceptualizing an Organizational Innovation Capability,” (2011), Charles Sturt University, Australia.
7. D.Zapfl, “What Types of Innovations are there,” Lead Innovation Blog, Aug. 01, 2019, [online].Available:https://www.lead-
innovation.com/english-blog/types-of-innovation. [Accessed Sep. 01, 2019
8. Goh, F. (2019). 10 Companies That Failed To Innovate, Resulting In Business Failure | Collective Campus. [online]
Collectivecampus.io. Available athttps://www.collectivecampus.io/blog/10-companies-that-were-too-slow-to-respond-to-change
[Accessed 15 Oct. 2019].
9. R. Mota and J. Oliveira, "Combining innovation and sustainability: an educational paradigm for human development on
earth", Brazilian Journal of Science and Technology, vol. 1, no. 1, p. 2, 2014. Available: 10.1186/2196-288x-1-2 [Accessed 1
September 2019].
10. Julius Golovatchev, Oliver Budde, "Technology and innovation radar - Effective instruments for the development of a sustainable
innovation strategy", Management of Innovation and Technology (ICMIT) 2010 IEEE International Conference on, pp. 760-764, 2010.
11. Q. R. Xu, Z. Y. Wu, S. P. Zhang and S. Y. Liu, "Total innovation management paradigm for firm innovation system," 2014 IEEE
International Conference on Management of Innovation and Technology, Singapore, 2014, pp. 359-364.
12. J. O. Meissner, S. Brunswicker, S. Schweikert and P. Wolf, "Scaffolding innovations: Implications of regional in novation barriers for
platform-based innovation management improvement," 2008 IEEE International Technology Management Conference (ICE), Lisbon,
2008, pp. 1-10.
13. P. Fithri, N. A. Riva, L. Susanti and B. Yuliandra, "Safety analysis at weaving department of PT. X Bogor using Failure Mode and
Effect Analysis (FMEA) and Fault Tree Analysis (FTA)," 2018 5th International Conference on Industrial Engineering and
Applications (ICIEA), Singapore, 2018, pp. 382-385.
doi: 10.1109/IEA.2018.8387129
14. F. Liu, X. Li, F. Yu and E. Ping, "Method for product integrated innovation based on functional combination and TRIZ," 2014 IEEE
International Conference on Management of Innovation and Technology, Singapore, 2014, pp. 268-272.
15. You Lu and Xin Yang, "Design risk management--the guarantee of product innovation," 2008 9th International Conference on
Computer-Aided Industrial Design and Conceptual Design, Kunming, 2008, pp. 1083-1085.
doi: 10.1109/CAIDCD.2008.4730750
16. W. Wei and L. Liping, "Research on the coupling relations between technology innovation and business modes innovation of IOT
industry based on SD," 2013 6th International Conference on Information Management, Innovation Management and Industrial
Engineering, Xi'an, 2013, pp. 66-69.
17. Xinru Liang, Gang Zheng and Qingrui Xu, "The Haier's Tao of innovation: a case study of the emerging total innovation management
(TIM)," IEMC '03 Proceedings. Managing Technologically Driven Organizations: The Human Side of Innovation and Change ,
Albany, NY, USA, 2003, pp. 5-9.
18. R. Miller and R. A. Blais, "Modes of innovation in six industrial sectors," in IEEE Transactions on Engineering Management, vol. 40,
no. 3, pp. 264-273, Aug. 1993.
19. C. Kuntonbutr, N. Jaturat, P. Wilairatana and T. Konosu, "The Management Vision for Innovation and Human Resource Development
Affecting New Markets and New Products Development," 2017 6th IIAI International Congress on Advanced Applied Informatics
(IIAI-AAI), Hamamatsu, 2017, pp. 231-236.
20. Y. Liu, "Research on Cooperative Innovation Mode in China Textile Industry," 2009 International Conference on Management and
Service Science, Wuhan, 2009, pp. 1-4.
doi: 10.1109/ICMSS.2009.5302622
21. X. Dongmei and F. Lili, "Explore the Cultural Roots Leading to Difference of National Innovation Ability - An Empirical Analysis
Based on Chinese and German Samples," 2010 3rd International Conference on Information Management, Innovation Management
and Industrial Engineering, Kunming, 2010, pp. 60-6325.
22. H. Xu, "A Comprehensive Evaluation Model and Empirical of Apparel Industry Cluster," 2009 Fourth International Conference on
Computer Sciences and Convergence Information Technology, Seoul, 2009, pp. 529-533.
doi: 10.1109/ICCIT.2009.166
23. HarmeetMatharu,Dhanalakshmi,” TheRole of Innovation and Creativity in Development of Entrepreneurship”,International Journal of
Science and Research (IJSR)2017,pp.437-439.
24. TarunRadadiya,” Advance Technology, New Innovation Utilizes in Warehouse, Logistics and Supply Change
Management”,International Journal of Science and Research (IJSR)2017,pp.876-894.
25. D. C. Agarwal,Sakshi Chauhan,” E-Banking in India: Innovations, Challenges and Opportunities”,International Journal of Science and
Research (IJSR)2018,pp.536-541.
26. Rachkara John, Olido Kenneth, Wakwabubi Michael Jackson, “Business Model Innovations of Small and Medium Agribusinesses in
Least Developed Markets”, International Journal of Science and Research (IJSR)2016,pp.1938-1942. DOI: 10.21275/ART20176927
27. W. Yi and B. Yu, "Research on the Collaborative Innovation-Oriented Path of Enhancing Regional Innovation Capability," 2009
International Conference on Information Management, Innovation Management and Industrial Engineering, Xi'an, 2009, pp. 462-465.
doi: 10.1109/ICIII.2009.421
28. Ajay Balhra,Kiran Rani,” Mapping the Hurdles in Innovation at the Level of Policy and Practice: The Way Ahead”, International
Journal of Science and Research (IJSR)2016,pp.464-468.
29. W. Chongfeng and C. Yixuan, "Research on Regional Independent Innovation and Open Innovation Optimization Strategy under
Innovation Driving Strategy: Taking the biomedical industry of China as an example," 2018 IEEE International Symposium on
Innovation and Entrepreneurship (TEMS-ISIE), Beijing, 2018, pp. 1-10.
30. Y. Wei-yi and Y. Bo, "Research on Resource Conservation-oriented Reconfiguration of the Regional Innovation System," 2010 3rd
International Conference on Information Management, Innovation Management and Industrial Engineering , Kunming, 2010, pp. 95-
98.
31. E. Kaya, F. D. Caliskan and S. Gozlu, "Manufacturing Performance Criteria: An AHP Application in a Textile Company," PICMET '07
- 2007 Portland International Conference on Management of Engineering & Technology, Portland, OR, 2007, pp. 1186-1194.
doi: 10.1109/PICMET.2007.4349442
32. W. Zhu, J. Zhong, K. Wang and K. Yan, "The Research of Enterprises Self-oriented Innovation Related Concepts," 2011 International
Conference on Information Management, Innovation Management and Industrial Engineering, Shenzhen, 2011, pp. 161-164.
33. L. Jing and W. Mengting, "The influence factors of enterprise innovation ability construction and the strategy research," 2013 6th
International Conference on Information Management, Innovation Management and Industrial Engineering, Xi'an, 2013, pp. 139-142.
34. D. Wanliang and Z. Huiying, "Rethinking of Innovation Value Evaluation Based on Innovation Ethics," 2010 3rd International
Conference on Information Management, Innovation Management and Industrial Engineering, Kunming, 2010, pp. 464-467.
doi: 10.1109/ICIII.2010.432
35. B. Zhu and J. Fang, "Evaluation of technology import and re-innovation capabilities of four industries in Fujian Province and analysis
of affecting factors," 2012 International Symposium on Management of Technology (ISMOT), Hangzhou, 2012, pp. 292-297.
36. H. Yuetong and L. Xiaohui, "The Influence of Openness to Innovation Performance," 2011 International Conference on Information
Management, Innovation Management and Industrial Engineering, Shenzhen, 2011, pp. 6-9.
doi: 10.1109/ICIII.2011.9
37. Z. Gao, "Analysis of Trust Level How to Affect Innovative Behavior in Technical Innovation Alliance Based on Bryant Play
Game," 2009 International Conference on Information Management, Innovation Management and Industrial Engineering , Xi'an, 2009,
pp. 322-324.
38. K. Ji, J. Dang and K. Nawata, "Does innovation promote exports? evidence from Chinese manufacturing firms," 2016 IEEE
International Conference on Industrial Engineering and Engineering Management (IEEM), Bali, 2016, pp. 666-669.
39. Adrian Soemantadiredja, Aida Vitayala, IrmanHermadi,” Analysis Adoption of Innovation Go-jek Application”, International Journal
of Science and Research (IJSR)2017,pp.936-940. DOI: 10.21275/ART2017148
40. Sandeep Kaur,” A Study on New Innovations in Banking Sector”, International Journal of Science and Research (IJSR)2016,pp.178 0-
1782
41. Bernardus Franco Maseke,” Exploring ICT Innovation Factors among Rural Youth in Namibia”, International Journal of Science and
Research (IJSR)2016,pp.873-875. DOI: 10.21275/ART20161650
42. [40] V. Salminen and J. Tammela, "Leadership for life cycle business transition by hybrid innovation," 2007 IEEE International
Technology Management Conference (ICE), Sophia-Antipolis, 2007, pp. 1-6.
43. M. V. Pai, "A list of attributes which may have significant influence on Innovation: An empirical study in Information Techno logy
Sector," 2014 10th International Conference on Innovations in Information Technology (IIT), Al Ain, 2014, pp. 60-64.
44. EddyneYamuremye, Hellen K. Mberia, Caroline Nabuzale,” Influence of Integrated Marketing Communications Tools on Adoption of
Telecommunications Innovations”, International Journal of Science and Research (IJSR)2018,pp.836-839. DOI:
10.21275/ART2018293
45. Chen Ming, Cui Bibo and Man Haiyan, "Theoretical analysis of the effect of management control method on enterprise innovation
model selection," 2012 International Conference on Information Management, Innovation Management and Industrial Engineering,
Sanya, 2012, pp. 192-194.
46. J. S. Nadan, "Using innovation science to minimize entrepreneurial risk," 2014 IEEE Innovations in Technology Conference, Warwick,
RI, 2014, pp. 1-7.
47. C. Shouyu and L. Wencong, "The Key Factors Affecting Technological Innovation in Shaoxing' Textile Industry," 2009 International
Conference on Information Management, Innovation Management and Industrial Engineering, Xi'an, 2009, pp. 137-140.
doi: 10.1109/ICIII.2009.40
48. M.R. Menkes, “User Innovation: State of the Art and Perspectives for future Research,” Journal of Entrepreneurship, Managemen t and
Innovation, ISSN: 2299 – 7326, DOI: 10:7341.
49. E.V.Hippel, “Chapter 9-Open User Innovation,” Handbook of the Economics of Innovation, 2010, vol.1, pp 411-427.
50. J. Guo, P. Jiang, J. W. Guo, J. Zhang and R. H. Tan, "Innovation design of existing product based on function recombination," 2012
IEEE International Conference on Management of Innovation & Technology (ICMIT), Sanur Bali, 2012, pp. 812-817.
51. D. Wanliang and Z. Huiying, "Rethinking of Innovation Value Evaluation Based on Innovation Ethics," 2010 3rd International
Conference on Information Management, Innovation Management and Industrial Engineering, Kunming, 2010, pp. 464-467.
52. B. Dai, "Research on the Cooperative Innovation Risk Management of Industry-University-Research Institute Based on Meta-synthesis
Engineering," 2011 International Conference on Information Management, Innovation Management and Industrial Engineering,
Shenzhen, 2011, pp. 514-517.
doi: 10.1109/ICIII.2011.269
53. R.H. Hoyle, “Analysis Techniques for small population Research”, Washington, The National Academies Press, 2019, pp. 1 -29.
54. Schiederig, T., Tietze, F. and Herstatt, C. (2011). What is Green Innovation? – A quantitative literature review. [online] Tore.tuhh.de.
Available at: https://tore.tuhh.de/bitstream/11420/1004/1/What_is_Green_Innovation_ISPIM_PAPER.pdf [Accessed 30 Sep. 20 19].
55. Chunka Mui (Jan 18, 2012, 09:56am) How Kodak Failed, Available at: https://www.forbes.com/sites/chunkamui/2012/01/18/how-
kodak-failed/ [Accessed: 2nd September 2019].

Authors: Vasudevarao, Periyasamy.P, P.V.NarasimaRao, Ramanan, Sharavanan

Paper Title: Machine Ability Characteristics of PWEDM Process


Abstract: The traditional machining consists of a specific contact between the tool and work piece. As a
result of this contact the tool may wear out after a few operations. In addition to that, the MRR (Material
Removal Rate), Surface Finish, etc. is also lowered. As a result of these drawbacks, traditional or conventional
machining processes cannot be used to machine ceramic based alloys and thus we opt for unconventional
machining process. The Electrical Discharge Machine contains of two spaces one is Electrode and other is Work
piece. In this concept the among the tool wear rate is moderate and the surface roughness is to be poor. The tool
cost is so high. Hence continuously tool modification is not possible. So in the work main objective of the
problem is reduced the tool wear rate and increase the MRR. (Material removal rate). So in the case we are
consider in the surface roughness. The surface roughness is to be high is the taken in industrial application. So
we have focus with surface roughness. These are the considering with in our problems. In our aim is reducing
the toll wear and improve the Material Remove rate. In order to addition of graphite in Electrolyte. When added
the electrolyte in Graphite the Toll wear rate decrease and increase a material Removal Rate. Finally we have
disc the DOE process.
630.
Keyword : Graphene, Silicon Carbide, EDM, MRR, TWR 3580-
3583
References:
1. B. Mohan, A. Rajadurai, K.G. Satyanarayana, Electric discharge machining of Al–SiC metal matrix composites using rotary tube
electrode, J. Mater. Process. Technol.153-154 (2004) 978–985.
2. C.Gao, Z.Liu, A ultrasonicallyaided micro-electrical-discharge machining by the application of workpiece vibration, J.
Mater. Process. Technol. 139 (2003)226–228.
3. F. Wang, Y. Liu, Z. Chen, R. Ji, X. Tian, Z. Liu, Design of Three-axis ED Milling Machine Based on the PMAC Motion Card, J.
Comput. 7 (2012) 2496–2502.
4. G. Boothroyd, A.K. Winston, Fundamentals of Machining and Machine Tools, CRC Press, Taylor & Francis Group, Boca Raton, 1989.

5. G.S. Prihandana, M. Hamdi, Y.S. Wong, K. Mitsui, Effect of vibrated electrode in electrical discharge machining, in:Proc. First Int.
Conf. Seventh AUN/SEED-Net Fieldwise Semin. Manuf. Mater. Process., Kuala Lumpur, 2006: pp.133–138.
6. 6. Gangadharudu Talla,National Institute of Technology Rourkela, Powder-mixed Electric Discharge Machining (PMEDM) of
Inconel 625.
7. J.H. Zhang, T.C. Lee, W.S. Lau, X. Ai, Spark erosion with ultrasonic frequency, J. Mater. Process. Technol. 68 (1997)
8. J.S.oshi, G. Chakraverti, Performance Evaluation of Rotary EDM by Experimental design Technique, Def. Sci. J. 47 (2013) 65–73.
9. K. Egashira, T. Masuzawa, Microultrasonic Machining by the Application of Workpiece Vibration, CIRP Ann. - Manuf. Technol. 48
(1999) 131–134.
10. K.P. Rajurkar, Z. Yu, 3D micro-EDM using CAD/CAM, CIRP Ann. - Manuf. Technol. 49 (2000) 127–130.

Authors: Ravi Raj.V, Vijaya Ramnath. B, Naveen. E, Ramanan. N,

Paper Title: Machining Process Parameters on Green Composite Material


Abstract: In this work, the Abrasive water jet machining process on a natural fiber composite material has
been discussed . the material as in nature fibere material. The natural fiber material has in a low weight material.
In the material used in a light weight application. In the material mostly used in a automobile structural
application. In the material not used in load condition application. In the material used in a unload condition
material. The material was prepared by hand layup technique. The material was discussed about the machining
character station of the process. For this process, the following parameters - standoff distance, abrasive flow
rate, water pressure were determined. The output parameters considered are Material Remove rate and Surface
631. roughness. in this condition the material removal rate will be increased and the surface roughness also increased.
In the above condition was been solve the problem. The DOE was done by Mine tab software. Finally, the
3584-
optimization result of the process has been conculded.
3587

Keyword : Delimitation; Vision Inspection System; Image software.


References:
1. M. Naresh Babu & N. Muthukrishnan (2015): Checking of multiple process parameters in abrasive water jet machining of tiles, Journal
of the Chinese Institute of Engineers, DOI: 10.1080/02533839.2015.1010944
2. M. Naresh Babu & N. Muthukrishnan (2014): Checking on Surface Roughness in Abrasive Water Jet Machining by the Response
Surface Method, Materials and Manufacturing Processes, DOI: 10.1080/10426914.2014.952020
3. Arvind Kumar, Hari Singh & Vinod Kumar (2017):Discussed the parametric effect of abrasive water jet machining on surface
roughness of Inconel 718 using RSM-BBD techniques, Materials and Manufacturing Processes, DOI:
10.1080/10426914.2017.1401727
4. P. Sitarama Chakravarthy & N. Ramesh Babu (1999) A New for Selection of Optimal Process Parameters in Abrasive Water Jet
Cutting, Materials and Manufacturing Processes, 14:4, 581-600, DOI: 10.1080/10426919908914851
5. Hussein Mohammed Ali Ibraheem, Asif Iqbal & Majid Hashemipour (2015) Numerical optimization of hole making in GFRP
composite using abrasive water jet machining process, Journal of the Chinese Institute of Engineers, 38:1, 66 -76, DOI:
10.1080/02533839.2014.953240
6. S. P. Jani, A. Senthil Kumar, M. Adam Khan & M. Uthaya Kumar (2015): Machinablity of Hybrid Natural Fibre Composite with and
Without Filler as Reinforcement, Materials and Manufacturing Processes, DOI: 10.1080/10426914.2015.1117633
7. Anish Nair & S. Kumanan (2016): Multi performance optimization of abrasive water jet machining of Inconel 617 using WPCA,
Materials and Manufacturing Processes, DOI: 10.1080/10426914.2016.1244844
8. V. Arumuga Prabu, S. Thirumalai Kumaran & M. Uthayakumar (2016): Performance Evaluation of Abrasive Water Jet Machining on
Banana Fiber Reinforced Polyester Composite, Journal of Natural Fibers, DOI: 10.1080/15440478.2016.1212768
9. R. Selvam, L. Karunamoorthy & N. Arunkumar (2016): Checking on Performance of Abrasive Water Jet in Machining Hybrid
Composites, Materials and Manufacturing Processes, DOI: 10.1080/10426914.2016.1198039
10. Puneet Trivedi, Ajit Dhanawade & Shailendra Kumar (2016): An experimental checking on cutting performance of abrasive water jet
machining of austenite steel (AISI 316L), Advances in Materials and Processing Technologies, DOI:
10.1080/2374068X.2015.1128176

Authors: Komal Kundan Sharma, Jyoti Raghatwan, Mrunalinee Patole, Vina M. Lomte

Paper Title: “Voting System Using Multichain Blockchain and Fingerprint Verification”
Abstract: Nowadays, crypto currency has become a trending theme within the software package globe.
Crypto currency may be a digital quality that’s meant to operate as a dealings medium that utilizes sturdy
cryptography to secure asset exchange and make sure plus transfer. Crypto currency is in addition spoken as
digital suburbanised cash. Block chain stores knowledge concerning dealings which will be accustomed assess
transaction trait. This voting system deals with multi chain block chain technology. We can define block chain
as a digital transaction which is used to record financial transactions also as totally different transactions. As a
result of the knowledge keep within the block chain isn’t related to personal identifiable information, it’s such a
fanonymity attribute. Blockchain allows dealings and verification to be clear. The options of this block chain
technology are useful in powerful voting system,robustness, obscurity and transparency. The electoral system is
our country’s core. Veri- fication of fingerprints employed in this theme to authenticate identity of electors.

Keyword : Block chain, Multi chain Block Chain, Voting, Crypto Currency, Fingerprint Verification.
References:
1. Nir Kshetri, Jeffrey Voas “Blockchain-Enabled E-Voting”, 07407459/18/33.00 2018 IEEE
2. Ali Kaan Koc, Emre Yavuz, Umut Can Cabuk, Gokhan Dalkoloc “Towards Secure E-Voting Using Ethereum Blockchain”, 978-1-
5386-34493/18/31.00 2018 IEEE.
3. C.D. Clack, V.A. Bakshi, and L. Braine, “Smart contract templates: foundations, design landscape and research directions”, Mar
2017, arXiv:1608.00771.
4. F. Hao and P.Y.A. Ryan, “Real-World Electronic Voting: Design, Analysis and Deployment”, CRC Press, pp. 143-170, 2017.
5. P. McCorry, S.F. Shahandashti, and F. Hao, “A smart contract for boardroom voting with maximum voter privacy”, International
Conference on Financial Cryptography and Data Security.”Springer, Cham, pp. 357-375, 2017.
6. U.C. abuk, A. avdar, and E. Demir, “E-Democracy-The-Next-GenerationDirectDemocracy-and-Applicability-in-Turkey.”pdf.(Nov
632. 2016)
7. G. Wood, “Ethereum: a secure decentralised generalised transaction ledger”, Ethereum Project Yellow Paper, vol. 151, pp. 1 -32, 3588-
2014. 3597
8. Estonian National Electoral Committee “E-voting System”, 2010. [Online]. Available: https://www.valimised.ee/sites/default/files/
uploads/eng/General Description E-Voting 2010.pdf.
9. E. Maaten, “Towards remote e-voting: Estonian case”, Electronic Voting in Europe-Technology, Law, Politics and Society, vol. 47,
pp. 83-100, 2004
10. S. Nakamoto, “Bitcoin: a peer-to-peer electronic cash system”, [Online]. Available: https://bitcoin.org/bitcoin.pdf.
11. M. Hochstein, “Moscows Blockchain Voting Platform Adds Service for High-Rise Neighbors”, CoinDesk, 15 Mar. 2018;
https://www.coindesk .com/moscows-blockchain-voting -platform-adds-service-for-high-rise neighbors.
12. S. Horwitz, “Getting a Photo ID So You Can Vote Is Easy. Unless Youre Poor, Black, Latino or Elderly”, Washington Post, 23 May
2016;https://www.washingtonpost.com /politics/courts law/gettinga-photo -id-so-you-can-vote-is-easy-unless -youre-poor-black-
latino-orelderly /2016/05/23/8d5474ec-20f0 -11e6-8690-f14ca9de2972 story .html noredirect5onutm term 5.233edc07152e.
13. “Not-So-Clever Contracts”, Economist, 28 July 2016; https://www .economist.com/news/business /21702758-time-being-least-
human -judgment-still-better-bet-cold -hearted.
14. [14] “Security Criteria for Electronic Voting” Peter G. Neumann, Computer Science Laboratory, SRI International, Menlo Park CA
940251-650-8592375 Neumann@csl.sri.com [15] “Blockchain: Foundational Technology to Change the World” Evgenii Khudnev
Bachelors Thesis, School of Business and Culture, Degree Programme in Business Information Technology Bachelor of Business
Administration
15. “Securing E-Voting System using Blockchain”, Komal K. Sharma, Prof. Mrunalinee Patole,
http://ijircce.com/upload/2018/november/9Securing.pdf
16. “Securing Voting System Using Blockchain and Fingerprint Verication”, Komal Kundan Sharma, Prof. Mrunalinee Patole, Prof.
Vina M. Lomte, International Research Journal of Engineering and Technology(IRJET) Volume6,Issue6,June2019S.NO:517,
https://www.irjet.net/archives/V6/i6/IRJET-V6I6517.pdf
17. https://www.bbc.com/news/world-asia-india-46987319
18. https://www.ndtv.com/india-news/lok-sabha-election-2019-april-11phase-1-bjp-muzaffarnagar-candidate-sanjeev-balyan-wants-
faces-in-b2021280
19. https://www.ndtv.com/india-news/general-election-2019-congressleader-jitin-prasada-sister-finds-out-her-vote-is-already-cast-
2030232
20. https://www.ndtv.com/video/player/news/congress-flags-60-lakh-fakevoters-in-madhya-pradesh-probe-ordered/486378
21. https://caravanmagazine.in/vantage/why-india-needs-to-change-itselectoral-voting-system

Authors: Tatyana Azhder


633.
Paper Title: Application of the Method of Data Mining to Solve the Problem of Establishing Causal Relationships
Abstract: The article is devoted to solving the problem of identifying cause-and-effect relationships. A
method of constructing a domain model based on data mining, known as formal conceptual analysis, is
considered. It allows to solve problems of structuring of the available information. The purpose of data analysis
technology is the production of new knowledge, identifying relationships (links) in the data. This method is used
in the article to solve the problem of diagnostics of technical systems.

Keyword : cause-and-effect relationship, diagnostics, the formal conceptual analysis.


References: 3598-
1. A. Sigov, E. Andrianova, D. Zhukov, S. Zykov, I.E. Tarasov, Quantum informatics: overview of the main achievements. Russian 3600
Technological Journal. 2019;7(1):5-37. (In Russ.)
2. V. Rafalovich, Data mining, or data Mining for the employed. Practical course. Ed. Litiganti-Treyd, 2014.
3. A.A. Pastushkov, V.K.Batovrin, Selection of solutions for designing open systems based on analysis of variants with random weights.
Russian Technological Journal. 2018;6(4):78-88. (In Russ.)
4. G. Birkhoff, T. Barty, Modern applied algebra, M., LAN, 2005.
5. B. Ganter, G. Stumme, R. Wille, Eds., Formal Concept Analysis: Foundations and Applications, Lecture Notes in Artificial
Intelligence, State-of-the Art Series (2005), vol. 3626, pp. 196-225/
6. B. Ganter, G. Stumme, Creation and Merging Ontology Top-levels, Proc. 13th Int. Conf. on Conceptual Structures, ICCS'06, P.
Hitzler, F. Sharfe, Eds., Lecture Notes in Artificial Intelligence, (2006).
7. J. McLennan, CH. Tang, B. Krivat Microsoft SQL Server 2008. Data Mining-data mining. –SPb.: BHV-Petersburg, 2009.

Authors: Riktesh Srivastava, Meraj Naem

Paper Title: Hashtag Marketing and Indian brands – Sentiment Exploration


Abstract: Social Media continues to impact the marketing campaign in a big way, and Indian brands are
not an exception. One of the influential yet understudied tools for social media is a hashtag, which in recent
times created a valuable and spellbound marketing impression. Still, less research has been done on how hashtag
creates such a magnificent consumer engagement. The paper aims to answer this unfolded query by evaluating
the use of the hashtag by Indian brands through sentiment analysis. There are two ways Indian brands use the
hashtag – Campaign hashtag and Brand hashtag. This research is based on brand hashtags and infers quite an
interesting outcome. As an experiment, we executed the hashtags for top Indian brands to identify the overall
sentiment polarity of the hashtag. The outcomes were divided into two parts, wherein, in the first part, we
evaluated sentiments polarities (divided into positive and negative) and computed Conversation to Engagement
(C/E) Ratio and Engagement to Reach (E/R) Ratio to identify the prominence of each hashtag. In the second part
of the analysis, we analyzed the responses based on demographic analysis including gender, age, interests, and
occupations, which gives a clear idea of hashtag exploration. Overall, we collected 5611 texts and 154472
tokens between 01/08/2019 and 30/09/2019 from the selected brands.

Keyword : Polarity, hashtag, Liu Hu sentiment analysis, Plutchik model.


References:
1. Bhagat, S. (2019). India’s Top 10 most Valuable Brands 2019. Retrieved September 29, 2019, from Next Big Brand website:
https://www.nextbigbrand.in/indias-top-10-most-valuable-brands-2019/
2. Christodoulides, G. (2009). Branding in the post-internet era. Marketing Theory, 9(1), 141–144.
https://doi.org/10.1177/1470593108100071
3. Economic Times. (2019). No room for error: How to manage brand reputation. Retrieved from
634. https://economictimes.indiatimes.com/small-biz/marketing-branding/branding/no-room-for-error-how-to-manage-brand-
reputation/articleshow/68387407.cms?from=mdr 3601-
4. Hamilton, M., Kaltcheva, V. D., & Rohm, A. J. (2016). Hashtags and handshakes: Consumer motives and platform use in brand- 3608
consumer interactions. Journal of Consumer Marketing. https://doi.org/10.1108/JCM-04-2015-1398
5. Hu, M., & Liu, B. (2004). Mining and Summarizing Customer Reviews. Proceedings of the Tenth ACM SIGKDD International
Conference on Knowledge Discovery and Data Mining, 168–177. https://doi.org/10.1145/1014052.1014073
6. Hu, N., Bose, I., Koh, N. S., & Liu, L. (2012). Manipulation of online reviews: An analysis of ratings, readability, and sentiments.
Decision Support Systems, 52(3), 674–684. https://doi.org/10.1016/j.dss.2011.11.002
7. Hu, X., Tang, J., Gao, H., & Liu, H. (2013). Unsupervised Sentiment Analysis with Emotional Signals. Proceedings of the 22Nd
International Conference on World Wide Web, 607–618. https://doi.org/10.1145/2488388.2488442
8. Hu, X., Tang, L., Tang, J., & Liu, H. (2013). Exploiting Social Relations for Sentiment Analysis in Microblogging. Proceedings of the
Sixth ACM International Conference on Web Search and Data Mining, 537–546. https://doi.org/10.1145/2433396.2433465
9. Influencer Marketing Hub. (2019). The State of Influencer Marketing 2019: Benchmark Report [+Infographic]. Retrieved Septembe r
25, 2019, from Influencer Marketing Hub website: https://influencermarketinghub.com/influencer-marketing-2019-benchmark-report/
10. O’Brien, M. (2017). How to Use Hashtags to Gain Followers. Retrieved September 26, 2019, from NextPage website:
https://gonextpage.com/2017/12/13/hashtags-gain-followers/
11. Page, R. (2012). The linguistics of self-branding and micro-celebrity in Twitter: The role of hashtags. Discourse & Communication,
6(2), 181–201. https://doi.org/10.1177/1750481312437441
12. Pavitra, R., & Kalaivaani, P. C. D. (2015). Weakly supervised sentiment analysis using joint sentiment topic detection with bigrams.
2015 2nd International Conference on Electronics and Communication Systems (ICECS), 889–893.
https://doi.org/10.1109/ECS.2015.7125042
13. Plutchik, R. (1982). A psychoevolutionary theory of emotions. Social Science Information, 21(4–5), 529–553.
https://doi.org/10.1177/053901882021004003
14. Plutchik, R. (1988). The Nature of Emotions: Clinical Implications. In Emotions and Psychopathology (pp. 1–20).
https://doi.org/10.1007/978-1-4757-1987-1_1
15. Quicksprout. (2019). Ultimate Guide to Hashtags. Retrieved September 26, 2019, from Quick Sprout website:
https://www.quicksprout.com/ultimate-guide-to-hashtags/
16. Read, A. (2015, October 13). How to Increase Your Reach on Any Social Network. Retrieved June 8, 2018, from Social website:
https://blog.bufferapp.com/increase-reach
17. Samir, A., & Lahbib, Z. (2018). Stemming and Lemmatization for Information Retrieval Systems in Amazigh Language. In Y. Tabii,
M. Lazaar, M. Al Achhab, & N. Enneya (Eds.), Big Data, Cloud and Applications (pp. 222–233). Springer International Publishing.
18. Samuel, S. (2017). “Social media marketing” is completely useless – but it could be a lot better. Retrieved June 8, 2018, from The
Drum website: http://www.thedrum.com/opinion/2017/04/10/social-media-marketing-completely-useless-it-could-be-lot-better
19. Silva, C., & Ribeiro, B. (2003). The importance of stop word removal on recall values in text categorization. Proceedings of the
International Joint Conference on Neural Networks, 2003., 3, 1661–1666 vol.3. https://doi.org/10.1109/IJCNN.2003.1223656
20. SocialSamosa. (2018). #SocialThrowback 2018: Top 10 Most Engaging Brands in India on Twitter. Retrieved September 29, 2019,
from Social Samosa website: http://www.socialsamosa.com/2018/12/social-throwback-top-10-most-engaging-brands-in-india-on-
twitter/
21. Stathopoulou, A., Borel, L., Christodoulides, G., & West, D. (2017). Consumer Branded #Hashtag Engagement: Can Creativity in TV
Advertising Influence Hashtag Engagement? Psychology & Marketing, 34(4), 448–462. https://doi.org/10.1002/mar.20999
22. Stephenson, P. (2018). Retrieving bulk twitter data. Retrieved September 29, 2019, from
https://perrystephenson.me/2018/08/05/retrieving-bulk-twitter-data/
23. Swani, K., Brown, B., & Milne, G. (2014). Should Tweets Differ for B2B and B2C? An Analysis of Fortune 500 Companies’ Twitter
Communications. Industrial Marketing Management, 873–881. https://doi.org/10.1016/j.indmarman.2014.04.012
24. The Atlas. (2019). India’s top 10 most valuable brands in 2019. Retrieved September 29, 2019, from Atlas website:
http://www.theatlas.com/charts/6oAr3y9oa
25. WebguruIndia. (2019). How Can Social Media Hashtags Help Your Business In 2019. Retrieved September 29, 2019, from
https://www.webguru-india.com/blog/how-can-social-media-hashtags-help-your-business-in-2019/
26. Zhang, Y. (2019). Language in Our Time: An Empirical Analysis of Hashtags. The World Wide Web Conference, 2378–2389.
https://doi.org/10.1145/3308558.3313480

Authors: S. Murugan, M. Jeyakarthic


Mobility Aware Energy Efficient Cluster Based Secure Routing Protocol for Mobile Adhoc
Paper Title:
Networks
Abstract: Mobile ad-hoc network (MANET) is an evolving technology which derives under the class of
wireless networks. Due to the inherent characteristics of nodes in MANET, energy efficiency and security still
remains a major design issue. This paper intends to develop a multi-objective optimization (MOO) model for
effective load distribution and security in the network. The presented MOO technique operates on two main
stages namely clustering and secure routing. In the first stage, fuzzy logic technique with multiple input
parameters namely energy, distance, link duration, latency, and trust are used for effective cluster construction.
In the next stage, Lion Whale optimization (LWO) algorithm is introduced for secure routing. Using the
determined MOO variables, a fitness function is derived to select the optimal routes for secure routing in
MANET. The effective performance of the presented FLWO model is tested using a set of validation parameters
and the proposed model attains maximum performance over other methods in a considerable way.

Keyword : MANET; Clustering; Security; Routing; Fuzzy logic.


635. References:
1. Ertaul, L., Ibrahim, D.: ‘Evaluation of secure routing protocols in mobile ad hoc networks (MANETs)’, Security and Management, 3609-
2009, pp. 363–369 3616
2. Dey, R, Saha, H.N.: ‘Secure routing protocols for mobile ad-hoc network (MANETs) – a review’, Int. J. Emerg. Trends Technol.
Comput. Sci. (IJETTCS), 2016, 5, (1), pp. 74–79
3. Schweitzer, N., Stulman, A., Shabtai, A., et al.: ‘Mitigating denial of service attacks in OLSR protocol using fictitious nod es’, IEEE
Trans. Mob. Comput., 2016, 15, (1), pp. 163–172
4. Hussain, Z., Balakrishna, R.: ‘A survey on manets – types, characteristics, applications and protocols used’. National Conf. on
Frontiers & Advances in Information Science and Technology, 2014
5. Muthusenthil, B., Murugavalli, S.: ‘The impact of location based attacks on geographical routing protocols’, J. Theor. Appl. Inf.
Technol., 2014, 60, (2), pp. 189–199
6. Wang, B., Chen, X., Chang, W.: ‘A light-weight trust-based QoS routing algorithm for ad hoc networks’, Pervasive Mob. Comput.,
2014, 13, pp. 164– 180
7. Rajan, C., Shanthi, N.: ‘Genetic based optimization for multicast routing algorithm for MANET’, Indian Acad. Sci., 2015, 40, (8), pp.
2341–2352
8. Persis, D.J., Robert, T.P.: ‘Ant based multi-objective routing optimization in mobile AD-HOC network’, Indian J. Sci. Technol., 2015,
8, (9), pp. 875–888
9. Ali, H., Shahzad, W., Khan, F.A.: ‘Energy-efficient clustering in mobile adhoc networks using multi-objective particle swarm
optimization’, Appl. Soft Comput., 2012, 12, (7), pp. 1913–1928
10. Balachandra, M., Prema, K.V., Makkithaya, K.: ‘Multiconstrained and multipath QoS aware routing protocol for MANETs’, Wirel.
Netw., 2014, 20, (8), pp. 2395–2408

Authors: Md Ilyas, Dhanraj Verma, Manoj kumar Deshpande, Rajeev Raghuvanshi


Implementation of Client Controlled Privacy Preserving Data Model for Mining Decision Rules
Paper Title:
Using Decision Tree and Association Rules
Abstract: The privacy-preserving data mining (PPDM) is one of the techniques which are used for mining
data dynamically with preserving privacy of the end data owner. In this paper, a PPDM technique for generating
the privacy-preserving decision rules is proposed and implemented. The key motive of presenting this privacy-
preserving decision rule mining technique is to demonstrate how securely data is aggregated in the PPDM
636. environment, how securely extract them and consumed them with the help of applications. In addition to
comparing the state of art methods for mining privacy preserving decision rules for preparing the future
directions of research. Therefore two different data models have used namely decision tree and association rule 3617-
mining. The conducted experiments demonstrate that decision tree-based techniques are superior to the 3624
association rule mining based techniques for mining higher dimensional data with higher accuracy and low
resource consumption. Therefore in the near future for extending this data model the two concepts are also
introduced in this paper.

Keyword : privacy preserving data mining, decision rule mining, implementation of data mining technique,
performance evaluation.
References:
1. E. Toch, B. Lerner, E. B. Zion, I. B. Gal, “Analyzing large-scale human mobility data: a survey of machine learning methods and
applications”, Knowl Inf Syst, https://doi.org/10.1007/s10115-018-1186-x
2. I. Kavakiotis, O. Tsave, A. Salifoglou, N. Maglaveras, I. Vlahavas, I. Chouvarda, “Machine Learning and Data Mining Methods in
Diabetes Research”, Computational and Structural Biotechnology Journal 15 (2017) 104–116
3. J. Qiu, Q. Wu, G. Ding, Y. Xu and S. Feng, “A survey of machine learning for big data processing”, EURASIP Journal on Advances
in Signal Processing (2016) 2016:67, DOI 10.1186/s13634-016-0355-x
4. C. W. Lin, T. P. Hong, H. C. Hsu, “Reducing Side Effects of Hiding Sensitive Itemsets in Privacy Preserving Data Mining”, Hindawi
Publishing Corporation Scientific World Journal Volume 2014, Article ID 235837, 12 pages
5. P. S. Rao, S. Satyanarayana, “Privacy preserving data publishing based on sensitivity in context of Big Data using Hive”, J Big Data
(2018) 5:20, https://doi.org/10.1186/s40537-018-0130-y
6. O. Tene, J. Polonetsky, “Big Data for All: Privacy and User Control in the Age of Analytics”, 11 Nw. J. Tech. & Intell. Prop., 239
(2013).
7. R. Mendes, J. P. Vilela, “Privacy-Preserving Data Mining: Methods, Metrics, and Applications”, Vol. 5, 2017, IEEE
8. Y. A. A. S. Aldeen, M. Salleh, M. A. Razzaque, “A comprehensive review on privacy preserving data mining”, SpringerPlus (2015)
4:694, DOI 10.1186/s40064-015-1481-x
9. K. Xu, H. Yue, L. Guo, Y. Guo, Y. Fang, “Privacy-preserving Machine Learning Algorithms for Big Data Systems”, 2015 IEEE 35th
International Conference on Distributed Computing Systems, 1063-6927/15© 2015 European Union DOI 10.1109/ICDCS.2015.40
10. I. San, N. At, I. Yakut, H. Polat, “Efficient paillier cryptoprocessor for privacy-preserving data mining”, Security and Communication
Networks 2016; 9:1535–1546, Wiley Online Library, DOI: 10.1002/sec.1442
11. Z. Gheid, Y. Challal, “Efficient and Privacy-Preserving k-Means Clustering for Big Data Mining”, IEEE TristCom, Aug 2016,
Tianjin, China pp.791 - 798, ff10.1109/TrustCom.2016.0140ff ffhal-01466904f
12. R. Lu, K. Heung, A. H. Lashkari, A. A. Ghorbani, “A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-
Enhanced IoT”, Special Section on Security and Privacy in Applications and Services for Future Internet of Things, Vol. 5, 2017,
IEEE
13. Y. Kokkinos, K. G. Margaritis, “Confidence ratio Affinity Propagation in ensemble selection of neural network classifiers for
distributed privacy-preserving data mining”, Neurocomputing, (2015), vol. 150, pp. 513−528
14. S. Sharma, K. Chen, A. Sheth, “Towards Practical Privacy-Preserving Analytics for IoT and Cloud Based Healthcare Systems”, IEEE
Internet Computing, March-April 2018
15. Y. Li, C. Bai, C. K. Reddy, “A Distributed Ensemble Approach for Mining Healthcare Data under Privacy Constraints”, Inf Sci (Ny).
2016 February 10; 330: 245–259. doi:10.1016/j.ins.2015.10.011
16. H. Hammami, H. Brahmi, I. Brahmi, S. B. Yahia, “Using Homomorphic Encryption to Compute Privacy Preserving Data Mining in a
Cloud Computing Environment”, EMCIS 2017, LNBIP 299, pp. 397–413, DOI: 10.1007/978-3-319-65930-5_32, Springer
International
17. K. Birman, M. Jelasity, R. Kleinberg, E. Tremel, “Building a Secure and Privacy-Preserving Smart Grid”, ACM SIGOPS OSR 49(1)
pp131–136, http://dx.doi.org/10.1145/ 2723872.2723891.
18. N. Domadiya, U. P. Rao, “Privacy-preserving association rule mining for horizontally partitioned healthcare data: a case study on the
heart diseases”, Sådhanå (2018) 43:127 Indian Academy of Sciences, https://doi.org/10.1007/s12046-018-0916-9
19. W. Gan, J. C. W. Lin, H. C. Chao, S. L. Wang, P. S. Yu, “Privacy Preserving Utility Mining: A Survey”, arXiv:1811.07389v1 [cs.DB]
18 Nov 2018
20. J. C. W. Lin, W. Gan, P. F. Viger, L. Yang, Q. Liu, J. Frnda, L. Sevcik, M. Voznak, “High utility-itemset mining and privacy-
preserving utility mining”, Perspectives in Science (2016) 7, 74—80
21. G. Kalyani, M. V. P. Chandra Sekhara Rao and B. Janakiramaiah, “Privacy-Preserving Association Rule Mining Using Binary TLBO
for Data Sharing in Retail Business Collaboration”, Advances in Intelligent Systems and Computing 515, © Springer Nature
Singapore Pte Ltd. 2017
22. B. Abidi, S. B. Yahia, C. Perera, “Hybrid Microaggregation for Privacy-Preserving Data Mining”, arXiv:1812.01790v1 [cs.CR] 4 Dec
2018
23. C. Y. Lin, Y. H. Kao, W. B. Lee and R. C. Chen, “An efficient reversible privacy‑preserving data mining technology over data
streams”, SpringerPlus (2016) 5:1407, DOI 10.1186/s40064-016-3095-3
24. T. Pawar, Prof. S. Kamalapur, “A Survey on Privacy Preserving Decision Tree Classifier”, International Journal of Engineering
Research and Applications, Vol. 2, Issue 6, November- December 2012, pp.843-847
25. I. Ray, T. C. Ong, I. Ray, M. G. Kahn, “Applying Attribute Based Access Control for Privacy Preserving Health Data Disclosure”,
978-1-5090-2455-1/16/$31.00 ©2016 IEEE
26. L. Urquhart, N. Sailaja, D. McAuley, “Realising the right to data portability for the domestic Internet of things”, Pers Ubiquit Comput
(2018) 22:317–332, DOI 10.1007/s00779-017-1069-2
27. “Laboratory Module 8: Mining Frequent Itemsets – Apriori Algorithm”, available online at:
http://software.ucv.ro/~cmihaescu/ro/teaching/AIR/docs/Lab8-Apriori.pdf
28. K. K. Mishra, R. Kaul, “Audit Trail Based on Process Mining and Log”, International Journal of Recent Development in Engineering
and Technology, Volume 1, Issue 1, Oct 2013

Authors: D. Jayaraj, S. Sathiamoorthy


Computer Aided Diagnosis System using Watershed Segmentation with Xception Based
Paper Title:
Classification Model for Lung CT Images
Abstract: Early recognition and classification of pulmonary nodules by the use of computer-aided diagnosis
(CAD) tools finds useful to reduce the death rate due to the illness of lung cancer. This paper devises a new
CAD tool utilizing a segmentation based classification process for lung CT images. Initially, the input CT
images are pre-processed by image enhancement and noise removal process. Then, watershed segmentation
model is employed for the segmentation of the pre-processed images. Subsequently, the feature extraction
637. process is carried out using Xecption model and random forest (RF) classifier is used of the identification of
lung CT images as normal, benign or malignant. The use of RF model results to effective classification of the
3625-
applied images. This model undergoes extensive experimentation against a benchmark lung CT image dataset
3635
and the results are investigated under several aspects. The obtained outcome pointed out the significant
performance of the presented model over the compared methods.

Keyword : CT image; Lung cancer; Classification; Random forest; Xception.


References:
1. R. L. Siegel, K. D. Miller, and A. Jemal, “Cancer statistics, 2017,” CA: A Cancer Journal for Clinicians, vol. 67, no. 1, pp. 7–30, 2017
2. L. A. Torre, R. L. Siegel, and A. Jemal, “Lung cancer statistics,” in Lung Cancer and Personalized Medicine, pp. 1–19, Springer,
Berlin, Germany, 2016
3. K. Doi, “Computer-aided diagnosis in medical imaging: historical review, current status and future potential,” Computerized Medical
Imaging and Graphics, vol. 31, no. 4-5, pp. 198–211, 2007.
4. Q. Song, L. Zhao, X. Luo, and X. Dou, “Using deep learning for classification of lung nodules on computed tomography images,”
Journal of Healthcare Engineering, vol. 2017, Article ID 8314740, 7 pages, 2017
5. T.-Y. Lin, P. Goyal, R. Girshick, K. He, and P. Dollar, “Focal ´ loss for dense object detection,” in Proceedings of 2017 IEEE
International Conference on Computer Vision (ICCV), pp. 2999–3007, Venice, Italy, October 2017.
6. Y. Lecun, L. Bottou, Y. Bengio, and P. Haffner, “Gradientbased learning applied to document recognition,” in Proceedings of the
IEEE, vol. 86, no. 11, pp. 2278–2324, 1998
7. A.Krizhevsky, I. Sutskever, and G. E. Hinton, “ImageNet classification with deep convolutional neural networks,” in
Proceedings of the 25th International Conference on Neural Information Processing Systems-Volume 1, NIPS’12, pp.
1097–1105, Curran Associates Inc., Lake Tahoe, NV, USA, December 2012.
8. K. Simonyan and A. Zisserman, “Very deep convolutional networks for large-scale image recognition,” in Proceedings of IEEE
International Conference on Learning Representations, Banff, AB, Canada, April 2014.
9. K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image recognition,” in Proceedings of 2016 IEEE Conference on
Computer Vision and Pattern Recognition (CVPR), pp. 770–778, Las Vegas, NV, USA, June 2016.
10. W. Li, P. Cao, D. Zhao, and J. Wang, “Pulmonary nodule classification with deep convolutional neural networks on computed
tomography images,” Computational and Mathematical Methods in Medicine, vol. 2016, Article ID 6215085, 7 pages, 2016.
11. J. Kuruvilla and K. Gunavathi, “Lung cancer classification using neural networks for CTimages,” Computer Methods and Programs in
Biomedicine, vol. 113, no. 1, pp. 202–209, 2014.
12. W.-J. Choi and T.-S. Choi, “Automated pulmonary nodule detection system in computed tomography images: a hierarchical block
classification approach,” Entropy, vol. 15, no. 2, pp. 507–523, 2013
13. A. A. A. Setio, F. Ciompi, G. Litjens et al., “Pulmonary nodule detection in CT images: false positive reduction using multiview
convolutional networks,” IEEE Transactions on Medical Imaging, vol. 35, no. 5, pp. 1160–1169, 2016.
14. E. L. Torres, E. Fiorina, F. Pennazio et al., “Large scale validation of the M5L lung CAD on heterogeneous CT datasets,” Medical
Physics, vol. 42, no. 4, pp. 1477–1489, 2015.
15. A. A. A. Setio, A. Traverso, T. de Bel et al., “Validation, comparison, and combination of algorithms for automatic detection of
pulmonary nodules in computed tomography images: the LUNA16 challenge,” Medical Image Analysis , vol. 42, pp. 1 –13, 2017.
16. S. G. Armato III, G. McLennan, L. Bidaut et al., “e lung image database consortium (LIDC) and image database resource initiative
(IDRI): a completed reference database of lung nodules on ct scans,” Medical Physics, vol. 38, no. 2, pp. 915–931, 2011.
17. http://www.via.cornell.edu/lungdb.html

Authors: Manoj S, Sampathkumar V, Jothi Lakshmi N, Janani, V.Nandhini

Paper Title: Interpretation of CBR Test Consequences for Subgrade Soil Preserved Through Geo-Grid
Abstract: The California Bearing Ratio (CBR) is a parameter for evaluation of the mechanical strength of
sub grade, base course and other layers of a new carriage way. It depends on various factors and nature of soil.
The service life of pavement on weaker soil sub grade is quite low due to the high compressibility and plasticity
behavior of soils. Some soils possess less strength, CBR value and have high affinity to moisture content. Hence
it is important to increase the strength of soil for sustainable performance of Indian roads. To increase the sub
grade soil strength, geogrids are used in roads. Geogrids are cost effective polymeric materials used as soil
reinforcement. It helps to increase the stability and bearing capacity of soil, enables good drainage and involves
less maintenance. Increase in CBR value of the sample with use of geogrids leads to reduction in the thickness of
pavement.
Two soil samples are collected from the nearby construction sites. Basic tests are to be conducted on the samples
to determine its engineering and index properties followed by CBR test under optimum moisture content. This
paper deals with the experimental results of CBR tests on different types of sub grade soil by increasing the
number of geogrid layers in each trial. This gives the optimum number of geogrid layer to attain the maximum
CBR value. This paper also includes the application of CBR value in the design of flexible pavements as per
IRC recommendations.

638. Keyword : Geogrids, CBR, Subgrade Soil, Atterberg limits


References: 3636-
1. A Choudhary, K Gill, J Jha, Sanjay Shukla (2012), Improvement in CBR of the expansive soil subgrades with a single reinforcement 3640
layer in Edith Cowan University, Research Online, ECU Publications 2012
2. Ambika Kuity, Tapas Kumar Roy (2013) , Utilization of geogrid mesh for f improving the soft subgrade layer with waste material mix
compositions in Second Conference of Transportation Research Group of India (2nd CTRG)
3. Charles A. Adams,Ernest Apraku, Richter Opoku-Boahen, (2015) , Effect of Triaxial Geogrid Reinforcement on CBR Strength of
Natural Gravel Soil for Road Pavements in Journal of Civil Engineering Research
4. Dr. Dilip Kumar Talukdar (2014), A Study of Correlation Between California Bearing Ratio (CBR) Value With Other Properties of
Soil in International Journal of Emerging Technology and Advanced Engineering, ISSN 2250-2459, ISO 9001:2008 Certified Journal,
Volume 4, Issue 1, January 2014
5. Er. Devendra Kumar Choudhary, Dr. Y. P Joshi (2014) , A Detailed Study of CBR Method for Flexible Pavement Design in Int.
Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 6( Version 5)
6. https://theconstructor.org/transportation/flexible-pavement-design-cbr-method
7. Indian Standard Classification System, ISCS (IS 1498 – 1970)
8. IRC: 37-2001 Indian Road Congress, Guidelines for the design of Flexible Pavement (Second Revision)
9. Mrs. Neetu B. Ramteke, A Review: Effect of Geo-grid reinforcement on soil in ISSN: 2348 9510 International Journal Of Core
Engineering & Management (IJCEM) Volume 1, Issue 4, July 2014
10. Olaniyan, O. S., Akolade, A. S (2012), Reinforcement of Subgrade Soils with the Use of Geogrids in International Journal of Science
and Research (IJSR).
11. D.Sivabalaselvamani, L.Rahunathan, Dr.A.Tamilarasi, Supporting Trust based Design for Efficient Transportation using Intelligent
Transportation System (ITS) in VANET in Asian Journal of Research in Social Sciences and Humanities. ISSN: 2249 -7315. DOI-
10.5958/2249-7315.2016.00451.2.
12. M. Sukhanya ; K. Gavaskar Functional verification environment for I2C master controller using system verilog in 2017 Fourth
International Conference on Signal Processing, Communication and Networking (ICSCN). DOI: 10.1109/ICSCN.2017.8085732
13. V.Sampathkumar, S.Manoj, V.Nandhini, N.Jothi Lakshmi, S.Janani “Briquetting of Biomass for Low Cost Fuel using Farm Waste,
Cow Dung and Cotton Industrial Waste” .DOI:10.35940/ijrte.C6616.098319.
14. S.Khaviy, S.Kavitha, S.Manoj “A Risk Assessment Study on Occupational Hazards in Cement Industry”, Volume: 04 Issue: 12 | Dec-
2017, -ISSN: 2395-0056

Authors: A.Agnes Lydia, F. Sagayaraj Francis

Paper Title: Learning Rate Scheduling Policies


Abstract: With the availability of high processing capability hardwares at less expensive prices, it is
possible to successfully train multi-layered neural networks. Since then, several training algorithms have been
developed, from algorithms which are statically initialized to algorithms which adaptively change. It is observed
that to improve the training process of neural networks, the hyper-parameters are to be fine tuned. Learning
Rate, Decay rate, number of epochs, number of hidden layers and number of neurons in the network are some of
the hyper-parameters in concern. Of these, the Learning rate plays a crucial role in enhancing the learning
capability of the network. Learning rate is the value by which the weights are adjusted in a neural network with
respect to the gradient descending towards the expected optimum value. This paper discusses four types of
learning rate scheduling which helps to find the best learning rates in less number of epochs. Following these
scheduling methods, facilitates to find better initial learning rate value and step-wise updation during the later
phase of the training process. In addition the discussed learning rate schedules are demonstrated using COIL-
100, Caltech-101 and CIFAR-10 datasets trained on ResNet. The performance is evaluated using the metrics,
Precision, Recall and F1-Score. The results analysis show that, depending on the nature of the dataset, the
performance of the Learning Rate Scheduling policy varies. Hence the choice of the scheduling policy to train a
neural network is made, based on the data.

Keyword : Decay Rate, Hyper-parameter tuning, Learning Rates, Neural Network, Scheduling Policy.
639. References:
1. Schmidhuber, Jürgen. "Deep learning in neural networks: An overview." Neural networks 61 (2015): 85-117. 3641-
2. Leung, Henry, and Simon Haykin. "The complex backpropagation algorithm." IEEE Transactions on signal processing 39.9 (1991): 3644
2101-2104.
3. Domhan, Tobias, Jost Tobias Springenberg, and Frank Hutter. "Speeding up automatic hyperparameter optimization of deep neural
networks by extrapolation of learning curves." Twenty-Fourth International Joint Conference on Artificial Intelligence. 2015.
4. Ruder, Sebastian. "An overview of gradient descent optimization algorithms." arXiv preprint arXiv:1609.04747 (2016).
5. Darken, Christian, Joseph Chang, and John Moody. "Learning rate schedules for faster stochastic gradient search." Neural Networks for
Signal Processing II Proceedings of the 1992 IEEE Workshop. IEEE, 1992.
6. Huang, Guang-Bin, Lei Chen, and Chee Kheong Siew. "Universal approximation using incremental constructive feedforward networks
with random hidden nodes." IEEE Trans. Neural Networks 17.4 (2006): 879-892.
7. Krizhevsky, Alex, Ilya Sutskever, and Geoffrey E. Hinton. "Imagenet classification with deep convolutional neural
networks." Advances in neural information processing systems. 2012.
8. Simonyan, Karen, and Andrew Zisserman. "Very deep convolutional networks for large-scale image recognition." arXiv preprint
arXiv:1409.1556 (2014).
9. Szegedy, Christian, et al. "Going deeper with convolutions." Proceedings of the IEEE conference on computer vision and pattern
recognition. 2015.
10. Hochreiter, Sepp, et al. "Gradient flow in recurrent nets: the difficulty of learning long-term dependencies." (2001).
11. Glorot, Xavier, and Yoshua Bengio. "Understanding the difficulty of training deep feedforward neural networks." Proceedings of the
thirteenth international conference on artificial intelligence and statistics. 2010.
12. Bjorck, Nils, et al. "Understanding batch normalization." Advances in Neural Information Processing Systems. 2018.
13. He, Kaiming, et al. "Deep residual learning for image recognition." Proceedings of the IEEE conference on computer vision and
pattern recognition. 2016.
14. Khalid, El Asnaoui, et al. "An efficient Descriptor for Image Retrieval: Application to COIL-100 Database."
15. Fei-Fei, Li, Rob Fergus, and Pietro Perona. "One-shot learning of object categories." IEEE transactions on pattern analysis and
machine intelligence 28.4 (2006): 594-611.
16. Krizhevsky, Alex, and Geoff Hinton. "Convolutional deep belief networks on cifar-10." Unpublished manuscript 40.7 (2010): 1-9.

Authors: Doniyorov Alisher Khudoyberdiyevich, Odilov Bobir Ahmadjon ugli


Ethnographic Researches on Irrigated Agriculture and Collective Land Cultivation of the Uzbek
Paper Title:
People (In the Example of 20-30s of XXth Century)
Abstract: The article describes the relationship of large-scale economic traditions of the Uzbek people to
irrigated agriculture and collective farming. Ethnographic researches which were published in the 1920s and
1930s are analyzed in the aspect of historiography.
The relatively low rainfall climate of Uzbekistan has led to the widespread use of irrigated cropland through
sophisticated irrigation systems. Folk traditions on irrigation of the foothills and plains of the region provided
640.
rich experience in historical development. Therefore, this article describes how these processes attracted many
researchers from the Soviet Union. In addition, research on collectivization policies implemented by the Soviet 3645-
Union during this period was based on the experience of the local population. 3649

Keyword : irrigation system, irrigated agriculture, collective farming, traditional economic relations.
References:
1. A.P.Demidov, Economic essays on cotton growing, cotton trade and industry of Turkestan. Vol. 2. - M., 1926 . p. 11.
2. Modern village of Central Asia. Vol. II. Khorezm. Hankinsky volost. - Tashkent, 1926 ;. Modern village of Central Asia (socio-
economic essay). Vol. III 3. Kitab volost. (Kashkadarya region of the Uzbek SSR). Ed. B.B.Kart and I.E.Suslova. - Tashkent, 1926. -
p.237.
3. M.S. Andreev, Some results of an ethnographic expedition in the Samarkand region in 1921. - Tashkent., 1922. - pp. 22-37.
4. Zarubin I.I. The population of Samarkand region. (Size, ethnographic composition and territorial distribution with ethnograph ic map). -
L., 1926 . pp. 8-25.
5. A.Kh. Doniyorov, Some Scenes from the History of Ethnography of Uzbekistan (20-80s of the 20th century). – Tashkent: Yangi asr
avlodi, 2003.
6. S.P. Tolstov, The results of twenty years of work of the Khorezm archaeological and ethnographic expedition. (1937-1956 // SE. 1957.
No. 4. pp 31-59 ; Ethnography // Science in Uzbekistan. - Tashkent, 1974. 194 p.
7. Materials on zoning of Central Asia. Prince I. Territory and population of Bukhara and Khorezm. Part I. - Bukhara. H / II / Khorezm. -
Tashkent, 1926 ;. Materials of the All-Union Census of 1926 in the Uzbek SSR. Vol. I. Settled results. - Samarkand, 1927. Materials on
the regionalization of the Turkestan region ...
8. Orography is a section of physical geography that examines the terrain, its structure, and its surface.
9. I. Shastal Orography and irrigation of Khorezm // Materials on zoning ... Prince. II /, Part II.– Khorezm. 3-19 p.)
10. Materials on zoning of Uzbekistan Issue I. Brief description of the projected districts and regions. - Samarkand, TsKR Uz Publishing
House, 1926.)
11. D. Basov, Baikals of the Shirabad Valley // For the reconstruction of agriculture - Samarkand, 1929. No. 2; S.K. Kondrashev, Water
use of the Shirabad and Surkhan valley of the Bukhara Khanate / Materials of work of the hydromodular part of the land improvement
department. - M., 1918. Issue. fourteen; V.A. Polozov Uzbek community land use in the Sherabad valley and Karshi steppe Uz SSR //
National economy of Central Asia. No. 7.– T .; 1925. S.69-75.)
12. A.R. Kayumov, Ethnic situation in southern Uzbekistan in the 19th - early 20th centuries (based on Surkhan-Sherabad valley
materials). Abstract of diss. sciences. - Tashkent, 2011.– p.23.
13. Work and life on collective farms. From the experience of studying collective farms // Collective farms of the Soviet East. Digest of
articles. - L., 1931.
14. A.Novikov, Cotton growing and cotton industry // All Central Asia. Reference book for 1926. pp. 153-163.
15. V.I. Yuferev, Cotton growing in Turkestan. Leningrad, - 1925; The same author. IN AND. Essays on the economics of cotton farming.
- Moscow: Promizdat. - 1927.
16. N.I.Vavilov, Cultivated plants of the Khiva oasis. Botanical and agronomical essays // Transactions. In Applied Botany and Se lection. -
L., 1929.T. XX.
17. S.K. Kondrashev, Water in an irrigated farm. - Moscow: New Village, 1922 .; The same author. Irrigated Khorezm. Organization of
irrigation, territory and labor in dekhkan farms in the lower reaches of the river. Amu Darya. - Moscow, 1931.
18. K.L.Pokrovsky, Water Law Development in Central Asia // Bulletin of Irrigation. No. 1. 1927.
19. B.N.Kastalsky, Historical and geographical overview of the Surkhan-Shirabad valley // Bulletin of irrigation. No. 1, 4. - Toshkent,
1930.
20. V.V.Tsinserling, Irrigation in the Amu Darya basin. - M .: 1924., Irrigation in the Amu Darya. - M., 1927.
21. V.V. Bartold, V.V. Tsinserling, Irrigation by Amu-Darya // Proceedings of the Central Asian Committee (for museums and the
protection of ancient monuments of art and nature). Vol. III. - Tashkent, 1928. – p.251
22. S.P.Trombachev, Foundations for the calculation of irrigation systems. - Tashkent, 1919. - 69 p .; The same author. Irrigation and
drainage. - Tashkent: Uzgiz, 1925. - 204 p. ; G.K.Rezinkampf, Irrigation problems of Turkestan. - Moscow: State Publishing House,
1921 .-- 148 p .; The same author. To the new project of irrigation of the Hungry Steppe. Part 1. –Leningrad: Glavupprvodkhoz of
Central Asia, 1930. - 200 p .; I.G.Alexandrov, Irrigation Project of Southeast Ferghana. –Moscow: TPP, 1923. - 234 p .; The same
author. Irrigation of new land in the Tashkent region. - Moscow: TPP. 1923.– 56 s .; G.I.Vinogradov, Irrigation in the valley of
Kashkadarya. - Tashkent: SANIIRI, 1935. 100 p.
23. T.D. Solovey, The evolution of understanding of the subject of ethnography in Soviet ethnographic literature. 1917-1932 // Bulletin of
Moscow University. - 1990.-№5. - 50-60 p.
24. A.Kh.Doniyorov, Ethnographic research in Uzbekistan in the twentieth century: the main stages, problems, development prospects.
Manuscript of the dissertation for the degree of Doctor of Historical Sciences. - Tashkent, 2003.
25. Socialist agriculture of Uzbekistan. - Tashkent: Uzpolygraphkombinat, 1938.

Authors: Lanka Komal Sai Manohar, Kotapati Subhash Reddy, Sk.Moulali, G.Swapna, K.V.Siva Reddy

Paper Title: Static and Dynamic Simulink model of Wireless Power Transfer methods for EV Applications
Abstract: Present day's remote power Transfer Systems are utilized mainly to move the limited quantity
of power inside short ranges. In latest applications it is for the most part used to charge Smart Phones, Electric
Toothbrushes Scanning RFID [Radio wave Frequency Identification labels are utilized to assemble information
or read the data] Tags. In the fields medical, WPT frameworks are utilized to charge the Bio-gadgets like
pacemakers with no contact and move the vitality in attractive medium. These all applications are low power
gadgets. For high power applications like EV accusing is additionally conceivable of WPT Systems. From the
previous barely any years, looks into on Electric vehicles are made increasingly concerned and it picked up
ubiquity since it won't emanate any ozone depleting substances and it uses environmentally friendly power
vitality. Indeed, even Electric vehicles are having numerous favorable circumstances there are a few issues
ejected when it experiences with the clients. One of the primary drawbacks is charging framework. Since it is
powerless against certain conditions like Weather, Vandalism and Electrocution. Thus, WPT frameworks are
641. better partner for charging EVs. In this paper, unmistakable sorts of Wireless Power Transfer advancements has
given and basic structure of shut and open circle WPT frameworks in tangle lab were given. Further, recognize 3650-
highlights has been made in the middle of the tangle lab reproduction of both open and shut circle frameworks 3653
and distinctive link frameworks and remote power move frameworks.

Keyword : Wireless Power Transfer WPT, Design of Optimization, Electric Vehicles, coil shapes, Quality
Factor and Coupling Coefficient..
References:
1. Nikola Tesla, “Apparatus for transmitting electrical energy.,” US1119732 A, May 4, 1907
2. Sk. Moulali and K. Subbarao ”A Review on Recent Developments in Wireless Power Transfer” in IJCTA,2016, pp. 421 -426.
3. Ravi teja.s,Moulali.sk, Nikhil.M and Venkata srinivas.B ‘A dual wireless power transfer-based battery charging system for electric
vehicles’, IJEAT, Volume 8, Issue 4,April 2019,Pages 1211-1214.
4. J. C. Schuder, ‘Powering an artificial heart: birth of the inductively coupled-radio frequency system in 1960,Artificial Organs,
volume.26,issue. 11, page.909-915, 2002.
5. J.C. Schuder, J.H. Gold, and H.E, Stephenson, ”An inductively coupled rf system for the transmission of 1kw of power through the
skin,” IEEE Trans. On Biomedical Engineering, volume.18,no.4, page.265-273,1971.
6. C.Reinhold, P.Scholz, W.John, and U.Hilleringmann,”Efficient antenna design of inductive coupled RFID-systems with high power
demand,” Journal of communications, volume.2, no. 6, page. 14-23, year-2007.
7. F. Grover, ‘Inductance calculations’, ser. Dover phoenix editions, Dover Publications, Incorporated, 2004.
8. H.L Li, A.P Hu, G. Covic, and C.S Tang, ”Optimal coupling condition of IPT system for achieving maximum power transfer,”
Electronics letters, volume. 45, no.1,page. 76-77, January 2009.
9. Kumar, A., Guravareddy, Srikanth, M. “Automatic wireless mobile charger using arduino feedback”,IJITEE,2019.
10. Srinivasarao, B., Lalitha, S.V.N.L., Sreenivasarao, Y. “Selection of filter and reduction of ripple in the output of boost-converter for
four bus micro grid system”,IJEAT,2019.

Authors: R.Tamizharasi, M.Yamuna

Paper Title: Encryption Algorithm – Detecting Chemical Structures using Graph Theory
Abstract: Security is the matter of great importance when the confidential/important information is stored
and transferred across the insecure channel such as an internet where the possibility of protection of information
is at high risk. Cryptography is a powerful tool to ensure the secure communication between different operators
by transferring the protected information and only the authorized receiver can access the information. Though
there are many encryption algorithms available in literature, the requirement of new encryption algorithms also
receives importance to prevent any traditional opportunity to sniff data. In this paper, we have proposed a new
algorithm to encrypt and decrypt information of interest, using graph theoretical approach.

642. Keyword : cryptography, decryption, edge, encryption, graph, weight.


3654-
References: 3658
1. Muhammad Faheem Mushtaq, Sapiee Jamal, Abdulkadir Hassan Disina, Zahraddeen A. Pindar, Nur Shafinaz Ahmad Shakir, Mustafa
Mat Deirs, “A survey on the cryptographic encryption algorithms”, Int.J. Adv. Comp. Sci. Appl., Vol:8, (11) , 2017, pp.333-344.
2. P. Amudha, A.C. Charles Sagayaraj, A.C. Shantha Sheela, “An application of graph theory in cryptography”, Int. J. Pure Appl. Math.
Vol:119 (13), 2018, pp. 375-383.
3. Wael Mahmoud Al Etaiwi, “Encryption algorithm using graph theory”, J.Scientific Res.Reports, 3(19), 2014, pp. 2519 -2527.
4. M. Yamuna and K. Karthika, “Data transfer using Bipartite graphs”, Int.J.Adv.Res.Sci.Engg., Vol:4(2), 2015, pp.
5. Shubham Agarwal and Anand Singh Uniyal, “Prime weighted graph in cryptographic system for secure communication”, Int.J. Pure
Appl. Math., Vol: 105(3), 2015, pp. 325-338.
6. J. Dharani, V. Maheeswari and V. Balaji, “Encryption approach on Graph theory”, J. Comp. Matha., Vol:2(1), 2018, pp. 59-65.
7. .http://momath.org/wp-content/uploads/2013/10/graph_theory-300x292.jpeg
8. https://encryptedtbn1.gstatic.com/images
9. .http://mathworld.wolfram.com/CompleteGraph.html

Authors: Rajani V Akki, Sunil S K, Jitendra S, Dhananjay M


Compressive strength of bacterial concrete by varying concentrations of E.Coli and JC3 bacteria for
Paper Title:
Self-Healing Concrete
Abstract: This paper focuses on how the bacterium produces calcite to repair cracks and thereby increases
the strength and durability of the concrete. The bacterial concrete can be made by embedding bacteria in the
concrete to make it constantly precipitate calcite. Bacillus E Coli and Bacillus Subtilis JC3 are used for this
purpose. Bacillus E coli and Bacillus Subtilis JC3 induced at cell concentration 10^5 cells/ml improves
properties of concrete. This paper campaigns for the induction of bacteria in concrete for the promotion of self-
healing cracks.

Keyword : Calcium Carbonate, Environmental friendly, Crack free concrete, Bacterial Concrete.
643.
References:
1. Use of bacteria to repair cracks in concrete by Kim van Tittelboom a, Nele De BELIE
3659-
2. Gollapudi et al,. 1995 stocks-fischer et al.2006 rodriguez Navarro et al. 2003 3661
3. Rafat Saddique, Navneet Kaur chahal, “ effect of of ureolytic bacteria on concrete properties”, construction and building
Materials 25
4. Klass van breugel, Self healing Material Conceps as solution for Aging Infrastructures, 37 th conference on our world in concrete
and structures August 2012
5. Yuequiang sui, mechanical behaviour of self healing concrete, Master thesis, Louisana State University and agricultural and
mechanical college
6. Sonja then, gan seng , Optimisation of Microcapsulation Process for self healing Polymeric Material,Sain Malaysian 40(7)(2011);
795-802
7. Sclangen E, Sangadji S. Addressing infrastructure durability and sustainability by self healing mechanism- Recent advances in
self healing concrete and asphalt. Procedia Eng [Internet]. Elsevier B.V.; 54(2013)39-57
8. Pacheco- Torgal F, Labrincha JA. Biotech cementitious materials: some aspects of an innovative methodology for concrete with
enhanced durability. Constr Build Mater [Internet]. Elsevier Ltd; 40(2013)1136-57.
Aleksandr Dunets, Angelina Penkova, Elena Potekhina, Olga Gribkova, Alla Nikolaeva, Denis
Authors:
Smirnov
Paper Title: Cluster as a form of Resort Development: Organizational and Managerial Structure
Abstract: The article considers the prospect of forming a tourism cluster by the example of the existing
644. resort Belokurikha. This is due to the historical background and concentration of tourist facilities, as well as the
experience of joint project implementation by the cluster members. The authors identify five functional 3662-
complexes in the cluster structure and describe their characteristics. The article suggests a model of the tourist 3668
cluster management structure along with the stages of its formation in the region.
Keyword : tourist cluster, Belokurikha resort, institutional structure, management structure
References:
1. Alexandrova,, A. Yu. (2007). The nature and characteristics of tourist clusters. Recreational Nature Management, Tourism, and
Sustainable Development of Regions: international materials. scientific-practical conf. - Barnaul: Publishing house of ASU, Pp. 13-16.
2. Akhmadeev, R.G., Bykanova, O.A., Turishcheva, T.B. (2018) Brics' foreign debt burden and its impact on core institutional basis.
Journal of Reviews on Global Economics, 7, pp. 345-359.
3. Akhmetshin, E. M., Kolpak, E. P., Sulimova, E. A., Kireev, V. S., Samarina, E. A., & Solodilova, N. Z. (2017). Clustering as a
criterion for the success of modern industrial enterprises. International Journal of Applied Business and Economic Research, 15(23),
221-231.
4. Barmuta, K. A., Yakovenko, Z. M., Zadorozhnaya, L. I., Mironov, D. S., & Klochko, E. N. (2017). Advantages of cluster approac h in
managing the economy of the Russian federation. International Journal of Applied Business and Economic Research, 15(23), 355-364.
5. Bordas, E. (2001). Improving public-private sectors cooperation in tourism: A new paradigm for destinations. Tourism Review. Vol.
56, N 3/4. P. 38 –41.
6. Bozhkova, G. N., Shastina, E. M., Kalimullina, O. V., & Shatunova, O. V. (2019). Study of literary images of gifted characters in
optional activities as a means to develop capable and talented youth. Space and Culture, India, 7(1), 264-273.
doi:10.20896/saci.v7i1.463
7. Bykanova, O.A., Akhmadeev, R.G., Glubokova, N.Y., Kravchuk, I.S. (2018) The global market of roundwood: Financial aspects.
Bulgarian Journal of Agricultural Science, 24 (1), pp. 8-16.
8. Demirhan, G., & Yücel, C. (2016). A Prediction for Teacher Commitment: Effects of Managerial Style, Burnout and Demographics,
Research in Social Sciences and Technology, (I)1, 24-43,
9. Dunets, A.N. (2011). Tourist and recreational complexes of the mountain region. Barnaul: AltSTU Publishing House, 204 p.
10. Dunets, A., Muhamedieva, A., Sycheva, I., Perepechkina, E., Vakhrushev, I., & Kulchytskiy, A. (2019). Spatial tourism plannin g:
Using the model of functional and planning complexes. Journal of Environmental Management and Tourism, 10(4), 711 -719.
doi:10.14505/jemt.v10.4(36).01
11. Farooq, M. O., Elseoud, M. S. A., Turen, S., & Abdulla, M. (2019). Causes of non-performing loans: The experience of gulf
cooperation council countries. Entrepreneurship and Sustainability Issues, 6(4), 1955-1974. doi:10.9770/jesi.2019.6.4(29)
12. Fedulova, I., Ivanova, V., Atyukova, O., & Nosov, V. (2019). Inclusive education as a basis for sustainable development of so ciety.
Journal of Social Studies Education Research, 10(3), 118-135.
13. Friedrichs, Y. Gummesson E. (2006). Hotel networks and social capital in destination marketing. International Journal of Service
Industry Management. V. 17, V. 1. P. 58-75.
14. Frolova, I., Voronkova, O., Islamutdinova, D., Gordeyeva, O., Fedulova, I., & Zhminko, A. (2019a). Ecologization of ag roindustrial
production: Organizational and economic transformations. Journal of Environmental Management and Tourism, 10(3), 622 -630.
doi:10.14505/jemt.v10.3(35).16
15. Frolova, I., Voronkova, O., Alekhina, N., Kovaleva, I., Prodanova, N., & Kashirskaya, L. (2019b). Corruption as an obstacle to
sustainable development: A regional example. Entrepreneurship and Sustainability Issues, 7(1), 674-689. doi:10.9770/jesi.2019.7.1(48)
16. Gabidullina, F. I., Korganbekov, B. S., Makarova, V. F., Zakirov, R. A., & Kayumova, G. F. (2019). Concept «teacher» in language
consciousness of students of philological faculty. XLinguae, 12(3), 45-54. doi:10.18355/XL.2019.12.03.04
17. Goryushkina, N. E., Petrova, L. I., Khudyakova, T. M., Tchuykova, N. M., Klimovskikh, N. V., & Voinova N. E. (2019).
Diversification and its role in improving hotel industry businesses competitiveness. International Journal of Engineering and Advanced
Technology, 9(1).
18. Gordon, I., Goodall, B. (2000). Localities and tourism. Tourism Geographies. 2 (3). P. 290-311.
19. Goloshchapova, L. V., Plaskova, N. S., Prodanova, N. A., Yusupova, S. Y., & Pozdeeva, S. N. (2018). Analytical review of risk s of
loss of profits in cargo transportation. International Journal of Mechanical Engineering and Technology, 9(11), 1897-1902.
20. Grakhova, S., Fayzrakhmanov, I., Zhundibayeva, A., Yakutina, M., Sharipov, R., & Stepykin, N. (2019). Information, pedagogica l and
facilitation technologies in teaching a special philology class at non-specialized faculties of higher education institutions. International
Journal of Innovative Technology and Exploring Engineering, 8(12), 1613-1620. doi:10.35940/ijitee.L3154.1081219
21. Ghosh, M., & Ghosal, S. (2019). Historical geography of forestry and forest culture in sub-himalayan west bengal, 1757-2015. Space
and Culture, India, 6(5), 215-227. doi:10.20896/SACI.V6I5.393
22. Kagema, J. (2018). The School Curriculum and Its Influence on Teacher Motivation in Curriculum Implementation in Kenya. Journ al
of Culture and Values in Education, 1(1), 9-25. Retrieved from http://cultureandvalues.org/index.php/JCV/article/view/3
23. Kayumova, G., Sheymardanov, S., Akhtarieva, R., & Zhundibayeva, A. (2019). Developing creative potential of a schoolchild by
means of native language. Journal of Social Studies Education Research, 10(1), 81-92.
24. Kashirskaya, L., Voronkova, O., Sitnov, A., Shichiyakh, R., Kudinova, M., & Sycheva, I. (2019). Rural development through the
formation of zonal agro-ecological clusters. Journal of Environmental Management and Tourism, 10(3), 651-659.
doi:10.14505/jemt.v10.3(35).19
25. Kenna, J., & Russell III, W. (2018). The Culture and History of Standards-Based Educational Reform and Social Studies in America.
Journal of Culture and Values in Education, 1(1), 26-49. Retrieved from http://cultureandvalues.org/index.php/JCV/article/view/2
26. Kireev, B., Zhundibayeva, A., & Aktanova, A. (2019). Distance learning at higher education institutions: Results of an experiment.
Journal of Social Studies Education Research, 10(3), 387-403.
27. Kovalev, Yu. P. (2009). Factors of development of cluster initiatives in the tourism sector. Regional studies. No. 4/5 (25), Pp. 23-31.
28. Korchagina, N. A. (2010). Features of the implementation of cluster initiatives in tourism. Vestn. Astrakhan state. tech. un-that. Ser.
Economy. No. 1. Pp. 131-137
29. Korchagina, N.A. (2009). Cluster policy is a technology for improving the efficiency of company management. - Astrakhan:
Publishing House "Astrakhan University", 117 p.
30. Korableva, O.N., Kalimullina, O.V., Mityakova, V.N. (2019) Designing a System for Integration of Macroeconomic and Statistica l
Data Based on Ontology. Advances in Intelligent Systems and Computing, 998, p. 157-165
31. Kolmakov, V. V., Polyakova, A. G., Karpova, S. V., & Golovina, A. N. (2019). Cluster development based on competitive
specialization of regions. Economy of Region, 15(1), 270-284. doi:10.17059/2019-1-21
32. Korkmaz, U., & Avci, Z. Y. (2016). Turkish pre-service teachers’ experiences with contemporary technology games and perceptions
about teaching with instructional games. Research in Social Sciences and Technology, 1(1)
33. Kuznetsova, I. G., Voronkova, O. Y., Nimatulaev, M. M., Ruiga, I. R., Zhuruli, G. N., & Levichev, V. E. (2019a). Ensuring the
national security of agriculture in the digital era through the formation of human capital. International Journal of Economic s and
Business Administration, 7, 558-569.
34. Kuznetsova, I. G., Goloshchapova, L. V., Ivashina, N. S., Shichiyakh, R. A., Petrova, L. I., & Tkachev, B. P. (2019b). The paradigm of
human capital development capable of adapting innovations in the transition to a digital economy. International Journal of Civil
Engineering and Technology, 10(2), 1408-1417.
35. Kruzhalin, V.I. (2009). Tourism and recreational clusters - new strategies for the development of regional tourism. Resort business,
tourism and recreation. T. 3. No. 4 (12). - Pp. 29-32.
36. Leiper, N. (1979). The framework of tourism: towards a definition of tourism, tourist, and the tourist industry. Annals of Tourism
Research. V. 6 (4). Р. 390-407
37. Mazhar, L. Yu. (2008). Territorial tourist and recreational systems. - Smolensk: Universum, 211 p.
38. Mandal, J., & Sanyal, S. (2019). Geospatial analysis of fluoride concentration in groundwater in puruliya district, west bengal. Space
and Culture, India, 6(5), 71-86. doi:10.20896/SACI.V6I5.369
39. Magsumov, T.A. (2019). Apprenticeship in secondary vocational schools during the economic modernization in late imperial Russ ia.
Part 2. European Journal of Contemporary Education, 8(1), 215-221. doi: 10.13187/ejced.2019.1.215
40. Mironenko, N.S., Bochvarova, M. (1986). Recreational systems. - M.: Publishing House of Moscow State University, 136 p.
41. Movchan, I. B., Yakovleva, A. A., & Daniliev, S. M. (2019). Parametric decoding and approximated estimations in engineering
geophysics with the localization of seismic risk zones on the example of northern part of kola peninsula. Paper presented at the 15th
Conference and Exhibition Engineering and Mining Geophysics 2019, Gelendzhik 2019, 188-198.
42. Nicic, M., & Mitrovic, N. (2019, June). The importance of cluster support projects in tourism for achieving competitive advan tage.
In TISC-Tourism International Scientific Conference Vrnjačka Banja (Vol. 4, No. 1, pp. 758-774.
43. Novelli, M., Schmitz B., Spencer T. (2006). Networks, clusters and innovation in tourism: A UK experience. Tourism Management.
V. 27 (6). Р. 1141-1152.
44. Pavlyshyn, L., Voronkova, O., Yakutina, M., & Tesleva, E. (2019). Ethical problems concerning dialectic interaction of culture and
civilization. Journal of Social Studies Education Research, 10(3), 236-248.
45. Paptsov, A., & Nechaev, V. (2019). Towards to a single innovation space in the agrarian sector of the member states of the eurasian
economic union: A case study. Entrepreneurship and Sustainability Issues, 7(1), 637-648. doi:10.9770/jesi.2019.7.1(45)
46. Preobrazhensky, V.S., Vedenin, Yu.A., Zorin, I.V. et al. (1975). Theoretical Foundations of Recreational Geography. M. Science, 224
p.
47. Preobrazhensky, V.S., Vedenin, Yu.A. Zorin I.V. (1992). Theory of Recreational and Recreational Geography. M., 172 p.
Pyatinkin, S.F., Bykova, T.P. (2008). Cluster development: essence, relevant approaches, foreign experience. Minsk. Theseus, 72 p.
48. Plaskova, N. S., Prodanova, N. A., Zatsarinnaya, Е. I., Korshunova, L. N., & Chumakova, N. V. (2017). Methodological support of
organizations implementing innovative activities investment attractiveness estimation. Journal of Advanced Research in Law and
Economics, 8(8), 2533-2539. doi:10.14505/jarle.v8.8(30).25
49. Prodanova, N. A., Plaskova, N. S., Bochkareva, N. G., Babalykova, I. A., Gazizyanova, Y. Y., & Zherelina, O. N. (2019). Integ rated
corporate reporting as an innovative business reporting model. International Journal of Engineering and Advanced Technology, 8(5),
2075-2078.
50. Puryaev, A. S., Puryaeva, Z. A., Kharisova, A. R., & Puryaev, A. A. (2019). Investigation and explanation of mathematical too ling for
accounting non-economic characteristics during the investment project effectiveness’ assessing process. IOP Conference Series:
Materials Science and Engineering, 570, 012074. https://doi.org/10.1088/1757-899X/570/1/012074
51. Sagdieva, R., Husnutdinov, D., Mirzagitov, R., & Galiullin, R. (2019). Kinship terms as proof of genetic relationship. Journal of Social
Studies Education Research, 10(3), 103-117.
52. Saenko, N., Voronkova, O., Volk, M., & Voroshilova, O. (2019). The social responsibility of a scientist: Philosophical aspect of
contemporary discussions. Journal of Social Studies Education Research, 10(3), 332-345.
53. Shatunova O., Anisimova T., Sabirova F., Kalimullina O. (2019) STEAM as an Innovative Educational Technology. Journal of Social
Studies Education Research. Vol. 10 (2), 131-144.
54. Sessa, A. (1988). The science of systems for tourism development. Annals of Tourism Research. Vol. 15. P. 219-235.
55. Sharpley, R. (2009). Tourism Development and the Environment: Beyond Sustainability? London, GBR: Earthscan, 214 p.
56. Shaw, G., Williams, A.M. (2004). Tourism and Tourism Spaces. London: Thousand Oaks. New Delhi: SAGE Publications, 311 р.
57. Sozieva, Z. I. (2009). Formation and development of tourist and recreational clusters in the region: foreign experience. R egional
economics: theory and practice. –№ 25. Pp. 65-70.
58. Sycheva, I., Voronkova, O., Vorozheykina, T., Yusupova, G., Semenova, A., & Ilyin, A. (2019a). The main directions of improving
the environmental and economic efficiency of regional production. Journal of Environmental Management and Tourism, 10(3), 631-
639. doi:10.14505/jemt.v10.3(35).17
59. Sycheva, I. N., Voronkova, O. Y., Kovaleva, I. V., Kuzina, A. F., Bannikov, S. A., & Titova, S. V. (2019b). Motivation in per sonnel
management of a trading enterprise. International Journal of Economics and Business Administration, 7, 570-582.
60. Tarman, B., Baytak, A., & Duman, H. (2015). Teachers' views on an ICT reform in education for social justice. Eurasia Journal of
Mathematics, Science and Technology Education, 11(4), 865-874. doi:10.12973/eurasia.2015.1445a
61. Titova, S. V., Surikov, Y. N., Voronkova, O. Y., Skoblikova, T. V., Safonova, I. V., & Shichiyakh, R. A. (2019). Formation,
accumulation and development of human capital in the modern conditions. International Journal of Economics and Business
Administration, 7(2), 223-230.
62. Trofimova, L., Prodanova, N., Korshunova, L., Savina, N., Ulianova, N., Karpova, T., & Shilova, L. (2019). Public sector entities’
reporting and accounting information system. Journal of Advanced Research in Dynamical and Control Systems, 11(8 Special Issue),
416-424.
63. Voronkova, O., Sycheva, I., Kovaleva, I., Khasanova, A., Gorovoy, S., & Vorozheykina, T. (2019a). Assessing the environmental
impact of the intensification of agricultural production. Journal of Environmental Management and Tourism, 10(3), 697-705.
doi:10.14505/jemt.v10.3(35).24
64. Vasilev, B., & Tung, L. V. (2019). Research methods of V/F control for matrix converter use direct space vector modulation.
International Journal of Electrical and Computer Engineering, 9(6), 5115-5124. http://doi:10.11591/ijece.v9i6.pp5115-5124
65. Voronkova, O. Y., Iakimova, L. A., Frolova, I. I., Shafranskaya, C. I., Kamolov, S. G., & Prodanova, N. A. (2019b). Sustainable
development of territories based on the integrated use of industry, resource and environmental potential. International Journ al of
Economics and Business Administration, 7(2), 151-163.
66. Voronkova, O., Yankovskaya, V., Kovaleva, I., Epishkin, I., Iusupova, I., & Berdova, Y. (2019c). Sustainable territorial development
based on the effective use of resource potential. Entrepreneurship and Sustainability Issues, 7(1), 662-673.
doi:10.9770/jesi.2019.7.1(47)

Authors: Sunil Kumar, Vijay Kumar Lamba, Surender Jangra

Paper Title: EAgeBioS: Enhanced Biometric System to handle the Effects of Template Aging
Abstract: Biometric Systems are well-known security systems that can be used anywhere for
authentication, authorization or any kind of security verifications. In biometric systems, the samples are trained
first and then it can be used for testing in long runs. Many recent researches have shown that a biometric system
may fail or get compromised because of the aging of the biometric templates. The fact that temporal duration
affects the performance of the biometric system has shattered the belief that iris does not change over lifetime.
645. This is also possible in the case of iris. So, the main focus of this work is to analyze the effect of aging and also
to propose a new system that can deal with template aging. We have proposed a new iris recognition system with
3669-
an image enhancement mechanism and different feature extraction mechanisms. In this work, three different
3677
features are extracted, which are then fused to be used as one. The full system is trained on a dataset of 2500
samples for the year 2008 and testing is done in three different phases (i) No-Lapse, (ii) 1-Year Lapse and (iii) 2-
Year Lapse. A portion of the ND-Iris-Template-Aging dataset [11] is used with a period of three years lapse.
Results show that the performance of the hybrid classifier AHyBrK [17] is improved as compared to KNN and
ANN and the effect of aging in terms of degraded performance is clear. The performance of this system is
measured in terms of False Rejection Rate, Error Rate, and Accuracy. The overall performance of AHyBrK is
51.04% and 52.98% better than KNN and ANN respectively in terms of False Rejection Rate and Error Rate
whereas the accuracy of this proposed system is also improved by 5.52% and 6.04% as compared to KNN and
ANN respectively. This proposed system also achieved high accuracy for all the test phases.

Keyword : Template Aging, Hybrid Classifier, Feature Extraction, Feature Fusion, Quality Enhancement
References:
1. Alhamrouni,, M. (2017). Iris Recognition By Using Image Processing Techniques. Master’s Thesis. Graduate School of Natural And
Applied Science, ATLIM University.
2. Alsultan, A., Warwick, K. & Wei, H., (2016). Free-text keystroke dynamics authentication for Arabic language, IET Biometrics, 5(3),
164–169.
3. Baker, S. E., Bowyer, K. W., & Flynn, P. J. (2009). Empirical Evidence for Correct Iris Match Score Degradation with Increased Time-
Lapse between Gallery and Probe Matches. Advances in Biometrics Lecture Notes in Computer Science, 1170–1179.
4. Bowyer, K. W., Baker, S. E., Hentz, A., Hollingsworth, K., Peters, T., & Flynn, P. J. (2009). Factors that degrade the match distribution
in iris biometrics. Identity in the Information Society, 2(3), 327–343.
5. Browning, K., & Orlans, N. (2014). Biometric Aging: Effects of Aging on Iris Recognition. The MITRE Corporation, 13(3472), 1–13.
6. Carls, J. W. (2009). A Framework for Analyzing Biometric Template Aging and Renewal Prediction. Air Force Institute of
Technology.
7. Carls, J. W., Raines, R., Grimaila, M., & Rogers, S. (2008). Biometric enhancements: Template aging error score analysis. 2008 8th
IEEE International Conference on Automatic Face & Gesture Recognition.
8. Czajka A. (2014) Influence of Iris Template Aging on Recognition Reliability. In: Fernández-Chimeno M. et al. (eds) Biomedical
Engineering Systems and Technologies. BIOSTEC 2013. Communications in Computer and Information Science, vol 452. Springer,
Berlin, Heidelberg.
9. Ellavarason, E. (2013). Effects of Aging on Iris Biometric Recognition. 2013th Ed. Denmark, Kongens Lyngby: Technical University
of Denmark.
10. Fenker, S. P., & Bowyer, K. W. (2011). Experimental evidence of a template aging effect in iris biometrics. 2011 IEEE Workshop on
Applications of Computer Vision (WACV).
11. Fenker, S. P., & Bowyer, K. W. (2012). Analysis of template aging in iris biometrics. 2012 IEEE Computer Society Conference on
Computer Vision and Pattern Recognition Workshops.
12. Fenker, S. P., Ortiz, E., & Bowyer, K. W. (2013). Template Aging Phenomenon in Iris Recognition. IEEE Access, 1, 266–274.
13. Harvey, J., Campbell, J., & Adler, A. (2018). Characterization of biometric template aging in a multi-year, multi-vendor longitudinal
fingerprint matching study. IEEE Transactions on Instrumentation and Measurement, 13(1), 1–9.
14. Johnson, M., Yambay, D., Rissacher, D., Holsopple, L., & Schuckers, S. (2018). A longitudinal study of iris recognition in
children. 2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis (ISBA).
15. Kanak, A. & Sogukpinar, I., (2017). BioTAM: a technology acceptance model for biometric authentication systems, IET Biometrics,
6(6), 457–467.
16. Komogortsev, O. V., Holland, C. D., & Karpov, A. (2014). Template aging in eye movement-driven biometrics. Biometric and
Surveillance Technology for Human and Activity Identification XI.
17. Kumar, S., Lamba, V. K., & Jangra, S. (2019). ILivSpot: Secure Biometric System based on Iris Liveliness Detection. (Communicated)
18. Labati, R., Genovese, A. and Munoz, E. (2016). Biometric recognition in automated border control: a survey. ACM Comput. Surv.,
49(2), pp.1-24.
19. Lanitis, A. (2010). A survey of the effects of aging on biometric identity verification. International Journal of Biometrics, 2(1), 34.
20. Mamdouhi, M., Kazemi, M., & Amoabedini, A. (2019). A New Model for Iris Recognition by Using Artificial Neural
Networks. Fundamental Research in Electrical Engineering, Lecture Notes in Electrical Engineering, 185–196.
21. Mehrotra, H., Vatsa, M., Singh, R., & Majhi, B. (2013). Does Iris Change Over Time? PLoS ONE, 8(11).
22. Muley, A. & Kute, V., (2018). Prospective solution to bank card system using fingerprint, in 2018 2nd International Conference on
Inventive Systems and Control (ICISC), 898 – 902.
23. Neurotechnology. (2019, October 09). VeriEye SDK. Retrieved from https://www.neurotechnology.com/verieye.html
24. Ramlee, R. A., Ramli, A. R., & Noh, Z. M. (2017). Pupil Segmentation of Abnormal Eye using Image Enhancement in Spatial
Domain. IOP Conference Series: Materials Science and Engineering, 210, 012031.
25. Ryu, J., Jang, J., & Kim, H. (2010). Analysis of the effect of fingerprint sample quality in template aging. Journal of Biometrics (J.
Biom.), 2(1), 34–62.
26. Sabhanayagam, T., Venkatesan, V. P., & Senthamaraikannan, K. (2018). A Comprehensive Survey on Various Biometric
System. International Journal of Applied Engineering Research, 13(5), 2276–2297.
27. Telgad, R. L., Siddiqui, A., Lothe, S. A., Deshmukh, P. D., & Jadhao, G. (2017). Development of an efficient secure biometric system
by using iris, fingerprint, face. 2017 1st International Conference on Intelligent Systems and Information Management (ICISIM).
28. Tome-Gonzalez, P., Alonso-Fernandez, F., & Ortega-Garcia, J. (2008). On the Effects of Time Variability in Iris Recognition. 2008
IEEE Second International Conference on Biometrics: Theory, Applications, and Systems.
29. Trokielewicz, M. (2015). Linear regression analysis of template aging in iris biometrics. 3rd International Workshop on Biometrics and
Forensics (IWBF 2015).
30. Uludag, U., Ross, A., & Jain, A. (2008). Biometric template selection and update: a case study in fingerprints. Pattern Recognition, 37,
1533–1542.
31. Yang, J. Hu, Wang, S. & Wu, Q., (2018). Biometrics based Privacy-Preserving Authentication and Mobile Template
Protection, Wireless Communications and Mobile Computing, 2018, 1–17. https://doi.org/10.1155/2018/7107295 .

Authors: Shaik Rafi Kiran, G. Hanumantha Reddy

Paper Title: Recent Nature Inspired Techniques for Solar Power Point Tracking Application
Abstract: Photovoltaic (PV) array generates non-linear I-V and P-V characteristics. As a result, it is
difficult to transfer the maximum power from source to load. The Maximum Power Point Tracking (MPPT) is
used to track the Maximum Power Point (MPP) and extract the maximum power of solar PV. The disadvantages
of conventional MPPT techniques are less MPP tracking speed, high MPP settling time and less accuracy. In
646. order to overcome the disadvantages of conventional techniques, in this article different types of recent nature
inspired optimization techniques are reviewed to track the MPP. In addition, the application of optimization 3678-
technique based Maximum Power Point Tracking (MPPT) technique for standalone and grid connected 3684
application is explained in detail. The advantages of optimization techniques are highly reliable, better accuracy,
less time to convergence and fast response.

Keyword : DC-DC conveter, Optimization methods, MPPT, optimum duty cycle, and PV system.
References:
1. Daneshpour, Raheleh, and Mehdi Mehrpooya. "Design and optimization of a combined solar thermophotovoltaic power generation an d
solid oxide electrolyser for hydrogen production." Energy conversion and management 176 (2018): 274-286.
2. Nayak, Pabitra K., et al. "Photovoltaic solar cell technologies: analysing the state of the art." Nature Reviews Materials 4.4 (2019): 269.
3. Salman, Salman, A. I. Xin, and W. U. Zhouyang. "Design of a P-&-O algorithm based MPPT charge controller for a stand-alone
200W PV system." Protection and Control of Modern Power Systems 3.1 (2018): 25.
4. Ambikapathy, A., Gajendra Singh, and Prabhakar Tiwari. "Smart Switching Algorithm Between IC and PO Algorithms for Grid -
Connected PV System." Advances in smart grid and renewable energy. Springer, Singapore, 2018. 83-92.
5. Podder, Amit Kumer, Naruttam Kumar Roy, and Hemanshu Roy Pota. "MPPT methods for solar PV systems: a critical review based
on tracking nature." IET Renewable Power Generation (2019).
6. Hammami, Manel, et al. "Three-Phase Three-Level Flying Capacitor PV Generation System with an Embedded Ripple Correlation
Control MPPT Algorithm." Electronics 8.2 (2019): 118.
7. Wu, Zhongqiang, and Danqi Yu. "Application of improved bat algorithm for solar PV maximum power point tracking under partially
shaded condition." Applied Soft Computing 62 (2018): 101-109.
8. Kandemir, Ekrem, Selim Borekci, and Numan Sabit Cetin. "Conventional and Soft-Computing Based MPPT Methods Comparisons in
Direct and Indirect Modes for Single Stage PV Systems." Elektronika ir Elektrotechnika 24.4 (2018): 45-52.
9. Atia, Doaa Mohamed. "Global Maximum Power Point Tracking-Based Computational Intelligence Techniques." Modern Maximum
Power Point Tracking Techniques for Photovoltaic Energy Systems. Springer, Cham, 2020. 131-163.
10. Abdel-Basset, Mohamed, Doaa El-Shahat, and Ibrahim El-Henawy. "Solving 0–1 knapsack problem by binary flower pollination
algorithm." Neural Computing and Applications: 1-19.
11. Abdel-Basset, Mohamed, and Laila A. Shawky. "Flower pollination algorithm: a comprehensive review." Artificial Intelligence
Review (2018): 1-25.
12. Diab, Ahmed A. Zaki, and Hegazy Rezk. "Global MPPT based on flower pollination and differential evolution algorithms to mitig ate
partial shading in building integrated PV system." Solar Energy 157 (2017): 171-186.
13. Murdianto, Farid Dwi, Ainur Rofiq Nansur, and Alfis Syah Laili Hermawan. "Modeling and simulation of MPPT coupled inductor
sepie converter using Flower Pollination Algorithm (FPA) Method in DC mierogrid system." Engineering Technology and
Applications (IES-ETA), 2017 International Electronics Symposium on. IEEE, 2017.
14. Pei, Tingting, Xiaohong Hao, and Qun Gu. "A Novel Global Maximum Power Point Tracking Strategy Based on Modified Flower
Pollination Algorithm for Photovoltaic Systems under Non-Uniform Irradiation and Temperature Conditions." Energies 11.10 (2018):
2708.
15. Priyadarshi, Neeraj, et al. "Maximum Power Point Tracking for Brushless DC Motor-Driven Photovoltaic Pumping Systems Using a
Hybrid ANFIS- FLOWER Pollination Optimization Algorithm." Energies 11.5 (2018): 1-16.
16. Rizk-Allah, Rizk M., and Aboul Ella Hassanien. "New binary bat algorithm for solving 0–1 knapsack problem." Complex & Intelligent
Systems 4.1 (2018): 31-53.
17. Wu, Zhongqiang, and Danqi Yu. "Application of improved bat algorithm for solar PV maximum power point tracking under partially
shaded condition." Applied Soft Computing 62 (2018): 101-109.
18. Karagöz, M. Kadir, and Hüseyin Demirel. "A Novel MPPT Method for PV Arrays Based on Modified Bat Algorithm with Partial
Shading Capability." International Journal of Computer Science and Network Security (IJCSNS) 17.2 (2017): 61.
19. Oshaba, A. S., E. S. Ali, and SM Abd Elazim. "PI controller design for MPPT of photovoltaic system supplying SRM via BAT search
algorithm." Neural Computing and Applications28.4 (2017): 651-667.
20. Yang, Xin-She. "Harmony search as a metaheuristic algorithm." Music-inspired harmony search algorithm. Springer, Berlin,
Heidelberg, 2009. 1-14.
21. Gao, Xiao Zhi, et al. "Harmony search method: theory and applications." Computational intelligence and neuroscience2015 (2015): 39.
22. Kumar, Nishant, et al. "Normal Harmonic Search Algorithm-Based MPPT for Solar PV System and Integrated With Grid Using
Reduced Sensor Approach and PNKLMS Algorithm." IEEE Transactions on Industry Applications 54.6 (2018): 6343-6352.
23. G. O. Young, “Synthetic structure of industrial plastics (Book style with paper title and editor),” in Plastics, 2nd ed. vol. 3, J.
Peters, Ed. New York: McGraw-Hill, 1964, pp. 15–64.
24. W.-K. Chen, Linear Networks and Systems (Book style). Belmont, CA: Wadsworth, 1993, pp. 123–135.
25. H. Poor, An Introduction to Signal Detection and Estimation. New York: Springer-Verlag, 1985, ch. 4.
26. B. Smith, “An approach to graphs of linear forms (Unpublished work style),” unpublished.
27. E. H. Miller, “A note on reflector arrays (Periodical style—Accepted for publication),” IEEE Trans. Antennas Propagat., to be
published.
28. J. Wang, “Fundamentals of erbium-doped fiber amplifiers arrays (Periodical style—Submitted for publication),” IEEE J. Quantum
Electron., submitted for publication.
29. C. J. Kaufman, Rocky Mountain Research Lab., Boulder, CO, private communication, May 1995.
30. Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate
interfaces(Translation Journals style),” IEEE Transl. J. Magn.Jpn., vol. 2, Aug. 1987, pp. 740–741 [Dig. 9th Annu. Conf. Magnetics
Japan, 1982, p. 301].
31. M. Young, The Techincal Writers Handbook. Mill Valley, CA: University Science, 1989.
32. (Basic Book/Monograph Online Sources) J. K. Author. (year, month, day). Title (edition) [Type of medium]. Volume(issue).
Available: http://www.(URL)
33. J. Jones. (1991, May 10). Networks (2nd ed.) [Online]. Available: http://www.atm.com
34. (Journal Online Sources style) K. Author. (year, month). Title. Journal [Type of medium]. Volume(issue), paging if given.
Available: http://www.(URL)

Authors: Debashish Mishra, Prakash Chandra Sahu, Ramesh Chandra Prusty,

Tidal Energy Integrated Robust Frequency Control of an Islanded AC Microgrid with Improved-
Paper Title:
MFO Tuned Tilt Controller
Abstract: In recent electrical energy scenario different renewable energy based distribution generation
(DG) systems have been developed to provide electrical power to distant and remote consumers. In view of this
current research article presents a Tidal Power Plant (TPP) and its integration with an Islanded AC Microgrid
system. The tidal energy based TPP is modelled to generate required electrical power. However the inherent
647. dynamic behaviour of TPP largely affects the microgrid system frequency especially in islanded mode of
operation. In regard to this to obtain necessary control mechanism in an islanded AC microgrid system , present 3685-
research article proposes a tilt multistage TDF/(1+TI) controller and to show effectiveness of proposed tilt 3692
controller for microgrid control it has been compared with multistage PDF/1+PI and PID controllers. To obtain
optimal gain parameters of above implemented controllers an Improved- Moth Flame Optimization (I-MFO)
technique has been proposed for this study. To justify viability of proposed I-MFO algorithm its performances
have been compared with original MFO algorithm. Finally it has been noticed that to obtain robust frequency
control in an islanded AC microgrid system, proposed I-MFO optimized tilt multistage controller exhibits
outstanding performance under wind, solar and tidal energy uncertainties.

Keyword : Distribution Generation (DG); Microgrid; Tidal Power Plant (TPP); Tilt multistage TDF/1+TI
Controller; Improved-Moth Flame Optimization (I-MFO) algorithm; Integral of Time multiplied Absolute Error
References:
1. D.E. Olivares, A. Mehrizi-Sani, A.H.Etemadi, C.A. Cañizares, R. Iravani, M. Kazerani , G.A. Jimenez-Estevez, Trends in microgrid
control, IEEE Transactions on smart grid. 5(4) (2014), pp.1905-1919.
2. F.Nejabatkhah, Y. W. Li, Overview of power management strategies of hybrid AC/DC microgrid, IEEE Transactions on Power
Electronics. 30(12) (2015) , pp.7072-7089.
3. R. H. Lasseter, P.Paigi, Microgrid: A conceptual solution, In Power Electronics Specialists Conference, PESC 04.IEEE 35th
Annual Vol. 6, pp. (2004), pp. 4285-4290.
4. C. A. Cortes, S. F. Contreras, M.Shahidehpour ,Microgrid topology planning for enhancing the reliability of active distribution
networks, IEEE Transactions on Smart Grid, 9(6) (2018), pp.6369-6377.
5. R.Boukenoui, R.Bradai, A. Mellit, M.Ghanes, H.Salhi, Comparative analysis of P&O, modified hill climbing-FLC, and adaptive
P&O-FLC MPPTs for microgrid standalone PV system. In Renewable Energy Research and Applications (ICRERA), 2015
International Conference on (pp. 1095-1099).
6. T. Kamal, S. Z. Hassan, M. H.Riaz, H. Li, M. Sarmad, G. M. Mufti, Design and control of photovoltaic/micro-turbine/super-capacitor
based microgrid system. In Multi-topic Conference (INMIC), 2017 International(pp. 1-6). IEEE.
7. N. L.Díaz, A. C. Luna, J. C. Vasquez, J. M. Guerrero, Centralized control architecture for coordination of distributed renewable
generation and energy storage in islanded ac microgrids, IEEE Transactions on Power Electronics. 32(7)(2017). pp.5202-5213.
8. Y. Han, P. Shen, X. Zhao, J. M. Guerrero, An enhanced power sharing scheme for voltage unbalance and harmonics compensation i n
an islanded AC microgrid. IEEE Transactions on Energy Conversion. 31(3) (2016), pp.1037-1050.
9. H.Qiu, W.Gu, Y. Xu, Z.. Wu, S.Zhou, J.Wang, Interval-Partitioned Uncertainty Constrained Ro-bust Dispatch for AC/DC Hybrid
Microgrids With Uncontrollable Renewable Generators, IEEE Transactions on Smart Grid. (2018).
10. B. Zhao, Q.Haifeng, R. Qin, Z.Xue-song, W.Gu, C. Wang, Robust Optimal Dispatch of AC/DC Hybrid Microgrids Considering
Generation and Load Uncertainties and Energy Storage Loss, IEEE Transactions on Power Systems. (2018).
11. D. Wu, F. Tang, T.,Dragicevic, J. C. Vasquez, J. M. Guerrero, Autonomous active power control for islanded ac microgrids with
photovoltaic generation and energy storage system, IEEE Transactions on energy conversion.29(4)(2014). pp.882-892.
12. S. Ahmadi, S.Shokoohi, H.Bevrani, A fuzzy logic-based droop control for simultaneous voltage and frequency regulation in an AC
microgrid. International Journal of Electrical Power & Energy Systems. 64 (2015), pp. 148-155.
13. P. C.Sahu, S. Mishra, R. C.Prusty, S. Panda, Improved-salp swarm optimized type-II fuzzy controller in load frequency control of
multi area islanded AC microgrid, Sustainable Energy, Grids and Networks.16(2018). pp.380-392.
14. I. Pan, S. Das, Fractional order AGC for distributed energy resources using robust optimization. IEEE Transactions on Smart
Grid, 7(5) (2016), pp.2175-2186.
15. R. K.,Khadanga, S.Padhy, S., Panda, A. Kumar, Design and analysis of multi‐stage PID controller for frequency control in an island ed
micro‐grid using a novel hybrid whale optimization‐pattern search algorithm, International Journal of Numerical Modelling: Electronic
Networks, Devices and Fields. e2349(2018).
16. S. Y. Lu, L. Wang, T. M. Lo, A. V. Prokhorov, Integration of wind power and wave power generation systems using a DC
microgrid, IEEE Transactions on Industry Applications. 51(4) (2015), pp. 2753-2761.
17. K. T. Tan, B.Sivaneasan, X. Y. Peng, P. L. So, Control and operation of a dc grid-based wind power generation system in a
microgrid, IEEE Transactions on Energy Conversion, 31(2) (2016), pp. 496-505.
18. N. L.Diaz, D. Wu, T.Dragicevic, J. C. Vasquez, J. M. Guerrero, Stored energy balance for distributed pv-based active generators in an
ac microgrid, In Power Energy Society General Meeting (pp. 1-5) (2015).
19. A. M.Bouzid, J. M. Guerrero, A.Cheriti, M.Bouhamida, P.Sicard, M.Benghanem, A survey on control of electric po wer distributed
generation systems for microgrid applications. Renewable and Sustainable Energy Reviews.44(2015). pp.751-766.
20. M. E.Lotfy, T.Senjyu, M. A. F.Farahat, A. F. Abdel-Gawad, A.Yona, A frequency control approach for hybrid power system using
multi-objective optimization, Energies.10(1)(2017) 80.
21. H. M.Hasanien, Whale optimisation algorithm for automatic generation control of interconnected modern power systems including
renewable energy sources, IET Generation, Transmission & Distribution. 12(3) (2017), pp. 607-614.
22. H.Polinder, M.E.C.Damen, F. Gardner, Linear PM generator system forwave energy conversion in the AWS, IEEE Trans. Energy
Convers,19,(3) (2004), pp. 583–589.
23. R. K.Sahu, S. Panda, A.Biswal, G. C.Sekhar, Design and analysis of tilt integral derivative controller with filter for load frequency
control of multi-area interconnected power systems, ISA transactions. 61 (2016), pp. 251-264.
24. M. A.Taher, S. Kamel, F. Jurado, M. Ebeed, An improved moth‐flame optimization algorithm for solving optimal power flow
problem, International Transactions on Electrical Energy Systems. e2743. (2018).

Authors: Kala K.U., M. Nandhini


2P-AGRCFN: Two Phase Attention Gated Recurrent Context Filtering Network for Sequential
Paper Title:
Recommender Systems
Abstract: The recent trends in recommender systems have focused on modeling long-term tastes as well
as short-term preferences. The various recurrent architectures have used for sequence modeling in recommender
systems, since each state is a combination of current and previous layer output recurrently. Although the
Recurrent Neural Networks (RNNs) have the ability for modeling both long-term and short-term dependency to
some extent, the monotonic nature of temporal dependency of RNN reduces the effect of short-term interests of
the user. Thus final interests of the users can’t be predicted from the hidden states. We propose a Two Phase-
648. Attention Gated Recurrent Context Filtering Network (2P-AGRCF) for dealing with user’s long-term
dependency as well as short-term preferences. The first phase of 2P-AGRCFN is performed in the input level by 3693-
constructing a contextual input using certain number of recent input contexts for handling user’s short-term 3700
interests. This can handle the correlation among recent inputs and leads to strong hidden states. In the second
phase, the contextual-hidden state is computed by fusing the attention mechanism and the hidden state at current
time step, which leads to the effective modeling of overall interest of the user on recommendation. We
experiment our model with YooChoose DataSet and it shows efficacy in generating personalized as well as
ranked recommendations.

Keyword : Deep Learning, Context aware recommender system, sequence aware recommender system,
Gated Recurrent Unit, Recurrent Neural Networks.
References:
1. Rendle, S.; Freudenthaler, C.; and Schmidt-Thieme, L. 2010. Factorizing personalized markov chains for nextbasket recommendation.
In WWW, 811–820.
2. Chen, J.; Wang, C.; and Wang, J. 2015. A personalized interest-forgetting markov model for recommendations. In AAAI, 16–22.
3. He, R., and McAuley, J. 2016a. Fusing similarity models with markov chains for sparse sequential recommendation. In ICDM, 191 –
200.
4. Yu, F.; Liu, Q.; Wu, S.; Wang, L.; and Tan, T. 2016. A dynamic recurrent model for next basket recommendation. In SIGIR, 729–732.
5. Liu, Q.;Wu,S.;Wang,L.;andTan,T. 2016c. Predictingthe next location: A recurrent model with spatial and temporal contexts. In AAAI,
194–200.
6. Cui, Q.; Wu, S.; Liu, Q.; and Wang, L. 2016. A visual and textual recurrent neural network for sequen tial prediction. arXiv preprint
arXiv:1611.06668.
7. Hidasi, B.; Quadrana, M.; Karatzoglou, A.; and Tikk, D. 2016. Parallel recurrent neural network architectures for feature -rich session-
based recommendations. In RecSys, 241–248
8. Liu, Q.; Wu, S.; and Wang, L. 2017. Multi-behavioral sequential prediction with recurrentl og-bilinearmodel. TKDE 29(6):1254–1267.
9. Hochreiter, S., and Schmidhuber, J. 1997. Long short-term memory. Neural Computation 9(8):1735–1780
10. Cho, K.; Van Merri¨enboer, B.; Gulcehre, C.; Bahdanau, D.; Bougares, F.; Schwenk, H.; and Bengio, Y. 2014. Learning phrase
representations using rnn encoder-decoder for statistical machine translation. In EMNLP.
11. Liu, J.; Wang, G.; Hu, P.; Duan, L.-Y.; and Kot, A. C. 2017. Global context-aware attention lstm networks for 3d action recognition. In
CVPR.
12. Wang, P.; Guo, J.; Lan, Y.; Xu, J.; Wan, S.; and Cheng, X. 2015. Learning hierarchical representation model for next basket
recommendation. In SIGIR, 403–412.
13. Le,Q.,and Mikolov, T. 2014. Distributed representations of sentences and documents. In ICML, 1188–1196.
14. Rendle, S.; Freudenthaler, C.; Gantner, Z.; and SchmidtThieme, L. 2009. Bpr: Bayesian personalized ranking from implicit feed back.
In UAI, 452–461.
15. Werbos, P. J. 1990. Backpropagation through time: what it does and how to do it. Proceedings of the IEEE 78(10):1550–1560.
16. Liu, Q.; Wu, S.; Wang, D.; Li, Z.; and Wang, L. 2016b. Context-aware sequential recommendation. In ICDM, 1053–1058.
17. Mnih,A.,and Hinton, G. 2007. Three new graphica lmodels for statistical language modelling. In ICML, 641–648.
18. Bengio, Y.; Simard, P.; and Frasconi, P. 1994. Learning long-term dependencies with gradient descent is difficult. IEEE Transactions
on Neural Networks 5(2):157–166.
19. Liu,J.;Shahroudy,A.;Xu,D.;and Wang, G. 2016a. Spatiotemporal lstm with trust gates for 3d human action recognition. In ECCV, 816–
833.
20. Abdulnabi, A. H.; Shuai, B.; Winkler, S.; and Wang, G. 2017. Episodic camn: Contextual attention-based memory networks with
iterative feedback for scene labeling. In CVPR.
21. Zeng, X.; Ouyang, W.; Yan, J.; Li, H.; Xiao, T.; Wang, K.; Liu, Y.; Zhou, Y.; Yang, B.; Wang, Z.; et al. 2016. Crafting gbd -net for
object detection. arXiv preprint arXiv:1610.02579.
22. Zhai, S.; Chang, K.-h.; Zhang, R.; and Zhang, Z. M. 2016. Deepintent: Learning attentions for online advertising with recurrent neural
networks. In SIGKDD, 1295–1304.
23. Mnih, V.; Heess, N.; Graves, A.; et al. 2014. Recurrent models of visual attention. In NIPS, 2204–2212.
24. Bahdanau, D.; Cho, K.; and Bengio, Y. 2014. Neural machine translation by jointly learning to align and translate. arXiv preprint
arXiv:1409.0473.
25. Luong, M.-T.; Pham, H.; and Manning, C. D. 2015. Effective approaches to attention-based neural machine translation. arXiv preprint
arXiv:1508.04025.
26. Wang, Y.; Huang, M.; Zhu, X.; and Zhao, L. 2016. Attention-based lstm for aspect-level sentiment classification. In EMNLP, 606–615.
27. Manning, C. D.; Raghavan, P.; and Sch¨utze, H. 2008. Introduction to information retrieval. Cambridge University Press.
28. Shi, Y.; Karatzoglou, A.; Baltrunas, L.; Larson, M.; Hanjalic, A.; and Oliver, N. 2012. Tfmap: optimizing map for top-n context-aware
recommendation. In SIGIR, 155–164.
29. He, R., and McAuley, J. 2016b. Vbpr: Visual bayesian personalized ranking from implicit feedback. In AAAI, 144– 150.
30. Keivan Villatel, Elena Smirnova, Jeremie Mary, Philippe Preux. 2018. Recurrent Neural Networks for Long and Short Term Sequen tial
Recommendation. In Proceedings of ACM Conference RecSys’18, arXiv:1807.09142v1.
31. Elena Smirnova and Flavian Vasile. 2017. Contextual Sequence Modeling for Recommendation with Recurrent Neural Networks. In
Proceedings of ACM Recommender Systems conference, Como, Italy, 27th-31st August 2017 (RecSys ’17), 8 pages. DOI:
10.475/123_4.
32. Ben-Shimon, D., Tsikinovsky, A., Friedmann, M., Shapira, B., Rokach, L., & Hörle, J. (2015). RecSys Challenge 2015 and the
YOOCHOOSE Dataset. RecSys.

Authors: Tat-Hien Le, Nguyen Quoc Y, Nguyen Thi Ngọc Hoa, Nguyen Thi Hai Ha, Vu Ngoc Bich

Paper Title: Prediction of Propeller Open Water Characteristics for High Speed Boat by CFD Method
Abstract: Nowadays with the development of computational resources, calculating the open water
characteristics of the propeller using Computational Fluid Dynamics (CFD) has been used widely at the initial
design stage because of relatively accurate result, time and cost saving, in comparison with experimental
approach. This paper presents the results of computational evaluation of propeller open water characteristics for
high speed boat, based on steady RANSE flow model with rotating reference frame approach. The effects of
mesh density, mesh generation are analyzed in order to improve obtained numerical results. The well-known
Gawn propeller series, that is often used for high speed vessel is used to verify and validate the accuracy of case
649. studies. In this study, the authors use the commercial solver Star CCM+ by SIEMENS.
3701-
Keyword : Propeller, open water, RANSE, CFD, high speed boat. 3706
References:
1. Molland, A.F., S.R. Turnock, and D.A. Hudson, Ship resistance and propulsion. 2017: Cambridge university press.
2. Bertram, V., Practical ship hydrodynamics. 2011: Elsevier.
3. Perali, P., T. Lloyd, and G. Vaz. Comparison of uRANS and BEM-BEM for propeller pressure pulse prediction: E779A propeller in a
cavitation tunnel. in Proceedings of the 19th Numerical Towing Tank Symposium. 2016.
4. Brizzolara, S., D. Villa, and S. Gaggero. A systematic comparison between RANS and panel methods for propeller analysis. in Proc. Of
8th International Conference on Hydrodynamics, Nantes, France. 2008.
5. Barkmann, U., H.-J. Heinke, and L. Lübke. Potsdam Propeller Test Case (PPTC). in Proceeding of the Second International Symposium
on Marine Propulsors-smp’11. 2011.
6. Baltazar, J.M., D.R. Rijpkema, and J. Falcao De Campos. Numerical studies for verification and validation of open-water propeller RANS
computations. in Proceedings of the 6th International Conference on Computational Methods in Marine Engineering (Rome, Italy).
2015.
7. Tu, T.N., Numerical simulation of propeller open water characteristics using RANSE method. Alexandria Engineering Journal, 2019.
8. Gawn, R., Effect of pitch and blade width on propeller performance. Trans. INA, 1953. 95: p. 157.
9. Ferziger, J.H. and M. Perić, Computational methods for fluid dynamics. Vol. 3. 2002: Springer.
10. Menter, F.R., M. Kuntz, and R. Langtry, Ten years of industrial experience with the SST turbulence model. Turbulence, heat and mass
transfer, 2003. 4(1): p. 625-632.
11. CD-adapco, 2017. STAR-CCMþ User Guide.
12. Tran Ngoc Tu, N.M.C., Comparison Of Different Approaches For Calculation Of Propeller Open Water Characteristic Using RANSE
Method. Naval Engineers Journal, 2018. Volume 130, Number 1, 1 March 2018, pp. 105-111(7).
13. Gawn, R. and L. Burrill, Effect of cavitation on the performance of a series of 16" propellers.". Transactions of the Royal Institution of
Naval Architects, 1957. 99.
14. https://www.ittc.info/media/8169/75-03-03-01.pdf.
15. Wilcox, D.C., Turbulence modeling for CFD. Vol. 2. 1998: DCW industries La Canada, CA.
16. ITTC-Quality Manual 7.5-03-01-01, 2008

Authors: Y.J.Sudha Rani, M.Seetha

Paper Title: An Energy Aware Strategy for Distributed Cache Discovery with Stale Page Reduction
Abstract: With the immense growth in the field of mobile communication, a good number of complex
applications are now available for the mobile devices. The complex applications are made available to comply
with the client demand for the higher performing and higher capable applications, which can be accessible from
any locations and any devices. Thus, the application developers have attempted to make highly scaled
applications to be deployed on mobile communication devices. The larger applications have higher demand for
memory and processing capabilities. Thus, making the similar infrastructure available on the mobile computing
environments was always a challenge. Nonetheless, with the availability of distributed computing architecture,
the bottleneck for the computing capabilities for these complex applications can be handled. Nonetheless, the
memory capabilities for the applications must be addressed more sophisticated manner using distribution of the
memory and sharing of the data. Henceforth, distributed caching came under existence.A conveyed cache is an
augmentation of the customary idea of cache utilized in a solitary district. A conveyed cache may traverse
various servers with the goal that it can develop in size and in value-based limit. It is for the most part used to
store application information living in database and web session information.One of the most popular technique
for making the cache available is to perform cache discovery operations in the network. A number of parallel
research attempts are made to identify the accurate place in the network to create or build the distributed cache
network.However, the most of the parallel research attempts are criticised for considering single dimensions for
cache discovery as few of the work focuses on distance, few of the work focuses on density and some of the
works focuses on page replacement policies applicable on mobile computing environments as MANETs or
WSN. Henceforth, the demand of the research is to consider multiple parameters for cache discovery and build a
framework to automatically define the cache distribution. Hence, this work proposes a novel architecture or
framework to detect the cache distribution based on distance, stale page reduction mechanism and finally the
energy optimization. The outcome of the research is to automate the recommendation of cache discovery and
650. increase the network life time by 90% compared to the existing methods for cache discovery. In order to handle
the complex processing of the proposed algorithms, this work deploys machine learning methods to reduce the
time complexity. 3707-
3712

Keyword : Cache Management, Stale Page, MANET Caching, Distributed Cache, Cache Data Pattern
Analysis, Cache Stale Data Replacement, Energy Aware Caching.
References:
1. Kaur, G., Saini, J.: Mobility aware cache management in wireless environment. In: International Conference on Methods and Models
in Science and Technology, India, pp. 291–297 (2010)
2. Tassum, K., Syed, M., Damodaram, A.: Enhanced-location-dependent caching and replacement strategies in mobile environment. Int.
J. Comput. Sci. Issues 8(2), 160–167 (2011)
3. Lee, D., Chin, S., Min, J.: Efficient resource management and task migration in mobile grid environments. J. Commun. Comput. Inf.
Sci. 78(1), 384–393 (2010)
4. Shanmugarathinam, G., ViveKanandan, K.: Thread based cache consistency model for mobile environment. Int. J. Comput. Sci.
Commun. 2(2), 315–318 (2011)
5. Anandharaj, G., Anitha, R.: A Distributed cache management architecture for mobile computing environments. In: International
Advance Computing Conference, India, pp. 642–648 (2009)
6. Joy, P.T., Jacob, K.P.: A comparative study of cache replacement policies in wireless mobile networks. In: Proceedings of the Second
International Conference on Advances in Computing and Information Technology (ACITY) vol. 176, pp. 609–619 (2012)
7. Kottursamy, K., Raja, G., Saranya, K.: A data activity-based server-side cache replacement for mobile devices. In: Proceedings of the
International Conference on Artificial Intelligence and Evolutionary Computations in Engineering Systems, pp. 579–589 (2016)
8. Tiwari, R., Kumar, N.: An adaptive cache invalidation technique for wireless environments. Telecommun. Syst. 62(1), 149 –165
(2016)
9. Chavan, H., Sane, S.: Mobile database cache replacement policies: LRU and PPRRP. In: International Conference on Computer
Science and Information Technology, India, pp. 523–531 (2011)
10. Li, C., Wang, D., Zhang, X.: Enhanced adaptive insertion policy for shared caches. In: International Conference on Advanced Parallel
Processing Technologies, Berlin, pp. 16–30 (2011)
11. Lee, J.H., Kwon, S.J., Chung, T.S.: ERF: efficient cache eviction strategy for e-commerce applications. In: International Conference
on Mobile and Wireless Technology, pp. 295–304 (2018)
12. Chakravorty, C., Usha, J.: Cache management issues. In: Mobile Computing Environment, International Journal of Mobile Network
Communications & Telematics (IJMNCT), vol. 2, No.1, February 2012.
Authors: Ben Ghida, D.

Paper Title: Heat Recovery Ventilation for Energy-Efficient Buildings: Design, Operation and Maintenance
Abstract: Since the 1990s, many efforts have been intensified to fight global warming and energy crisis.
Considering that the building sector is responsible for about 40% of the EU energy use and 36% of CO2
emissions, many sustainable concepts have been revived from the past, a number of new innovative technologies
have been invented, and new construction standards and policies have been implemented.
Sustainable architecture offers tailor-made solutions to minimize the negative environmental impacts of
buildings without compromising its users' comfort. According to studies, humans spend about 90% of their live-
time indoors; indoor air quality has a major effect on human health. Hence, bringing fresh air into all habitable
areas without letting the warm/cool air escape has become a priority.
If properly operated and maintained, heat recovery ventilation (VHR) in energy-efficient buildings leads to an
increased filtration and removal of micropollutants, and an overall improvement of the indoor air quality, thus
generating more comfort and less health-related problems. A systematic case study in Italy is used in this
research providing evidences of the effectiveness of mechanical ventilation heat recovery systems. This paper
discusses a case with a combination of poor design, operation and maintenance to answer the questions of: what
are the concerns about potential failures that are associated with these systems; and are there any cons in the
651. technical aspects of a mechanical heat recovery ventilation system?
3713-
Keyword : Passivhaus, Energy efficiency, HVAC, Indoor air quality, Sustainable architecture. 3715

References:
1. Arundel AV, Sterling EM, Biggin JH, Sterling TD. (1986). “Indirect health effects of relative humidity in indoor environments”.
Environ Health Perspect, Vol. 65, pp. 351-361.
2. BenGhida, D. (2016). “Indoor radon mitigation in South Korea”, International Journal of Applied Engineering Research, vol. 11 , no.
15, pp. 8521-8523
3. BenGhida, D. (2017). “Concrete as a sustainable construction material”, Key Engineering Materials, Vol. 744, pp. 196-200
4. California Air Resources Board (2005). Indoor Air Pollution in California. [online] California: California Environmental Protection
Agency. Available at: https://www.arb.ca.gov/research/apr/reports/l3041.pdf [Accessed 4 Feb. 2019]
5. Del Corno, B. (2015). L’umidità in casa. Prevenzione, diagnosi, scelta dei materiali e tecniche d’intervento. Con 7 esempi progettuali.,
Maggioli Editore, Santarcangelo di Romagna.
6. EPA. (n.d.). The Inside Story: A Guide to Indoor Air Quality | US EPA. [online] Available at: https://www.epa.gov/indoor-air-quality-
iaq/inside-story-guide-indoor-air-quality [Accessed 4 Feb. 2019].
7. Juodis, E. (2006). Extracted ventilation air heat recovery efficiency as a function of a building's thermal properties. Energ y and
Buildings 38, pp. 568-573.
8. Manz, H., Huber, H., Schälin, A., Weber, A., Ferrazzini, M., Studer, M. (2000). Performance of single room ventilation units with
recuperative or regenerative heat recovery. Energy and Buildings 31, pp. 37-47.
9. Rudd, A. and Bergey, D. (2013). Ventilation System Effectiveness and Tested Indoor Air Quality Impacts. BA 1309. Springfield:
Building Science Corporation - Building America Report..

Authors: Sergey Nikitin, Aleksandr Ashcheulov, Viktor Lozhechko

Paper Title: Model of Bottom Hole Assembly with Rotary Steerable System
Abstract: This article presents a static model of bottom hole assembly (BHA) with rotary steerable
system (RSS). This model is aimed at estimation of control actions generated by RSS actuators upon drilling
path definition. The model can be also applied for estimation of BHA strength properties.

Keyword : Directional drilling, rotary steerable system, push-the-bit, research, static model, drilling mode,
soil strength.
References:
1. A.S. Klimov, “Povyshenie effektivnosti bureniya naklonno-napravlennykh i gorizontal'nykh skvazhin” [Improvement of drilling
efficiency of inclined and horizontal wells] IRNTU, Collections of research papers, 2015, p. 27.
2. S.B. Suslick, D.J. Schiozer, “Risk analysis to petroleum exploration and production: an overview”, Journal of petroleum science and
engineering, 44(2), 2004, pp. 1–9.
652. 3. S. Laik, “Recent trends in exploration, exploitation and processing of petroleum resources”. Tata McGraw-Hill Publishing Company
Limited, 2009.
4. A. Calderoni, J. Oppelt, A. Ligrone, A. Trampini, S. Gauld, “Automated steering systems applied to complex horizontal well in South 3716-
Italy”. Proceedings: European Geothermal Conference Basel '99, 2, 1999. 3722
5. Novye rekordy bureniya i mnogostvol'nogo zakanchivaniya v Zapadnoi Sibiri. Part 2. Available: https://rogtecmagazine.com/wp-
content/uploads/2016/09/01-New-Achievements-in-Multilateral-Drilling-and-Completions-in-Western-Siberia-Part-2.pdf
6. I.A. Shevchenko, “Razvitie tekhnologii upravlyaemogo rotornogo bureniya pri stroitel'stve skvazhin s subgorizontal'nym profilem”
[Development of rotary steering upon construction of wells with subhorizontal profile]. Proceedings: Engineering sciences in Russia
and abroad. 3rd International conference. Moscow: Buki-Vedi, 2014, pp. 112-114.
7. Rotary steerable drilling: faster, smoother wellbores, Drilling contractor, 2002, pp. 30-31.
8. RSS ready to open new world of drilling, Drilling contractor, 2006, pp. 12-16.
9. T.O. Akbulatov, L.M. Levinson, R.A. Khasanov, “Opredelenie raschetnogo radiusa iskrivleniya pri rabote rotornykh uprav lyaemykh
system” [Definition of predicted curve radius upon operation of rotary steering systems], Neftegazovoe delo, 6(2), 2008, pp. 29–32.
10. W. Yan, Y. Peng, S. Zhang, H. Wu, “Research on rotary steerable drilling system”, Metallurgical and mining industry , 2, 2016, pp.
144-148.
11. M. Elshafei, M. Khaim, A. Al-Majed, “Optimization of rotary steerable drilling”. Proceedings: 2nd International Conference of
Control, Dynamic Systems, and Robotics Ottawa, Ontario, Canada, May 7 – 8, 2015 , Paper No. 167
12. X. Guang, J. Li, “Research on application of steering drilling technologies in shale gas development”, Geological Engineering Drilling
Technology Conference (IGEDTC), New International Convention Exposition Center Chengdu Century City, 23-25 May 2014, pp 270
– 275.
13. W. Wang, Y. Geng, N. Wang, X. Pu, J.O. Fiaux, “Toolface control method for a dynamic point-the-bit rotary steerable drilling
system”, Energies, 2019.
14. C. Zhang, W. Zou, N. Cheng, “Overview of rotary steerable system and its control methods”, Proceedings: International Conference on
Mechatronics and Automation, August 7 - 10, Harbin, China, pp. 1559 - 1565
15. K.V. Frolov, “Mechanical Engineering”: Encyclopedia. Mining Machinery, IV-24, 2011.

Authors: Elena Alexsandrovna Nikitina, Irina Vyacheslavovna Shchetinina

Paper Title: Assessment of the IT Business Competitiveness


Abstract: The most modern, the so-called new information technology (IT) holds a special place among
the applied technologies. The existing information technology can be formally divided into two large
interconnected classes: program mathematical tools for informatization meant for designing the modern
information technology and applied information technology that provides decision-making and support.
Keyword : assessment, competitiveness, business, IT products.
References:
1. I.A. Kiseleva, I.S. Lebedeva, M.S. Gasparian, M.V. Karmanov, V.I. Kuznetsov, “Modeling the Activities of Internet Companies by
Using Innovative Processes”, International Journal of Innovative Technology and Exploring Engineering, 8(11), 2019, pp. 2506-2514.
2. S.I. Dolgov, Yu.A. Savinov, E.V. Taranovskaya, V.D. Sekerin, A.E. Gorokhova, “Developing the Exports of Russian Goods and
Services through Online Stores”, International Journal of Innovative Technology and Exploring Engineering, 8(5), 2019, pp. 981-986.
3. S.S. Nosova, G.V. Kolodnyaya, S.A. Bondarev, S.A. Verigo, A.B. Kudryashov, “Digital Business as a Driver of Economic Growth i n
Russia”, Espacios, 40(24), 2019, pp. 19.
4. Y.Y. Kail, A.V. Shokhnekh, M.V. Samsonova, R.M. Lamzin, Y.Y. Elsukova, “Prospects of GR Management Development in the
context of forming a digital economy”, Espacios, 40(22), 2019, pp. 30.
5. N. Khamitkhan, E. Bakhyt, A. Karshalova, “Developing Internet Banking within the Context of Building A Bank’s Competitive
Advantage”, Journal of Advanced Research in Law and Economics, 9(4), 2018, pp. 1286-1291.
6. A.A. Rudychev, S.P. Gavrilovskaya, E.A. Nikitina, “Teoreticheskiye aspekty prognozirovaniya v sisteme otsenki
konkurentosposobnosti predpriyatiya” [Theoretical aspects of forecasting in the system of assessing the enterprise competitiv eness].
Success in modern science and education, 6(2), 2016, pp. 41-44.
7. Yu.I. Seliverstov, E.A. Nikitina, S.P. Gavrilovskaya, D.V. Kadatskaya, “Polycentric model of development of partner relations as an
653. instrument of development of the Russian Federation's regions”. International Journal of Engineering and Technology, 7(4.38), 2018,
pp. 228-230. 3723-
8. E.A. Nikitina, P.Yu. Novomlinsky, “Vliyaniye intellektualnogo marketingovogo kapitala na uroven konkurentosposobnosti
3729
promyshlennogo predpriyatiya” [Influence of intellectual marketing capital on the competitiveness of an industrial enterprise]. Success
in modern science and education, 4(7), 2017, pp. 68-71.
9. I.V. Shchetinina, “Kompleksnaya programma povysheniya konkurentosposobnosti produktsii promyshlennogo predpriyatiya”
[Comprehensive program to increase the competitiveness of industrial enterprise products]. Bulletin of the Samara State Technical
University, 4(14), 2014, pp. 89 – 94.
10. I.V. Shchetinina, “Metodika analiza konkurentosposobnosti produktsii promyshlennogo predpriyatiya” [Method for analyzing the
competitiveness of industrial enterprise products]. Bulletin of the Voronezh State Technical University, 10(2), 2014, pp. 84 – 89.
11. E.A. Nikitina, “Correlation of the competitiveness of the enterprise and competitiveness goods”, Bulletin of BSTU, 4, 2013, p p. 125 –
129.
12. V.V. Belousov, “Management of competitiveness of the industrial enterprise”, Izvestia of the Russian state pedagogical university
named after A.I. Herzen, 85, 2008, pp. 321-323.
13. B. Nogalski, P. Valentinovich, “Application of new concepts of management at the industrial enterprises of Poland”, Russian
management journal, 3(3), 2005, pp. 149-156.
14. E.A. Nikitina, “Economic maintenance of competitiveness of the enterprise”, 3rd Intenational Conference "Law, Economy and
Management in Modern Ambiance", Serbia, Belgrad, 2013, pp. 745-752.
15. R.S. Russell, B.W. Taylor, “Operations Management: Quality and Competitiveness in a Global Environment”. Wiley, 2005, p. 832.
16. D.P. Bertsekas, “Dynamic Programming and Optimal Control”, Athena Scientific, 2007, p. 1270.
17. C. Roberts, “Dynamic programming processes in chemical technology and management methods”, Moscow: Mir, 1965, p. 480.
18. M.E. Porter, “Competitive Advantage”, The Free Press, 1998, p. 580.
19. V.P. Feldman, D.B. Audretsch, “Innovation in Cities: Science based Diversity”, Specialization and Localized Competition -European
Economic Review, 43, 1999, pp. 409.
20. G.E. Adygezalova, R.M. Allalyev, A.V. Kiseleva, N.A. Grigorieva, “Copyright Violation and Distribution of Prohibited Content on the
Internet: Analysis of Legal Arrangements in the Legislation of the Russian Federation”, Journal of Advanced Research in Law and
Economics, 9(1), 2018, pp. 6-14.

Authors: Ludmila Mikhailovna Kalyanova


Motivation Research and Development of Educational and Cognitive Activity of Technical
Paper Title:
University Students
Abstract: The article is devoted to the problem of the motivation development of educational and
cognitive activity of technical high school students. The article presents the results of the research on the
motivation development of educational and cognitive activity of students of the direction 21.03.01 “Petroleum
Engineering” of the Surgut Institute of oil and gas (a branch of the Industrial University of Tyumen in Surgut).
As a result of the research, a method of stimulating the development of motivation of educational and cognitive
activity of students was proposed, based on the combined use of interactive teaching methods with various
654. pedagogical techniques. The article also discusses the characteristics of the students’ motives of their
educational activities, as they directly affect the quality of professional training, the formation of the 3730-
professional personality. 3734

Keyword : motivation, educational and cognitive activity, practice-oriented tasks, interactive teaching
methods.
References:
1. E.P. Il’in, “Motivation and motives”. Saint Petersburg: Peter, 2002, p. 512.
2. T.I. Il’ina, “Methods of studying the motivation of learning in high school” [Questionnaire of studying the motivation of lea rning in
high School]. Available: www.eztests.xyz/tests/personality_ilyina/
3. D.A. Novikov, “Statistical methods in pedagogical research (typical cases)”. Moscow: MZ-Press, 2004, p. 67.
4. O.A. Tomashevskaya, “Formation of cognitive motivation of students”. Pedagogy: traditions and innovations: In the Proceedings of the
IV International Scientific Conference. Chelyabinsk: Two Komsomol members, 2013, pp. 169-171.
5. P.K. Durkin, M.P. Lebedeva, “To the problem of studying the motivational and need sphere of schoolchildren”. Arkhangelsk state
technical University, 2007, pp. 112.
6. A.K. Markova, “Psychology of professionalism”. Moscow: International humanitarian fund “Znanie”, 1996, pp. 308.
7. V.G. Leont’ev, “Psychological mechanisms of motivation”. Novosibirsk, 1992, p. 178.
8. R.S. Nemov, “General psychology”. Moscow: VLADOS, 2003, p. 400.
9. A.A. Orlov, “Introduction to professional activity: Practical methods on pedagogy”. Moscow, 2003, p. 96.
10. Yu.G. Odegov, G.G. Rudenko, S.N. Apenko, A.I. Merko, “Staff motivation”: Tutorial. Practical tasks. Moscow: Publishing House
“Alpha-Press”, 2010, p. 640.
11. E.M. Kargina, “Motivation of education at the University”. Modern scientific researches and innovations, 6, 2014. Available:
www.web.snauka.ru/issues/2014/06/35558
12. E.M. Kargina, “Formation of professional motivation of future specialists (on the example of the Association of “University
educational complex”)”. Penza, 2004.
13. R.V. Gabdreev, A.V. Smirnov, “Formation of motivation of educational and cognitive activity of University students”, Educatio n and
self-development. 10, 2008, pp. 227-233.
14. A.V. Smirnov, “Increase of motivation of educational activity to disciplines of natural science and mathematical cycle”, Theory and
practice of measurement of latent variables in education. Slavyansk-on-Kuban: PC SGPI, 2007, pp. 235-237.
15. A.V. Smirnov, I.V. Valiakhmetova, “Modern aspects of motivation of educational activity of University students”, Actual questions of
psychology and pedagogy. Novosibirsk: CRNS, 2009, pp. 81-95.
16. A.V. Smirnov, R.V. Gabdreev, I.V. Valiakhmetova, “Dialogue culture and motivation of educational activity of University stude nts”,
Tolerance in Russia: history and modernity. Moscow: PLC “Globus”, 2008, pp. 201-207.
17. A.V. Smirnov, I.V. Semenova, R.V. Gabdreev, “Motives of educational activity of students”, Scientific and educational potential of
youth in the system of professional education as the main resource of the nation. Kazan: RPC “Shkola”, 2007, pp. 164-167.

Authors: S. Sinutin, S. Lebedev, E. Sinutin

Paper Title: Vibration Bearing Diagnostic System Machine Learning


Abstract: The article shows the possibility of using a mathematical model of a bearing with various types of
defects for machine learning of the vibration diagnostic system. A plane geometric model of a radial bearing
with two degree of freedom is considered in detail, a system of differential equations describing the nature of the
motion of moving masses in the mechanical bearing system is presented. A formula is obtained for calculating
the total kinematic disturbance, the calculation of which is associated with significant computational costs. The
article proposes an alternative calculation method, namely, modeling the profile of kinematic disturbances in the
time domain, which will minimize computational costs. The adequacy of the proposed method is confirmed by
calculations in Matlab and comparison with experimental data.
The development of equipment maintenance systems for the actual technical condition is relevant as in the case
of operation of facilities of increased danger Gerike, and in the case of the operation of expensive equipment
Pisarev and Vaganov, where the diagnosis with disassembling the machine leads to large financial losses.
Diagnostics of equipment by vibration parameters allows fixing defects in the early stages during normal
operation without the need to disassemble the units and take them out of service.

Keyword : Acceleration spectrum, bearing, machine learning, neural network, rolling element defects,
vibration velocity.
References:
1. P.B. Gerike. “Monitoring the technical condition of drilling rigs of the DML series by parameters of mechanical vibrations”, Vestnik
nauchnogo tsentra po bezopasnosti rabot v ugol’noj promyshlennosti, 1, 2014p. 28-31.
655. 2. V.I. Pisarev, A.A. Vaganov, A.F. Denisenko, and I.O. Tyuterev. “Maintenance and repair the metalworking tools with CNC of the
basis of CIP diagnostics of the technical condition”, Izvestija Samarskogo nauchnogo tsentra Rossijskoj akademii nauk, 16(1 -2), 2014, 3735-
pp. 508-513. 3741
3. S.V. Rozhkov, G.V. Shadskiy, and V.G. Shadskiy. “Use of neural network apparatus to analyze vibration characteristics spindle
assemblies for machine tools”, Izvestija Tul’skogo gosudarstvennogo universiteta. Tekhnicheskije nauki, 8(2), 2017, pp. 271 -275.
4. S. V. Korobkova. “Problems of efficient approximation of multidimensional functions using neural networks”, Izvestija Yuzhnogo
federal’nogo universiteta. Tekhnicheskije nauki, 58(3), 2006, pp. 121-127.
5. M.B. Rahmoune, A. Hafaifa, and M. Guemana. “Fault Diagnosis in Gas Turbine Based on Neural Networks: Vibrations Speed
Application”, in Applied condition monitoring, 5, T. Fakhfakh, F. Chaari, M. Abdennadher, M. Abbes, and M. Haddar (Eds.). Cham:
Springer International Publishing Switzerland, 2017, pp 1-11. DOI: 10.1007/978-3-319-41459-1_1
6. Z. Chen, X. Chen, C. Li, R.V. Sanchez, and H. Qin. “Vibration-based gearbox fault diagnosis using deep neural networks”, Journal of
Vibroengineering, 19(4), 2017, pp 2475-2496. DOI: 10.21595/jve.2016.17267
7. P. Chopra. “Making Your Neural Network Say “I don’t know” - Bayesian NNs using Pyro and PyTorch”, Towards Data Science,
2018. Retrieved from: https://towardsdatascience.com/making-your-neural-network-say-i-dont-know-bayesian-nns-using-pyro-and-
pytorch-b1c24e6ab8cd (access date: 12.10.2019).
8. E.S. Gasparov. Providing dynamic quality of high-speed spindle units based on modeling and in-place assessment of the condition of
the supports. PhD thesis Abstract, Samara, 2016. 173 p.
9. E.S. Gasparov. “Spindle assembly support model on rolling bearings,” Vestnik Samarskogo gosudarstvennogo tekhnicheskogo
universiteta. Tekhnicheskije nauki, 4(40), 2013, p. 98-105.
10. V.F. Zhuravlev, V.B. Balmont. Gyroscope Ball Bearing Mechanics. Moscow: Mashinostrojenije, 1986. 272 p.
11. A.-E.Yu. Witkut. “Transfer function between the geometry of manufacturing precision ball bearings and a variable moment of
resistance”, Vibrotekhnika, 3(8), 1969, pp. 85-90.
12. M.K. Leontiev. “Nonlinear models of rolling bearings in rotor dynamics”, Vestnik Moskovskogo aviatsionnogo instituta, 19(2), 2012,
pp. 134-145.
13. M.K. Leontiev, V.A. Karasev, O.Yu. Potapova, and S.A. Degtyarev. “The dynamics of the rotor in rolling bearings”, Vibraysija
mashin: izmerenije, snizhenije, zashchita, 4(7), 2006, pp. 40-45.
14. A.S. Kelson, Yu.N. Zhuravlev, and N.V. Yanvarev. Calculation and design of rotary machines. Leningrad: Mashino stroenije, 1977.
288 p.
15. M.A. Galakhov, A.N. Burmistrov. Calculation of bearing units. Moscow: Mashinostroenije, 1988. 336 p.
16. R.D. Beiselman. Rolling bearings: Ref. 6th ed. Moscow: Mashinostroenije, 1975. 574 p.
17. O.V. Cheremisina, T.E. Litvinova, and D.S Lutskiy. “Separation of samarium, europium and erbium by oleic acisolution at
stoichiometric rate of extractant”, Innovation-Based Development of the Mineral Resources Sector: Challenges and Prospects, 11th
conference of the Russian-German Raw Materials, 2018, pp. 413-419.
18. D. Lutskiy, T. Litvinova, I. Oleijnik, and I. Fialkovskiy. “Effect of anion composition on the extraction of cerium (Iii) and yttrium (Iii)
by oleic acid”, ARPN Journal of Engineering and Applied Sciences, 13(9), 2018, pp. 3152-3161.
19. N.V. Dzhevaga, and O.L. Lobacheva. “Separation of the rare-earth elements (REE) by flotation approaches”, The International
Multidisciplinary Scientific GeoConference Surveying Geology and Mining Ecology Management,SGEM 2018, 18(5.1), 2018, pp. 801-
808.
20. O. Lobacheva, and N. Dzhevaga. “Rare earth elements recovery on the exampleof europium (III) from lean technogenic raw
materials”, Journal of Ecological Engineering, 18(6), 2017, pp. 122-126.
21. O.L. Lobacheva, I.V. Berlinskii, and N.V. Dzhevaga. “Thermodynamics of complexation in an aqueous solution of Tb(lll) nitrate at
298 K”, Russian Journal of Physical Chemistry A, 91(1),2017, pp. 67-69.
22. D.A. Ilyukhin, S.A. Ivanik, and A.S. Pevnev. Justification of method of continuous measurements of position of sides of surface mine.
IOP Conf. Series: Journal of Physics: Conf. Series 1118 (2018) 012017. DOI: 10.1088/1742-6596/1118/1/012017
23. N.P. Senchina, E. Ermolin, and O. Ingerov. “Integration of ground audio-magnetotelluric (AMT) and airborne magnetic surveys for
exploration of gold-bearing quartz veins”, GEOBAIKAL 2014 - 3rd International Geobaikal Conference 2014: Exploration and Field
Development in East Siberia.
24. R.K. Nadirov, L.I. Syzdykova, and A.K. Zhussupova. “Electrochemical recovery of gold from concentrate by using sulfur-graphite
electrode as the leaching agent source”, Journal of Chemical Technology and Metallurgy, 53(3), 2018, pp. 556-563
25. O.F. Putikov, and N.P. Senchina. “Precise Solution of the System of Nonlinear Differential Equations in Partial Derivatives of the
Theory of Geoelectrochemical Methods”, Doklady Akademii Nauk (Doklady Earth Sciences), 2(463), 2015, pp. 726-727.
26. K.R. Nadirov, L.I. Syzdykova, and A.K. Zhussupova, “Copper smelter slag treatment by ammonia solution: leaching process
optimization”, Journal of Central South University, 24, 2017, pp. 2799-2804.

Authors: A. Praveen Kumar, L. Ponraj Sankar, D. Maneiah, M. Naveen

Paper Title: Axial Impact Crushing Performance of Bi-tubular Structures with Stiffeners
Abstract: Thin-walled tube shaped components have been expansively utilized as an impact energy
dissipating devices in modern vehicles in order to decrease fatalities and vehicle damage during accidents. The
present article investigates the axial crushing performance of bi-tubular structures of various configurations.
Nonlinear impact simulations were performed on the proposed bi-tubular structure using finite element
ABAQUS/CAE explicit code. From the outcomes attained, the Energy Absorption Capability (EAC) of bi-
tubular structures with stiffeners were compared and it confirmed that bi-tubular structures have more potential
than that of traditional simple geometry tubes. Furthermore, bi-tubular structure of circle section enclosed with
square type section were recommended as significant one for superior EAC. This kind of bi-tubular structures
was found to be proficient energy absorbing elements in vehicles to improve the crashworthiness performance.

Keyword : Bitubular structures, Simulation, crashworthiness, crash box, Axial impact.


References:
1. Fu, J., Liu, Q., Liufu, K., Deng, Y., Fang, J., & Li, Q. (2019). Design of bionic-bamboo thin-walled structures for energy absorption.
Thin-Walled Structures, 135, 400-413.
656. 2. Altin, M., Kılınçkaya, U, Acar, E., & Guler, M. A. (2019). Investigation of combined effects of cross section, taper angle an d cell
structure on crashworthiness of multi-cell thin-walled tubes. International Journal of Crashworthiness, 24(2), 121-136. 3742-
3. A. Praveen Kumar, S. Shrivaathsav, (2019). Influence of forming parameters on the crash performance of capped cylindrical tub es 3746
using LS‑DYNA follow‑on simulations. International Journal on Interactive Design and Manufacturing, 13(3): pp. 1215–1232.
4. Tai, Y. S., Huang, M. Y., & Hu, H. T. (2010). Axial compression and energy absorption characteristics of high -strength thin-walled
cylinders under impact load. Theoretical and applied fracture mechanics, 53(1), 1-8.
5. A. Praveen Kumar (2019). Influence of plain end-cap on the energy absorption characteristics of cylindrical tubular structures for
lateral impact vehicle collisions. Thin-Walled Structures, 138 (C), pp. 32-45.
6. Nia, A. A., & Hamedani, J. H. (2010). Comparative analysis of energy absorption and deformations of thin walled tubes with various
section geometries. Thin-Walled Structures, 48(12), 946-954.
7. Sun, G., Xu, F., Li, G., & Li, Q. (2014). Crashing analysis and multiobjective optimization for thin-walled structures with functionally
graded thickness. International Journal of Impact Engineering, 64, 62-74.
8. Bischoff, M., Ramm, E., & Irslinger, J. (2018). Models and finite elements for thin‐walled structures. Encyclopedia of Computational
Mechanics Second Edition, 1-86.
9. Wang, J., Zhang (2018). Crashworthiness behavior of Koch fractal structures. Materials & Design, 144, 229-244.
10. Dang, X. B. & Zhang, W. H. (2019). Efficient prediction of varying dynamic characteristics in thin-wall milling using freedom and
mode reduction methods. International Journal of Mechanical Sciences, 150, 202-216.
11. Tang, Z., Liu, S., & Zhang, Z. (2013). Analysis of energy absorption characteristics of cylindrical multi-cell columns. Thin-Walled
Structures, 62, 75-84.
12. Ahmed, N., et al. (2017). Investigation of the energy absorption characteristics of metallic tubes with curvy stiffeners under dynamic
axial crushing. Latin American Journal of Solids and Structures, 14(8), 1443-1463.
13. Tran, T., Le, D., & Baroutaji, A. (2019). Theoretical and numerical crush analysis of multi-stage nested aluminium alloy tubular
structures under axial impact loading. Engineering Structures, 182, 39-50.

Authors: N.chiboub, M.Tridane, S.Belaaouad

Paper Title: The Importance of Teacher Cooperation in the Process of School Guidance for High School Students
Abstract: The purpose of this article is to examine the importance of involvement teachers in the school
657. orientation process and its effectiveness in the way high school students choose their educational path.
Interviews and a survey were conducted with 74 teachers of different seniority selected from five public high
3747-
schools in three regional directorates, in the 2018/2019 academic year, Casablanca-Settat region. This study
3751
shows from a deep analysis, that the coordination and cooperation with teachers and students in the process of
school orientation were very low or null.
In this study, scientific research and my experience have shown that the attainment of the desired objectives
of high school students' educational guidance can only be achieved through coordination and cooperation
between the various actors in the school guidance process. Teacher’s role is very essential since they are the
closest to the student and the process of the student's educational orientation must be one of his main and
fundamental tasks.
It is concluded that public schools with the integration of teachers in the student's educational guidance have
more success in the school path, as the participation of teachers in the guidance of their students, improves the
process and increases its effectiveness.
Our study has allowed us to detect very important results and information on the teacher’s role who must be an
advisor in his school and must be a requirement of the process of academic guidance of high school students that
we will present and discuss.

Keyword : teacher integration, school guidance, high school student, teacher advisor, school path
References:
1. Procedia - Social and Behavioral Sciences, Volume 116, 21 February 2014,Pages 2757-2759 Fergül Kılıç, Oya Ramazan (1)
2. (Fontana David, 2001, pq5q)(2)
3. Caroff, A., et Simon, J. (1988) L’orientation des élèves. Problèmes généraux. Rôle des structures et des acteurs de l’orientation, rapport
conjoint IGEN et IGAEN, M.E.N.R.S., doc. Mult. La documentation française.
4. Périer P. (1998) Les conceptions des enseignants des collèges et lycées en matière d'évaluation et d'orientation des élèves. Carrefours
de I' éducation, no 6, juillet. Académie d’Amines.
5. Procedia - Social and Behavioral Sciences, Volume 209, 3 December 2015, Pages 439-446
6. Procedia - Social and Behavioral Sciences,Volume 182, 13 May 2015, Pages 381-387
7. L'orientation scolaire (Piéron, 1979, p.315)
8. Ali Boulahcen, « Le processus d’orientation scolaire au Maroc », Revue internationale d’éducation de Sèvres, 38 | 2005, 25-34.
9. Jean Guichard, « Proposition d’un schéma d’entretien constructiviste de conseil en orientation (life designing counseling) pour des
adolescents ou de jeunes adultes », L'orientation scolaire et professionnelle, 37/3 | 2008, 413-440.
10. J. Guichard et M. Huteau, L’Orientation scolaire et professionnelle, Paris, Dunod, 2005.
11. C. Chassagne, Éducation à l’orientation, Paris, Magnard (Chemins de formation), P. 18 1998.
12. B. Stevanovic, « L'orientation scolaire », Le Télémaque 2008/2 (n° 34), p. 9-22. 2008
13. Guichard et M. Huteau, La psychologie de l’orientation
14. https://www.sencampus.com/l-orientation-cle-de-la-reussite-au-senegal/
15. http://almohandiss.com/index.php/actualites/enseignement/lorientation-cle-de-la-reussite-scolaire-au-maroc.

Authors: Bennet Praba, Arila Vamsi Krishna, Hari Prasad, Sai Nithish

Paper Title: Secure User Authentication using Captcha as Passwords based on Graphical Methods
Abstract: An alternative to traditional text-based password is being proposed. This aims to enhance the
safety and security of the current system by adding a layer of additional security, the proposed system uses
FIDO (Fast Identity Online) which unlike password catalogue, stores personally recognizing information data
locally on the handler's device to defend it. FIDO's personal identification and local storing of biometric is an
intended way to ease user apprehensions about personal data. Image-captchas have lately developed into a very
prevalent and extensively organized crossways throughout the online networks to guard from the offensive
things. Still, the developing competence in the system field has steadily weakened the safety of Image-captcha
and has exposed them to attacks. Built on our valuation, we roughly recognize the defects in these methods of
prominent structures, laterally with the perfect performance and plan. Ideologies for more secure captchas are
formed from our findings which lean-to light on the considerate of measure and impact, for captcha solving.

Keyword : FIDO (Fast Identity Online), databases, personal identification.


658. References:
1. Research on Integrated Authentication Using Password less Authentication Method [2017 IEEE] 3752-
2. Towards Understanding the Security of Modern Image Captchas and Underground Captcha-Solving Services [DOI: 3756
10.26599/BDMA.2019.9020001, June 2019]
3. PassBYOP: Bring Your Own Picture for Securing Graphical Passwords [IEEE TRANSACTIONS ON HUMAN-MACHINE
SYSTEM]
4. Captcha as Graphical Passwords— A New Security Primitive Based on Hard AI Problems [IEEE TRANSACTIONS ON
INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 6, JUNE 2014]
5. cloud.tencent.com
6. A Shoulder-Surfing Resistant Graphical Authentication Method [2018 IEEE]
7. Personal Images as My Graphical Password IEEE LATIN AMERICA TRANSACTIONS, VOL. 16, NO. 5, MAY 2018
8. A Personalized User Authentication Approach Based on Individual Differences in Information Processing, Interacting with Computers
Advance Access published September 6, 2014
9. Towards Understanding the Security of Modern Image Captchas and Underground Captcha-Solving Services ,BIG DATA MINING
AND ANALYTICS ISSN222096-0654 05/05 pp118–144 Volume 2, Number 2, June 2019 DOI:
10.26599/BDMA.2019.9020001
10. SECURE DATA ACCESS THROUGH ELECTRONIC DEVICES USING ARTIFICIAL INTELLIGENCE Proceedings of the
International Conference on Communication and Electronics Systems (ICCES 2018)
11. https://fidoalliance.org/how-fido-works/
12. Even or Odd: A Simple Graphical Authentication System IEEE LATIN AMERICA TRANSACTIONS, VOL. 13, NO.3, MARCH
2015.

Authors: Nileema Pathak, Suryakant Patil, Preeti Patil

659. Paper Title: Anomaly Detection in Engineering Structures Using WSN and Machine Learning
Abstract: Wireless Sensor Networks are widely used for data acquisition in wide areas of applications 3757-
like Health care, agriculture, surveillance etc. MEMs technology enables development of highly efficient, 3760
minute sensors. One of such applications of Wireless Sensor Networks (WSN) is monitoring the engineering
structures, for damage detection and characterization. WSN technology is used for detecting the level of damage
in huge bridge structures in metros and cities. Various technologies like wi-fi, zigbee, Bluetooth etc are used in
the existing system for communication between nodes of the WSN. A novel method using RF technology for
WSN is proposed that enables the coverage of a large area and higher data transfer speed.
Novel methods of data analysis using machine learning also needs to be explored, to generate incites to the huge
amount of data generated by sensors. Localization or finding the exact location of the problem area in the sensor
network is a tedious task and can be handled well by using machine learning algorithms.

Keyword : WSN, sensor nodes, RF technology, Machine Learning


References:
1. Abid Rahim, Zeeshan Ali, Raushan Bharti & Syed Sabeel N.S.P and Mrs. Ramya B.K., “Design and Implementation of a Low Cost
Wireless Sensor Network using Arduino and nRF24L01(+)”, IJSRET May 2016
2. Mohammad Abu Alsheikh, Shaowei Lin, Dusit Niyato and Hwee-Pink Tan arXiv, “Machine Learning in Wireless Sensor Networks:
Algorithms, Strategies, and Applications” 19 March 2015.
3. Jin-Lian Lee, Yaw-Yauan Tyan, Ming-Hui Wen, Yun-Wu Wu "Development of an IoT-based Bridge Safety Monitoring System"
Proceedings of the 2017 IEEE International Conference on Applied System Innovation IEEE-ICASI 2017
4. Ki-Seong Lee, Sun-Ro Lee, Youngmin Kim and Chan-Gun Lee, “Deep learning–based real-time query processing for wireless sensor
network” International Journal of Distributed Sensor Networks 2017, Vol. 13(5).
5. Haitao Xiao, Yixuan Gong, Harutoshi Ogai, Jie Zhang, Xiaohong Zou, Takenari Otawa, Takunori Tsuji” ]”A Data Collection System
in Wireless Network Integrated WSN and ZIGBEE for Bridge Health Diagnosis”, SICE Annual Conference 2011.
6. Syed Humair Ali, Muhammad Zaid, Murad Abdullah, Dr. Tariq Mairaj Rasool Khan “SHM of Concrete Bridge Structures using
Wireless Sensor Networks” Smart SysTech 2018 Â June 12 – 13, 2018 in Dresden, Germany.M. Young, The Techincal Writers
Handbook. Mill Valley, CA: University Science, 1989.
7. Seno Adi Putra, Bambang Riyanto Trilaksono, Senior Member IEEE, Muhammad Riyansyah, Dina Shona Laila, Senior Member IEEE,
Agung Harsoyo, Achmad Imam Kistijantoro, ”Intelligent Sensing in Multiagent-based Wireless Sensor Network for Bridge Condition
Monitoring System” IEEE Internet of Things Journal 2019.

Authors: Swapnil V. Vanmore, Sangeeta R. Chougule


Estimation of Level of Liver Damage Due to Cancer using Deep Convolutional Neural Network in
Paper Title:
CT images
Abstract: The lesion size estimation is essential need while diagnosing the liver cancer and treatment
scenario. The lesion segmentation suing conventional methods such as region growing, threshold based
segmentation provide limited performance due to variations in light intensity distribution throughout the image.
The deep learning approach used in this paper consist of input dataset of liver abdominal images along with
labelled set combination of variety of liver regions and lesion structures. The care has been taken while
constructing the dataset such that, the lesion due to cancer in liver of particular image should have at least one
matching structure should be present in one of the labelled images. The 3 fold validation is done to evaluate the
performance in which total 140 images of liver cancer are used for training, 30 images for validation and 30
images for testing. The result shows 98.5% accuracy for lesion classification. The area of lesion is compared to
total area of liver in terms of pixels to estimate the total area occupied by the lesion and amount of liver damage.

Keyword : Liver cancer, medical image segmentation, neural network, lesion segmentation, deep learning.
References:
1. World Health Organization. http://www.who.int/mediacentre/factsheets/fs297/en/
2. Deng, X. and Du, G. (2008) 3D Liver Tumor Segmentation Challenge 2008. MICCAI Workshop.
660. 3. Hame, Y. (2008) Liver Tumor Segmentation Using Implicit Surface Evolution. Proceedings of the MICCAI Workshop on 3D
Segmentation in the Clinic: A Grand Challenge II 2008. 3761-
4. Massoptier, L. and Casciaro, S. (2008) A New Fully Automatic and Robust Algorithm for Fast Segmentation of Liver Tissue. 3764
Proceedings of the MICCAI Workshop on 3D Segmentation in the Clinic: A Grand Challenge II 2008.
5. Shimizu, A., Narihira, T., Furukawa, D., Kobatake, H., Nawano, S. and Shinozai, K. (2008) Ensemble Segmentation Using Adaboos t
with Application to Liver Lesion Extraction from A CT Volume. Proceedings of the MICCAI Workshop on 3D Segmentation in the
Clinic: A Grand Challenge II 2008.
6. Zhou, J., Xiong, W., Tian, Q., Tian, Q., Qi, Y., Liu, J., Leow, W., Han, T., Venkatesh, S.K. and Wang, S. (2008) Semi-Automatic
Segmentation of 3D Liver Tumors from CT Scans Using Voxel Classification and Propagational Learning. Proceedings of the
MICCAI Workshop on 3D Segmentation in the Clinic: A Grand Challenge II 2008.
7. Tustison, N.J., Shrinidhi, K.L., Wintermark, M., Durst, C.R., Kandel, B.M., Gee, J.C., et al. (2015) Optimal Symmetric Multim odal
Templates and Concatenated Random Forests for Supervised Brain Tumor Segmentation (Simplified) with ANTsR. Neuroinformatics,
13, 209-225.
8. Ciresan, D.C., Giusti, A., Gambardella, L.M. and Schmidhuber, J. (2013) Mitosis Detection in Breast Cancer Histology Images w ith
Deep Neural Networks. MICCAI 2013, LNCS 8150, 411-418.
9. Krizhevsky, A., Sutskever, I. and Hinton, G. (2012) Image Net Classification with Deep Convolutional Neural Networks. Advance s in
Neural Information Processing Systems, 1097-1105.
10. Prasoon, A., Petersen, K., Igel, C., Lauze, F., Dam, E. and Nielsen, M. (2013) Deep Feature Learning for Knee Cartilage Segmentation
Using a Triplanar Convolutional Neural Network. MICCAI 2013, LNCS 8150, 246-253.
11. LeCun, Y., Bottou, L., Bengio, Y. and Haffner, P. (1998) Gradient-Based Learning Applied to Document Recognition. Proceedings of
the IEEE, 86, 2278-2324.
12. Theano. http://www.deeplearning.net/software/theano/
13. Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., et al. (2011) Scikit-Learn: Machine Learning in
Python. Journal of Machine Learning Research, 12, 2825-2830.

661. Authors: Safarov J.E., Sultanova Sh.A., Dadayev G.T., Samandarov D. I.


Paper Title: Method for Drying Fruits of Rose Hips
Abstract: The article discusses a new vacuum infrared equipment for drying fruits of rose hips with
preservation of ascorbic acid. We have studied the drying process of rose hips in various ways (solar, convective
and vacuum IR drying), to determine the rational version of the drying process to check the preservation of the
vitamin composition of the fruit, mainly ascorbic acid. Special plants designed and manufactured for the
production of dry powders from rose hips using low-vacuum and low-temperature infrared drying have been
developed and manufactured. The vacuum drying unit consists of: a vacuum chamber, an electrical system for
IR irradiation and instrumentation. During the drying process, the operating temperature was maintained at 65 °
C, the pressure inside the chamber was -0.8 atm and the drying time was 4 hours. With these parameters, the
dogrose is dried effectively and vitamins are well preserved in its composition. In appearance, you can determine
that the color and taste have not changed. Laboratory experiments were also carried out aimed at chopping and
separating rose hips. Continue drying, setting the operating parameters depending on the parameters of the
object. After setting the parameters of drying and its implementation, wild fruits rose hips is dehydrated to a
moisture content of 12%, while the preservation of vitamins is provided in the fruit composition. As a result of
an experimental study of the influence of vibration on the drying process, it has been established that the
efficiency of dehydration increases to 4-5% under continuous heating conditions – at a certain frequency and
amplitude. It is shown that the preservation of ascorbic acid in the composition of the pulp of the fruits rose hips
with vacuum infrared drying is up to 0.77 mg%. The optimum thickness of the product layer is about 1-1.5 cm,
the optimal wavelength is 3 microns, while the dehydration time of the products is an acceptable value, and the
temperature of the fruits does not exceed 65 °C, the vacuum is -0.8 atm.

Keyword : fruits of rose hips, drying, vacuum, infrared.


References:
1. F. Celik, A. Kazankaya, S. Ercisli, Fruit characteristics of some selected promising rose hip (Rosa spp.) genotypes from Van region
of Turkey. African Journal of Agricultural Research. Vol.4, №3. 2009, рр.236-240.
2. F. Demir, M. Özcan, Chemical and technological properties of rose (Rosa canina L.) fruits grown wild in Turkey. Journal of Food
Engineering. Vol.47, 2006. pp. 333-336.
3. S. Erentürk, M.S. Gulapoglu, S. Gültekin, The effects of cutting and drying medium on the vitamin C content of rosehip during
drying. Journal of Food Engineering. Vol.68, 2005, pp. 513-518.
4. B. Ayse, K. Filiz, Experimental Investigation of Drying Behavior of Rosehip in a Cyclone-Type Dryer. International Scholarly and
Scientific Research & Innovation. Vol.7, №6, 2013, рр. 1316-1320. 3765-
5. Alejandra Mabellini, Elizabeth Ohaco, Carlos A. Marquez, Antonio De Michelis and Jorge E. Lozano, Eects of pretreatments on 3768
convective drying of rosehip (Rosa eglanteria), International Journal of Food Studies. Vol.1, 2012, pp. 42-51.
6. M.R. Ochoa, A.G. Kesseler, B.N. Pirone, C.A. Marquez, A. De Michelis Shrinkage during convective drying of whole rose hip (rosa
rubiginosa l.) fruits. Lebensmittel-Wissenschaft Und Technologie-food Science and Technology. Vol.35, №5, 2002. рр. 400-406.
7. S. Erentürk, M.S. Gulapoglu, S. Gültekin, Experimental determination of effective moisture diffusivities of whole and cut rosehips
in convective drying. Food and Bioproducts processing. Vol.88, 2010, pp. 99-104.
8. Natalia A., Quintero Ruiz, Silvana M. Demarchi and Sergio A. Giner. Effect of hot air, vacuum and infrared drying methods on
quality of rose hip (Rosa rubiginosa) leathers. International Journal of Food Science & Technology. Vol.49, №8, 2014, рр.1799-
1804.
9. C. Marquez, A. De Michelis, S.A. Giner, Drying kinetics of rose hip fruits (rosa eglanteria l). Journal of Food Engineering. Vol.77,
№3, 2010, рp. 566-574.
10. E. Ohaco, B.N. Pirone, M.R. Ochoa, A.G. Kesseler, C.A. Marquez, A. De Michelis, Color retention and drying kinetic during
convective dehidration of rosehip fruits (rosa eglanteria). In Publicado en Actas del ENPROMER, Rio de Janeiro Brasil, 2005,
Trabajo 0296.
11. S. Erenturk, M.S. Gulaboglu, S. Gultekin, The effects of cutting and drying medium on the vitamin C content of rosehip during
drying. Journal of Food Engineering. Vol.68, 2005, pp. 5183-5187.
12. L. Stralsjo et al. Total folate content and retention in rosehip (Rosa Ssp.) after drying. Journal of Agricultural Food Chemistry.
Vo.51, 2003, pp. 28-39.
13. M.S.Erenturk, S.G. Gulaboglu, The Thin-layer Drying Characteristics of Rosehip. Biosystems Engineering. Vol.89, №2, 2004.
рр.159-166.
14. M. Saliha Erenturk, Sahin Gulaboglu, Selahattin Gultekin. The effects of cutting and drying medium on the vitamin C content of
rosehip during drying. Journal of Food Engineering. Vol.68, №4, 2005. рр. 513-518.
15. Reasoned opinion. Setting of temporary MRLs for nicotine in tea, herbal infusions, spices, rose hips and fresh herbs1. European
Food Safety Authority Journal. Vol.9, №3, 2011, рр. 2098,50.
16. T. Koyuncu, I. Tosun, N.S. Ustun, Drying Kinetics and Color Retention of Dehydrated Rosehips. Drying Technology: An
International Journal. Vol.21, №7, 2003. рр. 1369-1381.
17. V.V. Kontsov, Improving the process of drying hawthorn and wild rose fruits in a dense pouring layer. Abstract of Diss. for th e
degree of candidate of technical science. Voronezh, 20, 2012.
18. E.A. Martinson, Technology of complex processing of hips: Dis. Cand. tech. sciences. -Moscow, 2005, рр. 138.
19. State register of medicines. Official publication: in 2 t., Moscow, Medical Council. Vol.2, №1, 2009. рр. 568-560.
20. Roberto Pace. Herbals: at the forefront of testing and certification. Agro Food industry hi-tech. Vol.29, №5, 2018. рр. 7-9.
21. Ж.Э. Сафаров, Ш.А.Султанова, Г.Т.Дадаев Development of helio of a drying equipment based on theoretical researches of heat
energy accumulation. Enеrgеtika. Proс. СIS Higher Educ. Inst. аnd Power Eng. Assoc. V.62, №6. 2019.
22. Ж.Э. Сафаров, Ш.А. Султанова Research of the profiles of the temperature field of the process of convective drying of plant raw
materials. Enеrgеtika. Proс. СIS Higher Educ. Inst. аnd Power Eng. Assoc. V.63, №1. 2019.
23. J.E. Safarov, Sh. Sultanova, D.I. Samandarov, Method for primary processing of here silkworm cocoons by using infrared radiation
and elastic waves. Technical science and innovation. Vol. 2019:Iss.1. pp.30-35.

Authors: Miftachus Sholikah, Yufiarti, Elindra Yetti


Early Childhood Literacy Skills: The Effect of Socioeconomic Status, Home Literacy Environment,
662. Paper Title:
and Social Skills
Abstract: Literacy is an important skill that must be developed by a child for the next level of education, 3769-
so it must be expected that parents help their children to develop reading habits at an early age. A family has a 3775
responsibility to provide rich experiences inside and outside the home that are very important for the
development of children's literacy. This study aims to investigate the socio-economic status, home literacy
environment, and social skills in early childhood literacy skills. The method used in this study is survey. A
number of 120 students from first grade elementary school were recruited as samples. Parents of these children
filled out questionnaires in the column of education and income of parents. Home literacy environment consists
of literacy fasilities and parents-children activities at home, while social skills are obtained by measuring the
ability to improve cooperative relationships, social sensitivity, adaptability, and communication. On the other
hand, children's literacy skills are directly assessed by using tests. The research data was collected through
questionnaires designed in the form of Likert scale and rating scale. The data is analyzed by using path analysis.
The results of the research reveal a significant correlation between the socioeconomic status, home literacy
environment, and social skills in literacy. The effect of socioeconomic status, home literacy environment, and
social skills give direct positive influence on early childhood literacy skills.

Keyword : Literacy Skills, Socioeconomic Status, Home Literacy Environment, Social Skills.
References:
1. Atmazaki. dkk, “Panduan gerakan literasi nasional,” p. 41, 2017.
2. A. Sverdlov, D. Aram, and I. Levin, “Kindergarten teachers’ literacy beliefs and self-reported practices: On the heels of a new national
literacy curriculum,” Teach. Teach. Educ., vol. 39, pp. 44–55, 2014.
3. R. Wildová and J. Kropáčková, “Early Childhood Pre-reading Literacy Development,” Procedia - Soc. Behav. Sci., vol. 191, pp. 878–
883, 2015.
4. C. Liu, G. K. Georgiou, and G. Manolitsis, “Modeling the relationships of parents’ expectations, family’s SES, and home literacy
environment with emergent literacy skills and word reading in Chinese,” Early Child. Res. Q., vol. 43, pp. 1–10, 2018.
5. R. P. Bowles, J. M. Pentimonti, H. K. Gerde, and J. J. Montroy, “Item Response Analysis of Uppercase and Lowercase Letter Nam e
Knowledge,” J. Psychoeduc. Assess., vol. 32, no. 2, pp. 146–156, 2014.
6. T. P. Alloway, S. E. Gathercole, A. M. Adams, C. Willis, R. Eaglen, and E. Lamont, “Working memory and phonological awareness as
predictors of progress towards early learning goals at school entry,” Br. J. Dev. Psychol., vol. 23, no. 3, pp. 417–426, 2005.
7. E. Reese, S. Suggate, J. Long, and E. Schaughency, “Children’s oral narrative and reading skills in the first 3 years of reading
instruction,” Read. Writ., vol. 23, no. 6, pp. 627–644, 2010.
8. V. N. Durand, I. M. Loe, J. D. Yeatman, and H. M. Feldman, “Effects of early language, speech, and cognition on later readi ng: A
mediation analysis,” Front. Psychol., vol. 4, no. SEP, pp. 1–11, 2013.
9. J. W. Jacoby and N. K. Lesaux, “Language and literacy instruction in preschool classes that serve Latino dual language learne rs,” Early
Child. Res. Q., vol. 40, pp. 77–86, 2017.
10. D. Liu, K. K. H. Chung, and C. McBride, “The role of SES in Chinese (L1) and English (L2) word reading in Chinese -speaking
kindergarteners,” J. Res. Read., vol. 39, no. 3, pp. 268–291, 2016.
11. F. Alivernini and S. Manganelli, “A Multilevel Structural Equation Model Testing the Influences of Socio-Economic Status and Pre-
Primary Education on Reading Literacy in Italy,” Procedia - Soc. Behav. Sci., vol. 205, no. May, pp. 168–172, 2015.
12. M. Vasilyeva, E. Dearing, A. Ivanova, C. Shen, and E. Kardanova, “Testing the family investment model in Russia: Estimating indirect
effects of SES and parental beliefs on the literacy skills of first-graders,” Early Child. Res. Q., vol. 42, no. October 2016, pp. 11–20,
2018.
13. S. J. Gibb, D. M. Fergusson, and L. J. Horwood, “Childhood family income and life outcomes in adulthood: Findings from a 30-year
longitudinal study in New Zealand,” Soc. Sci. Med., vol. 74, no. 12, pp. 1979–1986, 2012.
14. D. Hartas, “Families’ social backgrounds matter: Socio-economic factors, home learning and young children’s language, literacy and
social outcomes,” Br. Educ. Res. J., vol. 37, no. 6, pp. 893–914, 2011.
15. M. Hood, E. Conlon, and G. Andrews, “Preschool Home Literacy Practices and Children’s Literacy Development: A Longitudinal
Analysis,” J. Educ. Psychol., vol. 100, no. 2, pp. 252–271, 2008.
16. L. G. Hamilton, M. E. Hayiou-Thomas, C. Hulme, and M. J. Snowling, “The Home Literacy Environment as a Predictor of the Early
Literacy Development of Children at Family-Risk of Dyslexia,” Sci. Stud. Read., vol. 20, no. 5, pp. 401–419, 2016.
17. C. S. Puranik, B. M. Phillips, C. J. Lonigan, and E. Gibson, “Early Childhood Research Quarterly Home literacy practices and
preschool children ’ s emergent writing skills : An initial investigation,” Early Child. Res. Q., vol. 42, no. May 2016, pp. 228–238,
2018.
18. L. S. Yeo, W. W. Ong, and C. M. Ng, “The Home Literacy Environment and Preschool Children’s Reading Skills and Interest,” Early
Educ. Dev., vol. 25, no. 6, pp. 791–814, 2014.
19. K. Miyamoto, M. C. Huerta, and K. Kubacka, “Fostering social and emotional skills for well-being and social progress,” Eur. J. Educ.,
vol. 50, no. 2, pp. 147–159, 2015.
20. K. S. Tarasova, “Development of Socio-emotional Competence in Primary School Children,” Procedia - Soc. Behav. Sci., vol. 233, no.
May, pp. 128–132, 2016.
21. C. E. Baker, “Fathers’ and Mothers’ Home Literacy Involvement and Children’s Cognitive and Social Emotional Development:
Implications for Family Literacy Programs,” Appl. Dev. Sci., vol. 17, no. 4, pp. 184–197, 2013.
22. J. J. Montroy, R. P. Bowles, L. E. Skibbe, and T. D. Foster, “Social skills and problem behaviors as mediators of the relationship
between behavioral self-regulation and academic achievement,” Early Child. Res. Q., vol. 29, no. 3, pp. 298–309, 2014.
23. N. L. Aikens and O. Barbarin, “Socioeconomic Differences in Reading Trajectories: The Contribution of Family, Neighborhood, and
School Contexts,” J. Educ. Psychol., vol. 100, no. 2, pp. 235–251, 2008.
24. Y. Li, L. Xu, L. Liu, Y. Lv, Y. Wang, and C. S. Huntsinger, “Can preschool socioeconomic composition moderate relationships
between family environment and Chinese children’s early academic and social outcomes?,” Child. Youth Serv. Rev., vol. 60, pp. 1–10,
2016.
25. E. Reynolds, K. Stagnitti, and E. Kidd, “Play, language and social skills of children attending a play -based curriculum school and a
traditionally structured classroom curriculum school in low socioeconomic areas,” Australas. J. Early Childhoodournal early Child.,
vol. 36, no. 4, pp. 120–130, 2011.
26. L. K. Ferretti and K. L. Bub, “The influence of family routines on the resilience of low-income preschoolers,” J. Appl. Dev. Psychol.,
vol. 35, no. 3, pp. 168–180, 2014.
27. E. van Bergen, T. van Zuijen, D. Bishop, and P. F. de Jong, “Why Are Home Literacy Environment and Children’s Reading Skills
Associated? What Parental Skills Reveal,” Read. Res. Q., vol. 52, no. 2, pp. 147–160, 2017.
28. I. V. S. Mullis and M. O. Martin, “Since last General Assembly …,” no. October, 2015.
29. A. C. W. Schachner, E. K. Newton, R. A. Thompson, and M. Goodman-Wilson, “Becoming prosocial: The consistency of individual
differences in early prosocial behavior,” Early Child. Res. Q., vol. 43, pp. 42–51, 2018.
30. N. A. Kauffman and M. Kinnealey, “Comprehensive social skills taxonomy: Development and application,” Am. J. Occup. Ther., vol.
69, no. 2, 2015.
31. E. Melhuish, M. Phan, K. Sylva, P. Sammons, I. Siraj-Blatchford, and B. Taggart, “Effects of the Home Learning Environment and
preschool center experience upon literacy and numeracy development in early primary school,” J. Soc. Issues, vol. 64, no. 1, pp. 95–
114, 2008.
32. B. A.T., M. L. M., R. A., and K. M., “A qualitative exploration of social support during treatment for severe alcohol use disorder and
recovery,” Addict. Behav. Reports, vol. 6, no. June, pp. 76–82, 2017.
33. Lou Ann Griswold; Samantha Townsend, “Assessing the Sensitivity of the Evaluation of Social Interaction: Comparing Social Skills in
Children With and Without Disabilities,” Am. J. Occup. Ther., 2012.
34. S. K. Baker, L. E. Santoro, D. J. Chard, H. Fien, Y. Park, and J. Otterstedt, “An Evaluation of an Explicit Read Aloud Intervention
Taught in Whole-Classroom Formats In First Grade,” Elem. Sch. J., vol. 113, no. 3, pp. 331–358, 2013.
35. J. A. M. Farver, Y. Xu, S. Eppe, and C. J. Lonigan, “Home environments and young Latino children’s school readiness,” Early Child.
Res. Q., vol. 21, no. 2, pp. 196–212, 2006.
36. D. Aram, O. Korat, E. Saiegh-Haddad, S. H. Arafat, R. Khoury, and J. A. Elhija, “Early literacy among Arabic-speaking
kindergartners: The role of socioeconomic status, home literacy environment and maternal mediation of writing,” Cogn. Dev., vol. 28,
no. 3, pp. 193–208, 2013.

Authors: Sakshi Dhingra, Dharminder Kumar


The Hybridization of Neural Network and Particle Swarm Optimization for Natural Terrain
Paper Title:
Feature Extraction
Abstract: The optimization of various soft computing and metaheuristic techniques can be ameliorated in
a global area network, Swarm intelligence. In this research, a hybrid algorithm of neural network and particle
swarm optimization has been presented for remote sensing applications. The terrain features of the land in a
remote sensing image have been classified using these algorithms. Remote sensing basically deals with the
processing and interpretation of satellite images without any physical contact to that particular region. In
addition, the geo-spatial characteristics of the data also recorded during image classification. The hybrid concept
used in this research, the implementation of algorithm in this paper based on the neurons network to find the
best solution, which is further resolved using the Particle Swarm Optimization approach, an optimization
technique. The proposed algorithm easily classifies the terrain features with higher efficiency and kappa
coefficient value. The results show that 94.36% accuracy attained from the proposed technique. The overall
accuracy improved by 5.24 % and 14.93% and kappa coefficient enhancement of 6.97 % and 18.99 % in
comparison to existing studies.

Keyword : Remote Sensing, Satellite Images, Particle Swarm Optimization, kappa coefficient
References:
1. J.Jayanth, S.Koliwad and A. Kumar, “Classification of remote sensed data using Artificial Bee Colony algorithm”, The Egyptian
Journal of Remote Sensing and Space Science, Vol.18, No. 1, pp.119-126,2015.
2. Z. Zou and Z. Shi, “Random Access Memories: A New Paradigm for Target Detection in High Resolution Aerial Remote Sensing
663. Images”, in IEEE Transactions on Image Processing, Vol. 27, No. 3, pp. 1100-1111, 2018.
3. X. Liu, X. Li, L. Liu and J. He, “An innovative method to classify remote-sensing images using ant colony optimization”, IEEE
Transactions and Geosciencefor Remote Sensing, Vol. 46, No.12, pp.4198–4208, 2008.
3776-
4. B.Akay, D.Karaboga, B. Akay and D. Karaboga, “A survey on the applications of artificial bee colony in signal, image, and video 3782
processing”, Signal, Image and Video Processing, Vol. 9, No. 4, pp.967-990,2015.
5. A.Voisin, A. Vladimir Krylov , G. Moser, B. Sebastianoand J.Zerubia,“Supervised
classification of multi-sensor and multi-resolution remote sensing images with a hierarchical copula-based approach”,IEEE
Transactions and Geoscience for Remote Sensing,Vol. 20, pp. 1–18,2013.
6. H. Kundra and H. Sadawarti, “ Hybrid Algorithm of Cuckoo Search and Particle Swarm Optimization for Natural Terrain
Feature Extraction”,Research journal of Information Technology, Vol.7, No.1, pp. 58- 69, 2015.
7. K. Sabanci, M. Fahriunlersenand K. Polat, “Classification of Different Forest Types with Machine Learning Algorithms” ,
Research for Rural Development, Vol. 1, 2016
8. S. M. Jog, M. Dixit, A.Rajgopalan and S. D. Ranade, “KNN and SVM based Satellite Image Classification”,International
Journal of Innovative Research in Electrical, Electronics, Instrumentation and Control Engineering, Vol. 4, No. 6, pp. 158 -162,
2016.
9. O.Csillik, “Fast segmentation and classification of very high resolution remote sensing data using SLIC superpixels”, Remote
Sensing, Vol. 9, No. 3, pp.243,2017.
10. H. Wang, J. Jiang and G. Zhang, “CraterIDNet: An End-to-End Fully Convolutional Neural Network for Crater Detection and
Identification in Remotely Sensed Planetary Images”, Remote Sensing, Vol. 10, No.7, pp.1067,2018.
11. K. Fu, W.Dai , Y. Zhang , Z. Wang , M. Yan and X. Sun, “MultiCAM: Multiple Class Activation Mapping for Aircraft Recognition
in Remote Sensing Images”, Remote Sensing, Vol.11, No.5, pp.544,2019.
12. S. Dhingra, D.Kumar, “A review of remotely sensed satellite image classification”, International Journal of Electrical and Computer
Engineering, Vol. 9, No.3, pp.1720,2019.
13. Q.Wang, Z.Meng, & X.Li, “Locality adaptive discrminant alanlysis for spectral-spatial classification of Hyperspectral images”.
IEEE Geoscience and Remote Sensing Letters, 14(11), 2077-2081, 2016.
14. S. Sarkar,S. Das,S.S.Chaudhuri, “Hyperspectral image segmentation using Renyi entropy based multi-level thresholding aided with
differential evolution” Expert systems with application, 50,120-129,2016.
15. S.Rani, S.Dhingra, “Classificationn of Remotely Sensed Data by Texture Features with the Nature-Inspire Optimization Algorithm”,
Vol.7, No.8, 2019.
Petr Albinovich Krasochko, Dmitry Sergeevich Borisovets, Rudolf Borisovich Korochkin, Pavel
Authors: Petrovich Krasochko, Oleg Yurevich Chernykh, Andrey Georgievich Koshchaev, Sergey
Viktorovich Shabunin
Paper Title: The Effect of Silver and Zinc Nanoparticles on The Structural Characteristics of Bacterial Cells
Abstract: The paper presents the results of studying the influence of nanoparticles of silver and zinc on
664. the culture of Madin-Darby Bovine Kidney (MDBK) and bacterial cells of E. coli at various dilution rates and
various incubation times. The interaction of MDBK cells with the nanoparticles of zinc has a strong deleterious
3783-
effect on the cells and causes morphological changes in them. At the same time, no toxic effects were observed
3789
after the interaction of silver nanoparticles and the cells. During incubation of E. coli bacterial cells with zinc
nanoparticles, not only changes in the morphology of the cell membrane surface but also the destruction of
bacterial cells were observed. During incubation with silver nanoparticles at various dilution rates for various
times, changes in the cell shape from rod-shaped to rounded, without symptoms of destruction were noted.

Keyword : Silver Nanoparticles, Zinc Nanoparticles, Mdbk, Escherichia Coli, Incubation, Atomic Force
Microscopy, Damaging Effect.
References:
1. A.G. Koshchaev, I.V. Shchukina, A.V. Garkovenko, E.V. Ilnitskaya, V.V. Radchenko, A.A. Bakharev, L.A. Khrabrova, “Allelic
variation of marker genes of hereditary diseases and economically important traits in dairy breeding cattle population”. Journal of
Pharmaceutical Sciences and Research, 10(6), 2018, pp. 1566-1572.
2. L.N. Skvortsova, A.G. Koshchaev, V.I. Shcherbatov, Y.A. Lysenko, V.I. Fisinin, I.P. Saleeva, S.F. Sukhanova, “The use of prob iotics
for improving the biological potential of broiler chickens”. International Journal of Pharmaceutical Research, 10(4), 2018, pp. 760-765.
3. I.N. Tuzov, V.G. Ryadchikov, A.N. Ratoshniy, N.I. Kulikova, A.G. Koshchaev, “Using Holstein Cattle in Conditions of the Krasnodar
Territory”. Journal of Pharmaceutical Sciences and Research, 10(12), 2018, pp. 3160-3163.
4. P. Chauhan, M. Sharma, R. Puri, S. Puri, “Phytochemical Screening of Acorus calamus Linn and Cuscuta reflexa Roxb”. Annals of
Agri-bio Research, 24(1), pp. 115-118.
5. A.G. Koshchaev, Y.A. Lysenko, A.A. Nesterenko, A.V. Luneva, A.N. Gneush, “Development of feed additives for poultry farming”.
Dusunen Adam, 10(1), 2019, pp. 1567-1572.
6. E.I. Anisimova, A.G. Koshchaev, O.N. Eremenko, A.S. Krivonogova, K.V. Plemyashov, T.V. Kalashnikova, S.V. Shabun in,
“Economic efficiency of productive features of various dairy cattle genotypes”. International Journal of Innovative Technolog y and
Exploring Engineering, 8(8), 2019, pp. 3207-3211.
7. A.G. Koshchaev, T.A. Inyukina, N.N. Guguchvili, Y.A. Makarov, A.M. Gulyukin, O.P. Neverova, V.N. Shevkopljas, “The influence
of metabolic products of Echinococcus granulosus on the oxidation processes in the organism of pigs”. Journal of Pharmaceutic al
Sciences and Research, 10(9), 2018, pp. 2317-2325.
8. E.V. Yausheva, “Issledovanie biologicheskogo deystviya nanochastits metallov” [Studying the biological effect of metal
nanoparticles]. Issues of biological, medical, and pharmaceutical chemistry, 9, 2013, pp. 54-60.
9. N.V. Rukosuev, “Preparaty na osnove nanochastits v klinicheskoy praktike: dostizheniya i perspektivy” [Preparations based on
nanoparticles in clinical practice: achievements and perspectives]. Issues of biological, medical, and pharmaceutical chemistry, 10,
2014, pp. 3-22.
10. I.P. Saleeva, V.S. Lukashenko, A.G. Koshchaev, V.G. Volik, D.Y. Ismailova, “Quality of Broiler Chicken Meat with the Use of
Various Methods of Growing”. Journal of Pharmaceutical Sciences and Research, 10(11), 2018, pp. 2979-2984.
11. I.V. Serdyuchenko, A.G. Koshchaev, N.N. Guguchvili, I.S. Zholobova, I.M. Donnik, A.M. Smirnov, B.V. Usha, “Microbiocenosis of
the intestinal tract of honey bees and its correction”. OnLine Journal of Biological Sciences, 18(1), 2018, pp. 74-83.
12. A.N. Ratoshny, A.A. Soldatov, S.I. Kononenko, I.N. Tuzov, A.G. Koshchaev, “Organization of feeding dairy cows for preventing
metabolic disorders”. Journal of Pharmaceutical Sciences and Research, 10(12), 2018, pp. 3273-3276.
13. A.N. Troshin, P.D. Onischuk, A.G. Koshchaev, S.P. Kudinova, O.V. Koshchaeva, V.Y. Nikitin, A.S. Krivonogova, “Pa rameters of
acute toxicity of the Ferro-Quin iron-sorbitol-protein complex”. International Journal of Pharmaceutical Research, 10(4), 2018, pp.
784-790.
14. A.A. Rakhmetova, “Antibakterialynaya i ranozazhivlyayuschaya aktivnosty mazey s nanochastitsami medi na osnove proizvodnyh
metiltsellyulozy” [Antibacterial and wound-healing activity of ointments containing copper nanoparticles based on methylcellulose
derivatives]. Issues of biological, medical, and pharmaceutical chemistry, 3, 2014, pp. 22-27.
15. I.G. Kiselev, I.A. Rodin, A.N. Bezin, A.A. Stekolnikov, A.G. Koshchaev, M.G. Yakovets, A.S. Krivonogova, “Clinical aspects of the
use of smooth and full-threaded rods of the VOSIS veterinary orthopedic set in cats”. International Journal of Innovative Technology
and Exploring Engineering, 8(8), 2019, pp. 3212-3215.
16. S.V. Svistunov, N.N. Bondarenko, A.G. Koshchaev, D.A. Normov, V.N. Shevkopljas, O.P. Neverova, A.M. Smirnov, “Productive
qualities of gray mountain caucasian bees of type Krasnopolyansky”. International Journal of Innovative Technology and Exploring
Engineeringm 8(7), 2019, pp. 631-635.
17. V.G. Tyurin, V.G. Semenov, D.A. Nikitin, A.V. Lopatnikov, I.N. Madebeikin, A.G. Koshchaev, O.V. Koshchaeva, “Stimulation of
adaptogenesis in aberdeen-angus calves for improving productive qualities”. International Journal of Engineering and Advanced
Technology, 8(5), 2019, pp. 440-444.
18. A.A. Bakharev, O.M. Sheveleva, K.A. Fomintsev, K.N. Grigoryev, A.G. Koshchaev, K.A. Amerkhanov, I.M. Dunin,
“Biotechnological characteristics of meat cattle breeds in the Tyumen region”. Journal of Pharmaceutical Sciences and Research,
10(9), 2018, pp. 2383-2390.
19. A.G. Koshchaev, Y.A. Lysenko, A.V. Luneva, A.N. Gneush, M.V. Aniskina, V.I. Fisinin, I.P. Saleeva, “Studying Biological Activ ity
of Lactobacillus Hydrolysates”. Journal of Pharmaceutical Sciences and Research, 10(10), 2018, pp. 2475-2479.
20. N.I. Kryukov, V.O. Yurchenko, A.G. Koshchaev, N.E. Gorkovenko, D.P. Vinokurova, A.A. Bogosyan, S.F. Sukhanova, “The
Derivative Of Prussian Blue Paint ‒ Khzh-90 Cesium Isotopes’ Sorbent At Mycotoxicoses”, International Journal of Pharmaceutical
Research, 10(4), 2018, pp. 669-674.
21. A.G. Koshchaev, T.A. Inyukina, N.N. Guguchvili, A.V. Uspensky, S.V. Larionov, F.I. Vasilevich, S.V. Engashev, “The effect of
metabolites Echinococcus granulosus on the amino acid composition of the cattle slaughter products”. International Journal of
Innovative Technology and Exploring Engineering, 8(7), 2019, pp. 589-596.
22. N.A. Samoilov, “Issledovanie antimikrobnyh svoystv nanochastits serebra, stabilizirovannyh sopolimerami maleinovoy kisloty”
[Studying the antimicrobial properties of silver nanoparticles stabilized with copolymers of maleic acid]. Biotechnology, 1, 2015, pp.
75-84.
23. P.A. Krasochko, A.E. Stankut, “Protivovirusnye i antibakterialynye svojstva nanochastits serebra” [Antiviral and antibacterial
properties of silver nanoparticles]. Our agriculture. Veterinary science and animal breeding, 6, 2013, pp. 64 – 67.
24. A.G. Koshchaev, Y.A. Lysenko, A.A. Lysenko, A.V. Luneva, I.P. Saleeva, V.I. Fisinin, “Screening of microorganism symbiont strains
as a base of probiotics for poultry industry”. Journal of Pharmaceutical Sciences and Research, 9(8), 2017, pp. 1373 -1379.
25. S.V. Svistunov, A.G. Koshchaev, N.N. Bondarenko, O.V. Koshchaeva, A.M. Smirnov, Y.A. Yuldashbayev, O.G. Lorets, “Selection of
Bees of the Gray Mountain Caucasian Breed: Apis mellifera caucasica L. of the Krasnaya Polyana Type”. Journal of Pharmaceutic al
Sciences and Research, 10(12), 2018, pp. 3185-3188.
26. P.A. Krasochko, V.A. Mashero, “Immunostimulyatory i sovremennye sposoby korrektsii immunnogo otveta” [Immunostimulants and
modern methods of correcting the immune response]. Epidemiology, immunobiology, pharmacology, and sanitation, 1, 2004, pp. 32 -
36.
27. A.G. Koshchaev, Y.A. Lysenko, M.P. Semenenko, E.V. Kuzminova, I.A. Egorov, E.J. Javadov, “Engineering and development of
probiotics for poultry industry”. Asian Journal of Pharmaceutics, 12(4), 2018, pp. S1179-S1185.
28. M.I. Zverzhanovskiy, S.N. Zabashta, T.S. Kataeva, A.G. Koshchaev, M.V. Nazarov, “Epizootic trichinellosis situation and consortive
links in jackals (Canis aureus L.) in North-western Region of Russia”. Indian Veterinary Journal, 94(10), 2017, pp. 29-32.
29. A.N. Troshin, A.N. Turchenko, P.D. Onischuk, A.G. Koshchaev, S.P. Kudinova, A.Y. Shantyz, O.V. Koshchaeva, “Long-term use of
iron-mineral and iron-organic drugs”. International Journal of Pharmaceutical Research, 10(4), 2018, pp. 791-797.
30. I.A. Khmel, O.A. Koksharova, M.A. Radtsig, “Antibakterialynye effekty ionov serebra: vliyanie na rost gramotritsatelynyh bakteriy i
obrazovanie bioplyonok” [Antibacterial effects of silver ions: the effect on the growth of gram-negative bacteria and biofilm
formation]. Molecular Genetics, Microbiology, and Virology, 4, 2009, pp. 27-31.
31. A.V. Garkovenko, V. V. Radchenko, E.V. Ilnitskaya, A. G. Koshchaev, I.V. Shchukina, A.A. Bakharev, S.F. Sukhanova,
“Polymorphism of cattle microsatellite complexes”. Journal of Pharmaceutical Sciences and Research, 10(6), 2018, pp. 1545 -1551.
32. V.G. Semenov, D.A. Nikitin, A.V. Volkov, V.G. Tyurin, A.G. Koshchaev, A.A. Nesterenko, S.V. Shabunin, “Preventing Shipping
Stress in Imported Heifers with the Use of Immunocorrection”. International Journal of Innovative Technology and Exploring
Engineering, 8(5), 2019, pp. 1591-1595.
33. E.I. Anisimova, A.G. Koshchaev, A.A. Nesterenko, A.A. Bakharev, A.G. Isaeva, T.M. Shuvaeva, T.V. Kalashnikova, “Comparative
Assessment Of The Relationship Between Intrabreed Types Of Simmental Cows And Sectionized Traits”. International Journal of
Pharmaceutical Research, 10(4), 2018, pp. 604-610.
34. I.S. Koba, A.A. Lysenko, A.G. Koshchaev, A.K. Shantyz, I.M. Donnik, V.I. Dorozhkin, S.V. Shabunin, “Prevention of Mastitis in
Dairy Cows on Industrial Farms”. Journal of Pharmaceutical Sciences and Research, 10(10), 2018, pp. 2582-2585.
35. E.V. Kuzminova, M.P. Semenenko, A.G. Koshchaev, O.Y. Chernyh, A.N. Turchenko, “Pharmacological prevention of obstetric and
gynecological diseases in cows”. Dusunen Adam, 10(1), 2019, pp. 608-612.
36. N.I. Kulikova, O.N. Eremenko, A.G. Koshchaev, T.V. Kalashnikova, N.V. Evdokimov, K.A. Amerkhanov, I.M. Dunin, “Productive
longevity of holstein bulls' female offspring”. International Journal of Engineering and Advanced Technology, 8(5), 2019, pp. 435-439.

Authors: Valery Shapovalov, Irina Igropulo, Marianna Arutyunyan

Paper Title: Practices of Defining the Notion of Social Entrepreneurship


Abstract: The paper presents the results of an interdisciplinary comparative analysis of modern research
practices concerning social entrepreneurship in Russian and foreign traditions in order to establish the specifics
of defining the notion of social entrepreneurship in interdisciplinary discourse. The analytical basis of the study
comprised the fundamental provisions and concepts of open innovation and human capital, the theory of public
goods, the theoretical provisions concerning the structure and substance of social action, corporate social
responsibility, the concept of uneven innovation activity, the principles of social partnership, social viability and
complementarity. The research problems were solved using the methods of systems, structural and functional,
institutional, comparative and content analyses. The selection of analysed papers was conducted in the databases
of the analytical information platform Web of Science, the National Scientific Citation Database Russian
Science Citation Index, the Scopus abstract base, the databases of academic networks ResearchGate,
Academia.edu, etc. The paper indicates that Russian and foreign discourses address the problem of social
entrepreneurship primarily in the context of economic, managerial, sociological, psychological and pedagogical
research practices. It observes differentiation in the approaches to the conceptualisation and definition of the
notion of social entrepreneurship under the applicable subject axiomatics and methodology and identifies the
specifics of defining the notion of social entrepreneurship in interdisciplinary discourse. The research results
make the foundation for further development of the methodology of definitions in the area of social
entrepreneurship and serve to ensure consistency in the respective subject field and its relevance to the complex
nature of social entrepreneurship as a phenomenon calling to be addressed from systemic and interdisciplinary
positions.

Keyword : social entrepreneurship, social entrepreneur, social good, comparative analysis, interdisciplinary
analysis.
References:
1. N.V. Baranova, “Sotsialnaya otvetstvennost predprinimatelstva v Rossii: voprosy terminologii, razvitiya, natsionalnykh osobennostei”
665. [Social responsibility of entrepreneurship in Russia. Aspects of terminology, development, national specifics]. The Russian Journal of
Entrepreneurship, 18(9), 2017, pp. 1479-1489 3790-
2. M. Batalina, A. Moskovskaya, L. Taradina, “Obzor opyta i kontseptsii sotsial'nogo predprinimatelstva s uchetom vozmozhnostei ego
primeneniya v sovremennoi Rossii” [A survey of practice and concepts of social entrepreneurship with a focus on the potential
3794
application in Russia]: Preprint WP1/2008/02. Moscow: State University – Higher School of Economics, 2008.
3. M.N. Konyagina, M. Krasnopevtseva, “Molodezh i sotsialnoe predprinimatelstvo v Rossii” [Youth and social entrepreneurship in
Russia], Rossiiskoe predprinimatelstvo [The Russian Journal of Entrepreneurship], 20(1), 2019, pp. 159-172
4. A. Moskvina, D. Dolzhikova, “Uchastie lyudei starshego vozrasta v sotsialnom predprinimatelstve na primere sotsialnogo
akseleratora” [Participation of seniors in social entrepreneurship as exemplified by a social accelerator]. Zhurnal issledovanii sotsialnoi
politiki [The Journal of Social Policy Studies], 16(1), 2018, pp. 169-176
5. S. Bansal, I. Garg, G.D. Sharma, “Social Entrepreneurship as a Path for Social Change and Driver of Sustainable Development: A
Systematic Review and Research Agenda”, Sustainability, 11, 2019, pp. 1091.
6. P. Bento, M. Jacquinet, R. Albuquerque, “How Social Entrepreneurship Promotes Sustainable Development: With Some Examples
from Developed and Developing Countries”, In: New Paths of Entrepreneurship Development. Studies on Entrepreneurship, Structu ral
Change and Industrial Dynamics. Springer, Cham, 2019.
7. E. Muralidharan, S. Pathak, Sustainability, Transformational Leadership, and Social Entrepreneurship (2018) Sustainability, 10, p. 567-
589.
8. A. Forouharfar, S.A. Rowshan, H. Salarzehi, “An epistemological critique of social entrepreneurship definitions”, Journal of Global
Entrepreneurship Research, 8, 2018, pp. 11-51.
9. O.B. Ponomarev, “O perspektivakh razvitiya teorii sotsialnogo predprinimatelstva” [On potential development of the social
entrepreneurship theory]. Rossiiskoe predprinimatelstvo [The Russian Journal of Entrepreneurship], 18(4), 2017, pp. 561-570.
10. A. Chepurenko, “Entrepreneurship Theory: New Challenges and Future Prospects”. Foresight-Russia, 9(2), 2015, pp. 44–57.
11. V.V. Zhokhova, “Sotsialnoe predprinimatelstvo: kontseptsiya, sushchnost i znachenie” [Social entrepreneurship: concept, substance
and implications]. Sovremennaya konkurentsiya [Modern competition], 9(4(52)), 2015, pp. 77-99.
12. M.K. Baymuhasheva, R.K. Sabirovа, “Theoretical Research of Social Entrepreneurship”. Reports, 4, 2019, pp. 66-70.
13. A. Forouharfar, S. Rowshan, H. Salarzehi, “Introducing a Conceptual Framework for the Strategic Classification of State -Sponsored
Social Entrepreneurship A Conceptual Study”, Social and Management Research Journal, 16(1), 2019.
14. D. Kelly, “Differences Between Social Entrepreneurs & Business Entrepreneurs”. Small Business: Chron.com, 2019. Available:
http://smallbusiness.chron.com/differences-between-social-entrepreneurs-business-entrepreneurs-36624.html
15. N. Ivashchenko, N. Bulygina, “Social entrepreneurship in Russia: current state and development features”. MIR (Modernization.
Innovation. Research), 10(1), 2019, pp. 114-132
16. D. Littlewood, D., Holt, D. Social Entrepreneurship in South Africa: Exploring the Influence of Environment (2015) Busine ss &
Society, URL: https://www.researchgate.net/publication/272349900_Social_Entrepreneurship_in_South Africa Exploring the Influence
of_Environment
17. G.K.S. Nimeshi, “A Systematic Literature Review on Social Entrepreneurship and Characteristics of Social Entrepreneurs”.
International Journal of Multidisciplinary Research Review, 1(39), 2018, pp. 50-53.
18. H. Utomo, S. Priyanto, L. Suharti, G. Sasongko, “Developing social entrepreneurship: a study of community perception in Indon esia”.
Entrepreneurship and Sustainability Issues, 7, 2019, pp. 233-246.
19. A.A. Moskovskaya, A.A. Berendyaev, A.Yu. Moskvina, “Mezhdu sotsialnym i ekonomicheskim blagom: konflikt proektov legitimatsii
sotsialnogo predprinimatelstva v Rossii” [Between social and economic good: the conflict of projects in legitimation of social
entrepreneurship in Russia]. Monitoring obshchestvennogo mneniya: Ekonomicheskie i sotsial'nye peremeny [Monitoring of Public
Opinion: Economic and Social Changes], 6, 2017, pp. 31-51.
20. F. Guo, B. Zou, J. Guo, “What determines academic entrepreneurship success? A social identity perspective”. International
Entrepreneurship and Management Journal, Springer, 15(3), 2019, pp. 929-952.
21. V.S. Hodgkin, “Business social entrepreneurs: working towards sustainable communities through socially responsible business
practices”. 2019. Available at:
https://www.researchgate.net/publication/34466638_Business_social_entrepreneurs_working_towards_sustainable_communities_throu
gh_socially_responsible_business_practices
22. M.A. Makarchenko, A.A. Antonov, “Ponyatie sotsialnogo predprinimatelstva i otlichitelnye osobennosti sotsialnykh predprinimatelei”
[The notion of social entrepreneurship and the specific profile of social entrepreneurs]. Nauchnyi zhurnal NIU ITMO [Scientif ic
journal NRU ITMO], Series Economics and Environmental Managementm, 2, 2015, pp. 35-42.
23. H.M. Neck, A.C. Corbett, “The Scholarship of Teaching and Learning Entrepreneurship”. Journal of Modern Competition, 12(1(67) ),
2018, pp. 114-142.
24. A. Rey-Martí, A. Mohedano-Suanes, V. Simón-Moya, “Crowdfunding and Social Entrepreneurship: Spotlight on Intermediaries”.
Sustainability, 11(4), 2019, pp. 1175.
25. D. Bjärsholm, “Social Entrepreneurship in an International Context”. In: Sport and Social Entrepreneurship in Sweden. Palgrav e
Macmillan, Cham, 2018, pp. 23-39. https://doi.org/10.1007/978-3-319-72496-6_3
26. A.G. Moreno, L.L. Muñoz, R.P. Morote, “The Role of Higher Education in Development of Entrepreneurial Competencies: Some
Insights from Castilla-La Mancha University in Spain”. Administrative Sciences, 9, 2019, pp. 16-40.
27. T. Peterson, K.A. Schenker, “Definition of Sport and Social Entrepreneurship”. In: Sport and Social Entrepreneurship in Swede n.
Palgrave Macmillan, Cham, 2018. https://doi.org/10.1007/978-3-319-72496-6_4
28. M.S. Satar, N. Saqib, “Individual social entrepreneurship orientation: towards development of a measurement scale”. Asia Pacific
Journal of Innovation and Entrepreneurship, 13(1), 2019, pp. 49-72.
29. Yu.N. Arai, “Biznes-modeli v sotsialnom predprinimatelstve: podkhod k postroeniyu tipologii” [Business models in social
entrepreneurship. Approaches to building a typology]. Russian Journal of Management, 16(2), 2018, pp. 253-272.
30. T.S. Shipunova, S.Yu. Kazantseva, “Gosudarstvenno-chastnoe partnerstvo kak forma sotsialnogo predprinimatelstva” [Public-private
partnership as a form of social entrepreneurship]. Rossiiskoe predprinimatelstvo [The Russian Journal of Entrepreneurship], 1 9(4),
2018, pp. 907-918.
31. T. Lunkyna, A. Ivanenko, “Features of the Development of Social Entrepreneurship: Foreign Experience (2019) Modern Economics,
15, p. 142-147
32. T. Golob, M. Makarovich, “Sotsialnye predpriyatiya trudovoi integratsii v Tsentralnoi i Vostochnoi Evrope v usloviyakh strukturno-
semioticheskikh transformatsii” [Work integration social enterprises in Central and Eastern Europe amid structural and semiotic
transformation]. Monitoring obshchestvennogo mneniya: Ekonomicheskie i sotsialnye peremeny [Monitoring of Public Opinion:
Economic and Social Changes], 5, 2018, pp. 233-249
33. P. Erpf, M. Ripper, M. Castignetti, “Understanding Social Entrepreneurship Based on Self-Evaluations of Organizational Leaders –
Insights from an International Survey”, Journal of Social Entrepreneurship, 10, 2019, pp. 1-19.
34. T.L. Chernysheva, Sotsialnoe predprinimatelstvo v vuze [Social entrepreneurship in HEI] (2017) Rossiiskoe predprinimatelstvo [The
Russian Journal of Entrepreneurship], 18 (21), pp. 3207-3220
35. S. Lam-Lam, E. Ahumada-Tello, I. Plascencia-López, O.O. Ovalle-Osuna, R.V. Barragán-Quintero, R. D. Evans, K. Soria-Barreto,
“New Challenges in Universities: Teaching Social Entrepreneurship”, IEEE Technology & Engineering Management Conference
(TEMSCON), 2019, pp. 1-6.
Ludmila Victorovna Lunina, Zareta Talbievna Tazova, Hazret Ruslanovich Siyukhov, Anzaur
Authors:
Adamovich Skhalyakhov, Nafset Tevchezhovna Siyukhova
Development of The Technology of Obtaining A Non-Alcoholic Beverage for Preventing Iodine
Paper Title:
Deficiency Disorders with The Use of Nonconventional Plant Raw Materials
Abstract: The article presents the results of the research on the development of the formulation and the
technology for obtaining a non-alcoholic beverage for preventing iodine deficiency disorders based on an extract
from the nontraditional plant raw materials of the North-Caucasian region. Using the experiment planning
module of the STATISTICA suite, the optimal formulation of the phytocomposition mixture for enriching the
developed beverage was obtained, which contained the herb of common thyme (lat. Thimus serpyllum L), the
herb of purple coneflower (lat. Echinacea Angustifolia), leaves of black currant (lat. Ríbes nígrum); leaves of
walnut (lat. Juglans regia L.), with the predictive total iodine content of 82.001 µg/100 g. Laboratory and
modeling experiments were performed for obtaining an extract and developing the technology of making the
beverage based on it. The developed non-alcoholic beverage has a distinctive taste and a distinct herbal aroma
with light notes of dried fruit; it has a preventive effect for the iodine deficiency conditions, which has been
confirmed experimentally – the content of functional ingredient (iodine) in it is 48.0 mg/100 cm3 (32 % of the
666. recommended daily intake of iodine), which corresponds to the requirements of GOST R 56543-2015 applicable
to functional drinks. In terms of quality and safety, the beverage meets the requirements of regulatory documents
of the Russian Federation and the Eurasian Economic Union and may be included in the diets of various age 3795-
groups as a taste beverage and a functional beverage for preventing iodine deficiency. 3805

Keyword : iodine deficiency, nonconventional plant raw materials, plan of the experiment, analysis of
variance, phytocomposition mixture, extract, ultrasonic treatment, non-alcoholic beverage.
References:
1. I. Gunnarsdottir, L. Dahl, “Iodine intake in human nutrition: a systematic literature review”. Food & Nutrition Research, 56, 2012, pp.
19731.
2. B. Hetzel, “Iodine-deficiency disorders”. London: Churchill Livingstone, 2000.
3. M. Zimmermann, “Are weaning infants at risk of iodine deficiency even in countries with established iodized salt programs?”. Nestle
Nutr Inst Workshop Ser, 70, 2012, pp. 137–46.
4. Normy fiziologicheskikh potrebnostei v energii i pishchevykh veshchestvakh dlya razlichnykh grupp naseleniya Rossiiskoi Federatsii
[Rational nutrition. Norms of the physiological needs in energy and nutrients for various groups of population of the Russian
Federation]. Guide 2.3.1.2432-08. Moscow, 2008.
5. O.Y. Orlova, T.V. Pilipenko, L.P. Nilova, M.V. Nikulina, “Traditsionnye i perspektivnye rastitelnye istochniki ioda dlya
obogashcheniya pishchevykh produktov” [Traditional and promising plant sources of iodine for enriching food products]. National
Research University of Information Technologies, Mechanics and Optics scientific journal. Series "Processes and equipment in food
production", Saint-Petersburg, 4, 2015, pp. 26 – 34.
6. L.V. Donchenko, E.V. Scherbakova, L.Y. Rodionova, “Tekhnologiya funktsionalnykh produktov pitaniya” [The technology of
obtaining functional foods]: textbook. Krasnodar: KubSAU, 2009, p. 231.
7. L.V. Donchenko, E.V. Scherbakova, “Proektirovanie funktsionalnykh produktov pitaniya” [Development of functional foods]:
textbook. Krasnodar: KubSAU, 2010, p. 192.
8. A.V. Stepovoy, “Proizvodstvo bezalkogolnykh funktsionalnykh napitkov novogo pokoleniya” [Production of new generation non -
alcoholic functional beverages]: monograph. Krasnodar : KubSAU, 2013, p. 84.
9. GOST 28458-90. Vegetable feeds. Method for determination of iodine.
10. GOST 31660-2012 Foods. Anodic stripping voltammetric method of iodine mass concentration determination. 2012.
11. GOST R 54634-2011 Functional food products. Method of vitamin E determination. 2011.
12. StP00668034-23-15-2009 Materials of plant origin. The method of determination of the mass concentration of ascorbic, chlorogenic
and caffeic acids using capillary electrophoresis. 2009.
13. Industry Standard STO00668034-097-20018 Biological objects, products of processing. Determination of the mass concentration of
quercetin and rutin by high-performance capillary electrophoresis.
14. StP00668034-23-14-2009 Materials of plant origin. The method for determination of the mass concentration of ammonium cations,
potassium, sodium, magnesium, and calcium using capillary electrophoresis. Certification: GNU SKZNIISiV. 2009.
15. GOST 27998-88 Vegetable feeds. Methods for determination of iron.
16. GOST 26928–86 Foods. Method for determination of iron.
17. GOST R 54037-2010 Foodstuffs. Determination of water-soluble antioxidants content by amperometric method in vegetables, fruits,
products of their processing, alcoholic and non-alcoholic beverages. 2010.
18. GOST 6687.5-86 Non-alcoholic industry products. Methods for determination of organoleptic indices and products volume (with
Change No. 1, with amendment).
19. A.A. Khalafyan. “Statistica 6. Matematicheskaya statistika s elementami teorii veroyatnostei” [Statistica 6. Mathematical statistics with
elements of the probability theory]. Moscow: Binom, 2010, p. 491.
20. Promyshlennaya statistika: Kontrol kachestva, analiz protsessov, planirovanie eksperimentov v pakete STATISTICA [Industrial
statistics: Quality monitoring, analysis of processes, design of experiments in the STATISTICA software package]. Moscow: Lib-
rocom publishing house, 2013, p. 384.
21. GOST 6687.4-86 Non-alcoholic drinks, kvasses and syrups. Method of acidity determination.
22. FR.1.31.2008.01730 Method of measuring the mass fraction of arsenic and mercury in food products, food raw materials and baby food
using the method of inverse voltammetry. 2008.
23. FR 1.31.2008.01733 Method of measuring the mass fraction of cadmium, lead, copper, and zinc in food products using the method of
inverse voltammetry. 2008.
24. GOST 33504-2015 Food additives. Dihydroquercetin. Specifications. 2015.
25. MP 2.3.1.2432-08. Ratsionalnoe pitanie. Normy fiziologicheskikh potrebnostei v energii i pishchevykh veshchestvakh dlya razlichnykh
grupp naseleniya Rossiiskoi Federatsii [Rational nutrition. Norms of the physiological needs in energy and nutrients for various groups
of population of the Russian Federation]. Methodical recommendations. Moscow, 2008, p. 39.
26. GOST R 56543-2015 Functional beverages. General specifications. 2015.
27. CU TR 021/2011 "On food safety". 2011.
Anton Viktorovich Dvornikov, Sergei Anatolyevich Krylov, Gleb Igorevich Zagrebin, Anatoly
Authors:
Nikolaevich Afanasyev
Paper Title: Creating Electronic Atlases Using Spatiotemporal Data
Abstract: The authors have developed a method for creating and using spatiotemporal data for electronic
atlases, including the concept development, designing the database structure, developing methods for storing,
processing and displaying data, as well as their implementation as a historical geoportal. The types of electronic
atlases and their characteristics have been listed. The scenarios of using atlases have been considered, as well as
a system of controlling, updating, and storing data with due consideration for their spatial and temporal
component. The approaches to designing the database structure, indexing, retrieving, and protecting data have
been provided. The implementation of the method will allow to obtain spatial data as cartographic works for any
historical date and any territory, while the system of continuous data update will allow obtaining current
cartographic information. The developed method addresses the issues of spatiotemporal data storage, update, and
use in electronic atlas mapping, which will ensure the integration of multitemporal data into a single information
space of the area under study.

Keyword : atlas, database, electronic atlas, geoportal, spatiotemporal data.


667.
References:
1. Geoportal of the Republic of Mordovia. Available: http://geo13.ru/atlas/nature/4 3806-
2. Interactive Atlas of Switzerland. Available: http://www.atlas.bfs.admin.ch/maps/13/de/14680_178_175_169/23282.html 3812
3. H. Asche, A. Toskic, D. Spevec, and R. Engemaier, “The Demographic Atlas of Croatia – A Web-Based Atlas Information System”, in
Cartography in Central and Eastern Europe, G. Gartner, F. Ortag, Eds. Berlin: Springer, Berlin, Heidelberg, 2009, pp. 345-360.
4. A. M. Berlyant, Cartographic Dictionary. Moscow: Scientific World, 2005.
5. S. A. Krylov G. I. Zagrebin, A. V. Dvornikov, D. S. Loginov, and I. E. Fokin, “Teoreticheskiye osnovy avtomatizatsii protsess ov
atlasnogo kartografirovaniya” [Theoretical foundations of automating the atlas mapping processes], Bulletin of Universities "Geodesy
and Aerial Photography", vol. 62(3), 2018, pp. 283–293.
6. G. Langran, “Time in geographic information systems”, Geocarto International, vol. 7(2), 1992б ззю 184-205.
7. A. U. Frank, I. Campari, and U. Formentini, “Theories and Methods of Spatio-Temporal Reasoning in Geographic Space”,
Proceedings of International Conference GIS - From Space to Territory: Theories and Methods of Spatio-Temporal Reasoning. Pisa,
Italy, September 21-23, 1992.
8. V. A. Zolotov, V/ A. Semenov. “Perspektivnyye skhemy prostranstvenno-vremennoy indeksatsii dlya vizualnogo modelirovaniya
masshtabnykh industrialnykh proyektov” [Promising spatiotemporal indexing schemes for visual modeling of large-scale industrial
projects], Proceedings of the Institute for System Programming of the RAS, vol. 26(2), 2014, pp. 175–196.
9. P. Zhou, D. Zhang, B. Salzberg, G. Cooperman, and G. Kollios, “Close pair queries in moving object databases”, Proceedings of the
13th annual ACM international workshop on Geographic information systems. Bremen, Germany, November 04-05, 2005, pp. 2–11.
10. V. T. De Almeida, and R. H. Guting, “Indexing the trajectories of moving objects in networks”, Geoinformatica, vol. 9(1), 2005, pp.
33–60.
11. D. Pfoser, C. S. Jensen, and Y. Theodoridis, “Novel Approaches in Query Processing for Moving Object Trajectories”, Proceedings. of
the 26th International Confrrence on Very Large Data Bases. Cairo, Egypt, September 10-14, 2000, pp. 395–406.
12. V. Chakka, A. Everspaugh, and J. M. Patel, “Indexing Large Trajectory Data Sets with SETI”, in Proceedings of the Conference on
Innovative Data Systems Research, CIDR. Asilomar, CA, USA, January 05-08, 2003.
13. X. Xiong, and W. G. Aref, “R-trees with update memos”, in Proceedings of the 22 nd International Conference on Data Engineering,
ICDE. Atlanta, GA, USA, April 03-07, 2006.
14. J. A. Tayeb, O. Ulusoy, and O. Wolfson, “Quadtree-Based Dynamic Attribute Indexing Method”, The Computer Journal, vol. 41(3),
1998, pp. 185–200.
15. J. Dittrich, L. Blunschi, and M. A. Vaz Salles, “Indexing moving objects using short-lived throwaway indexes”, in Proceedings of the
International Symosium, SSTD. Aalborg, Denmark, July 08-10, 2009, pp. 189–207.

Authors: Hakyoung Kim


Effects of Combined Salt-Damage Resistant Agent on the Shrinkage, Chloride Penetration and
Paper Title:
Chemical Erosion of Mortar
Abstract: Reinforced concrete structures located on coastal landfill frequently adjoin sea-water
environment, and are exposed to sea water and humid environment during construction. Particularly, in the case
of large-scale structures like dams, their drying shrinkage is accompanied by fatal cracking, and thus chlorine
ion penetration becomes easier. The present study develops a salt damage-resistant agent (SRA) to which
aluminum salts, oligomer condensate, and amino alcohol derivatives with the alkyl group are applied as binding
inducers. SRA performs the roles of reducing the drying shrinkage of cement composites, binding chlorine ions,
and preventing erosion by sulfate ions. This study tests and evaluates its resistance to degradation factors that
may occur to structures constructed on coastal landfill and so on.
As a result of evaluating shrinkage cracking properties by performing the restrained shrinkage cracking test,
SRC showed the shrinkage reduction compared with BSC. As for the performance of resistance to chlorine ion
and the chemical sulfate erosion rate, SRC showed the highest resistance performance, followed by BSC and
OPC, regardless of the concentration of aqueous solutions for immersion. In addition, as for the rate of mortar
weight change by sulfate erosion, the SRA-intermixed SRC mixture showed a weight reduction rate at the level
of 1/3 of BSC and 1/6 of OPC, respectively.

Keyword : Aluminum salts, Oligomer Condensate, Chloride Penetration, Dry Shrinkage, Chemical
Erosion.
References:
668. 1. Dousti, A., Shekarchi, M., Alizadeh, R., and Taheri-Motlagh, A., 2011, “Binding of externally supplied chlorides in micro silica
concrete under field exposure conditions”, Cement and Concrete Composites, 33(10), pp.1071-1079. 3813-
2. Hussain, S. E., and Al-Saadoun, S. S., 1993, “Effect of tricalcium aluminate content of cement on chloride binding corrosion of
reinforcing steel in concrete”, Materials Journal, 89(1), pp.3-12. 3818
3. Shin, C. B., and Kim, E. K., 2002, “Modeling of chloride ion ingress in coastal concrete”, Cement and Concrete Research, 32(5 ),
pp.757-762.
4. Martın-Pérez, B., Zibara, H., Hooton, R. D., and Thomas, M. D. A., 2000, “A study of the effect of chloride binding on service life
predictions”, Cement and Concrete Research, 30(8), pp.1215-1223.
5. Truc, O., Ollivier, J. P., and Nilsson, L. O., 2000, “Numerical simulation of multi-species transport through saturated concrete during a
migration test—MsDiff code”, Cement and Concrete Research, 30(10), pp.1581-1592.
6. Luping, T., and Nilsson, L. O., 1993, “Rapid determination of the chloride diffusivity in concrete by applying an electric field”,
Materials Journal, 89(1), pp.49-53.
7. Zhu, Q., Jiang, L., Chen, Y., Xu, J., and Mo, L., 2012, “Effect of chloride salt type on chloride binding behavior of concret e”,
Construction and Building Materials, 37, pp.512-517.
8. Arya, C., Buenfeld, N. R., and Newman, J. B., 1990, “Factors influencing chloride-binding in concrete”, Cement and Concrete
research, 20(2), pp.291-300.
9. Zibara, H., Hooton, R. D., Thomas, M. D. A., and Stanish, K., 2008, “Influence of the C/S and C/A ratios of hydration products on the
chloride ion binding capacity of lime-SF and lime-MK mixtures”, Cement and Concrete Research, 38(3), pp.422-426.
10. Wang, Y., Shui, Z., Gao, X., Yu, R., Huang, Y., and Cheng, S., 2019, “Understanding the chloride binding and diffusion behaviors of
marine concrete based on Portland limestone cement-alumina enriched pozzolans”, Construction and Building Materials, 198(20),
pp.207-217.
11. Justnes, H., 1998, “A review of chloride binding in cementitious systems”, Nordic Concrete Research-Publications, 21, pp.48-63.
12. Funahashi, M., 1990, “Predicting corrosion-free service life of a concrete structure”, ACI Materials Journal, 87(6), pp.581-587
13. Hudak, P. F., 2000, “Sulfate and chloride concentrations in Texas aquifers”, Environment international, 26(1-2), pp.55-61.
14. Browne, R. D., Domone, P. L., and Geoghegan, M. P., 1977, “Deterioration of concrete structures under marine conditions and t heir
inspection and repair”, In Maintenance of maritime structures, Thomas Telford Publishing, pp. 137-162
15. Korea Concrete Institute, 2009, “Concrete Standard Specification”, KCI
16. Sumer, M., 2012, “Compressive strength and sulfate resistance properties of concretes containing Class F and Class C fly ashe s”
Construction and Building Materials, 34, pp.531-536.

Authors: Hakyoung Kim


Influence of Combined Expansive Agent and Supplementary Cementitious Materials Against
Paper Title:
Chloride Effects in Offshore Concrete
Abstract: The performance of hardened concrete may be degraded by the chemical action of chlorine
ions (Cl-) or sulfate (SO42-) in sea water. Thus, supplementary cementitious materials (SCMs) are used in
replacement of OPC for the purpose of improving the durability of concrete, but show weaknesses such as
669. drying shrinkage. Judging that the sole use of SCMs has limitations in designing concrete durability to cope with
the environment of salt damage, this study suggests the use of aluminum-based inorganic salts (AIS) in the form
3819-
of chemical agents. This study aims to select material of the highest efficiency in enhancing the durability of
3825
offshore concrete, by performing the durability evaluation of typical four SCMs and four AISs that are
intermixed as single materials. There has been almost no domestic or overseas research on Al-based organic
salts intermixed in the form of chemical agents for the purpose of improving resistance to salt damage and
offsetting drying shrinkage. It was confirmed that mortar intermixed with Al-based chemical admixtures showed
great performance improvement in the rates of length change. The mixture proportion intermixed with sulfate
ion (SO42-) as binding anion tended to show unfavorable reaction in terms of resistance to sulfate erosion and
drying shrinkage. On the other hand, the mixture proportion set with nitrite ion (NO3-) as cation showed
excellent performance improvement in all evaluation items, compared with non-intermixture. It is deemed that it
will be necessary to highlight further and make use of the expansion properties and chloride binding
performance of Al-based organic salts through the design of offshore concrete mixture proportions.

Keyword : Aluminum salts, SCMs, Chloride Penetration, Dry Shrinkage, Sulfate erosion.
References:
1. Martın-Pérez, B., Zibara, H., Hooton, R. D., and Thomas, M. D. A., 2000, “A study of the effect of chloride binding on service life
predictions”, Cement and Concrete Research, 30(8), pp.1215-1223.
2. Yuan, Q., Shi, C., De Schutter, G., Audenaert, K., and Deng, D., 2009, “Chloride binding of cement-based materials subjected to
external chloride environment – a review", Construction and building materials, 23(1), pp.1-13.
3. Shin, C. B., and Kim, E. K., 2002, "Modeling of chloride ion ingress in coastal concrete", Cement and Concrete Research, 32(5),
pp.757-762.
4. BS 8500, 2006, “Concrete complementary British Standard to BS EN 206-1 Part 1: Method of specifying and guidance for the
specifier”, British standard
5. ACI 201, 2000, “ACI Manual of concrete practice 2000, materials and general properties of concrete, Chapter 2 – aggressive chemical
exposure, American concrete institute”, pp.8-12
6. H. Justnes, 1998, “A review of chloride binding in cementitious systems,” Nordic Concrete Research, 21, pp.48-63.
7. Rahla, K. M., Mateus, R., and Bragança, L., 2019, "Comparative sustainability assessment of binary blended concretes using
Supplementary Cementitious Materials (SCMs) and Ordinary Portland Cement (OPC). Journal of Cleaner Production, 220, pp.445-
459.
8. Cyr, M., 2013, "Influence of supplementary cementitious materials (SCMs) on concrete durability. In Eco-efficient concrete",
Woodhead Publishing, pp. 153-197.
9. Samad, S., and Shah, A., 2017, "Role of binary cement including Supplementary Cementitious Material (SCM), in production of
environmentally sustainable concrete: A critical review", International journal of Sustainable built environment, 6(2), pp.663-674.
10. Klemczak, B. A., 2014, "Modeling thermal-shrinkage stresses in early age massive concrete structures–Comparative study of basic
models", Archives of Civil and Mechanical Engineering, 14(4), pp.721-733.
11. Kawaguchi, T., and Nakane, S., 1996, "Investigations on determining thermal stress in massive concrete structures", Materials Journal,
93(1), pp.96-101.
12. Wang, R., Yu, J., He, P., Gu, S., Cao, Z., and Liu, Q., 2019, "Investigation of ion chelator and mineral admixtures improving salt-frost
resistance of cement-based materials", Construction and Building Materials, 227, 116670.
13. Wang, Y., Shui, Z., Gao, X., Yu, R., Huang, Y., and Cheng, S., 2019, “Understanding the chloride binding and diffusion behaviors of
marine concrete based on Portland limestone cement-alumina enriched pozzolans”, Construction and Building Materials, vol.198,
pp.207-217.
14. Al-Khaja, W. A., Rasheeduzzafar, W. A., Al-Sayed, M. H., and Al-Khoder, A. A., 1994, "Sulfate Resistance and Chloride Penetration
Characteristics of High-Strength Concrete", Special Publication, 149, pp.123-134.
15. Maes, M., and De Belie, N., 2014, "Resistance of concrete and mortar against combined attack of chloride and sodium sulphate",
Cement and Concrete Composites, 53, pp.59-72.
16. Valipour, M., Pargar, F., Shekarchi, M., Khani, S., and Moradian, M., 2013, "In situ study of chloride ingress in concretes c ontaining
natural zeolite, metakaolin and silica fume exposed to various exposure conditions in a harsh marine environment", Construction and
Building Materials, 46, pp.63-70.

Authors: Uday Thareja, Ruchi Jain

Paper Title: Artificial Intelligence Enabled In-Video Advertising: Infiltrating The Fashion Industry
Abstract: This paper focuses on the enormous impact of Artificial Intelligence technology for enabling
the usage of In-Video Advertising as a part of the content marketing strategy for fashion brands. Every brand
wants to reach consumers when they are prone to get influenced. However, as the consumers are spoilt for
choices and the digital mediums are creating unique customer journeys with an individualistic approach. Hence,
there exists a requirement of more engaging advertising approach, to catch the attention of the consumer and to
enable discovery of brands at high moments of desire. Since this paper focuses on In-Video Advertising &
Artificial Intelligence, thus an understanding of the building blocks of In-Video advertising calls to delve deeper
in Artificial Intelligence and content marketing strategy. This paper discusses a unique opportunity for Fashion
brands to use In-Video Advertising as a disruptive, efficient and engaging tool to reach consumers when they are
in the best state to be influenced. This novel advertising option can benefit marketers in the fashion industry and
can generate significant revenues.
670.
Keyword : Artificial Intelligence, In video Advertising, content Marketing strategy, OTT, fashion industry 3826-
3832
References:
1. Medium.. (2018). What exactly is Machine Learning?. [online] Available at: https://medium.com/swlh/what-exactly-is-machine-
learning-50789d7860ec
2. Kietzmann, J., Paschen, J. and Treen, E. (2018). Artificial Intelligence in Advertising. Journal of Advertising Research, 58(3), pp.263-
267.
3. Miralles-Pechuán, L., Rosso, D., Jiménez, F. and García, J. (2016). A methodology based on Deep Learning for advert value
calculation in CPM, CPC and CPA networks. Soft Computing, 21(3), pp.651-665.
4. Goldberg, L. and Goldberg, L. (2018). A brief history of artificial intelligence in advertising – Econsultancy. [online] Econsultancy.
Available at: https://econsultancy.com/a-brief-history-of-artificial-intelligence-in-advertising/
5. Technopak.com. (2019). [online] Available at: http://www.technopak.com/Files/indian-apparel-market.pdf
6. Liao, W., Chen, K. and Hsu, W. (2008). AdImage.
7. Hammond, K. (2015). Practical Artificial Intelligence for Dummies. John Wiley & Sons.
8. Cockburn, I., Henderson, R. and Stern, S. (2018). The Impact of Artificial Intelligence on Innovation: An Exploratory Analysis.
[online] NBER. Available at: http://www.nber.org/chapters/c14006
9. Gartner.com. (2017). [online] Available at: https://www.gartner.com/imagesrv/media-products/pdf/Criteo/Criteo-1-43VKFYC.pdf
10. SAGE Journals. (2011). Applications of artificial intelligence in the apparel industry: a review - ZX Guo, WK Wong, SYS Leung, Min
Li, 2011. [online] Available at: https://journals.sagepub.com/doi/abs/10.1177/0040517511411968
11. Broder, A., Fontoura, M., Josifovski, V. and Riedel, L. (2007). A semantic approach to contextual advertising.
12. Schreuder, A., Schreuder, A. and van Wyk, J. (2017). [online] Samra.co.za. Available at: http://www.samra.co.za/wp -
content/uploads/2017/05/Customer-Centric-Artificial-Intelligence_Schreuder-Schreuder-and-van-Wyk.pdf
13. Ko, E. and Bong Park, Y. (2002). Determinants of internet advertising effects: advertisement types and clothing involvement. Irish
Marketing Review, 15(2), pp.51 - 58.
14. Kim, J. (2017). The Disruptive Impact of Technology on the Fashion Industry. MIT.
15. Lee, J. and Song, J. (2019). Editorial: recent trends in advertising and required research in emerging markets—an Asian
perspective. International Journal of Advertising, 38(4), pp.507-510.
16. Dasgupta, S. and Grover, P. (2019). Impact of Digital Strategies on Consumer Decision Journey. Academy of Marketing Studies
Journal, 23(1).
17. Tao Mei, Xian-Sheng Hua and Shipeng Li (2009). VideoSense: A Contextual In-Video Advertising System. IEEE Transactions on
Circuits and Systems for Video Technology, 19(12), pp.1866-1879.
18. Juniperresearch.com. (2019). Retailer Spending on AI to Grow Nearly Fourfold. [online] Available at:
https://www.juniperresearch.com/press/press-releases/retailer-spending-on-ai-to-grow
19. MIlnes, H. (2018). Artificial intelligence is informing how fashion designers create – Glossy. [online] Glossy. Available at:
https://www.glossy.co/connected-fashion/how-artificial-intelligence-is-informing-how-fashion-designers-create\
20. Mageean, L. (2019). The Future of Fashion: How AI is Changing the Fashion Retail Industry. [online] WhichPLM. Available at:
https://www.whichplm.com/the-future-of-fashion-ai-changing-fashion-retail-industry/
21. Pulizzi, J. (2012). Content Marketing Definition - Examples. [online] Content Marketing Institute. Available at:
https://contentmarketinginstitute.com/2012/06/content-marketing-definition/
22. Callanan, S. (2018). The Future Of Interactive Video - WIREWAX CEO @ Unbound London 2018 [Video]. Retrieved from
https://www.youtube.com/watch?v=5yT8EIWKW88
23. Shewan, D. (2017). Dwell Time: The Most Important Metric You’re Not Measuring.
https://www.wordstream.com/blog/ws/2014/06/10/dwell-time
24. Click-Through Rate (CTR) - Definition - Digital Marketing Encyclopedia. (2019). https://willmarlow.com/click-through-rate-ctr/
25. Mackey, M. (2019). What Is Click-Through Rate & Why CTR Is Important https://www.searchenginejournal.com/ppc-guide/click-
through-rate-ctr/#close
26. Du Plessis, C. (2015). An exploratory Analysis of essential elements of Content Marketing.
27. Qin, X., & Jiang, Z. (2019). The Impact of AI on the Advertising Process: The Chinese Experience. Journal Of Advertising, 48(4), 338-
346. doi: 10.1080/00913367.2019.1652122
28. Giri, C., Jain, S., Zeng, X., & Bruniaux, P. (2019). A Detailed Review of Artificial Intelligence Applied in the Fashion and Apparel
Industry. IEEE Access, 7, 95376-95396.
29. Deng, S., Tan, C., Wang, W., & Pan, Y. (2019). Smart Generation System of Personalized Advertising Copy and Its Application t o
Advertising Practice and Research. Journal Of Advertising, 48(4), 356-365.
30. Boman, K., & Raijonkari, K. (2017). Online Video as a Marketing Tool A quantitative survey on video marketing habits Kalle Bo man
Kalle Raijonkari Bachelor’s thesis April 2017.
31. Richardson, O. (2019). AI is eating Advertising. Caribbean Business, eNewspaper(April 25, 2019), 30.
32. Callanan, S. (2019). WIREWAX In Conversation | IBC 2019. https://youtu.be/jyDb_W9TuxM
33. Malthouse, E., Hessary, Y., Vakeel, K., Burke, R., & Fudurić, M. (2019). An Algorithm for Allocating Sponsored Recommendations
and Content: Unifying Programmatic Advertising and Recommender Systems. Journal Of Advertising, 48(4), 366-379.

Authors: Gennady Nazarenko, Alexandra Sitnikova, Andrey Baybarin

Paper Title: Innovations in Teaching Criminal Law


Abstract: This article is devoted to identifying the correlation of such categories of conceptuality as the
concept, conceptual scheme, conceptual system, conceptual analysis, concept and conceptualization in relation to
criminal law. It is noted that in classical science the concept is understood as a preliminary organization of
theoretical material, and in criminal law the concept is often identified with theory. The article shows that the
development of scientific thought goes through three stages of development: from a concept (initial idea) to a
conceptual scheme (a detailed idea), then to a conceptual system (a complete scientific theory). In this context,
competing criminal law theories are considered: the concept of the stages of a crime (a contradictory conceptual
system) and the concept of types of unfinished crime (a conceptual scheme). The authors introduce the notion of
“concept” into the scientific language of criminal law to denote the mental units of criminal law knowledge, which
are widely used by the doctrine, as well as enshrined in the criminal legislation. Legislative concepts are the means
of constructing criminal law, institutions and other normative blocks. Doctrinal concepts appear in criminal law as a
means of interpreting criminal law regulations or are used to formulate new concepts. Concepts of this type
function as elements of criminal law in the mode of understanding and explanation. In the process of
671. conceptualization, the mental images of objects that have a criminal legal significance are first objectified as
doctrinal concepts, and then enshrined in criminal law as legal concepts. 3833-
In conclusion, the authors note that inexperienced postgraduate students rarely use the categories of conceptuality 3836
and its parameters fixed in the regulatory material of the Criminal Code in their studies. As a result, such studies
constitute a compilation review of the views of others, which unreasonably stands out as new (derivative)
knowledge in the absence of a detailed author’s concept.

Keyword : concept, legislative concept, doctrinal concept, conceptual idea, conceptual scheme, conceptual
system, conceptualization, postgraduate education.
References:
64. K. Szczucki, “Ethical legitimacy of criminal law”, International Journal of Law, Crime and Justice, 53, 2018, pp. 67-76.
65. L.S. Miller, J.T. Whitehead, “Chapter 14: Innovations and Predictions in Criminal Justice”. Report Writing for Criminal Justice
Professionals (Fourth Edition), 2011, pp. 283-297.
66. Dzh. Fletcher, A.V. Naumov, “Osnovnye koncepcii ugolovnogo prava”. Moscow, 1998, p. 512.
67. J.M. Pollock, Criminal Law. 2009. LexisNexis, Anderson Pub., p. 897.
68. F.A. Kuzin, “Dissertaciya: prakticheskoe posobie dlya doktorantov, aspirantov i magistrantov”. Moscow, 2008, pp. 38.
69. S.A. Lebedev, “Filosofiya nauki”: nauchnoe izdanie. Moscow, 2000, pp. 553-555.
70. N. Prior, “Part III: List of Graduate Programs in Criminal Justice and Criminology in Canada, Alphabetical by School Name”: (Information
taken directly from school/department websites). Graduate Study in Criminology and Criminal Justice, 2015, pp. 445-458.
71. E.A. Kirillova, R.A. Kurbanov, N.V. Svechnikova, T.E. Zul'fugarzade, S.S. Zenin, “Problems of fighting crimes on the internet”, Journal of
Advanced Research in Law and Economics, 8(3), 2017, pp. 849-856.
72. N.I. Zagorodnikova, S.V. Borodina, V.F. Kirichenko, “Ugolovnoe pravo. Chast' Obshchaya”. Moscow, 1966, pp. 243 -249.
73. J. Crystal, “Criminal justice in the Middle East”, Journal of Criminal Justice, 29(6), 2001, pp. 469-482.
74. T. Schröder, “Corporate crime, the lawmaker's options for corporate criminal laws and Luhmann's concept of “useful illegality ”,
International Journal of Law, Crime and Justice, 57, 2019, pp. 13-25.
75. S. Sitnikova, “Neokonchennoe prestuplenie i ego vidy”. Moscow, 2002, pp. 6-8.
76. N. Persak, “Beyond public punitiveness: The role of emotions in criminal law policy”, International Journal of Law, Crime an d Justice, 57,
2019, pp. 47-58.
77. Yu.E. Prohorov, “Vpoiskah koncepta: nauchnoe izdanie”. Moscow, 2009, p. 13-19.
78. K.V. Wright, “Twenty-two years of federal investment in criminal justice research: The National Institute of Justice, 1968–1989”, Journal of
Criminal Justice, 22(1), 1994, pp. 27-40.
79. A.A. Gricanov, “Vsemirnaya enciklopediya: Filosofiya”. Moscow, 2001, p. 506.
80. S. Shavell, “Law and Economics”, International Encyclopedia of the Social & Behavioral Sciences, 2015, pp. 448-453.
81. H. Ditrich, “Cognitive fallacies and criminal investigations”, Science & Justice, 55(2), 2015, pp. 155-159.
82. L.M. Levett, A.M. Thompson, “Law and Society”, International Encyclopedia of the Social & Behavioral Sciences, 2015, pp. 509 -514.
83. M. Catino, “Mafia rules. The role of criminal codes in mafia organizations”, Scandinavian Journal of Management, 31(4), 2015, pp. 536-
548.

Authors: A. T. Varakin, D. K. Kulik, V. V. Salomatin, V. S. Zoteev, G. A. Simonov

Paper Title: Hematological Parameters of Boars-Producers at Use of a Natural Mineral Additive in a Diet
Abstract: The aim of the research was to study the morphological and biochemical indicators of the blood of
boars-producers using in the diet of a natural mineral additive-bischofite of the Volgograd field. To conduct
scientific and economic experience, four groups of boars-producers of 5 animals each were formed. In the
experiment, boars-producers of the control group received the main diet, and I, II and III experimental groups – in
addition to the main diet, respectively, 5, 8 and 11 ml per animal per day of natural bischofite. Against the
background of scientific and economic experience, studies were carried out to study hematological parameters in
experimental boars of comparable groups. The results of the research showed that the hematological parameters in
the boars of the producers of the compared groups were within the physiological norm and characterized the normal
activity of all organs and systems. Compared with animals of the control group, at the end of the main period, after
testing the blood of the boars of the experimental groups, the number of erythrocytes was higher by 2.77-6.77%,
hemoglobin - by 0.80-2.95%, and the total protein content in blood serum was higher by 0.87-1.57%, albumin by
2.44-6.50% . The boars of the experimental groups exceeded the albumin-globulin coefficient of the animals of the
control group by 2.56-8.97%. The content of inorganic magnesium in the blood serum of the boars-producers of the
experimental groups, compared with the control, was 0.14 more; 0.20 and 0.24 mmol / L. According to the results
on the productive qualities of boars, the introduction of natural bischofite into the diets contributed to an increase in
ejaculate volume by 5.0-7.81%; increased sperm cell concentration in 1 ml of sperm - by 2.79-5.12%, sperm
activity - by 2.27-6.82%, in comparison with the control. The use of bischofite in the diet of boars, in comparison
with the control, contributed to the economic effect due to the cost of additional sperm production - 14080.0 -
22848.0 rubles. At the same time, the best results in terms of hematological and productive indicators of boars-
producers, economic efficiency were achieved when bischofite was included in the diet at a dose of 8 ml per boar
per day.

672.
Keyword : boars-producers, diet, bischofite of the Volgograd field, hematological parameters, sperm production
quality, economic efficiency. 3837-
3841
References:
1. D.K. Kulik, A.T. Varakin, V.V. Salomatin, E.A. Harlamova, “Influence of feed additives on productive indicators of ram”,
Ecological and meliorative aspects of environmental management: materials of the International Scientific and Practical
Conference. Volgograd: FSBI VO Volgograd SAU, vol. 4, 2017, pp. 259-264
2. G.R. Fenwick, “The assessment of a new protein source – Rapeseed”, Proc. Nutr. Soc, vol. 41, 1982, pp. 277-288.
3. S.A. Miroshnikov, E.V. Yausheva, E.A. Sizova, E.P. Miroshnikova, V.I. Levahin, “Comparative assessment of effect of copper
nano- and microparticles in chicken”, Oriental Journal of Chemistry, vol. 31(4), 2015, pp. 2327-2336.
4. V.S. Zoteev, E.I. Pisarev, S.I. Nikolaev, V.V. Salomatin, A.T. Varakin, “False flax cake in mixed feed for the fatten ing of lactating
cows and dairy stores”, Research Journal of Pharmaceutical, Biological and Chemical Sciences, vol. 9(5), 2018, pp. 1422-1428.
5. H.B. Baymishev, A.A. Perfilov, O.N. Pristyajnyuk, N.N. Edrenin, “Reproductive and productive qualities of primary heifers obtained
from cows under conditions of intensive technology”, Izvestiya of Samara state agricultural Academy, vol. 1, 2009, pp. 22-24.
6. H.Z. Valitov, S.V. Karamaev, “Productive longevity of cows in conditions of intensive milk production technolog y”, Samara: RIC
SGSHA, 2012.
7. A.P. Korobov, A.A. Vasilev, “The effectiveness of the use of starter feed in feeding prenursery pigs”, Reports of Russian Academy of
Agricultural Sciences, vol. 3, 2001, p. 43
8. S.I. Nikolaev, V.N. Struk, S.V. CHehranova, A.V. Nikishenko, “Influence of mustard protein-containing feed concentrate “Gorlinka”
on milk production of cows”, News of the Nizhnevolzhskyagrouniversity complex: science and higher professional education, vol.
4(48), 2017, pp. 205-212.
9. G.A. Simonov, V.M. Kuznetsov, V.S. Zoteev, A.G. Simonov, “Organization of complete feeding of dairy cows in the Sakhalin
region”, Scientific and practical ways to improve environmental sustainability and socio-economic support for agricultural
production: materials of the International Scientific and Practical Conference, with. Solenoye Zaymische: FSBI “Pre-Caspian
Research Institute of Arid Farming”, 2017, pp. 1369-1371.
10. I.F. Gorlov, V.I. Levakhin, V.F Radchikov, V.F. Tsai, S.E. Bozhkova, “Еffect of feeding with organic microelement complex on
blood composition and beef production of young cattle”, Modern Applied Science, vol. 9(10), 2015, pp. 8-16.
11. A.T. Varakin, V.V. Salomatin, E.A. Harlamova, T.A. Varlamova, “The efficiency of milk production using flax and rapeseed
millcake”, Izvestiya of Samara state agricultural Academy, vol. 13, 2018, pp. 30-34
12. A.M. Uhtverov, Kh.B. Baymishev, I.N. Khakimov, M.A. Kohanov, V.S. Grigoryev, A.T. Varakin, “Duration of economic use of
breeding sows with the different levels of fat depth and early maturity”, Research Journal of Pharmaceutical, Biological and
Chemical Sciences, vol. 9(5), 2018, pp. 935-942.
13. V.M. Kulikov, A.G. Korotkov, V.V. Salomatin, A.T. Varakin, “Complex mineral dressing for animals - Volgograd bischofite”,
Zootechnics, vol. 1, 1993, pp. 29-32
14. A.T. Varakin, V.V. Salomatin, O.V. CHeprasova, D.V. Nikolaev, “Physiological indicators and meat productivity of young pigs f or
fattening with the inclusion of the feed additive Bishtreon in the rations”, Zootechnics, vol. 3, 2012, pp. 20-22
15. V .Salomatin, A. Varakin, M. Salomatina, “Bishofit in pigs feeding”, Animal husbandry of Russia, vol. 6, 2015, pp. 27-28
16. V. Salomatin, A. Ryadnov, A. Shperov, “Meat productivity and biochemical blood parameters of pigs with feed additives of
selenium-organic preparations into rations”, Chief livestock specialist, vol. 2, 2010, pp. 32-35
17. C.F. Nascimento, R.H. Branco, S.F. Bonilha, J.N. Cyrillo, J.A. Negrão, M.E. Mercadante, “Residual feed intake and blood variables
in young Nellore cattle”, Journal of Animal Science, vol. 93(3), 2015, pp. 1318-1326.
18. V.V. Salomatin, A.T. Varakin, D.A. Zlepkin, “The effect of natural bischofite on the morphological and biochemical blood
parameters of fattened pigs”, Pig production, vol. 2, 2012, pp. 68-70
19. W.R. Butler, J.J. Calaman, S.W. Beam, “Plasma and milk urea nitrogen in relation to pregnancy rate in lactating dairy cattle”,
Journal of Animal Science, vol. 74(4), 1996, pp. 858-865.
20. C.A. Lents, L.A. Rempel, J. Klindt, T. Wise, D. Nonneman, B.A. Freking, “The relationship of plasma urea nitrogen with growth
traits and age at first estrus in gilts”, Journal of Animal Science, vol. 91(7), 2013, pp. 3137-3142.
21. V.V. Salomatin, A.A. Ryadnov, T.A. Ryadnova, “Physiological indicators of fattened pigs with using biologically active preparations
in diets”, Feeding farm animals and fodder production, vol. 6, 2012, pp. 39-41.

Authors: Ivan Alekseevich Minakov, Alexander Valerievich Nikitin

Paper Title: Agricultural Market Development: Trends and Prospects


Abstract: The present article considers the economic situation in the agri-food market: competition, supply that
is formed by national production, import and export of products, producer and consumer prices, and government
regulation of the market. In the structure of commodity resources, a considerable share of certain types of products
(fruits, vegetables, and milk and dairy products) is imported, which improves the competition in the national
market. The formation of commodity resources at the expense of the national production has been considered. The
parameters for developing the agricultural sectors that provide import substitution in the agri-food market have
been calculated. The areas of improving the production (concentration of commodity production in agricultural
organizations and farms, transferring industries to the innovative development, modernizing the existing production
facilities, building new modern facilities, improving state support) and efficiency of the commercial activity
(market segmentation, positioning of goods, creation of marketing services in large agricultural organizations
(agricultural holdings, agricultural firms) and processing enterprises, production and marketing, and supply
structures (agricultural formations, unions (associations), consumer marketing (trade) cooperatives, consumer
communities) have been grounded.

Keyword : market, competition, demand, supply, price, marketing, production and marketing organizations,
Russia.
References:
1. Minakov I.A. “Formirovanie i razvitie agroprodovolstvennogo rynka” [Formation and Development of the Agri-Food Market].
Michurinsk: Publishing House of the Michurinsk State Agrarian University, 2013, p. 225.
2. Minakov I.A., Kvochkin A.N., Sabetova L.A. “Ekonomika agroprodovolstvennogo rynka” [Economics of the Agri-Food Market].
Moscow: INFRA-M. 2014, p. 232.
673. 3. Sharapova N.V. “Gosudarstvennoye regulirovaniye agroprodovolstvennogo rynka: antimonopolnye protsessy” [State Regulation of t he
Agri-Food Market: Antimonopoly Processes]. Economics of Agricultural and Processing Enterprises, 11, 2017, pp. 10–14.
4. Minakov I.A. “Osobennosti formirovaniya i funktsionirovaniya agroprodovolstvennogo rynka” [Peculiarities of Forming and Functioning
3842-
of the Agri-Food Market]. Economics of Agricultural and Processing Enterprises, 4, 2014, pp. 63–65. 3847
5. Kulikov N. “Problemy importozameshcheniya plodovo-yagodnoy produktsii na agroprodovolstvennom rynke Rossii” [Problems of Import
Substitution of Fruit and Berry Products on the Agri-Food Market of Russia], AIC: Economics, Management, 6, 2015, pp. 3–12.
6. Gosudarstvennaya programma razvitiya selskogo hozyaystva i regulirovaniya rynkov selskokhozyaystvennoy produktsii, syrya i
prodovolstviya na 2013 – 2020 gody. Postanovleniye Pravitelstva Rossiyskoy Federatsii No. 717 ot 14 iyulya 2012 g. [State Program for
the Development of Agriculture and Regulation of Agricultural Products, Raw Materials and Food Markets for 2013 – 2020. Decree of the
Government of the Russian Federation No. 717 dated July 14, 201].
7. Zhidkov S.A. “Theoretical Aspect of Development of Market Environment In Grain Farming”, The Journal of Social Sciences Research,
Special issue December, 2018, pp. 85–89.
8. Maslova V.V., Kibirov A.Ya. “Nauchnye osnovy formirovaniya tsen v APK” [Scientific Fundamentals of Price Formation in the Agro-
Industrial Complex], Economics, Labor, Management in Agriculture, 11, 2018, pp. 8–13.
9. Kibirov A.Ya. “O regulirovanii agroprodovolstvennogo rynka stran Yevropeyskogo Soyuza v usloviyakh globalizatsii” [On Regulating the
Agri-Food Market of the Countries of the European Union in the Context of Globalization], Economics, Labor, Management in
Agriculture, 2, 2016, pp. 21–25.
10. Nuraliev S.U. “Torgovo-ekonomicheskaya politika i problemy importozameshcheniya na prodovolstvennom rynke” [Trade and Economic
Policy and the Problems of Import Substitution in the Food Market]. Economics of Agricultural and Processing Enterprises, 1, 2018, pp.
2–5.
11. Kulikov I., Minakov I. “A Socio-economic Study of the Food Sector: The Supply Side”, European Research Studies Journal, Vol. XXI, Is.
4, 2018, pp. 175–184.
12. Solopon V.A., Minakov I. A. “Food Safety in the Sphere of Production and Consumption of Vegetable Products”, International Jo urnal of
Engineering & Technology, 7 (4.38), 2018, pp. 523 – 527.
13. Polunin N.Yu. “Marketingovy podkhod k formirovaniyu infrastruktury agroprodovolstvennogo rynka” [Marketing Approach to Forming
the Infrastructure of the Agri-Food Market], Economics, Labor, Management in Agriculture, 2, 2018, pp. 106–111.
14. Romanyuk M.A. Mukhametzyanov R.R., Gruziy S.V. “Sovremennoye sostoyaniye i problemy razvitiya selskokhozyaystvennogo
proizvodstva i agroprodovolstvennogo rynka Rossii” [The Current State and Problems of the Development of Agricultural Production and
the Agri-Food Market of Russia], Economics of Agricultural and Processing Enterprises, 6, 2018, pp. 18–23.
15. Stavtsev A.N., Khashir A.A., Koroleva Yu.M., Natarov D.S., Romanenko R.G. “Metodicheskiye podkhody k otsenke
konkurentosposobnosti na rynke agroprodovolstvennoy produktsii” [Methodological Approaches to Assessing Competitiveness in the
Agri-Food Market], Economics, Labor, Management in Agriculture, 1, 2019, pp. 4–14.

674. Authors: Marina Yurievna Romankina, Yulia Alexandrovna Fedulova


Ecological and Faunistic Structure of Ground Beetle Population (Coleoptera, Carabidae) of Forest
Paper Title:
Belts in The Tambov Region (Russia)
Abstract: The article presents the analysis of ground beetle population in forest belts of different types. The
ecological structure of ground beetle complexes of forest belts is determined by soil and moisture conditions.
Differences in the diversity of ground beetle populations depending on a complex of soil and plant conditions and
the nature of anthropogenic impact are found. The increase in steppe formation and xerophytism conditions in
forest belts leads to a decrease in species diversity of the genera Carabus, Poecilus, Pterostichus, Calathus, Amara
and Harpalus.

Keyword : artificial forests, species diversity, dominance structure, community stability, ecological structure,
life form.
References:
1. V.M. Berezina, “Izmenenie entomofauny pochv v svyazi s perekhodom iz uslovii stepi v usloviyakh lesa” [Entomofauna change of soils in
connection with the transition from steppe conditions to forest conditions]. “Entomologicheskoe obozrenie” [Entomological Review],
27(1-2), 1937, pp. 77-112.
2. S.I. Sigida, “O nekotorykh osobennostyakh fauny zhuzhelits polezashchitnykh lesopolos razlichnogo vozrasta na Stavropo le” [About some
features of the fauna of ground beetles of field-protecting forest belts of various ages in the Stavropol Territory]. “Novye problemy
zoologicheskoi nauki i ikh otrazhenie v vuzovskom prepodavanii” [New problems of zoological science and th eir reflection in university
teaching], 1, 1979, pp. 155-156.
3. M.I. Shishova, “Zhuzhelitsy lesonasazhdenii v usloviyakh rekreatsii” [Ground beetles in recreation conditions]. Materials of scientific and
methodological meeting of pedagogical zoologists, 1, 1990, pp. 305-307.
4. I.Kh. Sharova, M.Yu. Romankina, “Naselenie zhuzhelits (Coleoptera, Carabidae) v yablonevykh sadakh i prilegayushchikh
agrolandshaftakh severnoi lesostepi Rossii. Monografiya” [Ground beetle population (Coleoptera, Carabidae) in apple gard ens and
adjacent agrolandscapes of the northern forest-steppe of Russia. Monograph], 2001, p. 162 .
5. M.Yu. Romankina, “Strukturnaya organizatsiya naseleniya zhuzhelits (Coleoptera, Sarabidae) lesopolos Tambovskoi oblasti” [Structural
organization of the ground beetle population (Coleoptera, Sarabidae) of the forest belts in the Tambov region]. “Problemy regionalnoi
ekologii” [Problems of regional ecology], 5, 2009, pp. 92-98.
6. M.Yu. Romankina, A.A. Popova, T.V. Shalamova, “Ekologo-faunisticheskaya struktura naseleniya zhukov-zhuzhelits (Coleoptera, 3848-
Sarabidae) lesopolosy v raione gorodskoi svalki” [Ecological and faunistic structure of the population of ground beetles (Coleoptera,
Sarabidae)) of the forest belt in the area of the city refuse dump]. “Vestnik Tambovskogo universiteta: nauchno-teoreticheskii i 3851
prakticheskii zhurnal” [News of Tambov University: scientific-theoretical and practical magazine], 12(1), 2007, pp. 183-186.
7. K.V. Arnoldi, T.S. Perel, I.Kh. Sharova, “Vliyanie iskusstvennykh lesnykh nasazhdenii na pochvennykh bespozvonochnykh glinistoi
polupustyni” [Effect of artificial forests on soil invertebrates of the clay semi-desert] // “Zhivotnye iskusstvennykh lesnykh nasazhdenii v
glinistoi polupustyne” [Animals of artificial forests in the clay semi-desert], 1971, pp. 34-54.
8. R.S. Sigida, “Adaptatsii zhukov-zhuzhelits (Coleoptera, Carabidae) k edaficheskim faktoram v usloviyakh antropogennykh landshaftov
Tsentralnogo predkavkazya” [Adaptation of ground beetles (Coleoptera, Carabidae) to edaphic factors in the conditions of anthropogenic
landscapes of the Central Ciscaucasia]. Abstract of the dissertation of the doctor of biological sciences, 2010.
9. W. Tischler, “Synokologische Untersuchungen an der Fauna der Felder und Feldgeholze”, Zeitschrift für Morp hologie und Ökologie der
Tiere, 47, 1958, pp. 54-114.
10. T. Bonkowska, “The effect of shelterbelts on the distribution of Carabidae”, H Ecol. pol., 18(28), 1970, pp. 559-569.
11. H.S. Barber, “Traps for cave in habiting Insecta”, Journal of the Elisha Mitchell Scientific Society, 46(2), 1931, pp. 259-266.
12. E.A. Dunaev, “Metody ekologo-entomologicheskikh issledovanii” [Ecological and entomological research methods]. MosgorSYuN, 1997,
pp. 44.
13. V.P. Pristavko, “Informatsionnyi indeks vidovogo raznoobraziya kak kriterii dlya ekologicheskogo monitoringa (na primere zhuzhelits
Coleoptera, Carabidae)” [Information index of species diversity as a criterion for environmental monitoring (on the example of ground
beetles Coleoptera, Carabidae)]. “Biol. osnovy osvoeniya, rekonstruktsii i okhrany zhivotnogo mira Belorussii” [Biological foundations of
development, reconstruction and conservation of wildlife in Belarus]. Minsk, 1983, pp. 59.
14. Yu.A. Pesenko, “Printsipy i metody kolichestvennogo analiza v faunisticheskikh issledovaniyakh” [Principles and methods of quantitative
analysis in faunistic studies]. Science, 1982, pp. 288.
15. M.Z. Aubakirov, V.N. Domatsky, M.K. Mustafin, L.S. Selunskaya, M.A. Khassanova, G.M., E.N. Erenko, G.K. Khairov, “The
Technology of Preventing Ecological and Economic Damage Caused by Echinococcosis”, International Journal of Engineering and
Advanced Technology, 8(6), 2019, pp. 2933-2946.
16. E. Kryukova, N. Bodneva, T. Sribnaya, N. Filimonova, O. Vershinina, “The Development of the Restaurant Business in Russi a”, Journal
of Environmental Management and Tourism, 10(2), 2019, pp. 412-419.
17. M.V. Grafkina, B.N. Nyunin, E.Y. Sviridova, “Environmental Monitoring and Simulation of Infrasound Generating Mechanism of Tr affic
Flow”, J. Ecol. Eng. 20(7), 2019, pp. 90–97.
18. V.G. Tyurin, V.G. Semenov, D.A. Nikitin, A.V. Lopatnikov, I.N. Madebeikin, A.G. Koshchaev, O.V. Koshchaeva, “Stimulation of
Adaptogenesis in Aberdeen-Angus Calves for Improving Productive Qualities”, International Journal of Engineering and Advanced
Technology, 8(5), 2019, pp. 440-444.

Authors: N. I. Rudneva, Elena Alekseevna Shimko, G. V. Korotkova

Paper Title: Explication of the National Value Parameter in Paremiological Units


Abstract: The article is devoted to studying the national value parameter in paremiological units with the key
lexemes “die Witwe” and “вдова” (“a widow”) in the concept of the comparative ethnolinguistic analysis. In the
work, the comparative ethnolinguistic description of paremias is based on the authors’ method of cultural contrast
that allows determining the ethnocultural identity based on identifying general and specific possibilities of
675. expressing national cultures in the phraseological picture of the world through the material of the German and
Russian languages. 3852-
3856
Keyword : ethnolinguistics, comparative study, German and Russian languages, paremiological units, lexemes
“die Witwe” and “вдова”, cultural contrast, national value characteristics.
References:
1. Bartminsky E. “Yazykovoy obraz mira: ocherki po etnolingvistike” [Linguistic image of the world: essays on ethnolinguistics]. Moscow:
Indrik, 2005, p. 528.
2. Valentsova M.M. “Narodny kalendar chekhov i slovakov. Etnolingvisticheskiy aspect” [Folk calendar of Czechs and Slovaks.
Ethnolinguistic aspect]. Moscow: Indrik, 2016, p.616
3. Tolstaya S.M. “Obraz mira v tekste i ritual” [The image of the world in text and ritual]. Moscow: Russian Foundation for the Promotion of
Education and Science, 2015, p.528.
4. Duden C. “Etymologie: Herkunftswörterbuch der deutschen Sprache”. Manheim, Zürich, 2007, p. 960.
5. Duden C. “Deutsche Universalwörterbuch”. Manheim, Zürich, 2011, p. 2112.
6. Fasmer M. “Etimologicheskiy slovar russkogo yazyka: v 4 t”. [Etymological dictionary of the Russian Language: in 4 volumes]. Moscow:
Astrel: AST. Vol. 4. 2009, p. 860, 2949.
7. Ushakov D.I. “Tolkovy slovar russkogo yazyka: v 4 t.” [Explanatory dictionary of the Russian Language: in four volumes]. Moscow:
TERRA, 1996. Vol. 1, p.824, Vol. 2, p. 520, Vol. 3., p. 712, Vol. 4., p.752.
8. Kolesov V.V., Kolesova D.V., Kharitonov A.A. “Slovar russkoy mentalnosti: v 2 t. T. 1”. [Dictionary of the Russian mentality: in 2
volumes. Vol. 1]. St. Petersburg: Zlatoust, 2014. 592 p.; Vol. 2. St. Petersburg: Zlatoust, 2014. 592 p.
9. Fasmer M. “Etimologicheskiy slovar russkogo yazyka: v 4 t.” [Etymological dictionary of the Russian Language: in 4 volumes]. Moscow:
Astrel: AST, Vol. 3. 2007, p. 830.
10. Fasmer M. “Etimologicheskiy slovar russkogo yazyka: v 4 t.” [Etymological dictionary of the Russian Language: in 4 volumes]. Moscow:
Astrel: AST. Vol. 1. 2004, p.588.
11. Ozhegov S.I. “Slovar russkogo yazyka” [Dictionary of the Russian language]. Moscow: Onyx: World and Education, 2007, p. 976.
12. “Polozheniye zhenshchiny u drevnikh germantsev” [Position of women in the ancient German] URL: http://www.tingvelir.livejornal.com
(Date of access: 19.03.2018).
13. Istoriya zhenshchin na zapade: Kak zhili v pozdnem srednevekovye [The history of women in the west: How they lived in the late Middle
Ages] URL: http://www.womenation.org (Date of access: 29.04.2018).
14. Zhuravlev A.F. “Domashniy skot v poveryakh i magii vostochnykh slavyan. Etnograficheskiye i etnolingvisticheskiye ocherki” [Livestock
in the beliefs and magic of the Eastern Slavs. Ethnographic and ethnolinguistic essays]. Moscow: Indrik, 1994, p.256.
15. Kak zhili vdovy na Rusi [How widows lived in Russia] "URL: http://www.woman.rambler.ru (Date of access: 29.04.2018).
16. Gura A.V. “Brak i svadba v slavyanskoy narodnoy kulture: Semantika i simvolika” [Marriage and wedding in the Slavic folk culture:
Semantics and symbolism]. Moscow: Indrik, 2012, p. 936.
17. “Slavyanskaya mifologiya. Entsiklopedicheskiy slovar” [Slavic mythology. Encyclopedic Dictionary]/ed. S.M. Tolstaya. Moscow:
International Relations, 2011, p. 512.

Authors: Mochammad Zuliansyah, Mohammad Ishak Desa, Sabrina Ahmad

Paper Title: Selecting General Entities for TOGAF’s Core Content Metamodel using Best Worst Method
Abstract: Enterprise Architecture (EA) Developments are often faced with metamodel complexity problem.
The data for metamodel exploration significantly affects the depth of an EA analysis. In practice, however, it is
limited by the scope, cost, time and quality. The entities in the EA initiation metamodel is crucial in forming an
optimal metamodel based on data completeness, time, cost, quality, and scope. In this study, entities in the EA
metamodel were selected from general entities in the TOGAF's core content metamodel, combined with various
standards related to the upstream petroleum industry. The entity selection methodology consists of two stages,
namely Preparation and Screening, as well as Analysis and Selection. Entity data are extracted from the needs of
the upstream petroleum industry. The analysis was done using the best worst method (BWM). The criteria are
based on the EA development goals of the Federation of Enterprise Architecture Professional Organizations. BWM
analysis produces a relatively meaningful ranking of the entities that forms as general entities in the core content
metamodel. This study proposes the methodology, ranking order of entities, and entities composition that form
general entities for the core content metamodel.

Keyword : Best Worst Method, Enterprise Architecture, General entities, Metamodel.


References:
1. T. O. Group, The TOGAF ® Standard. The Open Group, 2018.
2. G. Biscardini, R. Morrison, D. Branson, and A. Del Maestro, “Strategy shaped by volatility,” 2018.
3. SKKMIGAS, “Laporan Tahunan SKK Migas 2018 : Good Governance, Foundation for Better Future,” 2018.
676. 4. I. P. Association, “Oil and Gas Industry Enters a New Era,” IPA News, vol. 03, 2019.
5. SKKMIGAS, “Laporan Tahunan SKK Migas 2017,” 2017.
6. SKKMIGAS, “Laporan Tahunan 2016 SKK Migas,” 2016. 3857-
7. SKKMIGAS, “Laporan-Tahunan-Skk-Migas-2015.” 3863
8. M. E. Porter, “the Five Forces That Competitive Strategy,” Harv. Bus. Rev., vol. 86, no. January, pp. 78–94, 2008.
9. L. Kappelman, E. Mclean, J. Vess, and N. Gerhart, “The 2014 SIM IT Key Issues and Trends Study,” MIS Q. Exec., vol. 2014, no.
December, pp. 237–263, 2014.
10. B. Van Der Raadt, M. Bonnet, S. Schouten, and H. Van Vliet, “The relation between EA effectiveness and stakeholder satisfacti on,” J.
Syst. Softw., vol. 83, no. 10, pp. 1954–1969, 2010.
11. H. Hendrickx, “Article How Easy is it to Standardize a Practice ?,” no. June, 2017.
12. S. Roeleven, “Why Two Thirds of Enterprise Architecture Projects Fail An explanation for the limited success of architecture projects,”
2010.
13. Scaled Agile Inc, “TitleSAFe® for Lean Enterprise.” [Online]. Available: https://www.scaledagileframework.com/. [Accessed: 07-Oct-
2019].
14. M. T. Gamble, “Can metamodels link development to design intent?,” Proc. 1st Int. Work. Bringing Archit. Des. Think. into Dev. Dly. Act.
- Bridg. ’16, pp. 14–17, 2016.
15. N. B. Kurniawan and Suhardi, “Enterprise Architecture design for ensuring strategic business IT alignment (integrating SAMM with
TOGAF 9.1),” in 2013 Joint International Conference on Rural Information & Communication Technology and Electric-Vehicle
Technology (rICT & ICeV-T), 2013, pp. 1–7.
16. J. N. Luftman, P. R. Lewis, and S. H. Oldach, “Transforming the enterprise: the alignment of business and information technol ogy
strategies,” IBM Syst. J., 1993.
17. J. Luftman, “Assessing it/business alignment,” Inf. Syst. Manag., 2003.
18. J. N. Luftman, “Assessing Business-IT Alignment Maturity,” in Strategic Information Technology, 2011.
19. S. Aier, “The role of organizational culture for grounding, management, guidance and effectiveness of enterprise architecture principles,”
Inf. Syst. E-bus. Manag., vol. 12, no. 1, pp. 43–70, 2014.
20. J. Rezaei, “Best-worst multi-criteria decision-making method,” Omega (United Kingdom), vol. 53, pp. 49–57, 2015.
21. J. Rezaei, “Author ’ s Accepted Manuscript Best-worst multi-criteria decision-making method : Some properties and a linear model,”
Omega, 2015.
22. J. Rezaei, T. Nispeling, J. Sarkis, and L. Tavasszy, “A supplier selection life cycle approach integrating traditional and en vironmental
criteria using the best worst method,” J. Clean. Prod., 2016.
23. S. Paradkar, Cracking the IT Architect Interview. Packt Publishing, 2016.
24. Federation of Enterprise Architecture Professional Organizations, “A Common Perspective on Enterprise Architecture,” Archit. Gov.
Mag., vol. 9, p. 6, 2013.
25. The Professional Petroleum Data Management (PPDM) Association, PPDM Data Model version 3.9. 2014.
26. APQC and IBM, “PETROLEUM UPSTREAM PROCESS CLASSIFICATION FRAMEWORK,” no. April, 2016.
27. B. C. Maps and V. Streams, “Industry Reference Architecture.”
28. World Economic Forum, “Digital Transformation Initiative In collaboration with Accenture,” 2017.
29. Microsoft, “The Microsoft Upstream Reference Architecture,” p. 30, 2013.

Authors: Rajesh Kumar K, Karpagam Chinnammal S

Paper Title: Influence of Fabric Parameterso Wicking Behaviour of Polyester/Lycra Knitted Fabrics
Abstract: Wicking is one of the important properties of fabrics which decide its utility. The sweat generated in
the body should be absorbed by the fabric as otherwise it may lead to skin diseases. It is advised that cotton fabrics
should be worn net to the skin in order to get comfort to the wearer. This article is concerned with wicking which
plays a vital role in determining comfort and moisture transport behavior of fabric and also into find out the effect
of four parameters of single jersey, rib and pique knitted structures on the wickability. Parameters taken for the
study were polyester cross-section, lycra denier used, plated structure and loop length.

Keyword : Loop length, Lycra, Plated, Polyester, Wicking.


References:
1. G. Karthikeyan, G. Nalankilli, O.L. Shanmugasundram and C. Prakash, “Moisture Management Properties of Bamboo Viscose/Tencel
Single Jersey Knitted Fabrics”, Journal of Natural Fibers, 2017, 1(1), pp. 143-152.
2. G. Bedek, F. Salaün, Z. Martinkovska, E. Devaux and D. Dupont, “Evaluation of thermal and moisture management properties on knitted
677. fabrics and comparison with a physiological model in warm conditions”, Applied Ergonomics, 2011, 42(6), pp. 792-800.
3. Kumar, V.R. Sampath and C. Prakash, “Investigation of Stretch on Air Permeability of Knitted Fabrics Part II: Effect of Fabric Structure”, 3864-
Journal of The Textile Institute, The Journal of The Textile Institute, 2016, 107(10), pp. 1213-1222. .
4. Y.S. Chen, J. Li, J and W.Y. Zhang, “Analysis and prediction of the dynamic heat-moisture comfort property of fabric”, Fibres and
3867
Textiles in Eastern Europe, 2008, 16 3(68), pp. 51-55.
5. G. Ramakrishnan, P. Umapathy and C. Prakash, “Comfort properties of bamboo/cotton blended knitted fabrics produced from roto r spun
yarns”, Journal of The Textile Institute, 2015, 106(12), pp. 1371-1376.
6. B. Das, A. Das, V.K. Kothari, R. Fanguiero, M. De Araujo, “Moisture transmission through textiles part I: processes involved in moisture
transmission and the factors at play”, Autex Research Journal, 2007, 7(2), pp. 100-110.
7. C. Prakash, G. Ramakrishnan and C.V.Koushik, “Effect of blend proportion on moisture management characteristics of bamboo/cotton
knitted fabrics”, Journal of The Textile Institute, 2013, 104(12), pp. 1320-1326. .
8. B. Das, A. Das, V.K. Kothari, R. Fanguiero, M. De Araujo, “Effect of fibre diameter and cross-sectional shape on moisture transmission
through fabrics”, Fibers and Polymers, 2008, 9(2),
pp. 225-231.
9. E. Onofrei, A. Rocha and A. Catarino, “The influence of knitted fabrics’ structure on the thermal and moisture management pro perties”,
Journal of Engineered Fibers and Fabrics, 2011, 6(4), pp. 10–22.
10. C.Prakash and G.Ramakrishnan, “Effect of blend ratio, loop length, and yarn linear density on thermal comfort properties of s ingle jersey
knitted fabrics”, International Journal of Thermophysics, 34(1), 113-121, January 2013 (Impact factor-0.623).
11. 11, J. Hu, Y. Li, K. Yeung, A.S.W. Wong and W. Xu, “Moisture management tester: a method to characterize fabric liquid moistu re
management properties’, Textile Research Journal, 200,75(1), pp. 57-62.

Authors: S. Nirmala, C. Sashidhar, Veera Sudarshan Reddy

Paper Title: Self-Compacting Concrete with Recycled Coarse Aggregate and Manufactured Sand
Abstract: This article mainly focused on the influence of recycle coarse aggregate and manufactured sand on
the properties of self compacting concrete (SCC). The main purpose of this research is reuse of recycled aggregate
in SCC and also to reduce use of fine aggregate by replacing manufactured sand. The SCC mixtures were prepared
with 0, 25, 50, 75 and 100% replacement of recycle coarse aggregate in natural coarse aggregate and M-Sand in
fine aggregate with a Water/Binder ratio of 0.36. Different test covering fresh properties of these SCC mixtures
were executed the results were compared with EFNARC guidelines and IS 10262:2019. The feasibility of utilizing
recycled aggregate and M-Sand in self compacting concrete has been examined and found that it is suitable for
concrete.

678. Keyword : Self compacting concrete, recycle coarse aggregate M-Sand, fresh properties.
3868-
References: 3873
1. IS 10262:2019 “Concrete Mix Proportioning” – Guidelines.
2. EFNARC – 2002 – Specifications and Guidelines for Self – Compacting Concrete.
3. C.Kou and C.S.Poon, Properties of self compacting concrete prepared with coarse and fine recycled concrete aggregates, Cement and
Concrete Composites, (2009), 31, pp- 622-627.
4. Khatib JM, Properties of concrete incorporating fine recycled aggregate, Cement and Concrete Research, (2009), 35 pp-763-769.
5. Zoran Jure Grdic, Gordana A, Tolicic – Curcic, Iva M.Despotovic, Nenad S.Ristic, Properties of self compacting concrete prepared with
coarse recycled aggregates, Construction and Building Materials, (2010), 24, pp-1129-1133.
6. Myle N, W.Choi and T.Abu – Lebdeh, Use of recycled aggregate and fly ash in concrete pavement, James American J Engineering and
Applied Sciences, (2011), 4(2), pp-201-208.
7. K.C.Panda and P.K.Bal, Properties of self compacting concrete prepared with coarse recycled aggregates, SciVerse Science Dir ect,
Procedia Engineering (2013), 51,pp- 159 -164.
8. Kamal M.M, Safan M.A, Etman,Z.A and Eldaboly E.A, Evaluating the fresh properties of recycled self compacting concrete over time,
International Journal of Current Engineering and Technology, (2013), 2(2), pp- 436-446.
9. S.Santos, P.R.da silva, J.de Brito, Self Compacting concrete with recycled aggregates – A literature review, Journal of Building.

Authors: Kathiravan Srinivasan, Ramaneswaran S, Senthil Kumaran S, Srinivasan Narayanan

Paper Title: Aerial and Under-water Dronal Communication: Potentials, Issues and Vulnerabilities
Abstract: The use of UAVs has been on the rise since the past decade. These UAVs are very versatile and can
be applied to several fields ranging from agriculture to military reconnaissance. Due to the immense functionality
of the UAVs, it has now become a very popular topic in Research. With the advent of Deep Learning and Machine
Learning the autonomous navigation functionalities have been improved but it still poses a challenge as navigating
a drone involves the integration of its software and hardware functionalities. This paper reviews both indoor and
outdoor navigation. Topics in navigation such as Control, Hardware, Algorithms, Path-Planning, and
communication are touched upon in this paper. The paper also presents a discussion on the Navigation of UAVs
using vision-based technologies, this technology encompasses the use of various sensors and cameras and integrate
it with the navigation system of the UAV to ensure the success of UAV’s operation. UAVs play a pivotal role in
networking, many applications have been developed which have UAVs as an important component in them. Their
applications include Urban computing, Internet of Things, Ubiquitous Computing to name a few. Safely operating a
UAV as a network node is not a simple task, these nodes are prone to various types of attacks. A new type of attack
introduced in this paper is termed as “Coagulation Attack”. This attack gets its name from the coagulation property
of fluids wherein fluids clot and their particles settle down. This paper explores the concept, issues, challenges and
research aspects of Coagulation attack. This paper also introduces the concept of Underwater Wireless
Communication. On a planet where 70% of the surface is covered in water, UWC has a lot of potentials to be
exploited. Moreover UWC is critical in many key areas of Maritime research, commerce, and surveillance. UWC is
used for experimental observation, data collection and analysis, underwater navigation, disaster prevention and
early detection warning of a tsunami. In addition, we summarize emerging technologies in the UWC, future
research directions and recommendations using fifth-generation (5G) communication techniques.
Keyword : Aerial Drone Communication, Under-water Drone communication, Coagulation Attack,
Vulnerabilities, Security Aspects
References:
1. Karthigeyan, P.; Raja, M.S.; Prabu, S.; Gnanaselvam, R. Flying robot-a drone for urban warfare. Pervasive Computing (ICPC), 2015
International Conference on. IEEE, 2015, pp. 1–4.
2. Cui, J.Q.; Phang, S.K.; Ang, K.Z.; Wang, F.; Dong, X.; Ke, Y.; Lai, S.; Li, K.; Li, X.; Lin, F.; others. Drones for cooperati ve search and
rescue in post-disaster situations. Cybernetics and Intelligent Systems (CIS) and IEEE Conference on Robotics, Automation and
Mechatronics (RAM), 2015 IEEE 7th International 433 Conference on. IEEE, 2015, pp. 167–174.
3. Avila, M.; Funk, M.; Henze, N. Drone navigator: Using drones for navigating visually impaired persons. Proceedings of the 17th
International ACM SIGACCESS Conference on Computers & Accessibility. ACM, 2015, pp. 327–328.
679. 4. Schneegass, S.; Alt, F.; Scheible, J.; Schmidt, A.; Su, H. Midair displays: exploring the concept of free-floating public displays. CHI’14
Extended Abstracts on Human Factors in Computing Systems. ACM, 2014, pp. 2035–2040.
5. Sharma and R. Kumar, “A cooperative network framework for multi-uav guided ground ad hoc networks,” Journal of Intelligent &
3874-
Robotic Systems, vol. 77, no. 3-4, pp. 629–652, 2015. 3885
6. E. AbdAllah, H. Hassanein, and M. Zulkernine, “A survey of security attacks in information-centric networking,” Comm. Surv. Tutorials,
IEEE, vol. 17, pp. 1441–1454, third quarter 2015.
7. L. Zhang, G. Ding, Q. Wu, Y. Zou, Z. Han, and J. Wang, “Byzantine attack and defense in cognitive radio networks: A survey,” Comm.
Surv.Tutorials, IEEE, vol. 17, pp. 1342–1363, thirdquarter 2015.
8. S. Riazul Islam, D. Kwak, M. Humaun Kabir, M. Hossain, and K.-S. Kwak, “The internet of things for health care: A comprehensive
survey,” Access, IEEE, vol. 3, pp.678–708, 2015.
9. Banerjee, K. K. Venkatasubramanian, T. Mukherjee, and S. K. S. Gupta, “Ensuring safety, security, and sustainability of mission-critical
cyber–physical systems,” Proceedings of the IEEE, vol. 100, no. 1, pp. 283–299, 2012.
10. K. Hartmann and C. Steup, “The vulnerability of uavs to cyber attacks- an approach to the risk assessment,” in Cyber Conflict (CyCon),
2013 5th International Conference on, pp. 1–23, IEEE, 2013.
11. M. Barrere, R. Badonnel, and O. Festor, “Vulnerability assessment in autonomic networks and services: A survey,” Commun. Sur.
Tutorials, IEEE, vol. 16, pp. 988–1004, Second 2014.
12. O. Zouhri, S. Benhadou, and H. Medromi, “A new adaptative security protocol for uav network,” in Advances in Ubiqu itous Networking
2, pp. 649–657, Springer, 2017.
13. Sharma and R. Kumar, “G-fanet: an ambient network formation between ground and flying ad hoc networks,” Telecommunication
Systems, pp. 1–24, 10.1007/s11235-016-0210-2, 2016.
14. Sharma and R. Kumar, “Teredo tunneling-based secure transmission between uavs and ground ad hoc networks,” International Journal of
Communication Systems, 10.1002/dac.3144, 2016
15. L. Negash, S.-H. Kim, and H.-L. Choi, “Distributed unknown-input- observers for cyber attack detection and isolation in formation flying
uavs,” arXiv preprint arXiv:1701.06325, 2017.
16. H. Sedjelmaci, S. M. Senouci, and M.-A. Messous, “How to detect cyber-attacks in unmanned aerial vehicles network?,” in Global
Communications Conference (GLOBECOM), 2016 IEEE, pp. 1–6, IEEE, 2016
17. Kim, B. Wampler, J. Goppert, I. Hwang, and H. Aldridge, “Cyber attack vulnerabilities analysis for unmanned aerial vehicles,” in
Infotech@ Aerospace 2012, p. 2438, 2012.
18. Abbaspour, K. K. Yen, S. Noei, and A. Sargolzaei, “Detection of fault data injection attack on uav using adaptive neural network,”
Procedia Computer Science, vol. 95, pp. 193–200, 2016.
19. [A. Sanjab, W. Saad, and T. Bas¸ar, “Prospect theory for enhanced cyber physical security of drone delivery systems: A networ k
interdiction game,” arXiv preprint arXiv:1702.04240, 2017
20. S. Zhou and Z. Wang, OFDM for underwater acoustic communications. John Wiley & Sons, 2014.
21. L. Lanbo, Z. Shengli, and C. Jun-Hong, “Prospects and problems of wireless communication for underwater sensor networks,” Wireless
Communications and Mobile Computing, vol. 8, no. 8, pp. 977–994, 2008.
22. Gussen, P. Diniz, M. Campos, W. A. Martins, F. M. Costa, and J. N. Gois, “A survey of underwater wireless communication techn ologies,”
J. Commun. Inform. Sys, vol. 31, no. 1, 2016.
23. Y. Y. Al-Aboosi, M. S. Ahmed, N. S. M. Shah, and N. H. H. Khamis, “Study of absorption loss effects on acoustic wave propagation in
shallow water using different empirical models,” 2006.
24. J. Huang, J. Sun, C. He, X. Shen, and Q. Zhang, “High-speed underwater acoustic communication based on ofdm,” in Microwave,
Antenna, Prop-agation and EMC Technologies for Wireless Communications, 2005. MAPE 2005. IEEE International Symposium on, vol.
2. IEEE, 2005, pp. 1135–1138.
25. L. Lanbo, Z. Shengli, and C. Jun-Hong, “Prospects and problems of wireless communication for underwater sensor networks,” Wireless
Communications and Mobile Computing, vol. 8, no. 8, pp. 977–994, 2008.
26. J. Wu, X. Ma, X. Qi, Z. Babar, and W. Zheng, “Influence of pulse shaping filters on papr performance of underwater 5g communication
system technique: Gfdm,” Wireless Communications and Mobile Com-puting, vol. 2017, 2017.
27. M. Lanzagorta, “Underwater communications,” Synthesis Lectures on Communications, vol. 5, no. 2, pp. 1–129, 2012.
28. H. Kaushal and G. Kaddoum, “Underwater optical wireless communi-cation,” IEEE access, vol. 4, pp. 1518–1547, 2016.
29. McGuire, K.; Coppola, M.; de Wagter, C.; de Croon, G. Towards autonomous navigation of multiple pocket-drones in real-world
environments. Intelligent Robots and Systems (IROS), 2017 IEEE/RSJ 442 International Conference on. IEEE, 2017, pp. 244–249.
30. Jaeger, K.; Bers, K.H. Image-based 3D scene analysis for navigation of autonomous airborne systems.Intelligent Robots and Computer
Vision XX: Algorithms, Techniques, and Active Vision. International 445 Society for Optics and Photonics, 2001, Vol. 4572, pp. 310–321.
31. Villar, M.Z.; Plaza, J.M.C. Fine 3D Path Following of a Quadcopter. Iberian Robotics conference. Springer, 2017, pp. 679–690.
32. Bertacchini, E.; Castagnetti, C.; Corsini, A.; De Cono, S. Remotely Piloted Aircraft Systems (RPAS) for high resolution topography and
monitoring: civil protection purposes on hydrogeological contexts. Earth 450 Resources and Environmental Remote Sensing/GIS
Applications V. International Society for Optics and 451 Photonics, 2014, Vol. 9245, p. 924515.
33. Meng, S.; Wen, Z.; Su, X.; Tang, W. A Self-Navigation Method with Monocular Plane Discovery. Vehicular Technology Conference
(VTC-Fall), 2017 IEEE 86th. IEEE, 2017, pp. 1–5.
34. Raimondi, F.; Trapanese, M.; Franzitta, V.; Di Dio, V. Identification of the inertial model for innovative semi-immergible USV (SI-USV)
drone for marine and lakes operations. OCEANS’15 MTS/IEEE Washington. IEEE, 2015, pp. 1–11.
35. Kim, J.; Lee, J.; Jeong, J.; Kim, H.; Park, J.S.; Kim, T. San: Self-adaptive navigation for drone battery charging in wireless drone
networks. Advanced Information Networking and Applications Workshops (WAINA), 459 2016 30th International Conference on. IEEE ,
2016, pp. 248–251.
36. Chakareski, J. Drone Networks for Virtual Human Teleportation. Proceedings of the 3rd Workshop on Micro Aerial Vehicle Networks,
Systems, and Applications. ACM, 2017, pp. 21–26.
37. Huang, Y.P.; Sithole, L.; Lee, T.T. Structure From Motion Technique for Scene Detection Using Autonomous Drone Navigation. IEEE
Transactions on Systems, Man, and Cybernetics: Systems 2017.
38. Von Stumberg, L.; Usenko, V.; Engel, J.; Stückler, J.; Cremers, D. From monocular SLAM to autonomous drone exploration. Mobile
Robots (ECMR), 2017 European Conference on. IEEE, 2017, pp. 1–8.
39. Esrafilian, O.; Taghirad, H.D. Autonomous flight and obstacle avoidance of a quadrotor by monocular SLAM. Robotics and Mechatronics
(ICROM), 2016 4th International Conference on. IEEE, 2016, pp. 240–245.
40. Saska, M.; Krajník, T.; Faigl, J.; Vonásek, V.; Prˇeucˇil, L. Low cost mav platform ar-drone in experimental verifications of methods for
vision based autonomous navigation. Intelligent Robots and Systems (IROS), 2012 IEEE/RSJ International Conference on. IEEE, 2012,
pp. 4808–4809.
41. Gandhi, D.; Pinto, L.; Gupta, A. Learning to fly by crashing. arXiv preprint arXiv:1704.05588 2017.
42. Mhatre, V.; Chavan, S.; Samuel, A.; Patil, A.; Chittimilla, A.; Kumar, N. Embedded video processing and data acquisition for unmanned
aerial vehicle. Computers, Communications, and Systems (ICCCS), International Conference on. IEEE, 2015, pp. 141–145.
43. Bhatia, S.; Yang, H.; Zhang, R.; Höflinger, F.; Reindl, L. Development of an analytical method for IMU calibration. Systems, Signals &
Devices (SSD), 2016 13th International Multi-Conference on. IEEE, 2016, pp. 131–135.
44. Viet, H.N.; Kwon, K.R.; Kwon, S.K.; Lee, E.J.; Lee, S.H.; Kim, C.Y. Implementation of GPS signal simulation for drone securit y using
Matlab/Simulink. Electronics, Electrical Engineering and Computing (INTERCON), 2017 IEEE XXIV International Conference on.
IEEE, 2017, pp. 1–4.
45. Go, J.G.; Chung, J.Y. A compact LNA integrated antenna for global navigation satellite systems. 483 Radio-Frequency Integration
Technology (RFIT), 2017 IEEE International Symposium on. IEEE, 2017, pp. 229–231.
46. Zhang, E.; Zambrano, J.; Amrhar, A.; Landry, R.; Ajib, W. Design and implementation of a wideband radio using SDR for avionic
applications. Integrated Communications, Navigation and Surveillance Conference 487 (ICNS), 2017. IEEE, 2017, pp. 2D2–1.
47. Monterrosa, N.; Bran, C. Design and implementation of a motor control module based on PWM and FPGA for the development of a U AV
flight controller. Electrical, Electronics Engineering, Information and Communication Technologies (CHILECON), 2015 CHILEAN
Conference on. IEEE, 2015, pp. 783–789.
48. Murray, P.; Schukat, M. MAV based SLAM and autonomous navigation: A view towards efficient on-board systems. Signals and Systems
Conference (ISSC), 2017 28th Irish. IEEE, 2017, pp. 1–6.
49. Notarpietro, R.; De Mattia, S.; Campanella, M.; Pei, Y.; Savi, P. Detection of buried objects using reflected GNSS signals. EURASIP
Journal on Advances in Signal Processing 2014, 2014, 132.
50. Lineswala, P.L.; Shah, S.N.; Shah, R. Different categorization for jammer: The enemy of satellite navigation.Convergence in Technology
(I2CT), 2017 2nd International Conference for. IEEE, 2017, pp. 282–287.
51. Sato, S.; Anezaki, T. Autonomous flight drone for infrastructure (transmission line) inspection (2). 2017 International Conference on
Intelligent Informatics and Biomedical Sciences (ICIIBMS). IEEE, 2017, pp. 294–296.
52. Colorado, J.; Perez, M.; Mondragon, I.; Mendez, D.; Parra, C.; Devia, C.; Martinez-Moritz, J.; Neira, L.An integrated aerial system for
landmine detection: SDR-based Ground Penetrating Radar onboard an autonomous drone. Advanced Robotics 2017, 31, 791–808.
53. Scheerer, K. Airborne multisensor system for the autonomous detection of landmines 1996.
54. Tanzi, T.; Roudier, Y.; Apvrille, L. Towards a new architecture for autonomous data collection. The International Archives of
Photogrammetry, Remote Sensing and Spatial Information Sciences 2015, 40, 363.
55. Ghallabi, F.; Kawamura, A.; Pyo, Y.; Tsuji, T.; Kurazume, R. Control architecture for service drone in informationally structured
environment. System Integration (SII), 2015 IEEE/SICE International Symposium on. IEEE, 2015, pp. 611–618.
56. Lioulemes, A.; Galatas, G.; Metsis, V.; Mariottini, G.L.; Makedon, F. Safety Challenges in using AR. Drone to collaborate with humans in
indoor environments. Proceedings of the 7th International Conference on PErvasive Technologies Related to Assistive Environme nts.
ACM, 2014, p. 33.
57. Wang, Z.; Ding, R. The algorithm design and implementation of optical navigation device for UAV.Technology, Networking, Electronic
and Automation Control Conference (ITNEC), 2017 IEEE 2nd 517 Information. IEEE, 2017, pp. 389–393.
58. Aguilar, W.G.; Angulo, C.; Costa-Castello, R. Autonomous Navigation Control for Quadrotors in Trajectories Tracking. International
Conference on Intelligent Robotics and Applications. Springer, 2017, pp. 287–297.
59. Bregu, E.; Casamassima, N.; Cantoni, D.; Mottola, L.; Whitehouse, K. Reactive control of autonomous drones. Proceedings of the 14th
Annual International Conference on Mobile Systems, Applications, and Services. ACM, 2016, pp. 207–219.
60. Blazhko, V.; Kalinovsky, A.; Kovalev, V. Unmanned Aerial Vehicle (UAV): back to base without satellite navigation. Internatio nal
Conference on Pattern Recognition and Information Processing. Springer, 2016, pp. 140–149.
61. Zabihi, R.; Vaughan, R. Conformai axial-direction PIFA on a small cylinder. General Assembly and 528 Scientific Symposium of the
International Union of Radio Science (URSI GASS), 2017 XXXIInd. IEEE, 2017, pp. 1–2.
62. Babu, V.M.; Das, K.; Kumar, S. Designing of self tuning PID controller for AR drone quadrotor. Advanced Robotics (ICAR), 2017 18th
International Conference on. IEEE, 2017, pp. 167–172.
63. Krajník, T.; Vonásek, V.; Fišer, D.; Faigl, J. AR-drone as a platform for robotics research and education. International conference on
research and education in robotics. Springer, 2011, pp. 172–186.
64. Nitschke, C.; Minami, Y.; Hiromoto, M.; Ohshima, H.; Sato, T. A quadcopter automatic control contest as an example of interdisciplinary
design education. Control, Automation and Systems (ICCAS), 2014 14th International Conference on. IEEE, 2014, pp. 678 –685.
65. Ebeid, E.; Skriver, M.; Jin, J. A Survey on Open-Source Flight Control Platforms of Unmanned Aerial Vehicle. Digital System Design
(DSD), 2017 Euromicro Conference on. IEEE, 2017, pp. 396–402.
66. Zou, J.T.; Wang, C.Y.; Wang, Y.M. The development of indoor positioning aerial robot based on motion capture system. Advanced
Materials for Science and Engineering (ICAMSE), International Conference on. IEEE, 2016, pp. 380–383.
67. Hussein, A.; Al-Kaff, A.; de la Escalera, A.; Armingol, J.M. Autonomous indoor navigation of low-cost quadcopters. Service Operations
And Logistics, And Informatics (SOLI), 2015 IEEE International Conference on. IEEE, 2015, pp. 133–138.
68. Vílez, P.; Certad, N.; Ruiz, E. Trajectory generation and tracking using the AR. Drone 2.0 Quadcopter UAV. Robotics Symposium (LARS)
and 2015 3rd Brazilian Symposium on Robotics (LARS-SBR), 2015 12th Latin American. IEEE, 2015, pp. 73–78.
69. Spero, D.J.; Jarvis, R.A. Path planning for a mobile robot in a rough terrain environment. Robot Motion and Control, 2002. Ro MoCo’02.
Proceedings of the Third International Workshop on. IEEE, 2002, pp. 417–422.
70. Krishna, D.S.; Krithivasan, S.; Yadav, H.; Selvaraj, V. Aerial assisted path planning for terrestrial rover without complete environment
map. Innovations in Information, Embedded and Communication Systems (ICIIECS), 2015 International Conference on. IEEE, 2015, pp.
1–7.
71. Madawalagama, S.; Munasinghe, N.; Dampegama, S.; Samarakoon, L. LOW COST AERIAL MAPPING WITH CONSUMER-GRADE
DRONES. 37th Asian Conference on Remote Sensing, Colombo, 2016.
72. Mac, T.T.; Copot, C.; Hernandez, A.; De Keyser, R. Improved potential field method for unknown obstacle avoidance using UAV in indoor
environment. Applied Machine Intelligence and Informatics (SAMI), 2016 IEEE 14th International Symposium on. IEEE, 2016, pp. 345–
350.
73. Chen, X.L.; Tang, Q.; Che, J. An indoor quadrotor locating and object-following algorithm using monocular vision. Intelligent Control and
Automation (WCICA), 2012 10th World Congress on. IEEE, 2012, pp. 4747–4753.
74. Ayadi, M.; Suta, L.; Scuturici, M.; Miguet, S.; Amar, C.B. A Parametric Algorithm for Skyline Extraction.International Conference on
Advanced Concepts for Intelligent Vision Systems. Springer, 2016, pp. 604–615.
75. Barajas, M.; Dávalos-Viveros, J.P.; Garcia-Lumbreras, S.; Gordillo, J.L. Visual servoing of uav using cuboid model with simultaneous
tracking of multiple planar faces. Intelligent Robots and Systems (IROS), 2013 566 IEEE/RSJ International Conference on. IEEE, 2013,
pp. 596–601.
76. Iacono, M.; Sgorbissa, A. Path following and obstacle avoidance for an autonomous UAV using a depth camera. Robotics and
Autonomous Systems 2018, 106, 38–46.
77. Yang, L.; Zhou, S.; Zhao, L.; Bi, G. A data-driven approach for monitoring forward velocity for small and lightweight drone. Aerospace
Electronics and Remote Sensing Technology (ICARES), 2015 IEEE International Conference on. IEEE, 2015, pp. 1–6.
78. Boddhu, S.K.; McCartney, M.; Ceccopieri, O.; Williams, R.L. A collaborative smartphone sensing platform for detecting and tra cking
hostile drones. Ground/Air Multisensor Interoperability, Integration, and Networking for Persistent ISR IV. International Society for
Optics and Photonics, 2013, Vol. 8742, p. 874211.
79. Milani, S.; Memo, A. Impact of drone swarm formations in 3D scene reconstruction. Image Processing (ICIP), 2016 IEEE International
Conference on. IEEE, 2016, pp. 2598–2602.
80. Ibarra, L.M.R.; Freire, A.F.S.; Minango, S.N.R.; del RocíoVelasco, N.; Chang, E.O.; Chipantasi, D.J.M. Applying artificial vision
techniques and artificial neural networks to autonomous quadcopter landing. Ecuador Technical Chapters Meeting (ETCM), 2017 IEEE.
IEEE, 2017, pp. 1–6.
81. Dionisio-Ortega, S.; Rojas-Perez, L.O.; Martinez-Carranza, J.; Cruz-Vega, I. A deep learning approach towards autonomous flight in forest
environments. Electronics, Communications and Computers (CONIELECOMP), 2018 International Conference on. IEEE, 2018, pp. 139–
144.
82. Pestana, J.; Sanchez-Lopez, J.L.; De La Puente, P.; Carrio, A.; Campoy, P. A vision-based quadrotor multi-robot solution for the indoor
autonomy challenge of the 2013 international micro air vehicle competition. Journal of Intelligent & Robotic Systems 2016, 84, 601–620.
83. Yuan, C.; Recktenwald, F.; Mallot, H.A. Visual steering of uav in unknown environments. Intelligent Robots and Systems, 2009. IROS
2009. IEEE/RSJ International Conference on. IEEE, 2009, pp. 3906–3911.
84. Ström, D.P.; Bogoslavskyi, I.; Stachniss, C. Robust exploration and homing for autonomous robots. Robotics and Autonomous Sys tems
2017, 90, 125–135.
85. Godaliyadda, G.; Kwon, D.K.; Moore, D.; Cheng, V. A Sense and Avoid Algorithm using Surround Stereo Vision for Drones. Electronic
Imaging 2017, 2017, 29–34.
86. Pinage, F.; Carvalho, J.R.H.; Freitas, E.R.V.; de Queiroz Neto, J.P. Feature transform technique for combining landmark detec tion and
tracking of visual information of large rain forest areas. Robotics Symposium and Competition (LARS/LARC), 2013 Latin American.
IEEE, 2013, pp. 30–37.
87. Dena Ruiz, J.; Aouf, N. Unscented Kalman Filter for Vision Based Target Localisation with a Quadrotor. 14th International Con ference on
Informatics in Control, Automation and Robotics (ICINCO), 2017, pp.26–28.
88. Jung, S.; Cho, S.; Lee, D.; Lee, H.; Shim, D.H. A direct visual servoing-based framework for the 2016 IROS Autonomous Drone Racing
Challenge. Journal of Field Robotics 2018, 35, 146–166.
89. Raj, C.V.; Sree, B.N.; Madhavan, R. Vision based accident vehicle identification and scene investigation. IEEE Region 10 Sympo sium
(TENSYMP), 2017. IEEE, 2017, pp. 1–5.
90. J. Partan, J. Kurose, and B. N. Levine, “A survey of practical issues in underwater networks,” ACM SIGMOBILE Mobile Computing and
Communications Review, vol. 11, no. 4, pp. 23–33, 2007.
91. N. Saeed, A. Celik, T. Y. Al-Naffouri, and M.-S. Alouini, “Underwater optical wireless communications, networking, and localization: A
sur-vey,” arXiv preprint arXiv:1803.02442, 2018.
92. Hayajneh, M.; Melega, M.; Marconi, L. Design of autonomous smartphone based quadrotor and implementation of navigation and
guidance systems. Mechatronics 2018, 49, 119–133.
93. Kuhnert, K.; Kuhnert, L. Light-weight sensor package for precision 3D measurement with micro UAVs EG 618 power-line monitoring.
Int. Arch. Photogramm. Remote Sens. Spat. Inf. Sci 2013, pp. 235–240.
94. Angelino, C.V.; Cicala, L.; Persechino, G.; Baccaglini, E.; Gavelli, M.; Raimondo, N. A sensor aided H.264 encoder tested on aerial
imagery for SFM. Image Processing (ICIP), 2014 IEEE International Conference on. IEEE, 2014, pp. 1194–1197.
95. Lesecq, S.; Foucault, J.; Birot, F.; de Chaumont, H.; Jackson, C.; Correvon, M.; Heck, P.; Banach, R.; di Matteo, A.; Di Palm a, V.; others.
INSPEX: design and integration of a portable/wearable smart spatial exploration system. 2017 Design, Automation & Test in Eur ope
Conference & Exhibition (DATE). IEEE, 2017, pp. 746–751.
96. Moran, O.; Gilmore, R.; Ordóñez-Hurtado, R.; Shorten, R. Hybrid Urban Navigation for Smart Cities. arXiv preprint arXiv:1705.01516
2017.
97. Kobayashi, T.; Seimiya, S.; Harada, K.; Noi, M.; Barker, Z.; Woodward, G.K.; Willig, A.; Kohno, R. Wireless technologies to a ssist search
and localization of victims of wide-scale natural disasters by unmanned aerial vehicles. Wireless Personal Multimedia Communications
(WPMC), 2017 20th International Symposium on. IEEE, 2017, pp. 404–410.
98. Jones, B.; Dillman, K.; Tang, R.; Tang, A.; Sharlin, E.; Oehlberg, L.; Neustaedter, C.; Bateman, S. Elevating communication,
collaboration, and shared experiences in mobile video through drones. Proceedings of the 2016 ACM Conference on Designing
Interactive Systems. ACM, 2016, pp. 1123–1135.
99. Lee, J. Optimization of a modular drone delivery system. Systems Conference (SysCon), 2017 Annual IEEE International. IEEE, 2017, pp.
1–8.
100. Habibi, J.; Gupta, A.; Carlsony, S.; Panicker, A.; Bertino, E. Mavr: Code reuse stealthy attacks and mitigation on unmanned aerial
vehicles. Distributed Computing Systems (ICDCS), 2015 IEEE 35th InternationalConference on. IEEE, 2015, pp. 642–652.
101. Silva, T.D.; Kahandagamage, R.; Sanjeewa, I.; Kulasinghe, C.; Ariyarathne, R. GENERATING MORE ACCURATE DIGITAL
ELEVATION MODELS INCORPORATING OFF THE SHELF GIS SOFTWARE BY USING DRONE IMAGERY. 2016.
102. Ozirkovskyy, L.; Pashchuk, Y.; Mashchak, A.; Volochiy, S. The automation of the exploitation risks assessment of the navigation
information system of air drones. Modern Problems of Radio Engineering. Telecommunications and Computer Science (TCSET), 2016
13th International Conference on. IEEE, 2016, pp. 140–144.
103. Vasconcelos, G.; Carrijo, G.; Miani, R.; Souza, J.; Guizilini, V. The impact of DoS attacks on the AR. Drone 2.0. Robotics Symposium
and IV Brazilian Robotics Symposium (LARS/SBR), 2016 XIII Latin American. IEEE, 2016, pp. 127–132.
104. Xiao, F.; Zhou, M.; Liye, Y.; Yang, J.; Wang, Q. Poster: Enabling secure location authentication in drone. Proceedings of the 23rd Annual
International Conference on Mobile Computing and Networking. ACM, 2017, pp. 600–602.
105. Matolak, D.W. Unmanned aerial vehicles: Communications challenges and future aerial networking.Computing, Networking and
Communications (ICNC), 2015 International Conference on. IEEE, 2015, pp. 567–572.
106. Lukas von Stumberg, Vladyslav Usenko, Jakob Engel, Jörg Stückler, Daniel Cremers “From Monocular SLAM to Autonomous Drone
Exploration” arXiv:1609.07835 [cs.RO]
107. Nitsche M., Pire T., Krajník T., Kulich M., Mejail M. (2014) Monte Carlo Localization for Teach-and-Repeat Feature-Based Navigation.
In: Mistry M., Leonardis A., Witkowski M., Melhuish C. (eds) Advances in Autonomous Robotics Systems. TAROS 2014. Lecture Not es
in Computer Science, vol 8717. Springer, Cham
108. Bashar Alhafni, Saulo Fernando Guedes, Lays Cavalcante Ribeiro, Juhyun Park, Jeongkyu Lee “Mapping Areas using Computer Vision
Algorithms and Drones” arXiv:1901.00211 [cs.CV]
Denis Alekseevich Maximov, Yurii Vladimirovich Mishin, Aleksandr Yurevich Mishin, Margarita
Authors:
Sergeevna Shakhova, Andrey Nikolaevich Zharov, Raisa Vasilievna Lopukhina
Paper Title: Entrepreneurship in Educational Organisations: Innovations and Technologies
Abstract: In the current context, organizations need to look for new innovative factors to improve the
efficiency of their activities. One of these alternative approaches to the contemporary organization and its
management is the concept of intra-organizational entrepreneurship or intrapreneurship.
The purpose of the present study is to justify the need to apply the concept of intrapreneurship in educational
institutions, and to analyze the main lines and forms of its development.
The article analyzes the concept of intrapreneurship considering its theoretical aspects in different socio-
economic areas.
The authors present the results of an empirical study of intrapreneurship in educational institutions analyzing
availability of intrapreneurship in comprehensive education institutions and offering the classification of
intrapreneurship areas in comprehensive education organizations, as well as determining the severity of the main
forms of intrapreneurship in each of these areas.

Keyword : areas of entrepreneurship, educational organizations, educational process, forms of entrepreneurship,


intrapreneurship.
References:
1. S. Zhienbayeva, A. Kalysh, A. Zhubandykova, R. Nabuova, A. Issayeva, O. Abilmazhinova, and A. Ahmuldinova. (2019). The mode l of
professional competence development in future Physical Education teachers at an entrepreneurial university. Revista Espacios. Vol.
40(31). Available: http://www.revistaespacios.com/a19v40n31/19403107.html
2. A. A. Zholdasbekov, M. Zh. Aymenov, Z. E. Shagataeva, N. A. Esimkhanova, J. D. Dzhartybayeva, and N. Kolyeva. (2019). Formation
of entrepreneurial competence in students majoring in pedagogy. Revista Espacios. Vol. 40(31). Available:
http://www.revistaespacios.com/a19v40n31/19403112.html
3. A. P. Shikverdiev, N. A. Oganezova, V. V. Mazur, N. I. Obrezkov, and M. A. Ichetkina. (2019). Development of regional
competitiveness as a factor in creating a favorable business environment. Revista Espacios. Vol. 40(28). Available:
http://www.revistaespacios.com/a19v40n28/19402806.html
4. O. Bakulina, I. Legan (Lehan), and I. Bakhov. (2019, August). Cluster associations as a factor of innovative and integrative
development of the economy. International Journal of Innovative Technology and Exploring Engineering (IJITEE). Vol. 8(10), pp. 2249-
680. 2255. Available: https://www.ijitee.org/wp-content/uploads/papers/v8i10/J11220881019.pdf
5. M. N. Dudin, N. V. Vysotskaya, E. E. Frolova, A. A. Pukhart, and M. V. Galkina. (2017, October). Improving profe ssional competence
of the staff as a strategic factor for sustainable development of companies. The Journal of Business and Retail Management Re search. 3886-
Vol. 12(1). Available: http://www.jbrmr.com/index.php?view=current&cid=319 3891
6. G. Pinchot, “Innovation through intrapreneuring”, Research Management, vol. 13(2), 1987, pp. 14-19.
7. E. V. Yaluner, O. A. Chesnova, S. A. Ivanov, D. G. Mikheeva, and Y. A. Kalugina. (2019, July). Entrepreneurship Dev elopment:
Technology, Structure, Innovations. International Journal of Recent Technology and Engineering (IJRTE). Vol. 8(2). Available:
https://www.ijrte.org/wp-content/uploads/papers/v8i2/B3732078219.pdf
8. M. N. Dudin, N. P. Ivashchenko, A. G. Gurinovich, O. M. Tolmachev, and L. A. Sonina. (2019). Environmental entrepreneurship:
characteristics of organization and development, Entrepreneurship and Sustainability Issues. Vol. 6(4), pp. 1861 -1871. Available:
https://jssidoi.org/jesi/article/325
9. E. A. Trushkova, A. P. Shikverdiev,N. A. Oganezova, A. A. Vishnyakov, and N. I. Obrezkov. (2019, May). Government Programs on
The YouthEntrepreneurship Development in The Arkhangelsk Region. International Journal of Innovative Technology and Exploring
Engineering (IJITEE). Vol. 8(7). Available: https://www.ijitee.org/wp-content/uploads/papers/v8i7/G5703058719.pdf
10. G. Dyussembekova, G. Reshina, S. Primbetova, M. Sultanova, and G. Beisembayeva. (2019). Role and Importan ce of the Damu
Enterprise Development Fund and International Investment Funds in Implementing Project and Leasing Financing Programs in
Kazakhstan. Space and Culture, India. Vol. 6(5). Available: http://spaceandculture.in/index.php/spaceandculture/article/view/442/273
11. M. Sh. Bauer, R. S. Mussina, N. A. Bencheva, T. V. Ovchinnikova, and I. K. Amerkhanova. (2018, June). Development Problems of
Social Entrepreneurship in Kazakhstan. Journal of Advanced Research in Law and Economics. Vol. 9(4), pp. 1186-1195. Available:
https://journals.aserspublishing.eu/jarle/article/view/2779
12. S. C. Parker, “Intrapreneurship or entrepreneurship?”, Journal of Business Venturing, vol. 26(1), 2011, pp. 19-34.
13. R. Harms, “Intrapreneurship – Managing ideas within your organization”, Technological Forecasting and Social Change, vol. 91, 2015,
pp. 352-353.
14. L. Alpkan, C. Bulut, G. Gunday, G. Ulusoy, and K. Kilic, “Organizational support for intrapreneurship, and its interaction with human
capital to enhance innovative performance”, Management Decision, vol. 48(5), 2010, pp.732-755.
15. P. Van der Sijde, S. Veenker, and W. During, “Intrapreneurship in SMEs: About the role of management and R&D”, European Journal of
Business and Social Sciences, vol. 1(11), 2013, pp.24-30.
16. D. F. Kuratko, “Corporate entrepreneurship”, Foundations and Trends in Entrepreneurship, vol. 3(2), 2007, pp. 151 -203.
17. A. W. Hastuti, N. A. Talib, K. Y. Wong, and A. Mardani, “The role of intrapreneurship for sustainable innovation through process
innovation in small and medium-sized enterprises: A conceptual framework”, International Journal of Economics and Financial Issues,
vol. 6(S3), 2016, pp. 83-91.
18. E. A. Dzhandzhugazova, S. V. Dusenko, M. M. Romanova, L. N. Orlova, K. S. Golondarev, and S. A. Kurbanov. (2018, October).
Entrepreneurial Clusters as a Model of Spatial Development of Russian Tourism. Journal of Environmental Management and Tourism.
Vol. 9(4), pp. 757-765. Available: https://journals.aserspublishing.eu/jemt/article/view/2355
19. O. V. Voronkova, A. A. Kurochkina, I. P. Firova, and T. V. Bikezina. (2018). Current Trends in the Development of Small and Medium-
Sized Enterprises and Individual Entrepreneurship in the Russian Federation. Revista Espacios. Vol. 39(41). Available:
http://www.revistaespacios.com/a18v39n41/18394113.html
20. B. Antoncic, and R. D. Hisrich, “Clarifying the intrapreneurship concept”, Journal of Small Business and Enterprise Developme nt, vol.
10(1), 2003, pp.7-24.
21. J. A. Antoncic, and B. Antoncic, “Employee satisfaction, intrapreneurship, and firm growth: A model”, Industrial Management & Data
Systems, vol. 111(4), 2011, pp.589-607.
22. E. R. Bakhankova, A. Yu. Moskvina, and N. A. Sukhodolskaya, Predprinimatel'skaya deyatel'nost' NKO: posobie [Entrepreneurial
activities of NGO: A handbook]. St. Petersburg: Nonprofit Development Center, 2014.
23. A. G. Mokronosov, and I. N. Mavrina, “Predprinimatel'stvo kak faktor konkurentosposobnogo razvitiya professional'no -
pedagogicheskogo obrazovaniya: teoriya i praktika” [Entrepreneurship as a factor of competitive development of professional and
pedagogical education: Theory and practice], Education and Science, vol. 5(104), 2013, pp. 17-35.
24. A. G. Mokronosov, and I. N. Mavrina, Predprinimatel'skij potencial razvitiya avtonomnogo vuza: monografiya [Entrepreneurial
potential in the development of autonomous higher education institution: Monograph]. Yekaterinburg: Publishing House of Russian
State Vocational Pedagogical University, 2016.
25. O. V. Konina, and E. D. Natenadze. (2015, May-June). Vliyanie konkurencii na rynke obrazovatel'nyh uslug na formirovanie
intraprenerskoj kul'tury vuza [The influence of competition in the educational services market on the formation of intraprene urial
culture of the university]. Science Studies Internet Journal. Vol. 7(3). Available: http://naukovedenie.ru/PDF/135PVN315.pdf
26. E. D. Natenadze, and O. V. Konina. (2017, November-December). Tendencii razvitiya intraprenerskoj kul'tury vuzov v razvityh stranah
[Trends in the development of intrapreneurial culture in universities in developed countries]. Science Studies Internet Journal. Vol. 9(6).
Available: https://naukovedenie.ru/PDF/11EVN617.pdf
27. B. Berry, “Teacherpreneurs: A more powerful vision for the teaching profession”, Phi Delta Kappan, vol. 92(6), 2011, pp. 28-33.
28. T. V. Terentyeva, and O. V. Korneyko. (2017). New approaches to interpretation of entrepreneurship in context of modern development
of the Russian economy. Revista Espacios. Vol. 38(62). Available: http://www.revistaespacios.com/a17v38n62/17386233.html
29. V. A. Osipov, N. V. Shashlo, and A. A. Kuzubov. (2017). Evaluation of economic sustainability of entrepreneurship on the basis of the
value-based efficiency theory. Revista Espacios. Vol. 38(62). Available:
30. http://www.revistaespacios.com/a17v38n62/17386230.html
31. A. Ya Ni, “Comparing the effectiveness of classroom and online learning: Teaching research methods”, Journal of Public Affairs
Education, vol. 19(2), 2012, pp. 199-215.
Irina Petrovna Gladilina, Salman Abduganievich Kurbanov, Denis Alekseevich Maximov, Ekaterina
Authors:
Dmitrievna Dobrova, Katrina Benikovna Dobrova
Digital Franchising and Entrepreneurship: Effects of Digital Technology on the Relations of Business
Paper Title:
Process Participants
Abstract: One of the most popular forms of business in many industries of the world economy is franchising.
The advance of franchising has changed the operational environment for economic entities and created the need to
adjust operational processes, generate new knowledge and implement them in operations.
The purpose of this paper is to analyse the potential of digital franchising and involved drivers of growth
exploited by innovative franchisers in the long run.
The paper provides an analysis and specifies the theoretical aspects of operating digital franchising by an
entrepreneurial enterprise. The drivers of growth exploited by innovative franchisers in the long run are determined.
Digital franchising trends are profiled against the backdrop of digitalisation of the world economy.

Keyword : franchising, franchise, digital franchising, franchise network, franchiser, franchisee.


References:
1. T.M. Regent, O.V. Glinkina, S.A. Ganina, O.V. Markova, V.O. Kozhina, “Improvement of Strategic Management of a Tourism Enterp rise
in the International Market”, Journal of Environmental Management and Tourism, 10(2), 2019, pp. 427-431.
2. S.R. Safaeva, D.A. Ishankhodjaeva, N.A. Juraeva, O.E. Matyunina, “Economic and Legal Aspects of Tourism Regulation in the New
Economy: International Practice”, Journal of Environmental Management and Tourism, 10(2), 2019, pp. 459-463.
3. T.I. Bakinova, N.E. Darbakova, G.Y. Kazakova, S.A. Sangadzhieva , “Information Support of Monitoring as a Tool of Ecological
Optimization of Agricultural Land Use”, Journal of Environmental Management and Tourism, 10(1), 2019, pp. 195-201.
4. L.B. Sitdikova, S.J. Starodumova, “Innovative Digital Rights in Corporate Relations”, International Journal of Engineering and Advanced
Technology, 8(6), 2019, pp. 5176-5179.
5. S.S. Nosova, G.V. Kolodnyaya, S.A. Bondarev, S.A. Verigo, A.B. Kudryashov, “Digital Business as a Driver of Economic Growth in
681. Russia”, Espacios, 40(24), 2019, pp. 25.
6. E.A. Kirillova, A.V. Pavlyuk, O.E. Blinkov, E.V. Blinkova, E.L. Sidorenko, “Digital Inheritance of Social Media Accounts”, In ternational 3892-
Journal of Engineering and Advanced Technology , 8(4), 2019, pp. 963-967. 3896
7. Russian Franchising Association. Available at: https://www.rusfranch.ru/franchising/statistics/
8. Evolyutsiya franchaizinga. Chego zhdat ot etogo rynka v blizhaishie gody? [Evolution of franchising. What to expect in the ma rket within
several years]? Kommersant, April 22, 2019. Available at: https://www.kommersant.ru/doc/3945258
9. G.A. Bunich, L.V. Fedyakina, “Franchaizing: teoriya i praktika” [Franchising. Theory and practice]: monograph. Moscow, Dashko v i K°,
2013, p. 140.
10. S.V. Vatutin, M.E. Trishin, “Klonirovanie biznesa. Franchaizing i drugie modeli bystrogo rosta” [Business cloning. Franchisin g and other
models of rapid growth]. St. Petersburg: Piter, 2013, p. 192.
11. E.L. Davydova, “Franchaizing” [Franchising]. Study guide. Moscow. Plekhanov Russian University of Economics, 2011, p. 120.
12. J.G. Combs, S.C. Michael, G.J. Castrogiovanni, “Franchising: A Review and Avenues to Greater Theoretical Diversity”, Journal of
Management, 30(6), 2004, pp. 907–931.
13. E. Calderon-Monge, I. Pastor-Sanz, P. Huerta-Zavala, “Economic Sustainability in Franchising: A Model to Predict Franchisor Success or
Failure”, Sustainability, 9(8), 2017, pp. 1–16.
14. L.A. Nugroho, “Real options valuation of franchise territorial exclusivity”, Cogent Business & Management, 4(1), 2017, pp. 1–9.
15. J. Gamez-Gonzalez, F.J. Rondan-Catalun, E.C. Diez-de Castro, A. Navarro-Garcia, “Toward an international code of Franchising”,
Management Decision, 48(10), 2010, pp. 1568–1595
16. R.P. Dant, M. Grunhagen, “International franchising research: Some thoughts on the what, where, when, and how”, Journal of Marketing
Channels, 21(3), 2014, pp. 124–132.
17. L. Lewandowska, “Franchising as a way of creating entrepreneurship and innovation”, Comparative Economic Research, 17(3), 201 4, pp.
163–81.
18. S. Baresa, Z. Ivanovic, S. Bogdan, “Franchise Business as a Generator of Development in Central Europe”, UTMS Journal of Econ omics,
8(3), 2017, pp. 281–293.
19. D.V. Tsovma, S.V. Iudina, “Strategic Decision Making in the Corporation and Its Infrastructure Provision: A System Model”, International
Journal of Engineering and Advanced Technology, 8(5), 2019, pp. 1672-1676.
20. M.A. Sadi, J.C. Henderson, “Franchising and small medium-sized enterprises (SMEs) in industrializing economies: A Saudi Arabian
perspective”, Journal of Management Development, 30(4), 2010, pp. 402–412.
21. E.E. Jukova, I.Y. Ilina, M.V. Gundarin, E.V. Potekhina, I.N. Misanova, A.I. Zotova, “Planning a New Business: Typical Mistake s of a
Business Plan in the Service Sector”, Journal of Environmental Management and Tourism, 10(2), 2019, pp. 441-447.
22. M.S. Shakhova, “Franchaizing v Rossii: sostoyanie i perspektivy” [Franchising in Russia. Position and outlook]: monograph. Moscow,
MSU Department of Economics: Ankil, 2013, p. 104.
23. M.S. Shakhova, “Franchaizing v sisteme elektronnoi kommertsii kak osobyi vid predprinimatelstva v epokhu tsifrovoi ekonomiki”
[Franchising in the electronic commerce system as a specific type of entrepreneurship in the digital economy]. Ekonomika i so tsium:
sovremennye modeli razvitiya [Economics and Society: Contemporary Models of Development], 8(3(21)), 2018, pp. 65–74.
24. S. Kashin, “Brend pod kontrolem IT”, RBC+. Specialist supplement to RBC daily business newspaper, 151(2648), 2017, p. 1, 8.
25. M.N. Dudin, N.P. Ivashchenko, A.G. Gurinovich, O.M. Tolmachev, L.A. Sonina, “Environmental entrepreneurship: characteristics of
organization and development”, Entrepreneurship and Sustainability Issues, 6(4), 2019, pp. 1861-1871.
26. Franchise Business Economic Outlook for 2018. IHS Markit Economics, 2018, p. 31. Available at:
https://www.franchise.org/sites/default/files/Franchise_Business_Outlook_Jan_2018.pdf.
27. F. Samsudin, S.A. Wahab, A. Latiff, S.I. Osman, N.M. Zawawi, S.A. Fazal, “Strategic Direction and Sustainable Development in
Franchising Organizations”: A Conceptual Study. Journal of Sustainable Development, 11(4), 2018, pp. 89-98.

Authors: V. I. Hodov, D. Abylkasymov, N. P. Sudarev, О. V. Abrampalskaya, P. I. Migulev

Paper Title: Reproductive Qualities of Romanov Sheep with Regard to the Paratypic Factors
Abstract: The article discusses the results of own studies of the authors, the literature data, and the best
practices of Romanov sheep breeding. The research was performed at the two Romanov sheep pedigree breeding
units in the Tver region, LLC Rassvet and LLC PF Pokrov. This breed has several advantages, such as the
possibility of insemination in any season, early maturing, multiparity, the quality of sheepskin, and the taste of the
lamb meat. The authors studied the productivity and the reproductive ability of ewes depending on the season, the
age of insemination, the live weight, the birth type of the lamb crop. More lambs are obtained in the lambings
during the autumn and winter from the ewes after three and more lambings. The survival rate is higher in the winter
and summer lambings. The optimal time of insemination is 12 – 13 months. At these farms, three lambings were
obtained in two years.

Keyword : the age at first insemination, birth type, ewes, lamb crop survival rate, lambs’ weaning, lambing, live
weight, polyestricity, reproductive ability, Romanov sheep.
References:
1. Kh. A. Amerkhanov, M. V. Egorov, and E. L. Revyakin, Aktualynye aspekty vedeniya ovtsevodstva i kozovodstva v sovremennyh usloviyah
[Relevant aspects of sheep and goats breeding in the modern conditions]. Moscow: FSBSI Rosinformagrotekh, 2012.
2. N. P. Sudarev, A. S. Abramyan, and D. Abylkasymov, Romanovskaya poroda ovets (Osnovy razvedeniya v tsentralynoj Rossii) [The
682. Romanov sheep breed (The basics of breeding in Central Russia)], 2nd ed., rev. and amend. Scientific and practical recommendations. Tver:
The Tver State Agricultural Academy, 2017. 3897-
3. E. A. Babich, N. A. Kikebayev, V. A. Raketsty and A. A. Baisakalov. (2019, June). Dependence of Growth and Development of Rearing 3901
Stock in Northern Kazakhstan on the Origin of Servicing Bulls. Agri Bio. Research Publishers. Vol. 24(1). Available:
http://agribiop.com/dependence-of-growth-and-development-of-rearing-stock-in-northern-kazakhstan-on-the-origin-of-servicing-bulls/
4. S. Kaldybayev, K. Kubenkulov, I. Alimaev and K. Erzhanova. (2019, June). The Modern State of Degraded Pastures in the Submontane
Semi-desert and Desert Zones of Kazakhstan. Agri Bio. Research Publishers. Vol. 24(1). Available: http://agribiop.com/the-modern-state-
of-degraded-pastures-in-the-submontane-semi-desert-and-desert-zones-of-kazakhstan/
5. I. Ju. Dominitsty, G. P. Demkin, V. V. Salautin and N. A. Pudovkin. (2019, June). Morphometric Characteristics of Pathological Processes
in the Lungs, Liver and Kidneys in Calves with Catarrhal Bronchopneumonia. Agri Bio. Research Publishers. Vol. 24(1). Available:
http://agribiop.com/morphometric-characteristics-of-pathological-processes-in-the-lungs-liver-and-kidneys-in-calves-with-catarrhal-
bronchopneumonia/
6. N. I. Kravchenko, “Zanimatysya ovtsevodstvom vygodno. Osnova rentabelynosti – mnogoplodie ovtsematok i intensivnoe vyraschivanie
yagnyat” [Sheep breeding is profitable. The bases of profitability are ewes' multiparity and intensive lamb growing], Animal Breeding in
Russia, vol. 6, 2014, pp. 7–9.
7. A. I. Erokhin, S. A. Erokhin, and E. A. Karasev, Intensifikatsiya vosproizvodstva ovets [Intensification of sheep reproduction]. Moscow:
Infra-M, 2012.
8. D. D. Arsenyev, and V. Y. Lobkov, “Problemy i perspektivy razvitiya romanovskogo ovtsevodstva” [Problems and perspectives of
Romanov sheep breeding development], Bulletin of the Agrarian and Industrial Complex of the Upper Volga region, vol. 3(23), 2013, pp.
27–31.
9. N. A. Fedorov, A. I. Erokhin, and L. S. Novikov, Romanovskoe ovtsevodstvo [Romanov sheep breeding]. Moscow: Agropromizdat, 1987.
10. A. I. Erokhin, E. A. Karasev, and S. A. Erokhin, Romanovskaya poroda ovets: Sostoyanie, sovershenstvovanie, ispolyzovanie genofonda
[The Romanov sheep breed: State, improvement and the use of the gene pool]. Moscow: FSSI Rosinformagrotekh, 2005.
11. B. Xiao-Dan, C. Ming-Xing, J. Hai-Guo, F. Li, and Y. Su-Cheng, “Estrogen receptor as a candidate gene for prolificacy of Small Tail Han
sheep”, Acta Genetica Sinica, vоl. 32, 2005, pp. 1060–1065.
Anna Geroldovna Bezdudnaya, Marina Gennadyevna Treyman, Tatyana Yuryevna Ksenofontova,
Authors:
Roman Valentinovich Smirnov, Alexey Valerevich Vasilchikov, Natalya Anatolyevna Loginova
Enhancing the Environmental Safety of The Region by Introducing Innovative Methods for Recycling
Paper Title:
of Production Biowaste
Abstract: The main specifics of poultry waste management, characteristic of the Russian Federation, have been
presented in the article. The goal of the study is to identify problems and ways of processing waste from the poultry
farm activities.
The situation with waste management has been analyzed in the article, and the specifics of the production
683. activities of the poultry farm have been considered by the example of the largest company in Russia, JSC Roskar.
Aside from technological specifics, the methods and processes for processing poultry droppings, the most common 3902-
in Russia and abroad, have been examined in detail. 3908
As a result, the most priority method for processing production biowaste has been defined as incineration to
produce a byproduct of biochar; the characteristics of the plant and its features have been defined based on the
waste composition and the amount of its formation as a result of agricultural activities.

Keyword : production waste management, incineration, biochar, poultry farm, waste recycling, recycling
principles.
References:
1. A. Bezdudnaya, O. Kadyrova, N. Zinchik, D.S. Iudin, P. Induchny, M. Treiman, “Actual issues related to organizing the work on the
market of services on collecting, transporting and cleaning liquid household waste in the private housing on the territory of the urban
agglomeration”, International Journal of Civil Engineering and Technology, 9(11), 2018, pp. 1738 – 1752
2. A.M. Bondarenko, V.P. Zabrodin, A.N. Kurochkin, “Mekhanizatsiya protsessov pererabotki navoza zhivotnovodcheskikh predpriyatiy v
vysokokachestvennyye organicheskiye udobreniya” [Mechanization of processing of manure from livestock enterprises into high -quality
organic fertilizers]. The Azov-Black Sea State Agroengineering Academy. Zernograd: ABSAA, 2010, p. 183.
3. Yu.I. Efimychev, Yu.O. Plekhova, V.N. Gubanov, “Organizatsionno-ekonomicheskoye obespecheniye razvitiya promyshlennykh
predpriyatiy” [Organizational and economic support for the development of industrial enterprises]: The Nizhny Novgorod State University
named after N.I. Lobachevsky. Nizhny Novgorod: Publishing House of the Nizhny Novgorod State University, 2010, p. 186.
4. V.G. Golubtsov, A.A. Tyulkin, A.V. Syatchikhin, “Problemy nauchno-tekhnicheskoy i innovatsionnoy politiki v Rossii” [Problems of
scientific, technical, and innovative politics in Russia]. USA: Sant Louis MOUSA Publishing house Science & innovation center, 2013,
pp. 79 – 103.
5. T.Yu. Ksenofontova, “Upravleniye konkurentosposobnostyu predpriyatiya na osnove vovlecheniya v khozyaystvennyy oborot
innovatsionnoyemkikh OIS” [Management of enterprise competitiveness based on the involvement of innovative-intensive intellectual
property items in the economic turnover]. Business in law, 2013, pp. 227 – 230.
6. O.A. Surzhko, M.A. Kulikova, “Ekologicheskaya bezopasnost pri pererabotke i utilizatsii kontsentrirovannykh po biogennym elem entam
zhidkikh otkhodov promyshlennykh predpriyatiy” [Environmental safety in the recycling and disposal of industrial nutrient liquid waste
from industrial enterprises concentrated by nutrient elements]. Ministry of Education and Science of the Russian Federation, The South
Russian State Technological University. Novocherkassk: SRSTU (NPI), 2011, p. 140.
7. A.M. Gonopolsky, A.V. Albegova, I.V. Kozlyakova, “Upravleniye potokami otkhodov” [Waste flow management]. Moscow: VESI, 2014,
p. 463.
8. A.Yu. Vinarov, A.A. Kukharenko, T.V. Ipatova, “Biotekhnologiya pererabotki otkhodov zhivotnovodstva i ptitsevodstva v
organicheskoye udobreniye” [Biotechnology for recycling waste from livestock and poultry farming into organic fertilizer]. Mo scow,
1998, p. 114.
9. V.I. Golik, E.V. Shevchenko, E.B. Ermishina, “Kontseptualnyye aspekty razvitiya promyshlennykh predpriyatiy sovremennoy Rossii”
[Conceptual aspects of the development of industrial enterprises in modern Russia]. Krasnodar: Southern Institute of Manageme nt, 2011,
p. 275.
10. R.E. Khabibullin, G.O. Ezhkova, O.A. Reshetnik, “Optimizatsiya biotekhnologicheskikh protsessov pererabotki otkhodov
agropromyshlennogo kompleksa” [Optimization of biotechnological processes for recycling agricultural waste]. Kazan: The Kazan
National Research Technological University, 2016, p. 199.
11. V.V. Ivanov, I.V. Ivanov, “Kompleksnaya pererabotka promyshlennykh otkhodov” [Complex recycling of industrial waste]. Ryazan: NP
"Golos gubernii", 2011, p. 472.
12. Glubokaya pererabotka biomassy i otkhodov selkokhozyaystvennogo proizvodstva [Deep recycling of biomass and agricultural wast e: a
scientific analytical review]. Moscow: The Federal State Budgetary Institution Rosinformagroteh, 2014, p. 250.
13. Yu.N. Kartushina, V.F. Zheltobryukhov, “Metody pererabotki tverdykh otkhodov” [Solid waste recycling methods]: Ministry of Ed ucation
and Science of the Russian Federation, The Volgograd State Technical University. Volgograd: VolgSTU, 2016, p. 96.
14. A.K. Timurbekova, “Pererabotka otkhodov pishchevoy promyshlennosti” [Food industry waste recycling]: study guide. Almaty: Nur-Print,
2014, p. 58.
15. N.N. Korneva, A.V. Molchanova, V.P. Lysenko, “Ekologicheskiye i ekonomicheskiye perspektivy razvitiya promyshlennogo
ptitsevodstva” [Environmental and economic prospects for the development of the industrial poultry farming]. All-Russian Research
Institution of Poultry Farming. Moscow: Voskhod-A, 2009, p. 207.
16. N.F. Timerbaev, R.G. Safin, A.R. Khisameeva, T.D. Iskhakov, “Sovershenstvovaniye tekhniki i tekhnologii protsessa gazifikatsi i
vysokovlazhnykh otkhodov” [Improving the techniques and technology of gasification of high-moisture waste]. Kazan: Kazan National
Research Technological University, 2013, p. 92.
17. D.A. Baeva, V.B. Chernov, “Upravleniye konkurentosposobnostyu promyshlennogo predpriyatiya” [Management of the competitivenes s
of an industrial enterprise – Chelyabinsk]: Abris-Print, 2010, p. 189.
18. Ya.I. Vaisman, V.N. Korotaev, L.V. Rudakova, “Upravleniye otkhodami. Mekhanobiologicheskaya pererabotka tverdykh bytovykh
otkhodov. Kompostirovaniye i vermikompostirovaniye organicheskikh otkhodov” [Waste management. Mechanobiological processing of
municipal solid waste. Composting and vermicomposting of organic waste]: The Perm National Research Polytechnic University, The
Federal Budgetary Research Institution, Research Institute of Ecology and State Environmental Protection named after A. N. Sysin of the
Ministry of Health of the Russian Federation. Perm: Publishing house of the Perm National Research Polytechnic University, 20 12, p. 224.
19. O.N. Klyukina, N.V. Nepovinnikh, E.V. Kuntashov, “Innovatsionnyye tekhnologii kompleksnoy pererabotki produktsii selskogo khoz-va i
yeyo otkhodov na territorii Rossiyskoy Federatsii” [Innovative technologies for the integrated recycling of agricultural prod ucts and their
waste in the Russian Federation]. Ministry of Agriculture of the Russian Federation, The Federal State Budgetary Educational
Establishment of Higher Professional Education “Saratov State Agrarian University named after N.I. Vavilov”. Saratov: Saratov source,
2015, p. 289.
Nikolay Mikhailovich Rebelsky, Valery Nikolaevich Alferov, Valery Valerevich Smirnov, Victor
Authors:
Nikolaevich Prasolov
Paper Title: Forming an Optimal Investment Portfolio
Abstract: The choice of the investor’s investment policy is determined by their capabilities and market
conditions. The formed investment portfolio has some positive specifics and advantages over other types of capital
investment. Portfolio investment allows not only to plan and evaluate the results of investment in various markets,
but also to control them in order to achieve high investment efficiency. An investment portfolio can be formed from
various market instruments of corporate stocks and bonds with varying degrees of security and risk, as well as
investing in other financial instruments. However, it is worth noting that investment portfolios with alternative
684. investments are increasingly common in practice.
3909-
3914
Keyword : risk, portfolio investment, assets, portfolio return, financial instruments.
References:
1. Н.М. Markowitz, “Portfolio Selection: Efficient Diversification of Investments”, Yale University Press, 1959, p. 344.
2. H.M. Markowitz, “Portfolio Selection”, The Journal of Finance, 7(1), 1952, pp. 77-91.
3. Н.М. Markowitz, “The Optimization of the Quadratic Function Subject to Linear Constrains”, Naval Research Logistic Quarterly, 3, 1956,
pp. 111-133.
4. J. Tobin, “The Theory of Portfolio Selection”, in: F. H. Hahn and F.R.P. Brechling, The Theory of Interest Rate. London: Macmillan,
1965, pp. 3-51.
5. J. Tobin, “Liquidity Preference as Behavior Towards Risk”, Review of Economic Studies, 25(2), 1958, pp. 65-86.
6. J. Mossin, “Equilibrium in Capital Assets Market”, Econometrica, 34(4), 1966, pp. 768-783.
7. Treynor, J.L. Market Value, Time, and Risk / J.L. Treynor. – Unpublished manuscript, 1961.
8. J.L. Treynor, “How to Rate Management of Investment Funds”, Harvard Business Review, 43(1), 1965, pp. 63 – 75.
9. W. Sharpe, A. Gordon, “Investments”. Moscow: Infra-M, 2015, p. 509.
10. W. Sharpe, “Portfolio theory and capital markets”, N.Y.: McGraw-Hill, 1970, p. 130.
11. W. Sharpe, “Asset allocation: Management style and performance measurement”, Journal of Portfolio Management, 18(2), 1992, pp . 7-19.
12. J. Lintner, “The Valuation of Risk Assets and the Selection of Risky Investments in Stock Portfolios and Capital Budgets”, Review of
Economics and Statistics, 47(1), 1965, pp. 13 – 37.
13. F. Modigliani, R.A. Cohn, “Inflation, rational valuation, and the Market”, Financial Analysts Journal, 35(2), 1979, pp. 24-44.
14. F. Modigliani, L. Modigliani, “Risk-adjusted performance: how to measure it and why”, Journal of Portfolio Management, 23(2), 1997, pp.
45-54.
15. S. Ross, “The Arbitrage Theory of Capital Asset Pricing”, Journal of Economic Theory, 13(3), 1976, pp. 341-360.
16. R. Roll, “A critique of the asset pricing theory’s tests: Part I: On past and potential testability of the theory”, Journal of Financial
Economics, 4(2), 1977, pp. 129-176.
17. R. Roll, “A possible explanation of the small firm effect”, Journal of Finance, 36(4), 1981, pp. 879-888.
18. E.F. Fama, M.H. Miller, “The Theory of Finance”, New York: Holt, Rinehart and Winston, 1972, p. 368.
19. E.F. Fama, K.R. French, “Common risk factors in the returns on stocks and bonds”, The Journal of Financial Economic s, 33(1), 1993, pp.
3-56.
20. A.S. Shapkin, V.A. Shapkin, “Ekonomicheskiye i finansovyye riski. Otsenka, upravleniye, portfel investitsiy” [Economic and financial
risks. Assessment, management, investment portfolio]: monograph. M.: Dashkov and Co., 2018, p. 544.
21. A.S. Shapkin, V.A. Shapkin, “Upravleniye portfelem investitsiy tsennykh bumag” [Managing the securities investment portfolio] :
Monograph. Moscow: Dashkov and Co., 2018, p. 512.
22. Yu.F. Kasimov, “Osnovy teorii optimalnogo portfelya tsennykh bumag” [Fundamentals of the theory of an optimal securities portfolio]:
monograph. Moscow: Filin, 2011, p. 142.
23. A.E. Abramov, “Investitsionnyye fondy. Dokhodnost i riski, strategii upravleniya portfelem” [Investment funds. Return and ris ks, portfolio
management strategies]. Moscw: Alpina Publisher, 2015, p. 311.
24. R. Gibson, “Formirovaniye investitsionnogo portfelya: upravleniye finansovymi riskami [Forming the investment portfolio: fina ncial risk
management]. Moscow: Alpina Publisher, 2015, p. 270.
25. M.A. Khalikov, “Osobennosti modeley upravleniya investitsionnym portfelem ne institutsionalnogo investora – fundamentalnyye
issledovaniya rossiyskogo fondovogo rynke” [Specifics of non-institutional investor investment portfolio management models]
fundamental research into the Russian stock market: fundamental research. Moscow: 2015, pp. 3136-3145.
26. R.C. Merton, “An Intertemporal Capital Asset Pricing Model”, Econometrica, 41(5), 1973, pp. 867-887.
27. R.C. Merton, “Optimum Consumption and Portfolio Rules in a Continuous-time Model”, Journal of Economic Theory, 3(4), 1971, pp.
373-413.
28. A.N. Burenin, “Upravleniye portfelem tsennykh bumag” [Securities portfolio management]: study guide. Moscow: NTO named after
Vavilov, 2008, p. 24.
29. A.N. Burenin, “Rynok tsennykh bumag” [Stock market]. Moscow: NTO, 2014, p. 35.
30. Official website of the Moscow Exchange. Available at: https://www.moex.com/

Authors: K. Maruthi Prasad, Prabhaker Reddy Yasa


Mathematical Modelling on an Electrically Conducting Fluid Flow in an Inclined Permeable Tube with
Paper Title:
Multiple Stenoses
Abstract: The effect of electrically conducting fluid flow in an inclined tube with permeable walls and having
multiple stenosis through porous medium was studied. The Homotopy Perturbation Method is used to calculate the
phenomena of Nanoparticle and temperature of the coupled equations. The solutions have been analyzed on the
basis of pressure drop, resistance to the flow and wall shear stress. It is identified that the heights of the stenosis,
Thermophoresis parameter, local temperature Grashof number, local nanoparticle Grashof number, Magnetic
parameter increases with the resistance to the flow and Brownian motion number, permeability constant decreases
with resistance to the flow. It is remarkable that, the resistance to the flow is found increasing for the values of
inclination α<45 and decreases for the values of α>45. The observation also notes that, the shear stress at the wall is
found increasing with the height of the stenosis, Inclination, Thermophoresis parameter, local nanoparticle Grashof
number and Permeability constant, but found decreasing with Brownian motion parameter and Magnetic Parameter.

Keyword : Nanofluid, Resistance to the flow, Stenosis, Permeability constant, Magnetic Parameter, Porous
Medium .
685. References:
1. D.F. Young. Effects of a Time-Dependent Stenosis on Flow through a Tube. J. Eng. Ind., Trans ASME, vol. 90, pp. 248-254, May 1968. 3915-
2. B. E. Morgan and D. F. Young. An Integral Method for the Analysis of Flow in Arterial Stenoses. Bulletin of Mathematical Biology, vol.
36, pp. 39-53, Feb. 1974. 3921
3. D. MacDonald. On Steady Flow through Modeled Vascular Stenoses. Journal of Biomechanics, vol. 12, no. 1, pp. 13-201979.
4. N. Padmanabhan. Mathematical Model of Arterial Stenosis. Med. Biol. Eng. Comput., vol. 18, pp. 281-286, Aug. 1980.
5. J. B. Shukla, R. S. Parihar and B. R. P. Rao. Effects of Stenosis on Non-Newtonian Flow of the Blood in an Artery. Bull. Math. Biol.
Vol. 42, pp. 283-294, Jan. 1979.
6. Rashid Ali, Ramindar Kaur, V. K. Katiyar and M. P. Singh. Mathematical modelling of Blood Flow through Vetebral Artery with
Stenoses. Indian Journal of Biomechanics Special Issue, March 2009.
7. Ranadhir Roy, N. Daniel Riahi and Nelson Carrasquero. Mathematical Modeling of Blood Flow in an Artery with an Unsteady
Stenosis using Power-Law Fluid Model. SOP Transactions on Applied Mathematics, vol.1, no. 1 pp-2373-8480, July 2014.
8. K. Maruthi Prasad and G. Radhakrishnamacharya. Flow of Herschel-Bulkley Fluid through an Inclined Tube of Non-Uniform Cross-
Section with Multiple Stenoses. Arch. Mech., vol.60, no. 2, pp. 161-172, Warszawa 2008.
9. Gurju Awgichew and G. Radhakrishnamacharya. Effect of Slip Condition and Multiple Constrictions on Couple Stress Fluid Flow
through a Channel of Non Uniform Cross Section. ARPN Journal of Engineering and Applied Sciences, vol. 8, no. 5, May 2013.
10. Sapna Ratan Shah, S. U. Siddiqui and Anuradha Singh. Effects of Inclined Multi-Stenoses Arteries on Blood Flow Characteristics
Using Bingham Plastic Fluid. International Journal for Mathematics, vol. 1, pp. 7-14, Dec. 2015.
11. Raja Agarwal and N. K. Varshney. Pulsatile Flow of Herschel-Bulkley Fluid through an Inclined Multiple Stenoses Artery with Periodic
Body Acceleration. Pelagia Research Library, Advances in Applied Science Research, vol.7(3), pp.102-113, 2016.
12. Francesco Gentile, Paolo Decuzzi. Time Dependent Dispersion of Nanoparticles in Blood Vessels. J. Biomedical Science and
Engineering, vol. 3, pp. 517-524, April 2010.
13. Sohail Nadeem, Shagufta Ijaz and Noreen Sher Akbar. Nanoparticle Analysis for Blood Flow of Prandtl Fluid Model with Stenosis.
International Nano Letters, 2013.
14. R. Ellahi, S. U. Rahman, S. Nadeem and N. S. Akbar. Blood Flow of Nanofluid through an Artery with Composite Stenosis and
Permeable Walls. Appl. Nanosci., vol. 4, pp.919-926, Nov 2014.
15. Noreen Sher Akbar and M. T. Mustafa. Ferromagnetic Effects for Nanofluid Venture Through Composite Permeable Stenosed Arteries
with different Nanosize Particles. AIP Advances, vol. 5, June 2015.
16. S. U. S. Choi and J. A. Eastman. Enhancing Thermal Conductivity of Fluids with Nanoparticles, ASME International Mechanical
Engineering Congress & Exposition, New York, vol. 66, pp. 9-105, Nov. 1995.
17. T. M. Nabil El-dabe, M. Moatimid, A. Hassan, and R. Mostapha. Analytical Solution of the Peristaltic Flow of a Jeffrey Nanofluid in a
Tapered Artery with Mild Stenosis and Slip Condition. International Journal of Innovation and Applied Studies, vol.12, no.1, pp. 1-32,
July 2015.
18. K. Maruthi Prasad, N. Subadra and M. A. Srinivas. Peristaltic Transport of Nanofluid in an Inclined Tube. American Journal of
Computational and Applied Mathematics, vol.5(4), pp. 117-128, May 2015.
19. Rekha Bali, Nivedita Guptaa and Swati Mishra. Study of Transport of Nanoparticles with Power Law fluid Model for Blood Rheology
in Capillaries. Journal of Progressive Research in Mathematics, vol. 7, May 2016.
20. Bali, R. and Awasthi, U. (2011): “Mathematical model of blood flow in the small blood vessel in presence of magnetic field”, Applied
Mathematics, vol.2, pp. 264-269.
21. Tripathi, D. (2012): “A mathematical model for blood flow through an inclined artery under the influence of an inclined magnetic field, “
Journal of Mechanics in Medicine and Biology, vol. 12, pp. 1-18.
22. Bhatnagar, A., Shrivastav, R. K. and Singh, A. K. (2015): “ A numerical analysis for the effect of slip velocity and stenosis shape on
Non-newtonian flow of blood”, International Journal of Engineering, vol. 28 (3), pp. 440-446.
23. Jain, M., Sharma, G. C. and Singh, R. (2010): “Mathematical modelling of blood flow in a stenosed artery under MHD effect through
porous medium,” International Journal of Engineering, Transactions B, vol. 23, no. 3-4, pp. 243-252.
Oksana Holiuk, Ian Kurinnyi, Svetlana Kurinna, Nataliia Honchar, Viktoriia Rozghon, Valentyna
Authors:
Dogadina
Paper Title: Integrative Model for Enhancing Students' Competencies and the Quality of Educational Services
Abstract: The active introduction of digital technologies leaves its mark on all spheres of life, as well as on the
modern education system, in particular, the need to improve the quality of educational services forces us to look for
new teaching methods.
The opportunities provided by modern science to the young generation of teachers, in close interconnection with
the accumulated experience of traditional teaching systems, make it possible to significantly increase both the
effectiveness and quality of training and the competence of students.
The rhythm and dynamics of modern life necessitate the search for new approaches to traditional paradigms in
enlightenment. The capabilities of the digital age technologies make it possible to implement such training schemes
that were simply impossible with traditional approaches.
A flexible approach and a modular structure allow you to quickly adapt any training course to any needs, adding
and updating outdated information at no particular cost. Combined training systems fully realize all the advantages
of distance learning, which can significantly expand the geographical and time frames, making any course truly
universal.

686.
Keyword : Competencies, Educational Services, Integrative Model, Quality, Student.
3922-
References: 3928
1. Prokopenko, O., Holmberg, R., Omelyanenko, V., Information and communication technologies support for the participation of
universities in innovation networks (comparative study), Innovative Marketing, 2018, 14(3), pp. 17-29
2. Bashynska, I., Baldzhy, M., Ivanchenkova, L., Skliar, L., Nikoliuk, O., Tkachuk, G., Game risk management methods for investm ent
portfolio optimization, International Journal of Recent Technology and Engineering, 8(2), 2019, pp. 3940-3943.
3. Svitlana Bondarenko, Olena Laburtseva, Оlena Sadchenko, Vira Lebedieva, Oleksandra Haidukova, Tetyana Kharchenko, Modern Lead
Generation in Internet Marketing for the Development of Enterprise Potential, International Journal of Innovative Technology and
Exploring Engineering, Volume-8 Issue-12, October 2019, pp. 3066-3071 DOI: 10.35940/ijitee.L2477.1081219
4. Omar Ochoa, Salamah Salamah, An approach to enhance students' competency in software verification techniques, October 2015,
Conference: 2015, IEEE Frontiers in Education Conference (FIE) DOI: 10.1109/FIE.2015.7344050
5. Ella Graj et al., Enhancing student competency in risky clinical environments: Evaluating an online education program, Novemb er 2018,
Australian Psychologist, 54(1), DOI: 10.1111/ap.12364
6. Rudolf R. Sinkovics, Christopher Richardson, Yong Kyu Lew, Enhancing Student Competency and Employability in International
Business Through Master’s Dissertations, January 2016, Journal of Teaching in International Business, 26(4), DOI:
10.1080/08975930.2015.1130107
7. Yan Bai, Carol Taylor, Cyber defense competition: enhancing student competency in information security, Conference: SIGITE' 11 ACM
Special Interest Group for Information Technology Education Conference, West Point, NY, USA, October 20-22, 2011, October 2011,
DOI: 10.1145/2047594.2047675
8. Putrya Hawa, Interactive e-learning in pharmacology to enhance student competency in faculty of medicine UII, April 2009, DOI:
10.20885/JKKI.Vol7.Iss4.art7

Authors: Anatoly Maslov, Nataliia Spasiv, Borys Bezzubko, Iuliia Lazebnyk, Tetiana Nych, Lyudmila Ternova

Paper Title: Spatial Optimization of Regional Social Infrastructure Facilities


Abstract: Features of resettlement in regions with a low population density (in rural areas, first of all) initially
do not allow creating an adequate network of social infrastructure objects. The sufficient demand for its additional,
687. better services is insignificant. Institutions capable of providing more sophisticated services are located in larger
communities. The dispersal of objects over a vast territory creates difficulties in maintenance and repair, control 3929-
and management. It was shown that studies of the provision of services in the social sphere are divided into two 3932
broad groups in foreign scientific works. Some display the process of providing services on a map, and others
simulate the availability of using various services. Most of them consider optimizing the placement of medical
facilities. Educational and other organizations of social infrastructure receive much less attention.
Keyword : Regional, Social Infrastructure Facilities, Spatial Optimization .
References:
1. Ewa Szostak, Regional social infrastructure from the perspective of an ageing society, January 2018, Prace Naukowe Uniwersytetu
Ekonomicznego we Wrocławiu, DOI: 10.15611/pn.2018.537.10
2. Arthur Grimes, Matthew Roskruge, Philip McCann, Jacques Poot, Social Capital and Regional Social Infrastructure Investment, J anuary
2012, International Regional Science Review, 35(1), pp. 3-25
3. Isaiah Oluranti Olurinola, Oluranti, Michael Bolarinwa, Kayode, ICT access, social infrastructural facilities and the performance of
informal micro-and small-business enterprises in nigeria ict access and social infrastructural facilities: implications for the performance of
informal micro-and small-business enterprises in Nigeria, Conference: International Conference on African Development IssuesAt:
Covenant University, NigeriaVolume: 2016, May 2016
4. Alissa Dubgorn, Irina Zaychenko, Nadezhda Grashhenko, A rationale for choosing the mechanism of public-private partnership for the
sustainable development of social infrastructure facilities, January 2018,, MATEC Web of Conferences, 170(3):01056, DOI:
10.1051/matecconf/201817001056
5. Alexandr Orlov, Irina Chubarkina, Implementation of construction projects for social infrastructure development in Smart Cities, June
2018, DOI: 10.1088/1757-899X/365/2/022019
6. Arika Ligmann‐Zielinska, Spatial Optimization, In book: The International Encyclopedia of Geography, March 2017, DOI:
10.1002/9781118786352.wbieg0156
7. Kamyoung Kim, Denis Joseph Dean, Hyun Kim, Yongwan Chun, Spatial Optimization for Regionalization Problems with Spatial
Interaction: A Heuristic Approach, April 2015, International Journal of Geographical Information Science 30(3):1-23, DOI:
10.1080/13658816.2015.1031671
8. Rajnandi Patel, Jagruti Shah, Bhasker Vijaykumar Bhatt, Social Infrastructure Planning Based on Accessibility Analysis -A Review,
February 2019, Conference: Emerging Research and Innovations in Civil EngineeringAt: Surat, Gujarat, India
9. Sergey Znobishchev, Victoria Shamraeva, Practical use of BIM modeling for road infrastructure facilities, September 2019, DOI :
10.23968/2500-0055-2019-4-3-49-54
10. Bhasker Vijaykumar Bhatt, Kevin Kapadia, S K Dave, Dahej PCPIR-Opportunity Analysis for Social Infrastructure, November 2018,
Conference: Reaching the Unreached: A Challenge to Technological DevelopmentAt: Bali, Indonesia
11. Svetlana Ershova, Tamara Orlovskaya, Svetlana Shishelova, Methodology of planning social infrastructure development to create a
comfortable urban environment, January 2018MATEC Web of Conferences 170(344):02018, DOI: 10.1051/matecconf/201817002018

Authors: Manoj Ranjan Mishra, Amit Vijay Kore, Jayaprakash Kar

Paper Title: A Systemic view of One-Pass Cryptographic Key Distribution Techniques for WSNs
Abstract: The availability and use of cheaper and smaller sensors has brought an evolution in the field of
Wireless Sensor Networks. The changes occurring in the environment can be observed, recorded through the large-
scale deployment of sensor nodes that can build-up the much-required information system. Also, they are able to
monitor and congregate data about the living organisms therein. In near future, millions more devices are expected
to be connected. We focus upon the security services required by WSNs that are most challenging as compared to
other networks. First, we introduce the commercially used motes with the comparison of technical and
implementation related issues. Second, we analysed the variants of existing one-pass key management protocols for
the resource constrained devices. Our aim is to provide a new direction to WSN Security through a restricted key
distribution mechanism.

Keyword : Forward Secrecy, Implicit Key Authentication, key distribution, Known/Unknown key Security,
Motes, One-pass key Establishment, Wireless Sensor Networks
References:
1. Knight, J. R., Allan, R. J., Folland, C. K., Vellinga, M., & Mann, M. E., “A signature of persistent natural thermohaline circulation
cycles in observed climate,” Geophysical Research Letters, Vol.32, no.20, 2005.
2. Kahn RHKJM and KSJ Pister, “Mobile networking for smart dust,” In ACM/IEEE International Conference on Mobile Computing
and Networking (MobiCom 99), Seattle, 1999.
688. 3. V Veena Madhuri, Syed Umar, and P Veeraveni, “A study on smart dust (mote) technology,” In International Journal of Science,
Engineering and Computer Technology, Vol.3, no.3, pp.124, 2013.
4. Chien-Chung Shen, Chavalit Srisathapornphat, and Chaiporn Jaikaeo, “Sensor information networking architecture and
3933-
applications,” IEEE Personal communications, Vol.8, no.4, pp. 52-59, 2001. 3942
5. Abu Zafar Abbasi, Noman Islam, Zubair Ahmed Shaikh, et al., “A review of wireless sensors and networks’ applications in
agriculture,” Computer Standards & Interfaces, Vol.36, no.2, pp. 263-270, 2014.
6. S Gowrishankar, TG Basavaraju, DH Manjaiah, and Subir Kumar Sarkar, “Issues in wireless sensor networks,” In Proceedings of the
World Congress on Engineering, Vol.1, pp. 978-988, 2008.
7. Luis Ruiz-Garcia, Loredana Lunadei, Pilar Barreiro, and Ignacio Robla, “A review of wireless sensor technologies and applications
in agriculture and food industry: state of the art and current trends”, In sensors, Vol.9, no.6, pp. 4728-4750, 2009.
8. Martin Turon, “Mote-view: A sensor network monitoring and management tool,” In the Second IEEE Workshop on Embedded
Networked Sensors, 2005, EmNetS-II., pp. 11-17, 2005.
9. Ian F Akyildiz, Weilian Su, Yogesh Sankarasubramaniam, and Erdal Cayirci, “Wireless sensor networks: a survey,” In Computer
networks, vol.38, no.4, pp. 393–422, 2002.
10. Franck L Lewis, “Wireless sensor networks, Smart environments: technologies, protocols, and applications,” pp. 11-46, 2004.
11. Matthias Ringwald and Kay Romer, “Deployment of sensor networks: Problems and passive inspection,” In Intelligent Solutions in
Embedded Systems, 2007 Fifth Workshop on, pp. 179-192. IEEE, 2007.
12. Joseph M Kahn, Randy H Katz, and Kristofer SJ Pister, “Next century challenges: mobile networking for smart dust,” In Proceedings
of the 5th annual ACM/IEEE international conference on Mobile computing and networking, pp. 271-278, ACM, 1999.
13. Marcos Augusto M Vieira, Claudionor N Coelho, DC da Silva, and Jos´e Monteiro da Mata, “Survey on wireless sensor network
devices,” In Emerging Technologies and Factory Automation,” In Proceedings. ETFA’03. IEEE Conference, vol.1, pp. 537 -544.
IEEE, 2003.
14. Maxim A Batalin and Gaurav S Sukhatme, “Coverage, exploration and deployment by a mobile robot and communication network,”
In Telecommunication Systems, vol.26, no. (2-4), pp. 181-196, 2004.
15. Roger Wattenhofer, Li Li, Paramvir Bahl and Y-M Wang, “Distributed topology control for power efficient operation in multihop
wireless ad hoc networks,” In INFOCOM 2001. Twentieth annual joint conference of the IEEE computer and communications
societies. Proceedings. IEEE, vol.3, pp. 1388-1397, IEEE, 2001.
16. Micaz datasheet, MEMSIC, http://www.memsic.com/userfiles/files/Datasheets/WSN/micaz_datasheet-t.pdf, (accessed March 7,
2018).
17. Tmote Sky Datasheet, https://insense.cs.st-andrews.ac.uk/files/2013/04/tmote-sky-datasheet.pdf, (accessed March 7, 2019).
18. Imote2, Datasheet, (accessed March 7, 2019) http://wsn.cse.wustl.edu/images/e/e3/Imote2_Datasheet.pdf,
19. DC Jinwala, Dhiren R Patel, and KS Das Gupta, “A survey of the security issues in wireless sensor networks,” ADIT Journal of
Engineering, Vol.3, no.1, pp. 17-29, 2006.
20. K. CHELLI, “Security issues in wireless sensor networks: Attacks and countermeasures,” In Proceedings of The World Congress on
Engineering, vol.1, 2015.
21. Alfred J Menezes, Tatsuaki Okamoto and Scott A Vanstone, “Reducing elliptic curve logarithms to logarithms in a finite field,”
IEEE Transactions on Information Theory, Vol.39, no.5, pp. 1639-1646, 1993.
22. Al-Sakib Khan Pathan, Hyung-Woo Lee, and Choong Seon Hong, “Security in wireless sensor networks: issues and challenges,” In
8th International Conference Advanced Communication Technology, vol.2, pp. 1043-1048. IEEE, 2006.
23. Ahmad Salehi Shahraki, MA Razzaque, Parisa Naraei and Ali Farrokhtala, “Security in wireless sensor networks: issues and
challenges,” In Space Science and Communication (IconSpace), 2013 IEEE International Conference on, pp. 356-360, IEEE, 2013.
24. J.P. Walters, Z. Liang, W. Shi, and V. Chaudhary, “Wireless sensor network security: A survey, Security in distributed, grid, mobile,
and pervasive computing,” Vol.1, pp. 367, 2007.
25. Mohamed-Lamine Messai, “Classification of attacks in wireless sensor networks,” arXiv:1406.4516, 2014.
26. K Abirami and B Santhi, “Sybil attack in wireless sensor network,” IJET, ISSN, pp. 0975-4024, 2013.
27. Cricket mote Datasheet, http://www.memsic.com/userfiles/files/Datasheets/WSN/6020-0082-02_a_cricket_kit-t.pdf, (accessed
January 7, 2019).
28. J.P. Kaps, G. Gaubatz, and B. Sunar, “Cryptography on a speck of dust,” IEEE Computer, Vol.40, no.2, pp. 38-44, 2007.
29. Whitfield Diffie and Martin Hellman, “New directions in cryptography,” IEEE transactions on Information Theory, Vol. 22, no.6 , pp.
644-654, 1976.
30. Ronald L Rivest, Adi Shamir, and Leonard Adleman, “A method for obtaining digital signatures and public-key cryptosystems,”
Communications of the ACM, Vol. 21, no.2, pp.120-126, 1978.
31. L. Eschenauer and V.D. Gligor, “A key-management scheme for distributed sensor networks,” In Proceedings of the 9th ACM
conference on Computer and communications security, pp. 41-47, ACM, 2002.
32. Taher ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” In Workshop on the Theory and
Application of Cryptographic Techniques, pp. 10-18, Springer, 1984.
33. Nils Gura, Arun Patel, Arvinderpal Wander, Hans Eberle, and Sheueling Chang Shantz, “Comparing elliptic curve cryptography and
RSA on 8-bit CPUs,” In International Workshop on Cryptographic Hardware and Embedded Systems, pp. 119-132. Springer, 2004.
34. E Munivel and GM Ajit, “Efficient public key infrastructure implementation in wireless sensor networks,” In International
Conference on Wireless Communication and Sensor Computing, ICWCSC-2010, pp.1-6, IEEE, 2010.
35. Benamar Kadri, Mohammed Feham and Abdallah Mahamed, “Lightweight pki for wsn mpki,” The Journal of Security and
Communication Networks, Vol.10, no. 2, pp. 135-141, 2010.
36. Haowen Chan, Adrian Perrig, and Dawn Song, “Random key predistribution schemes for sensor networks,” In Sec urity and Privacy,
2003. Proceedings. 2003 Symposium on, pp. 197-213, IEEE, 2003.
37. A Selva Reegan and E Baburaj, “Key management schemes in wireless sensor networks: a survey,” In Circuits, Power and
Computing Technologies (ICCPCT), International Conference on, pp. 813-820, IEEE, 2013.
38. R. Blom, “An optimal class of symmetric key generation systems,” In Workshop on the Theory and Application of of Cryptographic
Techniques, pp. 335-338, Springer,1984.
39. Jong-Myoung Kim, Joon-Sic Cho, Sung-Min Jung, and Tai-Myoung Chung, “An energy-efficient dynamic key management in
wireless sensor networks,” In The 9th International Conference on Advanced Communication Technology, vol.3, pp. 2148 -2153,
IEEE, 2007.
40. M.F. Younis, K. Ghumman, and M. Eltoweissy, “Location-aware combinatorial key management scheme for clustered sensor
networks,” IEEE transactions on Parallel and Distributed Systems, Vol.17, no.8, pp. 865–882, 2006.
41. Yiying Zhang, Xiangzhen Li, Jianming Liu, Jucheng Yang, and Baojiang Cui, “A secure hierarchical key man agement scheme in
wireless sensor network,” International Journal of Distributed Sensor Networks, SAGE, 2012.
42. Zhen Yu and Yong Guan, “A key management scheme using deployment knowledge for wireless sensor networks,” IEEE
Transactions on Parallel and Distributed Systems, Vol.19, no.10, pp. 1411-1425, 2008.
43. Dijiang Huang, Manish Mehta, Deep Medhi, and Lein Harn, “Locationaware key management scheme for wireless sensor networks,”
In Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp. 29-42, ACM, 2004.
44. Mishra, M.R., Kar, J. and Majhi, B., “Practical deployment of one-pass key establishment protocol on wireless sensor
networks,” International Journal of Pure and Applied Mathematics, Vol.100, no.4, pp.531-542, 2015.
45. Michel Abdalla, Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco and Rainer Steinwandt, “(password) authenticated key
establishment: from 2-party to group,” In Theory of Cryptography Conference, pp.499-514, Springer, 2007.
46. NIST Skipjack, “KEA algorithm specifications,” 1998.
47. Richard Ankney, Don Johnson, and M Matyas, “The unified model, Contribution to X9F1,” 1995.
48. Laurie Law, Alfred Menezes, Minghua Qu, Jerry Solinas and Scott Vanstone, “An efficient protocol for authenticated key agreem ent,
Designs, Codes and Cryptography,” Vol.28, no.2, pp. 119-134, 2003.
49. Hugo Krawczyk, “HMQV: A high-performance secure diffie-hellman protocol,” In Annual International Cryptology Conference, pp.
546–566, Springer, 2005.
50. Konstantinos Chalkias, Spyros T Halkidis, Dimitrios Hristu-Varsakelis, George Stephanides and Anastasios Alexiadis, “A provably
secure onepass two-party key establishment protocol,” In International Conference on Information Security and Cryptology, pp. 108-
122, Springer, 2008.
51. Yuan Wang, Duncan S Wong, and Liusheng Huang, “One-pass key establishment model and protocols for wireless roaming with
user anonymity,” International Journal of Network Security, Vol.16, no.2, pp.129-142, 2014.
52. Mishra, M.R., Kar, J. and Majhi, B., “Practical deployment of One-Pass key establishment protocol on wireless sensor
networks”. International Journal of Pure and Applied Mathematics, Vol 100, No.4, pp.531-542, 2015.
53. 53. M Choudary Gorantla, Colin Boyd, and Juan Manuel Gonz´alez Nieto, “Id-based one-pass authenticated key establishment,” In
Proceedings of the sixth Australasian conference on Information security, Vol.81, pp.39-46. Australian Computer Society, 2008.

Authors: Shubham Kamlesh Shah, Ruby Mishra


Experimental Validation for Inverse Kinematics of a Five Axis Robotic Manipulator Using Deep
Paper Title:
Artificial Neural Network
Abstract: The use of robotics is to improvise and simplify human life. Robotic manipulators have been around
689. for a while now and are being used in many different sectors such as industries, households, warehouses, medicine
etc. Solving of inverse kinematics is one of the most complex issues faced while designing the robotic manipulator.
3943-
In this research a Deep Artificial neural network (D-ANN) model is proposed to solve inverse kinematics of a 5-
3946
axis robotic manipulator with rotary joints. The D-ANN model is trained in MATLAB. Training dataset was
generated using forward kinematics equations obtained easily from transformation matrix of the robotic
manipulator. To validate predictions made by this model an experimental robotic arm manipulator Is fabricated. A
smart camera setup has been linked to MATLAB for real time image processing and calculating the deviation of the
end needle in reaching the desired target coordinate. The trained model yielded satisfactory results with ±0.03
radians error and this was also validated experimentally. This research will help the robotic manipulator reach the
desired target coordinates even when one does not have enough input data.Paper Setup must be in A4 size with
Margin: Top 0.7”, Bottom 0.7”, Left 0.65”, 0.65”, Gutter 0”, and Gutter Position Top. Paper must be in two
Columns after Authors Name with Width 8.27”, height 11.69” Spacing 0.2”. Whole paper must be with: Font Name
Times New Roman, Font Size 10, Line Spacing 1.05 EXCEPT Abstract, Keywords (Index Term), Paper Tile,
References, Author Profile (in the last page of the paper, maximum 400 words), All Headings, and Manuscript
Details (First Page, Bottom, left side).

Keyword : Deep Artificial neural network (D-ANN), Image Processing, Inverse Kinematics, MATLAB, Robotic
manipulator.
References:
1. Cianchetti, M., Arienti, A., Follador, M., Mazzolai, B., Dario, P., & Laschi, C. (2011). Design concept and validation of a robotic arm
inspired by the octopus. Materials Science and Engineering: C, 31(6), 1230-1239
2. Manzoor, S., Islam, R. U., Khalid, A., Samad, A., & Iqbal, J. (2014). An open- source multi-DOF articulated robotic educational platform
for autonomous object manipulation. Robotics and Computer-Integrated Manufacturing, 30(3), 351-362.
3. Guiochet, J., Tondu, B., & Baron, C. (2003, October). Integration of UML in human factors analysis for safety of a medical robot for
tele-echography. In Intelligent Robots and Systems, 2003.(IROS 2003). Proceedings. 2003 IEEE/RSJ International Conference on (Vo l.
4, pp. 3212-3217). IEEE.
4. Števo, S., Sekaj, I., & Dekan, M. (2014). Optimization of robotic arm trajectory using genetic algorithm. IFAC Proceedings Volumes,
47(3), 1748-1753.
5. R. K. Mittal, I. J. Nagrath, Book: Robotics and Control, Publisher: Tata Mc Graw Hill.
6. Shah Shubham k., Mishra, R. and Mohapatro G.S., “experimental and theoretical design analysis and modeling of a CT image guided
robotic arm” in International Conference on engineering applied science and technology. 978-1-5386-4956-5/18, July 2018

Authors: Sarojini Yarramsetti

Paper Title: Project Scheduling using Event Based Scheduler with ABC
Abstract: Scheduling is the first and foremost step for every project implementation. Project scheduling could
be a mechanism to communicate what tasks has to be compelled to get done and which resources are going to be
allotted to finish those tasks in what timeframe. Project scheduling occurs during the planning phase of the project.
The problem comprises the correct assignment of employees to the various tasks that frame a software project,
casing in time and cost limitations. To accomplish this objective, this paper presents and discusses the EBS with
ACO, FCM clustering and EBS with ABC and the conclusions are drawn from it. First, to schedule human
resources to tasks we implement Event based scheduler with the Ant colony optimization algorithm (ACO) for
probabilistic optimization, second, for fast scheduling we implemented Fuzzy c means clustering to assign similar
data points of employees to clusters so that the searching space will be reduced. Third, for optimum scheduling we
apply Artificial Bee Colony algorithm with Event Based Scheduler. Artificial bee colony (ABC) is an optimization
algorithm based on stochastic calculation which has demonstrated good search capacities on numerous
advancement issues. Based on these findings we briefly describe the scheduling with FCM-EBS with ABC prompt
optimum values.

Keyword : Artificial Bee Colony (ABC), Event Based Scheduler (EBS), Fuzzy C Means (FCM), Resource
Constrain Project Scheduling (RCPS), task scheduling.

690.
References:
1. Yunning, Z., & Xixi, S. (2010, May). Research on improved PERT model in analysis of schedule risk of project. In E-Business and
E-Government (ICEE), 2010 International Conference on (pp. 2768-2771). IEEE. 3947-
2. Stelth, P., & Roy, G. L. (2009). Projects’ analysis through CPM (critical path method). School of Doctoral Studies (European Union) 3955
Journal, 1, 42.
3. Chand, S. (2016, November). Evolutionary algorithms for resource constrained project scheduling problems: Current issues & future
directions. In Region 10 Conference (TENCON), 2016 IEEE (pp. 2202-2204). IEEE.
4. Shen, X., Minku, L. L., Bahsoon, R., & Yao, X. (2016). Dynamic software project scheduling through a pro active-rescheduling
method. IEEE Transactions on Software Engineering, 42(7), 658-686.
5. Stylianou, C., Gerasimou, S., & Andreou, A. S. (2012, November). A novel prototype tool for intelligent software project scheduling
and staffing enhanced with personality factors. In Tools with Artificial Intelligence (ICTAI), 2012 IEEE 24th International
Conference on (Vol. 1, pp. 277-284). IEEE.
6. Yannibelli, V., & Amandi, A. (2011). A knowledge-based evolutionary assistant to software development project scheduling. Expert
Systems with Applications, 38(7), 8403-8413.
7. Chang, C. K., Jiang, H. Y., Di, Y., Zhu, D., & Ge, Y. (2008). Time-line based model for software project scheduling with genetic
algorithms. Information and Software Technology, 50(11), 1142-1154.
8. Padberg, F., & Weiss, D. (2011, December). Optimal Scheduling of Software Projects Using Reinforcement Learning. In Software
Engineering Conference (APSEC), 2011 18th Asia Pacific (pp. 9-16). IEEE.
9. Chen, W. N., & Zhang, J. (2013). Ant colony optimization for software project scheduling and staffing with an event-based
scheduler. IEEE Transactions on Software Engineering, 39(1), 1-17.
10. Minku, L. L., Sudholt, D., & Yao, X. (2014). Improved evolutionary algorithm design for the project scheduling problem based on
runtime analysis. IEEE Transactions on Software Engineering, 40(1), 83-102.
11. Chicano, F., Luna, F., Nebro, A. J., & Alba, E. (2011, July). Using multi-objective metaheuristics to solve the software project
scheduling problem. In Proceedings of the 13th annual conference on Genetic and evolutionary computation (pp. 1915-1922). ACM.
12. Chatzis, S.P., 2011.A fuzzy c-means-type algorithm for clustering of data with mixed numeric and categorical attributes employing a
probabilistic dissimilarity functional Expert Systems with Applications 38: 8684–8689.
13. 13. Tereshko,V.andAoengarov.(2005).Collective decision making in honey-bee foraging dynamics. Computing and
Information Systems, 9:1-7.
Authors: Seena Simon, A. Hemamathi, J. Jenishtalouis

Paper Title: Strength Assessment on Flyash Based Geopolymer Concrete


Abstract: Ordinary Portland Cement (OPC) is used for construction globally whose production is an extremely
energy-intensive process. Waste material has gained attention among researchers as replacement cement to fly ash
in concrete making. The sense of using waste materials in concrete not only of the economic factor but the more
significant aspect is to protect the environment since more solid waste are produced day by day. This causes the
pollution in water bodies and loss of productive land.
Geo Polymer composites are possible alternates to OPC and other blended cements. This is due to the high early
strength and improved durability evidenced by resistance against acid and sulphate attack, apart from
environmental effects (CO2 let into atmosphere in case of OPC). In various parts of the world, considerable
researches in the field of Geo-polymer composites are conducted. Hence the experimental investigations are
executed to study the effect of use of fly ash and Geo polymer as a replacement of cement.
691. The material properties were studied, based on their properties, reference mix M25 and M30 were designed. 12
specimens tested for workability test and compressive strength. Also, we have replaced cement to fly ash with 40,
3956-
60 percentages. For each mix, workability test and strength test was conducted for 9 specimens.
3960

Keyword : Concrete, OPC, Geo-polymer, fly ash, workability, strength


References:
1. Hardijito and Rangan ‘Development and properties of low calcium fly ash based Geo-polymer concrete’. Research Report GC 1 Faculty
of engineering, curtin university of Technology,Australia
2. Djwantoro Hardjito et al. “factor influencing the compressive strength fly ash based geo polymer concrete” Civil engineering dimension
volume VII No.2, 88-93, September 2004. Specification for fly ash for use as pozzalana and admixture’.IS:3812-1981
3. IS: 383-1970,”Specification for coarse and fine aggregates from natural resources for concrete”.
4. IS: 456:2000,”Plain and reinforced concrete-code practice”.
5. IS: 2386 (part III) / 1963,”Methods of test for strength of concrete .part3 specific gravity, density, voids, absorption and bulking”.
6. IS: 10262-1982, “Recommended guide lines for concrete mix design”.
7. M. S. Shetty Concrete Technology Theory and Practice, 2008. Portland Cement,en.wikipedia.org/wiki/Portland-cement
8. Abebe Dinku Construction Materials Laboratory Manual, Addis Ababa University Printing Press, 2002.

Authors: Lyudmila Piterskaya, Olga Zinisha, Roza Avdeeva, Natalia Goncharova

Paper Title: Development of A Model to Increase the Investment Attractiveness of an Enterprise


Abstract: Based on the researches, a model of effective investment activity has been developed. As part of the
task, a system of key performance indicators (KPI) is determined that reflects the strategy for managing investment
resources and signaling the state of the management object. A range of indicators is proposed that will classify
factors that determine a specific investment situation. Moreover, these indicators are measured not so much in
quantitative value as in qualitative. Measures of impact of state influence on increasing the investment
attractiveness of industrial enterprises have been developed. It has been established that in an unstable economy,
the methods of “following the investor” based on the analysis of the mass behavior of already functioning investors
are more appropriate.

Keyword : modeling, system, investments, financial resources.


References:
1. Bakhtyreva D.V., Gaiduk V.I., Goncharova N.A. and others. The economic potential and prospects of Russia. Monograph. Krasnoda r,
692. Russia. 2018.
2. Ableeva A.M. Methodological aspects of the investment and innovative development strategy of the enterprise. Social Politics and 3961-
Sociologists, 2010: # 8: 406–416.
3. Goncharova N.A., Satsukevich V.A. Problems of tax administration of the largest taxpayers in the Russian Federation and ways to solve
3964
them. Bulletin of the University of the Russian Academy of Education, 2018; # 2: 87-96.
4. Lebedev Yu.A., Letyagina E.N. State priorities for the development of the electric power industry in an innovative economy. B ulletin of
the Nizhny Novgorod University. N. I. Lobachevsky, 2013; # 3 (3): 153-155.
5. Goncharova N.A., Feshina E.V., Gorbatyuk O.S. Investments in technical and technological modernization of agricultural enterp rises.
Bulletin of the Academy of Knowledge, 2018; 5 (28): 412-419.
6. Letyagina E.N., Bodrikova O.A., Pertseva L N. About forecasting the functioning of industries, enterprises, complexes. Russian
Entrepreneurship, 2011; 11 (1): 70-75.
7. Stroeva O. Management of innovative development of regional economic systems: process modeling. Problems of theo ry and practice of
management, 2011; # 5: 63-72.
8. Terekhina M., Stepochkina E. Monitoring the effectiveness of investment capital of an industrial enterprise. Problems of theo ry and
practice of management, 2011; # 2: 40-50.
9. Letyagina E.N. Features of assessing the economic efficiency of introducing innovations in the energy sector. Bulletin of the Nizhny
Novgorod University named after N.I. Lobachevsky, 2010; # 1: 146-150.
10. Zinisha O.S., Ryndina I.V., Goncharova N.A., Tleptserukov M.A. The role and development policy of the central bank of russia as a
megaregulator of the national financial market. Indo American Journal of Pharmaceutical Sciences, 2019; 6 (3): 6913-6916.
11. Omarov R., Zakotin V., Shlykov S., Gorlov I. Development of marble beef technology. Engineering for Rural Development Proceedings,
2017: 956-959.

Authors: Raikhan Sabirova, Dybys Zhanserikova, Gulmira Topanova, Uldar Autalipova, Arna Aplashova
693.
Paper Title: Model of Students’ Professional Competence Formation
Abstract: The paper is focused on the process of students’ professional competence formation. The major
emphasis is on the competencies related to social and educational activities in the context of the commercialization
of education. The authors’ biggest contribution is a specially designed model. It describes the formation of
students’ professional competence in social and educational activities. Professional competencies of students are a
qualitative integral manifestation of personal traits with a focus on social and educational activities. It includes a
certain level of individual development and the mastering of special knowledge, skills, and abilities, as well as self-
development that contribute to the successful implementation of professional activities in the context of the
commercialization of education. The formation of professional competencies is presented as a focused, systematic
process. There is much evidence that this process requires a systematic pedagogical, psychological, and special
knowledge to develop skills and abilities in organizing and conducting social and pedagogical work. The content of
this process is a complex activity targeting professionally significant qualities, the acquisition of systematized
knowledge and skills in the field of social pedagogical activity. The results of the study are of much importance for
practical use in the university. The proposed model allows identifying the levels of formation of students’
professional competencies.

Keyword : model, formation, professional competence, students, social and educational activities, the
commercialization of education.
References:
1. C. Zastrow, “Introduction to Social Work and Social Welfare”, Brooks/Cole Publishing Company, 1996, pp. 512-537.
2. M. Celce-Murcia, Z. Dörnyei, S. Thurell, “Communicative competence: A pedagogically motivated model with content specifications”,
Issues in Applied Linguistics, 6(2), 1995, pp. 5-35.
3. O.B. Budnik, “Social and Pedagogical Activity: A philosophical aspect of Otocentrics and Cognitive Pedagogy”, Domestic and foreign
pedagogy, 3, 2013, pp. 13-25.
4. E.M. Gorenkov, “Innovative potential as complete social and pedagogical system”, Moscow: Prometheus Publishing House, 2012. 3965-
5. Zh.K. Onalbek, V.V. Grinshkun, B.S. Omarov, B.Z. Abuseytov, E.T. Makhanbet, B.B. Kendzhaeva, “The Main Systems and Types of
Forming of Future Teacher-Trainers’ Professional Competence”, Life Science Journal, 10(4), 2013, pp. 2397-2400. 3971
6. E.K. Henner, “Information and Communication Competence of the Teacher: The Structure, Requirements and Measurement System”,
Computer Science and Education, 12, 2004, pp. 5-9.
7. Y. Utegenov, U. Assanova, K. Kilybayev, E. Uaidullakyzy, B. Muzdybayev, E. Danabekov, “Formation of Information and Professio nal
Competence of Primary School Teachers”, Life Science Journal, 11(10s), 2014, pp. 133-140.
8. E.V. Sibirskaya, O.A. Stroeva, “Key provisions, determinants and conditions of innovative development management”, Vestnik OrelGIET,
1, 2011, pp. 5-10.
9. Y.B. Omarov, D.G.-S. Toktarbayev, I.V. Rybin, A.Zh. Saliyeva, F.N. Zhumabekova, Sh. Hamzina, N. Baitlessova, J. Sakenov, “Methods
of Forming Professional Competence of Students as Future Teachers”, International Journal of Environmental and Science Education,
11(14), 2016, pp. 6651-6662.
10. K.M. Berkimbaev, B.T. Kerimbaeva, “Communicative competence of future specialist. European Science and Technology”, Materials of
the 2th International Research and Practice Conference 9-10 May, 2012.
11. Z. Zhumabaeva, A. Zhumasheva, T. Kenzhebayeva, J. Sakenov, A. Tleulesova, M. Kenenbaeva, Sh. Hamzina, “On the Role of Variational
Disciplines in the Formation of Professional Competence of Students as Future Teachers”, International Journal of Environmental and
Science Education, 11(15), 2016, pp. 6671-6686.
12. N.V. Mirza, “Creative Component of Professional Competence of a Teacher”, International Journal of Applied and Fundamental Study, 2,
2013. Available at: http://science-sd.com/455-24286
13. V.K. Sharma, (2015). “How does motivation influence Saudi students’ communicative competence?”, Rep Opinion 2015, 7(11), pp. 36-48.
doi:10.7537/marsroj071115.05.
14. 14. T.S. Ostrianko, “Mental mapping in organizational and pedagogical activity of a secondary school social pedagogue”, Modern
pedagogy, 2, 2014. Available at: http://pedagogika.snauka.ru/en/2014/02/2069
15. M.T. Baymukanova, J.H. Kendirbekova, V.V. Bobrova, Z.Y. Oleksyuk, “Value of practice in social formation of readiness to teacher
social and educational activity with children and adolescents in the microenvironment”, Modern problems of science and education, 1,
2013. Available at: https://science-education.ru/en/article/view?id=8440
16. D.Zh. Sakenov, Y.V. Kushnir., Y. Shnaider, D.Zh. Abdulkhamidova, “Preparation of Students of Higher Education Institution for
Professional Activity in the Course of Studying of Pedagogical Disciplines”, World Applied Sciences Journal, 19(10), 2012, pp. 1431 -
1436.
17. G.O. Rakhimbekova, Z.M. Baigozhina, A.Y. Abdrakhmanova, A.R. Samatanova, R.K. Orazakova, Z.Z. Nurtayeva, J.Z. Sakenov,
“Development of Professional Competence in Students of Creative Pedagogical Specialties (Professionally-Oriented Aspect)”, Life
Science Journal, 12(1s), 2015, pp. 24-28.
Margarita Sergeevna Shakhova, Maria Vasilievna Smorodinova, Olga Aleksandrovna Repushevskaya,
Authors:
Aleksandr Vasilievich Tkach, Elena Ivanovna Balalova, Deni Dokkaevich Saydulaev
Digital Education in the Context of the Development of the Digital Economy: Technological
Paper Title:
Opportunities and Prospects
Abstract: Digital education is education that primarily functions based on digital technologies, that is,
electronic transactions that are implemented using the Internet. Digital education aims to professionalize and
increase the mobility of those who study and at the present stage of ICT development, it can be considered as a
technological basis for the fundamentalization of higher education. The purpose of the article is to analyze the
technological capabilities of digital education on the example of the use of innovative classroom in the educational
694. process. The article analyzes the advantages of the educational environment equipped with digital tools. Based on
an expert survey, the main characteristics of the innovative classroom, as well as technological requirements for the
3972-
innovative classroom, are determined and various models for the organization of the innovative classroom are
3976
presented.

Keyword : digital economy, digital education, educational environment, educational process, innovative
classroom, innovative classroom model.
References:
1. M.N. Dudin, O.F. Shakhov, M.S. Shakhova, E.P. Rusakova, Y.S. Sizova, “Digital Technologies as a Driver of Intellectual Stratification of
Human Resources: Socio-Economic Inequality”, International Journal of Recent Technology and Engineering, 8(2), 2019, pp. 4436-4440.
2. S.S. Nosova, G.V. Kolodnyaya, S.A. Bondarev, S.A. Verigo, A.B. Kudryashov, “Digital Business as a Driver of Economic Growth i n
Russia”, Espacios, 40(24), 2019, pp. 25.
3. Y.Y. Kail, A.V. Shokhnekh, M.V. Samsonova, R.M. Lamzin, Y.Y. Elsukova, “Prospects of GR Management Development in the context
of forming a digital economy”, Espacios, 40(22), 2019, pp. 30.
4. T.V. Pogodina, V.G. Aleksakhina, V.A. Burenin, T.N. Polianova, L.A. Yunusov, “Towards the innovation -focused industry development
in a climate of digitalization: the case of Russia”, Entrepreneurship and Sustainability Issues, 6(4), 2019, pp. 1897-1906.
5. A.V. Bataev, E.V. Plotnikova, “Assessment of digital banks’ performance”, Espacios, 40(20), 2019, pp. 24.
6. A.B. Abuova, S.A. Tulkubayeva, Yu.V. Tulayev, S.V. Somova, M.B. Tashmukhamedov, “The Technology of Cultivating Agricultural
Crops Based on Ortho photomaps, Digital and 3-D Surface Models”, International Journal of Engineering and Advanced Technology, 8(4),
2019, pp. 775-778.
7. E.A. Kirillova, A.V. Pavlyuk, O.E. Blinkov, E.V. Blinkova, E.L. Sidorenko, “Digital Inheritance of Social Media Accounts”, International
Journal of Engineering and Advanced Technology, 8(4), 2019, pp. 963-967.
8. N.Yu. Ignatova, “Obrazovanie v tsifrovuyu epokhu: monografiya”. Nizhnii Tagil: NTI (filial) UrFU, [Education in the digital age: a
monograph. - Nizhny Tagil: NTI (branch) of Ural Federal University], 2017, p. 128.
9. I.M. Faizrakhmanov, Z.H. Tanatarova, Lilija Mansurovna Allanina, Elena Ivanovna Sukhova and Ekaterina Aleksandrovna Pogrebinskaya,
“Modern theological education in Rrussia European experience and development prospects”, European Journal of Science and Theology,
14(6), 2018, pp. 183-193.
10. T.V. Fomicheva, V.I. Kataeva, J.O. Sulyagina, T.A. Evstratova, M.G. Chardymskiy, “Digitization of the Population in Russia:
Technologies and Levels of Interaction”, International Journal of Recent Technology and Engineering, 8(2), 2019, pp. 4728 -4731.
11. N.V. Komleva, “Professionalnaya kompetentnost lichnosti v usloviyakh Smart-obshchestva” [Professional competency of an individual in
a smart society] Otkrytoe obrazovanie [Open Education], 1, 2017, pp. 27-33.
12. T.I. Volostnova, “Sovremennye tekhnologii obrazovaniya v vysshei shkole” [Modern education technologies in higher school]. Mi r nauki i
obrazovaniya [World of science and education], 3, 2015, pp. 1-3.
13. N.G. Maloshonok, “Vzaimosvyaz ispolzovaniya Interneta i multimediinykh tekhnologii v obrazovatelnom protsesse so studenchesko i
vovlechennostyu” [The relationship between the use of the Internet and multimedia technologies in the educational process and student
involvement], Voprosy obrazovaniya [Education Issues], 4, 2016, pp. 59-83.
14. R. Luckin, W. Clark, K. Logan, R. Graber, M. Oliver, A. Mee, “Do Web 2.0 tools really open the door to learning: practices, perceptions
and profiles of 11-16-year-old learners”, Learning, Media and Technology, 34(2), 2009, pp. 87-104.
15. McGuinness, C. Fulton, “Digital literacy in higher education: A case study of student engagement with e-tutorials using blended learning”,
Journal of Information Technology Education: Innovations in Practice, 18, 2019, pp.1-28.
16. I.V. Naletova, “Izmeneniya sistemy obrazovaniya pod vliyaniem onlain-tekhnologii” [Changes in the education system under the influence
of online technologies]. Gaudeamus, 2, 2015, pp. 9-13.
17. Badarch, N.G. Tokareva, M.S. Tsvetkova, “MOOK: rekonstruktsiya vysshego obrazovaniya” [Reconstruction of higher education].
Vysshee obrazovanie v Rossii [Higher education in Russia], 10, 2014, pp. 135-146.
18. W. Barber, S. King, “Teacher-student perspectives of invisible pedagogy: New directions in online problem-based learning environments”,
The Electronic Journal of e-Learning, 14(4), 2016, pp.235-243.
19. Rowlands, D. Nicholas, P. Williams, P. Huntington, M. Fieldhouse, B. Gunter, R. Withey, H.R. Jamali, T. Dobrowolski, C. Tenopir, “The
Google generation: the information behaviour of the researcher of the future”, Aslib proceedings: New Information Perspective s, 60(4),
2008, pp. 290-310.
20. J.E. Hinostroza, C. Matamala, C. Labbé, M. Claro, “Factors (not) affecting what students do with computers and internet at home”,
Learning, media and technology, 40(1), 2015, pp. 43-63.
21. Gonzáles, “The relationship between approaches to teaching, approaches to e-teaching and perceptions of the teaching situation concerning
e-learning among higher education teachers”, Instructional Science, 40(6), 2012, pp. 975-997.
22. D.H. Shin, Y.J. Shin, H. Choo, K. Beom, “Smartphones as smart pedagogical tools: Implications for smartphones as u -learning devices”,
Computers in Human Behavior, 27(6), 2011, pp.2207- 2214.
23. Littlejohn, H. Beetham, L. McGill, “Learning at the digital frontier: A review of digital literacies in theory and practice”, Journal of
Computer Assisted Learning, 28, 2012, pp. 547–556.
24. G. Blackwell, F. Chalifour, “Tech class”, Professionally Speaking: The Magazine of the Ontario College of Teachers, 2012, pp. 35–39.
25. M.N. Dudin, E.A. Pogrebinskaya, E.I. Sukhova, A.N. Kirsanov, “Modern religious education as the basis for the development of new
confessional relations”, European Journal of Science and Theology, 15(5), 2019, pp. 133-147.

Authors: V. Barat, V. Bardakov

Paper Title: Features of Noise Filtering During Acoustic Emission Testing


Abstract: This article discusses the problems of the acoustic emission method of non-destructive testing. An
approach to filtering noise arising from monitoring of acoustic emission is considered. The filtering of acoustic
noise is one of the key problems of the acoustic emission method, since the low noise immunity of the acoustic
emission method prevents the expansion of its industrial application. The complexity of the filtering is explained by
the fact that the waveform and spectrum of acoustic emission pulses change depending on the distance between the
defect, which is the source of acoustic emission waves, and the sensor. In turn, the interference, as a rule, is non-
stationary in nature and is determined by the type of technological process of the tested composition. This article
discusses various types of noise processes, both stationary and non-stationary. The signal and noise parameters are
compared, based on which recommendations are given for constructing algorithms for detecting acoustic emission
695. pulses against a background of noise.
3977-
Keyword : Acoustic emission, noise filtering, friction noise filtering. 3980
References:
1. Barat V., Borodin Y., Kuzmin A. Intelligent AE signal filtering methods. 29th European conference on acoustic emission testing, Vienna,
Austria, 9-11 September 2010
2. D.A. Slesarev; V.A. Barat Application of wavelet transform to the analysis of signals with impulsed components. Measurement
Techniques. 2000 DOI: 10.1007/BF02503636
3. Pomponi, E.; Vinogradov, A. Wavelet based approach to acoustic emission phase picking. In Proceedings of the 31st European Worki ng
Group on Acoustic Emission, Dresden, Germany, 3–5 September 2014.
4. J. Wang, F. Xu Improved adaptive filter and its application in acoustic emission signals March 2019 Journal of Southeast University
(English Edition) 35(1):43-50
5. J. Wang, F. Xu Improved adaptive filter and its application in acoustic emission signals March 2019 Journal of Southeast Univ ersity
(English Edition) 35(1):43-50.
6. D.Xiao, T.He, Q.Pan, X.Liu , Y.Shan Impulsive noise cancellation of acoustic emission signal based on iterative mathematical
morphology filter. Journal of Vibroengineering, Vol. 15, Issue 4, 2013, p. 1752-1764.
7. V.Barat, A.Alyakritskiy Automated Method for Statistical Processing of AE Testing Data. Journal of acoustic emission. V 26, 2008, pp
132-141
8. T. Petersen, A. Samokhvalov, D. Wenceslaus-Chernigovski, D. Kurnosov Data Processing and Interpretation At AE Monitoring. 33nd
European Conference on Acoustic Emission Testing, Senlis, France, September 12-14, 2018
9. V. Barat, V. Bardakov, A. Marchenkov Empirical Modelling of Acoustic Emission Impulses. ‘International Journal of Innovative
Technology and Exploring Engineering
10. , Volume-8 Issue-12, October 2019, pp. 3661-3664.
11. Hamstad, M. A.; O’Gallagher A.; J. Gary. A. Wavelet Transform Applied to Acoustic Emission. J. Acoustic Emission 2002, Volume 20,
pp. 39-82.
12. 11. Seco F.; Jiménez A.R. Modelling the generation and propagation of ultrasonic signals in cylindrical waveguides. In Ultrasonic
waves. InTech, pp. 1-28.
13. Barat, V.A.; Terentyev, D.A.; Elizarov, S.V. Statistical non-parametrical algorithm for Acoustic Emission impulses detection adapted on
the basis of modal analysis approach. J. Acoustic Emission 2018, Volume 35, pp. S369-S381.
A. V. Volkov, A. A. Vikhlyantsev, A. A. Druzhinin, A. V. Ryzhenkov, S. N. Pankratov, B. M.
Authors:
Orahelashvily, A. K. Lyamasov
Paper Title: Optimization of Microturbines for Combined Energy Sources Based on Microhydropower Plants
Abstract: This work discusses design issues of microturbines for combined energy sources based on
microhydropower plants for the heads H≤20 m and the flow rates Q ≤1.20 m3/s. It is proposed to optimize
microturbines. The main approaches to the formulated problem are described, optimization algorithm is analyzed
exemplifying its embodiments for separate elements of microhydroturbines. The proposed approach has been
verified. Experimental results of microhydroturbine optimization for simulated combined energy source based on
microhydropower plant with the available head H =1.1 m, flow rates Q ≤0.021 m3/s and rotation frequency of
electric generator n = 1000 rpm have been presented. On the basis of numeric simulation, the hydraulic efficiency
of hydroturbine has been increased by 5.4% as a consequence of the proposed approaches.

Keyword : hydroelectric engineering, renewable energy sources, green technologies, combined energy sources,
microhydroturbine.
696. References:
1. B.V. Lukutin, O.A. Surzhikova, E.B. Shandarova, “Vozobnovlyaemaya energetika v detsentralizovannom energosnabzhenii”: monogra fiya 3981-
[Renewable power engineering in decentralized power supply: monograph]. Moscow, Energoatomizdat, 2008. 3987
2. J.J. Jamian, R.N.S.R. Mukhtaruddin, M.A. Baharudin, “Standalone Hybrid System Design for rural areas electrification in Malaysia w ith
Windro wind turbine”, The Institute of Electrical Engineers of Japan, 11(3), pp. 9-21. Available at:
https://www.scribd.com/document/323530283/Standalone-Hybrid-System-Design-for-Rural-Areas-Electrification-in-Malaysia-With-
Windro-Wind-Turbine
3. A.V. Tarasov, “Substantiation of flow sections of hydro units of minor low-head hydropower plants”: Cand. thesis. St Petersburg, 2010.
4. A.A. Zharkovskij, R.I. Kazakov, V.L. Pleshanov, V.A. Umov, “Characteristics forecasting and design of electrical centrifugal immer sed
pumps with using the program complex SAPR TsN”, Khimicheskoe I Neftegazovoe Mashinostroenie, 5, 2001, pp. 20 -22.
5. A.A. Zharkovskii, R.I. Kazakov, V.L. Pleshanov, V.A. Umov, “The TsN CAD system, submerged electrocentrifugal pump design, and
characteristic forecasting”, Chemical and Petroleum Engineering, 37(5-6), 2001, pp. 285-289.
6. D.G. Svoboda, A.A. Zharkovskii, E.A. Ivanov, “Influence of the Geometric Parameters of the Impeller of a Free-Vortex Pump on the
Energy and Cavitation Characteristics of the Pump”, Chemical and Petroleum Engineering, 54(9-10), 2019, pp. 673-680.
7. A.A. Zharkovskii, A.Y. Pospelov, “Use of 3D Methods for Flow Analysis, Prediction of Characteristics, and Optimization of the Shape of
Settings of Hydraulic Turbines”, Power Technology and Engineering, 49(1), 2015, pp. 27-32.
8. A.Y. Pospelov, A.A. Zharkovskii, “Effect of the Parameters of a Computational Model on the Prediction of Hydraulic Turbine
Characteristics”, Power Technology and Engineering, 49(3), 2015, pp. 159-164.
9. E.A. Dundur, A.A. Zharkovskij, S.N. Shkarbul', “Three-dimensional potential flow calculation in turbomachinery impeller. Part 1. Problem
statement, flow model, calculation methods”, Khimicheskoe I Neftegazovoe Mashinostroenie, 11, 1995, pp. 41-45.
Sergei Sergeevich Smirnov, Dmitrii Aleksandrovich Sytnik, Nikolai Valerievich Bradis, Andrei
Authors:
Ivanovich Kardakov
Paper Title: Inertial Tracking Systems for Virtual Reality Devices
Abstract: Tracking systems are the most important components in virtual reality devices and appliances. In the
simplest case, in order to represent current picture for a user of virtual reality glasses, it is required to provide head
tracking. In complex devices of virtual reality, it is also required to track position of device itself and dynamics of
its motions. This work is aimed at development of 3D positioning algorithms for virtual reality devices and
appliances. In this work positioning is based on operation of inertial sensors. The issues of motion capture and
calibration of inertial devices are considered as well as application of Madgwick filter for noise suppression and
quaternions for description of coordinate rotation. This work discusses the application of the developed algorithms
for various virtual reality devices and appliances.
697.
Keyword : Sphere, Virtual reality, Madgwick filter, Gyroscope, Accelerometer, Quaternion. 3988-
3994
References:
1. Virtual reality. Wikipedia, the free encyclopedia. Available at: https://en.wikipedia.org/wiki/Virtual_reality
2. A.S. Nabiev, L.T. Nurkusheva, K.K. Suleimenova, G.K. Sadvokasova, Z.A. Imanbaeva, “Virtual Reconstruction of Historical
Architectural Monuments: Methods and Technologies”, International Journal of Innovative Technology and Exploring Engineering, 8(10),
2019, pp. 3880-3887.
3. E.A. Kirillova, A.V. Pavlyuk, I.A. Mikhaylova, T.E. Zulfugarzade, S.S. Zenin, “Bitcoin, Lifecoin, Namecoin: The Legal Nature of Virtual
Currency”, Journal of Advanced Research in Law and Economics, 9(1), 2018, pp. 119-126.
4. Total Vision. Available at: http://total-vision.ru/
5. USB. Wikipedia, the free encyclopedia. Available at: https://en.wikipedia.org/wiki/USB
6. HDMI. Wikipedia, the free encyclopedia. Available at: https://en.wikipedia.org/wiki/HDMI
7. StarBlade: virtual reality simulator. Total Interactive. Available at: https://total-interactive.com/content/products/star_blade/
8. Bluetooth Low Energy. Wikipedia, the free encyclopedia. Available at: https://en.wikipedia.org/wiki/Bluetooth_Low_Energy
9. ICM-20602 High Performance 6-axis MEMS MotionTracking Device. TDK InvenSense. Available at:
https://www.invensense.com/products/motion-tracking/6-axis/icm-20602/
10. STM32 32-bit Arm Cortex MCUs. STMicroelectronics. Available at: https://www.st.com/en/microcontrollers-microprocessors/stm32-32-
bit-arm-cortex-mcus.html
11. Introduction Of The World’s Lowest Power 9-Axis MotionTracking Device. Electronic Specifier. Available at:
https://www.electronicspecifier.com/sensors/mpu-9350-invensense-worlds-lowest-power-9-axis-motiontracking-device
12. USB human interface device class. Wikipedia, the free encyclopedia. Available at:
https://en.wikipedia.org/wiki/USB_human_interface_device_class
13. Analog to digital converter. Wikipedia, the free encyclopedia. Available at: https://en.wikipedia.org/wiki/Analog-to-digital_converter
14. O. Evsegneev, “Kalibrovka magnitometra. Elektronnyi kompas” [Calibration of magnetometer. Electrnoic compass]. Robotclass. Available
at: https://robotclass.ru/articles/magnetometer-and-compass
15. Quaternion. Wikipedia, the free encyclopedia. Available at: https://ru.wikipedia.org/wiki/Кватернион
16. V.N. Gordeev, “Kvaterniony i bikvaterniony s prilozheniyami v geometrii i mekhanike” [Quaternions and biq uaternions with applications
in geometry and mechanics]. Kiev: Stal', 2016.
17. E. Foxlin, “Inertial head-tracker sensor fusion by a complementary separate-bias Kalman filter”. In Proc. Virtual Reality Annual
International Symposium the IEEE, 267, 1996, pp. 185–194.
18. S.O.H. Madgwick, “An efficient orientation filter for inertial and inertial/magnetic sensor arrays”, Report x-io and University of Bristol
(UK), 25, 2010, pp. 113–118.

Authors: Vijay Bharath Reddy Vavilla, Rakesh Siempu

Paper Title: Effect of Basalt fibers on the properties of high strength self-compacting concrete.
Abstract: Concrete having characteristics strength of more than 65 MPa is categorized as high-strength
concrete according to IS 456. The high strength concrete is more brittle compared to ordinary strength concrete and
inclusion of fibers can increase the ductility of concrete. In the present study, high strength self-compacting
concrete of characteristic strength of 90 MPa was developed as per the guidelines of EFNARC. Basalt fibers were
considered to investigate its influence on the properties of high strength self compacting concrete. Three aspect
ratios of 230, 530 and 600 were considered and are added in proportions of 0.1% and 0.4% by volume of concrete.
The properties of concrete determine were fresh and hardened. Fresh properties such as slump flow test, V-funnel
test, V-funnel T5 minutes and L-box test were determined as per EFNARC. Also, hardened properties such as
compressive strength, split tensile strength and flexural strength were determined. A typical comparison on the
effect of aspect ratio of basalt fibers and the dosage on the properties of concrete were determined. From the
results, the optimum dosage of fibers was determined.

698. Keyword : Basalt Fibers, Aspect ratio, self-compacting concrete.


References: 3995-
1. Mazloom, M., A.A. Ramezanianpo ur and J.J. Brooks, 2004. Effect of silica fume on Mechanical property of high -strength concrete. 3998
Cement Concrete Comp., 26(4): 347-357.
2. Khayat KH. Workability, testing, and performance of self-consolid-ating concrete. ACI Mater j 1999; 96(3):346-53.
3. Khayat KH, Guizani Z, Use of viscosity-modifying admixture to enhance stability of fluid concrete. ACI Master J 1997;94(4):332-40.
4. Ali Elheber Ahmed Elshekh, Nasir Shafiq, Muhd Fadhil Nuruddin, Ahmed Fathi and Fareed Ahmed Memom. An Experimental Study on
the Effectiveness of Chopped Basalt Fiber on the Fresh and Hardened properties of High Strength Concrete. ISSN:2040 -7459 e-ISSN:
2040-7467
5. Rajeshkumar, K., N. Mahendran and R. Gobinath, 2010. Experiment studies on viability of using geosynthetics as fiber in concrete. Int. J.
Appl. Eng. Res., 1(1): 15-28.
6. Micelli, F. and A. Nammi, 2004. Durability of FRP rods for concrete structures. Constr. Build. Mater., 18(7):491-503.
7. Sahibin, A.R., M.T. Mohamad and M. Baba, 2001. Heavy metals composition of some soils Developed from basic and ultrabasic rocks in
Malaysia. Proceeding of Annul Geological Conference on Geological Society of Malaysia.
8. Zeynep Algin, Mustafa Ozen, The properties of chopped basalt reinforced self-compacting concrete, Constr. Build. Mater., 186(2018):
678-685.
9. S. Yazici, G. Inan, V. Tabak, Effect of aspect ratio and volume fraction of steel fiber on the mechanical properties of SRFC, Constr. Build.
Mater., 21(2007) 1250-1253.
10. S. Elshafie, G. Whittleston, A review of the effect of basalt fiber lengths and proportions on the mechanical properties of b asalt fibers,
IJRET: Int. J. Res. Eng. Tech. 4 (2015) 458-465

Authors: N. Anbuselvan, P. Anandan, A. Manju

Paper Title: Model of HfO2/Al2O3 Dielectric ALN\INN\Alganmos HEMT for Power Application
Abstract: The work involves to devise dielectric HfO2/Al2O3MOS-HEMT stack to validate for the device
structure through the refinement of mesh analysis. The structure of the AlN\InN\AlGaN HEMT MOS-HEMTs are
designed and meshed using the script file in the Sentaurus structure editor. TheAlN\InN\AlGaN MOS-HEMTs
output characteristic are examined for physics of MOS-HEMT in Hydrodynamic model TCAD. The amalgamation
formation ofthe Al0.30GaN0.70 barrierinterface with the channelofhigh 2DEG density result in anincreaseddrain
699. current density and high trans conductance. Additional the device performance of DC transfer characteristics, small
signal analysis of AlN/InN/AlGaNMOS-HEMT are analyzed and simulated.
3999-
4002
Keyword : MOS-HEMT,AlN\InN\AlGaN, Hydrodynamic model, Al0.30GaN0.70 and2DEG.
References:
1. Ching-Sung Lee, Yu-Hao Liao, Bo-Yi Chou, Han-Yin Liu, Wei-Chou Hsu. "Composite HfO2/Al2O3-dielectric AlGaAs/InGaAs
MOSHEMTs by using RF sputtering/ozone water oxidation", Superlattices and Microstructures, 2014
2. M. Sheerin Begum, J. Vijayashree, A. Mohanbabu, N. Mohankumar. "Investigation of performance of InAsSb based high electron
mobility transistors (HEMTs)", 2017 Devices for Integrated Circuit (DevIC), 2017
3. Lee, Ching-Sung, Yu-Hao Liao, Bo-Yi Chou, Han-Yin Liu, and Wei-Chou Hsu. "Composite HfO2/Al2O3-dielectric AlGaAs/InGaAs
MOS HEMTs by using RF sputtering/ozone water oxidation", Superlattices and Microstructures, 2014.
4. F. Medjdoub, J. Derluyn, K. Cheng, M. Leys, S. Degroote, D. Marcon, D. Visalli, M. Van Hove, M. Germain, G. Borghs. "Low On -
Resistance High-Breakdown Normally Off AlN/GaN/AlGaN DHFET on Si Substrate", IEEE Electron Device Letters, 2010
5. Igor E. Anokhin, Matthias Wurl, Katia Parodi, Anatoly B. Rosenfeld. "Application of silicon planar structures for the spectru m
determination of the proton beams produced by laser-driven particle accelerators. Theoretical approach.", 2017 IEEE Nuclear Science
Symposium and Medical Imaging Conference (NSS/MIC), 2017
6. Y. Niiyama et al.: Normally off operation GaN-based MOSFETs for power electronics applications, Semicond. Sci. Technol., 25, 125006,
(2010).
7. T.E. Cook Jr. et al.: Measurement of the band offsets of SiO2 on clean n- and p-type GaN(0001), J. Appl. Phys. 93, 3995, (2003).
8. J.J. Freedsman et al.: Normally-off Al2O3/AlGaN/GaN MOS-HEMT on 8 in. Si with low leakage current and high breakdown voltage
(825 V), Appl. Phys. Express, 7, 04100, (2014).
9. W. Ahn et al.: Normally-off AlGaN/GaN MOS-HEMTs by KOH wet etch and RF-sputtered HfO2 gate insulator, Proceedings of 25th Int.
Symp. on Power Semiconductor Devices & IC’s (ISPSD), pp.311-314, (2013).
10. Andrzej Taube, MariuszSochacki, Jan Szmidt, Eliana Kaminska, and Anna Piotrowska ,Modelling and Simulation of Normally-Off
AlGaN/GaN MOS-HEMTs Intl Journal Of Electronics and Telecommunications, 2014, VOL. 60, NO. 3, PP. 253–258 2014. DOI:
10.2478/eletel-2014-0032.
11. X.-H. Ma, J.-J. Zhu, X.-Y. Liao, T. Yue, W.-W. Chen, and Y. Hao, "Quantitative characterization of interface traps in Al2O3/AlGaN/GaN
metal-oxide-semiconductor high- electron mobility transistors by dynamic capacitance dispersion technique," Applied Physics Letters, vol.
103, p. 033510, 2013.
Larysa Ivanchenkova, Larysa Skliar, Olha Pavelko, Yuliia Cheban, Halyna Kuzmenko, Anastasiia
Authors:
Zinkevych
Paper Title: Improving Accounting and Analysis of Innovative Costs
Abstract: Based on the goal set in the beginning of the work and formulated tasks, the research is devoted to
the study of theoretical and normative bases of accounting and analysis of innovative costs of the enterprise. The
essence of innovation and innovation costs as an object of accounting and analysis is investigated. The actual
problems of accounting of expenses on innovations are analyzed. The methodical bases of the enterprise innovative
cost analysis are investigated. Investigating the current issues of accounting for innovation costs before accounting
for innovation costs has identified a key direction - displaying innovation costs as a separate accounting entity.
The study provides recommendations on how to improve accounting and analysis of innovation costs, namely, the
authors proposed an accounting approach that provides for the preliminary creation of additional analytical sections
on the expense accounts and in the accounts, which keep records of capital investment and proposed to analyze
innovation costs as part of a comprehensive analysis of innovation activity of the enterprise. An algorithm for
analyzing enterprise innovation has been developed, which includes five stages of analysis, a system of indicators
for analysis of innovation, a statement of sources of financing of innovation-investment activity and a statement of
the volume of innovation costs, which will provide a well-reasoned and reasonable estimate of costs.
700.
Keyword : Accounting, Analysis, Enterprise, Innovative Costs . 4003-
4009
References:
1. Svitlana Bondarenko, Olena Laburtseva, Оlena Sadchenko, Vira Lebedieva, Oleksandra Haidukova, Tetyana Kharchenko, Modern Lead
Generation in Internet Marketing for the Development of Enterprise Potential, International Journal of Innovative Technology and
Exploring Engineering, Volume-8 Issue-12, October 2019, pp. 3066-3071 DOI: 10.35940/ijitee.L2477.1081219
2. I. Bashynska, I. Lytovchenko, D. Kharenko, Sales tunnels in messengers as new technologies for effective Internet-marketing in tourism
and hospitality, International Journal of Innovative Technology and Exploring Engineering, Volume-8 Issue-12, October 2019, pp. 594-
598 DOI: 10.35940/ijitee.L3470.1081219
3. I. Bashynska, M. Baldzhy, L. Ivanchenkova, L. Skliar, O. Nikoliuk, G. Tkachuk, Game risk management methods for investment portfolio
optimization, International Journal of Recent Technology and Engineering, Volume-8 Issue-2, 2019, pp. 3940-3943 DOI:
10.35940/ijrte.B1729.078219
4. Prokopenko, O., Eremenko, Y., Omelyanenko, V., Role of international factor in innovation ecosystem formation, Economic Annals-XXI,
3-4, 2014, pp. 4-7
5. Krykavskyy, Y.V., Industrial supply chains: Between efficiency and responsibility, Actual Problems of Economics, 179 (5), 2016, pp. 30-
41.
6. Krykavskyy, Y., Falovych, V., The principle of the extended responsibility in the formation of multimodal transportation attr activeness,
Economic Annals-XXI, 159 (5-6), 2016, pp. 67-70. doi: 10.21003/ea.V159-14
7. V.N. Nesterov, A.Sh. Akhtyamova, E.S. Domracheva, Accounting and Analysis in Managing the Cost Of Innovation, Mediterranean
Journal of Social Sciences, 6(1), 2015, DOI: 10.5901/mjss.2015.v6n1s3p217
8. E. V. Demidko, Accounting and analysis of the cost of quality, January 2019, DOI: 10.18411/lj-03-2019-49

Authors: Nikitha Kumari, Prabhakar kandukuri

Paper Title: Dynamic Data Analysis and Decision Making on Twitter Data
Abstract: It became a tedious task for the data analysts to make decisions on social networks. The existing
approaches are not adequate to perform data pre-processing, analysis and decision making on the data dynamically.
Therefore, this research aims to propose an approach to data analysis and decision making. The proposed approach
emphasis on extracting tweets form twitter API (Application Program Interface), pre-processing the tweets by
701. following seven pre-processing steps. The processed tweets are trained by NLTK (Natural Language Toolkit) and
Text Blob are given to the sentiment analysis. Classification is done using the Naive Bayes algorithm to make a
decision on processed tweets. The tweets which are related to “MeToo Movement” are considered primarily for 4010-
decision making and satisfactory results are obtained. It is been observed that the proposed approach is accurate 4015
when compared to other approaches.

Keyword : Twitter, Text pre-processing, Machine learning, Sentiment Analysis, MeToo movement.
References:
1. SymeonSymeonidis, Dimitrios Effrosynidis, and AviArampatzis: “A comparative evaluation of pre-processing techniques and their
interactions for twitter sentiment analysis” in Expert Systems with Applications Elsevier, pp:298-310, 2018.
2. Zhao Jianqlang and GuiXiaolin: “comparison research on text pre-processing methods on twitter sentiment analysis” IEEE access, 5, 2870-
2879, 2017.
3. Tajinder and Madhu Kumari: “Role of text pre-processing in twitter sentiment analysis” procedia computer science 89 (2016) 549-554.
4. Ahmad FathanHidayatullah, ElangCergasPembrani, Wisnu Kurniawan, Gilang Akbar, Ridwan Pranata: “Twitter topic modelling on
football news”. International conference on computer and communication systems,2018 in Indonesia.
5. Prerna Mishra, Ranjana Rajnish and Pankaj Kumar: “Sentiment analysis of twitter data: case study on digital India” International
conference on information technology in 2016.
6. M.Trupthi, Suresh Pabboju and G. Narasimha: “Sentiment analysis on twitter using streaming API”, International adv ance computing
conference in 2017.
7. Yuling chen and Zhi zhang: “Research on text sentiment analysis based on CNN and SVM”, 13 th IEEE conference on industrial electronics
and applications on 31may-2 June 2018.
8. Kavya Suppala and Narasinga rao: “Sentiment analysis using Naïve Bayes classifiers”, international journal of innovative technology and
exploring engineering June 2019.
9. Huma Parveen and Shikha Pandey: “Sentiment analysis on twitter data-set using Naive Bayes algorithm”, 2016 IEEE 2 nd international
conference on applied and theoretical computer and communication technology.
10. Ali Hasan, Sana Moin, Ahmad Karim and Shahaboddin Shamshirband “Machine learning-based sentiment analysis for twitter accounts”,
MDPI, 2018.
11. Imane el Alaouli,Youssef Gahi, Rochdi Messoussi, youness chaabi, Alexis tadoskoff and Abdessamad Kobi “A novel adaptable approach
for sentient analysis on big social data” Springer 2018.
12. Ankita Rane and Anand Kumar: “Sentiment classification system of twitter data for US airlines services analysis” , 2018 42nd IEEE
international conference of computer and software and applications.
13. Guru tutorial point “Guru99 Tech Pvt Ltd”,Copyright - Guru99 2019,https://www.guru99.com/nltk-tutorial.html
14. Text blob https://textblob.readthedocs.io/en/dev/
15. Bhumika Gupta and Monika Negi: “Study of twitter sentiment analysis using machine learning algorithms on python” international journal
of computer applications (0975-8887) volume 165-no.9, may 2017.
16. Wikipidiahttps://en.wikipedia.org/wiki/Me_Too_movement_(India).
17. Lowri Williams, Christian Bannister, Michael Arribas-Ayllon, Alun Preece and Irena Spasic: “The Role of Idioms in Sentiment Analysis”,
Expert Systems with Applications, Elsevier, (2015).
18. Hemant J. Kamble, Jyotim Ingale, Bhagyashri R. Posture and Ganesh S. Ghuge “Sentiment Analysis of Twitter User Using Bigdata and
Hadoop”, published in International Journal of Engineering Research in Computer Science and Engineering, v-5 I-3 2018.
19. Sahar A El Rahman, Feddah Alhumaidi and Wejdan Abdullah Alsehri: “Sentiment analysis on twitter data” IEEE 2019.
20. Abdullah alsaeedi and mohammad Zubair khan: “A study on sentiment analysis techniques of twitter data”, international journal of
advanced computer science and applications, vol-10, no.2,2019.
21. Google search https://www.google.com/search?

Authors: Hassan Mustafa

Paper Title: Digital Social Engineering Threatens Cybersecurity


Abstract: This study aims to explore the role of social engineering in threatening cyber security by clarifying
the concepts related to social engineering and its seriousness due to unlink to devices and equipment in general and
its dependence on addressing the human psychic mechanisms known for curiosity.
The study is based on the descriptive analysis studies that were based on the survey methodology using the
questionnaire as a data collection tool, which was distributed to 98 respondents. The study found that the majority
of the respondents had no idea about social engineering, and many of the females were rapidly clicking the links..
The study found that m these links can be attractive. The study found that there are significant differences between
digital social engineering and hacking of phones and computers.

Keyword : Social Engineering - Cyber Security - Social Networking - Hacking - Interactive Links- digital social
engineering.
References:
1. Ibrahim Mustafa, Ahmed Hassan Al-Zayat, Hamid Abdul Qader, Mohammed Ali Al-Najjar, 2004, the Intermediate Dictionary, Al-
Shorouk International Library, 4th edition, p. 1037.
2. Shafik, Hassanein, 2007, the Journey of the News in Press and Visual News Agencies, Dar Al Fikr Al Arabi, Cairo.
702. 3. Murad, Kamil Khurshid, 2011, Mass Communication and Media, Amman, Jordan, Dar Al-Masirah for Printing, Publishing and
Distribution. 4016-
4. Abbas Badran, 2010 Electronic Wars: Engagement in a Changing World, Center for E- Government Studies, Beirut. 4025
5. Aboud, Khalaf, 2015, Media and Migration to the Digital Age, Dar Al-Hamed for Publishing and Distribution, Amman, Jordan.
6. Mushtaq, Al-Naimi, 2018, fraud Information as one of Information Crimes, Halabi Legal Publications, Beirut, Lebanon.
7. Shloch, Noura, 2018, Cyber-piracy in the Cyberspace, “The Growing Threat to State Security,” Babylon Center for Humanities Journal,
vol. 8, no. 2, Algeria
8. Al Ittihad Newspaper, December 21, 2018
9. https://www.alittihad.ae/article/81471/2018/-%D8%A7%D9%84%D9%85%D8%B1%D9%83%D8%B2%D9%8A-
%D9%8A%D8%AD%D8%B0%D8%B1-%D9%85%D9%86-%D8%B1%D8%B3%D8%A7%D8%A6%D9%84-
%D8%A7%D8%AD%D8%AA%D9%8A%D8%A7%D9%84-%D8%B9%D8%A8%D8%B1-
%D8%A7%D9%84%D9%88%D8%A7%D8%AA%D8%B3%D8%A7%D8%A8-

English Reference
10. Amoroso, Edward. 2006. Cyber Security. New Jersey: Silicon Press Global Digital Report in 2018, published on Jan 2019.
11. Dr. Frederick Wamala, THE ITU NATIONAL CYBERSECURITY STRATEGY GUIDE, 2011.
12. David Bell, Brain D. Loader, Nickolas Please and Douglas Sculer, Cyber Culture the key concept, first published 2004.
13. Kemmerer, Richard. A. 2003. Cybersecurity. Proceedings of the 25th IEEE, International Conference on Software Engineering: 70 5-715.
http://dx.doi.org/10.1109/ICSE.2003.1201257
14. Internet websites
15. https://en.wikipedia.org/wiki/WhatsApp seen on 15 March 2019
16. https://en.wikipedia.org/wiki/Twitter seen on 15 March 2019
17. https://www.hawiyyah.com/en seen on 13 March 2019
18. https://middleeast-business.com/en/%D8%AA%D9%86%D8%A7%D9%85%D9%8A-%D8%A7%D9%84%D8%AA%D9%87% D8%
AF% D9% 8A% D8% AF% D8% A7% D8% AA-% D8% A7% D9% 84% D8% A5% D9% 84% D9% 83% D8% AA% D8% B1% D9 %
88% D9% 86% D9% 8A% D8% A9-% D8% A7% D9% 84% D9% 85% D8% A7% D9% 84% D9% 8A% D8% A9 seen on 12 March
2019
19. https://www.malwarebytes.com/cryptojacking/ seen on 10 March 2019
20. https://www.statista.com/chart/17267/cyber-security-threats/ seen on 12 March 2019
21. https://www.straitstimes.com/singapore/courts-crime/singapore-airlines-warns-of-phishing-scam-promising-free-plane-tickets seen on 13
March 2019
22. https://twitter.com/OMN_4/status/995205570507563008 seen on 13 Mar 2019
23. http://www.wt-spy.com/homen.php?langar seen on 13 March 2019
24. https://www.youtube.com/watch?v=AkEJCebvGcY seen on 13 March 2019
25. Volume(issue), paging if given. Available: http://www.(URL)

Authors: M V Ramesh, G Vijay Kumar

Paper Title: Design and Fabrication of Solar Powered Autonomous Seed Sowing Vehicle
Abstract: At present there is a huge scarcity of skilled manpower in agricultural sector. Farmers have to look
for the state of the art technology to carry out the cultivation activities to improve the productivity. A rapid progress
in the technology has led to the development of modern techniques in farming and utilizes innovative technologies
to overcome problems associated with the conventional methods. This paper addresses the design and fabrication of
a seed sowing vehicle which is controlled by a microcontroller and powered by solar panel.

Keyword : Seed sowing robot, micro controller, solar powered, zigbee control.
References:
1. S. V Upadhyaya, V. V. Gowda. G, M. B. Poojith, and V. K. Kumar, “A Review on Agricultural Seed Sowing,” International Journal of
Innovative Research in Science, Engineering and Technology, vol. 6, no. 4, pp. 7216–7223, 2017.
2. S. Annamalai, K. Vignesh, and N. Vikneswaran, “Design and Fabrication of Onion Seed Sowing Machine,” Int. J. Sci. Res. Sci. E ng.
Technol., pp. 447–450, 2019.
3. A. Dhawale, A. Jadhao, S. Hendve, K. Fadnvis, S. Hande, and A. Gadling, “Review of Multipurpose Agriculture Machine,” International
Journal of Research in Engineering, Science and Management, no. 2, 2019.
4. S. H. B. T, S. Chellur, A. L. A, and S. K. Y. H. M, “Multi-Purpose Agricultural Vehicle,” imperial Journal of Interdisciplinary Research,
Vol-3, issue. 6, pp. 125–129, 2017.
5. P. V Nithin and S. Shivaprakash, “Multi purpose agricultural robot,” International Journal of Engineering Research, vol. 5013 , no. 5, pp.
1191–1195, 2016.
703. 6. G. Naveen, K. Suresh, A. P. S, A. Raj, and G. Gokul, “fabrication of multi purpose agricultural vehicle,” International Journal of Scientific
Research and Review Volume 07, Issue 05, May 2019, pp. 885–887.
7. S. G. Vishal, S. P. Pratap, R. H. Narayan, and S. H. Praveen, “Fabrication of multipurpose farm equipment,” vol. 5, no. 5, pp. 167–172. 4026-
8. P. N. Umakant, “An Effectual Design of Agribot and Novel Implementation for Smart Agriculture,” International Refereed Journa l of 4031
Reviews and Research , vol. 5, no. 4, 2017.
9. M. U. Hassan, M. Ullah, and J. Iqbal, “Towards Autonomy in Agriculture : Design and Prototyping of a Robotic Vehicle with Seed
Selector,” 2016 2nd Int. Conf. Robot. Artif. Intell., pp. 37–44, 2016.
10. K A Sunitha, G S G S Suraj,CH P N Sowrya,G Atchyut Sriram,D Shreyas and T Srinivas, “Agricultural robot designed for seeding
mechanism,” IOP Conf. Series: Materials Science and Engineering , 2017.
11. P. Khedkar, G. Khandare, A. Gaikwad, P. Ukirade, and A. Y. Deogade, “Design and Development of Vacuum Seed Sowing Robot,”
International Journal for Mechanical Engineering and Aeronautical Engineering, vol. 6, no. 4, pp. 1–12, 2018.
12. P A Reddy, G.E Babu, "AGRIBOT -RF based farmer friendly Agricultural Robot with automatic seed dispensing system", International
Journal of Research, Page No : 362, vol. 7, no. 362, pp. 362–369, 2018.
13. K. Singhal and G. Prajapati, “Solar Powered Seed Sowing Machine,” international Journal of Applied Engineering Research, vol. 13, no.
6, pp. 259–262, 2018.
14. M. Ahalya, A. Muktha, M. Veena, G. Vidyashree, and V. J. Rehna, “Solar Powered Semi-Automatic Pesticide Sprayer for use in
Vineyards,” SSRG International Journal of Electronics and Communication Engineering ,vol. 4, no. 4, pp. 52–55, 2017.
15. B. Ranjitha, M. N. Nikhitha, and K. Aruna, “Solar Powered Autonomous Multipurpose Agricultural Robot Using Bluetooth / Android
App,” 2019 3rd Int. Conf. Electron. Commun. Aerosp. Technol., pp. 872–877, 2019.
16. N. V. Reddy, S. V. S. Prasad, T. Priyanka, and N. Pushpalatha, “Solar Operated Agrobot,” IOSR Journal of Electronics and
Communication Engineering , vol. 11, no. 3, pp. 62–65, 2016.
17. S. Swetha and G. H. Shreeharsha, “Solar Operated Automatic Seed Sowing Machine,” International Journal of Advanced Agricultur al
Sciences and Technology , vol. 4, no. 1, pp. 67–71, 2015.
18. S. Mujawar, S. Patil, S. Patil, and S. Pawar, “Solar Powered Variable Pitch Smart Seed Sowing System with Herbicides Sprayer,”
International Journal of Engineering Trends and Technology, vol. 46, no. 7, pp. 404–407, 2017.
19. B.Mohan, M.V.Ramesh, T. Srinivasa Rao, "Electrical Based Seed Sowing Machine", Journal of Emerging Technologies and Innovative
Research, Volume 5, Issue 11, pp.. 649-655, November 2018.

Authors: Natalia Fomina, Leyla Pechko, Tatiana Koptseva


Development of Artistic Giftedness in School Students Within the Framework of Russian Education (in
Paper Title:
the 1920–40s)
Abstract: The article looks at the experience of identification and development of artistically gifted students in
the framework of Soviet education in the 1920–1940s. The issue is examined in historical retrospective. The
authors focus on the identification of children who are gifted in the sphere of visual arts. The research is based on
the international collection of children’s drawings (1896–2017) at the FSBSI “Institute of Art Education and
704. Cultural Studies of the Russian Academy of Education”. As a result of the research, the authors determined the
preferable age for providing occupational guidance to children who are motivated for artistic creative activity. In 4032-
addition, methods for identification of artistic giftedness have been suggested. 4036

Keyword : artistic giftedness, school student, art education, artistic and creative development, visual art,
children’s drawing contest, exhibition of children’s drawings, teenager.
References:
1. L.L. Alekseeva, “Predmety iskusstva v shkole i otsenka kachestva obrazovaniya” [Art subjects at school and quality assessment in
education]. Pedagogika iskusstva, 2, 2017, pp. 15–20.
2. D.B. Bogoyavlenskaya, “Rabochaya kontseptsiya odarennosti” [The practical framework of giftedness]. Moscow, the Ministry of
Education and Science of the Russian Federation, 2003. ISBN 5-88521-095-5.
3. A.V. Bakushinsky, “Khudozhestvennoe tvorchestvo i vospitanie” [Artistic creativity and education]. Moscow, Novaya Moskva, 1925.
4. A.V. Bakushinsky, “Khudozhestvennoe tvorchestvo i vospitanie Opyt issledovaniya na materiale prostranstvennykh iskusstv” [Artistic
creativity and education. Research experience based on three-dimensional arts]. Moscow, Publishing house “KARAPUZ”, 2009.
5. L.S. Vygotsky, “Voobrazhenie i tvorchestvo v detskom tvorchestve: psikhologicheskii ocherk” [Imagination and creativity in childhood: a
psychological essay]. Moscow, Prosveshchenie, 1967.
6. V.G. Lisovskii, “Akademiya khudozhestv” [The Academy of Arts]. Leningrad, Lenizdat, 1982.
7. N.A. Dmitrieva, “Izobrazhenie i slovo” [Image and word]. Moscow, Iskusstvo, 1962.
8. G.V. Labunskaya, “Izobrazitelnoe tvorchestvo detei” [Children’s creative activities in the sphere of visual arts]. Moscow, Prosveshchenie,
1965.
9. V.S. Shcherbakov, “Izobrazitelnoe iskusstvo. Obuchenie i tvorchestvo” [Visual art. Teaching and creativity]. Moscow, Prosveshchenie,
1969.
10. S.D. Levin, “Vash rebenok risuet” [Your child is drawing]. Moscow, Sovetskii khudozhnik, 1979.
11. G.V. Labunskaya, A.V. Shchekin-Krotova, “Konkursy i vystavki detskogo izobrazitelnogo tvorchestva” [Contests and exhibitions of
children’s creative activities in the sphere of visual arts]. Moscow, TsDKhVD, Prosveshchenie, 1939.

Authors: S. Bhargav Kumar

Paper Title: Multi-Core Eight Bit Ternary Content-Addressable Memory Design Based Image Learning System
Abstract: In this research work, the image is learned to find features to make use of during its analysis and a
genetic apices based low power Ternary Content-Addressable Memory (TCAM) is designed to implement the
proposed image learning system. A technique called Content Matching Search Register is proposed in this work to
perform the image learning operations in proposed TCAM architecture. This paper proposes an ImOFF algorithm
for image analysis. The focus of this multi-core TCAM (MC-TCAM) is to make fast computations and search
based designs. The focus application of this research work is in the design of low power On-board Embedded-VLSI
chip to perform image analysis. Proposed multi-core eight bit Ternary TCAM (MCEB-TCAM) is analyzed using
IC design tools in 90nm technology, using Verilog hardware description language and usage of Cadence for layout
generation and parasitic extraction of the circuit components.

Keyword : Feature learning, TCAM, Image Analysis, Cadence, pixels.


References:
1. S.Bhargav Kumar " A Survey and an Approach for Content-Addressable Memory Design Based Fast Image-Feature Learning System "
IOSR Journal of VLSI and Signal Processing (IOSR-JVSP) , vol. 9, no. 4, 2019, pp. 01-05.
2. S. D. Kumar and N. M. Sk, "A Novel Ternary Content-Addressable Memory (TCAM) Design Using Reversible Logic," 2015 28th
International Conference on VLSI Design, Bangalore, 2015, pp. 316-320.
3. P. Junsangsri, F. Lombardi and J. Han, "A memristor-based TCAM (Ternary Content Addressable Memory) cell," 2014 IEEE/ACM
International Symposium on Nanoscale Architectures (NANOARCH), Paris, 2014, pp. 1-6.
4. S. Jayashree and N. Shivashankarappa, "Deep packet inspection using ternary content addressable memory," International Conference on
Circuits, Communication, Control and Computing, Bangalore, 2014, pp. 441-447.
705. 5. K. P. Gnawali, S. N. Mozaffari and S. Tragoudas, "Low Power Spintronic Ternary Content Addressable Memory," in IEEE Transactions
on Nanotechnology, vol. 17, no. 6, pp. 1206-1216, Nov. 2018.
6. A. F. Fonseca, D. L. Willian, T. R. B. S. Soares, L. G. C. Melo and O. P. V. Neto, "CAM/TCAM — NML: (Ternary) content addressable 4037-
memory implemented with nanomagnetic logic," 2017 30th Symposium on Integrated Circuits and Systems Design (SBCCI), Fortaleza, 4041
2017, pp. 174-179.
7. K. Lee, G. Ko and J. Park, "Low Cost Ternary Content Addressable Memory Based on Early Termination Precharge Scheme," 2019 IEEE
International Symposium on Circuits and Systems (ISCAS), Sapporo, Japan, 2019, pp. 1-4.
8. M. A. Foysal, M. Z. Anam, M. S. Islam, I. Tahmid and K. Mondal, "Performance analysis of ternary content addressable memory
(TCAM)," 2015 International Conference on Advances in Electrical Engineering (ICAEE), Dhaka, 2015, pp. 105-108.
9. W. Choi, K. Lee and J. Park, "Low Cost Ternary Content Addressable Memory Using Adaptive Matchline Discharging Scheme," 2018
IEEE International Symposium on Circuits and Systems (ISCAS), Florence, 2018, pp. 1-4.
10. H. Riaz, A. A. Bhatti, M. A. Tahir and M. Sarwar, "High speed content addressable memory with reduced size and less power
consumption," 2016 International Conference on Design and Technology of Integrated Systems in Nanoscale Era (DTIS), Istanbul, 2016,
pp. 1-6.
11. M. Irfan and Z. Ullah, "G-AETCAM: Gate-Based Area-Efficient Ternary Content-Addressable Memory on FPGA," in IEEE Access, vol.
5, pp. 20785-20790, 2017.
12. A. Ahmed, K. Park and S. Baeg, "Resource-Efficient SRAM-Based Ternary Content Addressable Memory," in IEEE Transactions on Very
Large Scale Integration (VLSI) Systems, vol. 25, no. 4, pp. 1583-1587, April 2017.
13. M. A. Bahloul et al., "Design and analysis of 2T-2M Ternary content addressable memories," 2017 IEEE 60th International Midwest
Symposium on Circuits and Systems (MWSCAS), Boston, MA, 2017, pp. 1430-1433.
14. S. Tabassum, F. Parveen and A. B. M. H. Rashid, "Low power high speed Ternary Content Addressable Memory design using 8
MOSFETs and 4 memristors - hybrid structure," 8th International Conference on Electrical and Computer Engineering, Dhaka, 2014, pp.
168-171.
15. Md. Hameed Pasha and S.Bhargav Kumar, " A Novel Genetic Apices based Power Estimation for a Distinctive Analog IC Design"
ICRSTEM 2019:: International Conference on Research Trends in Science, Technology, Engineering & Management, at Jayamukhi
Institute Of Technological Sciences, JNTU Hyderabad, Narsampet on 10 May 2019.
16. J. Sorin, "Low-Power Content Addressable Memory," in Computer, vol. 51, no. 3, pp. 8-9, March 2018.
17. A. Gangadhar, R. R. Sirisha and K. Babulu, "Implementation of content addressable memory with high speed and low power
consumption," 2015 Conference on Power, Control, Communication and Computational Technologies for Sustainable Growth
(PCCCTSG), Kurnool, 2015, pp. 230-233.

Authors: Biswa Mohan Acharya, Ajit Kumar Nayak

706. Paper Title: Cross-layer Rate Adjusted Congestion Controlled Protocol for Wireless Multimedia Sensor Networks
Abstract: Wireless Multimedia Sensor Networks (WMSNs) consists of set of sensor nodes which can capture 4042-
multimedia data as well as scalar data from the target region and transmit to the base station. The type and nature of 4046
traffic generated in WMSNs leads to congestion and it can cause substantial loss of data packets, reduced
throughput and wastage of energy. In order to overcome the challenge, a cross layer protocol which adjusts the rate
of transmission is proposed in this paper. As per the information provided by the MAC layer regarding buffer
availability and channel traffic condition, the proposed protocol adjusts the channel access along with transmission
rate of the nodes. The simulation results reveal that the proposed protocol performs better than the existing
protocols with respect to packet loss, throughput and energy.

Keyword : Congestion, Multimedia, Protocol, Sensor.


References:
1. Karl H. and Willig A., Protocols and Architectures for Wireless Sensor Networks, Wiley, 2006.
2. Chen, Y.L. and Lai, H.P. (2012) Priority-Based Transmission Rate Control with a Fuzzy Logical Controller in Wireless Multimedia
Sensor Networks. Computers and Mathematics with Applications, 64, 688-698.
3. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y. and Cayirci, E. (2002) Wireless Sensor Networks: A Survey. Computer Networks,
38, 393-422.
4. C. Wang, B. Li, K. Sohraby, M. Daneshmand, and Y. Hu, “Upstream congestion control in wireless sensor networks through
crosslayer optimization,” IEEE J. Sel. Areas Commun., vol. 25, no. 4, pp. 786–795, May 2007.
5. C. T. Ee and R. Bajcsy, “Congestion control and fairness for many‐to‐one routing in sensor networks,” in Proceedings of the 2 nd
international conference on Embedded networked sensor systems, 2004, pp. 148–161.
6. B. Hull, K. Jamieson, and H. Balakrishnan, “Mitigating congestion in wireless sensor networks,” in Proceedings of the 2nd
international conference on Embedded networked sensor systems SenSys ’04, 2004, p. 134.
7. C.Y. Wan, S. B. Eisenman, A. T. Campbell, and J. Crowcroft, “Siphon: Overload Traffic Management using Multi Radio Virtual
Sinks in Sensor Networks,” Proc. 3rd Int. Conf. Embed. networked Sens. Syst. SenSys ’05, vol. 3, p. 116, 2005.
8. C.Y. Wan, S. B. Eisenman, and A. T. Campbell, “Energy efficient congestion detection and avoidance in sensor networks,” ACM
Trans. Sens. Networks, vol. 7, no. 4, pp.1–31, 2011.
9. J. Kang, Y. Zhang, and B. Nath, “TARA: Topology aware resource adaptation to alleviate congestion in sensor networks,” IEEE
Trans. Parallel Distrib. Syst., vol. 18, no. 7, pp.919–931, 2007.
10. H. Yuan, N. Yugang, and G. Fenghao, “Congestion control for wireless sensor networks: A survey,” in The 26th Chinese Control
and Decision Conference (2014 CCDC), 2014, pp. 4853–4858.
11. M. Yaghmaee and D. Adjeroh, “A New Priority Based Congestion Control Protocol for Wireless Multimedia Sensor Networks,” Int.
Symp. a World Wireless, Mob. Multimed. Networks, 2008. WoWMoM 2008, pp. 1–8, 2008.
12. C. Sergiou, V. Vassiliou, and A. Paphitis, “Hierarchical Tree Alternative Path (HTAP) algorithm for congestion control in wireless
sensor networks,” Ad Hoc Networks, vol.11, no. 1, pp. 257–272, 2013.
13. S. Mahdizadeh Aghdam, M. Khansari, H. R. Rabiee, and M. Salehi, “WCCP: A congestion control protocol for wireless multimedia
communication in sensor networks,” Ad Hoc Networks, vol. 13, no. PART B, pp. 516–534, 2014.
14. Golgiri R and Javidan R, “ TMCC: An Optimal Mechanism for Congestion Control in Wireless Sensor Networks”, International
Journal of Advanced Computer Science and Applications, (IJACSA),Vol. 7, No. 5, 2016,pp.454-460.
15. M. Mayandi and K. V. Pilla, “Probabilistic QOS Aware Congestion Control in Wireless Multimedia Sensor Networks “, Circuits an d
Systems, 7, pp 2081-2094, 2016.

Authors: Anubrata Mondal, KamalikaGhosh


Proposed Safe Distance between Object & Artificial Light Sources in Historical Building or Museum in
Paper Title:
Terms of Conservation
Abstract: It is well known fact that light is associated with its neighbouring spectrum of Ultraviolet ray (UV
ray). UV has deleterious effects upon living and non-living objects. In order to avoid this bad effect of UV some
simplified methods to need to try out. Experimentation has been carried out with Incandescent lamp, Conventional
Fluorescent lamp, Compact Fluorescent Lamp (CFL) and Light Emitting Diode (LED) lamps and separately UV
content as well as illuminance at various distances have been measured. UV-measurement has been made by UV
meter made through world reputed make- Konica Minolta, Japan and illuminance is measured by Lux-Meter. The
observations have been shown in the main body of the paper which shows successful results as per expectations.
The system can be adopted for Museum lighting where important archives can be saved from bad effects of emitted
UV from the ambient light sources. This simple methodology can thus be adapted for indoor application in
Museum lighting/ Heritage building lighting where archives can be easily conserved.

Keyword : Historical, Heritage, Ultraviolet Radiations, Illuminance, Light Emitting Diode (LED),
707. Conservation.
References: 4047-
1. Tétreault, J. Damage Function Based on UV Spectrum for Different Materials. CCI Report 125877. Ottawa, ON: Canadian Conservation 4052
Institute, 2013.
2. Ghosh K., Mondal A., 2015, Some studies on the composition of ultra violet rays in visible light from various light sources, vol.- BXII.1,
pp. 436-442
3. Uniyal, C.P. (1995). Preventive Conservation of Archival Materials: Some Rather Ignored but Vital Aspects- CCPI, vo-28, New Delhi:
p50-55.
4. Thomson, G, 1986, The Museum Environment, International Institute for Conservation of Historic and Artistic Works, Butterworth-
Heinemann, 2nd Edition, p. 33
5. M. Havas, Health Concerns Associated with Energy Efficient Lighting and Their Electromagnetic Emissions, vol. 3, SCENIHR & Light
Sensitivity, 2008.
6. Cebula,T.A., E.N.Henrikson, P.E.Hartman, and W.H.Biggley. (1995). Reversion profiles of cool white fluorescent lig ht compared with far
ultraviolet light: homologies and differences. Photochem Photobiol 61:353-359.
7. B. L. Diffey, “Sources and measurement of ultraviolet radiation,” Methods, vol. 28, no. 1, pp. 4–13, 2002.
8. “General discussion on energy saving,” in Proceedings of the 1st International Conference on Power Electronics Systems and
Applications, D. H. Wang and K. W. E. Cheng, Eds., pp. 298–303, IEEE, November 2004.
9. Saunders, D. Ultra-Violet Filters for Artificial Light Sources. National Gallery Technical Bulletin 13. London, UK: The National Gallery,
1989, pp. 61–68.
10. Hoppe VU, Kopplow HJ, Wiskemann A. Statistical evaluation of light protection factors. Arzneimittel for schung. 1975; 25(5):817-25.
German.
11. CIE (International Commission on Illumination). CIE 157:2004. Control of Damage to Museum Objects by Optical Radiation. Vienna,
Austria: CIE, 2004.
Government of India.IS: 3646 (INDIAN STANDARD: 3646), 1992

Authors: T. Dharani, I. Laurence Aroquiaraj


An Automatic Image Registration Methods for Multi-Domain Images by using Geometric
Paper Title:
Relationships
Abstract: In the internet technology world, all the information is considered as an image format only. Because
one image is equal to a thousand words. Automatically increasing the image database size, high resolution and
including multi-domain concepts. The human perception of getting the required image is very poor during the
image retrieval process. In this case, the image retrieval system is consists of many problems like more time
consuming, irrelevant results of the user. Registration is necessary to be able to compare or integrate the data
obtained from different measurements of the query image. Image registration is that the method of reworking
totally different sets of knowledge into one organization and orienting 2 or additional pictures of constant scene.
This method involves designating one image because the reference image, conjointly known as the mounted image,
and applying geometric transformations or native displacements to the opposite pictures so they align with the
reference. To solve the above problems by using an automatic image registration methods. In this paper, we are
mainly focusing the automatic image registration methods for multi-domain images for better human understating
of required results. Finally, evaluate the performance of image registration methods with length, counts of matched
points and uniformly distributed points of multi-domain images for better understanding.

Keyword : Automatic image registration, Geometric transformations, Multi-Domain Images, Uniformly


Distributed Points.
References:
1. T. Dharani, I. Laurence Aroquiaraj, “A Survey on Content Based Image Retrieval”, IEEE-2013 International Conference on Pattern
Recognition, Informatics and Mobile Engineering (PRIME), PRIME 2013, 78-1-4673-5845-3/13/2013.
2. T. Dharani, I. Laurence Aroquiaraj, “Content based image retrieval system with modified knn algorithm”, International Journal of
Innovations in Scientific and Engineering Research (IJISER), Vol. 1 Issue 1 Jan 2014.
3. T. Dharani, I. Laurence Aroquiaraj, “Content Based Image Retrieval System Using Feature Classification with Modified KNN
Algorithm”, International Journal of Computer Trends and Technology (IJCTT), ISSN: 2231 - 2803, volume 4 Issue 7–July 2013.
4. T. Dharani, I. Laurence Aroquiaraj, “An appraisal of content based image retrieval by means of unlabelled images”, Internatio nal
Journal of Advanced Research in Biology Engineering Science and Technology, Vol. 2, Special Issue 10, March 2016.
5. T. Dharani, I. Laurence Aroquiaraj and V. Mageshwari, “Comparative Analysis of Edge Detection Algorithms Based on Content
Based Image Retrieval With Heterogeneous Images”, International Journal of Computational Intelligence and Informatics, ISSN:
2349 – 6363, Vol. 5: No. 4, March 2016.
6. T. Dharani, Dr. I. Laurence Aroquiaraj and V. Mageshwari, “Diverse Image Investigation using image metrics for Content Based
708. Image Retrieval system”, IEEE Xplore, August 2016.
7. V. Mageshwari, Dr. I. Laurence Aroquiaraj and T. Dharani, “A Resourceful Comparison of First Order Edge Detections Using
Grayscale Intensities”, Imperial Journal of Interdisciplinary Research (IJIR), ISSN: 2454-1362, Vol-2, Issue-5, 2016. 4053-
8. V. Mageshwari, Dr. I. Laurence Aroquiaraj and T. Dharani, “A Proficient Segmentation of Remote Sensing Images using Modified 4059
Kernel Fuzzy C-Means Algorithm”, International Journal of Computational Intelligence and Informatics, ISSN: 2231 – 0258, Vol. 6:
No. 1, June 2016.
9. V. Mageshwari, Dr. I. Laurence Aroquiaraj and T. Dharani, “A Realistic Medical Image Segmentation of Abnormal HIV in Blood
Cells Using Morphological Operations”, IEEE Xplore, August 2016.
10. V. Mageshwari, Dr. I. Laurence Aroquiaraj and T. Dharani, “Big data in health care revolut ion – a survey”, International Research
Journal of Engineering and Technology (IRJET) e -ISSN: 2395 -0056, p- ISSN:2395-0072, Volume: 03 Issue: 09, Sep-2016.
11. T. Dharani, Dr. I. Laurence Aroquiaraj, “Pattern Based Image Retrieval System built with Object Tracking and Segmentation
Concepts”, International Journal of Computer & Mathematical Sciences (IJCMS), Volume 6, Issue 9, ISSN 2347 – 8527, September
2017.
12. T. Dharani, Dr. I. Laurence Aroquiaraj, “An Essential Image Augmentation Processes for Pattern Based Image Retrieval System”,
Elsevier’s SSRN eLibrary – Journal of Information Systems & eBusiness Network -ISSN: 1556-5068, 2017.
13. Chin-Sheng Chen * ID and Chi-Min Wen, “An Efficient Retrieval Technique for Trademarks Based on the Fuzzy Inference System”
Appl. Sci. 2017, 7, 849; doi:10.3390/app7080849
14. www.mdpi.com/journal/applsci.
15. BEN YE, ZHANCHUAN CAI, TING LAN, AND YOUQING XIAO, “A Novel Shape Representation Method for Complex
Trademark Image”, IEEEAccess EEDigital Object Identifier 10.1109/ACCESS.2019.2912230.
16. Preeti Patel1, Ajay Kr Indoria2, “Preprocessing and Similarity Matching Trademark Images Based on Color and Shape”,
International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Index Copernicus Value (2013): 6.14 | Impact
Factor (2013): 4.438 Volume 4 Issue 1, January 2015.
17. Saurabh Agarwal1, Nikhil Chaturvedi2 and Punit Kumar Johari3, “An Efficient Trademark Image Retrieval using Combination of
Shape Descriptor and Salience Features”, International Journal of Signal Processing, Image Processing and Pattern Recognition
Vol.7, No.4 (2014), pp.295-302, ISSN: 2005-4254, 2014.
18. Saurabh Agarwal1 and Punit Kumar Johari2, “A NOVEL APPROACH TO DEVELOP A NEW HYBRID TECHNIQUE FOR
TRADEMARK IMAGE RETRIEVAL”, International Journal on Information Theory (IJIT), Vol.3, No.4, October 2014.
19. ARDRA MARIYA JOSEPH, GRACE JOHN M., ANTO SAHAYA DHAS and “MAMMOGRAM IMAGE DENOISING
FILTERS: A COMPARATIVE STUDY”, Proc. IEEE Conference on Emerging Devices and Smart Systems (ICEDSS 2017), 3-4
March 2017.
20. Manish Chhabra, Rohan Gaur and Parminder Singh Reel, “Detection of Fully and Partially Riped Mango by Machine Vision”,
Proceedings in International Journal of Computer Applications, ISSN: 0975 – 8887, 2012.
21. T. Dharani, Dr. I. Laurence Aroquiaraj,” Three Levels of Feature Extraction from Multi- Domain Images (Accepted for
publication)”, International Journal of Scientific & Technology Research to be published.
22. Lu Y, Gao K, Zhang T, Xu T (2018) A novel image registration approach via combining local features and geometric invariants.
PLoS ONE 13(1): e0190383. https://doi.org/10.1371/journal.pone.0190383.
23. Mehfuza Holia, Zankhana Shah, “Automatic Image Registration”, International Conference on Research and Innovations in Science,
Engineering &Technology (ICRISET), Kalpa Publications in Engineering Volume 1, 2017, Pages 402–411 2017.
24. Najeeb Ur Rehman Malik, Sheeraz Ahmed Memon, Yasmeen Naz Panhwar, auAwais Gul Airij, Syed A. R. Abu-Bakar, Mohamed
A. El-Khoreby, “Performance Comparison Between SURF and SIFT for Content-Based Image Retrieval”, Proc. of the 2019 IEEE
International Conference on Signal and Image Processing Applications (IEEE ICSIPA 2019), Malaysia, September 17-19, 2019.
25. ISRAA HADI ALI, Sarmad Salman, “A Performance Analysis of Various Feature Detectors and their Descriptors for Panorama
Image Stitching”, International Journal of Pure and Applied Mathematics, Volume 119 No. 15, ISSN: 1314-3395, pp.no.147-161,
2018.
26. Engr.Farman Ali, Engr.Sajid Ullah Khan, Engr.Muhammad Zarrar Mahmudi, Rahmat Ullah, “A Comparison of FAST, SURF,
Eigen, Harris, and MSER Features”, INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING AND INFORMATION
TECHNOLOGY, VOL. 8, NO. 6, E-ISSN 2412-8856, pp.no. 100–105, June 2016.

Authors: V Mageshwari, I. Laurence Aroquiaraj

Paper Title: Feature Selection Methods for Mining Social Media


Abstract: People can share their thoughts and opinion through Social Media which can easily widespread. So
many public issues and political views are also discussed on social media. HIV/AIDS is also one of the important
topics discussed. This work aims to classify HIV/AIDS related twitter data. Since the twitter data is highly
dimensional, it is essential to do reduce dimensionality of the data to attain better classification results. Tweets are
collected using keyword search and necessary pre-processing steps are carried out. Then feature extraction methods
such as Bag of Words (BOW) model and TF-IDF are implemented. Singular Value Decomposition (SVD) and
Principal Component Analysis (PCA) techniques are used for dimensionality reduction. Finally, classification is
carried out and the results are discussed.

Keyword : Tweets, Pre-processing, BOW, TF-IDF, SVD, PCA,Classification


References:
1. Akrini Krouska & Christos Troussas, “The Effect of Preprocessing Techniques on Twitter Sentiment analysis”, Research Gate, July 2016,
DOI:10.1109/IISA.2016.7785373.
2. Amit G. Shirbhate, Sachin N. Deshmukh, “Feature Extraction for Sentiment Classification on Twitter Data”, International Journal of
Science and Research, ISSN: 2319-7064, Volume 5 Issue 2, February 2016.
3. Ammar Ismael Kadhim, Yu-N Cheah, “Improving TF-IDF with Singular Value Decomposition (SVD) for Feature Extraction on Twitter”,
3rd International Engineering Conference on Development in Civil & Computer Engineering Applications, 2017, ISSN: 24096997
4. Ankita Gupta, “Sentiment Analysis of Tweets using Machine Learning Approach”, International Journal of Computer Science and Mobile
Computing, Vol.6 Issue 4, April-2017.
5. Ankita Pal, “Principal Component Analysis of TF-IDF In Click Through Rate Prediction”, International Journal of New Technology and
Research (IJNTR), ISSN: 2454-4116, Volume-4, Issue-12, December 2018, pp 24-26.
6. Arjun Srinivas Nayak & Ananthu P Kanive, “Survey on Pre-Processing Techniques for Text Mining”, International Journal of
Engineering and Computer Science, ISSN: 2319-7242, Volume 5 Issue 6 June 2016, Page No. 16875-16879.
7. Aymen Abu-Errub, “Arabic Text Classification Algorithm Using TF-IDF and Chi Square Measurements”, International Journal of
Computer Applications, ISSN: 0975-8887, Volume 93 – No 6, May 2014.
8. Bholane Savita & Prof.Deipali Gore, “Sentiment Analysis on Twitter Data Using Support Vector Machine”, IJCST, Volume 4, Issue 3,
May-Jun 2016.
709. 9. Carl A. Latkin, “Social network approaches to recruit, HIV prevention, medical care and medication adherence” J Acquir Immune Defic
Syndr. 2013 June. 4060-
10. Dr. S. Vijayarani, “Preprocessing Techniques for Text Mining -An Overview” International Journal of Computer Science & 4064
Communication Networks, Vol 5(1), 7-16.
11. Emma Haddi & Xiaohui, “The Role of Text Pre-processing in Sentiment Analysis”, Information Technology and Quantitative
Management (ITQM2013), Procedia Computer Science 17 (2013)26-32.
12. Fouzi Harrag, “Improving Arabic Text Categorization Using Neural Network with SVD” Journal of Digital Information Management,
Volume 8 Number 4, August 2010.
13. Hyunsoo Kim, “Dimension Reduction in Text Classification with Support Vector Machines”, Journal of Machine Learning Research
6(2005) 37-53.
14. Indra S.T, “Using Logistic Regression Method to Classify Tweets into the Selected Topics”, ICACSIS, IEEE, 2016.
15. Mageshwari V, Dr I. Laurence Aroquiaraj, “Big Data in Health Care Revolution – A Survey”, International Research Journal of
Engineering and Technology, Volume 3 Issue 9, September 2016, ISSN 2395-0056.
16. V. Mageshwari, Dr.I. Laurence Aroquiaraj, “Social Media Mining for Analyzing HIV/AIDS – A Preliminary Study”, IJIACS, ISSN: 2347-
8616, Volume 6, Issue 9, September 2017.
17. V Mageshwari, Dr.I. Laurence Aroquiaraj, “The Importance of Text Pre-Processing in Twitter Mining”, International Journal of Scientific
Research in Computer Science Applications and Management Studies, ISSN: 2319-1953, Volume 7, Issue 4, July 2018.
18. V. Mageshwari, Dr. I. Laurence Aroquiaraj, “An Efficient Feature Extraction Method For Mining Social Media”, International Jo urnal of
Scientific & Technology Research, October 2019.
19. Rene Clausen Nielsen, “Social Media Monitoring of Discrimination and HIV Testing in Brazil, 2014-2015”, AIDS Behav (2017) 21:S114-S120, DOI:
10.1007/s10461-017-1753-2
20. Sean D. Young, Wenchao Yu, “Towards Automating HIV Identification: Machine Learning for Rapid Identification of HIV-related Social Media Data”,
J Acquir Immune Defic Syndr, February 01 2017, 74(Suppl): S128-S131, doi: 10.1097/QAI.0000000000001240.
21. Yassine AL AMRANI, Mohammed LAZAAR, “Random Forest and Support Vector Machine based Hybrid Approach to Sentiment Analysis”, The
First International Conference on Intelligent Computing in Data Sciences, Procedia Computer Science 127 (2018) 511-520.
22. Tajinder Singh and Madhu Kumari, “Role of Text Pre-processing in Twitter Sentiment Analysis”, IMCIP-2016, Procedia Computer
Science 89 (2016) 569-554.
23. ZHANG Yun-tao, “An Improved TF-IDF approach for Text Classification”, Journal of Zhejiang University SCIENCE, ISSN: 1009-3095,
2005.
24. K Subba Reddy, “Using Reduced Set of Features to Detect Spam in Twitter Data with Decision Tree and KNN Classifier Algorithms”,
International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8 Issue-9, July 2019.
25. Kristine Mae M. Adlaon, “Dimensionality Reduction of Feature Word Vectors for Sentiment Classification of Philippin e Political Related
Tweets” Proceedings of the 18 th Phillipine Computing Science Congress (PCSC 2018)
26. Jian-lin LI, “A Text Classification Algorithm Based on PCA” 2017 2 nd International Conference on Computer Science and Technology
(CST 2017), ISBN: 978-1-60595-461-5

710. Authors: S. Raja, K. Muralidharan, S. Karthik, K. Rajasuthan


Paper Title: Cell Formation Based on New Similarity Coefficient with Operation Sequence and Alternative Routing
Abstract: Cell formation is to construct machine cells and part families and then dispatch the part families to
machine cells. Various cell formation approaches and algorithms have been developed over the years considering
various production factors, scenarios and objectives. The results of these different approaches are evaluated based
on the several parameters. Most of the studies have considered only either the operation sequence or the alternative
routing. Very few of the approaches have proposed for considering both the operation sequence and the alternative
routing. Here, a new method for the formation of cell and intracellular machine arrangement which is formulated
by considering both the operation sequence and alternative process routings is proposed. The arrangement of
machines and parts within the cell follows a specific sequence which is formed with the help of coefficient of
similarity. Various parameters such as forward flow, backflow and voids in the cell formation scenarios are
considered to evaluate the approach. With the help of these parameters problems from other literatures, which were
solved by other methods are evaluated. So as to validate the effectiveness of our proposed approach, five eminent
test problems from the previous literature are engaged and the results are compared with the existing method the
results clearly display that the proposed approach which that provides superior or equal solution than the existing
method.

Keyword : Alternative routing, Cellular manufacturing System, Operation sequence, Part family, Similarity
coefficient,
References:
1. Abtin nourmohammadzadeh ,Hamed Rafiei, Hossein Dashti, Masoud Rabbani (2013) ‘Cell formation problem with alternative process
plans alternative routes considering defect rate’, International Journal of Scientific & Engineering Reasearch, Vol. 4, No. 5.
2. Amit Rai Dixit and Mishra, P.K. (2007) ‘Heuristic based approach of Cell Formation considering Operation Sequence’, Proceedin gs of 4065-
World Congress on Engineering, Vol. II, WCE 2007, London, U.K. 4072
3. Busaba Phruksaphanrat and Nittaya Ngampak (2011) ‘Cellular Manufacturing Layout Design and Selection: A case Study of Electronic
Manufacturing Service Plant’, proceedings of international MultiConference of Engineers and Computer Scientists, Vol. II , Hong Kong.
4. Chalapathi, P.V. (2012) ‘Complete Design of Cellular Manufacturing Systems’, International Journal of Advanced Engineering
Technology 0976-3945.
5. Chin-Chih Chang, Feng-Chia Li, Tai- hsi Wu, ‘An sufficient tabu search approach to determine cell formation, cell layout, and
intracellular machine layout in the cellular manufacturing system’.
6. Chin-Chih Chang, Tai-Hsi Wu (2011) ‘A water flow-like algorithm or cellular manufacturing design and layout’, International Conference
on Advanced Information Technologies (AIT)
7. Chin-chih chang, Tai-Hsi Wu and Chien-Wei Wu (2013) ‘An Efficient Approach to Determine Cell Formation, Cell Layout and Intra
cellular Machine Sequence in Cellular Manufacturing Systems’, Computers & Industrial Engineering Vol. 66 pp.438-450.
8. Dipak Laha and Manash Hazarika (2016) ‘A Heuristic Approach for Machine Cell Formation Problems with Alternative
Routings’,Twelfth International Multi-Conference on Information Processing (IMCIP).
9. Farouq Alhourani (2013) ‘Clustering algorithm for solving group technology problem with multiple process routings’, Computers and
Industrial Engineering Vol. 66 pp.781-790.
10. Harhalakis G, Nagi R, Proth JM. (1990), ‘An efficient heuristic in manufacturing cell formation for group technology applica tions’,
International Journal of Production Research Vol.28, pp.185–198
11. Jamal Arkat, Mohammad Saeed Ameli (2006) ‘Cell formation with alternative process routings and machine reliability consideration’,Int J
Adv ManufTechnol Vol. 35: pp.761-768.
12. Murugan, M. and Selladuari, V. (2011) ‘Formation of Machine Cells/Part Families in Cellular Manufacturing Systems Using an ART-
Modified Single Linkage Clustering Approach – A Comparative Study’, Jordan Journal of Mechanical and Industrial Engineering, Vol. 5,
No. 3.
13. Raja, S., & Anbumalar, V. (2016a), ‘An effective methodology for cell formation and intra‑cell machine layout design in cellular
manufacturing system using parts visit data and operation sequence data’,. The Brazilian Society of Mechanical Sciences and
Engineering; Vol. 38, pp. 869–882.
14. Raja, S., & Anbumalar, V. (2016b), ‘A new method for integrating feasibility assessment and cell formation problem considering
operation sequence’, International journal of Advanced 608 Engineering Technology, Vol. 7, No.1,pp. 544, 551.

Authors: Elakya. R, Prateek Kumar Singh, Himanshu Bafila, Aman Kumar

Paper Title: Melanoma Skin Cancer Detection


Abstract: Skin cancer growth is viewed as one of the most Hazardous type of the Cancers found in Humans.
Nowadays skin cancer is found in different kinds for example Melanoma, Basal and Squamous cell Carcinoma
among which Melanoma is the generally flighty. The detection of Melanoma disease in beginning period can be
helpful for cure it. Computer vision can play big role in Portrayal Analysis also it has been examined by many
existing frameworks. In this paper, we present a Computer helped strategy for the recognition of Melanoma Skin
Cancer utilizing Image Processing instruments. The contribution to the framework is the skin lesion picture and
after that by applying novel picture preparing strategies, it investigates it to finish up about the nearness of skin
711. malignancy. The Lesion Image investigation instruments checks for the different Melanoma parameters Like
Asymmetry, Border, Color, Diameter,(ABCD) and so on by surface, size and shape examination for picture 4073-
division and highlight stages. The extricated highlight parameters are utilized to characterize the picture as Normal 4076
skin and Melanoma cancer growth injury.

Keyword : Image processing, machine learning, polarity, Digital Dermoscopy.


References:
1. M Chaithanya, Skin Cancer Detection and Feature Extraction through various Technique”, Featured in International Journal of Research
and Innovation in Computer and Communication Engineering, Issue 3, March 2016.
2. A. Amarathunga, Expert System For treatment of Skin cancer and skin related Diseases”, International Journal Of Scientific an d Research,
Volume 5, Issue 01, 2011.
3. Mariam A , Automatic testing Detection of Skin Cancer, International Journal of Science and Computer Applications, 2012.
4. Nageswara Rao, Sreehari T Sastry and K.B.Mahalakshmi , Co-Occurrence Matrix Statistical Features an Approach for Identification and
machine technique of Phase Transitions Of Mesogens, International Journal of Science and Innovative Research in Engineering and
Technology, Vol. 2, Issue 9, September 2014.
5. Santosh Achakanalli and R Sadashivappa , Statistical Analysis Of Melanoma skin Cancer Image, Case Stu dy , International Journal of
Electrical and Electronics and Communication Engineering (IJEECE), Volume 3, Issue 3, May 2014.
6. jayaraman , Digital image processing by. gray level, median filter.
7. Algorithm For Image Processing And Computer Vision,Page 142-195.(‘Thresholding’)
8. Tasnuba Jesmin, Early Prevention and Detection of Melanoma Skin Cancer Risk using Data analysis”, International Journal of Co mputer
Applications, Volume 62– No.4, January 2014.

Authors: V. Priyanka, N. Kohila

Paper Title: To Distinguishing The Infirmity By Using Palmistry Algorithm In Image Processing
Abstract: The endeavor is made arrangements for structure up the utilization of palmistry to find the human
ailment from their palm. Palm looking for is a sensational issue in the restorative administration's system. In the
proposed methodology, Palm investigating is inspected from the perspectives of model assertion, heuristics, and
learning. Two sorts are cleared in this technique. Tremendous learning is one of the perspectives in AI that has an
unusual condition of accreditation. In standard palmistry has used in the past method of room science. It is the
distortions the future from the palm print of an individual. In this endeavor the palm print utilities for a blemish the
sickness with the help of Artificial Immune System (AIS) to get to the human lead. CLONALG is a count, which is
executed to recognize the blemish area. While separating of palm print we can without a lot of a stretch find the
disfigurement domain. The character perceiving confirmation has been the palm print unmitigated dependent on
Convolutional Neural Networks (CNN) which detects the efficient process of FS and VS.

Keyword : CLONALG, CS – Clonal Selection, Feature Selection, Variable Selection, AIS – Artificial Immune
System, CNN – Convolutional Neural Networks.
References:
1. Application of Digital Image Processing and Analysis in Healthcare Based on Medical Palmistry, Hardik Bhalchandra Pandit, Dipti
Shah, IJCA Special Issue on Intelligent Systems and Data Processing (ICISD), pages 56-59, 2011
2. Digital Image Processing in Medical Palmistry, Maiduguri Sudhir, E.V.Narayana International Journal of Advanced Engineering and
Global Technology I Vol-04, Issue-03, May 2016, ISSN No: 2309-4893
3. Expar: A fuzzy rule-based expert system for palmistry, Prateek Agrawal, Vishu Madaan, S.K. Singh, M. Sharma, I J C T A, 9(11)
2016, pp. 5207-5214 © International Science Press
4. A study of identical twins’ palmprints for personal verification, Adams Wai-KinKong, Guangming Lu, Volume 39, Issue 11,
November 2006, Pages 2149-2156
5. Application of Prediction Software in Palmistry, Author: Aditya K Navpat, Rahul Mukherjee, Vishaka Pandita, and Sumeet Gupta,
IJCA Proceedings on National Conference on Recent Trends in Computing © 2012 by IJCA Journal NCRTC - Number 4 Year of
712.
Publication: 2012
6. Segmentation of human palm for symbol detection and pattern matching, Dr. Hardik B. Pandit and Prof. Dipti Shah, International 4077-
Journal of Advanced Engineering Research and Studies E-ISSN2249–8974, 2014 4080
7. A Study of Automation in Palmistry, Shivali Soni, Dr. Kapil Gupta, International Journal of Advanced Research in Computer Science
and Software Engineering, Volume 5, Issue 5, May 2015 ISSN: 2277 128X
8. Medical Palmistry: An Artistic Analysis and Future beyond Lexical Meaning, K. Ramasamy, A. Srinivasan, Research Journal of
Pharmacy and Technology, Volume No. : 10, Issue No. : 11, Year: 2017
9. Architecture for Medical Image Processing, Rumen Mironov, Roumen Kountchev, Advances in Intelligent Analysis of Medical Data
and Decision Support Systems pp 225-234, Springer-Verlag Berlin Heidelberg 2013
10. Wider Necessity of Digital Image processing in Biomedical with its further scope Pavan Kumar Naik, Arun Kumbi, Vishwanath
Hiregoudar, International Journal for Research Trends and Innovation, Volume 1 Issue 2, November-2016
11. Evaluation of Different Feature Extractors and Classifiers for Offline Handwritten Devnagari Character Recognition, Brijmohan
Singh, Ankush Mittal, Debashish Ghosh, Journal of Pattern Recognition Research, JPRR Vol 6, No 2 (2011); DOI:10.13176/11.302 |
12. A pattern recognizing the study of palm reading, Author: Oda, M., Womack, B. F., & Tsubouchi, K.IEEE Transactions on Systems,
Man, & Cybernetics, SMC-1(2), 171-175, 1971.
13. Study on eye troubles using palm print and image processing technique, Indra Kumar S S, Dr. M S Shashidhara, International journal
of recent trends in engineering and research, 2016
14. Digital Image Processing Techniques in Character Recognition - A Survey, Dr. Marlapalli Krishna, Gunupusala Satyanarayana, V.
Devi Satya Sri, International Journal of Scientific Research in Computer Science, Engineering and Information Technology © 20 17
IJSRCSEIT | Volume 2 | Issue 6 | ISSN: 2456-3307
15. Enhancing Palm Print Recognition System, Author: Priyanka Kamboj, Mr Goutam Gupta,International Journal of Advanced Research
in Electronics and Communication Engineering (IJARECE)Volume 5, Issue 11, November 2016
16. Early-stage disease diagnosis system using human nail image processing, Trupti S Indi watch, and institute of technology Maharashtra,
Yogesh a Gunge College of Engineering Pune Maharashtra. July 2016
17. Predicting the big five personality traits from handwriting, Mihai Gavrilescu and Nicolae Vizireanu, University “Politehnica” of
Bucharest Romania, April 2018
18. Identification of palm print using dermatoglyphics analysis and detection system, Y Qiao, Z Li, Q Wang, Y Zeng, K Liang,
Biomedical Engineering Center, Beijing University of Technology, Beijing 100022, China. April 2005
19. Personality identification of palmprint using convolutional neural networks, Ariyanto, Esmeralda C Djamal, Ridwan
Ilyas, Universitas Jenderal Achmad Yani, Cimahi, Indonesia, IEEE, August 2018
20. Toward more accurate matching of contactless palmprint images under less constrained environments, Ajay Kumar, The Hong
Kong Polytechnic University, Hong Kong, May 2018.

Authors: Sikkisetti Jyothirmayee, V. Dilip Kumar, Ch. Someswara Rao, R.Shiva Shankar

713. Paper Title: Predicting Stock Exchange using Supervised Learning Algorithms
Abstract: The stock market price trend is one of the brightest areas in the field of computer science, 4081-
economics, finance, administration, etc. The stock market forecast is an attempt to determine the future value of the 4090
equity traded on a financial transaction with another financial system. The current work clearly describes the
prediction of a stock using Machine Learning. The adoption of machine learning and artificial intelligence
techniques to predict the prices of the stock is a growing trend. More and more researchers invest their time every
day in coming up with ways to arrive at techniques that can further improve the accuracy of the stock prediction
model. This paper is mainly concerned with the best model to predict the stock market value. During the
mechanism of contemplating the various techniques and variables that can be taken into consideration, we
discovered five models Which are based on supervised learning techniques i.e.., Support Vector Machine (SVM),
Random Forest, K-Nearest Neighbor (KNN), Bernoulli Naïve Bayes.The empirical results show that SVC performs
the best for large datasets and Random Forest, Naïve Bayes is the best for small datasets. The successful prediction
for the stock will be a great asset for the stock market institutions and will provide real-life solutions to the
problems that stock investors face.

Keyword : Stock Market, Machine Learning, Dataset, Data pre-processing, Supervised Learning
Algorithms,Predictions.
References:
1. G. Zhang, B.E. Patuwo, M.Y. Hu*, Forecasting with Artificial Neural Networks: the state of the art, Int. J. Forecasting 14 (1998) 35-62.
2. K. Kim, Financial Time Series Forecasting Using Support Vcctor Machines. Neurocomputing, 55, pp. 307 319, 2003.
3. T.manoj lovic* and I.stajdvhar*, Predicting Stock Market Trends Using Random Forest: A Sample of the Zagreb Stock Exchange, IEEE
International Convention, pp. 1189- 1193, 2015
4. Yuqing Dai, Yuning Zhang, Machine Learning in Stock PriceTrend Forecasting, 2013.
5. KooshaGolmohammadi, Osmar R. Zaiane and David Díaz, Detecting Stock Market Manipulation using Supervised Learning Algorithms,
IEEE International Conference on Data Science and Advanced Analytics, pp. 435-441, 2014.
6. P. Hajek, Forecasting Stock Market Trend using Prototype Generation Classifiers, WSEAS Transactions on Systems, Vol.11, No. 12, pp.
671-80, 2012.
7. V Kranthi Sai Reddy, "Stock Market Prediction using Machine Learning", International Research Journal of Engineering and Tech nology
(IRJET), vol. 08, no. 4, pp. 1033-1035, Oct 2018, ISSN 2395-0056.
8. Saahil Madge, Predicting Stock Price Direction using Support Vector Machines Independent Work Report Spring 2015, Princeton
University
9. K. Hiba sabia, Aditya Sharma, Adarrsh Paul, Sarmistha Pardhi, Saurav Sanyal, "Stock Market Prediction using Machine Learning",
International Research Journal of Engineering and Technology (IREAT), vol. 05, no. 4, pp. 1033-1035, April 2019, ISSN 2249-8958.
10. Shen, Shunrong, Haomiao Jiang, and Tongda Zhang. "Stock market forecasting using machine learning algorithms." (2012)
11. https://www.researchgate.net/publication/313408030_A_Review_on_Prediction_of_Stock_Market_using_Various_Methods_in_the_Field
_of_Data_Mining.
12. J. Patel, S. Shah, P. Thakkar, and K. Kotecha, Predicting stock and stock price index movement using Trend Deterministic Data
Preparation and machine learning techniques, Expert Systems with Applications, Volume 42, Issue 1, Pages 259 -268, ISSN 0957- 4174,
2015.
13. N. Masoud, Predicting direction of stock prices index movement using artificial neural networks: the case of Libyan financial market,
British Journal of Economics, Management & Trade, 4(4): 597-619, 2014.
14. Y. Zuo, E. Kita, Up/Down Analysis of Stock Index by Using Bayesian Network, Engineering Management Research, Issue 2, Vol.1, 2012,
pp.46–52.
15. D. Diaz, B. Theodoulidis, and P. Sampaio, “Analysis of stock market manipulations using knowledge discovery techniques applied
intraday trade prices,” Expert Syst. Appl., vol. 38, no. 10, pp. 12757–12771, Sep. 2011.
16. K. Golmohammadi and O. R. Zaiane, “Data Mining Applications for Fraud Detection in Securities Market,” in 2012 European Intelligence
and Security Informatics Conference, 2012, pp. 107–114.
17. F. Neri, Agent based Modeling under Partial and Full Knowledge Learning Settings to Simulate Financial Markets, AI Communications,
Issue 4, Vol.25, 2012,pp.295-304.
18. P. Hajek, Municipal Credit Rating Modelling by Neural Networks, Decision Support Systems,Issue 1, Vol. 51, 2011, pp.108 –118.
19. P. Hajek, V. Olej, Credit Rating Modelling by Kernel-based Approaches with Supervised and Semi-Supervised Learning, Neural
Computing & Applications, Issue 6, Vol.20, 2011, pp.761–773.
20. F.E.H. Tay, L. Cao, Application of support vector machines in -nancial time series forecasting, Omega 29 (2001) 309–317.

Authors: B. Raja Koti, G.V.S. Raj Kumar, K. Naveen Kumar


Identification of Information Leakage and Guilt Agent by using MAC-IP Binding and Recursive
Paper Title:
Partitioning Algorithm to Modulate the Uncertainty in the Organization’s Network
Abstract: In this modern era, all organizations depend on internet and data so, maintaining of all data is done
by the third party in large organizations. But in this present on-developing world, one have to share the data inside
or outside the organization which incorporates the sensitive data of the venture moreover. Data of the organization
have sensitive data which should not share with any others but unfortunately, that data was there in the third party
hands so; we need to protect the data and also have to identify the guilt agent. For this, we propose a model that
would evaluate and correctly identifies guilt agents, for which a recursive partitioning has been created which is a
decision tree that spills data in to the sub partitions and does the easiest way to get alert and at least one specialist or
714. it can autonomously accumulate by some different means. The main intention of the model is to secure sensitive
information by recognizing the leakage and distinguish the guilt agent. 4091-
4096
Keyword : Information protection, Sensitive Data, Recursive partitioning, Data-Leak Detection, Guilt Agent.
References:
1. Xiaokui Shu and Danfeng (Daphne) Yao, “Data Leak Detection as a Service”, Department of Computer Science Virginia Tech Blacks burg
VA, USA.
2. B. Raja Koti, Dr. G.V.S. Raj Kumar, Dr. Y. Srinivas, "A Com- prehensive Study and Comparison of Various Methods on Data Leakages",
International Journal of Advanced Research in Com- puter Science, Volume 8, No.7, July – August 2017, pp-627-631.
3. "Management of Data Breaches Involving Sensitive Personal Information (SPI)". Va.gov. Washington, DC: Department OF Veterans
Affairs. 6 January 2012. Archived from the original on 26 May 2015. Retrieved 25 May 2015.
4. Balachander Krishnamurthy, Craig E. Wills, “On the Leakage of Personally Identifiable Information Via Online Social Networks”,
WOSN’09, August 17, 2009, Barcelona, Spain. 2009 ACM 978-1-60558-445-4/09/08.
5. P. Papadimitriouand H. Garcia-Molina, “Data leakage detection”, Technical report, Stanford University, 2008.
6. B Raja Koti, GVS Raj Kumar, Y Srinivas, “Identification of Guilt Agent and Leaked Data by Using MAC-IP”, International Journal of
Applied Engineering Research, 2017, Volume 12, Issue 22, pp 12237-12245.
7. B Raja Koti, G V S Raj Kumar, “Information leakage detection and protection of leaked information by using the MAC-IP binding
technique”,International Journal of Engineering &Technology, Volume 7, Issue 1.7, 2018, pp230-235.
8. Torsten Hothorn Kurt Hornik Achim Zeileis “Unbiased Recursive Partitioning: A Conditional Inference Framework” Department of
Statistics and Mathematics Wirtschafts universität Wien, Research Report Series, Report 8, July 2004, http://statistik.wu-wien.ac.at/
9. Achim Zeileis, Torsten Hothorn, Kurt Hornik “Model-based Recursive Partitioning”, Journal of Computational and Graphical Statistics,
Volume 17(2), 492–514.
10. B. Raja Koti, Dr. G V S Raj Kumar, Dr.Y. Srinivas, Dr. K. Naveen Kumar, “A Methodology for Identification of the Guilt Agent based on
IP Binding with MAC using Bivariate Gaussian Model”, Journal International Journal of Advanced Computer Science and
Applications(IJACSA), Volume 9, Issue 11, November 2018, pp. 293-299.
11. https://www.nuix.com/edrm-enron-data-set/edrm-enron-data-set.

Authors: Prasanth Venkatareddy, Subhash Kulkarni


PID gain tuning for Robust Control of PMDC Motor with tracking and disturbance rejection through
Paper Title:
H∞
Abstract: Permanent-magnet (PM) motors are employed in numerous industrial control applications for their
high efficiency, simple mechanism and low cost. In most of the applications, either the plant model is inaccurately
defined or the plant parameters are prone to variations over period of time. Also, in most of the applications, have a
requirement of good tracking as well as good disturbance rejection, two competing requirements. The controller
should cater to the parameter variations as well as provide robust performance against external disturbances and
hence requires a robust control approach towards designing a controller. A classical PID controller, which lacks
robustness requirements is augmented by H∞ optimization based gain tuning to meet the robustness requirements.
This paper discusses a PID controller design using H∞ optimization approach. Different performance goals for
tracking and disturbance rejection are defined and PID gains are tuned to meet the goals in H∞ sense. A
commercial Maxon RE35 motor is selected for modeling and simulation.

Keyword : PMDC, motor parameter variation, tunable PID, H∞ norm, tracking, disturbance rejection
References:
1. Soni, Ritu. Singh D.B.V. Pandey, Pramod. & Sharma, Priyanka, “Simulation of optimal speed control for a DC motor using conventional
PID controller and Fuzzy logic controller”, International Journal of information and computation Technology, 2013; Vol. 3, No . 3 , pp
181-188.
715. 2. Ilyas Eker, “Sliding mode control with PID sliding surface and experimental application to an electromechanical plant,” ISA transactions,
2006; Vol. 45, no. 1, pp. 109-118. A. Sabanovic, “Variable structure systems with sliding modes in motion control- A survey,” IEEE
Transactions on Industrial Informatics, 2011; Vol. 7, no. 2, pp. 212-223.
4097-
3. A. Sabanovic, “Variable structure systems with sliding modes in motion control- A survey,” IEEE Transactions on Industrial Informatics, 4102
vol. 7, no. 2, pp. 212-223, 2011.
4. K. D. Young, V. I. Utkin, and U. Ozguner, “A control engineers guide to sliding mode control,” IEEE Transactions on Control Systems
Technology, vol. 7, pp. 328-342, May 1999.
5. M. L. Corradini, G. Ippoliti, S. Longhi, and G. Orlando, “A quasisliding mode approach for robust control and speed estimatio n of PM
synchronous motors,” IEEE Transactions on Industrial Electronics, vol. 59, pp. 1096-1104, Feb 2012.
6. J. B. Cao and B. G. Cao, “Fuzzy-logic-based sliding-mode controller design for position-sensorless electric vehicle,” IEEE Transactions
on Power Electronics, vol. 24, pp. 2368-2378, Oct 2009.
7. Yadav, S. Misra, V. Omar, S. Dixit, V. Chaubey, P (2014) “Speed control of DC motor using optimal PID Tuning method”, National
student conference on Advances in Electrical & Information Communication Technology, pp 94-98.
8. He, Jian-Bo., Wang, Qing-Guo., Lee, Tong-Heng.: (2000) “PI/PID controller tuning via LQR approach”, Chemical Engineering Science,
Vol. 55, No. 13, pp 2429-2439.
9. Nasri, M. Nezamabadi-pour, H. &Maghfoori, M (2007) “A PSO based optimum design of PID controller for a linear brushless DC motor”,
International Journal of Electrical, Robotics, Electronics and Communications Engineering, Vol. 1, No. 2, pp 171-175.
10. Pinto, A. Elvis, H. Domingues, I. Rocha, L. & Cruz, S (2010-2011) “The Particle swarm optimization algorithm”
11. R. Bautista-Quintero and M. J. Pont, “Implementation of H-infinity control algorithms for sensor-constrained mechatronic systems using
lowcost micro controllers,” IEEE Transactions on Industrial Informatics, vol. 4, pp. 175-184, Aug 2008.
12. F. F. M. El-Sousy, “Hybrid H∞-based wavelet-neural-network tracking control for permanent-magnet synchronous motor servo drives,”
IEEE Transactions on Industrial Electronics, vol. 57, pp. 3157-3166, Sept 2010
13. Brezina Lukas, Brezina Tomas, “H-infinity controller design for a DC motor model with Uncertain Parameters”, Engineering Mechanics,
Vol 18 No 5/6, pp 271-279 2011
14. Prem Kumar M, Raghu Ram JV, “Design and Simulation of ARTD Controller for Chemical Process Industry PMDC Motor”4th
International Conference on Electrical Energy Systems (ICEES)

Authors: Nayla Sherwani, Shahjahan Ali

Paper Title: Performance Parameter of AODV and DSR Potocol by Varying Nodes Mobility
Abstract: MANET is a cluster of nodes that are mobile which transfer the packet within a limited transmission
range. It is decentralized and infrastructure less wireless network. Due to host mobility requirement for a robust
dynamic routing protocol is needed, since a random and dynamic difference in the network topology is there. This
716. paper presents a performance analysis between two routing protocols AODV and DSR. In terms of throughput,
PDR and delay both protocols AODV and DSR is compared. 4103-
4105
Keyword : AODV, DSR, Mobile Ad-hoc Network, NS-2.
References:
1. V. Rajeshkumar, P. Siva Kumar, “Comparative Study of AODV, DSDV, DSR Routing Protocols in MANET Using Network Simulator -
2”, International Journal of Advanced Research in Computer and Communication Engineering, December 2013.
2. J. Hoebeke, I. Moerman, B. Dhoedt, P. Demeester, “An Overview of Mobile Ad Hoc Networks: Applications and Challenges” Journal of
the communication networks, July 2004.
3. F. Tseng, L. D. Chou and H. Chao, “A Survey of Black Hole Attacks in Wireless Mobile Ad hoc Networks”, Human-Centric Computing
and Information Sciences, 2011.
4. E. Royer, S. Barbara, C. Toh, “A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks”, IEEE Personal
Communication , April 1999.
5. C. Perkins, E.B. Royer, S. Das, “Ad hoc On-Demand Distance Vector(AODV) Routing, Internet Draft,” RFC 3561, IETF Network
Working Group, July 2003.
6. N. S. Yadav, R. P. Yadav, ”Performance Comparison and Analysis of Table-Driven and On-Demand Routing Protocols for Mobile Ad-
Hoc Networks”, International Journal of Information and Communication Engineering, 2008.
7. A. Boukerche, ”Performance Evaluation of Routing Protocols for Ad Hoc Networks”, Mobile Networks and Applications, Kluwer
Academic Publishers, 2004.
8. D. B. Johnson, D. A. Maltz, and Y. Hu, “The dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR)”, Internet-draft, 19
July 2004.
9. D. B. Johnson, D. A. Maltz, and J. Broch, “DSR: The dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks”, IETF
Draft, April 2003, work in progress, <online available> http://www.ietf.org/internet-draft/draft-ietf-manet-dsr-09.txt.
10. Y. Pan, “Design Routing Protocol Performance Comparison in NS2: AODV Comparing to DSR as an example”, Deptt. Of CS, SUNY
Binghamton, Vestal NY 13850.
11. Z. B. A. Hani, D. B. Baba, “Designing Routing protocols for Mobile Ad hoc networks”, IEEE 2003.

Authors: Bidula Bose

Paper Title: Compaction Behaviour and Grain Size Alteration of Sand -Clay Mix
Abstract: Sand-bentonite mix is commonly used as liner material or backfill material in landfill sites.
Bentonite belonging to group of montmorillionite clay provides higher density and less void ratio to lessen
permeability of liner layer mixed with sand. This mix is inevitable and economical where soil nearby landfill site
have sandy soil .Many literatures provided geotechnical aspects of using this mix.In this present study, the grain
size distribution analysis and compaction of sand–bentonite mixture for 10%,20% and 30% bentonite mix is studied
to propose economic and less permeable liner material with lower shrinkage. Locally available sand from different
river , Odisha (India) was mixed with different proportions of commercial sodium bentonite. The following
research output presented here elaborately show the effect of clay particle on compaction, Relative Density,
Coefficient of uniformity,Coefficient of curvature, permeability by gradually adding commercial Sodium Bentonite
10% by weight upto 30%. The result show that there is a significant improvement in MDD and OMC of Sand-
Bentonite mix along with decrease in void ratio. The grain size alteration eventually helped to increase the dry
density and reduced void ratio will enhance the scope of this mix to be used as liner layer in landfill system.

717. Keyword : Bentonite, Compaction, index properties, Relative density, Sand


References: 4106-
1. Blotz, L. R, Benson ,C. H & Boutwell, G. P .(1998)“Estimating optimum water content & max dry unit weight for compacted clays ”. 4110
Journal of Geotechnical & Geo environmental Engineering) september1998/907
2. Chapuis, R. P , Mbonimpa .M , Aubertin .M & Dagenais , A. M(2006) “ A Convenient Graphical Representation of Compaction Da ta”
Geotechnical Testing Journal, Vol. 29, No. 3,Paper ID- GTJ12695
3. Gurtug .Y & Shridharan .A .(2004) “ Compaction behavior and prediction of its characteristics of fine grains soil with particular reference
to its compaction energy” Japanese Geotechnical society ,Vol.44,No-5,27-36
4. Holtz, R.D., and Kovac, W.D. 1981. An Introduction toGeotechnical Engineering, Prentice Hall, NewJersey.
5. Lawton, E.C, Fragaszy , R. J & Hardcastle, J. H. (1989) . “Collapse of compacted clayey sand.” Journal of Geotechnical Engine ering,
ASCE, Vol. 115, No. 9
6. Masih, R. (2000). “Formula to get desired soil density”, Journal of Geotechnical and Geoenvironmental Engineering, ASCE, Vol. 126,
No. 12, pp. 1145-1150.
7. Morales ,E.M & Morales,M.K(2004). “ Expansive soil-Identification, Detection & Remedial statistics” www.pgatech.com.ph
8. Osinubi , K. J.(2006).“ Compaction Delay Effects on Properties of Lime-Treated Soil” and Charles-Journal of materials in civil
engineering © ASCE / MARCH/APRIL 2006 / 251
9. Pandian,N.S,Nagaraj,T.SandNarasimhaRaju,P.S.R.1995.Permeabilityand Compressibity behaviour of bentonite-Sand/soil
mixes.Geotechnical Testing Journal,18-86-93
10. Sivrikaya. O, Togrol. E& Kayadelen.(2008) .“ Estimating compaction behavior of fine-grained soil based on compaction energy ”
Canadian geotechnical Journal “.J.vol-45
11. Sridharan, A., and Nagraj,H.B.2005.Plastic limit and compaction characteristics of fine grained soils. Ground Improvement,9(1) :17-
22.doi:10.1680/grim.9.1.17.58544.

Authors: A. Sathish Kumar, M. Saravanan, N. Joshna, G. Seshadri

Paper Title: Contingency Analysis of Fault and Minimization of Power System Outage Using Fuzzy Controller
Abstract: In power systems, voltage stability perform the major role in design and its operation. Major system
failures are occur due to voltage variability and breakdown. To meet and compensate the rising power demand of
regular usage in modern trends, transmission networks are enormously loaded which create the voltage instability.
Contingency analysis is a recognized energy managing tool. It calculate the violation in the transmission line. In
718. this paper a computational controller fuzzy system is suggested to handle the transmission line outage and overload
in other branch kind of problems in Power system. The efficiency of power transmission system with fuzzy 4111-
controller is inveterate by computation of various parameters of transmission bus under different loading situations. 4115
For the contingency analysis the transmission power flow several methods have been developed. Fast Decoupled
load flow program is the effective method which provides a fast and effective solution to the contingency analysis
in the transmission system and also it is incorporate with matrix alteration formula which gives additional
advantage for the system.
Keyword : Fuzzy Logic, Voltage stability, Contingency Analysis, non-linear system.
References:
1. Qiming chen, and James , “Identifying high risk N-K contingency for online security assessment” IEEE,Transaction on power system,
Vol.20(2), May 2005,pp.823
2. V. J. Mishra and M. D. Khardenvis, "Contingency analysis of power system," 2012 IEEE Students' Conference on Electrical, Electronics
and Computer Science, Bhopal, 2012, pp. 1-4.
3. Ashutash Tiwari and V.Ajjarapu, “Contingency assessment for voltage dip and short term voltage stability analysis”, Bulk powe r system
dynamics and control, Charleston, USA, August 2007.
4. M.O.Ogbuatu and K.Ekiokekeme, “Minimization of Power System Outage Using Fuzzy Logic Control Mechanism”, International Journa l
of Latest Technology in Engineering, Management & Applied Science, Vol.7 (8), August 2018, pp. 136-148.
5. K. L. Lo and A. K. I. Abdelaal, "Fuzzy logic based contingency analysis," DRPT2000. International Conference on Electric Utility
Deregulation and Restructuring and Power Technologies. Proceedings (Cat. No.00EX382), London, UK, 2000, pp. 499-504
6. A.Sathish Kumar, “Control of Robot Manipulator Error using FPDI – IQGA in Neural Network”, International Journal of Computational
and Theoretical Nanoscience, Vol.13 (3), March 2016, pp. 1740-1748(9).
7. A.Sathish Kumar, “GRNN based inertia parameters identification of robot dynamics”, International Journal of Advances in Natural and
Applied Sciences,Vol.10 (16), November 2016, pp.115-119.

Authors: P. Shailaja, C.V. Guru Rao, A.Nagaraju

Paper Title: A Parametric Oriented Research on Routing Algorithms in Mobile Adhoc Networks
Abstract: Due to the infrastructure-less and no central administration architecture, Mobile Adhoc Networks
(MANETs) gained significant interest in various wireless information transfer related applications. However, the
selection of an optimal path to transmit the data is a more critical issue in MANETs because the nodes are resource-
constrained and also have mobility. To provide an optimal solution to this constraint, various methods are proposed
in earlier. Initially, some basic routing protocols are developed and further by modifying the base protocols so
many strategies are developed. The proposed Research paper outlines a detailed survey about the earlier developed
such strategies and also done a fined classification based on the methodology they followed. Broadly the
comprehensive routing approaches are classified into two classes, namely single metric-based approaches and
multiple metrics-based approaches. The further classification is done based on the routing protocol used at the base.
Due to the widespread utilization of meta-heuristic algorithms, some authors used those techniques also in the
discovery of an optimal path and some approaches are outlined in this paper. Moreover, at every phase, a fine and
detailed comparison is shown through various constraints.

Keyword : Mobile Adhoc Networks, Proactive, Reactive, Single metric, multiple metrics, Energy, Mobility,
Delay.
References:
1. M Bansal, R Rajput, & G Gupta,1999, “Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation
considerations” .
2. I Chlamtac, M Conti,and, Liu, J, 2003, “Mobile ad hoc networking: Imperatives and challenges”. Ad Hoc Networks, 1(1), 13 –64.
3. K Gorantala 2006, “Routing protocols in mobile Adhoc Networks”.
4. M Conti, & S Giordano, 2007, “Multihop Adhoc networking: The theory”pp, 78–86.
5. L Cao, T Dahlberg,& Y Wang,2007 “Performance evaluation of energy-efficient ad hoc routing protocols”. In IEEE International on
719. Performance, Computing, and Communications Conference, 2007. IPCCC 2007 (pp. 306–313).
6. N Vassileva, F Barcelo-Arroyo, 2008, “A survey of routing protocols for maximizing the lifetime of ad hoc wireless networks”pp, 77–90.
7. Thomas Kunz ,2008, “Accurately Predicting Residual Energy Levels in MANETs”. IEEE International Conference on Wireless and 4116-
Mobile Computing, Networking, and Communications, Avignon, France. 4126
8. Martin Appiah ,2017, “Performance comparison of mobility models in Mobile Ad Hoc Network (MANET)”.
9. Bhavyesh Divecha, Ajith Abraham, Crina Grosan, Sugata Sanyal, 2007, “Impact of Node Mobility on MANET Routing Protocols
Models”, Journal of Digital Information Management. 5(1).
10. Wen Chen Ching- and Chi Weng Chuan, 2009, “Bandwidth based routing protocols in mobile Adhoc networks”. The journal of
supercomputing. 50:240.
11. Parkash, A Surjeet, and R Tripathi,2013, “QoS Bandwidth Estimation Scheme for Delay Sensitive Applications in MANETs”. Journa l of
Communications and Network, 5, 1-8.
12. C.E. Perkins and P. Bhagwat, 1994, “Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers”,
Comp. Comm. Rev., pp.234-244.
13. Park VD and MS Corson ,1997, “A highly adaptive distributed routing algorithm for mobile wireless networks", Proc. INFOCOM'97 , 9
pages.
14. B David. Johnson, A Davis. Maltz, 1999, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks" October 1999 IETF
Draft, 49 pages.
15. E Charles. Perkins, M Elizabeth. Royer, R Samir, 1999, “Ad Hoc On-demand Distance Vector Routing, October 99 IETF Draft, 33 pages.
16. Murthy S. and Garcia J,Luna-Aceves, 1996, “An Efficient Routing Protocol for Wireless Networks", pp. 183-97.
17. M Joa-Ng and I.-T. Lu,1999, “A Peer-to-Peer zone-based two-level link-state routing for mobile Ad Hoc Networks”, pp.1415-25.
18. Chiang C. C, 1997, “Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel”. Proc. IEEE SICON'97, pp.197 -
211.
19. Bellur B, and Ogier R.G, 1999, “A Reliable, Efficient Topology Broadcast Protocol for Dynamic Networks," Proc. IEEE INFOCOMM
’99, pp. 178–186.
20. Jacquet P, Muhlethaler P, 2001,” Optimized link-state routing protocol for ad hoc networks”. In Proceedings of IEEE International Multi-
Topic Conference, IEEE INMIC 2001.
21. Ali Moussaoui, Semchedine Fouzi, 2014, “A link-state QoS routing protocol based on link stability for Mobile Ad hoc Networks”,pp.117–
125.
22. Billington J. and C Yuan, “On modeling and analyzing the dynamic MANET on-demand (DYMO) routing protocol, 2009, pp. 98–126.
23. Z Haas, J, Pearlman, M. R., and Samar, P., (2002). “The Zone Routing Protocol (ZRP) for Ad Hoc Networks”. IETF internet-draft.
24. Maciej Wojciechowski, 2008, “Border Gateway Protocol Modeling and Simulation”.
25. Lammle, 2007, “CCNA Cisco Certified Network Associate Study Guide (Sixth ed”, Indianapolis, Indiana: Wiley Publishing, ISBN 978-0-
470-11008-9.
26. N Ghanem, S Boumerdassi, & E Renault, 2005, “New energy-saving mechanisms for mobile ad-hoc networks using OLSR”. pp. 273–274.
27. Rango De, Fotino F, M, & S Marano, 2008, “EE-OLSR: Energy efficient OLSR routing protocol for mobile ad-hoc networks”. In IEEE
(pp. 1–7).
28. L Fatima, & E Najib, 2012, “Energy and mobility in the OLSR routing protocol”, Journal of Selected Areas in Telecommunication s
(JSAT), 2012(3), 1–6.
29. T Kunz, & R Alhalimi, 2010, “Energy-efficient proactive routing in MANET: Energy metrics accuracy. Ad Hoc Networks”, 8(7), pp.755–
766.
30. A Benslimane, Khoury El, R, Azouzi El, R, & S Pierre, 2006, “Energy power-aware routing in OLSR protocol”,MCWC 2006 (pp. 14–19).
IEEE.
31. S Mahfoudh , & P Minet, 2008, “An energy efficient routing based on OLSR in wireless ad hoc and sensor networks”,AINAW 2008 (pp.
1253–1259). IEEE.
32. T Kunz,2008, “Energy-efficient variations of OLSR. In Wireless Communications and Mobile Computing Conference”, IWCMC’08
International (pp. 517–522). IEEE.
33. P Ren, J Feng, P Hu, & J Cai, 2009, “Energy saving ad-hoc on-demand distance vector routing for mobile ad-hoc networks”. In IEEE
International Conference on Communications, 2009. ICC’09 (pp. 1–5). IEEE.
34. M Tarique, & K. E Tepe, 2009,” Minimum energy hierarchical dynamic source routing for mobile ad hoc networks” , 7(6),pp.1125–1135.
35. M Tarique, & K. E Tepe, 2007, “A new hierarchical approach to reactive routing protocols for wireless ad hoc networks with cr oss-layer
design”, 2(1), pp. 12–20.
36. H Safa, M Karam, & B Moussa, 2014, “PHAODV: Power aware heterogeneous routing protocol for MANETs”,pp. 60–71.
37. Tie, T. H., Tan, C. E., & Lau, S. P. (2010). “Alternate link maximum energy level ad hoc distance vector scheme for energy ef ficient ad
hoc networks routing”. In 2010 International Conference on Computer and Communication Engineering (ICCCE) (pp. 1–6). IEEE.
38. Lalitha, V., & Rajesh, R. S. (2014). “AODV_RR: A maximum transmission range based ad hoc on-demand distance vector routing in
MANET”. Wireless Personal Communications, 78(1), 491–506.
39. Waheb A. Jabbar, Mahamod Ismail, and Rosdiadee Nordin. (2014). “Performance Evaluation of the MBA-OLSR Routing Protocol for
MANETs”. Journal of Computer Networks and Communications Volume 2014, Article ID 951638, 10 pages.
40. T. Clausen, C. Dearlove, and P. Jacquet, “The optimized link-state routing protocol version 2,” draft-IETF-manet-olsrv2-00, Work in
progress, 2006.
41. M. A. Adhoc Networking and U. Herberg, “Integrity Check Value and Timestamp TLV Definitions for Mobile Ad Hoc Networks
(MANETs) draft-ietf-manet-rfc6622-bis-03,” 2013.
42. Mohamed A. Ryan, Sayed Nouh, Tarek M. Salem, Abdelhady M. Naguib. (2018). “EDA-AODV: Energy and Distance Aware AODV
Routing Protocol”. Volume 5, Issue 5, September – October (2018).
43. Rahman Mahfuzur Bosunia,1 Daniel P, and Seong-Ho Jeong, ,2015, “A New Routing Protocol with High Energy Efficiency and
Reliability for Data Delivery in Mobile Ad Hoc Networks”, 8 pages.
44. Debika Bhattacharyya, Avimita Chatterjee, Baisakhi Chatterjee, Arnab Kumar Saha, Arnab Santra. (2018). “A novel approach to energy-
efficient low-cost routing in MANET by a reduction in packet size”. IEEE 8th Annual Computing and Communication Workshop and
Conference (CCWC), Las Vegas, NV, USA.
45. S. Devi, and N. P Hegde, (2016). “Reliable and Power Efficient Routing Protocol for MANETs”. I. J. Computer Network and
Information Security, 2016, 10, 61-69.
46. Joshi, R. D., & Rege, P. P. (2012). “Implementation and analytical modeling of modified optimized link-state routing protocol for network
lifetime improvement”. IET Communications, 6(10), 1270–1277
47. Guo, Z., Malakooti, S., Sheikh, S., Al-Najjar, C., Lehman, M., & Malakooti, B. (2011). “Energy-aware proactive optimized link-state
routing in mobile ad-hoc networks”. Applied Mathematical Modelling, 35(10), 4715–4729.
48. Kots, A., & Kumar, M, 2014, “The fuzzy-based QMPR selection for OLSR routing protocol”. Wireless Networks, 20(1), 1–10.
49. Anuradha, M., & Anandha Mala, G. S. 2014. “Multi-objective cross-layer based multipath routing protocol in MANET”, 68(3), page no.
531–540.
50. Yi, J., Cizeron, E., Hamma, S., & Parrein, B. (2008). “Simulation and performance analysis of MP-OLSR for mobile ad hoc networks”, pp.
2235–2240.
51. S Sarkar, R Datta, “Mobility-aware route selection technique for mobile ad hoc networks”. IET Wirel. Sens. Syst. 2017, 7, 55–64.
52. Ladas, A.; Deepak, G.C.; Pavlatos, N.; Politis, C. “A selective multipath routing protocol for ubiquitous networks”. Ad Hoc N etw. 2018,
77, 95–107.
53. Derrick, B; White, P (2017). "Comparing Two Samples from an Individual Likert Question". International Journal of Mathematics and
Statistics. 18 (3): 1–13.
54. Li, Z.; Wu, Y. “Smooth mobility and link reliability-based optimized link state routing scheme for MANETS”. IEEE Commun. Lett. 2017,
21, 1529–1532.
55. De Rango, F.; Guerriero, F.; Fazio, P. “Link-stability and energy-aware routing protocol in distributed wireless networks”. IEEE Trans.
Parallel Distrib. Syst. 2012, 23, 713–726.
56. Ehrgott, Matthias, Xavier Gandibleux. 2006. “Bound sets for bi-objective combinatorial optimization problems”. Computers & Operations
Research, 34 2674–2694
57. Kadri, B., Feham, M., & M’ Hamed, A. (2008), “Weight-based DSR for mobile ad hoc networks”. In IEEE (pp. 1–6).
58. Li, L., Li, C., & Yuan, P. (2015),” An energy level-based routing protocol in ad hoc networks”. Wireless Personal Communications, 81(3),
981–996.
59. Bhatt, U. R., Nema, N., & Upadhyay, R. (2014). “Enhanced DSR: An efficient routing protocol for MANET”. pp.215 –219.
60. G Varaprasad, & Narayanagowda, S. H, 2013, “Implementing a new power-aware routing algorithm based on an existing dynamic source
routing protocol for mobile ad hoc networks”, pp.137–142.
61. S Shankar, G Varaprasad, & H. N Suresh,2014, “Importance of on-demand modified power-aware dynamic source routing protocol in
mobile ad-hoc networks”. IET on Microwaves, Antennas & Propagation, 8(7), 459–464.
62. K., Misra, Dhurandher, S, S M Obaidat, S, Bansal, & Punia, V. 2009, “EEAODR: An energy-efficient ad hoc on-demand routing protocol
for mobile ad hoc networks”. International Journal of Communication Systems, 22(7), 789–817.
63. Katiravan, J., Sylvia, D., & Rao, D. S. (2015). Energy-efficient link aware routing with power control in wireless ad hoc networks. The
Scientific World Journal.
64. Yanez-Marquez, C., I Lopez-Yanez, O Camacho-Nieto, 2013, “BDD-based algorithm for the minimum spanning tree in wireless ad-hoc
network routing”, pp.600–601.
65. B Bollig, 2012, “On symbolic OBDD-based algorithms for the minimum spanning tree problem”. Theoretical Computer Science, 447, pp.
2–12.
66. Gomez, J., Campbell, A. T., Naghshineh, M., & Bisdikian, C. (2003). “PARO: Supporting dynamic power-controlled routing in wireless
ad hoc networks”. Wireless Networks, 9(5), 443–460.
67. Y. P. Aneja, A. Bari, A. Jaekel. (2009). “Minimum Energy Strong Bidirectional Topology for Ad Hoc Wireless Sensor Networks”. IEEE
ICC 2009.
68. Rishiwal, V., Yadav, M., Bajapai, S., & Verma, S. (2009), “Power-aware routing in ad hoc wireless networks”. Journal of Computer
Science and Technology, 9(2), 101–109.
69. Balachandra, M., Prema, K., & Makkithaya, K. (2014), “Multi-constrained and multipath QoS aware routing protocol for MANETs”.
Wireless Networks, 20(8), 2395–2408.
70. Chettibi, S., & Benmohamed, M. (2009), “Multipath energy-aware on-demand source routing protocol for mobile ad-hoc networks”.
71. Guodong, W., Gang, W., & Jun, Z. (2010), “ELGR: An energy efficiency and load-balanced geographic routing algorithm for lossy mobile
ad hoc networks”, pp.334–340.
72. Sheng Yen Yun, Chan Yi-Kung, Han Chieh Chao, Jong Hyuk Park, (2008) “A genetic algorithm for energy-efficient based multicast
routing on MANETs”. Computer Communications 31 (2008) 2632–2641.
73. SusanAugustine, lM.Kaliappan, Paramasivan B, 2016, “Enhancing energy efficiency and load balancing in mobile ad hoc networks using
dynamic genetic algorithms”, Volume 73, September 2016, Pages 35-43.
74. ShahramJamali, LeilaRezaei, Sajjad JahanbakhshGudakahriz, (2013). An Energy-efficient Routing Protocol for MANETs: a Particle
Swarm Optimization Approach. journal of applied research and technology. Volume 11, Issue 6, December 2013, Pages 803-812.
75. DipikaSarkar, AbhishekMajumder, SwagataChoudhury, 2018, “Enhanced-Ant-AODV for optimal route selection in a mobile ad-hoc
network”,2018.
76. Zhou, J., Tan, H, 2016, “Ant colony-based energy control routing protocol for mobile ad hoc networks under different node mobility
models”. EURASIP J. Wirel. Commun. Networking, 2016:105.
77. A.Nagaraju, S.Ramachandram, (2014). "Mathematical Models to Reduce Redundant Broadcasting in MANETs," International Journal o f
Wireless and Mobile Communication (IJWMC)
78. A.Nagaraju, S Ramachandram, “A Strategy to Reduce the Control Packet Load of AODV Using Weighted Rough Set Model For
MANET,” International Journal of Arab Information Technology (IAJIT), Vol.8, No.1
79. A.Nagaraju, S Ramachandram, “A Strategy to Reduce the Control Packet Load of AODV Using Weighted Rough Set Model For
MANET,” International Journal of Arab Information Technology (IAJIT), Vol.8, No.1.
80. A.Nagaraju, S.Ramachandram,(2009) “Rough Set based Ad-hoc On-demand Distance vector Routing algorithm for MANET’s,”
Proceedings of International Conference On Compute-2009 ACM Banglore Chapter, Paper is available in ACM Portal.

Authors: B.sridhar, S.Sridhar, V.Nanchariah


MR Image Analysis of Neonatal Brain using Adaptive Mathematical Morphological Processing and
Paper Title:
Region based Segmentation
Abstract: In the study of evaluation of infant brain development, the segmentation of obtained MR images is
an important step. When compared with the MR images of adult brain it is difficult to identify the different regions
in infant brains with that of the methods used for the analysis of adult brains. This is due to the size difference of
the brain and the differences in the properties of the brain tissues. So, for analyzing these MR images it requires
manual interaction with the images resulting in the bias of the results. For this problem we propose another
approach for the segmentation of neonatal brain MR images. This method doesn’t require any manual interaction
and produces unbiased results. Our algorithm segments the different layers (right hemisphere, left hemisphere,
cerebellum, brain stem) and the different tissues like sub cortical gray matter, Militated & un mylinated gray matter
and cerebrospinal fluid, resulting in the better understanding of the development of different parts of the brain. Our
algorithm can be used for the analysis of MR images of infant brains of age as less as 3to6 months.

720. Keyword : Neonatal brain, Magnetic Resonance Imaging, Mathematical morphology, Watershed macro
controlled segmentation.
4127-
References: 4132
1. Mangin, J.F., 2000.Entropy minimization for automatic correction of intensity nonuniformity. In: IEEE Workshop MMBIA. Hilton Head
Island, South Carolina, pp. 162-169.
2. Kuklisova-Murgasova, M.,Aljabar, P.,srinivasan, L., Councsell, S.J., Doria,V.,Serag, A., Gousias, I.s., Boardman, J.p., Rutherford, M.a .,
Edwards, A.d., Hajnal, J.v., Rueckert,D., 2011.A dynamic 4D probabilistic atlas of the developing brain.Neuroimage 54 (40), 2750-2763.
3. Beucher, s., Meyer, F., 1993. The morphological approach to segmentation: the watershed transformation. In: Dougherty, E.R. (Ed.),
Mathematical Morphology in image processing. CRC Press, New York, pp. 433-481.
4. Lotufo, R., Falcao, A., 2000. The ordered queue and the optimality of the watershed approaches. In: Goutsias, J., Vincent, L. M.,
Bloomberg, D. (eds.), Mathematical Morphology and its Application to Image and Signal processing. Kluwer Academic Publishers.
5. Laura Gui a, Radoslaw Lisowski a,b, Tamara Faundez a, Petra S. Hüppi a, François Lazeyras b,Michel Kocher c. Morphology -driven
automatic segmentation of MR images of the neonatal brain. ELSEVIER publishers. In: Medical Image Analysis 16 (2012) 1565–1579,
6. Beare, Richard J et al. “Neonatal Brain Tissue Classification with Morphological Adaptation and Unified Segmentation.” Frontiers in
neuroinformatics vol. 10 12. 29 Mar. 2016, doi:10.3389/fninf.2016.00012
7. B. Sridhar; K.V.V.S. Reddy; A. Mallikarjuna Prasad “Mammographic image analysis based on adaptive morphological fuzzy logic CAD
system”
by International Journal of Biomedical Engineering and Technology (IJBET), Vol. 17, No. 4, 2015

Authors: Hemlata, Preeti Gulia

Paper Title: Experimental Evaluation of Open Source Data Mining Tools: R, Rapid Miner and KNIME
Abstract: In the current scenario of Big Data, open source Data Mining tools are very popular in business data
analytics. The paper presents a comprehensive study of three most popular open source data mining tools – R,
RapidMiner and KNIME. The tools are compared by implementing them on two real datasets. Performance is
evaluated by creating a decision tree of the datasets taken. Our objective is to find the best tool for classification.
The study can help researchers, developers and users in selecting a tool for accuracy in their data analysis and
prediction. Experiments depict that accuracy level of the tool changes with the quantity and quality of the dataset.
721. The results show that RapidMiner is the best tool followed by KNIME and R.
Keyword : Classification, Data Mining tools, Decision tree, KNIME , R, RapidMiner. 4133-
References: 4144
1. D. Pyle, Data Preparation for Data Mining, San Diego: Academic Press, 1999.
2. http://www.kdnuggets.com/2017/05/poll-analytics-data-science-machine-learning-software-leaders.html
3. Nurdatillah Hasim, Norhaidah Abu Haris “A Study of Open-Source Data Mining Tools for Forecasting”, in the proceedings of IMCOM’15,
January 08 – 10, 2015, ACM 2015.
4. Magdalena Graczyk, Tadeusz Lasota, and Bogdan Trawiński, “Comparative Analysis of Premises Valuation Models Using KEEL,
RapidMiner, and WEKA”, in the proceedings of ICCI 2009, Springer-Verlag Berlin Heidelberg 2009.
5. Luís C. Borges, Viriato M. Marques and Jorge Bernardino, “Comparison of Data Mining Techniques and Tools for Data Classification”, in
the proceedings of C3S2E13, Jul 10-12 2013, Portugal, ACM, 2013.
6. Hemlata, Dr. Preeti Gulia, “Comprehensive Study of Open- Source Big Data Mining Tools”, International Journal of Artificial Intelligence
and Knowledge Discovery, e-ISSN: 2231-0312, Vol. 6, Issue 1, January, 2016.
7. Angela Lausch, Andreas Schmidt, Lutz Tischendorf, “Data mining and linked open data – New perspectives for data analysis in
environmental research”, Ecological Modelling, 0304-3800, Elsevier, Science Direct, 2014.
8. A. Jović*, K. Brkić* and N. Bogunović, “An overview of free software tools for general data mining”, in the proceedings of 37th
International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), IEEE, 2014.
9. Ahmad Al-Khoder, Hazar Harmouch, “Evaluating four of the most popular Open Source and Free Data Mining Tools”, International
Journal of Academic Scientific Research (272-6446), Volume 3, Issue 1, PP 13-23.
10. Neha Chauhan, Nisha Gautam, “Parametric Comparison of Data Mining Tools”, International Journal of Advanced Technology in
Engineering and Science, Vol. No. 3, Issue 11, November 2015.
11. Jaideep Jagadeeshwar Rao, Rakesh Kelappan and Paul Pallath, “Recommendation System to Enhance Planning of Software Development
using R”, in the proceedings of RSSE’14 June 3, 2014, Hyderabad, ACM 2014.
12. Hilda Kosorus, J¨urgen H¨onigl, Josef K¨ung, “Using R, WEKA and RapidMiner in Time Series Analysis of Sensor Data for Structu ral
Health Monitoring”, in the proceedings of 22nd International Workshop on Database and Expert Systems Applications, IEEE, 2011.
13. https://archive.ics.uci.edu/ml/datasets/Iris
14. https://www.rstudio.com
15. http://rapidminer.com
16. https://www.knime.org

Authors: Raghavendran.S, P.Kumar, Darwin P

Paper Title: Leaf Disease Classification using SVM Classifier in Cloud


Abstract: In this modern era the clinical laboratory have greater attention to produce an accurate result for
every test particularly in the area of leaf disease. The leaf disease is very essential to detect. For the identification of
leaf disease three phases are used. First phase is the segmentation and the segmentation used here is the Otsu’s
threshold based segmentation. While using the Otsu’s threshold based segmentation we get better result when
compared to the previous method. Second phase is the feature extraction here the feature is extracted using the
ABCD feature. And the third or final phase is the classification. SVM classifier which is used to categorize the leaf
disease separately. The simulations are done on MATLAB application.

Keyword : Leaf disease, bilateral filter, Otsu’s segmentation, ABCD feature, Support Vector Machine.
References:
1. Pooja, V., Das and R. And Kanchana, V., April, 2017. Plant leaf disease identification with image processing techniques. IEEE
Technological Innovations for Agriculture and Rural Development (TIAR) in 2017 (pp. 130-133). IEEEE
2. M., M., Fischer, M. And Bruckstein, A., from 1994. On the contribution of Gabor to enhancing the pictu re. Recognition of trends, 27(1),
pp.1-8
3. Tomasi, C. and Manduchi, R., 1998, January. Bilateral gray and light filtering. In Iccv (Vol. 98, No. 1, p. 2).
4. Paris, S., Kornprobst, P., Tumblin, J. and Durand, F., 2009. Bilateral filtering: applications and theory. Computer Graphics and Vision
722. Foundations and Patterns ®, 4(1), pp.1-73
5. Paris, S. and Durand, F., 2006, May. A rapid approximation of the bilateral filter using a signal processing approach. In the European 4145-
Computer Vision Conference (pp. 568-580)
6. N.S., Ramteke. And in 2013, Jain, S.V. Automatic computer-aided detection of skin cancer based on ABCD rule using MATLAB. IJCTA, 4149
pp. 691-697, 4(4)
7. Ghaiwat, and S.N. And Arora, P., from 2014. Detection and identification using image processing techniques of plant leaf diseases: a
summary. Global Engineering & Technology Journal of Recent Advances, 2(3), pp.1-7.
8. S.B. Dhaygude. And the 2013 Kumbhar, N.P. Detection of the disease of agricultural plant leaf using image processing. Interna tional
Journal of Electrical, Electronics and Instrumentation Engineering Research, 2(1), pp.599-602.
9. Landge, P.S., Patil, S.A., Otari, O.D., Khot, D.S. And the 2013 Malavkar, U.G. Automatic detection and classification by imag e processing
of plant disease. Computer Science and Software Engineering International Journal of Advanced Research, 3(7), pp. 798-801
10. A.H., Kulkarni. And Patil, A., from 2012. Use of image processing technique to identify diseases of plants. Modern Engineerin g Research
International Journal, 2(5), pp.3661-3664.
11. Wang, H., Li, G., Ma, Z. and Li, X., 2012, October. Image identification of plant diseases based on back propagation networks . 5th
International Image and Signal Processing Congress 2012 (pp. 894-900). IEEE.
12. Chaudhary, P., Cheeran, A.N. Chaudhari, A.K. And Godara, S., from 2012. A color transform method focused on the identification of
disease spot on plant leaf. Computer Science and Telecommunications International Review, 3(6), pp. 65-70
13. M. de Ridder, D. Egmont-Petersen. And Commerce, H., 2002. Neural network image processing — a summary. Recognition of trends,
35(10), pp.2279-2301
14. Mohamad, D. Zafar, M.F. And Anwar, M.M., Dec. 2006. Recognition of online isolated handwritten characters by the use of sub -character
primitive features of backpropagation neural networks. International Multitopic Conference of the IEEE in 2006 (pp. 157-162). IEEEE.
IEEE
15. Barbedo, 2013, J.G.A. Techniques for digital image processing to detect, quantify and classify plant disease. SpringerPlus, p .660, 2(1).
16. Naikwadi, S. and Amoda, N., 2013. Advancements in plant disease identification image processing. Global Technology and Managemen t
Software or Innovation Journal (IJAIEM), 2(11).

Authors: V. Mouneswari, Rajesh Mamilla, T. Narayana Reddy

Paper Title: Effectiveness of Yield Measures on Performance and Profitability of Selected Banks in India
Abstract: Productivity is one of the important measures which helps for growth and development of economy
of the country. The productivity plays a crucial part in organizational achievement of excellence which is essential
for dynamic society. Optimum productivity of a company depends on coordination between all inputs that yield
723. maximum profitability with minimum effort. Hence the present study is focus on an objective of identify and
compare the factors influencing the Productivity as well as Profitability Performance of select Public and Private 4150-
sector banks in India. The sample consists of 20 Banks which were operating in India. The study period considered 4155
for the study is ten years from 2008-09 to 2017-18. The methodology which is used in the present study is
Correlation analysis which helps to know the relationship between the select variables and Regression analysis is
used to analyse the impact of select independent variables such as Sales Per employee, value added per employee,
Profit before tax per employee, employee cost to sales and employee cost to value added on dependent variables
like Return on Assets, Return on Equity and Value added per fixed assets. Further Independent sample test is used
to assess the relationship between Productivity and Performance measures of select Public and Private sector Banks
in India. Thus, the results from correlation analysis indicate that almost all the independent variables except Sales
per employee and employee cost to sales have significant relationship with dependant variables in both Public
sector and private sector banks. The Regression result shows that Sales per employee is having significant negative
impact on Return on Assets, return on equity and Value added per fixed assets. Independent samples test reveals
that the Private sector banks are showing superior performance than Public sector banks.

Keyword : Correlation, Private Sector, Productivity, Optimum, Independent, Dependent.


References:
1. Jha, S., & Hui, X. (2012). A comparison of financial performance of commercial banks: A case study of Nepal. African Journal of
Business Management, 6(25), 7601-7611.
2. Chandan, C., & Rajput, P. (2002). Profitability Analysis of Banks in India – A Multiple Regression Approach. Indian Management
Studies Journal, 119-129.
3. Hassan, M., & Bashir, A. (2003). Determinants of Islamic banking profitability. 10th ERF Annual Conference, (pp. 16-18). Morocco.
4. Wasiuzzaman, S., & Tarmizi, H. (2010). Profitability of Islamic banks in Malaysia: an empirical analysis. Journal of Islamic Economics,
Banking and Finance, 6(4), 53-68.
5. Adwaita Maiti, & Sebak Kumar Jana. (2017). Determinants of Profitability of Banks in India: A Panel Data Analysis. Scholars Journal of
Economics, Business and Management, 4(7), 436-445.
6. Ahmed, Abdulkader Mohammed , Khababa, & Nourredine. (1999). Performance of banking sector in Saudi Arabia. Journal of Financial
Management and Analysis , 12(2), 30-36.
7. Alam, J., & Riyadh, A. (2003, July-August). Measuring Productivity and Profitability of Banking in Bangladesh . Cost and Management.
8. Almazari, A. (2011). Financial performance evaluation of some selected Jordanian commercial banks. International Research Journal of
Finance and Economics, 68(8), 50-63.
9. Amanjot Kaur Sodhi, & Simran Waraich . (2016, January-February ). Fundamental Analysis of Selected Public and Private Sector Banks
in India. NMIMS Management Review, 25(3).
10. Amit Kumar Singh. (2015). An analysis of profitability position of private bank in India. International Journal of Scientific and Research
Publications, 5(5), 1-11.
11. Arora, S., & Kaur, S. (2006). Financial Performance of Indian Banking Sector in Post-Reforms Era. The Indian Journal of Commerce,
59(1).
12. Banik, B., & Das, P. (2013). Comparison of Financial Performance of State Owned Commercial Banks: A Case Study of Bangladesh.
International Journal of Science and Research, 2(2).
13. Bhattacharjee, D. (1991). Productivity measurement in the nationalized commercial banks of bangladesh: A Multivariate Analysis. The
Dhaka University Studies, 12(1), 25–43.
14. Bhuvan Vyas , & Dr. Vijay Pithadia. (2012). Productivity in Service Sector: SBI and IDBI Bank. Indian Journal of Applied Research,
2(2), 107-108.
15. Brajesh Kumar. (2016). A study of Productivity of Employees in Public sector Banks of India and Nepal. Effulgence , 14(2), 12-18.

Authors: Domanetska Iryna, Khaddad Anton, Krasovska Hanna, Yeremenko Bohdan

Paper Title: Corporate System Users Identification by the Keyboard Handwriting based on Neural Networks
Abstract: The paper is devoted to practical information security aspects in the corporate system. Particular
attention is paid for the ensuring access control problem for corporate confidential information. Solving this
problem involves identifying a person trying to gain unauthorized access to the corporate system and identification
of a authorized user committing illegal actions. The paper shows that a person's keyboard handwriting is
determined by behavioural characteristic, which is very difficult to imitate. This means that the person
identification based on the keyboard handwriting analysis is the most reliable. It is necessary to consider the
possibility of accidental uncontrolled change user’s keyboard handwriting settings when it works. Such changes
can be caused by changes in physiological or emotional state. Using neural networks enables to perform analysis of
handwriting keyboard considering these changes at the real time. Thus, the artificial neural networks using makes it
possible considerably improves the security of corporate confidential information protection from authorized user
committing illegal actions. Existing methods and algorithms for user identifying by his keyboard handwriting are
focused on using a multilayer perceptron. However, FAM architecture and capabilities analysis of adaptive
resonance theory has identified advantages such as the ability to form associative pairs and map the rules of fuzzy
724. inferences to clusters of neural networks in this category. Considering these characteristics was decisive in
choosing the neural network intelligent system for users identification by his keyboard handwriting style. As a
4156-
result of the research proposed generalized architecture Corporate System Users Identification by the Keyboard
4161
Handwriting, based on the use of Cascade ARTMAP. The scheme of rules formation in Cascade ARTMAP and the
knowledge base formation scheme of Users Identification Intelligent System by Keyboard Handwriting are
proposed.

Keyword : access control, information security, keyboard handwriting, neural network, unauthorized access.
References:
1. Hack at any cost: how much APT can cost https://www.ptsecurity.com/ru-ru/research/pt-esc-threat-intelligence/ch
2. Internet Security Threat Report: Volume 21 by Symantec Corporation https://www.symantec.com/content/dam/symantec/docs/reports/
istr21-2016-en.pdf
3. W.-K. Incident Response Capabilities in 2016: The 2016 SANS https://www.sans.org/reading-room/whitepapers/incident/
incidentresponse-capabilities-2016-2016-incident-response-survey- 37047.
4. V. Ivanov, E. Lubova, D. Cherkasov, “Authentication And Authorization”, Problems of modern science and education 2017.
5. Keyboard handwriting as a means of authentication, I. Aguryanov , https://www.securitylab.ru/blog/personal/aguryanov/29985.php
6. K. Bossanova, Social Engineering Or How To Hack The Human System, Scientists Of Labor On The Union At The Student - Plovdiv.
Series A: Public Sciences, Art And Culture.
7. V.E. Snityuk “The problem of choosing the optimal alternative in the conditions of compositional uncertainty“, Cherkasy: ChITI Bulletin,
2000, №2, рр. 140-145.
8. S. Osowski “Sieci neuronowe do przetwarzania informacji“, Warszawa, 2000, p 342. (in Polish).
9. G.A. Carpenter, S. Grossberg, J.H. Reynolds “ARTMAP: Supervised Real-Time Learning and Classification of Nonstationary Data by a
Self-Organizing Neural Network“, Neural Networks, 4, 1991.
10. A. Arutiunian “Fuzzy Neural Network Sorter”, Technological Systems, Кiev,2009, vol.1(45), рр. 54–57.
11. В. Kosko, С. Guest “Optical bi-directional associative memories“, Sosiety for Photo-optical and Instrumentation Engineers Proceedings:
Image Understanding, 1987, рр. 11-18
12. J. J. Hopfield “Learning algorithms and probability distributions in feedforward and feed-back networks“, PNAS December 1, 1987 84
(23) рр. 8429-8433. https://doi.org/10.1073/pnas.84.23.8429
13. A. H. Tan “Cascade ARTMAP: Integrating Neural Computation and Symbolic Knowledge Processing“, IEEE Trans, Neural Networks,
1997, vol. 8, n.2.
14. Terenchuk, N. Poltorachenko, Yu. Kosharna “Analysis of the ability of artificial neural networks to solve the problems of ass essing the
technical condition of building structures”. “Construction production”. Kiev, vol.63/1, 2017, pp.85-90
15. Terenchuk, А. Pashko, В. Yeremenko, S. Kartavykh, N. Ershovа, “Modeling an intelligent system for the estimation of technical state of
construction structures“, Eastern-European Journal of Enterprise Technologies, 2018, Vol3, #2(93), рр. 47-53
16. H.T. Hguen, M. Sugeno, R. Tong, R. R. Yager “Theoretical aspects of fuzzy control“, New York, John Wiley & Sons, 1995, 359 p.
17. Yu. Rіabchun “Intellectualization of decision support systems for choosing the specialization of training”. Management of Development of
Complex Systems. Kiev, 2019, vol. 39

Authors: C.R. Durga Devi, R. Manicka Chezian

Paper Title: Support Vector Regression based Mapreduce Throttled Load Balancer for Data Centers
Abstract: The process of analyzing big data and other valuable information is a significant process in the
cloud. Since big data processing utilizes a large number of resources for completing certain tasks. Therefore, the
incoming tasks are allocated with better utilization of resources to minimize the workload across the server in the
cloud. The conventional load balancing technique failed to balance the load effectively among data centers and
dynamic QoS requirements of big data application. In order to improve the load balancing with maximum
throughput and minimum makespan, Support Vector Regression based MapReduce Throttled Load Balancing
(SVR-MTLB) technique is introduced. Initially, a large number of cloud user requests (data/file) are sent to the
cloud server from different locations. After collecting the cloud user request, the SVR-MTLB technique balances
the workload of the virtual machine with the help of support vector regression. The load balancer uses the index
table for maintaining the virtual machines. Then, map function performs the regression analysis using optimal
hyperplane and provides three resource status of the virtual machine namely overloaded, less loaded and balanced
load. After finding the less loaded VM, the load balancer sends the ID of the virtual machine to the data center
controller. The controller performs migration of the task from an overloaded VM to a less loaded VM at run time.
This in turn assists to minimize the response time. Experimental evaluation is carried out on the factors such as
throughput, makespan, migration time and response time with respect to a number of tasks. The experimental
results reported that the proposed SVR-MTLB technique obtains high throughput with minimum response time,
makespan as well as migration time than the state -of -the -art methods.

Keyword : Big data processing, Support Vector Regression, hyperplane, Throttled Load Balancing, MapReduce
function
References:
1. Feilong Tang , Laurence T. Yang , Can Tang , Jie Li ; Minyi Guo, “A Dynamical and Load-Balanced Flow Scheduling Approach for Big
725. Data Centers in Clouds”, IEEE Transactions on Cloud Computing, Volume 6 , Issue 4 , 2018, Pages 915 – 928
2. Altaf Hussain, Muhammad Aleem, Abid Khan, Muhammad Azhar Iqbal, Muhammad Arshad Islam, “RALBA: a computation -aware load 4162-
balancing scheduler for cloud computing”, Cluster Computing, Springer, Volume 21, Issue 3, 2018, Pages 1667–1680 4171
3. Jie Cui , Qinghe Lu , Hong Zhong , Miaomiao Tian , Lu Liu, “A Load-Balancing Mechanism for Distributed SDN Control Plane Using
Response Time”, IEEE Transactions on Network and Service Management , Volume 15 , Issue 4 , 2018, Pages 1197 – 1206
4. Jian Liu, Huanqing Dong, Junwei Zhang, Zhenjun Liu, Lu Xu, “HWM: a hybrid workload migration mechanism of metadata server cluster
in data center”, Frontiers of Computer Science, Springer, Volume 11, Issue 1,2017, Pages 75–87
5. Sweekriti M. Shetty and Sudheer Shetty, “Analysis of load balancing in cloud data centers”, Journal of Ambient Intelligence and
Humanized Computing, Springer, 2019, Pages 1-9
6. J. Octavio Gutierrez-Garcia and Adrian Ramirez-Nafarrate, “Agent-based load balancing in Cloud data centers”, Cluster Computing,
Springer, Volume 18, Issue 3, September 2015, Pages 1041-1062
7. Shuo Wang, Jiao Zhang, Tao Huang, Tian Pan, Jiang Liu, Yunjie Liu, “Flow distribution-aware load balancing for the datacenter”,
Computer Communications, Elsevier, Volume 106, 2017, Pages 136-146
8. Liang Yu ,Tao Jiang , Yulong Zou, “Price-Sensitivity Aware Load Balancing for Geographically Distributed Internet Data Centers in
Smart Grid Environment”, IEEE Transactions on Cloud Computing, Volume 6 , Issue 4 , 2018, Pages 1125 – 1135
9. Jun Duan and Yuanyuan Yang, “A Load Balancing and Multi-Tenancy Oriented Data Center Virtualization Framework”, IEEE
Transactions on Parallel and Distributed Systems, Volume 28 , Issue 8 , 2017 , Pages 2131 – 2144
10. Mohit Kumar and S.C.Sharma, “Deadline constrained based dynamic load balancing algorithm with elasticity in cloud environment”,
Computers & Electrical Engineering, Elsevier, Volume 69, 2018, Pages 395-411
11. Jia Zhao, Kun Yang ,Xiaohui Wei , Yan Ding , Liang Hu , Gaochao Xu, “A Heuristic Clustering -Based Task Deployment Approach for
Load Balancing Using Bayes Theorem in Cloud Environment”, IEEE Transactions on Parallel and Distributed Systems, Volume 27 , Issue
2 , 2016 , Pages 305 – 316
12. Tianyi Chen , Antonio G. Marques , Georgios B. Giannakis, “DGLB: Distributed Stochastic Geographical Load Balancing over Cloud
Networks”, IEEE Transactions on Parallel and Distributed Systems ,Volume 28 , Issue 7 , Pages 1866 – 1880
13. Xiao Song, Yaofei Ma, and Da Teng, “A Load Balancing Scheme Using Federate Migration Based on Virtual Machin es for Cloud
Simulations”, Mathematical Problems in Engineering, Hindawi Publishing Corporation, Volume 2015, September 2014, Pages 1 -11
14. Jixiang Yang, Ling Ling, and Haibin Liu, “A Hierarchical Load Balancing Strategy Considering Communication Delay Overh ead for
Large Distributed Computing Systems”, Mathematical Problems in Engineering, Hindawi Publishing Corporation, Volume 2016, April
2016, Pages 1-9
15. Hadi Khani, Nasser Yazdani, Siamak Mohammadi, “A self‐organized load balancing mechanism for cloud compu ting”, Concurrency and
Computation: Practice And Experience, Volume 29, Issue 4, 2017, Pages 1-19
16. Ramona Trestian , Kostas Katrinis, Gabriel-Miro Muntean, “OFLoad: An OpenFlow-Based Dynamic Load Balancing Strategy for
Datacenter Networks”, IEEE Transactions on Network and Service Management , Volume 14 , Issue 4 , 2017, Pages 792 – 803
17. Keng-Mao Cho, Pang-Wei Tsai, Chun-Wei Tsai, Chu-Sing Yang, “A hybrid meta-heuristic algorithm for VM scheduling with load
balancing in cloud computing”, Neural Computing and Applications, Springer, Volume 26, Issue 6, August 2015, Pages 1297–1309
18. Kousik Dasguptaa, Brototi Mandalb, Paramartha Duttac, Jyotsna Kumar Mondald, Santanu Dame, “A Genetic Algorithm (GA) based Lo ad
Balancing Strategy for Cloud Computing”, Procedia Technology, Elsevier, Volume 10, 2013, Pages 340 – 347
19. Jianjiang Li, Yajun Liu, Jian Pan, Peng Zhang, Wei Chen, Lizhe Wang, “Map-Balance-Reduce: An improved parallel programming model
for load balancing of MapReduce”, Future Generation Computer Systems, Elsevier, 2017, Pages 1-28
20. Hui Zhang , Guofei Jiang , Kenji Yoshihira , Haifeng Chen, “Proactive Workload Management in Hybrid Cloud Computing”, IEEE
Transactions on Network and Service Management , Volume 11 , Issue 1, 2014, Pages 90 – 100
21. E.Sivaraman, R. Manickachezian, “Unevenness measurement using the support vector machine and dynamic multiservice load balancing
with modified genetic algorithm in cloud-based multimedia system”, International Journal of Computer Aided Engineering and
Technology, Volume 10, Issue 6, 2018, Pages 732-747
22. E.Sivaraman, R. Manickachezian, “Efficient multimedia content storage and allocation in multidimensional cloud computing reso urces”,
International Journal of Intelligent Systems Technologies and Applications,, Volume 18 , Issue 1-2, 2019, Pages 20 – 33
23. C.R.Durga Devi and R.Manicka Chezian, “Resource optimized ensemble gradient boosting classifier for traffic aware big data an alytics”,
Journal of Advanced Research in Dynamical & Control Systems , Volume 10 , Issue 3, 2018, Pages 839-852
24. C.R.Durga Devi and R.Manicka Chezian, “Multivariate Logistic Regression based Gradient Descent Firefly Optimized Round Robin
Scheduling with Big Data”, Journal of Advanced Research in Dynamical & Control Systems , Volume 11 , Issue 1, 2019 , Pages 179-192

Authors: Aarthi D, Viswanathan V, Nandhini B, Ilakiyaselvan N

Paper Title: Question Classification using a Rule based Model


Abstract: Question Answering is one of the most common applications for data acquisition. Although the
majority of text-mining applications strive to improve the user experience and the tools used to find appropriate
answers, the problems still exist because the web content is constantly increasing. The Questions Classification
(QC) task is one of the main tasks in improving the classification system is to classify types of questions in the text
mining application. A large number of QC methods are introduced to help resolve classification problems, most of
which are bag of words approaches. In this project, we propose a QC system that uses Parts of Speech (POS)
Tagger and Named Entity Recognition (NER) Tagger from the Stanford core Natural Language Processing (NLP)
to classify the questions correctly. We started by cleaning the data by removing the available labels in the questions
then we proceed by tagging the questions by splitting words and tagging each and every words in the input question
with the POS Tagger. After this step, we will convert them into a pattern without changing the structure of the
question. Then we proceed by tagging the question with NER Tagger. Finally, we will do confirmation process for
certain question types which is performed by confirming question type module to make the system work efficiently.

Keyword : Natural Language processing, Text mining, Question answering system, Data mining.
References:
1. A. Mohasseb, M. Bader-El-Den, M. Cocea, Question categorization and classification using grammar based approach, Information
Processing and Management, 2018.
2. O. Kolomiyets, M.-F. Moens, A survey on question answering technology from an information retrieval perspective, Inf. Sci. 181 (24)
(2011) 5412–5434.
3. F. Bu, X. Zhu, Y. Hao, X. Zhu, Function-based question classification for general qa, in: Proceedings of the 2010 conference on empirical
726. methods in natural language processing, Association for Computational Linguistics, 2010, pp. 1119–1128.
4. J. Bullington, I. Endres, M. Rahman, Open ended question classification using support vector machines, in: MAICS, 2007.
5. X. Li, D. Roth, Learning question classifiers: the role of semantic information, Nat. Lang. Eng. 12 (03) (2006) 229–249. 4172-
6. P. Le-Hong, X.-H. Phan, T.-D. Nguyen, Using dependency analysis to improve question classification, in: Knowledge and Systems 4176
Engineering, Springer, 2015, pp. 653–665.
7. X. Li, X.-J. Huang, L.-d. Wu, Question classification using multiple classifiers, in: Proceedings of the 5th Workshop on Asian Language
Resources and First Symposium on Asian Language Resources Network,2005.
8. D. Metzler, W.B. Croft, Analysis of statistical question classification for fact-based questions, Inf. Retr. 8 (3) (2005) 481–504.
9. D. Zhang, W.S. Lee, Question classification using support vector machines, in: Proceedings of the 26th Annual International ACM SIGIR
Conference on Research and Development in Informaion Retrieval, ACM,2003, pp. 26–32.
10. M. Mishra, V.K. Mishra, H. Sharma, Question classification using semantic, syntactic and lexical features, Int. J. Web Semant. Technol. 4
(3) (2013) 39.
11. Z. Huang, M. Thint, Z. Qin, Question classification using head words and their hypernyms, in: Proceedings of the Conference on
Empirical Methods in Natural Language Processing, Association for Computational Linguistics, 2008, pp. 927–936.
12. F. Li, X. Zhang, J. Yuan, X. Zhu, Classifying what-type questions by head noun tagging, in: Proceedings of the 22nd International
Conference on Computational Linguistics-Volume 1, Association for Computational Linguistics, 2008, pp. 481–488.
13. D. Moldovan, M. Pa¸sca, S. Harabagiu, M. Surdeanu, Performance issues and error analysis in an open -domain question answering
system, ACM Trans. Inf. Syst. 21 (2) (2003) 133–154.
14. F. Benamara, Cooperative question answering in restricted domains: the webcoop experiment, 2004.
15. T.T. Nguyen, L.M. Nguyen, A. Shimazu, Using Semi-Supervised Learning for Question Classification, vol. 3, Information and Media
Technologies Editorial Board, 2008, pp. 112–130.
16. T.T. Nguyen, L.M. Nguyen, Improving the accuracy of question classification with machine learning, in: Research, Innovation and
Vision for the Future, 2007 IEEE International Conference on, IEEE, 2007, pp. 234–241.
17. Márquez, Lluís, and Lluis Padró. "A flexible POS tagger using an automatically acquired language model." Proceedings of the eighth
conference on European chapter of the Association for Computational Linguistics. Association for Computational Linguistics, 1997.
18. Speck, R., Ngonga Ngomo, A.-C.: Ensemble learning for named entity recognition. In: Mika, P., et al. (eds.) ISWC 2014, Part I. LNCS,
vol. 8796, pp. 519–534. Springer, Heidelberg (2014)
19. N. Van-Tu, L. Anh-Cuong, Improving question classification by feature extraction and selection, Indian J. Sci. Technol. 9 (17) (2016).
20. D. Metzler, W.B. Croft, Analysis of statistical question classification for fact-based questions, Inf. Retr. 8 (3) (2005) 481–504.
21. S. Xu, G. Cheng, F. Kong, Research on question classification for automatic question answering, in: Asian Language Processing (IALP),
2016 International Conference on, IEEE, 2016, pp. 218–221.

Authors: B.Saravanan, D.S Vijayan,

727. Paper Title: A Research on Replacement of Red-Mud in M30 Grade of Concrete


Abstract: The study which is involved in this research paper with partially replacement of Red-Mud in 4177-
cements. By reading many research papers I found that many authors has commonly shown the mix design for M30 4180
concrete mix. There are various tested has been done which compressive strength, split tensile strength and
flextural strength. The author has different percentage of replacement of Red-Mud has done with cement. But
commonly 15% has increased in all the three types of test and there are different results in there research.

Keyword : Red mud, concrete, mix design, M30, aluminum hydroxides, compressive strength, split tensile
strength
References:
1. Moh Juned & Mr. Anwar Ahmad, “Experimental Study of Concrete Strength Properties Using Red Mud (bauxite residue) as a partial
replacement of binder content for M25 grade of Concrete” Volume 5, Issue 04, April-2019.
2. D. Linora Metilda, C. Selvamony, R. Anandakumar and A. Seeni Investigations on optimum possibility of replacing cement partia lly by
redmud in concrete Vol. 10(4), pp. 137-143, 28 February, 2015
3. Sunitha M.Pujar, Dr.K.B.Prakash,Effect of Replacement of Cement by Red mud on the Properties of Concrete, Volume 5, Issue 9,
September-2014
4. Sandeep B. Chougule, Uday B. Patil, Suhas M. Patil On the Experimental Investigations of Red Mud, Volume 6 Issue XI, Nov 2018.
5. Gowsalya. R & Bhagyalakshmi. A, Experimental Study on Partial Replacement of Cement by Red Mud, NCRTET-2015 Conference
Proceedings

Authors: Muhamad Farhan Mohd Pu’ad, Khairul Azami Sidek, Maizirwan Mel

Paper Title: Portable Water Quality Monitoring System for Aquaponics using We MOS
Abstract: Technology today had advanced rapidly for the betterment of our life. However, agriculture seems to
be left behind in the rapid progress. With the growing population nationwide, more food is required especially in
the agriculture sector. Aquaponics is an efficient approach for food production which combines plant and fish
farming together. In aquaponics, water quality especially the water’s pH level is crucial to be monitored regularly
to ensure the fishes are in good health. However, measuring the pH level routine is no longer efficient today since
the availability of technology. This study proposed a portable water quality monitoring system which currently only
measures the water’s pH level since it is the most important parameter in water quality. Mainly, the system uses
WeMos board and Message Queuing Telemetry Transport (MQTT) protocol for data processing and sending it to a
Raspberry Pi (base station) for storage and visualisation. The device has been successfully tested at the Malaysian
Institute of Sustainable Agriculture (MISA). website. The device was proven waterproof and floatable. It also can
run for about 89 hours on battery only without solar panel. However, there is always area for improvement which
includes adding more sensors to optimise usage of the device and also a Liquid-Crystal Display (LCD) screen for
user convenience. Nonetheless, this is a step towards modernising the agriculture sector.

728.
Keyword : Aquaponics, monitoring system, water quality, WeMos.
4181-
References: 4184
1. Da Xu, L., He, W., & Li, S. (2014). Internet of things in industries: A survey. IEEE Transactions on industrial informatics, 10(4), 2233-
2243.
2. Stankovic, J. A. (2014). Research directions for the internet of things. IEEE Internet of Things Journal, 1(1), 3-9.
3. Prosekov, A. Y., & Ivanova, S. A. (2018). Food security: The challenge of the present. Geoforum, 91, 73-77.
4. Rakocy, J. E. (2012). Aquaponics: integrating fish and plant culture. Aquaculture production systems, 1, 343-386.
5. Junge, R., König, B., Villarroel, M., Komives, T., & Jijakli, M. H. (2017). Strategic points in aquaponics.
6. Nikhil, R., Rajender, R., Dushyantha, G. R., Khadri, M. N. S., & Kalshetty, J. N. (2018). Smart water quality monitoring system using IoT
environment. Int. J. Innov. Eng. Technol.
7. Pranata, A. A., Lee, J. M., & Kim, D. S. (2017, June). Towards an IoT-based water quality monitoring system with brokerless pub/sub
architecture. In 2017 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN) (pp. 1-6). IEEE.
8. Saravanan, K., Anusuya, E., & Kumar, R. (2018). Real-time water quality monitoring using Internet of Things in SCADA. Environmental
monitoring and assessment, 190(9), 556.
9. Memon, S. K., Shaikh, F. K., Mahoto, N. A., & Memon, A. A. (2019, January). IoT based smart garbage monitoring & collection s ystem
using WeMos & Ultrasonic sensors. In 2019 2nd International Conference on Computing, Mathematics and Engineering Technologies
(iCoMET) (pp. 1-6). IEEE.
10. Rukhmode, S., Vyavhare, G., Banot, S., Narad, A., & Tugnayat, R. M. (2017). IOT based agriculture monitoring system using wem os. no.
March, 14-19.
11. Kodali, R. K., & Sahu, A. (2016, December). An IoT based weather information prototype using WeMos. In 2016 2nd International
Conference on Contemporary Computing and Informatics (IC3I) (pp. 612-616). IEEE.

Authors: Abdulkarim S. M. Ali, Rozmie R. Othman, Yacob, Y.M, Jalal M Alkanaani

Paper Title: Parameters Tuning of Adaptive Firefly Algorithm based Strategy for t-way Testing
Abstract: The adaptive firefly algorithm (AFA) is developed based on an elitism operator. Elitism operators
can perform the function of updating the effectiveness of diversification in a search algorithm. In this study, a
strategy was proposed to upgrade the FA concerning static issues. Most traditionally, for evolutionary algorithms,
729. elitism suggests that the best solution found is utilized to work for the next generation. Elitism involves the
replication of a small set of the fittest candidate solutions, which remain unaltered, into succeeding generations.
4185-
The condition can radically impact execution time by ensuring that the El waste no time on re-finding newly-
4191
disposed partial solutions. Candidates who stay protected and unmodified via elitism all meet the requirements for
parent selection in terms of rearing the remainder of the succeeding generation. This study used different tuning
parameters, such as the number of fireflies, iterations and switching probability. To ensure that AFA could perform
for t-way testing as useful as other strategies to generate the best performance. Considering the standard covering
array (N, 2,5^7) it demonstrates the tuning parameters for AFA to improve elitism. In this paper, the Findings
show that AFA, as well as t-way testing, can deliver the minimum requirements and sufficient results.

Keyword : T-way testing problem, combinatorial test, firefly algorithm, elitism, tuning parameters.
References:
1. M. Rahman, R. R. Othman, R. B. Ahmad, and M. M. Rahman, “Event driven input sequence t-way test strategy using simulated
annealing,” in 2014 5th International Conference on Intelligent Systems, Modelling and Simulation, 2014, pp. 663–667.
2. K. J. Nurmela, “Upper bounds for covering arrays by tabu search,” Discret. Appl. Math., vol. 138, no. 1–2, pp. 143–152, 2004.
3. J. Stardom, Metaheuristics and the search for covering and packing arrays. Simon Fraser University Burnaby, 2001.
4. A. R. A. Alsewari and K. Z. Zamli, “Design and implementation of a harmony-search-based variable-strength t-way testing strategy with
constraints support,” Inf. Softw. Technol., vol. 54, no. 6, pp. 553–568, 2012.
5. B. S. Ahmed, K. Z. Zamli, and C. P. Lim, “Constructing a t-way interaction test suite using the particle swarm optimization approach,”
Int. J. Innov. Comput. Inf. Control, vol. 8, no. 1, pp. 431–452, 2012.
6. R. Eberhart and J. Kennedy, “A new optimizer using particle swarm theory,” in MHS’95. Proceedings of the Sixth International
Symposium on Micro Machine and Human Science, 1995, pp. 39–43.
7. D. Karaboga, “An idea based on honey bee swarm for numerical optimization,” Technical report-tr06, Erciyes university, engineering
faculty, computer …, 2005.
8. A. A. Alsewari, L. M. Xuan, and K. Z. Zamli, “Firefly Combinatorial Testing Strategy,” in Science and Information Conference, 2018,
pp. 936–944.
9. X.-S. Yang, “Multiobjective firefly algorithm for continuous optimization,” Eng. Comput., vol. 29, no. 2, pp. 175–184, 2013.
10. X.-S. Yang, “Firefly algorithm, Levy flights and global optimization,” in Research and development in intelligent systems XXVI,
Springer, 2010, pp. 209–218.
11. S. Arora, S. Singh, S. Singh, and B. Sharma, “Mutated firefly algorithm,” in 2014 International Conference on Parallel, Distributed and
Grid Computing, 2014, pp. 33–38.
12. I. Pavlyukevich, “Cooling down Lévy flights,” J. Phys. A Math. Theor., vol. 40, no. 41, p. 12299, 2007.
13. X.-S. Yang, “Firefly algorithms for multimodal optimization,” in International symposium on stochastic algorithms, 2009, pp. 169–178.
14. X.-S. Yang, “Firefly Algorithms for Multimodal Optimization,” Proc. 5th Int. Conf. Stoch. Algorithms Found. Appl., pp. 169–178, 2009.
15. A. H. Gandomi, X.-S. Yang, S. Talatahari, and A. H. Alavi, “Firefly algorithm with chaos,” Commun. Nonlinear Sci. Numer. Simul., vol.
18, no. 1, pp. 89–98, 2013.
16. R. Imanirad, X.-S. Yang, and J. S. Yeomans, “Modelling-to-generate-alternatives via the firefly algorithm,” J. Appl. Oper. Res., vol. 5,
no. 1, pp. 14–21, 2013.
17. M. K. A. Ariyaratne and T. G. I. Fernando, “A comparative study on nature inspired algorithms with firefly algorithm,” Int. J. Eng.
Technol., vol. 4, no. 10, pp. 611–617, 2014.
18. J. Senthilnath, S. N. Omkar, and V. Mani, “Clustering using firefly algorithm: performance study,” Swarm Evol. Comput., vol. 1, no. 3,
pp. 164–171, 2011.
19. X. S. Yang and X. He, “Firefly algorithm: recent advances and applications,” Int. J. Swarm Intell., vol. 1, no. 1, p. 36, 2013.
20. S. M. Farahani, A. A. Abshouri, B. Nasiri, and M. R. Meybodi, “A Gaussian firefly algorithm,” Int. J. Mach. Learn. Comput., vol. 1, no.
5, p. 448, 2011.
21. X.-S. Yang, Nature-inspired metaheuristic algorithms. Luniver press, 2010.
22. S. Łukasik and S. Żak, “Firefly algorithm for continuous constrained optimization tasks,” in International conference on computational
collective intelligence, 2009, pp. 97–106.
23. S. K. Pal, C. S. Rai, and A. P. Singh, “Comparative study of firefly algorithm and particle swarm optimization for noisy non -linear
optimization problems,” Int. J. Intell. Syst. Appl., vol. 4, no. 10, p. 50, 2012.
24. X.-S. Yang and X. He, “Firefly algorithm: recent advances and applications,” arXiv Prepr. arXiv1308.3898, 2013.
25. I. Fister, X. S. Yang, and J. Brest, “A comprehensive review of firefly algorithms,” Swarm Evol. Comput., vol. 13, pp. 34–46, 2013.
26. R. R. Othman, K. Z. Zamli, and S. M. S. Mohamad, “T-way testing strategies: A critical survey and analysis,” Int. J. Digit. Content
Technol. its Appl., vol. 7, no. 9, p. 222, 2013.
27. M. I. Younis and K. Z. Zamli, “MIPOG-an efficient t-way minimization strategy for combinatorial testing,” Int. J. Comput. Theory Eng.,
vol. 3, no. 3, p. 388, 2011.
28. J. N. Cawse, Experimental design for combinatorial and high throughput materials development. Wiley-Interscience Hoboken, NJ, 2003.
29. K. Z. Zamli, R. R. Othman, M. I. Younis, and M. H. M. Zabil, “Practical adoptions of T-way strategies for interaction testing,” in
International Conference on Software Engineering and Computer Systems, 2011, pp. 1–14.
30. M. I. Younis, K. Z. Zamli, and R. R. Othman, “Effectiveness of the cumulative vs. normal mode of operation for combinatorial testing,”
in 2010 IEEE Symposium on Industrial Electronics and Applications (ISIEA), 2010, pp. 350–354.
31. A. W. Williams, Software component interaction testing: Coverage measurement and generation of configurations. University of Ottawa
(Canada), 2002.

Authors: Akhilesh Kumar Tiwari, Arnab Guha, Anish Pandey


Dynamic Motion Planning for Autonomous Wheeled Robot using Minimum Fuzzy Rule based
Paper Title:
Controller with Avoidance of Moving Obstacles
Abstract: In this article, the Minimum Fuzzy Rule-Based (MFRB) sensor-actuator controller has designed for
dynamic motion planning of a differential drive wheeled robot among the moving, non-moving obstacles and goal
in two-dimensional environments. The ring of ultrasonic sensors and infrared sensors have been attached on the
front side, left side, and right side of the wheeled robot, which detects the moving obstacles, as well as non-moving
obstacles in any environment. This proposed MFRB sensor-actuator controller helps the wheeled robot to move
safely in a different scenario. The onboard sensor interpretation data are fed as input to the MFRB controller, and
the MFRB controller provides the Pulse Width Modulation (PWM) based wheel velocity commands to both the left
730. and right motors of a wheeled robot. In the numerical simulation and experiment, we have taken one condition that
the speed of wheels of the differential drive wheeled robot is at least more than or equal to the rate of the moving 4192-
obstacles and the moving goal. The numerical simulations are performed through a MATLAB graphical user 4198
interface (GUI), and we have used the differential drive wheeled robot to conduct experiments. The presented
numerical simulation and experimental results illustrate that the MFRB controller operated wheeled robot has
successfully avoided the stationary and non- stationary obstacles in various scenarios.

Keyword : Minimum Fuzzy Rule-Based Controller, Sensor, Actuator, Motion Planning, Wheeled Robot.
References:
1. Pandey and D. R. Parhi, “Optimum path planning of mobile robot in unknown static and dynamic environments using fuzzy-wind
driven optimization algorithm,” Def. Tech., vol. 13(1), pp. 47-58, 2017.
2. Engedy and G. Horvath, “Artificial neural network based local motion planning of a wheeled mobile robot,” In: IEEE Int. Sym. on
Comp. Inte. and Info. (CINTI), pp. 213-218, 2010.
3. Pandey and Kavita B., “Cascade neuro-fuzzy architecture based mobile-robot navigation and obstacle avoidance in static and dynamic
environments,” Inter. J. of Adv. Rob. and Auto., vol. 1(3), pp. 1-9, 2016.
4. M. Imen, M. Mohammad and M. A. Shoorehdeli, “Tracking control of mobile robot using ANFIS,” In: IEEE Int. Conf. on Mech. and
Auto., Beijing, China, pp. 422-427, 2011.
5. H. Miao and Y. C. Tian, “Dynamic Robot Path Planning using an Enhanced Simulated Annealing Approach,” App. Math. and Comp.,
vol. 222, pp. 420-437, 2013.
6. S. Ahmadzadeh and M. Ghanavati, “Navigation of Mobile Robot Using the PSO Particle Swarm Optimization,” Jou. of Aca. and App.
Stu. (JAAS), vol. 2(1), pp. 32-38, 2012.
7. Ghorbani, S. Shiry and A. Nodehi, “Using genetic algorithm for a mobile robot path planning,” In: IEEE Int. Conf. on Fut. Com. and
Com., Kuala Lumpur, Malaysia, pp. 164-166, 2009.
8. M. P. Garcia, O. Montiel, O. Castillo, R. Sepulveda and P. Melin, “Path planning for autonomous mobile robot navigation with ant
colony optimization and fuzzy cost function evaluation,” Appl. Soft Comp., vol. 9(3), pp. 1102-1110, 2009.
9. M. Algabri, H. Mathkour, H. Ramdane and M. Alsulaiman, “Comparative study of soft computing techniques for mobile robot
navigation in an unknown environment,” Comp. in Hum. Beha., vol. 50, pp. 42-56, 2015.
10. J. Alonso-Mora, S. Baker, and D. Rus, “Multi-robot formation control and object transport in dynamic environments via constrained
optimization,” Inter. Jour. of Robo. Res., vol. 36(9), pp. 1000–1021, 2017.
11. K. Patle, A. Pandey, D. R. K. Parhi and A. Jagadeesh, “A review: On path planning strategies for navigation of mobile robot,” Defe.
Tech., vol. 15, pp. 582–606, 2019.
12. P. Panahandeh, K. Alipour, B. Tarvirdizadeh, and A. Hadi, “A kinematic Lyapunov-based controller to posture stabilization of wheeled
mobile robots,” Mech. Sys. and Sig. Process., 134, pp. 106319–106337, 2019.

Authors: Ranjini A, B.S.E. Zoraida


Efficient Electricity Consumption Scheduling for Residential Load Integrated with Renewable Energy
Paper Title:
Resource in Smart Grid
Abstract: Satisfying consumer’s electricity demand at peak hours is an important problem in smart grid. From
the perspective of consumers, the residential electricity consumption scheduling would aim to minimize the
electricity cost and also wish to maintain their comfort. In contrast, the power utilities concentrate on to flatten the
peak loads in the electricity demand. In this paper, both the viewpoints are taken into consideration while
scheduling the residential appliances in smart grid. The Self Adaptive Mutated Particle Swarm Optimization
Algorithm is proposed for solving the above problem. Simulations have been carried out and the results are
compared with the Non-Dominated Sorting Genetic Algorithm II. From the results obtained, it is clearly proved
that the proposed algorithm provides better schedules for the smart home, with minimized electricity cost and least
Peak-to-Average Value whereas maximizing the user comfort. Moreover, the proposed algorithm shows its
effectiveness with the increase in problem size.

Keyword : Scheduling problem, Self Adaptive Mutated Particle Swarm Optimization, Smart Grid, Heuristic
algorithm.
References:
1. Ipakchi and F. Albuyeh, “Grid of the future,” IEEE Power and Energy Magazine, Vol. 7, No. 2, pp. 52–62, 2009.
2. Khosrow Moslehi and Ranjit Kumar, “A Reliability Perspective of the Smart Grid”, IEEE Transactions on Smart Grid, Vol. 1, No. 1, pp.
57-64, 2010.
3. Linas Gelazanskas, Kelum A.A Gamage, “Demand Side Management in Smart Grid: A Review and Proposals for Future Direction”,
Sustainable Cities and Society, Vol. 11, pp. 22-30, 2014.
731. 4. Peter Palensky and Dietmar Dietrich, “Demand Side Management: Demand Response, Intelligent Energy Systems, and smart Loads”, IEEE
Transactions of Industrial Informatics, Vol. 7, No. 3, pp. 381-388, 2011.
5. PierluigiSiano, “Demand Response and Smart Grids- A Survey”, Renewable and Sustainable Energy Reviews, Elsevier, Vol. 30, pp. 461- 4199-
478, 2014. 4208
6. Ameena Saad Al-Sumaiti, Mohammed Hassan Ahmed, and Magdy M. A. Salama, “Smart Home Activities: A Literature Review”, Electric
Power Components and Systems, Vol. 42, pp. 294–305, 2014.
7. Sergio Salinas, Ming Li and Pan Li, “Multi-Objective Optimal Energy Consumption Scheduling in Smart Grids”, IEEE Transactions on
Smart Grid, Vol. 1, No. 1, pp. 341-348, 2013.
8. Ana Soares, Carlos Henggeler Antunes, Carlos Oliveira and Alvaro Gomes, “A multi-objective genetic approach to domestic load
scheduling in an energy management system”, Energy, Elsevier, Vol. 77, pp. 144-152, 2014.
9. Christopher O. Adika and Lingfeng Wang, “Autonomous Appliance Scheduling for Household Energy Management”, IEEE Transactions
on Smart Grid, Vol. 5, No. 2, pp 673-682, 2014.
10. PhaniChavali, Peng Yang and AryeNehorai, “A Distributed Algorithm of Appliance Scheduling for Home Energy Management System”,
IEEE Transactions on Smart Grid, Vol. 5, No. 1, pp. 282-290, 2014.
11. Anvari-Moghaddam, H. Monsef and A. Rahimi-Kian, “Optimal Smart Home Energy Management Considering Energy Saving and a
Comfortable Lifestyle”, IEEE Transactions on Smart Grid, Vol. 6, No. 1, pp. 324-332, 2015.
12. H. T. Roh and J. W. Lee, “Residential Demand Response Scheduling with Multiclass Appliances in the Smart Grid”, IEEE Transactions on
Smart Grid, Vol. 7, No. 1, pp. 94-104, 2016.
13. Mohammad Rastegar, Mahmud Fotuhi-Firuzabad and HamidrezaZareipour, “Home energy management incorporating operational priority
of appliances”, Electrical Power and Energy Systems, Elsevier, Vol. 74, pp. 286–292, 2016.
14. P. Samadi, V.W. Wong and R. Schober, “Load scheduling and power trading in systems with high penetration of renewable energy
resources”, IEEE Transactions on Smart Grid, Vol. 7, No. 4, pp. 1802–1812, 2016.
15. Hu, R. Skorupski, R. Entriken and Y. Ye, “A Mathematical Programming Formulation for Optimal Load Shifting of Electricity Demand for
the Smart Grid”, IEEE Transactions on Big Data, Vol. 99, pp.1-14, 2016.
16. Y. Wang, B. Wang, C.C. Chu, H. Pota, and R. Gadh, “Energy management for a commercial building microgrid with stationary and mobile
battery storage”, Energy and Buildings, Vol. 116, pp. 141–150, 2016.
17. Y. Zhang, N. Rahbari-Asr, J. Duan and M. Y. Chow, “Day-Ahead Smart Grid Cooperative Distributed Energy Scheduling With Renewable
and Storage Integration”, IEEE Transactions on Sustainable Energy, Vol. 7, No. 4, pp. 1739-1748, 2016.
18. W. Shi, N. Li, C. C. Chu, and R. Gadh, “Real-Time Energy Management in Microgrids”, IEEE Transactions on Smart Grid, Vol. 8, No. 1,
pp. 228-238, 2017.
19. S.Bahrami, V.W. Wong and J. Huang, “An Online Learning Algorithm for Demand Response in Smart Grid”, IEEE Transactions on Smart
Grid,doi: 10.1109/TSG.2017.266759, 2017.
20. A.H. Mohsenian-Rad and A. Leon-Garcia, "Optimal residential load control with price prediction in real-Time electricity pricing
environments," IEEE Transactions on Smart Grid, vol. 1, no. 2, pp. 120-133, 2010.
21. C. Chen, K. G. Nagananda, G. Xiong, S. Kishore and L. V. Snyder, "A Communication-Based Appliance Scheduling Scheme for
Consumer-Premise Energy Management Systems," in IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 56-65, 2013.
22. Chengshan Wang, Yue Zhou, Jidong Wang and Peiyuan Peng, “A novel Traversal -and-Pruning algorithm for household load scheduling”,
Applied Energy, Vol. 102, pp. 1430-1438, 2013.
23. M. Fathi and H. Bevrani, "Adaptive Energy Consumption Scheduling for Connected Microgrids Under Demand Uncertainty," in IEEE
Transactions on Power Delivery, vol. 28, no. 3, pp. 1576-1583, 2013.
24. Khomami H S, Javidi M H, “An Efficient Home Energy Management System for Automated Residential Demand Response”, 28th
International Power System Conference, 4-6 November, Tehran, Wroclaw, pp. 303-312, 2013.
25. K. M. Tsui and S. C. Chan, “Demand Response Optimization for Smart Home Scheduling Under Real-Time Pricing”, IEEE Transactions on
Smart Grid, Vol. 3, No. 4, pp. 1812-1821, 2012.
26. Thillainathan Logenthiran, Dipti Srinivasan, and Tan Zong Shun, “Demand Side Management in Smart Grid Using Heuristic Optimization”,
IEEE Transactions on Smart Grid, Vol. 3, No. 3, pp. 1244-1252, 2012.

Authors: Vijaykumar Nayak, Ratnadeep Deshmukh, Swapnil Waghmare

Paper Title: Pitch Pattern Analysis in Speech of Children with Autism Spectrum Disorder
Abstract: Autism Spectrum Disorder (ASD) is a multifaceted neurodevelopmental condition. Atypical
communication mostly occurs in tandem with ASD. We compared voice pitch of 16 Marathi children and
adolescents with ASD of age of 7 to 18 with 27 Typically Developing (TD). Speech samples have been recorded
and stored in .wav format with sampling frequency of 48000 Hz. For analysis we used PRAAT, a program for
speech analysis, manipulation and synthesis. We divided the ASD and TD group into total 4 groups on basis of age
and gender for comparison. We found that differences in voice pitch are present in these comparison groups, and
male ASD group have more pitch variation than respective comparison groups. In future we look forward to
include more ASD participants in study to increase the Marathi speech database for ASD.

Keyword : Autism Spectrum Disorder, Marathi, Pitch, Prosody , Speech.


References:
732. 1. Shrishrimal, P. P., Deshmukh, R. R., & Waghmare, V. B. (2012). Indian language speech database: A review. International journ al of
Computer applications, 47(5), 17-21. 4209-
2. Waghmare, S. D., Deshmukh, R. R., Shrishrimal, P. P., Waghmare, V. B., Janvale, G. B., & Sonawane, B. (2017). A Comparative Study of
Recognition Technique Used for Development of Automatic Stuttered Speech Dysfluency Recognition System. Indian Journal of Science
4212
and Technology, 10, 21.
3. Kanner, L. (1943). Autistic disturbances of affective contact. Nervous child, 2(3), 217-250.
4. Mullin, A. P., Gokhale, A., Moreno-De-Luca, A., Sanyal, S., Waddington, J. L., & Faundez, V. (2013). Neurodevelopmental disorders:
mechanisms and boundary definitions from genomes, interactomes and proteomes. Translational psychiatry, 3(12), e329.
5. Barahona-Correa, J. B., & Filipe, C. N. (2016). A concise history of Asperger syndrome: the short reign of a troublesome diagnosis.
Frontiers in psychology, 6, 2024.
6. Klatt, D. H., & Klatt, L. C. (1990). Analysis, synthesis, and perception of voice quality variations among female and male talkers. the
Journal of the Acoustical Society of America, 87(2), 820-857.
7. Banse, R., & Scherer, K. R. (1996). Acoustic profiles in vocal emotion expression. Journal of personality and socia l psychology, 70(3),
614.
8. http://www.ldcil.org/standardsSpeech.aspx accessed on 20/10/2019
9. Boersma, P., & Van Heuven, V. (2001). Speak and unSpeak with PRAAT. Glot International, 5(9/10), 341-347.
10. Harries, M. L., Walker, J. M., Williams, D. M., Hawkins, S., & Hughes, I. A. (1997). Changes in the male voice at puberty. Archives of
disease in childhood, 77(5), 445-447.
11. Harries, M., Hawkins, S., Hacking, J., & Hughes, I. (1998). Changes in the male voice at puberty vocal fold length and its relationship to
the fundamental frequency of the voice. The Journal of Laryngology & Otology, 112(5), 451-454.

Authors: Puneet Jain, Lasmar Garba

Paper Title: Assessement of Safety Management for Public Construction Sites in Nigeria
Abstract: The study investigates the attitude of construction firms operating within Kano metropolis towards
safety provision for workers on site. In achieving these objectives Investigatory Survey Research Approach Method
(ISRAM) was adopted and used in order to obtain quantitative and qualitative data. Questionnaires were distributed
to various construction companies within Kano metropolis, the totals of eighty (80) copies were distributed and
fifty eight (58) copies were retrieved. Data collected were found suitable. And were analyzed using Software
statistical package (SPSS). From the analysis the result revealed that there is negligence in the attitude of
construction companies towards safety and stricter regulations have to been forced. Dissemination of information
733. on safety techniques would reduce accident on site and increase the worker’s moral for better performance in turns
to reducing overrun cost. Ineffectiveness of government policy on safety measure especially in construction work 4213-
was found to have contributed to low productivity by workers on site, since they don’t have access to any claim 4217
even when accident occurred on sites. Archaeologists have discovered thousands of bodies buried in the foundation
of the wall. Bodies were also used to make up the wall’s thickness. It has been estimated that millions of workers
lost their lives due to accident, intense physical labor, starvation and disease. This is in order of magnitude of life
per meter of wall length. Therefore, safety in mission statement of large construction firms or companies is not
common (Amaechi, 1990). Execution is supported by correlation; some of these correlations were by organizations
such as Independent Project Analysis (IPA). It has been statistically proven that there is correlation between good
front end loading and safety performance of good front end loading.
Keyword : Investigatory Survey Research Approach Method (ISRAM), Software statistical package (SPSS).
References:
1. Amaechi, I. O. (1990), "Accident on construction site", The Registered Builder's Journa; A. Publication of the Nigerian institute of
building Vol. 1 No2,pp.3-6.
2. Boucher R. C. (1999),“Industrial Studies for Building Students”, Longman Publishers, Toronto, Canada, p6.
3. De Rlamer R. (1980),"Modern Safety and Health Technology", A Wiley Inter-service Publication, California, pp 55.
4. D. Russel (1958),"Modern Safety Practice" Dobbs Ferry John willey& Sons Inc. New York. Pp 95-97.[5] George S. (2004),"Building
Technology and Management", 2nd Edition, Prentice Hall Inc. london, pp 12 and 18.
5. Institution of Civil Engineering (1960), Safety on construction sites.
6. M. Evans (1968),"The Employers Guide to the Law of Health Safety & Welfare work", A Wheat & Co. Ltd Exeter, Devcon 24 High
Buru Cres. London. Pp 55.
7. Nunauly S. W. (1995) ,“Construction and Management”, Revised Edition, Tata McGraw Hill Publishing Company, New Delhi, India,
p44.
8. Oyedeiran O. S. (1989), “Industrial Accident and safety (Concept causes and cases)”, presented to the Department of psychology,
University of Lagos, p57.
9. Paulson, B. C. (1992), “Professional Construction Management.” Graw-Hill, Inc. New York. P58-60.
10. R. Chudley R. (2006) “Building Construction Hand book ” Sixth edition Printed and bound Great in Britain By Biddles Ltd. P34.
11. Nigeria, (1999) Constitution “Factories Decree No. of June 1987” Part III Section 23, Part V Section 47, Part VII Section 60.
12. Osha 2014 (https://www.osha.gov/doc/) .
13. Wikipedia ( http://en.wikipedia.org/wiki/Construction#cite_note-niosh-topic-21).
14. Ehow (http://www.ehow.com/about_5559326_safety-important-construction.html).
15. Audra Binca (2014) “Importance of safety in Contrction”http://www.ehow.com/about_5559326_safetyimportant-construction.html.

Authors: Jasmine Attri, Prabhpreet Kaur

Paper Title: Security Concerns in Cloud Computing: Analysis and Solution


Abstract: Cloud computing present comprehensive way for the user to interact with resources that they didn’t
possess. Using cloud computing, resources can be accessed on pay per use basis. Mass community of user access
resources from cloud and due to presence of sensitive information presents within cloud, security mechanism
become need of the hour. This paper discusses security mechanisms used within cloud along with shortcomings and
future enhancement of each technique. DNA encryption mechanism is discussed in detail along with research gap
and problem definition. Collision problem is discovered from DNA encryption and its rectification using future
enhancement process of folding with chaining is also presented through this literature. Results obtained in terms of
parameters such as key size and execution time is presented in tabular structure. DNA encryption with folding
method has least execution time in key formation but collision problem hamper performance of DNA encryption.
Parameters such as throughput, key size and execution time must be enhanced through collision detection
mechanism and discussed through this literature.

Keyword : Cloud computing, Security, Collision, DNA Encryption.


734. References:
1. Sohal M, Sharma S (2018) “BDNA-A DNA Inspired Symmetric Key Cryptographic Technique to Secure Cloud Computing”. J King
4218-
Saud Univ - Comput Inf Sci. doi: 10.1016/j.jksuci.2018.09.024
2. Kudtarkar PP, Pagare JD, Ahire SR, Pawar TS (2015) Enhanced File Security using Encryption and Splitting technique over Multi-cloud
4222
Environment. 5:206–211.
3. Akhil KM, Kumar MP, Pushpa BR (2018)” Enhanced cloud data security using AES algorithm”. Proc 2017 Int Conf Intell Comput
Control I2C2 2017 2018-January:1–5 . doi:10.1109/I2C2.2017.8321820
4. Chase J, Niyato D, Wang P, Chaisiri S, Ko RKL (2019)” A Scalable Approach to Joint Cyber Insurance and Security-As-A-Service
Provisioning in Cloud Computing”. IEEE Trans Dependable Secure Comput 16:565–579 . doi: 10.1109/TDSC.2017.2703626
5. Shaukat K, Hassan MU (2017) Cloud computing security using encryption technique. Transylvanian Rev 25:74–82
6. Deshmukh R (2018) “Enhanced Privacy Preservation and Data Storage Security in Public Cloud.” Helix 8:3726 –3730 . doi:
10.29042/2018- 3726-3730
7. Esposito C, De Santis A, Tortora G, Chang H, Choo KKR (2018) Blockchain: A Panacea for Healthcare Cloud -Based Data Security and
Privacy? IEEE Cloud Comput 5:31–37 . doi: 10.1109/MCC.2018.011791712
8. Jana B, Poray J, Mandal T, Kule M (2018) “A multilevel encryption technique in cloud security”. Proc - 7th Int Conf Commun Syst Netw
Technol CSNT 2017 220–224 . doi: 10.1109/CSNT.2017.8418541.
9. Meng Y, Qin T, Liu Y, He C (2018) “An Effective High Threating Alarm Mining Method for Cloud Security Management”. IEEE
Access 6:22634–22644 . doi: 10.1109/ACCESS.2018.2823724
10. Singh JP, Mamta, Kumar S (2015) Authentication and encryption in Cloud Computing. 2015 Int Conf Smart Technol Manag Comput
Commun Control Energy Mater ICSTM 2015 - Proc 216–219 . doi: 10.1109/ICSTM.2015.7225417
11. Awad A, Matthews A, Qiao Y, Lee B (2018)” Chaotic Searchable Encryption for Mobile Cloud Storage”. IEEE Trans Cloud Comput
6:440–452 . doi: 10.1109/TCC.2015.2511747

Authors: Merlin Gilbert Raj S, Shine Let G, Merlin Sajini M L, Paul Abraham

Paper Title: A Web-Interface based Smart Tracking of Overloaded Vehicle

735 Abstract: Due to the development of road infrastructure and business trade, transportation of goods is
increasing day-by-day. Each vehicle has its own configuration, size, power and capacity. However, heavy vehicles
4223-
are often used to carry loads beyond their capacity. Therefore overloading is one of the major problems which
4230
affect truckers as well as other motorists and pedestrians going near-by. In order to provide a convenient solution to
this problem, a web-based tracking system is proposed. A heavy duty vehicle which is overloaded and moving at
high speed may cause the vehicle to loose balance while making turns along the roads. This problem may also
cause the tire to burst, which in turn makes it difficult to control the vehicle. Communication module is interfaced
with a microcontroller which takes data from global positioning system receiver to locate the current position of the
overloaded vehicle. This unit is majorly controlled by an electronic control unit. A sensing element is placed at the
axle point of the vehicle to concentrate on the total weight of the vehicle. A software study is done to extract the
global positioning system data from GPRMC format. The proposed system is simulated and tested for semi-real
data. The received data is transmitted to the control room user for further improvement in traffic regulation and
road safety.

Keyword : Force sensor resistor GSM, GPS, Overloaded vehicle, smart tracking, Web-interface.
References:
1. Swapan Bagui, A. Das, and C. Bapanapalli, “Controlling Vehicle Overloading in BOT Projects,” Procedia - Soc. Behav. Sci., vol.
104, pp. 962–971, 2013.
2. A. Kishore and R. Klashinsky, “Prevention of Highway Infrastructure Damage Through Commercial Vehicle Weight Enforcement,”
Annu. Indian Roads Congr. Sess., pp. 4–7, 2000.
3. B. Jacob and V. Feypell-de La Beaumelle, “Improving truck safety: Potential of weigh-in-motion technology,” IATSS Res., vol. 34, no.
1, pp. 9–15, 2010.
4. A. D. E. Coning and A. J. Hoffman, “Proposed Alternative To Assist Current Overload Operations in South Africa,” Proc. 35th South.
African Transp. Conf. (SATC 2016), no. Satc, pp. 23–35, 2016.
5. A. N. M. Faruk, W. Liu, S. I. Lee, B. Naik, D. H. Chen, and L. F. Walubita, “Traffic volume and load data measurement using a portable
weigh in motion system: A case study,” Int. J. Pavement Res. Technol., vol. 9, no. 3, pp. 202–213, 2016.
6. A. Mahmoudabadi and S. M. Seyedhosseini, “Improving the efficiency of weigh in motion systems through optimized allocating tr uck
checking oriented procedure,” IATSS Res., vol. 36, no. 2, pp. 123–128, 2013.
7. K. Muronga, I. Sallie, V. De Franca, and A. Nieuwoudt, “Monitoring overloaded vehicles: improving traffic control centre performance
by using management information systems,” Proc. 35th South. African Transp. Conf. (SATC 2016), no. Satc 2016, pp. 597–608, 2016.
8. K. Hassan, A. Sam, and D. Machuve, “Overview on Passengers Overload Control in Public Buses Case Study: Tanzania,” Int. J. En g.
Comput. Sci., vol. ISSN, no. 8, pp. 2536–2540, 2013.
9. T. Sinshaw, “Designing Of Overload Monitoring System In Public Transportation Based On,” Int. J. Sci. Technol. Res., vol. 6, no. 10, pp.
273–277, 2017.
10. M. Safdar, “A Mobile Vehicle Weight Sensor and its Application in Transportation (Case Study : Municipal Solid Waste Collection
Vehicles),” 1st Int. Electron. Conf. Remote Sens., pp. 1–12, 2015.
11. K. Renju and P. Noronha, “A Survey on Detecting Overloaded Vehicle in Video Surveillance Systems,” Int. J. Eng. Res. …, vol. 4, no.
02, pp. 2–4, 2015.
12. Khairurrijal, M. M. Munir, A. Suhendi, H. Thaha, and M. Budiman, “An AT89S52 Single Board Computer for Teaching an
Instrumentation System Course,” Comput. Appl. Eng. Educ., vol. 15, no. 2, pp. 166–173, 2006.
13. K. A. Salim and I. M. Idrees, “Design and Implementation of Web-Based GPS-GPRS Vehicle Tracking System,” Int. J. Comput. Sci.
Eng. Technol., vol. 3, no. 12, pp. 443–448, 2013.

Authors: Zahoor Ur Rehman, Siti Sarah Binti Omar, Shafie Bin Mohamad Zabri, Sonia Lohana

Paper Title: Mobile Banking Adoption and its Determinants in Malaysia


Abstract: In electronic banking channels, mobile banking signifies a great innovation. Nonetheless, because
of few reasons, customers are not quite sure about its usage. Numerous studies conducted regarding mobile banking
adoption in different countries; however, fewer studies have been directed in Malaysia. In this study, we
contributed to the research on e-banking adoption, specifically acceptance of mobile banking in Malaysia, and we
enhanced our comprehension of customer’s attitude towards advanced technology system usage. Like so, it is
essential to grasp the aspects impacting the intention to approve mobile banking channel in Malaysia. For the
purpose, we suggested a new conceptual model by extending the Technology Acceptance Model (TAM) with new
variables that are privacy risk and security risk, which also filled the research gap. The study core objective was to
examine the aspects affecting individual’s attitude and behavioural intention to use mobile banking services in
Malaysia. SEM technique was used through Smart-PLS3 for the analysis of data with a sample frame of 384 based
on Krejcie and Morgan. The result revealed a significant and positive relationship between perceived ease of use,
usefulness and attitude towards using mobile banking while a negative and significant relationship between privacy
risk, security risk and attitude towards using mobile banking in Malaysia.
736.
Keyword : Extended TAM, mobile banking adoption, Malaysia, Risk factors, SEM 4231-
4239
References:
1. M. Suoranta and M. Mattila, “Mobile banking and consumer behaviour : New insights into the diffusion pattern,” vol. 8, pp. 20 03–2004,
2004.
2. S. Sohail and B. Shanmugham, “E-banking and customer preferences in Malaysia: An empirical investigation,” Inf. Sci. (Ny)., vol. 150,
no. 3–4, pp. 207–217, 2003.
3. S. AlShaali and U. Varshney, “On the usability of mobile commerce,” Int. J. Mob. Commun., vol. 3, no. 1, p. 29, 2005.
4. D. Krishanan, A. A. Khin, and K. Low, “Attitude towards Using Mobile Banking in Malaysia : A Conceptual Framework,” vol. 7, n o. 4,
pp. 306–315, 2015.
5. S. J. Barnes and B. Corbitt, “Mobile banking: concept and potential,” Int. J. Mob. Commun., vol. 1, no. 3, p. 273, 2003.
6. Maybank, “Maybank Introduces First Ever Mobile Banking Services Information for iPhone Applications in Malaysia,” pp. 10 –11, 2009.
7. C. M. Cheah, A. C. Teo, J. J. Sim, K. H. Oon, and B. I. Tan, “Factors Affecting Malaysian Mobile Banking Adoption : An Empirical
Analysis,” Int. J. Netw. Mob. Technol. ISSN, vol. 2, no. 3, pp. 149–160, 2011.
8. CIMBbank, “Terms and Conditions for Credit Card eStatement Accessed via CIMB Clicks,” 2014.
9. Bank Negara Malaysia, “The Financial Stability and Payment Systems Report is available in PDF format at www.bnm.gov.my,” Financ.
Stab. Paym. Syst. Rep. 2015, 2016.
10. Bank Negara Malaysia, “Internet Banking and Mobile Banking Subscribers,” Bank Negara Malaysia, p. 1, 2017.
11. MCMC, “Digital Landscape Exploring the Digital Landscape in Malaysia-,” 2016 Malaysia Digit. Landsc., no. August, pp. 1–47, 2016.
12. A. A. Shaikh and H. Karjaluoto, “Mobile banking adoption: A literature review,” Telemat. Informatics, vol. 32, no. 1, pp. 129–142, 2014.
13. C. Makanyeza, “Determinants of consumers’ intention to adopt mobile banking services in Zimbabwe,” Int. J. Bank Mark., vol. 35, no. 6,
pp. 997–1017, 2016.
14. C. Tam and T. Oliveira, “Literature review of mobile banking and individual performance,” Int. J. Bank Mark., vol. 35, no. 7, pp. 1043–
1065, 2017.
15. M. H. Koksal, “The intentions of Lebanese consumers to adopt mobile banking,” Int. J. Bank Mark., vol. 34, no. 3, pp. 327–346, 2016.
16. N. Koenig-Lewis and A. Moll, “Predicting young consumers’ take up of mobile banking services,” Int. J. Bank Mark., vol. 28, no. 5, pp.
410–432, 2010.
17. H. E. Riquelme and R. E. Rios, “The moderating effect of gender in the adoption of mobile banking,” Int. J. Bank Mark., vol. 28, no. 5,
pp. 328–341, 2010.
18. Davis, “Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology,” MIS Q., vol. 13, no. 3, pp. 319–
340, 1989.
19. V. Venkatesh, “Determinants of Perceived Ease of Use : Integrating Control , Intrinsic Motivation , Acceptance Model,” Inf. Syst. Res.,
vol. 11, no. 4, pp. 342–365, 2000.
20. Y.-H. Suh, “Determinants of behavioral intention to mobile banking,” Expert Syst. Appl., vol. 36, no. 9, pp. 11605–11616, 2009.
21. J. E. Tang and C. Chiang, “Towards an Understanding of the Behavioral Intention to Use Mobile Knowledge Management,” WSEAS
Trans. Inf. Sci. Appl., vol. 6, no. 9, pp. 1601–1613, 2009.
22. [22] L. G. Wallace and S. D. Sheetz, “The adoption of software measures: A technology acceptance model (TAM) perspective,” Inf.
Manag., vol. 51, no. 2, pp. 249–259, 2014.
23. S. Chitungo and S. Munongo, “Extending the Technology Acceptance Model to Mobile Banking Adoption in Rural Zimbabwe,” J. Bus.
Adm. Educ., vol. 3, no. 1, pp. 51–79, 2013.
24. P. Hanafizadeh, M. Behboudi, A. Abedini Koshksaray, and M. Jalilvand Shirkhani Tabar, “Mobile-banking adoption by Iranian bank
clients,” Telemat. Informatics, vol. 31, no. 1, pp. 62–78, 2014.
25. B. K. Jeong and T. E. Yoon, “An Empirical Investigation on Consumer Acceptance of Mobile Banking Services,” Bus. Manag. Res., vol.
2, no. 1, pp. 31–40, 2013.
26. I. Govender and W. Sihlali, “A Study of Mobile Banking Adoption among University Students Using an Extended TAM,” Mediterr. J.
Soc. Sci., vol. 5, no. 7, pp. 451–459, 2014.
27. C. L. Hsu, C. F. Wang, and J. C. C. Lin, “Investigating customer adoption behaviours in Mobile Financial Services,” Int. J. Mob.
Commun., vol. 9, no. 5, p. 477, 2011.
28. N. Park and K. M. Lee, “Understanding the acceptance of teleconferencing systems among employees: An extension of the technology
acceptance model,” Comput. Human Behav., vol. 39, pp. 118–127, 2014.
29. A. Shanmugam, M. T. Savarimuthu, and T. C. Wen, “Factors affecting Malaysian behavioral intention to use mobile banking with
mediating effects of attitude,” Acad. Res. Int., vol. 5, no. 2, pp. 236–253, 2014.
30. N. Daud and N. Kassim, “Determining critical success factors of mobile banking adoption in Malaysia,” Aust. J. Basic Appl. Sci., vol. 5,
no. (9, pp. 252–265, 2011.
31. F. Muñoz-Leiva, S. Climent-Climent, and F. Liébana-Cabanillas, “Determinants of intention to use the mobile banking apps: An
extension of the classic TAM model,” Spanish J. Mark. - ESIC, vol. 21, no. 1, pp. 25–38, 2017.
32. M. Kleijnen and M. Wetzels, “Consumer acceptance of wireless finance,” vol. 8, pp. 206–218, 2004.
33. P. Luarn and H. Lin, “Toward an understanding of the behavioral intention to use mobile banking,” vol. 21, pp. 873–891, 2005.
34. Y. S. Wang and H. H. Lin, “Predicting consumer intention to use mobile service,” Inf. Syst. J., vol. 16, pp. 157–179, 2006.
35. M. Crabbe, C. Standing, S. Standing, and H. Karjaluoto, “An adoption model for mobile banking in Ghana Margaret Crabbe , Craig
Standing * and Susan Standing Heikki Karjaluoto,” Int. J. Mob. Commun., vol. 7, no. 5, pp. 515–543, 2009.
36. H. W. Kim, H. C. Chan, and S. Gupta, “Value-based Adoption of Mobile Internet: An empirical investigation,” Decis. Support Syst., vol.
43, no. 1, pp. 111–126, 2007.
37. M. C. Lee, “Factors influencing the adoption of internet banking: An integration of TAM and TPB with perceived risk and perceived
benefit,” Electron. Commer. Res. Appl., vol. 8, no. 3, pp. 130–141, 2009.
38. W. Nasri and L. Charfeddine, “Factors affecting the adoption of Internet banking in Tunisia: An integration theory of accepta nce model
and theory of planned behavior,” J. High Technol. Manag. Res., vol. 23, no. 1, pp. 1–14, 2012.
39. H. Mohammadi, “A study of mobile banking loyalty in Iran,” Comput. Human Behav., vol. 44, pp. 35–47, 2015.
40. Deventer and Klerk, “Antecedents of attitudes towards and usage behavior of mobile banking amongst Generation Y students,” Banks
Bank Syst., vol. 12, no. 2, pp. 78–90, 2017.
41. U. C. Eze, M. A. T. bin M. Y. Ten, and Y.-S. Poong, “Mobile Commerce Usage in Malaysia : Assessing Key Determinants,” Int. Conf.
Soc. Sci. Humanit., vol. 5, no. 11, pp. 265–269, 2011.
42. O. Bankole and E. Cloete, “Mobile banking: A comparative study of South Africa and Nigeria,” Proc. IEEE Africon, no. September, pp.
1–6, 2011.
43. D. Mehrad and S. Mohammadi, “Word of Mouth impact on the adoption of mobile banking in Iran,” Telemat. Informatics, vol. 34, no. 7,
pp. 1351–1363, 2016.
44. K. M. Nor and J. M. Pearson, “An exploratory study into the adoption of internet banking in a developing country: Malaysia.” Journal of
Internet Commerce, 7(1), 29-73., 2008.
45. M. M. Islam and E. Hossain, “Consumers ’ Attitudes towards Mobile Banking in Bangladesh,” in Conference: The Second World
Congress on Computing and Information Technology (WCIT 2014)At: Kuala Lumpur, MalaysiaVolume: 2, 2014.
46. G. Aydin and S. Burnaz, “Adoption of mobile payment systems: a study on mobile wallets,” Pressacademia, vol. 5, no. 1, pp. 73–73,
2016.
47. K. A. Forcht, Computer Security Management. Boston, MA: Boyd & Fraser. 1994.
48. Y. Yang, L. Wu, G. Yin, L. Li, and H. Zhao, “A Survey on Security and Privacy Issues in Internet-of-Things,” IEEE Internet Things J.,
vol. 4, no. 5, pp. 1250–1258, 2017.
49. C. Liu, J. T. Marchewka, J. Lu, and C. S. Yu, “Beyond concern-a privacy-trust-behavioral intention model of electronic commerce,” Inf.
Manag., vol. 42, no. 2, pp. 289–304, 2005.
50. T. C. E. Cheng, D. Y. C. Lam, and A. C. L. Yeung, “Adoption of Internet Banking: An Empirical Study in Hong Kong,” Decis. Support
Syst., vol. 42, no. 3, pp. 1558–1572, 2006.
51. S. Gupta and H. Xu, “Examining the Relative Influence of Risk and Control on Intention to ... Examining the Relative Influenc e of Risk
and Control on Intention to Adopt Risky Technologies Examining the Relative Influence of Risk and Control on Intention to ...,” J.
Technol. Manag. Innov. 2010, vol. 5, no. 4, pp. 1–10, 2010.
52. A. Zorotheos and E. Kafeza, “Users’ perceptions on privacy and their intention to transact online: a study on Greek internet users,” Direct
Mark. An Int. J., vol. 3, no. 2, pp. 139–153, 2009.
53. M. Deb and E. Lomo-David, “An empirical examination of customers’ adoption of m-banking in India,” Mark. Intell. Plan., vol. 32, no.
4, pp. 475–494, 2014.
54. M. M. Yenisey, A. A. Ozok, and G. Salvendy, “Perceived security determinants in e-commerce among Turkish university students,”
Behav. Inf. Technol., vol. 24, no. 4, pp. 259–274, 2005.
55. S. Ba, J. Stallaert, A. B. Whinston, and H. Zhang, “Choice of Transaction Channels: The Effects of Product Characteristics on Market
Evolution,” J. Manag. Inf. Syst., vol. 21, no. 4, pp. 173–197, 2005.
56. C. Changchit, R. Lonkani, and J. Sampet, “Mobile banking: Exploring determinants of its adoption,” J. Organ. Comput. Electron.
Commer., vol. 27, no. 3, pp. 239–261, 2017.
57. A. Bhatt, “Factors Affecting Customer’s Adoption of Mobile Banking Services.,” J. Internet Bank. Commer. 21(1), 1., 2016.
58. P. Guriting and N. O. Ndubisi, “Borneo online banking: evaluating customer perceptions and behavioural intention,” MRN Manag. Res.
News, vol. 291, no. 12, pp. 6–15, 2006.
59. M. N. Engwanda, “Factors Affecting Mobile Banking Adoption in the United States,” 2014.
60. [60] D. Lacmanovic, I. Lacmanovic, and B. Markoski, “Mobile Banking - Financial Services Technology,” pp. 1770–1774, 2012.
61. H. D. Yang and Y. Yoo, “It’s all about attitude: Revisiting the technology acceptance model,” Decis. Support Syst., vol. 38, no. 1, pp. 19–
31, 2004.
62. X. Cao and P. L. Mokhtarian, “The Intended and Actual Adoption of Online Purchasing,” pp. 8–10, 2005.
63. Puschel and Mazzon, “Mobile banking: proposition of an integrated adoption intention framework,” Int. J. Bank Mark., vol. 28, no. 5, pp.
389–409, 2010.
64. H.-F. Lin, “An empirical investigation of mobile banking adoption: The effect of innovation attributes and knowledge-based trust,” Int. J.
Inf. Manage., vol. 31, no. 3, pp. 252–260, 2011.
65. M. G. Aboelmaged and T. R. Gebba, “Mobile Banking Adoption : An Examination of Technology Acceptance Model and Theory of
Planned Behavior,” Int. J. Bus. Res. Dev., vol. 2, no. 1, pp. 35–50, 2013.
66. S. H. S. Bidarra, M. Leiva, and L. Cabanillas, “The determinants of mobile banking acceptance: conceptual development and emp irical
analysis,” Int. J. Manag. Sci. Inf. Technol., no. 8, pp. 7–34, 2013.
67. G. A. Balabanoff, “Mobile Banking Applications: Consumer Behaviour, Acceptance and Adoption Strategies in Johannesburg, South
Africa (RSA),” Mediterr. J. Soc. Sci., vol. 5, no. 27, pp. 247–258, 2014.
68. T. Zhou, “Examining Location-Based Services Usage From the Perspectives of Unified Theory of Acceptance and Use of Technology
and Privacy Risk,” J. Electron. Commer. Res., vol. 13, no. 2, pp. 135–144, 2012.
69. I. Ahmad, “A Study o n Customers ’ Attitude towards Mobile Banking Adoption in India,” vol. 3, no. 11, pp. 49–70, 2015.
70. M. Saunders, P. Lewis, and A. Thornhill, Sixty new dragonfly and damselfly species from Africa (Odonata), vol. 44, no. 4. 2016.
71. J. E. Hair and G. T. M. Huf, A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM), vol. 46, no. 1–2. 2014.
72. R. B. Kline, Principles and Practice of Structural Equation Modeling. New York: Guilford Press, 1998.
73. D. Littler and D. Melanthiou, “Consumer perceptions of risk and uncertainty and the implications for behaviour towards innovative retail
services: The case of Internet Banking,” J. Retail. Consum. Serv., vol. 13, no. 6, pp. 431–443, 2006.
74. M. M. Kaya, “Trust and Security Risks in Mobile Banking,” no. March, pp. 1–47, 2013.
75. K. Gbongli, Y. Peng, and O. Ackah, “Selection and ranking of perceived risk associated with mobile banking in West Africa: An AHP
Approach from customers’ perspective.,” Int. J. Sci. Eng. Res., vol. 7, no. 1, pp. 80–86, 2016.
76. S. M. Shuhidan, S. R. Hamidi, and I. S. Saleh, “Perceived Risk towards Mobile Banking: A case study of Malaysia Young Adulthood,”
IOP Conf. Ser. Mater. Sci. Eng., vol. 226, no. 1, pp. 1–15, 2017.
77. J. Joseph F Hair, G. T. M. Hult, C. M. Ringle, Hamburg, and M. Sarstedt, A Primer on Partial Least Squares Structural Equation
Modeling (PLS-SEM), 2nd ed. SAGE, 2016.
78. R. M. Baron and D. A. Kenny, “The Moderator-Mediator Variable Distinction in Social The Moderator-Mediator Variable Distinction in
Social Psychological Research: Conceptual, Strategic, and Statistical Considerations,” J. Pers. Soc. Psychol., vol. 51, no. 6, pp. 1173–
1182, 1986.
79. R. W. H. Bons, R. Alt, H. G. Lee, and B. Weber, “Banking in the Internet and mobile era,” Electron. Mark., vol. 22, no. 4, pp. 197–202,
2012.
80. C. Chen, “Perceived risk, usage frequency of mobile banking services,” An Int. J. Manag. Serv. Qual., vol. 23, no. 5, pp. 410–436, 2013.
81. Q. Yanga, C. Pang, L. Liu, D. Yend, and Michael Tarn, “Exploring consumer perceived risk and trust for online payments: An em pirical
study in China’s younger generation,” Comput. Human Behav., vol. 50, pp. 9–24, 2015.
82. U. Akturan and N. Tezcan, “Mobile banking adoption of the youth market,” Mark. Intell. Plan., vol. 30, no. 4, pp. 444–459, 2012.
83. M. Mahad, S. Mohtar, R. Z. Yusoff, and A. A. Othman, “Factor affecting mobile adoption companies in Malaysia,” Int. J. Econ. Financ.
Issues, vol. 5, pp. 84–91, 2015.

Authors: Tejaswi Jadhav, Shraddha Deshpande

Paper Title: Wideband Circularly Polarized Planer Inverted-F Antenna using Reactive Impedance Surface
Abstract: A wideband circularly polarized (CP) planar inverted-F antenna (PIFA) is proposed and designed
using reactive impedance surface (RIS) for mobile communication. PIFA with RIS is used for CP radiation, size
reduction and wideband of the proposed CP-PIFA. It is a different technique for improving the various performance
parameters of the antenna, that is, narrow bandwidth, size reduction, and the axial ratio (AR). The structure of
circular polarized PIFA is designed, analyzed, geometrically optimized, and implementation of the antenna to
operate at 2.4 GHz WLAN bands. Finally, a proposed CP-PIFA is analyzed and simulated using full 3D
electromagnetic high-frequency structure simulator (HFSS). The measured impedance bandwidth of designing an
antenna (S11) 10-dB is 1399 MHz (1.542-2.943 GHz) 58.29\%, simulated 3-dB axial ratio bandwidth is 870 MHz
(1.639-2.50 GHz) 36.25\%, measured voltage standing wave ratio (VSWR) is 1.02 and the realized gain is 8.1 dB
for the 2.4 GHz WLAN bands.

Keyword : Planar Inverted-F Antenna, Reactive Impedance Surface, Wideband, Circular Polarization, Axial
Ratio.
737.
References: 4240-
1. X.-Z. Lai, Z.-M. Xie, X.-L. Cen, and Z. Zheng, “A novel technique for broadband circular polarized pifa and diversity pifa systems,”
Progress In Electromagnetics Research, vol. 142, pp. 41–55, 2013. 4245
2. C. Y. Chiu, K. M. Shum, and C. H. Chan, “A tunable via-patch loaded pifa with size reduction,” IEEE transactions on antennas and
propagation, vol. 55, no. 1, pp. 65–71, 2007.
3. N. L. Bohannon and J. T. Bernhard, “Design guidelines using characteristic mode theory for improving the bandwidth of pifas,” IEEE
Transactions on Antennas and Propagation, vol. 63, no. 2, pp. 459– 465, 2014.
4. H. Wong, K. K. So, K. B. Ng, K. M. Luk, C. H. Chan, and Q. Xue, “Virtually shorted patch antenna for circular polarization,” IEEE
Antennas and Wireless Propagation Letters, vol. 9, pp. 1213–1216, 2010.
5. K. Agarwal, A. Alphonse et al., "Compact asymmetric-cross slotted microstrip antenna on reactive impedance surface," in 2012 IEEE
AsiaPacific Conference on Antennas and Propagation. IEEE, 2012, pp. 51–52.
6. Y. Dong, H. Toyao, and T. Itoh, “Compact circularly-polarized patch antenna loaded with metamaterial structures,” IEEE transactions
on antennas and propagation, vol. 59, no. 11, pp. 4329–4333, 2011.
7. K. Agarwal, A. Alphonse et al., "Design of compact circularly polarized microstrip antennas using meta-surfaces," in 2013 European
Microwave Conference. IEEE, 2013, pp. 1067–1070.
8. N. Jeevanandham, K. Agarwal, A. Alphonse et al., "Dual-band circularly polarized hexagonal-slot antenna," in 2012 9th European
Radar Conference. IEEE, 2012, pp. 508–511.
9. Y. Yao, X. Wang, X. Chen, J. Yu, and S. Liu, "Novel diversity/Mimo pifa antenna with broadband circular polarization for multimode
satellite navigation," IEEE Antennas and Wireless Propagation Letters, vol. 11, pp. 65–68, 2012.
10. A. Motevasselian and W. G. Whittow, "Patch size reduction of rectangular microstrip antennas using a cuboid ridge," IET Microwaves,
Antennas & Propagation, vol. 9, no. 15, pp. 1727–1732, 2015.
11. L. Bernard, G. Chartier, and R. Sauleau, "Wideband circularly polarized patch antennas on reactive impedance substrates," IEEE
Antennas and Wireless Propagation Letters, vol. 10, pp. 1015–1018, 2011.
12. D. Chandu, R. K. Barik, and S. Karthikeyan, "Triple-band circularly polarized antenna on a two-layered high impedance surface with
two in-phase reflection bands," in 2017 47th European Microwave Conference (EuMC). IEEE, 2017, pp. 600–603.
13. K. Agarwal, A. Alphonse et al., "Wideband circularly polarized AMC reflector backed aperture antenna," IEEE Transactions on antennas
and propagation, vol. 61, no. 3, pp. 1456–1461, 2012.
14. J. Chatterjee, A. Mohan, and V. Dixit, "Broadband circularly polarized h shaped patch antenna using reactive impedance surface,” IEEE
Antennas and Wireless Propagation Letters, vol. 17, no. 4, pp. 625–628, 2018.
15. S. Jagtap, A. Chaudhuri, N. Chaskar, S. Kharche, and R. K. Gupta, “A wideband microstrip array design using ris and prs layer s,” IEEE
Antennas and Wireless Propagation Letters, vol. 17, no. 3, pp. 509– 512, 2018.
16. S. Nelaturi and N. V. S. N. Sarma, "A compact microstrip patch antenna based on metamaterials for wi-fi and WiMAX applications,"
Journal of Electromagnetic Engineering and Science, vol. 18, no. 3, pp. 182–187, 2018.
17. G. Samanta and S. R. Bhadra Chaudhuri, “Design of a compact cp antenna with enhanced bandwidth using a novel hexagonal ring based
reactive impedance substrate,” Progress In Electromagnetics Research, vol. 69, pp. 115–125, 2018.
18. Z. Zhang, W. Chen, J. Fu, P. Li, B. Lv, and Z. Wang, “Circularly polarized patch array antenna based on reactive impedance surface,”
IET Microwaves, Antennas & Propagation, vol. 12, no. 14, pp. 2213–2217, 2018.
19. S. X. Ta and I. Park, “Low-profile broadband circularly polarized patch antenna using metasurface,” IEEE Transactions on Antennas and
Propagation, vol. 63, no. 12, pp. 5929–5934, 2015.

Authors: S.N.Padhi, G.Bhavani,V. Naga Sudha, K.S.Raghuram, T.Rout

Paper Title: Effect of Hub Radius on Rotational Stability of Functionally Graded Timoshenko Beams
Abstract: This work is concerned to examine the rotational stability of functionally graded cantilever
Timoshenko beams. Power law with various indices as well as exponential law were used to find out the effect of
hub radius parameter on the stability of both functionally graded ordinary (FGO) beam. Floquet’s theory was used
to establish the stability boundaries. The governing equation of motion was followed by Hamilton’s principle and
solved by Finite element method. Dependence of Bulk modulus on thickness of beam was studied using both power
law and exponential distribution. The influence of hub radius parameter was found to be enhancing the stability of
FGO beams. It has further been confirmed that the effect of hub radius with exponential distribution of constituent
phases renders better stability compared to power law distribution of the phases in the functionally graded
material(FGM).

Keyword : Exponential law, FGO beam, hub radius, Power law, Stability.
References:
1. Madhusudan S., Sarcar M.M.M., Rao N.B.R.M., “Mechanical properties of Aluminum-Copper(p) composite metallic materials”, Journal
of Applied Research and Technology,2016, Vol.14(5), pp:293-299.
2. Madhusudan S., Madhukiran J., Varma D.P., Raju C.R., “Experimental studies on hygric strain behaviour of Jute-Pineapple hybrid
composites”, International Conference on Electrical, Electronics, and Optimization Techniques, ICEEOT 2016,pp:4387-4391.
3. Baburaja K., Venkatasubbaiah K., Kalluri R., “Hybrid materials of aluminium”, Materials Today: Proceedings,2016, Vol.3(10), pp:4140-
4145.
4. Baburaja K., Kumar G.A., Venkatesh L., Yogesh M., Gowtham M.G.S., Kishore D.S.C., “Structure and property relation of hybrid
738. aluminium composite”, International Journal of Mechanical Engineering and Technology,2017,Vol.8(5),pp:344-350.
5. T. Yokoyama, “Free vibration characteristics of rotating Timoshenko beams,” International Journal of Mechanical Sciences, 1988,
Vol.30(10), pp: 743-755. 4246-
6. R. T. Wang, “Vibration of multi-span Timoshenko beams to a moving force,” Journal of Sound and Vibration, 1997, Vol.207(5), pp: 731- 4251
742.
7. S. C. Lin and K. M. Hsiao, “Vibration analysis of a rotating Timoshenko beam,” Journal of Sound and Vibration, 2001, Vol.240(2), pp:
303-322.
8. J. S. Wu and L. K. Chiang, “Out-of-plane responses of a circular curved Timoshenko beam due to a moving load,” International Journal
of Solids and Structures, 2003, Vol.40(26), pp: 7425-7448.
9. A. Bazoune, “Effect of tapering on natural frequencies of rotating beams,” Shock and Vibration, 2007., Vol.14(3), pp:169–179.
10. D.R. Jackson and S. O. Oyadiji, “Free Vibration Analysis of Rotating Tapered Bresse-Rayleigh Beams Using the Differential
Transformation Method,” Proceedings of the ASME 2009 International Design Engineering Technical Conferences & Computers and
Information in Engineering Conference,2009, pp:1-9.
11. S.C.Mohanty, R.R.Dash and T. Rout, “Free Vibration of a Functionally Graded Rotating Timoshenko Beam Usin g FEM,” Advances in
Structural Engineering, 2013,Vol. 16(2), pp:405–418.
12. F. Ebrahimi and M. Mokhtari, “Transverse vibration analysis of rotating porous beam with functionally graded microstructure u sing the
differential transform method,” Journal of the Brazilian Society of Mechanical Sciences and Engineering, 2015,Vol.37(4),pp:1435-1444.
13. F. Ebrahimi and M. Mokhtari, “Free Vibration Analysis of a Rotating Mori–Tanaka-Based Functionally Graded Beam via Differential
Transformation Method,” Arabian Journal for Science and Engineering, 2016,Vol.41(2),pp: 577-590.
14. [14] B. Panigrahi and G. Pohit, “Effect of cracks on nonlinear flexural vibration of rotating Timoshenko functionally graded material
beam having large amplitude motion,” Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering
Science, 2018,Vol. 232 (6),pp:930-940.
15. S.N.Padhi, T.Rout, K.S.Raghuram, “Parametric instability and property variation analysis of a rotating cantilever FGO beam”,
International Journal of Recent Technology and Engineering, 2019,Vol.8(1),pp:2921-2925.
16. S.N.Padhi, K.S.Raghuram, T.Rout, V.Naga Sudha, Gill Santosh Kumar, “Mechanical Property Variation of a Rotating Cantilever FG SW
Beam under Parametric Excitation”, International Journal of Innovative Technology and Exploring Engineering,2019, Vol.8(11),pp:495-
499.
17. Ning Zhang, Tahir Khan, Haomin Guo, Shaoshuai Shi, Wei Zhong and Weiwei Zhang,”Functionally Graded Materials: An Overview of
Stability,Buckling, and Free Vibration Analysis,” Advances in Materials Science and Engineering,Vol.2019,pp:1-18.

Authors: S.Swapna Sabari,AVSKamesh


Role of Training in Information Technology in Enhancing Employee Efficiency in Banking Sector in
Paper Title:
739. India
Abstract: The evolution of information technology is seen as a response to the growing needs for business
4252-
organizations to keep abreast with industry trends, as well as necessary needs and preferences of employees, other
4256
stakeholders. From current literature most of the studies document several factors that continue to experience
positive effects relative to the banking industry’s increasing adoption of IT. Some of these factors (which play a
moderating role in assuring improved performance, productivity or efficiency among employees) include work
infrastructure, ease of use, enhanced coordination, skill compatibility, confidence, effective time management, the
creation of trust, and higher employee returns (through improved service quality). The present paper suggest that IT
implementation through training has led to skill improvements among employees and also yielded a positive,
supportive work environment that has, in turn, motivated workforces towards supporting the vision and mission or
banking institutions with which they work.

Keyword : Training, Banks, Employees, Efficiency, Information Technology.


References:
1. Michel Armstrong(1984),A literature review on training
& development and quality of work life Source : Personnel Management, Mc Graw Hill;6 th Edition Management.
2. Edwin B Flippo (1984) International student edition, Mc Graw-Hill International Editions Series.
3. Dale.S.Beach (2000), source: Managing People at work.
4. Drucker, P.F (1974).Management, Tasks, Responsibilities, Practices, New York: Harper& Row.
5. Doucouliagos.C. and Laroche, P. (2002) Efficiency, Productivity and Employee Relations in French Equipment Manufacturing,Cahier de
recherché, 3, 1-27.
6. Gupta, S. and Yadav, A. (2017). The Impact of Electronic Banking and Information Technology on the Employees of Banking Sector.
SAGE Journals, 42(4), 379-387.
7. Gupta, S. and Yadav, A. (2017). The Impact of Electronic Banking and Information Technology on the Employees of Banking Secto r.
SAGE Journals, 42(4), 379-387.
8. Raj. A, Akash. T & Rao. B.N (2017) A Study on Role of Technology in Banking Sector. International Journal of Research, 4610-4622.
9. Hassan.S.U, Maman.A, & Farouk, M.A (2013) Electronic banking products and performance of Nigerian listed deposit money banks.
American Journal of Computer Technology & Application, 1(10), 138-148.
10. Rajesh & Palpandi (2015) A Study on Impact of Information Technology in Banking Sector with Reference to Southern Tamilnadu.
International
11. Hosein, S. S. M. (2013). Consideration the effect of e-banking on bank profitability; Case study selected Asian countries. Journal of
Economics & Sustainable Development, 4(11), 112-117
12. Jain, R. K. & Natarajan, R. (2011). Factors influencing the outsourcing decisions: A study of the banking sector in India. Strategic
Outsourcing: An International Journal, 4, 294-322
13. Jani.M.J & Raval.B.M. (2012). An analytical study of employee’s productivity in some selected nationalized banks in India. In dian
Journal of Applied Research, 1(9), 19-20
14. Kanayi, A. (2012). Building tomorrow’s enterprise: The role of technology in building sustainable banking. Finacle, Infosys Ltd.
Bangalore, India
15. Kaur.N&Bhatia.A (2016). Productivity in Indian banking sector – A study of SBI group. International Journal of Business Management
and Scientific Research, 19, 79-93
16. Khan, S. (2017). Technological Change, Financial Innovation, and Diffusion in Indian Banking Sector – A Move towards the Next Orbit.
International Journal of Scientific Research and Management, 5(7), 6075-6091
17. Khrawish.H.A& Al-SA’di.N.M (2011). The impact of e-banking on bank profitability: Evidence from Jordan. Middle Eastern Finance &
Economics, 13, 142-158
18. Kuchara.V (2012). A Study on Customers’ Perception towards Internet Banking at Ahmedabad City. Indian Journal of Resea rch, 1, 83-
85
19. Laudon, K. C. & Laudon, J. P. (2012). Management Information Systems, Managing The Digital Firm (12 th Ed.). New Jersey: Pearson
Education.
20. Lerner.J. &Tufano, P. (2011). The Consequences of Financial Innovation: A Counterfactual Research Agenda. NBER Working Paper,
16780
21. Manjushree, S. (2014). An implementation of Core Banking Solution with special reference to SBI, Shivamoogga. Sai Om Journal of
Commerce and Management, 1, 25-34
22. Mermod, A. Y. (2011). Customer's Perspectives and Risk Issues on E-Banking in Turkey; Should We Still be Online. The Journal of
Internet Banking and Commerce, 16
23. Mohan, P. and Madhu K. (2014). Information technology and its role in Indian banking sector. International Journal of Busines s and
Administration Research Review, 2(7), 1-7, 2014
24. Nair, N. (2014). Role of Information Technology in Banking Sector in India. IBMRD's Journal of Management and Research, 3(1), 334-
346
25. Nayak, N., Nath, V. & Goel, N. (2014). A Study of Adoption Behavior of Mobile Banking Services by Indian Consumers. International
Journal of Research in Engineering & Technology, 2, 209-222
26. Obeng, A.Y, & Mkhize, P. L. (2017). An exploratory analysis of employees and customers’ responses in determining the technolo gical
innovativeness of banks. The Electronic Journal of Information Systems in Developing Countries, 80(1), 1-23
27. Patel.H & Pithadia.V (2013) Impact of globalization on Indian banking sector. International Monthly Refereed Journal of Resea rch in
Management and Technology.
28. Praful.S.G (2013) Customer Perception towards Products and Services of State Bank of India with Special Reference to Yavatmal
District. International Journal of Commerce, Business and Management, 2, 194-201
29. Kavita Rani, Diksha Garg(2014),A Study on Training and Development in Public Sector Banks, Research Scholar, Kurukshetra
University, Kurukshetra,International Journal of Management and Social Sciences Research (IJMSSR),Volume 3, No. 1.
30. John W.Budd & Alexander J.S.colvin (2004) Improved metrics for workplace dispute, resolution procedures: Efficiency, Equity& voice.
31. Kristina Palckova (2016), university of zilina, Motivation, Performance and Efficiency
32. Rupanjali Nath, Kanika T Bhaland Geetika T Kapoor (2013), Factors influencing ITAdopting by Bank Employees: An Extended TAM
Approach, Vikalpa, volume 38.NO 4.
33. Asare Y Obeng,Peter L Mkhize(2017) University of South Africa, An Exploratory Analysis of Employees and Customers Responses in
Determining the Technological Innovativeness of Banks,www.ejisdc.org.
34. Parastoo Roghanian, AmranRasli HamedGheysaria, Productivity through Effectiveness and Efficiency in the Banking Industry,
ELSEVIER (2012).
35. Muhammad Imran, Nadeem Maqbool&Huzaifhshafique (2014) Impact of Technological Advancement on Employee Performance in
Banking Sector, International Journal of Human Resource Studies ISSN 2162-3058 2014, Vol. 4, No. 1.
36. JagdishN.Sheth, RajendraS.Sisodia (2002), Marketing Productivity Issues and analysis Journal of Business Research 55,349 -362,
ELSEVIER.
37. Matthew O. Jackson (2003), A Survey of Models of Network Formation: Stability and Efficiency ∗ Revision: November 29, 2003
appears as Chapter 1 in the volume Group Formation in Economics: Networks, Clubs, and Coalitions, edited by Gabrielle Demange and
Myrna Wooders from Cambridge University.
Chan, F.T.S (2003), Performance Measurement in a Supply Chain,the International Journal of Advanced Manufacturing
Technology, ISSN: 0268-3768 (Print) 1433-3015 (Online)
Authors: Tarun Gupta, Amit Kumar Garg
An Efficient Scheme on Adaptable Priority-Based Routing and Wavelength Assignment Algorithm for
Paper Title:
Enhanced Quality of Service
Abstract: Current research interests have diverted towards the efficient priority-based routing and wavelength
assignment strategy in order to enhance the quality of service in the distributed optical networks. The traditional
RWA techniques such as Adaptive Routing (AR), Non priority based RWA schemes etc. are lacking of capability
to reduce both the blocking probability and average end to end delay simultaneously during the transmission of
networks. In this paper, an Adaptable Priority-based RWA (APRWA) schemes for optical network has been
demonstrated and evaluated by utilizing the performance enhancing metric such as reduction in hop count while
simultaneously handling distinguishable traffic volume. The simulation result shows considerable reduction both in
the blocking probability (approx. 25%) as well as in average end to end delay near around (15 msec.) in comparison
to conventional RWA techniques.

Keyword : Alternate path routing, QoS, Lightpath, Wavelength assignment strategy, Blocking probability.
References:
1. Barpanda, Ravi Sankar, Ashok Kumar Turuk, and Bibhudatta Sahoo. "QoS aware routing and wavelength allocation in optical burst
switching networks using differential evolution optimization." Digital Communications and Networks, vol. 4, no. 1, pp. 3-12, 2018.
2. Ebrahimzadeh, Amin, Akbar Ghaffarpour Rahbar, and Behrooz Alizadeh. "Request differentiation in dynamic light-path establishment for
WDM routed all optical networks of data centers." Optical Fibre Technology, vol. 21, no. 2, pp. 73-80, 2015.
3. Neal Charbonneau. Static Routing and Wavelength Assignment for Multicast Advance Reservation in All-Optical Wavelength-Routed
WDM Networks. In IEEE/ACM Transactions on Networking (TON) vol. 20, no. 1, pp. 15-20, 2012.
4. Bhanja, Urmila, and Debajyoti Mishra. "Dynamic routing and wavelength assignment using fuzzy logic controller in WDM optical
networks." In 2015 International Conference on Signal Processing and Communication (ICSC), vol.8, pp. 380-385, 2015.
5. Bonani, Luiz H., and Majid Forghani-Elahabad. "An improved least cost routing approach for WDM optical network without wavelength
converters." Optical fibre Technology, vol. 32, issue 5, pp. 30-35, 2016.
740. 6. D. Banerjee, B. Mukherjee, Wavelength-routed optical networks: Linear formulation, resource budget trade-offs and a reconfiguration
study, IEEE/ACM Transactions on Networking, vol. 8, no. 9, pp. 598–607, Oct. 2000.
7. E. Karasan and E. Ayanoglu, “Effects of Wavelength Routing and Selection Algorithms on Wavelength Conversion Gain in WDM Optical 4257-
Networks,” IEEE/ACM Transactions on Networking, vol. 6, no. 2, pp. 186-193, April 2008. 4260
8. Asuman E. Ozdaglar and Dimitri P. Bertsekas Routing and Wavelength Assignment in Optical Networks. In Networking, IEEE/ACM
Transactions, vol. 11, no. 2, pp. 220-230, 2003.
9. G Shen, T.H Cheng, S.K Bose, C Lu, T.Y Chai, H.M.M Hosseini. Approximate analysis of limited-range wavelength conversion all-
optical WDM networks. In Computer Communications; vol. 24, no. 10, pp. 126-130, 2001.
10. Shan, D.M., Chua, K.C., Phung, M.H., Mohan, G.: Priority-based offline wavelength assignment in OBS networks. IEEE Trans.
Communications; vol. 56, no. 10, pp. 1694–1704, 2008.
11. D. Mishra and U. Bhanja, “FWM Aware Fuzzy Dynamic Routing and Wavelength Assignment in Transparent Optical Networks”,
International Journal of Electrical, Electronic and Communication Engineering, vol. 9, issue 8, pp. 981-990, 2015.
12. N. Charbonneau and V.M. Vokkarane, “Static Routing and Wavelength Assignment for Multicast Advance Reservation in All-Optical
Wavelength-Routed WDM Networks”, IEEE/ACM TRANSACTIONS ON NETWORKING, vol. 20, issue 1, pp. 1-14, 2012.
13. A.G. Rahbar, “Review of Dynamic Impairment-Aware Routing and Wavelength Assignment Techniques in All-Optical Wavelength
Routed Networks”, IEEE COMMUNICATIONS SURVEYS & TUTORIALS, vol. 14, issue 4, pp. 1065-1089, 2012.
14. A.N. Khan and P. Saengudomlert, “Design based routing and wavelength assignment in WDM networks using link-based multiplexing
gain”, Optical Switching and Networking, vol. 15, no. 10, pp. 111-120, 2015.
15. Rajalakshmi, P., Jhunjhunwala, A. Wavelength reassignment algorithms for all-optical WDM backbone networks. Opt. Switch. Networks,
vol. 4, no. 3, pp. 147–156, 2007.
16. X. Wang, M. Brandt-Pearce, and S. Subramaniam, “Distributed grooming, routing, and path length-based wavelength assignment for
dynamic optical networks using ant colony optimization”, IEEE/OSA Journal of Optical Communications and Networking, vol. 6, issue 6,
pp. 578-589, 2014.
17. M. Dell' Orco, M. Marinelli, and M.A. Silgu, “Bee Colony Optimization for innovative travel time estimation, based on a mesoscopic
traffic assignment model”, Transportation Research Part C: Emerging Technologies, vol. 66, issue 2, pp. 48-60, 2016.
18. A. de Sousa, C.B. Lopes, and P. Monteiro, “Lightpath Admission Control in Dynamic Optical Transport Networks”, Electronic Notes in
Discrete Mathematics, vol. 52, issue 8, pp. 205-212, 2016.
19. Y. Dong, S. Zhao, H. dan Ran, Y. Li, and Z. Zhu, “Routing and wavelength assignment in a satellite optical network based on a nt colony
optimization with the small window strategy”, IEEE/OSA Journal of Optical Communications and Networking, vol. 7, issue 10, pp. 995 -
1000, 2015.
20. Y.S. Kavian, A. Rashedi, A. Mahani, and Z. Ghassemlooy, “Routing and wavelength assignment in optical networks using Artificial Bee
Colony algorithm”, Optik - International Journal for Light and Electron Optics, vol. 124, issue 12, pp. 1243-1249, 2013.

Authors: Manish N. Kapse, Sunil Kumar


Low Resolution Face Recognition System Performance for Basic Feature Space Methods with Various
Paper Title:
Illumination Normalization Techniques
Abstract: The Face recognition research identified with the field of automated surveillance systems in real life
application has pulled in more consideration today with extensive use of vision cameras in biometrics and
surveillance applications, globally. The small size images or poor quality images are generally Low Resolution
images. Authenticating faces, with variation in pose, illumination, disguise and more, from such Low-resolution
741. images, is the main purpose of Low Resolution Face Recognition (LR FR) system. We have assessed the LR FR
system for various basic feature space techniques like PCA, LDA and Fisherface. Different illumination
4261-
normalization techniques are applied on the cropped Yale face database prior to feature extraction and
4264
identification. In our work the low-resolution images, of size 32x32, are the down-sampled versions high-resolution
facial images from cropped Yale face database. Our experiment demonstrates the encouraging performance, with
recognition accuracy as 97.43%, on Low Resolution, Low quality face images.

Keyword : Feature space, Feature extraction, Illumination Normalization, Low Resolution Face Images, LRFR.
References:
1. Xiang Xu, Wanquan Liu, Ling Li, “ Low Resolution Face Recognition in Surveillance Systems”, Journal of Computer and
Communications, 2014,2,70-77.
2. Wilman W. W. Zou, and Pong C. Yuen, “Very Low Resolution Face Recognition Problem , IEEE Transactions On Image
Processing”, Vol. 21, No. 1, January 2012.
3. Srimanta Mandal, Shejin Thavalengal, Anil Kumar Sao, “Explicit and implicit employment of edge-related information in super-
resolving distant faces for recognition”, Pattern Anal Applic, Springer-Verlag , London 2015.
4. Manish N. Kapse Dr. Sanjay V. Dudul, “A survey on of Low Resolution Face Recognition based on direct approaches”,
International Journal of Innovative Research in Computer and Communication Engineering, Vol. 4, Issue 11, November 20
5. Vo Dinh Minh Nhat, SungYoung Lee, Hee Yong Youn, “Whitened LDA for Face Recognition” , CIVR’07,ACM, July 2007
6. Gheorghita Ghinea1, Rajkumar Kannan, And Suresh Kannaiyan, “Gradient-Orientation-Based PCA Subspace for Novel Face
Recognition”, IEEE Access, VOLUME 2, 2014
7. Jae Young Choi, Yong Man Ro, “Color Face Recognition for Degraded Face Images” , IEEE Transactions On Systems, Man, And
Cybernetics—Part B: Cybernetics, Vol. 39, No. 5, October 2009
8. Samik Banerjee, Suranjana Samanta, Sukhendu Das, “Face Recognition in Surveillance Conditions with Bag-of-words, using
Unsupervised Domain Adaptation”, Association for Computing Machinery.ICVGIP ’14, December.
9. ZhifeiWang, Zhenjiang Miao, Q.M. JonathanWu, YanliWan , Zhen Tang, “Low-resolution face recognition: a review”, Vision
Computing (2014) 30:359–386
10. Huu-Tuan Nguyen and Alice Caplier, “Local Patterns of Gradients for Face Recognition”, IEEE Transactions on Information
Forensics And Security, Vol. 10, No. 8, August 2015, pp 1739.
11. Shih-Ming Huang, Yang-Ting Chou, Jar-Ferr Yang, “Low-resolution face recognition in uses of multiple-size discrete cosine
transforms and selective Gaussian mixture models”, IET Computer Vision, 2014, Vol. 8, Iss. 5, pp. 382–390.
12. Zhenyu Wang , Wankou Yang , Xianye Ben, “Low-resolution degradation face recognition over long distance based on CCA”, The
Natural Computing Applications Forum 2015.
13. Joshua C. Klontz, Anil K. Jain, “A Case Study of Automated Face Recognition: The Boston Marathon Bombings Suspects” IEEE
Computer Society November 2013.
14. Le An, Mehran Kafai, and Bir Bhanu,” Dynamic Bayesian Network for Unconstrained Face Recognition in Surveillance Camera
Networks”, IEEE Journal on Emerging And Selected Topics In Circuits And Systems, Vol. 3, No. 2, June 2013, 155.
15. Wilman W. Zou, Pong C. Yuen, and Rama Chellappa, “Low-Resolution Face Tracker Robust to Illumination Variations”, IEEE
Transactions on Image Processing, Vol. 22, No. 5, May 2013.
16. Chuan-Xian Ren, Dao-Qing Dai, and Hong Yan,” Coupled Kernel Embedding for Low-Resolution Face Image Recognition”, IEEE
Transactions on Image Processing, Vol. 21, No. 8, August 2012.
17. Yang-Ting Chou, Shih-Ming Huang and Jar-Ferr Yang, Chou, “Class-specific kernel linear regression classification for face
recognition under low-resolution and illumination variation conditions”, EURASIP Journal on Advances in Signal Processing (2016).
18. Hae-Min Moon, Chang Ho Seo, Sung Bum Pan, “A face recognition system based on convolution neural network using multiple
distance face” Springer-Verlag Berlin Heidelberg 2015.
19. Daniel F. Smith, Arnold Wiliem, and Brian C. Lovell, “Face Recognition on Consumer Devices: Reflections on Replay Attacks” ,
IEEE Transactions on Information Forensics And Security, Vol. 10, No. 4, April 2015.
20. Kuang-Chih Lee, Jeffrey Ho, and David Kriegman, “Acquiring Linear Subspaces for Face Recognition under Variable Lighting”,
IEEE Transactions On Pattern Analysis And Machine Intelligence, Vol. 27, No. 5, May 2005.
21. Athinodoros S. Georghiades, Peter N. Belhumeur and David J. Kriegman, “From Few to Many: Illumination Cone Models for Face
Recognition under Variable Lighting and Pose”, IEEE Transactions On Pattern Analysis And Machine Intelligence, Vol. 23, No. 6 ,
June 2001.

Authors: G. Bhaskar Phani Ram, C. Mounika

Paper Title: IoT Based Voice Controlled Multitasking System for Home
Abstract: Internet of Things is a rising innovation that makes our world more astute. In recent years, there has
been immense development in the realm of insightful gadgets for home mechanization. Such contraptions are
planned so as to facilitate communication among individuals and everyday home obligations. This paper exhibits a
voice-controlled smart home with multi-functions using ESP32 as the wireless choice. Voice control (using human
voice to control any load like light, fan, ac, geyser, motor etc.). The voice-commands are recognized by a dedicated
hardware module and the recognized data is sent to database using ESP32. On the accepting unit, raspberry pi
peruses the information from the database and deciphers the directions verbally expressed by the client and controls
the family unit apparatuses.

Keyword : Rasberrypi3, Esp32, MQ-32 Sensor, PIR Sensor, Flame sensor, GSM, GPS, Firebase, Relay, voice
742. module.
4265-
References: 4268
1. J. Stragier, L. Hauttekeete, L. Marez, Introducing Smart Grids in Residential Contexts: Consumers' Perception of Smart Househ old
Appliances, Belgium, pp. 1-2, 2010.
2. P. Waher, Learning Internet of Things, Birmingham, pp. 1-3, 2015
3. J. Chase, The Evolution of the Internet of Things, Texas Instruments, Texas, pp. 1-3, 2013
4. D. Zhang, L. Yang, H. Huang, Searching in Internet of Things: Vision and Challenges, Busan, 2011
5. K. Lueth, The 10 most popular Internet of Things applications right now, https://iot-analytics.com/10-internet-of-things-applications/,
pp. 1, February 2015
6. Nest Developers Documentation, http://developers.nest.com/, Last Access: April 20th 2016
7. Philips Hue Developer Program, http://developers.meethue.com/, Last Access: April 20th 2016
8. IoTivity, http://www.iotivity.org/, Last Access: April 24th 2016[8] IoTivity, http://www.iotivity.org/, Last Access: April 24th 2016
9. Lou Frenzel, Electronic Design, What’s the difference between ZigBee and Z-Wave?, pp. 1, March 29th 2012.
10. AppleHomeKit,http://www.apple.com/ios/homekit/, Last Access: April 24th 2016
11. Z-Wave Smart Lock, http://danalock.com/, Last Access: May 2016.
12. The Oplink Connected Alarm Shield, http://www.oplinkconnected.com/, Last Access: May 2016.
13. Samsung SmartThings Home Monitoring Kit, http://www.samsung.com/, Last Access: May 2016.

Authors: Venkata Ranga Rao Kommineni, Pavan Kumar Kolluru, Razeena Begum Shaik,
743.
Paper Title: Improved Health Care System in Fog Computing and WSN
Abstract: Fog computing is most widely used in many applications. This is the most advanced computing of
the various services in the cloud. Fog is considered as another layer that is a distributed network and is similarly
having an association with cloud computing and the internet of things (IoT). Health care is the one of the
dominating domain in present world. The healthcare with IoT has some of the drawbacks such as limited storage,
computing and accessing. To improve the performance the task scheduling algorithm is implemented. To overcome
this, in this paper, the novel healthcare system with fog computing and WSN is implemented. Results show the
performance of the proposed system.

Keyword : Fog computing, cloud, IoT.


References:
1. Nguyen Gia, T., Jiang, M., Rahmani, A. M., Westerlund, T., Mankodiya, K., Liljeberg, P., & Tenhunen, H. (2015). “Fog Computin g in
Body Sensor Networks: Energy Efficient Approach.” In IEEE International BSN’15.
2. Ahmad, Mahmood, et al. “Health Fog: a novel framework for health and wellness applications.” The JSC (2016): 1-19. 4269-
3. S. Das, M. Ballav, and S. Karfa, “Application of IoT in detecting health risks due to flickering artificial lights,” in Proceedings of the
ICACCI '15, pp. 2331–2334, IEEE, Kochi, India, 2015. 4271
4. X. Fafoutis, E. Tsimbalo, E. Mellios et al., “A residential maintenance-free long-term activity monitoring system for healthcare
applications,” EURASIP, vol. 2016, no. 1, p. 31, 2016.
5. World Health Organization, Global Status Report on Non-communicable Diseases 2014, World Health Organization, Geneva, Switzerland,
2014.
6. World Health Organization, New Perspectives on Global Health Spending for Universal Health Coverage, 2017.
7. Deloitte, 2018 Global Health Care Outlook: The Evolution of Smart Health Care”.
8. J. Kharel, H. T. Reda, and S. Y. Shin, “An architecture for smart health monitoring system based on fog computing,” Journal o f
Communications, vol. 12, no. 4, pp. 228–233, 2017.
9. F. A. Kraemer, A. E. Braten, N. Tamkittikhun, and D. Palma, “Fog computing in healthcare-a review and discussion,” IEEE Access, vol.
5, pp. 9206–9222, 2017.
10. Pavan Kumar Kolluru, Sri Vijaya Kondapalli, Meka Sowjanya, An Integrated Health Care System using IOT, IJRTE, ISSN: 2277-3878,
Volume-7, Issue-6S5, April 2019.
11. David Malan, Thaddeus Fulford-Jones, Matt Welsh, and Steve Moulton, “CodeBlue: An Ad Hoc Sensor Network Infrastructure for
Emergency Medical Care. In Proceedings of the MobiSys”, WAMES, June 2004.
12. G. Virone, A. Wood, L. Selavo, Q. Cao, L. Fang, T. Doan, Z. He,and J.A. Stankovic, “An Advanced Wireless Sensor Network for Health
Monitoring”, Conference on D2H2, April 2006.

Authors: M.S.R. Naidu, P. Rajesh Kumar

Paper Title: Multilevel Image Thresholding for Image Segmentation using Hybrid Algorithm
Abstract: Image thresholding is an extraction method of objects from a background scene, which is used most
of the time to evaluate and interpret images because of their advanced simplicity, robustness, time reduced, and
precision. The main objective is to distinguish the subject from the background of the image segmentation. As the
ordinary image segmentation threshold approach is computerized costly while the necessity for optimization
techniques are highly recommended for multi-tier image thresholds. Level object segmentation threshold by using
Shannon entropy and Fuzzy entropy maximized with hGSA-PS. An entropy maximization of hGSA-PS dependent
multilevel image thresholds is developed, where the results are best demonstrated in PSNR, misclassification,
structural similarity index and segmented image quality compared to the Firefly algorithm, adaptive cuckoo search
algorithm and the search algorithm gravitational.

Keyword : Entropy, Image thresholding, PNR, SSIM..


References:
1. Agrawal. S, R. Panda, S. Bhuyan, B.K. Panigrahi, “Tsallis entropy based optimal multilevel thresholding using cuckoo search a lgorithm”,
744. Swarm and Evolutionary Computation, Vol. 11 pp. 16–30, 2013.
2. Ayala. H, F. Santos, V. Mariani and L. Coelho, “Image thresholding segmentation based on a novel beta differential evolution approach”,
Expert Systems with Applications, Vol. 42, pp. 2136–2142, 2015. 4272-
3. Bhandari. A. K, A. Kumar, G. K. Singh, "Tsallis entropy based multilevel thresholding for colored satellite image segmentation using 4279
evolutionary algorithms”, Expert Systems With Applications, Vol. 42, pp. 8707–8730, 2015.
4. Bhandari. A. K, A. Kumar, G. K. Singh, " Modified artificial bee colony based computationally efficient multilevel thresholding for
satellite image segmentation using Kapur’s, Otsu and Tsallis functions”, Expert Systems With Applications, Vol. 42, pp. 1573 –1601, 2015.
5. Luca. A, S. Termini, A definition of a non-probabilistic entropy in the setting of fuzzy sets theory, Inf. Control 20 (1972) 301–312.
6. Horng. M and T. Jiang, “Multilevel Image Thresholding Selection based on the Firefly Algorithm”, Symposia and Workshops on
Ubiquitous, Autonomic and Trusted Computing, pp. 58–63, 2010.
7. Hussein. W. A, S. Sahran , S. Abdullah, “A fast scheme for multilevel thresholding base d on a modifie d b ees algorithm”, Kn owledge-
Based Systems, Vol. 101, pp. 114–134, 2016.
8. Kapur. J. N, P.K.Sahoo, A.K.C Wong, A new method for gray-level picture thresholding using the entropy of the histogram”, Computer
Vision Graphics Image Process. 29 (1985) 273 – 285.
9. Li. Y, L. Jiao, R. Shang, R. Stolkin, “Dynamic-context cooperative quantum-behaved particle swarm optimization based on multilevel
thresholding applied to medical image segmentation”, Information Sciences, Vol. 294, pp. 408–422, 2015.
10. Mbuyamba. M, J. Cruz-Duarte , J. Avina-Cervantes, C. Correa-Cely, D. Lindner, and C. Chalopin, “Active contours driven by Cuckoo
Search strategy for brain tumour images segmentation”, Expert Systems With Applications, Vol. 56, pp. 59–68, 2016.
11. Otsu. N, “A threshold selection from gray level histograms” IEEE Transactions on System, Man and Cybernetics 66, 1979.
12. Ouadfel. S and A. Taleb-Ahmed, “Social spiders optimization and flower pollination algorithm for multilevel image thresholding: A
performance study”, Expert Systems with Applications, Vol. 55 pp. 566–584, 2016.
13. Penga. H, J. Wangb, M. Pérez-Jiménezc, “Optimal multi-level thresholding with membrane computing”, Digital Signal Processing, Vol.
37, pp. 53–64, 2015.

745. Authors: Sengottaian K, Mohanrajhu N, Palani S, Jayabalan C


Paper Title: Design of Manure Spreader Machine for agricultural farm field
Abstract: The main aim of this project is to reduce the manual efforts of farmers in spreading manure or bio -
fertilizers and provide the most convenient and cost-effective way of spreading manure on farm fields. Cow dung is
vital for the fertilization of the farm land. So, to do all this there is a hectic process. Organic manure is an eco
friendly bio fertilizer used for more polluted new era. The appropriate use of manure for landing is necessary for
avoiding land pollution, the surface of the water as well as avoids the defeat of ammonia in addition to all another
nutrients through manure. Organic farming methods are appropriate and adoptable for many types of land in several
parts of India. Use of manpower for application of organic materials is uneconomical due to high labour cost. Thus,
it attracts wide attention in various parts of world. This not only reduces the cost but also protects the environment
and health of farmers.

Keyword : Farm fields, Health of farmers, Land pollution, Spreading manure


References:
1. Pawlak, H.; Nowakowicz-D ˛ebek, B. Agriculture: Accident-prone working environment. Agric. Agric. Sci. Procedia 2015, 7, 209–214.
2. Svendsen, K.; Aas, O.; Hilt, B. Nonfatal occupational injuries in Norwegian farmers. Saf. Health Work 2014, 5, 147 –151.
3. Suutarinen, J. Tractor accidents and their prevention. Int. J. Ind. Ergon. 1992, 10, 321–329.
4. Damas, S. Amélioration de la Sécurité des Épandeurs de Fumier. Rapport Stage Irstea; IRSTEA: Antony, France, 2010; pp. 1 –11. 4280-
5. Le Formal, F.; Tricot, N. Feasibility Study: Improvement of Manure Spreader Safety; Cemagref Report; Cemagref: Antony, France, 2009; 4284
pp. 1–15.
6. Bassit, L.; Le Formal, F.; Tricot, N. Improvement of Manure Spreaders Safety: Feasibility Study; Cemagref Report; Cemagref: Antony,
France, 2010; pp. 1–16.
7. Colantoni, A.; Ferrara, C.; Perini, L.; Salvati, L. Assessing trends in climate aridity and Vulnerability to soil degradation in Italy. Ecol.
Indic. 2015, 48, 599–604.
8. Stoate, C.; Boatman, N.D.; Borralho, R.J.; Rio Carvalho, C.; De Snoo, G.R.; Eden, P. Ecological impacts of arable intensification in
Europe. J. Environ. Manag. 2001, 63, 337–365.
9. Al assit, L.; Tricot, N. Improvement of Manure Spreaders Safety—Feasibility Study; Irstea Report; IRSTEA: Antony, France, 2013; pp. 1–
20.
10. W[Al Bassit, L.; Tricot, N. Improvement of Manure Spreader Safety in the Cleaning Phase—Feasibility Study. Action No. 2—Addendum;
Irstea Report; IRSTEA: Antony, France, 2014; pp. 1–12.
11. Svendsen, K.; Aas, O.; Hilt, B. Nonfatal occupational injuries in Norwegian farmers. Saf. Health Work 2014, 5, 147–151
12. Pawlak, H.; Nowakowicz-D ˛ebek, B. Agriculture: Accident-prone working environment. Agric. Agric. Sci. Procedia 2015, 7, 209–214
13. Lovarelli, D.; Fiala, M. Mechanisation of organic fertiliser spreading, choice of ] fertilise sr and crop residue management as solutions for
maize environmental impact mitigation. Eur. J. Agron. 2016, 79, 107–118
14. Azadeh, A.; Shams Mianaei, H.; Asadzadeh, S.M.; Saberi, M.; Sheikhalishahi, M. A flexible ANN-GA-multivariate algorithm for
assessment and optimization of machinery productivity in complex. J. Manuf. Syst. 2015, 35, 46–75
15. Booth, R.T. Machinery safety: Progress in the prevention of technological accidents. Saf. Sci. 1993, 16, 247–248
16. Sadeghi, L.; Mathieu, L.; Tricot, N.; Al Bassit, L. Developing a safety indicator to measure the safety level during design for safety. Saf.
Sci. 2015, 80, 252–263
Irina Antonova, Olga Evgrafova, Vasily Kuts, Natalia Kartamysheva, Ekaterina Surkova, Elena
Authors:
Konovalova
Paper Title: Innovative Factors of the Human Capital Development
Abstract: Purpose: Analysis and assessment of the quality of life of the urban and rural population in the
Siberian Federal District. Design/Methods/Approach: The study uses the methods of analogy and comparison, as
well as the monographic and statistical methods. Conclusions. The study clearly indicates a significant stratification
in incomes between representatives of urban and rural areas. Practical consequences: The result of this study
indicates that agriculture is experiencing serious problems; without taking further measures to improve the quality
of life of the population, the industry will remain without professional personnel. Originality/value: The structure of
incomes and expenditures of the population is analyzed, the most “favorable” and “unfavorable” regions for living
are determined based on average incomes.

Keyword : agriculture, human capital, quality of life, wages, human resources, income, expenses .
References:
746. 1. Alogali, A. (2018). World Englishes: Changing the Paradigm of Linguistic Diversity in Global Academia. Research in Social Sciences and
Technology, 3(1), 54-73. Retrieved from http://ressat.org/index.php/ressat/article/view/342 4285-
2. Akhmetshin, E. M., Dzhavatov, D. K., Sverdlikova, E. A., Sokolov, M. S., Avdeeva, O. A., & Yavkin, G. P. (2018). The influence of
innovation on social and economic development of the russian regions. European Research Studies Journal, 21(Special Issue 2), 767-776.
4290
3. Arribas, I.; Espinós-Vañó, M. D.; García, F.; Tamosiuniene, R. 2019. Negative screening and sustainable portfolio diversification,
Entrepreneurship and Sustainability Issues 6(4): 1566-1586. https://doi.org/10.9770/jesi.2019.6.4(2)
4. Baharuddin, B., & Dalle, J. (2019). Transforming learning spaces for elementary school children with special needs. Journal o f Social
Studies Education Research, 10(2), 344-365.
5. Boutelier, S. (2019). Limiting Learning Environments through Domestication. Journal of Culture and Values in Education, 2(1), 45-55.
Retrieved from http://cultureandvalues.org/index.php/JCV/article/view/29
6. Bozhkova, G. N., Shastina, E. M., Kalimullina, O. V., & Shatunova, O. V. (2019). Study of literary images of gifted characters in optional
activities as a means to develop capable and talented youth. Space and Culture, India, 7(1), 264-273. doi:10.20896/saci.v7i1.463
7. Bahri, Sumaryana, A., Karnaesih, E., & Karlina, N. (2019). The implementation of the allocation and distribution of school operational
assistance program for compulsory education units in kuningan regency, west java province. Journal of Social Studies Educatio n Research,
10(1), 178-192.
8. Bahzar, M. (2019). Authentic leadership in madrassas: Asserting islamic values in teacher performance. Journal of Social Studies
Education Research, 10(1), 259-284. Retrieved from www.scopus.com
9. Baidi. (2019). The role of parents’ interests and attitudes in motivating them to homeschool their children. Journal of Social Studies
Education Research, 10(1), 156-177.
10. Bentahar, A., & O’Brien, J. L. (2019). Raising students’ awareness of social justice through civic literacy. Journal of Socia l Studies
Education Research, 10(1), 193-218.
11. Bohdaniuk, O.; Buriak, R.; Savchuk, V. 2019. Competitiveness of horticultural products as a precondition of industry development,
Entrepreneurship And Sustainability Issues 6(4): 1587-1601. https://doi.org/10.9770/jesi.2019.6.4(3)
12. Dautov, G. F., Mingazova, L., Sayfulina, F. S., & Kayumova, G. F. (2018). Written heritage of the golden horde. [Patrimonio e scrito de la
horda de oro] Opcion, 34(Special Issue 14), 895-911.
13. Dharmawan, R., Nababan, M. R., Tarjana, M. S. S., & Djatmika. (2019). Mistranslation and maltranslation in a medical website:
Evidences from dorland’s medical dictionary. Journal of Social Studies Education Research, 10(1), 219-240.
14. Dmitrieva, I. S., Sharafutdinov, R. I., Gerasimov, V. O., Akhmetshin, E. M., & Pavlov, S. V. (2017). Method evaluation of the human
capital with its innovational potential consideration and perspectives of regional development: The example of the Republic o f Tatarstan
and Volga Federal District regions. Espacios, 38(40)
15. Dube, B. (2019). Examination mafiarisation, and the contradictions of performativity in zimbabwe: A quest for rebalancing pedagogy.
Journal of Social Studies Education Research, 10(2), 31-45.
16. Dunets, A., Muhamedieva, A., Sycheva, I., Perepechkina, E., Vakhrushev, I., & Kulchytskiy, A. (2019). Spatial tourism planning: Using
the model of functional and planning complexes. Journal of Environmental Management and Tourism, 10(4), 711 -719.
doi:10.14505/jemt.v10.4(36).01
17. Dagdilelis, V. (2018). Preparing teachers for the use of digital technologies in their teaching practice. Research in Social Sciences and
Technology, 3(1), 109-121. Retrieved from http://ressat.org/index.php/ressat/article/view/345
18. Fedulova, I., Ivanova, V., Atyukova, O., & Nosov, V. (2019). Inclusive education as a basis for sustainable development of society.
Journal of Social Studies Education Research, 10(3), 118-135.
19. Frolova, I., Voronkova, O., Alekhina, N., Kovaleva, I., Prodanova, N., & Kashirskaya, L. (2019). Corruption as an obstacle to sustainable
development: A regional example. Entrepreneurship and Sustainability Issues, 7(1), 674-689. doi:10.9770/jesi.2019.7.1(48)
20. Grakhova, S., Fayzrakhmanov, I., Zhundibayeva, A., Yakutina, M., Sharipov, R., & Stepykin, N. (2019). Information, pedagog ical and
facilitation technologies in teaching a special philology class at non-specialized faculties of higher education institutions. International
Journal of Innovative Technology and Exploring Engineering, 8(12), 1613-1620. doi:10.35940/ijitee.L3154.1081219
21. Goloshchapova, L. V., Plaskova, N. S., Prodanova, N. A., Yusupova, S. Y., & Pozdeeva, S. N. (2018). Analytical review of risk s of loss of
profits in cargo transportation. International Journal of Mechanical Engineering and Technology, 9(11), 1897-1902.
22. Goryushkina, N. E., Gaifutdinova, T. V., Logvina, E. V., Redkin, A. G., Kudryavtsev, V. V., & Shol, Y. N. (2019). Basic princ iples of
tourist services market segmentation. International Journal of Economics and Business Administration, 7(2), 139-150.
23. Johnson, C., & Hinton, H. (2019). Toward a Brillant Diversity. Journal of Culture and Values in Education, 2(1), 56 -70. Retrieved from
http://cultureandvalues.org/index.php/JCV/article/view/27
24. Jones, A. (2019). Parallel Oppressions. Journal of Culture and Values in Education, 2(1), 18-33. Retrieved from
http://cultureandvalues.org/index.php/JCV/article/view/31
25. Kireev, B., Zhundibayeva, A., & Aktanova, A. (2019). Distance learning at higher education institutions: Results of an experiment.
Journal of Social Studies Education Research, 10(3), 387-403.
26. Korableva, O., Durand, T., Kalimullina, O., & Stepanova, I. (2019). Studying user satisfaction with the MOOC platform interfa ces using
the example of coursera and open education platforms. Paper presented at the ACM International Conference Proceeding Series, 26 -30.
doi:10.1145/3322134.3322139
27. Kuznetsova, I. G., Voronkova, O. Y., Nimatulaev, M. M., Ruiga, I. R., Zhuruli, G. N., & Levichev, V. E. (2019). Ensuring the national
security of agriculture in the digital era through the formation of human capital. International Journal of Economics and Business
Administration, 7, 558-569.
28. Kuznetsova, I. G., Bulyga, R. P., Rakhmatullina, L. V., Titova, S. V., Shichiyakh, R. A., & Zakirov, R. A. (2019). Problems and prospects
of human capital development in modern russia. International Journal of Economics and Business Administration, 7(2), 164 -175.
29. Kuznetsova, I. G., Goloshchapova, L. V., Ivashina, N. S., Shichiyakh, R. A., Petrova, L. I., & Tkachev, B. P. (2019). The paradigm of
human capital development capable of adapting innovations in the transition to a digital economy. International Journal of Civil
Engineering and Technology, 10(2), 1408-1417.
30. Kuznetsova, I. G., Surikov, Y. N., Votchel, L. M., Aleynikova, M. Y., Voronkova, O. Y., & Shichiyakh, R. A. (2019). The metho dological
aspect of human capital formation in the digital economy. International Journal of Mechanical Engineering and Technology, 10(2), 1020-
1030.
31. Kuzmin, E.A.; Vinogradova, M.V.; Guseva, V.E. 2019. Projection of enterprise survival rate in dynamics of regional economic
sustainability: case study of Russia and the EU, Entrepreneurship and Sustainability Issues 6(4):1602 -1617.
https://doi.org/10.9770/jesi.2019.6.4(4)
32. Kustati, M., & Al-Azmi, H. (2018). Pre-Service Teachers’ Attitude on ELT Research. Research in Social Sciences and Technology, 3(2),
1-13. Retrieved from http://ressat.org/index.php/ressat/article/view/47
33. Lorincová, S.; Hitka, M.; Bajzíková, Ľ.; Weberová, D. 2019. Are the motivational preferences of employees working in small en terprises
in Slovakia changing in time, Entrepreneurship and Sustainability Issues 6(4): 1618-1635. https://doi.org/10.9770/jesi.2019.6.4(5)
34. Meier, L. (2019). Questioning the Problematic Nature of School Culture in Elementary Teacher Education. Journal of Culture an d Values
in Education, 2(1), 34-44. Retrieved from http://cultureandvalues.org/index.php/JCV/article/view/30
35. Morales-Ramirez, C. (2018). The Puerto Rican Flag - A Study in Vexillology. Research in Social Sciences and Technology, 3(3), 42-67.
Retrieved from http://ressat.org/index.php/ressat/article/view/369
36. Mullakhmetov, K. S., Sadriev, R. D., Gabaidullina, L. A., & Akhmetshin, E. M. (2018). Influence of human capital characteristics on
transformation of management and control in the management of social and economic systems. Paper presented at the Proceedings of the
31st International Business Information Management Association Conference, IBIMA 2018: Innovation Management and Education
Excellence through Vision 2020, 3562-3572.
37. Mullins, R. (2019). Using Dewey’s Conception of Democracy to Problematize the Notion of Disability in Public Education. Journ al of
Culture and Values in Education, 2(1), 1-17. Retrieved from http://cultureandvalues.org/index.php/JCV/article/view/24
38. Olaniyi, O.E.; Prause, G.; Bakkar, Y. 2019. Entrepreneurial compliance opportunities for maritime fuel producers, Entrepreneurship and
Sustainability Issues 6(4): 1550-1565. https://doi.org/10.9770/jesi.2019.6.4(1)
39. Pavlyshyn, L., Voronkova, O., Yakutina, M., & Tesleva, E. (2019). Ethical problems concerning dialectic interaction of cultur e and
civilization. Journal of Social Studies Education Research, 10(3), 236-248.
40. Prodanova, N., Trofimova, L., Pozdeeva, S., Melekhina, T., Rustanov, A., & Guryanova, I. (2019a). Perspective of developing software
for financial reporting under IFRS in the system of national governance. Journal of Advanced Research in Dynamical and Contro l
Systems, 11(8 Special Issue), 406-410.
41. Prodanova, N. A., Plaskova, N. S., Bochkareva, N. G., Babalykova, I. A., Gazizyanova, Y. Y., & Zherelina, O. N. (2019 b). Integrated
corporate reporting as an innovative business reporting model. International Journal of Engineering and Advanced Techn ology, 8(5), 2075-
2078.
42. Prodanova, N. A., Smolentsev, V. M., Norkina, A. N., Shukshina, Y. A., & Polyanskaya, O. A. (2017). Formation of system of in ternal
control and features its functioning in the innovative development of industrial enterprises. International Journal of Applied Business and
Economic Research, 15(13), 179-189.
43. Popova, L. I., Demina, I. D., Stepanenko, Y. S., Tran, Q. N., Meshkova, G. V., & Afonasova, M. A. (2019). Regional aspects of sectoral
digitalization: Problems and prospects. International Journal of Economics and Business Administration, 7(2), 176-188.
44. Raba’, A., & Harzallah, H. (2018). Palestinian Teachers’ Views on the Factors That Limit Students’ Creativity and Some Possib le
Strategies to Overcome Them. Research in Social Sciences and Technology, 3(2), 40-57. Retrieved from
http://ressat.org/index.php/ressat/article/view/330
45. Saenko, N., Voronkova, O., Volk, M., & Voroshilova, O. (2019). The social responsibility of a scientist: Philosophical aspect of
contemporary discussions. Journal of Social Studies Education Research, 10(3), 332-345.
46. Sycheva, I. N., Voronkova, O. Y., Kovaleva, I. V., Kuzina, A. F., Bannikov, S. A., & Titova, S. V. (2019). Motivation in pers onnel
management of a trading enterprise. International Journal of Economics and Business Administration, 7, 570-582.
47. Shatunova O., Anisimova T., Sabirova F., Kalimullina O. (2019) STEAM as an Innovative Educational Technology. Journal of Soci al
Studies Education Research. Vol. 10 (2), 131-144.
48. Tarman, B., & Kılınç, E. (2018). Poetry in the Social Studies Textbooks in Turkey. Journal of Culture and Values in Education, 1(1), 50 -
62. Retrieved from http://cultureandvalues.org/index.php/JCV/article/view/4
49. Tarman, B. (2018). Editorial: 2018 (3)2. Research in Social Sciences and Technology, 3(2), i-ii. Retrieved from
http://ressat.org/index.php/ressat/article/view/370
50. Titova, S. V., Surikov, Y. N., Voronkova, O. Y., Skoblikova, T. V., Safonova, I. V., & Shichiyakh, R. A. (2019). Formation, a ccumulation
and development of human capital in the modern conditions. International Journal of Economics and Business Administration, 7(2), 223-
230.
51. Trofimova, L., Prodanova, N., Korshunova, L., Savina, N., Ulianova, N., Karpova, T., & Shilova, L. (2019). Public sector entities’
reporting and accounting information system. Journal of Advanced Research in Dynamical and Control Systems, 11(8 Special Issue), 416 -
424.
52. Voronkova, O. Y., Iakimova, L. A., Frolova, I. I., Shafranskaya, C. I., Kamolov, S. G., & Prodanova, N. A. (2019). Sustainabl e
development of territories based on the integrated use of industry, resource and environmental potential. International Journal of
Economics and Business Administration, 7(2), 151-163.
53. Voronkova, O., Yankovskaya, V., Kovaleva, I., Epishkin, I., Iusupova, I., & Berdova, Y. (2019). Sustainable territorial development based
on the effective use of resource potential. Entrepreneurship and Sustainability Issues, 7(1), 662-673. doi:10.9770/jesi.2019.7.1(47)
54. Yehya, F. Y., Barbar, A., & Abou Rjeily, S. (2018). Diagnosing the barriers for integrating Educational Technology in Physics courses in
Lebanese secondary schools. Research in Social Sciences and Technology, 3(2), 14-39. Retrieved from
http://ressat.org/index.php/ressat/article/view/337
55. Zhundibayeva, A. K., Ergobekov, K. S., & Espenbetov, A. S. (2013). The lyrical hero in the works of kazakh's poet shakarim
kudaiberdiev. Life Science Journal, 10(SPL.ISSUE11), 113-117.
Elena Permyakova, Olga Voronkova, Galina Poltarykhina, Alla Plisova
Authors:
Galina Rodina, Leonid Popok
The Concept of Agro-Industrial Integration of a Border Region with Adjacent Territories under the
Paper Title:
Conditions of the EAEU
Abstract: The subject of research in this paper is the prospects for integration relations of the Russian border
region, the Altai Territory, with the adjacent territories of the Republic of Kazakhstan based on the concept of
polarized development of territories. An analysis of the existing prerequisites and the current state of integration
processes, as well as the specifics of the development of the regions, showed the possibility of using the agricultural
sector as a propulsive industry. The possibility of increasing the workload of production facilities of processing
enterprises of the Altai Territory using the raw stock potential of the livestock industry in the East Kazakhstan
Region has been identified.

Keyword : agribusiness, integration, border region, adjacent territories, meat subsector, Eurasian Economic
Union, development strategy
References:
1. Arniati, T., Puspita, D. A., Amin, A., & Pirzada, K. (2019). The implementation of good corporate governance model and auditor
independence in earnings' quality improvement. Entrepreneurship and Sustainability Issues, 7(1), 188-200. doi:10.9770/jesi.2019.7.1(15)
2. Bure, M., & Tengeh, R. K. (2019). Implementation of internal controls and the sustainability of SMEs in harare in zimbabwe.
Entrepreneurship and Sustainability Issues, 7(1), 201-218. doi:10.9770/jesi.2019.7.1(16)
3. Dunets, A., Muhamedieva, A., Sycheva, I., Perepechkina, E., Vakhrushev, I., & Kulchytskiy, A. (2019). Spatial tourism planning: Using
the model of functional and planning complexes. Journal of Environmental Management and Tourism, 10(4), 711 -719.
doi:10.14505/jemt.v10.4(36).01
4. Dunets, A. N., Ivanova, V. N., & Poltarykhin, A. L. (2019). Cross-border tourism cooperation as a basis for sustainable development: A
case study. Entrepreneurship and Sustainability Issues, 6(4), 2207-2215. doi:10.9770/jesi.2019.6.4(45)
5. Fedulova, I., Ivanova, V., Atyukova, O., & Nosov, V. (2019). Inclusive education as a basis for sustainable development of society.
747. Journal of Social Studies Education Research, 10(3), 118-135.
6. Frolova, I., Voronkova, O., Alekhina, N., Kovaleva, I., Prodanova, N., & Kashirskaya, L. (2019). Corruption as an obstacle to sustainable 4291-
development: A regional example. Entrepreneurship and Sustainability Issues, 7(1), 674-689. doi:10.9770/jesi.2019.7.1(48)
7. Glotko A.V., Sycheva I.N., Permyakova E.S. (2018). Organic agricultural products on the transboundary territories of the greater Altai:
4295
problems and development prospects. International monthly scientific journal "ECONOMY PROFESSIONAL BUSINESS" No. 2 2018. P.
22-23. Access mode: https://elibrary.ru/item.asp?id=35042591 - Title from the screen.
8. Grakhova, S., Fayzrakhmanov, I., Zhundibayeva, A., Yakutina, M., Sharipov, R., & Stepykin, N. (2019). Information, pedagogical and
facilitation technologies in teaching a special philology class at non-specialized faculties of higher education institutions. International
Journal of Innovative Technology and Exploring Engineering, 8(12), 1613-1620. doi:10.35940/ijitee.L3154.1081219
9. Goloshchapova, L. V., Plaskova, N. S., Prodanova, N. A., Yusupova, S. Y., & Pozdeeva, S. N. (2018). Analytical review of risk s of loss of
profits in cargo transportation. International Journal of Mechanical Engineering and Technology, 9(11), 1897-1902.
10. Goryushkina, N., Voinova, N., Voronkova, O., Sitnov, A., Shichiyakh, R., & Gordeyeva, O. (2019a). Theoretical aspects of
entrepreneurial education for hospitality industry. Journal of Environmental Management and Tourism, 10(4), 835-841.
doi:10.14505/jemt.10.4(36).14
11. Goryushkina, N. E., Gaifutdinova, T. V., Logvina, E. V., Redkin, A. G., Kudryavtsev, V. V., & Shol, Y. N. (2019b). Basic pr inciples of
tourist services market segmentation. International Journal of Economics and Business Administration, 7(2), 139-150.
12. Ivanova, V., Poltarykhin, A., Szromnik, A., & Anichkina, O. (2019). Economic policy for country's digitalization: A case study.
Entrepreneurship and Sustainability Issues, 7(1), 649-661. doi:10.9770/jesi.2019.7.1(46)
13. Kashirskaya, L., Voronkova, O., Sitnov, A., Shichiyakh, R., Kudinova, M., & Sycheva, I. (2019). Rural development through the
formation of zonal agro-ecological clusters. Journal of Environmental Management and Tourism, 10(3), 651-659.
doi:10.14505/jemt.v10.3(35).19
14. Korableva, O.N., Kalimullina, O.V., Mityakova, V.N. (2019) Designing a System for Integration of Macroeconomic and Statistica l Data
Based on Ontology. Advances in Intelligent Systems and Computing, 998, p. 157-165
15. Kolmakov, V., & Polyakova, A. (2019). Regional free cash flow dataset: An approach to regional performance evaluation. Data in Brief,
25 doi:10.1016/j.dib.2019.104175
16. Kireev, B., Zhundibayeva, A., & Aktanova, A. (2019). Distance learning at higher education institutions: Results of an experiment. Journal
of Social Studies Education Research, 10(3), 387-403.
17. Luzina, T. V., Dudareva, E. A., Akhmetshin, E. M., Prodanova, N.A., Berdova, Y. S. & Emaletdinova, G. E. (2019). International Legal
Format for Trans Regionalisation of Trade and Economic Partnership within BRICS in Global Development. Space and Culture, Ind ia
2019, 7(3), 1-10.
18. Official statistics of the Territorial Authority of the Federal State Statistics Service for the Altai Territory Available at: http://akstat.gks.ru/
19. Pavlyshyn, L., Voronkova, O., Yakutina, M., & Tesleva, E. (2019). Ethical problems concerning dialectic interaction of cultur e and
civilization. Journal of Social Studies Education Research, 10(3), 236-248.
20. Paptsov, A., & Nechaev, V. (2019). Towards to a single innovation space in the agrarian sector of the member states of the eu rasian
economic union: A case study. Entrepreneurship and Sustainability Issues, 7(1), 637-648. doi:10.9770/jesi.2019.7.1(45)
21. Permyakova, E.S. (2012). Development of a cross-border agro-industrial region in the context of economic integration with neighboring
territories (Abstract ... diss. Candidate of economic sciences) (ASU)
22. Plaskova, N. S., Prodanova, N. A., Zatsarinnaya, Е. I., Korshunova, L. N., & Chumakova, N. V. (2017). Methodological support of
organizations implementing innovative activities investment attractiveness estimation. Journal of Advanced Research in Law and
Economics, 8(8), 2533-2539. doi:10.14505/jarle.v8.8(30).25
23. Prodanova, N., Plaskova, N., Popova, L., Maslova, I., Dmitrieva, I., Sitnikova, V., & Kharakoz, J. (2019a). The role of IT to ols when
introducing integrated reporting in corporate communication. Journal of Advanced Research in Dynamical and Control Systems, 11(8
Special Issue), 411-415.
24. Prodanova, N., Trofimova, L., Pozdeeva, S., Melekhina, T., Rustanov, A., & Guryanova, I. (2019b). Perspective of developing s oftware
for financial reporting under IFRS in the system of national governance. Journal of Advanced Research in Dynamical and Control
Systems, 11(8 Special Issue), 406-410.
25. Polyakova, A. G., Akhmetshin, E. M., Pavlyuk, A. V., & Meshkova, G. V. (2019). Investment appeal of a regio n and its impact on
investment inflows. Entrepreneurship and Sustainability Issues, 7(2), 1089-1097. http://doi.org/10.9770/jesi.2019.7.2(21)
26. Saenko, N., Voronkova, O., Volk, M., & Voroshilova, O. (2019). The social responsibility of a scientist: Philosoph ical aspect of
contemporary discussions. Journal of Social Studies Education Research, 10(3), 332-345.
27. Sycheva I.N., Kuzmina N.N, Permyakova E.S., Svistula I.A. (2015). Labor Theory of Value in the Methodology of Researching Eco nomic
Systems. Journal of Applied Economic Sciences. Vol. 6(36), pp. 973-979.
28. Sycheva I. N., Belaia N. V., Permyakova E. S. (2017) Problems of manpower formation and use in a region with agro-industrial
specialization Revista Espacios 38 Available at: http://www.revistaespacios.com/a17v38n49/17384917.html (Accessed 31 03 2019)
29. Sycheva, I.N., E.S. Permyakova (2019). Development of integration relations: history and development prospects. Science and practice of
organization of production and management (Organization-2018): materials of the international scientific and practical conference.
Barnaul: AltSTU Publishing House, pp. 185-195.
30. Sycheva I. N., & Svistula I. A. (2017). Cross-sectoral approach to improving integration processes in agro-industrial complexes Revista
espacios 38 Available at: http://www.revistaespacios.com/a17v38n33/a17v38n33p06.pdf (31 03 2019)
31. Sycheva, I.N., E.S. Permyakova, N.N. Kuzmina (2016). Cross-border development of the region’s economy in the context of the Eurasian
Economic Union: state, problems, prospects: monograph. Alt. Gos. Tech. University of them. I.I. Polzunova. - Barnaul: AltSTU Publishing
House, 168 p.
32. Sycheva, I.N., E.S. Permyakova (2016) Poles of growth: the evolution of the concept and its adaptation for the effective deve lopment of
the regional economy. Bulletin of the Altai Academy of Economics and Law No. 1 (43) 2016. P. 73-76.
33. Sycheva, I.N., Permyakova E.S. (2016) Foreign economic cooperation of the Altai Territory with the border regions of Kazakhstan.
Science, education and innovations: a collection of articles of the International scientific and practical conference, (October 15, 2016,
Ekaterinburg). In 3 hours, Part 2 - Yekaterinburg: AETERNA, 2016.S. 213 - 216.
34. Trofimova, L., Prodanova, N., Korshunova, L., Savina, N., Ulianova, N., Karpova, T., & Shilova, L. (2019). Public sector entities’
reporting and accounting information system. Journal of Advanced Research in Dynamical and Control Systems, 11(8 Special Issue), 416-
424.
35. Voronkova, O. Y., Iakimova, L. A., Frolova, I. I., Shafranskaya, C. I., Kamolov, S. G., & Prodanova, N. A. (2019a). Sustainab le
development of territories based on the integrated use of industry, resource and environmental potential. International Journal of
Economics and Business Administration, 7(2), 151-163.
36. Voronkova, O., Yankovskaya, V., Kovaleva, I., Epishkin, I., Iusupova, I., & Berdova, Y. (2019b). Sustainable territorial development
based on the effective use of resource potential. Entrepreneurship and Sustainability Issues, 7(1), 662-673. doi:10.9770/jesi.2019.7.1(47)

Authors: Kanchan Patil, Mugdha S Kulkarni

Paper Title: Artificial Intelligence in Financial Services: Customer Chatbot Advisor Adoption
Abstract: The growing sophistication technology has helped us exchange Information at our fingertips,
eliminating the need for human support.” A platform designed to understand, learn and converse like a human and
answer ad-hoc queries in real time is commonly referred to as a Chabot”. Chabot advisor is Artificial intelligence
(AI) computer program that impersonates human communication in its natural format including text or spoken
language using a technique such as NLP, image processing or video processing along with the end task completion
as instructed by the user [1]. The purpose of the paper was to examine what are the drivers for Chabot advisor
services adoption (CBA), focusing on financial services. This study presents the explanatory Chabot advisor
services factors by extending the Technology Acceptance Model (TAM). The construct in the research are like
perceived privacy, perceived security, enjoyment and social influence. This empirical study was conducted in Pune
city in India by collecting primary data from 310 online financial services customers. Data collected was analyzed
using structural equation modeling using PLS-SEM.The outcome of this study is vital to financial companies like
banks, policymakers, technology services adoption literature and provide customer-centric financial services.
748.
Keyword : Chatbot advisors, Artificial Intelligence, Financial Services, Technology adoption, PLS SEM. 4296-
4303
References:
1. S. B, " Adoption of digital payment systems in the era of demonetization in India: An empirical study," Journal of Science and
Technology Policy Management, vol. 10, no. 1, pp. 143-71, 2019 Mar 4.
2. Belanche. D, Casaló LV, Flavián C. Artificial Intelligence in FinTech: "Understanding Robo-Advisors Adoption Among Customers,"
Industrial Management & Data Systems. Artificial Intelligence In Fintech, 2019.
3. S. B, " Adoption of digital payment systems in the era of demonetization in India: An empirical study," Journal of Science and
Technology Policy Management, vol. 10, no. 1, pp. 143-71, 2019 Mar 4
4. Gupta MP, Jana D,”E-government evaluation: A framework and case study.," Government information quarterly 20, vol. 4 , pp. 365-387.,
2003.
5. Kaushik AK, Agrawal AK, Rahman Z., "Tourist behaviour towards self-service hotel technology adoption: Trust and subjective norm as
key antecedents.," Tourism Management Perspectives , vol. 16 , pp. 278-289., 2015.
6. Park E, Kim KJ, "An integrated adoption model of mobile cloud services: exploration of key determinants and extension of technology
acceptance model.," Telematics and Informatics , vol. 3, pp. 376-385., 2014.
7. Zhu DS, Lin TC, Hsu YC, "Using the technology acceptance model to evaluate user attitude and intention of use for online games.","
Total Quality Management & Business Excellence 23, no. , vol. 7, no. 8, pp. 965-980., 2012.
8. Gefen D, Karahanna E, Straub DW, "Trust and TAM in online shopping: An integrated model.," MIS quarterly 27, vol. 1, pp. 51-90.,
2003.
9. Featherman MS, Pavlou PA., "Predicting e-services adoption: a perceived risk facets perspective.," International journal of human-
computer studies , vol. 59, no. 4, pp. 451-474., 2003.
10. Hair JF, Ringle CM,". Hair, "PLS-SEM: Indeed a silver bullet," Journal of Marketing Theory and Practice, vol. 19, no. 2, pp. 139-152,
2011.
11. Ringle CM, Sarstedt M, Straub , "A critical look at the use of PLS-SEM," MIS Quarterly., 2012.
12. Okuda T, Shoda S,"AI-Based Chatbot Service For Financial Industry," Fujitsu Scientific And Technical Journal , vol. 54(2), pp. 4-8.,
2018.
13. J. Trivedi, ". Examining the Customer Experience of Using Banking Chatbots and Its Impact on Brand Love: The Moderating Role of
Perceived Risk," Journal of Internet Commerce, pp. 91-111, 08 Feb 2019.
14. Shaikh A, Phalke G, Patil P, Bhosale S, Raghatwan J. A, "A survey on chatbot conversational systems.," International Journal of
Engineering Science,, 2016.
15. D. Duijst, " Can We Improve The User Experience Of Chatbots With Personalisation?," 2017.
16. L. Dal Porto, "Chatbot Chatter.," Quality Progress, vol. 50, no. 7, pp. 6-9., 2017.
17. Letheren K, Dootson P. "Banking With A Chatbot: A Battle Between Convenience And Security. The Conversation.," 2017.
18. Hsu CL, Lu HP., " Why Do People Play On-Line Games? An Extended TAM With Social Influence And Flow Experience”,",
Information And Management, vol. 41, no. 7, pp. 853-68.
19. "Financial services companies lead in AI adoption: Report," TimesofIndia.com, Aug 16, 2019, 16:25 IST.
20. Deloitte.Com, "Ai-And-Risk-Management.Pdf," Centre for Regulatory Strategy EMEA.
21. STAMFORD, Conn, "Artificial Intelligence Will Create More Jobs Than It Eliminates," Gartner Says By 2020, 13 December 2017
22. "The List Of Indian Organizations Launching AI-Powered VAs Keeps Growing," Insight, 3 April 2018.
23. K. Gupta, "Rise Of The Robo-Banker," 15 July 2018. [Online]. Available: Https://Www.Businesstoday.In/Magazine/The-Hub/Rise-Of-
The-Robo-Banker/Story/279479.Html.
24. S. Z. Haque, 18 September 2017. [Online]. Available: https://www.indusnet.co.in/How-Chatbots-Are-Changing-The-Insurance-Industry/.
25. Ringle CM, Sarstedt M, Straub D,” A critical look at the use of PLS-SEM “MIS Quarterly (MISQ). 2012;36(1)
26. J. Huang, M. Zhou and D. Yang, "Extracting Chatbot Knowledge From Online Discussion Forums.," IJCAI, vol. 7, pp. 423-428, 2007,
January.
27. A. Deshpande, A. Shahane, D. Gadre, M. Deshpande and P. M. Joshi, "A Survey Of Various Chatbot Implementation Technique s,"
International Journal Of Computer Engineering And Applications, p. 11, 2017.
28. R. Richad, V. Vivensius, S. Sfenrianto and K. Emil R, "ANALYSIS OF FACTORS INFLUENCING MILLENNIAL’S TECHNOLOGY
ACCEPTANCE OF CHATBOT IN THE BANKING INDUSTRY IN INDONESIA.," International Journal of Civil Engineering and
Technology (IJCIET), vol. 10, no. 04, April 2019, pp. 1270-1281, Article ID: IJCIET_10_04_133, 2019.
29. Gupta, P. Kriti, S. Swati and B. and Preeti, "Citizen adoption of e-government: a literature review and conceptual framework.," Electronic
Government, an International Journal 12, vol. 2, pp. 160-185, 2016.
30. I. Ajzen and M. Fishbein., "Attitudes and normative beliefs as factors influencing behavioral intentions.," Journal of personality and
social psychology 21, vol. 1, no. 1, 1972.
31. Shih and Hung-Pin, "Extended technology acceptance model of Internet utilization behavior."," Information & management, vol. 41, no.
6, pp. 719-729, 2004.
32. Yucel, A. Ummuhan and G. Yasemin, "Technology acceptance model: A review of the prior predictors.," Egitim Bilimleri Fakultesi
Dergisi 46, vol. 1, p. 89, 2013.
33. G. B. Svendsen, J. A. K, L. Johnsen, Almås-Sørensen and V. Joar, "Personality and technology acceptance: the influence of personality
factors on the core constructs of the Technology Acceptance Model," Behaviour & Information Technology, vol. 32, no. 4, pp. 323-334,
2013.
34. F. D. Davis, "Perceived usefulness, perceived ease of use, and user acceptance of information technology.," MIS quarterly, pp. 319-340,
1989.
35. M. A. Shareef, K. Vinod, K. Uma and Y. K. Dwivedi., "e-Government Adoption Model (GAM): Differing service maturity levels.,"
Government information quarterly, vol. 28, no. 1, pp. 17-35., 2011.
36. A. P. Chaves and M. A. Gerosa, "How should my chatbot interact? A survey on human-chatbot interaction design. arXiv preprint
arXiv:1904.02743.," p. 2019.
37. Zarouali B, Poels K, Walrave M, Ponnet K, "‘You talking to me?’The influence of peer communication on adolescents’ persuasion
knowledge and attitude towards social advertisements."Behaviour & Information Technology, vol. 37, no. 5, pp. 502-516., 2018.
38. L. U. Okoye, E. O. Alexander, I. O. JOHNSON, N. Felix, Ezeji and B. U. Achugamonu,"IMPERATIVES FOR DEEPENING
CUSTOMER SERVICE DELIVERY IN THE NIGERIAN BANKING SECTOR THROUGH ENGINEERING AND TECHNOLOGY-
BASED CHANNELS.," International Journal of Civil Engineering and Technology(IJCIET), vol. 1, pp. 2156-2169, 2019.
39. M. Aboelmaged and T. R. Gebba., "Mobile banking model: An examination of technology acceptance model and theory of planned
behaviour," International Journal of Business Research and Development,, vol. 2, no. 1, pp. 35-50, 2013.
40. Hair Jr JF, Hult GT, Ringle C, Sarstedt M, A primer on partial least squares structural equation modeling (PLS-SEM), Sage publications,
2016., 2016.
41. C. Fornell and L. David F, "Structural equation models with unobservable variables and measurement error: Algebra and statistics,"
Journal of marketing research, pp. 382-388., 1981.
42. G. Sahu and S. T. Gupta MP, "Towards a model of e-governance acceptance.," From Policy to Reality, no. 1, 2004.
43. K. Zafiropoulos, K. Ioannis and i. V. Vasilik, "Exploring e-governance acceptance by primary and secondary education teachers in
Greece.," International Journal of Information Technology and Management, vol. 13, no. 4, pp. 285-304., 2014.
44. A. Kaushik, A. AK and Z. Rahman, ". Tourist behaviour towards self-service hotel technology adoption: Trust and subjective norm as key
antecedents.," Tourism Management Perspectives, vol. 16, pp. 278-89., 2015.
45. Park E, Kim KJ, "An integrated adoption model of mobile cloud services: exploration of key determinants and extension of technology
acceptance model.," Telematic and Informatics, vol. 31, no. 3, pp. 376-85., 2014.
46. J. Thong, H. SJ and K. Tam, "The Effects Of Post-Adoption Beliefs On The Expectation-Confirmation Model For Information
Continuance," International Journal Of Human-Computer Studies, vol. 64, no. 5, pp. 799-810, 2006.
47. Hsu CL, Lu HP, "Why do people play on-line games? An extended TAM with social influences and flow experience.," Information &
management, vol. 41(7), pp. 853-868., 2004.
48. F. Lin, S. S, Fofanah and D. Liang, "Assessing citizen adoption of e-Government initiatives in Gambia: A validation of the technology
acceptance model in information systems success.," Government Information, Vols. Quarterly 28,, no. 2, pp. 271-279, 2011.
49. G. C. Moore and B. Izak, "Development of an instrument to measure the perceptions of adopting an information technology innov ation.,"
Information systems research, vol. 2, no. 3, pp. 192-222., 1991.
50. T. Teo, C. B. Lee, C. S. Chai and W. S. L, "Assessing the intention to use technology among pre-service teachers in Singapore and
Malaysia: A multigroup invariance analysis of the Technology Acceptance Model (TAM)," Computers & Education, vol. 53, no. 3, 2009.
51. Colesca, S. Elena and L. Dobrica, "Adoption and use of e-government services: The case of Romania.," Journal of applied research and
technology, vol. 6, no. 3, pp. 204-217, 2008.
52. Lewis, E. F, M. Hardy and S. Beverly, "An analysis of survey reporting in the imaging professions: is the issue of non -response bias being
adequately addressed?," Radiography, vol. 19, no. 3, pp. 240-245., 2013.
53. Podsakoff PM, Organ DW, "Self-reports in organizational research: Problems and prospects.," Journal of Management, vol. 12(4), pp.
531-544., 1986.
54. J. Henseler, "On the convergence of the partial least squares path modeling algorithm.," Computational Statistics, vol. 1, pp. 107-120,
2010.
55. D. Gefen, D. Straub and M. C. Boudreau, "Structural equation modeling and regression: Guidelines for research practice.,"
Communications of the Association for Information Systems., vol. 4, no. 1, p. 7, 2000.
56. J. F. Hair, W. C. Black, B. J. Babin, R. E. Anderson and R. L. Tatham, "Multivariate data analysis," vol. 6, 2006.
57. S. Sang, J.-D. Lee and J. Lee., "Adoption Of E-Government Services," International Journal Of E-Adoption, vol. 1, no. 2, pp. 1-22., 2009.
58. J. Moon and Y. Kim, "Extended The TAM For World-Wide-Web Context," Information And Management, vol. 38, no. 4, pp. 217-30.,
2001.
59. T. Hu, A. Xu, Z. Liu, Q. You, G. Y. V. Sinha and A. R. , "Touch Your Heart: A Tone-aware Chatbot for Customer Care on Social
Media.," in CHI Conference on Human Factors in Computing Systems., 2018.
60. Araujo T, ". Living up to the chatbot hype: The influence of anthropomorphic design cues and communicative agency framing on
conversational agent and company perceptions.," Computers in Human Behavior., Vols. 183-189, p. 85, 2018 Aug 1.
61. Carlos Roca J, José García J, José de la Vega J., "The importance of perceived trust, security and privacy in online trading systems.,"
Information Management & Computer Security, vol. 17, no. 2, pp. 96-113, 2009.
62. C. T. Harry, "Values, attitudes, and interpersonal behavior," in In Nebraska symposium on motivation.

Authors: R. Swapna sonale, Pushpa S. Murthy, K. Ramalakshmi


Efficacy of Neem Kernel Bioactives Extracted using Supercritical Fluid Carbon Dioxide on Selected
Paper Title:
Dermatophytes and Foodborne Pathogens
Abstract: Neem seed kernel was subjected to supercritical fluid carbon dioxide (SCF) process and evaluated
for the inhibition of selected dermatophytes such as Candida albicans, Candida tropicalis, Candida parapsilosis,
Trichophyton rubrum, Trichophyton mentagrophytes. The extraction was carried out by SCF-CO2 at 300 bar 50 °C
with and without entrainer (30 % methanol and acidified methanol). Results showed that the inhibition of the
growth of all the dermatophytes is maximum in the extract obtained at 300 bar 50 °C with methanol (SCF-Me)
followed by 300 bar 50 °C without methanol (SCF). The acidified SCF (SCF-MeA) extract did not show any
remarkable inhibition. Of the dermatophytes, SCF-Me showed the inhibition against Candida parapsilosis of
18.46±0.25 mm compared to Candida albicans 16±0.26 mm, whereas the methanol control exhibited 10±0.3 mm
inhibition. Out of the two fungal organisms, SCF-Me inhibited the growth of Trichophyton rubrum and
Trichophyton mentagrophytes at 21.53±0.23 mm and 18.1±0.1 mm respectively. The extracts were also evaluated
for its inhibition against the foodborne pathogens (bacteria, fungi, and yeast). The SCF-Me extract showed
maximum inhibition against Pseudomonus aeroginosa (27.26±0.25) compared to Bacillus subtilis (24.36±0.35) at
the concentration of 70mg. In fungus, Aspergillus ochraceus (16.7±0.60) was maximum when compared to
Aspergillus niger (15.2±0.43) and yeast exhibited the inhibition of 15.93±0.20 at the concentration of 80mg. The
dermatophytic and antimicrobial activity of the SCF-Me extract is due to the presence of higher amount of
triterpenoinds such as Azadirachtin (50.7 %), 6-deacetyl nimbin (0.14 %), Nimbin (0.08 %), Salannin (1.83 %) and
Epoxy azadiradione (1.58 %) which were confirmed by liquid chromatography and mass spectroscopy (LC-MS).

Keyword : Neem, Dermatophytes, Supercritical fluid carbon dioxide, high performance liquid chromatography.
References:
1. Ezeonu, C.S., Imo, C., Agwaranze, D.I., Iruka, A. and Joseph, A. 2018. Antifungal effect of aqueous and ethanolic extracts of neem leaves,
stem bark and seeds on fungal rot diseases of yam and cocoyam. Chemical and Biological Technologies in Agriculture. 5:18.
https://doi.org/10.1186/s40538-018-0130-3.
2. Susmitha, S., Vidyamol, K.K., Ranganayaki, P. and Vijayaragavan, R. 2013. Phytochemical extraction and antimicrobial properties of
749. Azadirachta indica (Neem). Global Journal of Pharmacology, 7, 316–320.
3. Venugopal, P.V. and Venugopal, T.V. 1993. Antimycotic susceptibility testing of dermatophytes. Indian Journal of Medical
Microbiology,11, 151-154. 4304-
4. Natarajan, V., Venugopal, P.V. and Menon, T, 2003. Effect of Azadirachta indica (neem) on the growth pattern of dermatophytes. Indian 4309
Journal of Medical Microbiology, 21, 98-101.
5. Danielski, L. 2007. "Extraction and fractionation of natural organic compounds from plant materials with supercritical carbon dioxide."
Phd thesis, Technische University Hamburg-Harburg, Hamburg, pp. 181.
6. Canela, A. P. R. F., Rosa, P. T. V., Marques, M.O.M. and Meirelesm M.A.M, 2002. "Supercritical Fluid Extraction of Fatty Acids and
Carotenoids from the Microalgae Spirulina maxima." Industrial & engineering chemistry research, 41, 3012-3018.
7. Roy, B. C., Goto, M. and Hirose, T., 1996. "Extraction of ginger oil with supercritical carbon dioxide: experiments and modeling".
Industrial and engineering chemistry research, 35, 607-612.
8. Johnson, S. and Morgan, E.D., 1997. "Supercritical fluid extraction of oil and triterpenoids from neem seeds." Phytochemical Analysis, 8,
228-232.
9. Mongkholkhajornsilp, D., Douglas, S., Douglas, P.L., Elkamel, A., Teppaitoon, W. and Pongamphai, S., 2005. Supercritical CO 2
extraction of nimbin from neem seeds - a modelling study, Journal of Food Engineering, 71, 331-340.
10. Morgan, E. D., 2009."Azadirachtin, a scientific gold mine." Bioorganic & medicinal chemistry, 17, 4096-4105.
11. Melwita, E. and Ju Y.-H., 2010. "Separation of azadirachtin and other limonoids from crude neem oil via solvent precipitation."
Separation and Purification Technology, 74, 219-224.
12. Rao, D.V.K., Singh, K., Chopra, P., Chabra, P.C. and Ramanujalu, G., 1986. In vitro antibactericidal activity of neem oil. Indian Journal
of Medical Research, 84, 314-316.
13. Rebell, G. and Zaias, N., 2001. Introducing the syndromes of human dermatophytosis. Cutis, 67, 6-17.
14. Polaquini, SR , Svidzinski, TI , Kemmelmeier, C and Gasparetto, A., 2006. Effect of aqueous extract from Neem (Azadirachta indica A.
Juss) on hydrophobicity, biofilm formation and adhesion in composite resin by Candida albicans. Archives of Oral Biology, 51, 482–490.
15. Natarajan, V., Pushkala, S., Karuppiah, V.P. and Prasad, P.V., 2002. Anti dermatophytic activity of Azardirachta indica (neem ) by invitro
study. Indian Journal of Pathology and Microbiology, 45, 311-313.
16. Cleveland, T. E. and Bhatnagar, D., 1992. Molecular strategies for reducing aflatoxin levels in crops before harvest. In D. Bhatnagar and
T. E. Cleveland (Eds.), Molecular approaches to improving food quality and safety. pp 205–228. New York: Van Nostrand Reinhold.
17. Philips, T. D., Clement, B. A., and Park, D. L., 1994. Approaches to reduction of aflatoxins in foods and feeds. In D. L. Eaton & J. D.
Groopman (Eds.), The toxicology of aflatoxins: Human health, veterinary and agricultural significance, pp. 383 –406. New York:
Academic Press.
18. Razzaghi-Abyaneh, M., Allameh, A., Tiraihi, T., Shams-Ghahfarokhi, M. and Ghorbanian, M., 2005. Morphological alterations in
toxigenic Aspergillus parasiticus exposed to neem (Azadirachtaindica) leaf and seed aqueous extracts. Mycopathologia, 159, 565–570.
19. Mahmoud, D.A., Hassanein, N.M., Youssef, K.A. and Zeid, M.A.A., 2011. Antifungal activity of different neem leaf extracts and the
nimonol against some important human pathogens. Brazilian Journal of Microbiology, 42, 1007-1016.
20. Govindachari, T.R., Suresh, G., Gopalakrishnan, G., Banumathy, B. and Masilamani, S., 1998. Identification of antifungal compounds
from the seed oil of Azadirachta indica. Phytoparasitica, 26, 1-8.
21. Hoque, M.M.D., Bari, M.L., Inatsu, Y., Juneja, V.K. and Kawamoto, S., 2007. Antibacterial activity of guava (Psidiumguajava L.) and
neem (A. indica A. Juss.) extracts against foodborne pathogens and spoilage bacteria. Foodborne Pathogens and Disease, 4, 481-488.
22. Ambrosino, P., Fresa, R., Fogliano, V., Monti, S.M. and Ritieni, A., 1999. Extraction of azadirachtin A from neem seed kernels by
supercritical fluid and its evaluation by HPLC and LC/MS, Journal of Agricultural and Food Chemistry, 47, 5252–5256.
23. Schaaf O., Jarvis A. P., Andrew van der Esch S., Giagnacovo G. and Oldham N. J., 2000. Rapid and sensitive analysis of azadir achtin and
related triterpenoids from neem from HPLC-atmospheric pressure chemical ionisation mass spectrometry. Journal of chromatography A,
886. PP. 89-97.
24. Haldar, S, Phapale, P.B., Kolet, S.P. and Thulasiram, H.V., 2013. Expedient preparative isolation, quantification and characterization of
Neem limonoids from Neem Fruits. Analytical Methods, 5, 5386-539.
25. Ismadji, A., Kurniawan, Y.H., Ju, F.E., Soetaredjo, A. and Ayucitra Ong, L.K., 2013. Solubility of azadirachtin and several t riterpenoid
compounds extracted from neem seed kernel in supercritical CO 2, Fluid Phase Equilibria, 336, 9-15.
26. Charmaine Lloyd, A.C., Menon, T. and Umamaheshwari, K., 2005. Anticandidal activity of Azadirachta indica. Indian Journal
Pharmacology, 37, 386-389.
27. Dube, S. and Tripathi, S., 1987. Toxicity of some plants against dermatophytes. National Academy of Sciences, India, Science Letters, 10,
45-48.
28. Grewal, P.S. and Grewal, S.K., 1988b. Selective fungicidal properties of some plant extracts to mushroom weed moulds. Phytopa thologia
Mediterranea, 27, 112-114. http://www.jstor.org/stable/42684907.

Authors: D. Usha, V. R. Niveditha, K. Sharadha Priya

Paper Title: Anomaly Detection on Android System


Abstract: Due to the proliferation of mobile phones in recent years there are many advantages and some
disadvantages in smart-phones usage. Many applications like E-commerce, Social media and games get access of
user’s permission to use some privileges. Normally while installing any application the users grant permission to
the particular application to access all the privileges. While installing the app in smart- phones, it has tie-up with
some advertisement company. So that to benefit the app developer these ads will run in the app background. This
paper describe the advertisements can behave maliciously some times. This malicious behavior extracts personal
information like user’s contact and files by using the permission access policy of particular app. This data theft may
happen without the knowledge of user. The malicious ad will upload the collected information to the desired server.
In this paper proposed third party server is used to validate the advertisement before the ad gets loaded into the app.

Keyword : Adcapsule, app, Adagency, App user, Android


References:
1. S. Poeplau, Y. Fratantonio, A. Bianchi, C. Kruegel, and G. Vigna, “Execute this! analyzing unsafe and malicious dynamic code loa ding in
android applications.,” in NDSS, vol. 14, pp. 23–26,2014
2. M. Grace, W. Zhou, X. Jiang, and A.-R. Sadeghi, “Unsafe Exposure Analysis of Mobile In-App Advertisements,” in Proceedings of the
5thACM Conference on Security and Privacy in Wireless and Mobile Networks, ACMWiSec, 2012.
3. Sundaram, P. Sakthi Shunmuga, N. Hari Basker, and L. Natrayan. "Smart Clothes with Bio-Sensors for ECG Monitoring." International
Journal of Innovative Technology and Exploring Engineering 8.4 (2019): 298-301.
4. Kumar, M. Senthil, et al. "Processing and characterization of AA2024/Al 2O3/SiC reinforces hybrid composites using squeeze casting
technique." Iran. J. Mater. Sci. Eng 16.2 (2019): 55-67.
5. N. Reddy, J. Jeon, J. Vaughan, T. Millstein, and J. Foster, “Application-centric Security Policies on Unmodified Android,” UCLA
Computer Science Department, Tech.Rep, 2011.
750. 6. S. Demetriou, W. Merrill, W. Yang, A. Zhang, and C. A. Gunter, “Free for All! Assessing User Data Exposure to Advertising Libraries on
Android,” in Proceedings of the 23rd Annual Symposium on Network and Distributed System Security, NDSS, 2016. 4310-
7. X. Dong, M. Tran, Z. Liang, and X. Jiang, “Adsentry: comprehensive and flexible confinement of javascript based advertisements,” in 4313
Proceedings of the 27th Annual Computer Security Applications Conference, pp. 297–306, ACM, 2011.
8. Natrayan, L., M. Senthil Kumar, and Mukesh Chaudhari. "Optimization of Squeeze Casting Process Parameters to Investigate the
Mechanical Properties of AA6061/Al2O3/SiC Hybrid Metal Matrix Composites by Taguchi and Anova Approach." Advanced Engineering
Optimization Through Intelligent Techniques. Springer, Singapore, 2020. 393-406
9. S. Son, D. Kim, and V. Shmatikov, “What Mobile Ads Know about Mobile Users,” in Proceedings of the 23 rd Annual Symposium on
Network and Distributed System Security, NDSS, 2016.
10. L. Natrayan and M. Senthil Kumar. Study on Squeeze Casting of Aluminum Matrix Composites-A Review. Advanced Manufacturing and
Materials Science. Springer, Cham, 2018. 75-83. (https://doi.org/10.1007/978-3-319-76276-0_8.)
11. A. Zarras, A. Kapravelos, G. Stringhini, T. Holz, C. Kruegel, and G. Vigna, “The dark alleys of Madison avenue: Understanding malicious
advertisements,” in Proceedings of the 2014 Conference on Internet Measurement Conference, pp. 373–380, ACM, 2014.
12. L.Natrayan et al. Optimization of squeeze cast process parameters on mechanical properties of Al 2O3/SiC reinforced hybrid metal matrix
composites using taguchi technique. Mater. Res. Express; 5: 066516. (DOI: 10.1088/2053-1591/aac873, 2018).
13. T. Book and D. S. Wallach, “An empirical study of mobile ad targeting,” CoRR, vol. abs/1502.06577, 2015.
14. L Natrayan, V Sivaprakash, MS Santhosh, Mechanical, Microstructure and wear behavior of the material AA6061 reinforced SiC with
different leaf ashes using advanced stir casting method, International Journal of Engineering and Advanced Technology, 2018,8(2S);366-
371.
15. L.Natrayan , P. Sakthi shunmuga sundaram, J. Elumalai. Analyzing the Uterine physiological With MMG Signals using SVM,
International journal of Pharmaceutical research, 2019, 11(2); 165-170.
16. M. Senthil Kumar et. al, Experimental investigations on mechanical and microstructural properties of Al2O3/SiC reinforced hybrid metal
matrix composite, IOP Conference Series: Materials Science and Engineering, Volume 402, Number 1, PP 012123.
17. J. Seo, D. Kim, D. Cho, T. Kimy, and I. Shinz, “Flexdroid: Enforcing in-app privilege separation in android,” in Proceedings of the 23rd
Annual Symposium on Network and Distributed System Security, 2016.
18. S.Yogeshwaran, R.Prabhu, Natrayan.L, Mechanical Properties of Leaf Ashes Reinforced Aluminum Alloy Metal Matrix Composites,
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 10, Number 13, 2015. .
19. S. Shekhar, M. Dietz, and D. S.Wallach, “AdSplit: Separating Smartphone Advertising from Applications,” in Presented as part of the 21st
USENIX Security Symposium, USENIX Security, 2012.
20. X. Zhang, A. Ahlawat, and W. Du, “A Frame: Isolating Advertisements from Mobile Applications in Android,” in Proceedings of the 29th
Annual Computer Security Applications Conference, ACM ACSAC, 2013.

Authors: Mohammad Alkhattab, Rifat Resatoglu, Kabir Sadeghi, Bashar Alibrahim


751.
Paper Title: Seismic Performance of Steel Frames with Inverted V-Braces for North Cyprus
Abstract: Cyprus Island is located in a high-risk zone, in which the buildings should have lateral load-
resistance systems to resist the lateral imposed loads. Bracings play a vital role in the structural behavior of
buildings during an earthquake. There are many bracing systems that can be found thorough searching in the
literature. However, there are insufficient studies regarding the inverted-V bracing system in accordance with the
Northern Cyprus seismic code of NCSC-2015. In this study, the seismic performance of steel structures equipped
with various types of inverted-V bracing systems is investigated for mid-rise and high-rise buildings in accordance
with NCSC-2015 code. Several steel structure buildings having different lateral load-resistance systems are
analyzed under different loading patterns applying ETABS2016 software. For this purpose, linear static equivalent
lateral force method (ELFM), nonlinear static (Pushover) and nonlinear dynamic time-history (TH) analyses were
adopted. The obtained results in this research indicate that the inverted-V bracing systems dramatically enhance the
performance of the steel structures more particularly when the earthquake is applied perpendicular to the weak axis
of the columns. This indicates that the inverted-V bracing system is an effective solution to resist the applied lateral
loads while maintaining the functionality of the building. By applying the regression analysis some practical
equations were submitted for the stiffness factor to be employed in similar cases as a guideline.

Keyword : inverted-v steel bracing, equivalent lateral force method, pushover, time history, ncsc-2015 code
References:
1. V. Gioncu, F.M. Mazzolani, Seismic Design of Steel Structures, CRC Press, 2013 (Nov 21).
2. Mahmoudi, M., Montazeri, S., & Abad, M. J. S. (2018). Seismic performance of steel X-knee-braced frames equipped with shape
memory alloy bars. Journal of Constructional Steel Research, 147, 171-186.
4314-
3. J. Erochko, C. Christopoulos, Tremblay Robert, H.J. Kim, Shake table testing and numerical simulation of a self-centering energy 4320
dissipative braced frame, Earthq.Eng. Struct. Dyn. 42 (April) (2013) 1617–1635.
4. Costanzo, S., D’Aniello, M., & Landolfo, R. (2018). The influence of moment resisting beam-to-column connections on seismic behavior
of chevron concentrically braced frames. Soil Dynamics and Earthquake Engineering, 113, 136-147.
5. Fukuta, Toshibumi, et al. "Seismic performance of steel frames with inverted V braces." Journal of Structural Engineering 115 .8 (1989):
2016-2028.
6. EN 1993-1-1 (2005) (English): Eurocode 3: Design of steel structures - Part 1-1: General rules and rules for buildings [Authority: The
European Union Per Regulation 305/2011, Directive 98/34/EC, Directive 2004/18/EC]
7. De Normalisation, C. E. (2005). European standard EN 1998-3 Eurocode 8: Design of structures for earthquake resistance–part 3:
assessment and retrofitting of buildings. Brussels, Belgium.
8. CSI, C. (2015). Analysis reference manual for SAP2000, ETABS, SAFE and CSiBridge. Computers and Structures, Inc., Berkeley, C A,
USA.
9. Sadeghi K., Ghaboun N., (2019, June) “Significant Guidance to Employ the Software to Analyze and Design the Reinforced Concrete
Structures: State-Of-The-Art”, International Journal of Innovative Technology and Exploring Engineering (IJITEE) [Online]. 8(9), 1160-
1169, Available: https://www.ijitee.org/wp-content/uploads/papers/v8i9/I8035078919.pdf
10. Onur A. Z., Nouban F., (2019, July) “Software in the Architectural Presentation and Design of Buildings: State-Of-The-Art”,
International Journal of Innovative Technology and Exploring Engineering (IJITEE) [Online]. 8(10), Available:
https://www.ijitee.org/wp-content/uploads/papers/v8i10/J94860881019.pdf.
11. Turkish Standard Code of Practice for Design of Buildings and Structures for Agriculture. TS 498. Turkish Standards Institute; 1987 [in
Turkish].
12. Council, B. S. S. (2000). Prestandard and commentary for the seismic rehabilitation of buildings. Report FEMA-356, Washington, DC.
13. Chamber of Civil Engineers. (2015). KKTC Deprem Bölgelerinde Yapılacak Binalar Hakkında Yönetmelik. Lefkoşa: Inşaat Mühendisleri
Odasi Chamber of Civil Engineers.
14. Campbell, K. W., & Bozorgnia, Y. (2010). A ground motion prediction equation for the horizontal compo nent of cumulative absolute
velocity (CAV) based on the PEER-NGA strong motion database. Earthquake Spectra, 26(3), 635-650.

Authors: B.M.S. Sreenivasa Rao, B. Rajasekar

Paper Title: Improvement of Antipodal Vivaldi Antenna Performance for Wireless Application
Abstract: This paper discusses about miniaturized size of the antipodal Vivaldi antenna by using triangular
and circular slots on the Vivaldi antenna. A normal antipodal Vivaldi antenna using FR4 epoxy substrate with a
dielectric constant of 4.4 and thickness 1.6mm has been designed. Then, the triangular and the circular slots are
added at the upper layer of the miniaturized size of the antenna, the triangular slot plays a major role in reduction of
size of the antenna and also results in the better improvement of return loss, gain and bandwidth operated at a
frequency in the range of 3GHz to 25GHz and the circular slot placed at the exponential part of the antenna helps to
reduce excessive mutual coupling between different slots of the antenna. The feeding technique used for designing
of this antenna is micro strip feedline. The proposed antenna results in different applications by incrementing the
frequency. The results of simulation are been realized using HFSS 13.0, a high frequency simulator structure
752. program. The structured antipodal Vivaldi radio wire and the triangular and round openings antipodal Vivaldi
receiving wire are manufactured. The arrival misfortune reaction and the increase of the manufactured radio wires
are estimated and contrasted and the re-enactment results. 4321-
4324

Keyword : Antipodal, Bandwidth, Gain, Micro strip field line, Return losses, VSWR
References:
1. Wei, L., Hu, R. Q., Qian, Y., & Wu, G. (2014). Key elements to enable millimeter wave communications for 5G wireless systems. IEEE
Wireless Communications, 21(6), 136-143.
2. Gibson, P. J. (1979, September). The vivaldi aerial. In 1979 9th European Microwave Conference (pp. 101-105). IEEE.
3. Kumar, A., Kaur, J., & Singh, R. (2013). Performance analysis of different feeding techniques. International journal of emerg ing
technology and advanced engineering, 3(3), 884-890.
4. Teni, G., Zhang, N., Qiu, J., & Zhang, P. (2013). Research on a novel miniaturized antipodal Vivaldi antenna with improved radiation.
IEEE Antennas and wireless propagation letters, 12, 417-420.
5. Ojaroudi, N., & Ojaroudi, M. (2013). Novel design of dual band-notched monopole antenna with bandwidth enhancement for UWB
applications. IEEE Antennas and Wireless Propagation Letters, 12, 698-701.
6. Adamiuk, G., Zwick, T., & Wiesbeck, W. (2008, May). Dual-orthogonal polarized vivaldi antenna for ultra wideband applications. In
MIKON 2008-17th International Conference on Microwaves, Radar and Wireless Communications (pp. 1-4). IEEE.
7. Zhou, B., & Cui, T. J. (2011). Directivity enhancement to Vivaldi antennas using compactly anisotropic zero -index metamaterials. IEEE
Antennas and Wireless Propagation Letters, 10, 326-329.
8. Bai, J., Shi, S., & Prather, D. W. (2011). Modified compact antipodal Vivaldi antenna for 4–50-GHz UWB application. IEEE Transactions
on Microwave Theory and Techniques, 59(4), 1051-1057.
9. Fei, P., Jiao, Y. C., Hu, W., & Zhang, F. S. (2011). A miniaturized antipodal Vivaldi antenna with improved radiation characteristics. IEEE
antennas and wireless propagation letters, 10, 127-130.
10. .B.M.S.Sreenivasa Rao1, Mr.R.Arun Sekar,An Efficient Design Of Planar Inverted F-Antenna International Journal for Scientific Research
& Development| Vol. 6, Issue 12, 2019,

Authors: Oleksandr Kundytskyj, Mariana Vykliuk, Natalia Kovalenko, Igor Cret

Paper Title: The Mechanism of the Industrial Enterprise’s Strategy Development Formation
Abstract: Theoretical and applied aspects of the mechanism of the industrial enterprise’s strategy
development formation, are investigated. Based on the presented scientific achievement towards the enterprise’s
strategic development formation concept, done a systematization of the existing scientific approaches towards
considering the investigated concept from the point of view of different objects, in particular: systematic approach,
functional approach, hierarchical approach, process approach, system-target approach, system- structural approach.
Taking into account the specifics of the listed approaches, it is noted that the most rational in the current conditions
of the industrial enterprises’ functioning is the use of system-structural approach. Presented the mechanism of the
industrial enterprise’s strategy development formation, based on the proposed approach, as a systematic algorithm
of actions, that allows on the basis of strategic management to determine the mission, goals and tasks of the
enterprise, to develop the main strategic directions and measures of its development in conditions of dynamic
change of the external environment at optimal use of the all enterprise’s available resources. Defined the business
entity’s targeted areas of work, according to which the process of development and selection of the strategy’s
development type, including: strategic plans, tactical plans and operational planning, should be carried out. There
are five levels at which the industrial enterprise’s strategy development is developed: corporate level, business
level, functional level, technical level, operational level, and modular level. The purpose, toolkit, factors and
methods of realization diagnostics of the industrial enterprise’s strategy development are grounded. It is noted that
the process of implementation of the enterprise’s strategy development and control over its implementation predicts
the practical implementation of the following measures: defined plans and taking measures aimed at the
implementation of the made enterprise’s strategy development; monitoring the progress of the implementation of
the strategy’s development and determining the need for its adjustment; evaluation of the strategy’s implementation
and taking into account the implementation’s disadvantages by developing the next strategy or modification of the
existing strategy; control over maintaining the existing values of strategic development indicators, the
organization’s activities and the enterprise’s strategic management effectiveness as a whole.

753. Keyword : development strategy, industrial enterprise management, mechanism of development strategy
formation, strategic management. 4325-
References: 4331
1. O.V. Lyulov, Forming of development strategies of enterprise in conditions of unbalanced economy, Abstract of Ph.D. dissertation,
Economics and Management of Enterprises by Types of Economic Activity, Sumy State University, Sumy, 2011.
2. A. A. Doroshuk, “The choice of enterprise’s strategy in the conditions of economic crisis,” Strategies of development of the enterprise in
the conditions of market economy, vol. 3., 2008, pp. 92–95.
3. O.V. Raevnev, “Enterprise development management: methodology, mechanisms, models,” Kharkiv: INZHEK, 2006, pp. 110 -111.
4. O. M. Tridid, The enterprise’s strategy development in crisis, Ph.D. Thesis, Economics, organization and management of enterprises,
Donetsk National University, Donetsk, 2003.
5. I. Filipishin, “The concept of industrial enterprise development management,” Economy, vol. 1(115), 2012, pp. 112-117.
6. S. P. Usik, “Development strategy choice with consideration of enterprise level of readiness for strategic changes,” Actual p roblems of
economy, vol. 6(96), 2009, pp. 142-150.
7. N. V. Popova, N. M. Belevtsova, “Development of enterprise development strategy,” Bulletin of Economics of Transport and Industry,
vol.29, 2010, pp. 359-363.
8. N. V. Kasyanova, Management of enterprise development on the basis of cumulative approach: concept, models and methods, Donet sk:
Kupriyanov VS, 2011.
9. I. M. Khvostina, “Mechanism of enterprise development management,” Investments: practice and experience, vol. 1, 2015, pp. 30 -33.
10. V.M. Kolosok, Methodology of development of strategic management of large industrial enterprises, Mariupol: State Technical University
"Azov State Technical University", 2012.
11. S. Yu. Khaminich, Management of the enterprise on the basis of educational potential, Donetsk: DNU, 2006.
12. O. I. Khomenko, “Types of strategies and tools for forming the strategy of enterprise development,” Management development, vol.
3(181), 2015, pp.131-137.
13. V. V. Zhikhareva, T. M. Savelieva, “Formation of strategy of enterprise development under uncertainty,” Economy and society, vol. 9,
2017, pp. 423-427.
14. I. V. Smolin, System of strategic planning of enterprise development, Ph.D. Thesis, Economics, organization and management of
enterprises, Kyiv National University of Trade and Economics, Kyiv, 2005, Ukraine.
15. I. V. Tyukha, I. O. Denysyuk, “The strategy development in the system of enterprise’s strategie,” Econo mics of the food industry, vol.
3(19), 2013, pp. 33-37.
16. Chandler Alfred D.Jr. Strategy and Structure: Chapters in the History of the Industrial Enterprise, Mass.: M. I. T. Press Pp. xiv,
Cambridge, 1962.
17. Warner, Mildred, Lingwen Zheng, Economic Development Strategies for Recessionary Times: Survey Results from 2009, ICMA
Municipal Year Book 2011 (Washington, D.C.: ICMA, 2011), pp. 33-42.
18. Lee Frederiksen “Business development strategy: a high-growth approach,” January 2019, [Online]. Available:
https://hingemarketing.com/blog/story/business-development-strategy-a-high-growth-approach.

754. Authors: Marzuki Ibrahim, M. Hisham Omar, Imran Abdullah, M. Sophist Ahmad, S.A.Tajuddin Sh.Yusoff
Paper Title: The Innovation of Worship Products for the Future Generation
Abstract: The heyday of Islam began as early as the middle of the 7th century and once again proved that
Islamic science was the forerunner of all kinds of creations and innovations in science and technology. However,
today, we see Muslims struggling to make a name for themselves in pioneering science and technology. It should
not be so since many of the creations enjoyed today are based on inventions from Islamic civilizations rather than
Western ones. Therefore, to restore the past glory, a new plan must begin from now. Among others, through the
development of worship products for the use of Muslims worldwide. Studies have shown that efforts to produce
tangible products are still low due to the increased focus on non-tangible products such as banking systems, health,
and beauty products. Therefore, to ensure the idea of developing this worship product is clearly understood, several
examples of existing worship products are presented and discussed regarding their weaknesses from a design
perspective. Four examples of the latest innovative products designed specifically for the needs of Muslims are
described. The rationale for the need for innovations in worship products is also statistically discussed in light of
the rapid growth of Muslims, with over 1.6 billion Muslims. Furthermore, as many as nine groups of worship
products have the potential to develop, such as products for prayer, knowledge gathering, pilgrimage, and umrah.
Finally, the design features that need to be considered for developing next-generation worship products to meet
customer and market needs are also discussed. The results of this research are intended to raise awareness to the
world about the golden age of Islamic science and that this innovation is still relevant today. Innovation is a catalyst
for high-income economic development. In this regard, developing and producing innovative worship products can
generate wealth to improve the quality of life of Muslims worldwide.
Such is the initiative introduced by the professional design team in Faculty of Innovative Design and Technology
(FRIT) at Universiti Sultan Zainal Abidin (UniSZA) Malaysia that has developed a range of Islamic conceptual
products. Based on the results of the observation technique during the pilot test, conducted in many states across the
country, there are several issues that need to be resolved namely that Muslims in Malaysia desperately need
innovative products that can help them to worship consistently and confidently. This means that there are still no
well-built innovative Islamic-based products available in the local market. As such, the Muslim demographic group
in the country as well as around the world, comprising senior citizens, adults, teens and children will be able to
enjoy the contributions produced by FRIT at UniSZA.

Keyword : The Golden age, Islamic scholars, Worship Products, Innovation


References: 4332-
1. Al-Hassani, S.T.S. 1001 inventions. The enduring legacy of muslim civilization. National Geographic Society, Washington, USA,
2012. 4339
2. Aquabean (2017) Available: https://twitter.com/aquabean 2014? lang=en.
3. Boff K. R. Revolutions and shifting paradigms in human factors & ergonomics. Applied Ergonomics , 2006, 37(4), 391–399.
4. Dakwatuna (2018) Available: https://www.dakwatuna.com /2008 /02/25/412/mengenal-syariat-islam-bagian-1/#axzz5dDJXkSRP.
5. DOSM (2019) Available: https://www.dosm.gov.my/v1/.
6. Feldstein, M (2017) What Is the next generation? Available: https://er.educause.edu/articles/2017/7/what-is-the-next-generation
7. Freepik.com (2019) Available : https://www.freepik.com/premium -photo/urinals-men-public-toilet_3139348.htm.
8. Hatzichronoglou, T. Revision of the high-technology sector and product classification, OECD STI working paper, 1997.
9. Hauser, J, Tellis, G.J, Griffin, A. Research on innovation: a review and agenda for marketing science. 2006, 25(6): 687-717
10. Infiniti Research (2019) Available: https://www. infinitiresearch. com/thoughts/advantages-competitive-pricing.
11. Intelligencenode (2016) Competitive pricing strategy : see how products are priced. Available: https://www.intelligencenode.
com/blog/competitive-pricing-strategy-see-products-priced/.
12. Islamichistory (2019) Available: http://islamichistory.org/islamic- golden-age/.
13. JAKIM (2012) Available: http://ii.islam.gov.my /articles/ibadah/ pengertian-ibadah.php.
14. Karwowski W. Ergonomics and human factors: the paradigms for science, engineering, design, technology and management of
human-compatible systems, Ergonomics ,2005, 48(5), 436–463.
15. Marzuki Hj. Ibrahim (2013) Reka Bentuk Produk. Dewan Bahasa dan Pustaka Kuala Lumpur.
16. Marzuki Ibrahim. An adaptation of Malaysian identity in furniture designs. 2008ifcx. PWTC, Kuala Lumpur. 28 – 30 July 2008.
17. Metmuseum (2019) Available: https://www.metmuseum.org /toah/ works-of-art/91.1.535a-h/.
18. MS.Wikipedia (2019) Available: https://ms.wikipedia.org /wiki/Islam_di_Malaysia#cite_note-10.
19. Muslim Heritage (2019) Available:http://muslimheritage. com/article/house-of-wisdom.
20. Mvslim (2019) Available: https://mvslim.com/islam-and-science- ibn-al-haytham-the-eye-of-physics/.
21. Neil Patel (2011) Available: https://www.americanexpress.com /en-us/business/trends-and-insights/ articles/4-ways-to-create -a-
product-that-sells-itself/.
22. Nrbashirah (2019) Available: http://www.nrbashirah.com /?page_id=845.
23. PEW Research Center (2015) Available: http://www. pewforum.org/2015/04/02/religious-projections-2010-2050/.
24. Priyanka Joshi (2006) What makes a product saleable? Available: https://www.rediff.com/money /2006/may/26sale.htm.
25. PRPM (2019) Available: http://prpmv1.dbp.gov.my /Search.aspx?k=produk.
26. Republika (2017) Available: https://www.republika.co.id /berita/dunia-islam/islam-digest/17/08/29/ovfpe 2313-kincir-angin-hama.
27. Salvendy G. (ed). Handbook of Human Factors and Ergonomics , 4th ed. 2012, Wiley and Sons: New Jersey.
28. Satria Ruajurai (2015) Available: https://tauhidnewsonline. Word press.com/2015/07/19/3-sunnah-rasullah-saw-maka-tidak-perlu-
rumah-sakit-dan-dokter/.
29. Subhan (2019) Available: https://www.launchgood.com /project/subhan__a_new_tool_for_dhikr#!/.
30. Squattypotty (2019) Available: https://squattypotty.my/.
31. Syafiq Hazani (2017) Available: http://www.islamituindah.com.my /2017/10/membuang-air-besar-mengikut-cara-islam.html.
32. Tumoutounews.com (2018) Available: https:// tumoutounews.com/2018/05/21/data-terbaru-jumlah-penganut-agama-di-dunia/.
33. Wikipdia (2019) Available: https://en.wikipedia.org /wiki/Islam_by_country#Table.
34. WuduMate (2019) Available: http://www.wudumate.com/our-story/about-us.

Authors: Anjali Sharma, Harsh Sohal


755.
Paper Title: Sleepy- Gate Diffusion Input (S-GDI) — Ultra Low Power Technique for Digital Design
Abstract: In this paper we propose a power efficient technique called Sleepy- Gate Diffusion Input (S-GDI)
that can be used for efficient digital design at nano scale foundries. For area and power comparison, ten prior
techniques are taken in to consideration and applied on XOR gate, 1-bit adder, 1-bit comparator and 4- bit up-down
counter. All techniques are parametrically analyzed on 65nm technology. The proposed S-GDI technique has been
observed power efficient as compared to Complementary CMOS technique (CCT), Complementary Pass Transistor
Logic (CPTL), DCMOS (Differential CMOS), Differential Cascode Voltage Switch with Pass Gate Logic
(DCVSPG), Energy Economized Pass Transistor Logic (EEPL), Lean Integration with Pass Transistors (LEAP),
Push-Pull Pass Transistor Logic (PPL), Pass Transistor Logic (PTL), CMOS with Transmission Gate (TG) and
Gate diffusion Input (GDI). As compared to GDI technique S-GDI is showing 96.20%, 93.65%, 97.88% and
98.22% power efficiency for XOR, 1-bit adder, 1-bit comparator and 4-bit up-down counter respectively. S-GDI is
showing area efficiency of 17.16% and 28.1% for XOR, 41.26% and 53.89% for 1-bit adder, 7.6% and 21.76% for
1-bit comparator and 6.7% and 28% for up-down counter over EEPL and DCMOS technique respectively.
Although other techniques except EEPL and DCMOS techniques are area efficient as compared to proposed
technique but this is on the expense of higher total power dissipation. So, PDP (power delay products) of all
considered techniques are also calculated on 65nm technology for both SUM and CARRY outputs of 1-bit adder. In
both cases power delay product for S-GDI technique is very less as compared to all other considered technique.
Due to efficiency of S-GDI in terms of considered parameters, this technique can be efficiently used for low power
applications.

Keyword : CMOS, Gate diffusion Input (GDI), MTCMOS, nm, sleep transistor (ST), Sleepy- Gate Diffusion
Input (S-GDI), VLSI.
References:
1. . M. Kang and Y. Lablebici, “CMOS Digital Integrated Circuits Analysis and Design,”(2003), pp. 481-520, McGraw-Hill publications.
2. A. Sharma and H. Sohal, “Considerations for Ultra-Low-Power VLSI Design–A Survey,” Journal of Nanoelectronics and Optoelectronics,
(2016), Vol. 11, pp. 1–21.
3. S. Borkar, “Design challenges of technology scaling,” IEEE Journal of Micro, (1999), Vol. 19, No. 4, pp. 23-29.
4. N.H.E. Weste and D.M. Harrie, “CMOS VLSI Design: A Circuits and Systems Perspective,” 4th edition, pp. 327-423, Addison-Wesley
publications.
5. D. Das, “VLSI Design - 2nd Edition” Oxford University Press, (2015), pp. 307-314.
6. A. Jaekel, S. Bandyopadhyay and G.A. Jullien, "Multi-level factorization technique for pass transistor logic,”IEE Proceedings - Circuits,
Devices and Systems, (1998), Vol. 145, No. 1 ,pp. 48 – 54.
7. P. P.Patil and A. A.Hatkar, “Comparative Analysis of 8 Bit Carry Skip Adder using CMOS and PTL Techniques with Conventional
MOSFET at 32 Nanometer Regime,” IEEE International Conference on Power Electronics, Intelligent Control and Energy Systems,
(2016), pp. 1-5.
8. M. Mittal, A. Rathod, “Digital circuit optimization using Pass Transistor Logic architectures,”International Conference on Emerging 4340-
Trends in Communication Technologies, (2016), pp. 1-5.
9. C. Kao, “BDD-based synthesis for mixed CMOS/PTL logic,” International journal of circuit theory and applications, (2011), Vol. 39, pp. 4347
923–932.
10. T. Bhuvaneswari, V. Prasad, A. Singh and C. Senthilpari, “Performance Analysis of Reversed Binary Decision Diagram Pass Trans istor
Logic Synthesis,”International journal of circuit theory and applications, (2011), Vol. 41, No.8, pp. 844-853.
11. P. Gupta, A. Gupta, and A.Asati, “Leakage Immune Modified Pass Transistor Based 8T SRAM,” International Journal of Reconfigur able
Computing,Cell in Subthreshold Region,(2015), pp. 1-10.
12. X. Bai, Y. Tsuji, T. Sakamoto, A. Morioka, M. Tada, N. Okamoto, N. Iguchi, and H.Hada, “Area-efficient nonvolatile carry chain based
on pass-transistor/atom-switch hybrid logic,” Japanese Journal of Applied Physics, (2016), Vol. 55, No. 4s.
13. I. Levi, A.Kaizerman and A.Fish, “Low voltage dual mode logic: Model analysis and parameter extraction,” Microelectronics
Journal,(2013), Vol. 44, pp. 553–560.
14. A. Srinivasulu and M. Rajesh, “ULPD and CPTL Pull-Up Stages for Differential Cascode Voltage Switch Logic,” Journal of Engineering,
(2013), pp. 1-5.
15. S. Mutoh, T. Douseki, Y. Matsuya, T. Aoki, S. Shigematsu and J. Yamada, “1- V Power Supply High- Speed Digital Circuit Technology
with Multithreshold-Voltage CMOS,” IEEE Journal of Solid- State Circuits,(1995), Vol. 30, No. 8, pp. 847-854.
16. S. Yuan, Y. Li, Y. Yuan, Y. Liu, “Pass transistor with dual threshold voltage domino logic design using standby switch for reduced
subthreshold leakage current,” Microelectronics Journal, (2013), Vol. 44, No. 12, pp. 1099-1106.
17. W. Wang, M. Anis, S.Areibi, “Fast Technique for Standby Leakage Reduction in MTCMOS circuits,” IEEE International SOC
Conference,(2004), pp. 21-24.
18. C. long, L. He, “Distributed Sleep Transistor Network for Power Reduction,” IEEE transactions on very large scale integration (VLSI)
systems, vol. 12, no. 9, pp. 937-945, 2004.
19. K. Shi, D. Howard, “Challenges in Sleep Transistor Design and Implementation in Low Power designs,” ACM/IEEE Design Automatio n
Conference,(2006), pp. 113-116.
20. K. Shi, D. Howard, “Sleep Transistor Design and Implementation - Simple Concepts Yet Challenges To Be Optimum,” IEEE International
Symposium on VLSI Design, Automation and Test, (2006), pp. 1-4.
21. S. Devi, N. S. Suhas and K. M. Anand, “Design of Full Subtractor using DPL Logic and MTCMOS Technique to Reduce the Leakage
Current and Area,” International Conference on Electrical, Computer and Communication Technologies, (2017), pp. 1-4.
22. S. Katrue, D. Kudithipudi, GALEOR: Leakage reduction for CMOS circuits, IEEE International Conference on Electronics, Circuits and
Systems, (2008), pp. 574-577.
23. M. Kumar, M.A. Hussain, S. K. Paul, New hybrid Digital Circuit Design techniques for reducing Subthreshold Leakage Power in Standby
mode, Journal of Circuits and Systems,(2013), pp. 75-82.
24. S. Singhal, N. Gaur, A. Mehra, P. Kumar, Analysis and Comparison of Leakage Power Reduction Technique in Cmos Circuits,
International conference on Signal processing and Integration Network, (2015), pp. 936-944.
25. R. Goyal, S. Sharma, “Single Bit Hybrid Full Adder Cell by Gate Diffusion Input and Pass Transistor Logic Technique,” IEEE
International conference on advances in electrical technology for green energy, (2017), pp. 37-42.
26. V. Foroutan, M. Taheri, K. Navi , A. Mazreah, “Design of two Low-Power full adder cells using GDI structure and hybrid CMOS logic
style,” Integration, the VLSI journal, (2014).
27. A.Morgenshtein, V.Yuzhaninov, A. Kovshilovsky and A. Fish, “Full-Swing Gate Diffusion Input logic—Case-study of low-power CLA
adder design,” NTEGRATION, the VLSI journal, (2014).
28. M. Shoba, R. Nakkeeran, “GDI based full adders for energy efficient arithmetic applications,” Engineering Science and Technology an
International Journal,(2015).
29. C. N. Shilpa, K. D. Shinde, H. V. Nithin, “Design, Implementation and Comparative Analysis of Kogge Stone Adder using CMOSand
GDI design: A VLSI Based Approach,” International Conference on Computational Intelligence and Communication Networks, (2016).
30. T. Sharma and L.Kumre, “A Novel Energy-Efficient Hybrid Full Adder Circuit,”IEEE International Symposium on Circuits and Systems,
(2017), pp. 1-4.
31. K. Dhar, “Design of a Low Power, High Speed, Energy Efficient Full Adder Using Modified GDI and MVT Scheme in 45nm
Technology,” International Conference on Control, Instrumentation, Communication and Computational Technologies, (2014), pp. 36-41.
32. S. Sankar, U. S. Kumar, M. Goel, M. S. Baghini, V. R. Rao, “Considerations for Static Energy Reduction in Digital CMOS ICs Using
NEMS Power Gating,”IEEE Transactions on Electron Devices, (2017), Vol. 64, No. 3, pp. 1399 – 1403.
33. J. Lin, M. Sheu, Y. Hwang, C. Wong, M. Tsai, Low-Power 19-Transistor True Single-Phase Clocking Flip-Flop Design Based on Logic
Structure Reduction Schemes,IEEE Transactions on Very Large Scale Integration (VLSI) Systems, (2017), Vol. 25, No. 11, pp. 3033 –
3044.
34. C. Goyal, J. S. Ubhi, & B. Raj, “Design of nano scale CMOS full adder with low leakage and ground bounce noise reduction,”
International conference on Signal Processing and Communication, (2016), pp. 380-385.
35. A. Nag, D. Nath, S. N. Pradhan, “Leakage Reduction of SRAM-Based Look-Up Table Using Dynamic Power Gating,” Journal of Circuits,
Systems, and Computers, (2017), Vol. 26, No. 3, pp. 1-12.
36. H. Okuhara, A. Ahmed, J. M. Kühn, H. Amano, Asymmetric Body Bias Control With Low-Power FD-SOI Technologies: Modeling and
Power Optimization, IEEE Transactions on Very Large Scale Integration (VLSI) Systems,(2018), Vol. 26, No. 7, pp. 1254-1267.
37. S. Saxena, R. Mehra, “Low-power and high-speed 13T SRAM cell using FinFETs, IET Circuits, Devices & Systems,”(2017), Vol. 11, No.
3, pp. 250-255.
38. A. Sharma, R. Mehra, “Area and Power Efficient CMOS Adder Design by Hybridizing PTL and GDI Technique,” International Journal of
Computer Applications, (2013), Vol.66, No. 4, pp. 15-22.
39. A. Morgenshtein, A. Fish and I. A. Wagner, “Gate-Diffusion Input (GDI): A Power-Efficient Method for Digital Combinatorial Circuits,”
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, (2002), Vol. 10, No. 5.

Authors: Parikshith M V, Darshan C Sekhar.

Paper Title: Feasibility of Flyash based Geopolymer for Soil Stabilization


Abstract: Soil stabilization is the process of enhancing the soil properties and making it fit for engineered
purposes. The common stabilizing techniques are becoming expensive day by day due to the rise in cost of
stabilizing agents which forces to find an alternative economical stabilizing agent. Thus this study aims to improve
the properties of the soil by adding the waste materials like flyash and geopolymers as stabilizing agents. The soil
compressive strength and water absorption for different alkaline solution to solid ratio were studied by casting
stabilized soil blocks. The solid here is represented by the mixture of red soil and flyash. It was evident from the
Unconfined Compressive Strength (UCS) tests that as the alkaline solution to solid ratio increases, the compressive
strength also increases. Optimum ratio of 0.2 was selected based on the workability conditions. It was observed that
soil blocks show a decrease in 13 per cent strength than the UCS test samples prepared from the same ratio. It is
evident to conclude that allowing a tolerance of 1 per cent variation, the strength of the soil blocks will remain in
constrain of 12 to 15 per cent of the UCS sample test value.
756.
Keyword : Soil stabilization, Flyash and Geopolymer, Unconfined compressive strength, Alkaline to solid ratio. 4348-
4351
References:
1. SP 36-Part 2(1988), “Compendium of Indian standards on Soil Engineering”, Bureau of Indian standards. New Delhi.
2. Degirmenci, N, Okucu and Turabi, “Application of phosphogypsum in soil stabilization” Building and environment, 2007, pp. 3393-
3398.
3. Punmia, Bce, and Ashok Kumar Jain (2005) Soil mechanics and foundations. Laxmi publications (P) LTD.
4. Ferone C, Colangel F, Cioffi R, Montagnaro F and Santoro L, “Mechanical performances of weathered coal fly ash based
geopolymer bricks”. Procedia Engineering, 2011, pp.745-752.
5. Obonyo, E., Kamseu, E., Lemougna, P., Tchamba, A., Melo, U. and Leonelli, C., “A sustainable approach for the geopolymerization
of natural iron-rich aluminosilicate materials”, Sustainability, 2014, pp.5535-5553.
6. Roy, A., “Soil stabilization using rice husk ash and cement”, International journal of civil engineering research, 2014, pp.49-54.
7. Shrivastava, D., Singhai, A.K. and Yadav, R.K., “Effect of lime and rice husk ash on engineering properties of black cotton soil”, Int.
J. Eng. Res. Sci. Technol, 3 2014, pp.292-296.
8. Liu, Z., Cai, C.S., Liu, F. and Fan, F., “Feasibility study of loess stabilization with fly ash–based geopolymer”, Journal of Materials
in Civil Engineering, 2016.
9. Miao, S., Shen, Z., Wang, X., Luo, F., Huang, X. and Wei, C., “Stabilization of highly expansive black cotton soils by means of
geopolymerization”, Journal of Materials in Civil Engineering, 2017.

Authors: R.Reena Roy, Maanasi.k, Pavithra.R, Rekha.M

Paper Title: Early Detection of stenosis in Coronary Artery using Adaboost and ANN Classification
Abstract: In recent years, due to the prevailing challenges in cardiovascular diseases in human , early
detection of severity of stenosis has become essential. In this paper, an image processing method for detecting and
localizing the regions in the coronary artery for segmentation is proposed.. This method works with a set of CT
reconstructed images and gives much precision in detecting stenosis and helps clinical physicians for better
diagnostic decision making process. CT is the widely used imaging technique to assess these kind of artery
diseases. Ada Boost algorithm and colour based segmentation are used to exactly find out the regions in the artery.
757.
This method is applied on the reconstructed CT image of the heart along with preprocessing techniques for the
detection of stenosis and center lines of the segmented arteries are extracted using texture extraction method. The 4352-
CT images data set are collected from Sri Chakra scan centre, Chennai. 4356

Keyword : Coronary artery disease, CT image, image segmentation, stenosis, texture extraction
References:
1. W. Xue, G. Brahm, S. Pandey, S. Leung, and S. Li,” Medical Image Analysis, vol. 43, pp. 54–65, 2018
2. Yang Dong. A Research on Coronary arteries Segmentation Algorithm for CTA Images and the Analysis on Vascular Stenosis Degree.
Zhejiang University, 2015.
3. Kavousi M, Desai CS, Ayers C, et al. Prevalence and prognostic implications of arteria coronaria calcification in low risk girls, a meta-
analysis. JAMA 2016. , http://doi:10.1001/jama.2016.17020.
4. Mast ME, Heijenbrok MW, van Kempen-Harteveld ML, et al. Less intense of CT-based calcium scores of the coronary arteries: three
years effect after breast-conserving radiotherapy using breath-hold. Strahlenther Onkol 2016; 192:696–704.
5. Gernaat SAM, Išgum I, de Vos BD, et al. Automatic arteria coronaria ca evaluation on radiation therapy designing CT scans of carcinoma
patients: dependability and association with ancient vessel risk factors. PLoS ONE 2016.
6. yefeng zheng, maciej loziczonek, bogdan georgescu, s. kevin zhou fernando, vega-higuera, dorin comaniciu machine learning primarily
based vesselness measuring for arteria coronaria segmentation in internal organ ct volumes
7. van den Bogaard VAB, Ta BDP, van der Schaaf A, et al. Validation and modification of a prediction model for acute internal organ events
in patients with carcinomar treated with radiation therapy supported on three-dimensional dose distributions to internal organ
substructures. J Clin Oncol 2017; 35:1171–8.
8. K. Saenko, and T. Darrell, “Long-term perennial convolutional networks for visual recognition and description,” in Proceedings of the
IEEE Conference on laptop Vision and Pattern Recognition, 2015, pp. 2625–2634
9. A. Rao, N. Yadu, Y. Pimpalwar, and S. Sinha, “Utility of coronary artery calcium scores in predicting coronary atherosclerosis amongs t
patients with moderate risk of coronary artery disease,” Journal of Indian College of Cardiology, vol. 7(2), pp. 55-59, 2017.
10. H. Yaşar and M. Ceylan, “A novel approach for reduction of breast tissue density effects on traditional and abnormal lots classification,”
Journal of Medical Imaging and Health science, vol. 6(3), pp. 710-717, 2016.
11. https://www.researchgate.net/figure/Figure1-Deaths-by-cause-and-sex-UK-This-figure-compiles-data-from-the-four-countries-
of_fig4_277780486

Authors: Syeda Ambareen Rana, Bharati Harsoor


A Routing Delay Reduction Mechanism Based on Dynamic Switching through Congestion Prediction in
Paper Title:
Wireless Mobile Network
Abstract: The advancement in wireless mobile networks (WMNs) and their technologies are becoming the
most popular technologies today and are widely used in various communication services. Devices for
communication are equipped with wireless network interfaces through which they can efficiently stream data to
their network-wide devices. However, due to the extreme use of different services, and TCP incapacity to control
congestion, it causes a high overload in wireless communication, which makes the network extremely unstable and
congested. Conventional routing methods with congestion control mechanisms for multimedia streams are not
reliable for transport layer protocols. In such a case, it makes wireless networks very complex and challenging to
perform smooth routing due to its dynamic characteristics and resource constraints. It can be overcome through
scheduling flow control in multiple network interfaces for smooth packets streaming data, and even it can play an
important role in congestion control by overwhelming the buffers of intermediate nodes and reduction in packet
loss. In this paper, we propose a Routing Delay Reduction Approach (RDRA) based on dynamic switching by
estimating the transmission rate and delay probability through congestion prediction. The goal of RDRA is to
reduce routing latency and packet loss and improve throughput at different traffic rates. Experimental evaluation
measures at different traffic rate variation it shows an improved performance in terms of throughput and low
latency compared to the related protocols.

Keyword : WMN, Routing, Delay Reduction, Dynamic Switching, Congestion Prediction, MANET.
References:
1. L. Zhang, C. Wan, "Dynamic Path Planning Design for Mobile Sink with Burst Traffic in a Region of WSN", Wireless Communications
and Mobile Computing(Hindawi), pp. 8, 2019.
2. P. Aimtongkham, T. G. Nguyen, C. So-In, "Congestion Control and Prediction Schemes Using Fuzzy Logic System with Adaptive
Membership Function in Wireless Sensor Networks", Wireless Communications and Mobile Computing(Hindawi), pp. 19, 2018.
758. 3. R. Melki, M. M. Mansour, A. Chehab, "A fairness-based congestion control algorithm for multipath TCP", IEEE Wireless
Communications and Networking Conference (WCNC), pp. 1 - 6, 2018. 4357-
4. S. C. Nguyen, X. Zhang, T.M.T. Nguyen, G. Pujolle, "Evaluation of Throughput Optimization and Load Sharing of Multipath TCP in
Heterogeneous Networks", In Proc. Eighth Int. Conf. Wireless and Optical Communications Networks, pp. 1-5, 2011. 4363
5. J. Wang, M.Song, "Rate-Based Active Queue Management for TCP Flows over Wired and Wireless Networks", EURASIP Journal on
Wireless Communications and Networking, Vol. 2007, pp. 8, 2007.
6. M. Ikeda, E. Kulla, M. Hiyama, M. Takizawa, "Congestion Control for Multi-flow Traffic in Wireless Mobile Ad-hoc Networks", IEEE
Sixth International Conference on Complex, Intelligent, and Software Intensive Systems, pp. 290 - 297, 2012.
7. F. Ren, T. He, S. K. Das, and Chuang Lin, "Traffic-Aware Dynamic Routing to Alleviate Congestion in Wireless Sensor Networks", IEEE
Transactions On Parallel And Distributed Systems, Vol. 22, No. 9, September 2011.
8. A. K. Dwivedi and G. Prajapati, "Study of Congestion Control in Multi-Flow in MANET", International Journal of Computer
Applications (0975 - 8887), Vol. 122 - No.14, July 2015.
9. M. A. Gawas, L. J. Gudino, K. R Anupama, "Congestion-Adaptive and Delay-Sensitive Multirate Routing Protocol in MANETs: A Cross-
Layer Approach", Journal of Computer Networks and Communications(Hindawi), pp. 13, 2019.
10. M. Shafiee, J.Ghaderi, "A Simple Congestion-Aware Algorithm for Load Balancing in Datacenter Networks", IEEE/ACM Transactions on
Networking, Vol. 25(6), pp. 3670 - 3682, 2017.
11. W. Song, S. Jiang, and G.Wei, "A Congestion-Aware Multipath Routing with Cross-Layer Design for Wireless Mesh Networks",
Proceedings of the 15th Asia- Pacific Conference on Communications,157, 2009.
12. M. F. Tsai, N. Chilamkurti, J. H. Park, C. K. Shieh, "Multi-path transmission control scheme combining bandwidth aggregation and packet
scheduling for real-time streaming in the multi-path environment", IET Communications, vol. 4, no. 8, pp. 937-945, 2010.
13. K. C. Rahman, Syed Faisal Hasan, "Explicit Rate-based Congestion Control for Multimedia Streaming over Mobile Ad hoc Networks",
International Journal of Electrical & Computer Sciences IJECS-IJENS, Vol. 10, No. 04, 2010.
14. M. Ikeda, E. Kulla, M. Hiyama, L. Barolli, M. Younas, and M. Takizawa, "TCP Congestion Control in MANETs for Multiple Traffic
Considering Proactive and Reactive Routing Protocols", 15th International Conference on Network-Based Information Systems, 2012.
15. C. -Ya Huang, P. Ramanathan, "Network Layer Support for Gigabit TCP Flows in Wireless Mesh Networks", IEEE Trans. on Mobile
Computing, Vol. 14(10), pp. 2073 - 2085, 2015.
16. A. Darehshoorzadeh, R. E. De Grande, A. Boukerche, "Toward a Comprehensive Model for Performance Analysis of Opportunistic
Routing in Wireless Mesh Networks", IEEE Trans. on Vehicular Technology, Vol. 65(7), Pp. 5424 - 5438, 2016.
17. H. Shen, L. Cai, and X. Shen, "Performance analysis of TFRC over a wireless link with truncated link-level ARQ", IEEE Transactions on
Wireless Communications, vol. 5, no. 6, June 2006.
18. A. A. El-Sherif, A. Mohamed, "Joint Routing and Resource Allocation for Delay Minimization in Cognitive Radio Based Mesh
Networks", IEEE Trans. on Wireless Comm., Vol. 13(1), Pgs. 186 - 197, 2014.
19. E. Lochin, G. Jourjon, S. Ardon P. Senac, "Promoting the Use of Reliable Rate Based Transport Protocols: The Chameleon Protocol",
International Journal of Internet Protocol Technology, Vol 5, Issue 4, pp 175-189, March 2010.
20. S. J. Lee and M. Gerla, "Split multipath routing with maximally disjoint paths in ad hoc networks", IEEE International Conference on
Communications, Vol. 10, pp. 3201– 3205, 2001.
21. L. Wang, Y. Shu, M. Dong, L. Zhang, and O. W. W. Yang, "Adaptive multipath source routing in ad hoc networks", In IEEE International
Conference on Communications, vol. 3, pp. 867–871, 2001.
22. D. A. Tran and H. Raghavendra, "Congestion adaptive routing in mobile ad hoc networks", IEEE Transactions on Parallel and Distributed
Systems, vol. 17, no. 11, pp. 1294–1305, 2006.
23. J. D. C. Little, S.C. Graves, "Little's Law", In book: Building Intuition, DOI: 10.1007/ 978-0-387-73699-0, pp.81-100, 2008.
24. C. M. Lagoa, H. Che, B.A. Movsichoff, "Adaptive control algorithms for decentralized optimal traffic engineering on the internet",
IEEE/ACM Trans. Networking, Vol. 12 (3), pp. 415-428, 2004.
25. C. Wan, J. Chang, and L. Zhang, "Dynamic path planning design of mobile sink for single region bursty traffic", Computer Science, Vol.
44(5), pp. 61–65, 2017.

Authors: G Ahmed Zeeshan, R Sundaraguru, Anjya Naik Vadithya

Paper Title: ATM Crime Prevention and theft Detection model by Wireless Technologies RFID and GSM
Abstract: The Implementation of Advanced ATM theft avoidance System is brought into world with the
perception of ATM wrong doing occurring far and wide. This paper manages the counteractive action of ATM
wrongdoing. At whatever point burglary happens, MEMS module is present to detect crime happening at ATM
machine. Proposed framework is done by ARM controller based installed framework designed for constant
information gathered utilizing a MEMS module. When the theft happens this, designed system automatically alerts
alarm such as buzzer, dc motor control gate, GSM sends SMS to authorized person and the status is displayed in
LCD to monitor. Simultaneously this framework additionally manages the well lbeing of the client by cautioning
the encompassing individuals and close-by police headquarters at whatever point the client is in risky circumstance.
Here we utilize RFID module to verify ATM Card. RFID discoveres ATM card can swipe anyplace. It naturally
sends burglary alert through GSM, buzzer ready individuals, DC motor entryway lock and all the status is displayed
759. on LCD. Keil software is used to implement programmatically and execute the project successfully.
4364-
4367
Keyword : ARM Microcontroller, ATM, GSM, MEMS, RFID
References:
1. Best Practice for ATM Security (Overview of ATM security situation, forecast, and best practices) GRG Banking Equipment (HK) Co.,
Ltd .2011/5/27
2. "European ATM Crime Report." The European ATM Security Team. June 2011.
3. Sivakumar T, GajjalaAskok& K. SaiVenuprathap, “Design and Implementation of Security Based ATM Theft Monitoring System”,
4. “Global ATM Market and Forecasts to 2016.” Retail Banking Research. September 2011. Brochure Pg 2.
5. Kim, Bo-Ra, “Domestic ATM status and meanings”, Payment and Settlement, and IT, Vol. 44, pp. 76, 2011.
6. John Adrian Shepherd-Barron, British inventor (1960), “Development the cash machine Automated Teller Machine or ATM
7. G. Ahmed Zeeshan " Embedded Web Server for Real-Time Remote Control and Monitoring of a Raspberrypi based on Open Source
Platform " IJESC Vol. 6 ISSUE 8 July 2016.
8. G. Ahmed Zeeshan " Fall Detection System and Body Positioning with Heart Rate Monitoring " IJRECE Vol. 6 ISSUE 4 November 2018.

Authors: Prashanth Kambli, Amruthalakshmi, Naresh E

Paper Title: Recognition of Handwritten Digits using Convolutional Neural Network and Linear Binary Pattern
Abstract: Over the past few years there has been a tremendous developments observed in the field of
computer technology and artificial intelligence, especially the use of machine learning concepts in Research and
Industries. The human effort can be further more reduced in recognition, learning, predicting and many other areas
using machine learning and deep learning. Any information which has been handwritten documents consisting of
digits in digital form like images, recognizing such digits is a challenging task.
The proposed system can recognize any handwritten digits in the document which has been converted into digital
format. The proposed model includes Convolutional Neural Network (CNN), a deep learning approach with Linear
Binary Pattern (LBP) used for feature extraction. In order to classify more effectively we also have used Support
Vector Machine to recognize mere similar digits like 1 and 7, 5 and 6 and many others. The proposed system CNN
and LBP is implemented on python language; also the system is tested with different images of handwritten digits
taken from MNIST dataset. By using proposed model we could able to achieve 98.74% accuracy in predicting the
760. digits in image format.
4368-
Keyword : CNN, LBP, RBF, SVM 4372

References:
1. Hemant Kumar, Rishabh, “Comprehensive Review on Supervised Machine Learning Algorithms”, 2017 International Conference on
Machine Learning and Data Science (MLDS), 2017.
2. Vanita Jain, Arun Dubey ,Amit Gupta, “ Comparative analysis of machine learning algorithms in OCR”, 2016 3rd International
Conference on Computing for Sustainable Global Development (INDIACom), 2016.
3. R.R. Malyan , S. Sunthankar, “Machine learning for hand printed character perception”, IEE Colloquium on Machine Learning, 2014.
4. Sonia Kuwelkar, Mithili N Mayekar, “Implementation of machine learning algorithm for character recognition on GPU”, International
Conference on Computing Methodologies and Communication (ICCMC), 2017.
5. Priya,Rajendra Singh,Soni Cha Priya,Rajendra Singh,Soni Changlani, “Recognition of Handwritten Digits using Proximal Support Vector
Machine”, Journal of Emerging Technologies and Innovative Research (JETIR), Volume 4, Issue 04, 2017.
6. Anish Kumar Jha1 , Anupam Ghosh1, “Hand Written Digit Recognition using Convolutional Neural Network (CNN)”, International
Journal of Innovations & Advancement in Computer Science, Volume 6, Issue 5, 2018.
7. “Handwritten Bangla Digit Recognition Using Chemical Reaction Optimization”, 9th ICCCNT ,2018.
8. Bappy Shahriar Abir, H.M. Mehedi Hasan, “Handwritten Bangla Digit Recognition Using Chemical Reaction Optimization”, 9th
International Conference on Computing, Communication and Networking Technologies (ICCCNT), 2018.
9. Shruti R. Kulkarni, Bipin Rajendran,”, 24th IEEE International Conference on Electronics, Circuits and Systems (ICECS), 2017.
10. Amitava Choudhury, Tanmay Bhowmik, “Handwritten Bengali Numeral Recognition using HOG Based Feature Extraction Algorithm”,
5th International Conference on Signal Processing and Integrated Networks (SPIN), 2018.
11. Leo Pauly, Dr.Binu paul, R,”Hand written Digit Recognition System for South Indian Languages using Artificial Neural Network”, *th
International Conference on Contemporary Computing, 2015.
12. R Kurniawan Nur, Nurul ,“Handwriting Digit Recognition using Local Binary Pattern Variance and K-Nearest Neighbor Classification”,
4th International Conference on Information and Communication Technology , 2016.
13. Michio Yasuda, Yumi Nakashima, "Pattern Augmentation for Handwritten Digit Classification based on Combination of Pre-trained CNN
and SVM", 2017 6th International Conference on Informatics, Electronics and Vision & 2017 7th International Symposium in
Computational Medical and Health Technology (ICIEV-ISCMHT), 2017.
14. Dr Hak KeungLam, Retno Larasati, "Handwritten Digit Recognition using Ensemble Neural Network and Ensemble Decision Tree",
International Conference on Smart Cities, Automation & Intelligent Computing System Yogyakarta, Indonesia, 2017.
15. Hanadi Hassen ; Ali Hamdi,”Arabic Bank Cheque Words Recognition Using Gabor Features”, 2nd International Workshop on Arabic a nd
Derived Script Analysis and Recognition (ASAR), 2018.
16. Muhammad Usman Ghani, Syed, “Handwritten Digit Recognition using DCT and HMMs”, 12th International Conference on Frontiers of
Information Technology,2014.
17. Prashanth Kambli, Amruthalakshmi “Investigating the Various Approaches towards Handwritten Digit Recognition ”, 5th National
Conference on Advancement In Information Technology, 2019, Journal of Network Security Computer Networks.
18. Ratan Kumar Basak, Shalini Guha, Saptarshi De, Sucheta Nag, “Hindu Arabic character recognition using mathematical morphology”,
IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), 2016.
19. Nikolaos Toulgaridis, Theodore Antonakopoulos, “RBM-based hardware accelerator for handwritten digits recognition”, Panhellenic
Conference on Electronics and Telecommunications (PACET), 2017.
20. Po-Yuan Shih,Wei-Bin Liang,” Integration of Orthogonal Feature Detectors in Prameter Learningof Artificial Neural Networks to Improve
robustness and the Evaluation on Hand-Written Digit Recognition Tasks”, IEEE International Conference on Acoustics, Speech and Signal
Processing (ICASSP), 2016.

Authors: Nik Lukman Nik Ibrahim, Mohd Khairul Azhar Mat Sulaiman, Amran Atan

Paper Title: Daylighting Rule of Thumb for Room with Glazing Transmittance Variation
Abstract: Since antiquity, architects have been using simple guides or easy to use calculation methods called
rules of thumb for predicting daylighting performance inside buildings. These rules of thumb in daylighting
continue to develop as new knowledge in science and technology evolves. In architectural practice, daylighting
rules of thumb have often been expressed in terms of the percentages of window area to floor area. Such rules can
be found in architectural literatures as well as in building regulations in various countries. The percentages of
window glazing area to floor area suggested in the literatures and building codes often range from 10% to 35%
depending on the specified visual tasks and the illumination characteristics desired. One of the most frequently
cited daylighting rules of thumb is for 20% glazing to floor area allocated for habitable room or space. These rules
of thumb are usually based on the standard clear glass with transmittance value of approximately 0.8 to 0.9.
However, many recent buildings in tropical countries have glazing transmittance lower than this value for glare
control and privacy purpose. In order to address this issue, daylighting simulations were conducted using AGi-32 to
determine the effects of different glazing transmittances on indoor daylight performances and to modify existing
rule of thumb. Based on the simulation data and analysis, a well-known daylighting rule of thumb by Littlefair is
modified to cater for multiple glazing transmittances. This new rule of thumb presents an easy to use calculation to
estimate daylight factor for interior based on glazing transmittance value.

Keyword : daylighting, glazing transmittance, rule of thumb


References:
761. 1. Procter et al, Cambridge International Dictionary of English, Cambridge: Cambridge University Press, 1998.
2. I.D. Rowland, Vitruvius: Ten Books on Architecture, Cambridge: Cambridge University Press, 1999.
4373-
3. P. Kristensen, “Sustainable Buildings for the Future” in FuturArc Forum. Kuala Lumpur: IEN Consultants, 2008 .
4378
4. P.R. Boyce. Human Factors in Lighting, London: Applied Science Publishers, 1981.
5. B.S. Saini, Building Environment: An Illustrated Analysis of Problems in Hot Dry Lands, London: Angus & Robertson Pty Ltd., 1973.
6. Australian Standard. Interior Lighting: General Principles and Recommendations (Part 1 / AS1680.1). New South Wales: Standard
Association of Australia, 1990
7. E. Ne’eman and R.G. Hopkinson, “Critical Minimum Acceptable Window Size”, in Lighting Research and Technology, 2(1), 1970, pp.17-
27.
8. W. Wu and E. Ng, “A Review of the Development of Daylighting in Schools”, Lighting Research and Technology, SAGE Publications,
vol. 35, no. 2, 2003, pp. 111-124.
9. N.L. Nik Ibrahim, Rules of Thumb in Daylighting Design (M.Phil. Architecture thesis), New South Wales: The University of Sydney,
2002.
10. N.L. Nik Ibrahim, S. Hayman, and R. Hyde (2009). “Rule of Thumb for Daylighting of Rooms with External Obstructions” in Architecture
Science Review, vol.52, no.2, 2009, pp. 150-159.
11. J.A. Lynes, “Chapter 3: Daylight and Energy”, in S. Roaf and M. Hancock (eds.), Energy Efficient Building: A Design Guide, Oxford:
Blackwell Scientific Publications, 1992.
12. N.L. Nik Ibrahim, Daylighting Rule of Thumb and Typology (PhD. Architecture thesis), New South Wales: The University of Sydney,
2009.
13. S.M.U., Predicting Daylight as Interior Illumination, Ohio: Libbey-Owen-Ford Glass, 1958.
14. D. Loe, Lighting Guide 11: Surface Reflectance and Colour: Its Specification and Measurement for Designers, London: The Society of
Light & Lighting and the National Physical Laboratory, 2001.
15. N.L. Nik Ibrahim and K.A. Kosman. “Daylighting Rule of Thumb and Typology” in Jurnal Alam Cipta: International Journal on
Sustainable Tropical Design Research and Practice, Universiti Putra Malaysia, vol.3, issue 1, 2009, pp. 25-33.
16. N.L. Nik Ibrahim, S. Hayman and R. Hyde, “Typological Approach to Daylighting Analysis” in Architectural Science Review, London:
Earthscan Publishing, vol.54 (special issue), 2011, pp.141-147.
17. P.R. Boyce, Human Factors in Lighting (2nd ed.), New York: Taylor and Francis, 2003.
18. S. Mirrahimi, M. Surat, N.L. Nik Ibrahim, A.I. Che-Ani and S. Johar, “Optimal of Daylighting Performance with Shading Device via
Computer Simulation for Office Building in Malaysia” in Advances in Natural and Applied Sciences, 2013 pp. 51-59.
Authors: C. MadhusudhanaRao

Paper Title: Design of Optimal Acceptance Sampling Plan for Network Intrusion Detection
Abstract: Network Intrusion Detection Systems (NIDS) protects networks connected to the internet from
malicious attacks by monitoring network flows predominantly at fragment level in network layer. Inspecting every
fragment of a network flow is computationally prohibitive. The Acceptance Sampling for Network Intrusion
Detection (ASNID) method avoids hundred percent inspections of fragments to detect anomalous flows. This study
proposes a model to determine optimal acceptance sample size. Further, this study also proposes a model for
estimating the cost of computational effort.

Keyword : Acceptance Sampling, Expected Total Cost, Expected Computational Effort, Geometric
Mean Accuracy Index, Network Intrusion Detection.
References:
1. Georgios Androulidakis, Vassilis Chatzigiannakis, Symeon Papavassiliou, “Network Anomaly Detection and Classification via
Opportunistic Sampling”, IEEE Networks, Vol 23, No.9, 2009, pp 6-12.
2. C.MadhusudhanaRao, Dr M.M.Naidu, “Acceptance Sampling for Network Intrusion Detection” Journal of Theoretical and Applied
Information Technology Vol 95, No24, pp 6707-6718, December 2017.
3. Eleazar Eskin, “Anomaly Detection over Noisy data using learned probability distributions” in Proc. 7th International Conference on
Machine Learning. Morgan Kaufmann, 2000, pp. 255–262.
4. M L Shyu, S C Chen, K Sarinna pakorn, and L Chang, “A novel anomaly detection scheme based on principal component classifier,”
IEEE Foundations and New Directions of Data Mining Workshop, pp. 172–179, Nov. 2003.
5. C Manikopoulos, S Papavassiliou, “Network Intrusion and Fault Detection: A Statistical Anomaly Approach,” IEEE Commun. Mag., vol.
40, no. 10, pp. 76–82, October 2002.
6. K. Wang and S. J. Stolfo, “Anomalous Payload-Based Network Intrusion Detection,” in Proceedings of Recent Advances in Intrusion
Detection. Springer, 2004, pp. 203–222.
7. X Song, M Wu, C Jermaine, and S Ranka, “Conditional Anomaly Detection,” IEEE Transactions on Knowledge and Data Eng., vol. 19,
pp. 631–645, 2007.
762. 8. W Lu and A A Ghorbani, “Network Anomaly Detection Based on Wavelet Analysis,” EURASIP Journal on Advances in Signal
Processing, vol. 2009, no. 837601, January 2009. 4379-
9. Sandya Peddabachigari, Ajith Abraham, Crina Grosan, Johnson Thomas, “ Modeling Intrusion Detection System using Hybrid Intelligent 4383
Systems” Journal of Network and Computer Applications, Vol 30, No.1, 2007, pp 114-132.
10. 10. Srinivas Mukkamala, Andrew H. Sung “Feature Selection for Intrusion Detection using Neural Networks and Support Vector
Machines” Journal of transportation research board, Vol 1822, 2003,pp1822-5.
11. Srilatha Chebrolu, Ajith Abraham, Johnson P. Thomas, “Feature deduction and ensemble design of intrusion detection systems” Journal of
Computers & Security, Vol 24, 2005,pp 295-307.
12. Taeshik Shon, Yongdue Kim, Cheolwon Lee, Jon sub Moon, “A Machine Learning Framework for Network Anomaly Detection using
SVM and GA” Proceedings of the IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point,
NY,June,15-19, 2005,pp 176-183.
13. 13.Surat Srinoy, Werasak Kurutach, Witcha Chimphlee, Siriporn Chimphlee, Santi Sounsri, “Computer Intrusion Detection with
Clustering and Anomaly Detection Using ICA and Rough, Fuzzy” Proceedings of the 4th WSEAS Int. Conference on Information Security,
Communications and Computers, Tenerife, Spain, December, 16-18, 2005, pp 252-257.
14. 14. M. Roesch, “Snort-Lightweight Intrusion Detection for Networks,” Proc. 13th USENIX Conference on System Administration, Seattle,
Washington, November, 7-12, 1999, pp 229–238.
15. 15. S Jiang, X Song, H Wang, J J Han, Q H. Li, “A Clustering Based Method for Unsupervised Intrusion Detections,” Pattern Recognition
Letters, Vol. 27, no. 7, 2006, pp. 802–810.
16. 16. Shekhar R. Gaddam, Vir V. Phoha, Kiran S. Balagani,“K-Means+ID3: A Novel Method for Supervised Anomaly Detection by
Cascading K-Means Clustering and ID3 Decision Tree Learning Methods”, IEEE Transactions on knowledge and data Engineering ,
Vol.19,No.3, 2007, pp 1-10.
17. 17. Amuthan Prabakar Muniyandi, R. Rajeswari, R. Rajaram “Network Anomaly Detection by Cascading K-Means Clustering and
C4.5 Decision Tree algorithm” Procedia Engineering, Vol.30, 2012, pp 174 – 182.
18. 18. Z. Muda, W. Yassin, M. N. Sulaiman, and N. I. Udzir, “A K-means and naive bayes learning approach for better intrusion
detection,” Information Technology Journal., Vol. 10, No. 3, 2011, pp 648–655.
19. 19. P Barford, j Kline, D. Plonka, and A. Ron “A Signal Analysis of Network Traffic Anomalies”, In Proc. ACM SIGCOMM IMW’02,
pages 71–82, Marseille, France, Nov. 2002.
20. 20. N Duffield “Sampling for Passive Internet Measurement: A Review”. Statistical Science, Vol. 19, No.3, pp 472–498, 2004.
21. 21. J Mai, A Sridharan, C N Chuah, T Ye, and H Zang “Impact of Packet Sampling on Port scan Detection” Technical Report RR06-ATL-
043166, Sprint ATL, 2006.
22. 22. C. Madhusudhanarao, M. M. Naidu , “A Model for Generating Synthetic Network flows and Accuracy Index for Evaluation of
Anomaly Network Intrusion Detection Systems”, Indian Journal of Science and Technology, Vol 10 No.14, pp 1-16, 2017.

Authors: Devesh Rath, Ipseeta Satpathy, B. C. M. Patnaik


Industry 4.0 - A New Futuristic Technological Revolution A Catalyst of Innovation &
Paper Title:
Entrepreneurship in Creation of Enterprises
Abstract: Industrialization is the crucial arm of an economy which is a dream for every single country on the
globe. The theoretical term Industry 4.0 or Smart Factory delineates a societal and basic man comprehension of
computerized innovative (digitalization) patterns which further subdivides the accompanying arrangements into
763. Mobile gadgets, Internet of Things (IoT) stages, Location discovery advances, Advanced human-machine
interfaces, Authentication and extortion identification, 3D printing, Smart sensors, Big information investigation 4384-
and propelled calculations, Multilevel client communication and client profiling, Augmented reality / wearables, 4390
Cloud registering, haze figuring, man-made consciousness, AI, mechanical autonomy computerization and so forth.
This paper manages the investigation of various parts of Industry 4.0 with it’s entomb connection with
advancement and business cultivating towards big business manifestations and upgrade of worldwide economy
through innovative intercessions.
Keyword : Industry 4.0, Smart Factory, I4, Industrialization, Entrepreneurship, Innovation, IoT, Big Data,
Machine Learning, Cyber Physical Systems, Automation, Robots, Artificial Intelligence, Augmented Reality,
Wearables, Digitalization.
References:
1. Aleksandr Kapitonov et al, Blockchain based protocol for economical communication in Industry 4.0, 2018 Crypto Valley Confere nce on
Blockchain Technology, 978-1-5386-7204-4/18/$31.00 ©2018 IEEE DOI 10.1109/CVCBT.2018.00010
2. Anatoli Alop et al, The Challenges of the Digital Technology Era for Maritime Education and Training, 978-1-5386-9473-2/19/$31.00
©2019 European Union
3. Anatolijs Zabasta et al, Development of Industry Oriented Curricular on Cyber Physical Systems for Belarusian and Ukrainian
Universities, 978-1-7281-1999-1/18/$31.00/2018 IEEE
4. Andreas Jakl et al, Augmented Reality for Industry 4.0: Architecture and User Experience, Conference Paper 2018 November
5. Authentication Method for Wearable IoT Devices, IEEE INTERNET OF THINGS JOURNAL, VOL. 6, NO. 1, FEBRUARY 2019
6. A.V. Andryushin et al, Organization of Students Innovative and ScientificWork in the Paradigm of the University 3.0, 978 -1-5386-5832-
1/18/$31.00 ©2018 IEEE
7. Blesson Varghese et al, Realizing Edge Marketplaces: Challenges and Opportunities, 2325-6095/18/$33.00 ©2018 IEEE
8. Christof Ebert and Carlos Henrique C. Duarte, Digital Transformation, IEEE Software, Published By The Ieee Computer Society 0 740-
7459/18/$33.00 © 2018 IEEE
9. Claudio Demartini, Lorenzo Benussi, Do Web 4.0 and Industry 4.0 Imply Education X.0?, 1520-9202/17/$33.00 © 2017 IEEE
10. Clemens Drieschner et al, Business Model Transformation Initiated by the Digital Transformation: A Review of Learning Concepts, 2019
IEEE Global Engineering Education Conference (EDUCON)
11. Dario Assante et al, Smart Education in the context of Industry 4.0, 978-1-5386-9506-7/19/$31.00 ©2019 IEEE
12. D. Cetindamar et al, Establishing Entrepreneurship Ecosystems Based on Digital Technologies: A Policy Roadmap Approach at the City
Level, 978-1-890843-37-3 ©2018 PICMET
13. Dr. Yuriy V. Seniuk, ENTREPRENEURIAL UNIVERSITY AS INNOVATION HUB IN TRANSITIONAL ECONOMY: New Digital
Platform for SME Globalization, ICETA 2018, 16th IEEE International Conference on Emerging eLearning Technologies and
Applications, November 15-16, 2018, Starý Smokovec, The High Tatras, Slovakia
14. E G Su Goh et al, 3D Object Manipulation Techniques in Handheld Mobile Augmented Reality Interface: A Review, Digital Object
Identifier 10.1109/ACCESS.2019.2906394
15. Eva Rother, Armand Baboli, Lean Manager in the Factory of the Future, 978-1-7281-0851-3/19/$31.00 ©2019 IEEE
16. Elena Mäkiö-Marusik, Current Trends in Teaching Cyber Physical Systems Engineering, 978-1-5386-0837-1/17/$31.00/2017 IEEE
17. Embodiment of the Tactile Internet, Digital Object Identifier 10.1109/JPROC.2018.2879870
18. Fangmin Sun et al Accelerometer-Based Speed-Adaptive Gait Authentication Method for Wearable IoT Devices, IEEE Explore, 2018
19. Fei Tao et al, Digital Twin in Industry: State-of-the-Art, IEEE Transactions on Industrial Informatics, Vol. 15, No. 4, April 2019
20. Florian Maurer, Jens Schumacher, Organizational Robustness and Resilience as Catalyst to Boost Innovation in Smart Service Fa ctories of
the Future, 978-1-5386-1469-3/18/$31.00 ©2018 IEEE,
21. Gang Xiong et al, From Mind to Products: Towards Social Manufacturing and Service, IEEE/CAA JOURNAL OF AUTOMATICA
SINICA, VOL. 5, NO. 1, JANUARY 2018
22. George Hurlburt, Towards Applied Cyberethics, COMPUTER PUBLISHED BY THE IEEE COMPUTER SOCIETY 0018-
9162/18/$33.00 © 2018 IEEE
23. Godfrey Anuga Akpakwu et al, A Survey on 5G Networks for the Internet of Things: Communication Technologies and Challenges,
Digital Object Identifier 10.1109/ACCESS.2017.2779844
24. Grant Thornton, CII, India’s Readiness for Industry4.0 Report,www.gita.org.in/.../India’s%20Readiness%20for%20Industry%204.0
25. Halimah Badioze Zaman et al, Integrated Smart Neighborhood Framework and Application to Sustain an Innovative Digital Economy in
the 4IR and Big Data Era, 978-1-5090-5864-8/17/$31.00 ©2017 IEEE
26. https://en.wikipedia.org/wiki/Industry_4.0
27. Human-Cloud Integration In Next Generation Healthcare Systems, Impact of next-Generation mobile technologies on Iot: cloud
convergence, Digital Object Identifier: 10.1109/MCOM.2017.1600410CM
28. Jhonattan Miranda et al, Experiences in Interactive Collaborative Learning using an Open Innovation Laboratory, 978-1-5386-0774-
9/17/$31.00 ©2017 IEEE
29. Jian-Qiang Li et al, Industrial Internet: A Survey on the Enabling Technologies, Applications, and Challenges, Digital Object Identifier
10.1109/COMST.2017.2691349
30. Kurniawan et al, Study of the use of Artificial Intelligence in Strategic Planning in the Logistics Services Industry in Indo nesia, 2018 4th
International Conference on Computing, Engineering, and Design (ICCED), 978-1-5386-9378-0/18/$31.00 ©2018 IEEE DOI
10.1109/ICCED.2018.00030
31. Maria A. Lema et al, Business Case and Technology Analysis for 5G Low Latency Applications, Digital Object Identifier
10.1109/ACCESS.2017.2685687
32. Md. Abdur Rahman et al, Blockchain-Based Mobile Edge Computing Framework for Secure Therapy Applications, SPECIAL SECTION
ON MOBILE MULTIMEDIA FOR HEALTHCARE, Digital Object Identifier 10.1109/ACCESS.2018.2881246
33. Mehmet Aksit, The Role of Computer Science and Software Technology in Organizing Universities for Industry 4.0 and Beyond, IEEE
Catalog Number: CFP1885N-ART C 2018, PTI
34. Min Chen et al, Wearable 2.0: Enabling Human Cloud Integration in Next Generation Healthcare Systems, 0163-6804/17/$25.00 © 2017
IEEE, IEEE Communication Magazine
35. Mithun Mukherjee et al, Survey of Fog Computing: Fundamental, Network Applications, and Research Challenges, IEEE
COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 3, THIRD QUARTER 2018
36. Mousumi Roy, Abhijit Roy, Nexus of Internet of Things (IoT) and Big Data: Roadmap for Smart Management Systems (SMgS), 0360 -
8581 (c) 2019 IEEE
37. Natalia Pantielieieva et al, Digitization of the Economy of Ukraine: Strategic Challenges and Implementation Technologies, The 9th IEEE
International Conference on Dependable Systems, Services and Technologies, DESSERT’2018 24-27 May, 2018, Kyiv, Ukraine
38. Paulo Leitao et al, Smart Agents in Industrial Cyber–Physical Systems, Digital Object Identifier: 10.1109/JPROC.2016.2521931
39. Pawani Porambage et al, Survey on Multi-Access Edge Computing for Internet of Things Realization, IEEE COMMUNICATIONS
SURVEYS & TUTORIALS, VOL. 20, NO. 4, FOURTH QUARTER 2018
40. Qinglong Zhan, Mengjia Yang, A Model of Maker Education in China Universities by Smart Technologies: The Perspective of Innovation
Ecosystem, 978-1-5090-3619-6/17/$31.00 ©2017 IEEE
41. Qin Jun, Xiao Jing, Innovation Research on the Emerging Engineering Talent Cultivation Mode in the Era of Industry 4.0, 978 -1-5386-
2434-0/17 $31.00 © 2017 IEEE DOI 10.1109/ICIICII.2017.68
42. Rachid Lamrani et al, Learning through play in pervasive context - A Survey, 978-1-5090-0478-2/15/$31.00 ©2015 IEEE
43. Rafal Maciag, Digital transformation as the subject of discursive analysis, 978-1-5386-4829-2/18/$31.00 ©2018 IEEE
44. Ricardo A et al, Engineering Education 4.0, 978-1-5386-2957-4/18/$31.00 ©2018 IEEE
45. Sami Haddadin et al, Tactile Robots as a Central
46. Segmentation with Motion Change Measurement, SPECIAL SECTION ON INTELLIGENT SYSTEMS FOR THE INTERNET OF
THINGS, Digital Object Identifier 10.1109/ACCESS.2017.2787675
47. Shunmugham R. Pandian, Playful STEAM Learning Using Robots, 978-1-5386-6522-0/18/$31.00 ©2018 IEEE, 2018
48. Varghese Panthalookaran, Development of an Educational Ecosystem that Supports Engineering Research, 978 -1-5386-9506-7/19/$31.00
©2019 IEEE
49. Wentao Hua, et al, HERO: Human Emotions Recognition for Realizing Intelligent Internet of Things, Digital Object Identifier
10.1109/ACCESS.2019.2900231
50. Xudong Pan et al, “Made in China 2025” and Experimental Platform Development of High-end Equipment Manufacturing Virtual and
Simulation Experiment Teaching Center, 2016 IEEE 8th International Conference on Engineering Education (ICEED), 978 -1-5090-1596-
2/16/$31.00 ©2016 IEEE
51. Yang Liu et al, Sensor Network Oriented Human Motion
52. Yong Tao et al, Reflections on Facilitating the Development of “Internet Plus” Intelligent Manufacturing in China, 978 -1-5386-5748-
5/18/$31.00 ©2018 IEEE
53. Zude Zhou et al, Fog Computing-Based Cyber-Physical Machine Tool System, SPECIAL SECTION ON CYBER-PHYSICAL
SYSTEMS, Digital Object Identifier 10.1109/ACCESS.2018.2863258

Authors: Babita Panda, Arjyadhara Pradhan, Bhagabat Panda, Nivedita pati, Chitralekha Jena

Paper Title: Design and Implementation of PV Z source Inverter topology


Abstract: Photovoltaic energy is one of the ruling area due to it’s easy availability and pollution free nature.
At the same time the voltage from the PV is needed to be stepped up for different load requirements. There are
various pulse width modulation techniques for the control of impedance Source inverter(ZSI).Here we have
considered Carrier based various PWM techniques for PV-ZSI Converter. The proposed converter consists of
cascade connection of PV Modules and Conventional-ZSI which provides higher boosting factor and smaller size
than that of existing VSI .The performance of inverters depend on the type of modulation technique used to switch
them. This work depicts a detailed analytical approach in MATLAB/Simulink platform as well hardware consists
of sine triangle PWM method for proposed new topology PV-ZSI. It has been observed output voltage of proposed
inverter is more in comparison to conventional VSI. As the proposed inverter is lesser in size and output voltage is
greater so it is more efficient than conventional VSI. There is no requirement of Boost converter .

Keyword : Photovoltaic(PV) system, Impedance source inverter(ZSI),Pulse width modulation(PWM)


techniques..
References:
1. Esram T, Chapman PL,”Comparison of photovoltaic array maximum powerpoint tracking techniques”. IEEE Trans Energy Convers
2007;22:2.
2. Bianconi E, Calvente J, Giral R, Mamarelis E, Petrone G, Ramos-Paja CA, et al.Perturb and observe MPPT algorithm with a current
controller based on thesliding mode. Int J Electr Power Energy Syst 2013;44(1):346–56.
3. Hua C, Lin J, Shen C. Implementation of a DSP-controlled photovoltaic system with peak power tracking. IEEE Trans Industr Electron
1998;45(1):99–107.
764. 4. Abdelsalam AK, Massoud AM, Ahmed S, Enjeti PN. High-performance adaptive perturb and observe MPPT technique for photovoltaic
based microgrids. IEEE Trans Power Electron 2011;4:26. 4391-
5. Brunton SL, Rowley CW, Kulkarni SR, Clarkson C. Maximum power point tracking for photovoltaic optimization using ripple-based
extremum seeking control. IEEE Trans Power Electron 2010; 25(10):2531–40. 4395
6. Bazzi AM, Krein PT. Concerning maximum power point tracking for photovoltaic optimization using ripple-based extremum seeking
control. IEEE Trans Power Electron 2011;26(6):1611–2.
7. Nithin T Abraham, K Vinoth Kumar, Vicky Jose, Dona Maria Mathew, S Suresh Kumar, “Literature Surveyof SAR Algorithm in
Photovoltaic System” International Journal of Electrical and Computer Engineering (IJECE),Vol. 4, No. 2, April 2014, pp. 155~161.
8. Enslin JHR, Wolf MS, Snyman DB, Swiegers W. Integrated photovoltaic maximum power point tracking converter. IEEE Trans Industr
Electron 1997;44: 769–73.
9. Babita Panda, Nivedita Pati and Bhagabat Panda “Hardware Implementation of PV Z source Inverter using Maximum Boost Control
Method” Proceedings of the Third International Conference on Smart Computing and Informatics, Springer, Volume 2,Page No.685 -695,
Kalinga Institute of Industrial Technology Deemed to be University, 21 st – 22nd December 2018.
10. Saravana Selvan, Pratap Nair, Umayal Umayal,”A Review on Photo Voltaic MPPT Algorithms” International Journal of Electrical and
Computer Engineering (IJECE), Vol 6, No 2.
11. Babita Panda, Dr.Bhagabat Panda, Dr.P.K Hota, Sujit Kumar Bhuyan “A Comparative Analysis of Maximum Power Point Techniques
for Photovoltaic System” IEEE Power, Communication and Information Technology Conference (PCITC), Bhubaneswar, 2015, pp. 732-
737.
12. Arjyadhara Pradhan, Bhagabat Panda,Sonalika Ghosh, Babita Panda “Efficiency Improvement of Photovoltaic system using Maximum
power point tracking,” International Conference on Electrical, Electronics, Computers, Communication, Mechanical and
Computing,(EECCMC) IEEE Madras Section 28th &29th January2018,Priyadarshini Engineering College,
13. Babita Panda, Dr.Bhagabat Panda, Dr.P.K Hota “A comparative analysis of PWM methods of ZSI used for PV system”, Proceedings of
the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications FICTA 2016, Volume 1, Page No.281 -
291, 16-17 September 2016, KIIT University, Bhubaneswar.
14. Babita Panda, Akashdeep Sarkar, Bhagabat Panda, Dr.P.K Hota, “A Comparative Study of PI and Fuzzy Controllers for Solar powered
DC-DC Boost Converter” International Conference on Computational Intelligence and Networks (CINE), Bhubaneshwar, 2015, pp. 47-51.
15. Babita Panda, Dr. P. K. Hota and Dr.Bhagabat Panda “Fault Analysis of Grid Connected Photovoltaic System” American Journal of
Electrical Power and Energy system,Vol.5,Issue 4,July 2016,pp 35-44.
16. Babita Panda, Dr. P. K. Hota and Dr.Bhagabat Panda “A simple current control strategy for single stage grid connected Three-phase PV
Inverter” American Journal of Electrical and Electronic Engineering, 2016, Vol. 4, No. 4, pp-102-109.

Authors: V. R. Niveditha, T. V. Ananthan

Paper Title: Detection of Malware attacks in smart phones using Machine Learning

765. Abstract: In recent years, security has become progressively vital in mobile devices. The biggest security
problems in android devices are malware attack which has been exposed to different threats. The volume of new
4396-
applications by the production of mobile devices and their related app-stores is too big to manually examine the
4400
each and every application for malicious behavior. Installing applications which may leads to security
vulnerabilities on the smart phones request access to sensitive information. There are various malwares can attack
android device namely virus, worms, Botnet, Trojans, Backdoor and Root kits due to these attacks the users is
compromised by privacy. Root kits and viruses in mobile phone and IoT devices improve along with smart device
versions are very difficult to detect or to the least costly. There are 3 places where the trace of these root kits / virus
is visible namely CPU, Baseband and Memory. In the new approach we will use machine learning to detect
“anomaly” usage pattern and a remote (master server) will analyze and verify the presence of such threats. This
research work aims to develop a pipeline to investigate if any application present in a smart device is a malware or
not. This pipeline uses HMM algorithm to read anomaly in application behavior, deep learning with Deep Belief
Networks (DBN) to classify application events, and bootstrapping algorithm using random forest to categorize the
application itself after malware or benign.

Keyword : Malware attacks, mobile phone, android device, Hidden Markov Model (HMM), Deep
Belief Network (DBN), Random Forest (RF), Machine Learning (ML)
References:
1. Emarketer. (2014) 2 billion consumers worldwide to get smart (phones) by 2016. [Online]. Available:
http://www.emarketer.com/Article/2- Billion-Consumers-Worldwide-Smartphones-by-2016/1011694
2. M. Senthil Kumar et. al, Experimental investigations on mechanical and microstructural properties of Al 2O3/SiC reinforced hybrid metal
matrix composite, IOP Conference Series: Materials Science and Engineering, Volume 402, Number 1, PP 012123.
(https://doi.org/10.1088/1757-899X/402/1/012123)
3. Android. (2015) Android, the world’s most popular mobile platform. [Online]. Available: http://developer.android.com/about/index.html
4. M. Fan, J. Liu, X. Luo et al., “Android malware familial classification and representative sample selection via frequent subg raph
analysis,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 8, pp. 1890–1905, 2018.
5. Z. Lin, X. Fei, S. Yi, Y. Ma, C.-C. Xing, and J. Huang, “A secure encryption-based malware detection system,” KSII Transactions on
Internet and Information Systems, vol.12, no.4, pp. 1799–1818, 2018.
6. Fei Xiao, Zhaowen Lin ,Yi Sun and Yan Ma, “Malware Detection Based on Deep Learning of Behavior Graphs”, Mathematical
Problems in Engineering, Volume 2019, Article ID 8195395, 10 pages, https://doi.org/10.1155/2019/8195395.
7. Kumar, M. Senthil, et al. "Processing and characterization of AA2024/Al 2O3/SiC reinforces hybrid composites using squeeze casting
technique." Iran. J. Mater. Sci. Eng 16.2 (2019): 55-67.
8. Surendar Madhawaa, P. Balakrishnanb and Umamakeswari Arumugama, “Employing invariants for anomaly detection in software defined
networking based industrial internet of things”, Journal of Intelligent & Fuzzy Systems xx (20xx) x–xx DOI: 10.3233/JIFS-169670, 2018.
9. S.Yogeshwaran, R.Prabhu, Natrayan.L, Mechanical Properties of Leaf Ashes Reinforced Aluminum Alloy Metal Matrix Composites,
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 10, Number 13, 2015.
10. Tianliang Lu and Su Hou, “A Two-Layered Malware Detection Model Based on Permission for Android”, 2018, IEEE International
Conference on Computer and Communication Engineering Technology (CCET).
11. L.Natrayan et al. Optimization of squeeze cast process parameters on mechanical properties of Al 2O3/SiC reinforced hybrid metal matrix
composites using taguchi technique. Mater. Res. Express; 5: 066516. (DOI: 10.1088/2053-1591/aac873,2018).
12. Liu Min, Lang Rongling, Cao Yongbin. “Number of trees in random forest”, [J]. Computer Engineering and Applications. 2015,
51(5):126- 131.
13. Arash Habibi Lashkari, Andi Fitriah A. Kadir, Hugo Gonzalez, Kenneth Fon Mbahand Ali A. Ghorbani, “Towards a Network-Based
Framework for Android Malware Detection and Characterization”, 2017, 15th Annual Conference on Privacy, Security and Trust.
14. L.Natrayan , P. Sakthi shunmuga sundaram, J. Elumalai. Analyzing the Uterine physiological With MMG Signals using SVM,
International journal of Pharmaceutical research, 2019, 11(2); 165-170.
15. Natrayan, L., M. Senthil Kumar, and Mukesh Chaudhari. "Optimization of Squeeze Casting Process Parameters to Investigate the
Mechanical Properties of AA6061/Al2O3/SiC Hybrid Metal Matrix Composites by Taguchi and Anova Approach." Advanced Engineering
Optimization Through Intelligent Techniques. Springer, Singapore, 2020. 393-406.
16. Sundaram, P. Sakthi Shunmuga, N. Hari Basker, and L. Natrayan. "Smart Clothes with Bio-Sensors for ECG Monitoring." International
Journal of Innovative Technology and Exploring Engineering 8.4 (2019): 298-301.
17. Martinelli F, Mercaldo F, Saracino A. BRIDEMAID: An Hybrid Tool for Accurate Detection of Android Malware[C]//Proceedings of the
2017 ACM on Asia Conference on Computer and Communications Security. ACM, 2017: 899-901.
18. L. Natrayan and M. Senthil Kumar. Study on Squeeze Casting of Aluminum Matrix Composites-A Review. Advanced Manufacturing and
Materials Science. Springer, Cham, 2018. 75-83. (https://doi.org/10.1007/978-3-319-76276-0_8.)
19. Balaji Baskaran and Anca Ralescu, “A Study of Android Malware Detection Techniques and Machine Learning”, MAICS 2016.
20. Kateryna Chumachenko, “Machine Learning Methods for Malware Detection And Classification”, 2017.
21. Jemili Farah, Zaghdoud M., and Ben Ahmed M.A framework for an adaptive intrusion detection system using Bayesian network.
Intelligence and Security Informatics, IEEE, 2007.
22. Singh Satnam, Donat William, Pattipati Krishna, and Willet Peter. Anomaly detection via feature-aided tracking and hidden markov
model. Aerospace Conference, IEEE, pages 1–18, March 2007.

Authors: Ra hifa Ranom, Hawa N. A. Rosszainily

Paper Title: Lithium Ion Battery Performance for Different Size of Electrode Particles and Porosity
Abstract: Nowadays, the interest of high proficiency of Lithium ion batteries is increasing as they provide
high volumetric energy densities and to meet the demand of exponentially growth of electronic devices.
Furthermore, LIB has shown their potential to offer high performance rechargeable battery in the research of
electric vehicles. Electrochemical process of Lithium ion batteries encompasses a complex ion transport between
the anode and cathode within an electrolyte. The multiscale LIB model consists of charge transport within electrode
766. particle and in electrolyte and the reaction rate at the electrolyte-electrode particle interface which directly relating
the geometry of microstructure (the size of particles, about 1nm) to the behaviour in macroscopic model (within the
4401-
thickness of electrode, about 1 µm). Thus, the geometry of cell and the interfacial behaviour are significantly
4405
control the rate of reaction rate. This study concerns about the effect of geometry variations of cell upon the
discharge curve of LiFePO4 cathode material. The electrochemical model is solved using Method of Lines
technique by discretising the spatial variable using Finite Difference Method. The simulation result is verified with
experimental data of LiFePO4 cell by Yu et. al. [14]. The effect of different sizes of particles and volume fractions
upon the cell performance are examined. It has been shown that decreasing the size of electrode particles produce
high cell potential but slightly low capacity. On the other hand, the optimal volume fraction is shown to be
ε_ν=0.4763 provided that all the particles are spherical and of the same size. Smaller volume fractions resulted in
low capacity.

Keyword : Lithium Ion battery, Mathematical model, Volume fractions, Porosity.


References:
1. P&S Intelligence, “Lithium–Ion Battery Market Overview,” Prescient & Strategic Intelligence, 2019. [Online]. Available:
https://www.psmarketresearch.com/market-analysis/lithium-ion-battery-market. [Accessed: 09-Jun-2019].
2. Ciucci F., Lai W “Derivation of Micro/Macro Lithium Battery Models from Homogenization.” Transp. Porous Med. Vol. 88(2), 2011, pp.
249-270.
3. Richardson G., Denuault G. and Please C.P., “Multiscale modelling and analysis of lithium-ion battery charge and discharge.” J. Eng.
Math. Vol. 72(1), 2012, pp. 4172.
4. Newman J., Tiedemann W., “Porous-electrode theory with battery applications”. AlChE Journal, Vol. 21(1), 1975, pp. 251.
5. Newman J. Thomas K.E., Hafezi H., Wheeler D.R., “Modeling of lithium ion batteries”. J. Power Sources, Vol. 119, 2003, pp. 838-843.
6. Mehrdad M. M., Siamak F., Mohammad F., Roydon A. F., Michael F., “Simplified electrochemical multi-particle model for LiFePO4
cathodes in lithium-ion batteries”, J. of Power Sources, Vol. 275, 2015, pp. 633-643.
7. Ramadesigan V., Northrop P.W.C., De S., Santhanagopalan S., Braatz R.D., Subramanian V.R., “Modeling and simulation of lithium-ion
batteries from a systems engineering perspective”, J. Electrochem. Soc., Vol. 159, 2012, pp. R31-R45
8. Guo M., Sikha G., White R.E., “Single-particle model for a lithium-ion cell: Thermal behavior”, J. Electrochem. Soc., Vol. 158, 2011, pp.
A122-A132
9. Dargaville S., “Mathematical Modelling of LiFePO4 Cathodes.” Queensland University of Technology, PhD Thesis, 2013.
10. Krewer U., Fridolin R., Eranda H., Richard D. B., Benjamin B., Rolf F., “Review—Dynamic Models of Li-Ion Batteries for Diagnosis and
Operation: A Review and Perspective”, J. of The Electrochemical Society, Vol. 165 (16), 2018, pp. A3656-A3673
11. Md Ashiqur R., Sohel A., Afshin I., “Electrochemical model parameter identification of a lithium-ion battery using particle swarm
optimization method”, J. of Power Sources, Vol. 307, 2016, pp. 86-97.
12. Safari M., Delacourt C., “Simulation-based analysis of ageing phenomena in a commercial graphite/LiFePO4 cell”. J. Electrochem. Soc.,
Vol. 158(12), 2011, A1436-A1447.
13. Ranom R., “Mathematical Modelling of Lithium Ion Batteries,” University of Southampton, PhD Thesis, 2014.
14. Yu S., Kim S., Kim T. Y., Nam J. H., and Cho W. Il, “Model prediction and experiments for the electrode design optimization o f
LiFePo4/graphite electrodes in high capacity lithium-ion batteries,” Bull. Korean Chem. Soc., Vol. 34, no. 1, 2013, pp. 79–88.
15. Chabot V., Farhad S., Chan Z., Fung A. S., Yu A., and Hamdullapur F., “Effect of Electrode Physical and Chemical Properties o n Lithium-
Ion Battery Performance,” J. Energy Research, Vol. 23, no. 2, 2013, pp. 14.
16. Bernhard T., Samuel J.C., Daniel J.L.B., Denis K., Paul R.S., (2016), “On the origin and application of the Bruggeman correla tion for
analysing transport phenomena in electrochemical systems”, Current Opinion in Chemical Engineering, Vol. 12, May 2016, pp. 44-51.
17. Valoen L.O., Reimers J.N., “Transport properties of LIPF6-based Li-ion battery electrolytes”. J. Electrochem. Soc., Vol. 152(5), 2005, pp.
A882-A891.
18. Phillip J.A., “Investigations of Rate Limitation in Nanostructured Composite Electrodes and Experiments Towards a 3D Li-ion
Microbattery”, University of Southampton, PhD Thesis, 2011.

Authors: Azad Khajuria, Puneet Sharma

Paper Title: Use of Plastic Aggregates in Concrete


Abstract: There is no doubt concrete is most useful thing in construction industry but it has a negative impact
also, just like a coin has two faces. Raw materials used in manufacturing of concrete affects the environment in one
or the another negative way. Like manufacturing of cement produce carbon dioxide whereas the production of
aggregates adds dust to the environment. Production of coarse aggregates also impact the geology of the area from
they were extracted. A step taken in this direction is the use of waste products along with or in replacement of
cement. Many of these materials are already in use, like silica fume, fly ash etc. In this study, plastic coarse
aggregates were used in place of natural coarse aggregates. Plastic aggregates were produced by little processing of
waste plastic. Plastic is the biggest threat to the environment, and it is affecting the environment rapidly. Some
recent studies show that it can be used construction industry due to some of its properties like inert behavior,
resistance to degradation etc. Also use of waste plastic can help in reducing plastic waste
Various experiments were performed to test the mechanical properties of the concrete with plastic coarse
aggregates. Concrete was prepared using plastic coarse aggregates in varying proportions of 0, 2.5, 5, 7.5 and 10%.

Keyword : Many of these materials are already in use, like silica fume, fly ash etc.
767.
References: 4406-
1. Elango A and Ashok Kumar A “ Study on Partial Replacement of plastic waste as fine aggregate in concrete” International Journal
of Current Engineering And Scientific Research, Volume 5, Issue 5, 2018, ISSN (Print):2393-8374, ISSN (Online): 2394-0697
4412
2. LhakpaWangmoThinghTamang, TsheringWangmo, Karma TsheringDarjay, Karma SangayPhuntsho, PhuntshoNamgyal,
UgyenWangchuk “Use of Plastics in Concrete as Coarse Aggregate” International Journal of Education and Applied Research,
Volume 7, Issue 5, 2017, ISSN (Print) 2249-4944, ISSN(Online) 2348-0033.
3. Amula.R.G, Azeef Ashraf, Muhammad Hussain, Rejith.K.U, Vijitha.V. “ use of waste plastic as aggregates in Concrete”
International Journal of Scientific & Engineering Research. Volume 7, Issue 4, 2016, ISSN 2229-5518
4. S. Vanitha, V. Natrajan and M Praba“ utilization of waste plastic as a partial replacement of coarse aggregates in concrete Bloc ks”
Indian Journal of Science and Technology, Volume 8, Issue 12, 2015, ISSN (Print) 0974-6846, ISSN (Online) 0974-5645
5. Daniel Yaw Osei, “ Experimental investigation on recycled plastics as aggregate in concrete”, International Journal of Structural and
Civil Engineering Research, Volume 3, Issue 2, 2014, ISSN 2319-6009
6. T. Subramani and V K Pugal, “ Experimental study on Plastic waste as a coarse aggregate for structural concrete”, International
Journal of Application or Innovation in Engineering & Management, Volume 4, Issue 5, 2015, ISSN 2319-4847
7. RaghatateAtul M., “ Use of plastic in concrete to improve its properties”, International Journal of Advanced Engineering Research
and Studies, Volume 1, Issue 3, 2012, ISSN 2249-8947
8. Praveen Mathew, ShibiVarghase, Thomas Paul ,EldhoVarghase, “ Recycled Plastic as coarse aggregates for structural concrete”,
International Journal for Innovative Research in Science, Engineering and Technology, Volume 2, Issue 3, 2013, ISSN 2319-8753
9. B Jaivignesh and A Sofi, “ Study on mechanical properties of concrete using Plastic Waste as an Aggregate”, IOP Conference Se ries:
Earth and Environmental Science, 2016
10. NabajyotiSaikia , Jorge de Brito, “ Use of plastic waste as aggregate in Cement mortar and concrete: A Review”, ELSEVIER,
Construction and Building Material, 2012
11. Manhal A Jibreal and Farah Peter, “ Strength and Behavior of concrete contains waste plastic”, Journal of Ecosystem and Ecography,
Volume 6, Issue 2, 2016, ISSN 2157-7625
12. MB Hossain, P Bhowmik, KM Shaad, “ Use of waste plastic aggregates in concrete as a constitutional material” Progressive
Aggriculture Journal, 2016, ISSN 1017-8139
13. Baboo Rai, TabionRushad, Bhavesh Kr, S K Duggal, “ Study of Waste Plastic Mix Concrete with Plastic”, International Scholarity
Research Network, ISRN Civl Engineering, Volume 2012, Article ID 469272
14. IS 10262:2009,” Concrete mix proportioning- guidelines”, Buereau of Indian Standards
15. IS 383:1970,” Specifications for coarse and fine aggregates from natural resources”, Buereau of Indian Standards
16. IS 456:2000, “ Code of practice for plain and reinforced concrete”, Buereau of Indian Standards.

Authors: Midhu Paulson, Mariamma Chacko

Paper Title: Integrating Wind Electrical Energy for the Marine Electrical Power System
Abstract: Utilization of renewable energy for the reduction of fuel consumption and green house gas (GHG)
emissions in the shipping industry has been increased rapidly in the recent years. Wind energy is a clean renewable
energy with no pollution which is abundantly available at sea. This paper proposes two different possible
configurations of connecting wind power energy into the ship’s main grid bus system . Wind electrical energy
output has been connected to ship’s main ac bus system in one configuration and it is connected to ship’s main dc
bus system. Even though Wind assisted ship propulsion (WASP) had been started already in the last decades in the
form of wing sails, kites, Flettener rotor etc which could assist auxiliary propulsion of the ships, the application of
wind power generator on the ship is not often applied. Therefore this paper has a relevant significance in applying
wind electrical energy for the marine electrical power system needs. This paper also reveals the benefits and
challenges in the area of onboard wind generation and opens future research possibilities in integrating wind energy
into marine industry.

Keyword : Wind energy conversion system (WECS), Horizontal axis wind turbine (HAWT), Vertical axis
wind turbine(VAWT), wind assisted ship propulsion (WASP).
768.
References: 4413-
1. Could Wind Power Return to Commercial Shipping? – gCaptain https://gcaptain.com/wind-power-return-commercial-shipping/
2. Y. Li, H. Wan and X. Meng, "Research on Wind Power Generation Application on the Ships and Offshore Structures," 2009 Asia-Pacific
4418
Power and Energy Engineering Conference, Wuhan, 2009, pp. 1-3.doi: 10.1109/APPEEC.2009.4918724
3. Zhou Heliang, “Wind power industry development prospect and strategy in China”, ShangHai Electric Power Transaction, 2007, pp1-4.
4. D A Banjarnahor 2017 IOP Conf. Series: Earth and Environmental Science 75 (2017) 012007 doi :10.1088/1755-1315/75/1/012007
5. H.M. Bayzid Belal, Moin Uddin and Tajbia Karim “Design and implementation of an eco-friendly water vehicle” In International
Conference on Robotics,Electrical and Signal Processing Techniques (ICREST), 2019. 10.1109/ICREST.2019.8644441
6. E. Bøckmann, S. Steen, "Wind turbine propulsion of ships," In Second International Symposium On Marine Propulsors, Hamburg,
Germany, 2011.
7. Ionescu, Dora & Vlase, Sorin & Ivanoiu, Mircea. (2014). Innovative solutions for small scale vertical axis wind turbines used in harbours
and shore areas. JIDEG. JIDEG. 83-86.
8. Barrass, B. & Derrett, D.R.. (2006). Ship stability for masters and mates. 10.1016/C2010-0-68323-4.
9. https://www.emarineinc.Com/securing-Your-Boat-Wind-Generator-In-Severe-Weather.
10. Kukner, Abdi & Bulut, Sertaç & Halilbese, Akilenese. (2016). “Renewable energy options and an assessment of wind -based propulsion
systems for small crafts.
11. Sorensen, Poul & Cutululis, Nicolaos & Lund, Torsten & Anca, Daniela & Soerensen, Troels & Hjerrild, Jesper & Donovan, Martin &
Christensen, Leif & Nielsen, Henny. (2007). “ Power Quality Issues on Wind Power Installations in Denmark”. 2007 IEEE Power
Engineering Society General Meeting, PES. Pp(1 – 6) 10.1109/PES.2007.385924
12. S.W. Mohod And M.V. Aware, “Power quality and grid code issues In Wind Energy Conversion System,” M. Aware And D. Lu, Eds.
Rijeka: Intech Open, 2013.
13. A.F. Zobaa And S.H.A. Aleem, Power quality in future electrical power systems. IET Digital Library, Uk,2017

Authors: Rishab Singh, Yash Bhojwani, Rachana Reddy, H. Parveen Sultana

Paper Title: Hand Gesture Based Multi-Purpose Bot


Abstract: Standard interfaces like joysticks and keyboards act as a hindrance in providing precision-oriented
results due to its unnaturalness. Recent developments have been made to overcome such imprecise interaction by
developing gesture control based on accelerometer. Combining this gesture recognition concept with Bluetooth and
the internet we aim to control the robot wirelessly to be able to ease human effort. Using this technology, we can
surmount the difficulty faced in gathering data from a hazardous and lethal areas that might pose threat to human
life. An accelerometer which measures the acceleration forces by sensing changes in its capacitance and translating
it into voltage for interpretation helps us to get values of human body movement in terms of 3D plane. Bluetooth at
769. the same time works by exchanging data between a phone and fixed device wirelessly. This is done using short-
wavelength over short distances. Using both these technologies, every swinging motion will be sensed to gather
4419-
precise movement using the accelerometer- ADXL335 and sending this data to the Arduino Uno which processes
the received input and outputs instruction to be followed by the bot. This generated data is sent over to the phone 4423
app using Bluetooth module HC-05 which is further sent to the Thingspeak.com website. The receiver end then
receives this data using Node MCU Wi-Fi Module and drives the motor to the input direction through the driving
board connected to it. Hence, a common man will be able to use this effectively and easily to complete his tasks.

Keyword : Gesture recognition; Robot; Motor driver; Bluetooth Module; Mobile Application; NODEMCU;
IoT
References:
1. Quazi, M. R., Wani, M., Kinkar, G., Nagrare, A., & Sheikh, S. (2018, January). Hand Gesture Based Robot Control. In National
Conference on Advances in Engineering and Applied Science (NCAEAS).
2. Mukherjee, S., Dhar, M., & Ghosh, A. (2018). Accelerometer Based Wireless Gesture Controlled Robot for Medical Assistance using
Arduino Lilypad.
3. Bajoria, A., Bhatnagar, S., Bhide, J., Birla, S., & Singh, A. (2018). A QUALITATIVE ANALYSIS OFWIRELESS ROBOTIC
ARMS. International Journal of Advanced Research in Computer Science, 9(2), 262.
4. Aswinbalaji, R., & Arunraja, A. (2015). Wireless Voice Controlled Robotics Arm. International Journal of Emerging Technology in
Computer Science & Electronics, 12(4), 33-38.
5. Eric Ravenscraft, “BUILD A KICKASS ROBOT ARM: THE PERFECT ARDUINO PROJECT FOR BEGINNERS”, URL:
https://lifehacker.com/build-a-kickass-robot-arm-the-perfect-arduino-project-1700643747,
visited 4th April 2015.
6. Varalakshmi, B. D., Pachauri, A., Thriveni, J., Venugopal, K. R., & Patnaik, L. M. (2014). Mems Sensors Controlled Haptic Forefinger
Robotic Aid. International Journal of Advanced Research in Engineering & Technology (IJARET), 5(10), 45-54.
7. Hussain, S. B., & Kanwal, F. (2016, August). Design of a 3 DoF robotic arm. In 2016 Sixth International Conference on Innovative
Computing Technology (INTECH) (pp. 145-149). IEEE.
8. A. N. Reganti, S. Ananthapalli, B. C. V. Mohan, R. Mounica and V. K. Mittal, "Mobile Quad-Controlled Wireless Robotic Arm,” Delhi,
2016,2016 IEEE 1st International Conference on Power Electronics, Intelligent Control and Energy Systems (ICPEICES), pp. 1-5.
9. Shiratori, T., & Hodgins, J. K. (2008, December). Accelerometer-based user interfaces for the control of a physically simulated character.
In ACM Transactions on Graphics (TOG) (Vol. 27, No. 5, p. 123). ACM.
10. Mishra, S., Tamboli, S. M., Yamgar, M. M., & Prakash, R. (2017, March). Smart device based gesture controller for industrial
applications. In 2017 International Conference on Nextgen Electronic Technologies: Silicon to Software (ICNETS2) (pp. 463-467). IEEE.

Authors: Sireesha V, Himabindu K


Decision Making With Unknown Criteria Weight Information in the Frame Work of
Paper Title:
Interval Valued Trapezoidal Intuitionistic Fuzzy Sets
Abstract: This paper proposes an interval valued trapezoidal intuitionistic fuzzy (IVTIF) decision making
model for multi criteria group decision making (MCGDM) problem by taking into consideration that the criteria
weights of each decision maker may differ with respect to each other when criteria weights are unknown prior. In
this process, a new method to find the criteria weight based on alternatives performance and Einstein weighted
averaging operator on IVTIFSs is defined. Further, the properties of interval valued trapezoidal intuitionistic fuzzy
Einstein weighted averaging (IVITFEWA) operator are proved. The proposed method is illustrated by taking a
numerical example. From the results it is observed that the proposed method can effectively rank the alternatives
compared to existing methods.

Keyword : Interval valued trapezoidal intuitionistic fuzzy set, Multi criteria group decision making (MCGDM),
unknown criteria weights, Interval Valued Intuitionistic Trapezoidal Fuzzy Einstein Weighted Arithmetic
Averaging Operator (IVITFEWAA)
References:
1. T Y Chen., “Multiple criteria group decision-making with generalized interval-valued fuzzy numbers on signed distances and incomplete
weights”, Applied Mathematical Modelling, Vol. 36, No.7, 2012, pp. 3029-3052.
2. P Liu. and F Jin., “A multi-attribute group decision-making method based on weighted geometric aggregation operators of interval-
valued trapezoidal fuzzy numbers”, Applied Mathematics Modelling, Vol. 36, Issue 6,2012, pp: 2498-2509.
3. C Tan and X Chen, “Interval-Valued Intuitionistic Fuzzy Multicriteria Group Decision Making Based on VIKOR and Choquet Integral”,
Journal of Applied Mathematics, Vol. 2013, ID. 656879. http://dx.doi.org/10.1155/2013/656879
4. X-H Chen., Yang Li., Wang P., and Yue Wei., “A fuzzy multicriteria group Decision-making with new entropy of interval-valued
770. intuitionistic fuzzy sets”, Journal of Applied Mathematics, Article ID: 827268 , 2013.
5. Z Jiang and Y Wang, “Multiple group decision making with unknown decision expert weights information in the framework of Interval
intuitionistic trapezoidal fuzzy numbers”, Mathematica problems in Engineering, Article ID. 635476, 4424-
2014. http://dx.doi.org/10.1155/2014/635476 4429
6. J Wu and Y Liu, “An approach for multiple attribute group decision making problems with interval valued intuitionistic trapezoidal fuzzy
numbers”, Computers & Industrial Engineering, Vol. 66, 2013, pp. 311- 324.
7. Z S Xu, “An overview of methods for determining OWA weights”, International Journal of Intelligent Systems, Vol.20, 2005, pp.843-
865.
8. G Deschrijver and E Kerre, “A generalization of operators on intuitionistic fuzzy sets using triangular norms and conforms”, Notes on
Intuitionistic Fuzzy sets, Vol.8, No.1, 2002, pp.19-27.
9. E Klement, R Mesiar and E Pap, “Triangular norms”, Kluwer Academic Publishers, Dordrecht, 2000.
10. E P Klement, R Meisar and E Pap, “Triangular norms, Position paper I: basic analytical and algebraic properties”. Fuzzy Sets and
Systems, Vol. 143, No.1, 2004 , pp.5-26.
11. W Wang and X Liu, “Intuitionistic fuzzy geometric aggregation operators based on Einstein operations”. International Journal of
Intelligent Systems, Vol. 26, 2011, pp.1049-1075.
12. W Wang and X Liu, “Intuitionistic fuzzy information aggregation using Einstein operations”, IEEE Transactions on Fuzzy Systems,Vol.
20, 2012, pp.923-938.
13. W Wang and X Liu, “Interval-valued intuitionistic fuzzy hybrid weighted averaging operator based on Einstein operation and its
application to decision making”, Journal of Intelligent Fuzzy Systems, Vol.25, 2013, pp.279-290.
14. K Atanasov, “Intuitonistic fuzzy sets”, Fuzzy sets and Systems, 20, 1986, pp.87-96.
15. K Atanassov and G Gargov, “Interval-valued intuitionistic fuzzy sets”, Fuzzy Sets and Systems, 31,1989, pp.343-349.
16. Z.S Xu and J Chen, “An approach to group decision making based on intuitionistic judgment matrices”, System Engineer-Theory and
Practice, 27, 2007, pp.126-133.
17. S P Wan, “Multi-attribute decision making method based on interval-valued intuitionistic trapezoidal fuzzy number”, Control and
Decision, 26(6), 2011, pp.857-860.
18. V Sireesha and K Himabindu, “An ELECTRE approach for multicriteria interval-valued intuitionistic trapezoidal fuzzy group decision
making problems”, Advances in fuzzy systems, Vol. 2016, Article ID. 1956303, http://dx.doi.org/10.1155/2016/1956303
19. Michael Greenacre , Raul Primicerio “Multivariate Analysis of Ecological Data”,ISBN:978- 84-92937-50-9, published by Fundacion
BBVA, 2013.
20. J Wu and Y Liu, “An approach for multiple attribute group decision making problem with interval valued intuitionistic trapezoidal fuzzy
numbers”, Computers & Industrial Engineering, 66, pp.311-324, 2013.

771. Authors: M.N.Prasad, A.Ramesh Babu, A.Vijaya Krishna, M.Rudra Kumar


Paper Title: Reciprocal Repository for Decisive Data Access in Disruption Tolerant Networks
Abstract: Disruption tolerant systems (DTNs) comprise of cell phones that get in touch with one another
deftly. Because of the low hub thickness and erratic hub versatility, just discontinuous system availability exists in
DTNs, and the consequent trouble of keeping up start to finish correspondence connections makes it important to
utilize "convey and-forward" strategies for information transmission. Instances of such systems incorporate
gatherings of people moving in a debacle recuperation zones, military war zones, or urban detecting applications. In
this paper we propose a a decisive strategy for stock the information at Network Central Locations (NCLs), with
different hubs.

Keyword : Disruption tolerant systems, Router, IP Address, Delay time, Network Central Locations.
References:
1. A. Balasubramanian, B. Levine, and A. Venkataramani, “DTN Routing as a Resource Allocation Problem,” ACM SIGCOMM Computer
Communication Review Volume 37 Issue 4, October 2007, Pages 373-384
2. C. Boldrini, M. Conti, and A. Passarella, “ContentPlace: Social-Aware Data Dissemination in Opportunistic Networks,” Proc. 11 thInt’l 4430-
Symp. Modeling, Analysis and Simulation of Wireless and MobileSystems (MSWiM), pp. 203-210, 2008. 4434
3. L. Breslau, P. Cao, L. Fan, G. Phillips, and S. Shenker, “WebCaching and Zipf-Like Distributions: Evidence and Implications.”Proc. IEEE
INFOCOM, vol. 1, 1999.
4. J. Burgess, B. Gallagher, D. Jensen, and B. Levine, “MaxProp:Routing for Vehicle-Based Disruption-Tolerant Networks,” Proc.IEEE
INFOCOM, 2006.
5. Wei Gao, Guohong Cao, Arun Iyengar, and Mudhakar Srivatsa, “Cooperative Caching for Efficient Data Access in Disruption Tolerant
Networks”, IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 13, NO. 3, MARCH 2014.
6. A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Gass, and J. Scott. Impact of Human Mobility on Opportunistic Forwardin g
Algorithms. IEEE Trans. on Mobile Computing, 6(6):606–620, 2007.
7. K. Fall. A Delay-Tolerant Network Architecture for Challenged Internets. Proc. SIGCOMM, pages 27–34, 2003.
8. M. J. Pitkanen and J. Ott. Redundancy and distributed caching in mobile dtns. In Proceedings of 2nd ACM/IEEE Workshop on Mobility in
the Evolving Internet Architecture (MobiArch). ACM, 2007.
9. I. Psaras, L. Wood, and R. Tafazolli. Delay-/ disruption-tolerant networking: State of the art and future challenges. University of Surrey,
Technical Report, 2010.
10. J. Reich and A. Chaintreau. The Age of Impatience: Optimal Replication Schemes for Opportunistic Networks. In Proceedings of ACM
CoNEXT, pages 85–96, 2009.

Authors: Aliyu Usman, Nurain Izzaty, Rizwan Ibrahim, Muslich Hartadi Sutanto, Sri Sunarjono

Paper Title: Storage Stability and Morphology of Latex Modified Bitumen


Abstract: Bitumen modification is done to enhance the properties of bitumen related to elasticity, temperature
susceptibility, softening point etc. This research intends to assess the effects of natural rubber latex (NRL) in liquid
form as a bitumen modifier. Conventional tests, temperature susceptibility and phase separation due to hot storage
were investigated using two separate mixing speeds of 1200 and 1300 revolution per minutes (rev/min).
Morphology due to the addition of NRL has also been explored utilizing Atomic Force Microscopy (AFM). NRL
was incorporated into the bitumen by weight of the binder for the modification at three different amounts (i.e. 3%,
5% and 6%). Based on the softening point, penetration value, temperature susceptibility and storage stability the
latex-modified asphalt binder were analyzed. Results of the investigation showed that owing to enhancement in
viscoelastic properties, the latex-modified asphalt binder will not undergo phase separation during hot temperature
storage. Meanwhile, a uniform dispersed network was indicated by the morphological analysis with the presence of
three phases of para, peri and cata. It can be deduced from the results obtained that the latex-modified asphalt
binders will perform better in terms of softening point, penetration value and susceptibility due to temperature.

Keyword : Natural rubber latex, modified bitumen, Atomic Force Microscopy, Temperature susceptibility,
772. storage stability
References: 4435-
1. Bala, N. and I. Kamaruddin, Physical and storage stability properties of linear low density polyethylene at optimum content, in Engineering 4440
Challenges for Sustainable Future. 2016. ROUTLEDGE in association with GSE Research. p. 395-399.
2. Yao, H., et al., Rheological properties and chemical bonding of asphalt modified with nanosilica. Journal of Materials in Civil Engineering,
2012. 25(11): p. 1619-1630.
3. Petersen, J.C., Chemical composition of asphalt as related to asphalt durability, in Developments in petroleum science. 2000, Elsevier. p.
363-399.
4. Sengoz, B. and G. Isikyakar, Evaluation of the properties and microstructure of SBS and EVA polymer modified bitumen. Construction and
Building Materials, 2008. 22(9): p. 1897-1905.
5. Bala, N., et al., Rheological properties investigation of bitumen modified with nanosilica and polyethylene polymer. International Journal
of Advanced and Applied Sciences, 2017. 4(10): p. 165-174.
6. Airey, G.D., Rheological properties of styrene butadiene styrene polymer modified road bitumens ☆ . Fuel, 2003. 82(14): p. 1709-1719.
7. Fini, E.H., et al., Chemical characterization of biobinder from swine manure: Sustainable modifier for asphalt binder. Journal of Materials
in Civil Engineering, 2011. 23(11): p. 1506-1513.
8. You, Z., et al., Evaluation of low-temperature binder properties of warm-mix asphalt, extracted and recovered RAP and RAS, and
bioasphalt. Journal of materials in Civil Engineering, 2011. 23(11): p. 1569-1574.
9. Peralta, J., et al., Bio-renewable asphalt modifiers and asphalt substitutes, in Sustainable bioenergy and bioproducts. 2012, Springer. p.
89-115.
10. Sani, A., et al., Engineering and microscopic characteristics of natural rubber latex modified binders incorporating silane additive.
International Journal of Pavement Engineering, 2019: p. 1-10.
11. Shafii, M., J. Ahmad, and E. Shaffie, Physical properties of asphalt emulsion modified with natural rubber latex. World Journal of
Engineering, 2013. 10(2): p. 159-164.
12. Al-Mansob, R.A., et al., Physical and rheological properties of epoxidized natural rubber modified bitumens. Construction and Building
Materials, 2014. 63: p. 242-248.
13. Shafabakhsh, G., M. Faramarzi, and M. Sadeghnejad, Use of Surface Free Energy method to evaluate the moisture susceptibility of sulfur
extended asphalts modified with antistripping agents. Construction and Building Materials, 2015. 98: p. 456-464.
14. Wen, Y., et al., The use of natural rubber latex as a renewable and sustainable modifier of asphalt binder. International Journal of
Pavement Engineering, 2017. 18(6): p. 547-559.
15. Ziari, H., M. Naghavi, and R. Imaninasab, Performance evaluation of rubberised asphalt mixes containing WMA additives. International
Journal of Pavement Engineering, 2018. 19(7): p. 623-629.
16. Shaffie, E., et al., Stripping performance and volumetric properties evaluation of hot mix asphalt (HMA) mix design using natural rubber
latex polymer modified binder (NRMB), in InCIEC 2014. 2015, Springer. p. 873-884.
17. Zhu, J., B. Birgisson, and N. Kringos, Polymer modification of bitumen: Advances and challenges. European Polymer Journal, 2014. 54: p.
18-38.
18. Al-Sabaeei, A., et al., A Review of using natural rubber in the modification of bitumen and asphalt mixtures used for road construction.
Jurnal Teknologi, 2019. 81(6).
19. Swetha, D.V. and K.D. Rani, Effect of Natural Rubber on The Properties of Bitumen and Bituminous Mixes. International Journal of Civil
Engineering and Technology, 2014. 5(10): p. 09-21.
20. Tantatherdtam, R., Reinforcement of natural rubber latex by nanosize montmorillonite clay. 2003.
21. Ismail, H. and M.N. Salmah, Dynamic vulcanization of rubberwood-filled polypropylene/natural rubber blends. Polymer testing, 2001.
20(7): p. 819-823.
22. Azahar, N., et al., An overview on natural rubber application for asphalt modification. Int. J. Agric. For. Plant, 2016. 2: p. 212-218.
23. Ouyang, C., et al., Improving the aging resistance of styrene–butadiene–styrene tri-block copolymer modified asphalt by addition of
antioxidants. Polymer degradation and stability, 2006. 91(4): p. 795-804.
24. Read, J., D. Whiteoak, and R.N. Hunter, The shell bitumen handbook. 2003: Thomas Telford.
25. Yusoff, N.I.M., et al., The effects of moisture susceptibility and ageing conditions on nano-silica/polymer-modified asphalt mixtures.
Construction and Building Materials, 2014. 72: p. 139-147.
26. Arshad, A.K., et al., Microstructure of nanosilica modified binder by atomic force microscopy. Jurnal Teknologi, 2016. 78(7-3).

Authors: N Greeshma, C Raghavendra, K Rajendra Prasad

Paper Title: Visualization of Optimal Product Pricing using E-Commerce Data


Abstract: With the number of e-commerce websites being increasing rapidly, online shopping has become the
trend nowadays. Though, online shopping is very easy; however, when it comes to product selection it is a tedious
task and time consuming to identify which online site gives us the best price and offers. Comparing products and
filtering them from each online site is a very time consuming task for a buyer. This paper uses the techniques of
Web Scraping using python libraries like Beautiful Soup, requests, matplotlib for identifying the best prices and for
deciding the best product deal to the customer from different online websites. Web scraping is an automated
technique of extracting data from websites. In this paper, real time data is extracted from various e-commerce sites
and compared automatically. Finally, the results are graphically displayed based on which the customer makes the
appropriate decision.

Keyword : Web Scraping, e-commerce data extraction, python libraries.


773. References:
1. Legality and Ethics of Web Scraping; Twenty-fourth Americas Conference on Information Systems, New Orleans, 2018. 4441-
2. Shakra Mehak, Rabia Zafar, Sharaz Aslam, Sohail Masood Bhatti. "Exploiting Filtering approach with Web Scrapping for Smart On line 4443
Shopping: Penny Wise: A wise Tool for Online Shopping", 2019 2nd International Conference on Computing, Mathematics and
Engineering Technologies (iCoMET), 2019.
3. Python – The Fastest Growing Programming Language (IRJET) Volume: 04 Issue: 12, Dec-2017 e-ISSN: 2395-0056.
4. https://www.geeksforgeeks.org/python-introduction-matplotlib/#targetText= Matplotlib% 20is%20 an%20amazing% 20visualization,
Hunter%20in%20the% 20year%202002.
5. Increased Information Retrieval Capabilities on e-Commerce Websites using Scraping Techniques 978-1-5386-2182-0/17/ IEEE , 2017
International Conference on Sustainable Information Engineering and Technology (SIET).
6. https://www.edureka.co/blog/web-scraping-with-python/
7. C. Raghavendra, S. Sivasubramanian, A. Kumaravel, “Improved image compression using effective lossless compression technique”,
Cluster Computing, March 2018.
8. https://en.wikipedia.org/wiki/Web_scraping
9. https://www.crummy.com/software/ BeautifulSoup/bs4/doc/
10. https://realpython.com/python-requests/
11. A. Kumaravel, S. Sivasubramanian, C. Raghavendra “Features Subset Selection using Improved Teaching Learning based Optimizati on
(ITLBO) Algorithms for Iris Recognition”, Indian Journal of Science and Technology, Vol 10, Issue 34, 1-12, September 2017.
12. K Rajendra Prasad, C Raghavendra, A Kumaravel, “Study on Secure Health Care Data using Big Data Analytics”, Jour of Adv. Research
in Dynamical & Control Systems, Vol. 10, 10-Special Issue, Aug 2018.

Authors: M.V.V.S. Prasad, T.Ranga Babu


Artifact Elimination from EEG Signals using Error Normalized algorithms for Brain Computer
Paper Title:
Interface Systems
Abstract: In this paper some efficient and low computation complex signal conditioning algorithms are
proposed in distant health tracking applications, for improvement of the electroencephalogram (EEG) signal. Few
774. artifacts are contaminated also mask small characteristics underlying EEG signal activity in medical environments
during extraction of EEG signal. Low computational difficulty filters are appealing especially within distant 4444-
healthcare surveillance. Therefore, we provided several effective and less computing adaptive noise cancellers 4448
(ANCs) in this work to improve EEG signal. Most of these techniques use easy addition as well as shift calculations
also attain significant convergence performance compared to other standard techniques. Real EEG signals collected
using emotional EEG systems are verified for proposed implementations. Using several performances measures our
studies demonstrate that techniques suggested provides best performance than prevailing methods. This
methodology is suitable in the analysis of brain computer interface (BCI) applications.

Keyword : Artifacts, Adaptive noise cancellers, Convergence, EEG, Health care monitoring .
References:
1. F. C. Morabito et al., “Enhanced compressibility of EEG signal in Alzheimer’s disease patients,” IEEE Sensors J., vol. 13, no. 9, pp.
3255–3262, Sep. 2013.
2. S. Gao, Y. Wang, X. Gao, and B. Hong, “Visual and auditory brain– computer interfaces,” IEEE Trans. Biomed. Eng., vol. 61, no. 5, pp.
1436–1447, May 2014.
3. T. Zarghami, H. S. Mir, and H. Al-Nashash, “Transfer-function-based calibration of sparse EEG systems for brain source localization,”
IEEE Sensors J., vol. 15, no. 3, pp. 1504–1514, Mar. 2015.
4. N. Ille, P. Berg, and M. Scherg, “Artifact correction of the ongoing EEG using spatial filters based on artifact and brain signal
topographies,” J. Clin. Neurophysiol., vol. 19, no. 2, pp. 113–124, 2002.
5. E. Urrestarazu, J. Iriarte, M. Alegre, M. Valencia, C. Viteri, and J. Artieda, “Independent component analysis removing artifacts in ictal
recordings,” Epilepsia, vol. 45, no. 9, pp. 1071–1078, 2004.
6. B. W. McMenamin, A. J. Shackman, L. L. Greischar, and R. J. Davidson, “Electromyogenic artifacts and electroencephalographic
inferences revisited,” NeuroImage, vol. 54, no. 1, pp. 4–9, 2011.
7. A. Nijholt and D. Tan, “Brain-computer interfacing for intelligent systems,” IEEE Intell. Syst., vol. 23, no. 3, pp. 72–79, May 2008.
8. B. J. Lance, S. E. Kerick, A. J. Ries, K. S. Oie, and K. McDowell, “Brain computer interface technologies in the coming decades,” Proc.
IEEE, vol. 100, no. 13, pp. 1585–1599, May 2012.
9. J. B. F. Van Erp, F. Lotte, and M. Tangermann, “Brain computer interfaces: Beyond medical applications,” Computer, vol. 45, no. 4, pp.
26–34, Apr. 2012.
10. G. Schalk and E. C. Leuthardt, “Brain-computer interfaces using electrocorticographic signals,” IEEE Rev. Biomed. Eng., vol. 4, pp. 140–
154, Oct. 2011.
11. Y. Lingling, H. Leung, M. Plank, J. Snider, and H. Poizner, “EEG Activity During Movement Planning Encodes Upcoming Peak Speed
and Acceleration and Improves the Accuracy in Predicting Hand Kinematics,” IEEE Journal of Biomedical and Health Informatics, vol.
19, no. 1, pp. 22-28, 2015.
12. K. T. Sweeney, H. Ayaz, T. E. Ward, M. Izzetoglu, S. F. McLoone, and B. Onaral, “A methodology for validating artifact remova l
techniques for physiological signals,” IEEE Trans. Inf. Technol. Biomed., vol. 16, no. 5, pp. 918–926, Sep. 2012.
13. F. Morbidi, A. Garulli, D. Prattichizzo, C. Rizzo, and S. Rossi, “Application of Kalman filter to remove TMS-induced artifacts from EEG
recordings,” IEEE Trans. Control Syst. Technol., vol. 16, no. 6, pp. 1360–1366, Nov. 2008.
14. P. C. Petrantonakis and L. J. Hadjileontiadis, “Emotion recognition from brain signals using hybrid adaptive filtering and higher order
crossings analysis,” IEEE Trans. Affective Comput., vol. 1, no. 2, pp. 81–97, Jul./Dec. 2010.
15. G.V.S.Karthik, S. Y. Fathima, Md. Zia Ur Rahman, Sk.RafiAhamed, A. Lay-Ekuakille, “Efficient Signal conditioning techniques for Brain
activity in Remote Health Monitoring Network”, IEEE Sensors Journal, Vol-13, No-9, pp. 3276-3283, 2013.
16. M. Z. U. Rahman, S. R. Ahamed, and D. V. R. K. Reddy, “Efficient and simplified adaptive noise cancellers for ECG sensor based remote
health monitoring,” IEEE Sensors J., vol. 12, no. 3, pp. 566–573, Mar. 2012.
17. S. Olmos and P. Laguna, “Steady-state MSE convergence analysis in LMS adaptive filters with deterministic reference inputs for
biomedical signals,” IEEE Transaction on Signal Processing, vol. 48, pp. 2229-2241, Aug. 2000.
18. M. S. E. Abadi and John H. Husoy, “Mean-square performance of the family of adaptive filters with selective partial updates”, Signal
Processing, vol. 88, pp. 2008-2018, 2008.
19. Eweda Eweda, “Analysis and Design of a Signed Regressor LMS Algorithm for Stationary and Nonstationary Adaptive Filtering with
Correlated Gaussian Data”, IEEE Transactions on Circuits and Systems, vol. 37, no. 11, pp. 1367-1374, Nov., 1990.
20. I. Soumya, Md. Zia Ur Rahman, D.V.R.K.Reddy A. Lay-Ekuakille, “Efficient Block Processing of Long duration Biotelemetric Brain data
for Health Care Monitoring”, Review of Scientific Instruments, Vol-86, pp.035003-1-10, 2015.
21. B. Farhang-Boroujeny, Adaptive Filters-Theory and Applications. Chichester, U.K.: Wiley, 1998.
22. S Jo, and S W Kim, “Consistent Normalized Least Mean Square Filtering With Noisy Data Matrix”, IEEE Transactions on Signal
Processing, vol. 53, no. 6, pp. 2112-2123, June, 2005.
23. K. K. Parhi, VLSI Digital Signal Process. Systems. New York, NY, USA: Wiley, 1999.
24. Emotiv Systems, Emotiv Brain Computer Interface Technology, San Francisco, CA, USA [Online]. Available: http://emotiv.com
25. J. Malmivuo and R. Plonsey, Bioelectromagnetism: Principles and Applications of Bioelectric and Biomagnetic Fields. Oxford, U.K.:
Oxford Univ. Press, 1995.”

Authors: Vineet Kumar, A. K. Sinha, A. K. Solanki

Paper Title: Image Completion using Spiking Neural Networks


Abstract: In this paper, we are showing how spiking neural networks are applied in image repainting, and its
results are outstanding compared with other machine learning techniques. Spiking Neural Networks uses the shape
of patterns and shifting distortion on images and positions to retrieve the original picture. Thus, Spiking Neural
Networks is one of the advanced generations and third generation of machine learning techniques, and is an
extension to the concept of Neural Networks and Convolutional Neural Networks. Spiking Neural Networks (SNN)
is biologically plausible, computationally more powerful, and is considerably faster. The proposed algorithm is
tested on different sized digital images over which free form masks are applied. The performance of the algorithm
is examined to find the PSNR, QF and SSIM. The model has an effective and fast to complete the image by filling
775. the gaps (holes).
4449-
4452
Keyword : Biological Neuron Model, image inpainting, Machine Learning, response entropy, spiking neural
networks, STDP rule.
References:
1. Jianxin Wu, (2012). Efficient Hik SVM Learning For Image Classification. IEEE Transactions On Image Processing, Vol. 21, No. 10.
2. A. Krizhevsky, I. Sutskever, and G. Hinton, (2012). Imagenet classification with deep convolutional neural networks. In Advanc es in
Neural Information Processing Systems 25, pages 1106–1114.
3. Lizhen Lu, Liping Di, Senior and Yanmei Ye. (2014). A decision-tree classifier for extracting transparent plastic- mulched landcover from
Landsat-5 TM images. IEEE Journal Of Selected Topics In Applied Earth Observations And Remote Sensing, Vol. 7, No. 11.11, pp. 4548-
4558,
4. Zhu, G., and Blumberg, D. G. (2002). Classification using ASTER data and SVM algorithms: the case study of Beer Sheva. Israel Remote
Sensing of Environment, 80: 233– 240.
5. P. Vincent, H. Larochelle, Y. Bengio, (2008). Extracting and composing robust features with denoising autoencoders. ICML. ACM,
pp.1096-1103.
6. Larochelle, Y.Bengio, (2008). Classification using discriminative restricted Boltzmann machines. Proceedings of the 2 5th international
conference on Machine learning. ACM, pp.536-543.
7. S. Ren, K. He, R. Girshick. (2015). Faster r-CNN: towards real-time object detection with region proposal networks. Advances in neural
information processing systems, pp.91-99.
8. K. Fukushima, S. Miyake. (1982). Neocognitron: A new algorithm for pattern recognition tolerant of deformations and shifts in position.
Pattern Recognition,15 (6): pp 455-469.
9. D. W. Ruck, S. K. Rogers, M. Kabrisky. (1990). Feature selection using a multilayer perceptron. Journal of Neural Network Computing.
Volume 2, Number 2, pp 40-48.
10. D. E. Rumelhart, G. E. Hinton, R. J. Williams. (1986). Learning representations by back-propagating errors. Nature, 323: pp 533-538.
11. Y. LeCun et al., (1990). Handwork digit recognition with a back-propagation network. in Advances in Neural Information Processing
Systems, Colorado, USA:[s. N], pp. 396-404.
12. Y. LeCun, C. Cortes. (2010). MNIST handwritten digit database.
Http: // yann. Lecun. Com / exdb / mnist.
13. P.Y. Simard, D. Steinkraus, J.C. Platt, (2003). Best Practices for Convolutional Neural Networks Applied to Visual Document
Analysis, Proc. Int'l Conf. Document Analysis and Recognition (ICDAR '03), pp. 958-963.
14. Kumar Chellapilla, Sidd Puri, Patrice Simard, (2006).High-performance convolutional neural networks for document processing.tenth
International Workshop on Frontiers in Handwriting Recognition, Université de Rennes La Baule (France).
15. A. Krizhvsky. (2009). Learning multiple layers of features from tiny images. Tech report.
16. A. Karpathy, G. Toderici, S. Shetty, T. Leung, R. Sukthankar and L. Fei-Fei, (2014) Large-Scale Video Classification with Convolutional
Neural Networks, 2014 IEEE Conference on Computer Vision and Pattern Recognition, Columbus, OH, pp. 1725-1732.
17. X. Wang, M. Yang, S. Zhu and Y. Lin, (2015) Regionlets for Generic Object Detection, in IEEE Transactions on Pattern Analysis and
Machine Intelligence, vol. 37, no. 10, pp. 2071-2084.
18. Yuming Hua, Junhai Guo and Hua Zhao, (2015). Deep Belief Networks and deep learning. Proceedings of 2015 International Conference
on Intelligent Computing and Internet of Things, Harbin, pp. 1-4.
19. A. Gupta and L. N. Long, (2007). Character recognition using spiking neural networks. In Neural Networks, 2007. IJCNN 2007.
International Joint Conference on. IEEE, pp. 53–58.
20. Tavanaei, Amirhossein & Ghodrati, Masoud & Kheradpisheh, Saeed Reza & Masquelier, Timothée & Maida, Anthony. (2018). Deep
Learning in Spiking Neural Networks. Neural Networks. 10.1016/j.neunet.2018.12.002.
21. M. W. Gondal, B. Scholkopf, and M. Hirsch. (2018) The unreasonable effectiveness of texture transfer for single image super resolution.
In Workshop and Challenge on Perceptual Image Restoration and Manipulation (PIRM) at the 15th European Conference on Computer
Vision (ECCV).
22. T.-C. Wang, M.-Y. Liu, J.-Y. Zhu, A. Tao, J. Kautz, and B. Catanzaro. (2018) High-resolution image synthesis and semantic manipulation
with conditional GANs. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pages 5.
23. Y. Song, C. Yang, Z. Lin, X. Liu, Q. Huang, H. Li, and C. Jay. (2018). Contextual-based image inpainting: Infer, match, and translate. In
European Conference on Computer Vision (ECCV), pp3–19.
24. J. V. Stone, (2018) Principles of Neural Information Theory: Computational Neuroscience and Metabolic Efficiency. Sebtel Press.

Authors: Lata Gohil, Dharmendra Patel

Paper Title: Multilabel Classification for Emotion Analysis of Multilingual Tweets


Abstract: Emotion Analysis of text targets to detect and recognize types of feelings expressed in text.
Emotion analysis is successor of Sentiment analysis. The latter does coarse-level analysis and classify the text into
positive and negative categories while former does fine-grain analysis and classify text in specific emotion
categories like happy, surprise, angry. Analysis of text at fine-level provides deeper insight compared to coarse-
level analysis. In this paper, tweets are classified in discrete eight basic emotions namely joy, trust, fear, surprise,
sadness, anticipation, anger, disgust specified in Plutchik’s wheel of emotions [1]. Tweets for three languages
collected out of which one is English language and rest two are Indian languages namely Gujarati and Hindi. The
collected tweets are related to Indian politics and are annotated manually. Supervised Learning and Hybrid
approach are used for classification of tweets. Supervised learning uses tf-idf as features while hybrid approach
uses primary and secondary features. Primary features are generated using tf-idf weighting and two different
algorithms of feature generation are proposed which generate secondary features using SenticNet resource.
Multilabel classification is performed to classify tweets in emotion categories. Results of experiments show
effectiveness of hybrid approach.

776. Keyword : Emotion Analysis, Sentiment Analysis, Affect Analysis, Fine-grained, Hindi Corpus, Gujarati
Corpus, Opinion Mining 4453-
4457
References:
1. R. Plutchik, “Emotion: A psychoevolutionary synthesis: Harpercollins College Division,” 1980.
2. “Digital 2019: Global Internet Use Accelerates - We Are Social.” [Online]. Available: https://wearesocial.com/blog/2019/01/digital-
2019-global-internet-use-accelerates. [Accessed: 31-Oct-2019].
3. E. Öhman, T. Honkela, and J. Tiedemann, “The challenges of multi-dimensional sentiment analysis across languages,” in
Proceedings of the Workshop on Computational Modeling of People �s Opinions, Personality, and Emotions in Social Media
(PEOPLES), 2016, pp. 138–142.
4. W. Wolny, “Emotion analysis of Twitter data that use emoticons and emoji ideograms,” 2016.
5. H. Wang and J. A. Castanon, “Sentiment expression via emoticons on social media,” in 2015 IEEE International Conference on Big
Data (Big Data), 2015, pp. 2404–2408.
6. D. Das, S. Poria, C. M. Dasari, and S. Bandyopadhyay, “Building resources for multilingual affect analysis--a case study on hindi,
bengali and telugu,” in Workshop Programme, 2012, p. 54.
7. V. K. Jain, S. Kumar, and S. L. Fernandes, “Extraction of emotions from multilingual text using intelligent text processing a nd
computational linguistics,” J. Comput. Sci., vol. 21, pp. 316–326, 2017.
8. C. Strapparava, A. Valitutti, and others, “Wordnet affect: an affective extension of wordnet.,” in Lrec, 2004, vol. 4, no. 1083–1086,
p. 40.
9. “Hindi WordNet, IIT Mumbai.” [Online]. Available: http://www.cfilt.iitb.ac.in/∼wordnet/ wn.old/.
10. A. Esuli and F. Sebastiani, “Sentiwordnet: A publicly available lexical resource for opinion mining.,” in LREC, 2006, vol. 6, pp.
417–422.
11. P. Ekman, “An argument for basic emotions,” Cogn. Emot., vol. 6, no. 3–4, pp. 169–200, 1992.
12. “India - number of social network users 2023 | Statista.” [Online]. Available: https://www.statista.com/statistics/278407/number-of-
social-network-users-in-india/. [Accessed: 01-Aug-2019].
13. H. Schuff, J. Barnes, J. Mohme, S. Padó, and R. Klinger, “Annotation, modelling and analysis of fine-grained emotions on a stance
and sentiment detection corpus,” in Proceedings of the 8th Workshop on Computational Approaches to Subjectivity, Sentiment and
Social Media Analysis, 2017, pp. 13–23.
14. S. Goyal, N. Tiwari, and R. B. India, “EMOTION RECOGNITION: A LITERATURE SURVEY.”
15. E. Cambria, S. Poria, D. Hazarika, and K. Kwok, “SenticNet 5: Discovering conceptual primitives for sentiment analysis by mea ns of
context embeddings,” in Thirty-Second AAAI Conference on Artificial Intelligence, 2018.

Authors: Shajin Prince, Samson Immanuel J, Manoj G, Amir Anton Jone A, Bini D

Paper Title: Design of a Linear Voltage to Frequency Converter for Digital Audio Applications
Abstract: Voltage to frequency converters are used in various types of analog to digital converters in suitable
digital audio applications. One of the applications is the Audio Interface which has been considered. The Voltage to
frequency converter (VFC) thus plays a major role in the analog to digital conversion. This paper proposes a low
power VFC designed in 0.18 µm technology which in turn is used to design a low cost and a high-resolution analog
to digital converter (ADC). The analog signal is given to the V-F converter and the VFC output is given to the
frequency counter using a suitable link. This counter gives the digital output. The design is implemented in PSoC
and the performance is analysed with the previous technologies. Parameters such as sensitivity, output frequency
and power consumption are analysed. This V-F converter and ADC are used in the digital audio interface which is
used for audio applications. With the proposed VFC and ADC, the interface produced a good SNR compared to the
conventional audio interfaces.

Keyword : low power VFC, frequency counter, PSoC


References:
1. Y. H. Leow, H. Tang, Z. C. Sun, and L. Siek, “A 1 V 103 dB 3rd-orderaudio continuous-time ADC with enhanced noise shaping in 65
nmCMOS,”IEEE J. Solid-State Circuits, vol. 51, no. 11, pp. 2625–2638,Nov. 2016.
2. K.Taniguchi, "A design of the voltage-to-frequency converter," Trans. Inst. Elect. Commun. Eng. (Japan), vol. 57, pp. 597-599, Oct.1974.
3. John L. Lindesmith, "Voltage-to-Digital Measuring Circuit," U.S. Patent 2,835,868, filed September 16, 1952, issued May 20, 1958.
(Voltage-to-frequency ADC).
4. Chung, Y.-H.;Wu, J.-T. A 16-mW 8-Bit 1-GS/s digital-subranging ADC in 55-nm CMOS. IEEE Trans. Very Large Scale Integr. Syst.
2015, 23, 557–566. [CrossRef]
5. Ku, I.-N.; Xu, Z.; Kuan, Y.-C.; Wang, Y.-H.; Chang, M.-C.F. A 40-mW 7-bit 2.2-GS/s time-interleaved subranging CMOS ADC for low-
power gigabit wireless communications. IEEE J. Solid-State Circuits 2012, 47, 1854–1865. [CrossRef]
6. Pernillo, J.; Flynn, M.P. A 1.5-GS/s flash ADC with 57.7-dB SFDR and 6.4-bit ENOB in 90 nm digital CMOS. IEEE Trans. Circuits Syst.
II Express Briefs 2011, 58, 837–841. [CrossRef]
7. Chahardori, M.; Sharifkhani, M.; Sadughi, S. A 4-Bit, 1.6 GS/s low power flash ADC, based on offset calibration and segmentation. IEEE
Trans. Circuits Syst. I Regul. Pap. 2013, 60, 2285–2297.
777. 8. Park, C.-J.; Onabajo, M.; Geddada, H.M.; Karsilayan, A.I.; Silva-Martinez, J. Efficient broadband current-mode adder-quantizer design for
continuous-time sigma-delta modulators. IEEE Trans. Very Large Scale Integr. Syst.2015, 23, 1920–1930. [CrossRef]
9. Razavi, B. Principles of Data Conversion System Design; IEEE Press: Piscataway, NJ, USA, 1995 4458-
10. Nuzzo, P.; Nani, C.; Armiento, C.; Sangiovanni-Vincentelli, A.; Craninckx, J.; van der Plas, G. A 6-Bit 50-MS/s threshold configuring 4464
SAR ADC in 90-nm digital CMOS. IEEE Trans. Circuits Syst. I Regul. Pap. 2012, 59, 80–92. [CrossRef]
11. Van de Grift, R.; Rutten, I.W.J.M.; van der Veen, M. An 8-bit video ADC incorporating folding and interpolation techniques. IEEE J.
Solid-State Circuits 1987, 22, 944–953. [CrossRef].
12. Kimura, H.; Matsuzawa, A.; Nakamura, T.; Sawada, S. A 10-b 300-MHz interpolated-parallel A/D converter, IEEE J. Solid-State Circuits
1993, 28, 438–446. [CrossRef]
13. Doernberg, J.; Gray, P.R.; Hodges, D.A. A 10-bit 5-Msample/s CMOS two-step flash ADC. IEEE J. Solid-State Circuits 1989, 24, 241–
249. [CrossRef]
14. Zahrai, S.A.; Azhari, S.J. A 12b 100MS/s Highly Power Efficient Pipelined ADC for Communication Applications. Cyber J. J. Sel. Areas
Microelectron. 2011, 2, 1–7.
15. Zhang, D.; Bhide, A.; Alvandpour, A. A 53-nW 9.1-ENOB 1-kS/s SAR ADC in 0.13um CMOS for medical implant devices. IEEE J.
Solid-State Circuits 2012, 47, 1585–1593. [CrossRef]
16. Zhu, Z.; Liang, Y. A 0.6-V 38-nW 9.4-ENOB 20-kS/s SAR ADC in 0.18-_m CMOS for Medical Implant Devices. IEEE Trans. Circuits
Syst. I Regul. Pap. 2015, 62, 2167–2176. [CrossRef]
17. Stepanovic, D.; Nikolic, B. A 2.8 GS/s 44.6 mW time-interleaved ADC achieving 50.9 dB SNDR and 3 dB effective resolution bandwidth
of 1.5 GHz in 65 nm CMOS. IEEE J. Solid-State Circuits 2013, 48, 971–982.
18. Goette J, Jacomet M, Hager M. Using dither to improve the performance of lossy sigma–delta modulators. The Third IEEE International
Workshop on Electronic Design, Test and Applications, 2006: 11
19. Yu J, Maloberti F. A low-power multi-bit.•modulator in 90-nm digital CMOS without DEM. IEEE J Solid-State Circuits, 2005, 40(12):
2428
20. E. Bachet al., “A 1.8 V true-differential 140 dB SPL full-scale standardCMOS MEMS digital microphone exhibiting 67 dB SNR,”
inIEEEInt. Solid-State Circuits Con

(ISSCC) Dig. Tech. Papers, Feb. 2017,pp. 166–167.


21. A. Sukumaran and S. Pavan, “Low power design techniques forsingle-bit audio continuous-time delta sigma ADCs using FIR feed-
back,”IEEE J. Solid-State Circuits, vol. 49, no. 11, pp. 2515–2525,Nov. 2014.
22. C. D. Berti, P. Malcovati, L. Crespi, and A. Baschirotto, “A 106 dBa-weighted DR low-power continuous-time modulator forMEMS
microphones,”IEEE J. Solid-State Circuits, vol. 51, no. 7,pp. 1607–1618, Jul. 2016.
23. C. D. Berti, P. Malcovati, L. Crespi, and A. Baschirotto, “A 106 dBa-weighted DR low-power continuous-time modulator forMEMS
microphones,”IEEE J. Solid-State Circuits, vol. 51, no. 7,pp. 1607–1618, Jul. 2016.
24. Y. H. Leow, H. Tang, Z. C. Sun, and L. Siek, “A 1 V 103 dB 3rd-orderaudio continuous-time ADC with enhanced noise shaping in 65
nmCMOS,”IEEE J. Solid-State Circuits, vol. 51, no. 11, pp. 2625–2638,Nov. 2016.
25. T.C.Wang,Y.H.Lin,andC.C.Liu,“A0.022mm298.5 dB SNDRhybrid audio modulator with digital ELD compensation in 28
nmCMOS,”IEEE J. Solid-State Circuits, vol. 50, no. 11, pp. 2655–2664,Nov. 2015

778. Authors: Lijin George, D S Robinson Smart, Vishnu Haridas


Paper Title: Effect of Reinforcements on Specific Wear Rate of Al 7075 / Tib2/ Cr2O3 Hybrid Composites
Abstract: A composite material contains different reinforcing elements added to the major material that forms
the base matrix. In this work Aluminium 7075 matrix was reinforced with 12% TiB2and 4%, 6% and 8% Cr2O3
and the wear behavior of this composite was studied. The composite material was prepared by the process of stir
casting. The rate of specific wear was measured for different reinforcements under varying velocity and load. The
Scanning Electron Microscope images of the worn-out surfaces were used to investigate the wear pattern. The wear
rate could further be extrapolated using fuzzy logic and were compared with the experimental results.

Keyword : Hybrid composites, Stir Casting, Fuzzy Logic, Specific Wear rate, Pin on disc, Micro hardness,
Impact Strength
References:
1. Gopichand Dirisenapu, Seelam Reddy, and Lingaraju Dumpala. “The effect of B 4C and bn nanoparticles on the mechanical and
microstructural properties of al7010 hybrid metal matrix.” ,Materials Research Express, 6, 08 2019.
2. A. Baradeswaran, S.C. Vettivel, A. Elaya Perumal, N. Selvakumar, and R. Franklin Issac. “Experimental investigation on mechanical
behaviour, modelling and optimization of wear parameters of B 4C and graphite reinforced aluminium hybrid composites.” ,Materials &
Design, 63:620 – 632, 2014. ISSN 0261-3069.
3. S. Johny James, K. Venkatesan, P. Kuppan, and R. Ramanujam. “Hybrid aluminium metal matrix composite reinforced with SiC and 4465-
TiB2.”, Procedia Engineering, 97:1018 – 1026, 2014. ISSN 1877-7058. 4468
4. Mahmood Khan, Muhammad Zulfaqar, Fahad Ali, and Tayyab Subhani. “Microstructural and mechanical characterization of hybrid
aluminum matrix composite containing boron carbide and Al-Cu-Fe quasicrystals.”, Metals and Materials International, 23(4):813–822,
Jul 2017. ISSN 2005-4149.
5. Basavarajappa Kuldeep, Ravikumar P, Pradeep S, and Gopi K.R. “Effect of boron nitride and zirconium dioxide on mechanical beh avior of
Al 7075 metal matrix hybrid composite.” ,Materials Research Express, 6, 11 2018.
6. Senthil Kumar Marikkannan and Natrayan L. “Processing and characterization of AA2024/Al 2O3/sic reinforces hybrid composites using
squeeze casting technique.” ,Iranian Journal of Materials Science and Engineering, 16:55–67, 07 2019. doi: 10.22068/ijmse.16.2.55.
7. Balachandar Munisamy, Vijaya Ramnath Bindu Madhavan, Elanchezhian Chinnadurai, and Jeykrishnan Janardhanan. “Prediction of
mechanical properties of Al6061 metal matrix composites reinforced with zircon sand and boron carbide. “ ,Materials Testing, 61(6):537–
542, Jun 2019. ISSN 0025-5300.
8. R. Palanivel, Isaac Dinaharan, R. Laubscher, and J. Davim. “Influence of boron nitride nanoparticles on microstructure and wear behavior
of AA6082/TiB2 hybrid aluminum composites synthesized by friction stir processing.”, Materials and design, 106:195–204, 06 2016.
9. Pratip Roy, Subhash Singh, and Kaushik Pal. “Enhancement of mechanical and tribological properties of SiC- and BC-reinforced
aluminium 7075 hybrid composites through friction stir processing.”, Advanced Composite Materials, 28(sup1):1–18, 2019.
10. Mahmut Can Senel, Mevlut Gurbuz, and Erdem Koc. “Fabrication and characterization of synergistic Al-SiC-gnps hybrid composites.”,
Composites Part B: Engineering, 154:1 – 9, 2018. ISSN 1359-8368.
11. Vipin Kumar Sharma and Vinod Kumar. “Development of rare-earth oxides based hybrid amcs reinforced with SiC/Al 2O3: mechanical &
metallurgical characterization.” ,Journal of Materials Research and Technology, 8(2):1971 – 1981, 2019. ISSN 2238-7854.

Authors: Syed Md Kashif Ali, Brijbhushan S, Sharanamma S. K


“Experimental Analysis of M35 Concrete with Partial Substitute of Fine Aggregate by Nylon Glass
Paper Title:
Filled Granules and Cement by Flyash”
Abstract: Concrete is a material which widely used in construction industry. The present investigation deals
with the study of partial replacement of fine aggregate by Nylon Glass Granules in concrete. The fine aggregates
are replaced by 0%, 10%, 20% and 30% by Nylon Glass Granules by volume of natural sand in M35 grade of
concrete. Additionally, to increase the tensile strength of concrete 1% of Steel Fiber by volume of cement were
added to all the mixes containing Nylon Glass Granules. The concrete produced by such ingredients were cured for
7 and 28 days to evaluate its hardened properties. The 28days hardened properties of concrete revealed that
maximum strength is observed for the mix which possesses 20% replacement of fine aggregate by Nylon Glass
Granules compared with the conventional concrete, thus it is said to be the optimum mix.

Keyword : Cement, Natural sand, Nylon Glass Granules(NGG), Steel Fiber, Fly ash, Compressive Strength,
split tensile strength, Flexural Strength

779. References:
1. In 2009 vol. Waste Management Zainab Z. Ismail Enas A. AL-Hashmion on waste glass recycling as a partial substitute for fine
concrete aggregate. (29) pp 655–659. 4469-
2. . S.P. Gautam, Srivastava Vikas and V.C. Agarwal on the use of glass waste in Concrete 2012 J as a good aggregate. Acad. Indus. Res. 4474
Vol. 1(6).
3. In 2012, Construction and Building Materials vol. (35) pp 785–791, Esraa Emam Ali Sherif H. Al-
Tersawy on Recycled glass as a partial substitute for fine aggregate in self-compacting concrete.\
4. Mohammad Iqbal Malik , Aarif Manzoor , Barkat Ahmad , Syed Asima4, Rozi Ali , Muzafar Bashir on Positive Potential Of Partial
Replacement Of Fine Aggregates By Waste Glass (<600 Micron) In Concrete in 2014 vol. (5) pp 146-153
5. Mrs. Bhandari P.S. Mr. Dhale S.A. Mr. Ghutke V.S. Mrs. Pathan V.G. on Influence of Fine Glass Aggregate On Cement Mortar in
2014 International Journal Of Engineering And Computer Science ISSN. Vol. (3) pp 2319-7242
6. M. Adaway & Y. Wang, on partial replacement for fine aggregate in structural concrete is particularly attractive in 2015 Elec tronic
Journal of Structural Engineering 2015 vol. 14(1) .
7. F. Mahdi , H. Abbas , A.A. Khan ,” Strength characteristics of polymer mortar and concrete using different compositions of resins
derived from post consumer PET bottles “,Construction and Building Materials 24 (2010) 25–36
8. R.V. Silva , J. de Brito Naba jyoti Saikia ,” Influence of curing conditions on the durability -related performance of concrete made
with selected plastic waste aggregates “,Cement & Concrete Composites 35 (2013) 23–3
9. Dr. Prahallada. M.C and Dr. Prakash K.B “Strength and Workability Characteristics of Waste Plastic Fibre Reinforced Concrete
Produced From Recycled Aggregates” International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622
10. Batayneh M., 2007, “Use of waste materials in concrete mixes”, Waste management (27)1870-1878.
11. Alexandra M. da Silva, Jorge de Brito ,Rosário Veiga,” Incorporation of fine plastic aggregates in rendering mortars
“,Construction and Building Materials 71 (2014) 226–236.
12. A. Oner , S. Akyuzb, R. Yildiza,(2004)“An experimental study on strength development of oncrete containing fly ash and optimum
usage of fly ash inconcrete” Cement and Concrete Research , Vol.35, Issue 6, pp 11651171

Authors: Agarwal, N., Verma, A. K.


Measurement of Bubble Size, Gas holdup and Interfacial Area in Bubble Columns using Image
Paper Title:
Processing Techniques
Abstract: Bubble sizes in bubble column affect transfer processes. Therefore, it’s important to calculate
bubble size and interfacial area. Bubble size distribution (BSD) in a bubble column of rectangular cross section
with dimensions 0.2m x 0.02m was measured using photographic method (400 fps) for air-water system. Gas
holdup, Sauter-mean bubble diameter, aspect ratio and specific interfacial area were estimated from BSD. Effect of
superficial gas velocity and static bed height on these parameters was investigated. The bubble size distribution
exhibited mono-modal distribution showing the presence of non-uniform homogeneous bubbling regime. The
frames of video were analysed using image processing steps to obtain major and minor axis of elliptical bubbles.
Values of d32, , and ai were estimated from the data. The value of d32 increased with increasing Ug but is
independent of Hs. The values of d32 were somewhat higher than the values reported by other investigators. The
value of ai increases with increasing Ug and with decreasing Hs. Present values of compared well with the data
reported in literature.

Keyword : Bubble column, Bubble size, Bubble size distribution, gas holdup, interfacial area, Image
processing, Multi-phase system.
References:
1. A. Karn, C. Ellis, R. Arndt, J. Hong, “An integrative image measurement technique for dense bubbly flows with a wide size dis tribution”,
Chem. Eng. Sci. vol. 122, 2015, pp.240–249.
2. F.S. Ahmed, B. A. Sensenich, S.A. Gheni, D. Znerdstrovic, M. H. Al-Dahhan “Bubble Dynamics in 2D Bubble Column: Comparison
between high-speed camera imaging analysis and 4-point optical probe”, Chem. Eng. Commun. vol. 202, 2015, pp. 85–95.
3. Y.M. Lau, N.G. Deen, J.A.M. Kuipers, “Development of an image measurement technique for size distribution in dense bubbly flows”
780. Chem. Eng. Sci. vol. 94, 2013a, pp.20–29.
4. Y.M. Lau, K. T. Sujatha, M. Gaeini, N.G. Deen, J.A.M. Kuipers “Experimental study of the bubble size distribution in a pseudo -2D bubble 4475-
column”, Chem. Eng. Sci. vol.98, 2013b, pp. 203–211.
5. Y. Fu, Y. Liu, “Development of a robust image processing technique for bubbly flow measurement in a narrow rectangular channe l”, Int.
4479
J. Multiphase Flow. vol. 84, 2016, pp.217–228.
6. A. Zaruba, E. Krepper, H. M. Prasser, E. Schleicher, E. “Measurement of bubble velocity profiles and turbulent diffusion coefficients of
the gaseous phase in rectangular bubble column using image processing”, Exp. Therm. Fluid Sci. vol. 29, 2005, pp.851–860.
7. G. Besagni, F. Inzoli, “Bubble size distributions and shapes in annular gap bubble column”, Exp. Therm Fluid Sci. vol. 74, 2016a, pp.27–
48.
8. G. Besagni, F. Inzoli, “Comprehensive experimental investigation of counter-current bubble column hydrodynamics: Holdup, flow regime
transition, bubble size distributions and local flow properties”, Chem. Eng. Sci. vol. 146, 2016b, pp.259–290.
9. J.R.V. Cordero, D. Sámano, R. Zenit, “Study of the properties of bubbly flows in Boger-type fluids”, J. Non-Newtonian Fluid Mech. vol.
175–176, 2012, pp.1–9.
10. S. Zhong, X. Zou, Z. Zhang, H. Tian, “A flexible image analysis method for measuring bubble parameters”, Chem. Eng. Sci. vol. 141,
2016, pp.143–153.
11. X. Guan, N. Yang, “Bubble properties measurement in bubble columns: From homogeneous to heterogeneous regime”, Chem. Eng. Res.
Des. vol. 127, 2017, pp. 103–112.
12. D. Feng, J-H. Ferrasse, A. Soric, O. Boutin, “Bubble characterization and gas–liquid interfacial area in two phase gas–liquid system in
bubble column at low Reynolds number and high temperature and pressure”, vol. 144, 2019, pp. 95-106.
13. Y.M. Lau, F. Moller, U. Hampel, M. Schubert, “Ultrafast X-ray tomographic imaging of multiphase flow in bubble columns – Part 2:
Characterisation of bubbles in the dense regime”, Int. J. Multiphase Flow, vol. 104, 2018, pp. 272-285.
14. A. H. G. CENTS, D. J. W. JANSEN, D.W.F. BRILMAN, G. F. VERSTEEG,” INFLUENCE OF SMALL AMOUNTS OF ADDITIVES ON GAS
HOLD-UP, BUBBLE SIZE, AND INTERFACIAL AREA”, IND. ENG. CHEM. RES. VOL. 44, 2005, PP.4863-4870.
15. R. Pohorecki, W. Moniuk, A. Zdrójkowski, “Hydrodynamics of a bubble column under elevated pressure”, Chem. Eng. Sci. vol. 54, 1999,
pp. 5187-5193.
16. M. Millies, D. Mewas, “Interfacial area density in bubbly flow”, Chem. Eng. Process. vol. 38, 1999, pp. 307–319.
17. K. Akita, F. Yoshida, “Bubble size, interfacial area, and liquid-phase mass transfer coefficient in bubble columns”, Ind. Eng. Chem.
Process Des. Dev. vol. 13(1), 1974, pp. 84-91.
18. W. A. Al-Masry, E. M. Ali, “Identification of hydrodynamics characteristics in bubble columns through analysis of acoustic sound
measurements—Influence of the liquid phase properties”, Chem. Eng. Process. vol. 46, 2007, pp.127–138.

Authors: Mohammed Badiuddin Parvez, Amritha Thankachan,Chalapathi k, M .Inayathulla


Modelling of Intensity-Duration Frequency curves for Upper Cauvery Karnataka through Normal
Paper Title:
Distribution
Abstract: The IDF Curves accessible are for the most part done by fitting arrangement of yearly greatest
precipitation force to parametric dispersions. Intensity-duration-frequency (IDF) curves represent the relationship
between storm intensity, storm duration and return period. Environmental change is relied upon to intensify the
boundaries in the atmosphere factors. Being prone to harsh climate impacts, it is very crucial to study extreme
781. rainfall-induced flooding for short durations over regions that are rapidly growing. One way to approach the
extremes is by the application of the Intensity-Duration-Frequency (IDF) curves. The annual maximum rainfall 4480-
intensity (AMRI) characteristics are often used to construct these IDF curves that are being used in several 4502
infrastructure designs for urban areas. Thus, there is a necessity to obtain high temporal and spatial resolution
rainfall information. Many urban areas of developing countries lack long records of short-duration rainfall. The
shortest duration obtained is normally at a daily scale/24 h. Thus, it is very crucial to find a methodology to
construct IDF curves for short-duration rainfall (sub-daily) for these urban areas. The fast extension of urban area
that does not have adequate preparedness to cope with climate change is certainly a big risk to life and economy.
The study region lies in Karnataka India. The sub-daily IDF curves for current and future climate for the region
were constructed from 1 to 24 h based on the Normal Distribution approach. Rainfall data of 23 (Twenty three)
hydrological years of all stations were used. Maximum rainfall frequency analysis was made by Normal
Distribution method. Finally Equations were developed for different return periods.

Keyword : Climate change, Intensity Duration Frequency (IDF), Normal Distribution, Rainfall Duration.
References:
1. Bell F. C., 1969, “Generalized rainfall-duration-frequency relationship”, ASCE J. Hydraulic Eng., 95, 311–327.
2. Bernard, M. M., (1932), “Formulas for rainfall intensities of long durations”. Trans. ASCE 6:592 - 624.
3. Bhaskar, N. R.; Parida, B. P.; Nayak, A. K. 1997. Flood Estimation for Ungauged Catchments Using the GIUH. Journal of Water Resources
Planning and Management., ASCE 123(4): 228-238.
4. Chow V.T., D.R. Maidment and L.W.Mays, 1988, “Applied Hydrology”, McGraw- Hill, Chapter 10 – Probability, Risk and Uncertainty
Analysis for Hydrologic and Hydraulic Design: 361 – 398.
5. M. M. Rashid, 1 S. B. Faruque and 2 J. B. Alam 2012, “Modeling of Short Duration Rainfall Intensity Duration Frequency (SDRIDF)
Equation for Sylhet City in Bangladesh.
6. Mohammed Badiuddin Parvez, M Inayathulla “Generation Of Intensity Duration Frequency Curves For Different Return Period Using
Short Duration Rainfall For Manvi Taluk Raichur District Karnataka”, International Research Journal of Engineering and Management
Studies (IRJEMS), Volume: 03 Issue: 04 | April -2019.
7. Mohammed Badiuddin Parvez, M Inayathulla “Prioritization Of Subwatersheds of Cauvery Region Based on Morphometric Analysis Using
GIS”, International Journal for Research in Engineering Application & Management (IJREAM), Volume: 05 Issue: 01, April -2019. 4.
8. Mohammed Badiuddin Parvez, M Inayathulla “Modelling of Short Duration Isopluvial Map For Raichur District Karnataka”, International
Journal for Science and Advance Research in Technology (IJSART), Volume: 05 Issue: 4, April -2019.
9. Mohammed Badiuddin Parvez, M Inayathulla, "Rainfall Analysis for Modelling of IDF Curves for Bangalore Rural, Karnataka",
International Journal of Scientific Research in Multidisciplinary Studies , Vol.5, Issue.8, pp.114-132, 2019
10. Mohammed Badiuddin Parvez, and M Inayathulla. "Generation of Short Duration Isohyetal Maps For Raichur District Karnataka"
International Journal Of Advance Research And Innovative Ideas In Education Volume 5 Issue 2 2019 Page 3234-3242
11. Mohammed Badiuddin Parvez, and M Inayathulla. " Derivation Of Intensity Duration Frequency Curves Using Short Duration Rainfall For
Yermarus Raingauge Station Raichur District Karnataka" International Journal of Innovative Research in Technology Volume 6 Issue 2
July 2019 Page 1-7
12. Mohammed Badiuddin Parvez, Chalapathi K and M Inayathulla. " Geomorphological Analysis of Two Mini-Watersheds in Raichur City
Karnataka" International Research Journal of Engineering and Technology (IRJET) Volume 6 Issue 6 June 2019 Page 2896-2901
13. Sherman, C. W. (1931). Frequency and intensity of excessive rainfall at Boston, Massachusetts, Transactions of the American Society of
Civil Engineers, 95, pp.951– 960.

Authors: Sh. Kh. Fazilov, N.M. Mirzaev, T.R. Nurmukhamedov, K.A. Ibragimova, S.N. Ibragimova

Paper Title: Model of Recognition Operators Based on the Formation of Representative Objects
Abstract: Parametric representations of the model of recognition operators based on the selection of
representative objects are considered. The main idea of the proposed model is to build a family of proximity
functions in the parameter space. In this case, the proximity function is determined within the framework of the
radial function. A distinctive feature of the proposed model is the formation of preferred features with respect to
selected representative objects when constructing recognition operators. To verify the performance of the proposed
model, experimental studies were carried out to solve the model problem.

Keyword : Parametric representations, radial functions, Recognition operators, representative objects


References:
1. PawlakZ, Rough Sets “Theoretical Aspects of Reasoning about Data”, Dordrecht Kluwer, 1991.
2. WangG,WuY,ChangL, “An approach for attribute reduction and rule generation based on rough set theory”, Journal of Software 10
(11) (1999) 1206–1211.
3. Z.Pawlak,Roughsets, International Journal of ComputerInfSci11(1982)341–356.
4. M.Kryszkiewicz,Roughsetapproachtoincompleteinformationsystems,Info.Science112(1998)39–49.
5. TsoukisA, StefanowskiJ, “On the extension of rough sets under in complete information, in: New Directions in rough sets ,Data
Mining , and Granular-Soft Com- puting,vol.1711,SpringerBerlinHeidelberg,1999,pp.73–81.
782. 6. GrecoS, SlowinskiJ and BlaszczynskiJ, “Multi-criteria classification–a new scheme for application of dominance-based decision
rules, Eur.J.Oper.Res.181 (2007) 1030–1044. 4503-
7. ZhuW, Generalized rough sets based on relations,Info.Science177(2007)4997–5011. 4508
8. BryniarskiE, WybraniecU and Bonikowski Z, , -Skardowska, Extensions and intentions in the rough set
theory,Info.Science107(1998)149–167.
9. XWuC,HuHQ,YuDR&LiuJF, “Neighbor hood rough set based heterogeneous feature sub set
selection”,Info.Science178(18)(2008)3577–3594.
10. YaoYY “Decision-theoretic roughest models”, in Proceeding of the Second Int.Conf. on Rough Sets and Knowledge Technology,
2007, pp.1–12.
11. HerbertJ, YaoJT&AgameJ “theoretic perspective on roughest analysis”, JChongqing University Posts Telecommunications.20
(2008)291–298.
12. PradeH and DuboisD, “Rough fuzzy sets and fuzzy rough sets, International. J. General Syst.17 (1990)191–209.
13. ZhangWX, WuWZ and LeungY, “Knowledge acquisition in incomplete information systems: A rough set approach, Eur. Journal.
Oper. Res. 168 (2006)164–180.
14. WangXZ, He.Q and ChenDG, “FRSVMs:fuzzy rough set based support vector machines, Fuzzy Sets Systems.161(2010)596–607.
15. Wang WT, Dai JH, Tian HW, , Liu L,Decision rule mining using classification consistency rate,Knowl.BasedSyst.43(2013)95–102.
16. Skowron A and Swiniarski RW, “Rough set methods in feature selection and recognition, Pattern Recognition Lett.24 (2003)833 –
849.
17. ShenQ and JensenR, “New approaches to fuzzy-rough feature selection”, IEEETrans. Fuzzy Systems17(4)(2008)824–838.
18. Liao XW, Xu WH, Li Y, , “Approaches to attribute reductions based on rough set and matrix computation in inconsistent ordered
information systems”, Knowl.BasedSystems.27(2012)78–91.
19. QinYK and haoH.Z, , “Mixed feature selection in incomplete decision table”, Knowledge Based Systems57(2014)181–190.
20. MatarazzoB, Slowinski R,& Greco S, “Rough sets in decision making, Encycl.Com-plex.Syst.Sci.(2009)7753–7787.
21. Shen LX, Tay F, , “Fault diagnosis based on rough set theory”, Eng. Appl. Artif. Intelligence.16 (1)(2003)39–43.
22. WakulicADeja and PaszekP, “Applying roughest theory to medical diagnosing, Rough Sets” Intelligent. Syst. Paradig.
4585(2007)427–435.
23. Cao CG Jiang F, Sui YF, “A rough set approach to outlier detection”, International J.Gen.Syst.37 (2008)519–536.
24. Chen YS, “Classifying credit ratings for Asian banks using integrating feature selection and the CPDA-based rough sets approach,
Knowledge Based Syst. 26(2012) 259–270.
25. ZPawlak, “Rough Sets” International J. Computer Information Science. 198211 (5), 341– 356.
26. Z.Pawlak, “Rough Sets: Theoretical Aspects of Reasoning about Data”, Kluwer Academic Publishing, Dordrecht, 1991.
27. PawlakZ, “Rough set approach to knowledge-based decision support”. Eur. J. Operation 1997 Res. 99, 48–57.
28. BusseGrazymala, ZPawlakSlowinskiJW and ZiarkoW “Rough sets”, Communications of the ACM, Vol. 38, pp.88–95, 1995.
29. Rybinski H. and KryszkiewiczM, (1996b). “Reducing information systems with uncertain real value attributes”. In 6th International
Conferences, Information Processing and Management of Uncertainty in Knowledge- Based Systems, Proceedings (IPMU’96), Vol.
II. July 1–5, Grenada. pp. 1165.
30. PawarBV and DhandeVarda C, “A Survey on Parallel Method for Rough Set using MapReduce Technique for Data Mining”,
International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064.
31. ImielinskiT, R Agrawal, &ASwami. “Mining association rules between sets of items in large databases”, Proceedings of 1993 ACM
SIGMOD, ACM, New York, NY, USA,1993, pp.207–216.
32. PK Reddy & RU Kiran, “Mining rare association rules in the datasets with widely varying items” frequencies Lecture Notes in
Computer Science, Vol. 5981, 2010,pp.49–62.
33. NCercone and J Li “A rough set based model to rank the importance of association rules”, Lecture Notes in Computer Science,
2005,Vol. 3642, pp.109–118.
34. SOFalaki, AOAdetunmbi, OSAdewale, and BKAlese, ‘Network intrusion detection based on rough set and knearestneighbour’,
International Journal of Computing and ICT Research, 2008, Vol. 2, pp.60–66.
35. RamannaS, PetersJF, SurajZ, ShanS and N. Pizzi, “Classification of meteorological volumetric radar data using rough set metho ds”,
Pattern Recognition Letters 24 (6) (2003) 911–920.
36. Brodley CE and Dy J.G, “Feature selection for unsupervised learning”, The Journal of Machine Learning Research archive 5, 200 4,
845–889.
37. KusiakA, “Decomposition in data mining: An industrial case study”, IEEE Transaction on Electronics Packaging Manufacturing 23
(4), 2000 345–353.
38. ChanCC, “A rough set approach to attribute generalization in data mining”, Information Sciences 107, 1998, 177–194.
39. Xu Y & T Li, “A generalization rough set approach to attribute generalization in data mining”, Journal of Southwest Jiaotong
University 8 (1), 2000 69–75.
40. KamberM&JHan “Data Mining: Concepts and Techniques”, Morgan Kaufmann Publishers, San Francisco, 2001,CA.
41. Huang J, Nie P, SaiY, and XuR ‘A rough set approach to mining concise rules from inconsistent data’, Proceedings of IEEE GRC
2006, IEEE, Atlanta USA, pp.333–336.
42. R Brause and PaetzJ ‘Rule generation and model selection used for medical diagnosis’, Journal of Intelligent & Fuzzy Systems:
Applications in Engineering and Technology – Challenges for future intelligent systems in biomedicine, 2002 Vol. 12, No. 1, pp.69–
78.
43. AAbraham& C Grosan ‘Stock market modeling using genetic programming ensembles’, Genetic Systems Programming: Theory and
Experiences, 2006,Vol. 13, pp.133–148.
44. BT Nath&AGhosh ‘Multi-objective rule mining using genetic algorithms’, Information Sciences: an International Journal, 2004, Vol.
163, pp.123–133.
45. Ma HF, ZhaoWZ and HeQ, “Parallel k-means clustering based on mapreduce,” in Proc. 1st Int. Conf. Cloud Comput., 2009, pp. 674–
679.
46. Wang GY, LiangZ,YangY and ChenRZ “Attribute reduction for massive data based on rough set theory and mapreduce,” in Proc.
Rough Set Knowl. Technol., 2010, pp. 672–678.
47. ZhaoCB, ZhangBJ, RTLi, Ruan, and GaoZ, “A parallel method for computing rough set approximations,” Inf. Sci., vol. 194, pp.
209–223, 2012.
48. GhemawatS and DeanJ “Mapreduce: simplified data processing on large clusters”, Commun. ACM 51 (1) 2008, 107–113.
49. Hadoop Apache-2013, “Hadoop Apache Project”, <http://hadoop.apache.org/> accessed December-2013.
50. Hadoop, WhiteT, “The Definitive Guide”, O’Reilly Media, Inc., 2012.
51. Apache Mahout-2013 “Apache Project Mahout”, <http://mahout.apache.org/> accessed December- 2013.
52. DunningT, OwenS, AnilR, FriedmanE, “Mahout in Action”, Manning Publications Company, 2012.
53. Spark-2013 <http://spark-project.org/> accessed December-2013.
54. Storm-2013 <http://storm-project.net/>accessed December-2013.
55. Romer.G, S.Melnik, J.Long,A.Gubarev, ShivakumarS, and VassilakisDremelT, MTolton,: interactive analysis of web-scale datasets,
in: Proc. of the 36th International Conference on Very Large Data Bases, 2010, pp. 330–339.
56. Apache Drill-2013 <http://incubator.apache.org/drill/> accessed December-13.
57. Dean J, GSanjay, “MapReduce: Simple Data Processing on Large Clusters” Proceedings To appear in OSDI 2004.
58. ZdzisławPawlak, Andrzej S “Rudiments of rough sets” Proc. Elsevier accepted in 7 June 2006.
59. T Li, Zhang J, pan Yi “Parallel Rough Set Based Knowledge Acquisition Using MapReduce from Big Data” Proceedings ACM Big
Mine, August 12th , 2012 Beijing, China.
60. J Zang, T Li, Da Rausan “A parallel method for rough set approximations” Proc. Elsevier accepted in 11 January 2012.
61. B.Raghuram, and Gyani J “Fuzzy Associative Classification Driven MapReduce Computing Solution for Effective Learning from
Uncertain and Dynamic Big Data” International Journal of Database Theory and Application, Vol. 11, No.1 2018.
62. Data Set (URL): https:/archive.ics.uci.edu/ml/datasets/census+income.
Zuraida Abal Abas, Nurul Hafizah Mohd Zaki, Siti Azirah Asmai, Ahmad Fadzli Nizam Abdul
Authors:
Rahman, Zaheera Zainal Abidin
Enhanced Community Detection Based on Cross Time for Higher Visibility In Supply Chain: A Six-
Paper Title:
Steps Model Framework
Abstract: Increasing the visibility in supply chain network had decrease the risk in industries. However, the
current Cross-Time approach for temporal community detection algorithm in the visibility has fix number of
communities and lack of operation such as split or merge. Therefore, improving temporal community detection
algorithm to represent the relationship in supply chain network for higher visibility is significant. This paper
783. proposed six steps model framework that aim: (1) To construct the nodes and vertices for temporal graph
representing the relationship in supply chain network; (2) To propose an enhanced temporal community detection 4509-
algorithm in graph analytics based on Cross-time approach and (3) To evaluate the enhanced temporal community 4513
detection algorithm in graph analytics for representing relationship in supply chain network based on external and
internal quality analysis. The proposed framework utilizes the Cross-Time approach for enhancing temporal
community detection algorithm. The expected result shows that the Enhanced Temporal Community Detection
Algorithm based on Cross Time approach for higher visibility in supply chain network is the major finding when
implementing this proposed framework. The impact advances industrialization through efficient supply chain in
industry leading to urbanization.

Keyword : Supply Chain Network, Temporal Community Detection, Graph Analytics, Internet of Things,
Risk.
References:
1. L. Carstens, J. L. Leidner, K. Szymanski, and B. Howald, “Modeling Company Risk and Importance in Supply Graphs,” in ESWC 2017,
2017, vol. 1, pp. 18–32.
2. E. Liongosari, P. Mullan, M. Muller, and P. Guittat, “Smart Production Finding a way Forward: How Manufacturers can make the most of
the Industrial Internet of Things,” 2016.
3. D. Yan, Y. Bu, Y. Tian, A. Deshpande, and J. Cheng, “Big Graph Analytics Systems,” in SIGMOD’16, 2016, pp. 2241 –2243.
4. W. Ligtenberg, “Tink , a temporal graph analytics library for Apache Flink,” Department of Mathematics and Computer Science,
University of Technology, 2017.
5. F. S. F. Pereira, S. d. Amo, and J. Gama, “Evolving Centralities in Temporal Graphs: A Twitter Network Analysis,” in 2016 17t h IEEE
International Conference on Mobile Data Management (MDM), 2016, vol. 2, pp. 43–48.
6. G. Rossetti and R. Cazabet, “Community Discovery in Dynamic Networks : a Survey Community Discovery in Dynamic Networks : a
Survey,” Cornell Univ. Libr., no. July, 2017.
7. P. J. Mucha, T. Richardson, K. Macon, M. A. Porter, and J.-P. Onnela, “Community Structure in Time-Dependent, Multiscale, and
Multiplex Networks,” Science, no. July, May-2010.
8. A. C. Pereira and F. Romero, “A review of the meanings and the implications of the Industry 4.0 concept,” in Manufacturing En gineering
Society International Conference 2017, 2017.
9. Pierre-Olivier Bédard-Maltais, “Industry 4.0: The New Industrial Revolution Are Canadian manufacturers ready?,” 2017.
10. S. Madakam, R. Ramaswamy, and S. Tripathi, “Internet of Things ( IoT ): A Literature Review,” J. Comput. Commun., vol. 3, no. May,
pp. 164–173, 2015.
11. L. Da Xu, W. He, and S. Li, “Internet of Things in Industries : A Survey,” IEEE Trans. Ind. INFORMATICS, vol. 10, no. 4, pp. 2233–
2243, 2014.
12. D. Mourtzis, E. Vlachou, and N. Milas, “Industrial Big Data as a result of IoT adoption in Manufacturing,” Procedia CIRP, vol. 55, pp.
290–295, 2016.
13. R. Chitkara and R. Mesirow, “The Industrial Internet of Things,” 2016.
14. C. Perera, C. H. Liu, and S. Jayawardena, “The Emerging Internet of Things Marketplace From an Industrial Perspective: A Surv ey,” IEEE
Trans. Emerg. Top. Comput., no. 61272509, 2015.
15. S. Schrauf and P. Berttram, “Industry 4.0: How digitization makes the supply chain more efficient , agile , and customer-focussed,” 2016.
16. I. Robinson, J. Webber, and E. Eifrem, Graph Databases: New Opportunities for Connected Data, 2nd ed. United: O’Reilly Media, 2015.
17. A. Drosou, I. Kalamaras, S. Papadopoulos, and D. Tzovaras, “An enhanced Graph Analytics Platform ( GAP ) providing insight in Big
Network Data,” J. Innov. Digit. Ecosyst., vol. 3, no. 2, pp. 83–97, 2016.
18. Emil Eifrem, “Why graph databases are perfect for the Internet of Things,” SIlicon Angle, 2015.
19. M. Ben Jdidia, C. Robardet, and E. Fleury, “Communities detection and analysis of their dynamics in collaborative networks,” in 2nd
International Conference on Digital Information Management (ICDIM), 2007.
20. T. Viard, M. Latapy, and C. Magnien, “Computing maximal cliques in link streams,” Theor. Comput. Sci., vol. 609, no. Part 1, pp. 245–
252, 2016.

Authors: K. R. Sree Harsha, L Udayasimha, Dharmaparkash, Dinesh Rangappa, Suchetha


Column Experiments for Removal of Copper from Wastewater using Activated Carbon Coated with
Paper Title:
Tio2 Nanoparticles
Abstract: The study reports application of activated carbon coated with TIO2 nanoparticles to remove Copper
from wastewater. The TiO2 nanoparticles are synthesized using sol-gel process and are coated on Granular
Activated Carbon (GAC) using Bisphenol resin as adhesive. The synthesized composite material is characterized
by X-ray diffraction (XRD) and scanning electron microscopy (SEM). Column experiments are conducted to
investigate removal of copper from industrial effluent by varying flow, height and mass of adsorbent. Results
showed decrease in the heavy metal and sorption is well explained by Thomas model.
784.
Keyword : TiO2 Nanoparticle, Copper, Heavy Metal, Industrial effluent. 4514-
4518
References:
1. Gomathi Elango ,Rathika G and SanthiniElango “Research Paper Physico-Chemical Parameters of Textile Dyeing Effluent and Its Impacts
with Case study” Vol. 7 Issue 1 (17-24) January 2017.
2. Mphilisi M. Mahlambi, Catherine J. Ngila and Bhekie B. Mamba “Recent Developments in Environmental Photocatalytic Degradation of
Organic Pollutants: The Case of Titanium Dioxide Nanoparticles—A Review” Journal of NanomaterialsVolume 2015, Article ID 790173,
29 pages.
3. R.F.P.M. Moreira, M.G. Peruch and N. C. Kuhnen“Adsorption of textile dyes on alumina. Equilibrium studies and contact time effects”
vol. 15 no. 1 São Paulo Mar. 1998.
4. Runping Han, Yu Wang , Xin Zhao , Yuanfeng Wang , FulingXie , Junmei Cheng , Mingsheng Tang “Adsorption of methylene blue by
phoenix tree leaf powder in a fixed-bed column: experiments and prediction of breakthrough curves” Desalination 245 (2009) 284–297.

Authors: Kambhampati Kalyana Kameswari, J Raghaveni, R. Shiva Shankar, Ch. Someswara Rao

Paper Title: Predicting Election Results using NLTK


Abstract: In today’s world, people are usually using social media networks for trying to communicate with
other users and for sharing information across the world. The online social networking sites have become
785. considerable tools and are providing a common medium for a number of users to communicate with each other.
Twitter is the most prominent microblogging website and one among the social networking sites that grow on a
4519-
daily basis. Social media incorporates an extensive amount of data in the form of tweets, forums, status updates,
4529
comments, etc. in an attempt to automatically process and analyze these data, applications can rely on analysis
approaches such as sentiment analysis. Twitter sentiment analysis is an application of sentiment analysis on data
from Twitter (tweets), to obtain user's opinions and sentiments. Natural Language Toolkit (NLTK) is a library
based on machine learning methods in python & sentiment analysis tool. Which provides the base for text
processing and classification? The research work proposed a machine learning-based classifier to extract the tweets
on elections and analyze the opinion of the tweeples (people who use twitter). The tweets can be categorized as
positive, negative and neutral towards a particular politician. We classify these processed tweets using a supervised
machine learning classification approach. The classifier used to classify the tweets as positive, negative or neutral is
Naive Bayes Classifier. The classifier is trained with tweets bearing a distinctive polarity. The percentage of
positive and negative tweets is then measured and graphically represented.

Keyword : Machine Learning, Natural Language Processing, Twitter, Political opinion, Supervised
Learning, Election Result Prediction.
References:
1. Godbole, Namrata, Manja Srinivasaiah, and Steven Skiena. "Large-Scale Sentiment Analysis for News and Blogs." ICWSM 7.21 (2007):
219-222.
2. Fumagalli, Laura.and Emanuela Sala. 2011. “The total survey error paradigm and pre-election polls: the case of the 2006 Italian general
elections”. Tech. rep., ISER Working Paper Series: 2011-29.
3. Mondher Bouazizi, Tomoaki Ohtsuki, "A Pattern-Based Approach for Multi-Class Sentiment Analysis in Twitter", Access IEEE, vol. 5,
pp. 20617-20639, 2017, ISSN 2169-3536.
4. Boia, Marina, et al. "A:) is worth a thousand words: How people attach sentiment to emoticons and words in tweets." Social computin g
(social com),2013 international conference on. IEEE, 2013.
5. Manuel, K., Kishore Varma Indukuri, and P. Radha Krishna. "Analyzing internet slang for sentiment mining." 2010 Second Vaagdevi
International Conference on Information Technology for Real-World Problems. 2010.
6. Akcora, Cuneyt Gurcan, et al. "Identifying breakpoints in public opinion." Proceedings of the first workshop on soc ial media analytics.
ACM,2010.
7. Gao, Wei, and Fabrizio Sebastiani. "Tweet sentiment: From classification to quantification." Advances in Social Networks Analysis and
Mining(ASONAM), 2015 IEEE/ACM International Conference on. IEEE, 2015.
8. Bhoir, Purtata, and Shilpa Kolte. "Sentiment analysis of movie reviews using lexicon approach." Computational Intelligence and
Computing Research (ICCIC), 2015 IEEE International Conference on. IEEE, 2015.
9. Mandal, Santanu, and Sumit Gupta. "A Lexicon-based text classification model to analyze and predict sentiments from online reviews."
Computer, Electrical & Communication Engineering (ICCECE), 2016 International Conference on. IEEE, 2016
10. Aung, Khin Zezawar, and Nyein Nyein Myo. "Sentiment analysis of students' comments using a lexicon-based approach." Computer and
Information Science (ICIS), 2017 IEEE/ACIS 16th International Conference on. IEEE,2017.
11. Hailong, Zhang, Gan Wenyan, and Jiang Bo. "Machine learning and lexicon-based methods for sentiment classification: A survey." Web
Information System and Application Conference (WISA), 2014 11th. IEEE,2014.
12. Rezapour, Rezvaneh, et al. "Identifying the Overlap between Election Result and Candidates’ Ranking Based on Hashtag -Enhanced,
Lexicon-BasedSentiment Analysis." Semantic Computing (ICSC), 2017 IEEE 11 th International Conference on. IEEE, 2017.
13. Ramteke, Jyoti, et al."Election result prediction using Twitter sentiment analysis." Inventive Computation Technologies (ICICT),
International Conference on. Vol. 1. IEEE, 2016.
14. Bouazizi, Mondher, and Tomoaki Ohtsuki. "Sentiment analysis in twitter: From classification to the quantification of sentiments within
tweets." Global Communications Conference (GLOBECOM), 2016 IEEE. IEEE, 2016.
15. J. M. Soler, F. Cuartero, and M. Roblizo, ``Twitter as a tool for predicting elections results,'' in Proc. IEEE/ACM Int. Conf. Adv. Social
Netw.Anal. Mining (ASONAM), Aug. 2012, pp. 1194_1200.
16. A. Java, X. Song, T. Finin, and B. Tseng, ``Why we Twitter: Understanding microblogging usage and communities,'' in Proc. 9th
WebKDD 1st SNA-KDD Workshop Web Mining Social Netw. Anal., Aug. 2007, pp.56_65. Proceedings of the second International
Conference on Inventive Systems and Control (ICISC 2018)IEEE Xplore CompliantPartNumber:CFP18J06-ART,ISBN:978-1-5386-0807-
4;DVDPart Number:CFP18J06DVD, ISBN:978-1-5386-0806-7978--
17. Harshali P. Patil,Dr. Mohammad Atique, “Sentiment Analysis for Social Media: A Survey”, Department of Computer Enginee ring
Thakur College of Engineering & Technology Mumbai, India.
18. Megha Rathi, Aditya Malik, Daksh Varshney, Rachita Sharma, Sarthak Mendiratta, “Sentiment Analysis of Tweets using Machine
Learning Approach”, Jaypee Institute of Information Technology JIIT Sec-62 Noida, India.
19. http://www.nltk.org/
20. https://pypi.python.org/pypi/textblob
21. Mondher Bouazizi, Tomoaki Ohtsuki, "A Pattern-Based Approach for Multi-Class Sentiment Analysis in Twitter", Access IEEE, vol. 5,
pp. 20617- 20639, 2017, ISSN 2169-3536.

Authors: M. Nalini, R. Gayathiri


A Straight Forward Solution for Visually Impaired using Smart Assistive Navigation and Accessibility
Paper Title:
System
Abstract: This paper presents a Smart Assistive solution for the navigation and accessibility needs of visually
impaired people. Using advances in inexpensive location mapping through GPS and navigation through various
open source mapping platforms, real time assistive navigation is possible for visually impaired people. This paper
also presents a solution for sensing the surroundings through a naive technology called ‘Bluetooth Low Energy’ to
relay short messages about the surroundings.
786.
4530-
Keyword : mobility; accessibility; gps; bluetooth; navigation
4534
References:
1. World Health Organization, Vision Impairment and Blindness, Fact Sheet, 2017 (Web:
http://www.who.int/mediacentre/factsheets/fs282/en/
2. S Adarsh et al 2016 IOP Conf. Ser.: Mater. Sci. Eng. 149 012141
3. Gimbal Proximity Beacon Series 10, User Manual ( Web: http://docs.gimbal.com/manuals/s10.html)
4. M. Nalini, J.V.Nirmal Kumar, R. Muthukumar, M. Vignesh, Energy harvesting and management from ambient RF radiation IEEE
International Conference on Innovations in Green Energy and Healthcare Technologies - 2017, IGEHT 2017.
Authors: John Patrick P. Banjao, Louis Van Hecke, Wansu Lim, Myung-Sik Kim

Paper Title: Line Tracing Technique for Smooth Driving


Abstract: In this paper, a line tracing algorithm for a robot was developed. The line tracing algorithm uses the
robot’s car attached camera to detect the black line. The steering angle of the robot car’s wheels is then adjusted
according to the black line detected. The performance of the proposed algorithm was evaluated by using the simple
line tracking. We found out that using this technique the robot car is having a smooth drive following the black line.
This study involves both hardware and software: raspberry pi as the microcontroller for the hardware and C++ for
the software.

Keyword : Line tracing algorithm, image processing.


References:
1. IEEE Standard for Microcontroller System Serial Control Bus," in IEEE Std 1118-1990 , vol., no., pp.1-252, 31 Jan. 1991
2. J. Paterson, "Adding analog, EPROM and EEPROM modules to CMOS logic technology: how modular?," International Technical Digest
on Electron Devices Meeting, Washington, DC, USA, 1989, pp. 413-416.
3. A. A. Galadima, "Arduino as a learning tool," 2014 11th International Conference on Electronics, Computer and Computation (ICECCO),
Abuja, 2014, pp. 1-4.
787. 4. F. Salih and S. A. Mysoon Omer, "Raspberry pi as a Video Server," 2018 International Conference on Computer, Control, Electrical, and
Electronics Engineering (ICCCEEE), Khartoum, 2018, pp. 1-4.
5. Azizul, H., Sazia, A., Hossain, M. M., March 2015, Northern university of Bangladesh, Design & Implementation of Line track ing Robot
4535-
6. L. A. Ballard, S. Sabanovic, J. Kaur and S. Milojevic, "George Charles Devol, Jr. [History]," in IEEE Robotics & Automation Magazine, 4540
vol. 19, no. 3, pp. 114-119, Sept. 2012.
7. G. Sonal, P. Raninga and H. Patel, "Design and implementation of RGB color line following robot," 2017 International Conference on
Computing Methodologies and Communication (ICCMC), Erode, 2017, pp. 442-446.
8. J. Thirumurugan, M. Vinoth, G. Kartheeswaran and M. Vishwanathan, "Line following robot for library inventory managemen t system,"
INTERACT-2010, Chennai, 2010, pp. 1-3.
9. Yuan Liao, "Some algorithms for transmission line parameter estimation," 2009 41st Southeastern Symposium on System Theory,
Tullahoma, TN, 2009, pp. 127-132.
10. X. Wang, G. Geng, X. Li and J. Zhou, "A Cultural Relic Line Drawings Generation Algorithm Based on Explicit Ridge Line," 2015
International Conference on Virtual Reality and Visualization (ICVRV), Xiamen, 2015, pp. 173-176.
11. P. Sosnin, "Pseudocode programming of human-computer interaction in collaborative designing," International Conference on Electrical,
Control and Computer Engineering 2011 (InECCE), Pahang, 2011, pp. 317-322.
12. M. B. Nugraha, P. R. Ardianto and D. Darlis, "Design and implementation of RFID line-follower robot system with color detection
capability using fuzzy logic," 2015 International Conference on Control, Electronics, Renewable Energy and Communications
(ICCEREC), Bandung, 2015, pp. 75-78.
13. F. Dellaert, D. Pomerlau and C. Thorpe, "Model-based car tracking integrated with a road-follower," Proceedings. 1998 IEEE International
Conference on Robotics and Automation (Cat. No.98CH36146), Leuven, Belgium, 1998, pp. 1889-1894 vol.3.
14. M. Ozaki, Y. Adachi, N. Ishii and T. Koyazu, "CAI system to improve hand writing skills by means of fuzzy theory," Proceedings of 1995
IEEE International Conference on Fuzzy Systems., Yokohama, Japan, 1995, pp. 491-496 vol.2.
15. SAEON, http://www.saeon.co.kr

Authors: Mohammad Khaja, Shaik , Phaneendra Kumar, Ch.

Paper Title: Real-Time Hindrance Detection Prototype in Internal Atmosphere Expending Ultrasonic Sensors
Abstract: Currently, ultrasonic sensors are extensively used in voluminous applications, for instance: robotics
solicitations, unmanned vehicles, medical presentations, etc. In which remoteness measurement of an object is one
of the most important issues. This can be achieved using a variety of sensors: Optical, Radar, IR, Ultrasonic, etc.
Measuring distance using ultrasonic sensors might be the cheapest and its reliability is probably acceptable. In this
paper we talk about the employments of these sensors to plan a convenient gadget helping the outwardly debilitated
stay away from obstructions on their ways by sounds.

Keyword : Ultrasonic sensors; Visually Impaired; Obstacle avoidance, Prototype …

788. References:
1. Prof. D. S. Vidhya, Miss Cecilia Jane D’Silva, Miss Delicia Perlin Rebelo, Mr. Linford William Fernandes, “Analysis of Obstac le
Detection Using Ultrasonic Sensor”, IJIRST –International Journal for Innovative Research in Science & Technology| Volume 2 | Issue
4541-
11 | April 2016 4544
2. Christopher N. Yalung, Cid Mathew S. Adolfo, “Analysis of Obstacle Detection Using Ultrasonic Sensor”, International Research
Journal of Engineering and Technology (IRJET) | Volume 4 | Issue 1 | Jan 2017.
3. Gerard Gibbsa, Huamin Jiab, Irfan Madanib, “Obstacle Detection with Ultrasonic Sensors and Signal Analysis Metrics”, INAIR
International Conference on Air Transport 2017.
4. B. Peasley and S. Birchfield, “Real-time obstacle detection and avoidance in the presence of specular surfaces using an active3D sensor,”
in Proceedings of the IEEE Workshop on Robot Vision (WoRV ’13), pp. 197–202, Clearwater Beach, Fla, USA, January 2013.
5. J. M. Benjamin, N. A. Ali, and A. F. Schepis, “A laser cane for the blind,” Proceedings of the San Diego Biomedical Symposium , vol.12,
pp. 53–57, 1973
6. Shoval, S., Borenstein, J., and Koren, Y., 1994f, “Mobile Robot Obstacle Avoidance in a Computerized Travel Aid for the Blind.”
Proceedings of the 1994 IEEE International Conference on Robotics and Automation, San Diego, CA, May 8- 13, pp. 2023-2029.
7. Kumar.K, Champaty.B, Uvanesh K., Chachan R., Pal K., Anis A., “Development of an ultrasonic cane as a navigation aid for the blind
people”; in Proceedings of the 2014 International Conference on Control, Instrumentation, Communication and Computational
Technologies (ICCICCT); Kanyakumari District, India. 10–11 July 2014

Authors: I. F. Gorlov, G. V. Fedotova, M. I. Slozhenkina, E. Yu. Zlobina, D.A. Mosolova


789.
Paper Title: Nutritional Value of Beef from Steers Grown On Natural Pastures of Arid Territories
Abstract: Intensive development of beef cattle breeding is becoming a task of a national scale, which is
reflected in all regulatory documents that determine the imperatives of the modern socio-economic development of
our country. To solve this problem, of great necessity are scientifically based methods and mechanisms that will
increase the intensity of meat production without reducing its biological value and nutritional qualities. This article
substantiates the need to improve the forage base for the development of beef cattle breeding due to a more
intensive grazing system on the arid territories in the South of Russia. The cattle feeding and keeping technology of
that kind will contribute to the development of rural areas, employment and increase in the profitability of the beef
production. Territory belongs to the zone of steppe and semi-desert landscapes and is noted for certain problems in
terms of the grass and forage base. The conducted comparative analysis of meat obtained due to the technology of
stable and grazing keeping of beef cattle bred on the arid territories has proved that pasturing cattle breeding
enables the beef to exceed its analogues in biological value and in the composition of essential amino acids.

Keyword : beef, grass-fed, nutritional and biological value, pastures.


References:
1. Decree of the President of the Russian Federation “On approval of the Food Security Doctrine of the Russian Federation” No. 1 20 of
January 30, 2010 // Consultant-Plus law reference system Access mode: http://www.consultant.ru/document/cons_doc_LAW_96953/
(accessed November 2, 2018).
2. Amerkhanov, Kh. The number of cattle in Russia for 5 years has grown by 25%. Access Mode: https://www.eg -online.ru/news/371646/.
(date of treatment 01/08/2019).
3. Gorlov, I.F. The influence of the botanical composition of the grass stand on the milk production of mares / I.F. Gorlov and M.A.
Kokhanov // Agricultural science. 2007. No. 4. Pp. 19-21.
4. Fatty acid composition of fat of rams and steers grown in the natural pastures of the trans-Volga region / I.F. Gorlov, A.A. Mosolov, Yu.A.
Yuldashbaev, O.A. Knyazhechenko and E.I. Gishlarkaev // Sheep, goats, woolen work. 2018. No. 2. Pp. 38 -40.
5. Qualitative indicators of beef and lamb obtained from animals raised on natural pastures / I.F. Gorlov, A.A. Mosolov, O.A.
Knyazhechenko, E.I. Gishlarkaev and H.B. Garyaeva // Agricultural and food innovations. 2018. No. 3 (3). Pp. 20 -25.
6. Kokhanov, M.A. and Churzin, V.N. The use of pasture grass by horses during their year-round drove housing / M.A. Kokhanov and V.N. 4545-
Churzin // Bulletin of the Lower Volga Agro-University Complex. No. 4 (4). 2006. Pp. 70-77. 4549
7. Makhonina, V.N. Comparative evaluation of the biological value of raw meat of slaughtered animals and poultry / V.N. Makhonin a //
Birds and poultry products. No. 3. 2016. Pp. 26-28.
8. New approaches in the development of effective technologies for the production of livestock raw materials and increasing the biological
value of products obtained from it / I.F. Gorlov, M.I. Slozhenkina, E.Yu. Zlobina and S.L. Tikhonov // Food Industry. 2017. No. 3 (4). Pp.
30-34.
9. Current trends in meat production in Russia and its consumption by the population / I.F. Gorlov, G.V. Fedotova, M.I. Slozhenk ina, A.V.
Kulikovsky and D.A. Mosolova // Agrarian-food innovation. 2018. No. 3 (3). Pp. 25-30.
10. Gorlov I.F., Omarov R.S., Slozhenkina M.I., Zlobina E.Yu., Mosolova N.I. and Shlykov S.N. 2018. Assesment of the influence of herb
fattening on the productivity and quality of the beef cattle meat / Research Journal of Pharmaceutical, Biological and Chemical Sciences.
Vol. 9. No. 4. Pp. 1088-1094.
11. Camfield, P.K., Brown, A.H., Johnson, Z.B., Brown, C.J., Lewis, P.K., and Rakes, L.Y.. 1999. “Effects of Growth Type on Carca ss Traits
of Pasture-or Feedlot-Developed Steers.” Journal of Animal Science 77(9): 2437–2443. doi: 10.2527/1999.7792437x
12. Sitienei, I., Gillespie, J., Harrison, R., & Scaglia, G. (n.d.). 2019 Estimating Preference Heterogeneity for Grass-fed Beef Cattle Traits.
Agricultural and Resource Economics Review, 1-25. doi:10.1017/age.2019.14
13. Scarpa, R., Ruto, E.S.K., Kristjanson, P., Radeny, M., Drucker, A.G., and Rege, J.E.O.. 2003. “Valuing Indigenous Cattle Bree ds in
Kenya: An Empirical Comparison of Stated and Revealed Preference Value Estimates.” Ecological Economics 45(3): 409–426. doi:
10.1016/S0921-8009(03)00094-6.
14. Bhandari, B., Gillespie, J., Scaglia, G., Wang, J., & Salassi, M. (2015). Analysis of pasture systems to maximize the profita bility and
sustainability of grass-fed beef production. Journal of Agricultural and Applied Economics, 47(2), 193-212. doi:10.1017/aae.2015.5
15. Fishell, V.K., Aberle, E.D., Judge, M.D., and Perry, T.W.. “Palatability and Muscle Properties of Beef as Influenced by Preslaughter
Growth Rate.” Journal of Animal Science 61(1985):151–57.
16. Lewis, J.M., Klopfenstein, T.J., Pfeiffer, G.A., and Stock, R.A.. “An Economic Evaluation of the Differences between Intensiv e and
Extensive Beef Production Systems.” Journal of Animal Science 68(1990):2506–16.
17. McCluskey, J. J., Wahl, T. I., Li, Q., and Wandschneider, P. R.. “U.S. Grass-Fed Beef: Marketing Health Benefits.” Journal of Food
Distribution Research 36,3(2005):1–8.
18. Wright, I.A. “Future Prospects for Meat and Milk from Grass-Based Systems.” Grasslands: Developments, Opportunities, Perspectives.
Reynolds, S.G. and Frame, J., eds. Enfield, NH: Science Publishers, 2005.
19. Young, A.W., and Kauffman, R.G.. “Evaluation of Beef from Steers Fed Grain, Corn Silage or Haylage-Corn Silage Diets.” Journal of
Animal Science 46(1978):41–47.

Authors: J. Harshini, D.Abinaya, A.Manikandan, K.Srinivasan, N.Natarajan

Paper Title: Performance of Fly Ash Bricks with Differential Composition


Abstract: Flyash is one of the largest emerging products in the construction industry. The fly ash is the by-
product which is widely used in brick manufacturing plant. The flyash reduces the cement content and also
overcomes several disadvantages. Simply, it is a step towards eco-friendly environment. Though the flyash brick
has many advantages, it has lower strength at initial stages due to low hydration. In this study, the experimental
investigation was carried out to find the optimum mix ratio of various compositions of fly ash bricks. The brick
790. specimens were casted on different compositions of cement, flyash, eco-sand and various other admixtures. On
addition of these admixtures the early compressive strength was also high and a quick hydration was observed. The 4550-
tests were conducted on 3rd, 5th, 7th and 28th day. The results suggest that the maximum strength was obtained for 4556
the composition of fly ash, ecosand, cement and silica fume.

Keyword : Flyash, Cement, Eco-sand, Silica Fume, Admixtures, Compressive strength


References:
1. K.P. Kumar, and M. Gomathi, “Production of construction bricks by partial replacement of waste plastics”, IOSR journal of me chanical
and civil engineering, Vol. 14(4), pp. 9-12, 2017.
2. L. Prasanth, S. Gopalakrishnan, G. Thanigainathan and A. Kathiravan, “Uilisation of waste plastics in fly ash bricks”, International
journal of pure and applied mathematics, Vol.119(15),pp. 1417-1424, 2018.
3. S. Kanchidurai, K.S.R. Mohan, S. Vivek, M. Sivateja and V. Ravindhirran, “Comparison of effectiveness of fly ash bricks with addition
of plastic waste”, International journal of civil engineering and technology, Vol. 9(3), pp. 914-919, 2018.
4. N. Thirugnanasambantham, P.T. Kumar, R. Sujithra, R. Selvaraman and P. Bharathi, “Manufacturing and testing of plastic sand bricks”,
International journal of science and engineering research, Vol. 5(4), pp. 1150-1155, 2017.
5. R. Bhushaiah, S. Mohammad and D.S. Rao, “Study of plastic bricks made from waste plastic”, International journa l of engineering and
technology, Vol.6(4), pp. 1122-1127, 2019.
6. A.L. Meenaabhavani, “Experimental study on bricks with fly ash and pond ash”, M.E. Thesis report, Anna University, 2014.

Authors: S. Aruna, K. SrinivasaNaik, D.Madhusudan, V.Venkatesh

Paper Title: Implementation of 5-Stage 32-Bit Microprocessor Based Without Interlocked Pipelining Stages
Abstract: Many processors have evolved in the past century; Out of which, Reduced Instruction set
Computing (RISC) processors are well known for their ease of use. The next in line was the Microprocessor
without Interlocked pipelining stages (MIPS) RISC based architecture. Less number of instructions, good amount
of registers makes these processors a boon to use. Often times, MIPS processors loose the battle against their
contenders due to lack of speed. Hence, there is a sheer necessity in designing a more robust system that has all the
advantages of MIPS. Over time, there have been designs that could solve the power drawbacks and the area
optimizations. However, performance criterion is mostly neglected. This paper emphasizes on the performance
metric of pipelined 32-bit MIPS microprocessor. This processor supports RISC architecture and has been designed
under Harvard architecture. Pipelining technique is used to solve the problem of low performance and achieve
smaller execution times. The processor has four pipes. Pipes are the structures which store data. Pipes can be
viewed as register banks. These pipes are generally used to store the intermediate data. The design contains various
modules like ALU, Instruction fetch register, Execution unit, Memory, Program counter (PC). Verilog HDL has
been used to implement the design. The software used is Xilinx ISE for design and ISIM simulator has been used
791. for simulation purposes. The applications of this MIPS microprocessor are abundant. MIPS microprocessor can be
used to carry out the fundamental tasks and an application specific core/IP/processor can be designed and combined 4557-
with MIPS. This facilitates in meeting the goals of high performance, lower time-to-market and cost- effectiveness. 4561
Some application specific uses can be for music systems, PDA, Image processing etc.

Keyword : ISIM simulator, MIPS, Pipeline, , RISC architecture, Verilog HDL..


References:
1. Shofiqul Islam, Debanjan Chattopadhyay, Manoja Kumar Das, V Neelima, Rahul Sarkar, “Design of High Speed Pipelined
Execution Unit of 32-bit RISC Processor” India Conference, Annual IEEE , pp. 1 - 5,2006.
2. S.Bhimani“Designof32-bit3-StagePipelinedProcessorbasedon MIPS in Verilog HDL and Implementation on FPGA Virtex7”
International Journal of Applied Information Systems (IJAIS), Vol. 10, No.9, PP. 26-38,May2016.
3. P. Bhosle, Hari Krishna M, , "FPGA Implementation of low power pipelined 32-bit RISC Processor", International Journal of
Innovative Technology and Exploring Engineering (IJITEE), August 2012.
4. Vinay Kumar, " FPGA Based Implementation of Pipelined 32-bit RISC Processor with Floating Point Unit", Vol. 4, Issue 4( Version
5), pp.01-07,April2014.
5. SamirPalnitkar, “Verilog HDL: A Guide to Digital Design and Synthesis”, Prentice Hall, 2 nd Edition, 2003
6. Sharda P. Katke, G.P. Jain,”Design and Implementation of 5 stages pipelined architecture in 32 Bit RISC Processor”, IJETAE,
Volume2. Issue 4. Pp. 340-346. April 2012

Authors: Safarov J.E., Sultanova Sh.A., Dadayev G.T., Samandarov D.I.

Paper Title: Method for The Primary Processing of Silkworm Cocoons (Bombyx Mori)
Abstract: The article discusses the results of an experimental study of the process of primary processing of
silkworm cocoons (Bombyx mori). During the study, the possibilities of the primary processing of silkworm
cocoons using elastic waves with infrared radiation were examined. The Tashkent State Technical University has
developed a mechanism for generating low-frequency oscillations due to an electromechanical drive to pallets. In
the laboratory of the department, a full-scale test was carried out for the primary processing of silkworm cocoons
(Bombyx mori). Studies were carried out to determine the parameters as temperature and time of primary
processing of silkworm cocoons in 5 times repetition. The results of the experiments are the primary processing of
live cocoons (Bombyx mori) in the amount of one hundred pieces with infrared rays, the effects of vibration and
elastic waves (the distance between the tube distributing infrared rays and raw materials is 10 cm, the duration of
792. the process is 5 minutes). The study revealed that, as silkworm cocoons processed in the temperature range at 65-70
0С using vibration waves were moderate for 3-5 minutes and for 10 days at a temperature of 38-42 0С the cocoons 4562-
continued to dry to 10-12% of the cane humidity. The use of elastic waves in the processing of cocoons proceeded 4565
5-10% lower relative to the processing using vibratory waves. The obtained results, the experiments confirm that
when applying vibration and IR radiation accelerates the process of primary processing of silkworm cocoons. The
study found the optimum temperature and time for the primary processing of silkworm cocoons. Due to briefly
temporary processing, the final product is improved.

Keyword : primary processing, temperature, elastic waves, vibration, infrared radiation.


References:
1. M. Mikihiko, K. Naoya, N. Taro, R. Majibur, Cocoon repair behavior of Bombyx mori silkworm. Journal of insect biotechnology an d
sericology. Vol.79, 2010. pp. 85-93.
2. J. Xing, J. Zhang, G. Weimin, Li Jingliang, Cocoon of the silkworm Antheraea pernyi as an example of a thermally insulating b iological
interface. Biointerphases. vol. 9, № 3, 2014. pp. 031013-1-031013-11.
3. T. Kaise, M. Miura, H. Morikawa, M. Iwasa, Stochastic Models for the Direction of a Silkworm Body during Cocoon Construction.
Journal Insect Biotechnol Sericol. Vol.72, 2003. pp. 171-175.
4. E. Musayev, Optoelectronic nondestructive testing techniques of cocoon properties and applications. NDT and E In ternational. Vol.38,
pp. 59-68.
5. H. Zhang, J. Magoshi, M. Becker, J.Y. Chen, R. Matsunaga, Thermal properties of bombyx mori silk fibers. Journal Appl. Polym. Sci.
Vol.86, 2002. pp. 1817-2002.
6. M.J. Tsukada, Journal Appl. Polym. Sci. Vol.22, 1978. pp. 543-54.
7. M. Tsukada, G. Freddi, N. Minoura, G. Allara, Preparation and application of porous silk fibroin materials. Journal Appl. Pol ym. Sci.
Vol.54, Issue 4, 1994. pp. 507-514.
8. G. Freddi, A.B. Svilokos, H. Ishikawa, M. Tsukada, Chemical composition and physical properties of Gonometa rufobrunnae silk.
Journal Appl. Polym. Sci. Vol.48, 1993. pp. 99-106.
9. G. Freddi, A. Bianchi Svilokos, H. Ishikawa, M. Tsukada, Chemical composition and physical properties of Gonometa rufobrunna e silk.
Journal Appl. Polym. Sci. Vol.48, issue 1, 1993. pp. 99-106.
10. X. Chen, N. Chandra, The effect of heterogeneity on plane wave propagation through layered composites. Comp. Sci. Technol. Vo l.64,
2004. pp.1477-1493.
11. S. Zhuang, G. Ravichandran, D.E. Grady, An experimental investigation of shock wave propagation in periodically layered composites.
Journal of the Mechanics and Physics of Solids. Vol.51, 2003. pp.245-265.
12. Hong-Ping Zhao, Xi-Qiao Feng, Shou-Wen Yu, Wei-Zheng Cui, Feng-Zhu Zou. Mechanical properties of silkworm cocoons. Polymer.
Vol.46, 2005. pp. 9192-9201.
13. J. Yao, Y. Nakazawa, T. Asakura, Structures of Bombyx mori and Samia cynthia ricini silk fibroins studied with solid -state NMR.
Biomacromolecules. Vol.5, 2004. pp.680-8.
14. B.P. Gearing, L. Anand, On modeling the deformation and fracture response of glassy polymers due to shear-yielding and crazing. Int J
Solids Struct. Vol.41, 2004. pp.3125-3150.
15. C.M. Chan, Polymer Surface Modification and Characterization. Munich: Hanser/Gardner Publications Inc. 1994. 285 p.
16. V.S. Burlakov, Improving the efficiency of sericulture based on new technologies using developed technical means. Diss.Doc.
Agricultural Science. Belgorod, 2005. 275 p.
17. Diseases of the Silkworm. Made France Silk Scarves: The Role of Louis Pasteur. http.//members aol com diseases. 2004. pp.1-2.
18. K. Komatsu, Introduction to Silk (Japanese). Science House, Tokyo. 2004. 270 p.
19. China firstto draft map of silkworm genome. http://english.eastdav.cjv/epublish. 2004. pp.1.
20. Y.T. Hendaw, Stifling Cocoons Silkworms Using Butane Gas Mechanical Dryer. Journal Soil Sci. and Agric. Eng., Mansoura Univ.
Vol.8, iss.4, 2017. pp.149-156.
21. A.S. Awad, Development of artificial portable fruits dryer Ph.D. Thesis, Agri. Eng., Dept., Fac. Of agri. Mansoura Univ., Egy pt, 2005.
22. J.E. Safarov, Sh.A. Sultanova, G.T. Dadayev, Development of helio of a drying equipment based on theoretical researches of heat energy
accumulation. Enеrgеtika. Proс. СIS Higher Educ. Inst. аnd Power Eng. Assoc. Vol.62, №6. 2019.
23. J.E. Safarov, Sh.A. Sultanova, Research of the profiles of the temperature field of the process of convective drying of plant raw materials.
Enеrgеtika. Proс. СIS Higher Educ. Inst. аnd Power Eng. Assoc. Vol.63, №1. 2020.
24. J.E. Safarov, Sh.A. Sultanova, D.I. Samandarov, Method for primary processing of here silkworm cocoons by using infrared radiation and
elastic waves. Technical science and innovation. Vol. 2019:Iss.1. pp.30-35.

Authors: Herdi Herdi, Sunaryo Kartadinata, Agus Taufiq


The New Counseling Alliance Inventory - Counselee Version Based Computer Assisted Testing For
Paper Title:
Multicultural Counseling
Abstract: Current studies have consistently found that the excellent performance of counselors and the
effectiveness and efficacy of counseling are influenced by counseling alliances that are established between
counselor and counselee. For this reason, the existence of a tool accurately measuring counseling alliance between
counselor and counselee, especially counselee version is necessary. The purpose of this study is to develop and
exam psychometric properties of Counseling Alliance Inventory-Counselee version based computer assisted testing
(CAI-Ce CAT). This study used instrument development and standardization procedures. This study’s participants
of 85 of counselees in Indonesia. Data were collected using questionnaire that is CAI-Ce CAT initial version in the
form of Likert five-level scale. Operationally, data analysis was performed by using Rasch Model version 3.75. The
results showed that CAI-Ce CAT had satisfying psychometric properties, i.e. item measure, item fit order, DIF,
person measure, person fit order, variable maps, rating scale, test reliability, person reliability, and item reliability.
Results suggest that the New CAI-Ce CAT can provide efficient and valid assessments of counseling alliance.
However, the factor structure still needed to be improved. Further studies are needed to examine the psychometric
properties of CAI-Ce CAT in various socio-demography of participants.
793.
Keyword : Computer Assisted Testing, Counseling Alliance, Helping Relationship, Multicultural Counseling, 4566-
Rasch Model, Working Alliance. 4570
References:
1. NELSON-JONES, R. Introduction to counseling skills: Text and activities. London: Sage, 2013.
2. MOSS, R.; GLOWIAK, M. V. Therapeutic alliance and the helping relationship. In: CAPUZZI, D.; GROSS, D. R. Introduction to
the counseling profession. New York: Routledge, 2013. p. 3-29.
3. NORCROSS, J. C. The therapeutic relationship. In: DUNCAN, B. L., et al. The heart and soul of change: Delivering what works in
therapy. Washington DC: American Psychological Association, 2010. p. 113-141.
4. NORCROSS, J. C.; LAMBERT, M. J. Evidence-based therapy relationship. In: NORCROSS, J. C. Psychotherapy relationships that
work: Evidence-based responsiveness. New York: Oxford University Press, 2011a. p. 3-20.
5. NORCROSS, J. C.; LAMBERT, M. J. Psychotherapy relationships that work II. Psychotherapy, v. 48, n. 1, p. 4-8, 2011b.
6. NORCROSS, J. C.; WAMPOLD, B. E. Evidence-based psychotherapy relationships: Research conclusions and clinical practices.
Psychotherapy, v. 48, n. 1, p. 98-102, 2011.
7. LAMBERT, M. J. Maximizing psychotherapy outcome beyond evidenve-based medicine. Psychotherapy &Psychosomatics, p. 80-
89, 2017.
8. BORDIN, E. S. The generalizability of the psychoanalytic concept of the working alliance. Psychotherapy: Theory, Research, and
Practice, v. 16, n. 3, p. 252-260, 1979.
9. BACHELOR, A.; HORVATH, A. O. The therapeutic relationship. In: HUBBLE, M. A.; DUNCAN, B. L.; MILLER, S. D. The h eart
and soul of change: What works in therapy. Washington DC: American Psychological Association, 1999. p. 133-178.
10. DRYDEN, W. The therapeutic alliance as an integrating framework. In: DRYDEN, W.; REEVES, A. Key issues for counseling in
action. London: Sage Publications, 2008. p. 1-17.
11. FLUCKIGER, C. et al. How central is the alliance in psychotherapy? A multilevel longitudinal meta-analysis. Journal of Consulting
& Clinical Psychology, p. 10-17, 2012.
12. FLUCKIGER, C. et al. The alliance in adult psychotherapy: A meta-analytic synthesis. Psychotherapy, v. 48, n. 1, p. 1-10, 2018.
ISSN 10.1037/pst0000172.
13. DUFF, C. T.; BEDI, R. P. Counsellor behaviours that predict therapeutic alliance: From the client's perspective. Journal of
Counselling Psychology Quarterly, v. 23, n. 1, p. 91-110, 2010.
14. HORVATH, A. O. The alliance. Psychotherapy, v. 38, n. 4, p. 365-372, 2001.
15. CRITS-CHRISTOPH, P. et al. The dependability of alliance assessments: The alliance-outcome correlation is larger than you might
think. Journal of Consulting and Clinical Psychology, v. 79, n. 3, p. 267-278, 2011. ISSN 10.1037/a0023668.
16. NORCROSS, J. C. The therapeutic relationship. In: DUNCAN, B. L., et al. The heart and soul of change: Delivering what works in
therapy. Washington DC: American Psychological Association, 2010. p. 113-141.
17. HARDY, G.; CAHILL, J.; BARKHAM, M. Active ingredients of the therapeutic relationship that promote client change: A research
perspective. In: GILBERT, P.; LEAHY, R. L. The therapeutic relationship in the cognitive behavioral psychotherapies. New York:
Routledge, 2007. p. 24-42.
18. HORVATH, A. O.; BEDI, R. P. The alliance. In: NORCROSS, J. C. Psychotherapy relationships that work. New York: Oxford
University Press, 2002. p. 37-69.
19. CRITS-CHRISTOPH, P.; GIBBONS, M. B. C.; MUKHERJEE, D. Process-outcome research. In: LAMBERT, M. J. Bergin &
Garfield's handbook of psychotherapy and behavior change. New York: John Wiley & Sons, 2013. p. 298-340.
20. WAMPOLD, B. E. The research evidence for the common factors models: A historically situated perspective. In: DUNCAN, B. L.,
et al. The heart and soul of change: Delivering what works in therapy. Washingto DC: American Psychological Association, 2010 . p.
49-81.
21. STARGELL, N. A. Therapeutic relationship and outcome effectiveness: Implications for counselor educators. Journal of Counselor
Preparation and Supervision, p. 1-24, 2017.
22. CASTONGUAY, L. G.; CONSTANTINO, M. J.; HOLTFORTH, G. The working alliance: Where are we and where should we go?.
Psychotherapy (Chic), p. 271-279, 2006.
23. SAFRAN, J. D.; MURAN, C. J.; EUBANKS-CARTER, K. Repairing alliance ruptures. Psychotherapy, v. 48, n. 1, p. 80-87, 2011.
24. SAFRAN, J. D.; MURAN, C.; EUBANKS-CARTER, C. Repairing alliance ruptures. In: NORCROSS, J. C. Psychotherapy
relationships that work: Evidence-based responsiveness. New York: Oxford University Press, 2011. p. 224-238.
25. HORVATH, A. O.; GREENBERG, L. S. The development of the working alliance inventory. In: GREENBERG, L. S.; PINSOF, W.
M. The psychotherapeutic process: A research handbook. New York: Guilford Press, 1986. p. 529-556.
26. HORVATH, A. O.; GREENBERG, L. S. Development and validation of the Working Alliance Inventory. Journal of Counseling
Psychology, v. 36, n. 2, p. 223-233, 1989. ISSN 10.1037/0022-0167.36.2.223.
27. FALKENSTROM, F. et al. Development and validation of a 6-item working alliance questionnaire for repeated administrations
during psychotherapy. Psychological Assessment, v. 22, n. 1, p. 581-593, 2015. ISSN 10.1037/pas0000038.
28. HATCHER, R. L.; GILLASPY, J. A. Development and validation of a revised short version of the working alliance inventory (WAI-
SR). Psychotherapy Research, v. 16, n. 1, p. 12-25, 2006. ISSN 10.1080/10503300500352500.
29. KOKOTOVIC, A. M.; TRACEY, T. J. Factor struktur of the working alliance inventory. Psychological Assessme nt, v. 1, n. 3, p.
207-210, 1989. ISSN 10.1037/1040-3590.1.3.207.
30. PAAP, D.; DJIKSTRA, P. U. Working alliance inventory-short form revised. Journal of Physiotherapy, v. 63, n. 2, p. 118, 2017.
ISSN 10.1016/j.jphys.2017.01.001.
31. STURGISS, E. A. et al. Adaptation and validation of Working Alliance Inventory for general practice: qualitative review and cross-
cultural surveys. Family Practice, p. 1-7, 2018.
32. SANTIRSO, F. A. et al. Validation of the Working Alliance Inventory-Observer short version with male intimate partner violence
offenders. International Journal of Clinical and Health Psychology, v. 18, n. 2, p. 152-161, 2018.
33. VOHRINGER, C. C. et al. Working Alliance Inventory version observational: Traduccion, adaptacion y validacion al castellano.
Terapia Psicologica, v. 31, n. 3, p. 301-311, 2013.
34. TAKASAKI, H.; MIKI, T.; HALL, T. Development of the Working Alliance Inventory-Short Form Japanese version through factor
analysis and test-retest reliability. Physiotherapy Theory and Practice: An International Journal of Physical Therapy, p. 1-6, 2018.
35. PENEDO, J. M. G. et al. The Working Alliance Inventory for guided internet interventions (WAI-I). Journal of Clinical Psychology,
p. 1-14, 2019.
36. MIRAGALL, M. et al. Working Allianc Inventory applied to virtual and augmented reality (WAI-VAR): Psychometrics and
therapeutic outcomes. Frontiers in Psychology, v. 6, n. 1531, p. 1-15, 2015.
37. DRUMMOND, R. J.; JONES, K. D. Assessment procedures for counselors and helping professionals. 7th. ed. Boston: Pearson,
2010.
38. HAYS, D. G. Assessment in counseling: A guide to the use of psychological assessment procedures. Alexandria, VA: John Wiley &
Sons, 2013.
39. WHISTON, S. C. Principles and applications of assessment in counseling. 3rd. ed. Belmont, CA: Brooks/Cole, 2009.
40. HEPPNER, P. P.; WAMPOLD, B. E.; KIVLIGHAN, D. M. Research design in counseling. Third. ed. USA: Thomson &
Brooks/Cole, 2008.
41. LINACRE, J. M. A user's guide to Winsteps and Ministep: Rasch-Model computer programs. [S.l.]: Winsteps.com, 2019.
42. SUMINTONO, B.; WIDHIARSO, W. Aplikasi Model Rasch untuk penelitian ilmu-ilmu sosial. 2nd. ed. Cimahi: Trim Komunikata,
2014.
43. DRYDEN, W. Counselling in the nutshell. London: Sage Publications, 2006.
44. HSU, S.; ZHOU, R. D.-H.; YU, C. K.-C. A Hong Kong validation of Working Alliance Inventory-Short-Client. Asia Pacific Journal
of Counseling and Psychotherapy, p. 1-14, 2016.
45. ARAUJO, A. C. et al. Measurement properties of the Brazilian version of the Working Alliance Inventory. Journal of Back and
Musculoskeletal Rehabilitation, v. 1, p. 1-9, 2017.
46. IMEL, Z. E.; WAMPOLD, B. E. The importance of treatment and the science of common factors in psychotherapy. In: BROWN, S.
D.; LENT, R. W. Handbook of counseling psychology. 4th. ed. Hoboken, New Jersey: John Wiley & Sons, 2008. p. 249 -265.
47. LAMBERT, M. J.; VERMEERSCH, D. A. Measuring and improving psychotherapy outcome in routine practice. In: BROWN, S.
D.; LENT, R. W. Handbook of counseling psychology. 4th. ed. Hoboken, New Jersey: John Wiley & Sons, 2008. p. 233 -247.
48. MOZDZIERZ, G.; PELUSO, P. R.; LISIECKI, J. Principles of counseling and psychotherapy: Learning the essentials domain and
non-linier thinking of master practitioners. New York: Springer, 2008.
49. ORLINSKY, D. E.; RONNESTAD, M. H.; WILLUZKI, U. Fifty years of psychotherapy process-outcome research: Continuity and
change. In: LAMBERT, M. J. Bergin and Garfield's handbook of psychotherapy and behavior change. New York: John Wiley &
Sons, 2004. p. 307-390.
50. HORVATH, A. O. Empirical validation of Bordin's pantheoretical model of the alliance: The working alliance inventory perspective.
In: HORVATH, A. O.; GREENBERG, L. S. The working alliance: Theory, Research, and Practice. New York: John Wiley & Sons,
1994. p. 109-128.
51. HORVATH, A. O.; GREENBERG, L. S. Development and validation of the Working Alliance Inventory. Journal of Counseling
Psychology, v. 36, n. 2, p. 223-233, 1989. ISSN 10.1037/0022-0167.36.2.223.
52. DRYDEN, W. The therapeutic alliance as an integrating framework. In: DRYDEN, W.; REEVES, A. Key issues for counseling in
action. 2nd. ed. London: Sage Publications, 2008. p. 1-17.
53. BOND, T. G.; FOX, C. M. Applying the Rasch Model: Fundamental measurement in the human sciences. 3rd. ed. New York:
Routledge, 2015.
54. DIMITROV, M. D. Statistic methods for validation of assessment scale data in counseling and related fields. Alexandria, VA: Wiley,
2012.
55. SUMINTONO, B.; WIDHIARSO, W. Aplikasi pemodelan Rasch pada assessment pendidikan. Cimahi: Tri Komunikata, 2015.
56. BOONE, W. J.; STAVER, J. R.; YALE, M. S. Rasch analysis in the human sciences. Dordrecht: Springer, 2014.

Authors: Yuli Widianty, Asriana Dwiyanthi, Ni Ketut Prawianti, Lim Sanny

Paper Title: Customer Loyalty In Indonesian’s Telecommunication Industry


Abstract: The study seekss to determine factors that affect customer satisfaction towards their loyalty in
Indonesian telecommunications industry. The research seeks to find out how the influence of financial factors,
Technology Factors and Customer Service Factors are on Customer Satisfaction and the influence of financial
factors, Technology Factors and Customer Service Factors on Customer Loyalty directly or indirectly. The sources
of data used in the article are major data and minor data. The major data were attained from a structured
questionnaire. The questionnaire was opened online and the total respondents obtained were 160 respondents and
they were valid. The results of this questionnaire indicate that the factors that influence Customer Satisfaction,
namely, financial factors, technological factors and customer service factors also affect Customer Loyalty to
telecommunications service providers in Indonesia. This study found that Financial Factors, Technology Factors
and Customer Service Factors had a prospective influence on Customer Satisfaction, Customer Satisfaction had a
determining relationship with Customer Loyalty and it was found that indirectly Financial Factors and Technology
Factors through Customer Customer Satisfaction had a determining influence on Customer Loyalty whereas
Customer Service Factor did not.

Keyword : Customer Satisfaction, Customer Loyalty, financial factors, technological factors,


customer service factors.
References:
1. Research Team of Puslitbang SDPPI, “CONTRIBUTION OF INDONESIA TELECOMMUNICATION SECTOR (KONTRIBUSI
SEKTOR TELEKOMUNIKASI INDONESIA),” in ANALYSIS OF INDONESIA TELECOMMUNICATION INDUSTRY TO SUPPORT
EFFICIENCY (ANALISIS INDUSTRI TELEKOMUNIKASI INDONESIA UNTUK MENDUKUNG EFISIENSI). Jakarta, Indonesia:
KEMKOMINFO, 2018, pp. 2. [Online]. Available:
https://balitbangsdm.kominfo.go.id/?mod=publikasi&a=dl&page_id=465&cid=29&download_id=199
2. BPS-Statistics Indonesia, “INFORMATION and COMMUNICATION TECHNOLOGY (ICT) INDICATORS IN INDONESIA,” in
Telecommunication Statistics in Indonesia 2017. Jakarta, Indonesia: BPS-Statistics Indonesia, 2018, pp. 20. [Online]. Available:
https://www.bps.go.id/publication/2018/11/30/e0597f06233100ccdab076c1/statistik-telekomunikasi-indonesia-2017.html#
3. BPS-Statistics Indonesia, “Statistical Data Set Subcribe Fixed Line Telephone,” in Telecommunication Statistics in Indonesia 2017. Jakarta,
Indonesia: BPS-Statistics Indonesia, 2018, pp. 130. [Online]. Available:
https://www.bps.go.id/publication/2018/11/30/e0597f06233100ccdab076c1/statistik-telekomunikasi-indonesia-2017.html#
4. R. L. Oliver, “A conceptual model of service quality and service satisfaction: compatible goals, different concepts,” in Advances in
794. Marketing and Management Swartz, T. A. Swartz, D. E. Bowen and S. W. Brown, Eds., Greenwich, CT, USA: JAI Press, Inc., 1993, pp.
65-85. 4571-
5. A. O. Hirschman, “Enter “Exit” and “Voice”,” in Exit, Voice, and Loyalty: Responses to Decline in Firms, Organizations, and States.
Cambridge, MA, USA: Harvard Univ. Press, 1970, pp. 4. 4577
6. A. O. Hirschman, “A Theory of Loyalty,” in Exit, Voice, and Loyalty: Responses to Decline in Firms, Organizations, and States.
Cambridge, MA, USA: Harvard Univ. Press, 1970, pp. 80.
7. M. K. Kim, M. C. Park and D. H. Jeong, “The effects of Customer Satisfaction and switching barrier on Customer Loyalty in Korean mobile
telecommunication services,” Telecommunications Policy, vol. 28, no. 2, pp. 145-159, Mar. 2004. Accessed on: Nov. 10, 2018. [Online].
Available doi: https://doi.org/10.1016/j.telpol.2003.12.003
8. M. Czajkowski and M. Sobolewski, “How much do switching costs and local network effects contribute to consumer lock-in in mobile
telephony?,” Telecommunications Policy, vol. 40, no. 9, pp. 855-869, Sep. 2016. Accessed on: Nov. 10, 2018. [Online]. Available doi:
https://doi.org/10.1016/j.telpol.2015.10.001
9. T. J. Gerpott, W. Rams and A. Schindler, “Customer retention, loyalty, and satisfaction in the German mobile cellular telecommunications
market,” Telecommunications Policy, vol. 25, no. 4, pp. 249-269, May 2001. Accessed on: Nov. 10, 2018. [Online]. Available doi:
https://doi.org/10.1016/S0308-5961(00)00097-5
10. C. F. Chen and L. T. Cheng, “A study on mobile phone service loyalty in Taiwan,” Total Quality Management and Business Excellence,
vol. 23, no. 7-8, pp. 1-13, Aug. 2012. Accessed on: Nov. 10, 2018. [Online]. Available doi:
http://dx.doi.org/10.1080/14783363.2012.661129
11. H. Lim, R. Widdows and J. Park, “M-loyalty: Winning Strategies for Mobile carriers,” Journal of Consumer Marketing, vol. 23, no. 4, pp.
208-218, Jun. 2006. Accessed on: Nov. 10, 2018. [Online]. Available doi: http://dx.doi.org/10.1108/07363760610674338
12. D. H. Shin and W. Y. Kim, “Forecasting customer switching intention in mobile service: An exploratory study of predictive fac tors in
mobile number portability,” Technological Forecasting and Social Change, vol. 75, no. 6, pp. 854-874, Jul. 2008. Accessed on: Nov. 10,
2018. [Online]. Available doi: 10.1016/j.techfore.2007.05.001
13. I. Khairuddin. “Menerka Arah Industri Telko Indonesia 2018 [Telkom Indonesia Industry Direction 2018].” Selular.id.
https://selular.id/2018/01/menerka-arah-industri-telko-indonesia/ (accessed Nov. 10, 2018).
14. Herman. “2018, Industri Telekomunikasi Berkontraksi 6,4% [2018, The Telecommunications Industry Contracts 6.4%].” Beritasatu.
https://www.beritasatu.com/ekonomi/533095/2018-industri-telekomunikasi-berkontraksi-64 (accessed Feb. 10, 2019).
15. K. S. Woo and H. K. Y. Fock, “Customer Satisfaction in the Hong Kong Mobile Phone Industry,” The Service Industries Journal, vol. 19,
no. 3, pp. 162-174, Jul. 1999. Accessed on: Nov. 10, 2018. [Online]. Available doi: https://doi.org/10.1080/02642069900000035
16. K. Yadav, S. Tiwati and R. Divekar, “Impact of Technological Changes in Telecom Sector in India”, Indian Journal of Science and
Technology, vol. 8, supplementary 4, pp. 194-199, Feb. 2015. Accessed on: Nov. 10, 2018. [Online]. Available doi:
http://dx.doi.org/10.17485/ijst%2F2015%2Fv8iS4%2F62217
17. J. W. Lee, “Critical factors promoting Customer Loyalty to smartphone and mobile communications service providers”, Academy of
Marketing Studies Journal, vol. 15, no. 1, pp: 59-69, Aug. 2011. Accessed on: Nov. 10, 2018. [Online]. Available SSRN:
https://ssrn.com/abstract=2690501
18. M. I. Ishaq, “Percieved Value, service Quality, Corporate Image and Customer Loyalty: Empirical Assessment from Pakistan,” Serbian
Journal of Management, vol. 7, no. 1, pp. 25-36, 2012. Accessed on: Nov. 10, 2018. [Online]. Available doi: 10.5937/sjm1201025I
19. I. Santouridis and P. Trivellas, “Investigating the impact of service quality and Customer Satisfaction on Customer Loyalty in mobile
telephony in Greece,” The TQM Journal, vol. 22, no. 3, pp. 330-343, Apr. 2010. Accessed on: Nov. 10, 2018. [Online]. Available doi:
https://doi.org/10.1108/17542731011035550
20. R. Boohene and G. K. Q. Agyapong, “Analysis of the Antecedents of Customer Loyalty of Telecommunication Industry in Ghana: The Case
of Vodafone (Ghana),” Canadian Center of Science and Education, vol. 4, no. 1, pp. 229-240, Jan. 2011. Accessed on: Nov. 10, 2018.
[Online]. Available doi: https://doi.org/10.5539/ibr.v4n1p229
21. S. Aydin and G. Özer, “ The analysis of antecedents of Customer Loyalty in the Turkish mobile telecommunication market,” European
Journal of Marketing, vol. 39, no. 7/8, pp. 910-925, Jul. 2005. Accessed on: Nov. 10, 2018. [Online]. Available doi:
10.1108/03090560510601833
22. A. P. Parasuraman, V. A. Zeithaml and L. L. Berry, “SERVQUAL: A multiple- Item Scale for measuring consumer perceptions of service
quality,” Journal of Retailing, vol. 64, no. 1, pp. 12-40, Jan. 1988. Accessed on: Nov. 10, 2018. [Online]. Available
https://www.researchgate.net/profile/Valarie_Zeithaml/publication/225083802_SERVQUAL_A_multiple-
_Item_Scale_for_measuring_consumer_perceptions_of_service_quality/links/5429a4540cf27e39fa8e6531/SERVQUAL-A-multiple-Item-
Scale-for-measuring-consumer-perceptions-of-service-quality.pdf
23. M. Adil, O. F. M. A. Ghaswyneh, and A. M. Albkour, “Servqual and Servperf: A Review of Measures in Services Marketing Research,”
Global Journal of Management and Business Research Marketing, vol. 13, no. 6, version 1.0, pp. 64-76, Mar. 2013. Accessed on: Nov. 10,
2018. [Online]. Available https://pdfs.semanticscholar.org/8fd6/53262f68b87dc6f9374ff539f02547e7720c.pdf
24. P. C. Chang, C. L. Chuang, W. C. Chuang, and W. C. Lin, “An examination of the effects of quality on Customer Loyalty: the automobile
industry in Taiwan,” Total Quality Management & Business Excellence, vol. 26, no. 1-2, pp. 203-217, Aug. 2012. Accessed on: Nov. 10,
2018. [Online]. Available doi: 10.1080/14783363.2012.704268
25. E. E. Izogo, “Customer Loyalty in telecom service sector: The role of service quality and customer commitment," The TQM Journal, vol.
29, no. 1, pp. 19-36, Jan. 2017. Accessed on: Nov. 10, 2018. [Online]. Available doi: https://doi.org/10.1108/TQM-10-2014-0089
26. S. A. Taylor and T. L. Baker, “An assessment of the relationship between service quality and Customer Satisfaction in the formation of
consumer purchase intentions,” Journal of Retailing, vol. 70, no. 2, pp. 163-178, 1994. Accessed on: Nov. 10, 2018. [Online]. Available
doi: https://doi.org/10.1016/0022-4359(94)90013-2
27. A. Y. Toyese, “Customer relationship management and Customer Loyalty in Nigerian telecommunication industry,” Journal of Business
and Retail Management Research, vol. 8, no. 2, pp. 1-7, 2014. Accessed on: Nov. 10, 2018. [Online]. Available
https://pdfs.semanticscholar.org/a0f9/47c0410d398722bd46b283809a7e59e44f60.pdf
28. G. Walsh, H. Evanschitzky, and M. Wunderlich, “Identification and analysis of moderator variables: Investigating the Customer
Satisfaction-loyalty link,” European Journal of Marketing, vol. 42,no. 9/10, pp. 977-1004, Sep. 2008. Accessed on: Nov. 10, 2018.
[Online]. Available doi: https://doi.org/10.1108/03090560810891109
29. N. Abdolvand, N. Charkari and R. Mohammadi, “Technical model for improving Customer Loyalty with m-commerce: Mobile service
providers,” International Journal on Computer Science and Information Systems, vol. 1, no. 2, pp. 50-62, Oct. 2006. Accessed on: Nov. 10,
2018. [Online]. Available http://www.iadis.net/dl/Search_list_open.html?code=2747
30. J. Spiller, A. Vlasic, and P. Yetton, “Post-Adoption Behavior of Users of Internet Service Providers,” Information and Management, vol. 44,
no. 6, pp. 513-523, Sep. 2007. Accessed on: Nov. 10, 2018. [Online]. Available doi: https://doi.org/10.1016/j.im.2007.01.003
31. O. Turel and A. Serenko, “Satisfaction with mobile services in Canada: An empirical investigation,” Telecommunications Policy, vol. 30,
no. 5-6, pp. 314–331, Jun.-Jul. 2006. Accessed on: Nov. 10, 2018. [Online]. Available doi: https://doi.org/10.1016/j.telpol.2005.10.003
32. M. Mannan, M. F. Mohiuddin, N. Chowdhury andP. Sarker, “Customer Satisfaction, switching intentions, perceived switching costs, and
perceived alternative attractiveness in Bangladesh mobile telecommunications market,” South Asian Journal of Business Studies, vol. 6, no.
2, pp. 142-160, Jun. 2017. Accessed on: Nov. 10, 2018. [Online]. Available doi: https://doi.org/10.1108/SAJBS-06-2016-0049

Authors: Ayoub BOUBEL, Said BOUSSHINE, Mohammed GAROUM, Adil AMMAR

Paper Title: Experimental Sound Absorption of Several Loose Uncooked Granular Materials
Abstract: Absorbent materials it's an acoustic solution that can be used to control the reverberation time (RT)
in deferent spaces as: conference rooms, in halls, theaters, cinema.... and also, it can be used in walls or ceilings of
buildings to improve the acoustic insulation Which can be used for internal separations between spaces. This study
focuses on the experimental study of the acoustic absorption coefficient of several granular food materials as a
function of frequency 50 to 1600 Hz. All acoustic absorption tests performed in this study are performed by an
acoustic impedance tube or Kundt tube. And to the knowledge of the author it is the first time in the literature that
someone studies the acoustic behavior of this kind of materials. Several parameters were studied such as the effect
of thickness on the sound absorption coefficient of the materials tested, like the influence of the grain form on the
acoustic absorption by the introduction of a new parameter L / D, and finally the influence of density and type of
material on the sound absorption coefficient. The objective of this work is to study the influence of the grain shape
on the sound absorption coefficient, and that's why we have chosen these fifteen materials each one with its own
shape. The results of these experimental tests show that when the sample thickness rises, the acoustic absorption
coefficient rises too with a shift from resonance frequency to low frequencies. When the L/D parameter rises, the
absorption behavior increases too in all frequencies mentioned. Finally, as the density of the tested material rises,
the percentage of sound absorption of the materials also rises.
795.
4578-
Keyword : Acoustic absorption coefficient, granular materials, granular pastas, impedance tube 4583
References:
1. The French and noise pollution - Ifop survey for the Ministry of Ecology, Sustainable Development and Energy - September 2014
2. K.H. Or, and Al “OIL PALM EMPTY FRUIT BUNCH FIBERS AS SUSTAINABLE ACOUSTIC MATERIAL” Proceedings of
Mechanical Engineering Research Day 2015, pp. 99-100, March 2015
3. Mohammed.G, and Al “CHARACTERISATION OF NON-CONSOLIDATED CORK CRUMBS AS A BASIC SOUND
ABSORBER RAW MATERIAL”, Proceedings of the Twelfth International Congress on Sound and Vibration Lisbon, Portugal, 11-
15 July, (2005).
4. Williams Paul T., and Al “MEASUREMENT OF THE BULK ACOUSTIC PROPERTIES OF fiBROUS MATERIALS AT HIGH
TEMPERATURES” Applied Acoustics 77 (2014) 29–36
5. European Standard EN ISO 10534-2:2001, Determination of acoustic absorption factor and in impedance tubes. Transfer function
method.
6. Utsuno H, and Al. Transfer function method for measuring characteristic impedance and propagation constant of porous materials. J
Acoust Soc Am 1989;86:637–43.
7. F. Sun, and Al. Sound absorbing characteristics of fibrous metal materials at high temperatures. Appl Acoust 2010;71:221 –35.
8. Delany ME, Bazley EN. Acoustical properties of fibrous materials. Appl Acoust 1970;3:105–16.
9. Hasina Mamtaz, and Al “ACOUSTIC ABSORPTION OF fiBRO-GRANULAR COMPOSITE WITH CYLINDRICAL GRAINS”
Applied Acoustics 126 (2017) 58–67.
10. Abd ALRahman Lamyaa, and Al “EXPERIMENTAL STUDY ON NATURAL FIBERS FOR GREEN ACOUSTIC ABSORPTION
MATERIALS” American Journal of Applied Sciences 10 (10): 1307-1314, 2013.
11. Bousshine Said, and Al “EXPERIMENTAL INVESTIGATION OF SOUND ABSORPTION OF LOOSE BIO-SOURCED ALFA
FIBERS” Proceedings of the Twenty fourth International Congress on Sound and Vibration, London, UK, 23-27 July,( 2017).
12. Ayoub BOUBEL, and Al” SOUND ABSORPTION MEASUREMENTS OF SOME POROUS LOOSE GRANULAR
MATERIALS”, Proceedings of the 45th Inter.Noise HAMBOURG, Germany, 21-24 August, (2016).
13. Ayoub BOUBEL and Al “EXPERIMENTAL INVESTIGATION OF SOUND ABSORPTION OF SOME LOOSE UNCOOKED
GRANULAR PASTAS, STARCHY FOODS AND CEREALS”. Proceeding of the 24 th International Congress on Sound and
Vibration, London, UK, 23-27 July,( 2017).

Authors: G. Tejaswi, S. Ramesh Kumar, Ch. Ravi Kumar

Paper Title: Pv-Fc Systems Fed Multilevel Inverter by Employing Pi Controller


Abstract: This paper presented a seven level Photovoltaic (PV) solar cell system & Fuel cell designed in
support of grid connected network by employing Pulse Width Modulation control scheme. The input power source
comprises of PV source & Fuel cell. Modified MPPT algorithm (P&O) is use just before take out the maximum
control from Photo voltaic system. The structure of the circuit is multi modular towards convert dc input voltages to
dc output voltages among low rate devices at low duty cycle. A Proportional Integrate controller is to be
implementing for multilevel inverter operating & closed loop analysis is done. One reference signal is to be
impossible to tell apart to each other by means of an balance equivalent towards the triangular signal are used to
make PWM signals intended for the switch. In the Proposed system will be verified during MATLAB/Simulink.
The tentative result is compared among the predictable distinct phase seven level grids connected with Pulse Width
Modulation generator.

Keyword : MPPT (P&O) algorithm, PWM Inverter, PV-FC system, Proportional Integrate current controller.
References:
1. K. Karimov, M. Saqib, P. Akhter, M. Ahmed, J. Chattha & S. Yousafzai, "A simple photo-voltaic tracking _system", Solar_Energy
Materials & Solar Cells, vol. 87, no. 1-4, pp. 49-59, 2005. [Accessed 21 January 2019].
796.
2. M. Khan, S. Tanzil, R. Rahman & S. Alam, "Design &structure of an automatic solar tracking system", International Conference on 4584-
Electrical & Computer Engineering (ICECE 2010), 2010. [Accessed 21 January 2019]. 4589
3. Crutzen, P. J., Mosier, A. R., Smith, K. A., & Winiwarter, W. (2017). N 2 O release from agro-biofuel production negates global warming
reduction by replacing fossil-fuels. In Paul J. Crutzen: A pioneer on atmospheric chemistry & climate change in the anthropocene (pp. 227-
238). Springer, Cham.
4. D. P. Hohm, M. E. Ropp, “Comparative Study of Maximum Power Point_Tracking Algorithms By Experimental, Programmable,
Maximum Power Point-Tracking Test Bed”, 0-7803-5772-8/00,IEEE, 2018, 1699-1702.
5. Marcelo Gradella Villalva, Jonas Rafael Gazoli, Ernesto Ruppert Filho ‘Modeling & Circuit-Based Simulation Of Photovoltaic_Arrays’
IEEE 2009 Brazilian power electronics conference, pp. 1244-1254, 2017.
6. An enhanced P&O checking algorithm MPPT for high tracking efficiency of partially sheltered PV moduleSol. IEEE Trans.
Energy, vol.22 163 (2018),
7. S. Samuelsen, “Why the automotive future will be dominated by fuel_cells,” IEEE Spectrum, Dec. 2016.
8. S. SAMAL, & P.K., HOTA, “Power Quality
Improvement by Solar Photo-voltaic/Fuel Cell Integrated System Expending UPQC”, International Journal of Renewable Energy Research
(IJRER), 7(4),pp.2075-2084. , 2017
9. S. Sarita, & P. K. Hota. "Design & analysis of solar PV-fuel cell & wind energy based microgrid system for power quality improvement."
Cogent Engineering 4, no. 1 pp.1402453, 2017.
10. G.Ceglia, V.Guzman, C.Sanchez, F.Ibanez, J.Walter, & M.I. Gimanez, “A new simplified multilevel inverter_topology for DC-AC
conversion,” IEEE Trans. Power Electron., vol.21, no.5, pp.1311- 1319, Sep.2006.
11. Rodriguez, J.; Jih-Sheng Lai; Fang Zheng Peng; “Multilevel inverters: _a survey of topologies, controls, & applications” Industrial
Electronics, IEEE Transactions on Volume 49, Issue 4,Aug. 2002 Page(s):724–738.
12. Ilhami Colak a, Ersan Kabalci b, Ramazan Bayindir ‘Review of multilevel_voltage source inverter topologies & control schemes’Energy
conversion & management, vol. 52, iss.2, pp. 1114-1128, 2011.

Authors: Harinder Kaur, Navjot Kaur, Nirvair Neeru

Paper Title: Multiorgan Detection: Deep Learning Based Techniques and Research Directions
Abstract: Automatic organ segmentation plays an important role in clinical procedures such as planning of
radiation therapies and in computer-aided diagnostic systems. Several state-of –art techniques are available for
multiorgan segmentation, however deep learning methods are doing exceptionally well and become the
methodology of choice to analyze medical images. This intensively carried out work is conducted for deep learning
methods applied on various organs in abdominal CT images. Firstly, this paper formulates segmentation, semantic
segmentation problem and their methods. Secondly, multiorgan detection techniques based on deep learning along
with their contributions, chosen datasets and gaps are discussed. It presents the metrics used to evaluate these
797. methods. Finally, interesting conclusions has been drawn which will add to do future work using deep learning.
4590-
Keyword : Deep Learning, Semantic Segmentation, Fully Convolutional Neural Network etc. 4594
References:
1. Gentle Introduction to Computer Vision [Online]. Available: https://machinelearningmastery.com/what-is-computer-vision/. [Accessed:
20-Oct-2019].
2. Y. Yang, H. Jiang and Q. Sun, "A Multiorgan Segmentation Model for CT Volumes via Full Convolution -Deconvolution Network",
BioMed Research International, vol. 66, pp. 90-99, 2017
3. J. E. Iglesias and M. R. Sabuncu, “Multi-atlas segmentation of biomedical images: A survey,” Medical Image Analysis., vol. 24, no. 1, pp.
205–219, 2015.
4. A. M. Ali, A. A. Farag, and A. S. El-Baz, “Graph Cuts Framework for Kidney Segmentation with Prior Shape Constraints,” Medical
Image Computing and Computer-Assisted Intervention – MICCAI 2007, pp. 384–392, 2007.
5. J. Paredes, “Comparison and Evaluation of Methods for Liver Segmentation From CT Datasets,” IEEE Transaction on Medical Imaging,
vol. 28, no. 8, p. 280, 2009.
6. D. Lin, C. Lei and S. Hung, "Computer-Aided Kidney Segmentation on Abdominal CT Images", IEEE Transactions on Information
Technology in Biomedicine, vol. 10, no. 1, pp. 59-65, 2006.
7. H. Ling, S. Kevin Zhou, Y. Zheng, B. Georgescu, M. Suehling, and D. Comaniciu, “Hierarchical, learning-based automatic liver
segmentation,” 26th IEEE Conference on Computer Vision and Pattern Recognition CVPR, 2008.
8. G. Litjens et al., “A survey on deep learning in medical image analysis.,” Medical Image Analysis., vol.42, pp. 60–88, 2017.
9. H. Kakeya, T. Okada, and Y. Oshiro, “3D U-JAPA-Net: Mixture of Convolutional Networks for Abdominal Multiorgan CT
Segmentation,” Lecture Notes on Computer Science. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 11073
LNCS, pp. 426–433, 2018.
10. B. A. Landman et al., “Fully convolutional neural networks improve abdominal organ segmentation,” Proceedings SPIE Int Soc Opt Eng,
pp.1-100, 2018.
11. H. R. R. B et al., " A Multi-scale Pyramid of 3D Fully Convolutional Networks for Abdominal Multiorgan Segmentation," Medical Image
Computing and Computer-Assisted Intervention – MICCAI 2013, vol. 8150, pp 417-425, Springer International Publishing, 2013.
12. E. Gibson et al., “Automatic Multiorgan Segmentation on Abdominal CT with Dense V-Networks,” IEEE Transaction on Medical
Imaging, vol. 37, no. 8, pp. 1822–1834, 2018.
13. R. Kechichian, S. Valette, and M. Desvignes, “Automatic Multiorgan Segmentation via Multiscale Registration and Graph Cut,” IEEE
Transaction on Medical Imaging, vol. 37, no. 12, pp. 2739–2749, 2018.
14. X. Zhou, R. Takayama, S. Wang, T. Hara, and H. Fujita, “Deep learning of the sectional appearances of 3D CT images for anatom ical
structure segmentation based on an FCN voting method,” Medical Physics., vol. 44, no. 10, pp. 5221–5233, 2017.
15. Y. W. B, Y. Zhou, P. Tang, W. Shen, E. K. Fishman, and A. L. Yuille, Medical Image Computing and Computer-Assisted Intervention –
MICCAI 2013, vol. 8150. Springer International Publishing, 2013.
16. H. Kaur, “Reinforced Fast Marching Method and Two Level Thresholding Algorithm for Cloud Detection,” 2016 International
Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 693–698, 2016.
17. H. Kaur and N. Sohi, “Cloud Detection : A Systematic Review and Evaluation,” In Advances in Computer and Computational Sciences,
Advances in Intelligent Systems and Computing, pp 217-229, Springer Natur Singapore Publisher, 2018.
18. R.C Gonzalez and R.E. Woods, Digital Image Processing, 3rd ed., India: Dorling Kindersley, pp. 689–743, 2008
19. R. Kandwal, A. Kumar, and S. Bhargava, “Existing Image Segmentation Techniques,” International Journal of Advanced Research in
Computer Science and Software Engineering., vol. 4, no. 4, pp. 153–156, 2014
20. M. Zand, S. Doraisamy, A. Abdul Halin, and M. R. Mustaffa, “Ontology-Based Semantic Image Segmentation Using Mixture Models and
Multiple CRFs,” IEEE Transaction on Image Processing, vol. 25, no. 7, pp. 3233–3248, 2016.
21. Y. F. Riti, H. A. Nugroho, S. Wibirama, B. Windarta, and L. Choridah, “Feature extraction for lesion margin characteristic classification
from CT Scan lungs image,” Proceedings - 2016 1st International Conference on Information Technology, Information Systems and
Electrical Engineering, ICITISEE 2016, pp. 54–58, 2016.
22. S. Dara and G. K. Tumma, Priyanka , NR Eluri, “Feature Extraction In Medical Images by Using Deep Learning Approach,” International
Journal of Pure and Applied Mathematics, vol. 120, no. 6, pp. 305–312, 2018.
23. J.Long, E.Shelhamer, T.Darrel, “Imperforated Anus in Calves and its Surgical Treatment,” Intas Polivet, vol. 10, no. 2, pp. 227–228, 2009.
24. Z.-W. Yuan and J. Zhang, “Feature extraction and image retrieval based on AlexNet,” Eighth International Conference on Digital Image
Processing (ICDIP 2016), vol. 10033, pp. 100-105, 2016.
25. L. Ding, H. Li, C. Hu, W. Zhang, and S. Wang, “Alexnet feature extraction and multi-kernel learning for object-oriented classification,”
International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences - ISPRS Archives, vol. 42, no. 3, pp.
277–281, 2018.
26. Franky, “Using Keras’ Pre-trained Models for Feature Extraction in Image Clustering.” [Online]. Available:
https://medium.com/@franky07724_57962/using-keras-pre-trained-models-for-feature-extraction-in-image-clustering-a142c6cdf5b1.
[Accessed: 23-Oct-2019].
27. K. Simonyan and A. Zisserman, “Very Deep Convolutional Networks for Large-Scale Image Recognition,” 3rd International Conference
on Learning Representations ICLR 2015, pp. 1–14, 2014.
28. Y. Guo, Y. Liu, T. Georgiou, and M. S. Lew, “A review of semantic segmentation using deep neural networks,” International Journal of
Multimedia Information Retrieval., vol. 7, no. 2, pp. 87–93, 2018.
29. H. Roth et al., "An application of cascaded 3D fully convolutional networks for medical image segmentation", Computerized Medical
Imaging and Graphics, vol. 66, pp. 90-99, 2018.
30. Y. Zhou et al., “Semi-supervised 3D abdominal multiorgan segmentation via deep multi-planar co-training,” Proceedings - 2019 IEEE
Winter Conference on Applications of Computer Vision, WACV 2019, pp. 121–140, 2019.
31. Y. Zhang and F. Kahl, “DeepSeg : Abdominal Organ Segmentation Using Deep Convolutional Neural Networks.” In Proceedings Larsson
2016, pp 1-5, 2016.
32. P. Hu, F. Wu, J. Peng, Y. Bao, F. Chen and D. Kong, "Automatic abdominal multiorgan segmentation using deep convolutional neu ral
network and time-implicit level sets", International Journal of Computer Assisted Radiology and Surgery, vol. 12, no. 3, pp. 399-411,
2016.

Authors: S.Jayanthi, K.Firdose Kowser Ahamadia, M.Rathaiah

Paper Title: Multi-Loop PID Controller Design for MIMO Processes Based On SIMC Fractional Order Filter
Abstract: This paper presents a multiloop control for the different dimensional multivariable processes which
are having the strong interrelation amid its variables. The objective of this discussion is to enhance the overall
performance of the system by reducing the effects of interrelation of process variables. The prerequisite for design
of multi loop control is to determine the best pair of controlled variables. In this paper the pair of variables is
identified by using the relative gains of the process variables. Based on these, the pair of possible control loops is
identified and their FOPDT models are approximated. Then to improve the servo operation (for set point changes in
input) the PID controller parameters are calculated for these models using Simplified IMC tuning formulas. To
798. minimize the effects of interrelations fractional order filter is used. With this combination, the overall objective of
the control system is fulfilled i.e., tracking the set point and lessening the interaction. To show the effectiveness, the 4595-
two examples are considered with different dimension, interaction and controller is designed. The results show that 4600
the SIMC algorithm improved the performance of the system.

Keyword : Interrelations of variables, time delay, servo operation, Simplified IMC, fractional order filter, multi
loop control.
References:
1. Luan, Xiaoli, Qiang Chen, and Fei Liu. "Centralized PI control for high dimensional multivariable systems based on equivalent transfer
function." ISA transactions 53.5 (2014): 1554-1561.
2. Xiong, Qiang, Wen-Jian Cai, and Mao-Jun He. "Equivalent transfer function method for PI/PID controller design of MIMO
processes." Journal of Process Control 17.8 (2007): 665-673.
3. Bristol, Edgar. "On a new measure of interaction for multivariable process control." IEEE transactions on automatic control 11.1 (1966):
133-134.
4. He, Mao-Jun, et al. "RNGA based control system configuration for multivariable processes." Journal of Process Control 19.6 (2009):
1036-1042.
5. Morari, Manfred, and Evanghelos Zafiriou. Robust process control. Morari, 1989.
6. Naik, R. Hanuma, DV Ashok Kumar, and K. S. R. Anjaneyulu. "Control configuration selection and controller design for multivar iable
processes using normalized gain." World Acad Sci Eng Technol Int J Electr Comput Electron Commun Eng8.10 (2014).
7. Naik, R. Hanuma, DV Ashok Kumar, and K. S. R. Anjaneyulu. "Loop Interaction and It’s Influence in Multivariable Process
Control." Emerging Trends in Electrical, Communications and Information Technologies. Springer, Singapore, 2017. 361-368.
8. Chekari, Tassadit, Rachid Mansouri, and Maamar Bettayeb. "IMC-PID fractional order filter multi-loop controller design for multivariable
systems based on two degrees of freedom control scheme." International Journal of Control, Automation and Systems 16.2 (2018): 689-
701.
9. Skogestad, Sigurd. "Simple analytic rules for model reduction and PID controller tuning." Journal of process control 13.4 (2003): 291-309.
10. Luyben, William L. "Simple method for tuning SISO controllers in multivariable systems." Industrial & Engineering Chemistry Process
Design and Development 25.3 (1986): 654-660.

Authors: Manasa M J, S Usha , Rajesh K S


A Provably Secure Distant Data Integrity Checking With Homomorphic Hash Function in Secure
Paper Title:
Cloud Storage
Abstract: The cloud storage with user facilities like great data storage quality, higher computing, scalable and
flexible has been one of the major application of cloud computing. Large number of data holders is subcontracting
the files to the cloud. The cloud server being a public domain is not very reliable thus the data holders are required
to find a reliable and trustworthy way to check the ownership of the data files that they subcontract on the cloud
server which is present in a remote location. To tackle this drawback number of Distant Data Integrity Checking
(DDIC) protocols is in the literature but these protocols have liabilities with respect to the data dynamics and the
efficiency. This work recommends a novel DDIC protocol built across homomorphic-hash-function. This system
gives a resistance against number of attacks like replay, replaces and falsifications. This work introduces the
Operation-record-table(ORT) which is an optimized table resulting in keeping the constant cost for supporting the
data variations and keep tracks of blocking the file operations.

Keyword : Cloud computing, DDIC: Distant Data Integrity Checking, Operation-record-table, Data
Dynamics, Homomorphic-hash-functions
References:
1. Hao Yan, Jiguo Li, Jinguang Han, Member, IEEE and Yichen Zhang, “A Novel Efficient Remote Data Possession Checking Protocol
in Cloud Storage”, IEEE 2017.
2. Ari Juels and Michael Szydlo, “Attribute-Based Encryption: Using Identity-Based Encryption for Access Control”, RSA
Laboratories Bedford, MA 01730, 17 June 2004.
3. Meenal Jain and Manoj Singh, “Identity Based and Attribute Based Cryptography: A Survey”, International Journal of Engineerin g,
Management & Sciences (IJEMS) ISSN-2348 – 3733, Volume-2, Issue-5, May 2015.
4. R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg and I. Brandic, “Cloud Computing and Emerging IT Platforms: Vision, Hype, and
Reality for Delivering Computing as the 5th Utility,” Future Generation Computer Systems, Vol. 25, No. 6, 2009, pp. 599-616
5. John Oredo, James Njihia, XN Iraki. The Role of Organizing Vision in Cloud Computing Adoption by Organizations in
Kenya. American Journal of Information Systems. 2017; 5(1):38-50. doi: 10.12691/ajis-5-1-6.
799. 6. Encryption with Immediate Attribute Revocation for FineGrained Access Control in Cloud Storage”, School of Computer Science
and Engineering, University of Electronic Science and Technology of China, No.2006, Xiyuan, IEEE, 2013.
7. Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini and Gene Tsudik, “Scalable and Efficient Provable Data Possession”, 2008. 4601-
8. inguang Han, Willy Susilo, Yi Mu and Jun Yan, “PrivacyPreserving Decentralized Key-Policy Attribute-Based Encryption”, IEEE 4605
Transactions on Parallel and Distributed systems, VOL. 23, NO. 11, NOVEMBER 2012
9. Ning Cao, Cong Wang, Ming Li, Member, KuiRen and Wenjing Lou, Privacy-Preserving Multi-Keyword Ranked Search over
Encrypted Cloud Data, IEEE Transactions on Parallel and Distributed Systems, VOL. 25, NO. 1, JANUARY 2014.
10. R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic,“Cloud computing and emerging IT platforms: Vision, hype, and
reality for delivering computing as the 5th utility,” Future Gener. Comp. Sy., vol. 25, no. 6, pp. 599 – 616, 2016.
11. H. Qian, J. Li, Y. Zhang and J. Han, “Privacy preserving personal health record using multi-authority attribute-based encryption with
revocation,” Int. J. Inf. Secur., vol. 14, no. 6, pp. 487-497, 2015.
12. H. Qian, J. Li, Y. Zhang and J. Han, “Privacy preserving personal health record using multi-authority attribute-based encryption with
revocation,” Int. J. Inf. Secure., vol. 14, no. 6, pp. 487-497, 2015. J. Li, X. Lin, Y. Zhang and J. Han, “KSF-OABE: outsourced
attribute-based encryption with keyword search function for cloud storage,” IEEE Trans. Service Comput., DOI: 10.1109/TSC.2016.
2542813.
13. J. Li, Y. Shi and Y. Zhang, “Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage,” Int. J.
Commun. Syst., DOI: 10.1002/dac.2942.
14. J.G. Han, W. Susilo, Y. Mu and J. Yan, “Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption,” IEEE
Transactions on Parallel and Distributed Systems, vol. 23, no.11, pp. 2150-2162, 2012
15. R. Mukundan, S. Madria and M. Linderman, ‘‘Efficient integrity verification of replicated data in cloud using homomorphic
encryption,’’ Distrib. Parallel Dat., vol. 32, no. 4, pp. 507-534, 2014.
16. C. Erway, A. Küpçü, C. Papamanthou, and R. Tamassia, “Dynamic Provable Data Possession,’’ in Proc. 16th AC M Conf. on
Comput. And Commun. Security (CCS), 2009, pp. 213-222.
17. R. Curtmola, O. Khan, R. Burns, and G. Ateniese, ‘‘MR-PDP: Multiple-replica provable data possession,’’ in Proc. 28th IEEE Conf.
on Distrib. Comput. Syst. (ICDCS), 2008, pp. 411-420.
18. J.G. Han, W. Susilo, Y. Mu and J. Yan, “Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption,” IEEE
Transactions on Parallel and Distributed Systems, vol. 23, no.11, pp. 2150-2162, 2012
19. Z. J. Fu, X. M. Sun, Q. Liu, L. Zhou, and J. G. Shu, “Achieving efficient cloud search services: multi-keyword ranked search over
encrypted cloud data supporting parallel computing,” IEICE Transactions on Communications, vol. E98-B, no. 1, pp.190-200, 2015.
20. K. D. Bowers, A. Juels, and A. Oprea, “Hail: A high-availability and integrity layer for cloud storage,” in Proc. 16th ACM Conf. on
Comput. andCommun. Security (CCS), 2009, pp. 187–198.
21. E. Zhou and Z. Li, ‘‘An improved remote data possession checking protocol in cloud storage,’’ in Proc. 14th Int'l Conf. on Al gs.
andArchs. for Parall Proc. (ICA3PP), 2014, pp. 611-617
22. T.J. Ren, J. Shen,J. G. Wang, “Mutual verifiable provable data auditing in public cloud storage”.
23. K. Kiran Kumar, K. Padmaja, P. Radha Krishna, “Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud
Computing”, International Journal of Computer science and Technology, vol. 3 pp, ISSN. 0976-8491(Online), pp. 936-940, ISSN:
2229- 4333 (Print), March 2012
24. Dhiyanesh “A Novel Third Party Auditability and Dynamic Based Security in Cloud Computing”, International Journal of Advanced
Research in Technology, vol. 1,no. 1, pp. 29-33, ISSN: 6602 3127, 2011
25. XU Chun-xiang, HE Xiao-hu, Daniel Abraha, “Cryptanalysis of Auditing protocol proposed by Wang et al. for data storage security
in cloud computing”, http://eprint.iacr.org/2012/115.pdf.
Samandarov Bunyod G’ayratovich, Matqurbanov To’lqin Alimboevich, Yangiboeva Madina
Authors:
Rustamovna
Paper Title: Developing methods of allocation resource in the servers of IMS subsystem.
Abstract: Nowadays, users of the internet are becoming increasingly popular, because of this rising load
packets of network and delay requests. In this paper, we offer a method to improve allocation resource in the IMS
servers. Implementation of technology for balancing of loading in practice allows to optimize the decision of
distribution tasks of signal and information flows on telecommunication networks. In case of uniform loading of
the IMS servers and routers of a backbone network (devices of the network), the average time of a time delay of
signal and information packets is minimum. Uniformity of loading of network devices is reached due to the
uniform distribution of a flow of packets. The criterion of efficiency of methods of distribution of flows is the
average square deviation (a balanced index) of congestion of network devices. AnyLogic 7 agent system toolbox is
used to simulate the proposed system.

Keyword : CSCF(The Call Session Control Functions), IMS (Ip Multimedia subsystem), IPTV, MPLS,
PSTN, SIP.
800. References:
1. G Mesud Hadžialić, Mirko Škrbić, Nerma Šečić, Mirza Varatanović, Elvedina Zulić, Nedim Bijedić University of Sarajevo, Problem
of IMS modeling – Solving Approaches, CTRQ 2012
4606-
2. Malindi Mashologu, Performance optimization of IP Multimedia Subsystem, Dissertation.com, Boca Raton, Florida 2010 4609
3. V.S. Abhayawardhana, R. Babbage, A Traffic Model for the IP Multimedia Subsystem (IMS), 2007 IEEE
4. International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.4, July 2013
5. C. Chi Bell Laboratories, Alcatel-Lucent chic, Hao Bell Laboratories, Alcatel-Lucent D.Wang Bell Laboratories, Alcatel-Lucent Z.
Cao Institute of Information Science Beijing Jiaotong University,
6. Modelling IMS Presence Server: Traffic Analysis &Performance, 2008 IEEE
7. Muhammad T. Alam, Graduate Student Member IEEE, Zheng Da Wu, Member IEEE Admission Control Approaches in the IMS,
Presence Service, international journal of computer science volume 1 number 1 2006
8. Improving traffic performance on IMS network, BA Alassane, OUYA Samuel, FARSI Sidi Mohamed, May 2013
9. Giuseppe Carella et al, Cloudified IP Multimedia Subsystem (IMS) for Network Function Virtualization (NFV)-based
Architectures/4th Workshop on Mobile Cloud Networking, June 19th, 2014, Lisbon, Portugal.
10. The Building of Multimedia Communications Network based on Session Initiation Protocol, Han Yuexiao , Zhang Yanfu, 2012
International Conference on Solid State Devices and Materials Science
11. A Survey on Femtocells: Benefits Deployment Models and Proposed Solutions, S.A. Mahmud1, G.M. Khan1, H. Zafar, K.
Ahmad and N Behttani, Journal of Applied Research and Technology, Volume 11, Issue 5, October 2013, Pages 733 -754
12. Amirsaidov U. - Models and methods for calculating the network characteristics taking into account the fractal nature of traffic. "The
Society of Digital Policy & Management”, 2014, Korea, p.301-307.
13. Usmanova N. - Agent-based modeling of distributed environment: assigning properties to agent. Eighth World Conference on
Intelligent Systems for Industrial Automation, Proceedings. WCIS 2014, 25-27 November 2014, Tashkent. (70с.)

Authors: Toto Rusmanto, Melinda Lisal


The Influence of Good Corporate Governance, Financial and Environmental Performance towards
Paper Title:
Firm Value: Case of Manufacturing Companies in Indonesia
Abstract: This study aims to observe and analyze the influence of proportion of independent board
commissioners, the audit committee, board of directors, return on asset, return on equity and environmental
performance towards firm value. Firm value was proxied with Tobin’s Q. The population in this study is
manufacturing companies listed in Indonesia Stock Exchange year 2013 – 2017. The study used 18 sample
companies from 160 companies. The sample was determined by using purposive sampling. The result of this study
showed that proportion of independent board commissioners, audit committee and Return On Assets has a
significant effect on firm value while the board of directors, Return On Equity and PROPER has no significant
effect on firm value.

801. Keyword : Commissioners Board, Audit Committee, Board of Directors, Return on Asset, Return on Equity
References: 4610-
14. R. D. Retno and D. Priantinah, “The effect of Good Corporate Governance dan Corporate Social Responsibility Disclosure on Company 4613
Value” Jurnal Nominal, vol. 1, no. 1, pp. 84-103, 2014.
15. W. Ardimas and Wardoyo, “The effect of Financial Performance and CSR on Company Value on Banking Industry,” Jurnal Manajemen
dan Bisnis, vol. 18, no. 1, pp. 57-66, 2014.
16. M. Monika, “The Impact of Financial Performance on Company Value in Manufacturing Industry,,” Jurnal Manajemen dan Bisnis, vol.
12, no. 1, pp. 1-16, 2014.
17. Almilia and L. Spica, “Factors Affecting CSR Disclosure, and the Impact of Company Size” Fokus Ekonomi, vol. 10, no. 1, pp. 50-68,
2011.
18. Imam Ghozali, Multivariate Analysis Using SPSS 23. Semarang: Badan Penerbit Universitas Diponegoro, 2016.
19. P. S. Anjarsari and H. N. Andriati, “The Effect of Good Corporate Governance and Environmentsl Performance on Comapny Value”
Jurnal Akuntansi dan Keuangan Daerah, vol. 11, no. 2, pp. 52-59, 2016.
20. F. Fiadicha and R. Hanny, “ The Impact of Good Corporate Governance, Corporate Social Responsibility and Financila Performance on
Company Value,” Jurnal Akuntansi Manajerial, vol. 1, no. 1, pp. 22-45, 2016.
21. W. Sucuahi and J. M. Cambarihan, “Influence of Profitability to the Firm Value of Diversified Companies in the Philippines,” Accounting
and Finance Research, vol. 5, no. 2, pp. 149-153, 2016.
22. I. P. M. J. S. Putra and N. M. R. Juniariani, “An Analyisi on Financial Performance Ratio Towards Company,” Jurnal Riset Akuntansi, vol.
7, no. 2, pp. 143-150, 2017.

Authors: Gvozdev Evgeny Vladimirovich, Cherkina Vera Mikhailovna


The Modern Strategy to the Process of Managing Complex Security of the Enterprise on the Basis of
Paper Title:
Rational Centralization
Abstract: In the article the strategy that justifies the need for rational centralization of integrated techno
sphere security management at the enterprise is developed, which allows to formulate a management process
strategy, to develop measures to ensure the quality of the personnel security system, production process and
material values, and to focus efforts on minimizing (eliminating) risks.

Keyword : techno sphere, integrated security, centralization.


References:
1. Vorobyov Yu. L. Report on the topic: “Integrated human security: yesterday, today, tomorrow. Council of the Federation of the Russian
Federation 2016
2. Federal Law No. 123-FL "Technical Regulations on Fire Safety Requirements" dated July 22, 2008.
3. Federal standard 12.1.004-91 (interstate standard). Occupational safety standards system (OSSS). Fire safety. General requirements from
01.07.1992
4. Gvozdev EV Modeling a system for assessing and planning fire safety measures for geographically distributed large organizatio ns / E. V.
Gvozdev. - Moscow: Academy of Civil Protection. Ministry of Emergency Situations of Russia, 2016. - 200 p.
5. Putin VV Instructions for the Government and the General Prosecutor of the Russian Federation from 08/15/2017.
6. Brushlinsky NN, Sokolov SV, Grigoryeva M.P. Assesment of the main fire risks in the countries of the world and in Russia // Fire and
Explosion Safety / Fire and Explosion Safety / - 2017. Т - 26, No. 2. - P. 72-80. DOI 10.18322.PVB.2017.26.02.72-80
7. Sokolov S.V., Kostyuchenko D.V. Fire risk management during fires in residential buildings of urban settlements // Fire and Explosion
Safety / - 2017. Т - 26, No. 1. - P. 61-74. DOI 10.18322.PVB.2017.26.01.61-74
802. 8. Austin Anderson Ofodike A. Ezekoye Exploration of NFIRS protection populations using geocoded fire incidents / Fire Safety Jo urnal 95.
2018. 122-134 4614-
9. Novikov D.A. The mechanisms of functioning of multi-level organizational systems. M .: Foundation "Problems of Management", 1999. -
4620
161 p.
10. Security of Russia, multivolume edition. Legal, socio-economic and scientific-technical aspects. The thematic block, technogenic,
technological and technosphere safety. Guidelines. - M.MGOF “Knowledge”, 2018. – 1015p.
11. Barkalov S.A., Burkova I.V., Kolpachev V.N., Potapenko A.M. Models and methods of resource allocation in project management -
M.2004 (Scientific publication / Institute of Management Problems named after VA Trapeznikov RAS).
12. Efremov S.V., Kovshov SV., Zinchenko A.V., Tsaplin V.V. Noxology. Textbook. Ed. S.V. Efremova. / SPb .: Publishing house of t he
Polytechnic. University, 2012 .—250p.
13. Gvozdev EV Assessment of the reliability of the system of integrated techno sphere security of the enterprise based on the probabilities of
the destructive impact and its overcoming by the security subsystem // XXI century. Technosphere safety. - 2018 , No. 4 (12). - S. 51–66.
DOI: 10.21285 / 1814-3520-2018-4-51-66.
14. Gvozdev EV, Butuzov S.Yu., Sulima T.G., Arifjanov S.B. A formalized model for assessing the reliability of thermal power plants // Fire
and Explosion Safety / Fire and Explosion Safety / - 2019., No. 2. - S. 47-56. DOI 10.18322.PVB.2019.28 / 02 / 47-56.
15. Gvozdev E.V. Development of a method for detecting and aggregating hazard indicators affecting enterprise protection facilities and the
environment // XXI Century. Technosphere safety. - 2018.- V. 3, No. 3 (11). - S. 69–81. DOI: 10.21285 / 1814-3520-2018-3-69-81.
16. Decree of the Government of the Russian Federation of October 29, 2010 No. 870 “On approval of the technical regulation on th e safety of
gas distribution networks and gas consumption”.
17. Order of the Federal Service for Ecological, Technological and Nuclear Supervision of November 15, 2013 N 542 "On approval of federal
norms and rules in the field of industrial safety" Safety rules for gas distribution networks and gas consumption "
18. Lozovetsky V.V., Konstantinov V.F., Cherkina V.M. Environmental protection against leakage of the working fluid during rupture of the
high-pressure hoses of the hydraulic drive of vehicle manipulators // Forestry Bulletin, 2018 V. 22 No. 5 P. 62–68. DOI: 10.18698 / 2542-
1468-2018-5-62-68
19. Collection of articles on physics and chemistry of combustion and explosion / I.M. Abduragimov. - M.: Publishing House of MSTU. N.E.
Bauman, 2012 - 159, [1] p. : ill.

Authors: E. Praveena, J. Viswanatha Rao, R. Srinivasa Rao


Dynamic Modelling and Analysis of Dc Micro Grid is Connected to Submarine Power System to
Paper Title:
Improvement of Stability using Droop Control
Abstract: Electricity usage is increasing day by day but we are unable to supply it. It needs to increase the use
of renewable energy sources. Micro Grid is an alternative system to meet the rapid load changes in future with the
hybrid energy system (HES). In this paper, the micro grid is constructed with combines battery and super capacitor
to store the electrical energy, and the power management is done using the drop control strategy. The system is
designed so that the micro grid can withstand different load challenges like step and pulse. The severity of the loss
due to the sudden changes in submarine (SM) power system (SPS), voltage differences occur, it has to escape use
803. the DC micro grid in this process analyzing the power controlling of DC micro grid, the battery, the super capacitor
connected to the SPS power grid using Mat Lab/simulink.
4621-
4627
Keyword : Micro Grid is an alternative system to meet the rapid load changes in future
References:
1. M. Cupelli et al., “Power flow control and network stability in an all electric ship,” IEEE, vol. 103, no. 12, pp. 2355–2380,2015,
DEC.
2. T. Ericsen, ‘‘‘The second electronic revolution’ (it’s all about control),’’ in Rec. Conf. Papers Ind. Appl. Soc. 56th Annu. Petroleum
Chem. Ind. Conf., Sep. 14–16, 2009, 5297144 DOI: 10.1109/PCICON.2009.
3. T. V. Vu, D. Gonsoulin, F. Diaz, C. S. Edrington, and T. El-Mezyani, “Predictive control for energy management in ship power
systems under high-power ramp rate loads,” IEEE Trans. Energy Convers., vol. 32, no. 2, Jun. 2017. pp. 788–797.
4. S. M. Holder, L. Hang, and B. K. Johnson, “Investigation of transmission line protection performance in an electric grid with
electronically coupled generation,” in Proc. North Amer. Power Symp., Manhatan, KS, USA, Sep., 2013, pp. 1–6.
5. C. Kumar and M. Mishra, “Energy conservation and power quality improvement with voltage controlled DSTATCOM,” in Proc.
Annu. IEEE India Conf., pp. 1–6 Dec. 2013.
6. J. F. Hansen and F. Wendt, “History and state of the art in commercial electric ship propulsion, integrated power systems, an d future
trends,” Proc. IEEE, vol. 103, no. 12, Dec. 2015pp. 2229–2242.
7. C. Kumar and M. Mishra, “Energy conservation and power quality improvement with voltage controlled DSTATCOM,” in Proc.
Annu. IEEE India Conf., pp. 1–6. Dec. 2013.
8. C. Kumar and M. Mishra, “A voltage-controlled DSTATCOM for power quality improvement,” IEEE Trans. Power Del., vol. 29,
no. 3, pp. 1499– 1507, Jun. 2014.
9. R. Zamora and A. K. Srivastava, “Controls for microgrids with storage: Review, challenges, and research needs,” Renew. Sustain.
Energy Rev., vol. 14, no. 7, pp. 2009 2018, Sep. 2010.
10. H. Xiao, A. Luo, Z. Shuai, G. Jin, and Y. Huang, “An improved control method for multiple bidirectional power converters in h ybrid
AC/DC microgrid,” IEEE Trans. Smart Grid, vol. 7, no. 1, pp. 340–347, Jan. 2016.
11. C. R. Lashway, A. T. Elsayed, and O. A. Mohammed, “Hybrid energy storage management in ship power systems with multiple
pulsed loads,” Elect. Power Syst. Res., pp. 50–62, 2016. vol. 141.
12. S. Chaudhary, R. Teodorescu, P. Rodriguez, P. C. Kjaer, and A. M. Gole, “Negative sequence current control in wind power plants
withVSC-HVDC connection,” IEEE Trans. Sustain. Energy, vol. 3, no. 3, pp. 535–544, Jul. 2012.
13. P. Ch. Loh, D. Li, Y. K. Chai, and F. Blaabjerg, “Autonomous control of interlinking converter with energy storage in hybrid AC–
DC microgrid,” IEEE Trans. Ind. Appl., vol. 49, no. 3, pp. 1374–1383, May. 2013.
14. G. Tang, Z. Xu, and Y. Zhou, “Impacts of three MMC-HVDC configurations on ac system stability under dc line faults,” IEEE
Trans. Power Syst., vol. 29, no. 6, pp. 3030–3040, Nov. 2014.
15. J. He, Y. Li, J. Guerrero, F. Blaabjerg, and J. Vasquez, “An islanding microgrid power sharing approach using enhance d virtual
impedance control scheme,” IEEE Trans. Power Electron., vol. 28, no. 11, pp. 5272–5282, Nov. 2013

Authors: Arab Mohammed Shamiulla

Paper Title: Role of Artificial Intelligence in Cyber Security


Abstract: Artificial Intelligence (AI) is a buzz word in the cyber world. It is still a developing science in
multiple facets according to the challenges thrown by 21st century. Use of AI has become inseparable from human
life. In this day and age one cannot imagine a world without AI as it has much significant impact on human life.
The main objective of AI is to develop the technology based activities which represents the human knowledge in
order to solve problems. Simply AI is study of how an individual think, work, learn and decide in any scenario of
life, whether it may be related to problem solving or learning new things or thinking rationally or to arrive at a
solution etc. AI is in every area of human life, naming a few it is into gaming, language processing, speech
recognition, expert system, vision system, hand writing recognition, intelligence robots, financial transactions and
what not, every activity of human life has become a subset of AI. In spite of numerous uses, AI can also used for
destroying the human life, that is the reason human inference is required to monitor the AI activities. Cyber crimes
has become quite common and become a daily news item. It is not just a problem faced in one country, it is across
the world. Without strong security measures, AI is meaningless as it can be easily accessible by others. It has
become a big threat for governments, banks, multinational companies through online attacks by hackers. Lot of
individual and organizational data is exploited by hackers and it becomes a big threat to the cyber world. In this
connection research in the area of AI and cyber security has gained more importance in the recent times and it is
ever lasting also as it is a dynamic and sensitive issue linked to human life.
804.
Keyword : Artificial Intelligence, Cyber Security, Online attacks, Hackers, Human life 4628-
4630
References:
1. R. Hill, "Dealing with cyber security threats: International cooperation, ITU, and WCIT", 2015 7th International Conference o n Cyber
Conflict: Architectures in Cyberspace, pp. 119-134, 2015
2. S. Singh and S. Silakari, "A Survey of Cyber Attack Detection Systems", IJCSNS International Journal of Computer Science and Network
Security, vol. 9, no. 5, 2009
3. J. Nogueira, "Mobile Intelligent Agents to Fight Cyber Intrusions", The International Journal of FORENSIC COMPUTER SCIENCE, v ol.
1, pp. 28-32, 2006
4. S. Adebukola, Onashoga, Akinwale O. Bamidele and A. Taofik, "A Simulated Multiagent-Based Architecture for Intrusion Detection
System", (IJARAI) International Journal of Advanced Research in Artificial Intelligence, vol. 2, no. 4, 2013
5. S. Dilek, H. Çakır and M. Aydın,"APPLICATIONS OF ARTIFICIAL INTELLIGENCE TECHNIQUES TO COMBATING CYBER
CRIMES: A REVIEW", International Journal of Artificial Intelligence & Applications (IJAIA), vol. 6, no. 1, 2015
6. J.Raiyn, "A survey of Cyber Attack Detection Strategies", International Journal of Security and Its Applications, vol. 8, no. 1, pp. 247-256,
2014
7. Cerli and D. Ramamoorthy, "Intrusion Detection System by Combining Fuzzy Logic with Genetic Algorithm", Global Journal of Pure and
Applied Mathematics (GJPAM), vol. 11, no. 1, 2015
8. O. Oriola, A. Adeyemo and A. Robert, "Distributed Intrusion Detection System Using P2P Agent Mining Scheme", African Journal of
Computing & ICT, vol. 5, no. 2, 2012
9. S. Simmons, D. Edwards, N. Wilde, J. Just and M. Satyanarayana, "Preventing Unauthorized Islanding: Cyber-Threat Analysis", 2006
IEEE/SMC International Conference on System of Systems Engineering, pp. 5, 24-26
10. Ionita and L. Ionita, "An agent-based approach for building an intrusion detection system",RoEduNet International Conference 12th
Edition: Networking in Education and Research, pp. 1-6, 26-28, 2013

Authors: Prajwalasimha S N, Aishwarya V Kumar, Arpitha C R, Swathi S, Spoorthi B


Lossless Watermarking for Image Ratification: An Implementation based on 12th Root of Exponential
Paper Title:
Function
805. Abstract: In this article, an exponential transformation based digital image watermarking scheme has been
described. The method is employed with 12th root of exponential function for embedding watermark into the cover 4631-
image. Due to bulk data capacity of the image, many watermarking techniques uses more time for data insertion 4636
and separation processes. Algorithm is designed in such a way to embed a watermark of 1/16th size of host. The
retrieved watermark is examined under various security analysis. Many standard test images are subjected for
watermarking process under proposed scheme resulted with better scale and utilizes less computational time
compared to other techniques.

Keyword : Watermarking, Exponential, Computational time, Bulk data and Security analysis.
References:
1. Zigang Chen, Lixiang Li, Haipeng Peng, Yuhong Liu and Yixian Yang, “A Novel Digital Watermarking Based on General Non -Negative
Matrix Factorization,’’ IEEE Transactions on Multimedia, Vol.20, No.8, pp. 1973-1986, 2018
2. Mehran Andalibi and Damon M. Chandler, “Digital Image Watermarking via Adaptive Logo Texturization,’’ IEEE Transactions on Image
Processing, Vol.24, No.12, pp. 5060-5073, 2015
3. Prajwalasimha S N et. al., “Performance analysis of DCT and successive division based digital image watermarking scheme,” Indonesian
Journal of Electrical Engineering and Computer Science, Vol. 15, No. 2, pp. 750-757, 2019
4. Prajwalasimha S N and Basavaraj L, “Performance Analysis of Transformation and Bogdonov Chaotic Substitution based Imag e
Cryptosystem,” International Journal of Electrical and Computer Engineering, Vol. 10 , No. 1, 2020, pp. 188-194
5. Anupama Shetter et. al.,“Image de-noising algorithm based on filtering and histogram equalization,” Proceedings of the International
Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC 2018, pp. 325-338
6. Prajwalasimha S N and Basavaraj L, “Design and Implementation of Transformation and non-Chaotic Substitution based Image
Cryptosystem,” International Journal of Engineering and Advanced Technology, Vol. 8, Issue 6, pp.1079-1083, 2019
7. Prajwalasimha S.N., Sowmyashree A.N., Suraksha B., Shashikumar H.P. (2019) Logarithmic Transform based Digital Watermarking
Scheme. In: Pandian D., Fernando X., Baig Z., Shi F. (eds) Proceedings of the International Conference on ISMAC in Computational
Vision and Bio-Engineering 2018 (ISMAC-CVB). ISMAC 2018. Lecture Notes in Computational Vision and Biomechanics, vol 30.
Springer, Cham
8. Prajwalasimha S N and Pavithra A C, “Digital Image Watermarking based on Successive Division,” Proceedings of IEEE International
Conference on Communication and Electronics Systems, pp. 31-35, 2018
9. Prajwalasimha S N et al.,“ Digital Image Watermarking Based on Sine Transformation with Constant Co-Efficient,” Proceedings of the
International Conference on Inventive Research in Computing Applications, pp. 21-24, 2018
10. Prajwalasimha S.N., Sonashree S., Ashoka C.J., Ashwini P. (2019) Digital Image Watermarking Using Sine Transform Technique. I n:
Pandian D., Fernando X., Baig Z., Shi F. (eds) Proceedings of the International Conference on ISMAC in Computational Vision and Bio-
Engineering 2018 (ISMAC-CVB). ISMAC 2018. Lecture Notes in Computational Vision and Biomechanics, Vol 30. Springer, Cham
11. Prajwalasimha S N et. al, “Performance Analysis of Combined Discrete Fourier Transformation (DFT) and Successive Division based
Image Watermarking Scheme,” International Journal of Recent Technology and Engineering, Vol. 8, Issue 3, 2019, pp. 34 -39
12. Prajwalasimha S N et. al., “Digital Image Watermarking based on Sine Hyperbolic Transformation,” Proceedings of 3rd IEEE
International Conference on Electrical, Computer and Communication Technologies (ICECCT), pp. 1245-1250, 2019
13. Prajwalasimha S N et. al., “Design and Implementation of Image Watermarking Scheme based on Exponential Function,” International
Journal of Innovative Technology and Exploring Engineering, Vol. 8, Issue 12, 2019, pp.5789-5792
14. Prajwalasimha S.N. (2019) Pseudo-Hadamard Transformation-Based Image Encryption Scheme. In: Krishna A., Srikantaiah K., Naveena
C. (eds) Integrated Intelligent Computing, Communication and Security. Studies in Computational Intelligence, vol 771. Spring er,
Singapore
15. Prajwalasimha S N and Bhagyashree S R, “ Image Encryption using Discrete Radon Transformation and Non chaotic Substitution,” Proc.
of IEEE International Conference on Electrical, Computer and Communication Technologies, pp. 842-846, 2017
16. Prajwalasimha S N and Usha Surendra, “Multimedia Data Encryption based on Discrete Dyadic Transformation,” Proc. of IEEE
International conference on Signal processing and Communication, pp. 492-496, 2017
17. Prajwalasimha S N et. al., “Design and analysis of pseudo hadamard transformation and non-chaotic substitution based image encryption
scheme,” Indonesian Journal of Electrical Engineering and Computer Science, Vol. 15, No. 3, 2019, pp. 1297-1304
18. Prajwalasimha S N et. al., “On the Sanctuary of a Combined Confusion and Diffusion based scheme for Image Encryption,” International
Journal of Engineering and Advanced Technology, Vol. 9, Issue 1, pp.3258-3263, 2019
19. Azz El Arab El Hossaini and Mohamed El Aroussi, “A New Robust Blind Watermarking Scheme based on Steerable pyramid and DCT,”
Journal of Computers, Vol. 9, pp. 2315-2327, 2014.
20. Yong-Seok Lee, et al., “Digital blind watermarking based on depth variation prediction map and DWT for DIBR free-viewpoint image,”
Signal Processing: Image Communication, Vol. 70,pp. 104–113, 2019
21. Di Fan, et al., “A blind watermarking algorithm based on adaptive quantization in Contourlet domain,” Multimedia Tools and
Applications, pp. 1-15, 2019
22. Sunesh Malik, et al., “Histogram and entropy based digital image watermarking scheme,” Information Technology, Vol. 11, No. 2 2, pp.
373-379, 2019
23. Tanya Koohpayeh Araghi, et al., “A Secure Blind Discrete Wavelet Transform based Watermarking Scheme Using Two -level Singular
Value Decomposition,” ESWA, Elsevier, vol. 6, pp. 23733-23746, 2018
24. Zhuhong Shao et al.,“ Robust Watermarking using Orthogonal Fourier-Mellin Moments and Chaotic Map for Double Images,”
International journal of Signal Processing, Vol. 120, pp. 522-531, 2016
Yusri Yakub, Sadzali Hassan, Asmadi Ishak, Siti Hartini Azmi, Rozaireen Muszali, Yusop Ahmad &
Authors:
Zulakbal Abd Karim
The Influence of Infrastructure, Accountability and Teacher Competency towards Teaching Process
Paper Title:
Implementation in Physical Education and Health
Abstract: The purpose of this study is to look and review the implementation of Physical Education and
Health (PJK) teaching in secondary schools as well as factors that support teaching and learning. This PJK subject
in school covers aspects of infrastructure and equipment as well as teachers' accountability and competency
involved in the implementation of the teaching for this subject. The results showed that there was a significant
relationship between teacher competency, accountability and teaching experience, options and graduation. The
806. findings also show that there is a significant relationship between school facilities in the teaching and learning
process of PJK. In conclusion, the effectiveness of the teaching and learning process in Physical Education and 4637-
Health subjects depends on the competency, accountability of teachers and school infrastructure in planning well 4639
teaching sessions.

Keyword : competency, accountability, infrastructure, PJK, secondary school.


References:
1. Mohd Shariff, A.R., S. Javed, and A. Md Nadzalan, Relationship of PSYCO-sosial maturity and aggressive behavior among school children.
International Journal of Innovative Technology and Exploring Engineering, 2019. 8(12): p. 1075-1079.
2. Mohamad, N.I., et al., Comparison between student centered (classroom technology) versus lecturer centered (hands-on) learning
approach in physical conditioning short course. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 2019.
8(7): p. 1485-1486.
3. Sabri, C.H., T. Haslina, and T.A. Muhamad, The level of self-esteem among novice Physical Education teachers. Jurnal Sains Sukan dan
Pendidikan Jasmani, 2016. 5(1): p. 65-76.
4. Ahmad, M.F., et al., The implementation of 1 Student 1 Sport Policy among secondary school teachers in Kluang, Johor. Jurnal Sains Sukan
dan Pendidikan Jasmani, 2015. 5(2): p. 24-43.
5. Jani, J., et al., Penilaian pelaksanaan program Ijazah Sarjana Muda Pendidikan, Fakulti Sains Sukan dan Kejurulatihan. Jurnal Sains Sukan
dan Pendidikan Jasmani, 2016. 5(1): p. 77-94.
6. Ali, S.K.S., M.Z.C. Hassan, and J. Jani, Efikasi kendiri guru pendidikan jasmani terhadap pelaksanaan pengajaran mata pelajaran
pendidikan jasmani. JuKu: Jurnal Kurikulum & Pengajaran Asia Pasifik, 2017. 2(3): p. 43-51.
7. Jani, J., Pengenalan ilmu konten pedagogi dalam pendidikan jasmani dan sains sukan. 2005: Universiti Pendidikan Sultan Idris.
8. Johnson, D.R., A quantitative study of teacher perceptions of professional learning communities' context, process, and content. 2011.
9. Wandberg, R. and J. Rohwer, Teaching to the standards of effective practice: A guide to becoming a successful teacher. 2002: Allyn &
Bacon.

Authors: J. Janapriya, M. Rathaiah, K. Firdose Kowser Ahamadia


Analytical Tuning Rules of I-P Controller For Over Damped Processes with Large Zero Terms In Its
Paper Title:
Transfer Function Model
Abstract: In this paper, the structure of the P-I controller has been revised to I-P controller structure, for the
model of First-order plus time delay and model of Half-order plus time delay. P-I controller is the dominant
controller used for most of the Industrial processes. However, high peak overshoot and sensitivity to controller
gains are some of the disadvantages faced by P-I controller . The objective of this study is to overcome these
disadvantages, I-P controller has been implemented. Simulation results obtained using MATLAB/simulink shows
that the I-P controller tuning approach provides enhanced performance and reduction in the peak overshoot when
compared with P-I controller tuning.

807. Keyword : P-I controller, I-P controller, FOPTD model, HOPTD model, peak overshoot, Jietae Lee et al tuning
formulas. 4640-
References: 4644
1. Seborg, D. E.; Mellichamp, D. A.; Edgar, T. F.; Doyle, F. J., III. Process Dynamics and Control, 3rd ed.; Wiley: Hoboken, NJ, 2011.
2. Marlin, T. E. Process Control: Designing Processes and Control Systems for Dynamic Performance, 2nd ed.; McGraw-Hill: New York,
1995.
3. Ziegler, J. G.; Nichols, N. B. Optimum Settings for Automatic Controllers. Trans. ASME 1942, 64,759−768.
4. Cohen, G. H.; Coon, G. A. Theoretical Considerations of Retarded Control. Trans. ASME 1953, 75,827−834.
5. Lee, J.; Lee, Y.; Yang, D. R.; Edgar, T. F. Half Order Plus Time Delay (HOPTD) Models to Tune PI Controllers. AIChE J. 2017, 63,
601−609.
6. Lee, J.; Lee, Y.; Yang, D. R.; Edgar, T. F. Simple Proportional Integral Controller Tuining Rules for FOPTD and HOPTD Models Based on
Matching Two Asymptotes. ACS J. 2018, 57, 2905-2916.
7. Skogestad, S. Simple Analytic Rules for Model Reduction and PID Controller Tuning. J. Process Control 2003, 13,291−309.
8. F. Ahmed, A. Tobshy, A. Mahfouz, M. Ibrahim. "PI and IP controllers in a closed loop for DC motor drives."Power Conversion
Conference-Nagaoka 1997.,Proceedings of the. Vol. 2. IEEE, 1997.

Authors: Raji.C, Mohan Kumar Velumani, S. N. Prasad

Paper Title: Managing Inrush Current using Hot Swap and OR-ing FET
Abstract: Critical, high availability systems will always rely on redundant power for continuous operation
when the default power fails or becomes unavailable. When the back-up system kicks in, there will be a huge
inrush current depending on load. The consequences of inrush current can be reduction of output voltage, tripping
of protective devices, damage to sensitive devices either on at the load or on the back-up system itself and
eventually system failure. This dissertation studies the effects of inrush current on an already existing Redundant
Power Distribution System (RPDS). A review of existing technique to control inrush current is presented. A new
solution has been implemented on the Redundant Power Distribution System such that the functionality of overall
system is preserved. Finally, performance of existing solution on RPDS and new solution are compared.
808.
Keyword : inrush current, RPDS 4645-
4649
References:
1. E. J. Lee, et al., “Comparative Analysis of Active Inrush Current Limiter for High-Voltage DC Power Supply System” Oct 2012, 2012
IEEE Vehicle Power and Propulsion Conference( VPPC ).
2. C. S. Mitter, “Active Inrush Current Limiting Using MOSFETs”, Motorola Inc. 1995
3. Vrej Barkhordian, “Power MOSFET Basics”, International Rectifier, 2003
4. Alek Kaknevicius and Adam Hoover, “Managing Inrush Current”, Texas Instruments, Aug 2014
5. OrCAD Capture 16.6, fast, intuitive PCB schematics design solution.
6. “How to stop Inrush Current”, Ametherm
7. LTC4371, Negative Voltage Ideal Diode OR-ing Controller
8. LTC4252, Negative Voltage Hot-Swap Controller .

Authors: Sang-Hong Lee, Seok-Woo Jang


809.
Paper Title: Motor Imagery Classification using Wavelet-Based Features and Tensorflow
Abstract: This paper proposes a methodology for making a decision on left and right motor imagery using
Tensorflow and wavelet-based feature extraction. Wavelet coefficients are extracted by the Haar wavelet
transforms from electroencephalogram (EEG) signals in the first step. In the second step, 60 wavelet-based features
are extracted by the frequency distribution and the amount of variability in frequency distribution. In the final step,
this paper classified left or right motion imagery using these 60 features as inputs to the Tensorflow. The proposed
methodology shows that the performance result is 82.14% with 60 features in accuracy rate.

Keyword : Motor Imagery, Tensorflow, Wavelet Transform, Keras.


References:
1. Qi Xu, Hui Zhou, Yongji Wang, and Jian Huang, “Fuzzy support vector machine for classification of EEG signals using wavelet-
based features,” Medical Engineering & Physics, Vol.31, pp.858-865, 2009.
2. Aya Khalaf, Ervin Sejdic, Murat Akcakaya, “Common spatial pattern and wavelet decomposition for motor imagery EEG- fTCD
brain-computer interface,” Journal of Neuroscience Methods, Vol.320, pp.98-106, 2019.
3. Zhongxing Zhou, Baikun Wan, “Wavelet packet-based independent component analysis for feature extraction from motor imagery
EEG of complex movements,” Clinical Neurophysiology, Vol.123, pp.1779-1788, 2012.
4. Kemal Polat, Salih Güneş, “Artificial immune recognition system with fuzzy resource allocation mechanism classifier, principa l
component analysis and FFT method based new hybrid automated identification system for classification of EEG signals,” Expert
Systems with Applications, Vol.34, pp.2039-2048, 2008.
5. Ahnaf Rashik Hassan, Mohammed Imamul Hassan Bhuiyan, “An automated method for sleep staging from EEG signals using
normal inverse Gaussian parameters and adaptive boosting,” Neurocomputing, Vol.219, pp.76-87, 2017. 4650-
6. Vyacheslav Murzin, Armin Fuchs, J. A. Scott Kelso, “Detection of correlated sources in EEG using combination of beamforming
and surface Laplacian methods,” Journal of Neuroscience Methods, Vol.218, pp.96-102, 2013.
4652
7. Fatih Ertam, “An effective gender recognition approach using voice data via deeper LSTM networks,” Applied Acoustics, Vol.156 ,
pp.351-358, 2019.
8. Aparna Akula, Anuj K. Shah, Ripul Ghosh, “Deep learning approach for human action recognition in infrared images,” Cognitive
Systems Research, Vol.50, pp.146-154, 2018.
9. S.  R. Sreeja, Debasis Samanta, “Classification of multiclass motor imagery EEG signal using sparsity approach,” Neurocomputing,
Vol.368, pp.133-145, 2019.
10. Yue Hu, Fucai Li, Hongguang Li, Chengliang Liu, “An enhanced empirical wavelet transform for noisy and non-stationary signal
processing,” Digital Signal Processing, Vol.60, pp.220-229, 2017.
11. Guan Chen, Qi-Yue Li, Dian-Qing Li, Zheng-Yu Wu, Yong Liu, “Main frequency band of blast vibration signal based on wavelet
packet transform,” Applied Mathematical Modelling, Vol.74, pp.569-585, 2019.
12. Anand Parey, Amandeep Singh, “Gearbox fault diagnosis using acoustic signals, continuous wavelet transform and adaptive neuro -
fuzzy inference system”, Applied Acoustics, Vol.147, pp.133-140, 2019.
13. Sang-Hong Lee, Joon S. Lim, Jae-Kwon Kim, Junggi Yang, Youngho Lee, “Classification of normal and epileptic seizure EEG
signals using wavelet transform, phase-space reconstruction, and Euclidean distance,” Computer Methods and Programs in
Biomedicine, Vol.116, pp.10-25, 2014.
14. G. Pfurtscheller, F. H. Lopes da Silva, “Event-related EEG/MEG synchronization and desynchronization: basic principles,” Clinical
Neurophysiology, Vol.110, pp.1842-1857, 1999.
15. G. Pfurtscheller, C. Brunner, A. Schlögl, F.H. Lopes da Silva, “Mu rhythm (de)synchronization and EEG single-trial classification of
different motor imagery tasks,” NeuroImage, Vol.31, pp.153-159, 2006.
16. G. Tzanetakis, G. Essl, P. Cook, “Audio analysis using the discrete wavelet transform, in: C.E.D’ Attellis, V.V. Kluev, N. Mastorakis
(Eds.),” Mathematics and Simlulation with Biological Economical and Musicoacoustical Applications, WSES Press, New York,
pp.318–323, 2001.

Authors: Ruby Mishra, Rojalin Behera

Paper Title: Design Improvement of Four Bar Linkages Using Different Soft-Computing Methods
Abstract: Modeling of optimized flexible four bar mechanism considering joint clearances are developed at
first. The dynamic analysis such as Moment, Torque, Energy and structural analysis such as Deformation, different
mode of Stress are done by considering load in coupler point of optimized flexible four bar linkage. The
deformation and stress are compared by considering different materials. Lagrange's equation is used to define the
direction of the joint clearance. Differential evolution algorithm is used to optimize the length of links which
reduce the gap between the desirable and actual path.

Keyword : Optimized linkage; dynamic and structural analysis; Lagrange’s equation; differential evolution
References:
1. S. Erkaya and I. Uzmay, Determining link parameters using genetic algorithm in mechanisms with joint clearance, Mechanism and
810. Machine Theory 44 (2009), 222-234.
2. S. D. Yu and W.L. Cleghorn, Dynamic instability analysis of high speed flexible four-bar mechanism, Mechanism and Machine Theory 37 4653-
(2002), 1261-1285. 4656
3. Mihai Dupac and David G. Beale, Dynamic analysis of a flexible linkage mechanism with cracks and clearance, Mechanism and Machine
Theory 45 (2010), 1909-1923.
4. Yue Qing Yu and Bin Jiang, Analytical and experimental study on the dynamic balancing of flexible Mechanisms, Mechanism and
Machine Theory 42 (2007), 626-635.
5. M. J. Tsai and T.H. Lai, Kinematic sensitivity analysis of linkage with joint clearance based on transmission quality, Mechanism and
Machine Theory 39 (2004) 1189-1206.
6. T. Furuhashi, N. Morita and M. Matsurra, Research on dynamics of four-bar linkage with clearances at turning pairs (1st report, General
theory of continuous contact model), Bulletin of the JSME 21 (1978), 518-523.
7. N. Morita, T. Furuhashi and M. Matsurra, Research on dynamics of four-bar linkage with clearances at turning pairs (2nd report, Analysis
of crank level mechanism with clearance at joint of crank and coupler using continuous contact model), Bulletin of the JSME 21 (1978),
1284-1291.
8. Hong-Sen Yan and Ren-chung Soong, Kinematic and dynamic design of four-bar linkages by links counter weighing with variable input
speed, Mechanism and Machine Theory 36 (2001), 1051-1071.
9. B. Feng, N. Morita and T. Torii, A new optimization method for dynamic design of planar linkage with clearances at joints - Optimizing
the mass distribution of links to reduce the change of joint forces, Transactions of the ASME (2002).
10. Ruby Mishra, T. K. Naskar and Sanjib Acharya, Synthesis of coupler curve of a four-bar linkage with joint clearances, International
Journal of Engineering Research and Application (IJERA), ISSN: 2248-9622 (2003), 1193-1199.
Ruby Mishra, T. K. Naskar and Sanjib Acharya, Path synthesis of four-bar linkages with joint clearances using DE algorithm, Proceedings
of the National Conference on Trends and Advances in Mechanical Engineering (2012).

Authors: Ashutosh Kumar Singh, Kamal Bhati

Paper Title: Nano Power Current Reference Circuit consisting of Sub-threshold CMOS Circuits
Abstract: a low voltage CMOS Nano power current reference circuit has been presented in this paper and also
the circuit simulation performance in 180-nm UMC CMOS technology. Most of the MOSFETs operate in sub-
threshold region consisting of bias-voltage, start-up and current-source sub-circuits. A stable reference current of 4-
nA lying in supply voltage range of 1 V-1.8 V has been generated with line sensitivity of 0.203% /V. Within the
temperature range of 0°C to 100 °C, and the voltage level of 1.8 V, the temperature coefficient was 7592ppm/°C.
At the same voltage supply, the power dissipation was found out to be 380 NW. It is suitable to use this circuit in
sub threshold power aware large scale integration.

Keyword : Low power, low voltage, sub threshold, temperature coefficient.


References:
811. 1. E. M. Camacho-Galeano, C. Galup-Montoro, and M. C. Schneider, “A 2-nW 1.1 -V Self-Biased Current Reference in CMOS
Technology,” IEEE Trans. Circuits Syst. II Express Briefs, 2005. 4657-
2. F. Fiori and P. S. Crovetti, “A New Compact Temperature-Compensated CMOS Current Reference,” IEEE Trans. Circuits Syst. II Express
Briefs, 2005.
4660
3. P. Fiorini, I. Doms, C. Van Hoof, and R. Vullers, “Micropower energy scavenging,” in ESSCIRC 2008 - Proceedings of the 34th European
Solid-State Circuits Conference, 2008.
4. H. J. Oguey and B. Gerber, “MOS Voltage Reference Based on Polysilicon Gate Work Function Difference,” IEEE J. Solid-State Circuits,
1980.
5. B. Nayak, B. Misra, and A. Mohapatra, “A proposed reference current signal generation technique for shunt active power filter,” J. Eng.
Sci. Technol., 2018.
6. K. Ueno, T. Asai, and Y. Amemiya, “Current reference circuit for sub-threshold CMOS LSIs,” in Proc. Ext. Abstr. Int. Conf. SSDM, 2008,
pp. 1000–1001.
7. S. M. Sze, Physics of Semiconductor Devices, 2nd ed. Hoboken, NJ: Wiley, 1981.
8. B. Razavi, Design of Analog CMOS Integrated Circuits. New York McGraw Hill, 2001, pp. 463–465.
9. B.S. Song, P.R. Gray, “A precision curvature-compensated CMOS band gap Reference,” IEEE Journal of Solid State Circuits, vol. DC-18,
pp.634-643, December 1983.
10. K.N. Leung, P.K.T. Mok, “A sub-1 V 15 ppm/°C CMOS Band gap Voltage Reference without requiring Low Threshold Voltage
Device,”IEEE Journal of Solid State Circuits, vol. 37, pp. 526-530, April 2002.

Authors: P. Periyasamy, Gurusami, K, M. C. Anand Chakaravarthi, D.Muruganandam, J.Jayapriya

Paper Title: Flexural, Impact and Tensile Properties of Banana/ PLA Composite
Abstract: In this work, the common fiber picked as banana fiber. Unidirectional mats were created and
layered up, course of action with PLA gum network. The overlay is fabricated utilizing hand lay-up system. The
Mechanical properties, for example, rigidity, flexural quality and effect quality are broke down on the created
material. Too Miniaturized scale structure of the composite is examined utilizing checking electron magnifying lens
(SEM). Specimens were cut from the created cover as indicated by the ASTM models for various analyses. For
Tensile test and flexural test tests were cut fit as a fiddle and level bar shape separately. After that investigation is
performed under UTM. Impact, Flexural and Tensile quality were watched and contrasted with base estimations of
PLA polymer to see the adjustment in quality. SEM investigation was done to discover the method of
disappointment.

Keyword : Natural Fibers,PLA, Material Properties, Mechanical Properties.


References:
812. 1. Chandramohan, D., Bharanichandar, J, Carbon - Science and Technology,5(3), pp. 314-320,2013.
2. http://www.applied-science-innovations.com/cst-web-site/CST-5-3-2013/CST%20-%2080%20-%20FINAL.pdf 4661-
3. Chandramohan, D., Rajesh, S., International Journal of Applied Engineering Research, 9(20), 6979-6985,2014. 4664
4. Chandramohan, D et.al., American Journal of Applied Sciences, 11 (4),623-630,2014.
5. https://pdfs.semanticscholar.org/19e8/56abe7720e513b65612dad3c0edff976d4d2.pdf
6. Murali, B et.al., Carbon - Science and Technology,6(1), pp. 330-335,2014.
7. Pandyaraj, V et.al., International Journal of Mechanical Engineering and Technology,9, pp. 1034-1042,2018.
8. http://www.iaeme.com/MasterAdmin/UploadFolder/IJMET_09_12_103/IJMET_09_12_103.pdf
9. Murali, B et.al., Journal of Chemical and Pharmaceutical Research,6(9), pp. 419-423,2014.
10. http://www.jocpr.com/articles/chemical-treatment-on-hemppolymer-composites.pdf
11. Chandramohan, D., Murali, B., Academic Journal of Manufacturing Engineering, 12(3), 67-71,2014.
12. K Gurusami, et.al. (2019):, International Journal of Ambient Energy, DOI: 10.1080/01430750.2019.1614987.
13. Chandramohan, D., Rajesh, S,, Academic Journal of Manufacturing Engineering,12(3),72-77,2014.
14. https://www.researchgate.net/publication/286590092_Study_of_machining_parameters_on_natural_fiber_particle_reinforced_polymer_co
mposite_material
15. Chandramohan.D., and A.Senthilathiban., International Journal of Applied Chemistry, 10 (1),153-162,2014.
16. Chandramohan, D et al. Journal of Bio- and Tribo-Corrosion (2019) 5:66.
17. https://link.springer.com/article/10.1007/s40735-019-0259-z
18. Sathish, T., Chandramohan, D. International Journal of Recent Technology and Engineering,7(6), 287-290,2019.
19. Sathish,T. et.al., International Journal of Mechanical and Production Engineering Research and Development, Volume 2018, Issue
Special Issue, 2018, Article number IJMPERDSPL201883, Pages 705-710.
20. D Chandramohan and Ravikumar L, , Materials Today: Proceedings Volume 16, Part 2, 2019, Pages 744-749
https://www.sciencedirect.com/science/article/pii/S221478531930999X
21. Murali, B et.al., Mechanical properties of boehmeria nivea reinforced polymer composite, Materials Today: Proceedings, Volume 16, Part
2, 2019, Pages 883-888.
22. https://www.sciencedirect.com/science/article/pii/S2214785319310193
23. S. Dinesh Kumar, et al., ANN-AGCS for the prediction of temperature distribution and required energy in hot forging process using finite
element analysis, Materials Today: Proceedings, https://doi.org/10.1016/j.matpr.2019.05.426.
24. S. Dinesh Kumar, et.al., ‘Optimal Hydraulic And Thermal Constrain For Plate Heat Exchanger Using Multi Objective Wale Optimization’,
Materials Today Proceedings, Elsevier Publisher, 2019.
25. DOI : 10.1016/j.matpr.2019.07.710.
26. M. D. Vijayakumar, et.al., Experimental investigation on single point incremental forming of IS513Cr3 using response surface method,
Materials Today: Proceedings.
27. T. Adithiyaa et.al.,, Flower Pollination Algorithm for the optimization of stair casting parameter for the preparation of AMC, Materials
Today: Proceedings.
28. https://doi.org/10.1016/j.matpr.2019.07.711.
29. Chandramohan, D., Marimuthu, K. Applications of natural fiber composites for replacement of orthopaedic alloys, Proceedings of the
International Conference on Nanoscience, Engineering and Technology, 6167942, pp. 137-145,2011.
30. T. Adithiyaa et.al.,, Optimal Prediction of Process Parameters By GWO-KNN in Stirring-Squeeze Casting of AA2219 Reinforced Metal
Matrix Composites, Materials Today: Proceedings (2019).
31. DOI:10.1016/j.matpr.2019.10.051.
32. K. Gurusami, D. Chandramohan, S. Dinesh Kumar et al., Strengthening mechanism of Nd: Yag laser shock peening for commer-cially
pure titanium (CP-TI) on surface integrity and residual stresses, Materials Today: Proceedings.
33. https://doi.org/10.1016/j.matpr.2019.09.141.
34. Chandramohan, D.and Marimuthu, K., Natural fibre particle reinforced composite material for bone implant, European Journal of
Scientific Research, Vol.54, No.3,384-406,2011.
35. Prabhakaran Vasantha-Srinivasan, Raja Ganesan Sengodan Karthi, Muthiah Chellappandian, Athirstam Ponsankar, Annamalai
Thanigaivel, Sengottayan Senthil-Nathan, Devarajan Chandramohan, Aspergillus flavus (Link) toxins reduces the fitness of dengue vector
Aedes aegypti (Linn.) and their non-target toxicity against aquatic predator, Microbial pathogenesis,128,281-287,2019.
36. DOI:https://doi.org/10.1016/j.micpath.2019.01.014.
37. Chandramohan, D and John Presin Kumar A. Experimental data on the properties of natural fiber particle reinforced polymer com posite
material, Data in Brief,13, pp. 460-468,2017.

Authors: V. Ravi Raj, S. Rangarajan, B.Vijaya Ramnath, D.Muruganandam and J.Jayapriya

Paper Title: Experimental Research on Roselle / Glass Fibre Hybrid Polymer Composites
Abstract: Varieties in tractable and sway properties of Roselle fiber strengthened polyester composites
brought about by the expansion of glass fiber have been investigated. Roselle fiber in mix with glass is magnificent
for making economically savvy composite materials. The impact of the plan of glass and Roselle fiber in the
readiness of composites have likewise been examined. Direct increment in rigidity is noted because of the
expansion of glass. Be that as it may, when lower volume portion of glass is utilized, a cozy blend of Roselle fiber
and glass demonstrates the most elevated rigidity. The effect quality demonstrates the most noteworthy worth when
a glass volume part of 0.12 is utilized.

Keyword : Natural Fibers, Material Properties, Mechanical Properties.


References:
1. Chandramohan, D., Bharanichandar, J, Carbon - Science and Technology,5(3), pp. 314-320,2013.
2. http://www.applied-science-innovations.com/cst-web-site/CST-5-3-2013/CST%20-%2080%20-%20FINAL.pdf
3. Chandramohan, D., Rajesh, S., International Journal of Applied Engineering Research, 9(20), 6979-6985,2014.
4. Chandramohan, D et.al., American Journal of Applied Sciences, 11 (4),623-630,2014.
5. https://pdfs.semanticscholar.org/19e8/56abe7720e513b65612dad3c0edff976d4d2.pdf
6. Murali, B et.al., Carbon - Science and Technology,6(1), pp. 330-335,2014.
7. Pandyaraj, V et.al., International Journal of Mechanical Engineering and Technology,9, pp. 1034-1042,2018.
813. 8. http://www.iaeme.com/MasterAdmin/UploadFolder/IJMET_09_12_103/IJMET_09_12_103.pdf
9. Murali, B et.al., Journal of Chemical and Pharmaceutical Research,6(9), pp. 419-423,2014.
10. http://www.jocpr.com/articles/chemical-treatment-on-hemppolymer-composites.pdf 4665-
11. Chandramohan, D., Murali, B., Academic Journal of Manufacturing Engineering, 12(3), 67-71,2014. 4669
12. K Gurusami, et.al. (2019):, International Journal of Ambient Energy, DOI: 10.1080/01430750.2019.1614987.
13. Chandramohan, D., Rajesh, S,, Academic Journal of Manufacturing Engineering,12(3),72-77,2014.
14. https://www.researchgate.net/publication/286590092_Study_of_machining_parameters_on_natural_fiber_particle_reinforced_polymer_co
mposite_material
15. Chandramohan.D., and A.Senthilathiban., International Journal of Applied Chemistry, 10 (1),153-162,2014.
16. Chandramohan, D et al. Journal of Bio- and Tribo-Corrosion (2019) 5:66.
17. https://link.springer.com/article/10.1007/s40735-019-0259-z
18. Sathish, T., Chandramohan, D. International Journal of Recent Technology and Engineering,7(6), 287-290,2019.
19. Sathish,T. et.al., International Journal of Mechanical and Production Engineering Research and Development, Volume 2018, Issue
Special Issue, 2018, Article number IJMPERDSPL201883, Pages 705-710.
20. D Chandramohan and Ravikumar L, , Materials Today: Proceedings Volume 16, Part 2, 2019, Pages 744-749
https://www.sciencedirect.com/science/article/pii/S221478531930999X
21. Murali, B et.al., Mechanical properties of boehmeria nivea reinforced polymer composite, Materials Today: Proceedings, Volume 16, Part
2, 2019, Pages 883-888.
22. https://www.sciencedirect.com/science/article/pii/S2214785319310193
23. S. Dinesh Kumar, et al., ANN-AGCS for the prediction of temperature distribution and required energy in hot forging process using finite
element analysis, Materials Today: Proceedings, https://doi.org/10.1016/j.matpr.2019.05.426.
24. S. Dinesh Kumar, et.al., ‘Optimal Hydraulic And Thermal Constrain For Plate Heat Exchanger Using Multi Objective Wale Optimization’,
Materials Today Proceedings, Elsevier Publisher, 2019.
25. DOI : 10.1016/j.matpr.2019.07.710.
26. M. D. Vijayakumar, et.al., Experimental investigation on single point incremental forming of IS513Cr3 using response surface method,
Materials Today: Proceedings.
27. T. Adithiyaa et.al.,, Flower Pollination Algorithm for the optimization of stair casting parameter for the preparation of AMC , Materials
Today: Proceedings.
28. https://doi.org/10.1016/j.matpr.2019.07.711.
29. Chandramohan, D., Marimuthu, K. Applications of natural fiber composites for replacement of orthopaedic alloys, Proceedings o f the
International Conference on Nanoscience, Engineering and Technology, 6167942, pp. 137-145,2011.
30. T. Adithiyaa et.al.,, Optimal Prediction of Process Parameters By GWO-KNN in Stirring-Squeeze Casting of AA2219 Reinforced Metal
Matrix Composites, Materials Today: Proceedings (2019).
31. DOI:10.1016/j.matpr.2019.10.051.
32. K. Gurusami, D. Chandramohan, S. Dinesh Kumar et al., Strengthening mechanism of Nd: Yag laser shock peening for commer-cially
pure titanium (CP-TI) on surface integrity and residual stresses, Materials Today: Proceedings.
33. https://doi.org/10.1016/j.matpr.2019.09.141.
34. Chandramohan, D.and Marimuthu, K., Natural fibre particle reinforced composite material for bone implant, European Journal of
Scientific Research, Vol.54, No.3,384-406,2011.
35. Prabhakaran Vasantha-Srinivasan, Raja Ganesan Sengodan Karthi, Muthiah Chellappandian, Athirstam Ponsankar, Annamalai
Thanigaivel, Sengottayan Senthil-Nathan, Devarajan Chandramohan, Aspergillus flavus (Link) toxins reduces the fitness of dengue vector
Aedes aegypti (Linn.) and their non-target toxicity against aquatic predator, Microbial pathogenesis,128,281-287,2019.
36. DOI:https://doi.org/10.1016/j.micpath.2019.01.014.
37. Chandramohan, D and John Presin Kumar A. Experimental data on the properties of natural fiber particle reinforced polymer com posite
material, Data in Brief,13, pp. 460-468,2017.

Authors: R.Jeevitha, N.Sudha Bhuvaneswari

Paper Title: Solutions to Overcome Ipv4/Ipv6 Compatibility Issues In Vehicular Adhoc Networks
Abstract: Researchers found that Internet Protocol Version 6 (IPv6) can be considered since it is the
important communication protocol for internet access during driving, location privacy in Vehicular Adhoc
Networks (VANET). TCP/IP allows devices to interact online. A unique IP address allows each device to
communicate with each other over the internet. From the desktop computers to tablets, to PS4s, to mobile phones,
to cars, to airplanes, to IP enabled washers and dryers, lot of things will be connected online. It needs a lot more
addresses than that are available today. IPv6 was created in the mid-’90s to make the internet grow. It is not
backward compatible with IP version 4, but both IPv4 and IPv6 protocols can run simultaneously over the same
wires. This requires a transition from IPv4 to IPv6 and vice-versa. The IPv6 layer is a vital issue in the field of
Intelligent Transportation System (ITS). The vehicles possess heterogeneous devices like sensors, Global
Positioning System (GPS), IPv4 addressing and IPv6 addressing. IPv4 addresses are depleting and IPv6 addressing
came into existence. When the Road Side Unit (RSU) communicate with gateway and with vehicular cloud using
IPv4 and IPv6 addressing, compatibility issues occur. This paper mainly focuses on the IPv4/IPv6 compatibility
issues and the possible solutions to overcome the compatibility issues during the dissemination of data in VANET.

Keyword : IPv4, IPv6, ITS, VANET


814.
References: 4670-
1. Anttonio F.Skarmeta, Pedro M.Ruiz, Jose Santa Lozano and Alejandro, ”Governments Enabled with IPv6 – GEN6”, supported by 4675
the European Commission.
2. Babu Ram Dawadi, Shashidhar Ram Joshi, Ananda Raj Khanal, “Service Provider IPv4 to IPv6 Network Migration Strategies”, J. of
Emerging Trends in Computing and Info Sci, Vol. 6, No. 10, 2015, pp. 565-572.
3. C. Campolo, A. Molinaro, R. Scopigno, Eds., “Vehicular ad hoc Networks -Standards, Solutions, and Research”, Springer, 2015.
4. Henry Chukwuemeka Paul, Kinn Abass Bakon,” A study on IPv4 and IPv6: The importance of their co-existence”, Int J. of Info Sys
and Eng., Vol. 4, No.2, 2016, pp.97-106.
5. Intelligent Transport Systems (ITS); Vehicular Communications; GeoNetworking; Part6: Internet Integration; Sub-part 1:
Transmission of IPv6 Packets over GeoNetworkingProtocols, ETSI European Norm 302 636-6-1, Rev. 1.2.1, May 2014.
6. Khan, Rafiqul Zaman, “A Comparative Study on IPv4 and IPv6”, Int J. of Advanced Info Sci and Tech (IJAIST), Vol.33, No.33,
2015, pp. 9-16.
7. Olabenjo Babatunde, Omar Al-Debagy,” A Comparative Review of Internet Protocol Version4 (IPv4) and Internet Protocol Version
6 (IPv6)”, Int J, of Comp Trends and Tech (IJCTT), Vol. 13, No. 1, 2014, pp. 10-13.
8. C. V. Ravi Kumar, Kakumanilakshmi Venkatesh, Marri Vinay Sagar and Kala Praveen Bagadi, “Performance Analysis of IPv4 to
IPv6 Transition Methods”, Indian J. of Sci and Tech, Vol. 9 ,No. 20, 2016, pp. 1-8.
9. Uma Nagaraj, Deesha G.Deotale, “Study of Communication using IPv6 in VANET”, Int J. of Comp. Sci and Commn Net, Vol 1,
No.3, pp. 247-251
10. Xianhui Che, Dylan Lewis,” IPv6: Current Deployment and Migration Status”, Int J. of Research and Reviews in Comp Sci, Vol. 1,
No. 2, 2010, pp.22-29.
11. Yong Cui, Wendong Wang, Qi Sun, Lishan Li, Xingwei Wang, “IPv4 Address Sharing and Allocation for IPv6 Transition”, IEEE
Internet computing, 2015, pp.66-71
12. www.tutorialspoint.com
Abraham Subaraj. M, Bensam Raj. J, Malkiya Rasalin Prince. R, Glan Devadhas.G, Christopher Ezhil
Authors:
Singh. S
Corrosion rate of Al-Si Alloy Reinforced with B4C Nanoparticle prepared by Powder Metallurgy
Paper Title:
Method using RSM
Abstract: The current work aims to optimize the Al-Si alloy reinforced with B4C nanoparticles prepared
through powder metallurgy technique. The sample was prepared with different weight percentage 0, 4 and 8; the
size of the sample was 20 mm x 20mm and sintered in a furnace upto 500oC with argon gas and their by furnace
815. cooled to room temperature. The samples were brushed to remove the slag present in it, and polished by emery
paper. Then the samples were weighed in an electric balancing apparatus to measure the initial weight of the 4676-
sample before dipping it into acid solution. The weight loss was measured to calibrate the corrosion rate of the 4682
samples for 9 days. Response surface methodology was designed for three factors at three levels with a response as
corrosion rate. The Analysis of Variance (ANOVA) was used to identify the most influencing factor on corrosion
rate. The normal probability plot, residual plot, and desirability plot demonstrates the influence of corrosion rate of
the composites.
Keyword : Al-Si, Boron Carbide, ANOVA, Powder Metallurgy
References:
1. J.Eric David Praveen, D.S.Robinson Smart, R.Babu, N.Gnanaprakash, Investigations on Dry Sliding Wear Behaviour of
LM13/SiC/Gr Hybrid Composites by Response Surface Methodology. International Journal of Pure and Applied Mathematics, 117
(9), 2017, pp.95-99.
2. Fradaric John, C, R.Christu Paul, S.Christopher Ezhil Singh, J.Jacob jose, Ramkumar, P.Sengottuvel, Corrosion resistance on Al-
12Si-xZrC composites using acid mediums. International Journal of Mechanical & Mechatronics Engineering, 17 (05), 2017, pp.67-
74.
3. C. Fradaric John, R. Christu Paul, S. Christopher Ezhil Singh, J. Jacobjose, T. Ramkumar, P. Sengottuvel, Weight Loss Method for
corrosion behaviour of Al-12si- ZrC Composites Using Response Surface Methodology. International Journal of Applied
Engineering Research, 13(6), 2018, pp.4428-4433.
4. Fradaric John, C, R.Christu Paul, S.Christopher Ezhil Singh, Ramkumar, Tribological behavior, mechanical properties and
microstructure of Al-12Si-ZrC composite prepared by powder metallurgy. Bulletin of the Polish Academy of Sciences: Technical
Sciences, 65(2), 2017, pp.149-154.
5. S. Rajesh, S. Rajakarunakaran, R. Sudhakara Pandian, Modeling and optimization of sliding specific wear and coefficient of friction
of aluminum based red mud metal matrix composite using taguchi method and response surface methodology. Materials Physics and
Mechanics, 15, 2012, pp.150-166.
6. Christopher Ezhil Singh, S., and Selvakumar, N, Effect of milled B4C nanoparticles on tribological analysis, microstructure and
mechanical properties of Cu–4Cr matrix produced by hot extrusion. Archives of Civil and Mechanical Engineering, 17 (2), 2017,
pp.446–456.
7. C. Fradaric John, R. Christu Paul, S. Christopher Ezhil Singh, J. Jacobjose, G. S. Hikku, T. Ramkumar, Corrosion behavior of ZrC
particles reinforcement with Al-12Si metal matrix composites by weight loss method using acidic mediums, Bulletin of the Polish
Academy of Sciences: Technical Sciences, 66(1), 2018, pp.9-16.
8. K. Somasundara Vinoth, R. Subramanian, S. Dharmalingam, B. Anandavel, Optimization of dry sliding wear conditions for
AlSi10Mg/SiCp composites using response surface: genetic algorithm approach. Industrial Lubrication and Tribology, 66(5), 2014,
pp.593–600.
9. C. Fradaric John, R. Christu Paul, S. Christopher Ezhil Singh and P.Sengottuvel, Wear behaviour of Al-12Si-xZrC composite using
Response Surface Methodology. Journal of Advanced Research in Dynamical and Control Systems, 13, 2017, pp.83-89.
10. A. Senapathi, Siva Sankara Raju, Gunji Srinivas Rao, Tribological Performance of Al-MMC Reinforced with Treated Fly Ash using
Response Surface Methodology, Indian Journal of Science and Technology, l 10(15), 2017, pp.1-9.

Authors: Monelli Ayyavaraiah

Paper Title: 5g Standardization Initiatives towards 5g Wireless Access Technology


Abstract: The best largely favoured program architecture in IoT is the Service Oriented Architecture (SOA),
which aims to deliver a loosely paired devices to utilize the usage as well as reuse of IoT companies at the middle-
ware level, to decrease device combination issues. What is the most unique attribute of this paper, compared to
various other study and also tutorial jobs, is the in depth presentation of the interior programs and also mechanisms
of the system protocols based on IPv6. This paper gives 5G standardization projects in the direction of 5G cordless
accessibility innovation.

Keyword : Internet of Things, 5G, IoT System


References:
1. D. Miorandi, S. Sicari, F. de Pellegrini, as well as I. Chlamtac, "Inter- web of things: vision, apps as well as study difficulties," Ad Hoc
816. Networks, vol. 10, no. 7, pp. 1497-- 1516, 2012.
2. O. Mavropoulos, H. Mouratidis, A. Fish, and also E. Panaousis, "ASTo: a device for protection analysis of IoT units," in Proceedings of 4683-
the 15th IEEE/ACIS International Conference on Software Program Engineering Research, Control and Applications (LOTION '17), pp. 4685
395-- 400, June 2017.
3. R. Khan, S. U. Khan, and R. Zaheer, "Future internet: the inter- web of things architecture, achievable apps as well as vital challenges," in
Proceedings of the 10th International Meeting on Frontiers of Information Technology (MATCH' 12), pp. 257-- 260, December 2012.
4. H. S. Dhillon, H. Huang, and H. Viswanathan, "Wide-area cordless interaction obstacles for the internet of things," IEEE Communications
Publication, vol. 55, no. 2, pp. 168-- 174, 2017.
5. V. Gazis, "A questionnaire of requirements for machine-to-machine as well as the internet of things," IEEE Communications Surveys &
Tutorials, vol. 19, no. 1, pp. 482-- 511, 2017.
6. Anusha Medavaka,“Enhanced Classification Framework on SocialNetworks” in “Journal of Advances in Science and Technology”, Vol .
IX, Issue No. XIX, May-2015 [ISSN : 2230-9659]
7. Anusha Medavaka,P. Shireesha, “A Survey on TraffiCop Android Application” in “Journal of Advances in Science and Technology”, Vol.
14, Issue No. 2, September-2017 [ISSN : 2230-9659]
8. Anusha Medavaka,Dr.P.Niranjan, P. Shireesha, “USER SPECIFIC SEARCH HISTORIES AND ORGANIZING PROBLEMS” in
“International Journal of Advanced Computer Technology (IJACT)”, Vol. 3, Issue No. 6 [ISSN : 2319-7900]
9. Anusha Medavaka,“Monitoring and Controlling Local AreaNetwork Using Android APP” in “International Journal of Research”, Vol. 7,
Issue No. IV, April-2018 [ISSN : 2236-6124]

Authors: N. Gayatri, S. Swapna, S. Nagaraju


Need of Different Software Life Cycle Models and Building Proposed Simulation Model Using a
Paper Title:
Simulation Tool
Abstract: The condition software design is comprised of two words, software and design. Software is actually
greater than just a plan code. A course is actually an executable code, which fulfills some computational function.
817. Software is considered to become a selection of exe shows code, connected collections and newspaper jobs.
Software, when generated a particular demand is called software product. This paper supplies an overview in the 4686-
direction of the a variety of software life cycle designs. 4690

Keyword : Software Engineering, software life cycle models


References:
1. AMOUI, M., MIRARAB, S., ANSARI, S., AND LUCAS, C. 2006. A Genetic Formula Strategy to Style Evolution utilizing Style Pattern
Transformation. Inter- nationwide Diary of Infotech and Intelligent Computing 1, 2, 235-- 244.
2. ANTONIOL, G. AND DI PENTA, M. 2003. Public library Miniaturization making use of Fixed and also Dynamic Details. In Procedure s
of the 19th International Meeting on Software Maintenance (ICSM '03). IEEE, Amsterdam, The Netherlands, 235-- 244.
3. BARLAS, G. As Well As EL-FAKIH, K. 2008. A GA-based Movie-On-Demand System using Several Circulated Servers. Multimedia
Tools and also Requests 40, 3, 361-- 383.
4. BARRETO, A., DE O. BARROS, M., AND WERNER, C. M. 2008. Stafftng a Software Venture: a Restraint Satisintrigue as well as
Optimization-based Approach. Comput- ers & Operations Research 35, 10, 3073-- 3089.
5. D. Amalfitano, A. R. Fasolino, and also P. Tramontana, "A gui crawling-based strategy for android mobile application testing. In software
testing, confirmation as well as validation workshops (ICSTW)," shown at the 2011 IEEE Fourth International Meeting on IEEE, 2011.
6. R. Mahmood, N. Mirzaei, and S. Malek, "EvoDroid: Fractional evolutionary screening of android applications," in Proceedings of the
22nd ACM SIGSOFT International, 2014.
7. L. T. Heberlein, G. V. Dias, K. N. Levitt, B. Mukherjee, J. Timber, and also D. Wolber, "A network safety and security monito r. In
research in protection and also personal privacy, 1990," in Proceedings.1990 IEEE Computer Society Symposium on IEEE, 1990, pp. 296-
304.
8. L. Wang, S. Jajodia, A. Singhal, P. Cheng, as well as S. Noel, "K-zero day safety: A system safety and security statistics for determining
the danger of unfamiliar vulnerabilities," Trustworthy and also Secure Computer, IEEE Deals, vol. 11, pp. 30-44, 2014.
9. Anusha Medavaka,“Enhanced Classification Framework on SocialNetworks” in “Journal of Advances in Science and Technology”, Vol .
IX, Issue No. XIX, May-2015 [ISSN : 2230-9659]
10. Anusha Medavaka,P. Shireesha, “A Survey on TraffiCop Android Application” in “Journal of Advances in Science and Technology”, Vol.
14, Issue No. 2, September-2017 [ISSN : 2230-9659]
11. Anusha Medavaka, Dr.P.Niranjan, P. Shireesha, “USER SPECIFIC SEARCH HISTORIES AND ORGANIZING PROBLEMS” in
“International Journal of Advanced Computer Technology (IJACT)”, Vol. 3, Issue No. 6 [ISSN : 2319-7900]
12. Anusha Medavaka,“Monitoring and Controlling Local AreaNetwork Using Android APP” in “International Journal of Research”, Vol. 7,
Issue No. IV, April-2018 [ISSN : 2236-6124]

Authors: Chesnov K.S., Chanchina A. V.Fedorova A.N., Zanozin N.V., Makeeva A., Bystrova N.V., Trostin V.L.

Paper Title: Program and Methodological Support of the Educational Process in the Magistracy
Abstract: The article is devoted to the issues of program and methodological support of the educational
process in the preparation of undergraduates. In accordance with the requirements of educational standards for
magistracy, the author considers a competency-based approach to the educational process in a university. The
effectiveness of the developed electronic-methodical complexes according to the programs of educational training
of the magistracy is noted. The author also describes the developed electronic courses.

Keyword : software and methodological support, magistracy, educational process, methodological support.
References:
1. V.N., Dobudko E.S., Zhuranova N.A. Realization of the didactic potential of the informatics project activity within the framework of
cooperation of school-pedagogical university (2017) Balkan Scientific Review 2017 No. 1 pp.5-8.
2. Bogorodskaya, O.V., Golubeva, O.V., Gruzdeva, M.L., Tolsteneva, A.A., Smirnova, Z.V.Experience of approbation and introduction of
the model of management of students’ Independent .work in the university(2018) Advances in Intelligent Systems and Computing, 622,
pp. 387-397
3. Ilyashenko, L.K., Smirnova, Z.V., Vaganova, O.I., Chelnokova, E.A., Kaznacheeva, S.N.Methods of conducting practical training on the
subject "power sources for welding"(2019) International Journal of Mechanical Engineering and Technology, 10 (2), pp. 908 -917.
4. Gruzdeva, M.L., Vaganova, O.I., Kaznacheeva, S.N., Bystrova, N.V., Chanchina, A.V.Modern Educational Technologies in Professional
Education(2020) Lecture Notes in Networks and Systems, 73, pp. 1097-1103.
5. Fedorov, A.A., Sedykh, E.P., Mialkina, E.V.University of education: Structure and main components of management(2019) European
Journal of Educational Research, 8 (4), pp. 1257-1268.
6. Smirnova, Z.V., Vaganova, O.I., Chanchina, A.V., Koldina, M.I., Kutepov, M.M.Development of Research Activity of Future Econo mists
in the University(2020) Lecture Notes in Networks and Systems, 73, pp. 371-379.
818. 7. Zhytukhina K. P. Realization of the pedagogical condition for improving the process of formation of responsible attitude to future
profession in students of pedagogical universities (2017) Scientific Vector of the Balkans 2017 No. 1 pp.26-30. 4691-
8. Bezliudnyi O.I., Kobulianska T.V. Model of formation of preparation of future psychologists to work with teen families in the professional 4694
training process (2017) Balkan Scientific Review 2017 No. 1 pp. 9-14.
9. Prokhorova M.P., Semchenko A.A. Involving of trainees-future teachers of professional training in project activities in the discipline.
Vestnik of Minin University. 2018. vol. 6, no. 2. p. 6. DOI: 10.26795/2307-1281-2018-6-2-6.
10. Linkov A.Y., Klinkov G.T.Person-oriented learning based on its sociological derivation (2018) Scientific Vector of the Balkans 2018 No.
1 pp.5-7.
11. Vaganova, O. I., Smirnova, Zh. V., Markova, S. M., Chaikina, Zh. V., & Bulaeva, M. N. (2019). Organization of partnerships fo r
additional educational services on the example of the interaction of the educational institution with the health and cultural centre.
Perspektivy nauki i obrazovania – Perspectives of Science and Education, 39 (3), 500-514. doi: 10.32744/pse.2019.3.38
12. Kobernyk O.M., Stetsenko N.M., Boichenko V.V., Pryshchepa S.M. Improving professional and pedagogical training of future teachers by
moodle platforms (On the example of the course "Pedagogy") (2018) Scientific Vector of the Balkans 2018 No. 1 pp.5-7.
13. Chirva A.N., Chirva O.G. Contents and method of professionally oriented training of informatic disciplines of future teachers of
technologies (2018) Scientific Vector of the Balkans 2018 No. 1 pp.27-31.
14. Bartkiv O. S., Durmanenko E. A. Interactive methods in the process of future teachers’ training for the higher education institutions
modeling (2018) Humanitarian Balkan Research 2018. No. 1 pp.30-32.
15. Smirnova Zh.V., Krasikova O.G. Modern tools and technologies for assessing learning outcomes. Vestnik of Minin University. 2018. Vol.
6, no. 3. Р. 9. DOI: 10.26795/2307-1281-2018-6-3-9.
16. Oros I.I. Formation and development of the system of continuous education of adults in different countries of the world (2017 ) Balkan
Scientific Review 2017 No. 1 pp. 19-24.
17. Ihnatenko H.V., Ihnatenko K.V. Formation of self-dependence as a professional ly-important personality trait of a future vocational
education teacher by means of case-technology (2018) Humanitarian Balkan Research 2018. No. 1 pp. 40-42.
18. Sazhienko A. P. Characteristics of components, criteria and levels of faculty competence in the future bacalaurs of computer technologies
(2017) Scientific Vector of the Balkans 2017 No. 1 pp.22-35.
19. Myalkina E.V., Sedhyh E.P., Zhitkova V.A., Vaskina V.A., Isaykov O.I. University resource center as an element of social development of
the region // Vestnik of Minin University. 2018. Vol. 6, no. 3. Р. 1. DOI: 10.26795/2307-1281-2018-6-3-1.
20. Denysenko S.M. Application of quest technology in the professional training OF Bachelor of Publishing and Polygraphy in Higher School
(2018) Balkan Scientific Review 2018 No. 1 pp. 29-33.
21. Vaganova O.I., Ilyashenko L.K. The main directions of implementation technologies of student-centered education in high school. Vestnik
of Minin University. 2018. vol. 6, no. 3. p.2 DOI: 10.26795 / 2307-1281-2018-6-3-2.
22. Garnevska S.M. opportunities for forming communication technology images in training in technology and entrepreneurship (2018 )
Balkan Scientific Review 2018 No. 1 pp. 34-37.
23. Sedykh, EP; Zanfir, LN; Vaganova, OI; Smirnova, ZV; Bulayeva, MN Use of training technology in the preparation of students of
engineering specialties (2019) AMAZONIA INVESTIGA Vol. 8 Núm. 18: 461-470.
24. Vaskovskaya G.A. Features of implementation of pedagogical technologies of profile training (2018) Balkan Scientific Review 2018 No. 1
pp. 76-79.
25. Filimonova I.A. Using of innovative technologies in the process of professional competencie’s forming of the future food tech nologies
bachelors (2017) Humanitarian Balkan Research 2017. No. 1 pp.5-8.
26. Vaganova, O. I., Smirnova, Zh. V., Markova, S. M., Chaikina, Zh. V., & Bulaeva, M. N. (2019). Organization of partnerships for
additional educational services on the example of the interaction of the educational institution with the health and cultural centre.
Perspektivy nauki i obrazovania – Perspectives of Science and Education, 39 (3), 500-514. doi: 10.32744/pse.2019.3.38
27. Kustov Yu. A. Livshits Yu. A., The connection of training with production as a leading factor in the formation of reference o f the
university (2017) Scientific vector of the Balkans 2017 No. 1 pp.14-17.

Authors: Chandra Mani Sharma, Alaknanda Ashok, Alok Kumar Singh Kushwaha

Paper Title: Human Action Recognition using Rule based Fuzzy Motion Feature Templates
Abstract: This paper proposes a technique for human activity recognition in a video stream. To achieve high
accuracy in activity recognition results, the method in its initial step deploys temporal template matching to
recognize activities. As temporal templates are susceptible to get affected by speed, style and performance pattern
of activity, so it becomes difficult to accurately differentiate among closely similar activities (e.g walking, running
and jogging). The confusion in recognizing activities is reconciled by subsequent rule based activity distinction.
The proposed method recognizes the human activities in video on various bench-marked data sets including KTH
Dataset and Weizmann Dataset. Experimental results demonstrate the novelty of method with a wide spectrum of
varied conditions. The average accuracy of the method is 97.20% under standard conditions.

Keyword : Human activity recognition, computer vision, rule based approach, video content management and
analysis, motion feature templates.
References:
1. Vishwakarma, S., & Agrawal, A. (2013). A survey on activity recognition and behavior understanding in video surveillance. Int. J.
The Visual Computer, 29(10), pp 983-1009.
819. 2. Robertson, N., & Reid, I. (2006). A general method for human activity recognition in video. Computer Vision and Image
Understanding, 104(2-3), 232-248.
3. Kushwaha, A. K. S., Sharma, C. M., Khare, M., Srivastava, R. K., & Khare, A. (2012). Automatic multiple human detection and 4695-
tracking for visual surveillance system. In 2012 IEEE International Conference on Informatics, Electronics & Vision (ICIEV) , pp. 4700
326-331
4. Chaquet, J. M., Carmona, E. J., & Fernández-Caballero, A. (2013). A survey of video datasets for human action and activity
recognition. Computer Vision and Image Understanding, 117(6), pp 633-659.
5. Kushwaha, A. K. S., Sharma, C. M., Khare, M., Prakash, O., & Khare, A. (2014). Adaptive real-time motion segmentation technique
based on statistical background model. The Imaging Science Journal, 62(5), pp 285-302.
6. Johansson, G. (1973). Visual perception of biological motion and a model for its analysis. Perception & psychophysics, 14(2), pp
201-211.
7. Sharma, C. M., Kushwaha, A. K. S., Nigam, S., & Khare, A. (2011, September). On human activity recognition in video sequences .
In 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011), pp. 152-158
8. Bobick, A. F., & Davis, J. W. (2001). The recognition of human movement using temporal templates. IEEE Transactions on Patter n
Analysis & Machine Intelligence, (3), pp 257-267.
9. Sharma, C. M., Singh Kushwaha, A. K., Nigam, S., & Khare, A. (2011, July). Automatic human activity recognition in video using
background modeling and spatio-temporal template matching based technique. In Proceedings of the ACM International Conference
on Advances in Computing and Artificial Intelligence (pp. 97-101)
10. Kumar, P., Ranganath, S., Weimin, H., & Sengupta, K. (2005). Framework for real-time behavior interpretation from traffic video.
IEEE Transactions on Intelligent Transportation Systems, 6(1), 43-53.
11. Ahad, M. A. R., Tan, J. K., Kim, H., & Ishikawa, S. (2012). Motion history image: its variants and applications. Machine Vision and
Applications, 23(2), 255-281.
12. Kim, K., Chalidabhongse, T. H., Harwood, D., & Davis, L. (2005). Real-time foreground–background segmentation using codebook
model. Real-time imaging, 11(3), 172-185.

Authors: Sharberi, S. N. M., Yee, M. H., Ibrahim, M. R., Kok, B. C., Yeo, K. J.
Module Development of Teaching Soft Skills Application in Learning and Facilitating Theory Class for
Paper Title:
Technical
Abstract: Nowadays, Malaysia is moving towards being a developed nation in which it has worked hard to
develop the country, especially in the field of Technical and Vocational Education Training (TVET) which is
strongly emphasized in producing first-class human capital. The application of seven (7) elements of soft skills (KI)
which are communication skills, leadership skills, skills work skills, professional entrepreneurship, morals and
820. ethics, continuous learning and information management, critical thinking and problem solving skills should be
emphasized to the students. Mastering soft skills is very important to technical students as it is demanded by the
4701-
industry. Hence, the purpose of this study is to develop the Soft Skill Implementation Teaching Module in
4705
Teaching and Learning Theory Class for Technical Lecturers. The objective of this study is to identify the
suitability of the format, content and functionality of the module based on the feedback of the technical lecturers.
The development of this module uses the Sidek model while the content of the module is based on UTHM
publisher guidelines. The researcher chose the Sidek model as the module development model because it has
systematic steps to develop the module. The Sidek model has two phases where the first phase is the draft phase
and the second phase is the testing and evaluation phase. Each module built is considered a draft before it is
evaluated and tested for its effectiveness. In addition, this study uses the quantitative approach involving ten (10)
technical lecturers at FPTV, UTHM. The data were descriptively analyzed and presented in the form of frequency
and percentages. The findings have shown that 97.27% of technical lecturers agree with the design format, 98%
agree with the suitability of the module content and 100% agree with the functionality of the Soft Skill
Implementation Teaching Module in Teaching and Learning Theory Class for Technical Lecturers. In conclusion,
this module is suitable to be used by technical lecturers as a guidance and references in applying soft skills
systematically.

Keyword : Soft skills, module, teaching and facilitating


References:
1. Ahmad, N. A. (2010). Pedagogi : Dari Sekolah Ke Institusi Pendidikan Tinggi. Cetakan pertama. Universiti Utara Malaysia : UUM
Press.
2. Anwar, Ilham. (2010). Pengembangan Bahan Ajar. Bahan Kuliah Online. Direktori UPI. Bandung.x
3. Atan, N. A & Tambai, T. K. (2011). Penerimaan Pelajar Terhadap Penggunaan Modul Pembelajaran Kendiri Berasaskan
Rekabentuk Teori Beban Kognitif Bagi Subjek Pengaturcaraan Web. Journal Of Science & Mathematics Education Pp. 1-10
4. Chua, Y. P. (2011, April). Kaedah dan Statistik Penyelidikan : KAedah Penyelidikan. Retrieved October 2, 2018, from ResearchGate:
https:/ /www. researchgate.net /publication/277009907_Kaedah_dan_Statistik_Penyelidikan_Kaedah_Penyelidikan
5. Ibrahim, Z. (2017). Pembangunan Modul Pembelajaran Seni Reka Grafik Berasaskan Teknologi Dan Gaya Pembelajaran Pelajar
Bermasalah Pendengaran. Ijazah Doktor Falsafah, Fakulti Pendidikan Universiti Malaya: Kuala Lumpur, Malaysia.
6. Jusoh, I. (2015, November 01). TVET terus diperkasa menjelang 2020. Retrieved November 15, 2018, from Utusan Online:
http://www.utusan.com .my/berita/nasional/tvet-terus-diperkasa-menjelang-2020-1.152812
7. Konting, M. M. (2000). Kaedah Penyelidikan Pendidikan. Kuala Lumpur: Kuala Lumpur : Dewan Bahasa dan Pustaka, 2000.
8. Purnama, S. (2011, Julai 7). Elemen Warna dalam Pengembangan Multimedia Pembelajaran. Retrieved Mei 25, 2019, from Kompasinia
Beyond Blogging: https://www.kompasiana.com/insyira/5500f3afa33311e57251269c/elemen-warna-dalam-pengembangan-multimedia-
pembelajaran?page=all#_ftn4
9. Rashid, T. L. (2013). Kemahiran Insaniah Dalam Kalangan Pelajar Aliran Teknikal Sekolah Menengah Vokasional Di Gombak . Seminar
pasca siswazah dalam pendidikan , 16-25.
10. Sidek, M. N. (2005). Pembinaan modul : bagaimana membina modul latihan dan modul akademik. Kuala Lumpur: Serdang : Penerbit
Universiti Putra Malaysia, 2005.
11. Yahaya, H. R. (2007). Mengusai Penyelidikan Dalam Pendidikan. Kuala Lumpur: PTS.Profesional Publishing Sdn. Bhd.
12. Yee, M. H. (2015). Borang Maklum Balas (Phd). Universiti Tun Hussein Onn Malaysia: Batu Pahat, Johor.

Authors: Manjot Kaur, Rajneesh Randhawa

Paper Title: Animal Detection: Techniques, Challenges and Future Scope


Abstract: Departments of transportation all across the world are concerned with ever increasing number of
Animal-Vehicle Collisions as they cause thousands of human and animal causalities along with billions of
economic losses every year. This is one of the few areas of transportation that safety is not improving. As more
roads are being built, the areas that animal inhabit is shrinking and thus causing more crashes between vehicles and
animals. The human fatalities and injuries, animal fatalities and injuries, and material costs of these crashes
emphasize the need for a solution to this problem. Through this paper, new research directions and combination of
technologies which are suitable for covering the research gaps are presented.

Keyword : Animal Detection, Animal Vehicle Collision Accident Prevention, Sensors, Road Safety
References:
1. D. MOHAN, “Road Accidents in India,” IATSS Res., vol. 33, no. 1, pp. 75–79, 2009
2. Druta C., Alden A., Evaluation of a Buried Cable Roadside Animal Detection System, Virginia Transportation Research
Counsil,2015 “http://www.virginiadot.org/vtrc/main/online_reports/pdf/15-r25.pdf”
3. Cattle—The Real Menace on Indian Highways, [Online]. Available: http://www.team-bhp.com/forum/streetexperiences/144117-
cattle-real-menace-indian-highways.html accessed on Oct 31, 2019.
4. L. ANNE , “Detection Systems Reduce Collisions with Wildlife on Rural Highways,”
821. https://www.photonics.com/Article.aspx?AID=39644 , accessed on Oct 31, 2019.
5. Cram, Randall S., Roadside deer warning method and system 17 Aug 1999 Patent number US5939987 4706-
6. Hykawy, H., Roadside Animal Detection and Warning System, Oct. 10, 2002, Patent number US 20020145519A1
7. Sugimoto, T., Ohkawa, S. et al., Passive Type Moving Object Detection System, Oct. 24, 1995, Patent number 5,461,231 4710
8. Wishart, J., Infrared Animal Detector and Driver Warning System, May 6,1997, Patent number 5,627,518.
9. M. P. Huijser, a. Kociolek, P. McGowen, a. Hardy, a. P. Clevenger, and R. Ament, “Wildlife-Vehicle Collision and Crossing
Mitigation Measures: A Toolbox for the Montana,” no. April, pp. 1–112, 2007.
10. https://www.itsrm.org/itd-exploring-wildlife- detection-system-in-northern-idaho-to-improve-driver-safety/ [accessed online 29-10-
2019]
11. Wood, C. Roadside Systems Detect Wildlife to Prevent Collisions. http://www.govtech.com/public-safety/Roadside-Systems-Detect-
Wildlife-to-Prevent-Collisions.html , August, 2017, accessed on Oct 31, 2019.
12. Sharma, S.U. and Shah, D.J., A Practical Animal Detection and Collision Avoidance System Using Computer Vision
Technique.2017, IEEE Access, 5, pp.347-358.
13. http://www.camrix.net/alert.html, accessed on Oct 31, 2019.
14. Christiansen, P.; Steen, K.A.; Jørgensen, R.N.; Karstoft, H. Automated detection and recognition of wildlife using thermal cameras.
Sensors 2014, 14, 13778–13793
15. J. Chen, H. Xu, J. Wu, R. Yue, C. Yuan, and L. Wang, “Deer Crossing Road Detection with Roadside LiDAR Sensor,” IEEE
Access, vol. 7, pp. 65944–65954, 2019.
16. Z. Zhang, Z. He, G. Cao and W. Cao, "Animal Detection from Highly Cluttered Natural Scenes Using Spatiotemporal Object Region
Proposals and Patch Verification," in IEEE Transactions on Multimedia, vol. 18, no. 10, pp. 2079-2092, Oct. 2016.
17. Z. Zhang, T. X. Han and Z. He, "Coupled ensemble graph cuts and object verification for animal segmentation from highly cluttered
videos," 2015 IEEE International Conference on Image Processing (ICIP), Quebec City, QC, 2015, pp. 2830-2834.
18. Verma G.K., Gupta P. (2018) Wild Animal Detection Using Deep Convolutional Neural Network. In: Chaudhuri B., Kankanhalli M.,
Raman B. (eds) Proceedings of 2nd International Conference on Computer Vision & Image Processing. Advances in Intelligent
Systems and Computing, vol 704. Springer, Singapore
19. M. A. Sharafsaleh, M. P. Huijser, T. Kuhn, J. Spring, and J. Felder, “Evaluation of an Animal Warning System Effectiveness,” no.
April, 2012.
20. A. Mukherjee, S. Stolpner, X. Liu, U. Vrenozaj, C. Fei, and A. Sinha, “Large animal detection and continuous traffic monitoring on
highways,” Proc. IEEE Sensors, no. 2011, pp. 2–4, 2013.

Authors: S.Mishra,S.C.Swain,P.Sinha, A.Pradhan,L.Nanda


Power Quality Assessment of Perturbed Power System Implementing Fuzzy Logic and Discrete
Paper Title:
Wavelet Transform
Abstract: A novel power quality index (PQI) is determined in this paper which helps in determining the
power quality under non-sinusoidal condition. Power quality monitoring is important due to exponential growth of
non linear loads in electric power system. As non linear loads creates the distortion level in distribution system so
it is highly necessary to measure power quality index. The innovative power quality index has been found out by
considering three component such as Representative quality factor(RQPF), Detailed pollution factor(DPF), Total
harmonic Distortion(THD). When total harmonic distortion of voltage(THDV) and Total harmonic distortion of
current(THDI) amalgamation occur then THD has been formed using fuzzy inference system. An experimental
model has been developed to verify the PQI under different cases by measuring voltage and current both on the
source side and utility side . The measured voltage and current are reformulated as wavelet function using discrete
wavelet transform (DWT) to calculate referred power quality factors . This new power quality index has been
validated through hardware model to justify its importance under different non-sinusoidal conditions.

Keyword : fuzzy inference system, power quality index, total harmonic distortion wavelet packet transform
References:
1. Sinha.P, Goswami.S,Debnath.S"Harmonic source identification in distribution system using non active power quantities"Int.J.power
&energyconversion,vol8,no1,2017 Inderscience Enterprises Ltd
2. Morsi.W.G , El-Hawary.M.E, “Reformulating power components definitions contained in the IEEE Standard 1459-2000 using
Discrete Wavelet Transform”,IEEE Trans. Power Del., vol. 22, no. 3, July 2007.
3. Barbaro, P. V., Cataliotti, A., Cosentino, V., & Nuccio, S. (2007). A novel approach based on nonactive power for the identification
of disturbing loads in power systems. IEEE Transactions on Power Delivery, 22(3), 1782-1789.
4. Balc ..M.E, Hocaglu.M.H Comparison of power definition for reactive power compens ation non sinusoidal in non sinusoidal
condition ,11 th International conference on harmonic & quality of power 2004.
5. Karthik, N., Gafoor, S. A., & Surya Kalavathi, M. (2012). Classification of Power quality problems by wavelet Fuzzy expert system.
822. In Advanced Materials Research (Vol. 463, pp. 1573-1578). Trans Tech Publications. Karthik.N, Gafoor.S, Kalavathi.M
6. Nath.S,P.Sinha.P," Measurement ofPower Quality under Nonsinusoidal condition using Wavelet and Fuzzy Logic " , Third 4711-
International Conference on Power Systems, Kharagpur, INDIA December 27-29
7. Morsi.W.G, El-Hawary.M.E," Fuzzy-Wavelet-Based Electric Power Quality Assessment of Distribution Systems Under Stationary
4717
and Nonstationary Disturbances" IEEE TRANSACTIONS ON POWER DELIVERY, VOL. 24, NO. 4, OCTOBER 2009
8. Morsi.W.G, El-Hawary.M.E"Power quality evaluation in smart grids considering modern distortion in electric power systems,
Elsevier,Electric Power Systems Research 81 (2011) 1117–1123
9. Morsi.W.G, El-Hawary.M.E, Wavelet Packet Transform-Based Power Quality Indices for Balanced and Unbalanced Three-Phase
Systems Under Stationary or Nonstationary operating Conditions, IEEE TRANSACTIONS ON POWER DELIVERY, VOL. 24,
NO. 4, OCTOBER 2009
10. Sinha.P,Debnath.S,Goswami.S"A new wavlet and fuzzy based power quality index for distribution system under stationary and
non stationary disturbances"MFIIS ,2015 sept,ISBN: 978-1-78561-186-5
11. Cataliotti, A., & Cosentino, V. (2009). A single-point approach based on IEEE 1459-2000 for the identification of detection of
prevailing harmonic sources in distorted three phase power systems. Proc. of the Metrology and Measurement Systems, 16(2), 209-
218. ISSN 0860-8229
12. Frunt, J., Kling, W. L., & Ribeiro, P. F. (2011). Wavelet decomposition for power balancing analysis. IEEE Transactions on Power
Delivery, 26(3), 1608-1614.
13. . Ghaemi A. H., Abyaneh H. A., Mazlumi K., Harmonic indices assessment by Wavelet Transform. Electr Power Energy Syst.2011;
33: 1399-1409.
14. Vatansever F., Ozdemir A., Power Parameter calculation based on Wavelet Packet transform. Electr Power Energy Syst.2009; 31:
596-603.
15. Lin T., Domijan. On Power Quality Indices and Real Time Measurement. IEEE Trans Power Deliv. 2005; 20(4): 2552- 2562.
16. Willems J.L., Reflections on Apparent Power and Power Factor in Nonsinusoidal and Polyphase Situations.IEEE Trans Power Deliv.
2004; 19(2): 835-839.
17. J.Huang, Zhuhan Ji ang "Power quality assessment of different load catagories",Energy Procedia 141(2017) 345 -351,CPESE
2017,Elesevier
18. Lee B., Sohn D., Kim K.M. (2016) Development of Power Quality Index Using Ideal Analytic Hierarchy Process. In: Kim K.,
Joukov N. (eds) Information Science and Applications (ICISA) 2016. Lecture Notes in Electrical Engineering, vol 376. Springer,
Singapore
19. Urbina-Salas.I, Razo-Hernandez.R, Granados-Lieberman.D, Valtierra-Rodriguez.M, Torres-Fernandez .E"Instantaneous Power
Quality Indices Based on Single-Sideband Modulation and Wavelet Packet-Hilbert Transform" IEEE TRANSACTIONS ON
INSTRUMENTATION AND MEASUREMENT, VOL. 66, NO. 5, MAY 2017

Authors: T. Naga Raja, V.V.Venkata Ramana, A. Damodaram


Video Content Encryption as a Service and Performance Implications of Video Data Encryption on
Paper Title:
Cloud
Abstract: The immense growth in the video content retrieval and video content analysis have motivated the
practitioners to migrate the video contents and the analytic applications on to the cloud. The cloud computing
823. platform provides scalability for applications and data, which enables the application owners to deal with complex
algorithms, which is needed for video content analysis and retrievals. The primary concern of the video data 4718-
retrieval on cloud services are the weak security for the standard data during migrating from one VM to another 4725
VM. Also, the standard encryption algorithms have failed to demonstrate higher performance during encryption of
a large file. Hence, the demand of the recent research is to ensure reduced performance implications for video
content encryption over cloud services. This work proposes an adaptive encryption and decryption algorithm for
large video data over cloud as Encryption as A Service (EAAS). This work proposes a novel key age calculation
dependent on Quartic Polynomial Randomization. The quartic part utilized in the proposed calculation can produce
numerous defining moments, which makes the calculation results hard to foresee and the utilization of polynomial
randomization can further build the haphazardness of the defining moments. Likewise, the higher size of the video
information must be diminished without rotting the data and without trading off the security. Subsequently, this
work proposes a novel key edge comparability extraction procedure utilizing versatile movement. The similitude
areas in the key casings contains comparable data and, in this manner, can be scrambled all around. This diminishes
the time unpredictability to a more noteworthy broaden. Associated with the comparable line of advancement, this
work likewise proposes time limited encryption and unscrambling calculations, which can separate between the
comparable and unique areas and decrease the time intricacy further. The proposed algorithm demonstrates nearly
40% improvements over the standard encryption algorithms.

Keyword : Key Generation, Quartic Polynomial, Polynomial Randomization, Key Frame Similarity,
Similarity Region Extractor, Adaptive Progression, Time Restricted Encryption, Time Restricted Decryption.
References:
1. C. Tikkinen-Piri, A. Rohunen, J. Markkula, "EU general data protectionregulation: Changes and implications for personal data
collecting companies", Comput. Law Secur. Rev., vol. 34, pp. 134-153, Feb. 2018.
2. G. Pillai, Caught on Camera: You are Filmed on CCTV 300 Times a Day in London, May 2012, [online] Available:
https://www.ibtimes.co.uk/britain-cctv-camera-surveillance-watch-london-big-312382.
3. Dey NS, Gunasekhar T (2019) A comprehensive survey of load balancing strategies using hadoop queue scheduling and virtual
machine migration. In: IEEE Access
4. A. Cavallaro, "Privacy in video surveillance", IEEE Signal Process. Mag., vol. 24, no. 2, pp. 166-168, Mar. 2007.
5. Q. M. Rajpoot, C. D. Jensen, V. Kumar, J. Svenson, "Video surveillance: Privacy issues and legal compliance" in Promoting Social
Change and Democracy Through Information Technology, Hershey, PA, USA:IGI Global, pp. 69-92, 2015.
6. C. Babel, Privacy and the EU GDPR US and UK Privacy Professionals, 2017, [online] Available:
http://www.corporatecomplianceinsights.com/wp-content/uploads/2017/11/TrustArc-Privacy-and-the-EU-GDPR-Research-Report-
09.26.17.pdf.
7. T. Naga Raja, Dr V.V. Venkata Ramana, A. Damodharam, Video Summarization using Adaptive Thresholding by Machine Learning
for Distributed Cloud Storage, International Journal of Engineering and Advanced Technology (IJEAT), ISSN: 2249-8958, Volume-
8 Issue-5, June 2019
8. G. Mainard, Data Protection Issues, Jun. 2018, [online] Available: https://www.localenterprise.ie/DublinCity/Start-or-Grow-your-
Business/Knowledge-Centre/eBusiness/Data-Protection-Issues/.
9. D. George, K. Reutimann, A. Tamò-Larrieux, "GDPR bypass by design? Transient processing of data under the GDPR", SSRN
Electron. J., Aug. 2018.
10. G. Petro, Facebook’s Scandal and GDPR are Creating New Opportunities for Retail, Jul. 2018, [online] Available:
https://www.forbes.com/sites/gregpetro/2018/05/27/facebooks-scandal-and-gdpr-are-creating-new-opportunities-for-
retail#481601a6626c.
11. Anonymisation and pseudonymisation | Data Protection Commissioner, Feb. 2018, [online] Available:
https://www.dataprotection.ie/en/guidance-landing/anonymisation-and-pseudonymisation.
12. S. Stalla-Bourdillon, A. Knight, "Anonymous data v. personal data-false debate: An EU perspective on anonymization
pseudonymization and personal data", Wisconsin Int. Law J., vol. 34, no. 2, pp. 284-322, 2017.
13. S. Gilad-Gutnick, E. S. Harmatz, K. Tsourides, G. Yovel, P. Sinha, "Recognizing facial slivers", J. Cogn. Neurosci., vol. 30, no. 7,
pp. 951-962, Jul. 2018.
14. In the Picture: A Data Protection Code of Practice for Surveillance Cameras and Personal Information Version 1.2., Jul. 2019,
[online] Available: https://ico.org.uk/for-organisations/guide-to-data-protection-1998/encryption/scenarios/cctv/.
15. R. Dasari, Y. Prasanth, O. Naga Raju, An analysis of most effective virtual machine image encryption technique for cloud security,
International Journal of Applied Engineering Research 12(24):15501-15508, January 2017
16. Sonal Sharma et al.,RSA algorithm using modified subset sum cryptosystem, 2011 2nd International Conference on Computer and
Communication Technology (ICCCT-2011).

Authors: D. Shyam Prasad, Samiran Chatterjee

Paper Title: Defected Ground Structure Printed Antenna with Triangular Slot
Abstract: Double Layer Single Feed dual resonant frequency patch antenna is presented in this paper. After
design the patch, we are etched triangular and rectangular slots at the top and bottom layer of the patch. After
design the antenna structure, we got a remarkable result and the operating frequencies are used for the various
applications of microwave Communication. Two triangular slots are designed at the top layer from the both sides of
the patch with one rectangular slot from the bottom layer and also one h-type slot is introduced at the middle
portion from the rest at bottom layer to obtain the desired resonant frequency. The different shapes of the patch
used to improve the gain bandwidth performance of the antenna. We get two operating frequencies for this
triangular shaped printed antenna. 1st frequency is applicable for microwave radiometry from aircraft to measure
824. ocean wind speed and rain characteristics in hurricanes and the other is used to design BeO POWER CHIP
RESISTOR which is applicable for Microwave and RF high power communication, microwave amplifiers and 4726-
power dividers. This paper includes an extensive analysis of simulated results for this above mentioned microstrip 4729
printed patch antenna. All results are simulated and verified by the network analyzer. Due to the basic
characteristics of proposed printed antenna, it is suitable for the applications in long distance radio
telecommunication systems. It is also applicable for satellite communication and microwave relay systems.

Keyword : Compact, Ground Plane, Layer and Feed, Operating Frequency, Slot.
References:
1. I. Sarkar, P. P. Sarkar, S. K. Chowdhury A new compact printed antenna for mobile communication. 2009 Loughborough Antennas
& Propagation Conference 16-17 Nov. 2009, Loughborough, UK.
2. Samiran Chatterjee, Joydeep Paul, Kalyanbrata Ghosh, P. P. Sarkar, D.Chanda (Sarkar) and S. K. Chowdhury “A Compact
Microstrip Antenna for WLAN Communication”, National Conference of Electronics, Communication and Signal Processing, 2011,
Paper ID: 116
3. U. Chakraborty, S. Chatterjee, S. K. Chowdhury, and P. P. Sarkar, “Triangular Slot Microstrip Patch Antenna for Mobile
Communication”, India Conference (INDICON), 2010 Annual IEEE, pp 4-7, Paper ID: 511
4. J. -Y. Jan and L. -C. Tseng, “Small planar monopole Antenna with a shorted parasitic inverted-L wire for Wireless communications
in the 2.4, 5.2 and 5.8 GHz bands” , IEEE Trans. Antennas and Propag., VOL. 52, NO. 7, July 2004, pp -1903-1905.
5. S. Chatterjee, U. Chakraborty, I.Sarkar, S. K. Chowdhury, and P. P. Sarkar, “A Compact Microstrip Antenna for Mobile
Communication”, India Conference (INDICON), 2010 Annual IEEE, pp 1-3, Paper ID: 510
6. Danideh, A., R. S. Fakhr, and H. R. Hassani, “Wideband coplanar microstrip patch antenna,” Progress In Electromagnetics Research
Letters, PIER 4, 81–89, 2008.
7. Samiran Chatterjee, Joydeep Paul, Kalyanbrata Ghosh, P. P. Sarkar and S. K. Chowdhury “A Printed Patch Antenna for Mobile
Communication”, Convergence of Optics and Electronics conference, 2011, Paper ID: 15, pp 102-107
8. J. Bahl and P. Bhartia, “Microstrip Antennas”, Artech House, Dedham, MA, 1980.
9. P Ravali, S Chatterjee, KR Reddy, N Raju, AR Kumar,” Size Deduced Printed Antenna for W-LAN Applications” - Advances in
Decision Sciences, Image Processing …, 2020, Springer book Series
10. U. Chakraborty, S. Chatterjee, S. K. Chowdhury, and P. P. Sarkar, "A compact microstrip patch antenna for wireless
communication," Progress In Electromagnetics Research C, Vol. 18, 211-220, 2011
11. R.Fallahi, A.-A.Kalteh, M. Golparvar Roozbahani, "A novel UWB elliptical slot antenna with band-notched characteristics,"
Progress In Electromagnetics Research C, Vol. 18, 211-220, 2011
12. Samiran Chatterjee, Santosh Kumar Chowdhury, Partha Pratim Sarkar and Debasree Chanda Sarkar, “Compact Microstrip Patch
Antenna for Microwave Communication”, Indian Journal of Pure & Applied Physics, Vol. 51, November 2013, pp 800-807.
13. Werner, D.H and S.Ganguly, “An overview of fractal antenna engineering research”, IEEE Antennas and Propagation Magazine,
Vol. 45, No. 1, 38-57, 2003
14. A.Aggarwal and M.V.Kartikeyan, “Pythagoras Tree: A Fractal Patch Antenna for multi-frquency and ultra-Band-Width Operations”,
Progress in Electromagnetics Research C, Vol. 16, 25-35, 2010
15. Gianvittorrio, J.P and Y. Rahmat-Samii, “Fractal Antennas: A novel antenna miniaturization technique and applications”, IEEE
Antennas and Propagation Magazine, Vol. 44, No. 1, 20-36, 2002
16. Carles Puente Baliarda, Jordi romeu and Angel Cardama, “The Koch Monopole: A small fractal antenna”, IEEE T ransactions on
antennas and propagation, Vol. 48, No. 11, 1773-1781, November-2000
17. M. Saed and R. Yadla, “Microstrip fed low profile and compact dielectric resonator antenna”, Progress in Electromagnetics
Research, PIER-56, 151-162, 2006
18. Aldo Petosa and Apisak Ittipiboon, “Dielectric Resonator Antennas: A Historical review and the current state of the Art”, IEEE
Antennas and Propagation Magazine, Vol. 52, No. 5, pp 91-116, October 2010
19. Zeland Software Inc. IE3D: MOM-Based EM Simulator. Web: http://www.zeland.com

Authors: S.Sridhar, S.Sabareesan and R.Kannan

Paper Title: Finite Element Method of Nickel Chromium and Nickel Vanadium for Alternative CNC Machine Tool
Abstract: CNC tool is generally made of high speed steel (HSS) which has shorter life due to the increasing
depth of cut. The steel shank wears within a short life time by the chips produced during machining process. And
even the tool material cannot withstand a large amount of load. The damaged tool material is analysed and an
alternate material is used to manufacture the tool. Alternate material used to manufacture the CNC tool which
would have properties superior than HSS. The objective of this paper is to analyze the temperature increase & the
thermal deformation of different materials like nickel-chromium and nickel-vanadium using Finite Element
Analysis.

825. Keyword : CNC Machine tool, Nickel-chromium and Nickel-vanadium


References 4730-
1. H.E Merritt, “Theory of Self-Excited Machine Tool Chatter—Research I”, ASME journal of engineering for industry, vol. 17, pp. 4733
447-454, 1965.
2. S. Smith and J. Tlusty, "An Overview of Modeling and Simulation of the Milling Process," ASME journal of engineering for
industry, vol. 113, pp. 169-175, 1991.
3. Y. Altintas, “Heat transfer and life of metal cutting tools in turning”, International Journal of Heat and mass transfer, vol. 41, pp.
613-623, 1998.
4. P.K Prasanna, C.T Shreelakshmi, V.H Shruti, and N. Radha Bai, “Chip Formation and Cycle Time in Turning of EN-24 and EN-31
Material”, International journal of engineering sciences & research technology vol. 3(11), pp. 574 – 582, 2014.
5. M.A Baradie, "Statistical Analysis of the Dynamic Cutting Coefficients and Machine Tool Stability", ASME journal of engineering
for industry, vol. 115, pp. 205-215, 1993.
6. N.H Cook, "Tool Wear and Tool Life", ASME journal of engineering for industry, vol. 95, pp. 931-938, 1973.
7. S.M Pandit, T.L Subramanian and S.M Wu, "Modeling Machine tool Chatter by Time-Series", ASME journal of engineering for
industry, Vol. 97, pp. 211-215, 1975.

Authors: Ranjith R, Jothi S, Chandrasekar A

Paper Title: Personality Trait Analysis by Graphology Technique using Machine Learning
Abstract: Graphology is a technique for analyzing an individual’s personality based on the given sample of
their handwriting. Graphology considers the fact that the movement of our hand is directly related to the state of our
brain. This paper implements the techniques of graphology using machine learning. The pre-defined data about the
826. analysis of handwriting is given as learning data set for the machine. An image of a handwritten text document in
jpg format is given as input to this machine. The processed output gives the personality of the individual 4734-
corresponding to the input handwriting.
4737

Keyword : Graphology, SVM algorithm, personality, analysis, sample of handwriting, pre-defined data set.
References:
1. Andrew W. Senior and Anthony J. Robinson, “An Off-Line Cursive Handwriting Recognition System”, IEEE Transactions on Pattern
Analysis and Machine Intelligence, Vol. 20, No. 3, March 1998.
2. Bouchra El qacimy, Mounir Ait kerroum and Ahmed Hammouch, “Handwritten Digit Recognition based on DCT features and SVM
Classifier”, 2014 IEEE.
3. C. Hertel and H. Bunke, “A Set of Novel Features for Writer Identification,” Proc. Int’l Conf. Audio- and Video-Based Biometric Person
Authentication, pp. 679-687, 2003.
4. Cho, S. B. “Neural-network classifiers for recognizing totally unconstrained handwritten numerals,” IEEE Transactions on Neural
Networks, Volume 8, Issue 1, 1997, pp.43–53.
5. C.L. Liu, K. Nakashima, H. Sako, and H. Fujisawa, “Handwritten digit recognition: benchmarking of state-of-the-art techniques,” Pattern
Recognition, vol. 36, no. 10, pp. 2271–2285, 2003.
6. Dharam Veer Sharma, Geeta Saini, Mohit Joshi, “Statistical Feature Extraction Methods for Isolated Handwritten Gurumukhi Script”, Vol.
2, Issue 4, July-August 2012, pp.380-384.
7. D. M. Monro, S. Rakshit, and D. Zhang, “Dct-based iris recognition,” Pattern Analysis and Machine Intelligence, IEEE Transactions on,
vol. 29, no. 4, pp. 586–595, 2007.
8. D.Y.C. Leung, C.H. Liu, “Limitations of the relative standard deviation of win percentages for measuring competitive balance in sports
leagues” Economics Letters, Volume 109, Issue 1, October 2010, pp. 38-41.
9. Effective Multiple-features Extraction for Off-line SVM-Based Handwritten Numeral Recognition. By Shen-Wei Lee and Hsien-Chu Wu.
2012 IEEE.
10. H.Bunke, M. Roth, and E.G. Schukat-Talamazzini, “Off-Line Cursive Handwriting Recognition Using Hidden Markov Models,” Pattern
Recognition, vol. 28, no. 9, pp. 1399-1413, 1995.
11. Hu Guosheng, Zhang Guohong, “Comparison on neural networks and support vector machines in suppliers' selection,” Journal of Systems
Engineering and Electronics, Volume 19, Issue 2, April 2008, pp. 316̽ 320.
12. Jaime Melendez, Miguel Angel Garcia, Domenec Puig, Maria Petrou. “Unsupervised texture-based image segmentation through pattern
discovery,” Computer Vision and Image Understanding, Volume 115, Issue 8, 2011,pp. 11211133.
13. J.C. Simon and O. Baret, “Regularities and Singularities in Line Pictures,” Int’l J. Pattern Recognition and Artificial Intelligence, vol. 5,
nos. 1-2, pp. 57-77, 1991.
14. J.F. Canny, “A Computational Approach to Edge Detection,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 8, pp. 679–698,
1986.
15. Krishna S. Nathan, Homayoon S. M. Bezgi, Jayashree Subrahmonia, Gregory J. Clary and Hzroshz Maruyama, “Real-time online
unconstrained handwriting recognition using statistical methods”, Handwriting Recognition Group IBM Research, T.J. Watson Cen ter,
Yorktown Heights, NY 10598
16. L. Deng, “The mnist database of handwritten digit images for machine learning research,” IEEE Signal Processing Magazine, vol. 29, no.
6, pp. 141– 142, 2012.
17. Ni, J., Zhang, C., & Yang, S. X. “An adaptive approach based on KPCA and SVM for real-time fault diagnosis of HVCBs,” IEEE
Transactions on Power Delivery, 2011, pp. 1960–1971.
18. Richard J. Klimoski and Anat Rafael, “Inferring personal qualities through handwriting analysis”, Journal of Occupational Psy choloxy,
1983,56, I9 1-202.
19. Prof. Seema Kedar, Ms Vaishnavi Nair and Ms. Shweta Kulkarni, “Personality Identification through Handwriting Analysis: A Review”,
International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 1, January 2015.
20. Shen-Wei Lee, Hsien-Chu Wu, “Effective Multiple-features Extraction for Off-line SVM-Based Handwritten Numeral Recognition”, 2012
IEEE.
21. Tal Steinherz, David Doermann, Ehud Rivlin and Nathan Intrator, “Offline Loop Investigation for Handwriting Analysis”, IEEE
transactions on pattern analysis and machine intelligence, vol. 31, no. 2, February 2009
22. V. Govindaraju and R.K. Krishnamurthy, “Holistic Handwritten Word Recognition Using Temporal Features Derived from OffLine
Images,” Pattern Recognition Letters, vol. 17, no. 5, pp. 537-540, 1996.
23. V. Govindaraju, D. Wang, and S.N. Srihari, “Using Temporal Information in Off-Line Word Recognition,” Proc. US Postal Service Fifth
Advanced Technology Conf., pp. 529-543, 1992.
24. Vlad Atanasiu, “Surveys and projects in handwriting analysis”, MIT Postdoctoral fellow, Department of Brain and Cognitive Sciences 77,
Massachusetts Av., Cambridge MA 02139, USA.
25. X.-T. Yuan and B.-G. Hu, “Robust feature extraction via information theoretic learning,” in Proceedings of the 26th Annual International
Conference on Machine Learning. ACM, 2009, pp. 1193–1200.
26. Y. LeCun, L. Jackel, L. Bottou, A. Brunot, C. Cortes, J. Denker, H. Drucker, I. Guyon, U. Muller, E. Sackinger et al., “Compa rison of
learning algorithms for handwritten digit recognition,” in International conference on artificial neural networks, vol. 60, 1995.
27. Ying-Ming Wang, Ying Luo, “Integration of correlations with standard deviations for determining attribute weights in multiple attribute
decision making,” Mathematical and Computer Modelling, Volume 51, Issues 1–2, January 2010.

Authors: S..Bharathi, P.Venkatesan

Paper Title: Composite Fuzzy C Means Image Segmentation


Abstract: In this paper synthetic image segmentation is carried out by Possibilistic Rough kernel intuionistic
Fuzzy c means (PRIKFCM) technique which is proposed in this paper. The results obtained through the proposed
method is compared with FCM, PFCM, RKFCM segmentation techniques. The segmentation accuracy is more
than the segmentation accuracy yielded by other methods. PRIKFCM is a hybrid technique incorporate in it the
concepts of kernelized distance,rough ses,possibilistic and intuionistic concepts in it.the advantage of the proposed
method is more due to the hybridization approach.

Keyword : PCM - Possibilistic c means clustering, PFCM-Possibilistic Fuzzy c means clustering, RCM-
827. Rough c means clustering.
4738-
References: 4743
1. Keh-Shih Chuang, Hong-Long Tzeng, Sharon Chen, Jay Wu and Tzong-JerChen, Fuzzy C-Means Clustering with Spatial
Information for Image Segmentation, Journal of Computerized Medical Imaging and Graphics, vol. 30, pp. 9–15, (2006)
2. K.T.Atanassov,Intuionistic fuzzy sets, VII ITKR’s Session,Sofia,983 (Deposed in Central Science – Technology Library of Bulgaria
Academy of Science – 1697/84).
3. J.Bezdek,” Pattern Recognition with Fuzzy Objective Function Algorithms.” New York: Planum,1981.
4. C.W.Huang,K. P. Lin,M. C. Wu, K. C. Hung,G .S. Liu,,C. H.Jen.,”Intuionistic fuzzy c means clustering algorithm with
neighborhood attraction in segmenting medical image” Springer,SoftComput 2015.
5. T. Chaira., “ A novel intuionistic fuzzy c means clustering algorithm and its application to medical images” Elsevier, 2010
6. Krinidis, S., and Chatzis, v.: ' A robust fuzzy local information Cmeans clustering algorithm', Image Processing, IEEE Transactions
on, 2010,19, (5), pp. 1328-1337
7. Songcan Chen and DaoqiangZhang, Robust Image Segmentation using FCM with Spatial Constraints Based on New Kernel-Induced
Distance Measure,IEEE Transactionon Systems, Man and Cybernetics-Part B, vol. 34(4), August (2004).
8. S.Bharathi and P.Venkatesan,’ A survey on Image Segmentation by Fuzzy C Means Clustering Techniques’,in proc. 2nd
International Conference on Applied and Theoretical Computing and Communication technology of IEEE,2016 pages 613-617
9. Maji, P. and Pal, S.K. ,” RFCM: A Hybrid Clustering Algorithm using rough and fuzzy set”, Fundamenta Informaticae 80.4 (2007) ,
pp.475- 496G. O. Young, “Synthetic structure of industrial plastics (Book style with paper title and editor),” in Plastics, 2nd ed.
vol. 3, J. Peters, Ed. New York: McGraw-Hill, 1964, pp. 15–64.
10. Tripathy, B. K., Tripathy, A., & Rajulu, K. G. (2014). Possibilistic rough fuzzy C-means algorithm in data clustering and image
segmentation. 2014 IEEE International Conference on Computational Intelligence and Computing Research.
11. A. Halder.,”Kernel based rough fuzzy c means clustering optimized using particle swarm optimization” (2015) International
Symposium on Advanced Computing and Communication .

Authors: Dawit Teklu Weldeslasie, Mehamed Ahmed

Paper Title: The Application of Expert Systems in Manufacturing Sector


Abstract: Ethiopia is among the African countries that are following stereotype of Agricultural Development
Led Industrialization (ADLI). In fact, textile and garment sector is the second largest manufacturing industry that
plays a significant role in the development of Ethiopian economy. However, the textile and garment sector is still in
its embryonic stage and the production quality is rather poor, even when compared with other developing countries.
In light of this, the researchers argued that the Ethiopian textile and garment sector is not competitive. Behind the
low performance of the Ethiopian textile and garment industry, there is also lack of specialized and experienced
man power. Therefore, unless a technological improvement of the industry is undertaken, it may not be able to
achieve the set objectives The researchers assess the need and application of expert systems in the textile and
garment industries. They had also assessed the training programs of both textile and garment industries. As a result,
textile and garment industries have not yet applied an expert system, and they have also limited training programs.
Therefore, specific training on defect detection is required. In an effort to address such problem, this study
recommends to integrate expert system for defect detection of textile faults by designing and developing a
prototype. The findings of this research showed 91% (the highest percentage) of the industry workers agreed that a
prototype system which considers employee needs shall be constructed. So, the result of this research becomes an
input for the prototype system development. Therefore, researches encourage textile and garment industries to
implement expert systems.

Keyword : ADLI, Textile, Garment, Manufacturing, Industry, Expert systems


References:
828. 1. Asferi, Bethlehem, “Exploring Pest Management Practices and Development of Knowledge Base System for Pepper Disease
Diagnosis”, Diss, AAU, 2010.
2. Ayde, Amanuel, “Developing an Expert System for Computer and Network Troubleshooting”, Diss. AAU, 2014.
4744-
3. Byamugisha, J., “The Effect of Language on the Adoption of the Google Search Engine among the Banyankore”, International 4749
Journal of Scientific Knowledge.Vol. 3, No. 4.PP 24 – 33, 2013.
4. CengizKahraman, FaikTuncBozbura, Etienne, “Uncertainty Modeling in Knowlege Engineering and Decision Making”, 2012.
5. Chris Davies and Richard Greenough, “The use of Information Systems in Fault Diagnosis”, 2006.
6. Daniel Kitaw and AmareMatebu, “Competitiveness for Ethiopian Textile and Garment Industries: A way forward”, 2010.
7. DawitBekele (Ph.D.), “The Development and Dissemination of Ethiopic Standards and Software Localization for Ethiopia”,
UNESCO’s Project , August 14, 2003.
8. Dlodlo, Nomusa, et al. "A hybrid expert systems architecture for yarn fault diagnosis." Fibres& Textiles in Eastern Europe (2007).
9. F.NelsonFord,"Expert System Support in the Textile Industry: End Product Production Planning Decisions", April 2000.
10. Ganesan, K., & Siva, G, “Multilingual Querying and Information Processing: Information Technology Journal”, 6(5), 751 -755, 2007.
11. Jimes, C., S. Weiss and R. Keep, “Addressing the Local in Localization: A Case Study of Open Textbook Adoption by Three South
African Teachers”, Institute for the Study in Knowledge Management in Education, South Africa, 2013.
12. Kalayu, Gebru. Identifying defect causes of weft greige knitted fabric: the Case of MAA-Garment & Textiles Factory. Diss. Mekelle
University, 2014.
13. Korgaonkar, V. V. and J. Khera, “Auxiliaries in Pre-treatment of Textiles Wet Processing”, Colourage, April 2007, 103-107.
14. NegedeYisihak,TerefeBegna,TibebuSolomon,"TechnologicalCapibalities Of Ethiopian Textile and Garment Industries,",December
/2011.
15. Solomon Geberemariam, “A Self-Learning Knowledge Based System for Diagnosis and Treatment of Diabetes”, 2013.
16. Suh-ill, Song."An Expert System for Yarn Spinning Process Planning and Quality Characteristics Control in Textile Industry."20.1
(1992): 147-157.
17. TagelAboneh, “Knowledge Based System for Pre-Medical Triage Treatment at Adama University Asella Hospital”, 2013.
18. TanveerHussain, and Renzo Shamey, “A knowledge‐based expert system for dyeing of cotton, Part 2: Testing and evaluation”, 2005.
19. Tarekegn, AdaneNega. "Localized Knowledge based System for Human Disease Diagnosis." International Journal of Information
Technology and Computer Science (IJITCS) 8.3 (2016): 43.
20. Weldeslasie, Dawit Teklu, et al. "An Expert System Approach for the Diagnosis and Rectification of Yarn Faults." International
Conference on Mobile Web and Intelligent Information Systems. Springer, Cham, 2019.
Nik Fakhuruddin Nik Hassan, Durga Devi Sandran, Masitah Mohamad, Yusmazura Zakaria, Noor
Authors:
Zuhartini Md Muslim
Paper Title: Estimation of The Age of Bloodstains on Soil Matrices By ATR-FTIR Spectroscopy and Chemometrics
Abstract: Estimating the accurate time of a crime occurred is one of the priceless information in forensics
practice and for the investigation purposes. There are profuse of evidence can be found at the crime scene and each
829. of the evidence will give an important information for the investigation purposes. In this study, the Attenuated
Total Reflection (ATR)- Fourier Transform Infrared (FTIR) technique combined with advanced chemometrics 4750-
method was deployed. For the purpose of determining the age of the bloodstain, two storage conditions; indoor and 4755
outdoor were set up to simulate real crime scene scenario and bloodstains on soil matrices were exposed and
analyzed for selected time intervals for up to 63 days. Six partial least squares regression-discriminant analysis
(PLSR-DA) models were constructed-indoor and outdoor models with 1-63 days-exhibited good performance with
acceptable values of predictive root mean squared error (7.04-16.0) and r2 values (0.45-0.89), respectively. Using
these models, correct classification of the aged bloodstains was calculated up to 70%. In conclusion, the
multivariate analysis based on PLS-DA models indicates that ATR-FTIR spectroscopy, coupled with chemometrics
provides acceptable discrimination for rapid and non-destructive determination the age of bloodstains on soil
matrices in particularly for outdoor and very aged bloodstains.

Keyword : ATR-FTIR spectroscopy, Bloodstains, Chemometrics, Forensic science, PLS-DA


References:
1. P. Thanakiatkrai, A. Yaodam, and T. Kitpipit, "Age estimation of bloodstains using smartphones and digital image analysis".
Forensic Science International, 2013. 233(1-3): p. 288-297.
2. S. H. James, P.E. Kish, and T.P. Sutton, Principles of bloodstain pattern analysis: theory and practice. 2005: CRC Press.
3. W. G. Eckert and S.H. James, Interpretation of bloodstain evidence at crime scenes. 1998: CRC press.
4. M. Kasu, and K. Shires, "The validation of forensic DNA extraction systems to utilize soil contaminated biological evidence". Legal
Medicine, 2015. 17(4): p. 232-238.
5. Lin, H., et al., "Estimation of the age of human bloodstains under the simulated indoor and outdoor crime scene conditions by ATR-
FTIR spectroscopy". Scientific Reports, 2017. 7(1): p. 13254.
6. J.H. An et al., Body fluid identification in forensics. 2012.
7. L. Gefrides and K. Welch, Forensic biology: Serology and DNA, in The forensic laboratory handbook procedures and practice. 20 11,
Springer. p. 15-50.
8. S. Harbison and R. Fleming, "Forensic body fluid identification: state of the art". Res Rep Forensic Med Sci, 2016. 6(2016): p. 11-23.
9. M. A. Jobling and P. Gill, "Encoded evidence: DNA in forensic analysis". Nature Reviews Genetics, 2004. 5(10): p. 739.
10. N. Laan et al., "Volume determination of fresh and dried bloodstains by means of optical coherence tomography". Journal of
Forensic Sciences, 2014. 59(1): p. 34-41.
11. Y. Marumo, "Forensic examination of soil evidence". Japanese Journal of Science and Technology for Identification, 2003. 7(2): p.
95-111.
12. R. Sugita and Y. Marumo, "Screening of soil evidence by a combination of simple techniques: validity of particle size distrib ution".
Forensic Science International, 2001. 122(2-3): p. 155-158.
13. K. Pye and S.J. Blott, "Particle size analysis of sediments, soils and related particulate materials for forensic purposes using laser
granulometry". Forensic Science International, 2004. 144(1): p. 19-27.
14. A. Sikirzhytskaya et al., "Forensic identification of blood in the presence of contaminations using Raman microspectroscopy coupled
with advanced statistics: effect of sand, dust, and soil". Journal of Forensic Sciences, 2013. 58(5): p. 1141-1148.
15. R. Kumar and V. Sharma, "Chemometrics in forensic science". TrAC Trends in Analytical Chemistry, 2018. 105: p. 191-201.
16. C. K. Muro et al., "Vibrational spectroscopy: recent developments to revolutionize forensic science". Analytical Chemistry, 2014.
87(1): p. 306-327.
17. C. M. R. Orphanou, A bioanalytical approach to forensic body fluid identification & age determination. 2015, Staffordshire
University.
18. Y. Fujita et al., "Estimation of the age of human bloodstains by electron paramagnetic resonance spectroscopy: Long-term controlled
experiment on the effects of environmental factors". Forensic Science International, 2005. 152(1): p. 39-43.
19. D. Patterson, "Use of reflectance measurements in assessing the colour changes of ageing bloodstains". Nature, 1960. 187(4738): p.
688.
20. H. Inoue et al., "Identification of fetal hemoglobin and simultaneous estimation of bloodstain age by high-performance liquid
chromatography". International Journal of Legal Medicine, 1991. 104(3): p. 127-131.
21. J. Andrasko, "The estimation of age of bloodstains by HPLC analysis". Journal of Forensic Science, 1997. 42(4): p. 601 -607.
22. R. H. Bremmer et al., "Biphasic oxidation of oxy-hemoglobin in bloodstains". PloS One, 2011. 6(7): p. e21845.

Authors: M.Saravanan, A.Sathish Kumar, R.Devasaran, G.Seshadri, S.Sivaganesan

Paper Title: Performance Analysis of Very Sparse Matrix Converter Using Indirect Space Vector Modulation
Abstract: In this p aper, Matrix Converter is which converts the AC to AC in a single stage. The merits of the
matrix converter is its able to deliver variable output voltage with unrestricted input and output frequency, the lack
of electrolytic capacitors, and the potential to raise the power density, decrease the size, less weight and better input
power quality. In whatever way, application of these converters are restricted because of some issues such as
different control strategies, high susceptibility to input power disturbances, common mode voltage effects and less
voltage transfer ratio. Recently, matrix converters have gained a resurgence of importance due to the improvements
in the semiconductor device industry and the increasing of processor technologies, which promises real
implementation of matrix converters in the control of drives. The real effect of indirect space vector modulation
scheme for very sparse matrix converter performance will be measures by testing of computationally for using
indirect space vector modulation strategies with the passive R load and active load .

830.
Keyword : indirect space vector modulation (ISVM), Matrix converter, Total Harmonics Distortion (THD)
4756-
References: 4762
1. Hashem, GM & Darwish, MK 2004, ‘Generalized symmetrical angle pwm technique for ac voltage controller’, Proceedings of 39th
IEEE Universities Power Engineering Conference, pp. 898-901.
2. Han Zhao & LI Sheng-min 2015, ‘The SVPWM Modulation Strategy of Matrix Converter Base on Multi inverters Reconstruction’,
pp. 1339-1343
3. Wiechmann, E, Ziogas, P & Stefanovic, V 1985, ‘A novel bilateral power conversion scheme for variable frequency static power
supplies’, IEEE Transaction on Industry Applications, vol. IA-21, no.5, pp.1226-1233.
4. Holtz, J & Boelkens, U 1989, ‘Direct frequency converter with sinusoidal line currents for speed variable motors’, IEEE Transactions
on Industrial Electronics, vol. 36, no. 4, pp. 475-479.
5. Neft, CL & Schauder, CD 1992, ‘Theory and design of a 30-hp matrix converter’, IEEE Transactions on Industry Applications, vol.
28, no. 3, pp. 248 – 253
6. Javier Riedemanna, Ivan Andradeb, Ruben Penab, Ramon Blasco-Gimenezc, Jon Clared, Pedro Melína & Marco Riverae 2016,
‘Modulation strategies for an open-end winding induction machine fed by a two-output indirect matrix converter’
7. Klumpner, C & Blaaberg, F 2002, ‘A new cost-effective multi-drive solution based on a two-stage direct power electronic conversion
topology’, Proceedings of Industry Applications Conference, pp. 444 – 452.
8. Kolar, JW, Baumann, M, Schafmeister, F & Ertl, H 2002, ’Novel three-phase AC- DC-AC sparse matrix converter’, Proceedings of
Applied Power Electronics Conference and Exposition, pp. 777 – 791.
9. Wei, L & Lipo, TA 2001, ‘A novel matrix converter topology with simple commutation’, Proceedings of industry Applications
Conference, pp. 1749 – 1754.
10. Maamoun, A 2000, ‘Development of cycloconverters’, Proceedings of IEEE Canadian Conference on Electrical and Computer
Engineering, Quebec, Canada, pp. 521-524.
11. Saravanan.m,2016, ‘Three Phase Dual Input Direct Matrix Converter for Integration of Two AC Sources from Wind Turbines’,
Circuits and Systems, 2016, 7, pp.3807-3817.
12. A.Sathish Kumar, ‘Control of Robot Manipulator Error using FPDI – IQGA in Neural Network’, International Journal of
Computational and Theoretical Nanoscience, Vol.13(3), March 2016, pp. 1740-1748(9).

Authors: Amrut Anilrao Purohit, Mohammed Riyaz Ahmed, R. Venkata Siva Reddy
Area Optimization using Structural Modeling for Gate Level Implementation of SPI for
Paper Title:
Microcontroller
Abstract: The need for miniaturization has been the driving force in chip manufacturing. The proliferation of
IoT, robotics, consumer electronics and medical instruments pose unprecedented demands on the embedded system
design. The area optimization can be achieved either by reducing the size of transistors or by optimizing (reducing)
the circuit at the gate level. The first solution has attracted many researchers while the later has not been explored
to its full potential. The aim is to design a System on Chip (SoC) to satisfy the dynamic requirements of disruptive
technologies while occupying the lesser area. The design and testing of communication interfaces such as Serial
Peripheral Interface (SPI), Inter-IC Communication (I2C), Universal Asynchronous Receiver and Transmitter
(UART) are very crucial in the area optimization of microcontroller design. Since SPI being an important
communication protocol, this work reports the preliminary research carried in the design and verification of it. In
this work, Verilog is used for the design and verification of the SPI module. The results show that there is a drastic
reduction in the number of Look-Up-Tables (LUTs) and slices required to build the circuit. We conclude that
sophisticated optimization techniques of the circuit at the gate level has the potential to reduce the area by half.

Keyword : Area Optimization, Communication Protocol, Serial Peripheral Interface, Structural Modeling.
References:
1. Gal, R., Golda, A., Frankiewicz, M., & Kos, A. (2011, June). FPGA implementation of 8-bit RISC microcontroller for embedded systems.
In Proceedings of the 18th International Conference Mixed Design of Integrated Circuits and Systems-MIXDES 2011 (pp. 323-328).
831. IEEE.
2. Sandya, M., & Rajasekhar, K. (2012). Design and verification of serial peripheral interface. Int. J. Eng. Trends Technol, 3(4), 522-524. 4763-
3. Anand, N., Joseph, G., Oommen, S. S., & Dhanabal, R. (2014, January). Design and implementation of a high speed Serial Peripheral
Interface. In 2014 International Conference on Advances in Electrical Engineering (ICAEE) (pp. 1-3). IEEE.
4768
4. KUMAR, K. A., & KRISHNA, M. S. (2015). Design and Functional Verification of A SPI Master Slave Core using UVM.
5. Chen, R., Huang, S. Z., Lin, W., & Li, L. (2009, December). Design and implementation of a reused interface. In 2009 First International
Conference on Information Science and Engineering (pp. 2603-2605). IEEE.
6. Kaneriya, H., & Jagpat, S. (2015). Design of I2C Master with Multiple Slave. IJRSTCC, 3, 2890-2893.
7. Oudjida, A. K., Berrandjia, M. L., Liacha, A., Tiar, R., Tahraoui, K., & Alhoumays, Y. N. (2010, June). Design and test of ge neral-purpose
SPI Master/Slave IPs on OPB bus. In 2010 7th International Multi-Conference on Systems, Signals and Devices (pp. 1-6). IEEE.
8. Jain, N., & Jain, P. Implementation of Serial Peripheral Interface Protocol for LCD.
9. Leens, F. (2009). An introduction to I 2 C and SPI protocols. IEEE Instrumentation & Measurement Magazine, 12(1), 8-13.
10. Liu, T., & Wang, Y. (2011, June). IP design of universal multiple devices SPI interface. In 2011 IEEE International Conference on Anti-
Counterfeiting, Security and Identification (pp. 169-172). IEEE.
11. Kundu, M., & Kumar, A. (2014). Implementation of Low Power SPI Protocol with Clock Domain Crossing. IJRIT, 1(2), 26-29.

Mueller, S. (2003). Upgrading and repairing PCs. Que Publishing.


12. Agarwal, V. I. V. E. K., Arya, H. E. M. E. N. D. R. A., & Bhaktavatsala, S. H. I. V. A. R. A. M. (2009). Design and development of a real-
time DSP and FPGA-based integrated GPS-INS system for compact and low power applications. IEEE Transactions on Aerospace and
Electronic Systems, 45(2), 443-454.
13. Oudjida, A. K., Berrandjia, M. L., Tiar, R., Liacha, A., & Tahraoui, K. (2009, December). Fpga implementation of i 2 c & spi protocols: A
comparative study. In 2009 16th IEEE International Conference on Electronics, Circuits and Systems-(ICECS 2009) (pp. 507-510). IEEE.
14. Gopal, N. (2015). Spi controller core: Verification. SSRG International Journal of VLSI & Signal Processing (SSRG-IJVSP), 2(5), 1-7.
15. Eswari, B., Ponmagal, N., Preethi, K., & Sreejeesh, S. G. (2013, April). Implementation of I 2 C master bus controller on FPG A. In 2013
International Conference on Communication and Signal Processing (pp. 1113-1116). IEEE.
16. Mukthi, S. L., and A. R. Aswatha. "Design and Implementation of an Interfacing Protocol between I2C and APB for an AMBA Based
SOC."

Authors: R. Gayathiri, M. Nalini

Paper Title: Vehicle Ignition Override System to Avoid Drunken Drive


Abstract: Safety is one of the very important aspects while driving. Drunken driving can cause accidents of
higher intensity with a huge damage to the vehicle and the people travelling in it. In this paper we propose a vehicle
ignition override mechanism that will help in avoiding drunk and drive accidents to a huge extent. We propose a
system that uses an ethyl alcohol sensor more commonly known as alcohol sensor to detect the presence of alcohol
832. in the driver’s breath and a pulse sensor to collect the heart rate of the driver. The system is controlled by a
microcontroller which is also interfaced with GPS and GSM modules to send the details of the location of the car to
4769-
the emergency contacts and owners in case of rented cars. Also, the main aim of the proposed system is to switch of
4771
the car engine to avoid any further damage to the life.

Keyword : GPS, GSM, Alcohol Sensor, Pulse Sensor.


References:
1. Khaleefa Al Hammadi, Mohammed IsmaeeL and Tarig Faisal, “Intelligent car safety system”, 2016 IEEE Industrial Electronics and
Applications Conference (IEACon), Kota Kinabalu, Malaysia
2. Pritpal Singh, Tanjot Sethi , Bunil Kumar Balabantaray and Bibhuti Bhushan Biswal, “Advanced vehicle security system”, 2015
International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore, India
3. Suresh, P., and B. Baskaran. "Reduction of Line Losses by using Interline Dynamic Voltage Restorer." International Journal of Control
Theory and Apllication 9, no. 25 (2016): 417-422.
4. Prashanth K P,Padiyar,K.Naveen KPH,Kumar KS,Road Accident Avoiding System Using DrunkenSensing Technique.International
Journal of Engineering Research and Tech .2014:3(10):818-823
5. Suresh, P., and B. Baskaran. "Voltage sag compensation in multiline distribution system using closed loop controlled
IDVR." International Journal of Applied Engineering Research 12, no. 8 (2017): 1576-83.
6. Vijay J,Saritha B,Priyadharshini B,Deepika S,,Laxmi R” Drunken Driven Protection System “International Journal of Scientific and
Engg Rresearch 2011;2(12):1-4

Authors: Alexi Delgado, Ricardo Cuba, Henry Jamanca, Ana Sampen, Chiara Carbajal

Paper Title: Social Impact Assessment in La Oroya, Peru Applying the Grey Clustering Method
Abstract: The social conflict presented in the city of La Oroya, of a national government issue type, is
considered by the Ombudsman's Office as a latent social conflict during the month of April 2019; therefore,
analyses, agreements, meetings and dialogue tables are presented, which allow subjective evaluations of the
problematic reality, complicating the correct decision making. For which, the application of the Grey Clustering
method is proposed to quantify the social impact presented in the city of La Oroya; the surveys were conducted on
Sunday, June 2, 2019, containing 08 questions (same number of criteria to evaluate) that were answered by 20
settlers, such answers were evaluated with the Grey Clustering method obtaining as a result that the social impact in
the city of La Oroya is of normal level.

Keyword : Environmental pollution, Grey clustering, Social impact assessment.


References:
1. A. Burgos, “Doe Run: La contaminación invisible,” Revista Ideele.
2. El Comercio Perú, “La Oroya: todo lo que tienes que saber sobre el conflicto,” El Comercio Perú, Junín, Aug-2015.
3. J. Wei, L. Zhou, F. Wang, and D. Wu, “Work safety evaluation in Mainland China using grey theory,” Appl. Math. Model., vol. 39, no. 2,
pp. 924–933, 2015.
4. P. V Prenzel and F. Vanclay, “How social impact assessment can contribute to conflict management,” Environ. Impact Assess. Rev., vol.
45, pp. 30–37, 2014.
833. 5. RPP Noticias, “Doe Run: Una historia de contaminación y acuerdos incumplidos | RPP Noticias,” 2012. .
6. Consejo Editorial, “Sobre el conflicto en La Oroya por el caso Doe Run: ¿Morir de hambre o morir contaminado? Análisis del co nflicto y 4772-
el rol cómplice del Estado,” Parthenon, Aug-2015.
7. “Luis Castillo Carlos: ‘Con La Oroya paralizada el Perú perdió US$ 5.500 millones’ | Doe Run,” La República, Jan-2019.
4775
8. ICMM, “Mining: Partnerships fpr development toolkit,” Int. Counc. Min. Met. (ICMM), London, UK., 2011.
9. W. Diaz, “Estrategia de gestión integrada de suelos contaminados en el Perú,” Rev. del Inst. Investig. FIGMMG-UNMSM, vol. 19, no. 38,
p. 106, 2016.
10. Defensoria del Pueblo, “Reporte mensual de conflictos sociales n o 182.”
11. A. Delgado and I. Romero, “Social impact assessment on a hydrocarbon proyect using triangular whitenization weight functions,” in 2016
IEEE Congreso Argentino de Ciencias de la Informática y Desarrollos de Investigación (CACIDI), 2016, pp. 1–6.
12. S. Liu and Y. Lin, Grey Systems: Theory and Applications. Berlin: Springer, 2010.
13. A. Delgado, “Citizen criminality assessment in lima city using the grey clustering method,” in 2017 IEEE XXIV International Conference
on Electronics, Electrical Engineering and Computing (INTERCON), 2017, pp. 1–4.
14. Y. Zhang, J. Ni, J. Liu, and L. Jian, “Grey evaluation empirical study based on center-point triangular whitenization weight function of
Jiangsu Province industrial technology innovation strategy alliance,” Grey Syst. Theory Appl., vol. 4, no. 1, pp. 124–136, 2014.
15. A. Delgado, “Social conflict analysis on a mining project using shannon entropy,” in 2017 IEEE XXIV International Conference on
Electronics, Electrical Engineering and Computing (INTERCON), 2017, pp. 1–4.
16. L. Zhou and S. Xu, “Application of Grey Clustering Method in Eutrophication Assessment of Wetland,” J. Am. Sci., vol. 2, no. 4, pp. 53–
58, 2006.
17. A. Delgado, “Why do any secondary students prefer the mathematics? A response using grey systems,” in Proceedings of the 2017
International Symposium on Engineering Accreditation, ICACIT 2017, 2018.
18. X. S. Warnaars, “Why be poor when we can be rich? Constructing responsible mining in El Pangui, Ecuador,” Resour. Policy, vol. 37, no.
2, pp. 223–232, 2012.
19. G. Fontaine, “The effects of energy co-governance in Peru,” Energy Policy, vol. 38, no. 5, pp. 2234–2244, 2010.
20. M. Sadeghi and A. Ameli, “An AHP decision making model for optimal allocation of energy subsidy among socio -economic subsectors in
Iran,” Energy Policy, vol. 45, pp. 24–32, 2012.

Authors: Alexi Delgado, Areli Luyo, Mario Moreno, Chiara Carbajal

Paper Title: Acoustic Insulation Design of Noise in Welding Plant through Screens
Abstract: Noise is one of the industrial hygiene agents of greatest concern, which explains the large amount
of regulations and literature that attempt to reduce it. In most industries in Peru and the world the welding process
is indispensable as part of their production process, nevertheless this activity involves several risks for people, not
only for those who perform the activity but also those who are adjacent to it, within these risks, exposure to high
834. levels of noise is one of the most difficult to control because the control at the source of noise is almost, one of the
great passive controls in noise reduction is the use of screens or acoustic curtains. It is for this reason that the
objective of this article is to propose a design of acoustic barriers through screens, responding to the problem of 4776-
noise generated in welding workshops. The stages in the process of designing acoustic screens for a welding plant 4779
are presented in chronological order.

Keyword : Acoustic Screen, Noise, Sound Level, Welding plant.


References:
1. A. Delgado, D. Vriclizar, and E. Medina, “Artificial intelligence model based on grey systems to assess water quality from Sa nta river
watershed,” in Proceedings of the 2017 Electronic Congress, E-CON UNI 2017, 2018, vol. 2018-Janua.
2. A. Delgado, “Social conflict analysis on a mining project using shannon entropy,” in Proceedings of the 2017 IEEE 24th International
Congress on Electronics, Electrical Engineering and Computing, INTERCON 2017, 2017.
3. M. Baradarnfar et al., “Amplitude changes in otoacoustic emissions after exposure to industrial noise,” Noise Heal., vol. 14, no. 56, p. 28,
2012.
4. J. Ávila, N. Del Rosario Ruiz, and M. Timarán, “EFECTOS EN LA SALUD DE LOS TRABAJADORES EXPUESTOS AL RUIDO
PRODUCIDO POR LA MAQUINARIA DE CONSTRUCCIÓN VIAL,” UNIVERSIDAD CES DE MEDELLÍN, 2015.
5. M. Gómez, J. Jaramillo, Y. Luna, A. Martínez, M. Velásquez, and E. Vásquez, “Ruido industrial: efectos en la salud de los tra bajadores
expuestos,” Jun-2012.
6. A. H. Suter, “ENCICLOPEDIA DE SALUD Y SEGURIDAD EN EL TRABAJO,” 2001.
7. L. F. Sexto, “EL CONTROL PASIVO DE RUIDO COMO ELEMENTO DE LA SEGURIDAD INDUSTRIAL,” La Habana.
8. A. Hernández and B. González, “ALTERACIONES AUDITIVAS EN TRABAJADORES EXPUESTOS AL RUIDO INDUSTRIAL,”
208, 2007.
9. A. Delgado, “Citizen criminality assessment in lima city using the grey clustering method,” in Proceedings of the 2017 IEEE 24th
International Congress on Electronics, Electrical Engineering and Computing, INTERCON 2017, 2017.
10. A. Delgado, “Why do any secondary students prefer the mathematics? A response using grey systems,” in Proceedings of the 2017
International Symposium on Engineering Accreditation, ICACIT 2017, 2018.
11. A. Delgado and I. Romero, “Social impact assessment on a hydrocarbon proyect using triangular whitenization weight functions,” in
CACIDI 2016 - Congreso Aergentino de Ciencias de la Informatica y Desarrollos de Investigacion, 2016.
12. W. Shiqiang, S. Ruixiang, Y. Kun, and W. Yu, “The research of noise induced tympanic membrane perforation in cotton textile industry,”
in 2008 IEEE International Conference on Industrial Engineering and Engineering Management, IEEM 2008, 2008, pp. 1587–1590.
13. W. G. Wang, “Assessment of social environment impact of the highway construction based on the gray matter-element of information
entropy model,” in Energy and Environment Technology, ICEET ’09, International Conference, 2009, vol. 3, p. 310.
14. F. PFRETZSCHNER, J.; SIMON, “Barreras Acústicas y Ruido de Tráfico,” Inst. ACÚSTICA, CSIC Rev. ACÚSTICA, vol. 28, no. 3–4,
1997.
15. J. Wei, L. Zhou, F. Wang, and D. Wu, “Work safety evaluation in Mainland China using grey theory,” Appl. Math. Model., vol. 39, no. 2,
pp. 924–933, 2015.
16. C. Li, K. Chen, and X. Xiang, “An integrated framework for effective safety management evaluation: Application of an improved grey
clustering measurement,” Expert Syst. Appl., vol. 42, pp. 5541–5553, 2015.
17. A. Delgado, A. Aguirre, E. Palomino, and G. Salazar, “Applying triangular whitenization weight functions to assess water quality of main
affluents of Rimac river,” in Proceedings of the 2017 Electronic Congress, E-CON UNI 2017, 2018, vol. 2018-Janua.
18. ISO 9613-2, “Acoustics — Attenuation of sound during propagation outdoors — Part 2: General method of calculation,” 1996.

Authors: Tomy Firmansyah, Abiyyu Ganeswangga, Ahmad Nurul Fajar

Paper Title: Transforming the Monolith E-Procurement Application


Abstract: Digital transformation in IT organizations needs to overcome a number of key challenges: (1) Costs
of change, the customer wants to significantly reduce the cost of technology, and on the other hand the customer
also does not want to fund technological changes that do not produce benefits for him directly. (2) Rate of change,
customers request more frequent release cycles to compensate for changes in information and service requirements.
(3) Quality of change, Increased application scalability. For that reason, IT organizations in making business
changes need to do what needs to be modular in developing applications and deployments. Architectural
Microservices (MSA) is an alternative architecture in building an application. The MSA conversion process can
start patterns that are adapted to future needs. The release cycle is carried out by implementing automation for
continuous delivery and continuous integration into continuous development, transforming data services into
service forms, so as to answer the challenges of digital transformation. In this paper explains how to transform
architects and their design in the E-Procurement application system using MSA.

Keyword : Microservices, Architecture, SOA, Cloud Computing, and E-Procurement..


References:
1. Cognizant, “Overcoming Ongoing Digital Transformational Challenges with a Microservices Architecture,” Cogniz. 20-20 Insights,
no. november, pp. 1–9, 2015.
835. 2. Wikipedia, “Microservices,” 2019. [Online]. Available: https://en.wikipedia.org/wiki/Microservices. [Accessed: 22-Apr-2019].
3. W. P. Lestari and A. Sujarwo, “DevOps : Disrupsi Pengelolaan ICT Pendidikan Tinggi,” Semin. Nas. Apl. Teknol. Inf. 2018, pp. 26– 4780-
31, 2018.
4. Ecommercewiki, “Procurement Process,” 2019. [Online]. Available: http://en.ecommercewiki.info/logistics/procurement_process. 4784
[Accessed: 01-Apr-2019].
5. R. Kalakota and M. Robinson, e-Business 2.0. 2000.
6. D. Chaffey, E-Business and E-Commerce Management : Strategy, Implementation and practice, Fourth. 2009.
7. Worldbank, “Project: Strengthening Public Procurement in Serbia,” 2016. [Online]. Available:
http://pubdocs.worldbank.org/en/579181449177314554. [Accessed: 20-Feb-2019].
8. Y. Chang, H. Markatsoris, and H. Richards, “Design and implementation of an e-Procurement system,” Prod. Plan. Control, vol. 15,
no. 7, pp. 634–646, 2004.
9. E. Wolff, Microservice: Flexible Software Architecture, First prin. Addison-Wesley, 2017.
10. C. de la Torre, B. Wagne, and M. Rousos, NET Microservices Architecture for Containerized NET Applications. Washington:
Microsoft Corporation, 2019.
11. M. Kalin, Java Web Services: Up and Running, Second Edi. O’Reilly Media, Inc., 2013.
12. S. Baškarada, V. Nguyen, and A. Koronios, “Architecting Microservices: Practical Opportunities and Challenges,” J. Comput. In f.
Syst., vol. 00, no. 00, pp. 1–9, 2018.
13. G. Gruman and A. Morrison, “Microservices : The resurgence of SOA principles and an alternative to the monolith,” PwC Technol.
Forecast, no. 1, pp. 1–8, 2014.
14. X. Larrucea, I. Santamaria, R. Colomo-palacios, and C. Ebert, “Microservices,” Ieee Softw., vol. 35(3), pp. 96–100, 2018.
15. M. Wasson and N. Schonning, “Build microservices on Azure,” Microsoft, 2019. [Online]. Available: https://docs.microsoft.com/en-
us/azure/architecture/microservices/introduction. [Accessed: 01-Apr-2019].
16. M. Wasson, “Build microservices on Azure,” Microsoft, 2019. [Online]. Available: https://docs.microsoft.com/en-
us/azure/architecture/microservices/model/domain-analysis. [Accessed: 01-Apr-2019].
17. E. Evans, Domain-Driven Design: Tackling Complexity in the Heart of Software. Addison Wesley, 2003.
18. R. H. Steinegger, P. Giessler, B. Hippchen, and S. Abeck, “Overview of a Domain-Driven Design Approach to Build Microservice-
Based Applications,” SOFTENG 2017 Third Int. Conf. Adv. Trends Softw. Eng., no. April, pp. 79–87, 2017.
19. S. Balakrushnan et al., “Microservices Architecture – CASE STUDY: Rainyday Grocer,” The Open Group, 2016. [Online].
Available: http://www.opengroup.org/soa/source-book/msawp/p9.htm. [Accessed: 01-Apr-2019].
20. J. Fritzsch, “From Monolithic Applications to Microservices : Guidance on Refactoring Techniques and Result Evaluation,”
Reutlingen University, 2018.
21. E. Risthein, “Migrating the Monolith to a Microservices Architecture: the Case of TransferWise,” TALLINN UNIVERISTY OF
TECHNOLOGY, 2015
22. Dailynews, “Supply chain procurement challenges” 2019. [Online]. Available: http://www.dailynews.lk/2016/06/21/business/85206.
[Accessed: 12-Nov-2019].
23. Richardson, Chris (November 2018). Microservice Patterns. Chapter 1, section 1.4.1 Scale cube and microservices: Manning
Publications. ISBN 9781617294549.

Authors: Subha Hency Jose P, P.Rajalakshmy, P.Manimegalai, K. Rajasekaran

Paper Title: A Novel Methodology for the Design of a Portable Ventilator


Abstract: Ventilator device are external devices that are designed to assist a patient to perform a particular
task. It is to keep up or improve a breathing ability of a person if he encounters problem in his own breathing.
Ventilators play a vital role in human’s life. It is a piece of equipment, software program or product system that is
used to increase, maintain, or improve the functional capabilities of persons with disabilities in breathing period.
This paper deals with the hardware design of a lab model ventilator. A prototype model of the ventilator has been
designed and tested.

Keyword : Ventilator, Respiration, Arduino, portable, flowmeter.


References:
1. H. Güler and F. Ata, "The intelligent tidal volume control," National Conference on Electrical, Electronics and Computer Engineering,
Bursa, 2010, pp.229-233.
2. L. D'Orsi, A. Borri and A. De Gaetano, "Modelling the ventilator-patient interaction: A pressure-cycled control strategy," 2017 IEEE 56th
Annual ConferenceonDecisionandControl(CDC),Melbourne,VIC,2017,pp.5032- 5037,D10.1109/CDC.2017.8264404
3. R. Robert, P. Micheau, O. Avoine, B. Beaudry, A. Beaulieu and H. Walti, "A Regulator for Pressure-Controlled Total-Liquid Ventilation,"
in IEEE Transactions on Biomedical Engineering, vol. 57, no. 9, pp. 2267-2276, Sept. 2010,D10.1109/TBME.2009.2031096
4. M. Borrello, "Adaptive Control of a Proportional Flow Valve for Critical Care Ventilators," 2018 Annual American Control Conference
836. (ACC), Milwaukee, WI, 2018, pp.104-109,D10.23919/ACC.2018.8431425
5. Pressure - Volume Controlled Mechanical Ventilator: Modeling and Simulation Fikret YALÇINKAYA1, Mustafa E. YILDIRIM 2, 4785-
Hamza ÜNSAL3, Kırıkkale University, Faculty of Engineering, Department of Electrical & Electronics Engineering, 71450, 4789
Kırıkkale,Turkey
6. K.Y.Volyanskyy, W.M.HaddadandJ .M.Bailey, "Pressure-andWork- Limited Neuroadaptive Control for Mechanical Ventilation of Critical
Care Patients," in IEEE Transactions on Neural Networks, vol. 22, no. 4, pp. 614- 626, April 2011,D10.1109/TNN.2011.2109963
7. M.Borrello,"Modelingandcontrolofsystemsforcriticalcareventilation," Proceedings of the 2005, American Control Conference, 2005.,
Portland, OR, USA, 2005, pp. 2166-2180 vol.3,D10.1109/ACC.2005.1470291
8. Jenayeh,F.Simon,S.Bernhard,H.RakeandB.Schaible,"Digitalcontrol of a positioning device for a ventilation machine," 1997Europe an
ControlConference(ECC),Brussels,1997,pp.23412346,D10.23919/ECC.1997.7 082455
9. Pressure Dynamic Characteristics of Pressure Controlled Ventilation System of a Lung Simulator Yan Shi, Shuai Ren, Maolin Cai,
Weiqing Xu, and Qiyou Deng Department of Mechanical Engineering, University of Bath, Bath BA2 7AY,UK
10. Optimization of Mechanical Ventilator Settings for Pulmonary Disease States AnupDas ,PrathyushP .Menon,JonathanG .Hardman,and
DeclanG. Bates
11. G. Maria, P. Masselli, S. Silvestri, S. A. Sciuto and P. Cappa, "Circuit compliance compensation in lung protective ventilation," 2006
International Conference of the IEEE Engineering in Medicine and Biology Society, New York, NY, 2006, pp.5603 -
5606,D10.1109/IEMBS.2006.260066
12. Comparison of Actual Tidal Volume in Neonatal Lung Model Volume Control Ventilation using Three Ventilators-H. Toyama, M.D.,
Ph.D., Y. Endo, M.D., Y. Ejima, M.D.,Ph.D.
13. T.Hussain,A.Haider,W.Akram,M.U.Rehman,A.KhanandM.Abbas, "Synchronized intermittent mandatory ventilation mode control using
pulse oximeter," 2018 International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), Sukkur, 2018, pp.
1- 5,D10.1109/ICOMET.2018.8346425
14. Varrecchia, Tiwana& Rinaldi, Martina & Serrao, Mariano &Draicchio, Francesco & Conte, Carmela &Conforto, Silvia & Schmid,
Maurizio &Ranavolo,Alberto.(2018).Journal of ElectromyographyandKinesiology.43. 10.1016/j.jelekin.2018.09.012.

Authors: R.Priyatharshini , Aparajitha.K, Aarthi.B, Dhivya.N


Design and Development of an Efficient Mining Framework for Pre-Cancerous Lesion Detection in
Paper Title:
Lung Using Non-Invasive CT Imaging
Abstract: The ability to analyze and identify meaningful patterns in clinical data must be addressed to
provide a better understanding of disease. Currently existing solutions for disease diagnosis systems are costly, time
consuming and prone to errors, due to the diversity of medical information sources. Lung Disease Diagnosis
individual is based on medical images (Lung CTs) includes Lung segmentation, and the detection of cancerous
lesions in the Lung. Segmenting the region of interest from medical imaging is a challenge, since the images are
varied, complex and can contain irregular shapes with noisy values.In this context, the segmentation of the Region
837.
of Interest from Lung CT and detecting the pre-cancerous lesions is an important research problem that is receiving
growing attention. Hence an efficient methodology on ACM based automatic segmentation and precancerous lesion 4790-
detection is proposed. 4794

Keyword : About Active contour model, Disease diagnosis, Lung Segmentation, Lesion Detection.
References:
1. Damodar Dipika A, Prof. Krunal Panchal, “A Survey of Lung Tumor Detection on CT Images”, December 2015, Volume 2, Issue 12,
JETIR (ISSN-2349-5162).
2. Dao Qiang Zhanga & Song Can Chena, ‘A novel kernelized fuzzy C-means algorithm with application in medical image
segmentation’,Artificial Intelligence in Medicine Elsevier, vol. 32, no. 1, pp. 37-50
3. Deepthy Janardhanan, Dr.R.Satishkumar, “Lung Cancer Detection Using Active Contour Segmentation Model “International Journal of
Innovative Research in Advanced Engineering (IJIRAE)ISSN: 2349-2163 Issue 03, Volume 4 (March 2017) Special Issue .
4. Hongwei Ji, Jiangping He, Xin Yang, Rudi Deklerck, and Jan Cornelis, Senior Member, IEEE, “ACM-Based Automatic Liver
Segmentation From 3-D CT Images by Combining Multiple Atlases and Improved Mean-Shift Techniques”, IEEE JOURNAL OF
BIOMEDICAL AND HEALTH INFORMATICS, VOL. 17, NO. 3, MAY 2013.
5. Jun Lai, Ming Ye, “Active Contour Based Lung Field Segmentation”, 2009 International Conference on Intelligent Human-Machine
Systems and Cybernetics.
6. Karoui,I, Fablet,R, Boucher,J & Augustin, J 2007, ‘Unsupervised region-based image segmentation using texture statistics and levelset
methods’, Proceedngs of WISP IEEE International Symposium on Intelligent Signal Processing, pp. 1-5
7. M Lavanya, P Muthukumaran, “Lung Lesion Detection in CT Scan Images Using the Fuzzy Local Information Cluster Means (FLICM)
Automatic Segmentation Algorithm and Back Propagation Network Classification”, Article 32, Volume 18, Issue 12, December 2017.
8. Minu George, GopikaS, A Survey on Lung Nodule Detection in CT-Images, International Journal of Scientific & Engineering Research,
Volume 6, Issue 12, December-2015 ISSN 2229-5518
9. Pohle, R & Toennies, KD 2001, ‘Segmentation of medical images using adaptive region growing’, International Society for Optic s and
Photonics in Medical Imaging, pp. 1337-1346.
10. S. Kalaivani, Ms. T. Sathiya, Dr. B. Sathiyabhama, “ACM based Segmentation of pulmonary lung nodule in CT images”, ISSN: 1995-
0772 Published BY AENSI Publication EISSN: 1998-1090 2017 May 11(7): pages 592-601.
11. Temesguen Messay a, Russell C. Hardie a, Timothy R. Tuinstra b,” Segmentation of pulmonary nodules in computed tomography using a
regression neural network approach and its application to the Lung Image Database Consortium and Image Database Resource Initiative
dataset”, Medical Image Analysis 22 (2015) 48–62.
12. Withey, DJ & Koles, ZJ 2007,’Three generations of medical image segmentation: Methods and available software’, International Journal
of Bioelectromag, vol. 9, no. 2, pp. 67-68.

Authors: Sarala Patchala, M.Sailaja

Paper Title: Beamforming with Precoders Based Millimeter Wave Communication System
Abstract: The 5G communications are used with baseband Precoders and Beamforming. The Technology is
needed to update, all available characteristics in the present Wireless Communication System (WCS). The Hybrid
Beamforming systems are across in the RF and Digital domain. In the mmWave MIMO system, the numbers of
antennas has increased to improve the Spectral Efficiency of the system. The proposed algorithms observe that
system performance for different SNR range.

Keyword : mmWave, MIMO, 5G


References:
1. .L. Marzetta "Non cooperative Cellular Wireless with Unlimited Numbers of Base Station Antennas" IEEE Transaction Wireless
Communication vol. 9 no. 11, 3590-600 2010.
2. T. S. Rappaport et al., ‘‘Millimeter wave mobile communications for 5G cellular: It will work!’’ IEEE Access, vol. 1, pp. 335 –349,
May 2013.
3. A. Gupta & R. K. Jha, ‘‘A survey of 5G network: Architecture and emerging technologies,’’ IEEE Access, vol. 3, pp. 1206–1232,
2015
4. E. Björnson E. Jorswieck M.Debbah etc "Multi-objective signal processing optimization: The way to balance conflicting metrics in
5G systems" IEEE Signal Process Magazine vol. 31 no. 6, 14-23 2014.
5. H. Yang T.L. Marzetta "Total energy efficiency of cellular large scale antenna system multiple access mobile networks" Proceedings
IEEE 2013.
6. Sarala Patchala, Dr. M. Sailaja “Reducing of PAPR for MIMO OFDM system” IEEE conference International Conference Energy
Communication Data Analytics and Soft computing -2017, p.p.1475-1478. Doi:10.1109/ICECDS.2017.8389690
838. 7. S. Han, C.-L. I, Z. Xu, C. Rowell, "Large-scale antenna systems with hybrid precoding analog and digital Beamforming for
millimeter wave 5G", IEEE Communication. Mag., vol. 53, no. 1, pp. 186-194, Jan. 2015 4795-
8. Sarala Patchala, Dr. M. Sailaja “Improvement spectral efficiency in mmWave MIMO system for 5G communications” IEEE- 4799
2019556-560.DOI: 10.1109/ICCMC.2019.8819756
9. O. El Ayach, S. Rajagopal, S. Abu-Surra, Z. Pi, R. Heath, "Spatially sparse precoding in millimeter wave MIMO systems", IEEE
Trans. Wireless Communication vol. 13, no. 3, pp. 1499-1513, Mar. 2014
10. Y. Lee, C.-H. Wang, Y.-H. Huang, "A hybrid RF/baseband precoding processor based on parallel-index-selection matrix-inversion-
bypass simultaneous orthogonal matching pursuit for millimeter wave MIMO systems", IEEE Trans. Signal Process., vol. 63, no. 2,
pp. 305-317, Jan. 2015.
11. C.E. Chen, "An iterative hybrid transceiver design algorithm for millimeter wave MIMO systems", IEEE Wireless Communication.
Letters, vol. 4, no. 3, pp. 285-288, Jun. 2015.
12. W. Roh et al., "Millimeter-wave Beamforming as an enabling technology for 5G cellular communications: Theoretical feasibility
and prototype results", IEEE Communication. Mag., vol. 52, no. 2, pp. 106-113, Feb. 2014.
13. Sarala Patchala, Dr. M. Sailaja “Ergodic channel capacity of multiple input multiple output system” IJARSE ISSN2319 -8354,
2017,972-979.
14. S. Han, C.-L. I, Z. Xu, S. Wang, "Reference signals design for hybrid analog and digital Beamforming", IEEE Communication.
Lett., vol. 18, no. 7, pp. 1191-1193, Jul. 2014.
15. Sarala Patchala, Dr.M. Sailaja “Massive MIMO system” IJRAT ISSN 2321-9637, 2019, 45-48
16. A. Alkhateeb, O. El Ayach, G. Leus, R. W. Heath, "Hybrid precoding for millimeter wave cellular systems with partial channel
knowledge", Proc. IEEE Inf. Theory Appl. Workshop (ITA’13), pp. 1-5, 2013
17. E.Bjornson, P. Zetter berg, & M.Bengtsson, “Optimal coordinated ̈ Beamforming in the multi cell down link with transceiver
impairments,” in Proceedings IEEE Global Communication Conf. (GLOBECOM), 2012
18. Sarala Patchala, Dr. M. Sailaja “Power Domain Multiplexing Approach in MIMO based Non Orthogonal Multiple Access” IJRAT
ISSN 2321-9637, 2019, 345-351.
19. M. Razaviyayn, G. Lyubeznik, Z.-Q. Luo, "On the Degrees of Freedom Achievable Through Interference Alignment in a MIMO
Interference Channel", IEEE TSP, vol. 60, no. 2, pp. 812-821, 2012.
20. P. Aquilina, T. Ratnarajah, "Performance Analysis of IA Techniques in the MIMO IBC With Imperfect CSI", IEEE TCOM, vol. 63,
no. 4, pp. 1259-1270, 015.

Authors: Vaishali V. Pimple, Archana S. Kulkarni, Suvarna P. Patil, Sanjay J. Dhoble


839.
Paper Title: Plant Essential Oils Based Nanoemulsion Formulations and Its Antibacterial Effect on Some Pathogens
Abstract: Antibiotic resistance is the most challenging problem of concern globally and this is invigorating the
need of newer antimicrobial products with potential antimicrobial properties. Plant products, especially plant
essential oils produce a large array of secondary metabolites as natural antimicrobials. Use of nanotechnology can
add advantages to enhance the antibacterial properties of these essential oils. Present study is focused on
development of nanoemulsions from plant essential oils and to study their antibacterial activities. Tea Tree Oil,
Thyme Oil, Clove leaf and Cinnamon Essential Oils nanoemulsion was formulated using Tween 20 and Tween 80
respectively using probe ultrasonicator. All the formulated Nanoemulsions were then subjected to physicochemical
characterization, stability studies and tested for antibacterial activities using Agar-well diffusion method. Stable
nanoemulsion formulation with maximum antibacterial activity then subjected to droplet size measurements and
polydispersibility index study. Increase in surfactant concentration resulted in reduction in droplet size when
ultrasonication time was constant. Cinnamon oil nanoemulsion 20C4 & 80C4 with pdi index 0.573 and 0.382 and
droplet size 272.3nm and 133.6 nm respectively demonstrated maximum antibacterial activity in Agar-well
diffusion method against S.aureus, E.coli, and S.typhi. When both nanoemulsions were exposed to bacterial growth
curve inhibition study. No potential rise in optical density of test pathogens were observed. The inhibition of
bacterial growth may be due to killing action of cinnamon oil nanoemulsion formulations to initial bacterial
inoculum added to nutrient broth. The study suggests that nanoemulsion formulations from plant essential oils can
be used as natural antimicrobials in variety of products.
Keyword : Agar-well, Bacterial growth inhibition, Droplet size, Essential Oils, Nanoemulsion, polydispersibility
index, Tween 20, Tween80, Ultrasonication
References:
1. Amabile-Cuevas C.F.(2010) C.,Hsueh PR., Kariuki S.,Okeke I. Sosa A., Byarugaba D., Amabile (eds) Antimicrobial Resistance in
developing Countries. 2009,Springer,New York,NY.
2. Liu B,Pop M (2009). Antibiotic Resistance Genes database Nucleic Acid Res.2009, 37, D 443- D 447.
3. N. S. J. (1996). Medicinal Plants -An expanding Role in Development . World Bank Technical paper-320.
4. Bachbauer, K. A. (2010). C. cell -Chemistry of Essential Oils - Handbook of Essential Oil. Boca Raton,, Fla, USA: CRC Press .
5. Gunther, E. (1968). Australia Tea Tree Oils.Per- Essential Oils Rec.
6. E.Crespo, A. Z. (2002). The Medicinal and non-medicinal uses of Thyme: The Genus Thymus. Medicinal and Aromatic Plants--
Industrial Profiles, 263-292.
7. Amiri, H. (2012). Essential Oil Composition and Antioxidant Properties Three thymus species. Evidence based compelmentary and
alternative Medicine, 2012.
8. B.nickavar, F. M.-A. (2005). Analysis of Essential Oils of two Thymus species from Iran. Food chemistry, 90,no 4, 609-611.
9. A.A. El-Nekeety, S. M.-W. (2011). Antioxidant Proerties of Thymus vulgaris oil against aflatoxin -induce oxidative stress in male rats.
Toxicon, 57,no.7-8, 984-991.
10. S.Asbaghian, A. s. (n.d.). Comparison of volatile constiuents and antioxidant and antibacterail activities of essential oils of Thymus
caucasicus,T. kotschyanus and T. vulgaris. natural Products Communications, 6(1), 137-140.
11. Adams, R. P. (2007). Identification of Essentail Oil components by gas chromatography /Mass Spectroscopy (4th edition ed.). Allured
Publishing corporation,Carol stream III.
4800-
12. D.Lorke. (1983). A new approach to acute toxicity testing. Archives of Toxicolgy, 54 (no 4), 275-287. 4808
13. R.vinegar, J. F. (1973). some quantitative temporal characteristics of carragenin induced pleurisy in the rat. Proceedings of the society for
Experimental Biology and Medicine, 143 no.3, pp. 711-714.
14. P.P. Bradley, D. P. (1982). Measurmwent of cutaneous inflammation:estimation of neutrophil content with an enzyme marker. Journal of
investigative Dertmatology, 78(3), 206-209.
15. Cai, l. a. (1996). Compounds from Syzygiumaromaticum possessing growth inhibitory activity against oral pathogens. J.of Natural
Products, 59, 987-990.
16. L.E.Hill, C. a. (2013). characterization of beta cyclodextrin inclusion complexes containg essential oils (trans -
cinnamaldehyde,eugenol,cinnamon bark and clove bud extract) for antimicrobial delivery applications. Food Science and Technology,
51(no.1), 86-93.
17. Small Wonders,Endless frontiers. National Technology initiative.
18. SH Cheng, C. L. (n.d.). Tri-functiionalization of mesoporous silica nanoparticles for comprehensive cancer theranostics
19. Kumar MNVR. (2003). Nano and microparticles as controlled drug delivery devices. Journal of Pharmacy and Pharmaceutical Sciences, 3,
234-258.
20. Anton N, B. J.-P. (2008). RP.,Design and production of nanoparticles formulated from nanoemulsion templates-A Review. Journal of
Controlled Release, 128, p 185-199.
21. Sharma N, B. M. (2010). Nanoemulsion: A new concept of Delivery system. Chronicles of Young Scientists, 1, 2-6.
22. Anna Rita Bilia, C. G. (2014). Essential Oils Loaded Nanosystems: A Developong Startegy for Succesful Therapeutic Approach.
Evidennce Based Complementary And Alternative Medicine(Article ID 651593), 14 pages.
23. A.Bajaj, P. S. (2016). Nanoemulsions: A review. International Journal of Reseacrh In Pharmacy and Chemistry, 13, 114-112.
24. 24.Bernardi, D. S., Daniela, Pereira, T. A., Maciel, N. R., Bortoloto, J., Viera, G. S., Oliveira, G. C., RochaFilho, P. A. , (2011).
"Formation and stability of oil-in-water nanoemulsions containing rice bran oil: in vitro and in vivo assessments", J. Nanobiotechnology.,
9: 44
25. Heydari, M. , Bagheri, M. , Rabieh, S., (2014). "High Energy Ultrasonification Preparation of Thyme Oil Nanoemulsion", in 5th
International Congress on Nanoscience & Nanotechnology, Tehran, Iran
26. 26. Ghosh et al. Cinnamon Oil Nanoemulsion Formulation by Ultrasonic Emulsification: Investigation of Its Bactericidal Activity
Journal of Nano science and Nanotechnology Vol. 13, 114–122, 2013
27. Caillet S., Millette M., Salmieri S., Lacroix M. Combined effects of antimicrobial coating, modified atmosphere packaging, and gamma
irradiation on Listeria innocua present in ready-to-use carrots (Daucuscarota). Journal of food protection. 2006; 69(1): 80-85.
28. Donsì F., Ferrari G. Essential oil nanoemulsions as antimicrobial agents in food. Journal of biotechnology. 2016; 233:106 -120
29. De Sousa J.P., de Azerêdo G.A., de Araújo Torres R., da Silva Vasconcelos M.A., da Conceição M.L., de Souza E.L. Synergies of
carvacrol and 1, 8-cineole to inhibit bacteria associated with minimally processed vegetables. International journal of food microbiology.
2012; 154(3):1451-51.
30. Liang R., Xu S., Shoemaker C.F., Li Y., Huang Q. Physical and antimicrobial properties of peppermint oil nanoemulsions. Journal of
agricultural and food chemistry. 2012; 60(30):7548-7555.
31. Jaiswal, M., Dudhe, R., Sharma, P. K., (2015). "Nanoemulsion: an advanced mode of drug delivery system", Biotech., 5: 123-127.
32. Otoni, C. G., Pontes, S. S. F., Medeiros, E. A. A., Soares, N. F. F., (2014). "Edible Films from Methylcellulose and Nanoemulsions of
Clove Bud (Syzygium aromaticum) and Oregano (Origanum vulgare) Essential Oils as Shelf Life Extenders for Sliced Bread", J. Agric.
Food Chem., 62: 5214-5219
33. Shengjiang Zhang ,Min Zhang, Zhongxiang Fang, Yaping Liu
34. Preparation and characterization of blended cloves/cinnamon essential oil nanoemulsions LWT - Food Science and Technology
35. Publisher: Elsevier Date: January 2017
Authors: Oksana Zghurska, Tetiana Somkina, Ruslan Dymenko, Tetiana Kapelyushna

Paper Title: Diversification Strategy of Entrepreneurial Activity in Conditions of European Integration


Abstract: The article defines the concept of «entrepreneurial risk» as a key element of effective
entrepreneurial activity and an important component of management theory and practice. The mechanism of
calculating the losses of entrepreneurial activity is determined and the causal-consequential connection of the
degree of influence of business risks to the results of economic activity of the enterprise is reflected. The influence
degree of various business risks on the results of economic activity of management subject is indicated. The
concept of «diversification» as one of the of economic types process is substantiated. The identified diversification
as one of the strategic alternatives to the development of the enterprise is emphasized, which allows obtaining
additional economic benefits in the conditions of a complex market situation. The essence of the diversification
process and the disadvantages inherent in the strategy of diversification are determined. Mechanisms of
diversification strategy formation are substantiated. The main forms that are used in the risk management process
based on the strategy of diversification are highlighted. The urgent questions of diversification strategy application
by the countries of the European Union are emphasized. The efficiency of diversification strategy application on
the example of activity of the largest corporations according to sales volumes on the world pharmaceutical market
is considered. The dynamics of sales growth volumes of the world pharmaceutical market is shown. The significant
synergistic effect of two or more enterprises is emphasized, which helps to save resources by reducing costs,
combining complementary resources, growing market weight as priority areas for investment and the conquest of
new markets. The experience of world leaders in implementing the diversification strategy as the driving force of
the unceasing development of the world pharmaceutical industry has been analyzed. Taking into account the
experience of foreign countries, the main directions of diversification strategy application by national enterprises of
the pharmaceutical industry are analyzed. The importance of cooperation with foreign partners as the main strategic
reference point in the development of national entrepreneurship is determined. The proposed conceptual
knowledge-resource-market integration portfolio of diversification strategy of business activity, the advantage of
which is to combine individual knowledge, resource potential and entrepreneurial capabilities to make an effective
economic decision in order to profit and strengthen competitive advantages in the national and foreign markets. It is
emphasized on the importance of quality conformity of national products to European quality standards, as well as
effective integrated approach to production activity, perspective recommendations on the diversification strategy
for national entrepreneurship in the conditions of Eurointegration.

Keyword : entrepreneurial risk; diversification; diversification process; diversification strategy; integration.


840.
References:
1. Tompson, A.A. and Striklend, A.Dzh. (2006), Stratehichnyj menedzhment: kontseptsii ta sytuatsii dlia analizu [Strategic Manag ement: 4809-
Concepts and Situations for Analysis], 12 ed., Moscow: Vydavnychyj dim «Vil'iams» [in Russ.]. 4815
2. Grandell, J. (1992), Aspects of Risk Theory, Springer-Verlag, New York, USA.
3. Tepman, L.N. (2007), Ryzyky v ekonomitsi [Risks in the economy], Moscow: YuNITI [in Russ.].
4. Eddowes, M. and Stensfild, R. (2009), Metody pryjniattia rishen' [Methods of decision making], Moscow: YuNITI [in Russ.].
5. Ansoff, Y. (1999), Novaia korporatyvnaia stratehyia [New corporate strategy], St.Petersburg: Pyter [in Russ.].
6. Smith, A. (2007), Yssledovanye o pryrode y prychynakh bohatstva narodov [A Study on the Nature and Causes of the Wealth of Pe oples],
Moscow: Eksmo [in Russ.].
7. Porter, M. (2008), Konkurentnoe preymuschestvo: Kak dostych' vysokoho rezul'tata y obespechyt' eho ustojchyvost' [Competitive
Advantage: How to achieve a high result and ensure its stability], 2 ed. Moscow: Al'pyna Byznes Buks [in Russ.].
8. Korin'ko, M.D. (2009), «Diversification as a development strategy», Aktual'ni problemy ekonomiky, vol. 5, pp. 12-17 [in Ukr.].
9. Korin'ko, M.D. (2003), «Risks with diversification», Aktual'ni problemy ekonomiky, vol. 7, pp. 69-74 [in Ukr.].
10. Wan, W., Hoskisson, R., Short, J. and Yiu, D. (2011), «Resource-based theory and corporate diversification: Accomplishments and
opportunities», Journal of Management, vol. 8.
11. Aaker, D. (2002), Stratehycheskoe rynochnoe upravlenye [Strategic market management]. St.Petersburg: Pyter [in Russ.].
12. Gort, M. (1962), Diversification and integration in American industry, Prinston University Press, Prinston, USA.
13. Pitts, R.A. and Hopkins, H. D. (1982), “Firm diversity: conceptualization and measurement”, Academy of Management Review, vol. 7, pp.
620-627.
14. Nemchenko, H. Astashkyna, Y. Donetskaia, S. and D'iakonov, K. (2003), «Diversification of production: objectives and directio ns of the
activities», Problemy teoryy y praktyky upravlenyia, vol.5 [in Ukr.].
15. Bohuslavs'kyj, Ye.I. and Shybalkina, Yu.S. (2009), «Diversification strategy: choosing the starting point», Sotsyal'naia ekonomyka.
Kharkiv: Kharkiv National University nam. V. N. Karazin, vol. 2, pp. 182-188 [in Ukr.].
16. Aleksandrov, S. S. (2004), «The strategy of diversification of production as the main direction of strategic development of the enterprise»,
Aktual'ni problemy ekonomichnoho ta sotsial'noho rozvytku vyrobnychoi sfery: mat-ly mizhn. nauk.-teor. konf. molodykh vchenykh i
studentiv [Actual problems of economic and social development of the industrial sphere: materials of the international. sciences-theoretical
conf. young scientists and students]. Donets'k: DonNTU, pp. 75-79 [in Ukr.].
17. IMS Health Market Prognosis (2018), «Total Unaudited and Audited Global Pharmaceutical Market by Region». Retrieved from:
http://www.imshealth.com
18. The State Statistics Service of Ukraine (2017). Pharmaceutical industry in Ukraine. Statistical Bulletin, 2017. Retrieved fro m:
http://www.ukrstat.gov.ua 79 [in Ukr.].
19. Research & Branding Group (2018), «Public health care costs». Retrieved from: www.rb.com.ua/ukr/marketing/tendency/8283 [in Ukr.].
20. Gaboueva, L.A. and Tchepin, O.P. (2006), Orhanyzatsyia y ekonomyka predprynymatel'skoj deiatel'nosty v zdravookhranenyy
[Organization and economics of entrepreneurship in health care]. Moscow: Mezhdunarodnyj tsentr fynansovo- ekonomycheskoho razvytyia
[in Russ.].
21. Baeva, O.V. and Solonenko, I.M. (2007), Upravlinnia pidpryiemnyts'koiu diial'nistiu v haluzi okhorony zdorov'ia [Management of business
activity in the field of health care], Kyiv: MAUP [in Ukr.].
22. Berri, S.N. (1971), «Corporate Growth and diversification», Journal of law and Economics, vol. 14, no. 2, pp. 371-383.
23. Khvesik, M.A. Stepanenko, A.V. Ral'chuk, O.M. and Dorosh, J.M. (2010), Antykryzove upravlinnia ekonomichnoiu bezpekoiu v umov akh
vyklykiv finansovo-ekonomichnoi hlobalizatsii (derzhavnyj i rehional'nyj vymiry) [Anticrisis management of economic security in the face
of challenges of financial and economic globalization (state and regional dimensions)]. Donets'k: Yuho-Vostok [in Ukr.].
24. Osadnik, V. (2001), «The importance of integrating market and resource approaches for strategic enterprise management». Retrieved from:
http://vasilievaa.narod.ru/ptpu/13_4_01.htm [in Ukr.].
Sampath Suranjan, Jason Valladares, Carsan Mario Pereira, Achyut Shaju Sreedharan, Neil Sabin ,
Authors:
Sachidananda HK
Paper Title: Design of a Compressed Air Vehicle
Abstract: Smart mobility solutions aid the growth of smart cities by creating a better quality of life and
reducing its environmental footprint. Emissions from petrol- and diesel-powered vehicles are a major contributor to
the deterioration of air quality around the world. In addition to this, rising fuel prices continue to take a heavy toll
on the pockets of the working class. A favourable countermeasure to this predicament is the fabrication of a vehicle
that takes advantage of the earth’s most abundant resource “Air” as an energy source. The compressed air vehicle is
an eco-friendly vehicle which works on air. This research work aims at designing a cheaper, more efficient and
aesthetically appealing automobile while efficiently running on this renewable energy. The car model has been
designed using the software solid works and tested on ANSYS workbench followed by rigorous trials to ensure its
optimal performance and safety. The designed car can reach speeds ranging from 10-20 km/h while being eco-
friendly and sustainable at the same time. This vehicle can be used for short distance applications such as golf carts,
mall taxis etc.

Keyword : Compressed air, Renewable energy, Vehicle, SolidWorks, ANSYS


References:
1. Ingle, A, H., Rashmi, ambatkar., Ronit, badwaik., Diptanshu, pise., and Amol, dafare., “Literature review paper on the compressed air
vehicle with air motor”, International journal of engineering research & technology (IJERT), Volume 04, Issue 30, 2016, pp. 1-3.
2. Andrew, papson., Felix, creutzig., and Lee, schipper., “Compressed air vehicles drive-cycle analysis of vehicle performance,
environmental impacts, and economic costs”, Transportation research record: Journal of the transportation research board no. 2191,
Transportation research board of the national academies, Washington D.C., (2010), pp. 67–74.
3. Devang, marvania and Sudhakar, subudhi., “A comprehensive review on compressed air powered engine”, Renewable and sustainable
energy reviews, ISSN: 1364-0321, December, 2016, pp. 1-12.
4. Gaurav, kumar,. Gopal, sahu,. Prakash, kumar,. Ritesh, sharma,. and Shailendra Bohidar, “A review paper on study and development of
compressed air engine and their power source”, International journal of science, engineering and technology research (IJSETR), ISSN:
841. 2278 – 7798, Volume 04, Issue 11, November 2015, pp. 3770-3774.
5. Hemant, kumar., Devanshu, goswami., and Vinay, Hablani., “Technical review on study of compressed air vehicle (CAV)”, International 4816-
journal of automobile engineering research & development (IJAERD), ISSN 2277-4785, Volume 03, Issue 01, March, 2013, pp. 81-90.
6. J, purushothaman., K, sarathbabu., and A, arun., “Design and development of compressed air engine”, International journal of recent 4823
engineering research and development (IJRERD) ISSN: 2455-8761, Volume 02, Issue 08, August, 2017, pp. 28-31.
7. Lin, liu., and Xiaoli, yu., “Practicality study on air-powered vehicle”, Higher education press and springer-verlag, 2007, pp. 14-19.
8. Manjunath, B, A., Binu, K, G., Santhosh, H,. and Rahul, Kumar., “Design and fabrication of air driven vehicle”, Journal of mechanical
engineering and automation, 2017, pp. 112-115.
9. Mihai, simon., “Pneumatic vehicle, research and design”, Procedia engineering 181, ISSN: 1877-7058, 2017, pp. 200-205.
10. Rixon, K, L., Mohameed, shareef., Prajith, K, S., Sarath, K., Sreejith, S., and Sreeraj, P., “Fabrication of compressed air bike”,
International research journal of engineering and technology (IRJET), e-ISSN: 2395 -0056, Volume 03, Issue 03, March, 2016, pp. 1863-
1866.
11. N, pavan, kumar., N, V, S, Shankar., and V, S, S, N, prasad, reddy., “Performance of a compressed air engine”, International journal for
research in applied science and engineering technology (IJRASET), ISSN: 2321-9653, Volume 06, Issue 05, May, 2018, pp. 2456-2466.
12. Pokala, saiprasanna, kumar., revu, siva, kumar., Veerapaneni, suresh, Chandra, and Yelle, Rahul., “Working of an compressed air vehicle
by tadpole design: a review”, International journal of current engineering and technology, Volume 07, No 03, June, 2017, pp. 808-814.
13. S, S, verma., “Latest developments of a compressed air vehicle: a status report”, Global journal of researches in engineering automotive
engineering, e-ISSN: 2249-4596, Volume 13, Issue 01, 2013, pp. 15-23.
14. S, S, Verma., “Air powered vehicles”, The open fuels & energy science journal, 2008, 1, pp. 54-56.
15. Saurabh, pathak., Kontham, swetha., V, Sreedhar., V, S, V, prabhakar., “Compressed air vehicle: a review”, International journal of
mechanical and production engineering, ISSN: 2320-2092, Volume 02, Issue 04, April, 2014, pp. 9-14.
16. Sawan, shetty., Sampath, S, S., Mohamed, mohtasim, sharafat, and Chithirai, pon, selvan, M., “Estimation of power and mechanical
efficiency of compressed air powered quad bike”, American international journal of research in science, technology, engineering &
mathematics, 10(1), March-May, 2015, pp. 85-93.
17. Shubham, kumar., Pankaj, kumar, Pradhan., Zakeer, hussain, khan, B., Anil, kumar., and M, chaithanya., “Design and developing of
compressed air engine”, International research journal of engineering and technology (IRJET), Volume: 04 ,Issue: 05, May, 2017
www.irjet.net, pp. 1468-1474.
18. Shubham, suryawanshi., Yash, bharade., Pratik, shetkar., Chetan, pakhale., “air compressed vehicle”, International conference on emerging
trends in engineering and management research, March, 2016, www.conferenceworld.in, pp. 1480-1489.
19. Vishwajeet, singh., “Compressed air engine”, International journal of scientific and research publications, Volume 07, Issue 07, July, 2017,
ISSN: 2250-3153, pp. 403-412.
20. Yuan-Wei, wang., Jhih-Jie, you., Cheng-Kuo, sung., and Chih-Yung, huang., “The applications of piston type compressed air engines on
motor vehicles”, Procedia engineering 79, ISSN: 1877-7058, 2014, pp. 61-65.

Authors: Baswaraju Swathi, Harshvardhan Tiwar

Paper Title: Test Case Generation Process using Soft Computing Techniques
Abstract: Software testing is the SDLC's important and most expensive step. Software testing is difficult and
time-consuming work requiring a great deal of money for software development. Testing is both an operation that
842. is static and adaptive. Software testing process deals with the creation of test cases, checking and validating either
passed or failed test cases. It is unidealistic to check only the discerning parts of the material as a whole at once. It 4824-
is not possible to test the whole system once, so selected parts of the code are considered for analysis. Since the 4831
input space of the Product Under Test (PUT) can be very large, it is important to analyze a representative subset of
test cases. During software testing, the most important task is to build appropriate test cases. An effective set of test
cases can detect more errors. Software testing always requires high deficiencies. Test cases are constructed using
the test data. In the automation of software testing, the important task is to generate test data according to a given
level of competence. The improved test data are determined using the test case development methodology and the
test data adequacy criterion being applied. For increase the level of automation and performance, these aspects of
test case development need to be studied. This paper studies the various test case generation techniques using soft
computing techniques like Genetic Algorithm, Artificial Bee colony methods. Further an evaluation criterion for
the test case generation process, empirical study of Code Coverage and its importance is discussed.

Keyword : Program Under Test, Test case Generation, Test data, Soft computing, Genetic Algorithm,
Artificial Bee Colony
References:
1. Sommerville, I., 2000. “Software Engineering”. 6th Edn., Addison-Wesley, England.
2. Bertolino, A., 2003. Software testing research and practice. Proceedings of the 10th International Workshop on Abstract State Machines,
March 3-7, Taormina, Italy, 244-262.
3. Antonio, P.Salas and B.K. Aichernig, 2006. Automatic test case generation for OCL: A mutation approach, Proceedings of 5th
International Conference Quality Software, January 2006, IEEE Computer Society, pp: 64-71.
4. Kaner, J.D.C., 2003.’ What is a Good Test Case’, Florida Institute of Technology, USA.
5. Jia,X.and H.Liu,2002,Rigorous and Automatic testing of web applications, Proceedings of 6th IASTED International Conference o n
Software Engineering and Applications, May 2002,Honolulu,USA
6. Tran H.2001,Test generation using model checking. European Conference on Software Maintenance and
Reengineering,CSMR2001,http://www.cs.toronto.edu/~chechik/ courses00/csc2108/projects/4.pdf
7. Rayadurgam, S. and M.P.E. Heimdahl, 2001. Test-sequence generation from formal requirement models. Proceedings of the 6th IEEE
International Symposium on High Assurance Systems Engineering, Oct. 22-24, Boca Raton, Florida, pp: 23-23.
8. Ryser, J. and M. Glinz, 2000. SCENT: A method employing scenarios to systematically derive test cases for system test. Technical
Report, http://portal.acm.org/citation.cfm?id=901553.
9. Nilawar, M. and S. Dascalu, 2003. A UML-based approach for testing web applications. M.Sc. Thesis, University of Nevada, Reno.
10. Sinha, A., and C.S. Smidts, 2005. Domain specific test case generation using higher ordered typed languages from specification. Ph.D.
Thesis, University of Maryland.
11. Jaya Srivastaval and Twinkle Dwivedi,SOFTWARE TESTING STRATEGY APPROACH ON SOURCE CODE APPLYING
CONDITIONAL COVERAGE METHOD,International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.3, May
2015
12. Beydeda, S. and V. Gruhn, 2003. BINTEST-Binary search-based test case generation. Proceedings of Computer Software and
Applications Conference, November 2003, Leipzig Univ., Germany, pp: 28-33.
13. Turner, D.A., M. Park, J. Kim and J. Chae, 2008. An activity oriented approach for testing web applications. Proceedings of the 23rd
IEEE/ACM International Conference on Automated Software Engineering, Sept. 15-19, Washington, USA .pp: 411-414.
14. Nicha Kosindrdecha and Jirapun Daengdej, A Test Case Generation Process and Technique, Journal of Software Engineering, 265 -287,
2010.
15. Hajar Homayouni, Hossein Shirazi, Automatic Software Test Case Generation, Article in Journal of Software Engineering 5(3):91-101,
March 2011 Academic Journals Inc.
16. Namita Khurana, RS Chillar, Test Case Generation and Optimisation using UML Models and Genetic Algorithm ICRTC-2015,Published
by Elsevier
17. Rijwan Khan, Mohd. Amjad,2015 IEEE UP Section Conference on Electrical Computer and Electronics (UPCON) Automatic test case
generation for unit software testing using genetic algorithm and mutation analysis
18. Mahesh Shirole, and Rajeev Kumar,A Hybrid Genetic Algorithm Based Test Case Generation Using Sequence
Diagrams,International Conference on Contemporary Computing,IC3 2010:Contemporary Computing pp 53-63
19. Shveta Parnami,Krishna Swaroop Sharma,Empirical Validation of Test Case Generation based on All- Edge Coverage Criteria,
International Journal of Computer Applications,September 2015.
20. Dr. Velur Rajappa, Arun Biradar, Satanik Panda, Efficient Software Test Case Generation Using Genetic Algorithm Based Graph
Theory, First International Conference on Emerging Trends in Engineering and Technology,2008.
21. Ahmed Mateen, Marriam Nazir, Salman Afsar Awan,Optimization of Test Case Generation using Genetic Algorithm (GA),International
Journal of Computer Applications (0975 – 8887),Volume 151 – No.7, October 2016.
22. Yuehua Dong, & Jidong Peng. (2011). Automatic generation of software test cases based on improved genetic algorithm. 2011
International Conference on Multimedia Technology. doi:10.1109/icmt.2011.6002999
23. Huang, M., Zhang, C., & Liang, X. (2014). Software test cases generation based on improved particle swarm optimization. Proceedings of
2nd International Conference on Information Technology and Electronic Commerce. doi:10.1109/icitec.2014.7105570.
24. Panichella, A., Kifetew, F. M., & Tonella, P. (2018). Automated Test Case Generation as a Many-Objective Optimisation Problem with
Dynamic Selection of the Targets. IEEE Transactions on Software Engineering, 44(2), 122–158.
25. Arrieta, A., Wang, S., Markiegi, U., Sagardui, G., & Etxeberria, L. (2018). Employing Multi-Objective Search to Enhance Reactive Test
Case Generation and Prioritization for Testing Industrial Cyber-Physical Systems. IEEE Transactions on Industrial Informatics, 14(3),
1055–1066.
26. Shahbazi, A., & Miller, J. (2016). Black-Box String Test Case Generation through a Multi-Objective Optimization. IEEE Transactions on
Software Engineering, 42(4), 361–378.
27. He, W., Zhao, R., & Zhu, Q. (2015). Integrating Evolutionary Testing with Reinforcement Learning for Automated Test Generation of
Object-Oriented Software. Chinese Journal of Electronics, 24(1), 38–45.
28. Pires, J. P., & Brito e Abreu, F. (2018). Knowledge Discovery Metamodel-Based Unit Test Cases Generation. 2018 IEEE 11th
International Conference on Software Testing, Verification and Validation (ICST).
29. Ali, M. S. A. R., Othman, R. R., Yahya, Z. R., Ahmad, M. Z. Z., & Ramli, N. (2016). Implementation of artificial bee colony algorithm
for T-way testing. 2016 3rd International Conference on Electronic Design (ICED).
30. Khalid Alemerien and Kenneth Magel, Examining the Effectiveness of Testing Coverage Tools: An Empirical Study, International
Journal of Software Engineering and Its Applications,2014.

Authors: Vinayak Kumbhar, Lalita Admuthe, Vinod Kumbhar

Paper Title: Gigabit Ethernet Switch Characterization over VPX Backplane

843. Abstract: Complexity & Criticality have made the latest state of the art Military/Aerospace systems more and
more I/O and data intensive. Demand for huge chunk of signal information drives the innovation in the technology
4832-
to make the systems capable of transforming the data at higher and higher speeds. So, computers and
4850
communication devices use VPX technology to communicate with other devices because, VPX support multi
Gigabit communication and it is very rugged, compact and portable. So switching systems used for communication
in military and aerospace should also support VPX connectivity. Characterizing switch, which gives connectivity
on VPX and which communicate through VPX switched fabric backplane with other devices on same backplane is
difficult and tedious task. In switch there are many stress points, which may cause switch goes down in network. To
characterize these stress points, we designed VPX based test card and characterize data plane performance of
switch by measuring some parameters and analyzing transmitted and received frames. Also by preparing setup for
environmental characterization we can test performance for different environmental conditions. Also using
environmental chambers, we characterize for environmental parameters at different ruggedized levels.

Keyword : VPX. VME, EMI, EMC, Backplane, DUT, OpenVPX .


References:
1. VPX sub headline on second look. GE VPX short book.
2. VITA-42 specifications
3. VITA-42 specifications
4. IEEE Std 802.3 2012 (Revision of IEEE Std 802.3-2008)
5. IEEE Std802.3ap standards
6. Ethernet switching white paper – GE-IP
7. 802.3z and 802.3ae standards
8. VITA-46 specifications
9. TCP/IP Illustrated, Volume 1 by Kevin R. Fall and W. Richard Stevens
10. Interconnections Bridges Routers Switches and Internetworking Protocols, 2nd edition by Radia Perlman
11. VITA-65 specifications
12. RFC-2544 layer 2 and RFC-2889-layer 3 Ethernet switch benchmarking
13. The Internet Engineering Task Force (IETF) website
14. http://www.ietf.org/
15. Request for Comments website
16. http://www.rfc-editor.org/
17. LAN switching first step By Matthew J. Castelli. Published in8thJuly2004 by Cisco Press. Part of the first step series.
18. Spirent Test Centre, Packet generator manual
19. Air Force Avionics Integrity Program report on "failure of electronics systems in aircrafts"

Authors: M.Swetha, R.Kiranmayi, N.Swathi

Paper Title: Design of Centralized PI Control System for Two Variable Processes based on Root Locus Technique
Abstract: This paper describes the design of centralized controller for two variable processes. The two
variable process structures are somehow different from the single variable processes. This difference is occurred
because of interrelations between the variables present in the process. Hence, when a controller is planned for such
systems, the relations amid the variables must be taken into consideration. This process is done in decentralized
control system design. But decentralized control system works well when the interrelations between the variables
are simple. If the interaction is strong, then the centralized control system is preferred since it uses a controller for
each pair of input and output variables. The controller used in main diagonal works for improving the servo
performance and off diagonal controller reduces the interrelation effect. So the performance is improved by
minimizing the interrelation effects. The design process is easy to understand by field engineers working in
industries. The simulation results are included in this paper to specify the efficacy of the proposed scheme.

Keyword : Two variable process, decentralized control, centralized control, interrelation effects, single
variable process, servo performance.
844. References:
1. Q. Xiong, W.-J. Cai, M.-J. He, A practical loop pairing criterion for multivariable processes, Journal of Process Control 15 (2005) 4851-
741–747. 4855
2. Qiang xiong,Wen-Jian Cai, Mao-Jun He, Equivalent transfer function method for PI/PID controller design of MIMO processes,
J.Process control 17(2007) 665-673.
3. Q. Xiong, W.-J. Cai, Effective transfer function method for decentralized control system design of multi-input multi-output
processes, Journal of Process Control 16 (2006) 773–784.
4. Naik, R. Hanuma, DV Ashok Kumar, and K. S. R. Anjaneyulu. "Control configuration selection and controller design for
multivariable processes using normalized gain." World Acad Sci Eng Technol Int J Electr Comput Electron Commun Eng8.10
(2014).
5. Truong Nguyen Luan Vu and Moonyong Lee,”Independent design of Multiloop PI/PID controllers for Multi-delay processes”,
world academy science, Engineering and technology,(60)2009,PP 703-708.
6. Tavakoli, Saeed, Ian Griffin, and Peter J. Fleming. "Tuning of decentralised PI (PID) controllers for TITO processes." Control
engineering practice 14.9 (2006): 1069-1080.
7. Wang, Qing-Guo, Bin Huang, and Xin Guo. "Auto-tuning of TITO decoupling controllers from step tests." ISA transactions39.4
(2000): 407-418.
8. Naik, R. Hanuma, DV Ashok Kumar, and K. S. R. Anjaneyulu. "A Comparative Study of Decoupler Design Techniques for TITO
Control Processes." Emerging Trends in Electrical, Communications and Information Technologies. Springer, Singapore, 2017. 293-
301.
9. Seborg, Dale E., et al. Process dynamics and control. John Wiley & Sons, 2010.
10. Wutthithanyawat, Chananchai, and Santi Wangnipparnto. "Design of decentralized PID controller with the root locus method based
on inverted decoupling for a TITO system." Journal of Thai Interdisciplinary Research 13.2 (2018).

Authors: Manisha Malik, PR Sharma

845. Paper Title: Power Quality Improvement of Grid Connected Photovoltaic Solar Systems using 3 level Inverter
Abstract: This paper demonstrate simulation modeling of grid-tied SPV systems with a 3 level inverter for 4846-
power quality improvement using SVPWM. To extract maximum power MPPT is used. Three level inverters are 4859
used in high power and high voltage application with reduced harmonic contents. The grid tied PV system using
three levels inverter has less harmonic contents as comparison of the conventional system or without a three level
inverter. The simulation study reveals that the system with three-level inverter using the SVPWM technique
generates less THD compared to the conventional system.

Keyword : solar system, three-level inverter, SVPWM, THD.


References:
1. R. G. Wandhare and V. Agarwal, “Reactive Power Capacity Enhancement of a PV-grid system to increase PV penetration level,” Int. J.
Latest Trends Eng. Technol., vol. 8, no. 1, pp. 1–10, 2016.
2. K. Jain, A. Bhargava, and B. Mewara, “Power quality enhancement using unified power flow controller in standalone grid-connected
solar PV system,” Proc. Int. Conf. Inven. Res. Comput. Appl. ICIRCA 2018, no. Icirca, pp. 709–713, 2018.
3. C. :Bouzi. Khomsi M.:Jelassi, K., “Power Quality Improvement in a Three-Phase Grid-Tied Photovoltaic System Supplying Unbalanced
and Nonlinear Loads,” Int. J. Renew. Energy Res., vol. 8, no. 2, pp. 1165–1177, 2018.
4. Q.N.Trinh and H.H. Lee, “An Enhanced Grid Current Compensator for Grid-Connected Distributed Generation Under Nonlinear Loads
and Grid Voltage Distortions,” IEEE Trans. Ind. Electron., vol. 61, no. 12, pp. 6528–6537, 2014.
5. H. M. Ali Zeeshan, F. Nisar, and A. Hassan, “A review of distributed control techniques for power quality improvement sin micro-grids,”
IOP Conf. Ser. Mater. Sci. Eng., vol. 199, no. 1, 2017.
6. M Khatri and A Kumar," experimental investigation of harmonic in a grid tied solar photovoltaic system," vol. 7. no. 2, 2017.
7. V. Rani, O. P. Mahela, and H. Doraya, “Power Quality Improvement in the Distribution Network with Solar Energy Penetration using
Distribution Static Compensator,” 2018 Int. Conf. Comput. Power Commun. Technol. GUCON 2018, pp. 148–154, 2019.
8. A G Shaik and O P Mahela, "power quality assessment and event detection in hybrid power system," electrical power system Res .,
vol.161, pp.26-44, 2018.
9. O. P. Mahela, K. Dev Kansal, and S. Agarwal, “Detection of power quality disturbances in utility grid with solar photovoltaic energy
penetration,” India Int. Conf. Power Electron. IICPE, vol. 2018-Decem, pp. 1–5, 2019.
10. H. A. Toliyat, Analysis of Electric Machinery and Drive Systems [Book Review], vol. 22, no. 9. 2005.
11. H. Akagi and T. Hatada, “Voltage Balancing Control for a Three-Level Diode-Clamped Converter in a Medium-Voltage Transformerless
Hybrid Active Filter,” IEEE Trans. Power Electron., vol. 24, no. 3, pp. 571–579, 2009.
12. M. Tamasas, M. Saleh, M. Shaker, and A. Hammoda, “Evaluation of Modulation Techniques for 5-level Inverter Based on Multicarrier
Level Shift PWM,” Proc. Mediterr. Electrotech. Conf. - MELECON, vol. 2, no. April, pp. 17–23, 2014.
13. G. Tan, Q. Deng, and Z. Liu, “An Optimized SVPWM Strategy for Five-Level Active NPC (5L-ANPC) Converter,” IEEE Trans. Power
Electron., vol. 29, no. 1, pp. 386–395, 2014.
14. S. V Patel and B. R. Nanecha, “3 Level Svpwm Solar Inverter Using Dsp Controller,” pp. 3–6, 2016.
15. A. Tuluhong, W. Wang, Y. Li, and L. Xu, “A novel hybrid T-type three-level inverter based on SVPWM for PV application,” J. Electr.
Comput. Eng., vol. 2018, pp. 1–12, 2018.
16. P. M. Meshram, D. Hanote, and M. M. Renge, “A Simplified Space-Vector PWM for Three Level Inverters Applied to Passive and Motor
Load,” 2009 4th IEEE Conf. Ind. Electron. Appl. ICIEA 2009, pp. 3388–3393, 2009.
17. J. Dario Betanzos Ramirez, J. Jose Rodríguez Rivas, and E. Peralta Sanchez, “Space Vector Pulse Width Modulation for Three-Level
NPC-VSI,” IEEE Lat. Am. Trans., vol. 11, no. 2, pp. 759–767, 2013.
18. Z. Gao, T. Chen, and C. Zhang, “Control of an Active Bus Voltage Limiter with Modified Space Vector Pulse Width Modulation
Strategies in Regenerative Applications,” Control Eng. Pract., vol. 83, no. November 2018, pp. 176–187, 2019.
19. T. E. Shults, O. Husev, F. Blaabjerg, C. Roncero-Clemente, E. Romero-Cadaval, and D. Vinnikov, “Novel space vector pulse width
modulation strategies for single-phase three-level NPC impedance-source inverters,” IEEE Trans. Power Electron., vol. 34, no. 5, pp.
4820–4830, 2019.
20. R. Attia, “Space Vector Pulse Width Modulation,” 2018 Int. Conf. Appl. Smart Syst., no. November, pp. 223–240, 2010.
21. K. Lavanya and V. Rangavalli, “A novel technique for simulation & analysis Of SVPWM two & three level inverters,” Int. J. Eng. Res.
Appl., vol. 3, no. 5, pp. 455–460, 2013.
22. K. Kumar, R. N. Babu, and K. R. Prabhu, “Design and Analysis of RBFN-Based Single MPPT Controller for Hybrid Solar and Wind
Energy System,” IEEE Access, vol. 5, pp. 15308–15317, 2017.
23. S. Saravanan and N. Ramesh Babu, “RBFN Based MPPT Algorithm for PV System with High Step Up Converter,” Energy Convers.
Manag., vol. 122, pp. 239–251, 2016.

Authors: Supalak Nakhornsri

Paper Title: From Classroom to Real World: Application of Outcomes-Based Assessment in English Courses
Abstract: Quality Assurance (QA) has become one of the current concerns in higher education worldwide.
Learning outcomes are seen as central QA processes since the outcomes provide key benchmarks for maintaining
standards and enhancing teaching and learning. Outcomes-based assessment (OBA) necessitates a change in
educational practices, to a focus on what students have to learn rather than what educators have to teach. Moreover,
it is connected with purposeful planning for the delivery and evaluation of intended outcomes. According to this,
the purposes of this study were to investigate the expected learning outcomes of English courses for undergraduate
students so that grading criteria can be established. In addition, the concurrent validity or investigation to prove
whether students achieved the expected outcomes established from the expected language standards was
846. implemented. Hence, the students’ study results and the scores obtained from an English language standard
(TOEIC) were computed. The findings can be significant in several ways. Theoretically, the findings can contribute 4860-
to a better understanding of expected learning outcomes. This information can assist English language instructors in 4865
developing their teaching and course evaluation. Finally, the assessment of the concurrent validity can be useful to
the interpretation of the study results due to the measurements performed by the evaluating instruments and by the
standard instruments. Therefore, the scores obtained from the study results can be compared with the standardized
scores. This allows classroom evaluation to be connected with more meaningful standards outside the classroom.

Keyword : concurrent validity; English courses; expected learning outcomes; outcomes-based assessment
References:
1. El-Maaddawy, T., & Deneen, C. (2017). Outcomes-Based Assessment and Learning: Trialling Change in a Postgraduate Civil Engineering
Course. Journal of University Teaching & Learning Practice, 1-19.
2. Rattananuntapat, M. (2015). Quality Assurance Policies in Thai Higher Education. Pittsburgh: University of Pittsburgh.
3. Carless, D. (2015). Excellent in university assessment: Learning from award-winning practice. Abingdon, UK: Routledge.
4. Bachman, L. F. (2004). Statistical Analyses for Language Assessment. Cambridge: Cambridge University Press.
5. k12academics. (2019, May 5). Advantages and Limitations. Retrieved from k12academics: https://www.k12academics.com
6. FairTest. (2019, May 20). Norm-referenced Achievement Tests. Retrieved from Fairtest: http://www.fairtest.org
7. Centre for Higher Education Research and Teaching. (2012). A Brief Guide to Outcome-based Assessment. Grahamstown: Rhodes
University.
8. Mahbub, M. A. (2018). English Teaching in Vocational High School: A Need Analysis. JEELS, 229-258.
9. Khunmontri, S., Trakulkasemsuk, W., & Bunsom, T. (2014). Vocational College English Teachers' Awareness of Establishment of the
ASEAN Community and Its Impact on English Language Teaching. Journal of Liberal Arts, Ubon Ratchathani University, 77-106.
10. Bresciani, M. J. (2011). Identifying Barriers in Implementing Outcomes-based Assessment Program Review: A Grounded Theory
Analysis. Research & Practice in Assessment, 5-16.
11. Anwar, M. A., Ahmed, N., & Al Ameen, A. (2012). An Outcome-Based Assessment and Improvement System for Measuring Student
Performance and Course Effectiveness. Contemporary Issues in Education Research, 279-294.
12. Wheaton, A., & Parry, J. (2012, March 20-23). Using the Angoff Method to Set Cut Scores. Retrieved from questionmark:
www.questionmark.com
13. Dornyei, Z. (2011). Researcch Methods in Applied Linguistics. New York: Oxford University.
14. Clark, D. (2015, January 12). Bloom's Taxonomy of Learning Domains. Retrieved from Big Dog & Little Dog's Performance
Juxtaposition: www.nwlink.com/donclark/hrd/bloom.html
15. ETS. (2011). Correlation Table TOEIC Listening and Reading Scores Descriptors and the CEFR levels. Retrieved from ETS: GLOBAL,
A subsidiary of Educational Testing Service: www.etsglobal.org
16. Lin-L, W., & Yao, G. (2014). Encyclopedia of Quality of Life and Well-Being Research. Retrieved from Springer Link:
www.link_springer.com

Authors: M.D.Vimalapriya, Vignesh Baalaji S, S.Sandhya


Energy-Centric Route Planning using Machine Learning Algorithm for Data Intensive Secure Multi-
Paper Title:
Sink Sensor Networks
Abstract: Wireless sensor network (WSN) is energy operated self-disciplined ad-hoc technology capable of
sensing and actuating environmental phenomenon. The sensed information is shared between communication sinks
for access and processing. Energy conservation and route planning are prominent in determining the efficiency of
the sensor network. In this paper, energy-centric route planning (ECRP) technique is introduced to address the
inequalityin sensor node lifetime and routing along with security requirements. ECRP depends on the individual
and co-operative energy expenses of the nodes to retain a balanced communication link. The expenses are
monitored and a profitable route plan is designed using a machine learning algorithm that assists in identifying a
non-deficient neighbor for routing. Both energy optimization and route refurbishing are controlled by the analysis
and decisions of the learning algorithm. The Learning process is instigated with the node energy and current route
neighbor information for discovering efficient communication paths to the sink. Security is administered using trust
process in this path planning and routing for selecting reliable neighbors. This helps to retain security throughout
the routing process.The impact of the proposed ECRP over sensor network is verified using the metrics:
throughput, active nodes, transmitting energy, routing complexity and delay.

Keyword : Energy Efficiency, Machine Learning, Node Selection, Route Discovery, WSN
References:
1. K. Cengiz and T. Dag, "Energy Aware Multi-Hop Routing Protocol for WSNs," in IEEE Access, vol. 6, pp. 2622-2633, 2018.
2. M. Sefuba and T. Walingo, "Energy-efficient medium access control and routing protocol for multihop wireless sensor networks," in IET
Wireless Sensor Systems, vol. 8, no. 3, pp. 99-108, 6 2018.
3. X. Ding, Y. Tian, and Y. Yu, “A Real-Time Big Data Gathering Algorithm Based on Indoor Wireless Sensor Networks for Risk Analysis
847. of Industrial Operations,” IEEE Transactions on Industrial Informatics, vol. 12, no. 3, pp. 1232–1242, 2016.
4. J. Yan, M. Zhou, and Z. Ding, “Recent advances in energy-efficient routing protocols for wireless sensor networks: A review,” IEEE 4866-
Access, vol. 4, pp. 5673–5686, 2016. 4875
5. S. Zidi, T. Moulahi and B. Alaya, "Fault Detection in Wireless Sensor Networks Through SVM Classifier," in IEEE Sensors Journal, vol.
18, no. 1, pp. 340-347, 1 Jan.1, 2018.
6. G. Künzel, G. P. Cainelli, I. Müller, and C. E. Pereira, “Weight Adjustments in a Routing Algorithm for Wireless Sensor and A ctuator
Networks Using Q-Learning,” IFAC-PapersOnLine, vol. 51, no. 10, pp. 58–63, 2018.
7. Shakeel PM. Neural Networks Based Prediction Of Wind Energy Using Pitch Angle Control. International Journal of Innovations in
Scientific and Engineering Research (IJISER). 2014;1(1):33-7.
8. F. Ishmanov and Y. B. Zikria, “Trust Mechanisms to Secure Routing in Wireless Sensor Networks: Current State of the Research and
Open Research Issues,” Journal of Sensors, vol. 2017, pp. 1–16, 2017.
9. Y. Liu, M. Dong, K. Ota, and A. Liu, “ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks,” IEEE Transactions on
Information Forensics and Security, vol. 11, no. 9, pp. 2013–2027, 2016.
10. A. Ahmed, K. A. Bakar, M. I. Channa, A. W. Khan, and K. Haseeb, “Energy-aware and secure routing with trust for disaster response
wireless sensor network,” Peer-to-Peer Networking and Applications, vol. 10, no. 1, pp. 216–237, 2015.
11. H. Huang, H. Yin, G. Min, J. Zhang, Y. Wu and X. Zhang, "Energy-Aware Dual-Path Geographic Routing to Bypass Routing Holes in
Wireless Sensor Networks," in IEEE Transactions on Mobile Computing, vol. 17, no. 6, pp. 1339-1352, 1 June 2018.
12. X. Lai, X. Ji, X. Zhou and L. Chen, "Energy Efficient Link-Delay Aware Routing in Wireless Sensor Networks," in IEEE Sensors Journal,
vol. 18, no. 2, pp. 837-848, 15 Jan.15, 2018.
13. X. Shao, C. Wang, C. Zhao and J. Gao, "Traffic Shaped Network Coding Aware Routing for Wireless Sensor Networks," in IEEE Access,
vol. 6, pp. 71767-71782, 2018.
14. J. Qiao and X. Zhang, "Polar Coordinate-Based Energy-Efficient-Chain Routing in Wireless Sensor Networks Using Random Projection,"
in IEEE Access, vol. 6, pp. 21275-21286, 2018.
15. W. M. Elsayed, S. F. Sabbeh, and A. M. Riad, “A Distributed Fault Tolerance Mechanism for Self-Maintenance of Clusters in Wireless
Sensor Networks,” Arabian Journal for Science and Engineering, vol. 43, no. 12, pp. 6891–6907, 2017.
16. Z.-X. Wang, M. Zhang, X. Gao, W. Wang, and X. Li, “A clustering WSN routing protocol based on node energy an d multipath,” Cluster
Computing, 2017.
17. C. Hong, Y. Zhang, Z. Xiong, A. Xu, H. Chen, and W. Ding, “FADS : Circular/Spherical Sector based Forwarding A rea Division a nd
Adaptive Forwarding Area Selection routing protocol in WSNs,” Ad Hoc Networks, vol. 70, pp. 121–134, 2018.
18. J. Huang, D. Ruan, and W. Meng, “An annulus sector grid aided energy-efficient multi-hop routing protocol for wireless sensor networks,”
Computer Networks, vol. 147, pp. 38–48, 2018.
19. K. A. Darabkh, N. J. Al-Maaitah, I. F. Jafar, and A. F. Khalifeh, “EA-CRP: A Novel Energy-aware Clustering and Routing Protocol in
Wireless Sensor Networks,” Computers & Electrical Engineering, vol. 72, pp. 702–718, 2018.
20. A. Attiah, M. F. Amjad, M. Chatterjee, and C. Zou, “An evolutionary routing game for energy balance in Wireless Sensor Networks,”
Computer Networks, vol. 138, pp. 31–43, 2018.
21. S. He, K. Xie, W. Chen, D. Zhang and J. Wen, "Energy-Aware Routing for SWIPT in Multi-Hop Energy-Constrained Wireless Network,"
in IEEE Access, vol. 6, pp. 17996-18008, 2018.
22. B. Sun and D. Li, “A Comprehensive Trust-Aware Routing Protocol With Multi-Attributes for WSNs,” IEEE Access, vol. 6, pp. 4725–
4741, 2018.
23. L. Yang, Y. Lu, S. Liu, T. Guo, and Z. Liang, “A Dynamic Behavior Monitoring Game-Based Trust Evaluation Scheme for Clustering in
Wireless Sensor Networks,” IEEE Access, vol. 6, pp. 71404–71412, 2018.

Authors: L. Cardoso
Education, Curriculum and Technology Landmarks: The Renewed Concept of the “Classroom of the
Paper Title:
Future”
Abstract: One of the most debated concepts in Education and Technology is the “Classroom of the Future”,
not only because classrooms changed, but first of all because students, society and teachers have changed. This is a
global challenge for Higher Education: to prepare future teachers for these new ages of technology-based
classrooms, students who master digital and informational tools and pedagogy that needs to be enhanced in order to
follow all these simultaneous mutations.Our main objective is to discuss how Universities need to focus on new
pedagogical approaches for the “Classroom of the Future”, combining Education, Curricula and Technology,
preparing future teachers and drawing the path for teaching and learning success.

Keyword : Education, Curricula, Technology, Classroom of the Future


References:
1. Ayre, J. et alii (2014) Designing the Future Classroom. Brussels: European Schoolnet (EUN Partnership AISBL)
2. Crişan, A. & Enache, R. (2013) Virtual Classrooms in Collaborative Projects and the Effectiveness of the Learning Process, Procedia -
Social and Behavioral Sciences, vol. 76, pp. 226-232. Amsterdam: Elsevier
3. DeCoito, I., & Richardson, T. (2018). Teachers and technology: Present practice and future directions. Contemporary Issues in
Technology and Teacher Education, 18(2), 362-378. USA: Association for the Advancement of Computing in Education
4. Eggers, W. & Macmillan, P. (2015) Deloitte Gov2020: A journey into the future of government. UK: Deloitte Touche Tohmatsu Limited
5. Institute for the Future (2013) From Educational Institutions to Learning Flows. Palo Alto: Calif., Institute for the Future.
www.iftf.org/uploads/media/SR-1580-IFTF_Future_of_ Learning_ 01.pdf (Accessed 15 August 2019)
6. Kember, D., & Leung, D. Y. P. (2005). The influence of the teaching and learning environment on the development of generic capabilities
848. needed for a knowledge-based society. Learning Environments Research, 8, 245–266. Netherlands: Springer
7. Mäkitalo-Siegl, K. Zottmann, J., Kaplan, F. & Fischer, F. (Eds.) (2010) Classroom of the Future. Orchestrating Collaborative Spaces.
Rotterdam: Sense Publishers 4876-
8. Mohd, C. & Shahbodin, F. (2015) Personalized Learning Environment (PLE) Integration in the 21st Century Classroom In International 4881
Journal of Computer Information Systems and Industrial Management Applications. ISSN 2150-7988 Volume 7 (pp. 014-02). USA:
Dynamic Publishers, Inc.
9. OECD (2018) Teaching for the Future: Effective Classroom Practices to transform Education. Paris: OECD Publishing.
http://dx.doi.org/10.1787/9789264293243-en
10. Pedro, N., Baeta, P., Paio, A., Pedro, A. & Matos, J. F. (2017). Redesigning classrooms for the future: gathering inputs from students,
teachers and designers. In 11th International Technology, Education and Development Conference. (pp. 7908-7917).
https://dx.doi.org/10.21125/inted.2017.1861.Valencia: IATED
11. Prensky, M. (2011) A Huge Leap for the Classroom true peer-to-peer learning, enhanced by technology. In Educational Technology Nov-
Dec. Retrieved from http://marcprensky.com/writing/Prensky-EDTECH-LearningCatalytics-Aug. 2019-FINAL.pdf
12. Sawyer, R. K. (2006) Conclusion: The schools of the future. In R. K. Sawyer (Ed.), The Cambridge handbook of the learning sciences (pp.
567–580). New York: Cambridge University Press
13. Scott, C. (2015) THE FUTURES of LEARNING 3: What kind of pedagogies for the 21st century? Paris: UNESCO Education Research
and Foresight [ERF Working Papers Series, No. 15]
14. Suto, I. (2013) 21st Century skills: Ancient, ubiquitous, enigmatic?. In Research Matters: A Cambridge Assessment Publication.
Cambridge: University of Cambridge
15. Taddei, F. (2009) Training Creative and Collaborative Knowledge-Builders: A Major Challenge for 21st Century Education. Report
Prepared for the OECD on the Future of Education. Paris: OECD CRI. http://cri-paris.org/wp-content/uploads/ocdefrancois-taddei-
fev2009.pdf (Accessed 20 August 2019)
16. UNESCO (2012) Education and Skills for Inclusive and Sustainable Development beyond 2015: Think Piece for the United Nations Task
Team on Post-2015 Development. Paris: UNESCO http://bit.ly/17Pfx6y (Accessed 21 August 2019)
17. UNESCO (2013). Policy Guidelines for Mobile Learning. Paris: UNESCO. http://unesdoc.unesco.org/images/0021/002196/219641e.pdf
(Accessed 21 August 2019)
18. Xenos M. (2018) The Future of Virtual Classroom: Using Existing Features to Move Beyond Traditional Classroom Limitations. In: Auer
M., Tsiatsos T. (eds) Interactive Mobile Communication Technologies and Learning, pp. 944- 951. IMCL 2017. Advances in Intelligent
Systems and Computing, vol 725. Netherlands: Springer.

Authors: Junmo Park , Deokseok Seo

Paper Title: Defect Repairing Cost and Its Bond on Apartment Building in Relation to Lawsuit Parties
Abstract: An appropriateness of defect repairing cost for apartment is being challenged in Korea. The
problem is that there is no detailed prescriptions or specifications about the defect repairing cost other than
849. calculating standard of the defect repairing bond in the applicable laws. There is also not even a proper base in
establishing the standard itself. In order to specify the standard of defect repairing bond and to make it serve as a
4882-
realistic system, it is necessary to discuss how much is the actual scale of the defect repairing cost and how it is
4887
reasonable to establish the calculation system of defect repairing bondin the apartment buildings. The researchers
have proposed a ratio of about 1.5% to the current standard of 3% of the construction cost as per the analysis of
actual data in the previous study. However, it is necessary to supplement this scale considering the facts that the
scale of lawsuit for defect is huge and the recent trend of litigation for the defect repairing has changed. Therefore,
this study approaches the relationship between defect repairing cost and bond at a new point of view by analyzing
the existing cases again. The builder for apartment construction makes agreement with the developer, therefore the
builder has responsibility of defect repairing. It also becomes an auxiliary party in the lawsuit for defect in the
resulting construction. In this study, we have categorized all the parties involved in the construction and defect
repairing cost. Type A is the case where the litigant has a construction capacity rank of 1-10, Type B of rank 11-30,
type C refers to the construction capacity rank other than type A and Type B, and for the case where the lawsuit
party is not a builder but a guarantee company, it is categorized as type D.And then, the differences in the defect
repairing cost rates in each category were reviewed. This review was conducted because the builders at upper group
are generally excellent in terms of technology and quality, but it is not known in detail that how much they are good
in counteracting the defect. The result of the case analysis by type showed that the rate of the defect repairing cost
by the builder of upper rank was relatively low. In addition, the minimum repairing cost ratio was relatively small
between the types, but the maximum repair cost showed great differences between the types. On the other hand,
only two cases showed excess of 3% of the defect repairing bond rate among the total of 49 cases. This big
difference might have caused large defect cost bond rate in the type A and Type B. The results of this study suggest
the following points. First, 47 cases out of 49 cases showed the defect repair bond rates below 3%, which speaks
that the current standard is not being practiced. Second, considering the fact that average defect repair bond rate is
lowest and the maximum and minimum deviation of defect repair cost rate is also the lowest in the type B, the type
B offers the lowest defect repair cost bond among other types of lawsuit cases.

Keyword : apartment building, defect lawsuit, defect repairing bond, defect repairing cost, lawsuit parties,
References:
1. J. Park, and D. Seo, “Basic Study on Standard Process Model for Defect Consulting in Korea,” Advanced Science and Technology Letters,
pp.33-38, vol. 55, 2014.
2. J. Park, and D. Seo, “Basic Study on Influence Factors for Defect Repairing Cost of Apartment Building in Korea,” In Proceedings of
International Conference on Applied Mathematics and Mechanics, 2016, pp. 185-189.
3. J. Park, and D. Seo, “Basic Study on Term of Warranty Liability for Window and Door Work Defect in Apartment Building,” In
Proceedings of International Conference on Research & Innovation in Environment, Civil and Architecture Engineering, 2017.
4. J. Park, and D. Seo, “Analytic Study on Term of Warranty Liability for Roofing and Waterproofing Work Defect in Apartment Bui lding
based on Performance Data,” In Proceedings of the 2017 icEAAC, pp. 200, 2017.
5. J. Park, and D. Seo, “Basic Study on Term of Warranty Liability for Finish Work Defect in Apartment Building,” International Journal of
Research in Chemical, Metallurgical and Civil Engineering, vol. 4, no. 1, pp. 7-12, February 2017.
6. J. Park, and D. Seo, “Comparative Review on Occurred Defect Data and Term of Warranty Liability to Telecommunication, Signal, and
Emergency Equipment Work in Apartment Building,” Asia Life Sciences, vol. 15, no. 3, pp. 1781-1791, June 2018.
7. J. Park, and D. Seo, “Suggestion on Estimating Rate for Defect Repairing Deposit through Case Study of Defect Lawsuit in Kore an
Apartment Building,” Journal of Advanced Research in Dynamical and Control Systems, vol. 10, no. 4, pp. 213-217, May 2018.
8. J. Park, and D. Seo, “Suggestion on Annual Refund Ratio of Defect Repairing Deposit in Apartment Building through Defect Laws uit
Case Study,” International Journal of Research in Chemical, Metallurgical and Civil Engineering, vol. 4, no. 1, pp. 13-17, February 2017.
9. J. Park, and D. Seo, “Comparative Review on Propriety of Estimating Rate for Defect Repairing Deposit through Apartment Build ing
Scale,” In Proceedings of the Third NZAAR International Event Series on Natural and Built Environment, Cities, Sustainability and
Advanced Engineering, New Zealand Academy of Applied Research Ltd, 2017, pp. 89-98.

Authors: Amer Ahmad AlAnazi, Azman Hashim, Amran Rasli

Paper Title: A Mediator Leadership Practices for Organisational Development Through Data Screening
Abstract: This paper explored the data collected regarding the study on mediating effect of organizational
innovation in the relationship between leadership practices and organisational performance. Seventy universities
operating in Saudi Arabia participated in the study. The survey was completed by 248 principal officers on behalf
of their respective universities. The results were then analysed using version 22 of the software package of the
Statistical Package for the Social Sciences (SPSS). An initial data testing and preliminary review were conducted to
ensure that the multivariate analysis assumptions were not broken. The analysis was carried out in this study
explicitly with the missing values, outliers, regular test and multi-linearity testing. We concluded that the data were
sufficient for further study.

Keyword : data screening, organizational innovation, leadership practices, organisational performance


850.
References:
1. Al-Marri, K., Ahmed, A. M. M. B., & Zairi, M. (2007). Excellence in service: an empirical study of the UAE banking sector. International 4888-
Journal of Quality & Reliability Management, 24(2), 164-176. 4891
2. Allison, P. D. (1999). Multiple regression: A primer. Thousand Oaks, CA: Pine Forge Press.
3. Chernick, M. R. (2008). Bootstrap methods. A guide for practitioners and researchers (2nd ed.). Hoboken, New Jersey: Wiley.
4. Dillman, D. A. (2000). Mail and Internet surveys: The tailored design method (2nd ed.). New York: John Wiley & Sons, Inc.
5. Hair, J. F., Black, W. C., Babin, B. J., & Anderson, R. E. (2010). Multivariate data analysis (7th ed.). Upper Saddle River, New Jersey:
Prentice Hall.
6. Hair, J. F., Hult, G. T. M., Ringle, C. M., & Sarstedt, M. (2014). A primer on partial least squares structural equation modeling (PLS-SEM).
Thousand Oaks: Sage Publications.
7. Hair, J. F., Ringle, C. M., & Sarstedt, M. (2011). The Use of Partial Least Squares (PLS) to Address Marketing Management Topics: From
the Special Issue Guest Editors Journal of Marketing Theory and Practice, 18(2), 135-138.
8. Hoekstra, R., Kiers, H. A., & Johnson, A. (2012). Are assumptions of well-known statistical techniques checked, and why (not)?
Frontiers in psychology, 3, 1-9. doi:10.3389/fpsyg.2012.00137
9. Jani, P. N. (2014). Business statistics: Theory and applications. Delhi: PHI Learning Private Limited.
10. Sekaran, U., & Bougie, R. (2010). Research methods for business: A skill building approach (5th ed.). New Jersey: John Wiley and Sons.
11. Tabachnick, B. G., & Fidell, L. S. (2007). Using multivariate statistics (5th ed.). Boston, MA: Allyn & Bacon/Pearson Education.
Authors: Suvarna Shirke, R.Udayakumar
(DCNN) Deep Convolution Neural Network Classifier and (EW-CSA) Earth Worm-Crow Search
Paper Title:
Algorithm for Lane Detection
Abstract: Every year in India, most of the car accidents are occurs and affects on number of lives. Most of
the road accidents are occurs due to driver’s inattention and fatigue. Drivers require to focus on different
circumstances, together with vehicle speed and path, the separation between vehicles, passing vehicles, and
potential risky or uncommon events ahead. Also the accident occurs due to the who bring into play cell phones at
the same time as driving, drink and drive, etc. Due to this, most of the companies of automobiles tries to make
available best Advanced Driver Assistance System (ADAS) to the customer to avoid the accidents. The lane
detection approach is one of the method provided by automobile companies in ADAS, in which the vehicle must
follows the lane. Therefore, there is less chance to get an accident. The information obtained from the lane is used
to alert the driver. Therefore most of the researchers are attracted towards this field. But, due to the varying road
circumstances, it is very difficult to detect the lane. The computer apparition and machine learning approaches are
presents in most of the articles. In this article, we presents the deep learning scheme for identification of lane. There
are two phases are presents in this work. In a first phase the image transformation is done and in second phase lane
detection is occurred. At first, the proposed model gets the numerous lane pictures and changes the picture into its
relating Bird's eye view picture by using Inverse perspective mapping transformation. The Deep Convolutional
Neural Network (DCNN) classifier to identify the lane from the bird’s eye view image. The Earth Worm- Crow
Search Algorithm (EW-CSA) is designed to help DCNN with the optimal weights. The DCNN classifier gets
trained with the view picture from the bird’s eye image and the optimal weights are selected through newly
developed EW-CSA algorithm. All these algorithms are performed in MATLAB. The simulation results shows that
the exact detection of lane of road. Also, the accuracy, sensitivity, and specificity are calculated and its values are
0.99512, 0.9925, and 0.995 respectively.

Keyword : Driver Help System (DAS), Deep Convolution Neural Network(DCNN), Earth Worm- Crow
Search Algorithm (EW-CSA), etc.
References:
1. Umar Ozgunalp, Rui Fan, Xiao Ai, and Naim Dahnoun, "Multiple Lane Detection Algorithm Based on Novel Dense Vanishing Point
Estimation", IEEE Transactions On Intelligent Transportation Systems, Vol. 18, No. 3, March 2017.
2. Apurba Das, Member, Siva Srinivasa Murthy, and Upendra Suddamalla, "Enhanced Algorithm of Automated Ground Truth
Generation and Validation for Lane Detection System by M2BMT", IEEE Transactions On Intelligent Transportation Systems, Vol.
18, No. 4, April 2017.
3. Soonhong Jung, Junsic Youn, and Sanghoon Sull, "Efficient Lane Detection Based on Spatiotemporal Images", IEEE Transactions
851. On Intelligent Transportation Systems, January 2015.
4. Ju Han Yoo, Seong-Whan Lee, Sung-Kee Park, and Dong Hwan Kim, “A Robust Lane Detection Method Based on Vanishing 4892-
Point Estimation Using the Relevance of Line Segments", IEEE Transactions On Intelligent Transportation Systems", vol.18, no .12, 4901
February 2017.
5. Xinxin Du, and Kok Kiong Tan, "Comprehensive and Practical Vision System for Self-Driving Vehicle Lane-Level Localization",
IEEE Transactions On Image Processing, Vol. 25, No. 5, May2016.
6. Jianwei Niu , JieLu , Mingliang Xu , PeiLv , and Xiaoke Zhao, "Robust Lane Detection using Two-stage Feature Extraction with
Curve Fitting", Pattern Recognition, vol 59, pp.225-233, November 2016.
7. Heba Aly, Anas Basalamah, and Moustafa Youssef, "Robust and ubiquitous smartphone-based lane detection", Pervasive and Mobile
Computing, 2015.
8. Son Lam Phung, Manh Cuong Le , and Abdesselam Bouzerdoum, "Pedestrian lane detection in unstructured scenes for assistive
navigation", Computer Vision and Image Understanding, vol.149, pp.186–196, 2016.
9. Rasmussen, C., Korah, T.: On-vehicle and aerial texture analysis for vision-based desert road following. In: CVPR workshop on
machine vision for intelligent vehicles. (2005) III: 66{66
10. Montemerlo, M., et al.: Junior: The Stanford entry in the Urban Challenge. Journal of Field Robotics 25(8) (2008) 569{597 25
11. Gao, T., Aghajan, H.: Self lane assignment using egocen- tric smart mobile camera for intelligent GPS navigation. In: Workshop on
Egocentric Vision. (2009) 57{62
12. Jiang, Y., Gao, F., Xu, G.: Computer vision-based multiple- lane detection on straight road and in a curve. In: ImageAnalysis and
Signal Processing. (2010) 114{117
13. Wu, S., Chiang, H., Perng, J., Chen, C.,Wu, B., Lee, T.: The heterogeneous systems integration design and implementation for lane
keeping on a vehicle. IEEE Transactions on Intelligent Transportation Systems 9 (2008) 246{263
14. Hofmann, U., Rieder, A., Dickmanns, E.: Radar and vision data fusion for hybrid adaptive cruise control on highways. Machine
Vision and Applications 14 (2003) 1, 42{49
15. Batavia, P.H.: Driver-adaptive lane departure warning sytems. CMU-RI-TR-99-25 (1999)
16. Meng-Che Chuang, Jenq-Neng Hwang, and Kresimir Williams", A Feature Learning and Object Recognition framework for
underwater fish images", IEEE transactions on image processing, vol.25, no.4, pp.1862-1872, 2016.
17. Yuichi Saito, Makoto Itoh, and Toshiyuki Inagaki,"Driver Assistance System with a Dual Control Scheme: Effectiveness of
Identifying Driver Drowsiness and Preventing Lane Departure Accidents",IEEE transactions on human-machine systems, March
2016.
18. K. Bengler, K. Dietmayer, B. Farber, M. Maurer, C. Stiller, and H. Winner, “Three decades of driver assistance systems: Review and
future perspectives,” IEEE Intelligent Transportation Systems Magazine, vol. 6, no. 4, pp. 6–22, April 2014.
19. Ju Han Yoo, Seong-Whan Lee, Sung-Kee Park, and Dong Hwan Kim, “A Robust Lane Detection Method Based on Vanishing
Point Estimation Using the Relevance of Line Segments", IEEE Transactions On Intelligent Transportation Systems", vol.18, no .12,
February 2017.
20. Gurveen Kaur, and Dinesh Kumar,"Lane Detection Techniques: A Review", International Journal of Computer Applications,
vol.112, no 10, pp.0975 – 8887, February 2015.
21. Seokju Lee, Junsik Kim, Jae Shin Yoon, Seunghak Shin,OleksandrBailo, Namil Kim Tae-Hee Lee, Hyun Seok Hong, Seung-Hoon
Han, and In So Kweon, "VPGNet: Vanishing Point Guided Network for Lane and Road MarkingDetection and Recognition", In
Proceedings of the IEEE International Conference on Computer Vision, pp. 1947-1955, 2017.
22. Alexander Rakhlin, Alexey Shvets, Vladimir Iglovikov, and Alexandr A. Kalinin, "Deep Convolutional Neural Networks for Breast
Cancer Histology Image Analysis", In proceedings of International Conference on Image Analysis and Recognition ICIAR, Image
Analysis and Recognition, pp. 737-744, 2018.
23. Jun Li, XueMei, Danil Prokhorov, and Dacheng Tao,"Deep Neural Network for Structural Predictionand Lane Detection in Traffic
Scene",IEEE transactions on neural networks and learning systems, January 2016.
24. Mane, V.M. and Jadhav, D.V., "Holoentropy enabled-decision tree for automatic classification of diabetic retinopathy using retinal
fundus images," Biomedical Engineering/Biomedizinische Technik, vol.62, no.3, pp.321-332, 2017.
25. The KITTI Vision Benchmark Suite taken from, “http://www.cvlibs.net/datasets/kitti/eval_road.php”, accessed on August 2018.
26. Umar Ozgunalp, Rui Fan, Xiao Ai, and NaimDahnoun, "Multiple Lane Detection Algorithm Based on Novel Dense Vanishing Point
Estimation", IEEE Transactions On Intelligent Transportation Systems, Vol. 18, No. 3, March 2017.
27. M. A. Sotelo, F. J. Rodriguez, L. Magdalena, L. M. Bergasa, and L. Boquete, “A color vision-based lane tracking system for
autonomous driving on unmarked roads,” Automotive Robotics , vol. 16, no. 1, pp. 95–116, January 2004.
28. López, J. Serrat, C. Cañero, F. Lumbreras, and T. Graf, “Robust lane markings detection and road geometry computation,”
International Journal of Automotive Technology, vol. 11, no. 3, pp. 395–407, 2010.
29. D. Schreiber, B. Alefs, and M. Clabian, “Single camera lane detection and tracking,” in Proceedings on IEEE Transactions on
Intelligent Transportation Systems, 2005, pp. 302–307.
30. Y. Wang, N. Dahnoun, and A. Achim, “A novel system for robust lane detection and tracking,” Signal Processing, vol. 92, no. 2, pp.
319–334, 2012.
31. Y. Wang, E. K. Teoh, and D. Shen, “Lane detection and tracking using B-snake,” Image and Vision Computing., vol. 22, no. 4, pp.
269–280, 2004.
32. Y. Wang, L. Bai, and M. Fairhurst, “Robust road modeling and tracking using condensation,” IEEE Transactions on Intelligent
Transportation Systems, vol. 9, no.4, pp. 570–579, Dec. 2008.
33. C. Rasmussen, “Grouping dominant orientations for ill-structured road following,” in Proceedings on IEEE CVPR, 2004, vol. 1, pp.
I-470–I-477.
34. https://www.google.com/search?tbm=isch&sxsrf=ACYBGNSBkOTQLJChugxKa7CA0kul6erzXg%3A1570211788010&sa=1&ei=z
IeXXcQkwtrPuw_q8LDgCQ&q=road+lane+detection+system&oq=road+lane+detection+system&gs_l=img.3...144860.151727..152
637...0.0..0.236.3182.0j14j3......0....1..gws-wiz-
img.......0i8i30.YDdoTXHMPAE&ved=0ahUKEwjEuuLeloPlAhVC7XMBHWo4DJwQ4dUDCAY&uact=5#imgrc=z7Sk3PYmPaO
h7M:
35. https://www.google.com/search?tbm=isch&sxsrf=ACYBGNSMq07HXnjeFV49L8uCIcEftEy91g%3A1570211951491&sa=1&ei=b4
iXXZbOHZH7z7sPi5aOoAM&q=crow+search+algorithm+%28ew-
csa%29%2C&oq=cro&gs_l=img.3.0.35i39j0i67l9.251018.251574..253792...0.0..0.742.1139.0j1j1j6-1......0....1..gws-wiz-
img.......0.xafvuLc0QmM#imgrc=XvRC-FwhTbkMlM:
36. https://www.google.com/search?tbm=isch&sxsrf=ACYBGNTBKB6KyvqBAULkIfkAJX8toGtI_A%3A1570212211199&sa=1&ei=
c4mXXd_mC7Xfz7sP27KUqA0&q=lastest+warning+lane&oq=lastest+warning+lane&gs_l=img.3...112836.120562..120676...0.0..0
.421.3890.0j8j9j0j1......0....1..gws-wiz-
img.......35i39j0j0i67j0i10j0i10i24.sw8P29hFHO0&ved=0ahUKEwif7MeomIPlAhW173MBHVsZBdUQ4dUDCAY&uact=5#imgrc
=a2b1aN3eEDJS4M:
37. Recent Progress in Road and Lane Detection - A survey by Aharon Bar Hillel ¢ Ronen Lerner ¢ Dan Levi ¢ Guy Raz

Authors: M. A. Mustapa, O. B. Yaakob, Yasser M. Ahmed


Numerical Simulation of the Overtopping-Ramp Design of a Multistage Overtopping Wave Energy
Paper Title:
Breakwater Hybrid Device
Abstract: One type of wave energy converter is based on the overtopping concept. An example of such
device is the multi-reservoir Sea Slot-Cone Generator (SSG) which is based on a simple flat breakwater ramp
design. Although it is capable of functioning as both a wave-breaker and wave energy harvester, the SSG still
suffers from low performance with 38 percent hydraulic efficiency. This paper presents a numerical study to further
improve the performance. The present research work considers the use of convex, concave, V-shape and bridge V-
shapes front ramp designs. The overtopping phenomena were simulated using Computational Fluid Dynamic
(CFD) software known as Flow3D. The results are presented in the form of mean overtopping discharge and
expected power output for each of the three reservoirs. At the end of the study, the final results showed that the
highest potential power output is given by the V-Shapes design with 67 percent (56.9 kW) improvement compared
to current existing SSG device, which recorded (34.1 kW) at the wave height of 2.80 meters and a wave period of
9.3 seconds.

Keyword : Ocean Energy, Marine Renewable Energy, Wave Energy Converter, Overtopping Device,
Computational Fluid Dynamic (CFD)
852. References:
1. J. P. Kofoed, “Model Testing of the Wave Energy Converter Seawave Slot-Cone Generator,” Hydraul. Coast. Eng. No .18, 2005. 4902-
2. B. J. Larsen and J. P. Kofoed, “Model Test Setup and Program for Experimental Estimation of Surface Loads of the SSG Kvitsøy Pilot Plant
from Extreme Wave Conditions,” Civ. Eng., no. phase 4, 2005.
4911
3. J. P. Kofoed, “Wave Overtopping of Marine Structures - Utilization of Wave Energy,” PhD Thesis, Aalborg University, 2002.
4. J. P. Kofoed, “Model study of overtopping of marine structures for a wide range of geometric parameters,” in The 27th International
Conference on Coastal Engineering : ICCE 2000, 2000.
5. L. Margheritini, D. Vicinanza, and P. Frigaard, “Sea Slot Cone Generator Overtopping Performance in 3D Conditions,” in ISOPE-
International Offshore and Polar Engineering Conference. Proceedings, 2008, p. 18.
6. L. Margheritini, L. Victor, J. P. Kofoed, and P. Troch, “Geometrical Optimization for Improved Power Capture of Multi-level Overtopping
Based Wave Energy Converters,” Isope, vol. 1. International Society of Offshore and Polar Engineers, Osaka, Japan, pp. 339–344, 01-Jul-
2009.
7. M. Buccino, D. Vicinanza, F. Ciardulli, M. Calabrese, and J. Peter, “Wave Pressures and Loads on a Small Scale Model of the Svåheia SSG
pilot project,” in 9th European Wave and Tidal Energy Conference, 2011, pp. 1–7.
8. L. Margheritini, V. Stratigaki, and P. Troch, “Geometry Optimization of an Overtopping Wave Energy Device Implemented into th e New
Breakwater of the Hanstholm Port Expansion,” in International Offshore and Polar Engineering Conference, 2012, pp. 593–600.
9. J. W. Van der Meer and W. Janssen, “Wave run-up and wave overtopping at dikes and revetments,” 1994.
10. J. . de Wall and J. . van der Meer, “Wave runup and overtopping on coastal structures,” in Proceedings of the twenty -third coastal
engineering conference, 1992, pp. 1758–1771.
11. J. W. Van der Meer, Wave run-up and overtopping. Dikes and Revetments: Design, Maintenance and Safety Assessment, ed. KW Pilarczyk
(AA Balkema, Rotterdam, The Netherlands). A.A. Balkema, 1998.
12. L. Méhauté, R. C. Y. Koh, and L. Hwang, “A Synthesis on Wave Run-Up,” J. Waterw. Harb. Div., vol. 94, no. 1, pp. 77–92, 1968.
13. L. Margheritini, D. Vicinanza, and P. Frigaard, “SSG wave energy converter: Design, reliability and hydraulic performance of an innovative
overtopping device,” Renew. Energy, vol. 34, no. 5, pp. 1371–1380, May 2009.
14. D. Vicinanza, P. Contestabile, Q. H. N. Jørgen, and T. Lykke Andersen, “Innovative rubble mound breakwaters for overtopping w ave
energy conversion,” Coast. Eng., vol. 88, pp. 154–170, Jun. 2014.
15. I. Flow Science, FLOW-3D Documentation Release 10.1.0. 2012.
16. L. Franco, J. Geeraerts, R. Briganti, M. Willems, G. Bellotti, and J. De Rouck, “Prototype measurements and small-scale model tests of
wave overtopping at shallow rubble-mound breakwaters: the Ostia-Rome yacht harbour case,” Coast. Eng., vol. 56, no. 2, pp. 154–165,
2009.
17. B. MacVicar and J. Best, “A flume experiment on the effect of channel width on the perturbation and recovery of flow in straight pools and
riffles with smooth boundaries,” J. Geophys. Res. Earth Surf., vol. 118, no. 3, pp. 1850–1863, 2013.

Authors: M.A.H.M. Jasri, M. Afendi Rojan, M. Faizal Razak, Roslin Ramli

Paper Title: A Metallurgic and Mechanical Differentiation to Friction Stir Welding (FSW)
Abstract: The objective of this research was to measure the material properties as well as the forces to
orthodox friction stir welding (FSW) performed in air of AA6061. These results were compared by using ultimate
tensile strength (UTS) and weld root properties such as joint line residue length at the crossing point between the
welded aluminum alloy which allows crack initiation. Metallurgic cross sections of the AA6061 welds were
prepared and the weld nugget hardness between the welding parameters was compared as well. Experiments such
as this one and others enumerating the forces and process parameters must be achieved. A steady state model of
temperature distribution has been put forward and is shown to precisely forecast trends in heat input using heat
generation equations from [1,2]. Temperature distribution was measured and correlated to data by use of Micron
Thermal Imaging camera.

Keyword : Friction stir welding, Tensile strength, Ttemperature distribution, Hardness, Grain size.

853. References:
1. Arbegast W. et al. “Friction Stir Spot Welding”. 6th International Symposium on Friction Stir Welding. Session 4B. 2006.
2. Arbegast W. “A flow-partitioned deformation zone model for defect formation during friction stir welding”. Scripta Materialia. 58
4912-
(2008) 372- 376. 4915
3. Bloodworth T., Cook G., Strauss A. “Properties and forces of immersed friction stir welded AA6061-T6”. 8th International
Conference of Trends in Welding Technology. Pine Mountain, GA. (2008). 1-5.
4. Bunker E., Fleming P., Bloodworth T. “Friction Stir Welding Manual”. Vanderbilt University Welding Automation Laboratory.
2007.
5. Clark T., “An analysis of microstructure and corrosion resistance in underwater friction stir welded 304L stainless steel”. MS.
Brigham Young University. 2005.
6. Colegrove P., Shercliff H. “Development of Trivex friction stir welding tool: Part 1 – two-dimensional flow modeling and
experimental validation.” Science and Technology of Welding and Joining. 9 (2003). 345-351.
7. Colegrove P., Shercliff H. “Development of Trivex friction stir welding tool: Part 2 – three-dimensional flow modeling”. Science
and Technology of Welding and Joining. 9 (2004). 352-361.
8. Crawford R. “Parametric quantification of friction stir welding”. MS. Vanderbilt University. 2005.
9. Crawford R., “A mechanistic study of the friction stir welding process”. PhD. Dissertation. Vanderbilt University. 2006.
10. Crawford R., Bloodworth T., Cook G., Strauss A. “High speed friction stir welding process modeling”. 6th International Sympo sium
on Friction Stir Welding. Saint Sauveur, Canada. 2006.
11. Dubourg L., Dacheux P. “Design and properties of FSW tools: a literature review”. 6th International Symposium on Friction St ir
Welding. Session 01 paper 62. 2006.

Authors: Mariya A. Gurina, Yuliya V. Rumyantseva, Valery V. Chernyaev, Yuriy I. Yacuhin,


The Development of Uberization Processes in an Innovative Economy: Models and Principles of
Paper Title:
Marketplace Organization
Abstract: The article discusses one of the main trends in the development of electronic commerce since 2016
- Uberization, the basis of which are marketplaces. According to the authors, the use of a business Uberization
model obliges the company to change the process of interaction with contractors by implementing information
technologies, developing its own information platform and mobile application for direct communication between
buyers and sellers.
The article reveals the position that in the global economy the marketplace technology is becoming increasingly
relevant for a large number of industries, as this is a simple way to expand the range without increasing costs.
Model variations are considered in detail and an overview of global and Russian marketplaces is provided: C2C,
B2C and B2B. The analysis of the Russian market of online trading and the development of marketplaces is carried
854. out. The authors conclude that the Russian market is somewhat behind the world market, however, the speed and
scale of the spread of this technology are gaining momentum. 4916-
The article analyzes the trends in the development of the uberization business model of Russian companies, 4921
assesses the advantages of its use - large electronic trading platforms, increasing their volume of activity, set the
market standard for online trading for consumers, which leads to accustomation and increases the frequency of
orders of the average consumer. In addition to aggregating a large number of offers, expanding the assortment and
reducing costs for all market participants, marketplaces allow monitoring competitors: their volumes, assortment,
pricing and subjective assessment of the work of each company.

Keyword : innovative economy, uberization business model, marketplaces.


References:
1. Website for informational messages of ROSBUSINESSKON-SALTING JSC: Alibaba. [Electronic resource] URL:
https://quote.rbc.ru/company/1021 (In Russian)
2. Alstyne M., Parker G., Choudary S. (2017). Platform revolution. - New York: Norton & Company.
3. Bakharev I. The largest marketplaces of Russia: analytics SimiliarWeb. [Electronic resource] URL: https: // E-PEPPER/ (In Russian)
4. Chesbrough H. (2006). Open Innovation: The New Imperative for Creating and Profiting from Technology. Harvard Business Press.
5. Glazacheva T. (2019) Marketplaces of Russia: how they work and in what direction they are developing? [Electronic resource] URL:
https://www.retail-loyalty.org/expert-forum/ (In Russian)
6. Gurina M.A., Rumyantseva Yu.V. System challenges of the fourth industrial revolution: Uberization as a new business model // Issues of
innovative economy. - 2019. – V. 9. - No. 3. (In Russian)
7. Khosrow-Pour, D.B.A., Mehdi - editor. (2018) Advanced Methodologies and Technologies in Digital Marketing and entrepreneurship.
IGI Global, pp 122-123.
8. Kuntsman A.A. Transformation of the internal and external business environment in the digital economy // Management of economic
systems. - 2016 - No. 11 (93). - S. 1. (In Russian)
9. Nabyla Daidj. (2018) Uberization (or Uberification) of the Economy. Telecom Ecole de Management, France, IGI Global. 2354 p.
10. Popova I.V., Huseynova A.A. “Uberization” of the Russian economy: goal, disadvantages, advantages, prospects // Young researc her
Don. - 2017. - No. 4 (7). - S. 165-168. (In Russian)
11. Rumyantseva Yu.V. Opportunities for the Uberization of the Russian Economy // In the collection: Strategies to counter threats to the
economic security of Russia Materials of the All-Russian Scientific and Practical Conference. 2018. s. 242-247. (In Russian)
12. Schwab К. (2017). The Fourth Industrial Revolution. Penguin UK, pp. 16-75.
13. Schmidt E. (2015) How Google Works [translation from English]. Moscow: Eksmo. (In Russian).
14. Marketplace for business [Electronic resource] URL: https://blog.sibirix.ru/2019/01/31/marketplaces/ (In Russian)
15. Q1 2019 e-commerce Russian market size [Electronic resource] URL: https://www.shopolog.ru/news/razmer-rossiyskogo-rynka-
elektronnoy-torgovli-za-1-kvartal-2019-goda/ (In Russian)
16. Sklyarova E.E. Features of the development of an innovative economy and state innovation policy in Russia at the present stag e.
Novosibirsk: Center for the Development of Scientific Cooperation, 2015. 308 s. (In Russian)

Authors: Adwitiya Mukhopadhyay, Vaibhav B N

Paper Title: Fog Based Sensing and Transmission Mechanisms of Vital Bio-Signals
Abstract: Internet of Things (IoT) makes everything interconnected to communicate and perform tasks.
Some IoT examples to quote are smart city, smart house, smart bus etc. The main focus of this paper is to make a
survey and propose a system that automates bio-signal sensing in healthcare industry. The data which are recorded
should be accurate and should reach the destination in time for decision making. This can be achieved by using
precision microcontrollers enhanced with IoT and fog computing. Using IoT in healthcare industry makes these
processes faster and more accurate. Keeping the existing systems in mind we propose system which is a
combination of IoT and fog computing. The proposed system can be divided into 4 layers: data gathering, data
transmission, data storage and data retrieval. Usage of proposed system in healthcare industry can improve the
efficiency of transmitting vital data to healthcare centers during emergency.

Keyword : IoT, Fog Computing, Biomedical Sensors, e-Health, Bio-signal, Microcontrollers, Arduinos.
References:
1. “IOT Definition.” [Online]. Available: https://www.happiestminds.com/Insights/internet-of-things/.
2. V. M. Rohokale, “A Cooperative Internet of Things ( IoT ) for Rural Healthcare Monitoring and Control,” 2011.
3. A. A. Gurjar and N. A. Sarnaik, “Heart Attack Detection By Heartbeat Sensing using Internet Of Things : IoT,” pp. 3 –6, 2018.
4. S. Monisha, R. Niranjana, M. Sabitha, and V. Sowmiya, “Iot based earlier stroke prediction,” vol. 6, no. 03, pp. 118–122, 2019.
5. N. R. M, V. Prabu, R. Kumar, and M. Y. Ahamed, “IOT BASED EPILEPSY MONITORING AND DETECTION USING
AMBULATORY SYSTEM,” vol. 6, no. 03, pp. 2017–2019, 2019.
6. R. Harikrishnan, S. Keerthini, S. V Varshan, and R. Rahul, “IOT BASED SYSTEM DESIGN FOR DETECTING URINARY
BLADDER LEVEL,” vol. 6, no. 03, pp. 2017–2020, 2019.
7. B. N. Karthik, L. D. Parameswari, R. Harshini, and A. Akshaya, “Survey on IOT & Arduino Based Patient Health Monitoring Syste m,”
855. vol. 3, no. 1, pp. 1414–1417, 2018.
8. K. Yeh and S. Member, “A Secure IoT-Based Healthcare System With Body Sensor Networks,” IEEE Access, vol. 4, pp. 10288–10299,
2017. 4922-
9. A. Mukhopadhyay, B. Xavier, S. Sreekumar, and M. Suraj, “Real-Time ECG Monitoring over Multi-Tiered Telemedicine Environment 4928
using Firebase,” 2003.
10. D. N, R. K, R. Krishnan, and M. Ramesh, “A Low Cost Remote Cardiac Monitoring Framework for Rural Regions,” Proc. 5th EAI Int.
Conf. Wirel. Mob. Commun. Healthc. - "Transforming Healthc. through Innov. Mob. Wirel. Technol., 2015.
11. J. S. Kumar, “A Survey on Internet of Things : Security and Privacy Issues,” vol. 90, no. 11, pp. 20–26, 2014.
12. C. Doukas and I. Maglogiannis, “Bringing IoT and cloud computing towards pervasive healthcare,” Proc. - 6th Int. Conf. Innov.
Mob. Internet Serv. Ubiquitous Comput. IMIS 2012, pp. 922–926, 2012.
13. M. Hassanalieragh et al., “Health Monitoring and Management Using Internet-of-Things (IoT) Sensing with Cloud-Based Processing:
Opportunities and Challenges,” Proc. - 2015 IEEE Int. Conf. Serv. Comput. SCC 2015, pp. 285–292, 2015.
14. “IoT products.” [Online]. Available: https://econsultancy.com/internet-of-things-healthcare/.
15. “Benefits of IOT in Health care.” [Online]. Available: https://www.archer-soft.com/en/blog/5-benefits-internet-things-hospitals-and-
healthcare.
16. “Fog computing Definition.” [Online]. Available: https://internetofthingsagenda.techtarget.com/definition/fog-computing-fogging.
17. T. Patel and K. Jariwala, “Fog computing in iot 1 1,” pp. 17–21, 2018.
18. J. Abdelaziz, M. Adda, and H. Mcheick, “An Architectural Model for Fog Computing,” vol. 10, no. 1, pp. 21–25, 2018.
19. R. Mahmud, K. Ramamohanarao, and R. Buyya, “Latency-Aware Application Module Management for Fog Latency-aware Application
Module Management for Fog Computing Environments,” no. March, 2018.
20. [20] G. Lee, W. Saad, and M. Bennis, “An Online Secretary Framework for Fog Network Formation with Minimal Latency,” pp. 1 –6,
2017.
21. S. Sarkar, S. Member, S. Chatterjee, and S. Member, “Assessment of the Suitability of Fog Computing in the Context of Internet of
Things,” vol. 7161, no. c, pp. 1–14, 2015.
22. M. Chiang and T. Zhang, “Fog and IoT: An Overview of Research Opportunities,” IEEE Internet Things J., vol. 3, no. 6, pp. 854–864,
2016.
23. Y. N. Krishnan, C. N. Bhagwat, and A. P. Utpat, “Fog Computing- Network Based Cloud Computing,” no. Icecs, pp. 250–251, 2015.
24. T. N. Gia, M. Jiang, A. M. Rahmani, T. Westerlund, P. Liljeberg, and H. Tenhunen, “Fog computing in healthcare Internet of Th ings: A
case study on ECG feature extraction,” Proc. - 15th IEEE Int. Conf. Comput. Inf. Technol. CIT 2015, 14th IEEE Int. Conf. Ubiquitous
Comput. Commun. IUCC 2015, 13th IEEE Int. Conf. Dependable, Auton. Se, pp. 356–363, 2015.
25. T. N. Gia et al., “Fog Computing in Body Sensor Networks : An Energy Efficient Approach,” IEEE Int. Body Sens. Networks Conf., no.
August, 2015.
26. “MAX30100.” [Online]. Available: https://www.instructables.com/id/How-to-Wire-MAX30100-Heart-Rate-Monitor-With-Ardui/.
27. “Myoware muscle sensor.” [Online]. Available: https://randomnerdtutorials.com/9-biometric-sensors-arduino-compatible/.
28. “Difference between Arduino and Raspberry pi.” .
29. S. Anand and A. Rr, “A Protocol for The Effective Utilization of Energy in Wireless Sensor Network,” vol. 7, pp. 93–98, 2018.
30. S. Anand and P. A. Radhakrishna, “A Protocol for the Effective Utilization of Energy in Wireless Sensor Network,” vol. 7, pp. 82–86,
2018.

Authors: Bahram Ismailov Israfil


Simulation of Influences on the Dynamics of Transitional and Recurrent Processes of Complex
Paper Title:
Technical Systems
Abstract: The article presents the results of the analysis, simulation and evaluation of the vibration of
complex coupled power equipment. Earlier, the sources, causes and nature of forced oscillations of a complex
technical system with multidimensional chaotic behavior were considered. Ignoring the development of such
processes can lead to overloading of power equipment and its parts and is fraught with unpredictable consequences.
Using the examples of the influence and control of the dynamics of oscillating processes, various scenarios of the
development of the vibration process are simulated.
In addition to traditional methods for assessing the development of controlled processes, additional methods and
algorithms for visual and reflexive analysis have been proposed to help the decision maker in assessing the
situation.

Keyword : vibration, multi dimension alchaotic processes, Tsallis entropy, Poincare recurrence, stability,
Lyapunov exponents
References:
1. Ismailov B.I. (2018). Analysis and Control of Dynamic Processes in Mechanical Parts of Power Equipment. International Journal of
Mechanical and Production Engineering Research and Development (IJMPERD). Pp. 347-352.
2. Loskutov A.YU. (2001). Problemynelinejnojdinamiki II. Podavleniehaosaiupravleniedinamicheskimisistemami. VestnikMoskovskogo
Un-ta. Seriya 3. Fizika. Astronomiya, №3.- s. 3-21.
3. .Malineckij G.G., Potapov A.B. (2002).Sovremennyeproblemynelinejnojdinamiki. M.: Editorial URSS. 360 s.
4. Ismailov B.I. (2017). Thermodynamic – Informational Paradigm in the Context of the Formation of a Mathematical Model of Transient
856. Processes in an Open System. European Journal of Engineering Research and Science Vol. 2, No. 10.Pp. 17-20.
5. Hegari A.S., Matouk A.E. (2011). Dynamical behaviors and synchronization in the fractional order hyperchaotic Chen system. Applied
Mathematics Letters 24.Pp. 1938-1944. 4929-
6. Han Qiang at al. (2013). A four-dimension fractional order hyperchaotic system derived from Liu-system and its circuit research. Chinese 4932
Physics B. Volume 22, Number 2. Pp. 1-6.
7. Sprott J.C. (2003). Chaos and Time Series Analysis, Oxford University Press, Oxford. P. 507.
8. Panaggio Mark J. (2015). Chimera states: coexistence of coherence and incoherence in networks of coupled oscillators. IOP Publishing.
Nonlinearity 28. R67–R87. doi:10.1088/0951-7715/28/3/R67.
9. Shanahan Murray. (2010). Metastable chimera states in community-structured oscillator networks. Chaos 20.Pp. 1-5.
10. Poincare A. (1912). Calcul des Probabilities. Paris: Gouthier-Villars.
11. Eckmann J. at al. (1987).Recurrence plots of dynamical systems //Europhys. Lett., 4. Pp. 973-977.
12. Bruce Hobbs and Alison Ord (2018). Nonlinear dynamical analysis of GNSS data: quantification, precursors and synchronization.
Progress in Earth and Planetary Science. 35p.
13. Vladimirskij E.I., Ismajlov B.I. (2011).Nelinejnyjrekurrentnyjanalizkakmatematicheskaya model' upravleniyahaoticheskimiprocessami.
Informacionnyetekhnologii, №5, (177). s. 42-45.
14. Ismailov B.I. (2012). The Visual Control of Vibration Dynamic System. Eastern-European Journal of Enterprise Technologies. №5.
Pp.25-30.
15. Vladimirskiy E.I. (2005). Otobrazhenieprintsipovrefleksii v matematicheskoymodeliprinyatiyaudovletvoritelnyihresheniy. Tr. IV Mezhd.
Konferentsii «Identifikatsiyasistemizadachiupravleniya», SICPRO’05. Moskva 25-28 yanvarya. M.: Institut problem upravleniyaim.
V.A.Trapeznikova RAN. Pp. 1681-1688.
16. Zeleny L.M., Milovanov A.V. (2004).Fraktalnayatopologiyaistrannayakinetika: otteoriiperkolyatsii k
problemamkosmicheskoyelektrodinamiki. [Tekst]// UFN, t. 174, №8, s. 810-850.
17. Anishchenko V.S., Astakhov S.V. (2013) TeoriyavozvratovPuankareieyoprilozheniye k zadachamnelineynoyfiziki. [Tekst] //UFN 183
1009–1028.
18. Vladimirsky E.I. (2012). Poincare Returns Times in the Interaction of Chaotic and Stochastic Systems. Eastern-European Journal of
Enterprise Technologies. №6/4 (60). Pp.4-8.
19. Vladimirsky E., Ismailov B. (2014). Fractional Structure « MIXING - TRANSPORT » as Open System. Eastern-European Journal of
Enterprise Technologies. №4/4 (70). Pp.4-9.
20. Laskin N. at al. (2002). Fractional Levy Motion and Its Applications to Network Traffic Modeling. [Text].// Computer Networks, vol. 40,
issue 3, pp. 363-375. Doi>10.1016/S1389-1286(02)00300-6.

Authors: Charitha Krishna P, Balakrishna Murthy V, Chandra Mohan R

Paper Title: Analysis of Thermal Protection System in Flex Seal of a Rocket Motor
Abstract: A Thermal protection system is used to protect the rocket from the heat generated by the hot gases.
A thermal boot is used as the thermal protection system at the outside of the nozzle to protect the flex seal. The
objective of the present work is to design the thermal protection system for flex seal using different composite
857. materials for single time of flight and to study the ablation of the materials. The problem is modelled using
commercial ANSYS software. 3-D Axi-symmetric transient thermal analysis is performed for the flex seal along
4933-
with thermal protection system made of composite materials. The initial and boundary conditions are applied to
4936
meet the industrial requirement. From this analysis, thermal protection system made of different composite
materials is studied and one is suggested based on ablation and weight reduction.

Keyword : FEM, Flex Seal, Thermal protection system, Axi-Symmetry


References:
1. Borie. V, "Ablation of solid-propellant rocket-motor nozzle materials", Spacecraft Propulsion and Power, Paris, May 1993.
2. Clark, R. K., "An Analysis of a Charring Ablator with Thermal Non equilibrium, Chemical Kinetics, and Mass Transfer," NASA-TN-D-
7180, L-8670, 19730601, NASA-Langley Research Center, Hampton, VA, June 1, 1973.
3. Naveen. J,"Thermal analysis of flex nozzle of a composite rocket motor casing", PG Thesis MED, VRSEC, Nov- 2013.
4. Ajay, "Finite element analysis of flex nozzle system of solid rocket motor" IJERIA, Vol. 5, Nov-2012.
5. Eswar Kumar "Analysis of flex of rocket nozzle", PG Thesis, MED, VRSEC, Nov-2014.
6. Prakash.D "Study of Non-Linear Static Behavior of Flex Seal of Rocket Nozzle by Varying Number of Shims", PG Thesis, MED,
VRSEC, Nov-2015.
7. D. Madhav "thermal analysis of flex seal of a rocket" PG Thesis, MED, VRSEC, Nov-2016.
8. V. Bala Krishna Murthy, G. Samba Siva rao "Prediction of mechanical properties of polymer matrix FRP composites with imperfec tions
using micromechanical finite element analysis" Research Promotion Scheme A, AICTE, 2013.
9. P. Charitha Krishna "Analysis of Thermal Protection System In Flex Seal Of A Rocket Motor" PG Thesis, MED, VRSEC, Oct-20.

Authors: Venkata Sai Mounik Yerubandi, Praveen Mathi, Kali Prasad Varma Namburi

Paper Title: Implementation of Lean Six Sigma in public Road Transportation


Abstract: This paper presents the defect identification, defect reduction and continuous improvement in
public road transportation by using lean six sigma methodologies. Lean methodologies will reduce the waste i.e.
unnecessary efforts or tasks. The main aim of lean is to improve productivity i.e. to increase profit to the
organization. The six sigma methodologies are centered towards the elimination of variations i.e. reduction of
defects. The main objective of six sigma is 3.4 defects per million opportunities, whichlead to fulfilling the
customer requirements. The six sigma tools arearithmeticaland statistical based. The lean mainly focused on the
flow and the six sigma mainly focused on the problem. By combining, these two methodologies and implementing
in public road transportation will leads to increase the profit of the organization and customer satisfaction. The
results achieved by using DMAIC methodology and lean tools.

858.
Keyword : lean, six sigma, methodologies, variations, continuous improvement, DMAIC.
4937-
References: 4940
1. https://www.isixsigma.com/methodology/.
2. S.K. Bhattacharyya and Zillur Rahman, (2004), "Capturing the customer's voice, the centerpiece of strategy making", European Business
Review, Vol. 16 Iss 2 pp. 128 – 138.
3. H. Brian Hwarng, Cynthia Teo, (2001), "Translating customer's voices into operations requirements", International Journal of Quality
&amp; Reliability Management, Vol. 18 Iss 2 pp. 195-226.
4. Jiju Antony and E. V. Gijo, and S.J. Childe, (2012) Case study in six sigma methodology: manufacturing quality improvement and
guidance for managers. Production Planning and Control, 23 (8). pp. 624-640.
5. Niraj G. Pai Bhale, P.K. Srividhya, V. Mariappan, Amol N. Patil, and M. Prabhakaran, International Journal of Performability
Engineering, Vol. 13, No. 1, January 2017, pp. 19-28.
6. George, M.L, Lean Six Sigma for Services, 2003.
7. Alessandro Laureani and Jiju Antony, Lean six sigma in a call center: a case study, International Journal of Productivity and Performance
Management, Vol. 59 No. 8, 2010 pp. 757-768.
8. Salah Deeb, Hind bril-EI Haouzi, Alexis Aubry, Michele Dassisti, “A generic framework to support the implementation of six sigma
approach in SMEs”, IFAC PapersOnLine 51-11 (2018) 921–926.

Authors: Vijaya Kanth P, Balakrishna Murthy V, Chandra Mohan R

Paper Title: Simulation of Thermal Ablation Process using ANSYS Software


Abstract: An ablation process during the Pyrolysis of an insulating layer used in a thermal protection system
is simulated using the commercial software ANSYS in the present work. Two different methods are proposed and
established for mutual validation. Both the methods estimate the ablation by successive eliminations of the regions
exposed to melting point temperature from a transient thermal analysis with suggested mesh quality and time
increments satisfying the convergence of results. Two-dimensional plane models are solved and the effect of
burning time and load pattern on ablation is analyzed. The proposed methodology can be used to predict the
thermal ablation in thermal protection systems of various space applications.
859.
Keyword : Ablation, FEM, Transient heat transfer, Logarithmic load 4941-
4942
References:
1. Donald M. Curry, 1965, An analysis of a charring ablation thermal protection system, NASA technical note, D-3150.
2. Ashraf Fathy Ahmed and Suong V. Hoa, 2012, Thermal insulation by heat resistant polymers for solid rocket motor insulation, Journal of
Composite Materials, 46, 1549–1559
3. Mohan Kumar L., Anandapadmanabhan EN., Usha KM., Chakravarthy P., 2016, Development, Characterization and Qualification of
Aerospace Ablative Composites, International Advanced Research Journal in Science, Engineering and Technology, 3, 87-91.
4. Y. Pawan Kumar, 2017, Finite element simulation of ablation process in a rocket nozzle using ANSYS software, M. Tech. Thesis,
Thermal Engineering, V. R. Siddhartha Engineering College.
5. P. Charitha Krishna, 2017, Analysis of thermal protection system in flex seal of a rocket motor” M. Tech. Thesis, Thermal Engineering, V.
R. Siddhartha Engineering College.

Authors: Shakhlo Sadullaeva, Yana Arustamyan, Nilufar Sadullaeva


860. Shifting the Assessment Paradigm from Knowledge to Skills: Implementation of New Appraisal
Paper Title:
Procedures in EFL Classes in Uzbekistan
Abstract: The present study is devoted to the analysis of the situation emerging in Uzbekistan classes teaching
English as a foreign language on the level of higher education in connection with the modernization of assessment
procedures. The research aims at defining the problems occurring in assessment systems, analysis of the reasons
that lead to this situation, and suggestion of possible solution to them. In the course of experiment different
approaches were suggested to the appraisal of knowledge, obtained as learning outcomes and skills, developed as a
result of application of the acquired knowledge. The experimental design, basing on four principal stages of
monitoring (informational, diagnostic, comparative, and prognostic) proved the inability of the students to employ
higher cognitive skills in the process of finding solutions to the problems stated as revised test assignments.

Keyword : assessment, evaluation, EFL, monitoring, washback effect


References:
1. -Ozvaris, S, Sonmez, R, Sayek, I. (2004). Assessment of knowledge and skills in primary health care services: senior medical s tudents'
self-evaluation. Teaching and learning in medicine 16(1), 34-38.
2. Biggs, J. B (2003). Teaching for quality learning at university: what the student does. 2nd ed. Buckingham: Society for Research into
Higher Education
3. Bloom, B. (1956). Taxonomy of Educational Objectives: the Classification of Educational Goals. Susan Fauer Company.
4. Bloxham, S., Boyd, P. (2007). Developing Effective Assessment in Higher Education - A Practical Guide. Maidenhead: McGraw-Hill.
5. Boruff, J.T., Harrison P. (2018). Assessment of knowledge and skills in information literacy instruction for rehabilitation sciences students:
a scoping review. Journal of the Medical Library Association, http://doi.org/10.5195/jmla.2018.227.
6. Brown, J. D. (2002). Extraneous variables and the washback effect. Shiken: JALT Testing & Evaluation SIG Newsletter, 6 (2), 10-13.
7. Brown, S., Rust, C., Gibbs, G. (1994). Strategies for diversifying assessment in higher education. Oxford: The Oxford Centre for Staff and
Learning Development, Oxford Brookes University.
8. Boud, D. (2000). Sustainable assessment: Rethinking assessment for the learning society. Studies in Continuing Education, 22(2),151–167.
9. Business Dictionary. Retrieved from http://www.businessdictionary.com/definition/knowledge.html
10. Collins free online English dictionary. Retrieved from https://www.collinsdictionary.com/dictionary/english/knowledge
11. Dann, R. (2014). Assessment as learning: blurring the boundaries of assessment and learning for theory, policy and practice. Assessment in
Education: Principles, Policy & Practice, 21(2), 149-166,
http://doi.org/10.1080/0969594X.2014.898128.
12. Dictionary by Merriam-Webster. Retrieved from https://www.merriam-webster.com/dictionary/knowledge
13. Fletcher, R.B., Meyer, L.H., Anderson, H. et al. (2012). Faculty and Students Conceptions of Assessment in Higher Education. Higher 4943-
Education, 64 (1), 119-133, https://doi.org/10.1007/s10734-011-9484-1.
14. Frankenberg-Garcia, A. (2018) Investigating the collocations available to EAP writers. Journal of English for Academic Purposes 35, 93-
4952
104 https://doi.org/10.1016/j.jeap.2018.07.003 1475-1585/
15. Gibbs, G. (1999). Using assessment strategically to change the way students learn. In S. Brown & A. Glasner (Eds.), Assessment matters in
higher education: Choosing and using diverse approaches (pp 41-53). Buckingham: SRHE and Open University Press.
16. Isaacs, T., Lamprianou, I. (2018). International assessment policy reform: nothing new under the sun. Assessment in Education: Principles,
Policy & Practice, 25(3,) 227-229, http://doi.org/10.1080/0969594X.2018.1482094.
17. Khan, J.S. (2010). Assessment driven integrated learning (ADIL): assessment directed medical education (ADME) curriculum. J Ayub
Med Coll Abbottabad, 22(4), 201-206.
18. Krashen, S. D. (1987). Principles and Practice in Second Language Acquisition. Prentice-Hall International.
19. Krashen, S. D. (1988). Second Language Acquisition and Second Language Learning. Prentice-Hall International.
20. Marshall, B., Drummond, M. J. (2006). How teachers engage with Assessment for Learning: Lessons from the classroom. Research
Papers in Education, 21, 133-149.
21. McCoubrie, P. (2004). Improving the fairness of multiple-choice questions: a literature review, Medical Teacher, 26(8), 709-712,
http://doi.org/10.1080/01421590400013495.
22. Messick, S. (1996). Validity and washback in language testing. Language Testing, 13, 241-256.
23. Morrow, K. (1986). The evaluation of tests of communicative performance. Innovations in Language Testing. London: NFER/Nelson.
24. Nind, M., Lewthwaite, S. (2018) Methods that teach: developing pedagogic research methods, developing pedagogy. International Journal
of Research & Method in Education, 41(4), 398-410, http://doi.org/10.1080/1743727X.2018.1427057.
25. Race, P. (2009). UK Centre for Bioscience Briefing on Assessment. Leeds: HEA Centre for Bioscience.
26. Radjabova, G.G. (2018). The role of assessment in teaching English. O’zbekistonda horijiy tillar, 3(22), 93-98.
27. Ramsden, P. (2003). Learning to Teach in Higher Education, 2nd edition. London: RoutledgeFalmer
28. Resolution PR-1875 On the measures of further improvements of teaching foreign languages. (2012). Retrieved from
http://www.lex.uz/docs/2126032
29. Sadler, R. (1989). Formative assessment and the design of instructional systems. Instructional Science, 18, 119-144.
30. Sadler, R. (1998). Formative assessment: Revisiting the territory. Assessment in Education: Principles, Policy & Practice, 5, 77.
31. Scouller, K. (1998). ‘The influence of assessment method on students’ learning approaches: Multiple choice question examination versus
assignment essay. Higher Education, 35, 453-472.
32. Torrance, H. (2007). Assessment as learning? How the use of explicit learning objectives, assessment criteria and feedback in post-
secondary education and training can come to dominate learning. Assessment in Education: Principles, Policy & Practice, 14, 281-294.
33. Toshpulatova, D. (2015). Forms and principles of assessment in teaching foreign languages. O’zbekistonda horijiy tillar, 7, 91-96.
34. Van de Watering, G., Gijbels, D., Dochy, F., Van der Rijt, J. (2008). Students’ assessment preferences, perceptions of assessment and their
relationships to study results. Higher Education, 56(6), 645. https://doi.org/10.1007/s10734-008-9116-6
35. Zvonnikov, V.I., Chelishkova, M.B. (2013) Современные средства оценивания результатов обучения [Modern means of assessment
of learning outcomes]. Moskow: Academia.

Authors: Shiela David, Amrit Anupam Biswal, Sagar Pratap, Hariharan.K

Paper Title: Advance Automatic Toll Collection & Vehicle Detection using Iot
Abstract: In our step by step life we as often as possible go through toll square.There is a blockage wastage
of time as well as fuel at toll gates. To vanquish above issues, it becomes critical to quicken the method near toll
861. court. From now on to overcome the issues saw toll court RFID based toll gathering structure is used. The planning
time required by RFID Toll Collection System is extensively not exactly but manually toll amassing structure. 4953-
Manually toll gathering structure in like manner prompts human botches which may incite erroneous toll 4955
aggregation. We furthermore every now and again find the opportunity to hear that the amount of endeavor at
murder cases is extending well ordered. There may even be a loss of life. It’s difficult to get the liable party in
endeavor at homicide cases. It is seen that in case of stolen vehicle it is incredibly difficult to pursue the vehicle. It
is critical to control all these above issues. Thusly, systems similarly has additional function of distinguishing the
stolen vehicles and disaster cases that are enlisted. It is seen that over-troubling the vehicles may incite accident and
besides hurt the boulevards. This issue is adds address for system by measuring items passing on vehicle and blame
them for excess toll if it is over-trouble so they won't over-load again. Structure moreover makes portion system
straightforward by making all trade. An assessment in field of usage of RFID structure is developing giant scale.

Keyword : Internet of things; IOT , Smart Roadways, digital technology , public transport problem .
References:
1. N. Jeevagan, P. Santosh, R. Berlia, S. Kandoi, “RFID Based Vehicle Identification ” IEEE Global Humanitarian Technology Confe rence
2018.
2. R. Kalantri, A. Parekar, A. Mohite, R. Kankapurkar, “RFID based toll collection system,” International Journal of Comp uter Science and
Information Technologies, Vol. 5 (2) 2018.
3. R.B. Takbhate,S.D. Chavan “Automated Toll Booth System,” International Journal of Research Studies in Computer Science and
Engineering, Vol. 1 (3), July2018 .
4. T.Aphale, R. Chaudhari, J. Bansod “Automated Toll Plaza Using RFID and GSM” International Journal on Recent and Innovation Trends
in Computing and Communication Volume: 2 Issue: 9, September 2018 .
5. G.K. Andurkar, V.R. Ramteke,”Smart Highway Electronic Toll Collection System,” International Journal of Innovative Research in
Computer and Communication EngineeringVol. 3, Issue 5, May 2018.
6. M.Rajeswari ,S.Chandana,D.VPruthvi, SarithaS.P,Ramya “Collision Detection And Avoidance Using Intelligent Vehicle Communication
Protocol,” National Conference on Recent Advances in Information & Communication Engineering (NCRAICE-2018)
7. R.Aishvarya, S.Poornima, K.Pradeepa, T.Subashini4, K.P.Lavanya “Automatic and Effective Tracking of Hit & Run Misbehavior Dri ver
with Emergency Ambulance Support,”International Journal of Advanced Research in Electrical, Electronics and Instrumentation
Engineering Vol. 5, Issue 3, March 2018.

Authors: Pearl Nightingale. R.H, Mrunal Deshpande

Paper Title: Indoor Photovoltaics and It’s Applications


Abstract: Solar energy from the sun rays are being utilized to generate electric power using solar powered
photovoltaic panels. Implementation of this solar photovoltaic panels as a source of renewable energy is well
known. But going a step further, our house or office can be made ‘smart’ if effective indoor light harvesting
technology is developed. The indoor photovoltaic converts radiant capacity into electric power. These solar cells
are categorized based on the materials used namely: amorphous silicon, crystal silicon and confined semiconductor.
Our review suggests that the Dye- Sensitized solar cells (DSSC) could be promising as indoor power sources for
microelectronic devices, wireless sensors and microelectrochemical systems. This paper resents An evaluation of
research being done in this area and there from brief introduction to the materials used for the same.

Keyword : Amorphous silicon(a-Si), crystalline silicon (c‐Si), Cadmium Tellurium(CdTe) Dye- Sensitized
solar cells (DSSC), Gallium arsenide (GaAs), Galliun Indium Phosphide(GaInP), multicrystalline silicon (mc‐Si).
References:
862. 1. Ahmed Hossam Eldin , Mostafa Refaey , Abdelrahman Farghly “A Review on Photovoltaic Solar Energy Technology and its Efficiency”.
Research Gate, 22nd December 2015.
2. R.R.King, P.C.Coller, D.E.Joslin, D.D.Krut, N.H.Karam and Sarah Kurtz, “High Voltage , Low Current Gain GaInP/GaAs/GaIn NAs/Ge 4956-
Solar Cells”. Conference Record of the Twenty-Ninth IEEE Photovoltaic Specialistics Conference, 2002 on 22 April 2003. 4960
DOI:10.1109/PVSC.2002.1190713
3. K.Yarnamoto, M.Yoshimi, T.Suzuki, T.Nakat,T.Sawada, A. Nakajima and K.Hayashi, “Large Area and High Efficiency a-Si/Poly-Si
Stacked Solar Cell Submodule” Conference Record of 28 th IEEE PV conference 2000 in 06 August 2002.
DOI:10.1109/PVSC.2000.916161
4. Douglas M Bishop, Teodor Todorov, Yun Seog Lee, Oki Gunawan , Richard Haight, “Record Efficiencies for Selenium Photovoltaics and
Application to Indoor Solar Cells” 2.17 IEEE 4 th PVSC on 05 November 2018. DOI:10.1109/PVSC.2017.8366455
5. Kjell Cnops, Eszter Voroshazi, Carl Hart de Ruijter, Paul Heremans, David Chenyns, “Organic photovoltaic cell relying on en ergy
transfer with over 20% efficiency in indoor lighting”. 2104 IEEE 40 th PVSC
6. Monika Freunek, Michael Freunek, M.Reindl, “ Maximum efficiencies of Indoor Photovoltaic Devices”. IEEE Journel of Photovolta ics
on Jan 2013. DOI:10.1109/JPHOTOV.2012.2225023
7. C. Deline, J.Del Cueto, D.S.Albin, C.Petersen, L.Tyler, “Transient Response Of Cadmium Telluride Modules To Light Exposure”. 2011
37th IEEE Photovoltaic Specialists Conference, 19 April 2012. DOI:10.1109/PVSC.2011.6186602
8. Ian Matthews, Paul.J.King, Frank Stafford and Ronan Frizzell, “Performance of III–V Solar Cells as Indoor Light Energy Harvesters”
IEEE Journal of Photovoltaics, 26 October 2015. DOI:10.1109/JPHOTOV.2015.2487825
9. K.Luczak, C.P.Lund, P.J.Jennings and J.C.L.Cornish, ”Recovery Of Light Induced Degradation In Amorphous Silicon Solar Cells And
Modules”, 2006 IEEE 4 th World Conference o Photovoltaic Energy Conference, 15 January 2007. DOI:10.1109/WCPEC.2006.279923
10. Di Zhang, Abdul Hzi Alami, Muhammed Tawalbeh, Kamilia Aokal, Alya Alhammadi, “Effeciency and High Temperature response of
DSSC using natural dyes extracted from calotropis”

Authors: S.Srijayanthi, T.Sethukarasi, A.Thilagavathy

Paper Title: Efficient Anonymization Algorithm for Multiple Sensitive Attributes


Abstract: The data of medical applications over the internet contains sensitive data. There exist several
863. methods that provide privacy for these data. Most of the privacy-preserving data mining methods make the
assumption of the separation of quasi-identifiers (QID) from multiple sensitive attributes. But in reality, the 4961-
attributes in a dataset possess both the features of QIDs and sensitive data. In this paper privacy model namely
4963
(vi…vj)-diversity is proposed. The proposed anonymization algorithm works for databases containing numerous
sensitive QIDs. The real dataset is used for performance evaluation. Our system reduced the information loss for
even huge number of attributes and the values of sensitive QID’s are protected.
Keyword : quasi-identifiers, sensitive attribute, anonymization..
References:
1. G. O. Young, “Synthetic structure of industrial plastics (Book style with paper title and editor),” in Plastics, 2nd ed. vol. 3, J.
Peters, Ed. New York: McGraw-Hill, 1964, pp. 15–64.
2. W.-K. Chen, Linear Networks and Systems (Book style). Belmont, CA: Wadsworth, 1993, pp. 123–135.
3. H. Poor, An Introduction to Signal Detection and Estimation. New York: Springer-Verlag, 1985, ch. 4.
4. B. Smith, “An approach to graphs of linear forms (Unpublished work style),” unpublished.
5. E. H. Miller, “A note on reflector arrays (Periodical style—Accepted for publication),” IEEE Trans. Antennas Propagat., to be
published.
6. J. Wang, “Fundamentals of erbium-doped fiber amplifiers arrays (Periodical style—Submitted for publication),” IEEE J. Quantum
Electron., submitted for publication.
7. C. J. Kaufman, Rocky Mountain Research Lab., Boulder, CO, private communication, May 1995.
8. Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate
interfaces(Translation Journals style),” IEEE Transl. J. Magn.Jpn., vol. 2, Aug. 1987, pp. 740–741 [Dig. 9th Annu. Conf. Magnetics
Japan, 1982, p. 301].
9. M. Young, The Techincal Writers Handbook. Mill Valley, CA: University Science, 1989.
10. (Basic Book/Monograph Online Sources) J. K. Author. (year, month, day). Title (edition) [Type of medium]. Volume(issue).
Available: http://www.(URL)
11. J. Jones. (1991, May 10). Networks (2nd ed.) [Online]. Available: http://www.atm.com
12. (Journal Online Sources style) K. Author. (year, month). Title. Journal [Type of medium]. Volume(issue), paging if given.
Available: http://www.(URL)
13. D. Sanchez, J. Domingo-Ferrer, S. Martinez, and J. Soria Comas, “Utility-preserving differentially private data releases via
individual ranking microaggregation,” Information Fusion, vol. 30, pp. 1–14,2016.
14. J. Cao and P. Karras, “Publishing microdata with a robust privacy guarantee,” Proc. VLDB, vol. 5, no. 11, pp. 1388–1399, 2012.
15. J. Soria-Comas and J. Domingo-Ferrer, “Probabilistic k-anonymity through microaggregation and data swapping, ”IEEE
International Conference on Fuzzy Systems,pp. 1–8, 2012.
16. K. Wang, Y. Xu, A. W. C. Fu, and R. C. W. Wong, “FF-Anonymity: When Quasi-identifiers Are Missing,” IEEE ICDE, pp. 1136–
1139,2009.
17. X. Jin, M. Zhang, N. Zhang, and G. Das, “Versatile publishing for privacy preservation,” ACM KDD, pp. 353 –362,2010.
18. Y. Ye, Y. Liu, C. Wang, D. Lv, and J. Feng, “Decomposition: Privacy Preservation for Multiple Sensitive Attributes,” DASFAA,
pp. 486–490,2009.
19. P. Shi, L. Xiong, and B. Fung, “Anonymizing data with quasisensitive attribute values,” ACM CIKM, pp. 1389–1125 ,2010.
20. J. Soria-Comas, J. Domingo-Ferrer, D. Sanchez, and S. Martinez, “t- Closeness through Microaggregation: Strict Privacy with
Enhanced Utility Preservation,” IEEE Transactions on Knowledge and Data Engineering, vol. 27, no. 11, pp. 3098–3110, 2015.

Authors: S.Annie Priyadharshini, J.Clement Sudhahar


Antecedents of Employee Loyalty With Reference To Job Satisfaction in Pump Manufacturing
Paper Title:
Industries-Coimbatore City
Abstract: Coimbatore is among the most industrially developed and commercially vibrant districts in
TamilNadu. There are about 600 pump manufacturing units and 400 supporting units (support of pump set Parts) in
Coimbatore; it accounts for nearly 40% of the pump sets manufactured in India. Employees play a vital role in this
regards. Most of the organization wants to retain the talented employees in the organization, in the same way
employees join the organization with various expectations and job needs. Various studies showed that job
dissatisfaction leads to employee turnover absenteeism etc.The present study made an attempt to examine the
relationship between job satisfaction and employee loyalty in pump manufacturing industries in Coimbatore region.

Keyword : employee loyalty, organization Success Organization success, Job Performance


864. References:
1. Khuong, Ngoc Mai & Tien, Diem Bui (2013), Factors influencing employee loyalty directly and indirectly through Job 4964-
Satisfaction-A study of Banking Sector in Ho Chi Minh City, International Journal of Current Research and Academic Review, 4968
Vol.1 (4), Pp: 81-95
2. Ms. Chetna Pandey & Mrs. Rajni Khare (2012), Impact Of Job Satisfaction And Organizational Commitment On Employee
Loyalty, International Journal Of Social Science & Interdisciplinary Research Vol.1 Issue 8, August 2012, ISSN 2277 3630
3. Karuppasamy Ramanathan & ShanmugaSundaram Senthil ,(2013) A Study on Role of Employee Loyalty in Quality Service of
Equipment Rental Business Life Science Journal 2013; 10(9s):221-229] (ISSN: 1097-8135).
4. Seema Mehta,Tarika Singh, S.S. Bhakar, Brajesh Sinha,(2010) Employee Loyalty towards Organization -A study of
Academician International Journal of Business Management and Economic Research (IJBMER) Vol 1(1),2010,98-
108(ISSN:2229-6247)
5. Kiruthiga.V & Magesh.R (2015) “Rouse Employee Loyalty Through Job Satisfaction” Australian Journal of Basic and Applied
Sciences, 9(10) Special 2015, Pages: 273-280, ISSN:1991-8178
6. Web article “Tips to Improve Employee Loyalty, by Susan E. DeFranzo-Marketing Manager, U.S. at Snap Surveys, (Web
source: https://www.snapsurveys.com/blog/tips-improve-employee-loyalty-part-1/
7. Web article “Tips to Improve Employee Loyalty, by Susan E. DeFranzo-Marketing Manager, U.S. at Snap Surveys, (Web
source: https://www.snapsurveys.com/blog/tips-improve-employee-loyalty-part-1/

Authors: Sabir S. Sayyed, Anand B. Tapase, Ravindra P. Patil, A. C. Attar, Piyush G. Chandak

Paper Title: Performance Evaluation of Flexible Pavement for Critical Parameters Causing Premature Failure
Abstract: The present study focusses on the performance of flexible pavement at a different temperature. The
865. analysis is carried out using 2D axisymmetric finite element model for a combination of varying thicknesses of a
bituminous layer with base and sub-base. The study is very much useful to know the behaviour of flexible 4969-
pavement under varying climatic conditions along with loading and material properties. The critical parameters are 4976
examined to know the cause of failure of the existing pavement structure. The study evaluates different pavement
distresses in terms of rutting and fatigue life.
Keyword : Rutting, Fatigue, Premature Failure, Flexible Pavement
References:
1. American Association of State Highway Officials AASHTO (1993). AASHTO guide for the design of pavement structures.
AASHTO, Washington, D.C.
2. Andrew Chiasson, Cenk Yavuzturk, Khaled Ksaibati (2008). “Linearized approach for predicting thermal stresses in asphalt
pavements due to environmental conditions.” Journal of Materials in Civil Engineering. ASCE, 20(2), 118-127. doi: 10.1061/
(ASCE)0899-1561(2008)20:2 (118).
3. Animesh, Das, Pandey, B.B. (1999). “The m-e design of bituminous road: An Indian perspective.” Journal of Transportation
Engineering, ASCE, 125(5), 463-471. doi: 10.1061/ (ASCE) 0733-947X (1999)125:5(463).
4. Armando Orobioa and John P. Zaniewskib (2013). “Sensitivity of the mechanistic-empirical pavement design guide to traffic inputs:
a space-filling approach." Road Materials and pavement design, Taylor & Francis, 14(3), 735–746, doi:
10.1080/14680629.2013.816248.
5. Arpan Ghosha A. Padmarekhab J. Murali Krishnanc (2013) “Implementation and Proof-Checking of Mechanistic-Empirical
Pavement Design for Indian Highways Using AASHTOWARE Pavement ME Design Software.” Procedia-Social and Behavioral
Sciences 119–128 doi: 10.1016/j.sbspro.2013.11.104
6. Diefenderfer, B. K., Al-Qadi, I. L., and Diefenderfer, S. D. (2006). Model to predict pavement temperature profile: development and
validation. Journal of Transportation Engineering, ASCE, 132(2), 162-167.
7. Guangming Wang and Reynaldo Roque (2011). “Evaluation of truck tyre types on near-surface pavement response based on finite
element analysis.” International Journal of Pavement Research and Technology, 4(4), 203-211.
8. Helwany, Sam, Dyer, John, Joeleidy (1998). “Finite element analysis of flexible pavement.” Journal of Transportation Engineering,
ASCE, 124(5), 491-499. doi: 10.1061/(ASCE)0733 947X(1998)124:5(491).
9. Huang H.Yang (2008). Pavement analysis and design, Pearson Education Inc, and Dorling Kindersley Publishing, Inc, second
edition.
10. Immanuel, S., and Timm, D. H. (2006). Measured and Theoretical Pressures in Base and Subgrade Layers under Dynamic Truck
Loading. Proceeding, 2006 Airfield and Highway Pavement Specialty Conference, American Society of Civil Engineers, 155-166.
11. IRC: 37-2012. Guidelines for the design of flexible pavements. Indian Roads Congress, New Delhi.
12. Maha A. El-shaib, Sherif M. El-Badawy, El-Sayed A. Shawaly (2017). “Comparison of AASHTO 1993 and MEPDG considering the
Egyptian climatic conditions.” Innovative Infrastructure Solution. Springer International Publishing Switzerland. doi: 2(18),
doi:10.1007/s41062-017-0067-6.
13. Mohd Rosli Mohd Hasan, Jacob E. Hiller and Zhanping You (2015) “Effects of mean annual temperature and mean annual
precipitation on the performance of flexible pavement using ME design.” International Journal of Pavement Engineering,
doi.org/10.1080/10298436.2015.1019504.
14. NCHRP (2007). Evaluation of mechanistic-empirical design procedure. National Cooperative Highway Research Program, NCHRP
Project 1-37A, National Research Council, Washington.
15. Omran Maadani and A. O. Abd El Halim, (2017) “Environmental Considerations in the AASHTO Mechanistic-Empirical Pavement
Design Guide: Impacts on Performance.” Journal of Cold Regions Engineering, ASCE, ISSN 0887-381X
16. Piyush G. Chandak, Anand B. Tapase, Sabir S. Sayyed, Abdulrashid C. Attar (2017). “A State-of-the-Art Review of Different
Conditions Influencing the Behavioral Aspects of Flexible Pavement.” Advancement in the Design and Performance of Sustainable
Asphalt Pavements, Springer International Publishing, 300-312, doi: 10.1007/978-3-319-61908-8_22.
17. R.M. Mulungye, P.M.O. Owende and K. Mellon (2007). “Finite element modeling of flexible pavement on soft soil subgrades.”
Materials and Design. Elsevier. (28), 739-756.
18. Rahman M.T, Mahmud K and Ahsan S (2011). Stress-Strain characteristics of flexible pavement using finite element analysis.
International Journal of Civil and Structural Engineering, 2(1), 233-240.
19. Raj V. Siddharthan, Peter E. Sebaaly, Magdy El-Desouky, Dan Strand and David Huft (2005). “Heavy off-road vehicle tyre-
pavement interaction and response.” Journal of Transportation Engineering, ASCE, 131(3), 239-247. Doi: 10.1061/ (ASCE) 0733-
947X (2005) 131:3(239).
20. Ranadive, M.S and Anand B. Tapase (2016). “Parameter sensitive analysis of flexible pavement.” International Journal of Pavem ent
Research and Technology (IJPRT), Elsevier, Special Issue on Sustainability on Pavement Engineering.
doi:10.1016/j.ijprt.2016.12.001.
21. Ranadive, M.S. & Tapase, A. (2016). “Pavement performance evaluation for different combinations of temperature conditions and
bituminous mixes.” Innovative Infrastructure Solutions, Springer 1 (40), doi: 0.1007/s41062-016-0040-9.
22. Ranadive, M.S., Tapase, A.B. (2013). “Investigation of behavioral aspects of flexible pavement under various conditions by finite
element method.” Constitutive modeling of geomaterials, doi: 10.1007/978-3-642-32814-5_100
23. Ripunjoy Gogoi, Animesh Das and Partha Chakraborty (2013). “Are fatigue and rutting distress modes related?.” International
Journal of Pavement Research and Technology, 6(4), 269-273.
24. Sanaa Masad, Dallas Little and Eyad Masad (2006). “Analysis of flexible pavement response and performance using isotropic and
anisotropic material properties.” Journal of Transportation Engineering, ASCE, 132(4), 342-349.
25. Tapase A.B., Ranadive M.S. (2017) “Predicting Performance of Flexible Pavement Using Finite Element Method.” Advancement in
the Design and Performance of Sustainable Asphalt Pavements. Sustainable Civil Infrastructures. Springer, doi.org/10.1007/978 -3-
319-61908-8_11.
26. Tapase A, Ranadive M (2016). “Performance evaluation of flexible pavement using finite element method.” Material, Design,
Construction, Maintenance and testing of pavement, doi: 10.1061/9780784480090.002.
27. Xu Yang, Zhanping You, Jacob Hiller and David Watkins (2015) “Sensitivity of flexible pavement design to Michigan’s climatic
inputs using pavement ME design.” International Journal of Pavement Engineering, Taylor & Francis
doi.org/10.1080/10298436.2015.1105373
28. Yuhong Wang and Dan Chong (2015) “Long-Life Flexible Pavement: Myth, Reality, and the Way Forward.” ASCE New Frontiers in
Road and Airport Engineering, 268-283.
29. Zuo, G., Drumm, E. C., and Meier, R. W. (2007). “Environmental effects on the predicted service life of flexible pavements.” J.
Transp. Eng., 133(1), 47-56.

Authors: M.Sujatha, V.Sandeep, Ch. Aishwarya, B.Mounika

Paper Title: Hand Writing recognition System using Neural Networks


Abstract: Handwritten Recognition is a process of pattern recognition which defines ability of a system to
866. identify characters. There are many applications of Handwritten recognition (HWR) system such as reading postal
addresses, bank check amounts, mail sorting and many more. HWR systems transcribes human written text into 4977-
digital text. Plenty of research done in the field of recognizing handwritten characters but lacking in best accuracy 4980
is a challenge. In this proposed technique, offline HWR is done using Neural networks(NN) and Tensorflow is
proposed. The proposed technique used to build a system which will be able to recognize the hand written
characters with highest accuracy. The experiment is performed on proposed technique with accuracy of 85.5%
compared to the state-of-the-art.

Keyword : Hand Written Recognition, Neural networks, Tensor flow.


References:
1. J.Pradeep, E.Srinivasan and S.Himavathi,”Diagonal Based Feature Extraction For Handwritten Alphabets Recognition System Using
Neural Network”,International Journal of Computer Science & Information Technology (IJCSIT), Vol 3, No 1, Feb 2018 Pondicherry,
India.
2. N.Sharma, U.Pal, F.Kimura, “Recognition of Handwritten digits”,9th International Conference on Information Technology(ICIT06),2017.
3. Megha Agarwal, Shalika, Vinam Tomar, Priyanka Gupta,Handwritten, “Character Recognition using Neural Network and Tensor
Flow”,International Journal of Innovative Technology and Exploring Engineering (IJITEE),ISSN: 2278-3075, Volume-8, Issue- 6S4, April
2019
4. Akm Ashiquzzaman and Abdul Kawsar Tushar,”Handwritten Arabic Numeral Recognition using Deep Learning Neural
Networks”,University of Asia Pacifific, Dhaka, Bangladesh.
5. N. Arica and F. Yarman-Vural, “An Overview of Character Recognition Focused on Off-line Handwriting”, IEEE Transactions on
Systems, Man, and Cybernetics, Part C: ,Applications and Reviews, 2016, 31(2)
6. K.GauravandBhatiaP.K.,”Analytical Review of Preprocessing techniques for Offline Handwrittten Character Recognition”, 2nd
International Conference on Emerging Trends in Enginerring & Management,ICETEM, 2019.

Authors: Siddhartha Dhar Choudhury, Shashank Pandey, Kunal Mehrotra, Christhu Raj, Rajeev S

Paper Title: Reducing Regression Time in Neural Network using Nth Absolute Root Mean Error
Abstract: Neural networks require a large dataset to learn features, and this takes high computational power,
even using high end Graphical Processing Units (GPUs) some use cases might require days of continuous training.
This can be solved either by making hardware specific changes to code or by replacing the algorithm used. In this
paper we propose a novel loss function called Nth Absolute Root Mean Error (NARME) which speeds up the
training process for a set of supervised learning problems, specifically regression (which is a problem in which we
predict value of a continuous variable). In this function, we take nth root of the absolute difference between the
predicted and the actual output, then calculate the mean over the entire set of data points available in the dataset,
thus in a way starting at a much lower point in the gradient descent curve than other commonly used regression
losses. The loss function (NARME) places the value of loss after the first iteration to a point that is closer to the
minima (which is the goal of the training process), and then takes small number of descent steps in the n-
dimensional space to reach the global minima. NARME has been found to work with commonly used neural
network architectures and is shown to work exceptionally well with Neural Arithmetic and Logic Unit cell type
867. networks. The usage of this type loss function in regression problems helps speed the training process by a factor of
ten in most of the cases, due to the small number of steps it requires to reach the minima.
4981-
4985
Keyword : Loss function, regression, neural network, training time.
References:
1. Andrew Trask, Felix Hill, Scott Reed, Jack Rae, Chris Dyer, Paul Blunsom, Neural Arithmetic and Logic Unit, in CoRR, 2018.
2. Kalyan Das, Jiming Jiang, J N K Rao, Mean Squared Error of Empirical Predictor, Ann. Statist. 32 (2004), no. 2, 818--840. , pp. 123–135.
3. Jacopo Cavazza, Vittorio Murino, Active Regression with adaptive Huber loss, in CoRR, 2016.
4. Vasileios Belagiannis, Christian Rupprecht, Gustavo Carneiro, Nassir Navab, Robust Optimization for Deep Regression, in CoRR, 2015.
5. Jose Hernandez-Orallo, Soft (Gaussian CDE) regression models and loss functions, in CoRR, 2012.
6. Hang Zhao, Orazio Gallo, Iuri Frosio, Jan Kautz, “Loss Functions for Image Restoration with Neural Networks,” IEEE Transactions on
Computational Imaging, March 2017.
7. Donald F Specht, A General Regression Neural Network, IEEE Transactions on Neural Networks, November 1991.
8. Xin Yao, “Evolving Artificial Neural Networks,” IEEE, September 1999.
9. Leon Bottou, Stochastic Gradient Descent Tricks, Springer Neural Networks, 2012.
10. Sebastian Ruder,An overview of gradient descent optimisation algorithms, CoRR, 2016.
11. Jiang Wang, Yi Wang, Junhua Mao, Zhiheng Huang, Chang Huang, Wei Xu,CNN-RNN: A Unified Framework for Multi-Label Image
Classification, IEEE CPVR, 2016.
12. Yann LeCun, Yoshua Bengio, Geoffrey Hinton, Deep Learning, Nature, 2015.

Authors: Madhuri Gupta, Bharat Gupta


Parkinson’s Disease Prediction using Modified Gauss-Newton Method in Feed-Forward Neural
Paper Title:
Network
Abstract: Parkinson’s disease (PD) is a brain disorder, characterized by the relapse of the nervous system that
spreads gradually in the body. The symptom of PD includes a loss of body control (moderate movement, resting
tremors, postural shakiness etc.). So, it is required to detect at an early stage. Machine learning (ML) deals with a
variety of probabilistic methods to identify a pattern in a dataset. Therefore, the research is carried out to predict the
PD using Multilayer Feed-Forward Neural Network. In Neural Network (NN), weight optimization performed at
868. each layer that plays a major role in the prediction. First-order weight optimization techniques are slow in
computation because they reduce the sum of square error using parameter updating in the steepest descent way. In 4986-
proposed work, a modified recursive Gauss-Newton method is used to optimize the weights for speed up the 4993
performance of Feed-Forward NN. This approach is compared with widely used optimization techniques. The
Proposed method found better than other techniques and performs fast in Apache Spark than R-Studio framework.

Keyword : Apache Spark, Feed-Forward Neural Network, Gauss-Newton Method, Gradient Descent, Machine
learning, Parkinson’s disease.
References:
1. Parkinson’s Foundation. (Accessed on 2 Jan 2019). Available: https://www.parkinson.org/Understanding-Parkinsons/Statistics.
2. Hardy, J., Cai, H., Cookson, M.R., Gwinn‐Hardy, K. and Singleton, A. (2006). Genetics of Parkinson's disease and parkinsonism.
Annals of neurology, 60(4), pp.389-398.
3. Ghassemi, M., Naumann, T., Schulam, P., Beam, A. L., & Ranganath, R. (2018). Opportunities in Machine Learning for Healthcare .
arXiv preprint arXiv:1806.00388.
4. Gupta, M., & Gupta, B. (2018, February). A Comparative Study of Breast Cancer Diagnosis Using Supervised Machine Learning
Techniques. In 2018 Second International Conference on Computing Methodologies and Communication (ICCMC) (pp. 997 -1002).
IEEE.
5. Guo, P.F., Bhattacharya, P. and Kharma, N. (2010, June). Advances in detecting Parkinson’s disease. In International Conferen ce on
Medical Biometrics (pp. 306-314). Springer, Berlin, Heidelberg.
6. Sriram, T.V., Rao, M.V., Narayana, G.S., Kaladhar, D.S.V.G.K. and Vital, T.P.R. (2013). Intelligent Parkinson disease prediction
using machine learning algorithms. International Journal of Engineering and Innovative Technology (IJEIT) Volume, 2, pp.44-52.
7. Tsanas, A., Little, M.A., McSharry, P.E., Spielman, J. and Ramig, L.O. (2012). Novel speech signal processing algorithms for high-
accuracy classification of Parkinson's disease. IEEE transactions on biomedical engineering, 59(5), pp.1264-1271.
8. Little, M.A., McSharry, P.E., Hunter, E.J., Spielman, J. and Ramig, L.O. (2009). Suitability of dysphonia measurements for
telemonitoring of Parkinson's disease. IEEE transactions on biomedical engineering, 56(4), pp.1015-1022.
9. Sapir, S., Ramig, L.O., Spielman, J.L. and Fox, C. (2010). Formant centralization ratio: A proposal for a new acoustic measure of
dysarthric speech. Journal of speech, language, and hearing research, 53(1), pp.114-125.
10. Tsanas, A., Little, M.A., McSharry, P.E. and Ramig, L.O. (2011). Nonlinear speech analysis algorithms mapped to a standard me tric
achieve clinically useful quantification of average Parkinson's disease symptom severity. Journal of the Royal Society Interface,
8(59), pp.842-855.
11. Aich, S., Younga, K., Hui, K. L., Al-Absi, A. A., & Sain, M. (2018, February). A nonlinear decision tree-based classification
approach to predict the Parkinson's disease using different feature sets of voice data. In Advanced Communication Technology
(ICACT), 2018 20th International Conference on (pp. 638-642). IEEE.
12. Nilashi, M., Ibrahim, O., Ahmadi, H., Shahmoradi, L., & Farahmand, M. (2018). A hybrid intelligent system for the prediction of
Parkinson's Disease progression using machine learning techniques. Biocybernetics and Biomedical Engineering, 38(1), 1-15.
13. Ho, A.K., Iansek, R., Marigliani, C., Bradshaw, J.L. and Gates, S. (1999). Speech impairment in a large sample of patients with
Parkinson’s disease. Behavioural neurology, 11(3), pp.131-137.
14. Harel, B., Cannizzaro, M. and Snyder, P.J. (2004). Variability in fundamental frequency during speech in prodromal and incipient
Parkinson's disease: A longitudinal case study. Brain and cognition, 56(1), pp.24-29.
15. Tsanas, A., Little, M. A., McSharry, P. E., & Ramig, L. O. (2010a). Accurate telemonitoring of Parkinson's disease progressio n by
noninvasive speech tests. IEEE transactions on Biomedical Engineering, 57(4), 884-893.
16. Tsanas, A., Little, M.A., McSharry, P.E. and Ramig, L.O. (2010b), March. Enhanced classical dysphonia measures and sparse
regression for telemonitoring of Parkinson's disease progression. In Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE
International Conference on (pp. 594-597). IEEE.
17. Luchsinger, J.A., Tang, M.X., Stern, Y., Shea, S. and Mayeux, R. (2001). Diabetes mellitus and risk of Alzheimer's disease an d
dementia with stroke in a multiethnic cohort. American journal of epidemiology, 154(7), pp.635-641.
18. Chen, J., Li, K., Tang, Z., Bilal, K., Yu, S., Weng, C. and Li, K. (2017). A parallel random forest algorithm for big data in a spark
cloud computing environment. IEEE Transactions on Parallel & Distributed Systems, (1), pp.1-1.
19. Ozcift, A. (2012). SVM feature selection-based rotation forest ensemble classifiers to improve computer-aided diagnosis of
Parkinson disease. Journal of medical systems, 36(4), pp.2141-2147.
20. Das, R. (2010). A comparison of multiple classification methods for diagnosis of Parkinson disease. Expert Systems with
Applications, 37(2), pp.1568-1572.
21. Kaladhar, D.S.V.G.K., Nageswara, R.P.V. and Ramesh, N.R.B.L.V. (2010). Confusion matrix analysis for evaluation o f speech on
Parkinson disease using Weka and MatLab. International Journal of Engineering Science and Technology, 2(7), pp.2734-2737.
22. Anaissi, A., Goyal, M., Catchpoole, D. R., Braytee, A., & Kennedy, P. J. (2016). Ensemble feature learning of genomic data using
support vector machine. PloS one, 11(6), e0157330.
23. Hardmeier, C. (2017). Predicting Pronouns with a Convolutional Network and an N-gram Model. In Proceedings of the Third
Workshop on Discourse in Machine Translation (pp. 58-62).
24. Güneş, F., Wolfinger, R. and Tan, P.Y. (2017). Stacked Ensemble Models for Improved Prediction Accuracy.
25. Shanthi, S. and Kumar, D. (2012). Prediction of blood glucose concentration ahead of time with feature based neural network.
Malaysian Journal of Computer Science, 25(3), pp.136-148.
26. Svozil, D., Kvasnicka, V. and Pospichal, J. (1997). Introduction to multi-layer feed-forward neural networks. Chemometrics and
intelligent laboratory systems, 39(1), pp.43-62.
27. Dash, R. (2017). Performance analysis of an evolutionary recurrent Legendre Polynomial Neural Network in application to FOREX
prediction. Journal of King Saud University-Computer and Information Sciences.
28. Jabban, T.M., Alali, M.A.E., Mansoor, A.K.Z. and Hamoodi, A.N. (2012). Enhancing the step response curve for rectifier current of
HVDC system based on artificial neural network controller. Journal of King Saud University-Engineering Sciences, 24(2), pp.181-
192.
29. Ramachandran, P., Zoph, B., & Le, Q. V. (2018). Searching for activation functions.
30. Nasrabadi, N. M. (2007). Pattern recognition and machine learning. Journal of electronic imaging, 16(4), 049901.
31. Clevert, D. A., Unterthiner, T., & Hochreiter, S. (2015). Fast and accurate deep network learning by exponential linear units (elus).
arXiv preprint arXiv:1511.07289.
32. Gower, R.M. and Gower, A.L. (2016). Higher-order reverse automatic differentiation with emphasis on the third-order. Mathematical
Programming, 155(1-2), pp.81-103.
33. Harrell, F. E. (2015). Ordinal logistic regression. In Regression modeling strategies (pp. 311-325). Springer, Cham.
34. Cox, D. R. (2018). Analysis of binary data. Routledge.
35. Ozcift, A. (2012). SVM feature selection-based rotation forest ensemble classifiers to improve computer-aided diagnosis of
Parkinson disease. Journal of medical systems, 36(4), pp.2141-2147.
36. Schlkopf, B., Smola, A. J., & Bach, F. (2018). Learning with kernels: Support vector machines, regularization, optimization, and
beyond.
37. Parkinson’s Data Set. (Accessed April 2018). Available:
https://archive.ics.uci.edu/ml/datasets/Parkinson+Speech+Dataset+with++Multiple+Types+of+Sound+Recordings.
38. Gelman, A., Goodrich, B., Gabry, J., & Vehtari, A. (2018). R-squared for Bayesian regression models. The American Statistician,
(just-accepted), 1-6.
39. Galdi, P., & Tagliaferri, R. (2018). Data Mining: Accuracy and Error Measures for Classification and Prediction. Reference Mo dule
in Life Sciences, no. January, Elsevier, 1-14.
40. Song, Q., Jiang, H., & Liu, J. (2017). Feature selection based on FDA and F-score for multi-class classification. Expert Systems with
Applications, 81, 22-27.
41. Arlot, S., & Celisse, A. (2010). A survey of cross-validation procedures for model selection. Statistics surveys, 4, 40-79.

869. Authors: A. Gnanam, S. Krithika


Paper Title: Complex Number and its Conjugate in Continued Fraction
Abstract: For any equation complex roots occur in pairs. For finding a root of the equation in continued
fractions algorithms are available. But to get complex roots in continued fraction no such procedure so far we
have. Here, in this paper if  + i has a representation in continued fractions we try to find its conjugate
 − i in terms of continued fractions. This will be useful in finding complex roots of a quadratic equations in
continued fraction.
4994-
Keyword : Continued Fraction, Complex Continued Fraction, Complex numbers. 4998

References:
1. Arumugam S., Thangapandi Issac A., Somasundaram A., “Complex Analysis”, 9 th Reprint, Scitech Publications (India) Pvt. Ltd. ,
December 2007.
2. 2.Ponnusamy S., “ Foundations of Complex Analysis”, Second edition, Narosa Publishing House, New Delhi.
3. 3.Bosma W., Bastiaan cijsouw, “Complex Continued Fraction Algorithms”, Thesis, Radboud University, November 2015.
4. 4.Shalit J.O., Integer Functions and Continued fractions”, A.B. Thesis, Princeton University, 1979.

Authors: Dwi Sulisworo, Dian A. Kusumaningtyas, Trikinasih Handayani, Eko Nursulistiyo

Paper Title: The Learning Design and Student’s Response to Physics Online Learning In Rural School of Indonesia
Abstract: The implementation of e-learning on science learning in Indonesia is a critical issue, especially in
the context of implementing a curriculum oriented towards the competency of students in today's digital era. The
problem faced by educators is in the social presence; in how to manage effective interaction between teachers-
students and students-students. This study aims to innovate e-learning which is Edmodo as a learning management
system (LMS) that is suitable for science learning requirements (Light and Optics) in junior high school students.
The research method used was a mix of qualitative and quantitative methods. The process of developing learning
design was arranged through focus group discussion approach (which involves LMS experts, learning evaluation
experts, learning strategists, physicists, and teachers) iteratively to obtain learning designs embedded in the
Edmodo. The sound learning design was then tested in a small group consisting of eighth-grade students.
Responses were measured using a USE questionnaire containing four aspects, i.e., usefulness, ease of use, ease of
learning, and satisfaction aspects. The results of the trial in the small group will indicate that LMS and learning
activities carried out meet student learning needs. These results provide optimism that mobile learning with
appropriate strategies can meet the learning needs of science, including in schools that have never used this
technology before.

Keyword : e-learning, learning design, learning innovation, learning management system, learning strategy,
mobile learning, social presence.
References:
1. J. G. S. Goldie, “Connectivism: A knowledge learning theory for the digital age?” Medical teacher, vol. 38, no. 10, pp. 1064-1069, 2016.
2. C. H. Tu, “On-line learning migration: from social learning theory to social presence theory in a CMC environment,” Journal of network
and computer applications, vol. 23, no. 1, pp. 27-37, 2000..
870. 3. J. C. Richardson, E. Besser, A. Koehler, J. Lim, and M. & Strait, “Instructors’ perceptions of instructor presence in online learning
environments,” The International Review of Research in Open and Distributed Learning, vol 17, no. 4, pp. 82-103, 2016.
4. D. Sulisworo, D. A. Kusumaningtyas, E. Nursulistiyo, and T. Handayani, “Mobile learning infusion through enhancing teachers’ 4999-
perception: Case study in eastern of Indonesia,” In International Conference on Science, Technology, Education, Arts, Culture and 5006
Humanity-" Interdisciplinary Challenges for Humanity Education in Digital Era"(STEACH 2018), (pp. 85-88). Atlantis Press, 2019.
5. I. Kožuh, Z. Jeremić, A. Sarjaš, J. L. Bele, V. Devedžić, and M. Debevc, “Social presence and interaction in learning environments: The
effect on student success,” Journal of Educational Technology & Society, vol. 18, no. 1, pp. 223-236, 2015.
6. O. Poquet, V. Kovanović, P. de Vries, T. Hennis, S. Joksimović, D. Gašević, and S. Dawson, “Social presence in massive open online
courses,” International Review of Research in Open and Distributed Learning, vol. 19, no. 3, pp. 43-68, 2018.
7. J. C. Richardson, A. A. Koehler, E. D. Besser, S. Caskurlu, J. Lim, and C. M. Mueller, “Conceptualizing and investigating instructor
presence in online learning environments,” The International Review of Research in Open and Distributed Learning, vol. 16, no. 3, pp.
256-297, 2015.
8. M. B. Horzum, “Interaction, Structure, Social Presence, and Satisfaction in Online Learning,” Eurasia Journal of Mathematics, Science &
Technology Education, vol. 11, no. 3, pp. 505-512, 2015.
9. J. Richardson, K. Swan, P. Lowenthal, and P. Ice, “Social presence in online learning: Past, present, and future,” In Global Learn (pp. 477-
483). Association for the Advancement of Computing in Education (AACE), April 2016.
10. J. Yuan, and C. Kim, “Guidelines for facilitating the development of learning communities in online courses,” Journal of Computer
Assisted Learning, vol. 30, no. 3, pp. 220-232, 2014.
11. Y. Mor, R. Ferguson, and B. Wasson, “Learning design, teacher inquiry into student learning and learning analytics: A call for action,”
British Journal of Educational Technology, vol. 46, no. 2, pp. 221-229, 2015.
12. S. M. Lee, “The relationships between higher order thinking skills, cognitive density, and social presence in online learning,” The Internet
and Higher Education, vol. 21, pp. 41-52, 2014.
13. S. Joksimović, D. Gašević, V. Kovanović, B. E. Riecke, and M. Hatala, “Social presence in online discussions as a process predictor of
academic performance,” Journal of Computer Assisted Learning, vol. 31, no. 6, pp. 638-654, 2015.
14. J. Bowers, and P. Kumar, “Students' perceptions of teaching and social presence: A comparative analysis of face-to-face and online
learning environments,” International Journal of Web-Based Learning and Teaching Technologies (IJWLTT), vol. 10, no. 1, pp. 27-44,
2015.
15. M. T. Cole, D. J. Shelley, and L. B. Swartz, “Online instruction, e-learning, and student satisfaction: A three year study,” The International
Review of Research in Open and Distributed Learning, vol. 15, no. 6, pp. 111-131, 2014.
16. J. A. Gray, and M. DiLoreto, ”The effects of student engagement, student satisfaction, and perceived learning in online learning
environments,” International Journal of Educational Leadership Preparation, vol. 11, no. 1, pp. 1-20, 2016.
17. J. C. Dunlap, and P. R. Lowenthal, “The power of presence: Our quest for the right mix of social presence in online courses,” In Real life
distance education: Case studies in practice, 41-66, Information Age Publishing, 2014.
18. J. Costley, “The effects of instructor control on critical thinking and social presence: Variations within three online asynchronous learning
environments,” Journal of Educators Online, vol. 13, no. 1, pp. 109-171, 2016.
19. J. Ma, X. Han, J. Yang, and J. Cheng, “Examining the necessary condition for engagement in an online learning environment based on
learning analytics approach: The role of the instructor," The Internet and Higher Education, vol. 24, pp. 26-34, 2015.
20. K. Plante, and M. E. Asselin, “Best practices for creating social presence and caring behaviors online,” Nursing Education Perspectives,
vol. 35, no. 4, pp. 219-223, 2014.
21. D. Sulisworo, L. Yunita, and A. Komalasari, “Which Mobile Learning is More Suitable on Physics Learning in Indonesian High School?”
International Journal of Recent Contributions from Engineering, Science & IT (iJES), vol. 5, no. 1, pp. 97-104, 2017.
22. D. Sulisworo, and K. Permprayoon, “What is the Better Social Media for Mathematics Learning? A Case Study at A Rural School in
Yogyakarta, Indonesia,” International Journal on Emerging Mathematics Education, vol. 2, no. 1, pp. 39-48, 2018.
23. A. M. Lund, “Measuring usability with the use questionnaire,” Usability interface, vol. 8, no. 2, pp. 3-6, 2001.
24. R. A. Croxton, “The role of interactivity in student satisfaction and persistence in online learning,” Journal of Online Learning and
Teaching, vol. 10, no. 2, pp. 314-324, 2014.
25. L. C. Yamagata-Lynch, “Blending online asynchronous and synchronous learning,” The International Review of Research in Open and
Distributed Learning, vol. 15, no. 2, pp. 189-212, 2014.

Authors: M.Santhalakshmi, P.Kavitha


Fireflies Ant Optimized Reliable Quality Awareness Energy Efficient Routing Protocol for Managing
Paper Title:
Quality of Medical Data in Wireless Body Networks
Abstract: The wireless body area network is one of effective wearable devices that have been used in
medical applications for collecting patient information to providing the treatment incorrect time for avoiding
seriousness. The collected data’s such as blood pressure, air flow, temperature, electromagnetic information is
transmitted to the health care center via the wireless technology, which reduces the difficulties also helps to provide
the immediate treatment. During the information transmission, the main issues are Quality of Service (QoS), low
packet delivery, high energy consumption and end to end delay. So, in this paper introduces the Fireflies Ant
Optimized, Reliable Quality Awareness, Energy Efficient Routing Protocol ((FAORQEER) for maintaining the
quality of the recorded medical data. The network examines the optimal path by using the characteristics of fireflies
and the network life time and energy of the network is managed by introducing an energy efficient method. The
process then evaluates efficiency with test results about energy consumption, packet delivery ratio, end to end delay
and QoS metric associated constraints.

Keyword : Wireless body area network, Medical applications, Quality of Service (QoS), Fireflies Ant
optimized reliable quality awareness energy efficient routing protocol.
References:
1. Dong L., Wu J.K., Chen X. Real Time Physical Activity Monitoring by Data Fusion in Body Sensor Networks. Proceedings of the 1 0th
International Conference on Information Fusion; Quebec, QC, Canada. 9–12 July 2007.
2. Aida E., Massoud H., Pejman K. Using Relay Network to Increase Life Time in Wireless Body Area Sensor Networks. Proceedings o f
IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops; Kos, Greece. 15–19 June 2009;
pp. 1–6.
3. Daisuke T., Xiao Y., Hu F., Chen J.M., Sun Y.X. Temperature-aware routing for telemedicine applications in embedded biomedical sensor
networks. EURASIP J. Wirel. Commun. Netw. 2008;2008 doi: 10.1155/2008/572636.
4. Hachisuka K., Nakata A., Takeda T., Terauchi Y., Shiba K., Sasaki K., Hosaka H., Itao K. Development and Performance Analysis of an
Intra-Body Communication Device. Proceedings of the 12th International Conference on Transducers, Solid-State Sensors, Actuators and
871. Microsystems; Boston, MA, USA. 8–12 June 2003;
5. Wegmueller M.S., Kuhn A., Froehlich J., Oberle M., Felber N., Kuster N., Fichter W. An attempt to model the human body as a
communication channel. IEEE Trans. Bio-Med. Eng. 2007;54:1851–1857. 5007-
6. Xiaochen Lai, Quanli Liu, Xin Wei, Wei Wang, Guoqiao Zhou, and Guangyi Han, “A Survey of Body Sensor Networks”, Sensors (Basel). 5012
2013 May; 13(5): 5406–5447.
7. Javed Iqbal Bangash, Abdul Hanan Abdullah, Mohammad Hossein Anisi, and Abdul Waheed Khan, “A Survey of Routing Protocols in
Wireless Body Sensor Networks”, Sensors (Basel). 2014 Jan; 14(1): 1322–1357.
8. Zahoor Khan, Nauman Aslam , Shyamala Sivakumar , William Phillips, “Energy-aware Peering Routing Protocol for indoor hospital Body
Area Network Communication”, Procedia Computer Science,Volume 10, 2012.
9. Sharma, Vyas, Thakker, Mulvaney,Datta, “Wireless Body Area Network for health monitoring”, International Conference on Biomed ical
Engineering and Informatics (BMEI), Volume:4 ,2011.
10. Shyamal Patel, Hyung Park, Paolo Bonato, Leighton Chan and Mary Rodgers, “A review of wearable sensors and systems with application
in rehabilitation”, Journal of NeuroEngineering and Rehabilitation20129:21
11. Wei Quan , Fu-Teo Zhao,Jian-Feng Guan, Chang-Qiao XU, and Zhang Hongke,“An Integrated Ling Quality Estimation-Based Routing
For Wireless Sensor Networks,”Trans. on ELSEVIER, pp.28-33, 2011
12. DjamelDjenouri and Ilangko Balasingham,“Traffic- Differentiation-Based Modular
QOS Localized Routing For Wireless Sensor Networks,”IEEE Transactions on
Mobile Computing,vol.10,no.6,pp.797-809, 2011
13. Mellal, M. A., & Williams, E. J. (2018). A survey on ant colony optimization, particle swarm optimization, and cuckoo algorithms.
In Handbook of research on emergent applications of optimization algorithms (pp. 37-51). IGI Global. DOI:10.4018/978-1-5225-2990-
3.ch002
14. Rashedi, E., Nezamabadi-Pour, H., & Saryazdi, S. (2009). GSA: a gravitational search algorithm. Information sciences, 179(13): pp. 2232-
2248.
15. A. Rahim, N. Javaid, M. Aslam, Z. Rahman, U. Qasim, Z. A. Khan, “A Comprehensive Survey of MAC Protocols for Wireless Body Area
Networks”, available at.,
http://arxiv.org/pdf/1208.2351.pdf
16. Shiva Murthy G, R.J.DSouza, and Varaprasad G, “Reliability Analysis of Route
Redundancy Model for Energy Efficient Node Disjoint Multipath Routing in
Wireless sensor networks,”Trans. on ELSEVIER, in proc. ICMOC,pp.1487-1494,
2012.
17. DjamelDjenouri and Ilangko Balasingham,“Traffic- Differentiation-Based Modular
QOS Localized Routing For Wireless Sensor Networks,”IEEE Transactions on
Mobile Computing,vol.10,no.6,pp.797-809, 2011
18. Shiva Murthy G, R.J.DSouza, and Varaprasad G, “Reliability Analysis of Route
Redundancy Model for Energy Efficient Node Disjoint Multipath Routing in
Wireless sensor networks,”Trans. on ELSEVIER, in proc. ICMOC,pp.1487-1494,
2012.

Authors: S. Suganthi Devi

Paper Title: Intrusion Detection System using Datamining Based Enhanced Framework
Abstract: With the significant increase in the use of computers over the network and the development of
applications on different platforms, the focus is on network security. The identification of multiple attacks is
actually an important element of network security. The role of the IDS is to track and prevent unauthorized use or
damage to network resources and systems. An intrusion detection system using Datamining Based Enhanced
Framework (DEF) is presented in this paper. The model is assisted by the K-mean Clustering and Decision Tree
(DT) classification techniques in which genetic algorithms (GA) for clusters, max runs and confidence can be used.
The experimental results shows the promising outcome of the proposed Datamining Based Enhanced Framework
(DEF).

Keyword : Datamining, Network Security, Genetic Algorithms, Intrusion Detection System (IDS)
References:
1. Liao, H. J., Lin, C. H. R., Lin, Y. C., & Tung, K. Y. (2013). Intrusion detection system: A comprehensive review. Journal of Network
and Computer Applications, 36(1), 16-24.
2. Ko, C. W., & Rho, J. (2004). U.S. Patent No. 6,789,202. Washington, DC: U.S. Patent and Trademark Office.
3. Moffie, M., Kaeli, D., Cohen, A., Aslam, J., Alshawabkeh, M., Dy, J., & Azmandian, F. (2014). U.S. Patent No. 8,719,936.
Washington, DC: U.S. Patent and Trademark Office.
4. Lin, C. C., & Wang, M. S. (2008). Genetic-clustering algorithm for intrusion detection system. International Journal of Information
and Computer Security, 2(2), 218-234.
5. Fu, T. C., & Lui, C. L. (2007). Agent-oriented network intrusion detection system using data mining approaches. International
Journal of Agent-Oriented Software Engineering, 1(2), 158-174.
6. Zhang, J., Huang, M. L., & Hoang, D. (2013). Visual analytics for intrusion detection in spam emails. International Journal of Grid
and Utility Computing, 4(2-3), 178-186.
872. 7. MuhammedShafi. P,Selvakumar.S*, Mohamed Shakeel.P, “An Efficient Optimal Fuzzy C Means (OFCM) Algorithm with Particle
Swarm Optimization (PSO) To Analyze and Predict Crime Data”, Journal of Advanced Research in Dynamic and Control Systems, 5013-
Issue: 06,2018, Pages: 699-707
8. Xiang, C., Yong, P. C., & Meng, L. S. (2008). Design of multiple-level hybrid classifier for intrusion detection system using
5017
Bayesian clustering and decision trees. Pattern Recognition Letters, 29(7), 918-924.
9. Porouhan, P., & Premchaiswadi, W. (2017). Pattern mining and process modelling of collaborative interaction data in an online
multi-tabletop learning environment. International Journal of Knowledge Engineering and Data Mining, 4(2), 114-144.
10. Baskar, S., Periyanayagi, S., Shakeel, P. M., & Dhulipala, V. S. (2019). An Energy persistent Range-dependent Regulated
Transmission Communication Model for Vehicular Network Applications. Computer
Networks.https://doi.org/10.1016/j.comnet.2019.01.027
11. Aljawarneh, S., Aldwairi, M., & Yassein, M. B. (2018). Anomaly-based intrusion detection system through feature selection analysis
and building hybrid efficient model. Journal of Computational Science, 25, 152-160.
12. Shakeel, P. M., Arunkumar, N., & Abdulhay, E. (2018). Automated multimodal background detection and shadow removal process
using robust principal fuzzy gradient partial equation methods in intelligent transportation systems. International Journal of Heavy
Vehicle Systems, 25(3-4), 271-285
13. Yin, C., Zhu, Y., Fei, J., & He, X. (2017). A deep learning approach for intrusion detection using recurrent neural networks. Ieee
Access, 5, 21954-21961.
14. Aloqaily, M., Otoum, S., Al Ridhawi, I., & Jararweh, Y. (2019). An intrusion detection system for connected vehicles in smart
cities. Ad Hoc Networks, 90, 101842.
15. Le, A., Loo, J., Lasebae, A., Aiash, M., & Luo, Y. (2012). 6LoWPAN: a study on QoS security threats and countermeasures using
intrusion detection system approach. International Journal of Communication Systems, 25(9), 1189-1212.
16. Ramdane, C., & Chikhi, S. (2014). A new negative selection algorithm for adaptive network intrusion detection system. International
Journal of Information Security and Privacy (IJISP), 8(4), 1-25.
17. Kavitha, B., Karthikeyan, S., & Maybell, P. S. (2012). An ensemble design of intrusion detection system for handling uncertai nty
using Neutrosophic Logic Classifier. Knowledge-Based Systems, 28, 88-96.
18. HyungGeun, O. H., Seung-Hyun, P. A. E. K., Cheolho, L. E. E., & Lee, D. (2012). U.S. Patent No. 8,181,248. Washington, DC: U.S.
Patent and Trademark Office.
19. Idhammad, M., Afdel, K., & Belouch, M. (2018). Distributed intrusion detection system for cloud environ ments based on data
mining techniques. Procedia Computer Science, 127, 35-41.
20. Foroushani, Z. A., & Li, Y. (2018, February). Intrusion Detection System by Using Hybrid Algorithm of Data Mining Technique.
In Proceedings of the 2018 7th International Conference on Software and Computer Applications (pp. 119-123). ACM.

Authors: Bavithra K, Latha R, Madhugogul P, Devaprasath R


Fuzzy Based Fault Classifier and Time Domain Reflectometry Based Fault Locator for Underground
Paper Title:
Cables
Abstract: Cables are insulating wires used for transferring power or transmitting signals. If any fault occurs in
the cable then, it causes detrimental effects to power system equipments. The technical difficulty is to find, analyze,
and classify faults. In case of underground cables it will be a time consuming and expensive process to repair the
faults or replace the cables. This paper aims to analyse the faults by creating the various types of short and open
873. circuit faults, classify them by taking in account of grounding, and to locate the distance at which the fault is
occurred. The underground cable is simulated using MATLAB/ Simulink, the faults are created and the Fourier 5018-
transform of voltage and current are observed at the source end. The generated fault phase current data from the 5023
simulation has been normalized using fault index is the input to the Mamdani fuzzy logic controller. The
defuzzified output is verified for different phase current values which classify the nature of the fault. Two fuzzy
classifiers like ground and phase faults are developed which holds good for different range of cables. A
methodology to find the fault location in long transmission line is attempted using PSPICE, by creating short circuit
fault. The distance is determined by using velocity of propagation of travelling waves, which is realized using
impulse voltage wave generator which is based on impedance

Keyword : Fuzzy Logic Controller, PSpice, Time Domain Reflectometry.


References:
1. Allan Greenwood, ‘Electrical Transients in Power systems’, John Wiley & sons, Inc 2014.
2. Avagaddi Prasad, J. Belwin Edward, C. Shashank Roy, G. Divyansh and Abhay Kumar, ‘Classification of Faults in Power Transmiss ion
Lines using Fuzzy-Logic Technique’, 2015.
3. B.Bhuvneshwari, A.Jenifer, J.John Jenifer, S.Durga Devi, G.Shanthi, ‘Underground Cable Fault Distance Locator’, 2017.
4. Fonseca Badillo, L. NegreteNavarretea, A. Gonzalez Parada, A. Castaneda Miranda, ‘Simulation and analysis of underground powe r
cables faults’, 2012.
5. GotteVikramRaju, EbhaKoley, ‘Fuzzy Logic Based Fault Detector and Classifier for Three Phase Transmission Lines with STATCOM’ ,
2016.
6. Gowrishankar, P. Nagaveni, P. Balakrishnan, ‘Transmission Line Fault Detection and Classification Using Discrete Wavelet Transform
and Artificial Neural Network’, 2016.
7. HadiSaadat, ‘Power System Analysis’, published by McGraw-Hill companies, 2014.
8. Jiantao Sun, Xishan Wen, Xinlao Wei, Qingguo Chen, Yonghong Wang, ‘Traveling Wave Fault Location for Power Cables Bas ed on
Wavelet Transform’, 2007.
9. Jitendra Pal Singh, Narendra Singh Pal, Sanjana Singh, Toshika Singh, Mohd.Shahrukh, ‘Underground ground cable fault locator’ ,
Volume 3 Issue 1, 2006.
10. John J. Grainger, William D. Stevenson, ‘Power system analysis’, published by McGraw-Hill. ISBN 0-07-113338- 0.
11. KunalHasija, Abhishek Kumar, Shelly Vadhera, Anurag Kishore, ‘Detection and Location of Faults in Underground Cable using
MATLAB/Simulink/ANN and OrCad’, 2014.
12. Magdy B. Eteiba, Wael Ismael Wahba, ShimaaBarakat, ‘Accurate fault location algorithm for Underground Cables using Adaptive
Network-Based Fuzzy Inference System and Discrete Wavelet Transform’, 2014.
13. Mahanty, P.B. Dutta Gupta, ‘A fuzzy logic based fault classification approach using current samples only’, 2007. [12]Mahmoud Gilany,
Doaakhalil Ibrahim, El Sayed Tag Eldin, ‘Traveling-Wave-Based Fault-Location Scheme for Multiend-Aged Underground Cable System’,
2007.
14. Mamta Patel, R. N. Patel, ‘Fault Detection and Classification on a Transmission Line using Wavelet Multi Resolution Analysis and Neural
Network’, 2012.
15. Mohamed Mamdouh Abdel Aziz, Doaakhalil Ibrahim, ‘An PMU Double Ended Fault Location Scheme for Aged Power Cables’, 2008.
16. SekharamanthiriJyothsna, K. DurgaRao, T. SrinivasaRao, ‘Fuzzy Logic Based Fault Detection and Classification of Unsynchronized
Faults in Three Phase Double Circuit Transmission Lines’, 2017.

Authors: Sunil C.Kalshetti, S .K. Dixit

Paper Title: Adaptive Fuzzy Sliding Mode Controller for Robot Manipulator: Effect on External Interferences
Abstract: In the previous decades, the SMC approach has attained unique consideration as this technique
offers a systematic model to maintain robust performance and asymptotic stability. As robotic manipulators turn out
to be gradually more significant in industrial automation, robotic manipulators by means of SMC have raised as a
significant region of research. Hence, this paper intends to model and establish an adaptive sliding mode controller
(SMC) for robotic manipulator. As it is not feasible to match up the SMC functions with the system model each
time, this paper implements a Fuzzy Inference System (FIS) to replace the system model. It effectively achieves the
experimentation in two phases. Accordingly, in the first phase, it attains the accurate features of the system model
based on varied samples to characterize the robotic manipulator. Consequently, it derives the obtained features as
fuzzy rules. In the subsequent phase, it signifies the derived fuzzy rules depending on adaptive fuzzy membership
functions. Moreover, it establishes the self-adaptiveness using Grey Wolf Optimization (GWO) to attain the
adaptive fuzzy membership functions. The analysis distinguishes the efficiency of the adopted technique with the
optimal investigational scheme and the traditional schemes such as SMC, Fuzzy SMC (FSMC) and GWO-SMC.
Moreover, the comparative analysis is also performed by including the external disturbances and noise and
validates the effectiveness of the proposed and conventional models.

874. Keyword : Sliding Mode Control; Robot manipulators; Controller; Load variation, External Disturbances
References: 5024-
1. Nabanita Adhikary, Chitralekha Mahanta, “Sliding mode control of position commanded robot manipulators”, Control Engineering 5031
Practice, vol. 81, pp. 183-198, December 2018.
2. Abbas Karamali Ravandi, Esmaeel Khanmirza, Kamran Daneshjou, “Hybrid force/position control of robotic arms manipulating in
uncertain environments based on adaptive fuzzy sliding mode control”, Applied Soft Computing, vol. 70, pp. 864-874, September
2018.
3. M. Vijay, Debashisha Jena, “PSO based neuro fuzzy sliding mode control for a robot manipulator”, Journal of Electrical Systems and
Information Technology, vol. 4, pp. 243-256, no. 1, May 2017.
4. Sanjoy Mondal, Chitralekha Mahanta, “Adaptive second order terminal sliding mode controller for robotic manipulators”, Journa l of
the Franklin Institute, vol. 351, no. 4, pp. 2356-2377, April 2014.
5. Yassine Kali, Maarouf Saad, Khalid Benjelloun, Abdelilah Fatemi, “Discrete-time second order sliding mode with time delay control
for uncertain robot manipulators”, Robotics and Autonomous Systems, vol. 94, pp. 53-60, August 2017.
6. Mohd Salim Qureshi, Pankaj Swarnkar, Sushma Gupta, “A supervisory on-line tuned fuzzy logic based sliding mode control for
robotics: An application to surgical robots”, Robotics and Autonomous Systems, vol. 109, pp. 68-85, November 2018.
7. Luis Gracia, J. Ernesto Solanes, Pau Muñoz-Benavent, Alicia Esparza, Josep Tornero, “Cooperative transport tasks with robots using
adaptive non-conventional sliding mode control”, Control Engineering Practice, vol. 78, pp. 35-55, September 2018.
8. M. Vijay, Debashisha Jena, “Backstepping terminal sliding mode control of robot manipulator using radial basis functional neural
networks”, Computers & Electrical Engineering, vol. 67, pp. 690-707, April 2018.
9. Manjusha Bhave, S. Janardhanan, L. Dewan, “Configuration Control of Planar Underactuated Robotic Manipulator using Termin al
Sliding Mode”, IFAC-PapersOnLine, vol. 49, no. 1, pp. 148-153, 2016.
10. J. Ernesto Solanes, Luis Gracia, Pau Muñoz-Benavent, Jaime Valls Miro, Josep Tornero, “Human-robot cooperation for robust
surface treatment using non-conventional sliding mode control”, ISA Transactions, vol. 80, pp. 528-541, September 2018.
11. Zhiqiang Ma, Guanghui Sun, “Dual terminal sliding mode control design for rigid robotic manipulator”, Journal of the Franklin
Institute, 4 February 2017.
12. Minh-Duc Tran, Hee-Jun Kang, “Adaptive terminal sliding mode control of uncertain robotic manipulators based on local
approximation of a dynamic system”, Neurocomputing, vol. 228, pp. 231-240, 8 March 2017.
13. Mehran Rahmani, Ahmad Ghanbari, Mir Mohammad Ettefagh, “Hybrid neural network fraction integral terminal sliding mode
control of an Inchworm robot manipulator”, Mechanical Systems and Signal Processing, vol. 80, pp. 117-136, 1 December 2016.
14. Magdy M. Abdelhameed, “Enhancement of sliding mode controller by fuzzy logic with application to robotic manipulators”,
Mechatronics, vol. 15, no. 4, pp. 439-458, May 2005.
15. Seong Ik Han, Jangmyung Lee, “Finite-time sliding surface constrained control for a robot manipulator with an unknown deadzone
and disturbance”, ISA Transactions, vol. 65, pp. 307-318, November 2016.
16. Srinivasan Alavandar and M.J. Nigam, "Fuzzy PD + I control of a six DOF robot manipulator" Industrial Robot: An International
Journal, vol. 35, no.2, pp. 125–132, 2008.
17. Seyedali Mirjalili, Seyed Mohammad Mirjalili, and Andrew Lewis, "Grey Wolf Optimizer" Advances in Engineering Software, vol.
69, pp. 46–61, March 2014.
18. B. Armstrong, O. Khatib, and J. Burdick, "The explicit dynamic model and inertial parameters of the PUMA 560 arm," Proceeding s.
1986 IEEE International Conference on Robotics and Automation, pp. 510-518, 1986.
19. Ruey-Jing Lian, "Enhanced adaptive grey-prediction self-organizing fuzzy sliding-mode controller for robotic systems", Information
Sciences, vol. 236, pp. 186-204, 1 July, 2013.

Authors: Gunjan, Bharti Sharma, Deepak Pathania, Ankita Dhillon

Paper Title: Performance Optimization for Mobile Web


Abstract: Abstract Most of the existing web pages have poor visibility, high bounce rates, and low conversion
rates due to performance issues on mobile devices. The aim of this research work is to develop a framework which
optimizes the performance of mobile web. The primary technology used in the framework is Google’s AMP
(Accelerated Mobile Pages). The proposed framework converts a non-AMP web page into an AMP compliant web
page, with additional feature of internationalization, and caches it on cloud for future reference. The proposed
framework is tested on various content rich sites and performance of converted AMP pages is com- pared with
original pages based on various parameters likes first meaningful paint, first interactive, etc.

Keyword : Mobile Web, Performance Optimization, Accelerated Mobile Pages, AMP convertor.

875. References:
1. carblogindia. https://www.carblogindia.com/new-2017-
2. hyundai-verna/. Accessed: 2018-03-30 5032-
3. Huffington post. https://www.huffingtonpost.in/akanksha- 5037
4. sharma/photoblog-my-journey-to-the-end-of-the- world a 22137387. Accessed: 2018-03-30
5. Agababov, V., Buettner, M., Chudnovsky, V., Cogan, M.,
6. Greenstein, B., McDaniel, S., Piatek, M., Scott, C., Welsh, M., Yin, B.: Flywheel: Google’s data compression proxy for
the mobile web. In: NSDI, vol. 15, pp. 367–380 (2015)
7. Agarwal, A., Gupta, G., Mishra, H., Kumar, M.:
8. Packyard-data compression proxy for mobile web (2017)
9. Butkiewicz, M., Wang, D., Wu, Z., Madhyastha, H.V., Sekar, V.: Klotski: Reprioritizing web content to improve
user experience on mobile devices. In: NSDI, vol. 1, pp. 2–3 (2015)
10. Elgazzar, K., Martin, P., Hassanein, H.: Mobile web ser-
11. vices: state of the art and challenges. Int. J. Adv. Comput. Sci. Appl. 5(3), 173–188 (2014)
12. Firtman, M.: High Performance Mobile Web: Best Prac-
13. tices for Optimizing Mobile Web Apps. ” O’Reilly Media, Inc.” (2016)
14. MINÁRIK, D.: Accelerated mobile pages. Ph.D. thesis,
15. Masarykova univerzita, Fakulta informatiky (2017)

Authors: Sandeep Chinta, Sakkirga Mounika, Aravind Reddy

Paper Title: Thermophysical Properties of Hybrid Nano Fluids


Abstract: In this study, the ash from agriculture waste of bamboo leaves was used in the synthesis of silica
nano particles followed by leaching and acid treatment. The required ash from agriculture waste (bamboo leaves) is
subjected to sintered at 700 degree centigrade for 5 hours to eliminate residues from ash. The obtained powder was
treated with 1M NaOH for leaching and then acid- treatment with 0.5 M H2SO4 to precipitate pure SiO2 nano
particles powder. The synthesized silica were characterized by XRD, FTIR, SEM, PSA, ZETA POTENSIAL. And
the synthesis of CuO-SiO2 hybrid nano fluid from the agriculture waste of silica.

876. Keyword : Particle size analysing, copper oxide, XRD, SEM, FTIR, silica, sulphuric oxide, Nano particles..
5038-
References: 5040
1. S. U. S. Choi, Y. I. Cho, and K. E. Kasza, Degradation effects of dilute polymer solutions on turbulent friction and heat transfer
behavior, Journal of Non-Newtonian Fluid Mechanics, 41(1992), 289–307.
2. Ziye Ling, Zhenbin He, Tao Xu, Xiaoming Fang, Xuenong Gao and Zhengguo Zhang, Experimental and Numerical Investigation on
Non-Newtonian Nanofluids Flowing in Shell Side of Helical Baffled Heat Exchanger Combined with Elliptic Tubes, 7 (2017) 48-50.
3. M. E. Burnett and S. Q. Wang, Current sunscreen controversies: Acritical review, Photo dermatology, Photo immunology& Photo
medicine, 27 (2011) 58–67.
4. K. Maier-Hauff, R. Rothe, and R. Scholz, Intracranial thermos therapy using magnetic nanoparticles combined with external beam
radiotherapy: results of a feasibility study on patients with glioblastoma multiforme, Journal of Neuro-Oncology, 81 (2007) 53–60.
5. D. P. Kulkarni, D. K. Das, and R. S. Vajjha, Application of nanofluids in heating buildings and reducing pollution, Applied Energy,
86 (2009) 2566–2573.
6. L. V´ek´as, D. Bica, and M. V. Avdeev, Magnetic nanoparticles and concentrated magnetic nanofluids: synthesis, properties and
some applications, China Particuology, 5 (2007) 43–49.
7. T. Sharma, A. L. M. Reddy, T. S. Chandra, and S. Rama prabhu, Development of carbon nanotubes and nanofluids based microbial
fuel cell, International Journal of Hydrogen Energy, 33 (2008) 6749–6754.
8. L. SyamSundar a, Md. Hashim Farooky, Experimental thermal conductivity of ethylene glycol and water mixture based low volume
concentration of Al2O3 and CuO nanofluids, International Communications in Heat and Mass Transfer 41 (2013) 41–46.
9. M. Gupta, V. Singh, R. Kumar, and Z. Said, A review on thermophysical properties of nanofluids and heat transfer applications,
Renewable & Sustainable Energy Reviews, 74 (2017) 638–670.
10. Seow, Z. L. S., A. S. W. Wong, V. Thavasi, R. Jose, S. Ramakrishna and G.W. Ho, controlled synthesis and application of Zn O
nanoparticles, nanorods and nanospheres in dye-sensitized solar cells. Nanotechnology, Vol. 20. 10. 1088/ 0957-4484/ 20/ 4/
045604/ meta, 2008.

Authors: Thangavel R

Paper Title: Power Quality Recommendations in Mushroom Farm


Abstract: Mushroom development is one of the most gainful agribusiness that can be begun with least
speculation and space. Mushroom cultivating in India is developing consistently as an elective wellspring of salary.
Here is the finished direction on paddy straw mushroom, shellfish mushroom and catch mushroom generation in
India. This paper proposes power quality recommendations in small scale mushroom farm located in Sulur,
Coimbatore .
Keyword : power quality, energy audit, mushroom farm, energy recommendations
References:
1. K. Balachander, A. Amudha, “Energy Economy Recommendations in Textile Mill”, International Journal of Engineering and Advance d
Technology, Volume-8 Issue-4, April 2019, pp.168-176.
877. 2. K. Balachander, A. Amudha, “Energy Saving Measures in Textile Mill”, International Journal of Innovative Technology and Exploring
Engineering, Volume-8 Issue-8, June 2019, pp.2026-2032.
3. Hand book on Canadian Ind. Program for Energy Conservation, “Energy Saving Tool box – An Energy Audit Manual & Tool”, Oct. 2015. 5041-
4. S. U. Kulkarni, K Patil., “Energy Audit of an Industrial Unit – A Case Study”, Int. Journal of Emerging Science and Engg. Vol. 2(2), pp. 5043
22-26, Nov. 2013
5. M.B. Raghav1, M. S. Srijaa, G. S. Rao, K. N. Bhavya and Y. Suchitra, “Energy Conservation and Audit - A Case Study”, Int. Journal of
Adv. Research in Electrical, Electronics and Instrumentation Engg. Vol. 2 (10), pp. 4957-4966, October 2013.
6. Neetha J., Mohandas R., Suja C R., “Energy Saving Mechanism Using Variable Frequency Drives”, Int. J of Emerging Tech. and
Advanced Engg. Volume 3 (3), pp. 784-790, Mar 2013
7. P. G. Kini, R. C. Bansal, “Energy Eff. in Industrial Utilities, Energy Management Systems”, ISBN: 978-953-307-579-2, 2011.
8. Guide book for Nat. Certification Examination for Energy Managers and Energy Auditors. (a) Book 1 - Energy Efficiency in Electrical,
Utilities, (b) Book 2 - Energy Efficiency in Thermal Utilities . (c) Book 3 - Energy Performance Assessment for Equipment and Utility
Systems. (d) Book 4 - General Aspects of Energy Management and Energy Audit.
9. Bunkley. Nick ,”Joseph Juran, 103, Pioneer in Quality Control Dies”, NY Times, March 3, 2008.
10. Journal of Food Engg. P.C. Panchariya, D.Popovic, A.L. Sharma Volume 52, Issue 4, May 2002, Pages 349 –357
11. L.C. Witte, P. Schmidt, Dr. Brown, “Ind. Energy Management & Utilization” Hemisphere publishing corp., NY, USA, 1987.
12. L.C. Witte, P.Schmidt, Dr. Brown, “Ind. Energy Mangt. and Utilization” Hemisphere publishing corp., NY, USA, 1987.

Authors: G Mounika, V Srinivasa Reddy, M V Seshagiri Rao, M Swaroopa Rani


Estimation of Ground Granulated Blast Furnace Slag and Rice Husk Ash Cementing Efficiency in Low
Paper Title:
and Medium Grade Self-Compacting Concretes
Abstract: Ternary blended Self Compacting Concrete (SCC) made with rice husk ash (RHA) and GGBFS
(ground granulated blast furnace slag) has developed as a substitute to normal concrete. It has advantages such as
less cement usage, energy usage, cost and for other ecological and socio-economic benefits. The current work
quantifies the 3, 7 and 28-days cementitious efficiency for various percentages of RHA and GGBFS combination in
SCC. The usage of GGBFS in M20 and M40 SCC reduces workability but increases compressive and tensile
strength when compared with OPC based SCC. The optimum GGBFS is found to be 30% for low and medium
strength levels of SCC. For M20 and M40, 30% GGBFS reduces workability slightly but still within desired limits.
So after various trial mixes it was found that 27% GGBFS by weight of OPC and 3% RHA by weight of GGBFS
quantity can be admixed to OPC SCC to achieve similar strength and workability and also better rate of strength
regain in early days of hardening. In M20 and M40 grades of SCC, 3% RHA by weight of GGBFS quantity is
replaced. Due to addition of GGBFS to SCC will enhance the later age compressive strength but early age
compressive strength decreases while the desired workability is controlled using SP appropriately. This is true for
878. all grades of GGBFS based SCC. In M20 GGBFS based SCC, the strength gain at 3 days is nearly 9% but the
compressive strength at 28 days increased by 31%. In M40, GGBFS based SCC, the strength gain at 3 days is 5044-
nearly 14% but the compressive strength at 28 days increased by 21%. RHA is added as replacement of cement to 5048
improve the early age strength of SCC. RHA addition to concrete as cement replacement may help to improve
strength marginally but impacts the workability drastically so SP should be used controllably to attain the desired
workability. In M20 GGBFS+RHA based SCC, the compressive strength enhancement at 3 days is 21% and the
compressive strength at 28 days increased by 46%. In M40, GGBFS+RHA based SCC, the compressive strength
enhancement at 3 days is 20% and at 28 days increased by 34%. Similarly tensile strength in all grades of GGBFS
and RHA admixed SCC increases by around 15 to 34% in M20 grade and 9 to 36% in M40 grade SCC mix. So it
can be concluded that RHA and GGBS combination principally yields early strength which is not possible in SCC
mixes primary made with fly ash.

Keyword : Cementing efficiency factors, Rice husk ash, Ground granulated blast furnace slag, RHA, GGBFS
References:
1. K Ganesh Babu and V Sree Rama Kumar , Efficiency of GGBS in Concrete , Science Direct –Cement and Concrete Research (2000),pp-
1031-1036
2. V Srinivasa Reddy, M V Seshagiri Rao, S Shrihari,” Appraisal of Processing Techniques for Recycled Aggregates in Concrete”,
International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-8 Issue-6, August 2019, Retrieval
Number F8407088619/2019©BEIESP, DOI: 10.35940/ijeat.F8407.088619, pp.1661-1665
3. K Ganesh Babu and G S N Rao and P V S Prakash, Efficiency of pozzolans in cement composites, Concrete 2000(1993),pp. 497-509
Dundee
4. K Ganesh Babu and G S N Rao, Efficiency of fly ash in concrete, Cement Concrete Composites (1993),pp. 223-229
5. Shrihari, S and Seshagiri Rao, M V and Reddy, V Srinivasa, Evaluation of Cementing Efficiency in Quaternary Blended Self-Compacting
Concrete (March 2019). International Journal of Civil Engineering and Technology 10(3), 2019, pp. 83–90. Available at
SSRN: https://ssrn.com/abstract=3453705
6. C. Chandana Priya, M. V. Seshagiri Rao and V. Srinivasa Reddy, “Studies On Durability Properties Of High Strength Self-Compacting
Concrete –A Review”, International Journal of Civil Engineering & Technology (IJCIET) - SCOPUS indexed, Volume 9, Issue 11,
(November 2018), pp. 2218–2225, Article ID: IJCIET_09_11_219, ISSN Print: 0976 – 6308, ISSN Online: 0976 – 6316, (SCOPUS
indexed)

Authors: Y.Vijay Bhaskar Reddy, L.S.S Reddy,.S.S.N.Reddy

Paper Title: Cross Breed Clustering Algorithm for High Dimensional Data
Abstract: Clustering plays a major role in machine learning and also in data mining. Deep learning is fast
growing domain in present world. Improving the quality of the clustering results by adopting the deep learning
algorithms. Many clustering algorithm process various datasets to get the better results. But for the high
dimensional data clustering is still an issue to process and get the quality clustering results with the existing
clustering algorithms. In this paper, the cross breed clustering algorithm for high dimensional data is utilized.
Various datasets are used to get the results.

Keyword : clustering, data mining, deep learning.


References:
1. Joulin, A., Bach, F., Ponce, J.: Discriminative clustering for image co-segmentation. In: Computer Vision and Pattern Recognition (CVPR),
2010 IEEE Conference on. pp. 1943–1950. IEEE (2010).
2. Liu, H., Shao, M., Li, S., Fu, Y.: Infinite ensemble for image clustering. In: Proceedings of ACM SIGKDD International Confer ence on
Knowledge Discovery and Data Mining (2016).
3. Wang, R., Shan, S., Chen, X., Gao, W.: Manifold-manifold distance with application to face recognition based on image set. In: Computer
Vision and Pattern Recognition, 2008. CVPR 2008. IEEE Conference on. pp. 1–8. IEEE (2008).
4. Aggarwal, C.C., Zhai, C.: A survey of text clustering algorithms. In: Mining text data, pp. 77–128. Springer (2012).
5. Beil, F., Ester, M., Xu, X.: Frequent term-based text clustering. In: Proceedings of the eighth ACM SIGKDD international conference on
879. Knowledge discovery and data mining. pp. 436–442. ACM (2002).
6. Xu, J., Wang, P., Tian, G., Xu, B., Zhao, J., Wang, F., Hao, H.: Short text clustering via convolutional neural networks. In: Proceedings of 5049-
NAACL-HLT. pp. 62–69 (2015). 5052
7. Tian, K., Shao, M., Wang, Y., Guan, J., Zhou, S.: Boosting compound-protein interaction prediction by deep learning. Methods 110, 64–72
(2016).
8. Zhang, R., Cheng, Z., Guan, J., Zhou, S.: Exploiting topic modeling to boost metagenomic reads binning. BMC Bioinformatics 16 , S2
(2015)
9. Dueck, D., Frey, B.J.: Non-metric affinity propagation for unsupervised image categorization. In: Computer Vision, 2007. ICCV 2007.
IEEE 11th International Conference on. pp.1–8. IEEE (2007)
10. Ng, A.Y., Jordan, M.I., Weiss, Y., et al.: On spectral clustering: Analysis and an algorithm. Advances in neural information processing
systems 2, 849–856 (2002)
11. Kanungo, T., Mount, D.M., Netanyahu, N.S., Piatko, C.D., Silverman, R., Wu, A.Y.: An efficient k-means clustering algorithm: Analysis
and implementation. IEEE transactions on pattern analysis and machine intelligence 24(7), 881–892 (2002).
12. Bishop, C.M.: Pattern recognition. Machine Learning 128, 1–58 (2006)
13. Liu, H., Shao, M., Li, S., Fu, Y.: Infinite ensemble for image clustering. In: Proceedings of ACM SIGKDD International Confer ence on
Knowledge Discovery and Data Mining (2016)
14. T. Kohonen, The self-organizing map, Neurocomputing, vol. 21,nos. 1–3, pp. 1–6, 1998.
15. J. A. Hartigan and M. A. Wong, k-means clustering algorithm, Stat. Soc. C, Appl. Stat., vol. 28, no. 1, pp. 100–108,1979.
16. S. Wold, K. Esbensen, and P. Geladi, ‘‘Principal component analysis,’’ Chemometrics Intell. Lab. Syst., vol. 2, nos. 1–3, pp. 37–52, 1987.
17. T. Hofmann, B. Schölkopf, and A. J. Smola, ‘‘Kernel methods in machine learning,’’ Ann. Stat., vol. 36, no. 3, pp. 1171 –1220, 2008.
18. [18] A. Y. Ng, M. I. Jordan, and Y. Weiss, ‘‘On spectral clustering: Analysis and an algorithm,’’ in Proc. Adv. Neural Inf. Process. Syst.,
2002, pp. 849–856.
19. [19] J. Schmidhuber, ‘‘Deep learning in neural networks: An overview,’’ Neural Netw., vol. 61, pp. 85–117, Jan. 2015.
20. [20] de Souto MC, Costa IG, de Araujo DS, Ludermir TB, Schliep A. Clustering cancer gene expression data: a comparative study. BMC
bioinformatics. 2008;9(1):497. pmid:19038021.

Authors: Hemalatha Eedi, Hema Avireni

Paper Title: OTA Firmware Update for Texas Instruments C2000 Controllers
Abstract: Firmware updates are necessary to enhance the embedded systems performance and to remove the
bugs. But it’s not an efficient manner to be installed it by the technician in the field. For c2000 controllers of Texas
instruments dynamic memory allocation is not possible. So, using the proposed method we can maintain both
updated firmware and current running firmware for the continuity of the system operation without dynamic
880. memory allocation requirement. In this over the air (OTA) firmware update method, both application and the
secondary boot loader (SBL) handles the update process without intervention of the technician. When there is any
5053-
update the current running application copies the incoming updated firmware using its linker file. After the update
5056
process when there is a system reset the SBL calculates the checksum of the updated application, if it matches with
the received checksum it executes the updated firmware else it executes the current running firmware without
interrupting the application operation.

Keyword : About OTA; firmware update; secondary boot loader;


References:
1. Samip Dhakal, Fehmi Jaafar and Pavol Zavarsky- “Private Block chain Network for IoT Device Firmware Integrity Verification and
Update”: 2019 IEEE 19th International Symposium on High Assurance Systems Engineering (HASE).
2. Andrew Cottrell, Jithendra Bethur, Timothy J. Markey, M. Srikant, Lakshmanan Srinivasan, “Secure Firmware Update”: United
State Patent Application Publication, 2006.
3. Peter L. Skan, Harpenden (GB) , “Method For Over-The-Air Firmware Update Of NAND Flash Memory Based Mobile Devices”:
United States Patent, 2010.
4. Shao-Chun Chen, Aliso Viejo, CA (US); James P. Gustafson, Irvine, CA (US)- “Firmware Update Network And Process Employing
Preprocessing Techniques”: United States Patent, 2012.
5. Hans Chandra; Erwin Anggadjaja ; Pranata Setya Wijaya ; Edy Gunawan- “Internet of Things: Over-the-Air (OTA) firmware update
in Lightweight mesh network protocol for smart urban development”: The 22nd Asia-Pacific Conference on Communications
(APCC2016).
6. Goran Jurkovic ; Vlado Sruk- “Remote firmware update for constrained embedded systems”: 37th International Convention of
Information and Communication Technology, Electronics and Microelectronics (MIPRO), 1019- 1023, 2014.
7. M. Banerje et al., "A Blockchain future to Internet of Things security", Digital Communications and Networks,2017.
8. N.K. Nainar, C.M. Pignataro, R. Asati, "Block Chain Based IoT Device Identity Verification and Anomaly Detection" U.S. Patent
Application No. 15/098,518, 2016.
9. Dorri et al., "Blockchain: A distributed solution to automotive security and privacy", IEEE Communications Magazine, vol.55, Dec.
2017.
10. Dorri, S.S. Kanhere, R. Jurdak, "Blockchain in internet of things: challenges and solutions", 2016. Available:
https://arxiv.org/pdf/1608.05187.
11. Choi, Byung-Chul, Seoung-Hyeon Lee, Jung-Chan Na, and Jong-Hyouk Lee. "Secure firmware validation and update for consumer
devices in home networking." IEEE Transactions on Consumer Electronics 62, no. 1 (2016): 39-44.
12. Tools.ietf.org. A Firmware Update Architecture for Internet of Things Devices,2018.Available:https://tools.ietf.org/id/draft-moran-
suitarchitecture-02.html
13. Dhakal, Samip, Fehmi Jaafar, and Pavol Zavarsky. "Private Blockchain Network for IoT Device Firmware Integrity Verification and
Update." In 2019 IEEE 19th International Symposium on High Assurance Systems Engineering (HASE), pp. 164-170. IEEE, 2019.

Authors: Sumalatha Mani, Latha Parthiban


Bicluster Method to Predict Gene Patterns to Classify Differential Gene Expressions in Non-Small Cell
Paper Title:
Lung Cancer
Abstract: In recent years, there are numerous efforts to overcome the constraints of data mining approaches to
classify "BIG DATA". There are several types of data which has identical and similar expressions but there are
dependent classification algorithms to predict these classes of expressions. Totally Different algorithms have been
developed and enforced to research and differentiate the categories of data groups based on their functions. Zero-
suppressed Binary Decision Diagram (ZBDD) algorithms help to classify the data with several categories. In the
present study, lung cancer gene expression datasets 25 samples contain 10 mouth buccal cavity epithelial tissue
samples and 15 nasal epithelial tissue samples from never smokers and current smokers were used to classify the
genes and their expressions with various conditions. Using R and BioConductor software to normalize and predict
differential expressed genes by Affy, Affycore tools and Limma packages to predict the gene expression with
various functional properties. ZBDD algorithm and parallel coordination helps to predict the functional genes and
the results shows 345 nasal epithelial genes were predict of which 54 genes were present in bicluster and 35 genes
from mouth epithelial tissues show 14 were present in ZBDD bicluster. The results conclude that ZBDD algorithm
has great advantage to classify big data and this algorithm can introduce in any large datasets for the accurate
predict of large datasets.

Keyword : Clustering; bi-clustering; parallel co-ordination plots; R software implementation .


References:
881. 1. Zhang Y., Guo S. L., Han L. N., Li T, L.: Application and exploration of big data mining in clinical medicine. Chin. Med. J. 129 731-738
(2016)
2. Anand Mariadoss A.V., Krishnan Dhanabalan A., Munusamy H., Gunasekaran K., David, E.: In silico studies towards enhancing the 5057-
anticancer activity of phytochemical phloretin against cancer drug targets. Curr. Drug Targets 13 174-188 (2018). 5065
3. Jin D., Lee, H.: FGMD: A novel approach for functional gene module detection in cancer. PloS One 12 e0188900. (2017)
4. Chiu C. C., Chan S Y., Wang C. C., Wu W,S: Missing value imputation for microarray data: a comprehensive comparison study an d a
web tool. BMC Systems Biology 6 S12 (2013).
5. Dhawan A., et al.: Mathematical modelling of phenotypic plasticity and conversion to a stem-cell state under hypoxia. Sci. Rep. 6 18074
(2016) https://doi.org/10.1038/srep/18074
6. Choi Y. H., J et al.: Mathematical modelling long-term effects of replacing Prevnar7 with Prevnar13 on invasive pneumococcal diseases
in England and Wales. PloS one 7 e 39927 (2012).
7. Ferguson A. C., Pearce S., Band L. R., Yang C., Ferjentsikova I., King J., Yuan Z., Zhang D., Wilson ZA. Biphasic regulation of the
transcription factor ABORTED MICROSPORES (AMS) is essential for tapetum and pollen development in Arabidopsis. New
Phytologist 213(2) 778-90 (2017)
8. Place A. E., Huh S, J., Polyak, K.: The microenvironment in breast cancer progression: biology and implications for treatment. Breast
Cancer Research 6 227 .(2011)
9. Chaffer C. L., et al.: Normal and neoplastic nonstem cells can spontaneously convert to a stem-like state. Proceedings of the National
Academy x of Sciences 108 7950 (2011)
10. Kern M., Lex A., Gehlenborg N., Johnson C, R.: Interactive visual exploration and refinement of cluster assignments. BMC
Bioinformatics 18 406 (2017).
11. Hristoskova A., Boeva V., Tsiporkova, E.: A formal concept analysis approach to consensus clustering ofmulti-experiment expression
data. BMC Bioinformatics 15 151 (2014).
12. Zhao W., Zou W., Chen J, J.: Topic modeling for cluster analysis of large biological and medical datasets. BMC Bioinformatics 15 S11
(2014).
13. Lerato L., Niesler, T.: Clustering acoustic segments using multi-stage agglomerative hierarchical clustering. PloS One 10 e0141756
(2015)
14. Freyhult E., et al.: Challenges in microarray class discovery: a comprehensive examination of normalization, gene selection and
clustering. BMC Bioinformatics 11 503 (2010).
15. Gaynor S., Bair, E.: Identification of relevant subtypes via preweighted sparse clustering. Comput. Stat. Data An. 116 139 -154 (2017).
16. Zhou S., Xu Z., Liu, F.: Method for determining the optimal number of clusters based on agglomerative hierarchical clustering. IEEE T.
Neur. Net. Lear. 28 3007-17 (2017).
17. Kruse C., Eiken P., Vestergaard, P.: Clinical fracture risk evaluated by hierarchical agglomerative clustering. Osteoporosis Int. 28 819-32
(2017).
18. Ghosh S., Townsend J, P.: H-CLAP: Hierarchical clustering within a linear array with an application in genetics. Stat. Appl. Genet. Mol.
14 125-41 (2015) https://doi.org/10.1515/sagmb-2013-0076
19. Scrucca L., Raftery A, E.: Improved initialization of model-based clustering using Gaussian hierarchical partitions. Adv Data Anal Classi.
9 447-60 (2015)
20. McLachlan G.J., Bean R.W., Ng S, K.: Clustering. In: Keith J. (eds) Bioinformatics. Methods Mol. Biol. 1526 (2017)
21. Demir A., Cetingul H, E.: Sequential hierarchical agglomerative clustering of white matter fiber pathways. IEEE Trans. Biomed . Eng. 62
1478-89 (2015)
22. Banfield J. D., Raftery A, E.: Model-based Gaussian and non-Gaussian clustering. Biometrics. 49 803-821 (1993)
23. Dharan S., Nair A, S.: Biclustering of gene expression data using reactive greedy randomized adaptive search procedure. BMC
Bioinformatics 10(1) S27 (2009).
24. Madeira S. C., Oliveira A, L.: Biclustering algorithms for biological data analysis: a survey. IEEE/ACM Trans. Comput. Biol.
Bioinform. 1 24-45 (2004).
25. Sridhar S., et al.: Smoking-induced gene expression changes in the bronchial airway are reflected in nasal and buccal epithelium. BMC
Genomics 9 259 (2008).
26. Wistuba II., et al.: Molecular damage in the bronchial epithelium of current and former smokers. J. Natl. Cancer Inst. 89 1366-73 (1997)
27. Yoon S., Nardini C., Benini L., De Michel,i G.: Discovering coherent biclusters from gene expression data using zero -suppressed binary
decision diagrams. IEEE/ACM Trans. Comput. Biol. Bioinform. 2 339-54 (2005).
28. Diboun I., Wernisch L., Orengo C. A., Koltzenburg, M.: Microarray analysis after RNA amplification can detect pronounced differences
in gene expression using limma. BMC Genomics 7 252 (2006)
29. Huang D.W., et al.: Bioinformatics Resources: expanded annotation database and novel algorithms to better extract biology fr om large
gene lists. Nucleic Acids Res. 35 169-175 (2007)
30. Wen Z., et al.: Expression profiling and functional annotation of noncoding genes across 11 distinct organs in rat development. Sci. Rep.
6 38575 (2016) Kichaev G., Pasaniuc, B.: Leveraging functional-annotation data in trans-ethnic fine-mapping studies. Am. J. Hum.
Genet. 97 260-271 (2015)
31. Erinjeri N. J.,et al.: Whole-exome sequencing identifies two discrete druggable signaling pathways in follicular thyroid cancer. J. Am.
Coll. Surg. 226 950-959 (2018)
32. Vastrad C., Vastrad, B.: Bioinformatics analysis of gene expression profiles to diagnose crucial and novel genes in glioblastoma
multiform. Pathology-Research and Practice 214 1395-461 (2018).

Authors: Arvind K. Sharma, Avinash Sharma, Aditya Saini, Paluck Arora, S.K. Mittal
DNS Aegis, Authentication with Digital Signature using Hash Functions and Various Attacks:
Paper Title:
KARKOFF
Abstract: DNS have a crucial role in adequate functioning/performance of the Internet. Even though every
single internet applications rely/trust on ‘Domain-Name-System’ for the ‘Name-Resolutions’ yet in this particular
infrastructure have numerous ‘Security-Vulnerabilities’ with specific severity level and influenced by many attacks
such as: ‘BIT SQUATTING REDIRECTION’, ‘CACHE POISONING’, ‘DNS REBINDING’, ‘TYPO
SQUATTING REDIRECTION’ etc. Suppose what will happen if ‘DNS-Server’ or ‘DNS-Services’ gonna
compromised? Answer will be all the resources which belong to Internet/Intranet/Extranet influenced, has a result
adverse effect not only for the resources used but to confidential data too. One important point is ‘DNS’ aren’t just
gonna used for having ‘Domain-Names’ w.r.t. logical addresses, but it is also utilize to Restrict Unauthorized/Un-
Authenticated traffic too. So in cyber security arena manageable, trust worthier infrastructure of DNS is must.

Keyword : Adversary, Bit-Squatting, Cache, Denial-Of-Service, Domain-Name, Eavesdropping, Hijack,


Timestamp, Time-to-Live, Uniform Resource Locator.
References:
1. Maziar, ‘Redirecting Network Traffic toward a Fake DNS Server on a LAN’, ‘2010 3 rd International Conference on Computer Science and
882. Information Technology’, IEEE, 2010 Pg.: 429-433.
2. Yasuo Musashi, ‘Detection of Kaminsky DNS Cache Poisoning Attack’, ‘2011 Fourth International Conference on Intelligent Networks
and Intelligent Systems’, IEEE Computer Society, 2011. 5066-
3. B. Radha, ‘DEEPAV2: A DNS Monitor Tool For Prevention of Public IP DNS Rebinding Attack’, ‘2011 International Conference on 5069
Advance in Recent Technologies in Communication and Computing’, IEEE, IET, 2011.
4. Nobuhiro Shibata, ‘Trends in Host Search Attack in DNS Query Request Packet Traffic’, ‘2012 Fifth International Conference on
Intelligent Networks and Intelligent Systems’, IEEE, CPS, 2012.
5. Yuto Takeda, ‘DNS Any Request Cannon Activity in DNS Query Packet Traffic’, ‘2013 6 th International Conference on Intelligent
Networks and Intelligent Systems’, IEEE Computer Society, 2013.
6. M. H. Jalalzai, ‘DNS Security Challenges and Best Practices to Deploy Secure DNS with Digital Signatures’, ‘2015 12th International
Bhurban Conference on Applied Science & Technology, IEEE, Islamabad, Pakistan, January 2015.
7. Pratik, ‘DNS-IDS: Securing DNS in Cloud Era’, ‘2015 International Conference on Cloud and Autonomic Computing’, IEEE Computer
Society, 2015.
8. Michael, ‘DNS Application to Improve Network Security’, ‘DNS Security Management: First Edition’ IEEE, 2017.
9. Yong Jin, ‘Efficient Detection of Suspicious DNS Traffic By Resolver Separation per Application Program’, IEEE, ICTC 2017.
10. Bold Munkhbaatar, ‘Dark Domain Name Attack: A New Threat to Domain Name System’, Springer, ICISS 2017 Pg. 405-414.
11. Lanlan, ‘A Public Key Based EDNS Privacy Tunnel for DNS’, ‘2018 17 th IEEE Conference on Trust, Security and Privacy in Computing
and Communication’, Pg.:1722-1724, 2018.
12. Arvind, ‘A Comprehensive Study On Digital- Signatures with Hash Functions’, ‘International Journal of Computer Sciences and
Engineering’, Vol. 07, Issue-4, April 2019.
13. Arvind, ‘Cryptography & Network Security Hash Function Applications, Attacks and Advances: A Review’, IEEE, ‘3rd International
Conference on Inventive Systems and Control (ICISC 2019), 10-11 January, 2019, Pg. 177-188.
14. https://en.wikipedia.org/wiki/DNS_hijacking
15. https://deskgram.cc/explore/tags/karkoff
16. https://en.wikipedia.org/wiki/Domain_Name_System

883. Authors: O.R. Obanla, J.D. Udonne, O.O. Ajani, M.E. Ojewumi O.J. Omodara
Paper Title: Oxirane Ring Opening of Rubber (Hevea Brasiliensis) Seed Oil by Perfomic Acid
Abstract: Studies on the epoxidation of rubber (Hevea brasiliensis) seed oil, a renewable source with formic
acid was performed in the presence of 30% hydrogen peroxide at a of temperature 40, 50,60,70 oC. The process is
favoured by an increase in temperature forming a product with high oxirane content which is as a result of mole
ratios of formic acid and hydrogen peroxide. Products of high oxirane content are commercialy viable in the
production of polyvinyl chloride (PVC). Natural rubber and other products can be obtained from this in- situ
technique. Studies in this research shows that the rate of epoxidation increases with an increase in
temperature.Oxirane values of 2.30, 3.62 and 4.73 for the various temperature. However high oxirane content of
6.22 was obtained at 70 oC which is in line with literature. FTIR analysis was also carried out on the epoxidized
rubber seed oil which shows the peaks of oxirane cleavage.

Keyword : Epoxidation, oxirane content, performic acid and rubber seed oil.
References:
1. Abdullah B.M. and Salimon J. (2009). Physicochemical characteristics of Malaysian rubber (Hevea brasiliensis) seed oil. Eur J Sci
Res. 31(3):437–445
2. Adhvaryu, A., Liu Z. and Erhan, S.Z. (2002). Epoxidized Soybean oil as a potential source of high temperature lubricants. Ind Crops
Prod. 15(1): 247-254
3. Aigbodion, A.I, Okieimen, F.E. and Bakare, I.O. (2001). Investigation of oxirane ring opening reaction in epoxidized rubber seed oil
quality assessment and authentication. Journal oil Technology Association Indian 33(3): 16-19.
4. Aigbodion, A.I, Pillai, K.S.C., Bakare, I.O. and Yahaya, L. E. (2001). Synthesis, characterization and evaluation of heated r ubber
seed oil modified alkyd resins as binders in surface coatings. Indian J. of chemical technology. 8(2): 378-384. 5070-
5. Aigbodion, A.I, Okieimen, F.E. and Bakare, I.O. (1999). In situ epoxidation of rubber seed oil by peracetic acid. Nigeria Jou rnal of 5073
applied Sci. 17(2): 27-36
6. Aigbodion, A.I, Menon, A.R.R and Pillai, C.K.S. (2000). Processability characteristics and physico-mechanical properties of natural
rubber modified with rubber seed oil and epoxidized rubber seed oil. J Appl Polym Sci. 77(5):1413–1418. doi: 10.1002/1097-
4628(20000815)77:7<1413::AID-APP23.0.CO;2-7.
7. Blayo, A. Gandini, J.F. and Nest L.E. (2001). Chemical and rheological characterization of some vegetable oils derivatives
commonly used in printing inks. Ind. crops Prod. 14(2):155-167
8. Canakci M, Van Gerpen J (2001). Biodiesel production from oils and fats with high free fatty acids.Transactions of ASAE.
44(6):1429-1436
9. Ikwuagwu, O.E., Ononogbu, I.C. and Njoku, O.U. (2000). Production of biodiesel using rubber seed oil. Ind. Crops. Prod. 12(1) :57-
62
10. Iyayi A.F, Akpata P.O, Ukpeoyibo U (2008). Rubber seed processing for value added latex production in Nigeria. Afri. J. Agri. Res.
3(7):505-509.
11. Joseph R, Madhusoodhanan, K.N., Alex, R, Varghese, S., George, K.E., and Kuriakose B. (2004). Studies on epoxidized rubber se ed
oil as secondary plasticizer/stabilizer for PVC, plastics, rubber and composites. 33(3):217–222. doi: 10.1179/146580104225020974.
12. Obanla, O.R., Udonne, J.D., Ajani, O.O., Omodara, O.J. and Omolewa, D.A. (2018). Extraction, comparative study and property
evaluation synthesized bar soap from locally sourced rubber (Hevea Brasiliensis) seed oil and palm kernel oil. International
13. Journal of Mechanical Engineering and Technology (IJMET) 9(12):308-319
14. Onyeike, E.N. and Acheru, G.N. (2002). Chemical composition of selected Nigerian oil seeds and physicochemical properties
of the oil extracts. Food Chem. 77:431–437. doi: 10.1016/S0308-8146(01)00377-6.
15. Ramadhas, A.S., Jayaraj, S and Muraleedharan, C. (2009). Biodiesel production from high FFA rubber seed oil fuel. 84(4):335-340
16. Salimon, J. and Abdullah, B.M. (2009). A study on the thermal properties and solid fat content of Malaysian rubber seed oil. The
Malaysian Journal of analytical Sciences. 13(2): 1–7.
17. Udonne, J. D. and Alade, B.O. (2016). Development of biobased lubricant from locust bean seed oil. International Journal of
Scientific & Engineering Research. 7(3): 491-500

Authors: Ramanand singh, Piyush Shukla, Paresh Rawat, Prashant Kumar Shukla
Invisible Medical Image Watermarking using Edge Detection And Discrete Wavelet Transform
Paper Title:
Coefficients
Abstract: Protection and authentication of medical images is essential for the patient’s disease identification
and diagnosis. The watermark in medical imaging application needs to be invisible and it is also required to
preserve the low and high frequency features of image data which makes watermarking a difficult assignment.
Within this manuscript an unseen medical image watermarking approach is projected apply edge detection in the
discrete wavelet transform domain. The wavelet transform is brought into play to decay the medical picture
interested in multi-frequency secondary band coefficients. The edge detection applies to high frequency wavelet
group in the direction of generating the boundary coefficients used as a key. The Gaussian noise pattern is utilized
as watermark as well as embedded within the edge coefficients around the edges. To add the robustness scaled
dilated edge coefficient is added with the edge coefficients to generate the watermarked image. Preserving the
884. small frequency secondary band fulfills the information requirement of the medical imaging application. At the
same time as adding together the watermark during high frequency sub-bands improve the watermark invisibility. 5074-
To add additional robustness the dilation is applied on the edged coefficient before being embedded with sub band 5080
coefficients. presentation of the technique is experienced on the dissimilar set of medical imagery as well as
evaluation of the proposed watermarking method founds it robust not in favor of the different attacks such at the
same time as filtering, turning round plus resizing. Parametric study foundation going on Mean Square Error along
with Signal to Noise Ratio shows that how good method performs for invisibility.

Keyword : Medical Images, Watermarking, Discrete Wavelet Trasform, Edge Detection, Dilation,
Invisibility.
References:
1. John N. Ellinas, A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection, IEEE Journal on image processing, pp. 197-208
2008.
2. Yingli Wang, Xue Bai,, Shuang Van “Digital Image Watermarking Based on Texture Blocl< and Edge Detection in the Discre te Wavelet
Domain” IEEE International Conference on Sensor Network Security Technology and Privacy Communication System (SNS & PCS) pp.
170-174, 2013.
3. J. N. Ellinas, D. E. Manolakis, “A robust watermarking scheme based on edge detection and contrast sensitivity function,” in VISAPP Proc.
Int. Conf. Computer Vision Theory and Applications, Barcelona, 2007.
4. Narong Mettripun, “Robust Medical image watermarking based on DWT for Patient Identification”, IEEE 13th international conference on
electrical engineering/electronics, computer, telecommunications and information technology (ECTI-CON) July 2016.
5. Apeksha Tiwari, Virendra Singh “Digital Image Watermarking Using DWT and Shift Invariant Edge Detection “International Journa l of
Computer Technology and Electronics Engineering (IJCTEE) Volume 3, Issue 6, December 2013.
6. Nai-Kuei Chen, Chung-Yen Su, Che-Yang Shih, Yu-Tang Chen “Reversible Watermarking for Medical Images Using Histogram Shifting
with Location Map Reduction”, IEEE international Conference on Industrial Technology (ICIT) 2016.
7. I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Pr ocessing,
vol. 6, no. 12, pp. 1673–1687, Dec. 1997.
8. J. M. Zain and A. R. M. Fauzi, "Medical image watermarking with tamper detection and recovery", in Proceedings of the 28th IEEE EMBS
Annual International Conference, pp.3270- 3273, 2006.
9. S. C. Liew and J. M. Zain, “Reversible medical image watermarking for tamper detection and recovery”, 3 RD IEEE International
Conference on Computer Science and Information Technology (ICCSIT), pp. 417-420, 2010.
10. Smita Agrawal, Manoj Kumar, “”Reversible Data Hiding for Medical Images using Integer-to-Integer Wavelet Transform”, In IEEE
Students’ Conference on Electrical, Electronics and Computer Science, (SCEECS) 2016.
11. R. Dugad, K. Ratakonda, and N. Ahuja, “A new wavelet-based scheme for watermarking images,” in IEEE Proc. Int. Conf. Image
Processing, USA, pp. 419-423, 1998.
12. J. R. Kim, and Y. S. Moon, “A robust wavelet-based digital watermarking using level-adaptive thresholding,” in IEEE Proc. Int. Conf.
Image Processing, Japan, 1999, pp. 226-230.
13. P. V. V. Kishore , S. R. C. Kishore , E. Kiran Kumar , K. V. V. Kumar , P. Aparna, “Medical image Watermarking with DWT-BAT
algorithm”, IEEE international conference on Signal Processing and Communication Engineering Systems (SPACES) 2015.
14. R. B. Wolfgang, C. I. Podilchuk, and E. J. Delp, “Perceptual water-marks for digital images and video,” in SPIE Proc. Int. Conf. Security
and watermarking of multimedia contents, USA, 1999, pp. 40-51.
15. R. J. Beattie, 1984, “Edge detection for semantically based early visual processing, “dissertation, Univ. Edinburgh, Edinburgh, U.K.
16. Vikas Tyagi “Data Hiding in Image using least significant bit with cryptography”, International Journal of Advanced Research in
Computer Science and Software Engineering, Vol. 2, Issue 4, April 2012.
17. S. Mallat, S. Zhong, 1992, “Characterization of signals from multistage edges,”, IEEE Trans. Pattern Anal. Machine Intell., vol.14, no.7, pp.
710-732.
18. Xia Xiang-Gen, Boncelet, C.G., Arce, G.R., “A multiresolution watermark for digital images”, in the proceedings of IEEE International
Conference on Image Processing, Vol. 1, pp 549 – 551, Oct 1997.
19. Tao, P & Eskicioglu, “A Robust Multiple Watermarking Scheme in the Discrete Wavelet Transform Domain”, in Symposium on Intern et
Multimedia Management Systems V, Philadelphia, PA, 2004.

Authors: Sangeethapriya Nachimuthu, Bharathi Lakshmanan, Dola Sanjay


Trust Aware Light Weight Secure Routing Protocol for Wireless Body Sensor Network using RCP
Paper Title:
Measures
Abstract: The growth of information technology and networking solutions encouraged the deployment of
WBSN. It supports the monitoring and control of human conditions towards various issues. However, the security
of data transmission and routing plays vital role and to achieve this, different algorithms has been identified. But,
the earlier methods are does not produce expected QoS (Quality of Service) parameters. To improve the
performance of routing, a novel trust aware light weight routing algorithm (RCP-TLSR (Reputation Completion
Privacy Preservation-TLSR) has been proposed. The sensors of wireless body network discover the available routes
between the source and destination. The selection of route and the sensor node has been identified according to the
RCP measure which has been computed according to the reputation, completion and privacy preservation values.
By choosing the routes according to the values of RCP, the method achieves higher performance in routing. On the
other side, the data security has been enforced by block level encryption technique which is understandable for the
concern sensor nodes. The method improves the performance in security and routing highly.

Keyword : WBSN, Secure Routing, Privacy Preservation, Data Security, TALWSR, RCP, QoS.
885.
References:
1. Tao Yang, Xu Xiangyang, “A secure routing of wireless sensor networks based on trust evaluation model”, Elsevier, Computer science, 131 5081-
(2018) 1156–1163, 2018. 5085
2. Farruh Ishmanov , “Trust Mechanisms to Secure Routing in Wireless Sensor Networks: Current State of the Research and Open Research
Issues”, Hindawi, Journal of Sensors, 2017.
3. Hassan Oudani, “Energy Efficient in Wireless Sensor Networks Using Cluster-Based Approach Routing” , IJSSN, 5(1),6-12, 2017.
4. NidhiSharma ,”Privacy Preservation in WSN for Healthcare Application”, Elsevier, Computer science, 132(2018), 1243-1252, 2018.
5. Mian Ahmad Jan ,”Moving Towards Highly Reliable and Effective Sensor Networks”, Ad Hoc & Sensor Wireless Networks, 40, pp. 1 63–
168, 2018.
6. Seyed Mahmood Hashemi, “Secure Routing of WBAN with Monarchy Butterfly Optimization”, ACM, ICCIS, pages 155-158,2017.
7. Farzad Kiani , “Reinforcement Learning Based Routing Protocol for Wireless Body Sensor Networks”, ISCSC, 2017.
8. Lin Li and Donghui Li , “An Energy-Balanced Routing Protocol for a Wireless Sensor Network”, Hindawi, Journal of Sensors, 2018.
9. Yating Qu ,”A Survey of Routing Protocols in WBAN for Healthcare Applications, Sensors, 19(7), 2019.
10. Ghufran Ahmed , “Thermal and energy aware routing in wireless body area networks”, IJDSN, 2019.
11. Rahat Ali Khan, “An energy efficient routing protocol for wireless body area sensor networks”, JWPC, 99(4), 2018.
12. “EEHRT: Energy Efficient Technique for Handling Redundant Traffic in Zone-Based Routing for Wireless Sensor Networks”, Hindawi,
WCMC, 2019, 2019.
13. V.kavidha, S.anandakumaran, “Novel energy-efficient secure routing protocol for wireless sensor networks with Mobile sink”, Springer,
Peer-to-Peer Networking and Applications, 2018.
14. Fouad El Hajji, “Adaptive Routing Protocol for Lifetime Maximization in Multi-Constraint Wireless Sensor Networks”, Springer, JCIN,
3(1), 67–83, 2018.
15. Sohail Jabbar, “Analysis of Factors Affecting Energy Aware Routing in Wireless Sensor Network”, Hindawi, WCMC, 2018.

886. Authors: Kamil M. Arslanov, Artur I. Khabirov


Paper Title: Differentiation of the Legal Regulation of the Loan Treaty by Prerevolutionary and Soviet Legislation
Abstract: One of the trends in the modern development of legal thought in Russia should be called an appeal
to the experience of past generations. A loan agreement is one of the oldest institutions known as far as Roman law
[1, 18]. A detailed regulation of legal regulation in the Russian Empire was obtained by the loan agreement in the
book of the fourth volume X of part 1 of the Code of laws of the Russian Empire (hereinafter - the Code of Laws).
The rules contained in the said act were valid until the October Revolution of 1917. At the end of the XIX
beginning of the XX centuries. The highest established Drafting Commission developed the Civil Code Draft
(hereinafter - the draft GU), the fifth chapter of the second volume of the second book of which was devoted to the
regulation of the loan agreement (Articles 348-363). In the Soviet period, for the first time, a loan agreement was
regulated by the Civil Code of the RSFSR of 1922 (hereinafter - the Civil Code of the RSFSR) in chapter VI
“Loan”. It is of great theoretical and practical interest to compare the rules for regulating a loan agreement in the
pre-revolutionary and Soviet periods for several reasons. Firstly, “Russian private law is at the stage of its reform”
[2, 126]. Secondly, the text of the 2009 Concept states that the historical development of Russian law and the legal
systems of continental law (Roman law) should be taken into account. In the article, the authors study the historical
legal tradition of a loan obligation.

Keyword : civil law, loan agreement, Civil Code of the Russian Federation, history, Code of laws of the
Russian Empire.
References:
1. Khabirov A.I. The system of rights and obligations of the parties to a loan obligation in modern law // Law and Management. X XI
Century. - 2019. -- P. 18-24
2. Arslanov K. M. On the importance of comparative legal studies of foreign law for the development of Russian private law //
Comparative Law in the Integration of States: Proceedings of the II International Congress of Comparative Law (Moscow, Decemb er
3, 2012) / ch. ed. Yu.A. Tikhomirov, V.I. Lafitsky. - M.: Institute of Legislation and Comparative Law under the Government of the
Russian Federation: INFRA-M, 2013. - P. 126-131.
3. Arslanov K.M. The formation of the Kazan School of Civil Law and its impact on the development of modern Russian civil law /
Kazan Law Schools: the evolution of educational and scientific traditions in modern jurisprudence. - M., 2016. -- P. 204-217. 5086-
4. Comparative Law. An Introduction to the Comparative Method of Legal Study and Research. By Gutteridge H. C., K.C., LL.D.
(Cambridge Studies in International and Comparative Law, Vol. I.) - London: Cambridge University Press. The Cambridge Law 5089
Journal. - 1947. - 9 (3). - P. 386 - 387.
5. Dale, William. Legislative Drafting: A New Approach: a Comparative Study of Methods in France, Germany, Sweden and the
United Kingdom. - London: Butterworths, 1977. -- 341 p.
6. Arslanov K.M., Khabirov A.I. About the Weak Party of the Loan Contract // Astra Salvensis, Review of History and Culture
Supplement. - 2017. -- P.323-330.
7. Siems, M., & Mac Síthigh, D. Mapping legal research. The Cambridge Law Journal. - 2012. -- 71 (3). - P.651 - 676.
8. Davies, P. Rectification versus interpretation: the nature and scope of the equitable jurisdiction. - The Cambridge Law Journal. -
2016. -- 75 (1). - P.62-85.
9. Khabirov A.I., Khamitova G.M. On The Issue of the Place of a Loan Commitment in the System of the Russian Law of Obligations //
The Journal of Social Sciences Research. 2018. - Special Issue - 5. - P. 421-424.
10. Meyer D. I. Russian civil law [Electronic resource]: 2 Parts, 2003. URL: http://civil.consultant.ru/elib/books/45/page_67.html
(accessed: 05/12/2019)
11. Romanets Yu. V. System of contracts in the civil law of Russia / Yu. V. Romanets. - 2nd ed., Revised. and add. - M.: Norma: Infra-
M, 2013. -- 496 p.
12. Karapetov A.G. Freedom of contract and its limits. T. 2: The limits of freedom to determine the terms of the contract in foreign and
Russian law / A.G. Karapetov, A.I. Savelyev. - M.: Statute, 2012. -- 453 p.
13. Arslanov K.M. On the bilaterally binding nature of the loan agreement // Seventh Perm Congress of Legal Scientists: All-Russian
materials. scientific-practical conf. Perm, 2016.P. 85-87.
14. Braginsky M.I. Contract Law / M.I. Braginsky, V.V. Vitryansky. - Prince 5, t. 1: Loan, bank loan and factoring agreements.
Agreements aimed at creating collective entities. - M.: Statute, 2006. -- 734 p.
15. Rasooli, M., & Abedini, M. The Relationship between Organizational Support and Job Satisfaction of Experts and Managers of
Islamic Azad University of Qeshm and Subsidiaries (International Units, Medical, Sama, Hormuz and Khamir). Dutch Journal of
Finance and Management, 1(2), (2017).42. https://doi.org/10.29333/djfm/5818
16. Gamarra, M., Zurek, E., & San-Juan, H. Addendum for: A Study of Image Analysis Algorithms for Segmentation, Feature Extraction
and Classification of Cells. Journal of Information Systems Engineering & Management, 3(1), (2018).05
17. García-Santillán, A. An Algorithm to Renegotiate Debt through Equivalent Equations and Transaction Costs: A Proposal for the
Field of Financial Education. International Electronic Journal of Mathematics Education, 14(1), (2019). 123-136.
https://doi.org/10.12973/iejme/3981
18. Novikova, I. N., Popova, L. G., Shatilova, L. M., Biryukova, E. V., Guseva, A. E., & Khukhuni, G. T. Lexical and semantic
representation of the linguistic and cultural concept “Rest” in the English, German, and Russian languages. Opción, 34(85 -2), (2018).
237-256

Authors: Alsu Ashrapova, Sholpan Zharkynbekova, Ludmila Svirina, Maria Loginova

Paper Title: Student as a Personality: Dynamics of Associative Criteria


Abstract: This paper is devoted to the study of a student’s linguistic personality from the standpoint of the
theory of linguistic-cultural types. The relevance of the study is due to the actively developing anthropological
linguistics field of the theory of linguocultural type, within the framework of which generalized recognizable
887. personalities as representatives of a certain linguistic culture are considered. The object under study is the
conceptual characteristics and the resulting reactions to the stimulus word “student”. The purpose of this work is to 5090-
linguistically represent a student as a person, to describe the notional component of the typified personality concept 5093
based on associative attributes. The paper proposes to expand the conceptual space of a character type by means of
the associations obtained and to consider the character type of “student” as a person who is beyond the bounds of a
cliche. The character type of student is a vivid representative of the sociocultural group, embodying the educational
values of society. According to our observations, the description of the linguocultural character type of student
through the eyes of students themselves gives a more detailed representation of the substantive component of the
concept. The study is based on the associative and semantic field “student” which includes linguistic units
reflecting the lexical-semantic space of student life; associated with the mental, emotional, physical, material,
intellectual condition of a student; denoting character traits representing specific concepts / specific objects of the
material world (educational supplies, a kind of instant food, etc.), etc.

Keyword : association, associative field, concept, linguistic and cultural character type, conceptual component.
References:
1. Karasik V.I. Language circle: personality, concepts, discourse. Volgograd: Peremena, 2002.447 p.33
2. Regina F. Frey, Angela Fink, Michael J. Cahill, Mark A. McDaniel, Erin D. Solomon. Peer-Led Team Learning in General
Chemistry I: Interactions with Identity, Academic Preparation, and a Course-Based Intervention. Journal of Chemical Education
2018, 95 (12)
3. Douglas J. Simpson John Dewey's Concept of the Studentanadian Journal of Education / Revue canadienne de l’éducation Vol. 26,
No. 2 pp. 183-200, 2001
4. Shaiakhmetova L., Shayakhmetova L., Mukhametzyanova L.The Way Concept In The Author's Picture Of The World (By Example
Of The Story A Warn Path By Eudora Welty)//Modern Journal Of Language Teaching Methods.Vol.7, Is.9. - P.652-656. 2017
5. Boydston, J. A. The school and society. Carbondale, IL: Southern Illinois University Press.1980
6. Burnett, J. R.. Preface. In J. A. Boydston, (Ed.) The school and society Carbondale, IL: Southern Illinois University Press. 1980
7. Shao-Liang Zheng, Michael G. Campbell. Connecting Key Concepts with Student Experience: Introducing Small-Molecule
Crystallography to Chemistry Undergraduates Using a Flexible Laboratory Module. Journal of Chemical Education, 95 (12), 2018
8. Karasik V.I., Slyshkin G.G. Linguocultural concept as a unit of research / V.I. Karasik, G.G. Slyshkin // Methodological prob lems of
cognitive linguistics. Voronezh: Voronezh State University, 2001. Pp. 75-80
9. Shamsutdinov R., Mukharlyamova L., Zharkynbekova Sh., Ashrapova A. Semantic Field of `Wish / Desire 'in the Tatar Language //
Tarih Kultur Ve Sanat Arastirmalari Dergisi-Journal of History Culture And Art Research.Vol.6, Is.6. - P.117-124. 2017
10. Mokienko V.M. From everyday meaning to an artistic image // Bulletin of the Kemerovo State University.2016. Number 3. P. 164 -
169
11. Phraseological Dictionary of the Russian Literary Language / Edited by A.I. Fedorova.M.: Astrel AST, 2008. 880 p.
12. Solokhina A.S. The concept of "freedom" in the English and Russian linguistic cultures: a thesis for the degree of candidate of
philosophical sciences. Volgograd, 2004.189 p.
13. Zhanpeisova N.M., Zhumakhanova A.Zh. The concept of "freedom" in the English, Russian and Kazakh linguistic cultures //
Science: yesterday, today, tomorrow: a collection of papers based on the materials of the XIII international scientific and p ractical
conference. No. 6 (13).Novosibirsk: Sibak, 2014
14. Sayko O.A. Joy // Anthology of concepts. Edited by V.I. Karasik, I.A. Sternin. Vol. 7. Volgograd: Paradigm, 2009. Pp. 18-34
15. Ozhegov S.I. and Shvedova N.Yu. Explanatory Dictionary of the Russian Language: 80,000 words and phraseological expressions /
Russian Academy of Sciences. V.V. Vinogradov Russian Language Institute. 4th edition, amended. M.: LLC "A TEMP", 2006. 944
p.
16. Steshina E.G. Wealth and poverty // Anthology of concepts. Edited by V.I. Karasik, I.A. Sternin. Vol. 7 Volgograd: Paradigm, 2009.
Pp. 138-154
17. Dimitrova E.V. Longing // Anthology of concepts. Edited by V.I. Karasik, I.A. Sternin. Vol. 1. Volgograd: Paradigm, 2005. Pp. 268-
273
18. R. R. Zamaletdinov, F. H. Gabdrakhmanova, G. F. Zamaletdinova. The Language Nomination And The Turkic Conceptual System
(On The Material Of The Tatar Language). Herald NAMSCA 3, 2018. рр. 896-898.
19. Kuznetsova A. A., Svirina L. O., Iliasova L. G., Relevant Topics Motivating Learners Of English To Produce Meaningful
Utterances//Ad Alta-Journal Of Interdisciplinary Research. Vol.8, Is.1. - P.203-205. 2018
20. Sadeghpour, F., Far, M. G., Khah, A. R., & Akbardokht Amiri, M. A. Marketing Strategic Planning and Choosing the Right Strategy
using AHP Technique (Case Study: Ghavamin Bank Mazandaran). Dutch Journal of Finance and Management, 1(2), 45. (2017).
https://doi.org/10.29333/djfm/5821
21. Oliveira, F. K. D., Oliveira, M. B. D., Gomes, A. S., & Queiros, L. M. Identifying User Profiles from Statistical Grouping Me thods.
Journal of Information Systems Engineering & Management, 3(1), 06. (2018).
22. Alkhateeb, M. Multiple Representations in 8th Grade Mathematics Textbook and the Extent to which Teachers Implement Them.
International Electronic Journal of Mathematics Education, 14(1), 137-145. (2019). https://doi.org/10.12973/iejme/3982
23. Shatilova, L. M., Borisova, V. V., & Kasatkina, O. A. Representation of the linguistic and cultural concept “lie” in the Fren ch and
Russian language picture of the world. Opción, 34(85-2), 257-276. (2018).

Authors: Gulnaz F. Valiullina, Diana F. Kayumova, Elena V. Valeeva


Linguistic and Cultural Interpretation of the Concept "Love" in the Lexicographical Sources of
Paper Title:
Languages of Different Structures
Abstract: The article is devoted to the comparative study of the linguocultural concept "love" in the English
and Tatar languages. In this work, the linguoculturological concept "love" is compared in the Tatar and English
languages on the example of lexicographical sources. The relevance of the research topic is determined by the fact
that love is one of the most complicated and richly represented in the language of the phenomena of the emotional
sphere, which began to attract the attention of linguists and linguoculturological in recent years.
The comparison of different structural languages will reveal both similar sides, since this concept is universal for
all languages; and distinctive features, which is explained by the different structure of the languages in question.
888. This article examines the concept of "love" (MBT, love) in ways to transfer lexicographic interpretations of
linguistic and cultural concepts in the dictionaries of the Tatar and English, namely in terms of their semantics, as 5094-
well as conceptual and syntagmatic relations. 5096
The material of the article and the results of the study are of interest to scientists studying concepts in English and
Tatar languages. The results can be used in the study of such disciplines as linguoculturology, linguistics,
lexicography, etc.

Keyword : concept, lexicography, love, Tatar, English .


References:
1. A.Sh. Yusupova, G.R. Mugtasimova, G.A. Nabiullina, “Proverbs of the Tatar People as Part of Ethnic Identity”, Mediterranean
Journal of Social Sciences MCSER Publishing, Rome-Italy, pp. 161-167, 2015.
2. L.I Galeeva, A.G. Sadykova, D.F. Kajumova, G.F .Valiullina, E.L. Iakovleva, “Social and pedagogical conditions of formation the
students culture of communication by means of socio-cultural creativity”, Man in India, vol. 97. № 3, pp. 53-65, 2017
3. V. Gak, “Comparative lexicology”, pp. 12-15, 1977.
4. E. Sapir, “Selected works on linguistics and cultural science”, pp. 275-277, 1993.
5. V. Dubichinsky, “Theoretical and practical lexicography”, pp. 31-38, 1998.
6. I. Kobozeva, “Lexical semantics”, pp. 124-129 ,2000.
7. “Philosophical encyclopaedic dictionary”, pp. 328-329, 1983.
8. “Dictionary of ethics”, pp. 168-169, 1983.
9. “Great psychological encyclopedia”, pp. 189-190, 2007.
10. M. Enikeev, “Psychological encyclopaedic dictionary”, pp. 251-252, 2008.
11. R.A. Ayupova, I. Byiyk, E. Arsenteva, “Motivated Meaning of Phraseological Units with Colorative Components in English and
Turkish”, The Turkish Online Journal of Design, Art and Communication TOJDACApril 2017 Special Edition, 2017.
12. A.O. Tarasova, A.K. Gizatullina, R.R. Mingazova “Emotional And Expressive Sentences In Tatar And French: Representation As A
Semantic Component Of Expressivity”, Modern Journal of Language Teaching Methods, pp. 170-176, 2017.
13. Yu. Stepanov, “Constants: Dictionary of Russian culture”, pp. 48-49, 2001.
14. R. Akhmetyanov, “Brief historical and etymological dictionary of the Tatar language”, pp.179-264, 2001.
15. “The Barnhart concise dictionary of etymology”, pp. 443-444, 1995.
16. D.N. Davletbaeva, E.A. Smirnova, “Conceptual knowledge in the interpretation of idioms”, Journal of Language and Literature, vol.
6, № 1, pp. 240-243, 2015.
17. Kord, H., Noushiravani, Y., Bahadori, M. D., & Jahantigh, M. Review and Analysis of Telework Perspective in the Administrative
Systems. Dutch Journal of Finance and Management, 1(2), 44. (2017)https://doi.org/10.29333/djfm/5820
18. Araújo, C., Henriques, P. R., & Martini, R. G. Virtual Learning Spaces Creation Based on the Systematic Population of an Ontology.
Journal of Information Systems Engineering & Management, 3(1), 07. (2018).
19. Godino, J. D., Rivas, H., Burgos, M., & Wilhelmi, M. R. Analysis of Didactical Trajectories in Teaching and Learning Mathematics:
Overcoming Extreme Objectivist and Constructivist Positions. International Electronic Journal of Mathematics Education, 14(1),
147-161. (2019). https://doi.org/10.12973/iejme/3983Nurgaliyeva, S., Zeynolla, S., Tulenova, U., Zulkarnayeva, Z., & Yespolova, G.
Features of institutional autonomy of the Kazakhstan’s universities. Opción, 34(85-2), 302-336. (2018).

Authors: Azaliya R. Gizatullina, Milena I. Gumerova, Gulnara F. Lutfullina, Irina V. Vashunina

Paper Title: Integrative and Disintegrative Ideologemes in Russian Media-Political Discourse


Abstract: The semantic field of political discourse is based on the opposition of «ours – theirs» which
content varies depending on the state system and the power regime. Post-perestroika discourse has undergone
fundamental transformations associated with the breakdown of previous semantic links and the subsequent building
of new ones.
The study is devoted to understanding the ideological system of the post-perestroika period. Within the media-
political discourse (on the material of collecting samples from daily newspaper «Izvestia», 1992) the
interrelationship of two thematic groups of ideologemes is analyzed: integrative ideologemes and disintegrative
ideologemes. The descriptive method, methods of linguo-cognitive and linguo-ideological analysis, as well as
quantitative methods are used in this article.
We characterized the system of integrative and disintegrative ideologemes that were developed in the early post-
perestroika period. Ideologemes are described in accordance with Russian linguist O.S.Issers’s classification. The
significance of integrative and disintegrative ideologemes in the early post-perestroika discourse is universal and
relevant to each world ideological picture in order to distinguish internal and external state images of «ours –
theirs».

Keyword : ideologeme, thematic groups, integrative ideologemes, disintegrative ideologemes, opposition


«ours – theirs», post-perestroika, media-political discourse.

889. References:
1. Izvestia [Izvestia]. 1992. Ianvar' – dekabr'. No.1 – 281. (In Russian)
2. Harkova, E.V., Shigapova, F.F. (2014). Functional features of metaphoric and metonymic euphemisms in media discourse. European 5097-
Journal of Science and Theology. Vol.10. No.6, pp. 105-113. 5100
3. Muhametzyanova, L.R., Mardieva, L.A. (2017). The Polyfunctuanality in The Names Of Newspapers And Magazines. Revista San
Gregorio, Spec. Edit., pp. 148-153.
4. Sheigal, E.I. (2000). [Semiotics of Political Discourse]: dis. … d-ra filol. nauk. 431 p. Moscow. (In Russian)
5. Yapparova, V.N., Ageeva, Ju.V., Agmanova, A.Y. (2018). Pre-Election Discourse as a Special Type of Institutional Discourse.
HELIX. Vol. 8, Is.1, pp.2324-2327.
6. Budaev, E.V., Chudinov, A.P. (2009). [Linguistic Sovietology]. 291 p. Ekaterinburg. (In Russian)
7. Dunn, J. (1995). The transformation of Russian from a language of the Soviet type to a language of the Western type.In J. Dunn (ed.),
Language and Society in Post-Communist Europe.Selected Papers from the 5th World Congress of Central and Eastern European
Studies.Warsaw, pp. 3–22.
8. Koteyko, N. (2014). Language and Politics in Post-Soviet Russia: A Corpus Assisted Approach. London: Palgrave Macmillan, XI,
191 p.
9. Erol, N. (1993). Ideology as political discourse: a case study of print media discourses on Glasnost and Perestroika. East La nsing:
Michigan State University.
10. Klushina, N.I. (1996). [Speech Means Mythologization in Modern Newspaper Language]. Russkaya rech'. No.5. Moscow, pp. 36 -42.
(In Russian)
11. Malysheva, E.G. (2009). [Ideolodeme as a Cultural Phenomenon: Definition and Classification]. Politicheskaya lingvistika. No.4
(30), pp. 32–40. (In Russian)
12. Robinson, N. (1995). Ideology and the collapse of the Soviet system. A critical history of Soviet ideological discourse. Alde rshot:
Edward Elgar, X, 227 p.
13. Shevchenko, A.R., Nasrutdinova, L.H., Dubrovskaja, S.A. (2017). Mythologization of the soviet reality and istorization of «the
soviet myth» in the russian prose of the end of the XX century. Journal of history culture and art research, pp. 174-176.
14. Issers, O.S. (2008). [Communicative Strategies and Tactics of Russian Speech]. 288 p. Moscow. (In Russian)
15. Tsuladze, A.M. (2003). [Political Mythology]. 384 p. Moscow. (In Russian)
16. Baranov, A.N. (1990). [Linguistic Argumentation Theory (Cognitive Approach)]. Avtoref. dis. … d-ra filol. nauk. Moscow. (In
Russian)
17. Mardani, M., & Fallah, R. Comparison of Financial Leverage Ratio before and after the Use of Off-Balance Sheet Financing in Firms
Listed in the Tehran Stock Exchange. Dutch Journal of Finance and Management, 2(2), (2018).53.
https://doi.org/10.29333/djfm/5829
18. Martínez-Alcalá, C. I., Ramírez-Salvador, J. A., Rosales-Lagarde, A., & Jiménez-Rodríguez, B. Assistance and Support of Primary
Caregivers through an eService Platform. Journal of Information Systems Engineering & Management, 3(1), (2018). 09.
19. Kor, L., Teoh, S., Binti Mohamed, S. S. E., & Singh, P. Learning to Make Sense of Fractions: Some Insights from the Malaysian
Primary 4 Pupils. International Electronic Journal of Mathematics Education, 14(1), (2019). 169-182.
https://doi.org/10.29333/iejme/3985
20. Nuriyev, M., Sovetkanova, D., & Seysenbayeva, Z. Achievements and new challenges in the area of education of independent
Kazakhstan. Opción, 34(85-2), (2018). 337-352.

Authors: Nailya I. Gololobova, Elena F. Arsenteva, Elena Zelenická

Paper Title: Author’s Transformations and Their Translation In “The Plumed Serpent” By D.H. Lawrence
Abstract: The article is devoted to the analysis of phraseological units (hereinafter referred to as PU) with
author’s transformation found in “The Plumed Serpent” by D.H. Lawrence, the peculiarities of their translation into
Russian are also considered. Phraseological units with the author’s transformations are analyzed in accordance with
the classification of the latter developed by leading linguists from the Kazan Linguistic School. Each type of the
author’s transformation of PU was illustrated by numerous examples from the given piece of literature in the
original language, as well as in the language of translation. Each case of translation was classified as for the used
translation techniques, preservation of the author’s transformation of PU and retaining the original figurativeness of
the statements; English-Russian versions of PU were compared thoroughly. The result of such an analysis enabled
us to estimate the quality of Russian translation of “The Plumed Serpent” by D.H.Lawrence, done by an official
translator Valeriy Minushin.

Keyword : phraseology, phraseological unit, author’s transformations, classification, translation .


References:
1. Lawrence, D.H. “The Plumed Serpent”/D.H.Lawrence. – M.:T8RUGRAM / Original, 2018. – 564 c.
2. Lawrence, D.H., “Collected Works in 7 Volumes / David Herbert Lawrence”. – Moscow: Vagrius, 2007. Volume 6: The Plumed
Serpent. Translated by Valery Minushin; comments by N.Paltzev and V.Minushin – 512 p.
3. Davletbaeva, D., Sadykova, A., Smirnova E. “The aspects of Modern Phraseology modeling”, World Applied Sciences Journal
(Education, Law, Economics, Language and Communication). – 2013. – № 27. – Pp.58-62.
4. Varlamova, Elena V.; Rakhimova, Alina E.; Shingareva, Anna S. “Representation of phraseological units with a zoonym component
in the German and English linguistic views of the world”, REVISTA PUBLICANDO. – 2017. – V. 4, Is. 13. – Pp. 477-486.
5. Kayumova, Albina R., Safina, Rimma A., Shestakova, Natalia V., “A case study of Russian students translating idioms from German
Horoscopes” AD ALTA-Journal of Interdisciplinary Research. – 2017. – Vol.7, Is.2. – Pp.43-46.
6. Safiullina, G., Aveeva, G. “The Role of On-line Laboratory in the Development of Lexicographic and Translational Skills”, The
European Proceedings of Social & Behavioural Sciences EpSBS. – IFTE 2016: 2nd International Forum on Teacher Education. –
890. 2016. – Vol. XII. – P.180-184.
7. Yerbulatova I. K., Gilazetdinova G. Kh., Zamaletdinova G. F., Azhgaliev, M.K. Pragmatic aspects of artistic pros reality translation 5101-
from Kazakh language to Russian. AD ALTA - Journal of interdisciplinary research. – 2017. – Vol.7, Is.2. – Pp.84-86. 5104
8. Arsentieva E.F. “Contextual usage of the phraseological units of Russian and English Language” / E.F.Arsentieva // Contextual
usage of the phraseological units / under the editorship of E.F.Arsentieva. – Kazan, 2009. – pages 11–28.
9. Fernando C. “Idioms and Idiomaticity” /C.Fernando. – Oxford: Oxford University Press, 1996. – 168p.
10. Gibbs R.W. “How to Kick the Bucket and not Decompose : Analyzability and Idiom Processing” /R.W.Gibbs, N.P.Nayak, C.Cutting
// Journal of Memory and Language, 1989, 28. – P. 576-593.
11. Cacciari C. “The Comprehension of Idioms” /C.Cacciari, P.Tabossi //Journal of Memory and Language, 1998, 27. – P. 668-683.
12. Naciscione A. “Phraseological Units in Discourse: towards Applied Stylistics” /A.Naciscione. – Riga: Latvian Academy of Culture,
2001. – 283p.
13. Naciscione A. “Stylistic Use of Phraseological Units in Discourse” /A.Naciscione. – Amsterdam/Philadelphia: John Benjamins
Publishing Company, 2010. – 292p.
14. Abdullina A.R. “Contextual Transformation of Phraseological Units in Russian and English”: PhD thesis in philology
/A.R.Abdullina. – Kazan, 2007. – 167p.
15. Kunin A.V. “Insertion as a linguistic phenomenon” /A.V.Kunin // Foreign Languages in School. – 1973. – No. 2. – pages 13-22.
16. Naciscione A. “On definition of insertion and abruption as a separate methods of occasional usage of phraseological units in speech”
/A.Naciscione //Contextual Semantics: collection of research papers. – Riga, 1982. – pages 86-91.
17. Mokienko V.M. “Slavic Phraseology” /V.M.Mokienko. – Moscow: Vyshaya Shkola, 1980. – 320p.
18. Mendelson V.A. “Phraseological units of Biblical Origin in English and Russian” /V.A.Mendelson. – Kazan: ZAO “Novoe Znanie”,
2009. – 156p.
19. Zinatullina L.M. “Non-equivalent Adverbial Phraseological units in English and Russian”, Philological Sciences. Theoretical and
Practical Issues. - 2016. – No. 5(59): in 3 volumes. Volume 1. - pages 82-85.
20. Pakdel, M., & Talebbeydokhti, A. The Effect of Adjustment Announcement of Predicted Profit on Price and Trading Volume of
Listed Companies in Tehran Stock Exchange. Dutch Journal of Finance and Management, 2(1), (2018). 49.
https://doi.org/10.29333/djfm/5825
21. Martins, V. F., Sampaio, P. N. M., Cordeiro, A. J. A., & Viana, B. F. Implementing a Data Network Infrastructure Course using a
Problem-based Learning Methodology. Journal of Information Systems Engineering & Management, 3(2), (2018). 10.
22. Koskenoja, M. Factors Supporting and Preventing Master Thesis Progress in Mathematics and Statistics – Connections to Topic and
Supervisor Selection. International Electronic Journal of Mathematics Education, 14(1), (2019). 183-195.
https://doi.org/10.29333/iejme/3986
23. Saurykova, Z. M., Ybyraimzhanov, K., & Mailybaeva, G. Implementation of interdisciplinary relationships in education on the basis
of science integration. Opción, 34(85-2), (2018). 353-385.

Authors: Gulshat R. Safiullina, Nuriya R. Davitova, Eva Lelakova

891. Paper Title: Sketch Engine in Building a Lexical Minimum for Children
Abstract: Our article deals with such an aspect of computational linguistics as the construction of lexical 5105-
minima cases using the Sketch Engine program as an example. The advent of computational linguistics has played 5108
an important role in the process of learning foreign languages. Thanks to computer technology, the process of
learning foreign languages is greatly simplified and becomes more accessible. Among the many programs for
learning foreign languages, we chose the Sketch Engine program, since it is a case manager and a tool for analyzing
linguistic buildings, that is, collections of texts selected and processed according to certain rules, which are used as
the basis for language research. This resource is software that combines a specialized search engine and a lot of
buildings in different languages. We describe the program through the prism of corpus linguistics, consider the
functions and capabilities of this program Sketch Engine in drawing up the lexical minimum for primary school age
in English, Russian and German. In this paper, we conducted an experiment on drawing up a lexical minimum for
schoolchildren, which consisted in selecting 300 most used words of the English language and saturating them with
examples from the cases of the Sketch Engine program.

Keyword : lexical, minimum, dictionary, children, Sketch Engine, corpus.


References:
1. Shemakin Yu. I. the Beginning of computer linguistics Moscow: Publishing house of Moscow state University, A/O "Rosvuznauka", 1992.
– 181 p.
2. Anisimov A. Computational linguistics for all: Myths. Algorithms. Language. - Kiev: Naukovadumka, 1991. - 208 p.
3. Belonogov G. G., Kalinin Yu. P., Khoroshilov A. A. Computer linguistics and perspective information technologies. Moscow: Russian
world, 2004. - 240 p.
4. Site Sketch Engine [Electronic resource]. - Mode of access: https://www.sketchengine.co.uk free (date accessed: 10.01.2018)
5. Kilgarriff A., Rychly P., Baisa V. Extrinsic Corpus Evaluation with a Collocation Dictionary Task [Electronic resource]. - Режим
доступа: http://www.lrec-conf.org/proceedings/lrec2014/pdf/52_Paper.pdf, свободный (date accessed: 25.05.2019)
6. Kirpichnikova A. scientists of KFU will cooperate with developers of the Sketch Engine program [Electronic resource]. - Mode of access:
https://kpfu.ru/philology-culture/struktura-instituta/otdelenie..., free (date accessed: 20.02.2018)
7. Apresyan Y. D. Selected works, vol. The integrated description of language and systemic lexicography. - Moscow: School "Languages of
Russian culture", 2005. - 379 p.
8. Apresjan V., Baiza V. RuSkELL: Online Language Learning Tool for Russian Language [Electronic resource]. - Mode of access:
http://euralex.org/wp-content/themes/euralex/proceedings/Euralex%202016/euralex_2016_030_p292.pdf free (date accessed: 05.05.2019)
9. Apresjan V. Dictionary as an Instrument of Linguistic Research [Electronic resource]. - URL: http://euralex.org/wp-content/
themes/euralex/ proceedings/Euralex%202016/ euralex_2016_020_p224.pdf, (date accessed: 14.05.2018)
10. Baiza V. Multilingual CPA: Linking Verb Patterns across Languages [Electronic resource]. - URL: http://euralex.org/wp-content/
themes/euralex/proceedings/Euralex%202016/euralex_2016_044_p410.pdf, (date accessed: 18.05.2019)
11. Kilgarriff A., Rychly P., Baisa V. Extrinsic Corpus Evaluation with a Collocation Dictionary Task [Electronic resource]. - URL:
http://www.lrec-conf.org/proceedings/lrec2014/pdf/52_Paper.pdf, (date accessed: 21.05.2019)
12. Theo J.D. Bothma, Rufus H. Gouws, Danie J. Prinsloo The Role of E-lexicography in the Confirmation of Lexicography as an
Independent and Multidisciplinary Field [Electronic resource]. - URL: http://euralex.org/wp-content/themes/euralex/proceedings/
Euralex%202016/ euralex_2016_008_p109.pdf, (date accessed: 26.05.2019)
13. Varlamova, E.V., Naciscione, A., Tulusina, E.A. (2016) A study on the phenomenon of collocations: Methodology of teaching English and
German collocations to Russian students // International Journal of Environmental and Science Education. 11(6), ijese.2016.11 6, pp. 1275-
1284.
14. Noskova A.I. Development of lexical competence in learning Spanish as a foreign language // EDULEARN17, the 9th annual International
Conference on Education and New Learning Technologies, July 3rd-5th, 2017. – Barcelona, Spain, 2017. – Pp: 331-335.
15. Tarasova F.K, Tarasov A.M., The phraseosemantic group of «family relations« in the system of proverbs and sayings with «food«
component in languages with different structures//Analele Universitatii din Craiova - Seria Stiinte Filologice, Lingvistica. - 2018. - Vol.40,
Is.1-2. - P.191-201.
16. Garipova Elza V, Sadykova Aida G., Tarasova Fanuza Kh, Functional Aspect Of Linguistic Identity In Russian Blogosphere//MODERN
JOURNAL OF LANGUAGE TEACHING METHODS. - 2018. - Vol.8, Is.10. - P.378-383
17. Sazesh, A., & Siadat, S. A. The Relationship between Quantum Management and Organizational Agility in Ministry of Roads and Urban
Development of Golestan Province, Iran. Dutch Journal of Finance and Management, (2018). 2(2), 51. https://doi.org/10.29333/djfm/5827
18. Piteira, M., Costa, C. J., & Aparicio, M. Computer Programming Learning: How to Apply Gamification on Online Courses?. Journa l of
Information Systems Engineering & Management, (2018). 3(2), 11.
19. Sulistyaningsih, D., Purnomo, & Aziz, A. Development of Learning Design for Mathematics Manipulatives Learning based on E-learning
and Character Building. International Electronic Journal of Mathematics Education, (2019).14(1), 197-205.
https://doi.org/10.29333/iejme/3996
20. Kozhabergenova, G. E., Taubaeva, S., Bulatbayeva, A. A., Kabakova, M. P., & Asanov, N. A. The Stewardship of School Counselor
Education in Higher Educational Establishments. Opción, (2018). 34(85-2), 386-414.

Authors: Andrew V. Danilov, Leila L. Salekhova, Nigina B. Tursunova, Nnamdi Anyameluhor

Paper Title: Digitalisation Trends and Blended Learning Visualisation in Modern Digital Education
Abstract: The article under review actualizes the problem of using digital computer technologies in the process
of blended learning. The notion of «blended learning» is determined and specified according various sources.
Various models and ways of organizing this kind of work as an alternative to the standard form of learning are
presented. The article presents the positive experience of using blended learning technology. Attention is paid to
visualization as one of teaching tool to create educational materials for blended learning. Synthesis of verbal
(especially word) and visual elements (pictures, graphic notes, animations, films, plots and diagrams, etc.) within
892. the limits of one text’s space is an instrument of optimization of the process of semantic perception and
understanding text information. All benefits of this modern technology allows to establish a holistic adoption of this 5109-
model by students and the positive direction for the development of blended learning as an innovative teaching 5111
technology.

Keyword : visualization, blended learning, e-learning, digital education.


References:
1. M. Oliver, “Trigwell K. Can 'Blended Learning' Be Redeemed?”, E-Learning. vol. 2 (1), 2005, pp.17–26.
2. J. Bersin. "How Did We Get Here? The History of Blended Learning" , The Blended Learning Book: Best Practices, Proven
Methodologies, and Lessons Learned”. Wiley: 2004.
3. C. Bonk, C. Graham. “The Handbook of Blended Learning: Global Perspectives, Local Designs”. John Wiley & Sons, Inc. Pfeiffer:2006,
P. 624
4. “6 Models of Blended Learning”. URL: http://www.dreambox.com/blog/6-models-blended-learning
5. I. Allen, J. Seaman, R. Garrett. “Blending In: The Extent and Promise of Blended Education in the United States”: Sloan-C, 2007, P. 35.
6. R. Skemp. “Relational Understanding and Instrumental Understanding. Mathematics Teaching in the Middle School”. vol. 122, 200 6, pp.
8895-8901.
7. Электронный образовательный ресурс“Web-developing”. URL: https://do.kpfu.ru/course/view.php?id=3499
8. N. Batrova, M. Lukoyanova, L. Salekhova, G. Çavuşoğlu. “Booktrailer como medio de formar la competencia discursiva de los
estudiantes” Revista Científica Electrónica de Ciencias Humanas / Scientific e-journal of Human Sciences:Fundación Unamuno, vol. 14,
2018, pp. 223-231
9. Syunina, A. S., Yarmakeev, I. E., Shechter, D. A., Pimenova, T. S. & Abdrafikova, A. R. Text relevance as a valid criterion f or selecting
reading materials for forming reading skills in EFL class // Modern Journal of Language Teaching Methods, 2017. –p.166
10. I. Salpykova, R. Akhmadullina, N. Valiakhmetova PREPARATION OF THE FUTURE TEACHERS FOR IN CHILDREN'S HEALTH
CAMPS /EDULEARN18, the 10th annual International Conference on Education and New Learning Technologies will be held in Palma
de Mallorca (Spain) , 2018 Pages: 2329-2336
11. Solnyshkina, M.I., Zamaletdinov, R.R., Gorodetskaya, L.A., Gabitov, A.I. Evaluating text complexity and Flesch -Kincaid grade level.
Journal of Social Studies Education Research 8(3), с. 238-248
12. Selomo, M. R., & Govender, K. K. Procurement and Supply Chain Management in Government Institutions: A Case Study of Select
Departments in the Limpopo Province, South Africa. (2016).
13. Marques, B. P., Villate, J. E., & Carvalho, C. V. Student Activity Analytics in an e-Learning Platfom: Anticipating Potential Failing
Students. Journal of Information Systems Engineering & Management, 3(2), (2018). 12.
14. Mazana, M. Y., Montero, C. S., & Casmir, R. O. Investigating Students’ Attitude towards Learning Mathematics. International Electronic
Journal of Mathematics Education, 14(1), (2019). 207-231. https://doi.org/10.29333/iejme/3997
15. Bakhyt, S., Kalimbetov, B., & Khabibullayev, Z. Possibilities of mathematical problems in logical thinking. Development of secondary
education pupils. Opción, 34(85-2), (2018). 441-457.
Irina N. Fardeeva, Indira A. Shakirova, Elena N. Maltseva, Valentina I. Kuzmenko, Sergey Kh.
Authors:
Peteraitis
Paper Title: Remote Individual Training
Abstract: Modern information technology has firmly entered our lives, which has affected the learning process in higher
education. Individual distance learning has been reflected in the development of new teaching methods for people with
disabilities, however, more recently, more attention has been paid to the issue of introducing distance learning and for people
who, due to circumstances (remote access), cannot be in an educational institution.
Individual distance learning is currently a promising form of education for high-quality higher education, since one of the
tasks of modern education is unlimited access to high-quality educational resources regardless of gender, race, social status,
place of residence, etc. This type of training can be described as a process of providing access to classical modern education,
when the source of information and the students themselves are separated in time and space.
The theoretical and methodological basis of this article is based on work in the field of computer science and pedagogy,
which explores various processes, methods and means of using computer technology for distance learning in universities.
This article is devoted to the issue of consideration of technologies used for independent activities in the framework of distance
individual learning. The authors conducted a study of the results of distance individual learning. It was found that interactive
lectures, video conferencing, audiovisual tools, interactive seminars, glossaries, interactive tests are considered the most
effective technologies for independent work of students. The results made it possible to emphasize the effect of the developm ent
of distance learning technologies.

Keyword : distance individual learning; lifelong education, learning process, electronic resource, information
systems.
893.
References:
1. Blokhovtsova G.G., Malikova T.L., Simonenko A.A. New science: Strategies and development vectors. 2016. No. 118 -3. P. 89-92.
5112-
2. Ilyin Aleksandr, Ibatova Aygul Orientation of the modern educational process on the concept of truth // National academy of 5114
managerial staff of culture and arts herald. – 2017 .-- Vol., Is. 2. - P.184-187.
3. Pashkina A. G. Distance learning as a means of individual work of a teacher with a student // Pedagogical education in Altai. 2014.
No. 1. P. 201-203.
4. Spiros, R. K. (2003). Individual differences in motivation during distance training: The influence of goal orientation and self-efficacy
on learning outcomes (Doctoral dissertation, ProQuest Information & Learning).
5. Ibatova A.Z., Ilyin A.G. The study of the effectiveness of MOOCs in the modern educational space // Azimuth of scientific research:
pedagogy and psychology. 2019.Vol. 8. No. 1 (26). P. 126-127.
6. Tarr, M. (1998). Distance learning-bringing out the best in training. IndustrialandCommercialTraining, 30 (3), 104-106.
7. Berge, Z. L., Muilenburg, L. Y., & Haneghan, J. V. (2002). Barriers to distance education and training: Survey results. The Quarterly
Review of Distance Education, 3 (4), 409-418.
8. Semenova I.N., Markelova E.S. Fundamentals of modeling individual educational trajectories of students with disabilities in distance
learning // Pedagogical education in Russia. 2016. No. 7. P. 77-81.
9. Keegan, D. (2003). Distance training: Taking stock at a time of change. Routledge
10. Smirnova N. A. Learning management systems in distance education // Proceedings of the SIC Sociosphere conference. 2014. No.
25. P. 129-131
11. Suleri, J., & Cavagnaro, E. Promoting pro-environmental printing behavior: The role of ICT barriers and sustainable values.
International Journal of Education and Development using ICT, (2016). 12(2).
12. Kvet, M., & Matiasko, K. Temporal Data Performance Optimization using Preprocessing Layer. Journal of Information Systems
Engineering & Management, (2018). 3(2), 13.
13. Abdul Rahman, S. Example Construction as a Devise to Reveal Awareness of Calculus Integration. International Electronic Journal
of Mathematics Education, 14(1), (2019).233-241. https://doi.org/10.29333/iejme/3999
14. Abayeva, G. Modern teacher role for increasing the students’ competence in pedagogical specialty. Opción, 34(85 -2), (2018). 415-
440.

Authors: Gulyusa R. Zamaletdinova, Natalia V. Konopleva, Natalia V. Gorbunova


894. Electronic Educational Resources As Means of Formation of the Foreign-Language Professionally
Paper Title:
Focused Competence of Future Philologists
Abstract: In the current conditions of society development, the most in demand are the educational level of
employees, their professionalism, learning ability, creativity, and high intelligence. This has led to a trend of
increasing requirements for graduates of higher education institutions. Taking into account that recent years have
been marked by international integration, the quality of training of future philologists should ensure correspondence
of all training aspects to the requirements of the applicable standard of education, an adequate level of foreign
language command to the extent necessary for the free general and professional communication, the ability to
freely navigate in the information field of foreign sources.
This study reveals new perspectives and opportunities for the use of electronic educational resources (EER) in
education, which allow the use of such effective tools as interactive means, multimedia, communication and
productivity.
In the process of training, opportunities arise to take advantage of information technologies, including electronic
educational resources: electronic textbooks, multimedia, sites, portals, UDACITY and Udemy platforms; Web-2.0
services, new smart technologies, wiki technologies, podcasts, and webinars.

Keyword : electronic educational resources, foreign language professional competence, future philologists.
References:
1. Galiya M. Gatiyatullina, Aleksander S. Kiselnikov, Fanuza Kh. Tarasova, Dilyana D. Sungatullina, Elzara V. Gafiyatova Text Co mplexity
Modification By Means Of It-Technologies//Modern Journal of Language Teaching Methods. Vol. 8, Issue 10, October 2018- pp. 396-401.
(WoS)
2. Liliya R. Mukharlyamova, Alsu Kh. Ashrapova, Svetlana Alendeeva Borrowed words in language teaching (on the economic term sys tem
of the Russian language in the XXI century) // Journal of Language and Literature, ISSN: 2078-0303, Vol. 7. No. 2. May, 2016 P.163-168.
3. Erofeeva Anna A., Yusupova Zulfiya F., Actual problems of teaching russian language as the language of the specialty of foreign students
// Revista Publicando. – 2018. – Vol.5, Is. 16. – P. 324-331.
4. Kuzmina E.K, Nazarova G.I, Nizamieva L.R, Innovative technologies of teaching business French//International Journal of Engin eering
and Technology(UAE). – 2018. – Vol.7, Is.4. – P.85-87.
5. Badarch, D., Tokareva N.G., Tsvetkova M.S. Mass open online course: reconstruction of higher education [Electronic resource] / D.
Badarch // Higher education in Russia. - 2014. - No. 10. - URL: https://cyberleninka.ru/article/n/mook-rekonstruktsiya-vysshego-
obrazovaniya (accessed: 01.03.2018).
5115-
6. Kolesova, T.V. Organization of the environment for independent study of English by means of information and computer technolo gies in a 5118
university / T.V. Kolesova // Education and self-development. - Kazan: Centre for Innovative Technologies, 2013. - No. 2 (36). - S. 18-24.
7. Krivitsky, B.Kh. About systematization of educational computer means / B.Kh. Krivitsky // Educational Technology & Society. - – 2000. -
Volume 3 (3) - 548-556 pp.
8. Canale, M. On some dimensions of language skill / M. Canale, J.V. Oller (editor) // Proceedings of the study of language testing. - Rowley,
Mass.: Ed.Newbury House, 1983. - Pp. 332-342.
9. Dragunova, A.A. Educational Internet resources as a means of forming professional foreign language communicative competence of
students / A.A. Dragunova // Yaroslavl Pedagogical Bulletin. - 2011. - No. 1. - Pp. 163-167.
10. Palkova, A.V. Application of Web 2.0 services in teaching foreign languages / A.V. Palkova // Teaching foreign language s in
multimedia space: a collection of scientific articles - Tver: Tver State University, 2012. – Pp. 69-85.
11. Kayumova G.F, Makarova V.F, Galiullin R.R, Moral education of high school students in national (TurkiC) schools through liter ature //
International Journal of Mechanical Engineering and Technology. – 2018. – Vol. 9, Is. 10. – P.1467-1475.
12. Aleksandra E. Massalova, Julia V. Rzhanikova, Elena V. Dziuba. Formation of Motivation for Studying Russian as a Foreign Language
in Cadets of a Military Engineering University Through Audiovisual Visibility // Astra Salvensis – review of history and culture, year
VI, Supplement no. 1, 2018.
13. Marianthi Karatsiori, Kris Gritter. European profile for language teacher education: Meeting the challenge for sharing common
competences, knowledge, strategies and values // Journal Cogent Education. Volume 3, 2016. – Issue 1. – Р. 1-29.
14. Deniz Yalçınkaya. Why is Blended Learning for Vocationally Oriented Language Teaching? // Procedia – Social and Behavioral
Sciences 174:1061-1068. February 2015 with 52 Reads. DOI: 10.1016/j.sbspro.2015.01.795.
15. Mark Warschauer. Computer Assisted Language Learning: an Introduction (1996) «Computer Assisted Language Learning: an
Introduction». In Fotos S. (ed.) Multimedia language teaching, Tokyo: Logos International: 3-20.
16. Mishina Nadezda, Javgildina Zilia, Mishina Anastasia, Design Practice as a Method of Professional Orientation of Teenagers in the
System of Supplementary Education // Tarih Kultur Ve Sanat Arastirmalari Dergisi-Journal of History Culture and Art Research. – 2018.
– Vol.7, Is.4. – P. 132-137.
17. Luo, C., Li, M., Peng, P., & Fan, S. How Does Internet Finance Influence the Interest Rate? Evidence from Chinese Financial Markets.
Dutch Journal of Finance and Management, 2(1), (2018). 01.
18. Torquato, M., Araujo, J., Umesh, I. M., & Maciel, P. SWARE: A Methodology for Software Aging and Rejuvenation Experiments.
Journal of Information Systems Engineering & Management, 3(2), (2018). 15.
19. Marbán, J. M., & Mulenga, E. M. Pre-service Primary Teachers’ Teaching Styles and Attitudes towards the Use of Technology in
Mathematics Classrooms. International Electronic Journal of Mathematics Education, 14(2), (2019). 253-263.
https://doi.org/10.29333/iejme/5649
20. Feizuldayeva, S., Ybyraimzhanov, K., Mailybaeva, G., Ishanov, P., Beisenbaeva, A., & Feizuldayeva, S. Vocational training of f uture
elementary school teacher by means of realization of inter-subject continuity. Opción, 34(85-2), (2018). 479-516

Authors: Lyajsan H. Kadyjrova, Elmira G. Akhmetshina, Liliya R. Zaripova, Igor A. Peremislov


Professional Development of Bachelor Designers by Means of Information and Communication
Paper Title:
Technologies
Abstract: A developed information community assumes a broad and active use of information and
communication technologies (ICT) in the education system, which is due to a number of factors that accompany the
process of social development. One of the first to highlight is the introduction of information and communication
895. technologies in education in order to accelerate the transfer of knowledge and experience accumulated by mankind
from generation to generation, and from person to person. The second factor to be called is the possibility of 5119-
improving the quality of education in the process of mastering information and communication technologies, which 5122
allows a person to more successfully adapt to what is happening around, i.e. to social changes. The third factor is
the active and fairly effective implementation of information and communication technologies in the education
system, which is a guarantee of updating the education system in accordance with the needs of modern society.
This paper discusses the use of information and communication technologies in the preparation of future bachelors-
designers as one of the organizational forms of innovative type teaching at a university, based on modern
achievements of the psychological and pedagogical sciences, educational materials of a new generation and
widespread use of electronic educational resources. The variety of diverse actions performed by a designer requires
their systematization by means of information and communication technologies and bringing them into line with
the competencies mastered in the learning process. Through the introduction of computer technologies in the design
education system and mastering ArchiCad and Artlantis Render programs by a student going improvement of
his/her professional skills as future experts in the field of design, and accordingly, increasing their competitiveness
in the labour market. At the same time, the process of forming the creative activity of future designers requires, first
of all, the development of their spatial and design thinking; therefore, when teaching a teacher, it is necessary to
make the process of mastering information and communication technologies proportionate to the process of
developing student's intellectual characteristics.

Keyword : information and communication technologies, bachelor-designer, graphic design, art and design
competence.
References:
1. Galeeva Zukhra N., Yao Michail K., Emanova Juliana G. Project thinking as the basis of professional competence of the designer //
Amazonia Investiga. - 2018.- Vol. 7, Is.15. - P.133-138
2. Klara K. Karamova, Irina M. Mayorova, Gulnaz H. Myhtarova, Rezeda.A Fakhrutdinova, Adnan M. Hakki. Development of creative
activity of students-designers method of metaphorical associative cards (MAC)" "Amazonia oS"
http://www.udla.edu.co/revistas/index.php/amazonia-investiga/article/view/947 p.279-286
3. Grigoriev, S.G. Possibilities of using information and communication technologies in open education [Electronic resource] / S.G.
Grigoriev, V.V. Grinshkun URL.: http://www.ido.rudn.ru/Open/ikt/3.htm (accessed date: 8.01.2013)
4. Makarova T.V. The structure and content of information and communication technologies, the competence of engineers of the
specialty "Information technology in design" / T.V. Makarova // Omsk Scientific Herald. - 2007. - No. 2 (56). - P. 175-178
5. Koroleva L.Y., Khayrullina E.R. The role of information technology in the development of creativity of a future designer //
Fundamental Research. - 2014. - No. 9. - P. 658-662
6. Fomin, A.P. Pedagogical consciousness in the conditions of virtualization of social reality // A.P. Fomin. Abstract of a thesis for the
degree of the Doctor of Philosophy. 2009. –38 p.
7. Brown, A. Technology-enhanced learning: strengthening links with practitioners / A. Brown, J. Bimrose // Book of abstracts 12-th
International conference on technology supported learning and training. Berlin, 2006. - P.36
8. E-Learning: Erfolgsfaktoren und Einsatzkonzepte mit interaktiven Medien / ed.U. Dittler.Muenchen; Wien: Oldenbourg Verl., 2002.
- P. 318
9. Kayumova G.F., Makarova V.F., Galiullin R.R and Khaziev R.I., Yuldybaeva G.V. and Abdrafikova G.Kh. Moral education of high
school students in national (Turkic) schools through literature. - International Journal of Mechanical Engineering and Technology
(IJMET) Volume 9, Issue 10, October 2018, pp. 1467–1475
10. Janet Hanson Displaced but not replaced: the impact of e-learning on academic identities in higher education / Janet Hanson //
Teaching in Higher Education.-2009. Vol. 14, № 5. – P.553-564
11. Mohr, A. T. Learning style preferences and the perceived usefulness of e-learning / A. T. Mohr, D. Holtbriigge, N. Berg. // Teaching
in Higher Education. 2012. - Vol. 17, № 3. – P.309-322
12. Ameen, A. M., Ahmed, M. F., & Hafez, M. A. A. The Impact of Management Accounting and How It Can Be Implemented into the
Organizational Culture. Dutch Journal of Finance and Management, 2(1), (2018).02.
13. Carreto, C., Gêgo, D., & Figueiredo, L. An Eye-gaze Tracking System for Teleoperation of a Mobile Robot. Journal of Information
Systems Engineering & Management, 3(2), (2018). 16.
14. Peranginangin, S. A., Saragih, S., & Siagian, P. Development of Learning Materials through PBL with Karo Culture Context to
Improve Students’ Problem Solving Ability and Self-Efficacy. International Electronic Journal of Mathematics Education, 14(2),
(2019). 265-274. https://doi.org/10.29333/iejme/5713
15. Kondubaeva, M. R., Bekalay, N. K., Aubakirova, A. K., Ongarbaeva, A. T., & Tolkinbayev, A. K. The problem of correctness and
reliability of the study in trilingual education. Opción, 34(85-2), (2018). 517-543.

Authors: Farida Ishkineeva, Karina Ozerova, Simbul Ahmetova, Adelia Kaveeva

Paper Title: Students Healthy Lifestyle and the Strategy of Adaptation to the University Environment
Abstract: The article substantiates the sociological approach to health-saving behavior as the most promising
direction of strengthening students' health. Despite the wide possibilities of motivation for the health-saving
behavior of students, the problems of its formation, which are due to both social and cultural characteristics,
currently remain. The health of students is largely determined by the prevalence of self-preservation practices. The
article discusses the problem of the relationship of students' attitudes regarding a healthy lifestyle and their self-
preservation practices and the impact of the need to adapt to learning at the university. The empirical basis of the
study is the materials of author's research, firstly, mass representative farrowings of students of Kazan Federal
University (Kazan, Russia) (N = 12468 in 2017 and N = 2712 in 2018), and secondly, a series of focus groups (N =
896. 8).
Sports and other physical activity, along with nutrition and sleep, are recognized by most students as important
5123-
factors determining health and beauty. It is significant that it is these factors that are largely determined only by the
5126
efforts of the person himself that the students are aware of. As part of the adaptation period, students usually make
new friends and gain experience in drinking. However, most students successfully cope with a difficult period and
do not acquire bad habits, it is even considered not fashionable. On the contrary, students learn to plan their day
wisely, find time for sports, prepare healthy meals for the whole day, and try to take care of their own
psychological mood, taking responsibility for their own health.

Keyword : students, self-preserving behavior, self-destructive behavior, health-saving behavior, health, healthy
lifestyle, student, youth.
References:
1. S. A. Vangorodskaya, “Self-preserving behavior: the problem of the content of a concept in Russian sociology”, Central Russian
Journal of Social Sciences, 2017, No. 4. URL: https://cyberleninka.ru/article/n/samosohranitelnoe-povedenie-problema-
soderzhaniya-ponyatiya-v-otechestvennoy-sotsiologii
2. O.V. Myltasova, “Specificity of Russian Students”, Materials of the XX International Conference in Memory of prof. L.N. Kogan
“Culture, personality, society in the modern world: methodology, experience of empirical research”, 2017. P. 845-856.
3. S. Yu. Roshchin, V.N. Rudakov, “Combining study and work by students of Russian universities”, Education Issues, 2014. No. 2.
4. URL:https://cyberleninka.ru/article/n/sovmeschenie-ucheby-i-raboty-studentami-rossiyskih-vuzov
5. F.F. Ishkineva, “Everyday Practices of Student Self-Preservation Behavior,” Kazan Social and Humanitarian Bulletin, 2018, No. 6.
P. 34-38.
6. Haase, A. Steptoe, J.F. Sallis, J. Wardle. “Leisure-time physical activity in university students from 23 countries: associations with
health beliefs, risk awareness, and national economic development”, Preventive Medicine, 2004 Jul; 39(1), P.182-90.
7. N. Ibrahim, D. Al-Kharboush, L. El-Khatib, A. Al-Habib, D. Asali. “Prevalence and Predictors of Anxiety and Depression among
Female Medical Students in King Abdulaziz University, Jeddah, Saudi Arabia”, Iranian Journal of Public Health. 2013 Jul 1; 42(7),
P. 726-36.
8. K. Papier, F. Ahmed, P. Lee, J. Wiseman, “Stress and dietary behaviour among first-year university students in Australia: sex
differences”, Nutrition, 2015 Feb; 31(2), P. 324-30.
9. S. Yubero, R. Navarro, E. Larranaga, M. Esteban, J. Gutiérrez, M. Elche, “Health Contributing Factors in Higher Education Students:
The Importance of Family and Friends”, Healthcare (Basel). 2018 Dec; 6(4), P.147.
10. L.J. Friedlander, G. J. Reid, N. Shupak, R. Cribbie, “Social Support, Self-Esteem, and Stress as Predictors of Adjustment to
University among First-Year Undergraduates”, Journal of College Student Development, 2007, vol. 48, №3, P. 259-274.
11. M. Von Bothmer, F. Bengt, “Gender differences in health habits and in motivation for a healthy lifestyle among Swedish University
students”, Nursing & health sciences, 2005, 7, P. 107-118.
12. Muyambiri, B., & Chabaefe, N. N. The Finance–Growth Nexus in Botswana: A Multivariate Causal Linkage. Dutch Journal of
Finance and Management, 2(2), (2018). 03.
13. Kanashiro, L., Ribeiro, A., Silva, D., Meirelles, P., & Terceiro, A. Predicting Software Flaws with Low Complexity Models based on
Static Analysis Data. Journal of Information Systems Engineering & Management, 3(2), (2018). 17.
14. Kosko, K. W., & Singh, R. Children’s Coordination of Linguistic and Numeric Units in Mathematical Argumentative Writing.
International Electronic Journal of Mathematics Education, 14(2), (2019). 275-291. https://doi.org/10.29333/iejme/5714
15. Mussabekov, G., Auyezov, B., Tasova, A., Sultanbekova, Z., Akhmetova, Z., & Kozhakhmetova, G. Formation of readiness of futur e
teachers to creative activity in school. Opción, 34(85-2), (2018). 569-599.

Authors: Fyodor I. Nikitin, Lenara R. Klimovskaya, Lenaris H. Mingazov


To The Question of the Right of Indigenous Peoples to Self-Determination and Its Interpretation in
Paper Title:
International Law
Abstract: It is well known that the right of indigenous peoples to self-determination today, as well as in the
past, continues to be one of the most complex and difficult to solve issues for both national and international law as
a whole. It certainly arouses great interest in itself and attracts attention from a wide circle of the public, excites the
minds, and at the same time engenders the broadest discussions. Those discussions often provoke an aggravation of
the already not benevolent relationship between indigenous peoples and government officials in their countries of
residence. Along with this, those relationships continue to be defined and considered by most indigenous peoples of
the world as the “foundation” on which their rights rest, as well as their survival and preservation as separate and
independent peoples. Given this circumstance, the team of authors of this paper made an attempt to consider this
controversial issue from a somewhat alternative point of view in relation to traditional concepts of self-
determination of peoples, namely, from the standpoint of human rights and development policy. Thus, the authors
bring a new interpretation to the discussion and study of this issue, which needs to be specified and defined.

897. Keyword : indigenous peoples; human rights, the right of peoples to self-determination; development policy.
References: 5127-
1. Morris G. T. In Support of the Right of Self-Determination for Indigenous Peoples under International Law. German Yearbook of 5129
International Law. Vol. 29. Berlin, 1986.
2. Nettheim G. Peoples and Populations – Indigenous peoples and the Rights of Peoples. The Rights of Peoples. Ed. by James Crawford.
Oxford: Clarendon Press, 1988.
3. United Nations Declaration on the Rights of Indigenous Peoples. Adopted by General Assembly resolution 61/295 dated September 13,
2007 [Electronic resource] // URL: https://www.un.org/en/documents/decl_conv/declarations/indigenous_rights.shtml. (Access da te: 1
June 4, 2019).
4. Kingsbury B. Reconciling Five Competing Conceptual Structures of Indigenous Peoples’ Claims in International and Comparative Law in
Philip Alston (ed). Peoples’ Rights. New York: Oxford University Press, 2001.
5. Corntassel J. J., Primeau T. H. Indigenous ‘Sovereignty’ and International Law: Revised Strategies for Pursuing ‘Self-Determination’.
Human Rights Quarterly. Vol. 17. № 2. 1995.
6. Anaya J. S. Indigenous Peoples in International Law. Sec. ed. Oxford University Press, 2000.
7. Garipov R.Sh. Protection of indigenous peoples in international law.Monograph. Kazan: Center for Innovative Technologies, 2012.
8. Nuttall M. Self-Rule in Greenland: Towards the World's First Inuit State? Indigenous Affairs. Vol. 3-4. 2008.
9. This regulation is reflected in Cl.1 of Additional Protocol I dated 1977; The UN Charter and the Declaration of Principles of International
Law Relating Friendly Relations and Cooperation between States in accordance with the 1970 UN Charter.
10. Ananidze F. R. International legal problems of the protection of the rights of indigenous peoples. Thesis for the degree of candidate of
legal sciences. Moscow. 1996.

Authors: Raniya R. Kayumova, Elena A. Dyganova, Gulnara I. Batyrshina, Armine Suren Baghdasaryan

Paper Title: Formation of Visual Culture in Teenagers by Teaching Them Photographic Art
Abstract: Currently, the vector of modern culture is shifted from verbal to the visual aspect. Visually
898. represented and superficial information often disguises phenomena that require special analysis to identify them.
Today, the younger generation, namely adolescents, is the most prone to massive informational “visual attack”. 5130-
Realizing that immersion in a low-grade visual environment is not harmless for a young, not yet fully formed the 5133
personality of a teenager; the formation of their visual culture is a pedagogical problem.
As a result of the study, the authors clarified the definition of “visual culture of personality”, revealed its
structural composition, determined the component content and substantiated its significance in the creative
development of a teenager.
Based on the methodological foundations of personal-pragmatist, culturological, and pragmatist approaches, as
well as the integrated application of theoretical and empirical methods, the researchers identified the possibilities of
photographic art which acts as a pedagogical means of solving the problem. In order to realize the pedagogical
potential of photographic art in educational practice, the authors developed a pedagogical model for the formation
of visual culture as part of the target, methodological, substantive-procedural and diagnostic-effective components.
The introduction of the authoring in the educational process has allowed us to obtain positive results

Keyword : visual culture, photographic art, art photography, art pedagogy, teenagers.
References:
1. Selivanova, E. (2014) The origins of the formation of visual culture. Observatory of Culture. 2, pp. 50-55.
2. Baudrillard, J. (1981) Simulacra and simulations. Paris. p.56.
3. Mishina, A., Javgildina, Z., Mishina, N. (2016) The art and project activity as a means of pre-professional development of teenagers'
graphical skills. The Turkish Online Journal of Design, Art and Communication - TOJDAC. November Special Edition. pp. 2427-
2432 tojdac_v060NVSE140.pdf
4. Freedman K., Heijnen E., Kallio-Tavin M., Kárpáti A., Papp L. (2013) Visual Culture Learning Communities: How and What
Students Come to Know in Informal Art Groups. Studies in Art Education: A Journal of Issues and Research, 54 (2), pp. 103-115
5. Wilson, B. (2003). Of diagrams and rhizomes: Visual culture, contemporary art, and the impossibility of mapping the content of art
education. Studies in Art Education, 44(3), pp.214-229.
6. Daniel, S. (2006). The art of seeing. Moscow: Amphora. p. 206.
7. Serikova, T. (2010). The transformation of the concepts “visual” and “artistic” images in modern culture. News of Altai State
University. 1-2, pp. 152-155.
8. Zeki, S. (1992). The visual image in the mind and in the brain. In the world of science. 11, pp. 33-41.
9. Kodzhaspirova, G. (2000). Pedagogical dictionary. Moscow: Academy, 176 p.
10. Rozin, V. (2009). Visual culture and perception: how a person sees and understands the world. Moscow: LIBROCOM, 274 p.
11. Mishina A.V., Blinova J.L., Belomoeva O.G. (2018) Multimodal art therapy for overcoming negative emotional conditions of
teenagers implementers in out-of-class work. Helix. 8(1), pp.2307 - 2311.
12. Van Dijck, J. (2008). Digital photography: communication, identity, memory. Visual Communication, 7(1), pp. 57-76.
https://doi.org/10.1177/1470357207084865
13. Akhmetshina, E. G., & Kadyjrova, L. H. (2017). Pedagogical Approaches to the Development System of Artistic Culture of
Individual. Revista San Gregorio, 20, Special Edition, December, pp: 189-193.
14. Akhmetshina G.R., Borodina S.D., Salakhova R.I. (2017). Information and Bibliographic Resources on the Design Theory. The
Turkish Online Journal of Design, Art and Communication. Special Edition. - Vol. 7., pp: 1294-1298. tojdac_v070DSE105.pdf
15. Rasooli, M., & Abedini, M. (2017). The Relationship between Organizational Support and Job Satisfaction of Experts and Manage rs
of Islamic Azad University of Qeshm and Subsidiaries (International Units, Medical, Sama, Hormuz and Khamir). Dutch Journ al of
Finance and Management, 1(2), 42. https://doi.org/10.29333/djfm/5818
16. Mwaniki, P., & Ondiek, C. O. (2018). Evaluation of the Effects of SaaS on SMEs in Nairobi County, Kenya. Journal of Information
Systems Engineering & Management, 3(3), 20.
17. Siagian, M. V., Saragih, S., & Sinaga, B. (2019). Development of Learning Materials Oriented on Problem-Based Learning Model to
Improve Students’ Mathematical Problem Solving Ability and Metacognition Ability. International Electronic Journal of
Mathematics Education, 14(2), 331-340. https://doi.org/10.29333/iejme/5717
18. Semin, A. N., & Kurdymov, A. V. (2018). International food security regulation. Opción, 34(85-2), 628-651.

Authors: Liliya R. Nizamieva, Gulnara I. Nazarova, Elena K. Kuzmina, Gérard Broussois


Model of the Organization of the Blended Learning in the Translation of Business Correspondence on
Paper Title:
the Basis of Electronic Educational Resources
Abstract: The article is devoted to the description and analysis of the implementation model of modern
educational technologies of blended learning in the process of professional training of specialists in foreign
languages. These technologies act as a means of stimulating motivation, cognitive independence and activity of
students. Their use increases the efficiency of the educational process by changing the models of interaction of its
participants. At the same time, students make the transition from traditional passive perception of the material to its
active development thanks to the capabilities of the virtual learning environment, which allows them to build their
own learning path and consciously master the learning information. The advantage of blended learning is a more
appropriate distribution of study time, high adaptability and interactivity, a deeper understanding and analysis of
program material by students. The appropriateness of the application of educational technologies of blended
learning was analyzed on the example of studying the course "Theory and Practice of Translation of Epistolary
Texts (French)" by students of Kazan Federal University. The material for testing was an electronic educational
899. resource developed specifically for the development of this educational discipline. An analysis of the results of the
pilot training shows that the introduction of these technologies increases the significance and effectiveness of the 5134-
educational process due to its individualization and differentiation, and also develops the creative thinking of 5137
students, forms their responsibility and ability to self-management.

Keyword : forms of training organization, blended learning, virtual learning environment, learning management
system, cognitive independence, teaching foreign languages, translation of business correspondence.
References:
1. Carneiro, R., Lefrere, P., Steffens, K., Underwood, J. (2011). Self-Regulated Learning in Technology Enhanced Learning
Environments. Rotterdam: Sense Publishers. 31 p.
2. Farkhaeva, A.I., Fazlyeva, Z.Kh., Sheinina, D.P. (2016). Computer Technologies in Assistance to Second Language Hig h School
Study // Modern Journal of Language Teaching Methods. 6(8). P. 70-75.
3. Dufour, H. (2014). La classe inversée // Technologie. N°193, septembre-octobre 2014. Р. 44-47.
4. Abdullina, L.R, Ageeva, A.V, Gabdreeva, N.V. (2019). Using the “Flipped classroom” model in the teaching of the theoretical
disciplines (French language) at the university [Technologie de la classe inversée dans l'enseignement des disciplines théoriques
(FLE) aux étudiants des universités] // XLinguae. Vol.12. Is.1XL. P. 161 – 169.
5. Bonk, C.J., Graham, C.R. (2006). Handbook of blended learning: Global Perspectives, local designs. San Francisco, CA: Pfeiffer
Publishing. 624 р.
6. Frydrychova Klimova, B., Hubackova, S., Semradova, I. (2011). Blended learning in a foreign language learning // Procedia Soc.
Behav. Sci. 28. Р. 281–285.
7. Varlamova, M.Yu, Bochina, T.G, Miftakhova, A.N. (2016). Interactivity in teaching a foreign language // Journal of Language a nd
Literature. 7(3). P. 190-194.
8. Bergmann, J., Smith, E. (2017). Flipped Learning 3.0: The Operating System for the Future of Talent Development. Chicago IL:
FLGlobal. 248 р.
9. Sharipova, D.Y., Khuziakhmetov, A.N., Nasibullov, R.R, Yarullin, I.F. (2017). Improving the quality of professional training of
students in the distance learning // Man in India. 97(3). P. 401-416.
10. Kuzmina, E.K, Nazarova, G.I, Nizamieva, L.R, Leblanc, C. (2018). Innovative technologies of teaching business French //
International Journal of Engineering and Technology (UAE). 7(4). P. 85-87.
11. Andrianova, N.S., Vassilieva, V.N., Ostroumova, O.F., Broussois, G. (2018). Integrative Use Of Modern Technologies For Teaching
Foreign Languages // Modern Journal of Language Teaching Methods. 8(10). P.271-275.
12. Rachimova, A.E, Varlamova, E.V, Tulusina, E.A. (2016). Advantages of computer technologies use in training in foreign languages
at the present stage of an education system modernization // Modern Journal of Language Teaching Methods. Special Issue
(December 2016). P. 97-101.
13. Klimova, B. (2017). Evaluation of the Blended Learning Approach in the Course of Business English – A Case Study // Huang TC.,
Lau R., Huang YM., Spaniol M., Yuen CH. (eds) Emerging Technologies for Education. SETE 2017. Lecture Notes in Computer
Science, vol 10676. Springer, Cham. DOI: https://doi.org/10.1007/978-3-319-71084-6_37.
14. Rivera, J. (2019). Blended Learning-Effectiveness and Application in Teaching and Learning Foreign Languages // Open Journal of
Modern Linguistics. 9. Р. 129-144. DOI: 10.4236/ojml.2019.92013.
15. Kord, H., Noushiravani, Y., Bahadori, M. D., & Jahantigh, M. Review and Analysis of Telework Perspective in the Administrative
Systems. Dutch Journal of Finance and Management, 1(2), (2017).44. https://doi.org/10.29333/djfm/5820
16. Galvão, M., & Henriques, R. Forecasting Movie Box Office Profitability. Journal of Information Systems Engineering &
Management, 3(3), (2018). 22.
17. Somasundram, P., Akmar, S. N., & Eu, L. K. Pattern Generalisation by Year Five Pupils. International Electronic Journal of
Mathematics Education, 14(2), (2019). 353-362. https://doi.org/10.29333/iejme/5719
18. Kabayeva, Z., Mussabaev, S., & Madalieva, Z. The formation way of independent Kazakhstan from the individualism and
collectivism perspective. Opción, 34(85-2), (2018).706-728.

Authors: Anastasia V. Mishina, Zilia M. Yavgildina, Nadegda V. Mishina, Olga G. Belomoeva


A Systematic Method to the Formation of Career Orientation of Adolescents in Terms of Additional
Paper Title:
Education
Abstract: The problem of the career orientation for adolescents in the context of their further education is
caused by a number of circumstances. First of all, amid the demand by the state and society for creative
professions, the younger generation has a superficial and disorienting idea of the nature and specificity of
professional activity. In addition, the professional sphere of activity of an artist, a designer, a decorator is being
improved and complicated, requiring a specialist to possess high information, computer, and art technologies. A
purposeful acquaintance with future professions in the field of visual and spatial arts, the professional formation of
such a specialist, starting from age of adolescence, is facilitated by a modern system of additional education with
high potential. Proceeding from this, the indicated problem requires science to develop its theoretical and
methodological foundations, a substantial technological base and appeal to innovative, developing, personality-
oriented ways of organizing the educational process of an integrated type. Within the framework of this study, we
dwell on the methodological foundations of the formation of career orientation and consider in more detail the
systematic approach as fundamental.
As a result, we studied the concept of “career orientation”, revealed the essence of the career orientation formation
process in adolescents, which is carried out in close connection with other mental processes and personality traits. It
was proved during the experiment that the use of a systematic approach and relevant principles contributes to more
effective formation of career orientation for adolescents.

900.
Keyword : art education, career orientation, the formation of career orientation, a systematic approach,
principles, adolescents. 5138-
5141
References:
1. Roccas, S. The big five personality factors and personal values /S. Roccas, L. Sagiv, S.H. Schwartz, A. Knafo// Personality and
Social Psychology Bulletin. – 2002. – № 28. – P. 189-201.
2. Kosaretsky, S. Specific Features of Children Involvement in Supplementary Education Depending on Cultural, Educational and
Financial Status of Families and Place of Living / S. Kosaretsky, B. Kupriyanov, D. Filippova // Educational studies. – 2016. - № 1.
Р. 168-190.
3. Akbariva, G.N. The development of readiness of teenagers to the project activity by means of fine arts / G.N. Akbariva, L.P.
Yephimova, Z. M. Yavgildina // Social Sciences (Pakistan), 2015. - 10 (5), pp. 639-645.
4. Akhmetshina E. G. Pedagogical approaches to the development system of the artistic culture of individual / E.G. Akhmetshina, L. H.
Kadyjrova // Revista san gregorio. – 2017. - №20 (special edition, December) ISSN: 1390-7247; eISSN: 2528-7907. - Р.189-193
5. Valeeva, R.A. Distance learning for aesthetic education - Informed professional development and life-long learning of student
teachers / R.A. Valeeva, S.V. Karkina, A.I. Starcic //ACM International Conference Proceeding Series. - 2018. - Vol. 2 - P.597-603.
6. Salakhov R.F, Esthetic education of children with special needs by means of computer art / R.F. Salakhov, R.I. Salakhova, R.R .
Nasibullov // International Journal of Environmental and Science Education. - 2016. - Vol. 11, Is.6, Р. 1137-1148.
7. Afanasyev, V.G. Society, systematicity, cognition, management [Text] / V.G. Afanasyev. - M.: Politizdat, 1981. - 250 p.
8. Uemov, A.I. System approach and the general theory of systems [Text] / A.I. Uemov. - M.: Thought, 1978. - 272 p.
9. Bespalko, V.P. Components of educational technology [Text] / V.P. Pespalko. - M.: Pedagogy, 1989. -- 190 p.
10. Slastenin, V.A. Pedagogy [Text]: a textbook for pupils of higher educational institutions / V.A. Slastenin, I.F. Isaev, E.N. Shiyanov;
edited by V.A. Slenin. - 6th edition, stereotyped. - M.: Publishing Centre "Academy", 2007. - 576 p.
11. Mardani, M., & Fallah, R. Comparison of Financial Leverage Ratio before and after the Use of Off-Balance Sheet Financing in Firms
Listed in the Tehran Stock Exchange. Dutch Journal of Finance and Management, 2(2), (2018). 53.
https://doi.org/10.29333/djfm/5829
12. Dominguez, L., D’Amato, J. P., Perez, A., Rubiales, A., & Barbuzza, R. A GPU-Accelerated LPR Algorithm on Broad Vision
Survillance Cameras. Journal of Information Systems Engineering & Management, 3(3), (2018). 24.
13. Ulandari, L., Amry, Z., & Saragih, S. Development of Learning Materials Based on Realistic Mathematics Education Approach to
Improve Students’ Mathematical Problem Solving Ability and Self-Efficacy. International Electronic Journal of Mathematics
Education, 14(2), (2019). 375-383. https://doi.org/10.29333/iejme/5721
14. Nebessayeva, Z., Bekbolatova, K., Mussakulov, K., Zhanbirshiyev, S., & Tulepov, L. Promotion of entrepreneurship development by
art and design by pedagogy. Opción, 34(85-2), (2018). 729-751.

Authors: Lyli R. Muhametzanova, Leyla A. Mardieva


Key Meanings Transmitted by the Names of Russian Newspapers and Magazines of the Soviet Era
Paper Title:
(1917 - 1991)
Abstract: The article analyzes the names of newspapers and magazines published in the Republic of Tatarstan
(a constituent entity of the Russian Federation) from 1917 to 1991. The research object (hemeronyms) is considered
by the authors as an artifact of culture; the authors prove that among all the onyms, hemeronyms seem to be the
most dependent on cultural, historical, and ideological factors. Based on the application of the methods of
keywords and key meanings, the semantic field of the media onomastic regional space of the studied period is
reconstructed. It is shown that the nuclear idea of a semantic field constructed as a result of systematization of
empirical material is an idea that can be designated as “building a society of a new formation”. The nuclear idea is
revealed in specific key meanings: “struggle” (namely ‘active actions to overcome or achieve something’ and
‘active actions aimed at achieving labor success’), “renewal”, i.e. ‘aimed at building a new socio-economic
formation - the communist’, “path”, “collectivization”, “labor as the supreme value”, “guiding the role of the
communist party (communists)”. The research results obtained by the authors reflect the specifics of not only the
regional (Tatarstan) media onomastic space, but also the whole of Soviet Russia. The algorithm of the study of
Russian hemonyms of the Soviet era presented in the work can be extrapolated to the similar material of other
national-cultural formations or of the Russian one, but covering other time periods with its own specific worldview
dominant.

Keyword : names of newspapers and magazines, onomastic media space, ideology and language, keywords, key
meanings.
References:
901. 1. Vezhbitskaya A. Understanding of cultures through the use of keywords. M.: Languages of Slavic culture, 2001. 288 p.
2. Maidanova L.M., Solomatov S.I., Fedotovskikh T.G., Chudinov A.P. The word and key meanings in modern media texts. Ekaterinbur g: 5142-
Publishing House of Ural University, 2004. 229 p.
3. Muhametzanova L.R., Mardieva L.A. The titles of newspapers and magazines of the Kazan governorate: lexico-semantic analysis'//
5145
Modern Journal of Language Teaching Methods. Vol. 8, Issue 11, November 2018. Pp.118 – 122.
4. Lewin-Jones, Jenny; Webb, Mike. Ideology in Disguise: Place Name Metonyms and the Discourse of Newspaper Headlines //
SOCIOLOGICAL RESEARCH ONLINE. 2013. Vol. 18 Issue 4 Article Number: 18 Published: NOV 29.
5. Adams, Michael. The American Blade: Etymologies of a Newspaper Name // Names-a journal of onomastics. 2013. Vol. 61. Issue: 3
Pp. 140-149.
6. Anikin E.E., Budaev E.V., Chudinov A.P.
7. Historical Dynamics of Metaphoric Systems in Russian Political Communication// Voprosy Kognitivnoy Lingvistiki. 2015. № 3 (44). P.
26-32
8. Gizatullina, A., Gumerova M., Vinogradova T., Grachev M. Post-Perestroika Ideologemes Survey (Based on the Newspaper “Izvestiya”)//
Helix, 2017. Vol. 8(1). Рp. 2270 – 2274.
9. Muhametzyanova L. R., Mardieva L. A., Elena S. Kara-Murza. Name of the newspaper: communicative-functional approach // National
Academy of Managerial Staff of Culture and Arts. 2017. № 4 (2). Рp. 90 – 93.
10. Shkurko V. Ju., Mardieva L.A., Shchuklina T. Yu., Chudinov A. P. Poster images in a new linguistic and extralinguistic contex t//
Amazonia Investiga. 2018. Vol. 7, Núm. 12 (2018). 320-324.
11. Philosophical Dictionary / Ed. I.T. Frolov. M.: Publishing house of political literature, 1986. 590 p.
12. Dahl V. Explanatory Dictionary of the Great Russian Language: in 4 volumes, V. 4. St. Petersburg, Moscow, 1882. 704 p.
13. Dictionary of the Russian language: in 4 volumes / Academy of Sciences of the USSR, Institute of Russian language; Ed. A.P. Evgenieva.
V.4. 3rd ed., stereotyped. M.: Russian language, 1988. 800 p.
14. Pakdel, M., & Talebbeydokhti, A. The Effect of Adjustment Announcement of Predicted Profit on Price and Trading Volume of Listed
Companies in Tehran Stock Exchange. Dutch Journal of Finance and Management, 2(1), (2018). 49. https://doi.org/10.29333/djfm/5825
15. Melo, R., Sobrinho, V. D. P. F. M., Filho, I. J. D. M., Feliciano, F., & Maciel, P. R. M. Redundancy Mechanisms Applied in Video
Streaming Service on Eucalyptus Cloud Computing Infrastructures. Journal of Information Systems Engineering & Management, 3(3 ),
(2018). 25.
16. Ayebo, A., & Mrutu, A. An Exploration of Calculus Students’ Beliefs about Mathematics. International Electronic Journal of Mathematics
Education, 14(2), (2019). 385-392. https://doi.org/10.29333/iejme/5728
17. Kasteyeva, M. Belgium priority as a partner for the Republic of Kazakhstan. Opción, 34(85-2), (2018). 752-772.

Authors: Liliya Mukharlyamova, Assiya Sulkarnayeva

Paper Title: English and Russian Somatic Phraseological Units: Differentiating Outcomes
Abstract: This paper deals with the outcomes of a comparative analysis of English and Russian somatic
phraseological units, namely the lexical, structural and semantic levels have been involved; the total number of
somatic phraseological units is more than 300 units.
902. Somatic phraseological units (further as PhUs) represent a wide group in any language. The lexical and semantic
group of somatic PhUs is regarded an independent subsystem within Phraseology of any language. This system is 5146-
comprised of PhUs whose key constituent parts include human body part names (from Greek soma means human 5150
body or a body part). It should be noted that the most frequent PhUs include somatisms. This circumstance can
hardly be explained by interlinguistic reasons only. The somatic components correspond both to sensual (eye) and
logic (head) level of knowledge and a criterion of its validity-practice (hand). PhUs with somatisms in their
structure appeared in different languages at different time due to the development of the language, culture, social
and political contacts of the nation with other nations. However, PhUs with somatisms have some general basis for
the use of any human body parts, to express physical and psychological states, feeling and emotions of people.
Somatic PhUs belong to a highly-frequent zone of lexical structure, to its oldest, primordial, and socially significant
part. As a rule, they are polysemantic words, their separate transferred meaning to a greater or lesser extent are
noticeable in phraseological meanings of separate PhUs. Nevertheless, the main, primary and direct meanings (of a
body part) play the decisive role in the formation and use of any somatic PhUs.

Keyword : Somatic phraseological unit, somatism, comparative analysis, lexical and structural peculiarities, full
equivalence, partial equivalence, zero equivalence.
References:
1. Sulkarnayeva А.R. Otsomaticheskaya vtorichnaya nominatciya v tekhnicheskoy termonologii [in Russian]. – Аstana, 2009. – 146 p.
2. Amosova N. Osnovy angliyskoy frazeologii [in Russian]. - Lnd., 1962. – 228 p.
3. Gabdrakhmanova, F.H., Mukhametzyanova, L.R., Shayakhmetova, L.Kh. Associative experiment is an effective method of research
of the national character (on the material of tatar and Russian liguistic cultures) (2015) Mediterranean Journal of Social Sciences, 6
(3), pp. 296-300.
4. Ayupova R.A., Bashirova M.A., Bezuglova O.A., Kuznetsova A.A., Sakhibullina K.A. Ornythonym component and phraseological
meaning. Life Science Journal. 2014, 11(11), pp. 290-293.
5. Vinogradov V.V. Leksikologiya I leksikografiya [in Russian]. М. 1977. - 349 p.
6. Shaiakhmetova L., Shayakhmetova L., Ashrapova A., Zhuravleva Y. Using Songs in Developing Intercultural Competence, 2017,
Tarih kultur ve sanat arastirmalari dergisi-journal of history culture and art research, V. 6, pp. 639-646.
7. Jennifer Seidl, W. McMordie. English Idioms and How to Use Them. – M.,1993. -356 c.
8. Cowie, A.P. and R. Mackin and I.R. McCaig. Oxford Dictionary of English Idioms. (previously published as Oxford Dictionary of
Current idiomatic English Volume 2) - Oxford., 1998.-pp 542.
9. Kunin А.V. Anglo-russkiy frazeologicheskiy slovar. - М.,1967.- 588 p.
10. Smith L. «Words and Idioms» - Lnd. 1998. –pp 465.
11. Webster’s New World Dictionary of American English. - N.Y.1978.-pp 540.
12. Cowie A. P. and R. Mackin. Oxford Dictionary of Current Idiomatic English.
13. Apresyan Yu.D. Novyi bolshoy Anglo-Russkiy slovar. - M.,1987.- 365 p.
14. Sazesh, A., & Siadat, S. A. (2018). The Relationship between Quantum Management and Organizational Agility in Ministry of
Roads and Urban Development of Golestan Province, Iran. Dutch Journal of Finance and Management, 2(2), 51.
https://doi.org/10.29333/djfm/5827
15. Guzmán, S. A., Fóster, P. F., Ramírez-Correa, P., Grandón, E. E., & Alfaro-Perez, J. Information Systems and their Effect on
Organizational Performance: An Inquiry into Job Satisfaction and Commitment in Higher Education Institutions. Journal of
Information Systems Engineering & Management, 3(4), (2018). 26.
16. Putri, S. K., Hasratuddin, & Syahputra, E. Development of Learning Devices Based on Realistic Mathematics Education to Improv e
Students’ Spatial Ability and Motivation. International Electronic Journal of Mathematics Education, 14(2), (2019). 393-400.
https://doi.org/10.29333/iejme/5729
17. Sailaukyzy, A., Shakuova, R., Sak, K., & Lebedeva, T. (2018). Contemporary view to the history of Kazakhstan's democratic
journalism and publicism. Opción, 34(85-2), 774-799.

Authors: Guzel M. Nurullina, Landysh G. Latfullina, Liliya A. Usmanova


Development of Speech Culture of Non-Philologist Students in the Course of Examining the Category
Paper Title:
of Gender in Russian Language
Abstract: The article is devoted to one of the topical issues of modern pedagogical science – to the formation
of speech culture of non-philologist students in the course of studying Russian language as state language of the
Russian Federation, language of international communication, national language of the Russian people. The main
competence formed in the course of studying Russian language is the communicative competence which is aimed at
the development of speech activity of the students of non-philologist specialties. According to the opinion of the
author of the research, an important indicator of success of the non-philologist specialist in the hi-tech competitive
world is acquisition of skills of professional communication, use of the methods of speech influence and
conviction. In the given work we investigate the question of grammatical and stylistic norms of the use of the
category of noun gender representing the greatest complexity in the oral and written language of non-philologist
students. In this regard the purpose of the present work is creation of the lingual-methodical principle of
communicative approach which will provide the formation of speech culture of non-philologist students in the
higher educational institution when studying the category of gender in Russian; determination of pedagogical
technologies of training in order to increase the culture of speech communication of the future experts. The
903.
practical importance of the studied problem consists in the improvement of quality of the vocational training of
non-philologists students; in the definition of the trajectory of the educational growth of future highly qualified 5151-
specialist capable to choose language means in professional activity reasonably, to realize the communicative 5154
intentions in various situations of communication adequately, to respect the grammatical and stylistic rules of using
the category of noun gender.

Keyword : linguodidactics, speech culture, noun, category of gender, Russian language, principle of
communicative approach.
References:
1. Lu Y, Yusupova Z.F, Kadyrkulova U.K, Study of the grammal standards of use of Russian pronouns in a foreign language
auditorium//Astra Salvensis. - 2017. - Vol.2017, Is. - P.273-278.
2. Еrofeeva I.V. Place of derivative adjectives with suffixes -ьн- and -ьск- in the Old Russian language (based on chronicles material) //
Przegląd Wschodnioeuropejski. – IX/1. – 2018. – С.251-261.
3. Victoriya Yuryevna Shkurko, Yulia Konstantinovna Lukoyanova, Ekaterina Sergeeva, Using Fictional Texts In Teaching Russian As
A Second Native Language // Modern Journal of Language Teaching Methods. - 2017. - Vol.7, Is.10. - P.59-63.
4. Volskaya A.S., Chupryakova O.A., Safonova S.S., Karipzhanova G.T. Semantico-functional features of expressive derivatives in the
artistic discourse of V. Makanin // International Journal of Engineering & Technology, 2018, Vol. 7, Is. 4.36, pp. 983–985.
5. Rakhimova D.I, Yusupova Z.F, Korneyeva T.A., Olympiad in Russian language as a form of bilingual student linguistic
development//Journal of Language and Literature. - 2016. - Vol.7, Is.3. - P.145-148.
6. Matveeva N.N., Fatkhutdinova V.G. National component in Russian word-formation: linguodidactic aspect // Journal of Language
and Literature. Vol.7. No 2. May, 2016. pp: 233-236.
7. Kozyrev, V. A., Cherniak, V. D. (2012). Modern language situation and speech culture: study guide. 184 p. Moscow: FLINTA:
Science
8. Shcherbakov, V.S. (1966). Gender category in Russian (functional and grammatical characteristics). 25 p. Samarkand.
9. Laskova, M. V. (2001). Grammatical category of gender in the aspect of gender linguistics. Monograph. 192 p. Rostov on Don:
Rostov State Economic University.
10. Gin, Yа.I. (1992). Poetics of grammatical gender. 168 p. Petrozavodsk: Karelian State Pedagogical Institute.
11. Vezhbickaia, A. (1997). Semantics, Culture, and Cognition. 416 p. Moscow, Russian dictionaries.
12. Akishina, A.A. (2002). Learning to teach: for teachers of Russian as a foreign language. 256 p. Moscow: Russian language.
13. Sadeghpour, F., Far, M. G., Khah, A. R., & Akbardokht Amiri, M. A. (2017). Marketing Strategic Planning and Choosing the Righ t
Strategy using AHP Technique (Case Study: Ghavamin Bank Mazandaran). Dutch Journal of Finance and Management, 1(2), 45.
https://doi.org/10.29333/djfm/5821
14. Machado, A. D. B., Souza, M. J., & Catapan, A. H. (2019). Systematic Review: Intersection between Communication and
Knowledge. Journal of Information Systems Engineering & Management, 4(1).
15. Puspitasari, L., In'am, A., & Syaifuddin, M. (2019). Analysis of Students’ Creative Thinking in Solving Arithmetic Problems.
International Electronic Journal of Mathematics Education, 14(1), 49-60. https://doi.org/10.12973/iejme/3962
16. Kurmanali, A., Suiyerkul, B., Aitmukhametova, K., Turumbetova, Z., & Smanova, B. (2018). Analysis of the proverbs related to the
lexemes" tongue/language". Opción, 34(85-2), 97-115.

Authors: Adel Abdullin, Ainur Gilmullin, Lenara Klimovskaya, Vagip Abdrashitov

Paper Title: On The Role of Modern Doctrines on Human Rights (International Legal Examination)
Abstract: The modern doctrines on human rights, which are proposed to be considered in the context of their
implementation in international legal practice, are the subject of theoretical and legal analysis in the paper. It is
noted that human rights have come a long way in their formation, design and subsequent genesis, and they have
finally formed by the end of the last century, and it seems that now all the necessary conditions have been created
for their philosophical, legal, axiological analysis and relevant rational consideration of human rights.
The advantages of international law in the field of human rights are listed; namely, it is noted that international
human rights standards are universal in nature and are binding based on which states are obliged to ensure a
minimum standard of those rights and freedoms that are enshrined in international acts,
There are listed in the paper advantages of international legal regulation regarding human rights and freedoms,
such as the supranational, mandatory and imperative nature of international acts; guarantees of protection and the
possibility of restoring violated rights and freedoms of citizens; a man-centred approach in resolving disputes and
conflicts arising in international practice. The role of international bodies such as the International Criminal Court,
the International Tribunal for the Law of the Sea, the Court of the European Union, the European Court of Human
Rights, the International Tribunals for Rwanda and the Former Yugoslavia, and the Special Court for Sierra Leone,
is emphasized.
Particular attention is paid to the principle of presumption of innocence, which has fundamental and quintessential
904. characteristics in the field of human rights.
5155-
Keyword : doctrine, human rights, international law, the principle of the presumption of innocence, priorities, 5158
rights and freedoms, judicial practice.
References:
1. Ebzeev B.S. Constitution. Democracy. Human rights. - Moscow - Cherkassk, 1992. P.120-121.
2. Hegel G.V.F. The philosophy of law. - M., 1990. P.385.
3. History of the Ancient World. Textbook and workshop for academic undergraduate // https://books.google.ru.
4. Boldyreva O. M. Protection of human rights in the history of international law // Bulletin of the Prikamsky So cial Institute.2018. No. 1
(79). P. 14-20.
5. Brown R.E. The history of American Justice. – N.Y.; Boston, 2001. – Р. 127.
6. Gilmullin A. R. Sobre los elementos estructurales de una doctrina legal de presunción de inocencia / Ainur Gilmullin, Alexand er Pogodin,
Vagip Abdrashitov // Revista Dilemas Contemporáneos: Educación, Política y Valores. ― Año: VI. ― Número: Edición Especial. ―
Artículo no.:17. ― Diciembre 2018. ― P. 1―12.
7. Allen D. Russian tomorrow: Justice and Corts. – L.; Roma, 1999. – P. 38.
8. Triber W. L. Methodology and Criteria in Due Process. – N. Y., 1978. – Р. 153.
9. Maitland F. W. The Constitutional history of England. – Р. 314.
10. Resolution by the Plenum of the Supreme Court of the Russian Federation dd. October 25, 1996 No. 10 // ppvs.rf / 1996 / posta novlenie-
plenuma-vs-rf / N10-ot-25.10.1996.html.
11. Vereshchetin V.S. Some aspects of the correlation between international and national law in the practice of the UN Internatio nal Court of
Justice // Russian Journal of Law. - 2007. - N 3. - P. 19-26.
12. Ferrazzini vs. Italy. European Court of Human Rights. 2001 // https://www.echr.coe.int/Documents/FS_Taxation_RUS.pdf.
13. Schenk vs Switzerland. (Shenk vs. Switzerland. The judgment of the European Court of Human Rights of July 12, 1988. Ser. A N.140.

Authors: Zarina I. Khisamova, Ildar R. Begishev, Ramil R. Gaifutdinov

Paper Title: On Methods to Legal Regulation of Artificial Intelligence in the World


Abstract: In the modern digital age, the issues of using artificial intelligence and the field of development of
905. intelligent technologies are extremely important and relevant. Over the past few years, there have been attempts of
state regulation of artificial intelligence, both in Russia and in other countries of the world. Artificial intelligence 5109-
poses new challenges to various areas of law: from patent to criminal law, from privacy to antitrust law. Among the 5162
current approaches, the most optimal is the creation of a separate legal regulation mechanism that creates a clear
distinction between areas of responsibility of developers and users of systems with artificial intelligence and the
technology itself. Today, the development of the legal framework for the existence of artificial intelligence can be
conditionally divided into two approaches: the creation of a legal framework for the introduction of applied systems
with artificial intelligence and stimulate their development; regulation of the sphere of creating artificial “super
intelligence”, in particular, compliance of the developed technologies with generally recognized standards in the
field of ethics and law.
A separate area should be the introduction of uniform ethical principles for all developers and users of systems with
artificial intelligence. The most optimal in this aspect is the approach implemented within the framework of the
Asilomar principles. In these circumstances, the appeal to the problem of legal regulation of artificial intelligence is
becoming more relevant than ever. This paper presents the results of a detailed analysis of existing approaches to
the legal regulation of artificial intelligence.

Keyword : artificial intelligence; robot; intellectual technologies; digital economy; machine learning;
technological singularity; superintelligence; legal regulation; information law; law; legislation; Asilomar principles.
References:
1. Shoham Y., Perrault R., Brynjolfsson E., Clark J., Manyika J., Niebles J.C., Lyons T., Etchemendy J., Grosz B., Bauer Z. The AI Index
2018. Annual Report. AI Index Steering Committee. Human-Centred AI Initiative, Stanford University, Stanford, CA, December 2018.
2. Kuznetsova N. Investments in artificial intelligence are breaking records / N. Kuznetsova // Invest-Foresight. Business magazine. - May
29, 2018. - URL: https://www. if24. ru/investitsii-v-iskusstvennyj-intellekt-byut-rekordy/
3. Neznamov A. Laws of robotics. How to regulate artificial intelligence / A. Neznamov // Forbes. - URL: https://www. forbes.
ru/tehnologii/355757-zakony-robototehniki-kak-regulirovat-iskusstvennyy-intellekt
4. Bostrom N. Superintelligence: Paths, Dangers, Strategies / N. Bostrom. – Oxford : Oxford University Press, 2014. – 390 p.
5. Kurzweil R. The singularity is near: when humans transcend biology / R. Kurzweil. – Duckworth, 2010. – 1012 p.
6. Bostrom N. Strategic Implications of Openness in AI Development / N. Bostrom. – Future of Humanity Institute, University of Oxford,
2017. – 14 p. – URL: https://nickbostrom.com/papers/openness.pdf
7. Pagallo U. The Laws of Robots: Crimes, Contracts, and Torts / U. Pagallo. – Dordrecht : Springer, 2013. – 200 p.
8. Leach R. Political ideology in Britain / R. Leach. – 2nd ed. – London : Palgrave Macmillan, 2009. – 282 p.
9. Ibragimov R. Law of machines. How to hold a robot accountable ?/ R. Ibragimov, E. Suragina // Corporate Lawyer. - 2017. - No. 11. - P.
10-17.
10. Yoav Shoham, Raymond Perrault, Erik Brynjolfsson, Jack Clark, James Manyika, Juan Carlos Niebles, Terah Lyons, John Etchemendy,
Barbara Grosz and Zoe Bauer, «The AI Index 2018 Annual Report», AI Index Steering Committee, Human-Centered AI Initiative,
Stanford University, Stanford, CA, December 2018.
11. Smith B., Shum H. The Future Computed: Artificial Intelligence and its role in society, Microsoft, 2018. – URL:
https://blogs.microsoft.com/uploads/2018/02/The-Future-Computed_2.8.18.pdf
12. Burgess J. P. et al., Ethics Advisory Group Report 2018. – URL: https://edps.europa.eu/sites/edp/files/publication/18-01-
25_eag_report_en.pdf
13. Simachev Y., Sokolov A. New Principles and individual practices in legal regulation amid technological revolutions. Report of Centre of
Development Institute, the Institute for Statistical Studies and Economics of Knowledge, the Skolkovo HSE Institute for Law and
Development, Institute of Legal Regulation, the Institute for Transport Economics and Transport Policy Studies and the Institute of
Education of National Research University Higher School of Economics. (2018). International forum “Development of parliamentarism”.
– 18 p.
14. Komissina I. I. The current state and prospects for the development of artificial intelligence technologies in China / I. I. Komissina //
Problems of the national strategy. - 2019. - No. 1. - P. 137–159.
15. Rezaei, M., & Nemati, K. The Impact of Purchase Intent, Word of Mouth Advertising and Skill Domain of Seller on Quality of Cu stomer
Relationship to Sale Life and Savings Insurance Policies (Case Study: Dana Insurance Co., Bushehr Province). Dutch Journal o f Finance
and Management, 1(2), (2017). 43. https://doi.org/10.29333/djfm/5819
16. Fujo, M. H., & Dida, M. A. Centralized Admission System for Advanced Level Private Schools: Case of Kilimanjaro Region, Tanzania.
Journal of Information Systems Engineering & Management, 4(1). (2019).
17. Saidi, S. S., & Siew, N. M. Assessing Students’ Understanding of the Measures of Central Tendency and Attitude towards Statis tics in
Rural Secondary Schools. International Electronic Journal of Mathematics Education, 14(1), (2019). 73-86.
https://doi.org/10.12973/iejme/3968
18. Baykalova, E. D., Artyna, M. K., Dorzhu, N. S., Ochur, T. K., & Mongush, D. S. Morphological interference in the process of mastering
English speech in conditions of interaction of Tuvan, Russian and English as a foreign language. Opción, 34(85-2), (2018). 35-60.

Authors: Irina N. Fardeeva, Indira A. Shakirova, Elena N. Maltseva, Valentina I. Kuzmenko, Elena V. Smirnova

Paper Title: Features of Pedagogical Communication in Social Networks


Abstract: The education is enhance in computer technology very fast as in the modern life of development of
technology. Accordingly, there is a need for integration between education and modern technology, which actually
facilitates communication between students and teachers. Social networks have become an important component in
the educational system and are widely used in most higher education institutions, as they improve traditional
approaches to learning, transferring classroom education to online learning.
Social networks create new opportunities through which information is transmitted, created, mixed, constantly
updated and improved by users. The boundaries of communication between teachers and students have collapsed.
906. The students have rights to work in production and also they can create their own contents as by developing their
critical thinking by social constructivism. Thus, the learning environment as a whole is affected by these new ways 5163-
of knowledge provision, and teaching and learning undergo changes and take on new forms. 5165
Taking into account these aspects, our research will be focused on the intersection between social network sites,
encouraging the sense of community and opening up new opportunities for a motivating and collaborative informal
learning process between teacher and students.

Keyword : social networks, communication, remote education, teaching methods, information environment.
References:
1. Aygul Z. Ibatova – Iskandar G. Mukhametgaliyev. (2018). New ways of professional language thesaurus formation among students of
engineering specialties. XLinguae, Volume 11, Issue 4, October 2018, ISSN 1337-8384, eISSN 2453-711X
2. Caci, B., Cardaci, M., & Miceli, S. (2019). Development and Maintenance of Self-Disclosure on Facebook: The Role of Personality Traits.
SAGE Open, 9(2), 2158244019856948.
3. Hershkovitz, A., Elhija, M. A., & Zedan, D. (2019). WhatsApp Is the Message: Out-of-Class Communication, Student-Teacher
Relationship, and Classroom Environment. Journal of Information Technology Education, 18.
4. Chandler, P., & Redman, C. (2012). Teaching teachers for the future: Modelling and exploring immersive personal learning networks.
Australian Computers in Education Conference.
5. Williams, P. (2005). Lessons from the future: ICT scenarios and the education of teachers. Journal of Education for Teaching, 31(4), 319-
339.
6. Çevik, Y. D., Çelik, S., & Haşlaman, T. (2014). Teacher training through social networking platforms: A case study on Facebook.
Australasian Journal of Educational Technology, 30(6).
7. Facundo FROMENT, Alfonso Javier GARCÍA GONZÁLEZ, Rocío BOHÓRQUEZ The Use of Social Networks as a Communication
Tool between Teachers and Students: A Literature Review TOJET: The Turkish Online Journal of Educational Technology – October
2017, volume 16 issue 4
8. Aydin, S. (2014). Foreign Language Learners’ Interactions with their Teachers on Facebook. System, 42, 155-163.
doi:10.1016/j.system.2013.12.001
9. Smith, E. E. (2016). “A Real Double-edged Sword:” Undergraduate Perceptions of Social Media in their Learning. Computers &
Education, 103, 44-58. doi:10.1016/j.compedu.2016.09.009
10. Abella, V., & Delgado, V. D. (2015). Aprender a usar Twitter y usar Twitter para aprender. Profesorado, Revista de Currículum y
Formación del Profesorado, 19(1), 364-378. Retrieved from https://recyt.fecyt.es/index.php/profesorado/article/view/41046/23330
11. Mardani, M., & Fallah, R. Comparison of Financial Leverage Ratio before and after the Use of Off-Balance Sheet Financing in Firms
Listed in the Tehran Stock Exchange. Dutch Journal of Finance and Management, 2(2), (2018). 53. https://doi.org/10.29333/djfm/5829
12. Barreto, D. M., & Alturas, B. Quality-in-use app evaluation: case of a recruitment app for Portuguese SMEs. Quality-in-use app
evaluation: case of a recruitment app for Portuguese SMEs, (1). (2018).
13. Radhy, Z. H. Application of Multiply Regression Linear Model and New Technology Method in Estimating Learning and Education o f
Students. International Electronic Journal of Mathematics Education, 14(1), (2019). 87-90. https://doi.org/10.12973/iejme/3978
14. Merkibayev, T., Seisenbayeva, Z., Bekkozhanova, G., Koblanova, A., & Alikhankyzy, G. Oppositions in the conceptual and linguistic
category of time. Opción, 34(85-2), (2018). 116-148.

Authors: Mikhail G. Khort, Artur R. Karimov, Alexei S. Guryanov

Paper Title: Deflationary Truth and the Problem of Relativistic Grounds of Emotivism
Abstract: The article discusses the Frege-Geach problem, which is considered one of the most serious
difficulties for emotive meta-ethics. The paper describes how recognition of an emotive content by moral
statements in the form of attitudes leads to the emergence of the Frege-Geach problem. The essence of the problem
is explained, which consists in the impossibility to make a logical conclusion in a situation of mixed contexts, when
the antecedent has a value meaning, and the consequent is descriptive. The authors consider one way to solve this
problem, which involves the use of a deflationary theory of truth. It is proved that the adoption of deflationism
about the truth makes it possible to draw a logical conclusion in mixed contexts. They also raise the question of
whether the application of deflationary truth concept is sufficient to avoid the relativistic effects of emotivism on
normative ethics. The authors note that the synthesis of deflationism and emotivism is not able to explain the
internalism of moral statements, which always have a hidden prescriptive modality. The conclusion is made that
deflationism does not allow emotivism to avoid relativistic consequences in the field of normative ethics.
Therefore, the authors conclude that emotivism should be called the nihilistic theory of the rationale for moral
statements.

Keyword : Metaethics, Relativism, Emotivism, Attitude, Deflationary truth, The Frege-Geach problem.
907.
References:
1. S. Satris, “Ethical Emotivism”, Springer, pp. 26-51, 1987. 5166-
2. A. Ayer, “Language, Truth and logic”, Dover Publications, p. 107, 1946. 5168
3. J. Lemos, “The Problems with Emotivism”, Journal of Philosophical Research, № 25, pp. 285-309, 2000.
4. J. Lyou, “A Critical Study on A. J. Ayer’s Emotivism”, Journal of Ethics, № 1 (111), pp. 1-30, 2016.
5. V. Ogleznev. “The Frege-Geach problem and ascriptive statements”, Philosophy of Science, No. 1 (60), p. 41, 2014.
6. L. Lamberov, “Noncognitivism in ethics and deflationism: the problem of general methodological foundations”, Scientific Bulletin of the
Omsk Academy of the Ministry of Internal Affairs of Russia, No. 3 (50), p. 36, 2013.
7. Ya. Shramko. “The predicate of truth in counterfactual contexts: for defense of deflationism”. Epistemology & Philosophy of Science, No.
2, p. 81, 2011.
8. L. Lamberov. “Deflationism as a metaphysical concept”. Bulletin of Tomsk state university. Philosophy. Sociology. Political Science, No.
4 (24), p. 34, 2013.
9. K. Swan, “Emotivism and deflationary truth”, Pacific Philosophical Quarterly, № 83(3), p. 276, 2002.
10. L. Lamberov. “The Frege-Geach problem: (I) on the possibility of solution in the deflationary vein,” Vestnik NSU. Series: Philosophy,
Vol. 11. Vol. 3, p. 9, 2013.
11. Pakdel, M., & Talebbeydokhti, A. The Effect of Adjustment Announcement of Predicted Profit on Price and Trading Volume of Lis ted
Companies in Tehran Stock Exchange. Dutch Journal of Finance and Management, 2(1), 49. https://doi.org/10.29333/djfm/5825(2018).
12. Melo, R., Bezerra, M. C., Dantas, J., Matos, R., de Melo Filho, I. J., Oliveira, A. S., ... & Maciel, P. R. M. Sensitivity an alysis techniques
applied in cloud computing environments. In 2017 12th Iberian Conference on Information Systems and Technologies (CISTI) (pp. 1-7).
IEEE. (2017, June).
13. Tejeda, S., & Dominguez, A. Influence of Interactions in the Collaborative Solving of a Velocity Problem. International Electronic Journal
of Mathematics Education, 14(1), 91-108. (2019).https://doi.org/10.12973/iejme/3979
14. Shayakhmetova, D., & Chaklikova, A. Development of the intermediator of intercultural communication based on public argumenta tive
speech. Opción, 34(85-2), 149-185. (2018).

Authors: Gulnaz K. Gizatova, Olga G. Ivanova, Alexander S. Safonov

908. Paper Title: Deterritorialisation and Development of National Cultures


Abstract: The term “deterritorialization” has become widely used in various fields of social theory to describe 5169-
a wide variety of social processes. For example, they started to use the concept of “deterritorialization” to describe, 5171
first of all, cultural processes, while the gap between social and geographical is emphasized. However, as many
researchers rightly point out, where deterritorialization takes place, the reterritorialization will also appear
necessarily. And here the thing is, first of all, about the correlation of global and local, universal and particular. But
in the modern world this ratio is characterized by apparent asymmetry. Hence the researchers' particular attention to
such concepts as homogenization, macdolandization, Americanization, glocalization, etc. Of course, there is a clear
idea that it is Western culture that is becoming a kind of model that has a decisive influence on other, non-Western
cultures. A characteristic feature of modern social studies is that their focus shifts from rationality to the emphasis
of differences, hence the keen interest in history, the search for roots that are lost, also as the result of
deterritorialization. The relativization of knowledge in general and historical knowledge in particular has led to the
fact that the latter, and in particular, historiography begin to be regarded as a synonym for mythology, and
traditions and the past of a particular nation - as artificially created constructs.

Keyword : deterritorialization, national cultures, reterritorialization, culture universals.


References:
1. G. Deleuze, F. Guattari A thousand plateaus: capitalism and schizophrenia. Ttransl. by B. Massumi.L.: Athlone, 1988; Deleuze G.,
Guattari F. What is philosophy? Transl. by H. Tomlinson and G. Burchill.L.: Verso, 1994
2. C.H. Williams Nationalism in a democratic context // A companion to political geography. Eds. J. Agnew, K. Mitchell and G. To al.
Oxford: Blackwell, 2003. pp. 356-377.
3. J.Tomlison. Globalization and Culture. – Chicago, University of Chicago Press, 1999. – 238p.
4. “Culture and Communications: Global and Local Dimensions” - Tomsk: NTL Publishing House. - 2004. - 400 p.
5. C. Barker. TV, Globalization and Cultural Identities. - Philadelphia. Publication. – 1999.
6. S. Hall. The Centrality of Culture: Notes on the Cultural Revolutions of Our Time //Media and Cultural Regulation. – London: Sage. –
1998.
7. M. Foucault. Archeology of knowledge. K.: Nika-Center, 1996. - 208 p.
8. F. Jameson. Singular modernity / Fredric Jameson. – L.; N.-Y.: Verso Books, 2002 – 250 p.
9. P. Ricoeur. Memory, history, oblivion / Transl. from French by I.I. Blauberg, I.S. Vdovina, O.I. Machulskaya, G.M. Tavrizyan. - M.:
Publishing house of humanitarian literature, 2004. - 728 p.
10. J. Elliott. Using narrative in social research: Qualitative and quantitative approaches. London, England: Sage. - 2005.
11. Shaul R. Shenhav. The Discursive Effect of National Narratives: A Theoretical Framework. - The Hebrew University of Jerusalem//
https://ecpr.eu/filestore/paperproposal/5b9329d4-4c4e-4a06-a756-b945222a57f6.pdf
12. Cit.: S. Elden. Missing the point: globalization, deterritorialization and the space of the world, Transactions of the Institute of British
Geographers, № 30, pp. 8-19, 2005.
13. Cit.: S. McQuire. "Media City" //https://postnauka.ru/longreads/31899.
14. Sazesh, A., & Siadat, S. A. (2018). The Relationship between Quantum Management and Organizational Agility in Ministry of Roa ds and
Urban Development of Golestan Province, Iran. Dutch Journal of Finance and Management, 2(2), 51. https://doi.org/10.29333/djfm/5827
15. Tereso, A., Ribeiro, P., & Cardoso, M. (2018). An Automated Framework for the Integration between EVM and Risk Management.
Journal of Information Systems Engineering & Management, 3(1), 03.
16. Lee, M. Y. (2019). A Case Study Examining Links between Fractional Knowledge and Linear Equation Writing of Seventh-Grade
Students and Whether to Introduce Linear Equations in an Earlier Grade. International Electronic Journal of Mathematics Educa tion,
14(1), 109-122. https://doi.org/10.12973/iejme/3980
17. Issaliyeva, A., Ospanova, A. N., & Alibekul, A. (2018). Kazakhstan and GCC: Islamic component in joint collaboration. Opción, 34(85-2),
205-220.

Authors: Gleb D. Leontyev, Ludmila S. Leontieva

Paper Title: Dualism of Utopia: Anti-Systemic Protest and Social


Abstract: They performed the analysis of utopia phenomenon as a social alternative. From the standpoint of
the socio-synergetic approach, the following task was posed: to justify the design and protest nature of the utopian
worldview. The relationship between the formation and translation of social utopia and the level of social self-
organization is affirmed. An inverse correlation with the process of self-organization of citizens is characteristic of
political ideology. Based on this, the phenomena of “utopia” and “ideology” are considered as worldview
opposites. The existential basis of mass consciousness protest state is constituted by the conviction of the idea of
utopian due and despair conditioned by the unsatisfying being. In accordance with the classification of social
protests, the type of protest in the context of utopian discourse is defined by the authors as anti-systemic. The
utopian project becomes the ideological engine of this social protest. Denial in the form of protest and construction
in the form of a project determine the critical constructive nature of utopia. Therefore, the suppression of utopian
ideas is considered in the article as the rejection of socio-political thinking projectivity, and therefore, as an
909. approximation of social stagnation. The praxeological features of utopia are manifested in the presence of both an
ideal and a real component, i.e. this is a project that changes the state of mass consciousness, and this is a practice 5172-
that transforms social reality. Along with the humanistic optimism of utopia, they single out the risk of “denial of 5175
denial,” that is, the denial of the very utopian idea of an “ideal” society in the practical implementation of a utopian
project.

Keyword : utopia, ideal, social project, social protest, ideology, state.


References:
1. Levada Center. Press releases 16.05.2019, 04.06.2019. - URL: https://www.levada.ru/2019/05/16/sberezheniya-rossiyan/;
https://www.levada.ru/2019/06/04/protestnyj-potentsial-9/
2. Bloch, E. The spirit of Utopia. [Electronic resource]. – Standford: Stanford University Press, 2000. – 320 р. – URL:
https://kupdf.com/download/bloch-ernst-spirit-utopia_58d15501dc0d60c608c34614_pdf
3. Ainsa F. La Reconstruccion de la Utopia. Mexico. Correo de la UNESCO. 1999. - 238 pр.
4. Popper, Karl Raimand. The Open Society and Its Enemies. Vol. II. The High Tide of Prophecy : Hegel, Marx, and th e Aftermath / K. R.
Popper. – 5th ed. – London ; Routledge & Kegan Paul, 1966.- 420 рр
5. Utopia and Utopian thinking / Comp., ed. by V.A. Chalikova. - M.: Progress, 1991. - 405 p.
6. Maksimov M.A. The problem of the subject of antisystem activity in modern philosophical thought. // Policy. Political Studies. - 2010. -
No. 4. - pp. 159-171.
7. Frank S.L. Heresy of utopianism // On the other side of the right and left. - Paris, 1972.- pp. 126-134.
8. Leontyev G.D., Leontieva L.S., Khalilova Т.V. Implementation of state utopia: issues of property and freedom / // 5th International
Multidisciplinary Scientific Conference on Social Sciences and Arts SGEM 2018, www.sgemsocial.org, SGEM2018 Conference
Proceedings, ISBN 978-619-7408-64-5 / ISSN 2367-5659, 26 August - 1 September, 2018, Vol. 5, Issue 1.4, 383-390 pp.
9. Leontiev G.D. The Utopian Trajectory: From Due to Existence // NB: Sociodynamics. — 2017. - № 4. - pp. 126-136. DOI: 10.7256/2409-
7144.2017.4.22751.- URL : http://e-notabene.ru/pr/article_22751.html
10. Slavoj Žižek. The Sublime Object of Ideology. - Verso, 1989. – 240 р.
11. Selomo, M. R., & Govender, K. K. Procurement and Supply Chain Management in Government Institutions: A Case Study of Select
Departments in the Limpopo Province, South Africa. (2016).
12. Laureano, R. M., Fernandes, A. L., Hassamo, S., & Alturas, B. (2018). Facebook satisfaction and its impacts on fundraising: a case study
at a Portuguese non-profit organization. Journal of Information Systems Engineering and Management, (1).
13. García-Santillán, A. (2019). An Algorithm to Renegotiate Debt through Equivalent Equations and Transaction Costs: A Proposal for the
Field of Financial Education. International Electronic Journal of Mathematics Education, 14(1), 123-136.
https://doi.org/10.12973/iejme/3981
14. Abishov, S., Polyak, D., Seidullaeva, G., & Kermeshova, Z. (2018). Meaning of fiction in formation of studentsidentity. Opció n, 34(85-2),
186-204.

Authors: Gleb D. Leontyev, Vladimir I. Kurashov

Paper Title: Dystopia of Transhumanism in the Context of General Eschatology


Abstract: They analyzed the socio-anthropological essence of nano-, bio-, info-, cogno- (NBIC) convergence
process and the concept of transhumanism. The general contours of the “ideal”, transhuman, convergent-
technological future are examined on the basis of the concept of “general eschatology”, which made it possible to
justify the presence of humanitarian threats and risks, their prolongation from the present to the future and dystopic
deepening in the convergent process of "trans-transition". Dystopic trends with the opportunity to be implemented
in practice are the following ones: loss of individual uniqueness; fading of the moral principle; technological
inequality and socio-stratification polarization; social manageability based on interference in human nature;
consequences of total control over consciousness in the field of rights and freedoms. The eschatological approach
reveals the essential difference between the concepts of “humanism” and “transhumanism” in terms of human
values: the preservation of the human in a person or its overcoming through NBIC- “reformatting” of a person. The
dominance of the managerial approach in the organization of science affects the process of scientific activity self-
organization, transforms the natural convergence process of sciences and technologies, giving rise to moral,
financial, and corporate deviations. Technological opportunities produced by the modern era testify to the
multivariance of prognostic vision forms of the future, the relevance of the philosophical, methodological,
humanitarian examination of “breakthrough technologies” to preserve humanity.

Keyword : dystopia, humanism, transhumanism, NBIC convergence, general eschatology, technology, social
risks.
References:
1. Vinge Vernor. The Coming Technological Singularity. VISION-21 Symposium, NASA Lewis Research Center and the Ohio Aerospace
Institute, March 30-31, 1993. - URL: https://www.accelerating.org/articles/comingtechsingularity.html
2. Ellul J. The Technological Order / J. Ellul // The Technological Order. Ed. C.F. Stover. Detroit: Wayne State Univ. Press, 1963, 10–37 pp.
910. 3. Leontiev G.D. Anti-utopianism of postmodernism or utopian post-modern? / G.D. Leontiev // News of Ural Federal University. Series No.
3. Social sciences. - 2017. V.12. – № 2 (164). - pp. 78-86. 5176-
4. Leontyev, G. D. Dialectics of freedom and alienation in the space of the internet / G. D. Leontyev, A. M. Safina, L. F. Gaynullina, L.S.
Leontieva et al. // Revista ESPACIOS (ISSN 0798 1015 -Venezuela-Scopus). Vol. 39 (Nº27) Year 2018. Page 8. – URL:
5179
http://www.revistaespacios.com/a18v39n27/18392708.html
5. Malinetsky G. Designing the future and modernization of Russia / G. Malinetsky // Friendship of Peoples. - 2010. - No. 9. - pp. 167–187.
6. Kurzweil Ray. How to Create a Mind: The Secret of Human Thought Revealed. Penguin Books, 2013. - 352 р.
7. Masuda, Y. The Information Society as Postindustrial Society / Y. Masuda. – Wash.: World Future Soc., 1983. – 419 p.
8. Castells M. Information Age: Economics, Society and Culture / M. Castells; translation from English under scientific ed. by O.I.
Shkaratan. - M.: SU-HSE, 2000. - 608 p.
9. Fukuyama Francis. Our Posthuman Future: Consequences of the Biotechnology Revolution.- New York: Farrar, Straus, and Giroux, 2002.
– 256 pp.
10. Kurashov V.I. Ecology and eschatology (Fates of human existence from a religious and scientific point of view) / V.I. Kurashov // Issues
of Philosophy No. 3 - 1995. - pp. 29-36.
11. Kurashov V.I. The origins of pragmatic anthropology. - M.: KDU, 2007. - 304 p.
12. Kurashov V.I. Ecology and Eschatology // Russian Studies in Philosophy, Winter 1998-99.-Vol. 37, № 3. - pp. 8-19.
13. V. Arshinov “Network Path” of modern nano-techno-scientific practice / V.I. Arshinov // Scientific and journalistic journal NBICS-Nauka.
Technology. - 2017 (1). - No. 1. - pp. 66–76.
14. Dubrovsky D.I. The biological roots of the anthropological crisis. What's next? / D.I. Dubrovsky // Man. - 2012. - No. 6. - pp. 51-54.
15. Dobrynin S. Service people of Mikhail Kovalchuk // Radio Liberty. 01/26/2016. - URL: https://www.svoboda.org/a/27511650.html
16. Bensaude-Vincent B. Technoscience and Convergence: A Transmutation of Values? // Summerschool on Ethics of Converging
Technologies. Dormotel Vogelsberg, Omrod/Alsfeld, Germany. 2008.- рр.10.- URL: https://halshs.archives-
ouvertes.fr/file/index/docid/350804/filename/06BBV.pdf
17. Alekseeva I. Yu., Arshinov V.I., Chekletsov V.V. “Techno-humans” versus “posthumans”: NBIKS-revolution and the future of man /
I.Yu. Alekseeva, V.I. Arshinov, V.V. Chekletsov // The issues of philosophy. - 2013.– No. 3. - pp. 12–21.
18. Suleri, J., & Cavagnaro, E. Promoting pro-environmental printing behavior: The role of ICT barriers and sustainable values. International
Journal of Education and Development using ICT, (2016). 12(2).
19. Gamarra, M., Zurek, E., & San-Juan, H. Addendum for: A Study of Image Analysis Algorithms for Segmentation, Feature Extraction and
Classification of Cells. Journal of Information Systems Engineering & Management, 3(1), (2018). 05.
20. Alkhateeb, M. Multiple Representations in 8th Grade Mathematics Textbook and the Extent to which Teachers Implement Them.
International Electronic Journal of Mathematics Education, 14(1), (2019). 137-145. https://doi.org/10.12973/iejme/3982
21. Taubaye, Z., Rivers, W., Mussabekova, U., & Alimbayeva, A. Peculiarities and problems of eponyms (on the material of Kazakhstani
periodicals). Opción, 34(85-2), (2018). 221-236
Authors: Anvar A. Gafarov
Educational Policy of the Russian Empire in the Turkistan Region (The Second Half of the XIXTH -
Paper Title:
the Beginning of the XXTH Century)
Abstract: The expansion of the Russian Empire was accompanied by a steady increase of its ethnocultural
diversity. The weak integration of Russian society prompted the ruling circles to search for effective ways of the
annexed people introduction to the sociocultural values that dominate in the country. The problem of acculturation
was most difficult in Central Asia, annexed to Russia only in the second half of the 19th century. School policy was
recognized as the most important means of foreigner adaptation to the all-Russian cultural space. However, it had a
rather differentiated character in different regions of the empire. The aim of the undertaken research is to identify
the main trends in the formation and development of Russian educational policy in Turkestan, to identify its
specifics and general aspects with politics in other Muslim regions. The analysis of legislative acts, paperwork,
historical and ethnographic, statistical collections, periodical press materials, as well as the works of prominent
adherents of foreign education allowed the author to draw a conclusion about the unity of the goal-setting principles
and established traditions of state educational policy regarding the Muslim population. Its most important trend was
school policy aimed at local people integration into the public education system. At the same time, the weak
“development” of the Central Asian region prompted the authorities to apply more cautious forms of educational
policy in comparison with other, relatively integrated parts of the country.

Keyword : Turkestan, Russian Empire, educational policy, XIXth - the beginning of XXth century.
References:
1. Khalid A. The politics of Muslim cultural reform: Jadidism in Central Asia / A. Khalid. – Berkeley: University of California Press,
1998. – 300 p.
2. Kotyukova T.V. Turkestan trend of the Duma policy of Russia (1905-1917) / T.V. Kotyukova. - M.: Enter-Graphics, 2008. - 201 p.
3. Gafarov A.A. Russian Muslims Lifestyle Renovation Problems in the Modernistic Literature of the Late 19th and Early 20th Century
// Journal of Sustainable Development. - 2015. - Vol. 8, No. 7. - pp. 178-184.
4. Nabiyev R.A., Gafarov A.A. Phenomenon of Religious Revival in the Context of the Experience of Modernization of the Muslim
Community in the Late XIX - Early XX Centuries // Journal of Sustainable Development. - 2015. - Vol. 8, No. 4. - pp. 253-259.
5. Gafarov A.A., Nabiyev R.A., Fazliev A.M., Nafikov I.Z. “Muslim matter” in the mirror of public discussion (XIX – beginning of XX
century) / A.A. Gafarov, R.A. Nabiyev, A.M. Fazliev, I.Z. Nafikov // Journal of Fundamental and Applied Sciences. – 2017. - No.
9(7S). – pp. 1257-1265.
6. Nazarievsky I.T. Historical outline of the legislation on primary education in Russia / Nazarevsky I.T. // Journal of public education
for 1905 - Part CCCLVII. - February. - pp. 149-186.
911. 7. Ostroumov N. Oscillations in the views on the education of natives in the Turkestan region / N.P. Ostroumov. - Tashkent, 1910. - pp.
1-6, 145-160.
8. Ostroumov N.P. Sarts. Ethnographic materials. Third supplemented version. - Tashkent, 1908. - 288 p.
5180-
9. Turkestan native newspaper. 1885. No. 1. January 12, No. 20. June 5, No. 21. June 12, No. 28. July 31, No. 33. September 7; N o. 43. 5183
November 16; 1886. No. 39. October 18, No. 48. December 20; 1887. No. 1. January 10, No. 2. January 17, No. 7. February 21, No.
8. February 28, No. 11. March 21, No. 13. April 3, No. 14. April 18, No. 15. April 25, No. 16. May 2, No. 18. May 18, No. 19. May
26, No. 29. July 28, No. 31. August 14, No. 33. August 28, No. 35. September 12, No. 36. September 21, No. 47 December 5, No.
49. December 22; 1888. No. 24. June 20, No. 26. July 5, No. 36. September 20, No. 37. September 26.
10. Collection of resolutions on the Ministry of Public Education. V. X. 1885-1888. - SPb., 1894. - 1490 col., 130 col. Eastern Outlook.
1883. No. 38. September 22.
11. Vishegorsky A. Higher Muslim education in Fez / A. Vyshegorsky // Wanderer. - 1890. - March. - pp. 481-488, April. - pp. 660-671.
12. Bobrovnikov N.A. Russian-native schools, mektebs and madrassas of Central Asia. Travel notes / N.A. Bobrovnikov. - SPb., 1913. -
90 p.
13. Syr-Daria region. Description, compiled by E. Smirnov according to official sources. - SPb., 1887. - 355 p.
14. Ostroumov N. Muslim maktabs and Russian-native schools in the Turkestan region / N.P. Ostroumov // Journal of the Ministry of
Public Education. - 1906. - Part I. - January. - pp. 113-166.
15. Gramenitsky S. Essay on the development of public education in the Turkestan region / S.M. Gramenitsky. - Tashkent, 1896. - 86 p.
16. Gramenitsky S. 25th anniversary of academic affairs in the Turkestan region / S.M. Gramenitsky. - Tashkent, 1901. - 26 p. Turkestan
statements. 1875. No. 16. April 22.
17. Bartold V.V. The history of the cultural life of Turkestan / V.V. Barthold. - L.: Publishing House of the Academy of Sciences of the
USSR, 1927. - 256 p.
18. Potanin Gr. In the yurt of the last Kyrgyz prince (From the trip to Kokchetayevsky district) / G.N. Potanin // Russian wealth. - 1896. -
No. 8. - pp. 60-88.
19. N.I. Ilminsky letters to the public prosecutor Konstantin Petrovich Pobedonostsev. - Kazan: Edition of the Editorial Board of the
Orthodox Interlocutor, 1895. - 414 p.
20. Collection of documents and articles on the issue of the education of foreigners. - SPb.: Publishing house of the Partnership "Public
benefit", 1869. - 522 p.
21. The rules on primary schools for foreigners living in eastern and southeastern Russia. - Kazan, 1906. - 13 p.
22. The rules on primary schools for foreigners living in eastern and southeastern Russia, approved by the Ministry of Public Education
on March 31, 1906 and amended on January 2, 1907 - Kazan, 1907. - 6 p.
23. Lobão, J., & Pereira, C. Looking for Psychological Barriers in nine European Stock Market Indices. Dutch Journal of Finance and
Management, 1(1), (2016). 39.
24. Oliveira, F. K. D., Oliveira, M. B. D., Gomes, A. S., & Queiros, L. M. Identifying User Profiles from Statistical Grouping Me thods.
Journal of Information Systems Engineering & Management, 3(1), (2018). 06.
25. Godino, J. D., Rivas, H., Burgos, M., & Wilhelmi, M. R. Analysis of Didactical Trajectories in Teaching and Learning Mathematics:
Overcoming Extreme Objectivist and Constructivist Positions. International Electronic Journal of Mathematics Education, 14(1),
(2019). 147-161. https://doi.org/10.12973/iejme/3983
26. Novikova, I. N., Popova, L. G., Shatilova, L. M., Biryukova, E. V., Guseva, A. E., & Khukhuni, G. T. (2018). Lexical and sema ntic
representation of the linguistic and cultural concept “Rest” in the English, German, and Russian languages. Opción, 34(85 -2), 237-
256

Authors: Igor I. Bikeev, Sergey G. Nikitin, Ildar R. Begishev, Zarina I. Khisamova, Alexandra Yu. Bokovnya
912. Experience of Civil Government of Russian Federation Subjects with Institutions of Civil Society in the
Paper Title:
Sphere of Corruption Counteraction
Abstract: The anti-corruption principles established by the legislation of Russia are represented by state
cooperation with civil society institutions, international organizations and individuals. This work gives the author's
interpretation of “civil society institution” concept. In order to disclose and implement the provisions of the law,
they formulate the criteria to classify various associations of citizens as civil society institutions.
The study describes the possible trends of joint activities of regional government bodies of the Russian
Federation and civil society institutions on anti-corruption issues.
According to the Decree of the President of Russia, specialized anti-corruption bodies have been created in each
constituent entity of the Russian Federation - the commissions for coordination of efforts to combat corruption,
which are endowed with serious powers described in the work. The composition of these commissions may include
the representatives of public chambers, scientific and educational organizations, as well as public organizations
whose statutory tasks is to participate in the fight against corruption. Such a solution makes it possible to increase
the transparency of government body activities and improve public control over it.
Based on the results of the work, they formulate main conclusions, proposals and recommendations for state bodies
and civil society institutions. The thesis is proved that the principle of cooperation between the state and civil
society institutions in the activities of the commissions for anti-corruption work coordination in a number of
Russian regions is not implemented or is implemented formally. The statement is substantiated that the inclusion of
civil society institution representatives in the commissions is often takes place on the basis of loyalty (“convenient
sampling”).

Keyword : corruption, civil society institutions, involvement rate, subjects of the Russian Federation.
References:
1. Coskun, Can Aktan. Political Corruption: An Introductory Study On Terminology And Typology // International Journal Of Social
Sciences And Humanity Studies. 2015. Vol. 7. №1. pp. 47-66.
2. Gorsira, Madelijne, Denkers, Adriaan and Huisman, Wim. Both Sides of the Coin: Motives for Corruption Among Public Officials and
Business Employees // Journal of Business Ethics. 2018. Vol. 151. pp. 179-194. Available at: https://doi.org/10.1007/s10551-016-3219-2
3. Teachout, Zephyr. Love, Equality, and Corruption // Fordham Law Revue. 2015. Vol. 84. Iss. 2. Article 5. pp. 453 -461. Available at:
http://ir.lawnet.fordham.edu/flr/vol84/iss2/5 5184-
4. Ouziel, Lauren M. The Regulatory Challenge of Public Corruption // Journal of Criminal Law and Criminology. 2018. Vol. 108. I ss. 3.
Article 7. pp. 639-652. Available at: https://scholarlycommons.law.northwestern.edu/jclc/vol108/iss3/7 5187
5. Medina, Jessica. When Rhetoric Obscures Reality: The Definition of Corruption and Its Shortcomings // Loyola of Los Angeles Law
Review. 2015. Vol. 48. Iss. 3. Pp. 597-650. Available at: https://digitalcommons.lmu.edu/llr/vol48/iss3/3
6. Lessig, Lawrence What an Originalist Would Understand “Corruption” to Mean // California Law Review. 2014. Vol. 102. Iss. 1. Article
1. pp. 1-24. Available at: https://doi.org/10.15779/Z38DF8D
7. Collection of the Russian Federation legislation. - 2015. - No. 29 (part II). - Art. 4477.
8. Greate encyclopedic dictionary. V. 1. / Ed. in charge A.M. Prokhorov. - M.: Soviet Encyclopedia, 1991. - p. 333.
9. Campbell, Kaycea. A Statistical Analysis of Public Sector Corruption and Economic Growth, // LUX: A Journal of Transdisciplinary
Writing and Research from Claremont Graduate University. 2013. Vol. 2: Iss. 1, Article 6. pp. 1 -20. Available at:
http://scholarship.claremont.edu/lux/vol2/iss1/6
10. Quah, Jon S.T. Combating Asian Corruption: Enhancing The Effectiveness Of Anti-Corruption Agencies // Contemporary Asian Studies
Series. 2017, October. pp. 1-83.
11. Meyer Michael, Moder Clara, Neumayr Michaela, Vandor Peter. Civil Society and Its Institutional Context in CEE // International Society
for third-sector Research. Voluntas. 2019. 11 March. pp. 1-17. Available at: https://doi.org/10.1007/s11266-019-00106-7
12. Coskun, Can Aktan. Ethics In Government: Anti-Corruption Measures // International Journal Of Social Sciences And Humanity Studies.
2015. Vol. 7. №2. pp. 63-89.
13. Scheimer, Michael. Introduction Symposium: Russia and the Rule of Law: New Opportunities In Domestic and International Affairs //
American University International Law Review. 2010. Vol. 25. Iss. 2. Symposium: Russia and the Rule of Law: New Opportunities in
Domestic and International Affairs. Article 1. pp. 199-211.
14. Michale, Bryane. Issues in Anti-Corruption Law: Drafting Implementation Regulations for Anti-Corruption Conventions in Central Europe
and the Former Soviet Union // Journal of Legislation. 2010. Vol. 36. Iss. 2. Article 12. pp. 272-296.
15. Woodruff, David M. Law’s Authorizations And Rule Of Law Ideals: Lessons From Russia // GA. J. INT’L & COMP. Law. 2012. Vol. 4 1.
pp. 157-185.
16. Kuhner, Timothy K. The Corruption of Liberal and Social Democracies // Fordham Law Review. 2016. Vol. 84. Iss. 6. Article 3. pp. 2453-
2476.
17. Luo, C., Li, M., Peng, P., & Fan, S. How Does Internet Finance Influence the Interest Rate? Evidence from Chinese Financial Markets.
Dutch Journal of Finance and Management, 2(1), (2018). 01.
18. Araújo, C., Henriques, P. R., & Martini, R. G. Virtual Learning Spaces Creation Based on the Systematic Population of an Onto logy.
Journal of Information Systems Engineering & Management, 3(1), (2018). 07.
19. Escalera Chávez, M. E., Moreno García, E., & Rojas Kramer, C. A. Confirmatory Model to Measure Attitude towards Mathematics in
Higher Education Students: Study Case in SLP Mexico. International Electronic Journal of Mathematics Education, 14(1), (2019) . 163-
168. https://doi.org/10.29333/iejme/3984
20. Shatilova, L. M., Borisova, V. V., & Kasatkina, O. A.. Representation of the linguistic and cultural concept “lie” in the French and Russian
language picture of the world. Opción, 34(85-2), (2018). 257-276.

Authors: Samson A. Liberman

Paper Title: Historical Examination of Agent Concept


Abstract: Throughout the development of thought from the classical forms of philosophizing to the present,
the understanding of the subject also changes. The transition from the Hegelian substance subject to the individual
913. transcending subject is carried out, and then the “death of the subject” in all its forms (God, social, author, etc.).
Such a fundamentally new understanding, the interpretation of human consciousness and being, is primarily 5188-
associated with the emergence of a fundamentally new way of this consciousness functioning. This work is devoted 5191
to the consideration of this determining connection between the forms of theoretical problematization of a subject
in philosophical thought and changes in social structure. They may consider the allocation of three main historical
stages of the subject problematization and the corresponding forms of social as the main results. In the era of the
New Age, there is understanding of a subject as a participant in history, who is the product of history and the
creator. At the turn of the nineteenth and twentieth centuries, this understanding is being transformed and refined.
Now they deny subject rootedness in the transcendental field on the one hand, and this rootedness should seek and
achieve on the other hand. The motive for a breakthrough towards the absolute and overcoming one's own
“queerness” becomes the main one. In the second half of XXth century, they form a special view of the subject - he
is now problematized as absent.

Keyword : social subject, subject death, mass person, transcending, ideology.


References:
1. Sogomonov A.Yu., Uvarov P.Yu. The discovery of social (paradox of the XVIth century). // Odyssey. M.: Nauka, 2001.
2. Hegel, G.W.F. (1975). Lectures on the philosophy of world history. Introduction, reason in history. (translated from the German edition
of Johannes Hoffmeister from Hegel papers assembled by H. B. Nisbet). New York, NY: Cambridge University Press.
3. Tereshchenko N.A. Social philosophy after the "death of the social." - Kazan: Kazan Univ., 2011. - 368 p.
4. Nietzsche, F. (2004) Human, All Too Human. Penguin Classics. Transl. Marion Faber. Penguin Books
5. Marx, K.; Engels, F. (2004) Manifesto of the Communist Party. Marxists Internet Archive. Retrieved on 14 March 2015
6. Freud, S. (1949) The Ego and the Id. The Hogarth Press Ltd. London.
7. Mamardashvili M.K. Classics and Modernity: Two Eras in the Development of Bourgeois Philosophy / M.K. Mamardashvili, E.Yu.
Soloviev, V.S. Shvyrev. M.: 1972. - 50 p.
8. Marcuse, Herbert (1991) One-dimensional Man: studies in ideology of advanced industrial society. London: Routledge
9. Baudrillard, J. (1983). In the Shadow of the Silent Majorities. Semiotext(e)
10. Baudrillard, J. (1994). Simulacra and simulation. University of Michigan press.
11. Ameen, A. M., Ahmed, M. F., & Hafez, M. A. A. (2018). The Impact of Management Accounting and How It Can Be Implemented into
the Organizational Culture. Dutch Journal of Finance and Management, 2(1), 02.
12. Peres, P., Moreira, F., & Mesquita, A. (2018). Are Really Technologies at the Fingers of Teachers? Results from a Higher Education
Institution in Portugal. Journal of Information Systems Engineering & Management, 3(1), 08.
13. Kor, L., Teoh, S., Binti Mohamed, S. S. E., & Singh, P. (2019). Learning to Make Sense of Fractions: Some Insights from the Ma laysian
Primary 4 Pupils. International Electronic Journal of Mathematics Education, 14(1), 169-182. https://doi.org/10.29333/iejme/3985
14. Nurgaliyeva, S., Zeynolla, S., Tulenova, U., Zulkarnayeva, Z., & Yespolova, G. (2018). Features of institutional autonomy of the
Kazakhstan’s universities. Opción, 34(85-2), 302-336

Authors: Arthur I. Khabirov, Gulnara M. Khamitova

Paper Title: Legal Aspects of the Need to Create Dna Database for Military Personnel
Abstract: The relevance of this problem is conditioned by the prevailing political situation in the world
community. Both world and local wars almost always entail many deaths, there are the cases of mass burial of the
dead. In such cases, dead can often be determined only by genomic identification. Indirect DNA diagnostics are
being used now, but the use of direct methods is more economical and faster, which requires the creation of a
genomic data-base of all people who will be on the battlefield.
In the armed forces of the Russian Federation, soldiers carry an aluminum token on their chest, on which in-
formation about the name and blood type is stamped. This method was used back in World War II to determine the
identity of a soldier at his death. Of course, this method is not particularly effective, since it is quite difficult to
"identify" a person by such small fragments. In this case, the help of geneticists is needed. The 124th Central Medi-
cal Identification Research Laboratory of the Ministry of Defense of the Russian Federation, located in Rostov-on-
Don, which was engaged in the identification of people in the Chechen Republic, has extensive identification
experience.
At first, during the first Chechen campaign, the names of 700 dead servicemen were identified thanks to special
laboratory methods. Further, the number of identified persons was already about 3 thousand, and this was not due
to the fact that the number of losses increased.
Research is still ongoing. And, despite the fact that geneticists did a great job to identify the dead, there are still
914. inscriptions on the graves: "Unknown soldier." A number is put in the place of the name with the hope that
someday it will still be possible to identify this fighter [1].
5192-
5194
Keyword : DNA examination, identification of military men, unidentified soldiers, genomic registration, ge-
nomic base, DNA base, DNA material, identification of people .
References:
1. Ruslan Kadrmatov. Under his own name // Independent newspaper [Electronic resource]. - URL: http://nvo.ng.ru/notes/2003-08-
29/8_selfname.html (reference date: 5.03.18).
2. Olga Artemyeva, Vladimir Litvinov. This is the face of war // Gazeta.ru [Electronic resource]. URL:
https://www.gazeta.ru/social/2014/09/23/6233273.shtml (reference date: 03/14/18).
3. Byazrova K.P., Tokmakov D.S. To the issue of genome registration use in the investigation of crimes // Actual problems of
jurisprudence: a collection of articles based on the materials of the Vth international scientific-practical conference No. 5 (5). -
Novosibirsk: SibAK, 2017. - pp. 6-11. (reference date: 03/05/18).
4. Comparative Law. An Introduction to the Comparative Method of Legal Study and Research. By Gutteridge H. C., K.C., LL.D.
(Cambridge Studies in International and Comparative Law, Vol. I.) – London: Cambridge University Press. The Cambridge Law
Journal. – 1947. – 9(3). – pp. 386-387.
5. Dale, William. Legislative Drafting: A New Approach: a Comparative Study of Methods in France, Germany, Sweden and the United
Kingdom. – London: Butterworths, 1977. – 341 p.
6. Artur I. Khabirov, Gulnara M. Khamitova. On The Issue of the Place of a Loan Commitment in the System of the Russian Law of
Obligations // The Journal of Social Sciences Research. –2018. – Special Issue – 5. – pp. 421-424.
7. Siems, M., & Mac Síthigh, D. Mapping legal research. The Cambridge Law Journal. – 2012. – 71(3). – pp. 651-676.
8. Davies, P. Rectification versus interpretation: the nature and scope of the equitable jurisdiction. – The Cambridge Law Journal. – 2016.
– 75(1). – pp. 62-85.
9. Khabirov Artur. On the issue of the consensual construction of a loan agreement // National Academy of Managerial Staff of Culture
and Arts Herald. – 2018. – № 3. – pp. 70-73.
10. Khabirov A. I., Khamitova Gulnara M. Legal problems of vaccinal prevention // DILEMAS CONTEMPORANEOS-EDUCACION
POLITICA Y VALORES. - 2018. - Vol.6, Is. - Art. №39.
11. Victoria Safronova. About a hundred years later, a mammoth will run in our zoo. // Russian planet [Electronic resource]. URL: https:
//rusplt.ru/info/about-copy/ (reference date: 5.03.18).
12. A.A. Panova, A.F. Sokolov. Generic Genomic Registration: pro et contra. // Encyclopedia of forensics [Electronic resource]. - URL:
http://www.proexpertizu.ru/general_questions/616/ (reference date: 5.03.18).
13. Muyambiri, B., & Chabaefe, N. N. The Finance–Growth Nexus in Botswana: A Multivariate Causal Linkage. Dutch Journal of Finance
and Management, 2(2), (2018). 03.
14. Martínez-Alcalá, C. I., Ramírez-Salvador, J. A., Rosales-Lagarde, A., & Jiménez-Rodríguez, B. Assistance and Support of Primary
Caregivers through an eService Platform. Journal of Information Systems Engineering & Management, 3(1), (2018).09.
15. Koskenoja, M. Factors Supporting and Preventing Master Thesis Progress in Mathematics and Statistics – Connections to Topic and
Supervisor Selection. International Electronic Journal of Mathematics Education, 14(1), (2019). 183-195.
https://doi.org/10.29333/iejme/3986
16. Zhatkin, D. Russian literary-critical reception of Burns at turning of the XIX–XX centuries. Opción, 34(85-2), (2018). 277-300

Authors: Taruna Sharma, Ruchi Mittal

Paper Title: Classification of Plant leaf diseases: A Deep Learning Method


Abstract: For the continuous existence of human life, agriculture plays a vital role due to the dependency of
lives of people on it for production of food. In order to meet high production rate, precision farming is required.
Presently, substantial developments attained “in the field of image processing and recognition” which has being a
foremost challenge earlier in the practice of Precision farming. The reduction in the growth, quality and quantity of
plants is due to expansion of plant diseases.The survey literature confers various plant leaf diseases and their
detections during different phases through various state of art machine and deep learning techniques. The particular
emphasis in this paper is on detection and classification of plant “leaf diseases” through deep “convolutional neural
networks algorithms.

Keyword : Classification, Plant Leaf, Production of foof, Convolutional.


References:
1. Golhani, K., Balasundram, S. K., Vadamalai, G., & Pradhan, B. (2018). A Review of NeuralNetworks in Plant Disease Detection using
Hyperspectral Data. Information Processing in Agriculture.
915. 2. Kaur, S., Pandey, S., &Goel, S. (2018). Plants Disease Identification and Classification ThroughLeaf Images: A Survey. Archives of
Computational Methods in Engineering, 1-24. https://study.com/academy/lesson/plant-diseases-types-identification-tests.html 5195-
3. Ipm images. https://www.ipmimages.org/about/. Accessed 15May 2017.
4. APS Imagdatabase.https://imagedatabase.apsnet.org/search.aspx. Accessed 16 May 2017.
5197
5. Chitradevi B,Srimathi2 P. (2014). An Overview on Image Processing Techniques.International Journal of Innovative Research in
Computer and Communication Engineering
6. Amara J, Bouaziz B, Algergawy A. A Deep Learning-based Approach for Banana Leaf Diseases Classification. InBTW (Workshops)
2017 (pp. 79-88).
7. Atabay HA. Deep Residual Learning for tomato plant leaf disease identification. Journal of Theoretical & Applied Information
Technology. 2017 Dec 31; 95(24):6800-6808.
8. Oppenheim D, Shani G. Potato Disease Classification Using Convolution Neural Networks. Advances in Animal Biosciences. 2017 Jul;
8(2):244-249.
9. Wang G, Sun Y, Wang J. Automatic image-based plant disease severity estimation using deep learning. Computational intelligence and
neuroscience. 2017; Vol. 2017: 1-8.
10. Atole RR, Park D. A Multiclass Deep Convolutional Neural Network Classifier for Detection of Common Rice Plant Anomalies.
International Journal of Advanced Computer Science and Applications. 2018 Jan 1; 9(1):67-70.
11. Liu B, Zhang Y, He D, Li Y. Identification of Apple Leaf Diseases Based on Deep Convolutional Neural Networks. Symmetry. 2017
Dec 29; 10(1):11.
12. Llorca C, Yares ME, Maderazo C. Image-Based Pest and Disease Recognition of Tomato Plants Using a Convolutional Neural
Network.2018
13. Ma J, Du K, Zheng F, Zhang L, Gong Z, Sun Z. A recognition method for cucumber diseases using leaf symptom images based on de ep
convolutional neural network. Computers and electronics in agriculture. 2018 Nov 1;154:18-24.

Authors: Puninder Kaur, Ruchi Mittal

Paper Title: Ontology Based Method for Sentiment Examination


Abstract: In recent years, sentiment analysis became an important concept which is used to extract an
important feature or text mining according to our interest. It is very difficult to judge the polarity or the review of
particular product. This problem is solved by ontology. Ontology is a formal and shared specification of a particular
domain. It is a large semantic network used to extract a domain specific concept or domain specific features of a
particular product. Ontology contains concept which means domain and sets of objects or we can say instance of
concept and relationship between various objects. Ontology based approach is classification of opinion and feature-
916. based approach. Ontology gives domain specific features along with the hieratical relationship between them.
Ontology generates semantic graphs and tree for showing relationship between different domains and entities. The 5198-
relationship can be done on the basis of nodes and edges connections. We use some contextual lexicons which are 5201
used to provide the opinion about particular domain like SentiWordNet, SenticNet, WordNet etc. This survey aims
to provide an insight on Opinion target, Opinion lexical and Aspect based Polarity detection, sentiment aggregation.

Keyword : ontology, aspect level polarity, semantic network, SentiWordNet, SenticNet, sentiment analysis.
References:
1. Padmaja, S., & Fatima, S. S. (2013). Opinion mining and sentiment analysis-an assessment of peoples' belief: A survey. International
Journal of Ad hoc, Sensor & Ubiquitous Computing, 4(1), 21.
2. Jagtap, V. S., & Pawar, K. (2013). Analysis of different approaches to sentence-level sentiment classification. International Journal of
Scientific Engineering and Technology, 2(3), 164-170.
3. Vivekanandan, K., & Aravindan, J. S. (2014). Aspect-based opinion mining: A survey. International Journal of Computer
Applications, 106(3).
4. Ravi, K., & Ravi, V. (2015). A survey on opinion mining and sentiment analysis: tasks, approaches and applications. Knowledge-Based
Systems, 89, 14-46.
5. Kolkur, S., Dantal, G., & Mahe, R. (2015). Study of different levels for sentiment analysis. International Journal of Current Engineering
and Technology, 5(2), 768Ű770.
6. Devika, M. D., Sunitha, C., & Ganesh, A. (2016). Sentiment analysis: A comparative study on different approaches. Procedia Computer
Science, 87, 44-49.
7. Kharde, V., & Sonawane, P. (2016). Sentiment analysis of twitter data: a survey of techniques. arXiv preprint arXiv:1601.06971
8. Mäntylä, M. V., Graziotin, D., & Kuutila, M. (2018). The evolution of sentiment analysis—A review of research topics, venues, and top
cited papers. Computer Science Review, 27, 16-32.
9. Borth, D., Ji, R., Chen, T., Breuel, T., & Chang, S. F. (2013, October). Large-scale visual sentiment ontology and detectors using
adjective noun pairs. In Proceedings of the 21st ACM international conference on Multimedia (pp. 223-232). ACM.
10. Kreutzer, J., & Witte, N. (2013). Opinion Mining Using SentiWordNet. Uppsala University.
11. Mukherjee, S., & Joshi, S. (2013). Sentiment aggregation using ConceptNet ontology. In Proceedings of the Sixth International Joint
Conference on Natural Language Processing (pp. 570-578).
12. Nithish, R., Sabarish, S., Kishen, M. N., Abirami, A. M., & Askarunisa, A. (2013, December). An Ontology based Sentiment Analysis
for mobile products using tweets. In Advanced Computing (ICoAC), 2013 Fifth International Conference on (pp. 342-347). IEEE.
13. Singh, V. K., Piryani, R., Uddin, A., & Waila, P. (2013, March). Sentiment analysis of movie reviews: A new feature-based heuristic for
aspect-level sentiment classification. In Automation, computing, communication, control and compressed sensing (iMac4s), 2013
international multi-conference on (pp. 712-717). IEEE.
14. Cambria, E. (2013, November). An introduction to concept-level sentiment analysis. In Mexican international conference on artificial
intelligence (pp. 478-483). Springer, Berlin, Heidelberg.
15. Kontopoulos, E., Berberidis, C., Dergiades, T., & Bassiliades, N. (2013). Ontology-based sentiment analysis of twitter posts. Expert
systems with applications, 40(10), 4065-4074.
16. Cambria, E., Schuller, B., Xia, Y., & Havasi, C. (2013). New avenues in opinion mining and sentiment analysis. IEEE Intelligent
Systems, 28(2), 15-21.
17. Freitas, L. A., & Vieira, R. (2013, May). Ontology based feature level opinion mining for portuguese reviews. In Proceedings of the
22nd International Conference on World Wide Web (pp. 367-370). ACM.
18. Najmi, E., Hashmi, K., Malik, Z., Rezgui, A., & Khanz, H. U. (2014, November). ConceptOnto: An upper ontology based on
Conceptnet. In Computer Systems and Applications (AICCSA), 2014 IEEE/ACS 11th International Conference on(pp. 366-372). IEEE.
19. Haider, S. Z. (2012). AN ONTOLOGY BASED SENTIMENT ANALYSIS: A Case Study
20. Lau, R. Y., Li, C., & Liao, S. S. (2014). Social analytics: Learning fuzzy product ontologies for aspect-oriented sentiment
analysis. Decision Support Systems, 65, 80-94.

Authors: Kartik Singhal, Rani Medhashree, Ranganath M. Singari


Differentiation of Mamdani and Sugeno Fuzzy Inference System in developing Automatic Plant
Paper Title:
Watering Systems for Domestic Use
Abstract: Water management systems are an essential requirement for maintaining plants. One of the major
problems encountered in growing plants in houses, offices or buildings with in-house kitchen gardens is irregular
irrigation patterns. This leads to over irrigation of pots or elongated durations of dry soil, both conditions ill for
plant growth. This problem is further aggravated when manual irrigation ignores the environmental conditions and
plant specific requirements. Utilizing Fuzzy logic for developing Automatic Plant watering systems provide
flexibility in manipulating input parameters such as Temperature, Humidity, Soil Moisture and Plant Growth to
determine optimum flow rate of the irrigation system. In this study, multiple fuzzy systems are developed for
different environments and parameters. MATLAB is used for designing the fuzzy logic controllers using both
Mamdani and Sugeno Models. The requirement for the system is to adjust the flow rate in accordance with the
environmental conditions and plant requirements. The paper draws comparison between Mamdani and Sugeno
methods on the basis of their performance characteristics for different environments. It also provides development
917. of an effective controller for a watering system for household plantations.
5202-
5209
Keyword : MATLAB, Fuzzy logic, micro-irrigation, Mamdani and Sugeno Systems, House plants, Smart
irrigation systems.
References:
1. https://www.epa.gov/watersense/microirrigation
2. real-life applications of fuzzy logic, advances in fuzzy systems, volume 2013, article id 581879, 3 pages,
http://dx.doi.org/10.1155/2013/581879
3. http://personales.upv.es/asala/publics/papers/c24alca98.pdf
4. https://vision.unipv.it/ia2/aa2004-2005/designoffuzzycontrollers.pdf
5. Fuzzy logic based irrigation control system using wireless sensor network for precision agriculture
6. Drip irrigation for row crops, university of California, Davis
7. Fuzzy logic to control dam system for irrigation and flooding, Ms. Neelam p. Naik
8. Plant watering management system using fuzzy logic approach in oil palm nursery
9. Simulation of fuzzy logic for watering plant using sprinkler

Authors: Kanika Sharma

Paper Title: (Bio)Social Collectives and Social Media: Acid Attack Survivors in India
918. Abstract: With the increase in social media usage in contemporary times, there is formation of new collectives
and identities. Social media had been trending due to its influence and reach in the community creating a space for 5210-
the ‘voice’ for many disadvantaged groups. With the help of Paul Rabinow’s concept of biosocialities, this study 5214
had identified certain collectives and their networks of acid attack survivors. In-depth interviews were conducted
with survivors, civil society members and surgeons. Narrative analysis was done to understand the negotiations of
survivors for their self and to form their collectives such as advocacy groups, interest from international
communities and advancements in medical techniques.

Keyword : acid attacks, social media, biosocial groups, Rabinow, collectives.


References:
1. Butler, J. (1993). Bodies That Matter: On the Discursive Limits of Sex. New York: Routledge Publishers.
2. Foucault, M. (1978). History of Sexuality, Vol. I. New York: Pantheon Books.
3. Gibbon, S. and Novas C. (2008). Biosocialities, Genetics and the Social Sciences. London: Routledge Publishers.
4. Gibbon, S. (2008). "Charity, breast cancer activism and the iconic figure of the BRCA carrier". In Biosocialities, Genetics and the
Social Sciences: Making Biologies and Identities, edited by Sahra Gibbon, 1st ed., London: Routledge Publishers.
5. Haraway, D. (1988). "Situated Knowledges: The Science Question in Feminism and the Privilege of Partial Perspective". Feminis t
Studies, Vol. 14 No. 3, pp 575-599.
6. Lopes, A.R (2014). The Impact of Social Media on Social Movements: The New Opportunity and Mobilizing Structure. Accessed
from
http://www.creighton.edu/fileadmin/user/CCAS/departments/PoliticalScience/Journal_of_Political_Research__JPR_/2014_JSP_pape
rs/Lopes_JPR.pdf on 10th March, 2018.
7. Pylpa, J. (1998). "Power and Bodily Practice: Applying the Work of Foucault to Anthropology of the Body". Arizona Anthropologist
13: 21-36.
8. Rabinow, P.(2005). "Artificiality to Elightenment: From Sociobiology to Biosociality". In Anthropologies of Reason, edited by
Jonathan Xavier Inda 1st ed. London: Blackwell Publishing.
9. Rabinow, P. (2008). "Afterword: concept work". In Biosocialities, Genetics and the Social Sciences: Making Biologiestnd Identities,
edited by Sahra Gibbon, 1st ed. London: Routledge Publishers.
10. Rainbow, P. and Rose, N. (2009). "Thoughts on the concept of biopower today. 2003." Acesso em 5
11. Shaw, A. (2016). Role of Social Media in Social Mobilization (with special reference to Shahbag and Hokkolorob movements.
Global Media Journal, 7(1), 1-8.
12. Weaver, J. (2014). " Out of sight, out of mind: keeping Russia closeted: A Biopolitical Analysis of Non-Normative Sexualities in
Russia." Master Thesis. Cross Border University.
13. Taylor, D. (2011) (ed.). Michel Foucault: Key Concepts. Jaipur: Rawat Publications.
14. Oksala, J. (2010). "Violence and the Biopolitics of Modernity." Foucault Studies 10: 23-43.
15. Clarke, A. et al. (2003). “Biomedicalization: Technoscientific Transformations of Health, Illness, and U.S. Biomedicine.” American
Sociological Review 68(2): 161-194.

Authors: Y. K. Suneetha, Shabnam Siddiqui


Synthesis and Characterization of Nanosize Catalyst for the RWGS Process and Performance
Paper Title:
Examination Using a Pilot-Scale High-Pressure Reactor
Abstract: Catalyst reduces the activation energy of molecules and is generally composed of an active part
distributed on a large surfaced stable support or ligand. Since the catalytic reactions occur at the surface of the
catalyst, this necessitates the method of catalysts preparation after suitable pretreatment to have an active,
moderately high and accessible surface area. Also, the pretreated catalysts should have sufficient mechanical
strength and stability so that the particles will remain relatively unchanged during their use as catalysts.
Nanosize metal oxide catalysts deposited on alpha-alumina are prepared using combustion synthesis in the
present work. Alumina acts as support, a promoter as well as a catalyst in this process. Aluminum nitrate, cobaltous
chloride, nickel chloride, ammonium molybdate, and urea are used as raw materials to synthesize cobalt-nickel-
molybdenum on alumina by combustion method. The solution at 500oC in a muffle furnace produced voluminous
solid within 5 minutes. Particle size, morphology, chemical characterization of the sample were analyzed by
scanning electron microscopy (500 nm), X-ray diffraction, and energy disperses X-ray analysis techniques. The
results showed that the concentration of nickel among all three promoters was the least.
Increasing levels of carbon dioxide in the atmosphere have detrimental effects such as an increase in temperatures,
melting of glaciers, the rise in the levels of seas and oceans, submergence of low-lying land areas and disruptions in
the ecological cycles. In order to combat this, the present work was extended to convert carbon dioxide to carbon
919. monoxide by reverse water gas shift reaction. Carbon monoxide can be later used to produce methanol and
dimethyl ether which has a higher calorific value. Present process was carried out in a pilot-scale high-pressure 5215-
reactor at 400℃and 7 bar using nanoparticles of nickel-cobalt-molybdenum on alumina. Product stream was 5220
analyzed by gas chromatography with a thermal conductivity detector.

Keyword : Reverse Water Gas Shift Reaction, High-pressure Reactor, Nanocatalyst, Combustion Synthesis.
References:
1. http://www.brainyquote.com/quotes/keywords/climate_change.html.
2. http://www.preservearticles.com/201101032332/harmful-effects-of-carbon-dioxide.html.
3. http://www.livescience.com/37057-global-warming-effects.html.
4. http://teeic.indianaffairs.gov/er/carbon/carboninfo/reduce/index.html.
5. Kim S.S., Park K.H., and HongS.C., ‘A study of the selectivity of the reverse-water-gas-shift reaction over Pt/TiO2 catalysts’, Fuel
Process. Techno., Vol.108, 2013, pp 47-54.
6. Khirsariya P. and Raju K.M., ‘Single-step oxidation of methane to methanol–towards better understanding’, Procedia Engg., Vol.51, 2013,
pp 409-415.
7. Yang R., Yu X., Zhang Y., Wenze Li, and Noritatsu Tsubaki,’ A new method of low-temperature methanol synthesis on Cu/ZnO/Al2O3
catalysts from CO/CO2/H2’, Fuel, Vol. 87, 2008, pp 443-450.
8. Vibhatavata P., Borgard J.M., Tabarant M., Bianchi D., and Mansilla C., ‘Chemical recycling of carbon dioxide emissions from a cement
plant into dimethyl ether, a case study of an integrated process in France using a reverse water gas shift (RWGS) step’, Int. J. Hydrogen
Energy, Vol. 38, 2013, pp. 6397-6405.
9. Jadhav S.G., Vaidyaa P.D., Bhanage B.M., and Joshi J.B., ‘Catalytic carbon dioxide hydrogenation to methanol: A review of recent
studies’, Chem. Engg. Res. Des., Vol. 92, 2014, pp. 2557–2567.
10. A. Gharibi Kharaji and A. Shariati, ‘Performance of Co-Mo/Al2O3 nanocatalyst for CAMERE process in a batch reactor’ Chem. Biochem.
Engg. Q., Vol. 27 (3), 2013, pp. 275-278.
11. Wennersten R., Sun Q. and Li H., “The future potential for carbon capture and storage in climate change mitigation - an overview from
perspectives of technology, economy, and risk”, J. Cleaner Prod., 2014, pp. 1-13.

Authors: Navita Nathani, Garima Mathur, Gunjan Dwivedi

Paper Title: Social Responsibility and Academic Achievement: A Perceptual Learning


Abstract: The rise of social responsibility in students has been exposed to be linked with academic
achievement, success and higher self-esteem. Academic achievement stands for performance of a person to
accomplished specific objectives in the instructional atmosphere of school, college and university. This study is an
attempt to identify the domain that contributes to the development of social responsibility and competence in
students which ultimately facilitates academic achievement. For this purpose the data gathered through a
standardized questionnaire from the students of postgraduate and undergraduate courses like MBA, BBA and
engineering etc. The collected responses then analyzed through Exploratory Factor analysis, confirmatory factor
analysis and other statistical tools. The results suggested that student’s social responsibility contributes a lot in
academic performance. However it is an important instrument in acquiring academic objectives. The study further
reduced the items in four factors of social responsibility and four factors of academic achievement.

Keyword : Social Responsibility, Academic Achievement, CFA, Academic Performance .


References:
1. Berman, S. (1997). Social Consciousness and the Development of Social Responsibility. Albany, NY: State University of New York
Press.
2. Blatz, W. E. (1944).Understanding the Young Child. New York: Wm. Morrow & Co. Blumenfeld, P. C Pintrich, P. R., & Hamilton,
V. L. (1986). Children's concepts of ability, effort, and conduct. American Educational Research Journal, 23, 95-104.
3. Caspi, A., Elder, G. H., & Bern, D.J. (1987). Moving against the world: Life-course patterns of explosive children. Developmental
Psychology, 23, 308-313.
4. Bierman, K.L Kalvin, C. B., & Heinrichs, B. S. (2015). Early childhood precursors and adolescent sequalae of grade school pee r
rejection and victimization. Journal of Clinical Child & Adolescent Psychology, 44 (3), 367–379.
5. Blandon, A. Y., Calkins, S. D., Grimm, K. J., Keane, S. P., & O’Brien, M. (2010). Testing a developmental cascade model of
emotional and social competence and early peer acceptance. Development and Psychopathology, 22, 737–748.
6. Hartup, W. W. (1992). Having friends, making friends and keeping friends: Relationships as educational contexts. ERIC Digest.
Champaign, IL: ERIC Clearinghouse on Elementary and Early Childhood Education.
7. Hill, A. L., Degnan, K. A., Calkins, S. D., & Keane, S. P. (2006). Profiles of externalizing behavior problems for boys and girls
across preschool: The roles of emotion regulation and inattention. Developmental Psychology, 42, 913–928.
8. Katz, L. G., & McClellan, D. E. (1997). Fostering children's social competence: the teacher's role. Washington, DC: National
Association for the Education of Young Children.
9. Kathryn R. Wentzel (1991). Relations between Social Competence and Academic Achievement in Early Adolescence. Child
920. Development, 62(5),1066-1078
10. Ladd, G. W. (1999). Peer relationships and social competence during early and middle childhood. Annual review of psychology. doi:
10.1146/annurev.psych.50.1.333
5221-
11. Ladd, G. W. (2000). The fourth R: Relationships as risks and resources following children's transition to school. American 5226
Educational Research Association Division E Newsletter, 19(1), 7, 9–11.
12. Ladd, G. W., & Profilet, S. M. (1996). The child behavior scale: A teacher-report measure of young children's aggressive,
withdrawn, and pro-social behaviors. Developmental Psychology, 32, 1008–1024. doi: 10.1037/0012-1649.32.6.1008
13. McClellan, D. E., & Kinsey, S. (1999) Children's social behavior in relation to participation in mixed-age or same-age
classrooms. Early Childhood Research & Practice, 1(1)
14. Parker, J. G., & Asher, S. R. (1987). Peer relations and later personal adjustment: Are low-accepted children at risk? Psychological
Bulletin, 102,357–389.doi: 10.1037/0033-2909.102.3.357
15. Abbott, H. C. (1960) A study of the relationship between child-rearing practices and school achievement. Harvard Graduate School
of Education.
16. Aiken, L. S., & West, S. G. (1991). Multiple regression: Testing and interpreting interactions. Newbury Park, CA: Sage Publications.
17. Barber, B. K. (1996). Parental psychological control: Revisiting a neglected construct. Child Development, 67, 32963319
18. Barber, B. K. (2002). Intrusive parenting: How psychological control affects children and adolescents. Washington, DC: Americ an
Psychological Association.
19. Cowen, E. L., Hightower, A. D., Pedro-Carroll, J. L., Work, W. C., Wyman, A., & Haffey, W. G. (1996)
20. Darling, N., & Steinberg, L. (1993). Parenting style as context: an integrative model. Psychological Bulletin, 113, 487496
21. Deci, E. L., Driver, R. E., Hotchkiss, L., Robbins, R. J., & Wilson, I. M. (1993). The relations of mothers controlling vocalizations to
children’s intrinsic motivation. Journal of Experimental Child Psychology, 55, 151162
22. Deci, E.l,Eghrari, H., Patrick, B. C., & Leone, D. R. (1994). Facilitating internalization: the self-determination theory perspective.
Journal of Personality, 62, 118142
23. Deci, E. L., Koestner, R., & Ryan, R. M. (1999). A meta-analytic review of experiments examining the effects of extrinsic rewards
on intrinsic motivation Psychological Bulletin, 125, 627668
24. Deci, E. L., Nezlek,J., & Sheinman, L.(1981).Characteristics of the rewarder and intrinsic motivation of the rewardee. Journal of
Personality & Social Psycho- logy, 40, 110
25. Deci, E. L., & Ryan, R. M. (1985). Intrinsic motivation and self-determination in human behavior New York: Plenium Press.
26. Grolnick, W. S., Ryan, R.M. & Deci, E.L. (1991). The inner resources for school achievement: Motivational mediators of children’s
perceptions of their parents. Journal of Educational Psychology, 83 (4), 508517
27. Harrington, D. M., Block, J. H., & Block, J. (1987). Testing aspects of Carl Rogers theory of creative environments: Child -rearing
antecedents of creative potential in young adolescents. Journal of Personality and Social Psychology, 52, 851856
28. Joussemet, M., Koestner, R., Lekes, N., & Houlfort, N. (2004). Introducing un-interesting tasks to children: A comparison of the
effects of rewards and autonomy support. Journal of Personality, 72 (1), 139166
29. Koestner, R., Ryan, R. M., Bernieri, F., & Holt, K. (1984). Setting limits on children’s behavior: The differential effects of
controlling versus informational styles on intrinsic motivation and creativity. Journal of Personality, 52, 233248
30. Marchant, G. J., Paulson, S. E., & Rothlis berg, B. A. (2001). Relations of middle school student’s perceptions of family and school
contexts with academic achievement. Psychology in the Schools, 38 (6), 505519
31. Ryan, R. M. (1995). Psychological needs and the facilitation of integrative processes. Journal of Personality, 63 (3), 397427
32. Ryan, R. M. & Connell, J. P. (1989). Perceived locus of causality and internalization: Examining reasons for acting in two do mains.
Journal of Personality and Social Psychology, 57, 749761
33. Ryan, R.M., & Grolnick, W. S. (1986). Origin sand pawns in the classroom: Self- report and projective assessments of individual
differences in childrens perceptions. Journal of Personality and Social Psychology, 50, 550558
34. Sears, R. R., Maccoby, E. C., & Levin, H. (1957). Patterns of child rearing. Evanston, IL: Row, Peterson.

Authors: G.Jayanthi, S.Aaradhika, S.Swathy, N.Mathumitha

Paper Title: Automation using Plc and IIOT Monitoring in Jaggery Preparation
Abstract: Jaggery is a natural sugar which a sweetening agent and is also called as gur or panela. It is first
made into a semisolid paste by evaporating the sugarcane juice. The aim of this paper is to develop an automated
process for Jaggery preparation using PLC and monitored by IIOT (Industrial Internet Of Things). The process
consists of pushbuttons, Temperature sensor (LM35), Level sensor (Ultrasonic level transmitter), IR sensor as input
devices which are interfaced with the Siemens PLC(CPU314-2C). The PLC controls the following output devices
such as crusher motor, conveyor motor, scum motor and valves (pneumatic actuator control valve).The process
parameters are uploaded into the cloud for monitoring using IIOT. The trend graphs are generated using
MindSphere software (MindConnect Nano). The system also provides fault detection through alert messages and e-
mails. The protocol used for IIOT is Transmission Control Protocol (TCP). All the five stages such as crushing,
921. filtering, heating, cooling and molding of the Jaggery preparation process are automated. Thus, a hygienic and fully
automatic PLC based Jaggery production system with fault detection capability is developed through this project.
5227-
5230
Keyword : PLC, IIOT, MindSphere, MindConnect Nano, Trend plot, Fault detection, TCP.
References:
1. Abhishek Jain , Rohit Parakh Jain and Sanjana Lamba (2017)”APPLICATION OF PLC AND SCADA IN HIGH QUALITY
MEDIUM SCALE JAGGERY PRODUCTION PROCESS” - International Journal of Latest Trends in Engineering and Technology
(IJLET)
2. Prof. Niranjan M Madhukar N Ashwini A Muddsar J Saish M (2017) “IOT Based Industrial Automation” - IOSR Journal of
Computer Engineering (IOSR-JCE) National Conference
3. Prof. Yogesh Shankar kumbhar (2016) “Design & Manufacturing of Automation system for Jaggery Plant” - International Research
Journal of Engineering and Technology (IRJET)
4. F.D. Petruzella, Programmable Logic Controllers, Tata Mc-Graw Hill, Third edition, 2010.
5. Hwaiyu Geng, "THE INDUSTRIAL INTERNET OF THINGS (IIoT)," in Internet of Things and Data Analytics Handbook , , Wiley,
2017, pp.41-81

Authors: Amir A. Asif, Md. Atiqur Rahman Sarker


Improvement in Energy Efficiency by Implementing Direct Current Based Nano-grid and Its Impact
Paper Title:
on Manufacturing Industry
Abstract: Meeting the ever-increasing level of energy demands from residential, commercial and industrial
consumers is not a trivial task. To satisfy these requirements, it is imperative to plan and design the future energy
generation and distribution networks to be extremely efficient so that generated energy is utilized to its fullest
extent. In this regard, direct current(DC) based nano-grids which are powered by Photovoltaic (PV) cells are
proposed along with more bias towards DC mode consumption. In addition to that, paradigm-shifting changes in
manufacturing industry can be initiated using this proposed model. This article covers the models, advantages and
challenges of such approach.

Keyword : DC Nano-grid, Photovoltaic Cell, Energy Efficiency, Efficient Manufacturing.


References:
1. B. Walheer, "Scale efficiency for multi-output cost minimizing producers: The case of the US electricity plants," Scale efficiency for
multi-output cost minimizing producers: The case of the US electricity plants, vol. 70, no. February, pp. 26-36, 2018.
2. C. A.Frangopoulos, "Thermo-economic functional analysis and optimization," Energy, vol. 12, no. 7, pp. 563-571, 1987.
3. M. Rahimiyan and L. Baringo, "Strategic Bidding for a Virtual Power Plant in the Day-Ahead and Real-Time Markets: A Price-
922. Taker Robust Optimization Approach," IEEE Transactions on Power Systems , vol. 31, no. 4, pp. 2676 - 2687, 2016.
4. U. Nations, "Ensure access to affordable, reliable, sustainable and modern energy," United Nations, [Online]. Available:
https://www.un.org/sustainabledevelopment/energy/. [Accessed 1 September 2019]. 5231-
5. Y. Li, W. A. Pizer and L. Wu, "Climate change and residential electricity consumption in the Yangtze River Delta, China," 5233
Proceedings of the National Academy of Sciences (of the USA), vol. 116, no. 2, pp. 472-477, 2019.
6. H. L. Willis, Distributed Power Generation: Planning and Evaluation, Boca Raton, Florida: CRC Press, 2000.
7. L.Mehiganab, J.P.Deane, B.P.Ó.Gallachóir and V.Bertsch, "A review of the role of distributed generation (DG) in future electricity
systems," Energy, vol. 163, pp. 822-836, 2018.
8. A. Hirsch and Y. P. J. Guerrero, "Microgrids: A review of technologies, key drivers, and outstanding issues," Renewable and
Sustainable Energy Reviews, vol. 90, no. July, pp. 402-411, 2018.
9. Y.-M. Tang, G.-X. He, K.-C. Liu, H.-G. Yan, Y.-N. Nie, L. Chen and W.-Q. Tao, "Study on method of comprehensive energy
efficiency evaluation for distributed energy system," in IEEE Conference on Energy Internet and Energy System Integration ,
Beijing, 2017.
10. A. A. Asif, R. Singh and G. K. Venayagamoorthy, "Ultra-Low Cost and Solar Storm Secured Local DC Electricity to Address
Climate Change Challenges for All Economies," in Clemson Power Systems Conference, Clemson, SC, 2016.
11. R. Singh, A. A. Asif and G. K. Venayagamoorthy, "Transformative Role of Photovoltaics in Phasing Out Alternating Current Based
Grid by Local DC Power Networks for Sustainable Global Economic Growth," in IEEE Photovoltaic Specialists Conference,
Portland, OR, 2016.
12. P. Albertus, S. Babinec, S. Litzelman and A. Newman, " Status and challenges in enabling the lithium metal electrode for high-
energy and low-cost rechargeable batteries," Nature Energy, vol. 3, pp. 16-18, 2018.
13. C. Vaalma, D. Buchholz, M. Weil and S. Passerini, "A cost and resource analysis of sodium-ion batteries," Nature Reviews
Materials, vol. 3, p. 18013, 2018.
14. A. A. Asif and R. Singh, "Further Cost Reduction of Battery Manufacturing by Addressing Variability Issues," Under Review.
15. Y. Yang, H. Wang, A. Sangwongwanich and Frede Blaabjerg, "Design for Reliability of Power Electronic Systems," in Power
Electronics Handbook (Fourth Edition),, M. H. Rashid, Ed., Butterworth-Heinemann, 2018, pp. 1423-1440.
16. R. Singh and A. A. Asif, "Ultra Large Scale Manufacturing Challenges of Silicon Carbide and Gallium Nitride Based Power Devices
and Systems," in Pacific Rim Meeting on Electrochemical and Solid State Science, Honolulu, Hawaii, 2016.
17. A. A. Asif, "Manufacturing of Photovoltaic Devices, Power Electronics and Batteries for Lcoal Direct Current Power Based
Nanogrid," Clemson University, 2017.
18. World Aluminium Institute (2019, July 30), “Primary Aluminium Smelting Energy Intensity”, [Online] Available:
http://www.world-aluminium.org/statistics/primary-aluminium-smelting-energy-intensity/#data Accessed: September 01, 2019.

Authors: Adeeb Noor

Paper Title: Seeking Standards of Health Informatics Education in Saudi Arabia


Abstract: As an initial step towards diversifying Saudi Arabia economy, the kingdom is focusing on the
development and improvement of all public services through technology especially the health sector to meet the
standards of the western world. We discuss the progress of the health informatics education globally with the main
focus on the Kingdom of Saudi Arabia. For this purpose, we survey all academic institutions with their levels of
education and found that only 9% of the 109 academic institutions offered specific programs in Health Informatics.
While we focus on Saudi Arabia, we also gather information on courses per AMIA identification for Saudi
academic institutions.

Keyword : AMIA, Education, Health Informatics, Saudi Arabia.


References:
1. Kulikowski, C., Shortliffe, E., Currie, L., Elkin, P., Hunter, L., Johnson, T., Kalet, I., Lenert, L., Musen, M., Ozbolt, J., Smith, J., Tarczy-
923. Hornoch, P. and Williamson, J. (2012). AMIA Board white paper: definition of biomedical informatics and specification of core
competencies for graduate education in the discipline. Journal of the American Medical Informatics Association, 19(6), pp.931-938.
2. Fridsma, D. (2016). The scope of health informatics and the Advanced Health Informatics Certification. Journal of the American Medical 5234-
Informatics Association, 23(4), pp.855-856. 5236
3. Noor, A. (2019). The Utilization of E-Health in the Kingdom of Saudi Arabia. International Research Journal of Engineering and
Technology. 6(9): 1229-1239.
4. Altwaijiri, M. and Aldosari, B. (2008). Health Informatics Master Program at King Saud bin Abdulaziz University for Health Sc iences,
Riyadh, Saudi Arabia. Yearbook of Medical Informatics, 17(01), pp.145-149.
5. Albarrak, A. Designing e-learning systems in medical education: A Case study. International Journal of Excellence in Healthcare
Management. 2010 Jun;183(3119):1-9.
6. Albarrak, A.I. E-learning in medical education and blended learning approach. learning. 2011;13:14-20.
7. Househ, M.S., Saddik. B., and Al-Dosari. B. Development of a graduate level course in e-Health and Emerging Technology in Saudi
Arabia. InITCH 2011 Feb 9 (pp. 69-73).
8. Bahkali, S., Almaiman, A., Almadani, W., Househ, M.S., and El Metwally, A. The state public health informatics in Saudi Arabia.
InICIMTH 2014 Jul 24 (pp. 257-260).
9. Asiri, H. A. Challenges of the Health Informatics Education in the Kingdom of Saudi Arabia: What Stands in Our Way? Journal of Health
Informatics in Developing Countries. 2014 Apr 8;8(1).
10. Fallatah, H. (2016). Introducing inter-professional education in curricula of Saudi health science schools: An educational projection of
Saudi Vision 2030. Journal of Taibah University Medical Sciences, 11(6), pp.520-525.
11. Kampov-Polevoi, J. and Hemminger, B. “A curricula-based comparison of biomedical and health informatics programs in the
USA.” Journal of the American Medical Informatics Association, vol. 18, no. 2, pp.195-202, 2011.

Authors: Ram Bhushan Agnihotri, Nitin Pandey, Shekhar Verma

Paper Title: A Method in Collaborative Hybrid Routing Protocol for Next Generation WSN by using Fuzzy Logic
Abstract: Remote sensor systems will be frameworks of free halfway fact points castoff for inspecting a state
of affairs. Specialists of WSNs face troubles that rise up out of correspondence interface disillusionments, memory
and computational goals, and confined imperativeness. Various issues in WSNs are point by point as
multidimensional streamlining issues, and moved closer through bio pushed strategies. There are various strategies
which are fundamental, fruitful, and computationally capable improvement estimation. It has been associated with
location WSN issues, for instance, perfect association, center constrainment, Clustering, and statistics
accumulation. Thusly, this proposition work plots problems in WSNs, well-knownshows usually energized figuring
which assist us hip improving the freestyle lifespan of the Feeler middle points, and appears at its fittingness for
WSN bids. It furthermore affords a short audit way the usually impelled estimations are uniquely suited to deal
with these issues. Bio breathed lifestyles into upgrade strategies are computationally succesful picks in preference
924. to logical systems.
Sensors are seen as imperative pieces of electronic contraptions. In much use of remote sensor frameworks
5237-
(WSNs), imperative and essential information must be passed on to the sink in a multi-bob and essentialness
5245
successful way. See that the essentialness of sensor center points is limited; hauling out framework lifetime in
WSNs is seen as a fundamental issue. In order to extend the framework lifetime, authorities should consider
imperativeness use in directing shows of WSNs. In this paper, another essentialness capable guiding show (EERP)
has been proposed for WSNs using A-star figuring. The proposed coordinating arrangement improves the
framework lifetime by sending data distributes the perfect most restricted way. The perfect way can be found as for
the most extraordinary outstanding imperativeness of the accompanying hop sensor center, high association quality,
support inhabitance and least skip counts. Amusement results show that the proposed arrangement improves
compose lifetime in connection with A-star and feathery logic(A&F) show.

Keyword : Wireless Network, Fuzzy Routing Protocols, Energy efficiency, routing optimization.
References:
1. I. F. Akyildiz, Weilian Su, Y. Sankarasubramaniam, and E. Cayirci. An outline on sensor frameworks. IEEE Communications Magaz ine,
40(8):102– 114, Aug 2002.
2. J. N. Al-Karaki and A. E. Kamal.Routing strategies in remote sensor orchestrates: an examination. IEEE Wireless Communications,
11(6):6– 28, Dec 2004.
3. Giuseppe Anastasi, Marco Conti, Mario Di Francesco,and Andrea Passarella. Essentialness protection in remote sensor organizes : A
survey. Unrehearsed Networks, 7(3):537 – 568, 2009.
4. David Braginsky and Deborah Estrin. Talk coordinating algorthim for sensor orchestrates In Proceedings of the first ACM International
Workshop on Wireless Sensor Networks and Applications, WSNA '02, pages 22– 31, New York, NY, USA, 2002. ACM.
5. N. Bulusu, J. Heidemann, and D. Estrin.Gps-less insignificant exertion outside repression for little contraptions. IEEE Personal
Communications, 7(5):28– 34, Oct 2000.
6. AnshumanChhabra and Mariam Kiran.Grouping elephant and mice streams in quick coherent networksclassifying flows.pdf.Gotten to:
2018-05-16.
7. Matthew Ettus. Structure cutoff, inertness, and power usage in multihop-guided ss-cdma remote frameworks. In Radio and Wireless
Conference, 1998.RAWCON 98.1998 IEEE, pages 55– 58.IEEE, 1998.
8. JayavardhanaGubbi, RajkumarBuyya, SlavenMarusic, and MarimuthuPalaniswami. Web of things (iot): A fantasy, basic parts, and future
direction. Future Generation Computer Systems, 29(7):1645 – 1660, 2013.
9. Wendi RabinerHeinzelman, AnanthaChandrakasan, and HariBalakrishnan.Vitality beneficial correspondence show for remote
microsensornetworks.In System sciences, 2000. Strategies of the 33rd yearly Hawaii worldwide gathering on, pages 10 – pp. IEEE, 2000
10. Wendi RabinerHeinzelman, Joanna Kulik, and HariBalakrishnan.Versatile shows for information dispersal in remote sensor frameworks.
In Proceedings of the fifth Annual ACM/IEEE International Conference on Mobile Computing and Networking, MobiCom '99, pages 174–
185, New York, NY, USA, 1999. ACM.
11. DC Hoang, R Kumar, and SK Panda. Fleecy c-suggests grouping show for remote sensor frameworks. In Industrial Electronics (ISIE),
2010 IEEE International Symposium on, pages 3477– 3482.IEEE, 2010.
12. Jun Huang, Yu Meng, Xuehong Gong, Yanbing Liu, and QiangDuan. A story association scheme for green trap of things. IEEE Internet of
Things Journal, 1(2):196– 205, 2014.
13. JieJia, Jian Chen, Guiran Chang, and Zhenhua Tan.Vitality capable consideration control in remote sensor frameworks reliant o n multi-
objective innate estimation. PCs and Mathematics with Applications, 57(11):1756 – 1766, 2009. Strategies of the International Conference.
14. Sumit Kumar and Siddhartha Chauhan.A survey on booking estimations for remote sensor systems.Global Journal of Computer
Applications, 20(5), 2011.
15. Andreas Savvides, Chih-Chieh Han, and Mani B. Strivastava.Dynamic fine-grained limitation in extraordinarily delegated frameworks of
sensors. In Proceedings of the seventh Annual International Conference on Mobile Computing and Networking, MobiCom '01, pages 166–
179, New York, NY, USA, 2001. ACM.
16. Curt Schurgers and Mani B Srivastava.Vitality successful directing in remote sensor frameworks. In Military exchanges meeting , 2001.
MILCOM 2001.Interchanges for framework driven exercises: Creating the information compel.IEEE, volume 1, pages 357– 361.IEEE,
2001.
17. Faisal KarimShaikh, SheraliZeadally, and Ernesto Exposito.Empowering progressions for green snare of things. IEEE Systems Jou rnal,
11(2):983– 994, 2017.
18. K. Sohrabi, J. Gao, V. Ailawadhi, and G. J. Pottie. Shows for selforganization of a remote sensor mastermind. IEEE Personal
Communications, 7(5):16– 27, Oct 2000.
19. L. Subramanian and R. H. Katz.An building for structure selfconfigurable systems. In 2000 First Annual Workshop on Mobile and Ad Hoc
Networking and Computing. MobiHOC (Cat. No.00EX444), pages 63– 73, 2000.
20. Fan Ye, A. Chen, Songwu Lu, and Lixia Zhang. An adaptable response for least cost sending in immense sensor frameworks. In
Proceedings Tenth International Conference on Computer Communications and Networks (Cat. No.01EX495), pages 304– 309, 2001.
21. Chunsheng Zhu, Victor CM Leung, Lei Shu, and Edith C-H Ngai.Green web of things for quick world. IEEE Access, 3:2151– 2162, 2015.
22. M Bahrololum and M Khaleghi. Irregularity interference disclosure system using gaussian mix illustrate. In Convergence and Hybrid
Information Technology, 2008.ICCIT'08. Third International Conference on, volume 1,pages 1162– 1167. IEEE, 2008.
23. Xiaohong Sheng, Y-H Hu, and ParameswaranRamanathan. Appropriated molecule channel with gmm infer for different targets
constrainment and following in remote sensor sort out. In Information Processing in Sensor Networks, 2005.IPSN 2005. Fourth
International Symposium on, pages 181– 188. IEEE, 2005.
24. ChhabraAnshuman, VashishthVidushi, and Sharma Deepak Kumar. A feathery reason and delight speculation based adaptable procedu re
for confirming spearheading frameworks against dull hole attacks. Worldwide Journal of Communication Systems, 31(4):e3487. e3 487
IJCS-17-0453.R1.
25. A. Chhabra, V. Vashishth, and D. K. Sharma. A delight theory based secure model against dim hole attacks in quick frameworks. In 2017
51st Annual Conference on Information Sciences and Systems (CISS), pages 1– 6, March 2017.
26. R. Di Pietro, S. Guarino, N.V. Verde, and J. Domingo-Ferrer.Security in remote uniquely designated frameworks 2013 a review.˘
Computer Communications, 51:1 – 20, 2014.
27. A. Chhabra, V. Vashishth, and D. K. Sharma.Seir: A stackelberg redirection based technique for imperativeness careful and helped
coordinating in extremist spearheading frameworks. In 2017 51st Annual Conference on Information Sciences and Systems (CISS), pages
1– 6, March 2017.
28. C. Yu, W. Guo, and G. Chen.Vitality balanced lay arranging subject to atom swarm streamlining in remote sensor organize. In 2012 IEEE
26th International Parallel and Distributed Processing Symposium Workshops PhD Forum, pages 1249– 1255, May 2012.
29. J. Kennedy, "Atom swarm improvement," in Encyclopedia of AI. Springer, 2011, pp. 760– 766.
30. [30] I. F. Akyildiz , Weilian Su , Y. Sankarasubramaniam , E. Cayirci, An outline on sensor frameworks, IEEE Communications
Magazine, v.40 n.8, p.102-114,
31. M. Li, C. Hua, C. Chen, X. Guan, "Application-driven virtual network embedding for industrial wireless sensor networks", 2017 IEEE
International Conference on Communications (ICC) Ad-Hoc and Sensor Networking Sumposium, 21-25 May 2017.
32. R. Rajagopalan , P. K. Varshney, Data-total systems in sensor organizes: an overview, IEEE Communications Surveys and Tutorials, v.8
n.4, p.48-63
33. TossapornSrisooksai , KamolKeamarungsi , PoonlapLamsrichan , Kiyomichi Araki, Practical information pressure in remote sensor
arranges: A study, Journal of Network and Computer Applications, v.35 n.1, p.37-59,
34. V. Katiyar, N. Chand, S. Soni, "Grouping calculations for heterogeneous remote sensor arrange: a study", International Journal of Applied
Engineering Research, Dindigul, Volume 1, No 2, 2010, pp. 273- - 287.
35. F. Alfayez, M. Hammoudeh, A. Abuarqoub, "A Survey on MAC conventions for obligation cycled remote sensor systems", International
Conference on Advanced Wireless Information and Communication Technologies (AWICT 2015), Science Direct, Procedia Computer
Science, Volume 73. 2015, PP: 482- - 489.
36. J. N. Al-Karaki , A. E. Kamal, Routing procedures in remote sensor organizes: a study, IEEE Wireless Communications, v.11 n.6, p.6-28,
37. N. A. Pantazis, S. A. Nikolidakis, D. D. Vergados, "Vitality productive steering conventions in remote sensor organizes: a review", IEEE
Communications Surveys and Tutorials (Volume: 15, Issue: 2), pp. 551- - 591. 2013.
38. Wajgi, N. V. Thakur., "Burden adjusting calculations in remote sensor organize: a review", IRACST - International Journal of Computer
Networks and Wireless Communications ISSN: 2250- - 3501. Vol.2, No 4, August 2012, pp. 456- - 460
39. Faisal B. Hussain , YalcinCebi , Ghalib A. Shah, A multievent blockage control convention for remote sensor systems, EURASIP Journal
on Wireless Communications and Networking,
40. G. A. Shah, M. Bozyiğit, Ö. B. Akan, "Multi-occasion versatile bunching (MEAC) convention for heterogeneous remote sensor systems",
Proc. The MP Fifth Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2006), pp. 30- - 37
41. A. V. Sutagundar, S. S.Manvi, "Area mindful occasion driven multipath steering in Wireless Sensor Networks: Agent based
methodology". Egyptian Informatics Journal, Volume 14, Issue 1, March 2013, pp. 55- - 65
42. C. F. García-Hernández, P. H. Ibargüengoytia-González, J. García-Hernández, J. A. Pérez-Díaz, "Remote sensor systems and applications:
an overview". IJCSNS International Journal of Computer Science and Network Security, Vol.7 No.3, March 2007, pp. 264 - - 273
43. MauriKuorilehto , Marko Hännikäinen , Timo D. Hämäläinen, A study of use dispersion in remote sensor systems, EURASIP Journal on
Wireless C[39] Faisal B. Hussain , YalcinCebi , Ghalib A. Shah, A multievent clog control convention for remote sensor systems,
EURASIP Journal on Wireless Communications and Networking,
44. G. A. Shah, M. Bozyiğit, Ö. B. Akan, "Multi-occasion versatile bunching (MEAC) convention for heterogeneous remote sensor systems",
Proc. The MP Fifth Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2006), pp. 30- - 37
45. A. V. Sutagundar, S. S.Manvi, "Area mindful occasion driven multipath directing in Wireless Sensor Networks: Agent based
methodology". Egyptian Informatics Journal, Volume 14, Issue 1, March 2013, pp. 55- - 65
46. C. F. García-Hernández, P. H. Ibargüengoytia-González, J. García-Hernández, J. A. Pérez-Díaz, "Remote sensor systems and applications:
a review". IJCSNS International Journal of Computer Science and Network Security, Vol.7 No.3, March 2007, pp. 264 - - 273
47. MauriKuorilehto , Marko Hännikäinen , Timo D. Hämäläinen, A study of use dissemination in remote sensor systems, EURASIP Journal
on Wireless Communications and Networking, v.2005 n.5, p.774-788, October 2005
48. Dongjin Son , BhaskarKrishnamachari , John Heidemann, Experimental investigation of simultaneous transmission in remote sensor
systems, Proceedings of the fourth universal gathering on Embedded organized sensor frameworks, October 31-November 03, 2006
49. J. Rang, Y. Zhang, B. Nath, "Start to finish Channel Capacity Measurement for Congestion Control in Sensor Networks", In Proceedings
of the second International Workshop on Sensor an Actor Network Protocols and Applications (SANPA '04), Boston, MA, USA, 22
August 2004. communications and Networking, v.2005 n.5, p.774-788, October 2005
50. Dongjin Son , BhaskarKrishnamachari , John Heidemann, Experimental investigation of simultaneous transmission in remote senso r
systems, Proceedings of the fourth worldwide gathering on Embedded organized sensor frameworks, October 31-November 03, 2006
51. J. Rang, Y. Zhang, B. Nath, "From beginning to end Channel Capacity Measurement for Congestion Control in Sensor Networks", In
Proceedings of the second International Workshop on Sensor an Actor Network Protocols and Applications (SANPA '04), Boston, M A,
USA, 22 August 2004.
52. M. Radi, B. Dezfouli, K. A. Bakar, M. Lee, "Multipath steering in remote sensor organizes: a review and research difficulties ", Sensors
ISSN 1424-8220, 2012, 12, pp. 650- - 685.
53. M. Masdari, M. Tanabi., "Multipath directing conventions in remote sensor arranges: a review and investigation", International Journal of
Future Generation Communication and Networking, Vol.6, No.6, 2013, pp. 181- - 192.
54. Budhaditya Deb , SudeeptBhatnagar , BadriNath, ReInForM: Reliable Information Forwarding Using Multiple Paths in Sensor Networks,
Proceedings of the 28th Annual IEEE International Conference on Local Computer Networks, p.406, October 20-24, 2003
55. M. Cherian, T. R. G. Nair "Multipath Routing with Novel Packet Scheduling Approach in Wireless Sensor Networks", International
Journal of Computer Theory and Engineering 3(5), pp. 666- - 670, 2011
56. T. Cinar and M. BulentOrencik, "A submerged acoustic channel demonstrate utilizing beam following in ns-2," in Proceedings of the 2009
second IFIP Wireless Days (WD 2009), pp. 1– 6
57. M. Ayaz and A. Abdullah, "Submerged remote sensor systems: Routing issues and future difficulties," in Proceedings of seventh
International Conference on Advances in Mobile Computing and Multimedia, pp. 370– 375
58. L. Liu, S. Zhou, and J. H. Cui, “Prospects and problems of wireless communication for underwater sensor networks,” Wireless
Communications and Mobile Computing, vol. 8, no. 8, pp. 977–994, 2008.
59. G. Zaibi, N. Nasri, A. Kacouri, and M. Samet, “Survey of temperature variation effect on underwater acoustic wireless
transmission,” ICGST-CNIR Journal, vol. 9, 2009.
60. Y. Luo, L. Pu, M. Zuba, “Challenges and opportunities of underwater cognitive acoustic networks,” IEEE Transactions on Emerging
Topics in Computing, vol. 2, no. 2, pp. 198–211, 2014.
61. X.- P. Gu, Y. Yang, and R.- L. Hu, "Breaking down the execution of station in Underwater Wireless Sensor Networks(UWSN)," in
Proceedings of the 2011 International Conference on Advanced in Control Engineering and Information Science, CEIS 201 1, pp. 95– 99,
China, August 2011.
62. J. Kong, M. Gerla, and S. Zhou, Challenges: Building Scalable and Distributed Underwater Wireless Sensor Networks (UWSNs) for
Aquatic Applications, 2005.
63. S. Basagni, C. Petrioli, R. Petroccia, and M. Stojanovic, "Improved bundle measure determination in submerged remote sensor organize
correspondences," IEEE Journal of Oceanic Engineering, vol. 37, no. 3, pp. 1– 337, 2012.
64. S. Basagni, C. Petrioli, R. Petroccia, and M. Stojanovic, "Streamlining system execution through bundle discontinuity in multi-bounce
submerged correspondences," in Proceedings of the OCEANS'10 IEEE Sydney, OCEANSSYD 2010, pp. 1– 7, Australia, May 2010.
65. S. Basagni, C. Petrioli, R. Petroccia, and M. Stojanovic, "Picking the parcel estimate in multi-bounce submerged systems," in Proceedings
of the OCEANS'10 IEEE Sydney, OCEANSSYD 2010, pp. 1– 9, Australia, May 2010.
66. M. Ayaz, L. T. Jung, A. Abdullah, and I. Ahmad, "Solid information conveyances utilizing parcel advancement in multi-jump submerged
sensor systems," Journal of King Saud University - Computer and Information Sciences, vol. 24, no. 1, pp. 41– 48, 2012.
67. N. Li, J.-F. Martínez, J. M. M. Chaus, and M. Eckert, “A survey on underwater acoustic sensor network routing protocols,” Sensors, vol.
16, no. 3, p. 414, 2016.
68. M. Faheem, G. Fish, and V. C. Gungor, "QERP: Quality-of-Service (QoS) Aware Evolutionary Routing Protocol for Underwater Wireless
Sensor Networks," IEEE Systems Journal, 2017.
69. C. Zidi, F. Bouabdallah, and R. Boutaba, "Directing structure dodging vitality openings in submerged acoustic sensor systems," Wireless
Communications and Mobile Computing, vol. 16, no. 14, pp. 2035– 2051, 2016.
70. N. Z. Zenia, M. Aseeri, M. R. Ahmed, Z. I. Chowdhury, and M. Shamim Kaiser, "Vitality effectiveness an d dependability in MAC and
directing conventions for submerged remote sensor organize: A review," Journal of Network and Computer Applications, vol. 71, pp. 72–
85, 2016

Authors: Richa Sharma, Deepak Nagaria

Paper Title: Predictive Controller Design for Networked Control System


Abstract: A networked control system where sensor ( ), controller ( ) and an actuator ( ) are interacting to
the process model or system through a communication channel. The model reliability depends on time delay of data
transmission from to , to , controller processing time and packet dropouts. In this proposed work, model based
network system is designed to achieve the desired response of the controlled system by minimizing the network
925. time delay and improves con-troller performance in term of stability. Time delay mainly occurs due to time sharing
of the medium as well extra overload of signal coding and processing phase. The time delays could be steady,
5246-
limited, or even random, depends upon protocol used in the network and hardware. The network predictive control
5250
tech-nique effectively works on random delay. The predictive controller is used to analyses the future output
conditions of the system based on the previous values. The simulated result shows that if time delay increases, the
response of the system degraded and therefore for improving it the correct choice of prediction and control horizon
is needed. The designed networked control system based on predictive functional control is simulated using True
Time tool on Matlab. The ob-tained outcomes from the proposed technique accomplishes that the technique is
effective and feasible.
Keyword : Networked control system, predictive controller, communication delay, True-Time- MATLAB,
Simulink, Stability, Reliability.
References:
1. Rongni Yang, Guo-Ping Liu, Clive Thomas, and Michael V. Basin, “Predictive Output Feedback Control for Networked Control Systems”
,IEEE Transactions on industrial electronics, vol.61, no.1, January 2014.
2. G. P. Liu, “Predictive Controller Design of Networked Systems with Communication Delays and Data Loss”, IEEE Transactions on
circuits and systems, vol.57, no.6, June 2010.
3. Hongbo Li, Zengqi Sun, and Mo-Yuen Chow, “State feedback controller design of networked control systems with time delay and packet
dropout,” Proceedings of the 17th World Congress the International Federation of Automatic Control Seoul, Korea, July 2008.
4. A. Onat, T. Naskali, E. Parlakay, and O. Mutluer, “Control over imperfect networks: Model-based predictive networked control
systems,”mIEEE Trans. Ind. Electron., vol. 58, no. 3, pp. 905–913, Mar. 2011.
5. Han, C.-W., “Fuzzy Neural Network-based Time Delay Prediction for Networked Control Systems”, Appl. Math Inf. Sci. 2014, 8, 407–
413.
6. Tomas Estrada and Panos J. Antsaklis, “Performance of Model-Based Networked Control Systems with Discrete-Time Plants”, 17th
Mediterranean Conference on Control & Automation Makedonia Palace, Thessaloniki, Greece, 2009.
7. L.A.Montestruque and P.J. Antsaklis, “Networked Control Systems: A model-based approach,” 12th Mediterranean Conference on
Controland Automation, June 2004.
8. Junfeng Zhang, Xianglei Jia, Ridong Zhang & Yan Zuo, “A model predictive control framework for constrained uncertain positive
systems”,International Journal of system and science,vol.49,pp-884-896, 2017.
9. ZHOU Yuanqiang, LI Dewei, XI Yugeng, CEN Lihui, XU Yuli, GAN Zhongxue, “Distributed Model Predictive Control for Nonlinear
Networked Systems with Asynchronous Communication”, Proceedings of the 36th Chinese Control Conference 2017.
10. J. Wu, L. Zhang, T. Chen, “Model predictive control for networked control systems”, International Journal of Robust and Nonli near
Control,vol. 19, no. 9, 2009, pp: 1016-1035.
11. Z. Wang, W. Pan, and G. Guo, “Stability of Model-Based Networked Control System with Quantized Feedback,” in Proceedings of the
3rdInternational Conference on Innovative Computing Information and Control, Dalian, Liaoning, 2008.
12. Yang, R.-N.; Liu, G.-P.; Shi, P.; Thomas, C.; Basin, “Predictive output feedback control for networked control systems”, IEEE Trans.
Ind.Electron. 2014, 61, 512–520.
13. Song, H.-B.; Liu, G.-P.; Yu, L., “Networked predictive control of uncertain systems with multiple feedback channels”, IEEE Trans.
Ind.Electron. 2013, 60, 5228–5238.
14. C.F.Carunyu,C.Lazar, “Robustly stabilising model predictive control design for networked control systems with an application to direct
current motors” IET control theory and applications 2012 vol.6, pp:943-952.
15. David-Henriet, X., Hardouin, L., Raisch, J., & Cottenceau, B. , “Model predictive control for discrete event systems with partial
synchronization”, Automatica, 70, 9–13 2016.
16. A. Cervin, D. Henriksson, M. Ohlin, TrueTime 2.0 beta 5 – Reference Manual, Department of Automatic Control, Lund University,
Sweden, June 2010.

Authors: Suguna M, Prakash D, Cynthia. J

Paper Title: Examination of Healthcare Diagonosis using Iot


Abstract: In recent years, online applications, spare many services for wellness of health related issues. The
application is kept updated so that the health related data are kept modernized for future references. The application
collects information from IoT devices and then compares them with other existing data from the prevailing records
with the same disease. The collected data is then reserved in a database that hold all records about the healthcare
issues. Cloud computing technology is used to guard and reserve the healthcare records. Cloud and IoT technology
are connected to provide users with a completely developed healthcare record. The existing system makes use of
Fuzzy Rule Based Neural Classifier that helps in assembling and categorizing the diabetes data under the guidance
of severity analyzer. This work, present the comparison of some classification algorithms and obtain the accuracy,
the dataset collected is a real-time dataset. The output and results are tabulated after the comparison of the
algorithms.

Keyword : Cloud, IOT, k-Start, Naive Bayes, healthcare.


References:
926. 84. Priyan Malarvizhi Kumar, S. Lokesh, R. Varatharajan, C. Gokulnath, P. Parthasarathy, “Cloud and IoT based disease prediction and
diagnosis system for healthcare using Fuzzy neural classifier”, April 2017.
85. Prabal Varma, Sandeep K Sood, “Cloud-centric IoT based disease diagnosis healthcare framework”, Elsevier 2018.
5251-
86. Yunbo Li, Anne-Cécile Orgerie, Ivan Rodero, Betsegaw Lemma Amersho, Manish Parashar, Jean-Marc Menaud, “End-to-end Energy 5254
Models for Edge Cloud-based IoT Platforms: Application to Data Stream Analysis in IoT “,2017
87. Christos Stergiou, Kostas E. Psannis, Byung-Gyu Kim, Brij Gupta, "Secure integration of IoT and Cloud Computing", Future Generation
Computer Systems, 2018.
88. Gelogo Y.E, Hwang H.J, Kim H, Int. J. Smart Home, “Internet of things (IoT ) framework for u-healthcare system”, Vol. 9, pp. 323–330,
2015.
89. Ganapathy S, Sethukkarasi R, Yogesh P, Vijayakumar P, Kannan A, Sadhana, “An intelligent temporal pattern classification system using
fuzzy temporal rules and particle swarm optimization”, Vol. 39, No. 2, pp. 283-302, 2014.
90. Stephanie B. BAKER 1, Wei Xiang2, (Senior Member, IEEE), And Ian Atkinson3, “Internet of Things for Smart Healthcare:
Technologies, Challenges, and Opportunities”, IEEE 2017.
91. Varatharajan R , Manogaran G , Priyan MK , Sundarasekar R, “Wearable sensor devices for early detection of Alzheimer disease using
dynamic time warping algorithm”, 2017
92. Vani K S and Rajesh Rayappa Neeralagi, “ IoT based Health Monitoring using Fuzzy logic“,IJCIR 2017.
93. Jisha Elizabeth Shaji, Bibin Varghese, Rangit Varghese, “A Health Care Monitoring System with Wireless Body Area Network using
IoT” International Journal of Recent Trends in Engineering & Research (IJRTER) , 2017.
94. M. Shamim Hossain a , ∗, Ghulam Muhammad ,“ Cloud-assisted Industrial Internet of Things (IIoT) –Enabled framework for health
monitoring”, , Elsevier 2016.
95. Gunasekaran Manogaran1&R. Varatharajan & M. K. Priyan, ,“Hybrid Recommendation System for Heart Disease Diagnosis based on
Multiple Kernel Learning with Adaptive Neuro-Fuzzy Inference System”, Springer 2017.
96. Mohamed Elhoseny , Gustavo Ramírez-gonzález, Osama M. Abu-elnasr, Shihab A. Shawkat, Arunkumar N, And Ahmed Farouk , “Secure
Medical Data Transmission Model for IoT-Based Healthcare Systems”, , IEEE 2018.
97. Mohamed Elhoseny , Gustavo Ramírez-gonzález, Osama M. Abu-elnasr, Shihab A. Shawkat, Arunkumar N, And Ahmed Farouk , “Secure
Medical Data Transmission Model for IoT-Based Healthcare Systems”, IEEE 2018.
98. Entao Luo, Md Zakirul Alam Bhuiyan, Guojun Wang, Md Arafatur Rahman, Jie Wu, and Mohammed Atiquzzaman, “Privacy Protector:
Privacy-Protected Patient Data Collection in IoT-Based Healthcare Systems”, IEEE 2018.
99. Haobijam Basanta1, Yo-Ping Huang1 and Tsu-Tian Lee3, Intuitive IoT-based H2U Healthcare System for Elderly People, IEEE
Conference on Networking, Sensing, and Control Mexico City, Mexico, April 28-30, 2016
100. E. H. Mamdani, Application of fuzzy logic to approximate reasoning using linguistic synthesis, IEEE Transactions o n Computers 26(12):
11821191, 1977.
101. Chaitali Kulkarni, Himani Karhade, Sonali Gupta, Prashant Bhende, Shital Bhandare “Health companion device using IoT and wear able
computing”, International Conference on Internet of Things and Applications (IOTA) Maharashtra Institute of Technology, Pune, India 22
Jan - 24 Jan, 2016.

Authors: Annu T Mathew, Saravanakumar MP


Removal of Malachite Green using Green Synthesized α-MnO2 nanoparticles: Kinetics, Intraparticle
Paper Title:
Diffusion and Isotherm
Abstract: This study helps to understand the adsorption of Malachite Green (MG) on α-MnO2 nanoparticles
which was green synthesized using sugarcane juice. Different parameters including pH of solution, dosage of
adsorbent, concentration of pollutant and time for adsorption process was studied to conclude the efficacy of the
process using the adsorbent. The isotherm and kinetics for adsorption of MG concluded that Langmiur isotherm
and pseudo second order kinetic model yields the best fit. The maximum monolayer sorption according to
Langmiur was found to be 300.03 mg/g. So, α-MnO2 nanoparticles prove to be a cost effective, environment
friendly and easily available 3D adsorbent.

Keyword : Malachite Green, α-MnO2 nanorods, green synthesis, Kinetic study.


References:
1. M. Baek, C. O. Ijagbemi and D. Kim, “Removal of Malachite Green from aqueous solution using degreased coffee bean,” Journal o f
Hazardous Materials, vol. 176, pp. 820–828, 2010.
2. B. H. Hameed and M. I. El-khaiary, “Malachite green adsorption by rattan sawdust : Isotherm , kinetic and mechanism modeling,”
Journal of Hazardous Materials, vol. 159, pp. 574–579, 2008.
927. 3. S. Srivastava, R. Sinha, and D. Roy, “Toxicological effects of malachite green,” Aquatic Toxicology, vol. 66, pp. 319–329, 2004.
4. W. Xu, Y. Song, K. Dai, S. Sun, G. Liu, and J. Yao, “Novel ternary nanohybrids of tetraethylenepentamine and graphene oxide
decorated with MnFe 2 O 4 magnetic nanoparticles for the adsorption of Pb ( II ),” Journal of Hazardous Materials, vol. 358, no. 5255-
June, pp. 337–345, 2018. 5258
5. Y. Huang, C. Han, Y. Liu, M. Nadagouda, L. Machala, K. E. O' Shea, V. K. Sharma and D. D. Dionysiou “Degradation of atrazine
by ZnxCu1−xFe2O4nanomaterial-catalyzed sulfite under UV–vis light irradiation: Green strategy to generate SO4[rad]−,” Applied
Catalysis B: Environmental., vol. 221, pp. 380–392, 2018.
6. H. A. Salam, P. Rajiv, M. Kamaraj, P. Jagadeeswaran, S. Gunalan, and R. Sivaraj, “Plants : Green Route for Nanoparticle Synth esis,”
International Research Journal of Biological Sciences, vol. 1, no. 5, pp. 85–90, 2012.
7. E. M. Fakhry, “Padina pavonica for the Removal of Dye from Polluted Water,” American Journal of Plant Sciences, vol. 2013, no .
October, pp. 1983–1989, 2013.
8. S. Hashemian, A. Dehghanpor, and M. Moghahed, “Synthesis and Characterization of Manganese Ferrite Spinel for Adsorption of
Malachite Green from Water,” Oriental Journal of Chemistry, vol. 31 no. (3), pp. 1767-1772, 2015.
9. X. Zhang, S. Zhang, B. Pan, M. Hua, and X. Zhao, “Bioresource Technology Simple fabrication of polymer-based Trametes
versicolor laccase for decolorization of malachite green,” Bioresource Technology, vol. 115, pp. 16–20, 2012.
10. B. Cuiping, X. Wensheg, F. Dexin, X. Mo, G. Dong, G. Zhongxue and Z. Yanshui “Efficient decolorization of Malachite Green in
the Fenton reaction catalyzed by [ Fe ( III ) -salen ] Cl complex,” Chemical Engineering Journal., vol. 215–216, pp. 227–234, 2013.
11. A. C. Arampatzidou and E. A. Deliyanni, “Journal of Colloid and Interface Science Comparison of activation media and pyrolysis
temperature for activated carbons development by pyrolysis of potato peels for effective adsorption of endocrine disruptor bisphenol-
A,” Journal of Colloid Interface Science, vol. 466, pp. 101–112, 2016.
12. B. H. Hameed and M. I. El-khaiary, “Kinetics and equilibrium studies of malachite green adsorption on rice straw-derived char,”
Journal of Hazardous Materials, vol. 153, pp. 701–708, 2008.
13. B. H. Hameed and M. I. El-khaiary, “Batch removal of malachite green from aqueous solutions by adsorption on oil palm trunk
fibre : Equilibrium isotherms and kinetic studies,” Journal of Hazardous Materials, vol. 154, pp. 237–244, 2008.

Authors: Utsav Krishnan, Ayush Agarwal, Avinash Senthil, Pratik Chattopadhyay

Paper Title: Image Enhancement and Denoising in Extreme Low-Light Conditions


Abstract: Image noise refers to the specks of false colors or artifacts that diminish the visual quality of the
captured image. It has become our daily experience that with affordable smart-phone cameras we can capture high
clarity photos in a brightly illuminated scene. But using the same camera in a poorly lit environment with high ISO
settings results in images that are noisy with irrelevant specks of colors. Noise removal and contrast enhancement
in images have been extensively studied by researchers over the past few decades. But most of these techniques fail
to perform satisfactorily if the images are captured in an extremely dark environment. In recent years, computer
928. vision researchers have started developing neural network-based algorithms to perform automated de-noising of
images captured in a low-light environment. Although these methods are reasonably successful in providing the 5259-
desired de-noised image, the transformation operation tends to distort the structure of the image contents to a 5264
certain extent. We propose an improved algorithm for image enhancement and de-noising using the camera’s raw
image data by employing a deep U-Net generator. The network is trained in an end-to-end manner on a large
training set with suitable loss functions. To preserve the image content structures at a higher resolution compared to
the existing approaches, we make use of an edge loss term in addition to PSNR loss and structural similarity loss
during the training phase. Qualitative and quantitative results in terms of PSNR and SSIM values emphasize the
effectiveness of our approach.
Keyword : Image Noise, PSNR, ISO, Illumination, Network based Algorithms.
References:
1. Samuel W Hasinoff, Dillon Sharlet, Ryan Geiss, Andrew Adams, Jonathan T Barron, Florian Kainz, Jiawen Chen, and Marc Levoy.
Burst Photography for High Dynamic Range and Low-Light Imaging on Mobile Cameras. ACM Transactions on Graphics,
35(6):192, 2016.
2. Wei-Qiang Zhang and Guo-xiang Song. Signal De-noising in Wavelet Domain based on a New Kind of Thresholding Function [J].
Journal of Xidian University, 2:030, 2004.
3. Tie Cai and Jie Zhu. Adaptive Selection of Optimal Decomposition Level in Threshold De-noising Algorithm based on Wavelet.
Control and Decision, 21(2):217, 2006.
4. Eero P Simoncelli. Bayesian Denoising of Visual Images in the Wavelet Domain. In Bayesian Inference in Wavelet-Based Models,
pages 291–308. Springer, 1999.
5. Ramin Eslami and Hayder Radha. The Contourlet Transform for Image Denoising using Cycle Spinning. In 37th Asilomar
Conference on Signals, Systems & Computers, volume 2, pages 1982–1986. IEEE, 2003.
6. Antoni Buades, Bartomeu Coll, and J-M Morel. A Non-Local Algorithm for Image Denoising. In IEEE Computer Society
Conference on Computer Vision and Pattern Recognition, volume 2, pages 60–65, 2005.
7. Buades, Antoni and Coll, Bartomeu and Morel, Jean-Michel. Non-Local Means Denoising. Image Processing On Line, 1:208–212,
2011.
8. Pierrick Coup´e, Pierre Yger, and Christian Barillot. Fast Non Local Means Denoising for 3D MR Images. In International
Conference on Medical Image Computing and Computer-Assisted Intervention, pages 33–40. Springer, 2006.
9. Kostadin Dabov, Alessandro Foi, Vladimir Katkovnik, and Karen Egiazarian. BM3D Image Denoising with Shape-Adaptive
Principal Component Analysis. In Workshop on Signal Processing with Adaptive Sparse Structures Representations, 2009.
10. Rafael C Gonzalez and E Richard. Digital Image Processing. ed: Prentice Hall Press, ISBN 0-201-18075, 8, 2002.
11. Manpreet Kaur and Jasdeep Kaur. Survey of Contrast Enhancement Techniques based on Histogram Equalization. 2(7):138 –141,
2011.
12. Kaiming He, Jian Sun, and Xiaoou Tang. Single Image Haze Removal Using Dark Channel Prior. IEEE Transactions on Pattern
Analysis and Machine Intelligence, 33(12):2341–2353, 2011.
13. Bin Xie, Fan Guo, and Zixing Cai. Improved Single Image Dehazing Using Dark Channel Prior and Multi-scale Retinex. In
International Conference on Intelligent System Design and Engineering Application, volume 1, pages 848–851, 2010.
14. Sachin D Ruikar and Dharmpal D Doye. Wavelet Based Image Denoising Technique. International Journal of Advanced Computer
Science and Applications, 2(3):49–53, 2011.
15. Mading Li, Jiaying Liu, Wenhan Yang, Xiaoyan Sun, and Zongming Guo. Structure-Revealing Low-Light Image Enhancement via
Robust Retinex Model. IEEE Transactions on Image Processing, 27(6):2828–2841, 2018.
16. Xiaojie Guo, Yu Li, and Haibin Ling. LIME: Low-Light Image Enhancement via Illumination Map Estimation. IEEE Transactions
on Image Processing, 26(2):982–993, 2017.
17. C. Wu, W. Liu, and X. Guo. Adaptive Total Variation Model for Image Denoising based on Modified Orientation Information
Measure. In 3rd International Congress on Image and Signal Processing, volume 2, pages 616–620, 2010.
18. Javier Portilla, Vasily Strela, Martin J Wainwright, and Eero P Simoncelli. Adaptive Wiener Denoising Using A Gaussian Scale
Mixture Model In The Wavelet Domain. In International Conference on Image Processing, volume 2, pages 37–40. IEEE, 2001.
19. Yibin Tang, Ying Chen, Ning Xu, Aimin Jiang, and Lin Zhou. Image Denoising via Sparse Coding Using Eigenvectors of Graph
Laplacian. Digital Signal Processing, 50:114–122, 2016.
20. S. Gu, L. Zhang, W. Zuo, and X. Feng. Weighted Nuclear Norm Minimization with Application to Image Denoising. In IEEE
Conference on Computer Vision and Pattern Recognition, pages 2862–2869, June 2014.
21. Songyuan Tang and Jian Yang. Image Denoising using K-SVD and NonLocal Means. In IEEE Workshop on Electronics, Computer
and Applications, pages 886–889, 2014.
22. Kai Zhang, Wangmeng Zuo, Yunjin Chen, Deyu Meng, and Lei Zhang. Beyond a Gaussian Denoiser: Residual Learning of Deep
CNN for Image Denoising. CoRR, abs/1608.03981, 2016.
23. Kin Gwn Lore, Adedotun Akintayo, and Soumik Sarkar. LLNet: A Deep Autoencoder Approach to Natural Low-light Image
Enhancement. CoRR, abs/1511.03995, 2015.
24. Chen Chen, Qifeng Chen, Jia Xu, and Vladlen Koltun. Learning to See in the Dark. In Proceedings of the IEEE Conference on
Computer Vision and Pattern Recognition, pages 3291–3300, 2018.
25. D. Yang and J. Sun. BM3D-Net: A Convolutional Neural Network for Transform-Domain Collaborative Filtering. IEEE Signal
Processing Letters, 25(1):55–59, 2018.
26. Bryce E Bayer. Color Imaging Array, July 1976. US Patent 3,971,065.
27. Wikipedia contributors. Peak Signal-to-Noise Ratio - Wikipedia, The Free Encyclopedia, 2019. [Online; accessed 31-July-2019].
28. Wikipedia contributors. Structural Similarity - Wikipedia, The Free Encyclopedia, 2019. [Online; accessed 31-July-2019].
29. Zhou Wang, Eero P Simoncelli, and Alan C Bovik. Multiscale Structural Similarity for Image Quality Assessment. In 37th Asilom ar
Conference on Signals, Systems & Computers, 2003, volume 2, pages 1398–1402. IEEE, 2003.
30. Jacob Søgaard, Luk´aˇs Krasula, Muhammad Shahid, Dogancan Temel, Kjell Brunnstr¨om, and Manzoor Razaak. Applicability of
Existing Objective Metrics of Perceptual Quality for Adaptive Video Streaming. Electronic Imaging, 2016(13):1–7, 2016.
31. Richard Dosselmann and Xue Dong Yang. A Comprehensive Assessment of the Structural Similarity Index. Signal, Image and Video
Processing, 5(1):81–91, 2011.
32. legendongary. BM3D-Net https://github.com/legendongary/ BM3D-Net, 2018.

Authors: Princy Randhawa, Vijay Shanthagiri, Ajay Kumar


Identification of Violent Response with Stretch Sensor Data from a Smart-Jacket using Naïve Bayes
Paper Title:
Algorithm
Abstract: In this paper, a smart-jacket using stretch sensors, pressure sensors was built for purpose of
generating body-movements data and in order to record different kinds of signals and the distribution of the same
on the jacket. Every degree of motion, when exercised, generates voltage changes in the stretch sensors as it is its
property to do so. This data is collected in a flora chip set, which is Arduino based. The collected data is processed,
929. pruned and filtered for outliers. This paper concerns with a supervised learning algorithm called Naive Bayes,
which is applied over independent datasets, meaning one set of observation has no direct relations to each other.
5265-
The placement of sensor are on the shoulders and elbows and the responses from each are independent of each
5270
other. Using Naive Bayes, the date has been classified for the violent response and the normal action.

Keyword : Naïve Bayes, Physical Violence, Stretch Sensors, Smart jacket.


References:
1. Cornacchia, M., Ozcan, K., Zheng, Y., & Velipasalar, S. (2017). Using Wearable Sensors, 17(2), 386–403.
2. N. Noury, A. Galay, J. Pasquier, and M. Ballussaud, “Preliminary investigation into the use of autonomous fall detectors,” in Proc. Int.
Conf. IEEE Eng. Med. Biol. Soc., Aug. 2008, pp. 2828–2831.
3. C. C. Wang et al., “Development of a fall detecting system for the elderly residents,” in Proc. 2nd Int. Conf. Bioinform. Biomed. Eng.,
2008, pp. 1359–1362.
4. T. Tamura, “Wearable accelerometer in clinical use,” in Proc. Int. Conf. IEEE Eng. Med. Biol. Soc., vol. 7, Jan. 2005, pp. 7165–7166.
5. Y. Cao, Y. Yang, and W. H. Liu, “E-FallD: A fall detection system using Android-based smartphone,” in Proc. 9th Int. Conf. Fuzzy Syst.
Knowl. Discovery, May 2012, pp. 1509–1513.
6. M. R. Narayanan, S. R. Lord, M. M. Budge, B. G. Celler, and N. H. Lovell, “Falls management: Detection and prevention, using a waist-
mounted triaxial accelerometer,” in Proc. 29th Annu. Int. Conf. IEEE Eng. Med. Biol. Soc. (EMBS), Aug. 2007, pp. 4037–4040
7. J. Mantyjarvi, J. Himberg, and T. Seppanen, “Recognizing human motion with multiple acceleration sensors,” in Proc. IEEE Int. Conf.
Syst., Man, Cybern., vol. 2, Oct. 2001, pp. 2–7
8. D. M. Karantonis, M. R. Narayanan, M. Mathie, N. H. Lovell, and B. G. Celler, “Implementation of a real-time human movement
classifier using a triaxial accelerometer for ambulatory monitoring,” IEEE Trans. Inf. Technol. Biomed., vol. 10, no. 1, pp. 1 56–167, Jan.
2006
9. I. Mandal, S. L. Happy, D. P. Behera, and A. Routray, “A framework for human activity recognition based on accelerometer data,” in
Proc. 5th Int. Conf. Next Generat. Inf. Technol. Summit (Confluence), Sep. 2014, pp. 600–603.
10. C. Zhu and W. Sheng, “Human daily activity recognition in robotassisted living using multi-sensor fusion,” in Proc. IEEE Int. Conf.
Robot. Autom., May 2009, pp. 2154–2159
11. L. Gao, A. K. Bourke, and J. Nelson, “Evaluation of accelerometer based multi-sensor versus single-sensor activity recognition systems,”
Med. Eng. Phys., vol. 36, no. 6, pp. 779–785, Jun. 2014.
12. M. Yu, A. Rhuma, S. Naqvi, L. Wang, and J. Chambers, “Posture recognition based fall detection system for monitoring an elderly
person in a smart home environment,” IEEE Trans. Inf. Technol. Biomed., vol. 16, no. 6, p. 1, Nov. 2012.
13. Cheng, L., Power, K., Corporation, T., Guan, Y., Zhu, K., & Li, Y. (2017). Learning Methods with Wearable Sensors.
14. S. H. Fang, Y. C. Liang, and K. M. Chiu, “Developing a mobile phonebased fall detection system on Android platform,” in Proc. Comput.,
Commun. Appl. Conf., 2012, pp. 143–146.
15. J. Dai, X. Bai, Z. Yang, Z. Shen, and D. Xuan, “PerFallD: A pervasive fall detection system using mobile phones,” in Proc. IEEE Int. Conf.
Pervasive Comput. Commun. Workshops, Mar. 2010, pp. 292–297.
16. M. Shoaib, S. Bosch, O. D. Incel, H. Scholten, and P. J. M. Havinga, “A survey of Online activity recognition using mobile ph ones,”
Sensors, vol. 15, no. 1, pp. 2059–2085, 2015.
17. G. A. Koshmak, M. Linden, and A. Loutfi, “Evaluation of the Androidbased fall detection system with physiological data monitoring,” in
Proc. Annu. Int. Conf. IEEE Eng. Med. Biol. Soc. (EMBS), Jul. 2013, pp. 1164–1168.
18. X. Long, B. Yin, and R. M. Aarts, “Single-accelerometer-based daily physical activity classification,” in Proc. Int. Conf. IEEE Eng. Med.
Biol. Soc., Sep. 2009, pp. 6107–6110
19. M. Muehlbauer, G. Bahle, and P. Lukowicz, “What can an arm holster worn smart phone do for activity recognition?” in Proc. Int. Symp.
Wearable Comput. (ISWC), 2011, pp. 79–82.
20. Preece, S. J., Goulermas, J. Y., Kenney, L. P. J., & Howard, D. (2009). A Comparison of Feature Extraction Methods for the Classification
of Dynamic Activities from Accelerometer Data, 56(3), 871–879.
21. Tang, W., & Sazonov, E. S. (2014). Highly Accurate Recognition of Human Postures and Activities Through Classification With
Rejection, 18(1), 309–315.
22. C. M. Bishop, Pattern Recognition and Machine Learning,vol.1, Springer, New York, NY, USA, 2006.
23. Zemp, R., Tanadini, M., Plüss, S., Schnüriger, K., Singh, N. B., Taylor, W. R., & Lorenzetti, S. (2016). Application of Machine Learning
Approaches for Classifying Sitting Posture Based on Force and Acceleration Sensors.
24. Y. Cao, Y. Yang, and W. H. Liu, “E-FallD: A fall detection system using Android-based smartphone,” in Proc. 9th Int. Conf. Fuzzy Syst.
Knowl. Discovery, May 2012, pp. 1509–1513.
25. Vaithiyanathan, V., Rajeswari, K., Tajane, K., & Pitale, R. (2013). Comparison of different classification techniques, 6(2), 764–768.
26. Zerrouki, N., & Houacine, A. (2014). Automatic Classification of Human Body Postures Based on the Truncated SVD, 2(1), 58–62.
https://doi.org/10.7763/JACN.2014.V2.82
27. Randhawa, Princy & Shanthagiri, Vijay & Mour, Rishabh & Kumar, Ajay. (2018). Design and Development of Smart-Jacket for Posture
Detection. 1-5.
28. Randhawa, Princy & Shanthagiri, Vijay & Kumar, Ajay.. “A review on applied machine learning in wearable technology and its
applications.” 2017 International Conference on Intelligent Sustainable Systems (ICISS) (2017): 347-354.
29. Poupyrev, I., Gong, N.-W., Fukuhara, S., Karagozler, M. E., Schwesig, C., & Robinson, K. E. (2016). Project Jacquard: Interactive Digital
Textiles at Scale. Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 4216–4227
30. Stoppa, M., & Chiolerio, A. (2014). Wearable electronics and smart textiles: A critical review. Sensors (Switzerland), 14(7), 11957–11992

Authors: R.M. Valeev, R.Z. Valeeva, D. R. Khayrutdinov, S. A. Kirillina


Epistolary Heritage by A. Y. Krymsky: Pre-Revolutionary Correspondence of A. Y. Krymsky and V.V.
Paper Title:
Bartold (1908-1913)
Abstract: The article presents the material about the unpublished correspondence of Ahatanhel Yukhymovych
Krymsky and Vasily Vladimirovich Bartold in 1908-1913 containing historical and scientific information that
allows us to expand our ideas about the directions and problems of Russian oriental studies at the beginning of the
20th century. The correspondence of two outstanding scholars from Russia and Ukraine testifies to the fact that
they were brought together by the human community and the similarity of professional interests. The letters of V.V.
Bartold and A.E. Krymsky show how much they were concerned about the state of science about the East and its
teaching system.

930. Keyword : Russia, Ukraine, East, orientalism, epistolary heritage, the Islamic world.
5271-
References: 5275
1. Institut rukopisi Natsional'noi biblioteki Ukrainy imeni V.I. Vernadskogo (IR NBUV), fond І, dela 22664–22671 [Pis'ma V.V. Bartol'da –
A. Y. Krymskomu] (Institute of Manuscripts of V.I. Vernadsky National Library of Ukraine, f. I, № 22664–22671 [Letters of V.V.
Bartold to A. Y. Krymsky]).
2. Institut rukopisi Natsional'noi biblioteki Ukrainy imeni V.I. Vernadskogo (IR NBUV), fond XXXVI, delo 194 [Pis'ma V.V. Bartol 'da –
A. Y. Krymskomu] (Institute of Manuscripts of V.I. Vernadsky National Library of Ukraine, f. XXXVI, № 194 [Letter of V.V. Bartold to
A.E. Krymsky]).
3. Institut rukopisi Natsional'noi biblioteki Ukrainy imeni V.I. Vernadskogo (IR NBUV), fond XXXVI, delo 366 [Pis'ma V.V. Bartol 'da –
A. Y. Krymskomu] (Institute of Manuscripts of V.I. Vernadsky National Library of Ukraine, f. XXXVI, № 366 [Letter of N.A. Mednikov
to A. Y. Krymsky]).
4. Sankt-Peterburgskii filial Arkhiva Rossiiskoi akademii nauk (SPb ARAN), fond 68, op. 2, d. 128 [Pis'ma A. Y. Krymskogo – V.V.
Bartol'du] (St. Petersburg Branch of the Archive of the Russian Academy of Sciences, f. 68, inventory 2, № 128 [Letters to A. Y.
Krymsky to V.V. Bartold]).
5. Bartold V.V. “Ani”. Bartold V.V. Sochineniya. T. III. Raboty po istoricheskoi geografii (“Ani”. Bartold V.V. Works. Vol. III. Works on
Historical Geography). Moscow, 1965. Pp. 327-330.
6. Bartold V.V. “Karl Velikii i Kharun ar-Rashid”. Bartold V.V. Sochineniya. T. VI. Raboty po istorii islama i Arabskogo khalifata
(“Charlemagne and Harun al-Rashid”. Bartold V.V. Works. Vol. VI. Works on the History of Islam and the Arab Caliphate). Moscow,
1966. Pp. 342-364.
7. Bartold V.V. “Khalif i sultan”. Bartold V.V. Sochineniya. T. VI. Raboty po istorii islama i Arabskogo khalifata (“The Caliph and the
Sultan”. Bartold V.V. Works. Vol. VI. Works on the History of Islam and the Arab Caliphate). Moscow, 1966. Pp. 15-80.
8. Bartold V.V. “K voprosu o franko-musul'manskikh otnosheniyakh”. Bartold V.V. Sochineniya. T. VI. Raboty po istorii islama i
Arabskogo khalifata (“On the Issue of Franco-Muslim Relations”. Bartold V.V. Works. Vol. VI. Works on the History of Islam and the
Arab Caliphate). Moscow, 1966. Pp. 432-461.
9. Bartold V.V. “Otzyv o trudakh N.Y. Marra po issledovaniyu drevnostei Ani”. Bartold V.V. Sochineniya. T. IV. Raboty po arkheol ogii,
numizmatike, epigrafike i etnografii (“Review of Works of N.Y. Marr on the Study of the Antiquities of Ani”. Bartold V.V. Works. Vol.
IV. Works on Archeology, Numismatics, Epigraphy and Ethnography). Moscow, 1966. Pp. 202-235.
10. Bartold V.V. “Persidskaya nadpis' na stene Aniiskoi mecheti Manuche”. Bartold V.V. Sochineniya. T. IV. Raboty po arkheologii,
numizmatike, epigrafike i etnografii (“A Persian Inscription on the Wall of the Mosque Manuche Ani”. Bartold V.V. Works. Vol. IV.
Works on Archeology, Numismatics, Epigraphy and Ethnography). Moscow, 1966. Pp. 313-338.
11. Bartold V.V. “Teokraticheskaya ideya i svetskaya vlast' v musul'manskom gosudarstve”. Bartold V.V. Sochineniya. T. VI. Raboty po
istorii islama i Arabskogo khalifata (“The Theocratic Idea and Secular Power in the Muslim State”. Bartold V.V. Works. Vol. VI. Works
on the History of Islam and the Arab Caliphate). Moscow, 1966. Pp. 303-319.
12. Bartold V.V.Turkestan v epokhu mongol'skogo nashestviya. Ch. 1. Teksty(Turkestan in the Era of the Mongol Invasion. Part 1. T exts).
St. Petersburg, 1898.Ch. 2.Issledovanie (Part 2. Research). St. Petersburg, 1900.
13. Clouston W.A. Narodni kazky ta vygadky, ikh vandrivky ta pereminy (Popular Tales and Fictions, their Migrations and Transformations).
Transl. from English by A. Y. Krymsky. Lvov, 1896.
14. Khalidov A.B. “Predislovie”. Bartold V.V. Sochineniya. T. VI. Raboty po istorii islama i Arabskogo khalifata (“Preface”. Bartold V.V.
Works. Vol. VI. Works on the History of Islam and the Arab Caliphate). Moscow, 1966. Pp. 5-13.
15. Krymsky A. Y. Istoriya Persii, ee literatury i dervisheskoi teosofii (History of Persia, Its Literature and Dervish Theosophy). Vol. 1. Issue
I. Moscow, 1901.
16. “Perepiska akademikov A. Y. Krymskogo i I.Y. Krachkovskogo 1920–1930-kh godov. (Publikatsiya I.M. Smilyanskoi) “. Neizvestnye
stranitsy otechestvennogo vostokovedeniya (“Correspondence of the Academicians A. Y. Krymsky and I.J. Krachkovsky in the 1920 –
1930s. (Publication of I.M. Smilyanskaya)”. Unknown Pages of the Russian Oriental Studies). Moscow, 1997. Pp. 155-368.
17. Clouston W.A. Popular Tales and Fictions, their Migrations and Transformations. London, 1887.
18. Le Strange, Guy.The Lands of the Eastern Caliphate: Mesopotamia, Persia and Central Asia from the Muslim Conquest to the Time of
Timur. Cambridge, 1905.

Authors: Kandukuri Abhishek, P.Sri Vidya Devi

Paper Title: Optimization of Load Frequency Control using Nature Inspired Algorithum
Abstract: This paper describes about load frequency control problem in power systems by using multi-verse
optimization algorithm (MVO). This paper compares the controlling of LFC with PID and PID+MVO controllers.
In this paper four area hydrothermal networks was represented.MVO algorithm was introduced in this paper for
tuning the secondary controllers. The concept of MVO is runs on white hole, black hole and warm hole. Inflation
rates of universe can be calculated and implemented in PID. This paper was implemented in simulator
(MATLAB/SIMULINK) software.

Keyword : This paper compares the controlling of LFC with PID and PID+MVO controllers

931.
References:
1. John H (1992) Holland, adaptation in natural and artificial systems. MIT Press, Cambridge.
2. S.K. Sinha Surya Prakash a,∗, ‘Simulation based neuro-fuzzy control hybrid intelligent PI control approach in four-area load 5276-
frequency control of interconnected power system’ Applied Soft Computing 23 (2014) 152–164. 5281
3. V.D.M. Kumar, “Intelligent controllers for automatic generation control,” IEEE Region 10 International Conference on Global
Connectivity in Energy, Computer, Communication and Control, TENCON ‘98, vol. 2, pp. 557-574,
4. Prakash, S., Sinha, S.K.: ‘Simulation based neuro-fuzzy hybrid intelligent PI control approach in four-area load frequency control of
interconnected power system’, Appl. Soft Comput., 2014, 23, pp. 152–164
5. Kennedy J, Particle swarm optimization. In:Proceedings of IEEE international conference on neural net-works, pp 1942–1948.
6. Rashedi E, Nezamabadi-Pour H, Saryazdi S (2009) GSA: a gravitational search algorithm. Inf Sci 179:2235–2248.
7. Saikia, L.C ,Raju, M.,., Sinha, N.: ‘Automatic generation control of a multiarea system using ant lion optimizer algorithm based PID
plus second order derivative controller’, Int. J. Elect. Power Energy Syst., 2016, 80, pp. 52–63
8. Tripathy, S.C., Bhatti, T.S..: ‘automatic generation control analysis with reheat steam turbines and governor dead band effects’, IEEE
Trans. Power Apparatus Syst., 1984, PAS-103, (5), pp. 1045–1051
9. Saxsena, S., Hote, Y.V.: ‘Load frequency control problems through internal model control scheme and model order reduction’, IEEE
Trans. Power Syst., 2013, 28, (3), pp. 2749–2757
10. Duneshfar, F., Bevrani] Daneshfar,, H.: Load frequency control using genetic algorithms’, Electrical. Power Energy Syst., 201 1, 42,
pp. 257–263.

Authors: K Sai Divya, S.Siva Nageswara Rao, K. LakshmiNadh

Paper Title: An Efficient Spatial Temporal Provenance Mechanism for Adhoc Mobile Users
Abstract: Location-based services rectangle measures quickly
changing into vastly in different style. Additionally to services supported users' current location, several potential
932. services believe users' currentlocation history, or their spatial-temporal place of origin.Malicious users might idle
their spatial-temporal place of originwhile not a rigorously designed security system for users toprove their past 5282-
locations. during this system, we tends to gift theSpatial-Temporal place of origin Assurance with Mutual Proofs 5285
theme. STAMP is meant for ad-hoc mobile usersgenerating location system proofs for every different in an
exceedinglydistributed settings. However, it will simply accommodate trustyworthy mobile users and wireless
access points. STAMP ensures theintegrity and non-transferability of the placement proofs andprotects users'
privacy. A semi-trusted Certification Authority isemployed to distribute specific keys in addition as guard users
against collusion by a light-weight entropy-based trust analysisapproach. Our image implementation is based on the
Andriod platformshows that STAMP is low cost in terms of procedure and storageresources. Intensive simulation
experiments show that ourentropy-based trust model is in a position to attains high collusion to detects the
accuracy.

Keyword : Location proof, privacy, spatial-temporal provenance, trustworthy.


References:
1. S. Saroiu and A. Wolman, “Enabling new mobile applications with location proofs,” in Proc. ACM HotMobile, 2009, Art. no. 3.
2. W. Luo and U. Hengartner. Veriplace: a privacy-aware location proof architecture. In ACM GIS, 2010.
3. D. Singelee and B. Preneel, “Location verification using secure dis- tance bounding protocols,” in Proc. IEEE MASS, 2005.
4. B. Waters and E. Felten, “Secure, private proofs of location,” Depart- ment of Computer Science, Princeton University, Princeton, NJ, USA,
Tech. Rep., 2003
5. I. Afyouni, C. Ray, and C. Claramunt, “Spatial models for context- aware indoor navigation systems: A survey,” J. Spatial Inf. Sci., no. 4,
pp. 85–123, 2014.
6. N. Sastry, U. Shankar, and D. Wagner, “Secure verification of location claims,” in Proc. ACM WiSe, 2003, pp. 1–10.

Authors: Gopi Battineni, Nalini Chintalapudi, Francesco Amenta, Seyed Khosrow Tayebati
Report on Market Analysis and Preventions Need to Provide Medications for Rural Patients of Italy
Paper Title:
using ICT Technologies
Abstract: Access to healthcare services is critical to good health, yet residents of internal areas face a variety of
access barriers. The obstacles faced by health care providers and patients in rural areas are vastly different from
those in urban areas. This might be caused by economic factors, cultural and social differences, educational
shortcomings, lack of recognition by legislators and the sheer isolation of living in internal areas all conspire to
create health care disparities and impede people living in internal areas in their struggle to lead normal healthy
lives. Italy’s indicators of health system outcomes and quality are consistently good. This is despite levels of health
spending below other high-income countries like Germany, France, and other EU nations. However, Italy is lagging
in some areas, like long-term care and prevention of non-communicable diseases. Based on available analyses,
further progress is called for to promote appropriateness of care, address geographic imbalances in health care use
and prevent the spread of risk factors including chronic diseases and regular health issues. To eradicate these issues,
it is essential to develop a system that will help internal areas patients by using contemporary technologies. The
improved system could assist patients also without the presence in the same place of a doctor that will generate
corresponding prescriptions, which authenticated by physicians will be stored in the database.
933.
5286-
Keyword : Healthcare, Rural area patients, Artificial Intelligence, Pathologies, ICT
5289
References:
1. K. Källander et al., “Mobile health (mhealth) approaches and lessons for increased performance and retention of community health
workers in lowand middle-income countries: A review,” Journal of Medical Internet Research. 2013.
2. G. Messina, F. Vencia, S. Mecheroni, S. Dionisi, L. Baragatti, and N. Nante, “Factors affecting patient satisfaction with emergency
department care: an Italian rural hospital,” Glob. J. Health Sci., 2015.
3. R. Papp et al., “Perceptions of quality in primary health care: Perspectives of patients and professionals based on focus group discussions,”
BMC Fam. Pract., 2014.
4. J. Gómez, B. Oviedo, and E. Zhuma, “Patient Monitoring System Based on Internet of Things,” in Procedia Computer Science, 2016.
5. J. P. Mackenbach et al., “Socioeconomic inequalities in health in 22 European countries,” N. Engl. J. Med., 2008.
6. S. Allender, P. Scarborough, V. Peto, and M. Rayner, “European cardiovascular disease statistics 2008 edition,” Health Econ., 2008.
7. World Health Organisation, “Status Report on Alcohol and Health in 35 European Countries,” Who, 2013.
8. V. Torchilin, “Tumor delivery of macromolecular drugs based on the EPR effect,” Advanced Drug Delivery Reviews. 2011.
9. T. Peregrin, “Personal and Electronic Health Records: Sharing Nutrition Information across the Health Care Community,” J. Am. Diet.
Assoc., 2009.
10. A. G. Hirsch et al., “The electronic health record audit file: The patient is waiting,” J. Am. Med. Informatics Assoc., 2017.
11. S. K. Mishra, L. Kapoor, and I. P. Singh, “Telemedicine in India: Current Scenario and the Future,” Telemed. e-Health, 2009.
12. R. M. Warner, C. Bastianpillai, B. W. Lamb, N. Sevdalis, and J. S. A. Green, “Health services research,” J. Clin. Urol., 2018.

Authors: Tahirou Djara, Abdou-Aziz Sobabe, Antoine Vianou

Paper Title: Incorporating Metadata in Multibiometric Score-Level Fusion: an Optimized Architecture


Abstract: This manuscript presents a review on multibiometrics using ancillary information, in addition to the
main biometric data. The proposed method involves taking non-biometric information into account in the biometric
recognition process to improve system performance. This ancillary information can come from the user (the skin
color), the sensor (the camera flash, etc.) or the operating environment (the ambient noise). Moreover, the paper
presents an extension of the adapted sequential fusion framework through a complete description of the method
934. used for the score-level fusion architecture presented at the IEEE BioSmart 2019 Proceedings. An optimized score-
level fusion architecture is proposed. An introduction of new concepts (namely “biochemical features” and “multi
5290-
origin biometrics”) is also made. The first part of the paper highlights the various biometric systems developed up
5305
to now, their architecture and characteristics. Then, the manuscript discussed about multibiometrics through its
advantages, its diversity and the different levels of fusion. An attention was paid to the score-level fusion before
addressing the consideration of ancillary information (or metadata) in multibiometrics. Dealing with the affective
computing, the influence of emotion on the performance of biometric systems is explored. Finally, a typology of
biometric adaptation is discussed. As an application, the proposed methodology will implement a multibiometric
system using the face, contactless fingerprint and skin color. A single sensor will be used (a camera) with two shots
while the skin color will be extracted automatically from the facial image.
Keyword : Authentication, Biometrics, Biometric Adaptation Typology, Multi Origin Biometrics.
References:
1. A. K. Jain and A. Ross, “Learning user-specific parameters in a multibiometric system,” Appeared in Proc. International Conference
on Image Processing (ICIP), Rochester, New York, September (2002), pp 22-25, DOI: 10.1109/ICIP.2002.1037958.
2. H. AlMahafzah and M. Z. AlRwashdeh, “A survey of multibiometric systems,” International Journal of Computer Application,
volume 43 No 15 April (2012), pp 36-43, DOI : 10.5120/6182-8612.
3. M. Nageshkumar, P. K. Mahesh, and M. N. Shanmukha Swamy, “An efficient secure multimodal biometric fusion using palmprint
and face image,” International Journal of Computer Science Issues, Vol. 2, (2009), pp 49-53, arXiv:0909.2373v1.
4. A. Jain, K. Nandakumar, and A. Ross, “Score normalization in multimodal biometric systems,” Elsevier, Pattern Recognition 38
(2005), pp 2270-2285, DOI:10.1016/j.patcog.2005.01.012.
5. M. El-Abed and C. Charrier, “Evaluation of biometric systems. new trends and developments in biometrics,” (2012), pp. 149 - 169,
http://dx.doi.org/10.5772/52084. <hal-00990617>
6. R. Gad, A. El-Sayed, N. El-Fishawy, and M. Zorkany, “Multi-biometric systems: A state of the art survey and research directions,”
International Journal of Advanced Computer Science and Applications, Vol. 6, No. 6, (2015), pp 128-138, DOI :
10.14569/IJACSA.2015.060618.
7. T. Djara, A.-A. Sobabe, M. B. Agbomahena, and A. Vianou, “Practical method for evaluating the performance of a biometric
algorithm,” © ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019, Springer Nature
Switzerland AG 2019, AFRICATEK 2018, LNICST 260, (2019), pp. 125–132, https://doi.org/10.1007/978-3-030-05198-3_11.
8. N. Gopal and R. K. Selvakumar, “Multimodal biometric identification system - An overview,” International Journal of Engineering
Trends and Technology (IJETT) – Volume 33 Number 7- March (2016), pp 351-355, DOI: 10.14445/22315381/IJETT-V33P267.
9. S. Guerfi, Authentification d’individus par reconnaissance de caractéristiques biométriques liées aux visages 2D/3D. Traitement du
signal et de l’image, PhD thesis, Université d’Evry-Val d’Essonne, (2008). <tel-00623243>
10. A. K. Jain and A. Kumar, “Biometric recognition: An overview,” Chapter 3, © Springer Science + Business Media B.V. (2012), pp
49-79, DOI 10.1007/978-94-007-3892-8_3.
11. M. Chihaoui, A. Elkefi, W. Bellil, and C. Ben Amar, “A survey of 2D face recognition techniques,” Computers 2016, 5, 21,
September (2016), doi:10.3390/computers5040021, www.mdpi.com/journal/computers.
12. D. Cherifi, R. Kaddari, H. Zair, and A. Nait-Ali, “Infrared face recognition using neural networks and HOG-SVM,” BioSMART
2019 Proceedings, 3rd International Conference on Bio-engineering for Smart Technologies, Paris, 24th-26th April (2019), ©2019
IEEE, pp. 132-136, 978-1-7281-3578-6/19/$31.00.
13. M. A. Singh, V. Kukreja, “Contemporary study of face recognition systems for attendance autonomous systems,” International
Journal of Management, Technology And Engineering, Volume 8, Issue XII, Dec 2018, pp. 285-295,
DOI:16.10089.IJMTE.2018.V8I12.17.2028.
14. M. O. Oloyede and G. P. Hancke, “Unimodal and multimodal biometric sensing systems: A review,” IEEE Access, Volume 4,
(2016), pp 7532-7555, Digital Object Identifier: 10.1109/ACCESS.2016.2614720.
15. T. Djara, M. K. Assogba, and A. Vianou, “A contactless fingerprint verification method using a minutiae matching technique,”
International Journal of Computer Vision and Image Processing, Volume 6, Issue 1, January-June (2016), pp 12-27, DOI:
10.4018/IJCVIP.2016010102.
16. F. Francis-Lothai and D. B. L. Bong, “A fingerprint matching algorithm using bit-plane extraction method with phase-only
correlation,” Int. J. Biometrics, Vol. 9, No. 1, (2017) pp.44–66, DOI: 10.1504/IJBM.2017.084135
17. A. Kumar and C. Kwong, “Towards contactless, low-cost and accurate 3D fingerprint identification,” IEEE Transactions on pattern
analysis and machine intelligence, Vol. 37, No. 3, March (2015), pp 681-696, doi: 10.1109/TPAMI.2014.2339818.
18. C. A. Oyeleye, T. M. Fagbola, R. S. Babatunde, and A. A. Adigun, “An exploratory study of odor biometrics modality for human
recognition,” International Journal of Engineering Research & Technology (IJERT), Vol. 1 Issue 9, November (2012), pp 1-10, ID:
IJERTV1IS9205.
19. A. K. Jain, A. Ross, and S. Prabhakar, “An introduction to biometric recognition,” IEEE Transactions on circuits and systems for
video technology, vol. 14, no. 1, January (2004), pp 4-20, DOI: 10.1109/TCSVT.2003.818349.
20. N. Poh, Multi-system biometric authentication, PhD thesis, EPFL, Lausanne, (2006).
21. A. Chaari, Nouvelle approche d'identification dans les bases de données biométriques basée sur une classification non supervisée.
Modélisation et simulation. PhD thesis, Université d'Evry-Val d'Essonne, (2009). <tel-00549395>.
22. A. K. Jain, K. Nandakumar, and A. Nagar, “Biometric template security,” Published in EURASIP Journal on Advances in Signal
Processing, Special Issue on Biometrics, January (2008), pp 1-20, DOI:10.1155/2008/579416.
23. S. B. Zannou, T. Djara, and A. Vianou, “Secured revocable contactless fingerprint template based on center of mass,” BioSMART
2019 Proceedings, 3rd International Conference on Bio-engineering for Smart Technologies, Paris, 24th-26th April (2019), 978-1-
7281-3578-6/19/$31.00 ©2019 IEEE, pp. 156-159.
24. A. Ross, “An introduction to multibiometrics,” Appeared in Proc. of the 15th European Signal Processing Conference (EUSIPCO),
(Poznan, Poland), September (2007), DOI: 10.1007/978-0-387-71041-9_14.
25. A. K. Jain, K. Nandakumar, X. Lu, and U. Park, “Integrating faces, fingerprints, and soft biometric traits for user recognition,”
Proceedings of Biometric Authentication Workshop, LNCS 3087, Prague, May (2004), pp. 259-269, DOI:10.1007/978-3-540-25976-
3_24.
26. C. Sanderson and K. K. Paliwal, “Information fusion and person verification using speech and face information,” Digital Signa l
Processing, Vol. 14, No. 5, (2004), pp. 449–480, http://dx.doi.org/10.1016/j.dsp.2004.05.001.
27. T. K. Ho, J. J. Hull, and S. N. Srihari, “Decision combination in multiple classifier systems,” IEEE Transactions on Pattern Analysis
and Machine Intelligence, 16(1), January (1994), pp 66–75, DOI: 10.1109/34.273716.
28. C. Bisogni and M. Nappi, “Multibiometric score-level fusion through optimization and training,” BioSMART 2019 Proceedings, 3rd
International Conference on Bio-engineering for Smart Technologies, Paris, 24th-26th April (2019), ©2019 IEEE, pp. 127-131, 978-
1-7281-3578-6/19/$31.00.
29. Y. Faridah, H. Nasir, A. K. Kushsairy, and S. I. Safie, “Multimodal biometric algorithm: A survey,” Biotechnology 15 (5), (20 16), pp
119.124, DOI: 10.3923/biotech.2016.119.124.
30. L. Allano, S. Garcia-Salicetti, B. Dorizzi, “A low cost incremental biometric fusion strategy for a handheld device,” S+SSPR 2008 :
Joint IAPR International Workshops on Structural, Syntactic and Statistical Pattern Recognition, Dec 2008, Orlando, United States.
pp.842 -851, 10.1007/978-3-540-89689-0_88., hal-01375832.
31. L. Allano, La Biométrie multimodale : stratégies de fusion de scores et mesures de dépendance appliquées aux bases de personn es
virtuelles, PhD thesis, Institut National des Télécommunications dans le cadre de l’école doctorale SITEVRY en co-accréditation
avec l’Université d’Evry-Val d’Essonne, (2009).
32. E. Cambria, “Affective computing and sentiment analysis,” IEEE Computer Society, (2016), pp 102-107, DOI:
10.1109/MIS.2016.31.
33. M. Soleymani et al., “A survey of multimodal sentiment analysis,” Image and Vision Computing (2017), © 2017 Published by
Elsevier B.V., pp 1-12, http://dx.doi.org/10.1016/ j.imavis.2017.08.003.
34. A. M. Ousmane, T. Djara, F. J. Zoumarou W., and A. Vianou, “Automatic recognition system of emotions expressed through the face
using machine learning : Application to police interrogation simulation,” BioSMART 2019 Proceedings, 3rd International
Conference on Bio-engineering for Smart Technologies, Paris, 24th-26th April (2019), ©2019 IEEE, pp. 160-163, 978-1-7281-3578-
6/19/$31.00.
35. T. Djara, A. M. Ousmane, and A. Vianou, “Mood and personality influence on emotion,” © ICST Institute for Computer Sciences,
Social Informatics and Telecommunications Engineering 2019, Springer Nature Switzerland AG 2019, AFRICATEK 2018, LNICST
260, (2019), pp. 166–174, https://doi.org/10.1007/978-3-030-05198-3_15.
36. T. Djara, A. M. Ousmane, and A. Vianou, “ Emotional state recognition using facial expression, voice, and physiological signal,”
International Journal of Robotics Applications and Technologies, Volume 6, Issue 1, January-June 2018, Copyright © 2018, IGI
Global, DOI: 10.4018/IJRAT.2018010101, pp. 1-20.
37. P. Barra, C. Bisogni, M. Nappi, D. Freire-Obregon, and M. Castrillon-Santana, “Gender classification on 2D human skeleton,”
BioSMART 2019 Proceedings, 3rd International Conference on Bio-engineering for Smart Technologies, Paris, 24th-26th April
(2019), ©2019 IEEE, pp. 123-126, 978-1-7281-3578-6/19/$31.00.
38. J. Fierrez-Aguilar, Adapted Fusion Schemes for Multimodal Biometric Authentication, PhD thesis, Universidad Politecnica de
Madrid, (2006).
39. A. -A. Sobabe, T. Djara, and A. Vianou, “A framework for combination of sequential architecture and soft biometrics in
multibiometric scores fusion,” BioSMART 2019 Proceedings, 3rd International Conference on Bio-engineering for Smart
Technologies, Paris, 24th-26th April (2019), ©2019 IEEE, pp. 164-167, 978-1-7281-3578-6/19/$31.00.

Authors: Mohammad Dehghani, Zeinab Montazeri, Om Parkash Malik, Gaurav Dhiman, Vijay Kumar

Paper Title: BOSA: Binary Orientation Search Algorithm


Abstract: Optimization algorithms have many applications in solve the optimization problems in various
sciences. The Orientation Search Algorithm (OSA) is an optimizer that is simulated the rules of a game called
orientation game. In OSA searcher agent are players of orientation game that moves on the playground depending
on the direction of the referee. in this study, binary model of OSA which called Binary Orientation Search
Algorithm (BOSA) is proposed. BOSA and eight other algorithms (BGA, BPSO, BGSA, BGOA, BBA, BMOA,
and BDA) are tested on twenty-three Benchmark test function. Proposed BOSA has a high ability to solve
optimization problems compared to other algorithms according to the evaluation results.

Keyword : Binary, Binary Orientation Search Algorithm Orientation Search, optimization. Retrieval Number:
Retrieval Number
References:
1. M. DEHGHANI, Z. MONTAZERI, and O. P. MALIK, "DGO: Dice Game Optimizer," Gazi University Journal of Science, vol. 32,
pp. 871-882, 2019.
2. M. Dehghani, Z. Montazeri, and O. Malik, "Energy commitment: a planning of energy carrier based on energy consumption,"
935. Электротехника и электромеханика, 2019.
3. Z. Montazeri and T. Niknam, "OPTIMAL UTILIZATION OF ELECTRICAL ENERGY FROM POWER PLANTS BASED ON
FINAL ENERGY CONSUMPTION USING GRAVITATIONAL SEARCH ALGORITHM," 2018, p. 4, 2018-08-17 2018. 5306-
4. S. Dehbozorgi, A. Ehsanifar, Z. Montazeri, M. Dehghani, and A. Seifi, "Line loss reduction and voltage profile improvement in 5310
radial distribution networks using battery energy storage system," in 2017 IEEE 4th International Conference on Knowledge-Based
Engineering and Innovation (KBEI), 2017, pp. 0215-0219.
5. M. Dehghani, M. Mardaneh, Z. Montazeri, A. Ehsanifar, M. Ebadi, and O. Grechko, "Spring search algorithm for simultaneous
placement of distributed generation and capacitors," Электротехника и электромеханика, 2018.
6. M. Dehghani, Z. Montazeri, A. Ehsanifar, A. Seifi, M. Ebadi, and O. Grechko, "Planning of energy carriers based on final energy
consumption using dynamic programming and particle swarm optimization," Электротехника и электромеханика, 2018.
7. Z. Montazeri and T. Niknam, "Energy carriers management based on energy consumption," in Knowledge-Based Engineering and
Innovation (KBEI), 2017 IEEE 4th International Conference on, 2017, pp. 0539-0543.
8. S. Kirkpatrick, C. D. Gelatt, and M. P. Vecchi, "Optimization by simulated annealing," science, vol. 220, pp. 671-680, 1983.
9. M. Dehghani, Z. Montazeri, A. Dehghani, N. Nouri, and A. Seifi, "BSSA: Binary spring search algorithm," in Knowledge-Based
Engineering and Innovation (KBEI), 2017 IEEE 4th International Conference on, 2017, pp. 0220-0224.
10. M. Dehghani, Z. Montazeri, A. Dehghani, and A. Seifi, "Spring search algorithm: A new meta-heuristic optimization algorithm
inspired by Hooke's law," in Knowledge-Based Engineering and Innovation (KBEI), 2017 IEEE 4th International Conference on,
2017, pp. 0210-0214.
11. M. Dehghani, M. Mardaneh, and O. Malik, "FOA:‘Following’Optimization Algorithm for solving Power engineering optimization
problems," Journal of Operation and Automation in Power Engineering, 2019.
12. M. Dehghani, M. Mardaneh, O. P. Malik, and S. M. NouraeiPour, "DTO: Donkey Theorem Optimization," in 2019 27th Iranian
Conference on Electrical Engineering (ICEE), 2019, pp. 1855-1859.
13. M. Dehghani, Z. Montazeri, O. P. Malik, A. Ehsanifar, and A. Dehghani, "OSA: Orientation Search Algorithm," International
Journal of Industrial Electronics, Control and Optimization, pp. -, 2018.

Authors: Mariam Abouhadid, Ashraf Mansour, Rania Shafik, Omar ElRawy

Paper Title: Thermal Performance of Plastic Bottles Walls Reused in Building Construction for Waste Reduction
Abstract: The research aims at studying the potential of reusing plastic water bottles as a building material and
an alternative to traditional bricks, in a way that can minimize waste and hence reduce ecological imbalance.
The research compares the energy performance of building with traditional bricks and building with plastic bottle
blocks.
The researchers built digitally two sample rooms: (3 meter width*3 meter length*3 meter Height) with both
936.
materials, Then they took on-site measurements for energy performance of the rooms.
The rooms were built on DesignBuilder software in order to help in environmental analysis of buildings, and 5311-
compare the efficiency of the two materials of sample rooms. 5315
Results showed that building with plastic water bottles has some environmental benefits other than reuse of a
material that hardly decomposes. It has its effects on energy saving and thermal comfort. Further research and
experiments is encouraged as the plastic residue dilemma grows more in modern societies and affects the ecological
balance and wild life.
Keyword : Environmentally friendly, Plastic Bottles, Reuse, Thermal Comfort.
References:
1. The data collection method involved sorting and weighing the wastes from one house consecutively for seven days, observations, and
interview with the chief of waste collection and environmental services in the company for the reconstruction and tourism
development. “ Municipal Waste Management in Egypt: An Investigation Study of Collection and Generation Process in Alexandria
City, Egypt”.
2. El Gazzar R. et al., “Municipal Waste Management in Egypt: An Investigation Study of Collection and Generation Process in
Alexandria City, Egypt”, International Journal of Scientific and Engineering Research 5(6):3, July 2014.
3. Hoornweg D. et al., What a Waste - A Global Review of Solid Waste Management”, Urban Development Series, Knowledge Papers,
No. 15, The World Bank, March 2012.
4. New center for Integrated studies of Land & Environment (NILE) , “Annual Report for solid waste management in Egypt”, Ministry
of State for Environmental Affairs, 2013.
5. Shoubi M., “Investigating the Application of Plastic Bottle as a Sustainable Material in the Building Construction”, January 2013.
6. Rawat A. et al., “PET Bottles as Sustainable Building Material: A Step Towards Green Building Construction”, August 2014.
7. Sajane A. et al., “Construction of houses using plastic bottles”, International Journal of Engineering Technology Science and
Research, ISSN 2394 – 3386, Volume 4, Issue 4, April 2017.
8. Patela P. et al., “Waste plastic bottles offering innovative building materials with sustainable application”, International Journal of
Innovative and Emerging Research in Engineering, Volume 3, Issue 3, 2016.
9. ASHRAE. (2010). ASHRAE Standard 55-2010 - Thermal Environmental Conditions for Human Occupancy. 1791 Tullie Circle NE,
Atlanta, GA 30329.
10. DesignBuilder. (n.d.). Output Options. Retrieved June 11, 2019,from
https://designbuilder.co.uk/helpv4.7/Content/Output_Options.htm
11. Polyethylene terephthalate - Material information. (n.d.). Retrieved May 15, 2019, from http://www.goodfellow.com/E/Polyethylene-
terephthalate.html
12. The Berkey. (n.d.). What numbers of plastic are safe for water bottles. The Numbers Behind Water Bottles. Retrieved from
https://theberkey.com/blogs/water-filter/what-numbers-of-plastic-for-water-bottles-are-safe-for-you-the-numbers-behind-plastic-
bottles.

Authors: Shiela David, Akshara P, Shagun Dixit, Sai Purnimaa

Paper Title: Decrease of Power Consumption Utilizing IOT


Abstract: As electricity consumption is very high so using IOT ,reduction of electricity consumption is tried
company nowadays but the use of it in extreme levels results as a damage to environment and personal financial
conditions.Involving fields of application and Internet of things sensors are made. In this paper an architecture is
introduced, that helps the smart cities to save resources for future. Consumption of electricity in a way is destroying
the environment so this paper helps in saving the cost of electricity as well as saving the environment using
937. wireless connections. Finally a new system is proposed keeping in mind the old one and its challenges. This system
overcomes all the challenges and difficulties faced by the old one. To implement the framework electrical 3833-
appliances such as lights, fans, ac etc are incorporated within the proposed system of reduction of electricity 3836
consumption.

Keyword : Internet of things; IOT; Reduced electricity consumption; Saving the cost and resources; Smart cities;
Wireless connection
References:
Authors: Uma Hombal, Dayananda R.B.

Paper Title: Secure and Optimized Data Sharing Model Group in Healthcare Cloud Environment
Abstract: The cloud computing provides convenient on-demand access of the data. Sharing of data in the cloud
computing will enable several users to easily handle the data that is being shared. The medical-field finds more
advantages by the cloud-computing technology as the data can be accessed anywhere and anytime by the patients
as well as this data can be shared with other medical-practitioners. This alarms for the security issues as the huge
amount of sensitive data is being shared. The data must not be available to malicious-attackers. In this paper, we
propose the block-design based key agreement protocol in order to share the data securely and the design provides
fault-detection and fault-tolerance. The group-data model PSM is given with the block-based design, which decides
how the sharing of the data is done by grouping and giving positions to users in particular blocks and the column.
938. The (np,i+1,1) design is proposed in our paper, which gives the technique for positioning of the users. The
encryption and decryption of data is done and their times cost according to file size is found. The comparison of the 5320-
time-cost for our model and existing models is compared with respect to different number of simulations. 5326

Keyword : Cloud-computing, data-sharing, block-based design, group-key


References:
1. GiuseppeAceto, ValerioPersico, AntonioPescapé, “The role of information and communication technologies in healthcare :taxonom ies,
perspectives and challeges, journal of network and computer applications, volume 107.
2. Mehedi Masud,M. Shamim Hossain ,“Secure data-exchange protocol in a cloud-based collaborative health care environment”
3. E.SmithJ.H.P.Eloff, “A Prototype for Assessing Information Technology Risks in Health Care”, Published in, Journal, Computers and
Security, Volume 21 Issue 3, June, 2002
4. Mr. Pramod & Dr. B R Prasad Babu, “Portable Tpm Based User Attestation Architecture for Cloud Environments ”, Global Journal of
Computer Science and Technology: B Cloud and Distributed Volume 15 Issue 1 Version 1.0 Year 2015 Type: Double Blind Peer
Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172 & Print ISSN: 0975-4350
5. Lei Chen, Ji-Jiang Yang, Qing Wang, Yu Niu, “A framework for privacy-preserving healthcare data sharing presented at 2012 IEEE 14th
International Conference on e-Health Networking, Applications and Services.
6. Danan.T, Yu Zhao, Surya.N, Rafael A. Calvo, Abelardo Pardo” protecting and analyzing health-care data on cloud”, presented at 2014
Second International Conference on Advanced Cloud and Big Data.
7. Levina, T., Lingareddy, D.S., & Dhruve, K.D. (2013). DYNAMIC EXPIRATION ENABLED ROLE BASED ACCESS CONTROL
MODEL FOR CLOUD COMPUTING ENVIRONMENT.
8. R. Shiny Sharon ,Dr. R Joseph Manoj , “ E-health care data sharing into the cloud based on de-duplication and file-hierarchy mechanisms
”, Advanced Cloud and Big Data (CBD), 2014 Second International Conference
9. Haiping Huang, Tianhe Gong, Ning Ye, Ruchuan Wang and Yi Dou, “Ning Ye, Ruchuan Wang and Yi Dou, IEEE transactions on
industrial informatics, volume13 ,issue 3
10. Noman M, Samira B, Dima A, Rui C,” Secure and private management of health-care databases for data mining” presented at the IEEE
28th International Symposium on Computer-Based Medical Systems
11. Richard Ssembatya and Anne V.D.M. Kayem, Rondebosch,” Secure and Efficient Mobile Personal Health Data Sharing in Resource
Constrained Environments” presented at IEEE 29th International Conference on Advanced Information Networking and Applications
Workshops,2015
12. Chin-Ling Chen, Jin-Xin Hu, Chun-Long Fan, Kun-hao Wang, ” Design of a secure medical data sharing system via an authorized
mechanism”, 2016 IEEE International Conference on Systems, Man, and Cybernetic,2016
13. Nikhil Chaudhari, Mohit Saini, Ashwin Kumar,” A review on attribute based encryption”, presented at the 8th international conference on
computational intelligence and communication networks, 2016
14. Amang S, Mike Y, and Haryadi Amran , “A Secure Data Sharing Using Identity-Based Encryption Scheme for e-Healthcare System”
presented at 3rd International Conference on Science in Information Technology (ICSITech), 2017
15. Van Hu, Fangjie Lu, Israr Khan, Guohua Bai, A Cloud Computing Solution for Sharing Healthcare Information, presented at the 7th
International Conference for Internet Technology and Secured Transactions
16. S.K.Sonkar, Ms.S.P.Wakchaure, “Group data searching and sharing using key aggregate cryptosystem”, presented at the International
Conference on Global Trends in Signal Processing, Information Computing and Communication,2016
17. Mazhar Ali, Revathi Dhamotharan Eraj Khan, Samee U. Khan Athanasios V. Vasilakos Keqin Li Albert Y. Zomaya, “SeDaSC: Secure
Data Sharing in Clouds”, IEEE Systems Journal , 2017,Volume: 11 Issue: 2
18. Xi Yi,"“Identity-based fault-tolerant conference key agreement",IEEE Transactions on Dependable and Secure Computing, vol. 1, no.
3,pp. 170–178, 2004

Authors: James Benedict Felix S, Viji Vinod


Design and Analysis of Improvised Genetic Algorithm with Particle Swarm Optimization for Code
Paper Title:
Smell Detection
Abstract: Software development phase is very important in the Software Development Life Cycle. Software maintenance
is a difficult process if code smells exist in the code. The poor design of code development is called code smells. The code
smells are identified by various tools using various approaches. Many code smell approaches are rule based. The rule based
approaches are based on trial and error method. Genetic Algorithm is a heuristic Algorithm by Darwin’s Theory. This paper
presents a metric based code smell detection approach by Genetic Algorithm with particle swarm optimization based on
Euclidean data distance. The Euclidean data distance gives best proximity value between two points. Our approach is evaluated
on the three open source projects like JFreeChart v1.0.9, Log4J v1.2.1 and Xerces-J for identifying the eight types of code
smells namely Functional Decomposition, Feature Envy, Blob, Long Parameter List, Spaghetti Code, Data Class, Lazy Class,
939. Shotgun Surgery.
5327-
Keyword : Code smell, Genetic Algorithm, Improvised Genetic Algorithm, 5330
References:
1. G. Travassos, F. Shull, M. Fredericks, and V. R. Basili, "Detecting defects in object-oriented designs: using reading techniques to increase
software quality," in ACM Sigplan Notices, 1999, pp. 47-56.
2. R. Marinescu, "Detection strategies: Metrics-based rules for detecting design flaws," in Proceedings of the 20th IEEE International
Conference on Software Maintenance (ICSM'04), 2004, pp. 350-359.
3. Ahmed A. A. Esmin and Stan Matwin, “A Hybrid Particle Swarm Optimization Algorithm with genetic mutation”, International Journal of
Innovative Computing, Information and Control, 2013, pp, 1919-1934
4. N.E. Fenton, S.L. Pfleeger, Software Metrics: A Rigorous and Practical Approach, PWS Publishing Co., Boston, MA, 1998.
5. D.E. Goldberg, Genetic Algorithms in Search, Addison-Wesley, Optimization and Machine Learning, 1989.
6. G.Saranya, “Model level code smell detection using EGAPSO based on similarity measures”, 2017.

Authors: Jasmine David. D, Jegathesan V, Roopa Jayasingh.J


Performance of Dynamic Priority Based Interference Aware Channel Allocation in Wireless Mesh
Paper Title:
Networks for Energy Conservation
Abstract: The Dynamic Wireless Mesh Network (DWMN) infrastructure is a pair or multiple dynamic nodes
with networking capability to communicate with one another utilising Sink Nodes (SN). Due to its mobile nature, it
is termed as Dynamic in nature. SN traverses over the predefined path over the Wireless Mesh Network. As the
nodes engage into mobility, the neighbourhood table should be updated at a minimum rate of once every five
seconds. The alarming fact in WMN is, Energy to transmit a bit is equivalent to computing hundreds of instructions
at that instant. Hence there is a need to concentrate on energy dimension of DWMN. A node loses certain amount
940. of energy while transmitting and receiving the packet, hence there is a minor decline in the initial energy of the
node. The existing value of energy at a moment after transmitting and receiving the packet is coined as Residual 5333-
Energy. The energy consumed by the node for transmitting and receiving the packet over the particular time frame 5335
is coined as Average Energy. Network Simulator v.2 tool has been utilised to simulate network creation with
multiple mobile nodes for packet transmission or reception and packet drop conditions due to interference.
Bandwidth Reservation (BR) for energy analysis is done by both Priority Based Interference Aware Bandwidth
Reservation (PBIABR) and Interference Aware Bandwidth Reservation (IABR) for many flowing rates under
dynamic scenario. Channel Priority plays a vital role to opt the channel which posses less interference for efficient
bandwidth reservation for PBIABR. The opted channel will have the minimal channel interference effect. IABR
posses the controllability character for data flow to establish end-to-end communication over Multi-Radio Multi-
Channel (MRMC) - Wireless Mesh Network. This research paper focuses on deep analysis of Residual Energy
(joule) compared with Interval (sec) and Average Energy (joule) compared with Interval (sec) under dynamic
scenario for multiple flow rates by implementing PBIABR and IABR criteria.

Keyword : Dynamic Wireless Mesh Network, Residual Energy, Sink Nodes, Priority Based Interference Aware
Bandwidth Reservation, Interference Aware Bandwidth Reservation
References:
1. I. F. Akyildiz and X. Wang, “A survey on wireless mesh networks,” IEEE Commun. Mag., vol. 43, no. 9, pp. 23 –30, Sept. 2005.
2. D. Benyamina, A. Hafid, and M. Gendreau, “Wireless mesh networks design–a survey,” IEEE Commun. Surveys & Tutorials, vol. 14, no.
2, pp. 299–310, 2nd Quarter 2012.
3. Mathonsi, Topside E, and Okuthe P. Kogeda. "Enhanced Bandwidth Sharing Scheme for Small and Medium Enterprises." Proceedings of
the World Congress on Engineering and Computer Science. Vol. 2. 2014.
4. A. P. Subramanian, H. Gupta, S. R. Das, and J. Cao, “Minimum interference channel assignment in multiradio wireless mesh netw orks,”
IEEE Trans. Mobile Comput., vol. 7, no. 12, pp. 1459–1473, Dec. 2008.
5. A. Capone, G. Carello, I. Filippini, S. Gualandi, and F. Malucelli, “Routing, scheduling and channel assignment in wireless m esh
networks: Optimization models and algorithms,” Ad Hoc Networks, vol. 8, no. 6, pp. 545–563, Aug. 2010.
6. D. Passos and C. V. N. Albuquerque, “A joint approach to routing metrics and rate adaptation in wireless mesh networks,” IEEE /ACM
Trans. Networking, vol. 20, no. 4, pp. 999–1009, Aug. 2012.
7. D. Gupta, P. Mohapatra, C. Chuah, Seeker “A Bandwidth-Based Association Control Framework For Wireless Mesh Networks”, Wireless
Networks (2011).
8. Ko, Bong-Jun, et al. "Distributed Channel Assignment in multi-radio 802.11 mesh networks." Wireless Communications and Networking
Conference, WCNC (2007).
9. Tu, Xiaoyu, Hai Wang and Zhimin Li. "Channel Vector: An overhead reduced broadcast in Multichannel Wireless Mesh Networks.
"Communications (ICC), 2015 IEEE International Conference on. IEEE, 2015.
10. Bakhshi, Bahador, SiavashKhorsandi, and Antonio Capone. "On-line joint QoS routing and channel assignment in multi-channel multi-
radio wireless mesh networks." Computer Communications 34.11, (2011).
11. Kaan Bur and CemErsoy, “Ad hoc quality of service multicast routing”, Computer Communications, Volume 29 , Issue 1, 2005.
12. Bosheng Zhou, Alan Marshall and Tsung-Han Lee, “A CrossLayer Architecture for DiffServ in Mobile Ad-hoc Networks”, International
Conference on Wireless Networks, Communications and Mobile Computing, WIRELESSCOM, 2005.
13. Bo Wang and Matt Mutka, “QoS-aware fair rate allocation in wireless mesh networks”, Elsevier, Computer Communications 31, 2008
14. Gahng-SeopAhn, Andrew T. Campbell, AndrasVeres and Li-Hsiang Sun, “SWAN: Service Differentiation in Stateless Wireless Ad Hoc
Networks”, In the Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM,
2002.
15. Ko, Bong-Jun, et al. "Distributed Channel Assignment in multi-radio 802.11 mesh networks." Wireless Communications and Networking
Conference, WCNC (2007).
16. Y. Song, C. Zhang, and Y. Fang, “Joint channel and power allocation in wireless mesh networks: A game theoretical perspective ,” IEEE J.
Select. Areas Commun., vol. 26, no. 7, pp. 1149–1159, Sept. 2008.
17. J. Luo, C. Rosenberg, and A. Girard, “Engineering wireless mesh networks: Joint scheduling, routing, power control, and rate adaptation,”
IEEE/ACM Trans. Networking, vol. 18, no. 5, pp. 1387– 1400, Oct. 2010.
18. L. X. Cai, Y. Liu, T. H. Luan, X. S. Shen, J. W. Mark, and H. V. Poor, “Adaptive resource management in sustainable energy powered
wireless mesh networks,” in Proc. IEEE GLOBECOM’11, Houston, TX, USA, Dec. 5–9 2011, pp. 1–5.
19. L. Lin, N. B. Shroff, and R. Srikant, “Asymptotically optimal energy-aware routing for multihop wireless networks with renewable energy
sources,” IEEE/ACM Trans. Networking, vol. 15, no. 5, pp. 1021–1034, Oct. 2007.
20. [20] J. Tang, G. Xue, and W. Zhang, “Maximum throughput and fair bandwidth allocation in multi-channel wireless mesh networks,” in
Proc. IEEE INFOCOM’06, Barcelona, Spain, Apr. 23–29 2006, pp. 1–10.

Authors: Feroza D Mirajkar, Ruksar Fatima, Shaik A Qadeer

Paper Title: Content Based Image Retrieval based on Domain Knowledge Acquisition
Abstract: Enormous growth has been noted in digital technology over the years and this has led to massive
growth in data mainly images and videos, hence with the volume of the data has also increased. Moreover,
searching and retrieval of the accurate image from the huge dataset has become eminent as well as one of the
challenging issue. In order to solve mainly two technique were used i.e. based on text and content. Moreover,
content based is technique that is more efficient. In past several technique were used but they lack from the
efficiency. Hence, in this paper we have proposed a methodology based named as DKA (Domain Knowledge
Acquisition), DKA focuses on two main goals first is learning the similarities across the varied domain and other is
learning on complex objects. The main advantage of DKA is the whether the object is whether from same domain
or the other the retrieval process is very smooth. Moreover In order to evaluate the performance we have retrieved
the top 5 response of query image and later it is compared with the several state-of-art technique and the existing
method based on the precision parameter.
941.
5336-
Keyword : CBIR, DKA, Image retrieval 5349
References:
1. S. Li, S. Chen, S. Su, D. Duh and S. Li, "Graphics/Image Retrieval Method," 2011 International Conference on Technologies and
Applications of Artificial Intelligence, Chung-Li, 2011, pp. 19-24.
2. P. Wilkins, P. Ferguson, A. F. Smeaton and C. Gurrin, "Text based approaches for content-based image retrieval on large image
collections," The 2nd European Workshop on the Integration of Knowledge, Semantics and Digital Media Technology, 2005. EWIMT
2005. (Ref. No. 2005/11099), London, 2005, pp. 281-288.
3. Long F., Zhang H., Feng D.D. (2003) Fundamentals of Content-Based Image Retrieval. In: Feng D.D., Siu WC., Zhang HJ. (eds)
Multimedia Information Retrieval and Management. Signals and Communication Technology. Springer, Berlin, Heidelberg.
4. G. Schaefer, "An introduction to content-based image retrieval," Eighth International Conference on Digital Information Management
(ICDIM 2013), Islamabad, 2013, pp. 4-6.
5. P. S. Hiremath and J. Pujari, "Content Based Image Retrieval Using Color, Texture and Shape Features," 15th International Conference on
Advanced Computing and Communications (ADCOM 2007), Guwahati, Assam, 2007, pp. 780-784.
6. Lingaraj, Haldurai. (2015). Parallel Indexing on Color and Texture Feature Extraction using R-Tree for Content Based Image Retrieval.
International Journal of Computer Sciences and Engineering. 3. 11-15.
7. Joseph, T., Cardenas, A. F., “PICQUERY: A High Level Query Language for Pictorial Database Management”,May 1988 , vol. 14
no. 5, pp. 630-638 .
8. Eden, M., Unser, M., “Multiresolution feature extraction and selection for texture segmentation”, IEEE Transactions, Jul
1989, Volume : 11 Issue : 7, 717 to 728
9. M. Mohammadpour and S. Mozaffari, "A method for Content-Based Image Retrieval using visual attention model," 2015 7th Conference
on Information and Knowledge Technology (IKT), Urmia, 2015, pp. 1-5.
10. Figueiredo, M.A.T.,Hong-Jiang Zhang, Jain, A.K., Vailaya, A., “Image classification for content-based indexing “,IEEE
Transactions, 2001.
11. Wei Song, Yubing Zhang, Fei Liu, Zhilei Chai, Feng Ding, Xuezhong Qian, Soon Cheol Park,Taking advantage of multi-regions-based
diagonal texture structure descriptor for image retrieval,Expert Systems with Applications,Volume 96,2018,Pages 347-357,ISSN 0957-
4174.
12. Ghebreab, S., Jaffe, C.C., Smeulders, A.W.M., ”Population-based incremental interactive concept learning for image retrieval by
stochastic string segmentations”, IEEE Transactions , 2004.
13. S. -. Chen, S. H. Rubin, M. -. Shyu and C. Zhang, "A Dynamic User Concept Pattern Learning Framework for Content-Based Image
Retrieval," in IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), vol. 36, no. 6, pp. 772-783, Nov.
2006.
14. Lin Feng, Jun Wu, Shenglan Liu, Hongwei Zhang,Global Correlation Descriptor: A novel image representation for image retrieval,Journal
of Visual Communication and Image Representation,
a. Volume 33,2015,Pages 104-114,ISSN 1047-3203.
15. W. Jiang, G. Er, Q. Dai and J. Gu, “Similarity‐Based Online Feature Selection in Content‐ Based Image Retrieval”, IEEE
Trans. on Image Processing, vol. 15, no. 3, pp. 101‐104, March 2006.
16. Mutasem K. Alsmadi, Query-sensitive similarity measure for content-based image retrieval using meta-heuristic algorithm,Journal of King
Saud University - Computer and Information Sciences,Volume 30, Issue 3,2018,Pages 373-381.
17. Basak, J., Bhattacharya, K., Chaudhury, S., “Multiple Exemplar-Based Facial Image Retrieval Using Independent
Component Analysis”, IEEE Transactions, Dec 2006.
18. Chai J. Y., C. Zhang, R. Jin, “An Empirical Investigation of User Term Feedback in Textbased Targeted Image Search”,
ACM Transaction, Inform. Systems, Vol. 25, 2007, No 1.
19. Ye, L., Zang, J., “Content Based Image Retrieval Using Unclean Positive Examples”, Image
a. Processing, IEEE Transactions, Oct 2009.
20. Davis, L.S., Zhe Lin, “ Document Title : Shape-Based Human Detection and Segmentation via Hierarchical Part-Template
Matching”, Pattern Analysis and Machine Intelligence, IEEE Transactions, Apr 2010.
21. Abbadeni, N., “Computational Perceptual Features for Texture Representation and Retrieval”, IEEE Transactions, Jan 2011.
22. Dacheng Tao_3;Dongquan Liu_2;Hock Soon Seah_4;Jun Yu, “ On Combining Multiple Features for Cartoon Character
Retrieval and Clip Synthesis”, IEEE Transactions, Oct 2012.
23. G.-H. Liu, L. Zhang, Y.-K. Hou, Z.-Y. Li, and J.-Y. Yang, ``Image retrieval based on multi-texton histogram,'' Pattern Recognit., vol. 43,
pp. 2380-2389, Jul. 2010.
24. G.-H. Liu, Z.-Y. Li, L. Zhang, and Y. Xu, ``Image retrieval based on microstructure descriptor,'' Pattern Recognit., vol. 44, no. 9, pp. 21 23-
2133,2011.
25. G.-H. Liu and J.-Y. Yang, ``Content-based image retrieval using color difference histogram,'' Pattern Recognit., vol. 46, pp. 188-198, Jan.
2013.
26. X. Wang and Z. Wang, ``A novel method for image retrieval based on structure elements' descriptor,'' J. Vis. Commun. Image Represent.,
vol. 24, pp. 63-74, Jan. 2013.
27. L. Feng, J. Wu, S. Liu, and H. Zhang, ``Global correlation descriptor:A novel image representation for image retrieval,'' J. Vis. Commun.
Image Represent., vol. 33, pp. 104-114, Nov. 2015.
28. M. Subrahmanyam, Q. M. J. Wu, R. P. Maheshwari, and R. Balasubramanian, ‘‘Modified color motif co -occurrence
matrix for image indexing and retrieval,’’ Comput. Elect. Eng., vol. 39, no. 3,pp. 762–774, 2013.
29. A. Raza, H. Dawood, H. Dawood, S. Shabbir, R. Mehboob and A. Banjar, "Correlated Primary Visual Texton Histogram Features for
Content Base Image Retrieval," in IEEE Access, vol. 6, pp. 46595-46616, 2018.

Authors: Taranath N L, Roopashree H R, Yogeesh A C, Subbaraya C K, Darshan L M

Paper Title: Knowledge based Medical Decision Support System using Data Mining
Abstract: 0Medical0 0Decision0 0Support0 0System0 (0MDSS0)[7] is a system where information 0of0 the
patient for1promising1diagnostic and1treatment paths are depicted. It can1be developed either1as the system
for1Knowledge base or the system for1Learning base[2]. Knowledge-based systems[3] are the mappings which
0are0 0human0-0engineered0 0from0 the 0best0 0medical0 0practices0 0and0 0patient0 0data0
0recommendations0 [1]. The mapping is derived by Learning-based systems using various techniques of data
mining, machine learning.. 0Knowledge0-0based0 0and0 0Learning0-0based0 0systems0 are integrated 0to0
0provide0 a powerful 0solution0 0to0 0the0 0information0 0challenge 0in0 0the0 0existence0 0of0 incomplete
facts. This work designs a framework and implements 0an0 ontological representation for 0Integrated0 Medical
0Decision0 0Support0 0System0 which assists Medical Professionals in making clinical decisions for drug
prescription. It employs Knowledge base system for drug prescription 0to0 0the0 0patients. If0 0the0 0available0
0data0 0is0 0incomplete, 0it0 uses concept of 0machine0 0learning0 to produce solution for the given 0query0 [5].
942. 0It0 0is0 best suited 0for0 0different0 0healthcare0 environment 0and0 0many0 0different0 0users0 including
physicians, nurses and other staff who serve in medical field. The skeleton is 0query0-0based0 which 0can0 0be0 5350-
adjusted 0for0 0use0 0with0 0many0 0different0 interfaces on the user-end 0including0 0Desktop, 0Web-based0 5355
browsers and Mobile 0applications.

Keyword : 0MDSS0, 0Knowledge0-0based0 systems0, Learning0 0based00systems, Aggregations0, 0SQL0,


0Data0 Mining
References:
1. M.M.Abbasi and S. Kashiyarndi, “Clinical Decision Support Systems: A discussion on different methodologies used in Health Car e”,
International Journal of Computer Science and Information Security, Vol. 8, No. 4, pages 249-256, 2010.
2. M. Frize and R. Walker, “Clinical decision-support systems for intensive care units using case-based reasoning”, Medical engineering &
physics, Vol. 22, No.9, pages 671-677, 2006.
3. Y. Ye and S. J. Tong, “A Knowledge-Based Variance Management System for Supporting the Implementation of Clinical Pathways”,
Management and Service Science, IEEE-2009, pages 1-4, 2009.
4. M. Goadrich, L. Oliphant and J. Shavlik, “Learning Ensembles of First-Order Clauses for Recall-Precision Curves: A Case Study in
Biomedical Information Extraction”, Proc. 14th Int’l Conf. on Inductive Logic Programming, pages 211-214, 2004.
5. T. Mitsumori, M. Murata, Y. Fukuda, K. Doi and H. Doi, “Extracting Protein-Protein Interaction Information from Biomedical Text with
SVM ”, IEICE Trans. Information and Systems, Vol. E89D, No. 8, pages 2464-2466, 2006.
6. Oana Frunza, Diana Inkpen and Thomas Tran, “A Machine Learning Approach for Identifying Disease-Treatment Relations in Short
Texts”, IEEE Vol. 23, No. 6, pages 246-246, June 2011.
7. M. Zhu, Z. Zhang, J. Hirdes and P. Stolee, “Using machine learning algorithms to guide rehabilitation planning for home care clients”,
BMC medical informatics and decision making, Vol. 7, Issue 1, pages 41-43, 2007.
8. D. Rossille, J. Lauren and A. Burgun, “Modeling a decision-support system for oncology using rule-based and case-based reasoning
methodologies”, International Journal of Medical Information, pages 299-306, 2005.
9. Y. Ye and Z. Jiang, “A Semantics Based Clinical Pathway Workflow and Variance Management Framework”, Service Operation and
Logistica and Informatics, IEEE, pages 758-763, 2008.
10. Avrilia Floratou, Sandeep Tata, and Jignesh M. Patel, Member, IEEE, “Efficient and Accurate Discovery of Patterns in Sequence Data
Sets”, IEEE Transactions On Knowledge and Data Engineering, Vol. 23, No. 8, pages 30-37 August 2011.
11. P. Patel, E. Keogh, J. Lin and S. Lonardi, “Mining Motifs in Massive Time Series Databases”, Proc. of IEEE Int’l Conf. Data Mining
(ICDM), pages 370-377, 2002.
12. A. X. Garg, N. K. J. Adhikari and H. McDonald, “Effects of Computerized Clinical Decision Support Systems on Practitioner Performance
and Patient Outcomes: A Systematic Review”, JAMA, pages 1223-1238, 2005.
13. L. Lin, P. Hu, O. R. Liu Sheng, “A decision support system for lower back pain diagnosis: Uncertainly management and clinical
evaluation”, Decision Support Systems, pages 1152 -1169, 2006.
14. M. Frize, C. M. Ennett, M. Stevenson and H. Trigg, “Clinical decision support system for intensive care units: using artificial neural
networks”, Medical Engineering & Physics, pages 217-225, 2001.
15. D. J. Spiegel halter and R. P. Knill-jones, “Statistical and Knowledge-based Approaches to Clinical Decision-support Systems with an
Application in Gastroenterology”, J. R. Statist. Soc., pages 55-77, 2004.
16. E. Sivasankar and R. S. Rajesh, “Knowledge Discovery in Medical Datasets Using a Fuzzy Logic rule based Classifier”, IEEE
International Conference on Electronic Computer Technology, pages 208-213, 2010.

Authors: Gauri D. Kumavat, Santosh Kumar

Paper Title: Health Monitoring using Edge Cognitive Computing Based Smart Health Care
Abstract: With an enhancement in technology and development of sensors, they have decided to concern the
latest technology in particular areas to increases the Quality of their life. One of the important section of research
that has seen an agreement of the latest technology is the healthcare. the people who need healthcare services they
have to suffer for long process, to reduce the problem As a result, basically this complete technology would try to
resole the healthcare issues.
The main goal of the project is to develop a remote healthcare system. It have three main parts. The first and
most important section in this process is to detecting the patient current health status using this sensors.
second important thing is sending data to cloud storage and the last section is to get the detected data for remote
viewing. Remote viewing of the data provided to the doctor will able to monitor a patients health progress aboard
from hospital places.
The Edge-Cognitive- Computing-based (ECC-based) smart healthcare system. This technology is able to check also
distinguish and detect the current status of patient using this sensors. It also accommodate the computing resource
appropriation of the complete edge computing network expansive to the health different percentage of each user.
The experiments show that the ECC-based healthcare system provide a exceed user background and try to
improvement the computing resources moderately, as well as consequentially improving in the durability rates of
943. patients in emergency.
5356-
Keyword : Cognitive computing, Edge computing, Health care 5361

References:
1. The Internet of Things in healthcare: an overview https://scholar.google.com/citations?userY4opLB8AAAA
2. Envisioning inclusive futures: technologybased assistive sensory and action substitution
https://www.infona.pl/resource/bwmeta1.element.elsevie 3d45bfddfe55- 359f-84e4-674a21cae024
3. A multiple communication standards compatible IoT system for medical usage http://ieeexplore.ieee.org/document/6577775/?reload=true
4. Ubiquitous data accessing method in IoT-based information system for emergency medical services
https://www.deepdyve.com/lp/institute-ofelectrical- and-electronics- engineers/ubiquitous-data-accessing-methodin-iot-based-information-
system-for- YCZzyY5W9g
5. Implementation of a medical support system considering P2P and IoT technologies
https://www.computer.org/csdl/proceedings/cisis/2014/4325/00/4325a101- abs.html
6. Acquisition and management of biomedical data using Internet of Things concepts http://ieeexplore.ieee.org/document/7050625/ Real time
internet application with distributed ow environment for medical Io
https://csdl.computer.org/csdl/proceedings/icgciot/2015/7910/00/07380578-abs.html
7. Secure end-to-end communication for constrained devices in IoT-enabled am- bient assisted living systems
https://www.computer.org/csdl/proceedings/wfiot/ 2015/0366/00/07389141-abs.html
8. S. Iyengar, F. T. Bonda, R. Gravina, A. Guerrieri, G. Fortino, A. Sangiovanni- Vincen- telli, A framework for creating healthcare
monitoring applications using wireless body sensor networks, in: Proceedings of the ICST 3rd international conference on Body area
networks, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2008, p. 8.
9. M. Chen, S. Gonzalez, A. Vasilakos, et al. Body area networks: A survey. Mobile networks and applications, 2011, 16(2): 171 -193.

Authors: Nithya.P, Arthy.P.S,Prabhu Kumar.S

Paper Title: Cell-Free DNA Pattern Identification and its Classification using Convolution Neural Network

944. Abstract: Circulating cell DNA (cfDNA) design identification assumes a cardinal job in fetal drug,
transplantation and oncology. Be that as it may, it has additionally demonstrated to be a biomarker for different
5362-
maladies. There are numerous order strategies by which the acknowledgment and arrangement should be possible. 5364
So as to have a superior time unpredictability and improve the precision further, this strategy targets distinguishing
and arranging the general DNA examples and ailments related with them utilizing cfDNA Images in a Convolution
Neural Network. A probabilistic method is used for cfDNA image feature extraction, fragmentation and
interpretation. Graphical User Interface is the platform where this method is employed since it uses visual
indicators in place of text-based interface. The aftereffects of this test demonstrate that the Convolution Neural
Network calculation can perceive cfDNA successions accurately and successfully with no dubiety. Prepared with
examples, the CNN can effectively characterize the picture surrendered to coordinated and unparalleled examples
with numerical highlights.

Keyword : cfDNA, Convolution Neural Network, Graphical User Interface, GLCM feature extraction,
Bioinformatics.
References:
1. Z. Xizhi, "The Application of Wavelet Transform in Digital Image Processing," 2008 International Conference on MultiMedia and
Information Technology, Three Gorges, (2008), pp. 326-329. doi:10.1109/MMIT.2008.134
2. Sriram KB, Relan V, Clarke BE, Duhig EE, Windsor MN, Matar KS, et al. (2012). “Pleural fluid cell-free DNA integrity index to
identify cytologically negative malignant pleural effusions including mesotheliomas”. BMC Cancer12:428.
3. Liimatainen SP, Jylhv J, Raitanen J, Peltola JT, Hurme MA. (2013). “The concentration of cell-free DNA in focal epilepsy”. Epilepsy
Res 105(3):292-8.
4. Chen, Shifu& Liu, Ming & Zhang, Xiaoni& Long, Renwen& Wang, Yixing& Han, Yue& Zhang, Shiwei&Xu, Mingyan&Gu, Jia.
(2017). “A Study of Cell-free DNA Fragmentation Pattern and Its Application in DNA Sample Type Classification”.IEEE/ACM
Transactions on Computational Biology and Bioinformatics. PP. 1-1. 10.1109/TCBB.2017.2723388.
5. Khier S, LohanL. “Kinetics of circulating cell-free DNA for biomedical applications: critical appraisal of the literature”. Future Sci
OA. 2018;4(4):FSO295. Published 2018 Feb23.doi:10.4155/fsoa-2017-014.

Authors: R. Sahith, P. Vijaya Pal Reddy, Satyanarayana Nimmala

Paper Title: Decision Tree-based Machine Learning Algorithms to Classify Rice Plant Diseases
Abstract: Rice is one of the most important foods on earth for human beings. India and China are two countries
in the world mostly depend on rice. The output of this crop depends on the many parameters such as soil, water
supply, pesticides used, time duration, and infected diseases. Rice Plant Disease (RPD) is one of the important
factors that decrease the quantity and quality of rice. Identifying the type of rice plant disease and taking corrective
action against the disease in time is always challenging for the farmers. Although the rice plant is affected by many
diseases, Bacterial Leaf Blight (BLB), Brown Spot (BS), and Leaf Smut (LS) are major diseases. Identification of
this disease is really challenging because the infected leaf has to be processed by the human eye. So in this paper,
we focused on machine learning techniques to identify and classify the RPD. We have collected infected rice plant
data from the UCI Machine Learning repository. The data set consists of 120 images of infected rice plants in
which 40 images are BLB, 40 are BS, and 40 are LS. Experiments are conducted using Decision tree-based
machine learning algorithms such as RandomForest, REPTree, and J48. In order to extract the numerical features
from the infected images, we have used ColourLayoutFilter supported by WEKA. Experimental analysis is done
using 65% data for training and 35% data for testing. The experiments unfold that the Random Forest algorithm is
exceptional in predicting RPD.

945.
Keyword : Rice plant disease, J48, Machine Learning, Classification.
5365-
References: 5368
1. J. P. Shah, H. B. Prajapati, and V. K. Dabhi, “A survey on detection and classification of rice plant diseases,” 2016 IEEE
International Conference on Current Trends in Advanced Computing of Rice Leaf Diseases Based on Morphological Changes,"
International Journal of Information and Electronics Engineering, vol. 2, pp. 460-463, May 2012(ICCTAC), 2016.
2. S. Phadikar, J. Sil, and A. K. Das, "Classification of Rice Leaf Diseases Based on Morphological Changes," International Journal of
Information and Electronics Engineering, vol. 2, pp. 460-463, May 2012.
3. H. B. Prajapati, J. P. Shah, and V. K. Dabhi, “Detection and classification of rice plant diseases,” Intelligent Decision Technologies,
vol. 11, no. 3, pp. 357–373, 2017.
4. M. S. T. Kumbhare, “Detection and Classification of Diseases on Rice and Sugarcane: A Review,” International Journal for
Research in Applied Science and Engineering Technology, vol. 7, no. 4, pp. 2927–2929, 2019.
5. J. W. Orillo, T. M. Amado, N. M. Arago, and E. Fernandez, “Rice Plant Disease Identification And Detection Technology Through
Classification Of Microorganisms Using Fuzzy Neural Network,” Jurnal Teknologi, vol. 78, no. 5-8, 2016.
6. V. K. Shrivastava, M. K. Pradhan, S. Minz, and M. P. Thakur, “Rice Plant Disease Classification Using Transfer Learning Of Deep
Convolution Neural Network,” ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information
Sciences, vol. XLII-3/W6, pp. 631–635, 2019.
7. H. B. Prajapati, J. P. Shah, and V. K. Dabhi, “Detection and classification of rice plant diseases,” Intelligent Decision Technologies,
pp. 1–18, 2018.
8. M.A. Kahar, S. Mutalib, A. Rahman, "Early Detection and Classification of Paddy Diseases with Neural Networks and Fuzzy
Logic", Recent Advances in Mathematical and Computational Methods, pp. 248-257.
9. C.K.Charliepaul, "classification of rice plant leaf using feature matching", International Journal On Engineering Technology and
Sciences vol. 1, pp. 290-295, 2014.

Authors: R. Santhakumar, N. Amutha Prabha


A Novel Hybrid Block INF Diagonalization (HBID) Precoding Technique for Capacity Improvement in
Paper Title:
MU-MIMO-OFDM System
946. Abstract: In wireless communication system, the emerging technology is MU-Multiple Input Multiple Output-
Orthogonal Frequency Division Multiplexing (MU-MIMO-OFDM). For minimizing Peak-to-Average Power Ratio
5369-
(PAPR) in the uplink transmission scheme, OFDM is exploited in MIMO system and compared with Single
5375
Carrier-Frequency Domain Processing (SC-FDP). Further reducing the PAPR value, a new method is proposed
Hybrid Block Inf Diagonalization (HBID) technique for an uplink OFDM system and calculated the less Bit Error
Rate (BER). In this paper, the HBID precoding technique reduces PAPR with such amount and unwanted
amplitude of the signal is to be cut down for a specific threshold value as 1.4 for best performance so that the PAPR
value is reduced in considerable rate of OFDM then compared to SC-FDP system. Also, we compared the various
precoding techniques with HBID method in MIMO-OFDM systems with various parameters such as BER, PAPR,
Number of users, Sum rate. Finally, the proposed method reduces PAPR with 47% and BER with 50%, number of
users with 49% and sum rate as 57%. HBID based precoding method shows its excellence with the lowest PAPR
value and thereby enhance the presentation of the OFDM system.

Keyword : About four key words or phrases in alphabetical order, separated by commas.
References:
1. Marius-Constantin O.S. Popescu and Nikos E. Mastorakis, “The use of MIMO technologies in wireless communication networks”,
3rd International Conference on Communication and Information Technology, pp. 139-145.
2. J. Mietzner, R. Schober, L. Lampe, W. H. Gerstacker, and P. A. Hoeher, “Multiple-antenna techniques for wireless
communications—A comprehensive literature survey,” IEEE Commun. Surv. Tuts., vol. 11, no. 2, pp. 87–105, Jun. 2009.
3. S. Sugiura, S. Chen, and L. Hanzo, “A universal space-time architecture formultiple-antenna aided systems,” IEEE Commun. Surv.
Tuts., vol. 14, no. 2, pp. 401–420, Jan. 2012.
4. A. Chockalingam and B. S. Rajan, Large MIMO Systems. Cambridge,U.K.: Cambridge Univ. Press, 2014.
5. Thomas L Marzetta, “Non cooperative Cellular Wireless with Unlimited Numbers of Base Station Antennas” IEEE Trans. Comm.,
vol. 9, no. 11, pp.3590– 3600, November 2010.
6. Heshani Gamage, NandanaRajatheva and Matti Latva-aho, “Performance and PAPR Analysis of Single-Carrier Massive MIMO
Systems with Channel Imperfections”, Vehicular Technology Conference (VTC-Fall), 2017.
7. F. Boccardi, R. W. Heath, A. Lozano, T. L. Marzetta, and P. Popovski, “Five disruptive technology directions for 5G,” IEEE
Commun. Mag., vol. 52, no. 2, pp. 74–80, Feb. 2014.
8. E. G. Larsson, O. Edfors, F. Tufvesson, and T. L. Marzetta, “Massive MIMO for next-generation wireless systems,” IEEE Commun.
Mag., vol. 52, no. 2, pp. 186–195, Feb. 2014.
9. Ping Yang, Yue Xiao and Yong Liang Guan, “Single-Carrier SM-MIMO: A Promising Design for Broadband Large-Scale Antenna
Systems”, IEEE Communications Surveys & Tutorials, vol. 18, no. 3, pp. 1687-1716, Feb. 2016.
10. Sven Jacobsson, Giuseppe Durisi, Mikael Coldrey and Christoph Studer, “Massive MU-MIMO-OFDM Downlink with One-Bit
DACs and Linear Precoding”, IEEE Global Communications Conference, Dec. 2017.
11. Stefano Buzzi, Carmen D’Andrea, Tommaso Foggi, Alessandro Ugolini and Giulio Colavolpe, “Single-Carrier Modulation versus
OFDM for Millimeter-Wave Wireless MIMO”, in IEEE Transaction on Communications, vol.66, no. 3, pp. 1335-1348, Nov. 2017.
12. Sajjad Ali, Zhe Chen and Fuliang Yin, “Eradication of pilot contamination and zero-forcing precoding in the multi-cell TDD massive
MIMO systems”, IET Communications, vol.11, no. 13, pp. 2017-2034, Oct. 2017.
13. Jubin Jose, Alexei Ashikhmin, Thomas L. Marzetta and Sriram Vishwanath, “Pilot Contamination and Precoding in Multi-Cell TDD
Systems”, IEEE Transactions on Wireless Communications, vol. 10, no. 8, Aug. 2011.
14. AntoniosPitarokoilis, Saif Khan Mohammed and Erik G. Larsson, “On the Optimality of Single-Carrier Transmission in Large-Scale
Antenna Systems”, IEEE Wireless Communications Letters, vo. 1, no. 4, Aug. 2012.
15. Mohammed Ali Mohammed MOQBEL, Wangdong,and Al-marhabi Zaid Ali, “MIMO Channel Estimation Using the LS and MMSE
Algorithm”, IOSR Journal of Electronics and Communication Engineering (IOSR-JECE), vol. 12, no. 1, pp. 13-22, Feb. 2017.
16. J.P. Coon and M. A. Beach, “An Investigation of MIMO Single-Carrier Frequency-Domain MMSE Equalization”, London
Communications Symposium, pp. 237-240, 2002.
17. Weiheng Ni, and Xiaodai Dong, “Hybrid Block Diagonalization for Massive Multiuser MIMO Systems”, IEEE TRANSACTIONS
ON COMMUNICATIONS, vol. 64, no. 1, pp:201-211, Jan 2016.
18. [18] Peng Xu, Jiang Zhou Wang and Jinkuan Wang, “Multi-cell H-inf Precoding in Massive MIMO Systems”, IEEE ICC 2014 -
Signal Processing for Communications Symposium, pp:4472-4476.

Authors: S. Sandhya Rani, G. Appa Rao Naidu, V. Usha Shree

Paper Title: A Fine Grainedresearch Over Human Action Recognition


Abstract: Human Action Recognition from videos has been an active research is in the computer vision due to
its significant applicability in various real-time applications like video retrieval, human-robot interactions, and
visual surveillance, etc. Though there are so many surveys over Human action Recognition, they are limited to
various constraints like only focusing on the methods in few orientations only. Unlike the earlier ones, this paper
provides a detailed survey according to the basic working methodology of Human action recognition system.
Initially, a detailed illustration is given about various standard benchmark datasets. Further, following the
methodology, the survey is accomplished in two phases, i.e., the survey over feature extraction approaches and the
survey over action classification approaches. Further, a fine-grained survey is also accomplished under every phase
based on the individual strategies

947.
Keyword : Human Action Recognition, Feature Extraction, Classification, Spatio-temporal interest points,
Trajectories, Support Vector Machine, Deep Learning, action datasets. 5376-
5384
References:
1. YangY,AloimonosY., 2015, “Robot learning manipulation action plans by watchingunconstrained videos from the world wide web”,
pp.3686–3693.
2. Kru¨gerV, KragicD, 2007,“The meaning of action: a review on action recognition andmapping”, Advanced Robotics 21
(13),pp.1473–1501.
3. NiitsumagM., Hashimoto H, 2007, “Spatial memory as an aid system for human activity inintelligent space”,pp.1122–1131.
4. Khan Z. A.Sohn W, 2011, “Abnormal human activity recognition system based on r-transform and kerneldiscriminant technique for
elderly home care”,pp.1843–1850.
5. Bobick A. and Davis J, 2001,“The recognition of human movement using temporal templates”, pp. 257–267.
6. RyooM. S., 2011, “Human activity prediction: Early recognition of ongoing activities from streaming videos”, pp.1-5.
7. FeichtenhoferC, PinzA, 2017, “Spatiotemporal multiplier networks for video action recognition”, 7445–7454.
8. RamezaniM. and YaghmaeeF, 2016, “A review on human action analysis in videos for retrieval applications”, pp. 485–514.
9. Xia L. andAggarwal J,2013,”Spatio-temporal depth cuboid similarity features for activity recognition using depth camera”.
10. Koppula H. S. and Saxena A,2016, “Anticipating human activities using object affordances for reactive robotic response”,pp. 1 4–29.
11. Li K. and Fu Y, 2014, “Prediction of human activity by discovering temporal sequence patterns”,pp.1644–1657.
12. C. Sch¨uldt, I. Laptev, and B. Caputo Recognizing human actions: Alocal SVM approach,in IEEE ICPR, 2004.
13. Blank M., Gorelick L., ShechtmanE, 2005, “Actionsas space-time shapes”,in Proc. ICCV, 2005.
14. Weinland D, RonfardR, andBoyer E, 2006,“Free viewpoint action recognitionusing motion history volumes”,page no. 2-3.
15. RyooM. S. and. K J. Aggarwal, 2010, “UT-Interaction Dataset, ICPRcontest on Semantic Description of Human Activities
(SDHA)”,http://cvrc.ece.utexas.edu/SDHA2010/HumanInteraction.
16. MonfortM., Zhou B, S. A. Bargal, T. Yan, “Momentsin time dataset: one million videos for event understanding”.
17. Khurram Soomro A. R. Z. and Shah M, 2012, “Ucf101: A dataset of 101human action classes from videos in the wild”.
18. Kuehne H., Zhuang H., and Serre T, 2011,“HMDB: Alarge video database for human motion recognition”.
19. Laptev I., MarszalekM, and RozenfeldB,2008,“Learningrealistic human actions from movies”.
20. W. Li, Z. Zhang, and Z. Liu, Action recognition based on a bag of 3dpoints,in CVPR workshop, 2010.
21. KarpathyA, TodericiG, Shetty S., and L. Fei-Fei, 2014, ”Large-scale video classification with convolutional neuralnetworks”,in
CVPR, 2014.
22. H.Wang, A. Klaaser, C. Schmid, and C. L. Liu, “Dense trajectories andmotion boundary descriptors for action recognition”, IJCV,
vol. 103, no.60-79, 2013.
23. H. Wang, A. Kl¨aser, C. Schmid, and C.-L. Liu, “Action Recognitionby Dense Trajectories”,in IEEE Conference on Computer
Vision & Pattern Recognition, Colorado Springs, United States, Jun. 2011, pp.3169–3176.
24. I. Laptev and T. Lindeberg, “Space-time interest points”,in ICCV, 2003,pp. 432–439.
25. M. Bregonzio, S. Gong, and T. Xiang “Recognizing action as clouds ofspace-time interest points”,in CVPR, 2009.
26. A. Klaser, M. Marszalek, and C. Schmid, “A Spatio-temporal descriptorbased on 3d-gradients”,in BMVC, 2008.
27. Cutler, R.; Turk, M. “View-based interpretation of real-time optical flow for gesture recognition”. In Proceedings
28. of the Third IEEE International Conference on IEEE, “Automatic Face and Gesture Recognition”, Nara, Japan,14–16 April1998; pp.
416–421.
29. [28] Jiang, Y.G.; Dai, Q.; Xue, X.; Liu, W.; Ngo, C.-W. “Trajectory-based modeling of human actions with motionreference points”.
In European Conference on Computer Vision; Springer: Berlin, Germany, 2012; pp. 425–438.
30. Dalal, N., Triggs, B.: “Human detection using oriented histograms of flow and appearance”. In: ECCV. (2006)
31. H. Wang and C. Schmid, “Action recognition with improvedtrajectories”,in IEEE International Conference on Computer
Vision,Sydney, Australia, 2013.
32. Hamim A. Abdul Azim and E. E Hemayed, “Human action recognition using trajectory-based representation”, Egyptian informatics
journal, Volume 16, Issue 2, July 2015, Pages 187-198.
33. Dalal, N.; Triggs, B. “Histograms of oriented gradients for human detection”. In Proceedings of the CVPR2005 IEEE Computer
Society Conference on Computer Vision and Pattern Recognition, San Diego, CA, USA,20–26 June 2005; Volume 1, pp. 886–893.
34. H. Wang, D. Oneata, J. Verbeek, and C. Schmid, “A robust and efficientvideo representation for action recognition”,IJCV, 2015.
35. P. Dollar, V. Rabaud, G. Cottrell, and S. Belongie, “Behavior recognitionvia sparse Spatio-temporal features”,in ICCV VS-PETS,
2005.
36. M. Bregonzio, S. Gong, and T. Xiang “Recognizing action as clouds ofspace-time interest points”,in CVPR, 2009.
37. G. Willems, T. Tuytelaars, and L. Gool, “An efficient dense and scale-invariantSpatio-temporal interest point detector”,in ECCV,
2008.
38. A. Klaser, M. Marszalek, and C. Schmid, “A Spatio-temporal descriptorbased on 3d-gradients”,in BMVC, 2008.
39. N Li, Xu Cheng, S. Zhang, Zhejiang Wu, “Realistic human action recognition by Fast HOG3D and self-organization feature map”,
2014, pp.1793-1812.
40. Ivo Everts, Jan C. van Gemert and Theo Gevers, “Evaluation of Color STIPs for Human Action Recognition”, 2013.
41. H. Wang, M. M. Ullah, A. Kl aser, I. Laptev, and C. Schmid, “Evaluationof local Spatio-temporal features for action recognition”,in
BMVC,2008.
42. Ye, M.; Zhang, Q.; Wang, L.; Zhu, J.; Yang, R.; Gall, J. “A survey on human motion analysis from depthdata”, October 2012; pp.
149–187.
43. Oreifej, O.; Liu, Z. HON4D: “Histogram of Oriented 4D Normals for Activity Recognition from DepthSequences”,June 2013, pp.
716–723.
44. Papadopoulos, G.T.; Axenopoulos, A.; Daras, P. “Real-time skeleton-tracking-based human action recognition using Kinect data”,
January 2014; pp. 473–483.
45. Presti, L.L.; Cascia, M.L. 3D “Skeleton-based Human Action Classification: A Survey”. Pattern Recognit. 2016,53, 130–147.
46. Pazhoumanddar, H.; Lam, C.P.; Masek, M. Joint “movement similarities for robust 3D action recognition using skeletal data”. J . Vis.
Commun. Image Represent. 2015, 30, 10–21.
47. Vemulapalli, R.; Arrate, F.; Chellappa, R. “Human Action Recognition by Representing 3D Skeletons as Points in a Lie Group”,
June 2014; pp. 588–595.
48. Miao, J.; Jia, X.; Mathew, R.; Xu, X.; Taubman, D.; Qing, C. “Efficient action recognition from compresseddepth maps”, Septem ber
2016; pp. 16–20.
49. Chen, C.; Jafari, R.; Kehtarnavaz, N. “Action Recognition from Depth Sequences Using Depth MotionMaps-Based Local Binary
Patterns”, January 2015; pp. 1092–1099.
50. Rahmani, H.; Mahmood, A.; Huynh, D.Q.; Mian, A. “Real-time action recognition using histograms of depth gradients and random
decision forests”, March 2014; pp. 626–633.
51. Yang, X.; Zhang, C.; Tian, Y.L. “Recognizing actions using depth motion maps-based histograms oforiented gradients”, November
2012; pp. 1057–1060.
52. Shotton, J.; Sharp, T.; Fitzgibbon, A.; Blake, A.; Cook, M.; Kipman, A.; Finocchio, M.; Moore, R. “Real-Timehuman pose
recognition in parts from single depth images”. Commun. ACM 2013, 56, 116–124.
53. Hany ElGhaish, Mohamed E. Hussien, Amin Shoukry, andRikioOnai, “Human Action Recognition Based on IntegratingBody Pose”,
Part Shape, and Motion, IEEE Access, Volume 6, 2018, pp. 49040-49055.
54. S. Jetley and F. Cuzzolin,“3D activity recognition using motion historyand binary shape templates”, Springer, 2014, pp. 129 -144.
55. Nazir, S.; Yousaf, M.H.; Velastin, S.A. “Evaluating a bag-of-visual features approach using Spatio-temporalfeatures for action
recognition”,2018.
56. Gaidon, A.; Harchaoui, Z.; Schmid, C. “Activity representation with motion hierarchies”. Int. J. Comput. Vis.2014, 107, 219 –238.
57. K. G. ManoshaChathuramali, Ranga Rodrigo, “Faster Human Activity Recognition with SVM”, The International Conference on
Advances in ICT for Emerging Regions – ICTer 2012: 197-203.
58. D. Tran, A. Sorokin, and D. Forsyth, “Human activity recognitionwith metric learning”, 2008, pp. 549–562.
59. Jalal A.Nasiri, NasrollahMoghadamCharkari, KouroshMozafari, “Energy-based model of least squares twin Support Vector
Machines for human action recognition”, November 2014, Pages 248-257.
60. M Arun Kumar, M Gopal, “Least squares twin support vector machines for pattern classification”, May 2009, Pages 7535-7543.
61. L Gonzalez, S.A. Velastin, G. Acuna, “silhouette based human action recognition with a multi-class support vector
machine”, 2018 page (5 pp.)
62. A. A. Chaaraoui, P. Climent-Pérez, and F. Flórez-Revuelta, “A review on vision techniques applied to Human Behavior Analysis for
Ambient-Assisted Living”, Expert Systems with Applications, vol. 39, no. 12, pp. 10873–10888, 2012.
63. M D. Praveen and C K Niranjan, “Human Action Detection and Recognition Using SIFT and SVM”, International Conference on
Cognitive Computing and Information Processing, CCIP 2017, pp.475-491.
64. YongxiongWang, YuboShiGuoliangWei, “A novel local feature descriptor based on energy information for human activity
recognition”, Neurocomputing, Volume 228, 8 March 2017, Pages 19-28.
65. SamehMegrhi, MarwaJmal, WidedSouidene, AzeddineBeghdadi, “Spatio-temporal action localization and detection for human
action recognition in big dataset”, November 2016, Pages 375-390.
66. HanlingZhang, PingZhong, JialeHe, ChenxingXia, “Combining depth-skeleton feature with sparse coding for action recognition”,
Neurocomputing, Volume 230, 22 March 2017, Pages 417-426.
67. Vikas Tripathi, DurgaprasadGangodkar, Ankush Mittal, Vishnu Kanth, “Robust Action Recognition framework using Segmented
Block and Distance Mean Histogram of Gradients Approach”,August 2017, Cochin, India.
68. Donahue, J.; Hendricks, L.A.; Rohrbach, M.; Venugopalan, S.; Guadarrama, S.; Saenko, K.; Darrell, T,“Long-Term Recurrent
Convolutional Networks for Visual Recognition and Description”,IEEE Trans. Pattern Anal. 2017, 39, 677–691.
69. Tran, D.; Bourdev, L.D.; Fergus, R.; Torresani, L.; Paluri, M,“Learning Spatiotemporal Features with 3DConvolutional Networks”.
In Proceedings of the IEEE International Conference on Computer Vision 2015, Las Condes, Chile, 11–18 December 2015; pp.
4489–4497.
70. Simonyan, K.; Zisserman, A. “Two-Stream Convolutional Networks for Action Recognition in Videos”, December 2014; pp. 568–
576.
71. Feichtenhofer, C.; Pinz, A.; Zisserman, A. “Convolutional Two-Stream Network Fusion for Video ActionRecognition”. In
Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition(CVPR), Las Vegas Valley, NV, USA, 27–
30 June 2016; pp. 1933–1941.
72. Wang, L.; Xiong, Y.;Wang, Z.; Qiao, Y.; Lin, D.; Tang, X.; Gool, L.V. “Temporal Segment Networks: TowardsGood Practices for
Deep Action Recognition”. In Proceedings of ECCV; Springer: Cham, Switzerland, 2016;pp. 20–36.
73. Lan, Z.; Zhu, Y.; Hauptmann, A.G.; Newsam, S. “Deep Local Video Feature for Action Recognition”.In Proceedings of the 2017
IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Honolulu, HI, USA, 21–26 July 2017; pp.
1219–1225.
74. Zhou, B.; Andonian, A.; Torralba, A. “Temporal Relational Reasoning in Videos”. arXiv2017, arXiv:1711.08496.
75. Goyal, R., Kahou, S., Michalski, V., Materzy´nska, J., Westphal, S., Kim, H., Haenel, V., Fruend, I., Yianilos, P., Mueller-Freitag,
M., et al.: “The something-something video database for learning and evaluating visual common sense”. Proc. ICCV (2017)
76. “Twentybn jester dataset: a hand gesture dataset”.https://www.twentybn.com/datasets/jester (2017)
77. Sigurdsson, G.A., Varol, G., Wang, X., Farhadi, A., Laptev, I., Gupta, A.: Hollywood in homes: “Crowdsourcing data collection for
activity understanding”. In: European Conference on Computer Vision, Springer (2016) 510–526.
78. Cheng Bin Jin, Shengzhe Li,Trung Dung Do, and Hakil Kim, “Real-Time Human Action RecognitionUsing CNN Over Temporal
Images for StaticVideo Surveillance Cameras”, Springer International Publishing Switzerland, pp. 330–339, 2015.
79. T.H. Yu, T K. Kim, and R. Cipolla, 2013, “Unconstrained Monocular 3D Human Pose Estimation by Action Detection and
Cross-modality Regression Forest”.
80. Ji Shuiwang, XuWei, Yang Ming, Member, IEEE, and Kai Yu, “3D Convolutional Neural Networks for Human Action
Recognition”.
81. Huang Xin, WeiGang, and AValery. “PetrushinShot Boundary Detection and High-level Features Extraction for the TREC Video
Evaluation”, 2003, Accenture Technology Laboratories.
82. Tran D., BourdevL., Fergus R., L. Torresani, and M. Paluri. “Learning spatiotemporal features with 3d convolutional networks”,
December 2015.
83. K. Derpanis, M. Lecce, K. Daniilidis, and R. Wildes. “Dynamic scene understanding: The role of orientation features in space and
time in scene classification”. In CVPR, 2012.
84. N. Shroff, P. K. Turaga, and R. Chellappa. “Moving vistas: Exploiting motion for describing scenes”. In CVPR, 2010.
85. Orit Kliper-Gross, Tal Hassner, Lior Wolf, “The Action Similarity Labeling Challenge”, IEEE Transactions On Pattern Analysis And
Machine Intelligence, Vol. X, No. X, X 201X.
86. J.Arunnehru, G.Chamundeeswari, S. PrasannaBharathi, “Human Action Recognition using 3D Convolutional Neural Networks with
3D Motion Cuboids in Surveillance Videos”, Proceida computer science, Volume 133, 2018, Pages 471-477.

Authors: B.G Sujatha, Anitha G.S

Paper Title: Grid Synchronisation of Photovoltaic Distributed Generation Using Hybrid FUZZY-PI Controller
Abstract: The power generation of the world has to be increased every year as the demand increases rapidly.
The high power generations are done by hydro, thermal and atomic. The power production cant is increased every
year as the cost of power production increases due to this constraint and increase in high power generation
increases pollutions. So the distribution side generation are used, and the PV based power generations are used
mostly as the maintenance is less comparatively. The power control in PV power generation is done by DQ
technique which is most widely used. It has a PI controller to regulate the real power. In this paper, the fuzzy logic
control which is combined with the PI controller is used to increase the controllability of the power system. The
MATLAB 2017b is used to do the simulation of the applied technique and the results are discussed with
improvements.

Keyword : Hybrid FUZZY-PI Controller, Distributed Generator, Grid Synchronization , Photovoltaic Generator,
d-q technique
948.
References: 5385-
1. R. Guerrero-Lemus, & et.al. “A simple big data methodology and analysis of the specific yield of all PV power plants in a power 5390
system over a long time period”, Renew. Sustain. Energy Rev. 2019, 107, 123–132.
2. Han, P, Lin, Z & et.al. “A Survey on Equivalence Modeling for Large-Scale Photovoltaic Power Plants”. Energies 2018, 11, 1463.
3. la Parra, I & et.al. “PV performance modeling: A review in the light of quality assurance for large PV plants”, Renew. Sustain.
Energy Rev. 2017, 78, 780–797.
4. Mehrasa, & et.al, “Control technique for the operation of grid-tied converters with high penetration of renewable energy resources”,
Electr. Power Syst. Res. 2019, 166, 18–28.
5. Mehrasa, M., & et.al, “Virtual Inertia, and Mechanical Power-Based Control Strategy to Provide Stable Grid Operation under High
Renewables Penetration”. Appl. Sci. 2019, 9, 1043–1058.
6. Wang, D., & et.al. “Coordinated Dispatch of Virtual Energy Storage Systems in LV Grids for Voltage Regulation”, IEEE Trans. Ind.
Inform. 2018, 14, 2452–2462.
7. Refaat, S.S. & et.al. “ A. Impact of a grid-tied large-scale photovoltaic system on dynamic voltage stability of electric power grids”,
IET Renew. Power Gener. 2018, 12, 157–164.
8. Y. Chaibi, A. & et.al. “Annual performance analysis of different maximum power point tracking techniques used in photovoltaic
systems,” Protection and Control of Modern Power Systems, vol. 4, no. 1, 2019.
9. Hanan A. Mosalam, & et.al, “Fuzzy logic control for a grid-connected PV array through Z-source-inverter using maximum constant
boost control method”, Ain Shams Engineering Journal, Volume 9, Issue 4, 2018, Pages 2931-2941.
10. Harsha Anantwar, & et.al, “Fuzzy self-tuning PI controller based inverter control for voltage regulation in off-grid hybrid power
system”, Energy Procedia, Volume 117, 2017, Pages 409-416.
11. H. W. D. Hettiarachchi, “Review of Applications of Fuzzy Logic in Multi-Agent-Based Control System of AC-DC Hybrid
Microgrid”, IEEE Access, 2018.

Authors: Korneev A.M., Sukhanov A.V., Abdullah L.S., Shipulin I.A.


Modeling of the Technological Process for Metal Production using a Probability Finite Automatic
Paper Title:
Machine
Abstract: To date, the popularity of areas such as system management and the development of automated
control systems using finite state machines has grown significantly, while the degree of mutual integration of these
areas is quite high. So, in each of them the creation of decision-making systems and software systems of intellectual
support is required. And the most frequently used tool for this in modern research and scientific projects is state
machines - finite discrete or probabilistic automata, although they often do not allow the creation of decision-
making systems quite efficient without large labor costs. The subject of this study is to create a probabilistic finite
state machine capable of accurately predicting the properties of alloys, and thereby provide intelligent decision
support in the process of manufacturing metal products.

Keyword : finite state machine, probabilistic automaton, discrete automaton, transition matrix, technological
process, technological circuit cell.

949. References:
1. Blyumin S.L., Korneev A.M. Discrete modeling of automation and control systems: Monograph. - Lipetsk: LEGI. - 2005 .- 132 p.
2. Korneev A.M. Modeling complex production systems with using iterative networks / А.М. Korneev, A.M.M. Nagi, T.A. Smetannikova //
5391-
Fundamental Research. - 2016. No.5-2. - P.260-263. 5394
3. Blumin, S.L. Linear cell machines: the state space approach / S.L. Blumin, R.G. Farajev // Automation and Telemechanics. - 1982. - No.2.
- P.125-162.
4. Butkovsky, A.G. Structural theory of distributed systems / A.G. Butkovsky. - M .: Nauka, 1977 .- 320 p.
5. Korneev A.M. Optimization of the database structure of multi-stage production systems / A.M. Korneev, L.S. Abdullah, V.A. Lysikov // In
the book. New technologies in scientific research, design, management, production: Proceedings of the international scientific-practical
conference. - 2017. - P.300-304.
6. Korneev A.M. Evaluation of the effectiveness of the functioning modes of complex systems, taking into account the costs of production /
A.M. Korneev, T.A. Smetannikova, A.M. Vasyukov // Bulletin of the Lipetsk State Technical University. - 2015. - No. 2 (24) - P.15-19.
7. Korneev A.M. Search for optimal functioning modes of complex industrial systems / А.М. Korneev, G.M. Al-Sabri // Modern high
technology. - 2016. - No. 9-2 - P.233-236.
8. Sakarovitch, Jacques. Elements of automata theory / Jacques Sakarovitch. – Cambridge University Press, 2009. – р. 758.
9. Bukharaev, R.G. Fundamentals of the theory of probabilistic automata / R.G. Bukharaev. - Nauka, 1985 .- 288 p.
10. Korneev A.M. Search strategy for optimal technological modes in discrete cell-hierarchical systems / А.М. Korneev, T.A. Smetannikova,
G.M. Al-Sabri, A.M. Nagi // Modern problems of science and education. - 2015. - No. 2-2 - p.150.
11. Korneev, A.M. The use of iterative chains to describe multi-stage spatially distributed production systems / А.М. Korneev, V.N. Kid, T.A.
Smetannikova // Bulletin of the Peoples' Friendship University of Russia. Series: Engineering Research. - 2012. - No. 2. - P.78-84.

Authors: Ashok Tatapudi, P Suresh Varma

Paper Title: Prediction of Crops based on Environmental Factors using IoT & Machine Learning Algorithms
Abstract: India being an agricultural country, the most part of economy is depends on yield growth.
Agriculture is largely dependent on rainwater and also relies on different soil variables such as aspects of nitrogen,
phosphorus, potassium and climate such as temperature, precipitation, etc. The technological growth in agriculture
will increase the crop productivity. Remote sensing systems like IOT systems are being more widely used in smart
farming systems, these systems produce generous amount of data. Machine learning is an ongoing work that has
been filed to forecast the plant based on data trends. The proposed system would integrate sensors such as Ph.,
Moisture, Rainfall, Temperature and Humidity to analyze the information from these sensors and to implement
machine learning algorithms: Linear Regression, Decision Trees, Random Forest, and GDBoost. The most
desirable crops are predicted according to the current environment. This work gives farmers a better prediction to
plant what kind of crops in their farm field based on the criteria listed above in order to improve Smart Farming's
productivity.
950.
Keyword : Agriculture, IoT, Machine Learning, Data Analytics, Prediction
5395-
References: 5401
1. M.K. Gayathri, Dr.G.S. Anandha Mala, J Jayasakthi, “Providing Smart Agricultural Solutions to Farmers for better yielding using
IoT”, TIAR 2015.
2. Patil, S., and S. R. “INTERNET OF THINGS BASED SMART AGRICULTURE SYSTEM USING PREDICTIVE ANALYTICS”.
Asian Journal of Pharmaceutical and Clinical Research, Vol. 10, no. 13, Apr. 2017, pp. 148-52,
doi:10.22159/ajpcr.2017.v10s1.19601.
3. Thomas Truong; Anh Dinh; Khan Wahid. An IoT environmental data collection system for fungal detection in crop fields [M]//2017
IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)
4. D, Rajesh. (2011). Application of Spatial Data mining for Agriculture. International Journal of Computer Applications. 15.
10.5120/1922-2566.
5. YOU, J.; LI, X.; LOW, M.; LOBELL, D.; ERMON, S.. Deep Gaussian Process for Crop Yield Prediction Based on Remote Sensing
Data. AAAI Conference on Artificial Intelligence, North America, feb. 2017.
6. Anna Chlingaryan, Salah Sukkarieh, Brett Whelan, Machine learning approaches for crop yield prediction and nitrogen status
estimation in precision agriculture: A review, Computers and Electronics in Agriculture, Volume 151, 2018, Pages 61 -69, ISSN
0168-1699.
7. K. A. Patil and N. R. Kale, "A model for smart agriculture using IoT," 2016 International Conference on Global Trends in Signal
Processing, Information Computing and Communication (ICGTSPICC), Jalgaon, 2016, pp. 543-545.
8. https://www.electronicscomp.com/soil-moisture-sensor-module-india.
9. https://www.mouser.com/ds/2/758/DHT11-Technical-Data-Sheet-Translated-Version-1143054.pdf.
10. https://www.rhydolabz.com/sensors-weather-sensors-c-137_147/raindrop-sensor-module-p-2336.html
11. https://scidle.com/how-to-use-a-ph-sensor-with-arduino/
12. Georg Ruß, Rudolf Kruse, Martin Schneider, and Peter Wagner. Estimation of neural network parameters for wheat yield prediction.
In Max Bramer, editor, Artificial Intelligence in Theory and Practice II, volume 276 of IFIP International Federation for Information
Processing, pages 109–118. Springer, July 2008.
13. Iv´an Mej´ıa-Guevara and ´Angel Kuri-Morales. Evolutionary feature and parameter selection in support vector regression. In
Lecture Notes in Computer Science, volume 4827, pages 399–408. Springer, Berlin, Heidelberg, 2007.
14. Breiman, L. (2001) Random Forests. Machine Learning, 45, 5-32.
15. https://towardsdatascience.com/understanding-gradient-boosting-machines-9be756fe76ab

Authors: S. S Gupta, A.K. Arya, P Vijay


Designing a Model for Optimization of Maintenance and Inspection efforts against Third Party
Paper Title:
Damage to cross country Pipelines in India
Abstract: In India there are nearly 45000km of cross- country pipelines in operation, safety and reliability of
this network of pipelines play a major role in the energy distribution security of the country. A cross country
pipeline can fail due to various reasons primary among these are corrosion and third-party damage. In a populous
country like India third party damage has emerged as a newest threat to the pipelines, as on date nearly 40% of all
pipeline failures are due to third party damage. Third-party damage to an underground pipeline is generally defined
as a category of damage caused to the pipeline due to the activities of an outside (other than the pipeline owner or
its authorized representative) agency, for example an agency building road across the pipeline right of way may
cause rupture of the pipeline due to uncontrolled use of earthmoving equipment. Most of the third-party damages
are caused due to ignorance or negligence, as the third-party damage is caused by human error, it does not have any
trend and random in nature. Unfortunately, majority of third-party damage leads to severe and instantaneous failure
of the pipeline leading to release of highly inflammable content that can cause widespread destruction of life and
property. To minimize the possibility of third party damage to a reasonably low rate, it is necessary that
maintenance and inspection (M&I) practices are properly oriented, this is possible only when the weight of the
factors responsible for third party damage is known and M&I programme is designed accordingly. This paper
proposes a model for calculating weight of various factors responsible for third party damage and how the model
can optimize M&I efforts as well as build best possible defense against third party damage for an underground
high-pressure cross-county hydrocarbon pipeline.

Keyword : Third party Damage, Pipelines, Hydrocarbon, M&I, Optimization


References:
1. Report of working group of MoP&NG on enhancing refinery capacity by 2040, Jan 2018]
2. Indian Petroleum and Natural Gas Stastistics-2015-16, Ministry of Petroleum & Natural Gas, Govt. Of India
3. Lianshuang Dai et.al. Journal of Petroleum Engineering, Volume 2017, Article ID 3174636.
4. Vladimir Horalek, Safety Performance Determined the Acceptability of Gas Transmission System EGIG Pipeline Incident Data
Base,2004
951. 5. Sérgio B. Cunha, Petrobras Transporte – TRANSPETRO, Comparison and analysis of pipeline failure statistics, Proceedings of the
2012 9th International Pipeline Conference, IPC2012, September 24-28, 2012, Calgary, Alberta, Canada 5402-
6. Dr. Phil Hopkins, High design factor pipelines: Integrity issues -Key consideration to decided appropriate pipeline design factor to 5413
achieve higher levels of integrity, Journal of Integrity, Penspen 2005.
7. PNGRB Archives on Pipeline Incidents, Petroleum & Natural Gas Regulatory Board, India.
8. EGIG, Gas pipeline incidents, 10th report of the European Gas Pipeline Incident Data Group (Period 1970 – 2016), 2018
9. CONCAWE Report 6/18, Performance of European cross-country oil pipelines, Statistical summary of reported spillages in 2016 and
since 1971, March 2018
10. John Mather, Chris Blackmore, Andrew Petrie & Charlotte Treves, An assessment of measures in use for gas pipelines to mitigate
against damage caused by third party activity, WS Atkins Consultants Ltd. CONTRACT RESEARCH REPORT 372/2001
11. Zoe Chaplin and Kate Howard, Update of pipeline failure rates for land use planning assessments, Health and Safety Laboratory,
2015
12. Christopher Jackson*, Ali Mosleh, Oil and Gas Pipeline Third Party Damage (TPD) - A New Way to Model External Hazard Failure
B. John Garrick Institute for the Risk Sciences, University of California, Los Angeles, United States*, Sept 2018
13. Alex Dawotola, Risk Based Maintenance of Petroleum Pipelines, Delft University of Technology, The Netherlands. Doctoral Thesis,
2012 67.
14. Laya Parvizsedghy, Risk-Based Maintenance Planning Model for Oil and Gas Pipelines, A Thesis in the Department of Building,
Civil and Environmental Engineering, Concordia University, Montreal, Quebec, Canada, 2015
15. Dey, P.K. Analytic Hierarchy Process Analyses risk of operating cross-country petroleum pipelines in India, Hazards Review, Vol. 4,
Issue 4, pp 213-222, 2003
16. Dey, P. K., Ogunlana S.O., Gupta S.S. & Tabucanon M.T, A risk-based maintenance model for cross country pipelines, Journal of
cost engineering, Vol.40. No.4, [1998], pp24-31.
17. EGIG, Gas pipeline incidents, 10th report of the European Gas Pipeline Incident Data Group (Period 1970 – 2016), 2018
18. CONCAWE Report 6/18, Performance of European cross-country oil pipelines, Statistical summary of reported spillages in 2016 and
since 1971, March 2018
19. Xinhong Li, Guoming, Chen Hongwei Zhu, Quantitative risk analysis on leakage failure of submarine oil and gas pipelines using
Bayesian network, Process Safety and Environmental Protection, Volume 103, Part A, September 2016, Pages 163-173
20. Jun Li, Hong Zhang, Yinshan Han, Baodong Wang, Study on Failure of Third-Party Damage for Urban Gas Pipeline Based on Fuzzy
Comprehensive Evaluation, 2016, (online), https://doi.org/10.1371/journal.pone.0166472
21. Zeyang Qiu, Wei Liang, Xue Wang,Yang Lin and Meng Zhang, Study on quantitative risk assessment model of the third party
damage for natural gas pipelines based on fuzzy comprehensive assessment, 12th International Conference on Damage Assessment
of Structures IOP Publishing, 2017
22. T L Satty, Fundamentals of decision-making process and priority theory with the analytical hierarchy process, Vol-VI, e-book second
edition, 2013
23. C Zhang, T X Qin, B Jiang and C Huang, A comprehensive probabilistic analysis model of oil pipelines network based on Bayesian
network, IOP Conf. Series: Earth and Environmental Science, 2018.
Authors: Tony Mathew M, Kannan Kunnathully

Paper Title: Implementation of International Health Regulations in India


Abstract: The International Health Regulations (IHR) is a worldwide legitimate instrument appropriate to all
WHO part nations and came into power in 2007. The goal of the IHR is to forestall global spread of malady by
empowering part nations experience limit working for early identification, revealing and taking control measures
against any general wellbeing crises of worldwide concern. The advancement of general wellbeing framework for
gathering IHR standards should enable India to build up its reconnaissance, reaction and readiness limits which
would improve results of its general wellbeing projects and help contain flare-ups. The present analysis was made
through random sampling method where the survey was taken from common public, professionals, etc. The sample
size in the present analysis is 1895 samples, the independent variable is in the analysis is gender and the dependent
variables is reliable on the statement.The research tools used in the present paper such as cross tabulation, chi-
square and case summary and graphical representation was also used to analyse the study. The study found that
India faces difficulties in gathering its developing requirements for prepared disease transmission experts of a
restorative foundation, entomologists, nourishment investigators and other pro staff occupied with general
wellbeing observation exercises. It can be concluded that India ought to likewise not be content with gathering
fundamental IHR standards but rather ought to endeavor to accomplish propelled abilities allowing it to help its
neighboring nations with restricted general wellbeing foundation in gathering their IHR objectives.

Keyword : India, WHO, International Health Regulations, surveillance, prevention


References:
1. Agrawal, V. K. “Pandemic Response and International Health Regulations.” Medical Journal Armed Forces India, vol. 63, no. 4,
2007, pp. 366–67, doi:10.1016/s0377-1237(07)80018-9.
2. Basker, Mona M. “Adolescent Health in Asia: Insights from India.” International Journal of Adolescent Medicine and Health, vo l.
28, no. 3, 2016, doi:10.1515/ijamh-2016-5017.
3. Bright, Kristin. “International Health Regulations.” Encyclopedia of Immigrant Health, 2012, pp. 930–33, doi:10.1007/978-1-4419-
952. 5659-0_416.
4. Das, Shankar. “The Health Care System in India.” Health Care Systems in Developing Countries in Asia, 2017, pp. 149 –82,
doi:10.4324/9781315586403-7.
5414-
5. Fidler, David P., and Lawrence O. Gostin. “The New International Health Regulations: An Historic Development for International 5418
Law and Public Health.” Global Health, 2017, pp. 489–98, doi:10.4324/9781315254227-36.
6. Foster, Andrew, and Naresh Kumar. “Health Effects of Air Quality Regulations in Delhi, India.” Atmospheric Environment, vol. 45,
no. 9, 2011, pp. 1675–83, doi:10.1016/j.atmosenv.2011.01.005.
7. Gostin, Lawrence O., and Rebecca Katz. “The International Health Regulations: The Governing Framework for Global Health
Security.” The Milbank Quarterly, vol. 94, no. 2, 2016, pp. 264–313, doi:10.1111/1468-0009.12186.
8. Hagen, D. “Case Study 1: Port Health and International Health Regulations.” Introduction to Pandemic Influenza, pp. 194–201,
doi:10.1079/9781845936259.0194.
9. “Port Health and International Health Regulations.” Pandemic Influenza, pp. 164–72, doi:10.1079/9781845938567.0164.
10. “International Health Regulations.” SpringerReference, doi:10.1007/springerreference_225240.
11. Jones, Dilwyn T. “International Health Regulations.” Handbook of Nautical Medicine, 1984, pp. 310–15, doi:10.1007/978-3-642-
69415-8_35.
12. Katz, Rebecca. “International Health Regulations.” Encyclopedia of Bioterrorism Defense, 2011, doi:10.1002/0471686786.ebd0162 .
13. Krishnamoorthy, Yuvaraj, et al. “Emerging Public Health Threat of E-Waste Management: Global and Indian Perspective.” Reviews
on Environmental Health, vol. 33, no. 4, Dec. 2018, pp. 321–29.
14. Li, Jian, and Alan Paisey. “Influential Regulations.” International Transfer Pricing in Asia Pacific, 2005, pp. 28–49,
doi:10.1057/9780230511606_3.
15. Luz, G. A. “Noise Management: International Regulations.” Encyclopedia of Environmental Health, 2011, pp. 164 –73,
doi:10.1016/b978-0-444-52272-6.00258-0.
16. Marais, Ben J., et al. “Improving Emergency Preparedness and Response in the Asia-Pacific.” BMJ Global Health, vol. 4, no. 1, Jan.
2019, p. e001271.
17. Sikka, Veronica, et al. “The 2017 International Joint Working Group White Paper by INDUSEM, the Emergency Medicine
Association and the Academic College of Emergency Experts on Establishing Standardized Regulations, Operational Mechanisms,
and Accreditation Pathways for Education and Care Provided by the Prehospital Emergency Medical Service Systems in India.”
Journal of Emergencies, Trauma, and Shock, vol. 10, no. 3, July 2017, pp. 154–61.
18. Team, Eurosurveillance Editorial, and Eurosurveillance editorial team. “International Health Regulations.” Weekly Releases (1 997–
2007), vol. 2, no. 7, 1998, doi:10.2807/esw.02.07.01259-en.
19. World Health Organization. International Health Regulations (2005). World Health Organization, 2008.
20. Youde, Jeremy. “The International Health Regulations.” Biopolitical Surveillance and Public Health in International Politics, 2010,
pp. 147–75, doi:10.1057/9780230104785_7.

Authors: Karthni Lakshmanan, Nishanth Thilagar , S. Tamilselvi

Paper Title: Two Step Algorithm Implementation Forintelligent Street Light System
Abstract: This paper presents an algorithm for the automation of street lights for existing urban roads in India.
In thiscase study a two kilometre lane in Chennai, India is taken under consideration. The paper proposes replacing
953. the existingHigh Pressure Sodium VapourLamps (HPS) with Light Emitting Diodes (LED). A smart algorithm is
fed into the system design incorporating phototransistor and Infrared sensors. The opera- tion time of the street
5419-
lights can be categorised as High Passerby Frequency(HPF)andLowPasserbyFrequency(LPF)period.The Dynamic
5423
Intensity Modification (DIM) system operates during LPF duration hence, when passerby is detected the street is
illuminated to maximal intensity which otherwise is maintained at low intensity consuming low power resulting in
low cost.For the 2 km stretch, the results highlight that replacing all existing lamps with LEDs and dimming light
intensity in the absence of users in the vicinity of the lamp-post is convenient and provides minimum of 65.74%
and a maximum of 72.9% relative reduction in cost for a period of twenty years for this specific case study.
However, the DIM algorithm is generic and can be implemented across any Indianroadway.

Keyword : Urban Roads, Infrared Sensors, Phototransistors, Intensity Modulation, Automated Switching, Street
Lights.
References:

You might also like